networksecurity/ipsec/te_ipsec/scripts/ns-ipsec-ikev2-ops.script
author William Roberts <williamr@symbian.org>
Thu, 17 Jun 2010 22:32:38 +0100
branchGCC_SURGE
changeset 32 bfda2439fb70
parent 0 af10295192d8
permissions -rw-r--r--
Mark TMeta vtable and typeinfo exports as ABSENT - Bug 3024

//
// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
// All rights reserved.
// This component and the accompanying materials are made available
// under the terms of "Eclipse Public License v1.0"
// which accompanies this distribution, and is available
// at the URL "http://www.eclipse.org/legal/epl-v10.html".
//
// Initial Contributors:
// Nokia Corporation - initial contribution.
//
// Contributors:
//
// Description:
//
/////////////////////////////////////////////////////////////////
//! @file
//! @SYMScriptAuthor        divakare
//! @SYMTestSuiteName       ns-ipsec-ikev2
//! @SYMScriptCreationDate  Fri Nov 14 16:07:30 IST 2008
/////////////////////////////////////////////////////////////////

PRINT Run test case(s) for suite ns-ipsec-ikev2

// ToDo: Remember to load the relevant suite before starting any test case(s)
LOAD_SUITE	t_ipsec  -SharedData
RUN_UTILS CopyFile z:\testdata\configs\ethernetced1853.xml c:\ethernetced1853.xml
RUN_UTILS MakeReadWrite c:\ethernetced1853.xml
RUN_PROGRAM -1 ced c:\ethernetced1853.xml

//Create private folder
RUN_UTILS MkDir c:\private\101f7993\

//copy linux_tunnel.pin file from data folder to private folder - one time job
RUN_UTILS CopyFile z:\testdata\configs\linux_tunnel.pin c:\private\101f7993\linux_tunnel.pin
RUN_UTILS MakeReadWrite c:\private\101f7993\linux_tunnel.pin

//copy epoc2linux.xml file from data folder to c: drive - one time job
RUN_UTILS CopyFile z:\testdata\configs\epoc2linux.xml c:\epoc2linux.xml
RUN_UTILS MakeReadWrite c:\epoc2linux.xml

START_TESTCASE NET-IPSec-NewAlg_IKEV2_IPsec_SA-001
//! @SYMTestCaseID          NET-IPSec-NewAlg_IKEV2_IPsec_SA-001
//! @SYMCreationDate        15-09-2008
//! @SYMAuthor              divyadsouza
//! @SYMTestCaseDesc        IPSec ESP profiles/IKEv2 to support new crypto algorithms.
//!                         
//!                         This test is to check if the implementation adheres to the 3 GPP specification (3GPP TS 33.234)
//!                         
//!                         DUT should act as the Initiator for Phase 1.
//!                         
//!                         Phase 1
//!                         Mode - Main
//!                         Encryption Algorithm - 3DES-CBC
//!                         Pseudo Random Function - HMAC-SHA1
//!                         Hash Algorithm - HMAC-SHA1
//!                         Authentication Method - (PSK) Pre-Shared Key
//!                         DH Group - 2
//!                         
//!                         Phase 2
//!                         Security Protocol - ESP
//!                         Encapsulation Mode - Tunnel
//!                         Encryption Algorithm - 3DES-CBC
//!                         Authentication Algorithm - HMAC-SHA1
//! @SYMTestExpectedResults The IKEv2 SA negotiation may propose a Pseudo Random Function during its SA negotiation.
//!                         
//!                         This test is to test that the above proposal works.
//! @SYMTestActions         The IKEv2 SA negotiation may propose a Pseudo Random Function during its SA negotiation.
//! @SYMREQ                 REQ10662
	//copy linux_tunnel.pol file from data folder to private folder
	RUN_UTILS DeleteFile c:\private\101f7993\linux_tunnel.pol
	RUN_UTILS CopyFile z:\TestData\configs\linux_tunnel1.pol c:\private\101f7993\linux_tunnel.pol
	RUN_UTILS MakeReadWrite c:\private\101f7993\linux_tunnel.pol
	
