Revision: 201015 RCL_3
authorDremov Kirill (Nokia-D-MSW/Tampere) <kirill.dremov@nokia.com>
Wed, 14 Apr 2010 17:48:59 +0300
branchRCL_3
changeset 53 030c4fbc13d7
parent 50 d07aa956024a
child 57 e0a1505373c1
child 58 b54b58ee9d58
Revision: 201015 Kit: 201015
authenticationservices/authenticationserver/bwins/authclientU.DEF
authenticationservices/authenticationserver/bwins/authcommonU.def
authenticationservices/authenticationserver/eabi/authclientU.DEF
authenticationservices/authenticationserver/eabi/authcommonU.def
authenticationservices/authenticationserver/group/authclient.mmp
authenticationservices/authenticationserver/group/authcommon.mmp
authenticationservices/authenticationserver/group/authserver.mmp
authenticationservices/authenticationserver/group/bld.inf
authenticationservices/authenticationserver/group/security_authserver.history.xml
authenticationservices/authenticationserver/group/security_authserver.mrp
authenticationservices/authenticationserver/inc/authserver.iby
authenticationservices/authenticationserver/inc/authserver/aspubsubdefs.h
authenticationservices/authenticationserver/inc/authserver/auth_srv_errs.h
authenticationservices/authenticationserver/inc/authserver/authclient.h
authenticationservices/authenticationserver/inc/authserver/authexpression.h
authenticationservices/authenticationserver/inc/authserver/authexpression.inl
authenticationservices/authenticationserver/inc/authserver/authmgrclient.h
authenticationservices/authenticationserver/inc/authserver/authpatchdata.h
authenticationservices/authenticationserver/inc/authserver/authplugininterface.h
authenticationservices/authenticationserver/inc/authserver/authserver_client.h
authenticationservices/authenticationserver/inc/authserver/authtypes.h
authenticationservices/authenticationserver/inc/authserver/idandstring.h
authenticationservices/authenticationserver/inc/authserver/identity.h
authenticationservices/authenticationserver/inc/authserver/log.h
authenticationservices/authenticationserver/inc/authserver/plugindesc.h
authenticationservices/authenticationserver/inc/authserver/plugindesc.inl
authenticationservices/authenticationserver/inc/authserver/protectionkey.h
authenticationservices/authenticationserver/inc/tAuthSvr.iby
authenticationservices/authenticationserver/inc_private/authrepository.h
authenticationservices/authenticationserver/source/client/asyncresponsedecoder.cpp
authenticationservices/authenticationserver/source/client/asyncresponsedecoder.h
authenticationservices/authenticationserver/source/client/authclient.cpp
authenticationservices/authenticationserver/source/client/authclient_impl.h
authenticationservices/authenticationserver/source/client/authmgrclient.cpp
authenticationservices/authenticationserver/source/common/arrayutils.h
authenticationservices/authenticationserver/source/common/arrayutils.inl
authenticationservices/authenticationserver/source/common/authcommon_impl.h
authenticationservices/authenticationserver/source/common/authexpression.cpp
authenticationservices/authenticationserver/source/common/authexpression_impl.h
authenticationservices/authenticationserver/source/common/authexpression_impl.inl
authenticationservices/authenticationserver/source/common/authpatchdata.cpp
authenticationservices/authenticationserver/source/common/authserveripc.cpp
authenticationservices/authenticationserver/source/common/authserveripc.h
authenticationservices/authenticationserver/source/common/authserverutil.h
authenticationservices/authenticationserver/source/common/idandstring.cpp
authenticationservices/authenticationserver/source/common/identity.cpp
authenticationservices/authenticationserver/source/common/plugindesc.cpp
authenticationservices/authenticationserver/source/common/protectionkey.cpp
authenticationservices/authenticationserver/source/server/authdb.cpp
authenticationservices/authenticationserver/source/server/authdb.h
authenticationservices/authenticationserver/source/server/authmain.cpp
authenticationservices/authenticationserver/source/server/authrepository.cpp
authenticationservices/authenticationserver/source/server/authserver.cpp
authenticationservices/authenticationserver/source/server/authserver.h
authenticationservices/authenticationserver/source/server/authserver_impl.h
authenticationservices/authenticationserver/source/server/authserversession.cpp
authenticationservices/authenticationserver/source/server/authserversession.h
authenticationservices/authenticationserver/source/server/authtransaction.cpp
authenticationservices/authenticationserver/source/server/authtransaction.h
authenticationservices/authenticationserver/source/server/encryptedprotectionkey.cpp
authenticationservices/authenticationserver/source/server/encryptedprotectionkey.h
authenticationservices/authenticationserver/source/server/evaluator.cpp
authenticationservices/authenticationserver/source/server/evaluator.h
authenticationservices/authenticationserver/source/server/pluginmgr.cpp
authenticationservices/authenticationserver/source/server/pluginmgr.h
authenticationservices/authenticationserver/source/server/pluginobserver.cpp
authenticationservices/authenticationserver/source/server/pluginobserver.h
authenticationservices/authenticationserver/source/server/trainingmgr.cpp
authenticationservices/authenticationserver/source/server/trainingmgr.h
authenticationservices/authenticationserver/source/server/transientkey.cpp
authenticationservices/authenticationserver/source/server/transientkey.h
authenticationservices/authenticationserver/source/server/transientkeyinfo.cpp
authenticationservices/authenticationserver/source/server/transientkeyinfo.h
authenticationservices/authenticationserver/test/authtool/authtool.cpp
authenticationservices/authenticationserver/test/authtool/authtool.mmp
authenticationservices/authenticationserver/test/reftestplugin/group/200032E7.rss
authenticationservices/authenticationserver/test/reftestplugin/group/bld.inf
authenticationservices/authenticationserver/test/reftestplugin/group/pinplugin.mmp
authenticationservices/authenticationserver/test/reftestplugin/group/t_pinplugindlg.mmh
authenticationservices/authenticationserver/test/reftestplugin/group/t_pinplugindlg.mmp
authenticationservices/authenticationserver/test/reftestplugin/group/t_pinplugindlg_text.mmp
authenticationservices/authenticationserver/test/reftestplugin/group/tpinplugin.mmp
authenticationservices/authenticationserver/test/reftestplugin/inc/pinplugin.iby
authenticationservices/authenticationserver/test/reftestplugin/inc/pinplugindialogdefs.h
authenticationservices/authenticationserver/test/reftestplugin/inc/tpinplugin.iby
authenticationservices/authenticationserver/test/reftestplugin/pinplugin/200032E4.rss
authenticationservices/authenticationserver/test/reftestplugin/pinplugin/pinpanic.h
authenticationservices/authenticationserver/test/reftestplugin/pinplugin/pinplugin.cpp
authenticationservices/authenticationserver/test/reftestplugin/pinplugin/pinplugin.h
authenticationservices/authenticationserver/test/reftestplugin/pinplugin/pinplugin.rh
authenticationservices/authenticationserver/test/reftestplugin/pinplugin/pinpluginao.cpp
authenticationservices/authenticationserver/test/reftestplugin/pinplugin/pinpluginao.h
authenticationservices/authenticationserver/test/reftestplugin/pinplugin/pinpluginconfig.rss
authenticationservices/authenticationserver/test/reftestplugin/pinplugin/pinplugindb.cpp
authenticationservices/authenticationserver/test/reftestplugin/pinplugin/pinplugindb.h
authenticationservices/authenticationserver/test/reftestplugin/pinplugin/pinplugindialog.cpp
authenticationservices/authenticationserver/test/reftestplugin/pinplugin/pinplugindialog.h
authenticationservices/authenticationserver/test/reftestplugin/tpinplugin/scripts/tpinplugin.ini
authenticationservices/authenticationserver/test/reftestplugin/tpinplugin/scripts/tpinplugin.script
authenticationservices/authenticationserver/test/reftestplugin/tpinplugin/tpinplugin.cpp
authenticationservices/authenticationserver/test/reftestplugin/tpinplugin/tpinplugin.h
authenticationservices/authenticationserver/test/reftestplugin/tpinplugin/tpinplugintestactive.cpp
authenticationservices/authenticationserver/test/reftestplugin/tpinplugin/tpinpluginteststep.cpp
authenticationservices/authenticationserver/test/reftestplugin/tpinplugin/tpinpluginteststep.h
authenticationservices/authenticationserver/test/reftestplugin/tpinplugindlg/tpinplugindlg.cpp
authenticationservices/authenticationserver/test/reftestplugin/tpinplugindlg/tpinplugindlg.h
authenticationservices/authenticationserver/test/securitytests/bwins/authsecuritytestsU.def
authenticationservices/authenticationserver/test/securitytests/eabi/authsecuritytestsU.def
authenticationservices/authenticationserver/test/securitytests/group/authsecuritytests.mmp
authenticationservices/authenticationserver/test/securitytests/inc/authreaddevicedata.h
authenticationservices/authenticationserver/test/securitytests/inc/authreaduseranddevicedata.h
authenticationservices/authenticationserver/test/securitytests/inc/authreaduserdata.h
authenticationservices/authenticationserver/test/securitytests/inc/authtrustedui.h
authenticationservices/authenticationserver/test/securitytests/inc/authwritedevicedata.h
authenticationservices/authenticationserver/test/securitytests/inc/authwriteuserdata.h
authenticationservices/authenticationserver/test/securitytests/scripts/authsecuritytests.ini
authenticationservices/authenticationserver/test/securitytests/scripts/authsecuritytests.script
authenticationservices/authenticationserver/test/securitytests/source/authreaddevicedata.cpp
authenticationservices/authenticationserver/test/securitytests/source/authreaduseranddevicedata.cpp
authenticationservices/authenticationserver/test/securitytests/source/authreaduserdata.cpp
authenticationservices/authenticationserver/test/securitytests/source/authsecuritytests.cpp
authenticationservices/authenticationserver/test/securitytests/source/authtrustedui.cpp
authenticationservices/authenticationserver/test/securitytests/source/authwritedevicedata.cpp
authenticationservices/authenticationserver/test/securitytests/source/authwriteuserdata.cpp
authenticationservices/authenticationserver/test/tAuthSvr/bwins/tAuthSvrServerU.DEF
authenticationservices/authenticationserver/test/tAuthSvr/bwins/tMiscAuthPluginU.def
authenticationservices/authenticationserver/test/tAuthSvr/group/tAuthPlugin.mmp
authenticationservices/authenticationserver/test/tAuthSvr/group/tAuthSvr.mmp
authenticationservices/authenticationserver/test/tAuthSvr/group/tMiscAuthPlugin.mmp
authenticationservices/authenticationserver/test/tAuthSvr/group/tauthpluginupgrade.mmp
authenticationservices/authenticationserver/test/tAuthSvr/group/tauthsvrnc.mmp
authenticationservices/authenticationserver/test/tAuthSvr/group/tauthsvrwdd.mmp
authenticationservices/authenticationserver/test/tAuthSvr/group/tpostmarketramplugin.mmp
authenticationservices/authenticationserver/test/tAuthSvr/miscPlugins/10204F0F.rss
authenticationservices/authenticationserver/test/tAuthSvr/miscPlugins/authplugininterface.cpp
authenticationservices/authenticationserver/test/tAuthSvr/miscPlugins/main.cpp
authenticationservices/authenticationserver/test/tAuthSvr/miscPlugins/proxy.cpp
authenticationservices/authenticationserver/test/tAuthSvr/miscPlugins/tPluginBase.cpp
authenticationservices/authenticationserver/test/tAuthSvr/miscPlugins/tPluginBase.h
authenticationservices/authenticationserver/test/tAuthSvr/scripts/batchfiles/post_postmarketplugin.bat
authenticationservices/authenticationserver/test/tAuthSvr/scripts/batchfiles/post_tauthsvr.bat
authenticationservices/authenticationserver/test/tAuthSvr/scripts/batchfiles/post_tclientsidsupport.bat
authenticationservices/authenticationserver/test/tAuthSvr/scripts/batchfiles/posttauthsvroom.bat
authenticationservices/authenticationserver/test/tAuthSvr/scripts/batchfiles/pre_patchdata_negative.bat
authenticationservices/authenticationserver/test/tAuthSvr/scripts/batchfiles/pre_patchdata_positive.bat
authenticationservices/authenticationserver/test/tAuthSvr/scripts/batchfiles/pre_postmarketplugin.bat
authenticationservices/authenticationserver/test/tAuthSvr/scripts/batchfiles/pretauthsvroom.bat
authenticationservices/authenticationserver/test/tAuthSvr/scripts/batchfiles/te_tauthsvr4_post1.bat
authenticationservices/authenticationserver/test/tAuthSvr/scripts/batchfiles/te_tauthsvr4_pre1.bat
authenticationservices/authenticationserver/test/tAuthSvr/scripts/batchfiles/te_tauthsvr4_pre2.bat
authenticationservices/authenticationserver/test/tAuthSvr/scripts/batchfiles/te_tauthsvr4_pre3.bat
authenticationservices/authenticationserver/test/tAuthSvr/scripts/performance_log_parser.pl
authenticationservices/authenticationserver/test/tAuthSvr/scripts/tAuthSvr.ini
authenticationservices/authenticationserver/test/tAuthSvr/scripts/tAuthSvr.script
authenticationservices/authenticationserver/test/tAuthSvr/scripts/tAuthSvr2.ini
authenticationservices/authenticationserver/test/tAuthSvr/scripts/tAuthSvr2.script
authenticationservices/authenticationserver/test/tAuthSvr/scripts/tAuthSvr2_unicode.ini
authenticationservices/authenticationserver/test/tAuthSvr/scripts/tAuthSvr3.ini
authenticationservices/authenticationserver/test/tAuthSvr/scripts/tAuthSvr3.script
authenticationservices/authenticationserver/test/tAuthSvr/scripts/tAuthSvr4.script
authenticationservices/authenticationserver/test/tAuthSvr/scripts/tAuthSvr5.script
authenticationservices/authenticationserver/test/tAuthSvr/scripts/tAuthSvr6.script
authenticationservices/authenticationserver/test/tAuthSvr/scripts/tauthsvr_performance.ini
authenticationservices/authenticationserver/test/tAuthSvr/scripts/tauthsvr_performance.script
authenticationservices/authenticationserver/test/tAuthSvr/scripts/tauthsvrclock.script
authenticationservices/authenticationserver/test/tAuthSvr/scripts/tauthsvroom.ini
authenticationservices/authenticationserver/test/tAuthSvr/scripts/tauthsvroom.script
authenticationservices/authenticationserver/test/tAuthSvr/scripts/tclientsidsupport.ini
authenticationservices/authenticationserver/test/tAuthSvr/scripts/tclientsidsupport.script
authenticationservices/authenticationserver/test/tAuthSvr/scripts/tpostmarketplugin.ini
authenticationservices/authenticationserver/test/tAuthSvr/scripts/tpostmarketplugin.script
authenticationservices/authenticationserver/test/tAuthSvr/scripts/tpostmarketplugin_macroenabled.script
authenticationservices/authenticationserver/test/tAuthSvr/scripts/tpostmarketpluginenabled1_winscw.script
authenticationservices/authenticationserver/test/tAuthSvr/scripts/tpostmarketpluginenabled_winscw.script
authenticationservices/authenticationserver/test/tAuthSvr/src/10204F10.rss
authenticationservices/authenticationserver/test/tAuthSvr/src/10204F10_upgrade.rss
authenticationservices/authenticationserver/test/tAuthSvr/src/main.cpp
authenticationservices/authenticationserver/test/tAuthSvr/src/proxy.cpp
authenticationservices/authenticationserver/test/tAuthSvr/src/step_AuthSvrCheck.cpp
authenticationservices/authenticationserver/test/tAuthSvr/src/step_EnumIdenties.cpp
authenticationservices/authenticationserver/test/tAuthSvr/src/step_FirstStart.cpp
authenticationservices/authenticationserver/test/tAuthSvr/src/step_IdentifyMultiple.cpp
authenticationservices/authenticationserver/test/tAuthSvr/src/step_RegIdentity.cpp
authenticationservices/authenticationserver/test/tAuthSvr/src/step_authenticate.cpp
authenticationservices/authenticationserver/test/tAuthSvr/src/step_base.cpp
authenticationservices/authenticationserver/test/tAuthSvr/src/step_clientsidsupport.cpp
authenticationservices/authenticationserver/test/tAuthSvr/src/step_createdb.cpp
authenticationservices/authenticationserver/test/tAuthSvr/src/step_multithreaded.cpp
authenticationservices/authenticationserver/test/tAuthSvr/src/step_oom.cpp
authenticationservices/authenticationserver/test/tAuthSvr/src/step_postmarketplugin.cpp
authenticationservices/authenticationserver/test/tAuthSvr/src/step_removeauthmethod.cpp
authenticationservices/authenticationserver/test/tAuthSvr/src/step_removedbs.cpp
authenticationservices/authenticationserver/test/tAuthSvr/src/step_removeidentity.cpp
authenticationservices/authenticationserver/test/tAuthSvr/src/step_resetidentity.cpp
authenticationservices/authenticationserver/test/tAuthSvr/src/step_resultavailability.cpp
authenticationservices/authenticationserver/test/tAuthSvr/src/step_retrainplugin.cpp
authenticationservices/authenticationserver/test/tAuthSvr/src/step_setauthprefs.cpp
authenticationservices/authenticationserver/test/tAuthSvr/src/tAuthSvrServer.cpp
authenticationservices/authenticationserver/test/tAuthSvr/src/tAuthSvrServer.h
authenticationservices/authenticationserver/test/tAuthSvr/src/tAuthSvrStep.h
authenticationservices/authenticationserver/test/tAuthSvr/src/tPinAuthPlugin.cpp
authenticationservices/authenticationserver/test/tAuthSvr/src/tPinAuthPlugin.h
authenticationservices/authenticationserver/test/tAuthSvr/src/tauthsvrservernc.cpp
authenticationservices/authenticationserver/test/tAuthSvr/src/tauthsvrserverwdd.cpp
authenticationservices/authenticationserver/test/tAuthSvr/src/tpinauthpluginupgrade.cpp
authenticationservices/authenticationserver/test/tAuthSvr/testdata/AuthSvrPolicy.ini
authenticationservices/authenticationserver/test/tAuthSvr/testdata/Pin10234100Db.ini
authenticationservices/authenticationserver/test/tAuthSvr/testdata/Pin11113100Db.ini
authenticationservices/authenticationserver/test/tAuthSvr/testdata/Pin11113101Db.ini
authenticationservices/authenticationserver/test/tAuthSvr/testdata/Pin11113102Db.ini
authenticationservices/authenticationserver/test/tAuthSvr/testdata/Pin11113103Db.ini
authenticationservices/authenticationserver/test/tAuthSvr/testdata/Pin11113104Db.ini
authenticationservices/authenticationserver/test/tAuthSvr/testdata/cenrep1.txt
authenticationservices/authenticationserver/test/tAuthSvr/testdata/cenrep2.txt
authenticationservices/authenticationserver/test/tAuthSvr/testdata/cenrep3.txt
authenticationservices/authenticationserver/test/tAuthSvr/testdata/initialisation_Info.ini
authenticationservices/authenticationserver/test/tAuthSvr/testdata/pin_Contents.ini
authenticationservices/authenticationserver/test/tAuthSvr/testdata/pin_Input.ini
authenticationservices/authenticationserver/test/tAuthSvr/testdata/pinplugin_inactive.txt
authenticationservices/authenticationserver/test/tAuthSvr/testdata/unicode.txt
authenticationservices/authenticationserver/test/tAuthSvr/tpostmarketplugins/main.cpp
authenticationservices/authenticationserver/test/tAuthSvr/tpostmarketplugins/proxy.cpp
authenticationservices/authenticationserver/test/tAuthSvr/tpostmarketplugins/testdata/1023F3F4.rss
authenticationservices/authenticationserver/test/tAuthSvr/tpostmarketplugins/testdata/buildpostmarketplugintestdata.fil
authenticationservices/authenticationserver/test/tAuthSvr/tpostmarketplugins/testdata/epoc_enablepostmarketplugin.ini
authenticationservices/authenticationserver/test/tAuthSvr/tpostmarketplugins/testdata/epoc_patchdatanegative.ini
authenticationservices/authenticationserver/test/tAuthSvr/tpostmarketplugins/testdata/epoc_patchdatapositive.ini
authenticationservices/authenticationserver/test/tAuthSvr/tpostmarketplugins/tpostmarketramplugin.cpp
authenticationservices/authenticationserver/test/tAuthSvr/tpostmarketplugins/tpostmarketramplugin.h
authenticationservices/authenticationserver/test/tauthcliserv/scripts/tauthcliserv.script
authenticationservices/authenticationserver/test/tauthcliserv/scripts/tauthcliserv_debug.script
authenticationservices/authenticationserver/test/tauthcliserv/scripts/tauthexpr.script
authenticationservices/authenticationserver/test/tauthcliserv/step_authexpr_build.cpp
authenticationservices/authenticationserver/test/tauthcliserv/step_authexpr_eval.cpp
authenticationservices/authenticationserver/test/tauthcliserv/step_base.cpp
authenticationservices/authenticationserver/test/tauthcliserv/step_client.cpp
authenticationservices/authenticationserver/test/tauthcliserv/step_firststart.cpp
authenticationservices/authenticationserver/test/tauthcliserv/step_mgrclient.cpp
authenticationservices/authenticationserver/test/tauthcliserv/tauthcliserv.cpp
authenticationservices/authenticationserver/test/tauthcliserv/tauthcliserv.h
authenticationservices/authenticationserver/test/tauthcliserv/tauthcliserv.mmp
authenticationservices/authenticationserver/test/tauthcliserv/tauthcliservstep.h
authenticationservices/authenticationserver/test/tauthdb/scripts/tauthdb.script
authenticationservices/authenticationserver/test/tauthdb/step_createtestdb.cpp
authenticationservices/authenticationserver/test/tauthdb/step_persist2.cpp
authenticationservices/authenticationserver/test/tauthdb/tauthdb.mmp
authenticationservices/authenticationserver/test/tauthdb/tauthdbserver.cpp
authenticationservices/authenticationserver/test/tauthdb/tauthdbserver.h
authenticationservices/authenticationserver/test/tauthdb/tauthdbstep.h
authenticationservices/authenticationserver/test/tauthkeys/scripts/tauthkeys.script
authenticationservices/authenticationserver/test/tauthkeys/step_encryptkey.cpp
authenticationservices/authenticationserver/test/tauthkeys/step_persist.cpp
authenticationservices/authenticationserver/test/tauthkeys/tauthkeys.mmp
authenticationservices/authenticationserver/test/tauthkeys/tauthkeysserver.cpp
authenticationservices/authenticationserver/test/tauthkeys/tauthkeysserver.h
authenticationservices/authenticationserver/test/tauthkeys/tauthkeysstep.h
authenticationservices/authenticationserver/test/tauthplugins/10204f0e.rss
authenticationservices/authenticationserver/test/tauthplugins/10204f0e_upgrade.rss
authenticationservices/authenticationserver/test/tauthplugins/consts.h
authenticationservices/authenticationserver/test/tauthplugins/scripts/tauthplugins.script
authenticationservices/authenticationserver/test/tauthplugins/step_interface.cpp
authenticationservices/authenticationserver/test/tauthplugins/tauthplugins.mmp
authenticationservices/authenticationserver/test/tauthplugins/tauthpluginsserver.cpp
authenticationservices/authenticationserver/test/tauthplugins/tauthpluginsserver.h
authenticationservices/authenticationserver/test/tauthplugins/tauthpluginsstep.h
authenticationservices/authenticationserver/test/tauthplugins/testplugins.cpp
authenticationservices/authenticationserver/test/tauthplugins/testplugins.h
authenticationservices/authenticationserver/test/tauthplugins/testplugins.mmp
authenticationservices/authenticationserver/test/tauthplugins/testpluginsupgrade.cpp
authenticationservices/authenticationserver/test/tauthplugins/testpluginsupgrade.mmp
contentmgmt/contentaccessfwfordrm/BWINS/caf_v3u.def
contentmgmt/contentaccessfwfordrm/BWINS/cafutils_v2u.def
contentmgmt/contentaccessfwfordrm/EABI/caf_v3u.def
contentmgmt/contentaccessfwfordrm/EABI/cafutils_v2U.DEF
contentmgmt/contentaccessfwfordrm/group/CafUtils.mmp
contentmgmt/contentaccessfwfordrm/group/bld.inf
contentmgmt/contentaccessfwfordrm/group/caf.mmp
contentmgmt/contentaccessfwfordrm/inc/agentfactory.h
contentmgmt/contentaccessfwfordrm/inc/agentinterface.h
contentmgmt/contentaccessfwfordrm/inc/attribute.h
contentmgmt/contentaccessfwfordrm/inc/caferr.h
contentmgmt/contentaccessfwfordrm/inc/cafhelper.h
contentmgmt/contentaccessfwfordrm/inc/cafhelperinterface.h
contentmgmt/contentaccessfwfordrm/inc/caftest.iby
contentmgmt/contentaccessfwfordrm/inc/content.h
contentmgmt/contentaccessfwfordrm/inc/data.h
contentmgmt/contentaccessfwfordrm/inc/manager.h
contentmgmt/contentaccessfwfordrm/source/caf/Agentfactory.cpp
contentmgmt/contentaccessfwfordrm/source/caf/attribute.cpp
contentmgmt/contentaccessfwfordrm/source/caf/content.cpp
contentmgmt/contentaccessfwfordrm/source/caf/data.cpp
contentmgmt/contentaccessfwfordrm/source/caf/manager.cpp
contentmgmt/contentaccessfwfordrm/source/caf/resolver.cpp
contentmgmt/contentaccessfwfordrm/source/caf/resolver.h
contentmgmt/contentaccessfwfordrm/source/cafutils/cafhelper.cpp
contentmgmt/contentaccessfwfordrm/source/f32agent/f32agentcontent.cpp
contentmgmt/contentaccessfwfordrm/source/f32agent/f32agentcontent.h
contentmgmt/contentaccessfwfordrm/source/f32agent/f32agentdata.cpp
contentmgmt/contentaccessfwfordrm/source/f32agent/f32agentdata.h
contentmgmt/contentaccessfwfordrm/source/f32agent/f32agentfactory.cpp
contentmgmt/contentaccessfwfordrm/source/f32agent/f32agentfactory.h
contentmgmt/contentaccessfwfordrm/source/f32agent/f32agentmanager.cpp
contentmgmt/contentaccessfwfordrm/source/f32agent/f32agentmanager.h
contentmgmt/contentaccessfwfordrm/source/f32agent/f32defaultattributes.cpp
contentmgmt/contentaccessfwfordrm/source/f32agent/f32defaultattributes.h
contentmgmt/referencedrmagent/RefTestAgent/BWINS/rtaclient_v3u.def
contentmgmt/referencedrmagent/RefTestAgent/BWINS/rtaparser_v3u.def
contentmgmt/referencedrmagent/RefTestAgent/EABI/rtaParser_v3u.DEF
contentmgmt/referencedrmagent/RefTestAgent/EABI/rtaclient_v3u.DEF
contentmgmt/referencedrmagent/RefTestAgent/RTAParser/wmdrmcontentparser.cpp
contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Client/rtacontent.cpp
contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Client/rtadata.cpp
contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Client/rtamanager.cpp
contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Common/clientserver.h
contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Server/rtacontenthandler.cpp
contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Server/rtacontenthandler.h
contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Server/rtadatahandler.cpp
contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Server/rtadatahandler.h
contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Server/rtamanagerhandler.cpp
contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Server/rtamanagerhandler.h
contentmgmt/referencedrmagent/RefTestAgent/RefTestAgent/Reftestagentcontent.cpp
contentmgmt/referencedrmagent/RefTestAgent/RefTestAgent/Reftestagentcontent.h
contentmgmt/referencedrmagent/RefTestAgent/RefTestAgent/Reftestagentdata.cpp
contentmgmt/referencedrmagent/RefTestAgent/RefTestAgent/Reftestagentdata.h
contentmgmt/referencedrmagent/RefTestAgent/RefTestAgent/Reftestagentfactory.cpp
contentmgmt/referencedrmagent/RefTestAgent/RefTestAgent/Reftestagentfactory.h
contentmgmt/referencedrmagent/RefTestAgent/RefTestAgent/Reftestagentmanager.cpp
contentmgmt/referencedrmagent/RefTestAgent/RefTestAgent/Reftestagentmanager.h
contentmgmt/referencedrmagent/RefTestAgent/group/RTAclient.mmp
contentmgmt/referencedrmagent/RefTestAgent/group/RTAparser.mmp
contentmgmt/referencedrmagent/RefTestAgent/inc/reftestagentconstants.h
contentmgmt/referencedrmagent/RefTestAgent/inc/rtacontent.h
contentmgmt/referencedrmagent/RefTestAgent/inc/rtadata.h
contentmgmt/referencedrmagent/RefTestAgent/inc/rtamanager.h
contentmgmt/referencedrmagent/tcaf/scripts/tcafhelper.ini
contentmgmt/referencedrmagent/tcaf/scripts/tcafhelper.script
contentmgmt/referencedrmagent/tcaf/scripts/tcafwmdrmsupport.ini
contentmgmt/referencedrmagent/tcaf/scripts/tcafwmdrmsupport.script
contentmgmt/referencedrmagent/tcaf/source/CafUtilsStep.h
contentmgmt/referencedrmagent/tcaf/source/CafutilsStep.cpp
contentmgmt/referencedrmagent/tcaf/source/Consumerstep.cpp
contentmgmt/referencedrmagent/tcaf/source/Consumerstep.h
contentmgmt/referencedrmagent/tcaf/source/Contentstep.cpp
contentmgmt/referencedrmagent/tcaf/source/ManagerStep.cpp
contentmgmt/referencedrmagent/tcaf/source/ManagerStep.h
contentmgmt/referencedrmagent/tcaf/source/RecognizerStep.cpp
contentmgmt/referencedrmagent/tcaf/source/RecognizerStep.h
contentmgmt/referencedrmagent/tcaf/source/cafserver.cpp
contentmgmt/referencedrmagent/tcaf/source/cafstep.cpp
contentmgmt/referencedrmagent/tcaf/source/cafstep.h
contentmgmt/referencedrmagent/tcaf/source/contentstep.h
contentmgmt/referencedrmagent/tcaf/testdata/dummywm.asf
crypto/weakcryptospi/group/tcryptospi.mmp
crypto/weakcryptospi/inc/cryptotests.iby
crypto/weakcryptospi/inc/spi/cryptospidef.h
crypto/weakcryptospi/inc/tcryptospi.iby
crypto/weakcryptospi/source/random/random.cpp
crypto/weakcryptospi/test/tcryptospi/group/bld.inf
crypto/weakcryptospi/test/tcryptospi/group/tecchw-plug-ins.txt
crypto/weakcryptospi/test/tcryptospi/scripts/batchfiles/post_dummyeccplugin.bat
crypto/weakcryptospi/test/tcryptospi/scripts/batchfiles/pre_dummyeccplugin.bat
crypto/weakcryptospi/test/tcryptospi/scripts/te_dummyeccciphertestcases.script
crypto/weakcryptospi/test/tcryptospi/src/te_cryptospiconversion.cpp
crypto/weakcryptospi/test/tcryptospi/src/te_cryptospiserver.cpp
crypto/weakcryptospi/test/tcryptospi/testdata/dummyeccciphertestcases.ini
cryptomgmtlibs/cryptotokenfw/docsrc/Framework.dox
cryptomgmtlibs/cryptotokenfw/docsrc/sequence.bmp
cryptomgmtlibs/cryptotokenfw/docsrc/tsecdlg.dox
cryptomgmtlibs/cryptotokenfw/inc_interfaces/MCTKeyStoreManager_v2.h
cryptomgmtlibs/cryptotokenfw/inc_interfaces/MCTKeyStore_v2.h
cryptomgmtlibs/cryptotokenfw/inc_interfaces/doxygen_docs/Crypto_Interfaces_index.dox
cryptomgmtlibs/cryptotokenfw/inc_interfaces/mkeystore_v2.h
cryptomgmtlibs/cryptotokenfw/source/ctframework/doxygen_docs/Key_management_index.dox
cryptomgmtlibs/securitydocs/Security_Glossary.html
cryptomgmtlibs/securitydocs/building-certstore.txt
cryptomgmtlibs/securitydocs/building-swicertstore.txt
cryptomgmtlibs/securitydocs/doxygen_docs/Security_API_migration_guide.dox
cryptomgmtlibs/securitydocs/doxygen_docs/Security_MainPage_index.dox
cryptomgmtlibs/securitydocs/doxygen_docs/Security_architecture.dox
cryptomgmtlibs/securitydocs/doxygen_docs/Security_architecture.gif
cryptomgmtlibs/securitydocs/doxygen_docs/Security_architecture.vsd
cryptomgmtlibs/securitydocs/doxygen_docs/Security_architecture_diagram_pre-v8.0.dox
cryptomgmtlibs/securitydocs/doxygen_docs/Security_architecture_diagram_v8.0.dox
cryptomgmtlibs/securitydocs/doxygen_docs/Security_architecture_diagram_v8.0_dll.dox
cryptomgmtlibs/securitydocs/doxygen_docs/Security_architecture_v8.0.gif
cryptomgmtlibs/securitydocs/doxygen_docs/Security_architecture_v8.0_dep.gif
cryptomgmtlibs/securitydocs/doxygen_docs/Security_architecture_v8.0_dep.vsd
cryptomgmtlibs/securitydocs/doxygen_docs/Security_glossary.dox
cryptomgmtlibs/securitydocs/doxygen_docs/Security_intro.dox
cryptomgmtlibs/securitydocs/doxygen_docs/Security_intro_PKC.dox
cryptomgmtlibs/securitydocs/doxygen_docs/Security_intro_certificates.dox
cryptomgmtlibs/securitydocs/doxygen_docs/Security_intro_signatures.dox
cryptomgmtlibs/securitydocs/ocsp.txt
cryptomgmtlibs/securitydocs/security_documentation.history.xml
cryptomgmtlibs/securitydocs/security_documentation.mrp
cryptomgmtlibs/securitytestfw/group/bld.inf
cryptomgmtlibs/securitytestfw/group/t_testhandler2.mmp
cryptomgmtlibs/securitytestfw/inc/SecurityTests.iby
cryptomgmtlibs/securitytestfw/inc/SecurityTests_apr_9.5.iby
cryptomgmtlibs/securitytestfw/inc/SecurityTests_sdp_9.5.iby
cryptomgmtlibs/securitytestfw/test/autotesting/apr_bld.inf
cryptomgmtlibs/securitytestfw/test/autotesting/hosts
cryptomgmtlibs/securitytestfw/test/autotesting/runasnpkcs.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runasnpkcs_9.4.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runcaftests.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runcaftests_9.4.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runcaftests_9.5.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runcaftests_9.6.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runcaftests_wmdrm.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runcertman.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runcertman_9.4.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runcertman_9.5.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runcrypto.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runcrypto_9.4.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runcrypto_9.5.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runcryptotokens.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runcryptotokens_9.4.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runfiletokens.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runfiletokens_9.4.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runjavamidletinstaller_9.4.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runpkcs12tests.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runpkcs12tests_9.4.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runsisinstaller_9.4.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runswiromtests_9.4.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runswiromtests_9.4_mcs.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runswiromtests_9.5.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runswiromtests_9.6.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runupstests.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runupstests_9.4.bat
cryptomgmtlibs/securitytestfw/test/autotesting/runusiftests.bat
cryptomgmtlibs/securitytestfw/test/autotesting/sdp_bld.inf
cryptomgmtlibs/securitytestfw/test/autotesting/testMakesis.pl
cryptomgmtlibs/securitytestfw/test/autotesting/test_spec.txt
cryptomgmtlibs/securitytestfw/test/autotesting/test_spec_apr_9.5.txt
cryptomgmtlibs/securitytestfw/test/autotesting/test_spec_sdp_9.5.txt
cryptomgmtlibs/securitytestfw/test/autotesting/testsecurity_9.4_java.bat
cryptomgmtlibs/securitytestfw/test/autotesting/testsecurity_9.4_mcs.bat
cryptomgmtlibs/securitytestfw/test/autotesting/testsecurity_9.4_mcs_vfuture.bat
cryptomgmtlibs/securitytestfw/test/autotesting/testsecurity_9.4_nonmcs.bat
cryptomgmtlibs/securitytestfw/test/autotesting/testsecurity_9.5_mcs.bat
cryptomgmtlibs/securitytestfw/test/autotesting/testsecurity_9.5_nonmcs.bat
cryptomgmtlibs/securitytestfw/test/autotesting/testsecurity_9.6_crypto.bat
cryptomgmtlibs/securitytestfw/test/autotesting/testsecurity_9.6_mcs.bat
cryptomgmtlibs/securitytestfw/test/autotesting/testsecurity_9.6_nonmcs.bat
cryptomgmtlibs/securitytestfw/test/autotesting/testsecurityonlyjava.bat
cryptomgmtlibs/securitytestfw/test/testhandler2/t_tefinput.cpp
cryptoplugins/cryptospiplugins/group/bld.inf
cryptoplugins/cryptospiplugins/inc/cryptospi_testwmdrmplugins.iby
cryptoplugins/cryptospiplugins/test/dummyecchwplugin/bwins/cryptospihaiu.def
cryptoplugins/cryptospiplugins/test/dummyecchwplugin/bwins/dummyecchwpluginu.def
cryptoplugins/cryptospiplugins/test/dummyecchwplugin/eabi/cryptospihaiu.def
cryptoplugins/cryptospiplugins/test/dummyecchwplugin/eabi/dummyecchwpluginu.def
cryptoplugins/cryptospiplugins/test/dummyecchwplugin/group/bld.inf
cryptoplugins/cryptospiplugins/test/dummyecchwplugin/group/cryptospihai.mmp
cryptoplugins/cryptospiplugins/test/dummyecchwplugin/group/dummyecchwplugin.mmp
cryptoplugins/cryptospiplugins/test/dummyecchwplugin/src/cryptospihai.cpp
cryptoplugins/cryptospiplugins/test/dummyecchwplugin/src/cryptospihai.h
cryptoplugins/cryptospiplugins/test/dummyecchwplugin/src/dummyeccimpl.cpp
cryptoplugins/cryptospiplugins/test/dummyecchwplugin/src/dummyeccimpl.h
cryptoplugins/cryptospiplugins/test/dummyecchwplugin/src/dummyeccsignerimpl.cpp
cryptoplugins/cryptospiplugins/test/dummyecchwplugin/src/dummyeccsignerimpl.h
cryptoplugins/cryptospiplugins/test/dummyecchwplugin/src/pluginconfig.h
cryptoplugins/cryptospiplugins/test/dummyecchwplugin/src/pluginentry.cpp
cryptoplugins/cryptospiplugins/test/dummyecchwplugin/src/pluginentry.h
cryptoservices/certificateandkeymgmt/bwins/certstoreu.def
cryptoservices/certificateandkeymgmt/certstore/certstore.mmp
cryptoservices/certificateandkeymgmt/certstore/unifiedkeystore.cpp
cryptoservices/certificateandkeymgmt/documentation/Building a certificate store.rtf
cryptoservices/certificateandkeymgmt/documentation/building-certstore.txt
cryptoservices/certificateandkeymgmt/eabi/certstoreu.def
cryptoservices/certificateandkeymgmt/inc/pkcs10attr.h
cryptoservices/certificateandkeymgmt/inc/unifiedkeystore_v2.h
cryptoservices/certificateandkeymgmt/pkixCert/doxygen_docs/Certman_X509_Certificate_Validation_chain.png
cryptoservices/certificateandkeymgmt/pkixCert/doxygen_docs/Certman_X509_Certificate_Validation_overview.dox
cryptoservices/certificateandkeymgmt/pkixCert/doxygen_docs/Certman_X509_PKIXCert_overview.dox
cryptoservices/certificateandkeymgmt/wtlscert/doxygen_docs/Certman_WTLS_overview.dox
cryptoservices/certificateandkeymgmt/x500/doxygen_docs/Certman_X509_and_X500_overview.dox
cryptoservices/certificateandkeymgmt/x509/doxygen_docs/Certman_X509_index.dox
cryptoservices/certificateandkeymgmt/x509/doxygen_docs/Certman_X509_overview.dox
cryptoservices/filebasedcertificateandkeystores/Inc/filetokens.iby
cryptoservices/filebasedcertificateandkeystores/Inc/filetokenstests.iby
cryptoservices/filebasedcertificateandkeystores/Inc/fsdatatypes.h
cryptoservices/filebasedcertificateandkeystores/Inc/fsdatatypes.inl
cryptoservices/filebasedcertificateandkeystores/group/bld.inf
cryptoservices/filebasedcertificateandkeystores/group/fstokenserver_useauth.mmp
cryptoservices/filebasedcertificateandkeystores/source/generic/client/clientsession.cpp
cryptoservices/filebasedcertificateandkeystores/source/generic/common/fstokencliserv.h
cryptoservices/filebasedcertificateandkeystores/source/generic/common/fstokenservername.h
cryptoservices/filebasedcertificateandkeystores/source/generic/server/fsserver.cpp
cryptoservices/filebasedcertificateandkeystores/source/keystore/Client/cfskeystoreclient.cpp
cryptoservices/filebasedcertificateandkeystores/source/keystore/Client/cfskeystoreclient.h
cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/200218e6.txt
cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/CKeyDataManager.cpp
cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/CKeyDataManager.h
cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/CKeyStoreConduit.h
cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/Cfskeystoreserver.cpp
cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/Ckeystoreconduit.cpp
cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/OpenedKeys.cpp
cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/OpenedKeys.h
cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/cfskeystoreserver.h
cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/cfskeystoreserver.inl
cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/keystreamutils.cpp
cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/keystreamutils.h
cryptoservices/filebasedcertificateandkeystores/test/bwins/tcryptotokenhaiu.def
cryptoservices/filebasedcertificateandkeystores/test/eabi/tcryptotokenhaiu.def
cryptoservices/filebasedcertificateandkeystores/test/keytool/keytool.mmp
cryptoservices/filebasedcertificateandkeystores/test/keytool/keytool.rls
cryptoservices/filebasedcertificateandkeystores/test/keytool/keytool.rss
cryptoservices/filebasedcertificateandkeystores/test/keytool/keytool_usage.cpp
cryptoservices/filebasedcertificateandkeystores/test/tcryptotokenhai/tcryptotokenhai.cpp
cryptoservices/filebasedcertificateandkeystores/test/tcryptotokenhai/tcryptotokenhai.h
cryptoservices/filebasedcertificateandkeystores/test/tcryptotokenhai/tcryptotokenhai.mmp
cryptoservices/filebasedcertificateandkeystores/test/thwkeystore/client/101faaaa.rss
cryptoservices/filebasedcertificateandkeystores/test/thwkeystore/client/thwkeystore.cpp
cryptoservices/filebasedcertificateandkeystores/test/thwkeystore/client/thwkeystoreclient.cpp
cryptoservices/filebasedcertificateandkeystores/test/thwkeystore/client/thwkeystoreclient.h
cryptoservices/filebasedcertificateandkeystores/test/thwkeystore/client/thwkeystoreclient.mmp
cryptoservices/filebasedcertificateandkeystores/test/thwkeystore/client/thwtokenclient.cpp
cryptoservices/filebasedcertificateandkeystores/test/thwkeystore/client/thwtokenclient.h
cryptoservices/filebasedcertificateandkeystores/test/thwkeystore/client/thwtokentypeclient.cpp
cryptoservices/filebasedcertificateandkeystores/test/thwkeystore/client/thwtokentypeclient.h
cryptoservices/filebasedcertificateandkeystores/test/thwkeystore/common/thwkeystoredefs.h
cryptoservices/filebasedcertificateandkeystores/test/thwkeystore/common/tkeydetails.cpp
cryptoservices/filebasedcertificateandkeystores/test/thwkeystore/common/tkeydetails.h
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/data/hwkeys.dat
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/authenticate_useauth.ini
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/authenticate_useauth.script
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/authobjects_v2_useauth.ini
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/authobjects_v2_useauth.script
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/batchfiles/epoc_keystoreusesauthserver.ini
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/batchfiles/replace_epoc_ini.bat
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/batchfiles/restore_epoc_ini.bat
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/batchfiles/tkeystore_migrate_copykeys.bat
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/batchfiles/tkeystore_migrate_post.bat
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/batchfiles/tkeystore_migrate_pre.bat
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/batchfiles/tkeystore_useauthserver_post.bat
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/batchfiles/tkeystore_useauthserver_pre.bat
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/cancel_useauth.ini
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/cancel_useauth.script
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/capability_useauth.ini
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/capability_useauth.script
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/createoldkeystore.ini
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/createoldkeystore.script
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/exportscript_useauth.ini
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/exportscript_useauth.script
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/initialize.script
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/oldserver_newfeature.ini
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/oldserver_newfeature.script
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/oom_useauth.ini
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/oom_useauth.script
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/reg_first_identity.script
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/reg_second_identity.script
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/registration.ini
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/reload_useauth.ini
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/reload_useauth.script
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/servoom_useauth.ini
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/servoom_useauth.script
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/testnewkeystore.ini
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/testnewkeystore.script
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/thwkeystore.ini
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/thwkeystore.script
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/tkeystore_authentication1.ini
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/tkeystore_authentication1.script
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/tkeystore_authentication2.ini
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/tkeystore_authentication2.script
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/tkeystore_nouserregistered.ini
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/tkeystore_nouserregistered.script
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/tkeystore_useauth.ini
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/tkeystore_useauth.script
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/t_addkey.cpp
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/t_import.cpp
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/t_keystore.cpp
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/t_keystore_actions.cpp
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/t_keystore_actions.h
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/t_keystore_defs.h
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/t_open.cpp
cryptoservices/filebasedcertificateandkeystores/test/tkeystore/tkeystore.mmp
cryptoservices/filebasedcertificateandkeystores/test/ttesttools/data/key_migrate.txt
cryptoservices/filebasedcertificateandkeystores/test/ttesttools/data/key_migrate_default.txt
cryptoservices/filebasedcertificateandkeystores/test/ttesttools/data/key_migrated_help.txt
cryptoservices/filebasedcertificateandkeystores/test/ttesttools/data/key_migrated_param_missing1.txt
cryptoservices/filebasedcertificateandkeystores/test/ttesttools/data/key_migrated_param_missing2.txt
cryptoservices/filebasedcertificateandkeystores/test/ttesttools/scripts/keytool_migrate.ini
cryptoservices/filebasedcertificateandkeystores/test/ttesttools/scripts/keytool_migrate.script
package_definition.xml
securityanddataprivacytools/securityconfig/authserver/2001ea7f.txt
securityanddataprivacytools/securityconfig/conf/securityconfig.confml
securityanddataprivacytools/securityconfig/conf/securityconfig_2001ea7f.crml
securityanddataprivacytools/securityconfig/group/bld.inf
--- a/authenticationservices/authenticationserver/bwins/authclientU.DEF	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,30 +0,0 @@
-EXPORTS
-	??0RAuthClient@AuthServer@@QAE@XZ @ 1 NONAME ; AuthServer::RAuthClient::RAuthClient(void)
-	?ActivePluginsL@RAuthClient@AuthServer@@QAEXAAV?$RCPointerArray@$$CBVCPluginDesc@AuthServer@@@@@Z @ 2 NONAME ; void AuthServer::RAuthClient::ActivePluginsL(class RCPointerArray<class AuthServer::CPluginDesc const > &)
-	?AuthenticateL@RAuthClient@AuthServer@@QAEPAVCIdentity@2@ABVCAuthExpression@2@VTTimeIntervalSeconds@@HH@Z @ 3 NONAME ; class AuthServer::CIdentity * AuthServer::RAuthClient::AuthenticateL(class AuthServer::CAuthExpression const &, class TTimeIntervalSeconds, int, int)
-	?AuthenticateL@RAuthClient@AuthServer@@QAEXABVCAuthExpression@2@VTTimeIntervalSeconds@@HHAAPAVCIdentity@2@AAVTRequestStatus@@@Z @ 4 NONAME ; void AuthServer::RAuthClient::AuthenticateL(class AuthServer::CAuthExpression const &, class TTimeIntervalSeconds, int, int, class AuthServer::CIdentity * &, class TRequestStatus &)
-	?Cancel@RAuthClient@AuthServer@@QAEIXZ @ 5 NONAME ; unsigned int AuthServer::RAuthClient::Cancel(void)
-	?Close@RAuthClient@AuthServer@@QAEXXZ @ 6 NONAME ; void AuthServer::RAuthClient::Close(void)
-	?Connect@RAuthClient@AuthServer@@QAEHXZ @ 7 NONAME ; int AuthServer::RAuthClient::Connect(void)
-	?DeauthenticateL@RAuthClient@AuthServer@@QAEXXZ @ 8 NONAME ; void AuthServer::RAuthClient::DeauthenticateL(void)
-	?ForgetPluginL@RAuthMgrClient@AuthServer@@QAEXKK@Z @ 9 NONAME ; void AuthServer::RAuthMgrClient::ForgetPluginL(unsigned long, unsigned long)
-	?IdentitiesL@RAuthClient@AuthServer@@QAEXAAV?$RArray@K@@@Z @ 10 NONAME ; void AuthServer::RAuthClient::IdentitiesL(class RArray<unsigned long> &)
-	?IdentitiesWithStringL@RAuthClient@AuthServer@@QAEXAAV?$RCPointerArray@VCIdAndString@AuthServer@@@@@Z @ 11 NONAME ; void AuthServer::RAuthClient::IdentitiesWithStringL(class RCPointerArray<class AuthServer::CIdAndString> &)
-	?IdentityStringL@RAuthClient@AuthServer@@QAEPAVHBufC16@@K@Z @ 12 NONAME ; class HBufC16 * AuthServer::RAuthClient::IdentityStringL(unsigned long)
-	?PluginsL@RAuthClient@AuthServer@@QAEXAAV?$RCPointerArray@$$CBVCPluginDesc@AuthServer@@@@@Z @ 13 NONAME ; void AuthServer::RAuthClient::PluginsL(class RCPointerArray<class AuthServer::CPluginDesc const > &)
-	?PluginsOfTypeL@RAuthClient@AuthServer@@QAEXW4TAuthPluginType@2@AAV?$RCPointerArray@$$CBVCPluginDesc@AuthServer@@@@@Z @ 14 NONAME ; void AuthServer::RAuthClient::PluginsOfTypeL(enum AuthServer::TAuthPluginType, class RCPointerArray<class AuthServer::CPluginDesc const > &)
-	?PluginsWithTrainingStatusL@RAuthClient@AuthServer@@QAEXW4TAuthTrainingStatus@2@AAV?$RCPointerArray@$$CBVCPluginDesc@AuthServer@@@@@Z @ 15 NONAME ; void AuthServer::RAuthClient::PluginsWithTrainingStatusL(enum AuthServer::TAuthTrainingStatus, class RCPointerArray<class AuthServer::CPluginDesc const > &)
-	?PreferredTypePluginL@RAuthClient@AuthServer@@QAEKW4TAuthPluginType@2@@Z @ 16 NONAME ; unsigned long AuthServer::RAuthClient::PreferredTypePluginL(enum AuthServer::TAuthPluginType)
-	?RegisterIdentityL@RAuthMgrClient@AuthServer@@QAEXAAPAVCIdentity@2@ABVTDesC16@@AAVTRequestStatus@@@Z @ 17 NONAME ; void AuthServer::RAuthMgrClient::RegisterIdentityL(class AuthServer::CIdentity * &, class TDesC16 const &, class TRequestStatus &)
-	?RemoveIdentityL@RAuthMgrClient@AuthServer@@QAEXK@Z @ 18 NONAME ; void AuthServer::RAuthMgrClient::RemoveIdentityL(unsigned long)
-	?SetIdentityStringL@RAuthClient@AuthServer@@QAEXKABVTDesC16@@@Z @ 19 NONAME ; void AuthServer::RAuthClient::SetIdentityStringL(unsigned long, class TDesC16 const &)
-	?SetPreferredTypePluginL@RAuthMgrClient@AuthServer@@QAEXW4TAuthPluginType@2@K@Z @ 20 NONAME ; void AuthServer::RAuthMgrClient::SetPreferredTypePluginL(enum AuthServer::TAuthPluginType, unsigned long)
-	?TrainPlugin@RAuthMgrClient@AuthServer@@QAEXKKAAVTRequestStatus@@@Z @ 21 NONAME ; void AuthServer::RAuthMgrClient::TrainPlugin(unsigned long, unsigned long, class TRequestStatus &)
-	?AuthenticateL@RAuthClient@AuthServer@@QAEPAVCIdentity@2@ABVCAuthExpression@2@VTTimeIntervalSeconds@@HVTUid@@HABVTDesC16@@@Z @ 22 NONAME ; class AuthServer::CIdentity * AuthServer::RAuthClient::AuthenticateL(class AuthServer::CAuthExpression const &, class TTimeIntervalSeconds, int, class TUid, int, class TDesC16 const &)
-	?AuthenticateL@RAuthClient@AuthServer@@QAEXABVCAuthExpression@2@VTTimeIntervalSeconds@@HVTUid@@HABVTDesC16@@AAPAVCIdentity@2@AAVTRequestStatus@@@Z @ 23 NONAME ; void AuthServer::RAuthClient::AuthenticateL(class AuthServer::CAuthExpression const &, class TTimeIntervalSeconds, int, class TUid, int, class TDesC16 const &, class AuthServer::CIdentity * &, class TRequestStatus &)
-	?CreateAuthExpressionL@RAuthClient@AuthServer@@QBEPAVCAuthExpression@2@ABVTDesC16@@@Z @ 24 NONAME ; class AuthServer::CAuthExpression * AuthServer::RAuthClient::CreateAuthExpressionL(class TDesC16 const &) const
-	?ListAuthAliasesL@RAuthClient@AuthServer@@QAEXAAV?$RPointerArray@VHBufC16@@@@@Z @ 25 NONAME ; void AuthServer::RAuthClient::ListAuthAliasesL(class RPointerArray<class HBufC16> &)
-	?ResetIdentityL@RAuthMgrClient@AuthServer@@QAEXKAAV?$RArray@K@@AAV?$RPointerArray@$$CBVHBufC16@@@@@Z @ 26 NONAME ; void AuthServer::RAuthMgrClient::ResetIdentityL(unsigned long, class RArray<unsigned long> &, class RPointerArray<class HBufC16 const > &)
-	?ResetIdentityL@RAuthMgrClient@AuthServer@@QAEXKABVTDesC16@@@Z @ 27 NONAME ; void AuthServer::RAuthMgrClient::ResetIdentityL(unsigned long, class TDesC16 const &)
-	?ResetIdentityL@RAuthMgrClient@AuthServer@@QAEXKW4TAuthPluginType@2@ABVTDesC16@@@Z @ 28 NONAME ; void AuthServer::RAuthMgrClient::ResetIdentityL(unsigned long, enum AuthServer::TAuthPluginType, class TDesC16 const &)
-
--- a/authenticationservices/authenticationserver/bwins/authcommonU.def	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,49 +0,0 @@
-EXPORTS
-	??1CIdAndString@AuthServer@@UAE@XZ @ 1 NONAME ; AuthServer::CIdAndString::~CIdAndString(void)
-	?AuthAnd@AuthServer@@YA?AVTAuthExpressionWrapper@1@PAVCAuthExpression@1@0@Z @ 2 NONAME ; class AuthServer::TAuthExpressionWrapper AuthServer::AuthAnd(class AuthServer::CAuthExpression *, class AuthServer::CAuthExpression *)
-	?AuthExpr@AuthServer@@YA?AVTAuthExpressionWrapper@1@K@Z @ 3 NONAME ; class AuthServer::TAuthExpressionWrapper AuthServer::AuthExpr(unsigned long)
-	?AuthExpr@AuthServer@@YA?AVTAuthExpressionWrapper@1@W4TAuthPluginType@1@@Z @ 4 NONAME ; class AuthServer::TAuthExpressionWrapper AuthServer::AuthExpr(enum AuthServer::TAuthPluginType)
-	?AuthOr@AuthServer@@YA?AVTAuthExpressionWrapper@1@PAVCAuthExpression@1@0@Z @ 5 NONAME ; class AuthServer::TAuthExpressionWrapper AuthServer::AuthOr(class AuthServer::CAuthExpression *, class AuthServer::CAuthExpression *)
-	?ClientKeyL@CProtectionKey@AuthServer@@QBEPAV12@H@Z @ 6 NONAME ; class AuthServer::CProtectionKey * AuthServer::CProtectionKey::ClientKeyL(int) const
-	?ConstructL@CIdAndString@AuthServer@@QAEXKABVTDesC16@@@Z @ 7 NONAME ; void AuthServer::CIdAndString::ConstructL(unsigned long, class TDesC16 const &)
-	?DoWriteL@TSizeStream@AuthServer@@UAEXPBXH@Z @ 8 NONAME ; void AuthServer::TSizeStream::DoWriteL(void const *, int)
-	?ExternalizeL@CAuthExpressionImpl@AuthServer@@UBEXAAVRWriteStream@@@Z @ 9 NONAME ; void AuthServer::CAuthExpressionImpl::ExternalizeL(class RWriteStream &) const
-	?ExternalizeL@CIdAndString@AuthServer@@QBEXAAVRWriteStream@@@Z @ 10 NONAME ; void AuthServer::CIdAndString::ExternalizeL(class RWriteStream &) const
-	?ExternalizeL@CIdentity@AuthServer@@QBEXAAVRWriteStream@@@Z @ 11 NONAME ; void AuthServer::CIdentity::ExternalizeL(class RWriteStream &) const
-	?ExternalizeL@CPluginDesc@AuthServer@@QBEXAAVRWriteStream@@@Z @ 12 NONAME ; void AuthServer::CPluginDesc::ExternalizeL(class RWriteStream &) const
-	?FalseNegativeRate@CPluginDesc@AuthServer@@QBEKXZ @ 13 NONAME ; unsigned long AuthServer::CPluginDesc::FalseNegativeRate(void) const
-	?FalsePositiveRate@CPluginDesc@AuthServer@@QBEKXZ @ 14 NONAME ; unsigned long AuthServer::CPluginDesc::FalsePositiveRate(void) const
-	?Id@CIdAndString@AuthServer@@QBEKXZ @ 15 NONAME ; unsigned long AuthServer::CIdAndString::Id(void) const
-	?Id@CIdentity@AuthServer@@QBEKXZ @ 16 NONAME ; unsigned long AuthServer::CIdentity::Id(void) const
-	?Id@CPluginDesc@AuthServer@@QBEKXZ @ 17 NONAME ; unsigned long AuthServer::CPluginDesc::Id(void) const
-	?InternalizeL@CIdAndString@AuthServer@@QAEXAAVRReadStream@@@Z @ 18 NONAME ABSENT ; void AuthServer::CIdAndString::InternalizeL(class RReadStream &)
-	?InternalizeL@CIdentity@AuthServer@@SAPAV12@AAVRReadStream@@@Z @ 19 NONAME ; class AuthServer::CIdentity * AuthServer::CIdentity::InternalizeL(class RReadStream &)
-	?Invariant@CAuthExpressionImpl@AuthServer@@ABEHXZ @ 20 NONAME ; int AuthServer::CAuthExpressionImpl::Invariant(void) const
-	?Key@CIdentity@AuthServer@@QBEABVCProtectionKey@2@XZ @ 21 NONAME ; class AuthServer::CProtectionKey const & AuthServer::CIdentity::Key(void) const
-	?KeyData@CProtectionKey@AuthServer@@QBE?AVTPtrC8@@XZ @ 22 NONAME ; class TPtrC8 AuthServer::CProtectionKey::KeyData(void) const
-	?MinEntropy@CPluginDesc@AuthServer@@QBEKXZ @ 23 NONAME ; unsigned long AuthServer::CPluginDesc::MinEntropy(void) const
-	?Name@CPluginDesc@AuthServer@@QBEPBVTDesC16@@XZ @ 24 NONAME ; class TDesC16 const * AuthServer::CPluginDesc::Name(void) const
-	?NewL@CAuthExpressionImpl@AuthServer@@SAPAV12@AAVRReadStream@@@Z @ 25 NONAME ; class AuthServer::CAuthExpressionImpl * AuthServer::CAuthExpressionImpl::NewL(class RReadStream &)
-	?NewL@CIdentity@AuthServer@@SAPAV12@KPAVCProtectionKey@2@PAVHBufC16@@@Z @ 26 NONAME ; class AuthServer::CIdentity * AuthServer::CIdentity::NewL(unsigned long, class AuthServer::CProtectionKey *, class HBufC16 *)
-	?NewL@CPluginDesc@AuthServer@@SAPAV12@KABVTDesC16@@W4TAuthPluginType@2@W4TAuthTrainingStatus@2@KKK@Z @ 27 NONAME ; class AuthServer::CPluginDesc * AuthServer::CPluginDesc::NewL(unsigned long, class TDesC16 const &, enum AuthServer::TAuthPluginType, enum AuthServer::TAuthTrainingStatus, unsigned long, unsigned long, unsigned long)
-	?NewL@CProtectionKey@AuthServer@@SAPAV12@H@Z @ 28 NONAME ; class AuthServer::CProtectionKey * AuthServer::CProtectionKey::NewL(int)
-	?NewL@CProtectionKey@AuthServer@@SAPAV12@PAVHBufC8@@@Z @ 29 NONAME ; class AuthServer::CProtectionKey * AuthServer::CProtectionKey::NewL(class HBufC8 *)
-	?NewLC@CIdAndString@AuthServer@@SAPAV12@AAVRReadStream@@@Z @ 30 NONAME ; class AuthServer::CIdAndString * AuthServer::CIdAndString::NewLC(class RReadStream &)
-	?NewLC@CIdAndString@AuthServer@@SAPAV12@KABVTDesC16@@@Z @ 31 NONAME ; class AuthServer::CIdAndString * AuthServer::CIdAndString::NewLC(unsigned long, class TDesC16 const &)
-	?NewLC@CIdentity@AuthServer@@SAPAV12@KPAVCProtectionKey@2@PAVHBufC16@@@Z @ 32 NONAME ; class AuthServer::CIdentity * AuthServer::CIdentity::NewLC(unsigned long, class AuthServer::CProtectionKey *, class HBufC16 *)
-	?NewLC@CPluginDesc@AuthServer@@SAPAV12@AAVRReadStream@@@Z @ 33 NONAME ; class AuthServer::CPluginDesc * AuthServer::CPluginDesc::NewLC(class RReadStream &)
-	?NewLC@CProtectionKey@AuthServer@@SAPAV12@H@Z @ 34 NONAME ; class AuthServer::CProtectionKey * AuthServer::CProtectionKey::NewLC(int)
-	?NewLC@CProtectionKey@AuthServer@@SAPAV12@PAVHBufC8@@@Z @ 35 NONAME ; class AuthServer::CProtectionKey * AuthServer::CProtectionKey::NewLC(class HBufC8 *)
-	?Panic@CAuthExpressionImpl@AuthServer@@CAXW4TPanic@12@@Z @ 36 NONAME ; void AuthServer::CAuthExpressionImpl::Panic(enum AuthServer::CAuthExpressionImpl::TPanic)
-	?String@CIdAndString@AuthServer@@QBEPAVHBufC16@@XZ @ 37 NONAME ; class HBufC16 * AuthServer::CIdAndString::String(void) const
-	?String@CIdentity@AuthServer@@QBEAAVTDesC16@@XZ @ 38 NONAME ; class TDesC16 & AuthServer::CIdentity::String(void) const
-	?TrainingStatus@CPluginDesc@AuthServer@@QBE?AW4TAuthTrainingStatus@2@XZ @ 39 NONAME ; enum AuthServer::TAuthTrainingStatus AuthServer::CPluginDesc::TrainingStatus(void) const
-	?Type@CPluginDesc@AuthServer@@QBE?AW4TAuthPluginType@2@XZ @ 40 NONAME ; enum AuthServer::TAuthPluginType AuthServer::CPluginDesc::Type(void) const
-	?InsertSpaceBetweenOperatorsL@CAuthExpressionImpl@AuthServer@@SAXABVTDesC16@@AAVRBuf16@@@Z @ 41 NONAME ; void AuthServer::CAuthExpressionImpl::InsertSpaceBetweenOperatorsL(class TDesC16 const &, class RBuf16 &)
-	?KEnablePostMarketAuthenticationPlugins@@3EB @ 42 NONAME ; unsigned char const KEnablePostMarketAuthenticationPlugins
-	?CreateAuthExprObjectL@CAuthExpressionImpl@AuthServer@@SAPAVCAuthExpression@2@ABVTDesC16@@@Z @ 43 NONAME ; class AuthServer::CAuthExpression * AuthServer::CAuthExpressionImpl::CreateAuthExprObjectL(class TDesC16 const &)
-	?AuthExpr@AuthServer@@YA?AVTAuthExpressionWrapper@1@XZ @ 44 NONAME ; class AuthServer::TAuthExpressionWrapper AuthServer::AuthExpr(void)
-	?InternalizeL@CAuthParams@AuthServer@@QAEXAAVRReadStream@@@Z @ 45 NONAME ; void AuthServer::CAuthParams::InternalizeL(class RReadStream &)
-	?ExternalizeL@CAuthParams@AuthServer@@QBEXAAVRWriteStream@@@Z @ 46 NONAME ; void AuthServer::CAuthParams::ExternalizeL(class RWriteStream &) const
-	?NewL@CAuthParams@AuthServer@@SAPAV12@VTTimeIntervalSeconds@@HVTUid@@HABVTDesC16@@@Z @ 47 NONAME ; class AuthServer::CAuthParams * AuthServer::CAuthParams::NewL(class TTimeIntervalSeconds, int, class TUid, int, class TDesC16 const &)
-	
--- a/authenticationservices/authenticationserver/eabi/authclientU.DEF	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,33 +0,0 @@
-EXPORTS
-	_ZN10AuthServer11RAuthClient11IdentitiesLER6RArrayImE @ 1 NONAME
-	_ZN10AuthServer11RAuthClient13AuthenticateLERKNS_15CAuthExpressionE20TTimeIntervalSecondsii @ 2 NONAME
-	_ZN10AuthServer11RAuthClient13AuthenticateLERKNS_15CAuthExpressionE20TTimeIntervalSecondsiiRPNS_9CIdentityER14TRequestStatus @ 3 NONAME
-	_ZN10AuthServer11RAuthClient14ActivePluginsLER14RCPointerArrayIKNS_11CPluginDescEE @ 4 NONAME
-	_ZN10AuthServer11RAuthClient14PluginsOfTypeLENS_15TAuthPluginTypeER14RCPointerArrayIKNS_11CPluginDescEE @ 5 NONAME
-	_ZN10AuthServer11RAuthClient15DeauthenticateLEv @ 6 NONAME
-	_ZN10AuthServer11RAuthClient15IdentityStringLEm @ 7 NONAME
-	_ZN10AuthServer11RAuthClient18SetIdentityStringLEmRK7TDesC16 @ 8 NONAME
-	_ZN10AuthServer11RAuthClient20PreferredTypePluginLENS_15TAuthPluginTypeE @ 9 NONAME
-	_ZN10AuthServer11RAuthClient21IdentitiesWithStringLER14RCPointerArrayINS_12CIdAndStringEE @ 10 NONAME
-	_ZN10AuthServer11RAuthClient26PluginsWithTrainingStatusLENS_19TAuthTrainingStatusER14RCPointerArrayIKNS_11CPluginDescEE @ 11 NONAME
-	_ZN10AuthServer11RAuthClient5CloseEv @ 12 NONAME
-	_ZN10AuthServer11RAuthClient6CancelEv @ 13 NONAME
-	_ZN10AuthServer11RAuthClient7ConnectEv @ 14 NONAME
-	_ZN10AuthServer11RAuthClient8PluginsLER14RCPointerArrayIKNS_11CPluginDescEE @ 15 NONAME
-	_ZN10AuthServer11RAuthClientC1Ev @ 16 NONAME
-	_ZN10AuthServer11RAuthClientC2Ev @ 17 NONAME
-	_ZN10AuthServer14RAuthMgrClient11TrainPluginEmmR14TRequestStatus @ 18 NONAME
-	_ZN10AuthServer14RAuthMgrClient13ForgetPluginLEmm @ 19 NONAME
-	_ZN10AuthServer14RAuthMgrClient15RemoveIdentityLEm @ 20 NONAME
-	_ZN10AuthServer14RAuthMgrClient17RegisterIdentityLERPNS_9CIdentityERK7TDesC16R14TRequestStatus @ 21 NONAME
-	_ZN10AuthServer14RAuthMgrClient23SetPreferredTypePluginLENS_15TAuthPluginTypeEm @ 22 NONAME
-	_ZTIN10AuthServer21CAsyncResponseDecoderE @ 23 NONAME ; #<TI>#
-	_ZTVN10AuthServer21CAsyncResponseDecoderE @ 24 NONAME ; #<VT>#
-	_ZN10AuthServer11RAuthClient13AuthenticateLERKNS_15CAuthExpressionE20TTimeIntervalSecondsi4TUidiRK7TDesC16 @ 25 NONAME
-	_ZN10AuthServer11RAuthClient13AuthenticateLERKNS_15CAuthExpressionE20TTimeIntervalSecondsi4TUidiRK7TDesC16RPNS_9CIdentityER14TRequestStatus @ 26 NONAME
-	_ZN10AuthServer11RAuthClient16ListAuthAliasesLER13RPointerArrayI7HBufC16E @ 27 NONAME
-	_ZNK10AuthServer11RAuthClient21CreateAuthExpressionLERK7TDesC16 @ 28 NONAME
-	_ZN10AuthServer14RAuthMgrClient14ResetIdentityLEmNS_15TAuthPluginTypeERK7TDesC16 @ 29 NONAME
-	_ZN10AuthServer14RAuthMgrClient14ResetIdentityLEmR6RArrayImER13RPointerArrayIK7HBufC16E @ 30 NONAME
-	_ZN10AuthServer14RAuthMgrClient14ResetIdentityLEmRK7TDesC16 @ 31 NONAME
-
--- a/authenticationservices/authenticationserver/eabi/authcommonU.def	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,58 +0,0 @@
-EXPORTS
-	_ZN10AuthServer11CPluginDesc4NewLEmRK7TDesC16NS_15TAuthPluginTypeENS_19TAuthTrainingStatusEmmm @ 1 NONAME
-	_ZN10AuthServer11CPluginDesc5NewLCER11RReadStream @ 2 NONAME
-	_ZN10AuthServer11TSizeStream8DoWriteLEPKvi @ 3 NONAME
-	_ZN10AuthServer12CIdAndString10ConstructLEmRK7TDesC16 @ 4 NONAME
-	_ZN10AuthServer12CIdAndString5NewLCER11RReadStream @ 5 NONAME
-	_ZN10AuthServer12CIdAndString5NewLCEmRK7TDesC16 @ 6 NONAME
-	_ZN10AuthServer12CIdAndStringD0Ev @ 7 NONAME
-	_ZN10AuthServer12CIdAndStringD1Ev @ 8 NONAME
-	_ZN10AuthServer12CIdAndStringD2Ev @ 9 NONAME
-	_ZN10AuthServer14CProtectionKey4NewLEP6HBufC8 @ 10 NONAME
-	_ZN10AuthServer14CProtectionKey4NewLEi @ 11 NONAME
-	_ZN10AuthServer14CProtectionKey5NewLCEP6HBufC8 @ 12 NONAME
-	_ZN10AuthServer14CProtectionKey5NewLCEi @ 13 NONAME
-	_ZN10AuthServer19CAuthExpressionImpl4NewLER11RReadStream @ 14 NONAME
-	_ZN10AuthServer19CAuthExpressionImpl5PanicENS0_6TPanicE @ 15 NONAME
-	_ZN10AuthServer6AuthOrEPNS_15CAuthExpressionES1_ @ 16 NONAME
-	_ZN10AuthServer7AuthAndEPNS_15CAuthExpressionES1_ @ 17 NONAME
-	_ZN10AuthServer8AuthExprENS_15TAuthPluginTypeE @ 18 NONAME
-	_ZN10AuthServer8AuthExprEm @ 19 NONAME
-	_ZN10AuthServer9CIdentity12InternalizeLER11RReadStream @ 20 NONAME
-	_ZN10AuthServer9CIdentity4NewLEmPNS_14CProtectionKeyEP7HBufC16 @ 21 NONAME
-	_ZN10AuthServer9CIdentity5NewLCEmPNS_14CProtectionKeyEP7HBufC16 @ 22 NONAME
-	_ZNK10AuthServer11CPluginDesc10MinEntropyEv @ 23 NONAME
-	_ZNK10AuthServer11CPluginDesc12ExternalizeLER12RWriteStream @ 24 NONAME
-	_ZNK10AuthServer11CPluginDesc14TrainingStatusEv @ 25 NONAME
-	_ZNK10AuthServer11CPluginDesc17FalseNegativeRateEv @ 26 NONAME
-	_ZNK10AuthServer11CPluginDesc17FalsePositiveRateEv @ 27 NONAME
-	_ZNK10AuthServer11CPluginDesc2IdEv @ 28 NONAME
-	_ZNK10AuthServer11CPluginDesc4NameEv @ 29 NONAME
-	_ZNK10AuthServer11CPluginDesc4TypeEv @ 30 NONAME
-	_ZNK10AuthServer12CIdAndString12ExternalizeLER12RWriteStream @ 31 NONAME
-	_ZNK10AuthServer12CIdAndString2IdEv @ 32 NONAME
-	_ZNK10AuthServer12CIdAndString6StringEv @ 33 NONAME
-	_ZNK10AuthServer14CProtectionKey10ClientKeyLEi @ 34 NONAME
-	_ZNK10AuthServer14CProtectionKey7KeyDataEv @ 35 NONAME
-	_ZNK10AuthServer19CAuthExpressionImpl12ExternalizeLER12RWriteStream @ 36 NONAME
-	_ZNK10AuthServer19CAuthExpressionImpl9InvariantEv @ 37 NONAME
-	_ZNK10AuthServer9CIdentity12ExternalizeLER12RWriteStream @ 38 NONAME
-	_ZNK10AuthServer9CIdentity2IdEv @ 39 NONAME
-	_ZNK10AuthServer9CIdentity3KeyEv @ 40 NONAME
-	_ZNK10AuthServer9CIdentity6StringEv @ 41 NONAME
-	_ZTIN10AuthServer11TSizeStreamE @ 42 NONAME ; #<TI>#
-	_ZTIN10AuthServer19CAuthExpressionImplE @ 43 NONAME ; #<TI>#
-	_ZTIN10AuthServer9CIdentityE @ 44 NONAME ; #<TI>#
-	_ZTVN10AuthServer11TSizeStreamE @ 45 NONAME ; #<VT>#
-	_ZTVN10AuthServer19CAuthExpressionImplE @ 46 NONAME ; #<VT>#
-	_ZTVN10AuthServer9CIdentityE @ 47 NONAME ; #<VT>#
-	KEnablePostMarketAuthenticationPlugins @ 48 NONAME DATA 1
-	_ZN10AuthServer19CAuthExpressionImpl21CreateAuthExprObjectLERK7TDesC16 @ 49 NONAME
-	_ZN10AuthServer19CAuthExpressionImpl28InsertSpaceBetweenOperatorsLERK7TDesC16R6RBuf16 @ 50 NONAME
-	_ZN10AuthServer11CAuthParams12InternalizeLER11RReadStream @ 51 NONAME
-	_ZN10AuthServer11CAuthParams4NewLE20TTimeIntervalSecondsi4TUidiRK7TDesC16 @ 52 NONAME
-	_ZN10AuthServer8AuthExprEv @ 53 NONAME
-	_ZNK10AuthServer11CAuthParams12ExternalizeLER12RWriteStream @ 54 NONAME
-	_ZTIN10AuthServer11CAuthParamsE @ 55 NONAME
-	_ZTVN10AuthServer11CAuthParamsE @ 56 NONAME
-
--- a/authenticationservices/authenticationserver/group/authclient.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,51 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* authclient.exe Implementation of authentication client
-*
-*/
-
-
-/**
- @file
-*/
-
-CAPABILITY ALL -TCB
-
-target authclient.dll
-targettype dll
-
-// this is a static, as opposed to polymorphic DLL
-UID				0x1000008D 0x102740FD
-VENDORID		0x70000001
-
-OS_LAYER_SYSTEMINCLUDE_SYMBIAN
-
-USERINCLUDE		../source/common
-USERINCLUDE		../source/client
-USERINCLUDE		../inc_private
-USERINCLUDE             ../inc/authserver
-
-SOURCEPATH		../source/client
-SOURCE			authclient.cpp
-SOURCE			authmgrclient.cpp
-SOURCE 			asyncresponsedecoder.cpp
-
-LIBRARY			euser.lib 
-LIBRARY			estor.lib 
-LIBRARY			efsrv.lib
-LIBRARY			random.lib
-LIBRARY			cryptography.lib
-LIBRARY			authcommon.lib scsclient.lib 
-SMPSAFE
--- a/authenticationservices/authenticationserver/group/authcommon.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,46 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* This DLL contains code which is common to the authentication
-* server and the client interface.
-*
-*/
-
-
-CAPABILITY All -TCB
-
-target			authcommon.dll
-targettype		dll
-
-// this is a static interface, as opposed to polymorphic DLL.
-UID				0x1000008D 0x102740FB
-VENDORID		0x70000001
-
-OS_LAYER_SYSTEMINCLUDE_SYMBIAN
-
-USERINCLUDE		../source/client
-
-USERINCLUDE		../source/common
-SOURCEPATH		../source/common
-SOURCE			identity.cpp
-SOURCE			protectionkey.cpp
-SOURCE			authexpression.cpp
-SOURCE			plugindesc.cpp
-SOURCE			idandstring.cpp
-SOURCE			authpatchdata.cpp
-SOURCE			authserveripc.cpp
-
-LIBRARY			estor.lib efsrv.lib euser.lib
-LIBRARY			cryptography.lib random.lib hash.lib
-SMPSAFE
--- a/authenticationservices/authenticationserver/group/authserver.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,64 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* authserver.exe Implementation of authentication server
-*
-*/
-
-
-/**
- @file
-*/
-
-CAPABILITY TrustedUI ProtServ ReadDeviceData WriteDeviceData Location SurroundingsDD UserEnvironment ReadUserData WriteUserData
-
-target authserver.exe
-targettype exe
-
-// this is an EXE and therefore does not need to
-// explicitly specify any further UIDs.  Therefore
-// specify the reserved UID twice.
-UID				0x102740FC 0x102740FC
-VENDORID		0x70000001
-
-OS_LAYER_SYSTEMINCLUDE_SYMBIAN
-USERINCLUDE		../source/server 
-USERINCLUDE		../source/common
-USERINCLUDE		../source/client
-USERINCLUDE		../inc/authserver
-USERINCLUDE		../inc_private
-
-SOURCEPATH		../source/server
-SOURCE			authserver.cpp
-SOURCE			authserversession.cpp
-SOURCE			authmain.cpp
-SOURCE			authdb.cpp
-SOURCE			transientkeyinfo.cpp
-SOURCE			encryptedprotectionkey.cpp
-SOURCE			transientkey.cpp
-
-SOURCE			evaluator.cpp
-SOURCE			pluginmgr.cpp
-SOURCE			pluginobserver.cpp
-SOURCE			trainingmgr.cpp
-SOURCE			authtransaction.cpp
-SOURCE			authrepository.cpp
-
-LIBRARY			ecom.lib edbms.lib estor.lib pbe.lib efsrv.lib euser.lib
-LIBRARY			cryptography.lib random.lib
-LIBRARY			authcommon.lib scsserver.lib
-LIBRARY			sectcbutil.lib
-LIBRARY			centralrepository.lib
-SMPSAFE
-
--- a/authenticationservices/authenticationserver/group/bld.inf	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,155 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Authentication Server implementation 
-*
-*/
-
-
-/**
- @file
-*/
-
-#include "../test/reftestplugin/group/bld.inf"
-
-PRJ_PLATFORMS
-DEFAULT GCCE
-
-PRJ_EXPORTS
-
-#ifdef SYMBIAN_OLD_EXPORT_LOCATION
-../inc/authserver/authserver_client.h		/epoc32/include/authserver/authserver_client.h
-#endif
-../inc/authserver/authclient.h				SYMBIAN_OS_LAYER_PUBLIC_EXPORT_PATH(authserver/authclient.h)
-../inc/authserver/authexpression.h			SYMBIAN_OS_LAYER_PUBLIC_EXPORT_PATH(authserver/authexpression.h)
-../inc/authserver/authexpression.inl		SYMBIAN_OS_LAYER_PUBLIC_EXPORT_PATH(authserver/authexpression.inl)
-../inc/authserver/auth_srv_errs.h			SYMBIAN_OS_LAYER_PUBLIC_EXPORT_PATH(authserver/auth_srv_errs.h)
-../inc/authserver/authmgrclient.h			SYMBIAN_OS_LAYER_PUBLIC_EXPORT_PATH(authserver/authmgrclient.h)
-../inc/authserver/authplugininterface.h		SYMBIAN_OS_LAYER_PUBLIC_EXPORT_PATH(authserver/authplugininterface.h)
-../inc/authserver/authtypes.h				SYMBIAN_OS_LAYER_PUBLIC_EXPORT_PATH(authserver/authtypes.h)
-../inc/authserver/identity.h				SYMBIAN_OS_LAYER_PUBLIC_EXPORT_PATH(authserver/identity.h)
-../inc/authserver/plugindesc.h				SYMBIAN_OS_LAYER_PUBLIC_EXPORT_PATH(authserver/plugindesc.h)
-../inc/authserver/plugindesc.inl			SYMBIAN_OS_LAYER_PUBLIC_EXPORT_PATH(authserver/plugindesc.inl)
-../inc/authserver/protectionkey.h			SYMBIAN_OS_LAYER_PUBLIC_EXPORT_PATH(authserver/protectionkey.h)
-../inc/authserver/aspubsubdefs.h			SYMBIAN_OS_LAYER_PUBLIC_EXPORT_PATH(authserver/aspubsubdefs.h)
-../inc/authserver/idandstring.h				SYMBIAN_OS_LAYER_PUBLIC_EXPORT_PATH(authserver/idandstring.h)
-#ifdef SYMBIAN_OLD_EXPORT_LOCATION
-../inc/authserver/log.h						/epoc32/include/authserver/log.h
-#endif
-../inc/authserver/authpatchdata.h				SYMBIAN_OS_LAYER_PLATFORM_EXPORT_PATH(authserver/authpatchdata.h)
-
-
-// ROMKIT includes
-../inc/authserver.iby /epoc32/rom/include/authserver.iby
-
-
-#ifndef TOOLS
-#ifndef TOOLS2
-
-PRJ_MMPFILES
-
-authcommon.mmp
-authclient.mmp
-authserver.mmp
-
-
-PRJ_TESTMMPFILES
-../test/authtool/authtool.mmp
-../test/tauthkeys/tauthkeys.mmp
-../test/tauthdb/tauthdb.mmp
-../test/tauthcliserv/tauthcliserv.mmp
-../test/tauthplugins/testplugins.mmp
-../test/tauthplugins/tauthplugins.mmp
-../test/tAuthSvr/group/tAuthSvr.mmp
-../test/tAuthSvr/group/tAuthPlugin.mmp
-//Versions of tAuthSvr.mmp with different capabilities. wdd=WriteDeviceData, nc=NoCapabilities
-../test/tAuthSvr/group/tauthsvrwdd.mmp
-../test/tAuthSvr/group/tauthsvrnc.mmp
-../test/tAuthSvr/group/tauthpluginupgrade.mmp
-../test/tAuthSvr/group/tpostmarketramplugin.mmp
-../test/tauthplugins/testpluginsupgrade.mmp
-// Security Test.
-../test/securitytests/group/authsecuritytests.mmp
-
-makefile ../test/tAuthSvr/tpostmarketplugins/testdata/buildpostmarketplugintestdata.fil
-
-#endif // TOOLS2
-#endif // TOOLS
-
-PRJ_TESTEXPORTS
-../test/tauthkeys/scripts/tauthkeys.script /epoc32/winscw/c/tauth/tauthkeys/scripts/tauthkeys.script
-../test/tauthdb/scripts/tauthdb.script /epoc32/winscw/c/tauth/tauthdb/scripts/tauthdb.script
-../test/tauthcliserv/scripts/tauthcliserv.script /epoc32/winscw/c/tauth/tauthcliserv/scripts/tauthcliserv.script
-../test/tauthcliserv/scripts/tauthexpr.script /epoc32/winscw/c/tauth/tauthexpr/scripts/tauthexpr.script
-../test/tauthcliserv/scripts/tauthcliserv_debug.script /epoc32/winscw/c/tauth/tauthcliserv/scripts/tauthcliserv_debug.script
-../test/tauthplugins/scripts/tauthplugins.script /epoc32/winscw/c/tauth/tauthplugins/scripts/tauthplugins.script
-../test/tAuthSvr/scripts/tAuthSvr2.script   	/epoc32/winscw/c/tauth/tauthsvr/scripts/tauthsvr2.script
-../test/tAuthSvr/scripts/tAuthSvr4.script   	/epoc32/winscw/c/tauth/tauthsvr/scripts/tauthsvr4.script
-../test/tAuthSvr/scripts/tAuthSvr5.script   	/epoc32/winscw/c/tauth/tauthsvr/scripts/tauthsvr5.script
-../test/tAuthSvr/scripts/tAuthSvr6.script   	/epoc32/winscw/c/tauth/tauthsvr/scripts/tauthsvr6.script
-../test/tAuthSvr/scripts/tauthsvroom.script   	/epoc32/winscw/c/tauth/tauthsvr/scripts/tauthsvroom.script
-../test/tAuthSvr/scripts/tauthsvrclock.script  	/epoc32/winscw/c/tauth/tauthsvr/scripts/tauthsvrclock.script
-../test/tAuthSvr/scripts/tauthsvroom.ini   	/epoc32/winscw/c/tauth/tauthsvr/scripts/tauthsvroom.ini
-../test/tAuthSvr/scripts/tAuthSvr2.ini   	/epoc32/winscw/c/tauth/tauthsvr/scripts/tauthsvr2.ini
-../test/tAuthSvr/scripts/tAuthSvr2_unicode.ini	/epoc32/winscw/c/tauth/tauthsvr/scripts/tauthsvr2_unicode.ini
-../test/tAuthSvr/testdata/AuthSvrPolicy.ini			/epoc32/winscw/c/tauth/tauthsvr/testdata/authsvrpolicy.ini
-../test/tAuthSvr/testdata/initialisation_Info.ini	/epoc32/winscw/c/tauth/tauthsvr/testdata/initialisation_info.ini
-../test/tAuthSvr/testdata/Pin11113100Db.ini		/epoc32/winscw/c/tauth/tauthsvr/testdata/pin11113100db.ini
-../test/tAuthSvr/testdata/Pin11113101Db.ini		/epoc32/winscw/c/tauth/tauthsvr/testdata/pin11113101db.ini
-../test/tAuthSvr/testdata/Pin11113102Db.ini		/epoc32/winscw/c/tauth/tauthsvr/testdata/pin11113102db.ini
-../test/tAuthSvr/testdata/Pin11113103Db.ini		/epoc32/winscw/c/tauth/tauthsvr/testdata/pin11113103db.ini
-../test/tAuthSvr/testdata/Pin11113104Db.ini		/epoc32/winscw/c/tauth/tauthsvr/testdata/pin11113104db.ini
-../test/tAuthSvr/testdata/cenrep1.txt			/epoc32/winscw/c/tauth/tauthsvr/testdata/cenrep1.txt
-../test/tAuthSvr/testdata/cenrep2.txt			/epoc32/winscw/c/tauth/tauthsvr/testdata/cenrep2.txt
-../test/tAuthSvr/testdata/cenrep3.txt			/epoc32/winscw/c/tauth/tauthsvr/testdata/cenrep3.txt
-../test/tAuthSvr/scripts/batchfiles/te_tauthsvr4_pre1.bat /epoc32/winscw/c/tauth/tauthsvr/scripts/batchfiles/te_tauthsvr4_pre1.bat
-../test/tAuthSvr/scripts/batchfiles/pretauthsvroom.bat	 /epoc32/winscw/c/tauth/tauthsvr/scripts/batchfiles/pretauthsvroom.bat
-../test/tAuthSvr/scripts/batchfiles/posttauthsvroom.bat	 /epoc32/winscw/c/tauth/tauthsvr/scripts/batchfiles/posttauthsvroom.bat
-../test/tAuthSvr/scripts/batchfiles/te_tauthsvr4_pre2.bat /epoc32/winscw/c/tauth/tauthsvr/scripts/batchfiles/te_tauthsvr4_pre2.bat
-../test/tAuthSvr/scripts/batchfiles/te_tauthsvr4_pre3.bat /epoc32/winscw/c/tauth/tauthsvr/scripts/batchfiles/te_tauthsvr4_pre3.bat
-../test/tAuthSvr/scripts/batchfiles/te_tauthsvr4_post1.bat /epoc32/winscw/c/tauth/tauthsvr/scripts/batchfiles/te_tauthsvr4_post1.bat
-../test/tAuthSvr/testdata/pinplugin_inactive.txt	/epoc32/winscw/c/tauth/tauthsvr/testdata/pinplugin_inactive.txt
-../inc/tAuthSvr.iby /epoc32/rom/include/tauthsvr.iby
-../test/tAuthSvr/scripts/batchfiles/post_tauthsvr.bat		/epoc32/winscw/c/tauth/tauthsvr/scripts/batchfiles/post_tauthsvr.bat
-
-
-
-// Files for PostMarketPlugin Support tests.
-../test/tAuthSvr/scripts/tpostmarketplugin.script   	/epoc32/winscw/c/tauth/tauthsvr/scripts/tpostmarketplugin.script
-../test/tAuthSvr/scripts/tpostmarketpluginenabled_winscw.script   	/epoc32/winscw/c/tauth/tauthsvr/scripts/tpostmarketpluginenabled_winscw.script
-../test/tAuthSvr/scripts/tpostmarketpluginenabled1_winscw.script   	/epoc32/winscw/c/tauth/tauthsvr/scripts/tpostmarketpluginenabled1_winscw.script
-../test/tAuthSvr/scripts/tpostmarketplugin_macroenabled.script	/epoc32/winscw/c/tauth/tauthsvr/scripts/tpostmarketplugin_macroenabled.script
-../test/tAuthSvr/scripts/tpostmarketplugin.ini   	/epoc32/winscw/c/tauth/tauthsvr/scripts/tpostmarketplugin.ini
-../test/tAuthSvr/tpostmarketplugins/testdata/epoc_enablepostmarketplugin.ini	/epoc32/data/epoc_enablepostmarketplugin.ini
-../test/tAuthSvr/tpostmarketplugins/testdata/epoc_patchdatapositive.ini	/epoc32/data/epoc_patchdatapositive.ini
-../test/tAuthSvr/tpostmarketplugins/testdata/epoc_patchdatanegative.ini	/epoc32/data/epoc_patchdatanegative.ini
-../test/tAuthSvr/scripts/batchfiles/pre_postmarketplugin.bat	/epoc32/winscw/c/tauth/tauthsvr/scripts/batchfiles/pre_postmarketplugin.bat
-../test/tAuthSvr/scripts/batchfiles/post_postmarketplugin.bat	/epoc32/winscw/c/tauth/tauthsvr/scripts/batchfiles/post_postmarketplugin.bat
-../test/tAuthSvr/scripts/batchfiles/pre_patchdata_negative.bat	/epoc32/winscw/c/tauth/tauthsvr/scripts/batchfiles/pre_patchdata_negative.bat
-../test/tAuthSvr/scripts/batchfiles/pre_patchdata_positive.bat	/epoc32/winscw/c/tauth/tauthsvr/scripts/batchfiles/pre_patchdata_positive.bat
-../test/tAuthSvr/testdata/Pin10234100Db.ini		/epoc32/winscw/c/tauth/tauthsvr/testdata/pin10234100db.ini
-
-// Files for ClientSid Support tests.
-../test/tAuthSvr/scripts/tclientsidsupport.script   	/epoc32/winscw/c/tauth/tauthsvr/scripts/tclientsidsupport.script
-../test/tAuthSvr/scripts/tclientsidsupport.ini   	/epoc32/winscw/c/tauth/tauthsvr/scripts/tclientsidsupport.ini
-../test/tAuthSvr/scripts/batchfiles/post_tclientsidsupport.bat		/epoc32/winscw/c/tauth/tauthsvr/scripts/batchfiles/post_tclientsidsupport.bat
-
-//Files for Auth Security Tests.
-../test/securitytests/scripts/authsecuritytests.script	/epoc32/winscw/c/tauth/securitytests/scripts/authsecuritytests.script
-../test/securitytests/scripts/authsecuritytests.ini	/epoc32/winscw/c/tauth/securitytests/scripts/authsecuritytests.ini
-
-//Files for performance tests.
-../test/tAuthSvr/scripts/tauthsvr_performance.script   	/epoc32/winscw/c/tauth/tauthsvr/scripts/tauthsvr_performance.script
-../test/tAuthSvr/scripts/tauthsvr_performance.ini   	/epoc32/winscw/c/tauth/tauthsvr/scripts/tauthsvr_performance.ini
-../test/tAuthSvr/scripts/performance_log_parser.pl  	/epoc32/winscw/c/tauth/tauthsvr/scripts/performance_log_parser.pl 
--- a/authenticationservices/authenticationserver/group/security_authserver.history.xml	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,61 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<relnotes name="Authentication Services">
-  <purpose>
-  </purpose>
-
-  <minorchange revision="011">
-    Modifications to Interface classification and status from publishedall released to publishedpartner prototype
-  </minorchange>
-  
- <deliverystep number="211" name="Security: Enabling Authentication Provider Partners" osproject="Diran" revision="010">
-    <milestone project="GT0433" number="MS3.5"/>
-    <preq number="219" title="Enabling Authentication Provider Partners">
-      Reference Pin plugin added for the authentication Server
-    </preq>
-  </deliverystep>
-
- <deliverystep number="136" name="Security: Authentication Server" osproject="Diran" revision="009">
-    <milestone project="GT00433" number="MS3.4"/>
-    <preq number="218" title="Authentication Server">
-      This delivery step includes the new component Authentication Server and it's associated test code.
-    </preq>
-  </deliverystep>
-
-  <deliverystep number="496" name="EC073: Security: Crypto Services Header File Refactoring" osproject="Oghma" revision="008">
-	  <milestone project="GT0313" number="MS3.7"/>
-	  <ec number="73" title="Crypto Services Header File Refactoring (to simplify the SDK creation process)">
-		  Non-exported published functions made internal.
-	  </ec>
-  </deliverystep>
-  
-  <deliverystep number="708" name="Security - Alignment of CBR and System Model components" osproject="Oghma" revision="007">
-    <milestone project="GT0313" number="MS3.7"/>
-    <preq number="775" title="Alignment of CBR and System Model components">
-      Modified the ipr category of authtool.
-    </preq>
-  </deliverystep>
-
-  <defect number="DEF106230" title="Clean up build's tagscan errors" revision="006">
-    Removed tagscan errors.
-  </defect>
-
-  <ec number="075" title="Triage and address Coverity Errors in Security Subsystem" revision="005">
-    Fixed two problems in the trainingmgr.cpp file. The iResult variable was put on the CleanupStack in the CTrainingMgr::RegisterFirstIdentityL() method. It was a problem because this variable was already kept on the CleanupStack as a class member. Moreover, a potential memory leak was fixed in this method.
-  </ec>
-
-  <preq number="1182" title="GNU Make-based build system" revision="004">
-    TOOLS2 macro is added with TOOLS.
-  </preq>
-
-  <preq number="1182" title="GNU Make-based build system" revision="003">
-    Changed according to filename policy to support the building of Symbian OS on both Windows and Linux for the test code.
-  </preq>
-
-  <minorchange revision="002">
-    Removed the compile errors and the armv5 warning notes.
-  </minorchange>
-
-  <defect number="DEF102043" title="Makesis &amp; SWI assumes system drive is c:" revision="001">
-    Removed hardcoded references to C drive and replaced with system drive.
-  </defect>
-</relnotes>
--- a/authenticationservices/authenticationserver/group/security_authserver.mrp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,13 +0,0 @@
-component	security_authserver
-source	\sf\os\security\authenticationservices\authenticationserver
-binary	\sf\os\security\authenticationservices\authenticationserver\group	all
-exports	\sf\os\security\authenticationservices\authenticationserver\group
-
-notes_source	\component_defs\release.src
-
-
-#  == IPR section auto-inserted from distribution.policy files  ==
-ipr E 
-ipr T \sf\os\security\authenticationservices\authenticationserver\test
-
-# == end auto-inserted section ==
--- a/authenticationservices/authenticationserver/inc/authserver.iby	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,38 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-#ifndef __AUTHSERV_IBY__
-#define __AUTHSERV_IBY__
-
-define ZDRIVE \epoc32\data\z
-
-REM Authentication Server
-
-file=ABI_DIR\BUILD_DIR\authserver.exe		sys\bin\authserver.exe
-file=ABI_DIR\BUILD_DIR\authclient.dll		sys\bin\authclient.dll
-file=ABI_DIR\BUILD_DIR\authcommon.dll		sys\bin\authcommon.dll
-
-
-// When SYMBIAN_ENABLE_POST_MARKET_AUTHENTICATION_PLUGINS is defined, all plugins visible to 
-// the ECOM service will be loaded. By default it is not defined - only ROM based plugins 
-// will be loaded
-
-#ifdef SYMBIAN_ENABLE_POST_MARKET_AUTHENTICATION_PLUGINS
-patchdata authcommon.dll@KEnablePostMarketAuthenticationPlugins 0x01
-#endif
-
-#endif
--- a/authenticationservices/authenticationserver/inc/authserver/aspubsubdefs.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,89 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Authserver publish and subscribe properties.  
-*
-*/
-
-
-/**
- @file  
- @publishedAll
- @released
-*/
-
-#ifndef ASPUBSUBDEFS_H
-#define ASPUBSUBDEFS_H
-
-namespace AuthServer
-{
-/**
- * Used to write to and read from the publish and subscribe property
- * KUidAuthServerLastAuth. 
- *
- * @see KUidAuthServerLastAuth
- **/
-NONSHARABLE_STRUCT(TLastAuth)
-	{
-	TLastAuth() { Mem::FillZ(this, sizeof(TLastAuth)); }
-	/// The identities id number or KUnknownIdentity
-	TIdentityId iId;
-	/// The time of the authentication, 0 if unknown 
-	TTime       iAuthTime;
-	/// The highest number of combinations of the authentication methods
-	/// used
-	TEntropy    iMaxCombinations;
-	/// the lowest false positive rate of the methods used
-	TPercentage iFalsePositiveRate;
-	/// the lowest false negative rate of the methods used
-	TPercentage iFalseNegativeRate;
-	/// the number of factors (i.e. plugins) combined to make the
-	/// authentication
-	TInt32      iNumFactors;
-	};
-
-/**
- * This is the publish and subscribe property used by the Authentication
- * Server to publish the details of the last authentication. The
- * value is of type TLastAuth and can be retrieved using code such as:
- * <code>
- * TLastAuth lastAuth;
- * TPckg<TLastAuth> authPkg(lastAuth);
- * RProperty::Get(KAuthServerSecureId, KUidAuthServerLastAuth, authPkg);
- * </code>
- *
- * The property is published each time an authentication or deauthentication
- * is made, even if the same identity is authenticated. To be notified only
- * when the identity changes, subscribe to KUidAuthServerAuthChangeEvent.
- *
- */
-const TUint KUidAuthServerLastAuth = { 0x10281843 };
-
-
-/**
- * This is the publish and subscribe property used by the Authentication
- * Server to notify subscribers of a change of authenticated identity.  The
- * published value is of type TUint and will contain the id number of the last
- * identity authenticated.
- *
- * The property is published only when the identity changes, reauthentication
- * with a different method will not result in notification.
- *
- */
-const TUint KUidAuthServerAuthChangeEvent = { 0x10281845 };
-
-}
-
-#endif /*ASPUBSUBDEFS_H*/
-
--- a/authenticationservices/authenticationserver/inc/authserver/auth_srv_errs.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,183 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Contains the list of error values that may be returned. 
-*
-*/
-
-
-/**
- @file 
- @publishedAll
- @released
-*/
-
-#ifndef AUTH_SRV_ERRS_H
-#define AUTH_SRV_ERRS_H
-
-#include <e32def.h>
-
-/**
-	Attempted to internalize an invalid authentication expression stream.
-	
-	If this error occurs on the server side because the client
-	has sent an invalid externalization buffer they are panicked
-	with "AUTHSERVER 3", instead of being completed with this
-	error code.
-
-	This error should not occur if clients use the supplied
-	RAuthClient API.
- */
-const TInt KErrAuthServInvalidInternalizeExpr = -10800;
-
-/**
-	Attempted to internalize an authentication expression stream
-	with an unsupported version.
-	
-	The authentication server will complete an authentication
-	request with this value if the supplied stream has an
-	unsupported version number.
-
-	This error code is rare and is caused by sending a corrupt
-	externalized expression to the server, or if the expression
-	was internalized with an older version of the client code.
-	This error should not occur if clients use the supplied
-	RAuthClient API.
- */
-const TInt KErrAuthServUnsupportedExprVersion = -10801;
-
-/**
-    An attempt was made to reference a plugin by id number and no such 
-    plugin exists  
- **/
-const TInt KErrAuthServNoSuchPlugin = -10802;
-
-
-/**
-    An attempt was made to reference an identity by id number and no such 
-    identity exists  
- **/
-const TInt KErrAuthServNoSuchIdentity = -10803;
-
-/**
-    A plugin returns this on behalf of a user wanting to skip it.
- **/
-const TInt KErrAuthServPluginCancelled = -10804;
-
-/**
-    A plugin returns this on behalf of a user wanting to completely quit the
-    current operation.
- **/
-const TInt KErrAuthServPluginQuit = -10805;
-
-
-/**
-    This error is reported when an operation is attempted for which an
-    authentication must have already been performed.
- **/
-const TInt KErrAuthServAuthenticationRequired = -10806;
-
-/**
-	Attempted to add a new identity to the authentication
-	server database with an existing ID.
- */
-const TInt KErrAuthServIdentityAlreadyExists = -10807;
-
-/**
-	Attempted to set or retrieve a description for an identity,
-	or remove an identity which was not in the authentication database.
- */
-const TInt KErrAuthServIdentityNotFound = -10808;
-
-/**
-	Attempted to remove or retrieve the key info for
-	a training record that was not in the authentication
-	database.
- */
-const TInt KErrAuthServTrainingNotFound = -10809;
-
-/**
-    This error is reported when the authserver has not been able to register a
-    new identity due to no plugins training successfully.
- **/
-const TInt KErrAuthServRegistrationFailed = -10810;
-
-
-/**
-    This error is reported when an authclient attempts to remove the last
-    identity.
- **/
-const TInt KErrAuthServCanNotRemoveLastIdentity = -10811;
-
-
-/**
-    This error is reported when an authclient attempts to remove the last
-    trained plugin for an identity.
- **/
-const TInt KErrAuthServCanNotRemoveLastPlugin = -10812;
-
-
-/**
-    This error is reported when an attempt to use an inactive plugin is made.
- **/
-const TInt KErrAuthServPluginNotActive = -10813;
-
-/**
-	Client attempted to create an identity with a description
-	longer than 255 characters, or to change an existing identity's
-	description to use more than 255 characters.
- */
-const TInt KErrAuthServDescTooLong = -10814;
-
-/**
-	This error is reported when the authentication strength alias
-	supplied by the client is not found in the authserver's
-	central repository file.
- */
-
-const TInt KErrUnknownAuthStrengthAlias = -10815;
-
-/**
-	This error is reported when an authentication strength in 
-	the authserver's central repository file is undefined.
- */
-
-const TInt KErrAuthStrengthAliasNotDefined = -10816;
-
-/**
-	This error is reported when an alias string defining an
-	authentication strength in the authserver's central repository 
-	file contains expression other than plugin Id, plugin Types 
-	and operators ("& and "|").
- */
-
-const TInt KErrAuthServInvalidAliasStringExpression = -10817;
-
-
-/**
-    This error is reported when an authclient attempts to remove the default
-    identity.
- */
-const TInt KErrAuthServCanNotRemoveDefaultIdentity = KErrAuthServCanNotRemoveLastIdentity;
-
-/**
-    This error is reported when an authentication manager client attempts to 
-    reset an identity and this may result in zero plugins registering the new identity data.
-    This can happen if a reset request is issued for all plugins registered for an identity 
-    and none of the plugins are of knowledge type.
- */
-const TInt KErrAuthServResetMayLoseIdentity = -10818;
-
-#endif	// #ifndef AUTH_SRV_ERRS_H
-
--- a/authenticationservices/authenticationserver/inc/authserver/authclient.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,135 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* RAuthclient - external authentication client session interface
-* The defined fuctionality is used by clients to access the authentication
-* server.
-* The access to a specific functionality is dependant on the client 
-* capabilities and may be restricted.             
-*
-*/
-
-
-/**
- @file 
- @publishedAll
- @released
-*/
-
-#ifndef AUTHCLIENT_H
-#define AUTHCLIENT_H
-
-#include "authserver/identity.h"
-#include "authserver/authexpression.h"
-#include "authserver/plugindesc.h"
-#include "authserver/idandstring.h"
-#include <scs/scsclient.h>
-namespace AuthServer
-{
-
-class CAsyncResponseDecoder;
-
-/**
- * Client side interface to the authentication server providing general
- * authentication and plugin query services.
- *
- */	
-class RAuthClient : public RScsClientBase
-	{
-	
-	friend class CAsyncResponseDecoder;
-	
-public:
-
-    IMPORT_C RAuthClient();
-    
-	IMPORT_C TInt Connect();
-
-	IMPORT_C void AuthenticateL(
-	    const CAuthExpression& aExpression,
-	    TTimeIntervalSeconds   aTimeout,
-		TBool                  aClientSpecificKey,
-		TBool                  aWithString,
-	    CIdentity*&            aIdentityResult, 
-	    TRequestStatus&        aStatus);
-	
-	IMPORT_C CIdentity* AuthenticateL(
-	    const CAuthExpression& aExpression,
-	    TTimeIntervalSeconds   aTimeout,
-		TBool                  aClientSpecificKey,
-		TBool                  aWithString);
-
-	IMPORT_C CIdentity* AuthenticateL(
-			const CAuthExpression& 	aAuthExpression,
-		    TTimeIntervalSeconds   	aTimeout,
-			TBool                  	aClientSpecificKey,
-			TUid 				   	aClientSid,
-			TBool                  	aWithString,
-			const TDesC&			aClientMessage);
-			
-	IMPORT_C void AuthenticateL(
-		const CAuthExpression& 	aAuthExpression,
-	    TTimeIntervalSeconds   	aTimeout,
-		TBool                  	aClientSpecificKey,
-		TUid 					aClientSid,
-		TBool                  	aWithString,
-	    const TDesC&			aClientMessage,
-	    CIdentity*&            	aIdentityResult,
-	    TRequestStatus&        	aStatus
-		);
-
-	IMPORT_C void DeauthenticateL();
-	
-	IMPORT_C void PluginsL(RPluginDescriptions& aPluginList);
-	IMPORT_C void ActivePluginsL(RPluginDescriptions& aPluginList);
-	IMPORT_C void PluginsOfTypeL(TAuthPluginType aType,
-								  RPluginDescriptions& aPluginList);
-	
-	IMPORT_C void PluginsWithTrainingStatusL(
-        TAuthTrainingStatus aStatus,
-		RPluginDescriptions& aPluginList);
-	
-	IMPORT_C void IdentitiesL(RIdentityIdArray& aIdList);
-	IMPORT_C void IdentitiesWithStringL(RIdAndStringArray& aList);
-
-	IMPORT_C HBufC* IdentityStringL(TIdentityId aId);
-	IMPORT_C void SetIdentityStringL(TIdentityId aId, const TDesC& aString);
-	
-	IMPORT_C TPluginId PreferredTypePluginL(TAuthPluginType aPluginType);
-	
-	IMPORT_C TUint Cancel();
-	IMPORT_C void Close();
-	
-	IMPORT_C void ListAuthAliasesL(RPointerArray<HBufC>& aAuthAliasList);
-	
-	IMPORT_C CAuthExpression* CreateAuthExpressionL(const TDesC& aAuthString) const;
-	
-protected:
-	/* @internalComponent */
-	void CheckAsyncDecoderL();
-	/* @internalComponent */
-	HBufC8* SendReceiveBufferLC(TInt aMessage);
-	/* @internalComponent */
-	HBufC8* SendReceiveBufferLC(TInt aMessage, TIpcArgs& aArgs);
-	
-private:
-	TInt StartAuthServer();
-
-protected:
-	CAsyncResponseDecoder* iAsyncResponseDecoder;
-};
-  
-} // namespace
-#endif
-
--- a/authenticationservices/authenticationserver/inc/authserver/authexpression.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,125 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CAuthExpression declaration
-*
-*/
-
-
-/**
- @file 
- @publishedAll
- @released
-*/
-
-#ifndef AUTHEXPRESSION_H
-#define AUTHEXPRESSION_H
-
-#include <s32strm.h>
-#include "authserver/authtypes.h"
-
-
-namespace AuthServer
-{
-
-
-class CAuthExpression : public CBase
-/**
-	Describes an authentication expression.
-
-	AuthServer clients construct expressions using
-	AuthExpr, combined with AuthAnd and AuthOr, or
-	the equivalent overloaded & and | operators.
-
-	@see AuthExpr
-	@see AuthAnd
-	@see AuthOr
- */
-	{
-public:
-	/**
-		Externalize this object to the supplied stream.
-
-		@param	aWriteStream Stream to write persistent state to.
-	 */
-	virtual void ExternalizeL(RWriteStream& aWriteStream) const = 0;
-	};
-
-
-class TAuthExpressionWrapper
-/**
-	Simple wrapper around a pointer to an authentication
-	expression.  It is defined so the binary & and | operators
-	can be overloaded to generate concise expressions.
-	
-	Like CAuthExpression, this class should not be
-	used directly by clients, but via the AuthExpr,
-	AuthAnd, and AuthOr functions, or via the overloaded
-	& and | operators.  For this reason, the constructors
-	are not exported.
-	
-	@see AuthExpr
-	@see AuthAnd
-	@see AuthOr
- */
-	{
-public:
-	/* @internalComponent*/
-	TAuthExpressionWrapper(CAuthExpression* aExpression);
-	/* @internalComponent */
-	TAuthExpressionWrapper(TAuthPluginType aType);
-	/* @internalComponent */
-	TAuthExpressionWrapper(TPluginId aPluginId);
-	/* @internalComponent */
-	TAuthExpressionWrapper();
-	
-	inline operator CAuthExpression*();
-	
-private:
-	/**
-		Pointer to the referenced authentication expression.
-		This is NULL in OOM.
-	 */
-	CAuthExpression*const iPtr;
-	};
-
-
-IMPORT_C TAuthExpressionWrapper AuthExpr(TAuthPluginType aType);
-IMPORT_C TAuthExpressionWrapper AuthExpr(TPluginId aPluginId);
-IMPORT_C TAuthExpressionWrapper AuthExpr();
-
-IMPORT_C TAuthExpressionWrapper AuthOr(CAuthExpression* aLeft, CAuthExpression* aRight);
-IMPORT_C TAuthExpressionWrapper AuthAnd(CAuthExpression* aLeft, CAuthExpression* aRight);
-
-
-#define AUTH_EXPR_BINARY_OPS
-#ifdef AUTH_EXPR_BINARY_OPS
-
-// These binary operators provide a more concise way to write
-// authentication expressions than AuthOr and AuthAnd.  However,
-// their behaviour - dynamically allocating from the heap - is
-// non-obvious to a reader, so they are left as a build-time
-// option.
-
-inline TAuthExpressionWrapper operator&(TAuthExpressionWrapper aLeft, TAuthExpressionWrapper aRight);
-inline TAuthExpressionWrapper operator|(TAuthExpressionWrapper aLeft, TAuthExpressionWrapper aRight);
-
-#endif
-
-
-}	// namespace AuthServer
-
-#include "authserver/authexpression.inl"
-
-#endif // EXPRESSION_H
--- a/authenticationservices/authenticationserver/inc/authserver/authexpression.inl	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,85 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* @publishedAll
-* @released
-*
-*/
-
-
-#ifndef AUTHEXPRESSION_INL
-#define AUTHEXPRESSION_INL
-
-#include "authserver/authexpression.h"
-
-namespace AuthServer
-{
-
-
-// -------- TAuthExpressionWrapper --------
-
-
-inline TAuthExpressionWrapper::operator CAuthExpression*()
-/**
-	Conversion operator recasts this object as a
-	pointer to the contained authorisation expression.
- */
-	{
-	return iPtr;
-	}
-
-
-#ifdef AUTH_EXPR_BINARY_OPS
-
-
-inline TAuthExpressionWrapper operator&(TAuthExpressionWrapper aLeft, TAuthExpressionWrapper aRight)
-/**
-	This overloaded operator is a wrapper around a call to AuthAnd.
-	See AuthAnd for a full description.	
-	
-	@param	aLeft			Left subexpression.
-	@param	aRight			Right subexpression.
-	@return					Wrapper around new complex AND expression,
-							which is NULL if could not allocate.
-	@see AuthAnd
- */
-	{
-	return AuthAnd(aLeft, aRight);
-	}
-
-
-inline TAuthExpressionWrapper operator|(TAuthExpressionWrapper aLeft, TAuthExpressionWrapper aRight)
-/**
-	This overloaded operator is a wrapper around a call to AuthOr
-	See AuthOr for a full description.	
-	
-	@param	aLeft			Left subexpression.
-	@param	aRight			Right subexpression.
-	@return					Wrapper around new complex OR expression,
-							which is NULL if could not allocate.
-	@see AuthOr
- */
-	{
-	return AuthOr(aLeft, aRight);
-	}
-
-
-#endif	// #ifdef AUTH_EXPR_BINARY_OPS
-
-
-}	// namespace AuthServer
-
-
-#endif	// AUTHEXPRESSION_INL
-
--- a/authenticationservices/authenticationserver/inc/authserver/authmgrclient.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,75 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* RAuthMgrClient - external authentication client session interface
-* The defined fuctionality is used by clients to access the authentication
-* server for the purpose of managing identities.
-* The access to a specific functionality is dependant on the client 
-* capabilities and may be restricted.             
-*
-*/
-
-
-/**
- @file 
- @publishedAll
- @released
-*/
-
-#ifndef AUTHMGRCLIENT_H
-#define AUTHMGRCLIENT_H
-
-#include "authserver/authclient.h"
-
-namespace AuthServer
-{
-
-/**
- * Client side interface to the authentication server providing identity
- * management services.
- */	
-class RAuthMgrClient : public RAuthClient
-	{
-public:
-
-	IMPORT_C void RegisterIdentityL(CIdentity*& aIdentity,
-								   const TDesC& aDescription,  
-								   TRequestStatus& aRequest);
-
-	IMPORT_C void RemoveIdentityL(TIdentityId aId);
-
-
-	IMPORT_C void TrainPlugin(TIdentityId aId,
-							  TPluginId aPlugin,
-							  TRequestStatus& aRequest);
-
-	IMPORT_C void ForgetPluginL(TIdentityId aId,
-					  TPluginId aPlugin);
-
-	IMPORT_C void SetPreferredTypePluginL(TAuthPluginType aPluginType,
-										  TPluginId aPluginId);
-
-	IMPORT_C void ResetIdentityL(TIdentityId aId,
-								const TDesC& aRegistrationInformation);
-
-	IMPORT_C void ResetIdentityL(TIdentityId aId,
-								TAuthPluginType aPluginType,
-								const TDesC& aRegistrationInformation);
-
-	IMPORT_C void ResetIdentityL(TIdentityId aId,
-								RArray<TPluginId>& aPluginIdList,
-								RPointerArray<const HBufC>& aRegistrationInformation);
-	};
-} // namespace
-#endif
--- a/authenticationservices/authenticationserver/inc/authserver/authpatchdata.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,38 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-/**
- @file 
- @publishedPartner
- @released
-*/
-
-#include <e32base.h>
-
- /**
-   This 8-bit variable is used in agent resolution. It is used to override AuthServer's 
-   default resolution behaviour of only loading plugins from the ROM drive. 
-   Compile time value is 0 - default behaviour. 
-   When non-zero, Authserver will load all plugins visible to the ECOM service regardless of 
-   the drive. 
-   This variable is changed at ROM build time using the patchdata obey keyword.
-   See Symbian OS Developer Library documentation on how to patch DLL data exports.
-   */
-   
-IMPORT_C extern const TUint8 KEnablePostMarketAuthenticationPlugins;
-
--- a/authenticationservices/authenticationserver/inc/authserver/authplugininterface.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,276 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CAuthPluginInterface 
-*
-*/
-
-
-/**
- @file 
- @publishedAll
- @released
-*/
-
-#ifndef AUTHPLUGININTERFACE_H
-#define AUTHPLUGININTERFACE_H
-
-
-#include <authserver/authtypes.h>
-#include <ecom/implementationinformation.h>
-
-namespace AuthServer
-{
-
-/// The interface UID for the authentication plugin interface
-const TUid KCAuthPluginInterfaceUid = { 0x102740FE }; 
-
-
-/**
- * The ECOM interface for authentication plugins. An authentication plugin is
- * used to help identify the current device holder. When a plugin is asked to
- * identify the holder, it interacts with the user and potentially hardware or
- * services provided by other servers. The plugin then generates some data
- * which is unique and repeatable for the input recieved. This data should
- * not be persisted on the device in any form that can easily be used to
- * recover the data.
- *
- * For example, a plugin might request a PIN number from the user. The plugin
- * will take the number, perhaps compare the hash of the number against the
- * hashes recorded during training and if a match is found return the identity
- * along with some unique data associated with it.
- *
- */	
-class CAuthPluginInterface : public CBase
-	{
-public:
-
-	/**
-	 * @return the id of the plugin. This should be the ECOM implementation id.
-	 **/
-	virtual TPluginId Id() const = 0;
-
-	/**
-	 *
-	 * @return the name of the plugin.
-	 * 
-	 **/
-	virtual const TPtrC& Name() const = 0;
-	
-	/**
-	 *
-	 * @return a description of the plugin.
-	 * 
-	 **/
-	virtual const TPtrC& Description() const = 0;
-
-	/**
-	 *
-	 * @return the minimum entropy of the plugin.
-	 * 
-	 **/
-	virtual TEntropy MinEntropy() const = 0;
-	
-	/**
-	 *
-	 * @return the rate of false positive identifications.
-	 * 
-	 **/
-	virtual TPercentage FalsePositiveRate() const = 0;
-
-	/**
-	 *
-	 * @return the rate of false negative identifications.
-	 * 
-	 **/
-	virtual TPercentage FalseNegativeRate() const = 0;
-
-	/**
-	 *
-	 * @return the type of plugin
-	 * 
-	 **/
-	virtual TAuthPluginType Type() const = 0;
-
-	/**
-	 * Performs actions required to identify the current device holder. 
-	 *
-	 * For details see the reference/test implementation of a knowledge-type 
-	 * plugin called the pinplugin.
-	 *
-	 * @param aId in the event of a successfull call, aId will be set to the
-	 * id of the identity. The value is not modified otherwise. It should be
-	 * noted that a successful call includes the possibility of not
-	 * recognising the user in which case aId should be set to
-	 * KUnknownIdentity.
-	 *
-	 * @param aClientMessage A displayable text string parameter for authentication
-	 * requests.It shall be passed to plug-ins to display to the users.
-	 *
-	 * @param aResult in the event of a successfull call, aResult contains the
-	 * data generated from the identification process. This data is used by
-	 * the authentication server to generate a transient key which in turn is
-	 * used to decrypt the identities protection key. If the call was
-	 * unsuccessful or the user is unknown no buffer will be created. Ownership of 
-	 * the buffer is transfered to the caller.
-	 *
-	 * @param aRequest the request status through which the caller will be
-	 * notified of completion. Upon completion, the status value will be one of the
-	 * following :
-	 * KErrNone if the identification process is successful.
-	 * KErrAuthServPluginCancelled if the user cancels the identification process for
-	 * this plugin.
-	 * KErrAuthServPluginQuit if the user quits the whole identification
-	 * process.
-	 * ... or any of the system wide error codes.
-	 **/
-
-
-	virtual void Identify(TIdentityId& aId, const TDesC& aClientMessage, 
-						  HBufC8*& aResult, TRequestStatus& aRequest) = 0;
-
-	/**
-	 * Cancel the current action. This method must complete with KErrCancel
-	 * any outstanding asyncronous requests such as Train or Identify.
-	 **/
-
-
-	virtual void Cancel() = 0;
-	
-	/**
-	 * This method tells the plugin to operate in training mode. After the
-	 * successful this method the plugin should be able to correctly identify
-	 * the specified identity using the Identify method. If the plugin already
-	 * has existing training data for the identity then the data should be
-	 * replaced. Care should be taken to allow the user to cancel or quit the
-	 * training without losing the existing training.  
-	 * 
-	 * @param aId the identity for whom to train the plugin. This allows the
-	 * plugin to persist training data associated with the identity and delete
-	 * or update that data later on.
-	 *
-	 * @param aResult this buffer will be filled with data that matches the
-	 * current device holder. This should be the same data as is returned by
-	 * the Identify method for the same identity. Ownership of the buffer is 
-	 * transfered to the caller.
-	 *
-	 * @param aRequest the request status through which the caller will be
-	 * notified of completion. Upon completion the status value will be one of the
-	 * following :
-	 * KErrNone if the training process is successful.
-	 * KErrAuthServPluginCancelled if the user cancels the training process for
-	 * this plugin.
-	 * KErrAuthServPluginQuit if the user quits the whole training
-	 * process.
-	 * ... or any of the system wide error codes.
-	 **/
-
-
-	 virtual void Train(TIdentityId aId, HBufC8*& aResult,
-						TRequestStatus& aRequest) = 0;
-
-	/**
-	 * @return true if the plugin can be used for identification or training
-	 * purposes without further user intervention. 
-	 **/
-
-
-	virtual TBool IsActive() const = 0;
-	
-	/**
-	 * Remove any stored training data for the specified identity. This is
-	 * used if an identity is being removed from the device. No user
-	 * interaction should take place as a result of this call.
-	 *
-	 * @param aId the identity for whom to remove any persisted training data.
-	 *
-	 * @return KErrNone if the operation is successful.
-	 * @return KErrAuthServNoSuchIdentity if the TIdentityId wasn't recognised.
-	 * @return ... or any of the system wide error codes.
-	 **/
-
-
-	 virtual TInt Forget(TIdentityId aId) = 0;
-
-	/**
-	 * Pretend the device holder has identified themselves using a default
-	 * entry. For example, a pin number plugin would return the same data as
-	 * if the holder had entered the default pin. This call is used during the
-	 * creation of the initial device identity and allows the device to be
-	 * operated without the user being forced to train plugins the first time
-	 * the device is started. No user interaction should take place as a
-	 * result of this call.
-	 *
-	 * Only plugins of type EAuthKnowledge should support default
-	 * data. Plugins of other types will be ignored.
-	 *
-	 * @param aId The identity that will be registered using the default data. 
-	 * 
-	 * @param aOutputBuf This buffer should be filled with the data that would
-	 * be generated if the phone holder identified themselves using the
-	 * default manner. Ownership of the buffer is transfered to the caller. 
-	 *
-	 * @return KErrNone if the plugin supports default data.
-	 * @return KErrNotSupported if the plugin doesn't support default data.
-	 * @return ... or any of the system wide error codes.
-	 **/
-
-
-	 virtual TInt DefaultData(TIdentityId aId, HBufC8*& aOutputBuf) = 0;
-
-	/**
-	 * This method tells the plugin to remove the training data held for the given identity 
-	 * and to regenerate it using the supplied registration data. The intent of this method 
-	 * is to allow a backend reset of user credentials in situations where the user is not 
-	 * able to provide the credentials for some reason (for instance the user has forgotten 
-	 * the password). Note that no user interaction should take place as a result of this call. 
-	 * Since the registration data may not be usable by all plugin types it is expected that only 
-	 * EAuthKnowledge type plugins (those based on pins, passphrases, etc.) use this data for 
-	 * registering the user and return the result.
-	 *
-	 * @param aId The identity whose training data should be reset. 
-	 * 
-	 * @param aRegistrationData The data that can be used to register the identity. 
-	 * This data is meaningful for EAuthKnowledge type plugins. Other plugins may choose to 
-	 * ignore this parameter. An empty descriptor signifies the absence of registration data.
-	 *
-	 * @param aResult This buffer will be filled with data that matches the specified identity. 
-	 * This should be the same data subsequently returned by the Identify method for the same identity. 
-	 * Note that plugins that aren't supplied registration data or those that don't use the supplied 
-	 * registration data for the reset can return NULL. Ownership of the buffer is transfered to 
-	 * the caller.
-	 *
-	 * @return KErrNone if the plugin is successfully able to either remove and/or reset the training data.
-	 * @return KErrNotSupported if the plugin doesn't support a reset functionality.
-	 * @return ... or any of the system wide error codes.
-	 **/
-
-
-	 virtual TInt Reset(TIdentityId aId, const TDesC& aRegistrationData, 
-			 			HBufC8*& aResult) = 0;
-	
-	/**
-	 * 
-	 * Destructor.
-	 * 
-	 **/
-
-
-	virtual ~CAuthPluginInterface() {};
-	
-};	
-
-} // namespace
-
-#endif
--- a/authenticationservices/authenticationserver/inc/authserver/authserver_client.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,41 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* This header file includes the header files which
-* applications need to use the authentication server.
-*
-*/
-
-
-/**
- @file 
- @internalTechnology 
-*/
-
-#ifndef AUTHSERVER_CLIENT_H
-#define AUTHSERVER_CLIENT_H
-
-#include <authserver/auth_srv_errs.h>
-#include <authserver/authtypes.h>
-#include <authserver/authexpression.h>
-#include <authserver/protectionkey.h>
-#include <authserver/identity.h>
-#include <authserver/plugindesc.h>
-#include <authserver/authclient.h>
-#include <authserver/authmgrclient.h>
-#include <authserver/aspubsubdefs.h>
-
-#endif	// #ifndef AUTHSERVER_CLIENT_H
-
-
--- a/authenticationservices/authenticationserver/inc/authserver/authtypes.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,71 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Basic typedefs used by the Authentication Server
-*
-*/
-
-
-/**
- @file 
- @publishedAll
- @released
-*/
-
-#ifndef AUTHTYPES_H
-#define AUTHTYPES_H
-
-#include <e32cmn.h>
-
-namespace AuthServer
-{
-typedef TUint32 TIdentityId;
-typedef TUint32 TPluginId;
-
-typedef TUint32 TEntropy;
-typedef TUint32 TPercentage;
-
-/////////////
-// constants and enums 
-/////////////
-
-const TUint32 KUnknownPluginId = 0;
-const TUint32 KUnknownIdentity = 0;
-const TUid KAuthServerSecureId = { 0x102740FC };
-const TInt KMaxDescLen = 255;
-
-enum TAuthPluginType
-    {
-	EAuthDefault   = 0,
-    EAuthBiometric = 1,
-    EAuthKnowledge = 64,
-    EAuthToken     = 128,
-	EAuthPerformance = 192
-    };
-    
-enum TAuthTrainingStatus
-    {
-    EAuthUntrained    = 1,
-    EAuthTrained      = 64,
-    EAuthFullyTrained = 128,
-    };
-
-/// Array types used by clients and server
-typedef RArray<TIdentityId>              RIdentityIdArray;
-typedef RArray<TPluginId>                RPluginIdArray;
-
-
-}   
-
-#endif // AUTHTYPES_H
--- a/authenticationservices/authenticationserver/inc/authserver/idandstring.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,67 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CIdAndString class declaration
-*
-*/
-
-
-/**
- @file 
- @publishedAll
- @released
-*/
-
-#ifndef IDANDSTRING_H
-#define IDANDSTRING_H
-
-#include <s32strm.h>
-#include <ct/rcpointerarray.h>
-#include "authserver/authtypes.h"
-
-namespace AuthServer
-{
-/**
- * CIdAndString is an client side class of the authentication server. 
- * It contains the relevant identity and corresponding displayable
- * text associated with this identity.
- * 
- */
-NONSHARABLE_CLASS(CIdAndString) : public CBase
-	{
-public:
-
-	IMPORT_C static CIdAndString* NewLC(TIdentityId aId, const TDesC& aString);
-	IMPORT_C static CIdAndString* NewLC(RReadStream& aStream);
-
-	IMPORT_C void ConstructL(TIdentityId aId, const TDesC& aString);
-	
-	IMPORT_C ~CIdAndString(); 
-
-	IMPORT_C void ExternalizeL(RWriteStream& aStream) const;
-	void InternalizeL(RReadStream& aStream);
-	
-	IMPORT_C TIdentityId   Id()     const;
-	IMPORT_C HBufC*        String() const;
-	
-private:
-	TIdentityId iId;
-	HBufC*      iString;
-	};
-
-typedef RCPointerArray<CIdAndString> RIdAndStringArray;
-
-}   
-
-#endif // IDANDSTRING_H
--- a/authenticationservices/authenticationserver/inc/authserver/identity.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,78 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CIdentity declaration
-*
-*/
-
-
-/**
- @file 
- @publishedAll
- @released
-*/
-
-#ifndef IDENTITY_H
-#define IDENTITY_H
-
-#include "authserver/authtypes.h"
-#include "authserver/protectionkey.h"
-
-namespace AuthServer
-{
-/**
- * CIdentity is an client side class of the authentication server. 
- * CIdentity is returned as the result of an authentication.
- * 
- */
-class CIdentity : public CBase
-	{
-public:
-
-    IMPORT_C static CIdentity* NewL(TIdentityId aId,
-									CProtectionKey* aKey,
-									HBufC* aString);
-	
-    IMPORT_C static CIdentity* NewLC(TIdentityId aId,
-									 CProtectionKey* aKey,
-									 HBufC* aString);
-	
-    IMPORT_C static CIdentity* NewL(RReadStream& aStream);
-    IMPORT_C static CIdentity* NewLC(RReadStream& aStream);
-    
-	virtual ~CIdentity();
-
-	IMPORT_C TIdentityId Id() const;
-
-	IMPORT_C const CProtectionKey& Key() const;
-
-	IMPORT_C TDesC& String() const;
-	
-	IMPORT_C void ExternalizeL(RWriteStream& s) const;
-	IMPORT_C static CIdentity* InternalizeL(RReadStream& s);
-
-private:
-	void ConstructL(CProtectionKey* aKey,
-					HBufC* aString);
-	
-	CIdentity(TIdentityId aId);
-
-private:
-    TIdentityId           iId;
-    CProtectionKey* iKey;
-	HBufC*                iString;
-	};
-}
-
-#endif // IDENTITY_H
--- a/authenticationservices/authenticationserver/inc/authserver/log.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,108 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Prints debug information.
-*
-*/
-
-
-/**
- @file
- @internalComponent
-*/
- 
-#ifndef __AUTHSERVER_LOG_H__
-#define __AUTHSERVER_LOG_H__
-
-#include <e32debug.h>
-
-namespace AuthServ
-{
-
-#ifdef _DEBUG
-
-#define DEBUG_PRINTF(a) {AuthServ::DebugPrintf(__LINE__, __FILE__, a);}
-#define DEBUG_PRINTF2(a, b) {AuthServ::DebugPrintf(__LINE__, __FILE__, a, b);}
-#define DEBUG_PRINTF3(a, b, c) {AuthServ::DebugPrintf(__LINE__, __FILE__, a, b, c);}
-#define DEBUG_PRINTF4(a, b, c, d) {AuthServ::DebugPrintf(__LINE__, __FILE__, a, b, c, d);}
-#define DEBUG_PRINTF5(a, b, c, d, e) {AuthServ::DebugPrintf(__LINE__, __FILE__, a, b, c, d, e);}
-
-#define DEBUG_CODE_SECTION(a) TRAP_IGNORE({ a; }) 
-
-// UTF-8 overload of the DebufPrintf method. Should be used by default,
-// since it's cheaper both in CPU cycles and stack space.
-
-inline void DebugPrintf(TInt aLine, char* aFile, TRefByValue<const TDesC8> aFormat, ...)
-	{
-	VA_LIST list;
-	VA_START(list, aFormat);
-	
-	TTime now;
-	now.HomeTime();
-	
-	TBuf8<1024> buffer;
-	_LIT8(KAuthServLogPrefix, "[authserver] ");
-	_LIT8(KAuthServLineFileFormat, "%Ld Line: % 5d, File: %s -- ");
-	buffer.Append(KAuthServLogPrefix);
-	buffer.AppendFormat(KAuthServLineFileFormat, now.Int64(), aLine, aFile);
-	buffer.AppendFormatList(aFormat, list);
-	buffer.Append(_L8("\r\n"));
-	
-	RDebug::RawPrint(buffer);
-	
-	VA_END(list);
-	}
-	
-// Unicode DebufPrintf overload
-
-inline void DebugPrintf(TInt aLine, char* aFile, TRefByValue<const TDesC16> aFormat, ...)
-	{
-	VA_LIST list;
-	VA_START(list, aFormat);
-	
-	TTime now;
-	now.HomeTime();
-	
-	TBuf8<256> header;
-	_LIT8(KAuthServLogPrefix, "[authserver] ");
-	_LIT8(KAuthServLineFileFormat, "%Ld Line: % 5d, File: %s -- ");
-	header.Append(KAuthServLogPrefix);
-	header.AppendFormat(KAuthServLineFileFormat, now.Int64(), aLine, aFile);
-	
-	TBuf<1024> buffer;
-	buffer.Copy(header);
-	buffer.AppendFormatList(aFormat, list);
-	buffer.Append(_L("\r\n"));
-	
-	RDebug::RawPrint(buffer);
-	
-	VA_END(list);
-	}
-
-#else
-
-#define DEBUG_PRINTF(a)
-#define DEBUG_PRINTF2(a, b)
-#define DEBUG_PRINTF3(a, b, c)
-#define DEBUG_PRINTF4(a, b, c, d)
-#define DEBUG_PRINTF5(a, b, c, d, e)
-
-#define DEBUG_CODE_SECTION(a)
-
-#endif
-
-
-} // namespace AuthServ
-
-#endif // __AUTHSERVER_LOG_H__
--- a/authenticationservices/authenticationserver/inc/authserver/plugindesc.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,99 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CPluginDesc class declaration
-*
-*/
-
-
-/**
- @file 
- @publishedAll
- @released
-*/
-
-#ifndef PLUGINDESC_H
-#define PLUGINDESC_H
-
-#include <s32strm.h>
-#include <ct/rcpointerarray.h>
-#include "authserver/authtypes.h"
-
-namespace AuthServer
-{
-
-/**
- * Provides a description of an authentication plugin's properties.
- **/
-NONSHARABLE_CLASS(CPluginDesc) : public CBase
-	{
-public:
-
-	IMPORT_C static CPluginDesc* NewL(
-		TPluginId aId, const TDesC& aName,
-		TAuthPluginType aType, TAuthTrainingStatus aTrainingStatus,
-		TEntropy aMinEntropy, TPercentage aFalsePositiveRate,
-		TPercentage aFalseNegativeRate);
-	IMPORT_C static CPluginDesc* NewLC(RReadStream& aIn);
-	
-	virtual ~CPluginDesc();
-	
-	IMPORT_C TPluginId           Id() const;
-	IMPORT_C const TDesC*        Name() const;
-	IMPORT_C TAuthPluginType     Type() const;
-	IMPORT_C TAuthTrainingStatus TrainingStatus() const;
-	IMPORT_C TEntropy            MinEntropy() const;
-	IMPORT_C TPercentage         FalsePositiveRate() const;
-	IMPORT_C TPercentage         FalseNegativeRate() const;
-
-	IMPORT_C void ExternalizeL(RWriteStream& aOut) const;
-		
-private:
-	static const TInt KMaxNameLength = 256;
-		
-	CPluginDesc(TPluginId           aId,
-				TAuthPluginType     aType,
-				TAuthTrainingStatus aTrainingStatus,
-				TEntropy            aMinEntropy,
-				TPercentage         aFalsePositiveRate,
-				TPercentage         aFalseNegativeRate);
-	void ConstructL(const TDesC& aName);
-
-	inline CPluginDesc();
-	void InternalizeL(RReadStream& aIn);
-
-	/// the id of the plugin
-	TPluginId           iId;
-	/// The name of the plugin
-	HBufC*              iName;
-	/// The type of plugin
-	TAuthPluginType     iType;
-	/// Indicates whether the plugin is trained for none, some or all
-	/// known identities.
-	TAuthTrainingStatus iTrainingStatus;
-	/// The minumum entropy provided by the plugin.
-	TEntropy            iMinEntropy;
-	/// The false positive rate of the plugin
-	TPercentage         iFalsePositiveRate;
-	/// The false negative rate of the plugin.
-	TPercentage         iFalseNegativeRate;
-    };
-
-typedef RCPointerArray<const CPluginDesc> RPluginDescriptions;
-
-}   
-
-#include <authserver/plugindesc.inl>
-
-#endif // PLUGINDESC_H
--- a/authenticationservices/authenticationserver/inc/authserver/plugindesc.inl	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,38 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#ifndef AUTHSERVER_PLUGINDESC_INL
-#define AUTHSERVER_PLUGINDESC_INL
-
-#include <authserver/plugindesc.h>
-
-AuthServer::CPluginDesc::CPluginDesc()
-/**
-	This constructor is used by NewL to allocate
-	a CPluginDesc object when it restores one from
-	a stream.
-	
-	It does nothing, and is only defined because
-	this class has another, non-default, constructor.
- */
-	{
-	// empty.
-	}
-
-#endif	// #ifndef AUTHSERVER_PLUGINDESC_INL
-
--- a/authenticationservices/authenticationserver/inc/authserver/protectionkey.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,64 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* TProtectionKey declaration
-*
-*/
-
-
-/**
- @file 
- @publishedAll
- @released
-*/
-#ifndef PROTECTIONKEY_H
-#define PROTECTIONKEY_H
-
-#include <s32strm.h>
-
-namespace AuthServer
-{
-
-/**
- * CProtectionKey is a cryptographic key that is assigned to an
- * identity. Protection keys are used by authentication clients 
- * to protect data that only the associated identity should be 
- * able to access. Protection keys are generated by the AuthServer
- * when a new identity is created.
- */
-NONSHARABLE_CLASS(CProtectionKey) : public CBase
-	{
-public:
-	virtual ~CProtectionKey();
-	
-
-	IMPORT_C static CProtectionKey* NewL(TInt aKeySize);	
-	IMPORT_C static CProtectionKey* NewLC(TInt aKeySize);
-	IMPORT_C static CProtectionKey* NewL(HBufC8* aKeyData);
-	IMPORT_C static CProtectionKey* NewLC(HBufC8* aKeyData);
-
-	IMPORT_C CProtectionKey* ClientKeyL(TInt aClientUid) const;
-	IMPORT_C TPtrC8 KeyData() const;
-	
-private:
-	CProtectionKey();
-	void ConstructL(TInt aKeySize);
-	void ConstructL(HBufC8* aKeyData);
-
-	HBufC8* iKeyData;
-	};
-
-}
-
-#endif // PROTECTIONKEY_H
--- a/authenticationservices/authenticationserver/inc/tAuthSvr.iby	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,76 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#ifndef __TAUTHSVR_IBY__
-#define __TAUTHSVR_IBY__
-
-#include <testexecute.iby>
-#include "tpinplugin.iby"
-
-define ZDRIVE \epoc32\data\z
-file=ABI_DIR\BUILD_DIR\authtool.exe			sys\bin\authtool.exe
-file=ABI_DIR\BUILD_DIR\tauthkeys.exe		sys\bin\tauthkeys.exe
-file=ABI_DIR\BUILD_DIR\tauthdb.exe			sys\bin\tauthdb.exe
-file=ABI_DIR\BUILD_DIR\tauthcliserv.exe		sys\bin\tauthcliserv.exe
-file=ABI_DIR\BUILD_DIR\tauthplugins.exe		sys\bin\tauthplugins.exe
-data=ABI_DIR\BUILD_DIR\tAuthSvr.exe			sys\bin\tAuthSvr.exe
-file=ABI_DIR\BUILD_DIR\tauthsvrwdd.exe		sys\bin\tauthsvrwdd.exe
-file=ABI_DIR\BUILD_DIR\tauthsvrnc.exe		sys\bin\tauthsvrnc.exe
-REM security tests
-file=ABI_DIR\BUILD_DIR\authsecuritytests.dll	sys\bin\authsecuritytests.dll
-
-ECOM_PLUGIN(testplugins.dll, testplugins.rsc)
-ECOM_PLUGIN(tAuthPlugin.dll, tAuthPlugin.rsc)
-
-data = \epoc32\winscw\c\tauth\tAuthSvr\testdata\AuthSvrPolicy.ini				tauth\tAuthSvr\testdata\AuthSvrPolicy.ini	 attrib=W
-data = \epoc32\winscw\c\tauth\tAuthSvr\testdata\initialisation_Info.ini				tauth\tAuthSvr\testdata\initialisation_Info.ini	 attrib=W		  
-data = \epoc32\winscw\c\tauth\tAuthSvr\scripts\tAuthSvr2.script					tauth\tAuthSvr\scripts\tAuthSvr2.script				  
-data = \epoc32\winscw\c\tauth\tAuthSvr\scripts\tAuthSvr2.ini		                        tauth\tAuthSvr\scripts\tAuthSvr2.ini
-data = \epoc32\winscw\c\tauth\tAuthSvr\scripts\tAuthSvr2_unicode.ini				tauth\tAuthSvr\scripts\tAuthSvr2_unicode.ini
-data = \epoc32\winscw\c\tauth\tAuthSvr\testdata\Pin11113100Db.ini               		tauth\tAuthSvr\testdata\Pin11113100Db.ini        attrib=W
-data = \epoc32\winscw\c\tauth\tAuthSvr\testdata\Pin11113101Db.ini				tauth\tAuthSvr\testdata\Pin11113101Db.ini        attrib=W
-data = \epoc32\winscw\c\tauth\tAuthSvr\testdata\Pin11113102Db.ini				tauth\tAuthSvr\testdata\Pin11113102Db.ini        attrib=W
-data = \epoc32\winscw\c\tauth\tAuthSvr\testdata\Pin11113103Db.ini				tauth\tAuthSvr\testdata\Pin11113103Db.ini        attrib=W
-data = \epoc32\winscw\c\tauth\tAuthSvr\testdata\Pin11113104Db.ini				tauth\tAuthSvr\testdata\Pin11113104Db.ini        attrib=W
-data = \epoc32\winscw\c\tauth\tAuthSvr\testdata\Pin10234100Db.ini				tauth\tAuthSvr\testdata\Pin10234100Db.ini        attrib=W
-data = \epoc32\winscw\c\tauth\tauthcliserv\scripts\tauthcliserv.script		    tauth\tauthcliserv\scripts\tauthcliserv.script		  
-data = \epoc32\winscw\c\tauth\tauthplugins\scripts\tauthplugins.script		    tauth\tauthplugins\scripts\tauthplugins.script		  
-data = \epoc32\winscw\c\tauth\tauthdb\scripts\tauthdb.script				    tauth\tauthdb\scripts\tauthdb.script				  
-data = \epoc32\winscw\c\tauth\tauthexpr\scripts\tauthexpr.script			    tauth\tauthexpr\scripts\tauthexpr.script			  
-data = \epoc32\winscw\c\tauth\tauthkeys\scripts\tauthkeys.script			    tauth\tauthkeys\scripts\tauthkeys.script			  
-data = \epoc32\winscw\c\tauth\tpostmarketplugins\tauthpluginupgrade.rsc			    tauth\tpostmarketplugins\tauthpluginupgrade.rsc
-data = \epoc32\winscw\c\tauth\tpostmarketplugins\tauthpluginupgrade.dll			    tauth\tpostmarketplugins\tauthpluginupgrade.dll
-data = \epoc32\winscw\c\tauth\tpostmarketplugins\tpostmarketramplugin.rsc		    tauth\tpostmarketplugins\tpostmarketramplugin.rsc
-data = \epoc32\winscw\c\tauth\tpostmarketplugins\tpostmarketramplugin.dll		    tauth\tpostmarketplugins\tpostmarketramplugin.dll
-data = \epoc32\winscw\c\tauth\tpostmarketplugins\testpluginsupgrade.rsc			    tauth\tpostmarketplugins\testpluginsupgrade.rsc
-data = \epoc32\winscw\c\tauth\tpostmarketplugins\testpluginsupgrade.dll			    tauth\tpostmarketplugins\testpluginsupgrade.dll
-data = \epoc32\winscw\c\tauth\tAuthSvr\scripts\tpostmarketplugin.script					tauth\tAuthSvr\scripts\tpostmarketplugin.script	
-data = \epoc32\winscw\c\tauth\tAuthSvr\scripts\tpostmarketplugin_macroenabled.script	tauth\tAuthSvr\scripts\tpostmarketplugin_macroenabled.script	
-data = \epoc32\winscw\c\tauth\tAuthSvr\scripts\tpostmarketplugin.ini				    tauth\tAuthSvr\scripts\tpostmarketplugin.ini
-data = \epoc32\winscw\c\tauth\tAuthSvr\scripts\tclientsidsupport.script					tauth\tAuthSvr\scripts\tclientsidsupport.script				  
-data = \epoc32\winscw\c\tauth\tAuthSvr\scripts\tclientsidsupport.ini				    tauth\tAuthSvr\scripts\tclientsidsupport.ini
-data = \epoc32\winscw\c\tauth\tAuthSvr\testdata\pinplugin_inactive.txt				tauth\tAuthSvr\testdata\pinplugin_inactive.txt	attrib=W
-
-data = \epoc32\winscw\c\tauth\securitytests\scripts\authsecuritytests.ini			tauth\securitytests\scripts\authsecuritytests.ini
-data = \epoc32\winscw\c\tauth\securitytests\scripts\authsecuritytests.script			tauth\securitytests\scripts\authsecuritytests.script
-data = \epoc32\winscw\c\tauth\tAuthSvr\scripts\tauthsvr_performance.script			tauth\tAuthSvr\scripts\tauthsvr_performance.script				  
-data = \epoc32\winscw\c\tauth\tAuthSvr\scripts\tauthsvr_performance.ini				tauth\tAuthSvr\scripts\tauthsvr_performance.ini
-data = \epoc32\winscw\c\tauth\tAuthSvr\scripts\performance_log_parser.pl			tauth\tAuthSvr\scripts\performance_log_parser.pl
-data = \epoc32\winscw\c\tauth\tAuthSvr\scripts\tauthsvrclock.script					tauth\tAuthSvr\scripts\tauthsvrclock.script
-
-#endif
--- a/authenticationservices/authenticationserver/inc_private/authrepository.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,88 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Contains system wide default plugin and authentication strength aliases configuration parameters.
-* The strength aliases and it's corresponding authentication expression is specified in the 
-* authserver configuration(central repository) file.Also , defined are the enums corresponding 
-* to authentication expression creation.
-*
-*/
-
-
-/**
- @file 
- @released
- @internalComponent 
-*/
-#ifndef AUTHREPOSITORY_H
-#define AUTHREPOSITORY_H
-
-#include <centralrepository.h>
-#include "authserver/authtypes.h"
-
-namespace AuthServer
-	{
-	
-	/**	 The default system wide plugin key*/
-	const TUint KAuthDefaultPlugin = {0x00000000}; 
-		
-	/**
-		AuthServer repository configuration parameter Enums.
-		These enums are the key Id's for authentication strength aliases and their respective authentication expression defining them.
-	 */
-	
-	enum TAuthStrengthAliasesKeys
-		{
-		EAuthAliasesCount			= 0x00000100,	// Number of authentication aliases.
-		EAuthAliases				= 0x00000200,   // The various authentication aliases like strong, weak, medium, fast etc.
-		EAuthAliasesExpr			= 0x00000300,	// The authentication expressions defining each authentication alias.
-		};
-	
-	/** The UID of the AuthServer repository. */
-	const TUid KUidAuthServerRepository = {0x2001ea7f};  //536996479
-
-	
-/**
- * Provides methods to access information from
- * AuthServer's Central Repository
- */
-
-class CAuthRepository : public CBase
-	{
-	
-public:
-	
-	static CAuthRepository* NewL();
-	
-	static CAuthRepository* NewLC();
-	
-	TPluginId DefaultPluginL() const;
-	
-	void ListAliasL(RPointerArray<HBufC>& aAuthStrengthAliasList);
-	
-	void GetAliasDefinitionL(TInt aKey, TDes16& aValue);
-	
-	~CAuthRepository();
-	
-private:
-	
-	void ConstructL();
-	
-private:
-	CRepository* iRepository;
-	};
-
-
-}
-#endif //AUTHREPOSITORY_H
--- a/authenticationservices/authenticationserver/source/client/asyncresponsedecoder.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,188 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CAsyncResponseDecoder - Auth Client helper class
-*
-*/
-
-
-/**
- @file 
-*/
-
-#include <e32debug.h>
-#include <s32mem.h>
-#include "authclient_impl.h"
-
-using namespace AuthServer;
-
-namespace AuthServer
-{
-HBufC8* ExternalizeExpressionL(const CAuthExpression* aExpr);
-
-enum {  EPanicBadCmd = 1 };
-
-_LIT(KAsyncDecoderBusy, "AuthClient busy");
-
-}
-
-CAsyncResponseDecoder::CAsyncResponseDecoder(const RAuthClient& aSession) :
-	CActive(EPriorityStandard), iSession(aSession), 
-	iBufDes(0,0), iParamsPtr(0,0)
-    {
-	CActiveScheduler::Add(this);
-	}
-
-CAsyncResponseDecoder::~CAsyncResponseDecoder()
-    {
-    Cleanup();
-    }
-
-
-void CAsyncResponseDecoder::AuthenticateL(
-						   const CAuthExpression& aExpression,
-						   TTimeIntervalSeconds   aTimeout,
-						   TBool                  aClientSpecificKey,
-						   TUid 				  aClientSid,
-						   TBool                  aWithString,
-						   const TDesC& 		  aClientMessage,
-						   CIdentity*&            aIdentityResult, 
-						   TRequestStatus&        aClientStatus)
-	{
-	__ASSERT_ALWAYS(!IsActive(), User::Panic(AuthServer::KAsyncDecoderBusy, 0));
-	
-	iExpression       	     = &aExpression;
-	iResult            	     = &aIdentityResult;
-	iClientStatus            = &aClientStatus;
-	
-	//Create a flat buffer.
-  	CBufFlat* flatBuffer = CBufFlat::NewL(KDefaultBufferSize);
-  	CleanupStack::PushL(flatBuffer);
-  	
-  	//Initialize the CAuthParams object.
-  	CAuthParams* params = CAuthParams::NewL(aTimeout,
-  											aClientSpecificKey,
-											aClientSid,
-  											aWithString,
-  											aClientMessage);
-  	CleanupStack::PushL(params);
-  	
-  	//Externalize params.
-  	RBufWriteStream stream(*flatBuffer);
-  	CleanupClosePushL(stream);
-  	params->ExternalizeL(stream);
-  	CleanupStack::PopAndDestroy(2, params);
-  		
-  	iParamsBuffer = HBufC8::NewL(flatBuffer->Size());
-  	iParamsPtr.Set(iParamsBuffer->Des());
-  	flatBuffer->Read(0, iParamsPtr, flatBuffer->Size());
-  	CleanupStack::PopAndDestroy(flatBuffer);
-  
-	//Externalize the expression.
-  	iExprBuf = ExternalizeExpressionL(iExpression);
-  
-	// allocate buffer for identity result.
-	iBuffer = HBufC8::NewL(KDefaultBufferSize);
-	iBufDes.Set(iBuffer->Des());
-  
-	iArgs = new (ELeave)TIpcArgs(iExprBuf,
-								 &iParamsPtr,
-								 &iBufDes); 
-	StartCall(EAuthenticate);
-	}
-void CAsyncResponseDecoder::RegisterIdentityL(CIdentity*& aIdentity,
-											 const TDesC& aDescription,  
-											 TRequestStatus& aClientStatus)
-	{
-	__ASSERT_ALWAYS(!IsActive(), User::Panic(KAsyncDecoderBusy, 0));
-	
-	iBuffer = HBufC8::NewL(KDefaultBufferSize);
-	iBufDes.Set(iBuffer->Des());
-	iResult = &aIdentity;
-	iDescription = HBufC::NewL(aDescription.Size());
-	*iDescription = aDescription;
-	iClientStatus = &aClientStatus;
-	iArgs = new (ELeave)TIpcArgs(&iBufDes, iDescription);
-  
-	StartCall(ERegisterIdentity);
-	}
-
-void CAsyncResponseDecoder::StartCall(TAuthServerMessages aCmd)
-	{
-	iCmd = aCmd;
-	iStatus = KRequestPending;
-	*iClientStatus = KRequestPending;
-	SetActive();
-	iSession.CallSessionFunction(iCmd, *iArgs, iStatus);
-	}
-
-void CAsyncResponseDecoder::RunL() 
-	{
-	if (iStatus.Int() == KErrNone)
-		{
-		RDesReadStream readStream(*iBuffer);
-		switch (iCmd)
-			{
-			case EAuthenticate:
-				*iResult = CIdentity::InternalizeL(readStream);
-				break;
-			case ERegisterIdentity:
-				*iResult = CIdentity::InternalizeL(readStream);
-				break;
-			default:
-				User::Panic(_L("AuthClient-AsyncResponseDecoder"),
-							EPanicBadCmd);
-			}
-		}
-	User::RequestComplete(iClientStatus,iStatus.Int());
-	Cleanup();
-	}
-
-TInt CAsyncResponseDecoder::RunError(TInt aError)
-	{	
-	User::RequestComplete(iClientStatus, aError);
-	Cleanup();    			
-	return KErrNone;
-	
-	}
-
-void CAsyncResponseDecoder::DoCancel()
-	{
-	switch (iCmd)
-		{
-		case EAuthenticate:
-		case ERegisterIdentity:
-			User::RequestComplete(iClientStatus, KErrCancel);
-			break;
-		default:
-		    break;
-		}
-	Cleanup();
-    }
-
-void CAsyncResponseDecoder::Cleanup()
-    {
-	delete iArgs;
-	iArgs = 0;
-	delete iExprBuf;
-	iExprBuf = 0;
-	delete iBuffer;
-	iBuffer = 0;
-    delete iDescription;
-    iDescription = 0;
-    delete iParamsBuffer;
-    iParamsBuffer = 0;
-	iCmd = ELastService;
-	iClientStatus = 0;
-    }
--- a/authenticationservices/authenticationserver/source/client/asyncresponsedecoder.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,88 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CAsyncResponseDecoder - Auth Client helper class
-*
-*/
-
-
-/**
- @file 
- @released
- @internalComponent
-*/
-#ifndef ASYNCRESPONSEDECODER_H
-#define ASYNCRESPONSEDECODER_H
-namespace AuthServer
-{
-
-/** 
- * This AO handles the return buffers from asynchronous RAuthClient /
- * RAuthMgrClient calls and reconstructs the object from the stream returned,
- * completing the caller when finished.
- **/
-class CAsyncResponseDecoder : public CActive
-	{
-public:
-  
-	CAsyncResponseDecoder(const RAuthClient& aSession);
-	~CAsyncResponseDecoder();
-	
-	/**
-	 * Initiate the authenticate method
-	 */
-		
-	void AuthenticateL(const CAuthExpression& aExpression,
-						   TTimeIntervalSeconds   aTimeout,
-						   TBool                  aClientSpecificKey,
-						   TUid 				  aClientSid,
-						   TBool                  aWithString,
-						   const TDesC& 		  aClientMessage,
-						   CIdentity*&            aIdentityResult, 
-						   TRequestStatus&        aClientStatus);
-	
-	/**
-	 * Initiate the register identity method
-	 */
-	void RegisterIdentityL(CIdentity*& aIdentity,
-						  const TDesC& aDescription,  
-						  TRequestStatus& aRequest);
-	/**
-	 * common code to send the request and kickoff the active object
-	 **/
-	void StartCall(TAuthServerMessages aCmd);
-  
-	void RunL();
-
-	void DoCancel();
-  
-private:
-	void Cleanup();
-	TInt RunError(TInt aError);
-	
-	const RAuthClient&     		iSession;
-	const CAuthExpression* 		iExpression;
-	CIdentity**            		iResult;
-	HBufC8*                		iBuffer;
-	HBufC8*						iParamsBuffer;
-	TPtr8                  		iBufDes;
-	TPtr8                  		iParamsPtr;
-	TRequestStatus*        		iClientStatus;
-	TIpcArgs*              		iArgs;
-	HBufC8*                		iExprBuf;
-	HBufC*                		iDescription;
-	TAuthServerMessages         iCmd;
-};
-}
-#endif // ASYNCRESPONSEDECODER_H
--- a/authenticationservices/authenticationserver/source/client/authclient.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,774 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* authclient - exported authentication client session  implementation
-*
-*/
-
-
-/**
- @file 
-*/
-
-#include <e32debug.h>
-#include <s32mem.h>
-#include "authclient_impl.h"
-#include "authrepository.h"
-
-namespace AuthServer
-{
-
-/**
-	Helper function for Authenticate.  This allocates
-	a buffer to hold the externalized authentication expression.
-	
-	@param	aExpr			Expression to externalize.
-	@return					Descriptor containing externalized expression.
-							The memory must be freed by the caller.
- */
-HBufC8* ExternalizeExpressionL(const CAuthExpression* aExpr)
-	{
-	AuthServer::TSizeStream ss;
-	RWriteStream ws(&ss);
-	aExpr->ExternalizeL(ws);
-	
-	TInt len = ss.Size();
-	HBufC8* buf = HBufC8::NewLC(len);
-	TPtr8 bufDes(buf->Des());
-	
-	RDesWriteStream dws(bufDes);
-	aExpr->ExternalizeL(dws);
-	dws.CommitL();
-		
-	CleanupStack::Pop(buf);
-	return buf;
-	}
-}
-
-using namespace AuthServer;
-
-
-/**
- * Connect to the server, attempt to start it if it is not yet running
- *
- * @return KErrNone if successful or an error code
- */
-EXPORT_C TInt RAuthClient::Connect()
-	{
-	const TUidType serverUid(KNullUid, KNullUid, KAuthServerSecureId);
-
-	TInt err = RScsClientBase::Connect(AuthServer::KAuthServerName, TVersion(1, 0, 0), 
-									   AuthServer::KAuthServerImg, serverUid );
-	return err;
-	}
-
-EXPORT_C RAuthClient::RAuthClient() : 
-	RScsClientBase(), iAsyncResponseDecoder(0)
-    {
-	
-    }
-    
- 
-    
-/**
-  Authenticate the current device holder using a specified combination of
-  authentication methods. The ownership of the heap allocated CIdentity
-  object is passed to the caller. Requesting a user specific key
-  requires ReadUserData capability.
- 
-  @capability None/ReadUserData
- 
-  @param aExpression An authentication expression specifying which 
-  combination of methods to use to authenticate the device holder.
- 
-  @param aTimeout If an authentication has previously been performed 
-  within this period then a cached identity is returned.
- 
-  @param aClientSpecificKey If this value is true then the key returned
-  by this server will be unique to the calling client. This is achieved
-  by combining the identity protection key with the client process UID.
-  If this value is set to false then the call requires ReadUserData.
- 
-  @param aWithString If this value is true then the identity object returned
-  by the server will contain the identities string. If this value is set to
-  true then the call requires ReadUserData.
- 
-  @return CIdentity object corresponding to the authenticated device
-  holder. It is possible for the identity to be 'unknown'.
-  
-  @leave KErrServerTerminated, if the server no longer present
-  @leave KErrServerBusy, if the request cannot be handled at this time. 
-  @leave KErrNoMemory, if there is insufficient memory available.
-  @leave KErrPermissionDenied, if the caller has insufficient capabilities.
-  @leave ...			One of the AuthServer error codes defined in 
-  						auth_srv_errs.h or one of the system-wide error codes.
- **/
-EXPORT_C CIdentity* RAuthClient::AuthenticateL(
-	const CAuthExpression& aExpression,
-	TTimeIntervalSeconds   aTimeout,
-	TBool                  aClientSpecificKey,
-	TBool                  aWithString)
-	{
-	TUid clientSid = {0};
-		
-	CIdentity* identity = AuthenticateL(aExpression, aTimeout,
-										aClientSpecificKey, clientSid, 
-										aWithString, KNullDesC());
-		
-	return identity;
-	
-    }
-
-    
-
-/**
-  Authenticate the current device holder using a specified combination of
-  authentication methods. The ownership of the heap allocated CIdentity
-  object is passed to the caller. Requesting a user specific key
-  requires ReadUserData capability.
- 
-  @capability None/ReadUserData
- 
-  @param aExpression An authentication expression specifying which 
-  combination of methods to use to authenticate the device holder.
- 
-  @param aTimeout If an authentication has previously been performed 
-  within this period then a cached identity is returned.
- 
-  @param aClientSpecificKey If this value is true then the key returned
-  by this server will be unique to the calling client. This is achieved
-  by combining the identity protection key with the client process UID.
-  If this value is set to false then the call requires ReadUserData.
- 
-  @param aWithString If this value is true then the identity object returned
-  by the server will contain the identities string. If this value is set to
-  true then the call requires ReadUserData.
- 
-  @param aIdentityResult The returned identity will be placed in this
-  parameter when the asynchronous request completes.  
- 
-  @param aStatus The request status for this asynchronous request.
