|
1 // |
|
2 // Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies). |
|
3 // All rights reserved. |
|
4 // This component and the accompanying materials are made available |
|
5 // under the terms of the License "Eclipse Public License v1.0" |
|
6 // which accompanies this distribution, and is available |
|
7 // at the URL "http://www.eclipse.org/legal/epl-v10.html". |
|
8 // |
|
9 // Initial Contributors: |
|
10 // Nokia Corporation - initial contribution. |
|
11 // |
|
12 // Contributors: |
|
13 // |
|
14 // Description: |
|
15 // |
|
16 // |
|
17 PRINT Run Positive and OOM tests tpkcs1010serverv2 Suite |
|
18 |
|
19 LOAD_SUITE tpkcs10serverv2 |
|
20 |
|
21 // pre- test: move out of the way key store file. |
|
22 RUN_UTILS CopyFile c:\private\101f72a6\keys.dat c:\keys.dat |
|
23 |
|
24 //! @SYMTestCaseID SEC-PKCS10-RSA-0001 |
|
25 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for |
|
26 //! certificate requests using the parameters listed below. |
|
27 //! Key Algorithm: RSA |
|
28 //! Key size: 512 bits |
|
29 //! Digest Algorithm: SHA1 |
|
30 //! Number of attributes: 0 |
|
31 //! |
|
32 //! @SYMPREQ CR0973 |
|
33 //! @SYMREQ REQ1581.5 |
|
34 //! @SYMTestPriority Critical |
|
35 //! @SYMTestActions PKCS10 certificate request construction. |
|
36 //! @SYMTestExpectedResults Encoding successfully validated |
|
37 //! @SYMTestType CIT |
|
38 // |
|
39 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
40 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0001 |
|
41 |
|
42 |
|
43 //! @SYMTestCaseID SEC-PKCS10-RSA-0002 |
|
44 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for |
|
45 //! certificate requests using the parameters listed below. |
|
46 //! Key Algorithm: RSA |
|
47 //! Key size: 512 bits |
|
48 //! Digest Algorithm: MD2 |
|
49 //! Number of attributes: 0 |
|
50 //! |
|
51 //! @SYMPREQ CR0973 |
|
52 //! @SYMREQ REQ1581.5 |
|
53 //! @SYMTestPriority Critical |
|
54 //! @SYMTestActions PKCS10 certificate request construction. |
|
55 //! @SYMTestExpectedResults Encoding successfully validated |
|
56 //! @SYMTestType CIT |
|
57 // |
|
58 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
59 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0002 |
|
60 |
|
61 |
|
62 //! @SYMTestCaseID SEC-PKCS10-RSA-0003 |
|
63 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for |
|
64 //! certificate requests using the parameters listed below. |
|
65 //! Key Algorithm: RSA |
|
66 //! Key size: 512 bits |
|
67 //! Digest Algorithm: MD5 |
|
68 //! Number of attributes: 0 |
|
69 //! |
|
70 //! @SYMPREQ CR0973 |
|
71 //! @SYMREQ REQ1581.5 |
|
72 //! @SYMTestPriority Critical |
|
73 //! @SYMTestActions PKCS10 certificate request construction. |
|
74 //! @SYMTestExpectedResults Encoding successfully validated |
|
75 //! @SYMTestType CIT |
|
76 // |
|
77 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
78 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0003 |
|
79 |
|
80 |
|
81 //! @SYMTestCaseID SEC-PKCS10-RSA-0004 |
|
82 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for |
|
83 //! certificate requests using the parameters listed below. |
|
84 //! Key Algorithm: RSA |
|
85 //! Key size: 512 bits |
|
86 //! Digest Algorithm: SHA1 |
|
87 //! Number of attributes: 1 (challenge password) |
|
88 //! |
|
89 //! @SYMPREQ CR0973 |
|
90 //! @SYMREQ REQ1581.5 |
|
91 //! @SYMTestPriority Critical |
|
92 //! @SYMTestActions PKCS10 certificate request construction. |
|
93 //! @SYMTestExpectedResults Encoding successfully validated |
|
94 //! @SYMTestType CIT |
|
95 // |
|
96 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
97 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0004 |
|
98 |
|
99 |
|
100 //! @SYMTestCaseID SEC-PKCS10-RSA-0005 |