	//run batch file to ping the linux machine. Pol file is change, so need ceding again.
	RUN_PROGRAM -1 ced c:\epoc2linux.xml
	
	START_TEST_BLOCK    100     t_ipsec     z:\testdata\scripts\ns-ipsec-ikev2test-ops.ini
	        CREATE_OBJECT   IPSecIKEv2TestWrapper    IKEv2TestWrapperSection
	        COMMAND     IKEv2TestWrapperSection  New
	        COMMAND   IKEv2TestWrapperSection  TestIKEv2 Value1ParamSection
	END_TEST_BLOCK	
END_TESTCASE NET-IPSec-NewAlg_IKEV2_IPsec_SA-001

START_TESTCASE NET-IPSec-NewAlg_IKEV2_IPsec_SA-002
//! @SYMTestCaseID          NET-IPSec-NewAlg_IKEV2_IPsec_SA-002
//! @SYMCreationDate        15-09-2008
//! @SYMAuthor              divyadsouza
//! @SYMTestCaseDesc        IPSec ESP profiles/IKEv2 to support new crypto algorithms. TS 33.234
//!                         
//!                         DUT should act as the Initiator for Phase 1.
//!                         
//!                         Phase 1
//!                         Mode - Main
//!                         Encryption Algorithm - AES with 128-bit keys in CBC mode
//!                         Pseudo Random Function - AES-XCBC-PRF-128
//!                         Hash Algorithm - AES-XCBC-MAC-96
//!                         Authentication Method - (PSK) Pre-Shared Key
//!                         DH Group - 2
//!                         
//!                         Phase 2
//!                         Security Protocol - ESP
//!                         Encapsulation Mode - Tunnel
//!                         Encryption Algorithm - AES with 128-bit keys in CBC mode
//!                         Authentication Algorithm - AES-XCBC-MAC-96
//! @SYMREQ                 REQ10662
	//copy linux_tunnel.pol file from data folder to private folder
	RUN_UTILS DeleteFile c:\private\101f7993\linux_tunnel.pol
	RUN_UTILS CopyFile z:\TestData\configs\linux_tunnel2.pol c:\private\101f7993\linux_tunnel.pol
	RUN_UTILS MakeReadWrite c:\private\101f7993\linux_tunnel.pol
	
	//run batch file to ping the linux machine. Pol file is change, so need ceding again.
	RUN_PROGRAM -1 ced c:\epoc2linux.xml
	
	START_TEST_BLOCK    100     t_ipsec     z:\testdata\scripts\ns-ipsec-ikev2test-ops.ini
	        CREATE_OBJECT   IPSecIKEv2TestWrapper    IKEv2TestWrapperSection
	        COMMAND     IKEv2TestWrapperSection  New
	        COMMAND     IKEv2TestWrapperSection  TestIKEv2 Value1ParamSection
	END_TEST_BLOCK
END_TESTCASE NET-IPSec-NewAlg_IKEV2_IPsec_SA-002