- 
-  @leave KErrServerTerminated, if the server no longer present
-  @leave KErrServerBusy, if the request cannot be handled at this time. 
-  @leave KErrNoMemory, if there is insufficient memory available.
-  @leave KErrPermissionDenied, if the caller has insufficient capabilities.
-  @leave ...			One of the AuthServer error codes defined in 
-  						auth_srv_errs.h or one of the system-wide error codes.
-
- **/
-EXPORT_C void RAuthClient::AuthenticateL(
-	const CAuthExpression& 	aExpression,
-	TTimeIntervalSeconds   	aTimeout,
-	TBool                  	aClientSpecificKey,
-	TBool                  	aWithString, 
-	CIdentity*&            	aIdentityResult, 
-	TRequestStatus&        	aStatus)
-	{
-	TUid clientSid = {0};
-	AuthenticateL(aExpression, aTimeout, aClientSpecificKey,
-				  clientSid, aWithString, KNullDesC(),
-			      aIdentityResult, aStatus);	
-	
-	}
-
-
-/**
-   Authenticate the current device holder using a specified combination of
-  authentication methods. The ownership of the heap allocated CIdentity 
-  object is passed to the caller. Requesting a user specific key requires 
-  ReadUserData capability.
- 
-   @capability None/ReadUserData
- 
-   @param aAuthStrength Descriptor specifying the authentication strength, 
-   which inturn maps to a combination of methods to be used to authenticate 
-   the device holder.
- 
-   @param aTimeout If an authentication has previously been performed 
-   within this period then a cached identity is returned.
- 
-   @param aClientSpecificKey If this value is true then the key returned
-   by this server will be unique to the calling client. This is achieved
-   by combining the identity protection key with the client process UID.
-   If this value is set to false then the call requires ReadUserData.
-          
-   @param aClientSid Sid of the client application from where the authentication
-   request originated and is used to generate protection key.This value is ignored 
-   when aClientSpecificKey is set to false. If aClientSid is non-zero and is not 
-   the calling application's sid, then the call requires ReadUserData.
-  
-   @param aWithString If this value is true then the identity object returned
-   by the server will contain the identities string. If this value is set to
-   true then the call requires ReadUserData.
- 
-   @param aClientMessage A displayable text string parameter for authentication
-   requests.It shall be passed to plug-ins to display to the users.
-
-   @return the CIdentity object corresponding to the authenticated device
-   holder. It is possible for the identity to be 'unknown'.
-  
-   @leave KErrServerTerminated, if the server no longer present
-   @leave KErrServerBusy, if the request cannot be handled at this time. 
-   @leave KErrNoMemory, if there is insufficient memory available.
-   @leave KErrPermissionDenied, if the caller has insufficient capabilities.
-   @leave ...			One of the AuthServer error codes defined in 
-  						auth_srv_errs.h or one of the system-wide error codes.
-
- **/	
-
-EXPORT_C CIdentity* RAuthClient::AuthenticateL(
-		const CAuthExpression& aAuthExpression,
-	    TTimeIntervalSeconds   aTimeout,
-		TBool                  aClientSpecificKey,
-		TUid 				   aClientSid,
-		TBool                  aWithString,
-		const TDesC&		   aClientMessage)
-	{
-	
-	//Create a flat buffer
-	CBufFlat* flatBuffer = CBufFlat::NewL(KDefaultBufferSize);
-	CleanupStack::PushL(flatBuffer);
-	
-	//Initialize the CAuthParams object
-	CAuthParams* params = CAuthParams::NewL(aTimeout,
-											aClientSpecificKey,
-											aClientSid,
-											aWithString,
-											aClientMessage);
-	CleanupStack::PushL(params);
-	//Externalize params
-	RBufWriteStream stream(*flatBuffer);
-	CleanupClosePushL(stream);
-	params->ExternalizeL(stream);
-	CleanupStack::PopAndDestroy(2, params);
-	
-	HBufC8* paramsBuffer = HBufC8::NewLC(flatBuffer->Size());
-	TPtr8 paramsPtr(paramsBuffer->Des());
-	flatBuffer->Read(0, paramsPtr, flatBuffer->Size());
-		
-	//Externalize the expression
-	HBufC8* exprBuf = ExternalizeExpressionL(&aAuthExpression);
-	CleanupStack::PushL(exprBuf);
-		
-	// allocate buffer for identity result
-	HBufC8* identityResultbuf = HBufC8::NewLC(KDefaultBufferSize);
-	TPtr8 bufDes(identityResultbuf->Des());
-		
-	TIpcArgs args(exprBuf, &paramsPtr, &bufDes); 
-	User::LeaveIfError(CallSessionFunction(EAuthenticate, args));
-		
-
-		
-	RDesReadStream readStream(*identityResultbuf);
-	CIdentity* identity = CIdentity::InternalizeL(readStream);
-	    
-	CleanupStack::PopAndDestroy(4,flatBuffer);//identityResultbuf, exprBuf,
-											  //paramsBuffer, flatBuffer	
-	return identity;
-	}
-
-/**
-  Authenticate the current device holder using a specified combination of
-  authentication methods. The ownership of the heap allocated CIdentity 
-  object is passed to the caller. Requesting a user specific key requires 
-  ReadUserData capability.
- 
-  @capability None/ReadUserData
- 
-  @param aAuthStrength	Descriptor specifying the authentication strength, 
-  which inturn maps to a combination of methods to be used to authenticate the device holder.
- 
-  @param aTimeout If an authentication has previously been performed 
-  within this period then a cached identity is returned.
- 
-  @param aClientSpecificKey If this value is true then the key returned
-  by this server will be unique to the calling client. This is achieved
-  by combining the identity protection key with the client process UID.
-  If this value is set to false then the call requires ReadUserData.
-  
-  @param aClientSid Sid of the client application from where the authentication
-  request originated and is used to generate protection key.This value is ignored 
-  when aClientSpecificKey is set to false. If aClientSid is non-zero and is not 
-  the calling application's sid, then the call requires ReadUserData.
- 
-  @param aWithString If this value is true then the identity object returned
-  by the server will contain the identities string. If this value is set to
-  true then the call requires ReadUserData.
- 
-  @param aClientMessage A displayable text string parameter for authentication
-  requests.It shall be passed to plug-ins to display to the users.
-   
-  @param aIdentityResult The returned identity will be placed in this
-  parameter when the asynchronous request completes.  
- 
-  @param aStatus The request status for this asynchronous request.
- 
-  @leave KErrServerTerminated, if the server no longer present
-  @leave KErrServerBusy, if the request cannot be handled at this time. 
-  @leave KErrNoMemory, if there is insufficient memory available.
-  @leave KErrPermissionDenied, if the caller has insufficient capabilities.
-  @leave ...			One of the AuthServer error codes defined in 
-  						auth_srv_errs.h or one of the system-wide error codes.
-
- **/
- 	
-EXPORT_C void RAuthClient::AuthenticateL(
-	const CAuthExpression& aExpression,
-	TTimeIntervalSeconds   aTimeout,
-	TBool                  aClientSpecificKey,
-	TUid 				   aClientSid,	
-	TBool                  aWithString, 
-	const TDesC&		   aClientMessage,
-	CIdentity*&            aIdentityResult,
-	TRequestStatus&        aStatus
-	)
-	{
-	
-	CheckAsyncDecoderL();
-	iAsyncResponseDecoder->AuthenticateL(aExpression,
-										 aTimeout,
-										 aClientSpecificKey,
-										 aClientSid,
-										 aWithString,
-										 aClientMessage,
-										 aIdentityResult,
-										 aStatus);
-										 
-	
-	}
-
-/**
- * creates the async decoder if it's not already been created. 
- */
-void RAuthClient::CheckAsyncDecoderL()
-    {
-    if (iAsyncResponseDecoder == 0)
-	    {
-	    iAsyncResponseDecoder = new (ELeave) CAsyncResponseDecoder(*this);
-	    }
-    }
-    
-	    
-
-
-/**
- * Retrieves all plugin descriptions. 
- *
- * @param aPluginList will be filled with  the full list of plugins available on the device. 
- *
- * @leave KErrServerTerminated, if the server no longer present
- * @leave KErrServerBusy, if the request cannot be handled at this time. 
- * @leave KErrNoMemory, if there is insufficient memory available.
- **/
-EXPORT_C void RAuthClient::PluginsL(RPluginDescriptions& aPluginList)
-    {
-	HBufC8* buffer = SendReceiveBufferLC(EPlugins);
-	// create a stream based on the buffer
-	RDesReadStream stream(*buffer);
-	CleanupClosePushL(stream);
-	
-	// reassemble the array from the stream
-	InternalizePointerArrayL(aPluginList, stream);
-	
-	CleanupStack::PopAndDestroy(2, buffer);// buffer, stream
-    }
-	
-/**
- * @param aPluginList the list of active plugins available on the device. 
- *
- * @leave KErrServerTerminated, if the server no longer present
- * @leave KErrServerBusy, if the request cannot be handled at this time. 
- * @leave KErrNoMemory, if there is insufficient memory available.
- **/
-EXPORT_C void RAuthClient::ActivePluginsL(RPluginDescriptions& aPluginList)
-    {
- 	HBufC8* buffer = SendReceiveBufferLC(EActivePlugins);
-	// create a stream based on the buffer
-	RDesReadStream stream(*buffer);
-	CleanupClosePushL(stream);
-	
-	// reassemble the array from the stream
-	InternalizePointerArrayL(aPluginList, stream);
-	
-	CleanupStack::PopAndDestroy(2, buffer);// buffer, stream
-	}
-	
-/**
- *
- * Retrieves plugin descriptions for plugins matching the specified
- * type.
- *
- * @param aType the plugin type for which the method should return 
- * the list of plugins. 
- *
- * @param aPluginList the list of plugins with the specified type available
- * on the device. 
- *
- * @leave KErrServerTerminated, if the server no longer present
- * @leave KErrServerBusy, if the request cannot be handled at this time. 
- * @leave KErrNoMemory, if there is insufficient memory available.
- *
- * @see TAuthPluginType
- **/
-EXPORT_C void RAuthClient::PluginsOfTypeL(
-    TAuthPluginType aType,
-    RPluginDescriptions& aPluginList)
-    {
-	TIpcArgs args(TIpcArgs::ENothing, aType);
-	HBufC8* buffer = SendReceiveBufferLC(EPluginsByType, args);
-	// create a stream based on the buffer
-	RDesReadStream stream(*buffer);
-	CleanupClosePushL(stream);
-	
-	// reassemble the array from the stream
-	InternalizePointerArrayL(aPluginList, stream);
-	
-	CleanupStack::PopAndDestroy(2, buffer);// buffer, stream
-    }
-	
-/**
- * Retrieves plugin descriptions for plugins matching the specified
- * training status.
- *
- * @param aStatus the training status for which the method should 
- * return the list of plugins. 
- *
- * @param aPluginList the list of plugins with the specified type available
- * on the device.
- *
- * @leave KErrServerTerminated, if the server no longer present
- * @leave KErrServerBusy, if the request cannot be handled at this time. 
- * @leave KErrNoMemory, if there is insufficient memory available.
- *
- * @see TAuthTrainingStatus
- **/
-EXPORT_C void RAuthClient::PluginsWithTrainingStatusL(
-    TAuthTrainingStatus aStatus,
-    RPluginDescriptions& aPluginList)
-    {
-	TIpcArgs args(TIpcArgs::ENothing, aStatus);
-	HBufC8* buffer = SendReceiveBufferLC(EPluginsByTraining, args);
-	// create a stream based on the buffer
-	RDesReadStream stream(*buffer);
-	CleanupClosePushL(stream);
-	
-	// reassemble the array from the stream
-	InternalizePointerArrayL(aPluginList, stream);
-	
-	CleanupStack::PopAndDestroy(2, buffer);// buffer, stream
-    }
-	
-/**
- * @param aIdList populated with the list of identities known by the 
- * phone.
- *
- * @capability ReadDeviceData
- *
- * @leave KErrServerTerminated, if the server no longer present
- * @leave KErrServerBusy, if the request cannot be handled at this time. 
- * @leave KErrNoMemory, if there is insufficient memory available.
- * @leave KErrPermissionDenied, if the caller has insufficient capabilities.
- **/
-EXPORT_C void RAuthClient::IdentitiesL(RIdentityIdArray& aIdList)
-    {
-	HBufC8* buffer = SendReceiveBufferLC(EIdentities);
-	// create a stream based on the buffer
-	RDesReadStream stream(*buffer);
-	CleanupClosePushL(stream);
-	
-	// reassemble the array from the stream
-	InternalizeArrayL(aIdList, stream);
-	
-	CleanupStack::PopAndDestroy(2, buffer);// buffer, stream
-    }
-
-/**
- * @param aIdList populated with the list of identities and their strings
- * known by the phone.
- *
- * @capability ReadDeviceData
- * @capability ReadUserData
- *
- * @leave KErrServerTerminated, if the server no longer present
- * @leave KErrServerBusy, if the request cannot be handled at this time. 
- * @leave KErrNoMemory, if there is insufficient memory available.
- * @leave KErrPermissionDenied, if the caller has insufficient capabilities.
- **/
-EXPORT_C void RAuthClient::IdentitiesWithStringL(RIdAndStringArray& aIdList)
-    {
-	HBufC8* buffer = SendReceiveBufferLC(EIdentitiesWithString);
-	// create a stream based on the buffer
-	RDesReadStream stream(*buffer);
-	CleanupClosePushL(stream);
-	
-	// reassemble the array from the stream
-	InternalizePointerArrayL(aIdList, stream);
-	
-	CleanupStack::PopAndDestroy(2, buffer);// buffer, stream
-    }
-
-/**
- * @param aId the Id number of the identity for which to set the
- * string.
- *
- * @param aId the identity who's string to set.
- * @param aString the string to use
- *
- * @capability WriteUserData
- *
- * @leave KErrServerTerminated, if the server no longer present
- * @leave KErrServerBusy, if the request cannot be handled at this time. 
- * @leave KErrNoMemory, if there is insufficient memory available.
- * @leave KErrPermissionDenied, if the caller has insufficient capabilities.
- * @leave KErrAuthServIdentityNotFound, if the id does not exist.
- **/
-EXPORT_C void RAuthClient::SetIdentityStringL(TIdentityId aId,
-											  const TDesC& aString)
-  {
-  TIpcArgs args(aId, &aString);
-
-  User::LeaveIfError(CallSessionFunction(ESetIdentityString, args));
-  }
-
-/**
- * Deauthenticates the current user. This means that clients requesting an
- * authentication will always cause a plug-in to be called regardless of
- * any timeout value specified.
- *
- * @leave KErrServerTerminated, if the server no longer present
- * @leave KErrServerBusy, if the request cannot be handled at this time. 
- * @leave KErrNoMemory, if there is insufficient memory available.
- *
- **/
-EXPORT_C void RAuthClient::DeauthenticateL()
-  {
-  User::LeaveIfError(CallSessionFunction(EDeauthenticate));
-  }
-
-/**
- * @param aId the Id number of the identity for which to return the
- * string.
- * 
- * @return the string associated with the specified identity.
- *
- * @capability ReadUserData
- *
- * @leave KErrServerTerminated, if the server no longer present
- * @leave KErrServerBusy, if the request cannot be handled at this time. 
- * @leave KErrNoMemory, if there is insufficient memory available.
- * @leave KErrPermissionDenied, if the caller has insufficient capabilities.
- * @leave KErrAuthServIdentityNotFound, if the id does not exist.
- **/
-EXPORT_C HBufC* RAuthClient::IdentityStringL(TIdentityId aId)
-    {
-    HBufC* buffer = HBufC::NewLC(KDefaultBufferSize);
-	TPtr ptr = buffer->Des();
-	User::LeaveIfError(CallSessionFunction(EIdentityString, TIpcArgs(&ptr, aId)));
-	CleanupStack::Pop(buffer);
-	return buffer;
-    }
-
-
-/**
- */
-HBufC8* RAuthClient::SendReceiveBufferLC(TInt aMessage) 
-	{
-	HBufC8* output = HBufC8::NewLC(KDefaultBufferSize);
-	
-	TPtr8 pOutput(output->Des());
-	
-	TInt result = CallSessionFunction(aMessage, TIpcArgs(&pOutput));
-	
-	if (result == KErrOverflow)
-		{
-		TInt sizeNeeded = 0;
-		TPckg<TInt> sizeNeededPackage(sizeNeeded);
-		sizeNeededPackage.Copy(*output);
-		
-		// Re-allocate buffer after reclaiming memory
-		CleanupStack::PopAndDestroy(output);
-		output = HBufC8::NewLC(sizeNeeded);
-
-		TPtr8 pResizedOutput(output->Des());
-		
-		result=CallSessionFunction(aMessage, TIpcArgs(&pResizedOutput));
-		}
-	User::LeaveIfError(result);
-	return output;
-	}
-
-/**
- * aArgs[0] is set to the buffer to be sent/received
- */
-HBufC8* RAuthClient::SendReceiveBufferLC(
-	TInt aMessage,
-	TIpcArgs& aArgs) 
-	{
-	HBufC8* output = HBufC8::NewLC(KDefaultBufferSize);
-	
-	TPtr8 pOutput(output->Des());
-
-	aArgs.Set(0, &pOutput);
-		  
-	TInt result = CallSessionFunction(aMessage, aArgs);
-	
-	if (result == KErrOverflow)
-		{
-		TInt sizeNeeded;
-		TPckg<TInt> sizeNeededPackage(sizeNeeded);
-		sizeNeededPackage.Copy(*output);
-		
-		// Re-allocate buffer
-		CleanupStack::PopAndDestroy(output);
-		output = HBufC8::NewLC(sizeNeeded);
-
-		TPtr8 pResizedOutput(output->Des());
-		aArgs.Set(0, &pResizedOutput);
-		result=CallSessionFunction(aMessage, aArgs);
-		}
-	User::LeaveIfError(result);
-	return output;
-	}
-
-/**
- * @param aPluginType the type of plugin for which to return the preferred
- * plugin id
- * 
- * @return the id of the preferred plugin for the specified type
- *
- * @leave KErrServerTerminated, if the server no longer present
- * @leave KErrServerBusy, if the request cannot be handled at this time. 
- * @leave KErrNoMemory, if there is insufficient memory available.
- * @leave KErrPermissionDenied, if the caller has insufficient capabilities.
- **/
-EXPORT_C TPluginId RAuthClient::PreferredTypePluginL(TAuthPluginType aPluginType)
-	{
-	TPluginId id = KUnknownPluginId;
-	TPckg<TPluginId> idPckg(id);
-	
-	User::LeaveIfError(CallSessionFunction(EGetAuthPreferences, TIpcArgs(aPluginType, &idPckg)));
-
-	return id;
-	}
-	
-/**
- * Cancel any operation in progress.
- * 
- * @return KErrNone, if the send operation is successful or no operation
- * is in effect.
- * @return KErrServerTerminated, if the server no longer present
- * @return KErrServerBusy, if the request cannot be handled at this time. 
- * @return KErrNoMemory, if there is insufficient memory available.
- **/
-EXPORT_C TUint RAuthClient::Cancel()
-    {
-    CallSessionFunction(ECancel);
-    if(iAsyncResponseDecoder)
-    	{
-    	iAsyncResponseDecoder->Cancel();
-    	}
-    
-    return KErrNone;
-	}
-	
-
-EXPORT_C void RAuthClient::Close()
-    {
-    delete iAsyncResponseDecoder;
-    iAsyncResponseDecoder = 0;
-     
-    RScsClientBase::Close();
-    }
-
-/**
-  Lists the authentication aliases.
-  
-  @return An array of authentication strength aliases.
- 
-  @leave KErrServerTerminated, if the server no longer present
-  @leave KErrServerBusy, if the request cannot be handled at this time. 
-  @leave KErrNoMemory, if there is insufficient memory available.
-  @leave KErrPermissionDenied, if the caller has insufficient capabilities.
- **/
- 
-EXPORT_C void RAuthClient::ListAuthAliasesL(RPointerArray<HBufC>& aAuthAliasesList)
-    {
-	HBufC8* buffer = SendReceiveBufferLC(EListAuthAliases);
-	
-	// create a stream based on the buffer
-	RDesReadStream stream(*buffer);
-	CleanupClosePushL(stream);
-	
-	// reassemble the array from the stream
-	TInt strengthAliasCount = stream.ReadInt32L();
-	for(TInt i = 0; i < strengthAliasCount; ++i)
-		{
-		HBufC* strengthAlias = HBufC::NewLC(stream, KMaxTInt);
-		aAuthAliasesList.AppendL(strengthAlias);
-		CleanupStack::Pop(strengthAlias);
-		}
-	
-	CleanupStack::PopAndDestroy(2, buffer);// buffer, stream
-    }
-
-/**
-   Returns a CAuthExpression object from a free form expression
-   which can be a combination of plugin Ids, plugin types and alias names.
-   This can be used for calling the authentication APIs.
-   
- 
-   @capability None
- 
-   @param aAuthString Descriptor specifying a free form expression
-   which can be a combination of plugin Ids, plugin types and alias names.
-   
- 
-   @return the CAuthExpression object which can be used to call the 
-   authentication APIs.
-  
-   @leave KErrServerTerminated, if the server no longer present
-   @leave KErrServerBusy, if the request cannot be handled at this time. 
-   @leave KErrNoMemory, if there is insufficient memory available.
-   @leave KErrPermissionDenied, if the caller has insufficient capabilities.
-   @leave ...			One of the AuthServer error codes defined in 
-  						auth_srv_errs.h or one of the system-wide error codes.
-
- **/	
-
-EXPORT_C CAuthExpression* RAuthClient::CreateAuthExpressionL(const TDesC& aAuthString) const
-	{
-	CAuthExpression* authExpr(0);
-	
-	if(aAuthString == KNullDesC)
-		{
-		authExpr = AuthExpr();
-		return authExpr;
-		}
-	HBufC* buffer = HBufC::NewLC(KDefaultBufferSize);
-	TPtr bufDes(buffer->Des());
-		
-	// get the string in combination of plugin ID and plugin type.
-	User::LeaveIfError(CallSessionFunction(EResolveExpression, TIpcArgs(&bufDes, &aAuthString)));
-		
-	// create an auth expression from alias string.
-	authExpr = CAuthExpressionImpl::CreateAuthExprObjectL(*buffer);
-	CleanupStack::PopAndDestroy(buffer);
-	
-	return authExpr;
-	}
-
- 
-
-   
--- a/authenticationservices/authenticationserver/source/client/authclient_impl.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,38 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* This header file includes all header files which are
-* required to build the authserver client DLL.
-*
-*/
-
-
-/**
- @file 
- @internalTechnology 
-*/
-
-#ifndef AUTHCLIENT_IMPL_H
-#define AUTHCLIENT_IMPL_H
-
-#include "authserver_client.h"
-
-#include "authcommon_impl.h"
-
-#include "authserveripc.h"
-#include "arrayutils.h"
-#include "asyncresponsedecoder.h"
-
-#endif	// #ifndef AUTHCLIENT_IMPL_H
-
--- a/authenticationservices/authenticationserver/source/client/authmgrclient.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,276 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* authmgrclient - exported authentication client session  implementation
-*
-*/
-
-
-/**
- @file 
-*/
-
-#include "authclient_impl.h"
-#include "authserverutil.h"
-
-using namespace AuthServer;
-
-/**
- * Register a new identity. This causes the server to create a new
- * identity and attempt to train the user with all available active
- * plugins. At least one plugin must be trained for this to be succesful.
- *
- * @param aIdentity The new heap allocated identity details will be
- * pointed at by this parameter upon successful completion.
- *
- * @param aDescription The identity's description text.
- *
- * @param aRequest This status object will be completed when this
- * asynchronous call finishes, the return values are described below. 
- *
- * @capability TrustedUI
- *
- * @return KErrServerTerminated, if the server no longer present
- * @return KErrServerBusy, if the request cannot be handled at this time. 
- * @return KErrNoMemory, if there is insufficient memory available.
- * @return KErrPermissionDenied, if the caller has insufficient capabilities.
- * @return KErrAuthServRegistrationFailed, if the all plugins failed to
- * successfully train for the identity.
- **/
-EXPORT_C void RAuthMgrClient::RegisterIdentityL(
-    CIdentity*& aIdentity,
-	const TDesC& aDescription,  
-    TRequestStatus& aRequest)
-    {
-    CheckAsyncDecoderL();
-	iAsyncResponseDecoder->RegisterIdentityL(aIdentity, aDescription, aRequest);
-    }
-
-/** 
- * Remove an identity.
- *
- * @param aId The identity to remove.
- *
- * @capability WriteDeviceData
- *
- * @leave KErrServerTerminated, if the server no longer present
- * @leave KErrServerBusy, if the request cannot be handled at this time. 
- * @leave KErrNoMemory, if there is insufficient memory available.
- * @leave KErrPermissionDenied, if the caller has insufficient capabilities.
- * @leave KErrAuthServIdentityNotFound, if the id does not exist.
- **/
-EXPORT_C void RAuthMgrClient::RemoveIdentityL(
-    TIdentityId aId)
-    {
-	User::LeaveIfError(CallSessionFunction(ERemoveIdentity, TIpcArgs(aId)));
-    }
-
-/**
- * Train an authentication plugin for the specified identity. The identity
- * to be trained must be authenticated prior to training. This is
- * necessary for the AuthServer to decrypt the protection key prior to
- * encrypting it with the new key generated through training.
- *
- * @param aId The identity for whom to train the plugin.
- *
- * @param aPlugin The id of the plugin to train.
- *
- * @param aRequest This status object will be completed when this
- * asynchronous call finishes.
- *
- * @capability WriteUserData
- *
- * @return KErrServerTerminated, if the server no longer present
- * @return KErrServerBusy, if the request cannot be handled at this time. 
- * @return KErrNoMemory, if there is insufficient memory available.
- * @return KErrPermissionDenied, if the caller has insufficient capabilities.
- * @return KErrAuthServIdentityNotFound, if the id does not exist.
- * @return KErrAuthServNoSuchPlugin, if the plugin does not exist.
- * @return KErrAuthServAuthenticationRequired, if the identity to be
- * trained is not currently authenticated.
- **/
-EXPORT_C void RAuthMgrClient::TrainPlugin(
-    TIdentityId aId,
-	TPluginId aPlugin,
-	TRequestStatus& aRequest)
-    {
-    CallSessionFunction(ETrainPlugin, TIpcArgs(aId, aPlugin), aRequest);
-    }
-
-
-/**
- * Remove the specified plugin as an authentication method for the
- * identity.
- *
- * @param aId The identity for whom to forget plugin training.
- *
- * @param aPlugin The id of the plugin to retrain.
- *
- * @capability WriteUserData
- *
- * @return KErrServerTerminated, if the server no longer present
- * @return KErrServerBusy, if the request cannot be handled at this time. 
- * @return KErrNoMemory, if there is insufficient memory available.
- * @return KErrPermissionDenied, if the caller has insufficient capabilities.
- * @return KErrAuthServIdentityNotFound, if the id does not exist.
- * @return KErrAuthServNoSuchPlugin, if the plugin does not exist.
- **/
-EXPORT_C void RAuthMgrClient::ForgetPluginL(
-    TIdentityId aId,
-	TPluginId aPlugin)
-    {
-	User::LeaveIfError(CallSessionFunction(EForgetPlugin, TIpcArgs(aId, aPlugin)));
-    }
-
-
-/**
- * Specifies the preferred plugin for the named type.
- *
- * @param aType The type of plugin for which to define the preference.
- *
- * @param aPluginId The id of the preferred plugin for the specified type.
- *
- * @capability WriteDeviceData
- *
- * @return KErrServerTerminated, if the server no longer present
- * @return KErrServerBusy, if the request cannot be handled at this time. 
- * @return KErrNoMemory, if there is insufficient memory available.
- * @return KErrPermissionDenied, if the caller has insufficient capabilities.
- * @return KErrAuthServNoSuchPlugin, if the plugin does not exist.
- * @return KErrArgument, if aType does not match the plugin's type.
- **/
-EXPORT_C void RAuthMgrClient::SetPreferredTypePluginL(TAuthPluginType aType,
-													  TPluginId aPluginId)
-	{
-	User::LeaveIfError(CallSessionFunction(ESetAuthPreferences, TIpcArgs(aType, aPluginId)));
-	}
-
-/**
- * Reset the training data of a registered identity.
- *
- * @param aId The identity to reset.
- *
- * @param aRegistrationInformation The regisration information to be used for 
- * identifying the user. This data is meaningful for knowledge based  authentication 
- * server plugins (here the registration data could be the passphrase). 
- * Note that a plugin may choose to ignore the supplied registration data and simply 
- * remove the identity from its records.
- *
- * @capability WriteDeviceData
- *
- * @return KErrServerTerminated, if the server no longer present
- * @return KErrServerBusy, if the request cannot be handled at this time. 
- * @return KErrNoMemory, if there is insufficient memory available.
- * @return KErrPermissionDenied, if the caller has insufficient capabilities.
- * @return KErrAuthServIdentityNotFound, if the id cannot be found.
- * @return KErrAuthServResetMayLoseIdentity, if a reset can result in the loss of an identity. 
- * @see KErrAuthServResetMayLoseIdentity.
- * @return KErrArgument, if the supplied arguments are incorrect.
- * @return ... any of the system-wide error codes.
- **/
-EXPORT_C void RAuthMgrClient::ResetIdentityL(TIdentityId aId,
-							 const TDesC& aRegistrationInformation)
-	{
-	// Sanity check arguments
-	if (aId == 0)
-		{
-		User::Leave(KErrArgument);
-		}
-	User::LeaveIfError(CallSessionFunction(EResetIdentity, TIpcArgs(aId, &aRegistrationInformation)));
-	}
-
-/**
- * Reset the training data of a registered identity.
- *
- * @param aId The identity to reset.
- *
- * @param aPluginType The type of plugins for which to supply the registration data during the reset.
- * Note that currently only EAuthKnowledge type plugins is supported for this parameter.
- * 
- * @param aRegistrationInformation The regisration information to be used for 
- * identifying the user. This data is meaningful for knowledge based  authentication 
- * server plugins (here the registration data could be the passphrase). 
- * Note that a plugin may choose to ignore the supplied registration data and simply 
- * remove the identity from its records.
- *
- * @capability WriteDeviceData
- *
- * @return KErrServerTerminated, if the server no longer present
- * @return KErrServerBusy, if the request cannot be handled at this time. 
- * @return KErrNoMemory, if there is insufficient memory available.
- * @return KErrPermissionDenied, if the caller has insufficient capabilities.
- * @return KErrAuthServIdentityNotFound, if the id cannot be found.
- * @return KErrAuthServResetMayLooseIdentity, if a reset can result in the loss of an identity. 
- * @see KErrAuthServResetMayLooseIdentity.
- * @return KErrArgument, if the supplied arguments are incorrect.
- * @return ... any of the system-wide error codes.
- **/
-EXPORT_C void RAuthMgrClient::ResetIdentityL(TIdentityId aId,
-							 TAuthPluginType aPluginType,
-							 const TDesC& aRegistrationInformation)
-	{
-	// Sanity check arguments
-	if (aId == 0)
-		{
-		User::Leave(KErrArgument);
-		}
-	User::LeaveIfError(CallSessionFunction(EResetIdentityByType, TIpcArgs(aId, aPluginType, &aRegistrationInformation)));
-	}
-
-/**
- * Reset the training data of a registered identity.
- *
- * @param aId The identity to reset.
- *
- * @param aPluginIdList The list of plugin ids for which to supply the registration data during the reset.
- *
- * @param aRegistrationInformation An array of regisration information to be used for 
- * identifying the user. The order of elements in this array correspond to the order of plugin ids in 
- * aPluginIdList. This data is meaningful for knowledge based  authentication server 
- * plugins (here the registration data could be the passphrase). 
- * Note that a plugin may choose to ignore the supplied registration data and simply 
- * remove the identity from its records.
- *
- * @capability WriteDeviceData
- *
- * @return KErrServerTerminated, if the server no longer present
- * @return KErrServerBusy, if the request cannot be handled at this time. 
- * @return KErrNoMemory, if there is insufficient memory available.
- * @return KErrPermissionDenied, if the caller has insufficient capabilities.
- * @return KErrAuthServIdentityNotFound, if the id cannot be found.
- * @return KErrAuthServResetMayLooseIdentity, if a reset can result in the loss of an identity. 
- * @see KErrAuthServResetMayLooseIdentity.
- * @return KErrArgument, if the supplied arguments are incorrect.
- * @return ... any of the system-wide error codes.
- **/
-EXPORT_C void RAuthMgrClient::ResetIdentityL(TIdentityId aId,
-							 RArray<TPluginId>& aPluginIdList,
-							 RPointerArray<const HBufC>& aRegistrationInformation)
-	{
-	// Sanity check arguments
-	TInt count = aPluginIdList.Count();
-	if ((aId == 0) || (count < 1) || (count != aRegistrationInformation.Count()))
-		{
-		User::Leave(KErrArgument);
-		}
-
-	// Flatten aPluginIdList
-	HBufC8* bufPluginIds = AuthServerUtil::FlattenDataArrayLC(aPluginIdList);
-
-	// Flatten aRegistrationInformation
-	HBufC8* bufRegInfo = AuthServerUtil::FlattenDataPointerArrayLC(aRegistrationInformation);
-
-	User::LeaveIfError(CallSessionFunction(EResetIdentityByList, TIpcArgs(aId, bufPluginIds, bufRegInfo)));
-	CleanupStack::PopAndDestroy(2, bufPluginIds); // bufRegInfo
-	}
--- a/authenticationservices/authenticationserver/source/common/arrayutils.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,78 +0,0 @@
-/*
-* Copyright (c) 2003-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Utility functions for streaming arrays.
-*
-*/
-
-
-/**
- @file 
- @released
- @internalComponent 
-*/
-
-#ifndef __ARRAYUTILS_H_
-#define __ARRAYUTILS_H_
-
-#include <s32strm.h>
-
-namespace AuthServer
-{
-	
-/////////////////////////////////////////////////////////////////////
-// RPointerArray utilities
-/////////////////////////////////////////////////////////////////////
-
-template <class T>
-void ExternalizePointerArrayL(const RPointerArray<T>& aArray, RWriteStream& aStream);
-
-template <class T>
-void InternalizePointerArrayL(RPointerArray<T>& aArray, RReadStream& aStream);
-
-/////////////////////////////////////////////////////////////////////
-// RArray utilities
-/////////////////////////////////////////////////////////////////////
-
-template <class T>
-void ExternalizeArrayL(const RArray<T>& aArray, RWriteStream& aStream);
-
-template <class T>
-void InternalizeArrayL(RArray<T>& aArray, RReadStream& aStream);
-
-/////////////////////////////////////////////////////////////////////
-// Traits classes - internally required by RPointerArray functions
-/////////////////////////////////////////////////////////////////////
-
-template <class T>
-class TTraits
-	{
-public:
-	static T* ReadFromStreamLC(RReadStream& aStream) { return T::NewLC(aStream); }
-	static void WriteToStreamL(const T& aItem, RWriteStream& aStream) { aStream << aItem; }
-	};
-
-// Specialisation for HBufs
-template <>
-class TTraits<HBufC16>
-	{
-public:
-	static HBufC16* ReadFromStreamLC(RReadStream& aStream) { return HBufC16::NewLC(aStream, KMaxTInt); }
-	static void WriteToStreamL(const HBufC16& aItem, RWriteStream& aStream) { aStream << aItem; }
-	};
-
-#include "arrayutils.inl"
-} // namespace AuthServer
-
-#endif  // __ARRAYUTILS_H_
--- a/authenticationservices/authenticationserver/source/common/arrayutils.inl	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,66 +0,0 @@
-/*
-* Copyright (c) 2003-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Utility functions for copying and streaming RArrays. 
-* RPointerArray utilities
-*
-*/
-
-template <class T>
-void ExternalizePointerArrayL(const RPointerArray<T>& aArray, RWriteStream& aStream)
-	{
-	aStream.WriteInt32L(aArray.Count());
-	for (TInt i = 0; i < aArray.Count(); ++i)
-		{
-		TTraits<T>::WriteToStreamL(*aArray[i], aStream);
-		}
-	}
-
-template <class T>
-void InternalizePointerArrayL(RPointerArray<T>& aArray, RReadStream& aStream)
-	{
-	TInt count = aStream.ReadInt32L();
-	for (TInt i = 0; i < count; ++i)
-		{
-		T* item = TTraits<T>::ReadFromStreamLC(aStream);
-		User::LeaveIfError(aArray.Append(item));
-		CleanupStack::Pop();
-		}
-	}
-
-/////////////////////////////////////////////////////////////////////
-// RArray utilities
-/////////////////////////////////////////////////////////////////////
-template <class T>
-void ExternalizeArrayL(const RArray<T>& aArray, RWriteStream& aStream)
-	{
-	aStream.WriteInt32L(aArray.Count());
-	for (TInt i = 0; i < aArray.Count(); ++i)
-		{
-		aStream.WriteL(TPckgC<T>(aArray[i]));
-		}
-	}
-
-template <class T>
-void InternalizeArrayL(RArray<T>& aArray, RReadStream& aStream)
-	{
-	TInt count = aStream.ReadInt32L();
-	for (TInt i = 0; i < count; ++i)
-		{
-		T item;
-		TPckg<T> itemPckg(item);
-		aStream.ReadL(itemPckg);
-		User::LeaveIfError(aArray.Append(item));
-		}
-	}
--- a/authenticationservices/authenticationserver/source/common/authcommon_impl.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,38 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* This header file includes other authserver includes
-* which are used by the authcommon source files.
-*
-*/
-
-
-/**
- @file 
- @internalTechnology
-*/
- 
-#ifndef AUTHCOMMON_IMPL_H
-#define AUTHCOMMON_IMPL_H
-
-#include <des.h>
-#include <random.h>
-#include "authexpression_impl.h"
-#include "authserver/identity.h"
-#include "authserver/plugindesc.h"
-#include "authserver/protectionkey.h"
-#include "authserver/authtypes.h"
-#include "authserver/auth_srv_errs.h"
-
-#endif	// AUTHCOMMON_IMPL_H
--- a/authenticationservices/authenticationserver/source/common/authexpression.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,891 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include "authcommon_impl.h"
-#include <scs/cleanuputils.h>
-
-using namespace AuthServer;
-
-const TInt CAuthExpressionImpl::KVersion = 1;
-
-// -------- TAuthExpressionWrapper --------
-
-
-TAuthExpressionWrapper::TAuthExpressionWrapper(CAuthExpression* aExpression)
-/**
-	This constructor stores the supplied expression pointer.
-	
-	@param	aExpression		A pointer to the supplied expression
-							is stored in the TAuthExpressionWrapper
-							object.  On exit, this object owns
-							the expression.
- */
-:	iPtr(aExpression)
-	{
-	// empty.
-	}
-
-
-TAuthExpressionWrapper::TAuthExpressionWrapper(TAuthPluginType aType)
-/**
-	Allocates a new instance of CAuthExpressionImpl which
-	describes the supplied plugin type.  If there is not
-	enough memory, the pointer is NULL on exit.
-	
-	@param	aType			Plugin type used to create new instance
-							of CAuthExpressionImpl.
- */
-:	iPtr(new CAuthExpressionImpl(aType))
-	{
-	// empty.
-	}
-
-
-TAuthExpressionWrapper::TAuthExpressionWrapper(TPluginId aPluginId)
-/**
-	Allocates a new instance of CAuthExpressionImpl which
-	describes the supplied plugin ID.  If there is not
-	enough memory, the pointer is NULL on exit.
-	
-	@param	aPluginId		Value which describes a specific plugin.
- */
-:	iPtr(new CAuthExpressionImpl(aPluginId))
-	{
-	// empty.
-	}
-
-TAuthExpressionWrapper::TAuthExpressionWrapper()
-/**
-	Allocates a new instance of CAuthExpressionImpl which
-	describes the default plugin ID.  If there is not
-	enough memory, the pointer is NULL on exit.
-	
- */
-:	iPtr(new CAuthExpressionImpl())
-	{
-	// empty.
-	}
-
-// -------- factory functions --------
-
-
-static CAuthExpressionImpl* AuthComb(
-	CAuthExpressionImpl::TType aType, CAuthExpressionImpl* aLeft, CAuthExpressionImpl* aRight);
-
-
-EXPORT_C TAuthExpressionWrapper AuthServer::AuthExpr(TAuthPluginType aType)
-/**
-	Returns a wrapper around a new authentication expression.
-	
-	@param	aType			Identifies a type of plugin.
-	@return					Wrapper object for an instance
-							of CAuthExpressionImpl.  The authentication
-							expression is allocated on the heap,
-							and is NULL if there is not
-							enough memory.
- */
-	{
-	return TAuthExpressionWrapper(aType);
-	}
-
-
-EXPORT_C TAuthExpressionWrapper AuthServer::AuthExpr(TPluginId aPluginId)
-/**
-	Returns a wrapper around a new authentication expression.
-	
-	@param	aPluginId		Identifies a specific plugin.
-	@return					Wrapper object for an instance
-							of CAuthExpressionImpl.  The authentication
-							expression is allocated on the heap,
-							and is NULL if there is not
-							enough memory.
- */
-	{
-	return TAuthExpressionWrapper(aPluginId);
-	}
-
-EXPORT_C TAuthExpressionWrapper AuthServer::AuthExpr()
-/**
-	Returns a wrapper around a new authentication expression.
-	
-	@return					Wrapper object for an instance
-							of CAuthExpressionImpl.  The authentication
-							expression is allocated on the heap,
-							and is NULL if there is not
-							enough memory.
- */
-	{
-	return TAuthExpressionWrapper();
-	}
-
-EXPORT_C TAuthExpressionWrapper AuthServer::AuthOr(CAuthExpression* aLeft, CAuthExpression* aRight)
-/**
-	Allocate a CAuthExpressionImpl node which combines the supplied
-	left and right nodes as an OR operation.
-	
-	If either aLeft or aRight are NULL, or this operation fails
-	to allocate the required memory, then any allocated memory
-	is cleaned up NULL is returned.
-	
-	@param	aLeft			Left node.  This must be an instance
-							of CAuthExpresionImpl.
-	@param	aRight			Right node.  This must be an instance
-							of CAuthExpresionImpl.
-	@return					New wrapper around CAuthExpression, NULL
-							if could not allocate, or if either the
-							supplied nodes were NULL.
- */
-	{
-	CAuthExpressionImpl* leftImpl = static_cast<CAuthExpressionImpl*>(aLeft);
-	CAuthExpressionImpl* rightImpl = static_cast<CAuthExpressionImpl*>(aRight);
-	return AuthComb(CAuthExpressionImpl::EOr, leftImpl, rightImpl);
-	}
-
-
-EXPORT_C TAuthExpressionWrapper AuthServer::AuthAnd(CAuthExpression* aLeft, CAuthExpression* aRight)
-/**
-	Allocate a CAuthExpressionImpl node which combines the supplied
-	left and right nodes as an AND operation.
-	
-	If either aLeft or aRight are NULL, or this operation fails
-	to allocate the required memory, then the subexpressions are
-	deleted and this function returns NULL.
-	
-	@param	aLeft			Left node.
-	@param	aRight			Right node.
-	@return					New wrapper around CAuthExpression, NULL
-							if could not allocate, or if either the
-							supplied nodes were NULL.
-	@see AuthOr
- */
-	{
-	CAuthExpressionImpl* leftImpl = static_cast<CAuthExpressionImpl*>(aLeft);
-	CAuthExpressionImpl* rightImpl = static_cast<CAuthExpressionImpl*>(aRight);
-	return AuthComb(CAuthExpressionImpl::EAnd, leftImpl, rightImpl);
-	}
-
-
-static CAuthExpressionImpl* AuthComb(
-	CAuthExpressionImpl::TType aType, CAuthExpressionImpl* aLeft, CAuthExpressionImpl* aRight)
-/**
-	Helper function for AuthOr and AuthAnd.  This function
-	allocates the combining node, storing the combining method (AND
-	or OR) and pointers to the left and right nodes.
-	
-	If aLeft or aRight are NULL on entry, or this function cannot
-	allocate the required memory, then any previously allocated nodes
-	are freed, and this function returns NULL.
-	
-	@param	aType			Type of expression, AND/OR
-	@param	aLeft			Left node.
-	@param	aRight			Right node.
-	@return					New wrapper around CAuthExpression, NULL
-							if could not allocate, or if either the
-							supplied nodes were NULL.
-	@see AuthAnd
-	@see AuthOr
- */
-	{
-	CAuthExpressionImpl* compound = 0;
-	
-	if (aLeft == 0 || aRight == 0)
-		goto failed;
-	
-	compound = new CAuthExpressionImpl(aType, aLeft, aRight);
-	if (compound == 0)
-		goto failed;
-	
-	return compound;
-	
-failed:
-	delete aLeft;
-	delete aRight;
-	
-	return 0;
-	}
-
-
-// -------- TSizeStream --------
-
-
-EXPORT_C void TSizeStream::DoWriteL(const TAny* /* aPtr */, TInt aLength)
-/**
-	Override MStreamBuf by incrementing the
-	accumulated size by aLength.
-	
-	@param	aLength			Length of data to write to stream.
- */
-	{
-	iSize += aLength;
-	}
-
-
-// -------- CAuthExpressionImpl --------
-
-
-#ifdef _DEBUG
-#define VAR_FOLLOWS(___c, ___v1, ___v2)	\
-	(_FOFF(___c, ___v2) >= _FOFF(___c, ___v1) + sizeof(___c::___v1))
-#endif
-
-
-CAuthExpressionImpl::CAuthExpressionImpl(TAuthPluginType aType)
-:	iType(EPluginType),
-	iPluginType(aType)
-/**
-	Initialise this leaf node authentication expression
-	as describing a plugin type.
-	
-	@param	aType			Identifies a type of plugin.
-	@panic AUTHEXPR 16		This constructed object is internally
-							inconsistent (debug only.)
- */
-	{
-#ifdef _DEBUG
-	// non-aligned value to detect invalid node pointers
-	__ASSERT_COMPILE(VAR_FOLLOWS(CAuthExpressionImpl, iPluginType, iComb.iRight));
-	iComb.iRight = (CAuthExpressionImpl*)0xB51DE;
-#endif
-
-	__ASSERT_DEBUG(Invariant(), Panic(ECtTyInvariant));
-	}
-
-
-CAuthExpressionImpl::CAuthExpressionImpl(TPluginId aPluginId)
-/**
-	Initialise this leaf node authentication expression
-	as describing a specific plugin.
-	
-	@param	aPluginId		Identifies a specific plugin.
-	@panic	AUTHEXPR 32		This constructed object is internally
-							inconsistent (debug only.)
- */
-:	iType(EPluginId),
-	iPluginId(aPluginId)
-	{
-#ifdef _DEBUG
-	// non-aligned value to detect invalid node pointers
-	__ASSERT_COMPILE(VAR_FOLLOWS(CAuthExpressionImpl, iPluginId, iComb.iRight));
-	iComb.iRight = (CAuthExpressionImpl*)0xB51DE;
-#endif
-
-	__ASSERT_DEBUG(Invariant(), Panic(ECtIdInvariant));
-	}
-
-CAuthExpressionImpl::CAuthExpressionImpl()
-/**
-	Initialise this leaf node authentication expression
-	as describing a specific plugin.
-
-	@panic	AUTHEXPR 32		This constructed object is internally
-							inconsistent (debug only.)
- */
-:	iType(ENull)
-	{
-#ifdef _DEBUG
-	// non-aligned value to detect invalid node pointers
-	__ASSERT_COMPILE(VAR_FOLLOWS(CAuthExpressionImpl, iPluginId, iComb.iRight));
-	iComb.iRight = (CAuthExpressionImpl*)0xB51DE;
-#endif
-
-	__ASSERT_DEBUG(Invariant(), Panic(ECtIdInvariant));
-
-	}
-
-
-CAuthExpressionImpl::CAuthExpressionImpl(TType aType, CAuthExpressionImpl* aLeft, CAuthExpressionImpl* aRight)
-/**
-	Initialise a complex - AND or OR - expression.
-	
-	@param	aType			The type of combination.  The only
-							allowed values are EAnd and EOr.
-	@param	aLeft			Left expression.  This cannot be NULL.
-	@param	aRight			Right expression.  This cannot be NULL.
-	@panic	AUTHEXPR 48		Called with expression type that was
-							neither AND nor OR (debug only.)
-	@panic	AUTHEXPR 49		Called with NULL left node (debug only.)
-	@panic	AUTHEXPR 50		Called with NULL right node (debug only.)
-	@panic	AUTHEXPR 51		This object is internally inconsistent
-							after construction (debug only.)
- */
-:	iType(aType)
-	{
-	__ASSERT_DEBUG(aType == EAnd || aType == EOr, Panic(ECt2BadComb));
-	__ASSERT_DEBUG(aLeft != 0, Panic(ECt2NullLeft));
-	__ASSERT_DEBUG(aRight != 0, Panic(ECt2NullRight));
-	
-	iComb.iLeft = aLeft;
-	iComb.iRight = aRight;
-	aLeft->iParent = aRight->iParent = this;
-	
-	__ASSERT_DEBUG(Invariant(), Panic(ECt2Invariant));
-	}
-
-
-CAuthExpressionImpl::~CAuthExpressionImpl()
-/**
-	Deletes resources used by this expression.  If this is a complex
-	expression then it deletes the subexpression nodes.
- */
-	{
-	// by construction iType is always correctly initialized
-	// before this function is called.
-	if (iType == EAnd || iType == EOr)
-		{
-		delete iComb.iLeft;
-		delete iComb.iRight;
-		}
-	}
-
-
-EXPORT_C void CAuthExpressionImpl::ExternalizeL(RWriteStream& aWriteStream) const
-/**
-	Write a persistent version of this object to the supplied
-	stream.  This function is used to transfer the expression
-	to the authentication server.
-	
-	@param	aWriteStream	Stream to write object to.
-	@panic	AUTHEXPR 160	This object is internally inconsistent
-							when this function is called.
- */
-	{
-	__ASSERT_DEBUG(Invariant(), Panic(EExtInvariant));
-	
-	aWriteStream.WriteInt8L(KVersion);
-	Externalize2L(aWriteStream);
-	}
-
-
-void CAuthExpressionImpl::Externalize2L(RWriteStream& aWriteStream) const
-/**
-	Helper function for ExternalizeL.  This function writes
-	a persistent version of this expression object, including
-	any subexpressions, to the supplied stream.
-	
-	@param	aWriteStream	Stream to write object to.
-	@panic	AUTHEXPR 144	This object is internally inconsistent
-							when this function is called.
- */
-	{
-	__ASSERT_DEBUG(Invariant(), Panic(EExtInvariant));
-	
-	aWriteStream.WriteInt8L(iType);
-	
-	switch (iType)
-		{
-	case EAnd:
-	case EOr:
-		iComb.iLeft->Externalize2L(aWriteStream);
-		iComb.iRight->Externalize2L(aWriteStream);
-		break;
-	
-	case EPluginId:
-		aWriteStream.WriteInt32L(iPluginId);
-		break;
-	
-	case EPluginType:
-		aWriteStream.WriteInt32L(iPluginType);
-		break;
-		
-	case ENull:
-		aWriteStream.WriteInt32L(iPluginId);
-		break;
-	default:
-		// this case should not be reached because this
-		// object has passed the invariant.
-		break;
-		}
-	}
-
-
-// restore the encoded authentication expression
-
-
-EXPORT_C CAuthExpressionImpl* CAuthExpressionImpl::NewL(RReadStream& aReadStream)
-/**
-	Factory function reconstructs an authentication
-	expression from the supplied stream.
-	
-	@param	aReadStream		Stream containing externalized
-							authentication expression.  This must
-							have been generated with CAuthExpressionImpl::ExternalizeL.	
-	@return					Authorisation expression internalized
-							from the supplied stream.
-	@leave KErrNoMemory		Not enough memory to reconstruct the expression.
-	@leave KErrInternalizeInvalidAuthExpr The supplied stream does not
-							describe a valid authentication expression.
-	@leave KErrAuthServUnsupportedExprVersion The supplied stream
-							was created with a later version of CAuthExpressionImpl.
-	@see CAuthExpressionImpl::ExternalizeL
- */
-	{
-	TInt8 ver = aReadStream.ReadInt8L();
-	if (ver > KVersion)
-		User::Leave(KErrAuthServUnsupportedExprVersion);
-	
-	return New2L(aReadStream);
-	}
-	
-CAuthExpressionImpl* CAuthExpressionImpl::New2L(RReadStream& aReadStream)
-/**
-	Helper function for NewL.  This recursively constructs the
-	authentication expression after NewL has checked that it
-	supports the encoded version.
-	
-	@param	aReadStream		Stream containing externalized
-							authentication expression.  This must
-							have been generated with CAuthExpressionImpl::ExternalizeL.	
-	@return					Authorisation expression internalized
-							from the supplied stream.
-	@leave KErrNoMemory		Not enough memory to reconstruct the expression.
-	@leave KErrInternalizeInvalidAuthExpr The supplied stream does not
-							describe a valid authentication expression.
-	@see CAuthExpressionImpl::ExternalizeL
- */
-	{
-	CAuthExpressionImpl::TType t;
-	t = static_cast<CAuthExpressionImpl::TType>(aReadStream.ReadInt8L());
-	
-	switch(t)
-		{
-	case CAuthExpressionImpl::EAnd:
-	case CAuthExpressionImpl::EOr:
-		{
-		CAuthExpressionImpl* left = CAuthExpressionImpl::New2L(aReadStream);
-		CleanupStack::PushL(left);
-		CAuthExpressionImpl* right = CAuthExpressionImpl::New2L(aReadStream);
-		CleanupStack::PushL(right);
-		CAuthExpressionImpl* complex = new(ELeave) CAuthExpressionImpl(t, left, right);
-		CleanupStack::Pop(2, left);	// complex now owns left and right
-		return complex;
-		}
-	
-	case CAuthExpressionImpl::EPluginId:
-		return new(ELeave) CAuthExpressionImpl(
-			static_cast<TPluginId>(aReadStream.ReadInt32L()));
-	
-	case CAuthExpressionImpl::EPluginType:
-		return new(ELeave) CAuthExpressionImpl(
-			static_cast<TAuthPluginType>(aReadStream.ReadInt32L()));
-	
-		
-	case CAuthExpressionImpl::ENull:
-		return new(ELeave) CAuthExpressionImpl();	
-	
-	default:
-		User::Leave(KErrAuthServInvalidInternalizeExpr);
-		return 0;	// avoid 'return value expected' warning
-		}
-	}
-	
-/**
-  Helper function which converts the string into a form that can 
-  be processed as tokens by TLex.Essentially, this method parses and appends
-  space in the input string when delimiters("(",")","&" and "|") are
-  encountered, consequenty the resultant string thus obtained can be parsed
-  using TLex.
- 
-  @param	aStringToBeProcessed	string to be processed.	
-  @param	aResultantString		a buffer which does not already own any allocated memory, and is populated 
-  									with a string resulting from processing aStringToBeProcessed.
- 	 									
- */ 	
-
-EXPORT_C void CAuthExpressionImpl::InsertSpaceBetweenOperatorsL(const TDesC& aStringToBeProcessed, RBuf& aResultantString)
-	{
-	TChar ch = 0;
-	_LIT(KSeparator, " ");
-	HBufC* strBuffer = HBufC::NewLC(KMaxBufferSize);
-	TPtr strPtr(strBuffer->Des());
-	
-	// length of 2 KSeparator and 1 ch.
-	const TInt KAddLength = 3;
-	
-	for(TInt i = 0; i < aStringToBeProcessed.Length(); ++i)
-		{
-		ch = aStringToBeProcessed[i];
-		
-		// check whether appending 3 characters(2 KSeparator and 1 ch) to
-		// aResultantAliasString exceeds the Maxlength.
-		TInt resultingLen = strPtr.Length() + KAddLength;
-		if(resultingLen > KMaxBufferSize)
-			{
-			strBuffer->ReAllocL(resultingLen);
-			}
-				
-		if(ch == '(' || ch == ')' || ch == '&' || ch == '|')
-			{
-			strPtr.Append(KSeparator);
-			strPtr.Append(ch);
-			strPtr.Append(KSeparator);
-			}
-			
-		else
-			{
-			strPtr.Append(ch);
-			}
-		}
-	
-	CleanupStack::Pop(strBuffer);
-	aResultantString.Assign(strBuffer);
-	}
-		
-/**
-  Creates CAuthExpression object from a string defining an authentication.
-  strength.The ownership of CAuthExpression object is transferred to the caller.
- 
-  @param aStrengthAliasString a string defining an authentication.
-  strength obtained from the authserver cenrep file.
- 
-  @return CAuthExpression object.
- 
-  @leave KErrAuthServInvalidAliasStringExpression, when aStrengthAliasString contains tokens other than pluginId, pluginType
-  and operators '&', '|', '(' and ')'		
- 
- */  
-    
- EXPORT_C CAuthExpression* CAuthExpressionImpl::CreateAuthExprObjectL(const TDesC& aStrengthAliasString)
- 	{
-   	RBuf resultantAliasString;
-   	CleanupClosePushL(resultantAliasString);
-     	
-   	// tokenize aStrengthAliasString, to facilitate parsing using TLex. 
-   	InsertSpaceBetweenOperatorsL(aStrengthAliasString, resultantAliasString);
-		
-    // facilitates ordering of expression evaluation via brackets.
-    CAuthExpression* authExpression = EvaluateAliasStringL(resultantAliasString);
-    CleanupStack::PopAndDestroy(); 
-
-    return authExpression;
-    }
-    
-  
- /**
-  This method facilitates ordering of alias string expression (containing pluginIds or pluginTypes
-  or a combination of both) evaluation via brackets.The ownership of CAuthExpression object is 
-  transferred to the caller.
- 
-  @param aStrengthAliasString	an alias string to be parsed and processed.This must be enclosed within brackets.
- 
-  @return CAuthExpression object.
- 
-  @leave KErrAuthServInvalidAliasStringExpression, when aStrengthAliasString contains tokens other than pluginId, pluginType
-  						and operators('&', '|') and brackets.		
- 
- */ 
-    
-  CAuthExpression* CAuthExpressionImpl::EvaluateAliasStringL(const RBuf& aStrengthAliasString)
-  	{
-  	TLex input(aStrengthAliasString);
-
-  	// array of operators (& and |) and brackets.
-  	const TInt KGranularity = 8;
-  	CArrayFixFlat<TPtrC>* opStack = new(ELeave) CArrayFixFlat<TPtrC>(KGranularity);
-   	CleanupStack::PushL(opStack);
-   	
-   	// array of CAuthExpression objects.
-    RPointerArray<CAuthExpression> authExpressionArray;
-    CleanupResetAndDestroyPushL(authExpressionArray);
-   	
-    for (TPtrC token = input.NextToken(); token.Size() > 0 ; 
-         token.Set(input.NextToken()))
-    	{
-    	TInt count = 0;
-    	TInt index = 0;
-    	if(token.CompareF(KAuthOpOr) == 0)
-    		{
-    		count = opStack->Count();
-    		index = count - 1;
-    		// only when the previous element in the opStack is not "&" , will token be added on the opStack.
-    		if(index >= 0 && opStack->At(index) != KAuthOpAnd)
-    			{
-    			opStack->AppendL(token);
-    			}
-    				
-    		else
-    			{
-    			// atleast 1 element in opStack is "&",hence iterate through opStack and   
-    			// keep creating auth expression object until the loop ends.
-    			while(index >= 0 && opStack->At(index) == KAuthOpAnd)
-    				{
-    				CAuthExpression* authExpr = CreateAuthExpressionL(authExpressionArray, opStack->At(index));
-    				opStack->Delete(index);
-    				opStack->Compress();
-    				CleanupStack::PushL(authExpr);
-					authExpressionArray.AppendL(authExpr);
-					CleanupStack::Pop(authExpr);
-					--index;
-    				}
-    					
-    			opStack->AppendL(token);	
-    			}	
-    		} //if(token.CompareF(KAuthOpOr) == 0)
-    			
-    	else if(token.CompareF(KAuthOpAnd) == 0 || token.CompareF(KOpenBracket) == 0)
-    		{
-    		opStack->AppendL(token);
-    		}
-    				
-    	else if(token.CompareF(KCloseBracket) == 0)
-    		{
-    		// when the previous element in the opStack is "(", delete it.
-    		count = opStack->Count();
-    		index = count - 1;
-    		TInt exprCount = authExpressionArray.Count();
-    			
-    		if(index >= 0 && opStack->At(index) == KOpenBracket)
-    			{
-    			opStack->Delete(index);
-    			opStack->Compress();
-    			}
-    			
-    		// the previous element could be an operator/operators of same precedence.	
-    		else
-    			{
-    			while(index >= 0 && opStack->At(index) != KOpenBracket)
-					{
-					CAuthExpression* expr = CreateAuthExpressionL(authExpressionArray, opStack->At(index));
-					CleanupStack::PushL(expr);
-					authExpressionArray.AppendL(expr);
-					CleanupStack::Pop(expr);
-					opStack->Delete(index);	
-					opStack->Compress();
-					--index;
-					}	//while
-						
-				if(index == -1)
-					{
-					User::Leave(KErrAuthServInvalidAliasStringExpression);
-					}
-						
-				opStack->Delete(index);
-				opStack->Compress();
-    			}
-			}	//else if(token.CompareF(KCloseBracket) == 0)
-    		
-    	//when the token is neither "(","|","&" and ")" , it must be a plugin id or plugin Type,
-    	//hence create a CAuthExpression object.
-    	else
-    		{
-    		CAuthExpression* expression = CreateAuthExpressionL(token);
-    		CleanupStack::PushL(expression);
-			authExpressionArray.AppendL(expression);
-			CleanupStack::Pop(expression);
-    		}
-		}	//for loop
-    
-  // since authExpressionArray will eventually contain only 1 authExpression pointer,
-  // remove it from the array, as the ownership of this pointer is transferred to the caller.
-  __ASSERT_ALWAYS((authExpressionArray.Count() == 1), User::Leave(KErrAuthServInvalidAliasStringExpression));
-   		
-  CAuthExpression* authExpression = authExpressionArray[0];
-  authExpressionArray.Remove(0);
-  
-  CleanupStack::PopAndDestroy(2, opStack);	//opStack and authExpressionArray
-  return authExpression;
-  
-  }
-        
-/**
-  Creates CAuthExpression object from an alias string containing either 
-  plugin Id  or plugin type.The ownership of the object is transferred to the caller.
- 
-  @param aAliasString	string containing either plugin Id or plugin Type.
- 
-  @return CAuthExpression object.
- 
-  @leave KErrAuthServInvalidAliasStringExpression, if the operands or operators are invalid strings.	
- 
-  @leave KErrNoMemory, if there was insufficient memory to allocate the CAuthExpression object.
- */ 	
-  CAuthExpression* CAuthExpressionImpl::CreateAuthExpressionL(const TDesC& aAliasString)
-  	{
-   	TLex  input(aAliasString);
-   	CAuthExpression* expression = 0;
-    TPluginId plugin = 0;
-    	
-  	for (TPtrC token = input.NextToken(); token.Size() > 0 ; 
-         token.Set(input.NextToken()))
-       {
-    	TLex lexer(token);
-    	if(token.CompareF(KAuthBiometric) == 0)
-    		{
-    		expression = AuthExpr(EAuthBiometric);
-    		}
-    	else if(token.CompareF(KAuthKnowledge) == 0)
-    		{
-    		expression = AuthExpr(EAuthKnowledge);
-    		}
-    	else if(token.CompareF(KAuthToken) == 0)
-    		{
-    		expression = AuthExpr(EAuthToken);
-    		}
-    	else if(token.CompareF(KAuthPerformance) == 0)
-    		{
-    		expression = AuthExpr(EAuthPerformance);
-    		}
-    	else if(token.CompareF(KAuthDefault) == 0)
-    		{
-    		expression = AuthExpr(EAuthDefault);
-    		}	
-       	else if(lexer.Val(plugin, EHex) == KErrNone)
-    		{
-    		expression = AuthExpr(plugin);
-    		}	
-    	else
-    		{
-    		User::Leave(KErrAuthServInvalidAliasStringExpression);
-    		}
-       }
-     		
-
-    if(expression == NULL)
-		{
-		User::Leave(KErrNoMemory);
-		}
-
-    return expression;    	
-   	}
- 
-/**
-  Creates CAuthExpression object from an array of authexpression objects and an operator.
-  The ownership of the object is transferred to the caller.
- 
-  @param aAuthExprArray		an array of authexpression objects. 
-  @param aOperator			an authexpression operator ( '&' or '|').
-  
-  @return CAuthExpression object.
-  @leave KErrAuthServInvalidAliasStringExpression, if the operands or operators are invalid strings.
- 
- */  	
- CAuthExpression* CAuthExpressionImpl::CreateAuthExpressionL(RPointerArray<CAuthExpression>& aAuthExprArray, TPtrC aOperator)
-  	{
-  	// aAuthExprArray must contain minimum of 2 elements.
-  	__ASSERT_ALWAYS((aAuthExprArray.Count() >= 2), User::Leave(KErrAuthServInvalidAliasStringExpression));
-  	
-  	CAuthExpression* authExpression = 0;
-   	TInt exprIndex = aAuthExprArray.Count() - 1;
-   	
-  	if(aOperator.CompareF(KAuthOpAnd) == 0)
-  		{
-  		authExpression = AuthAnd(aAuthExprArray[exprIndex], aAuthExprArray[exprIndex-1]);
-  		}
-    	
-  	else if(aOperator.CompareF(KAuthOpOr) == 0)
-  		{
-  		authExpression = AuthOr(aAuthExprArray[exprIndex], aAuthExprArray[exprIndex-1]);
-  		}
-  		
-    else
-    	{
-    	User::Leave(KErrAuthServInvalidAliasStringExpression);
-    	}
-	
-	// array elements are not deleted since the ownership is transferred to authExpression,
-	aAuthExprArray.Remove(exprIndex);
-	aAuthExprArray.Remove(exprIndex-1);
-	aAuthExprArray.Compress();
-	
-	return authExpression;
-  	}
-
-
-#ifndef _DEBUG
-// In release mode provide stub functions for Panic() and Invariant().
-
-EXPORT_C void CAuthExpressionImpl::Panic(TPanic /* aPanic */)
-	{
-	// empty.
-	}
-
-EXPORT_C TBool CAuthExpressionImpl::Invariant() const
-	{
-	return ETrue;
-	}
-
-#else
-
-EXPORT_C void CAuthExpressionImpl::Panic(TPanic aPanic)
-/**
-	This function is defined for debug builds only.
-	It halts the current thread when an invalid
-	argument is supplied to one of CAuthExpressionImpl's functions.
-	
-	The current thread is panicked with category "AUTHEXPR"
-	and the supplied reason.
-	
-	@param	aPanic			Panic reason.
- */
-	{
-	_LIT(KPanicCat, "AUTHEXPR");
-	User::Panic(KPanicCat, aPanic);
-	}
-
-EXPORT_C TBool CAuthExpressionImpl::Invariant() const
-/**
-	This function is defined for debug builds, and
-	checks that the object is internally consistent.
-	
-	The node's type must be a supported value - AND, OR,
-	plugin ID, or plugin type.
-	
-	If this is a combining node then recursively ensure
-	that both the left and right nodes are internally
-	consistent.
- */
-	{
-	// this node's parent sees it as a child
-	if (iParent != 0 && !(iParent->iComb.iLeft == this || iParent->iComb.iRight == this))
-		return EFalse;
-	
-	switch (iType)
-		{
-	case EPluginId:
-	case EPluginType:
-		return ETrue;
-		
-	case EAnd:
-	case EOr:
-		// these will fault, as opposed to fail the invariant,
-		// if the pointers are invalid, but so would the original
-		// call to this function if the this pointer were invalid.
-		
-		// this node's children see it as the parent
-		// don't use Parent() because that asserts on the
-		// subexpression, whereas this function should
-		// return EFalse.
-		if (iComb.iLeft->iParent != this)
-			return EFalse;
-		
-		if (iComb.iRight->iParent != this)
-			return EFalse;
-		
-		return iComb.iLeft->Invariant() && iComb.iRight->Invariant();
-	
-	case ENull:
-		return ETrue;
-		
-	default:
-		// unrecognized node type, so fail invariant
-		return EFalse;
-		}
-	}
-	
-#endif	// #ifdef _DEBUG
-
-
--- a/authenticationservices/authenticationserver/source/common/authexpression_impl.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,199 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* This file contains the implementation for CAuthExpression which is only visible
-* to implementation, and not the the client code.
-*
-*/
-
-
-/**
- @file 
- @released
- @internalComponent
-*/
- 
-#ifndef AUTHEXPRESSION_IMPL_H
-#define AUTHEXPRESSION_IMPL_H
-
-#include <s32buf.h>
-#include <authserver/authexpression.h>
-
-namespace AuthServer {
-
-// constants and operators used for processing authentication expression.
-
-_LIT(KAuthOpAnd,"&");
-_LIT(KAuthOpOr,"|");
-_LIT(KAuthBiometric, "Biometric");
-_LIT(KAuthDefault, "Default");
-_LIT(KAuthKnowledge, "Knowledge");
-_LIT(KAuthToken, "Token");
-_LIT(KAuthPerformance, "Performance");
-_LIT(KOpenBracket, "(");
-_LIT(KCloseBracket, ")");
-const TInt KMaxBufferSize = 2048;
-    
-class TSizeStream : public MStreamBuf
-/**
-	This subclass of MStreamBuf is used with
-	RWriteStream to count how many bytes are
-	required to externalize an object.
- */
-	{
-public:
-	inline TSizeStream();
-	inline TInt Size() const;
-
-	// override MStreamBuf
-	IMPORT_C virtual void DoWriteL(const TAny* /* aPtr */, TInt aLength);
-
-private:
-	/** Accumulated stream length in bytes. */
-	TInt iSize;
-	};
-
-
-class CAuthExpressionImpl : public CAuthExpression
-/**
-	This class, which is not visible to clients,
-	defines the variables and functions which are
-	used by authentication expressions.
-	
-	Clients should use the CAuthExpression base class
-	which provides type safety but provides no implementation,
-	so authentication expressions can be re-implemented
-	later without breaking BC.
-
-	@internalComponent
- */
-	{
-public:
-	/**
-		The type of expression represented by an instance
-		of this object, namely a plugin type, a plugin ID,
-		or a complex AND expression, OR expression or a 
-		NULL expression.
-	 */
-	enum TType {EPluginType, EPluginId, EAnd, EOr, ENull};
-		
-	CAuthExpressionImpl(TAuthPluginType aType);
-	CAuthExpressionImpl(TPluginId aPluginId);
-	CAuthExpressionImpl();
-	CAuthExpressionImpl(TType aType, CAuthExpressionImpl* aLeft, CAuthExpressionImpl* aRight);
-
-	IMPORT_C static CAuthExpressionImpl* NewL(RReadStream& aReadStream);
-
-	virtual ~CAuthExpressionImpl();
-
-	// implement CAuthExpression
-	virtual void ExternalizeL(RWriteStream& aWriteStream) const;
-	
-	IMPORT_C static CAuthExpression* CreateAuthExprObjectL(const TDesC& aStrengthAliasString);
-	
-	IMPORT_C static void InsertSpaceBetweenOperatorsL(const TDesC& aAliasStringToBeProcessed, RBuf& aResultantAliasString);
-	
-	inline TType Type() const;
-	inline const CAuthExpressionImpl* Left() const;
-	inline const CAuthExpressionImpl* Right() const;
-	inline TAuthPluginType PluginType() const;
-	inline TPluginId PluginId() const;
-	inline CAuthExpressionImpl* Parent() const;
-
-private:
-	/**
-		Current authentication expression version.
-		This is embedded in the externalized expression
-		so the server can reject the expression if it
-		uses an unsupported version.
-	 */
-	static const TInt KVersion;
-	void Externalize2L(RWriteStream& aWriteStream) const;
-	static CAuthExpressionImpl* New2L(RReadStream& aReadStream);
-	static CAuthExpression* CreateAuthExpressionL(const TDesC& aAliasString);
-	static CAuthExpression* CreateAuthExpressionL(RPointerArray<CAuthExpression>& aAuthExprArray, TPtrC aOperator);
-	static CAuthExpression* EvaluateAliasStringL(const RBuf& aStrengthAliasString);
-	
-	
-private:
-	/**
-		This expression's parent node.  This value is
-		used to navigate the expression tree during
-		evaluation.
-	 */
-	CAuthExpressionImpl* iParent;
-	
-	/** This expression's type. */
-	TType iType;
-	
-	class TBinaryComb
-	/**
-		This class contains pointers to the left and
-		right subexpressions when this expression is
-		an AND or an OR.
-	 */
-		{
-	public:
-		/** Left subexpression.  This cannot be NULL. */
-		CAuthExpressionImpl* iLeft;
-		/** Right subexpression.  This cannot be NULL. */
-		CAuthExpressionImpl* iRight;
-		};
-
-	union
-		{
-		/** This field is valid iff iType == EPluginType. */
-		TAuthPluginType iPluginType;
-		/** This field is valid iff iType == EPluginId. */
-		TPluginId iPluginId;
-		/** This field is valid iff iType == EAnd or iType == EOr. */
-		TBinaryComb iComb;
-		};
-		
-private:
-	// Invariant and Panic are defined, but only as stub
-	// functions for release mode.
-
-	enum TPanic
-	/**
-		In debug builds the current thread can be halted
-		with panic category "AUTHEXPR" and one of the
-		following reasons to indicate that the object has
-		become corrupt or that a caller has supplied an
-		invalid argument to one of this class' functions.
-	 */
-		{
-		ECtTyInvariant = 0x10,
-		ECtIdInvariant = 0x20,
-		ECt2BadComb = 0x30, ECt2NullLeft, ECt2NullRight, ECt2Invariant,
-		ETyAInvariant = 0x40,
-		ELfInvariant = 0x50, ELfNotComplex,
-		ERgInvariant = 0x60, ERgNotComplex,
-		EPTyInvariant = 0x70, EPTyNotPluginType,
-		EPIdInvariant = 0x80, EPIdNotPluginId,
-		EPPrInvariant = 0x90,
-		EExtInvariant = 0xa0
-		};
-		
-
-	IMPORT_C TBool Invariant() const;
-	IMPORT_C static void Panic(TPanic aPanic);
-	};
-
-}	// namespace AuthServer {
-
-#include "authexpression_impl.inl"
-
-#endif	// #ifndef AUTHEXPRESSION_IMPL_H
-
--- a/authenticationservices/authenticationserver/source/common/authexpression_impl.inl	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,162 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#ifndef AUTHEXPRESSION_IMPL_INL
-#define AUTHEXPRESSION_IMPL_INL
-
-#include "authexpression_impl.h"
-
-namespace AuthServer {
-
-// -------- TSizeStream --------
-
-
-inline TSizeStream::TSizeStream()
-/**
-	Initialise the accumulated stream size to zero.
- */
-:	iSize(0)
-	{
-	// empty.
-	}
-
-
-inline TInt TSizeStream::Size() const
-/**
-	Accessor function returns the accumulated
-	stream size in bytes.
-	
-	@return					Accumulated stream size in bytes.
- */
-	{
-	return iSize;
-	}
-
-
-// -------- CAuthExpressionImpl --------
-
-
-inline CAuthExpressionImpl::TType CAuthExpressionImpl::Type() const
-/**
-	Accessor function returns this expression type, i.e.
-	whether it is a plugin ID, a plugin type, an AND expression,
-	or an OR expression.
-	
-	@return					This expression's type.
-	@panic	AUTHEXPR 64		This object is internally inconsistent
-							when the function is called (debug only.)
- */
-	{
-	__ASSERT_DEBUG(Invariant(), Panic(ETyAInvariant));
-	return iType;
-	}
-
-
-inline const CAuthExpressionImpl* CAuthExpressionImpl::Left() const
-/**
-	Accessor function returns this expression's left node.
-	
-	@return					A non-modifiable pointer to
-							this expression's left node.
-	@panic	AUTHEXPR 80		This object is internally inconsistent	
-							when this function is called (debug only.)
-	@panic	AUTHEXPR 81		This object is not an AND or OR expression
-							(debug only.)
-	@see Right
- */
-	{
-	__ASSERT_DEBUG(Invariant(), Panic(ELfInvariant));
-	__ASSERT_DEBUG(iType == EAnd || iType == EOr, Panic(ELfNotComplex));
-	return iComb.iLeft;
-	}
-
-	
-inline const CAuthExpressionImpl* CAuthExpressionImpl::Right() const
-/**
-	Accessor function returns this expression's left node.
-	
-	@return					A non-modifiable pointer to
-							this expression's right node.
-	@panic	AUTHEXPR 96		This object is not an AND or OR expression
-							(debug only.)
-	@see Left
- */
-	{
-	__ASSERT_DEBUG(Invariant(), Panic(ERgInvariant));
-	__ASSERT_DEBUG(iType == EAnd || iType == EOr, Panic(ERgNotComplex));
-	return iComb.iRight;
-	}
-
-
-inline TAuthPluginType CAuthExpressionImpl::PluginType() const
-/**
-	Accessor function returns this expression's plugin type.
-	
-	@return					This expression's plugin type.
-	@panic	AUTHEXPR 112	This object is internally inconsistent
-							when this function is called (debug only.)
-	@panic	AUTHEXPR 113	This object does not describe a
-							plugin type (debug only.)
- */
-	{
-	__ASSERT_DEBUG(Invariant(), Panic(EPTyInvariant));
-	__ASSERT_DEBUG(iType == EPluginType, Panic(EPTyNotPluginType));
-	return iPluginType;
-	}
-
-
-inline TPluginId CAuthExpressionImpl::PluginId() const
-/**
-	Accessor function returns this expression's plugin ID.
-	
-	@return					This expression's plugin ID.
-	@panic AUTHEXPR 128		This object is internally inconsistent
-							when this function is called (debug only.)
-	@panic AUTHEXPR 129		This object does not identify a
-							specific plugin (debug only.)
- */
-	{
-	__ASSERT_DEBUG(Invariant(), Panic(EPIdInvariant));
-	__ASSERT_DEBUG(iType == EPluginId, Panic(EPIdNotPluginId));
-	return iPluginId;
-	}
-
-
-inline CAuthExpressionImpl* CAuthExpressionImpl::Parent() const
-/**
-	Accessor function returns this node's parent.
-	
-	@return					This node's parent.  This is
-							NULL for a root node.
-	@panic AUTHEXPR 144		This object is internally inconsistent
-							when this function is called (debug only.)
-	@internalComponent
- */
-	{
-	__ASSERT_DEBUG(Invariant(), Panic(EPPrInvariant));
-
-	return iParent;
-	}
-
-
-
-}	// namespace AuthServer {
-
-
-#endif	// #ifndef AUTHEXPRESSION_IMPL_INL
-
--- a/authenticationservices/authenticationserver/source/common/authpatchdata.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,28 +0,0 @@
-/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include <e32base.h>
-
-// All the patchable variables in the authcommon.dll need to be in a separate file.
-// Care should be taken not to define the exported data in the same source file 
-// in which they are referred, lest the compiler inline's it. If inlined, the 
-// data cannot be patched. Hence, the definition of data must be put in a 
-// separate source file and they must be declared in other source files by 
-// #including "authpatchdata.h".
-
-EXPORT_C extern const TUint8 KEnablePostMarketAuthenticationPlugins = 0x00;
--- a/authenticationservices/authenticationserver/source/common/authserveripc.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,97 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* authserver client server IPC parameters implementation
-*
-*/
-
-
-/**
- @file 
-*/
-#include "authcommon_impl.h"
-#include "authserveripc.h"
-
-using namespace AuthServer;
-
-
-
-EXPORT_C CAuthParams* CAuthParams::NewL(TTimeIntervalSeconds aTimeout,
-							   TBool aClientKey,
-							   TUid  aClientSid,
-							   TBool aWithString,
-							   const TDesC& aClientMessage)
-	{
-	CAuthParams* self = new (ELeave)CAuthParams(aTimeout,
-												aClientKey,
-												aClientSid,
-												aWithString);
-	CleanupStack::PushL(self);
-	self->ConstructL(aClientMessage);
-	CleanupStack::Pop(self);
-	return self;
-	}
-
-
-void CAuthParams::ConstructL(const TDesC& aClientMessage)
-	{
-	iClientMessage = aClientMessage.AllocL();
-	}
-
-
-CAuthParams::CAuthParams(TTimeIntervalSeconds aTimeout,
-						TBool aClientKey,
-						TUid  aClientSid,
-						TBool aWithString):
-	iTimeout(aTimeout),
-	iClientKey(aClientKey),
-	iClientSid(aClientSid),
-	iWithString(aWithString)
-	{
-	
-	}
-	
-
-EXPORT_C void CAuthParams::ExternalizeL(RWriteStream& aStream) const
-	{
-	aStream.WriteInt32L(iClientMessage->Des().Length());
-	aStream.WriteInt32L(iTimeout.Int());
-	aStream.WriteInt8L(iClientKey);
-	aStream.WriteInt32L(iClientSid.iUid);
-	aStream.WriteInt8L(iWithString);
-
-	aStream << *iClientMessage;
-	}
-
-
-EXPORT_C void CAuthParams::InternalizeL(RReadStream& aStream)
-	{
-	TInt maxLength 	= aStream.ReadInt32L();
-	iTimeout       	= aStream.ReadInt32L();
-	iClientKey     	= aStream.ReadInt8L();
-	iClientSid.iUid	= aStream.ReadInt32L();
-	iWithString     = aStream.ReadInt8L();
-	
-	*iClientMessage = KNullDesC;
-	iClientMessage = iClientMessage->ReAllocL(maxLength);
-	TPtr ptr(iClientMessage->Des());
-	aStream >> ptr;
-	}
-
-
-CAuthParams::~CAuthParams()
-	{
-	delete iClientMessage;
-	iClientMessage = 0;
-	}
--- a/authenticationservices/authenticationserver/source/common/authserveripc.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,139 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Authserver - shared client/server definitions
-*
-*/
-
-
-/**
- @file 
- @internalComponent
- @released
-*/
-
-#ifndef AUTHSERVERCLIENTSERVER_H
-#define AUTHSERVERCLIENTSERVER_H
-
-#include <e32std.h>
-
-namespace AuthServer
-{
-_LIT(KAuthServerName,"!AuthServer");    // name to connect to
-_LIT(KAuthServerImg, "AuthServer");		// DLL/EXE name
-_LIT(KAuthServerShortName, "AuthServer");	    // name used for identication when panicking 
-                                                // clients  - has to be less than 16 bytes
-
-const TInt KMaxAuthServerMessage	=100;
-const TInt KDefaultBufferSize		=2048;
-
-enum TAuthServerMessages
-    {
-	/////////////////////////////////////////////////////////////////
-	ERequireNoCapabilities = 0x100,
-
-	ECancel,                     		///< cancel current async operation
-	EPlugins,                     		///< return all plugins
-	EActivePlugins,               		///< return active plugins only
-	EPluginsByType,               		///< return plugins matching a type
-	EPluginsByTraining,           		///< return plugins matching a training
-								  		///< status
-	EDeauthenticate,              		///< deauthenticate the current user
-	EGetAuthPreferences,          		///< get a plugin type to plugin mapping
-	EListAuthAliases,	  				///< get the list of available authentication aliases.				
-	EResolveExpression,					///< resolve any alias definitions in the auth expression string.
-	
-	/////////////////////////////////////////////////////////////////
-	ERequireReadUserData = 0x200,
-	
-	EIdentityString,              ///< return the given identity's description 
- 
-	/////////////////////////////////////////////////////////////////
-	ERequireWriteUserData = 0x300,
-
-	ESetIdentityString,           ///< set the description for an identity
-	ETrainPlugin,				  ///< train a plugin for an identity
-	EForgetPlugin,				  ///< forget identity training data
-
-	/////////////////////////////////////////////////////////////////
-	ERequireReadDeviceData = 0x400,
-
-	EIdentities,                  ///< return a list of identity numbers
-
-	/////////////////////////////////////////////////////////////////
-	ERequireWriteDeviceData = 0x500,
-	ERemoveIdentity,			  ///< remove an identity
-	ESetAuthPreferences,          ///< set a plugin type to plugin mapping
-	ESetPreferredPlugin,          ///< set the default plugin to use
-	EResetIdentity,				  ///< reset identity for all registered plugins
-	EResetIdentityByType,		  ///< reset identity for given plugin type
-	EResetIdentityByList,		  ///< reset identity for given list of plugins
-	
-	/////////////////////////////////////////////////////////////////
-	ERequireTrustedUi = 0x600,
-
-	ERegisterIdentity,            ///< register a new identity
-
-	/////////////////////////////////////////////////////////////////
-	ERequireReadDeviceAndUserData = 0x700,
-
-	EIdentitiesWithString,
-	
-	////////////////////////////////////////////////////////////////
-	ERequireCustomCheck = 0x800,
-	
-	EAuthenticate,
-	
-	ELastService = 0x900,
-	};
-
-/**
- * Aggregates the parameters to the RAuthClient::AuthenticateL ipc call.
- *
- **/
-class CAuthParams : public CBase
-    {
-    
-public:
-	IMPORT_C static CAuthParams* NewL(TTimeIntervalSeconds aTimeout,
-									  TBool aClientKey,
-									  TUid  aClientSid,
-									  TBool aWithString,
-									  const TDesC& aClientMessage);
-	
-	
-	IMPORT_C void ExternalizeL(RWriteStream& aStream) const;
-	
-	IMPORT_C void InternalizeL(RReadStream& aStream);
-	
-	~CAuthParams();
-	
-private:
-	CAuthParams(TTimeIntervalSeconds aTimeout,
-				TBool aClientKey,
-				TUid  aClientSid,
-	    		TBool aWithString);
-		
-    void ConstructL(const TDesC& aClientMessage);
-    
-public:    
-	TTimeIntervalSeconds iTimeout;
-	TBool                iClientKey;
-	TUid				 iClientSid;
-	TBool                iWithString;
-	HBufC*				 iClientMessage;
-};
-
-} //namespace
-#endif
--- a/authenticationservices/authenticationserver/source/common/authserverutil.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,153 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* AuthServerUtil a utility class used by Authentication Server
-* implemented as static functions
-*
-*/
-
-
-/**
- @file 
- @internalComponent
- @released
-*/
-
-#ifndef __AUTHSERVERUTIL_H__
-#define __AUTHSERVERUTIL_H__
-
-#include <f32file.h>
-#include <s32mem.h>
-#include "arrayutils.h"
-
-namespace AuthServer
-{
-
-class AuthServerUtil
-	{
-public:
-	// IPC helper methods
-	template<class T> 
-		static HBufC8* FlattenDataArrayLC(const RArray<T>& aArray);
-	template<class T> 
-		static void SendDataArrayL(const RMessage2& aMessage, const RArray<T>& aArray, TInt aIpcIndx);
-
-	template<class T> 
-		static HBufC8* FlattenDataPointerArrayLC(const RPointerArray<T>& aPointerArray);
-	template<class T> 
-		static void SendDataPointerArrayL(const RMessage2& aMessage, const RPointerArray<T>& aPointerArray, TInt aIpcIndx);
-	};
-
-// Templated function definitions must appear in the header file
-
-template<class T> 
-HBufC8* AuthServerUtil::FlattenDataArrayLC(const RArray<T>& aArray)
-	{
-	// dynamic buffer since we don't know in advance the size required
-    CBufFlat* tempBuffer = CBufFlat::NewL(KDefaultBufferSize);
-	CleanupStack::PushL(tempBuffer);
-	
-	RBufWriteStream stream(*tempBuffer);
-	CleanupClosePushL(stream);
-	
-	// externalise the array of objects		
-	ExternalizeArrayL(aArray, stream);
-	stream.CommitL();
-	
-	// Now, create an HBufC8 from the stream buf's length, and copy 
-	// the stream buffer into this descriptor
-	HBufC8* buffer = HBufC8::NewL(tempBuffer->Size());
-	TPtr8 ptr(buffer->Des());
-	tempBuffer->Read(0, ptr, tempBuffer->Size());
-	CleanupStack::PopAndDestroy(2, tempBuffer); // tempBuffer,  stream
-
-	CleanupStack::PushL(buffer);
-	return buffer;
-	}
-
-template<class T> 
-void AuthServerUtil::SendDataArrayL(const RMessage2& aMessage,
-					const RArray<T>& aArray,
-					TInt aIpcIndx)
-	{
-	HBufC8* buffer = FlattenDataArrayLC(aArray);
-    TPtr8 pbuffer(buffer->Des());
-    
-	if (aMessage.GetDesMaxLengthL(aIpcIndx) < buffer->Size())
-		{
-		TInt bufferSize = buffer->Size();
-		TPckgC<TInt> bufferSizePackage(bufferSize);
-		aMessage.WriteL(aIpcIndx, bufferSizePackage);
-		aMessage.Complete(KErrOverflow);
-		}
-	else
-		{
-		aMessage.WriteL(aIpcIndx, *buffer);
-		aMessage.Complete(KErrNone);
-		}
-	
-	CleanupStack::PopAndDestroy(buffer);
-	}	
-
-template<class T> 
-HBufC8* AuthServerUtil::FlattenDataPointerArrayLC(const RPointerArray<T>& aPointerArray)
-	{
-	// dynamic buffer since we don't know in advance the size required
-    CBufFlat* tempBuffer = CBufFlat::NewL(KDefaultBufferSize);
-	CleanupStack::PushL(tempBuffer);
-	
-	RBufWriteStream stream(*tempBuffer);
-	CleanupClosePushL(stream);
-	
-	// externalise the pointer array		
-	ExternalizePointerArrayL(aPointerArray, stream);
-	stream.CommitL();
-	
-	// Create an HBufC8 from the stream buf's length, and copy 
-	// the stream buffer into this descriptor
-	HBufC8* buffer = HBufC8::NewL(tempBuffer->Size());
-	TPtr8 ptr(buffer->Des());
-	tempBuffer->Read(0, ptr, tempBuffer->Size());
-	CleanupStack::PopAndDestroy(2, tempBuffer); // tempBuffer, stream,
-	
-	CleanupStack::PushL(buffer);
-	return buffer;
-	}
-
-template<class T> 
-void AuthServerUtil::SendDataPointerArrayL(const RMessage2& aMessage,
-						   const RPointerArray<T>& aPointerArray,
-						   TInt aIpcIndx)
-	{
-	HBufC8* buffer = FlattenDataPointerArrayLC(aPointerArray);
-    TPtr8 pbuffer(buffer->Des());
-    
-	if (aMessage.GetDesMaxLengthL(aIpcIndx) < buffer->Size())
-		{
-		TInt bufferSize = buffer->Size();
-		TPckgC<TInt> bufferSizePackage(bufferSize);
-		aMessage.WriteL(aIpcIndx, bufferSizePackage);
-		aMessage.Complete(KErrOverflow);
-		}
-	else
-		{
-		aMessage.WriteL(aIpcIndx, *buffer);
-		aMessage.Complete(KErrNone);
-		}
-		
-	CleanupStack::PopAndDestroy(buffer);
-	}
-
-} // namespace
-#endif //__AUTHSERVERUTIL_H__
--- a/authenticationservices/authenticationserver/source/common/idandstring.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,77 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CIdAndString implementation
-*
-*/
-
-
-/**
- @file 
-*/
-
-#include "authcommon_impl.h"
-#include "authserver/idandstring.h"
-
-using namespace AuthServer;
-
-EXPORT_C CIdAndString* CIdAndString::NewLC(TIdentityId aId, const TDesC& aString)
-	{
-	CIdAndString* me = new (ELeave) CIdAndString();
-	CleanupStack::PushL(me);
-	me->ConstructL(aId, aString);
-	return me;
-	}
-
-EXPORT_C void CIdAndString::ConstructL(TIdentityId aId, const TDesC& aString)
-    {
-    iId = aId;
-	iString = aString.AllocL();
-	}
-
-	
-EXPORT_C CIdAndString::~CIdAndString() { delete iString; }
-
-EXPORT_C CIdAndString* CIdAndString::NewLC(RReadStream& aStream)
-	    {
-		CIdAndString* me = new (ELeave) CIdAndString();
-		CleanupStack::PushL(me);
-		me->InternalizeL(aStream);
-		return me;
-		}
-EXPORT_C void CIdAndString::ExternalizeL(RWriteStream& aStream) const
-	    {
-		  aStream << iId;
-		  aStream << *iString;
-	    }
-
-void CIdAndString::InternalizeL(RReadStream& aStream) 
-	{
-	aStream >> iId;
-	if (iString)
-		{
-		delete iString;
-		iString = 0;
-		}
-	iString = HBufC::NewL(aStream,255);
-	}
-	
-EXPORT_C TIdentityId CIdAndString::Id() const
-  {
-  return iId;
-  }
-EXPORT_C HBufC* CIdAndString::String() const
-  {
-  return iString;
-  }
--- a/authenticationservices/authenticationserver/source/common/identity.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,125 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CIdentity implementation
-*
-*/
-
-
-/**
- @file 
-*/
-
-#include "authcommon_impl.h"
-
-using namespace AuthServer;
-
-EXPORT_C CIdentity* CIdentity::NewL(TIdentityId aId,
-									CProtectionKey* aKey,
-									HBufC* aString)
-	{
-	CIdentity* me = CIdentity::NewLC(aId, aKey, aString);
-	CleanupStack::Pop();
-	return me;
-	} 
-
-EXPORT_C CIdentity* CIdentity::NewLC(TIdentityId aId,
-									 CProtectionKey* aKey,
-									 HBufC* aString)
-	{ 
-	CIdentity* me = new (ELeave) CIdentity(aId);
-	CleanupStack::PushL(me);
-	me->ConstructL(aKey, aString);
-	return me;
-	}
-
-void CIdentity::ConstructL(CProtectionKey* aKey,
-						   HBufC* aString)
-    {
-	iString = aString;
-	iKey = aKey;
-	}
-
-CIdentity::CIdentity(TIdentityId aId) 
-  : iId(aId)
-    {
-    }
-
-CIdentity::~CIdentity()
-	{
-	delete iKey;
-	delete iString;
-	}
-	
-/**
- * Returns the id number for the identity.
- *
- * @return KUnknown if the identity of the device holder could not be
- * determined.
- **/
-EXPORT_C TIdentityId CIdentity::Id() const
-	{
-	return iId;
-	}
-
-/**
- * Returns the protecion key associated with the returned identity. The
- * key will only be valid if the identity is not unknown.
- *
- * @return the protection key of 
- * the method specified to the RAuthClient::Authenticate method.
- **/
-EXPORT_C const CProtectionKey& CIdentity::Key() const
-	{
-	return *iKey;
-	}
-
-/**
- * Returns the string associated with the returned identity. The string will
- * only be valid if a) the identity is not unknown and b) the identity was
- * retrieved using the withString parameter of RAuthClient::AuthenticateL set
- * to true. If this is not the case then an empty string is returned.
- *
- * @return the protection key of 
- * the method specified to the RAuthClient::Authenticate method.
- **/
-EXPORT_C TDesC& CIdentity::String() const
-	{
-	return *iString;
-	}
-
-EXPORT_C void CIdentity::ExternalizeL(RWriteStream& aWriteStream) const
-    {
-    aWriteStream.WriteInt32L(iId);
-    aWriteStream.WriteInt32L(iKey->KeyData().Length());
-    aWriteStream << iKey->KeyData();
-    aWriteStream<< *iString;
-    }
- 
-EXPORT_C CIdentity* CIdentity::InternalizeL(RReadStream& aReadStream)
-    {
-    TIdentityId id;
-    id = aReadStream.ReadInt32L();
-    TInt keyLength = aReadStream.ReadInt32L();
-    HBufC8* keydata = HBufC8::NewLC(aReadStream, keyLength);
-    CProtectionKey* prot = CProtectionKey::NewL(keydata);
-    CleanupStack::Pop(keydata);
-	CleanupStack::PushL(prot);
-
-    HBufC* stringdata = HBufC::NewLC(aReadStream, KMaxDescLen );
-    CIdentity* identity = CIdentity::NewL(id, prot, stringdata);
-    CleanupStack::Pop(2, prot);
-	return identity; 
-    }
-
--- a/authenticationservices/authenticationserver/source/common/plugindesc.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,251 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CPluginDesc class definition
-*
-*/
-
-
-/**
- @file 
-*/
-
-#include "authcommon_impl.h"
-
-using namespace AuthServer;
-
-
-// -------- factory functions --------
-
-
-/**
-	Factory function allocates a new instance of CPluginDesc
-	from the supplied arguments.
-
-	The supplied values are arbitrary and need not correlate with
-	the actual plugins on the device.
-	
-	@param	aId				The plugin's ID.  This value is used
-							to specify the plugin in an authentication
-							expression.
-							actually available on the system.
-	@param	aName			The plugin's name.  The newly-created
-							description object allocates its own copy
-							of this name, so aName does not have to remain
-							in scope after the object has been created.
-	@param	aType			The plugin's type.
-	@param	aTrainingStatus	The plugin's training status.
-	@param	aMinEntropy		The plugin's minimum entropy as a percentage.
-	@param	aFalsePositiveRate	The plugin's false positive rate as a
-							percentage.
-	@param	aFalseNegativeRate	The plugin's false negative rate as a
-							percentage.
- */
-EXPORT_C CPluginDesc* CPluginDesc::NewL(
-	TPluginId aId, const TDesC& aName,
-	TAuthPluginType aType, TAuthTrainingStatus aTrainingStatus,
-	TEntropy aMinEntropy, TPercentage aFalsePositiveRate,
-	TPercentage aFalseNegativeRate)
-
-	{
-	CPluginDesc* self = new(ELeave) CPluginDesc(
-		aId, aType, aTrainingStatus, aMinEntropy,
-		aFalsePositiveRate, aFalseNegativeRate);
-	
-	CleanupStack::PushL(self);
-	self->ConstructL(aName);
-	CleanupStack::Pop(self);
-	
-	return self;
-	}
-
-/**
-	Record supplied information in this new object,
-	See NewL for argument descriptions.
-	
-	@see NewL
- */
-CPluginDesc::CPluginDesc(
-	TPluginId aId, TAuthPluginType aType,
-	TAuthTrainingStatus aTrainingStatus, TEntropy aMinEntropy,
-	TPercentage aFalsePositiveRate, TPercentage aFalseNegativeRate)
-:	iId(aId),
-	iType(aType),
-	iTrainingStatus(aTrainingStatus),
-	iMinEntropy(aMinEntropy),
-	iFalsePositiveRate(aFalsePositiveRate),
-	iFalseNegativeRate(aFalseNegativeRate)
-	{
-	// empty.
-	}
-
-
-/**
-	Allocate a copy of the supplied name.  The
-	copy is freed in the destructor.
-	
-	@param	aName			This plugin's name.
- */
-void CPluginDesc::ConstructL(const TDesC& aName)
-	{
-	iName = aName.AllocL();
-	}
-
-
-/**
-	Free resources allocated in ConstructL.
-	
-	@see ConstructL
- */
-CPluginDesc::~CPluginDesc()
-    {
-    delete iName;
-    }
-
-
-// -------- persistence --------
-
-/**
-	Recreate an instance of CPluginDesc from the supplied
-	stream.  On success the object is placed on the cleanup stack.
-	
-	@param	aIn				Stream containing persisted plugin
-							description.
-	@return					New instance of CPluginDesc, created
-							from information in the supplied stream.
- */
-EXPORT_C CPluginDesc* CPluginDesc::NewLC(RReadStream& aIn)
-	{
-	CPluginDesc* self = new(ELeave) CPluginDesc;
-	CleanupStack::PushL(self);
-	self->InternalizeL(aIn);
-	return self;
-	}
-
-/**
-	Initialize this object from the supplied stream.
-	This function is used to copy plugin descriptions
-	across IPC boundaries.
-	
-	@param	aIn				Stream which contains externalized
-							plugin descriptor.
-	@see ExternalizeL
- */
-void CPluginDesc::InternalizeL(RReadStream& aIn)
-	{
-	iId = aIn.ReadUint32L();
-	iName = HBufC::NewL(aIn, KMaxNameLength);
-	iType = static_cast<TAuthPluginType>(aIn.ReadUint32L());
-	iTrainingStatus = static_cast<TAuthTrainingStatus>(aIn.ReadUint32L());
-	iMinEntropy = aIn.ReadUint32L();
-	iFalsePositiveRate = aIn.ReadUint32L();
-	iFalseNegativeRate = aIn.ReadUint32L();
-	}
-
-
-/**
-	Write information about this object to the supplied stream
-	so it can be reconstructed later.
-	
-	This function is used to copy plugin descriptions
-	across IPC boundaries.
-	
-	@see InternalizeL
- */
-EXPORT_C void CPluginDesc::ExternalizeL(RWriteStream& aOut) const
-	{
-	aOut << iId;
-	aOut << *iName;
-	aOut.WriteInt32L(iType);
-	aOut.WriteInt32L(iTrainingStatus);
-	aOut << iMinEntropy;
-	aOut << iFalsePositiveRate;
-	aOut << iFalseNegativeRate;
-	}
-
-
-// -------- accessors --------
-
-    
-/**
- * The plugin id.
- * @return The plugin id
- **/
-EXPORT_C TPluginId CPluginDesc::Id() const
-  {
-  return iId;
-  }
-
-/**
- * The plugin name.
- *
- * @return The plugin name, ownership of the returned pointer remains the
- * plugin description
- **/
-EXPORT_C const TDesC* CPluginDesc::Name() const
-  {
-  return iName;
-  }
-
-/**
- * The plugin type.
- * @return the plugin type
- **/
-EXPORT_C TAuthPluginType CPluginDesc::Type() const
-  {
-  return iType;
-  }
-	
-/**
- * Indicates whether the plugin is trained for none, some or all known
- * identities.
- *
- * @return the training status
- **/
-EXPORT_C TAuthTrainingStatus CPluginDesc::TrainingStatus() const
-  {
-  return iTrainingStatus;
-  }
-
-/**
- * How many unique identities the plugin supports.
- * @return The minumum entropy provided by the plugin.
- **/
-EXPORT_C TEntropy CPluginDesc::MinEntropy() const
-  {
-  return iMinEntropy;
-  }
-	
-/**
- * The percentage of times an device holder is falsely identified as an
- * known identity.
- *
- * @return The false positive rate of the plugin
- **/
-EXPORT_C TPercentage CPluginDesc::FalsePositiveRate() const
-  {
-  return iFalsePositiveRate;
-  }
-
-/**
- * The percentage of times a known identity is not identified. 
- *
- * @return The false negative rate of the plugin.
- **/
-EXPORT_C TPercentage CPluginDesc::FalseNegativeRate() const
-  {
-  return iFalseNegativeRate;
-  }
-
-
--- a/authenticationservices/authenticationserver/source/common/protectionkey.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,164 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CProtectionKey implementation
-*
-*/
-
-
-/**
- @file 
-*/
-
-#include "authcommon_impl.h"
-#include <hash.h>
-
-using namespace AuthServer;
-
-/**
- * Generate a new key upon construction
- * @param aKeySize the length of the key in bits.  
- **/
-EXPORT_C CProtectionKey* CProtectionKey::NewL(TInt aKeySize)
-	{
-	CProtectionKey* key = NewLC(aKeySize);
-	CleanupStack::Pop(key);
-	return key;
-	}
-/**
- * Generate a new key upon construction
- * @param aKeySize the length of the key in bits.  
- **/
-EXPORT_C CProtectionKey* CProtectionKey::NewLC(TInt aKeySize)
-	{
-	CProtectionKey* key = new (ELeave) CProtectionKey();
-	CleanupStack::PushL(key);
-	key->ConstructL(aKeySize);
-	return key;
-	}
-
-/**
- * Creates a new key, passing in the key data. Should
- * really only be called by a CTransientKey::EncryptL. The new object
- * assumes ownership of the data.
- *
- * @param aKeyData the data to use as the key
- **/
-EXPORT_C CProtectionKey* CProtectionKey::NewL(HBufC8* aKeyData)
-	{
-	CProtectionKey*  key =
-	  CProtectionKey::NewLC(aKeyData);
-	CleanupStack::Pop(key);
-	return key;
-	}
-
-/**
- * Creates a new key, passing in the key data. Should
- * really only be called by a CTransientKey::EncryptL. The new object
- * assumes ownership of the data.
- *
- * @param aKeyData the data to use as the key
- **/
-EXPORT_C CProtectionKey* CProtectionKey::NewLC(HBufC8* aKeyData)
-	{
-	CProtectionKey*  key = new (ELeave) CProtectionKey();
-	CleanupStack::PushL(key);
-	key->ConstructL(aKeyData);
-	return key;
-	}
-/**
- * Constructor
- */
-CProtectionKey::CProtectionKey()
-	{
-	}
-
-/**
- * Creates a new random key of aKeySize
- * @param aKeySize the size of the key to generate
- **/
-void CProtectionKey::ConstructL(TInt aKeySize)
-	{
-	iKeyData = HBufC8::NewMaxL(aKeySize);
-	TPtr8 data = iKeyData->Des();
-	TRandom::RandomL(data);
-	}
-
-/**
- * Deletes the keydata.
- **/
-CProtectionKey::~CProtectionKey()
-	{
-	delete iKeyData;
-	}
-
-
-/**
- * Creates a new protection key generated using a combination of this key
- * and the client UID. Ownership of the returned object is passed to the 
- * caller.
- *
- * @param aClientUid the client uid to use in the generation process.
- *
- * @return a new heap allocated protection key 
- **/
-EXPORT_C CProtectionKey* CProtectionKey::ClientKeyL(TInt aClientUid) const
-	{
-	CSHA1* sha1 = CSHA1::NewL();
-	CleanupStack::PushL(sha1);
-
-	TPckg<TIdentityId> idPckg(aClientUid);
-	
-	sha1->Update(idPckg);
-	sha1->Update(*iKeyData);
-
-	TInt keyLength = iKeyData->Length();
-	
-	HBufC8* newKey = HBufC8::NewLC(keyLength);
-
-	TInt remaining = keyLength;
-	do
-	  {
-		newKey->Des().Append(sha1->Hash(idPckg).Left(remaining));
-		remaining = keyLength - newKey->Length(); 
-	  } while ( remaining > 0);
-		  
-	CProtectionKey* key = NewL(newKey);
-	CleanupStack::Pop(newKey);
-	CleanupStack::PopAndDestroy(sha1);
-	return key;
-	}
-	
-/**
- * Returns a descriptor to the key data for use in encryption and 
- * decryption methods. 
- *
- * @return a descripter pointing to the key data. 
- **/
-EXPORT_C TPtrC8 CProtectionKey::KeyData() const
-    {
-	return *iKeyData;
-    }
-
-/**
- * Constructs the key using supplied data.
- **/
-void CProtectionKey::ConstructL(HBufC8* aKeyData)
-	{
-	__ASSERT_DEBUG(((iKeyData == 0) &&
-				   (aKeyData != 0)),
-					User::Leave(KErrArgument));
-	iKeyData = aKeyData;
-    }
-
--- a/authenticationservices/authenticationserver/source/server/authdb.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,937 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CAuthDb Authentication server data store implementation
-*
-*/
-
-
-/**
- @file 
-*/
-
-#include "authserver_impl.h"
-
-using namespace AuthServer;
-
-// The number of decimal digits needed to represent a 32 bit unsigned integer
-const TInt KUint32Digits = 10;
-
-// -------- DB helper functions --------
-
-
-static void RollbackDb(TAny* aPtr)
-/**
-	Implements the TCleanupOperation prototype.  This
-	function is used to rollback a database transaction
-	if a leave occurs before it is committed.
-	
-	@param	aPtr			Pointer to RDbDatabase object
-							to roll back.
-	@see CleanupRollbackPushL
- */
-	{
-	RDbDatabase* db = static_cast<RDbDatabase*>(aPtr);
-	if (db->InTransaction())
-		db->Rollback();
-	}
-
-
-inline void CleanupRollbackPushL(RDbDatabase& aDb)
-/**
-	Puts the supplied database on the cleanup stack.
-	The database is rolled back if a leave occurs.
-	
-	If a leave does not occur then the supplied database
-	should be committed.  Do not call CleanupStack::PopAndDestroy
-	to delete this object.
-	
-	@param	aDb				Database to roll back if
-							a leave occurs.
- */
-	{
-	CleanupStack::PushL(TCleanupItem(RollbackDb, &aDb));
-	}
-
-
-static void StartTransactionLC(RDbDatabase& aDb)
-/**
-	Helper function starts a database transaction and
-	puts a rollback cleanup item on the cleanup stack.
-	
-	@param	aDb				Database to start transaction on.
-	@see CommitTransactionLD
- */
-	{
-	User::LeaveIfError(aDb.Begin());
-	CleanupRollbackPushL(aDb);
-	}
-
-
-static void CommitTransactionLD(RDbDatabase& aDb)
-/**
-	Complements StartTransactionLC by removing the
-	the rollback cleanup item from the cleanup stack
-	and committing the database.
-	
-	@see StartTransactionLC
- */
-	{
-	CleanupStack::Pop(&aDb);
-	User::LeaveIfError(aDb.Commit());
-	}
-
-
-// -------- factory functions --------
-
-
-CAuthDb2* CAuthDb2::NewL(RFs& aFs)
-/**
-	Factory function allocates a new instance of CAuthDb.
-	The database file is created if it does not already exist.
-	
-	@return					New instance of CAuthDb.
- */
-	{
-	CAuthDb2* self = CAuthDb2::NewLC(aFs);
-	CleanupStack::Pop(self);
-	return self;
-	}
-
-
-CAuthDb2* CAuthDb2::NewLC(RFs& aFs)
-/**
-	Factory function allocates new instance of CAuthDb2,
-	putting it on the cleanup stack.  The database file
-	is created if it does not already exist.
-	
-	@return					New instance of CAuthDb.
- */
-	{
-	CAuthDb2* self = new(ELeave) CAuthDb2;
-	CleanupStack::PushL(self);
-	self->ConstructL(aFs);
-	return self;
-	}
-
-
-void CAuthDb2::ConstructL(RFs& aFs)
-/**
-	This second-phase constructor opens the
-	database file, creating it if it does not
-	already exist.
- */
-	{
-	TInt r;
-	TFileName dbName(KDbName);
-	dbName[0] = RFs::GetSystemDriveChar();
-
-	r = OpenDbFileL(aFs, dbName);
-	
-	if (r == KErrNone)
-		{
-		if (! iAuthDbFile.IsDamaged() || iAuthDbFile.Recover() == KErrNone)
-			return;
-		}
-	
-	User::LeaveIfError(iAuthDbFile.Replace(aFs, dbName));
-	iIsDbOpen = ETrue;
-	StartTransactionLC(iAuthDbFile);
-	
-	// These commands are stored as narrow instead of wide
-	// text to save c. 500 bytes in decompressed exe size.
-	// The non-XIP EXE size is almost the same because DEFLATE
-	// is used on the ELF file.
-	
-	static const TText8*const cmds[] =
-		{
-		_S8("CREATE TABLE Identities (idName COUNTER, IdentityId UNSIGNED INTEGER NOT NULL, Description VARCHAR(255) NOT NULL)"),
-		_S8("CREATE UNIQUE INDEX idIndex ON Identities (idName)"),
-		_S8("CREATE UNIQUE INDEX identityIdx ON Identities (IdentityId DESC)"),
-		_S8("CREATE TABLE Prefs (PluginType UNSIGNED INTEGER NOT NULL, PluginId UNSIGNED INTEGER NOT NULL)"),
-		_S8("CREATE UNIQUE INDEX typeIdx ON Prefs (PluginType ASC)"),
-		_S8("CREATE TABLE TrainedPlugins (IdentityId UNSIGNED INTEGER NOT NULL, PluginId UNSIGNED INTEGER NOT NULL, TransientKey LONG VARBINARY NOT NULL)"),
-		_S8("CREATE UNIQUE INDEX identityPluginIdx ON TrainedPlugins (IdentityId DESC, PluginId ASC)")
-		};
-	
-	const TInt elemCount = sizeof(cmds) / sizeof(cmds[0]);
-	TBuf<140> cmd;
-	for (TInt i = 0; i < elemCount; ++i)
-		{
-		TPtrC8 cmd8(cmds[i]);
-		cmd.Copy(cmd8);
-		User::LeaveIfError(iAuthDbFile.Execute(cmd));
-		}
-
-	CommitTransactionLD(iAuthDbFile);
-	}
-
-
-CAuthDb2::~CAuthDb2()
-/**
-	Close the database file used by this object.
- */
-	{
-	CloseDbFile();
-	}
-
-TInt CAuthDb2::OpenDbFileL(RFs& aFs, const TFileName& aDbName)
-	{
-	
-	TInt r(0);
-	if(!iIsDbOpen)
-		{
-		r = iAuthDbFile.Open(aFs, aDbName);
-		if(KErrNone == r)
-			{
-			iIsDbOpen = ETrue;
-			}
-		else if (KErrNotFound != r)
-			{
-			User::Leave(r);
-			}
-		}
-	return r;
-	}
-
-void CAuthDb2::CloseDbFile()
-	{
-	if(iIsDbOpen)
-		{
-		RollbackDb(&iAuthDbFile);
-		if(iAuthDbFile.IsDamaged())
-			{
-			iAuthDbFile.Recover();
-			}
-		iAuthDbFile.Close();
-		iIsDbOpen = EFalse;
-		}
-	}
-
-// -------- identities --------
-
-
-void CAuthDb2::AddIdentityWithTrainedPluginL(
-	TIdentityId aIdentityId, const TDesC& aDesc,
-	const CTransientKeyInfo& aTransKeyInfo)
-/**
-	Adds an identity and trains a plugin for it in a single
-	atomic operation.
-	
-	@param	aIdentityId		New identity.
-	@param	aDesc			Identity's description.  This must
-							have no more than KMaxDescLen characters.
-	@param	aTransKeyInfo	A transient key which trains this identity
-							for a plugin.
-	@leave	KErrAuthServIdentityAlreadyExists  The supplied identity
-							is already in the database.
- */
-	{
-	StartTransactionLC(iAuthDbFile);
-	
-	AddIdentityL(aIdentityId, aDesc);
-	
-	SetTrainedPluginL(aIdentityId, aTransKeyInfo.PluginId(), aTransKeyInfo);
-	
-	CommitTransactionLD(iAuthDbFile);
-	}
-
-
-void CAuthDb2::AddIdentityL(TIdentityId aIdentityId, const TDesC& aDesc)
-/**
-	Add the supplied identity to the database.
-	
-	@param	aIdentityId		New identity.
-	@param	aDesc			Identity's description.  This must
-							have no more than KMaxDescLen characters.
-	@leave	KErrAuthServDescTooLong The supplied description is more than
-							255 characters.
-	@leave	KErrAuthServIdentityAlreadyExists  The supplied identity
-							is already in the database.
- */
-	{
-	if (aDesc.Length() > KMaxDescLen)
-		User::Leave(KErrAuthServDescTooLong);
-
-	RDbTable table;
-	
-	// EUpdatable instead of EInsertOnly so can navigate to any
-	// existing row.
-	if (FindIdentityLC(table, RDbView::EUpdatable, aIdentityId))
-		User::Leave(KErrAuthServIdentityAlreadyExists);
-	
-	table.InsertL();		// start automatic transaction
-	table.SetColL(KIdentitiesIdentityIdCol, aIdentityId);
-	table.SetColL(KIdentitiesDescCol, aDesc);
-	table.PutL();			// end automatic transaction
-	
-	CleanupStack::PopAndDestroy(&table);
-	}
-
-
-void CAuthDb2::RemoveIdentityL(TIdentityId aIdentityId)
-/**
-	Remove the supplied identity from the auth server's database.
-	Any trained entries for the supplied identity are also removed.
-	All updates to the database happen within a single transaction.
-
-	@param	aIdentityId		Identity to remove from database;
-	@leave	KErrAuthServIdentityNotFound The supplied identity could
-							not be found in the database.
- */
-	{
-	StartTransactionLC(iAuthDbFile);
-	
-	RDbTable table;
-	FindExistingIdentityLC(table, RDbView::EUpdatable, aIdentityId);
-	table.DeleteL();
-	CleanupStack::PopAndDestroy(&table);
-
-	// remove each training record for this identity
-	_LIT(KDelTrainFmt, "DELETE FROM TrainedPlugins WHERE IdentityId=%u");
-	TBuf<(46 - 2) + 10> bufCmd;
-	bufCmd.Format(KDelTrainFmt, aIdentityId);
-	iAuthDbFile.Execute(bufCmd);
-	
-	CommitTransactionLD(iAuthDbFile);
-	}
-
-
-TInt CAuthDb2::NumIdentitiesL() 
- /**
-	Retrieve the number of identities in the database.
-	@return the number of identities in the database.
-  */
-	{
-	TInt result = 0;
-	RDbTable table;
-	OpenTableLC(table, KIdentitiesTableName, RDbRowSet::EReadOnly, KIdentitiesIndex);
-	result = table.CountL();
-	CleanupStack::PopAndDestroy(&table);
-	return result;
-	}
-  
-void CAuthDb2::IdentitiesL(RArray<TIdentityId>& aResults)
-/**
-	Populate the supplied array with the currently
-	registered identities.
-	
-	@param	aResults		On success this array is populated
-							with the currently registered identities.
-							Any items which were in the array when
-							this function is called are removed.  On
-							failure this array is emptied so the caller
-							does not have to place it on the cleanup stack.
- */
-	{
-	aResults.Reset();
-	CleanupClosePushL(aResults);
-	
-	RDbTable table;
-	OpenTableLC(table, KIdentitiesTableName, RDbRowSet::EReadOnly, KIdIndexNum);
-	while (table.NextL())
-		{
-		table.GetL();
-		aResults.AppendL(table.ColUint32(KIdentitiesIdentityIdCol));
-		}
-	
-	CleanupStack::PopAndDestroy(&table);
-	CleanupStack::Pop(&aResults);
-	}
-
-void CAuthDb2::IdentitiesWithDescriptionL(RIdAndStringArray& aList)
-/**
-	Populate the supplied array with the currently
-	registered identities and descriptions.
-	
-	@param	aList   		On success this array is populated
-							with the currently registered identities.
-							Any items which were in the array when
-							this function is called are removed.  On
-							failure this array is emptied so the caller
-							does not have to place it on the cleanup stack.
- */
-	{
-	aList.Reset();
-	CleanupClosePushL(aList);
-	
-	RDbTable table;
-	OpenTableLC(table, KIdentitiesTableName, RDbRowSet::EReadOnly, KIdentitiesIndex);
-	while (table.NextL())
-		{
-		table.GetL();
-		CIdAndString* id =
-		  CIdAndString::NewLC(table.ColUint32(KIdentitiesIdentityIdCol),
-							  table.ColDes(KIdentitiesDescCol));
-		aList.AppendL(id);
-		CleanupStack::Pop(id);
-		}
-	
-	CleanupStack::PopAndDestroy(&table);
-	CleanupStack::Pop(&aList);
-	}
-
-HBufC* CAuthDb2::DescriptionL(TIdentityId aIdentityId)
-/**
-	Allocate a descriptor containing the supplied identity's
-	description.
-	
-	@param	aIdentityId		Identity whose description is returned.
-	@return					Newly-allocated descriptor containing the
-							identity's description.  The client must
-							free this object.
-	@leave	KErrAuthServIdentityNotFound The supplied identity could
-							not be found in the database.
- */
-	{
-	RDbTable table;
-	FindExistingIdentityLC(table, RDbView::EReadOnly, aIdentityId);
-	
-	table.GetL();
-	HBufC* retDesc = table.ColDes(KIdentitiesDescCol).AllocL();
-	
-	CleanupStack::PopAndDestroy(&table);
-	return retDesc;
-	}
-
-
-
-void CAuthDb2::SetDescriptionL(TIdentityId aIdentityId, const TDesC& aDesc)
-/**
-	Update an identity's description.
-	
-	@param	aIdentityId		Identity to update.
-	@param	aDesc			New description text.  This must have
-							no more than KMaxDescLen characters.
-	@leave	KErrAuthServIdentityNotFound The supplied identity could
-							not be found in the database.
- */
-	{
-	if (aDesc.Length() > KMaxDescLen)
-		User::Leave(KErrAuthServDescTooLong);
-	
-	RDbTable table;
-	FindExistingIdentityLC(table, RDbView::EUpdatable, aIdentityId);
-	
-	table.UpdateL();			// start automatic transaction
-	table.SetColL(KIdentitiesDescCol, aDesc);
-	table.PutL();				// end automatic transaction
-	
-	CleanupStack::PopAndDestroy(&table);
-	}
-
-
-void CAuthDb2::FindExistingIdentityLC(
-	RDbTable& aTable, RDbRowSet::TAccess aAccess, TIdentityId aIdentityId)
-/**
-	Find the supplied identity and navigate to it.
-	On success, the table handle is on the cleanup stack.
-	
-	@param	aTable			Caller's table handle.
-	@param	aAccess			Mode in which to open the handle.
-	@param	aIdentityId		Identity to navigate to.
-	@leave	KErrAuthServIdentityNotFound The supplied identity could
-							not be found.
- */
-	{
-	TBool found = FindIdentityLC(aTable, aAccess, aIdentityId);
-	if (! found)
-		User::Leave(KErrAuthServIdentityNotFound);
-	}
-
-
-TBool CAuthDb2::FindIdentityLC(RDbTable& aTable, RDbRowSet::TAccess aAccess, TIdentityId aIdentityId)
-/**
-	Navigate to the supplied identity in the Identities table.
-	On success, the table handle is on the cleanup stack.
-	
-	@param	aTable			Caller's table handle.
-	@param	aAccess			Mode in which to open the table.
-	@param	aIdentityId		Identity to navigate to.
-	@return					Zero if could not find identity in table;
-							Non-zero otherwise.
- */
-	{
-	TBool found = OpenTableAndNavigateLC(
-		aTable, KIdentitiesTableName, aAccess, KIdentitiesIndex, aIdentityId);
-
-	return found;
-	}
-
-
-// -------- plugins --------
-
-TInt CAuthDb2::NumTrainedPluginsL(TIdentityId aId)
-/**
-    Retrieve the number of trained plugins for the specified id.
-    
-    @param aId the identity for whom to retrieve the number of trained plugins.
-    @return the number of trained plugins for the specified id.
- */
-	{
-	_LIT(KGetTrainedFmt, "SELECT IdentityId FROM TrainedPlugins WHERE IdentityId=%u");
-	TBuf<(57 - 2) + 10> bufCmd;
-	bufCmd.Format(KGetTrainedFmt, aId);
-	
-	TDbQuery q(bufCmd);
-	RDbView viewTp;
-	CleanupClosePushL(viewTp);
-	User::LeaveIfError(viewTp.Prepare(iAuthDbFile, q));
-	User::LeaveIfError(viewTp.EvaluateAll());
-	TInt trainedCount = viewTp.CountL();
-	CleanupStack::PopAndDestroy(&viewTp);
-
-	return trainedCount;
-	}
-
-/**
-	Returns list of plugins that are trained for the given identity
-
-	@param	aIdentityId		The identity for whom to retrieve the list of trained plugins.
-	@param 	aTrainedPlugins	The array to fill the returned plugin ids.
-*/
-void CAuthDb2::TrainedPluginsListL(TIdentityId aIdentityId, RArray<TPluginId>& aTrainedPlugins)
-	{
-	_LIT(KGetTrainedFmt, "SELECT PluginId FROM TrainedPlugins WHERE IdentityId=%u");
-	RBuf queryBuf;
-	CleanupClosePushL(queryBuf);
-	queryBuf.CreateL(KGetTrainedFmt().Length() + KUint32Digits);
-	queryBuf.Format(KGetTrainedFmt, aIdentityId);
-
-	TDbQuery query(queryBuf);
-	RDbView viewTp;
-	CleanupClosePushL(viewTp);
-	User::LeaveIfError(viewTp.Prepare(iAuthDbFile, query));
-	User::LeaveIfError(viewTp.EvaluateAll());
-
-	if (viewTp.FirstL())
-		{
-		do
-			{
-			viewTp.GetL();
-			aTrainedPlugins.AppendL(viewTp.ColUint32(1));
-			}
-		while (viewTp.NextL());
-		}
-	CleanupStack::PopAndDestroy(2, &queryBuf); // viewTp
-	}
-
-TAuthTrainingStatus CAuthDb2::PluginStatusL(TPluginId aPluginId)
-/**
-	Return the supplied plugin's training status.
-
-		EAuthUntrained			No identities have been trained for this plugin.
-		EAuthTrained			Some (but not all) identities have been trained for this plugin
-		EAuthFullyTrained		All identities have been trained for this plugin.
-	
-	@param	aPluginId		Plugin whose status should be retrieved.
-	@return					The plugin's training status.
- */
-	{
-	// get number of identities trained for this plugin
-	
-	// This involves filtering all trainings for this plugin
-	// from the TrainedPlugins table.  For small numbers of users
-	// it is simpler to do this; for large numbers of users
-	// (registered identities) it may be better to maintain another
-	// table which matches each plugin against its training count.
-
-	_LIT(KGetTrainedFmt, "SELECT IdentityId FROM TrainedPlugins WHERE PluginId=%u");
-	TBuf<(55 - 2) + 10> bufCmd;
-	bufCmd.Format(KGetTrainedFmt, aPluginId);
-	
-	TDbQuery q(bufCmd);
-	RDbView viewTp;
-	CleanupClosePushL(viewTp);
-	User::LeaveIfError(viewTp.Prepare(iAuthDbFile, q));
-	User::LeaveIfError(viewTp.EvaluateAll());
-	TInt trainCount = viewTp.CountL();
-	CleanupStack::PopAndDestroy(&viewTp);
-	
-	if (trainCount == 0)
-		return EAuthUntrained;
-
-	// get total number of identities in the database
-	RDbTable tableId;
-	OpenTableLC(tableId, KIdentitiesTableName, RDbRowSet::EReadOnly, KIdentitiesIndex);
-	TInt idCount = tableId.CountL();
-	CleanupStack::PopAndDestroy(&tableId);
-	
-	return (trainCount < idCount) ? EAuthTrained : EAuthFullyTrained;
-	}
-
-
-// -------- preferences --------
-
-
-void CAuthDb2::SetPreferredPluginL(TAuthPluginType aPluginType, TPluginId aPluginId)
-/**
-	Set the preferred plugin for the supplied plugin type.
-
-	If the type already has a preferred plugin type, its entry is
-	updated.  Otherwise, a new entry is created.
-
-	@param	aPluginType		Type of plugin to associate with a specific
-							plugin ID.
-	@param	aPluginId		Specific plugin to use for the plugin type.
- */
-	{
-	RDbTable table;
-
-	// start automatic transaction
-	if (FindPrefLC(table, RDbRowSet::EUpdatable, aPluginType))
-		table.UpdateL();
-	else
-		table.InsertL();
-	
-	table.SetColL(KPrefsTypeCol, (TUint) aPluginType);
-	table.SetColL(KPrefsIdCol, (TUint) aPluginId);
-	table.PutL();			// end automatic transaction
-
-	CleanupStack::PopAndDestroy(&table);
-	}
-
-
-void CAuthDb2::ClearPreferredPluginL(TAuthPluginType aPluginType)
-/**
-	Remove and preferred plugin ID for the supplied plugin type.
-	
-	If the supplied plugin type does not have a preferred plugin
-	then the database is not modified.
-
-	@param	aPluginType		Type of plugin to remove from the
-							Prefs table.
- */
-	{
-	RDbTable table;
-	if (FindPrefLC(table, RDbRowSet::EUpdatable, aPluginType))
-		table.DeleteL();
-
-	CleanupStack::PopAndDestroy(&table);
-	}
-
-
-TPluginId CAuthDb2::PreferredPluginL(TAuthPluginType aPluginType)
-/**
-	Retrieve the preferred plugin for the supplied plugin type.
-	If the plugin type does not have a preferred plugin this function
-	returns KUnknownPluginId.
-
-	@param	aPluginType		Plugin type to find preferred plugin for.
-	@return					Preferred plugin for aPluginType.  This is
-							KUnknownPluginId if the type does not
-							have a preferred plugin.
- */
-	{
-	TPluginId pluginId;
-
-	RDbTable table;
-	if (! FindPrefLC(table, RDbRowSet::EReadOnly, aPluginType))
-		pluginId = KUnknownPluginId;
-	else
-		{
-		table.GetL();
-		pluginId = static_cast<TPluginId>(table.ColUint(KPrefsIdCol));
-		}
-
-	CleanupStack::PopAndDestroy(&table);
-	return pluginId;
-	}
-
-
-TBool CAuthDb2::FindPrefLC(RDbTable& aTable, RDbRowSet::TAccess aAccess, TAuthPluginType aPluginType)
-/**
-	Open the Prefs table and navigate to the supplied plugin type.
-	On success the table handle is placed on the cleanup stack.
-
-	@param	aTable			Table handle to open.  On success this
-							is placed on the cleanup stack.
-	@param	aAccess			Mode in which the table should be opened.
-	@param	aPluginType		Plugin type to navigate to.
-	@return					Zero if could not find plugin type;
-							Non-zero otherwise.
- */
-	{
-	return OpenTableAndNavigateLC(aTable, KPrefsTableName, aAccess, KPrefsTypeIndex, aPluginType);
-	}
-
-
-// -------- trained plugins --------
-
-
-void CAuthDb2::SetTrainedPluginL(
-	TIdentityId aIdentityId, TPluginId aPluginId, const CTransientKeyInfo& aTransKeyInfo)
-/**
-	Sets the transient key for the supplied identity, plugin pair.
-
-	If the identity has already been trained for this plugin
-	then the existing record is replaced.
-
-	@param	aIdentityId		Identity to update.
-	@param	aPluginId		Plugin to associate with identity.
-	@param	aTransKeyInfo	The salt and encrypted protection key
-							for this identity / plugin pair.
-	@leave	KErrAuthServIdentityNotFound The supplied identity has
-							not been registered.
- */
-	{
-	RDbTable table;
-
-	TBool update = FindTrainedPluginLC(table, RDbRowSet::EUpdatable, aIdentityId, aPluginId);
-	
-	// start automatic transaction
-	if (update)
-		{
-		table.UpdateL();
-		}
-	else
-		{
-		CheckIdentityRegisteredL(aIdentityId);
-		table.InsertL();
-		}
-
-	table.SetColL(KTpIdentityIdCol, (TUint) aIdentityId);
-	table.SetColL(KTpPluginIdCol, (TUint) aPluginId);
-	
-	RDbColWriteStream dbcws;
-	dbcws.OpenLC(table, KTpTransientKeyCol);
-	aTransKeyInfo.ExternalizeL(dbcws);
-	dbcws.CommitL();
-	CleanupStack::PopAndDestroy(&dbcws);
-	table.PutL();
-	
-	CleanupStack::PopAndDestroy(&table);
-	}
-
-
-void CAuthDb2::RemoveTrainedPluginL(TIdentityId aIdentityId, TPluginId aPluginId)
-/**
-	Remove the transient key info (i.e. the encrypted protection key
-	and its salt) for the supplied identity, plugin pair.
-
-	@param	aIdentityId		Identity which should be trained for
-							the supplied plugin.
-	@param	aPluginId		Plugin which should be trained for the
-							supplied identity.
-	@leave	KErrAuthServTrainingNotFound Attempted to remove an
-							identity, plugin pair which was not in the
-							trained plugins table.
- */
-	{
-	RDbTable table;
-	TBool found = FindTrainedPluginLC(table, RDbRowSet::EUpdatable, aIdentityId, aPluginId);
-
-	if (! found)
-		User::Leave(KErrAuthServTrainingNotFound);
-
-	table.DeleteL();
-	CleanupStack::PopAndDestroy(&table);
-	}
-
-
-CTransientKeyInfo* CAuthDb2::KeyInfoL(TIdentityId aIdentity, TPluginId aPluginId)
-/**
-	Retrieve the transient key associated with the supplied identity,
-	plugin pair.
-
-	@param	aIdentity		Identity to search for.
-	@param	aPluginId		Plugin which should be registered
-							with the supplied identity.
-	@return					Transient key info, including encrypted
-							protection key, associated with identity,
-							plugin pair.
-	@leave KErrAuthServTrainingNotFound There was no transient key
-							information for the supplied identity,
-							plugin pair.
- */
-	{
-	RDbTable table;
-	TBool found = FindTrainedPluginLC(table, RDbRowSet::EReadOnly, aIdentity, aPluginId);
-	if (! found)
-		User::Leave(KErrAuthServTrainingNotFound);
-
-	table.GetL();
-	RDbColReadStream dbcrs;
-	dbcrs.OpenLC(table, KTpTransientKeyCol);
-	CTransientKeyInfo* keyInfo = CTransientKeyInfo::NewL(dbcrs);
-
-	CleanupStack::PopAndDestroy(2, &table);		// dbcrs, table
-	return keyInfo;
-	}
-
-
-TBool CAuthDb2::FindTrainedPluginLC(
-	RDbTable& aTable, RDbRowSet::TAccess aAccess,
-	TIdentityId aIdentityId, TPluginId aPluginId)
-/**
-	Helper function for SetTrainedPluginL and ClearTrainedPluginL.
-	This function opens the TrainedPlugins table and navigates to
-	the supplied identity, plugin pair if they are present.
-
-	@param	aTable			Table handle to open.
-	@param	aAccess			Mode in which to open the table.
-	@param	aIdentityId		Identity to navigate to.
-	@param	aPluginId		Plugin to navigate to.
-	@return					Zero if could not navigate to the
-							identity, plugin ID pair; non-zero
-							otherwise.
- */
-	{
-	OpenTableLC(aTable, KTpTableName, aAccess, KTpIndex);
-
-	TDbSeekMultiKey<2> dbsmk;
-	dbsmk.Add((TUint) aIdentityId);
-	dbsmk.Add((TUint) aPluginId);
-	return aTable.SeekL(dbsmk);
-	}
-
-
-// -------- helper functions --------
-
-
-TBool CAuthDb2::OpenTableAndNavigateLC(
-	RDbTable& aTable, const TDesC& aTableName, RDbRowSet::TAccess aAccess,
-	const TDesC& aIndexName, TUint aKey)
-/**
-	Open the described table and navigate to the identified row.
-
-	@param	aTable			Caller's table handle.  On success
-							this is placed on the cleanup stack.
-	@param	aTableName		Table to open in auth db.
-	@param	aAccess			Mode to open table in.
-	@param	aIndexName		Index to use for navigating.
-	@param	aKey			Key to find in database.
-	@return					Zero if could not find row in table;
-							Non-zero otherwise.
- */
-	{
-	OpenTableLC(aTable, aTableName, aAccess, aIndexName);
-
-	TDbSeekKey seekKey((TUint)aKey);	// from TUint32
-	return aTable.SeekL(seekKey);
-	}
-
-
-void CAuthDb2::OpenTableLC(
-	RDbTable& aTable, const TDesC& aTableName,
-	RDbRowSet::TAccess aAccess, const TDesC& aIndexName)
-/**
-	Open the named table in the supplied access mode,
-	and use the index on it.
-
-	@param	aTable			Caller's table handle.  On success
-							this is placed on the cleanup stack.
-	@param	aTableName		Table to open in the authentication db.
-	@param	aAccess			Mode to open table in.
-	@param	aIndexName		Index to activate on table.
- */
-	{
-	CleanupClosePushL(aTable);
-	User::LeaveIfError(aTable.Open(iAuthDbFile, aTableName, aAccess));
-
-	if (aAccess != RDbRowSet::EInsertOnly)
-		{
-		User::LeaveIfError(aTable.SetIndex(aIndexName));
-		}
-	}
-
-
-void CAuthDb2::CheckIdentityRegisteredL(TUint aIdentityId)
-/**
-	Checks if the supplied identity has been registered with
-	the database.  If not, it leaves with KErrAuthServIdentityNotFound.
-	
-	This function is used to validate arguments to other functions.
-	
-	@param	aIdentityId		Identity to search for.
-	@leave	KErrAuthServIdentityNotFound The supplied identity has not
-							been registered.
- */
-	{
-	CheckItemRegisteredL(
-		KIdentitiesTableName, KIdentitiesIndex,
-		aIdentityId, KErrAuthServIdentityNotFound);
-	}
-
-
-void CAuthDb2::CheckItemRegisteredL(
-	const TDesC& aTableName, const TDesC& aIndexName,
-	TUint aValue, TInt aNotFoundError)
-/**
-	Helper function for CheckIdentityRegisteredL.
-	
-	@param	aTableName		Name of table to search.
-	@param	aIndexName		Name of index to use on table.
-	@param	aValue			Key value to search for.
-	@param	aNotFoundError	If the key value cannot be found
-		`					then leave with this value.
- */
- 	{
-	RDbTable table;
-	if (! OpenTableAndNavigateLC(table, aTableName, RDbRowSet::EReadOnly, aIndexName, aValue))
-		User::Leave(aNotFoundError);
-	CleanupStack::PopAndDestroy(&table);
- 	}
-
-
-// -------- compaction --------
-
-
-const TInt KBlockSize = 512;
-const TInt KBlockMask = KBlockSize - 1;
-
-
-void CAuthDb2::CompactIfRequired()
-/**
-	Compacts the database file if compacting it would
-	recover at least one 512 byte block.
-	
-	This function does not report any error status
-	but, if the database is damaged, ConstructL will
-	attempt to repair it.
- */
-	{
-	TInt r = iAuthDbFile.UpdateStats();
-	
-	if (r == KErrNone)
-		{
-		RDbDatabase::TSize sz = iAuthDbFile.Size();
-		
-		// approx used bytes - sz.iUsage is a percentage
-		TInt usedBytes = sz.iUsage * 100;
-		if ((usedBytes & ~KBlockMask) < (sz.iSize & ~KBlockMask))
-			/* ignore */ iAuthDbFile.Compact();
-		}
-	}
-
-TIdentityId CAuthDb2::DefaultIdentityL()
-/**
- 	Return the default identity which is the first identity
- 	in the table when indexed based on the order of insertion.
-*/
-	{
-	TIdentityId identity(0);
-	RDbTable table;	
-	OpenTableLC(table, KIdentitiesTableName, RDbRowSet::EReadOnly, KIdIndexNum);
-	
-	//Position the cursor on the first row and retrieve the Identity.
-	if (table.FirstL())
-		{
-		table.GetL();
-		identity = table.ColUint32(KIdentitiesIdentityIdCol);
-		}	
-		
-	CleanupStack::PopAndDestroy(&table);
-	return identity;
-	}
--- a/authenticationservices/authenticationserver/source/server/authdb.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,159 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CAuthDb Authentication server data store declaration
-*
-*/
-
-
-/**
- @file 
- @released
- @internalComponent
-*/
-
-#ifndef AUTHDB_H
-#define AUTHDB_H
-
-#include <d32dbms.h>
-#include "authserver/authtypes.h"
-#include "authserver/idandstring.h"
-
-namespace AuthServer
-{
-
-class CTransientKeyInfo;
-
-NONSHARABLE_CLASS(CAuthDb2) : public CBase
-	{
-public:
-	static CAuthDb2* NewL(RFs& aFs);
-	static CAuthDb2* NewLC(RFs& aFs);
-	virtual ~CAuthDb2();
-	
-	// identities
-	TInt NumIdentitiesL();
-	void AddIdentityWithTrainedPluginL(
-		TIdentityId aIdentityId, const TDesC& aDesc,
-		const CTransientKeyInfo& aTransKeyInfo);
-	void AddIdentityL(TIdentityId aIdentityId, const TDesC& aDesc);
-	void RemoveIdentityL(TIdentityId aIdentityId);
-	void IdentitiesL(RArray<TIdentityId>& aResults);
-	HBufC* DescriptionL(TIdentityId aIdentityId);
-	void SetDescriptionL(TIdentityId aIdentityId, const TDesC& aDesc);
-	void IdentitiesWithDescriptionL(RIdAndStringArray& aList);
-	TIdentityId DefaultIdentityL();
-	// plugins
-	TInt NumPluginsL();
-	TInt NumTrainedPluginsL(TIdentityId aId);
-	// Returns list of plugins that are trained for the given identity
-	void TrainedPluginsListL(TIdentityId aIdentityId, RArray<TPluginId>& aTrainedPlugins);
-	TAuthTrainingStatus PluginStatusL(TPluginId aPluginId);
-
-	// preferences
-	void SetPreferredPluginL(TAuthPluginType aPluginType, TPluginId aPluginId);
-	void ClearPreferredPluginL(TAuthPluginType aPluginType);
-	TPluginId PreferredPluginL(TAuthPluginType aPluginType);
-
-	// trained plugins
-	void SetTrainedPluginL(
-		TIdentityId aIdentityId, TPluginId aPluginId, const CTransientKeyInfo& aTransKeyInfo);
-	void RemoveTrainedPluginL(TIdentityId aIdentityId, TPluginId aPluginId);
-	CTransientKeyInfo* KeyInfoL(TIdentityId aIdentity, TPluginId aPluginId);
-
-	void CompactIfRequired();
-	void CloseDbFile();
-	TInt OpenDbFileL(RFs& aFs, const TFileName& aDbName);
-	
-private:
-	void ConstructL(RFs& aFs);
-
-	void FindExistingIdentityLC(RDbTable& aTable, RDbRowSet::TAccess aAccess, TIdentityId aIdentityId);
-	TBool FindIdentityLC(RDbTable& aTable, RDbRowSet::TAccess aAccess, TIdentityId aIdentityId);
-
-	TBool FindPrefLC(RDbTable& aTable, RDbRowSet::TAccess aAccess, TAuthPluginType aPluginType);
-
-	TBool FindTrainedPluginLC(
-		RDbTable& aTable, RDbRowSet::TAccess aAccess,
-		TIdentityId aIdentityId, TPluginId aPluginId);
-
-	TBool OpenTableAndNavigateLC(
-		RDbTable& aTable, const TDesC& aTableName, RDbRowSet::TAccess aAccess,
-		const TDesC& aIndexName, TUint aKey);
-	void OpenTableLC(
-		RDbTable& aTable, const TDesC& aTableName,
-		RDbRowSet::TAccess aAccess, const TDesC& aIndexName);
-	void CheckIdentityRegisteredL(TUint aIdentityId);
-
-	void CheckItemRegisteredL(
-		const TDesC& aTableName, const TDesC& aIndexName,
-		TUint aValue, TInt aNotFoundError);
-	
-
-
-private:	
-	/**
-	 * The database file itself, used to persist identities
-	 * 	when the server is not in use.
-	 */
-	RDbNamedDatabase iAuthDbFile;
-	
-	/**
-	 * Keep track of whether the database is open or not.
-	 */
-	TBool iIsDbOpen;
-	
-	};
-
-
-// databases structure
-
-_LIT(KDbName, "!:\\private\\102740FC\\auth.db");
-
-/** Identities table name. */
-_LIT(KIdentitiesTableName, "Identities");
-/** Identities index number */
-_LIT(KIdentitiesIndex, "identityIdx");
-/** Identities index number.- Based on order of insertion */
-_LIT(KIdIndexNum, "idIndex");
-/** Identity column number in Identities table. */
-const TInt KIdentitiesIdentityIdCol = 2;
-/** Description column number in Identities table. */
-const TInt KIdentitiesDescCol = 3;
-
-/** Prefs table name. */
-_LIT(KPrefsTableName, "Prefs");
-/** Prefs index name. */
-_LIT(KPrefsTypeIndex, "typeIdx");
-
-/** Type column number in Prefs table. */
-const TInt KPrefsTypeCol = 1;
-/** PluginId column number is Prefs table. */
-const TInt KPrefsIdCol = 2;
-
-/** TrainedPlugins table name. */
-_LIT(KTpTableName, "TrainedPlugins");
-/** TrainedPlugins index name. */
-_LIT(KTpIndex, "identityPluginIdx");
-
-/** IdentityId column number in TrainedPlugins table. */
-const TInt KTpIdentityIdCol = 1;
-/** PluginId column number in TrainedPlugins table. */
-const TInt KTpPluginIdCol = 2;
-/** TransientKey column number in TrainedPlugins table. */
-const TInt KTpTransientKeyCol = 3;
-
-}	// namespace AuthServer
-
-#endif // AUTHDB_H
--- a/authenticationservices/authenticationserver/source/server/authmain.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,65 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* AuthServer startup code implementation
-*
-*/
-
-
-/**
- @file 
-*/
-
-#include "authserver_impl.h"
-
-using namespace AuthServer;
-
-namespace
-{
-
-/**
- * Perform all server initialisation, in particular creation of the
- * scheduler and server and then run the scheduler
- */
-static CScsServer* NewAuthServerLC()
-/**
-	This factory function is called by SCS.  It allocates
-	the server object and leaves it on the cleanup stack.
-
-	@return					New initialized instance of CScsTestServer.
-							On return this is on the cleanup stack.
- */
-	{
-	return AuthServer::CAuthServer::NewLC();
-	}
-
-}
-
-/**
- * Server process entry-point
- **/
-TInt E32Main()
-	{
-	TInt err = StartScsServer(NewAuthServerLC);
-
-	/**
-     *  err can either be KErrNone (AuthServer is started successfully) or  
-     *  KErrAlreadyExists(AuthServer is currently running). Panic for all other
-     *  cases.
-	 **/
-		
-	__ASSERT_DEBUG(err == KErrNone || err == KErrAlreadyExists, User::Panic(KAuthServerShortName, err));
-	return err;
-	}
-
--- a/authenticationservices/authenticationserver/source/server/authrepository.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,143 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* authrepository - Central Repository methods implementation
-*
-*/
-
-
-/**
- @file 
-*/
-
-#include "authrepository.h"
-#include "authserver_impl.h"
-
-using namespace AuthServer;
-
-CAuthRepository* CAuthRepository::NewL()
-	{
-	CAuthRepository* self = CAuthRepository::NewLC();
-	CleanupStack::Pop(self);
-	return self;
-	}
-
-
-CAuthRepository* CAuthRepository::NewLC()
-	{
-	CAuthRepository* self = new (ELeave)CAuthRepository();
-	CleanupStack::PushL(self);
-	self->ConstructL();
-	return self;
-	}
-
-void CAuthRepository::ConstructL()
-	{
-	iRepository = CRepository::NewL(KUidAuthServerRepository);
-	}
-
-
-CAuthRepository::~CAuthRepository()
-	{
-	delete iRepository;
-	}
-
-
-
-/**
-	Retrieves the default system wide plugin Id as defined in the 
-	central repository file
-
-
-	@leave	KErrArgument			If the default plugin is not
-									defined in the central repository 
-									file.
-									
-	@return  The retrieved Plugin Id from the repository is returned.								
-									
- */
-
-TPluginId CAuthRepository::DefaultPluginL() const
-	{
-	//Read the default plugin value from the configuration file.
-	TInt defaultPlugin(0);
-	User::LeaveIfError(iRepository->Get(KAuthDefaultPlugin, defaultPlugin));
- 	
-	//If the default plugin is not set.
-	if(defaultPlugin == 0)
-		{	
-		User::Leave(KErrArgument);
-		}
-	
-	return defaultPlugin;
-	
-	}
-
-
-/**
-	Retrieves the authentication alias as defined in the authserver's 
-	central repository file .
-	
-	@param	aAuthAliasList			An array to be populated with the
-									authentication alias as obtained 
-									from the authserver's central repository 
-									file.
-	@leave	KErrArgument			when the count of authentication aliases
-									in authserver's central repository file is
-									negative.
-	@leave	KErrNotFound			when there is no authentication aliases
-									defined in authserver's central repository file.
- */
- 
- void CAuthRepository::ListAliasL(RPointerArray<HBufC>& aAuthAliasList)
-	{
-	TInt authStrengthAliasCount(0);
- 	 
-	User::LeaveIfError(iRepository->Get(EAuthAliasesCount, authStrengthAliasCount));
-	
-	// leave if the count is a negative value.
-	if(authStrengthAliasCount < 0)
-		User::Leave(KErrArgument);
-	
-	// leave with KErrNotFound when the count is zero.
-	if(authStrengthAliasCount == 0)
-		User::Leave(KErrNotFound);
-	
-	for(TInt i = 0; i < authStrengthAliasCount; ++i)
-		{
-		HBufC* strengthAlias = HBufC::NewLC(KMaxDescLen);
-		TPtr value(strengthAlias->Des());
-		User::LeaveIfError(iRepository->Get(EAuthAliases+i, value));
-		aAuthAliasList.AppendL(strengthAlias);
-		CleanupStack::Pop(strengthAlias);
-		}
-	}
- 
-
- /**
- 	Retrieves the authentication definition corresponding to the alias 
- 	as defined in the authserver's central repository file .
- 	
- 	@param	aKey					The index of the authentication alias
- 									in the central repository file.
- 									zero.
- 	
- 	@param	aValue					The retrieved definition value for 
- 									the alias.		
-  */
-
- void CAuthRepository::GetAliasDefinitionL(TInt aKey, TDes16& aValue)
-	 {
-	 User::LeaveIfError(iRepository->Get(EAuthAliasesExpr+aKey, aValue));
-	 }
--- a/authenticationservices/authenticationserver/source/server/authserver.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,2011 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CAuthServer implementation
-*
-*/
-
-
-/**
- @file 
-*/
-
-#include <s32mem.h>
-#include <s32file.h>
-#include <ecom/ecom.h>
-#include <pbedata.h>
-#include <scs/cleanuputils.h>
-#include "authserver_impl.h"
-#include "authtransaction.h"
-#include "authserver/aspubsubdefs.h"
-#include "authserverutil.h"
-
-using namespace AuthServer;
-
-const TUint CAuthServer::iRangeCount = KPolicyRanges;
-
-const TInt CAuthServer::iRanges[KPolicyRanges] = 
-	{
-	0,
-	CScsServer::EBaseSession,
-	CScsServer::EBaseSession |ERequireNoCapabilities, 		   // accessible by all clients.
-	CScsServer::EBaseSession |ERequireReadUserData,		   	   // accessible by ReadUserData clients only.
-	CScsServer::EBaseSession |ERequireWriteUserData,	   	   // accessible by WriteUserData clients only.
-	CScsServer::EBaseSession |ERequireReadDeviceData, 	       // accessible by ReadDeviceData clients only.
-	CScsServer::EBaseSession |ERequireWriteDeviceData,         // accessible by WriteDeviceData clients only.
-	CScsServer::EBaseSession |ERequireTrustedUi,               // accessible by TrustedUi clients only.
-	CScsServer::EBaseSession |ERequireReadDeviceAndUserData,   // accessible by clients with both
-																// ReadUserData and ReadDeviceData.
-	CScsServer::EBaseSession |ERequireCustomCheck,		       // Require custom check.
-	CScsServer::EBaseSession |ELastService,
-	CScsServer::EBaseMustAllow     			                   // SCS Internal.
-	};
-
-const TUint8 CAuthServer::iElementsIndex[iRangeCount] = 
-	{
-	CPolicyServer::ENotSupported,
-	CPolicyServer::EAlwaysPass,
-	0,  // all clients can have access 
-	1,  // ReadUserData clients only
-	2,  // WriteUserData clients only
-	3,	// ReadDeviceData
-	4,  // WriteDeviceData
-	5,  // trusted ui
-	6,  // ReadUserData and ReadDeviceData
-	CPolicyServer::ECustomCheck,	// custom check
-	CPolicyServer::EAlwaysPass, 
-	CPolicyServer::EAlwaysPass, 
-	};
-
-const CPolicyServer::TPolicyElement CAuthServer::iPolicyElements[] = 
-	{
-	{_INIT_SECURITY_POLICY_C1(ECapability_None), CPolicyServer::EFailClient},
-	{_INIT_SECURITY_POLICY_C1(ECapabilityReadUserData), CPolicyServer::EFailClient},
-	{_INIT_SECURITY_POLICY_C1(ECapabilityWriteUserData), CPolicyServer::EFailClient},
-	{_INIT_SECURITY_POLICY_C1(ECapabilityReadDeviceData), CPolicyServer::EFailClient}, 
-	{_INIT_SECURITY_POLICY_C1(ECapabilityWriteDeviceData), CPolicyServer::EFailClient},
-	{_INIT_SECURITY_POLICY_C1(ECapabilityTrustedUI), CPolicyServer::EFailClient},
-	{_INIT_SECURITY_POLICY_C2(ECapabilityReadDeviceData, ECapabilityReadUserData), CPolicyServer::EFailClient},
-	};
-
-const CPolicyServer::TPolicy CAuthServer::iPolicy =
-	{
-		CPolicyServer::EAlwaysPass, // so that any client can connect	
-		iRangeCount,                                   
-		iRanges,
-		iElementsIndex,
-		iPolicyElements,
-	};
-
-_LIT_SECURITY_POLICY_S0(CAuthServer::iPropertyWritePolicy, KAuthServerSecureId.iUid);
-_LIT_SECURITY_POLICY_PASS(CAuthServer::iPropertyReadPolicy);
-
-
-inline CAuthServer::CAuthServer(CActive::TPriority aPriority)
-	:CScsServer(TVersion(1,0,0), iPolicy, aPriority)
-	{}
-	
-CAuthServer* CAuthServer::NewLC(CActive::TPriority aPriority)
-	{
-	CAuthServer* self = new(ELeave) CAuthServer(aPriority);
-	CleanupStack::PushL(self);
-	self->ConstructL();
-	return self;
-	}
-
-void CAuthServer::ConstructL()
-    {
-    // Delay starting of shutdown timer till we finish construction since
-    // loading of ECOM plugins takes a while
-    CScsServer::ConstructL(0);
-    TInt r;
-    StartL(KAuthServerName);
-	r = iFs.Connect();
-    User::LeaveIfError(r);
-    r = iFs.CreatePrivatePath(RFs::GetSystemDrive());
-    User::LeaveIfError(r);
-
-    // Retrieve the key size to be used for protection keys
-	CPBEncryptElement* pbee = CPBEncryptElement::NewLC(_L(""));
-    iKeySize = pbee->EncryptionData().AuthData().Key().Size();
-    CleanupStack::PopAndDestroy(pbee);
-    iAuthRepository = CAuthRepository::NewL();
-	iAuthDb2 = CAuthDb2::NewL(iFs);
-	iPluginMgr  = CPluginMgr::NewL();
-    iPluginObserver = CPluginObserver::NewL(*iPluginMgr);
-    iEvaluator = CEvaluator::NewL(this,this);
-    iTrainingMgr = new (ELeave) CTrainingMgr(*iPluginMgr, *iAuthDb2, *iAuthRepository);
-	TUid clientSid = {0};
-	iParams = CAuthParams::NewL(0,
-								EFalse,
-								clientSid,
-								EFalse,
-								KNullDesC());
-    CreatePropertiesL();
-	FirstStartL();
-
-	// Construction complete, now start the shutdown timer
-	CScsServer::EnableShutdownTimerL(AuthServer::KDefaultShutdownDelay);
-    }
-    
-    
-CPolicyServer::TCustomResult CAuthServer::CustomSecurityCheckL(const RMessage2& aMessage, 
-	TInt& /*aAction*/, TSecurityInfo& aMissing)
-	{
-	TInt KAuthParams = 1; 
-	TInt paramsLen = aMessage.GetDesLength(KAuthParams);
-	
-	if(paramsLen != KErrBadDescriptor)
-		{
-		//Create a buffer.
-		HBufC8* buffer = HBufC8::NewLC(paramsLen);
-		TPtr8 bufDes(buffer->Des());
-		aMessage.ReadL(EIpcArgument1, bufDes);
-			
-		//Internalize the params object.
-		RDesReadStream readStream(*buffer);
-		CleanupClosePushL(readStream);
-		iParams->InternalizeL(readStream);
-		CleanupStack::PopAndDestroy(2, buffer);
-		}
-
-	TBool clientKey = iParams->iClientKey;
-	TBool withString = iParams->iWithString;
-	TInt clientSid = iParams->iClientSid.iUid;
-		
-	if((!clientKey || withString || ((clientSid != aMessage.SecureId()) && clientSid != 0 )) && !(aMessage.HasCapability(ECapabilityReadUserData)))
-		{
-		// Missing ReadUserData capability.
-		aMissing.iCaps.Set(ECapabilityReadUserData);
-		return CPolicyServer::EFail;
-		}	
-		
-	else
-		{
-		return CPolicyServer::EPass;	
-		}
-	}
-	
-/**
- * Creates and initialises the two AuthServer properties -
- * KUidAuthServerLastAuth and KUidAuthServerAuthChangeEvent.
- *
- **/
-void CAuthServer::CreatePropertiesL()
-	{
-	// KUidAuthServerLastAuth
-	TInt err1 = iAuthProperty.Define(KUidAuthServerLastAuth, RProperty::EText,
-									iPropertyReadPolicy, iPropertyWritePolicy,
-									sizeof(TLastAuth));
-
-	User::LeaveIfError(iAuthProperty.Attach(KAuthServerSecureId,
-											KUidAuthServerLastAuth));
-
-	
-	// KUidAuthServerAuthChangeEvent
-	TInt err2 = iAuthEventProperty.Define(KUidAuthServerAuthChangeEvent,
-									RProperty::EInt,
-									iPropertyReadPolicy,
-									iPropertyWritePolicy);
-	
-	User::LeaveIfError(iAuthEventProperty.Attach(KAuthServerSecureId,
-												 KUidAuthServerAuthChangeEvent));
-
-	if (err1 == KErrNone || err2 == KErrNone )
-		{
-		ClearPropertiesL();
-		}
-	}
-
-void CAuthServer::ClearPropertiesL()
-	{
-	TLastAuth lastAuth;
-	TPckg<TLastAuth> authPckg(lastAuth);
-	User::LeaveIfError(iAuthProperty.Set(authPckg));
-	User::LeaveIfError(iAuthEventProperty.Set(KUnknownIdentity));
-	}
-
-
-/**
- * Checks the number of identities in the database and iff zero asks the
- * training mgr to register the first identity.
- *
- * @leave KErrAuthServerCanNotCreateFirstId if the first identity cannot
- * be created
- **/
-void CAuthServer::FirstStartL()
-	{
-	TInt numIds = iAuthDb2->NumIdentitiesL();
-	if (numIds == 0)
-		{
-		TIdentityId id = 0;
-		TPckg<TIdentityId> idPkg(id);
-		TRandom::RandomL(idPkg);
-		
-		CProtectionKey* key = CProtectionKey::NewL(iKeySize);
-		if (!iTrainingMgr->RegisterFirstIdentityL(id, *key))
-			{
-			User::Panic(KAuthServerShortName, EPanicNoFirstStartPlugin);
-			}
-		}
-	}
-
-CAuthServer::~CAuthServer()
-	{
-	delete iAuthRepository;
-	delete iAuthTransaction;
-	
-	delete iTrainingMgr;
-	delete iLastIdentity;
-	delete iEvaluator;
-	delete iPluginMgr;
-	delete iPluginObserver;	
-	delete iParams;
-	if (iAuthDb2 != 0)
-		{
-		iAuthDb2->CompactIfRequired();
-		delete iAuthDb2;
-		}
-	
-	iFs.Close();
-	REComSession::FinalClose();
-	}
-
-		
-/**
- *  Creates a new session
- * @param aClientVersion the version of the connecting client
- * @param aMessage the connect message
- */
-CScsSession* CAuthServer::DoNewSessionL(const RMessage2& /*aMessage*/)
-	{
-	return CAuthServerSession::NewL(*this);
-	}
-
-
-/**
- * Returns the last identity to be authenticated within the period 
- * currTime to currTime-timeout.  
- * 
- * @param currTime the current universal time
- * 
- * @param timeout the number of seconds within which the last
- * authentication should have been made
- *
- * @return 0 if there has been no previous authentications either in the
- * server lifetime or within the timeout period. 
- *
- * @return a pointer to the cached identity object
- **/
-CIdentity* CAuthServer::CachedIdentity( const TTimeIntervalSeconds& aTimeOut)
-    {
-    // process request
-    TTime currentTime;
-	if(currentTime.UniversalTimeSecure() == KErrNoSecureTime)
-		{
-		// Fall back to nonsecure time. 
-		currentTime.UniversalTime();
-		}
-    
-    CIdentity* id = 0;
-  
-    TTimeIntervalSeconds timeSinceLast;
-    currentTime.SecondsFrom(iLastAuthTime, timeSinceLast);    
-   
-    if (timeSinceLast.Int() >= 0 && timeSinceLast < aTimeOut)
-		{
-		id = iLastIdentity;
-		}
-    
-    return id;
-    }
-    
-
-
-/**
- *
- * @param aMessage the message to process
- **/
-void CAuthServer::DeauthenticateL(const RMessage2& aMessage)
-	{
-	if (ServerBusy())
-		{
-		aMessage.Complete(KErrServerBusy);
-		return;
-		}
-
-	delete iLastIdentity;
-	iLastIdentity = 0;
-	iLastAuthTime = 0L;
-
-	ClearPropertiesL();	
-	aMessage.Complete(KErrNone);
-	}
-
-HBufC* CAuthServer::StringOrNullLC(TBool aReturnString, TIdentityId aId)
-    {
-	HBufC* str = 0;
-	if (aReturnString)
-		{
-		TRAPD(err, str = iAuthDb2->DescriptionL(aId));  
-		if (!err)
-			{
-			CleanupStack::PushL(str);
-			}
-		
-		}
-	if (str == 0)
-		{
-		str = HBufC::NewLC(0);  
-		}
-	return str;
-    }
-
-void CAuthServer::AuthenticateL(const RMessage2& aMessage)
-    {
-	if (ServerBusy())
-		{
-		aMessage.Complete(KErrServerBusy);
-		return;
-		}
-		
-	TInt KAuthParams = 1; 
-	TInt paramsLen = aMessage.GetDesLength(KAuthParams);
-	
-	if(paramsLen != KErrBadDescriptor)
-		{
-		//Create a buffer.