|
101 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for |
|
102 //! certificate requests using the parameters listed below. |
|
103 //! Key Algorithm: RSA |
|
104 //! Key size: 512 bits |
|
105 //! Digest Algorithm: SHA1 |
|
106 //! Number of attributes: 2 (challenge password and structured name) |
|
107 //! |
|
108 //! @SYMPREQ CR0973 |
|
109 //! @SYMREQ REQ1581.5 |
|
110 //! @SYMTestPriority Critical |
|
111 //! @SYMTestActions PKCS10 certificate request construction. |
|
112 //! @SYMTestExpectedResults Encoding successfully validated |
|
113 //! @SYMTestType CIT |
|
114 // |
|
115 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
116 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0005 |
|
117 |
|
118 |
|
119 |
|
120 //! @SYMTestCaseID SEC-PKCS10-RSA-0006 |
|
121 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for |
|
122 //! certificate requests using the parameters listed below. |
|
123 //! Key Algorithm: RSA |
|
124 //! Key size: 2048 bits |
|
125 //! Digest Algorithm: SHA1 |
|
126 //! Number of attributes: 2 (challenge password and structured name) |
|
127 //! |
|
128 //! @SYMPREQ CR0973 |
|
129 //! @SYMREQ REQ1581.5 |
|
130 //! @SYMTestPriority Critical |
|
131 //! @SYMTestActions PKCS10 certificate request construction. |
|
132 //! @SYMTestExpectedResults Encoding successfully validated |
|
133 //! @SYMTestType CIT |
|
134 // |
|
135 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
136 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0006 |
|
137 |
|
138 |
|
139 //! @SYMTestCaseID SEC-PKCS10-DSA-0001 |
|
140 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for |
|
141 //! certificate requests using the parameters listed below. |
|
142 //! Key Algorithm: DSA |
|
143 //! Key size: 512 bits |
|
144 //! Digest Algorithm: SHA1 |
|
145 //! Number of attributes: 0 |
|
146 //! |
|
147 //! @SYMPREQ CR0973 |
|
148 //! @SYMREQ REQ1581.5 |
|
149 //! @SYMTestPriority Critical |
|
150 //! @SYMTestActions PKCS10 certificate request construction. |
|
151 //! @SYMTestExpectedResults Encoding successfully validated |
|
152 //! @SYMTestType CIT |
|
153 // |
|
154 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
155 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0001 |
|
156 |
|
157 |
|
158 //! @SYMTestCaseID SEC-PKCS10-DSA-0002 |
|
159 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for |
|
160 //! certificate requests using the parameters listed below. |
|
161 //! Key Algorithm: DSA |
|
162 //! Key size: 512 bits |
|
163 //! Digest Algorithm: SHA1 |
|
164 //! Number of attributes: 1 (challenge password) |
|
165 //! |
|
166 //! @SYMPREQ CR0973 |
|
167 //! @SYMREQ REQ1581.5 |
|
168 //! @SYMTestPriority Critical |
|
169 //! @SYMTestActions PKCS10 certificate request construction. |
|
170 //! @SYMTestExpectedResults Encoding successfully validated |
|
171 //! @SYMTestType CIT |
|
172 // |
|
173 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
174 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0002 |
|
175 |
|
176 //! @SYMTestCaseID SEC-PKCS10-DSA-0003 |
|
177 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for |
|
178 //! certificate requests using the parameters listed below. |
|
179 //! Key Algorithm: DSA |
|
180 //! Key size: 512 bits |
|
181 //! Digest Algorithm: SHA1 |
|
182 //! Number of attributes: 2 (challenge password and structured name) |
|
183 //! |
|
184 //! @SYMPREQ CR0973 |
|
185 //! @SYMREQ REQ1581.5 |
|
186 //! @SYMTestPriority Critical |
|
187 //! @SYMTestActions PKCS10 certificate request construction. |
|
188 //! @SYMTestExpectedResults Encoding successfully validated |
|
189 //! @SYMTestType CIT |
|
190 // |
|
191 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
