11 // |
11 // |
12 // Contributors: |
12 // Contributors: |
13 // |
13 // |
14 // Description: |
14 // Description: |
15 // |
15 // |
|
16 // |
|
17 // Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies). |
|
18 // All rights reserved. |
|
19 // This component and the accompanying materials are made available |
|
20 // under the terms of the License "Symbian Foundation License v1.0" |
|
21 // which accompanies this distribution, and is available |
|
22 // at the URL "http://www.symbianfoundation.org/legal/sfl-v10.html". |
|
23 // |
|
24 // Initial Contributors: |
|
25 // Nokia Corporation - initial contribution. |
|
26 // |
|
27 // Contributors: |
|
28 // |
|
29 // Description: |
|
30 // |
16 //! @file |
31 //! @file |
17 //! @SYMTestSuiteName SEC-CERTMAN |
32 //! @SYMTestSuiteName SEC-CERTMAN |
18 //! @SYMScriptTestEnvironment The script has no specific test environment requirements. |
33 //! @SYMScriptTestEnvironment The script has no specific test environment requirements. |
19 //! @SYMScriptPurpose Test the published API functions of CPKIXCertChain. |
34 //! @SYMScriptPurpose Test the published API functions of CPKIXCertChain. |
20 |
35 |
21 LOAD_SUITE tpkixcert_tefserver |
36 LOAD_SUITE tpkixcert_tefserver |
22 |
37 |
23 |
38 |
24 //! @SYMTestCaseID SEC-CERTMAN-DATETIME-0001 |
39 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-DATETIME-0001 |
25 //! @SYMTestCaseDesc Testing CPKIXCertChain date and time checking behaviour during certificate validation. |
40 //! @SYMTestCaseDesc Testing CPKIXCertChain date and time checking behaviour during certificate validation. |
26 //! @SYMCR 1240 |
41 //! @SYMCR 1240 |
27 //! @SYMTestPriority Critical |
42 //! @SYMTestPriority Critical |
28 //! @SYMTestActions 1) Construct the certificate chain. |
43 //! @SYMTestActions 1) Construct the certificate chain. |
29 //! 2) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has expired. |
44 //! 2) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has expired. |
30 //! 3) Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in EFalse. |
45 //! 3) Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in EFalse. |
31 //! 4) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has expired. |
46 //! 4) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has expired. |
32 //! 5) Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in ETrue. |
47 //! 5) Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in ETrue. |
33 //! 6) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has expired. |
48 //! 6) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has expired. |
34 //! 7) Cleanup the certificate chain and utility classes. |
49 //! 7) Cleanup the certificate chain and utility classes. |
35 //! @SYMTestExpectedResults Calls 2 and 6 should fail with EDateOutOfRange. Call 4 should pass with EValidatedOK but report the warning EDateOutOfRange through both the old warnings API(CPKIXValidationResult::Warnings()) and the new one(CCertificateWarning::Warnings()). |
50 //! @SYMTestExpectedResults Calls 2 and 6 should fail with EDateOutOfRange. Call 4 should pass with EValidatedOK but report the warning EDateOutOfRange through both the old warnings API(CPKIXValidationResult::Warnings()) and the new one(CCertificateWarning::Warnings()). |
36 //! @SYMTestType CIT |
51 //! @SYMTestType CIT |
37 //! @SYMTestPurpose 1) Check that current behaviour has not been altered and we still fail to validate out of date certificate chains. |
52 //! @SYMTestPurpose 1) Check that current behaviour has not been altered and we still fail to validate out of date certificate chains. |
38 //! 2) Check that new behaviour works correctly by allowing a certificate chain with an invalid date to validate successfully when explicitly told to. |
53 //! 2) Check that new behaviour works correctly by allowing a certificate chain with an invalid date to validate successfully when explicitly told to. |
39 //! 3) Then ensure this has left the system in the correct state to maintain normal behaviour. |
54 //! 3) Then ensure this has left the system in the correct state to maintain normal behaviour. |
40 START_TESTCASE SEC-CERTMAN-DATETIME-0001 |
55 START_TESTCASE SEC-CERTMAN-PKIXCERT-DATETIME-0001 |
41 RUN_TEST_STEP 100 tpkixcert_tefserver DateTimeFatalValidateTest c:\tpkixcert_tef\scripts\validatetests.ini ExpiredDateTime |
56 RUN_TEST_STEP 100 tpkixcert_tefserver DateTimeFatalValidateTest c:\tpkixcert_tef\scripts\validatetests.ini ExpiredDateTime |
42 END_TESTCASE SEC-CERTMAN-DATETIME-0001 |
57 END_TESTCASE SEC-CERTMAN-PKIXCERT-DATETIME-0001 |
43 |
58 |
44 |
59 |
45 //! @SYMTestCaseID SEC-CERTMAN-DATETIME-0002 |
60 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-DATETIME-0002 |
46 //! @SYMTestCaseDesc Testing CPKIXCertChain date and time checking behaviour during certificate validation. |
61 //! @SYMTestCaseDesc TestingCPKIXCertChain date and time checking behaviour during certificate validation. |
47 //! @SYMCR 1240 |
62 //! @SYMCR 1240 |
48 //! @SYMTestPriority Critical |
63 //! @SYMTestPriority Critical |
49 //! @SYMTestActions 1) Construct the certificate chain. |
64 //! @SYMTestActions 1) Construct the certificate chain. |
50 //! 2) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has not yet become valid. |
65 //! 2) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has not yet become valid. |
51 //! 3) Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in EFalse. |
66 //! 3) Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in EFalse. |
52 //! 4) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has not yet become valid. |
67 //! 4) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has not yet become valid. |
53 //! 5) Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in ETrue. |
68 //! 5) Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in ETrue. |
54 //! 6) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has not yet become valid. |
69 //! 6) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has not yet become valid. |
55 //! 7) Cleanup the certificate chain and utility classes. |
70 //! 7) Cleanup the certificate chain and utility classes. |
56 //! @SYMTestExpectedResults Calls 2 and 6 should fail with EDateOutOfRange. Call 4 should pass with EValidatedOK but report the warning EDateOutOfRange through both the old warnings API(CPKIXValidationResult::Warnings()) and the new one(CCertificateWarning::Warnings()). |
71 //! @SYMTestExpectedResults Calls 2 and 6 should fail with EDateOutOfRange. Call 4 should pass with EValidatedOK but report the warning EDateOutOfRange through both the old warnings API(CPKIXValidationResult::Warnings()) and the new one(CCertificateWarning::Warnings()). |
57 //! @SYMTestType CIT |
72 //! @SYMTestType CIT |
58 //! @SYMTestPurpose 1) Check that current behaviour has not been altered and we still fail to validate out of date certificate chains. |
73 //! @SYMTestPurpose 1) Check that current behaviour has not been altered and we still fail to validate out of date certificate chains. |
59 //! 2) Check that new behaviour works correctly by allowing a certificate chain with an invalid date to validate successfully when explicitly told to. |
74 //! 2) Check that new behaviour works correctly by allowing a certificate chain with an invalid date to validate successfully when explicitly told to. |
60 //! 3) Then ensure this has left the system in the correct state to maintain normal behaviour. |
75 //! 3) Then ensure this has left the system in the correct state to maintain normal behaviour. |
61 START_TESTCASE SEC-CERTMAN-DATETIME-0002 |
76 START_TESTCASE SEC-CERTMAN-PKIXCERT-DATETIME-0002 |
62 RUN_TEST_STEP 100 tpkixcert_tefserver DateTimeFatalValidateTest c:\tpkixcert_tef\scripts\validatetests.ini InvalidDateTime |
77 RUN_TEST_STEP 100 tpkixcert_tefserver DateTimeFatalValidateTest c:\tpkixcert_tef\scripts\validatetests.ini InvalidDateTime |
63 END_TESTCASE SEC-CERTMAN-DATETIME-0002 |
78 END_TESTCASE SEC-CERTMAN-PKIXCERT-DATETIME-0002 |
64 |
79 |
65 |
80 |
66 //! @SYMTestCaseID SEC-CERTMAN-DATETIME-0003 |
81 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-DATETIME-0003 |
67 //! @SYMTestCaseDesc Testing CPKIXCertChain date and time checking behaviour during certificate validation. |
82 //! @SYMTestCaseDesc TestingCPKIXCertChain date and time checking behaviour during certificate validation. |
68 //! @SYMCR 1240 |
83 //! @SYMCR 1240 |
69 //! @SYMTestPriority Critical |
84 //! @SYMTestPriority Critical |
70 //! @SYMTestActions 1) Construct the certificate chain. |
85 //! @SYMTestActions 1) Construct the certificate chain. |
71 //! 2) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain is valid. |
86 //! 2) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain is valid. |