START_TESTCASE NET-IPSec-NewAlg_IKEV2_IPsec_SA-003
//! @SYMTestCaseID          NET-IPSec-NewAlg_IKEV2_IPsec_SA-003
//! @SYMCreationDate        15-09-2008
//! @SYMAuthor              divyadsouza
//! @SYMTestCaseDesc        IPSec ESP profiles/IKEv2 to support new crypto algorithms. TS 33.234
//!                         
//!                         DUT should act as the Initiator for Phase 1.
//!                         
//!                         Phase 1
//!                         Mode - Main
//!                         Encryption Algorithm - 3DES-CBC
//!                         Pseudo Random Function - HMAC-SHA1
//!                         Hash Algorithm - HMAC-SHA1
//!                         Authentication Method - (PSK) Pre-Shared Key
//!                         DH Group - 2
//!                         
//!                         Phase 2
//!                         Security Protocol - ESP
//!                         Encapsulation Mode - Tunnel
//!                         Encryption Algorithm - ENCR_NULL
//!                         Authentication Algorithm - AES-XCBC-MAC-96
//!                         
//!                         
//!                         
//!                         It shall be possible to turn off confidentiality protection in the tunnel. This means that the transform IDs for encryption ENCR_NULL shall be allowed to negotiate, as specified in reference [29]. Integrity protection shall always be used, i.e. the authentication algorithm in reference [30] shall not be NULL.
//! @SYMREQ                 REQ10662
	//copy linux_tunnel.pol file from data folder to private folder
	RUN_UTILS DeleteFile c:\private\101f7993\linux_tunnel.pol
	RUN_UTILS CopyFile z:\TestData\configs\linux_tunnel3.pol c:\private\101f7993\linux_tunnel.pol
	RUN_UTILS MakeReadWrite c:\private\101f7993\linux_tunnel.pol
	
	//run batch file to ping the linux machine. Pol file is change, so need ceding again.
	RUN_PROGRAM -1 ced c:\epoc2linux.xml
	
	START_TEST_BLOCK    100     t_ipsec     z:\testdata\scripts\ns-ipsec-ikev2test-ops.ini
	        CREATE_OBJECT   IPSecIKEv2TestWrapper    IKEv2TestWrapperSection
	        COMMAND     IKEv2TestWrapperSection  New
	        COMMAND     IKEv2TestWrapperSection  TestIKEv2 Value1ParamSection
	END_TEST_BLOCK
END_TESTCASE NET-IPSec-NewAlg_IKEV2_IPsec_SA-003

START_TESTCASE NET-IPSec-NewAlg_IKEV2_IPsec_SA-004
//! @SYMTestCaseID          NET-IPSec-NewAlg_IKEV2_IPsec_SA-004
//! @SYMCreationDate        15-09-2008
//! @SYMAuthor              divyadsouza
//! @SYMTestCaseDesc        IPSec ESP profiles/IKEv2 to support new crypto algorithms.
//!                         
//!                         This test is to check if the implementation adheres to the 3 GPP specification (3GPP TS 43.318)
//!                         
//!                         DUT should act as the Initiator for Phase 1.
//!                         
//!                         Phase 1
//!                         Mode - Main
//!                         Encryption Algorithm - AES with fixed key length in CBC mode. The key length is set to 128 bits
//!                         Pseudo Random Function - HMAC-SHA1
//!                         Hash Algorithm - HMAC-SHA1
//!                         Authentication Method - (PSK) Pre-Shared Key
//!                         DH Group - 2
//!                         
//!                         Phase 2
//!                         Security Protocol - ESP
//!                         Encapsulation Mode - Tunnel
//!                         Encryption Algorithm - AES with fixed key length in CBC mode. The key length is set to 128 bits
//!                         Authentication Algorithm - HMAC-SHA1
//! @SYMREQ                 REQ10662
	//copy linux_tunnel.pol file from data folder to private folder
	RUN_UTILS DeleteFile c:\private\101f7993\linux_tunnel.pol
	RUN_UTILS CopyFile z:\TestData\configs\linux_tunnel4.pol c:\private\101f7993\linux_tunnel.pol
	RUN_UTILS MakeReadWrite c:\private\101f7993\linux_tunnel.pol
	
	//run batch file to ping the linux machine. Pol file is change, so need ceding again.
	RUN_PROGRAM -1 ced c:\epoc2linux.xml
	
