sl@0: // sl@0: // Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies). sl@0: // All rights reserved. sl@0: // This component and the accompanying materials are made available sl@0: // under the terms of the License "Eclipse Public License v1.0" sl@0: // which accompanies this distribution, and is available sl@0: // at the URL "http://www.eclipse.org/legal/epl-v10.html". sl@0: // sl@0: // Initial Contributors: sl@0: // Nokia Corporation - initial contribution. sl@0: // sl@0: // Contributors: sl@0: // sl@0: // Description: sl@0: // sl@0: sl@0: PRINT Run Positive and OOM tests tpkcs1010serverv2 Suite sl@0: sl@0: LOAD_SUITE tpkcs10serverv2 sl@0: sl@0: // pre- test: move out of the way key store file. sl@0: RUN_UTILS CopyFile c:\private\101f72a6\keys.dat c:\keys.dat sl@0: START_TESTCASE SEC-PKCS10-RSA-0001 sl@0: //! @SYMTestCaseID SEC-PKCS10-RSA-0001 sl@0: //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for sl@0: //! certificate requests using the parameters listed below. sl@0: //! Key Algorithm: RSA sl@0: //! Key size: 512 bits sl@0: //! Digest Algorithm: SHA1 sl@0: //! Number of attributes: 0 sl@0: //! @SYMPREQ CR0973 sl@0: //! @SYMREQ REQ1581.5 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions PKCS10 certificate request construction. sl@0: //! @SYMTestExpectedResults Encoding successfully validated sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0001 sl@0: END_TESTCASE SEC-PKCS10-RSA-0001 sl@0: sl@0: START_TESTCASE SEC-PKCS10-RSA-0002 sl@0: //! @SYMTestCaseID SEC-PKCS10-RSA-0002 sl@0: //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for sl@0: //! certificate requests using the parameters listed below. sl@0: //! Key Algorithm: RSA sl@0: //! Key size: 512 bits sl@0: //! Digest Algorithm: MD2 sl@0: //! Number of attributes: 0 sl@0: //! @SYMPREQ CR0973 sl@0: //! @SYMREQ REQ1581.5 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions PKCS10 certificate request construction. sl@0: //! @SYMTestExpectedResults Encoding successfully validated sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0002 sl@0: END_TESTCASE SEC-PKCS10-RSA-0002 sl@0: sl@0: START_TESTCASE SEC-PKCS10-RSA-0003 sl@0: sl@0: //! @SYMTestCaseID SEC-PKCS10-RSA-0003 sl@0: //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for sl@0: //! certificate requests using the parameters listed below. sl@0: //! Key Algorithm: RSA sl@0: //! Key size: 512 bits sl@0: //! Digest Algorithm: MD5 sl@0: //! Number of attributes: 0 sl@0: //! @SYMPREQ CR0973 sl@0: //! @SYMREQ REQ1581.5 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions PKCS10 certificate request construction. sl@0: //! @SYMTestExpectedResults Encoding successfully validated sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0003 sl@0: END_TESTCASE SEC-PKCS10-RSA-0003 sl@0: sl@0: START_TESTCASE SEC-PKCS10-RSA-0004 sl@0: //! @SYMTestCaseID SEC-PKCS10-RSA-0004 sl@0: //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for sl@0: //! certificate requests using the parameters listed below. sl@0: //! Key Algorithm: RSA sl@0: //! Key size: 512 bits sl@0: //! Digest Algorithm: SHA1 sl@0: //! Number of attributes: 1 (challenge password) sl@0: //! @SYMPREQ CR0973 sl@0: //! @SYMREQ REQ1581.5 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions PKCS10 certificate request construction. sl@0: //! @SYMTestExpectedResults Encoding successfully validated sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0004 sl@0: END_TESTCASE SEC-PKCS10-RSA-0004 sl@0: sl@0: START_TESTCASE SEC-PKCS10-RSA-0005 sl@0: //! @SYMTestCaseID SEC-PKCS10-RSA-0005 sl@0: //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for sl@0: //! certificate requests using the parameters listed below. sl@0: //! Key Algorithm: RSA sl@0: //! Key size: 512 bits sl@0: //! Digest Algorithm: SHA1 sl@0: //! Number of attributes: 2 (challenge password and structured name) sl@0: //! @SYMPREQ CR0973 sl@0: //! @SYMREQ REQ1581.5 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions PKCS10 certificate request construction. sl@0: //! @SYMTestExpectedResults Encoding successfully validated sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0005 sl@0: END_TESTCASE SEC-PKCS10-RSA-0005 