-		HBufC8* buffer = HBufC8::NewLC(paramsLen);
-		TPtr8 bufDes(buffer->Des());
-			
-		aMessage.ReadL(EIpcArgument1, bufDes);
-		
-		//Internalize the params object.
-		RDesReadStream readStream(*buffer);
-		CleanupClosePushL(readStream);
-		iParams->InternalizeL(readStream);
-		CleanupStack::PopAndDestroy(2, buffer);	
-		}
-    
-	CIdentity* id = CachedIdentity(iParams->iTimeout);
-  
-	if (id == 0) // no valid cache available
-		{
-		const TInt KAuthExprParam = 0;
-	
-		// reconstruct the authentication expression
-		TInt extLen = aMessage.GetDesLengthL(KAuthExprParam);
-		HBufC8* extSrv = HBufC8::NewLC(extLen);
-		TPtr8 desSrv8 = extSrv->Des();
-		aMessage.ReadL(KAuthExprParam, desSrv8);
-		
-		RDesReadStream drs(desSrv8);
-		CAuthExpression* authExpr = CAuthExpressionImpl::NewL(drs);
-		// don't need the stream any more, so free it
-		CleanupStack::PopAndDestroy(extSrv);
-		CleanupStack::PushL(authExpr);
-
-		const CAuthExpressionImpl* expr = static_cast<const CAuthExpressionImpl*>(authExpr);
-		
-		iAuthTransaction = CAuthTransaction::NewL(aMessage,
-												  iParams->iClientKey,
-												  iParams->iClientSid.iUid,
-												  iParams->iWithString,
-												  *iParams->iClientMessage,
-												  expr);
-		CleanupStack::Pop(authExpr);
-		
-		iEvaluator->Evaluate(expr);
-		
-		return;
-        }
-        
-	else if (iParams->iClientKey && (id->Id() != KUnknownIdentity))
-		{
-		
-		HBufC* str = StringOrNullLC(iParams->iWithString, id->Id());
-		CIdentity* id2 = 0;
-		
-		TInt clientId = aMessage.SecureId();
-		
-		if(iParams->iClientSid.iUid != 0)
-			{
-			clientId = iParams->iClientSid.iUid;
-			}
-		
-		id2 = CIdentity::NewL(id->Id(), id->Key().ClientKeyL(clientId), str);
-			
-		CleanupStack::Pop(str);
-		CleanupStack::PushL(id2);
-		// id pointer already stored as iLastIdentity
-		id = id2; 
-		}
-  
-	CompleteAuthenticationL(aMessage, id);
-  
-	if (id != iLastIdentity) 
-		{
-		// only clean up the allocated id if it has not been transferred to us.
-		CleanupStack::PopAndDestroy(id);  
-		}
-   
-	}
-
-// -------- plugin lists --------
-
-
-/**
-	Build an array containing descriptions for the
-	plugins available on the system and send it to
-	the client.
-	
-	@param	aMessage		Message describing client
-							request.
-	@param	aFilter			Function which decides whether
-							or not to include a plugin in the
-							list.
- */
-void CAuthServer::FilterPluginsL(
-	const RMessage2& aMessage, CAuthServer::TInterfaceFilter aFilter)
-
-	{
-	RCPointerArray<const CPluginDesc> descs;
-	GetDescriptionsFromEComLC(aFilter, descs);
-	AuthServerUtil::SendDataPointerArrayL(aMessage, descs, 0);
-	CleanupStack::PopAndDestroy(&descs);
-	}
-
-
-/**
-	Populate the supplied array with plugin descriptions generated
-	from the available ECOM plugins.
-	
-	@param	aFilter			Predicate function decides whether or not
-							to include each plugin in the list.
-	@param	aDescs			Array to populate.  When this function is
-							called, any existing entries are removed.
-							If this function leaves then any entries are
-							removed from the array.  On success, the
-							array is on the cleanup stack.
- */
-void CAuthServer::GetDescriptionsFromEComLC(
-	CAuthServer::TInterfaceFilter aFilter,
-	RCPointerArray<const CPluginDesc>& aDescs)
-	{
-	aDescs.Reset();
-	CleanupClosePushL(aDescs);
-	
-	// ownership of the data pointed by this array is with 
-	// the plugin manager. 
-	const RPointerArray<CImplementationInformation>& implInfo = iPluginMgr->ImplementationsL();
-	TInt implCount = implInfo.Count();
-	
-	for (TInt i = 0; i < implCount; ++i)
-		{
-		// avoid RVCT warning C2874W: pi may be used before being set
-		CAuthPluginInterface* pi = 0;
-		
-		TRAPD(r, pi = iPluginMgr->ImplementationL(i));
-		
-		// skip plugins which are not available
-		if (KErrNone != r)
-			continue;
-		
-		if (! (this->*aFilter)(*pi))
-			{
-			continue;
-			}
-		
-		// get training status from db
-		TAuthTrainingStatus ts = iAuthDb2->PluginStatusL(pi->Id());
-		
-		CPluginDesc* pd = CPluginDesc::NewL(
-			pi->Id(), pi->Name(), pi->Type(),
-			ts, pi->MinEntropy(),
-			pi->FalsePositiveRate(), pi->FalseNegativeRate() );
-				
-		CleanupStack::PushL(pd);
-		aDescs.AppendL(pd);
-		CleanupStack::Pop(pd);
-		}
-	
-	}
-
-
-
-/**
-	Build an array containing plugin descriptions for
-	each plugin which is available on the system, and
-	copy this into the client's space.
-	
-	@param	aMessage		Client message.  This contains
-							the client-side buffer.
- */
-void CAuthServer::PluginsL(const RMessage2& aMessage)
-	{
-	FilterPluginsL(aMessage, &CAuthServer::FilterAllPlugins);
-	}
-
-
-/**
-	Predicate function used by PluginsL.. This accepts all plugins.
-	
-	@return					Always ETrue.
-	@see PluginsL
- */
-TBool CAuthServer::FilterAllPlugins(const CAuthPluginInterface&)
-	{
-	return ETrue;
-	}
-
-
-/**
- *
- * @param aMessage the message to process
- **/
-void CAuthServer::ActivePluginsL(const RMessage2& aMessage)
-	{
-	FilterPluginsL(aMessage, &CAuthServer::FilterActivePlugins);
-	}
-
-
-/**
- * Indicates a plugin is active. 
- *
- * @param aInterface the auth plugin interface to check
- * @return true if aInterface.IsActive()
- **/
-TBool CAuthServer::FilterActivePlugins(const CAuthPluginInterface& aInterface)
-	{
-	return aInterface.IsActive();
-	}
-
-
-/**
-	Build an array which containing plugin descriptions
-	for each plugin which is available and has the type
-	supplied by the client.
-	
-	@param	aMessage		Client message.  This contains
-							the plugin type and points to the
-							client-side buffer.
- */
-void CAuthServer::PluginsByTypeL(const RMessage2& aMessage)
-	{
-	iFilterType = static_cast<TAuthPluginType>(aMessage.Int1());
-	FilterPluginsL(aMessage, &CAuthServer::FilterPluginsByType);
-	}
-
-
-/**
-	Predicate which checks whether the supplied description should
-	be included in the result list.
-	
-	The type to filter on is stored as a member variable.
-	
-	@param	aInterface		Interface to check.
-	@return					Zero if interface's type does not match
-							filter type, non-zero otherwise.
-	@see PluginsByTypeL
- */
-TBool CAuthServer::FilterPluginsByType(const CAuthPluginInterface& aInterface)
-	{
-	return (aInterface.Type() == iFilterType);
-	}
-
-
-/**
-	Build an array which contains plugin descriptions
-	for each plugin which has the supplied training status,
-	and write that array into the caller's space.
-	
-	@param	aMessage		Client message contains the status
-							to filter on.
- */
-void CAuthServer::PluginsByTrainingL(const RMessage2& aMessage)
-	{
-	iFilterTraining = static_cast<TAuthTrainingStatus>(aMessage.Int1());
-	FilterPluginsL(aMessage, &CAuthServer::FilterPluginsByTraining);
-	}
-
-
-/**
-	Predicate checks if the supplied interface describes
-	a plugin with the required training status.
-	
-	@param	aInterface		Interface to check.
-	@return					Zero if interface's training status
-							does not match the filter status;
-							non-zero otherwise.
-	@see PluginsByTrainingL
- */
-TBool
-CAuthServer::FilterPluginsByTraining(const CAuthPluginInterface& aInterface)
-	{
-	// training status is stored in the db, not in the ECOM interface.
-	// If this function returns non-zero, the same request will be made
-	// on the DB to get the status again to construct the description.
-	// This is suboptimal, and could be improved by special-casing the
-	// training filter if required.
-
-	TAuthTrainingStatus ts = EAuthUntrained;
-	TRAPD(err, ( ts = iAuthDb2->PluginStatusL(aInterface.Id())));
-	return err == KErrNone ? ts == iFilterTraining : EFalse;
-	}
-
-
-/**
-	Populate a client-side array with the set of identities.
-	
-	@param	aMessage		Client message which points to the
-							user-side array.
- */
-void CAuthServer::IdentitiesL(const RMessage2& aMessage)
-	{
-    RArray<TIdentityId> ids;
-    iAuthDb2->IdentitiesL(ids);
-    CleanupClosePushL(ids);
-    AuthServerUtil::SendDataArrayL(aMessage, ids, 0);
-    CleanupStack::PopAndDestroy(&ids);
-	}
-/**
-	Retrieve the preferred plugin for the specified type
-	
-	@param	aMessage		Client message
- */
-void CAuthServer::PreferredTypePluginL(const RMessage2& aMessage)
-	{
-    TPluginId id =
-	  iAuthDb2->PreferredPluginL(static_cast<TAuthPluginType>(aMessage.Int0()));
-	
-	TPckg<TPluginId> idPckg(id);
-	aMessage.WriteL(1, idPckg);
-	aMessage.Complete(KErrNone);
-	}
-
-/**
-	Set the preferred plugin for the specified type
-	
-	@param	aMessage		Client message
- */
-void CAuthServer::SetPreferredTypePluginL(const RMessage2& aMessage)
-	{
-	TInt            err        = KErrArgument;
-	TAuthPluginType pluginType = static_cast<TAuthPluginType>(aMessage.Int0());
-	TPluginId       pluginId   = aMessage.Int1();
-	
-	if (iPluginMgr->PluginL(pluginId)->Type() == pluginType)
-		{
-		iAuthDb2->SetPreferredPluginL(pluginType,pluginId);
-		err = KErrNone;
-		}
-	aMessage.Complete(err);
-	}
-
-/**
-	Retrieve description for a supplied identity.
-	
-	@param	aMessage		Client message which contains the
-							identity and points to a client-side
-							buffer, to which the description will
-							be copied.
- */
-void CAuthServer::IdentityStringL(const RMessage2& aMessage)
-	{
-	HBufC* desc = iAuthDb2->DescriptionL(aMessage.Int1());
-	CleanupStack::PushL(desc);
-	aMessage.WriteL(EIpcArgument0, *desc);	
-	CleanupStack::PopAndDestroy(desc);
-	aMessage.Complete(KErrNone);	
-	}
-
-/**
-	Retrieve description & id for all identities.
-	
-	@param	aMessage		Client message which contains the
-							identity and points to a client-side
-							buffer, to which the description will
-							be copied.
- */
-void CAuthServer::IdentitiesWithStringL(const RMessage2& aMessage)
-	{
-	RIdAndStringArray result;
-
-	iAuthDb2->IdentitiesWithDescriptionL(result);
-	CleanupClosePushL(result);
-
-	AuthServerUtil::SendDataPointerArrayL(aMessage,result,0);
-	CleanupStack::PopAndDestroy(&result);
-	}
-
-/**
- *
- * @param aMessage the message to process
- **/
-void CAuthServer::SetIdentityStringL(const RMessage2& aMessage)
-	{
-	HBufC* str = HBufC::NewLC(aMessage.GetDesLengthL(1));
-	TPtr strDes = str->Des();
-	TInt err = aMessage.Read(1, strDes);
-
-	if (err == KErrNone)
-	  {
-	  iAuthDb2->SetDescriptionL(aMessage.Int0(), *str);
-	  }	
-	CleanupStack::PopAndDestroy(str);
-	aMessage.Complete(err);
-	}
-
-
- 
-/**
-	Copies the authentication alias list obtained using 
-	ListAliasL() method to a client-side buffer .
-	
-	@param	aMessage		Client message which points to a client-side
-							buffer, to which the authentication strength 
-							list will be copied.
- */
- 
-void CAuthServer::ListAuthAliasesL(const RMessage2& aMessage)
-	{
-	RPointerArray<HBufC> aliasList;
-	CleanupResetAndDestroyPushL(aliasList);
-	
-	//get the list of available authentication strengths from the cenrep file.
-	iAuthRepository->ListAliasL(aliasList);
-
-	AuthServerUtil::SendDataPointerArrayL(aMessage, aliasList, EIpcArgument0);
-	CleanupStack::PopAndDestroy(&aliasList);
-	}
-	
-/**
-	Resolves any alias occurrence in the expression to its corresponding
-	value. 
-	
-	@param	aMessage	Client message which contains the free form
-						authentication expression and points to a 
-						client-side buffer, to which the string will 
-						be copied.
-	
- */
-void CAuthServer::ResolveExpressionL(const RMessage2& aMessage)
-	{
-	
-	// the auth strength passed by the client. 
-	TInt length = aMessage.GetDesLength(EIpcArgument1);
-	HBufC* clientExpression = HBufC::NewLC(length);
-	TPtr clientExprPtr(clientExpression->Des());
-
-	aMessage.ReadL(EIpcArgument1, clientExprPtr);
-	
-	RBuf resultantString;
-	CleanupClosePushL(resultantString);
-	
-	resultantString.CreateL(KDefaultBufferSize/2);
-		
-	// get the alias list
-	RPointerArray<HBufC> aliasList;
-	CleanupResetAndDestroyPushL(aliasList);
-	
-	//get the list of available authentication strength from the cenrep file.
-	iAuthRepository->ListAliasL(aliasList);
-		
-		
-	// parse the client side expression to see whether there
-	// are any alias, if present process them accordingly.
-	TLex input(clientExprPtr);
-	
-	// append the open bracket first so that the entire expression is within brackets.
-	resultantString.Append(KOpenBracket);
-	
-	for(TPtrC token = input.NextToken(); token.Size() > 0; token.Set(input.NextToken()))
-		{
-		
-		if(	token.CompareF(KOpenBracket) == 0 ||
-			token.CompareF(KCloseBracket) == 0 ||
-			token.CompareF(KAuthOpAnd) == 0 ||
-			token.CompareF(KAuthOpOr) == 0
-			)
-			{
-			int reqdBufferLength = resultantString.Length() + token.Length();			
-			
-			if(resultantString.MaxLength() < reqdBufferLength)
-				{
-				if(resultantString.MaxLength() == 0)
-					{
-					resultantString.Close();
-					}
-				resultantString.ReAllocL(reqdBufferLength);
-				}
-						
-			resultantString.Append(token);
-			}
-		else if(token.CompareF(KAuthBiometric) == 0 ||
-				token.CompareF(KAuthDefault) == 0 ||
-				token.CompareF(KAuthKnowledge) == 0 ||
-				token.CompareF(KAuthToken) == 0 ||
-				token.CompareF(KAuthPerformance) == 0	)
-			{
-			RBuf tokenType;
-			CleanupClosePushL(tokenType);
-			TokenizeStringL(token, tokenType);
-			int reqdBufferLength = resultantString.Length() + tokenType.Length();
-			if(resultantString.MaxLength() < reqdBufferLength)
-				{
-				if(resultantString.MaxLength() == 0)
-					{
-					resultantString.Close();
-					}
-				resultantString.ReAllocL(reqdBufferLength);
-				}
-			
-			resultantString.Append(tokenType);
-			CleanupStack::PopAndDestroy(&tokenType);
-			}
-		else
-			{
-			// should not be a number
-			TInt32 val = 0;
-			TLex value(token);
-			if(value.Val(val) == KErrNone)
-				{
-				RBuf tokenPluginId;
-				CleanupClosePushL(tokenPluginId);
-				TokenizeStringL(token, tokenPluginId);
-				int reqdBufferLength = resultantString.Length() + tokenPluginId.Length();
-				if(resultantString.MaxLength() < reqdBufferLength)
-					{
-					if(resultantString.MaxLength() == 0)
-						{
-						resultantString.Close();
-						}
-					resultantString.ReAllocL(reqdBufferLength);
-					}
-				resultantString.Append(tokenPluginId);
-				CleanupStack::PopAndDestroy(&tokenPluginId);
-				continue;
-				}
-			
-			RBuf aliasString;
-			CleanupClosePushL(aliasString);
-				
-			// this is a alias value which should be processed
-			ResolveAliasL(token, aliasList, aliasString);
-			int reqdBufferLength = resultantString.Length() + aliasString.Length();
-			if(resultantString.MaxLength() < reqdBufferLength)
-				{
-				if(resultantString.MaxLength() == 0)
-					{
-					resultantString.Close();
-					}
-				resultantString.ReAllocL(reqdBufferLength);
-				}
-			resultantString.Append(aliasString);
-			CleanupStack::PopAndDestroy(&aliasString);
-			}
-		}
-	
-	int reqdBufferLength = resultantString.Length() + KCloseBracket().Length();
-	
-	if(resultantString.MaxLength() < reqdBufferLength)
-		{
-		if(resultantString.MaxLength() == 0)
-			{
-			resultantString.Close();
-			}
-		resultantString.ReAllocL(reqdBufferLength);
-		}
-										
-	// append the close bracket in the end so that the entire expression is within brackets.
-	resultantString.Append(KCloseBracket);
-					
-	//see if we have enough space on the client.
-	length = resultantString.Length();
-	if(aMessage.GetDesMaxLengthL(EIpcArgument0) < length)
-		{
-		TPckg<TInt> lenPckg(length);
-		aMessage.WriteL(EIpcArgument0, lenPckg);
-		aMessage.Complete(KErrOverflow);
-		}
-	
-	aMessage.WriteL(EIpcArgument0, resultantString);	
-	CleanupStack::PopAndDestroy(3, clientExpression);	//aliasList, resultantString.
-	aMessage.Complete(KErrNone);
-	}
-
-/**
-	Inserts space in between operators and inserts brackets for as 
-	expression
-	
-	@param	aStringToBeProcessed	string to be tokenized.
-	@param  aResultantString		would contain the final tokenized
-									string
- */
-
-void CAuthServer::TokenizeStringL( const TDesC& aStringToBeProcessed, RBuf& aResultantString )
-	{
-	TInt newLength = aStringToBeProcessed.Length() + 2;
-	HBufC* resultantBuffer = HBufC::NewLC(newLength);
-	TPtr resultantBufPtr(resultantBuffer->Des());
-	resultantBufPtr.Append(KOpenBracket);
-	resultantBufPtr.Append(aStringToBeProcessed);
-	TInt index = resultantBufPtr.Length();
-	resultantBufPtr.Append(KCloseBracket);
-	
-	CAuthExpressionImpl::InsertSpaceBetweenOperatorsL(*resultantBuffer, aResultantString);
-	CleanupStack::PopAndDestroy(resultantBuffer);
-	
-	}
-
-/**
-	Retrieves the alias string corresponding to the 
-	supplied authentication strength.
-	
-	@param	aMessage	Client message which contains the
-						authentication strength and points to a 
-						client-side buffer, to which the alais
-						string will be copied.
-	
- */
- 	
-void CAuthServer::ResolveAliasL(const TDesC& aAliasName, 
-								RPointerArray<HBufC>& aAliasList, 
-								RBuf& aResultantString)
-	{
-	HBufC* aliasString = HBufC::NewLC(KDefaultBufferSize/2);
-	TPtr aliasStringPtr(aliasString->Des());
-	
-	TBool aliasFound = EFalse;
-		
-	// find a match for the client supplied alias from the aliasList.
-	for(TInt i = 0; i < aAliasList.Count(); ++i)
-		{
-		if(aAliasName.CompareF(*aAliasList[i]) != 0)
-			{
-			continue;
-			}
-		
-		aliasFound = ETrue;
-		// retrieve the alias string corresponding to a given authentication strength.
-		iAuthRepository->GetAliasDefinitionL(i, aliasStringPtr);
-		if(aliasStringPtr.Length() == 0)
-			{
-			User::Leave(KErrAuthStrengthAliasNotDefined);
-			}
-			
-		// enclose the alias string within brackets.This would facilitate easy evaluation 
-		// of the alias string expression.
-		TInt newLength = aliasStringPtr.Length() + 2;
-		if(newLength > aliasStringPtr.MaxLength())
-			{
-			aliasString->ReAllocL(newLength);
-			}
-			
-		aliasStringPtr.Insert(0, KOpenBracket);
-		TInt index = aliasStringPtr.Length();
-		aliasStringPtr.Insert(index, KCloseBracket);
-		
-		// tokenize aliasString, to facilitate parsing using TLex.
-		CAuthExpressionImpl::InsertSpaceBetweenOperatorsL(*aliasString, aResultantString);
-				
-		if(aResultantString.Length() > aliasStringPtr.MaxLength())
-			{
-			aliasString = aliasString->ReAllocL(aResultantString.Length());
-			}
-		
-		aliasStringPtr.Copy(aResultantString);
-		aResultantString.Close();
-		
-		// aliasString contains an alias, so process it until we end up 
-		// with an expression containing plugin Id or plugin Type or a combination of both.		
-		ProcessAliasStringL(aAliasList, *aliasString, aResultantString);
-				
-		// ensure that the aliasString processing doesn't end in an infinite loop.
-		// In case it does , leave with KErrAuthServInvalidAliasStringExpression.
-		// For instance : fast = (medium & weak), medium = fast i.e 
-		// medium = (medium & weak).
-				
-		if(aResultantString.FindC(aAliasName) != KErrNotFound)
-			{
-			User::Leave(KErrAuthServInvalidAliasStringExpression);
-			}
-							
-		TBool found = CheckForAliasInAliasString(aAliasList, aResultantString);
-		// 'resultantAliasString' may inturn contain an alias.So loop through the ProcessAliasStringL,
-		// until  we end up with an alias string containing only plugin Id,plugin Type or a combination of both.
-		while(found)
-			{
-			for(TInt j = 0; j < aAliasList.Count(); ++j)
-				{
-				if(aResultantString.FindC(*aAliasList[j]) != KErrNotFound)
-					{
-					if(aResultantString.Length() > aliasStringPtr.MaxLength())
-						{
-						aliasString->ReAllocL(aResultantString.Length());
-						}
-							
-					aliasStringPtr.Copy(aResultantString);
-					aResultantString.Close();
-										
-					CAuthExpressionImpl::InsertSpaceBetweenOperatorsL(*aliasString, aResultantString);
-					if(aResultantString.Length() > aliasStringPtr.MaxLength())
-						{
-						aliasString->ReAllocL(aResultantString.Length());
-						}
-						
-					aliasStringPtr.Copy(aResultantString);
-					aResultantString.Close();
-								
-				 	ProcessAliasStringL(aAliasList, *aliasString, aResultantString);
-					// ensure that the aliasString processing doesn't end in an infinite loop.
-					// In case it does , leave with KErrArgument.
-					// For instance : fast = (medium & weak), medium = fast i.e 
-					// medium = (medium & weak).
-					if(aResultantString.FindC(aAliasName) != KErrNotFound)
-						{
-						User::Leave(KErrAuthServInvalidAliasStringExpression);
-						}
-					break;
-					}
-				}
-					
-				// check if 'resultantExpr' still contains an alias.
-			found = CheckForAliasInAliasString(aAliasList, aResultantString);				
-			
-			}
-				
-		break;
-		}
-	
-	CleanupStack::PopAndDestroy(aliasString);
-	
-	//if the client supplied alias is not in the alias list, leave.
-	if(!aliasFound)
-		{
-		User::Leave(KErrUnknownAuthStrengthAlias);
-		}
-
-	}
-
-// Resets the training data for the supplied identity.
-//	
-// @param aMessage Client message which contains the details of 
-//					identity and plugins for doing the reset
-void CAuthServer::ResetIdentityL(TInt aFunction, const RMessage2& aMessage)
-	{
-	// Check if either an authentication or a training is going on
-	if (ServerBusy())
-		{
-		aMessage.Complete(KErrServerBusy);
-		return;
-		}
-
-	// For reset by type only EAuthKnowledge type is supported
-	if (aFunction == EResetIdentityByType)
-		{
-		TAuthPluginType pluginType = static_cast<TAuthPluginType>(aMessage.Int1());
-		if (pluginType != EAuthKnowledge)
-			{
-			aMessage.Complete(KErrAuthServResetMayLoseIdentity);
-			return;
-			}
-		}
-
-	// Get the list of trained plugins for this identity
-	TIdentityId identityId = static_cast<TIdentityId>(aMessage.Int0());
-	RArray<TPluginId> trainedPluginIdList;
-	CleanupClosePushL(trainedPluginIdList);
-	iAuthDb2->TrainedPluginsListL(identityId, trainedPluginIdList);
-
-	// Ensure at least one plugin knows identity
-	TInt numTrained = trainedPluginIdList.Count();
-	if (numTrained < 1)
-		{
-		CleanupStack::PopAndDestroy(&trainedPluginIdList);
-		aMessage.Complete(KErrAuthServIdentityNotFound);
-		return;
-		}
-
-	// Try and ensure that after reset at least one plugin has an identity trained
-	// Since all the trained plugins for the identity are being reset make sure
-	// at least one of them is of the knowledge type to be reasonably sure it registers 
-	// the new identity data
-	TBool knowledgePluginFound = EFalse;
-	for (TInt index = 0; index < numTrained; ++index)
-		{
-		TPluginId pluginId = trainedPluginIdList[index];
-		CAuthPluginInterface* plugin = iPluginMgr->PluginL(pluginId);
-		if (plugin->Type() == EAuthKnowledge)
-			{
-			knowledgePluginFound = ETrue;
-			break;
-			}
-		}
-	if (!knowledgePluginFound)
-		{
-		CleanupStack::PopAndDestroy(&trainedPluginIdList);
-		aMessage.Complete(KErrAuthServResetMayLoseIdentity);
-		return;
-		}
-
-	// Get the registration data
-	HBufC* regData = NULL;
-	TInt ipcArg = (aFunction == EResetIdentity) ?  EIpcArgument1:EIpcArgument2;
-	regData = HBufC::NewLC(aMessage.GetDesLengthL(ipcArg));
-	TPtr regPtr = regData->Des();
-	aMessage.ReadL(ipcArg, regPtr);
-
-	// Finally start the reset process
-	// Generate a new protection key
-	CProtectionKey* protKey = CProtectionKey::NewLC(iKeySize);
-	TInt lastErr = KErrNone;
-	TBool oneSuccess = EFalse; // To keep track if at least one reset succeeded
-	for (TInt index = 0; index < numTrained; ++index)
-		{
-		TPluginId pluginId = trainedPluginIdList[index];
-		CAuthPluginInterface* plugin = iPluginMgr->PluginL(pluginId);
-		HBufC8* result = NULL;
-		TInt err = KErrNone;
-		// For reset by type the registration data needs to be specified only for the plugins of specified type
-		// and this restricted to knowledge type only
-		if ((aFunction == EResetIdentity) ||
-			((aFunction == EResetIdentityByType) && (plugin->Type() == EAuthKnowledge)))
-			{
-			err = plugin->Reset(identityId, *regData, result);
-			}
-		else
-			{
-			err = plugin->Reset(identityId, KNullDesC, result);
-			}
-		if (err == KErrNone && result)
-			{
-			oneSuccess = ETrue;
-			// Use the plugin data to generate transient key and then encrypt the protection key
-			// using the transient key. A plugin may not return data if it does not use the supplied
-			// registration information 
-			CleanupStack::PushL(result);
-			CTransientKeyInfo* keyInfo = CreateKeyInfoLC(pluginId, *result, *protKey);
-			// Replace the trained information in the db
-			iAuthDb2->SetTrainedPluginL(identityId, pluginId, *keyInfo);
-			CleanupStack::PopAndDestroy(2, result); // keyInfo
-			}
-		else if (err == KErrNone)
-			{
-			oneSuccess = ETrue;
-			// Remove the entry in the auth db for the plugin
-			// Ignore errors
-			TRAP_IGNORE(iAuthDb2->RemoveTrainedPluginL(identityId, pluginId));
-			}
-		else
-			{
-			// Remember the last error
-			lastErr = err;
-			}
-		}
-
-	CleanupStack::PopAndDestroy(3, &trainedPluginIdList); // regData, protKey
-	
-	// If none of the plugins reset correctly then return the last error
-	if (oneSuccess)
-		{
-		lastErr = KErrNone;
-		}
-	
-	aMessage.Complete(lastErr);
-	}
-
-// Resets the training data for the supplied identity.
-//	
-// @param aMessage Client message which contains the details of 
-//					identity and plugins for doing the reset
-void CAuthServer::ResetIdentityByListL(const RMessage2& aMessage)
-	{
-	// Check if either an authentication or a training is going on
-	if (ServerBusy())
-		{
-		aMessage.Complete(KErrServerBusy);
-		return;
-		}
-
-	// Get the list of trained plugins for this identity
-	TIdentityId identityId = static_cast<TIdentityId>(aMessage.Int0());
-	RArray<TPluginId> trainedPluginIdList;
-	CleanupClosePushL(trainedPluginIdList);
-	iAuthDb2->TrainedPluginsListL(identityId, trainedPluginIdList);
-
-	// Ensure at least one plugin knows identity
-	TInt numTrained = trainedPluginIdList.Count();
-	if (numTrained < 1)
-		{
-		CleanupStack::PopAndDestroy(&trainedPluginIdList);
-		aMessage.Complete(KErrAuthServIdentityNotFound);
-		return;
-		}
-
-	// Extract the array of plugin ids and their registration information
-	RArray<TPluginId> pluginIdList;
-	CleanupClosePushL(pluginIdList);
-	HBufC8* buf = HBufC8::NewLC(aMessage.GetDesLengthL(EIpcArgument1));
-	TPtr8 ptr = buf->Des();
-	aMessage.ReadL(EIpcArgument1, ptr);
-	RDesReadStream stream(*buf);
-	CleanupClosePushL(stream);
-	InternalizeArrayL(pluginIdList, stream);
-	CleanupStack::PopAndDestroy(2, buf); // stream
-
-	RPointerArray<HBufC> regInfoList;
-	CleanupResetAndDestroyPushL(regInfoList);
-	buf = HBufC8::NewLC(aMessage.GetDesLengthL(EIpcArgument2));
-	ptr.Set(buf->Des());
-	aMessage.ReadL(EIpcArgument2, ptr);
-	stream.Open(*buf);
-	CleanupClosePushL(stream);
-	InternalizePointerArrayL(regInfoList, stream);
-	CleanupStack::PopAndDestroy(2, buf); // stream
-
-	// Sanity check
-	if (pluginIdList.Count() != regInfoList.Count())
-		{
-		CleanupStack::PopAndDestroy(3, &trainedPluginIdList); // pluginIdList, regInfoList
-		aMessage.Complete(KErrArgument);
-		return;
-		}
-
-	// Prepare an array of TPluginResetDetails to aid during resetting
-	RPointerArray<TPluginResetDetails> resetDetails;
-	CleanupResetAndDestroyPushL(resetDetails);
-	
-	for (TInt index = 0; index < numTrained; ++index)
-		{
-		TPluginId pluginId = trainedPluginIdList[index];
-		// Check if the trained plugin needs to be sent registration data
-		TInt indexA = pluginIdList.Find(pluginId);
-		
-		TPluginResetDetails *resetDetailsEntry;
-		if (indexA != KErrNotFound)
-			{
-			// Note: Ownership of the descriptor pointers remains with regInfoList
-			resetDetailsEntry = new (ELeave) TPluginResetDetails(pluginId, *regInfoList[indexA]);
-			}
-		else
-			{
-			resetDetailsEntry = new (ELeave) TPluginResetDetails(pluginId, KNullDesC());
-			}
-		CleanupStack::PushL(resetDetailsEntry);
-		resetDetails.AppendL(resetDetailsEntry);
-		CleanupStack::Pop(resetDetailsEntry);
-		}
-
-	// Try and ensure that after reset at least one plugin has an identity trained
-	// Since all the trained plugins for the identity are being reset make sure
-	// at least one of them is of the knowledge type and is being passed the registration data 
-	// to be reasonably sure it registers the new identity data
-	TBool knowledgePluginFound = EFalse;
-	for (TInt index = 0; index < numTrained; ++index)
-		{
-		TPluginId pluginId = resetDetails[index]->PluginId();
-		CAuthPluginInterface* plugin = iPluginMgr->PluginL(pluginId);
-		if ((plugin->Type() == EAuthKnowledge) && (resetDetails[index]->RegistrationData() != KNullDesC))
-			{
-			knowledgePluginFound = ETrue;
-			break;
-			}
-		}
-	if (!knowledgePluginFound)
-		{
-		CleanupStack::PopAndDestroy(4, &trainedPluginIdList); // pluginIdList, regInfoList, resetDetails
-		aMessage.Complete(KErrAuthServResetMayLoseIdentity);
-		return;
-		}
-
-	// Finally start the reset process
-	// Generate a new protection key
-	CProtectionKey* protKey = CProtectionKey::NewLC(iKeySize);
-	TInt lastErr = KErrNone;
-	TBool oneSuccess = EFalse; // To keep track if at least one reset succeeded
-	for (TInt index = 0; index < numTrained; ++index)
-		{
-		TPluginResetDetails* reset = resetDetails[index];
-		TPluginId pluginId = reset->PluginId();
-		CAuthPluginInterface* plugin = iPluginMgr->PluginL(pluginId);
-		HBufC8* result = NULL;
-		TInt err = plugin->Reset(identityId, reset->RegistrationData(), result);
-		if (err == KErrNone && result)
-			{
-			oneSuccess = ETrue;
-			// Use the plugin data to generate transient key and then encrypt the protection key
-			// using the transient key. A plugin may not return data if it does not use the supplied
-			// registration information 
-			CleanupStack::PushL(result);
-			CTransientKeyInfo* keyInfo = CreateKeyInfoLC(pluginId, *result, *protKey);
-			// Replace the trained information in the db
-			iAuthDb2->SetTrainedPluginL(identityId, pluginId, *keyInfo);
-			CleanupStack::PopAndDestroy(2, result); // keyInfo
-			}
-		else if (err == KErrNone)
-			{
-			oneSuccess = ETrue;
-			// Remove the entry in the auth db for the plugin
-			// Ignore errors
-			TRAP_IGNORE(iAuthDb2->RemoveTrainedPluginL(identityId, pluginId));
-			}
-		else
-			{
-			// Remember the last error
-			lastErr = err;
-			}
-		}
-	
-	CleanupStack::PopAndDestroy(5, &trainedPluginIdList); // pluginIdList, regInfoList, resetDetails, protKey
-
-	// If none of the plugins reset correctly then return the last error
-	if (oneSuccess)
-		{
-		lastErr = KErrNone;
-		}
-	
-	aMessage.Complete(lastErr);
-	}
-
-// Generates and returns transient key info using the supplied plugin data and the protection key
-CTransientKeyInfo* CAuthServer::CreateKeyInfoLC(TPluginId aPluginId, const TDesC8& aPluginData, const CProtectionKey& aProtKey)
-	{
-	CTransientKeyInfo* keyInfo = CTransientKeyInfo::NewLC(aPluginId);
-
-	CTransientKey* transKey = keyInfo->CreateTransientKeyL(aPluginData);
-	CleanupStack::PushL(transKey);
-    
-	CEncryptedProtectionKey* encProtKey = transKey->EncryptL(aProtKey);
-	CleanupStack::PushL(encProtKey);
-	
-	keyInfo->SetEncryptedProtectionKeyL(encProtKey);
-	CleanupStack::Pop(encProtKey);
-	CleanupStack::PopAndDestroy(transKey);
-	return keyInfo;
-	}
-
-/**
-	Checks if the value of strength alias inturn contains an alias.
-	
-	@param	aAuthAliasList		an array of authentication strengths as obtained from
-								authserver cenrep file.
-	@param	aAliasString		an alias string containing the alias to be searched for.
-	
- */	
-	
-TBool CAuthServer::CheckForAliasInAliasString(RPointerArray<HBufC>& aAuthAliasList, const TDes& aAliasString)
-	{
-	// find a match for the client supplied alias from the aliasList.
-	for(TInt i = 0; i < aAuthAliasList.Count(); ++i)
-		{
-		TInt found = aAliasString.FindC(*aAuthAliasList[i]);
-		if(found > 0)
-			{
-			return ETrue;
-			}
-		}
-		
-	return EFalse;
-	}
-	
-/**
-	Processes an alias string, This method is called recursively until we end
-	up with an alias string containing only pluginIds and pluginTypes or a 
-	combination of both.
-	
-	
-	@param	aAliasList					an array of authentication strengths as obtained from
-										authserver cenrep file.
-	@param	aAliasStringToBeProcessed	an alias string to be processed.	
-	@param	aResultantAliasString		Buffer to be populated with an alias string resulting from processing aAliasStringToBeProcessed.				
-	 
- */
- 	
-void CAuthServer::ProcessAliasStringL(RPointerArray<HBufC>& aAliasList, const TDesC& aAliasStringToBeProcessed, RBuf& aResultantAliasString)
-	{
-	TBuf<KDefaultBufferSize> exprString;
-	HBufC* aliasString = HBufC::NewLC(KMaxBufferSize);
-	TPtr aliasStringPtr(aliasString->Des());
-		
-	TLex input(aAliasStringToBeProcessed);
-	_LIT(KDelimiter, " ");
-	TBool aliasFoundInString = EFalse;
-	
-	//iterate through the obtained expression to verify if it contains any strength subsets.
-	for(TPtrC token = input.NextToken(); token.Size() > 0; token.Set(input.NextToken()))
-		{
-		TInt resultingLen = 0;
-		aliasFoundInString = EFalse;
-		for(TInt i = 0; i < aAliasList.Count(); ++i)
-			{
-			if(token.FindC(*aAliasList[i]) != KErrNotFound)
-				{
-				aliasFoundInString = ETrue;
-				iAuthRepository->GetAliasDefinitionL(i, exprString);
-				if(exprString.Length() == 0)
-					{
-					User::Leave(KErrAuthStrengthAliasNotDefined);
-					}
-					
-				// resulting length obtained by appending exprString ,KCloseBracket and KOpenBracket to aliasString.
-				resultingLen = (exprString.Length() + 2);
-				if(resultingLen > KMaxBufferSize)
-					{
-					aliasString->ReAllocL(resultingLen);
-					}
-				
-				aliasStringPtr.Append(KOpenBracket);	
-				aliasStringPtr.Append(exprString);
-				aliasStringPtr.Append(KCloseBracket);
-				break;
-				}
-			}
-		
-		//if the token is an operator or a plugin type or pluginId, append it to aResultantExpr.
-		if(!aliasFoundInString)
-			{
-			// resulting length obtained by appending token and delimiter to be aliasString.
-			resultingLen = (exprString.Length() + token.Length() + 1);
-			if(resultingLen > KMaxBufferSize)
-					{
-					aliasString->ReAllocL(resultingLen);
-					}
-					
-			aliasStringPtr.Append(token);
-			aliasStringPtr.Append(KDelimiter);	
-			}
-		}
-	
-	CleanupStack::Pop(aliasString);
-	aResultantAliasString.Assign(aliasString);	
-	
-	}
-	
-
-/**
- *
- * @param aMessage the message to process
- **/
-void CAuthServer::RegisterIdentityL(const RMessage2& aMessage)
-	{
-	if (ServerBusy())
-		{
-		aMessage.Complete(KErrServerBusy);
-		return;
-		}
-
-	TIdentityId id = 0;
-	TPckg<TIdentityId> idPkg(id);
-	TRandom::RandomL(idPkg);
-
-	CProtectionKey* key = CProtectionKey::NewL(iKeySize);
-	
-	iTrainingMgr->RegisterIdentityL(aMessage, id, *key);
-	}
-
-/**
- *
- * @param aMessage the message to process
- **/
-void CAuthServer::CancelL(const RMessage2& aMessage)
-    {
-	TInt err = KErrNone;
-
-	if (iTrainingMgr->IsBusy())
-		{
-		iTrainingMgr->Cancel();
-		}
-	else if (iAuthTransaction != 0)
-		{
-		if (aMessage.SecureId() == iAuthTransaction->Message().SecureId())
-			{
-			iEvaluator->Cancel();
-			}
-		else
-			{
-			// Shouldn't come here since we don't support share-able sessions
-			err = KErrInUse;
-			}
-		}
-	aMessage.Complete(err);
-	}
-
-
-/**
-	Remove the supplied identity from the database.
-	
-	@param	aMessage		Client which contains identity
-							to remove.
- */
-void CAuthServer::RemoveIdentityL(const RMessage2& aMessage)
-	{
-	TInt result = KErrNone;
-	
-	//The identity to be removed
-	TIdentityId id = static_cast<TIdentityId>(aMessage.Int0());
-	
-	//Check if the identity to be removed is not the default identity.
-	TIdentityId defaultIdentity = iAuthDb2->DefaultIdentityL();
-
-	if(defaultIdentity != id)
-		{
-		iAuthDb2->RemoveIdentityL(id);
-
-		if (iLastIdentity && iLastIdentity->Id() == id)
-			{
-			delete iLastIdentity;
-			iLastIdentity = 0;
-			iLastAuthTime = 0L;
-			}
-		iPluginMgr->ForgetIdentityL(id);
-		}
-	else
-		{
-		result = KErrAuthServCanNotRemoveDefaultIdentity;
-		}
-	aMessage.Complete(result);
-	}
-
-/**
- * @return true if either the training mgr or authentication transaction
- * is busy
- **/
-TBool CAuthServer::ServerBusy()
-	{
-	return iTrainingMgr->IsBusy() || iAuthTransaction != 0;
-	}
-
-
-/**
- *
- * @param aMessage the message to process
- **/
-void CAuthServer::TrainPluginL(const RMessage2& aMessage)
-	{
-	if (ServerBusy())
-		{
-		aMessage.Complete(KErrServerBusy);
-		return;
-		}
-
-	if (iLastIdentity == 0 || iLastIdentity->Id() != aMessage.Int0())
-		{
-		// we need a cached identity to get the protection key
-		aMessage.Complete(KErrAuthServAuthenticationRequired);
-		return;
-		}
-	
-	TIdentityId retrainId = aMessage.Int0();
-	
-	//The default identity cannot be retrained.
-	TIdentityId defaultIdentity = iAuthDb2->DefaultIdentityL();
-		
-	if(defaultIdentity == retrainId)
-		{
-		aMessage.Complete(KErrNotSupported);
-		return;
-		}
-	
-	HBufC8* data = HBufC8::NewLC(iLastIdentity->Key().KeyData().Size());
-	*data = iLastIdentity->Key().KeyData(); 
-
-	CProtectionKey* key = CProtectionKey::NewL(data);
-	CleanupStack::Pop(data);
-	
-	iTrainingMgr->TrainPluginL(aMessage, *key);
-	
-    }
-
-
-  
-/**
- * Remove the supplied identity, plugin pair from the
- * authentication database.
- *
- * @param aMessage  Client message which contains the
- * 					identity and the plugin.
- **/
-void CAuthServer::ForgetPluginL(const RMessage2& aMessage)
-	{
-	if (ServerBusy())
-		{
-		aMessage.Complete(KErrServerBusy);
-		return;
-		}
-	
-	TIdentityId id   = static_cast<TIdentityId>(aMessage.Int0());
-	TPluginId plugin = static_cast<TPluginId>(aMessage.Int1());
-	TInt err         = KErrNone;
-
-	TInt numTrained = iAuthDb2->NumTrainedPluginsL(id);
-
-	switch (numTrained)
-	  {
-	case 0:
-	  err = KErrAuthServNoSuchIdentity;
-	  break;
-	case 1:	
-	  err = KErrAuthServCanNotRemoveLastPlugin;	  
-	  break;
-	default:
-	  iAuthDb2->RemoveTrainedPluginL(id, plugin);
-	  iPluginMgr->PluginL(plugin)->Forget(id);
-	  break;
-	  }
-
-	aMessage.Complete(err);
-	}
-
-
-void CAuthServer::EvaluateL(TPluginId aPluginId,
-						   TIdentityId& aIdentityId,
-						   CAuthExpressionImpl::TType aType,
-						   TRequestStatus& aStatus)
-	{
-	
-	if(aPluginId == 0 && aType == CAuthExpressionImpl::ENull)
-		{
-		aPluginId = iAuthRepository->DefaultPluginL();
-		}
-		
-  	CAuthPluginInterface* plugin = iPluginMgr->PluginL(aPluginId);
-
-	if (plugin != 0)
-	  {
-	  const HBufC* clientMessage = iAuthTransaction->ClientMessage();
-	  
-	  HBufC8*& data = iAuthTransaction->AddPluginL(aPluginId, aIdentityId);
-	  	
-	  if (plugin->IsActive())
-		  {
-		  plugin->Identify(aIdentityId, *clientMessage, data, aStatus);
-		  }
-		  
-	  else
-		  {
-		  User::Leave(KErrAuthServPluginNotActive);
-		  }
-	  }
-	}
-/**
- * @see MEvaluatorPluginInterface::Evaluate
- **/
-void CAuthServer::Evaluate(TPluginId aPluginId,
-						   TIdentityId& aIdentityId,
-						   CAuthExpressionImpl::TType aType,
-						   TRequestStatus& aStatus)
-	{
-	TRAPD(err, EvaluateL(aPluginId, aIdentityId, aType, aStatus));
-
-	if (err != KErrNone) 
-	  {
-	  TRequestStatus* status = &aStatus;
-      User::RequestComplete(status, err);
-	  }
-	}
-
-/**
- * Retrieve the preferred plugin for the supplied type and
- * get an identity from it.
- * @see MEvaluatorPluginInterface::Evaluate
- *
- **/
-void CAuthServer::Evaluate(TAuthPluginType aPluginType,
-						   TIdentityId& aIdentityId,
-						   CAuthExpressionImpl::TType aType,	
-						   TRequestStatus& aStatus)
-	{
-	TPluginId id = 0;
-	TRAPD(r, id = iAuthDb2->PreferredPluginL(aPluginType));
-	if (r == KErrNone)
-	    {
-	    Evaluate(id, aIdentityId, aType, aStatus);
-	    }
-	else
-		{
-		// Pass back error (can happen if a user preference hasn't been defined)
-		aStatus = KRequestPending;
-		TRequestStatus* rs = &aStatus;
-		User::RequestComplete(rs, r);
-		}
-	}
-
-/**
- * Completes the message and sends the id on it's way back to the client
- **/
-void CAuthServer::CompleteAuthenticationL(const RMessagePtr2& aMessage,
-										 CIdentity* aId)
-	{
-	// write to client
-	HBufC8* idBuff = HBufC8::NewLC(KDefaultBufferSize);
-	TPtr8  idPtr =  idBuff->Des();
-	RDesWriteStream writeStream(idPtr);
-	writeStream << *aId;
-	writeStream.CommitL();
-
-	TInt clientBuffSize = aMessage.GetDesMaxLength(2);
-  
-	if (clientBuffSize >= idBuff->Size())
-		{
-		aMessage.Write(2, *idBuff);
-		}
-	else
-		{
-		User::Leave(KErrUnderflow);
-		}
-	
-	CleanupStack::PopAndDestroy(idBuff);  
-  
-	aMessage.Complete(KErrNone);
-	}
-
-/**
- * @see MEvaluatorClientInterface::EvaluationSucceeded
- **/
-void CAuthServer::EvaluationSucceeded(TIdentityId aIdentityId)
-	{
-
-	TRAPD(err, EvaluationSucceededL(aIdentityId));
-	
-	switch(err)
-	    {
-	    case KErrNone:
-	        break;
-	    default:
-	        EvaluationFailed(err);
-	    }
-	}
-
-
-/**
- * The full, leaving, implementation of EvaluationSucceeded (which is a trap
- * harness).
- *
- * @param aIdentityId the identity discovered
- **/
-void CAuthServer::EvaluationSucceededL(TIdentityId aIdentityId)
-	{
-
-	CAuthTransaction::RResultArray& results = iAuthTransaction->Results();
-
-	HBufC8* data = 0;
-	TPluginId plugin = KUnknownPluginId;
-
-	TLastAuth lastAuth;
-	lastAuth.iId = aIdentityId;
-	
-	for (TInt i = 0 ; i < results.Count() ; ++i)
-		{
-		if (aIdentityId == *results[i]->iId)
-			{
-			plugin = results[i]->iPlugin;
-			data = results[i]->iData;
-			UpdateAuthL(lastAuth, plugin); 
-			}
-		}
-  
-    CProtectionKey* key = 0;
-
-    // Ensure that the ID and DATA are valid.
-    if (( aIdentityId != KUnknownIdentity ) && ( data != 0 ))
-        {
-        // get the protection key 
-        CTransientKeyInfo* keyInfo = iAuthDb2->KeyInfoL(aIdentityId, plugin);
-		CleanupStack::PushL(keyInfo);
-        		  
-		CTransientKey* transKey = keyInfo->CreateTransientKeyL(*data);
-        CleanupStack::PushL(transKey);
-  
-        key = transKey->DecryptL(keyInfo->EncryptedKey());
-        CleanupStack::PopAndDestroy(2,keyInfo);
-        CleanupStack::PushL(key);
-        
-        // convert to a client key if we need to
-        if (iAuthTransaction->ClientKey())
-           {
-           CProtectionKey* key2 = key->ClientKeyL(iAuthTransaction->ClientSid());
-            
-           CleanupStack::PopAndDestroy(key);
-           key = key2;
-           CleanupStack::PushL(key);
-           }   
-        }
-	else
-	    {
-	    // create a blank key
-	    key = CProtectionKey::NewLC(0);
-	    
-	    // clear the cached identity
-	    delete iLastIdentity;
-        iLastIdentity = 0;
-        iLastAuthTime = 0L;
-        }
-
-	HBufC* str =
-		StringOrNullLC(iAuthTransaction->WithString(), aIdentityId);
-	
-	// create the client identity object
-	CIdentity* identity = CIdentity::NewL(aIdentityId, key, str);
-    CleanupStack::Pop(2, key);
-	CleanupStack::PushL(identity);
-    
-    CompleteAuthenticationL(iAuthTransaction->Message(),
-    					    identity);
-	
-    if (aIdentityId != KUnknownIdentity)
-        {
-		TIdentityId oldId = iLastIdentity ? iLastIdentity->Id() : 0;
-
-        // cache the latest id
-        delete iLastIdentity;
-        iLastIdentity = identity;
-        if(iLastAuthTime.UniversalTimeSecure() == KErrNoSecureTime)
-        	{
-            // Fall back to nonsecure time. 
-            iLastAuthTime.UniversalTime();
-            }
-		// and publish it
-		lastAuth.iAuthTime = iLastAuthTime;
-		TPckg<TLastAuth> authPckg(lastAuth);
-		User::LeaveIfError(iAuthProperty.Set(authPckg));
-
-		// if the identity has changed publish that fact	
-		if (oldId != aIdentityId)
-			{
-			User::LeaveIfError(iAuthEventProperty.Set(aIdentityId));
-			}
-
-		CleanupStack::Pop(identity);
-        }
-	else
-	   {
-		CleanupStack::PopAndDestroy(identity);
-	   }
-	delete iAuthTransaction;
-	iAuthTransaction = 0;
-    }
-
-/**
- * Tells the authserver to cancel the current evaluation (i.e. call to
- * the plugin)
- *
- * @see MEvaluatorPluginInterface::Evaluate
- *
- **/
-void CAuthServer::CancelEvaluate()
-	{
-	if (iAuthTransaction)
-		{
-		TPluginId pluginId = iAuthTransaction->LastPluginId();
-		CAuthPluginInterface* plugin = 0;
-		TRAPD(err, (plugin = iPluginMgr->PluginL(pluginId)));
-		if (err == KErrNone)
-		  {
-			plugin->Cancel();
-		  }
-		}
-	}
-
-
-/**
- * @see MEvaluatorClientInterface::EvaluationFailed
- **/
-void CAuthServer::EvaluationFailed(TInt aReason)
-	{
-	iAuthTransaction->Message().Complete(aReason);
-	delete iAuthTransaction;
-	iAuthTransaction = 0;
-	// there's nothing we can do here. Panic? 
-	TRAP_IGNORE(ClearPropertiesL());
-	}
-	  
-
-void CAuthServer::UpdateAuthL(TLastAuth& aAuth, TPluginId aPlugin)
-	{
-	CAuthPluginInterface* plugin = iPluginMgr->PluginL(aPlugin);
-
-	aAuth.iMaxCombinations =
-		Max(aAuth.iMaxCombinations, plugin->MinEntropy());
-	aAuth.iFalsePositiveRate =
-		Max(aAuth.iFalsePositiveRate, plugin->FalsePositiveRate());
-	aAuth.iFalseNegativeRate =
-		Max(aAuth.iFalseNegativeRate, plugin->FalseNegativeRate());
-	++aAuth.iNumFactors;
-	}
-
-
-/**
- * Free all the uncompressable memory before the 
- * heap mark is set/reset to get the OOM tests to pass.
- **/
-void CAuthServer::FreeMemoryBeforeHeapMark()
-	{
-#ifdef _DEBUG
-	
-	if(iTrainingMgr)
-		{
-		delete iTrainingMgr;
-		iTrainingMgr = 0;
-		}
-
-	if(iPluginMgr)
-		{
-		delete iPluginMgr;
-		iPluginMgr = 0;
-		}
-	
-	if(iLastIdentity)
-		{
-		delete iLastIdentity;
-		iLastIdentity = 0;
-		}
-	
-	iAuthDb2->CloseDbFile();
-	
-	REComSession::FinalClose();
-	
-#endif
-	}
-
-
-/**
- * Recreate all the variables deleted after the heap mark has 
- * been set/reset.
- **/
-void CAuthServer::SetupVariablesAfterHeapMarkEndL()
-	{
-#ifdef _DEBUG
-	
-	//Opening Db file.
-	TFileName dbName(KDbName);
-	dbName[0] = RFs::GetSystemDriveChar();
-	iAuthDb2->OpenDbFileL(iFs, dbName);
-	
-	//Creating plugin manager.
-	if(!iPluginMgr)
-		{
-		iPluginMgr  = CPluginMgr::NewL();
-		}
-	
-	//Creating training manager.
-	if(!iTrainingMgr)
-		{
-		 iTrainingMgr = new (ELeave) CTrainingMgr(*iPluginMgr, *iAuthDb2, *iAuthRepository);
-		}
-#endif	
-	}
-
-/**
- * Things to be done before the heap mark is set/reset 
- * during OOM testing
- **/
-void CAuthServer::DoPreHeapMarkOrCheckL()
-	{
-#ifdef _DEBUG
-	FreeMemoryBeforeHeapMark();
-#endif
-	}
-
-/**
- * Things to be done after the heap mark is set/reset 
- * during OOM testing
- **/
-void CAuthServer::DoPostHeapMarkOrCheckL()
-	{
-#ifdef _DEBUG
-	SetupVariablesAfterHeapMarkEndL();
-#endif
-	}
-
--- a/authenticationservices/authenticationserver/source/server/authserver.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,271 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CAuthServer class definition
-*
-*/
-
-
-/**
- @file 
- @released
- @internalComponent
-*/
-#ifndef AUTHSERVER_H
-#define AUTHSERVER_H
-
-#include <e32cmn.h>
-#include <ct/rcpointerarray.h>
-#include <e32property.h>
-#include <f32file.h>
-#include <scs/scsserver.h>
-#include "authserveripc.h"
-#include "authrepository.h"
-
- 
-namespace AuthServer 
-{
-
-/**
- *Panic values associated with the AuthServer
- */
-enum TAuthServerPanic
-	{
-	EPanicCorruptDescriptor = 0,
-	/// An invalid service request number has been receieved by the
-	/// server. This should not be received by those using the RAuthClient or
-	/// derived classes.
-	EPanicInvalidFunction = 1,
-	
-	EPanicAlreadyReceiving = 2,
-	/// An internal error indicating the received authentication expression 
-	/// is malformed. This should not be received by those using the 
-	/// RAuthClient or derived classes.
-	EPanicBadExternalizedAuthExpr = 3,
-	/// A request has been made that refers to a non-existent plugin.
-	EPanicNoSuchAuthPlugin = 4,
-	/// In order to create a first identity, the authserver requires that 
-	/// at least one plugin supports default data. 
-	EPanicNoFirstStartPlugin = 5,
-	/// A call has been made to the authserver's training manager while one 
-	/// is already in progress.
-	EPanicTrainingMgrBusy = 6,
-	/// A plugin has reported that it supports default data but has returned
-	/// an invalid data buffer.
-	EPanicInvalidDefaultData = 7        
-	};
-
-const TInt KPolicyRanges= 12;
-const TInt KPolicyElements = 7;
-
-const TInt KDefaultShutdownDelay = 3 * 1000 * 1000;	// 3 seconds
-
-class CIdentity;
-
-class CPluginMgr;
-class CPluginObserver;
-class CTrainingMgr;
-class CEvaluator;
-class CAuthExpression;
-class CAuthTransaction;
-struct TLastAuth;
-
-// The description for the default identity.
-_LIT(KDefaultUserDescription, "DefaultUser");
-
-/**
- * Helper class to manage details during identity reset operation
- **/
-class TPluginResetDetails
-	{
-public:
-	TPluginResetDetails(TPluginId aPluginId, const TDesC& aRegistrationData):
-		iPluginId(aPluginId),
-		iRegistrationData(aRegistrationData)
-		{}
-
-public:
-	TPluginId PluginId() const { return iPluginId;};
-	const TDesC& RegistrationData() const { return iRegistrationData;};
-
-private:
-	TPluginId iPluginId;
-	const TDesC& iRegistrationData;
-	};
-
-
-/**
- * Provides authentication and identity management services.
- *
- * A CPolicyServer derived class providing management of identity
- * authentication services. Responsible for managing identities in accordance
- * with the requests made by clients.
- * 
- **/
-class CAuthServer : public CScsServer, public MEvaluatorPluginInterface,
-    public MEvaluatorClientInterface
-	{
-public:
-	// implement CScsServer.
-	virtual CScsSession* DoNewSessionL(const RMessage2& aMessage);
-	
-
-	// implement CScsServer.
-	virtual void DoPreHeapMarkOrCheckL();
-	
-	// implement CScsServer.
-	virtual void DoPostHeapMarkOrCheckL();
-	
-
-	static CAuthServer* NewLC(CActive::TPriority = CActive::EPriorityStandard);
-
-	void AuthenticateL(const RMessage2& aMessage);
-	
-	void DeauthenticateL(const RMessage2& aMessage);
-	void CancelL(const RMessage2& aMessage);
-	void PluginsL(const RMessage2& aMessage);
-	void ActivePluginsL(const RMessage2& aMessage);
-	void PluginsByTypeL(const RMessage2& aMessage);
-	void PluginsByTrainingL(const RMessage2& aMessage);
-	void IdentitiesL(const RMessage2& aMessage);
-	void SetIdentityStringL(const RMessage2& aMessage);
-	void IdentityStringL(const RMessage2& aMessage);
-	void RegisterIdentityL(const RMessage2& aMessage);
-	void RemoveIdentityL(const RMessage2& aMessage);
-	void TrainPluginL(const RMessage2& aMessage);
-	void ForgetPluginL(const RMessage2& aMessage);
-	void PreferredTypePluginL(const RMessage2& aMessage);
-	void SetPreferredTypePluginL(const RMessage2& aMessage);
-	void IdentitiesWithStringL(const RMessage2& aMessage);
-	void ListAuthAliasesL(const RMessage2& aMessage);
-	void ResolveExpressionL(const RMessage2& aMessage);
-	void ResetIdentityL(TInt aFunction, const RMessage2& aMessage);
-	void ResetIdentityByListL(const RMessage2& aMessage);
-
-	virtual void Evaluate(TPluginId aPluginId,
-						  TIdentityId& aIdentityId,
-						  CAuthExpressionImpl::TType aType,
-						  TRequestStatus& aStatus);
-	
-	virtual void Evaluate(TAuthPluginType aPluginType,
-						  TIdentityId& aIdentityId,
-						  CAuthExpressionImpl::TType aType,
-						  TRequestStatus& aStatus);
-
-	virtual void CancelEvaluate(); 
-	virtual void EvaluationSucceeded(TIdentityId aIdentityId);
-	virtual void EvaluationFailed(TInt aReason);
-
-private:
-	
-	CAuthServer(CActive::TPriority aPriority);
-
-	/// 2nd phase construction
-	void ConstructL();
-	
-	~CAuthServer();
-
-    CIdentity* CachedIdentity(const TTimeIntervalSeconds& timeout);						   
-
-	TBool FilterActivePlugins(const CAuthPluginInterface& aInterface);
-
-	void FirstStartL();
-	void CreatePropertiesL();
-	void ClearPropertiesL();
-
-	TBool ServerBusy();
-	
-	void EvaluationSucceededL(TIdentityId aIdentityId) ;
-	void CompleteAuthenticationL(const RMessagePtr2& aMessage, CIdentity* aId);
-
-	typedef TBool (CAuthServer::* TInterfaceFilter)(const CAuthPluginInterface&);
-	
-	void FilterPluginsL(
-		const RMessage2& aMessage, TInterfaceFilter aFilter);
-	
-	void GetDescriptionsFromEComLC(
-		TInterfaceFilter aFilter, RCPointerArray<const CPluginDesc>& aDescs);
-	
-	TBool FilterAllPlugins(const CAuthPluginInterface&);
-	TBool FilterPluginsByType(const CAuthPluginInterface&);
-	TBool FilterPluginsByTraining(const CAuthPluginInterface& aInterface);
-
-	void UpdateAuthL(TLastAuth& aAuth, TPluginId aPlugin);
-	
-	HBufC* StringOrNullLC(TBool aReturnString, TIdentityId id);
-
-	void EvaluateL(TPluginId aPluginId,
-				   TIdentityId& aIdentityId,
-				   CAuthExpressionImpl::TType aType,
-				   TRequestStatus& aStatus);
-	
-	void ProcessAliasStringL(RPointerArray<HBufC>& aAuthAliasList, const TDesC& aAliasStringToProcess , RBuf& aResultantAliasString);
-	
-	TBool CheckForAliasInAliasString(RPointerArray<HBufC>& aAuthAliasList, const TDes& aAliasString);
-	CTransientKeyInfo* CreateKeyInfoLC(TPluginId aPluginId, const TDesC8& aPluginData, const CProtectionKey& aProtKey);
-	TCustomResult CustomSecurityCheckL(const RMessage2& aMsg, 
-		TInt& aAction, TSecurityInfo& aMissing);
-	void TokenizeStringL( const TDesC& aStringToBeProcessed, RBuf& aResultantString );
-	void ResolveAliasL(	const TDesC& aAliasName, 
-						RPointerArray<HBufC>& aAliasList, 
-						RBuf& aResultantString);
-	
-
-	void FreeMemoryBeforeHeapMark();
-	void SetupVariablesAfterHeapMarkEndL();
-
-private:
-	RFs iFs;
-	/// The persistent authentication database
-	CAuthDb2*  iAuthDb2;
-	//plugin manager
-	CPluginMgr* iPluginMgr;
-	// The training manager 
-	CTrainingMgr* iTrainingMgr;
-	/// the auth expression evaluator
-	CEvaluator* iEvaluator;
-	/// the last authenticated identity
-	CIdentity* iLastIdentity;
-	/// the last authentication time
-	TTime iLastAuthTime;
-	/// holds the information about the authentication taking place
-	CAuthTransaction* iAuthTransaction;
-	/// used to publish information about the last authentication 
-	RProperty iAuthProperty;
-	/// used to notify subscribers of changes to the authenticated identity
-	RProperty iAuthEventProperty;
-	/// The authentication repository
-	CAuthRepository* iAuthRepository;
-	/// The key size to be used for protection keys
-	TInt iKeySize;
-	/// The parameters from the IPC Call
-	CAuthParams* iParams;
-	
-	
-	TAuthTrainingStatus iFilterTraining;
-	TAuthPluginType iFilterType;
-	CPluginObserver* iPluginObserver;
-	
-	// Server Policies
-	static const TUint iRangeCount;
-	static const TInt iRanges[KPolicyRanges];
-	static const TUint8 iElementsIndex[KPolicyRanges];
-	static const CPolicyServer::TPolicyElement iPolicyElements[KPolicyElements];
-	static const CPolicyServer::TPolicy iPolicy;
-	static const TStaticSecurityPolicy iPropertyWritePolicy;
-	static const TStaticSecurityPolicy iPropertyReadPolicy;
-	};
-} //namespace
-
-#endif // AUTHSERVER_H
--- a/authenticationservices/authenticationserver/source/server/authserver_impl.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,45 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* This header file includes other header files which
-* are required to build the authentication server.
-*
-*/
-
-
-/**
- @file 
- @internalTechnology
-*/
-
-#ifndef SERVER_AUTHSERVER_H
-#define SERVER_AUTHSERVER_H
-
-#include <authserver/authplugininterface.h>
-#include <authserver/auth_srv_errs.h>
-#include "authcommon_impl.h"
-#include "arrayutils.h"
-#include "encryptedprotectionkey.h"
-#include "transientkey.h"
-#include "transientkeyinfo.h"
-#include "authdb.h"
-#include "evaluator.h"
-#include "authserver.h"
-#include "authserversession.h"
-#include "pluginmgr.h"
-#include "pluginobserver.h"
-#include "trainingmgr.h"
-
-#endif	// #ifndef SERVER_AUTHSERVER_H
-
--- a/authenticationservices/authenticationserver/source/server/authserversession.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,196 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* authserverserversession.cpp
-* CAuthserverSession class implementation
-*
-*/
-
-
-/**
- @file 
-*/
-
-#include "authserver_impl.h"
-#include "log.h"
-
-using namespace AuthServer;
-
-void CAuthServerSession::PanicClient(const RMessagePtr2& aMessage,
-									 TAuthServerPanic aPanic)
-	{
-	aMessage.Panic(KAuthServerShortName, aPanic);
-	}
-
-//
-// 2nd phase construct for sessions - called by the CServer framework
-//
-void CAuthServerSession::CreateL()
-	{
-	iAuthServer =
-	  static_cast<CAuthServer*>(const_cast<CServer2*>(CSession2::Server()));
-	}
-CAuthServerSession* CAuthServerSession::NewL(CAuthServer &aServer)
-/**
-	Factory function allocates new instance of CAuthServerSession.
-
-	@return					New, initialized instance of CAuthServerSession
-							which is owned by the caller.
- */
-	{
-	CAuthServerSession* self = new(ELeave) CAuthServerSession(aServer);
-	CleanupStack::PushL(self);
-	self->ConstructL();			// CScsSession implementation
-	CleanupStack::Pop(self);
-	return self;
-	}
-
-CAuthServerSession::CAuthServerSession(CAuthServer &aServer)
-/**
-	This private constructor prevents direct instantiation.
- */
- :	CScsSession(aServer)
-	{
-	// empty.
-	}
-
-
-CAuthServerSession::~CAuthServerSession()
-	{
-	}
-
-//
-// Handle a client request.
-// Leaving is handled by CAuthServer::ServiceError() which reports
-// the error code to the client
-//
-TBool CAuthServerSession::DoServiceL(TInt aFunction, const RMessage2& aMessage)
-/**
-	Implement CScsSession by handling the supplied message.
-
-	Note the subsession creation command is automatically sent to
-	DoCreateSubsessionL, and not this function.
-
-	@param	aFunction		Function identifier without SCS code.
-	@param	aMessage		Standard server-side handle to message.	 Not used.
- */
-	{
-	TAuthServerMessages func = static_cast<TAuthServerMessages>(aFunction);
-	
-	switch (func)
-		{
-    case EAuthenticate:
-        iAuthServer->AuthenticateL(aMessage);
-        break;
-    case ECancel:
-		iAuthServer->CancelL(aMessage);
-		break;
-	case EPlugins:
-		iAuthServer->PluginsL(aMessage);
-		break;
-	case EActivePlugins:
-		iAuthServer->ActivePluginsL(aMessage);
-		break;
-	case EPluginsByType:
-		iAuthServer->PluginsByTypeL(aMessage);
-		break;
-	case EPluginsByTraining:
-		iAuthServer->PluginsByTrainingL(aMessage);
-		break;
-	case EIdentities:
-		iAuthServer->IdentitiesL(aMessage);
-		break;
-	case EIdentityString:
-		iAuthServer->IdentityStringL(aMessage);
-		break;
-	case ESetIdentityString:
-		iAuthServer->SetIdentityStringL(aMessage);
-		break;
-	case ERegisterIdentity:
-		iAuthServer->RegisterIdentityL(aMessage);
-		break;
-	case ERemoveIdentity:
-		iAuthServer->RemoveIdentityL(aMessage);
-		break;
-	case ETrainPlugin:
-		iAuthServer->TrainPluginL(aMessage);
-		break;
-	case EForgetPlugin:
-		iAuthServer->ForgetPluginL(aMessage); 
-		break;
-    case EDeauthenticate:
-		iAuthServer->DeauthenticateL(aMessage);
-		break;
-	case EGetAuthPreferences:
-		iAuthServer->PreferredTypePluginL(aMessage);
-	    break;
-	case ESetAuthPreferences:
-		iAuthServer->SetPreferredTypePluginL(aMessage);
-		break;
-	case EIdentitiesWithString:
-		iAuthServer->IdentitiesWithStringL(aMessage);
-		break;
-	case EListAuthAliases:
-		iAuthServer->ListAuthAliasesL(aMessage);
-		break;
-	case EResolveExpression:
-		iAuthServer->ResolveExpressionL(aMessage);
-		break;
-	case EResetIdentity:
-	case EResetIdentityByType:
-		iAuthServer->ResetIdentityL(aFunction, aMessage);
-		break;
-	case EResetIdentityByList:
-		iAuthServer->ResetIdentityByListL(aMessage);
-		break;
-	default:
-		PanicClient(aMessage,EPanicInvalidFunction);
-		break;
-		}
-	return EFalse;
-	}
-
-//
-// Handle an error from CAuthServerSession::ServiceL()
-// A bad descriptor error implies a badly programmed client, so panic it;
-// otherwise use the default handling (report the error to the client)
-//
-void CAuthServerSession::ServiceError(const RMessage2& aMessage, TInt aError)
-	{
-	TBool panicClient = ETrue;
-	TAuthServerPanic cliPanicReason = EPanicCorruptDescriptor;	//Init
-	
-	switch (aError)
-		{
-	case KErrBadDescriptor:
-		cliPanicReason = EPanicCorruptDescriptor;
-		break;
-	
-	case KErrAuthServInvalidInternalizeExpr:
-		cliPanicReason = EPanicBadExternalizedAuthExpr;
-		break;
-	case KErrAuthServNoSuchPlugin:
-		cliPanicReason = EPanicNoSuchAuthPlugin;
-		break;
-	
-	default:
-		panicClient = EFalse;
-		}
-	DEBUG_PRINTF3(_L8("Error in CAuthServerSession %d, func %d"), aError, aMessage.Function());
-
-	if (panicClient)
-		PanicClient(aMessage, cliPanicReason);
-	else
-		CScsSession::ServiceError(aMessage, aError);
-	}
--- a/authenticationservices/authenticationserver/source/server/authserversession.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,86 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CAuthServerSession class definition
-*
-*/
-
-
-/**
- @file 
- @released
- @internalComponent
-*/
-#ifndef AUTHSERVERSESSION_H
-#define AUTHSERVERSESSION_H
-
-#include "authserver.h"
-#include <authserver/auth_srv_errs.h>
-#include <scs/scsserver.h>
-
-namespace AuthServer
-{
-
-/**
- * This enum is used to make IPC indexes used as arguments in function calls
- * less obscure.
- * @internalComponent
- * @released
- */
-enum TIpcIndexes
-	{
-	EIpcArgument0 = 0,  ///< IPC indexes arguments 0
-	EIpcArgument1,      ///< IPC indexes arguments 1
-	EIpcArgument2,      ///< IPC indexes arguments 2
-	EIpcArgument3       ///< IPC indexes arguments 3
-	};
-
-
-/**
- * @internalComponent
- * @released
- */
-class CAuthServerSession : public CScsSession
-	{
-public:
-	void CreateL();
-	static CAuthServerSession* NewL(CAuthServer &aServer);
-private:
-	~CAuthServerSession();
-	
-	/**
-	 * Handle a client request.
-	 * Leaving is handled by CAuthServer::ServiceError() which reports
-	 * the error code to the client
-	 **/
-	TBool DoServiceL(TInt aFunction, const RMessage2& aMessage);
-	
-	/**
-	 * Handle an error from CAuthServerSession::ServiceL().
-	 * A bad descriptor error implies a badly programmed client, so panic it;
-	 * otherwise use the default handling (report the error to the client)
-	 **/
-	void ServiceError(const RMessage2& aMessage,TInt aError);
-
- 	void PanicClient(const RMessagePtr2& aMessage, TAuthServerPanic aPanic);
-
- 	CAuthServerSession(CAuthServer &aServer);
- 	
-	CAuthServer* iAuthServer; 
-	};
-	
-	
-} //namespace
-
-#endif // AUTHSERVERSESSION_H
--- a/authenticationservices/authenticationserver/source/server/authtransaction.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,93 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CAuthTransaction implementation
-*
-*/
-
-
-/**
- @file 
-*/
-
-#include <s32file.h>
-#include <s32mem.h>
-#include "authtransaction.h"
-#include "authexpression_impl.h"
-#include "authserveripc.h"
-
-using namespace AuthServer;
-
-
-CAuthTransaction* CAuthTransaction::NewL(const RMessage2& aMsg,
-										 TBool aClientKey, 
-										 TInt aClientSid,
-										 TBool aWithString,
-									 	 const TDesC& aClientMessage,
-									 	 const CAuthExpressionImpl* aExpr)
-	{
-	CAuthTransaction* me =
-		new (ELeave) CAuthTransaction(aMsg, aClientKey, aClientSid, aWithString,
-									  aClientMessage, aExpr);
-	return me;
-	}
-	
-
-CAuthTransaction::CAuthTransaction(const RMessage2& aMsg, TBool aClientKey, 
-									TInt aClientSid, TBool aWithString,
-									 const TDesC& aClientMessage, const CAuthExpressionImpl* aExpr) :
-	iMsg(aMsg), iClientKey(aClientKey),
-	iClientSid(aClientSid), iWithString(aWithString),
-	iClientMessage(aClientMessage),	iExpr(aExpr)
-	{
-	 
-	if(iClientSid == 0)
-		{
-		iClientSid = iMsg.SecureId();
-		}
-	}
-	
-HBufC8*& CAuthTransaction::AddPluginL(TPluginId& aPluginId,
-									 TIdentityId& aIdentityId)
-	{
-	TPluginResult* result  = new (ELeave) TPluginResult;
-	CleanupStack::PushL(result);
-	
-	Mem::FillZ(result, sizeof(TPluginResult));
-	result->iPlugin = aPluginId;
-	result->iId = &aIdentityId;
-	iRecords.AppendL(result);
-	CleanupStack::Pop(result);
-	return result->iData;
-	}
-
-
-TPluginId CAuthTransaction::LastPluginId() const
-	{
-	return iRecords[iRecords.Count()-1]->iPlugin; 
-	}
-	
-CAuthTransaction::~CAuthTransaction()
-	{
-	delete iExpr;
-	TInt count = iRecords.Count();
-	for (TInt i = 0 ; i < count ; ++i)
-	    {
-		delete iRecords[i]->iData;
-		delete iRecords[i];
-	    }
-	
-	iRecords.Close();
-	
-	}
--- a/authenticationservices/authenticationserver/source/server/authtransaction.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,109 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CAuthTransaction class definition
-*
-*/
-
-
-/**
- @file 
- @released
- @internalComponent
-*/
-#ifndef AUTHTRANSACTION_H
-#define AUTHTRANSACTION_H
-
-#include <e32cmn.h>
-#include <e32base.h>
-#include "authserver/authtypes.h"
-
-namespace AuthServer 
-{
-
-class CAuthExpressionImpl;
-
-/**
- * This class holds state information about the current asynchronous
- * authentication taking place.
- **/
-class CAuthTransaction : public CBase
-	{
-public:
-	struct TPluginResult
-		{
-		TPluginId iPlugin;
-		TIdentityId* iId;		
-		HBufC8* iData;
-	    }; 
-
-	typedef RPointerArray<TPluginResult> RResultArray;
-	
-	static CAuthTransaction* NewL(const RMessage2& aMsg,
-								  TBool aClientKey, TInt aClientSid,
-								  TBool aWithString, const TDesC& aClientMessage,
-								  const CAuthExpressionImpl* aExpr);
-	
-	HBufC8*& AddPluginL(TPluginId& aPluginId,
-						TIdentityId& aIdentityId);
-					   
-	const RMessagePtr2& Message() { return iMsg; }
-
-	RResultArray& Results() { return iRecords; }
-	
-	TBool ClientKey() { return iClientKey; }
-
-	TBool WithString() { return iWithString; }
-	
-	TInt ClientSid()  { return iClientSid;	}
-
-	const HBufC* ClientMessage() {return static_cast<const HBufC*>(&iClientMessage); }
-
-	TPluginId LastPluginId() const;
-	
-	~CAuthTransaction();
-	
-private:
-
-	CAuthTransaction(const RMessage2& aMsg, TBool aClientKey, TInt aClientSid,
-					 TBool aWithString, const TDesC& aClientMessage,
-					 const CAuthExpressionImpl* aExpr);
-					 
-	void ConstructL(const RMessage2& aMessage);
-	
-	/// the message to complete at the end
-    const RMessagePtr2         iMsg;
-    
-	/// are we returning a client key?
-	TBool                      iClientKey;
-	   
-	TInt					   iClientSid;
-       
-	/// are we returning a client key?
-	TBool                      iWithString;
-	
-    /// the displayable text string to the plugin
-    const TDesC&              	iClientMessage;
-    
-	// the authentication expression being used
-	const CAuthExpressionImpl* iExpr;
-	
-	/// A list of results returned by each plugin called
-    RResultArray               iRecords;
-    
-    };
-
-} //namespace
-
-#endif // AUTHTRANSACTION_H
--- a/authenticationservices/authenticationserver/source/server/encryptedprotectionkey.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,86 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CEncryptedProtectionKey implementation
-*
-*/
-
-
-/**
- @file 
-*/
-
-#include "authserver_impl.h"
-
-
-using namespace AuthServer;
-
-CEncryptedProtectionKey* CEncryptedProtectionKey::NewL(HBufC8* aKeyData)
-	{
-	CEncryptedProtectionKey*  key =
-	  CEncryptedProtectionKey::NewLC(aKeyData);
-	CleanupStack::Pop(key);
-	return key;
-	}
-
-CEncryptedProtectionKey* CEncryptedProtectionKey::NewLC(HBufC8* aKeyData)
-	{
-	CEncryptedProtectionKey*  key = new (ELeave) CEncryptedProtectionKey();
-	CleanupStack::PushL(key);
-	key->ConstructL(aKeyData);
-	return key;
-	}
-
-void CEncryptedProtectionKey::ConstructL(HBufC8* aKeyData)
-	{
-	iKeyData = aKeyData;
-    }
-
-CEncryptedProtectionKey::~CEncryptedProtectionKey()
-	{
-	delete iKeyData;
-	}
-
-void CEncryptedProtectionKey::InternalizeL(RReadStream& aSrcData)
-	{
-	iKeyData = HBufC8::NewL(aSrcData, aSrcData.Source()->SizeL()); 
-	}
-
-
-void CEncryptedProtectionKey::ExternalizeL(RWriteStream& aDest) const
-	{
-	aDest << *iKeyData;
-	}
-
-	
-TPtrC8 CEncryptedProtectionKey::KeyData() const
-    {
-        return *iKeyData;
-    }
-
-CEncryptedProtectionKey* CEncryptedProtectionKey::NewL(RReadStream& aSrcData)
-	{
-	CEncryptedProtectionKey* key = NewLC(aSrcData);
-	CleanupStack::Pop(key);
-	return key;
-	}
-
-CEncryptedProtectionKey* CEncryptedProtectionKey::NewLC(RReadStream& aSrcData)
-	{
-	CEncryptedProtectionKey* key = new (ELeave) CEncryptedProtectionKey();
-	CleanupStack::PushL(key);
-	key->InternalizeL(aSrcData);
-	return key;
-	}
-
--- a/authenticationservices/authenticationserver/source/server/encryptedprotectionkey.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,100 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CEncryptedProtectionKey declaration
-*
-*/
-
-
-/**
- @file 
- @released
- @internalComponent
-*/
-
-#ifndef ENCRYPTEDPROTECTIONKEY_H
-#define ENCRYPTEDPROTECTIONKEY_H
-
-#include "authcommon_impl.h"
-
-namespace AuthServer
-{
-
-/**
- * CEncryptedProtectionKey containst the encrypted version of an identity's
- * protection key.  Encrypted protection keys are generated via the
- * CTransientKey class and are stored on the device, unlike the raw
- * protection key data.
- */
-class CEncryptedProtectionKey : public CBase
-	{
-public:	
-
-	/**
-	 * Creates a new encrypted key, passing in the encrypted key data. Should
-	 * really only be called by a CTransientKey::EncryptL. The new object
-	 * assumes ownership of the data.
-	 *
-	 * @param aKeyData the data to use as the encrypted key
-	 **/
-	static CEncryptedProtectionKey* NewL(HBufC8* aKeyData);
-	
-	/**
-	 * Creates a new encrypted key, passing in the encrypted key data. Should
-	 * really only be called by a CTransientKey::EncryptL
-	 *
-	 * @param aKeyData the data to use as the encrypted key
-	 **/
-	static CEncryptedProtectionKey* NewLC(HBufC8* aKeyData);
-	
-	/**
-	 * Internalize a persisted key  from the stream.
-	 * @param aSrcData the source data
-	 **/
-	static CEncryptedProtectionKey* NewL(RReadStream& aSrcData);	
-
-	/**
-	 * Internalize a persisted key from the stream.
-	 * @param aSrcData the source data
-	 **/
-	static CEncryptedProtectionKey* NewLC(RReadStream& aSrcData);
-
-	/**
-	 * Returns a descriptor to the encrypted key data
-	 *
-	 * @return a descriptor pointing to the encrypted key data. 
-	 **/
-	TPtrC8 KeyData() const;
-
-	/**
-	 * Writes the key data to the specified write stream. The key can be
-	 * recreated using the appropriate NewL member.
-	 *
-	 * @param aDest the destination write stream.
-	 *
-	 **/
-	void ExternalizeL(RWriteStream& aDest) const;
-	
-	~CEncryptedProtectionKey();
-
-private:
-	void ConstructL(HBufC8* aKeyData);
-	void InternalizeL(RReadStream& aSrcData);
-
-	HBufC8* iKeyData;
-    };
-
-}
-
-#endif // ENCRYPTEDPROTECTIONKEY_H
--- a/authenticationservices/authenticationserver/source/server/evaluator.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,410 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include "authserver_impl.h"
-
-
-using namespace AuthServer;
-
-const CAuthExpressionImpl::TType CEvaluator::KAnd = CAuthExpressionImpl::EAnd;
-const CAuthExpressionImpl::TType CEvaluator::KOr = CAuthExpressionImpl::EOr;
-const TInt CEvaluator::KRPNGranularity = 4;
-
-// -------- (de)allocation --------
-
-
-CEvaluator* CEvaluator::NewL(MEvaluatorPluginInterface* aPluginInterface, MEvaluatorClientInterface* aClientInterface)
-/**
-	Factory function allocates and initializes new
-	instance of CEvaluator.
-	
-	@param	aPluginInterface	Used to invoke plugins.
-	@param	aClientInterface	Used to notify clients when
-								an evaluation has completed.
- */
-	{
-	CEvaluator* ev = new(ELeave) CEvaluator(aPluginInterface, aClientInterface);
-	CleanupStack::PushL(ev);
-	ev->ConstructL();
-	CleanupStack::Pop(ev);
-	return ev;
-	}
-
-
-CEvaluator::CEvaluator(MEvaluatorPluginInterface* aPluginInterface, MEvaluatorClientInterface* aClientInterface)
-/**
-	Constructor records the supplied plugin and client interfaces.
-	
-	@param	aPluginInterface	Used to invoke plugins.
-	@param	aClientInterface	Used to notify clients when
-								an evaluation has completed.
- */
-:	CActive(CActive::EPriorityStandard),
-	iPluginInterface(aPluginInterface),
-	iClientInterface(aClientInterface)
-//	,iRpnStack(0)
-	{
-	CActiveScheduler::Add(this);
-	}
-
-
-void CEvaluator::ConstructL()
-/**
-	Allocate resources (i.e. RPN stack) used by
-	this object throughout its lifetime.
- */
-	{
-	iRpnStack = new(ELeave) CArrayFixFlat<TIdentityId>(KRPNGranularity);
-	}
-
-
-CEvaluator::~CEvaluator()
-/**
-	Free any resources (i.e. RPN stack) successfully
-	allocated by this object.
- */
-	{
-	Cancel();
-	delete iRpnStack;
-	}
-
-
-// -------- evaluation --------
-
-
-void CEvaluator::Evaluate(const CAuthExpressionImpl* aExpr)
-/**
-	Evaluate the current expression.  This finds
-	the leftmost leaf node from the supplied expression
-	and calls the appropriate plugin.
- */
-	{
-	__ASSERT_DEBUG(!IsActive(),
-					Panic(EBusy));	
-	// iterate through left branches until find
-	// a leaf node
-	
-	while (aExpr->Type() == KAnd || aExpr->Type() == KOr)
-		{
-		aExpr = aExpr->Left();
-		}
-	
-	iCurrentNode = aExpr;
-	
-	if (aExpr->Type() == CAuthExpressionImpl::EPluginId)
-		iPluginInterface->Evaluate(aExpr->PluginId(), iIdentity, aExpr->Type(), iStatus);
-	else if (aExpr->Type() == CAuthExpressionImpl::ENull)
-		{
-		iPluginInterface->Evaluate(0, iIdentity, aExpr->Type(), iStatus);
-		}
-	else /* aExpr->Type() == CAuthExpression::EPluginType */
-		iPluginInterface->Evaluate(aExpr->PluginType(), iIdentity, aExpr->Type(), iStatus);
-	SetActive();
-	}
-
-
-void CEvaluator::RunL()
-/**
-	Implement CActive by recording the identity
-	returned by the plugin.  If the individual
-	plugin failed then fail the entire evaluation.
- */
-	{
-	switch (iStatus.Int())
-	    {
-	    case KErrAuthServPluginNotActive:
-	        // don't break
-	    case KErrAuthServPluginCancelled:
-	        iIdentity = KUnknownIdentity;
-	        // don't break
-	    case KErrNone:
-	        EvaluatedNode(iIdentity);
-    		break;
-    	default: 
-    	    NotifyClientFailed(iStatus.Int());
-    	    break;
-	    }
-	}
-
-
-void CEvaluator::DoCancel()
-/**
-	Implement CActive.  This function does not
-	currently do anything.
- */
-	{
-	iPluginInterface->CancelEvaluate();
-
-	NotifyClientFailed(KErrCancel);
-	}
-
-void CEvaluator::EvaluatedNode(TIdentityId aIdentity)
-/**
-	This function is called when the plugin has
-	returned an identity.
-	
-	If it is a root node then complete the client request.
-
-	If it is a left node, then push the identity on the
-	RPN stack and evaluate the right node.
-	
-	If it is a right node then combine it with the stacked
-	left result using the parent node's operator.
- */
-	{
-	CAuthExpressionImpl* parent = iCurrentNode->Parent();
-	
-	// If parent node complete client request.
-	// This path is only used if the expression contains
-	// a single leaf node.  If the root node is complex
-	// then EvaluateCompound() calls HaveFinalResult().
-	if (parent == 0)
-		{
-		__ASSERT_DEBUG(RpnDepth() == 0, Panic(EENRpnStackNonZero));
-		NotifyClientSucceeded(aIdentity);
-		}
-	// if left node then push identity and evaluate sibling
-	else
-		{	
-		if (! PushIdentity(aIdentity))
-			NotifyClientFailed(KErrNoMemory);
-		else
-			{
-			const CAuthExpressionImpl* rhsExpr = parent->Right();
-			// if just evaluated RHS then compound result
-			if (rhsExpr == iCurrentNode)
-				{
-				EvaluateCompound(parent);
-				}
-			else if ( 	(aIdentity == KUnknownIdentity && parent->Type() == KAnd) || 
-						(aIdentity != KUnknownIdentity && parent->Type() == KOr)
-					)
-				{
-				if (! PushIdentity(aIdentity))
-					NotifyClientFailed(KErrNoMemory);
-				else
-					EvaluateCompound(parent);
-				}
-			// can't be short-circuited so evaluate RHS
-			else
-				{
-				Evaluate(rhsExpr);
-				}
-			}	// else (! PushIdentity(aIdentity))
-		}
-	}
-
-
-void CEvaluator::EvaluateCompound(const CAuthExpressionImpl* aParent)
-/**
-	This function is called by EvaluatedNode when
-	both the left and right identities are on the
-	RPN stack.
-	
-	Those two values are replaced with a single value
-	from the combining operator.
- */
-	{
-	__ASSERT_DEBUG(RpnDepth() >= 2, Panic(EECRpnStackTooLow));
-	TIdentityId rhs = PopIdentity();
-	TIdentityId& lhs = LastIdentity();	// replace this with result
-	
-	switch (aParent->Type())
-		{
-	case KAnd:
-		// unknown if left and right don't match.
-		// These are both unknown for short-circuit.
-		if (lhs != rhs)
-			lhs = KUnknownIdentity;
-		break;
-	
-	case KOr:
-		// only take right value if left unknown.
-		// Both same non-unknown for short-circuit.
-		if (lhs == KUnknownIdentity)
-			lhs = rhs;
-		break;
-	
-	default:
-		__ASSERT_DEBUG(EFalse, Panic(EECBadParentType));
-		break;
-		}
-	
-	// combine the parent complex node with _its_ sibling
-	CAuthExpressionImpl* parent2 = aParent->Parent();
-
-	// if parent2 is the root node, then complete the client request
-	if (parent2 == 0)
-		{
-		__ASSERT_DEBUG(RpnDepth() == 1, Panic(EECRpnStackNotOneAtRoot));
-		// reset stack after notifying client because
-		// lhs is a reference to the top (only) item.
-		NotifyClientSucceeded(lhs);
-		}
-	
-	// if parent is parent2's left node then evaluate parent's right
-	// sibling.  At this point parent's result is on the stack.
-	else if (parent2->Left() == aParent)
-		{
-		// (lhs == unknown && type == AND) || (lhs != unknown && type == OR)
-		if ((lhs == KUnknownIdentity) == (parent2->Type() == KAnd))
-			{
-			if (! PushIdentity(lhs))
-				NotifyClientFailed(KErrNoMemory);
-			else
-				EvaluateCompound(parent2);
-			}
-		
-		else
-			Evaluate(parent2->Right());
-		}
-	
-	// parent must have been parent2's right child so combine
-	// its result with its left sibling.
-	else
-		{
-		__ASSERT_DEBUG(parent2->Right() == aParent, Panic(EECBadRightParent));
-		EvaluateCompound(parent2);
-		}
-	}
-
-
-// -------- client notification --------
-
-
-void CEvaluator::NotifyClientSucceeded(TIdentityId aIdentityId)
-/**
-	Notify the client that the evaluation has completed
-	successfully, and free the RPNStack.
-	
-	@param	aIdentityId		Identified user.  This can be KUnknownIdentity.
- */
-	{
-	iClientInterface->EvaluationSucceeded(aIdentityId);
-	ResetRpnStack();
-	}
-
-
-void CEvaluator::NotifyClientFailed(TInt aReason)
-/**
-	Notify the client that the evaluation has failed
-	and free the RPN stack.
-	
-	@param	aReason			Symbian OS error code.
- */
-	{
-	iClientInterface->EvaluationFailed(aReason);
-	ResetRpnStack();
-	}
-
-
-// -------- RPN stack --------
-
-
-TBool CEvaluator::PushIdentity(TIdentityId aIdentity)
-/**
-	Append the supplied entity to the RPN stack.
-	
-	@param	aIdentity		Function to append to the RPN stack.
-	@return					zero if could not append the item,
-							i.e. OOM, non-zero otherwise.
- */
-	{
-	TRAPD(r, iRpnStack->AppendL(aIdentity));
-	return r == KErrNone;
-	}
-
-
-TIdentityId CEvaluator::PopIdentity()
-/**
-	Remove the last identity from the RPN stack
-	and return it.
-	
-	@return					The identity which was the last
-							item on the RPN stack when this
-							function was called.
-	@pre The RPN stack contains at least one identity.
- */
-	{
-	TInt lastIndex = iRpnStack->Count() - 1;
-	TIdentityId id = iRpnStack->At(lastIndex);
-	
-	// This function will not leave because the array
-	// if not being grown.  It is only trapped to satisfy
-	// leavescan.
-	
-	TRAP_IGNORE(iRpnStack->ResizeL(lastIndex));
-	return id;
-	}
-
-
-TIdentityId& CEvaluator::LastIdentity()
-/**
-	Return a reference to the last item on the
-	RPN stack.  This function is defined so
-	ReplaceComplexIdentity() can efficiently
-	put a result on the RPN stack without reallocating.
-	
-	@return					Reference to last item on the RPN stack.
-	@pre The RPN stack contains at least one identity.
- */
-	{
-	TInt lastIndex = iRpnStack->Count() - 1;
-	return iRpnStack->At(lastIndex);	
-	}
-
-
-void CEvaluator::ResetRpnStack()
-/**
-	Clear the RPN stack.
- */
-	{
-	iRpnStack->Reset();
-	}
-
-
-#ifdef _DEBUG
-
-
-TInt CEvaluator::RpnDepth() const
-/**
-	Returns the depth of the RPN stack.  This is
-	defined for debug builds only to ensure the
-	stack depth is within an acceptable range.
- */
-	{
-	return iRpnStack->Count();
-	}
-
-
-void CEvaluator::Panic(CEvaluator::TPanic aPanic)
-/**
-	Halt the current thread with the category "AUTHEVAL"
-	and the supplied reason.
-	
-	@param	aPanic			Panic reason.
- */
-	{
-	_LIT(KPanicCat, "AUTHEVAL");
-	User::Panic(KPanicCat, aPanic);
-	}
-
-
-#endif	// #ifdef _DEBUG
-
-
--- a/authenticationservices/authenticationserver/source/server/evaluator.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,211 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Evaluator mix-in classes implementation
-*
-*/
-
-
-/**
- @file 
- @released
- @internalComponent 
-*/
- 
-#ifndef AUTHSERVER_EVALUATOR_H
-#define AUTHSERVER_EVALUATOR_H
-
-#include "authexpression_impl.h"
-
-namespace AuthServer {
-
-class MEvaluatorPluginInterface
-/**
-	CEvaluator uses this interface to invoke a plugin,
-	which can be specified by type or ID.
-	
-	@see CEvaluator
- */
-	{
-public:
-	/**
-		Invoke the specified plugin and record the identity
-		which was returned.
-		
-		@param	aPluginId		Plugin to use.
-		@param	aIdentityId		On successful completion this
-								object is set to the returned
-								identity.
-		@param	aType			The type of plugin represented 
-								by this instance.						
-		@param	aStatus			On completion (successful or
-								otherwise) this object is
-								completed with the error code.
-	 */
-	virtual void Evaluate(TPluginId aPluginId, TIdentityId& aIdentityId, 
-						  CAuthExpressionImpl::TType aType, TRequestStatus& aStatus) = 0;
-
-	/**
-	    Cancel the plugin currently being invoked.
-	 **/
-	virtual void CancelEvaluate() = 0;
-	
-	/**
-		Invoke a plugin of the requested type and record
-		the identity which was returned.
-		
-		@param	aPluginType		Type of plugin to use.  The
-								implementation maps this to a
-								single, specific plugin.
-		@param	aIdentityId		On successful completion this
-								object is set to the returned
-								identity.
-		@param	aType			The type of plugin represented 
-								by this instance.						
-		@param	aStatus			On completion (successful or
-								otherwise) this object is
-								completed with the error code.
-	 */
-	virtual void Evaluate(TAuthPluginType aPluginType, TIdentityId& aIdentityId, 
-						  CAuthExpressionImpl::TType aType, TRequestStatus& aStatus) = 0;
-	};
-
-class MEvaluatorClientInterface
-/**
-	CEvaluator uses this interface to notify the server
-	when an evaluation has finished, successfully or otherwise.
-	
-	The server implements this interface to notify
-	the client that the authentication request has
-	completed.
- */
-	{
-public:
-	/**
-		This function is called by the evaluator when it
-		has successfully parsed and evaluated an expression.
-		
-		In this context, successful means there were no
-		errors in running the plugins, or otherwise in
-		evaluating the expression, such as OOM.  It does
-		not mean that a specific user was identified -
-		aIdentity can still be CIdentity::KUnknown.
-		
-		@param	aIdentityId		Identified user.  This can
-								be CIdentity::KUnknown.
-		@see EvaluationFailed
-	 */
-	virtual void EvaluationSucceeded(TIdentityId aIdentityId) = 0;
-	/**
-		This function is called by the evaluator when
-		it has failed to evaluate an expression.  Reasons
-		for failure include failing to run a plugin;
-		the user cancelling a plugin; OOM; and others.
-		
-		Failure in this sense does not means the expression
-		was evaluated but no specific user was identified.
-		That case is handled by EvaluationSucceeded.
-		
-		@param	aReason		Symbian OS error code.
-		
-		@see EvaluationSucceeded
-	 */
-	virtual void EvaluationFailed(TInt aReason) = 0;
-	};
-
-class CEvaluator : public CActive
-/**
-	Expression evaluator.  This asynchronously
-	evaluates the supplied expression by calling
-	the referenced plugins.
- */
-	{
-public:
-	static CEvaluator* NewL(MEvaluatorPluginInterface* aPluginInterface, MEvaluatorClientInterface* aClientInterface);
-	virtual ~CEvaluator();
-
-	void Evaluate(const CAuthExpressionImpl* aExpr);
-	
-private:
-	CEvaluator(MEvaluatorPluginInterface* aPluginInterface, MEvaluatorClientInterface* aClientInterface);
-	void ConstructL();
-	
-	void EvaluatedNode(TIdentityId aIdentity);
-	void EvaluateCompound(const CAuthExpressionImpl* aParent);
-	void ReplaceComplexIdentity(TIdentityId aIdentity);
-	
-	// complete client request
-	void NotifyClientSucceeded(TIdentityId aIdentity);
-	void NotifyClientFailed(TInt aReason);
-	
-	// manipulate RPN stack
-	TBool PushIdentity(TIdentityId aIdentity);
-	TIdentityId PopIdentity();
-	TIdentityId& LastIdentity();
-	void ResetRpnStack();
-	// implement CActive
-	virtual void RunL();
-	virtual void DoCancel();
-	
-#ifdef _DEBUG
-	enum TPanic
-		{
-		EENRpnStackNonZero = 0x10,
-		EECRpnStackTooLow = 0x20, EECBadParentType, EECRpnStackNotOneAtRoot, EECBadRightParent,
-		EBusy = 0x30,
-		};
-	static void Panic(TPanic aPanic);
-	TInt RpnDepth() const;
-#endif
-	
-private:
-	/** The evaluator uses this to invoke plugins. */
-	MEvaluatorPluginInterface*const iPluginInterface;
-	/**
-		The evaluator uses this to notify the server
-		when an evaluation has completed, successfully
-		or otherwise.
-	 */
-	MEvaluatorClientInterface*const iClientInterface;
-	
-	/** Constant value defined for short name readability only. */
-	static const CAuthExpressionImpl::TType KAnd;
-	/** Constant value defined for short name readability only. */
-	static const CAuthExpressionImpl::TType KOr;
-
-	/** The expression which is currently being evaluated. */
-	const CAuthExpressionImpl* iCurrentNode;
-	
-	/** The plugin sets this value to the returned identity. */
-	TIdentityId iIdentity;
-	
-	/**
-		Granularity of RPN stack.  This value should be large
-		to parse a reasonable expression without having to
-		reallocate, and without wasting too much memory.
-	 */
-	static const TInt KRPNGranularity;
-	/**
-		Intermediate results.  (A CArrayFixFlat is used here
-		instead of an RArray because, although it uses more
-		memory, it can be resized when items are popped.)
-	 */
-	CArrayFixFlat<TIdentityId>* iRpnStack;
-	};
-
-}	// namespace AuthServer
-
-#endif	// #ifndef AUTHSERVER_EVALUATOR_H
-
-
--- a/authenticationservices/authenticationserver/source/server/pluginmgr.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,254 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Implementation of CPluginMgr
-*
-*/
-
-
-/**
- @file
-*/
-
-#include "authserver_impl.h"
-#include <authserver/authpatchdata.h>
-#include <u32hal.h>
-#include <e32svr.h> 
-using namespace AuthServer;
-
-TLinearOrder<CAuthPluginInterface> CPluginMgr::SPluginOrder(PluginCompare);
-
-TInt CPluginMgr::PluginCompare(const CAuthPluginInterface& aLhs,
-									  const CAuthPluginInterface& aRhs)
-  {
-  return aLhs.Id() - aRhs.Id();
-  }
-
-TInt CPluginMgr::FindById(const TPluginId* aId,
-						 const CAuthPluginInterface& aRhs)
-  {
-  return *aId - aRhs.Id();
-  }
-
-
-CPluginMgr* CPluginMgr::NewLC()
-  {
-  CPluginMgr* me = new (ELeave) CPluginMgr();
-  CleanupStack::PushL(me);
-  me->ConstructL();
-  return me;
-  } 
-
-CPluginMgr* CPluginMgr::NewL()
-  {
-  CPluginMgr* me = CPluginMgr::NewLC();
-  CleanupStack::Pop(me);
-  return me;
-  }
-
-CPluginMgr::~CPluginMgr()
-  {
-  ReleasePlugins();
-  ReleaseImplInfo();
-  }
-
-
-void CPluginMgr::ConstructL()
-  {
-  BuildAuthPluginsListL();
-  }
-
-CAuthPluginInterface* CPluginMgr::PluginL(const TPluginId& aId)
-  {
-  TInt idx = iPlugins.FindInOrder<>(aId, CPluginMgr::FindById);
-  CAuthPluginInterface* plugin = 0;
-  if (idx == KErrNotFound)
-	{
-	  plugin = CreatePluginImplementationL(aId);
-	  iPlugins.InsertInOrder(plugin, SPluginOrder);
-	}
-  else
-	{
-	plugin = iPlugins[idx];
-	}
-  
-  return plugin;
-  }
-
-CAuthPluginInterface* CPluginMgr::ImplementationL(TInt aIndex)
-	{
-	if( aIndex < 0 || aIndex > iPlugins.Count()-1 )
-		{
-		User::Leave(KErrArgument);
-		}
-	return iPlugins[aIndex];
-	}
-
-const RImplInfoPtrArray& CPluginMgr::ImplementationsL()
-    {
-    if (iImplArray.Count() == 0) 
-        {
-        //To load plugins from sources other than ROM the patch 
-        // data KEnablePostMarketAuthenticationPlugins must be set to True.
-        TUint32 enablePostMarketPlugin = KEnablePostMarketAuthenticationPlugins;
-
-        #ifdef __WINS__
-
-        // Default SymbianOS behavior is to only load auth plugins from ROM.
-        enablePostMarketPlugin = 0;
-
-        // For the emulator allow the constant to be patched via epoc.ini
-        UserSvr::HalFunction(EHalGroupEmulator, EEmulatorHalIntProperty,
-        (TAny*)"KEnablePostMarketAuthenticationPlugins", &enablePostMarketPlugin); // read emulator property (if present)
-
-        #endif
-          
-        if(enablePostMarketPlugin == 0)
-        	{
-         	TEComResolverParams resolverParams;
-           	REComSession::ListImplementationsL(KCAuthPluginInterfaceUid,
-        									 resolverParams,
-        									 KRomOnlyResolverUid,
-        									 iImplArray);
-        									 
-            }
-            
-         else
-         	{
-         	REComSession::ListImplementationsL(KCAuthPluginInterfaceUid, iImplArray);
-          	}
-        }
-    return iImplArray;
-    }
-
-void CPluginMgr::ReleasePlugins()
-  {
-  TInt i = iPlugins.Count();
-  while (i)
-	{
-	delete iPlugins[--i];
-	}
-  
-  i = iPluginDtorUids.Count();
-  
-  while(i)
-	  {
-	  REComSession::DestroyedImplementation(iPluginDtorUids[--i]);
-	  }
-  iPlugins.Reset();
-  iPluginDtorUids.Reset();
-  }
-
-void CPluginMgr::ForgetIdentityL(TIdentityId aId)
-  {
-  ImplementationsL();
-  
-  TInt i = iImplArray.Count();
-  while (i)
-	{
-	PluginL(iImplArray[--i]->ImplementationUid().iUid)->Forget(aId);
-	}
-  }
-
-void CPluginMgr::ReleaseImplInfo()
-  {
-  TInt i = iImplArray.Count();
-  while (i)
-	{
-	  delete iImplArray[--i];
-	}
-  
-  iImplArray.Reset();
-  }
-  
-void CPluginMgr::BuildAuthPluginsListL()
-	{
-	ReleasePlugins();
-  	ReleaseImplInfo();
-  	
-	ImplementationsL();
-  	CAuthPluginInterface* plugin = 0;
-  	for( TInt count=0; count < iImplArray.Count(); ++count)
-		{
-		plugin = CreatePluginImplementationL(iImplArray[count]->ImplementationUid().iUid);
-
-		CleanupStack::PushL(plugin);
-		User::LeaveIfError(iPlugins.InsertInOrder(plugin, SPluginOrder));
-		CleanupStack::Pop(plugin);
-		}
-	}
-
-CAuthPluginInterface* CPluginMgr::CreatePluginImplementationL(const TPluginId &aId)
-	{
-	TEComResolverParams resolverParams;
-	TBufC8<16> pluginIdTxt;
-	pluginIdTxt.Des().Format(_L8("%x"), aId);
-	pluginIdTxt.Des().UpperCase();
-	resolverParams.SetDataType(pluginIdTxt);
-		  
-	//To load plugins from sources other than ROM the patch 
-	// data KEnablePostMarketAuthenticationPlugins must be set to True.
-	TUint32 enablePostMarketPlugin = KEnablePostMarketAuthenticationPlugins;
-
-#ifdef __WINS__
-
-	// Default SymbianOS behavior is to only load auth plugins from ROM.
-	enablePostMarketPlugin = 0;
-
-	// For the emulator allow the constant to be patched via epoc.ini
-	UserSvr::HalFunction(EHalGroupEmulator, EEmulatorHalIntProperty,
-	(TAny*)"KEnablePostMarketAuthenticationPlugins", &enablePostMarketPlugin); // read emulator property (if present)
-
-#endif
-
-	TAny* plugin = 0;
-	TInt err = 0;
-	TUid dtor_ID_Key = TUid::Null();
-	if(enablePostMarketPlugin == 0) 
-	  	{
-	  	TRAP(err, plugin = 
-		REComSession::CreateImplementationL(KCAuthPluginInterfaceUid,
-											dtor_ID_Key,
-											resolverParams,
-											KRomOnlyResolverUid));
-	  	}
-		  
-	  else
-	  	{
-	  	TRAP(err, plugin = 
-		REComSession::CreateImplementationL(KCAuthPluginInterfaceUid,
-											dtor_ID_Key,
-											resolverParams));
-	  	}
-		  
-	 if (err == KErrNotFound)
-	    {
-	    err = KErrAuthServNoSuchPlugin;  
-	    }
-	 
-	 //Add key to plugin destructor keys list .
-	 TInt err2 =  iPluginDtorUids.Append(dtor_ID_Key);
-	 
-	 if(KErrNoMemory == err2)
-		 {
-		 CAuthPluginInterface* authPlugin = reinterpret_cast<CAuthPluginInterface*>(plugin);
-		 delete authPlugin;
-		 REComSession::DestroyedImplementation(dtor_ID_Key);
-		 User::LeaveNoMemory();
-		 }
-	 User::LeaveIfError(err);
-
-	return reinterpret_cast<CAuthPluginInterface*>(plugin);
-	}
-
--- a/authenticationservices/authenticationserver/source/server/pluginmgr.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,129 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-/**
- @file
- @released
- @internalComponent
-*/
-#ifndef PLUGINMGR_H
-#define PLUGINMGR_H
-
-#include <authserver/authplugininterface.h>
-namespace AuthServer 
-{
-
-/**
- * The plugin manager is responsible for managing the lifetime of plugin DLLs.
- **/
-
-class CPluginMgr : public CBase
-	{
-public:
-	static CPluginMgr* NewL();
-	static CPluginMgr* NewLC();
-	
-	~CPluginMgr();
-
-	/**
-	 * Returns the requested plugin. If the plugin has not yet been loaded
-	 * then it will be instantiated and cached prior to returning.
-	 *
-	 * @param aId the id of the plugin to return.
-	 *
-	 * @return the requested plugin
-	 *
-	 * @leave KErrAuthServerNoSuchPlugin
-	 *
-	 **/
-	CAuthPluginInterface* PluginL(const TPluginId& aId);
-
-    /**
-	 * Returns the list of plugin implementations. The list is cached for use
-	 * rather than reloading it in multiple places.
-	 *
-	 * @return the array of implementation info objects
-	 *
-	 **/
-	const RImplInfoPtrArray& ImplementationsL();
-	
-	CAuthPluginInterface* ImplementationL(TInt aIndex);
-	
-	/**
-	 * Forces all plugins to forget their training for id
-	 *
-	 * @param aId the id of the identitiy to forget.
-	 *
-	 **/
-	void ForgetIdentityL(TIdentityId aId);
-	
-	/**
-	 * Builds authentication plugins list.
-	 **/
-	void BuildAuthPluginsListL();
-	
-private:
-	static TInt PluginCompare(const CAuthPluginInterface& lhs,
-							  const CAuthPluginInterface& rhs);
-							  
-	static TInt FindById(const TPluginId* lhs,
-						 const CAuthPluginInterface& rhs);
-						 
-	static 	TLinearOrder<CAuthPluginInterface> SPluginOrder;
-	
-	void ConstructL();
-	
-	
-	/**
-	 * Forces the plugin manager to free all plugin objects.
-	 **/
-	void ReleasePlugins();
-	
-	/**
-	 * Forces the plugin manager to free the implemtation info array and
-	 * reload it on the next call to Implementations.
-	 **/
-	void ReleaseImplInfo();
-	
-	/**
-	 * Creates an implementation of the specified plugin.
-	 * 
-	 * @param aId Id of the plugin to be created.
-	 *	
-	 * @return the requested plugin
-	 *	 
-	 **/
-	CAuthPluginInterface* CreatePluginImplementationL(const TPluginId &aId);
-	
-private:	
-	mutable RPointerArray<CAuthPluginInterface> iPlugins;
-	
-	mutable RImplInfoPtrArray iImplArray;
-	
-	/**
-	 * Maintain a list of plugin destructor keys.
-	 * This is used to destroy all plugin instances when ReleasePlugins
-	 * is called.
-	 * */
-	mutable RArray<TUid>iPluginDtorUids;
-	
-    };
-
-} //namespace
-
-#endif // PLUGINMGR_H
--- a/authenticationservices/authenticationserver/source/server/pluginobserver.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,119 +0,0 @@
-/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-/**
- @file
- @internalComponent
- @released
-*/
-
-
-#include <e32debug.h>
-#include <s32mem.h>
-#include "authserver_impl.h"
-#include "log.h"
-
-using namespace AuthServer;
-
-/**
-  CPluginObserver registers for ECOM notification when new authentication plugins are added 
-  or removed and updates the plugin manager accordingly. 
- 
-  */
-
-/** 
-  Constructs a new CPluginObserver object and puts it on the cleanup stack.
-  */
-
-CPluginObserver* CPluginObserver::NewLC(CPluginMgr& aPluginMgr)
-	{
-	CPluginObserver* self = new (ELeave) CPluginObserver(aPluginMgr);
-	CleanupStack::PushL(self);
-	self->ConstructL();
-	return self;
-	}
-
-/** 
-  Constructs a new CPluginObserver object.
-  */
-
-CPluginObserver* CPluginObserver::NewL(CPluginMgr& aPluginMgr)
-	{
-	CPluginObserver* self = CPluginObserver::NewLC(aPluginMgr);
-	CleanupStack::Pop(self);
-	return self;
-	}
-
-CPluginObserver::CPluginObserver(CPluginMgr& aPluginMgr) : CActive(EPriorityStandard), iPluginMgr(aPluginMgr)
-	{
-	
-	}
-
-CPluginObserver::~CPluginObserver()
-	{
-	Cancel();
-		
-	// Close our ECOM session
-	if(iEcomSession)
-		{
-		iEcomSession->CancelNotifyOnChange(iStatus);
-		iEcomSession->Close();
-		REComSession::FinalClose();
-		}
-	}
-
-void CPluginObserver::ConstructL()
-	{
-	// Add ourselves to the current active scheduler so we can get dynamic 
-	// updates when authentication plugins are removed or new plugins are added
-	CActiveScheduler::Add(this);
-	
-	iEcomSession = &REComSession::OpenL();
-	
-	// register for ECOM update notifications in case a new agent appears
-	iEcomSession->NotifyOnChange(iStatus);
-	SetActive();
-	}
-	
-void CPluginObserver::DoCancel()
-	{
-	// Abort any update notification 
-	iEcomSession->CancelNotifyOnChange(iStatus);
-	}
-
-void CPluginObserver::RunL()
-	{
-	// Leave if there has been an error
-	User::LeaveIfError(iStatus.Int());
-	
-	// the ownership is with auth server, so dont delete it.
-	iPluginMgr.BuildAuthPluginsListL();
-	
-	// request notification of any further changes
-	iEcomSession->NotifyOnChange(iStatus);
-	SetActive();
-	}
-	
-TInt CPluginObserver::RunError(TInt aError)
-    {
-    _LIT(KAuthError, "Authserver Panic :");
-    User::Panic(KAuthError, aError);
-	    			
-	return KErrNone;
-	}
-	
--- a/authenticationservices/authenticationserver/source/server/pluginobserver.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,60 +0,0 @@
-/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-/**
- @file 
- @internalComponent
-*/
-  
-#ifndef PLUGINOBSERVER_H
-#define PLUGINOBSERVER_H
-
-#include <e32cmn.h>
-#include <ecom/ecom.h>
-
-namespace AuthServer
-{
-class CPluginMgr;
-
-class CPluginObserver : public CActive
-	{
-public:
-
-	static CPluginObserver* NewLC(CPluginMgr& aPluginMgr);
-	static CPluginObserver* NewL(CPluginMgr& aPluginMgr);
-	virtual ~CPluginObserver();	
-	
-private:
-
-	// From CActive, used for dynamically updating the list of authentication plugins.
-	virtual void DoCancel();
-	virtual void RunL();
-	TInt RunError(TInt aError);
-	
-	CPluginObserver(CPluginMgr& aPluginMgr);
-	void ConstructL();
-
-private:
-	
-	REComSession* iEcomSession;
-	CPluginMgr& iPluginMgr;
-	};
-	
-}	//namespace
-
-#endif
--- a/authenticationservices/authenticationserver/source/server/trainingmgr.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,381 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CTrainingMgr - Auth Server helper class
-*
-*/
-
-
-/**
- @file 
-*/
-#include <e32debug.h>
-#include <s32mem.h>
-#include "authserver_impl.h"
-#include "log.h"
-#include "authrepository.h"
-
-using namespace AuthServer;
-
-
-CTrainingMgr::CTrainingMgr(CPluginMgr&      aPluginMgr,
-						   CAuthDb2&        aAuthDb,
-						   CAuthRepository& aAuthRepository) :
-	CActive(EPriorityStandard),
-	iPluginMgr(&aPluginMgr),
-	iAuthDb(&aAuthDb),
-	iAuthRepository(aAuthRepository)
-	{
-	CActiveScheduler::Add(this);
-	}
-
-CTrainingMgr::~CTrainingMgr()
-    {
-    Cancel();
-    Cleanup();
-    }
-
-/**
- * @param aMessage
- * @param aId The id number to use for the identity
- * @param aProtKey the protection key will be returned here
- */
-void CTrainingMgr::RegisterIdentityL(const RMessage2& aMessage,
-									TIdentityId aId,
-									CProtectionKey&  aProtKey)
-	{
-	__ASSERT_ALWAYS(!IsActive(),
-					User::Panic(KAuthServerShortName,
-								EPanicTrainingMgrBusy));	
-
-	iProtKey = &aProtKey;
-	iMessage = new (ELeave) RMessage2(aMessage);
-	iCurrentPluginIdx = 0;
-	iIdentity = aId;
-	iDescription = HBufC::NewL(aMessage.GetDesLength(1));
-	TPtr ptr = iDescription->Des();
-	aMessage.Read(1,ptr); 
-
-	iState = ERegistrationFirstStep;
-	DoRegistrationStepL();
-	}
-
-TBool CTrainingMgr::RegisterFirstIdentityL(TIdentityId aId,
-										  CProtectionKey& aProtKey)
-	{
-	__ASSERT_ALWAYS(!IsActive(),
-					User::Panic(KAuthServerShortName,
-								EPanicTrainingMgrBusy));	
-
-	iIdentity = aId;
-	iProtKey  = &aProtKey;
-    iDescription = HBufC::NewL(KDefaultUserDescription().Length());
-    *iDescription = KDefaultUserDescription;
-    
-    TBool result = EFalse;
-    
-    //Get the default plugin id from the configuration file.
-    TPluginId defaultPluginId = iAuthRepository.DefaultPluginL();
-	
-    CAuthPluginInterface* plugin = 0;
-	TRAPD(err, plugin = iPluginMgr->PluginL(defaultPluginId));
-	
-	if ((err == KErrNone) &&
-		(plugin->IsActive()) &&
-		(plugin->Type() == EAuthKnowledge) && 
-	    (plugin->DefaultData(aId, iResult) == KErrNone))
-		{
-		iCurrentPlugin = plugin->Id(); 
-		AddIdentityL(); 
-		AddTrainingResultL();
-		result = ETrue;
-		}	
-	
-	Cleanup();		    	
-	return result;
-	}
-
-void CTrainingMgr::TrainPluginL(const RMessage2& aMessage,
-							   CProtectionKey&  aProtKey)
-	{
-	__ASSERT_ALWAYS(!IsActive(),
-					User::Panic(KAuthServerShortName,
-								EPanicTrainingMgrBusy));	
-
-	iProtKey = &aProtKey;
- 	iIdentity = aMessage.Int0();
-	iCurrentPlugin = aMessage.Int1();
-	iMessage = new (ELeave) RMessage2(aMessage);
-	CAuthPluginInterface* plugin = 0;
-
-	TRAPD(err, plugin = iPluginMgr->PluginL(iCurrentPlugin));
-	
-	if (err != KErrNone)
-		{
-		iMessage->Complete(err);
-		Cleanup();
-		return;
-		}
-	else
-		{
-		SetActive();
-		iState=ETrainingDone;
-		if (plugin->IsActive())
-			{
-			plugin->Train(iIdentity, iResult, iStatus);
-			}
-		else
-			{
-			TRequestStatus* status = &iStatus;
-			User::RequestComplete(status, KErrAuthServPluginNotActive);
-			}
-		}
-	}
-
-TInt CTrainingMgr::RunError(TInt aError)
-    {
-    iMessage->Complete(aError);
-	return KErrNone;
-	
-  }
-
-void CTrainingMgr::RunL()
-	{
-	if (iStatus != KErrNone && 
-		(iStatus != KErrAuthServPluginCancelled && 
-		iStatus != KErrAuthServPluginNotActive))
-		{	
-		// error results other than plugin cancelled or inactive handled  here
-		Complete();
-		return;
-		}
-	switch (iState)
-		{
-    	case ERegistrationFirstStep:
-			if (AddIdentityL())
-				{
-				iState = ERegistering;
-				}
-			DoRegistrationStepL();
-			break;
-       case ERegistering:
-			AddTrainingResultL();
-    		DoRegistrationStepL();
-    		break;
-       case ETrainingDone:
-            if (iStatus == KErrAuthServPluginCancelled)
-			  {
-    		  DEBUG_PRINTF(_L8("Plugin cancelled in training"));
-			  }
-    	    AddTrainingResultL();
-    		Complete();
-    		break;
-    	case ERegistrationDone:
-			WriteResultToMsgL();
-    		Complete();
-    		break;
-    	}
-	}
-
-void CTrainingMgr::DoCancel()
-	{
-	CAuthPluginInterface* plugin = 0;
-	TRAPD(err, plugin = iPluginMgr->PluginL(iCurrentPlugin));
-	
-	if (err == KErrNone)
-		{
-		iMessage->Complete(KErrCancel);
-		plugin->Cancel();
-		}
-	else
-		{
-		User::Panic(KAuthServerShortName, EPanicNoSuchAuthPlugin);
-		}
-	Cleanup();
-	}
-
-TBool CTrainingMgr::IsBusy() const
-  {
-  return iState != EIdle;
-  }
-
-CTransientKeyInfo* CTrainingMgr::CreateKeyInfoLC()
-	{
-    __ASSERT_ALWAYS(iResult != 0 && iResult->Size() > 0,
-					User::Panic(KAuthServerShortName,
-								EPanicInvalidDefaultData));	
-
-	CTransientKeyInfo* keyInfo = CTransientKeyInfo::NewLC(iCurrentPlugin);
-
-	CTransientKey* key = keyInfo->CreateTransientKeyL(*iResult);
-	CleanupStack::PushL(key);
-    
-	CEncryptedProtectionKey* encKey = key->EncryptL(*iProtKey);
-	CleanupStack::PushL(encKey);
-		
-	keyInfo->SetEncryptedProtectionKeyL(encKey);
-	CleanupStack::Pop(encKey);
-	CleanupStack::PopAndDestroy(key);
-	return keyInfo;
-	}
-
-TBool CTrainingMgr::AddTrainingResultL()
-	{
-	TBool result = EFalse;
-	if (iStatus == KErrNone)
-		{	
-		CTransientKeyInfo* keyInfo = CreateKeyInfoLC();
-		iAuthDb->SetTrainedPluginL(iIdentity, keyInfo->PluginId(),
-								   *keyInfo);
-		CleanupStack::PopAndDestroy(keyInfo);
-		result = ETrue;
-		}
-	return result;
-	}
-
-TBool CTrainingMgr::AddIdentityL()
-	{
-	TBool result = EFalse;
-	if (iStatus == KErrNone)
-		{
-		CTransientKeyInfo* keyInfo = CreateKeyInfoLC();
-		iAuthDb->AddIdentityWithTrainedPluginL(iIdentity, *iDescription, *keyInfo);
-		CleanupStack::PopAndDestroy(keyInfo);
-		result = ETrue;
-		}
-	return result;
-	}
-
-void CTrainingMgr::DoRegistrationStepL()
-	{
-	
-
-	if (iCurrentPluginIdx == iPluginMgr->ImplementationsL().Count())
-		{	
-		SetActive();
-		iState = ERegistrationDone;
-		TRequestStatus* status = &iStatus;
-		User::RequestComplete(status, KErrNone);
-		return;
-		}
-
-	iCurrentPlugin  =
-		iPluginMgr->ImplementationsL()[iCurrentPluginIdx++]
-	      ->ImplementationUid().iUid;
-	
-	CAuthPluginInterface* plugin = 0;
-	TRAPD(err, plugin = iPluginMgr->PluginL(iCurrentPlugin));
-	
-	SetActive();
-	switch (err)
-		{
-    	case KErrAuthServNoSuchPlugin:
-			{
-			// skip this plugin
-			TRequestStatus* status = &iStatus;
-			User::RequestComplete(status, KErrNone);
-			return;
-			}
-    	case KErrNone:
-			break;
-    	default:
-			User::Leave(err);
-			break;
-		}
-	delete iResult;
-	iResult = 0;
-	if (plugin->IsActive())
-		{
-		plugin->Train(iIdentity, iResult, iStatus);
-		}
-	else
-		{
-		TRequestStatus* status = &iStatus;
-		User::RequestComplete(status, KErrAuthServPluginNotActive);
-		}
-	}
-
-void CTrainingMgr::WriteResultToMsgL()
-    {
-
-	if (iAuthDb->NumTrainedPluginsL(iIdentity) > 0)
-		{
-		CIdentity* identity = CIdentity::NewLC(iIdentity, iProtKey,
-											   iDescription);
-		iProtKey = 0;
-		iDescription = 0;
-	
-		HBufC8* idBuff = HBufC8::NewLC(KDefaultBufferSize);
-		TPtr8  idPtr =  idBuff->Des();
-    
-		RDesWriteStream writeStream(idPtr);
-		CleanupClosePushL(writeStream);
-    
-		writeStream << *identity;
-		writeStream.CommitL();
-
-		TInt clientBuffSize = iMessage->GetDesMaxLength(0);
-  
-		if (clientBuffSize >= idBuff->Size())
-			{
-				iMessage->Write(0, *idBuff);
-			}
-		else
-			{
-				User::Leave(KErrUnderflow);
-			}
-		CleanupStack::PopAndDestroy(3,identity);
-		}
-	else
-		{
-
-		iStatus = KErrAuthServRegistrationFailed;
-		}
-
-    }
-    
-void CTrainingMgr::Complete()
-	{
-	iMessage->Complete(iStatus.Int());
-	Cleanup();
-	}
-
-void CTrainingMgr::Cleanup()
-	{
-	if(iDescription)
-		{
-		delete iDescription;
-		iDescription = 0;
-		}
-	
-	if(iResult)
-		{
-		delete iResult;
-		iResult = 0;
-		}
-	
-	if(iMessage)
-		{
-		delete iMessage;
-		iMessage = 0;
-		}
-	
-	if(iProtKey)
-		{
-		delete iProtKey;
-		iProtKey = 0;
-		}
-	
-	iState = EIdle;
-	}
--- a/authenticationservices/authenticationserver/source/server/trainingmgr.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,102 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CTrainingmgr - Auth Server helper class
-*
-*/
-
-
-/**
- @file 
- @internalComponent
- @released
-*/
-#ifndef TRAININGMGR_H
-#define TRAININGMGR_H
-
-#include <e32cmn.h>
-
-#include "authrepository.h"
-#include "authdb.h"
-#include "pluginmgr.h"
-
-namespace AuthServer
-{
-
-/** 
- * This AO handles the training of plugins for identities.  
- **/
-class CTrainingMgr : public CActive
-	{
-public:
-  
-	CTrainingMgr(CPluginMgr&      aPluginMgr,
-				 CAuthDb2&        aAuthDb,
-				 CAuthRepository& aAuthRepository);
-    
-    ~CTrainingMgr();
-    
-	void RegisterIdentityL(const RMessage2& aMessage,
-						  TIdentityId aId,
-						  CProtectionKey& aProtKey);
-	
-	TBool RegisterFirstIdentityL(TIdentityId aId,
-								CProtectionKey& aProtKey);
-	
-
-	void TrainPluginL(const RMessage2& aMessage,
-					 CProtectionKey& aProtKey);
-
-
-	TBool IsBusy() const;
-	
-	void RunL();  
-
-	void DoCancel(); 
-	
-private:
-	
-	enum TState
-		{
-		EIdle,
-		ERegistrationFirstStep,
-		ERegistering,
-		ERegistrationDone,
-		ETrainingDone,
-		};
-
-	CTransientKeyInfo* CreateKeyInfoLC();
-	
-	TBool AddIdentityL();
-	TBool AddTrainingResultL();
-	void  DoRegistrationStepL();
-	void  WriteResultToMsgL();
-	void  Complete();
-	void  Cleanup();
-	TInt RunError(TInt aError);
-
-	TState           iState;
-	const RMessage2* iMessage;
-	CPluginMgr*      iPluginMgr;
-	CAuthDb2*        iAuthDb;
-	TInt             iCurrentPluginIdx;
-	TPluginId        iCurrentPlugin;
-	TIdentityId      iIdentity;
-	HBufC8*          iResult;
-	HBufC*           iDescription;
-	CProtectionKey*  iProtKey;
-	CAuthRepository& iAuthRepository;
-};
-}
-#endif //  TRAININGMGR_H
--- a/authenticationservices/authenticationserver/source/server/transientkey.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,95 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CTransientKey implementation
-*
-*/
-
-
-/**
- @file 
-*/
-
-#include "authserver_impl.h"
-
-
-using namespace AuthServer;
-
-CTransientKey* CTransientKey::NewL(CPBEncryptElement* aEncryptor)
-	{
-	CTransientKey*  key =
-		CTransientKey::NewLC(aEncryptor);
-	CleanupStack::Pop(key);
-	return key;
-	}
-
-CTransientKey* CTransientKey::NewLC(CPBEncryptElement* aEncryptor)
-	{
-	CTransientKey*  key = new (ELeave) CTransientKey();
-	CleanupStack::PushL(key);
-	key->ConstructL(aEncryptor);
-	return key;
-	}
-
-void CTransientKey::ConstructL(CPBEncryptElement* aEncryptor)
-	{
-	iPbeElement = aEncryptor;
-    }
-
-CTransientKey::~CTransientKey()
-	{
-	delete iPbeElement;
-	}
-
-CEncryptedProtectionKey*
-CTransientKey::EncryptL(const CProtectionKey& aKey) const
-	{
-	TPtrC8 protData = aKey.KeyData();
-	
-	CPBEncryptor* encryptor = iPbeElement->NewEncryptLC();
-	
-	HBufC8* ciphertext =
-		HBufC8::NewLC(encryptor->MaxFinalOutputLength(protData.Length()));
-
-	TPtr8 ciphertextTemp = ciphertext->Des();
-	
-	encryptor->ProcessFinalL(protData, ciphertextTemp);
-
-	CEncryptedProtectionKey* key = CEncryptedProtectionKey::NewL(ciphertext);
-	
-	CleanupStack::Pop(ciphertext); // don't delete cipher text
-	CleanupStack::PopAndDestroy(encryptor);
-	
-	return key;
-	}
-
-CProtectionKey*
-CTransientKey::DecryptL(const CEncryptedProtectionKey& aKey) const
-	{
-	TPtrC8 encData = aKey.KeyData();
-	
-	CPBDecryptor* decryptor = iPbeElement->NewDecryptLC();
-
-	HBufC8* plaintext =
-		HBufC8::NewLC(decryptor->MaxFinalOutputLength(encData.Length()));
-	TPtr8 plaintextTemp = plaintext->Des();
-
-	// Decrypt the data
-	decryptor->ProcessFinalL(encData, plaintextTemp);
-		 
-	CProtectionKey* key = CProtectionKey::NewL(plaintext);
-	CleanupStack::Pop(plaintext);
-	CleanupStack::PopAndDestroy(decryptor);
-	return key;
-	}
--- a/authenticationservices/authenticationserver/source/server/transientkey.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,94 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CTransientKey declaration
-*
-*/
-
-
-/**
- @file 
- @released
- @internalComponent
-*/
-
-#ifndef TRANSIENTKEY_H
-#define TRANSIENTKEY_H
-
-#include <pbe.h>
-#include "authserver_client.h"
-#include "encryptedprotectionkey.h"
-
-namespace AuthServer
-{
-
-/**
- * CTransientKey is a cryptographic key that is generated on the fly and never
- * stored on the device.  Transient keys are used to encrypt and decrypt
- * protection keys, they are generated by the AuthServer using data gathered
- * from CAuthPlugin derived classes.
- */
-class CTransientKey : public CBase
-	{
-public:
-	
-	/**
-	 * Creates a new transient key, passing in the plugin data from which to
-	 * derive it.
-	 *
-	 * @param aEncryptor encryption element to use as the key. Ownership
-	 * passes to this object.
-	 **/
-	static CTransientKey* NewL(CPBEncryptElement* aEncryptor);
-
-	/**
-	 * Creates a new transient key, passing in the plugin data from which to
-	 * derive it.
-	 *
-	 * @param aEncryptor encryption element to use as the key. Ownership
-	 * passes to this object.
-	 **/
-	static CTransientKey* NewLC(CPBEncryptElement* aEncryptor);
-
-	~CTransientKey();
-
-	/**
-	 * Create an version of the provided protection key encrypted by this
-	 * key. Ownership of the returned object is passed to the caller.
-	 *
-	 * @param aKey the protection key to encrypt.
-	 *
-	 * @return an protection key encrypted by this key.
-	 **/
-	CEncryptedProtectionKey* EncryptL(const CProtectionKey& aKey) const;
-
-	/**
-	 * Decrypts an CEncryptedProtectionKey created by this transient
-	 * key. Ownership of the returned object is passed to the caller.
-	 *
-	 * @param aKey the encrypted protection key to decrypt.
-	 *
-	 * @return a protection key
-	 **/
-	CProtectionKey* DecryptL(const CEncryptedProtectionKey& aKey) const;
-
-		
-private:
-	void ConstructL(CPBEncryptElement* aEncryptor);
-	
-	CPBEncryptElement* iPbeElement;
-    };
-}
-
-#endif // TRANSIENTKEY_H
--- a/authenticationservices/authenticationserver/source/server/transientkeyinfo.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,132 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CTransientKeyInfo implementation
-*
-*/
-
-
-/**
- @file 
-*/
-#include <pbedata.h>
-#include "authserver_impl.h"
-
-using namespace AuthServer;
-
-CTransientKeyInfo* CTransientKeyInfo::NewL(
-	TPluginId aPluginId)
-	{
-	CTransientKeyInfo*  key =
-		CTransientKeyInfo::NewLC(aPluginId);
-	CleanupStack::Pop(key);
-	return key;
-	}
-
-CTransientKeyInfo* CTransientKeyInfo::NewLC(
-	TPluginId aPluginId)
-	{
-	CTransientKeyInfo*  key = new (ELeave) CTransientKeyInfo();
-	CleanupStack::PushL(key);
-	key->ConstructL(aPluginId);
-	return key;
-	}
-
-void CTransientKeyInfo::ConstructL(TPluginId aPluginId)
-	{
-	iPluginId = aPluginId;
-	}
-
-CTransientKeyInfo* CTransientKeyInfo::NewL(RReadStream& aInputStream)
-	{
-	CTransientKeyInfo*  key =
-		CTransientKeyInfo::NewLC(aInputStream);
-	CleanupStack::Pop(key);
-	return key;
-	}
-
-CTransientKeyInfo* CTransientKeyInfo::NewLC(RReadStream& aInputStream)
-	{
-	CTransientKeyInfo*  key = new (ELeave) CTransientKeyInfo();
-	CleanupStack::PushL(key);
-	key->InternalizeL(aInputStream);
-	return key;
-	}
-
-
-CTransientKeyInfo::~CTransientKeyInfo()
-	{
-	delete iEncryptedKey;
-	delete iEncryptionData;
-	}
-
-CTransientKey*
-CTransientKeyInfo::CreateTransientKeyL(const TDesC8& aPluginData) const
-	{
-	CPBEncryptElement* encrypt = 0;
-	if (!iEncryptionData)
-		{
-		// Plugin data used as password
-		encrypt = CPBEncryptElement::NewL(aPluginData);
-		CleanupStack::PushL(encrypt);
-		iEncryptionData = CPBEncryptionData::NewL(encrypt->EncryptionData());
-		}
-	else
-		{
-		// Plugin data used as password
-		encrypt = CPBEncryptElement::NewL(*iEncryptionData, aPluginData);			
-		CleanupStack::PushL(encrypt);
-		}
-	
-	CTransientKey* key = CTransientKey::NewL(encrypt);	// Ownership of encrypt transferred
-	CleanupStack::Pop(encrypt);
-	return key;
-	}
-
-const CEncryptedProtectionKey& CTransientKeyInfo::EncryptedKey() const
-	{
-	return *iEncryptedKey;
-	}
-
-void CTransientKeyInfo::SetEncryptedProtectionKeyL(
-    CEncryptedProtectionKey* aEncryptedKey)
-	{
-	if (iEncryptedKey != 0)
-		{
-		User::Leave(KErrAlreadyExists);
-		}
-	
-	iEncryptedKey = aEncryptedKey;
-	}
-  
-void CTransientKeyInfo::ExternalizeL(RWriteStream& aOutStream) const
-	{
-	ASSERT(iEncryptedKey != 0);
-	
-	aOutStream << iPluginId;
-	aOutStream << *iEncryptedKey;
-	aOutStream << *iEncryptionData;
-	}
-
-void CTransientKeyInfo::InternalizeL(RReadStream& aInStream)
-	{
-	iPluginId = aInStream.ReadInt32L();
-	iEncryptedKey = CEncryptedProtectionKey::NewL(aInStream);
-	iEncryptionData  = CPBEncryptionData::NewL(aInStream);
-	}
-
-TPluginId CTransientKeyInfo::PluginId() const
-  {
-  return iPluginId;
-  }
--- a/authenticationservices/authenticationserver/source/server/transientkeyinfo.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,120 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CTransientKeyInfo declaration
-*
-*/
-
-
-/**
- @file 
- @released
- @internalComponent
-*/
-
-#ifndef TRANSIENTKEYINFO_H
-#define TRANSIENTKEYINFO_H
-
-#include "transientkey.h"
-
-namespace AuthServer
-{
-
-/**
- * CTransientKeyInfo holds persistent data related to transient keys which it
- * also generates. The class records the parameters required to (re)generate a
- * transient key from the plugin data, and is used to link encrypted protection
- * keys a generated transient key.
- */
-class CTransientKeyInfo : public CBase
-	{
-public:
-	/**
-	 * Sets member data from parameters and randomly initialises the transient
-	 * key generation parameters. Use this method to create a key
-	 * for encrypting a new key.
-	 **/
-	static CTransientKeyInfo* NewL(TPluginId  aPluginId);
-
-	/**
-	 * Sets member data from parameters and randomly initialises the transient
-	 * key generation parameters. Use this method to create a key
-	 * for encrypting a new key.
-	 **/
-	static CTransientKeyInfo* NewLC(TPluginId  aPluginId);
-
-	/**
-	 * Reads all data from the input stream. Use this method to recreate a key
-	 * used to encrypt a key.
-	 **/
-	static CTransientKeyInfo* NewL(RReadStream& aInputStream);
-	
-	/**
-	 * Reads all data from the input stream. Use this method to recreate a key
-	 * used to encrypt a key.
-	 **/
-	static CTransientKeyInfo* NewLC(RReadStream& aInputStream);
-
-	~CTransientKeyInfo();
-
-	/**
-	 * @return the id of the plugin that was used to generate the transient
-	 * key.
-	 **/
-	TPluginId PluginId() const;
-
-	/**
-	 * @return the encrypted protection key
-	 * key.
-	 **/
-	const CEncryptedProtectionKey& EncryptedKey() const;
-
-    /**
-	 * Assign the encrypted protection key associated with the transient
-	 * key. Ownership of the key is taken by this object.
- 	 *
-	 * @param aEncryptedKey the protection key encrypted with this transient key.
-	 **/
-    void SetEncryptedProtectionKeyL(CEncryptedProtectionKey* aEncryptedKey);
-	  
-	/**
-	 * Create transient key using the plugin data. If this object was created
-	 * from a stream the method will leave with KErrBadPassword if the plugin
-	 * data does not match the original. Ownership of the CTransientKey object
-	 * is returned to the caller.
-	 **/ 
-	CTransientKey* CreateTransientKeyL(const TDesC8& aPluginData) const;
-
-	/**
-	 *
-	 **/
-	void ExternalizeL(RWriteStream& aOutStream) const;
-
-private:
-	
-    void ConstructL(TPluginId aPluginId);
-    void InternalizeL(RReadStream& aInStream);
-
-	/// the id of the plugin that encrypted the key
-	TPluginId iPluginId;
-		
-	/// the encrypted protection key
-	CEncryptedProtectionKey* iEncryptedKey;
-	
-	/// the encryption parameters
-	mutable CPBEncryptionData* iEncryptionData;
-    };
-}
-
-#endif // TRANSIENTKEYINFO_H
--- a/authenticationservices/authenticationserver/test/authtool/authtool.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,185 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* AuthTool provides a console interface to the AuthServer query
-* methods, basically dumping the contents of the AuthServer's database.
-*
-*/
-
-
-/**
- @file 
-*/
-#include <e32cons.h>
-#include "authserver_client.h"
-
-using namespace AuthServer;
-
-_LIT(KAnyStr, "Default");
-_LIT(KBiometricStr, "Biometric");
-_LIT(KKnowledgeStr, "Knowledge");
-_LIT(KTokenStr, "Token");
-
-TAuthPluginType types[] = { EAuthDefault, EAuthBiometric, EAuthKnowledge, EAuthToken };
-TPtrC typeNames[] = {KAnyStr(), KBiometricStr(), KKnowledgeStr(), KTokenStr() }; 
-
-_LIT(KUnTrainedStr, "Untrained");
-_LIT(KTrainedStr , "Trained");
-_LIT(KFullyTraininedStr, "Fully Trained");
-TPtrC trainNames[] = { KUnTrainedStr(), KTrainedStr(), KFullyTraininedStr() }; 
-
-_LIT(KMsgAuthToolPanic,"AuthTool: ");
-
-TInt ExtractDetailsL();
-TInt DisplayPlugins(RPluginDescriptions&);
-
-
-GLDEF_C TInt E32Main()
-    {
-    __UHEAP_MARK;
-	
-    CTrapCleanup* cleanupstack=CTrapCleanup::New(); 
-    TRAPD(error,ExtractDetailsL());
-    __ASSERT_ALWAYS(!error,User::Panic(KMsgAuthToolPanic, error)); 
-    delete cleanupstack;
-	
-    __UHEAP_MARKEND;
-    return 0;
-    }
-
-CConsoleBase* console = 0;
-
-TInt ExtractDetailsL()
-  {
-  // create the console
-  console = Console::NewL(_L("AuthTool"),
-										TSize(KDefaultConsWidth,
-											  KDefaultConsHeight));
-  CleanupStack::PushL(console);
-    
-  // connect to server
-  RAuthClient authClient;
-  User::LeaveIfError(authClient.Connect());
-  CleanupClosePushL(authClient);
-
-  // get the plugins
-  RPluginDescriptions plugins;
-  authClient.PluginsL(plugins);
-  CleanupClosePushL(plugins);
-
-  DisplayPlugins(plugins);
-  
-  // get the preferences
-  console->Printf(_L("\nPreferences\n-----------\n"));
-
-  TInt count = sizeof(types)/sizeof(TInt);
-  for (TInt i = 0  ; i < count ; ++i)
-	{
-    console->Printf(_L("%10S : 0x%x\n"), &typeNames[i],
-					authClient.PreferredTypePluginL(types[i]));
-	}
-  console->Printf(_L("\nPress any key to continue\n"));
-  console->Getch();
-
-  // get the identities
-  console->Printf(_L("\nIdentities\n-----------\n"));
-  
-  RIdentityIdArray ids;
-  authClient.IdentitiesL(ids);
-  CleanupClosePushL(ids);
-  
-  for (TInt index = 0  ; index < ids.Count(); ++index)
-	{
-    HBufC* str = authClient.IdentityStringL(ids[index]);	
-
-	CleanupStack::PushL(str);
-	if (str != 0)
-	  {
-      console->Printf(_L("0x%x : %S\n"), ids[index],
-						str);
-	  }
-	else
-	  {
-      console->Printf(_L("0x%x : No Name\n"), ids[index]);
-	  }
-	CleanupStack::PopAndDestroy(str);
-	}
-  console->Printf(_L("\nPress any key to finish\n"));	
-  console->Getch();
-
-  CleanupStack::PopAndDestroy(4,console);
-  return 0;
-  }
-
-TPtrC* train(TAuthTrainingStatus aT)
-  {
-  TInt idx =0; 
-  switch (aT)
-	{
-  case EAuthUntrained:
-	idx = 0;
-	break;
-  case EAuthTrained:
-	idx = 1;
-	break;
-  case EAuthFullyTrained:
-	idx = 2;
-	break;
-	}
-  return &trainNames[idx];
-  } 
-
-TPtrC* type(TAuthPluginType aT)
-  {
-  TInt idx =0; 
-  switch (aT)
-	{
-  case EAuthDefault:
-	idx = 0;
-	break;
-  case EAuthBiometric:
-	idx = 1;
-	break;
-  case EAuthKnowledge:
-	idx = 2;
-	break;
-  case EAuthToken:
-	idx = 3;
-	break;
-  case EAuthPerformance:
-	idx = 4;
-	break;
-	}
-  return &typeNames[idx];
-  } 
-
-TInt DisplayPlugins(RPluginDescriptions& aPlugins)
-  {
-  console->Printf(_L("\nPlugin Descriptions\n-------------------\n"));
-  for (TInt i = 0  ; i < aPlugins.Count(); ++i)
-	{
-	console->Printf(_L("ID            : 0x%x\n"), aPlugins[i]->Id());
-	console->Printf(_L("Name          : %S\n"), aPlugins[i]->Name());
-	console->Printf(_L("Type          : %S\n"), type(aPlugins[i]->Type()));
-	console->Printf(_L("Training      : %S\n"), train(aPlugins[i]->TrainingStatus()));
-	console->Printf(_L("#Combinations : %d\n"), aPlugins[i]->MinEntropy());
-	console->Printf(_L("FPR           : %d\n"), aPlugins[i]->FalsePositiveRate());
-	console->Printf(_L("FNR           : %d\n\n"), aPlugins[i]->FalseNegativeRate());
-    console->Printf(_L("\nPress any key to continue\n"));
-    console->Getch();
-	}
-  
-  return 0;
-  }
-
--- a/authenticationservices/authenticationserver/test/authtool/authtool.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,39 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-/**
-@file
-
-@SYMPurpose authtool.exe used to dump the contents of the AuthServer's database.
-*/
-
-TARGET	authtool.exe
-TARGETTYPE	exe
-
-UID 0x10000079 0x10001011
-VENDORID 0x70000001
-
-CAPABILITY WriteDeviceData ReadDeviceData ReadUserData WriteUserData
-
-SOURCEPATH	.
-SOURCE authtool.cpp
-
-OS_LAYER_SYSTEMINCLUDE
-USERINCLUDE ../../inc/authserver
-
-LIBRARY	euser.lib authclient.lib authcommon.lib
-SMPSAFE
--- a/authenticationservices/authenticationserver/test/reftestplugin/group/200032E7.rss	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,49 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* t_pinplugindlg notifier resource file.
-*
-*/
-
-
-#include <ecom/registryinfo.rh>
-#include <uikon.hrh>
-
-#ifdef SYMBIAN_ENABLE_SPLIT_HEADERS
-#include <uiklaf/private/pluginuid.hrh>
-#endif
-
-
-RESOURCE REGISTRY_INFO r_registry
-	{
-	dll_uid = 0x200032E7;
-	interfaces =
-		{
-		INTERFACE_INFO
-			{
-			interface_uid = KUikonUidPluginInterfaceNotifiers;
-			implementations =
-				{
-				BINARY_IMPLEMENTATION_INFO
-					{
-					implementation_uid = 0x200032E7;
-					version_no = 1;
-					display_name = "t_pinplugindlg notifier";
-					default_data = {0};
-					opaque_data = {0};
-					}
-				};
-			}
-		};
-	}
--- a/authenticationservices/authenticationserver/test/reftestplugin/group/bld.inf	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,56 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Reference Pin Plugin implementation 
-*
-*/
-
-
-/**
- @file
-*/
-
-PRJ_PLATFORMS
-DEFAULT GCCE
-
-PRJ_EXPORTS
-
-// ROMKIT includes
-../inc/pinplugin.iby /epoc32/rom/include/pinplugin.iby
-
-../inc/pinplugindialogdefs.h				SYMBIAN_OS_LAYER_PLATFORM_EXPORT_PATH(pinplugindialogdefs.h)
-
-#ifndef TOOLS
-#ifndef TOOLS2
-
-PRJ_MMPFILES
-pinplugin.mmp
-
-
-PRJ_TESTMMPFILES
-tpinplugin.mmp
-t_pinplugindlg.mmp
-t_pinplugindlg_text.mmp
-
-#endif // TOOLS2
-#endif // TOOLS
-
-PRJ_TESTEXPORTS
-
-// ROMKIT includes
-../inc/tpinplugin.iby /epoc32/rom/include/tpinplugin.iby
-
-../tpinplugin/scripts/tpinplugin.script 	 /epoc32/winscw/c/tauth/tpinplugin/scripts/tpinplugin.script
-../tpinplugin/scripts/tpinplugin.ini		 /epoc32/winscw/c/tauth/tpinplugin/scripts/tpinplugin.ini
-
--- a/authenticationservices/authenticationserver/test/reftestplugin/group/pinplugin.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,63 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-
-TARGET 		pinplugin.dll
-TARGETTYPE 	PLUGIN
-
-// ECom Dll recognition UID followed by the unique UID for this dll
-UID			0x10009D8D 0x200032E4
-VENDORID		0x70000001
-CAPABILITY	TrustedUI ProtServ ReadDeviceData WriteDeviceData Location SurroundingsDD UserEnvironment ReadUserData WriteUserData AllFiles 
-
-OS_LAYER_SYSTEMINCLUDE_SYMBIAN
-
-USERINCLUDE	.
-
-USERINCLUDE	../pinplugin
-USERINCLUDE	../../../inc_private
-
-SOURCEPATH	../pinplugin
-SOURCE		pinplugin.cpp		
-SOURCE		pinpluginao.cpp
-SOURCE		pinplugindb.cpp
-SOURCE		pinplugindialog.cpp
-
-
-start resource 200032E4.rss
-#ifdef SYMBIAN_SECURE_ECOM
-TARGET pinplugin.rsc
-#endif
-end
-
-start resource pinpluginconfig.rss
-TARGETPATH /resource/pinplugin
-HEADER
-end
-
-
-LIBRARY	ecom.lib
-LIBRARY	euser.lib
-LIBRARY	estor.lib
-LIBRARY	efsrv.lib  	
-LIBRARY	hash.lib
-LIBRARY	bafl.lib
-LIBRARY	authcommon.lib 
-SMPSAFE
-
-
--- a/authenticationservices/authenticationserver/test/reftestplugin/group/t_pinplugindlg.mmh	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,62 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* tpinplugindlg.mmh
-* The Test nofifier is built both as a text shell and as an extended notifer
-*
-*/
-
-
-#ifdef T_PINPLUGINDLG_TEXTSHELL
-
-MACRO _T_PINPLUGINDLG_TEXTSHELL
-
-TARGET          tpinplugindlg_text.dll
-TARGETTYPE      TEXTNOTIFIER2
-TARGETPATH  	\sys\bin\tnotifiers
-
-UID				0x101fe38b 0x200032E7
-
-#else
-
-TARGET          tpinplugindlg.dll
-TARGETTYPE		PLUGIN
-UID				0x10009d8d 0x200032E7
-
-LIBRARY			eiksrv.lib
-
-start resource	200032E7.RSS
-target tpinplugindlg.rsc
-end
-
-#endif
-
-CAPABILITY    	All -Tcb
-
-USERINCLUDE		.
-
-OS_LAYER_SYSTEMINCLUDE
-SYSTEMINCLUDE OS_LAYER_PLATFORM_EXPORT_PATH(test)
-SYSTEMINCLUDE OS_LAYER_PUBLIC_EXPORT_PATH(ecom)
-SYSTEMINCLUDE OS_LAYER_PUBLIC_EXPORT_PATH(techview)
-MW_LAYER_SYSTEMINCLUDE_SYMBIAN
-
-SOURCEPATH	    ..\tpinplugindlg
-
-SOURCE			tpinplugindlg.cpp
-
-LIBRARY			euser.lib 
-LIBRARY			estor.lib 
-LIBRARY			efsrv.lib
-
--- a/authenticationservices/authenticationserver/test/reftestplugin/group/t_pinplugindlg.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,23 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Tpinplugindlg.mmp
-*
-*/
-
-
-#include "t_pinplugindlg.mmh"
-
-VENDORID 0x70000001
-SMPSAFE
--- a/authenticationservices/authenticationserver/test/reftestplugin/group/t_pinplugindlg_text.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,26 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#define T_PINPLUGINDLG_TEXTSHELL
-
-#include "t_pinplugindlg.mmh"
-
-VENDORID 0x70000001
-SMPSAFE
-
-
--- a/authenticationservices/authenticationserver/test/reftestplugin/group/tpinplugin.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,59 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* tpinplugin.exe Tests plugin
-*
-*/
-
-
-/**
- @file
-*/
-
-TARGET      	tpinplugin.exe
-TARGETTYPE  	exe
-
-// To allow setcap to work
-ROMTARGET    // Empty ROM path means don't include normal execute-in-place file
-RAMTARGET /sys/bin/    // Target path (in ROM) for RAM executable image
-
-UID         	0x102740FC 0x102740FC 
-VENDORID    	0x70000001
-
-CAPABILITY TrustedUI ProtServ ReadDeviceData WriteDeviceData Location SurroundingsDD UserEnvironment
-
-OS_LAYER_SYSTEMINCLUDE
-SYSTEMINCLUDE OS_LAYER_PUBLIC_EXPORT_PATH(authserver)
-SYSTEMINCLUDE OS_LAYER_PLATFORM_EXPORT_PATH(test)
-
-USERINCLUDE		.
-USERINCLUDE		../../../source/common
-USERINCLUDE		../../../inc_private
-USERINCLUDE     ../pinplugin
-
-SOURCEPATH  	../tpinplugin
-SOURCE			tpinplugin.cpp
-SOURCE			tpinpluginteststep.cpp
-SOURCE			tpinplugintestactive.cpp
-
-
-LIBRARY     	euser.lib
-LIBRARY			testexecuteutils.lib
-LIBRARY			testexecutelogclient.lib
-LIBRARY			bafl.lib
-LIBRARY			ecom.lib
-LIBRARY			estor.lib
-LIBRARY			efsrv.lib
-LIBRARY			authcommon.lib
-SMPSAFE
--- a/authenticationservices/authenticationserver/test/reftestplugin/inc/pinplugin.iby	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,26 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#ifndef __PINPLUGIN_IBY__
-#define __PINPLUGIN_IBY__
-
-REM Pinplugin a reference Plugin
-ECOM_PLUGIN(pinplugin.dll, 0x200032E4.rsc)
-data=MULTI_LINGUIFY(RSC ZRESOURCE\pinplugin\pinpluginconfig			resource\pinplugin\pinpluginconfig)
-
-#endif
--- a/authenticationservices/authenticationserver/test/reftestplugin/inc/pinplugindialogdefs.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,174 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-/**
- @file 
- @internalAll
- @test
-*/
-
-#ifndef __PINPLUGINDIALOGDEFS_H__
-#define __PINPLUGINDIALOGDEFS_H__
-
-/** PinPlugin Dialog Notifier Uid */
-const TUid KUidPinPluginDialogNotifier = { 0x200032E6 };
-/** Pinplugin Dialog Notification for the DialogOperation */
-typedef TUint TPinPluginDialogNotification;
-
-
-/**
- Defines the operations provided by the Pin Plugin dialog. 
- It is used to identify the operation when transferring over to the notifier plugin.
- */
-enum TPinPluginDialogOperation
-	{
-	/** Displays the message about Training/Retraining/Identify process met success/failure */
-	EPinPluginInfo = 0x100,
-	/** Train/ReTrain Pin */
-	EPinPluginTraining = 0x102,
-	/** Identify Pin */
-	EPinPluginIdentify = 0x104
-	};
-	
-/** Pinplugin Dialog Operation Bit Mask */
-const TUint KPinPluginDialogOperationMask = 0xFFFF;
-
-/** 
- Pinplugin Info Message display about the result for few seconds
- without expecting the user input.
- */
-enum TPinPluginInfoMessage 
-	{
-	/** PinPlugin TrainingSuccess Message */
-	EPinPluginTrainingSuccess = 0,
-	/** PinPlugin ReTrainingSuccess Message */
-	EPinPluginReTrainingSuccess,
-	/** PinPlugin IdentificationSuccess Message */
-	EPinPluginIdentificationSuccess,
-	/** PinPlugin IdentificationFailure Message */
-	EPinPluginIdentificationFailure
-	};
-
-/** PinPlugin TrainingMessage display the process is Train/ReTrain */
-enum TPinPluginTrainingMessage
-	{
-	/** ETraining */
-	ETraining = 0x10,
-	/** EReTraining */
-	EReTraining
-	};
-	
-/** PinPlugin DialogResult used to get the result of the Dialog */
-enum TPinPluginDialogResult
-	{
-	/** Command OK */
-	EOk = 0x01,
-	/** Command CANCEL */
-	ECancel,
-	/** Command QUIT */
-	EQuit,
-	/** Command NEXT */
-	ENext
-	};
-
-/** The max Pin length should not exceed 32, because this is the maximum
- *	size possible in the CEikSecretEditor class. */
-const TInt KMaxPinLength = 32;
-
-/** A Pin value */
-typedef TBuf8<KMaxPinLength> TPinValue;
-
-
-/**  Input data for the PinIdentify */
-class TPinIdentifyInput
-	{
-public:
-	TPinPluginDialogNotification iOperation;
-
-	/** minimum pin length */
-	TInt iMinLength;
-	/** maximum pin length */
-	TInt iMaxLength;
-	/** retry true or not */
-	TBool iRetry;
-	};
-
-/** Pin IdentifyInput Buffer */
-typedef TPckgBuf<TPinIdentifyInput> TPinIdentifyInputBuf;
-
-/** Input data for the PinTraining */
-class TPinTrainingInput
-	{
-public:
-	TPinPluginDialogNotification iOperation;
-	TPinPluginTrainingMessage iMessage;
-	
-	/** minimum pin length */
-	TInt iMinLength;
-	/** maximum pin length */
-	TInt iMaxLength;
-	/** current pin length used for the pinvalues */
-	TInt iCurrentPinLength;
-	/** Random PinValue for Choice 1 */
-	TPinValue iPinValue1;
-	/** Random PinValue for Choice 2 */
-	TPinValue iPinValue2;
-	/** Random PinValue for Choice 3 */
-	TPinValue iPinValue3;
-	/** Random PinValue for Choice 4 */
-	TPinValue iPinValue4;
-	};
-
-/** Pin TrainingInput Buffer */
-typedef TPckgBuf<TPinTrainingInput> TPinTrainingInputBuf;
-
-/** Input data for the PinInfo */
-class TPinInfoInput
-	{
-public:
-	TPinPluginDialogNotification iOperation;
-	TPinPluginInfoMessage iMessage;
-	};
-
-/** The buffer holds the Message about the result of the Training/ReTraining success
-    or Identification success/failure for few seconds without expecting the user input. */
-typedef TPckgBuf<TPinInfoInput> TPinInfoInputBuf;
-
-
-/** Output data for the PinIdentify, PinTraining */
-class TPinDialogOutput
-	{
-public:
-	/** iPinValue - To get the pinvalue when case is PinIdentify */
-	TPinValue iPinValue;
-	/** 
-	 iIndex - To get the index of selected pin when case is PinTraining 
-	 iIndex value should be within the range 0 - 3.