	START_TEST_BLOCK    100     t_ipsec     z:\testdata\scripts\ns-ipsec-ikev2test-ops.ini
	        CREATE_OBJECT   IPSecIKEv2TestWrapper    IKEv2TestWrapperSection
	        COMMAND     IKEv2TestWrapperSection  New
	        COMMAND   !Error=-5197  IKEv2TestWrapperSection  NegativeTestIKEv2 Value1ParamSection
	END_TEST_BLOCK
END_TESTCASE NET-IPSec-NewAlg_IKEV2_IPsec_SA-004

START_TESTCASE NET-IPSec-NewAlg_IKEV2_IPsec_SA-005
//! @SYMTestCaseID          NET-IPSec-NewAlg_IKEV2_IPsec_SA-005
//! @SYMCreationDate        15-09-2008
//! @SYMAuthor              divyadsouza
//! @SYMTestCaseDesc        IPSec ESP profiles/IKEv2 to support new crypto algorithms.
//!                         
//!                         This test is to check if the implementation adheres to the 3 GPP specification (3GPP TS 33.234)
//!                         
//!                         DUT should act as the Initiator for Phase 1.
//!                         
//!                         Phase 1
//!                         Mode - Main
//!                         Encryption Algorithm - 3DES-CBC
//!                         Pseudo Random Function - HMAC-SHA1
//!                         Hash Algorithm - HMAC-SHA1
//!                         Authentication Method - RSS Signature
//!                         DH Group - 2
//!                         
//!                         Phase 2
//!                         Security Protocol - ESP
//!                         Encapsulation Mode - Tunnel
//!                         Encryption Algorithm - 3DES-CBC
//!                         Authentication Algorithm - HMAC-SHA1
//! @SYMREQ                 REQ10662
	//copy linux_tunnel.pol file from data folder to private folder
	RUN_UTILS DeleteFile c:\private\101f7993\linux_tunnel.pol
	RUN_UTILS CopyFile z:\TestData\configs\linux_tunnel5.pol c:\private\101f7993\linux_tunnel.pol
	RUN_UTILS MakeReadWrite c:\private\101f7993\linux_tunnel.pol
	
	//run batch file to ping the linux machine. Pol file is change, so need ceding again.
	RUN_PROGRAM -1 ced c:\epoc2linux.xml
	
	START_TEST_BLOCK    100     t_ipsec     z:\testdata\scripts\ns-ipsec-ikev2test-ops.ini
	        CREATE_OBJECT   IPSecIKEv2TestWrapper    IKEv2TestWrapperSection
	        COMMAND     IKEv2TestWrapperSection  New
	        COMMAND  !Error=-5197   IKEv2TestWrapperSection  NegativeTestIKEv2 Value1ParamSection
	END_TEST_BLOCK
END_TESTCASE NET-IPSec-NewAlg_IKEV2_IPsec_SA-005

START_TESTCASE NET-IPSec-NewAlg_IKEV2_IPsec_SA-006
//! @SYMTestCaseID          NET-IPSec-NewAlg_IKEV2_IPsec_SA-006
//! @SYMCreationDate        15-09-2008
//! @SYMAuthor              divyadsouza
//! @SYMTestCaseDesc        IPSec ESP profiles/IKEv2 to support new crypto algorithms. TS 33.234
//!                         
//!                         DUT should act as the Initiator for Phase 1.
//!                         
//!                         Phase 1
//!                         Mode - Main
//!                         Encryption Algorithm - AES with 128-bit keys in CBC mode
//!                         Pseudo Random Function - AES-XCBC-PRF-128
//!                         Hash Algorithm - AES-XCBC-MAC-96
//!                         Authentication Method - RSS Signature
//!                         DH Group - 2
//!                         
//!                         Phase 2
//!                         Security Protocol - ESP
//!                         Encapsulation Mode - Tunnel
//!                         Encryption Algorithm - AES with 128-bit keys in CBC mode
//!                         Authentication Algorithm - AES-XCBC-MAC-96
//! @SYMREQ                 REQ10662
	//copy linux_tunnel.pol file from data folder to private folder
	RUN_UTILS DeleteFile c:\private\101f7993\linux_tunnel.pol
	RUN_UTILS CopyFile z:\TestData\configs\linux_tunnel6.pol c:\private\101f7993\linux_tunnel.pol
	RUN_UTILS MakeReadWrite c:\private\101f7993\linux_tunnel.pol
	
