cryptoservices/certificateandkeymgmt/tpkcs10/scripts/tpkcs10_v2.script
changeset 0 2c201484c85f
child 8 35751d3474b7
equal deleted inserted replaced
-1:000000000000 0:2c201484c85f
       
     1 //
       
     2 // Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
       
     3 // All rights reserved.
       
     4 // This component and the accompanying materials are made available
       
     5 // under the terms of the License "Eclipse Public License v1.0"
       
     6 // which accompanies this distribution, and is available
       
     7 // at the URL "http://www.eclipse.org/legal/epl-v10.html".
       
     8 //
       
     9 // Initial Contributors:
       
    10 // Nokia Corporation - initial contribution.
       
    11 //
       
    12 // Contributors:
       
    13 //
       
    14 // Description: 
       
    15 //
       
    16 //
       
    17 PRINT Run Positive and OOM tests tpkcs1010serverv2 Suite 
       
    18 
       
    19 LOAD_SUITE tpkcs10serverv2
       
    20 
       
    21 // pre- test: move out of the way key store file.
       
    22 RUN_UTILS CopyFile c:\private\101f72a6\keys.dat c:\keys.dat
       
    23 
       
    24 //! @SYMTestCaseID SEC-PKCS10-RSA-0001
       
    25 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for 
       
    26 //!		     certificate requests using the parameters listed below.
       
    27 //!		  	Key Algorithm: RSA
       
    28 //!			Key size: 512 bits 
       
    29 //!		        Digest Algorithm: SHA1 
       
    30 //!			Number of attributes: 0
       
    31 //!		
       
    32 //! @SYMPREQ CR0973
       
    33 //! @SYMREQ REQ1581.5
       
    34 //! @SYMTestPriority Critical
       
    35 //! @SYMTestActions PKCS10 certificate request construction.
       
    36 //! @SYMTestExpectedResults Encoding successfully validated
       
    37 //! @SYMTestType CIT
       
    38 //
       
    39 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
    40 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0001
       
    41 
       
    42 
       
    43 //! @SYMTestCaseID SEC-PKCS10-RSA-0002
       
    44 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for 
       
    45 //!		     certificate requests using the parameters listed below.
       
    46 //!		  	Key Algorithm: RSA
       
    47 //!			Key size: 512 bits 
       
    48 //!		        Digest Algorithm: MD2 
       
    49 //!			Number of attributes: 0
       
    50 //!		
       
    51 //! @SYMPREQ CR0973
       
    52 //! @SYMREQ REQ1581.5
       
    53 //! @SYMTestPriority Critical
       
    54 //! @SYMTestActions PKCS10 certificate request construction.
       
    55 //! @SYMTestExpectedResults Encoding successfully validated
       
    56 //! @SYMTestType CIT
       
    57 //
       
    58 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
    59 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0002
       
    60 
       
    61 
       
    62 //! @SYMTestCaseID SEC-PKCS10-RSA-0003
       
    63 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for 
       
    64 //!		     certificate requests using the parameters listed below.
       
    65 //!		  	Key Algorithm: RSA
       
    66 //!			Key size: 512 bits 
       
    67 //!		        Digest Algorithm: MD5 
       
    68 //!			Number of attributes: 0
       
    69 //!		
       
    70 //! @SYMPREQ CR0973
       
    71 //! @SYMREQ REQ1581.5
       
    72 //! @SYMTestPriority Critical
       
    73 //! @SYMTestActions PKCS10 certificate request construction.
       
    74 //! @SYMTestExpectedResults Encoding successfully validated
       
    75 //! @SYMTestType CIT
       
    76 //
       
    77 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
    78 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0003
       
    79 
       
    80 
       
    81 //! @SYMTestCaseID SEC-PKCS10-RSA-0004
       
    82 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for 
       
    83 //!		     certificate requests using the parameters listed below.
       
    84 //!		  	Key Algorithm: RSA
       
    85 //!			Key size: 512 bits 
       
    86 //!		        Digest Algorithm: SHA1
       
    87 //!			Number of attributes: 1 (challenge password)
       
    88 //!		
       
    89 //! @SYMPREQ CR0973
       
    90 //! @SYMREQ REQ1581.5
       
    91 //! @SYMTestPriority Critical
       
    92 //! @SYMTestActions PKCS10 certificate request construction.
       