192 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0003 |
|
193 |
|
194 //! @SYMTestCaseID SEC-PKCS10-DSA-0004 |
|
195 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for |
|
196 //! certificate requests using the parameters listed below. |
|
197 //! Key Algorithm: DSA |
|
198 //! Key size: 2048 bits |
|
199 //! Digest Algorithm: SHA1 |
|
200 //! Number of attributes: 2 (challenge password and structured name) |
|
201 //! |
|
202 //! @SYMPREQ CR0973 |
|
203 //! @SYMREQ REQ1581.5 |
|
204 //! @SYMTestPriority Critical |
|
205 //! @SYMTestActions PKCS10 certificate request construction. |
|
206 //! @SYMTestExpectedResults Encoding successfully validated |
|
207 //! @SYMTestType CIT |
|
208 // |
|
209 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
210 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0004 |
|
211 |
|
212 |
|
213 //! @SYMTestCaseID SEC-PKCS10-EXT-0001 |
|
214 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for |
|
215 //! certificate requests including extension requestsusing the parameters listed below. |
|
216 //! Key Algorithm: RSA |
|
217 //! Key size: 2048 bits |
|
218 //! Digest Algorithm: SHA1 |
|
219 //! Number of attributes: 2 (challenge password and structured name) |
|
220 //! Extensions used: basic Constraints, |
|
221 //! subject Alt Name, |
|
222 //! issuer Alt Name, |
|
223 //! key Usage, |
|
224 //! extended Key Usage, |
|
225 //! authority Info Access |
|
226 //! |
|
227 //! @SYMPREQ CR0973 |
|
228 //! @SYMREQ REQ1581.5 |
|
229 //! @SYMTestPriority Critical |
|
230 //! @SYMTestActions PKCS10 certificate request construction. |
|
231 //! @SYMTestExpectedResults Encoding successfully validated |
|
232 //! @SYMTestType CIT |
|
233 // |
|
234 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
235 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0001 |
|
236 |
|
237 //! @SYMTestCaseID SEC-PKCS10-EXT-0002 |
|
238 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for |
|
239 //! certificate requests including extension requestsusing the parameters listed below. |
|
240 //! Key Algorithm: RSA |
|
241 //! Key size: 2048 bits |
|
242 //! Digest Algorithm: MD2 |
|
243 //! Number of attributes: 2 (challenge password and structured name) |
|
244 //! Extensions used: basic Constraints, |
|
245 //! subject Alt Name, |
|
246 //! issuer Alt Name, |
|
247 //! key Usage, |
|
248 //! extended Key Usage, |
|
249 //! authority Info Access |
|
250 //! |
|
251 //! @SYMPREQ CR0973 |
|
252 //! @SYMREQ REQ1581.5 |
|
253 //! @SYMTestPriority Critical |
|
254 //! @SYMTestActions PKCS10 certificate request construction. |
|
255 //! @SYMTestExpectedResults Encoding successfully validated |
|
256 //! @SYMTestType CIT |
|
257 // |
|
258 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
259 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0002 |
|
260 |
|
261 //! @SYMTestCaseID SEC-PKCS10-EXT-0003 |
|
262 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for |
|
263 //! certificate requests including extension requestsusing the parameters listed below. |
|
264 //! Key Algorithm: RSA |
|
265 //! Key size: 2048 bits |
|
266 //! Digest Algorithm: MD5 |
|
267 //! Number of attributes: 2 (challenge password and structured name) |
|
268 //! Extensions used: basic Constraints, |
|
269 //! subject Alt Name, |
|
270 //! issuer Alt Name, |
|
271 //! key Usage, |
|
272 //! extended Key Usage, |
|
273 //! authority Info Access |
|
274 //! |
|
275 //! @SYMPREQ CR0973 |
|
276 //! @SYMREQ REQ1581.5 |
|
277 //! @SYMTestPriority Critical |
|
278 //! @SYMTestActions PKCS10 certificate request construction. |
|
279 //! @SYMTestExpectedResults Encoding successfully validated |
|
280 //! @SYMTestType CIT |
|
281 // |
|
282 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