	//run batch file to ping the linux machine. Pol file is change, so need ceding again.
	RUN_PROGRAM -1 ced c:\epoc2linux.xml
	
	START_TEST_BLOCK    100     t_ipsec     z:\testdata\scripts\ns-ipsec-ikev2test-ops.ini
	        CREATE_OBJECT   IPSecIKEv2TestWrapper    IKEv2TestWrapperSection
	        COMMAND     IKEv2TestWrapperSection  New
	        COMMAND  !Error=-5197   IKEv2TestWrapperSection  NegativeTestIKEv2 Value1ParamSection
	END_TEST_BLOCK
END_TESTCASE NET-IPSec-NewAlg_IKEV2_IPsec_SA-006

START_TESTCASE NET-IPSec-NewAlg_IKEV2_IPsec_SA-007
//! @SYMTestCaseID          NET-IPSec-NewAlg_IKEV2_IPsec_SA-007
//! @SYMCreationDate        15-09-2008
//! @SYMAuthor              divyadsouza
//! @SYMTestCaseDesc        IPSec ESP profiles/IKEv2 to support new crypto algorithms. TS 33.234
//!                         
//!                         DUT should act as the Initiator for Phase 1.
//!                         
//!                         Phase 1
//!                         Mode - Main
//!                         Encryption Algorithm - 3DES-CBC
//!                         Pseudo Random Function - HMAC-SHA1
//!                         Hash Algorithm - HMAC-SHA1
//!                         Authentication Method - RSS Signature
//!                         DH Group - 2
//!                         
//!                         Phase 2
//!                         Security Protocol - ESP
//!                         Encapsulation Mode - Tunnel
//!                         Encryption Algorithm - ENCR_NULL
//!                         Authentication Algorithm - AES-XCBC-MAC-96
//!                         
//!                         
//!                         
//!                         It shall be possible to turn off confidentiality protection in the tunnel. This means that the transform IDs for encryption ENCR_NULL shall be allowed to negotiate, as specified in reference [29]. Integrity protection shall always be used, i.e. the authentication algorithm in reference [30] shall not be NULL.
//! @SYMREQ                 REQ10662
	//copy linux_tunnel.pol file from data folder to private folder
	RUN_UTILS DeleteFile c:\private\101f7993\linux_tunnel.pol
	RUN_UTILS CopyFile z:\TestData\configs\linux_tunnel7.pol c:\private\101f7993\linux_tunnel.pol
	RUN_UTILS MakeReadWrite c:\private\101f7993\linux_tunnel.pol
	
	//run batch file to ping the linux machine. Pol file is change, so need ceding again.
	RUN_PROGRAM -1 ced c:\epoc2linux.xml
	
	START_TEST_BLOCK    100     t_ipsec     z:\testdata\scripts\ns-ipsec-ikev2test-ops.ini
	        CREATE_OBJECT   IPSecIKEv2TestWrapper    IKEv2TestWrapperSection
	        COMMAND     IKEv2TestWrapperSection  New
	        COMMAND   !Error=-5197  IKEv2TestWrapperSection  NegativeTestIKEv2 Value1ParamSection
	END_TEST_BLOCK
END_TESTCASE NET-IPSec-NewAlg_IKEV2_IPsec_SA-007

