os/security/cryptoservices/certificateandkeymgmt/tpkcs10/scripts/tpkcs10_v2.script
author sl@SLION-WIN7.fritz.box
Fri, 15 Jun 2012 03:10:57 +0200
changeset 0 bde4ae8d615e
permissions -rw-r--r--
First public contribution.
     1 //
     2 // Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
     3 // All rights reserved.
     4 // This component and the accompanying materials are made available
     5 // under the terms of the License "Eclipse Public License v1.0"
     6 // which accompanies this distribution, and is available
     7 // at the URL "http://www.eclipse.org/legal/epl-v10.html".
     8 //
     9 // Initial Contributors:
    10 // Nokia Corporation - initial contribution.
    11 //
    12 // Contributors:
    13 //
    14 // Description: 
    15 //
    16 
    17 PRINT Run Positive and OOM tests tpkcs1010serverv2 Suite 
    18 
    19 LOAD_SUITE tpkcs10serverv2
    20 
    21 // pre- test: move out of the way key store file.
    22 RUN_UTILS CopyFile c:\private\101f72a6\keys.dat c:\keys.dat
    23 START_TESTCASE 			SEC-PKCS10-RSA-0001
    24 //! @SYMTestCaseID 		SEC-PKCS10-RSA-0001
    25 //! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
    26 //!		     		certificate requests using the parameters listed below.
    27 //!		  		Key Algorithm: RSA
    28 //!				Key size: 512 bits 
    29 //!		    		Digest Algorithm: SHA1 
    30 //!				Number of attributes: 0	
    31 //! @SYMPREQ 			CR0973
    32 //! @SYMREQ 			REQ1581.5
    33 //! @SYMTestPriority 		Critical
    34 //! @SYMTestActions 		PKCS10 certificate request construction.
    35 //! @SYMTestExpectedResults 	Encoding successfully validated
    36 //! @SYMTestType CIT
    37 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
    38 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0001
    39 END_TESTCASE 			SEC-PKCS10-RSA-0001
    40 
    41 START_TESTCASE 			SEC-PKCS10-RSA-0002
    42 //! @SYMTestCaseID 		SEC-PKCS10-RSA-0002
    43 //! @SYMTestCaseDesc		check that CPKCS10Request class generates correct encoding for 
    44 //!		     		certificate requests using the parameters listed below.
    45 //!		  		Key Algorithm: RSA
    46 //!				Key size: 512 bits 
    47 //!		    	  	Digest Algorithm: MD2 
    48 //!				Number of attributes: 0	
    49 //! @SYMPREQ 			CR0973
    50 //! @SYMREQ 			REQ1581.5
    51 //! @SYMTestPriority 		Critical
    52 //! @SYMTestActions 		PKCS10 certificate request construction.
    53 //! @SYMTestExpectedResults 	Encoding successfully validated
    54 //! @SYMTestType 		CIT
    55 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
    56 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0002
    57 END_TESTCASE 			SEC-PKCS10-RSA-0002
    58 
    59 START_TESTCASE 			SEC-PKCS10-RSA-0003
    60 
    61 //! @SYMTestCaseID 		SEC-PKCS10-RSA-0003
    62 //! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
    63 //!		     		certificate requests using the parameters listed below.
    64 //!		  		Key Algorithm: RSA
    65 //!				Key size: 512 bits 
    66 //!		     		   Digest Algorithm: MD5 
    67 //!				Number of attributes: 0
    68 //! @SYMPREQ 			CR0973
    69 //! @SYMREQ 			REQ1581.5
    70 //! @SYMTestPriority 		Critical
    71 //! @SYMTestActions	 	PKCS10 certificate request construction.
    72 //! @SYMTestExpectedResults 	Encoding successfully validated
    73 //! @SYMTestType 		CIT
    74 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
    75 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0003
    76 END_TESTCASE 			SEC-PKCS10-RSA-0003
    77 
    78 START_TESTCASE 			SEC-PKCS10-RSA-0004
    79 //! @SYMTestCaseID 		SEC-PKCS10-RSA-0004
    80 //! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
    81 //!		     		certificate requests using the parameters listed below.
