diff -r 675a964f4eb5 -r 35751d3474b7 cryptoservices/certificateandkeymgmt/tpkcs10/scripts/tpkcs10_v2.script --- a/cryptoservices/certificateandkeymgmt/tpkcs10/scripts/tpkcs10_v2.script Tue Jul 21 01:04:32 2009 +0100 +++ b/cryptoservices/certificateandkeymgmt/tpkcs10/scripts/tpkcs10_v2.script Thu Sep 10 14:01:51 2009 +0300 @@ -1,520 +1,529 @@ -// -// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies). -// All rights reserved. -// This component and the accompanying materials are made available -// under the terms of the License "Eclipse Public License v1.0" -// which accompanies this distribution, and is available -// at the URL "http://www.eclipse.org/legal/epl-v10.html". -// -// Initial Contributors: -// Nokia Corporation - initial contribution. -// -// Contributors: -// -// Description: -// -// -PRINT Run Positive and OOM tests tpkcs1010serverv2 Suite - -LOAD_SUITE tpkcs10serverv2 - -// pre- test: move out of the way key store file. -RUN_UTILS CopyFile c:\private\101f72a6\keys.dat c:\keys.dat - -//! @SYMTestCaseID SEC-PKCS10-RSA-0001 -//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for -//! certificate requests using the parameters listed below. -//! Key Algorithm: RSA -//! Key size: 512 bits -//! Digest Algorithm: SHA1 -//! Number of attributes: 0 -//! -//! @SYMPREQ CR0973 -//! @SYMREQ REQ1581.5 -//! @SYMTestPriority Critical -//! @SYMTestActions PKCS10 certificate request construction. -//! @SYMTestExpectedResults Encoding successfully validated -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0001 - - -//! @SYMTestCaseID SEC-PKCS10-RSA-0002 -//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for -//! certificate requests using the parameters listed below. -//! Key Algorithm: RSA -//! Key size: 512 bits -//! Digest Algorithm: MD2 -//! Number of attributes: 0 -//! -//! @SYMPREQ CR0973 -//! @SYMREQ REQ1581.5 -//! @SYMTestPriority Critical -//! @SYMTestActions PKCS10 certificate request construction. -//! @SYMTestExpectedResults Encoding successfully validated -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0002 - - -//! @SYMTestCaseID SEC-PKCS10-RSA-0003 -//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for -//! certificate requests using the parameters listed below. -//! Key Algorithm: RSA -//! Key size: 512 bits -//! Digest Algorithm: MD5 -//! Number of attributes: 0 -//! -//! @SYMPREQ CR0973 -//! @SYMREQ REQ1581.5 -//! @SYMTestPriority Critical -//! @SYMTestActions PKCS10 certificate request construction. -//! @SYMTestExpectedResults Encoding successfully validated -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0003 - - -//! @SYMTestCaseID SEC-PKCS10-RSA-0004 -//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for -//! certificate requests using the parameters listed below. -//! Key Algorithm: RSA -//! Key size: 512 bits -//! Digest Algorithm: SHA1 -//! Number of attributes: 1 (challenge password) -//! -//! @SYMPREQ CR0973 -//! @SYMREQ REQ1581.5 -//! @SYMTestPriority Critical -//! @SYMTestActions PKCS10 certificate request construction. -//! @SYMTestExpectedResults Encoding successfully validated -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0004 - - -//! @SYMTestCaseID SEC-PKCS10-RSA-0005 -//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for -//! certificate requests using the parameters listed below. -//! Key Algorithm: RSA -//! Key size: 512 bits -//! Digest Algorithm: SHA1 -//! Number of attributes: 2 (challenge password and structured name) -//! -//! @SYMPREQ CR0973 -//! @SYMREQ REQ1581.5 -//! @SYMTestPriority Critical -//! @SYMTestActions PKCS10 certificate request construction. -//! @SYMTestExpectedResults Encoding successfully validated -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0005 - - - -//! @SYMTestCaseID SEC-PKCS10-RSA-0006 -//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for -//! certificate requests using the parameters listed below. -//! Key Algorithm: RSA -//! Key size: 2048 bits -//! Digest Algorithm: SHA1 -//! Number of attributes: 2 (challenge password and structured name) -//! -//! @SYMPREQ CR0973 -//! @SYMREQ REQ1581.5 -//! @SYMTestPriority Critical -//! @SYMTestActions PKCS10 certificate request construction. -//! @SYMTestExpectedResults Encoding successfully validated -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0006 - - -//! @SYMTestCaseID SEC-PKCS10-DSA-0001 -//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for -//! certificate requests using the parameters listed below. -//! Key Algorithm: DSA -//! Key size: 512 bits -//! Digest Algorithm: SHA1 -//! Number of attributes: 0 -//! -//! @SYMPREQ CR0973 -//! @SYMREQ REQ1581.5 -//! @SYMTestPriority Critical -//! @SYMTestActions PKCS10 certificate request construction. -//! @SYMTestExpectedResults Encoding successfully validated -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0001 - - -//! @SYMTestCaseID SEC-PKCS10-DSA-0002 -//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for -//! certificate requests using the parameters listed below. -//! Key Algorithm: DSA -//! Key size: 512 bits -//! Digest Algorithm: SHA1 -//! Number of attributes: 1 (challenge password) -//! -//! @SYMPREQ CR0973 -//! @SYMREQ REQ1581.5 -//! @SYMTestPriority Critical -//! @SYMTestActions PKCS10 certificate request construction. -//! @SYMTestExpectedResults Encoding successfully validated -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0002 - -//! @SYMTestCaseID SEC-PKCS10-DSA-0003 -//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for -//! certificate requests using the parameters listed below. -//! Key Algorithm: DSA -//! Key size: 512 bits -//! Digest Algorithm: SHA1 -//! Number of attributes: 2 (challenge password and structured name) -//! -//! @SYMPREQ CR0973 -//! @SYMREQ REQ1581.5 -//! @SYMTestPriority Critical -//! @SYMTestActions PKCS10 certificate request construction. -//! @SYMTestExpectedResults Encoding successfully validated -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0003 - -//! @SYMTestCaseID SEC-PKCS10-DSA-0004 -//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for -//! certificate requests using the parameters listed below. -//! Key Algorithm: DSA -//! Key size: 2048 bits -//! Digest Algorithm: SHA1 -//! Number of attributes: 2 (challenge password and structured name) -//! -//! @SYMPREQ CR0973 -//! @SYMREQ REQ1581.5 -//! @SYMTestPriority Critical -//! @SYMTestActions PKCS10 certificate request construction. -//! @SYMTestExpectedResults Encoding successfully validated -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0004 - - -//! @SYMTestCaseID SEC-PKCS10-EXT-0001 -//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for -//! certificate requests including extension requestsusing the parameters listed below. -//! Key Algorithm: RSA -//! Key size: 2048 bits -//! Digest Algorithm: SHA1 -//! Number of attributes: 2 (challenge password and structured name) -//! Extensions used: basic Constraints, -//! subject Alt Name, -//! issuer Alt Name, -//! key Usage, -//! extended Key Usage, -//! authority Info Access -//! -//! @SYMPREQ CR0973 -//! @SYMREQ REQ1581.5 -//! @SYMTestPriority Critical -//! @SYMTestActions PKCS10 certificate request construction. -//! @SYMTestExpectedResults Encoding successfully validated -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0001 - -//! @SYMTestCaseID SEC-PKCS10-EXT-0002 -//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for -//! certificate requests including extension requestsusing the parameters listed below. -//! Key Algorithm: RSA -//! Key size: 2048 bits -//! Digest Algorithm: MD2 -//! Number of attributes: 2 (challenge password and structured name) -//! Extensions used: basic Constraints, -//! subject Alt Name, -//! issuer Alt Name, -//! key Usage, -//! extended Key Usage, -//! authority Info Access -//! -//! @SYMPREQ CR0973 -//! @SYMREQ REQ1581.5 -//! @SYMTestPriority Critical -//! @SYMTestActions PKCS10 certificate request construction. -//! @SYMTestExpectedResults Encoding successfully validated -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0002 - -//! @SYMTestCaseID SEC-PKCS10-EXT-0003 -//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for -//! certificate requests including extension requestsusing the parameters listed below. -//! Key Algorithm: RSA -//! Key size: 2048 bits -//! Digest Algorithm: MD5 -//! Number of attributes: 2 (challenge password and structured name) -//! Extensions used: basic Constraints, -//! subject Alt Name, -//! issuer Alt Name, -//! key Usage, -//! extended Key Usage, -//! authority Info Access -//! -//! @SYMPREQ CR0973 -//! @SYMREQ REQ1581.5 -//! @SYMTestPriority Critical -//! @SYMTestActions PKCS10 certificate request construction. -//! @SYMTestExpectedResults Encoding successfully validated -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0003 - -//! @SYMTestCaseID SEC-PKCS10-EXT-0004 -//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for -//! certificate requests including extension requestsusing the parameters listed below. -//! Key Algorithm: DSA -//! Key size: 2048 bits -//! Digest Algorithm: SHA1 -//! Number of attributes: 2 (challenge