283 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0003 |
|
284 |
|
285 //! @SYMTestCaseID SEC-PKCS10-EXT-0004 |
|
286 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for |
|
287 //! certificate requests including extension requestsusing the parameters listed below. |
|
288 //! Key Algorithm: DSA |
|
289 //! Key size: 2048 bits |
|
290 //! Digest Algorithm: SHA1 |
|
291 //! Number of attributes: 2 (challenge password and structured name) |
|
292 //! Extensions used: basic Constraints, |
|
293 //! subject Alt Name, |
|
294 //! issuer Alt Name, |
|
295 //! key Usage, |
|
296 //! extended Key Usage, |
|
297 //! authority Info Access |
|
298 //! |
|
299 //! @SYMPREQ CR0973 |
|
300 //! @SYMREQ REQ1581.5 |
|
301 //! @SYMTestPriority Critical |
|
302 //! @SYMTestActions PKCS10 certificate request construction. |
|
303 //! @SYMTestExpectedResults Encoding successfully validated |
|
304 //! @SYMTestType CIT |
|
305 // |
|
306 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
307 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0004 |
|
308 |
|
309 |
|
310 //! @SYMTestCaseID SEC-PKCS10-OOM-0001 |
|
311 //! @SYMTestCaseDesc To check that CPKCS10Request class can manage out of memory conditions graciously |
|
312 //! Use the following parameters: |
|
313 //! Key Algorithm: RSA |
|
314 //! Key size: 512 bits |
|
315 //! Digest Algorithm: SHA1 |
|
316 //! Number of attributes: 2 |
|
317 //! |
|
318 //! @SYMPREQ CR0973 |
|
319 //! @SYMREQ REQ1581.5 |
|
320 //! @SYMTestPriority Critical |
|
321 //! @SYMTestActions PKCS10 certificate request construction in OOM conditions. |
|
322 //! @SYMTestExpectedResults Encoding successfully validated |
|
323 //! @SYMTestType CIT |
|
324 // |
|
325 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
326 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-OOM-0001 |
|
327 |
|
328 //! @SYMTestCaseID SEC-PKCS10-OOM-0002 |
|
329 //! @SYMTestCaseDesc To check that CPKCS10Request class can manage out of memory conditions graciously |
|
330 //! Use the following parameters: |
|
331 //! Key Algorithm: DSA |
|
332 //! Key size: 512 bits |
|
333 //! Digest Algorithm: SHA1 |
|
334 //! Number of attributes: 2 |
|
335 //! |
|
336 //! @SYMPREQ CR0973 |
|
337 //! @SYMREQ REQ1581.5 |
|
338 //! @SYMTestPriority Critical |
|
339 //! @SYMTestActions PKCS10 certificate request construction in OOM conditions. |
|
340 //! @SYMTestExpectedResults Encoding successfully validated |
|
341 //! @SYMTestType CIT |
|
342 // |
|
343 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
344 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-OOM-0002 |
|
345 |
|
346 //! @SYMTestCaseID SEC-PKCS10-REU-0001 |
|
347 //! @SYMTestCaseDesc To check that a CPKCS10Attribute can be reused with new values. |
|
348 //! |
|
349 //! @SYMPREQ CR0973 |
|
350 //! @SYMREQ REQ1581.5 |
|
351 //! @SYMTestPriority Critical |
|
352 //! @SYMTestActions Create CPKCS10Attribute test object using using valid values. |
|
353 //! Use GetEncodingLC to retrieve ASN1 value from this instance. |
|
354 //! Use Reset method of CPKCS10Attribute test object with appropriate parameters. |
|
355 //! Use GetEncodingLC method again to check that new ASN1 value had been |
|
356 //! updated correctly. |
|
357 //! |
|
358 //! @SYMTestExpectedResults Encoding matches in both cases. |
|
359 //! @SYMTestType CIT |
|
360 // |
|
361 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
362 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseAttribute c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0001 |
|
363 |
|
364 //! @SYMTestCaseID SEC-PKCS10-REU-0002 |
|
365 //! @SYMTestCaseDesc To check that a CPKCS10Attribute can be reused with new values. |
|
366 //! |
|
367 //! @SYMPREQ CR0973 |
|