    82 //!		  		Key Algorithm: RSA
    83 //!				Key size: 512 bits 
    84 //!		     		   Digest Algorithm: SHA1
    85 //!				Number of attributes: 1 (challenge password)
    86 //! @SYMPREQ 			CR0973
    87 //! @SYMREQ 			REQ1581.5
    88 //! @SYMTestPriority 		Critical
    89 //! @SYMTestActions 		PKCS10 certificate request construction.
    90 //! @SYMTestExpectedResults 	Encoding successfully validated
    91 //! @SYMTestType 		CIT
    92 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
    93 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0004
    94 END_TESTCASE 			SEC-PKCS10-RSA-0004
    95 
    96 START_TESTCASE 			SEC-PKCS10-RSA-0005
    97 //! @SYMTestCaseID 		SEC-PKCS10-RSA-0005
    98 //! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
    99 //!		     		certificate requests using the parameters listed below.
   100 //!		  		Key Algorithm: RSA
   101 //!				Key size: 512 bits 
   102 //!		        	Digest Algorithm: SHA1 
   103 //!				Number of attributes: 2 (challenge password and structured name)
   104 //! @SYMPREQ 			CR0973
   105 //! @SYMREQ 			REQ1581.5
   106 //! @SYMTestPriority 		Critical
   107 //! @SYMTestActions 		PKCS10 certificate request construction.
   108 //! @SYMTestExpectedResults 	Encoding successfully validated
   109 //! @SYMTestType 		CIT
   110 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   111 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0005
   112 END_TESTCASE 			SEC-PKCS10-RSA-0005
   113 
   114 START_TESTCASE 			SEC-PKCS10-RSA-0006
   115 //! @SYMTestCaseID 		SEC-PKCS10-RSA-0006
   116 //! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
   117 //!		     		certificate requests using the parameters listed below.
   118 //!		  		Key Algorithm: RSA
   119 //!				Key size: 2048 bits 
   120 //!		     		   Digest Algorithm: SHA1 
   121 //!				Number of attributes: 2 (challenge password and structured name)
   122 //! @SYMPREQ 			CR0973
   123 //! @SYMREQ 			REQ1581.5
   124 //! @SYMTestPriority 		Critical
   125 //! @SYMTestActions 		PKCS10 certificate request construction.
   126 //! @SYMTestExpectedResults 	Encoding successfully validated
   127 //! @SYMTestType 		CIT
   128 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   129 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0006
   130 END_TESTCASE 			SEC-PKCS10-RSA-0006
   131 
   132 START_TESTCASE 			SEC-PKCS10-DSA-0001
   133 //! @SYMTestCaseID 		SEC-PKCS10-DSA-0001
   134 //! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
   135 //!		     		certificate requests using the parameters listed below.
   136 //!		  		Key Algorithm: DSA
   137 //!				Key size: 512 bits 
   138 //!		        	Digest Algorithm: SHA1 
   139 //!				Number of attributes: 0
   140 //! @SYMPREQ 			CR0973
   141 //! @SYMREQ 			REQ1581.5
   142 //! @SYMTestPriority 		Critical
   143 //! @SYMTestActions 		PKCS10 certificate request construction.
   144 //! @SYMTestExpectedResults 	Encoding successfully validated
   145 //! @SYMTestType 		CIT
   146 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   147 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0001
   148 END_TESTCASE 			SEC-PKCS10-DSA-0001
   149 
   150 START_TESTCASE 			SEC-PKCS10-DSA-0002
   151 //! @SYMTestCaseID 		SEC-PKCS10-DSA-0002
   152 //! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
   153 //!		    		 certificate requests using the parameters listed below.