START_TESTCASE NET-IPSec-NewAlg_IKEV2_IPsec_SA-008
//! @SYMTestCaseID          NET-IPSec-NewAlg_IKEV2_IPsec_SA-008
//! @SYMCreationDate        15-09-2008
//! @SYMAuthor              divyadsouza
//! @SYMTestCaseDesc        IPSec ESP profiles/IKEv2 to support new crypto algorithms.
//!                         
//!                         This test is to check if the implementation adheres to the 3 GPP specification (3GPP TS 43.318)
//!                         
//!                         DUT should act as the Initiator for Phase 1.
//!                         
//!                         Phase 1
//!                         Mode - Main
//!                         Encryption Algorithm - AES with fixed key length in CBC mode. The key length is set to 128 bits
//!                         Pseudo Random Function - HMAC-SHA1
//!                         Hash Algorithm - HMAC-SHA1
//!                         Authentication Method - RSS Signature
//!                         DH Group - 2
//!                         
//!                         Phase 2
//!                         Security Protocol - ESP
//!                         Encapsulation Mode - Tunnel
//!                         Encryption Algorithm - AES with fixed key length in CBC mode. The key length is set to 128 bits
//!                         Authentication Algorithm - HMAC-SHA1
//! @SYMREQ                 REQ10662
	//copy linux_tunnel.pol file from data folder to private folder
	RUN_UTILS DeleteFile c:\private\101f7993\linux_tunnel.pol
	RUN_UTILS CopyFile z:\TestData\configs\linux_tunnel8.pol c:\private\101f7993\linux_tunnel.pol
	RUN_UTILS MakeReadWrite c:\private\101f7993\linux_tunnel.pol
	
	//run batch file to ping the linux machine. Pol file is change, so need ceding again.
	RUN_PROGRAM -1 ced c:\epoc2linux.xml
	
	START_TEST_BLOCK    100     t_ipsec     z:\testdata\scripts\ns-ipsec-ikev2test-ops.ini
	        CREATE_OBJECT   IPSecIKEv2TestWrapper    IKEv2TestWrapperSection
	        COMMAND     IKEv2TestWrapperSection  New
	        COMMAND     IKEv2TestWrapperSection  TestIKEv2 Value1ParamSection
	END_TEST_BLOCK
END_TESTCASE NET-IPSec-NewAlg_IKEV2_IPsec_SA-008

START_TESTCASE NET-IPSec-NewAlg_IKEV2_IPsec_SA-009
//! @SYMTestCaseID          NET-IPSec-NewAlg_IKEV2_IPsec_SA-009
//! @SYMCreationDate        19-09-2008
//! @SYMAuthor              divyadsouza
//! @SYMTestCaseDesc        IPSec ESP profiles/IKEv2 to support new crypto algorithms.
//!                         
//!                         This test is to check if the implementation adheres to the 3 GPP specification (3GPP TS 33.234)
//!                         
//!                         DUT should act as the Initiator for Phase 1.
//!                         
//!                         Phase 1
//!                         Mode - Main
//!                         Encryption Algorithm - 3DES-CBC
//!                         Pseudo Random Function - HMAC-SHA1
//!                         Hash Algorithm - HMAC-SHA1
//!                         Authentication Method - RSA Encryption
//!                         DH Group - 2
//!                         
//!                         Phase 2
//!                         Security Protocol - ESP
//!                         Encapsulation Mode - Tunnel
//!                         Encryption Algorithm - 3DES-CBC
//!                         Authentication Algorithm - HMAC-SHA1
//! @SYMREQ                 REQ10662
	//copy linux_tunnel.pol file from data folder to private folder
	RUN_UTILS DeleteFile c:\private\101f7993\linux_tunnel.pol
	RUN_UTILS CopyFile z:\TestData\configs\linux_tunnel9.pol c:\private\101f7993\linux_tunnel.pol
	RUN_UTILS MakeReadWrite c:\private\101f7993\linux_tunnel.pol
	
	//run batch file to ping the linux machine. Pol file is change, so need ceding again.
	RUN_PROGRAM -1 ced c:\epoc2linux.xml
	