72 //! 3) Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in EFalse. |
87 //! 3) Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in EFalse. |
73 //! 4) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain is valid. |
88 //! 4) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain is valid. |
74 //! 5) Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in ETrue. |
89 //! 5) Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in ETrue. |
75 //! 6) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain is valid. |
90 //! 6) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain is valid. |
76 //! 7) Cleanup the certificate chain and utility classes. |
91 //! 7) Cleanup the certificate chain and utility classes. |
77 //! @SYMTestExpectedResults Calls 2, 4 and 6 should validate successfully with EValidatedOK. |
92 //! @SYMTestExpectedResults Calls 2, 4 and 6 should validate successfully with EValidatedOK. |
78 //! @SYMTestType CIT |
93 //! @SYMTestType CIT |
79 //! @SYMTestPurpose 1) Check that current behaviour has not been altered and we still fail to validate out of date certificate chains. |
94 //! @SYMTestPurpose 1) Check that current behaviour has not been altered and we still fail to validate out of date certificate chains. |
80 //! 2) Check that new behaviour works correctly by allowing a certificate chain with an invalid date to validate successfully when explicitly told to. |
95 //! 2) Check that new behaviour works correctly by allowing a certificate chain with an invalid date to validate successfully when explicitly told to. |
81 //! 3) Then ensure this has left the system in the correct state to maintain normal behaviour. |
96 //! 3) Then ensure this has left the system in the correct state to maintain normal behaviour. |
82 START_TESTCASE SEC-CERTMAN-DATETIME-0003 |
97 START_TESTCASE SEC-CERTMAN-PKIXCERT-DATETIME-0003 |
83 RUN_TEST_STEP 100 tpkixcert_tefserver DateTimeFatalValidateTest c:\tpkixcert_tef\scripts\validatetests.ini ValidDateTime |
98 RUN_TEST_STEP 100 tpkixcert_tefserver DateTimeFatalValidateTest c:\tpkixcert_tef\scripts\validatetests.ini ValidDateTime |
84 END_TESTCASE SEC-CERTMAN-DATETIME-0003 |
99 END_TESTCASE SEC-CERTMAN-PKIXCERT-DATETIME-0003 |
85 |
100 |
86 |
101 |
87 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0001 |
102 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-CRITEXT-0001 |
88 //! @SYMTestCaseDesc Test correct behaviour of customisable supported critical extension processing. |
103 //! @SYMTestCaseDesc Test correct behaviour of customisable supported critical extension processing. |
89 //! @SYMCR 1399 |
104 //! @SYMCR 1399 |
90 //! @SYMTestPriority Critical |
105 //! @SYMTestPriority Critical |
91 //! @SYMTestActions 1) Construct the certificate chain. |
106 //! @SYMTestActions 1) Construct the certificate chain. |
92 //! 2) Set the supported OID list to the default OIDs and the new ones through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
107 //! 2) Set the supported OID list to the default OIDs and the new ones through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
93 //! 3) Call CPKIXCertChain::ValidateL(). |
108 //! 3) Call CPKIXCertChain::ValidateL(). |
94 //! 4) Ensure all critical extensions encountered are supported and that the certificate and certificate index information in the results match up with the correct certificates. |
109 //! 4) Ensure all critical extensions encountered are supported and that the certificate and certificate index information in the results match up with the correct certificates. |
95 //! 5) Cleanup the certificate chain and utility classes. |
110 //! 5) Cleanup the certificate chain and utility classes. |
96 //! @SYMTestExpectedResults Chain should validate successfully. All critical extensions should be reported through the new certificate warnings API (CCertificateWarning::CriticalExtensionsFound()). |
111 //! @SYMTestExpectedResults Chain should validate successfully. All critical extensions should be reported through the new certificate warnings API (CCertificateWarning::CriticalExtensionsFound()). |
97 //! @SYMTestType CIT |
112 //! @SYMTestType CIT |
98 //! @SYMTestPurpose Test we correctly report the full gamut of possible critical extension patterns we may be expected to deal with in a certificate chain – multiple extensions in one certificate, multiple extensions spanning multiple certificates and the same extension in multiple certificates. |
113 //! @SYMTestPurpose Test we correctly report the full gamut of possible critical extension patterns we may be expected to deal with in a certificate chain – multiple extensions in one certificate, multiple extensions spanning multiple certificates and the same extension in multiple certificates. |
99 START_TESTCASE SEC-CERTMAN-CRITEXT-0001 |
114 START_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0001 |
100 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini CustomCriticalExts |
115 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini CustomCriticalExts |
101 END_TESTCASE SEC-CERTMAN-CRITEXT-0001 |
116 END_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0001 |
102 |
117 |
103 |
118 |
104 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0002 |
119 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-CRITEXT-0002 |
105 //! @SYMTestCaseDesc Test old and new warnings API for consistency and backwards compatibility. |
120 //! @SYMTestCaseDesc Test old and new warnings API for consistency and backwards compatibility. |
106 //! @SYMCR 1399 |
121 //! @SYMCR 1399 |
107 //! @SYMTestPriority Critical |
122 //! @SYMTestPriority Critical |
108 //! @SYMTestActions 1) Construct the certificate chain. |
123 //! @SYMTestActions 1) Construct the certificate chain. |
109 //! 2) Set the supported OID list to the default OIDs and the new ones through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
124 //! 2) Set the supported OID list to the default OIDs and the new ones through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
110 //! 3) Call CPKIXCertChain::ValidateL(). |
125 //! 3) Call CPKIXCertChain::ValidateL(). |
111 //! 4) Compare resultant warnings. |
126 //! 4) Compare resultant warnings. |
112 //! 5) Cleanup the certificate chain and utility classes. |
127 //! 5) Cleanup the certificate chain and utility classes. |
113 //! @SYMTestExpectedResults Chain should validate successfully. Each of the recognised critical extensions should be reported both as a warning through the old warnings return and through the new API CCertificateWarning::CriticalExtensionsFound(). CCertificateWarning::Warnings() should contain the other warnings found in CPKIXValidationResult::Warnings(). The new returns mechanism should have no additional warnings. |
128 //! @SYMTestExpectedResults Chain should validate successfully. Each of the recognised critical extensions should be reported both as a warning through the old warnings return and through the new API CCertificateWarning::CriticalExtensionsFound(). CCertificateWarning::Warnings() should contain the other warnings found in CPKIXValidationResult::Warnings(). The new returns mechanism should have no additional warnings. |
114 //! @SYMTestType CIT |
129 //! @SYMTestType CIT |
115 //! @SYMTestPurpose Ensure backwards compatibility of old style warning reporting and ensure the new warning returns match up with this. |
130 //! @SYMTestPurpose Ensure backwards compatibility of old style warning reporting and ensure the new warning returns match up with this. |
116 START_TESTCASE SEC-CERTMAN-CRITEXT-0002 |
131 START_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0002 |
117 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Warnings |
132 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Warnings |
118 END_TESTCASE SEC-CERTMAN-CRITEXT-0002 |
133 END_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0002 |
119 |
134 |
120 |
135 |
121 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0003 |
136 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-CRITEXT-0003 |
122 //! @SYMTestCaseDesc Check supported OID list processing resilience. |
137 //! @SYMTestCaseDesc Check supported OID list processing resilience. |
123 //! @SYMCR 1399 |
138 //! @SYMCR 1399 |
124 //! @SYMTestPriority Critical |
139 //! @SYMTestPriority Critical |
125 //! @SYMTestActions 1) Construct certificate chain. |
140 //! @SYMTestActions 1) Construct certificate chain. |
126 //! 2) Set the supported OID list to the default OIDs and a new invalid format OID through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
141 //! 2) Set the supported OID list to the default OIDs and a new invalid format OID through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