   154 //!		  		Key Algorithm: DSA
   155 //!				Key size: 512 bits 
   156 //!		        	Digest Algorithm: SHA1
   157 //!				Number of attributes: 1 (challenge password)
   158 //! @SYMPREQ 			CR0973
   159 //! @SYMREQ 			REQ1581.5
   160 //! @SYMTestPriority 		Critical
   161 //! @SYMTestActions 		PKCS10 certificate request construction.
   162 //! @SYMTestExpectedResults 	Encoding successfully validated
   163 //! @SYMTestType 		CIT
   164 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   165 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0002
   166 END_TESTCASE 			SEC-PKCS10-DSA-0002
   167 
   168 START_TESTCASE 			SEC-PKCS10-DSA-0003
   169 //! @SYMTestCaseID 		SEC-PKCS10-DSA-0003
   170 //! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
   171 //!		     		certificate requests using the parameters listed below.
   172 //!		  		Key Algorithm: DSA
   173 //!				Key size: 512 bits 
   174 //!		        	Digest Algorithm: SHA1 
   175 //!				Number of attributes: 2 (challenge password and structured name)
   176 //! @SYMPREQ 			CR0973
   177 //! @SYMREQ 			REQ1581.5
   178 //! @SYMTestPriority 		Critical
   179 //! @SYMTestActions 		PKCS10 certificate request construction.
   180 //! @SYMTestExpectedResults 	Encoding successfully validated
   181 //! @SYMTestType 		CIT
   182 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   183 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0003
   184 END_TESTCASE 			SEC-PKCS10-DSA-0003
   185 
   186 START_TESTCASE 			SEC-PKCS10-DSA-0004
   187 //! @SYMTestCaseID 		SEC-PKCS10-DSA-0004
   188 //! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
   189 //!		     		certificate requests using the parameters listed below.
   190 //!		  		Key Algorithm: DSA
   191 //!				Key size: 2048 bits 
   192 //!		     		Digest Algorithm: SHA1 
   193 //!				Number of attributes: 2 (challenge password and structured name)
   194 //! @SYMPREQ 			CR0973
   195 //! @SYMREQ 			REQ1581.5
   196 //! @SYMTestPriority 		Critical
   197 //! @SYMTestActions 		PKCS10 certificate request construction.
   198 //! @SYMTestExpectedResults 	Encoding successfully validated
   199 //! @SYMTestType 		CIT
   200 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   201 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0004
   202 END_TESTCASE 			SEC-PKCS10-DSA-0004
   203 
   204 START_TESTCASE 			SEC-PKCS10-EXT-0001
   205 //! @SYMTestCaseID 		SEC-PKCS10-EXT-0001
   206 //! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
   207 //!		     		certificate requests including extension requestsusing the parameters listed below.
   208 //!		  		Key Algorithm: RSA
   209 //!				Key size: 2048 bits 
   210 //!		     		   Digest Algorithm: SHA1 
   211 //!				Number of attributes: 2 (challenge password and structured name)
   212 //!				Extensions used: basic Constraints,
   213 //!				 subject Alt Name,
   214 //!				 issuer Alt Name, 
   215 //!			         key Usage,
   216 //!                              extended Key Usage,
   217 //!				 authority Info Access 
   218 //! @SYMPREQ 			CR0973
   219 //! @SYMREQ 			REQ1581.5
   220 //! @SYMTestPriority 		Critical
   221 //! @SYMTestActions 		PKCS10 certificate request construction.
   222 //! @SYMTestExpectedResults 	Encoding successfully validated
   223 //! @SYMTestType 		CIT
   224 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   225 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0001
   226 END_TESTCASE 			SEC-PKCS10-EXT-0001
   227 
   228 START_TESTCASE 			SEC-PKCS10-EXT-0002
   229 //! @SYMTestCaseID 		SEC-PKCS10-EXT-0002
   230 //! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
   231 //!		     		certificate requests including extension requestsusing the parameters listed below.
