--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptoservices/certificateandkeymgmt/tpkcs10/scripts/tpkcs10_v2.script Wed Jul 08 11:25:26 2009 +0100
@@ -0,0 +1,520 @@
+//
+// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+// All rights reserved.
+// This component and the accompanying materials are made available
+// under the terms of the License "Eclipse Public License v1.0"
+// which accompanies this distribution, and is available
+// at the URL "http://www.eclipse.org/legal/epl-v10.html".
+//
+// Initial Contributors:
+// Nokia Corporation - initial contribution.
+//
+// Contributors:
+//
+// Description:
+//
+//
+PRINT Run Positive and OOM tests tpkcs1010serverv2 Suite
+
+LOAD_SUITE tpkcs10serverv2
+
+// pre- test: move out of the way key store file.
+RUN_UTILS CopyFile c:\private\101f72a6\keys.dat c:\keys.dat
+
+//! @SYMTestCaseID SEC-PKCS10-RSA-0001
+//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
+//! certificate requests using the parameters listed below.
+//! Key Algorithm: RSA
+//! Key size: 512 bits
+//! Digest Algorithm: SHA1
+//! Number of attributes: 0
+//!
+//! @SYMPREQ CR0973
+//! @SYMREQ REQ1581.5
+//! @SYMTestPriority Critical
+//! @SYMTestActions PKCS10 certificate request construction.
+//! @SYMTestExpectedResults Encoding successfully validated
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0001
+
+
+//! @SYMTestCaseID SEC-PKCS10-RSA-0002
+//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
+//! certificate requests using the parameters listed below.
+//! Key Algorithm: RSA
+//! Key size: 512 bits
+//! Digest Algorithm: MD2
+//! Number of attributes: 0
+//!
+//! @SYMPREQ CR0973
+//! @SYMREQ REQ1581.5
+//! @SYMTestPriority Critical
+//! @SYMTestActions PKCS10 certificate request construction.
+//! @SYMTestExpectedResults Encoding successfully validated
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0002
+
+
+//! @SYMTestCaseID SEC-PKCS10-RSA-0003
+//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
+//! certificate requests using the parameters listed below.
+//! Key Algorithm: RSA
+//! Key size: 512 bits
+//! Digest Algorithm: MD5
+//! Number of attributes: 0
+//!
+//! @SYMPREQ CR0973
+//! @SYMREQ REQ1581.5
+//! @SYMTestPriority Critical
+//! @SYMTestActions PKCS10 certificate request construction.
+//! @SYMTestExpectedResults Encoding successfully validated
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0003
+
+
+//! @SYMTestCaseID SEC-PKCS10-RSA-0004
+//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
+//! certificate requests using the parameters listed below.
+//! Key Algorithm: RSA
+//! Key size: 512 bits
+//! Digest Algorithm: SHA1
+//! Number of attributes: 1 (challenge password)
+//!
+//! @SYMPREQ CR0973
+//! @SYMREQ REQ1581.5
+//! @SYMTestPriority Critical
+//! @SYMTestActions PKCS10 certificate request construction.
+//! @SYMTestExpectedResults Encoding successfully validated
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0004
+
+
+//! @SYMTestCaseID SEC-PKCS10-RSA-0005
+//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
+//! certificate requests using the parameters listed below.
+//! Key Algorithm: RSA
+//! Key size: 512 bits
+//! Digest Algorithm: SHA1
+//! Number of attributes: 2 (challenge password and structured name)
+//!
+//! @SYMPREQ CR0973
+//! @SYMREQ REQ1581.5
+//! @SYMTestPriority Critical
+//! @SYMTestActions PKCS10 certificate request construction.
+//! @SYMTestExpectedResults Encoding successfully validated
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0005
+
+
+
+//! @SYMTestCaseID SEC-PKCS10-RSA-0006
+//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
+//! certificate requests using the parameters listed below.
+//! Key Algorithm: RSA
+//! Key size: 2048 bits
+//! Digest Algorithm: SHA1
+//! Number of attributes: 2 (challenge password and structured name)
+//!
+//! @SYMPREQ CR0973
+//! @SYMREQ REQ1581.5
+//! @SYMTestPriority Critical
+//! @SYMTestActions PKCS10 certificate request construction.
+//! @SYMTestExpectedResults Encoding successfully validated
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0006
+
+
+//! @SYMTestCaseID SEC-PKCS10-DSA-0001
+//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
+//! certificate requests using the parameters listed below.
+//! Key Algorithm: DSA
+//! Key size: 512 bits
+//! Digest Algorithm: SHA1
+//! Number of attributes: 0
+//!