    93 //! @SYMTestExpectedResults Encoding successfully validated
       
    94 //! @SYMTestType CIT
       
    95 //
       
    96 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
    97 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0004
       
    98 
       
    99 
       
   100 //! @SYMTestCaseID SEC-PKCS10-RSA-0005
       
   101 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for 
       
   102 //!		     certificate requests using the parameters listed below.
       
   103 //!		  	Key Algorithm: RSA
       
   104 //!			Key size: 512 bits 
       
   105 //!		        Digest Algorithm: SHA1 
       
   106 //!			Number of attributes: 2 (challenge password and structured name)
       
   107 //!		
       
   108 //! @SYMPREQ CR0973
       
   109 //! @SYMREQ REQ1581.5
       
   110 //! @SYMTestPriority Critical
       
   111 //! @SYMTestActions PKCS10 certificate request construction.
       
   112 //! @SYMTestExpectedResults Encoding successfully validated
       
   113 //! @SYMTestType CIT
       
   114 //
       
   115 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
   116 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0005
       
   117 
       
   118 
       
   119 
       
   120 //! @SYMTestCaseID SEC-PKCS10-RSA-0006
       
   121 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for 
       
   122 //!		     certificate requests using the parameters listed below.
       
   123 //!		  	Key Algorithm: RSA
       
   124 //!			Key size: 2048 bits 
       
   125 //!		        Digest Algorithm: SHA1 
       
   126 //!			Number of attributes: 2 (challenge password and structured name)
       
   127 //!		
       
   128 //! @SYMPREQ CR0973
       
   129 //! @SYMREQ REQ1581.5
       
   130 //! @SYMTestPriority Critical
       
   131 //! @SYMTestActions PKCS10 certificate request construction.
       
   132 //! @SYMTestExpectedResults Encoding successfully validated
       
   133 //! @SYMTestType CIT
       
   134 //
       
   135 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
   136 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0006
       
   137 
       
   138 
       
   139 //! @SYMTestCaseID SEC-PKCS10-DSA-0001
       
   140 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for 
       
   141 //!		     certificate requests using the parameters listed below.
       
   142 //!		  	Key Algorithm: DSA
       
   143 //!			Key size: 512 bits 
       
   144 //!		        Digest Algorithm: SHA1 
       
   145 //!			Number of attributes: 0
       
   146 //!		
       
   147 //! @SYMPREQ CR0973
       
   148 //! @SYMREQ REQ1581.5
       
   149 //! @SYMTestPriority Critical
       
   150 //! @SYMTestActions PKCS10 certificate request construction.
       
   151 //! @SYMTestExpectedResults Encoding successfully validated
       
   152 //! @SYMTestType CIT
       
   153 //
       
   154 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
   155 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0001
       
   156 
       
   157 
       
   158 //! @SYMTestCaseID SEC-PKCS10-DSA-0002
       
   159 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for 
       
   160 //!		     certificate requests using the parameters listed below.
       
   161 //!		  	Key Algorithm: DSA
       
   162 //!			Key size: 512 bits 
       
   163 //!		        Digest Algorithm: SHA1
       
   164 //!			Number of attributes: 1 (challenge password)
       
   165 //!		
       
   166 //! @SYMPREQ CR0973
       
   167 //! @SYMREQ REQ1581.5
       
   168 //! @SYMTestPriority Critical
       
   169 //! @SYMTestActions PKCS10 certificate request construction.
       
   170 //! @SYMTestExpectedResults Encoding successfully validated
       
   171 //! @SYMTestType CIT
       
   172 //
       
   173 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
   174 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0002
       
   175 
       
   176 //! @SYMTestCaseID SEC-PKCS10-DSA-0003
       
   177 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for 
       
   178 //!		     certificate requests using the parameters listed below.
       
   179 //!		  	Key Algorithm: DSA
       
   180 //!			Key size: 512 bits 
       
   181 //!		        Digest Algorithm: SHA1 
       
   182 //!			Number of attributes: 2 (challenge password and structured name)
       
   183 //!		
       
   184 //! @SYMPREQ CR0973
       
   185 //! @SYMREQ REQ1581.5
       
   186 //! @SYMTestPriority Critical
       
   187 //! @SYMTestActions PKCS10 certificate request construction.
       