sl@0: sl@0: START_TESTCASE SEC-PKCS10-RSA-0006 sl@0: //! @SYMTestCaseID SEC-PKCS10-RSA-0006 sl@0: //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for sl@0: //! certificate requests using the parameters listed below. sl@0: //! Key Algorithm: RSA sl@0: //! Key size: 2048 bits sl@0: //! Digest Algorithm: SHA1 sl@0: //! Number of attributes: 2 (challenge password and structured name) sl@0: //! @SYMPREQ CR0973 sl@0: //! @SYMREQ REQ1581.5 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions PKCS10 certificate request construction. sl@0: //! @SYMTestExpectedResults Encoding successfully validated sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0006 sl@0: END_TESTCASE SEC-PKCS10-RSA-0006 sl@0: sl@0: START_TESTCASE SEC-PKCS10-DSA-0001 sl@0: //! @SYMTestCaseID SEC-PKCS10-DSA-0001 sl@0: //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for sl@0: //! certificate requests using the parameters listed below. sl@0: //! Key Algorithm: DSA sl@0: //! Key size: 512 bits sl@0: //! Digest Algorithm: SHA1 sl@0: //! Number of attributes: 0 sl@0: //! @SYMPREQ CR0973 sl@0: //! @SYMREQ REQ1581.5 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions PKCS10 certificate request construction. sl@0: //! @SYMTestExpectedResults Encoding successfully validated sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0001 sl@0: END_TESTCASE SEC-PKCS10-DSA-0001 sl@0: sl@0: START_TESTCASE SEC-PKCS10-DSA-0002 sl@0: //! @SYMTestCaseID SEC-PKCS10-DSA-0002 sl@0: //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for sl@0: //! certificate requests using the parameters listed below. sl@0: //! Key Algorithm: DSA sl@0: //! Key size: 512 bits sl@0: //! Digest Algorithm: SHA1 sl@0: //! Number of attributes: 1 (challenge password) sl@0: //! @SYMPREQ CR0973 sl@0: //! @SYMREQ REQ1581.5 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions PKCS10 certificate request construction. sl@0: //! @SYMTestExpectedResults Encoding successfully validated sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0002 sl@0: END_TESTCASE SEC-PKCS10-DSA-0002 sl@0: sl@0: START_TESTCASE SEC-PKCS10-DSA-0003 sl@0: //! @SYMTestCaseID SEC-PKCS10-DSA-0003 sl@0: //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for sl@0: //! certificate requests using the parameters listed below. sl@0: //! Key Algorithm: DSA sl@0: //! Key size: 512 bits sl@0: //! Digest Algorithm: SHA1 sl@0: //! Number of attributes: 2 (challenge password and structured name) sl@0: //! @SYMPREQ CR0973 sl@0: //! @SYMREQ REQ1581.5 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions PKCS10 certificate request construction. sl@0: //! @SYMTestExpectedResults Encoding successfully validated sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0003 sl@0: END_TESTCASE SEC-PKCS10-DSA-0003 sl@0: sl@0: START_TESTCASE SEC-PKCS10-DSA-0004 sl@0: //! @SYMTestCaseID SEC-PKCS10-DSA-0004 sl@0: //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for sl@0: //! certificate requests using the parameters listed below. sl@0: //! Key Algorithm: DSA sl@0: //! Key size: 2048 bits sl@0: //! Digest Algorithm: SHA1 sl@0: //! Number of attributes: 2 (challenge password and structured name) sl@0: //! @SYMPREQ CR0973 sl@0: //! @SYMREQ REQ1581.5 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions PKCS10 certificate request construction. sl@0: //! @SYMTestExpectedResults Encoding successfully validated sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0004 sl@0: END_TESTCASE SEC-PKCS10-DSA-0004 sl@0: sl@0: START_TESTCASE SEC-PKCS10-EXT-0001 sl@0: //! @SYMTestCaseID SEC-PKCS10-EXT-0001 sl@0: //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for sl@0: //! certificate requests including extension requestsusing the parameters listed below. sl@0: //! Key Algorithm: RSA sl@0: //! Key size: 2048 bits sl@0: //! Digest Algorithm: SHA1 sl@0: //! Number of attributes: 2 (challenge password and structured name) sl@0: //! Extensions used: basic Constraints, sl@0: //! subject Alt Name, sl@0: //! issuer Alt Name, sl@0: //! key Usage, sl@0: //! extended Key Usage, sl@0: //! authority Info Access sl@0: //! @SYMPREQ CR0973 sl@0: //! @SYMREQ REQ1581.5 