cryptoservices/certificateandkeymgmt/tpkixcert_tef/scripts/tpkixcert_tef.script
changeset 8 35751d3474b7
parent 0 2c201484c85f
child 19 ece3df019add
equal deleted inserted replaced
2:675a964f4eb5 8:35751d3474b7
    11 //
    11 //
    12 // Contributors:
    12 // Contributors:
    13 //
    13 //
    14 // Description: 
    14 // Description: 
    15 //
    15 //
       
    16 //
       
    17 // Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
       
    18 // All rights reserved.
       
    19 // This component and the accompanying materials are made available
       
    20 // under the terms of the License "Symbian Foundation License v1.0"
       
    21 // which accompanies this distribution, and is available
       
    22 // at the URL "http://www.symbianfoundation.org/legal/sfl-v10.html".
       
    23 //
       
    24 // Initial Contributors:
       
    25 // Nokia Corporation - initial contribution.
       
    26 //
       
    27 // Contributors:
       
    28 //
       
    29 // Description:
       
    30 //
    16 //! @file
    31 //! @file
    17 //! @SYMTestSuiteName SEC-CERTMAN
    32 //! @SYMTestSuiteName SEC-CERTMAN
    18 //! @SYMScriptTestEnvironment The script has no specific test environment requirements. 
    33 //! @SYMScriptTestEnvironment The script has no specific test environment requirements. 
    19 //! @SYMScriptPurpose Test the published API functions of CPKIXCertChain.
    34 //! @SYMScriptPurpose Test the published API functions of CPKIXCertChain.
    20 
    35 
    21 LOAD_SUITE tpkixcert_tefserver
    36 LOAD_SUITE tpkixcert_tefserver
    22 
    37 
    23 
    38 
    24 //! @SYMTestCaseID SEC-CERTMAN-DATETIME-0001
    39 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-DATETIME-0001
    25 //! @SYMTestCaseDesc Testing CPKIXCertChain date and time checking behaviour during certificate validation.
    40 //! @SYMTestCaseDesc 		Testing CPKIXCertChain date and time checking behaviour during certificate validation.
    26 //! @SYMCR 1240
    41 //! @SYMCR 			1240
    27 //! @SYMTestPriority Critical
    42 //! @SYMTestPriority 		Critical
    28 //! @SYMTestActions 1)	Construct the certificate chain. 
    43 //! @SYMTestActions 		1)	Construct the certificate chain. 
    29 //! 			2)	Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has expired.  
    44 //! 				2) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has expired.  
    30 //! 			3)	Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in EFalse.  
    45 //! 				3) Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in EFalse.  
    31 //! 			4)	Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has expired.  
    46 //! 				4) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has expired.  
    32 //! 			5)	Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in ETrue. 
    47 //! 				5) Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in ETrue. 
    33 //! 			6)	Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has expired.  
    48 //! 				6) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has expired.  
    34 //! 			7)	Cleanup the certificate chain and utility classes. 
    49 //! 				7) Cleanup the certificate chain and utility classes. 
    35 //! @SYMTestExpectedResults Calls 2 and 6 should fail with EDateOutOfRange.  Call 4 should pass with EValidatedOK but report the warning EDateOutOfRange through both the old warnings API(CPKIXValidationResult::Warnings()) and the new one(CCertificateWarning::Warnings()).
    50 //! @SYMTestExpectedResults 	Calls 2 and 6 should fail with EDateOutOfRange.  Call 4 should pass with EValidatedOK but report the warning EDateOutOfRange through both the old warnings API(CPKIXValidationResult::Warnings()) and the new one(CCertificateWarning::Warnings()).
    36 //! @SYMTestType CIT
    51 //! @SYMTestType 		CIT
    37 //! @SYMTestPurpose 1)	Check that current behaviour has not been altered and we still fail to validate out of date certificate chains.  
    52 //! @SYMTestPurpose 		1) Check that current behaviour has not been altered and we still fail to validate out of date certificate chains.  
    38 //! 			2)	Check that new behaviour works correctly by allowing a certificate chain with an invalid date to validate successfully when explicitly told to.  
    53 //! 				2) Check that new behaviour works correctly by allowing a certificate chain with an invalid date to validate successfully when explicitly told to.  
    39 //! 			3)	Then ensure this has left the system in the correct state to maintain normal behaviour.
    54 //! 				3) Then ensure this has left the system in the correct state to maintain normal behaviour.
    40 START_TESTCASE SEC-CERTMAN-DATETIME-0001
    55 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-DATETIME-0001
    41 RUN_TEST_STEP 100 tpkixcert_tefserver DateTimeFatalValidateTest c:\tpkixcert_tef\scripts\validatetests.ini ExpiredDateTime
    56 RUN_TEST_STEP 100 tpkixcert_tefserver DateTimeFatalValidateTest c:\tpkixcert_tef\scripts\validatetests.ini ExpiredDateTime
    42 END_TESTCASE SEC-CERTMAN-DATETIME-0001
    57 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-DATETIME-0001
    43 
    58 
    44 
    59 
    45 //! @SYMTestCaseID SEC-CERTMAN-DATETIME-0002
    60 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-DATETIME-0002
    46 //! @SYMTestCaseDesc Testing CPKIXCertChain date and time checking behaviour during certificate validation.
    61 //! @SYMTestCaseDesc 		TestingCPKIXCertChain date and time checking behaviour during certificate validation.
    47 //! @SYMCR 1240
    62 //! @SYMCR 			1240
    48 //! @SYMTestPriority Critical
    63 //! @SYMTestPriority 		Critical
    49 //! @SYMTestActions 1)	Construct the certificate chain. 
    64 //! @SYMTestActions 		1)	Construct the certificate chain. 
    50 //! 			2)	Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has not yet become valid.  
    65 //! 				2) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has not yet become valid.  
    51 //! 			3)	Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in EFalse.  
    66 //! 				3) Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in EFalse.  
    52 //! 			4)	Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has not yet become valid.  
    67 //! 				4) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has not yet become valid.  
    53 //! 			5)	Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in ETrue. 
    68 //! 				5) Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in ETrue. 
    54 //! 			6)	Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has not yet become valid.  
    69 //! 				6) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has not yet become valid.  
    55 //! 			7)	Cleanup the certificate chain and utility classes. 
    70 //! 				7) Cleanup the certificate chain and utility classes. 
    56 //! @SYMTestExpectedResults Calls 2 and 6 should fail with EDateOutOfRange.  Call 4 should pass with EValidatedOK but report the warning EDateOutOfRange through both the old warnings API(CPKIXValidationResult::Warnings()) and the new one(CCertificateWarning::Warnings()).
    71 //! @SYMTestExpectedResults 	Calls 2 and 6 should fail with EDateOutOfRange.  Call 4 should pass with EValidatedOK but report the warning EDateOutOfRange through both the old warnings API(CPKIXValidationResult::Warnings()) and the new one(CCertificateWarning::Warnings()).
    57 //! @SYMTestType CIT
    72 //! @SYMTestType 		CIT
    58 //! @SYMTestPurpose 1)	Check that current behaviour has not been altered and we still fail to validate out of date certificate chains.  
    73 //! @SYMTestPurpose 		1) Check that current behaviour has not been altered and we still fail to validate out of date certificate chains.  
    59 //! 			2)	Check that new behaviour works correctly by allowing a certificate chain with an invalid date to validate successfully when explicitly told to.  
    74 //! 				2) Check that new behaviour works correctly by allowing a certificate chain with an invalid date to validate successfully when explicitly told to.  
    60 //! 			3)	Then ensure this has left the system in the correct state to maintain normal behaviour.
    75 //! 				3) Then ensure this has left the system in the correct state to maintain normal behaviour.
    61 START_TESTCASE SEC-CERTMAN-DATETIME-0002
    76 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-DATETIME-0002
    62 RUN_TEST_STEP 100 tpkixcert_tefserver DateTimeFatalValidateTest c:\tpkixcert_tef\scripts\validatetests.ini InvalidDateTime
    77 RUN_TEST_STEP 100 tpkixcert_tefserver DateTimeFatalValidateTest c:\tpkixcert_tef\scripts\validatetests.ini InvalidDateTime
    63 END_TESTCASE SEC-CERTMAN-DATETIME-0002
    78 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-DATETIME-0002
    64 
    79 
    65 
    80 
    66 //! @SYMTestCaseID SEC-CERTMAN-DATETIME-0003
    81 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-DATETIME-0003
    67 //! @SYMTestCaseDesc Testing CPKIXCertChain date and time checking behaviour during certificate validation.
    82 //! @SYMTestCaseDesc 		TestingCPKIXCertChain date and time checking behaviour during certificate validation.
    68 //! @SYMCR 1240
    83 //! @SYMCR 			1240
    69 //! @SYMTestPriority Critical
    84 //! @SYMTestPriority 		Critical
    70 //! @SYMTestActions 1)	Construct the certificate chain. 
    85 //! @SYMTestActions 		1)	Construct the certificate chain. 
    71 //! 			2)	Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain is valid.  