+//! @SYMPREQ CR0973
+//! @SYMREQ REQ1581.5
+//! @SYMTestPriority Critical
+//! @SYMTestActions PKCS10 certificate request construction.
+//! @SYMTestExpectedResults Encoding successfully validated
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0001
+
+
+//! @SYMTestCaseID SEC-PKCS10-DSA-0002
+//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
+//! certificate requests using the parameters listed below.
+//! Key Algorithm: DSA
+//! Key size: 512 bits
+//! Digest Algorithm: SHA1
+//! Number of attributes: 1 (challenge password)
+//!
+//! @SYMPREQ CR0973
+//! @SYMREQ REQ1581.5
+//! @SYMTestPriority Critical
+//! @SYMTestActions PKCS10 certificate request construction.
+//! @SYMTestExpectedResults Encoding successfully validated
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0002
+
+//! @SYMTestCaseID SEC-PKCS10-DSA-0003
+//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
+//! certificate requests using the parameters listed below.
+//! Key Algorithm: DSA
+//! Key size: 512 bits
+//! Digest Algorithm: SHA1
+//! Number of attributes: 2 (challenge password and structured name)
+//!
+//! @SYMPREQ CR0973
+//! @SYMREQ REQ1581.5
+//! @SYMTestPriority Critical
+//! @SYMTestActions PKCS10 certificate request construction.
+//! @SYMTestExpectedResults Encoding successfully validated
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0003
+
+//! @SYMTestCaseID SEC-PKCS10-DSA-0004
+//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
+//! certificate requests using the parameters listed below.
+//! Key Algorithm: DSA
+//! Key size: 2048 bits
+//! Digest Algorithm: SHA1
+//! Number of attributes: 2 (challenge password and structured name)
+//!
+//! @SYMPREQ CR0973
+//! @SYMREQ REQ1581.5
+//! @SYMTestPriority Critical
+//! @SYMTestActions PKCS10 certificate request construction.
+//! @SYMTestExpectedResults Encoding successfully validated
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0004
+
+
+//! @SYMTestCaseID SEC-PKCS10-EXT-0001
+//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
+//! certificate requests including extension requestsusing the parameters listed below.
+//! Key Algorithm: RSA
+//! Key size: 2048 bits
+//! Digest Algorithm: SHA1
+//! Number of attributes: 2 (challenge password and structured name)
+//! Extensions used: basic Constraints,
+//! subject Alt Name,
+//! issuer Alt Name,
+//! key Usage,
+//! extended Key Usage,
+//! authority Info Access
+//!
+//! @SYMPREQ CR0973
+//! @SYMREQ REQ1581.5
+//! @SYMTestPriority Critical
+//! @SYMTestActions PKCS10 certificate request construction.
+//! @SYMTestExpectedResults Encoding successfully validated
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0001
+
+//! @SYMTestCaseID SEC-PKCS10-EXT-0002
+//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
+//! certificate requests including extension requestsusing the parameters listed below.
+//! Key Algorithm: RSA
+//! Key size: 2048 bits
+//! Digest Algorithm: MD2
+//! Number of attributes: 2 (challenge password and structured name)
+//! Extensions used: basic Constraints,
+//! subject Alt Name,
+//! issuer Alt Name,
+//! key Usage,
+//! extended Key Usage,
+//! authority Info Access
+//!
+//! @SYMPREQ CR0973
+//! @SYMREQ REQ1581.5
+//! @SYMTestPriority Critical
+//! @SYMTestActions PKCS10 certificate request construction.
+//! @SYMTestExpectedResults Encoding successfully validated
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0002
+
+//! @SYMTestCaseID SEC-PKCS10-EXT-0003
+//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
+//! certificate requests including extension requestsusing the parameters listed below.
+//! Key Algorithm: RSA
+//! Key size: 2048 bits
+//! Digest Algorithm: MD5
+//! Number of attributes: 2 (challenge password and structured name)
+//! Extensions used: basic Constraints,
+//! subject Alt Name,
+//! issuer Alt Name,
+//! key Usage,
+//! extended Key Usage,
+//! authority Info Access
+//!
+//! @SYMPREQ CR0973
+//! @SYMREQ REQ1581.5
+//! @SYMTestPriority Critical
+//! @SYMTestActions PKCS10 certificate request construction.
+//! @SYMTestExpectedResults Encoding successfully validated
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0003
+
+//! @SYMTestCaseID SEC-PKCS10-EXT-0004
+//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
+//! certificate requests including extension requestsusing the parameters listed below.