127 //! 3) Call CPKIXCertChain::ValidateL(). |
142 //! 3) Call CPKIXCertChain::ValidateL(). |
128 //! 4) Cleanup the certificate chain and utility classes. |
143 //! 4) Cleanup the certificate chain and utility classes. |
129 //! @SYMTestExpectedResults Chain should validate successfully with EValidatedOK with expected warnings returned. |
144 //! @SYMTestExpectedResults Chain should validate successfully with EValidatedOK with expected warnings returned. |
130 //! @SYMTestType CIT |
145 //! @SYMTestType CIT |
131 //! @SYMTestPurpose Check the code is resilient to badly formed OID data being passed in to the supported OID list. |
146 //! @SYMTestPurpose Check the code is resilient to badly formed OID data being passed in to the supported OID list. |
132 START_TESTCASE SEC-CERTMAN-CRITEXT-0003 |
147 START_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0003 |
133 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini BadOidValue |
148 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini BadOidValue |
134 END_TESTCASE SEC-CERTMAN-CRITEXT-0003 |
149 END_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0003 |
135 |
150 |
136 |
151 |
137 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0004 |
152 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-CRITEXT-0004 |
138 //! @SYMTestCaseDesc Check supported OID list processing resilience. |
153 //! @SYMTestCaseDesc Check supported OID list processing resilience. |
139 //! @SYMCR 1399 |
154 //! @SYMCR 1399 |
140 //! @SYMTestPriority Critical |
155 //! @SYMTestPriority Critical |
141 //! @SYMTestActions 1) Construct certificate chain. |
156 //! @SYMTestActions 1) Construct certificate chain. |
142 //! 2) Set the supported OID list to an empty one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
157 //! 2) Set the supported OID list to an empty one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
143 //! 3) Call CPKIXCertChain::ValidateL(). |
158 //! 3) Call CPKIXCertChain::ValidateL(). |
144 //! 4) Cleanup the certificate chain and utility classes. |
159 //! 4) Cleanup the certificate chain and utility classes. |
145 //! @SYMTestExpectedResults Chain should error with EUnrecognizedCriticalExtension (it is necessary for the CA to contain a critical extension). |
160 //! @SYMTestExpectedResults Chain should error with EUnrecognizedCriticalExtension (it is necessary for the CA to contain a critical extension). |
146 //! @SYMTestType CIT |
161 //! @SYMTestType CIT |
147 //! @SYMTestPurpose Check the code is resilient to an empty supported OID list. |
162 //! @SYMTestPurpose Check the code is resilient to an empty supported OID list. |
148 START_TESTCASE SEC-CERTMAN-CRITEXT-0004 |
163 START_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0004 |
149 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini EmptySupportedOidList |
164 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini EmptySupportedOidList |
150 END_TESTCASE SEC-CERTMAN-CRITEXT-0004 |
165 END_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0004 |
151 |
166 |
152 |
167 |
153 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0005 |
168 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-CRITEXT-0005 |
154 //! @SYMTestCaseDesc Test the Append API for manipulating supported OID list for correct behaviour. |
169 //! @SYMTestCaseDesc Test the Append API for manipulating supported OID list for correct behaviour. |
155 //! @SYMCR 1399 |
170 //! @SYMCR 1399 |
156 //! @SYMTestPriority Critical |
171 //! @SYMTestPriority Critical |
157 //! @SYMTestActions 1) Construct the certificate chain. |
172 //! @SYMTestActions 1) Construct the certificate chain. |
158 //! 2) Append a collection of new OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL(). |
173 //! 2) Append a collection of new OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL(). |
159 //! 3) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
174 //! 3) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
160 //! 4) Append a collection of OIDs already in the supported list through CPKIXCertChain::AddSupportedCriticalExtensionsL(). |
175 //! 4) Append a collection of OIDs already in the supported list through CPKIXCertChain::AddSupportedCriticalExtensionsL(). |
161 //! 5) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
176 //! 5) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
162 //! 6) Append a collection of OIDs with duplicates within the collection. |
177 //! 6) Append a collection of OIDs with duplicates within the collection. |
163 //! 7) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
178 //! 7) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
164 //! 8) Append an empty collection of OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL(). |
179 //! 8) Append an empty collection of OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL(). |
165 //! 9) Cleanup the certificate chain and utility classes. |
180 //! 9) Cleanup the certificate chain and utility classes. |
166 //! @SYMTestExpectedResults Supported OID list should be updated correctly in each case. |
181 //! @SYMTestExpectedResults Supported OID list should be updated correctly in each case. |
167 //! @SYMTestType CIT |
182 //! @SYMTestType CIT |
168 //! @SYMTestPurpose Ensure OIDs are added to the supported list, that the result contains no duplicates and no errors are reported. |
183 //! @SYMTestPurpose Ensure OIDs are added to the supported list, that the result contains no duplicates and no errors are reported. |
169 START_TESTCASE SEC-CERTMAN-CRITEXT-0005 |
184 START_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0005 |
170 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NewOids |
185 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NewOids |
171 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini AlreadySupportedOids |
186 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini AlreadySupportedOids |
172 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OidsWithDuplicates |
187 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OidsWithDuplicates |
173 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NoOids |
188 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NoOids |
174 END_TESTCASE SEC-CERTMAN-CRITEXT-0005 |
189 END_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0005 |
175 |
190 |
176 |
191 |
177 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-OOM-0005 |
192 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0005 |
178 //! @SYMTestCaseDesc Test the Append API for manipulating supported OID list for correct behaviour. |
193 //! @SYMTestCaseDesc Test the Append API for manipulating supported OID list for correct behaviour. |
179 //! @SYMCR 1399 |
194 //! @SYMCR 1399 |
180 //! @SYMTestPriority Critical |
195 //! @SYMTestPriority Critical |
181 //! @SYMTestActions OOM loop around steps 1 to 9: |
196 //! @SYMTestActions OOM loop around steps 1 to 9: |
182 //! 1) Construct the certificate chain. |
197 //! 1) Construct the certificate chain. |
183 //! 2) Append a collection of new OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL(). |
198 //! 2) Append a collection of new OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL(). |
184 //! 3) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
199 //! 3) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
185 //! 4) Append a collection of OIDs already in the supported list through CPKIXCertChain::AddSupportedCriticalExtensionsL(). |
200 //! 4) Append a collection of OIDs already in the supported list through CPKIXCertChain::AddSupportedCriticalExtensionsL(). |
186 //! 5) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
201 //! 5) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
187 //! 6) Append a collection of OIDs with duplicates within the collection. |
202 //! 6) Append a collection of OIDs with duplicates within the collection. |
188 //! 7) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
203 //! 7) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
189 //! 8) Append an empty collection of OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL(). |
204 //! 8) Append an empty collection of OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL(). |
190 //! 9) Cleanup the certificate chain and utility classes. |
205 //! 9) Cleanup the certificate chain and utility classes. |
191 //! @SYMTestExpectedResults There should be no memory leaks at any stage. |
206 //! @SYMTestExpectedResults There should be no memory leaks at any stage. |
192 //! @SYMTestType CIT |
207 //! @SYMTestType CIT |
193 //! @SYMTestPurpose Ensure OIDs are added to the supported list, that the result contains no duplicates and no errors are reported. |