   232 //!		  		Key Algorithm: RSA
   233 //!				Key size: 2048 bits 
   234 //!		       		 Digest Algorithm: MD2 
   235 //!				Number of attributes: 2 (challenge password and structured name)
   236 //!				Extensions used: basic Constraints,
   237 //!					 subject Alt Name,
   238 //!					 issuer Alt Name, 
   239 //!			                 key Usage,
   240 //!                                      extended Key Usage,
   241 //!					 authority Info Access 
   242 //!		
   243 //! @SYMPREQ 			CR0973
   244 //! @SYMREQ 			REQ1581.5
   245 //! @SYMTestPriority 		Critical
   246 //! @SYMTestActions 		PKCS10 certificate request construction.
   247 //! @SYMTestExpectedResults 	Encoding successfully validated
   248 //! @SYMTestType 		CIT
   249 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   250 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0002
   251 END_TESTCASE 			SEC-PKCS10-EXT-0002
   252 
   253 START_TESTCASE 			SEC-PKCS10-EXT-0003
   254 //! @SYMTestCaseID 		SEC-PKCS10-EXT-0003
   255 //! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
   256 //!		     		certificate requests including extension requestsusing the parameters listed below.
   257 //!		  		Key Algorithm: RSA
   258 //!				Key size: 2048 bits 
   259 //!		     	   	Digest Algorithm: MD5 
   260 //!				Number of attributes: 2 (challenge password and structured name)
   261 //!				Extensions used: basic Constraints,
   262 //!					 subject Alt Name,
   263 //!					 issuer Alt Name, 
   264 //!			                 key Usage,
   265 //!                                      extended Key Usage,
   266 //!					 authority Info Access 
   267 //!		
   268 //! @SYMPREQ 			CR0973
   269 //! @SYMREQ 			REQ1581.5
   270 //! @SYMTestPriority 		Critical
   271 //! @SYMTestActions 		PKCS10 certificate request construction.
   272 //! @SYMTestExpectedResults 	Encoding successfully validated
   273 //! @SYMTestType 		CIT
   274 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   275 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0003
   276 END_TESTCASE 			SEC-PKCS10-EXT-0003
   277 
   278 START_TESTCASE 			SEC-PKCS10-EXT-0004
   279 //! @SYMTestCaseID 		SEC-PKCS10-EXT-0004
   280 //! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
   281 //!		     		certificate requests including extension requestsusing the parameters listed below.
   282 //!		  		Key Algorithm: DSA
   283 //!				Key size: 2048 bits 
   284 //!		        	Digest Algorithm: SHA1 
   285 //!				Number of attributes: 2 (challenge password and structured name)
   286 //!				Extensions used: basic Constraints,
   287 //!					 subject Alt Name,
   288 //!					 issuer Alt Name, 
   289 //!			                 key Usage,
   290 //!                                      extended Key Usage,
   291 //!					 authority Info Access 
   292 //!		
   293 //! @SYMPREQ 			CR0973
   294 //! @SYMREQ 			REQ1581.5
   295 //! @SYMTestPriority 		Critical
   296 //! @SYMTestActions 		PKCS10 certificate request construction.
   297 //! @SYMTestExpectedResults 	Encoding successfully validated
   298 //! @SYMTestType 		CIT
   299 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   300 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0004
   301 END_TESTCASE 			SEC-PKCS10-EXT-0004
   302 
   303 START_TESTCASE 			SEC-PKCS10-OOM-0001
   304 //! @SYMTestCaseID 		SEC-PKCS10-OOM-0001
   305 //! @SYMTestCaseDesc 		To check that CPKCS10Request class can manage out of memory conditions graciously
   306 //!		  		Use the following parameters:
   307 //!				Key Algorithm: RSA
   308 //!				Key size: 512 bits 
   309 //!		     		   Digest Algorithm: SHA1 
   310 //!				Number of attributes: 2
   311 //!		
   312 //! @SYMPREQ 			CR0973
   313 //! @SYMREQ 			REQ1581.5
   314 //! @SYMTestPriority 		Critical
   315 //! @SYMTestActions 		PKCS10 certificate request construction in OOM conditions.