368 //! @SYMREQ REQ1581.5 |
|
369 //! @SYMTestPriority Critical |
|
370 //! @SYMTestActions Create CPKCS10Attribute instance with appropiate values |
|
371 //! GetEncodingLC from test instance |
|
372 //! repopulate data using appropiate methods |
|
373 //! request a new cert request |
|
374 //! @SYMTestExpectedResults New cert request in created correctly |
|
375 //! @SYMTestType CIT |
|
376 // |
|
377 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
378 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0002 |
|
379 |
|
380 //! @SYMTestCaseID SEC-PKCS10-REU-0003 |
|
381 //! @SYMTestCaseDesc To check that a CPKCS10Attribute can be reused with new values. |
|
382 //! |
|
383 //! @SYMPREQ CR0973 |
|
384 //! @SYMREQ REQ1581.5 |
|
385 //! @SYMTestPriority Critical |
|
386 //! @SYMTestActions Create CPKCS10Attribute instance with appropiate values |
|
387 //! GetEncodingLC from test instance |
|
388 //! Do not repopulate data. |
|
389 //! request a new cert request |
|
390 //! @SYMTestExpectedResults New cert request in created correctly |
|
391 //! @SYMTestType CIT |
|
392 // |
|
393 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
394 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0003 |
|
395 |
|
396 //! @SYMTestCaseID SEC-PKCS10-REU-0004 |
|
397 //! @SYMTestCaseDesc To check that a CPKCS9ChallengePasswordAttr can be reused with new values. |
|
398 //! |
|
399 //! @SYMPREQ CR0973 |
|
400 //! @SYMREQ REQ1581.5 |
|
401 //! @SYMTestPriority Critical |
|
402 //! @SYMTestActions Create CPKCS9ChallengePasswordAttr test object using valid value. |
|
403 //! Use GetEncodingLC to retrieve ASN1 value from this instance. |
|
404 //! Use Reset method of CPKCS9ChallengePasswordAttr test object |
|
405 //! with appropriate parameter. |
|
406 //! Use GetEncodingLC method again to check that new ASN1 value |
|
407 //! had been updated correctly. |
|
408 //! @SYMTestExpectedResults Encoding matches in both cases. |
|
409 //! @SYMTestType CIT |
|
410 // |
|
411 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
412 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseChallengePasswordAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0004 |
|
413 |
|
414 //! @SYMTestCaseID SEC-PKCS10-REU-0005 |
|
415 //! @SYMTestCaseDesc To check that a CPKCS10GenericAttr can be reused with new values. |
|
416 //! |
|
417 //! @SYMPREQ CR0973 |
|
418 //! @SYMREQ REQ1581.5 |
|
419 //! @SYMTestPriority Critical |
|
420 //! @SYMTestActions Create CPKCS9ExtensionRequestAttr test object using valid values. |
|
421 //! Use GetEncodingLC to retrieve ASN1 value from this instance. |
|
422 //! Use ResetL method of CPKCS9ExtensionRequestAttr test object |
|
423 //! with appropriate parameters. |
|
424 //! Use GetEncodingLC method again to check that new ASN1 value had |
|
425 //! been updated correctly. |
|
426 //! @SYMTestExpectedResults Encoding matches in both cases. |
|
427 //! @SYMTestType CIT |
|
428 // |
|
429 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
430 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseExtensionAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0005 |
|
431 |
|
432 //! @SYMTestCaseID SEC-PKCS10-NEG-0001 |
|
433 //! @SYMTestCaseDesc Check that CPKCS10GenericAttr class returns a |
|
434 //! KErrBadDescriptor (or KErrArgument) when its methods are used with |
|
435 //! invalid/null value parameters. |
|
436 //! |
|
437 //! @SYMPREQ CR0973 |
|
438 //! @SYMREQ REQ1581.5 |
|
439 //! @SYMTestPriority Critical |
|
440 //! @SYMTestActions PKCS10 CPKCS10GenericAttr construction |
|
441 //! @SYMTestExpectedResults Returns KErrBadDescriptor (or KErrArgument) |
|
442 //! @SYMTestType CIT |
|
443 // |
|
444 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