-	 */
-	TInt iIndex;
-	/** iNewPinLength - To get the new pin length for the next dialog */
-	TInt iNewPinLength; 
-	/** iResult - To get the output command when case is PinTraining / PinIdentify */
-	TPinPluginDialogResult iResult;
-	};
-
-/** The buffer holds the data for the TPinDialogOutput */
-typedef TPckgBuf<TPinDialogOutput> TPinDialogOutputBuf;
-
-
-#endif // __PINPLUGINDIALOGDEFS_H__
--- a/authenticationservices/authenticationserver/test/reftestplugin/inc/tpinplugin.iby	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,30 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#ifndef __TPINPLUGIN_IBY__
-#define __TPINPLUGIN_IBY__
-
-#include <testexecute.iby>
-
-file=ABI_DIR\BUILD_DIR\tpinplugin.exe		sys\bin\tpinplugin.exe
-ECOM_PLUGIN(tpinplugindlg.dll, 200032E7.rsc)
-
-data = \epoc32\winscw\c\tauth\tpinplugin\scripts\tpinplugin.ini				tauth\tpinplugin\scripts\tpinplugin.ini        attrib=W
-data = \epoc32\winscw\c\tauth\tpinplugin\scripts\tpinplugin.script		    tauth\tpinplugin\scripts\tpinplugin.script		  
-
-#endif
--- a/authenticationservices/authenticationserver/test/reftestplugin/pinplugin/200032E4.rss	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,54 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* UIDs quick-ref
-* ECOM DLL UID:		0x200032E4 
-* ECOM interface UID:		0x102740FE
-* ECOM Implementation:		0x200032E5	
-*
-*/
-
-
-
-#include <ecom/registryinfov2.rh>
-
-// Declares info for one implementation
-RESOURCE REGISTRY_INFO theInfo
-	{
-	// UID for the plug-in DLL; matches name of this file
-	dll_uid = 0x200032E4;
-	resource_format_version = RESOURCE_FORMAT_VERSION_2;
-
-	// Declare array of interface info
-	interfaces = 
-		{
-		INTERFACE_INFO
-		 	{
-		 	// UID of interface that is implemented (i.e. CAuthPluginInterface)							
-		 	interface_uid = 0x102740FE;			
-			implementations = 
-				{
-				IMPLEMENTATION_INFO
-					{
-					implementation_uid = 0x200032E5;
-					version_no = 1;
-					display_name = "Symbian PIN Plugin Reference Implementation";
-					default_data = "200032E5";
-					opaque_data = "";
-					rom_only=1;
-					}
-				};	
-			}
-		};			
-	}		
--- a/authenticationservices/authenticationserver/test/reftestplugin/pinplugin/pinpanic.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,42 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* The panic String and panic code declarations	
-*
-*/
-
-
-/**
- @file 
-*/
-
-#ifndef __PINPANIC_H__
-#define __PINPANIC_H__
-
-/** Panic codes generated by the pinplugin */
-enum TPinPanics
-	{
-	/** The Resource file configuration values are not valid */
-	EPinPanicInvalidConfigValues=0,
-	/** The new Pinlength received from Dialog Interface is incorrect */
-	EPinPanicInvalidPinLength=1,
-	/** The index of the selected Pin for the Train process otherthan 0 - 3 */
-	EPinPanicIncorrectIndex=2
-	};
-
-/** The Panic String to Display */
-_LIT(KPinPluginPanicString,"PINPLUGIN");
-
-#endif // __PINPANIC_H__
-
--- a/authenticationservices/authenticationserver/test/reftestplugin/pinplugin/pinplugin.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,257 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CPinPlugin implementation
-*
-*/
-
-
-/**
- @file 
-*/
-
-
-#include "pinplugin.h"
-#include <bautils.h>
-#include <barsread.h>
-#include <e32math.h>
-#include <pinpluginconfig.rsg>
-#include <ecom/ecom.h>
-#include <ecom/implementationproxy.h>
-#include <f32file.h>
-
-using namespace AuthServer;
-
-_LIT(KPinPluginResourceFile, "z:\\Resource\\pinplugin\\pinpluginconfig.rsc");
-
-const TPluginId KPinPluginImplementationUid = 0x200032E5;
-
-CPinPlugin* CPinPlugin::NewL()
- 	{
- 	CPinPlugin* self = CPinPlugin::NewLC();
- 	CleanupStack::Pop();
- 	return self;
-	}
-	
-CPinPlugin* CPinPlugin::NewLC()
-	{
-	CPinPlugin* self = new(ELeave) CPinPlugin();
-	CleanupStack::PushL(self);
-	self->ConstructL();
-	return self;
-	}
-	
-CPinPlugin::~CPinPlugin()
-	{
-	delete iPinPluginAO;
-	delete iPinName;
-	delete iPinDescription;
-	}
-
-CPinPlugin::CPinPlugin()
-	{	
-	iActive = ETrue;
-	}
-		
-void CPinPlugin::ConstructL()
-	{
-	TInt retryCount, pinSize, pinMinSize, pinMaxSize;
-	TReal val;
-	
-	// Verifies the UID/SID of the Authentication server
-	// to make sure pinplugin is loaded from Authentication server.  
-	RProcess process;
-        
-	ReadResourceL(retryCount, pinSize, pinMinSize, pinMaxSize);
-
-	__ASSERT_ALWAYS(retryCount >= 0 && pinSize >= 0 && pinMinSize >= 0 &&
-	 		pinMaxSize >= 0 && pinSize >= pinMinSize && pinSize <= pinMaxSize,
-	 		User::Panic(KPinPluginPanicString(), EPinPanicInvalidConfigValues));
-
-	iName.Set(iPinName->Des());
-	iDescription.Set(iPinDescription->Des());
-	Math::Pow10(val, pinMinSize);
-	// since pinMinSize is always a Int value, val never have a floating point
-	// in future if entropy is changed to have real value also, it will work
-	// now in our case, compiler do the default truncation.
-	iMinEntropy = val;
-	iFalsePositiveRate = 0;
-	iFalseNegativeRate = 0;
-	iType = AuthServer::EAuthKnowledge;
-	 
-	//Create a new implementation object
-	iPinPluginAO = CPinPluginAO::NewL(pinSize, pinMinSize, pinMaxSize, retryCount);
-	
-	SetPluginStateL();
-	
-	}
-	
-	
-//Implement CAuthPluginInterface definitions
-
-void CPinPlugin::Identify(TIdentityId& aId,const TDesC& aClientMessage,
-						  HBufC8*& aResult, TRequestStatus& aRequest)
-	{
-	iPinPluginAO->Identify(aId, aClientMessage, aResult, aRequest);
-	}
-	
-void CPinPlugin::Cancel()
-	{
-	iPinPluginAO->Cancel();		
-	}
-
-void CPinPlugin::Train(TIdentityId aId, HBufC8*& aResult, TRequestStatus& aRequest)
-	{
-	iPinPluginAO->Train(aId, aResult, aRequest);
-	}
-
-TInt CPinPlugin::Forget(TIdentityId aId)
-	{
-	return iPinPluginAO->Forget(aId);
-	}
-
-TBool CPinPlugin::IsActive() const
-	{
-	return iActive;
-	}
-	
-TInt CPinPlugin::DefaultData(TIdentityId aId, HBufC8*& aOutputBuf)
-	{
-	return iPinPluginAO->DefaultData(aId, aOutputBuf);
-	}
-
-TInt CPinPlugin::Reset(TIdentityId aIdentityId, const TDesC& aRegistrationData, HBufC8*& aResult)
-	{
-	TRAPD(err, iPinPluginAO->ResetL(aIdentityId, aRegistrationData, aResult));
-	return err;
-	}
-
-TPluginId CPinPlugin::Id() const
-	{
-	return KPinPluginImplementationUid;
-	}
-
-void CPinPlugin::ReadResourceL(TInt& aRetryCount, TInt& aPinSize, TInt& aPinMinSize,
-							TInt& aPinMaxSize)
-	{
-	RFs fs;
-	TFileName fileName(KPinPluginResourceFile);
-	User::LeaveIfError(fs.Connect());
-	CleanupClosePushL(fs);
-	BaflUtils::NearestLanguageFile(fs,fileName);
-	RResourceFile resourceFile;
-	resourceFile.OpenL(fs,fileName);
-	CleanupClosePushL(resourceFile);
-	resourceFile.ConfirmSignatureL(0);
-	resourceFile.Offset();
-	
-	aRetryCount = ResourceValueL(resourceFile, R_IDENTIFY_DIALOG_RETRY_COUNT);
-	aPinSize = ResourceValueL(resourceFile, R_PIN_SIZE);
-	aPinMinSize = ResourceValueL(resourceFile, R_PIN_MIN_SIZE);
-	aPinMaxSize = ResourceValueL(resourceFile, R_PIN_MAX_SIZE);
-
-	HBufC8* res = resourceFile.AllocReadLC(R_PLUGIN_INFO);
-	TResourceReader reader;
-	reader.SetBuffer(res);
-	iPinName = reader.ReadTPtrC().AllocL();
-	iPinDescription = reader.ReadTPtrC().AllocL();
-	CleanupStack::PopAndDestroy(3, &fs);
-	}
-
-TInt CPinPlugin::ResourceValueL(RResourceFile& aResFile, const TInt aResourceID)
-	{
-	TResourceReader reader;
-	HBufC8* res = aResFile.AllocReadLC(aResourceID);
-	reader.SetBuffer(res);
-	TInt val = reader.ReadInt8();
-	CleanupStack::PopAndDestroy(res);
-	return val;
-	}
-	
-void CPinPlugin::SetPluginStateL()
-	{
-	// identifies the pinplugins state by looking for a file 
-	// in system drive.
-	_LIT(KPinPlugin,"pinplugin_inactive.txt");
-	TFileName filename;
-	filename.Copy(KPinPlugin); // convert from 8 -> 16 bit descriptor
-			
-	TDriveUnit sysDrive = RFs::GetSystemDrive();
-	TDriveName sysDriveName (sysDrive.Name());
-	filename.Insert(0,sysDriveName);
-	filename.Insert(2,_L("\\"));
-		
-	RFs fs;
-	User::LeaveIfError(fs.Connect());
-	TEntry entry;
-	TInt err = fs.Entry(filename, entry);
-	if(err == KErrNone)
-		{
-		iActive = EFalse;
-		}
-	else if( err == KErrNotFound )
-		{
-		iActive = ETrue;
-		}
-	else
-		{
-		User::LeaveIfError(err);
-		}
-	}
-
-// Map the interface UIDs to implementation factory functions
-const TImplementationProxy ImplementationTable[] = 
-	{
-	IMPLEMENTATION_PROXY_ENTRY(KPinPluginImplementationUid,	CPinPlugin::NewL)
-	};
-
-// Exported proxy function to resolve intstantiation methods for an ECOM plugin dll
-EXPORT_C const TImplementationProxy* ImplementationGroupProxy(TInt& aTableCount)
-	{
-	aTableCount = sizeof(ImplementationTable) / sizeof(TImplementationProxy);
-	return ImplementationTable;
-	}
-
-
-const TPtrC& CPinPlugin::Name() const
-  {
-  return iName;
-  }
-const TPtrC& CPinPlugin::Description() const
-  {
-  return iDescription;
-  }
-TAuthPluginType CPinPlugin::Type() const 
-  {
-  return iType;
-  }
-
-TEntropy CPinPlugin::MinEntropy() const
-  {
-  return iMinEntropy;
-  }
-
-TPercentage CPinPlugin::FalsePositiveRate() const
-  {
-  return iFalsePositiveRate;
-  }
-
-TPercentage CPinPlugin::FalseNegativeRate() const
-  {
-  return iFalseNegativeRate;
-  }
-
-
-
-
--- a/authenticationservices/authenticationserver/test/reftestplugin/pinplugin/pinplugin.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,119 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CPinPlugin is an CAuthPluginInterface implementation.
-*
-*/
-
-
-/**
- @file 
- @internalAll
- @test
-*/
-
-
-#ifndef PIN_PLUGIN_H
-#define PIN_PLUGIN_H
-
-#include <barsc.h>
-#include <authserver/authplugininterface.h>
-#include "pinpluginao.h"
-
-/**
- An implementation of the CAuthPluginInterface definition
- */
-class CPinPlugin : public AuthServer::CAuthPluginInterface
-	{
-public:
-	/** static methods to constuct the object of the CPinPlugin */
-	static CPinPlugin* NewL();
-	static CPinPlugin* NewLC();
-	/** Destructor */
-	~CPinPlugin();
-
-public:			//from CAuthPluginInterface
-	void Identify(AuthServer::TIdentityId& aId, const TDesC& aClientMessage,
-				  HBufC8*& aResult, TRequestStatus& aRequest);	
-	void Train(AuthServer::TIdentityId aId, HBufC8*& aResult, TRequestStatus& aRequest);		
-	TInt Forget(AuthServer::TIdentityId aId);
-	TInt DefaultData(AuthServer::TIdentityId aId, HBufC8*& aOutputBuf);
-	TInt Reset(AuthServer::TIdentityId aIdentityId, const TDesC& aRegistrationData, HBufC8*& aResult);
-	TBool IsActive() const;
-	void Cancel();
-	AuthServer::TPluginId Id() const;
-	const TPtrC& Name() const;
-	const TPtrC& Description() const;
-	AuthServer::TEntropy MinEntropy() const;
-	AuthServer::TPercentage FalsePositiveRate() const;
-	AuthServer::TPercentage FalseNegativeRate() const;
-	AuthServer::TAuthPluginType Type() const;
-private:
-	/** 
-	  Second Phase Constructor
-	  @panic EPinPanicInvalidConfigValues	if the resource file contains the invalid entries
-	  */
-	void ConstructL();
-	/** Constructor */
-	CPinPlugin();
-	/**
-	 Opens the Resource file and Read the values from it.
-	 
-	 @param aRetryCount		On return, it holds Retry Count value.
-	 @param aPinSize		On return, it holds Default Pin Size.
-	 @param aPinMinSize		On return, it holds Minimum Pin Size.
-	 @param aPinMaxSize		On return, it holds Maximum Pin Size.
-	 */
-	void ReadResourceL(TInt& aRetryCount, TInt& aPinSize, TInt& aPinMinSize,
-					TInt& aPinMaxSize);
-	/**
-	 Utility function to give a value for a particular resource Id.
-	 
-	 @param aResFile		The resource file to be read
-	 @param aResourceID		The resource Id to be read from the resource file
-	 @return				returns the value read from the resource file.
- 	 */
-	TInt ResourceValueL(RResourceFile& aResFile, const TInt aResourceID);
-
-	void SetPluginStateL();
-	
-private:
-	/** CPinpluginAO object to process the operation in AO */
-	CPinPluginAO* iPinPluginAO;
-	/** The name of plugin read from the resource file */
-	HBufC* iPinName;
-	/** The Description for the plugin read from the resource file */
-	HBufC* iPinDescription;
-protected:
-	/// The name of the plugin. Derived classes should set this member.
-	TPtrC iName;
-	/// The plugin's description. Derived classes should set this member.
-	TPtrC iDescription;
-	/// The minumum entropy provided by the plugin. Derived classes should set
-	/// this member.
-	AuthServer::TEntropy iMinEntropy;
-	/// The false positive rate of the plugin. Derived classes should set this
-	/// member.
-	AuthServer::TPercentage iFalsePositiveRate;
-	/// The false negative rate of the plugin. Derived classes should set this
-	/// member.
-	AuthServer::TPercentage iFalseNegativeRate;
- 	/// The type of the plugin. Derived classes should set this member.
-	AuthServer::TAuthPluginType iType;
-	/// the state of the plugin.
-	TBool iActive;
-	};
-
-#endif	/* PIN_PLUGIN_H */
-
--- a/authenticationservices/authenticationserver/test/reftestplugin/pinplugin/pinplugin.rh	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,46 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-
-#define KMaxLength 256
-
-STRUCT PIN_SIZE
-	{
-	LONG pinsize;
-	}
-
-STRUCT PIN_MIN_SIZE
-	{
-	LONG minsize;
-	}
-
-STRUCT PIN_MAX_SIZE
-	{
-	LONG maxsize;
-	}
-
-STRUCT IDENTIFY_DIALOG_RETRY_COUNT
-	{
-	LONG retrycount;
-	}
-
-STRUCT PLUGIN_INFO
-	{
-	LTEXT name(KMaxLength) = "";
-	LTEXT Description(KMaxLength) = "";
-	}
--- a/authenticationservices/authenticationserver/test/reftestplugin/pinplugin/pinpluginao.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,477 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CPinPluginAO implementation
-*
-*/
-
-
-/**
- @file 
-*/
-
-#include "pinpluginao.h"
-#include <hash.h>
-#include <authserver/auth_srv_errs.h>
-#include <authserver/authtypes.h>
-#include <e32math.h>
-
-using namespace AuthServer;
-
-/** 
- KDefaultPinDigit is used to generate the default pinvalue for the DefaultData().
- The default pinvalue is generated by appending KDefaultPinDigit for iPinSize times.
- */
-const TUint KDefaultPinDigit = 1;
-
-/** 
- The selected pin index for the Train/Retrain operation, returned by
- Dialog Notifier should be in the range KIndexLow and KIndexHigh. This should
- be validated in the Dialog implementation. If Pinplugin receives any other
- values, then pinplugin will panic.
- */
-const TInt KIndexLow = 0;
-const TInt KIndexHigh = 3;
-
-CPinPluginAO* CPinPluginAO::NewL(TInt aPinSize, TInt aPinMinSize, TInt aPinMaxSize, TInt aRetryCount)
-	{
-	CPinPluginAO* self = CPinPluginAO::NewLC(aPinSize, aPinMinSize, aPinMaxSize, aRetryCount);
-	CleanupStack::Pop(self);
-	return self;
-	}
-
-CPinPluginAO* CPinPluginAO::NewLC(TInt aPinSize, TInt aPinMinSize, TInt aPinMaxSize, TInt aRetryCount)
-	{
-	CPinPluginAO* self = new(ELeave) CPinPluginAO(aPinSize, aPinMinSize, aPinMaxSize, aRetryCount);
-	CleanupStack::PushL(self);
-	self->ConstructL();
-	return self;
-	}
-	
-CPinPluginAO::CPinPluginAO(TInt aPinSize, TInt aPinMinSize, TInt aPinMaxSize, TInt aRetryCount)
-	:CActive(EPriorityStandard), iRetryCount(aRetryCount), iPinSize(aPinSize), iPinMinSize(aPinMinSize),
-	iPinMaxSize(aPinMaxSize)
-	{
-	CActiveScheduler::Add(this);
-	}
-	
-void CPinPluginAO::ConstructL()
-	{
-	iNewPinSize = iPinSize;
-	
-	// construct PinpluginDialog
-	iPinPluginDialog = CPinPluginDialog::NewL();
-	// construct the DB
-	iPinPluginDb = CPinPluginDB::NewL();
-	iDialogResult = new (ELeave) TPinPluginDialogResult;
-	iRetryRefCount = iRetryCount;
-	}
-
-CPinPluginAO::~CPinPluginAO()
-	{
-	Deque();
-	delete iDialogResult;
-	delete iPinPluginDialog;
-	delete iPinPluginDb;
-	iPinList.ResetAndDestroy();
-	iIdKeyList.ResetAndDestroy();
-	iIdKeyHashList.ResetAndDestroy();
-	}
-	
-void CPinPluginAO::Identify(TIdentityId& aId, const TDesC& aClientMessage,
-							HBufC8*& aResult, TRequestStatus& aRequest)
-	{
-	iState = EIdentify;
-	iIdentityId = aId;
-	iIdentityIdPtr = &aId;
-	
-	aRequest = KRequestPending;
-	iRequestStatus = &aRequest;
-
-	iClientMessage = static_cast<const HBufC*>(&aClientMessage);
-	iResult = &aResult;
-	aResult = NULL;	
- 
-	SetActive();
-	TRequestStatus* stat = &iStatus;
-	User::RequestComplete(stat, KErrNone);
-	}
-
-void CPinPluginAO::Train(TIdentityId aId, HBufC8*& aResult, TRequestStatus& aRequest)
-	{
-	iState = ETrain;
-	iIdentityId = aId;
-
-	aRequest = KRequestPending;
-	iRequestStatus = &aRequest;
-
-	iResult = &aResult;
-	aResult = NULL;	
-
-	SetActive();
-	TRequestStatus* stat = &iStatus;
-	User::RequestComplete(stat, KErrNone);
-    }
-	
-TInt CPinPluginAO::DefaultData(TIdentityId aId, HBufC8*& aOutputBuf)
-	{
-	aOutputBuf = NULL;
-	TPinValue defaultPin;
-	for (TInt i = 0; i < iPinSize; i++)
-		{
-		defaultPin.AppendNum(KDefaultPinDigit);	
-		}
-		
-	HBufC8* identityKey = NULL;
-	HBufC8* identityKeyHash = NULL;
-	TRAPD(err, 
-		identityKeyHash = GenerateKeyHashL(defaultPin, identityKey);
-		CleanupStack::PushL(identityKeyHash);
-		CleanupStack::PushL(identityKey);
-		aOutputBuf = (*identityKey).AllocL();
-		iPinPluginDb->AddPinL(aId, *identityKeyHash);
-		CleanupStack::PopAndDestroy(2, identityKeyHash));
-		
-	return err;
-	}
-
-TInt CPinPluginAO::Forget(TIdentityId aId)
-	{
-	TInt err = KErrNone;
-	TRAP(err, iPinPluginDb->RemovePinL(aId));
-	if (err == KErrNotFound)
-		{
-		err = KErrAuthServNoSuchIdentity;
-		}
-	return err;
-	}
-
-void CPinPluginAO::ResetL(TIdentityId aIdentityId, const TDesC& aRegistrationData, HBufC8*& aResult)
-	{
-	// Remove the current trained information and register using the newly supplied registration
-	// data (Since pin plugin is a knowledge based plugin, the registration data supplied is assumed to be the pin)
-	// For other plugin types this information is ignored and the identity is simply set as untrained
-
-	// If no registration data is supplied then just perform a forget
-	if (aRegistrationData == KNullDesC)
-		{
-		aResult = NULL;
-		TInt err = Forget(aIdentityId);
-		User::LeaveIfError(err);
-		return;
-		}
-
-	// Ensure registration data length is less than or equal to max allowed pin length
-	TInt pinLen = aRegistrationData.Length();
-	if (pinLen > KMaxPinLength)
-		{
-		User::Leave(KErrArgument);
-		}
-
-	// Convert registration data to 8 bit 
-	// Note that no unicode conversion is being done here since a pin cannot be in unicode
-	RBuf8 pinBuf;
-	pinBuf.CreateL(pinLen);
-	CleanupClosePushL(pinBuf);
-	pinBuf.Copy(aRegistrationData.Left(pinLen));
-	TPinValue pin(pinBuf);
-	CleanupStack::PopAndDestroy(&pinBuf);
-
-	// Generate the identity key and identity key hash
-	HBufC8* identityKey = NULL;
-	HBufC8* identityKeyHash = GenerateKeyHashL(pin, identityKey);
-	CleanupStack::PushL(identityKeyHash);
-	CleanupStack::PushL(identityKey);
-
-	// Ensure another identity doesn't have the same pin
-	TIdentityId tempId = iPinPluginDb->IdFromPin(*identityKeyHash);
-	if ((tempId != aIdentityId) && (tempId != KUnknownIdentity))
-		{
-		CleanupStack::PopAndDestroy(2, identityKeyHash);
-		// This appears to be the most appropriate error code - The important point is to convery Reset has failed.
-		User::Leave(KErrInUse);
-		}
-	else if (tempId == aIdentityId)
-		{
-		// Nothing to do
-		aResult = identityKey;		// Ownership transferred to caller
-		CleanupStack::Pop(identityKey);
-		CleanupStack::PopAndDestroy(identityKeyHash);
-		return;
-		}
-
-	// Replace the training data
-	iPinPluginDb->UpdatePinL(aIdentityId, *identityKeyHash);
-	aResult = identityKey;		// Ownership transferred to caller
-	CleanupStack::Pop(identityKey);
-	CleanupStack::PopAndDestroy(identityKeyHash);
-	}
-
-void CPinPluginAO::DoCancel()
-	{
-	iPinPluginDialog->Cancel();
-	if(iRequestStatus)
-		{
-		User::RequestComplete(iRequestStatus, KErrCancel);
-		}
-	}
-	
-void CPinPluginAO::RunL()
-	{
-	// Leave if there has been an error
-	User::LeaveIfError(iStatus.Int());
-	
-	switch(iState)
-		{
-		case EIdentify:
-			{
-			IdentifyId();	
-			}
-			break;
-		case EIdentifyResult:
-			{
-			if (*iDialogResult == EOk)
-				{
-				IdentifyResultL();
-				}
-			else if (*iDialogResult == ECancel)
-				{
-				User::RequestComplete(iRequestStatus, KErrAuthServPluginCancelled);
-				}
-			else if (*iDialogResult == EQuit)
-				{
-				User::RequestComplete(iRequestStatus, KErrAuthServPluginQuit);
-				}
-			*iDialogResult = static_cast<TPinPluginDialogResult>(0);
-			}
-			break;
-		case ETrain:
-			{
-			TrainIdL();	
-			}
-			break;
-		case ETrainResult:
-			{
-			if (*iDialogResult == EOk)
-				{
-				AddTrainResultToDBL();
-				}
-			else if (*iDialogResult == ECancel)
-				{
-				User::RequestComplete(iRequestStatus, KErrAuthServPluginCancelled);
-				}
-			else if (*iDialogResult == EQuit)
-				{
-				User::RequestComplete(iRequestStatus, KErrAuthServPluginQuit);
-				}
-			else if (*iDialogResult == ENext)
-				{
-				iState = ETrain;
-				TRequestStatus* status = &iStatus;
-				User::RequestComplete(status, KErrNone);
-				SetActive();
-				}
-			*iDialogResult = static_cast<TPinPluginDialogResult>(0);
-			}
-			break;
-		case EInfo:
-			{
-			iPinPluginDialog->PinInfo(iMessage, iStatus);
-			iState = EFinished;
-			SetActive();
-			}
-			break;
-		case EFinished:
-			{
-			User::RequestComplete(iRequestStatus, iStatus.Int());
-			}
-			break;
-		default:
-			{
-			User::Leave(KErrNotSupported);
-			}
-			break;
-		}
-	}
-	
-TInt CPinPluginAO::RunError(TInt aError)
-	{
-	if(iRequestStatus)
-		{
-		User::RequestComplete(iRequestStatus, aError);
-		}
-	return KErrNone;
-	}
-
-void CPinPluginAO::IdentifyId()
-	{
-	if (iRetryRefCount--)
-		{
-		iPinPluginDialog->PinIdentify(iPinMinSize, iPinMaxSize, ETrue, iPinValue, *iDialogResult, iStatus);
-		iState = EIdentifyResult;
-		}
-	else
-		{
-		iRetryRefCount = iRetryCount;
-		*iIdentityIdPtr = KUnknownIdentity;
-		iMessage = EPinPluginIdentificationFailure;
-		TRequestStatus* status = &iStatus;
-		User::RequestComplete(status, KErrNone);
-		iState = EInfo;
-		}
-	SetActive();
-	}
-
-void CPinPluginAO::IdentifyResultL()
-	{
-	TIdentityId identityId;
-	HBufC8* identityKey = NULL;
-	HBufC8* identityKeyHash = GenerateKeyHashL(iPinValue, identityKey);
-	CleanupStack::PushL(identityKeyHash);
-	CleanupStack::PushL(identityKey);	
-	identityId = iPinPluginDb->IdFromPin(*identityKeyHash);
-	if (identityId != KUnknownIdentity)
-		{
-		*iIdentityIdPtr = identityId;
-		iRetryRefCount = iRetryCount;
-		*iResult = identityKey;
-		iMessage = EPinPluginIdentificationSuccess;
-		iState = EInfo;
-		CleanupStack::Pop(identityKey);
-		}
-	else
-		{	
-		CleanupStack::PopAndDestroy(identityKey);
-		iState = EIdentify;
-		}
-	CleanupStack::PopAndDestroy(identityKeyHash);
-	TRequestStatus* status = &iStatus;
-	User::RequestComplete(status, KErrNone);
-	SetActive();
-	}
-		
-void CPinPluginAO::TrainIdL()
-	{
-        // Check for invalid pinsize.
-	if( !(iNewPinSize >= iPinMinSize && iNewPinSize <= iPinMaxSize)  )
-                {
-                User::Leave(KErrAuthServRegistrationFailed);
-                }
-
-
-	iPinList.ResetAndDestroy();
-	iIdKeyList.ResetAndDestroy();
-	iIdKeyHashList.ResetAndDestroy();
-	GenerateUniquePinsL(iPinList, iIdKeyList, iIdKeyHashList);
-	TInt indexValue = iPinPluginDb->IdIndex(iIdentityId);
-	TPinPluginTrainingMessage trainMessage;
-	if (indexValue >= 0)
-		{
-		trainMessage = EReTraining;
-		}
-	else
-		{
-		trainMessage = ETraining;
-		}
-	iPinPluginDialog->PinTraining(trainMessage, iPinList, iPinMinSize, iPinMaxSize, iIndex, iNewPinSize, *iDialogResult, iStatus);
-	iState = ETrainResult;
-	SetActive();	
-	}
-
-void CPinPluginAO::AddTrainResultToDBL()
-	{
-	__ASSERT_ALWAYS(iIndex >= KIndexLow && iIndex <= KIndexHigh,
-		User::Panic(KPinPluginPanicString(), EPinPanicIncorrectIndex));
-
-	TInt indexValue = iPinPluginDb->IdIndex(iIdentityId);
-	if (indexValue >= 0)
-		{
-		iPinPluginDb->UpdatePinL(iIdentityId, *iIdKeyHashList[iIndex]);
-		iMessage = EPinPluginReTrainingSuccess;
-		}
-	else
-		{
-		iPinPluginDb->AddPinL(iIdentityId, *iIdKeyHashList[iIndex]);
-		iMessage = EPinPluginTrainingSuccess;
-		}
-	TPtrC8 idKeyPtr = *iIdKeyList[iIndex];
-	HBufC8* identityKey = idKeyPtr.AllocL();
-	*iResult = identityKey;
-	iNewPinSize = iPinSize;
-	iState = EInfo;
-	TRequestStatus* status = &iStatus;
-	User::RequestComplete(status, KErrNone);
-	SetActive();
-	}
-
-HBufC8* CPinPluginAO::GenerateKeyHashL(TPinValue& aPinValue, HBufC8*& aIdentityKey)
-	{
-	CSHA1* sha1 = CSHA1::NewL();
-	CleanupStack::PushL(sha1);
-	HBufC8* pinValue = aPinValue.AllocLC();
-	TPtrC8 hash = sha1->Hash(*pinValue);
-	CleanupStack::PopAndDestroy(pinValue);
-	aIdentityKey = hash.AllocLC();
-	TPtrC8 hash1 = sha1->Hash(hash);
-	HBufC8* idkeyHash = hash1.AllocL();
-	CleanupStack::Pop(aIdentityKey);
-	CleanupStack::PopAndDestroy(sha1);
-	return idkeyHash;
-	}
-	
-	
-void CPinPluginAO::GenerateUniquePinsL(RPointerArray<TPinValue>& aPinList,
-		RPointerArray<HBufC8>& aIdKeyList, RPointerArray<HBufC8>& aIdKeyHashList)
-	{
-	TInt count = 4; 
-	while (count)
-		{
-		TPinValue* randomPin = new (ELeave) TPinValue;
-		CleanupStack::PushL(randomPin);
-		for (TInt k = 0; k < iNewPinSize ; k++)
-			{
-			TUint8 num = Math::Random();
-			num = num % 10;
-			randomPin->AppendNum(num);
-			}
-		HBufC8* identityKey = NULL;
-		HBufC8* identityKeyHash = GenerateKeyHashL(*randomPin, identityKey);
-		CleanupStack::PushL(identityKeyHash);
-		CleanupStack::PushL(identityKey);
-		if (iPinPluginDb->IsUniquePin(*identityKeyHash))
-			{
-			aIdKeyList.AppendL(identityKey);
-			CleanupStack::Pop(identityKey);
-			aIdKeyHashList.AppendL(identityKeyHash);
-			CleanupStack::Pop(identityKeyHash);
-			aPinList.AppendL(randomPin);
-			CleanupStack::Pop(randomPin);
-			count--;
-			}
-		}
-	}
-
-
-
-
-
-
-
-
-
-
-	
-	
-	
-	
--- a/authenticationservices/authenticationserver/test/reftestplugin/pinplugin/pinpluginao.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,157 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CPinPluginAO declaration
-*
-*/
-
-
-/**
- @file 
- @internalComponent
- @released
-*/
-
-#ifndef PIN_PLUGINAO_H
-#define PIN_PLUGINAO_H
-
-#include "pinplugindialog.h"
-#include "pinplugindb.h"
-#include "pinpanic.h"
-
-class CPinPluginAO : public CActive
-	{
-public:
-	/** static methods to constuct the object of the CPinpluginAO */
-	static CPinPluginAO* NewL(TInt aPinSize, TInt aPinMinSize, TInt aPinMaxSize, TInt aRetryCount);
-	static CPinPluginAO* NewLC(TInt aPinSize, TInt aPinMinSize, TInt aPinMaxSize, TInt aRetryCount);
-	/** Destructor */
-	~CPinPluginAO();
-public: //CAuthPluginInterface
-	void Identify(AuthServer::TIdentityId& aId, const TDesC& aClientMessage,
-				  HBufC8*& aResult, TRequestStatus& aRequest);
-	void Train(AuthServer::TIdentityId aId, HBufC8*& aResult, TRequestStatus& aRequest);
-	TInt Forget(AuthServer::TIdentityId aId);
-	TInt DefaultData(AuthServer::TIdentityId aId, HBufC8*& aOutputBuf);
-	void ResetL(AuthServer::TIdentityId aId, const TDesC& aRegistrationData, HBufC8*& aResult);
-
-private:			//Active
-	void DoCancel();
-	void RunL();	
-	TInt RunError(TInt aError);
-private:
-	/** Constructor */
-	CPinPluginAO(TInt aPinSize, TInt aPinMinSize, TInt aPinMaxSize, TInt aRetryCount);
-	
-	/** Second Phase Constructor */
-	void ConstructL();
-	
-	/**
-	 Issue a Request for Identify Dialog upto iRetryCount times to 
-	 PinPluginDialog. If the pinvalue received is wrong for all the
-	 retries, reset the identityId as KUnknownIdentity.
-	 */
-	void IdentifyId();
-	
-	/**
- 	 Issue a Request for Train Dialog to PinPluginDialog. 
- 	 It will generate 4 random pin of length iNewPinSize and send 
- 	 the pin Numbers and iNewPinSize to PinpluginDialog. Once it completed
- 	 it have the selected pin index and new pin size which is used to generate
- 	 another set of pin numbers for the next dialogs if required.
-
-	 @panic EPinPanicInvalidPinLength	if plugin receives invalid pinlength fron Dialog Notifier
-	 */
-	void TrainIdL();
-	
-	/**
- 	 It will generate KeyHash for the pin number given in the Identify Dialog.
- 	 and verify the keyHash and Id with DB entries. If same, the state will be
- 	 changed to EInfo and message is set to EPinPluginIdentificationSuccess 
- 	 which is used to display info message to the user. 
- 	 If not, same state will be maintained so that it will ask another Identify
- 	 dialog to the user.
- 	 */
-	void IdentifyResultL();
-	
-	/**
-	 It will add/update the DB with the pin selected in Pin Train/ReTrain Dialog.
-	 
-	 @panic EPinPanicIncorrectIndex		if plugin receives index values otherthan 0 -3
-	 */
-	void AddTrainResultToDBL();
-	
-	/**
- 	 It will generate two KeyHash for the pin value using SHA1 Algorithm
- 	 Intermediate result will return to the Authentication server whereas
- 	 final result is stored in the DB.
- 	  
-	 @param aPinValue		The Pin number for which Hash value required
-	 @param aIdentityKey	aIdentityKey is updated with intermediate KeyHash generated.
-	 @return				It will return the final KeyHash Value generated
-	 */
-	HBufC8* GenerateKeyHashL(TPinValue& aPinValue, HBufC8*& aIdentityKey);
-	
-	/**
-	 It will generate four Unique Pins which is not used any of the
-	 existing identities.
-	 
-	 @param aPinList		On return, it holds the array of Pin numbers generated
-	 @param idKeyList		On return, it holds the array of intermediate KeyHash 
-	 						values for the Pin Numbers in the aPinList
-	 @param idKeyHashList	On return, it holds the array of Final KeyHash values
-	 						for the Pin Numbers in the aPinList
- 	 */
-	void GenerateUniquePinsL(RPointerArray<TPinValue>& aPinList, RPointerArray<HBufC8>& idKeyList,
-								 RPointerArray<HBufC8>& idKeyHashList);
-private:
-	enum TProcessState
-		{
-		EIdentify,
-		EIdentifyResult,
-		ETrain,
-		ETrainResult,
-		EInfo,
-		EFinished
-		};
-	CPinPluginDialog* iPinPluginDialog;
-	CPinPluginDB* iPinPluginDb;
-	TRequestStatus* iRequestStatus;
-	TProcessState iState;
-	TInt iIndex;
-	TPinValue iPinValue;
-	AuthServer::TIdentityId iIdentityId;
-	AuthServer::TIdentityId* iIdentityIdPtr;
-	HBufC8** iResult;
-	TPinPluginDialogResult* iDialogResult;
-	TPinPluginInfoMessage iMessage;
-	
-	TInt iRetryCount;
-	TInt iRetryRefCount;
-	TInt iPinSize;
-	TInt iPinMinSize;
-	TInt iPinMaxSize;
-	TInt iNewPinSize;
-		
-	RPointerArray<TPinValue> iPinList;
-	RPointerArray<HBufC8> iIdKeyList;
-	RPointerArray<HBufC8> iIdKeyHashList;
-	
-	//Displayable text string
-	const HBufC* iClientMessage;
-
-	};
-
-#endif /* PIN_PLUGINAO_H */
-	
--- a/authenticationservices/authenticationserver/test/reftestplugin/pinplugin/pinpluginconfig.rss	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,57 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Defines the default pin size, min and max of pin size, retry 
-* count for the identify dialog, name and Description
-* for the pin plugin.
-*
-*/
-
-
-/**
- @file 
-*/
-
-NAME PINP
-
-#include <uikon.rh>
-#include "pinplugin.rh"
-
-RESOURCE RSS_SIGNATURE { }
-
-RESOURCE PIN_SIZE r_pin_size
-	{
-	pinsize = 5;
-	}
-
-RESOURCE PIN_MIN_SIZE r_pin_min_size
-	{
-	minsize = 4;
-	}
-
-RESOURCE PIN_MAX_SIZE r_pin_max_size
-	{
-	maxsize = 10;
-	}
-
-RESOURCE IDENTIFY_DIALOG_RETRY_COUNT r_identify_dialog_retry_count
-	{
-	retrycount = 3;
-	}
-
-RESOURCE PLUGIN_INFO r_plugin_info
-	{
-	name = "PinPlugin";
-	Description = "Pinplugin authenticates device holder using PIN numbers generated from 0-9 digits";
-	}
--- a/authenticationservices/authenticationserver/test/reftestplugin/pinplugin/pinplugindb.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,402 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CPinPluginDB pin plugin data store implementation
-*
-*/
-
-
-/**
- @file 
-*/
-
-#include "pinplugindb.h"
-
-_LIT(KPluginStoreName, "plugin.store");
-_LIT(KFileDrive, "c:");
-
-using namespace AuthServer;
-
-CPinPluginDB* CPinPluginDB::NewL()
-	{
-	CPinPluginDB* self = CPinPluginDB::NewLC();
-	CleanupStack::Pop(self);
-	return self;
-	}
-
-CPinPluginDB* CPinPluginDB::NewLC()
-	{
-	CPinPluginDB* self = new(ELeave) CPinPluginDB();
-	CleanupStack::PushL(self);
-	self->ConstructL();
-	return self;
-	}
-	
-CPinPluginDB::CPinPluginDB() :
-	iRootStreamId(KNullStreamId),
-	iIdentityStreamId(KNullStreamId)
-	{
-	}
-
-CPinPluginDB::~CPinPluginDB()
-	{
-	if (iFileStore)
-		{
-		CompactStore();
-		delete iFileStore;
-		}
-
-	iFile.Close(); 
-	iFs.Close();
-
-	iId.Reset();
-	iId.Close();
-	iIdKeyHash.ResetAndDestroy();
-	iIdKeyHash.Close();
-	}
-	
-		
-void CPinPluginDB::ConstructL()
-	{
-	User::LeaveIfError(iFs.Connect());
-	
-	TFileName privatePath;
-	iFs.PrivatePath(privatePath);
-	iPluginDBName.Copy(KFileDrive);
-	iPluginDBName.Append(privatePath);
-	iPluginDBName.Append(KPluginStoreName);
-	OpenStoreL();
-	
-	ReadIdKeysFromStoreL();
-	}
-
-
-void CPinPluginDB::AddPinL(const TIdentityId& aId, const TDesC8& aIdentityKeyHash)
-	{
-	if(IdIndex(aId) == KErrNotFound && IsUniquePin(aIdentityKeyHash))
-		{
-		// Add the IdentityId to the array, rewrite the identitystream and 
-		// Only then commit the store
-		HBufC8* keyHash = aIdentityKeyHash.AllocLC();
-		TInt err = KErrNone;
-		iIdKeyHash.AppendL(keyHash);
-		err = iId.Append(aId);
-		if(err != KErrNone)
-			{
-			iIdKeyHash.Remove(iIdKeyHash.Count() - 1);
-			User::Leave(err);
-			}
-		TCleanupItem cleanupStore(RevertStore, iFileStore);
-		// write the idkeys to the store.
-		TRAP(err,
-			CleanupStack::PushL(cleanupStore);
-			WriteIdKeysToStoreL();
-			CleanupStack::Pop(iFileStore));
-
-		if (err != KErrNone)
-			{
-			iId.Remove(iId.Count() - 1);
-			iIdKeyHash.Remove(iIdKeyHash.Count() - 1);
-			User::Leave(err);
-			}
-		CleanupStack::Pop(keyHash); 
-		}
-	else
-		{
-		User::Leave(KErrAlreadyExists);
-		}
- 	}
-
-void CPinPluginDB::UpdatePinL(const TIdentityId& aId, const TDesC8& aIdentityKeyHash)
-	{
-	if(IdIndex(aId) != KErrNotFound)
-		{
-		// Get the index of the existing id and key hash
-		TInt index = IdIndex(aId);
-		TInt err = KErrNone;
-		HBufC8* keyHash = aIdentityKeyHash.AllocLC();
-		// delete the old keyHash and store the new keyHash to the index
-		delete iIdKeyHash[index];
-		iIdKeyHash[index] = keyHash;
-
-		TCleanupItem cleanupStore(RevertStore, iFileStore);
-		// write the idkeys to the store.
-		TRAP(err ,
-			CleanupStack::PushL(cleanupStore);
-			WriteIdKeysToStoreL();
-			CleanupStack::Pop(iFileStore));
-		if (err!= KErrNone)
-			{
-			CleanupStack::Pop(keyHash);
-			ReadIdKeysFromStoreL();
-			User::Leave(err);
-			}
-		CleanupStack::Pop(keyHash);
-		}
-	else
-		{
-		User::Leave(KErrNotFound);
-		}
-	}
-	
-void CPinPluginDB::RemovePinL(const TIdentityId& aId)
-	{
-	if(IdIndex(aId) != KErrNotFound)
-		{
-		TInt err = KErrNone;
-		TInt index = IdIndex(aId);
-
-		// Delete the IdentityId from the array, rewrite the identitystream and 
-	   	// Only then commit the store
-		delete iIdKeyHash[index];
-  		iIdKeyHash.Remove(index);
-   		iId.Remove(index);
- 
-		TCleanupItem cleanupStore(RevertStore, iFileStore);
-		// write the idkeys to the store.
-		TRAP(err, 
-			CleanupStack::PushL(cleanupStore);
-			WriteIdKeysToStoreL();
-			CleanupStack::Pop(iFileStore));
-		if(err != KErrNone)
-			{
-			ReadIdKeysFromStoreL();
-   			User::Leave(err);
-			}
-		}
-	else
-		{
-		User::Leave(KErrNotFound);
-		}
-	}
-	
-TBool CPinPluginDB::IsUniquePin(const TDesC8& aIdentityKeyHash) const
-	{
-	//	Check each iIdKeyHash in the store to determine if aIdentityId already exists
-	TInt count = iIdKeyHash.Count();
-	TBool isUnique = ETrue;
-	for (TInt index = 0; index < count; ++index)
-		{
-		if (aIdentityKeyHash.CompareF(*iIdKeyHash[index]) == 0)
-			{
-			isUnique = EFalse;
-			break;
-			}
-		}
-	return isUnique;
-	}
-	
-TInt CPinPluginDB::IdIndex(const TIdentityId& aId) const
-	{
-	TInt count = iId.Count();
-	for (TInt index = 0; index < count; ++index)
-		{
-		if (aId == iId[index])
-			{
-			return index;
-			}
-		}
-	return KErrNotFound;
-	}
-	
-TIdentityId CPinPluginDB::IdFromPin(const TDesC8& aIdentityKeyHash) const
-	{
-	TInt count = iIdKeyHash.Count();
-	for (TInt index = 0; index < count; ++index)
-		{
-		if (aIdentityKeyHash.CompareF(*iIdKeyHash[index]) == 0)
-			{
-			return iId[index];
-			}
-		}
-	return KUnknownIdentity;
-	}
-	
-void CPinPluginDB::OpenStoreL()
-	{
-	//	Tries to Open a plugin store file on the private path of the process. 
-	//	If it cannot find one, create a file with permanent file store
-	//	it should initialise iFileStore unless it cannot
-	//	create the file/store/streams
-	
-	TRAPD(result, OpenStoreInFileL(iPluginDBName));
-
-	if (result == KErrNotFound || result == KErrPathNotFound) 
-		{		
-		// Not yet opened a valid store, either no file to be found, or no valid
-		// store in it.
-		CreateStoreInFileL(iPluginDBName);
-		}
-	else if (result != KErrNone)
-		{
-		// DB gets corrupted or File may be in use. Abort startup.
-		User::Leave(result);
-		}
-	}
-
-
-void CPinPluginDB::CreateStoreInFileL(const TDesC& aFile)
-	{
-	TInt r = iFs.MkDirAll(aFile);
-	if ((r!=KErrNone) && (r!=KErrAlreadyExists))
-		{
-		User::Leave(r);
-		}
-	
-	delete iFileStore;
-	iFileStore = NULL;
-
-	iFileStore = CPermanentFileStore::ReplaceL(iFs, aFile, EFileRead | EFileWrite | EFileStream | EFileShareExclusive);
-	iFileStore->SetTypeL(KPermanentFileStoreLayoutUid);
-
-	TCleanupItem cleanupStore(RevertStore, iFileStore);
-	CleanupStack::PushL(cleanupStore);
-	
-	// Create Identity stream - Currently no Identity created, and no IdentityKeyHash
-	RStoreWriteStream identityStream;
-	iIdentityStreamId = identityStream.CreateLC(*iFileStore);
-	identityStream.WriteUint32L(KNullStreamId.Value()); //contains the id of dataStream
-	identityStream.WriteUint32L(0); // Write IdentityId count of zero
-	identityStream.CommitL();
-	CleanupStack::PopAndDestroy(&identityStream);
-
-	// Create root stream - just contains id of Identity stream
-	RStoreWriteStream rootStream;
-	iRootStreamId = rootStream.CreateLC(*iFileStore);
-	iFileStore->SetRootL(iRootStreamId);
-	rootStream.WriteUint32L(iIdentityStreamId.Value());		
-	rootStream.CommitL();
-	CleanupStack::PopAndDestroy(&rootStream);
-	
-	iFileStore->CommitL();
-	CleanupStack::Pop(iFileStore); 
-	}
-
-void CPinPluginDB::OpenStoreInFileL(const TDesC& aFile)
-	{
-	// Make sure the file isn't write protected
-	User::LeaveIfError(iFs.SetAtt(aFile, 0, KEntryAttReadOnly));
-	
-	User::LeaveIfError(iFile.Open(iFs, aFile, EFileRead | EFileWrite | EFileStream | EFileShareExclusive));
-	
-	delete iFileStore;
-	iFileStore = NULL;
-
-	iFileStore = CPermanentFileStore::FromL(iFile);		
-
-	// Get the root StreamId
-	iRootStreamId = iFileStore->Root();
-	if (iRootStreamId == KNullStreamId)
-		{
-		User::Leave(KErrCorrupt);
-		}
-	
-	RStoreReadStream rootStream;
-	rootStream.OpenLC(*iFileStore, iRootStreamId);
-	iIdentityStreamId = (TStreamId)(rootStream.ReadUint32L());
-	CleanupStack::PopAndDestroy(&rootStream);
-	}
-
-// Rewrites the Identity stream (ie the array of IdentityId) to the store
-void CPinPluginDB::WriteIdKeysToStoreL()
-	{
-	TInt count = iId.Count();
-	TInt hashCount = iIdKeyHash.Count();
-	if (count != hashCount)
-		{
-		User::Leave(KErrCorrupt);
-		}
-	
-	TStreamId dataStreamId = KNullStreamId;
-	if (count > 0)
-		{
-		RStoreWriteStream dataStream;
-		dataStreamId = dataStream.CreateLC(*iFileStore);
-		//write the Identity Id key to a data stream
-		for (TInt index = 0; index < count; ++index)
-			{
-			dataStream.WriteUint32L(iId[index]);
-			dataStream.WriteUint32L((*iIdKeyHash[index]).Length());
-			dataStream.WriteL(*iIdKeyHash[index]);
-			}
-		dataStream.CommitL();
-		CleanupStack::PopAndDestroy(&dataStream); 	
-		}
-	RStoreReadStream readStream;
-	readStream.OpenLC(*iFileStore, iIdentityStreamId);
-	TStreamId oldDataStreamId = (TStreamId)(readStream.ReadInt32L());
-	CleanupStack::PopAndDestroy(&readStream);
-		
-	iFileStore->DeleteL(oldDataStreamId);
-	
-	RStoreWriteStream writeStream;
-	writeStream.OpenLC(*iFileStore, iIdentityStreamId);
-	writeStream.WriteUint32L(dataStreamId.Value());
-	writeStream.WriteInt32L(count);
-	writeStream.CommitL();
-	CleanupStack::PopAndDestroy(&writeStream); 	
-	iFileStore->CommitL();
-	CompactStore();
-	}
-	
-void CPinPluginDB::ReadIdKeysFromStoreL()
-	{
-	iId.Reset();
-	iIdKeyHash.ResetAndDestroy();
-	
-	RStoreReadStream readStream;
-	readStream.OpenLC(*iFileStore, iIdentityStreamId);
-	TStreamId dataStreamId = (TStreamId)(readStream.ReadInt32L());
-	TInt count = readStream.ReadInt32L();
-	CleanupStack::PopAndDestroy(&readStream);
-	
-	if (count > 0)
-		{
-		RStoreReadStream dataStream;
-		dataStream.OpenLC(*iFileStore, dataStreamId);
-		for (TInt index = 0; index < count; ++index)
-			{
-			TIdentityId identityId = (TIdentityId)(dataStream.ReadInt32L());
-			iId.AppendL(identityId);
-			TInt length = dataStream.ReadInt32L();
-			HBufC8* idKeyHash = HBufC8::NewMaxLC(length);
-			TPtr8 idKeyHashPtr = idKeyHash->Des();
-			dataStream.ReadL(idKeyHashPtr, length);
-			iIdKeyHash.AppendL(idKeyHash);
-			CleanupStack::Pop(idKeyHash);
-			}
-		CleanupStack::PopAndDestroy(&dataStream);
-		}
-	}
-
-void CPinPluginDB::RevertStore(TAny* aStore)
-	{
-	CPermanentFileStore* store = reinterpret_cast<CPermanentFileStore*>(aStore);
-	TRAP_IGNORE(store->RevertL());
-	// We're ignoring the leave code from this becuase there's no way we can
-	// handle this sensibly.  This shouldn't be a problem in practice - this
-	// will leave if for example the file store is on removable which is
-	// unexpectedly remove, and this is never the case for us.
-	}
-
-
-void CPinPluginDB::CompactStore()
-	{
-	ASSERT(iFileStore);
-	TRAP_IGNORE(iFileStore->ReclaimL(); iFileStore->CompactL());
-	}
-
-
-
-
--- a/authenticationservices/authenticationserver/test/reftestplugin/pinplugin/pinplugindb.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,160 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CPinPluginDB pin plugin data store declaration
-*
-*/
-
-
-/**
- @file 
-*/
-
-#ifndef PIN_PLUGINDB_H
-#define PIN_PLUGINDB_H
-
-#include <s32file.h>
-#include <authserver/authtypes.h>
-
-// PinPlugin DB
-class CPinPluginDB : public CBase
-	{
-public:
-	/** static methods to constuct the object of the CPinPluginDB */
-	static CPinPluginDB* NewL();
-	static CPinPluginDB* NewLC();
-	
-	/** Destructor */
-	virtual ~CPinPluginDB();
-
-	/** 
-	 Add Id and KeyHash to the store if the id is not exist in the
-	 store and pin is not used by any other id. 
-	 
-	 @param aId				 The Id to be Trained 
-	 @param aIdentityKeyHash The pin used to Train the Id
-	 @leave					 It leaves with KErrAlreadyExists if the id is
-	 						 already exist or pin is used by other identity.
-	 */
-	void AddPinL(const AuthServer::TIdentityId& aId, const TDesC8& aIdentityKeyHash);
-	
-	/** 
-	 Update the Id and Pin in the store With the new Pin, if the id exists.
-	 
- 	 @param aId				 The Id to be ReTrained 
-	 @param aIdentityKeyHash The pin used to ReTrain the Id
-	 @leave 				 It leaves with KErrNotFound if the id is
-	 						 not exist.
-	 */
-	void UpdatePinL(const AuthServer::TIdentityId& aId, const TDesC8& aIdentityKeyHash);
-	
-	/**
-	 Remove the Id from the store, if the Id exists
-	 
-	 @param aId				 The Id to be ReTrained 
-	 @leave					 It leaves with KErrNotFound if the id is
-	 						 not exist.
-	 */
-	void RemovePinL(const AuthServer::TIdentityId& aId);
-	
-	/**
-	 Searches the pinvalue in the store
-	 
-	 @param aIdentityKeyHash The pinvalue to be search for
-	 @return				 It return the IdentityId for the pin, if search
-	 						 is success else return KUnknownIdentity.
-	 */
-	AuthServer::TIdentityId IdFromPin(const TDesC8& aIdentityKeyHash) const;
-	
-	/**
-	 Searches the Id in the store.
-	 
-	 @param aId				 The Id to be search for. 
-	 @return				 It return the index of the Id if the search
-	 						 is success else return KErrNotFound.
-	 */
-	TInt IdIndex(const AuthServer::TIdentityId& aId) const ;
-	
-	/**
- 	 Verifies the pin is unique.
-	 
-	 @param aIdentityKeyHash The pinvalue to be search for
-	 @return				 return ETrue if the pin is not used by any of 
-	 						 the identity else EFalse.
-	 */
-	TBool IsUniquePin(const TDesC8& aIdentityKeyHash) const;
-	
-private:
-	CPinPluginDB();
-	void ConstructL();
-
-private:					
-	/**
-	 Create and open a New Store If it is first time
-	 else Open the existing store. 
-	 */
-	void OpenStoreL();
-	
-	/** 
-	 Open the existing store 
-	 @param aFile 			The name of the file to open
-	 */
-	void OpenStoreInFileL(const TDesC& aFile);
-	
-	/** 
-	 Create the new store
-	 @param aFile 			The name of the file to create
-	 */
-	void CreateStoreInFileL(const TDesC& aFile);
-	
-	/** 
-	Write the In memory represtation to the store.
-	*/
-	void WriteIdKeysToStoreL();
-	
-	/**
-	Read the Id and keys from the store
-	*/
-	void ReadIdKeysFromStoreL();
-	
-private:
-	/**
-	Methods dealing with atomic updates to key data file 
-	cleanup item that reverts the store.
-	*/
-	static void RevertStore(TAny* aStore);
-	/**
- 	 Attempt to compact the store - it doesn't matter if these calls leave, it
- 	 will only mean that the store takes up more space than necessary.
- 	*/	
-	void CompactStore();
-private:
-	RFile iFile;
-	RFs iFs;
-	/** FileStore Object */
-	CPermanentFileStore* iFileStore;
-	/** Root Stream that constains identityStreamId */
-	TStreamId iRootStreamId;
-	/** Identity Stream that contains dataStreamId and count of idHashes stored in the DB */
-	TStreamId iIdentityStreamId;
-	/** DB file Name */
-	TFileName iPluginDBName;
-private:
-	/** In memory representation of id in the store */
-	RArray<AuthServer::TIdentityId> iId;
-	/** In memory representation of hash in the store */
-	RPointerArray<HBufC8> iIdKeyHash;
-	};
-
-#endif /* PIN_PLUGINDB_H */
--- a/authenticationservices/authenticationserver/test/reftestplugin/pinplugin/pinplugindialog.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,192 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CPinPluginDialog implementation 
-*
-*/
-
-
-/**
- @file 
-*/
-
-#include "pinplugindialog.h"
-#include <authserver/auth_srv_errs.h>
-
-CPinPluginDialog::~CPinPluginDialog()
-	{
-	Deque();
-	iNotifier.Close();
-	}
-
-CPinPluginDialog* CPinPluginDialog::NewL()
-	{
-	CPinPluginDialog* self = CPinPluginDialog::NewLC();
-	CleanupStack::Pop(self);
-	return self;
-	}
-
-CPinPluginDialog* CPinPluginDialog::NewLC()
-	{
-	CPinPluginDialog* self = new (ELeave) CPinPluginDialog();
-	CleanupStack::PushL(self);
-	self->ConstructL();
-	return self;
-	}
-
-CPinPluginDialog::CPinPluginDialog(): CActive(EPriorityStandard)
-	{
-	CActiveScheduler::Add(this);
-	}
-
-void CPinPluginDialog::ConstructL()
-	{
-	User::LeaveIfError(iNotifier.Connect());
-	}
-
-void CPinPluginDialog::PinIdentify(const TInt aMinLength, const TInt aMaxLength, const TBool aRetry,
-						TPinValue& aPinValue, TPinPluginDialogResult& aResult, TRequestStatus& aStatus)
-	{
-	iClientPinValue = &aPinValue;
-	iClientPinDialogResult = &aResult;
-	iState = KPinPluginIdentify;
-	DoInitialize(EPinPluginIdentify, aStatus);
-	TPinIdentifyInput pinInput;
-	pinInput.iOperation = EPinPluginIdentify;
-	pinInput.iRetry = aRetry;
-	pinInput.iMinLength = aMinLength;
-	pinInput.iMaxLength = aMaxLength;
-	TPinIdentifyInputBuf pinInputBuf(pinInput);
-	iPinIdentifyInputBuf.Copy(pinInputBuf);
-	RequestDialog(iPinIdentifyInputBuf, iPinDialogOutputBuf);
-	}
-
-
-
-void CPinPluginDialog::PinTraining(const TPinPluginTrainingMessage aType, const RPointerArray<TPinValue>& aPinNumbers,
-	                        const TInt aMinLength, const TInt aMaxLength, TInt& aIndex, TInt& aCurrentLength,
-	                        TPinPluginDialogResult& aResult, TRequestStatus& aStatus)
-	{
-	iClientPinIndex = &aIndex;
-	iClientPinDialogResult = &aResult;
-	iClientNewPinLength = &aCurrentLength;
-	iState = KPinPluginTraining;
-	DoInitialize(EPinPluginTraining, aStatus);
-	TPinTrainingInput pinInput;
-	pinInput.iOperation = EPinPluginTraining;
-	pinInput.iMessage = aType;
-	pinInput.iMinLength = aMinLength;
-	pinInput.iMaxLength = aMaxLength;
-	pinInput.iCurrentPinLength = aCurrentLength;
-	pinInput.iPinValue1 = *(aPinNumbers[0]);
-	pinInput.iPinValue2 = *(aPinNumbers[1]);
-	pinInput.iPinValue3 = *(aPinNumbers[2]);
-	pinInput.iPinValue4 = *(aPinNumbers[3]);
-	TPinTrainingInputBuf pinInputBuf(pinInput);
-	iPinTrainingInputBuf.Copy(pinInputBuf);
-	RequestDialog(iPinTrainingInputBuf, iPinDialogOutputBuf);
-	}
-
-
-void CPinPluginDialog::PinInfo(const TPinPluginInfoMessage aMessage, TRequestStatus& aStatus)
-	{
-	iState = KPinPluginInfo;
-	DoInitialize(EPinPluginInfo, aStatus);
-	TPinInfoInput pinInput;
-	pinInput.iOperation = EPinPluginInfo;
-	pinInput.iMessage = aMessage;
-	TPinInfoInputBuf pinInputBuf(pinInput);
-	iPinInfoInputBuf.Copy(pinInputBuf);
-	RequestDialog(iPinInfoInputBuf, iPinDialogOutputBuf);
-	}
-
-void CPinPluginDialog::DoInitialize(const TPinPluginDialogOperation aOperation, TRequestStatus& aStatus)
-	{
-	iCurrentOperation = aOperation;
-
-	aStatus = KRequestPending;
-	iClientStatus = &aStatus;
-	}
-
-
-void CPinPluginDialog::RequestDialog(const TDesC8& aData, TDes8& aResponse)
-	{
-	iNotifier.StartNotifierAndGetResponse(iStatus, KUidPinPluginDialogNotifier,
-											aData, aResponse);
-	SetActive();
-	}
-	
-void CPinPluginDialog::DoCancel()
-	{
-	iNotifier.CancelNotifier(KUidPinPluginDialogNotifier);
-	if (iClientStatus)
-		{
-		User::RequestComplete(iClientStatus, KErrCancel);
-		}
-	}
-
-void CPinPluginDialog::RunL()
-	{
-	switch (iState)
-		{
-		case KPinPluginInfo:
-			{
-			//ignore the output as Info Dialog won't wait for user inputs
-			}
-			break;
-		case KPinPluginTraining:
-			{
-			TPinDialogOutput& pinDialogOutput = iPinDialogOutputBuf();
-			*iClientPinIndex = pinDialogOutput.iIndex;
-			*iClientNewPinLength = pinDialogOutput.iNewPinLength;
-			*iClientPinDialogResult = pinDialogOutput.iResult;
-			if(iStatus.Int() != KErrNone)
-				{
-				User::RequestComplete(iClientStatus, KErrAuthServRegistrationFailed);
-				return;
-				}
-			}
-			break;
-		case KPinPluginIdentify:
-			{
-			TPinDialogOutput& pinDialogOutput = iPinDialogOutputBuf();
-			*iClientPinValue = pinDialogOutput.iPinValue;
-			*iClientPinDialogResult = pinDialogOutput.iResult;
-			}
-			break;
-		default:
-			{
-			User::Leave(KErrNotSupported);
-			}
-			break;
-		}
-	User::RequestComplete(iClientStatus, iStatus.Int());
-	}
-	
-TInt CPinPluginDialog::RunError(TInt aError)
-	{
-	if (iClientStatus)
-		{
-		User::RequestComplete(iClientStatus, aError);
-		}
-	return KErrNone;
-	}
-
-
-
-
-
-
-
-
--- a/authenticationservices/authenticationserver/test/reftestplugin/pinplugin/pinplugindialog.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,124 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CPinPluginDialog declaration
-*
-*/
-
-
-/**
- @file 
-*/
-
-#ifndef PIN_PLUGINDIALOG_H
-#define PIN_PLUGINDIALOG_H
-
-#include <e32base.h>
-#include <pinplugindialogdefs.h>
-
-/**
- Definition of the pin plugin dialog interface 
- */
-class CPinPluginDialog : public CActive
-	{
-public:
-	/**
-	 Prompts the user to enter a pin. 
-	 
-	 @param aMinLength	The minimum length of the pin.
-	 @param aMaxLength	The maximum length of the pin.
-	 @param aRetry		Indicates whether the user is retrying.
-	 @param aPinValue	On return, It holds the pin that the user entered.
-	 @param aResult		On return, It holds output of the dialog
-	 @param aStatus		An asynchronous request status object.
-	 */
-	void PinIdentify(const TInt aMinLength, const TInt aMaxLength, const TBool aRetry, TPinValue& aPinValue,
-	                       TPinPluginDialogResult& aResult, TRequestStatus& aStatus);
-
-	/**
-	 Prompts the user to select a pin from the list.
-	  
-	 @param aType			Information about the pin to train/retrain
-	 @param aPinNumbers		array of pin number to display
-	 @param aMinLength		The minimum length of the pin.
-	 @param aMaxLength		The maximum length of the pin.
-	 @param aIndex			On return, It holds the index of the selected pin.
-	 @param aCurrentLength	By default, It has the current length of the pin
-	 						On return, It holds the new length of the pin if user changes.
- 	 @param aResult			On return, It holds output of the dialog.
- 	 @param aStatus			An asynchronous request status object. 
-	 */
-	void PinTraining(const TPinPluginTrainingMessage aType, const RPointerArray<TPinValue>& aPinNumbers,
-	                        const TInt aMinLength, const TInt aMaxLength, TInt& aIndex, TInt& aCurrentLength,
-	                        TPinPluginDialogResult& aResult, TRequestStatus& aStatus);
-
-	/**
-	 Display the message to the user. 
-	  
-	 @param aMessage	Information about the PIN to display.
-	 @param aStatus		An asynchronous request status object.	
-	 */
-	 void PinInfo(const TPinPluginInfoMessage aMessage,TRequestStatus& aStatus);
-	
-public:
-	/**
-	 Destructor for the CPinPluginDialog class
-	 */
-	~CPinPluginDialog();
-	/** static methods to constuct the object of the CPinPluginDialog */
-	static CPinPluginDialog* NewL();
-	static CPinPluginDialog* NewLC();
-private:
-	CPinPluginDialog();
-	void ConstructL();
-	/**
-	 Helper function to perform basic initialization
-	 */
-	void DoInitialize(const TPinPluginDialogOperation aOperation, TRequestStatus& aStatus);
-	/**
-	 Helper function to Issue Notifier request for the Dialog.
-	 */
-	void RequestDialog(const TDesC8& aData, TDes8& aResponse);
-
-private: // from CActive
-	void RunL();
-	void DoCancel();
-	TInt RunError(TInt aError);
-
-private:
-	enum TState 
-		{ 	
-		KPinPluginInfo,
-		KPinPluginTraining,
-		KPinPluginIdentify
-		};
-
-	TPinPluginDialogOperation iCurrentOperation;
-	TRequestStatus* iClientStatus;
-	RNotifier iNotifier;
-	TState iState;
-
-	TPinIdentifyInputBuf iPinIdentifyInputBuf;
-	TPinTrainingInputBuf iPinTrainingInputBuf;
-	TPinInfoInputBuf iPinInfoInputBuf;
-	TPinDialogOutputBuf iPinDialogOutputBuf;
-	TInt* iClientPinIndex;
-	TPinValue* iClientPinValue;
-	TInt* iClientNewPinLength;
-	TPinPluginDialogResult* iClientPinDialogResult;
-	};
-
-
-#endif /* PIN_PLUGINDIALOG_H */
-
--- a/authenticationservices/authenticationserver/test/reftestplugin/tpinplugin/scripts/tpinplugin.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,306 +0,0 @@
-[plugin_properties]
-pinprocesstype=Property
-
-[default_data]
-pinprocesstype=DefaultData
-identityid=4164
-
-[train_ok1]
-pinprocesstype=Train
-identityid=4165
-outputatdialog=1
-expectedoutput=TrainingSuccess
-selectindex=0
-
-[train_ok2]
-pinprocesstype=Train
-identityid=4166
-outputatdialog=2
-expectedoutput=TrainingSuccess
-selectindex=0
-
-[train_ok3]
-pinprocesstype=Train
-identityid=4167
-outputatdialog=3
-expectedoutput=TrainingSuccess
-selectindex=0
-
-[train_ok4]
-pinprocesstype=Train
-identityid=4168
-outputatdialog=5
-expectedoutput=TrainingSuccess
-selectindex=0
-
-[train_ok5]
-pinprocesstype=Train
-identityid=4169
-outputatdialog=10
-expectedoutput=TrainingSuccess
-selectindex=0
-
-[train_changepin]
-pinprocesstype=Train
-identityid=4170
-selectindex=0
-newpinlength=8
-outputatdialog=2
-expectedoutput=TrainingSuccess
-
-[train_cancel]
-pinprocesstype=Train
-identityid=4123
-selectindex=1
-outputatdialog=3
-expectedoutput=Cancel
-
-[train_quit]
-pinprocesstype=Train
-identityid=4123
-selectindex=3
-outputatdialog=3
-expectedoutput=Quit
-
-[retrain_ok1]
-pinprocesstype=ReTrain
-identityid=4175
-outputatdialog=1
-expectedoutput=ReTrainingSuccess
-
-[retrain_ok2]
-pinprocesstype=ReTrain
-identityid=4176
-outputatdialog=2
-selectindex=0
-expectedoutput=ReTrainingSuccess
-
-[retrain_ok3]
-pinprocesstype=ReTrain
-identityid=4177
-outputatdialog=3
-selectindex=0
-expectedoutput=ReTrainingSuccess
-
-[retrain_ok4]
-pinprocesstype=ReTrain
-identityid=4178
-outputatdialog=5
-selectindex=0
-expectedoutput=ReTrainingSuccess
-
-[retrain_ok5]
-pinprocesstype=ReTrain
-identityid=4179
-outputatdialog=10
-selectindex=0
-expectedoutput=ReTrainingSuccess
-
-[retrain_changepin]
-pinprocesstype=ReTrain
-identityid=4180
-selectindex=0
-newpinlength=10
-outputatdialog=2
-expectedoutput=ReTrainingSuccess
-
-[retrain_cancel]
-pinprocesstype=ReTrain
-identityid=4185
-selectindex=1
-expectedoutput=Cancel
-
-[retrain_quit]
-pinprocesstype=ReTrain
-identityid=4186
-selectindex=3
-expectedoutput=Quit
-
-[identify_ok_fail]
-pinprocesstype=Identify
-identityid=4164
-pinvalue=123456
-expectedoutput=IdentifyFailure
-
-[identify_ok_pass]
-pinprocesstype=Identify
-identityid=4164
-pinvalue=11111
-expectedoutput=IdentifySuccess
-
-[identify_cancel]
-pinprocesstype=Identify
-identityid=4165
-pinvalue=123456
-expectedoutput=Cancel
-
-[identify_quit]
-pinprocesstype=Identify
-identityid=4166
-pinvalue=123456
-expectedoutput=quit
-
-[newpin_morethanmax]
-pinprocesstype=Train
-identityid=4123
-selectindex=0
-newpinlength=12
-outputatdialog=2
-expectedoutput=TrainingSuccess
-
-[newpin_lessthanmin]
-pinprocesstype=Train
-identityid=4123
-selectindex=0
-newpinlength=2
-outputatdialog=2
-expectedoutput=TrainingSuccess
-
-
-[forget_fail]
-pinprocesstype=Forget
-identityid=4100
-expectedoutput=Failure
-
-
-[forget_pass1]
-pinprocesstype=Forget
-identityid=4170
-expectedoutput=Success
-
-[forget_pass2]
-pinprocesstype=Forget
-identityid=4168
-expectedoutput=Success
-
-[forget_pass3]
-pinprocesstype=Forget
-identityid=4167
-expectedoutput=Success
-
-[forget_pass4]
-pinprocesstype=Forget
-identityid=4166
-expectedoutput=Success
-
-[forget_pass5]
-pinprocesstype=Forget
-identityid=4169
-expectedoutput=Success
-
-[forget_pass6]
-pinprocesstype=Forget
-identityid=4165
-expectedoutput=Success
-
-[forget_pass7]
-pinprocesstype=Forget
-identityid=4180
-expectedoutput=Success
-
-[forget_pass8]
-pinprocesstype=Forget
-identityid=4178
-expectedoutput=Success
-
-[forget_pass9]
-pinprocesstype=Forget
-identityid=4177
-expectedoutput=Success
-
-[forget_pass10]
-pinprocesstype=Forget
-identityid=4176
-expectedoutput=Success
-
-[forget_pass11]
-pinprocesstype=Forget
-identityid=4179
-expectedoutput=Success
-
-[forget_pass12]
-pinprocesstype=Forget
-identityid=4175
-expectedoutput=Success
-
-[forget_pass13]
-pinprocesstype=Forget
-identityid=4185
-expectedoutput=Success
-
-[forget_pass14]
-pinprocesstype=Forget
-identityid=4186
-expectedoutput=Success
-
-[train_server_cancel1]
-pinprocesstype=TrainServerCancel
-identityid=4187
-selectindex=1
-timeout=100
-expectedoutput=ServerCancel
-
-[retrain_server_cancel1]
-pinprocesstype=ReTrainServerCancel
-identityid=4188
-selectindex=1
-timeout=100
-outputatdialog=3
-expectedoutput=ServerCancel
-
-[identify_server_cancel1]
-pinprocesstype=identifyServerCancel
-identityid=4189
-pinvalue=123456
-timeout=100
-expectedoutput=ServerCancel
-
-[forget_pass15]
-pinprocesstype=Forget
-identityid=4188
-expectedoutput=Success
-
-[sequence]
-pinprocesstype=Sequence
-identityid=4189
-expectedoutput=Success
-
-[forget_pass16]
-pinprocesstype=Forget
-identityid=4189
-expectedoutput=Success
-
-[forget_pass17]
-pinprocesstype=Forget
-identityid=4164
-expectedoutput=Success
-
-[oom1]
-pinprocesstype=Oom
-oomtest=1
-
-[oom2]
-pinprocesstype=Oom
-oomtest=2
-
-[oom3]
-pinprocesstype=Oom
-oomtest=3
-
-[oom4]
-pinprocesstype=Oom
-oomtest=4
-
-[oom5]
-pinprocesstype=Oom
-oomtest=5
-
-[oom6]
-pinprocesstype=Oom
-oomtest=6
-
-[datfile]
-pinprocesstype=Train
-selectedindex=0
-newpinlength=4
-outputatdialog=2
--- a/authenticationservices/authenticationserver/test/reftestplugin/tpinplugin/scripts/tpinplugin.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,1295 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-
-PRINT PinPlugin tests...
-
-LOAD_SUITE tpinplugin
-
-/////////////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0050
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Delete already existing plugin store.
-//!@SYMPREQ                 PREQ218
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestExpectedResults	Deletion successful.
-//!@SYMTestType				UT
-/////////////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0050
-
-RUN_UTILS DeleteFile c:\private\102740fc\plugin.store
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0050
-
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0001 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and get the
-//					properties of the pin plugin.
-//!@SYMREQ 				REQ5004, REQ5005, REQ5006, REQ5007,REQ5019,REQ5001
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1.Load Pin Plugin
-//      				2.Get the Properties of the plugin
-//      				3.Verify the properties
-//!@SYMTestExpectedResults		verification returns success
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0001
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini plugin_properties
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0001
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0002 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and get the
-//					default data of the pin plugin.
-//!@SYMREQ 				REQ5019
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1.Load Pin Plugin
-//      				2.Get the default data of the plugin
-//      				3.Verify with identify operation
-//!@SYMTestExpectedResults		verification returns success
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0002
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini default_data
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0002
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0003 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and train the
-//					User with the selected Pin and store the pin and ID of
-//					the user to the DB.
-//!@SYMREQ 				REQ5021, REQ5012
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in and call Train Function
-//					2. Select first Pin from first Train dialog (EPINPlugInTraining).
-//					3. Save the Identity ID and returned Identify hash in aResult parameter inside test 	
-//					harness.
-//					4. Call Identify function.
-//					5. Displays Identify dialogs (EPINPlugInIdentify), enter PIN saved in previous 		
-//					operation from notification dialog code.
-//!@SYMTestExpectedResults		Saved values from Train operation and returned values from Identity
-//					operation match
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0003
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini train_ok1
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0003
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0004 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and train the
-//					User with the selected Pin and store the pin and ID of
-//					the user to the DB.
-//!@SYMREQ 				REQ5021, REQ5012
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in and call Train Function
-//					2. Select first Pin from second Train dialog (EPINPlugInTraining).
-//					3. Save the Identity ID and returned Identify hash in aResult parameter inside test 	
-//					harness.
-//					4. Call Identify function.
-//					5. Displays Identify dialogs (EPINPlugInIdentify), enter PIN saved in previous 		
-//					operation from notification dialog code.
-//!@SYMTestExpectedResults		Saved values from Train operation and returned values from Identity
-//					operation match
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0004
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini train_ok2
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0004
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0005 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and train the
-//					User with the selected Pin and store the pin and ID of
-//					the user to the DB.
-//!@SYMREQ 				REQ5021, REQ5012
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in and call Train Function
-//					2. Select first Pin from Third Train dialog (EPINPlugInTraining).
-//					3. Save the Identity ID and returned Identify hash in aResult parameter inside test 	
-//					harness.
-//					4. Call Identify function.
-//					5. Displays Identify dialogs (EPINPlugInIdentify), enter PIN saved in previous 		
-//					operation from notification dialog code.
-//!@SYMTestExpectedResults		Saved values from Train operation and returned values from Identity
-//					operation match
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0005
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini train_ok3
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0005
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0006 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and train the
-//					User with the selected Pin and store the pin and ID of
-//					the user to the DB.
-//!@SYMREQ 				REQ5021, REQ5012
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in and call Train Function
-//					2. Select first Pin from fifth Train dialog (EPINPlugInTraining).
-//					3. Save the Identity ID and returned Identify hash in aResult parameter inside test 	
-//					harness.
-//					4. Call Identify function.
-//					5. Displays Identify dialogs (EPINPlugInIdentify), enter PIN saved in previous 		
-//					operation from notification dialog code.
-//!@SYMTestExpectedResults		Saved values from Train operation and returned values from Identity
-//					operation match
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0006
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini train_ok4
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0006
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0007
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and train the
-//					User with the selected Pin and store the pin and ID of
-//					the user to the DB.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in and call Train Function
-//					2. Select first Pin from Tenth Train dialog (EPINPlugInTraining).
-//					3. Save the Identity ID and returned Identify hash in aResult parameter inside test 	
-//					harness.
-//					4. Call Identify function.
-//					5. Displays Identify dialogs (EPINPlugInIdentify), enter PIN saved in previous 		
-//					operation from notification dialog code.
-//!@SYMTestExpectedResults		Saved values from Train operation and returned values from Identity
-//					operation match
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0007
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini train_ok5
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0007
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0008 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and train the
-//					User with the selected Pin and store the pin and ID of
-//					the user to the DB.
-//!@SYMREQ 				REQ5021,REQ5020
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in and call Train Function
-//					2. Enter the new pinlength in first Train dialog and Enter Next button.
-//					3. Select first Pin from next Train dialog which displays pin with new length.
-//					4. Save the Identity ID and returned Identify hash in aResult parameter inside test 	
-//					harness.
-//					4. Call Identify function.
-//					5. Displays Identify dialogs (EPINPlugInIdentify), enter PIN saved in previous 		
-//					operation from notification dialog code.
-//!@SYMTestExpectedResults		Saved values from Train operation and returned values from Identity
-//					operation match
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0008
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini train_changepin
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0008
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0009 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and train the
-//					User with the selected Pin and store the pin and ID of
-//					the user to the DB.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in and call Train Function
-//					2. Select Cancel button when Training dialog displayed.
-//					3. Call Identify function.
-//					4. Displays Identify dialogs (EPINPlugInIdentify), enter random PIN		
-//!@SYMTestExpectedResults		Train function should complete with KErrAuthServPluginCancelled
-//					and Identify Fails and gives the result as no identity Exist.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0009
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini train_cancel
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0009
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0010
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and train the
-//					User with the selected Pin and store the pin and ID of
-//					the user to the DB.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in and call Train Function
-//					2. Select Quit button when Training dialog displayed.
-//					3. Call Identify function.
-//					4. Displays Identify dialogs (EPINPlugInIdentify), enter random PIN		
-//!@SYMTestExpectedResults		Train function should complete with KErrAuthServPluginuit
-//					and Identify Fails and gives the result as no identity Exist.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0010
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini train_quit
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0010
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0011 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and train the
-//					User with the selected Pin and store the pin and ID of
-//					the user to the DB.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in and call Train Function
-//					2. Call Cancel function of Plug-in object.
-//					4. Call Identify function.
-//					5. Displays Identify dialogs (EPINPlugInIdentify), enter random pin.
-//!@SYMTestExpectedResults		Train asynchronous operation shall be stopped. Calling active object receive
-//					KErrCancel. and identify Fails and gives the result as no identity Exist.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0011
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini train_server_cancel1
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0011
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0012 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and train the
-//					User with the selected Pin and store the pin and ID of
-//					the user to the DB.
-//!@SYMREQ 				REQ5022, REQ5013
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in 
-//					2. call Train Function
-//					3. Select first Pin from first Train dialog (EPINPlugInTraining).
-//					4. Save the Identity ID and returned Identify hash in aResult parameter inside test 	
-//					harness.
-//					5. Call Identify function.
-//					6. Displays Identify dialogs (EPINPlugInIdentify), enter PIN saved in previous 		
-//					operation from notification dialog code.
-//					7. Repeat 1-6 to ReTrain
-//!@SYMTestExpectedResults		Saved values from Train operation and returned values from Identity
-//					operation match
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0012
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini retrain_ok1
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0012
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0013
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and train the
-//					User with the selected Pin and store the pin and ID of
-//					the user to the DB.
-//!@SYMREQ 				REQ5022, REQ5013
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in 
-//					2. call Train Function
-//					3. Select first Pin from Second Train dialog (EPINPlugInTraining).
-//					4. Save the Identity ID and returned Identify hash in aResult parameter inside test 	
-//					harness.
-//					5. Call Identify function.
-//					6. Displays Identify dialogs (EPINPlugInIdentify), enter PIN saved in previous 		
-//					operation from notification dialog code.
-//					7. Repeat 1-6 to ReTrain
-//!@SYMTestExpectedResults		Saved values from Train operation and returned values from Identity
-					operation match
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0013
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini retrain_ok2
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0013
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0014
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and train the
-//					User with the selected Pin and store the pin and ID of
-//					the user to the DB.
-//!@SYMREQ 				REQ5022, REQ5013
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in 
-//					2. call Train Function
-//					3. Select first Pin from Third Train dialog (EPINPlugInTraining).
-//					4. Save the Identity ID and returned Identify hash in aResult parameter inside test 	
-//					harness.
-//					5. Call Identify function.
-//					6. Displays Identify dialogs (EPINPlugInIdentify), enter PIN saved in previous 		
-//					operation from notification dialog code.
-//					7. Repeat 1-6 to ReTrain
-//!@SYMTestExpectedResults		Saved values from Train operation and returned values from Identity
-					operation match
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0014
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini retrain_ok3
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0014
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0015 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and train the
-//					User with the selected Pin and store the pin and ID of
-//					the user to the DB.
-//!@SYMREQ 				REQ5022, REQ5013
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in 
-//					2. call Train Function
-//					3. Select first Pin from Fifth Train dialog (EPINPlugInTraining).
-//					4. Save the Identity ID and returned Identify hash in aResult parameter inside test 	
-//					harness.
-//					5. Call Identify function.
-//					6. Displays Identify dialogs (EPINPlugInIdentify), enter PIN saved in previous 		
-//					operation from notification dialog code.
-//					7. Repeat 1-6 to ReTrain
-//!@SYMTestExpectedResults		Saved values from Train operation and returned values from Identity
-//					operation match
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0015
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini retrain_ok4
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0015
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0016 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and train the
-//					User with the selected Pin and store the pin and ID of
-//					the user to the DB.
-//!@SYMREQ 				REQ5022
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in 
-//					2. call Train Function
-//					3. Select first Pin from Tenth Train dialog (EPINPlugInTraining).
-//					4. Save the Identity ID and returned Identify hash in aResult parameter inside test 	
-//					harness.
-//					5. Call Identify function.
-//					6. Displays Identify dialogs (EPINPlugInIdentify), enter PIN saved in previous 		
-//					operation from notification dialog code.
-//					7. Repeat 1-6 to ReTrain
-//!@SYMTestExpectedResults		Saved values from Train operation and returned values from Identity
-//					operation match
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0016
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini retrain_ok5
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0016
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0017
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and train the
-//					User with the selected Pin and store the pin and ID of
-//					the user to the DB.
-//!@SYMREQ 				REQ5021,REQ5020
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in, call Train Function and select first pin form first dialog.
-//					2. Call Identify function, enter PIN saved in previous operation from notification 
-//					dialog code.
-//					3. call Train Function. Enter the new pinlength in first Train dialog and Enter Next 
-//					button.
-//					3. Select first Pin from next Train dialog which displays pin with new length.
-//					4. Save the Identity ID and returned Identify hash in aResult parameter inside test 	
-//					harness.
-//					4. Call Identify function.
-//					5. Displays Identify dialogs (EPINPlugInIdentify), enter PIN saved in previous 		
-//					operation from notification dialog code.
-//!@SYMTestExpectedResults		Saved values from Train operation and returned values from Identity
-//					operation match
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0017
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini retrain_changepin
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0017
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0018 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and train the
-//					User with the selected Pin and store the pin and ID of
-//					the user to the DB.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in, call Train Function and select first pin form first dialog.
-//					2. Call Identify function, enter PIN saved in previous operation from notification 
-//					dialog code.
-//					3. call Train Function. Enter the Cancel button.
-//					4. Call Identify function.
-//					5. Displays Identify dialogs (EPINPlugInIdentify), enter random PIN		
-//!@SYMTestExpectedResults		Train function complete with KErrAuthServPluginCancelled
-//					and Identify Fails and gives the result as identityexist given a wrong pin
-//					while repeat identy function with correct pin gives success.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0018
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini retrain_cancel
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0018
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0019
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and train the
-//					User with the selected Pin and store the pin and ID of
-//					the user to the DB.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in, call Train Function and select first pin form first dialog.
-//					2. Call Identify function, enter PIN saved in previous operation from notification 
-//					dialog code.
-//					3. call Train Function. Enter the Quit button.
-//					3. Call Identify function.
-//					4. Displays Identify dialogs (EPINPlugInIdentify), enter random PIN		
-//!@SYMTestExpectedResults		Train function complete with KErrAuthServPluginCancelled
-//					and Identify Fails and gives the result as identityexist given a wrong pin
-//					while repeat identy function with correct pin gives success.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0019
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini retrain_quit
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0019
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0020 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and train the
-//					User with the selected Pin and store the pin and ID of
-//					the user to the DB.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in, call Train Function and select first pin form first dialog.
-//					2. Call Identify function, enter PIN saved in previous operation from notification 
-//					dialog code.
-//					3. call Train Function. Call Cancel function of Plug-in object.
-//					4. Call Identify function.
-//					5. Displays Identify dialogs (EPINPlugInIdentify), enter random pin.
-//!@SYMTestExpectedResults		Train asynchronous operation shall be stopped. Calling active object receive
-//					KErrCancel. and Identify Fails and gives the result as identityexist given a wrong
-//					pin while repeat identy function with correct pin gives success.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0020
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini retrain_server_cancel1
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0020
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0021 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and identify the
-//					User with the given Pin and return the keyhash to the server.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in 
-//					2. Call Identify function which already trained with default pin.
-//					5. Displays Identify dialogs (EPINPlugInIdentify), enter default pin in first dialog.
-//!@SYMTestExpectedResults		identify returns success in first dialog itself
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0021
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini identify_ok_pass
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0021
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0022
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and identify the
-//					User with the given Pin and return the keyhash to the server.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in 
-//					2. Call Identify function which already trained.
-//					5. Displays Identify dialogs (EPINPlugInIdentify), enter wrong pin 3 retry dialogs.
-//!@SYMTestExpectedResults		identify operation not displayed 4 dialog and failed with 
-//					EPinPluginIdentificationFailure.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0022
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini identify_ok_fail
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0022
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0023
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and identify the
-//					User with the given Pin and return the keyhash to the server.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in and call Identify Function
-//					2. Select Cancel button when Identify dialog displayed.
-//!@SYMTestExpectedResults		Identify function complete with KErrAuthServPluginCancelled(code = -10804)  
-//					and Identify Fails with EPinPluginIdentificationFailure.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0023
-
-RUN_TEST_STEP !Error=-10804  100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini identify_cancel
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0023
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0024 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and identify the
-//					User with the given Pin and return the keyhash to the server.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in and call Identify Function
-//					2. Select Quit button when Identify dialog displayed.
-//!@SYMTestExpectedResults		Identify function complete with KErrAuthServPluginQuit(code = -10805)
-//					and Identify Fails with EPinPluginIdentificationFailure.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0024
-
-RUN_TEST_STEP !Error=-10805 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini identify_quit
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0024
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0025
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and identify the
-//					User with the given Pin and return the keyhash to the server.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in and call Identify Function
-//					2. Call Cancel function of Plug-in object.
-//!@SYMTestExpectedResults		Identify asynchronous operation shall be stopped. Calling active object receive
-//					KErrCancel. 
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0025
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini identify_server_cancel1
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0025
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0026
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases will load the pinplugin and while training the
-//					User because of invalid pinsize the registration fails.  
-//					the user to the DB.
-//!@SYMREQ 				REQ5021,REQ5020
-//!@SYMPREQ                   		PREQ219, DEF141405
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in and call Train Function
-//					2. Enter the new pinlength which is more than the max value in first Train dialog and 
-//					Enter Next button.
-//!@SYMTestExpectedResults		Pinplugin leaves with KErrAuthServRegistrationFailed(-10810).
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0026
-
-RUN_TEST_STEP !Error=-10810  100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini newpin_morethanmax
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0026
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0027 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and while train the
-//					User because of invalid pinsize the registration fails.
-//!@SYMREQ 				REQ5021,REQ5020
-//!@SYMPREQ                   		PREQ219, DEF141405
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in and call Train Function
-//					2. Enter the new pinlength which is less than the min value in first Train dialog and 
-//					Enter Next button.
-//!@SYMTestExpectedResults		Pinplugin leaves with KErrAuthServRegistrationFailed(-10810).
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0027
-
-RUN_TEST_STEP !Error=-10810  100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini newpin_lessthanmin
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0027
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0028 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and perform various train, 
-//					identify, cancel functions sequentially.
-//!@SYMREQ 				REQ5021, REQ 5020
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in 
-//					2. call Train Function verify with Identify Function.
-//					2. call Train Function
-//					3. Call Forget Function verify with Identify Function.
-//					4. call Train Function and while training the user cancel from dialog.
-//					5. call Train Function and verify with identify Function.
-//!@SYMTestExpectedResults		All the Function returns expected results
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0028
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini sequence
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0028
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0029 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and forget
-//					the trained data if already trained.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in and 
-//					2. Call Forget operation for unknown identity
-//					3. verify with identify operation
-//!@SYMTestExpectedResults		return with KErrAuthServNoSuchIdentity. Identify fails
-//					and gives the reason as no identity exists.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0029
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini forget_fail
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0029
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0030 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and forget
-//					the trained data if already trained.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in
-//					2. Call Forget operation for already trained identity
-//					and number of trained entries in the DB is more than one.
-//					3. verify with identify operation
-//!@SYMTestExpectedResults		Identify fails and gives the reason as no such identity exists.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0030
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini forget_pass1
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0030
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0031 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and forget
-//					the trained data if already trained.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in
-//					2. Call Forget operation for already trained identity
-//					and number of trained entries in the DB is more than one.
-//					3. verify with identify operation
-//!@SYMTestExpectedResults		Identify fails and gives the reason as no such identity exists.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0031
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini forget_pass2
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0031
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0032
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and forget
-//					the trained data if already trained.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in
-//					2. Call Forget operation for already trained identity
-//					and number of trained entries in the DB is more than one.
-//					3. verify with identify operation
-//!@SYMTestExpectedResults		Identify fails and gives the reason as no such identity exists.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0032
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini forget_pass3
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0032
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0033
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and forget
-//					the trained data if already trained.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in
-//					2. Call Forget operation for already trained identity
-//					and number of trained entries in the DB is more than one.
-//					3. verify with identify operation
-//!@SYMTestExpectedResults		Identify fails and gives the reason as no such identity exists.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0033
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini forget_pass4
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0033
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0034
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and forget
-//					the trained data if already trained.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in
-//					2. Call Forget operation for already trained identity
-//					and number of trained entries in the DB is more than one.
-//					3. verify with identify operation
-//!@SYMTestExpectedResults		Identify fails and gives the reason as no such identity exists.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0034
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini forget_pass5
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0034
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0035 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and forget
-//					the trained data if already trained.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in
-//					2. Call Forget operation for already trained identity
-//					and number of trained entries in the DB is more than one.
-//					3. verify with identify operation
-//!@SYMTestExpectedResults		Identify fails and gives the reason as no such identity exists.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0035
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini forget_pass6
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0035
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0036
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and forget
-//					the trained data if already trained.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in
-//					2. Call Forget operation for already trained identity
-//					and number of trained entries in the DB is more than one.
-//					3. verify with identify operation
-//!@SYMTestExpectedResults		Identify fails and gives the reason as no such identity exists.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0036
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini forget_pass7
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0036
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0037 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and forget
-//					the trained data if already trained.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in
-//					2. Call Forget operation for already trained identity
-//					and number of trained entries in the DB is more than one.
-//					3. verify with identify operation
-//!@SYMTestExpectedResults		Identify fails and gives the reason as no such identity exists.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0037
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini forget_pass8
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0037
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0038 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and forget
-//					the trained data if already trained.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in
-//					2. Call Forget operation for already trained identity
-//					and number of trained entries in the DB is more than one.
-//					3. verify with identify operation
-//!@SYMTestExpectedResults		Identify fails and gives the reason as no such identity exists.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0038
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini forget_pass9
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0038
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0039
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and forget
-//					the trained data if already trained.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in
-//					2. Call Forget operation for already trained identity
-//					and number of trained entries in the DB is more than one.
-//					3. verify with identify operation
-//!@SYMTestExpectedResults		Identify fails and gives the reason as no such identity exists.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0039
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini forget_pass10
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0039
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0040 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and forget
-//					the trained data if already trained.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in
-//					2. Call Forget operation for already trained identity
-//					and number of trained entries in the DB is more than one.
-//					3. verify with identify operation
-//!@SYMTestExpectedResults		Identify fails and gives the reason as no such identity exists.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0040
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini forget_pass11
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0040
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0041 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and forget
-//					the trained data if already trained.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in
-//					2. Call Forget operation for already trained identity
-//					and number of trained entries in the DB is more than one.
-//					3. verify with identify operation
-//!@SYMTestExpectedResults		Identify fails and gives the reason as no such identity exists.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0041
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini forget_pass12
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0041
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0042
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and forget
-//					the trained data if already trained.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in
-//					2. Call Forget operation for already trained identity
-//					and number of trained entries in the DB is more than one.
-//					3. verify with identify operation
-//!@SYMTestExpectedResults		Identify fails and gives the reason as no such identity exists.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0042
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini forget_pass13
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0042
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0043
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and forget
-//					the trained data if already trained.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in
-//					2. Call Forget operation for already trained identity
-//					and number of trained entries in the DB is more than one.
-//					3. verify with identify operation
-//!@SYMTestExpectedResults		Identify fails and gives the reason as no such identity exists.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0043
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini forget_pass14
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0043
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0044 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and forget
-//					the trained data if already trained.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in
-//					2. Call Forget operation for already trained identity
-//					and number of trained entries in the DB is more than one.
-//					3. verify with identify operation
-//!@SYMTestExpectedResults		Identify fails and gives the reason as no such identity exists.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0044
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini forget_pass15
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0044
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0045 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and forget
-//					the trained data if already trained.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in
-//					2. Call Forget operation for already trained identity
-//					and number of trained entries in the DB is more than one.
-//					3. verify with identify operation
-//!@SYMTestExpectedResults		Identify fails and gives the reason as no such identity exists.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0045
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini forget_pass16
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0045
-
-//////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0046 
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test cases perform load the pinplugin and forget
-//					the trained data if already trained.
-//!@SYMREQ 				REQ5021
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestActions  			1. Load Plug-in
-//					2. Call Forget operation for already trained identity
-//					and number of trained entrie in the DB is exactly one.
-//					3. verify with identify operation
-//!@SYMTestExpectedResults		Identify fails and gives the reason as no such identity exists.
-//!@SYMTestType				UT
-//////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0046
-
-RUN_TEST_STEP 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini forget_pass17
-
-// delete the source file
-RUN_UTILS DeleteFile c:\private\102740fc\plugin.store
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0046
-
-/////////////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0047
-//!@SYMTestCaseDependencies		TEF, ini file (pinplugin.ini) containing the test data path for 
-//					the OOM tests.
-//!@SYMTestCaseDesc			Below test cases perform out of memory tests for the Pin Plugin.
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestExpectedResults		
-//!@SYMTestType				UT
-/////////////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0047
-
-// Test case perform out of memory tests for CAuthPluginInterface* NewL()
-RUN_TEST_STEP !OOM 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini oom1
-
-// Test case perform out of memory tests for DefaultData()
-RUN_TEST_STEP !OOM 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini oom2
-
-// Test case perform out of memory tests for Identify()
-RUN_TEST_STEP !OOM 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini oom3
-
-// Test case perform out of memory tests for Train()
-RUN_TEST_STEP !OOM 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini oom4
-
-// Test case perform out of memory tests for ReTrain()
-RUN_TEST_STEP !OOM 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini oom5
-
-// Test case perform out of memory tests for Forget()
-RUN_TEST_STEP !OOM 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini oom6
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0047
-
-/////////////////////////////////////////////////////////////////////////////////////////////////////
-//!@file				
-//!@SYMTestCaseID			SEC-AUT-PINPLUGIN-0049
-//!@SYMTestCaseDependencies		TestData ini file(pinplugin.ini) containing the data 
-//!@SYMTestCaseDesc			Below test case try to load the plugin when the DB was corrupted.
-//!@SYMPREQ                   		PREQ219
-//!@SYMTestStatus			Implemented
-//!@SYMTestPriority			High
-//!@SYMTestExpectedResults		Load fails with error code
-//!@SYMTestType				UT
-/////////////////////////////////////////////////////////////////////////////////////////////////////
-
-START_TESTCASE SEC-AUT-PINPLUGIN-0049
-
-RUN_UTILS DeleteFile c:\private\102740fc\plugin.store
-RUN_UTILS CopyFile c:\tauth\tauthsvr\testdata\authsvrpolicy.ini c:\private\102740fc\plugin.store
-RUN_TEST_STEP_RESULT -5 100 tpinplugin tPinPluginTestStep c:\tauth\tpinplugin\scripts\tpinplugin.ini plugin_properties
-RUN_UTILS DeleteFile c:\private\102740fc\plugin.store
-
-END_TESTCASE SEC-AUT-PINPLUGIN-0049
-
-
--- a/authenticationservices/authenticationserver/test/reftestplugin/tpinplugin/tpinplugin.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,115 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* TestExecute Server testing pin plugin
-*
-*/
-
-
-/**
- @file 
-*/
-#include "tpinplugin.h"
-#include "tpinpluginteststep.h"
-
-using namespace AuthServer;
-
-CPinPluginTestServer* CPinPluginTestServer::NewL()
-	{
-	CPinPluginTestServer* server = new (ELeave) CPinPluginTestServer();
-	CleanupStack::PushL(server);
-	
-	// Either use a StartL or ConstructL, the latter will permit
-	// Server Logging.
-	TParsePtrC serverName(RProcess().FileName());	
-	server->ConstructL(serverName.Name());
-	CleanupStack::Pop(server);
-	return server;
-	}
-
-// EKA2 much simpler
-// Just an E32Main and a MainL()
-LOCAL_C void MainL()
-/**
- * Much simpler, uses the new Rendezvous() call to sync with the client
- */
-	{
-	// Leave the hooks in for platform security
-#if (defined __DATA_CAGING__)
-	RProcess().DataCaging(RProcess::EDataCagingOn);
-	RProcess().SecureApi(RProcess::ESecureApiOn);
-#endif
-	CActiveScheduler* sched=NULL;
-	sched=new(ELeave) CActiveScheduler;
-	CleanupStack::PushL(sched);
-	CActiveScheduler::Install(sched);
-	CPinPluginTestServer* server = NULL;
-	// Create the CTestServer derived server
-	TRAPD(err,server = CPinPluginTestServer::NewL());
-	if(!err)
-		{
-		// Sync with the client and enter the active scheduler
-		RProcess::Rendezvous(KErrNone);
-		sched->Start();
-		}
-	CleanupStack::Pop(sched);
-	delete server;
-	delete sched;
-	}
-
-// Only a DLL on emulator for typhoon and earlier
-
-GLDEF_C TInt E32Main()
-/**
- @return - Standard Epoc error code on exit
- */
-	{
-	CTrapCleanup* cleanup = CTrapCleanup::New();
-	if(cleanup == NULL)
-		{
-		return KErrNoMemory;
-		}
-	TRAP_IGNORE(MainL());
-	delete cleanup;
-	return KErrNone;
-    }
-
-// Create a thread in the calling process
-// Emulator typhoon and earlier
-
-CTestStep* CPinPluginTestServer::CreateTestStep(const TDesC& aStepName)
-	{
-	CTestStep* testStep = NULL;
-
-	// This server creates just one step 
-	// They are created "just in time" when the worker thread is created
-
-	if(aStepName == KPinPluginTestStep)
-		{
-		testStep = new CPinPluginTestStep();
-		}
-	else if (aStepName == KCreateInputFile)
-		{
-		testStep = new CCreateFile();
-		}
-	else
-		{
-		ERR_PRINTF1(_L("The test step name specified does not exist."));
-		}
-
-	return testStep;
-	}
-
-
-
--- a/authenticationservices/authenticationserver/test/reftestplugin/tpinplugin/tpinplugin.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,43 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include <test/TestExecuteServerBase.h>
-
-class CPinPluginTestServer : public CTestServer
-	{
-public:
-	/**
- 	 Called inside the MainL() function to create and start the
- 	 CTestServer derived server.
- 	 
- 	 @return - Instance of the test server
- 	 */
-	static CPinPluginTestServer* NewL();
-	
-	/**
-	 Implementation of CTestServer pure virtual
- 	 @return - A CTestStep derived instance
- 	 */
-	virtual CTestStep* CreateTestStep(const TDesC& aStepName);
-	RFs& Fs(){return iFs;};
-
-private:
-	RFs iFs;
-	};
-
-
--- a/authenticationservices/authenticationserver/test/reftestplugin/tpinplugin/tpinplugintestactive.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,1107 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include "tpinpluginteststep.h"
-#include <authserver/authplugininterface.h>
-#include <test/testexecutelog.h>
-#include <ecom/ecom.h>
-#include <ecom/implementationinformation.h>
-#include <s32file.h>
-#include <authserver/auth_srv_errs.h>
-#include <authserver/authpatchdata.h>
-#include <u32hal.h>
-#include <e32svr.h>
- 
-using namespace AuthServer;
-
-_LIT(KTrainSuccess,   	"TrainingSuccess");
-_LIT(KReTrainSuccess, 	"ReTrainingSuccess");
-_LIT(KIdentifySuccess,	"IdentifySuccess");
-_LIT(KIdentifyFailure,  "IdentifyFailure");
-
-_LIT(KSuccess,   	"Success");
-_LIT(KFailure,   	"Failure");
-_LIT(KDialogCancel, "Cancel");
-_LIT(KDialogQuit, 	"Quit");
-_LIT(KServerCancel, "ServerCancel");
-
-_LIT(KInputFile, 	"C:\\t_pinplugindlg_in.dat");
-_LIT(KOutputFile, 	"C:\\t_pinplugindlg_out.dat");
-
-const TPluginId KPinPluginImplementationUid = 0x200032E5;
-const TUint32 KEntropy = 10000;
-const TUint32 KFalsePositiveRate = 0;
-const TUint32 KFalseNegativeRate = 0;
-const TBool KActive = ETrue;
-const TAuthPluginType KPluginType = EAuthKnowledge;
-
-_LIT(KPluginName, "PinPlugin");
-_LIT(KPluginDesc, "Pinplugin authenticates device holder using PIN numbers generated from 0-9 digits");
-
-TInt CPinPluginTestActive::KAuthenticationServerStackSize=0x2000;
-TInt CPinPluginTestActive::KAuthenticationServerInitHeapSize=0x1000;
-TInt CPinPluginTestActive::KAuthenticationServerMaxHeapSize=0x1000000;
-
-CPinPluginTestActive* CPinPluginTestActive::NewL(CTestExecuteLogger& aLogger, AuthServer::TIdentityId& aIdentityId, TPtrC& aPinProcessType, CPinPluginTestStep &aTestStep)
-	{
-	CPinPluginTestActive* pinPlugin = new (ELeave) CPinPluginTestActive(aLogger, aIdentityId, aPinProcessType, aTestStep);
-	pinPlugin->ContructL();
-	return pinPlugin;
-	}
-
-void CPinPluginTestActive::ContructL()
-	{
-	User::LeaveIfError(iFs.Connect());
-	}
-
-CPinPluginTestActive::CPinPluginTestActive(CTestExecuteLogger& aLogger, TIdentityId& aIdentityId,TPtrC& aPinProcessType, CPinPluginTestStep &aTestStep) 
-	:CActive(EPriorityStandard), 
-	iLogger(aLogger), 
-	iOperation(EPinPluginInfo),
-	iIdentityId(aIdentityId),
-	iPinProcessType(aPinProcessType),
-    iTestStep(aTestStep)
-	{
-	CActiveScheduler::Add( this );
-	}
-
-CPinPluginTestActive::~CPinPluginTestActive()
-	{
-	Cancel();
-	iFs.Close();
-	if (iPinPlugin)
-		{
-		REComSession::DestroyedImplementation(iDtor_ID_Key);
-		delete iPinPlugin;
-		}
-	REComSession::FinalClose();
-	}
-
-	
-void CPinPluginTestActive::RunL()
-	{
-        iTestStep.SetTestStepError(iStatus.Int()); 
-    	CActiveScheduler::Stop();
-	return;
-	}
-	
-TVerdict CPinPluginTestActive::DoTestPropertyL()
-	{
-	TBool res = ETrue; 
-
-__UHEAP_MARK;		// Check for memory leaks
-		
-	iPinPlugin = LoadPluginL();
-	if (iPinPlugin != NULL)
-		{
-		if(iPinPlugin->Id() != KPinPluginImplementationUid)
-			res = EFalse;
-		if(iPinPlugin->Name().CompareF(KPluginName) != 0)
-			res = EFalse;
-		if(iPinPlugin->Description().CompareF(KPluginDesc) != 0)
-			res = EFalse;
-		if(iPinPlugin->Type() != KPluginType)
-			res = EFalse;
-		if(iPinPlugin->MinEntropy() != KEntropy)
-			res = EFalse;
-		if(iPinPlugin->FalsePositiveRate() != KFalsePositiveRate)
-			res = EFalse;
-		if(iPinPlugin->FalseNegativeRate() != KFalseNegativeRate)
-			res = EFalse;
-		if(iPinPlugin->IsActive() != KActive)
-			res = EFalse;
-
-		INFO_PRINTF2(_L("ID			 : 0x%x"), iPinPlugin->Id());
-	    INFO_PRINTF2(_L("Name		 : %S"), &iPinPlugin->Name());
-	    INFO_PRINTF2(_L("Description	 : %S"), &iPinPlugin->Description());
-	    INFO_PRINTF2(_L("MinEntropy		 : %d"), iPinPlugin->MinEntropy());
-	    INFO_PRINTF2(_L("False Positive Rate : %d"), iPinPlugin->FalsePositiveRate());
-	    INFO_PRINTF2(_L("False Negative Rate : %d"), iPinPlugin->FalseNegativeRate());
-	    _LIT(KETrue, "ETrue");
-		_LIT(KEFalse, "EFalse");
-	    INFO_PRINTF2(_L("IsActive   	 : %S"), iPinPlugin->IsActive() ? &KETrue : &KEFalse);
-	    switch(iPinPlugin->Type())
-	    	{
-	    	case EAuthDefault:
-	    		INFO_PRINTF1(_L("Type       	 : EAuthDefault"));
-	    		break;
-	    	case EAuthBiometric:
-	    		INFO_PRINTF1(_L("Type       	 : EAuthBiometric"));
-	    		break;
-	    	case EAuthKnowledge:
-	    		INFO_PRINTF1(_L("Type       	 : EAuthKnowledge"));
-	    		break;
-	    	case EAuthToken:
-	    		INFO_PRINTF1(_L("Type       	 : EAuthToken"));
-	    		break;
-	    	case EAuthPerformance:
-	    		INFO_PRINTF1(_L("Type       	 : EAuthPerformance"));
-	    		break;
-	    	default:
-	    		INFO_PRINTF1(_L("Invalid Type"));
-	    	}
-		}
-	else
-		{
-		iLogInfo.Copy( _L("Cannot Load PinPlugin") );
-		return EFail;
-		}
-	UnLoadPlugin();
-	
-__UHEAP_MARKEND;
-
-	if (!res)
-		{
-		INFO_PRINTF1(_L("PinPlugin returns Unexpected Values"));
-		return EFail;
-		}
-	return EPass;
-	}
-
-TVerdict CPinPluginTestActive::DoTestDefaultDataL()
-	{
-	TBool res = ETrue;
-	
-__UHEAP_MARK;		// Check for memory leaks
-		
-	iPinPlugin = LoadPluginL();
-	if (iPinPlugin != NULL)
-		{
-		HBufC8* result = NULL;
-		TInt err = iPinPlugin->DefaultData(iIdentityId, result);
-		if(result != NULL)
-			{
-			delete result;
-			}
-		if (err != KErrNone)
-			{
-			if (err == KErrNoMemory)
-				{
-				User::Leave(err);
-				}
-			res = EFalse;
-			INFO_PRINTF3(_L("Err :%d while receiving the default data for the identity : %d"), err, iIdentityId);
-			}
-		else
-			{
-			_LIT(KPinValue, "11111");
-			iPinValue.Copy(KPinValue);
-			INFO_PRINTF2(_L("Requesting Identify the Identity : %d with the default pin"), iIdentityId);
-			TIdentityId identityId = iIdentityId;
-			PreferDialogInputL(KIdentifySuccess, EPinPluginIdentify, 1);
-			res = DoIdentifyL(result);
-			if(result != NULL)
-				{
-				INFO_PRINTF2(_L("The Identity : %d is Successfully identified"), iIdentityId);
-				delete result;
-				}
-			else
-				{
-				INFO_PRINTF2(_L("IdentityId : %d is not identified"), identityId);
-				}
-			}
-		}
-	else
-		{
-		iLogInfo.Copy( _L("Cannot Load PinPlugin") );
-		return EFail;
-		}
-	UnLoadPlugin();
-	
-__UHEAP_MARKEND;
-
-	return ReturnResultL(res);
-	}
-
-TVerdict CPinPluginTestActive::DoTestIdentifyL()
-	{ 
-	if(!ReadDetailsFromIni(iTestStep))
-		{
-		return EFail;
-		}
-	PreferDialogInputL(iExpectedOutput, EPinPluginIdentify, iDialogNumber);
-	TBool res = ETrue;
-
-__UHEAP_MARK;		// Check for memory leaks
-		
-	TIdentityId identityId = iIdentityId;
-	iPinPlugin = LoadPluginL();
-	if (iPinPlugin != NULL)
-		{
-		HBufC8* result = NULL;
-		INFO_PRINTF2(_L("Requesting Identify the Identity : %d"), iIdentityId);
-		res = DoIdentifyL(result);
-		if(result != NULL)
-			{
-			INFO_PRINTF2(_L("The Identity : %d is Successfully identified"), iIdentityId);
-			delete result;
-			}
-		else
-			{
-			INFO_PRINTF2(_L("IdentityId : %d is not identified"), identityId);
-			}
-		}
-	else
-		{
-		iLogInfo.Copy( _L("Cannot Load PinPlugin") );
-		return EFail;
-		}
-	UnLoadPlugin();
-__UHEAP_MARKEND;
-	
-	return ReturnResultL(res);
-	}
-	
-TVerdict CPinPluginTestActive::DoTestTrainL()
-	{
-	if(!ReadDetailsFromIni(iTestStep))
-		{
-		return EFail;
-		}
-	PreferDialogInputL(iExpectedOutput, EPinPluginTraining, iDialogNumber);
-	TBool res = ETrue;
-	
-__UHEAP_MARK;		// Check for memory leaks
-		
-	iPinPlugin = LoadPluginL();
-	if (iPinPlugin != NULL)
-		{
-		INFO_PRINTF2(_L("Requesting Train the Identity : %d"), iIdentityId);
-		res = TrainIdentifyL();
-		}
-	else
-		{
-		iLogInfo.Copy( _L("Cannot Load PinPlugin") );
-		return EFail;
-		}
-	UnLoadPlugin();
-	
-__UHEAP_MARKEND;
-	
-	return ReturnResultL(res);
-	}
-
-TVerdict CPinPluginTestActive::DoTestForgetL()
-	{
-	if(!ReadDetailsFromIni(iTestStep))
-		{
-		return EFail;
-		}
-
-	TBool res = ETrue;
-
-__UHEAP_MARK;		// Check for memory leaks
-		
-	iPinPlugin = LoadPluginL();
-	if (iPinPlugin != NULL)
-		{
-		ForgetIdentifyL();
-		}
-	else
-		{
-		iLogInfo.Copy( _L("Cannot Load PinPlugin") );
-		return EFail;
-		}
-	UnLoadPlugin();
-__UHEAP_MARKEND;
-
-	return ReturnResultL(res);
-	}
-
-void CPinPluginTestActive::DoCancel() 
-	{ 
-	iPinPlugin->Cancel();
-	}
-
-TVerdict CPinPluginTestActive::DoTestReTrainL()
-	{
-	if(!ReadDetailsFromIni(iTestStep))
-		{
-		return EFail;
-		}
-
-	TInt dialogno = iDialogNumber;
-	TBool DialogCancel = EFalse;
-	if (iExpectedOutput.CompareF(KDialogCancel) == 0
-		|| iExpectedOutput.CompareF(KDialogQuit) == 0)
-		{
-		DialogCancel = ETrue;
-		}
-	PreferDialogInputL(KTrainSuccess, EPinPluginTraining, 1);
-	TBool res = ETrue;
-
-__UHEAP_MARK;		// Check for memory leaks
-	TIdentityId identityId = iIdentityId;
-	iPinPlugin = LoadPluginL();
-	if (iPinPlugin != NULL)
-		{
-		INFO_PRINTF2(_L("Requesting Train the Identity : %d"), iIdentityId);
-		res = TrainIdentifyL();
-		if (res)
-			{
-			iTempPinValue.Copy(iPinValue);
-			if (DialogCancel)
-				{
-				PreferDialogInputL(KDialogCancel, EPinPluginTraining, dialogno);
-				}
-			else
-				{
-				PreferDialogInputL(KReTrainSuccess, EPinPluginTraining, dialogno);		
-				}
-			INFO_PRINTF2(_L("Requesting ReTrain the Identity : %d"), iIdentityId);
-			res = TrainIdentifyL();
-			if (res)
-				{
-				iPinValue.Copy(iTempPinValue);
-				iIdentityId = identityId;
-				if (DialogCancel)
-					{
-					PreferDialogInputL(KIdentifySuccess, EPinPluginIdentify, dialogno);	
-					}
-				else
-					{
-					PreferDialogInputL(KIdentifyFailure, EPinPluginIdentify, 3);		
-					}		
-				HBufC8* result = NULL;
-				HBufC* pinVal = HBufC::NewLC(iPinValue.Length());
-			   	pinVal->Des().Copy(iPinValue);
-				INFO_PRINTF3(_L("Requesting Identify the Identity : %d with the pin : %S"), iIdentityId, pinVal);
-				CleanupStack::PopAndDestroy(pinVal);
-				res = DoIdentifyL(result);
-				if(result != NULL)
-					{
-					INFO_PRINTF2(_L("The Identity : %d is Successfully identified"), iIdentityId);
-					delete result;
-					}
-				else
-					{
-					INFO_PRINTF2(_L("IdentityId : %d is not identified"), identityId);
-					}
-				}
-			}
-		}
-	else
-		{
-		iLogInfo.Copy( _L("Cannot Load PinPlugin") );
-		return EFail;
-		}
-	UnLoadPlugin();
-__UHEAP_MARKEND;
-	
-	return ReturnResultL(res);
-	}
-	
-TVerdict CPinPluginTestActive::DoTestServerCancelL()
-	{
-	if(!ReadDetailsFromIni(iTestStep))
-		{
-		return EFail;
-		}
-	PreferDialogInputL(iExpectedOutput, EPinPluginTraining, 1);
-	
-	TBool res = ETrue;
-	
-__UHEAP_MARK;		// Check for memory leaks
-	TIdentityId identityId = iIdentityId;
-	iPinPlugin = LoadPluginL();
-	if (iPinPlugin != NULL)
-		{
-		if (iPinProcessType.CompareF(KReTrainServerCancel) == 0)
-			{
-			INFO_PRINTF2(_L("Requesting Train the Identity : %d"), iIdentityId);
-			res = TrainIdentifyL();
-			}
-		HBufC8* result = NULL;
-		if (iPinProcessType.CompareF(KTrainServerCancel) == 0
-			|| iPinProcessType.CompareF(KReTrainServerCancel) == 0)
-			{
-			iTempPinValue.Copy(iPinValue);
-			INFO_PRINTF2(_L("Requesting Train the Identity : %d"), iIdentityId);
-			iPinPlugin->Train(iIdentityId, result, iStatus);
-			SetActive();
-			}
-		else if (iPinProcessType.CompareF(KIdentifyServerCancel) == 0)
-			{
-			INFO_PRINTF2(_L("Identify the Identity : %d"), iIdentityId);
-			iPinPlugin->Identify(iIdentityId, KNullDesC(), result, iStatus);
-			SetActive();
-			}
-
-		INFO_PRINTF1(_L("Cancel the process from the Authentication Server"));
-
-		Cancel();
-		
-		if(iStatus.Int() != -3)
-			{
-			res = EFalse;
-			}
-		if (res && iPinProcessType.CompareF(KIdentifyServerCancel) != 0)
-			{
-			iIdentityId = identityId;
-			if (iPinProcessType.CompareF(KTrainServerCancel) == 0)
-				{
-				_LIT(KPinValue, "123456");
-				iPinValue.Copy(KPinValue);
-				PreferDialogInputL(KIdentifyFailure, EPinPluginIdentify, 3);	
-				}
-			else
-				{
-				iPinValue.Copy(iTempPinValue);
-				PreferDialogInputL(KIdentifySuccess, EPinPluginIdentify, 1);		
-				}		
-			HBufC8* result = NULL;
-			HBufC* pinVal = HBufC::NewLC(iPinValue.Length());
-		   	pinVal->Des().Copy(iPinValue);
-			INFO_PRINTF3(_L("Requesting Identify the Identity : %d with the pin : %S"), iIdentityId, pinVal);
-			CleanupStack::PopAndDestroy(pinVal);
-			res = DoIdentifyL(result);
-			if(result != NULL)
-				{
-				INFO_PRINTF2(_L("The Identity : %d is Successfully identified"), iIdentityId);
-				delete result;
-				}
-			else
-				{
-				INFO_PRINTF2(_L("IdentityId : %d is not identified"), identityId);
-				}
-			}
-		}
-	else
-		{
-		iLogInfo.Copy( _L("Cannot Load PinPlugin") );
-		return EFail;
-		}
-	UnLoadPlugin();
-
-__UHEAP_MARKEND;
-	
-	return ReturnResultL(res);
-	}
-	
-TVerdict CPinPluginTestActive::DoTestSequenceL()
-	{
-	PreferDialogInputL(KTrainSuccess, EPinPluginTraining, 1);
-	
-	TBool res = ETrue;
-	
-__UHEAP_MARK;		// Check for memory leaks
-		
-	iPinPlugin = LoadPluginL();
-	if (iPinPlugin != NULL)
-		{
-		INFO_PRINTF2(_L("Requesting Train the Identity : %d"), iIdentityId);
-		res = TrainIdentifyL();
-		if (res)
-			{
-			PreferDialogInputL(KReTrainSuccess, EPinPluginTraining, 1);
-			INFO_PRINTF2(_L("Requesting ReTrain the Identity : %d"), iIdentityId);
-			HBufC8* result = NULL;
-			res = DoTrainL(result);
-			if (result != NULL)
-				{
-				delete result;
-				}
-			if (res)
-				{
-				TIdentityId id = iIdentityId;
-				res = ForgetIdentifyL();
-				if(res)
-					{
-					for (TInt i = 0; i <= 2; i++)
-						{
-						iIdentityId = id;
-						INFO_PRINTF2(_L("Requesting Train the Identity : %d"), iIdentityId);
-						if (i==2)
-							{
-							PreferDialogInputL(KTrainSuccess, EPinPluginTraining, 1);
-							}
-						else
-							{
-							iInfoMsg = EPinPluginTrainingSuccess;
-							PreferDialogInputL(KDialogCancel, EPinPluginTraining, 1);
-							}
-						res = TrainIdentifyL();
-						if (!res)
-							{
-							break;
-							}
-						}
-					}
-				}
-			}
-		}
-	else
-		{
-		iLogInfo.Copy( _L("Cannot Load PinPlugin") );
-		return EFail;
-		}
-	UnLoadPlugin();
-
-__UHEAP_MARKEND;
-	
-	return ReturnResultL(res);
-	}
-	
-TVerdict CPinPluginTestActive::DoTestOomL()
-	{
- 	if(!iTestStep.GetIntFromConfig(iTestStep.ConfigSection(), _L("oomtest"), iOomTest))
-   		{
-   		INFO_PRINTF1(_L("Test about which function is needed"));
-   		return EFail;
-   		}
-	__UHEAP_MARK;
-		TIdentityId id = 1234;
-		HBufC8* result = NULL;
-	switch(iOomTest)
-		{
-		case 1:
-			{
-			iPinPlugin = LoadPluginL();
-			UnLoadPlugin();
-			}
-			break;
-		case 2:
-			{
-			iPinPlugin = LoadPluginL();
-			TInt err = iPinPlugin->DefaultData(id, result);
-			CleanupStack::PushL(result);
-			if (err == KErrNoMemory)
-				{
-				User::Leave(err);
-				}
-			err = iPinPlugin->Forget(id);
-			if (err == KErrNoMemory)
-				{
-				User::Leave(err);
-				}
-			CleanupStack::PopAndDestroy(result);
-			UnLoadPlugin();
-			}
-			break;
-		case 3:
-			{
-			iPinPlugin = LoadPluginL();
-			iStatus = KRequestPending;
-			_LIT(KPinValue, "11111");
-			iPinValue.Copy(KPinValue);
-			PreferDialogInputL(KIdentifySuccess, EPinPluginIdentify, 1);
-			iPinPlugin->Identify(id, KNullDesC(), result, iStatus);
-			CleanupStack::PushL(result);
-			SetActive();
-			CActiveScheduler::Start();
-			CleanupStack::PopAndDestroy(result);
-			UnLoadPlugin();
-			}
-			break;
-		case 4:
-			{
-			iPinPlugin = LoadPluginL();
-			iStatus = KRequestPending;
-			PreferDialogInputL(KTrainSuccess, EPinPluginTraining, 1);
-			iPinPlugin->Train(id, result, iStatus);
-			SetActive();
-			CActiveScheduler::Start();
-			if (result != NULL)
-				{
-				delete result;
-				}
-			TInt err = iPinPlugin->Forget(id);
-			if (err == KErrNoMemory)
-				{
-				User::Leave(err);
-				}
-			UnLoadPlugin();
-			}
-			break;
-		case 5:
-			{
-			iPinPlugin = LoadPluginL();
-			iStatus = KRequestPending;
-			PreferDialogInputL(KTrainSuccess, EPinPluginTraining, 1);
-			iPinPlugin->Train(id, result, iStatus);
-			SetActive();
-			CActiveScheduler::Start();
-			if (result != NULL)
-				{
-				delete result;
-				}
-			UnLoadPlugin();
-			}
-			break;
-		case 6:
-			{
-			iPinPlugin = LoadPluginL();
-			TInt err = iPinPlugin->Forget(id);
-			if (err == KErrNoMemory)
-				{
-				User::Leave(err);
-				}
-			UnLoadPlugin();
-			}
-			break;
-		}
-
-	__UHEAP_MARKEND;
- 	return EPass;
-	}
-
-CPinPlugin* CPinPluginTestActive::LoadPluginL()
-	{
-	 TEComResolverParams resolverParams;
-	  TBufC8<16> pluginIdTxt;
-	  
-	  pluginIdTxt.Des().Format(_L8("%x"), KPinPluginImplementationUid);
-	  pluginIdTxt.Des().UpperCase();
-	  resolverParams.SetDataType(pluginIdTxt);
-	  
-	  //To load plugins from sources other than ROM the patch 
-	  // data KEnablePostMarketAuthenticationPlugins must be set to True.
-	  TUint32 enablePostMarketPlugin = KEnablePostMarketAuthenticationPlugins;
-
-	#ifdef __WINS__
-
-	  // Default SymbianOS behavior is to only load auth plugins from ROM.
-	  enablePostMarketPlugin = 0;
-
-	  // For the emulator allow the constant to be patched via epoc.ini
-	  UserSvr::HalFunction(EHalGroupEmulator, EEmulatorHalIntProperty,
-	  (TAny*)"KEnablePostMarketAuthenticationPlugins", &enablePostMarketPlugin); // read emulator property (if present)
-
-	#endif
-
-	  TAny* plugin = 0;
-	  TInt err = 0;
-	  
-	  if(enablePostMarketPlugin == 0) 
-	  	{
-	  	TRAP(err, plugin = 
-		REComSession::CreateImplementationL(KCAuthPluginInterfaceUid,
-											iDtor_ID_Key,
-											resolverParams,
-											KRomOnlyResolverUid));
-	  	}
-	  
-	  else
-	  	{
-	  	TRAP(err, plugin = 
-		REComSession::CreateImplementationL(KCAuthPluginInterfaceUid,
-											iDtor_ID_Key,
-											resolverParams));
-	  	}
-	  
-	 if (err == KErrNotFound)
-	    {
-	    err = KErrAuthServNoSuchPlugin;  
-	    }
-	  User::LeaveIfError(err);
-	    
-	  return reinterpret_cast<CPinPlugin*>(plugin);
-	
-	}
-
-void CPinPluginTestActive::UnLoadPlugin()
-	{
-	delete iPinPlugin;
-	iPinPlugin = NULL;
-	REComSession::DestroyedImplementation(iDtor_ID_Key);
-	REComSession::FinalClose();
-	}
-	
-TVerdict CPinPluginTestActive::ReturnResultL(TBool aRes)
-	{
-	TVerdict result = EPass;
-	DeleteFileL();
-	if (!aRes)
-		{
-		result = EFail;
-		}
-	return result;
-	}
-	
-TBool CPinPluginTestActive::TrainIdentifyL()
-	{
-	TBool res = ETrue;
-
-	HBufC8* result = NULL;
-	res = DoTrainL(result);
-	if (res)
-		{
-		HBufC* pinVal = HBufC::NewLC(iPinValue.Length());
-	   	pinVal->Des().Copy(iPinValue);
-		INFO_PRINTF3(_L("Identify the Identity : %d using pin : %S"), iIdentityId, pinVal);
-		HBufC8* result1 = NULL;
-		TIdentityId identityId = iIdentityId;
-		res = DoIdentifyL(result1);
-		if(res && result1 != NULL)
-			{
-			if (result->Des().CompareF(result1->Des()) != 0)
-				{
-				INFO_PRINTF1( _L("Trained result is different from identification result"));
-				res = EFalse;
-				}
-			else
-				{
-				INFO_PRINTF3(_L("The Identity : %d is Successfully identified with pin : %S"), iIdentityId, pinVal);
-				}
-			delete result1;
-			}
-		else
-			{
-			INFO_PRINTF2(_L("The Identity %d is not trained"), identityId);
-			}
-		CleanupStack::PopAndDestroy(pinVal);
-		}
-	if(result != NULL)
-		{
-		delete result;
-		}
-		
-	return res;
-	}
-
-TBool CPinPluginTestActive::ForgetIdentifyL()
-	{
-	INFO_PRINTF2(_L("Requesting Forget the Identity : %d"), iIdentityId);
-	TInt err = iPinPlugin->Forget(iIdentityId);
-	
-	TBool res = CheckResultL(err);
-	if (res)
-		{
-		INFO_PRINTF2(_L("IdentityId :%d is successfully removed"), iIdentityId);
-		INFO_PRINTF1(_L("Verify using Identify Process"));	
-		HBufC8* result = NULL;
-		res = DoIdentifyL(result);
-		if(res && result != NULL)
-			{
-			INFO_PRINTF2(_L("The Identity : %d is Successfully identified"), iIdentityId);
-			delete result;
-			}
-		}
-	return res;	
-	}
-	
-TBool CPinPluginTestActive::DoTrainL(HBufC8*& aResult)
-	{
-	TBool res = ETrue;
-	iStatus = KRequestPending;
-	
-	iPinPlugin->Train(iIdentityId, aResult, iStatus);
-	SetActive();
-	CActiveScheduler::Start();
-		
-	res = VerifyResultL(iStatus.Int());
-	return res;
-	}
-	
-TBool CPinPluginTestActive::DoIdentifyL(HBufC8*& aResult)
-	{
-	TBool res = ETrue;
-		
-	iPinPlugin->Identify(iIdentityId, KNullDesC(), aResult, iStatus);
-	if(!IsActive())
-		SetActive();
-	CActiveScheduler::Start();
-	
-	res = VerifyResultL(iStatus.Int());
-	return res;
-	}
-	
-TBool CPinPluginTestActive::VerifyResultL(TInt aOutputVal)
-	{
-	TBool result = ETrue;
-	
-	if ((iExpectedOutput.CompareF(KDialogCancel) == 0)
-		&& (aOutputVal != KErrAuthServPluginCancelled))
-		{
-		INFO_PRINTF1(_L("RequestStatus is not completed with expected result"));
-		result = EFalse;
-		}
-	else if ((iExpectedOutput.CompareF(KDialogQuit) == 0)
-		&& (aOutputVal != KErrAuthServPluginQuit))
-		{
-		INFO_PRINTF1(_L("RequestStatus is not completed with expected result"));
-		result = EFalse;
-		}
-	else if ((iExpectedOutput.CompareF(KTrainSuccess) == 0)
-		&& (aOutputVal == KErrAuthServRegistrationFailed))
-		{
-		INFO_PRINTF2(_L("Authserver registration failed. Returned error code = %d"), aOutputVal);
-		result = EFalse;
-		}	
-	else if ((iExpectedOutput.CompareF(KDialogCancel) != 0)
-			&& (iExpectedOutput.CompareF(KDialogQuit) != 0)
-			&& (iExpectedOutput.CompareF(KServerCancel) != 0)
-			&& (aOutputVal != KErrNone))
-		{
-		INFO_PRINTF1(_L("RequestStatus is not completed with expected result"));
-		result = EFalse;
-		}
-	if (result && aOutputVal == KErrNone)
-		{
-		TInt dialogNumber;
-		TPinValue pinValue;
-		TPinPluginInfoMessage displayedMsg;
-		ReadOutputDetailsL(dialogNumber, pinValue, displayedMsg);
-		TPtrC message;
-		switch(displayedMsg)
-	    	{
-	    	case EPinPluginTrainingSuccess:
-	    		message.Set(_L("EPinPluginTrainingSuccess"));
-	    		break;
-	    	case EPinPluginReTrainingSuccess:
-	    		message.Set(_L("EPinPluginReTrainingSuccess"));
-	    		break;
-	    	case EPinPluginIdentificationSuccess:
-	    		message.Set(_L("EPinPluginIdentificationSuccess"));	  
-	    		break;
-	    	case EPinPluginIdentificationFailure:
-	    		message.Set(_L("EPinPluginIdentificationFailure"));
-	    		break;
-	    	}
-		if(displayedMsg != iInfoMsg)
-			{
-			INFO_PRINTF2(_L("INFO :%S which is not expected"), &message);
-			result = EFalse;
-			}
-		if (iCmdResult == EOk && dialogNumber != iDialogNumber)
-			{
-			INFO_PRINTF3(_L("Number of dialog displayed : %d differ from expected dialog: %d."), dialogNumber,iDialogNumber);
-			result = EFalse;
-			}
-		if (displayedMsg == EPinPluginIdentificationFailure
-			&& dialogNumber == 0)
-			{
-			INFO_PRINTF2(_L("INFO :%S because IdentityId is not available in the DB"), &message);
-			}
-		if (displayedMsg == EPinPluginIdentificationFailure
-			&& dialogNumber == 3)
-			{
-			INFO_PRINTF2(_L("INFO :%S because wrong pin input for all retries and IdentityId exists in the DB"), &message);
-			}
-		if (displayedMsg == EPinPluginIdentificationFailure
-			&& iIdentityId != KUnknownIdentity)
-			{
-			INFO_PRINTF2(_L("IdentityId was not reset for %S"), &message);
-			}
-		if (displayedMsg != EPinPluginIdentificationSuccess
-			&& displayedMsg != EPinPluginIdentificationFailure)
-			{
-			iPinValue.Copy(pinValue);
-			if (iInfoMsg == EPinPluginTrainingSuccess 
-				|| iInfoMsg == EPinPluginReTrainingSuccess)
-				{
-				HBufC* pinVal = HBufC::NewLC(pinValue.Length());
-			   	pinVal->Des().Copy(pinValue);
-				INFO_PRINTF3(_L("The Identity %d is trained with pin number %S"), iIdentityId, pinVal);
-				CleanupStack::PopAndDestroy(pinVal);
-				PreferDialogInputL(KIdentifySuccess, EPinPluginIdentify, 1);
-				}
-			else
-				{
-				PreferDialogInputL(KIdentifyFailure, EPinPluginIdentify, 0);
-				}
-			}
-		}
-	if(aOutputVal != KErrNone)
-		{
-		if (aOutputVal == KErrAuthServPluginCancelled)
-			{
-			INFO_PRINTF1(_L("Cancel the process from the Dialog Notifier"));	
-			}
-		else if (aOutputVal == KErrAuthServPluginQuit)
-			{
-			INFO_PRINTF1(_L("Quit the process from the Dialog Notifier"));	
-			}
-		CheckResultL(aOutputVal);
-		}
-	return result;
-	}
-	
-TBool CPinPluginTestActive::CheckResultL(TInt aResult)
-	{
-	_LIT(KPinValue, "123456");
-	if (iExpectedOutput.CompareF(KSuccess) == 0
-		&& aResult == KErrAuthServNoSuchIdentity)
-		{
-		INFO_PRINTF2(_L("IdentityId : %d is not identified when should be"), iIdentityId);
-		return EFalse;
-		}
-	else if(iExpectedOutput.CompareF(KFailure) == 0
-		&& aResult == KErrNone)
-		{
-		INFO_PRINTF2(_L(" IdentityId : %d is identified when should not be"), iIdentityId);
-		return EFalse;
-		}
-	iPinValue.Copy(KPinValue);
-	PreferDialogInputL(KIdentifyFailure, EPinPluginIdentify, 3);
-	return ETrue;
-	}
-	
-TBool CPinPluginTestActive::ReadDetailsFromIni(CPinPluginTestStep& aStep)
-	{
-	TPtrC pinVal;
-	if(!aStep.GetStringFromConfig(aStep.ConfigSection(), _L("expectedoutput"), iExpectedOutput))
-		{
-		INFO_PRINTF1(_L("expectedoutput value is missing"));
-		return EFalse;
-		}
-	// Optional input, if the input is not available by default the iIndex is set to 0.
-	if(!aStep.GetIntFromConfig(aStep.ConfigSection(), _L("selectindex"), iIndex))
-		{
-		iIndex = 0;
-		}
-	// optional input, if not pinplugin use the default pinlength from the config file.
-	aStep.GetIntFromConfig(aStep.ConfigSection(), _L("newpinlength"), iNewPinLength);
-
-	// optional input, 
-	aStep.GetStringFromConfig(aStep.ConfigSection(), _L("pinvalue"), pinVal);
-	iPinValue.Copy(pinVal);
-
-	// Optional input, if the input is not available by default the resultant output cmd will given
-	// in the dialog No 1.
-	if(!aStep.GetIntFromConfig(aStep.ConfigSection(), _L("outputatdialog"), iDialogNumber))
-		{
-		if (iExpectedOutput.CompareF(KIdentifyFailure) == 0)
-			{
-			iDialogNumber = 3;
-			}
-		else
-			{
-			iDialogNumber = 1;
-			}
-		}
-	return ETrue;
-	}
-	
-void CPinPluginTestActive::PreferDialogInputL(const TDesC& aExpectedOutput,
-			TPinPluginDialogOperation aOp, TInt aDialogNo)
-	{
-	// iPinValue, iIndex, iNewPinLength is not changing for every operation. if
-	// any changes occurs , we have to reset just before calling this function.
-	iOperation = aOp;
-	iDialogNumber = aDialogNo;
-	iExpectedOutput.Set(aExpectedOutput);
-		
-	if (aExpectedOutput.CompareF(KTrainSuccess) == 0)
-		{
-		iInfoMsg = EPinPluginTrainingSuccess;
-		}
-	else if (aExpectedOutput.CompareF(KReTrainSuccess) == 0)
-		{
-		iInfoMsg = EPinPluginReTrainingSuccess;
-		}
-	else if (aExpectedOutput.CompareF(KIdentifySuccess) == 0)
-		{
-		iInfoMsg = EPinPluginIdentificationSuccess;
-		}
-	else if (aExpectedOutput.CompareF(KIdentifyFailure) == 0)
-		{
-		iInfoMsg = EPinPluginIdentificationFailure;
-		}
-
-	if (aExpectedOutput.CompareF(KDialogCancel) == 0)
-		{
-		iCmdResult = iCmdFinalResult = ECancel;
-		}
-	else if (aExpectedOutput.CompareF(KDialogQuit) == 0)
-		{
-		iCmdResult = iCmdFinalResult = EQuit;
-		}
-	else 
-		{
-		iCmdResult = iCmdFinalResult = EOk;
-		}
-		
-	if (iDialogNumber > 1 && 
-	   	aExpectedOutput.CompareF(KIdentifyFailure) != 0 &&
-		aExpectedOutput.CompareF(KIdentifySuccess) != 0)
-		{
-		iCmdResult = ENext;
-		}
-	DeleteFileL();
-	WriteOutputDetailsL();
-	}
-	
-void CPinPluginTestActive::WriteOutputDetailsL()
-	{
-	RFileWriteStream stream;
-	TInt err = stream.Create(iFs, KInputFile, EFileWrite | EFileShareExclusive);
-	User::LeaveIfError(err);
-	stream.PushL();
-
-	MStreamBuf* streamBuf = stream.Sink();
-	streamBuf->SeekL(MStreamBuf::EWrite, EStreamEnd);
-	stream.WriteInt32L(iOperation);
-	stream.WriteInt32L(iPinValue.Length());
-	stream.WriteL(iPinValue);
-	stream.WriteInt32L(iIndex);
-	stream.WriteInt32L(iNewPinLength);
-	stream.WriteInt32L(iCmdResult);
-	iOperation = EPinPluginInfo;
-	stream.WriteInt32L(iOperation);
-	stream.WriteInt32L(iCmdFinalResult);
-	stream.WriteInt32L(iDialogNumber);
-	stream.CommitL();
-	CleanupStack::PopAndDestroy(); // stream
-	}
-
-void CPinPluginTestActive::ReadOutputDetailsL(TInt& aDialogNumber, TPinValue& aPinValue, TPinPluginInfoMessage& aDisplayedMsg)
-	{
-	RFileReadStream stream;
-	User::LeaveIfError(stream.Open(iFs, KOutputFile, EFileRead | EFileShareExclusive));
-	stream.PushL();
-
-	MStreamBuf* streamBuf = stream.Source();
-	TPinValue pinvalue;
-	TInt pinValueSize;
-	
-	aDialogNumber = stream.ReadInt32L();
-	
-	pinValueSize = stream.ReadInt32L();
-	HBufC8* pinValueBuf = HBufC8::NewMaxLC(pinValueSize);
-	TPtr8 pinValuePtr(pinValueBuf->Des());
-	stream.ReadL(pinValuePtr, pinValueSize);
-	aPinValue.Copy(pinValuePtr);
-	CleanupStack::PopAndDestroy(1, pinValueBuf);	
-
-	aDisplayedMsg = static_cast<TPinPluginInfoMessage>(stream.ReadInt32L());
-	
-	CleanupStack::PopAndDestroy(&stream); 
-	}
-	
-void CPinPluginTestActive::DeleteFileL()
-	{
-	CFileMan* fileMan = CFileMan::NewL(iFs);
-	CleanupStack::PushL(fileMan);
-	TInt err = fileMan->Delete(KInputFile);
-	if ( err != KErrNotFound && err != KErrNone )
-		{
-		User::LeaveIfError(err);
-		}
-	err = fileMan->Delete(KOutputFile);
-	if (err != KErrNotFound && err != KErrNone )
-		{
-		User::LeaveIfError(err);
-		}
-	CleanupStack::PopAndDestroy(fileMan);	
-	}
-
-
-
-
-
--- a/authenticationservices/authenticationserver/test/reftestplugin/tpinplugin/tpinpluginteststep.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,276 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include "tpinpluginteststep.h"
-#include <test/testexecutelog.h>
-#include <s32file.h>
-
-_LIT(KProperties,   		"Property");
-_LIT(KDefaultData,			"DefaultData");
-_LIT(KIdentify,				"Identify");
-_LIT(KTrain,   				"Train");
-_LIT(KReTrain,   			"ReTrain");
-_LIT(KForget,   			"Forget");
-_LIT(KSequence,   			"Sequence");
-_LIT(KOom,   				"Oom");
-
-_LIT(KInputFile, 	"C:\\t_pinplugindlg_in.dat");
-_LIT(KOutputFile, "C:\\t_pinplugindlg_out.dat");
-
-using namespace AuthServer;
-
-CPinPluginTestStep::~CPinPluginTestStep()
-	{
-	}
-
-CPinPluginTestStep::CPinPluginTestStep()
-	{
-	// Call base class method to set up the human readable name for logging
-	SetTestStepName(KPinPluginTestStep);
-	}
-
-TVerdict CPinPluginTestStep::doTestStepPreambleL()
-	{
-	// get step parameters
-	if (!GetStringFromConfig(ConfigSection(), _L("pinprocesstype"), iPinProcessType))
-		{
-		ERR_PRINTF1(_L("Requested Pin Process Type is missing"));
-		SetTestStepResult(EFail);
-		}
-	else
-		{
-		if (iPinProcessType.CompareF(KProperties) != 0 
-			&& iPinProcessType.CompareF(KOom) != 0)
-			{
-			TInt id  = 0;
-			if (!GetIntFromConfig(ConfigSection(), _L("identityid"), id))
-				{
-				ERR_PRINTF1(_L("Identity Id Value is missing"));
-				SetTestStepResult(EFail);	
-				}
-			else
-				{
-				iIdentityId = TIdentityId(id);
-				SetTestStepResult(EPass);
-				INFO_PRINTF3(_L("\"%S\" the Identity '%d' using PinPlugin System"), &iPinProcessType, id/*iIdentityId*/);
-				}
-			}
-		}
-	return TestStepResult();
-	}
-
-TVerdict CPinPluginTestStep::doTestStepL()
-	{
-	if (TestStepResult() != EPass)
-		{
-		return TestStepResult();
-		}
-
-	CActiveScheduler* sched = NULL;
-	sched = new (ELeave) CActiveScheduler;
-	CleanupStack::PushL(sched);
-	CActiveScheduler::Install(sched);	
-	CPinPluginTestActive* activeObj = CPinPluginTestActive::NewL(Logger(), iIdentityId, iPinProcessType, *this);
-	CleanupStack::PushL(activeObj);
-	
-	if (iPinProcessType.CompareF(KProperties) == 0)
-		{
-		iVerdict = activeObj->DoTestPropertyL();
-		INFO_PRINTF1(activeObj->iLogInfo);
-		}
-	else if (iPinProcessType.CompareF(KDefaultData) == 0)
-		{
-		iVerdict = activeObj->DoTestDefaultDataL();
-		INFO_PRINTF1(activeObj->iLogInfo);
-		}
-	else if (iPinProcessType.CompareF(KIdentify) == 0)
-		{
-		iVerdict = activeObj->DoTestIdentifyL();
-		INFO_PRINTF1(activeObj->iLogInfo);
-		}
-	else if (iPinProcessType.CompareF(KTrain) == 0)
-		{
-		iVerdict = activeObj->DoTestTrainL();
-		INFO_PRINTF1(activeObj->iLogInfo);
-		}
-	else if (iPinProcessType.CompareF(KReTrain) == 0)
-		{
-		iVerdict = activeObj->DoTestReTrainL();
-		INFO_PRINTF1(activeObj->iLogInfo);
-		}
-	else if (iPinProcessType.CompareF(KForget) == 0)
-		{
-		iVerdict = activeObj->DoTestForgetL();
-		INFO_PRINTF1(activeObj->iLogInfo);
-		}
-	else if (iPinProcessType.CompareF(KTrainServerCancel) == 0
-			|| (iPinProcessType.CompareF(KReTrainServerCancel) == 0)
-			|| (iPinProcessType.CompareF(KIdentifyServerCancel) == 0))
-		{
-		iVerdict = activeObj->DoTestServerCancelL();
-		INFO_PRINTF1(activeObj->iLogInfo);
-		}
-	else if (iPinProcessType.CompareF(KSequence) == 0)
-		{
-		iVerdict = activeObj->DoTestSequenceL();
-		INFO_PRINTF1(activeObj->iLogInfo);
-		}
-	else if (iPinProcessType.CompareF(KOom) == 0)
-		{
-		iVerdict = activeObj->DoTestOomL();
-		INFO_PRINTF1(activeObj->iLogInfo);
-		}
-	CleanupStack::PopAndDestroy(2, sched);
-	SetTestStepResult(iVerdict);
-	return TestStepResult();
-	}
-
-TVerdict CPinPluginTestStep::doTestStepPostambleL()
-	{
-	CActiveScheduler::Install(NULL);
-	return TestStepResult();
-	}
-
-CCreateFile::~CCreateFile()
-	{}
-
-CCreateFile::CCreateFile()
-	{
-	// Call base class method to set up the human readable name for logging
-	SetTestStepName(KCreateInputFile);
-	}
-
-TVerdict CCreateFile::doTestStepPreambleL()
-	{
-	TPtrC pinProcessType;
-	// get step parameters
-	if (!GetStringFromConfig(ConfigSection(), _L("pinprocesstype"), pinProcessType))
-		{
-		ERR_PRINTF1(_L("Index not present"));
-		SetTestStepResult(EFail);
-		}
-	else
-		{
-		if (pinProcessType.CompareF(KTrain) == 0)
-			{
-			iOperation = EPinPluginTraining;
-			}
-		else if (pinProcessType.CompareF(KIdentify) == 0)
-			{
-			iOperation = EPinPluginIdentify;
-			}
-		}
-	TPtrC pinValue;
-	if (GetStringFromConfig(ConfigSection(), _L("pinvalue"), pinValue))
-		{
-		if(pinValue == _L("readoutput"))
-			{
-			iPinValue = GetPinFromOutputFileL();
-			}
-		else
-			{
-			iPinValue.Copy(pinValue);
-			}
-		}
-	
-	if (!GetIntFromConfig(ConfigSection(), _L("selectedindex"), iIndex))
-		{
-		ERR_PRINTF1(_L("Index not present"));
-		SetTestStepResult(EFail);
-		}
-	if (!GetIntFromConfig(ConfigSection(), _L("newpinlength"), iNewPinLength))
-		{
-		ERR_PRINTF1(_L("new pin length missing"));
-		SetTestStepResult(EFail);	
-		}
-	if (!GetIntFromConfig(ConfigSection(), _L("outputatdialog"), iDialogNumber))
-		{
-		ERR_PRINTF1(_L("dialog number missing"));
-		SetTestStepResult(EFail);	
-		}
-	
-	return TestStepResult();
-	}
-
-TVerdict CCreateFile::doTestStepL()
-	{
-	if (TestStepResult() != EPass)
-		{
-		return TestStepResult();
-		}
-	
-	RFileWriteStream stream;
-	RFs fs;
-	User::LeaveIfError(fs.Connect());
-	TInt err = stream.Replace(fs, KInputFile, EFileWrite | EFileShareExclusive);
-	User::LeaveIfError(err);
-	stream.PushL();
-	
-	MStreamBuf* streamBuf = stream.Sink();
-	streamBuf->SeekL(MStreamBuf::EWrite, EStreamEnd);
-	stream.WriteInt32L(iOperation);
-	stream.WriteInt32L(iPinValue.Length());
-	stream.WriteL(iPinValue);
-	stream.WriteInt32L(iIndex);
-	stream.WriteInt32L(iNewPinLength);
-	TPinPluginDialogResult cmdResult = EOk;
-	stream.WriteInt32L(cmdResult);
-	iOperation = EPinPluginInfo;
-	stream.WriteInt32L(iOperation);
-	TPinPluginDialogResult cmdFinalResult = EOk;
-	stream.WriteInt32L(cmdFinalResult);
-	stream.WriteInt32L(iDialogNumber);
-	stream.CommitL();
-	CleanupStack::PopAndDestroy(); // stream
-	
-	SetTestStepResult(EPass);
-	return TestStepResult();
-	}
-
-TPinValue CCreateFile::GetPinFromOutputFileL()
-	{
-	RFileReadStream stream;
-	RFs fs;
-	User::LeaveIfError(fs.Connect());
-	User::LeaveIfError(stream.Open(fs, KOutputFile, EFileRead | EFileShareExclusive));
-	stream.PushL();
-
-	TPinValue pinvalue;
-	
-	stream.ReadInt32L();
-	TInt pinValueLength = stream.ReadInt32L();
-	HBufC8* pinValueBuf = HBufC8::NewMaxLC(pinValueLength);
-	TPtr8 pinValuePtr(pinValueBuf->Des());
-	stream.ReadL(pinValuePtr, pinValueLength);
-	pinvalue.Copy(pinValuePtr);
-	
-	CleanupStack::PopAndDestroy(2, &stream);	
-
-	return pinvalue;
-	}
-
-TVerdict CCreateFile::doTestStepPostambleL()
-	{
-	CActiveScheduler::Install(NULL);
-	return TestStepResult();
-	}
-
-
-
-
-
--- a/authenticationservices/authenticationserver/test/reftestplugin/tpinplugin/tpinpluginteststep.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,187 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#ifndef TPINPLUGINTESTSTEP_H
-#define TPINPLUGINTESTSTEP_H
-
-#include <test/TestExecuteStepBase.h>
-#include <authserver/authtypes.h>
-#include <pinplugindialogdefs.h>
-#include <authserver/authplugininterface.h>
-#include "pinplugin.h"
-
-class CPinPluginTestStep : public CTestStep
-	{
-public:
-	/** Constructor */
-	CPinPluginTestStep();
-
-	/** Destructor */
-	~CPinPluginTestStep();
-	
-	/**	
-	 Override of base class virtual
- 	 @return - TVerdict code
-  	 */
-	virtual TVerdict doTestStepPreambleL();
-
-	/**
- 	 Override of base class virtual
- 	 @return - TVerdict code
- 	 */
-	virtual TVerdict doTestStepPostambleL();
-
-	/**
-	 Override of base class pure virtual
- 	 Demonstrates reading configuration parameters fom an ini file section
- 	 @return - TVerdict code
- 	 */
-	virtual TVerdict doTestStepL();
-
-private:
-	TVerdict iVerdict;
-	TPtrC iPinProcessType;
-	AuthServer::TIdentityId iIdentityId;
-	};
-
-class CPinPluginTestActive : public CActive
-	{
-public:
-	static CPinPluginTestActive* NewL(CTestExecuteLogger& aLogger, AuthServer::TIdentityId& aIdentityId, TPtrC& aPinProcessType, CPinPluginTestStep &aTestStep);
-	/** Destructor */
-	~CPinPluginTestActive();
-
-	TVerdict DoTestPropertyL();
-	TVerdict DoTestDefaultDataL();	
-	TVerdict DoTestIdentifyL();
-	TVerdict DoTestTrainL();
-	TVerdict DoTestForgetL();
-	TVerdict DoTestReTrainL();
-	TVerdict DoTestServerCancelL();
-	TVerdict DoTestSequenceL();
-	TVerdict DoTestOomL();	
-		
-	//Active
-	void DoCancel();
-	void RunL();
-	CTestExecuteLogger& Logger(){return iLogger;}
-	//Log buffer
-	TBuf<150> iLogInfo;
-   	CTestExecuteLogger& iLogger;
-
-private:
-	/** Constructor */
-	CPinPluginTestActive(CTestExecuteLogger& aLogger, AuthServer::TIdentityId& aIdentityId, TPtrC& aPinProcessType, CPinPluginTestStep &aTestStep);
-	void ContructL();
-	
-private:
-	void WriteOutputDetailsL();
-	void ReadOutputDetailsL(TInt& aDialogNumber, TPinValue& aPinValue, TPinPluginInfoMessage& aDisplayedMsg);
-	TBool ReadDetailsFromIni(CPinPluginTestStep& aStep);
-	void DeleteFileL();
-	TBool VerifyResultL(TInt aOutputVal);
-	TBool CheckResultL(TInt aResult);
-	TBool TrainIdentifyL();
-	TBool ForgetIdentifyL();
-	TBool DoTrainL(HBufC8*& aResult);
-	TBool DoIdentifyL(HBufC8*& aResult);
-	TBool DoForgetL();
-	CPinPlugin* LoadPluginL();
-	void UnLoadPlugin();
-	TVerdict ReturnResultL(TBool aRes);
-	void PreferDialogInputL(const TDesC& aExpectedOutput, TPinPluginDialogOperation aOp, 
-		TInt aDialogNo);
-private:
-	
-	static TInt KAuthenticationServerStackSize;
-	static TInt KAuthenticationServerInitHeapSize;
-	static TInt KAuthenticationServerMaxHeapSize;
-		
-  	AuthServer::CAuthPluginInterface* iPinPlugin;
-   	RFs iFs;
-	TPinPluginDialogOperation iOperation;
-	TInt iIndex;
-	TInt iNewPinLength;
-	TPinValue iPinValue;
-	TPinValue iTempPinValue;
-	TPtrC iExpectedOutput;
-	TPinPluginDialogResult iCmdResult,iCmdFinalResult;
-	TPinPluginInfoMessage iInfoMsg;
-	TInt iDialogNumber;
-	AuthServer::TIdentityId iIdentityId;
-	TPtrC iPinProcessType;	
-	TInt iOomTest;
-	HBufC* iClientMessage;
-    CPinPluginTestStep &iTestStep;
-	TUid iDtor_ID_Key;
-	};
-
-class CCreateFile : public CTestStep
-	{
-public:
-	/** Constructor */
-	CCreateFile();
-
-	/** Destructor */
-	~CCreateFile();
-	
-	/**	
-	 Override of base class virtual
- 	 @return - TVerdict code
-  	 */
-	virtual TVerdict doTestStepPreambleL();
-
-	/**
- 	 Override of base class virtual
- 	 @return - TVerdict code
- 	 */
-	virtual TVerdict doTestStepPostambleL();
-
-	/**
-	 Override of base class pure virtual
- 	 Demonstrates reading configuration parameters fom an ini file section
- 	 @return - TVerdict code
- 	 */
-	virtual TVerdict doTestStepL();
-
-private:
-	TPinValue GetPinFromOutputFileL();
-
-private:
-	TPinPluginDialogOperation iOperation;
-	TPinValue iPinValue;
-	TInt iIndex;
-	TInt iNewPinLength;
-	TPinPluginDialogResult iCmdResult;
-	TPinPluginDialogResult iCmdFinalResult;
-	TInt iDialogNumber;
-	
-	};
-
-// Strings for the server create test step code
-_LIT(KPinPluginTestStep,	"tPinPluginTestStep");
-_LIT(KCreateInputFile,	"CreateInputFile");
-
-_LIT(KTrainServerCancel,  	"TrainServerCancel");
-_LIT(KReTrainServerCancel,  "ReTrainServerCancel");
-_LIT(KIdentifyServerCancel, "IdentifyServerCancel");
-
-
-#endif /* TPINPLUGINTESTSTEP_H */
-
-
--- a/authenticationservices/authenticationserver/test/reftestplugin/tpinplugindlg/tpinplugindlg.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,404 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Pinplugindlg.cpp
-*
-*/
-
-
-#include "tpinplugindlg.h"
-#include <s32file.h>
-
-const TInt KErrInvalidPinLength			= -1002;
-_LIT(KPinPluginDailogPanicString,"CTestPinPluginDlgNotifier");
-
-// Lib main entry point.