208 //! @SYMTestPurpose Ensure OIDs are added to the supported list, that the result contains no duplicates and no errors are reported. |
194 START_TESTCASE SEC-CERTMAN-CRITEXT-OOM-0005 |
209 START_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0005 |
195 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNewOids |
210 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNewOids |
196 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomAlreadySupportedOids |
211 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomAlreadySupportedOids |
197 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomOidsWithDuplicates |
212 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomOidsWithDuplicates |
198 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNoOids |
213 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNoOids |
199 END_TESTCASE SEC-CERTMAN-CRITEXT-OOM-0005 |
214 END_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0005 |
200 |
215 |
201 |
216 |
202 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0006 |
217 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-CRITEXT-0006 |
203 //! @SYMTestCaseDesc Test the Remove API for manipulating supported OID list for correct behaviour. |
218 //! @SYMTestCaseDesc Test the Remove API for manipulating supported OID list for correct behaviour. |
204 //! @SYMCR 1399 |
219 //! @SYMCR 1399 |
205 //! @SYMTestPriority Critical |
220 //! @SYMTestPriority Critical |
206 //! @SYMTestActions 1) Construct the certificate chain. |
221 //! @SYMTestActions 1) Construct the certificate chain. |
207 //! 2) Remove a collection of OIDs currently supported in the list through CPKIXCertChain::RemoveSupportedCriticalExtensions(). |
222 //! 2) Remove a collection of OIDs currently supported in the list through CPKIXCertChain::RemoveSupportedCriticalExtensions(). |
208 //! 3) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
223 //! 3) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
209 //! 4) Remove a collection of OIDs not currently supported in the list through CPKIXCertChain::RemoveSupportedCriticalExtensions(). |
224 //! 4) Remove a collection of OIDs not currently supported in the list through CPKIXCertChain::RemoveSupportedCriticalExtensions(). |
210 //! 5) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
225 //! 5) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
211 //! 6) Remove an empty collection of OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL(). |
226 //! 6) Remove an empty collection of OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL(). |
212 //! 7) Cleanup the certificate chain and utility classes. |
227 //! 7) Cleanup the certificate chain and utility classes. |
213 //! @SYMTestExpectedResults Supported OID list should be updated correctly in each case. |
228 //! @SYMTestExpectedResults Supported OID list should be updated correctly in each case. |
214 //! @SYMTestType CIT |
229 //! @SYMTestType CIT |
215 //! @SYMTestPurpose Ensure OIDs are removed from the supported list and no errors are reported. |
230 //! @SYMTestPurpose Ensure OIDs are removed from the supported list and no errors are reported. |
216 START_TESTCASE SEC-CERTMAN-CRITEXT-0006 |
231 START_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0006 |
217 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NewOids |
232 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NewOids |
218 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini AlreadySupportedOids |
233 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini AlreadySupportedOids |
219 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini SupportedOidsWithDuplicates |
234 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini SupportedOidsWithDuplicates |
220 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NoOids |
235 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NoOids |
221 END_TESTCASE SEC-CERTMAN-CRITEXT-0006 |
236 END_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0006 |
222 |
237 |
223 |
238 |
224 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-OOM-0006 |
239 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0006 |
225 //! @SYMTestCaseDesc Test the Remove API for manipulating supported OID list for correct behaviour. |
240 //! @SYMTestCaseDesc Test the Remove API for manipulating supported OID list for correct behaviour. |
226 //! @SYMCR 1399 |
241 //! @SYMCR 1399 |
227 //! @SYMTestPriority Critical |
242 //! @SYMTestPriority Critical |
228 //! @SYMTestActions OOM loop around steps 1 to 7: |
243 //! @SYMTestActions OOM loop around steps 1 to 7: |
229 //! 1) Construct the certificate chain. |
244 //! 1) Construct the certificate chain. |
230 //! 2) Remove a collection of OIDs currently supported in the list through CPKIXCertChain::RemoveSupportedCriticalExtensions(). |
245 //! 2) Remove a collection of OIDs currently supported in the list through CPKIXCertChain::RemoveSupportedCriticalExtensions(). |
231 //! 3) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
246 //! 3) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
232 //! 4) Remove a collection of OIDs not currently supported in the list through CPKIXCertChain::RemoveSupportedCriticalExtensions(). |
247 //! 4) Remove a collection of OIDs not currently supported in the list through CPKIXCertChain::RemoveSupportedCriticalExtensions(). |
233 //! 5) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
248 //! 5) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
234 //! 6) Remove an empty collection of OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL(). |
249 //! 6) Remove an empty collection of OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL(). |
235 //! 7) Cleanup the certificate chain and utility classes. |
250 //! 7) Cleanup the certificate chain and utility classes. |
236 //! @SYMTestExpectedResults There should be no memory leaks at any stage. |
251 //! @SYMTestExpectedResults There should be no memory leaks at any stage. |
237 //! @SYMTestType CIT |
252 //! @SYMTestType CIT |
238 //! @SYMTestPurpose Ensure OIDs are removed from the supported list and no errors are reported. |
253 //! @SYMTestPurpose Ensure OIDs are removed from the supported list and no errors are reported. |
239 START_TESTCASE SEC-CERTMAN-CRITEXT-OOM-0006 |
254 START_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0006 |
240 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNewOids |
255 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNewOids |
241 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomAlreadySupportedOids |
256 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomAlreadySupportedOids |
242 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomSupportedOidsWithDuplicates |
257 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomSupportedOidsWithDuplicates |
243 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNoOids |
258 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNoOids |
244 END_TESTCASE SEC-CERTMAN-CRITEXT-OOM-0006 |
259 END_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0006 |
245 |
260 |
246 |
261 |
247 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0007 |
262 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-CRITEXT-0007 |
248 //! @SYMTestCaseDesc Test the Reset API for manipulating supported OID list for correct behaviour. |
263 //! @SYMTestCaseDesc Test the Reset API for manipulating supported OID list for correct behaviour. |
249 //! @SYMCR 1399 |
264 //! @SYMCR 1399 |
250 //! @SYMTestPriority Critical |
265 //! @SYMTestPriority Critical |
251 //! @SYMTestActions 1) Construct the certificate chain. |
266 //! @SYMTestActions 1) Construct the certificate chain. |
252 //! 2) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL() with an empty supported OID list. |
267 //! 2) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL() with an empty supported OID list. |
253 //! 3) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL() on a non empty, no default (one new OID added and one default OID removed) |
268 //! 3) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL() on a non empty, no default (one new OID added and one default OID removed) |
254 //! supported OID list. |
269 //! supported OID list. |
255 //! 4) Cleanup the certificate chain and utility classes. |
270 //! 4) Cleanup the certificate chain and utility classes. |
256 //! @SYMTestExpectedResults Supported OID list should be updated correctly in each case. |
271 //! @SYMTestExpectedResults Supported OID list should be updated correctly in each case. |
257 //! @SYMTestType CIT |
272 //! @SYMTestType CIT |
258 //! @SYMTestPurpose Ensure the supported OID list is reset to the default values correctly. |