password and structured name) -//! Extensions used: basic Constraints, -//! subject Alt Name, -//! issuer Alt Name, -//! key Usage, -//! extended Key Usage, -//! authority Info Access -//! -//! @SYMPREQ CR0973 -//! @SYMREQ REQ1581.5 -//! @SYMTestPriority Critical -//! @SYMTestActions PKCS10 certificate request construction. -//! @SYMTestExpectedResults Encoding successfully validated -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0004 - - -//! @SYMTestCaseID SEC-PKCS10-OOM-0001 -//! @SYMTestCaseDesc To check that CPKCS10Request class can manage out of memory conditions graciously -//! Use the following parameters: -//! Key Algorithm: RSA -//! Key size: 512 bits -//! Digest Algorithm: SHA1 -//! Number of attributes: 2 -//! -//! @SYMPREQ CR0973 -//! @SYMREQ REQ1581.5 -//! @SYMTestPriority Critical -//! @SYMTestActions PKCS10 certificate request construction in OOM conditions. -//! @SYMTestExpectedResults Encoding successfully validated -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-OOM-0001 - -//! @SYMTestCaseID SEC-PKCS10-OOM-0002 -//! @SYMTestCaseDesc To check that CPKCS10Request class can manage out of memory conditions graciously -//! Use the following parameters: -//! Key Algorithm: DSA -//! Key size: 512 bits -//! Digest Algorithm: SHA1 -//! Number of attributes: 2 -//! -//! @SYMPREQ CR0973 -//! @SYMREQ REQ1581.5 -//! @SYMTestPriority Critical -//! @SYMTestActions PKCS10 certificate request construction in OOM conditions. -//! @SYMTestExpectedResults Encoding successfully validated -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-OOM-0002 - -//! @SYMTestCaseID SEC-PKCS10-REU-0001 -//! @SYMTestCaseDesc To check that a CPKCS10Attribute can be reused with new values. -//! -//! @SYMPREQ CR0973 -//! @SYMREQ REQ1581.5 -//! @SYMTestPriority Critical -//! @SYMTestActions Create CPKCS10Attribute test object using using valid values. -//! Use GetEncodingLC to retrieve ASN1 value from this instance. -//! Use Reset method of CPKCS10Attribute test object with appropriate parameters. -//! Use GetEncodingLC method again to check that new ASN1 value had been -//! updated correctly. -//! -//! @SYMTestExpectedResults Encoding matches in both cases. -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseAttribute c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0001 - -//! @SYMTestCaseID SEC-PKCS10-REU-0002 -//! @SYMTestCaseDesc To check that a CPKCS10Attribute can be reused with new values. -//! -//! @SYMPREQ CR0973 -//! @SYMREQ REQ1581.5 -//! @SYMTestPriority Critical -//! @SYMTestActions Create CPKCS10Attribute instance with appropiate values -//! GetEncodingLC from test instance -//! repopulate data using appropiate methods -//! request a new cert request -//! @SYMTestExpectedResults New cert request in created correctly -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0002 - -//! @SYMTestCaseID SEC-PKCS10-REU-0003 -//! @SYMTestCaseDesc To check that a CPKCS10Attribute can be reused with new values. -//! -//! @SYMPREQ CR0973 -//! @SYMREQ REQ1581.5 -//! @SYMTestPriority Critical -//! @SYMTestActions Create CPKCS10Attribute instance with appropiate values -//! GetEncodingLC from test instance -//! Do not repopulate data. -//! request a new cert request -//! @SYMTestExpectedResults New cert request in created correctly -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0003 - -//! @SYMTestCaseID SEC-PKCS10-REU-0004 -//! @SYMTestCaseDesc To check that a CPKCS9ChallengePasswordAttr can be reused with new values. -//! -//! @SYMPREQ CR0973 -//! @SYMREQ REQ1581.5 -//! @SYMTestPriority Critical -//! @SYMTestActions Create CPKCS9ChallengePasswordAttr test object using valid value. -//! Use GetEncodingLC to retrieve ASN1 value from this instance. -//! Use Reset method of CPKCS9ChallengePasswordAttr test object -//! with appropriate parameter. -//! Use GetEncodingLC method again to check that new ASN1 value -//! had been updated correctly. -//! @SYMTestExpectedResults Encoding matches in both cases. -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseChallengePasswordAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0004 - -//! @SYMTestCaseID SEC-PKCS10-REU-0005 -//! @SYMTestCaseDesc To check that a CPKCS10GenericAttr can be reused with new values. -//! -//! @SYMPREQ CR0973 -//! @SYMREQ REQ1581.5 -//! @SYMTestPriority Critical -//! @SYMTestActions Create CPKCS9ExtensionRequestAttr test object using valid values. -//! Use GetEncodingLC to retrieve ASN1 value from this instance. -//! Use ResetL method of CPKCS9ExtensionRequestAttr test object -//! with appropriate parameters. -//! Use GetEncodingLC method again to check that new ASN1 value had -//! been updated correctly. -//! @SYMTestExpectedResults Encoding matches in both cases. -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseExtensionAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0005 - -//! @SYMTestCaseID SEC-PKCS10-NEG-0001 -//! @SYMTestCaseDesc Check that CPKCS10GenericAttr class returns a -//! KErrBadDescriptor (or KErrArgument) when its methods are used with -//! invalid/null value parameters. -//! -//! @SYMPREQ CR0973 -//! @SYMREQ REQ1581.5 -//! @SYMTestPriority Critical -//! @SYMTestActions PKCS10 CPKCS10GenericAttr construction -//! @SYMTestExpectedResults Returns KErrBadDescriptor (or KErrArgument) -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10GenericAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0001 - -//! @SYMTestCaseID SEC-PKCS10-NEG-0002 -//! @SYMTestCaseDesc Check that CPKCS9ChallengePasswordAttr class returns a -//! KErrArgument when its methods are used with null value parameters. -//! -//! @SYMPREQ CR0973 -//! @SYMREQ REQ1581.5 -//! @SYMTestPriority Critical -//! @SYMTestActions PKCS10 CPKCS9ChallengePasswordAttr construction -//! @SYMTestExpectedResults Returns KErrArgument -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS9ChPwdAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0002 - -//! @SYMTestCaseID SEC-PKCS10-NEG-0003 -//! @SYMTestCaseDesc Check that CPKCS9ExtensionRequestAttr class can recognise -//! when application is trying to add malformed or un-initialised cert -//! extension object to extension request. -//! -//! @SYMPREQ CR0973 -//! @SYMREQ REQ1581.5 -//! @SYMTestPriority Critical -//! @SYMTestActions PKCS10 CPKCS9ExtensionRequestAttr construction. -//! @SYMTestExpectedResults Returns KErrBadDescriptor -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS9ExtReqAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0003 - -//! @SYMTestCaseID SEC-PKCS10-NEG-0004 -//! @SYMTestCaseDesc Check that CPKCS9ExtensionRequestAttr class returns a -//! KErrArgument when its methods are used with null value parameters. -//! -//! @SYMPREQ CR0973 -//! @SYMREQ REQ1581.5 -//! @SYMTestPriority Critical -//! @SYMTestActions PKCS10 CPKCS9ExtensionRequestAttr construction -//! @SYMTestExpectedResults Returns KErrArgument -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10Attributes c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0004 - -//! @SYMTestCaseID SEC-PKCS10-NEG-0005 -//! @SYMTestCaseDesc Check that CPKCS10Request class returns a KErrArgument when -//! its methods are used with invalid value parameters. -//! -//! @SYMPREQ CR0973 -//! @SYMREQ REQ1581.5 -//! @SYMTestPriority Critical -//! @SYMTestActions PKCS10 CPKCS10Request construction. -//! @SYMTestExpectedResults Returns KErrArgument -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10Request c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0005 - -//! @SYMTestCaseID SEC-PKCS10-DEF103311-0001 -//! @SYMTestCaseDesc Test case added for defect DEF103311, increases test coverage for PKCS1- -//! -//! @SYMREQ REQ0000 -//! @SYMTestPriority Critical -//! @SYMTestActions Creates a CPKCS10Request and then cancels it. -//! @SYMTestExpectedResults Returns KErrNone, no memory leak. -//! @SYMTestType CIT -// -RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat -RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CancelRequestA c:\tpkcs10\scripts\tpkcs10_v2.ini DEF103311-0001 - -//Post- test: re-states key store file -RUN_UTILS CopyFile c:\keys.dat c:\private\101f72a6\keys.dat -RUN_UTILS DeleteFile c:\keys.dat - -PRINT Complete_tpkcs10serverv2_Tests +// +// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies). +// All rights reserved. +// This component and the accompanying materials are made available +// under the terms of the License "Eclipse Public License v1.0" +// which accompanies this distribution, and is available +// at the URL "http://www.eclipse.org/legal/epl-v10.html". +// +// Initial Contributors: +// Nokia Corporation - initial contribution. +// +// Contributors: +// +// Description: +// +// +// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies). +// All rights reserved. +// This component and the accompanying materials are made available +// under the terms of the License "Symbian Foundation License v1.0" +// which accompanies this distribution, and is available +// at the URL "http://www.symbianfoundation.org/legal/sfl-v10.html". +// +// Initial Contributors: +// Nokia Corporation - initial