    86 //! 				2) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain is valid.  
    72 //! 			3)	Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in EFalse.  
    87 //! 				3) Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in EFalse.  
    73 //! 			4)	Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain is valid.  
    88 //! 				4) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain is valid.  
    74 //! 			5)	Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in ETrue. 
    89 //! 				5) Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in ETrue. 
    75 //! 			6)	Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain is valid.  
    90 //! 				6) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain is valid.  
    76 //! 			7)	Cleanup the certificate chain and utility classes. 
    91 //! 				7) Cleanup the certificate chain and utility classes. 
    77 //! @SYMTestExpectedResults Calls 2, 4 and 6 should validate successfully with EValidatedOK.
    92 //! @SYMTestExpectedResults 	Calls 2, 4 and 6 should validate successfully with EValidatedOK.
    78 //! @SYMTestType CIT
    93 //! @SYMTestType 		CIT
    79 //! @SYMTestPurpose 1)	Check that current behaviour has not been altered and we still fail to validate out of date certificate chains.  
    94 //! @SYMTestPurpose 		1) Check that current behaviour has not been altered and we still fail to validate out of date certificate chains.  
    80 //! 			2)	Check that new behaviour works correctly by allowing a certificate chain with an invalid date to validate successfully when explicitly told to.  
    95 //! 				2) Check that new behaviour works correctly by allowing a certificate chain with an invalid date to validate successfully when explicitly told to.  
    81 //! 			3)	Then ensure this has left the system in the correct state to maintain normal behaviour.
    96 //! 				3) Then ensure this has left the system in the correct state to maintain normal behaviour.
    82 START_TESTCASE SEC-CERTMAN-DATETIME-0003
    97 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-DATETIME-0003
    83 RUN_TEST_STEP 100 tpkixcert_tefserver DateTimeFatalValidateTest c:\tpkixcert_tef\scripts\validatetests.ini ValidDateTime
    98 RUN_TEST_STEP 100 tpkixcert_tefserver DateTimeFatalValidateTest c:\tpkixcert_tef\scripts\validatetests.ini ValidDateTime
    84 END_TESTCASE SEC-CERTMAN-DATETIME-0003
    99 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-DATETIME-0003
    85 
   100 
    86 
   101 
    87 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0001
   102 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0001
    88 //! @SYMTestCaseDesc Test correct behaviour of customisable supported critical extension processing.
   103 //! @SYMTestCaseDesc 		Test correct behaviour of customisable supported critical extension processing.
    89 //! @SYMCR 1399
   104 //! @SYMCR 1399
    90 //! @SYMTestPriority Critical
   105 //! @SYMTestPriority 		Critical
    91 //! @SYMTestActions 1)	Construct the certificate chain.
   106 //! @SYMTestActions 		1) Construct the certificate chain.
    92 //! 			2)	Set the supported OID list to the default OIDs and the new ones through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). 
   107 //! 				2) Set the supported OID list to the default OIDs and the new ones through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). 
    93 //! 			3)	Call CPKIXCertChain::ValidateL(). 
   108 //! 				3) Call CPKIXCertChain::ValidateL(). 
    94 //! 			4)	Ensure all critical extensions encountered are supported and that the certificate and certificate index information in the results match up with the correct certificates. 
   109 //! 				4) Ensure all critical extensions encountered are supported and that the certificate and certificate index information in the results match up with the correct certificates. 
    95 //! 			5)	Cleanup the certificate chain and utility classes. 
   110 //! 				5) Cleanup the certificate chain and utility classes. 
    96 //! @SYMTestExpectedResults Chain should validate successfully.  All critical extensions should be reported through the new certificate warnings API (CCertificateWarning::CriticalExtensionsFound()).
   111 //! @SYMTestExpectedResults 	Chain should validate successfully.  All critical extensions should be reported through the new certificate warnings API (CCertificateWarning::CriticalExtensionsFound()).
    97 //! @SYMTestType CIT
   112 //! @SYMTestType 		CIT
    98 //! @SYMTestPurpose Test we correctly report the full gamut of possible critical extension patterns we may be expected to deal with in a certificate chain – multiple extensions in one certificate, multiple extensions spanning multiple certificates and the same extension in multiple certificates.
   113 //! @SYMTestPurpose 		Test we correctly report the full gamut of possible critical extension patterns we may be expected to deal with in a certificate chain – multiple extensions in one certificate, multiple extensions spanning multiple certificates and the same extension in multiple certificates.
    99 START_TESTCASE SEC-CERTMAN-CRITEXT-0001
   114 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0001
   100 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini CustomCriticalExts
   115 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini CustomCriticalExts
   101 END_TESTCASE SEC-CERTMAN-CRITEXT-0001
   116 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0001
   102 
   117 
   103 
   118 
   104 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0002
   119 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0002
   105 //! @SYMTestCaseDesc Test old and new warnings API for consistency and backwards compatibility.
   120 //! @SYMTestCaseDesc 		Test old and new warnings API for consistency and backwards compatibility.
   106 //! @SYMCR 1399
   121 //! @SYMCR 			1399
   107 //! @SYMTestPriority Critical
   122 //! @SYMTestPriority 		Critical
   108 //! @SYMTestActions 1)	Construct the certificate chain.  
   123 //! @SYMTestActions 		1)	Construct the certificate chain.  
   109 //! 			2)	Set the supported OID list to the default OIDs and the new ones through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().  
   124 //! 				2)	Set the supported OID list to the default OIDs and the new ones through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().  
   110 //! 			3)	Call CPKIXCertChain::ValidateL().  
   125 //! 				3) 	Call CPKIXCertChain::ValidateL().  
   111 //! 			4)	Compare resultant warnings.  
   126 //! 				4)	Compare resultant warnings.  
   112 //! 			5)	Cleanup the certificate chain and utility classes. 
   127 //! 				5)	Cleanup the certificate chain and utility classes. 
   113 //! @SYMTestExpectedResults Chain should validate successfully.  Each of the recognised critical extensions should be reported both as a warning through the old warnings return and through the new API CCertificateWarning::CriticalExtensionsFound().  CCertificateWarning::Warnings() should contain the other warnings found in CPKIXValidationResult::Warnings().  The new returns mechanism should have no additional warnings.
   128 //! @SYMTestExpectedResults 	Chain should validate successfully.  Each of the recognised critical extensions should be reported both as a warning through the old warnings return and through the new API CCertificateWarning::CriticalExtensionsFound().  CCertificateWarning::Warnings() should contain the other warnings found in CPKIXValidationResult::Warnings().  The new returns mechanism should have no additional warnings.
   114 //! @SYMTestType CIT
   129 //! @SYMTestType 		CIT
   115 //! @SYMTestPurpose Ensure backwards compatibility of old style warning reporting and ensure the new warning returns match up with this.
   130 //! @SYMTestPurpose 		Ensure backwards compatibility of old style warning reporting and ensure the new warning returns match up with this.
   116 START_TESTCASE SEC-CERTMAN-CRITEXT-0002
   131 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0002
   117 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Warnings
   132 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Warnings
   118 END_TESTCASE SEC-CERTMAN-CRITEXT-0002
   133 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0002
   119 
   134 
   120 
   135 
   121 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0003
   136 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0003
   122 //! @SYMTestCaseDesc Check supported OID list processing resilience.
   137 //! @SYMTestCaseDesc 		Check supported OID list processing resilience.
   123 //! @SYMCR 1399
   138 //! @SYMCR 			1399
   124 //! @SYMTestPriority Critical
   139 //! @SYMTestPriority 		Critical
   125 //! @SYMTestActions 1)	Construct certificate chain.
   140 //! @SYMTestActions 		1)	Construct certificate chain.
   126 //! 			2)	Set the supported OID list to the default OIDs and a new invalid format OID through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
   141 //! 				2)	Set the supported OID list to the default OIDs and a new invalid format OID through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
   127 //! 			3)	Call CPKIXCertChain::ValidateL(). 
   142 //! 				3)	Call CPKIXCertChain::ValidateL(). 
   128 //! 			4) 	Cleanup the certificate chain and utility classes. 
   143 //! 				4) 	Cleanup the certificate chain and utility classes. 
   129 //! @SYMTestExpectedResults Chain should validate successfully with EValidatedOK with expected warnings returned.
   144 //! @SYMTestExpectedResults 	Chain should validate successfully with EValidatedOK with expected warnings returned.