+//! Key Algorithm: DSA
+//! Key size: 2048 bits
+//! Digest Algorithm: SHA1
+//! Number of attributes: 2 (challenge password and structured name)
+//! Extensions used: basic Constraints,
+//! subject Alt Name,
+//! issuer Alt Name,
+//! key Usage,
+//! extended Key Usage,
+//! authority Info Access
+//!
+//! @SYMPREQ CR0973
+//! @SYMREQ REQ1581.5
+//! @SYMTestPriority Critical
+//! @SYMTestActions PKCS10 certificate request construction.
+//! @SYMTestExpectedResults Encoding successfully validated
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0004
+
+
+//! @SYMTestCaseID SEC-PKCS10-OOM-0001
+//! @SYMTestCaseDesc To check that CPKCS10Request class can manage out of memory conditions graciously
+//! Use the following parameters:
+//! Key Algorithm: RSA
+//! Key size: 512 bits
+//! Digest Algorithm: SHA1
+//! Number of attributes: 2
+//!
+//! @SYMPREQ CR0973
+//! @SYMREQ REQ1581.5
+//! @SYMTestPriority Critical
+//! @SYMTestActions PKCS10 certificate request construction in OOM conditions.
+//! @SYMTestExpectedResults Encoding successfully validated
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-OOM-0001
+
+//! @SYMTestCaseID SEC-PKCS10-OOM-0002
+//! @SYMTestCaseDesc To check that CPKCS10Request class can manage out of memory conditions graciously
+//! Use the following parameters:
+//! Key Algorithm: DSA
+//! Key size: 512 bits
+//! Digest Algorithm: SHA1
+//! Number of attributes: 2
+//!
+//! @SYMPREQ CR0973
+//! @SYMREQ REQ1581.5
+//! @SYMTestPriority Critical
+//! @SYMTestActions PKCS10 certificate request construction in OOM conditions.
+//! @SYMTestExpectedResults Encoding successfully validated
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-OOM-0002
+
+//! @SYMTestCaseID SEC-PKCS10-REU-0001
+//! @SYMTestCaseDesc To check that a CPKCS10Attribute can be reused with new values.
+//!
+//! @SYMPREQ CR0973
+//! @SYMREQ REQ1581.5
+//! @SYMTestPriority Critical
+//! @SYMTestActions Create CPKCS10Attribute test object using using valid values.
+//! Use GetEncodingLC to retrieve ASN1 value from this instance.
+//! Use Reset method of CPKCS10Attribute test object with appropriate parameters.
+//! Use GetEncodingLC method again to check that new ASN1 value had been
+//! updated correctly.
+//!
+//! @SYMTestExpectedResults Encoding matches in both cases.
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseAttribute c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0001
+
+//! @SYMTestCaseID SEC-PKCS10-REU-0002
+//! @SYMTestCaseDesc To check that a CPKCS10Attribute can be reused with new values.
+//!
+//! @SYMPREQ CR0973
+//! @SYMREQ REQ1581.5
+//! @SYMTestPriority Critical
+//! @SYMTestActions Create CPKCS10Attribute instance with appropiate values
+//! GetEncodingLC from test instance
+//! repopulate data using appropiate methods
+//! request a new cert request
+//! @SYMTestExpectedResults New cert request in created correctly
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0002
+
+//! @SYMTestCaseID SEC-PKCS10-REU-0003
+//! @SYMTestCaseDesc To check that a CPKCS10Attribute can be reused with new values.
+//!
+//! @SYMPREQ CR0973
+//! @SYMREQ REQ1581.5
+//! @SYMTestPriority Critical
+//! @SYMTestActions Create CPKCS10Attribute instance with appropiate values
+//! GetEncodingLC from test instance
+//! Do not repopulate data.
+//! request a new cert request
+//! @SYMTestExpectedResults New cert request in created correctly
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0003
+
+//! @SYMTestCaseID SEC-PKCS10-REU-0004
+//! @SYMTestCaseDesc To check that a CPKCS9ChallengePasswordAttr can be reused with new values.
+//!
+//! @SYMPREQ CR0973
+//! @SYMREQ REQ1581.5
+//! @SYMTestPriority Critical
+//! @SYMTestActions Create CPKCS9ChallengePasswordAttr test object using valid value.
+//! Use GetEncodingLC to retrieve ASN1 value from this instance.
+//! Use Reset method of CPKCS9ChallengePasswordAttr test object
+//! with appropriate parameter.
+//! Use GetEncodingLC method again to check that new ASN1 value
+//! had been updated correctly.
+//! @SYMTestExpectedResults Encoding matches in both cases.