contribution. +// +// Contributors: +// +// Description: +// +// +PRINT Run Positive and OOM tests tpkcs1010serverv2 Suite + +LOAD_SUITE tpkcs10serverv2 + +// pre- test: move out of the way key store file. +RUN_UTILS CopyFile c:\private\101f72a6\keys.dat c:\keys.dat +START_TESTCASE SEC-PKCS10-RSA-0001 +//! @SYMTestCaseID SEC-PKCS10-RSA-0001 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for +//! certificate requests using the parameters listed below. +//! Key Algorithm: RSA +//! Key size: 512 bits +//! Digest Algorithm: SHA1 +//! Number of attributes: 0 +//! @SYMPREQ CR0973 +//! @SYMREQ REQ1581.5 +//! @SYMTestPriority Critical +//! @SYMTestActions PKCS10 certificate request construction. +//! @SYMTestExpectedResults Encoding successfully validated +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0001 +END_TESTCASE SEC-PKCS10-RSA-0001 + +START_TESTCASE SEC-PKCS10-RSA-0002 +//! @SYMTestCaseID SEC-PKCS10-RSA-0002 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for +//! certificate requests using the parameters listed below. +//! Key Algorithm: RSA +//! Key size: 512 bits +//! Digest Algorithm: MD2 +//! Number of attributes: 0 +//! @SYMPREQ CR0973 +//! @SYMREQ REQ1581.5 +//! @SYMTestPriority Critical +//! @SYMTestActions PKCS10 certificate request construction. +//! @SYMTestExpectedResults Encoding successfully validated +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0002 +END_TESTCASE SEC-PKCS10-RSA-0002 + +START_TESTCASE SEC-PKCS10-RSA-0003 + +//! @SYMTestCaseID SEC-PKCS10-RSA-0003 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for +//! certificate requests using the parameters listed below. +//! Key Algorithm: RSA +//! Key size: 512 bits +//! Digest Algorithm: MD5 +//! Number of attributes: 0 +//! @SYMPREQ CR0973 +//! @SYMREQ REQ1581.5 +//! @SYMTestPriority Critical +//! @SYMTestActions PKCS10 certificate request construction. +//! @SYMTestExpectedResults Encoding successfully validated +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0003 +END_TESTCASE SEC-PKCS10-RSA-0003 + +START_TESTCASE SEC-PKCS10-RSA-0004 +//! @SYMTestCaseID SEC-PKCS10-RSA-0004 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for +//! certificate requests using the parameters listed below. +//! Key Algorithm: RSA +//! Key size: 512 bits +//! Digest Algorithm: SHA1 +//! Number of attributes: 1 (challenge password) +//! @SYMPREQ CR0973 +//! @SYMREQ REQ1581.5 +//! @SYMTestPriority Critical +//! @SYMTestActions PKCS10 certificate request construction. +//! @SYMTestExpectedResults Encoding successfully validated +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0004 +END_TESTCASE SEC-PKCS10-RSA-0004 + +START_TESTCASE SEC-PKCS10-RSA-0005 +//! @SYMTestCaseID SEC-PKCS10-RSA-0005 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for +//! certificate requests using the parameters listed below. +//! Key Algorithm: RSA +//! Key size: 512 bits +//! Digest Algorithm: SHA1 +//! Number of attributes: 2 (challenge password and structured name) +//! @SYMPREQ CR0973 +//! @SYMREQ REQ1581.5 +//! @SYMTestPriority Critical +//! @SYMTestActions PKCS10 certificate request construction. +//! @SYMTestExpectedResults Encoding successfully validated +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0005 +END_TESTCASE SEC-PKCS10-RSA-0005 + +START_TESTCASE SEC-PKCS10-RSA-0006 +//! @SYMTestCaseID SEC-PKCS10-RSA-0006 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for +//! certificate requests using the parameters listed below. +//! Key Algorithm: RSA +//! Key size: 2048 bits +//! Digest Algorithm: SHA1 +//! Number of attributes: 2 (challenge password and structured name) +//! @SYMPREQ CR0973 +//! @SYMREQ REQ1581.5 +//! @SYMTestPriority Critical +//! @SYMTestActions PKCS10 certificate request construction. +//! @SYMTestExpectedResults Encoding successfully validated +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0006 +END_TESTCASE SEC-PKCS10-RSA-0006 + +START_TESTCASE SEC-PKCS10-DSA-0001 +//! @SYMTestCaseID SEC-PKCS10-DSA-0001 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for +//! certificate requests using the parameters listed below. +//! Key Algorithm: DSA +//! Key size: 512 bits +//! Digest Algorithm: SHA1 +//! Number of attributes: 0 +//! @SYMPREQ CR0973 +//! @SYMREQ REQ1581.5 +//! @SYMTestPriority Critical +//! @SYMTestActions PKCS10 certificate request construction. +//! @SYMTestExpectedResults Encoding successfully validated +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0001 +END_TESTCASE SEC-PKCS10-DSA-0001 + +START_TESTCASE SEC-PKCS10-DSA-0002 +//! @SYMTestCaseID