   188 //! @SYMTestExpectedResults Encoding successfully validated
       
   189 //! @SYMTestType CIT
       
   190 //
       
   191 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
   192 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0003
       
   193 
       
   194 //! @SYMTestCaseID SEC-PKCS10-DSA-0004
       
   195 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for 
       
   196 //!		     certificate requests using the parameters listed below.
       
   197 //!		  	Key Algorithm: DSA
       
   198 //!			Key size: 2048 bits 
       
   199 //!		        Digest Algorithm: SHA1 
       
   200 //!			Number of attributes: 2 (challenge password and structured name)
       
   201 //!		
       
   202 //! @SYMPREQ CR0973
       
   203 //! @SYMREQ REQ1581.5
       
   204 //! @SYMTestPriority Critical
       
   205 //! @SYMTestActions PKCS10 certificate request construction.
       
   206 //! @SYMTestExpectedResults Encoding successfully validated
       
   207 //! @SYMTestType CIT
       
   208 //
       
   209 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
   210 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0004
       
   211 
       
   212 
       
   213 //! @SYMTestCaseID SEC-PKCS10-EXT-0001
       
   214 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for 
       
   215 //!		     certificate requests including extension requestsusing the parameters listed below.
       
   216 //!		  	Key Algorithm: RSA
       
   217 //!			Key size: 2048 bits 
       
   218 //!		        Digest Algorithm: SHA1 
       
   219 //!			Number of attributes: 2 (challenge password and structured name)
       
   220 //!			Extensions used: basic Constraints,
       
   221 //!					 subject Alt Name,
       
   222 //!					 issuer Alt Name, 
       
   223 //!			                 key Usage,
       
   224 //!                                      extended Key Usage,
       
   225 //!					 authority Info Access 
       
   226 //!		
       
   227 //! @SYMPREQ CR0973
       
   228 //! @SYMREQ REQ1581.5
       
   229 //! @SYMTestPriority Critical
       
   230 //! @SYMTestActions PKCS10 certificate request construction.
       
   231 //! @SYMTestExpectedResults Encoding successfully validated
       
   232 //! @SYMTestType CIT
       
   233 //
       
   234 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
   235 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0001
       
   236 
       
   237 //! @SYMTestCaseID SEC-PKCS10-EXT-0002
       
   238 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for 
       
   239 //!		     certificate requests including extension requestsusing the parameters listed below.
       
   240 //!		  	Key Algorithm: RSA
       
   241 //!			Key size: 2048 bits 
       
   242 //!		        Digest Algorithm: MD2 
       
   243 //!			Number of attributes: 2 (challenge password and structured name)
       
   244 //!			Extensions used: basic Constraints,
       
   245 //!					 subject Alt Name,
       
   246 //!					 issuer Alt Name, 
       
   247 //!			                 key Usage,
       
   248 //!                                      extended Key Usage,
       
   249 //!					 authority Info Access 
       
   250 //!		
       
   251 //! @SYMPREQ CR0973
       
   252 //! @SYMREQ REQ1581.5
       
   253 //! @SYMTestPriority Critical
       
   254 //! @SYMTestActions PKCS10 certificate request construction.
       
   255 //! @SYMTestExpectedResults Encoding successfully validated
       
   256 //! @SYMTestType CIT
       
   257 //
       
   258 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
   259 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0002
       
   260 
       
   261 //! @SYMTestCaseID SEC-PKCS10-EXT-0003
       
   262 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for 
       
   263 //!		     certificate requests including extension requestsusing the parameters listed below.
       
   264 //!		  	Key Algorithm: RSA
       
   265 //!			Key size: 2048 bits 
       
   266 //!		        Digest Algorithm: MD5 
       
   267 //!			Number of attributes: 2 (challenge password and structured name)
       
   268 //!			Extensions used: basic Constraints,
       
   269 //!					 subject Alt Name,
       
   270 //!					 issuer Alt Name, 
       
   271 //!			                 key Usage,
       
   272 //!                                      extended Key Usage,
       
   273 //!					 authority Info Access 
       
   274 //!		
       
   275 //! @SYMPREQ CR0973
       
   276 //! @SYMREQ REQ1581.5
       
   277 //! @SYMTestPriority Critical
       
   278 //! @SYMTestActions PKCS10 certificate request construction.
       