   316 //! @SYMTestExpectedResults 	Encoding successfully validated
   317 //! @SYMTestType 		CIT
   318 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   319 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-OOM-0001
   320 END_TESTCASE 			SEC-PKCS10-OOM-0001
   321 
   322 START_TESTCASE 			SEC-PKCS10-OOM-0002
   323 //! @SYMTestCaseID 		SEC-PKCS10-OOM-0002
   324 //! @SYMTestCaseDesc 		To check that CPKCS10Request class can manage out of memory conditions graciously
   325 //!		  		Use the following parameters:
   326 //!				Key Algorithm: DSA
   327 //!				Key size: 512 bits 
   328 //!		       		 Digest Algorithm: SHA1 
   329 //!				Number of attributes: 2
   330 //! @SYMPREQ 			CR0973
   331 //! @SYMREQ 			REQ1581.5
   332 //! @SYMTestPriority 		Critical
   333 //! @SYMTestActions 		PKCS10 certificate request construction in OOM conditions.
   334 //! @SYMTestExpectedResults 	Encoding successfully validated
   335 //! @SYMTestType 		CIT
   336 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   337 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-OOM-0002
   338 END_TESTCASE 			SEC-PKCS10-OOM-0002
   339 
   340 START_TESTCASE 			SEC-PKCS10-REU-0001
   341 //! @SYMTestCaseID 		SEC-PKCS10-REU-0001
   342 //! @SYMTestCaseDesc  		To check that a CPKCS10Attribute can be reused with new values.		
   343 //! @SYMPREQ 			CR0973
   344 //! @SYMREQ 			REQ1581.5
   345 //! @SYMTestPriority 		Critical
   346 //! @SYMTestActions 		Create CPKCS10Attribute test object using using valid values.
   347 //!					Use GetEncodingLC to retrieve ASN1 value from this instance.
   348 //!					Use Reset method of CPKCS10Attribute test object with appropriate parameters.
   349 //!					Use GetEncodingLC method again to check that new ASN1 value had been 
   350 //!					updated correctly. 
   351 //!
   352 //! @SYMTestExpectedResults 	Encoding matches in both cases.
   353 //! @SYMTestType 		CIT
   354 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   355 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseAttribute c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0001
   356 END_TESTCASE 			SEC-PKCS10-REU-0001
   357 
   358 START_TESTCASE 			SEC-PKCS10-REU-0002
   359 //! @SYMTestCaseID 		SEC-PKCS10-REU-0002
   360 //! @SYMTestCaseDesc  		To check that a CPKCS10Attribute can be reused with new values.	
   361 //! @SYMPREQ 			CR0973
   362 //! @SYMREQ 			REQ1581.5
   363 //! @SYMTestPriority 		Critical
   364 //! @SYMTestActions     	Create CPKCS10Attribute instance with appropiate values
   365 //!                     	GetEncodingLC from test instance
   366 //!                     	repopulate data using appropiate methods 
   367 //! 				request a new cert request	
   368 //! @SYMTestExpectedResults 	New cert request in created correctly
   369 //! @SYMTestType 		CIT
   370 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   371 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0002
   372 END_TESTCASE 			SEC-PKCS10-REU-0002
   373 
   374 START_TESTCASE 			SEC-PKCS10-REU-0003
   375 //! @SYMTestCaseID 		SEC-PKCS10-REU-0003
   376 //! @SYMTestCaseDesc  		To check that a CPKCS10Attribute can be reused with new values.	
   377 //! @SYMPREQ 			CR0973
   378 //! @SYMREQ 			REQ1581.5
   379 //! @SYMTestPriority 		Critical
   380 //! @SYMTestActions    		Create CPKCS10Attribute instance with appropiate values
   381 //!                     	GetEncodingLC from test instance
   382 //!                     	Do not repopulate data.