SEC-PKCS10-DSA-0002 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for +//! certificate requests using the parameters listed below. +//! Key Algorithm: DSA +//! Key size: 512 bits +//! Digest Algorithm: SHA1 +//! Number of attributes: 1 (challenge password) +//! @SYMPREQ CR0973 +//! @SYMREQ REQ1581.5 +//! @SYMTestPriority Critical +//! @SYMTestActions PKCS10 certificate request construction. +//! @SYMTestExpectedResults Encoding successfully validated +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0002 +END_TESTCASE SEC-PKCS10-DSA-0002 + +START_TESTCASE SEC-PKCS10-DSA-0003 +//! @SYMTestCaseID SEC-PKCS10-DSA-0003 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for +//! certificate requests using the parameters listed below. +//! Key Algorithm: DSA +//! Key size: 512 bits +//! Digest Algorithm: SHA1 +//! Number of attributes: 2 (challenge password and structured name) +//! @SYMPREQ CR0973 +//! @SYMREQ REQ1581.5 +//! @SYMTestPriority Critical +//! @SYMTestActions PKCS10 certificate request construction. +//! @SYMTestExpectedResults Encoding successfully validated +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0003 +END_TESTCASE SEC-PKCS10-DSA-0003 + +START_TESTCASE SEC-PKCS10-DSA-0004 +//! @SYMTestCaseID SEC-PKCS10-DSA-0004 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for +//! certificate requests using the parameters listed below. +//! Key Algorithm: DSA +//! Key size: 2048 bits +//! Digest Algorithm: SHA1 +//! Number of attributes: 2 (challenge password and structured name) +//! @SYMPREQ CR0973 +//! @SYMREQ REQ1581.5 +//! @SYMTestPriority Critical +//! @SYMTestActions PKCS10 certificate request construction. +//! @SYMTestExpectedResults Encoding successfully validated +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0004 +END_TESTCASE SEC-PKCS10-DSA-0004 + +START_TESTCASE SEC-PKCS10-EXT-0001 +//! @SYMTestCaseID SEC-PKCS10-EXT-0001 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for +//! certificate requests including extension requestsusing the parameters listed below. +//! Key Algorithm: RSA +//! Key size: 2048 bits +//! Digest Algorithm: SHA1 +//! Number of attributes: 2 (challenge password and structured name) +//! Extensions used: basic Constraints, +//! subject Alt Name, +//! issuer Alt Name, +//! key Usage, +//! extended Key Usage, +//! authority Info Access +//! @SYMPREQ CR0973 +//! @SYMREQ REQ1581.5 +//! @SYMTestPriority Critical +//! @SYMTestActions PKCS10 certificate request construction. +//! @SYMTestExpectedResults Encoding successfully validated +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0001 +END_TESTCASE SEC-PKCS10-EXT-0001 + +START_TESTCASE SEC-PKCS10-EXT-0002 +//! @SYMTestCaseID SEC-PKCS10-EXT-0002 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for +//! certificate requests including extension requestsusing the parameters listed below. +//! Key Algorithm: RSA +//! Key size: 2048 bits +//! Digest Algorithm: MD2 +//! Number of attributes: 2 (challenge password and structured name) +//! Extensions used: basic Constraints, +//! subject Alt Name, +//! issuer Alt Name, +//! key Usage, +//! extended Key Usage, +//! authority Info Access +//! +//! @SYMPREQ CR0973 +//! @SYMREQ REQ1581.5 +//! @SYMTestPriority Critical +//! @SYMTestActions PKCS10 certificate request construction. +//! @SYMTestExpectedResults Encoding successfully validated +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0002 +END_TESTCASE SEC-PKCS10-EXT-0002 + +START_TESTCASE SEC-PKCS10-EXT-0003 +//! @SYMTestCaseID SEC-PKCS10-EXT-0003 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for +//! certificate requests including extension requestsusing the parameters listed below. +//! Key Algorithm: RSA +//! Key size: 2048 bits +//! Digest Algorithm: MD5 +//! Number of attributes: 2 (challenge password and structured name) +//! Extensions used: basic Constraints, +//! subject Alt Name, +//! issuer Alt Name, +//! key Usage, +//! extended Key Usage, +//! authority Info Access +//! +//! @SYMPREQ CR0973 +//! @SYMREQ REQ1581.5 +//! @SYMTestPriority Critical +//! @SYMTestActions PKCS10 certificate request construction. +//! @SYMTestExpectedResults Encoding successfully validated +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0003 +END_TESTCASE SEC-PKCS10-EXT-0003 + +START_TESTCASE SEC-PKCS10-EXT-0004 +//! @SYMTestCaseID SEC-PKCS10-EXT-0004 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for +//! certificate requests including extension requestsusing the parameters listed below. +//! Key Algorithm: DSA +//! Key size: 2048 