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions PKCS10 certificate request construction. sl@0: //! @SYMTestExpectedResults Encoding successfully validated sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0001 sl@0: END_TESTCASE SEC-PKCS10-EXT-0001 sl@0: sl@0: START_TESTCASE SEC-PKCS10-EXT-0002 sl@0: //! @SYMTestCaseID SEC-PKCS10-EXT-0002 sl@0: //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for sl@0: //! certificate requests including extension requestsusing the parameters listed below. sl@0: //! Key Algorithm: RSA sl@0: //! Key size: 2048 bits sl@0: //! Digest Algorithm: MD2 sl@0: //! Number of attributes: 2 (challenge password and structured name) sl@0: //! Extensions used: basic Constraints, sl@0: //! subject Alt Name, sl@0: //! issuer Alt Name, sl@0: //! key Usage, sl@0: //! extended Key Usage, sl@0: //! authority Info Access sl@0: //! sl@0: //! @SYMPREQ CR0973 sl@0: //! @SYMREQ REQ1581.5 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions PKCS10 certificate request construction. sl@0: //! @SYMTestExpectedResults Encoding successfully validated sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0002 sl@0: END_TESTCASE SEC-PKCS10-EXT-0002 sl@0: sl@0: START_TESTCASE SEC-PKCS10-EXT-0003 sl@0: //! @SYMTestCaseID SEC-PKCS10-EXT-0003 sl@0: //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for sl@0: //! certificate requests including extension requestsusing the parameters listed below. sl@0: //! Key Algorithm: RSA sl@0: //! Key size: 2048 bits sl@0: //! Digest Algorithm: MD5 sl@0: //! Number of attributes: 2 (challenge password and structured name) sl@0: //! Extensions used: basic Constraints, sl@0: //! subject Alt Name, sl@0: //! issuer Alt Name, sl@0: //! key Usage, sl@0: //! extended Key Usage, sl@0: //! authority Info Access sl@0: //! sl@0: //! @SYMPREQ CR0973 sl@0: //! @SYMREQ REQ1581.5 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions PKCS10 certificate request construction. sl@0: //! @SYMTestExpectedResults Encoding successfully validated sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0003 sl@0: END_TESTCASE SEC-PKCS10-EXT-0003 sl@0: sl@0: START_TESTCASE SEC-PKCS10-EXT-0004 sl@0: //! @SYMTestCaseID SEC-PKCS10-EXT-0004 sl@0: //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for sl@0: //! certificate requests including extension requestsusing the parameters listed below. sl@0: //! Key Algorithm: DSA sl@0: //! Key size: 2048 bits sl@0: //! Digest Algorithm: SHA1 sl@0: //! Number of attributes: 2 (challenge password and structured name) sl@0: //! Extensions used: basic Constraints, sl@0: //! subject Alt Name, sl@0: //! issuer Alt Name, sl@0: //! key Usage, sl@0: //! extended Key Usage, sl@0: //! authority Info Access sl@0: //! sl@0: //! @SYMPREQ CR0973 sl@0: //! @SYMREQ REQ1581.5 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions PKCS10 certificate request construction. sl@0: //! @SYMTestExpectedResults Encoding successfully validated sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0004 sl@0: END_TESTCASE SEC-PKCS10-EXT-0004 sl@0: sl@0: START_TESTCASE SEC-PKCS10-OOM-0001 sl@0: //! @SYMTestCaseID SEC-PKCS10-OOM-0001 sl@0: //! @SYMTestCaseDesc To check that CPKCS10Request class can manage out of memory conditions graciously sl@0: //! Use the following parameters: sl@0: //! Key Algorithm: RSA sl@0: //! Key size: 512 bits sl@0: //! Digest Algorithm: SHA1 sl@0: //! Number of attributes: 2 sl@0: //! sl@0: //! @SYMPREQ CR0973 sl@0: //! @SYMREQ REQ1581.5 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions PKCS10 certificate request construction in OOM conditions. sl@0: //! @SYMTestExpectedResults Encoding successfully validated sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-OOM-0001 sl@0: END_TESTCASE SEC-PKCS10-OOM-0001 sl@0: sl@0: START_TESTCASE SEC-PKCS10-OOM-0002 sl@0: //! @SYMTestCaseID SEC-PKCS10-OOM-0002 sl@0: //! @SYMTestCaseDesc To check that CPKCS10Request class can manage out of memory conditions graciously sl@0: //! Use the following parameters: sl@0: //! Key Algorithm: DSA sl@0: //! Key size: 512 bits sl@0: //! Digest Algorithm: SHA1 sl@0: //! Number of attributes: 2 sl@0: //! @SYMPREQ CR0973 sl@0: //! @SYMREQ REQ1581.5 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions PKCS10 certificate request construction in OOM conditions. sl@0: //! @SYMTestExpectedResults Encoding successfully validated sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-OOM-0002 sl@0: END_TESTCASE SEC-PKCS10-OOM-0002 sl@0: sl@0: START_TESTCASE SEC-PKCS10-REU-0001 sl@0: //! @SYMTestCaseID SEC-PKCS10-REU-0001 sl@0: //! @SYMTestCaseDesc To check that a CPKCS10Attribute can be reused with new values. sl@0: //! @SYMPREQ CR0973 sl@0: //! @SYMREQ REQ1581.5 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions Create CPKCS10Attribute test object using using valid values. sl@0: //! Use GetEncodingLC to retrieve ASN1 value from this instance. sl@0: //! Use Reset method of CPKCS10Attribute test object with appropriate parameters. sl@0: //! Use GetEncodingLC method again to check that new ASN1 value had been sl@0: //! updated correctly. sl@0: //! sl@0: //! @SYMTestExpectedResults Encoding matches in both cases. sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseAttribute c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0001 sl@0: END_TESTCASE SEC-PKCS10-REU-0001 sl@0: sl@0: START_TESTCASE SEC-PKCS10-REU-0002 sl@0: //! @SYMTestCaseID SEC-PKCS10-REU-0002 sl@0: //! @SYMTestCaseDesc To check that a CPKCS10Attribute can be reused with new values. sl@0: //! @SYMPREQ CR0973 sl@0: //! @SYMREQ REQ1581.5 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions Create CPKCS10Attribute instance with appropiate values sl@0: //! GetEncodingLC from test instance sl@0: //! repopulate data using appropiate methods sl@0: //! request a new cert request sl@0: //! @SYMTestExpectedResults New cert request in created correctly sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0002 sl@0: END_TESTCASE SEC-PKCS10-REU-0002 sl@0: sl@0: START_TESTCASE SEC-PKCS10-REU-0003 sl@0: //! @SYMTestCaseID SEC-PKCS10-REU-0003 sl@0: //! @SYMTestCaseDesc To check that a CPKCS10Attribute can be reused with new values. sl@0: //! @SYMPREQ CR0973 sl@0: //! @SYMREQ REQ1581.5 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions Create CPKCS10Attribute instance with appropiate values sl@0: //! GetEncodingLC from test instance sl@0: //! Do not repopulate data. sl@0: //! request a new cert request sl@0: //! @SYMTestExpectedResults New cert request in created correctly sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0003 sl@0: END_TESTCASE SEC-PKCS10-REU-0003 sl@0: sl@0: START_TESTCASE SEC-PKCS10-REU-0004 sl@0: //! @SYMTestCaseID SEC-PKCS10-REU-0004 sl@0: //! @SYMTestCaseDesc To check that a CPKCS9ChallengePasswordAttr can be reused with new values. sl@0: //! @SYMPREQ CR0973 sl@0: //! @SYMREQ REQ1581.5 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions Create CPKCS9ChallengePasswordAttr test object using valid value. sl@0: //! Use GetEncodingLC to retrieve ASN1 value from this instance. sl@0: //! Use Reset method of CPKCS9ChallengePasswordAttr test object sl@0: //! with appropriate parameter. sl@0: //! Use GetEncodingLC method again to check that new ASN1 value sl@0: //! had been updated correctly. sl@0: //! @SYMTestExpectedResults Encoding matches in both cases. sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseChallengePasswordAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0004 sl@0: END_TESTCASE SEC-PKCS10-REU-0004 sl@0: sl@0: START_TESTCASE SEC-PKCS10-REU-0005 sl@0: //! @SYMTestCaseID SEC-PKCS10-REU-0005 sl@0: //! @SYMTestCaseDesc To check that a CPKCS10GenericAttr can be reused with new values. sl@0: //! @SYMPREQ CR0973 sl@0: //! @SYMREQ REQ1581.5 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions Create CPKCS9ExtensionRequestAttr test object using valid values. sl@0: //! Use GetEncodingLC to retrieve ASN1 value from this instance. sl@0: //! Use ResetL method of CPKCS9ExtensionRequestAttr test object sl@0: //! with appropriate parameters. sl@0: //! Use GetEncodingLC method again to check that new ASN1 value had sl@0: //! been updated correctly. sl@0: //! @SYMTestExpectedResults Encoding matches in both cases. sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseExtensionAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0005 