   383 //! 				request a new cert request	
   384 //! @SYMTestExpectedResults 	New cert request in created correctly
   385 //! @SYMTestType 		CIT
   386 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   387 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0003
   388 END_TESTCASE 			SEC-PKCS10-REU-0003
   389 
   390 START_TESTCASE 			SEC-PKCS10-REU-0004
   391 //! @SYMTestCaseID 		SEC-PKCS10-REU-0004
   392 //! @SYMTestCaseDesc  		To check that a CPKCS9ChallengePasswordAttr can be reused with new values.
   393 //! @SYMPREQ 			CR0973
   394 //! @SYMREQ 			REQ1581.5
   395 //! @SYMTestPriority 		Critical
   396 //! @SYMTestActions 		Create CPKCS9ChallengePasswordAttr test object using valid value.
   397 //!					Use GetEncodingLC to retrieve ASN1 value from this instance.
   398 //!					Use Reset method of CPKCS9ChallengePasswordAttr test object 
   399 //!					with appropriate parameter.
   400 //!					Use GetEncodingLC method again to check that new ASN1 value 
   401 //!					had been updated correctly. 
   402 //! @SYMTestExpectedResults 	Encoding matches in both cases.
   403 //! @SYMTestType 		CIT
   404 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   405 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseChallengePasswordAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0004
   406 END_TESTCASE 			SEC-PKCS10-REU-0004
   407 
   408 START_TESTCASE 			SEC-PKCS10-REU-0005
   409 //! @SYMTestCaseID 		SEC-PKCS10-REU-0005
   410 //! @SYMTestCaseDesc  		To check that a CPKCS10GenericAttr can be reused with new values.
   411 //! @SYMPREQ 			CR0973
   412 //! @SYMREQ 			REQ1581.5
   413 //! @SYMTestPriority 		Critical
   414 //! @SYMTestActions 		Create CPKCS9ExtensionRequestAttr test object using valid values.
   415 //!					Use GetEncodingLC to retrieve ASN1 value from this instance.
   416 //!					Use ResetL method of CPKCS9ExtensionRequestAttr test object 
   417 //!					with appropriate parameters.
   418 //!					Use GetEncodingLC method again to check that new ASN1 value had 
   419 //!					been updated correctly. 
   420 //! @SYMTestExpectedResults Encoding matches in both cases.
   421 //! @SYMTestType 		CIT
   422 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   423 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseExtensionAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0005
   424 END_TESTCASE 			SEC-PKCS10-REU-0005
   425 
   426 START_TESTCASE 			SEC-PKCS10-NEG-0001
   427 //! @SYMTestCaseID 		SEC-PKCS10-NEG-0001
   428 //! @SYMTestCaseDesc 		Check that CPKCS10GenericAttr class returns a 
   429 //!				KErrBadDescriptor (or KErrArgument) when its methods are used with 
   430 //!				invalid/null value parameters. 
   431 //! @SYMPREQ 			CR0973
   432 //! @SYMREQ 			REQ1581.5
   433 //! @SYMTestPriority 		Critical
   434 //! @SYMTestActions 		PKCS10 CPKCS10GenericAttr construction
   435 //! @SYMTestExpectedResults 	Returns KErrBadDescriptor (or KErrArgument)
   436 //! @SYMTestType 		CIT
   437 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   438 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10GenericAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0001
   439 END_TESTCASE 			SEC-PKCS10-NEG-0001
   440 
   441 START_TESTCASE 			SEC-PKCS10-NEG-0002
   442 //! @SYMTestCaseID 		SEC-PKCS10-NEG-0002
   443 //! @SYMTestCaseDesc 		Check that CPKCS9ChallengePasswordAttr class returns a 
   444 //!				KErrArgument when its methods are used with null value parameters. 
   445 //! @SYMPREQ 			CR0973
   446 //! @SYMREQ 			REQ1581.5
   447 //! @SYMTestPriority 		Critical
   448 //! @SYMTestActions 		PKCS10 CPKCS9ChallengePasswordAttr construction
   449 //! @SYMTestExpectedResults 	Returns KErrArgument
   450 //! @SYMTestType 		CIT
   451 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   452 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS9ChPwdAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0002
   453 END_TESTCASE 			SEC-PKCS10-NEG-0002
   454 
   455 START_TESTCASE 			SEC-PKCS10-NEG-0003
   456 //! @SYMTestCaseID 		SEC-PKCS10-NEG-0003
   457 //! @SYMTestCaseDesc 		Check that CPKCS9ExtensionRequestAttr class can recognise 
   458 //!				when application is trying to add malformed or un-initialised cert 
   459 //!				extension object to extension request.
   460 //! @SYMPREQ 			CR0973
   461 //! @SYMREQ 			REQ1581.5
   462 //! @SYMTestPriority 		Critical
   463 //! @SYMTestActions 		PKCS10 CPKCS9ExtensionRequestAttr construction.
   464 //! @SYMTestExpectedResults 	Returns KErrBadDescriptor
   465 //! @SYMTestType 		CIT
   466 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   467 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS9ExtReqAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0003
   468 END_TESTCASE 			SEC-PKCS10-NEG-0003
   469 
   470 START_TESTCASE 			SEC-PKCS10-NEG-0004
   471 //! @SYMTestCaseID 		SEC-PKCS10-NEG-0004
   472 //! @SYMTestCaseDesc 		Check that CPKCS9ExtensionRequestAttr class returns a 
   473 //!				KErrArgument when its methods are used with null value parameters.
   474 //! @SYMPREQ 			CR0973
   475 //! @SYMREQ 			REQ1581.5
   476 //! @SYMTestPriority 		Critical
   477 //! @SYMTestActions 		PKCS10 CPKCS9ExtensionRequestAttr construction
   478 //! @SYMTestExpectedResults 	Returns KErrArgument
   479 //! @SYMTestType 		CIT
   480 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   481 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10Attributes c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0004
   482 END_TESTCASE 			SEC-PKCS10-NEG-0004
   483 
   484 START_TESTCASE 			SEC-PKCS10-NEG-0005
   485 //! @SYMTestCaseID 		SEC-PKCS10-NEG-0005
   486 //! @SYMTestCaseDesc 		Check that CPKCS10Request class returns a KErrArgument when 
   487 //!				its methods are used with invalid value parameters.
   488 //! @SYMPREQ 			CR0973
   489 //! @SYMREQ 			REQ1581.5
   490 //! @SYMTestPriority 		Critical
   491 //! @SYMTestActions 		PKCS10 CPKCS10Request construction.
   492 //! @SYMTestExpectedResults 	Returns KErrArgument
   493 //! @SYMTestType 		CIT
   494 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   495 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10Request c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0005
   496 END_TESTCASE 			SEC-PKCS10-NEG-0005
   497 
   498 START_TESTCASE 			SEC-PKCS10-DEF103311-0001
   499 //! @SYMTestCaseID 		SEC-PKCS10-DEF103311-0001
   500 //! @SYMTestCaseDesc 		Test case added for defect DEF103311, increases test coverage for PKCS1-
   501 //! @SYMREQ 			REQ0000
   502 //! @SYMTestPriority 		Critical
   503 //! @SYMTestActions 		Creates a CPKCS10Request and then cancels it. 
   504 //! @SYMTestExpectedResults 	Returns KErrNone, no memory leak.
   505 //! @SYMTestType 		CIT
   506 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   507 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CancelRequestA c:\tpkcs10\scripts\tpkcs10_v2.ini DEF103311-0001
   508 END_TESTCASE 			SEC-PKCS10-DEF103311-0001
   509 
   510 //Post- test: re-states key store file
   511 RUN_UTILS CopyFile c:\keys.dat c:\private\101f72a6\keys.dat 
   512 RUN_UTILS DeleteFile c:\keys.dat 
   513 
   514 PRINT Complete_tpkcs10serverv2_Tests