   130 //! @SYMTestType CIT
   145 //! @SYMTestType 		CIT
   131 //! @SYMTestPurpose Check the code is resilient to badly formed OID data being passed in to the supported OID list.
   146 //! @SYMTestPurpose 		Check the code is resilient to badly formed OID data being passed in to the supported OID list.
   132 START_TESTCASE SEC-CERTMAN-CRITEXT-0003
   147 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0003
   133 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini BadOidValue
   148 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini BadOidValue
   134 END_TESTCASE SEC-CERTMAN-CRITEXT-0003
   149 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0003
   135 
   150 
   136 
   151 
   137 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0004
   152 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0004
   138 //! @SYMTestCaseDesc Check supported OID list processing resilience.
   153 //! @SYMTestCaseDesc 		Check supported OID list processing resilience.
   139 //! @SYMCR 1399
   154 //! @SYMCR 			1399
   140 //! @SYMTestPriority Critical
   155 //! @SYMTestPriority 		Critical
   141 //! @SYMTestActions 1)	Construct certificate chain. 
   156 //! @SYMTestActions 		1)	Construct certificate chain. 
   142 //! 			2)	Set the supported OID list to an empty one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().  
   157 //! 				2)	Set the supported OID list to an empty one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().  
   143 //! 			3)	Call CPKIXCertChain::ValidateL(). 
   158 //! 				3) Call CPKIXCertChain::ValidateL(). 
   144 //! 			4)	Cleanup the certificate chain and utility classes. 
   159 //! 				4)	Cleanup the certificate chain and utility classes. 
   145 //! @SYMTestExpectedResults Chain should error with EUnrecognizedCriticalExtension (it is necessary for the CA to contain a critical extension).
   160 //! @SYMTestExpectedResults 	Chain should error with EUnrecognizedCriticalExtension (it is necessary for the CA to contain a critical extension).
   146 //! @SYMTestType CIT
   161 //! @SYMTestType 		CIT
   147 //! @SYMTestPurpose Check the code is resilient to an empty supported OID list.
   162 //! @SYMTestPurpose 		Check the code is resilient to an empty supported OID list.
   148 START_TESTCASE SEC-CERTMAN-CRITEXT-0004
   163 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0004
   149 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini EmptySupportedOidList
   164 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini EmptySupportedOidList
   150 END_TESTCASE SEC-CERTMAN-CRITEXT-0004
   165 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0004
   151 
   166 
   152 
   167 
   153 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0005
   168 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0005
   154 //! @SYMTestCaseDesc Test the Append API for manipulating supported OID list for correct behaviour.
   169 //! @SYMTestCaseDesc 		Test the Append API for manipulating supported OID list for correct behaviour.
   155 //! @SYMCR 1399
   170 //! @SYMCR 			1399
   156 //! @SYMTestPriority Critical
   171 //! @SYMTestPriority 		Critical
   157 //! @SYMTestActions 1)	Construct the certificate chain.  
   172 //! @SYMTestActions 		1)	Construct the certificate chain.  
   158 //! 			2)	Append a collection of new OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL().  
   173 //! 				2)	Append a collection of new OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL().  
   159 //! 			3)	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   174 //! 				3) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   160 //! 			4)	Append a collection of OIDs already in the supported list through CPKIXCertChain::AddSupportedCriticalExtensionsL().   
   175 //! 				4)	Append a collection of OIDs already in the supported list through CPKIXCertChain::AddSupportedCriticalExtensionsL().   
   161 //! 			5)	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   176 //! 				5) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   162 //! 			6)	Append a collection of OIDs with duplicates within the collection.  
   177 //! 				6)	Append a collection of OIDs with duplicates within the collection.  
   163 //! 			7)	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   178 //! 				7) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   164 //! 			8)	Append an empty collection of OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL().  
   179 //! 				8)	Append an empty collection of OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL().  
   165 //! 			9) 	Cleanup the certificate chain and utility classes.  
   180 //! 				9) 	Cleanup the certificate chain and utility classes.  
   166 //! @SYMTestExpectedResults Supported OID list should be updated correctly in each case.
   181 //! @SYMTestExpectedResults 	Supported OID list should be updated correctly in each case.
   167 //! @SYMTestType CIT
   182 //! @SYMTestType 		CIT
   168 //! @SYMTestPurpose Ensure OIDs are added to the supported list, that the result contains no duplicates and no errors are reported.
   183 //! @SYMTestPurpose 		Ensure OIDs are added to the supported list, that the result contains no duplicates and no errors are reported.
   169 START_TESTCASE SEC-CERTMAN-CRITEXT-0005
   184 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0005
   170 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NewOids
   185 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NewOids
   171 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini AlreadySupportedOids
   186 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini AlreadySupportedOids
   172 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OidsWithDuplicates
   187 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OidsWithDuplicates
   173 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NoOids
   188 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NoOids
   174 END_TESTCASE SEC-CERTMAN-CRITEXT-0005
   189 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0005
   175 
   190 
   176 
   191 
   177 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-OOM-0005
   192 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0005
   178 //! @SYMTestCaseDesc Test the Append API for manipulating supported OID list for correct behaviour.
   193 //! @SYMTestCaseDesc 		Test the Append API for manipulating supported OID list for correct behaviour.
   179 //! @SYMCR 1399
   194 //! @SYMCR 			1399
   180 //! @SYMTestPriority Critical
   195 //! @SYMTestPriority 		Critical
   181 //! @SYMTestActions OOM loop around steps 1 to 9:
   196 //! @SYMTestActions 		OOM loop around steps 1 to 9:
   182 //!				1)	Construct the certificate chain.  
   197 //!				1)	Construct the certificate chain.  
   183 //! 			2)	Append a collection of new OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL().  
   198 //! 				2)	Append a collection of new OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL().  
   184 //! 			3)	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   199 //! 				3) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   185 //! 			4)	Append a collection of OIDs already in the supported list through CPKIXCertChain::AddSupportedCriticalExtensionsL().   
   200 //! 				4)	Append a collection of OIDs already in the supported list through CPKIXCertChain::AddSupportedCriticalExtensionsL().   
   186 //! 			5)	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   201 //! 				5) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   187 //! 			6)	Append a collection of OIDs with duplicates within the collection.  
   202 //! 				6)	Append a collection of OIDs with duplicates within the collection.  
   188 //! 			7)	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   203 //! 				7) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   189 //! 			8)	Append an empty collection of OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL().  
   204 //! 				8)	Append an empty collection of OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL().  
   190 //! 			9) 	Cleanup the certificate chain and utility classes.  
   205 //! 				9) 	Cleanup the certificate chain and utility classes.  
   191 //! @SYMTestExpectedResults There should be no memory leaks at any stage.
   206 //! @SYMTestExpectedResults 	There should be no memory leaks at any stage.
   192 //! @SYMTestType CIT
   207 //! @SYMTestType 		CIT
   193 //! @SYMTestPurpose Ensure OIDs are added to the supported list, that the result contains no duplicates and no errors are reported.
   208 //! @SYMTestPurpose		 Ensure OIDs are added to the supported list, that the result contains no duplicates and no errors are reported.
   194 START_TESTCASE SEC-CERTMAN-CRITEXT-OOM-0005
   209 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0005
   195 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNewOids
   210 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNewOids
   196 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomAlreadySupportedOids
   211 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomAlreadySupportedOids
   197 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomOidsWithDuplicates
   212 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomOidsWithDuplicates
   198 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNoOids
   213 RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNoOids
   199 END_TESTCASE SEC-CERTMAN-CRITEXT-OOM-0005
   214 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0005