sl@0: END_TESTCASE SEC-PKCS10-REU-0005 sl@0: sl@0: START_TESTCASE SEC-PKCS10-NEG-0001 sl@0: //! @SYMTestCaseID SEC-PKCS10-NEG-0001 sl@0: //! @SYMTestCaseDesc Check that CPKCS10GenericAttr class returns a sl@0: //! KErrBadDescriptor (or KErrArgument) when its methods are used with sl@0: //! invalid/null value parameters. sl@0: //! @SYMPREQ CR0973 sl@0: //! @SYMREQ REQ1581.5 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions PKCS10 CPKCS10GenericAttr construction sl@0: //! @SYMTestExpectedResults Returns KErrBadDescriptor (or KErrArgument) sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10GenericAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0001 sl@0: END_TESTCASE SEC-PKCS10-NEG-0001 sl@0: sl@0: START_TESTCASE SEC-PKCS10-NEG-0002 sl@0: //! @SYMTestCaseID SEC-PKCS10-NEG-0002 sl@0: //! @SYMTestCaseDesc Check that CPKCS9ChallengePasswordAttr class returns a sl@0: //! KErrArgument when its methods are used with null value parameters. sl@0: //! @SYMPREQ CR0973 sl@0: //! @SYMREQ REQ1581.5 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions PKCS10 CPKCS9ChallengePasswordAttr construction sl@0: //! @SYMTestExpectedResults Returns KErrArgument sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS9ChPwdAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0002 sl@0: END_TESTCASE SEC-PKCS10-NEG-0002 sl@0: sl@0: START_TESTCASE SEC-PKCS10-NEG-0003 sl@0: //! @SYMTestCaseID SEC-PKCS10-NEG-0003 sl@0: //! @SYMTestCaseDesc Check that CPKCS9ExtensionRequestAttr class can recognise sl@0: //! when application is trying to add malformed or un-initialised cert sl@0: //! extension object to extension request. sl@0: //! @SYMPREQ CR0973 sl@0: //! @SYMREQ REQ1581.5 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions PKCS10 CPKCS9ExtensionRequestAttr construction. sl@0: //! @SYMTestExpectedResults Returns KErrBadDescriptor sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS9ExtReqAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0003 sl@0: END_TESTCASE SEC-PKCS10-NEG-0003 sl@0: sl@0: START_TESTCASE SEC-PKCS10-NEG-0004 sl@0: //! @SYMTestCaseID SEC-PKCS10-NEG-0004 sl@0: //! @SYMTestCaseDesc Check that CPKCS9ExtensionRequestAttr class returns a sl@0: //! KErrArgument when its methods are used with null value parameters. sl@0: //! @SYMPREQ CR0973 sl@0: //! @SYMREQ REQ1581.5 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions PKCS10 CPKCS9ExtensionRequestAttr construction sl@0: //! @SYMTestExpectedResults Returns KErrArgument sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10Attributes c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0004 sl@0: END_TESTCASE SEC-PKCS10-NEG-0004 sl@0: sl@0: START_TESTCASE SEC-PKCS10-NEG-0005 sl@0: //! @SYMTestCaseID SEC-PKCS10-NEG-0005 sl@0: //! @SYMTestCaseDesc Check that CPKCS10Request class returns a KErrArgument when sl@0: //! its methods are used with invalid value parameters. sl@0: //! @SYMPREQ CR0973 sl@0: //! @SYMREQ REQ1581.5 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions PKCS10 CPKCS10Request construction. sl@0: //! @SYMTestExpectedResults Returns KErrArgument sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10Request c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0005 sl@0: END_TESTCASE SEC-PKCS10-NEG-0005 sl@0: sl@0: START_TESTCASE SEC-PKCS10-DEF103311-0001 sl@0: //! @SYMTestCaseID SEC-PKCS10-DEF103311-0001 sl@0: //! @SYMTestCaseDesc Test case added for defect DEF103311, increases test coverage for PKCS1- sl@0: //! @SYMREQ REQ0000 sl@0: //! @SYMTestPriority Critical sl@0: //! @SYMTestActions Creates a CPKCS10Request and then cancels it. sl@0: //! @SYMTestExpectedResults Returns KErrNone, no memory leak. sl@0: //! @SYMTestType CIT sl@0: RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat sl@0: RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CancelRequestA c:\tpkcs10\scripts\tpkcs10_v2.ini DEF103311-0001 sl@0: END_TESTCASE SEC-PKCS10-DEF103311-0001 sl@0: sl@0: //Post- test: re-states key store file sl@0: RUN_UTILS CopyFile c:\keys.dat c:\private\101f72a6\keys.dat sl@0: RUN_UTILS DeleteFile c:\keys.dat sl@0: sl@0: PRINT Complete_tpkcs10serverv2_Tests