273 //! @SYMTestPurpose Ensure the supported OID list is reset to the default values correctly. |
259 START_TESTCASE SEC-CERTMAN-CRITEXT-0007 |
274 START_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0007 |
260 RUN_TEST_STEP 100 tpkixcert_tefserver ResetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NoOids |
275 RUN_TEST_STEP 100 tpkixcert_tefserver ResetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NoOids |
261 RUN_TEST_STEP 100 tpkixcert_tefserver ResetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OneAddedOneRemoved |
276 RUN_TEST_STEP 100 tpkixcert_tefserver ResetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OneAddedOneRemoved |
262 END_TESTCASE SEC-CERTMAN-CRITEXT-0007 |
277 END_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0007 |
263 |
278 |
264 |
279 |
265 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-OOM-0007 |
280 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0007 |
266 //! @SYMTestCaseDesc Test the Reset API for manipulating supported OID list for correct behaviour. |
281 //! @SYMTestCaseDesc Test the Reset API for manipulating supported OID list for correct behaviour. |
267 //! @SYMCR 1399 |
282 //! @SYMCR 1399 |
268 //! @SYMTestPriority Critical |
283 //! @SYMTestPriority Critical |
269 //! @SYMTestActions OOM loop around steps 1 to 4: |
284 //! @SYMTestActions OOM loop around steps 1 to 4: |
270 //! 1) Construct the certificate chain. |
285 //! 1) Construct the certificate chain. |
271 //! 2) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL() with an empty supported OID list. |
286 //! 2) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL() with an empty supported OID list. |
272 //! 3) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL() on a non empty, no default (one new OID added and one default OID removed) |
287 //! 3) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL() on a non empty, no default (one new OID added and one default OID removed) |
273 //! supported OID list. |
288 //! supported OID list. |
274 //! 4) Cleanup the certificate chain and utility classes. |
289 //! 4) Cleanup the certificate chain and utility classes. |
275 //! @SYMTestExpectedResults There should be no memory leaks at any stage. |
290 //! @SYMTestExpectedResults There should be no memory leaks at any stage. |
276 //! @SYMTestType CIT |
291 //! @SYMTestType CIT |
277 //! @SYMTestPurpose Ensure the supported OID list is reset to the default values correctly. |
292 //! @SYMTestPurpose Ensure the supported OID list is reset to the default values correctly. |
278 START_TESTCASE SEC-CERTMAN-CRITEXT-OOM-0007 |
293 START_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0007 |
279 RUN_TEST_STEP 100 tpkixcert_tefserver ResetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNoOids |
294 RUN_TEST_STEP 100 tpkixcert_tefserver ResetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNoOids |
280 RUN_TEST_STEP 100 tpkixcert_tefserver ResetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomOneAddedOneRemoved |
295 RUN_TEST_STEP 100 tpkixcert_tefserver ResetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomOneAddedOneRemoved |
281 END_TESTCASE SEC-CERTMAN-CRITEXT-OOM-0007 |
296 END_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0007 |
282 |
297 |
283 |
298 |
284 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0008 |
299 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-CRITEXT-0008 |
285 //! @SYMTestCaseDesc Test the Set API for manipulating supported OID list for correct behaviour. |
300 //! @SYMTestCaseDesc Test the Set API for manipulating supported OID list for correct behaviour. |
286 //! @SYMCR 1399 |
301 //! @SYMCR 1399 |
287 //! @SYMTestPriority Critical |
302 //! @SYMTestPriority Critical |
288 //! @SYMTestActions 1) Construct the certificate chain. |
303 //! @SYMTestActions 1) Construct the certificate chain. |
289 //! 2) Set an empty collection of OIDs through CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
304 //! 2) Set an empty collection of OIDs through CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
290 //! 3) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
305 //! 3) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
291 //! 4) Set a collection of non empty (one new OID and one default OID removed) collection of OIDs through CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
306 //! 4) Set a collection of non empty (one new OID and one default OID removed) collection of OIDs through CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
292 //! 5) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
307 //! 5) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
293 //! 6) Set the same collection of OIDs as is currently supported through CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
308 //! 6) Set the same collection of OIDs as is currently supported through CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
294 //! 7) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
309 //! 7) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
295 //! 8) Set a collection of OIDs containing internal duplicates through CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
310 //! 8) Set a collection of OIDs containing internal duplicates through CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
296 //! 9) Cleanup the certificate chain and utility classes. |
311 //! 9) Cleanup the certificate chain and utility classes. |
297 //! @SYMTestExpectedResults Supported OID list should be updated correctly in each case. |
312 //! @SYMTestExpectedResults Supported OID list should be updated correctly in each case. |
298 //! @SYMTestType CIT |
313 //! @SYMTestType CIT |
299 //! @SYMTestPurpose Ensure supported OID list is updated correctly, the result contains no duplicates and no errors are reported. |
314 //! @SYMTestPurpose Ensure supported OID list is updated correctly, the result contains no duplicates and no errors are reported. |
300 START_TESTCASE SEC-CERTMAN-CRITEXT-0008 |
315 START_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0008 |
301 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NoOids |
316 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NoOids |
302 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OneAddedOneRemoved |
317 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OneAddedOneRemoved |
303 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini CurrentlySupported |
318 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini CurrentlySupported |
304 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OidsWithDuplicates |
319 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OidsWithDuplicates |
305 END_TESTCASE SEC-CERTMAN-CRITEXT-0008 |
320 END_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0008 |
306 |
321 |
307 |
322 |
308 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-OOM-0008 |
323 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0008 |
309 //! @SYMTestCaseDesc Test the Set API for manipulating supported OID list for correct behaviour. |
324 //! @SYMTestCaseDesc Test the Set API for manipulating supported OID list for correct behaviour. |
310 //! @SYMCR 1399 |
325 //! @SYMCR 1399 |
311 //! @SYMTestPriority Critical |
326 //! @SYMTestPriority Critical |
312 //! @SYMTestActions OOM loop around steps 1 to 9: |
327 //! @SYMTestActions OOM loop around steps 1 to 9: |
313 //! 1) Construct the certificate chain. |
328 //! 1) Construct the certificate chain. |
314 //! 2) Set an empty collection of OIDs through CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
329 //! 2) Set an empty collection of OIDs through CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
315 //! 3) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
330 //! 3) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
316 //! 4) Set a collection of non empty (one new OID and one default OID removed) collection of OIDs through CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
331 //! 4) Set a collection of non empty (one new OID and one default OID removed) collection of OIDs through CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
317 //! 5) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
332 //! 5) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
318 //! 6) Set the same collection of OIDs as is currently supported through CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
333 //! 6) Set the same collection of OIDs as is currently supported through CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
319 //! 7) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
334 //! 7) Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL(). |