-
-#ifdef _T_PINPLUGINDLG_TEXTSHELL
-EXPORT_C CArrayPtr<MNotifierBase2>* NotifierArray()
-#else
-CArrayPtr<MNotifierBase2>* NotifierArray()
-#endif
-	{
-	CArrayPtrFlat<MNotifierBase2>* subjects = NULL;
-	CTestPinPluginDlgNotifier* notifier;
-	TRAPD(err,
-		subjects = new (ELeave) CArrayPtrFlat<MNotifierBase2>(1);
-		CleanupStack::PushL(subjects);
-		notifier = CTestPinPluginDlgNotifier::NewL();
-		CleanupStack::PushL(notifier);
-		subjects->AppendL(notifier);
-		CleanupStack::Pop(2,subjects));	//notifier, subjects
-	if (err != KErrNone)
-		{
-		subjects = NULL;
-		}
-	return subjects;
-	}
-
-// Ecom plugin implementation for UI notifier
-
-#ifndef _T_PINPLUGINDLG_TEXTSHELL
-
-const TImplementationProxy ImplementationTable[] =
-	{
-	IMPLEMENTATION_PROXY_ENTRY(KTPinPluginDlgNotiferUid, NotifierArray)
-	};
-
-EXPORT_C const TImplementationProxy* ImplementationGroupProxy(TInt& aTableCount)
-	{
-	aTableCount = sizeof(ImplementationTable) / sizeof(TImplementationProxy);
-	return (ImplementationTable);
-	}
-
-#endif
-
-// TInputDetails
-//
-
-TInputDetails::TInputDetails(TPinPluginDialogOperation aOp, TInt aIndex, TInt aNewPinLength, TPinPluginDialogResult aCommandOutput) :
-	iOp(aOp), iPinValue(0), iIndex(aIndex), iNewPinLength(aNewPinLength), iCommandOutput(aCommandOutput)
-	{
-	}
-
-TInputDetails::TInputDetails(TPinPluginDialogOperation aOp, TPinValue& aPinValue, TPinPluginDialogResult aCommandOutput) :
-	iOp(aOp), iPinValue(aPinValue), iCommandOutput(aCommandOutput)
-	{
-	}
-
-
-// CTestPinPluginDlgNotifier
-//
-
-_LIT(KInputFile, "C:\\t_pinplugindlg_in.dat");
-_LIT(KOutputFile, "C:\\t_pinplugindlg_out.dat");
-
-CTestPinPluginDlgNotifier* CTestPinPluginDlgNotifier::NewL()
-	{
-	CTestPinPluginDlgNotifier* self=new (ELeave) CTestPinPluginDlgNotifier();
-	CleanupStack::PushL(self);
-	self->ConstructL();
-	CleanupStack::Pop(self);
-	return self;
-	}
-
-CTestPinPluginDlgNotifier::CTestPinPluginDlgNotifier()
-	{
-	iInfo.iUid = KUidPinPluginDialogNotifier;
-	iInfo.iChannel = TUid::Uid(0x00001200); // test uid
-	iInfo.iPriority = ENotifierPriorityHigh;
-	}
-
-void CTestPinPluginDlgNotifier::ConstructL()
-	{
-	User::LeaveIfError(iFs.Connect());
-	}
-
-TInt CTestPinPluginDlgNotifier::ReadDialogCountL()
-	{
-	RFileReadStream stream;
-	TInt err = stream.Open(iFs, KOutputFile, EFileRead | EFileShareExclusive);
-	// If the file doesn't exist yet just return zero
-	if (err == KErrNotFound)
-		{
-		return 0;
-		}
-	User::LeaveIfError(err);
-	stream.PushL();
-	TInt dialogCount = stream.ReadInt32L();
-	CleanupStack::PopAndDestroy(&stream); 
-	return dialogCount;
-	}
-
-TPinValue CTestPinPluginDlgNotifier::ReadPinValueL()
-	{
-	TPinValue pinValue;
-	RFileReadStream stream;
-	TInt err = stream.Open(iFs, KOutputFile, EFileRead | EFileShareExclusive);
-	// If the file doesn't exist yet just return zero
-	if (err == KErrNotFound)
-		{
-		pinValue.Copy(_L("0"));
-		return pinValue;
-		}
-	User::LeaveIfError(err);
-	stream.PushL();
-	stream.ReadInt32L();
-	TInt pinValueSize = stream.ReadInt32L();
-	HBufC8* pinValueBuf = HBufC8::NewMaxLC(pinValueSize);
-	TPtr8 pinValuePtr(pinValueBuf->Des());
-	stream.ReadL(pinValuePtr, pinValueSize);
-	pinValue.Copy(pinValuePtr);
-	CleanupStack::PopAndDestroy(2, &stream);	
-	return pinValue;
-	}
-	
-void CTestPinPluginDlgNotifier::WriteDialogCountL(TInt aCount)
-	{
-	RFileWriteStream stream;
-	TInt err = stream.Replace(iFs, KOutputFile, EFileWrite | EFileShareExclusive);
-	if (err == KErrNotFound)
-		{
-		err = stream.Create(iFs, KOutputFile, EFileWrite | EFileShareExclusive);
-		}
-	User::LeaveIfError(err);
-	stream.PushL();
-	stream.WriteInt32L(aCount);
-	stream.CommitL();
-	CleanupStack::PopAndDestroy(&stream); 
-	}
-
-void CTestPinPluginDlgNotifier::WritePinL(const TPinValue& aPinValue)
-	{
-	TInt dialogCount = ReadDialogCountL();
-
-	RFileWriteStream stream;
-	TInt err = stream.Replace(iFs, KOutputFile, EFileWrite | EFileShareExclusive);
-	if (err == KErrNotFound)
-		{
-		err = stream.Create(iFs, KOutputFile, EFileWrite | EFileShareExclusive);
-		}
-	User::LeaveIfError(err);
-	stream.PushL();
-	stream.WriteInt32L(dialogCount);
-	stream.WriteInt32L(aPinValue.Length());
-	stream.WriteL(aPinValue);
-	stream.CommitL();
-	CleanupStack::PopAndDestroy(&stream); 
-	}
-	
-void CTestPinPluginDlgNotifier::WriteMsgL(const TPinPluginInfoMessage& aMessage)
-	{
-	TInt dialogCount = ReadDialogCountL();
-	TPinValue pinValue = ReadPinValueL();
-	
-	RFileWriteStream stream;
-	TInt err = stream.Replace(iFs, KOutputFile, EFileWrite | EFileShareExclusive);
-	if (err == KErrNotFound)
-		{
-		err = stream.Create(iFs, KOutputFile, EFileWrite | EFileShareExclusive);
-		}
-	User::LeaveIfError(err);
-	stream.PushL();
-	stream.WriteInt32L(dialogCount);
-	stream.WriteInt32L(pinValue.Length());
-	stream.WriteL(pinValue);
-	stream.WriteInt32L(aMessage);
-	stream.CommitL();
-	CleanupStack::PopAndDestroy(&stream); 
-	}
-	
-TInputDetails* CTestPinPluginDlgNotifier::ReadInputDetailsL(TUint aOperation)
-	{
-	RFileReadStream stream;
-	User::LeaveIfError(stream.Open(iFs, KInputFile, EFileRead | EFileShareExclusive));
-	stream.PushL();
-
-	TPinValue pinvalue;
-	TInt index, newLength,dialogNumber;
-	TInt pinValueSize;
-
-	TPinPluginDialogOperation op = static_cast<TPinPluginDialogOperation>(stream.ReadInt32L());
-	
-	pinValueSize = stream.ReadInt32L();
-	HBufC8* pinValueBuf = HBufC8::NewMaxLC(pinValueSize);
-	TPtr8 pinValuePtr(pinValueBuf->Des());
-	stream.ReadL(pinValuePtr, pinValueSize);
-	pinvalue.Copy(pinValuePtr);
-	
-	index = stream.ReadInt32L();
-	if (index < 0 && index > 3)
-		{
-		index = 0;
-		}
-	newLength = stream.ReadInt32L();
-	
-	TPinPluginDialogResult outputCommand = static_cast<TPinPluginDialogResult>(stream.ReadInt32L());
-	TPinPluginDialogOperation op1 = static_cast<TPinPluginDialogOperation>(stream.ReadInt32L());
-	TPinPluginDialogResult finalOutputCommand = static_cast<TPinPluginDialogResult>(stream.ReadInt32L());
-	dialogNumber = stream.ReadInt32L();
-	if (op != aOperation)
-		{
-		op = op1;
-		}
-	else
-		{
-		// Update dialog count here so test code can see how many dialogs were
-		// requested if there were more than expected
-		TInt dialogCount = ReadDialogCountL() + 1;
-		WriteDialogCountL(dialogCount);
-		if (dialogNumber == dialogCount)
-			{
-			outputCommand = finalOutputCommand;
-			}
-		}
-	
-	TInputDetails* inputDetail = NULL;
-	if (op == EPinPluginTraining)
-		{
-		inputDetail = new (ELeave) TInputDetails(op, index, newLength, outputCommand);
-		}
-	else if (op == EPinPluginIdentify) 
-		{
-		inputDetail = new (ELeave) TInputDetails(op, pinvalue, outputCommand);
-		}
-	CleanupStack::PopAndDestroy(1, pinValueBuf);	
-	CleanupStack::PopAndDestroy(&stream); 
-
-	return inputDetail;
-	}
-
-
-void CTestPinPluginDlgNotifier::DoSelectPinL(const TInputDetails& aDetail, const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage)
-	{
-	const TPinTrainingInput& input = reinterpret_cast<const TPinTrainingInput&>(*aBuffer.Ptr());
-
-	TPinDialogOutput output;
-	output.iIndex = aDetail.Index();
-	TInt pinLength = aDetail.NewPinLength();
-	if (pinLength == 0)
-		{
-		output.iNewPinLength = input.iCurrentPinLength;
-		}
-	else
-		{
-		output.iNewPinLength = pinLength;
-		}
-	output.iResult = aDetail.CommandOutput();
-	
-	TPinValue pinValue;
-	switch(output.iIndex)
-		{
-		case 0:
-			pinValue = input.iPinValue1;
-			break; 
-		case 1:
-			pinValue = input.iPinValue2;
-			break; 
-		case 2:
-			pinValue = input.iPinValue3;
-			break; 
-		case 3:
-			pinValue = input.iPinValue4;
-			break; 
-		}
-	WritePinL(pinValue);
-	TPinDialogOutputBuf outputBuf(output);
-	aMessage.WriteL(aReplySlot, outputBuf);
-	}
-
-void CTestPinPluginDlgNotifier::DoIdentifyPinL(const TInputDetails& aDetail, const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage)
-	{
-	const TPinIdentifyInput& input = reinterpret_cast<const TPinIdentifyInput&>(*aBuffer.Ptr());
-
-	TPinDialogOutput output;
-	const TPinValue& pinInput = reinterpret_cast<const TPinValue&>(aDetail.PinValue());
-	TInt pinLength = pinInput.Length();
-	if (pinLength >= input.iMinLength && pinLength <= input.iMaxLength)
-		{
-		output.iPinValue = pinInput;
-		}
-	else
-		{
-		User::Leave(KErrInvalidPinLength);	
-		}
-	
-	WritePinL(pinInput);
-	output.iResult = aDetail.CommandOutput();
-	TPinDialogOutputBuf outputBuf(output);
-	aMessage.WriteL(aReplySlot, outputBuf);
-	}
-
-void CTestPinPluginDlgNotifier::DoInfoPinL(const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage)
-	{
-	const TPinInfoInput& input = reinterpret_cast<const TPinInfoInput&>(*aBuffer.Ptr());
-	WriteMsgL(input.iMessage);
-	
-	TPinDialogOutput output;
-	TPinDialogOutputBuf outputBuf(output);
-	aMessage.WriteL(aReplySlot, outputBuf);
-	}
-
-void CTestPinPluginDlgNotifier::Release()
-	{
-	delete this;
-	}
-
-CTestPinPluginDlgNotifier::TNotifierInfo CTestPinPluginDlgNotifier::RegisterL()
-	{
-	return iInfo;
-	}
-
-CTestPinPluginDlgNotifier::TNotifierInfo CTestPinPluginDlgNotifier::Info() const
-	{
-	return iInfo;
-	}
-
-void CTestPinPluginDlgNotifier::StartL(const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage)
-	{
-	TRAPD(err, DoStartL(aBuffer, aReplySlot, aMessage));
-	aMessage.Complete(err);
-	}
-	
-void CTestPinPluginDlgNotifier::DoStartL(const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage)
-	{
-	TUint operation = *reinterpret_cast<const TInt *>(aBuffer.Ptr()) & KPinPluginDialogOperationMask;
-	
-	TInputDetails* detail = NULL;
-
-	TRAPD(err, detail = ReadInputDetailsL(operation));
-	
-	User::LeaveIfError(err);
-
-	CleanupStack::PushL(detail);
-	
-	switch (operation)
-		{
-		case EPinPluginTraining:
-			DoSelectPinL(*detail, aBuffer, aReplySlot, aMessage);
-			break;
-
-		case EPinPluginIdentify:
-			DoIdentifyPinL(*detail, aBuffer, aReplySlot, aMessage);
-			break;
-		case EPinPluginInfo:
-			DoInfoPinL(aBuffer, aReplySlot, aMessage);
-			break;
-		default:
-			User::Panic(_L("CTestPinPluginDlgNotifier"), 0);
-		}
-	CleanupStack::PopAndDestroy(detail);
-	}
-
-TPtrC8 CTestPinPluginDlgNotifier::StartL( const TDesC8& /*aBuffer*/ )
-	{
-	User::Panic(_L("CTestPinPluginDlgNotifier"), 0);
-	return TPtrC8(KNullDesC8);
-	}
-
-void CTestPinPluginDlgNotifier::Cancel()
-	{
-	// Don't think there is much we can do here. If a client deletes the
-	// client-side pinplugin dialog instance, after calling a method that 
-	// displays a dialog, this will not get called until the user dismisses
-	// the dialog. We can't do anything then.
-	}
-
-TPtrC8 CTestPinPluginDlgNotifier::UpdateL( const TDesC8& /*aBuffer*/ )
-	{
-	User::Panic(KPinPluginDailogPanicString, 0);
-	return NULL;
-	}
-
-
--- a/authenticationservices/authenticationserver/test/reftestplugin/tpinplugindlg/tpinplugindlg.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,161 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#ifndef __TPINPLUGINDLG_H__
-#define __TPINPLUGINDLG_H__
-
-#include <e32base.h>
-#include <pinplugindialogdefs.h>
-
-const TUint KTPinPluginDlgNotiferUid = 0x200032E7;
-
-#ifdef _T_PINPLUGINDLG_TEXTSHELL
-
-#include <twintnotifier.h>
-
-/** Method at ordinal 1 to get a list of notifiers from this dll. */
-IMPORT_C CArrayPtr<MNotifierBase2>* NotifierArray();
-
-#else
-
-#include <eiknotapi.h>
-#include <ecom/ImplementationProxy.h>
-#define MNotifierBase2 MEikSrvNotifierBase2
-
-IMPORT_C const TImplementationProxy* ImplementationGroupProxy(TInt& aTableCount);
-CArrayPtr<MNotifierBase2>* NotifierArray();
-
-#endif
-
-/**
- It reads the Input datas from t_pinplugindlg_in.dat and constructs
- TInputDetails to use in CTestPinPluginDlgNotifier.
- */
-class TInputDetails
-	{
- public:
- 	/**
- 	 Constructs the object while the request is Train/ReTrain.
- 	 */
-	TInputDetails(TPinPluginDialogOperation aOp, TInt aIndex, TInt aNewPinLength, TPinPluginDialogResult aCommandOutput);
-	/**
- 	 Constructs the object while the request is Identify.
- 	 */
-	TInputDetails(TPinPluginDialogOperation aOp, TPinValue& aPinValue, TPinPluginDialogResult aCommandOutput);
-	/** Returns the current process Dialog Notification Operation */
-	TPinPluginDialogNotification Operation() const { return iOp; }
-	/** Returns the current process Pin Value Selected/Entered. */
-	const TPinValue& PinValue() const { return iPinValue; }
-	/** Returns the current process selected index. */
-	TInt Index() const { return iIndex; }
-	/** Returns the current process New pin Length given. */
-	TInt NewPinLength() const { return iNewPinLength; }
-	/** Returns the current process Dialog output. */
-	TPinPluginDialogResult CommandOutput() const { return iCommandOutput; }
- private:
-	TPinPluginDialogNotification iOp;
-	TPinValue iPinValue;
-	TInt iIndex;
-	TInt iNewPinLength;
-	TPinPluginDialogResult iCommandOutput;
-	TPinPluginInfoMessage iExpectedMsg;
-	};
-
-/**
- This is a test implementation of the pinplugin dialog notifier. This version
- responds to dialogs with data read from c:\t_pinplugindlg_in.dat. This contains
- the expected input for the dialog. It keeps a number of dialog displayed
- and pin selected for the Train/ReTrain or pin given in Identify Dialog and
- displayed info message in c:\t_pinplugindlg_out.dat.
- */
-class CTestPinPluginDlgNotifier : public CBase, public MNotifierBase2
-	{
-public:
-	static CTestPinPluginDlgNotifier* NewL();
-
-private:
-	void ConstructL();
-	CTestPinPluginDlgNotifier();
-
-	/**
-	 Read the Number of Dialog displayed already from t_pinplugindlg_out.dat.
-	 */
-	TInt ReadDialogCountL();
-	/**
-	 Read the PinValue Selected/Entered in the last dialog request from
-	 t_pinplugindlg_out.dat.
-	 */
-	TPinValue ReadPinValueL();
-	/**
-	 Write the dialog count to the output file t_pinplugindlg_out.dat.
-	 
-	 @param aCount		The Count of the Current Dialog.
-	 */
-	void WriteDialogCountL(TInt aCount);
-	/**
-	 Write the PinValue to the output file t_pinplugindlg_out.dat.
-
- 	 @param aPinValue		The pinvalue to be write.
-	 */
-	void WritePinL(const TPinValue& aPinValue);
-	/**
-	 Write the info message to the output file t_pinplugindlg_out.dat.
-	 
-	 @param aMessage		The message to be write.
-	 */
-	void WriteMsgL(const TPinPluginInfoMessage& aMessage);
-	
-	/**
-	 Read an input specification.
-	 
-	 @param aOperation		Consturct the InputDetails for the aOperation.
-	 */
-	TInputDetails* ReadInputDetailsL(TUint aOperation);
-	
-	/**
-	 Construct the output Details from aDetail and complete the RMessagePtr2
-	 with the details.
-	 
-	 @param aDetail		The input Details read from .dat file for this dialog
-	 @param aBuffer		Data that can be passed from the client-side.
-	 @param aReplySlot	Identifies which message argument to use for the reply.
-	 @param aMessage	Encapsulates a client request.
-	 */
-	void DoSelectPinL(const TInputDetails& aDetail, const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage);
-	void DoIdentifyPinL(const TInputDetails& aDetail, const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage);
-	void DoInfoPinL(const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage);
-public: 		// from MEikSrvNotifierBase2
-	void DoStartL( const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage );
-
-private:     	// from MEikSrvNotifierBase2
-	void Release();
-	TNotifierInfo RegisterL();
-	TNotifierInfo Info() const;
-	
-	virtual void StartL( const TDesC8& aBuffer, TInt aReplySlot, const RMessagePtr2& aMessage );
-	virtual TPtrC8 StartL( const TDesC8& aBuffer );
-	
-	void Cancel();
-	TPtrC8 UpdateL( const TDesC8& aBuffer );
-
-private:
-	RFs iFs;
-	TNotifierInfo iInfo;
-	};
-
-#endif // __TPINPLUGINDLG_H__
--- a/authenticationservices/authenticationserver/test/securitytests/bwins/authsecuritytestsU.def	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,3 +0,0 @@
-EXPORTS
-	?CapabilityTestFactory@@YAPAVMCapabilityTestFactory@@XZ @ 1 NONAME ; class MCapabilityTestFactory * CapabilityTestFactory(void)
-
--- a/authenticationservices/authenticationserver/test/securitytests/eabi/authsecuritytestsU.def	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,15 +0,0 @@
-EXPORTS
-	_Z21CapabilityTestFactoryv @ 1 NONAME
-	_ZTI21CAuthTrustedUISecTest @ 2 NONAME
-	_ZTI24CAuthReadUserDataSecTest @ 3 NONAME
-	_ZTI25CAuthWriteUserDataSecTest @ 4 NONAME
-	_ZTI26CAuthReadDeviceDataSecTest @ 5 NONAME
-	_ZTI27CAuthWriteDeviceDataSecTest @ 6 NONAME
-	_ZTI33CAuthReadUserAndDeviceDataSecTest @ 7 NONAME
-	_ZTV21CAuthTrustedUISecTest @ 8 NONAME
-	_ZTV24CAuthReadUserDataSecTest @ 9 NONAME
-	_ZTV25CAuthWriteUserDataSecTest @ 10 NONAME
-	_ZTV26CAuthReadDeviceDataSecTest @ 11 NONAME
-	_ZTV27CAuthWriteDeviceDataSecTest @ 12 NONAME
-	_ZTV33CAuthReadUserAndDeviceDataSecTest @ 13 NONAME
-
--- a/authenticationservices/authenticationserver/test/securitytests/group/authsecuritytests.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,51 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* authsecuritytests.dll Test harness for AuthServer security testing without the TCB capability
-*
-*/
-
-
-/**
- @file
-*/
-
-// Capabilities are set by captestframework
-CAPABILITY All -TCB
-
-TARGET			authsecuritytests.dll
-TARGETTYPE		dll
-UID				0x101F7295 0x1082D53E
-VENDORID		0x70000001
-
-OS_LAYER_SYSTEMINCLUDE_SYMBIAN
-
-SOURCEPATH		../source
-SOURCE			authsecuritytests.cpp
-SOURCE			authreaddevicedata.cpp
-SOURCE			authreaduserdata.cpp
-SOURCE			authwriteuserdata.cpp
-SOURCE			authwritedevicedata.cpp
-SOURCE			authtrustedui.cpp
-SOURCE			authreaduseranddevicedata.cpp
-
-USERINCLUDE		.
-USERINCLUDE		../inc
-USERINCLUDE		../../../../../cryptomgmtlibs/securitytestfw/test/captestframework
-
-
-LIBRARY			euser.lib efsrv.lib
-LIBRARY			captestframeworkutil.lib
-LIBRARY			authclient.lib authcommon.lib
-SMPSAFE
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/securitytests/inc/authreaddevicedata.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,32 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include "captestutility.h"
-
-class CAuthReadDeviceDataSecTest : public CDefaultCapabilityTest
-	{
-public:
-	static CAuthReadDeviceDataSecTest* NewL();
-	
-private:
-	CAuthReadDeviceDataSecTest();
-	
-	void RunTestL();
-
-	void ConstructL();
-	};
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/securitytests/inc/authreaduseranddevicedata.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,33 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* authreaduseranddevicedata.cpp
-*
-*/
-
-
-#include "captestutility.h"
-
-class CAuthReadUserAndDeviceDataSecTest : public CDefaultCapabilityTest
-	{
-public:
-	static CAuthReadUserAndDeviceDataSecTest* NewL();
-	
-private:
-	CAuthReadUserAndDeviceDataSecTest();
-	
-	void RunTestL();
-
-	void ConstructL();
-	};
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/securitytests/inc/authreaduserdata.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,33 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* authreaduserdata.cpp
-*
-*/
-
-
-#include "captestutility.h"
-
-class CAuthReadUserDataSecTest : public CDefaultCapabilityTest
-	{
-public:
-	static CAuthReadUserDataSecTest* NewL();
-
-private:
-	CAuthReadUserDataSecTest();
-	
-	void RunTestL();
-
-	void ConstructL();
-	};
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/securitytests/inc/authtrustedui.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,40 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* authtrustedui.cpp
-*
-*/
-
-
-#include "captestutility.h"
-#include <authserver/authclient.h>
-#include <authserver/authmgrclient.h>
-#include <e32def.h>
-
-class CRegActive;
-
-class CAuthTrustedUISecTest : public CDefaultCapabilityTest
-	{
-public:
-	static CAuthTrustedUISecTest* NewL();
-	
-private:
-	CAuthTrustedUISecTest();
-	
-	void RunTestL();
-	
-	void DoTestL();
-
-	void ConstructL();
-	};
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/securitytests/inc/authwritedevicedata.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,34 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* authwritedevicedata.cpp
-*
-*/
-
-
-
-#include "captestutility.h"
-
-class CAuthWriteDeviceDataSecTest : public CDefaultCapabilityTest
-	{
-public:
-	static CAuthWriteDeviceDataSecTest* NewL();
-	
-private:
-	CAuthWriteDeviceDataSecTest();
-	
-	void RunTestL();
-
-	void ConstructL();
-	};
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/securitytests/inc/authwriteuserdata.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,37 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* authwriteuserdata.cpp
-*
-*/
-
-
-#include "captestutility.h"
-#include <authserver/authclient.h>
-#include <authserver/authmgrclient.h>
-
-class CAuthWriteUserDataSecTest : public CDefaultCapabilityTest
-	{
-public:
-	static CAuthWriteUserDataSecTest* NewL();
-	
-private:
-	CAuthWriteUserDataSecTest();
-	
-	void RunTestL();
-	
-	void DoTestL(AuthServer::RAuthMgrClient& authMgrClient);
-
-	void ConstructL();
-	};
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/securitytests/scripts/authsecuritytests.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,3 +0,0 @@
-[authsecuritytests]
-DllName=authsecuritytests.dll
-OmitTCBCapInComplementSet=True
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/securitytests/scripts/authsecuritytests.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,48 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-//! @file
-// Auth Security tests
-PRINT Run Auth Security tests
-
-// Prepare a clone of TAuthSvr to possess authserver's SID.
-// This is required for modifying the authserver's central repository file.
-// This clone must be deleted at the end of the test.
-
-RUN_PROGRAM 100 SETCAP tAuthSvr.exe 188b0 -SID 102740FC tAuthSvr_new.exe
-
-LOAD_SUITE captestframework
-LOAD_SUITE tAuthSvr_new
-
-// This test must be executed in order to set the default plugin, else authserver will never start.
-
-RUN_UTILS DeleteFile C:\pinplugin_inactive.txt
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr_new 	INIT_CENREP c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defaultplugin
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_in.dat
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_out.dat
-
-//! @SYMTestCaseID SEC-AUT-SecurityTests
-//! @SYMTestCaseDesc Runs the whole suite of security test cases for authserver. Both negative and positive tests are included.
-//! @SYMREQ REQ0000
-//! @SYMTestPriority Medium
-//! @SYMTestActions Tests IPC calls from different capabilities
-//! @SYMTestExpectedResults KErrPermissionDenied received on calls which should fail
-//! @SYMDevelopedForRelease Diran
-
-
-START_TESTCASE AuthSecTest
-RUN_TEST_STEP 100 captestframework RunThoroughCapabilityChecks c:\tauth\securitytests\scripts\authsecuritytests.ini authsecuritytests
-END_TESTCASE AuthSecTest
--- a/authenticationservices/authenticationserver/test/securitytests/source/authreaddevicedata.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,64 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* authreadedvicedata.cpp
-*
-*/
-
-
-
-#include "authreaddevicedata.h"
-
-#include <authserver/authclient.h>
-#include <authserver/authmgrclient.h>
-#include <e32def.h>
-
-_LIT(KAuthReadDeviceDataSecName, "Auth ReadDeviceData APIs test");
-
-using namespace AuthServer;
-
-CAuthReadDeviceDataSecTest* CAuthReadDeviceDataSecTest::NewL()
-	{
-	CAuthReadDeviceDataSecTest* self=new(ELeave) CAuthReadDeviceDataSecTest();
-	CleanupStack::PushL(self);
-	self->ConstructL();
-	CleanupStack::Pop(self);
-	return self;
-	}
-
-CAuthReadDeviceDataSecTest::CAuthReadDeviceDataSecTest()
-	{
-	SetCapabilityRequired(ECapabilityReadDeviceData);
-	}
-	
-void CAuthReadDeviceDataSecTest::ConstructL()
-	{
-	SetNameL(KAuthReadDeviceDataSecName);
-	}
-
-void CAuthReadDeviceDataSecTest::RunTestL()
-	{
-	AuthServer::RAuthMgrClient authMgrClient;	
-	User::LeaveIfError(authMgrClient.Connect());
-	CleanupClosePushL(authMgrClient);
-	
-	TInt err(0);
-	
-	AuthServer::RIdentityIdArray idList;
-	TRAP(err, authMgrClient.IdentitiesL(idList));
-	idList.Close();
-	CheckFailL(err, _L("AuthServer::IdentitiesL()."));
-	
-	CleanupStack::PopAndDestroy(&authMgrClient);
-	}
--- a/authenticationservices/authenticationserver/test/securitytests/source/authreaduseranddevicedata.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,64 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-
-#include "authreaduseranddevicedata.h"
-
-#include <authserver/authclient.h>
-#include <authserver/authmgrclient.h>
-#include <e32def.h>
-
-_LIT(KAuthReadUserAndDeviceDataSecName, "Auth ReadUserAndDeviceDeviceData APIs test");
-
-using namespace AuthServer;
-
-CAuthReadUserAndDeviceDataSecTest* CAuthReadUserAndDeviceDataSecTest::NewL()
-	{
-	CAuthReadUserAndDeviceDataSecTest* self=new(ELeave) CAuthReadUserAndDeviceDataSecTest();
-	CleanupStack::PushL(self);
-	self->ConstructL();
-	CleanupStack::Pop(self);
-	return self;
-	}
-
-CAuthReadUserAndDeviceDataSecTest::CAuthReadUserAndDeviceDataSecTest()
-	{
-	SetCapabilityRequired(ECapabilityReadUserData);
-	SetCapabilityRequired(ECapabilityReadDeviceData);	
-	}
-	
-void CAuthReadUserAndDeviceDataSecTest::ConstructL()
-	{
-	SetNameL(KAuthReadUserAndDeviceDataSecName);
-	}
-
-void CAuthReadUserAndDeviceDataSecTest::RunTestL()
-	{
-	AuthServer::RAuthMgrClient authMgrClient;	
-	User::LeaveIfError(authMgrClient.Connect());
-	CleanupClosePushL(authMgrClient);
-
-	TInt err(0);
-	
-	RIdAndStringArray idWithString;
-	TRAP(err, authMgrClient.IdentitiesWithStringL(idWithString));
-	idWithString.Close();
-	CheckFailL(err, _L("AuthServer::IdentitiesWithStringL()."));
-	
-	CleanupStack::PopAndDestroy(&authMgrClient);
-	}
--- a/authenticationservices/authenticationserver/test/securitytests/source/authreaduserdata.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,90 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include "authreaduserdata.h"
-
-#include <authserver/authclient.h>
-#include <authserver/authmgrclient.h>
-#include <e32def.h>
-
-_LIT(KAuthReadUserDataSecName, "Auth ReadUserData APIs test");
-
-using namespace AuthServer;
-
-CAuthReadUserDataSecTest* CAuthReadUserDataSecTest::NewL()
-	{
-	CAuthReadUserDataSecTest* self=new(ELeave) CAuthReadUserDataSecTest();
-	CleanupStack::PushL(self);
-	self->ConstructL();
-	CleanupStack::Pop(self);
-	return self;
-	}
-
-CAuthReadUserDataSecTest::CAuthReadUserDataSecTest()
-	{
-	SetCapabilityRequired(ECapabilityReadUserData);
-	}
-	
-void CAuthReadUserDataSecTest::ConstructL()
-	{
-	SetNameL(KAuthReadUserDataSecName);
-	}
-
-void CAuthReadUserDataSecTest::RunTestL()
-	{
-	AuthServer::RAuthMgrClient authMgrClient;	
-	User::LeaveIfError(authMgrClient.Connect());
-	CleanupClosePushL(authMgrClient);
-
-	TInt err(0);
-	CAuthExpression* authExpr = AuthExpr(EAuthKnowledge);
-	CleanupStack::PushL(authExpr);
-	
-	TUid clientSid = {0};
-	
-	AuthServer::CIdentity* identity = NULL;
-	TRAP(err, identity = authMgrClient.AuthenticateL(*authExpr, 0, EFalse, clientSid, EFalse, KNullDesC()));
-	CheckFailL(err, _L("AuthServer::AuthenticateL : Client Specific Key set to false."));
-	
-	TRAP(err, identity = authMgrClient.AuthenticateL(*authExpr, 0, ETrue, clientSid, ETrue, KNullDesC()));
-	CheckFailL(err, _L("AuthServer::AuthenticateL : Identity String set to true"));
-	
-	clientSid.iUid = 12345678;	
-	TRAP(err, identity = authMgrClient.AuthenticateL(*authExpr, 0, ETrue, clientSid, EFalse, KNullDesC()));
-	CheckFailL(err, _L("AuthServer::AuthenticateL : ClientSid greater than zero."));
-	
-	if(identity != NULL)
-		{
-		delete identity;
-		}
-		
-	TIdentityId id = 5110;
-	HBufC* idString = NULL;
-	TRAP(err, idString = authMgrClient.IdentityStringL(id));
-	CheckFailL(err, _L("AuthServer::IdentityStringL()."));
-	
-	if(idString != NULL)
-		{
-		delete idString;
-		}
-	
-	CleanupStack::PopAndDestroy(2, &authMgrClient);
-	}
-
-	
-	
--- a/authenticationservices/authenticationserver/test/securitytests/source/authsecuritytests.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,51 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include "captestutility.h"
-#include "authwriteuserdata.h"
-#include "authreaduserdata.h"
-#include "authreaddevicedata.h"
-#include "authwritedevicedata.h"
-#include "authtrustedui.h"
-#include "authreaduseranddevicedata.h"
-
-#include <s32file.h>
-
-// Factory function
-MCapabilityTestFactory* CapabilityTestFactoryL()
-	{
-	CDefaultCapabilityTestFactory* factory=new(ELeave) CDefaultCapabilityTestFactory();
-
-	factory->AddTestL(CAuthReadUserDataSecTest::NewL());
-	factory->AddTestL(CAuthReadDeviceDataSecTest::NewL());
-	factory->AddTestL(CAuthWriteUserDataSecTest::NewL());
-	factory->AddTestL(CAuthWriteDeviceDataSecTest::NewL());
-	factory->AddTestL(CAuthReadUserAndDeviceDataSecTest::NewL());
-	factory->AddTestL(CAuthTrustedUISecTest::NewL());
-	
-	return factory;
-	}
-
-EXPORT_C MCapabilityTestFactory* CapabilityTestFactory()
-	{
-	MCapabilityTestFactory* factory=NULL;
-	TRAP_IGNORE(factory = CapabilityTestFactoryL());
-	return factory;
-	}
-
-
--- a/authenticationservices/authenticationserver/test/securitytests/source/authtrustedui.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,114 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include "authtrustedui.h"
-
-_LIT(KAuthTrustedUISecName, "Auth TrustedUI APIs test");
-
-using namespace AuthServer;
-
-class CRegActive : public CActive
-    {
-	public:
-    CRegActive(RAuthMgrClient& aClient, CIdentity*& aResult) : 
-         CActive(EPriorityNormal),
-         iFirstTime(true),
-         iClient(aClient), 
-         iResult(aResult),
-         iErr(KErrNone)
-        {
-        CActiveScheduler::Add(this);
-        }
-        
-    void doReg()
-        {
-        SetActive();		
-		iClient.RegisterIdentityL(iResult, KAuthTrustedUISecName, iStatus);
-		}
-        
-    void DoCancel() 
-        {
-        }
-        
-    void RunL() 
-    	{
-        iErr = iStatus.Int();
-        CActiveScheduler::Stop();
-		}
-        
-    TInt RunError(TInt aError)
-    	{
-    	iErr = aError;
-	   	CActiveScheduler::Stop();
-    	return KErrNone;
-    	}
-        
-    TBool iFirstTime;
-    RAuthMgrClient& iClient;
-    CIdentity*& iResult;
-    TInt iErr;
-    };
-    
-
-CAuthTrustedUISecTest* CAuthTrustedUISecTest::NewL()
-	{
-	CAuthTrustedUISecTest* self=new(ELeave) CAuthTrustedUISecTest();
-	CleanupStack::PushL(self);
-	self->ConstructL();
-	CleanupStack::Pop(self);
-	return self;
-	}
-
-CAuthTrustedUISecTest::CAuthTrustedUISecTest()
-	{
-	SetCapabilityRequired(ECapabilityTrustedUI);
-	}
-	
-void CAuthTrustedUISecTest::ConstructL()
-	{
-	SetNameL(KAuthTrustedUISecName);
-	}
-
-void CAuthTrustedUISecTest::RunTestL()
-	{
-	TInt err(0);
-	
-	TRAP(err, DoTestL());
-	CheckFailL(err, _L("AuthServer::RegisterIdentityL()."));
-	}
-	
-void CAuthTrustedUISecTest::DoTestL()
-	{
-	AuthServer::RAuthMgrClient authMgrClient;	
-	User::LeaveIfError(authMgrClient.Connect());
-	CleanupClosePushL(authMgrClient);
-	
-	CActiveScheduler* sched = NULL;
-	sched = new(ELeave) CActiveScheduler;
-	CleanupStack::PushL(sched);
-	CActiveScheduler::Install(sched);
-
-	CIdentity* identity = 0;
-	CRegActive active(authMgrClient, identity);
-    active.doReg();
-	CActiveScheduler::Start();	
-	
-	CleanupStack::PopAndDestroy(2, &authMgrClient);
-	User::LeaveIfError(active.iErr);
-	}
-
--- a/authenticationservices/authenticationserver/test/securitytests/source/authwritedevicedata.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,83 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include "authwritedevicedata.h"
-#include <authserver/authclient.h>
-#include <authserver/authmgrclient.h>
-#include <scs/cleanuputils.h>
-#include <e32def.h>
-
-_LIT(KAuthWriteDeviceDataSecName, "Auth WriteDeviceData APIs test");
-
-using namespace AuthServer;
-
-CAuthWriteDeviceDataSecTest* CAuthWriteDeviceDataSecTest::NewL()
-	{
-	CAuthWriteDeviceDataSecTest* self=new(ELeave) CAuthWriteDeviceDataSecTest();
-	CleanupStack::PushL(self);
-	self->ConstructL();
-	CleanupStack::Pop(self);
-	return self;
-	}
-
-CAuthWriteDeviceDataSecTest::CAuthWriteDeviceDataSecTest()
-	{
-	SetCapabilityRequired(ECapabilityWriteDeviceData);
-	}
-	
-void CAuthWriteDeviceDataSecTest::ConstructL()
-	{
-	SetNameL(KAuthWriteDeviceDataSecName);
-	}
-
-void CAuthWriteDeviceDataSecTest::RunTestL()
-	{
-	AuthServer::RAuthMgrClient authMgrClient;	
-	User::LeaveIfError(authMgrClient.Connect());
-	CleanupClosePushL(authMgrClient);
-
-	TInt err(0);
-	TPluginId pluginId = 536883941;
-			
-	TRAP(err, authMgrClient.SetPreferredTypePluginL(EAuthKnowledge, pluginId));
-	CheckFailL(err, _L("AuthServer::SetPreferredTypePluginL()."));
-
-	TIdentityId identity = 420; // Any thing but 0 since client does sanity check
-	
-	TRAP(err, authMgrClient.RemoveIdentityL(identity));
-	CheckFailL(err, _L("AuthServer::RemoveIdentityL()."));
-		
-	TRAP(err, authMgrClient.ResetIdentityL(identity, _L("")));
-	CheckFailL(err, _L("AuthServer::ResetIdentityL() 1st overload."));
-
-	TRAP(err, authMgrClient.ResetIdentityL(identity, EAuthKnowledge, _L("")));
-	CheckFailL(err, _L("AuthServer::ResetIdentityL() 2nd overload."));
-
-	RArray<TPluginId> pluginList;
-	CleanupClosePushL(pluginList);
-	RPointerArray<const HBufC> regDataList;
-	CleanupResetAndDestroyPushL(regDataList);
-	pluginList.AppendL(pluginId);
-	regDataList.AppendL(KNullDesC().AllocL());
-	TRAP(err, authMgrClient.ResetIdentityL(identity, pluginList, regDataList));
-	CheckFailL(err, _L("AuthServer::ResetIdentityL() 3rd overload."));
-	CleanupStack::PopAndDestroy(2, &pluginList);
-
-	CleanupStack::PopAndDestroy(&authMgrClient);
-	}
-	
--- a/authenticationservices/authenticationserver/test/securitytests/source/authwriteuserdata.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,77 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include "authwriteuserdata.h"
-#include <e32def.h>
-
-_LIT(KAuthWriteUserDataSecName, "Auth WriteUserData APIs test");
-
-using namespace AuthServer;
-
-CAuthWriteUserDataSecTest* CAuthWriteUserDataSecTest::NewL()
-	{
-	CAuthWriteUserDataSecTest* self=new(ELeave) CAuthWriteUserDataSecTest();
-	CleanupStack::PushL(self);
-	self->ConstructL();
-	CleanupStack::Pop(self);
-	return self;
-	}
-
-CAuthWriteUserDataSecTest::CAuthWriteUserDataSecTest()
-	{
-	SetCapabilityRequired(ECapabilityWriteUserData);
-	}
-	
-void CAuthWriteUserDataSecTest::ConstructL()
-	{
-	SetNameL(KAuthWriteUserDataSecName);
-	}
-
-void CAuthWriteUserDataSecTest::RunTestL()
-	{
-	AuthServer::RAuthMgrClient authMgrClient;	
-	User::LeaveIfError(authMgrClient.Connect());
-	CleanupClosePushL(authMgrClient);
-	
-	TInt err(0);
-	TIdentityId id = 34567890;
-		
-	TRAP(err, authMgrClient.SetIdentityStringL(id, KAuthWriteUserDataSecName));
-	CheckFailL(err, _L("AuthServer::SetIdentityStringL()."));
-	
-	TRAP(err, DoTestL(authMgrClient));
-	CheckFailL(err, _L("AuthServer::TrainPlugin()."));
-	
-	TPluginId pluginId = 11113100;
-	TRAP(err, authMgrClient.ForgetPluginL(id, pluginId));
-	CheckFailL(err, _L("AuthServer::ForgetPluginL()."));
-		
-	CleanupStack::PopAndDestroy(&authMgrClient);
-	}
-	
-void CAuthWriteUserDataSecTest::DoTestL(AuthServer::RAuthMgrClient& aAuthMgrClient)
-	{
-	TRequestStatus status;
-	TIdentityId id = 34567890;
-	TPluginId pluginId = 11113100;
-	
-	aAuthMgrClient.TrainPlugin(id, pluginId, status);
-	User::WaitForRequest(status);
-	
-	User::LeaveIfError(status.Int());
-	}
--- a/authenticationservices/authenticationserver/test/tAuthSvr/bwins/tAuthSvrServerU.DEF	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,3 +0,0 @@
-EXPORTS
-	?NewServer@@YAHXZ @ 1 NONAME ; int __cdecl NewServer(void)
-
--- a/authenticationservices/authenticationserver/test/tAuthSvr/bwins/tMiscAuthPluginU.def	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,3 +0,0 @@
-EXPORTS
-	?ImplementationGroupProxy@@YAPBUTImplementationProxy@@AAH@Z @ 1 NONAME ; struct TImplementationProxy const * ImplementationGroupProxy(int &)
-
--- a/authenticationservices/authenticationserver/test/tAuthSvr/group/tAuthPlugin.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,69 +0,0 @@
-/*
-* Copyright (c) 2001-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-TARGET tauthplugin.dll
-TARGETTYPE PLUGIN
-
-// ECom Dll recognition UID followed by the unique UID for this dll
-UID 0x10009D8D 0x10204F10
-VENDORID 0x70000001
-CAPABILITY All -TCB
-
-SOURCEPATH	../src
-SOURCE		main.cpp
-SOURCE		proxy.cpp
-SOURCE		tPinAuthPlugin.cpp		//One of the implementations available
-
-
-start resource 10204F10.rss
-#ifdef SYMBIAN_SECURE_ECOM
-TARGET tauthplugin.rsc
-#endif
-end
-
-USERINCLUDE   	../src
-USERINCLUDE		../../../inc
-USERINCLUDE		../../../inc/authserver
-
-USERINCLUDE		../../../source/server
-USERINCLUDE		../../../source/common
-USERINCLUDE		../../../source/client
-USERINCLUDE		../../../inc_private
-
-OS_LAYER_SYSTEMINCLUDE
-SYSTEMINCLUDE OS_LAYER_PUBLIC_EXPORT_PATH(ecom)
-
-//Use of Test Execute logging functions
-//OS_LAYER_SYSTEMINCLUDE(test)
-//LIBRARY			testexecuteutils.lib
-//LIBRARY			testexecutelogclient.lib
-
-LIBRARY cinidata.lib	// add text INI file parsing ability
-LIBRARY ecom.lib	//ECOM plug-in DLLs must link against ECOM.lib
-
-LIBRARY	euser.lib 	//For LowerCase()
-LIBRARY	efsrv.lib
-
-LIBRARY	authcommon.lib
-
-//LIBRARY c32.lib bafl.lib	
-
-//#ifdef	__SWI_LOGGING__
-//LIBRARY			flogger.lib
-//#endif	/* __SWI_LOGGING__ */
-SMPSAFE
--- a/authenticationservices/authenticationserver/test/tAuthSvr/group/tAuthSvr.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,75 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-TARGET			tauthsvr.exe
-TARGETTYPE		exe
-UID				0x1000007A 0x10204F0D
-VENDORID		0x70000001
-
-CAPABILITY		AllFiles ReadUserData WriteUserData ReadDeviceData WriteDeviceData TrustedUI
-
-OS_LAYER_SYSTEMINCLUDE
-SYSTEMINCLUDE OS_LAYER_PLATFORM_EXPORT_PATH(test)
-
-USERINCLUDE		../../../source/server
-USERINCLUDE		../../../source/common
-USERINCLUDE		../../../source/client
-USERINCLUDE		../../../inc_private
-USERINCLUDE		../../../../../cryptomgmtlibs/securitytestfw/test/testutil/client
-USERINCLUDE             ../../../inc/authserver
-
-SOURCEPATH  	../../tauthdb
-USERINCLUDE  	../../tauthdb
-SOURCE			step_createtestdb.cpp
-
-SOURCEPATH  		../src
-USERINCLUDE   	../src
-USERINCLUDE		../../../inc_private
-SOURCE			tAuthSvrServer.cpp
-SOURCE			step_FirstStart.cpp
-SOURCE			step_base.cpp
-SOURCE			step_AuthSvrCheck.cpp
-SOURCE			step_RegIdentity.cpp
-SOURCE			step_IdentifyMultiple.cpp
-SOURCE			step_retrainplugin.cpp
-SOURCE			step_removedbs.cpp
-SOURCE			step_removeauthmethod.cpp
-SOURCE			step_removeidentity.cpp
-SOURCE			step_authenticate.cpp
-SOURCE			step_setauthprefs.cpp
-SOURCE			step_resultavailability.cpp  ../../../source/server/authdb.cpp ../../../source/server/transientkeyinfo.cpp ../../../source/server/transientkey.cpp ../../../source/server/encryptedprotectionkey.cpp step_resetidentity.cpp
-SOURCE			step_postmarketplugin.cpp
-SOURCE			step_clientsidsupport.cpp
-SOURCE			step_oom.cpp
-SOURCE			step_multithreaded.cpp
-
-
-LIBRARY			testexecutelogclient.lib testexecuteutils.lib
-LIBRARY			ecom.lib c32.lib bafl.lib
-LIBRARY			edbms.lib estor.lib efsrv.lib euser.lib
-LIBRARY         authclient.lib authcommon.lib scsclient.lib
-LIBRARY         random.lib pbe.lib cryptography.lib
-LIBRARY			sectcbutil.lib
-LIBRARY 		cinidata.lib	// add text INI file parsing ability
-LIBRARY			centralrepository.lib
-LIBRARY			testutilclient.lib
-#ifdef	__SWI_LOGGING__
-LIBRARY			flogger.lib
-#endif	/* __SWI_LOGGING__ */
-
-SMPSAFE
--- a/authenticationservices/authenticationserver/test/tAuthSvr/group/tMiscAuthPlugin.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,48 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-TARGET			tmiscauthplugin.dll
-TARGETTYPE		PLUGIN
-UID			0x10009d8d 0x10204F0F
-VENDORID		0x70000001
-CAPABILITY              ALL -TCB
-SOURCEPATH		../miscPlugins\
-
-SOURCE			tpluginbase.cpp
-SOURCE			proxy.cpp
-
-START RESOURCE        10204f0f.rss
-#ifdef SYMBIAN_SECURE_ECOM
-TARGET tmiscauthplugin.rsc
-#endif
-END
-USERINCLUDE		. 
-USERINCLUDE		../../../inc
-USERINCLUDE		../../../inc/authserver
-
-USERINCLUDE		../../../source/server
-USERINCLUDE		../../../source/common
-USERINCLUDE		../../../source/client
-
-OS_LAYER_SYSTEMINCLUDE
-SYSTEMINCLUDE OS_LAYER_PLATFORM_EXPORT_PATH(test)
-
-LIBRARY		euser.lib
-LIBRARY     ecom.lib
-SMPSAFE
-  
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/tAuthSvr/group/tauthpluginupgrade.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,58 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-TARGET tauthpluginupgrade.dll
-TARGETTYPE PLUGIN
-
-// ECom Dll recognition UID followed by the unique UID for this dll
-UID 0x10009D8D 0x10204F10
-VENDORID 0x70000001
-CAPABILITY All -TCB
-
-SOURCEPATH	../src
-SOURCE		main.cpp
-SOURCE		proxy.cpp
-SOURCE		tpinauthpluginupgrade.cpp	//a dummy dll upgrade implementation.
-
-
-start resource 10204F10_upgrade.rss
-#ifdef SYMBIAN_SECURE_ECOM
-TARGET tauthpluginupgrade.rsc
-#endif
-end
-
-USERINCLUDE   	../src
-USERINCLUDE		../../../inc
-USERINCLUDE		../../../inc/authserver
-USERINCLUDE		../../../inc_private
-
-USERINCLUDE		../../../source/server
-USERINCLUDE		../../../source/common
-USERINCLUDE		../../../source/client
-
-OS_LAYER_SYSTEMINCLUDE
-SYSTEMINCLUDE OS_LAYER_PUBLIC_EXPORT_PATH(ecom)
-
-LIBRARY cinidata.lib	// add text INI file parsing ability
-LIBRARY ecom.lib	//ECOM plug-in DLLs must link against ECOM.lib
-
-LIBRARY	euser.lib 	//For LowerCase()
-LIBRARY	efsrv.lib
-LIBRARY authcommon.lib
-
-SMPSAFE
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/tAuthSvr/group/tauthsvrnc.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,74 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-TARGET			tauthsvrnc.exe
-TARGETTYPE		exe
-UID				0x1000007A 0x10204F12
-VENDORID		0x70000001
-
-
-OS_LAYER_SYSTEMINCLUDE
-SYSTEMINCLUDE OS_LAYER_PLATFORM_EXPORT_PATH(test)
-
-USERINCLUDE		../../../source/server
-USERINCLUDE		../../../source/common
-USERINCLUDE		../../../source/client
-USERINCLUDE		../../../inc_private
-USERINCLUDE		../../../../../cryptomgmtlibs/securitytestfw/test/testutil/client
-USERINCLUDE             ../../../inc/authserver
-
-SOURCEPATH  	../../tauthdb
-USERINCLUDE  	../../tauthdb
-SOURCE			step_createtestdb.cpp
-
-SOURCEPATH  		../src
-USERINCLUDE   	../src
-USERINCLUDE   	../../../inc_private
-SOURCE			tauthsvrservernc.cpp
-SOURCE			step_FirstStart.cpp
-SOURCE			step_base.cpp
-SOURCE			step_AuthSvrCheck.cpp
-SOURCE			step_RegIdentity.cpp
-SOURCE			step_IdentifyMultiple.cpp
-SOURCE			step_retrainplugin.cpp
-SOURCE			step_removedbs.cpp
-SOURCE			step_removeauthmethod.cpp
-SOURCE			step_removeidentity.cpp
-SOURCE			step_authenticate.cpp
-SOURCE			step_setauthprefs.cpp
-
-
-SOURCE          ../../../source/server/authdb.cpp
-SOURCE          ../../../source/server/transientkeyinfo.cpp
-SOURCE          ../../../source/server/transientkey.cpp
-SOURCE          ../../../source/server/encryptedprotectionkey.cpp
-
-LIBRARY			testexecutelogclient.lib testexecuteutils.lib
-LIBRARY			ecom.lib c32.lib bafl.lib
-LIBRARY			edbms.lib estor.lib efsrv.lib euser.lib
-LIBRARY         authclient.lib authcommon.lib scsclient.lib
-LIBRARY         random.lib pbe.lib cryptography.lib
-LIBRARY			sectcbutil.lib
-LIBRARY 		cinidata.lib	// add text INI file parsing ability
-LIBRARY			testutilclient.lib
-LIBRARY			centralrepository.lib
-#ifdef	__SWI_LOGGING__
-LIBRARY			flogger.lib
-#endif	/* __SWI_LOGGING__ */
-
-SMPSAFE
--- a/authenticationservices/authenticationserver/test/tAuthSvr/group/tauthsvrwdd.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,74 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-TARGET			tauthsvrwdd.exe
-TARGETTYPE		exe
-UID				0x1000007A 0x10204F11
-VENDORID		0x70000001
-CAPABILITY		AllFiles ReadUserData WriteUserData ReadDeviceData WriteDeviceData
-
-OS_LAYER_SYSTEMINCLUDE
-SYSTEMINCLUDE OS_LAYER_PLATFORM_EXPORT_PATH(test)
-
-USERINCLUDE		../../../source/server
-USERINCLUDE		../../../source/common
-USERINCLUDE		../../../source/client
-USERINCLUDE		../../../../../cryptomgmtlibs/securitytestfw/test/testutil/client
-USERINCLUDE             ../../../inc/authserver
-
-USERINCLUDE		../../../inc_private
-SOURCEPATH  	../../tauthdb
-USERINCLUDE  	../../tauthdb
-SOURCE			step_createtestdb.cpp
-
-SOURCEPATH  		../src
-USERINCLUDE   	../src
-USERINCLUDE   	../../../inc_private
-
-SOURCE			tauthsvrserverwdd.cpp
-SOURCE			step_FirstStart.cpp
-SOURCE			step_base.cpp
-SOURCE			step_AuthSvrCheck.cpp
-SOURCE			step_RegIdentity.cpp
-SOURCE			step_IdentifyMultiple.cpp
-SOURCE			step_retrainplugin.cpp
-SOURCE			step_removedbs.cpp
-SOURCE			step_removeauthmethod.cpp
-SOURCE			step_removeidentity.cpp
-SOURCE			step_authenticate.cpp
-SOURCE			step_setauthprefs.cpp
-
-SOURCE          ../../../source/server/authdb.cpp
-SOURCE          ../../../source/server/transientkeyinfo.cpp
-SOURCE          ../../../source/server/transientkey.cpp
-SOURCE          ../../../source/server/encryptedprotectionkey.cpp
-
-LIBRARY			testexecutelogclient.lib testexecuteutils.lib
-LIBRARY			ecom.lib c32.lib bafl.lib
-LIBRARY			edbms.lib estor.lib efsrv.lib euser.lib
-LIBRARY         authclient.lib authcommon.lib scsclient.lib
-LIBRARY         random.lib pbe.lib cryptography.lib
-LIBRARY			sectcbutil.lib
-LIBRARY 		cinidata.lib	// add text INI file parsing ability
-LIBRARY			testutilclient.lib
-LIBRARY			centralrepository.lib
-#ifdef	__SWI_LOGGING__
-LIBRARY			flogger.lib
-#endif	/* __SWI_LOGGING__ */
-
-SMPSAFE
--- a/authenticationservices/authenticationserver/test/tAuthSvr/group/tpostmarketramplugin.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,59 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-TARGET tpostmarketramplugin.dll
-TARGETTYPE PLUGIN
-
-// ECom Dll recognition UID followed by the unique UID for this dll
-UID 0x10009D8D 0x1023F3F4
-VENDORID 0x70000001
-CAPABILITY All -TCB
-
-VERSION 10.1
-
-SOURCEPATH	../tpostmarketplugins
-SOURCE		main.cpp
-SOURCE		proxy.cpp
-SOURCE		tpostmarketramplugin.cpp		//dummy implementation of a RAM plugin.
-
-start resource testdata/1023F3F4.rss
-#ifdef SYMBIAN_SECURE_ECOM
-TARGET tpostmarketramplugin.rsc
-#endif
-end
-
-USERINCLUDE   	../tpostmarketplugins
-USERINCLUDE		../../../inc
-USERINCLUDE		../../../inc/authserver
-USERINCLUDE		../../../inc_private
-
-USERINCLUDE		../../../source/server
-USERINCLUDE		../../../source/common
-USERINCLUDE		../../../source/client
-
-OS_LAYER_SYSTEMINCLUDE
-SYSTEMINCLUDE OS_LAYER_PUBLIC_EXPORT_PATH(ecom)
-
-LIBRARY cinidata.lib	// add text INI file parsing ability
-LIBRARY ecom.lib	//ECOM plug-in DLLs must link against ECOM.lib
-
-LIBRARY	euser.lib 	//For LowerCase()
-LIBRARY	efsrv.lib
-LIBRARY authcommon.lib
-
-SMPSAFE
--- a/authenticationservices/authenticationserver/test/tAuthSvr/miscPlugins/10204F0F.rss	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,168 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Registry file for the miscellaneous authServer Interface Implementation Collection
-* UIDs quick-ref
-* ECOM DLL UID:			0x10204F0F 
-* ECOM interface UID:		0x102740FE
-* ECOM Implementation:		0x11113000
-*
-*/
-
-
-/**
- @file 10204F0F.rss
-*/
-
-
-#include "RegistryInfoV2.rh"
-
-// Declares info for one implementation
-RESOURCE REGISTRY_INFO theInfo
-	{
-	// UID for the plug-in DLL; matches name of this file
-	dll_uid = 0x10204F0F;
-	resource_format_version = RESOURCE_FORMAT_VERSION_2;
-
-	// Declare array of interface info
-	interfaces = 
-		{
-		INTERFACE_INFO
-		 	{
-		 	// UID of interface that is implemented (i.e. CAuthPluginInterface)							
-		 	interface_uid = 0x102740FE;			
-			implementations = 
-				{
-				IMPLEMENTATION_INFO
-					{
-					implementation_uid = 0x11112FFF;
-					version_no = 1;
-					display_name = "11112FFF Implementation of AuthServer plugin -Unknown";
-					default_data = "11112FFF";
-					opaque_data = "";
-					rom_only=1;
-					},				
-				IMPLEMENTATION_INFO
-					{
-					implementation_uid = 0x11113000;
-					version_no = 1;
-					display_name = "11113000 Implementation of AuthServer plugin";
-					default_data = "11113000";
-					opaque_data = "";
-					rom_only=1;
-					},
-				// Info for CTPlugin11113001
-				IMPLEMENTATION_INFO
-					{
-					implementation_uid = 0x11113001;
-					version_no = 1;
-					display_name = "11113001 Implementation of AuthServer plugin";
-					//default_data is used for cue lookup by the default ECOM resolver
-					default_data = "11113001";
-					//default_data = "text/wml||This is the type of data that this implementation understands. (Can be anything which will allow the resolver to identify this implementation as the correct one at run time. In this case it is a mime type).";
-					opaque_data = "";
-					rom_only=1;
-					},
-				IMPLEMENTATION_INFO
-					{
-					implementation_uid = 0x11113002;
-					version_no = 1;
-					display_name = "11113002 Implementation of AuthServer plugin";
-					//default_data is used for cue lookup by the default ECOM resolver
-					default_data = "11113002";
-					//default_data = "text/wml||This is the type of data that this implementation understands. (Can be anything which will allow the resolver to identify this implementation as the correct one at run time. In this case it is a mime type).";
-					opaque_data = "";
-					rom_only=1;
-					},				
-					IMPLEMENTATION_INFO
-					{
-					implementation_uid = 0x11113003;
-					version_no = 1;
-					display_name = "11113003 Implementation of AuthServer plugin";
-					//default_data is used for cue lookup by the default ECOM resolver
-					default_data = "11113003";
-					//default_data = "text/wml||This is the type of data that this implementation understands. (Can be anything which will allow the resolver to identify this implementation as the correct one at run time. In this case it is a mime type).";
-					opaque_data = "";
-					rom_only=1;
-					},
-				IMPLEMENTATION_INFO
-					{
-					implementation_uid = 0x11113004;
-					version_no = 1;
-					display_name = "11113004 Implementation of AuthServer plugin";
-					//default_data is used for cue lookup by the default ECOM resolver
-					default_data = "11113004";
-					//default_data = "text/wml||This is the type of data that this implementation understands. (Can be anything which will allow the resolver to identify this implementation as the correct one at run time. In this case it is a mime type).";
-					opaque_data = "";
-					rom_only=1;
-					},
-				IMPLEMENTATION_INFO
-					{
-					implementation_uid = 0x11113005;
-					version_no = 1;
-					display_name = "11113005 Implementation of AuthServer plugin";
-					//default_data is used for cue lookup by the default ECOM resolver
-					default_data = "11113005";
-					//default_data = "text/wml||This is the type of data that this implementation understands. (Can be anything which will allow the resolver to identify this implementation as the correct one at run time. In this case it is a mime type).";
-					opaque_data = "";
-					rom_only=1;
-					},
-				IMPLEMENTATION_INFO
-					{
-					implementation_uid = 0x11113006;
-					version_no = 1;
-					display_name = "11113006 Implementation of AuthServer plugin";
-					//default_data is used for cue lookup by the default ECOM resolver
-					default_data = "11113006";
-					//default_data = "text/wml||This is the type of data that this implementation understands. (Can be anything which will allow the resolver to identify this implementation as the correct one at run time. In this case it is a mime type).";
-					opaque_data = "";
-					rom_only=1;
-					},
-				IMPLEMENTATION_INFO
-					{
-					implementation_uid = 0x11113007;
-					version_no = 1;
-					display_name = "11113007 Implementation of AuthServer plugin";
-					//default_data is used for cue lookup by the default ECOM resolver
-					default_data = "11113007";
-					//default_data = "text/wml||This is the type of data that this implementation understands. (Can be anything which will allow the resolver to identify this implementation as the correct one at run time. In this case it is a mime type).";
-					opaque_data = "";
-					rom_only=1;
-					},
-				IMPLEMENTATION_INFO
-					{
-					implementation_uid = 0x11113008;
-					version_no = 1;
-					display_name = "11113008 Implementation of AuthServer plugin";
-					//default_data is used for cue lookup by the default ECOM resolver
-					default_data = "11113008";
-					//default_data = "text/wml||This is the type of data that this implementation understands. (Can be anything which will allow the resolver to identify this implementation as the correct one at run time. In this case it is a mime type).";
-					opaque_data = "";
-					rom_only=1;
-					},										
-				IMPLEMENTATION_INFO
-					{
-					implementation_uid = 0x11113009;
-					version_no = 1;
-					display_name = "11113009 Implementation of AuthServer plugin";
-					//default_data is used for cue lookup by the default ECOM resolver
-					default_data = "11113009";
-					//default_data = "text/wml||This is the type of data that this implementation understands. (Can be anything which will allow the resolver to identify this implementation as the correct one at run time. In this case it is a mime type).";
-					opaque_data = "";
-					rom_only=1;
-					}
-				};	
-			}
-		};			
-	}		
--- a/authenticationservices/authenticationserver/test/tAuthSvr/miscPlugins/authplugininterface.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,122 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-/**
- @file
-*/
-
-#include "authserver_client.h"
-#include <authserver/authplugininterface.h>
-
-using namespace AuthServer;
-
-//EXPORT_C CAuthPluginInterface::CAuthPluginInterface()
-//	{}
-
-EXPORT_C CAuthPluginInterface::~CAuthPluginInterface()
-	{
-	// Destroy any instance variables and then
-	// inform the framework that this specific
-	// instance of the interface has been destroyed.
-	REComSession::DestroyedImplementation(iDtor_ID_Key);
-	}
-/*
-EXPORT_C CAuthPluginInterface* CAuthPluginInterface::NewL()
-	{// Hardcoded to be the PIN plugin by default
-	
-	const TUid KPINPluginUid = { 0x102740FD };
-	TAny* defaultPlugin = REComSession::CreateImplementationL(KPINPluginUid, _FOFF(CAuthPluginInterface, iDtor_ID_Key));
-	return (reinterpret_cast<CAuthPluginInterface*>(defaultPlugin));
-	}
-*/
-
-EXPORT_C CAuthPluginInterface* CAuthPluginInterface::NewL(TPluginId aPluginId)
-	{// Use the default ECOM resolver
-/*	
-	//TDesC8& aCue = aPluginId;
-	//aCue = aPluginId;
-	TBuf8<32> cueValue;
-	//TDes8 cueValue;
-	_LIT8(KFormatValue2, "%x");
-	cueValue.Format(KFormatValue2, aPluginId);		
-
-	TEComResolverParams resolverParams;
-	resolverParams.SetDataType(cueValue);	//(aCue);
-	
-	resolverParams.SetWildcardMatch(ETrue);	//There might be problems with this
-	
-	//TAny* pluginInterface =	REComSession::CreateImplementationL(KCAuthPluginInterfaceUid,
-	//_FOFF(CAuthPluginInterface,iDtor_ID_Key),NULL,resolverParams);
-	TAny* pluginInterface =	REComSession::CreateImplementationL(KCAuthPluginInterfaceUid,
-	_FOFF(CAuthPluginInterface,iDtor_ID_Key),resolverParams);
-
-
-	return (reinterpret_cast<CAuthPluginInterface*>(pluginInterface));
-*/
-  TEComResolverParams resolverParams;
-  TBufC8<16> pluginIdTxt;
-  
-  pluginIdTxt.Des().Format(_L8("%x"), aPluginId);
-  
-  resolverParams.SetDataType(pluginIdTxt);
-  
-  TAny* plugin = 0; 
-
-  plugin = 
-	REComSession::CreateImplementationL(KCAuthPluginInterfaceUid,
-										_FOFF(CAuthPluginInterface,
-											  iDtor_ID_Key),
-										resolverParams,
-										KRomOnlyResolverUid);	
-	return reinterpret_cast<CAuthPluginInterface*>(plugin);										
-	}
-
-
-EXPORT_C void CAuthPluginInterface::ListImplementationsL(RImplInfoPtrArray& aImplInfoArray)
-	{
-	REComSession::ListImplementationsL(KCAuthPluginInterfaceUid, aImplInfoArray);
-	}
-
-const TPtrC& CAuthPluginInterface::GetName() const
-	{
-	return iName;
-	}
-	
-const TPtrC& CAuthPluginInterface::GetDescription() const
-	{
-	return iDescription;
-	}
-	
-TAuthPluginType CAuthPluginInterface::GetType() const
-	{
-	return iType;
-	}
-
-/** DLL Entry point */
-//GLDEF_C TInt E32Dll(TDllReason /*aReason*/)
-//	{
-//	return(KErrNone);
-//	}
-
-/*
-//Defined in main.cpp
-TBool E32Dll()
-	{
-	return (ETrue);
-	}
-*/
--- a/authenticationservices/authenticationserver/test/tAuthSvr/miscPlugins/main.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,32 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-
-#include <e32base.h>
-
-/** DLL Entry point */
-
-//GLDEF_C TInt E32Dll(TDllReason /*aReason*/)
-//	{
-//	return(KErrNone);
-//	}
-
-TBool E32Dll()
-	{
-	return (ETrue);
-	}
--- a/authenticationservices/authenticationserver/test/tAuthSvr/miscPlugins/proxy.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,48 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-
-#include <e32std.h>
-#include <ecom/ImplementationProxy.h>	// ECOM header file
-//#include <ImplementationInformation.h>
-
-#include "tPluginBase.h"			// Class definition for with the available implementations
-
-
-// Map the interface UIDs to implementation factory functions
-const TImplementationProxy ImplementationTable[] = 
-	{
-		IMPLEMENTATION_PROXY_ENTRY(0x11112FFF,	CTPlugin11112FFF::NewL),
-		IMPLEMENTATION_PROXY_ENTRY(0x11113000,	CTPlugin11113000::NewL),
-		IMPLEMENTATION_PROXY_ENTRY(0x11113001,	CTPlugin11113001::NewL),		
-		IMPLEMENTATION_PROXY_ENTRY(0x11113002,	CTPlugin11113002::NewL),
-		IMPLEMENTATION_PROXY_ENTRY(0x11113003,	CTPlugin11113003::NewL),
-		IMPLEMENTATION_PROXY_ENTRY(0x11113004,	CTPlugin11113004::NewL),
-		IMPLEMENTATION_PROXY_ENTRY(0x11113005,	CTPlugin11113005::NewL),
-		IMPLEMENTATION_PROXY_ENTRY(0x11113006,	CTPlugin11113006::NewL),
-		IMPLEMENTATION_PROXY_ENTRY(0x11113007,	CTPlugin11113007::NewL),
-		IMPLEMENTATION_PROXY_ENTRY(0x11113008,	CTPlugin11113008::NewL),
-		IMPLEMENTATION_PROXY_ENTRY(0x11113009,	CTPlugin11113009::NewL)
-	};
-
-// Exported proxy function to resolve intstantiation methods for an ECOM plugin dll
-EXPORT_C const TImplementationProxy* ImplementationGroupProxy(TInt& aTableCount)
-	{
-	aTableCount = sizeof(ImplementationTable) / sizeof(TImplementationProxy);
-	return ImplementationTable;
-	}
--- a/authenticationservices/authenticationserver/test/tAuthSvr/miscPlugins/tPluginBase.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,357 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* tMiscAuthPlugin.cpp
-* Improvements: 
-*
-*/
-
- 
-
-#include <f32file.h>
-
-
-#ifndef __INIPARSER_H__
-	#include <cinidata.h>
-#endif // __INIPARSER_H__
-
-#include "tPluginBase.h"
-#include <e32svr.h>
-#include <authserver/auth_srv_errs.h>
-
-TBool E32Dll()
-{
-
-	return ETrue;
-}
-
-
-// Construction and destruction functions
-//CTPluginUnknown* CTPluginUnknown::NewL(const TPluginId aPluginId)
-CTPluginUnknown* CTPluginUnknown::NewL()
- 	{
- 	CTPluginUnknown* self = new (ELeave) CTPluginUnknown();
- 	CleanupStack::PushL(self);
- 	self->ConstructL();
- 	CleanupStack::Pop();
- 	return self;
-	}
-
-CTPluginUnknown::~CTPluginUnknown()
-	{}
-
-//CTPluginUnknown::CTPluginUnknown(const TPluginId aPluginId)
-CTPluginUnknown::CTPluginUnknown()
-	{ // See ConstructL() for initialisation completion.
-	}
-		
-void CTPluginUnknown::ConstructL()
-// Safely complete the initialization of the constructed object	
-	{
-	
-	//TUid iDtor_ID_Key;
-	
-	// Initialise member data
-	/*
-	iName = "Pin1";
-	iDescription = "PIN Plugin";
-	iMinEntropy = 0.8;
-	iFalsePositiveRate = 1;
-	iFalseNegativeRate = 1;
-	iType = EAuthKnowledge;
-	
-	// TPtrC iName;
-	// TPtrC iDescription;
-	// TEntropy iMinEntropy;
-	// TPercentage iFalsePositiveRate;
-	// TPercentage iFalseNegativeRate;
-	// TPluginType iType;
-	*/
-	
-	iSupportsDefaultData = true;
-	iNumTimesTrained = 0;
-	}
-
-	
-//Implement CAuthPluginInterface definitions	
-void CTPluginUnknown::Identify(TIdentityId& aId, HBufC8*& aResult, TRequestStatus& aRequest)
-	{
-	// We are simulating user input by reading from a file
-	// (The data contained in this file has been freshly written by the 'client part in TestExecute')
-	
-	aRequest = KRequestPending;
-	//aId = USER;
-	aId = KUnknownIdentity;	//Unknown Id
-	aResult = HBufC8::New(16);
-	
-	TRequestStatus* status  = &aRequest;
-	
-	if(aResult == NULL)
-		{
-		User::RequestComplete(status, KErrNoMemory);
-		return;
-		}
-	
-	aResult->Des().Format(_L8("%x"), aId);
-	
-		
-	
-	//aRequest = AuthServer::KIdCancel;	//KIdCancel not defined yet
-	//aResult will not be updated, as specified
-	
-	
-	//aRequest = AuthServer::KIdQuit;	//KIdQuit not defined yet
-	//aResult will not be updated, as specified
-	
-	
-	//aRequest = AuthServer::KIdUnknown;		
-	
-	//return aRequest.Int();
-	
-	User::RequestComplete(status, KErrNone);
-	}
-
-void CTPluginUnknown::Cancel()
-	{	
-	}	
-	
-void CTPluginUnknown::Train(TIdentityId /*aId*/, HBufC8*& /*aResult*/, TRequestStatus& aRequest)							
-	{
-	
-	aRequest = KRequestPending;
-	iNumTimesTrained++;
-	//Possibly update aResult here, later for now we'll pretend that the plugin was cancelled
-		
-	TRequestStatus* status  = &aRequest;
-	User::RequestComplete(status, KErrAuthServPluginCancelled);
-	}
-	
-		
-TBool CTPluginUnknown::IsActive() const
-	{
-	// There is never any user intervention required
-	return true;
-	
-	// As a future development note, this value may be read from a file (or a section in a file)
-	}
-	
-TInt CTPluginUnknown::Forget(TIdentityId /*aId*/)
-	{
-	
-	//Dummy implementation	
-	return KErrNone;	
-	}
-	
-TInt CTPluginUnknown::DefaultData(TIdentityId /*aId*/, HBufC8*& aOutputBuf)
-	{
-	
-	// This implementation of the PIN plugin does support default data.
-	// There will be cases where i don't want this available. Hence the addition of a 
-	// new class member iSupportsDefaultData
-	
-	TInt result = KErrNone;
-	
-	if (iSupportsDefaultData)	//Class member initialised in the constructor
-		{
-		//_LIT(KDefaultData, "0000");	// in tPluginBase.h
-		aOutputBuf = HBufC8::New(KDefaultData().Size());
-		if(aOutputBuf == NULL)
-			{
-			return KErrNoMemory;
-			}
-		*aOutputBuf = KDefaultData;		
-		}
-	else
-		result = KErrNotSupported;
-	
-	return result;	
-	}
-
-TPluginId CTPluginUnknown::Id() const
-	{
-	return 0x11112FFF;
-	}
-
-
-
-//=========================================================================
-
-//=========================================================================
-
-// Construction and destruction functions
-/*CTPluginBase* CTPluginBase::NewL()
- 	{
-	CTPluginBase* self = new (ELeave) TMyType();
- 	CleanupStack::PushL(self);
- 	self->ConstructL();
- 	CleanupStack::Pop();
- 	return self;
-	}
-*/
-
-CTPluginBase::~CTPluginBase()
-	{}
-
-CTPluginBase::CTPluginBase()
-	{
-	// See ConstructL() for initialisation completion.
-	}
-
-void CTPluginBase::ConstructL()
-// Safely complete the initialization of the constructed object	
-	{
-	
-	//TUid iDtor_ID_Key;
-	
-	
-	/*
-	iName = "Pin1";
-	iDescription = "PIN Plugin";
-	iMinEntropy = 0.8;
-	iFalsePositiveRate = 1;
-	iFalseNegativeRate = 1;
-	iType = EAuthKnowledge;
-	
-	// TPtrC iName;
-	// TPtrC iDescription;
-	// TEntropy iMinEntropy;
-	// TPercentage iFalsePositiveRate;
-	// TPercentage iFalseNegativeRate;
-	// TPluginType iType;
-	*/
-	
-	iType = GetType();
-	
-	iSupportsDefaultData = true;
-	iNumTimesTrained = 0;
-	}
-
-	
-//Implement CAuthPluginInterface definitions
-
-void CTPluginBase::Identify(TIdentityId& aId, HBufC8*& aResult, TRequestStatus& aRequest)
-	{
-	// We are simulating user input by reading from a file
-	// (The data contained in this file has been freshly written by the 'client part in TestExecute')
-	
-//	aRequest = KRequestPending;
-//	aId = USER;
-	//delete aResult;
-//	aResult = HBufC8::NewL(16);
-	
-	//aResult->Des().Format(_L8("%x"), aResult);
-//	aResult->Des().Format(_L8("%d"), aId);
-	
-	
-	//aRequest = AuthServer::KIdCancel;	//KIdCancel not defined yet
-	//aResult will not be updated, as specified
-	
-	
-	//aRequest = AuthServer::KIdQuit;	//KIdQuit not defined yet
-	//aResult will not be updated, as specified
-	
-	
-	//aRequest = AuthServer::KIdUnknown;		
-	
-//	aRequest = KIdSuccess;
-	//return aRequest.Int();
-
-	aRequest = KRequestPending;
-	aId = GetId();
-	aResult = HBufC8::New(16);
-	
-	TRequestStatus* status = &aRequest;
-	if(aResult == NULL)
-		{
-		User::RequestComplete(status, KErrNoMemory);
-		return;
-		}
-	
-	aResult->Des().Format(_L8("%x"), aId);
-	User::RequestComplete(status, KErrNone);
-	}
-
-
-void CTPluginBase::Cancel()
-	{	
-	}
-
-void CTPluginBase::Train(TIdentityId aId, HBufC8*& aResult, TRequestStatus& aRequest)							
-	{
-	
-	aRequest = KRequestPending;
-	iNumTimesTrained++;
-	aResult = HBufC8::New(16);
-	TRequestStatus* status  = &aRequest;
-	if(aResult == NULL)
-		{
-		User::RequestComplete(status, KErrNoMemory);
-		return;
-		}
-	TInt number = iNumTimesTrained*GetId();
-	aResult->Des().Format(_L8("%x"), aId);
-	
-	User::RequestComplete(status, KErrNone);
-	}
-
-
-TBool CTPluginBase::IsActive() const
-	{
-	// There is never any user intervention required
-	return true;
-	
-	// As a future development note, this value may be read from a file (or a section in a file)
-	}
-
-TInt CTPluginBase::Forget(TIdentityId /*aId*/)
-	{
-	
-	//Dummy implementation	
-	return KErrNone;
-	
-	//Improvement
-	// If (NumTimesTrained == 0) 
-	//	return AuthServer::KIdUnknown;	// This is what is returned for the CTUnknownPlugin class
-			
-	}
-
-TInt CTPluginBase::DefaultData(TIdentityId /*aId*/, HBufC8*& aOutputBuf)
-	{
-	
-	// This implementation of the PIN plugin does support default data.
-	// There will be cases where i don't want this available. Hence the addition of a 
-	// new class member iSupportsDefaultData
-	
-	TInt result = KErrNone;
-	
-	if (iSupportsDefaultData)	//Class member initialised in the constructor
-		{
-		//_LIT(KDefaultData, "0000");	// in tPinAuthPlugin.h
-		aOutputBuf = HBufC8::New(KDefaultData().Size());
-		if(aOutputBuf == NULL)
-			{
-			return KErrNoMemory;
-			}
-		*aOutputBuf = KDefaultData;
-		}
-	else
-		result = KErrNotSupported;
-	
-	return result;	
-	}
-
-TPluginId CTPluginBase::Id() const
-	{
-	return GetId();
-	}
--- a/authenticationservices/authenticationserver/test/tAuthSvr/miscPlugins/tPluginBase.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,154 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* tMiscAuthPlugin.h
-* CTPluginUnknown and CTPluginBase are interface implementations for
-* CAuthPluginInterface
-*
-*/
-
-
-
-#ifndef T_PLUGIN_BASE_H
-#define T_PLUGIN_BASE_H
-
-//#include <ImplementationInformation.h>
-//#include <TestExecuteStepBase.h>
-//#include <TestExecuteServerBase.h>
-//#include <TestExecuteStepBase.h>
-
-#include "authPluginInterface.h"	//'authserver' folder is included in mmp file
-
-
-//An implementation of the CAuthPluginInterface definition
-
-using namespace AuthServer;
-
-class CTPluginUnknown : public CBase, public MAuthPluginInterface
-	{
-public:
-	// Two phase constructor
-	// Standardised safe construction which leaves nothing the cleanup stack.
-	static CTPluginUnknown* NewL();
-	// Destructor
-	~CTPluginUnknown();
-
-	virtual void Identify(TIdentityId& aId,  HBufC8*& aResult, TRequestStatus& aRequest);	
-	virtual void Cancel();
-	virtual void Train(TIdentityId aId, HBufC8*& aResult, TRequestStatus& aRequest);		
-
-	virtual TBool IsActive() const;
-	virtual TInt Forget(TIdentityId aId);
-	virtual TInt DefaultData(TIdentityId aId, HBufC8*& aOutputBuf);
-	virtual TPluginId Id() const;
-	
-		
-private:
-	CTPluginUnknown();
-	void ConstructL();
-	
-	// Data read from file determining if this plugin supports default data
-	TBool iSupportsDefaultData;
-	TInt iNumTimesTrained;
-	};
-
-//=========================================================================
-
-//=========================================================================	
-//implementation_uid = 0x11113000 to 0x11113031 	//(50 of them)
-
-class CTPluginBase : public CBase, public MAuthPluginInterface
-	{
-public:
-
-	// Destructor
-	~CTPluginBase();
-	
-	//Implementation of CAuthPluginInterface definitions using a PIN system
-	virtual void Identify(TIdentityId& aId,  HBufC8*& aResult, TRequestStatus& aRequest);	
-	virtual void Cancel();	
-	virtual void Train(TIdentityId aId, HBufC8*& aResult, TRequestStatus& aRequest);		
-
-	virtual TBool IsActive() const;
-	virtual TInt Forget(TIdentityId aId);
-	virtual TInt DefaultData(TIdentityId aId, HBufC8*& aOutputBuf);
-	virtual TPluginId Id() const;
-	
-	// Utility functions
-	//TInt ReadUserInputL(TBuf<32> inputValue);
-	//TInt CheckForStringPresenceL(TBuf<32> inputValue, TRequestStatus& requestValue);
-	//TInt CheckForNewStringPresenceL(TIdentityId aId, TBuf<32> inputValue, TRequestStatus& requestValue);
-	//TInt FindStringAndRemoveL(TIdentityId aId);
-
-	virtual TPluginId GetId() const = 0;
-	virtual TAuthPluginType GetType() const = 0;
-		
-//private:
-	//CTPluginBase(const TPluginId aPluginId);
-	CTPluginBase();
-	void ConstructL();
-	
-	// Data read from file determining if this plugin supports default data
-	TBool iSupportsDefaultData;	
-	// Can be used to generate results that are multiples of the plugin IDs
-	TInt iNumTimesTrained;
-	};
-
-
-// Constants used in the utility functions -File locations, etc
-//_LIT(KInitInfoFile, "c:\\tAuthSvr\\initialisation_Info.ini");
-//_LIT(KPinInputFile, "c:\\tAuthSvr\\pin_Input.ini");
-//_LIT(KPinContentsFile, "c:\\tAuthSvr\\pin_Contents.ini");
-//_LIT8(KDefaultData, "0000");
-_LIT8(KDefaultData, "CCCCCCCCCCCCCCCCCCCC");
-
-// Provide a consistent naming structure
-typedef CTPluginUnknown CTPlugin11112FFF ;
-
-
-//=========================================================================	
-// The various classes that are spawned from this base class by inheriting the implementations besides
-// the identify() function
-
-// number is hex, type is one of the TAuthPluginType enums
-#define DEF_PLUGIN(number, type) class CTPlugin##number : public CTPluginBase\
-	{                                        \
-public:                                      \
-	typedef CTPlugin##number TMyType;        \
-	TIdentityId GetId() const                \
-	{ return 0x##number; }                   \
-	TAuthPluginType GetType() const          \
-	{ return type; }                         \
-    static TMyType* NewL()                   \
-    {										 \
-	  TMyType* r = new (ELeave) TMyType();   \
-	  r->ConstructL();						 \
-	  return r;                              \
-	}                                        \
-private:                                     \
-	}         
-
-DEF_PLUGIN(11113000, EAuthKnowledge);
-DEF_PLUGIN(11113001, EAuthKnowledge);
-DEF_PLUGIN(11113002, EAuthKnowledge);
-DEF_PLUGIN(11113003, EAuthBiometric);
-DEF_PLUGIN(11113004, EAuthBiometric);
-DEF_PLUGIN(11113005, EAuthBiometric);
-DEF_PLUGIN(11113006, EAuthToken);
-DEF_PLUGIN(11113007, EAuthToken);
-DEF_PLUGIN(11113008, EAuthToken);
-DEF_PLUGIN(11113009, EAuthToken);
-
-#endif	/* T_PLUGIN_BASE_H */
-
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/batchfiles/post_postmarketplugin.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,23 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-if exist \epoc32\data\epoc_temp.ini copy \epoc32\data\epoc_temp.ini \epoc32\data\epoc.ini
-if exist \epoc32\data\epoc_temp.ini del \epoc32\data\epoc_temp.ini
-
-rmdir /s /q \epoc32\winscw\c\sys
-rmdir /s /q \epoc32\winscw\c\resource\plugins
-
-REM deletes cloned client tauthsvr_1.exe (cloned using SETCAP)
-del \epoc32\winscw\c\sys\bin\tauthsvr_new.exe
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/batchfiles/post_tauthsvr.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,20 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-if exist \epoc32\winscw\c\private\10202be9\persists\2001ea7f.cre del /s /f /q \epoc32\winscw\c\private\10202be9\persists\2001ea7f.cre
-
-REM deletes cloned client tauthsvr_1.exe (cloned using SETCAP)
-del \epoc32\winscw\c\sys\bin\tauthsvr_new.exe
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/batchfiles/post_tclientsidsupport.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,19 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-del \epoc32\winscw\c\sys\bin\tauthsvr1.exe
-
-REM deletes cloned client tauthsvr_1.exe (cloned using SETCAP)
-del \epoc32\winscw\c\sys\bin\tauthsvr_new.exe
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/batchfiles/posttauthsvroom.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,26 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-if exist \epoc32\data\z\resource\plugins\tauthplugin.rsc del /s /f /q \epoc32\data\z\resource\plugins\tauthplugin.rsc
-if exist \epoc32\release\winscw\udeb\z\resource\plugins\tauthplugin.rsc del /s /f /q \epoc32\release\winscw\udeb\z\resource\plugins\tauthplugin.rsc
-if exist \epoc32\release\winscw\udeb\z\resource\plugins\tauthplugin.rsc del /s /f /q \epoc32\release\winscw\udeb\z\resource\plugins\tauthplugin.rsc
-
-
-REM Restore tauthplugin.rsc after OOM tests
-
-rename \epoc32\data\z\resource\plugins\tauthplugin.rsc.backup tauthplugin.rsc 
-rename  \epoc32\release\winscw\udeb\z\resource\plugins\tauthplugin.rsc.backup tauthplugin.rsc
-rename \epoc32\release\winscw\urel\z\resource\plugins\tauthplugin.rsc.backup tauthplugin.rsc 
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/batchfiles/pre_patchdata_negative.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,17 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-copy \epoc32\data\epoc.ini \epoc32\data\epoc_temp.ini
-copy \epoc32\data\epoc_patchdatanegative.ini \epoc32\data\epoc.ini
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/batchfiles/pre_patchdata_positive.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,17 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-copy \epoc32\data\epoc.ini \epoc32\data\epoc_temp.ini
-copy \epoc32\data\epoc_patchdatapositive.ini \epoc32\data\epoc.ini
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/batchfiles/pre_postmarketplugin.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,17 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-copy \epoc32\data\epoc.ini \epoc32\data\epoc_temp.ini
-copy \epoc32\data\epoc_enablepostmarketplugin.ini \epoc32\data\epoc.ini
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/batchfiles/pretauthsvroom.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,25 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-if exist \epoc32\winscw\c\private\10202be9\persists\2001ea7f.cre del /s /f /q \epoc32\winscw\c\private\10202be9\persists\2001ea7f.cre
-if exist \epoc32\data\z\resource\plugins\tauthplugin.rsc.backup del /s /f /q \epoc32\data\z\resource\plugins\tauthplugin.rsc.backup
-if exist \epoc32\release\winscw\udeb\z\resource\plugins\tauthplugin.rsc.backup del /s /f /q \epoc32\release\winscw\udeb\z\resource\plugins\tauthplugin.rsc.backup
-if exist \epoc32\release\winscw\urel\z\resource\plugins\tauthplugin.rsc.backup del /s /f /q \epoc32\release\winscw\urel\z\resource\plugins\tauthplugin.rsc.backup
-
-REM Rename tauthplugin.rsc to prevent loading of test plugins for OOM tests
-rename \epoc32\data\z\resource\plugins\tauthplugin.rsc tauthplugin.rsc.backup
-rename \epoc32\release\winscw\udeb\z\resource\plugins\tauthplugin.rsc tauthplugin.rsc.backup
-rename \epoc32\release\winscw\urel\z\resource\plugins\tauthplugin.rsc tauthplugin.rsc.backup
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/batchfiles/te_tauthsvr4_post1.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,22 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-REM Remove the .cre file
-del /s /f /q \epoc32\winscw\c\private\10202be9\persists\2001ea7f.cre
-
-REM Restore the Cenrep file with the backup.
-copy \epoc32\winscw\c\tauth\tauthsvr\testdata\2001ea7f_backup.txt \epoc32\release\winscw\udeb\z\private\10202be9\2001ea7f.txt 
-
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/batchfiles/te_tauthsvr4_pre1.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,25 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-
-REM Create a backup of the existing AuthServer Cenrep file
-copy \epoc32\release\winscw\udeb\z\private\10202be9\2001ea7f.txt \epoc32\winscw\c\tauth\tauthsvr\testdata\2001ea7f_backup.txt
-
-REM Remove the .cre file
-del /s /f /q \epoc32\winscw\c\private\10202be9\persists\2001ea7f.cre
-
-REM Copy new initialisation file
-copy \epoc32\winscw\c\tauth\tauthsvr\testdata\cenrep1.txt \epoc32\release\winscw\udeb\z\private\10202be9\2001ea7f.txt
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/batchfiles/te_tauthsvr4_pre2.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,25 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-
-REM Create a backup of the existing AuthServer Cenrep file
-copy \epoc32\release\winscw\udeb\z\private\10202be9\2001ea7f.txt \epoc32\winscw\c\tauth\tauthsvr\testdata\2001ea7f_backup.txt
-
-REM Remove the .cre file
-del /s /f /q \epoc32\winscw\c\private\10202be9\persists\2001ea7f.cre
-
-REM Copy new initialisation file
-copy \epoc32\winscw\c\tauth\tauthsvr\testdata\cenrep2.txt \epoc32\release\winscw\udeb\z\private\10202be9\2001ea7f.txt
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/batchfiles/te_tauthsvr4_pre3.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,25 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-
-REM Create a backup of the existing AuthServer Cenrep file
-copy \epoc32\release\winscw\udeb\z\private\10202be9\2001ea7f.txt \epoc32\winscw\c\tauth\tauthsvr\testdata\2001ea7f_backup.txt
-
-REM Remove the .cre file
-del /s /f /q \epoc32\winscw\c\private\10202be9\persists\2001ea7f.cre
-
-REM Copy new initialisation file
-copy \epoc32\winscw\c\tauth\tauthsvr\testdata\cenrep3.txt \epoc32\release\winscw\udeb\z\private\10202be9\2001ea7f.txt
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/performance_log_parser.pl	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,174 +0,0 @@
-#
-# Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-# All rights reserved.
-# This component and the accompanying materials are made available
-# under the terms of the License "Eclipse Public License v1.0"
-# which accompanies this distribution, and is available
-# at the URL "http://www.eclipse.org/legal/epl-v10.html".
-#
-# Initial Contributors:
-# Nokia Corporation - initial contribution.
-#
-# Contributors:
-#
-# Description: 
-# Script: performance_log_parser.pl
-#
-
-use strict;
-use FileHandle;
-
-my $Test_Case_Start_Tag = "script START_TESTCASE";
-my $Test_Case_End_Tag = "END_TESTCASE";
-my $Event_print = "PERFORMANCE_LOG_INFORMATION";
-my $Test_Case_Actual_Duration = "TEST_CASE_ACTUAL_DURATION";
-my $ScrEventCode = 1;
-
-my $defInputFile = "/epoc32/winscw/c/logs/testexecute/tauthsvr_performance.htm";
-my $defOutputFile = "/epoc32/winscw/c/logs/authsvr_performance.txt";
-
-sub millisec
-	{  
-	no warnings 'uninitialized';
-	my ($mytime) = @_ ;
-	$mytime =~ /([0-9]*):([0-9]*):([0-9]*):([0-9]*)$/;
-	my $milisec = $4;
-	my $sec = $3;
-	my $min = $2;
-	my $hour = $1;
-
-	my $msecs = ($milisec / 1000) + ($sec *1000) + ($min * 60000) + ($hour * 3600000);
-	return $msecs;
-	}
-
-sub process_log_file
-	{
-	my ($data_file, $output_FH) = @_;
-	print $output_FH "#Test Case Name,Actual Duration(ms),Result\n";
-	
-	# enable reading whole file as one chunk
-	my $SAVE_RS = $/;
-	undef $/;
-	
-	# open and read the log file in a single line
-	open(DAT, $data_file) || die("Could not open file $data_file!");
-	my $raw_data=<DAT>;
-	close(DAT);
-	$raw_data=~ s/\n/ /g;
-
-	# restore previous record separator
-	$/ = $SAVE_RS;	
-	
-	my $num_passed = 0;
-	my $num_failed = 0;
-	
-	while ($raw_data && $raw_data =~ /$Test_Case_Start_Tag\s+(\S+)/)
-		{
-		# step through the file in chunks delimited by the start/end test case tags.
-		
-		my $test_case_name = $1;
-		my ($test_case_data) = ($raw_data =~ /$Test_Case_Start_Tag(.*?)$Test_Case_End_Tag/);
-		
-		if (not $test_case_data)
-			{
-			print STDERR "Error: Test case: $test_case_name: Suspected missing END_TESTCASE tag.\n";
-			}
-		
-		($raw_data) = ($raw_data =~ /$Test_Case_End_Tag(.*)/);
-		($raw_data) = ($raw_data =~ /($Test_Case_Start_Tag.*)/) if $raw_data;
-		
-		#my ($max_duration) = ($test_case_data =~ /$Test_Case_Max_Duration,([0-9]+)/);
-		#if (!defined $max_duration)
-			#{
-			#$max_duration = 1000;
-			#}
-			
-		my $start_time = "0";
-		my $end_time = "0";
-		my $first = 1;
-		
-		while ($test_case_data and ($test_case_data =~ /$Event_print(.*)/) )
-			{
-			# get the event time. if this is the first time value in the chunk, it is the start time of the event.
-			#otherwise, continue until reaching the last time value.
-			my $start_log_msg = $1;
-		   
-			$start_log_msg =~ /,(.+?)\s(.*)/;
-			
-			if($first == 1)
-				{
-				$start_time = $1;
-				$first = 0;
-				}
-			else
-				{
-				$end_time = $1;
-				}
-	
-			$test_case_data = $2;
-			}	
-		
-		if(!($start_time eq "0") && !($end_time eq "0"))
-			{
-			my ($actual_duration) = ($test_case_data =~ /$Test_Case_Actual_Duration,([0-9]+)/);
-			#my $actual_duration = millisec($end_time) - millisec($start_time);
-			my $result;
-			if( $actual_duration)
-				{
-				$result = "Passed";
-				$num_passed += 1;
-				}
-						
-			print $output_FH "$test_case_name,$actual_duration,$result\n";	
-			}
-		}
-	print $output_FH (sprintf "\n\n%d tests failed out of %d\n", $num_failed, $num_passed+$num_failed);
-	}
-	
-	
-sub usage
-	{
-	print <<USAGE;
-usage:
-	performance_log_parser.pl <input_file> <output_file>
-
-	<input_file>: A log file to process 
-			(default- $defInputFile)
-
-	<out_file>: Final output file name 
-			(default- $defOutputFile)
-USAGE
-	}
-
-	
-sub Main
-	{
-	my @argv = @_;
-	# if input and output files are not provided, default ones will be used
-	my $input_file = $defInputFile;
-	my $output_file = $defOutputFile;
-	
-	if(@argv > 2)
-		{
-		usage;
-		exit;
-		}
-	elsif(@argv == 2)
-		{# input and output files are provided, don't use default ones
-		$input_file = shift @argv;
-		$output_file = shift @argv;
-		}
-	
-	my $outputFH = \*STDOUT; # results to STDOUT by default
-	
-	if (defined $output_file)
-		{
-		$outputFH = FileHandle->new;
-		$outputFH->open("> $output_file") or die "Error: File $output_file: $!";
-		}
-	process_log_file($input_file,$outputFH);
-
-	$outputFH->close;
-}
-
-Main(@ARGV);
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/tAuthSvr.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,64 +0,0 @@
-# Index of key values
-#iSupportsDefaultData 	- bool that defines if the chosen plugin supports default data
-#NumIdentities		- int that defines the expected number of identities that are registered on the server
-#pluginType		- 
-#isDefaultPlugin	- No longer in use. defaultPlugin is used instead
-#defaultPlugin		- string that defines which plugin to use as the default. Used to update the AuthServer policy file
-
-[Test0001]
-iSupportsDefaultData = true
-NumIdentities = 1
-pluginType = EAuthKnowledge
-#isDefaultPlugin = true
-defaultPlugin = PIN
-
-
-[Test0002]
-iSupportsDefaultData = true
-NumIdentities = 0
-pluginType = EAuthKnowledge
-#isDefaultPlugin = false
-#defaultPlugin = PIN
-
-[Test0003]
-iSupportsDefaultData = true
-NumIdentities = 0
-pluginType = EAuthBiometric
-isDefaultPlugin = true
-defaultPlugin = FINGER
-
-
-[Test0004]
-iSupportsDefaultData = false
-NumIdentities = 0
-pluginType = EAuthKnowledge
-#isDefaultPlugin = true
-defaultPlugin = PIN
-
-
-[Test0021]
-iSupportsDefaultData = true
-NumIdentities = 0
-pluginType = EAuthKnowledge
-defaultPlugin = PIN
-
-
-
-
-
-
-
-
-
-[Copied-Test1.1]
-SIS1 = c:\tswi\trevocation\data\ocsp_02.sis
-UID1 = 11112102
-FILE1.1 = c:\sys\bin\tswiusergrantable_all.exe
-#ocsp_uri = http://lon-sysbuild03.intra:19021/
-PerformRevocationCheck = false
-validationStatus = EValidatedToAnchor
-revocationStatus = EOcspNotPerformed
-isTrusted = false
-resultDate = 0
-lastCheckDate = 0
-sameDate = true
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/tAuthSvr.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,104 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-
-PRINT Authentication Server tests...
-
-LOAD_SUITE tAuthSvr -SharedData
-//Next line makes use of the new keyword that is more readable
-//LOAD_SERVER tAuthSvr -SharedData		
-
-
-//============================================================
-//
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0001
-//! @SYMTestCaseDesc Start the authServer with no identities, having a default plugin defined
-//! 		     (FirstStart1_Normal)
-//! @SYMREQ REQ , REQ , REQ , REQ 
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Identity API
-//! @SYMTestExpectedResults Default identity is the only one listed
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0001
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	FIRST_START	c:\tAuthSvr\scripts\tauthsvr.ini Test0001
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tAuthSvr\scripts\tauthsvr.ini Test0001
-END_TESTCASE SEC-AUT-AUTHSVR-0001 
-
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0002
-//! @SYMTestCaseDesc Start the authServer with no identities, having no default plugin defined
-//! 		     (FirstStart2_NoDefaultPlugin)
-//! @SYMREQ REQ , REQ , REQ , REQ 
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have no default plugin defined, use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Identity API.
-//! @SYMTestExpectedResults KErrServerTerminated is received when trying to call the Identities API
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0002
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	FIRST_START	c:\tAuthSvr\scripts\tauthsvr.ini Test0002
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tAuthSvr\scripts\tauthsvr.ini Test0002
-END_TESTCASE SEC-AUT-AUTHSVR-0002
-
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0003
-//! @SYMTestCaseDesc Start the authServer with no identities, having a default plugin defined which is a Biometric type
-//! 		     (FirstStart3_DefaultIsBiometricType)
-//! @SYMREQ REQ , REQ , REQ , REQ 
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is of Biometric type. use a client that has ReadDeviceData 
-//!			capability to connect to the AuthServer, call the Enumerate Identity API.
-//! @SYMTestExpectedResults KErrServerTerminated is received when trying to call the Identities API
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0003
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	FIRST_START	c:\tAuthSvr\scripts\tauthsvr.ini Test0003
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tAuthSvr\scripts\tauthsvr.ini Test0003
-END_TESTCASE SEC-AUT-AUTHSVR-0003
-
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0004
-//! @SYMTestCaseDesc Start the authServer with no identities, having a default plugin which does not support the returning of a default result
-//! 		     (FirstStart4_NoDefaultResult)
-//! @SYMREQ REQ , REQ , REQ , REQ 
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which returns a default result. 
-//! 			Use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Identity API
-//! @SYMTestExpectedResults KErrServerTerminated is received when trying to call the Identities API
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0004
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	FIRST_START	c:\tAuthSvr\scripts\tauthsvr.ini Test0004
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tAuthSvr\scripts\tauthsvr.ini Test0004
-END_TESTCASE SEC-AUT-AUTHSVR-0004
-
-
-//----------------------------------------------------------------------
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0005
-//! @SYMTestCaseDesc Attempt to register a new identity
-//! 		     (RegisterIdentity1_Normal)
-//! @SYMREQ REQ , REQ , REQ , REQ 
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which supports the returning of a default result. 
-//! 			Use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//! 			Call the RegisterNewUser API with a client that has WriteDeviceData then train the 1 existing active plugin
-//!			call the Enumerate Identity API
-//! @SYMTestExpectedResults KErrServerTerminated is received when trying to call the Identities API
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0005
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tAuthSvr\scripts\tauthsvr.ini Test0021
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tAuthSvr\scripts\tauthsvr.ini Test0021
-END_TESTCASE SEC-AUT-AUTHSVR-0005
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/tAuthSvr2.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,2059 +0,0 @@
-# Index of key values
-#iSupportsDefaultData 	- bool that defines if the chosen plugin supports default data
-#NumIdentities		- int that defines the expected number of identities that are registered on the server
-#pluginType		- 
-#isDefaultPlugin	- No longer in use. defaultPlugin is used instead
-#defaultPlugin		- string that defines which plugin to use as the default. Used to update the AuthServer policy file
-#pluginId		- Hex string that is the uid of the Ecom implementation. In the Test0000 to Test0009, it's used as a cue, and is also the expected UserId
-#userResult		- Int that contains what the user has input on being prompted to 'identify', i.e. the PIN
-#			In cases where this is absent, then we're expecting the 'data' returned to be the same as the pluginId value (cueValue)
-#userId			- String that contains the expected Id
-
-#plugin1Id		- Hex string that is the uid of the Ecom implementation
-#			  	In the RetrainPlugin steps, this is the plugin that is to be trained.
-#plugin1Status		- Int that specifies the expected status of the above plugin 
-				(0, 64, 128 -EAuthUntrained, EAuthTrained, EAuthFullyTrained)
-#Pin11113100Default	- bool that defines whether the plugins support default data. Also Pin11113101Default and Pin11113102Default
-#Pin11113100Active	- bool that defines whether the plugin is active or not. Also Pin11113101Active, Pin11113102Active
-#Pin11113100InputId	- string that defines the input to the plugin. Else, the default is used. (in Identify function)
-#Pin11113100InputTrain	- string that defines the input to the plugin. Else, the default is used. (in Train function)
-#finalUserName 		- string that defines the new name (description or identitystring) of a given identity
-#retryRemove		- bool that defines whether the attempt to remove an identity is tried again in the same test step
-#freshness		- Int that defines the number of seconds(timeout) within which a cached identity is returned 
-				(Authentication is skipped)
-#forgetPlugin 		- Hex that specifies the plugin that is to be forgotten
-#forgetUnknown 		- Bool that if true means we're trying to forget an unknown identity
-
-[defaultplugin]
-default = 200032E5
-
-
-[Test0001]
-NumIdentities = 1
-pluginId = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100Default = true
-Pin11113101Default = false
-Pin11113102Default = false
-Pin11113100Active = true
-Pin11113101Active = true
-Pin11113102Active = true
-
-
-[Test0002]
-NumIdentities = 0
-pluginId = 11113100
-#EAuthFullyTrained
-plugin1Status = 1
-Pin11113100Default = false
-Pin11113101Default = false
-Pin11113102Default = false
-Pin11113100Active = true
-Pin11113101Active = true
-Pin11113102Active = true
-
-[Test0003]
-iSupportsDefaultData = true
-NumIdentities = 0
-pluginType = EAuthBiometric
-isDefaultPlugin = true
-defaultPlugin = FINGER
-Pin11113100Default = false
-Pin11113101Default = false
-Pin11113102Default = false
-Pin11113103Default = true
-Pin11113100Active = true
-Pin11113101Active = true
-Pin11113102Active = true
-Pin11113103Active = true
-
-[Test0004]
-iSupportsDefaultData = false
-NumIdentities = 0
-pluginType = EAuthKnowledge
-#isDefaultPlugin = true
-defaultPlugin = PIN
-Pin11113100Default = false
-Pin11113101Default = false
-Pin11113102Default = false
-Pin11113100Active = true
-Pin11113101Active = true
-Pin11113102Active = true
-
-[Test0021a]
-#iSupportsDefaultData = false
-pluginType = EAuthKnowledge
-defaultPlugin = PIN
-Pin11113100InputTrain = 2035
-Pin11113100Default = true
-Pin11113100Active = true
-#initUserName = SOMENAME
-finalUserName = NewNameOfId2
-
-[Test0021b]
-plugin1Id = 11113100
-Pin11113100InputId = 2035
-freshness = 0
-Pin11113100Default = true
-Pin11113100Active = true
-DisplayMessage = " Display String 1 "
-
-[Test0021c]
-NumIdentities = 2
-plugin1Id = 11113100
-plugin1Status = 64
-
-#==========================================================
-#Next section is what is according to the test spec
-[Test0022a]
-#iSupportsDefaultData = true
-#pluginType = EAuthKnowledge
-#defaultPlugin = PIN
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-Pin11113100InputId = 5110
-Pin11113101InputId = 5101
-Pin11113102InputId = 5102
-Pin11113100InputTrain = 5110
-Pin11113101InputTrain = 5101
-Pin11113102InputTrain = 5102
-Pin11113100Default = false
-Pin11113101Default = false
-Pin11113102Default = false
-Pin11113100Active = false
-Pin11113101Active = false
-Pin11113102Active = false
-finalUserName = NewNameOfId2
-
-
-[Test0022b]
-plugin1Id = 11113100
-Pin11113100InputId = 5110
-Pin11113100Default = false
-Pin11113101Default = false
-Pin11113102Default = false
-Pin11113100Active = false
-Pin11113101Active = false
-Pin11113102Active = false
-freshness = 0
-
-[Test0022c]
-NumIdentities = 2
-plugin1Id = 11113100
-#EAuthUnTrained
-plugin1Status = 1
-
-[Test0022-works]
-iSupportsDefaultData = true
-pluginType = EAuthKnowledge
-defaultPlugin = PIN
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthTrained
-plugin1Status = 64
-#Value below should be used.
-#plugin1Status = 128
-Pin11113100InputId = 5110
-Pin11113101InputId = 5101
-Pin11113102InputId = 5102
-Pin11113100InputTrain = 5110
-Pin11113101InputTrain = 5101
-Pin11113102InputTrain = 5102
-Pin11113100Default = true
-Pin11113101Default = true
-Pin11113102Default = true
-Pin11113100Active = true
-Pin11113101Active = true
-Pin11113102Active = true
-finalUserName = NewNameOfId2
-
-[Test0022-Unused]
-iSupportsDefaultData = true
-pluginType = EAuthKnowledge
-defaultPlugin = PIN
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthTrained
-plugin1Status = 64
-Pin11113100Default = false
-Pin11113101Default = false
-Pin11113102Default = false
-Pin11113100Active = false
-Pin11113101Active = false
-Pin11113102Active = false
-initUserName = SOMENAME
-finalUserName = NewNameOfId2
-
-#==========================================================
-[Test0023a]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthUnTrained
-plugin1Status = 1
-#Pin11113100InputId = 5110
-Pin11113100InputTrain = 5110
-Pin11113100Default = false
-Pin11113101Default = false
-Pin11113102Default = false
-Pin11113100Active = false
-Pin11113101Active = false
-Pin11113102Active = false
-DisplayMessage = "This is the second display message sent by the client to the plugin" 
-[Test0023b]
-plugin1Id = 11113100
-Pin11113100InputId = 5110
-Pin11113100Default = false
-Pin11113101Default = false
-Pin11113102Default = false
-Pin11113100Active = false
-Pin11113101Active = false
-Pin11113102Active = false
-
-
-[Test0023c]
-NumIdentities = 1
-plugin1Id = 11113100
-#EAuthUnTrained
-plugin1Status = 1
-
-[Test0023d]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullTrained
-plugin1Status = 128
-#Pin11113100InputId = 5110
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113101Default = true
-Pin11113102Default = true
-Pin11113100Active = true
-Pin11113101Active = true
-Pin11113102Active = true
-
-[Test0023e]
-NumIdentities = 2
-plugin1Id = 11113100
-#EAuthUnTrained
-plugin1Status = 128
-
-[Test0023f]
-plugin1Id = 11113100
-Pin11113100InputId = 5110
-Pin11113100Default = true
-Pin11113101Default = true
-Pin11113102Default = true
-Pin11113100Active = true
-Pin11113101Active = true
-Pin11113102Active = true
-#==========================================================
-[Test0024a]
-#This test expects the presence of plugin 10274104, else i'll need to supply the 3 properties for 11113101, input being 5101
-
-Pin11113100InputTrain = 5110
-Pin11113101InputTrain = 0000
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = true
-Pin11113101Active = true
-finalUserName = NewNameOfId2
-
-[Test0024b]
-plugin1Id = 11113100
-Pin11113100InputId = 5110
-Pin11113100Default = true
-Pin11113101Default = true
-Pin11113102Default = true
-Pin11113100Active = true
-Pin11113101Active = true
-Pin11113102Active = true
-
-[Test0024c]
-NumIdentities = 2
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 64
-
-[Test0024d]
-NumIdentities = 2
-plugin1Id = 11113101
-#EAuthTrained
-plugin1Status = 64
-
-#==========================================================
-[Test0025a]
-NumIdentities = 1
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 1
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = false
-Pin11113101Active = true
-
-[Test0025b]
-NumIdentities = 1
-plugin1Id = 11113101
-#EAuthUnTrained
-plugin1Status = 1
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = false
-Pin11113101Active = true
-
-[Test0025c]
-Pin11113100InputTrain = 5110
-Pin11113101InputTrain = Cancel
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = false
-Pin11113101Active = true
-
-[Test0025d]
-NumIdentities = 2
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 64
-
-[Test0025e]
-NumIdentities = 2
-plugin1Id = 11113101
-#EAuthUnTrained
-plugin1Status = 1
-
-[Test0025f]
-plugin1Id = 11113100
-Pin11113100InputId = 5110
-Pin11113100Default = true
-Pin11113100Active = true
-freshness = 0
-Pin11113101Default = false
-Pin11113101Active = true
-
-[Test0025g]
-plugin1Id = 11113101
-Pin11113101InputTrain = 5112
-Pin11113101Default = false
-Pin11113101Active = true
-
-[Test0025h]
-NumIdentities = 2
-plugin1Id = 11113101
-#EAuthTrained
-plugin1Status = 64
-
-[Test0025i]
-plugin1Id = 11113101
-Pin11113101InputId = 5112
-Pin11113101Default = false
-Pin11113101Active = true
-freshness = 0
-
-#=========================================
-[Test0026a]
-NumIdentities = 1
-#plugin1Id = 11113100
-#EAuthTrained
-#plugin1Status = 64
-Pin11113100InputTrain = 5110
-Pin11113101InputTrain = Quit
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = false
-Pin11113101Active = true
-
-[Test0026b]
-plugin1Id = 11113101
-Pin11113101InputId = 5110
-Pin11113101Default = false
-Pin11113101Active = true
-freshness = 0
-
-#=========================================
-[defaultplugin1]
-default = 11113100
- 
-
-[Test0027a]
-#Requires the presence of only 3 plugins.
-NumIdentities = 1
-#The plugin below is for the pinAuthPlugin
-
-Pin11113100InputTrain = 0000
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113101Active = false
-Pin11113102Active = false
-Pin11113103Active = false 
-Pin11113104Active = false 
-Pin200032E5Active = false
-
-[Test0027b]
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-NumIdentities = 1
-
-[Test0028a]
-#Requires the presence of only 3 plugins, or i can set the other plugins to use the 'cancel' code
-NumIdentities = 1
-#The plugin below is for the pinAuthPlugin
-#plugin1Id = 11113100
-#EAuthTrained
-#plugin1Status = 64
-Pin11113100InputTrain = Cancel
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101InputTrain = Cancel 
-Pin11113101Default = true
-Pin11113101Active = true 
-Pin11113102InputTrain = cancel
-Pin11113102Default = true
-Pin11113102Active = true
-Pin11113103Active = false 
-Pin11113104Active = false 
-Pin11113103Default = false 
-Pin11113104Default = false 
-Pin200032E5Active = false
-
-[Test0028b]
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-NumIdentities = 1
-
-[Test0041a]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-#Pin11113100InputId = 5110
-
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-
-[Test0041b]
-Pin11113100InputId = 5110
-plugin1Id = 11113100
-
-[Test0041c]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-#Pin11113100InputId = 5110
-Pin11113100InputTrain = 5118
-Pin11113100Default = true
-Pin11113100Active = true 
-
-[Test0041d]
-Pin11113100InputId = 5118
-plugin1Id = 11113100
-#================================
-[Test0042a]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-#Pin11113100InputId = 5110
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-
-[Test0042b]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputId = 51194
-Pin11113100InputTrain = 5118
-Pin11113100Default = true
-Pin11113100Active = true 
-
-
-[Test0043a]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-
-[Test0043b]
-plugin1Id = 11113100
-Pin11113100InputId = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-
-[Test0043c]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113188
-#EAuthUnTrained
-plugin1Status = 1
-Pin11113100InputId = 5110
-Pin11113100InputTrain = 5118
-Pin11113100Default = true
-Pin11113100Active = true 
-
-[Test0044a]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113101InputTrain = 5111
-Pin11113101Default = true
-Pin11113101Active = true 
-
-
-[Test0044b]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-#Pin11113100InputId = 5110
-Pin11113100InputTrain = 5118
-Pin11113100Default = true
-Pin11113100Active = true 
-
-[Test0044c]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-#Pin11113100InputId = 5117
-Pin11113100InputTrain = 5116
-Pin11113100Default = true
-Pin11113100Active = true 
-#freshness = 0
-
-[Test0044d]
-plugin1Id = 11113100
-Pin11113100InputId = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-freshness = 0
-
-[Test0044e]
-plugin1Id = 11113100
-Pin11113100InputId = 5113823
-Pin11113100Default = true
-Pin11113100Active = true 
-freshness = 0
-
-#================================
-[Test0045a]
-NumIdentities = 2
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 64
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113103Active = false 
-Pin11113104Active = false 
-Pin11113103Default = false 
-Pin11113104Default = false 
-
-[Test0045b]
-NumIdentities = 3
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 64
-Pin11113100InputTrain = 6110
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113103Active = false 
-Pin11113104Active = false 
-Pin11113103Default = false 
-Pin11113104Default = false 
-
-[Test0045c]
-plugin1Id = 11113100
-Pin11113100InputId = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113103Active = false 
-Pin11113104Active = false 
-Pin11113103Default = false 
-Pin11113104Default = false 
-freshness = 0
-
-[Test0045d]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 64
-Pin11113100InputId = 5110
-Pin11113100InputTrain = Cancel
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113103Active = false 
-Pin11113104Active = false 
-Pin11113103Default = false 
-Pin11113104Default = false 
-
-
-#================================
-[Test0046a]
-NumIdentities = 2
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 64
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-
-[Test0046b]
-Pin11113100InputId = 5110
-plugin1Id = 11113100
-Pin11113100Default = true
-Pin11113100Active = true 
-freshness = 0
-
-[Test0046c]
-NumIdentities = 2
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 64
-Pin11113100InputTrain = Cancel
-Pin11113100Default = true
-Pin11113100Active = true 
-
-#================================
-[Test0047a]
-NumIdentities = 2
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 64
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-
-[Test0047b]
-Pin11113100InputId = 5110
-plugin1Id = 11113100
-Pin11113100Default = true
-Pin11113100Active = true 
-freshness = 0
-
-[Test0047c]
-NumIdentities = 2
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 64
-Pin11113100InputTrain = Quit
-Pin11113100Default = true
-Pin11113100Active = true
-
-#================================
-[Test0048a]
-NumIdentities = 2
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 64
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113101InputTrain = 5111
-Pin11113101Default = true
-Pin11113101Active = true 
-
-[Test0048b]
-Pin11113100InputId = 5110
-plugin1Id = 11113100
-Pin11113100Default = true
-Pin11113100Active = true 
-freshness = 0
-
-[Test0048c]
-NumIdentities = 2
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputTrain = 51178
-Pin11113100Default = true
-Pin11113100Active = true
-
-[Test0048d]
-Pin11113100InputId = 51178
-Pin11113101InputId = 0000
-plugin1Id = 11113100
-Pin11113100Default = true
-Pin11113100Active = true 
-freshness = 0
-
-[Test0048e]
-NumIdentities = 2
-plugin1Id = 11113101
-#EAuthFullyTrained
-plugin1Status = 64
-Pin11113101InputTrain = 51175
-Pin11113101Default = true
-Pin11113101Active = true 
-
-[Test0048f]
-Pin11113101InputId = 0000
-plugin1Id = 11113101
-Pin11113101Default = true
-Pin11113101Active = true 
-freshness = 0
-
-#================================
-[Test0061a]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 64
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = false
-Pin11113101Active = false
-
-[Test0061b]
-NumIdentities = 2
-plugin1Id = 11113101
-#EAuthUnTrained
-plugin1Status = 1
-
-[Test0061Ta]
-plugin1Id = 11113100
-Pin11113100InputId = 0000
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = false
-Pin11113101Active = false
-freshness = 0
-
-[Test0061c]
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101InputTrain = 5111
-Pin11113101Active = true
-freshness = 60
-plugin1Id = 11113101
-#EAuthTrained
-plugin1Status = 1
-
-[Test0061d]
-plugin1Id = 11113101
-#EAuthTrained
-plugin1Status = 1
-
-[Test0061Tb]
-plugin1Id = 11113100
-Pin11113100InputId = 5110
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = false
-Pin11113101Active = false
-freshness = 0
-
-[Test0061e]
-Pin11113100InputId = 0000
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101InputTrain = 5112
-Pin11113101Active = true
-freshness = 60
-plugin1Id = 11113101
-#EAuthFullyTrained
-plugin1Status = 64
-
-[Test0061f]
-plugin1Id = 11113101
-#EAuthFullyTrained
-plugin1Status = 64
-
-
-#================================
-[Test0062a]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 64
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = false
-Pin11113101Active = false
-#freshness = 0
-
-[Test0062b]
-NumIdentities = 2
-plugin1Id = 11113100
-#EAuthUnTrained
-plugin1Status = 128
-
-[Test0062c]
-NumIdentities = 2
-plugin1Id = 11113101
-#EAuthUnTrained
-plugin1Status = 1
-
-[Test0062d]
-plugin1Id = 11113100
-Pin11113100InputId = 7737373737
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = false
-Pin11113101Active = false
-freshness = 0
-
-[Test0062e]
-plugin1Id = 11113101
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101InputTrain = 5111
-Pin11113101Default = false
-Pin11113101Active = true
-
-[Test0062f]
-plugin1Id = 11113101
-#EAuthUnTrained
-plugin1Status = 1
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = false
-Pin11113101Active = true
-
-#================================
-[Test0063a]
-NumIdentities = 2
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 64
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = false
-Pin11113101Active = false
-
-[Test0063b]
-plugin1Id = 11113100
-Pin11113100InputId = 5110
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = false
-Pin11113101Active = false
-freshness = 0
-
-[Test0063c]
-plugin1Id = 11113888
-Pin11113100Default = true
-Pin11113100Active = true
-#Pin11113101InputTrain = 6111
-Pin11113101Default = false
-Pin11113101Active = false
-
-#================================
-[Test0065a]
-NumIdentities = 2
-plugin1Id = 11113100
-plugin1Status = 64
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = true
-Pin11113101Active = true
-
-
-[Test0065b]
-plugin1Id = 11113100
-Pin11113100InputId = 5110
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = true
-Pin11113101Active = true
-freshness = 0
-
-[Test0065c]
-plugin1Id = 11113101
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101InputTrain = 0000
-Pin11113101Default = true
-Pin11113101Active = true
-
-#================================
-[Test0066a]
-NumIdentities = 2
-plugin1Id = 11113100
-plugin1Status = 64
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = false
-Pin11113101Active = false
-
-
-[Test0066b]
-plugin1Id = 11113100
-Pin11113100InputId = 5110
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = false
-Pin11113101Active = false
-freshness = 0
-
-[Test0066c]
-plugin1Id = 11113101
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101InputTrain = CancEL
-Pin11113101Default = false
-Pin11113101Active = true
-
-#================================
-[Test0067a]
-NumIdentities = 2
-plugin1Id = 11113100
-plugin1Status = 64
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = false
-Pin11113101Active = false
-
-[Test0067b]
-plugin1Id = 11113100
-Pin11113100InputId = 5110
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = false
-Pin11113101Active = false
-freshness = 0
-
-[Test0067c]
-plugin1Id = 11113101
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101InputTrain = QUit
-Pin11113101Default = false
-Pin11113101Active = true
-
-#==============================
-[AuthTestRegister]
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113101InputTrain = 5111
-Pin11113101Default = true
-Pin11113101Active = true 
-Pin11113102InputTrain = 5112
-Pin11113102Default = true
-Pin11113102Active = true 
-Pin11113103InputTrain = 5113
-Pin11113103Default = true
-Pin11113103Active = true 
-Pin11113104InputTrain = 5114
-Pin11113104Default = true
-Pin11113104Active = true 
-
-#==============================
-
-[Test0081b]
-plugin1Id = 11113100 & 11113101
-Pin11113100Active = true 
-Pin11113100InputId = 5110
-Pin11113101Active = true 
-Pin11113101InputId = 5111
-freshness = 0
-
-#==============================
-
-[Test0082b]
-plugin1Id = 11113100 & 11113101
-Pin11113100Active = true 
-Pin11113100InputId = 5110
-Pin11113101Active = true 
-# fail - wrong pin
-Pin11113101InputId = 6666
-freshness = 0
-
-[Test0082c]
-plugin1Id = 11113100 | 11113101 
-Pin11113100Active = true 
-Pin11113100InputId = 6666
-Pin11113101Active = true 
-Pin11113101InputId = 5111
-freshness = 0
-
-[Test0082d]
-plugin1Id = 11113100 | 11113101 
-Pin11113100Active = true 
-Pin11113100InputId = 5110
-Pin11113101Active = true 
-# fail - wrong pin
-Pin11113101InputId = 6666
-freshness = 0
-
-[Test0082e]
-plugin1Id = 11113100 | 11113101 
-Pin11113100Active = true 
-# fail - wrong pin
-Pin11113100InputId = 937474
-Pin11113101Active = true 
-# fail - wrong pin
-Pin11113101InputId = 6666
-freshness = 300
-#==============================
-
-[Test0083b]
-plugin1Id = 11113100 | 11113101 | 11113102
-Pin11113100Active = false 
-Pin11113100InputId = 5110
-Pin11113101Active = false 
-Pin11113101InputId = 5111
-Pin11113102Active = false 
-Pin11113102InputId = 5112
-freshness = 0
-
-#==============================
-
-[Test0084b]
-plugin1Id = 11113100 & 11113101
-Pin11113100Active = true 
-Pin11113100InputId = 5110
-Pin11113101Active = true 
-Pin11113101InputId = 5111
-freshness = 0
-
-[Test0084c]
-plugin1Id = 11113100 & 11113101
-Pin11113100Active = true 
-Pin11113100InputId = 5110
-Pin11113101Active = true 
-Pin11113101InputId = 5111
-freshness = 0
-clientSpecificKey = true
-
-[Test0084d]
-plugin1Id = 11113100 & 11113101
-Pin11113100Active = true 
-#Pin11113100InputId = 5110
-Pin11113101Active = true 
-#Pin11113101InputId = 5111
-freshness = 60
-clientSpecificKey = true
-#==============================
-
-[Test0086b]
-
-# set prefs
-KnowledgePref = 11113100
-BiometricPref = 11113103
-TokenPref     = 11113104
-# auth using prefs
-Pin11113100Active = true 
-Pin11113100InputId = 5110 
-Pin11113103Active = true 
-Pin11113103InputId = 5113
-Pin11113104Active = true 
-Pin11113104InputId = 5114 
-plugin1Id = B & K & T
-freshness=0
-
-[Test0086c]
-plugin1Id = B & K & T
-Pin11113100Active = false 
-Pin11113100InputId = 5110
-Pin11113103Active = false 
-Pin11113103InputId = 5113
-Pin11113104Active = false 
-Pin11113104InputId = 5114
-freshness = 300
-
-#==============================
-
-[Test0087b]
-
-# set prefs
-KnowledgePref = 11113100
-BiometricPref = 11113103
-TokenPref     = 11113104
-# auth using prefs
-Pin11113100Active = true 
-Pin11113100InputId = 5110 
-Pin11113103Active = false
-Pin11113103InputId = 5113
-Pin11113104Active = true
-Pin11113104InputId = 5114
-plugin1Id = B
-freshness=0
-
-[Test0087c]
-plugin1Id = K
-Pin11113100Active = false 
-Pin11113100InputId = 5110
-Pin11113103Active = true 
-Pin11113103InputId = 5113
-Pin11113104Active = true 
-Pin11113104InputId = 5114
-freshness = 0
-
-[Test0087d]
-plugin1Id = T
-Pin11113100Active = true
-Pin11113100InputId = 5110
-Pin11113103Active = true 
-Pin11113103InputId = 5113
-Pin11113104Active = false
-Pin11113104InputId = 5114
-freshness = 0
-
-==============================
-[Test0088b]
-
-# set prefs
-KnowledgePref = 11113100
-BiometricPref = 11113103
-TokenPref     = 11113104
-# auth using prefs
-Pin11113100Active = false
-Pin11113103Active = true
-Pin11113103InputId = 5113
-Pin11113104Active = false
-plugin1Id = K | B 
-freshness=0
-
-[Test0088c]
-Pin11113100Active = false
-Pin11113103Active = true
-Pin11113103InputId = 5113
-Pin11113104Active = false
-plugin1Id = K | B 
-freshness=300
-
-#==============================
-
-[Test0089b]
-plugin1Id = 11113100 & 11113101
-Pin11113100Active = true 
-Pin11113100InputId = 5110
-Pin11113101Active = true 
-Pin11113101InputId = 5111
-freshness = 0
-
-[Test0089c]
-plugin1Id = 11113100 & 11113101
-Pin11113100Active = false 
-Pin11113101Active = false
-Pin11113102Active = false
-freshness = 300
-
-#==============================
-
-[Test0092b]
-plugin1Id = 11113100 | 11113101
-Pin11113100Active = true 
-Pin11113100InputId = 5055
-Pin11113101Active = true 
-Pin11113101InputId = 5055
-freshness = 0
-
-#==============================
-
-[Test0093b]
-plugin1Id = 11113101 | 11113102
-Pin11113100Active = true 
-Pin11113100InputId = 5055
-Pin11113101Active = true 
-Pin11113101InputId = 5055
-Pin11113102Active = true 
-Pin11113102InputId = 5112
-freshness = 0
-
-[Test0093c]
-plugin1Id = 11113100 & 11113101
-Pin11113100Active = true 
-Pin11113100InputId = 505446
-Pin11113101Active = true 
-Pin11113101InputId = 507744
-Pin11113102Active = true 
-#Pin11113102InputId = 549383
-freshness = 300
-#==============================
-[Test0101a]
-NumIdentities = 2
-plugin1Id = 11113100
-#EAuthFullyTrained
-#plugin1Status = 64
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113101InputTrain = 5111
-Pin11113101Default = true
-Pin11113101Active = true 
-
-[Test0101b]
-Pin11113101InputId = 5111
-plugin1Id = 11113101
-freshness = 0
-plugin1Status = 1
-
-[Test0101c]
-NumIdentities = 1
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 64
-Pin11113100InputId = 5110
-Pin11113100InputTrain = 51178
-Pin11113100Default = true
-Pin11113100Active = true
-#freshness = 0
-
-[Test0101d]
-Pin11113101InputId = 5111
-plugin1Id = 11113101
-freshness = 0
-
-#==============================
-[Test0102a]
-Pin11113101InputId = 0000
-plugin1Id = 11113100
-freshness = 0
-
-[Test0102b]
-plugin1Id = 11113100
-Pin11113100InputId = 0000
-Pin11113100Default = true
-Pin11113100Active = true
-
-[Test0102c]
-plugin1Id = 11113100
-NumIdentities = 1
-plugin1Status = 128
-
-#==============================
-[Test0103a]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 64
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113101InputTrain = 5111
-Pin11113101Default = true
-Pin11113101Active = true 
-
-[Test0103b]
-Pin11113101InputId = 377377377
-plugin1Id = 11113101
-freshness = 0
-
-[Test0103c]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputId = 5110
-#Pin11113100InputTrain = 51178
-Pin11113100Default = true
-Pin11113100Active = true
-freshness = 0
-retryRemove = true
-
-#==============================
-[Test0104a]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 64
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113101InputTrain = 5111
-Pin11113101Default = true
-Pin11113101Active = true 
-
-[Test0104b]
-Pin11113101InputId = 773737
-plugin1Id = 11113101
-freshness = 0
-
-[Test0104c]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputId = 51178
-#Pin11113100InputTrain = 51178
-Pin11113100Default = true
-Pin11113100Active = true
-freshness = 0
-
-#==============================
-[Test0105a]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 64
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113101InputTrain = 5111
-Pin11113101Default = true
-Pin11113101Active = true 
-
-[Test0105b]
-NumIdentities = 3
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 64
-Pin11113100InputTrain = 6110
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113101InputTrain = 6111
-Pin11113101Default = true
-Pin11113101Active = true 
-
-[Test0105c]
-Pin11113101InputId = 37777733
-plugin1Id = 11113101
-freshness = 0
-
-[Test0105d]
-NumIdentities = 3
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputId = 5110
-Pin11113100Default = true
-Pin11113100Active = true
-freshness = 0
-retryRemove = true
-
-
-#==============================
-[Test0121a]
-#iSupportsDefaultData = true
-plugin1Id = 11113100 & 11113101
-Pin11113100InputId = 5110
-Pin11113101InputId = 6110
-freshness = 0
-Pin11113100Default = true
-Pin11113101Active = true
-Pin11113100Active = true
-
-[Test0121b]
-NumIdentities = 2
-Pin11113100Active = true
-Pin11113100InputTrain = 5110
-Pin11113101Active = true
-Pin11113101InputTrain = 6110
-
-[Test0121c]
-forgetPlugin = 11113100
-
-[Test0121d]
-
-NumIdentities = 2
-plugin1Id = 11113100
-Pin11113100Active = true
-Pin11113100InputId = 5110
-freshness = 0
-
-[Test0122a]
-#iSupportsDefaultData = true
-plugin1Id = 11113100
-Pin11113100InputId = 5110
-freshness = 0
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Active = false
-Pin11113102Active = false
-Pin11113103Active = false
-Pin11113104Active = false
-Pin200032E5Active = false
-
-[Test0122b]
-NumIdentities = 2
-Pin11113100Active = true
-Pin11113100InputTrain = 5110
-Pin11113101Active = false
-Pin11113102Active = false
-Pin11113103Active = false
-Pin11113104Active = false
-Pin200032E5Active = false
-
-[Test0122c]
-forgetPlugin = 11113100
-Pin11113100Active = true
-Pin11113101Active = false
-Pin11113102Active = false
-Pin11113103Active = false
-Pin11113104Active = false
-Pin200032E5Active = false
-
-[Test0123a]
-#iSupportsDefaultData = true
-plugin1Id = 11113100 & 11113102
-Pin11113100InputId = 5110
-Pin11113102InputId = 6220
-freshness = 0
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Active = false
-Pin11113102Active = true
-
-[Test0123b]
-NumIdentities = 2
-Pin11113100Active = true
-Pin11113100InputTrain = 5110
-Pin11113102Active = true
-Pin11113102InputTrain = 6220
-Pin11113101Active = false
-
-[Test0123c]
-forgetPlugin = 11113101
-Pin11113100Active = true
-Pin11113101Active = true
-Pin11113102Active = true
-
-[Test0124a]
-#iSupportsDefaultData = true
-plugin1Id = 11113100 & 11113102
-Pin11113100InputId = 5110
-Pin11113102InputId = 6220
-freshness = 0
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Active = false
-Pin11113102Active = true
-
-[Test0124b]
-NumIdentities = 2
-Pin11113100Active = true
-Pin11113100InputTrain = 5110
-Pin11113102Active = true
-Pin11113102InputTrain = 6220
-Pin11113101Active = false
-
-[Test0124c]
-forgetPlugin = ffffffff
-Pin11113100Active = true
-Pin11113101Active = true
-Pin11113102Active = true
-
-[Test0125]
-forgetPlugin = 11113100
-forgetUnknown = true
-Pin11113100Active = true
-Pin11113100Default = true
-Pin11113101Active = true
-Pin11113102Active = true
-#iSupportsDefaultData = true
-
-#==========================================
-[Test0141]
-Pin11113100InputId = 5000
-Pin11113100InputTrain = 5000
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113103InputId = 5003
-Pin11113103InputTrain = 5003
-Pin11113103Default = true
-Pin11113103Active = true 
-Pin11113104InputId = 5004
-Pin11113104InputTrain = 5004
-Pin11113104Default = true
-Pin11113104Active = true 
-plugin1Id = B & K & T
-KnowledgePref = 11113100
-BiometricPref = 11113103
-TokenPref     = 11113104
-
-[Test0142]
-Pin11113100InputId = 5000
-Pin11113100InputTrain = 5000
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113103InputId = 5003
-Pin11113103InputTrain = 5003
-Pin11113103Default = true
-Pin11113103Active = true 
-Pin11113104InputId = 5004
-Pin11113104InputTrain = 5004
-Pin11113104Default = true
-Pin11113104Active = true 
-plugin1Id = B & K & T
-KnowledgePref = 11113100
-BiometricPref = 11113101
-TokenPref     = 11119999
-
-[Test0143]
-Pin11113100InputId = 5000
-Pin11113100InputTrain = 5000
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113101InputId = 5001
-Pin11113101InputTrain = 5001
-Pin11113101Default = true
-Pin11113101Active = true 
-Pin11113102InputId = 5002
-Pin11113102InputTrain = 5002
-Pin11113102Default = true
-Pin11113102Active = true 
-Pin11113103InputId = 5003
-Pin11113103InputTrain = 5003
-Pin11113103Default = true
-Pin11113103Active = true 
-plugin1Id = B & K & T
-KnowledgePref = 11113103
-BiometricPref = 11113101
-TokenPref     = 11113102
-
-
-#-----------------------------------------------
-#Authentication via Aliases test cases.
-
-[Test0166]
-alias = strong
-aliasString0 = fast & medium | weak
-aliasString1 =
-aliasString2 =
-aliasString3 = 11113100
-freshness = 0
-
-[Test0170]
-alias = strong
-aliasString0 = fast & medium | weak
-aliasString1 = ""
-aliasString2 = ""
-aliasString3 =
-freshness = 0
-
-[Test0171]
-alias = strong
-aliasString0 = fast & sometext | weak
-aliasString1 = 11113100
-aliasString2 = 11113101
-aliasString3 = 11113102
-freshness = 0
-
-[Test0172]
-alias = strong
-aliasString0 = fast + medium | weak
-aliasString1 = 11113100
-aliasString2 = 11113101
-aliasString3 = 11113102
-freshness = 0
-
-[Test0173]
-alias = strong
-aliasString0 = fast & medium | weak
-aliasString1 = 11113101
-aliasString2 = 11113102
-aliasString3 = 11113100
-synchronous = true
-
-[Test0174]
-Pin11113101Active = true 
-Pin11113101InputId = 6111
-alias = strong
-aliasString0 = (fast) & (medium) | (weak)
-aliasString1 = 11113101
-aliasString2 = 11113102
-aliasString3 = 11113100
-freshness = 0
-
-[Test0175]
-Pin11113101Active = true 
-Pin11113101InputId = 6111
-alias = strong
-aliasString0 = fast | weak
-aliasString1 = medium & weak
-aliasString2 = (11113101 & 11113102) | weak
-aliasString3 = 11113100
-freshness = 0
-
-[Test0176]
-Pin11113103Active = true 
-Pin11113103InputId = 6113
-alias = strong
-aliasString0 = medium | ((weak & fast) | 11113103)
-aliasString1 = 11113103 & 11113100
-aliasString2 = 11113100
-aliasString3 = 11113100 | 11113103
-freshness = 0
-
-[Test0177]
-Pin11113100Active = true 
-Pin11113100InputId = 5110
-Pin11113101Active = true 
-Pin11113101InputId = 5111
-Pin11113102Active = true 
-Pin11113102InputId = 5112
-alias = strong
-aliasString0 = fast & medium
-aliasString1 = medium | 11113100
-aliasString2 = weak & 11113101
-aliasString3 = strong & 11113102
-freshness = 0
-
-[Test0178]
-alias = strong
-aliasString0 = strong & medium
-aliasString1 = 11113100
-aliasString2 = strong & 11113101
-aliasString3 = 11113102
-freshness = 0
-
-[Test0179]
-alias = unknownalias
-aliasString0 = fast & medium
-aliasString1 = 11113100
-aliasString2 = 11113101
-aliasString3 = 11113102
-freshness = 0
-synchronous = true
-
-[Test0180]
-Pin11113101Active = true 
-Pin11113101InputId = 6111
-Pin11113102Active = true 
-Pin11113102InputId = 6112
-alias = strong
-aliasString0 = fast | weak
-aliasString1 = medium & weak
-aliasString2 = (11113101 & 11113100) | weak
-aliasString3 = 11113102
-freshness = 0
-synchronous = true
-
-[Test0183]
-alias = strong
-aliasCount = -2
-
-[Test0184]
-alias = strong
-aliasCount = 0
-
-#-------------------------------------------------------------------
-
-
-[Test0156]
-Pin11113102InputTrain = 5112
-Pin11113102Default = true
-Pin11113102Active = true 
-
-[Test0157]
-plugin1Id = 11113102
-Pin11113102Active = true 
-Pin11113102InputId = 5114
-freshness = 0
-
-
-[Test0158]
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-
-[Test0159]
-plugin1Id = 11113100
-Pin11113100Active = true 
-Pin11113100InputId = 5110
-freshness = 0
-
-[Test0160]
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-plugin1Id = 11113100
-Pin11113100Active = true 
-Pin11113100InputId = 5110
-freshness = 0
-stop = FALSE 
-
-[Test0161]
-Pin11113101InputTrain = 5111
-Pin11113101Default = true
-plugin1Id = 11113101
-Pin11113101Active = true 
-Pin11113101InputId = 5112
-freshness = 0
-
-[Test0162]
-Pin11113102InputTrain = 5112
-Pin11113102Default = true
-plugin1Id = 11113102
-Pin11113102Active = true 
-Pin11113102InputId = 5112
-deauth = 1
-freshness = 0
-stop = FALSE 
-
-#-------------------------------------------------------------------
-[defidentity1]
-plugin1Id = 00000
-Pin11113100InputId = 0000
-defaultpluginusage = true
-
-[defidentity2]
-plugin1Id = 00000
-Pin11113100InputId = 0000
-defaultpluginusage = true
-synchnronous = true
-
-[defidentity3]
-plugin1Id = 00000
-Pin11113100InputId = 0001
-defaultpluginusage = true
-
-[defidentity4]
-plugin1Id = 00000
-Pin11113100InputId = 0001
-defaultpluginusage = true
-synchronous = true
-
-[defaultplugin2]
-default = 11113101
-
-[defidentity5]
-iSupportsDefaultData = false
-plugin1Id = 00000
-Pin11113101InputId = 0000
-defaultpluginusage = true
-synchronous = true
-
-[defaultplugin3]
-iSupportsDefaultData = false
-plugin1Id = 00000
-Pin11113101InputId = 0000
-defaultpluginusage = true
-synchronous = true
-
-[defaultplugin4]
-plugin1Id = 11113101
-Pin11113101InputTrain = 5112
-Pin11113101Default = true
-Pin11113101Active = true
-
-[defidentity6]
-Pin11113101InputId = 0000
-plugin1Id = 11113101
-freshness = 0
-plugin1Status = 1
-
-[defidentity7]
-forgetPlugin = 11113101
-Pin11113101Active = true
-Pin11113101Default = true
-
-
-[defidentity8]
-alias =
-Pin11113100InputId = 0000
-defaultpluginusage = true
-
-[defidentity9]
-alias =
-Pin11113100InputId = 0000
-defaultpluginusage = true
-synchronous = true
-
-
-[defidentity10]
-alias =
-Pin11113100InputId = 0001
-defaultpluginusage = true
-
-[defidentity11]
-alias =
-Pin11113100InputId = 0001
-defaultpluginusage = true
-synchronous = true
-
-######################
-# Sections for Reset Identity Tests #
-######################
-[RegisterId]
-defaultPlugin = PIN
-IdentityString=AmazingUser
-Pin11113100InputTrain = 420
-Pin11113100Active = true
-Pin11113101Active = false
-Pin11113102Active = false
-
-[RegisterIdLotsOfPlugins]
-defaultPlugin = PIN
-IdentityString=AmazingUser
-Pin11113100Active = true
-Pin11113100InputTrain = 420
-Pin11113101Active = true
-Pin11113101InputTrain = 421
-Pin11113102Active = true
-Pin11113102InputTrain = 422
-Pin11113103Active = true
-Pin11113103InputTrain = 423
-Pin11113104Active = true
-Pin11113104InputTrain = 424
-
-[ResetIdAll]
-ResetType=ResetAll
-IdentityString=AmazingUser
-RegistrationData=1234
-
-[AuthPinPlugin]
-# For post reset authenticate
-plugin1Id = 200032E5
-Pin200032E5Active = true
-pinvalue = 1234
-freshness = 0
-
-[AuthPinPluginOldPin]
-plugin1Id = 200032E5
-Pin200032E5Active = true
-freshness = 0
-
-[AuthPlugin11113100OldPin]
-plugin1Id = 11113100
-Pin11113100Active = true
-Pin11113100InputId = 420
-freshness = 0
-
-[AuthPlugin11113100]
-plugin1Id = 11113100
-Pin11113100Active = true
-Pin11113100InputId = 1234
-freshness = 0
-
-[AuthPluginResetNoReTrainOldPin]
-plugin1Id = 11113101
-Pin11113101Active = true
-Pin11113101InputId = 421
-freshness = 0
-
-[AuthPluginResetNoReTrain]
-plugin1Id = 11113101
-Pin11113101Active = true
-Pin11113101InputId = 1234
-freshness = 0
-
-[AuthPluginResetUnsupOldPin]
-plugin1Id = 11113102
-Pin11113102Active = true
-Pin11113102InputId = 422
-freshness = 0
-
-[AuthPluginResetUnsup]
-plugin1Id = 11113102
-Pin11113102Active = true
-Pin11113102InputId = 1234
-freshness = 0
-
-[AuthPluginBiometricOldPin]
-plugin1Id = 11113103
-Pin11113103Active = true
-Pin11113103InputId = 423
-freshness = 0
-
-[AuthPluginBiometric]
-plugin1Id = 11113103
-Pin11113103Active = true
-Pin11113103InputId = 1234
-freshness = 0
-
-[AuthPluginTokenOldPin]
-plugin1Id = 11113104
-Pin11113104Active = true
-Pin11113104InputId = 424
-freshness = 0
-
-[AuthPluginToken]
-plugin1Id = 11113104
-Pin11113104Active = true
-Pin11113104InputId = 1234
-freshness = 0
-
-[ResetIdAllMissingUser]
-ResetType=ResetAll
-IdentityString=MoreAmazingUser
-RegistrationData=1234
-
-[ResetIdAllInvalidUser]
-ResetType=ResetAll
-IdentityString=
-RegistrationData=1234
-
-[ResetIdTypeInvalidUser]
-ResetType=ResetByType
-PluginType=EAuthKnowledge
-IdentityString=
-RegistrationData=1234
-
-[ResetIdListInvalidUser]
-ResetType=ResetByList
-IdentityString=
-PluginCount=1
-PluginId0=200032E5
-RegistrationData0=1234
-
-[ResetIdListNoPlugins]
-ResetType=ResetByList
-IdentityString=AmazingUser
-PluginCount=0
-
-[ResetIdListCountMismatch]
-ResetType=ResetByList
-IdentityString=AmazingUser
-PluginCount=-1
-
-[ResetIdTypeKnowledge]
-ResetType=ResetByType
-PluginType=EAuthKnowledge
-IdentityString=AmazingUser
-RegistrationData=1234
-
-[ResetIdTypeBiometric]
-ResetType=ResetByType
-PluginType=EAuthBiometric
-IdentityString=AmazingUser
-RegistrationData=1234
-
-[ResetIdListPinPlugin]
-ResetType=ResetByList
-IdentityString=AmazingUser
-PluginCount=1
-PluginId0=200032E5
-RegistrationData0=1234
-
-[ResetIdListInvalidUser]
-ResetType=ResetByList
-IdentityString=MoreAmazingUser
-PluginCount=1
-PluginId0=200032E5
-RegistrationData0=1234
-
-[ResetIdListUnsupPlugin]
-ResetType=ResetByList
-IdentityString=AmazingUser
-PluginCount=1
-PluginId0=11113102
-RegistrationData0=1234
-
-[ResetIdListBiometricPlugin]
-ResetType=ResetByList
-IdentityString=AmazingUser
-PluginCount=1
-PluginId0=11113103
-RegistrationData0=1234
-
-[Test0193]
-alias = 11113100 & ( weak | strong )
-aliasString0 = fast & medium | weak
-aliasString1 = 11113101
-aliasString2 = 11113102
-aliasString3 = 11113100
-synchronous = true
-
-[Test0194]
-alias = 11113333 | ( Knowledge & Biometric & Token )
-aliasString0 = fast & medium | weak
-aliasString1 = 11113101
-aliasString2 = 11113102
-aliasString3 = 11113100
-synchronous = true
-KnowledgePref = 11113100
-BiometricPref = 11113103
-TokenPref     = 11113104
-
-[Test0195]
-alias = ( 11113100 & ( weak | strong )
-aliasString0 = fast & medium | weak
-aliasString1 = 11113101
-aliasString2 = 11113102
-aliasString3 = 11113100
-synchronous = true
-
-[Test0196]
-alias = 11113333 | Knoledge
-synchronous = true
-KnowledgePref = 11113100
-BiometricPref = 11113103
-TokenPref     = 11113104
-
-
-
-[Test0197]
-defaultPlugin = PIN
-IdentityString=AmazingUser
-Pin11113100InputTrain = 420
-Pin11113100Active = true
-Pin11113101Active = false
-Pin11113102Active = false
-
-[Test0198]
-plugin1Id = 11113100
-Pin11113100Active = true 
-Pin11113100InputId = 420
-
-[time]
-time = 0
-
-[time1]
-time = 600
-
-[Test0199]
-plugin1Id = 11113100
-Pin11113100Active = true 
-Pin11113100InputId = 1234
-freshness = 300
-
-
-[Test0200]
-Pin11113101InputTrain = 5112
-Pin11113101Default = true
-Pin11113101Active = true 
-
-[Test0201]
-plugin1Id = 11113101
-Pin11113101Active = true 
-Pin11113101InputId = 5112
-
-[time2]
-time = -600
-
-[Test0202]
-plugin1Id = 11113101
-Pin11113101Active = true 
-Pin11113101InputId = 1234
-freshness = 5
-
-[multithreadedRegister]
-pluginType = EAuthKnowledge
-defaultPlugin = PIN
-Pin11113100InputTrain = 2035
-Pin11113100Default = true
-Pin11113100Active = true
-finalUserName = NewUser
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/tAuthSvr2.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,1921 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-
-PRINT Authentication Server tests...
-
-// Prepare a clone of TAuthSvr to possess authserver's SID.
-// This is required for modifying the authserver's central repository file.
-// This clone must be deleted at the end of the test.
-
-RUN_PROGRAM 100 SETCAP tAuthSvr.exe 188b0 -SID 102740FC tAuthSvr_new.exe
-
-LOAD_SUITE tAuthSvr
-LOAD_SUITE tAuthSvr_new
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0144
-//! @SYMTestCaseDesc Remove_PinPlugin_Data
-START_TESTCASE SEC-AUT-AUTHSVR-0144
-RUN_UTILS DeleteFile C:\pinplugin_inactive.txt
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr_new 	INIT_CENREP c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defaultplugin
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_in.dat
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_out.dat
-END_TESTCASE SEC-AUT-AUTHSVR-0144
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0006
-//! @SYMTestCaseDesc Start the authServer with no identities, having a default plugin defined
-//! 		     (FirstStart1_Normal)
-//! @SYMREQ REQ 4941 4943 4953 4954 4955 4956
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Identity API
-//! @SYMTestExpectedResults Default identity is the only one present
-//! @SYMDevelopedForRelease Intulo
-
-START_TESTCASE SEC-AUT-AUTHSVR-0006
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0001
-END_TESTCASE SEC-AUT-AUTHSVR-0006
-
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0007
-//! @SYMTestCaseDesc Start the authServer with no identities, and no default plug-in exists
-//! 		     (FirstStart2_NoDefaultPlugin)
-//! @SYMREQ REQ 4941 4943 4953 4954
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Identity API
-//! @SYMTestExpectedResults AuthServer panics, since there are no identities
-//! @SYMDevelopedForRelease Intulo
-
-START_TESTCASE SEC-AUT-AUTHSVR-0007
-RUN_UTILS CopyFile C:\tauth\tauthsvr\testdata\pinplugin_inactive.txt C:\pinplugin_inactive.txt
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !RESULT=-2 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0002
-END_TESTCASE SEC-AUT-AUTHSVR-0007 
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0008
-//! @SYMTestCaseDesc Start the authServer with no identities, and the default plugin is set to a biometric plugin
-//! 		     (FirstStart3_DefaultIsBiometricType)
-//! @SYMREQ REQ 4941 4943 4953 4954
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Identity API
-//! @SYMTestExpectedResults AuthServer panics, since default plugins have to be of knowledge or token type
-//! @SYMDevelopedForRelease Intulo
-
-START_TESTCASE SEC-AUT-AUTHSVR-0008
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !RESULT=-2 100	tAuthSvr 	AUTHSVR_CHECK   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0003
-RUN_UTILS DeleteFile C:\pinplugin_inactive.txt
-END_TESTCASE SEC-AUT-AUTHSVR-0008
-
-
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0009
-//! @SYMTestCaseDesc Start the authServer with no identities, having a default plugin defined
-//! 		     (RegisterIdentity1_Normal)
-//! @SYMREQ REQ4969 4970 4971 4972 4975 4976 4977 4978 4963 4985 5008 5009
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Identity API
-//! @SYMTestExpectedResults Default identity is the only one listed
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0009
-
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !Result=Fail  100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0021b
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0021a
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0021b
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0021c
-
-END_TESTCASE SEC-AUT-AUTHSVR-0009
-
-
-// //============================================================
-//
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0010
-//! @SYMTestCaseDesc , Attempt to register a new identity, while a specific plugin inactive, the plugin should be remain untrained
-//! 		     (RegisterIdentity2_NoActivePlugin)
-//! @SYMREQ REQ4941 REQ4943 REQ4953 REQ4954 4963 4985 4993 5008 5009
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Start the authServer with no identities. 
-//!			Have a default plugin defined, which is inactive,
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//! @SYMTestExpectedResults Specific plugin is untrained
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0010
-
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-// RUN_TEST_STEP !RESULT=-2 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0022b
-// RUN_TEST_STEP !RESULT=-2  100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0022a
-// RUN_TEST_STEP !RESULT=-2  100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0022b
-// RUN_TEST_STEP !RESULT=-2  100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0022c
-
-END_TESTCASE SEC-AUT-AUTHSVR-0010
-
-
-// //============================================================
-//
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0011
-//! @SYMTestCaseDesc Attempt to register a new identity, while no plugins are active, then one is activated.
-//! 		     (RegisterIdentity3_PluginActivatedLater)
-//! @SYMREQ REQ4947 REQ4954 REQ4960 REQ4962 REQ4968 REQ4957 REQ4963 4985 4993 5008 5009
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is inactive, and a second one which is inactive
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!                     Attempt to register a new identity, attempt to authenticate assuming this identity
-//!                     was registered. Check the number of identities.
-//!                     Reset the state of the system
-//!                     Set one of the plugins to be active then attempt to register an identity
-//!                     Attempt to read and set the username.
-//!                     Attempt to authenticate assuming this identity was registered. 
-//!                     Check the number of identities.
-//! @SYMTestExpectedResults Default plugin is untrained, then fully trained after the 2nd try
-//!                     The authentication fails first time(no errors), fails again the second time (no errors)
-//!                     It passes the third time 
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0011
-
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-// RUN_TEST_STEP !Error=-2 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0023b
-// RUN_TEST_STEP !Error=-2 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0023a
-// RUN_TEST_STEP !Error=-2  100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0023b
-// RUN_TEST_STEP !Error=-2  100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0023c
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0023d
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0023f
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0023e
-// RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-
-END_TESTCASE SEC-AUT-AUTHSVR-0011
-
-// ////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0012
-//! @SYMTestCaseDesc Attempt to register a new identity, but the transient key obtained from one of auth Plugin is non-unique.
-//! 		     (RegisterIdentity4_NonUniqueTransientkey)
-//! @SYMREQ REQ4953 REQ4954 REQ4955 REQ4957 REQ4958 REQ4963 4985 4993 5008 5009
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is inactive, and a second one which is inactive
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Try to register a 2nd identity while using the same 'Entered-Pin' as for the default identity.
-//! @SYMTestExpectedResults KErrAuthServPluginCancelled is received, then the plugin is showed as 
-//!				partially trained, not fully trained
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0012
-
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !RESULT=Fail 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0024b
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0024a
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0024b
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0024c
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0024d
-
-END_TESTCASE SEC-AUT-AUTHSVR-0012
-
-
-// ////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0013
-//! @SYMTestCaseDesc Attempt to register a new identity, but a plugin returns the cancellation code
-//! 		     (RegisterIdentity5_PluginCancel)
-//! @SYMREQ REQ4954 REQ4955 REQ4958 REQ4968 REQ4970 4971 4972 4963 4985 4993 5008 5009
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is inactive, and a second one which is inactive
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Try to register a 2nd identity while using the 'Cancel' code as the PIN input
-//! @SYMTestExpectedResults KErrAuthServPluginCancelled is received, then the plugin is showed as 
-//!				partially trained, not fully trained
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0013
-
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0025a
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0025b
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0025c
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0025d
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0025e
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0025f
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0025g
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0025d
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0025h
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0025i
-
-END_TESTCASE SEC-AUT-AUTHSVR-0013
-
-// ////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0014
-//! @SYMTestCaseDesc Attempt to register a new identity, but a plugin returns the 'quit' code
-//! 		     (RegisterIdentity6_PluginExit)
-//! @SYMREQ REQ4954 REQ4955 REQ4958 REQ4968 REQ4970 4971 4972 4963 4985 4993 5008 5009
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is inactive, and a second one which is inactive
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Try to register a 2nd identity while using the 'Quit' code as the PIN input
-//! @SYMTestExpectedResults KErrAuthServPluginQuit is received, then the plugin is showed as 
-//!				partially trained, not fully trained
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0014
-
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !Error=-10805 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0026a
-RUN_TEST_STEP !RESULT=Fail 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0026b
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0026c
-
-END_TESTCASE SEC-AUT-AUTHSVR-0014 
-
-
-// ////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0015
-//! @SYMTestCaseDesc Attempt to register a new identity, but the authserver cannot uniquely resolve the identity with any of the supplied plugins
-//! 		     (RegisterIdentity7_NonUniqueIdentity_Retrain)
-//! @SYMREQ REQ4953 REQ4954 4955 4956 4963 4985 4993 5008 5009
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and two others which are active
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Try to register a 2nd identity. While training all the plug-ins, 
-//!			use the same data that was used with the default identity
-//! @SYMTestExpectedResults The second identity is not registered. All the plugins are still 
-//!				fully trained
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0015
-
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr_new 	INIT_CENREP c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defaultplugin1
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !Error=-10810  100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0027a
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0027b
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-
-END_TESTCASE SEC-AUT-AUTHSVR-0015 
-
-
-// ////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0016
-//! @SYMTestCaseDesc Attempt to register a new identity, but the training for the 2 active plugins is cancelled
-//! 		     (RegisterIdentity8_NonUniqueIdentity_AllPluginsCancelled)
-//! @SYMREQ REQ4953 REQ4954 4955 4956 4963 4985 4993 5008 5009
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is inactive, and a second one which is inactive
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API 
-//!			Try to register a 2nd identity while using the 'Cancel' code as the PIN input for all 3 plugins
-//! @SYMTestExpectedResults The 2nd identity is not registered then the 3 plugins are showed as fully trained
-//!			       
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0016
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !Error=-10810 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0028a
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0028b
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-END_TESTCASE SEC-AUT-AUTHSVR-0016
-
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0017
-//! @SYMTestCaseDesc Successful attempt at retraining a specified plugin
-//! 		     (RetrainPlug-in1_Normal)
-//! @SYMREQ REQ4953 REQ4954 4955 4956 4963 4985 4993 5008 5009
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Successfully register a 2nd identity while using a specified PIN input
-//!			Authenticate using the same PIN input so that the identity to be trained is one
-//!			that has been previously trained. 
-//!			Then call the Train() function, giving a different input. Then attempt to authenticate,
-//!			giving the new input
-//! @SYMTestExpectedResults The authentication, registration and retrain are successful. The plugin status is 
-//!			fully trained, then fully trained again. The new authenticate is successful.
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0017
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0041a
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0041b
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0041c
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0041d
-END_TESTCASE SEC-AUT-AUTHSVR-0017 
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0018
-//! @SYMTestCaseDesc Attempt at retraining a specified plugin, but authentication fails
-//! 		     (RetrainPlug-in2_AuthFailed)
-//! @SYMREQ 4969 4970 4971 4972 4975 4976 4977 4952 4963 4985 4993 5008 5009
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Successfully register a 2nd identity while using a specified PIN input
-//!			Authenticate then call the Train() function. Use the a PIN input that has not been used before 
-//!			so that no identity is returned as having that PIN. 
-//! @SYMTestExpectedResults The registration is successful, the authentication fails, and so the retrain is unsuccessful. 
-//!			The plugin status is fully trained, then fully trained again
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0018
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0042a
-RUN_TEST_STEP !RESULT=Fail 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0042b
-RUN_TEST_STEP !Error=-10806 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0042b
-END_TESTCASE SEC-AUT-AUTHSVR-0018
-
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0019
-//! @SYMTestCaseDesc Attempt to retrain a specified plugin, but the plugin is unknown
-//! 		     (RetrainPlug-in3_UnknownPlugin)
-//! @SYMREQ 4969 4970 4971 4972 4975 4976 4977 4952 4963 4985 4993 5008 5009
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Successfully register a 2nd identity while using a specified PIN input
-//!			Authenticate then call the Train() function. Use the a valid PIN so that an identity is 
-//!                     returned as having that PIN. 
-//!                     Attempt to retrain a plugin, but specify an unknown plugin.
-//! @SYMTestExpectedResults The registration is successful, the authentication passes, the retrain is unsuccessful. 
-//!                     and the KErrauthServNoSuchPlugin is returned
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0019
-
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0043a
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0043b
-RUN_TEST_STEP !Error=-10802 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0043c
-END_TESTCASE SEC-AUT-AUTHSVR-0019
-
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0020
-//! @SYMTestCaseDesc Attempt to retrain a specified plugin, but the 2nd authentication fails
-//! 		     (RetrainPlug-in4_2ndAuthFailed)
-//! @SYMREQ 4969 4970 4971 4972 4975 4976 4977 4978 4952 4963 4985 4993 5008 5009
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Successfully register a 2nd identity while using a specified PIN input
-//!			Authenticate then call the Train() function. Use the a PIN input that was used before so that the 
-//!			2nd identity is returned. A new PIN is now associated with the identity and that plugin
-//!			Attempt the authentication again, but using a wrong PIN. 
-//!                     Attempt the retrain a second time, given that the authentication has failed
-//! @SYMTestExpectedResults The registration is successful, The first 'authenticate' and 'train' calls succeed. 
-//!			The 2nd authentication fails, and so the 2nd call to train is unsuccessful. 
-//!			The plugin status is fully trained, all three times that it is checked
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0020
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0044a
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0044d
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0044b
-RUN_TEST_STEP !RESULT=Fail 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0044e
-RUN_TEST_STEP !Error=-10806 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0044c
-END_TESTCASE SEC-AUT-AUTHSVR-0020
-
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0030
-//! @SYMTestCaseDesc Attempt to retrain a specified plugin, but a non-unique transient key is generated, prompting 
-//!			the retrain to be cancelled
-//! 		     (RetrainPlug-in5_NonUniqueTransientKey)
-//! @SYMREQ 4969 4970 4971 4972 4975 4976 4977 4978 4963 4985 4993 5008 5009
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Successfully register a 2nd identity while using a unique PIN input
-//!                     Successfully register a 3rd identity while using another unique PIN input
-//!			Authenticate so that the 2nd identity is returned then call the Train() function. 
-//!                     Attempt to use the same PIN input that was used to register the 3rd Id, to train the 2nd Id
-//!			so that the retrain is cancelled.
-//! @SYMTestExpectedResults The registrations are successful, the authentication passes, but the retrain is cancelled. 
-//!			The plugin status is fully trained, then fully trained again
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0030
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0045a
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0045b
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0045c
-RUN_TEST_STEP !Error=-10804 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0045d
-
-END_TESTCASE SEC-AUT-AUTHSVR-0030
-
-
-// //// //
-// //! @SYMTestCaseID SEC-AUT-AUTHSVR-0031
-// //! @SYMTestCaseDesc Attempt to retrain a specified plugin, but a cancellation code is entered at the 'retrain' stage
-// //! 		        (RetrainPlug-in6_Cancel)
-// //! @SYMREQ 4969 4970 4971 4972 4975 4976 4977 4978 4963 4985 4993 5008 5009
-// //! @SYMTestPriority Medium
-// //! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-// //!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-// //!			call the Enumerate Plugins API
-// //!			Successfully register a 2nd identity while using a specified PIN input
-// //!			Authenticate then call the Train() function. Use the a cancellation code as the input
-// //!			so that the retrain is cancelled.
-// //! @SYMTestExpectedResults The registration is successful, the authentication passes, but the retrain is cancelled. 
-// //!			The plugin status is fully trained, then fully trained again
-// //! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0031
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0046a
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0046b
-RUN_TEST_STEP !Error=-10804	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0046c
-END_TESTCASE SEC-AUT-AUTHSVR-0031
-
-// ////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0032
-//! @SYMTestCaseDesc Attempt to retrain a specified plugin, but a Quit code is entered at the 'retrain' stage
-//! 		     (RetrainPlug-in7_Quit)
-//! @SYMREQ 4969 4970 4971 4972 4975 4976 4977 4978 4963 4985 4993 5008 5009
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Successfully register a 2nd identity while using a specified PIN input
-//!			Authenticate then call the Train() function. Use the a Quit code as the input
-//!			so that the retrain is quit.
-//! @SYMTestExpectedResults The registration is successful, the authentication passes, but the retrain is quit 
-//!			The plugin status is fully trained, then fully trained again
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0032
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0047a
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0047b
-RUN_TEST_STEP !Error=-10805 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0047c
-END_TESTCASE SEC-AUT-AUTHSVR-0032
-
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0033
-//! @SYMTestCaseDesc Successful attempt to retrain a specified plugin, then another plugin. 
-//! 		     (RetrainPlug-in8_TwoPlugins)
-//! @SYMREQ 4969 4970 4971 4972 4975 4976 4977 4978 4963 4985 4993 5008 5009
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Successfully register a 2nd identity while using a specified PIN input
-//!			Authenticate then call the Train() function on the first plugin. Use the a valid, unique input
-//!			Authenticate then call the Train function on the second plugin. Use a valid, unique input
-//!                  Attempt an authentication using a now-invalid input.(what was used earlier)
-//! @SYMTestExpectedResults The registration is successful, the authentication is successful in both cases, 
-//!			as well as the retrain calls. The last authentication fails since the training data has changed.
-//!			The plugin status for both plugins is fully trained, then fully trained again
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0033
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0048a
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0048b
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0048c
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0048d
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0048e
-RUN_TEST_STEP !RESULT=Fail 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0048f
-END_TESTCASE SEC-AUT-AUTHSVR-0033
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0034
-//! @SYMTestCaseDesc Attempt to add a new authentication method first to one then the second of the
-//!			two present identities
-//! 		     (AddAuthMethod1_BothIdentities_Normal)
-//! @SYMREQ 4969 4970 4971 4972 4975 4976 4977 4978 4963 4993 5008 5009
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is inactive
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Successfully register a 2nd identity while using a specified PIN input with the default plugin only
-//!			Authenticate then call the Train() function. Use an identifying input that corresponds to what
-//!			was used to register the default identity using the default plugin. Therefore the default identity
-//!			is returned following the Authentication. The training is then done for the 2nd plugin
-//!			Carry out the same process with the second identity
-//! @SYMTestExpectedResults The authentication is successful,  and the first train call passes.
-//!			but the second train call passes as well
-//!			The plugin status for the second plugin is untrained, trained, then fully trained
-//!			There are 2 identities present after the register identity step
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0034
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0061a
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0061b
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0061Ta
-RUN_TEST_STEP !Error=-5 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0061c
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0061d
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0061Tb
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0061e
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0061f
-END_TESTCASE SEC-AUT-AUTHSVR-0034
-
-// ////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0035
-//! @SYMTestCaseDesc Attempt to add a new authentication method first to one then the second of the
-//!			two present identities. Authentication fails in both cases.
-//! 		     (AddAuthMethod2_BothIdentities_AuthFailed)
-//! @SYMREQ 4969 4970 4971 4972 4975 4976 4977 4978 4963 4993 5008 5009
-//! @SYMTestPriority Medium
-//! @SYMTestActions   Have a default plugin defined, which is active, and a second one which is inactive
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Successfully register a 2nd identity while using a specified PIN input with the default plugin only
-//!			Fail to authenticate then try to call the Train() function. Use an identifying input that does not 
-//!			correspond to what was used to register the default identity using the default plugin. Therefore no identity
-//!			is returned following the Authentication. The training is then attempted for the 2nd plugin
-//!			Carry out the same process with the second identity
-//! @SYMTestExpectedResults The authentication is successful,  and the first train call passes.
-//!			but the second train call passes as well
-//!			The plugin status for the second plugin is untrained, trained, then fully trained
-//!			There are 2 identities present after the register identity step
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0035
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0062a
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0062b
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0062c
-RUN_TEST_STEP !RESULT=Fail 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0062d
-RUN_TEST_STEP !Error=-10806 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0062e
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0062f
-END_TESTCASE SEC-AUT-AUTHSVR-0035
-
-// ////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0063
-//! @SYMTestCaseDesc Attempt to add a new authentication method to one identity,
-//!		        but the pluginId is unknown
-//! 		     (AddAuthMethod3_UnknownPlugin)
-//! @SYMREQ 4969 4970 4971 4972 4975 4976 4977 4978 4963 5008 5009
-//! @SYMTestPriority Medium
-//! @SYMTestActions   Have a default plugin defined, which is active, and a second one of the same type, but not
-//!                     supporting default data
-//!			Use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			Successfully register a 2nd identity with the default plugin only
-//!