	START_TEST_BLOCK    100     t_ipsec     z:\testdata\scripts\ns-ipsec-ikev2test-ops.ini
	        CREATE_OBJECT   IPSecIKEv2TestWrapper    IKEv2TestWrapperSection
	        COMMAND     IKEv2TestWrapperSection  New
	        COMMAND     IKEv2TestWrapperSection  TestIKEv2 Value1ParamSection
	END_TEST_BLOCK
END_TESTCASE NET-IPSec-NewAlg_IKEV2_IPsec_SA-009

START_TESTCASE NET-IPSec-NewAlg_IKEV2_IPsec_SA-010
//! @SYMTestCaseID          NET-IPSec-NewAlg_IKEV2_IPsec_SA-010
//! @SYMCreationDate        19-09-2008
//! @SYMAuthor              divyadsouza
//! @SYMTestCaseDesc        IPSec ESP profiles/IKEv2 to support new crypto algorithms. TS 33.234
//!                         
//!                         DUT should act as the Initiator for Phase 1.
//!                         
//!                         Phase 1
//!                         Mode - Main
//!                         Encryption Algorithm - AES with 128-bit keys in CBC mode
//!                         Pseudo Random Function - AES-XCBC-PRF-128
//!                         Hash Algorithm - AES-XCBC-MAC-96
//!                         Authentication Method - RSA Encryption
//!                         DH Group - 2
//!                         
//!                         Phase 2
//!                         Security Protocol - ESP
//!                         Encapsulation Mode - Tunnel
//!                         Encryption Algorithm - AES with 128-bit keys in CBC mode
//!                         Authentication Algorithm - AES-XCBC-MAC-96
//! @SYMREQ                 REQ10662
	//copy linux_tunnel.pol file from data folder to private folder
	RUN_UTILS DeleteFile c:\private\101f7993\linux_tunnel.pol
	RUN_UTILS CopyFile z:\TestData\configs\linux_tunnel10.pol c:\private\101f7993\linux_tunnel.pol
	RUN_UTILS MakeReadWrite c:\private\101f7993\linux_tunnel.pol
	
	//run batch file to ping the linux machine. Pol file is change, so need ceding again.
	RUN_PROGRAM -1 ced c:\epoc2linux.xml
	
	START_TEST_BLOCK    100     t_ipsec     z:\testdata\scripts\ns-ipsec-ikev2test-ops.ini
	        CREATE_OBJECT   IPSecIKEv2TestWrapper    IKEv2TestWrapperSection
	        COMMAND     IKEv2TestWrapperSection  New
	        COMMAND  !Error=-5197   IKEv2TestWrapperSection  NegativeTestIKEv2 Value1ParamSection
	END_TEST_BLOCK
END_TESTCASE NET-IPSec-NewAlg_IKEV2_IPsec_SA-010

START_TESTCASE NET-IPSec-NewAlg_IKEV2_IPsec_SA-011
//! @SYMTestCaseID          NET-IPSec-NewAlg_IKEV2_IPsec_SA-011
//! @SYMCreationDate        19-09-2008
//! @SYMAuthor              divyadsouza
//! @SYMTestCaseDesc        IPSec ESP profiles/IKEv2 to support new crypto algorithms. TS 33.234
//!                         
//!                         DUT should act as the Initiator for Phase 1.
//!                         
//!                         Phase 1
//!                         Mode - Main
//!                         Encryption Algorithm - 3DES-CBC
//!                         Pseudo Random Function - HMAC-SHA1
//!                         Hash Algorithm - HMAC-SHA1
//!                         Authentication Method - RSA Encryption
//!                         DH Group - 2
//!                         
//!                         Phase 2
//!                         Security Protocol - ESP
//!                         Encapsulation Mode - Tunnel
//!                         Encryption Algorithm - ENCR_NULL
//!                         Authentication Algorithm - AES-XCBC-MAC-96
//!                         
//!                         
//!                         
//!                         It shall be possible to turn off confidentiality protection in the tunnel. This means that the transform IDs for encryption ENCR_NULL shall be allowed to negotiate, as specified in reference [29]. Integrity protection shall always be used, i.e. the authentication algorithm in reference [30] shall not be NULL.
//! @SYMREQ                 REQ10662
	//copy linux_tunnel.pol file from data folder to private folder
	RUN_UTILS DeleteFile c:\private\101f7993\linux_tunnel.pol
	RUN_UTILS CopyFile z:\TestData\configs\linux_tunnel11.pol c:\private\101f7993\linux_tunnel.pol
	RUN_UTILS MakeReadWrite c:\private\101f7993\linux_tunnel.pol
	