   200 
   215 
   201 
   216 
   202 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0006
   217 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0006
   203 //! @SYMTestCaseDesc Test the Remove API for manipulating supported OID list for correct behaviour.
   218 //! @SYMTestCaseDesc 		Test the Remove API for manipulating supported OID list for correct behaviour.
   204 //! @SYMCR 1399
   219 //! @SYMCR 1399
   205 //! @SYMTestPriority Critical
   220 //! @SYMTestPriority 		Critical
   206 //! @SYMTestActions 1)	Construct the certificate chain.  
   221 //! @SYMTestActions 		1)	Construct the certificate chain.  
   207 //! 			2)	Remove a collection of OIDs currently supported in the list through CPKIXCertChain::RemoveSupportedCriticalExtensions().  
   222 //! 				2)	Remove a collection of OIDs currently supported in the list through CPKIXCertChain::RemoveSupportedCriticalExtensions().  
   208 //! 			3)	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   223 //! 				3) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   209 //! 			4)	Remove a collection of OIDs not currently supported in the list through CPKIXCertChain::RemoveSupportedCriticalExtensions().   
   224 //! 				4)	Remove a collection of OIDs not currently supported in the list through CPKIXCertChain::RemoveSupportedCriticalExtensions().   
   210 //! 			5)	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   225 //! 				5) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   211 //! 			6)	Remove an empty collection of OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL().  
   226 //! 				6)	Remove an empty collection of OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL().  
   212 //! 			7) 	Cleanup the certificate chain and utility classes.  
   227 //! 				7) 	Cleanup the certificate chain and utility classes.  
   213 //! @SYMTestExpectedResults Supported OID list should be updated correctly in each case.
   228 //! @SYMTestExpectedResults 	Supported OID list should be updated correctly in each case.
   214 //! @SYMTestType CIT
   229 //! @SYMTestType 		CIT
   215 //! @SYMTestPurpose Ensure OIDs are removed from the supported list and no errors are reported.
   230 //! @SYMTestPurpose 		Ensure OIDs are removed from the supported list and no errors are reported.
   216 START_TESTCASE SEC-CERTMAN-CRITEXT-0006
   231 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0006
   217 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NewOids
   232 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NewOids
   218 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini AlreadySupportedOids
   233 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini AlreadySupportedOids
   219 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini SupportedOidsWithDuplicates
   234 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini SupportedOidsWithDuplicates
   220 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NoOids
   235 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NoOids
   221 END_TESTCASE SEC-CERTMAN-CRITEXT-0006
   236 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0006
   222 
   237 
   223 
   238 
   224 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-OOM-0006
   239 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0006
   225 //! @SYMTestCaseDesc Test the Remove API for manipulating supported OID list for correct behaviour.
   240 //! @SYMTestCaseDesc 		Test the Remove API for manipulating supported OID list for correct behaviour.
   226 //! @SYMCR 1399
   241 //! @SYMCR 			1399
   227 //! @SYMTestPriority Critical
   242 //! @SYMTestPriority 		Critical
   228 //! @SYMTestActions OOM loop around steps 1 to 7:
   243 //! @SYMTestActions 		OOM loop around steps 1 to 7:
   229 //!				1)	Construct the certificate chain.  
   244 //!				1)	Construct the certificate chain.  
   230 //! 			2)	Remove a collection of OIDs currently supported in the list through CPKIXCertChain::RemoveSupportedCriticalExtensions().  
   245 //! 				2)	Remove a collection of OIDs currently supported in the list through CPKIXCertChain::RemoveSupportedCriticalExtensions().  
   231 //! 			3)	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   246 //! 				3) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   232 //! 			4)	Remove a collection of OIDs not currently supported in the list through CPKIXCertChain::RemoveSupportedCriticalExtensions().   
   247 //! 				4)	Remove a collection of OIDs not currently supported in the list through CPKIXCertChain::RemoveSupportedCriticalExtensions().   
   233 //! 			5)	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   248 //! 				5) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   234 //! 			6)	Remove an empty collection of OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL().  
   249 //! 				6)	Remove an empty collection of OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL().  
   235 //! 			7) 	Cleanup the certificate chain and utility classes.  
   250 //! 				7) 	Cleanup the certificate chain and utility classes.  
   236 //! @SYMTestExpectedResults There should be no memory leaks at any stage.
   251 //! @SYMTestExpectedResults 	There should be no memory leaks at any stage.
   237 //! @SYMTestType CIT
   252 //! @SYMTestType 		CIT
   238 //! @SYMTestPurpose Ensure OIDs are removed from the supported list and no errors are reported.
   253 //! @SYMTestPurpose 		Ensure OIDs are removed from the supported list and no errors are reported.
   239 START_TESTCASE SEC-CERTMAN-CRITEXT-OOM-0006
   254 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0006
   240 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNewOids
   255 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNewOids
   241 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomAlreadySupportedOids
   256 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomAlreadySupportedOids
   242 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomSupportedOidsWithDuplicates
   257 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomSupportedOidsWithDuplicates
   243 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNoOids
   258 RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNoOids
   244 END_TESTCASE SEC-CERTMAN-CRITEXT-OOM-0006
   259 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0006
   245 
   260 
   246 
   261 
   247 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0007
   262 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0007
   248 //! @SYMTestCaseDesc Test the Reset API for manipulating supported OID list for correct behaviour.
   263 //! @SYMTestCaseDesc 		Test the Reset API for manipulating supported OID list for correct behaviour.
   249 //! @SYMCR 1399
   264 //! @SYMCR 			1399
   250 //! @SYMTestPriority Critical
   265 //! @SYMTestPriority 		Critical
   251 //! @SYMTestActions 1)	Construct the certificate chain.   
   266 //! @SYMTestActions 		1)	Construct the certificate chain.   
   252 //! 			2)	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL() with an empty supported OID list.     
   267 //! 				2) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL() with an empty supported OID list.     
   253 //! 			3)	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL() on a non empty, no default (one new OID added and one default OID removed)
   268 //! 				3) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL() on a non empty, no default (one new OID added and one default OID removed)
   254 //!					supported OID list.  
   269 //!					supported OID list.  
   255 //! 			4) 	Cleanup the certificate chain and utility classes.  
   270 //! 				4) 	Cleanup the certificate chain and utility classes.  
   256 //! @SYMTestExpectedResults Supported OID list should be updated correctly in each case.
   271 //! @SYMTestExpectedResults 	Supported OID list should be updated correctly in each case.
   257 //! @SYMTestType CIT
   272 //! @SYMTestType 		CIT
   258 //! @SYMTestPurpose Ensure the supported OID list is reset to the default values correctly.
   273 //! @SYMTestPurpose 		Ensure the supported OID list is reset to the default values correctly.
   259 START_TESTCASE SEC-CERTMAN-CRITEXT-0007
   274 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0007
   260 RUN_TEST_STEP 100 tpkixcert_tefserver ResetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NoOids
   275 RUN_TEST_STEP 100 tpkixcert_tefserver ResetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NoOids
   261 RUN_TEST_STEP 100 tpkixcert_tefserver ResetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OneAddedOneRemoved
   276 RUN_TEST_STEP 100 tpkixcert_tefserver ResetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OneAddedOneRemoved
   262 END_TESTCASE SEC-CERTMAN-CRITEXT-0007
   277 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0007
   263 
   278 
   264 
   279 
   265 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-OOM-0007
   280 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0007
   266 //! @SYMTestCaseDesc Test the Reset API for manipulating supported OID list for correct behaviour.
   281 //! @SYMTestCaseDesc 		Test the Reset API for manipulating supported OID list for correct behaviour.
   267 //! @SYMCR 1399
   282 //! @SYMCR 			1399
   268 //! @SYMTestPriority Critical
   283 //! @SYMTestPriority 		Critical
   269 //! @SYMTestActions OOM loop around steps 1 to 4:
   284 //! @SYMTestActions 		OOM loop around steps 1 to 4:
   270 //!				1)	Construct the certificate chain.   
   285 //!				1)	Construct the certificate chain.   