-//!			Successfully authenticate for the 2nd identity
-//!			then call the ReTrain() function specifying a unknown plugin
-//!
-//! @SYMTestExpectedResults The default plugin is fully trained, the 2nd plugin is untrained
-//!                     The authentication is successful, but the Retrain call fails
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0063
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0063a
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0063b
-RUN_TEST_STEP !Error=-10802 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0063c
-END_TESTCASE SEC-AUT-AUTHSVR-0063
-
-// ////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0065
-//! @SYMTestCaseDesc Attempt to add a new authentication method to the 2nd identity,
-//!		        but the training data used for the 2nd plugin is non-unique
-//! 		     (AddAuthMethod5_2ndIdentity_NonUniqueTransientKey)
-//! @SYMREQ 4969 4970 4971 4972 4975 4976 4977 4978 4963 5008 5009
-//! @SYMTestPriority Medium
-//! @SYMTestActions   Have a default plugin defined, which is active, and a second one of the same type, and both
-//!                     support default data
-//!			Use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			Successfully register a 2nd identity with both plugins
-//!
-//!			Successfully authenticate for the 2nd identity
-//!			then call the ReTrain() function specifying the 2nd plugin and the same training
-//!                  data used to train the first identity
-//!
-//! @SYMTestExpectedResults The default plugin is fully trained, the 2nd plugin is untrained
-//!                     The authentication is successful, but the Retrain call fails
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0065
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0065a
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0065b
-RUN_TEST_STEP !Error=-10804 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0065c
-END_TESTCASE SEC-AUT-AUTHSVR-0065
-
-// ////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0066
-//! @SYMTestCaseDesc Attempt to add a new authentication method to the 2nd identity,
-//!		        but the cancel code is sent by the user at the training stage
-//! 		     (AddAuthMethod6_2ndIdentity_Cancel)
-//! @SYMREQ 4969 4970 4971 4972 4975 4976 4977 4978 4963
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one of the same type, and only the
-//!                     default plugin supports default data
-//!			Use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			Successfully register a 2nd identity with the default plugin only
-//!
-//!			Successfully authenticate for the 2nd identity
-//!			then call the ReTrain() function specifying the 2nd plugin and the cancel code as training data 
-//!
-//! @SYMTestExpectedResults The default plugin is fully trained, the 2nd plugin is untrained
-//!                     The authentication is successful, but the Retrain call fails
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0066
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0066a
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0066b
-RUN_TEST_STEP !Error=-10804 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0066c
-END_TESTCASE SEC-AUT-AUTHSVR-0066
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0067
-//! @SYMTestCaseDesc Attempt to add a new authentication method to the 2nd identity,
-//!		        but the Quit code is sent by the user at the training stage
-//! 		     (AddAuthMethod7_2ndIdentity_Exit)
-//! @SYMREQ 4969 4970 4971 4972 4975 4976 4977 4978 4963
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one of the same type, and only the 
-//!                     default plugin supports default data
-//!			Use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			Successfully register a 2nd identity with the default plugin only
-//!
-//!			Successfully authenticate for the 2nd identity
-//!			then call the ReTrain() function specifying the 2nd plugin and the Quit code as training data 
-//!   
-//! @SYMTestExpectedResults The default plugin is fully trained, the 2nd plugin is untrained
-//!                     The authentication is successful, but the Retrain call fails
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0067
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0067a
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0067b
-RUN_TEST_STEP !Error=-10805 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0067c
-END_TESTCASE SEC-AUT-AUTHSVR-0067
-
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0081
-//! @SYMTestCaseDesc An AuthClient successfully authenticates a user
-//! 		     (Authenticate1_Normal)
-//! @SYMREQ REQ4966 4977 4978 4979 4980 4981 4963
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have the default identity and a 2nd identity registered, 
-//!			having both plug-ins trained with both identities.
-//!			Call the ‘Authenticate’ API  on the 2nd identity, with a freshness of 0 seconds
-//!			and an authentication expression.(Default AND 2nd plug-in)
-//! @SYMTestExpectedResults  The 2nd identity is successfully authenticated
-//!				A valid result is stored, i.e. a new identity number 
-//!				other than ‘unknown’ is now present. 
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0081
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthTestRegister
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0081b
-END_TESTCASE SEC-AUT-AUTHSVR-0081
-
-
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0082
-//! @SYMTestCaseDesc An AuthClient successfully authenticates a user using a subset of the auth. methods
-//! 		     (Authenticate2_SpecifiyMethodSubset)
-//! @SYMREQ REQ4966 4977 4978 4979 4980 4981 4963
-//! @SYMTestPriority Medium
-//! @SYMTestActions  
-//! @SYMTestExpectedResults 
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0082
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthTestRegister
-RUN_TEST_STEP !Result=Fail 100  tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0082b
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0082c
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0082d
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0082e
-END_TESTCASE SEC-AUT-AUTHSVR-0082 
-
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0083
-//! @SYMTestCaseDesc Authenticate3_NoActiveMethods
-//! @SYMREQ REQ4966 4977 4978 4979 4980 4981 4963
-//! @SYMTestPriority Medium
-//! @SYMTestActions  
-//! @SYMTestExpectedResults 
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0083
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthTestRegister
-RUN_TEST_STEP !Result=Fail 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0083b
-END_TESTCASE SEC-AUT-AUTHSVR-0083
-
- 
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0084
-//! @SYMTestCaseDesc Authenticate4_RestrictedAuth_VariousConfigurations
-//! @SYMREQ REQ4966 4977 4978 4979 4980 4981 4963
-//! @SYMTestPriority Medium
-//! @SYMTestActions  
-//! @SYMTestExpectedResults 
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0084
-LOAD_SUITE tAuthSvrWDD
-LOAD_SUITE tAuthSvrNC
-RUN_TEST_STEP !Result=0 100	tAuthSvrWDD 	REMOVE_DBS
-RUN_TEST_STEP !Result=Fail 100	tAuthSvrWDD 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthTestRegister
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthTestRegister
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0084b
-RUN_TEST_STEP !Result=0 100	tAuthSvrWDD	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0084b
-RUN_TEST_STEP !Error=-46 100	tAuthSvrNC 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0084b
-RUN_TEST_STEP !Result=0 100	tAuthSvrNC 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0084c
-RUN_TEST_STEP !Result=0 100	tAuthSvrNC 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0084d
-END_TESTCASE SEC-AUT-AUTHSVR-0084
-
-
-// ////
-// //! @SYMTestCaseID SEC-AUT-AUTHSVR-0085
-// //! @SYMTestCaseDesc Authenticate5_SpecifyType
-// //! @SYMREQ REQ4966 4977 4978 4979 4980 4981 4963
-// //! @SYMTestPriority Medium
-// //! @SYMTestActions  
-// //! @SYMTestExpectedResults 
-// //! @SYMDevelopedForRelease Intulo
-// START_TESTCASE SEC-AUT-AUTHSVR-0085
-// RUN_TEST_STEP !Result=0 100	tAuthSvr 	REMOVE_DBS
-// RUN_TEST_STEP !Result=0 100	tAuthSvr 	SET_PREFS 		c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0085b
-// RUN_TEST_STEP !Result=0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthTestRegister
-// RUN_TEST_STEP !Result=0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0085b
-// RUN_TEST_STEP !Result=0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0085c
-// END_TESTCASE SEC-AUT-AUTHSVR-0085
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0086
-//! @SYMTestCaseDesc Authenticate6_SpecifyPreferredPluginOfType
-//! @SYMREQ REQ4966 4977 4978 4979 4980 4981 4963
-//! @SYMTestPriority Medium
-//! @SYMTestActions  
-//! @SYMTestExpectedResults 
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0086 
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	SET_PREFS 		c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0086b
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthTestRegister
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0086b
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0086c
-END_TESTCASE SEC-AUT-AUTHSVR-0086
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0087
-//! @SYMTestCaseDesc Authenticate7_NoActivePluginsOfSpecifiedType
-//! @SYMREQ REQ4966 4977 4978 4979 4980 4981 4963
-//! @SYMTestPriority Medium
-//! @SYMTestActions  
-//! @SYMTestExpectedResults 
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0087
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	SET_PREFS 		c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0087b
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthTestRegister
-RUN_TEST_STEP !Result=Fail 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0087b
-RUN_TEST_STEP !Result=Fail 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0087c
-RUN_TEST_STEP !Result=Fail 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0087d
-END_TESTCASE SEC-AUT-AUTHSVR-0087
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0088
-//! @SYMTestCaseDesc Authenticate8_PluginInactiveSoAlternativeSubExpressionIsUsed
-//! @SYMREQ REQ4966 4977 4978 4979 4980 4981 4963
-//! @SYMTestPriority Medium
-//! @SYMTestActions  
-//! @SYMTestExpectedResults 
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0088
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	SET_PREFS 		c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0087b
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthTestRegister
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0088b
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0088c
-END_TESTCASE SEC-AUT-AUTHSVR-0088
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0089
-//! @SYMTestCaseDesc Authenticate9_ServerStopped
-//! @SYMREQ REQ4966 4977 4978 4979 4980 4981 4963
-//! @SYMTestPriority Medium
-//! @SYMTestActions  
-//! @SYMTestExpectedResults 
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0089
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthTestRegister
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0089b
-DELAY 3500
-RUN_TEST_STEP !Result=Fail 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0089c
-END_TESTCASE SEC-AUT-AUTHSVR-0089
-
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0092
-//! @SYMTestCaseDesc Authenticate12_NoUserIdentified
-//! @SYMREQ REQ4966 4977 4978 4979 4980 4981 4963
-//! @SYMTestPriority Medium
-//! @SYMTestActions  
-//! @SYMTestExpectedResults 
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0092
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthTestRegister
-RUN_TEST_STEP !Result=Fail 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0092b
-END_TESTCASE SEC-AUT-AUTHSVR-0092
-
-//
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0093
-//! @SYMTestCaseDesc An authclient successfully authenticates where the user specifies the auth method
-//!                  given that no preferred method exists
-//! 		     (Authenticate13_UserSelectsMethod)
-//! @SYMREQ 4984 4977 4979 4980 4963
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have 3 plugins that support default data and are active, all trained with the default identity
-//!                  and a second identity
-//!                  Call authenticate, expecting the 2nd identity with a freshness of 0 seconds and an auth expression
-//!                  of (2nd OR 3rd plugin). Supply correct input for the 3rd plugin, but wrong info for the 2nd plugin
-//!                  Call authenticate, expecting the 2nd identity with a freshness of 300 seconds and an auth
-//!                  expression of (Default AND 2nd plugin). Supply wrong input for the 2nd plugin and the default plugin
-//! @SYMTestExpectedResults First, the 2nd identity is successfully authenticated.
-//!                  During the second auth call, the input data is not read since the auth step is waived, since the 
-//!                  freshness period has not elapsed.
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0093
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthTestRegister
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0093b
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0093c
-END_TESTCASE SEC-AUT-AUTHSVR-0093
-
-
-
-
-// ////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0036
-//! @SYMTestCaseDesc Successful attempt to remove a specified identity
-//! 		     (RemoveIdentity1_Normal)
-//! @SYMREQ 4964 4965 4966 4954 4963
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Successfully register a 2nd identity while using a specified PIN input
-//!			Authenticate then call the removeIdentity() function. Use the a valid input so that the
-//!			identity that was recently registered is returned following the Authentication, then removed
-//! @SYMTestExpectedResults The registration is successful, the authentication is successful, 
-//!			as well as the removeIdentity call.
-//!			The plugin status for both plugins is fully trained, then fully trained again
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0036
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0101a
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0101b
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0101b
-RUN_TEST_STEP !Result=Fail 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0101d
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0101b
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-END_TESTCASE SEC-AUT-AUTHSVR-0036
-
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0037
-//! @SYMTestCaseDesc Attempt to remove a specified identity when only one identity exists
-//! 		     (RemoveIdentity2_OneIdentity)
-//! @SYMREQ 4964 4965 4966 4954 4963
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Authenticate then call the removeIdentity() function. Use an input that corresponds to what
-//!			was used to register the default identity. Therefore the default identity is returned 
-//!			following the Authentication, then attempt to remove it
-//! @SYMTestExpectedResults The authentication is successful, but the removeIdentity call fails
-//!			The plugin status for the specified plugin is fully trained, then fully trained again
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0037
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0102a
-RUN_TEST_STEP !Error=-10811 100	tAuthSvr 	REMOVE_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0102b
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0102c
-END_TESTCASE SEC-AUT-AUTHSVR-0037
-
-
-// ////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0038
-//! @SYMTestCaseDesc Attempt to remove a non-existent identity
-//! 		     (RemoveIdentity3_NonExistentIdentity)
-//! @SYMREQ 4964 4965 4966 4954 4963
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Successfully register a 2nd identity while using a specified PIN input
-//!			Authenticate then call the removeIdentity() function.
-//!                     However, set the forgetUnknown flag to true, so that the test attempts to remove
-//!                     a non-existent identity
-//! @SYMTestExpectedResults The authentication is successful.
-//!			but the removeIdentity call fails because the identity is not found by the AuthServer
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0038
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0103a
-RUN_TEST_STEP !RESULT=Fail 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0103b
-RUN_TEST_STEP !Error=-10808 100	tAuthSvr 	REMOVE_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0103c
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0103c
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-END_TESTCASE SEC-AUT-AUTHSVR-0038
-
-// ////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0039
-//! @SYMTestCaseDesc Attempt to remove a specified identity but the authentication fails
-//! 		     (RemoveIdentity4_AuthFailed)
-//! @SYMREQ 4964 4965 4966 4954 4963
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Successfully register a 2nd identity while using a specified PIN input
-//!			Authenticate then call the removeIdentity() function. Use an input that doesn't correspond
-//!			to what was used to register the 2nd identity. Therefore no identity is returned 
-//!			following the Authentication. Attempt to remove this absent identity.
-//! @SYMTestExpectedResults The authentication fails,  and the removeIdentity call fails.
-//!			because there is no such identity in the authentication server.
-//!			The plugin status for the specified plugin is fully trained, then fully trained again
-//!			There's 1 identity present after the 2 removeIdentity calls
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0039
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0104a
-RUN_TEST_STEP !RESULT=Fail 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0104b
-RUN_TEST_STEP !Error=-10808 100	tAuthSvr 	REMOVE_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0104c
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0104c
-END_TESTCASE SEC-AUT-AUTHSVR-0039
-
-// ////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0040
-//! @SYMTestCaseDesc Attempt to remove a non-existent identity when two other identities exist
-//! 		     (RemoveIdentity5_NonExistentIdentity_TwoOthersExist)
-//! @SYMREQ 4964 4965 4966 4954 4963 5011
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Successfully register a 2nd identity while using a specified PIN input
-//!			Successfully register a 3rd identity while using a specified PIN input
-//!			Authenticate then call the removeIdentity() function. Use an input that corresponds to what
-//!			was used to register the 2nd identity. Therefore the 2nd identity is returned 
-//!			following the Authentication. Remove this second identity then attempt to remove it again
-//! @SYMTestExpectedResults The authentication is successful,  and the first removeIdentity call passes.
-//!			but the second removeIdentity call fails because an unknown identity was specified
-//!			The plugin status for the specified plugin is fully trained, then fully trained again
-//!			There are 2 identities present after the 2 removeIdentity calls
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0040
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0105a
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0105b
-RUN_TEST_STEP !RESULT=Fail 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0105c
-RUN_TEST_STEP !Error=-10808 100	tAuthSvr 	REMOVE_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0105d
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0105d
-END_TESTCASE SEC-AUT-AUTHSVR-0040
-
-// ////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0049
-//! @SYMTestCaseDesc A user successfully removes an authentication plug-in trained for their identity
-//! 		     (ForgetPlug-in1_Normal)
-//! @SYMREQ REQ4964 REQ4965 REQ4966 REQ4954 4963
-//! @SYMTestPriority Medium
-//! @SYMTestActions  
-//! @SYMTestExpectedResults 
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0049 
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0121b
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0121a
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	FORGET_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0121c
-RUN_TEST_STEP !RESULT=Fail 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0121d
-END_TESTCASE SEC-AUT-AUTHSVR-0049
-
-// ////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0050
-//! @SYMTestCaseDesc A user attempts to remove an auth plug-in trained for their identity, but there's only a single auth method for the identity.
-//! 		     (ForgetPlug-in1_LastPlugin)
-//! @SYMREQ REQ4964 REQ4965 REQ4966 REQ4954 4963
-//! @SYMTestPriority Medium
-//! @SYMTestActions  
-//! @SYMTestExpectedResults 
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0050
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0122b
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0122a
-RUN_TEST_STEP !Error=-10812 100 tAuthSvr FORGET_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0122c
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0122a
-END_TESTCASE SEC-AUT-AUTHSVR-0050
-
-// ///
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0051
-//! @SYMTestCaseDesc A user attempts to remove an auth plug-in, but the identity has no transient key associated with this plug-in
-//! 		     (ForgetUntrainedAuthMethod)
-//! @SYMREQ REQ4964 REQ4965 REQ4966 REQ4954 4963
-//! @SYMTestPriority Medium
-//! @SYMTestActions  
-//! @SYMTestExpectedResults 
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0051
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0123b
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0123a
-RUN_TEST_STEP !Error=-10809 100      tAuthSvr        FORGET_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0123c
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0123a
-END_TESTCASE SEC-AUT-AUTHSVR-0051 
-
-// ///
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0052
-//! @SYMTestCaseDesc A user attempts to remove an auth plug-in, but the plugin does not exist
-//! 		     (ForgetUnknownPlugin)
-//! @SYMREQ REQ4964 REQ4965 REQ4966 REQ4954 4963
-//! @SYMTestPriority Medium
-//! @SYMTestActions  
-//! @SYMTestExpectedResults 
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0052
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0124b
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0124a
-RUN_TEST_STEP !Error=-10809 100 tAuthSvr 	FORGET_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0124c
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0124a
-END_TESTCASE SEC-AUT-AUTHSVR-0052
-
-// //
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0053
-//! @SYMTestCaseDesc A user attempts to remove an auth plug-in, but the identity specified does not exist
-//! 		     (ForgetUnknownIdentity)
-//! @SYMREQ REQ4964 REQ4965 REQ4966 REQ4954
-//! @SYMTestPriority Medium
-//! @SYMTestActions  
-//! @SYMTestExpectedResults 
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0053
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !Error=-10803 100 tAuthSvr FORGET_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0125
-END_TESTCASE SEC-AUT-AUTHSVR-0053
-
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0054
-//! @SYMTestCaseDesc Auth preferences are set correctly.
-//! 		     (SetPreference_Success)
-//! @SYMREQ REQ4983 REQ4973 REQ4966 REQ4967 REQ4968
-//! @SYMTestPriority Medium
-//! @SYMTestActions  
-//! @SYMTestExpectedResults 
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0054
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0141
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	SET_PREFS 	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0141
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE    c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0141
-END_TESTCASE SEC-AUT-AUTHSVR-0054
-
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0055
-//! @SYMTestCaseDesc An Auth preference is set with an invalid plug-in
-//! 		     (SetPreference_UnknownPlugin)
-//! @SYMREQ REQ4964 REQ4965 REQ4966 REQ4954
-//! @SYMTestPriority Medium
-//! @SYMTestActions  
-//! @SYMTestExpectedResults 
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0055
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0142
-RUN_TEST_STEP !Error=-6 100	tAuthSvr 	SET_PREFS       c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0142
-RUN_TEST_STEP !Error=-10802 100	tAuthSvr AUTHENTICATE    c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0142
-END_TESTCASE SEC-AUT-AUTHSVR-0055
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0143
-//! @SYMTestCaseDesc An Auth preference is set with plugin types that don't match the specified categories for which
-//!                  they were set as preferred.
-//! 		     (SetPreference_WrongCategory)
-//! @SYMREQ REQ4964 REQ4965 REQ4966 REQ4954 REQ4974
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Register an identity, training with 4 plugins, A, B, C, D
-//!                  Set the preferences Knowledge = C,  Biometric = A, Token = B
-//!                  Where C, A and B are actually Biometric, Knowledge and Knowledge types
-//! @SYMTestExpectedResults The registration is successful, but the authentication fails, since the plugins
-//!                  selected in the preferences are of the wrong type or category
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0143
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0143
-RUN_TEST_STEP !Error=-6	tAuthSvr 	SET_PREFS       c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0143
-RUN_TEST_STEP !Result=Fail 100	tAuthSvr 	AUTHENTICATE    c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0143
-END_TESTCASE SEC-AUT-AUTHSVR-0143
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0145
-//! @SYMTestCaseDesc Remove_PinPlugin_Data
-START_TESTCASE SEC-AUT-AUTHSVR-0145
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_in.dat
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_out.dat
-END_TESTCASE SEC-AUT-AUTHSVR-0145
-
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0146
-//! @SYMTestCaseDesc Check the information published with no identities registered.
-//! @SYMREQ REQ11228
-//! @SYMTestPriority High
-//! @SYMTestActions  Start the AuthServer and check for information published by KUidAuthServerLastAuth property
-//! @SYMTestExpectedResults No value is published
-//! @SYMDevelopedForRelease Intulo
-
-START_TESTCASE SEC-AUT-AUTHSVR-0146
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RESULT_AVAILABILITY	c:\tauth\tAuthSvr\testdata\authsvrpolicy.ini SectionOne
-END_TESTCASE SEC-AUT-AUTHSVR-0146
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0147
-//! @SYMTestCaseDesc Check the published value on authentication failure for the first user
-//! @SYMREQ REQ11228 
-//! @SYMTestPriority High
-//! @SYMTestActions  Register an Identity but cause the authentication to fail.Check for the value published by KUidAuthServerLastAuth 
-//! @SYMTestExpectedResults No Value is published
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0147
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0156
-RUN_TEST_STEP !Result=Fail 100 tAuthSvr 	AUTHENTICATE    c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0157
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RESULT_AVAILABILITY	c:\tauth\tAuthSvr\testdata\authsvrpolicy.ini SectionOne
-END_TESTCASE SEC-AUT-AUTHSVR-0147
-
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0148
-//! @SYMTestCaseDesc Check the published value on successful authentication
-//! @SYMREQ REQ11228
-//! @SYMTestPriority High
-//! @SYMTestActions  Register and Authenticate a user successfully.Check for the published KUidAuthServerLastAuth property value
-//! @SYMTestExpectedResults The authenticated user information should be available.
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0148
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0158
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE    c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0159
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RESULT_AVAILABILITY	c:\tauth\tAuthSvr\testdata\authsvrpolicy.ini SectionOne
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE    c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0159
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RESULT_AVAILABILITY	c:\tauth\tAuthSvr\testdata\authsvrpolicy.ini SectionOne
-END_TESTCASE SEC-AUT-AUTHSVR-0148
-
-
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0149
-//! @SYMTestCaseDesc Check the published value on authentication failure
-//! @SYMREQ REQ11228 
-//! @SYMTestPriority High
-//! @SYMTestActions  Register an Identity but cause the authentication to fail.Check for the value published by KUidAuthServerLastAuth 
-//! @SYMTestExpectedResults The User Information of the previously successful Identity is available.
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0149
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0156
-RUN_TEST_STEP !Result=Fail 100 tAuthSvr 	AUTHENTICATE    c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0157
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RESULT_AVAILABILITY	c:\tauth\tAuthSvr\testdata\authsvrpolicy.ini SectionOne
-END_TESTCASE SEC-AUT-AUTHSVR-0149
- 
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0150
-//! @SYMTestCaseDesc Notification of a change in authenticated identity on successful authentication.
-//! @SYMREQ REQ11228,REQ11229
-//! @SYMTestPriority High
-//! @SYMTestActions  Register and Authenticate an identity and check if the KUidAuthServerAuthChangeEvent Property 
-//!      	      gets published with  the new Identity .Reauthenticate the same identity again and check for the published value		      value
-//! @SYMTestExpectedResults Registration and Authentication is successful,KUidAuthServerAuthChangeEvent gets published with
-//!			    the new Identity. ReAuthentication is successful, but KUidAuthServerAuthChangeEvent is not published
-//! @SYMDevelopedForRelease Intulo
-
-START_TESTCASE SEC-AUT-AUTHSVR-0150
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr	RESULT_NOTIFICATION   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0160
-END_TESTCASE SEC-AUT-AUTHSVR-0150
-
-
-
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0151
-//! @SYMTestCaseDesc Notification of a change in authenticated identity on authentication failure.
-//! @SYMREQ REQ11228,REQ11229
-//! @SYMTestPriority High
-//! @SYMTestActions  Register an Identity but fail the Authentication.check if the KUidAuthServerAuthChangeEvent Property 
-//!      	      gets published with  the new Identity
-//! @SYMTestExpectedResults Registration is successful,Authentication fails,KUidAuthServerAuthChangeEvent is not published
-//! @SYMDevelopedForRelease Intulo
-
-START_TESTCASE SEC-AUT-AUTHSVR-0151
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr	RESULT_NOTIFICATION   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0161
-END_TESTCASE SEC-AUT-AUTHSVR-0151
-
-
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0152
-//! @SYMTestCaseDesc Notification of a change in authenticated identity upon DeAuthentication
-//! @SYMREQ REQ11228,REQ11229
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Register and Authenticate an identity and DeAuthenticate it.
-//! @SYMTestExpectedResults DeAuthentication is successful, KUidAuthServerAuthChangeEvent gets published with 0.
-//! @SYMDevelopedForRelease Intulo
-
-
-START_TESTCASE SEC-AUT-AUTHSVR-0152
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr	RESULT_NOTIFICATION   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0162
-END_TESTCASE SEC-AUT-AUTHSVR-0152
-
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0153
-//! @SYMTestCaseDesc Update the default plugin to 11113100
-
-START_TESTCASE SEC-AUT-AUTHSVR-0153
-RUN_UTILS DeleteFile C:\private\10202be9\persists\2001ea7f.cre
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr_new 	INIT_CENREP c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defaultplugin1
-END_TESTCASE SEC-AUT-AUTHSVR-0153
-
-
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0154
-//! @SYMTestCaseDesc API validation testing for Asynchronous Authenticate using the default plugin.
-//!                  
-//! @SYMREQ REQ11230
-//! @SYMTestPriority High
-//! @SYMTestActions  Remove the Authentication database and call Authenticate using the default plugin and default identity.
-//! @SYMTestExpectedResults Authentication is successful.
-//! @SYMDevelopedForRelease Intulo
-
-START_TESTCASE SEC-AUT-AUTHSVR-0154
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defidentity1
-END_TESTCASE SEC-AUT-AUTHSVR-0154
-
-
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0155
-//! @SYMTestCaseDesc API validation testing for Synchronous Authenticate using the default plugin.
-//!                  
-//! @SYMREQ REQ11230
-//! @SYMTestPriority High
-//! @SYMTestActions  Remove the Authentication database and call Authenticate using the default plugin and default identity.
-//! @SYMTestExpectedResults Authentication is successful.
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0155
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defidentity2
-END_TESTCASE SEC-AUT-AUTHSVR-0155
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0155
-//! @SYMTestCaseDesc API validation testing for Asynchronous Authenticate using the default plugin.
-//!                  
-//! @SYMREQ REQ11230
-//! @SYMTestPriority High
-//! @SYMTestActions  Remove the Authentication database and call Authenticate using the default plugin and an invalid pin.
-//! @SYMTestExpectedResults Authentication fails.
-//! @SYMDevelopedForRelease Intulo
-
-START_TESTCASE SEC-AUT-AUTHSVR-0155
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !RESULT=FAIL 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defidentity3
-END_TESTCASE SEC-AUT-AUTHSVR-0155
-
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0156
-//! @SYMTestCaseDesc API validation testing for Synchronous Authenticate using the default plugin.
-//!                  
-//! @SYMREQ REQ11230
-//! @SYMTestPriority High
-//! @SYMTestActions  Remove the Authentication database and call Authenticate using the default plugin and an invalid pin.
-//! @SYMTestExpectedResults Authentication fails
-//! @SYMDevelopedForRelease Intulo
-
-START_TESTCASE SEC-AUT-AUTHSVR-0156
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !RESULT=FAIL  100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defidentity4
-END_TESTCASE SEC-AUT-AUTHSVR-0156
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0157
-//! @SYMTestCaseDesc Set the default plugin value to a plugin with no default data                  
-//! @SYMREQ REQ11230
-//! @SYMTestPriority High
-//! @SYMTestActions  Remove the Authentication database and call Authenticate using the default plugin and default identity.
-//! @SYMTestExpectedResults AuthServer fails to startup as the default user is not created successfully.
-//! @SYMDevelopedForRelease Intulo
-
-START_TESTCASE SEC-AUT-AUTHSVR-0157
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-RUN_UTILS DeleteFile C:\private\10202be9\persists\2001ea7f.cre
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr_new 	INIT_CENREP c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defaultplugin2
-
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !RESULT=-2  100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defaultplugin3
-END_TESTCASE SEC-AUT-AUTHSVR-0157
-
-
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0158
-//! @SYMTestCaseDesc Try to retrain the default user              
-//! @SYMREQ REQ11230
-//! @SYMTestPriority High
-//! @SYMTestActions  Remove the Authentication database and call retrain on the default identity.
-//! @SYMTestExpectedResults Fails with KErrNotSupported.
-//! @SYMDevelopedForRelease Intulo
-
-
-START_TESTCASE SEC-AUT-AUTHSVR-0158
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defidentity2
-RUN_TEST_STEP !Error=-5  100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defaultplugin4
-END_TESTCASE SEC-AUT-AUTHSVR-0158
-
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0159
-//! @SYMTestCaseDesc Try to remove the default user                
-//! @SYMREQ REQ11230
-//! @SYMTestPriority High
-//! @SYMTestActions  Remove the Authentication database and authenticate successfully using the default Id.
-//! 			   Try to remove the default identity.
-//! @SYMTestExpectedResults Fails with -10811 (KErrAuthServCanNotRemoveDefaultIdentity)
-//! @SYMDevelopedForRelease Intulo
-
-START_TESTCASE SEC-AUT-AUTHSVR-0159
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defidentity2
-RUN_TEST_STEP !Error=-10811  100	tAuthSvr 	REMOVE_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defidentity6
-END_TESTCASE SEC-AUT-AUTHSVR-0159
-
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0160
-//! @SYMTestCaseDesc Call forget plugin on the default identity/default plugin pair 
-//!                  
-//! @SYMREQ REQ11230
-//! @SYMTestPriority High
-//! @SYMTestActions  Remove the Authentication database and authenticate successfully using the default Id.
-//! 			   Call forget plugin on the default Identity/ default plugin pair.
-//! @SYMTestExpectedResults Fails with -10812 (KErrAuthServCanNotRemoveLastPlugin)
-//! @SYMDevelopedForRelease Intulo
-
-START_TESTCASE SEC-AUT-AUTHSVR-0160
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 		REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 		AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defidentity2
-RUN_TEST_STEP !Error=-10812  100	tAuthSvr 	FORGET_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defidentity7
-END_TESTCASE SEC-AUT-AUTHSVR-0160
-
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0161
-//! @SYMTestCaseDesc API validation testing for Asynchronous Authenticate using the default plugin (null alias).
-//!                  
-//! @SYMREQ REQ11230
-//! @SYMTestPriority High
-//! @SYMTestActions  Remove the Authentication database and call Authenticate using the default plugin and default identity.
-//! @SYMTestExpectedResults Authentication is successful.
-//! @SYMDevelopedForRelease Intulo
-
-START_TESTCASE SEC-AUT-AUTHSVR-0161
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr_new 	INIT_CENREP c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defaultplugin1
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defidentity8
-END_TESTCASE SEC-AUT-AUTHSVR-0161
-
-
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0162
-//! @SYMTestCaseDesc API validation testing for Synchronous Authenticate using the default plugin (null alias).
-//!                  
-//! @SYMREQ REQ11230
-//! @SYMTestPriority High
-//! @SYMTestActions  Remove the Authentication database and call Authenticate using the default plugin and default identity.
-//! @SYMTestExpectedResults Authentication is successful.
-//! @SYMDevelopedForRelease Intulo
-
-START_TESTCASE SEC-AUT-AUTHSVR-0162
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defidentity9
-END_TESTCASE SEC-AUT-AUTHSVR-0162
-
-
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0163
-//! @SYMTestCaseDesc API validation testing for Asynchronous Authenticate using the default plugin (null alias)..
-//!                  
-//! @SYMREQ REQ11230
-//! @SYMTestPriority High
-//! @SYMTestActions  Remove the Authentication database and call Authenticate using the default plugin and default identity.
-/
-//! @SYMTestExpectedResults Authentication fails.
-//! @SYMDevelopedForRelease Intulo
-
-START_TESTCASE SEC-AUT-AUTHSVR-0163
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !RESULT=FAIL 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defidentity10
-END_TESTCASE SEC-AUT-AUTHSVR-0163
-
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0164
-//! @SYMTestCaseDesc API validation testing for Synchronous Authenticate using the default plugin (null alias).
-//!                  
-//! @SYMREQ REQ11230
-//! @SYMTestPriority High
-//! @SYMTestActions  Remove the Authentication database and call Authenticate using the default plugin and default identity.
-/
-//! @SYMTestExpectedResults Authentication fails
-//! @SYMDevelopedForRelease Intulo
-
-START_TESTCASE SEC-AUT-AUTHSVR-0164
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !RESULT=FAIL  100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defidentity11
-RUN_UTILS DeleteFile C:\private\10202be9\persists\2001ea7f.cre
-END_TESTCASE SEC-AUT-AUTHSVR-0164
-
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0166
-//! @SYMTestCaseDesc Test authentication using an alias which is defined in terms of other aliases wherein 
-//!		     some of those aliases are inturn defined as empty string in authserver's cenrep file.
-//! @SYMREQ REQ11232,REQ11234
-//! @SYMTestActions  Register an identity and authenticate it using an alias as described above.
-//! @SYMTestExpectedResults Authentication must fail with KErrAuthStrengthAliasNotDefined.
-//! @SYMDevelopedForRelease Diran
-
-START_TESTCASE SEC-AUT-AUTHSVR-0166
-
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !Result=0 100	tAuthSvr	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthTestRegister
-
-RUN_TEST_STEP !Result=0 100	tAuthSvr_new	INIT_CENREP	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0166
-RUN_TEST_STEP !Error=-10816 100 tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0166
-
-END_TESTCASE SEC-AUT-AUTHSVR-0166
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0170
-//! @SYMTestCaseDesc Test authentication using an alias which is defined in terms of other aliases wherein some 
-//!		     of those aliases are inturn defined as empty quotes in authserver's cenrep file.
-//! @SYMREQ REQ11232,REQ11234
-//! @SYMTestActions  Register an identity and authenticate it using an alias as described above.
-//! @SYMTestExpectedResults Authentication must fail with KErrAuthStrengthAliasNotDefined.
-//! @SYMDevelopedForRelease Diran
-
-START_TESTCASE SEC-AUT-AUTHSVR-0170
-
-RUN_TEST_STEP !Result=0 100	tAuthSvr_new	INIT_CENREP	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0170
-RUN_TEST_STEP !Error=-10816 100 tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0170
-
-END_TESTCASE SEC-AUT-AUTHSVR-0170
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0171
-//! @SYMTestCaseDesc Test authentication using an alias whose alias string is an invalid expression (invalid/unknown alias).
-//! @SYMREQ REQ11232,REQ11234
-//! @SYMTestActions  Register an identity and authenticate it using an alias as described above.
-//! @SYMTestExpectedResults Authentication must fail with KErrAuthServInvalidAliasStringExpression.
-//! @SYMDevelopedForRelease Diran
-
-START_TESTCASE SEC-AUT-AUTHSVR-0171
-
-RUN_TEST_STEP !Result=0 100	tAuthSvr_new	INIT_CENREP	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0171
-RUN_TEST_STEP !Error=-10817 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0171
-
-END_TESTCASE SEC-AUT-AUTHSVR-0171
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0172
-//! @SYMTestCaseDesc Test authentication using an alias whose alias string is an invalid expression (invalid operator).
-//! @SYMREQ REQ11232,REQ11234
-//! @SYMTestActions  Register an identity and authenticate it using an alias as described above.
-//! @SYMTestExpectedResults Authentication must fail with KErrAuthServInvalidAliasStringExpression.
-//! @SYMDevelopedForRelease Diran
-
-START_TESTCASE SEC-AUT-AUTHSVR-0172
-
-RUN_TEST_STEP !Result=0 100	tAuthSvr_new	INIT_CENREP	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0172
-RUN_TEST_STEP !Error=-10817 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0172
-
-END_TESTCASE SEC-AUT-AUTHSVR-0172
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0173
-//! @SYMTestCaseDesc Test synchronous mode of authentication using an alias which is defined in terms of multiple aliases.
-//! @SYMREQ REQ11232,REQ11234
-//! @SYMTestActions  Register an identity and authenticate using an alias.
-//! @SYMTestExpectedResults Authentication is successful
-//! @SYMDevelopedForRelease Diran
-
-START_TESTCASE SEC-AUT-AUTHSVR-0173
-
-// Tests synchronous mode of authentication.
-RUN_TEST_STEP !Result=0 100	tAuthSvr_new	INIT_CENREP	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0173
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0173
-
-END_TESTCASE SEC-AUT-AUTHSVR-0173
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0174
-//! @SYMTestCaseDesc Test asynchronous mode of authentication using an alias which is defined in terms of multiple aliases.
-//! @SYMREQ REQ11232,REQ11234
-//! @SYMTestActions  Register an identity and authenticate using an alias.
-//! @SYMTestExpectedResults Authentication is successful
-//! @SYMDevelopedForRelease Diran
-
-START_TESTCASE SEC-AUT-AUTHSVR-0174
-
-//Tests aynchronous mode of authentication.
-RUN_TEST_STEP !Result=0 100	tAuthSvr_new	INIT_CENREP	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0174
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0174
-
-END_TESTCASE SEC-AUT-AUTHSVR-0174
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0175
-//! @SYMTestCaseDesc Test synchronous mode of authentication using an alias which is defined as a subset of other aliases.
-//! @SYMREQ REQ11232,REQ11234
-//! @SYMTestActions  Register an identity and authenticate using an alias.
-//! @SYMTestExpectedResults Authentication is successful
-//! @SYMDevelopedForRelease Diran
-
-START_TESTCASE SEC-AUT-AUTHSVR-0175
-
-// Tests asynchronous mode of authentication wherein some aliases are a subset of the other.
-RUN_TEST_STEP !Result=0 100	tAuthSvr_new	INIT_CENREP	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0175
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0175
-
-END_TESTCASE SEC-AUT-AUTHSVR-0175
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0176
-//! @SYMTestCaseDesc Test the auth expression evaluation .An alias which is defined as a 
-//!		     combination of other aliases and pluginId, and one of the plugin 11113103 is supplied with wrong pin.
-//! @SYMREQ REQ11232,REQ11234
-//! @SYMTestActions  Register an identity and authenticate using an alias.
-//! @SYMTestExpectedResults Authentication is successful
-//! @SYMDevelopedForRelease Diran
-
-START_TESTCASE SEC-AUT-AUTHSVR-0176
-
-// Tests asynchronous mode of authentication with complex auth expressions.
-RUN_TEST_STEP !Result=0 100	tAuthSvr_new	INIT_CENREP	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0176
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0176
-
-END_TESTCASE SEC-AUT-AUTHSVR-0176
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0177
-//! @SYMTestCaseDesc Authentication via aliases recursive definition test. Tests short circuit condition.
-//! @SYMREQ REQ11232,REQ11234
-//! @SYMTestActions  Register an identity and authenticate using an alias which has been defined recursively.
-//! @SYMTestExpectedResults Authentication must fail with KErrAuthServInvalidAliasStringExpression.
-//! @SYMDevelopedForRelease Diran
-
-START_TESTCASE SEC-AUT-AUTHSVR-0177
-
-RUN_TEST_STEP !Result=0 100	tAuthSvr_new	INIT_CENREP	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0177
-RUN_TEST_STEP !Error=-10817 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0177
-
-END_TESTCASE SEC-AUT-AUTHSVR-0177
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0178
-//! @SYMTestCaseDesc Authentication via aliases recursive definition test. Tests short circuit condition.
-//! @SYMREQ REQ11232,REQ11234
-//! @SYMTestActions  Register an identity and authenticate using an alias which has been defined recursively.
-//! @SYMTestExpectedResults Authentication must fail with KErrAuthServInvalidAliasStringExpression.
-//! @SYMDevelopedForRelease Diran
-
-START_TESTCASE SEC-AUT-AUTHSVR-0178
-
-RUN_TEST_STEP !Result=0 100	tAuthSvr_new	INIT_CENREP	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0178
-RUN_TEST_STEP !Error=-10817 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0178
-
-END_TESTCASE SEC-AUT-AUTHSVR-0178
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0179
-//! @SYMTestCaseDesc Authenticate using an alias which is not specified in authserver's cenrep file.
-//! @SYMREQ REQ11232,REQ11234
-//! @SYMTestActions  Register an identity and authenticate using an unknown alias.
-//! @SYMTestExpectedResults Authentication must fail with KErrUnknownAuthStrengthAlias.
-//! @SYMDevelopedForRelease Diran
-
-START_TESTCASE SEC-AUT-AUTHSVR-0179
-
-RUN_TEST_STEP !Result=0 100	tAuthSvr_new	INIT_CENREP	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0179
-RUN_TEST_STEP !Error=-10815 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0179
-
-END_TESTCASE SEC-AUT-AUTHSVR-0179
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0180
-//! @SYMTestCaseDesc Negative tests for authentication via aliases.
-//! @SYMREQ REQ11232,REQ11234
-//! @SYMTestActions  Register an identity and authenticate using an alias.
-//! @SYMTestExpectedResults Authentication must fail.
-//! @SYMDevelopedForRelease Diran
-
-START_TESTCASE SEC-AUT-AUTHSVR-0180
-
-// Tests synchronous mode of authentication.
-RUN_TEST_STEP !Result=0 100	tAuthSvr_new	INIT_CENREP	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0180
-RUN_TEST_STEP !Result=Fail 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0180
-
-END_TESTCASE SEC-AUT-AUTHSVR-0180
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0193
-//! @SYMTestCaseDesc Test synchronous mode of authentication using combination of plugin id and alias.
-//! @SYMDEF DEF133935
-//! @SYMTestActions  Initialize the cenrep, authenticate the user.
-//! @SYMTestExpectedResults Authentication is successful
-//! @SYMDevelopedForRelease Diran
-
-START_TESTCASE SEC-AUT-AUTHSVR-0193
-
-// Tests synchronous mode of authentication.
-RUN_TEST_STEP !Result=0 100	tAuthSvr_new	INIT_CENREP	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0193
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0193
-
-END_TESTCASE SEC-AUT-AUTHSVR-0193
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0194
-//! @SYMTestCaseDesc Test synchronous mode of authentication using combination of alias and default type
-//! for knowledge.
-//! @SYMDEF DEF133935
-//! @SYMTestActions  Initialize the cenrep, set the default preference for knowledge, authenticate the user.
-//! @SYMTestExpectedResults Authentication is successful
-//! @SYMDevelopedForRelease Diran
-
-START_TESTCASE SEC-AUT-AUTHSVR-0194
-
-// Tests synchronous mode of authentication.
-RUN_TEST_STEP !Result=0 100	tAuthSvr_new	INIT_CENREP	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0194
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	SET_PREFS 		c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0194
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0194
-
-END_TESTCASE SEC-AUT-AUTHSVR-0194
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0195
-//! @SYMTestCaseDesc Test synchronous mode of authentication using combination of alias and default type
-//! for knowledge.
-//! @SYMDEF DEF133935
-//! @SYMTestActions  Initialize the cenrep, set the default preference for knowledge, authenticate the user.
-//! @SYMTestExpectedResults Authentication is successful
-//! @SYMDevelopedForRelease Diran
-
-START_TESTCASE SEC-AUT-AUTHSVR-0195
-
-// Tests synchronous mode of authentication.
-RUN_TEST_STEP !Result=0 100	tAuthSvr_new	INIT_CENREP	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0195
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0195
-
-END_TESTCASE SEC-AUT-AUTHSVR-0195
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0196
-//! @SYMTestCaseDesc Test synchronous mode of authentication using combination of an incorrect auth
-//! type and non existent plugin id
-//! @SYMDEF DEF133935
-//! @SYMTestActions  Initialize the cenrep, set the default preference for knowledge, authenticate the user.
-//! @SYMTestExpectedResults Authentication fails as the incorrect type is assumed to be an alias name which
-//! is not present.
-//! @SYMDevelopedForRelease Diran
-
-START_TESTCASE SEC-AUT-AUTHSVR-0196
-
-// Tests synchronous mode of authentication.
-RUN_TEST_STEP !Result=0 100	tAuthSvr_new	INIT_CENREP	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0196
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	SET_PREFS 		c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0196
-RUN_TEST_STEP !Error=-10815 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0196
-
-END_TESTCASE SEC-AUT-AUTHSVR-0196
-
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0181
-//! @SYMTestCaseDesc Authentication via aliases Unicode support check.
-//! @SYMREQ REQ11232,REQ11234
-//! @SYMTestActions  Register an identity and authenticate using an alias which has been defined recursively
-//! @SYMTestExpectedResults Authentication must succeed.
-//! @SYMDevelopedForRelease Diran
-
-START_TESTCASE SEC-AUT-AUTHSVR-0181
-
-//asynchronous mode of authentication
-RUN_TEST_STEP !Result=0 100	tAuthSvr_new	INIT_CENREP	c:\tauth\tAuthSvr\scripts\tauthsvr2_unicode.ini Test0181
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2_unicode.ini Test0181
-
-END_TESTCASE SEC-AUT-AUTHSVR-0181
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0182
-//! @SYMTestCaseDesc Negative test for authentication via alias using unicode alias strength definition
-//! @SYMREQ REQ11232,REQ11234
-//! @SYMTestActions  Register an identity and authenticate using an alias which has been defined recursively
-//! @SYMTestExpectedResults Authentication must fail with KErrAuthServInvalidAliasStringExpression.
-//! @SYMDevelopedForRelease Diran
-
-START_TESTCASE SEC-AUT-AUTHSVR-0182
-
-//synchronous mode of authentication
-RUN_TEST_STEP !Result=0 100	tAuthSvr_new	INIT_CENREP	c:\tauth\tAuthSvr\scripts\tauthsvr2_unicode.ini Test0182
-RUN_TEST_STEP !Result=Fail 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2_unicode.ini Test0182
-
-END_TESTCASE SEC-AUT-AUTHSVR-0182
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0183
-//! @SYMTestCaseDesc Authserver CenRep file validation.
-//! @SYMREQ REQ11232,REQ11234
-//! @SYMTestActions  Set the alias count in the cenrep file to a negative value and authenticate using an alias.
-//! @SYMTestExpectedResults Authentication must fail with KErrArgument.
-//! @SYMDevelopedForRelease Diran
-
-START_TESTCASE SEC-AUT-AUTHSVR-0183
-
-// the alias count in the cenrep file is set to a negative value.
-RUN_TEST_STEP !Result=0 100	tAuthSvr_new	INIT_CENREP	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0183
-RUN_TEST_STEP !Error=-6 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0183
-
-END_TESTCASE SEC-AUT-AUTHSVR-0183
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0184
-//! @SYMTestCaseDesc Authserver CenRep file validation.
-//! @SYMREQ REQ11232,REQ11234
-//! @SYMTestActions  Set the alias count in the cenrep file to zero and authenticate using an alias.
-//! @SYMTestExpectedResults Authentication must fail with KErrNotFound.
-//! @SYMDevelopedForRelease Diran
-
-START_TESTCASE SEC-AUT-AUTHSVR-0184
-
-// the alias count in the cenrep file is set to a zero.
-RUN_TEST_STEP !Result=0 100	tAuthSvr_new	INIT_CENREP	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0184
-RUN_TEST_STEP !Error=-1 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0184
-
-END_TESTCASE SEC-AUT-AUTHSVR-0184
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0185
-//! @SYMTestCaseDesc Authserver CenRep file validation.Verify that only authserver can access auth cenrep file.
-//! @SYMREQ REQ11232,REQ11234
-//! @SYMTestActions  Verify that only authserver can access auth cenrep file.
-//! @SYMTestExpectedResults Initializing cenrep must fail with KErrPermissionDenied.
-//! @SYMDevelopedForRelease Diran
-
-START_TESTCASE SEC-AUT-AUTHSVR-0185
-
-RUN_TEST_STEP !Result=-46	tAuthSvr	INIT_CENREP	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0184
-
-END_TESTCASE SEC-AUT-AUTHSVR-0185
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0186
-//! @SYMTestCaseDesc Test of Reset Identity functionality. 
-//! 				 Positive case with single knowledge-based plugin and Reset all plugins API.
-//! @SYMREQ REQ11397
-//! @SYMTestExpectedResults Authenticate with old pin fails after reset and autheticate with new pin value passes.
-START_TESTCASE SEC-AUT-AUTHSVR-0186
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr REG_IDENTITY   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini RegisterId
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr RESET_IDENTITY c:\tauth\tAuthSvr\scripts\tauthsvr2.ini ResetIdAll
-RUN_TEST_STEP !RESULT=Fail 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPinPluginOldPin
-RUN_TEST_STEP !RESULT=Fail 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPlugin11113100OldPin
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPinPlugin
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPinPlugin
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPlugin11113100
-END_TESTCASE SEC-AUT-AUTHSVR-0186
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0187
-//! @SYMTestCaseDesc Test of Reset Identity functionality. 
-//! 				 Positive case with single knowledge-based plugin and Reset of given plugin type API.
-//! @SYMREQ REQ11397
-//! @SYMTestExpectedResults Authenticate with old pin fails after reset and autheticate with new pin value passes.
-START_TESTCASE SEC-AUT-AUTHSVR-0187
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr REG_IDENTITY   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini RegisterId
-RUN_TEST_STEP !Error=-6 100 tAuthSvr RESET_IDENTITY c:\tauth\tAuthSvr\scripts\tauthsvr2.ini ResetIdAllInvalidUser
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr RESET_IDENTITY c:\tauth\tAuthSvr\scripts\tauthsvr2.ini ResetIdTypeKnowledge
-RUN_TEST_STEP !RESULT=Fail 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPinPluginOldPin
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPinPlugin
-END_TESTCASE SEC-AUT-AUTHSVR-0187
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0188
-//! @SYMTestCaseDesc Test of Reset Identity functionality. 
-//! 				 Negative case where a single biometric-type plugin is attempted for a Reset.
-//! @SYMREQ REQ11397
-//! @SYMTestExpectedResults Reset must fail.
-START_TESTCASE SEC-AUT-AUTHSVR-0188
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr REG_IDENTITY   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini RegisterId
-RUN_TEST_STEP !Error=-10818 100 tAuthSvr RESET_IDENTITY c:\tauth\tAuthSvr\scripts\tauthsvr2.ini ResetIdTypeBiometric
-END_TESTCASE SEC-AUT-AUTHSVR-0188
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0189
-//! @SYMTestCaseDesc Test of Reset Identity functionality. 
-//!                  Repeat of SEC-AUT-AUTHSVR-0186 exercising reset by plugin id list.
-//! @SYMREQ REQ11397
-//! @SYMTestExpectedResults Authenticate with old pin fails after reset and autheticate with new pin value passes.
-START_TESTCASE SEC-AUT-AUTHSVR-0189
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr REG_IDENTITY   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini RegisterId
-RUN_TEST_STEP !Error=-6 100 tAuthSvr RESET_IDENTITY c:\tauth\tAuthSvr\scripts\tauthsvr2.ini ResetIdListInvalidUser
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr RESET_IDENTITY c:\tauth\tAuthSvr\scripts\tauthsvr2.ini ResetIdListPinPlugin
-RUN_TEST_STEP !RESULT=Fail 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPinPluginOldPin
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPinPlugin
-RUN_TEST_STEP !RESULT=Fail 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPlugin11113100OldPin
-RUN_TEST_STEP !RESULT=Fail 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPlugin11113100
-END_TESTCASE SEC-AUT-AUTHSVR-0189
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0190
-//! @SYMTestCaseDesc Test of Reset Identity functionality. 
-//!                  Negative case with single knowledge-based plugin that does not support Reset. 
-//! @SYMREQ REQ11397
-//! @SYMTestExpectedResults Authenticate with new pin value fails with new pin for the plugins that don't support reset.
-START_TESTCASE SEC-AUT-AUTHSVR-0190
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr REG_IDENTITY   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini RegisterIdLotsOfPlugins
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr RESET_IDENTITY c:\tauth\tAuthSvr\scripts\tauthsvr2.ini ResetIdAll
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPinPlugin
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPlugin11113100
-RUN_TEST_STEP !RESULT=FAIL 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPluginResetNoReTrain
-RUN_TEST_STEP !RESULT=FAIL 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPluginResetUnsup
-RUN_TEST_STEP !RESULT=FAIL 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPluginBiometric
-RUN_TEST_STEP !RESULT=FAIL 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPluginToken
-END_TESTCASE SEC-AUT-AUTHSVR-0190
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0191
-//! @SYMTestCaseDesc Test of Reset Identity functionality. 
-//!                  Negative case where reg data is passed to a single plugin which does not support reset.
-//! @SYMREQ REQ11397
-//! @SYMTestExpectedResults Authenticate with new pin value fails with new pin for the plugins that don't support reset.
-START_TESTCASE SEC-AUT-AUTHSVR-0191
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr REG_IDENTITY   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini RegisterIdLotsOfPlugins
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr RESET_IDENTITY c:\tauth\tAuthSvr\scripts\tauthsvr2.ini ResetIdListUnsupPlugin
-RUN_TEST_STEP !RESULT=FAIL 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPinPluginOldPin
-RUN_TEST_STEP !RESULT=FAIL 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPinPlugin
-RUN_TEST_STEP !RESULT=FAIL 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPlugin11113100OldPin
-RUN_TEST_STEP !RESULT=FAIL 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPlugin11113100
-RUN_TEST_STEP !RESULT=FAIL 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPluginResetNoReTrainOldPin
-RUN_TEST_STEP !RESULT=FAIL 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPluginResetNoReTrain
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPluginResetUnsupOldPin
-RUN_TEST_STEP !RESULT=FAIL 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPluginResetUnsup
-RUN_TEST_STEP !RESULT=FAIL 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPluginBiometricOldPin
-RUN_TEST_STEP !RESULT=FAIL 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPluginBiometric
-RUN_TEST_STEP !RESULT=FAIL 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPluginTokenOldPin
-RUN_TEST_STEP !RESULT=FAIL 100 tAuthSvr AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini AuthPluginToken
-RUN_TEST_STEP !Error=-5 100 tAuthSvr RESET_IDENTITY c:\tauth\tAuthSvr\scripts\tauthsvr2.ini ResetIdListUnsupPlugin
-END_TESTCASE SEC-AUT-AUTHSVR-0191
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0192
-//! @SYMTestCaseDesc Test of Reset Identity functionality. 
-//!                  Negative cases where invalid inputs are supplied for the reset APIs.
-//! @SYMREQ REQ11397
-//! @SYMTestExpectedResults Failure with KErrArgument.
-START_TESTCASE SEC-AUT-AUTHSVR-0192
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr REG_IDENTITY   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini RegisterId
-RUN_TEST_STEP !Error=-6 100 tAuthSvr RESET_IDENTITY c:\tauth\tAuthSvr\scripts\tauthsvr2.ini ResetIdAllMissingUser
-RUN_TEST_STEP !Error=-6 100 tAuthSvr RESET_IDENTITY c:\tauth\tAuthSvr\scripts\tauthsvr2.ini ResetIdAllInvalidUser
-RUN_TEST_STEP !Error=-6 100 tAuthSvr RESET_IDENTITY c:\tauth\tAuthSvr\scripts\tauthsvr2.ini ResetIdTypeInvalidUser
-RUN_TEST_STEP !Error=-6 100 tAuthSvr RESET_IDENTITY c:\tauth\tAuthSvr\scripts\tauthsvr2.ini ResetIdListInvalidUser
-RUN_TEST_STEP !Error=-6 100 tAuthSvr RESET_IDENTITY c:\tauth\tAuthSvr\scripts\tauthsvr2.ini ResetIdListNoPlugins
-RUN_TEST_STEP !Error=-6 100 tAuthSvr RESET_IDENTITY c:\tauth\tAuthSvr\scripts\tauthsvr2.ini ResetIdListCountMismatch
-END_TESTCASE SEC-AUT-AUTHSVR-0192
-
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr_new 	INIT_CENREP c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defaultplugin1
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0193
-//! @SYMTestCaseDesc Test Multithreaded Register (2 concurrent register requests). 
-//! @SYMREQ REQ4962
-//! @SYMDEF	DEF141403
-//! @SYMTestExpectedResults The first register thread completes successfully, the second thread returns KErrServerBusy
-START_TESTCASE SEC-AUT-AUTHSVR-0193
-RUN_UTILS CopyFile C:\tauth\tauthsvr\testdata\pinplugin_inactive.txt C:\pinplugin_inactive.txt
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr MULTI_THREADED c:\tauth\tAuthSvr\scripts\tauthsvr2.ini multithreadedRegister
-RUN_UTILS DeleteFile C:\pinplugin_inactive.txt
-END_TESTCASE SEC-AUT-AUTHSVR-0193
-
-START_TESTCASE Remove_PinPlugin_Data
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_in.dat
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_out.dat
-END_TESTCASE Remove_PinPlugin_Data
-
-
-// This is to shut down the auth server
-DELAY 5000
Binary file authenticationservices/authenticationserver/test/tAuthSvr/scripts/tAuthSvr2_unicode.ini has changed
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/tAuthSvr3.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,1007 +0,0 @@
-# Index of key values
-#iSupportsDefaultData 	- bool that defines if the chosen plugin supports default data
-#NumIdentities		- int that defines the expected number of identities that are registered on the server
-#pluginType		- 
-#isDefaultPlugin	- No longer in use. defaultPlugin is used instead
-#defaultPlugin		- string that defines which plugin to use as the default. Used to update the AuthServer policy file
-#pluginId		- Hex string that is the uid of the Ecom implementation. In the Test0000 to Test0009, it's used as a cue, and is also the expected UserId
-#userResult		- Int that contains what the user has input on being prompted to 'identify', i.e. the PIN
-#			In cases where this is absent, then we're expecting the 'data' returned to be the same as the pluginId value (cueValue)
-#userId			- String that contains the expected Id
-
-#plugin1Id		- Hex string that is the uid of the Ecom implementation
-#			  	In the RetrainPlugin steps, this is the plugin that is to be trained.
-#plugin1Status		- Int that specifies the expected status of the above plugin 
-				(0, 64, 128 -EAuthUntrained, EAuthTrained, EAuthFullyTrained)
-#Pin11113100Default	- bool that defines whether the plugins support default data. Also Pin11113101Default and Pin11113102Default
-#Pin11113100Active	- bool that defines whether the plugin is active or not. Also Pin11113101Active, Pin11113102Active
-#Pin11113100InputId	- string that defines the input to the plugin. Else, the default is used. (in Identify function)
-#Pin11113100InputTrain	- string that defines the input to the plugin. Else, the default is used. (in Train function)
-#finalUserName 		- string that defines the new name (description or identitystring) of a given identity
-retryRemove		- bool that defines whether the attempt to remove an identity is tried again in the same test step
-freshness		- Int that defines the number of seconds(timeout) within which a cached identity is returned (
-				(Authentication is skipped)
-[Test0000]
-NumIdentities = 3
-pluginId = 11113000
-
-[Test0001]
-iSupportsDefaultData = true
-NumIdentities = 3
-pluginType = EAuthKnowledge
-#isDefaultPlugin = true
-defaultPlugin = PIN
-pluginId = 11113100
-#userResult = 0011
-#userId = 597430
-#userResult = 2533
-#userId = 0873948
-userResult = 5555
-userId = 82383
-
-[Test0002]
-iSupportsDefaultData = true
-NumIdentities = 0
-pluginType = EAuthKnowledge
-#isDefaultPlugin = false
-#defaultPlugin = PIN
-
-[Test0003]
-iSupportsDefaultData = true
-NumIdentities = 0
-pluginType = EAuthBiometric
-isDefaultPlugin = true
-defaultPlugin = FINGER
-
-
-[Test0004]
-iSupportsDefaultData = false
-NumIdentities = 0
-pluginType = EAuthKnowledge
-#isDefaultPlugin = true
-defaultPlugin = PIN
-
-
-[Test0021a]
-#iSupportsDefaultData = false
-pluginType = EAuthKnowledge
-defaultPlugin = PIN
-Pin11113100InputTrain = 2035
-Pin11113100Default = true
-Pin11113100Active = true
-#initUserName = SOMENAME
-finalUserName = NewNameOfId2
-
-[Test0021b]
-plugin1Id = 11113100
-Pin11113100InputId = 2035
-freshness = 0
-Pin11113100Default = true
-Pin11113100Active = true
-
-[Test0021c]
-NumIdentities = 2
-plugin1Id = 11113100
-plugin1Status = 128
-
-#==========================================================
-#Next section is what is according to the test spec
-[Test0022a]
-#iSupportsDefaultData = true
-#pluginType = EAuthKnowledge
-#defaultPlugin = PIN
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-Pin11113100InputId = 5110
-Pin11113101InputId = 5101
-Pin11113102InputId = 5102
-Pin11113100InputTrain = 5110
-Pin11113101InputTrain = 5101
-Pin11113102InputTrain = 5102
-Pin11113100Default = false
-Pin11113101Default = false
-Pin11113102Default = false
-Pin11113100Active = false
-Pin11113101Active = false
-Pin11113102Active = false
-finalUserName = NewNameOfId2
-
-
-[Test0022b]
-plugin1Id = 11113100
-Pin11113100InputId = 5110
-Pin11113100Default = false
-Pin11113101Default = false
-Pin11113102Default = false
-Pin11113100Active = false
-Pin11113101Active = false
-Pin11113102Active = false
-freshness = 0
-
-[Test0022c]
-NumIdentities = 2
-plugin1Id = 11113100
-#EAuthUnTrained
-plugin1Status = 1
-
-[Test0022-works]
-iSupportsDefaultData = true
-pluginType = EAuthKnowledge
-defaultPlugin = PIN
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthTrained
-plugin1Status = 64
-#Value below should be used.
-#plugin1Status = 128
-Pin11113100InputId = 5110
-Pin11113101InputId = 5101
-Pin11113102InputId = 5102
-Pin11113100InputTrain = 5110
-Pin11113101InputTrain = 5101
-Pin11113102InputTrain = 5102
-Pin11113100Default = true
-Pin11113101Default = true
-Pin11113102Default = true
-Pin11113100Active = true
-Pin11113101Active = true
-Pin11113102Active = true
-finalUserName = NewNameOfId2
-
-[Test0022-Unused]
-iSupportsDefaultData = true
-pluginType = EAuthKnowledge
-defaultPlugin = PIN
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthTrained
-plugin1Status = 64
-Pin11113100Default = false
-Pin11113101Default = false
-Pin11113102Default = false
-Pin11113100Active = false
-Pin11113101Active = false
-Pin11113102Active = false
-initUserName = SOMENAME
-finalUserName = NewNameOfId2
-
-#==========================================================
-[Test0023a]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthUnTrained
-plugin1Status = 1
-#Pin11113100InputId = 5110
-Pin11113100InputTrain = 5110
-Pin11113100Default = false
-Pin11113101Default = false
-Pin11113102Default = false
-Pin11113100Active = false
-Pin11113101Active = false
-Pin11113102Active = false
-
-[Test0023b]
-plugin1Id = 11113100
-Pin11113100InputId = 5110
-Pin11113100Default = false
-Pin11113101Default = false
-Pin11113102Default = false
-Pin11113100Active = false
-Pin11113101Active = false
-Pin11113102Active = false
-
-
-[Test0023c]
-NumIdentities = 1
-plugin1Id = 11113100
-#EAuthUnTrained
-plugin1Status = 1
-
-[Test0023d]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullTrained
-plugin1Status = 128
-#Pin11113100InputId = 5110
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113101Default = true
-Pin11113102Default = true
-Pin11113100Active = true
-Pin11113101Active = true
-Pin11113102Active = true
-
-[Test0023e]
-NumIdentities = 2
-plugin1Id = 11113100
-#EAuthUnTrained
-plugin1Status = 128
-
-[Test0023f]
-plugin1Id = 11113100
-Pin11113100InputId = 5110
-Pin11113100Default = true
-Pin11113101Default = true
-Pin11113102Default = true
-Pin11113100Active = true
-Pin11113101Active = true
-Pin11113102Active = true
-
-#==========================================================
-[Test0024a]
-#This test expects the presence of plugin 10274104, else i'll need to supply the 3 properties for 11113101, input being 5101
-
-Pin11113100InputTrain = 5110
-Pin11113101InputTrain = 0000
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = true
-Pin11113101Active = true
-finalUserName = NewNameOfId2
-
-[Test0024b]
-plugin1Id = 11113100
-Pin11113100InputId = 5110
-Pin11113100Default = true
-Pin11113101Default = true
-Pin11113102Default = true
-Pin11113100Active = true
-Pin11113101Active = true
-Pin11113102Active = true
-
-[Test0024c]
-NumIdentities = 2
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-
-[Test0024d]
-NumIdentities = 2
-plugin1Id = 11113101
-#EAuthTrained
-plugin1Status = 64
-
-#==========================================================
-[Test0025a]
-NumIdentities = 1
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = false
-Pin11113101Active = true
-
-[Test0025b]
-NumIdentities = 1
-plugin1Id = 11113101
-#EAuthUnTrained
-plugin1Status = 1
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = false
-Pin11113101Active = true
-
-[Test0025c]
-Pin11113100InputTrain = 5110
-Pin11113101InputTrain = Cancel
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = false
-Pin11113101Active = true
-
-[Test0025d]
-NumIdentities = 2
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-
-[Test0025e]
-NumIdentities = 2
-plugin1Id = 11113101
-#EAuthUnTrained
-plugin1Status = 1
-
-[Test0025f]
-plugin1Id = 11113100
-Pin11113100InputId = 5110
-Pin11113100Default = true
-Pin11113100Active = true
-freshness = 0
-Pin11113101Default = false
-Pin11113101Active = true
-
-[Test0025g]
-plugin1Id = 11113101
-Pin11113101InputTrain = 5112
-Pin11113101Default = false
-Pin11113101Active = true
-
-[Test0025h]
-NumIdentities = 2
-plugin1Id = 11113101
-#EAuthTrained
-plugin1Status = 64
-
-[Test0025i]
-plugin1Id = 11113101
-Pin11113101InputId = 5112
-Pin11113101Default = false
-Pin11113101Active = true
-freshness = 0
-
-#=========================================
-[Test0026a]
-NumIdentities = 1
-#plugin1Id = 11113100
-#EAuthTrained
-#plugin1Status = 64
-Pin11113100InputTrain = 5110
-Pin11113101InputTrain = Quit
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = false
-Pin11113101Active = true
-
-[Test0026b]
-plugin1Id = 11113101
-Pin11113101InputId = 5110
-Pin11113101Default = false
-Pin11113101Active = true
-freshness = 0
-
-#=========================================
-[Test0027a]
-#Requires the presence of only 3 plugins.
-NumIdentities = 1
-#The plugin below is for the pinAuthPlugin
-#Pin11113100InputId = 0000
-Pin11113100InputTrain = 0000
-Pin11113100Default = true
-Pin11113100Active = true 
-#Pin11113101InputId = 0000
-Pin11113101InputTrain = 0000
-Pin11113101Default = true
-Pin11113101Active = true 
-#Pin11113102InputId = 0000
-Pin11113102InputTrain = 0000
-Pin11113102Default = true
-Pin11113102Active = true 
-
-[Test0027b]
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-
-[Test0028a]
-#Requires the presence of only 3 plugins, or i can set the other plugins to use the 'cancel' code
-NumIdentities = 1
-#The plugin below is for the pinAuthPlugin
-#plugin1Id = 11113100
-#EAuthTrained
-#plugin1Status = 64
-Pin11113100InputTrain = Cancel
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101InputTrain = Cancel 
-Pin11113101Default = true
-Pin11113101Active = true 
-Pin11113102InputTrain = Cancel
-Pin11113102Default = true
-Pin11113102Active = true
-
-[Test0028b]
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-
-[Test0041a]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-#Pin11113100InputId = 5110
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-
-[Test0041b]
-Pin11113100InputId = 5110
-plugin1Id = 11113100
-
-[Test0041c]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-#Pin11113100InputId = 5110
-Pin11113100InputTrain = 5118
-Pin11113100Default = true
-Pin11113100Active = true 
-
-[Test0041d]
-Pin11113100InputId = 5118
-plugin1Id = 11113100
-
-[Test0042a]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-#Pin11113100InputId = 5110
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-
-[Test0042b]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputId = 51194
-Pin11113100InputTrain = 5118
-Pin11113100Default = true
-Pin11113100Active = true 
-
-
-[Test0043a]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-#Pin11113100InputId = 5110
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-
-[Test0043b]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113188
-#EAuthUnTrained
-plugin1Status = 1
-Pin11113100InputId = 5110
-Pin11113100InputTrain = 5118
-Pin11113100Default = true
-Pin11113100Active = true 
-
-[Test0044a]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-#Pin11113100InputId = 5110
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-
-[Test0044b]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputId = 5110
-Pin11113100InputTrain = 5118
-Pin11113100Default = true
-Pin11113100Active = true 
-
-[Test0044c]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputId = 5117
-Pin11113100InputTrain = 5116
-Pin11113100Default = true
-Pin11113100Active = true 
-freshness = 0
-
-[Test0045a]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-#Pin11113100InputId = 5110
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-
-[Test0045b]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputId = 5110
-Pin11113100InputTrain = 0000
-Pin11113100Default = true
-Pin11113100Active = true 
-
-[Test0046a]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-#Pin11113100InputId = 5110
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-
-[Test0046b]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputId = 5110
-Pin11113100InputTrain = Cancel
-Pin11113100Default = true
-Pin11113100Active = true 
-
-[Test0047a]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-#Pin11113100InputId = 5110
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-
-[Test0047b]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputId = 5110
-Pin11113100InputTrain = Quit
-Pin11113100Default = true
-Pin11113100Active = true
-
-[Test0048a]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113101InputTrain = 5111
-Pin11113101Default = true
-Pin11113101Active = true 
-
-
-[Test0048b]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputId = 5110
-Pin11113100InputTrain = 51178
-Pin11113100Default = true
-Pin11113100Active = true
-freshness = 0
-
-[Test0048c]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113101
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113101InputId = 5111
-Pin11113101InputTrain = 51175
-Pin11113101Default = true
-Pin11113101Active = true 
-freshness = 0
-
-[Test0061Test]
-#NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputId = 0000
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = false
-Pin11113101Active = false
-freshness = 0
-
-
-[Test0061a]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = false
-Pin11113101Active = false
-freshness = 0
-
-[Test0061b]
-NumIdentities = 2
-plugin1Id = 11113101
-#EAuthUnTrained
-plugin1Status = 1
-
-[Test0061c]
-Pin11113100InputId = 5110
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101InputTrain = 5111
-Pin11113101Active = true
-freshness = 60
-plugin1Id = 11113101
-#EAuthTrained
-plugin1Status = 64
-
-[Test0061d]
-plugin1Id = 11113101
-#EAuthTrained
-plugin1Status = 64
-
-[Test0061e]
-Pin11113100InputId = 0000
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101InputTrain = 5112
-Pin11113101Active = true
-freshness = 60
-plugin1Id = 11113101
-#EAuthFullyTrained
-plugin1Status = 128
-
-[Test0061f]
-plugin1Id = 11113101
-#EAuthFullyTrained
-plugin1Status = 128
-
-[Test0062a]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Default = false
-Pin11113101Active = false
-freshness = 0
-
-[Test0062b]
-NumIdentities = 2
-plugin1Id = 11113101
-#EAuthUnTrained
-plugin1Status = 1
-
-[Test0062c]
-Pin11113100InputId = 511085474
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101InputTrain = 5111
-Pin11113101Active = true
-freshness = 60
-
-[Test0062d]
-plugin1Id = 11113101
-#EAuthUnTrained
-plugin1Status = 1
-
-[Test0062e]
-Pin11113100InputId = 000011883
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101InputTrain = 5112
-Pin11113101Active = true
-freshness = 60
-
-[Test0062f]
-plugin1Id = 11113101
-#EAuthUnTrained
-plugin1Status = 1
-
-[Test0101a]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113101InputTrain = 5111
-Pin11113101Default = true
-Pin11113101Active = true 
-
-[Test0101b]
-Pin11113101InputId = 5111
-plugin1Id = 11113101
-freshness = 0
-
-[Test0101c]
-NumIdentities = 1
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputId = 5110
-Pin11113100InputTrain = 51178
-Pin11113100Default = true
-Pin11113100Active = true
-#freshness = 0
-
-[Test0101d]
-Pin11113101InputId = 5111
-plugin1Id = 11113101
-freshness = 0
-
-[Test0102b]
-NumIdentities = 1
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputId = 0000
-#Pin11113100InputTrain = 51178
-Pin11113100Default = true
-Pin11113100Active = true
-freshness = 0
-
-
-[Test0103a]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113101InputTrain = 5111
-Pin11113101Default = true
-Pin11113101Active = true 
-
-[Test0103b]
-NumIdentities = 1
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputId = 5110
-#Pin11113100InputTrain = 51178
-Pin11113100Default = true
-Pin11113100Active = true
-freshness = 0
-retryRemove = true
-
-[Test0104a]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113101InputTrain = 5111
-Pin11113101Default = true
-Pin11113101Active = true 
-
-[Test0104b]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputId = 51178
-#Pin11113100InputTrain = 51178
-Pin11113100Default = true
-Pin11113100Active = true
-freshness = 0
-
-[Test0105a]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113101InputTrain = 5111
-Pin11113101Default = true
-Pin11113101Active = true 
-
-[Test0105b]
-NumIdentities = 3
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputTrain = 6110
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113101InputTrain = 6111
-Pin11113101Default = true
-Pin11113101Active = true 
-
-[Test0105c]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin11113100InputId = 5110
-Pin11113100Default = true
-Pin11113100Active = true
-freshness = 0
-retryRemove = true
-
-
-[Test0121a]
-iSupportsDefaultData = true
-plugin1Id = 11113100 & 11113101
-Pin11113100InputId = 5110
-Pin11113101InputId = 6110
-freshness = 0
-Pin11113100Default = true
-Pin11113101Active = true
-Pin11113100Active = true
-
-[Test0121b]
-NumIdentities = 2
-Pin11113100Active = true
-Pin11113100InputTrain = 5110
-Pin11113101Active = true
-Pin11113101InputTrain = 6110
-
-[Test0121c]
-forgetPlugin = 11113100
-
-[Test0121d]
-
-NumIdentities = 2
-plugin1Id = 11113100
-Pin11113100Active = true
-Pin11113100InputId = 5110
-freshness = 0
-
-[Test0122a]
-iSupportsDefaultData = true
-plugin1Id = 11113100
-Pin11113100InputId = 5110
-freshness = 0
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Active = false
-Pin11113102Active = false
-
-[Test0122b]
-NumIdentities = 2
-Pin11113100Active = true
-Pin11113100InputTrain = 5110
-Pin11113101Active = false
-Pin11113102Active = false
-
-[Test0122c]
-forgetPlugin = 11113100
-Pin11113100Active = true
-Pin11113101Active = false
-Pin11113102Active = false
-
-[Test0123a]
-iSupportsDefaultData = true
-plugin1Id = 11113100 & 11113102
-Pin11113100InputId = 5110
-Pin11113102InputId = 6220
-freshness = 0
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Active = false
-Pin11113102Active = false
-
-[Test0123b]
-NumIdentities = 2
-Pin11113100Active = true
-Pin11113100InputTrain = 5110
-Pin11113102Active = true
-Pin11113102InputTrain = 6220
-Pin11113101Active = false
-
-[Test0123c]
-forgetPlugin = 11113101
-Pin11113100Active = true
-Pin11113101Active = true
-Pin11113102Active = true
-
-[Test0124a]
-iSupportsDefaultData = true
-plugin1Id = 11113100 & 11113102
-Pin11113100InputId = 5110
-Pin11113102InputId = 6220
-freshness = 0
-Pin11113100Default = true
-Pin11113100Active = true
-Pin11113101Active = false
-Pin11113102Active = false
-
-[Test0124b]
-NumIdentities = 2
-Pin11113100Active = true
-Pin11113100InputTrain = 5110
-Pin11113102Active = true
-Pin11113102InputTrain = 6220
-Pin11113101Active = false
-
-[Test0124c]
-forgetPlugin = ffffffff
-Pin11113100Active = true
-Pin11113101Active = true
-Pin11113102Active = true
-
-[Test0125]
-forgetPlugin = 11113100
-forgetUnknown = true
-Pin11113100Active = true
-Pin11113100Default = true
-Pin11113101Active = true
-Pin11113102Active = true
-iSupportsDefaultData = true
-
-[Test0141]
-Pin11113100InputId = 5000
-Pin11113100InputTrain = 5000
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113101InputId = 5001
-Pin11113101InputTrain = 5001
-Pin11113101Default = true
-Pin11113101Active = true 
-Pin11113102InputId = 5002
-Pin11113102InputTrain = 5002
-Pin11113102Default = true
-Pin11113102Active = true 
-plugin1Id = B & K & T
-KnowledgePref = 11113100
-BiometricPref = 11113101
-TokenPref     = 11113102
-
-[Test0142]
-Pin11113100InputId = 5000
-Pin11113100InputTrain = 5000
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113101InputId = 5001
-Pin11113101InputTrain = 5001
-Pin11113101Default = true
-Pin11113101Active = true 
-Pin11113102InputId = 5002
-Pin11113102InputTrain = 5002
-Pin11113102Default = true
-Pin11113102Active = true 
-plugin1Id = B & K & T
-KnowledgePref = 11113100
-BiometricPref = 11113101
-TokenPref     = 11119999
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/tAuthSvr3.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,786 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-
-PRINT Authentication Server tests...
-
-//LOAD_SUITE tAuthSvr -SharedData
-
-LOAD_SUITE tAuthSvr
-
-//Next line makes use of the new keyword that is more readable
-//LOAD_SERVER tAuthSvrServer -SharedData		
-
-
-//============================================================
-//
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0056
-//! @SYMTestCaseDesc Start the authServer with no identities, having a default plugin defined
-//! 		     (IdentifyMultiple_AllAtOnce)
-//! @SYMREQ REQ , REQ , REQ , REQ 
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Identity API
-//! @SYMTestExpectedResults Default identity is the only one listed
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0056
-
-//RUN_UTILS MakeReadWrite c:\tauth\tAuthSvr\testdata\AuthSvrPolicy.ini
-
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	CreateTestDb 
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	FIRST_START			c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0001
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	IDENTIFY_MULTIPLE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0001
-
-END_TESTCASE SEC-AUT-AUTHSVR-0056
-
-//============================================================
-// //
-// //! @SYMTestCaseID SEC-AUT-AUTHSVR-0021
-// //! @SYMTestCaseDesc Start the authServer with no identities, having a default plugin defined
-// //! 		        (RegisterIdentity1_Normal)
-// //! @SYMREQ REQ4969 4970 4971 4972 4975 4976 4977 4978
-// //! @SYMTestPriority Medium
-// //! @SYMTestActions  Have a default plugin defined, use a client that has ReadDeviceData capability to connect to the AuthServer, 
-// //!			call the Enumerate Identity API
-// //! @SYMTestExpectedResults Default identity is the only one listed
-// //! @SYMDevelopedForRelease Intulo
-// START_TESTCASE SEC-AUT-AUTHSVR-0021
-
-// RUN_UTILS MakeReadWrite c:\tauth\tAuthSvr\testdata\AuthSvrPolicy.ini
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-// RUN_TEST_STEP !Result=Fail  100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0021b
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0021a
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0021b
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0021c
-// END_TESTCASE SEC-AUT-AUTHSVR-0021
-
-
-//============================================================
-//
-// //! @SYMTestCaseID SEC-AUT-AUTHSVR-0022
-// //! @SYMTestCaseDesc , Attempt to register a new identity, while a specific plugin inactive, the plugin should be remain untrained
-// //! 		        (RegisterIdentity2_NoActivePlugin)
-// //! @SYMREQ REQ4941 REQ4943 REQ4953 REQ4954
-// //! @SYMTestPriority Medium
-// //! @SYMTestActions  Start the authServer with no identities. 
-// //!			Have a default plugin defined, which is inactive,
-// //!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-// //!			call the Enumerate Plugins API
-// //! @SYMTestExpectedResults Specific plugin is untrained
-// //! @SYMDevelopedForRelease Intulo
-// START_TESTCASE SEC-AUT-AUTHSVR-0022
-
-// RUN_UTILS MakeReadWrite c:\tauth\tAuthSvr\testdata\AuthSvrPolicy.ini
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-// RUN_TEST_STEP !RESULT=-2 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0022b
-// RUN_TEST_STEP !RESULT=-2  100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0022a
-// RUN_TEST_STEP !RESULT=-2  100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0022b
-// RUN_TEST_STEP !RESULT=-2  100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0022c
-
-// // END_TESTCASE SEC-AUT-AUTHSVR-0022
- 
-
-//============================================================
-// ////
-// //! @SYMTestCaseID SEC-AUT-AUTHSVR-0023
-// //! @SYMTestCaseDesc Attempt to register a new identity, while no plugins are active, then one is activated.
-// //! 		        (RegisterIdentity3_PluginActivatedLater
-// //! @SYMREQ REQ4954 REQ4960 REQ4962 REQ4968 REQ4957
-// //! @SYMTestPriority Medium
-// //! @SYMTestActions  Have a default plugin defined, which is inactive, and a second one which is inactive
-// //!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-// //!			call the Enumerate Plugins API
-// //! @SYMTestExpectedResults Default plugin is untrained, then fully trained after the 2nd try
-// //! @SYMDevelopedForRelease Intulo
-// START_TESTCASE SEC-AUT-AUTHSVR-0023
-
-// //RUN_UTILS MakeReadWrite c:\tauth\tAuthSvr\testdata\AuthSvrPolicy.ini
-RUN_UTILS MKDIR C:\testplugin_active\
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-// RUN_TEST_STEP !RESULT=-2  100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0023b
-// RUN_TEST_STEP !RESULT=-2  100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0023a
-// RUN_TEST_STEP !RESULT=-2  100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0023b
-// RUN_TEST_STEP !RESULT=-2  100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0023c
-// RUN_TEST_STEP_RESULT 0  100	tAuthSvr 	REMOVE_DBS
-// RUN_TEST_STEP !RESULT=-2  100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0023b
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0023d
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0023f
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0023e
-
-// END_TESTCASE SEC-AUT-AUTHSVR-0023
-
-
-//============================================================
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0024
-//! @SYMTestCaseDesc Attempt to register a new identity, but the transient key obtained from one of auth Plugin is non-unique.
-//! 		     (RegisterIdentity4_NonUniqueTransientkey)
-//! @SYMREQ REQ4953 REQ4954 REQ4955 REQ4957 REQ4958
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is inactive, and a second one which is inactive
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Try to register a 2nd identity while using the same 'Entered-Pin' as for the default identity.
-//! @SYMTestExpectedResults KErrAuthServPluginCancelled is received, then the plugin is showed as 
-//!				partially trained, not fully trained
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0024
-
-RUN_UTILS MKDIR C:\testplugin_active\
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !RESULT=Fail 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0024b
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0024a
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0024b
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0024c
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0024d
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-END_TESTCASE SEC-AUT-AUTHSVR-0024 
-
-//============================================================
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0025
-//! @SYMTestCaseDesc Attempt to register a new identity, but a plugin returns the cancellation code
-//! 		     (RegisterIdentity5_PluginCancel)
-//! @SYMREQ REQ4954 REQ4955 REQ4958 REQ4968 REQ4970 4971 4972
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is inactive, and a second one which is inactive
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Try to register a 2nd identity while using the 'Cancel' code as the PIN input
-//! @SYMTestExpectedResults KErrAuthServPluginCancelled is received, then the plugin is showed as 
-//!				partially trained, not fully trained
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0025
-
-
-RUN_UTILS MKDIR C:\testplugin_active\
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0025a
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0025b
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0025c
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0025d
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0025e
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0025f
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0025g
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0025d
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0025h
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0025i
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-END_TESTCASE SEC-AUT-AUTHSVR-0025
-
-
-//============================================================
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0026
-//! @SYMTestCaseDesc Attempt to register a new identity, but a plugin returns the 'quit' code
-//! 		     (RegisterIdentity6_PluginExit)
-//! @SYMREQ REQ4954 REQ4955 REQ4958 REQ4968 REQ4970 4971 4972
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is inactive, and a second one which is inactive
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Try to register a 2nd identity while using the 'Quit' code as the PIN input
-//! @SYMTestExpectedResults KErrAuthServPluginQuit is received, then the plugin is showed as 
-//!				partially trained, not fully trained
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0026
-
-RUN_UTILS MKDIR C:\testplugin_active\
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0026a
-RUN_TEST_STEP !RESULT=Fail 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0026b
-END_TESTCASE SEC-AUT-AUTHSVR-0026
-
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0027
-//! @SYMTestCaseDesc Attempt to register a new identity, but the authserver cannot uniquely resolve the identity with any of the supplied plugins
-//! 		     (RegisterIdentity7_NonUniqueIdentity_Retrain)
-//! @SYMREQ REQ4953 REQ4954 4955 4956 
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and two others which are active
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Try to register a 2nd identity while using the '0000' code as the PIN input
-//! @SYMTestExpectedResults The second identity is not registered. All the plugins are still 
-//!				fully trained
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0027
-
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0027a
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0027b
-END_TESTCASE SEC-AUT-AUTHSVR-0027
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0028
-//! @SYMTestCaseDesc Attempt to register a new identity, but the training for the 2 active plugins is cancelled
-//! 		     (RegisterIdentity8_NonUniqueIdentity_AllPluginsCancelled)
-//! @SYMREQ REQ4953 REQ4954 4955 4956
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is inactive, and a second one which is inactive
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Try to register a 2nd identity while using the 'Cancel' code as the PIN input for all 3 plugins
-//! @SYMTestExpectedResults The 2nd identity is not registered then the 3 plugins are showed as fully trained
-//!			       
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0028
-
-RUN_UTILS MKDIR C:\testplugin_active\
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0028a
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0028b
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-END_TESTCASE SEC-AUT-AUTHSVR-0028
-
-
-////
-// //! @SYMTestCaseID SEC-AUT-AUTHSVR-0041
-// //! @SYMTestCaseDesc Successful attempt at retraining a specified plugin
-// //! 		        (RetrainPlug-in1_Normal)
-// //! @SYMREQ REQ4953 REQ4954 4955 4956
-// //! @SYMTestPriority Medium
-// //! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-// //!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-// //!			call the Enumerate Plugins API
-// //!			Successfully register a 2nd identity while using a specified PIN input
-// //!			Authenticate then call the Train() function. Use the same PIN input so that the identity trained is one
-// //!			that has been previously trained. The plugin status is then checked
-// //! @SYMTestExpectedResults The authentication, registration and retrain are successful. The plugin status is 
-// //!			fully trained, then fully trained again
-// //! @SYMDevelopedForRelease Intulo
-// START_TESTCASE SEC-AUT-AUTHSVR-0041
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0041a
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0041b
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0041c
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0041d
-// END_TESTCASE SEC-AUT-AUTHSVR-0041
-
-
-//============================================================
-//
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0042
-//! @SYMTestCaseDesc Attempt at retraining a specified plugin, but authentication fails
-//! 		     (RetrainPlug-in2_AuthFailed)
-//! @SYMREQ 4969 4970 4971 4972 4975 4976 4977 4952
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Successfully register a 2nd identity while using a specified PIN input
-//!			Authenticate then call the Train() function. Use the a PIN input that has not been used before 
-//!			so that no identity is returned as having that PIN. 
-//! @SYMTestExpectedResults The registration is successful, the authentication fails, and so the retrain is unsuccessful. 
-//!			The plugin status is fully trained, then fully trained again
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0042 
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0042a
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0042b
-END_TESTCASE SEC-AUT-AUTHSVR-0042
-
-
-//============================================================
-//
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0043
-//! @SYMTestCaseDesc Attempt to retrain a specified plugin, but the plugin is unknown
-//! 		     (RetrainPlug-in3_UnknownPlugin)
-//! @SYMREQ 4969 4970 4971 4972 4975 4976 4977 4952
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Successfully register a 2nd identity while using a specified PIN input
-//!			Authenticate then call the Train() function. Use the a PIN input that has not been used before 
-//!			so that no identity is returned as having that PIN. 
-//! @SYMTestExpectedResults The registration is successful, the authentication fails, and so the retrain are unsuccessful. 
-//!			The plugin status is fully trained, then trained
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0043
-
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0043a
-//RUN_TEST_STEP_RESULT 106 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0043b
-END_TESTCASE SEC-AUT-AUTHSVR-0043
-
-
-
-//============================================================
-//
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0044
-//! @SYMTestCaseDesc Attempt to retrain a specified plugin, but the 2nd authentication fails
-//! 		     (RetrainPlug-in4_2ndAuthFailed)
-//! @SYMREQ 4969 4970 4971 4972 4975 4976 4977 4978 4952
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Successfully register a 2nd identity while using a specified PIN input
-//!			Authenticate then call the Train() function. Use the a PIN input that was used before so that the 
-//!			2nd identity is returned. A new PIN is now associated with the identity and that plugin
-//!			Attempt the authentication again, but using a wrong PIN. 
-//! @SYMTestExpectedResults The registration is successful, The first 'authenticate' and 'train' calls succeed. 
-//!			The 2nd authentication fails, and so the 2nd call to train is unsuccessful. 
-//!			The plugin status is fully trained, all three times that it is checked
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0044
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0044a
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0044b
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0044c
-END_TESTCASE SEC-AUT-AUTHSVR-0044
-
-
-//============================================================
-//
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0045
-//! @SYMTestCaseDesc Attempt to retrain a specified plugin, but a non-unique transient key is generated, prompting 
-//!			the retrain to be cancelled
-//! 		     (RetrainPlug-in5_NonUniqueTransientKey)
-//! @SYMREQ 4969 4970 4971 4972 4975 4976 4977 4978
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Successfully register a 2nd identity while using a specified PIN input
-//!			Authenticate then call the Train() function. Use the a PIN input that has not been used before 
-//!			so that the retrain is cancelled.
-//! @SYMTestExpectedResults The registration is successful, the authentication fails, and so the retrain are unsuccessful. 
-//!			The plugin status is fully trained, then fully trained again
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0045
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0045a
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0045b
-END_TESTCASE SEC-AUT-AUTHSVR-0045
-
-
-//============================================================
-//
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0046
-//! @SYMTestCaseDesc Attempt to retrain a specified plugin, but a cancellation code is entered at the 'retrain' stage
-//! 		     (RetrainPlug-in6_Cancel)
-//! @SYMREQ 4969 4970 4971 4972 4975 4976 4977 4978
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Successfully register a 2nd identity while using a specified PIN input
-//!			Authenticate then call the Train() function. Use the a cancellation code as the input
-//!			so that the retrain is cancelled.
-//! @SYMTestExpectedResults The registration is successful, the authentication fails, and so the retrain are unsuccessful. 
-//!			The plugin status is fully trained, then fully trained again
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0046
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0046a
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0046b
-END_TESTCASE SEC-AUT-AUTHSVR-0046
-
-
-//============================================================
-//
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0047
-//! @SYMTestCaseDesc Attempt to retrain a specified plugin, but a Quit code is entered at the 'retrain' stage
-//! 		     (RetrainPlug-in7_Quit)
-//! @SYMREQ 4969 4970 4971 4972 4975 4976 4977 4978
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Successfully register a 2nd identity while using a specified PIN input
-//!			Authenticate then call the Train() function. Use the a Quit code as the input
-//!			so that the retrain is quit.
-//! @SYMTestExpectedResults The registration is successful, the authentication fails, and so the retrain are unsuccessful. 
-//!			The plugin status is fully trained, then fully trained again
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0047
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0047a
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0047b
-END_TESTCASE SEC-AUT-AUTHSVR-0047
-
-
-//============================================================
-//
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0057
-//! @SYMTestCaseDesc Successful attempt to retrain a specified plugin, then another. 2nd Authentication required in both cases
-//! 		     (RetrainPlug-in8_2ndAuthRequired)
-//! @SYMREQ 4969 4970 4971 4972 4975 4976 4977 4978
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Successfully register a 2nd identity while using a specified PIN input
-//!			Authenticate then call the Train() function on the first plugin. Use the a valid, unique input
-//!			Authtenticate then call the Train function on the second plugin. Use a valid, unique input
-//! @SYMTestExpectedResults The registration is successful, the 2nd authentication is successful in both cases, 
-//!			as well as the retrain calls.
-//!			The plugin status for both plugins is fully trained, then fully trained again
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0057
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0048a
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0048b
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0048c
-END_TESTCASE SEC-AUT-AUTHSVR-0057
-
-
-//============================================================
-//
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0058
-//! @SYMTestCaseDesc Successful attempt to retrain a specified plugin, then another. 2nd Authentication required in both cases
-//! 		     (RetrainPlug-in8_2ndAuthRequired)
-//! @SYMREQ 4969 4970 4971 4972 4975 4976 4977 4978
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Successfully register a 2nd identity while using a specified PIN input
-//!			Authenticate then call the Train() function on the first plugin. Use the a valid, unique input
-//!			Authtenticate then call the Train function on the second plugin. Use a valid, unique input
-//! @SYMTestExpectedResults The registration is successful, the 2nd authentication is successful in both cases, 
-//!			as well as the retrain calls.
-//!			The plugin status for both plugins is fully trained, then fully trained again
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0058
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0048a
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0048b
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0048c
-END_TESTCASE SEC-AUT-AUTHSVR-0058
-
-//============================================================
-//
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0061
-//! @SYMTestCaseDesc Attempt to add a new authentication method first to one then the second of the
-//!			two present identities
-//! 		     (AddAuthMethod1_BothIdentities_Normal)
-//! @SYMREQ 4969 4970 4971 4972 4975 4976 4977 4978
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is inactive
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Successfully register a 2nd identity while using a specified PIN input with the default plugin only
-//!			Authenticate then call the Train() function. Use an identifying input that corresponds to what
-//!			was used to register the default identity using the default plugin. Therefore the default identity
-//!			is returned following the Authentication. The training is then done for the 2nd plugin
-//!			Carry out the same process with the second identity
-//! @SYMTestExpectedResults The authentication is successful,  and the first train call passes.
-//!			but the second train call passes as well
-//!			The plugin status for the second plugin is untrained, trained, then fully trained
-//!			There are 2 identities present after the register identity step
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0061
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0061Test
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0061a
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0061b
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0061c
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0061d
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0061e
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0061f
-END_TESTCASE SEC-AUT-AUTHSVR-0061
-
-//============================================================
-//
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0062
-//! @SYMTestCaseDesc Attempt to add a new authentication method first to one then the second of the
-//!			two present identities. Authentication fails in both cases.
-//! 		     (AddAuthMethod2_BothIdentities_AuthFailed)
-//! @SYMREQ 4969 4970 4971 4972 4975 4976 4977 4978
-//! @SYMTestPriority Medium
-//! @SYMTestActions   Have a default plugin defined, which is active, and a second one which is inactive
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Successfully register a 2nd identity while using a specified PIN input with the default plugin only
-//!			Fail to authenticate then try to call the Train() function. Use an identifying input that does not 
-//!			corresponds to what was used to register the default identity using the default plugin. Therefore no identity
-//!			is returned following the Authentication. The training is then attempted for the 2nd plugin
-//!			Carry out the same process with the second identity
-//! @SYMTestExpectedResults The authentication is successful,  and the first train call passes.
-//!			but the second train call passes as well
-//!			The plugin status for the second plugin is untrained, trained, then fully trained
-//!			There are 2 identities present after the register identity step
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0062
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0062a
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0062b
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0062c
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0062d
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	RETRAIN_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0062e
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0062f
-END_TESTCASE SEC-AUT-AUTHSVR-0062
-
-// //============================================================
-// //
-// //! @SYMTestCaseID SEC-AUT-AUTHSVR-0101
-// //! @SYMTestCaseDesc Successful attempt to remove a specified identity
-// //! 		        (RemoveIdentity1_Normal)
-// //! @SYMREQ 4964 4965 4966 4954
-// //! @SYMTestPriority Medium
-// //! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-// //!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-// //!			call the Enumerate Plugins API
-// //!			Successfully register a 2nd identity while using a specified PIN input
-// //!			Authenticate then call the removeIdentity() function. Use the a valid input so that the
-// //!			identity that was recently registered is returned following the Authentication, then removed
-// //! @SYMTestExpectedResults The registration is successful, the authentication is successful, 
-// //!			as well as the removeIdentity call.
-// //!			The plugin status for both plugins is fully trained, then fully trained again
-// //! @SYMDevelopedForRelease Intulo
-// START_TESTCASE SEC-AUT-AUTHSVR-0101
-RUN_UTILS MKDIR C:\testplugin_active\
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0101a
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0101b
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0101c
-// RUN_TEST_STEP !Result=Fail 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0101d
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0101c
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-// END_TESTCASE SEC-AUT-AUTHSVR-0101
-
-
-
-//============================================================
-//
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0102
-//! @SYMTestCaseDesc Attempt to remove a specified identity when only one identity exists
-//! 		     (RemoveIdentity2_OneIdentity)
-//! @SYMREQ 4964 4965 4966 4954
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Authenticate then call the removeIdentity() function. Use an input that corresponds to what
-//!			was used to register the default identity. Therefore the default identity is returned 
-//!			following the Authentication, then attempt to remove it
-//! @SYMTestExpectedResults The authentication is successful, but the removeIdentity call fails
-//!			The plugin status for the specified plugin is fully trained, then fully trained again
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0102
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-//RUN_TEST_STEP !Error=-10811 100	tAuthSvr 	REMOVE_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0102b
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0102b
-END_TESTCASE SEC-AUT-AUTHSVR-0102
-
-
-//============================================================
-//
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0103
-//! @SYMTestCaseDesc Attempt to remove a specified identity when only one identity exists
-//! 		     (RemoveIdentity3_NonExistentIdentity)
-//! @SYMREQ 4964 4965 4966 4954
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Successfully register a 2nd identity while using a specified PIN input
-//!			Authenticate then call the removeIdentity() function. Use an input that corresponds to what
-//!			was used to register the 2nd identity. Therefore the 2nd identity is returned 
-//!			following the Authentication. Remove this second identity then attempt to remove it again
-//! @SYMTestExpectedResults The authentication is successful,  and the first removeIdentity call passes.
-//!			but the second removeIdentity call fails because there's only 1 identity left
-//!			The plugin status for the specified plugin is fully trained, then fully trained again
-//!			There's 1 identity present after the 2 removeIdentity calls
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0103
-RUN_UTILS MKDIR C:\testplugin_active\
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0103a
-//RUN_TEST_STEP !Error=-10811 100	tAuthSvr 	REMOVE_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0103b
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0103b
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-END_TESTCASE SEC-AUT-AUTHSVR-0103
-
-
-//============================================================
-//
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0104
-//! @SYMTestCaseDesc Attempt to remove a specified identity but the authentication fails
-//! 		     (RemoveIdentity4_AuthFailed)
-//! @SYMREQ 4964 4965 4966 4954
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-//!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-//!			call the Enumerate Plugins API
-//!			Successfully register a 2nd identity while using a specified PIN input
-//!			Authenticate then call the removeIdentity() function. Use an input that doesn't correspond
-//!			to what was used to register the 2nd identity. Therefore no identity is returned 
-//!			following the Authentication. Attempt to remove this absent identity.
-//! @SYMTestExpectedResults The authentication fails,  and the removeIdentity call fails.
-//!			because there is no such identity in the authentication server.
-//!			The plugin status for the specified plugin is fully trained, then fully trained again
-//!			There's 1 identity present after the 2 removeIdentity calls
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0104
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0104a
-//RUN_TEST_STEP !Error=-10808 100	tAuthSvr 	REMOVE_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0104b
-//RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0104b
-END_TESTCASE SEC-AUT-AUTHSVR-0104
-
-
-// //============================================================
-// //
-// //! @SYMTestCaseID SEC-AUT-AUTHSVR-0105
-// //! @SYMTestCaseDesc Attempt to remove a specified identity when only one identity exists
-// //! 		        (RemoveIdentity5_NonExistentIdentity_TwoOthersExist)
-// //! @SYMREQ 4964 4965 4966 4954
-// //! @SYMTestPriority Medium
-// //! @SYMTestActions  Have a default plugin defined, which is active, and a second one which is active as well
-// //!			use a client that has ReadDeviceData capability to connect to the AuthServer, 
-// //!			call the Enumerate Plugins API
-// //!			Successfully register a 2nd identity while using a specified PIN input
-// //!			Successfully register a 3rd identity while using a specified PIN input
-// //!			Authenticate then call the removeIdentity() function. Use an input that corresponds to what
-// //!			was used to register the 2nd identity. Therefore the 2nd identity is returned 
-// //!			following the Authentication. Remove this second identity then attempt to remove it again
-// //! @SYMTestExpectedResults The authentication is successful,  and the first removeIdentity call passes.
-// //!			but the second removeIdentity call fails because an unknown identity was specified
-// //!			The plugin status for the specified plugin is fully trained, then fully trained again
-// //!			There are 2 identities present after the 2 removeIdentity calls
-// //! @SYMDevelopedForRelease Intulo
-// START_TESTCASE SEC-AUT-AUTHSVR-0105
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0105a
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0105b
-// RUN_TEST_STEP !Error=-10808 100	tAuthSvr 	REMOVE_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0105c
-// RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0105c
-// END_TESTCASE SEC-AUT-AUTHSVR-0105
-//============================================================
-//
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0121
-//! @SYMTestCaseDesc A user successfully removes an authentication plug-in trained for their identity
-//! 		     (ForgetPlug-in1_Normal)
-//! @SYMREQ REQ4964 REQ4965 REQ4966 REQ4954
-//! @SYMTestPriority Medium
-//! @SYMTestActions  
-//! @SYMTestExpectedResults 
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0121
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0121b
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0121a
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	FORGET_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0121c
-RUN_TEST_STEP !RESULT=Fail 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0121d
-END_TESTCASE SEC-AUT-AUTHSVR-0121
-
-/============================================================
-//
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0122
-//! @SYMTestCaseDesc A user attempts to remove an auth plug-in trained for their identity, but there's only a single auth method for the identity.
-//! 		     (ForgetPlug-in1_LastPlugin)
-//! @SYMREQ REQ4964 REQ4965 REQ4966 REQ4954
-//! @SYMTestPriority Medium
-//! @SYMTestActions  
-//! @SYMTestExpectedResults 
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0122
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0122b
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0122a
-RUN_TEST_STEP !RESULT=Fail 100 tAuthSvr FORGET_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0122c
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0122a
-END_TESTCASE  SEC-AUT-AUTHSVR-0122
-/============================================================
-//
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0123
-//! @SYMTestCaseDesc A user attempts to remove an auth plug-in, but the identity has no transient key associated with this plug-in
-//! 		     (ForgetUntrainedAuthMethod)
-//! @SYMREQ REQ4964 REQ4965 REQ4966 REQ4954
-//! @SYMTestPriority Medium
-//! @SYMTestActions  
-//! @SYMTestExpectedResults 
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0123
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0123b
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0123a
-RUN_TEST_STEP !RESULT=Fail 100 tAuthSvr FORGET_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0123c
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0123a
-END_TESTCASE SEC-AUT-AUTHSVR-0123
-
-/============================================================
-//
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0124
-//! @SYMTestCaseDesc A user attempts to remove an auth plug-in, but the plugin does not exist
-//! 		     (ForgetUnknownPlugin)
-//! @SYMREQ REQ4964 REQ4965 REQ4966 REQ4954
-//! @SYMTestPriority Medium
-//! @SYMTestActions  
-//! @SYMTestExpectedResults 
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0124
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0124b
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0124a
-RUN_TEST_STEP !RESULT=Fail 100 tAuthSvr FORGET_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0124c
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0124a
-END_TESTCASE SEC-AUT-AUTHSVR-0124
-
-/============================================================
-//
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0125
-//! @SYMTestCaseDesc A user attempts to remove an auth plug-in, but the identity specified does not exist
-//! 		     (ForgetUnknownIdentity)
-//! @SYMREQ REQ4964 REQ4965 REQ4966 REQ4954
-//! @SYMTestPriority Medium
-//! @SYMTestActions  
-//! @SYMTestExpectedResults 
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0125
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !RESULT=Fail 100 tAuthSvr FORGET_PLUGIN	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0125
-END_TESTCASE SEC-AUT-AUTHSVR-0125
-
-
-//============================================================
-//
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0141
-//! @SYMTestCaseDesc Auth preferences are set correctly.
-//! 		     (SetPreference_Success)
-//! @SYMREQ REQ4983 REQ4973 REQ4966 REQ4967 REQ4968
-//! @SYMTestPriority Medium
-//! @SYMTestActions  
-//! @SYMTestExpectedResults 
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0141
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0141
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	SET_PREFS 		c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0141
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE    c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0141
-END_TESTCASE SEC-AUT-AUTHSVR-0141
-
-//============================================================
-//
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0142
-//! @SYMTestCaseDesc An Auth preference is set with an invalid plug-in
-//! 		     (SetPreference_Success)
-//! @SYMREQ REQ4964 REQ4965 REQ4966 REQ4954
-//! @SYMTestPriority Medium
-//! @SYMTestActions  
-//! @SYMTestExpectedResults 
-//! @SYMDevelopedForRelease Intulo
-START_TESTCASE SEC-AUT-AUTHSVR-0142
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0142
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	SET_PREFS 		c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0142
-RUN_TEST_STEP !Error=-10802 100	tAuthSvr 	AUTHENTICATE    c:\tauth\tAuthSvr\scripts\tauthsvr3.ini Test0142
-END_TESTCASE SEC-AUT-AUTHSVR-0142
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/tAuthSvr4.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,35 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-
-PRINT Default Plugin negative test cases (Requires replacement of CenRep initialization files...)
-
-LOAD_SUITE tAuthSvr
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0165
-//! @SYMTestCaseDesc Start the Authserver with the Cenrep file containing a blank value for default plugin
-//!                  
-//! @SYMREQ REQ11230
-//! @SYMTestPriority High
-//! @SYMTestActions  Remove the Authentication database. Try to start the authserver.
-//! @SYMTestExpectedResults Authserver start fails with KErrCorrupt (-20)
-//! @SYMDevelopedForRelease Intulo
-
-START_TESTCASE SEC-AUT-AUTHSVR-0165
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !RESULT=-20 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0024d
-END_TESTCASE SEC-AUT-AUTHSVR-0165
-
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/tAuthSvr5.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,36 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-
-PRINT Default Plugin negative test cases (Requires replacement of CenRep initialization files...
-
-LOAD_SUITE tAuthSvr
-
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0166
-//! @SYMTestCaseDesc Start the Authserver with the Cenrep file containing an alias for default plugin           
-//! @SYMREQ REQ11230
-//! @SYMTestPriority High
-//! @SYMTestActions  Remove the Authentication database. Try to start the authserver.
-//! @SYMTestExpectedResults Authserver start fails with KErrCorrupt (-20)
-//! @SYMDevelopedForRelease Intulo
-
-
-START_TESTCASE SEC-AUT-AUTHSVR-0166
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !RESULT=-20 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0024d
-END_TESTCASE SEC-AUT-AUTHSVR-0166
-
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/tAuthSvr6.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,36 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-
-PRINT Default Plugin negative test cases (Requires replacement of CenRep initialization files...
-
-LOAD_SUITE tAuthSvr
-
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0165
-//! @SYMTestCaseDesc Start the Authserver with the Cenrep file containing a plugin type for default plugin           
-//! @SYMREQ REQ11230
-//! @SYMTestPriority High
-//! @SYMTestActions  Remove the Authentication database. Try to start the authserver.
-//! @SYMTestExpectedResults Authserver start fails with KErrCorrupt (-20)
-//! @SYMDevelopedForRelease Intulo
-
-
-START_TESTCASE SEC-AUT-AUTHSVR-0165
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !RESULT=-20 100	tAuthSvr 	AUTHSVR_CHECK	c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0024d
-END_TESTCASE SEC-AUT-AUTHSVR-0165
-
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/tauthsvr_performance.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,55 +0,0 @@
-[Test0001]
-TestType = 3
-OOMTest = 2
-NumIdentities = 2
-plugin1Id = 11113100
-plugin1Status = 128
-
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true
-iterationCount = 10
-
-[Test0002]
-TestType = 3
-OOMTest = 4
-Pin11113100InputId = 5110
-plugin1Id = 11113100
-iterationCount = 10
-
-[Test0003]
-TestType = 3
-OOMTest = 8
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 11113100
-#EAuthFullyTrained
-plugin1Status = 64
-#Pin11113100InputId = 5110
-Pin11113100InputTrain = 5118
-Pin11113100Default = true
-Pin11113100Active = true
-iterationCount = 10
-
-[Test0004]
-TestType = 3
-OOMTest = 2
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113101InputTrain = 5111
-Pin11113101Default = true
-Pin11113101Active = true
-iterationCount = 10
-
-[Test0005]
-TestType = 3
-OOMTest = 4
-plugin1Id = 11113100 & 11113101
-Pin11113100Active = true 
-Pin11113100InputId = 5110
-Pin11113101Active = true
-iterationCount = 10
-Pin11113101InputId = 5111
-freshness = 0
-iterationCount = 10
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/tauthsvr_performance.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,57 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-PRINT Authentication Server Performance tests...
-
-// Prepare a clone of TAuthSvr to possess authserver's SID.
-// This is required for modifying the authserver's central repository file.
-// This clone must be deleted at the end of the test.
-
-RUN_PROGRAM 100 SETCAP tAuthSvr.exe 188b0 -SID 102740FC tAuthSvr_new.exe
-
-LOAD_SUITE tAuthSvr
-LOAD_SUITE tAuthSvr_new
-
-RUN_UTILS CopyFile C:\tauth\tauthsvr\testdata\pinplugin_inactive.txt C:\pinplugin_inactive.txt
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr_new 	INIT_CENREP c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defaultplugin1
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_in.dat
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_out.dat
-
-START_TESTCASE SEC-AUT-AUTHSVR-PERFORMANCE-TEST0001
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	OOM_TEST	c:\tauth\tAuthSvr\scripts\tauthsvr_performance.ini Test0001
-END_TESTCASE SEC-AUT-AUTHSVR-PERFORMANCE-TEST0001
-
-START_TESTCASE SEC-AUT-AUTHSVR-PERFORMANCE-TEST0002
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	OOM_TEST	c:\tauth\tAuthSvr\scripts\tauthsvr_performance.ini Test0002
-END_TESTCASE SEC-AUT-AUTHSVR-PERFORMANCE-TEST0002
-
-START_TESTCASE SEC-AUT-AUTHSVR-PERFORMANCE-TEST0003
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	OOM_TEST	c:\tauth\tAuthSvr\scripts\tauthsvr_performance.ini Test0003
-END_TESTCASE SEC-AUT-AUTHSVR-PERFORMANCE-TEST0003
-
-START_TESTCASE SEC-AUT-AUTHSVR-PERFORMANCE-TEST0004
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	OOM_TEST	c:\tauth\tAuthSvr\scripts\tauthsvr_performance.ini Test0004
-END_TESTCASE SEC-AUT-AUTHSVR-PERFORMANCE-TEST0004
-
-// authenticate with 2 plugins.
-START_TESTCASE SEC-AUT-AUTHSVR-PERFORMANCE-TEST0005
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	OOM_TEST	c:\tauth\tAuthSvr\scripts\tauthsvr_performance.ini Test0005
-END_TESTCASE SEC-AUT-AUTHSVR-PERFORMANCE-TEST0005
-
-RUN_UTILS DeleteFile  C:\pinplugin_inactive.txt
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/tauthsvrclock.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,74 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-//Script to test the secure clock implementation in Authserver.
-
-
-RUN_PROGRAM 100 SETCAP tAuthSvr.exe 188b0 -SID 102740FC tAuthSvr_new.exe
-
-LOAD_SUITE tAuthSvr_new
-LOAD_SUITE tAuthSvr
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0144
-//! @SYMTestCaseDesc Remove_PinPlugin_Data
-START_TESTCASE SEC-AUT-AUTHSVR-0144
-RUN_UTILS DeleteFile C:\pinplugin_inactive.txt
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr_new 	INIT_CENREP c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defaultplugin
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_in.dat
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_out.dat
-END_TESTCASE SEC-AUT-AUTHSVR-0144
-
-
-
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr	UPDATE_SYSTIME c:\tauth\tAuthSvr\scripts\tauthsvr2.ini time
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0193
-//! @SYMTestCaseDesc Test the secure clock implementation in AuthServer.A user is first authenticated successfully
-//!			  	 after which the system time is set ahead by 600 seconds. Authentication is called again using a
-//!			   	a wrong pin and a freshness period of 300. Since a cached identity is returned ,authentication is 
-//!			   	successful. 
-//! @SYMTestPriority Medium
-//! @SYMTestActions Check if a cached identity is being returned
-//! @SYMTestExpectedResults Authentication is successful
-//! @SYMDevelopedForRelease Intulo 
- 
-START_TESTCASE SEC-AUT-AUTHSVR-0193
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr	REG_IDENTITY   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0197
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr	AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0198
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr	UPDATE_SYSTIME c:\tauth\tAuthSvr\scripts\tauthsvr2.ini time1
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr	AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0199
-END_TESTCASE SEC-AUT-AUTHSVR-0193
-
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0194
-//! @SYMTestCaseDesc Test the secure clock implementation in AuthServer.A user is first authenticated successfully
-//!			   	after which a 5 second delay is used to advance the secure clock.The system clock is 
-//!			   	now set back by 600 seconds and an authentication is called with a wrong pin and freshess 5. Since 
-//!			  	 reauthentication occurs ,authentication fails
-//! @SYMTestPriority Medium
-//! @SYMTestActions Check if a cached identity is not being returned
-//! @SYMTestExpectedResults Authentication fails 
-//! @SYMDevelopedForRelease Intulo 
-
-START_TESTCASE SEC-AUT-AUTHSVR-0194
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100		tAuthSvr	REG_IDENTITY   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0200
-RUN_TEST_STEP_RESULT 0 100		tAuthSvr	AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0201
-DELAY 5000
-RUN_TEST_STEP_RESULT 0 100		tAuthSvr	UPDATE_SYSTIME c:\tauth\tAuthSvr\scripts\tauthsvr2.ini time2
-RUN_TEST_STEP !Result=Fail  100	tAuthSvr	AUTHENTICATE   c:\tauth\tAuthSvr\scripts\tauthsvr2.ini Test0202
-END_TESTCASE SEC-AUT-AUTHSVR-0194
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/tauthsvroom.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,181 +0,0 @@
-# Index of key values
-#TestType ---- OOM tests can be run on either the client side or the server side
-#	      For Client side      -- TestType = 1		
-#	      For Server side 	   -- TestType = 2
-#	      For Performane tests -- TestType = 3		
-#OOMTest ---- The OOM Test which has to be run. This is the index of the test in  CAuthSvrOom::doTestL()
-#
-
-
-[oom1]
-TestType = 2
-OOMTest = 3
-plugin1Id = 200032E5
-Pin200032E5InputId = 2035
-freshness = 0
-Pin11113100Default = false
-Pin11113100Active = false
-Pin11113104Active = false
-DisplayMessage = " Display String 1 "
-
-[oom2]
-TestType = 2
-OOMTest = 2
-#iSupportsDefaultData = false
-pluginType = EAuthKnowledge
-defaultPlugin = PIN
-Pin11113100Default = false
-Pin11113100Active = false
-Pin11113104Active = false
-Pin11113103Active = false
-Pin11113102Active = false
-Pin11113101Active = false
-#initUserName = SOMENAME
-finalUserName = NewNameOfId2
-
-[oom3]
-TestType = 1
-OOMTest = 3
-plugin1Id = 200032E5
-Pin200032E5InputId = 2035
-freshness = 0
-Pin11113100Default = false
-Pin11113100Active = false
-
-
-
-[oom4]
-TestType = 1
-OOMTest = 2
-#iSupportsDefaultData = false
-pluginType = EAuthKnowledge
-defaultPlugin = PIN
-Pin200032E5InputTrain = 2035
-Pin11113100Default = false
-Pin11113100Active = false
-Pin11113104Active = false
-Pin11113103Active = false
-Pin11113102Active = false
-Pin11113101Active = false
-#initUserName = SOMENAME
-finalUserName = NewNameOfId2
-
-[oom5]
-TestType = 2
-OOMTest = 4
-plugin1Id = 200032E5
-Pin200032E5InputId = 2035
-freshness = 0
-Pin11113100Default = false
-Pin11113100Active = false
-
-
-[oom6]
-TestType = 1
-OOMTest = 4
-plugin1Id = 200032E5
-Pin200032E5InputId = 2035
-freshness = 0
-Pin11113100Default = false
-Pin11113100Active = false
-
-[oom7]
-TestType = 2
-OOMTest = 5
-KnowledgePref = 200032E5
-
-[oom8]
-TestType = 2
-OOMTest = 6
-plugin1Id = 200032E5
-
-
-[oom9]
-TestType = 2
-OOMTest = 7
-plugin1Id = 200032E5
-
-[oom10]
-TestType = 2
-OOMTest = 8
-plugin1Id = 10274104
-
-
-[oom11]
-TestType = 2
-OOMTest = 9
-
-[oom12]
-TestType = 2
-OOMTest = 10
-
-[oom13]
-TestType = 2
-OOMTest = 11
-
-[oom14]
-TestType = 2
-OOMTest = 12
-
-[oom15]
-TestType = 2
-OOMTest = 13
-
-[oom16]
-TestType = 2
-OOMTest = 14
-
-[oom17]
-TestType = 2
-OOMTest = 15
-
-[oom18]
-TestType = 2
-OOMTest = 16
-plugin1Id = 200032E5
-
-[Test1]
-#iSupportsDefaultData = false
-pluginType = EAuthKnowledge
-defaultPlugin = PIN
-Pin11113100InputTrain = 2035
-Pin11113100Default = false
-Pin11113100Active = false
-Pin11113104Active = false
-Pin11113103Active = false
-Pin11113102Active = false
-Pin11113101Active = false
-#initUserName = SOMENAME
-finalUserName = NewNameOfId2
-
-[Test2]
-plugin1Id = 200032E5
-Pin200032E5InputId = 2035
-freshness = 0
-Pin11113100Default = false
-Pin11113100Active = false
-Pin11113104Active = false
-DisplayMessage = " Display String 1 "
-
-
-[Test3]
-plugin1Id = 200032E5
-Pin200032E5InputId = 2035
-freshness = 0
-Pin11113100Default = false
-Pin11113100Active = false
-DisplayMessage = " Display String 1 "
-
-[Test4]
-#iSupportsDefaultData = false
-pluginType = EAuthKnowledge
-defaultPlugin = PIN
-Pin200032E5InputTrain = 2035
-Pin11113100Default = false
-Pin11113100Active = false
-Pin11113104Active = false
-Pin11113103Active = false
-Pin11113102Active = false
-Pin11113101Active = false
-#initUserName = SOMENAME
-finalUserName = NewNameOfId2
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/tauthsvroom.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,167 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-//! @file
-//AuthServer OOM Tests
-
-RUN_PROGRAM 100 SETCAP tAuthSvr.exe 188b0 -SID 102740FC tAuthSvr_new.exe
-LOAD_SUITE tAuthSvr_new
-LOAD_SUITE tAuthSvr
-
-
-//Delete plugin dat files and initialize default plugin value
-RUN_UTILS DeleteFile C:\pinplugin_inactive.txt
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_in.dat
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_out.dat
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr_new 	INIT_CENREP c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defaultplugin
-
-
-
-//SEE tauthsvroom.ini for instructions on adding OOM tests.
-
-
-
-
-
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHSVROOM-0001
-//! @SYMTestCaseDesc Authserver OOM tests for all published api's
-//! @SYMREQ REQ4969 4970 4971 4972 4975 4976 4977 4978 4963 4985 5008 5009
-//! @SYMTestPriority Medium
-//! @SYMTestActions 
-//! @SYMTestExpectedResults All tests pass successfully
-//! @SYMDevelopedForRelease Intulo
-
-START_TESTCASE SEC-AUT-AUTHSVROOM-0001
-
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-//Synchronous Authenticate API check -- SERVER SIDE
-RUN_TEST_STEP_RESULT 0 1000	tAuthSvr 	OOM_TEST	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini oom1
-
-
-//Register API check -- SERVER SIDE
-RUN_UTILS CopyFile C:\tauth\tauthsvr\testdata\pinplugin_inactive.txt C:\pinplugin_inactive.txt
-RUN_TEST_STEP_RESULT 0 1000	tAuthSvr 	OOM_TEST	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini oom2
-RUN_UTILS DeleteFile C:\pinplugin_inactive.txt
-
-
-//Synchronous Authenticate API check -- CLIENT SIDE
-RUN_TEST_STEP_RESULT 0 1000	tAuthSvr 	OOM_TEST	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini oom3
-
-
-//Register API check -- CLIENT SIDE
-RUN_UTILS CopyFile C:\tauth\tauthsvr\testdata\pinplugin_inactive.txt C:\pinplugin_inactive.txt
-RUN_TEST_STEP_RESULT 0 1000	tAuthSvr 	OOM_TEST	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini oom4
-RUN_UTILS DeleteFile C:\pinplugin_inactive.txt
-
-
-//Asynchronous Authenticate API check -- SERVER SIDE
-RUN_TEST_STEP_RESULT 0 1000	tAuthSvr 	OOM_TEST	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini oom5
-
-
-//Asynchronous Authenticate API check -- CLIENT SIDE
-RUN_TEST_STEP_RESULT 0 1000	tAuthSvr 	OOM_TEST	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini oom6
-
-
-//Set preffered plugin type check -- SERVER SIDE
-RUN_TEST_STEP_RESULT 0 1000	tAuthSvr 	OOM_TEST	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini oom7
-
-
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !RESULT=FAIL 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini Test4
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini Test3
-
-//Check Remove Identity API -- SERVER SIDE
-RUN_TEST_STEP_RESULT 0 1000	tAuthSvr 	OOM_TEST	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini oom8
-
-
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !RESULT=FAIL 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini Test4
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini Test3
-
-
-//Check Retrain Plugin API -- SERVER SIDE
-RUN_TEST_STEP_RESULT 0 1000	tAuthSvr 	OOM_TEST	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini oom10
-
-//Check List PluginsL API -- SERVER SIDE
-RUN_TEST_STEP_RESULT 0 1000	tAuthSvr 	OOM_TEST	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini oom11
-
-
-//Check List Active Plugins API -- SERVER SIDE
-RUN_TEST_STEP_RESULT 0 1000	tAuthSvr 	OOM_TEST	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini oom12
-
-
-//Check List Plugins of type API -- SERVER SIDE
-RUN_TEST_STEP_RESULT 0 1000	tAuthSvr 	OOM_TEST	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini oom13
-
-
-//Check List Plugins With Training status API -- SERVER SIDE
-RUN_TEST_STEP_RESULT 0 1000	tAuthSvr 	OOM_TEST	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini oom14
-
-
-//Check List Authentication aliases API
-RUN_TEST_STEP_RESULT 0 1000	tAuthSvr 	OOM_TEST	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini oom15
-
-
-//Delete plugin dat files and initialize default plugin value
-RUN_UTILS DeleteFile C:\pinplugin_inactive.txt
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_in.dat
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_out.dat
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr_new 	INIT_CENREP c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defaultplugin
-
-
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-
-//Expected result is fail because plugin count fails (tauthplugin.rsc is deleted). 
-//This identity is just used in the next few cases
-RUN_TEST_STEP !RESULT=FAIL	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini Test1
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini Test2
-
-
-
-//Check Reset Identity API (all plugins)
-
-RUN_TEST_STEP_RESULT 0 1000	tAuthSvr 	OOM_TEST	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini oom16
-
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-//Expected result is fail because plugin count fails (tauthplugin.rsc is deleted). 
-//This identity is just used in the next few cases
-RUN_TEST_STEP !RESULT=FAIL	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini Test1
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini Test2
-
-
-//Check Reset Identity API (plugins of specified type)
-
-RUN_TEST_STEP_RESULT 0 1000	tAuthSvr 	OOM_TEST	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini oom17
-
-
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-//Expected result is fail because plugin count fails (tauthplugin.rsc is deleted). 
-//This identity is just used in the next few cases
-RUN_TEST_STEP !RESULT=FAIL	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini Test1
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	AUTHENTICATE	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini Test2
-
-
-//Check Reset Identity API (specified plugins)
-RUN_TEST_STEP_RESULT 0 1000	tAuthSvr 	OOM_TEST	c:\tauth\tAuthSvr\scripts\tauthsvroom.ini oom18
-
-
-
-
-END_TESTCASE SEC-AUT-AUTHSVROOM-0001
-
-
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/tclientsidsupport.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,38 +0,0 @@
-[Test0001]
-NumIdentities = 2
-plugin1Id = 11113100
-plugin1Status = 128
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true
-
-[Test0002]
-NumIdentities = 2
-clientSid = 2EDB49CA
-clientSpecificKey = true
-withString = false
-plugin1Id = 11113100
-Pin11113100InputId = 5110
-PinInputTrain = 5118
-PinInputIdAfterRetrain = 5118
-
-[Test0003]
-NumIdentities = 2
-clientSid = 0
-callingAppSid = 10204F0D
-clientSpecificKey = true
-withString = false
-plugin1Id = 11113100
-Pin11113100InputId = 5110
-PinInputTrain = 5118
-PinInputIdAfterRetrain = 5118
-
-[Test0004]
-NumIdentities = 2
-clientSid = 10204F0D
-clientSpecificKey = true
-withString = false
-plugin1Id = 11113100
-Pin11113100InputId = 5110
-PinInputTrain = 5118
-PinInputIdAfterRetrain = 5118
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/tclientsidsupport.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,195 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-
-PRINT Client Sid support tests...
-
-// Prepare a clone of TAuthSvr to possess authserver's SID.
-// This is required for modifying the authserver's central repository file.
-// This clone must be deleted at the end of the test.
-
-RUN_PROGRAM 100 SETCAP tAuthSvr.exe 188b0 -SID 102740FC tAuthSvr_new.exe
-
-// Prepare a clone of TAuthSvr without ReadUserData capability.
-// This clone must be deleted at the end of the test.
-
-RUN_PROGRAM 100 SETCAP tAuthSvr.exe 108b0 tAuthSvr1.exe
-
-LOAD_SUITE tAuthSvr
-LOAD_SUITE tAuthSvr_new
-LOAD_SUITE tAuthSvr1
-
-// This test must be executed in order to set the default plugin, else authserver will never start.
-
-RUN_UTILS DeleteFile C:\pinplugin_inactive.txt
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr_new 	INIT_CENREP c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defaultplugin
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_in.dat
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_out.dat
-
-////
-//! @SYMTestCaseID SEC-AUT-CLIENTSIDSUPPORT-0001
-//! @SYMTestCaseDesc 		When a client Sid is non-zero, the same must be used to generate the protection key 
-//!				of an identity.
-//! @SYMREQ 			REQ11236
-//! @SYMTestPriority 		Medium
-//! @SYMTestActions  		Have a default plugin defined, which is active, and a second one which is active as well
-//!				use a client that has ReadUserData capability to connect to the AuthServer.
-//! 
-//!				Successfully register a 2nd identity while using a specified PIN input
-//!				Authenticate using the same PIN input so that the identity to be trained is one
-//!				that has been previously trained.Store the Identity obtained as a result of authentication.
-//! 
-//!				Then call the Train() function, giving a different input. Attempt to authenticate,
-//!				giving the new input.Store the identity obtained as a result of authentication.
-//!			
-//!				Generate a protection key using the key of the identity resulting from the first 
-//!				authentication with the client sid and compare with the identity key obtained from 
-//!				second authentication.
-//!				
-//! @SYMTestExpectedResults 	The authentication, registration and retrain are successful. Protection key generated 
-//!				by the identity resulting from first authentication must be the same as the protection key 
-//!				of the identity resulting from second authentication.
-//! @SYMDevelopedForRelease 	Diran
-//!
-START_TESTCASE SEC-AUT-CLIENTSIDSUPPORT-0001
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tclientsidsupport.ini Test0001
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	CLIENT_SID_CHECK	c:\tauth\tAuthSvr\scripts\tclientsidsupport.ini Test0002
-END_TESTCASE SEC-AUT-CLIENTSIDSUPPORT-0001
-
-
-////
-//! @SYMTestCaseID SEC-AUT-CLIENTSIDSUPPORT-0002
-//! @SYMTestCaseDesc 		When a client Sid is zero, the calling application's sid must be used to generate the 
-//!				protection key of an identity.
-//! @SYMREQ 			REQ11236
-//! @SYMTestPriority 		Medium
-//! @SYMTestActions  		Have a default plugin defined, which is active, and a second one which is active as well
-//!				use a client that has ReadUserData capability to connect to the AuthServer.
-//! 
-//!				Successfully register a 2nd identity while using a specified PIN input
-//!				Authenticate using the same PIN input so that the identity to be trained is one
-//!				that has been previously trained.Store the Identity obtained as a result of authentication.
-//! 
-//!				Then call the Train() function, giving a different input. Attempt to authenticate,
-//!				giving the new input.Store the identity obtained as a result of authentication.
-//!			
-//!				Generate a protection key using the key of the identity resulting from the first 
-//!				authentication with the client sid of the calling application and compare with the 
-//!				identity key obtained from second authentication.
-//!				
-//! @SYMTestExpectedResults 	The authentication, registration and retrain are successful. Protection key generated 
-//!				by the identity resulting from first authentication must be the same as the protection key 
-//!				of the identity resulting from second authentication.
-//! @SYMDevelopedForRelease 	Diran
-//!
-START_TESTCASE SEC-AUT-CLIENTSIDSUPPORT-0002
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tclientsidsupport.ini Test0001
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	CLIENT_SID_CHECK	c:\tauth\tAuthSvr\scripts\tclientsidsupport.ini Test0003
-END_TESTCASE SEC-AUT-CLIENTSIDSUPPORT-0002
-
-
-////
-//! @SYMTestCaseID SEC-AUT-CLIENTSIDSUPPORT-0003
-//! @SYMTestCaseDesc 		When a client sid is non-zero and is not the same as the calling application's SID, 
-//!				a call to authenticate method fails if the calling application doesn't 
-//!				possess ReadUserData capability. 
-//! @SYMREQ 			REQ11236
-//! @SYMTestPriority 		Medium
-//! @SYMTestActions  		Have a default plugin defined, which is active, and a second one which is active as well
-//!				use a client that does not have ReadUserData capability to connect to the AuthServer.
-//! 
-//!				Successfully register a 2nd identity while using a specified PIN input
-//!				Authenticate using the same PIN input so that the identity to be trained is one
-//!				that has been previously trained.Authentication fails with KErrPermissionDenied,
-//!				since the calling appliction doesn't possess ReadUserData capability.
-//!				Authentication must fail with KErrPermissionDenied.
-//! @SYMDevelopedForRelease 	Diran
-//!
-START_TESTCASE SEC-AUT-CLIENTSIDSUPPORT-0003
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tclientsidsupport.ini Test0001
-RUN_TEST_STEP !Error=-46 100	tAuthSvr1 	CLIENT_SID_CHECK	c:\tauth\tAuthSvr\scripts\tclientsidsupport.ini Test0002
-END_TESTCASE SEC-AUT-CLIENTSIDSUPPORT-0003
-
-////
-//! @SYMTestCaseID SEC-AUT-CLIENTSIDSUPPORT-0004
-//! @SYMTestCaseDesc 		When a client sid is zero, a call to authenticate method succeeds even if the calling 
-//!				application doesn't have ReadUserData capability.
-//! @SYMREQ 			REQ11236
-//! @SYMTestPriority 		Medium
-//! @SYMTestActions  		Have a default plugin defined, which is active, and a second one which is active as well
-//!				use a client that doesn't possess ReadUserData capability to connect to the AuthServer.
-//! 
-//!				Successfully register a 2nd identity while using a specified PIN input
-//!				Authenticate using the same PIN input so that the identity to be trained is one
-//!				that has been previously trained.Store the Identity obtained as a result of authentication.
-//! 
-//!				Then call the Train() function, giving a different input. Attempt to authenticate,
-//!				giving the new input.Store the identity obtained as a result of authentication.
-//!			
-//!				Generate a protection key using the key of the identity resulting from the first 
-//!				authentication with the client sid of the calling application and compare with the 
-//!				identity key obtained from second authentication.
-//!				
-//! @SYMTestExpectedResults 	The authentication, registration and retrain are successful. Protection key generated 
-//!				by the identity resulting from first authentication must be the same as the protection key 
-//!				of the identity resulting from second authentication.
-//! @SYMDevelopedForRelease 	Diran
-//!
-
-START_TESTCASE SEC-AUT-CLIENTSIDSUPPORT-0004
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tclientsidsupport.ini Test0001
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr1 	CLIENT_SID_CHECK	c:\tauth\tAuthSvr\scripts\tclientsidsupport.ini Test0003
-END_TESTCASE SEC-AUT-CLIENTSIDSUPPORT-0004
-
-////
-//! @SYMTestCaseID SEC-AUT-CLIENTSIDSUPPORT-0005
-//! @SYMTestCaseDesc 		When a client sid is non-zero and is the same as the calling application's sid,
-//!				, a call to authenticate method succeeds even if the calling application doesn't 
-//!				have ReadUserData capability.
-//! @SYMREQ 			REQ11236
-//! @SYMTestPriority 		Medium
-//! @SYMTestActions  		Have a default plugin defined, which is active, and a second one which is active as well
-//!				use a client that doesn't possess ReadUserData capability to connect to the AuthServer.
-//! 
-//!				Successfully register a 2nd identity while using a specified PIN input
-//!				Authenticate using the same PIN input so that the identity to be trained is one
-//!				that has been previously trained.Store the Identity obtained as a result of authentication.
-//! 
-//!				Then call the Train() function, giving a different input. Attempt to authenticate,
-//!				giving the new input.Store the identity obtained as a result of authentication.
-//!			
-//!				Generate a protection key using the key of the identity resulting from the first 
-//!				authentication with the client sid of the calling application and compare with the 
-//!				identity key obtained from second authentication.
-//!				
-//! @SYMTestExpectedResults 	The authentication, registration and retrain are successful. Protection key generated 
-//!				by the identity resulting from first authentication must be the same as the protection key 
-//!				of the identity resulting from second authentication.
-//! @SYMDevelopedForRelease 	Diran
-//!
-
-START_TESTCASE SEC-AUT-CLIENTSIDSUPPORT-0005
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr 	REG_IDENTITY	c:\tauth\tAuthSvr\scripts\tclientsidsupport.ini Test0001
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr1 	CLIENT_SID_CHECK	c:\tauth\tAuthSvr\scripts\tclientsidsupport.ini Test0004
-END_TESTCASE SEC-AUT-CLIENTSIDSUPPORT-0005
-
-// This is to shut down the auth server
-DELAY 5000
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/tpostmarketplugin.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,66 +0,0 @@
-[Test0001]
-srcPlugin=c:\tauth\tpostmarketplugins\testpluginsupgrade.dll
-destPlugin=c:\sys\bin\testplugins.dll
-srcRscFile=c:\tauth\tpostmarketplugins\testpluginsupgrade.rsc
-destRscFile=c:\resource\plugins\testplugins.rsc
-initialPluginCount=10
-expectedPluginCount=10
-pluginNamePostInstall=Test Plugin #1 - Upgrade
-pluginNamePostUninstall=Test Plugin #1
-
-
-[Test0002]
-srcPlugin=c:\tauth\tpostmarketplugins\tauthpluginupgrade.dll
-destPlugin=c:\sys\bin\tauthplugin.dll
-srcRscFile=c:\tauth\tpostmarketplugins\tauthpluginupgrade.rsc
-destRscFile=c:\resource\plugins\tauthplugin.rsc
-initialPluginCount=10
-expectedPluginCount=10
-pluginNamePostInstall=Pin1
-pluginNamePostUninstall=Pin1
-
-// when a new non-ROM plugin is installed with macro disabled, the plugin count remains the same,
-// before and post install.
-[Test0003]
-srcPlugin=c:\tauth\tpostmarketplugins\tpostmarketramplugin.dll
-destPlugin=c:\sys\bin\tpostmarketramplugin.dll
-srcRscFile=c:\tauth\tpostmarketplugins\tpostmarketramplugin.rsc
-destRscFile=c:\resource\plugins\tpostmarketramplugin.rsc
-initialPluginCount=10
-expectedPluginCount=10
-
-
-// The following are used when KEnablePostMarketAutheticationPlugins is set using the 
-// macro SYMBIAN_ENABLE_POST_MARKET_AUTHENTICATION_PLUGINS specified in ROM build for hardware tests and 
-// patch data KEnablePostMarketAutheticationPlugins set to one in epoc.ini for emulator tests.
-
-// when a new non-ROM plugin is installed with macro enabled, the plugin count increments by one post install operation,
-// and decrements by one post uninstall operation.
-[Test0004]
-srcPlugin=c:\tauth\tpostmarketplugins\tpostmarketramplugin.dll
-destPlugin=c:\sys\bin\tpostmarketramplugin.dll
-srcRscFile=c:\tauth\tpostmarketplugins\tpostmarketramplugin.rsc
-destRscFile=c:\resource\plugins\tpostmarketramplugin.rsc
-initialPluginCount=10
-expectedPluginCount=11
-pluginNamePostInstall=PostMarketRAMPlugin
-
-[Test0005]
-NumIdentities = 2
-#The plugin below is for the pinAuthPlugin
-plugin1Id = 10234100
-#EAuthFullyTrained
-plugin1Status = 128
-Pin10234100InputTrain = 4110
-Pin10234100Default = true
-Pin10234100Active = true
-
-[Test0006]
-plugin1Id = 10234100
-Pin10234100InputId = 4110
-
-[Test0007]
-srcPlugin=c:\sys\bin\tpostmarketramplugin.dll
-destPlugin=c:\tauth\tpostmarketplugins\tpostmarketramplugin.dll
-srcRscFile=c:\resource\plugins\tpostmarketramplugin.rsc
-destRscFile=c:\tauth\tpostmarketplugins\tpostmarketramplugin.rsc
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/tpostmarketplugin.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,128 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-PRINT Post Market Plugin tests...
-
-// Prepare a clone of TAuthSvr to possess authserver's SID.
-// This is required for modifying the authserver's central repository file.
-// This clone must be deleted at the end of the test.
-
-RUN_PROGRAM 100 SETCAP tAuthSvr.exe 188b0 -SID 102740FC tAuthSvr_new.exe
-
-LOAD_SUITE tAuthSvr
-LOAD_SUITE tAuthSvr_new
-
-// This test must be executed in order to set the default plugin, else authserver will never start.
-
-RUN_UTILS DeleteFile C:\pinplugin_inactive.txt
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr_new 	INIT_CENREP c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defaultplugin
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_in.dat
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_out.dat
-
-// The following tests are run when KEnablePostMarketAutheticationPlugins is set to zero,
-// i.e post market plugins are not supported.
-
-////
-//! @SYMTestCaseID 		SEC-AUT-AUTHPOSTMARKETPLUGIN-0001
-//! @SYMTestCaseDesc 		Install an upgrade of a ROM plugin whose ROM_Only field is set to zero.Verify that the upgrade version is loaded.
-//!				during install and ROM version is loaded during uninstall.
-//! @SYMREQ 			REQ 11235
-//! @SYMTestPriority 		Medium
-//! @SYMTestActions  		1)Retrieve the available plugin list before an upgrade is installed.
-//!		     		2)Install an upgrade of a ROM plugin specified in the ini file.
-//!		     		3)Repeat step 1.Verify that the plugin count matches the expected,and that 
-//!                    		the upgrade version of the plugin is loaded by comparing the plugin name with 
-//!                    		the expected name specified in the ini file.
-//!				4)Retrieve the plugin list before the upgrade (installed in step 2) is uninstalled.
-//!				5)Uninstall the ROM upgrade.
-//!		     		6)Repeat step 1.Verify that the plugin count matches the expected,and that 
-//!                    		the ROM version of the plugin is loaded by comparing the plugin name with 
-//!                    		the expected name specified in the ini file.		
-//! @SYMTestExpectedResults	Upgraded version of the specfied ROM plugin must be loaded during install and ROM version must be loaded after uninstall.
-//! @SYMDevelopedForRelease 	Diran
-
-START_TESTCASE SEC-AUT-AUTHPOSTMARKETPLUGIN-0001
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr	POST_MARKET_PLUGIN	c:\tauth\tAuthSvr\scripts\tpostmarketplugin.ini Test0001
-END_TESTCASE SEC-AUT-AUTHPOSTMARKETPLUGIN-0001
-
-////
-//! @SYMTestCaseID 		SEC-AUT-AUTHPOSTMARKETPLUGIN-0002
-//! @SYMTestCaseDesc 		Install an upgrade of a ROM plugin whose ROM_Only field is set to one.Verify that the ROM version is loaded during install and uninstall.
-//! @SYMREQ 			REQ 11235
-//! @SYMTestPriority 		Medium
-//! @SYMTestActions  		1)Retrieve the available plugin list before an upgrade is installed.
-//!		     		2)Install an upgrade of a ROM plugin specified in the ini file.
-//!		     		3)Repeat step 1.Verify that the plugin count matches the expected,and that 
-//!                    		the ROM version of the plugin is loaded by comparing the plugin name with 
-//!                    		the expected name specified in the ini file.
-//!				4)Retrieve the plugin list before the upgrade (installed in step 2) is uninstalled.
-//!				5)Uninstall the ROM upgrade.
-//!		     		6)Repeat step 1.Verify that the plugin count matches the expected,and that 
-//!                    		the ROM version of the plugin is loaded by comparing the plugin name with 
-//!                    		the expected name specified in the ini file.			
-//! @SYMTestExpectedResults	ROM version of the specfied ROM plugin must be loaded during install and uninstall.
-//! @SYMDevelopedForRelease 	Diran
-
-START_TESTCASE SEC-AUT-AUTHPOSTMARKETPLUGIN-0002
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr	POST_MARKET_PLUGIN	c:\tauth\tAuthSvr\scripts\tpostmarketplugin.ini Test0002
-END_TESTCASE SEC-AUT-AUTHPOSTMARKETPLUGIN-0002
-
-////
-//! @SYMTestCaseID 		SEC-AUT-AUTHPOSTMARKETPLUGIN-0003
-//! @SYMTestCaseDesc 		Install and uninstall a non-ROM plugin.Verify that the plugin count remains the same pre and post install and uninstall operation.
-//! @SYMREQ 			REQ 11235
-//! @SYMTestPriority 		Medium
-//! @SYMTestActions  		1)Retrieve the available plugin list before a non-ROM plugin is installed.
-//!		     		2)Install non-ROM plugin specified in the ini file.
-//!		     		3)Repeat step 1.Verify that the plugin count remains the same pre and post install operation.
-//!				4)Retrieve the available plugin list before non-ROM plugin is uninstalled.
-//!				5)Uninstall the non-ROM plugin(installed in step 2).
-//!		     		6)Repeat step 1.Verify that the plugin count remains the same pre and post uninstall operation.
-//!						
-//! @SYMTestExpectedResults	Plugin count remains the same pre and post install and uninstall operation.
-//! @SYMDevelopedForRelease 	Diran
-
-START_TESTCASE SEC-AUT-AUTHPOSTMARKETPLUGIN-0003
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr	POST_MARKET_PLUGIN	c:\tauth\tAuthSvr\scripts\tpostmarketplugin.ini Test0003
-END_TESTCASE SEC-AUT-AUTHPOSTMARKETPLUGIN-0003
-
-////
-//! @SYMTestCaseID 		SEC-AUT-AUTHPOSTMARKETPLUGIN-0004
-//! @SYMTestCaseDesc 		Verify authentication behaviour using a non ROM plugin post install and uninstall operation.
-//! @SYMREQ 			REQ 11235
-//! @SYMTestPriority 		Medium
-//! @SYMTestActions  		1)Install non-ROM plugin specified in the ini file.
-//!		     		2)Register an identity using a specified pin input.
-//!				3)Authenticate using the non ROM plugin installed in step 1.
-//!		     		4)Uninstall the plugin.
-//!				5)Authenticate again using the same plugin.
-//!				
-//!						
-//! @SYMTestExpectedResults	Authentication must fail with KErrAuthServNoSuchPlugin using the non ROM plugin 
-//!				post install and uninstall operation.
-//! @SYMDevelopedForRelease 	Diran
-START_TESTCASE SEC-AUT-AUTHPOSTMARKETPLUGIN-0004
-
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr INSTALL_PLUGIN c:\tauth\tAuthSvr\scripts\tpostmarketplugin.ini Test0003
-DELAY 3000
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr REG_IDENTITY c:\tauth\tAuthSvr\scripts\tpostmarketplugin.ini Test0005
-RUN_TEST_STEP !Error=-10802 100 tAuthSvr AUTHENTICATE c:\tauth\tAuthSvr\scripts\tpostmarketplugin.ini Test0006
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr UNINSTALL_PLUGIN c:\tauth\tAuthSvr\scripts\tpostmarketplugin.ini Test0007
-DELAY 3000
-RUN_TEST_STEP !Error=-10802 100 tAuthSvr AUTHENTICATE c:\tauth\tAuthSvr\scripts\tpostmarketplugin.ini Test0006
-END_TESTCASE SEC-AUT-AUTHPOSTMARKETPLUGIN-0004
-
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/tpostmarketplugin_macroenabled.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,132 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-//
-
-
-PRINT Post Market Plugin tests with KEnablePostMarketAuthenticationPlugins enabled...
-
-// Prepare a clone of TAuthSvr to possess authserver's SID.
-// This is required for modifying the authserver's central repository file.
-// This clone must be deleted at the end of the test.
-
-RUN_PROGRAM 100 SETCAP tAuthSvr.exe 188b0 -SID 102740FC tAuthSvr_new.exe
-
-LOAD_SUITE tAuthSvr
-LOAD_SUITE tAuthSvr_new
-
-// This test must be executed in order to set the default plugin, else authserver will never start.
-
-RUN_UTILS DeleteFile C:\pinplugin_inactive.txt
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr_new 	INIT_CENREP c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defaultplugin
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_in.dat
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_out.dat
-
-
-// The following tests are run for KEnablePostMarketAutheticationPlugins set using the 
-// macro SYMBIAN_ENABLE_POST_MARKET_AUTHENTICATION_PLUGINS specified in ROM build for hardware tests and 
-// patch data KEnablePostMarketAutheticationPlugins set to one in epoc.ini for emulator tests.
-
-////
-//! @SYMTestCaseID 		SEC-AUT-AUTHPOSTMARKETPLUGIN-0005
-//! @SYMTestCaseDesc 		Install an upgrade of a ROM plugin whose ROM_Only field is set to zero.Verify that the upgrade version is loaded.
-//!				during install and ROM version is loaded during uninstall.
-//! @SYMREQ 			REQ 11235
-//! @SYMTestPriority 		Medium
-//! @SYMTestActions  		1)Retrieve the available plugin list before an upgrade is installed.
-//!		     		2)Install an upgrade of a ROM plugin specified in the ini file.
-//!		     		3)Repeat step 1.Verify that the plugin count matches the expected,and that 
-//!                    		the upgrade version of the plugin is loaded by comparing the plugin name with 
-//!                    		the expected name specified in the ini file.
-//!				4)Retrieve the plugin list before the upgrade (installed in step 2) is uninstalled.
-//!				5)Uninstall the ROM upgrade.
-//!		     		6)Repeat step 1.Verify that the plugin count matches the expected,and that 
-//!                    		the ROM version of the plugin is loaded by comparing the plugin name with 
-//!                    		the expected name specified in the ini file.		
-//! @SYMTestExpectedResults	Upgraded version of the specfied ROM plugin must be loaded during install and ROM version must be loaded after uninstall.
-//! @SYMDevelopedForRelease 	Diran
-
-START_TESTCASE SEC-AUT-AUTHPOSTMARKETPLUGIN-0005
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr	POST_MARKET_PLUGIN	c:\tauth\tAuthSvr\scripts\tpostmarketplugin.ini Test0001
-END_TESTCASE SEC-AUT-AUTHPOSTMARKETPLUGIN-0005
-
-////
-//! @SYMTestCaseID 		SEC-AUT-AUTHPOSTMARKETPLUGIN-0006
-//! @SYMTestCaseDesc 		Install an upgrade of a ROM plugin whose ROM_Only field is set to one.Verify that the ROM version is loaded during install and uninstall.
-//! @SYMREQ 			REQ 11235
-//! @SYMTestPriority 		Medium
-//! @SYMTestActions  		1)Retrieve the available plugin list before an upgrade is installed.
-//!		     		2)Install an upgrade of a ROM plugin specified in the ini file.
-//!		     		3)Repeat step 1.Verify that the plugin count matches the expected,and that 
-//!                    		the ROM version of the plugin is loaded by comparing the plugin name with 
-//!                    		the expected name specified in the ini file.
-//!				4)Retrieve the plugin list before the upgrade (installed in step 2) is uninstalled.
-//!				5)Uninstall the ROM upgrade.
-//!		     		6)Repeat step 1.Verify that the plugin count matches the expected,and that 
-//!                    		the ROM version of the plugin is loaded by comparing the plugin name with 
-//!                    		the expected name specified in the ini file.			
-//! @SYMTestExpectedResults	ROM version of the specfied ROM plugin must be loaded during install and uninstall.
-//! @SYMDevelopedForRelease 	Diran
-
-START_TESTCASE SEC-AUT-AUTHPOSTMARKETPLUGIN-0006
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr	POST_MARKET_PLUGIN	c:\tauth\tAuthSvr\scripts\tpostmarketplugin.ini Test0002
-END_TESTCASE SEC-AUT-AUTHPOSTMARKETPLUGIN-0006
-
-////
-//! @SYMTestCaseID 		SEC-AUT-AUTHPOSTMARKETPLUGIN-0007
-//! @SYMTestCaseDesc 		Install and uninstall a non-ROM plugin.Verify that the plugin count increments by one post install operation 
-//!				and decrements by one post uninstall operation.
-//! @SYMREQ 			REQ 11235
-//! @SYMTestPriority 		Medium
-//! @SYMTestActions  		1)Retrieve the available plugin list before a non-ROM plugin is installed.
-//!		     		2)Install non-ROM plugin specified in the ini file.
-//!		     		3)Repeat step 1.Verify that the plugin count increments by one.
-//!				4)Retrieve the available plugin list before the non-ROM plugin is uninstalled.
-//!				5)Uninstall the non-ROM plugin(installed in step 2).
-//!		     		6)Repeat step 1.Verify that the plugin count decrements by one.
-//!						
-//! @SYMTestExpectedResults	Plugin count increments by one post install and decrements by one post uninstall operation.
-//! @SYMDevelopedForRelease 	Diran
-
-START_TESTCASE SEC-AUT-AUTHPOSTMARKETPLUGIN-0007
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr	POST_MARKET_PLUGIN	c:\tauth\tAuthSvr\scripts\tpostmarketplugin.ini Test0004
-END_TESTCASE SEC-AUT-AUTHPOSTMARKETPLUGIN-0007
-
-////
-//! @SYMTestCaseID 		SEC-AUT-AUTHPOSTMARKETPLUGIN-0008
-//! @SYMTestCaseDesc 		Verify authentication behaviour using a non ROM plugin post install and uninstall operation.
-//! @SYMREQ 			REQ 11235
-//! @SYMTestPriority 		Medium
-//! @SYMTestActions  		1)Install non-ROM plugin specified in the ini file.
-//!		     		2)Register an identity using a specified pin input.
-//!				3)Authenticate using the non ROM plugin installed in step 1.
-//!		     		4)Uninstall the plugin.
-//!				5)Authenticate again using the sme plugin.
-//!				
-//!						
-//! @SYMTestExpectedResults	Authentication must succeed using the non ROM plugin after install operation 
-//!				and must fail with KErrAuthServNoSuchPlugin post uninstall operation.
-//! @SYMDevelopedForRelease 	Diran
-START_TESTCASE SEC-AUT-AUTHPOSTMARKETPLUGIN-0008
-
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr INSTALL_PLUGIN c:\tauth\tAuthSvr\scripts\tpostmarketplugin.ini Test0003
-DELAY 3000
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr REMOVE_DBS
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr REG_IDENTITY c:\tauth\tAuthSvr\scripts\tpostmarketplugin.ini Test0005
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr AUTHENTICATE c:\tauth\tAuthSvr\scripts\tpostmarketplugin.ini Test0006
-RUN_TEST_STEP_RESULT 0 100 tAuthSvr UNINSTALL_PLUGIN c:\tauth\tAuthSvr\scripts\tpostmarketplugin.ini Test0007
-DELAY 3000
-RUN_TEST_STEP !Error=-10802 100 tAuthSvr AUTHENTICATE c:\tauth\tAuthSvr\scripts\tpostmarketplugin.ini Test0006
-END_TESTCASE SEC-AUT-AUTHPOSTMARKETPLUGIN-0008
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/tpostmarketpluginenabled1_winscw.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,58 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-//
-
-
-PRINT Post Market Plugin tests with KEnablePostMarketAuthenticationPlugins enabled...
-
-// Prepare a clone of TAuthSvr to possess authserver's SID.
-// This is required for modifying the authserver's central repository file.
-// This clone must be deleted at the end of the test.
-
-RUN_PROGRAM 100 SETCAP tAuthSvr.exe 188b0 -SID 102740FC tAuthSvr_new.exe
-
-LOAD_SUITE tAuthSvr
-LOAD_SUITE tAuthSvr_new
-
-// This test must be executed in order to set the default plugin, else authserver will never start.
-
-RUN_UTILS DeleteFile C:\pinplugin_inactive.txt
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr_new 	INIT_CENREP c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defaultplugin
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_in.dat
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_out.dat
-
-// The following test is run for KEnablePostMarketAutheticationPlugins set to a positive value greater than zero,
-// in epoc.ini.This test is executed only in winscw.
-
-////
-//! @SYMTestCaseID 		SEC-AUT-AUTHPOSTMARKETPLUGINENABLED1-0001
-//! @SYMTestCaseDesc 		Install and uninstall a non-ROM plugin.Verify that the plugin count increments by one post install operation 
-//!				and decrements by one post uninstall operation.
-//! @SYMREQ 			REQ 11235
-//! @SYMTestPriority 		Medium
-//! @SYMTestActions  		1)Retrieve the available plugin list before a non-ROM plugin is installed.
-//!		     		2)Install non-ROM plugin specified in the ini file.
-//!		     		3)Repeat step 1.Verify that the plugin count increments by one.
-//!				4)Retrieve the available plugin list before the non-ROM plugin is uninstalled.
-//!				5)Uninstall the non-ROM plugin(installed in step 2).
-//!		     		6)Repeat step 1.Verify that the plugin count decrements by one.
-//!						
-//! @SYMTestExpectedResults	Plugin count increments by one post install and decrements by one post uninstall operation.
-//! @SYMDevelopedForRelease 	Diran
-
-START_TESTCASE SEC-AUT-AUTHPOSTMARKETPLUGINENABLED1-0001
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr	POST_MARKET_PLUGIN	c:\tauth\tAuthSvr\scripts\tpostmarketplugin.ini Test0004
-END_TESTCASE SEC-AUT-AUTHPOSTMARKETPLUGINENABLED1-0001
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/tAuthSvr/scripts/tpostmarketpluginenabled_winscw.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,59 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-//
-
-PRINT Post Market Plugin tests with KEnablePostMarketAuthenticationPlugins enabled...
-
-// Prepare a clone of TAuthSvr to possess authserver's SID.
-// This is required for modifying the authserver's central repository file.
-// This clone must be deleted at the end of the test.
-
-RUN_PROGRAM 100 SETCAP tAuthSvr.exe 188b0 -SID 102740FC tAuthSvr_new.exe
-
-LOAD_SUITE tAuthSvr
-LOAD_SUITE tAuthSvr_new
-
-// This test must be executed in order to set the default plugin, else authserver will never start.
-
-RUN_UTILS DeleteFile C:\pinplugin_inactive.txt
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr_new 	INIT_CENREP c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defaultplugin
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_in.dat
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_out.dat
-
-// The following test is run for KEnablePostMarketAutheticationPlugins set to a negative value,
-// in epoc.ini.This test is executed only in winscw.
-
-LOAD_SUITE tAuthSvr
-
-////
-//! @SYMTestCaseID 		SEC-AUT-AUTHPOSTMARKETPLUGINENABLED-0001
-//! @SYMTestCaseDesc 		Install and uninstall a non-ROM plugin.Verify that the plugin count increments by one post install operation 
-//!				and decrements by one post uninstall operation.
-//! @SYMREQ 			REQ 11235
-//! @SYMTestPriority 		Medium
-//! @SYMTestActions  		1)Retrieve the available plugin list before a non-ROM plugin is installed.
-//!		     		2)Install non-ROM plugin specified in the ini file.
-//!		     		3)Repeat step 1.Verify that the plugin count increments by one.
-//!				4)Retrieve the available plugin list before the non-ROM plugin is uninstalled.
-//!				5)Uninstall the non-ROM plugin(installed in step 2).
-//!		     		6)Repeat step 1.Verify that the plugin count decrements by one.
-//!						
-//! @SYMTestExpectedResults	Plugin count increments by one post install and decrements by one post uninstall operation.