	//run batch file to ping the linux machine. Pol file is change, so need ceding again.
	RUN_PROGRAM -1 ced c:\epoc2linux.xml
	
	START_TEST_BLOCK    100     t_ipsec     z:\testdata\scripts\ns-ipsec-ikev2test-ops.ini
	        CREATE_OBJECT   IPSecIKEv2TestWrapper    IKEv2TestWrapperSection
	        COMMAND     IKEv2TestWrapperSection  New
	        COMMAND  !Error=-5197   IKEv2TestWrapperSection  NegativeTestIKEv2 Value1ParamSection
	END_TEST_BLOCK
END_TESTCASE NET-IPSec-NewAlg_IKEV2_IPsec_SA-011

START_TESTCASE NET-IPSec-NewAlg_IKEV2_IPsec_SA-012
//! @SYMTestCaseID          NET-IPSec-NewAlg_IKEV2_IPsec_SA-012
//! @SYMCreationDate        19-09-2008
//! @SYMAuthor              divyadsouza
//! @SYMTestCaseDesc        IPSec ESP profiles/IKEv2 to support new crypto algorithms.
//!                         
//!                         This test is to check if the implementation adheres to the 3 GPP specification (3GPP TS 43.318)
//!                         
//!                         DUT should act as the Initiator for Phase 1.
//!                         
//!                         Phase 1
//!                         Mode - Main
//!                         Encryption Algorithm - AES with fixed key length in CBC mode. The key length is set to 128 bits
//!                         Pseudo Random Function - HMAC-SHA1
//!                         Hash Algorithm - HMAC-SHA1
//!                         Authentication Method - RSA Encryption
//!                         DH Group - 2
//!                         
//!                         Phase 2
//!                         Security Protocol - ESP
//!                         Encapsulation Mode - Tunnel
//!                         Encryption Algorithm - AES with fixed key length in CBC mode. The key length is set to 128 bits
//!                         Authentication Algorithm - HMAC-SHA1
//! @SYMREQ                 REQ10662
	//copy linux_tunnel.pol file from data folder to private folder
	RUN_UTILS DeleteFile c:\private\101f7993\linux_tunnel.pol
	RUN_UTILS CopyFile z:\TestData\configs\linux_tunnel12.pol c:\private\101f7993\linux_tunnel.pol
	RUN_UTILS MakeReadWrite c:\private\101f7993\linux_tunnel.pol
	
	//run batch file to ping the linux machine. Pol file is change, so need ceding again.
	RUN_PROGRAM -1 ced c:\epoc2linux.xml
	
	START_TEST_BLOCK    100     t_ipsec     z:\testdata\scripts\ns-ipsec-ikev2test-ops.ini
	        CREATE_OBJECT   IPSecIKEv2TestWrapper    IKEv2TestWrapperSection
	        COMMAND     IKEv2TestWrapperSection  New
	        COMMAND !Error=-5197  IKEv2TestWrapperSection  NegativeTestIKEv2 Value1ParamSection
	END_TEST_BLOCK
END_TESTCASE NET-IPSec-NewAlg_IKEV2_IPsec_SA-012

RUN_UTILS DeleteFile c:\epoc2linux.xml
RUN_UTILS DeleteFile c:\ethernetced1853.xml