   271 //! 			2)	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL() with an empty supported OID list.     
   286 //! 				2) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL() with an empty supported OID list.     
   272 //! 			3)	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL() on a non empty, no default (one new OID added and one default OID removed)
   287 //! 				3) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL() on a non empty, no default (one new OID added and one default OID removed)
   273 //!					supported OID list.  
   288 //!					supported OID list.  
   274 //! 			4) 	Cleanup the certificate chain and utility classes.  
   289 //! 				4) 	Cleanup the certificate chain and utility classes.  
   275 //! @SYMTestExpectedResults There should be no memory leaks at any stage.
   290 //! @SYMTestExpectedResults 	There should be no memory leaks at any stage.
   276 //! @SYMTestType CIT
   291 //! @SYMTestType 		CIT
   277 //! @SYMTestPurpose Ensure the supported OID list is reset to the default values correctly.
   292 //! @SYMTestPurpose 		Ensure the supported OID list is reset to the default values correctly.
   278 START_TESTCASE SEC-CERTMAN-CRITEXT-OOM-0007
   293 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0007
   279 RUN_TEST_STEP 100 tpkixcert_tefserver ResetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNoOids
   294 RUN_TEST_STEP 100 tpkixcert_tefserver ResetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNoOids
   280 RUN_TEST_STEP 100 tpkixcert_tefserver ResetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomOneAddedOneRemoved
   295 RUN_TEST_STEP 100 tpkixcert_tefserver ResetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomOneAddedOneRemoved
   281 END_TESTCASE SEC-CERTMAN-CRITEXT-OOM-0007
   296 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0007
   282 
   297 
   283 
   298 
   284 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0008
   299 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0008
   285 //! @SYMTestCaseDesc Test the Set API for manipulating supported OID list for correct behaviour.
   300 //! @SYMTestCaseDesc 		Test the Set API for manipulating supported OID list for correct behaviour.
   286 //! @SYMCR 1399
   301 //! @SYMCR 			1399
   287 //! @SYMTestPriority Critical
   302 //! @SYMTestPriority 		Critical
   288 //! @SYMTestActions 1)	Construct the certificate chain.  
   303 //! @SYMTestActions 		1)	Construct the certificate chain.  
   289 //! 			2)	Set an empty collection of OIDs through CPKIXCertChain::SetSupportedCriticalExtensionsL().  
   304 //! 				2)	Set an empty collection of OIDs through CPKIXCertChain::SetSupportedCriticalExtensionsL().  
   290 //! 			3)	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   305 //! 				3)	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   291 //! 			4)	Set a collection of non empty (one new OID and one default OID removed) collection of OIDs through CPKIXCertChain::SetSupportedCriticalExtensionsL().   
   306 //! 				4)	Set a collection of non empty (one new OID and one default OID removed) collection of OIDs through CPKIXCertChain::SetSupportedCriticalExtensionsL().   
   292 //! 			5)	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   307 //! 				5) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   293 //! 			6)	Set the same collection of OIDs as is currently supported through CPKIXCertChain::SetSupportedCriticalExtensionsL().  
   308 //! 				6)	Set the same collection of OIDs as is currently supported through CPKIXCertChain::SetSupportedCriticalExtensionsL().  
   294 //! 			7)	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   309 //! 				7) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   295 //! 			8)	Set a collection of OIDs containing internal duplicates through CPKIXCertChain::SetSupportedCriticalExtensionsL().  
   310 //! 				8)	Set a collection of OIDs containing internal duplicates through CPKIXCertChain::SetSupportedCriticalExtensionsL().  
   296 //! 			9) 	Cleanup the certificate chain and utility classes.  
   311 //! 				9) 	Cleanup the certificate chain and utility classes.  
   297 //! @SYMTestExpectedResults Supported OID list should be updated correctly in each case.
   312 //! @SYMTestExpectedResults 	Supported OID list should be updated correctly in each case.
   298 //! @SYMTestType CIT
   313 //! @SYMTestType 		CIT
   299 //! @SYMTestPurpose Ensure supported OID list is updated correctly, the result contains no duplicates and no errors are reported.
   314 //! @SYMTestPurpose 		Ensure supported OID list is updated correctly, the result contains no duplicates and no errors are reported.
   300 START_TESTCASE SEC-CERTMAN-CRITEXT-0008
   315 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0008
   301 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NoOids
   316 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NoOids
   302 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OneAddedOneRemoved
   317 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OneAddedOneRemoved
   303 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini CurrentlySupported
   318 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini CurrentlySupported
   304 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OidsWithDuplicates
   319 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OidsWithDuplicates
   305 END_TESTCASE SEC-CERTMAN-CRITEXT-0008
   320 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0008
   306 
   321 
   307 
   322 
   308 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-OOM-0008
   323 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0008
   309 //! @SYMTestCaseDesc Test the Set API for manipulating supported OID list for correct behaviour.
   324 //! @SYMTestCaseDesc 		Test the Set API for manipulating supported OID list for correct behaviour.
   310 //! @SYMCR 1399
   325 //! @SYMCR 			1399
   311 //! @SYMTestPriority Critical
   326 //! @SYMTestPriority 		Critical
   312 //! @SYMTestActions OOM loop around steps 1 to 9:
   327 //! @SYMTestActions 		OOM loop around steps 1 to 9:
   313 //!				1)	Construct the certificate chain.  
   328 //!				1)	Construct the certificate chain.  
   314 //! 			2)	Set an empty collection of OIDs through CPKIXCertChain::SetSupportedCriticalExtensionsL().  
   329 //! 				2)	Set an empty collection of OIDs through CPKIXCertChain::SetSupportedCriticalExtensionsL().  
   315 //! 			3)	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   330 //! 				3) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   316 //! 			4)	Set a collection of non empty (one new OID and one default OID removed) collection of OIDs through CPKIXCertChain::SetSupportedCriticalExtensionsL().   
   331 //! 				4)	Set a collection of non empty (one new OID and one default OID removed) collection of OIDs through CPKIXCertChain::SetSupportedCriticalExtensionsL().   
   317 //! 			5)	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   332 //! 				5) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   318 //! 			6)	Set the same collection of OIDs as is currently supported through CPKIXCertChain::SetSupportedCriticalExtensionsL().  
   333 //! 				6)	Set the same collection of OIDs as is currently supported through CPKIXCertChain::SetSupportedCriticalExtensionsL().  
   319 //! 			7)	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   334 //! 				7) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
   320 //! 			8)	Set a collection of OIDs containing internal duplicates through CPKIXCertChain::SetSupportedCriticalExtensionsL().  
   335 //! 				8)	Set a collection of OIDs containing internal duplicates through CPKIXCertChain::SetSupportedCriticalExtensionsL().  
   321 //! 			9) 	Cleanup the certificate chain and utility classes.  
   336 //! 				9) 	Cleanup the certificate chain and utility classes.  
   322 //! @SYMTestExpectedResults There should be no memory leaks at any stage.
   337 //! @SYMTestExpectedResults 	There should be no memory leaks at any stage.
   323 //! @SYMTestType CIT
   338 //! @SYMTestType 		CIT
   324 //! @SYMTestPurpose Ensure supported OID list is updated correctly, the result contains no duplicates and no errors are reported.
   339 //! @SYMTestPurpose 		Ensure supported OID list is updated correctly, the result contains no duplicates and no errors are reported.
   325 START_TESTCASE SEC-CERTMAN-CRITEXT-OOM-0008
   340 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0008
   326 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNoOids
   341 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNoOids
   327 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomOneAddedOneRemoved
   342 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomOneAddedOneRemoved
   328 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomCurrentlySupported
   343 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomCurrentlySupported
   329 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomOidsWithDuplicates
   344 RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomOidsWithDuplicates
   330 END_TESTCASE SEC-CERTMAN-CRITEXT-OOM-0008
   345 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0008
   331 
   346 
   332 
   347 
   333 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0009
   348 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0009
   334 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly.
   349 //! @SYMTestCaseDesc 		Test CPKIXCertChain::ValidateL() code fails correctly.
       