   279 //! @SYMTestExpectedResults Encoding successfully validated
       
   280 //! @SYMTestType CIT
       
   281 //
       
   282 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
   283 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0003
       
   284 
       
   285 //! @SYMTestCaseID SEC-PKCS10-EXT-0004
       
   286 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for 
       
   287 //!		     certificate requests including extension requestsusing the parameters listed below.
       
   288 //!		  	Key Algorithm: DSA
       
   289 //!			Key size: 2048 bits 
       
   290 //!		        Digest Algorithm: SHA1 
       
   291 //!			Number of attributes: 2 (challenge password and structured name)
       
   292 //!			Extensions used: basic Constraints,
       
   293 //!					 subject Alt Name,
       
   294 //!					 issuer Alt Name, 
       
   295 //!			                 key Usage,
       
   296 //!                                      extended Key Usage,
       
   297 //!					 authority Info Access 
       
   298 //!		
       
   299 //! @SYMPREQ CR0973
       
   300 //! @SYMREQ REQ1581.5
       
   301 //! @SYMTestPriority Critical
       
   302 //! @SYMTestActions PKCS10 certificate request construction.
       
   303 //! @SYMTestExpectedResults Encoding successfully validated
       
   304 //! @SYMTestType CIT
       
   305 //
       
   306 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
   307 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0004
       
   308 
       
   309 
       
   310 //! @SYMTestCaseID SEC-PKCS10-OOM-0001
       
   311 //! @SYMTestCaseDesc To check that CPKCS10Request class can manage out of memory conditions graciously
       
   312 //!		  	Use the following parameters:
       
   313 //!			Key Algorithm: RSA
       
   314 //!			Key size: 512 bits 
       
   315 //!		        Digest Algorithm: SHA1 
       
   316 //!			Number of attributes: 2
       
   317 //!		
       
   318 //! @SYMPREQ CR0973
       
   319 //! @SYMREQ REQ1581.5
       
   320 //! @SYMTestPriority Critical
       
   321 //! @SYMTestActions PKCS10 certificate request construction in OOM conditions.
       
   322 //! @SYMTestExpectedResults Encoding successfully validated
       
   323 //! @SYMTestType CIT
       
   324 //
       
   325 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
   326 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-OOM-0001
       
   327 
       
   328 //! @SYMTestCaseID SEC-PKCS10-OOM-0002
       
   329 //! @SYMTestCaseDesc To check that CPKCS10Request class can manage out of memory conditions graciously
       
   330 //!		  	Use the following parameters:
       
   331 //!			Key Algorithm: DSA
       
   332 //!			Key size: 512 bits 
       
   333 //!		        Digest Algorithm: SHA1 
       
   334 //!			Number of attributes: 2
       
   335 //!		
       
   336 //! @SYMPREQ CR0973
       
   337 //! @SYMREQ REQ1581.5
       
   338 //! @SYMTestPriority Critical
       
   339 //! @SYMTestActions PKCS10 certificate request construction in OOM conditions.
       
   340 //! @SYMTestExpectedResults Encoding successfully validated
       
   341 //! @SYMTestType CIT
       
   342 //
       
   343 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
   344 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-OOM-0002
       
   345 
       
   346 //! @SYMTestCaseID SEC-PKCS10-REU-0001
       
   347 //! @SYMTestCaseDesc  To check that a CPKCS10Attribute can be reused with new values.
       
   348 //!		
       
   349 //! @SYMPREQ CR0973
       
   350 //! @SYMREQ REQ1581.5
       
   351 //! @SYMTestPriority Critical
       
   352 //! @SYMTestActions Create CPKCS10Attribute test object using using valid values.
       
   353 //!					Use GetEncodingLC to retrieve ASN1 value from this instance.
       
   354 //!					Use Reset method of CPKCS10Attribute test object with appropriate parameters.
       
   355 //!					Use GetEncodingLC method again to check that new ASN1 value had been 
       
   356 //!					updated correctly. 
       
   357 //!
       
   358 //! @SYMTestExpectedResults Encoding matches in both cases.
       
   359 //! @SYMTestType CIT
       
   360 //
       
   361 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
   362 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseAttribute c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0001
       
   363 
       
   364 //! @SYMTestCaseID SEC-PKCS10-REU-0002
       
   365 //! @SYMTestCaseDesc  To check that a CPKCS10Attribute can be reused with new values.
       