320 //! 8) Set a collection of OIDs containing internal duplicates through CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
335 //! 8) Set a collection of OIDs containing internal duplicates through CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
321 //! 9) Cleanup the certificate chain and utility classes. |
336 //! 9) Cleanup the certificate chain and utility classes. |
322 //! @SYMTestExpectedResults There should be no memory leaks at any stage. |
337 //! @SYMTestExpectedResults There should be no memory leaks at any stage. |
323 //! @SYMTestType CIT |
338 //! @SYMTestType CIT |
324 //! @SYMTestPurpose Ensure supported OID list is updated correctly, the result contains no duplicates and no errors are reported. |
339 //! @SYMTestPurpose Ensure supported OID list is updated correctly, the result contains no duplicates and no errors are reported. |
325 START_TESTCASE SEC-CERTMAN-CRITEXT-OOM-0008 |
340 START_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0008 |
326 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNoOids |
341 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNoOids |
327 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomOneAddedOneRemoved |
342 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomOneAddedOneRemoved |
328 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomCurrentlySupported |
343 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomCurrentlySupported |
329 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomOidsWithDuplicates |
344 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomOidsWithDuplicates |
330 END_TESTCASE SEC-CERTMAN-CRITEXT-OOM-0008 |
345 END_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0008 |
331 |
346 |
332 |
347 |
333 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0009 |
348 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-CRITEXT-0009 |
334 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
349 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
|
350 //! @SYMCR 1399 |
|
351 //! @SYMTestPriority Critical |
|
352 //! @SYMTestActions 1) Construct the certificate chain. |
|
353 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
|
354 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KExtendedKeyUsage is not set. |
|
355 //! 4) Ensure the correct error value is returned |
|
356 //! 5) Cleanup the certificate chain and utility classes. |
|
357 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
|
358 //! @SYMTestType CIT |
|
359 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
|
360 START_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0009 |
|
361 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_ExtendedKeyUsage |
|
362 END_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0009 |
|
363 |
|
364 |
|
365 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-CRITEXT-0010 |
|
366 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
|
367 //! @SYMCR 1399 |
|
368 //! @SYMTestPriority Critical |
|
369 //! @SYMTestActions 1) Construct the certificate chain. |
|
370 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
|
371 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KPolicyMapping is not set. |
|
372 //! 4) Ensure the correct error value is returned |
|
373 //! 5) Cleanup the certificate chain and utility classes. |
|
374 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
|
375 //! @SYMTestType CIT |
|
376 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
|
377 START_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0010 |
|
378 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_PolicyMapping |
|
379 END_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0010 |
|
380 |
|
381 |
|
382 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-CRITEXT-0011 |
|
383 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
|
384 //! @SYMCR 1399 |
|
385 //! @SYMTestPriority Critical |
|
386 //! @SYMTestActions 1) Construct the certificate chain. |
|
387 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
|
388 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KDeviceListConstraint is not set. |
|
389 //! 4) Ensure the correct error value is returned |
|
390 //! 5) Cleanup the certificate chain and utility classes. |
|
391 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
|
392 //! @SYMTestType CIT |
|
393 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
|
394 START_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0011 |
|
395 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_DeviceIdListConstraint |
|
396 END_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0011 |
|
397 |
|
398 |
|
399 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-CRITEXT-0012 |
|
400 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
|
401 //! @SYMCR 1399 |
|
402 //! @SYMTestPriority Critical |
|
403 //! @SYMTestActions 1) Construct the certificate chain. |
|
404 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
|
405 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KSidListConstraint is not set. |
|
406 //! 4) Ensure the correct error value is returned |
|
407 //! 5) Cleanup the certificate chain and utility classes. |
|
408 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
|
409 //! @SYMTestType CIT |
|
410 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
|
411 START_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0012 |
|
412 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_SidListConstraint |
|
413 END_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0012 |
|
414 |
|
415 |
|
416 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-CRITEXT-0013 |
|
417 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
|
418 //! @SYMCR 1399 |
|
419 //! @SYMTestPriority Critical |
|
420 //! @SYMTestActions 1) Construct the certificate chain. |
|
421 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
|
422 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KVidListConstraint is not set. |
|
423 //! 4) Ensure the correct error value is returned |
|
424 //! 5) Cleanup the certificate chain and utility classes. |
|
425 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
|
426 //! @SYMTestType CIT |
|
427 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
|
428 START_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0013 |
|
429 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_VidListConstraint |
|
430 END_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0013 |
|
431 |
|
432 |
|
433 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-CRITEXT-0014 |
|
434 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
|
435 //! @SYMCR 1399 |
|
436 //! @SYMTestPriority Critical |
|
437 //! @SYMTestActions 1) Construct the certificate chain. |
|
438 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
|
439 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KCapabilitiesConstraint is not set. |
|
440 //! 4) Ensure the correct error value is returned |
|
441 //! 5) Cleanup the certificate chain and utility classes. |
|
442 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
|
443 //! @SYMTestType CIT |
|
444 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
|
445 START_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0014 |
|
446 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_CapabilitiesConstraint |
|
447 END_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0014 |
|
448 |
|
449 |
|
450 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-CRITEXT-0015 |
|
451 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
335 //! @SYMCR 1399 |
452 //! @SYMCR 1399 |
336 //! @SYMTestPriority Critical |
453 //! @SYMTestPriority Critical |
337 //! @SYMTestActions 1) Construct the certificate chain. |
454 //! @SYMTestActions 1) Construct the certificate chain. |
338 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
455 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
339 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KExtendedKeyUsage is not set. |
456 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KCertPolicies is not set. |
340 //! 4) Ensure the correct error value is returned |
457 //! 4) Ensure the correct error value is returned |
341 //! 5) Cleanup the certificate chain and utility classes. |
458 //! 5) Cleanup the certificate chain and utility classes. |
342 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
459 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
343 //! @SYMTestType CIT |
460 //! @SYMTestType CIT |
344 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
461 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
345 START_TESTCASE SEC-CERTMAN-CRITEXT-0009 |
462 START_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0015 |