   350 //! @SYMCR 			1399
       
   351 //! @SYMTestPriority 		Critical
       
   352 //! @SYMTestActions 		1)	Construct the certificate chain.  
       
   353 //! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
       
   354 //! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KExtendedKeyUsage is not set.
       
   355 //! 				4)	Ensure the correct error value is returned  
       
   356 //! 				5)	Cleanup the certificate chain and utility classes. 
       
   357 //! @SYMTestExpectedResults 	The validation should return with EUnrecognisedCriticalExtension
       
   358 //! @SYMTestType 		CIT
       
   359 //! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
       
   360 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0009
       
   361 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_ExtendedKeyUsage
       
   362 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0009
       
   363 
       
   364 
       
   365 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0010
       
   366 //! @SYMTestCaseDesc 		Test CPKIXCertChain::ValidateL() code fails correctly.
       
   367 //! @SYMCR 			1399
       
   368 //! @SYMTestPriority 		Critical
       
   369 //! @SYMTestActions 		1)	Construct the certificate chain.  
       
   370 //! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
       
   371 //! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KPolicyMapping is not set.
       
   372 //! 				4)	Ensure the correct error value is returned  
       
   373 //! 				5)	Cleanup the certificate chain and utility classes. 
       
   374 //! @SYMTestExpectedResults 	The validation should return with EUnrecognisedCriticalExtension
       
   375 //! @SYMTestType 		CIT
       
   376 //! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
       
   377 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0010
       
   378 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_PolicyMapping
       
   379 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0010
       
   380 
       
   381 
       
   382 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0011
       
   383 //! @SYMTestCaseDesc 		Test CPKIXCertChain::ValidateL() code fails correctly.
       
   384 //! @SYMCR 			1399
       
   385 //! @SYMTestPriority 		Critical
       
   386 //! @SYMTestActions 		1)	Construct the certificate chain.  
       
   387 //! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
       
   388 //! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KDeviceListConstraint is not set.
       
   389 //! 				4)	Ensure the correct error value is returned  
       
   390 //! 				5)	Cleanup the certificate chain and utility classes. 
       
   391 //! @SYMTestExpectedResults 	The validation should return with EUnrecognisedCriticalExtension
       
   392 //! @SYMTestType 		CIT
       
   393 //! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
       
   394 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0011
       
   395 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_DeviceIdListConstraint
       
   396 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0011
       
   397 
       
   398 
       
   399 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0012
       
   400 //! @SYMTestCaseDesc 		Test CPKIXCertChain::ValidateL() code fails correctly.
       
   401 //! @SYMCR 			1399
       
   402 //! @SYMTestPriority 		Critical
       
   403 //! @SYMTestActions 		1)	Construct the certificate chain.  
       
   404 //! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
       
   405 //! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KSidListConstraint is not set.
       
   406 //! 				4)	Ensure the correct error value is returned  
       
   407 //! 				5)	Cleanup the certificate chain and utility classes. 
       
   408 //! @SYMTestExpectedResults 	The validation should return with EUnrecognisedCriticalExtension
       
   409 //! @SYMTestType 		CIT
       
   410 //! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
       
   411 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0012
       
   412 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_SidListConstraint
       
   413 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0012
       
   414 
       
   415 
       
   416 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0013
       
   417 //! @SYMTestCaseDesc 		Test CPKIXCertChain::ValidateL() code fails correctly.
       
   418 //! @SYMCR 			1399
       
   419 //! @SYMTestPriority 		Critical
       
   420 //! @SYMTestActions 		1)	Construct the certificate chain.  
       
   421 //! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
       
   422 //! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KVidListConstraint is not set.
       
   423 //! 				4)	Ensure the correct error value is returned  
       
   424 //! 				5)	Cleanup the certificate chain and utility classes. 
       
   425 //! @SYMTestExpectedResults 	The validation should return with EUnrecognisedCriticalExtension
       
   426 //! @SYMTestType 		CIT
       
   427 //! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
       
   428 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0013
       
   429 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_VidListConstraint
       
   430 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0013
       
   431 
       
   432 
       
   433 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0014
       
   434 //! @SYMTestCaseDesc 		Test CPKIXCertChain::ValidateL() code fails correctly.
       
   435 //! @SYMCR 			1399
       
   436 //! @SYMTestPriority 		Critical
       
   437 //! @SYMTestActions 		1)	Construct the certificate chain.  
       
   438 //! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
       
   439 //! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KCapabilitiesConstraint is not set.
       
   440 //! 				4)	Ensure the correct error value is returned  
       
   441 //! 				5)	Cleanup the certificate chain and utility classes. 
       
   442 //! @SYMTestExpectedResults 	The validation should return with EUnrecognisedCriticalExtension
       
   443 //! @SYMTestType 		CIT
       
   444 //! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
       
   445 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0014
       
   446 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_CapabilitiesConstraint
       
   447 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0014
       
   448 
       
   449 
       
   450 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0015
       
   451 //! @SYMTestCaseDesc 		Test CPKIXCertChain::ValidateL() code fails correctly.
   335 //! @SYMCR 1399
   452 //! @SYMCR 1399
   336 //! @SYMTestPriority Critical
   453 //! @SYMTestPriority 		Critical
   337 //! @SYMTestActions 1)	Construct the certificate chain.  
   454 //! @SYMTestActions 		1)	Construct the certificate chain.  
   338 //! 			2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
   455 //! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
   339 //! 			3)	Call CPKIXCertChain::ValidateL(). The default OID value for KExtendedKeyUsage is not set.
   456 //! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KCertPolicies is not set.
   340 //! 			4)	Ensure the correct error value is returned  
   457 //! 				4)	Ensure the correct error value is returned  
   341 //! 			5)	Cleanup the certificate chain and utility classes. 
   458 //! 				5)	Cleanup the certificate chain and utility classes. 
   342 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension
   459 //! @SYMTestExpectedResults 	The validation should return with EUnrecognisedCriticalExtension
   343 //! @SYMTestType CIT
   460 //! @SYMTestType 		CIT
   344 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
   461 //! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
   345 START_TESTCASE SEC-CERTMAN-CRITEXT-0009
   462 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0015
   346 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_ExtendedKeyUsage
       
   347 END_TESTCASE SEC-CERTMAN-CRITEXT-0009
       
   348 
       
   349 
       
   350 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0010
       
   351 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly.
       