-//! @SYMDevelopedForRelease 	Diran
-
-START_TESTCASE SEC-AUT-AUTHPOSTMARKETPLUGINENABLED-0001
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr	POST_MARKET_PLUGIN	c:\tauth\tAuthSvr\scripts\tpostmarketplugin.ini Test0004
-END_TESTCASE SEC-AUT-AUTHPOSTMARKETPLUGINENABLED-0001
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/10204F10.rss	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,109 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Registry file for the miscellaneous authServer Interface Implementation Collection
-* UIDs quick-ref
-* ECOM DLL UID:			0x10204F10 
-* ECOM interface UID:		0x102740FE
-* ECOM Implementation:		0x11113100	-PIN
-*
-*/
-
-
-/**
- @file 10204F10.rss
-*/
-
-
-#include "registryinfov2.rh"
-
-// Declares info for one implementation
-RESOURCE REGISTRY_INFO theInfo
-	{
-	// UID for the plug-in DLL; matches name of this file
-	dll_uid = 0x10204F10;
-	resource_format_version = RESOURCE_FORMAT_VERSION_2;
-
-	// Declare array of interface info
-	interfaces = 
-		{
-		INTERFACE_INFO
-		 	{
-		 	// UID of interface that is implemented (i.e. CAuthPluginInterface)							
-		 	interface_uid = 0x102740FE;			
-			implementations = 
-				{
-				IMPLEMENTATION_INFO
-					{
-					implementation_uid = 0x11113100;
-					version_no = 1;
-					display_name = "11113100 -Pin0 Implementation of AuthServer plugin";
-					default_data = "11113100";
-					opaque_data = "";
-					rom_only=1;
-					},
-				// Info for the first child PIN Plugin
-				IMPLEMENTATION_INFO
-					{
-					implementation_uid = 0x11113101;
-					version_no = 1;
-					display_name = "11113101 -Pin1 Implementation||Copyright © 1997-2001 Symbian Ltd. All Rights Reserved.||";
-					default_data = "11113101";
-					opaque_data = "";
-					rom_only=1;
-					},
-				// Info for the first child PIN Plugin
-				IMPLEMENTATION_INFO
-					{
-					implementation_uid = 0x11113102;
-					version_no = 1;
-					display_name = "11113102 -Pin2 Implementation||Copyright © 1997-2001 Symbian Ltd. All Rights Reserved.||";
-					default_data = "11113102";
-					opaque_data = "";
-					rom_only=1;
-					},
-				// Info for the first child PIN Plugin
-				IMPLEMENTATION_INFO
-					{
-					implementation_uid = 0x11113103;
-					version_no = 1;
-					display_name = "11113103 -Bio3 Implementation||Copyright © 1997-2001 Symbian Ltd. All Rights Reserved.||";
-					default_data = "11113103";
-					opaque_data = "";
-					rom_only=1;
-					},
-				// Info for the first child PIN Plugin
-				IMPLEMENTATION_INFO
-					{
-					implementation_uid = 0x11113104;
-					version_no = 1;
-					display_name = "11113104 - Tok1 Implementation||Copyright © 1997-2001 Symbian Ltd. All Rights Reserved.||";
-					default_data = "11113104";
-					opaque_data = "";
-					rom_only=1;
-					}
-				//,
-				// Info for CTFingerprintAuthPlugin
-				//IMPLEMENTATION_INFO
-				//	{
-				//	implementation_uid = 0x102740FE;
-				//	version_no = 1;
-				//	display_name = "Fingerprint Implementation||Copyright © 1997-2001 Symbian Ltd. All Rights Reserved.||";
-				//	default_data = "text/xml||Type of data handled";
-				//	opaque_data = "test_params";
-				//	}
-				};	
-			}
-		};			
-	}		
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/10204F10_upgrade.rss	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,106 +0,0 @@
-/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Dummy Registry file for the tAuthPlugin upgrade Implementation Collection
-* UIDs quick-ref
-* ECOM DLL UID:			0x10204F10 
-* ECOM interface UID:		0x102740FE
-* ECOM Implementation:		0x11113100	-PIN
-*
-*/
-
-
-
-#include "registryinfov2.rh"
-
-// Declares info for one implementation
-RESOURCE REGISTRY_INFO theInfo
-	{
-	// UID for the plug-in DLL; matches name of this file
-	dll_uid = 0x10204F10;
-	resource_format_version = RESOURCE_FORMAT_VERSION_2;
-
-	// Declare array of interface info
-	interfaces = 
-		{
-		INTERFACE_INFO
-		 	{
-		 	// UID of interface that is implemented (i.e. CAuthPluginInterface)							
-		 	interface_uid = 0x102740FE;			
-			implementations = 
-				{
-				IMPLEMENTATION_INFO
-					{
-					implementation_uid = 0x11113100;
-					version_no = 2;
-					display_name = "11113100 -Pin0 Implementation of AuthServer plugin";
-					default_data = "11113100";
-					opaque_data = "";
-					rom_only=1;
-					},
-				// Info for the first child PIN Plugin
-				IMPLEMENTATION_INFO
-					{
-					implementation_uid = 0x11113101;
-					version_no = 2;
-					display_name = "11113101 -Pin1 Implementation||Copyright © 1997-2001 Symbian Ltd. All Rights Reserved.||";
-					default_data = "11113101";
-					opaque_data = "";
-					rom_only=1;
-					},
-				// Info for the first child PIN Plugin
-				IMPLEMENTATION_INFO
-					{
-					implementation_uid = 0x11113102;
-					version_no = 2;
-					display_name = "11113102 -Pin2 Implementation||Copyright © 1997-2001 Symbian Ltd. All Rights Reserved.||";
-					default_data = "11113102";
-					opaque_data = "";
-					rom_only=1;
-					},
-				// Info for the first child PIN Plugin
-				IMPLEMENTATION_INFO
-					{
-					implementation_uid = 0x11113103;
-					version_no = 2;
-					display_name = "11113103 -Bio3 Implementation||Copyright © 1997-2001 Symbian Ltd. All Rights Reserved.||";
-					default_data = "11113103";
-					opaque_data = "";
-					rom_only=1;
-					},
-				// Info for the first child PIN Plugin
-				IMPLEMENTATION_INFO
-					{
-					implementation_uid = 0x11113104;
-					version_no = 2;
-					display_name = "11113104 - Tok1 Implementation||Copyright © 1997-2001 Symbian Ltd. All Rights Reserved.||";
-					default_data = "11113104";
-					opaque_data = "";
-					rom_only=1;
-					}
-				//,
-				// Info for CTFingerprintAuthPlugin
-				//IMPLEMENTATION_INFO
-				//	{
-				//	implementation_uid = 0x102740FE;
-				//	version_no = 2;
-				//	display_name = "Fingerprint Implementation||Copyright © 1997-2001 Symbian Ltd. All Rights Reserved.||";
-				//	default_data = "text/xml||Type of data handled";
-				//	opaque_data = "test_params";
-				//	}
-				};	
-			}
-		};			
-	}		
-
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/main.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,32 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-
-#include <e32base.h>
-
-/** DLL Entry point */
-
-//GLDEF_C TInt E32Dll(TDllReason /*aReason*/)
-//	{
-//	return(KErrNone);
-//	}
-
-TBool E32Dll()
-	{
-	return (ETrue);
-	}
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/proxy.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,43 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-
-#include <e32std.h>
-#include <ecom/implementationproxy.h>	// ECOM header file
-
-#include "tPinAuthPlugin.h"			// Class definition for one of the available implementations
-
-
-// Map the interface UIDs to implementation factory functions
-const TImplementationProxy ImplementationTable[] = 
-	{
-		//Next line commented because of the use of parameterised classes
-		//IMPLEMENTATION_PROXY_ENTRY(0x11113100,	CTPinAuthPlugin::NewL),
-		IMPLEMENTATION_PROXY_ENTRY(0x11113100,	CTPinAuthPlugin11113100::NewL),
-		IMPLEMENTATION_PROXY_ENTRY(0x11113101,	CTPinAuthPlugin11113101::NewL),		
-		IMPLEMENTATION_PROXY_ENTRY(0x11113102,	CTPinAuthPlugin11113102::NewL),
-		IMPLEMENTATION_PROXY_ENTRY(0x11113103,	CTPinAuthPlugin11113103::NewL),
-		IMPLEMENTATION_PROXY_ENTRY(0x11113104,	CTPinAuthPlugin11113104::NewL)
-	};
-
-// Exported proxy function to resolve intstantiation methods for an ECOM plugin dll
-EXPORT_C const TImplementationProxy* ImplementationGroupProxy(TInt& aTableCount)
-	{
-	aTableCount = sizeof(ImplementationTable) / sizeof(TImplementationProxy);
-	return ImplementationTable;
-	}
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/step_AuthSvrCheck.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,102 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CTestStep derived implementation
-*
-*/
-
-
- 
-#include "tAuthSvrStep.h"
-
-#include "authserver/authclient.h"
-#include "authserver/authmgrclient.h"
-
-CTAuthSvrCheck::CTAuthSvrCheck()
-/**
-  Constructor
- */
-	{
-	// Call base class method to set up the human readable name for logging
-	SetTestStepName(KTAuthSvrCheck);
-	}
-
-TVerdict CTAuthSvrCheck::doTestStepL()
-/**
-  @return - TVerdict code
-  Override of base class pure virtual
-  
- */
-	{	
-	
-__UHEAP_MARK;		// Check for memory leaks
-
-	SetTestStepResult(EPass);
-	
-	InitAuthServerFromFileL();	// Set things like 'iSupportsDefaultData' and 'DefaultPlugin'
-
-	//-----------------------------------------------------------------------------------------------------
-	//Connect to the AuthServer
-	AuthServer::RAuthClient authClient1;
-	//User::LeaveIfError(authClient1.Connect());
-	
-	TInt connectVal = authClient1.Connect();
-	if (KErrNotFound == connectVal)
-		{
-		//Retry after a delay
-		TTimeIntervalMicroSeconds32 timeInterval = 2000;	//2 Milliseconds
-		User::After(timeInterval);
-		connectVal = authClient1.Connect();
-		}
-	if (KErrNone != connectVal)
-		{
-		ERR_PRINTF2(_L("Unable to start a session or other connection error. Err = %d"), connectVal);
-		User::LeaveIfError(connectVal);		
-		}
-	CleanupClosePushL(authClient1);
-	
-	//Check that the default identity has been created
-	//Call the Enumerate Identity API
-	AuthServer::RIdentityIdArray idList;
-	TRAPD(res1, authClient1.IdentitiesL(idList));
-	CleanupClosePushL(idList);
-	
-	if(KErrNone != res1)
-		{
-		ERR_PRINTF2(_L("authClient::IdentitiesL() performed a Leave with code %d"), res1 );
-		}
-	else
-		{
-		//Retrieve the expected information from the ini file
-		TInt expNumIdentities;
-	
-		if(GetIntFromConfig(ConfigSection(),_L("NumIdentities"), expNumIdentities) != EFalse) // the tag 'NumIdentities' was present
-			{
-			//Do the compare
-			if (idList.Count() != expNumIdentities)
-				{
-				ERR_PRINTF3(_L("expNumIdentities differs from expected, Expected = %d, Number of Identities = %d"), expNumIdentities, idList.Count());			
-				SetTestStepResult(EFail);
-				}
-			}
-		
-		// Check the status of a plugin compared to what was expected
-		CheckSpecifiedPluginStatusConnectedL(authClient1);
-		}
-	CleanupStack::PopAndDestroy(&idList);
-	CleanupStack::PopAndDestroy(&authClient1); 
-
-__UHEAP_MARKEND;
-	return TestStepResult();	
-	}
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/step_EnumIdenties.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,98 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CTestStep derived implementation
-*
-*/
-
- 
-#include "tAuthSvrStep.h"
-//#include <testexecutelog.h>
-
-#include "authserver/authclient.h"
-#include "authserver/authmgrclient.h"
-#include "authserver/identity.h"
-
-//using namespace AuthServer;
-
-CTEnumIdentities::CTEnumIdentities(CTAuthSvrServer& aParent): iParent(aParent)
-/**
- * Constructor
- */
-	{
-	// Call base class method to set up the human readable name for logging
-	SetTestStepName(KTEnumIdentities);
-	}
-
-
-TVerdict CTRegIdentity::doTestStepL()
-/**
- * @return - TVerdict code
- * Override of base class pure virtual
- * 
- */
-	{	
-	INFO_PRINTF1(_L("In EnumIdentities Step"));
-	SetTestStepResult(EPass);
-	
-	//If any test step leaves or panics, the test step thread exits and no further calls are made. 
-	if (TestStepResult() != EPass)
-		{
-		return TestStepResult();
-		}
-
-__UHEAP_MARK;		// Check for memory leaks
-
-	InitAuthServerFromFile();
-	AuthServer::RAuthMgrClient client4 = (iParent.Cl());	//This is an R class, so the copy constructor provides the actual handle
-		
-	//User::LeaveIfError(iParent.Cl().Connect());	
-	//CleanupClosePushL(iParent.Cl());
-	User::LeaveIfError(client4.Connect());	
-	CleanupClosePushL(client4);
-	
-	//Call the Enumerate Identities API
-	AuthServer::RIdentityIdArray idArray;	//Initialisation
-	iParent.Cl().IdentitiesL(idArray);
-	
-	
-	//AuthServer::CIdentity aIdentity1 = new (ELeave) AuthServer::CIdentity(AuthServer::KUnknown, 0);
-	
-	TUint32 id1 = 0;
-	AuthServer::CProtectionKey *key1 (AuthServer::CProtectionKey::NewL(8));
-		
- 	AuthServer::CIdentity *aIdentity1 = new AuthServer::CIdentity(id1, key1);
- 	TRequestStatus reqStatus = KRequestPending;	//for async calls
-	
-	TRAPD(err, iParent.Cl().RegisterIdentity(*aIdentity1, reqStatus));
-		
-	User::WaitForRequest(reqStatus); //delay
-	//Check reqStatus
-	if (reqStatus.Int() == KErrNone)	//The request completed ok
-		{					
-		INFO_PRINTF2(_L("Request completed ok. reqStatus = %d"), reqStatus.Int());
-		SetTestStepResult(EPass);
-		}
-	else 	// The request failed
-		{					
-		INFO_PRINTF2(_L("Request failed. reqStatus = %d"), reqStatus.Int());
-		SetTestStepResult(EFail);
-		}
-	
-	//CleanupStack::PopAndDestroy(&(iParent.Cl());
-	CleanupStack::PopAndDestroy(&client4);
-	
-__UHEAP_MARKEND;
-	return TestStepResult();	
-	}
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/step_FirstStart.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,223 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CTestStep derived implementation
-*
-*/
-
- 
-#include "tAuthSvrStep.h"
-
-#include "authserver/authclient.h"
-#include "authserver/authmgrclient.h"
-#include "authrepository.h"
-using namespace AuthServer;
-
-CTFirstStart::CTFirstStart()
-/**
- * Constructor
- */
-	{
-	// Call base class method to set up the human readable name for logging
-	SetTestStepName(KTFirstStart);
-	}
-
-TVerdict CTFirstStart::doTestStepPreambleL()
-/**
- * @return - TVerdict code
- * Override of base class virtual
- */
-	{
-	CTAuthSvrStepBase::doTestStepPreambleL();
-	
-	SetTestStepResult(EPass);
-	return TestStepResult();
-	}
-
-TVerdict CTFirstStart::doTestStepL()
-/**
- * @return - TVerdict code
- * Override of base class pure virtual
- * 
- */
-	{
-	// remove trained identity 22 for these tests
-	CAuthDb2* db = CAuthDb2::NewLC(iFs);
-	db->RemoveIdentityL(22);
-	CleanupStack::PopAndDestroy(db);
-	
-	//INFO_PRINTF1(_L("In FirstStart Step"));
-	
-	//User::SetJustInTime(ETrue);	//a panic will kill just the thread, not the whole emulator.
-	
-	//If any test step leaves or panics, the test step thread exits and no further calls are made. 
-	if (TestStepResult() != EPass)
-		{
-		return TestStepResult();
-		}
-
-__UHEAP_MARK;		// Check for memory leaks
-
-	SetTestStepResult(EPass);
-
-	TDriveUnit sysDrive (RFs::GetSystemDrive());
-	TDriveName sysDriveName (sysDrive.Name());
-	TBuf<128> fileName (sysDriveName);
-	fileName.Append(KAuthSvrPolicyFile);
-	CIniData* policyFile=NULL;
-	policyFile=CIniData::NewL(fileName);
-	CleanupStack::PushL(policyFile);
-	
-	fileName.Copy(sysDriveName);
-	fileName.Append(KPluginIniFile);
-	
-	CIniData* pluginFile=NULL;
-	pluginFile=CIniData::NewL(fileName);
-	CleanupStack::PushL(pluginFile);
-	//Set a default plugin using an ini file. Read this value from a file if it is specified	
-	//Set this to be the default plugin (update the policy file) if the test case specifies it (in the script's ini file).
-	TInt defaultPluginFromFile;
-	if (GetIntFromConfig(ConfigSection(),_L("defaultPlugin"), defaultPluginFromFile) != EFalse) // the tag 'defaultPlugin' was present
-		{
-				
-		//Write this value to the policy file, Which is picked up by the AuthServer (not implemented yet)
-		//writeToNamedConfig(policyFile, KDefaultPluginTag, defaultPluginFromFile);
-		SetDefaultPluginIdL(defaultPluginFromFile);
-		}
-	
-	//Set whether a plugin supports default data. Read this value from a file if it is specified
-	_LIT(KTrueText,"true");
-	_LIT(KFalseText,"false");
-	
-	TBool iSupportsDefaultDataFromFile(ETrue);	//Default case - the plugin supports default data
-	
-	TBufC<16> trueBuf1(KTrueText);
-	TBufC<16> falseBuf1(KFalseText);
-	TPtr valueToWrite = trueBuf1.Des();			//Default case - the plugin supports default data
-	
-	
-	if (GetBoolFromConfig(ConfigSection(),_L("iSupportsDefaultData"), iSupportsDefaultDataFromFile) != EFalse) // the tag 'isTrusted' was present
-		{
-		//Set the value that will be picked up by the constructor of the plugin
-		//writeToNamedConfig(pluginIniFile, KPluginIniSection, _L("iSupportsDefaultData"), iSupportsDefaultDataFromFile);		
-		if (iSupportsDefaultDataFromFile)
-			{ valueToWrite = trueBuf1.Des();	}
-		else
-			{ valueToWrite = falseBuf1.Des();	}
-			
-		writeToNamedConfig(pluginFile, KPluginIniSection, _L("iSupportsDefaultData"), valueToWrite);		
-		}
-	else
-		{
-		INFO_PRINTF1(_L("The iSupportsDefaultData tag was not specified in the testexecute ini file."));
-		//Use the default value of false		
-		writeToNamedConfig(pluginFile, KPluginIniSection, _L("iSupportsDefaultData"), valueToWrite);
-		}
-		
-	//Carry out the other initialisation that is required.	
-	// TODO.
-	
-
-	//-----------------------------------------------------------------------------------------------------
-	//Connect to the AuthServer
-	AuthServer::RAuthClient authClient1;
-	//TInt connectVal = User::LeaveIfError(authClient1.Connect());
-	TInt connectVal = authClient1.Connect();
-	if (KErrNotFound == connectVal)
-		{
-		//Retry after a delay
-		TTimeIntervalMicroSeconds32 timeInterval = 2000;	//2 Milliseconds
-		User::After(timeInterval);
-		connectVal = authClient1.Connect();
-		}
-	if (KErrNone != connectVal)
-		{
-		ERR_PRINTF2(_L("Unable to start a session or other connection error. Err = %d"), connectVal);
-		User::LeaveIfError(connectVal);		
-		}
-	CleanupClosePushL(authClient1);
-
-
-	//Check that the default identity has been created
-	//Call the Enumerate Identity API
-	//AuthServer::RIdentityIdList idList;
-	AuthServer::RIdentityIdArray idArray;
-	CleanupClosePushL(idArray);
-	//TInt ret =  User::LeaveIfError(authClient1.IdentitiesL(idArray));
-	TInt ret = KErrNone;
-	TRAP(ret, authClient1.IdentitiesL(idArray));
-	if (KErrNone != ret)
-		{
-		ERR_PRINTF2(_L("IdentitiesL left with errorcode: %d"), ret);
-		SetTestStepResult(EFail);
-		}
-	
-	else
-		{
-		
-		//List the present identities by their strings
-		for (TInt i = 0; i < idArray.Count(); i++)
-			{
-			HBufC* idName = 0;
-			//TRAP(ret, idName = authClient1.IdentityStringL(idArray[i]));
-			idName = authClient1.IdentityStringL(idArray[i]);
-			INFO_PRINTF3(_L("Id %d has the name %S"), i, idName);
-			delete idName; 
-			}
-		//Retrieve the expected information from the ini file
-		TInt expNumIdentities;
-		
-		if(GetIntFromConfig(ConfigSection(),_L("NumIdentities"), expNumIdentities) != EFalse) // the tag 'NumIdentities' was present
-			{
-			//Do the compare
-			if ((idArray.Count()) != expNumIdentities)
-				{
-				ERR_PRINTF2(_L("expNumIdentities differs from expected, Number of Identities = %d"), (idArray.Count()));			
-				SetTestStepResult(EFail);
-				}
-			}
-		
-		TBool expIsDefaultPlugin = EFalse;	
-		if(GetBoolFromConfig(ConfigSection(), _L("isDefaultPlugin"), expIsDefaultPlugin) != EFalse) // the tag 'isDefaultPlugin' was present
-			{
-			if(!expIsDefaultPlugin && (KErrServerTerminated != ret) )
-				{
-				//The plugin is not a default plugin as defined in the policy file, and thus the server should have been terminated
-				ERR_PRINTF2(_L("connectVal differs from expected, connectVal= %d"), connectVal);			
-				SetTestStepResult(EFail);
-				}	
-			}
-	
-		}
-			
-		
-		//Maybe check the individual identifier -not predictable though..
-	CleanupStack::PopAndDestroy(&idArray); 
-	CleanupStack::PopAndDestroy(&authClient1); 
-	
-	REComSession::FinalClose(); 	//garbage collect the last previously destroyed implementation and close the REComSession if no longer in use
-__UHEAP_MARKEND;
-	return TestStepResult();
-	}
-
-//TVerdict CTFirstStart::doTestStepPostambleL()
-/**
- * @return - TVerdict code
- * Override of base class virtual
- */
-/*	{
-	INFO_PRINTF1(_L("Test Step Postamble"));
-	return TestStepResult();
-	}
-*/
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/step_IdentifyMultiple.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,277 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CTestStep derived implementation
-*
-*/
-
- 
-#include "tAuthSvrStep.h"
-
-
-using namespace AuthServer;
-
-
-CTIdentifyMultiple::CTIdentifyMultiple()
-/**
- * Constructor
- */
-	{
-	// Call base class method to set up the human readable name for logging
-	SetTestStepName(KTIdentifyMultiple);
-	}
-
-CTIdentifyMultiple::~CTIdentifyMultiple()
-/**
- * Destructor
- */
-	{
-	 TInt i = iPluginIds.Count();
-	  while (i)
-		{
-		 REComSession::DestroyedImplementation(iPluginIds[--i]);
-		}
-	}
-	
-TVerdict CTIdentifyMultiple::doTestStepPreambleL()
-/**
- * @return - TVerdict code
- * Override of base class virtual
- */
-	{
-	SetTestStepResult(EPass);
-	
-	//Put in an initial value for the userResult (PIN) that will be used as input during the Identify() function
-	TPtrC userResultValue;
-	if(GetStringFromConfig(ConfigSection(),_L("userResult"), userResultValue) != EFalse) // the tag 'userResult ' was present
-		{
-		TDriveUnit sysDrive (RFs::GetSystemDrive());
-		TBuf<128> authSvrPolicyFile (sysDrive.Name());
-		authSvrPolicyFile.Append(KAuthSvrPolicyFile);
-		
-		CIniData* policyFile=NULL;
-		policyFile=CIniData::NewL(authSvrPolicyFile);
-		CleanupStack::PushL(policyFile);
-		//Update AuthSvrPolicy.ini, section: SectionOne, value:EnteredPinValue
-		writeToNamedConfig(policyFile, _L("SectionOne"), _L("EnteredPinValue"), userResultValue);
-		policyFile->WriteToFileL();
-
-		CleanupStack::PopAndDestroy(policyFile);
-
-		}
-	return TestStepResult();
-	}
-	
- 
-TVerdict CTIdentifyMultiple::doTestStepL()
-/**
- * @return - TVerdict code
- * Override of base class pure virtual
- * 
- */
-	{	
-	//INFO_PRINTF1(_L("In IdentifyMultiple Step"));
-	SetTestStepResult(EPass);
-	
-	//If any test step leaves or panics, the test step thread exits and no further calls are made. 
-	if (TestStepResult() != EPass)
-		{
-		return TestStepResult();
-		}
-
-__UHEAP_MARK;		// Check for memory leaks
-
-	//-----------------------------------------------------------------------------------------------------
-	//Connect to the AuthServer
-	
-	
-	AuthServer::RAuthClient authClient1;
-	TInt connectVal = authClient1.Connect();
-	if (KErrNotFound == connectVal)
-		{
-		//Retry after a delay
-		TTimeIntervalMicroSeconds32 timeInterval = 2000;	//2 Milliseconds
-		User::After(timeInterval);
-		connectVal = authClient1.Connect();
-		}
-	if (KErrNone != connectVal)
-		{
-		ERR_PRINTF2(_L("Unable to start a session or other connection error. Err = %d"), connectVal);
-		User::LeaveIfError(connectVal);		
-		}	
-	CleanupClosePushL(authClient1);
-
-
-/*
-	//Call the Enumerate Identities API
-	TInt ret = KErrNone;
-	AuthServer::RIdentityIdArray idArray;	//Initialisation
-	TRAP(ret, authClient1.IdentitiesL(idArray));		// This will need to be updated if the function returns errors like KErrServerTerminated, etc 
-			
-	//Retrieve the expected information from the ini file
-	TInt expNumIdentities = 0;	
-	if(GetIntFromConfig(ConfigSection(),_L("NumIdentities"), expNumIdentities) != EFalse) // the tag 'NumIdentities' was present
-		{//Do the compare
-		if (idArray.Count() != expNumIdentities)
-			{
-			ERR_PRINTF2(_L("expNumIdentities differs from expected, Number of Identities = %d"), idArray.Count());			
-			SetTestStepResult(EFail);
-			}
-		}
-*/
-///*
-	//Run through the list of plugins and call the Identify function on each
-	//Get all implementations using  CAuthPluginInterface::ListImplementationsL()	
-	RImplInfoPtrArray infoArray;
-	// Note that a special cleanup function is required to reset and destroy
-	// all items in the array, and then close it.
-	TCleanupItem cleanup(CleanupEComArray, &infoArray);
-	CleanupStack::PushL(cleanup);
-	REComSession::ListImplementationsL(KCAuthPluginInterfaceUid, infoArray);
-	
-	TInt numPlugins = infoArray.Count();
-	INFO_PRINTF2(_L("Number of plugins: %d"), numPlugins);	
-	for (TInt i = 0;  i < numPlugins; i++)
-		{
-		//Retrieves default data for each
-		//TPtrC8 dataType = infoArray[i] ->DataType();
-		//TDesC displayName = infoArray[i] ->DisplayName();
-		
-		TInt data = HexString2Num(infoArray[i]->DataType());
-		INFO_PRINTF2(_L("Implementation Id: 0x%x"),infoArray[i]->ImplementationUid().iUid);
-		INFO_PRINTF2(_L("Display Name: %S"),&infoArray[i]->DisplayName());
-		INFO_PRINTF2(_L("Default Data: %x"),data);
-	    //INFO_PRINTF2(_L("Rom Only: %d"),impl[i]->RomOnly());
-		//INFO_PRINTF2(_L("Rom Based: %d"),impl[i]->RomBased());
-		   
-		//....
-		}	
-	// Clean up
-	CleanupStack::PopAndDestroy(&infoArray); //infoArray, results in a call to CleanupEComArray
-//*/
-
-	
-	//Read a cue from the ini file. A specific one in each section; the expected data is the same as the cue, so this minimizes
-	// the number of times the file is read
-	TInt fileCuePluginIdValue = 0;
-	TPluginId cuePluginIdValue = 0;
-	
-	//User::SetJustInTime(ETrue);
-		
-	if(GetHexFromConfig(ConfigSection(),_L("pluginId"), fileCuePluginIdValue) != EFalse) // the tag 'pluginId' was present
-		{
-		cuePluginIdValue = fileCuePluginIdValue;
-			
-		CAuthPluginInterface* plugin = 0;
-		TEComResolverParams resolverParams;
-		TBufC8<16> pluginIdTxt;
-			  
-		pluginIdTxt.Des().Format(_L8("%x"), cuePluginIdValue);
-			  
-		resolverParams.SetDataType(pluginIdTxt);
-			  
-		TAny* tempPlugin = 0; 
-		TUid Dtor_ID_Key = TUid::Null();
-		tempPlugin = 
-		REComSession::CreateImplementationL(KCAuthPluginInterfaceUid,
-		    							  	Dtor_ID_Key,
-											resolverParams,
-											KRomOnlyResolverUid);	
-		
-		plugin = reinterpret_cast<CAuthPluginInterface*>(tempPlugin);
-		CleanupStack::PushL(plugin);
-		iPluginIds.Append(Dtor_ID_Key);
-		//Call the identify function for this plugin
-		HBufC8* result1 = 0;
-
-		TRequestStatus reqStatus1 = KErrNone;
-		TIdentityId userId = 0;
-		
-		plugin->Identify(userId, KNullDesC(), result1, reqStatus1);
-		CleanupStack::PushL(result1);
-		
-		//if (reqStatus1.Int() == CAuthPluginInterface::KIdSuccess)
-		if (reqStatus1.Int() == KErrNone)
-			{
-			//Check that this is what was expected		
-			TBuf8<32> cueValue;		
-			_LIT8(KFormatValue2, "%x");
-			cueValue.Format(KFormatValue2, cuePluginIdValue);		
-			
-			TInt userIdValue = 0;
-			//Check to see if there was a value in the testExecute 'ini' file to compare with						
-			if(GetHexFromConfig(ConfigSection(),_L("userId"), userIdValue) != EFalse) // the tag 'userId' was present
-				{	
-				if(userId != userIdValue)
-					{
-					ERR_PRINTF3(_L("Id value returned differs from expected, Returned userId value= %d, Expected Id value = %d"), userId, userIdValue);
-					SetTestStepResult(EFail);				
-					}
-				}
-
-			TInt userResultValue = 0;				
-			if(GetIntFromConfig(ConfigSection(),_L("userResult"), userResultValue) != EFalse) // the tag 'userId' was present
-			
-				{
-				//Convert result1 to an integer
-				TPtr8 ptr = result1->Des();		// Convert the HBufC8 to a TPtr8				
-				TUint32 result2;
-				TLex8 input (ptr);
-				TRadix aRadix = EDecimal;
-				input.Val(result2, aRadix);
-				RDebug::Print(_L("Integer representation of result1 = %d, result1 itself = %S"), result2, result1);
-								
-				if(result2 != userResultValue)
-					{
-					_LIT(KErrMsg1, "result value returned differs from expected, Returned userId value= %d, \n Returned data value = %d. Expected data value = %d");						
-					ERR_PRINTF4(KErrMsg1, userId, result2, userResultValue);					
-					SetTestStepResult(EFail);				
-					}
-				}	
-			//In this case, we're expecting the 'data' returned to be the same as the pluginId value (cueValue)
-			else if (result1->Compare(cueValue) != 0)
-				{
-				TPtr8 ptr = result1->Des();		// Convert the HBufC8 to a TPtr8				
-				TUint32 result2;
-				TLex8 input (ptr);
-				TRadix aRadix = EDecimal;
-				input.Val(result2, aRadix);
-				
-				ERR_PRINTF3(_L("result value returned differs from expected, Returned userId value= %d, Returned data value = %d"), userId, result2);
-				SetTestStepResult(EFail);		
-				}
-			else
-				{
-				//No errors returned. The process was successful
-				SetTestStepResult(EPass);
-				}				
-			}		
-		else
-			{
-			ERR_PRINTF2(_L("An error occurred in the Identity function. RequestStatus = %d"), reqStatus1.Int());
-			SetTestStepResult(EFail);		
-			}
-		
-		CleanupStack::PopAndDestroy(result1);
-		CleanupStack::PopAndDestroy(plugin);
-		}			
-	
-	CleanupStack::PopAndDestroy(&authClient1);	// authClient1	
-	
-	REComSession::FinalClose(); 	//garbage collect the last previously destroyed implementation and close the REComSession if no longer in use
-	
- 	__UHEAP_MARKEND;
-	return TestStepResult();	
-	}
-
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/step_RegIdentity.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,407 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CTestStep derived implementation
-*
-*/
-
- 
-#include "tAuthSvrStep.h"
-#include <s32file.h>
-class CAuthActive2 : public CActive
-    {
-    public:
-    CAuthActive2(RAuthMgrClient& aClient, CAuthExpression* aExpr,
-				 TInt aFresh, TBool aClientSpecific, TBool aStop = ETrue) : 
-         CActive(EPriorityNormal),
-         iClient(aClient),
-		 iResult(EFail),
-         iRunCount(0),
-         iAe(aExpr),
-         iStop(aStop),
-         iFresh(aFresh),
-         iIdToStore(0), 
-         iClientSpecific(aClientSpecific)
-        {
-        CActiveScheduler::Add(this);
-        }
-    void doAuth() 
-        {
-        SetActive();		
-		TRequestStatus* status = &iStatus;		    
-		User::RequestComplete(status, KErrNone);
-		iRunCount = 0;
-        }
-    void doDeAuth()
-        {
-        iClient.DeauthenticateL();
-        }
-	void DoCancel() 
-        {
-        }
-     void RunL() 
-        {
-        iErr = iStatus.Int();
-		switch (iRunCount)
-		  {
-		  case 0:
-            iStatus = KRequestPending;
-			iId = 0;
-
-			iClient.AuthenticateL(*iAe, iFresh, iClientSpecific, EFalse, iId, iStatus);
-			SetActive();
-
-			break;
-		  case 1:
-			if (0 != iId)
-				{
-				iIdToStore = iId->Id();
-				delete iId;
-				}
-			iStatus = KRequestPending;
-			TRequestStatus* status;
-			status = &iStatus;				
-			User::RequestComplete(status, iErr);				
-			SetActive();
-			
-			break;
-   		  case 2:
-			iResult = iStatus == KErrNone ? EPass : EFail;
-            iErr = iStatus.Int();
-			if (iStop)
-                {
-                CActiveScheduler::Stop();
-                }
-
-			break;
-     	  default:
-			iResult = EFail;
-			
-			if (iStop)
-				{
-			    CActiveScheduler::Stop();
-			    }
-		    }
-		  ++iRunCount;
-          }
-	RAuthMgrClient& iClient;
-	TVerdict iResult;
-	TInt iRunCount;
-	CAuthExpression* iAe;
-	CIdentity* iId;
-    TBool iStop;
-    TInt iErr;
-    TInt iFresh;
-    TIdentityId iIdToStore;
-    TBool iClientSpecific;
-    };
-
-//====================================================================================================
-
-
-class CRegActive : public CActive
-    {
-    public:
-    CRegActive(RAuthMgrClient& aClient, HBufC* aIdentityString, CIdentity*& aResult) : 
-         CActive(EPriorityNormal),
-         iFirstTime(true),
-         iClient(aClient), 
-         iResult(aResult),
-         iIdentityString(aIdentityString),
-         iErr(KErrNone)
-        {
-        CActiveScheduler::Add(this);
-        }
-    ~CRegActive()
-    	{
-    	delete iIdentityString; 
-    	}
-    void doReg()
-        {
-        SetActive();		
-		TRequestStatus* status = &iStatus;
-		User::RequestComplete(status, KErrNone);
-		iFirstTime = ETrue;
-        }
-        void DoCancel() 
-        {
-        }
-     void RunL() 
-        {
-        iErr = iStatus.Int();
-        if (iFirstTime)
-            {
-			SetActive();
-            iStatus = KRequestPending;
-            iClient.RegisterIdentityL(iResult, *iIdentityString, iStatus);
-            iFirstTime = false;
-            }
-        else
-            {
-            iErr = iStatus.Int();
-            CActiveScheduler::Stop();
-			}
-        }
-        
-    TBool iFirstTime;
-    RAuthMgrClient& iClient;
-    CIdentity*& iResult;
-    HBufC* iIdentityString;
-    TInt iErr;
-    };
-
-//====================================================================================================
-
-CTRegIdentity::~CTRegIdentity()
-/**
-  Destructor
- */
-	{}
-
-CTRegIdentity::CTRegIdentity(CTAuthSvrServer& aParent): iParent(aParent)
-/**
-  Constructor
- */
-	{
-	
-	// Call base class method to set up the human readable name for logging
-	SetTestStepName(KTAuthSvrCheck);
-	}
-
-TVerdict CTRegIdentity::doTestStepPreambleL()
-/**
-  @return - TVerdict code
-  Override of base class virtual
- */
-	{
-	//Call the parent class preamble, setting up the file server, etc
-	CTStepActSch::doTestStepPreambleL();	
-	return TestStepResult();
-	}
-
-TVerdict CTRegIdentity::doTestStepL()
-/**
-  @return - TVerdict code
-  Override of base class pure virtual
-  
- */
-	{	
-	SetTestStepResult(EPass);	
-__UHEAP_MARK;		// Check for memory leaks
-	SetPinPluginStateL();
-	
-	//-----------------------------------------------------------------------------------------------------	
-	InitAuthServerFromFileL();	// Set things like 'iSupportsDefaultData' and 'DefaultPlugin'
-	
-	// this method creates the dat file from where the test implementation
-	// of pin plugin notifier reads user input.
-	// as the pin plugin fails without this data it has been included 
-	// in the code as a default step for initializing the pin plugin
-	// data.
-	TPinValue aPinValue;
-	CreatePinPluginInputFileL(EPinPluginTraining,aPinValue);
-	
-	CActiveScheduler::Install(iActSchd);
-	//Connect to the AuthServer	
-	AuthServer::RAuthMgrClient authMgrClient1;	
-	TInt connectVal = authMgrClient1.Connect();
-	if (KErrNotFound == connectVal)
-		{
-		//Retry after a delay
-		TTimeIntervalMicroSeconds32 timeInterval = 2000;	//2 Milliseconds
-		User::After(timeInterval);
-		connectVal = authMgrClient1.Connect();
-		}
-	if (KErrNone != connectVal)
-		{
-		ERR_PRINTF2(_L("Unable to start a session or other connection error. Err = %d"), connectVal);
-		RemovePinPluginFileL();
-		User::LeaveIfError(connectVal);
-		}	
-	CleanupClosePushL(authMgrClient1);
-
-	//Examine the authserver and see what's there
-	ListPluginsL(authMgrClient1);
-	
-	TBool statusAll = EFalse;
-	statusAll = CheckPluginStatusAllL(authMgrClient1);
-	
-	//Check the username of the second identity and then attempt to set it.
-//	SetTestStepResult(checkAndSetUserNameL(authMgrClient1, 0));	
-	
-	// Get the identity string (if defined)
-	TPtrC identityString;
-	if (!GetStringFromConfig(ConfigSection(), _L("IdentityString"), identityString))
-		{
-		identityString.Set(_L("SOMENAME"));
-		}
-	
-	//Register an identity using an active object
-	CIdentity* identity1 = 0;
-    CRegActive* active = new (ELeave) CRegActive(authMgrClient1, identityString.AllocL(), identity1); // Ownership transferred
-    active->doReg();
-	CActiveScheduler::Start();
-	TInt err = active->iErr;
-	delete active;
-
-	SetTestStepError(err);
-
-	if(KErrAuthServPluginQuit == err)
-		{
-		INFO_PRINTF1(_L("Training was Quit."));
-		INFO_PRINTF1(_L("User entered the Quit code as trainingInput."));		
-		}
-	else if (KErrAuthServPluginCancelled == err)
-		{
-		INFO_PRINTF1(_L("Training was cancelled."));
-		INFO_PRINTF1(_L("User entered trainingInput same as identifyingInput or an existing PIN."));
-		INFO_PRINTF1(_L("Or the Cancel code."));		
-		}
-    else if ((identity1 == 0) && (KErrAuthServPluginQuit != err))
-        {
-        ERR_PRINTF1(_L("An unexpected error occurred during the registration process."));
-        SetTestStepResult(EFail);
-        }
-    else
-  		{
-  		if (0 != identity1)
-  			{
-  			INFO_PRINTF3(_L("Id = %x , KeyLength = %d\n"), identity1->Id(), identity1->Key().KeyData().Size());
-  			}	
-		//Get a list of all the present identities
-		RIdentityIdArray ids;
-		authMgrClient1.IdentitiesL(ids);
-		CleanupClosePushL(ids);
-		TInt actualNumIds = ids.Count();
-				
-		//If specified in the ini file, check the number of identities now present
-		TInt numIdsValue = 0;
-		if (GetIntFromConfig(ConfigSection(),_L("NumIdentities"), numIdsValue) != EFalse) // the tag 'numIds' was present
-			{
-			if (actualNumIds != numIdsValue)
-				{
-				ERR_PRINTF3(_L("Error. ActualNumIds = %d, numIdsExpected = %d"), actualNumIds, numIdsValue);
-				SetTestStepResult(EFail);
-				}				
-			}
-		//List the present identities by their strings
-		for (TInt i = 0; i < actualNumIds; i++)
-			{
-			HBufC* idName = 0;			
-			idName = authMgrClient1.IdentityStringL(ids[i]);
-			INFO_PRINTF3(_L("Id %d has the name %S"), i, idName);
-			delete idName; 
-			}		
-		CleanupStack::PopAndDestroy(&ids);
-		delete identity1;				
-	
-  		}//End check for when identity1 == 0, i.e 'RegisterIdentity() fails
-
-	//Examine the authserver and see what's there
-	ListPluginsL(authMgrClient1);
-	
-	statusAll = CheckPluginStatusAllL(authMgrClient1);
-	if (!statusAll)
-		{
-		SetTestStepResult(EFail);
-		}
-	CleanupStack::PopAndDestroy(&authMgrClient1);	// authClient1	
-	
-	RemovePinPluginFileL();
-	
-	//Garbage collect the last previously destroyed implementation 
-	// and close the REComSession if no longer in use
-	REComSession::FinalClose(); 	
-__UHEAP_MARKEND;
-	return TestStepResult();	
-	}
-
-void CTRegIdentity::ListPluginsL(AuthServer::RAuthMgrClient& aAuthMgrClient )
-	{
-	RPluginDescriptions pluginList1;
-	TCleanupItem cleanup(CleanupEComArray, &pluginList1);
-	CleanupStack::PushL(cleanup);					
-	aAuthMgrClient.PluginsL(pluginList1);	
-	TInt numTotalPlugins = pluginList1.Count();
-	TInt i;
-	for(i = 0; i < numTotalPlugins; i++)
-		{
-		TInt presentPluginIdVal = pluginList1[i]->Id();
-		TInt presentPluginStatus = pluginList1[i]->TrainingStatus();
-		INFO_PRINTF3(_L("PluginId=%x,status =%i"), presentPluginIdVal,presentPluginStatus);
-		}
-	CleanupStack::PopAndDestroy(&pluginList1); //infoArray, results in a call to CleanupEComArray	
-	
-	}
-
-void CTRegIdentity::SetPinPluginStateL()
-	{
-	TPtrC activeStateFromFile;
-	
-	_LIT(KPinPlugin,"pinplugin_inactive.txt");
-	
-	TFileName filename;
-	filename.Copy(KPinPlugin); // convert from 8 -> 16 bit descriptor
-		
-	TDriveUnit sysDrive = RFs::GetSystemDrive();
-	TDriveName sysDriveName (sysDrive.Name());
-	filename.Insert(0,sysDriveName);
-	filename.Insert(2,_L("\\"));		
-	
-	RFileWriteStream stream;
-	RFs fs;
-	CleanupClosePushL(fs);
-	User::LeaveIfError(fs.Connect());
-	fs.Delete(filename);
-		
-	if (GetStringFromConfig(ConfigSection(),_L("Pin200032E5Active"), activeStateFromFile)) 
-		{
-		if(activeStateFromFile == _L("false"))
-			{		
-			User::LeaveIfError(stream.Create(fs, filename, EFileWrite | EFileShareExclusive));
-			stream.Close();
-			}
-		}
-	CleanupStack::PopAndDestroy(); // fs
-	}
-
-void CTRegIdentity::RemovePinPluginFileL()
-	{
-	TPtrC activeStateFromFile;
-	_LIT(KPinPlugin,"pinplugin_inactive.txt");
-	TFileName filename;
-	filename.Copy(KPinPlugin); // convert from 8 -> 16 bit descriptor
-			
-	TDriveUnit sysDrive = RFs::GetSystemDrive();
-	TDriveName sysDriveName (sysDrive.Name());
-	filename.Insert(0,sysDriveName);
-	filename.Insert(2,_L("\\"));
-		
-	RFs fs;
-	CleanupClosePushL(fs);
-	User::LeaveIfError(fs.Connect());
-	fs.Delete(filename);
-	CleanupStack::PopAndDestroy(); // fs
-	}
-
-TVerdict CTRegIdentity::doTestStepPostambleL()
-/**
-  @return - TVerdict code
-  Override of base class virtual
- */
-	{
-	//Call the parent postamble, releasing the file handle, etc
-	CTStepActSch::doTestStepPostambleL();
-	return TestStepResult();
-	}
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/step_authenticate.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,681 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CTestStep derived implementation
-*
-*/
-
- 
-#include "tAuthSvrStep.h"
-
-#include "authserver/authclient.h"
-#include "authserver/authmgrclient.h"
-#include "authrepository.h"
-#include "testutilclient.h"
-
-using namespace AuthServer;
-
-
-class CAuthActive2 : public CActive
-    {
-    public:
-    CAuthActive2(RAuthMgrClient& aClient, CAuthExpression* aExpression,
-				 TInt aFresh, TBool aClientSpecific, TBool aAuthViaAlias, const TDesC& aClientMessage, TBool aStop = ETrue) : 
-         CActive(EPriorityNormal),
-         iClient(aClient),
-		 iResult(EFail),
-         iRunCount(0),
-         iAe(aExpression),
-         iStop(aStop),
-         iFresh(aFresh),
-         iIdToStore(0), 
-         iClientSpecific(aClientSpecific),
-         iAuthViaAlias(aAuthViaAlias),
-         iClientMessage(aClientMessage)
-        {
-        CActiveScheduler::Add(this);
-        }
-    
-   void doAuth() 
-        {
-        SetActive();		
-		TRequestStatus* status = &iStatus;
-		User::RequestComplete(status, KErrNone);
-		iRunCount = 0;
-        }
-	void DoCancel() 
-        {
-        }
-        
-    TInt RunError(TInt aError)
-    	{
-    	iErr = aError;
-	   	CActiveScheduler::Stop();
-    	return KErrNone;
-    	}
-    	
-    void RunL() 
-        {
-        iErr = iStatus.Int();
-       
-		switch (iRunCount)
-		  {
-		  case 0:
-		  	{
-		  	iId = 0;
-			TUid clientSid = {0};
-			iClient.AuthenticateL(*iAe, iFresh, iClientSpecific, clientSid, EFalse, iClientMessage, iId, iStatus);
-		
-			SetActive();
-
-			break;
-		  	}
-            
-		  case 1:
-			if (0 != iId)
-				{
-				iIdToStore = iId->Id();
-				delete iId;
-				iId = NULL;
-				}
-			
-			iResult = iStatus == KErrNone ? EPass : EFail;
-            iErr = iStatus.Int();
-			if (iStop)
-                {
-                CActiveScheduler::Stop();
-                }
-
-			break;
-			
-     	  default:
-			iResult = EFail;
-			
-			if (iStop)
-			    {
-			    CActiveScheduler::Stop();
-			    }
-		    }
-		  ++iRunCount;
-          }
-
-	~CAuthActive2()
-		{
-		if(iId != NULL)
-			delete iId;
-		}
-          
-   		
-	RAuthMgrClient& iClient;
-	TVerdict iResult;
-	TInt iRunCount;
-	CAuthExpression* iAe;
-	CIdentity* iId;
-    TBool iStop;
-    TInt iErr;
-    TInt iFresh;
-    TIdentityId iIdToStore;
-    TBool iClientSpecific;
-    TBool iAuthViaAlias;
-    const TDesC& iClientMessage;
-    };
-    
-//====================================================================================================    
-CTAuthenticate::CTAuthenticate(CTAuthSvrServer& aParent): iParent(aParent)
-/**
-  Constructor
- */
-	{
-	// Call base class method to set up the human readable name for logging
-	SetTestStepName(KTAuthenticate);
-	}
-
-CTAuthenticate::~CTAuthenticate()
-/**
-  Destructor
- */
-	{}
-	
-TVerdict CTAuthenticate::doTestStepPreambleL()
-/**
-  @return - TVerdict code
-  Override of base class virtual
- */
-	{
-	//Call the parent class preamble, setting up the file server, etc
-	CTStepActSch::doTestStepPreambleL();
-
-	return TestStepResult();
-	}
-
-TVerdict CTAuthenticate::doTestStepL()
-/**
-  @return - TVerdict code
-  Override of base class pure virtual
-  
- */
-	{	
-	SetTestStepResult(EFail);
-
-__UHEAP_MARK;		// Check for memory leaks
-	 	
-	//-----------------------------------------------------------------------------------------------------
-	TPtrC displayMessage;
-	TBool messageSent = (GetStringFromConfig(ConfigSection(),_L("DisplayMessage"), displayMessage) != EFalse);
-	TBuf<100> message(displayMessage);
-	ClientMessage(messageSent, displayMessage);
-	if(!messageSent)
-		{
-		message = KNullDesC();
-		}
-	InitAuthServerFromFileL();	// Set things like 'iSupportsDefaultData' and 'DefaultPlugin'
-	
-	// this method creates the dat file from where the test implementation
-	// of pin plugin notifier reads user input.
-	// as the pin plugin fails without this data it has been included 
-	// in the code as a default step for initializing the pin plugin
-	// data.
-	// the pin value generate through the reference plugin is a random 
-	// value which should be retrieved from the output file and given 
-	// as an input back for creation of the input file again.
-	// If the ini file specified a pin use that instead
-	TPtrC pin;
-	if (GetStringFromConfig(ConfigSection(),_L("pinvalue"), pin))
-		{
-		TPinValue pinValue;
-		pinValue.Copy(pin);
-		//pinValue.
-		CreatePinPluginInputFileL(EPinPluginIdentify, pinValue);
-		}
-	else
-		{
-		TPinValue pinValue = GetPinFromOutputFileL();
-		CreatePinPluginInputFileL(EPinPluginIdentify, pinValue);
-		}
-
-	CActiveScheduler::Install(iActSchd);
-	//Connect to the AuthServer	
-	AuthServer::RAuthMgrClient authMgrClient1;	
-	TInt connectVal = authMgrClient1.Connect();
-	if (KErrNotFound == connectVal)
-		{
-		//Retry after a delay
-		TTimeIntervalMicroSeconds32 timeInterval = 2000;	//2 Milliseconds
-		User::After(timeInterval);
-		connectVal = authMgrClient1.Connect();
-		}
-	if (KErrNone != connectVal)
-		{
-		ERR_PRINTF2(_L("Unable to start a session or other connection error. Err = %d"), connectVal);
-		User::LeaveIfError(connectVal);		
-		}	
-	
-	CleanupClosePushL(authMgrClient1);
-
-	//-----------------------------------------------------------------------------------------------------
-	// Authenticate by reading the user input
-	
-	//Check that alias or pluginId is quoted in the ini file
-	TPtrC exprString;
-	TBool authViaAlias = GetStringFromConfig(ConfigSection(),_L("alias"), exprString);
-	TBool authViaExpr = EFalse;
-	if(!authViaAlias)
-		{
-		authViaExpr = GetStringFromConfig(ConfigSection(),_L("plugin1Id"), exprString);
-		}
-	
-	if(	! authViaAlias && ! authViaExpr)
-		{
-		INFO_PRINTF1(_L("Neither plugin1Id nor alias was specified in the ini file"));	
-		}
-	else
-		{
-	  	TInt freshnessVal = 0;	//Default value
-	 	//Retrieve the value of 'freshness' from the ini file, but if it's absent use the default value
-	 	if(GetIntFromConfig(ConfigSection(),_L("freshness"), freshnessVal) == EFalse)
-	 		{
-	 		freshnessVal = 10;
-	 		}
-	 		
-	 	TBool clientSpecificKeyVal = EFalse;	 	
-	 	//Retrieve the value of 'clientSpecificKey' from the ini file, but if it's absent use the default value
-	 	if(GetBoolFromConfig(ConfigSection(),_L("clientSpecificKey"), clientSpecificKeyVal) == EFalse)
-	 		{
-	 		clientSpecificKeyVal = EFalse;
-	 		}
-	 	
-	 	TBool defaultpluginusage = EFalse;
-	 	if(GetBoolFromConfig(ConfigSection(),_L("defaultpluginusage"), defaultpluginusage ) == EFalse)
-	 		 {
-	 		defaultpluginusage  = EFalse;
-	 		 }
-	 		
-	 	TBool isSynchronous = EFalse;
-	 	//Retrieve the value of 'synchronous' from the ini file, but if it's absent use the default value
-	 	if(GetBoolFromConfig(ConfigSection(),_L("synchronous"), isSynchronous) != EFalse)
-	 		{
-	 		CallSyncAuthenticateL(authMgrClient1, exprString, freshnessVal, clientSpecificKeyVal, authViaAlias, defaultpluginusage, message);
-	 		}
-	 	else
-	 		{
-	 		CallAsyncAuthenticateL(authMgrClient1, exprString, freshnessVal, clientSpecificKeyVal, authViaAlias, defaultpluginusage, message);
-	 		}
-
-	  	}
-
-	CleanupStack::PopAndDestroy(&authMgrClient1);	// authClient1	
-	//Garbage collect the last previously destroyed implementation 
-	// and close the REComSession if no longer in use
-	REComSession::FinalClose(); 
-__UHEAP_MARKEND;
-	return TestStepResult();
-	}
-
-
-TVerdict CTAuthenticate::doTestStepPostambleL()
-/**
-  @return - TVerdict code
-  Override of base class virtual
- */
-	{
-	//Call the parent postamble, releasing the file handle, etc
-	CTStepActSch::doTestStepPostambleL();
-	return TestStepResult();
-	}
-
-
-void CTAuthenticate::setLastAuthIdL(AuthServer::TIdentityId idToStore)
-/**
-  Utility function that stores the most recently authenticated identity in the GlobalDb file
-  This should only be called by the Authenticate test step  class
- */
-	{	
-	TBuf<100> bufToWrite;
-	_LIT16(KFormatLastAuth,"%u");
-	
-	bufToWrite.Format(KFormatLastAuth, idToStore); //generates:
-	
-	TDriveUnit sysDrive (RFs::GetSystemDrive());
-	TBuf<128> authSvrPolicyFile (sysDrive.Name());
-	authSvrPolicyFile.Append(KAuthSvrPolicyFile);
-
-	CIniData* policyFile=NULL;
-	TRAP_IGNORE(policyFile=CIniData::NewL(authSvrPolicyFile));
-	CleanupStack::PushL(policyFile);
-
-	TInt ret = writeToNamedConfig(policyFile, KLastAuthIdTag, bufToWrite);
-
-	policyFile->WriteToFileL();
-	CleanupStack::PopAndDestroy(policyFile);
-
-	if (KErrNotFound == ret)
-		{
-		ERR_PRINTF3(_L("Error while setting last AuthId. Tag %S not found in %S file"), KLastAuthIdTag, &authSvrPolicyFile);
-		}
-	else
-		{
-		INFO_PRINTF2(_L("Setting last AuthId was successful. Id = %S"), &bufToWrite);
-		}
-	}
-	
-void CTAuthenticate::CallSyncAuthenticateL(RAuthMgrClient& aAuthMgrClient, const TDesC& aInputString, TInt aFreshness, TBool aClientSpecificKey, TBool aIsAlias, TBool aIsDefault, const TDesC& aClientMessage )
-	{
-	CIdentity* id = 0;
-	TInt error;
-	TUid val = TUid::Uid(0);
-	
-	CAuthExpression* expr = NULL;
-	
-	if(!aIsAlias)
-		{
-		if(!aIsDefault)
-			{
-			CAuthExpression* expr = CreateAuthExprLC(aInputString);			
-			TRAP(error, id = aAuthMgrClient.AuthenticateL(*expr, aFreshness, aClientSpecificKey, val, EFalse, aClientMessage));
-			CleanupStack::PopAndDestroy(expr);
-			}
-		else
-			{
-			CAuthExpression* expr = CreateAuthExprLC(KNullDesC());			
-			TRAP(error, id = aAuthMgrClient.AuthenticateL(*expr, aFreshness, aClientSpecificKey, val, EFalse, aClientMessage));
-			CleanupStack::PopAndDestroy(expr);
-			}
-		}
-	
-	else
-		{
-		TRAPD(err,expr = aAuthMgrClient.CreateAuthExpressionL(aInputString));
-			if(err != KErrNone)
-				{
-				SetTestStepError(err);
-				return;
-				}
-				
-		CleanupStack::PushL(expr);
-		TUid clientSid = {0};
-		TRAP(error, id = aAuthMgrClient.AuthenticateL(*expr, aFreshness, aClientSpecificKey, clientSid, EFalse, KNullDesC));
-		CleanupStack::PopAndDestroy(expr);
-		}
-		
-	if(error != KErrNone)
-	 	{
-	 	ERR_PRINTF2(_L("Authentication Result error = %d"), error);	
-	 	SetTestStepError(error);
-	 	return;	
-		}
-	 	
-	//Main check
-	if (0 == id->Id())
-		{
-		ERR_PRINTF1(_L("Authentication failed. No identity returned"));
-		delete id;
-		}
-	
-	else
-		{
-		INFO_PRINTF1(_L("Authentication successful."));
-		CleanupStack::PushL(id);
-		//Store the id in the Global Db file		
-		setLastAuthIdL(id->Id());
-		CleanupStack::PopAndDestroy(id);
-		SetTestStepResult(EPass);
-		}
-	}
-	
-void CTAuthenticate::CallAsyncAuthenticateL(RAuthMgrClient& aAuthMgrClient, TDesC& aInputString, TInt aFreshness, TBool aClientSpecificKey, TBool aIsAlias, TBool aIsDefault, const TDesC& aClientMessage)
-	{
-	CAuthExpression* expr = 0;
-	if(!aIsAlias)
-		{
-		if(!aIsDefault)
-			{	
-			expr = CreateAuthExprLC(aInputString);
-			}
-		else
-			{
-			expr = CreateAuthExprLC(KNullDesC());
-			}
-		}
-	else
-		{
-		TRAPD(err,expr = aAuthMgrClient.CreateAuthExpressionL(aInputString));
-		if(err != KErrNone)
-			{
-			SetTestStepError(err);
-			return;
-			}
-		CleanupStack::PushL(expr);
-		}
-	
-	CAuthActive2 active1(aAuthMgrClient, expr, aFreshness, aClientSpecificKey, aIsAlias, aClientMessage);
-	active1.doAuth();		
-	CActiveScheduler::Start();
-		
-	if(expr)
-		{
-		CleanupStack::PopAndDestroy(expr);
-		}
-	
-	 		
-	if(EPass != active1.iResult)
-		{
-		ERR_PRINTF3(_L("Authentication Result error = %d, iResult = %d\n"), active1.iErr, active1.iResult);			
-		SetTestStepError(active1.iErr);
-		}
-	
-	else if ((KErrNone == active1.iErr) && (EPass == active1.iResult))
-		{
-		INFO_PRINTF1(_L("No Authentication Errors."));
-		}
-		
-	else
-		{
-		ERR_PRINTF3(_L("Unexpected Authentication Result. error = %d, iResult = %d\n"), active1.iErr, active1.iResult);
-		}
-		
-	//Main check
-	if (0 == active1.iIdToStore)
-		{
-		ERR_PRINTF1(_L("Authentication failed. No identity returned"));
-		}
-	
-	else
-		{
-		INFO_PRINTF1(_L("Authentication successful."));
-		//Store the id in the Global Db file		
-		setLastAuthIdL(active1.iIdToStore);
-		SetTestStepResult(EPass);
-		}	
-	}
-	
-//---------------------------------------------------------------------------------------------------------------------------------
-
-CTInitCenRep::CTInitCenRep(CTAuthSvrServer& aParent): iParent(aParent)
-/**
- Constructor
-*/
-	{
-	// Call base class method to set up the human readable name for logging
-	SetTestStepName(KTInitCenRep);
-	}
-
-
- CTInitCenRep::~CTInitCenRep()
-/**
- Destructor
-*/
-	{}
- 	
-TVerdict CTInitCenRep::doTestStepPreambleL()
-/**
- @return - TVerdict code
- Override of base class virtual
-*/
-	{
-	//Call the parent class preamble, setting up the file server, etc
-	CTStepActSch::doTestStepPreambleL();
-	return TestStepResult();
-	}
-
-TVerdict CTInitCenRep::doTestStepL()
-/**
- @return - TVerdict code
- Override of base class pure virtual
-  
- */
-	{	
-
- __UHEAP_MARK;		// Check for memory leaks
-
-	//Initialize the repository
-	CRepository* repository = CRepository::NewL(KUidAuthServerRepository);
-	CleanupStack::PushL(repository);
-	
-	//If default plugin is specified, set it
-	TPtrC defaultPluginFromFile;
-	if(GetStringFromConfig(ConfigSection(),_L("default"), defaultPluginFromFile) != EFalse)
-		{
-		TLex pluginIdString = TLex(defaultPluginFromFile);
-		TPluginId defaultPluginId(0);
-		
-		pluginIdString.Val(defaultPluginId, EHex );
-		SetDefaultPluginIdL(defaultPluginId);
-	 		
-		//Retrieve the value
-		TInt value(0);
-		User::LeaveIfError(repository->Get(KAuthDefaultPlugin, value));
-		CleanupStack::PopAndDestroy(repository);
-		SetTestStepResult(EPass);
-		return TestStepResult();
-		}
-	TInt aliasCount = 0;
-	
-	// Retrieve the value of 'aliasCount' from the ini file, but if it's absent use the default value.
-	// This value is used for validation of cenrep file.
-	if(GetIntFromConfig(ConfigSection(),_L("aliasCount"), aliasCount) != EFalse)
-		{
-		User::LeaveIfError(repository->Set(EAuthAliasesCount, aliasCount));
-		CleanupStack::PopAndDestroy(repository);
-		SetTestStepResult(EPass);
-		return TestStepResult();
-		}
-	
-	User::LeaveIfError(repository->Get(EAuthAliasesCount, aliasCount));
-	// since we will only have four aliases in the cenrep file.
-	__ASSERT_DEBUG(aliasCount == 4, User::Leave(KErrArgument));
-	
-	// Retrieve the value of 'unicode' from the ini file, but if it's absent use the default value.
-	// For unicode tests we need to set the aliases in addition to thier corresponding alias string.
-	TBool isUnicode = EFalse;
-	if(GetBoolFromConfig(ConfigSection(),_L("unicode"), isUnicode) != EFalse)
-		{
-		TBuf<24> alias;
-		TPtrC aliasValue;
-	
-		for(TInt i = 0; i < aliasCount; ++i)
-			{
-			alias.Format(_L("alias%d"), i);
-			if (GetStringFromConfig(ConfigSection(), alias, aliasValue) != EFalse)
-				{
-				User::LeaveIfError(repository->Set(EAuthAliases+i, aliasValue));
-				}
-			}
-		}
-	
-	// for each alias ,set the corresponding alias string expression.
-	TBuf<24> aliasString;
-	TPtrC aliasStringValue;
-	
-	for(TInt i = 0; i < aliasCount; ++i)
-		{
-		aliasString.Format(_L("aliasString%d"), i);
-		if (GetStringFromConfig(ConfigSection(), aliasString, aliasStringValue) != EFalse)
-			{
-			User::LeaveIfError(repository->Set(EAuthAliasesExpr+i, aliasStringValue));
-			}
-		}
-	
-	CleanupStack::PopAndDestroy(repository);
-	SetTestStepResult(EPass);
-	
-__UHEAP_MARKEND;
-	return TestStepResult();
-	}
-	
-TVerdict CTInitCenRep::doTestStepPostambleL()
-/**
-  @return - TVerdict code
-  Override of base class virtual
- */
-	{
- 	//Call the parent postamble, releasing the file handle, etc
- 	CTStepActSch::doTestStepPostambleL();
-	return TestStepResult();
-	}
-
-//====================================================================================================
-
-CTSysTimeUpdate::CTSysTimeUpdate(CTAuthSvrServer& aParent): iParent(aParent)
-/**
-  Constructor
- */
-	{
-	// Call base class method to set up the human readable name for logging
-	SetTestStepName(KTUpdateSysTime);
-	}
-
-
-CTSysTimeUpdate::~CTSysTimeUpdate()
-/**
-  Destructor
- */
-	{}
-	
-TVerdict CTSysTimeUpdate::doTestStepPreambleL()
-/**
-  @return - TVerdict code
-  Override of base class virtual
- */
-	{
-	//Call the parent class preamble, setting up the file server, etc
-	CTStepActSch::doTestStepPreambleL();
-
-	return TestStepResult();
-	}
-
-TVerdict CTSysTimeUpdate::doTestStepL()
-/**
-  @return - TVerdict code
-  Override of base class pure virtual
-  
- */
-	{	
-	SetTestStepResult(EFail);
-
-__UHEAP_MARK;		// Check for memory leaks
-	
-	//Get the "time" which must be added to the system time.
-	TInt timeVal(0);
-	GetIntFromConfig(ConfigSection(), _L("time"), timeVal);
-
-	TTime currentTime;
-	currentTime.UniversalTime();
-	
-	if(timeVal == 0 )
-		{
-		//Set the secure clock time.
-		RTestUtilSession session;
-		session.Connect();
-		CleanupClosePushL(session);
-		TInt ret = session.SetSecureClock(0);
-		INFO_PRINTF2(_L("Set the secure clock --- %d"), ret);
-		CleanupStack::PopAndDestroy(&session);
-		}
-	else
-		{
-		//Increment the time only if secure clock is present
-		TInt err = currentTime.UniversalTimeSecure();
-		INFO_PRINTF2(_L("Getting the secure clock time returned %d"), err );
-		if(!err)
-			{
-			INFO_PRINTF1(_L("Secure clock found !"));
-			TTimeIntervalSeconds increment(timeVal);
-			currentTime += increment;
-			User::LeaveIfError(User::SetUTCTime(currentTime));
-			}
-		else
-			{
-			INFO_PRINTF1(_L("Secure clock not found !"));
-			}
-	
-		}
-
-
-	SetTestStepResult(EPass);
-
-__UHEAP_MARKEND;
-	return TestStepResult();
-	}
-
-
-TVerdict CTSysTimeUpdate::doTestStepPostambleL()
-/**
-  @return - TVerdict code
-  Override of base class virtual
- */
-	{
-	//Call the parent postamble, releasing the file handle, etc
-	CTStepActSch::doTestStepPostambleL();
-	return TestStepResult();
-	}
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/step_base.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,1398 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CTestStep derived implementation
-*
-*/
-
-
-#include "tAuthSvrStep.h"
-#include <test/testexecutelog.h>
-
-#ifndef __INIPARSER_H__
-	#include <cinidata.h>
-#endif // __INIPARSER_H__
-
-#include <s32file.h>
-#include <f32file.h>
-#include "authrepository.h"
-using namespace AuthServer;
-
-CTAuthSvrStepBase::CTAuthSvrStepBase()
-	{
-	}
-
-TInt CTAuthSvrStepBase::writeToNamedConfig(CIniData* aFile, const TDesC& aSectName,const TDesC& aKeyName,const TPtrC& aResult)
-	{
-	TInt retValue = KErrNone;
-	// Look for a key under a named section, retrieve text value	
-		
-	TInt ret = KErrNone;	//return value from FindVar functions
-	ret=aFile->SetValue(aSectName, aKeyName ,aResult);
-	if(ret != KErrNone)
-		{			
-		if(ret == KErrNotFound)
-			{
-			RDebug::Print(_L("Key not found. Unable to set value in ini file.  SectionName = %S, KeyName = %S, value = %S."),  &aSectName, &aKeyName, &aResult);
-			}
-		else
-			{
-			RDebug::Print(_L("Unable to set value in ini file. SectionName = %S, KeyName = %S, value = %S."), &aSectName, &aKeyName, &aResult);
-			}							
-		retValue = ret;
-		}
-	return retValue;	
-	}
-
-TInt CTAuthSvrStepBase::writeToNamedConfig(CIniData* aFile, const TDesC& aKeyName,const TPtrC& aResult)
-	{
-	
-	TInt retValue = KErrNone;
-	// Look for a key under no named section, retrieve text value	
-	
-	TInt ret = KErrNone;	//return value from FindVar functions
-	ret=aFile->SetValue(aKeyName ,aResult);
-	if(ret != KErrNone)
-		{
-		if(ret == KErrNotFound)
-			{
-			RDebug::Print(_L("Key not found. Unable to set value in ini file. KeyName = %S, value = %S."), &aKeyName, &aResult);
-			}			
-		else
-			{
-			RDebug::Print(_L("Unable to set value in ini file. KeyName = %S, value = %S."), &aKeyName, &aResult);
-			}
-		retValue = ret;
-		}
-	return retValue;	
-	}
-	
-TInt CTAuthSvrStepBase::readFromNamedConfigL(const TDesC& aFileName, const TDesC& aSectName,const TDesC& aKeyName, HBufC*& aResult)
-	{
-	TInt retValue = KErrNone;	
-	CIniData* file;
-	file = CIniData::NewL(aFileName);	
-	CleanupStack::PushL(file);
-	
-	// Look for a key under a named section, retrieve text value	
-	TBool ret=EFalse;	//return value from FindVar functions	
-	TPtrC resultPtr;
-	
-	ret=file->FindVar(aSectName, aKeyName ,resultPtr);	
-	if(ret == EFalse)
-		{		
-		RDebug::Print(_L("Unable to read value in ini file. Filename: %S, SectionName = %S, value = %S."), &aFileName, &aSectName, &aResult);
-		retValue = ret;
-		}
-	else
-		{
-		aResult = resultPtr.AllocL();
-		CleanupStack::PushL(aResult);
-		file->WriteToFileL(); //apply the implementation
-		CleanupStack::Pop(aResult);
-		}
-	CleanupStack::PopAndDestroy(file);
-
-	return retValue;
-	
-	}
-	
-TInt CTAuthSvrStepBase::readFromNamedConfigL(const TDesC& aFileName,const TDesC& aKeyName, HBufC*& aResult)
-	{
-	TInt retValue = KErrNone;	
-	CIniData* file=NULL;
-	file = CIniData::NewL(aFileName);	
-	CleanupStack::PushL(file);
-
-	TBool ret=EFalse;	//return value from FindVar functions
-	
-	TPtrC resultPtr;
-	ret=file->FindVar(aKeyName, resultPtr);
-	if(ret == EFalse)
-		{
-	    RDebug::Print(_L("Unable to read value in ini file. Filename: %S, SectionName = %S, value = %S."), &aFileName, &aKeyName, &aResult);
-		retValue = ret;
-		}
-	else
-		{			
-		aResult = resultPtr.AllocL();
-		CleanupStack::PushL(aResult);
-		file->WriteToFileL(); //apply the implementation
-		CleanupStack::Pop(aResult);
-		}	
-	CleanupStack::PopAndDestroy(file);
-
-	return retValue;
-	}
-
-
-
-void CTAuthSvrStepBase::SetDefaultPluginIdL(TInt aDefault)
-	{
-	//Read the default plugin value from the configuration file.
-	CRepository* repository = CRepository::NewL(KUidAuthServerRepository);
-	CleanupStack::PushL(repository);
-		
-	User::LeaveIfError(repository->Set(KAuthDefaultPlugin, aDefault));
-	
-	//Retrieve from file
-	TInt defaultPlugin(0);
-	User::LeaveIfError(repository->Get(KAuthDefaultPlugin, defaultPlugin));
-	INFO_PRINTF2(_L("Default plugin value set in cenrep to %d"),defaultPlugin);
-	
-	CleanupStack::PopAndDestroy(repository);
-		
-	}	
-/**
- Read data from testexecute ini file that will be used to initialise the Authentication Server
-*/
-TInt CTAuthSvrStepBase::InitAuthServerFromFileL()
-	{
-
-	//Set a default plugin using an ini file. Read this value from a file if it is specified	
-	//Set this to be the default plugin (update the policy file) if the test case specifies it (in the script's ini file).
-	
-	TPtrC defaultPluginFromFile;
-	
-	TDriveUnit sysDrive (RFs::GetSystemDrive());
-	TDriveName sysDriveName (sysDrive.Name());
-	TBuf<128> fileName (sysDriveName);
-	fileName.Append(KAuthSvrPolicyFile);
-
-	CIniData* policyFile=NULL;
-	TRAPD(r,policyFile=CIniData::NewL(fileName));
-	CleanupStack::PushL(policyFile);
-
-	fileName.Copy(sysDriveName);
-	fileName.Append(KPluginIniFile);
-	
-	CIniData* pluginFile=NULL;
-	TRAP(r,pluginFile=CIniData::NewL(fileName));
-	CleanupStack::PushL(pluginFile);
-
-	fileName.Copy(sysDriveName);
-	fileName.Append(KPlugin3100File);
-	
-	CIniData* p3100File=NULL;
-	TRAP(r,p3100File=CIniData::NewL(fileName));
-	CleanupStack::PushL(p3100File);
-
-	fileName.Copy(sysDriveName);
-	fileName.Append(KPlugin3101File);
-	
-	CIniData* p3101File=NULL;
-	TRAP(r,p3101File=CIniData::NewL(fileName));
-	CleanupStack::PushL(p3101File);
-
-	fileName.Copy(sysDriveName);
-	fileName.Append(KPlugin3102File);
-	CIniData* p3102File=NULL;
-	TRAP(r,p3102File=CIniData::NewL(fileName));
-	CleanupStack::PushL(p3102File);
-
-	fileName.Copy(sysDriveName);
-	fileName.Append(KPlugin3103File);
-
-	CIniData* p3103File=NULL;
-	TRAP(r,p3103File=CIniData::NewL(fileName));
-	CleanupStack::PushL(p3103File);
-
-	fileName.Copy(sysDriveName);
-	fileName.Append(KPlugin3104File);
-	
-	CIniData* p3104File=NULL;
-	TRAP(r,p3104File=CIniData::NewL(fileName));
-	CleanupStack::PushL(p3104File);
-	
-	fileName.Copy(sysDriveName);
-	fileName.Append(KPlugin4100File);
-	
-	CIniData* p4100File=NULL;
-	TRAP(r,p4100File=CIniData::NewL(fileName));
-	CleanupStack::PushL(p4100File);
-	
-	if (GetStringFromConfig(ConfigSection(),_L("defaultPlugin"), defaultPluginFromFile) != EFalse) // the tag 'defaultPlugin' was present
-		{ 
-		//Write this value to the policy file
-		writeToNamedConfig(policyFile, KDefaultPluginTag, defaultPluginFromFile);
-	//	SetDefaultPluginIdL(defaultPluginFromFile);
-		}
-	TInt defaultPluginId(0);
-	if (GetIntFromConfig(ConfigSection(),_L("defaultPluginId"), defaultPluginId) != EFalse) // the tag 'defaultPlugin' was present
-		{ 
-		//Write this value to the policy file
-		//writeToNamedConfig(policyFile, KDefaultPluginTag, defaultPluginFromFile);
-		SetDefaultPluginIdL(defaultPluginId);
-		}
-	//Set whether a plugin supports default data. Read this value from a file if it is specified
-	_LIT(KTrueText,"true");
-	_LIT(KFalseText,"false");
-	
-	TBool iSupportsDefaultDataFromFile(ETrue);	//Default case - the plugin supports default data
-	
-	TBufC<16> trueBuf1(KTrueText);
-	TBufC<16> falseBuf1(KFalseText);
-	TPtr valueToWrite = trueBuf1.Des();			//Default case - the plugin supports default data
-	if (GetBoolFromConfig(ConfigSection(),_L("iSupportsDefaultData"), iSupportsDefaultDataFromFile) != EFalse) // the tag 'isTrusted' was present
-		{
-		//Set the value that will be picked up by the constructor of the plugin		
-		if (iSupportsDefaultDataFromFile)
-			{ valueToWrite = trueBuf1.Des();	}
-		else
-			{ valueToWrite = falseBuf1.Des();	}			
-		writeToNamedConfig(pluginFile, KPluginIniSection, _L("iSupportsDefaultData"), valueToWrite);	
-		writeToNamedConfig(p3100File, KPluginIniSection, _L("iSupportsDefaultData"), valueToWrite);
-		writeToNamedConfig(p3101File, KPluginIniSection, _L("iSupportsDefaultData"), valueToWrite);
-		writeToNamedConfig(p3102File, KPluginIniSection, _L("iSupportsDefaultData"), valueToWrite);
-		writeToNamedConfig(p3103File, KPluginIniSection, _L("iSupportsDefaultData"), valueToWrite);
-		writeToNamedConfig(p4100File, KPluginIniSection, _L("iSupportsDefaultData"), valueToWrite);
-		}
-	else
-		{
-		INFO_PRINTF1(_L("The iSupportsDefaultData tag was not specified in the testexecute ini file."));
-		//Use the default value of TRUE		
-		valueToWrite = trueBuf1.Des();
-		writeToNamedConfig(pluginFile, KPluginIniSection, _L("iSupportsDefaultData"), valueToWrite);
-		writeToNamedConfig(p3100File, KPluginIniSection, _L("iSupportsDefaultData"), valueToWrite);
-		writeToNamedConfig(p3101File, KPluginIniSection, _L("iSupportsDefaultData"), valueToWrite);
-		writeToNamedConfig(p3102File, KPluginIniSection, _L("iSupportsDefaultData"), valueToWrite);
-		writeToNamedConfig(p3103File, KPluginIniSection, _L("iSupportsDefaultData"), valueToWrite);
-		writeToNamedConfig(p4100File, KPluginIniSection, _L("iSupportsDefaultData"), valueToWrite);
-		}
-	
-	//Set a value for the training input that will be used by the CTPinAuthPlugin
-	//in the file AuthSvrPolicy.ini
-	TPtrC userPinInputFromFile;
-	TPtrC supportsDefaultFromFile;
-	TPtrC activeStateFromFile;
-
-	if (GetStringFromConfig(ConfigSection(),_L("Pin11113100InputId"), userPinInputFromFile) != EFalse) // the tag 'Pin11113100Input' was present
-		{ writeToNamedConfig(p3100File, KIdEnteredPinTag, userPinInputFromFile); }	
-	if (GetStringFromConfig(ConfigSection(),_L("Pin11113101InputId"), userPinInputFromFile) != EFalse) // the tag 'Pin11113101Input' was present
-		{ writeToNamedConfig(p3101File, KIdEnteredPinTag, userPinInputFromFile); }
-	if (GetStringFromConfig(ConfigSection(),_L("Pin11113102InputId"), userPinInputFromFile) != EFalse) // the tag 'Pin11113102Input' was present
-		{ writeToNamedConfig(p3102File, KIdEnteredPinTag, userPinInputFromFile); }
-	if (GetStringFromConfig(ConfigSection(),_L("Pin11113103InputId"), userPinInputFromFile) != EFalse) // the tag 'Pin11113103Input' was present
-		{ writeToNamedConfig(p3103File, KIdEnteredPinTag, userPinInputFromFile); }
-	if (GetStringFromConfig(ConfigSection(),_L("Pin11113104InputId"), userPinInputFromFile) != EFalse) // the tag 'Pin11113104Input' was present
-		{ writeToNamedConfig(p3104File, KIdEnteredPinTag, userPinInputFromFile); }
-	if (GetStringFromConfig(ConfigSection(),_L("Pin10234100InputId"), userPinInputFromFile) != EFalse) // the tag 'Pin10234100Input' was present
-		{ writeToNamedConfig(p4100File, KIdEnteredPinTag, userPinInputFromFile); }
-	
-	if (GetStringFromConfig(ConfigSection(),_L("Pin11113100InputTrain"), userPinInputFromFile) != EFalse) // the tag 'Pin11113100Input' was present
-		{ writeToNamedConfig(p3100File, KTrainEnteredPinTag, userPinInputFromFile); }	
-	if (GetStringFromConfig(ConfigSection(),_L("Pin11113101InputTrain"), userPinInputFromFile) != EFalse) // the tag 'Pin11113101Input' was present
-		{ writeToNamedConfig(p3101File, KTrainEnteredPinTag, userPinInputFromFile); }
-	if (GetStringFromConfig(ConfigSection(),_L("Pin11113102InputTrain"), userPinInputFromFile) != EFalse) // the tag 'Pin11113102Input' was present
-		{ writeToNamedConfig(p3102File, KTrainEnteredPinTag, userPinInputFromFile); }
-	if (GetStringFromConfig(ConfigSection(),_L("Pin11113103InputTrain"), userPinInputFromFile) != EFalse) // the tag 'Pin11113103Input' was present
-		{ writeToNamedConfig(p3103File, KTrainEnteredPinTag, userPinInputFromFile); }
-	if (GetStringFromConfig(ConfigSection(),_L("Pin11113104InputTrain"), userPinInputFromFile) != EFalse) // the tag 'Pin11113104Input' was present
-		{ writeToNamedConfig(p3104File, KTrainEnteredPinTag, userPinInputFromFile); }
-	if (GetStringFromConfig(ConfigSection(),_L("Pin10234100InputTrain"), userPinInputFromFile) != EFalse) // the tag 'Pin10234100Input' was present
-		{ writeToNamedConfig(p4100File, KTrainEnteredPinTag, userPinInputFromFile); }
-		
-	if (GetStringFromConfig(ConfigSection(),_L("Pin11113100Default"), supportsDefaultFromFile) != EFalse) // the tag 'Pin11113102Default' was present
-		{ writeToNamedConfig(p3100File, KSupportsDefaultTag, supportsDefaultFromFile); }	
-	if (GetStringFromConfig(ConfigSection(),_L("Pin11113101Default"), supportsDefaultFromFile) != EFalse) // the tag 'Pin11113101Default' was present
-		{ writeToNamedConfig(p3101File, KSupportsDefaultTag, supportsDefaultFromFile); }
-	if (GetStringFromConfig(ConfigSection(),_L("Pin11113102Default"), supportsDefaultFromFile) != EFalse) // the tag 'Pin11113102Default' was present
-		{ writeToNamedConfig(p3102File, KSupportsDefaultTag, supportsDefaultFromFile); }
-	if (GetStringFromConfig(ConfigSection(),_L("Pin11113104Default"), supportsDefaultFromFile) != EFalse) // the tag 'Pin11113104Default' was present
-		{ writeToNamedConfig(p3104File, KSupportsDefaultTag, supportsDefaultFromFile); }
-	if (GetStringFromConfig(ConfigSection(),_L("Pin10234100Default"), supportsDefaultFromFile) != EFalse) // the tag 'Pin10234100Default' was present
-		{ writeToNamedConfig(p4100File, KSupportsDefaultTag, supportsDefaultFromFile); }
-
-	if (GetStringFromConfig(ConfigSection(),_L("Pin11113103Default"), supportsDefaultFromFile) != EFalse) // the tag 'Pin11113103Default' was present
-		{ writeToNamedConfig(p3103File, KSupportsDefaultTag, supportsDefaultFromFile); }
-	else 
-		{ writeToNamedConfig(p3103File, KSupportsDefaultTag, falseBuf1.Des()); }	
-
-	
-	if (GetStringFromConfig(ConfigSection(),_L("Pin11113100Active"), activeStateFromFile) != EFalse) // the tag 'Pin11113100Active' was present
-		{ writeToNamedConfig(p3100File, KActiveStateTag, activeStateFromFile); }	
-	if (GetStringFromConfig(ConfigSection(),_L("Pin11113101Active"), activeStateFromFile) != EFalse) // the tag 'Pin11113101Active' was present
-		{ writeToNamedConfig(p3101File, KActiveStateTag, activeStateFromFile); }
-	if (GetStringFromConfig(ConfigSection(),_L("Pin11113102Active"), activeStateFromFile) != EFalse) // the tag 'Pin11113102Active' was present
-		{ writeToNamedConfig(p3102File, KActiveStateTag, activeStateFromFile); }	
-	if (GetStringFromConfig(ConfigSection(),_L("Pin11113104Active"), activeStateFromFile) != EFalse) // the tag 'Pin11113104Active' was present
-		{ writeToNamedConfig(p3104File, KActiveStateTag, activeStateFromFile); }	
-	if (GetStringFromConfig(ConfigSection(),_L("Pin10234100Active"), activeStateFromFile) != EFalse) // the tag 'Pin10234100Active' was present
-		{ writeToNamedConfig(p4100File, KActiveStateTag, activeStateFromFile); }	
-		
-	if (GetStringFromConfig(ConfigSection(),_L("Pin11113103Active"), activeStateFromFile) != EFalse) // the tag 'Pin11113103Active' was present
-		{ writeToNamedConfig(p3103File, KActiveStateTag, activeStateFromFile); }	
-	else 
-		{ writeToNamedConfig(p3103File, KActiveStateTag, falseBuf1.Des()); }	
-	
-	// ... Other PinPluginDb's can be added
-	//Else the data is set in the 'Defaultdata() function'
-
-	policyFile->WriteToFileL();
-	pluginFile->WriteToFileL();
-	p3100File->WriteToFileL();
-	p3101File->WriteToFileL();
-	p3102File->WriteToFileL();
-	p3103File->WriteToFileL();
-	p3104File->WriteToFileL();
-	p4100File->WriteToFileL();
-
-	CleanupStack::PopAndDestroy(8,policyFile);
-	return KErrNone;
-	}
-
-/**
- Read plugin input train data from testexecute ini file , when aInitTrainInput
- is set to true, or plugin input id when set to false.This data will be used to 
- initialise the Authentication Server.
-  
-*/	
-TInt CTAuthSvrStepBase::InitPluginDataFromFileL(TBool aInitTrainInput)
-	{
-	TDriveUnit sysDrive (RFs::GetSystemDrive());
-	TDriveName sysDriveName (sysDrive.Name());
-	TBuf<128> fileName (sysDriveName);
-	fileName.Append(KPlugin3100File);
-	
-	CIniData* p3100File = NULL;
-	TRAPD(r,p3100File = CIniData::NewL(fileName));
-	if(r != KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &fileName);
-		return r;
-		}
-		
-	CleanupStack::PushL(p3100File);
-	
-	TPtrC userPinInputFromFile;
-	
-	if(aInitTrainInput)
-		{
-		if (GetStringFromConfig(ConfigSection(),_L("PinInputTrain"), userPinInputFromFile) != EFalse) // the tag 'Pin11113100Input' was present
-			{ writeToNamedConfig(p3100File, KTrainEnteredPinTag, userPinInputFromFile); }
-	
-		}
-		
-	else
-		{
-		if (GetStringFromConfig(ConfigSection(),_L("PinInputRetrain"), userPinInputFromFile) != EFalse) // the tag 'Pin11113100Input' was present
-			{ writeToNamedConfig(p3100File, KIdEnteredPinTag, userPinInputFromFile); }
-		
-		}
-		
-	p3100File->WriteToFileL();
-	CleanupStack::PopAndDestroy(p3100File);
-	return KErrNone;
-	}
-
-/**
- Wait for the server to shut down and so release the authentication database.
-*/
-void CTAuthSvrStepBase::WaitForServerToReleaseDb()
-	{
-	TFullName name;
-	for (;;)
-		{
-		TFindServer find(::KAuthServerName);
-		if (find.Next(name) != KErrNone)
-			{
-			break;
-			}
-
-		// Wait for server to terminate
-		User::After(1 * 1000 * 1000);
-		}
-	}
-	
-/**
- 	Remove any existing database file.
-*/
-void CTAuthSvrStepBase::RemoveExistingDbL()
-	{
-	WaitForServerToReleaseDb();
-
-	TInt r = KErrNone;
-	
-	TBuf<80> dbName(AuthServer::KDbName);
-	dbName[0] = 'A' + static_cast<TInt>(RFs::GetSystemDrive());				
-	while ((r = iFs.Delete(dbName)) == KErrInUse)
-		{
-		User::After(50000);
-		}
-	if ((KErrPathNotFound == r) || (KErrNotFound == r))  //-12 or -1
-		{
-		INFO_PRINTF1(_L("The database file was absent when I tried to delete it. \
-			Ignoring..."));
-		r = KErrNone;	//Not Important
-		}
-		User::LeaveIfError(r);
-
-	
-		
-	TBuf<80> pinDbName(_L("!:\\private\\102740FC\\plugin.store"));
-	pinDbName[0] = 'A' + static_cast<TInt>(RFs::GetSystemDrive());				
-	while ((r = iFs.Delete(pinDbName)) == KErrInUse)
-		{
-		User::After(50000);
-		}
-	
-	if ((KErrPathNotFound == r) || (KErrNotFound == r))  //-12 or -1
-		{
-		INFO_PRINTF1(_L("The pin plugin database file was absent when I tried to delete it. \
-					Ignoring..."));
-		r = KErrNone;	//Not Important
-		}
-	User::LeaveIfError(r);
-			
-	TBuf<80> pinDbName1(_L("!:\\t_pinplugindlg_in.dat"));
-	pinDbName1[0] = 'A' + static_cast<TInt>(RFs::GetSystemDrive());				
-	while ((r = iFs.Delete(pinDbName1)) == KErrInUse)
-		{
-	User::After(50000);
-		}
-			
-	if ((KErrPathNotFound == r) || (KErrNotFound == r))  //-12 or -1
-		{
-		INFO_PRINTF1(_L("The pin plugin database file (t_pinplugindlg_in.dat)was absent when I tried to delete it. \
-						Ignoring..."));
-		r = KErrNone;	//Not Important
-	}
-	User::LeaveIfError(r);
-		
-			
-	TBuf<80> pinDbName2(_L("!:\\t_pinplugindlg_out.dat"));
-	pinDbName2[0] = 'A' + static_cast<TInt>(RFs::GetSystemDrive());				
-	while ((r = iFs.Delete(pinDbName2)) == KErrInUse)
-		{
-		User::After(50000);
-		}
-				
-	if ((KErrPathNotFound == r) || (KErrNotFound == r))  //-12 or -1
-		{
-		INFO_PRINTF1(_L("The pin plugin database file (t_pinplugindlg_out.dat)was absent when I tried to delete it. \
-						Ignoring..."));
-		r = KErrNone;	//Not Important
-		}
-	User::LeaveIfError(r);
-		
-	
-	//Reset the data 'AllUserID&PinValues' in AuthSvrPolicy.ini & the 
-	// individual plugin Db files
-	TBufC<16> initPinDbBuffer(KInitPinDatabaseValue);
-	TPtr valueToWrite = initPinDbBuffer.Des();
-	
-	TBufC<16> initEnteredPinBuffer(KDefaultInput);
-	TPtr defaultInputValue = initEnteredPinBuffer.Des();
-	
-	TBuf<2> noIdentityVal;
-	_LIT16(KFormatLastAuth,"%u");
-	
-	noIdentityVal.Format(KFormatLastAuth, KErrNone); //generates:
-
-	TDriveUnit sysDrive (RFs::GetSystemDrive());
-	TDriveName sysDriveName (sysDrive.Name());
-	TBuf<128> fileName (sysDriveName);
-	fileName.Append(KAuthSvrPolicyFile);
-	
-	CIniData* policyFile=NULL;
-	TRAP(r,policyFile=CIniData::NewL(fileName));
-	CleanupStack::PushL(policyFile);
-	
-	fileName.Copy(sysDriveName);
-	fileName.Append(KPlugin3100File);
-	
-	CIniData* p3100File=NULL;
-	TRAP(r,p3100File=CIniData::NewL(fileName));
-	CleanupStack::PushL(p3100File);
-	
-	fileName.Copy(sysDriveName);
-	fileName.Append(KPlugin3101File);
-	
-	CIniData* p3101File=NULL;
-	TRAP(r,p3101File=CIniData::NewL(fileName));
-	CleanupStack::PushL(p3101File);
-	
-	fileName.Copy(sysDriveName);
-	fileName.Append(KPlugin3102File);
-	
-	CIniData* p3102File=NULL;
-	TRAP(r,p3102File=CIniData::NewL(fileName));
-	CleanupStack::PushL(p3102File);
-	
-	fileName.Copy(sysDriveName);
-	fileName.Append(KPlugin3103File);
-	
-	CIniData* p3103File=NULL;
-	TRAP(r,p3103File=CIniData::NewL(fileName));
-	CleanupStack::PushL(p3103File);
-	
-	fileName.Copy(sysDriveName);
-	fileName.Append(KPlugin3104File);
-
-	CIniData* p3104File=NULL;
-	TRAP(r,p3104File=CIniData::NewL(fileName));
-	CleanupStack::PushL(p3104File);
-
-	fileName.Copy(sysDriveName);
-	fileName.Append(KPlugin4100File);
-
-	CIniData* p4100File=NULL;
-	TRAP(r,p4100File=CIniData::NewL(fileName));
-	CleanupStack::PushL(p4100File);
-	
-	writeToNamedConfig(policyFile, KLastAuthIdTag, noIdentityVal);
-	writeToNamedConfig(policyFile, KTotalDbTag, valueToWrite);
-	writeToNamedConfig(p3100File, KPinDbTag, valueToWrite); 
-	writeToNamedConfig(p3101File, KPinDbTag, valueToWrite); 
-	writeToNamedConfig(p3102File, KPinDbTag, valueToWrite); 
-	writeToNamedConfig(p3103File, KPinDbTag, valueToWrite); 
-	writeToNamedConfig(p3104File, KPinDbTag, valueToWrite);
-	writeToNamedConfig(p4100File, KPinDbTag, valueToWrite);
-	writeToNamedConfig(p3100File, KIdEnteredPinTag, defaultInputValue);
-	writeToNamedConfig(p3101File, KIdEnteredPinTag, defaultInputValue);
-	writeToNamedConfig(p3102File, KIdEnteredPinTag, defaultInputValue);
-	writeToNamedConfig(p3103File, KIdEnteredPinTag, defaultInputValue);
-	writeToNamedConfig(p3104File, KIdEnteredPinTag, defaultInputValue);
-	writeToNamedConfig(p4100File, KIdEnteredPinTag, defaultInputValue);
-	writeToNamedConfig(p3100File, KTrainEnteredPinTag, defaultInputValue);
-	writeToNamedConfig(p3101File, KTrainEnteredPinTag, defaultInputValue);
-	writeToNamedConfig(p3102File, KTrainEnteredPinTag, defaultInputValue);
-	writeToNamedConfig(p3103File, KTrainEnteredPinTag, defaultInputValue);
-	writeToNamedConfig(p3104File, KTrainEnteredPinTag, defaultInputValue);
-	writeToNamedConfig(p4100File, KTrainEnteredPinTag, defaultInputValue);
-	
-	policyFile->WriteToFileL();
-	p3100File->WriteToFileL();
-	p3101File->WriteToFileL();
-	p3102File->WriteToFileL();
-	p3103File->WriteToFileL();
-	p3104File->WriteToFileL();
-	p4100File->WriteToFileL();
-
-	CleanupStack::PopAndDestroy(7,policyFile);
-	}
-	
-/**
- 	Utility function coverting HexString to Integer
-*/
-TInt CTAuthSvrStepBase::HexString2Num(const TDesC8& aStr)
-  {
-  	TInt data = 0;
-	TInt char2hex = 0;
-	TInt c = 0;
-	for (TInt i = 0 ; i < aStr.Length() ; ++i)
-	  {
-	  c = aStr[i];
-	  
-	  if (c < 'A')
-	    {
-	    char2hex='0';
-	    }
-	  else if (c < 'a')
-	    {
-	    char2hex='A';
-	    }
-	  else
-	    {
-	    char2hex='a';
-	    }
-	  data = data << 4;      
-	  data += aStr[i]-char2hex; 
-	  }
-	return data;
-  }
-
-
-/**
- Utility function to Update the Global Db by removing the training data 
- that is associated with a given Id. The removal will not happen if 
- the identity is not present in this list, however, this is not expected
- Called at the same time as RAuthMgrClient::RemoveIdentityL(aId)
- Returns KErrNone, or some error code
-*/
-TInt CTAuthSvrStepBase::RemoveIdFromGlobalDbL (TUint32 aId)
-	{
-	
-	TBuf8<500> totalDbFileContents, totalDbFileContents2;
-	TInt retValue = KErrNone;
-	CIniData* file=NULL;
-	
-	TDriveUnit sysDrive (RFs::GetSystemDrive());
-	TDriveName sysDriveName (sysDrive.Name());
-	TBuf<128> fileName (sysDriveName);
-	fileName.Append(KAuthSvrPolicyFile);
-	
-	TRAPD(r,file=CIniData::NewL(fileName));	
-	if(r!=KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &fileName);
-		retValue = r;
-		}	
-	else
-		{
-		// Look for a key under a named section, retrieve text value	
-		TPtrC result;		
-		TBool ret=EFalse;	//return value from FindVar functions		
-				
-		ret=file->FindVar(KPluginIniSection, KTotalDbTag,result);
-		if(!ret)
-			{
-			RDebug::Print(_L("Unable to find the %S key in the file %S."), &KTotalDbTag, &fileName);
-			retValue = KErrNotFound;		
-			}
-		else
-			{
-			//Copy the data from the named section in the file, and see if any previous user has used this input string
-			totalDbFileContents.Copy(result);
-			
-			//Format the searchstring as defined in the file so that it starts with a ',' and ends with a ':'.
-			_LIT8(KFormatValue3, ",%d:");
-			TBuf8<20> searchString;
-			searchString.Format(KFormatValue3, aId);
-			TInt searchResult;			
-			searchResult = totalDbFileContents.Find(searchString);
-			
-			if (searchResult)	// the tag was found
-			{				
-				//Extract the rest of the pinFileContents string before the start of the PIN (before the ':')
-				totalDbFileContents2 = totalDbFileContents.Left(searchResult);
-				
-				//The userId starts at the first ',' from the end of pinFileContents2, 
-				// where p2 is the portion of p1 to the left of searchResult
-				TInt userIdStartPos = totalDbFileContents2.LocateReverse(',');
-				
-				//Find where the PIN ends
-				TInt PinEndPos = searchResult + searchString.Length() - 1;
-								
-				//remove the found (total) string from the list
-				totalDbFileContents.Delete(userIdStartPos, (PinEndPos - userIdStartPos) );
-				
-				//Update the file
-				//For the purpose of writing the data to a file, i'll create a 16-bit version of pinFileContents
-					TInt ret2 = 0;
-					HBufC* buf;
-					buf = HBufC::NewL(500);	
-					buf->Des().Copy(totalDbFileContents);
-								
-				ret2 = file->SetValue(KPluginIniSection, KTotalDbTag, *buf);
-				
-				TRAPD(r,file->WriteToFileL());
-				if (KErrNone != r)
-					{
-					RDebug::Print(_L("Error occurred while writing to the file. Filename = %S, KeyName = AllUserID&PinValues, value = %S."), &fileName, buf);
-					}
-				delete buf;		//Memory cleanup. This string was only needed for the above Print function
-				
-				if (KErrNone !=ret2)
-					{
-					RDebug::Print(_L("Error occurred in WriteToFileL(). Error = %d. Filename= %S"), ret2, &fileName);						
-					retValue = ret2;
-					}
-				else
-					{
-					retValue = KErrNone;		
-					}				
-				}
-				else // The identity was not found in the Db. 											
-				{				
-				RDebug::Print(_L("RemoveIdFromGlobalDb: The specified ID was not found in the totalDbFile"));
-				retValue = KErrAuthServIdentityNotFound;									
-				}
-			}//End check for key&section search in file
-		delete file;
-		}//End check for safe file access
-	return retValue;
-	}
-
-/**
-Returns EPass or EFail
-*/
-TVerdict CTAuthSvrStepBase::checkAndSetUserNameL(AuthServer::RAuthClient& authClient1, TInt idPosition)
-	{	
-	TBool retValue = ETrue;
-	TPtrC initNameValue;
-	TPtrC finalNameValue;
-	//Check that the user has specified the initial and later userNames for the identity 
-	
-	if( (GetStringFromConfig(ConfigSection(),_L("finalUserName"), finalNameValue)) 
-			!= EFalse) // the tags 'initUserName' and finalUserName are present
-		{
-		//Get a list of all the present identities
-		RIdentityIdArray ids;
-		authClient1.IdentitiesL(ids);
-		CleanupClosePushL(ids);
-		
-		//Check the userName of particular identity that was mentioned in the function call
-		HBufC* idName = authClient1.IdentityStringL(ids[idPosition]);
-		CleanupStack::PushL(idName);
-		
-		//Change the userName to what is desired
-		authClient1.SetIdentityStringL(ids[idPosition], finalNameValue);
-		
-		//Compare to the expected final value of the userName
-		
-		HBufC* idNameFinal = authClient1.IdentityStringL(ids[idPosition]);
-		
-		if (idNameFinal->Compare(finalNameValue) != 0)
-			{
-			INFO_PRINTF4(_L("Id %d has the Final name %S instead of %S"), idPosition, idNameFinal, &finalNameValue);
-			retValue = EFalse;
-			}
-		else
-			{
-			INFO_PRINTF4(_L("Id %d had the initial name %S and the Final name %S"), idPosition, idName, idNameFinal);	
-			retValue = ETrue;
-			}		
-		delete idNameFinal;			
-		CleanupStack::PopAndDestroy(2, &ids);	//idName, ids
-		}
-	else
-		{
-		INFO_PRINTF1(_L("finalUserName tag is absent in the script file"));		
-		}
-		
-	if (retValue)
-		{SetTestStepResult(EPass);}
-	else
-		{SetTestStepResult(EFail);}	
-	
-	return TestStepResult();
-	}
-
-
-//
-void CTAuthSvrStepBase::CheckSpecifiedPluginStatusL ()
-	{
-	//If the pluginId is quoted in the ini file, check it's training status
-	TInt plugin1IdValue = 0;
-	if (GetHexFromConfig(ConfigSection(),_L("plugin1Id"), plugin1IdValue) != EFalse) // the tag 'pluginId1' was present
-		{
-		AuthServer::RAuthClient ac;
-		User::LeaveIfError(ac.Connect());
-		CleanupClosePushL(ac);
-		// Get the status of the specified plugin
-		TInt plugin1StatusValue;
-		if (GetIntFromConfig(ConfigSection(),_L("plugin1Status"), plugin1StatusValue) != EFalse) 
-			{
-			TAuthTrainingStatus plugin1Status;// = plugin1StatusValue;
-			switch (plugin1StatusValue)
-				{
-				case EAuthUntrained:
-					plugin1Status = EAuthUntrained;
-					break;
-				case EAuthTrained:
-					plugin1Status = EAuthTrained;
-					break;
-				case EAuthFullyTrained:
-					plugin1Status = EAuthFullyTrained;
-					break;
-				default:
-					ERR_PRINTF2(_L("Error receiving a value of the pluginIdStatus. Value in file : %d "), plugin1StatusValue);
-					plugin1Status = EAuthUntrained;
-					break;
-				}				
-			
-			
-			RPluginDescriptions pluginList1;
-			TCleanupItem cleanup(CleanupEComArray, &pluginList1);
-			CleanupStack::PushL(cleanup);				
-			ac.PluginsL(pluginList1);
-						
-			TInt numPlugins = pluginList1.Count();
-			for(TInt i = 0; i < numPlugins; i++)
-				{
-				TInt presentPluginIdVal = pluginList1[i]->Id();
-								
-				if (presentPluginIdVal == plugin1IdValue)
-					{
-					TInt presentPluginStatus = pluginList1[i]->TrainingStatus();
-					if (presentPluginStatus == plugin1Status)
-						{
-						INFO_PRINTF3(_L("PluginId=%x has the expected status =%i"), presentPluginIdVal, presentPluginStatus);
-						SetTestStepResult(EPass);
-						}
-					else
-						{
-						ERR_PRINTF4(_L("PluginId=%x has status =%i, instead of %i"), 
-							presentPluginIdVal, presentPluginStatus, plugin1Status);
-						SetTestStepResult(EFail);
-						}
-					break;	//Don't check any other plugins	
-					}
-				else
-					{
-					SetTestStepResult(EFail);	//After this, check others
-					}
-				}
-			if(numPlugins == 0) 				
-				{
-				ERR_PRINTF1(_L("No plugins in the system"));
-				SetTestStepResult(EFail);					
-				}
-				
-			if (TestStepResult() == EFail)
-				{
-				ERR_PRINTF3(_L("PluginId=%x does not have the expected status %i"), 
-					plugin1IdValue, plugin1StatusValue);
-				}
-				
-			CleanupStack::PopAndDestroy(&pluginList1); //infoArray, results in a call to CleanupEComArray
-			}
-		else
-			{
-			INFO_PRINTF1(_L("plugin1Status was not specified in the ini file"));
-			}
-		CleanupStack::PopAndDestroy(&ac);	// ac	
-		}
-	else
-		{
-		INFO_PRINTF1(_L("plugin1Id was not specified in the ini file"));	
-		}
-	}
-
-
-
-enum TOp
-    {
-    ENone =0,
-    EOr = 1,
-    EAnd = 2
-    };
-    
-enum TState
-    {
-    EFirstToken  = 0,
-    ESecondToken = 1,
-    EThirdToken  = 2,
-    ENumTokens = 3
-    };
-    
-AuthServer::CAuthExpression* CTAuthSvrStepBase::CreateAuthExprLC (const TDesC& aString)
-    {
-   
-    TLex  input(aString);
-    
-    _LIT(KKnowledge,"K");    
-    _LIT(KBiometric,"B");
-    _LIT(KToken,"T");  
-    _LIT(KDefault,"D");
-    _LIT(KAnd,"&");
-    _LIT(KOr,"|");
-    _LIT(KUnexpected, "Unexpected '%S' token while parsing authexpression");
-    
-    AuthServer::CAuthExpression* result = 0;
-    TState state = EFirstToken;
-    TOp op = ENone;
-    TBool err;
-    TPluginId plugin = 0;
-    
-    if (aString == KNullDesC)
-       	{
-       	result = AuthExpr();
-       	CleanupStack::PushL(result);
-       	return result;
-       	}
-    for (TPtrC token = input.NextToken(); token.Size() > 0 ; 
-         token.Set(input.NextToken()))
-        { 
-        AuthServer::CAuthExpression* newExpr = 0; 
-        INFO_PRINTF3(_L("Token %S Size = %d"), &token, token.Size()); 
-        if (token.Length() > 1)
-            {
-            TLex lexer(token);
-            if (lexer.Val(plugin,EHex) == KErrNone)
-                {
-                err = (state != EFirstToken && state != EThirdToken );
-                if (err) ERR_PRINTF2(KUnexpected, &token);
-                newExpr = AuthExpr(plugin);
-                }
-            else
-                {
-                err = true;
-                ERR_PRINTF2(KUnexpected, &token);
-                }
-            }
-        else if (token.CompareF(KKnowledge) == 0)
-            {
-            err = (state != EFirstToken && state != EThirdToken );
-            if (err) ERR_PRINTF2(KUnexpected, &token);
-            newExpr = AuthExpr(EAuthKnowledge);
-            }
-        else if (token.CompareF(KBiometric) == 0)
-            {   
-            err = (state != EFirstToken && state != EThirdToken );
-            if (err) ERR_PRINTF2(KUnexpected, &token);
-            newExpr = AuthExpr(EAuthBiometric);    
-            }
-        else if (token.CompareF(KToken) == 0)
-            {
-            err = (state != EFirstToken && state != EThirdToken );
-            if (err) ERR_PRINTF2(KUnexpected, &token);
-            newExpr = AuthExpr(EAuthToken);
-            }
-        else if (token.CompareF(KDefault) == 0)
-            {
-            err = (state != EFirstToken && state != EThirdToken );
-            if (err) ERR_PRINTF2(KUnexpected, &token);
-            newExpr = AuthExpr(EAuthDefault);
-            }
-        else if (token.CompareF(KAnd) == 0)
-            {
-            err = state != ESecondToken;
-            if (err) ERR_PRINTF2(KUnexpected, &token);
-            op = EAnd;
-            }
-        else if (token.CompareF(KOr) == 0)
-            {
-            err = state != ESecondToken;
-            if (err) ERR_PRINTF2(KUnexpected, &token);
-            op = EOr;
-            }
-        else 
-            {
-            err = true;
-            ERR_PRINTF2(_L("Unknown '%S' token while parsing authexpression"), &token);
-            }
-            
-        if (err) 
-            {
-            User::Leave(KErrGeneral);
-            }
-        switch (state)    
-            {
-            case EFirstToken:
-                if ( result == 0 && op == ENone)
-                    {
-                    result = newExpr;
-                    CleanupStack::PushL(result);
-                    }
-                else 
-                    {
-                    //err?
-                    }
-                state = ESecondToken;
-                break;
-            case ESecondToken:
-                state = EThirdToken;
-                break;
-            case EThirdToken:
-                if (op == EOr)
-                    {
-                    CleanupStack::Pop(result);
-                    result =  AuthOr(result, newExpr);
-                    CleanupStack::PushL(result);
-    
-                    }
-                else
-                    {
-                    CleanupStack::Pop(result);
-                    result =  AuthAnd(result, newExpr);
-                    CleanupStack::PushL(result);
-                    }
-                op = ENone;
-                state = ESecondToken;
-            }
-        }
-    if (state == EThirdToken)
-        {
-        ERR_PRINTF1(_L("Unexpected end of stream while parsing authexpression"));
-        User::Leave(KErrGeneral);
-        }
-    return result;
-    }
-    
-void CTAuthSvrStepBase::CheckSpecifiedPluginStatusConnectedL (AuthServer::RAuthClient& ac)
-	{
-	//If the pluginId is quoted in the ini file, check it's training status
-	TInt plugin1IdValue = 0;
-	if (GetHexFromConfig(ConfigSection(),_L("plugin1Id"), plugin1IdValue) != EFalse) // the tag 'pluginId1' was present
-		{
-		// Get the status of the specified plugin
-		TInt plugin1StatusValue = 0;
-		if (GetIntFromConfig(ConfigSection(),_L("plugin1Status"), plugin1StatusValue) != EFalse) 
-			{
-			TAuthTrainingStatus plugin1Status;// = plugin1StatusValue;
-			switch (plugin1StatusValue)
-				{
-				case EAuthUntrained:
-					plugin1Status = EAuthUntrained;
-					break;
-				case EAuthTrained:
-					plugin1Status = EAuthTrained;
-					break;
-				case EAuthFullyTrained:
-					plugin1Status = EAuthFullyTrained;
-					break;
-				default:
-					ERR_PRINTF2(_L("Error receiving a value of the pluginIdStatus. Value in file : %d "), plugin1StatusValue);
-					plugin1Status = EAuthUntrained;
-					break;
-				}				
-			
-			
-			RPluginDescriptions pluginList1;
-			TCleanupItem cleanup(CleanupEComArray, &pluginList1);
-			CleanupStack::PushL(cleanup);						
-			ac.PluginsL(pluginList1);
-						
-			TInt numPlugins = pluginList1.Count();
-			for(TInt i = 0; i < numPlugins; i++)
-				{
-				TInt presentPluginIdVal = pluginList1[i]->Id();
-								
-				if (presentPluginIdVal == plugin1IdValue)
-					{
-					TInt presentPluginStatus = pluginList1[i]->TrainingStatus();
-					if (presentPluginStatus == plugin1Status)
-						{
-						INFO_PRINTF3(_L("PluginId=%x has the expected status =%i"), presentPluginIdVal, presentPluginStatus);
-						SetTestStepResult(EPass);
-						}
-					else
-						{
-						ERR_PRINTF4(_L("PluginId=%x has status =%i, instead of %i"), 
-							presentPluginIdVal, presentPluginStatus, plugin1Status);
-						SetTestStepResult(EFail);
-						}
-					break;	//Don't check any other plugins	
-					}
-				else
-					{
-					SetTestStepResult(EFail);	//After this, check others
-					}
-				}
-			if(numPlugins == 0) 				
-				{
-				ERR_PRINTF1(_L("No plugins in the system"));
-				SetTestStepResult(EFail);					
-				}
-				
-			if (TestStepResult() == EFail)
-				{
-				ERR_PRINTF3(_L("PluginId=%x does not have the expected status %i"), 
-					plugin1IdValue, plugin1StatusValue);
-				}
-				
-			CleanupStack::PopAndDestroy(&pluginList1); //infoArray, results in a call to CleanupEComArray
-			}
-		else
-			{
-			INFO_PRINTF1(_L("plugin1Status was not specified in the ini file"));
-			}		
-		}
-	else
-		{
-		INFO_PRINTF1(_L("plugin1Id was not specified in the ini file"));	
-		}	
-	}
-
-TBool CTAuthSvrStepBase::CheckPluginStatusAllL (AuthServer::RAuthClient& ac)
-	{
-	TBool retValue = EFalse;
-	
-	//Get a list of all the present plugins
-	RPluginDescriptions pluginList1;
-	TCleanupItem cleanup(CleanupEComArray, &pluginList1);
-	CleanupStack::PushL(cleanup);	
-	ac.PluginsL(pluginList1);
-	
-	//Get a list of all the present identities
-	RIdentityIdArray ids;
-	ac.IdentitiesL(ids);
-	CleanupClosePushL(ids);
-	TInt actualNumIdsFromServer = ids.Count();
-	CleanupStack::PopAndDestroy(&ids);
-	
-	//Get the number of identities that has been trained for each of my 3 plugins
-	TInt numIdsTrained;
-
-	TInt numPlugins = pluginList1.Count();
-	for(TInt i = 0; i < numPlugins; i++)
-		{
-		TInt presentPluginStatus = pluginList1[i]->TrainingStatus();
-		TInt presentPluginId = pluginList1[i]->Id();
-		TInt expectedStatus = 0;
-		
-		TDriveUnit sysDrive (RFs::GetSystemDrive());
-		TDriveName sysDriveName (sysDrive.Name());
-		TBuf<128> fileName (sysDriveName);
-		
-		switch (presentPluginId)
-			{
-			case 0x11113100:
-				{
-				fileName.Append(KPlugin3100File);
-				numIdsTrained = GetNumIdsFromPluginDbL(fileName);
-				break;
-				}
-			
-			case 0x11113101:
-				{
-				fileName.Append(KPlugin3101File);
-				numIdsTrained = GetNumIdsFromPluginDbL(fileName);
-				break;
-				}
-				
-			case 0x11113102:
-				{
-				fileName.Append(KPlugin3102File);
-				numIdsTrained = GetNumIdsFromPluginDbL(fileName);
-				break;
-				}
-				
-			case 0x10234100:
-				{
-				fileName.Append(KPlugin4100File);
-				numIdsTrained = GetNumIdsFromPluginDbL(fileName);
-				break;
-				}
-				
-			case 0x200032E5:
-				{
-				numIdsTrained = actualNumIdsFromServer - 1;
-				}
-				
-			default:				
-				numIdsTrained = KErrNotFound;
-				break;
-			}
-		if (KErrNotFound != numIdsTrained)
-			{
-			//We are only considering the 3 specified Ids
-			if (0 == numIdsTrained)
-				{ expectedStatus = EAuthUntrained; }
-			else if(actualNumIdsFromServer == numIdsTrained)
-				{ expectedStatus = EAuthFullyTrained; }
-			else if (actualNumIdsFromServer > numIdsTrained)
-				{ expectedStatus = EAuthTrained; }
-			else 
-				{
-				ERR_PRINTF2(_L("Error!! PluginId=%x has an unexpected Number of Ids in the Database = %i"), 
-						numIdsTrained);
-				ERR_PRINTF2(_L("Actual number of Ids registered by the authServer = %i"), 
-						actualNumIdsFromServer);				
-				}
-			
-			//Final check
-			if (presentPluginStatus != expectedStatus)
-				{
-				ERR_PRINTF4(_L("Present PluginStatus of plugin %x is not as expected. It is %i instead of %i"), 
-							presentPluginId, presentPluginStatus, expectedStatus);
-				retValue = EFalse;
-				}
-			else
-				{
-				retValue = ETrue;	
-				}
-			}
-		}//End of for loop
-	CleanupStack::PopAndDestroy(&pluginList1); //infoArray, results in a call to CleanupEComArray
-	return retValue;	
-	}
-
-TInt CTAuthSvrStepBase::GetNumIdsFromPluginDbL(const TDesC& aFileName)
-	{
-	TBuf8<500> pluginDbFileContents;
-	TInt numIds = 0;	
-	CIniData* file=NULL;
-	file = CIniData::NewL(aFileName);	
-	CleanupStack::PushL(file);
-	
-	// Look for a key under a named section, retrieve text value	
-	TBool ret=EFalse;	//return value from FindVar functions	
-	TPtrC resultPtr;
-	
-	ret=file->FindVar(KPluginIniSection, KPinDbTag, resultPtr);	
-	if(ret == EFalse)
-		{		
-		RDebug::Print(_L("Unable to read value in ini file. Filename: %S, SectionName = %S, value = %S."), &aFileName, &KPluginIniSection, &KPinDbTag);
-		numIds = ret;
-		}
-	else
-		{
-		pluginDbFileContents.Copy(resultPtr);
-		_LIT8(KMarker, ":");
-		TBuf8<3> searchString;		
-		searchString = KMarker;
-		
-		TInt dBLen = pluginDbFileContents.Length();
-		for (TInt i = 0; i < dBLen; i++)
-			{
-			if (pluginDbFileContents[i] == ':')
-				{
-				numIds++;
-				}
-			}//End for
-		}//End check
-	CleanupStack::PopAndDestroy(file);
-	return numIds;
-	}
-
-void CTAuthSvrStepBase::CreatePinPluginInputFileL(TPinPluginDialogOperation aOperation, TPinValue aPinValue)
-	{
-	RFileWriteStream stream;
-	RFs fs;
-	User::LeaveIfError(fs.Connect());
-	TInt err = stream.Replace(fs, KInputFile, EFileWrite | EFileShareExclusive);
-	User::LeaveIfError(err);
-	stream.PushL();
-	
-	MStreamBuf* streamBuf = stream.Sink();
-	streamBuf->SeekL(MStreamBuf::EWrite, EStreamEnd);
-	stream.WriteInt32L(aOperation);
-	stream.WriteInt32L(aPinValue.Length());
-	stream.WriteL(aPinValue);
-	stream.WriteInt32L(0);
-	stream.WriteInt32L(4);
-	TPinPluginDialogResult cmdResult = EOk;
-	stream.WriteInt32L(cmdResult);
-	aOperation = EPinPluginInfo;
-	stream.WriteInt32L(aOperation);
-	TPinPluginDialogResult cmdFinalResult = EOk;
-	stream.WriteInt32L(cmdFinalResult);
-	stream.WriteInt32L(2);
-	stream.CommitL();
-	CleanupStack::PopAndDestroy(); // stream
-	
-	}
-
-TPinValue CTAuthSvrStepBase::GetPinFromOutputFileL()
-	{
-	RFileReadStream stream;
-	RFs fs;
-	TPinValue pinValue;
-	
-	User::LeaveIfError(fs.Connect());
-	TInt err = stream.Open(fs, KOutputFile, EFileRead | EFileShareExclusive);
-	if(err == KErrNotFound)
-		{
-		pinValue.Copy(_L("11111"));
-		return pinValue;
-		}
-	
-	User::LeaveIfError(err);
-	stream.PushL();
-
-	MStreamBuf* streamBuf = stream.Source();
-	
-	stream.ReadInt32L();
-	TInt pinValueLength = stream.ReadInt32L();
-	HBufC8* pinValueBuf = HBufC8::NewMaxLC(pinValueLength);
-	TPtr8 pinValuePtr(pinValueBuf->Des());
-	stream.ReadL(pinValuePtr, pinValueLength);
-	pinValue.Copy(pinValuePtr);
-	
-	CleanupStack::PopAndDestroy(2, &stream);	
-
-	return pinValue;
-	}
-
-AuthServer::TIdentityId CTAuthSvrStepBase::getLastAuthId()
-/**
-	Retrieve the last Identity that was authenticated from the Global Db file
-	@return		The last authenticated Identity
- */
-	{
-	TIdentityId lastId;
-	lastId = 0;
-		
-	HBufC* valueFromFile;
-	TInt ret = 0;
-	TInt err = 0;
-	
-	TDriveUnit sysDrive (RFs::GetSystemDrive());
-	TBuf<128> authSvrPolicyFile (sysDrive.Name());
-	authSvrPolicyFile.Append(KAuthSvrPolicyFile);
-	
-	TRAP(err, ret = readFromNamedConfigL(authSvrPolicyFile, KLastAuthIdTag, valueFromFile));
-	
-	if (KErrNotFound == ret)
-		{		
-		ERR_PRINTF3(_L("Error while getting last AuthId. Tag %S not found in %S file"), KLastAuthIdTag, &authSvrPolicyFile);
-		}
-	else
-		{		
-		TLex input (*valueFromFile);
-		TRadix aRadix = EDecimal;
-		input.Val(lastId, aRadix);
-		RDebug::Print(_L("UserId that is retrieved from file = %u"), lastId);
-		}
-		
-	delete valueFromFile;		
-	
-	return lastId;
-	}
-	
-	
-void CTAuthSvrStepBase::ClientMessage(TBool aIsMessage, const TDesC& aDisplayString)
-	{
-	TDriveUnit sysDrive (RFs::GetSystemDrive());
-	TDriveName sysDriveName (sysDrive.Name());
-	TBuf<128> fileName (sysDriveName);
-	
-	fileName.Append(KAuthSvrPolicyFile);
-	CIniData* file=NULL;
-	TRAPD(r,file=CIniData::NewL(fileName));	
-	CleanupStack::PushL(file);
-	if(r!=KErrNone)
-	{
-	RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &fileName);
-	}	
-	
-	if(aIsMessage)
-		{
-		TBool ret=file->SetValue(KPluginIniSection, KDisplayMessage, aDisplayString);
-		file->WriteToFileL();
-		}
-	else
-		{
-		TBool ret=file->SetValue(KPluginIniSection, KDisplayMessage, KNullDesC());	
-		}
-	file->WriteToFileL();
-	CleanupStack::PopAndDestroy(file);
-	}
-
-//Implementation of member functions for CTStepActSch
-
-TVerdict CTStepActSch::doTestStepPreambleL()
-/**
-	Override CTestStep by allocating an active scheduler which is available to the subclass.	
-	@return					This test step's result, which isn't actually used by ThreadStepExecutionL.
- */
-	{
-	CTAuthSvrStepBase::doTestStepPreambleL();
-	iActSchd = new(ELeave) CActiveScheduler;
-	return TestStepResult();
-	}
-
-
-TVerdict CTStepActSch::doTestStepPostambleL()
-/**
-	Override CTestStep by deleting the active scheduler which allocated in doTestStepPreambleL.
-	@return					This test step's result, which isn't actually used by ThreadStepExecutionL.
- */
-	{
-	CTAuthSvrStepBase::doTestStepPostambleL();
-	delete iActSchd;
-	return TestStepResult();
-	}
-
-/**
- Utility clean up function used when working with locally declared arrays
- */
-void CleanupEComArray(TAny* aArrayOfPlugins)
-	{	
-	(static_cast<RImplInfoPtrArray*> (aArrayOfPlugins))->ResetAndDestroy();
-	(static_cast<RImplInfoPtrArray*> (aArrayOfPlugins))->Close();	
-	}
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/step_clientsidsupport.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,294 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include <bautils.h>
-#include <s32file.h>
-#include <test/testexecutelog.h>
-
-#include "authserver/authmgrclient.h"
-#include "authserver/authclient.h"
-#include "authserver/identity.h"
-#include "tAuthSvrStep.h"
-
-using namespace AuthServer;
-
-class CActiveObj : public CActive
-    {
-    public:
-    CActiveObj(RAuthMgrClient& aClient, CAuthExpression* aExpression,
-				 TInt aFresh, TBool aClientSpecific, TUid aClientSid, TBool aIdentityString, TPluginId aPluginId, TIdentityId aId) : 
-         CActive(EPriorityNormal),
-         iClient(aClient),
-		 iResult(EFail),
-         iRunCount(0),
-         iAe(aExpression),
-         iFresh(aFresh),
-         iClientSpecific(aClientSpecific),
-         iWithString(aIdentityString),
-         iPluginId(aPluginId),
-         iId(aId),
-         iMode(-1)
-        {
-        CActiveScheduler::Add(this);
-        iClientSid = aClientSid;
-        }
-   
-    void Authenticate() 
-        {
-        SetActive();		
-		TRequestStatus* status = &iStatus;		    
-		User::RequestComplete(status, KErrNone);
-		iRunCount = 0;
-		iMode = 0;
-        }
-        
-   void Retrain() 
-        {
-        SetActive();		
-		TRequestStatus* status = &iStatus;		    
-		User::RequestComplete(status, KErrNone);
-		iRunCount = 0;
-		iMode = 1;
-        }
-        
-    void DoCancel() 
-        {
-        }
-        
-    TInt RunError(TInt aError)
-    	{
-    	iErr = aError;
-	   	CActiveScheduler::Stop();
-	   	return KErrNone;
-    	}
-        
-    void RunL() 
-        {
-        switch (iRunCount)
-		  {
-		  case 0:
-		  
-		  switch (iMode)
-			  {
-			  
-			  case 0:
-				iClient.AuthenticateL(*iAe, iFresh, iClientSpecific, iClientSid, EFalse, KNullDesC(), iIdentity, iStatus);
-			    break;
-			    
-			  case 1:
-				iClient.TrainPlugin(iId, iPluginId, iStatus);
-				break;
-			  }
-			  
-			SetActive();
-			break;
-			
-		  case 1:
-   		  
-   		  	iResult = iStatus.Int() == KErrNone ? EPass : EFail;
-            iErr = iStatus.Int();
-			CActiveScheduler::Stop();
-			break;
-			
-     	  default:
-			iResult = EFail;
-			CActiveScheduler::Stop();
-			 
-		    }
-		  ++iRunCount;
-          }
-          
-    ~CActiveObj()
-		{
-		
-		}
-		
-    RAuthMgrClient& iClient;
-	TVerdict iResult;
-	TInt iRunCount;
-	CAuthExpression* iAe;
-	CIdentity* iIdentity;
-    TInt iErr;
-    TInt iFresh;
-    TBool iClientSpecific;
-    TBool iWithString;
-    TPluginId iPluginId;
-    TIdentityId iId;
-    TInt iMode;
-    TUid iClientSid;
-    };
-    
- 
- CTStepClientSidSupport::CTStepClientSidSupport(CTAuthSvrServer& aParent): iParent(aParent)
- 	{
- 	SetTestStepName(KTStepClientSidSupportCheck);
- 	}
- 	
- TVerdict CTStepClientSidSupport::doTestStepPreambleL()
- 	{
- 	SetTestStepResult(EFail);
- 	
- 	CTStepActSch::doTestStepPreambleL();
- 	 	
- 	if(GetHexFromConfig(ConfigSection(),_L("plugin1Id"), iPluginId) == EFalse)
-		{
-		INFO_PRINTF1(_L("Plugin Id not specified in the ini file"));
-		return TestStepResult();
-		}
-
-	if(GetBoolFromConfig(ConfigSection(),_L("clientSpecificKey"), iClientSpecificKey) == EFalse)
-	 	{
-	 	INFO_PRINTF1(_L("Client Specific Key not specified in the ini file"));
-		return TestStepResult();
-	 	} 
-		 	
-	if(GetBoolFromConfig(ConfigSection(),_L("withString"), iWithString) == EFalse)
-	 	{
-	 	INFO_PRINTF1(_L("Identity String not specified in the ini file"));
-		return TestStepResult();
-	 	}
-	 	
-	TInt clientSid = 0;
-   	if(GetHexFromConfig(ConfigSection(),_L("clientSid"), clientSid) == EFalse)
-		{
-		INFO_PRINTF1(_L("Client Sid not specified in the ini file"));
-		return TestStepResult();
-		}
-	
-	iClientSid.iUid = clientSid;
- 	
-	 	
-	SetTestStepResult(EPass);
-	return TestStepResult();
- 	}
-  
- TVerdict CTStepClientSidSupport::doTestStepL()
-	{
-    SetTestStepResult(EFail);
-    
-    InitAuthServerFromFileL();	// Set things like 'iSupportsDefaultData' and 'DefaultPlugin'
-	
-	CActiveScheduler::Install(iActSchd);
-    
-	//Connect to the AuthServer	
-	AuthServer::RAuthMgrClient authMgrClient1;	
-	TInt connectVal = authMgrClient1.Connect();
-	CleanupClosePushL(authMgrClient1);
-	
-    TPtrC exprString;
-	if(GetStringFromConfig(ConfigSection(),_L("plugin1Id"), exprString) == EFalse)
-		{
-		INFO_PRINTF1(_L("Plugin Id not specified in the ini file"));
-		return TestStepResult();
-		}
-		
-	CAuthExpression* authExpr = CreateAuthExprLC(exprString);
-	CActiveObj active1(authMgrClient1, authExpr, 20, iClientSpecificKey, iClientSid, iWithString, iPluginId, 0);
-	active1.Authenticate();
-	CActiveScheduler::Start();
-	
-	if(EPass != active1.iResult)
-		{
-		ERR_PRINTF3(_L("Authentication Result error = %d, iResult = %d\n"), active1.iErr, active1.iResult);			
-		SetTestStepError(active1.iErr);
-		CleanupStack::PopAndDestroy(2, &authMgrClient1);
-		return TestStepResult();
-		}
-	
-	iIdentity = active1.iIdentity;
-	CleanupStack::PushL(iIdentity);
-	TIdentityId identityId = iIdentity->Id();
-	
-	// set plugin input train value.
-	InitPluginDataFromFileL(ETrue);
-	
-	CActiveObj active2(authMgrClient1, authExpr, 0, iClientSpecificKey, iClientSid, iWithString, iPluginId, identityId);
-	active2.Retrain();		
-	CActiveScheduler::Start();
-	
-	if(EPass != active1.iResult)
-		{
-		ERR_PRINTF3(_L("Error encountered while training plugin = %d, iResult = %d\n"), active2.iErr, active2.iResult);			
-		SetTestStepError(active2.iErr);
-		CleanupStack::PopAndDestroy(3, &authMgrClient1);
-		return TestStepResult();
-		}
-	
-	// set plugin inputId value.
-	InitPluginDataFromFileL(EFalse);
-	
-	CActiveObj active3(authMgrClient1, authExpr, 20, iClientSpecificKey, iClientSid, iWithString, iPluginId, 0);
-	active3.Authenticate();		
-	CActiveScheduler::Start();
-	
-	CleanupStack::Pop(iIdentity);	
-	CleanupStack::PopAndDestroy(2, &authMgrClient1);
-	
-	if(EPass != active1.iResult)
-		{
-		ERR_PRINTF3(_L("Authentication Result error = %d, iResult = %d\n"), active3.iErr, active3.iResult);			
-		SetTestStepError(active3.iErr);
-		delete iIdentity;
-		return TestStepResult();
-		}
-
-	iIdentityAfterRetrain = active3.iIdentity;
-	
-	TBool success = VerifyObtainedResultsWithExpectedL();
-	if(success)
-		{
-		SetTestStepResult(EPass);
-		}
-	
-	return TestStepResult();
-    };
-    
- TBool CTStepClientSidSupport::VerifyObtainedResultsWithExpectedL()
- 	{
- 	// required for ReadUserData capability test(when client sid is not equal
- 	// to the calling application's sid or zero, ReadUserData is required for
- 	// authentication.)
- 	if(iClientSid.iUid == 0)
- 		{
- 		TInt clientSid;
- 		if(GetHexFromConfig(ConfigSection(),_L("callingAppSid"), clientSid) == EFalse)
-			{
-			INFO_PRINTF1(_L("Sid of calling application not specified in the ini file"));
-			return TestStepResult();
-			}
-			
-		iClientSid.iUid = clientSid;
- 		}
- 		
- 	CProtectionKey* protection = iIdentity->Key().ClientKeyL(iClientSid.iUid);
- 	 	
- 	const CProtectionKey& obtainedKey = iIdentityAfterRetrain->Key();
- 	TBool success = EFalse;
- 	if(protection->KeyData() == obtainedKey.KeyData())
- 		{
- 		success = ETrue;
- 		}
- 	
- 	return success;
- 	}
- 	
- CTStepClientSidSupport::~CTStepClientSidSupport()
- 	{
- 	delete iIdentity;
- 	delete iIdentityAfterRetrain;
- 	}
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/step_createdb.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,115 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-#include "tAuthSvrStep.h"
-#include <testexecutelog.h>
-#include "authserver/protectionkey.h"
-#include "../source/server/encryptedprotectionkey.h"
-#include "../source/server/transientkey.h"  
-#include "../source/server/transientkey.h"  
-#include "../source/server/transientkeyinfo.h"
-#include "../source/server/authdb.h"
-
-#include <s32file.h>
-#include <f32file.h>
-
-using namespace AuthServer;
-
-CTStepCreateDb::CTStepCreateDb()
-	{
-	SetTestStepName(KTStepCreateDb);
-	}
-
-TVerdict CTStepCreateDb::doTestStepL()
-	{
-	if (TestStepResult() != EPass)
-		{
-		return TestStepResult();
-		}
-__UHEAP_MARK;		// Check for memory leaks
-
-	TBool res = ETrue;
-
-	/*
-	*/
-//	TBuf<50> path;
-	_LIT(kAuthDbFile, "authdb.db");
-	_LIT(kPath,"\\private\\102740FC\\");
-
-	TDriveUnit sysDrive (RFs::GetSystemDrive());
-	iFs.CreatePrivatePath(sysDrive);
-
-	TBuf<128> filePath (sysDrive.Name());
-	filePath.Append(kPath);
-	TInt err = iFs.MkDirAll(filePath);
-    if (err != KErrAlreadyExists)
-	  {
-	  User::LeaveIfError(err);
-	  }
-	
-	filePath.Insert(filePath.Length(), kAuthDbFile);
-
-	// Set up database
-	CAuthDb* authDb = CAuthDb::NewL();
-	CleanupStack::PushL(authDb);
-
-	for (TInt i = 0 ; i < KNumPlugins ; ++i)
-	  {
-		authDb->AddPluginL(iPlugins[i]);
-		iPlugins[i] = 0; // transfer ownership
-	  }
-
-	_LIT(kId1Name, "Identity1");
-	_LIT(kId2Name, "Identity2");
-	_LIT(kId3Name, "Identity3");
-	
-	authDb->AddIdentityL(1, kId1Name, iId1Keys[0]);
-	iId1Keys[0] = 0; // transfer ownership
-	authDb->AddIdentityL(2, kId2Name, iId2Keys[0]); 
-	iId2Keys[0] = 0; // transfer ownership
-	authDb->AddIdentityL(3, kId3Name, iId3Keys[0]); 
-    iId3Keys[0] = 0; // transfer ownership
-
-	for (TInt i = 1 ; i < KNumPlugins ; ++i)
-	  {
-		// add a new key info
-		authDb->UpdateL(1, iId1Keys[i]);
-		iId1Keys[i] = 0; // transfer ownership
-		authDb->UpdateL(2, iId2Keys[i]);
-		iId2Keys[i] = 0; // transfer ownership
-		authDb->UpdateL(3, iId3Keys[i]);
-		iId3Keys[i] = 0; // transfer ownership
-	  }
-
-	// Externalize
-	RFileWriteStream writeStore;
-	User::LeaveIfError(writeStore.Replace(iFs, filePath, 
-										  EFileShareExclusive | EFileStream));
-    CleanupClosePushL(writeStore);
-
-	authDb->ExternalizeL(writeStore);
-
-	CleanupStack::PopAndDestroy(&writeStore);
-
-	CleanupStack::PopAndDestroy(1,authDb);
-
-	SetTestStepResult(res ? EPass : EFail);
-	
-__UHEAP_MARKEND;	
-	return TestStepResult();
-	}
-
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/step_multithreaded.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,233 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description:  Multi threaded tests on AuthServer.
-*
-*/
-
-
-#include "tAuthSvrStep.h"
-#include "authserver/authclient.h"
-#include "authserver/authmgrclient.h"
-
-
-
-using namespace AuthServer;
-
-//Active object for registration
-class CMultiThreadedRegisterActive : public CActive
-    {
-    public:
-     CMultiThreadedRegisterActive(RAuthMgrClient& aClient, HBufC* aIdentityString, CIdentity*& aResult) : 
-         CActive(EPriorityNormal),
-         iFirstTime(true),
-         iClient(aClient), 
-         iResult(aResult),
-         iIdentityString(aIdentityString),
-         iErr(KErrNone)
-        {
-        CActiveScheduler::Add(this);
-        }
-    ~CMultiThreadedRegisterActive()
-        {
-        delete iIdentityString; 
-        }
-    void doReg()
-        {
-        SetActive();        
-        TRequestStatus* status = &iStatus;
-        User::RequestComplete(status, KErrNone);
-        iFirstTime = ETrue;
-        }
-        void DoCancel() 
-        {
-        }
-     void RunL() 
-        {
-        iErr = iStatus.Int();
-        if (iFirstTime)
-            {
-            SetActive();
-            iStatus = KRequestPending;
-            iClient.RegisterIdentityL(iResult, *iIdentityString, iStatus);
-            iFirstTime = false;
-            }
-        else
-            {
-            iErr = iStatus.Int();
-            RDebug::Printf("iErr = %d", iErr);
-            CActiveScheduler::Stop();
-            }
-        }
-        
-    TBool iFirstTime;
-    RAuthMgrClient& iClient;
-    CIdentity*& iResult;
-    HBufC* iIdentityString;
-    TInt iErr;
-    };
-
-CTMultiThreaded::~CTMultiThreaded()
-	{}
-
-CTMultiThreaded::CTMultiThreaded(CTAuthSvrServer& aParent): iParent(aParent)
-
-	{
-	
-	SetTestStepName(KTMultiThreadedTest);
-	}
-
-TVerdict CTMultiThreaded::doTestStepPreambleL()
-
-	{
-	CTStepActSch::doTestStepPreambleL();	
-	return TestStepResult();
-	}
-
-TVerdict CTMultiThreaded::doTestStepPostambleL()
-
-    {
-    
-    CTStepActSch::doTestStepPostambleL();
-    return TestStepResult();
-    }
-
-TVerdict CTMultiThreaded::doTestStepL()
-	{
-	SetTestStepResult(EPass);
-	Logger().ShareAuto();
-	//Initialize AuthServer.
-	InitAuthServerFromFileL();  
-	
-	
-	//Setup two threads which request for registration concurrently.    
-	//Create first thread.
-	RThread firstThread;
-	TInt err(0);
-	TThreadParams firstThreadParams;
-	err = firstThread.Create( _L("First Thread"), (TThreadFunction)runMultiThreadedTest, 
-                                    KDefaultStackSize, KMinHeapSize, 1024*1024 /*Max heap size*/, &firstThreadParams);
-	if(err != KErrNone)
-	    {
-	    ERR_PRINTF2(_L("Couldn't start first thread. Error = %d"), err);
-	    SetTestStepResult(EFail);
-	    return TestStepResult();
-	    }
-	    
-	// Setup the requeststatus for firstThread completion notification.
-	TRequestStatus firstThreadFinishStatus;
-	firstThread.Logon(firstThreadFinishStatus);
-	
-	
-	
-	//Setup the second thread similarly.
-	RThread secondThread;
-	TThreadParams secondThreadParams;
-    err = secondThread.Create( _L("Second Thread"), (TThreadFunction)runMultiThreadedTest, 
-									KDefaultStackSize, KMinHeapSize, 1024*1024 /*Max heap size*/, &secondThreadParams);
-    if(err != KErrNone)
-        {
-        ERR_PRINTF2(_L("Couldn't start second thread. Error = %d"), err);
-        SetTestStepResult(EFail);
-        return TestStepResult();
-        }
-        
-    // Setup the requeststatus for secondThread completion notification.
-    TRequestStatus secondThreadFinishStatus;
-    secondThread.Logon(secondThreadFinishStatus);
-    
-    //Resume both threads.
-	firstThread.Resume();   
-	secondThread.Resume();   
-	
-	//Wait for either request to complete.
-	User::WaitForRequest(firstThreadFinishStatus, secondThreadFinishStatus );     
-	
-	//Now, wait for the unfinished thread.
-	User::WaitForRequest(firstThreadFinishStatus == KRequestPending? firstThreadFinishStatus:secondThreadFinishStatus);
-	
-	INFO_PRINTF1(_L("Both Threads completed."));
-	INFO_PRINTF2(_L("First thread completed with %d."), firstThreadParams.result);
-	INFO_PRINTF2(_L("Second thread completed with %d."), secondThreadParams.result);
-	
-	if((firstThreadParams.result != KErrServerBusy && secondThreadParams.result != KErrNone) &&
-	        (firstThreadParams.result != KErrNone && secondThreadParams.result != KErrServerBusy))
-	    {
-	    SetTestStepResult(EFail);
-	    }
-	firstThread.Close();
-	secondThread.Close();
-	return TestStepResult();
-	}
-
-
-
-void CTMultiThreaded::runMultiThreadedTest(TThreadParams* aParams)
-    {
-    CTrapCleanup* cleanup = CTrapCleanup::New();
-    CActiveScheduler* sched(0);
-    
-    TRAPD(err, sched = new (ELeave) CActiveScheduler);
-    if(err != KErrNone)
-        {
-        delete cleanup;
-        User::Exit(err);
-        }
-    CActiveScheduler::Install(sched); 
-   
-    
-    /* Switch case can be added here to generalize this function to run any method.
-     * For now, only registration is called.
-     */
-    
-    TRAPD(ret,doRegisterL(*aParams));
-	
-	RDebug::Printf("doRegisterL returned %d", ret);
-    
-    delete cleanup;
-    delete sched;
-    }
-
-
-void CTMultiThreaded::doRegisterL(TThreadParams& aParams)
-    {
-    _LIT(KIdString, "User1");
-    
-    RAuthMgrClient client;
-    User::LeaveIfError(client.Connect());
-    CleanupClosePushL(client);
-    
-    HBufC* identityString = KIdString().AllocLC();
-    CIdentity* identity1 = 0;
-    
-    CMultiThreadedRegisterActive* active = new (ELeave)CMultiThreadedRegisterActive(client, identityString, identity1);
-    CleanupStack::PushL(active);
-    active->doReg();
-    CActiveScheduler::Start();
-    
-    //Store the error code in aParams.
-    aParams.result = active->iErr;
-    if(aParams.result == KErrNone)
-        {
-        RDebug::Printf("Registered new Identity! Id = %x", identity1->Id());
-        }
-    else
-        {
-        RDebug::Printf("Registration Failed !");
-        }
-    
-    delete identity1;
-    
-    CleanupStack::Pop(3, &client);
-    }
-
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/step_oom.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,861 +0,0 @@
-/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include "tAuthSvrStep.h"
-
-#include "authserver/authclient.h"
-#include "authserver/authmgrclient.h"
-#include "authrepository.h"
-#include <scs/cleanuputils.h>
-
-using namespace AuthServer;
-class CAuthOomActive : public CActive
-    {
-    public:
-    CAuthOomActive(RAuthMgrClient& aClient, CAuthExpression* aExpression,
-				 TInt aFresh, TBool aClientSpecific, TBool aAuthViaAlias, const TDesC& aClientMessage, TBool aStop = ETrue) : 
-         CActive(EPriorityNormal),
-         iClient(aClient),
-		 iResult(EFail),
-         iRunCount(0),
-         iAe(aExpression),
-         iStop(aStop),
-         iFresh(aFresh),
-         iIdToStore(0), 
-         iClientSpecific(aClientSpecific),
-         iAuthViaAlias(aAuthViaAlias),
-         iClientMessage(aClientMessage)
-        {
-        CActiveScheduler::Add(this);
-        }
-    
-   void doAuth() 
-        {
-        SetActive();		
-		TRequestStatus* status = &iStatus;
-		User::RequestComplete(status, KErrNone);
-		iRunCount = 0;
-        }
-	void DoCancel() 
-        {
-        }
-        
-    TInt RunError(TInt aError)
-    	{
-    	 TRequestStatus* status = &iStatus;
-    	  if(iStatus.Int() == KErrNoMemory)
-    	 	 {
-    	 	 CActiveScheduler::Stop();
-    	 	 User::Leave(aError);
-    	 	   
-    	 	 }
-    	  else if (iStatus == KRequestPending)
-    	     {   		 
-    	      User::RequestComplete(status, aError);
-    	      CActiveScheduler::Stop();
-    	      User::Leave(aError);
-    	     }
-    	       	
-    	  CActiveScheduler::Stop();
-    	  if(aError == KErrNoMemory)
-    		  {
-    		  User::Leave(aError);
-    		  }
-    	  return KErrNone;
-    	}
-    	
-    void RunL() 
-        {
-        iErr = iStatus.Int();
-        TUid val = TUid::Uid(0);
-		switch (iRunCount)
-		  {
-		  case 0:
-		  	{
-		  	iId = 0;
-
-			TUid uid = TUid::Uid(0);
-				
-	
-			iClient.AuthenticateL(*iAe, iFresh, iClientSpecific, val, EFalse, iClientMessage, iId, iStatus);
-		
-			SetActive();
-
-			break;
-		  	}
-            
-		  case 1:
-			if (0 != iId)
-				{
-				iIdToStore = iId->Id();
-				delete iId;
-				iId = NULL;
-				}
-			
-			iResult = iStatus == KErrNone ? EPass : EFail;
-            iErr = iStatus.Int();
-            if(iErr == KErrNoMemory)
-            	{
-            	User::Leave(KErrNoMemory);
-            	}
-			if (iStop)
-                {
-                CActiveScheduler::Stop();
-                }
-
-			break;
-			
-     	  default:
-			iResult = EFail;
-			
-			if (iStop)
-			    {
-			    CActiveScheduler::Stop();
-			    }
-		    }
-		  ++iRunCount;
-          }
-
-	~CAuthOomActive()
-		{
-		if(iId != NULL)
-			delete iId;
-		}
-          
-   		
-	RAuthMgrClient& iClient;
-	TVerdict iResult;
-	TInt iRunCount;
-	CAuthExpression* iAe;
-	CIdentity* iId;
-    TBool iStop;
-    TInt iErr;
-    TInt iFresh;
-    TIdentityId iIdToStore;
-    TBool iClientSpecific;
-    TBool iAuthViaAlias;
-    const TDesC& iClientMessage;
-    };
-
-class CRegOomActive : public CActive
-    {
-    public:
-    CRegOomActive(RAuthMgrClient& aClient, CIdentity*& aResult) : 
-         CActive(EPriorityNormal),
-         iFirstTime(true),
-         iClient(aClient), 
-         iResult(aResult),
-         iErr(KErrNone)
-        {
-        CActiveScheduler::Add(this);
-        }
-    void doReg()
-        {
-        SetActive();		
-		TRequestStatus* status = &iStatus;
-		User::RequestComplete(status, KErrNone);
-		iFirstTime = ETrue;
-        }
-        void DoCancel() 
-        {
-        }
-     void RunL() 
-        {
-        iErr = iStatus.Int();
-        if (iFirstTime)
-            {
-			SetActive();
-            iStatus = KRequestPending;
-            iClient.RegisterIdentityL(iResult, _L("SOMENAME"), iStatus);
-            iFirstTime = false;
-            }
-        else
-            {
-            iErr = iStatus.Int();
-            
-            if (iErr == KErrNoMemory)
-            	{
-            	User::Leave(KErrNoMemory);
-            	}
-            CActiveScheduler::Stop();
-			}
-        }
-     TInt RunError(TInt error)
-    	 {
-    	 
-    	 TRequestStatus* status = &iStatus;
-    	 if(iStatus.Int() == KErrNoMemory)
-    		 {
-    		 CActiveScheduler::Stop();
-    		 User::Leave(error);
-    		   
-    		 }
-    	 else if (iStatus == KRequestPending)
-    		 {   		 
-    		 User::RequestComplete(status, error);
-    		 CActiveScheduler::Stop();
-    		 User::Leave(error);
-    		 }
-     	
-    	 CActiveScheduler::Stop();
-         User::Leave(error);
-         return KErrNone;
-    	 }
-     
-     ~CRegOomActive()
-    	 {
-    	 Cancel(); 	 
-    	 }
-        
-    TBool iFirstTime;
-    RAuthMgrClient& iClient;
-    CIdentity*& iResult;
-    TInt iErr;
-    };
-
-class CTrainOomActive : public CActive
-    {
-    public:    
-    CTrainOomActive(RAuthMgrClient& aClient, TPluginId plugin1IdValue, TIdentityId iIdFromFile, TBool aStop = ETrue) : 
-         CActive(EPriorityNormal),
-         iClient(aClient),
-		 iResult(EFail),
-         iRunCount(0),
-         iStop(aStop),
-         pluginIdVal(plugin1IdValue),         
-         idToTrain (iIdFromFile)
-        {
-        CActiveScheduler::Add(this);
-        }
-    void doTrain() 
-        {
-
-        SetActive();		
-		TRequestStatus* status = &iStatus;		    
-		User::RequestComplete(status, KErrNone);
-		iRunCount = 0;
-        }
-        void DoCancel() 
-        {
-        }
-     void RunL() 
-        {
-        iErr = iStatus.Int();
-        if (iStatus.Int() != KErrNone)
-            {
-            }
-		switch (iRunCount)
-		  {
-		  case 0:
-				iStatus = KRequestPending;
-	            iClient.TrainPlugin(idToTrain, pluginIdVal, iStatus);
-				SetActive();
-			break;
-
-   		  case 1:
-			iResult = iStatus.Int() == KErrNone ? EPass : EFail;
-            iErr = iStatus.Int();
-            if (iErr == KErrNoMemory)
-                {
-                 User::Leave(KErrNoMemory);
-                }
-			if (iStop)
-                {
-                CActiveScheduler::Stop();
-                }
-
-			break;
-
-     	  default:
-			iResult = EFail;
-			  if (iErr == KErrNoMemory)
-			    {
-			    User::Leave(KErrNoMemory);
-			    }
-			if (iStop)
-			    {
-			    CActiveScheduler::Stop();
-			    }
-		    }
-		  ++iRunCount;
-          }
-     TInt RunError(TInt error)
-    	 {
-
-    	 TRequestStatus* status = &iStatus;
-    	 if(iStatus.Int() == KErrNoMemory)
-    		 {
-    		 CActiveScheduler::Stop();
-    		 User::Leave(error);
-    		   
-    		 }
-    	 else if (iStatus == KRequestPending)
-    		 {   		 
-    		 User::RequestComplete(status, error);
-    		 CActiveScheduler::Stop();
-    		 User::Leave(error);
-    		 }
-     	
-    	 CActiveScheduler::Stop();
-         User::Leave(error);
-         return KErrNone;
-    	 
-    	 }
-	RAuthMgrClient& iClient;
-	TVerdict iResult;
-	TInt iRunCount;
-    TBool iStop;
-    TInt iErr;
-    TPluginId pluginIdVal;
-    TIdentityId idToTrain;
-    };
-
-CAuthSvrOom::~CAuthSvrOom()
-/**
-  Destructor
- */
-	{}
-
-CAuthSvrOom::CAuthSvrOom(CTAuthSvrServer& aParent): iParent(aParent)
-/**
-  Constructor
- */
-	{
-	
-	SetTestStepName(KTAuthServerOom);
-	}
-
-TVerdict CAuthSvrOom::doTestStepPreambleL()
-/**
-  @return - TVerdict code
-
- */
-	{
-	CTStepActSch::doTestStepPreambleL();	
-	CActiveScheduler::Install(iActSchd);
-	return TestStepResult();
-	}
-
-
-TVerdict CAuthSvrOom::doTestStepL()
-	{
-	
-	//Client side/Server side OOM test or Performance test??
-	
-	TInt testType(0);
-	GetIntFromConfig(ConfigSection(), _L("TestType"), testType);
-	ReadTestConfigurationL();
-	switch(testType)
-		{
-		case 1: doClientOOMTestL();
-				break;
-		
-		case 2: doServerOOMTestL();
-				break;
-				
-		case 3: doPerformanceTestL();
-				break;
-				
-		default:
-			//Should not reach here !
-			   break;
-		}
-	
-	return TestStepResult();
-	}
-TVerdict CAuthSvrOom::doClientOOMTestL()
-/**
- * 	Runs the test step under OOM Conditions checking that each heap allocation is fail safe
- */
-	{	
-	// Pre and Post test heap cell allocation counts
- 	TInt cellCountAfter = 0;
-	TInt cellCountBefore = 0;
-	
-	/**
-	 * The loop tests each heap allocation under out of memory conditions to determine whether
-	 * the framework cleans up correctly without leaking memory.
-	 * 
-	 * The 'for' loop does not have any completion criteria, so the loop breaks out as soon 
-	 * as any of the following events occur:
-	 * a) The pre and post heap cell counts mismatch signalling a memory leakage
-	 * b) An unexpected leave (any leave with an error code other than 'KErrNoMemory')
-	 * c) All heap allocations have been tested and the test returns 'KErrNone'
-	 */
-	for (TInt testCount = 0; ; ++testCount)
- 		{
- 		__UHEAP_RESET;
- 		__UHEAP_MARK;
- 		
-__UHEAP_SETFAIL(RHeap::EDeterministic, testCount+1);
-		cellCountBefore = User::CountAllocCells();
- 		AuthServer::RAuthMgrClient authMgrClient;
- 		CleanupClosePushL(authMgrClient);
- 		authMgrClient.Connect();
- 		
- 		TRAPD(err, doTestL(authMgrClient));
- 		authMgrClient.ShutdownServer();
- 		CleanupStack::PopAndDestroy(&authMgrClient);
- 		
- 		cellCountAfter = User::CountAllocCells();
- __UHEAP_MARKEND;
- 		
- 		
- 		if (err == KErrNone)
- 			{
-			INFO_PRINTF1(_L("Client OOM Test Finished"));
- 			break;
- 			}
- 		else if(err == KErrNoMemory)
- 			{
- 			
- 			if (cellCountBefore != cellCountAfter)
- 				{
- 				ERR_PRINTF2(_L("OOM Test Result: Failed - Memory leakage on iteration %d"), testCount);
- 				SetTestStepResult(EFail);
- 				break;
- 				}
- 			else
- 				{
- 				INFO_PRINTF2(_L("OOM Pass %d"), testCount);
- 				}
- 			}
- 		else
- 			{
- 			User::Leave(err);
- 			break;
- 			}
-		}
-	
-	
-	return TestStepResult();
-	}
-
-TVerdict CAuthSvrOom::doServerOOMTestL()
-	{
-
-	TInt err(0),err2(0);	
-	AuthServer::RAuthMgrClient authMgrClient;
-	CleanupClosePushL(authMgrClient);
-	authMgrClient.Connect();	
-	// Pre and Post test heap cell allocation counts
-	for (TInt testCount=0; ; ++testCount)
- 		{
- 		
- 		err = authMgrClient.SetServerHeapFail(testCount+1);
- 		if(KErrNoMemory == err)
- 			{
- 			ERR_PRINTF1(_L("ReInitializing..."));
- 			authMgrClient.ResetServerHeapFail();
- 			continue;
- 			}
-
- 		TRAPD(retStepVal, doTestL(authMgrClient));
- 		err2 = authMgrClient.ResetServerHeapFail();
- 		if((err == KErrServerTerminated) || (err2 == KErrServerTerminated))
- 			{
- 			INFO_PRINTF1(_L("AuthServer Terminated"));	
- 			SetTestStepResult(EFail);
- 			break;
- 			}
- 			
- 		if(KErrNone != err)
- 			{
- 			SetTestStepResult(EFail);
- 			break;
- 			}
- 		 		
- 	
- 		if(KErrNoMemory == retStepVal)
- 			{
- 			INFO_PRINTF2(_L("OOM Pass %d"), testCount);
- 			}
- 		else if (KErrNone == retStepVal)
- 			{
- 			INFO_PRINTF1(_L("Server OOM Test Finished"));
- 			break;
- 			}
- 		else 
- 			{
- 			// Propagate all errors apart from KErrNoMemory
- 			User::Leave(retStepVal);
- 			}
- 		
- 		
- 		}// for
-		CleanupStack::PopAndDestroy(&authMgrClient);
-		WaitForServerToReleaseDb();
-	return TestStepResult();
-	}
-
-
-TVerdict CAuthSvrOom::doTestL(AuthServer::RAuthMgrClient& ac)
-	{
-	TInt oomValue;
-	GetIntFromConfig(ConfigSection(), _L("OOMTest"), oomValue);
-	
-	switch(oomValue)
-		{
-		case 1:
-			
-			break;
-		
-		case 2:
-			//Registration API check			
-			doRegOOMTestL(ac);		
-			break;
-		
-		case 3:
-			//Synchronous Authenticate API check	
-			doSyncAuthOOMTestL(ac);
-			break;
-		
-		case 4:
-			//Asynchronous Authenticate API check
-			doAsyncAuthOOMTestL(ac);
-			break;
-			
-		case 5:
-			//Set preffered plugin type check
-			doSetPreferredTypeL(ac);
-			break;
-			
-		case 6:
-			//Check Remove Identity API
-			doRemoveIdentityL(ac);
-			break;
-		case 7:
-			//Check forget plugin API
-			doForgetPluginL(ac);
-			break;
-		case 8:
-			//Check Retrain Plugin API
-			doRetrainPluginL(ac);
-			break;
-		case 9:
-			//Check List PluginsL API
-			doListPluginsL(ac);
-			break;
-		case 10:
-			//Check List Active Plugins API
-			doListActivePluginsL(ac);
-			break;
-		case 11:
-			//Check List Plugins of type API
-			doListPluginsOfTypeL(ac);
-			break;
-		case 12:
-			//Check List Plugins With Training status API
-			doListPluginsWithTrainingStatusL(ac);
-			break;
-		case 13:
-			//Check List Authentication aliases API
-			doListAuthStrengthAliasesL(ac);
-			break;
-		case 14:
-			// Check the reset API (all plugins)
-			doResetAll(ac);
-			break;
-		case 15:
-			// Check the reset API (plugins of specified type)
-			doResetType(ac);
-			break;
-		case 16:
-			// Check the reset API (specified plugins)
-			doResetList(ac);
-			break;
-		default:
-			//Should never reach here
-			break;
-		}
-	return TestStepResult();
-	}
-
-void CAuthSvrOom::doStartupTestL()
-	{
-	RAuthClient r1;
-	CleanupClosePushL(r1);
-	r1.Connect();
-	CleanupStack::PopAndDestroy(&r1);	
-	}
-
-void CAuthSvrOom::doRegOOMTestL(AuthServer::RAuthMgrClient &ac)
-	{
-	
-	CIdentity* identity1 = 0;
-    CRegOomActive active(ac, identity1);
-    active.doReg();
-	CActiveScheduler::Start();
-	delete identity1;
-	}
-
-void CAuthSvrOom::doSyncAuthOOMTestL(AuthServer::RAuthMgrClient &ac)
-	{
-	TUid val = TUid::Uid(0);
-	CIdentity* id = 0;
-	CAuthExpression* expr = CreateAuthExprLC(iExprString);			
-	id = ac.AuthenticateL(*expr, iFreshnessVal, iClientSpecificKeyVal, val, EFalse, iMessage);
-	
-	delete id;
-	id = 0;
-	CleanupStack::PopAndDestroy(expr);
-	}
-
-void CAuthSvrOom::doAsyncAuthOOMTestL(AuthServer::RAuthMgrClient &ac)
-	{
-	CAuthExpression* expr = ac.CreateAuthExpressionL(iExprString);
-	CleanupStack::PushL(expr);
-		
-	CAuthOomActive active(ac, expr, iFreshnessVal, iClientSpecificKeyVal, EFalse, iMessage);
-	active.doAuth();		
-	CActiveScheduler::Start();
-			
-	if(expr)
-		{
-		CleanupStack::PopAndDestroy(expr);
-		}
-	}
-
-void CAuthSvrOom::doSetPreferredTypeL(AuthServer::RAuthMgrClient &ac)
-	{
-	TInt plugin(0);
-	GetHexFromConfig(ConfigSection(),KKnowledgePrefsTag, plugin);
-	TPluginId id = plugin;
-	ac.SetPreferredTypePluginL(EAuthKnowledge, id);
-	}
-
-void CAuthSvrOom::doRemoveIdentityL(AuthServer::RAuthMgrClient &ac)
-	{
-	TInt plugin1IdValue = 0;	
-	GetHexFromConfig(ConfigSection(),_L("plugin1Id"), plugin1IdValue);
-	
-	//Read the identityId to be removed
-	TIdentityId idToRemove = getLastAuthId();
-	ac.RemoveIdentityL(idToRemove);
-	}
-
-void CAuthSvrOom::doForgetPluginL(AuthServer::RAuthMgrClient &ac)
-	{
-	TInt plugin1IdValue = 0;	
-	GetHexFromConfig(ConfigSection(),_L("plugin1Id"), plugin1IdValue);
-	
-	//Read the identityId to be forgotten
-	TIdentityId idToForget = getLastAuthId();
-	ac.ForgetPluginL( idToForget , plugin1IdValue);
-	}
-
-void CAuthSvrOom::doRetrainPluginL(AuthServer::RAuthMgrClient &ac)
-	{
-	TInt plugin1IdValue = 0;
-	GetHexFromConfig(ConfigSection(),_L("plugin1Id"), plugin1IdValue);
-	
-	TIdentityId idToTrain = getLastAuthId();
-	//Train the plugin again with this identity. 	    