346 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_ExtendedKeyUsage |
|
347 END_TESTCASE SEC-CERTMAN-CRITEXT-0009 |
|
348 |
|
349 |
|
350 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0010 |
|
351 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
|
352 //! @SYMCR 1399 |
|
353 //! @SYMTestPriority Critical |
|
354 //! @SYMTestActions 1) Construct the certificate chain. |
|
355 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
|
356 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KPolicyMapping is not set. |
|
357 //! 4) Ensure the correct error value is returned |
|
358 //! 5) Cleanup the certificate chain and utility classes. |
|
359 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
|
360 //! @SYMTestType CIT |
|
361 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
|
362 START_TESTCASE SEC-CERTMAN-CRITEXT-0010 |
|
363 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_PolicyMapping |
|
364 END_TESTCASE SEC-CERTMAN-CRITEXT-0010 |
|
365 |
|
366 |
|
367 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0011 |
|
368 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
|
369 //! @SYMCR 1399 |
|
370 //! @SYMTestPriority Critical |
|
371 //! @SYMTestActions 1) Construct the certificate chain. |
|
372 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
|
373 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KDeviceListConstraint is not set. |
|
374 //! 4) Ensure the correct error value is returned |
|
375 //! 5) Cleanup the certificate chain and utility classes. |
|
376 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
|
377 //! @SYMTestType CIT |
|
378 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
|
379 START_TESTCASE SEC-CERTMAN-CRITEXT-0011 |
|
380 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_DeviceIdListConstraint |
|
381 END_TESTCASE SEC-CERTMAN-CRITEXT-0011 |
|
382 |
|
383 |
|
384 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0012 |
|
385 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
|
386 //! @SYMCR 1399 |
|
387 //! @SYMTestPriority Critical |
|
388 //! @SYMTestActions 1) Construct the certificate chain. |
|
389 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
|
390 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KSidListConstraint is not set. |
|
391 //! 4) Ensure the correct error value is returned |
|
392 //! 5) Cleanup the certificate chain and utility classes. |
|
393 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
|
394 //! @SYMTestType CIT |
|
395 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
|
396 START_TESTCASE SEC-CERTMAN-CRITEXT-0012 |
|
397 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_SidListConstraint |
|
398 END_TESTCASE SEC-CERTMAN-CRITEXT-0012 |
|
399 |
|
400 |
|
401 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0013 |
|
402 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
|
403 //! @SYMCR 1399 |
|
404 //! @SYMTestPriority Critical |
|
405 //! @SYMTestActions 1) Construct the certificate chain. |
|
406 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
|
407 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KVidListConstraint is not set. |
|
408 //! 4) Ensure the correct error value is returned |
|
409 //! 5) Cleanup the certificate chain and utility classes. |
|
410 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
|
411 //! @SYMTestType CIT |
|
412 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
|
413 START_TESTCASE SEC-CERTMAN-CRITEXT-0013 |
|
414 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_VidListConstraint |
|
415 END_TESTCASE SEC-CERTMAN-CRITEXT-0013 |
|
416 |
|
417 |
|
418 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0014 |
|
419 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
|
420 //! @SYMCR 1399 |
|
421 //! @SYMTestPriority Critical |
|
422 //! @SYMTestActions 1) Construct the certificate chain. |
|
423 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
|
424 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KCapabilitiesConstraint is not set. |
|
425 //! 4) Ensure the correct error value is returned |
|
426 //! 5) Cleanup the certificate chain and utility classes. |
|
427 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
|
428 //! @SYMTestType CIT |
|
429 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
|
430 START_TESTCASE SEC-CERTMAN-CRITEXT-0014 |
|
431 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_CapabilitiesConstraint |
|
432 END_TESTCASE SEC-CERTMAN-CRITEXT-0014 |
|
433 |
|
434 |
|
435 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0015 |
|
436 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
|
437 //! @SYMCR 1399 |
|
438 //! @SYMTestPriority Critical |
|
439 //! @SYMTestActions 1) Construct the certificate chain. |
|
440 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
|
441 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KCertPolicies is not set. |
|
442 //! 4) Ensure the correct error value is returned |
|
443 //! 5) Cleanup the certificate chain and utility classes. |
|
444 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
|
445 //! @SYMTestType CIT |
|
446 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
|
447 START_TESTCASE SEC-CERTMAN-CRITEXT-0015 |
|
448 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_CertPolicies |
463 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_CertPolicies |
449 END_TESTCASE SEC-CERTMAN-CRITEXT-0015 |
464 END_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0015 |
450 |
465 |
451 |
466 |
452 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0016 |
467 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-CRITEXT-0016 |
453 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
468 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
454 //! @SYMCR 1399 |
469 //! @SYMCR 1399 |
455 //! @SYMTestPriority Critical |
470 //! @SYMTestPriority Critical |
456 //! @SYMTestActions 1) Construct the certificate chain. |
471 //! @SYMTestActions 1) Construct the certificate chain. |
457 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
472 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
458 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KPolicyConstraints is not set. |
473 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KPolicyConstraints is not set. |
459 //! 4) Ensure the correct error value is returned |
474 //! 4) Ensure the correct error value is returned |
460 //! 5) Cleanup the certificate chain and utility classes. |
475 //! 5) Cleanup the certificate chain and utility classes. |
461 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
476 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
462 //! @SYMTestType CIT |
477 //! @SYMTestType CIT |
463 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
478 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
464 START_TESTCASE SEC-CERTMAN-CRITEXT-0016 |
479 START_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0016 |
465 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_PolicyConstraint |
480 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_PolicyConstraint |
466 END_TESTCASE SEC-CERTMAN-CRITEXT-0016 |
481 END_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0016 |
467 |
482 |
468 |
483 |
469 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0017 |
484 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-CRITEXT-0017 |
470 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
485 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
471 //! @SYMCR 1399 |
486 //! @SYMCR 1399 |
472 //! @SYMTestPriority Critical |
487 //! @SYMTestPriority Critical |
473 //! @SYMTestActions 1) Construct the certificate chain. |
488 //! @SYMTestActions 1) Construct the certificate chain. |
474 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
489 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
475 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KNameConstraints is not set. |
490 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KNameConstraints is not set. |
476 //! 4) Ensure the correct error value is returned |
491 //! 4) Ensure the correct error value is returned |
477 //! 5) Cleanup the certificate chain and utility classes. |
492 //! 5) Cleanup the certificate chain and utility classes. |
478 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
493 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
479 //! @SYMTestType CIT |
494 //! @SYMTestType CIT |
480 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
495 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
481 START_TESTCASE SEC-CERTMAN-CRITEXT-0017 |
496 START_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0017 |
482 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_NameConstraint |