bits +//! Digest Algorithm: SHA1 +//! Number of attributes: 2 (challenge password and structured name) +//! Extensions used: basic Constraints, +//! subject Alt Name, +//! issuer Alt Name, +//! key Usage, +//! extended Key Usage, +//! authority Info Access +//! +//! @SYMPREQ CR0973 +//! @SYMREQ REQ1581.5 +//! @SYMTestPriority Critical +//! @SYMTestActions PKCS10 certificate request construction. +//! @SYMTestExpectedResults Encoding successfully validated +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0004 +END_TESTCASE SEC-PKCS10-EXT-0004 + +START_TESTCASE SEC-PKCS10-OOM-0001 +//! @SYMTestCaseID SEC-PKCS10-OOM-0001 +//! @SYMTestCaseDesc To check that CPKCS10Request class can manage out of memory conditions graciously +//! Use the following parameters: +//! Key Algorithm: RSA +//! Key size: 512 bits +//! Digest Algorithm: SHA1 +//! Number of attributes: 2 +//! +//! @SYMPREQ CR0973 +//! @SYMREQ REQ1581.5 +//! @SYMTestPriority Critical +//! @SYMTestActions PKCS10 certificate request construction in OOM conditions. +//! @SYMTestExpectedResults Encoding successfully validated +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-OOM-0001 +END_TESTCASE SEC-PKCS10-OOM-0001 + +START_TESTCASE SEC-PKCS10-OOM-0002 +//! @SYMTestCaseID SEC-PKCS10-OOM-0002 +//! @SYMTestCaseDesc To check that CPKCS10Request class can manage out of memory conditions graciously +//! Use the following parameters: +//! Key Algorithm: DSA +//! Key size: 512 bits +//! Digest Algorithm: SHA1 +//! Number of attributes: 2 +//! @SYMPREQ CR0973 +//! @SYMREQ REQ1581.5 +//! @SYMTestPriority Critical +//! @SYMTestActions PKCS10 certificate request construction in OOM conditions. +//! @SYMTestExpectedResults Encoding successfully validated +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-OOM-0002 +END_TESTCASE SEC-PKCS10-OOM-0002 + +START_TESTCASE SEC-PKCS10-REU-0001 +//! @SYMTestCaseID SEC-PKCS10-REU-0001 +//! @SYMTestCaseDesc To check that a CPKCS10Attribute can be reused with new values. +//! @SYMPREQ CR0973 +//! @SYMREQ REQ1581.5 +//! @SYMTestPriority Critical +//! @SYMTestActions Create CPKCS10Attribute test object using using valid values. +//! Use GetEncodingLC to retrieve ASN1 value from this instance. +//! Use Reset method of CPKCS10Attribute test object with appropriate parameters. +//! Use GetEncodingLC method again to check that new ASN1 value had been +//! updated correctly. +//! +//! @SYMTestExpectedResults Encoding matches in both cases. +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseAttribute c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0001 +END_TESTCASE SEC-PKCS10-REU-0001 + +START_TESTCASE SEC-PKCS10-REU-0002 +//! @SYMTestCaseID SEC-PKCS10-REU-0002 +//! @SYMTestCaseDesc To check that a CPKCS10Attribute can be reused with new values. +//! @SYMPREQ CR0973 +//! @SYMREQ REQ1581.5 +//! @SYMTestPriority Critical +//! @SYMTestActions Create CPKCS10Attribute instance with appropiate values +//! GetEncodingLC from test instance +//! repopulate data using appropiate methods +//! request a new cert request +//! @SYMTestExpectedResults New cert request in created correctly +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0002 +END_TESTCASE SEC-PKCS10-REU-0002 + +START_TESTCASE SEC-PKCS10-REU-0003 +//! @SYMTestCaseID SEC-PKCS10-REU-0003 +//! @SYMTestCaseDesc To check that a CPKCS10Attribute can be reused with new values. +//! @SYMPREQ CR0973 +//! @SYMREQ REQ1581.5 +//! @SYMTestPriority Critical +//! @SYMTestActions Create CPKCS10Attribute instance with appropiate values +//! GetEncodingLC from test instance +//! Do not repopulate data. +//! request a new cert request +//! @SYMTestExpectedResults New cert request in created correctly +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0003 +END_TESTCASE SEC-PKCS10-REU-0003 + +START_TESTCASE SEC-PKCS10-REU-0004 +//! @SYMTestCaseID SEC-PKCS10-REU-0004 +//! @SYMTestCaseDesc To check that a CPKCS9ChallengePasswordAttr can be reused with new values. +//! @SYMPREQ CR0973 +//! @SYMREQ REQ1581.5 +//! @SYMTestPriority Critical +//! @SYMTestActions Create CPKCS9ChallengePasswordAttr test object using valid value. +//! Use GetEncodingLC to retrieve ASN1 value from this instance. +//! Use Reset method of CPKCS9ChallengePasswordAttr test object +//! with appropriate parameter. +//! Use GetEncodingLC method again to check that new ASN1 value +//! had been updated correctly. +//! @SYMTestExpectedResults Encoding matches in both cases. +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseChallengePasswordAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0004 +END_TESTCASE SEC-PKCS10-REU-0004 + +START_TESTCASE SEC-PKCS10-REU-0005 +//! @SYMTestCaseID SEC-PKCS10-REU-0005 +//! @SYMTestCaseDesc To check that a CPKCS10GenericAttr can be reused with new values. +//! @SYMPREQ CR0973 +//! @SYMREQ REQ1581.5 +//! @SYMTestPriority Critical +//! @SYMTestActions Create CPKCS9ExtensionRequestAttr test object using valid values. +//! Use GetEncodingLC to retrieve ASN1 value from this instance. +//! Use ResetL method of CPKCS9ExtensionRequestAttr test object +//! with appropriate parameters. +//! Use GetEncodingLC method again to check that new ASN1 value had +//! been updated correctly. +//! @SYMTestExpectedResults Encoding matches in both cases. +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseExtensionAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0005 +END_TESTCASE SEC-PKCS10-REU-0005 + +START_TESTCASE SEC-PKCS10-NEG-0001 +//! @SYMTestCaseID SEC-PKCS10-NEG-0001 +//! @SYMTestCaseDesc Check that CPKCS10GenericAttr class returns a +//! KErrBadDescriptor (or KErrArgument) when its methods are used with +//! invalid/null value parameters. +//! @SYMPREQ CR0973 +//! @SYMREQ REQ1581.5 +//! @SYMTestPriority Critical +//! @SYMTestActions PKCS10 CPKCS10GenericAttr construction +//! @SYMTestExpectedResults Returns KErrBadDescriptor (or KErrArgument) +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10GenericAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0001 +END_TESTCASE SEC-PKCS10-NEG-0001 + +START_TESTCASE SEC-PKCS10-NEG-0002 +//! @SYMTestCaseID SEC-PKCS10-NEG-0002 +//! @SYMTestCaseDesc Check that CPKCS9ChallengePasswordAttr class returns a +//! KErrArgument when its methods are used with null value parameters. +//! @SYMPREQ CR0973 +//! @SYMREQ REQ1581.5 +//! @SYMTestPriority Critical +//! @SYMTestActions PKCS10 CPKCS9ChallengePasswordAttr construction +//! @SYMTestExpectedResults Returns KErrArgument +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS9ChPwdAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0002 +END_TESTCASE SEC-PKCS10-NEG-0002 + +START_TESTCASE SEC-PKCS10-NEG-0003 +//! @SYMTestCaseID SEC-PKCS10-NEG-0003 +//! @SYMTestCaseDesc Check that CPKCS9ExtensionRequestAttr class can recognise +//! when application is trying to add malformed or un-initialised cert +//! extension object to extension request. +//! @SYMPREQ CR0973 +//! @SYMREQ REQ1581.5 +//! @SYMTestPriority Critical +//! @SYMTestActions PKCS10 CPKCS9ExtensionRequestAttr construction. +//! @SYMTestExpectedResults Returns KErrBadDescriptor +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS9ExtReqAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0003 +END_TESTCASE SEC-PKCS10-NEG-0003 + +START_TESTCASE SEC-PKCS10-NEG-0004 +//! @SYMTestCaseID SEC-PKCS10-NEG-0004 +//! @SYMTestCaseDesc Check that CPKCS9ExtensionRequestAttr class returns a +//! KErrArgument when its methods are used with null value parameters. +//! @SYMPREQ CR0973 +//! @SYMREQ REQ1581.5 +//! @SYMTestPriority Critical +//! @SYMTestActions PKCS10 CPKCS9ExtensionRequestAttr construction +//! @SYMTestExpectedResults Returns KErrArgument +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10Attributes c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0004 +END_TESTCASE SEC-PKCS10-NEG-0004 + +START_TESTCASE SEC-PKCS10-NEG-0005 +//! @SYMTestCaseID SEC-PKCS10-NEG-0005 +//! @SYMTestCaseDesc Check that CPKCS10Request class returns a KErrArgument when +//! its methods are used with invalid value parameters. +//! @SYMPREQ CR0973 +//! @SYMREQ REQ1581.5 +//! @SYMTestPriority Critical +//! @SYMTestActions PKCS10 CPKCS10Request construction. +//! @SYMTestExpectedResults Returns KErrArgument +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10Request c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0005 +END_TESTCASE SEC-PKCS10-NEG-0005 + +START_TESTCASE SEC-PKCS10-DEF103311-0001 +//! @SYMTestCaseID SEC-PKCS10-DEF103311-0001 +//! @SYMTestCaseDesc Test case added for defect DEF103311, increases test coverage for PKCS1- +//! @SYMREQ REQ0000 +//! @SYMTestPriority Critical +//! @SYMTestActions Creates a CPKCS10Request and then cancels it. +//! @SYMTestExpectedResults Returns KErrNone, no memory leak. +//! @SYMTestType CIT +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CancelRequestA c:\tpkcs10\scripts\tpkcs10_v2.ini DEF103311-0001 +END_TESTCASE SEC-PKCS10-DEF103311-0001 + +//Post- test: re-states key store file +RUN_UTILS CopyFile c:\keys.dat c:\private\101f72a6\keys.dat +RUN_UTILS DeleteFile c:\keys.dat + +PRINT Complete_tpkcs10serverv2_Tests