   366 //!		
       
   367 //! @SYMPREQ CR0973
       
   368 //! @SYMREQ REQ1581.5
       
   369 //! @SYMTestPriority Critical
       
   370 //! @SYMTestActions     Create CPKCS10Attribute instance with appropiate values
       
   371 //!                     GetEncodingLC from test instance
       
   372 //!                     repopulate data using appropiate methods 
       
   373 //! 			request a new cert request	
       
   374 //! @SYMTestExpectedResults New cert request in created correctly
       
   375 //! @SYMTestType CIT
       
   376 //
       
   377 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
   378 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0002
       
   379 
       
   380 //! @SYMTestCaseID SEC-PKCS10-REU-0003
       
   381 //! @SYMTestCaseDesc  To check that a CPKCS10Attribute can be reused with new values.
       
   382 //!		
       
   383 //! @SYMPREQ CR0973
       
   384 //! @SYMREQ REQ1581.5
       
   385 //! @SYMTestPriority Critical
       
   386 //! @SYMTestActions     Create CPKCS10Attribute instance with appropiate values
       
   387 //!                     GetEncodingLC from test instance
       
   388 //!                     Do not repopulate data.
       
   389 //! 			request a new cert request	
       
   390 //! @SYMTestExpectedResults New cert request in created correctly
       
   391 //! @SYMTestType CIT
       
   392 //
       
   393 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
   394 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0003
       
   395 
       
   396 //! @SYMTestCaseID SEC-PKCS10-REU-0004
       
   397 //! @SYMTestCaseDesc  To check that a CPKCS9ChallengePasswordAttr can be reused with new values.
       
   398 //!		
       
   399 //! @SYMPREQ CR0973
       
   400 //! @SYMREQ REQ1581.5
       
   401 //! @SYMTestPriority Critical
       
   402 //! @SYMTestActions Create CPKCS9ChallengePasswordAttr test object using valid value.
       
   403 //!					Use GetEncodingLC to retrieve ASN1 value from this instance.
       
   404 //!					Use Reset method of CPKCS9ChallengePasswordAttr test object 
       
   405 //!					with appropriate parameter.
       
   406 //!					Use GetEncodingLC method again to check that new ASN1 value 
       
   407 //!					had been updated correctly. 
       
   408 //! @SYMTestExpectedResults Encoding matches in both cases.
       
   409 //! @SYMTestType CIT
       
   410 //
       
   411 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
   412 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseChallengePasswordAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0004
       
   413 
       
   414 //! @SYMTestCaseID SEC-PKCS10-REU-0005
       
   415 //! @SYMTestCaseDesc  To check that a CPKCS10GenericAttr can be reused with new values.
       
   416 //!	
       
   417 //! @SYMPREQ CR0973
       
   418 //! @SYMREQ REQ1581.5
       
   419 //! @SYMTestPriority Critical
       
   420 //! @SYMTestActions Create CPKCS9ExtensionRequestAttr test object using valid values.
       
   421 //!					Use GetEncodingLC to retrieve ASN1 value from this instance.
       
   422 //!					Use ResetL method of CPKCS9ExtensionRequestAttr test object 
       
   423 //!					with appropriate parameters.
       
   424 //!					Use GetEncodingLC method again to check that new ASN1 value had 
       
   425 //!					been updated correctly. 
       
   426 //! @SYMTestExpectedResults Encoding matches in both cases.
       
   427 //! @SYMTestType CIT
       
   428 //
       
   429 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
   430 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseExtensionAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0005
       
   431 
       
   432 //! @SYMTestCaseID SEC-PKCS10-NEG-0001
       
   433 //! @SYMTestCaseDesc Check that CPKCS10GenericAttr class returns a 
       
   434 //!			KErrBadDescriptor (or KErrArgument) when its methods are used with 
       
   435 //!			invalid/null value parameters. 
       
   436 //!
       