445 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10GenericAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0001 |
|
446 |
|
447 //! @SYMTestCaseID SEC-PKCS10-NEG-0002 |
|
448 //! @SYMTestCaseDesc Check that CPKCS9ChallengePasswordAttr class returns a |
|
449 //! KErrArgument when its methods are used with null value parameters. |
|
450 //! |
|
451 //! @SYMPREQ CR0973 |
|
452 //! @SYMREQ REQ1581.5 |
|
453 //! @SYMTestPriority Critical |
|
454 //! @SYMTestActions PKCS10 CPKCS9ChallengePasswordAttr construction |
|
455 //! @SYMTestExpectedResults Returns KErrArgument |
|
456 //! @SYMTestType CIT |
|
457 // |
|
458 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
459 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS9ChPwdAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0002 |
|
460 |
|
461 //! @SYMTestCaseID SEC-PKCS10-NEG-0003 |
|
462 //! @SYMTestCaseDesc Check that CPKCS9ExtensionRequestAttr class can recognise |
|
463 //! when application is trying to add malformed or un-initialised cert |
|
464 //! extension object to extension request. |
|
465 //! |
|
466 //! @SYMPREQ CR0973 |
|
467 //! @SYMREQ REQ1581.5 |
|
468 //! @SYMTestPriority Critical |
|
469 //! @SYMTestActions PKCS10 CPKCS9ExtensionRequestAttr construction. |
|
470 //! @SYMTestExpectedResults Returns KErrBadDescriptor |
|
471 //! @SYMTestType CIT |
|
472 // |
|
473 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
474 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS9ExtReqAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0003 |
|
475 |
|
476 //! @SYMTestCaseID SEC-PKCS10-NEG-0004 |
|
477 //! @SYMTestCaseDesc Check that CPKCS9ExtensionRequestAttr class returns a |
|
478 //! KErrArgument when its methods are used with null value parameters. |
|
479 //! |
|
480 //! @SYMPREQ CR0973 |
|
481 //! @SYMREQ REQ1581.5 |
|
482 //! @SYMTestPriority Critical |
|
483 //! @SYMTestActions PKCS10 CPKCS9ExtensionRequestAttr construction |
|
484 //! @SYMTestExpectedResults Returns KErrArgument |
|
485 //! @SYMTestType CIT |
|
486 // |
|
487 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
488 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10Attributes c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0004 |
|
489 |
|
490 //! @SYMTestCaseID SEC-PKCS10-NEG-0005 |
|
491 //! @SYMTestCaseDesc Check that CPKCS10Request class returns a KErrArgument when |
|
492 //! its methods are used with invalid value parameters. |
|
493 //! |
|
494 //! @SYMPREQ CR0973 |
|
495 //! @SYMREQ REQ1581.5 |
|
496 //! @SYMTestPriority Critical |
|
497 //! @SYMTestActions PKCS10 CPKCS10Request construction. |
|
498 //! @SYMTestExpectedResults Returns KErrArgument |
|
499 //! @SYMTestType CIT |
|
500 // |
|
501 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
502 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10Request c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0005 |
|
503 |
|
504 //! @SYMTestCaseID SEC-PKCS10-DEF103311-0001 |
|
505 //! @SYMTestCaseDesc Test case added for defect DEF103311, increases test coverage for PKCS1- |
|
506 //! |
|
507 //! @SYMREQ REQ0000 |
|
508 //! @SYMTestPriority Critical |
|
509 //! @SYMTestActions Creates a CPKCS10Request and then cancels it. |
|
510 //! @SYMTestExpectedResults Returns KErrNone, no memory leak. |
|
511 //! @SYMTestType CIT |
|
512 // |
|
513 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat |
|
514 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CancelRequestA c:\tpkcs10\scripts\tpkcs10_v2.ini DEF103311-0001 |
|
515 |
|
516 //Post- test: re-states key store file |
|
517 RUN_UTILS CopyFile c:\keys.dat c:\private\101f72a6\keys.dat |
|
518 RUN_UTILS DeleteFile c:\keys.dat |
|
519 |
|
520 PRINT Complete_tpkcs10serverv2_Tests |