   352 //! @SYMCR 1399
       
   353 //! @SYMTestPriority Critical
       
   354 //! @SYMTestActions 1)	Construct the certificate chain.  
       
   355 //! 			2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
       
   356 //! 			3)	Call CPKIXCertChain::ValidateL(). The default OID value for KPolicyMapping is not set.
       
   357 //! 			4)	Ensure the correct error value is returned  
       
   358 //! 			5)	Cleanup the certificate chain and utility classes. 
       
   359 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension
       
   360 //! @SYMTestType CIT
       
   361 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
       
   362 START_TESTCASE SEC-CERTMAN-CRITEXT-0010
       
   363 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_PolicyMapping
       
   364 END_TESTCASE SEC-CERTMAN-CRITEXT-0010
       
   365 
       
   366 
       
   367 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0011
       
   368 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly.
       
   369 //! @SYMCR 1399
       
   370 //! @SYMTestPriority Critical
       
   371 //! @SYMTestActions 1)	Construct the certificate chain.  
       
   372 //! 			2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
       
   373 //! 			3)	Call CPKIXCertChain::ValidateL(). The default OID value for KDeviceListConstraint is not set.
       
   374 //! 			4)	Ensure the correct error value is returned  
       
   375 //! 			5)	Cleanup the certificate chain and utility classes. 
       
   376 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension
       
   377 //! @SYMTestType CIT
       
   378 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
       
   379 START_TESTCASE SEC-CERTMAN-CRITEXT-0011
       
   380 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_DeviceIdListConstraint
       
   381 END_TESTCASE SEC-CERTMAN-CRITEXT-0011
       
   382 
       
   383 
       
   384 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0012
       
   385 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly.
       
   386 //! @SYMCR 1399
       
   387 //! @SYMTestPriority Critical
       
   388 //! @SYMTestActions 1)	Construct the certificate chain.  
       
   389 //! 			2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
       
   390 //! 			3)	Call CPKIXCertChain::ValidateL(). The default OID value for KSidListConstraint is not set.
       
   391 //! 			4)	Ensure the correct error value is returned  
       
   392 //! 			5)	Cleanup the certificate chain and utility classes. 
       
   393 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension
       
   394 //! @SYMTestType CIT
       
   395 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
       
   396 START_TESTCASE SEC-CERTMAN-CRITEXT-0012
       
   397 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_SidListConstraint
       
   398 END_TESTCASE SEC-CERTMAN-CRITEXT-0012
       
   399 
       
   400 
       
   401 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0013
       
   402 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly.
       
   403 //! @SYMCR 1399
       
   404 //! @SYMTestPriority Critical
       
   405 //! @SYMTestActions 1)	Construct the certificate chain.  
       
   406 //! 			2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
       
   407 //! 			3)	Call CPKIXCertChain::ValidateL(). The default OID value for KVidListConstraint is not set.
       
   408 //! 			4)	Ensure the correct error value is returned  
       
   409 //! 			5)	Cleanup the certificate chain and utility classes. 
       
   410 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension
       
   411 //! @SYMTestType CIT
       
   412 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
       
   413 START_TESTCASE SEC-CERTMAN-CRITEXT-0013
       
   414 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_VidListConstraint
       
   415 END_TESTCASE SEC-CERTMAN-CRITEXT-0013
       
   416 
       
   417 
       
   418 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0014
       
   419 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly.
       
   420 //! @SYMCR 1399
       
   421 //! @SYMTestPriority Critical
       
   422 //! @SYMTestActions 1)	Construct the certificate chain.  
       
   423 //! 			2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
       
   424 //! 			3)	Call CPKIXCertChain::ValidateL(). The default OID value for KCapabilitiesConstraint is not set.
       
   425 //! 			4)	Ensure the correct error value is returned  
       
   426 //! 			5)	Cleanup the certificate chain and utility classes. 
       
   427 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension
       
   428 //! @SYMTestType CIT
       
   429 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
       
   430 START_TESTCASE SEC-CERTMAN-CRITEXT-0014
       
   431 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_CapabilitiesConstraint
       
   432 END_TESTCASE SEC-CERTMAN-CRITEXT-0014
       
   433 
       
   434 
       
   435 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0015
       
   436 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly.
       
   437 //! @SYMCR 1399
       
   438 //! @SYMTestPriority Critical
       
   439 //! @SYMTestActions 1)	Construct the certificate chain.  
       
   440 //! 			2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
       
   441 //! 			3)	Call CPKIXCertChain::ValidateL(). The default OID value for KCertPolicies is not set.
       
   442 //! 			4)	Ensure the correct error value is returned  
       
   443 //! 			5)	Cleanup the certificate chain and utility classes. 
       