   437 //! @SYMPREQ CR0973
       
   438 //! @SYMREQ REQ1581.5
       
   439 //! @SYMTestPriority Critical
       
   440 //! @SYMTestActions PKCS10 CPKCS10GenericAttr construction
       
   441 //! @SYMTestExpectedResults Returns KErrBadDescriptor (or KErrArgument)
       
   442 //! @SYMTestType CIT
       
   443 //
       
   444 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
   445 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10GenericAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0001
       
   446 
       
   447 //! @SYMTestCaseID SEC-PKCS10-NEG-0002
       
   448 //! @SYMTestCaseDesc Check that CPKCS9ChallengePasswordAttr class returns a 
       
   449 //!			KErrArgument when its methods are used with null value parameters. 
       
   450 //!		
       
   451 //! @SYMPREQ CR0973
       
   452 //! @SYMREQ REQ1581.5
       
   453 //! @SYMTestPriority Critical
       
   454 //! @SYMTestActions PKCS10 CPKCS9ChallengePasswordAttr construction
       
   455 //! @SYMTestExpectedResults Returns KErrArgument
       
   456 //! @SYMTestType CIT
       
   457 //
       
   458 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
   459 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS9ChPwdAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0002
       
   460 
       
   461 //! @SYMTestCaseID SEC-PKCS10-NEG-0003
       
   462 //! @SYMTestCaseDesc Check that CPKCS9ExtensionRequestAttr class can recognise 
       
   463 //!			when application is trying to add malformed or un-initialised cert 
       
   464 //!			extension object to extension request.
       
   465 //!
       
   466 //! @SYMPREQ CR0973
       
   467 //! @SYMREQ REQ1581.5
       
   468 //! @SYMTestPriority Critical
       
   469 //! @SYMTestActions PKCS10 CPKCS9ExtensionRequestAttr construction.
       
   470 //! @SYMTestExpectedResults Returns KErrBadDescriptor
       
   471 //! @SYMTestType CIT
       
   472 //
       
   473 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
   474 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS9ExtReqAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0003
       
   475 
       
   476 //! @SYMTestCaseID SEC-PKCS10-NEG-0004
       
   477 //! @SYMTestCaseDesc Check that CPKCS9ExtensionRequestAttr class returns a 
       
   478 //!			KErrArgument when its methods are used with null value parameters.
       
   479 //!		
       
   480 //! @SYMPREQ CR0973
       
   481 //! @SYMREQ REQ1581.5
       
   482 //! @SYMTestPriority Critical
       
   483 //! @SYMTestActions PKCS10 CPKCS9ExtensionRequestAttr construction
       
   484 //! @SYMTestExpectedResults Returns KErrArgument
       
   485 //! @SYMTestType CIT
       
   486 //
       
   487 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
   488 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10Attributes c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0004
       
   489 
       
   490 //! @SYMTestCaseID SEC-PKCS10-NEG-0005
       
   491 //! @SYMTestCaseDesc Check that CPKCS10Request class returns a KErrArgument when 
       
   492 //!			its methods are used with invalid value parameters.
       
   493 //!		
       
   494 //! @SYMPREQ CR0973
       
   495 //! @SYMREQ REQ1581.5
       
   496 //! @SYMTestPriority Critical
       
   497 //! @SYMTestActions PKCS10 CPKCS10Request construction.
       
   498 //! @SYMTestExpectedResults Returns KErrArgument
       
   499 //! @SYMTestType CIT
       
   500 //
       
   501 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
   502 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10Request c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0005
       
   503 
       
   504 //! @SYMTestCaseID SEC-PKCS10-DEF103311-0001
       
   505 //! @SYMTestCaseDesc Test case added for defect DEF103311, increases test coverage for PKCS1-
       
   506 //!		
       
   507 //! @SYMREQ REQ0000
       
   508 //! @SYMTestPriority Critical
       
   509 //! @SYMTestActions Creates a CPKCS10Request and then cancels it. 
       
   510 //! @SYMTestExpectedResults Returns KErrNone, no memory leak.
       
   511 //! @SYMTestType CIT
       
   512 //
       
   513 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
       
   514 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CancelRequestA c:\tpkcs10\scripts\tpkcs10_v2.ini DEF103311-0001
       
   515 
       
   516 //Post- test: re-states key store file
       
   517 RUN_UTILS CopyFile c:\keys.dat c:\private\101f72a6\keys.dat 
       
   518 RUN_UTILS DeleteFile c:\keys.dat 
       
   519 
       
   520 PRINT Complete_tpkcs10serverv2_Tests