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseChallengePasswordAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0004
+
+//! @SYMTestCaseID SEC-PKCS10-REU-0005
+//! @SYMTestCaseDesc To check that a CPKCS10GenericAttr can be reused with new values.
+//!
+//! @SYMPREQ CR0973
+//! @SYMREQ REQ1581.5
+//! @SYMTestPriority Critical
+//! @SYMTestActions Create CPKCS9ExtensionRequestAttr test object using valid values.
+//! Use GetEncodingLC to retrieve ASN1 value from this instance.
+//! Use ResetL method of CPKCS9ExtensionRequestAttr test object
+//! with appropriate parameters.
+//! Use GetEncodingLC method again to check that new ASN1 value had
+//! been updated correctly.
+//! @SYMTestExpectedResults Encoding matches in both cases.
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseExtensionAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0005
+
+//! @SYMTestCaseID SEC-PKCS10-NEG-0001
+//! @SYMTestCaseDesc Check that CPKCS10GenericAttr class returns a
+//! KErrBadDescriptor (or KErrArgument) when its methods are used with
+//! invalid/null value parameters.
+//!
+//! @SYMPREQ CR0973
+//! @SYMREQ REQ1581.5
+//! @SYMTestPriority Critical
+//! @SYMTestActions PKCS10 CPKCS10GenericAttr construction
+//! @SYMTestExpectedResults Returns KErrBadDescriptor (or KErrArgument)
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10GenericAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0001
+
+//! @SYMTestCaseID SEC-PKCS10-NEG-0002
+//! @SYMTestCaseDesc Check that CPKCS9ChallengePasswordAttr class returns a
+//! KErrArgument when its methods are used with null value parameters.
+//!
+//! @SYMPREQ CR0973
+//! @SYMREQ REQ1581.5
+//! @SYMTestPriority Critical
+//! @SYMTestActions PKCS10 CPKCS9ChallengePasswordAttr construction
+//! @SYMTestExpectedResults Returns KErrArgument
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS9ChPwdAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0002
+
+//! @SYMTestCaseID SEC-PKCS10-NEG-0003
+//! @SYMTestCaseDesc Check that CPKCS9ExtensionRequestAttr class can recognise
+//! when application is trying to add malformed or un-initialised cert
+//! extension object to extension request.
+//!
+//! @SYMPREQ CR0973
+//! @SYMREQ REQ1581.5
+//! @SYMTestPriority Critical
+//! @SYMTestActions PKCS10 CPKCS9ExtensionRequestAttr construction.
+//! @SYMTestExpectedResults Returns KErrBadDescriptor
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS9ExtReqAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0003
+
+//! @SYMTestCaseID SEC-PKCS10-NEG-0004
+//! @SYMTestCaseDesc Check that CPKCS9ExtensionRequestAttr class returns a
+//! KErrArgument when its methods are used with null value parameters.
+//!
+//! @SYMPREQ CR0973
+//! @SYMREQ REQ1581.5
+//! @SYMTestPriority Critical
+//! @SYMTestActions PKCS10 CPKCS9ExtensionRequestAttr construction
+//! @SYMTestExpectedResults Returns KErrArgument
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10Attributes c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0004
+
+//! @SYMTestCaseID SEC-PKCS10-NEG-0005
+//! @SYMTestCaseDesc Check that CPKCS10Request class returns a KErrArgument when
+//! its methods are used with invalid value parameters.
+//!
+//! @SYMPREQ CR0973
+//! @SYMREQ REQ1581.5
+//! @SYMTestPriority Critical
+//! @SYMTestActions PKCS10 CPKCS10Request construction.
+//! @SYMTestExpectedResults Returns KErrArgument
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10Request c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0005
+
+//! @SYMTestCaseID SEC-PKCS10-DEF103311-0001
+//! @SYMTestCaseDesc Test case added for defect DEF103311, increases test coverage for PKCS1-
+//!
+//! @SYMREQ REQ0000
+//! @SYMTestPriority Critical
+//! @SYMTestActions Creates a CPKCS10Request and then cancels it.
+//! @SYMTestExpectedResults Returns KErrNone, no memory leak.
+//! @SYMTestType CIT
+//
+RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
+RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CancelRequestA c:\tpkcs10\scripts\tpkcs10_v2.ini DEF103311-0001
+
+//Post- test: re-states key store file
+RUN_UTILS CopyFile c:\keys.dat c:\private\101f72a6\keys.dat
+RUN_UTILS DeleteFile c:\keys.dat
+
+PRINT Complete_tpkcs10serverv2_Tests