497 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_NameConstraint |
483 END_TESTCASE SEC-CERTMAN-CRITEXT-0017 |
498 END_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0017 |
484 |
499 |
485 |
500 |
486 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0018 |
501 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-CRITEXT-0018 |
487 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
502 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
488 //! @SYMCR 1399 |
503 //! @SYMCR 1399 |
489 //! @SYMTestPriority Critical |
504 //! @SYMTestPriority Critical |
490 //! @SYMTestActions 1) Construct the certificate chain. |
505 //! @SYMTestActions 1) Construct the certificate chain. |
491 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
506 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
492 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KBasicConstraints is not set. |
507 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KBasicConstraints is not set. |
493 //! 4) Ensure the correct error value is returned |
508 //! 4) Ensure the correct error value is returned |
494 //! 5) Cleanup the certificate chain and utility classes. |
509 //! 5) Cleanup the certificate chain and utility classes. |
495 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
510 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
496 //! @SYMTestType CIT |
511 //! @SYMTestType CIT |
497 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
512 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
498 START_TESTCASE SEC-CERTMAN-CRITEXT-0018 |
513 START_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0018 |
499 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_BasicConstraint |
514 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_BasicConstraint |
500 END_TESTCASE SEC-CERTMAN-CRITEXT-0018 |
515 END_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0018 |
501 |
516 |
502 |
517 |
503 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0019 |
518 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-CRITEXT-0019 |
504 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
519 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
505 //! @SYMCR 1399 |
520 //! @SYMCR 1399 |
506 //! @SYMTestPriority Critical |
521 //! @SYMTestPriority Critical |
507 //! @SYMTestActions 1) Construct the certificate chain. |
522 //! @SYMTestActions 1) Construct the certificate chain. |
508 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
523 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
509 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KKeyUsage is not set. |
524 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KKeyUsage is not set. |
510 //! 4) Ensure the correct error value is returned |
525 //! 4) Ensure the correct error value is returned |
511 //! 5) Cleanup the certificate chain and utility classes. |
526 //! 5) Cleanup the certificate chain and utility classes. |
512 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
527 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
513 //! @SYMTestType CIT |
528 //! @SYMTestType CIT |
514 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
529 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
515 START_TESTCASE SEC-CERTMAN-CRITEXT-0019 |
530 START_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0019 |
516 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_KeyUsage |
531 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_KeyUsage |
517 END_TESTCASE SEC-CERTMAN-CRITEXT-0019 |
532 END_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0019 |
518 |
533 |
519 |
534 |
520 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0020 |
535 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-CRITEXT-0020 |
521 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
536 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
522 //! @SYMCR 1399 |
537 //! @SYMCR 1399 |
523 //! @SYMTestPriority Critical |
538 //! @SYMTestPriority Critical |
524 //! @SYMTestActions 1) Construct the certificate chain. |
539 //! @SYMTestActions 1) Construct the certificate chain. |
525 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
540 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
526 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KSubjectAltName is not set. |
541 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KSubjectAltName is not set. |
527 //! 4) Ensure the correct error value is returned |
542 //! 4) Ensure the correct error value is returned |
528 //! 5) Cleanup the certificate chain and utility classes. |
543 //! 5) Cleanup the certificate chain and utility classes. |
529 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
544 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
530 //! @SYMTestType CIT |
545 //! @SYMTestType CIT |
531 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
546 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
532 START_TESTCASE SEC-CERTMAN-CRITEXT-0020 |
547 START_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0020 |
533 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_SubjectAltName |
548 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_SubjectAltName |
534 END_TESTCASE SEC-CERTMAN-CRITEXT-0020 |
549 END_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0020 |
535 |
550 |
536 |
551 |
537 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0021 |
552 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-CRITEXT-0021 |
538 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
553 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
539 //! @SYMCR 1399 |
554 //! @SYMCR 1399 |
540 //! @SYMTestPriority Critical |
555 //! @SYMTestPriority Critical |
541 //! @SYMTestActions 1) Construct the certificate chain. |
556 //! @SYMTestActions 1) Construct the certificate chain. |
542 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
557 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
543 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KInhibitAnyPolicy is not set. |
558 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KInhibitAnyPolicy is not set. |
544 //! 4) Ensure the correct error value is returned |
559 //! 4) Ensure the correct error value is returned |
545 //! 5) Cleanup the certificate chain and utility classes. |
560 //! 5) Cleanup the certificate chain and utility classes. |
546 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
561 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
547 //! @SYMTestType CIT |
562 //! @SYMTestType CIT |
548 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
563 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
549 START_TESTCASE SEC-CERTMAN-CRITEXT-0021 |
564 START_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0021 |
550 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_InhibitAnyPolicy |
565 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_InhibitAnyPolicy |
551 END_TESTCASE SEC-CERTMAN-CRITEXT-0021 |
566 END_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0021 |
552 |
567 |
553 |
568 |
554 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0022 |
569 //! @SYMTestCaseID SEC-CERTMAN-PKIXCERT-CRITEXT-0022 |
555 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
570 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly. |
556 //! @SYMCR 1399 |
571 //! @SYMCR 1399 |
557 //! @SYMTestPriority Critical |
572 //! @SYMTestPriority Critical |
558 //! @SYMTestActions 1) Construct the certificate chain. |
573 //! @SYMTestActions 1) Construct the certificate chain. |
559 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
574 //! 2) Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). |
560 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KTestOid is not set. |
575 //! 3) Call CPKIXCertChain::ValidateL(). The default OID value for KTestOid is not set. |
561 //! 4) Ensure the correct error value is returned |
576 //! 4) Ensure the correct error value is returned |
562 //! 5) Cleanup the certificate chain and utility classes. |
577 //! 5) Cleanup the certificate chain and utility classes. |
563 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
578 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension |
564 //! @SYMTestType CIT |
579 //! @SYMTestType CIT |
565 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
580 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise. |
566 START_TESTCASE SEC-CERTMAN-CRITEXT-0022 |
581 START_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0022 |
567 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_TestOid |
582 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_TestOid |
568 END_TESTCASE SEC-CERTMAN-CRITEXT-0022 |
583 END_TESTCASE SEC-CERTMAN-PKIXCERT-CRITEXT-0022 |