   444 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension
       
   445 //! @SYMTestType CIT
       
   446 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
       
   447 START_TESTCASE SEC-CERTMAN-CRITEXT-0015
       
   448 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_CertPolicies
   463 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_CertPolicies
   449 END_TESTCASE SEC-CERTMAN-CRITEXT-0015
   464 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0015
   450 
   465 
   451 
   466 
   452 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0016
   467 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0016
   453 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly.
   468 //! @SYMTestCaseDesc 		Test CPKIXCertChain::ValidateL() code fails correctly.
   454 //! @SYMCR 1399
   469 //! @SYMCR 			1399
   455 //! @SYMTestPriority Critical
   470 //! @SYMTestPriority 		Critical
   456 //! @SYMTestActions 1)	Construct the certificate chain.  
   471 //! @SYMTestActions 		1)	Construct the certificate chain.  
   457 //! 			2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
   472 //! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
   458 //! 			3)	Call CPKIXCertChain::ValidateL(). The default OID value for KPolicyConstraints is not set.
   473 //! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KPolicyConstraints is not set.
   459 //! 			4)	Ensure the correct error value is returned  
   474 //! 				4)	Ensure the correct error value is returned  
   460 //! 			5)	Cleanup the certificate chain and utility classes. 
   475 //! 				5)	Cleanup the certificate chain and utility classes. 
   461 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension
   476 //! @SYMTestExpectedResults 	The validation should return with EUnrecognisedCriticalExtension
   462 //! @SYMTestType CIT
   477 //! @SYMTestType 		CIT
   463 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
   478 //! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
   464 START_TESTCASE SEC-CERTMAN-CRITEXT-0016
   479 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0016
   465 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_PolicyConstraint
   480 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_PolicyConstraint
   466 END_TESTCASE SEC-CERTMAN-CRITEXT-0016
   481 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0016
   467 
   482 
   468 
   483 
   469 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0017
   484 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0017
   470 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly.
   485 //! @SYMTestCaseDesc 		Test CPKIXCertChain::ValidateL() code fails correctly.
   471 //! @SYMCR 1399
   486 //! @SYMCR 			1399
   472 //! @SYMTestPriority Critical
   487 //! @SYMTestPriority 		Critical
   473 //! @SYMTestActions 1)	Construct the certificate chain.  
   488 //! @SYMTestActions 		1)	Construct the certificate chain.  
   474 //! 			2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
   489 //! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
   475 //! 			3)	Call CPKIXCertChain::ValidateL(). The default OID value for KNameConstraints is not set.
   490 //! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KNameConstraints is not set.
   476 //! 			4)	Ensure the correct error value is returned  
   491 //! 				4)	Ensure the correct error value is returned  
   477 //! 			5)	Cleanup the certificate chain and utility classes. 
   492 //! 				5)	Cleanup the certificate chain and utility classes. 
   478 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension
   493 //! @SYMTestExpectedResults 	The validation should return with EUnrecognisedCriticalExtension
   479 //! @SYMTestType CIT
   494 //! @SYMTestType 		CIT
   480 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
   495 //! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
   481 START_TESTCASE SEC-CERTMAN-CRITEXT-0017
   496 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0017
   482 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_NameConstraint
   497 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_NameConstraint
   483 END_TESTCASE SEC-CERTMAN-CRITEXT-0017
   498 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0017
   484 
   499 
   485 
   500 
   486 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0018
   501 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0018
   487 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly.
   502 //! @SYMTestCaseDesc 		Test CPKIXCertChain::ValidateL() code fails correctly.
   488 //! @SYMCR 1399
   503 //! @SYMCR 			1399
   489 //! @SYMTestPriority Critical
   504 //! @SYMTestPriority 		Critical
   490 //! @SYMTestActions 1)	Construct the certificate chain.  
   505 //! @SYMTestActions 		1)	Construct the certificate chain.  
   491 //! 			2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
   506 //! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
   492 //! 			3)	Call CPKIXCertChain::ValidateL(). The default OID value for KBasicConstraints is not set.
   507 //! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KBasicConstraints is not set.
   493 //! 			4)	Ensure the correct error value is returned  
   508 //! 				4)	Ensure the correct error value is returned  
   494 //! 			5)	Cleanup the certificate chain and utility classes. 
   509 //! 				5)	Cleanup the certificate chain and utility classes. 
   495 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension
   510 //! @SYMTestExpectedResults	The validation should return with EUnrecognisedCriticalExtension
   496 //! @SYMTestType CIT
   511 //! @SYMTestType 		CIT
   497 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
   512 //! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
   498 START_TESTCASE SEC-CERTMAN-CRITEXT-0018
   513 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0018
   499 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_BasicConstraint
   514 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_BasicConstraint
   500 END_TESTCASE SEC-CERTMAN-CRITEXT-0018
   515 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0018
   501 
   516 
   502 
   517 
   503 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0019
   518 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0019
   504 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly.
   519 //! @SYMTestCaseDesc 		Test CPKIXCertChain::ValidateL() code fails correctly.
   505 //! @SYMCR 1399
   520 //! @SYMCR 			1399
   506 //! @SYMTestPriority Critical
   521 //! @SYMTestPriority 		Critical
   507 //! @SYMTestActions 1)	Construct the certificate chain.  
   522 //! @SYMTestActions 		1)	Construct the certificate chain.  
   508 //! 			2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
   523 //! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
   509 //! 			3)	Call CPKIXCertChain::ValidateL(). The default OID value for KKeyUsage is not set.
   524 //! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KKeyUsage is not set.
   510 //! 			4)	Ensure the correct error value is returned  
   525 //! 				4)	Ensure the correct error value is returned  
   511 //! 			5)	Cleanup the certificate chain and utility classes. 
   526 //! 				5)	Cleanup the certificate chain and utility classes. 
   512 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension
   527 //! @SYMTestExpectedResults 	The validation should return with EUnrecognisedCriticalExtension
   513 //! @SYMTestType CIT
   528 //! @SYMTestType 		CIT
   514 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
   529 //! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
   515 START_TESTCASE SEC-CERTMAN-CRITEXT-0019
   530 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0019
   516 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_KeyUsage
   531 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_KeyUsage
   517 END_TESTCASE SEC-CERTMAN-CRITEXT-0019
   532 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0019
   518 
   533 
   519 
   534 
   520 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0020
   535 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0020
   521 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly.
   536 //! @SYMTestCaseDesc 		Test CPKIXCertChain::ValidateL() code fails correctly.
   522 //! @SYMCR 1399
   537 //! @SYMCR 			1399
   523 //! @SYMTestPriority Critical
   538 //! @SYMTestPriority 		Critical
   524 //! @SYMTestActions 1)	Construct the certificate chain.  
   539 //! @SYMTestActions 		1)	Construct the certificate chain.  
   525 //! 			2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
   540 //! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
   526 //! 			3)	Call CPKIXCertChain::ValidateL(). The default OID value for KSubjectAltName is not set.
   541 //! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KSubjectAltName is not set.
   527 //! 			4)	Ensure the correct error value is returned  
   542 //! 				4)	Ensure the correct error value is returned  
   528 //! 			5)	Cleanup the certificate chain and utility classes. 
   543 //! 				5)	Cleanup the certificate chain and utility classes. 
   529 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension
   544 //! @SYMTestExpectedResults 	The validation should return with EUnrecognisedCriticalExtension
   530 //! @SYMTestType CIT
   545 //! @SYMTestType 		CIT
   531 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
   546 //! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
   532 START_TESTCASE SEC-CERTMAN-CRITEXT-0020
   547 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0020
   533 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_SubjectAltName
   548 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_SubjectAltName
   534 END_TESTCASE SEC-CERTMAN-CRITEXT-0020
   549 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0020
   535 
   550 
   536 
   551 
   537 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0021
   552 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0021
   538 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly.
   553 //! @SYMTestCaseDesc 		Test CPKIXCertChain::ValidateL() code fails correctly.
   539 //! @SYMCR 1399
   554 //! @SYMCR 			1399
   540 //! @SYMTestPriority Critical
   555 //! @SYMTestPriority 		Critical
   541 //! @SYMTestActions 1)	Construct the certificate chain.  
   556 //! @SYMTestActions 		1)	Construct the certificate chain.  
   542 //! 			2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
   557 //! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
   543 //! 			3)	Call CPKIXCertChain::ValidateL(). The default OID value for KInhibitAnyPolicy is not set.
   558 //! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KInhibitAnyPolicy is not set.
   544 //! 			4)	Ensure the correct error value is returned  
   559 //! 				4)	Ensure the correct error value is returned  
   545 //! 			5)	Cleanup the certificate chain and utility classes. 
   560 //! 				5)	Cleanup the certificate chain and utility classes. 
   546 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension
   561 //! @SYMTestExpectedResults 	The validation should return with EUnrecognisedCriticalExtension
   547 //! @SYMTestType CIT
   562 //! @SYMTestType 		CIT
   548 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
   563 //! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
   549 START_TESTCASE SEC-CERTMAN-CRITEXT-0021
   564 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0021
   550 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_InhibitAnyPolicy
   565 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_InhibitAnyPolicy
   551 END_TESTCASE SEC-CERTMAN-CRITEXT-0021
   566 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0021
   552 
   567 
   553 
   568 
   554 //! @SYMTestCaseID SEC-CERTMAN-CRITEXT-0022
   569 //! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0022
   555 //! @SYMTestCaseDesc Test CPKIXCertChain::ValidateL() code fails correctly.
   570 //! @SYMTestCaseDesc		Test CPKIXCertChain::ValidateL() code fails correctly.
   556 //! @SYMCR 1399
   571 //! @SYMCR 			1399
   557 //! @SYMTestPriority Critical
   572 //! @SYMTestPriority 		Critical
   558 //! @SYMTestActions 1)	Construct the certificate chain.  
   573 //! @SYMTestActions 		1)	Construct the certificate chain.  
   559 //! 			2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
   574 //! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
   560 //! 			3)	Call CPKIXCertChain::ValidateL(). The default OID value for KTestOid is not set.
   575 //! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KTestOid is not set.
   561 //! 			4)	Ensure the correct error value is returned  
   576 //! 				4)	Ensure the correct error value is returned  
   562 //! 			5)	Cleanup the certificate chain and utility classes. 
   577 //! 				5)	Cleanup the certificate chain and utility classes. 
   563 //! @SYMTestExpectedResults The validation should return with EUnrecognisedCriticalExtension
   578 //! @SYMTestExpectedResults 	The validation should return with EUnrecognisedCriticalExtension
   564 //! @SYMTestType CIT
   579 //! @SYMTestType 		CIT
   565 //! @SYMTestPurpose Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
   580 //! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
   566 START_TESTCASE SEC-CERTMAN-CRITEXT-0022
   581 START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0022
   567 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_TestOid
   582 RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_TestOid
   568 END_TESTCASE SEC-CERTMAN-CRITEXT-0022
   583 END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0022