- 	CTrainOomActive active(ac, plugin1IdValue, idToTrain);
-	active.doTrain();		
-	CActiveScheduler::Start();			
-	}
-
-void CAuthSvrOom::doListPluginsL(AuthServer::RAuthMgrClient &ac)
-	{
-	RPluginDescriptions pluginList1;
-	TCleanupItem cleanup(CleanupEComArray, &pluginList1);
-	CleanupStack::PushL(cleanup);					
-	ac.PluginsL(pluginList1);	
-	CleanupStack::PopAndDestroy(&pluginList1);
-		
-	}
-
-void CAuthSvrOom::doListActivePluginsL(AuthServer::RAuthMgrClient &ac)
-	{
-	RPluginDescriptions pluginList1;
-	TCleanupItem cleanup(CleanupEComArray, &pluginList1);
-	CleanupStack::PushL(cleanup);					
-	ac.ActivePluginsL(pluginList1);	
-	CleanupStack::PopAndDestroy(&pluginList1);
-	}
-
-void CAuthSvrOom::doListPluginsOfTypeL(AuthServer::RAuthMgrClient &ac)
-	{
-	RCPointerArray<const CPluginDesc> pluginsList;
-	CleanupClosePushL(pluginsList);
-	TAuthPluginType t1 = EAuthKnowledge;				
-	ac.PluginsOfTypeL(t1, pluginsList);	
-	CleanupStack::PopAndDestroy(&pluginsList);
-	}
-
-void CAuthSvrOom::doListPluginsWithTrainingStatusL(AuthServer::RAuthMgrClient &ac)
-	{
-	RCPointerArray<const CPluginDesc> pluginsList;
-	CleanupClosePushL(pluginsList);		
-	TAuthTrainingStatus t1 = EAuthTrained;
-	ac.PluginsWithTrainingStatusL(t1, pluginsList);	
-	CleanupStack::PopAndDestroy(&pluginsList);
-	}
-
-void CAuthSvrOom::doListAuthStrengthAliasesL(AuthServer::RAuthMgrClient &ac)
-	{
-	RPointerArray<HBufC> aliasList;
-	CleanupResetAndDestroyPushL(aliasList);
-	ac.ListAuthAliasesL(aliasList);
-	CleanupStack::PopAndDestroy(&aliasList);
-	}
-
-// Check the reset API (all plugins)
-void CAuthSvrOom::doResetAll(AuthServer::RAuthMgrClient& ac)
-	{
-	TIdentityId identity = getLastAuthId(); // Anything but 0 since client does sanity check
-	ac.ResetIdentityL(identity, _L("1234"));
-	}
-
-// Check the reset API (plugins of specified type)
-void CAuthSvrOom::doResetType(AuthServer::RAuthMgrClient& ac)
-	{
-	TIdentityId identity = getLastAuthId(); // Anything but 0 since client does sanity check
-	ac.ResetIdentityL(identity, EAuthKnowledge, _L("2342"));
-	}
-
-// Check the reset API (specified plugins)
-void CAuthSvrOom::doResetList(AuthServer::RAuthMgrClient& ac)
-	{
-	TIdentityId identity = getLastAuthId(); // Anything but 0 since client does sanity check
-	TInt pluginId(0);
-	GetHexFromConfig(ConfigSection(),_L("plugin1Id"), pluginId);
-	RArray<TPluginId> pluginList;
-	CleanupClosePushL(pluginList);
-	RPointerArray<const HBufC> regDataList;
-	CleanupResetAndDestroyPushL(regDataList);
-	pluginList.AppendL(pluginId);
-	regDataList.AppendL(_L("1344").AllocL());
-	ac.ResetIdentityL(identity, pluginList, regDataList);
-	CleanupStack::PopAndDestroy(2, &pluginList);
-	}
-
-void CAuthSvrOom::ReadTestConfigurationL()
-	{
-	
-	TPtrC displayMessage;
-	TBool messageSent = (GetStringFromConfig(ConfigSection(),_L("DisplayMessage"), displayMessage) != EFalse);
-	iMessage = displayMessage;
-	ClientMessage(messageSent, displayMessage);
-	if(!messageSent)
-		{
-		iMessage = KNullDesC();
-		}
-	
-	TPinValue pinValue = GetPinFromOutputFileL();
-	CreatePinPluginInputFileL(EPinPluginIdentify, pinValue);
-		
-
-	GetStringFromConfig(ConfigSection(),_L("pluginId"), iExprString);
-  	
-	
-	//Retrieve the value of 'freshness' from the ini file, but if it's absent use the default value
-	if(GetIntFromConfig(ConfigSection(),_L("freshness"), iFreshnessVal) == EFalse)
-		{
-		iFreshnessVal = 10;
-		}
-	 		
-	iClientSpecificKeyVal = EFalse;	 	
-	//Retrieve the value of 'clientSpecificKey' from the ini file, but if it's absent use the default value
-	if(GetBoolFromConfig(ConfigSection(),_L("clientSpecificKey"), iClientSpecificKeyVal) == EFalse)
-		{
-		iClientSpecificKeyVal = EFalse;
-		}
-	 	
-	iDefaultpluginusage = EFalse;
-	if(GetBoolFromConfig(ConfigSection(),_L("defaultpluginusage"), iDefaultpluginusage ) == EFalse)
-		 {
-		 iDefaultpluginusage  = EFalse;
-		 }
-
-	}
-
-
-TVerdict CAuthSvrOom::doTestStepPostambleL()
-/**
-  @return - TVerdict code
-
- */
-	{
-	
-	CTStepActSch::doTestStepPostambleL();
-	return TestStepResult();
-	}
-
-TVerdict CAuthSvrOom::doPerformanceTestL()
-/**
- * 	Runs the test step under OOM Conditions checking that each heap allocation is fail safe
- */
-	{
-	TInt oomValue;
-	GetIntFromConfig(ConfigSection(), _L("OOMTest"), oomValue);
-	GetIntFromConfig(ConfigSection(), _L("iterationCount"), iIterationCount);	
-	StartTimer();
-	
-	for (TInt i = 0; i < iIterationCount; ++i)
- 		{
- 		
- 		AuthServer::RAuthMgrClient authMgrClient;
- 		CleanupClosePushL(authMgrClient);
- 		authMgrClient.Connect();
- 	
- 		TRAPD(err, doTestL(authMgrClient));
- 		authMgrClient.ShutdownServer();
- 		CleanupStack::PopAndDestroy(&authMgrClient);
- 		if(err != KErrNone)
- 			{
- 			User::Leave(err);
- 			break;
- 			}
- 
- 		ReadTestConfigurationL();
- 		if (oomValue == 2)
- 			{
- 			RemoveExistingDbL();
- 			}
- 		}
-	
-	StopTimerAndPrintResultL();
-	return TestStepResult();
-	}
-	
-void CAuthSvrOom::PrintPerformanceLog(TTime aTime)
-	{
-	TDateTime timer = aTime.DateTime();
-	INFO_PRINTF6(_L("%S,%d:%d:%d:%d"), &KPerformanceTestInfo(), timer.Hour(), timer.Minute(), timer.Second(), timer.MicroSecond());
-	}
-
-void CAuthSvrOom::StartTimer()
-	{
-	iStartTime.HomeTime();
-	PrintPerformanceLog(iStartTime);
-	}
-
-void CAuthSvrOom::StopTimerAndPrintResultL()
-	{
-	TTime endTime;
-	endTime.HomeTime();
-	PrintPerformanceLog(endTime);
-	
-	TTimeIntervalMicroSeconds duration = endTime.MicroSecondsFrom(iStartTime);
-	TInt actualDuration = (I64INT(duration.Int64())/1000)/iIterationCount; // in millisecond
-	
-	INFO_PRINTF3(_L("%S,%d"), &KActualTestCaseDuration(), actualDuration);
-	}
-
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/step_postmarketplugin.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,468 +0,0 @@
-/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CTestStep derived implementation
-*
-*/
-
- 
-#include "tAuthSvrStep.h"
-#include <f32file.h>
-#include <ecom/ecom.h>
-#include <e32test.h>
-
-#include "authserver/authclient.h"
-#include "authserver/authmgrclient.h"
-
-using namespace AuthServer;
-
-const TInt KWaitDuration = 30000000; 
-#define WAIT_FOR3s User::After(KWaitDuration)
- 
-
-_LIT(KSysBinDir, "c:\\sys\\bin\\");
-_LIT(KRscDir, "c:\\resource\\plugins\\");
-
-CTPostMarketPlugin::CTPostMarketPlugin()
-	{
-	SetTestStepName(KTPostMarketPlugin);
-	}
-
-TVerdict CTPostMarketPlugin::doTestStepPreambleL()
-/**
- * @return - TVerdict code
- * Override of base class virtual
- */
-	{
-	SetTestStepResult(EFail);
-	
-	CTAuthSvrStepBase::doTestStepPreambleL();
-	
-	if (!GetStringFromConfig(ConfigSection(), _L("srcPlugin"), iSrcPlugin))
-		{
-		INFO_PRINTF1(_L("Source plugin not specified in the ini file"));
-		return TestStepResult();
-		}
-		
-	if (!GetStringFromConfig(ConfigSection(), _L("destPlugin"), iTargetPlugin))
-		{
-		INFO_PRINTF1(_L("Target plugin not specified in the ini file"));
-		return TestStepResult();
-		}
-		
-	if (!GetStringFromConfig(ConfigSection(), _L("srcRscFile"), iSrcRscFile))
-		{
-		INFO_PRINTF1(_L("Source resource file not specified in the ini file"));
-		return TestStepResult();
-		}
-		
-	if (!GetStringFromConfig(ConfigSection(), _L("destRscFile"), iTargetRscFile))
-		{
-		INFO_PRINTF1(_L("Target resource file not specified in the ini file"));
-		return TestStepResult();
-		}
-		
-	SetTestStepResult(EPass);
-	return TestStepResult();
-	}
-	
-
-TBool CTPostMarketPlugin::VerifyObtainedResultsWithExpectedL(AuthServer::RAuthMgrClient& aAuthMgrClient, TInt aExpectedCount, const TDesC& aExpectedPluginName)
-	{
-	RPluginDescriptions pluginList;
-	TCleanupItem cleanup(CleanupEComArray, &pluginList);
-	CleanupStack::PushL(cleanup);
-	
-	//Get a list of all the available plugins.					
-	aAuthMgrClient.PluginsL(pluginList);	
-	TInt count = pluginList.Count();
-	TBool result = ETrue;
-	if(count != aExpectedCount)
-		{
-		INFO_PRINTF3(_L("Expected plugin count %d differs from actual %d..."), &count, &aExpectedCount);
-		result = EFalse;
-		}
-		
-	if(aExpectedPluginName.Length())
-		{
-		TBool found = EFalse;
-		const TDesC* pluginName = 0;
-		for(TInt i = 0; i < count; i++)
-			{
-			pluginName = pluginList[i]->Name();
-			if(pluginName->Compare(aExpectedPluginName) == 0)
-				{
-				found = ETrue;
-				break;
-				}
-			}
-		
-		if(!found)
-			{
-			result = EFalse;
-			}
-		}
-	
-	CleanupStack::PopAndDestroy(&pluginList);	
-	return result;	
-	}
-	
-
-TVerdict CTPostMarketPlugin::doTestStepL()
-	{
-	SetTestStepResult(EFail);
-	
-	//Connect to the AuthServer	
-	AuthServer::RAuthMgrClient authMgrClient;	
-	TInt connectVal = authMgrClient.Connect();
-	if (KErrNotFound == connectVal)
-		{
-		//Retry after a delay
-		TTimeIntervalMicroSeconds32 timeInterval = 2000;	//2 Milliseconds
-		User::After(timeInterval);
-		connectVal = authMgrClient.Connect();
-		}
-	if (KErrNone != connectVal)
-		{
-		ERR_PRINTF2(_L("Unable to start a session or other connection error. Err = %d"), connectVal);
-		User::LeaveIfError(connectVal);		
-		}	
-	
-	CleanupClosePushL(authMgrClient);
-	
-	RTestUtilSession testutil;
-	User::LeaveIfError(testutil.Connect());
-	CleanupClosePushL(testutil);
-	
-	// test plugin install operation.
-	INFO_PRINTF1(_L("Test Plugin Install"));
-	TBool success = TestPluginInstallL(authMgrClient, testutil);
-	if(!success)
-		{
-		INFO_PRINTF1(_L("Test Install failed!"));
-		CleanupStack::PopAndDestroy(2, &authMgrClient);
-		return TestStepResult();
-		}
-	
-	// test plugin uninstall operation.
-	INFO_PRINTF1(_L("Test Plugin Uninstall"));
-	success = TestPluginUninstallL(authMgrClient, testutil);
-	if(!success)
-		{
-		INFO_PRINTF1(_L("Test Uninstall failed!"));
-		CleanupStack::PopAndDestroy(2, &authMgrClient);
-		return TestStepResult();
-		}
-	
-	CleanupStack::PopAndDestroy(2, &authMgrClient);
-	
-	SetTestStepResult(EPass);
-	return TestStepResult();
-	}
-
-
-TBool CTPostMarketPlugin::TestPluginInstallL(AuthServer::RAuthMgrClient& aAuthMgrClient, RTestUtilSession& aUtilSession)
-	{
-	TBool success = EFalse;
-	
-	// get the list of available plugin implementations, before an plugin installation/upgrade.
-	TInt pluginCountPreInstall = 0;
-	if(GetIntFromConfig(ConfigSection(),_L("initialPluginCount"), pluginCountPreInstall) == EFalse)
-		{
-		INFO_PRINTF1(_L("Pre Install Plugin Count not specified in the ini file"));
-		return success;
-		}
-	
-	TBool result = VerifyObtainedResultsWithExpectedL(aAuthMgrClient, pluginCountPreInstall);
-	if(!result)
-		{
-		return success;
-		}
-		
-	// Install a plugin.
-	// Incase c:\sys\bin or c:\resource\plugins directory ,doesn't exist, 
-	// move operation fails with KErrPathNotFound.So create one.
-		
-	TInt err = aUtilSession.MkDirAll(KSysBinDir);
-	if(err != KErrAlreadyExists && err != KErrNone)
-		{
-		User::Leave(err);
-		}
-		
-	err = aUtilSession.MkDirAll(KRscDir);
-	if(err != KErrAlreadyExists && err != KErrNone)
-		{
-		User::Leave(err);
-		}
-	
-	INFO_PRINTF3(_L("Moving plugin from %S to %S..."), &iSrcPlugin, &iTargetPlugin);
-	User::LeaveIfError(aUtilSession.Move(iSrcPlugin, iTargetPlugin));
-	
-	INFO_PRINTF3(_L("Moving plugin from %S to %S..."), &iSrcRscFile, &iTargetRscFile);
-	User::LeaveIfError(aUtilSession.Move(iSrcRscFile, iTargetRscFile));
-		
-	WAIT_FOR3s;
-	
-	// get the list of available plugin implementations, post installation/upgrade.
-	TInt pluginCountPostInstall = 0;
-	if(GetIntFromConfig(ConfigSection(),_L("expectedPluginCount"), pluginCountPostInstall) == EFalse)
-		{
-		INFO_PRINTF1(_L("Post Install Plugin Count not specified in the ini file"));
-		return success;
-		}
-		
-	// get the plugin implementation list post installation.This should load the plugin version based on the ROM_only field.	
-	TPtrC pluginNamePostInstall;
-	if ((!GetStringFromConfig(ConfigSection(), _L("pluginNamePostInstall"), pluginNamePostInstall)))
-		{
-		INFO_PRINTF1(_L("Post Install Plugin Name not specified in the ini file"));
-		}
-	
-	result = VerifyObtainedResultsWithExpectedL(aAuthMgrClient, pluginCountPostInstall, pluginNamePostInstall);	
-	if(!result)
-		{
-		return success;
-		}
-	
-	success = ETrue;	
-	return success;
-	}
-
-
-TBool CTPostMarketPlugin::TestPluginUninstallL(AuthServer::RAuthMgrClient& aAuthMgrClient, RTestUtilSession& aUtilSession)
-	{
-	TBool success = EFalse;
-	
-	// get the list of available plugin implementations, before an plugin installation/upgrade.
-	TInt pluginCountPreUninstall = 0;
-	if(GetIntFromConfig(ConfigSection(),_L("expectedPluginCount"), pluginCountPreUninstall) == EFalse)
-		{
-		INFO_PRINTF1(_L("Pre Uninstall Plugin Count not specified in the ini file"));
-		return success;
-		}
-	
-	TBool result = VerifyObtainedResultsWithExpectedL(aAuthMgrClient, pluginCountPreUninstall);
-	if(!result)
-		{
-		return success;
-		}
-		
-	// Install a plugin.
-	INFO_PRINTF3(_L("Moving plugin from %S to %S..."), &iTargetPlugin, &iSrcPlugin);
-	User::LeaveIfError(aUtilSession.Move(iTargetPlugin, iSrcPlugin));
-	
-	INFO_PRINTF3(_L("Moving plugin from %S to %S..."), &iTargetRscFile, &iSrcRscFile);
-	User::LeaveIfError(aUtilSession.Move(iTargetRscFile, iSrcRscFile));
-		
-	WAIT_FOR3s;
-	
-	// get the list of available plugin implementations, post uninstallation.
-	TInt pluginCountPostUninstall = 0;
-	if(GetIntFromConfig(ConfigSection(),_L("initialPluginCount"), pluginCountPostUninstall) == EFalse)
-		{
-		INFO_PRINTF1(_L("Post Uninstall Plugin Count not specified in the ini file"));
-		return success;
-		}
-		
-	// get the plugin name post uninstall.	
-	TPtrC pluginNamePostUninstall;
-	if ((!GetStringFromConfig(ConfigSection(), _L("pluginNamePostUninstall"), pluginNamePostUninstall)))
-		{
-		INFO_PRINTF1(_L("Post Uninstall Plugin Name not specified in the ini file"));
-		}
-	
-	result = VerifyObtainedResultsWithExpectedL(aAuthMgrClient, pluginCountPostUninstall, pluginNamePostUninstall);	
-	if(!result)
-		{
-		return success;
-		}
-	
-	success = ETrue;	
-	return success;
-	}
-	
-	
-CTPostMarketPlugin::~CTPostMarketPlugin()
-/**
- Destructor
-*/
-	{};
-	
-CTInstallPluginStep::CTInstallPluginStep()
-	{
-	SetTestStepName(KTInstallPluginStep);
-	}
-
-TVerdict CTInstallPluginStep::doTestStepPreambleL()
-/**
- * @return - TVerdict code
- * Override of base class virtual
- */
-	{
-	SetTestStepResult(EFail);
-	
-	CTAuthSvrStepBase::doTestStepPreambleL();
-	
-	if (!GetStringFromConfig(ConfigSection(), _L("srcPlugin"), iSrcPlugin))
-		{
-		INFO_PRINTF1(_L("Source plugin not specified in the ini file"));
-		return TestStepResult();
-		}
-		
-	if (!GetStringFromConfig(ConfigSection(), _L("destPlugin"), iTargetPlugin))
-		{
-		INFO_PRINTF1(_L("Target plugin not specified in the ini file"));
-		return TestStepResult();
-		}
-		
-	if (!GetStringFromConfig(ConfigSection(), _L("srcRscFile"), iSrcRscFile))
-		{
-		INFO_PRINTF1(_L("Source resource file not specified in the ini file"));
-		return TestStepResult();
-		}
-		
-	if (!GetStringFromConfig(ConfigSection(), _L("destRscFile"), iTargetRscFile))
-		{
-		INFO_PRINTF1(_L("Target resource file not specified in the ini file"));
-		return TestStepResult();
-		}
-		
-	SetTestStepResult(EPass);
-	return TestStepResult();
-	}
-	
-
-TVerdict CTInstallPluginStep::doTestStepL()
-	{
-	SetTestStepResult(EFail);
-	
-	//Connect to the AuthServer	
-	RTestUtilSession testUtil;
-	User::LeaveIfError(testUtil.Connect());
-	CleanupClosePushL(testUtil);
-	
-	// simulate plugin install operation via move operation.
-	INFO_PRINTF1(_L("Install RAM Plugin "));
-	
-	// Install a plugin.
-	// Incase c:\sys\bin or c:\resource\plugins directory ,doesn't exist, 
-	// move operation fails with KErrPathNotFound.So create one.
-	
-	TInt err = testUtil.MkDirAll(KSysBinDir);
-	if(err != KErrAlreadyExists && err != KErrNone)
-		{
-		User::Leave(err);
-		}
-		
-	err = testUtil.MkDirAll(KRscDir);
-	if(err != KErrAlreadyExists && err != KErrNone)
-		{
-		User::Leave(err);
-		}
-	
-	INFO_PRINTF3(_L("Moving plugin from %S to %S..."), &iSrcPlugin, &iTargetPlugin);
-	User::LeaveIfError(testUtil.Move(iSrcPlugin, iTargetPlugin));
-	
-	INFO_PRINTF3(_L("Moving plugin from %S to %S..."), &iSrcRscFile, &iTargetRscFile);
-	User::LeaveIfError(testUtil.Move(iSrcRscFile, iTargetRscFile));
-			
-	CleanupStack::PopAndDestroy(&testUtil);
-	
-	SetTestStepResult(EPass);
-	return TestStepResult();
-	}
-
-
-CTInstallPluginStep::~CTInstallPluginStep()
-/**
- Destructor
-*/
-	{};
-	
-
-CTUninstallPluginStep::CTUninstallPluginStep()
-	{
-	SetTestStepName(KTUninstallPluginStep);
-	}
-
-TVerdict CTUninstallPluginStep::doTestStepPreambleL()
-/**
- * @return - TVerdict code
- * Override of base class virtual
- */
-	{
-	SetTestStepResult(EFail);
-	
-	CTAuthSvrStepBase::doTestStepPreambleL();
-	
-	if (!GetStringFromConfig(ConfigSection(), _L("srcPlugin"), iSrcPlugin))
-		{
-		INFO_PRINTF1(_L("Source plugin not specified in the ini file"));
-		return TestStepResult();
-		}
-		
-	if (!GetStringFromConfig(ConfigSection(), _L("destPlugin"), iTargetPlugin))
-		{
-		INFO_PRINTF1(_L("Target plugin not specified in the ini file"));
-		return TestStepResult();
-		}
-		
-	if (!GetStringFromConfig(ConfigSection(), _L("srcRscFile"), iSrcRscFile))
-		{
-		INFO_PRINTF1(_L("Source resource file not specified in the ini file"));
-		return TestStepResult();
-		}
-		
-	if (!GetStringFromConfig(ConfigSection(), _L("destRscFile"), iTargetRscFile))
-		{
-		INFO_PRINTF1(_L("Target resource file not specified in the ini file"));
-		return TestStepResult();
-		}
-		
-	SetTestStepResult(EPass);
-	return TestStepResult();
-	}
-	
-
-TVerdict CTUninstallPluginStep::doTestStepL()
-	{
-	SetTestStepResult(EFail);
-	
-	//Connect to the AuthServer	
-	RTestUtilSession testUtil;
-	User::LeaveIfError(testUtil.Connect());
-	CleanupClosePushL(testUtil);
-	
-	// simulate plugin uninstall operation via move operation.
-	INFO_PRINTF1(_L("Unnstall RAM Plugin "));
-	
-	INFO_PRINTF3(_L("Moving plugin from %S to %S..."), &iSrcPlugin, &iTargetPlugin);
-	User::LeaveIfError(testUtil.Move(iSrcPlugin, iTargetPlugin));
-	
-	INFO_PRINTF3(_L("Moving plugin from %S to %S..."), &iSrcRscFile, &iTargetRscFile);
-	User::LeaveIfError(testUtil.Move(iSrcRscFile, iTargetRscFile));
-	
-	CleanupStack::PopAndDestroy(&testUtil);
-	
-	SetTestStepResult(EPass);
-	return TestStepResult();
-	}
-
-
-CTUninstallPluginStep::~CTUninstallPluginStep()
-/**
- Destructor
-*/
-	{};
-
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/step_removeauthmethod.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,158 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CTestStep derived implementation
-*
-*/
-
- 
-#include "tAuthSvrStep.h"
-
-#include "authserver/authclient.h"
-#include "authserver/authmgrclient.h"
-
-using namespace AuthServer;
-
-//====================================================================================================    
-CTRemoveAuthMethod::CTRemoveAuthMethod(CTAuthSvrServer& aParent): iParent(aParent)
-/**
-  Constructor
- */
-	{
-	// Call base class method to set up the human readable name for logging
-	SetTestStepName(KTForgetPlugin);
-	}
-
-CTRemoveAuthMethod::~CTRemoveAuthMethod()
-/**
-  Destructor
- */
-	{
-	}
-	
-TVerdict CTRemoveAuthMethod::doTestStepPreambleL()
-/**
-  @return - TVerdict code
-  Override of base class virtual
- */
-	{
-	//Call the parent class preamble, setting up the file server, etc
-	CTStepActSch::doTestStepPreambleL();
-	return TestStepResult();
-	}
-
-TVerdict CTRemoveAuthMethod::doTestStepL()
-/**
-  @return - Test step result (EPass or EFail)    
- */
-	{	
-	SetTestStepResult(EPass);
-__UHEAP_MARK;		// Check for memory leaks
-
-	//-----------------------------------------------------------------------------------------------------
-	InitAuthServerFromFileL();	// Set things like 'iSupportsDefaultData' and 'DefaultPlugin'
-	
-	CActiveScheduler::Install(iActSchd);
-	//Connect to the AuthServer	
-	AuthServer::RAuthMgrClient authMgrClient1;	
-	TInt connectVal = authMgrClient1.Connect();
-	if (KErrNotFound == connectVal)
-		{
-		//Retry after a delay
-		TTimeIntervalMicroSeconds32 timeInterval = 2000;	//2 Milliseconds
-		User::After(timeInterval);
-		connectVal = authMgrClient1.Connect();
-		}
-	if (KErrNone != connectVal)
-		{
-		ERR_PRINTF2(_L("Unable to start a session or other connection error. Err = %d"), connectVal);
-		User::LeaveIfError(connectVal);		
-		}	
-	
-	CleanupClosePushL(authMgrClient1);
-	//-----------------------------------------------------------------------------------------------------
-	TBool statusAll = EFalse;
-	statusAll = CheckPluginStatusAllL(authMgrClient1);
-
-	TRAPD(res2, RemoveAuthMethodL(authMgrClient1) );
-	if(KErrNone != res2)
-		{
-		ERR_PRINTF2(_L("RemoveAuthMethodL() performed a Leave with code %d"), res2 );
-		SetTestStepError(res2);
-		SetTestStepResult(EFail);
-		}	
-	statusAll = CheckPluginStatusAllL(authMgrClient1);
-	if (!statusAll)
-		{
-		SetTestStepResult(EFail);
-		}
-		
-	CleanupStack::PopAndDestroy(&authMgrClient1);	// authClient1	
-	//Garbage collect the last previously destroyed implementation 
-	// and close the REComSession if no longer in use
-	REComSession::FinalClose(); 
-__UHEAP_MARKEND;
-	return TestStepResult();
-	}
-
-
-TVerdict CTRemoveAuthMethod::doTestStepPostambleL()
-/**
-  @return - Pass or fail value of test step result
- */
-	{
-	//Call the parent postamble, releasing the file handle, etc
-	CTStepActSch::doTestStepPostambleL();	
-	return TestStepResult();
-	}
-
-
-void CTRemoveAuthMethod::RemoveAuthMethodL (RAuthMgrClient& mgc)
-	{	
-	//If the pluginId is quoted in the ini file, check it's training status
-	TInt forgetPluginValue = 0;
-	TBool forgetUnknownId  = EFalse;
-
-
-	TBool ok =
-		GetHexFromConfig(ConfigSection(),_L("forgetPlugin"), forgetPluginValue);
-
-	GetBoolFromConfig(ConfigSection(),_L("forgetUnknown"), forgetUnknownId);
-	
-	if (ok)
-		{
-		// Get the most recently authenticated identity, which we want this plugin to forget.
-		TIdentityId identity = 0;
-
-		if (forgetUnknownId)
-		  {
-		  INFO_PRINTF1(_L("Forgetting for unknown identity!"));
-		  identity = 0;
-		  }
-		else
-		  {
-		  identity = getLastAuthId();
-		  }
-		
-		// now forget the plugin
-		RDebug::Printf("Forget %d, %d", identity, forgetPluginValue);
-		mgc.ForgetPluginL(identity, forgetPluginValue);
-		RDebug::Printf("DONE: Forget %d, %d", identity, forgetPluginValue);
-		}
-	else
-		{
-		INFO_PRINTF1(_L("missing parameters in the ini file!"));
-		SetTestStepResult(EFail);
-		}
-	}
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/step_removedbs.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,92 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* step_retrainplugin.cpp
-* CTestStep derived implementation
-*
-*/
-
- 
-#include "tAuthSvrStep.h"
-
-#include "authserver/authclient.h"
-#include "authserver/authmgrclient.h"
-
-using namespace AuthServer;
-
-//====================================================================================================
-
-CTRemoveDbs::CTRemoveDbs()
-/**
- * Constructor
- */
-	{
-	// Call base class method to set up the human readable name for logging
-	SetTestStepName(KTRemoveDbs);
-	}
-
-CTRemoveDbs::~CTRemoveDbs()
-/**
- * Destructor
- */
-	{}
-	
-TVerdict CTRemoveDbs::doTestStepPreambleL()
-/**
- * @return - TVerdict code
- * Override of base class virtual
- */
-	{
-	CTAuthSvrStepBase::doTestStepPreambleL();
-	
-	//SetTestStepResult(EPass);
-	return TestStepResult();
-	}
-
-TVerdict CTRemoveDbs::doTestStepL()
-/**
- * @return - TVerdict code
- * Override of base class pure virtual
- * 
- */
-	{	
-	//If any test step leaves or panics, the test step thread won't exit, further calls are made.
-	// but the html log is updatead, so that subsequent failures could be traced here if necessary. 
-	if (TestStepResult() != EPass)
-		{
-		INFO_PRINTF1(_L("There was an error in a previous test step"));
-		//return TestStepResult();
-		}
-
-__UHEAP_MARK;		// Check for memory leaks
-
-	SetTestStepResult(EPass);
-	RemoveExistingDbL();
-	
-__UHEAP_MARKEND;
-	return TestStepResult();
-	}
-
-
-TVerdict CTRemoveDbs::doTestStepPostambleL()
-/**
- * @return - TVerdict code
- * Override of base class virtual
- */
-	{
-	//Call the parent postamble, releasing the file handle, etc
-	CTStepActSch::doTestStepPostambleL();
-	//INFO_PRINTF1(_L("Test Step Postamble"));
-	return TestStepResult();
-	}
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/step_removeidentity.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,291 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CTestStep derived implementation
-*
-*/
-
- 
-#include "tAuthSvrStep.h"
-
-#include "authserver/authclient.h"
-#include "authserver/authmgrclient.h"
-
-using namespace AuthServer;
-
-/*
-class CAuthActive : CActive
-    {
-    public:
-    CAuthActive(RAuthMgrClient& aClient, TPluginId plugin1IdValue, TInt aFresh, TBool aStop = ETrue) : 
-         CActive(EPriorityNormal),
-         iClient(aClient),
-		 iResult(EFail),
-         iRunCount(0),
-         iStop(aStop),
-         pluginIdVal(plugin1IdValue),
-         iFresh(aFresh)
-         
-        {
-        CActiveScheduler::Add(this);
-        }
-    void doAuth() 
-        {
-        SetActive();		
-		TRequestStatus* status = &iStatus;		    
-		User::RequestComplete(status, KErrNone);
-		iRunCount = 0;
-        }
-	void DoCancel() 
-        {
-        }
-     void RunL() 
-        {
-        iErr = iStatus.Int();
-        if (iStatus.Int() != KErrNone)
-            {
-            }
-		switch (iRunCount)
-		  {
-		  case 0:
-            iStatus = KRequestPending;
-			iAe = AuthExpr(pluginIdVal);
-			iId = 0;
-
-			iClient.AuthenticateL(*iAe, iFresh, EFalse, EFalse, iId, iStatus);
-			SetActive();
-
-			break;
-		  case 1:
-			delete iAe;
-			iStatus = KRequestPending;
-			TRequestStatus* status;
-			status = &iStatus;				
-			User::RequestComplete(status, iErr);				
-			SetActive();
-			
-			break;
-   		  case 2:
-			iResult = iStatus.Int() == KErrNone ? EPass : EFail;
-            iErr = iStatus.Int();
-			if (iStop)
-                {
-                CActiveScheduler::Stop();
-                }
-
-			break;
-     	  default:
-			iResult = EFail;
-			
-			if (iStop)
-			    {
-			    CActiveScheduler::Stop();
-			    }
-		    }
-		  ++iRunCount;
-          }
-	RAuthMgrClient& iClient;
-	TVerdict iResult;
-	TInt iRunCount;
-	CAuthExpression* iAe;
-	CIdentity* iId;
-    TBool iStop;
-    TInt iErr;
-    TPluginId pluginIdVal;
-    TInt iFresh;
-    };
-    */
-//====================================================================================================    
-CTRemoveIdentity::CTRemoveIdentity(CTAuthSvrServer& aParent): iParent(aParent)
-/**
- * Constructor
- */
-	{
-	// Call base class method to set up the human readable name for logging
-	SetTestStepName(KTRemoveIdentity);
-	}
-
-CTRemoveIdentity::~CTRemoveIdentity()
-/**
- * Destructor
- */
-	{}
-	
-TVerdict CTRemoveIdentity::doTestStepPreambleL()
-/**
- * @return - TVerdict code
- * Override of base class virtual
- */
-	{
-	//Call the parent class preamble, setting up the file server, etc
-	CTStepActSch::doTestStepPreambleL();
-		
-	//SetTestStepResult(EPass);
-	return TestStepResult();
-	}
-
-TVerdict CTRemoveIdentity::doTestStepL()
-/**
- * @return - TVerdict code
- * Override of base class pure virtual
- * 
- */
-	{	
-	//INFO_PRINTF1(_L("In CTRemoveIdentity doTestStepL"));
-	
-	//User::SetJustInTime(ETrue);	//a panic will kill just the thread, not the whole emulator.
-	
-	//If any test step leaves or panics, the test step thread won't exit, further calls are made.
-	// but the html log is updated, so that subsequent failures could be traced here if necessary. 
-	if (TestStepResult() != EPass)
-		{
-		ERR_PRINTF1(_L("There was an error in a previous test step"));
-		//return TestStepResult();
-		}
-
-	SetTestStepResult(EPass);
-
-__UHEAP_MARK;		// Check for memory leaks
-
-	//-----------------------------------------------------------------------------------------------------
-	InitAuthServerFromFileL();	// Set things like 'iSupportsDefaultData' and 'DefaultPlugin'
-	
-	CActiveScheduler::Install(iActSchd);
-	//Connect to the AuthServer	
-	AuthServer::RAuthMgrClient authMgrClient1;	
-	TInt connectVal = authMgrClient1.Connect();
-	if (KErrNotFound == connectVal)
-		{
-		//Retry after a delay
-		TTimeIntervalMicroSeconds32 timeInterval = 2000;	//2 Milliseconds
-		User::After(timeInterval);
-		connectVal = authMgrClient1.Connect();
-		}
-	if (KErrNone != connectVal)
-		{
-		ERR_PRINTF2(_L("Unable to start a session or other connection error. Err = %d"), connectVal);
-		User::LeaveIfError(connectVal);		
-		}	
-	
-	CleanupClosePushL(authMgrClient1);
-	//-----------------------------------------------------------------------------------------------------
-	/*
-	//Examine the authserver and see what's there
-	RAuthClient ac;
-	User::LeaveIfError(ac.Connect());
-	CleanupClosePushL(ac);
-	RPluginDescriptions pluginList1;
-	TCleanupItem cleanup(CleanupEComArray, &pluginList1);
-	CleanupStack::PushL(cleanup);				
-	
-	ac.PluginsL(pluginList1);	
-	TInt numTotalPlugins = pluginList1.Count();
-	for(TInt i = 0; i < numTotalPlugins; i++)
-		{
-		TInt presentPluginIdVal = pluginList1[i]->Id();
-		TInt presentPluginStatus = pluginList1[i]->TrainingStatus();
-		INFO_PRINTF3(_L("PluginId=%x,status =%i"), presentPluginIdVal,presentPluginStatus);
-		}
-	CleanupStack::PopAndDestroy(&pluginList1); //infoArray, results in a call to CleanupEComArray	
-	
-	//Check the username of the second identity and then attempt to set it.
-	//SetTestStepResult(checkAndSetUserNameL(ac, 0));
-	
-	CleanupStack::PopAndDestroy(&ac);	// authClient
-	//-----------------------------------------------------------------------------------------------------
-	*/
-
-	TBool statusAll = EFalse;
-	statusAll = CheckPluginStatusAllL(authMgrClient1);
-
-	// Authenticate by reading the user input
-	// Then call the removeIdentityL function
-	
-	TRAPD(res2, doRemoveIdentityL(authMgrClient1) );
-	if(KErrNone != res2)
-		{
-		ERR_PRINTF2(_L("doRemoveIdentityL() performed a Leave with code %d"), res2 );
-		//SetTestStepResult(EPass);
-		SetTestStepError(res2);
-		}
-	
-	/*	
-	TRAPD(res1, CheckSpecifiedPluginStatusL());
-	if(KErrNone != res1)
-		{
-		ERR_PRINTF2(_L("checkSpecifiedPluginStatusL() performed a Leave with code %d"), res1 );
-		}
-	*/
-	
-	statusAll = CheckPluginStatusAllL(authMgrClient1);
-	if (!statusAll)
-		{
-		SetTestStepResult(EFail);
-		}
-	else
-		{
-		INFO_PRINTF1(_L("Plugin Status OK !!"));
-		}
-
-	CleanupStack::PopAndDestroy(&authMgrClient1);	// authClient1	
-	//Garbage collect the last previously destroyed implementation 
-	// and close the REComSession if no longer in use
-	REComSession::FinalClose(); 
-__UHEAP_MARKEND;
-	return TestStepResult();
-	}
-
-
-TVerdict CTRemoveIdentity::doTestStepPostambleL()
-/**
- * @return - TVerdict code
- * Override of base class virtual
- */
-	{
-	//Call the parent postamble, releasing the file handle, etc
-	CTStepActSch::doTestStepPostambleL();
-	//INFO_PRINTF1(_L("Test Step Postamble"));
-	return TestStepResult();
-	}
-
-
-//
-//
-void CTRemoveIdentity::doRemoveIdentityL (RAuthMgrClient& mgc)
-	{	
-	
-	//If the pluginId is quoted in the ini file, check it's training status
-	TInt plugin1IdValue = 0;	
-	if (GetHexFromConfig(ConfigSection(),_L("plugin1Id"), plugin1IdValue) != EFalse) // the tag 'pluginId1' was present
-		{
-	 	//Read the identityId to be trained
-	 	TIdentityId idToRemove = getLastAuthId();
-
-		mgc.RemoveIdentityL(idToRemove);
-		
-		//Check to see if a retry is recommended
-		TBool retryRemoveValue = EFalse;
-		if (GetBoolFromConfig(ConfigSection(),_L("retryRemove"), retryRemoveValue) != EFalse) 
-			{
-			if (retryRemoveValue)
-				{ mgc.RemoveIdentityL(idToRemove); }
-			}
-		}
-		
-	else
-		{
-		INFO_PRINTF1(_L("plugin1Id was not specified in the ini file"));
-		}
-		
-	}
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/step_resetidentity.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,279 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CTestStep derived implementation
-*
-*/
-
- 
-#include "tAuthSvrStep.h"
-#include <scs/cleanuputils.h>
-#include "authserver/authclient.h"
-#include "authserver/authmgrclient.h"
-
-using namespace AuthServer;
-
-_LIT(KResetType, "ResetType");
-_LIT(KResetTypeResetAll, "ResetAll");
-_LIT(KResetTypeResetByType, "ResetByType");
-_LIT(KResetTypeResetByList, "ResetByList");
-_LIT(KResetIdentityString, "IdentityString");
-_LIT(KResetRegDataSingle, "RegistrationData");
-_LIT(KResetPluginCount, "PluginCount");
-_LIT(KResetPluginId, "PluginId%d");
-_LIT(KResetRegData, "RegistrationData%d");
-_LIT(KResetPluginType, "PluginType");
-_LIT(KResetPluginTypeKnowledge, "EAuthKnowledge");
-_LIT(KResetPluginTypeToken, "EAuthToken");
-_LIT(KResetPluginTypeBiometric, "EAuthBiometric");
-
-
-CTResetIdentity::CTResetIdentity(CTAuthSvrServer& aParent): iParent(aParent)
-	{
-	// Call base class method to set up the human readable name for logging
-	SetTestStepName(KTResetIdentity);
-	}
-
-CTResetIdentity::~CTResetIdentity()
-	{}
-
-TVerdict CTResetIdentity::doTestStepPreambleL()
-	{
-	// Call the parent class preamble, setting up the file server, etc
-	CTStepActSch::doTestStepPreambleL();
-	
-	return TestStepResult();
-	}
-
-TVerdict CTResetIdentity::doTestStepL()
-	{	
-	INFO_PRINTF1(_L("In CTResetIdentity doTestStepL"));
-
-	// If any test step leaves or panics, the test step thread won't exit, further calls are made.
-	// but the html log is updated, so that subsequent failures could be traced here if necessary. 
-	if (TestStepResult() != EPass)
-		{
-		ERR_PRINTF1(_L("There was an error in a previous test step"));
-		//return TestStepResult();
-		}
-
-	SetTestStepResult(EPass);
-
-__UHEAP_MARK;		// Check for memory leaks
-
-	//-----------------------------------------------------------------------------------------------------
-	InitAuthServerFromFileL();	// Set things like 'iSupportsDefaultData' and 'DefaultPlugin'
-	CActiveScheduler::Install(iActSchd);
-
-	TRAPD(res2, doResetIdentityL());
-	if(KErrNone != res2)
-		{
-		ERR_PRINTF2(_L("doResetIdentityL() performed a Leave with code %d"), res2 );
-		//SetTestStepResult(EPass);
-		SetTestStepError(res2);
-		}
-	
-	//Garbage collect the last previously destroyed implementation 
-	// and close the REComSession if no longer in use
-	REComSession::FinalClose(); 
-__UHEAP_MARKEND;
-	return TestStepResult();
-	}
-
-TVerdict CTResetIdentity::doTestStepPostambleL()
-	{
-	// Call the parent postamble, releasing the file handle, etc
-	CTStepActSch::doTestStepPostambleL();
-	return TestStepResult();
-	}
-
-void CTResetIdentity::doResetIdentityL ()
-	{
-	INFO_PRINTF1(_L("In CTResetIdentity doResetIdentityL"));
-	// Read the identity string whose id which needs to be reset
-	TPtrC identityString;
-	if (!GetStringFromConfig(ConfigSection(), KResetIdentityString, identityString))
-		{
-		INFO_PRINTF1(_L("Identity string not found in the ini file"));
-		User::Leave(KErrNotFound);
-		}
-
-	TIdentityId identityId = KUnknownIdentity;
-	if (identityString != KNullDesC)
-		{
-		INFO_PRINTF1(_L("In doResetIdentityL Here1"));
-		// From the AuthDb get the id corresponding to the string
-		// Wait for authserver to release the db
-		WaitForServerToReleaseDb();
-		WaitForServerToReleaseDb();	// In debug mode AuthServer takes some time to terminate
-		INFO_PRINTF1(_L("In doResetIdentityL Here2"));
-		CAuthDb2* db = CAuthDb2::NewLC(iFs);
-		INFO_PRINTF1(_L("In doResetIdentityL Here3"));
-		RIdAndStringArray idList;
-		CleanupResetAndDestroyPushL(idList);
-		TRAPD(err, db->IdentitiesWithDescriptionL(idList));
-		INFO_PRINTF1(_L("In doResetIdentityL Here4"));
-		if (err != KErrNone)
-			{
-			INFO_PRINTF2(_L("CAuthDb::IdentitiesWithDescriptionL() failed with %d"), err);
-			User::Leave(err);
-			}
-		INFO_PRINTF2(_L("CAuthDb::IdentitiesWithDescriptionL() found %d identities"), idList.Count());
-		for (TInt index = 0; index < idList.Count(); ++index)
-			{
-			INFO_PRINTF2(_L("CAuthDb::IdentitiesWithDescriptionL() found identities %S"), idList[index]->String());
-			if (identityString.Compare(*idList[index]->String()) == 0)
-				{
-				identityId = idList[index]->Id();
-				break;
-				}
-			}
-		CleanupStack::PopAndDestroy(2, db); // idList
-		}
-	
-	// Get the reset type form the ini file and relevant details to do the reset
-	TPtrC resetType;
-	if (!GetStringFromConfig(ConfigSection(), KResetType, resetType))
-		{
-		INFO_PRINTF2(_L("%s was not specified in the ini file"), KResetType);
-		return;
-		}
-
-	AuthServer::RAuthMgrClient authMgrClient;
-	CleanupClosePushL(authMgrClient);
-	TInt err = authMgrClient.Connect();
-	if (err == KErrNotFound)
-		{
-		// Retry after a delay
-		TTimeIntervalMicroSeconds32 timeInterval = 2000;	// 2 Milliseconds
-		User::After(timeInterval);
-		err = authMgrClient.Connect();
-		}
-	if (err != KErrNone)
-		{
-		ERR_PRINTF2(_L("Unable to start a session or other connection error. Err = %d"), err);
-		User::Leave(err);
-		}
-
-	if (resetType == KResetTypeResetAll)
-		{
-		INFO_PRINTF1(_L("In CTResetIdentity doResetIdentityL KResetTypeResetAll"));
-		// Read the registration data
-		TPtrC regData;
-		if (!GetStringFromConfig(ConfigSection(), KResetRegDataSingle, regData))
-			{
-			INFO_PRINTF1(_L("Registration data was not specified in the ini file"));
-			User::Leave(KErrNotFound);
-			}
-		authMgrClient.ResetIdentityL(identityId, regData);
-		}
-	else if (resetType == KResetTypeResetByType)
-		{
-		INFO_PRINTF1(_L("In CTResetIdentity doResetIdentityL KResetTypeResetByType"));
-		// Get the plugin type
-		TPtrC pluginType;
-		if (!GetStringFromConfig(ConfigSection(), KResetPluginType, pluginType))
-			{
-			INFO_PRINTF1(_L("Plugin type was not specified in the ini file"));
-			User::Leave(KErrNotFound);
-			}
-		TAuthPluginType type;
-		if (pluginType == KResetPluginTypeKnowledge)
-			{
-			type = EAuthKnowledge;
-			}
-		else if (pluginType == KResetPluginTypeToken)
-			{
-			type = EAuthToken;
-			}
-		else if (pluginType == KResetPluginTypeBiometric)
-			{
-			type = EAuthBiometric;
-			}
-		else
-			{
-			INFO_PRINTF1(_L("Invalid plugin type was specified in the ini file"));
-			CleanupStack::PopAndDestroy(&authMgrClient);
-			return;
-			}
-		// Read the registration data
-		TPtrC regData;
-		if (!GetStringFromConfig(ConfigSection(), KResetRegDataSingle, regData))
-			{
-			INFO_PRINTF1(_L("Registration data was not specified in the ini file"));
-			User::Leave(KErrNotFound);
-			}
-		authMgrClient.ResetIdentityL(identityId, type, regData);
-		}
-	else if (resetType == KResetTypeResetByList)
-		{
-		// Read the reset information
-		INFO_PRINTF1(_L("In CTResetIdentity doResetIdentityL KResetTypeResetByList"));
-		// Get the plugin details
-		TInt pluginCount;
-		if (!GetIntFromConfig(ConfigSection(), KResetPluginCount, pluginCount))
-			{
-			INFO_PRINTF1(_L("PluginCount missing/invalid in the ini file"));
-			User::Leave(KErrNotFound);
-			}
-		RArray<TPluginId> pluginList;
-		CleanupClosePushL(pluginList);
-		RPointerArray<const HBufC> regDataList;
-		CleanupResetAndDestroyPushL(regDataList);
-		if (pluginCount > 0)
-			{
-			for (TInt index = 0; index < pluginCount; ++index)
-				{
-				HBufC* fmt = HBufC::NewLC(KResetPluginId().Length() + 10);
-				TPtr fmtPtr(fmt->Des());
-				fmtPtr.Format(KResetPluginId, index);
-				TInt pluginId;
-				if (!GetHexFromConfig(ConfigSection(), *fmt, pluginId))
-					{
-					INFO_PRINTF2(_L("%S missing in the ini file"), fmt);
-					User::Leave(KErrNotFound);
-					}
-				pluginList.AppendL(static_cast<TPluginId>(pluginId));
-				CleanupStack::PopAndDestroy(fmt);
-				fmt = HBufC::NewLC(KResetRegData().Length() + 10);
-				fmtPtr.Set(fmt->Des());
-				fmtPtr.Format(KResetRegData, index);
-				TPtrC regData;
-				if (!GetStringFromConfig(ConfigSection(), *fmt, regData))
-					{
-					INFO_PRINTF2(_L("%S missing in the ini file"), fmt);
-					User::Leave(KErrNotFound);
-					}
-				HBufC* reg = regData.AllocLC();
-				regDataList.AppendL(reg);	// Takes ownership
-				CleanupStack::Pop(reg);
-				CleanupStack::PopAndDestroy(fmt);
-				}
-			}
-		else
-			{
-			// If plugin count is negative, simulate a condition where the pluginList count != regDataList count
-			pluginList.AppendL(0);
-			}
-		authMgrClient.ResetIdentityL(identityId, pluginList, regDataList);
-		CleanupStack::PopAndDestroy(2, &pluginList); // regDataList
-		}
-	else
-		{
-		INFO_PRINTF1(_L("Invalid reset type was specified in the ini file."));
-		User::Leave(KErrNotFound);
-		}
-	
-	CleanupStack::PopAndDestroy(&authMgrClient);
-	}
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/step_resultavailability.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,586 +0,0 @@
-/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include "tAuthSvrStep.h"
-#include <s32file.h>
-using namespace AuthServer;
-class CAuthActive3 : public CActive
-    {
-    public:
-    CAuthActive3(RAuthMgrClient& aClient, CAuthExpression* aExpr,
-				 TInt aFresh, TBool aClientSpecific, TBool aStop = ETrue) : 
-         CActive(EPriorityNormal),
-         iClient(aClient),
-		 iResult(EFail),
-         iRunCount(0),
-         iAe(aExpr),
-         iStop(aStop),
-         iFresh(aFresh),
-         iIdToStore(0), 
-         iClientSpecific(aClientSpecific)
-        {
-        CActiveScheduler::Add(this);
-        }
-    void doAuth() 
-        {
-        SetActive();		
-		TRequestStatus* status = &iStatus;		    
-		User::RequestComplete(status, KErrNone);
-		iRunCount = 0;
-        }
-    void doDeAuth()
-        {
-        iClient.DeauthenticateL();
-        }
-	void DoCancel() 
-        {
-        }
-     void RunL() 
-        {
-        iErr = iStatus.Int();
-		switch (iRunCount)
-		  {
-		  case 0:
-            iStatus = KRequestPending;
-			iId = 0;
-
-			iClient.AuthenticateL(*iAe, iFresh, iClientSpecific, EFalse, iId, iStatus);
-			SetActive();
-
-			break;
-		  case 1:
-			if (0 != iId)
-				{
-				iIdToStore = iId->Id();
-				delete iId;
-				}
-			iStatus = KRequestPending;
-			TRequestStatus* status;
-			status = &iStatus;				
-			User::RequestComplete(status, iErr);				
-			SetActive();
-			
-			break;
-   		  case 2:
-			iResult = iStatus == KErrNone ? EPass : EFail;
-            iErr = iStatus.Int();
-			if (iStop)
-                {
-                CActiveScheduler::Stop();
-                }
-
-			break;
-     	  default:
-			iResult = EFail;
-			
-			if (iStop)
-				{
-			    CActiveScheduler::Stop();
-			    }
-		    }
-		  ++iRunCount;
-          }
-	RAuthMgrClient& iClient;
-	TVerdict iResult;
-	TInt iRunCount;
-	CAuthExpression* iAe;
-	CIdentity* iId;
-    TBool iStop;
-    TInt iErr;
-    TInt iFresh;
-    TIdentityId iIdToStore;
-    TBool iClientSpecific;
-    };
-
-//====================================================================================================
-
-
-class CRegActive2 : public CActive
-    {
-    public:
-    CRegActive2(RAuthMgrClient& aClient, CIdentity*& aResult) : 
-         CActive(EPriorityNormal),
-         iFirstTime(true),
-         iClient(aClient), 
-         iResult(aResult),
-         iErr(KErrNone)
-        {
-        CActiveScheduler::Add(this);
-        }
-    void doReg()
-        {
-        SetActive();		
-		TRequestStatus* status = &iStatus;
-		User::RequestComplete(status, KErrNone);
-		iFirstTime = ETrue;
-        }
-        void DoCancel() 
-        {
-        }
-     void RunL() 
-        {
-        iErr = iStatus.Int();
-        if (iFirstTime)
-            {
-			SetActive();
-            iStatus = KRequestPending;
-            iClient.RegisterIdentityL(iResult, _L("SOMENAME"), iStatus);
-            iFirstTime = false;
-            }
-        else
-            {
-            iErr = iStatus.Int();
-            CActiveScheduler::Stop();
-			}
-        }
-        
-    TBool iFirstTime;
-    RAuthMgrClient& iClient;
-    CIdentity*& iResult;
-    TInt iErr;
-    };
-//====================================================================================================     
-CResultAvailability::~CResultAvailability()
-/**
-  Destructor
- */
-	{}
-
-CResultAvailability::CResultAvailability(CTAuthSvrServer& aParent): iParent(aParent)
-/**
-  Constructor
- */
-	{
-	
-	SetTestStepName(KTResultAvailability);
-	}
-
-TVerdict CResultAvailability::doTestStepPreambleL()
-/**
-  @return - TVerdict code
-
- */
-	{
-
-	CTStepActSch::doTestStepPreambleL();	
-	return TestStepResult();
-	}
-
-
-TVerdict CResultAvailability::doTestStepL()
-	{
-		SetTestStepResult(EFail);	
-		__UHEAP_MARK;		// Check for memory leaks
-
-		//-----------------------------------------------------------------------------------------------------	
-		//Get the Identity published by KUidAuthServerLastAuth property .
-		
-		TLastAuth lastAuth;
-		TPckg<TLastAuth> authPkg(lastAuth);
-		RProperty::Get(KAuthServerSecureId, KUidAuthServerLastAuth, authPkg);
-		
-		//Get the Last Authenticated Id from the authsvrpolicy.ini file
-		
-		TPtrC userIdString;
-		GetStringFromConfig(ConfigSection(),_L("LastAuthId"), userIdString);
-		
-		TLex lex = TLex(userIdString);
-		TUint userId(0);
-		
-		lex.Val(userId);
-		INFO_PRINTF3(_L("The UserId published by KUidAuthServerLastAuth property is %x and the UserId from AuthSvrPolicy.ini is %x"), lastAuth.iId, userId );
-		if(lastAuth.iId == userId )
-			{
-			SetTestStepResult(EPass);	
-
-			}
-
-		 __UHEAP_MARKEND;
-		 return TestStepResult();
-	}
-TVerdict CResultAvailability::doTestStepPostambleL()
-/**
-  @return - TVerdict code
-
- */
-	{
-	
-	CTStepActSch::doTestStepPostambleL();
-	return TestStepResult();
-	}
-//====================================================================================================
-CResultChangeNotify::~CResultChangeNotify()
-/**
-  Destructor
- */
-	{}
-
-CResultChangeNotify::CResultChangeNotify(CTAuthSvrServer& aParent): iParent(aParent)
-/**
-  Constructor
- */
-	{
-	
-	SetTestStepName(KTResultChangeNotify);
-	}
-
-TVerdict CResultChangeNotify::doTestStepPreambleL()
-/**
-  @return - TVerdict code
-
- */
-	{
-
-	CTStepActSch::doTestStepPreambleL();	
-	return TestStepResult();
-	}
-
-TVerdict CResultChangeNotify::doTestStepL()
-	{
-	SetTestStepResult(EPass);	
-	__UHEAP_MARK;		// Check for memory leaks
-	SetPinPluginStateL();
-
-	//-----------------------------------------------------------------------------------------------------	
-	InitAuthServerFromFileL();	// Set things like 'iSupportsDefaultData' and 'DefaultPlugin'
-	
-	// this method creates the dat file from where the test implementation
-	// of pin plugin notifier reads user input.
-	// as the pin plugin fails without this data it has been included 
-	// in the code as a default step for initializing the pin plugin
-	// data.
-	TPinValue aPinValue;
-	CreatePinPluginInputFileL(EPinPluginTraining,aPinValue);
-	CActiveScheduler::Install(iActSchd);
-	
-	// KUidAuthServerAuthChangeEvent Property retrieves the last authenticated identity
-	TInt AuthIdChange = 0;
-	RProperty::Get(KAuthServerSecureId, KUidAuthServerAuthChangeEvent, AuthIdChange);
-	INFO_PRINTF2(_L("Last Authenticated Identity is %x" ), AuthIdChange );
-	
-	//Connect to the AuthServer	
-	AuthServer::RAuthMgrClient authMgrClient;	
-	TInt connectVal = authMgrClient.Connect();
-	if (KErrNotFound == connectVal)
-		{
-			//Retry after a delay
-			TTimeIntervalMicroSeconds32 timeInterval = 2000;	//2 Milliseconds
-			User::After(timeInterval);
-			connectVal = authMgrClient.Connect();
-		}
-	if (KErrNone != connectVal)
-		{
-		ERR_PRINTF2(_L("Unable to start a session or other connection error. Err = %d"), connectVal);
-		User::LeaveIfError(connectVal);		
-		}	
-		
-	CleanupClosePushL(authMgrClient);
-
-	
-	//Register a new Identity
-	INFO_PRINTF1(_L("Registering a new Identity"));
-	CIdentity* identity = 0;
-	CRegActive2 regactive(authMgrClient, identity);
-	regactive.doReg();
-	CActiveScheduler::Start();
-	
-	if (0 != identity)
-	  	{
-	  		INFO_PRINTF1(_L("Registration Successful"));
-	  		INFO_PRINTF3(_L("Id = %x , KeyLength = %d\n"), identity->Id(), identity->Key().KeyData().Size());
-	  	}
-			
-	
-
-	//Authenticate the new Id.
-	
-	TPtrC exprString;	
-	TInt deAuth;
-	if (GetStringFromConfig(ConfigSection(), _L("plugin1Id"), exprString) != EFalse) // the tag 'pluginId1' was present
-		{
-				 	
-			TInt freshnessVal = 0;	//Default value
-			//Retrieve the value of 'freshness' from the ini file, but if it's absent use the default value
-			 if(GetIntFromConfig(ConfigSection(), _L("freshness"), freshnessVal) == EFalse)
-				 {
-				 	freshnessVal = 10;
-				 }
-				 		
-			TBool clientSpecificKeyVal = EFalse;	 	
-			//Retrieve the value of 'clientSpecificKey' from the ini file, but if it's absent use the default value
-			if(GetBoolFromConfig(ConfigSection(), _L("clientSpecificKey"), clientSpecificKeyVal) == EFalse)
-				 {
-				 	clientSpecificKeyVal = EFalse;
-				 }	 	
-				
-			if(GetIntFromConfig(ConfigSection(), _L("deauth"), deAuth) == EFalse)
-				{
-					deAuth = 0;
-				}
-			
-			TBool stop;
-			if(GetBoolFromConfig(ConfigSection(), _L("stop"), stop ) == EFalse)
-							{
-								stop = ETrue;
-							}
-			
-			//Create a CResultPropertyWatch object which subscribes to the KUidAuthServerAuthChangeEvent Property
-					
-			CResultPropertyWatch* watch = CResultPropertyWatch::NewLC();
-					
-				
-			//Train the plugin again with this identity.
-			CAuthExpression* expr = CreateAuthExprLC(exprString);
-		
-			CAuthActive3 authactive(authMgrClient, expr, freshnessVal, clientSpecificKeyVal,stop);
-	
-			INFO_PRINTF1(_L("Authenticating the new Identity"));
-			authactive.doAuth();		
-			CActiveScheduler::Start();
-		
-			//Check if Authentication successful.
-			if(authactive.iIdToStore)
-				{
-					INFO_PRINTF2(_L(" Successful Authentication Id = %x"), authactive.iIdToStore);
-				}
-			else
-				{
-					INFO_PRINTF1(_L(" Authentication Failed ."));
-				}
-			
-			if(watch->iNotified)
-				{
-				TInt AuthIdChange;
-					
-				//Get the published value
-				RProperty::Get(KAuthServerSecureId, KUidAuthServerAuthChangeEvent, AuthIdChange);	
-				INFO_PRINTF2(_L("Successfully received Notification. New User Identity is %x " ), AuthIdChange );
-				}
-			else
-				{
-				INFO_PRINTF1(_L("No Notification received "));
-				}
-			CleanupStack::PopAndDestroy(2,watch);
-			//Authenticate the same User again to verify that KUidAuthServerAuthChangeEvent 
-			//does not get published again
-			
-			//Create a CResultPropertyWatch object which subscribes to the KUidAuthServerAuthChangeEvent Property
-			
-			CResultPropertyWatch* watch2 = CResultPropertyWatch::NewLC();	
-			
-			CAuthExpression* expr2 = CreateAuthExprLC(exprString);
-			CAuthActive3 authactive2(authMgrClient, expr, freshnessVal, clientSpecificKeyVal);
-			authactive2.doAuth();		
-			CActiveScheduler::Start();
-		
-			//Check if Authentication successful.
-			if(authactive.iIdToStore)
-				{
-					INFO_PRINTF2(_L(" Successful Authentication Id = %x"), authactive.iIdToStore);
-				}
-			else
-				{
-					INFO_PRINTF1(_L(" Authentication Failed ."));
-					
-				}
-						
-			if(watch2->iNotified)
-				{
-					TInt AuthIdChange;	
-					//Get the published value
-					RProperty::Get(KAuthServerSecureId, KUidAuthServerAuthChangeEvent, AuthIdChange);	
-					INFO_PRINTF2(_L("Successfully received Notification. New User Identity is %x " ), AuthIdChange );
-					SetTestStepResult(EFail);
-				}
-			else
-				{
-					INFO_PRINTF1(_L("No Notification received "));
-				}
-			CleanupStack::PopAndDestroy(2,watch2);
-			// If deAuth flag is set ,subscribe to the KUidAuthServerAuthChangeEvent property
-			// and deauthenticate 
-			if(deAuth)
-			{
-								
-				INFO_PRINTF1(_L(" Trying to DeAuthenticate "));
-				//Creating a subscriber active object
-				CResultPropertyWatch* watch3 = CResultPropertyWatch::NewLC();
-		
-				TInt err;
-				TRAP(err,authactive.doDeAuth());
-				CActiveScheduler::Start();
-		
-				if(err != KErrNone)
-					{
-					INFO_PRINTF1(_L(" DeAuthentication Failed "));
-					SetTestStepResult(EFail);
-
-					}
-				else
-					{
-					INFO_PRINTF1(_L(" DeAuthentication Succeeded "));
-					}
-				
-				if(watch3->iNotified)
-					{
-					TInt AuthIdChange;	
-					//Get the published value
-					RProperty::Get(KAuthServerSecureId, KUidAuthServerAuthChangeEvent, AuthIdChange);	
-					INFO_PRINTF2(_L("Successfully received Notification. New User Identity is %x " ), AuthIdChange );
-					}
-				else
-					{
-					INFO_PRINTF1(_L(" No Notification of the change in the Authenticated Identity "));
-					SetTestStepResult(EFail);
-					}
-				CleanupStack::PopAndDestroy(watch3);
-				INFO_PRINTF1(_L(" Checking the Id published by KUidAuthServerLastAuth upon DeAuthentication"));
-				TLastAuth lastAuth;
-				TPckg<TLastAuth> authPkg(lastAuth);
-				RProperty::Get(KAuthServerSecureId, KUidAuthServerLastAuth, authPkg);
-		
-				INFO_PRINTF2(_L("Id published by KUidAuthServerLastAuth = %x"), lastAuth.iId);
-		
-				if(lastAuth.iId != 0)
-					{
-					SetTestStepResult(EFail);
-					}
-			
-				}
-			}
-			
-		RemovePinPluginFileL();	
-		delete identity;
-		CleanupStack::PopAndDestroy(&authMgrClient);
-		 __UHEAP_MARKEND;
-		 return TestStepResult();
-	}
-
-	
-void CResultChangeNotify::SetPinPluginStateL()
-	{
-	TPtrC activeStateFromFile;
-	
-	_LIT(KPinPlugin,"pinplugin_inactive.txt");
-	
-	TFileName filename;
-	filename.Copy(KPinPlugin); // convert from 8 -> 16 bit descriptor
-		
-	TDriveUnit sysDrive = RFs::GetSystemDrive();
-	TDriveName sysDriveName (sysDrive.Name());
-	filename.Insert(0,sysDriveName);
-	filename.Insert(2,_L("\\"));		
-	
-	RFileWriteStream stream;
-	RFs fs;
-	CleanupClosePushL(fs);
-	User::LeaveIfError(fs.Connect());
-	fs.Delete(filename);
-		
-	if (GetStringFromConfig(ConfigSection(),_L("Pin200032E5Active"), activeStateFromFile)) 
-		{
-		if(activeStateFromFile == _L("false"))
-			{		
-			User::LeaveIfError(stream.Create(fs, filename, EFileWrite | EFileShareExclusive));
-			stream.Close();
-			}
-		}
-	CleanupStack::PopAndDestroy(); // fs
-	}
-
-void CResultChangeNotify::RemovePinPluginFileL()
-	{
-	TPtrC activeStateFromFile;
-	_LIT(KPinPlugin,"pinplugin_inactive.txt");
-	TFileName filename;
-	filename.Copy(KPinPlugin); // convert from 8 -> 16 bit descriptor
-			
-	TDriveUnit sysDrive = RFs::GetSystemDrive();
-	TDriveName sysDriveName (sysDrive.Name());
-	filename.Insert(0,sysDriveName);
-	filename.Insert(2,_L("\\"));
-		
-	RFs fs;
-	CleanupClosePushL(fs);
-	User::LeaveIfError(fs.Connect());
-	fs.Delete(filename);
-	CleanupStack::PopAndDestroy(); // fs
-	}
-
-
-TVerdict CResultChangeNotify::doTestStepPostambleL()
-/**
-  @return - TVerdict code
-
- */
-	{
-	
-	CTStepActSch::doTestStepPostambleL();
-	return TestStepResult();
-	}
-
-//====================================================================================================     
-
-
-CResultPropertyWatch* CResultPropertyWatch::NewLC()
-{
-	CResultPropertyWatch* me=new(ELeave) CResultPropertyWatch;
-	CleanupStack::PushL(me);
-	me->ConstructL();
-	return me;
-}
-
-CResultPropertyWatch::CResultPropertyWatch() :CActive(EPriority)
-	{
-		iNotified = EFalse;
-	}
-
-
-void CResultPropertyWatch::ConstructL()
-{
-	User::LeaveIfError(iProperty.Attach(KAuthServerSecureId,
-			 KUidAuthServerAuthChangeEvent));
-	CActiveScheduler::Add(this);
-	// Subscribe to the KUidAuthServerAuthChangeEvent property
-	iProperty.Subscribe(iStatus);
-	SetActive();
-	
-	}
-CResultPropertyWatch::~CResultPropertyWatch()
-{
-	Cancel();
-	iProperty.Close();
-
-}
-void CResultPropertyWatch::DoCancel()
-{
-	iProperty.Cancel();
-}
-void CResultPropertyWatch::RunL()
-{	
-	TInt AuthIdChange;
-	
-	//Get the published value
-	iProperty.Get(KAuthServerSecureId, KUidAuthServerAuthChangeEvent, AuthIdChange);
-	iNotified = ETrue;
-	RDebug::Print(_L("Received Notification. New User Identity is %x " ), AuthIdChange );
-	CActiveScheduler::Stop();
-		
-}
-
-
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/step_retrainplugin.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,257 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CTestStep derived implementation
-*
-*/
-
- 
-#include "tAuthSvrStep.h"
-
-#include "authserver/authclient.h"
-#include "authserver/authmgrclient.h"
-
-using namespace AuthServer;
-
-
-//====================================================================================================
-
-class CTrainActive : public CActive
-    {
-    public:    
-    CTrainActive(RAuthMgrClient& aClient, TPluginId plugin1IdValue, TIdentityId iIdFromFile, TBool aStop = ETrue) : 
-         CActive(EPriorityNormal),
-         iClient(aClient),
-		 iResult(EFail),
-         iRunCount(0),
-         iStop(aStop),
-         pluginIdVal(plugin1IdValue),         
-         idToTrain (iIdFromFile)
-        {
-        CActiveScheduler::Add(this);
-        }
-    void doTrain() 
-        {
-
-        SetActive();		
-		TRequestStatus* status = &iStatus;		    
-		User::RequestComplete(status, KErrNone);
-		iRunCount = 0;
-        }
-        void DoCancel() 
-        {
-        }
-     void RunL() 
-        {
-        iErr = iStatus.Int();
-        if (iStatus.Int() != KErrNone)
-            {
-            }
-		switch (iRunCount)
-		  {
-		  case 0:
-				iStatus = KRequestPending;
-	            iClient.TrainPlugin(idToTrain, pluginIdVal, iStatus);
-				SetActive();
-			break;
-
-   		  case 1:
-			iResult = iStatus.Int() == KErrNone ? EPass : EFail;
-            iErr = iStatus.Int();
-			if (iStop)
-                {
-                CActiveScheduler::Stop();
-                }
-
-			break;
-
-     	  default:
-			iResult = EFail;
-			
-			if (iStop)
-			    {
-			    CActiveScheduler::Stop();
-			    }
-		    }
-		  ++iRunCount;
-          }
-	RAuthMgrClient& iClient;
-	TVerdict iResult;
-	TInt iRunCount;
-    TBool iStop;
-    TInt iErr;
-    TPluginId pluginIdVal;
-    TIdentityId idToTrain;
-    };
-    
-//====================================================================================================    
-CTRetrainPlugin::CTRetrainPlugin(CTAuthSvrServer& aParent): iParent(aParent)
-/**
-  Constructor
- */
-	{
-	// Call base class method to set up the human readable name for logging
-	SetTestStepName(KTRetrainPlugin);
-	}
-
-CTRetrainPlugin::~CTRetrainPlugin()
-/**
-  Destructor
- */
-	{}
-	
-TVerdict CTRetrainPlugin::doTestStepPreambleL()
-/**
-  @return - TVerdict code
-  Override of base class virtual
- */
-	{
-	//Call the parent class preamble, setting up the file server, etc
-	CTStepActSch::doTestStepPreambleL();
-	return TestStepResult();
-	}
-
-TVerdict CTRetrainPlugin::doTestStepL()
-/**
-  @return - TVerdict code indicating the test step result    
- */
-	{
-	SetTestStepResult(EPass);
-
-__UHEAP_MARK;		// Check for memory leaks
-
-	//-----------------------------------------------------------------------------------------------------
-	InitAuthServerFromFileL();	// Set things like 'iSupportsDefaultData' and 'DefaultPlugin'
-	
-	CActiveScheduler::Install(iActSchd);
-	//Connect to the AuthServer	
-	AuthServer::RAuthMgrClient authMgrClient1;	
-	TInt connectVal = authMgrClient1.Connect();
-	if (KErrNotFound == connectVal)
-		{
-		//Retry after a delay
-		TTimeIntervalMicroSeconds32 timeInterval = 2000;	//2 Milliseconds
-		User::After(timeInterval);
-		connectVal = authMgrClient1.Connect();
-		}
-	if (KErrNone != connectVal)
-		{
-		ERR_PRINTF2(_L("Unable to start a session or other connection error. Err = %d"), connectVal);
-		User::LeaveIfError(connectVal);		
-		}	
-	
-	CleanupClosePushL(authMgrClient1);
-
-	//-----------------------------------------------------------------------------------------------------
-	//Check the username of the second identity and then attempt to set it.
-	//SetTestStepResult(checkAndSetUserNameL(ac, 0));
-
-	TBool statusAll = EFalse;
-	statusAll = CheckPluginStatusAllL(authMgrClient1);
-	
-	TRAPD(res2, RetrainPlugin(authMgrClient1) );
-	if(KErrNone != res2)
-		{
-		ERR_PRINTF2(_L("RetrainPluginL() performed a Leave with code %d"), res2 );
-		}
-		
-	TRAPD(res1, CheckSpecifiedPluginStatusL());
-	if(KErrNone != res1)
-		{
-		ERR_PRINTF2(_L("checkSpecifiedPluginStatusL() performed a Leave with code %d"), res1 );
-		}
-	
-	statusAll = CheckPluginStatusAllL(authMgrClient1);
-	if (!statusAll)
-		{
-		SetTestStepResult(EFail);
-		}
-	
-	CleanupStack::PopAndDestroy(&authMgrClient1);	// authClient1	
-	//Garbage collect the last previously destroyed implementation 
-	// and close the REComSession if no longer in use
-	REComSession::FinalClose(); 
-__UHEAP_MARKEND;
-	return TestStepResult();
-	}
-
-
-TVerdict CTRetrainPlugin::doTestStepPostambleL()
-/**
-  @return - TVerdict code  
- */
-	{
-	//Call the parent postamble, releasing the file handle, etc
-	CTStepActSch::doTestStepPostambleL();	
-	return TestStepResult();
-	}
-
-/**
-  Retrain the plugin and set the test step error value as required.
- */
-void CTRetrainPlugin::RetrainPlugin (RAuthMgrClient& mgc)
-	{	
-	
-	//If the pluginId is quoted in the ini file, check it's training status
-	TInt plugin1IdValue = 0;	
-	if (GetHexFromConfig(ConfigSection(),_L("plugin1Id"), plugin1IdValue) != EFalse) // the tag 'pluginId1' was present
-		{ 	
-	 	//Read the identityId to be trained
-	 	TIdentityId idToTrain = getLastAuthId();
-	 	INFO_PRINTF2(_L("Id to be (re)trained: %u"), idToTrain);
-	 	
-	 	//Train the plugin again with this identity. 	    
- 	    CTrainActive active(mgc, plugin1IdValue, idToTrain);
-	    active.doTrain();		
-		CActiveScheduler::Start();		
-		
-		SetTestStepError(active.iErr);
-		
-		if (KErrAuthServPluginCancelled == active.iErr)
-			{
-			INFO_PRINTF1(_L("Training was cancelled."));
-			INFO_PRINTF1(_L("User entered trainingInput same as identifyingInput or an existing PIN."));
-			INFO_PRINTF1(_L("Or the Cancel code."));			
-			SetTestStepError(KErrAuthServPluginCancelled);
-			}
-		if (KErrAuthServPluginQuit == active.iErr)
-			{
-			INFO_PRINTF1(_L("Training was quit."));
-			INFO_PRINTF1(_L("User entered the Quit code as trainingInput."));						
-			SetTestStepError(KErrAuthServPluginQuit);
-			}
-		else if(EPass != active.iResult)
-			{
-			ERR_PRINTF3(_L("Training Result error = %d, iResult = %d\n"), active.iErr, active.iResult);			
-			SetTestStepError(active.iErr);
-			SetTestStepResult (EFail);
-			}
-		else if ((KErrNone == active.iErr) && (EPass == active.iResult))
-			{
-			INFO_PRINTF1(_L("(Re)train successful."));
-			SetTestStepResult (EPass);
-			}
-		else
-			{
-			ERR_PRINTF3(_L("Unexpected Training Result. error = %d, iResult = %d\n"), active.iErr, active.iResult);
-			SetTestStepError(active.iErr);
-			SetTestStepResult (EFail);
-			}		
-		}
-		
-	else
-		{
-		INFO_PRINTF1(_L("plugin1Id was not specified in the ini file"));
-		}
-	}
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/step_setauthprefs.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,187 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CTestStep derived implementation
-*
-*/
-
- 
-#include "tAuthSvrStep.h"
-
-#include "authserver/authclient.h"
-#include "authserver/authmgrclient.h"
-
-using namespace AuthServer;
-
-//====================================================================================================    
-CTSetAuthPrefs::CTSetAuthPrefs(CTAuthSvrServer& aParent): iParent(aParent)
-/**
-  Constructor
- */
-	{
-	// Call base class method to set up the human readable name for logging
-	SetTestStepName(KTSetPrefs);
-	}
-
-CTSetAuthPrefs::~CTSetAuthPrefs()
-/**
-  Destructor
- */
-	{}
-	
-TVerdict CTSetAuthPrefs::doTestStepPreambleL()
-/**
-  @return - TVerdict code
-  Override of base class virtual
- */
-	{
-	//Call the parent class preamble, setting up the file server, etc
-	CTStepActSch::doTestStepPreambleL();		
-	
-	return TestStepResult();
-	}
-
-TVerdict CTSetAuthPrefs::doTestStepL()
-/**
-  @return - TVerdict code
-  Override of base class pure virtual
-  
- */
-	{	
-	//If any test step leaves or panics, the test step thread won't exit, further calls are made.
-	// but the html log is updatead, so that subsequent failures could be traced here if necessary. 
-	if (TestStepResult() != EPass)
-		{
-		ERR_PRINTF1(_L("There was an error in a previous test step"));
-		return TestStepResult();
-		}
-
-	SetTestStepResult(EPass);
-
-__UHEAP_MARK;		// Check for memory leaks
-
-	//-----------------------------------------------------------------------------------------------------
-	InitAuthServerFromFileL();	// Set things like 'iSupportsDefaultData' and 'DefaultPlugin'
-	
-	//Connect to the AuthServer	
-	AuthServer::RAuthMgrClient authMgrClient;	
-	TInt connectVal = authMgrClient.Connect();
-	if (KErrNotFound == connectVal)
-		{
-		//Retry after a delay
-		TTimeIntervalMicroSeconds32 timeInterval = 2000;	//2 Milliseconds
-		User::After(timeInterval);
-		connectVal = authMgrClient.Connect();
-		}
-	if (KErrNone != connectVal)
-		{
-		ERR_PRINTF2(_L("Unable to start a session or other connection error. Err = %d"), connectVal);
-		User::LeaveIfError(connectVal);		
-		}	
-	
-	CleanupClosePushL(authMgrClient);
-	
-	AuthServer::RAuthClient authClient;
-			
-	connectVal = authClient.Connect();
-	if (KErrNotFound == connectVal)
-		{
-		//Retry after a delay
-		TTimeIntervalMicroSeconds32 timeInterval = 2000;	//2 Milliseconds
-		User::After(timeInterval);
-		connectVal = authClient.Connect();
-		}
-	if (KErrNone != connectVal)
-		{
-		ERR_PRINTF2(_L("Unable to start a session or other connection error. Err = %d"), connectVal);
-		User::LeaveIfError(connectVal);		
-		}	
-	
-	CleanupClosePushL(authClient);
-	//-----------------------------------------------------------------------------------------------------
-	TRAPD(res2, SetAuthPrefsL(authMgrClient, authClient) );
-	if(KErrNone != res2)
-		{
-		ERR_PRINTF2(_L("SetAuthPrefsL() performed a Leave with code %d"), res2 );
-		SetTestStepError(res2);
-		SetTestStepResult(EFail);
-		}
-		
-	CleanupStack::PopAndDestroy(2,&authMgrClient);	// authClient, authMgrClient 	
-	//Garbage collect the last previously destroyed implementation 
-	// and close the REComSession if no longer in use
-	REComSession::FinalClose(); 
-__UHEAP_MARKEND;
-	return TestStepResult();
-	}
-
-
-TVerdict CTSetAuthPrefs::doTestStepPostambleL()
-/**
-  @return - TVerdict code
-  Override of base class virtual
- */
-	{
-	//Call the parent postamble, releasing the file handle, etc
-	CTStepActSch::doTestStepPostambleL();
-	return TestStepResult();
-	}
-
-
-void CTSetAuthPrefs::SetAuthPrefsL (AuthServer::RAuthMgrClient& aAuthMgrClient, 
-									AuthServer::RAuthClient& aAuthClient)
-	{	
-	TInt plugin = KUnknownPluginId;
-
-	TBool done = EFalse;
-
-	if (GetHexFromConfig(ConfigSection(),KDefauthPrefsTag, plugin))
-	  {
-	  aAuthMgrClient.SetPreferredTypePluginL(EAuthDefault, plugin);
-	  if(aAuthClient.PreferredTypePluginL(EAuthDefault) == plugin)
-		  {
-		  done = ETrue;
-		  }
-	  }
-	if (GetHexFromConfig(ConfigSection(),KKnowledgePrefsTag, plugin))
-	  {
-	  aAuthMgrClient.SetPreferredTypePluginL(EAuthKnowledge, plugin);
-	  if(aAuthClient.PreferredTypePluginL(EAuthKnowledge) == plugin)
-  		  {
-  		  done = ETrue;
-  		  }
-	  }
-	if (GetHexFromConfig(ConfigSection(),KBiometricPrefsTag, plugin))
-	  {
-	  aAuthMgrClient.SetPreferredTypePluginL(EAuthBiometric, plugin);
-	  if(aAuthClient.PreferredTypePluginL(EAuthBiometric) == plugin)
-  		  {
-  		  done = ETrue;
-  		  }
-	  }
-	if (GetHexFromConfig(ConfigSection(),KTokenPrefsTag, plugin))
-	  {
-	  aAuthMgrClient.SetPreferredTypePluginL(EAuthToken, plugin);
-	  if(aAuthClient.PreferredTypePluginL(EAuthToken) == plugin)
-  		  {
-  		  done = ETrue;
-  		  }
-	  }
-
-	if (!done)
-	  {
-		INFO_PRINTF1(_L("missing parameters in the ini file!"));
-		SetTestStepResult(EFail);
-	  }
-	}
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/tAuthSvrServer.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,198 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Test code for the TestExecute Server
-*
-*/
-
-
-
-#include "tAuthSvrServer.h"
-#include "tAuthSvrStep.h"
-
-
-CTAuthSvrServer* CTAuthSvrServer::NewL()
-/**
- * @return - Instance of the test server
- * Called inside the MainL() function to create and start the
- * CTestServer derived server.
- */
-	{
-	CTAuthSvrServer* server = new (ELeave) CTAuthSvrServer();
-	CleanupStack::PushL(server);
-	
-	RProcess handle = RProcess();
-	TParsePtrC serverName(handle.FileName());
-	// Either use a StartL or ConstructL, the latter will permit
-	// server Logging.
-
-	//server->StartL(KServerName); 
-	server-> ConstructL(serverName.Name());
-	CleanupStack::Pop(server);
-	return server;
-	}
-
-
-// EKA2 much simpler
-// Just an E32Main and a MainL()
-
-LOCAL_C void MainL()
-/**
- * Much simpler, uses the new Rendezvous() call to sync with the client
- */
-	{
-	// Leave the hooks in for platform security
-#if (defined __DATA_CAGING__)
-	RProcess().DataCaging(RProcess::EDataCagingOn);
-	RProcess().SecureApi(RProcess::ESecureApiOn);
-#endif
-	CActiveScheduler* sched=NULL;
-	sched=new(ELeave) CActiveScheduler;
-	CleanupStack::PushL(sched);
-	CActiveScheduler::Install(sched);
-	CTAuthSvrServer* server = NULL;
-	// Create the CTestServer derived server	
-	TRAPD(err,server = CTAuthSvrServer::NewL());
-	if(!err)
-		{
-		// Sync with the client and enter the active scheduler
-		RProcess::Rendezvous(KErrNone);
-		sched->Start();
-		}
-	CleanupStack::Pop(sched);
-	delete server;
-	delete sched;
-	}
-
-
-GLDEF_C TInt E32Main()
-/**
- * @return - Standard Epoc error code on exit
- */
-	{
-	CTrapCleanup* cleanup = CTrapCleanup::New();
-	if(cleanup == NULL)
-		{
-		return KErrNoMemory;
-		}
-	TRAP_IGNORE(MainL());
-	delete cleanup;
-	return KErrNone;
-    }
-
-
-CTestStep* CTAuthSvrServer::CreateTestStep(const TDesC& aStepName)
-/**
- * @return - A CTestStep derived instance
- * Implementation of CTestServer pure virtual
- */
-	{
-	// Test step name constant in the test step header file
-	// Created "just in time"
-	if(aStepName == KTFirstStart)
-		{
-		return new CTFirstStart();
-		}
-	else if (aStepName == KTAuthSvrCheck)
-		{
-		return new CTAuthSvrCheck();
-		}
-	else if (aStepName == KTRegIdentity)
-		{
-		return new CTRegIdentity(*this);
-		}
-	else if (aStepName == KTIdentifyMultiple)
-		{
-		return new CTIdentifyMultiple();
-		}
-	else if (aStepName == KTStepCreateTestDb)
-		{
-		return new CTStepCreateTestDb();
-		}
-	else if (aStepName == KTRetrainPlugin)
-		{
-		return new CTRetrainPlugin(*this);
-		}
-	else if (aStepName == KTRemoveDbs)
-		{
-		return new CTRemoveDbs();
-		}
-	else if (aStepName == KTRemoveIdentity)
-		{
-		return new CTRemoveIdentity(*this);
-		}
-	else if (aStepName == KTForgetPlugin)
-		{
-		return new CTRemoveAuthMethod(*this);	
-		}
-	else if (aStepName == KTAuthenticate)
-		{
-		return new CTAuthenticate(*this);
-		}
-	else if (aStepName == KTSetPrefs)
-		{
-		return new CTSetAuthPrefs(*this);
-		}
-	else if (aStepName == KTInitCenRep)
-		{
-		return new CTInitCenRep(*this);
-		}
-	else if (aStepName == KTResultAvailability)
-		{
-		return new CResultAvailability(*this);
-		}
-	else if (aStepName == KTResultChangeNotify)
-		{
-		return new CResultChangeNotify(*this);
-		}
-	else if (aStepName == KTResetIdentity)
-		{
-		return new CTResetIdentity(*this);
-		}
-	else if (aStepName == KTPostMarketPlugin)
-		{
-		return new CTPostMarketPlugin();
-		}
-	else if (aStepName == KTStepClientSidSupportCheck)
-		{
-		return new CTStepClientSidSupport(*this);
-		}
-	else if (aStepName == KTInstallPluginStep)
-		{
-		return new CTInstallPluginStep();
-		}
-	else if (aStepName == KTUninstallPluginStep)
-		{
-		return new CTUninstallPluginStep();
-		}
-	else if (aStepName == KTAuthServerOom)
-		{
-		return new CAuthSvrOom(*this);
-		}
-	else if (aStepName == KTUpdateSysTime)
-		{
-		return new CTSysTimeUpdate(*this);
-		}
-	else if (aStepName == KTMultiThreadedTest)
-	    {
-	    return new CTMultiThreaded(*this);
-	    }
-	else
-		{
-		ERR_PRINTF1(_L("The test step name specified does not exist."));
-		}
-	
-	return NULL;
-	}
-
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/tAuthSvrServer.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,48 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* tAuthSvrServer is the base class for all authSvr tests
-*
-*/
-
-
-
-#ifndef T_AUTHSVR_SERVER_H
-#define T_AUTHSVR_SERVER_H
-
-#include <test/testexecuteserverbase.h>
-#include "authserver/authclient.h"
-#include "authserver/authmgrclient.h"
-
-
-
-class CTAuthSvrServer : public CTestServer
-	{
-public:
-	static CTAuthSvrServer*		NewL();	// First phase constructor
-	// Base class pure virtual
-	virtual CTestStep*			CreateTestStep(const TDesC& aStepName);
-	//RFs& Fs()	{return iFs;};
-	//AuthServer::RAuthClient Cl() {return client3;};
-	AuthServer::RAuthMgrClient Cl() {return client2;};	
-	//RAuthClient will be tested by way of inheritance
-	
-private:
-	//AuthServer::RAuthClient client3;	//variable that will be shared by the steps
-	AuthServer::RAuthMgrClient client2;	//variable that will be shared by the steps
-	//RFs		iFs;
-	
-	};
-
-#endif	/* T_AUTHSVR_SERVER_H */
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/tAuthSvrStep.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,786 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-
-#ifndef T_AUTHSVR_STEP_H
-#define T_AUTHSVR_STEP_H
-
-#include <test/testexecutestepbase.h>
-#include <ecom/ecom.h>
-
-#include "authserver_client.h"
-#include <authserver/authplugininterface.h>
-#include <pinplugindialogdefs.h>
-
-#include "authserver_impl.h"
-#include "authserver/authclient.h"
-#include "authserver/authmgrclient.h"
-
-#include "tAuthSvrServer.h"
-#include "tauthdbstep.h"
-
-// these tests use some information which is normally
-// only visible to the server, or to the client DLL.
-
-#include "authdb.h"
-#include "authserveripc.h"
-#include "transientkey.h"
-#include "transientkeyinfo.h"
-#include "testutilclient.h"
-using namespace AuthServer;
-
-
-_LIT(KInputFile, 	"C:\\t_pinplugindlg_in.dat");
-_LIT(KOutputFile, "C:\\t_pinplugindlg_out.dat");
-_LIT(KEmptyString, "");
-
-// Used when creating the initial db
-//#define KNumPlugins 8	//Defined in tauthdbstep.h
-
-class CTAuthSvrStepBase : public CTestStep
-	{
-protected:
-	CTAuthSvrStepBase();
-	~CTAuthSvrStepBase();
-	virtual TVerdict doTestStepPreambleL()	
-		{
-
-		iFs.Connect();	
-	   	return TestStepResult();
-		}
-	virtual TVerdict doTestStepPostambleL()
-	    {
-		iFs.Close();
-		return TestStepResult();
-		
-		}
-	void SetDefaultPluginIdL(TInt aDefault);
-
-	HBufC* GetNameLC(TInt i);
-
-	void PluginData(AuthServer::TIdentityId aId, AuthServer::TPluginId aPlugin,	TPtr8 aDes) 
-		{
-		aDes.Fill(aId*aPlugin);
-		}
-
-//Needed because of the use of Step_CreateDb
-	inline void CreatePlugins();
-	inline void CreateKeyInfo();
-		
-	//Utility functions allowing text INI file parsing abilities
-	TInt writeToNamedConfig(CIniData* aFile, const TDesC &aSectName,const TDesC &aKeyName, const TPtrC &aResult);
-	//Section name unspecified
-	TInt writeToNamedConfig(CIniData* aFile, const TDesC &aKeyName,const TPtrC &aResult);
-	TInt readFromNamedConfigL(const TDesC &aFileName, const TDesC &aSectName,const TDesC &aKeyName, HBufC*& aResult);
-	//Section name unspecified
-	TInt readFromNamedConfigL(const TDesC &aFileName, const TDesC &aKeyName, HBufC*& aResult);
-	//Read data from testexecute ini file that will be used to initialise the Authentication Server
-	TInt InitAuthServerFromFileL();
-	
-	//Read plugin input train or plugin input id data from testexecute ini file 
-	//that will be used to initialise the Authentication Server, based on  
-	//aInitTrainInput.If set, this method reads plugin input train, else
-	//reads plugin input id.
-	TInt InitPluginDataFromFileL(TBool aInitTrainInput);
-	
-	// Wait for the server to shut down and so release the authentication database.
-	void WaitForServerToReleaseDb();
-	// 	Remove any existing database file.
-	void RemoveExistingDbL();
-	// 	Utility function coverting HexString to Integer
-	TInt HexString2Num(const TDesC8& aStr);
-	// Utility function for removing a specified Identity from the global Identity array
-	TInt RemoveIdFromGlobalDbL(TUint32 aId);
-	// Utility clean up function used when working with locally declared arrays
-	//void CleanupEComArray(TAny* aArrayOfPlugins);	
-	
-	//Utility function to read and set the username of a given identity
-	TVerdict checkAndSetUserNameL(AuthServer::RAuthClient& ac, TInt idPosition);	
-	// Utility function for checking the status of a pluginId that is specified
-	// in the ini file.
-	void CheckSpecifiedPluginStatusL();
-	// Version of above function that avoids a call to the 'Connect()' function
-	void CheckSpecifiedPluginStatusConnectedL(AuthServer::RAuthClient& ac);
-	
-	// Checks that the status of each plugin is as expected.
-	// based on the number of identities trained for that plugin, and the number of identities 
-	// present in the Authentication server.
-	TBool CheckPluginStatusAllL (AuthServer::RAuthClient& ac);
-	
-	// Reads the number of identities that have been trained with the plugin that 
-	// has its database in the named file
-	TInt GetNumIdsFromPluginDbL(const TDesC &aFileName);
-	
-	// Utility function for retrieving the last authenticated id from a file
-	AuthServer::TIdentityId getLastAuthId();
-	
-    AuthServer::CAuthExpression* CreateAuthExprLC(const TDesC& aString);
-    
-    void CreatePinPluginInputFileL(TPinPluginDialogOperation aOperation, TPinValue aPinValue);
-    
-    TPinValue GetPinFromOutputFileL();
-    
-    void ClientMessage(TBool aIsMessage, const TDesC& aDisplayString);
-    
-protected:
-	RFs iFs;	
-	
-	// Used when creating the initial db
-	AuthServer::CPluginDesc*       iPlugins[KNumPlugins];
-	AuthServer::CTransientKeyInfo* iId1Keys[KNumPlugins];
-	AuthServer::CTransientKeyInfo* iId2Keys[KNumPlugins];
-	AuthServer::CTransientKeyInfo* iId3Keys[KNumPlugins];
-
-	};
-	
-// Utility clean up function used when working with locally declared arrays
-	void CleanupEComArray(TAny* aArrayOfPlugins);	
-
-inline CTAuthSvrStepBase::~CTAuthSvrStepBase() 
-    {
-    for (TInt i = 0 ; i < KNumPlugins ; ++i)
-        {
-        delete iPlugins[i];
-        delete iId1Keys[i];
-        delete iId2Keys[i];
-        delete iId3Keys[i];
-        }
-    }
-
-inline HBufC* CTAuthSvrStepBase::GetNameLC(TInt id)
-    {
-    _LIT(nameTmpl, "Plugin_%d");
-	HBufC* name = HBufC::NewLC(15);
-	name->Des().Format(nameTmpl, id);
-	return name;
-    }
-    
-inline void CTAuthSvrStepBase::CreatePlugins()
-	{
-	using namespace AuthServer;
-	
-	const TAuthPluginType   types[KNumPlugins]
-		= { EAuthBiometric, EAuthToken, EAuthKnowledge,
-			EAuthBiometric, EAuthToken, EAuthKnowledge,
-			EAuthToken, EAuthKnowledge
-		};
-	const TAuthTrainingStatus   training[KNumPlugins]
-		= { EAuthUntrained, EAuthTrained, EAuthFullyTrained,
-			EAuthUntrained, EAuthTrained, EAuthFullyTrained,
-			EAuthTrained, EAuthFullyTrained
-		  };
-
-
-	for (TInt i = 0 ; i < KNumPlugins ; ++i)
-		{
-			HBufC* name = GetNameLC(i);
-			
-			iPlugins[i] = CPluginDesc::NewL(i, *name, types[i],
-											training[i], i*10000, i, i*4);
-		    CleanupStack::PopAndDestroy(name);									
-		}
-	}
-
-inline void CTAuthSvrStepBase::CreateKeyInfo()
-	{
-	using namespace AuthServer;
-
-	CProtectionKey* protKey1 = CProtectionKey::NewLC(8);
-	CProtectionKey* protKey2 = CProtectionKey::NewLC(8);
-	CProtectionKey* protKey3 = CProtectionKey::NewLC(8);
-
-	HBufC8* data = HBufC8::NewLC(4);
-	
-	for (TInt plugin = 0 ; plugin < KNumPlugins ; ++plugin)
-		{
-			CTransientKey* transient = 0;
-			// id 1
-			iId1Keys[plugin] = CTransientKeyInfo::NewL(plugin);
-			PluginData(1, plugin, data->Des());
-			transient = iId1Keys[plugin]->CreateTransientKeyL(data->Des());
-			CEncryptedProtectionKey* epKey1 =
-				transient->EncryptL(*protKey1);
-			delete transient;
-			iId1Keys[plugin]->SetEncryptedProtectionKeyL(epKey1);
-			// id 2
-			PluginData(2, plugin, data->Des());
-			iId2Keys[plugin] = CTransientKeyInfo::NewL(plugin);
-			transient = iId2Keys[plugin]->CreateTransientKeyL(data->Des());
-			CEncryptedProtectionKey* epKey2 =
-				transient->EncryptL(*protKey2);
-			delete transient;
-			iId2Keys[plugin]->SetEncryptedProtectionKeyL(epKey2);
-			// id 3
-			PluginData(3, plugin, data->Des());
-			iId3Keys[plugin] = CTransientKeyInfo::NewL(plugin);
-			transient = iId3Keys[plugin]->CreateTransientKeyL(data->Des());
-			CEncryptedProtectionKey* epKey3 =
-				transient->EncryptL(*protKey3);
-			delete transient;
-			iId3Keys[plugin]->SetEncryptedProtectionKeyL(epKey3);
-		}
-	CleanupStack::Pop(4, protKey1);
-	}
-
-
-/**
-	This abstract subclass of CTAuthcliservStepBase
-	overrides the doTestStep(Pre|Post)ambleL functions
-	from CTestBase to allocate and free an active
-	scheduler.
-	
-	The scheduler is stored in the protected iActSchd
-	variable.  This class does not start or stop the
-	scheduler.
- */
-
-class CTStepActSch : public CTAuthSvrStepBase
-	{
-protected:
-	// override CTestStep
-	virtual TVerdict doTestStepPreambleL();
-	virtual TVerdict doTestStepPostambleL();
-		
-protected:
-	/** The active scheduler which subclasses can use. */
-	CActiveScheduler* iActSchd;
-	};
-    
-
-class CTFirstStart : public CTAuthSvrStepBase
-	{
-public:
-	CTFirstStart();	
-	//~CTFirstStart();
-	virtual TVerdict doTestStepPreambleL();
-	virtual TVerdict doTestStepL();
-	//virtual TVerdict doTestStepPostambleL();
-	};
-	
-class CTAuthSvrCheck: public CTAuthSvrStepBase
-	{
-public:
-	CTAuthSvrCheck();
-	//~CTAuthSvrCheck();
-	//virtual TVerdict doTestStepPreambleL();
-	virtual TVerdict doTestStepL();
-	//virtual TVerdict doTestStepPostambleL();
-	};
-	
-class CTRegIdentity: public CTStepActSch
-	{
-public:
-	CTRegIdentity(CTAuthSvrServer& aParent);
-	~CTRegIdentity();
-	virtual TVerdict doTestStepPreambleL();
-	virtual TVerdict doTestStepPostambleL();
-	virtual TVerdict doTestStepL();
-	
-private:
-	void ListPluginsL(AuthServer::RAuthMgrClient& aAuthMgrClient );
-	void SetPinPluginStateL();
-	void RemovePinPluginFileL();
-	
-private:
-	CTAuthSvrServer& iParent;
-	};
-	
-class CTEnumIdentities: public CTAuthSvrStepBase
-	{
-public:
-	CTEnumIdentities(CTAuthSvrServer& aParent);
-	virtual TVerdict doTestStepL();	
-private:
-	CTAuthSvrServer& iParent;
-	};
-	
-class CTIdentifyMultiple: public CTAuthSvrStepBase
-	{
-public:
-	//CTIdentifyMultiple(CTAuthSvrServer& aParent);
-	CTIdentifyMultiple();
-	~CTIdentifyMultiple();
-	virtual TVerdict doTestStepPreambleL();	
-	virtual TVerdict doTestStepL();	
-private:
-	//CTAuthSvrServer& iParent;
-	RArray<TUid> iPluginIds;
-	};
-	
-class CTRetrainPlugin: public CTStepActSch
-	{
-public:	
-	//CTRetrainPlugin();
-	CTRetrainPlugin(CTAuthSvrServer& aParent);
-	~CTRetrainPlugin();
-	virtual TVerdict doTestStepPreambleL();
-	virtual TVerdict doTestStepPostambleL();	
-	virtual TVerdict doTestStepL();	
-	// Utility function that calls 'Train' for a specified plugin	
-	void RetrainPlugin (AuthServer::RAuthMgrClient& mgc);
-private:
-	CTAuthSvrServer& iParent;
-	};
-
-class CTRemoveAuthMethod: public CTStepActSch
-	{
-public:	
-	//CTRetrainPlugin();
-	CTRemoveAuthMethod(CTAuthSvrServer& aParent);
-	~CTRemoveAuthMethod();
-	virtual TVerdict doTestStepPreambleL();
-	virtual TVerdict doTestStepPostambleL();	
-	virtual TVerdict doTestStepL();	
-	void RemoveAuthMethodL (AuthServer::RAuthMgrClient& mgc);
-private:
-	CTAuthSvrServer& iParent;
-	};
-
-class CTRemoveDbs: public CTStepActSch
-	{
-public:	
-	CTRemoveDbs();
-	~CTRemoveDbs();
-	virtual TVerdict doTestStepPreambleL();
-	virtual TVerdict doTestStepPostambleL();	
-	virtual TVerdict doTestStepL();	
-private:
-	
-	};
-	
-class CTRemoveIdentity: public CTStepActSch
-	{
-public:	
-	CTRemoveIdentity(CTAuthSvrServer& aParent);
-	~CTRemoveIdentity();
-	virtual TVerdict doTestStepPreambleL();
-	virtual TVerdict doTestStepPostambleL();	
-	virtual TVerdict doTestStepL();		
-	// Utility function that calls 'authenticate, then removeIdentity', with a specified plugin	
-	void doRemoveIdentityL (AuthServer::RAuthMgrClient& mgc);	
-private:
-	CTAuthSvrServer& iParent;
-	};
-
-class CTAuthenticate: public CTStepActSch
-	{
-public:
-	CTAuthenticate(CTAuthSvrServer& aParent);
-	~CTAuthenticate();
-	virtual TVerdict doTestStepPreambleL();
-	virtual TVerdict doTestStepPostambleL();	
-	virtual TVerdict doTestStepL();
-	//Utility function that stores the most recently authenticated identity in the GlobalDb file
-	//This should only be called by the Authenticate test step
-	void setLastAuthIdL(AuthServer::TIdentityId idToStore);
-	
-	/**
-  	This method calls the synchronous version of AuthenticateL method.
-  
-   	@param aAuthMgrClient		authMgrClient object.
-   	@param aInputString			descriptor containing either the alias string or auth expression
-   								string as read from the ini file.
-   	@param aFreshness			time period which serves as a check to determine if an authentication 
-   								has previously been performed within this period.This value is read from 
-   								the ini file.If not present,the default value is used.
- 
-  	@param aClientSpecificKey 	this value when true represents the key returned by 
-  								auth server will be unique to the calling client.This value is read from the 
-  								ini file.By default this is set to false.
- 
-  	@param isAlias 				this value when true specifies that the authentication is performed via alias.
-  								This value is read from the ini file.By default it is set to false.
- 
- 	
-  	*/
- 
-  	void CallSyncAuthenticateL(AuthServer::RAuthMgrClient& aAuthMgrClient, const TDesC& aInputString, TInt aFreshness, TBool aClientSpecificKey, TBool isAlias, TBool isDefault, const TDesC& aClientMessage);
-	
-	/**
-  	This method calls the asynchronous version of AuthenticateL method.
-  
-   	@param aAuthMgrClient		authMgrClient object.
-   	@param aInputString			descriptor containing either the alias string or auth expression
-   								string as read from the ini file.
-   	@param aFreshness			time period which serves as a check to determine if an authentication 
-   								has previously been performed within this period.This value is read from 
-   								the ini file.If not present,the default value is used.
- 
-  	@param aClientSpecificKey 	this value when true represents the key returned by 
-  								auth server will be unique to the calling client.This value is read from the 
-  								ini file.By default this is set to false.
- 
-  	@param isAlias 				this value when true specifies that the authentication is performed via alias.
-  								This value is read from the ini file.By default it is set to false.
- 
- 	
-  	*/
-	void CallAsyncAuthenticateL(AuthServer::RAuthMgrClient& aAuthMgrClient, TDesC& aInputString, TInt aFreshness, TBool aClientSpecificKey, TBool isAlias, TBool isDefault, const TDesC& aClientMessage);
-	
-private:
-	CTAuthSvrServer& iParent;
-	};
-		
-class CTSetAuthPrefs: public CTStepActSch
-	{
-public:
-	CTSetAuthPrefs(CTAuthSvrServer& aParent);
-	~CTSetAuthPrefs();
-	virtual TVerdict doTestStepPreambleL();
-	virtual TVerdict doTestStepPostambleL();	
-	virtual TVerdict doTestStepL();
-	void SetAuthPrefsL(AuthServer::RAuthMgrClient& aAuthMgrClient, AuthServer::RAuthClient& aAuthClient);
-
-private:
-	CTAuthSvrServer& iParent;
-	};
-
-class CTResetIdentity: public CTStepActSch
-	{
-public:	
-	CTResetIdentity(CTAuthSvrServer& aParent);
-	~CTResetIdentity();
-	virtual TVerdict doTestStepPreambleL();
-	virtual TVerdict doTestStepPostambleL();	
-	virtual TVerdict doTestStepL();		
-	// Utility function that calls 'resetIdentity', with a specified plugin
-	void doResetIdentityL();
-private:
-	CTAuthSvrServer& iParent;
-	};
-
-/**
-	This class initializes the aliases in the authserver's central repository file 
-	with different values as specified in the ini file.
-  */
-
-class CTInitCenRep: public CTStepActSch
-	{
-public:
-	CTInitCenRep(CTAuthSvrServer& aParent);
-	~CTInitCenRep();
-	virtual TVerdict doTestStepPreambleL();
-	virtual TVerdict doTestStepPostambleL();	
-	virtual TVerdict doTestStepL();
-private:
-	CTAuthSvrServer& iParent;
-	};
-
-class CResultAvailability: public CTStepActSch
-	{
-public:
-	CResultAvailability(CTAuthSvrServer& aParent);
-	~CResultAvailability();
-	virtual TVerdict doTestStepPreambleL();
-	virtual TVerdict doTestStepPostambleL();
-	virtual TVerdict doTestStepL();
-	
-private:
-	CTAuthSvrServer& iParent;
-	};
-
-class CAuthSvrOom: public CTStepActSch
-	{
-public:
-	CAuthSvrOom(CTAuthSvrServer& aParent);
-	~CAuthSvrOom();
-	virtual TVerdict doTestStepPreambleL();
-	virtual TVerdict doTestStepPostambleL();
-	virtual TVerdict doTestStepL();
-	TVerdict doClientOOMTestL();
-	TVerdict doServerOOMTestL();
-	TVerdict doPerformanceTestL();
-	void ReadTestConfigurationL();
-	TVerdict doTestL(AuthServer::RAuthMgrClient& ac);
-	void doStartupTestL();
-	void doRegOOMTestL(AuthServer::RAuthMgrClient &ac);
-	void doSyncAuthOOMTestL(AuthServer::RAuthMgrClient& ac);
-	void doAsyncAuthOOMTestL(AuthServer::RAuthMgrClient& ac);
-	void doSetPreferredTypeL(AuthServer::RAuthMgrClient& ac);
-	void doRemoveIdentityL(AuthServer::RAuthMgrClient& ac);
-	void doForgetPluginL(AuthServer::RAuthMgrClient& ac);
-	void doRetrainPluginL(AuthServer::RAuthMgrClient& ac);
-	void doListPluginsL(AuthServer::RAuthMgrClient& ac);
-	void doListActivePluginsL(AuthServer::RAuthMgrClient& ac);
-	void doListPluginsOfTypeL(AuthServer::RAuthMgrClient& ac);
-	void doListPluginsWithTrainingStatusL(AuthServer::RAuthMgrClient& ac);
-	void doListAuthStrengthAliasesL(AuthServer::RAuthMgrClient& ac);
-	void doResetAll(AuthServer::RAuthMgrClient& ac);
-	void doResetType(AuthServer::RAuthMgrClient& ac);
-	void doResetList(AuthServer::RAuthMgrClient& ac);
-// performance tests.
-	void StartTimer();
-	void StopTimerAndPrintResultL();
-	void PrintPerformanceLog(TTime aTime);
-	
-
-private:
-	CTAuthSvrServer& iParent;
-	TInt iFreshnessVal;
-	TPtrC iExprString;
-	TBool iClientSpecificKeyVal;
-	TBool iDefaultpluginusage;
-	TBuf<100> iMessage;
-	TTime iStartTime;
-	TInt iIterationCount;
-
-	};
-
-class CResultPropertyWatch:CActive
-	{
-	enum {EPriority=0};
-	public:
-	static CResultPropertyWatch* NewLC();
-	~CResultPropertyWatch();
-	void DoCancel();
-	private:
-	CResultPropertyWatch();
-	void ConstructL();
-	
-	void RunL();
-	
-	private:
-	RProperty iProperty;
-	public:	
-	TBool iNotified;
-	};
-
-class CResultChangeNotify: public CTStepActSch
-	{
-public:
-	CResultChangeNotify(CTAuthSvrServer& aParent);
-	~CResultChangeNotify();
-	virtual TVerdict doTestStepPreambleL();
-	virtual TVerdict doTestStepPostambleL();
-	virtual TVerdict doTestStepL();
-	
-private:
-	void SetPinPluginStateL();
-	void RemovePinPluginFileL();
-private:
-	CTAuthSvrServer& iParent;
-	CResultPropertyWatch* watch;
-
-	};
-
-
-class CTPostMarketPlugin: public CTAuthSvrStepBase
-	{
-public:
-
-	CTPostMarketPlugin();
-	~CTPostMarketPlugin();
-	virtual TVerdict doTestStepPreambleL();
-	virtual TVerdict doTestStepL();
-	
-private:
-
-	/**
-  	This method simulates plugin installation.In case of upgrades to ROM, it verifies 
-  	that the right plugin is loaded (depending on the ROM_Only field in the plugin registration file),
-  	and that the plugin count increments when the macro to enable post market plugins is set to one,
-  	and remains the same when the macro is disabled.
-  
-   	*/
-	
-	TBool TestPluginInstallL(AuthServer::RAuthMgrClient& aAuthMgrClient, RTestUtilSession& aUtilSession);
-
- 	/**
-  	This method simulates plugin uninstallation.In case of upgrades to ROM, it verifies 
-  	that the ROM plugin is loaded, and that the plugin count decrements when the macro to enable 
-	post market plugins is set to one, 	and remains the same when the macro is disabled.
-  
-   	*/
-	
-	TBool TestPluginUninstallL(AuthServer::RAuthMgrClient& aAuthMgrClient, RTestUtilSession& aUtilSession);
-	
-	/**
-  	This method lists the available plugin implementations and tests whether
-  	it matches with the expected plugin count.This method also takes plugin name 
-  	as a default argument,which assists in testing whether the right plugin has 
-  	been loaded during ROM upgrade operat
-  
-  	@param aAuthMgrClient	authMgrClient object.
-   	@param aExpectedCount	expected plugin count.
-   	@param aPluginName		expected plugin name.Default argument.
-   	@return 				true, when the actual plugin count equals the expected one.
-   							When the plugin name is specified, returns true, if
-   							the plugin name matches the expected one.
-   
-   	*/
-	TBool VerifyObtainedResultsWithExpectedL(AuthServer::RAuthMgrClient& aAuthMgrClient, TInt aExpectedCount, const TDesC& aPluginName = KEmptyString);
-	
-private:
-	
-	TPtrC iSrcPlugin;
-	TPtrC iTargetPlugin;
-	TPtrC iSrcRscFile;
-	TPtrC iTargetRscFile;
-  	};
-  	
- class CTStepClientSidSupport : public CTStepActSch
-	{
-public:
-	CTStepClientSidSupport(CTAuthSvrServer& aParent);
-	
-	~CTStepClientSidSupport();
-	virtual TVerdict doTestStepPreambleL();
-	virtual TVerdict doTestStepL();
-	
-private:
-	TBool VerifyObtainedResultsWithExpectedL();
-	
-private:
-	CTAuthSvrServer& iParent;
-	TUid iClientSid;
-	TBool iClientSpecificKey;
-	TBool iWithString;
-	TInt iPluginId;
-	AuthServer::CIdentity* iIdentity;
-	AuthServer::CIdentity* iIdentityAfterRetrain;
-	};
-	
-class CTInstallPluginStep: public CTAuthSvrStepBase
-	{
-public:
-
-	CTInstallPluginStep();
-	~CTInstallPluginStep();
-	virtual TVerdict doTestStepPreambleL();
-	virtual TVerdict doTestStepL();
-	
-private:
-	
-	TPtrC iSrcPlugin;
-	TPtrC iTargetPlugin;
-	TPtrC iSrcRscFile;
-	TPtrC iTargetRscFile;
-  	};
-  	
-class CTUninstallPluginStep: public CTAuthSvrStepBase
-	{
-public:
-
-	CTUninstallPluginStep();
-	~CTUninstallPluginStep();
-	virtual TVerdict doTestStepPreambleL();
-	virtual TVerdict doTestStepL();
-	
-private:
-	
-	TPtrC iSrcPlugin;
-	TPtrC iTargetPlugin;
-	TPtrC iSrcRscFile;
-	TPtrC iTargetRscFile;
-  	};  	
-  	
-
-class CTSysTimeUpdate: public CTStepActSch
-	{
-public:
- 	CTSysTimeUpdate(CTAuthSvrServer& aParent);
- 	~CTSysTimeUpdate();
- 	virtual TVerdict doTestStepPreambleL();
- 	virtual TVerdict doTestStepPostambleL();	
- 	virtual TVerdict doTestStepL();
-private:
- 	CTAuthSvrServer& iParent;
- 	};
-   		
-//Parameters class.For now, used only to get the result.
-class TThreadParams
-    {
-public:
-    TInt result;
-    };
-
-
-class CTMultiThreaded: public CTStepActSch
-    {
-public:
-    CTMultiThreaded(CTAuthSvrServer& aParent);
-    ~CTMultiThreaded();
-    virtual TVerdict doTestStepPreambleL();
-    virtual TVerdict doTestStepPostambleL();    
-    virtual TVerdict doTestStepL();
-    static void runMultiThreadedTest(TThreadParams* aParams);
-    static void doRegisterL(TThreadParams& aParams);
-private:
-    CTAuthSvrServer& iParent;
-    };
-
-// Strings for the server create test step code
-_LIT(KTFirstStart,					"FIRST_START");
-_LIT(KTAuthSvrCheck,				"AUTHSVR_CHECK");
-_LIT(KTRegIdentity,					"REG_IDENTITY");
-_LIT(KTEnumIdentities, 				"ENUM_IDENTITIES");
-_LIT(KTIdentifyMultiple, 			"IDENTIFY_MULTIPLE");
-_LIT(KTRetrainPlugin,				"RETRAIN_PLUGIN");
-_LIT(KTForgetPlugin,				"FORGET_PLUGIN");
-_LIT(KTRemoveDbs,					"REMOVE_DBS");
-_LIT(KTRemoveIdentity,				"REMOVE_IDENTITY");
-_LIT(KTAuthenticate,				"AUTHENTICATE");
-_LIT(KTSetPrefs, 			    	"SET_PREFS");
-_LIT(KTInitCenRep,					"INIT_CENREP");
-_LIT(KTResultAvailability, 			"RESULT_AVAILABILITY");
-_LIT(KTResultChangeNotify, 			"RESULT_NOTIFICATION");
-_LIT(KTPostMarketPlugin,			"POST_MARKET_PLUGIN");
-_LIT(KTStepClientSidSupportCheck, 	"CLIENT_SID_CHECK");
-_LIT(KTInstallPluginStep, 			"INSTALL_PLUGIN");
-_LIT(KTUninstallPluginStep, 		"UNINSTALL_PLUGIN");
-_LIT(KTAuthServerOom,	 			"OOM_TEST");
-_LIT(KTResetIdentity,				"RESET_IDENTITY");
-_LIT(KTUpdateSysTime,				"UPDATE_SYSTIME");
-_LIT(KTMultiThreadedTest,           "MULTI_THREADED");
-
-// Performance related names
-_LIT(KMaxDurationName, 				"MaxDuration");
-_LIT(KMaxTestCaseDuration, 			"TEST_CASE_MAXIMUM_ALLOWED_DURATION");
-_LIT(KActualTestCaseDuration, 		"TEST_CASE_ACTUAL_DURATION");
-_LIT(KPerformanceTestInfo, 			"PERFORMANCE_LOG_INFORMATION");
-// String used to store the filename that contains the initialisation data used by the PinAuthPlugin, etc
-
-_LIT(KPluginIniFile, 			"\\tAuth\\tAuthSvr\\testdata\\initialisation_Info.ini");
-_LIT(KPluginIniSection,			"SectionOne");
-_LIT(KAuthSvrPolicyFile, 		"\\tAuth\\tAuthSvr\\testdata\\AuthSvrPolicy.ini");
-_LIT(KDefaultPluginTag, 		"DefaultPlugin");
-_LIT(KIdEnteredPinTag, 			"IdEnteredPinValue");
-_LIT(KTrainEnteredPinTag, 		"TrainEnteredPinValue");
-_LIT(KSupportsDefaultTag,		"iSupportsDefaultData");	//used to specify whether the individual plugins support default data 
-_LIT(KActiveStateTag,			"activeState");	//used to specify whether the individual plugins are active
-_LIT(KPinDbTag,					"Identity&PinValues");
-_LIT(KTotalDbTag,				"AllUserID&PinValues");
-_LIT(KDisplayMessage,			"DisplayMessage");
-_LIT(KLastAuthIdTag,			"LastAuthId");
-_LIT(KDefauthPrefsTag,			"DefaultPref");
-_LIT(KKnowledgePrefsTag,		"KnowledgePref");
-_LIT(KBiometricPrefsTag,		"BiometricPref");
-_LIT(KTokenPrefsTag,			"TokenPref");
-
-_LIT(KInitPinDatabaseValue,		",");
-_LIT(KDefaultInput,				"0000");
-
-// Strings used to store the filenames for the pluginDb files
-_LIT(KPlugin3100File,		"\\tAuth\\tAuthSvr\\testdata\\Pin11113100Db.ini");
-_LIT(KPlugin3101File,		"\\tAuth\\tAuthSvr\\testdata\\Pin11113101Db.ini");
-_LIT(KPlugin3102File,		"\\tAuth\\tAuthSvr\\testdata\\Pin11113102Db.ini");
-_LIT(KPlugin3103File,		"\\tAuth\\tAuthSvr\\testdata\\Pin11113103Db.ini");
-_LIT(KPlugin3104File,		"\\tAuth\\tAuthSvr\\testdata\\Pin11113104Db.ini");
-_LIT(KPlugin4100File,		"\\tAuth\\tAuthSvr\\testdata\\Pin10234100Db.ini");
-
-#endif	/* T_AUTHSVR_STEP_H */
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/tPinAuthPlugin.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,1182 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-
-#include <f32file.h>
-
-#include "tPinAuthPlugin.h"
-#include <e32svr.h>
-
-#ifndef __INIPARSER_H__
-	#include <cinidata.h>
-#endif // __INIPARSER_H__
-
-
-CTPinAuthPlugin::~CTPinAuthPlugin()
-	{
-	delete iClientMessage;
-	}
-
-CTPinAuthPlugin::CTPinAuthPlugin()
-	{	
-	// See ConstructL() for initialisation completion.
-	}
-		
-/**
- Safely complete the initialization of the constructed object	
-*/
-void CTPinAuthPlugin::ConstructL()
-	{
-	iName.Set(KPluginNamePin);
-	iDescription.Set(KPluginDescriptionPin);
-	iMinEntropy = KEntropyPin;
-	iFalsePositiveRate = KFalsePosPin;
-  	iFalseNegativeRate = KFalseNegPin;
-  	iClientMessage = HBufC::NewL(2048);
-	ReloadAllFromIniFile();
-	}
-	
-/**
-  Sets information like iActiveState and iSupportsDefaultData from 
-  the TEF ini file to the individual plugin database files
-*/	
-void CTPinAuthPlugin::ReloadAllFromIniFile()
-	{
-	// Set the file to be read, based on the Id of the plugin
-	
-	_LIT(KFileText, "\\tAuth\\tAuthSvr\\testdata\\Pin");
-	_LIT(KFileSuffix, "Db.ini");					
-	_LIT(KFormatFileName,"%S%x%S");
-	
-	TDriveUnit sysDrive (RFs::GetSystemDrive());
-	TBuf<64> fileText(sysDrive.Name());
-	fileText.Append(KFileText);
-	iFileToRead.Format(KFormatFileName,&fileText, Id(), &KFileSuffix);
-
-	//Read data from file to get initialisation information
-	
-	// Open and read in INI file
-	// Default path to look for INI file is in 'c:\system\data' 
-	// on target filesystem
-	
-	CIniData* file=NULL;
-	TRAPD(r,file=CIniData::NewL(iFileToRead));
-	
-	//Put file on the cleanupstack if anything else in this function is going to leave, but nothing does.	
-	
-	if(r!=KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &iFileToRead);
-		}
-	
-	else
-		{
-		// Look for a key under a named section, retrieve text value	
-		TPtrC result;		
-		TBool ret;	//return value from FindVar functions
-		ret=file->FindVar(_L("SectionOne"),_L("iSupportsDefaultData"),result);
-		if(!ret)
-			{
-			RDebug::Print(_L("Key or section not found. iSupportsDefaultData default value used."));
-			iSupportsDefaultData = ETrue;	// Default value
-			}
-		else
-			{
-			_LIT(KFalse,"false");
-			// Create a lower case copy of the data that is read from the file
-			TBuf<10> resultLowerCase;			
-			resultLowerCase.Copy(result);
-			resultLowerCase.LowerCase();
-			iSupportsDefaultData = (resultLowerCase.FindF(KFalse) == KErrNotFound);
-			}		
-				
-		// Set the active state of the plugin depending on the contents of the 
-		// corresponding file, which has been set as a member variable
-		ret =file->FindVar(_L("SectionOne"),_L("activeState"),result);
-		if(!ret)
-			{
-			RDebug::Print(_L("Key or section not found. iActiveState default value of ETRUE used."));			
-			iActiveState = ETrue;	// Default value
-			}
-		else
-			{
-			_LIT(KFalse,"false");
-			// Create a lower case copy of the data that is read from the file
-			TBuf<10> resultLowerCase;			
-			resultLowerCase.Copy(result);
-			resultLowerCase.LowerCase();
-			
-			// If the string 'false' was not found, we set the value to 'true' -the default value
-			iActiveState = (resultLowerCase.FindF(KFalse) == KErrNotFound);
-			}
-		TRAPD(r,file->WriteToFileL());
-		
-		if (KErrNone != r)
-			{
-			RDebug::Print(_L("Error occurred while writing to the file."));
-			TBuf<84> initInfoFile(sysDrive.Name());
-			initInfoFile.Append(KInitInfoFile);
-			RDebug::Print(_L("Filename = %S, KeyName = iSupportsDefaultData,"), &initInfoFile);
-			RDebug::Print(_L("value = %S."), &result);
-			}
-		
-		delete file;
-		TRAP(r,file=CIniData::NewL(KAuthSvrPolicyFile));
-		TPtrC displayMessage;
-		ret=file->FindVar(_L("SectionOne"),_L("DisplayMessage"),displayMessage);
-		if(displayMessage.Length() == 0)   //Value = 0
-			{
-			RDebug::Print(_L("DisplayMessage not passed."));
-			iClientMessage = iClientMessage->ReAllocL(0);	// Default value
-			TPtr ptr(iClientMessage->Des());
-			ptr = KNullDesC();
-			ret=file->SetValue(_L("SectionOne"),_L("DisplayMessage"),displayMessage);
-			TRAP(r,file->WriteToFileL());
-			}
-		else
-			{
-			iClientMessage = iClientMessage->ReAllocL(displayMessage.Length());
-			TPtr ptr(iClientMessage->Des());
-			ptr = displayMessage;
-			ret=file->SetValue(_L("SectionOne"),_L("DisplayMessage"),displayMessage);
-			TRAP(r,file->WriteToFileL());
-			}
-		delete file;
-		}
-			
-	}
-
-void CTPinAuthPlugin::ReloadActiveStateFromIniFile() const
-	{
-	// Set the file to be read, based on the Id of the plugin
-	
-	_LIT(KFileText, "\\tAuth\\tAuthSvr\\testdata\\Pin");
-	_LIT(KFileSuffix, "Db.ini");
-	
-	_LIT(KFormatFileName,"%S%x%S");
-	
-	TDriveUnit sysDrive (RFs::GetSystemDrive());
-	TBuf<64> fileText(sysDrive.Name());
-	fileText.Append(KFileText);
-	iFileToRead.Format(KFormatFileName,&fileText, Id(), &KFileSuffix);
-
-	//Read data from file to get initialisation information
-	
-	// Open and read in INI file
-	// Default path to look for INI file is in 'c:\system\data' 
-	// on target filesystem
-	
-	CIniData* file=NULL;
-	TRAPD(r,file=CIniData::NewL(iFileToRead));
-	
-	//Put file on the cleanupstack if anything else in this function is going to leave, but nothing does.	
-	
-	if(r!=KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &iFileToRead);
-		}
-	
-	else
-		{
-		// Look for a key under a named section, retrieve text value	
-		TPtrC result;		
-		TBool ret=EFalse;	//return value from FindVar functions
-
-		// Set the active state of the plugin depending on the contents of the 
-		// corresponding file, which has been set as a member variable
-		ret =file->FindVar(_L("SectionOne"),_L("activeState"),result);
-		if(!ret)
-			{
-			RDebug::Print(_L("Key or section not found. iActiveState default value of ETRUE used."));			
-			iActiveState = ETrue;	// Default value
-			}
-		else
-			{
-			_LIT(KFalse,"false");
-			// Create a lower case copy of the data that is read from the file
-			TBuf<10> resultLowerCase;
-			resultLowerCase.Copy(result);
-			resultLowerCase.LowerCase();
-			if (resultLowerCase.FindF(KFalse) == KErrNotFound) 
-				iActiveState = ETrue;	// The string 'false' was not found, so we set the value to 'true' -the default value
-			else
-				iActiveState = EFalse;
-			}
-		TRAPD(r,file->WriteToFileL());
-		
-		if (KErrNone != r)
-			{
-			RDebug::Print(_L("Error occurred while writing to the file."));
-			TBuf<84> initInfoFile(sysDrive.Name());
-			initInfoFile.Append(KInitInfoFile);
-			RDebug::Print(_L("Filename = %S, KeyName = activeState,"), &initInfoFile);
-			RDebug::Print(_L("value = %S."), &result);
-			}
-		delete file;
-		}
-	}
-
-
-	
-//Implement CAuthPluginInterface definitions
-
-/**
- Normally, this would ask the user to input a 4-digit pin and then compare it to 
- the values that this plugin has been trained with. The result should be the 
- user that this PIN corresponds to.
- 'aResult' should be the 'hash' of the stored PIN (which corresponds to the freshly entered PIN)
- but in this case, it's returned as it was 'unhashed'.
-*/
-
-void CTPinAuthPlugin::Identify(TIdentityId& aId, const TDesC& aClientMessage,
-							   HBufC8*& aResult, TRequestStatus& aRequest)
-	{
-	ASSERT(IsActive());
-	
-	// We are simulating user input by reading from a file
-	// (The data contained in this file has been freshly written by the 'client part in TestExecute')
-	
-	if(aClientMessage != *ClientMessage())
-		{
-		RDebug::Print(_L("Display String Mismatch !!!"));	
-		}
-	else
-		{
-		RDebug::Print(_L("Display String at the plugin matches the string sent !! "));
-		}
-	aRequest = KRequestPending;
-		
-	TBuf8<32> userInput;
-	TRAPD(result1, IdReadUserInput(userInput));	//Get the data from the AuthSvrPolicy.ini file
-	if (KErrNone != result1)
-		{
-		aRequest = result1;
-		}
-	else
-		{
-		// No errors, carry on					
-		//Convert the 8-bit string to a 16-bit string for printing in RDebug
-		HBufC* buf = 0;
-		buf = HBufC::NewLC(32);
-		buf->Des().Copy(userInput);
-		_LIT(KMsgDebug1,"Identifying Userinput read from file = %S");    		
-		RDebug::Print(KMsgDebug1, buf);
-		CleanupStack::PopAndDestroy(buf);	//Memory cleanup. This string was only needed for the above Print function
-			
-		// Possibly, to allow for the cancellation or quitting, allow that to be the input string
-		_LIT8(KCancelText, "Cancel");	
-		_LIT8(KQuitText, "Quit");	
-		if (userInput == KCancelText)
-			{
-			TRequestStatus* status  = &aRequest;
-			User::RequestComplete(status, KErrAuthServPluginCancelled);
-			//aResult will not be updated, as specified
-			}
-		else if (userInput == KQuitText)
-			{
-			TRequestStatus* status  = &aRequest;
-			User::RequestComplete(status, KErrAuthServPluginQuit);
-			//aResult will not be updated, as specified
-			}
-		else
-			{
-			//compare with the known set of inputs and see if this is one of them.	
-			TInt result2 = CheckForStringPresence(aId, userInput, aRequest);
-			if (KErrNone == result2)	//The above function did not leave
-				{
-				//See if the string was found.
-				TInt length = userInput.Length();
-				
-				aResult = HBufC8::New(length);	
-				aResult->Des().Format(_L8("%S"), &userInput);
-				
-				RDebug::Printf("aResult has been updated. aResult = %S, userInput = %S", 
-									aResult, &userInput);
-				TRequestStatus* status  = &aRequest;
-				User::RequestComplete(status, result2);
-			
-				//Note: aRequest has been updated by the CheckForStringPresence function				
-				}
-			else if (KErrNotFound == result2)
-				{
-				RDebug::Printf("The data that the user input was not found (recognized)"
-								"Error = %d", result2);
-				
-				TRequestStatus* status  = &aRequest;
-				aId = KUnknownIdentity;
-				User::RequestComplete(status, KErrNone);
-				}			
-			else
-				{
-				//Caters for file access errors etc
-				RDebug::Printf("Error occurred while checking for the presence of the string"
-								"in the list. Error = %d", result2);
-				
-				TRequestStatus* status  = &aRequest;
-				aId = KUnknownIdentity;
-				User::RequestComplete(status, KErrNone);
-				}
-			}
-			//End of 'else' where the user did not cancel or quit the 'identify' process
-		}		
-	}
-	
-void CTPinAuthPlugin::Cancel()
-	{		
-	}
-
-void CTPinAuthPlugin::Train(TIdentityId aId, HBufC8*& aResult, TRequestStatus& aRequest)
-	{
-	
-	//Accept user input and update the list of inputs along with IDs.
-	
-ASSERT(IsActive());
-	
-	aRequest = KRequestPending;
-	//TInt result = KErrNone;
-	
-	TBuf8<32> userInput;
-	TRAPD(result1, TrainReadUserInput(userInput));
-	if (KErrNone != result1)
-		{
-		_LIT(KMsgDebug2,"Training Userinput read Error: result = %d");    
-		RDebug::Print(KMsgDebug2, result1);
-		}
-	else
-		{
-		// No errors, carry on		
-		//Convert the 8-bit string to a 16-bit string for printing in RDebug
-		HBufC* buf = 0;
-		TRAPD(err, buf = HBufC::NewL(32));
-		
-		if(err == KErrNoMemory)
-			{
-			TRequestStatus* status  = &aRequest;
-			User::RequestComplete(status, KErrNoMemory);
-			return;
-			}
-		buf->Des().Copy(userInput);
-		_LIT(KMsgDebug3, "--Training Userinput read from file = %S");
-		RDebug::Print(KMsgDebug3, buf);
-		delete buf;	//Memory cleanup. This string was only needed for the above Print function			
-		
-		// To allow for the cancellation or quitting, allow that to be the input string
-		TRequestStatus aRequest2 = KRequestPending;
-		_LIT8(KCancelText, "Cancel");
-		_LIT8(KQuitText, "Quit");
-		userInput.Trim();		
-		if (userInput.CompareF(KCancelText) == 0)
-			{ aRequest2 = KErrAuthServPluginCancelled; }		
-		else if (userInput.CompareF(KQuitText) == 0)
-			{ aRequest2 = KErrAuthServPluginQuit; }
-		else
-			{
-			//compare with the present set of inputs and see if this is one of them.
-			// update this list with this new user input, tagged to the aId
-			TRAPD(result2, CheckForNewStringPresenceL(aId, userInput, aRequest2));			
-			if (KErrNone != result2)
-				{
-				_LIT(KMsgDebug4, "Training Userinput read Error: results = %d");    
-				RDebug::Print(KMsgDebug4, result2);
-				}
-			else if(KErrNone == aRequest2.Int())
-				{
-				// No errors, update aResult.
-				// First allocate space for it since this variable will always be a 
-				// null pointer coming into this function
-				
-				TRAPD(err1,aResult = HBufC8::NewL(userInput.Size()));	
-				if(err1 == KErrNoMemory)
-					{
-					TRequestStatus* status  = &aRequest;
-					RDebug::Printf("User::request complete with kerr no memory");
-					User::RequestComplete(status, KErrNoMemory);	
-					return;
-					}
-				*aResult = userInput;
-				aRequest2 = KErrNone;
-				}			
-			else
-				{
-				_LIT(KMsgDebug5, "Error occurred during training. aRequest.Int() = %d");
-				RDebug::Print(KMsgDebug5, aRequest2.Int());
-				//aResult is not updated, nor is aId				
-				}
-			}
-		// Complete the asynchronous function
-		TRequestStatus* status  = &aRequest;
-		User::RequestComplete(status, aRequest2.Int());
-		}
-	}
-
-TBool CTPinAuthPlugin::IsActive () const
-	{
-	// There is never any user intervention required
-	//return true;
-	// As a future development note, this value may be read from a file (or a section in a file)
-	
-	ReloadActiveStateFromIniFile();
-	return iActiveState;
-	}
-	
-TInt CTPinAuthPlugin::Forget(TIdentityId aId)
-	{
-	// Open the list of userInputs that have been stored by this plugin
-	// Then find the one that corresponds to this id
-	// Then remove this string from the list and return the correct status value
-	
-	//Open the file
-	TRAPD(result3, FindStringAndRemoveL(aId));
-	return result3;
-			
-	}
-	
-TInt CTPinAuthPlugin::DefaultData(TIdentityId aId, HBufC8*& aOutputBuf)
-	{
-	
-	// This implementation of the PIN plugin does support default data.
-	// There will be cases where i don't want this available. Hence the addition of a 
-	// new class member iSupportsDefaultData
-	ReloadAllFromIniFile();
-	
-	TInt result = KErrNotSupported;
-	TRequestStatus aRequest2 = KRequestPending;
-	
-	if (iSupportsDefaultData)	//Class member initialised in the constructor
-		{
-		TBufC8<16> defaultBuf(KDefaultData);
-		//compare with the present set of inputs and see if this is one of them.
-		// update this list with this new user input, tagged to the aId
-		TRAPD(result2, CheckForNewStringPresenceL(aId, defaultBuf, aRequest2));			
-		if (KErrNone != result2)
-			{
-			_LIT(KMsgDebug4, "Training Userinput read Error: results = %d");    
-			RDebug::Print(KMsgDebug4, result2);
-			}
-		else if(KErrNone == aRequest2.Int())
-			{
-			// No errors, update aOutputBuf.
-			// First allocate space for it since this variable will always be a 
-			// null pointer coming into this function				
-			
-			TRAPD(resAlloc, (aOutputBuf = HBufC8::NewL(KDefaultData().Size())) );
-			if (KErrNone != resAlloc)
-				{
-				_LIT(KMsgAllocFailed2,"Failed to allocate memory for updating aOutputBuf");
-				RDebug::Print(KMsgAllocFailed2);
-				result = resAlloc;
-				}
-			else
-				{
-				*aOutputBuf = KDefaultData;
-				result = KErrNone;				
-				}
-			}			
-		else
-			{
-			_LIT(KMsgDebug5, "Error occurred during training. aRequest2.Int() = %d");
-			RDebug::Print(KMsgDebug5, aRequest2.Int());
-			//aOutputBuf is not updated, nor is aId				
-			}
-		}
-		
-	return result;	
-	}
-
-TInt CTPinAuthPlugin::Reset(TIdentityId aId, const TDesC& aRegistrationData, HBufC8*& aResult)
-	{
-	// To enable testing return KErrNotSupported for one of the knowledge-based incarnations of this class
-	if (Id() == 0x11113102)
-		{
-		return KErrNotSupported;
-		}
-
-	// If no registration data is supplied or if this plugin is configured as non-knowledge 
-	// type plugin then reset is simply a forget operation else the registration data is 
-	// used to retrain the plugin
-	if ((aRegistrationData == KNullDesC) || (Id() == 0x11113101) || (Type() == EAuthBiometric) || (Type() == EAuthToken))
-		{
-		aResult = NULL;
-		TRAPD(err, FindStringAndRemoveL(aId));
-		return err;
-		}
-
-	// For EAuthKnowledge type
-	// Convert the 16-bit string to a 8-bit string (pin)
-	// Note that no unicode conversion is being done here since a pin cannot be in unicode
-	RBuf8 pinBuf;
-	TBuf8<32> newPin;
-	TRAPD(err, pinBuf.CreateL(32);\
-				CleanupClosePushL(pinBuf);\
-				pinBuf.Copy(aRegistrationData.Left(32));\
-				newPin = pinBuf;\
-				CleanupStack::PopAndDestroy(&pinBuf));
-	if (err != KErrNone)
-		{
-		return err;
-		}
-
-	// Log a message
-	TBuf8<32> userInput;
-	_LIT(KMsgDebug3, "Reset with registration data = %S");
-	RDebug::Print(KMsgDebug3, &aRegistrationData);
-
-	// Compare with the present set of inputs and see if this is one of them.
-	// update this list with this new user input, tagged to the aId
-	TRequestStatus request = KRequestPending;
-	TRAP(err, CheckForNewStringPresenceL(aId, newPin, request));	
-	
-	if( KErrNoMemory == err)
-		{
-		User::LeaveNoMemory();
-		}
-	if (err != KErrNone)
-		{
-		RDebug::Print(_L("Reset error = %d"), err);
-		return err;
-		}
-	else if (request.Int() == KErrNone)
-		{
-		// No errors, update aResult.
-		TRAP(err, aResult = HBufC8::NewL(newPin.Size()));
-		if (err != KErrNone)
-			{
-			return err;
-			}
-		*aResult = newPin;
-		}
-	else
-		{
-		_LIT(KMsgDebug5, "Error occurred during reset. request.Int() = %d");
-		RDebug::Print(KMsgDebug5, request.Int());
-		return request.Int();
-		}
-
-	return KErrNone;
-	}
-
-//--------------------------------------------------------------------------------
-
-/**
- Utility method to capture the data that the user has input 
- (in the form of data stored in a file)
-*/
-TInt CTPinAuthPlugin::IdReadUserInput(TBuf8<32>& aInputValue)
-	{
-
-	TInt retValue;
-	CIniData* file=NULL;
-	TRAPD(r,file=CIniData::NewL(iFileToRead));
-	if(r!=KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &iFileToRead);
-		retValue = r;
-		}
-	
-	else
-		{
-		// Look for a key under a named section, retrieve text value	
-		TPtrC result;		
-		TBool ret=EFalse;	//return value from FindVar functions
-		
-		ret=file->FindVar(_L("SectionOne"),_L("IdEnteredPinValue"),result);
-		if(!ret)
-			{
-			RDebug::Print(_L("Unable to find the key in the file %S. IdEnteredPinValue is not known, 9999 used. Error = %d"), &iFileToRead, ret);
-			_LIT8(KEnteredPinValueErr, "9999");
-			aInputValue = KEnteredPinValueErr;	// Default value
-			retValue = KErrNotFound;						
-			}
-		else
-			{
-			//Later,include a check to ensure that only digits were entered
-			aInputValue.Copy(result);
-			aInputValue.Trim();			
-			retValue = KErrNone;	//Not necessary
-			}
-		delete file;	//memory cleanup
-		}
-	
-	return retValue;
-	}
-
-TInt CTPinAuthPlugin::TrainReadUserInput(TBuf8<32>& aInputValue)
-	{
-
-	TInt retValue;
-	CIniData* file=NULL;
-	TRAPD(r,file=CIniData::NewL(iFileToRead));
-	if(r!=KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &iFileToRead);
-		retValue = r;
-		}
-	
-	else
-		{
-		// Look for a key under a named section, retrieve text value	
-		TPtrC result;		
-		TBool ret=EFalse;	//return value from FindVar functions
-		
-		ret=file->FindVar(_L("SectionOne"),_L("TrainEnteredPinValue"),result);
-		if(!ret)
-			{
-			RDebug::Print(_L("Unable to find the key in the file %S. TrainEnteredPinValue is not known, 9999 used. Error = %d"), &iFileToRead, ret);
-			_LIT8(KEnteredPinValueErr, "9999");
-			aInputValue = KEnteredPinValueErr;	// Default value
-			retValue = KErrNotFound;						
-			}
-		else
-			{
-   			aInputValue.Copy(result);
-			aInputValue.Trim();
-			retValue = KErrNone;	//Not necessary
-			}
-		delete file;	//memory cleanup
-		}
-	
-	return retValue;
-	}
-
-/**
- Utility method to compare the data that the user has input 
- with all the data that has been stored for users 
- Called by Identify()
- @return - success or failure value
-*/
-TInt CTPinAuthPlugin::CheckForStringPresence(TIdentityId& aId, TBuf8<32> aInputValue, TRequestStatus& aRequestValue)
-	{
-
-	TInt retValue = KErrNone;	
-	// First format the aInputValue string so that it starts with a ':' and ends with a ','.
-	_LIT8(KFormatValue2, ":%S,");
-	TBuf8<32> aInputValue2;
-	aInputValue2.Format(KFormatValue2, &aInputValue);
-
-	//Convert the 8-bit string to a 16-bit string for printing in RDebug
-	HBufC* buf = 0;
-	buf = HBufC::New(32);
-	buf->Des().Copy(aInputValue);		
-	RDebug::Print(_L("Formatted string: %S"), buf);
-	delete buf;	//Memory cleanup. This string was only needed for the above Print function
-
-	TBuf8<500> pinFileContents1, pinFileContents2;
-	// Read the contents of the file that contains all the ID/PIN combinations
-
-	CIniData* file=NULL;
-	TRAPD(r,file=CIniData::NewL(iFileToRead));
-	if(KErrNoMemory == r)
-		{
-		delete file;
-		RDebug::Print(_L("Unable to create CIniData object - No memory !! "));
-		User::LeaveNoMemory();
-		
-		}
-	if(r!=KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &iFileToRead);
-		retValue = r;
-		}	
-	else
-		{
-		// Look for a key under a named section, retrieve text value	
-		TPtrC result;		
-		TBool ret=EFalse;	//return value from FindVar functions
-		
-		ret=file->FindVar(_L("SectionOne"),_L("Identity&PinValues"),result);
-		if(!ret)
-			{
-			RDebug::Print(_L("Unable to find the Identity&PinValues key in the file %S."), &iFileToRead);
-			retValue = KErrNotFound;
-			aRequestValue =KErrNotFound;
-			}
-		else
-			{
-			pinFileContents1.Copy(result);	
-			
-			TInt searchResult;
-			searchResult = pinFileContents1.Find(aInputValue2);
-			
-			if (KErrNotFound == searchResult)
-				{
-				RDebug::Print(_L("Userinput not found in the pinFile %S. Identification error"), &iFileToRead);
-				aRequestValue= KErrAuthServIdentityNotFound;
-				retValue  = searchResult;
-				}
-			else if (searchResult)	// a positive value
-				{				
-				// Now find the userID by searching back through the string for the "," marker				
-				pinFileContents2 = pinFileContents1.Left(searchResult);
-				TInt userIdStartPos = pinFileContents2.LocateReverse(',');
-								 
-				//Extract this userId for use by the calling function
-				TBuf8<50> p1 = pinFileContents2.Right(searchResult - userIdStartPos - 1);
-				TLex8 input (p1);
-				TRadix aRadix = EDecimal;
-				input.Val(aId, aRadix);
-				RDebug::Print(_L("UserId that is stored = %u"), aId);
-				aRequestValue = KErrNone;
-				retValue = KErrNone;
-				}				
-			else
-				{
-				RDebug::Print(_L("Unexpected error in the 'Find' function. Searchresult = %d"), searchResult);
-				aRequestValue = searchResult;
-				retValue = searchResult;				
-				}//End check for key&section search in file				
-			}//End check for safe file access
-		delete file;
-		}
-	
-	return retValue;
-	}
-
-/**
- Utility method to compare the data that the user has input 
- with all the data that has been stored for users 
- Used to find out if the input is unique. 
- -since KIdAmbiguous is no longer used, KIdCancel will be returned if the input is non-unique
- Called by Train() and DefaultData()
-*/
-TInt CTPinAuthPlugin::CheckForNewStringPresenceL(TIdentityId aId, TBuf8<32> aInputValue, TRequestStatus& aRequestValue)
-	{	
-	TBuf8<500> pinFileContents, pinFileContents2;
-	TInt retValue = KErrNone;
-
-	CIniData* file=NULL;
-	TRAPD(r,file=CIniData::NewL(iFileToRead));
-	if(KErrNoMemory == r)
-		{
-		User::LeaveNoMemory();
-		}
-	if(r!=KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &iFileToRead);
-		return r;
-		}	
-	
-	
-	// Look for a key under a named section, retrieve text value	
-	TPtrC result;		
-	TBool ret=EFalse;	//return value from FindVar functions
-	aRequestValue = KErrAuthServIdentityNotFound;	//Initialisation		
-			
-	ret=file->FindVar(KPluginIniSection, KPinDbTag,result);
-	if(!ret)
-		{
-		RDebug::Print(_L("Unable to find the %S key in the file %S."), &KPinDbTag, &iFileToRead);
-		delete file;
-		return KErrNotFound;			
-		}
-	
-	//Copy the data from the named section in the file, and see if any previous user has used this input string
-	pinFileContents.Copy(result);			
-	
-	TInt searchResultPin;
-	TBuf8<50> searchStringPin;
-	_LIT8(KFormat3, ":%S,");
-	searchStringPin.Format(KFormat3, &aInputValue);
-	searchResultPin = pinFileContents.Find(searchStringPin);
-				
-	if (KErrNotFound == searchResultPin)
-		{				
-		//check that the identity is unique, if so, update the Db 
-		// with the new Id-PIN pair, as is done already
-		// else update the PIN only, ie training data for that identity
-		TInt searchResultId;
-		TBuf8<50> searchStringId;
-		_LIT8(KFormat4, ",%u:");
-		searchStringId.Format(KFormat4, aId);
-		
-		searchResultId = pinFileContents.Find(searchStringId);
-		
-		TDriveUnit sysDrive (RFs::GetSystemDrive());
-		TBuf<80> policyFile;
-		if (KErrNotFound == searchResultId)
-			{									
-			// Add this entry to the file
-			// This is a simple system, expecting a format as below:
-			// ",aId:inputPin,aId:inputPin,aId:inputPin,"				
-			
-			_LIT8(KFormat2, "%S%u:%S,");
-			if (pinFileContents.Size() == 0)
-				{
-				pinFileContents.Append(',');	//Initialisation
-				}
-			pinFileContents2.Format(KFormat2, &pinFileContents, aId, &aInputValue);				
-										
-			//For the purpose of writing the data to a file, i'll create a 16-bit version of pinFileContents
-			TInt ret2 = 0;
-			HBufC* buf = 0;
-			TRAPD(err,buf = HBufC::NewL(pinFileContents2.Length()));
-				
-			if(err == KErrNoMemory)
-				{
-				delete file;
-				User::LeaveNoMemory();
-				}
-			buf->Des().Copy(pinFileContents2);												
-			ret2 = file->SetValue(_L("SectionOne"),_L("Identity&PinValues"), *buf);
-			
-			TRAPD(r,file->WriteToFileL());
-			
-						
-			if (KErrNone != r)
-				{
-				policyFile.Copy(sysDrive.Name());
-				policyFile.Append(KPolicyFile);
-				RDebug::Print(_L("Error occurred while writing to the file. Filename = %S, KeyName = AllUserID&PinValues, value = %S."), &policyFile, buf);
-				}
-			delete buf;		//Memory cleanup. This string was only needed for the above Print function
-			
-			if(KErrNone == ret2)
-				{				
-				aRequestValue = KErrNone;
-				
-				//Update the global database
-				AddToGlobalDb(aId, aInputValue);
-				}
-			else
-				{
-				RDebug::Print(_L("Error occurred while writing data to file. Error = %d"), ret2);					
-				aRequestValue = ret2;
-				}
-			
-			}
-
-		else
-			{
-			//The Identity has already been trained with this plugin, 
-			// update the PIN (training data)
-			
-			//extract the string to the right of the end of the aId
-			pinFileContents2 = pinFileContents.Mid(searchResultId + searchStringId.Size());
-			
-			//Find the end of the PIN (Training data)
-			_LIT8(KPinEndMarker, ",");
-			TBufC8<5> bufPinEndMarker(KPinEndMarker);					
-			TInt pinEndPos = pinFileContents2.Find(bufPinEndMarker);
-			
-			//Replace this with the new PIN
-			pinFileContents.Replace((searchResultId + searchStringId.Size()),
-									 pinEndPos, aInputValue);	
-			
-			//For the purpose of writing the data to a file, i'll create a 16-bit version of pinFileContents
-			TInt ret2 = 0;
-			HBufC* buf = 0;
-			TRAPD(err1,buf = HBufC::NewL(pinFileContents.Length()));
-			if(err1 == KErrNoMemory)
-				{
-				delete file;
-				User::LeaveNoMemory();
-				}
-			buf->Des().Copy(pinFileContents);
-								
-			ret2 = file->SetValue(_L("SectionOne"),_L("Identity&PinValues"), *buf);
-			
-			TRAPD(r,file->WriteToFileL());
-			
-			if (KErrNone != r)
-				{
-				policyFile.Copy(sysDrive.Name());
-				policyFile.Append(KPolicyFile);
-				RDebug::Print(_L("Error occurred while writing to the file. Filename = %S, KeyName = AllUserID&PinValues, value = %S."), &policyFile, buf);
-				}
-			delete buf;		//Memory cleanup. This string was only needed for the above Print function
-			
-			if(KErrNone ==ret2)
-				{				
-				aRequestValue = KErrNone;
-				
-				//Update the global database
-				AddToGlobalDb(aId, aInputValue);
-				}
-			else
-				{
-				RDebug::Print(_L("Error occurred while writing data to file. Error = %d"), ret2);					
-				aRequestValue = ret2;
-				}
-			}
-		delete file;
-		return ret;
-		}
-	if (searchResultPin)	// a positive value
-		{
-		// A user has already tried to train this plugin using the given data.
-		// The pinFileContents are not updated, to avoid duplication
-		
-		aRequestValue = KErrAuthServPluginCancelled;
-		delete file;
-		return searchResultPin;
-		}	
-	
-	RDebug::Print(_L("Unexpected error in the 'Find' function. SearchresultPin = %d"), searchResultPin);
-	retValue = searchResultPin;
-
-	delete file;
-		
-	return retValue;
-	}
-
-	
-/**
- Utility function to remove the training data that is associated with a given Id
- Called by the Forget function
- @return - KIdSuccess, KIdUnknown or some error code  
- */ 
-TInt CTPinAuthPlugin::FindStringAndRemoveL (TIdentityId aId)
-	{
-	TBuf8<500> pinFileContents, pinFileContents2;
-	TInt retValue = KErrAuthServNoSuchIdentity;		//init
-	CIniData* file=NULL;
-	//First read the list of userId and PIN combinations from a file
-	TRAPD(r,file=CIniData::NewL(iFileToRead));
-	if(r!=KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &iFileToRead);
-		retValue = r;
-		}	
-	else
-		{
-		// Look for a key under a named section, retrieve text value	
-		TPtrC result;		
-		TBool ret=EFalse;	//return value from FindVar functions
-				
-		ret=file->FindVar(KPluginIniSection, KPinDbTag,result);
-		if(!ret)
-			{
-			RDebug::Print(_L("Config error: Unable to find the %S key in the file %S."), &KPinDbTag, &iFileToRead);
-			retValue = KErrNotFound;						
-			}
-		else
-			{
-			//Copy the data from the named section in the file, and see if any previous user has used this input string
-			pinFileContents.Copy(result);				
-			
-			//Format the searchstring as defined in the file so that it starts with a ',' and ends with a ':'.
-			_LIT8(KFormatValue3, ",%u:");			
-			
-			TBuf8<32> searchString;
-			searchString.Format(KFormatValue3, aId);
-
-			//For the purpose of printing the data to a file, i'll create a 16-bit version of pinFileContents
-			HBufC* buf = 0;
-			buf = HBufC::NewL(searchString.Length());
-			buf->Des().Copy(searchString);
-			RDebug::Print(_L("Formatted searchString used in 'FindStringAndRemove(): %S"), buf);
-			delete buf;
-
-			TInt userIdStartPos;	//The offset of the searchString within pinFileContents
-									//i.e the position of the '.' just before the identityId
-			userIdStartPos = pinFileContents.Find(searchString);
-			if (KErrNotFound == userIdStartPos)
-				{
-				RDebug::Print(_L("FindStringAndRemoveL: The specified ID was not found in the pinFile"));
-				retValue = KErrAuthServNoSuchIdentity;	//KIdUnknown;
-				}
-			else
-				{
-				
-				//Find where the string (including PIN) ends
-				TLex8 aLex = TLex8(pinFileContents);
-				TInt length(0);
-				aLex.Inc(userIdStartPos+1);
-				while(aLex.Peek() != ',') 
-					{
-					aLex.Inc();
-					length++;
-					}
-	
-				//remove the found (total) string from the list (including the starting ',')
-				pinFileContents.Delete(userIdStartPos,length+1);
-				
-				//Update the file
-				//For the purpose of writing the data to a file, i'll create a 16-bit version of pinFileContents
-				TInt ret2 = 0;
-				HBufC* buf;
-				buf = HBufC::NewL(pinFileContents.Length());	
-				buf->Des().Copy(pinFileContents);
-								
-				ret2 = file->SetValue(KPluginIniSection, KPinDbTag, *buf);
-				
-				TRAPD(r,file->WriteToFileL());
-				TDriveUnit sysDrive (RFs::GetSystemDrive());
-				TBuf<2> sysDriveName (sysDrive.Name());
-				TBuf<84> policyFile;
-								
-				if (KErrNone != r)
-					{
-					policyFile.Copy(sysDriveName);
-					policyFile.Append(KPolicyFile);
-					RDebug::Print(_L("Error occurred while writing to the file. Filename = %S, KeyName = AllUserID&PinValues, value = %S."), &policyFile, buf);
-					}
-				delete buf;		//Memory cleanup. This string was only needed for the above Print function
-				
-				if (KErrNone !=ret2)
-					{
-					policyFile .Copy(sysDriveName);
-					policyFile.Append(KAuthSvrPolicyFile);
-					RDebug::Print(_L("Error occurred in WriteToFileL(). Error = %d. Filename= %S"), ret2, &policyFile);
-					retValue = ret2;
-					}
-				else
-					{
-					retValue = KErrNone;		
-					}				
-				}			
-			}//End check for key&section search in file
-		delete file;
-		}//End check for safe file access
-	
-	return retValue;
-	}
-
-
-/**
- Utility function to Update the Global Db with the training data 
- that is associated with a given Id. The update will not happen if 
- the identity is already present in this list, i.e. it's been pu in 
- by another plugin
- Called by the CheckForNewStringPresence function
- @return - KErrNone, or some error code
-*/
-TInt CTPinAuthPlugin::AddToGlobalDb (TIdentityId aId, TBuf8<32> aInputValue)
-	{
-	
-	TBuf8<500> totalDbFileContents, totalDbFileContents2;
-	TInt retValue = KErrNone;
-	CIniData* file=NULL;
-	
-	TDriveUnit sysDrive (RFs::GetSystemDrive());
-	TDriveName sysDriveName (sysDrive.Name());
-	TBuf<128> authSvrPolicyFile(sysDriveName);
-	authSvrPolicyFile.Append(KAuthSvrPolicyFile);
-	
-	TRAPD(r,file=CIniData::NewL(authSvrPolicyFile));	
-	if(r!=KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &authSvrPolicyFile);
-		retValue = r;
-		}	
-	else
-		{
-		// Look for a key under a named section, retrieve text value	
-		TPtrC result;		
-		TBool ret=EFalse;	//return value from FindVar functions		
-				
-		ret=file->FindVar(KPluginIniSection, KTotalDbTag,result);
-		if(!ret)
-			{
-			RDebug::Print(_L("Unable to find the %S key in the file %S."), &KTotalDbTag, &authSvrPolicyFile);
-			retValue = KErrNotFound;		
-			}
-		else
-			{
-			//Copy the data from the named section in the file, and see if any previous user has used this input string
-			totalDbFileContents.Copy(result);
-			TBuf8<20> aidString;
-			aidString.Num(aId, EDecimal);			
-			TInt searchResult;			
-			searchResult = totalDbFileContents.Find(aidString);
-			
-			if (KErrNotFound == searchResult)
-				{
-				// Add this entry to the file
-				// This is a simple system, expecting a format as below:
-				// ",aId:inputPin,aId:inputPin,aId:inputPin,"				
-				_LIT8(KFormat2, "%S%u:%S,");
-				if (totalDbFileContents.Size() == 0)
-					{					
-					totalDbFileContents.Append(',');	//Initialisation
-					}
-				totalDbFileContents2.Format(KFormat2, &totalDbFileContents, aId, &aInputValue);				
-					
-				//For the purpose of writing the data to a file, i'll create a 16-bit version of pinFileContents
-				TInt ret2 = 0;
-				HBufC* buf = 0;
-				TRAPD(err,buf = HBufC::NewL(totalDbFileContents2.Length()));
-				if(err == KErrNoMemory)
-					{
-					delete file;
-					return KErrNoMemory;
-					}
-				buf->Des().Copy(totalDbFileContents2);								
-				ret2 = file->SetValue(KPluginIniSection, KTotalDbTag, *buf);
-				
-				TRAPD(r,file->WriteToFileL());
-									
-				if (KErrNone != r)
-					{
-					TBuf<80> policyFile(sysDriveName);
-					policyFile.Append(KPolicyFile);
-					RDebug::Print(_L("Error occurred while writing to the file. Filename = %S, KeyName = AllUserID&PinValues, value = %S."), &policyFile, buf);
-					}
-				delete buf;	//Memory cleanup. This string was only needed for the above Print function
-				
-				if (KErrNone !=ret2)
-					{
-					RDebug::Print(_L("Error occurred in SetValue(). Error = %d. Filename= %S"), ret2, &authSvrPolicyFile);
-					retValue = ret2;
-					}
-				}
-			else
-				{
-				// A user has already tried to train this plugin using the given data.
-				// The pinFileContents are not updated, to avoid duplication				
-				retValue = KErrNone;													
-				}//End aidString search in the totalDbFileContents string (Find())
-			}//End check for key&section search in file (FindVar())
-			delete file;
-		}//End check for safe file access
-	return retValue;
-	}
-
-const HBufC* CTPinAuthPlugin::ClientMessage()
-	{
-	return iClientMessage;
-	}
-
-const TPtrC& CTPinAuthPlugin::Name() const
-  {
-  return iName;
-  }
-const TPtrC& CTPinAuthPlugin::Description() const
-  {
-  return iDescription;
-  }
-AuthServer::TAuthPluginType CTPinAuthPlugin::Type() const 
-  {
-  return iType;
-  }
-
-AuthServer::TEntropy CTPinAuthPlugin::MinEntropy() const
-  {
-  return iMinEntropy;
-  }
-
-AuthServer::TPercentage CTPinAuthPlugin::FalsePositiveRate() const
-  {
-  return iFalsePositiveRate;
-  }
-
-AuthServer::TPercentage CTPinAuthPlugin::FalseNegativeRate() const
-  {
-  return iFalseNegativeRate;
-  }
-
-
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/tPinAuthPlugin.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,178 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CTPinAuthPlugin is an interface implementation for CAuthPluginInterface
-*
-*/
-
-
-
-#ifndef TPINAUTHPLUGIN_H
-#define TPINAUTHPLUGIN_H
-
-#include "authserver_client.h"
-#include <authserver/authplugininterface.h>
-
-
-
-//An implementation of the CAuthPluginInterface definition
-
-using namespace AuthServer;
-	
-//implementation_uid = 0x10204F10
-class CTPinAuthPlugin : public CAuthPluginInterface
-	{
-public:
-	// Two phase constructor
-	static CTPinAuthPlugin* NewL();
-	// Destructor
-	virtual ~CTPinAuthPlugin();
-	//Implementation of CAuthPluginInterface definitions using a PIN system
-	virtual void Identify(TIdentityId& aId, const TDesC& aClientMessage, HBufC8*& aResult, TRequestStatus& aRequest);	
-	virtual void Cancel();	
-	virtual void Train(TIdentityId aId, HBufC8*& aResult, TRequestStatus& aRequest);		
-	virtual TBool IsActive() const;
-	virtual TInt Forget(TIdentityId aId);
-	virtual TInt DefaultData(TIdentityId aId, HBufC8*& aOutputBuf);
-	virtual TInt Reset(TIdentityId aId, const TDesC& aRegistrationData, HBufC8*& aResult);
-	//virtual TPluginId Id() const;
-	virtual const TPtrC& Name() const;
-	virtual const TPtrC& Description() const;
-	virtual AuthServer::TEntropy MinEntropy() const;
-	virtual AuthServer::TPercentage FalsePositiveRate() const;
-	virtual AuthServer::TPercentage FalseNegativeRate() const;
-	virtual AuthServer::TAuthPluginType Type() const;
-		
-	// Utility functions
-	TInt IdReadUserInput(TBuf8<32>& inputValue);
-	TInt TrainReadUserInput(TBuf8<32>& inputValue);
-	TInt CheckForStringPresence(TIdentityId& aId, TBuf8<32> aInputValue, TRequestStatus& aRequestValue);
-	TInt CheckForNewStringPresenceL(TIdentityId aId, TBuf8<32> aInputValue, TRequestStatus& aRequestValue);
-	TInt FindStringAndRemoveL(TIdentityId aId);
-	TInt AddToGlobalDb (TIdentityId aId, TBuf8<32> aInputValue);
-	TInt RemoveFromGlobalDb (TIdentityId aId);
-	const HBufC* ClientMessage ();
-	
-
-public:
-	mutable TBuf<70> iFileToRead;
-	void ConstructL();
-	CTPinAuthPlugin();
-	void ReloadAllFromIniFile();
-	void ReloadActiveStateFromIniFile() const;
-protected:
- 	/// The name of the plugin. Derived classes should set this member.
- 	TPtrC iName;
- 	/// The plugin's description. Derived classes should set this member.
- 	TPtrC iDescription;
- 	/// The minumum entropy provided by the plugin. Derived classes should set
- 	/// this member.
- 	AuthServer::TEntropy iMinEntropy;
- 	/// The false positive rate of the plugin. Derived classes should set this
- 	/// member.
- 	AuthServer::TPercentage iFalsePositiveRate;
- 	/// The false negative rate of the plugin. Derived classes should set this
- 	/// member.
- 	AuthServer::TPercentage iFalseNegativeRate;
-  	/// The type of the plugin. Derived classes should set this member.
- 	AuthServer::TAuthPluginType iType;
-
-private:
-	// Data read from file determining if this plugin supports default data
-	TBool iSupportsDefaultData;
-	mutable TBool iActiveState;
-	HBufC* iClientMessage;
-	};
-
-
-//=========================================================================	
-// The various classes that are spawned from this base class by inheriting the implementations besides
-// the Id() function (Uses the #define macro)
-
-// number is hex, type is one of the TAuthPluginType enums
-// Id() returns the Id of the plugin
-
-
-#define NClass(id,type) class CTPinAuthPlugin##id : public CTPinAuthPlugin\
-	{                                        		\
-public:                                      		\
-	typedef CTPinAuthPlugin##id TMyPinType;	    	\
-	TPluginId Id() const 		               		\
-		{ return 0x##id; }  	               		\
-		const TPtrC& Name() const					\
-		  {											\
-		  return iName;								\
-		  }											\
-		const TPtrC& Description() const			\
-		  {											\
-		  return iDescription;						\
-		  }											\
-		AuthServer::TAuthPluginType Type() const 	\
-		  {											\
-		  return iType;								\
-		  }											\
-		AuthServer::TEntropy MinEntropy() const		\
-		  {											\
-		  return iMinEntropy;						\
-		  }											\
-		AuthServer::TPercentage FalsePositiveRate() const \
-		  {												  \
-		  return iFalsePositiveRate;					  \
-		  }												  \
-		AuthServer::TPercentage FalseNegativeRate() const \
-		  {												  \
-		  return iFalseNegativeRate;					  \
-		  }												  \
-	static TMyPinType* NewL()                   	\
-    	{										 	\
-        TMyPinType* r = new (ELeave) TMyPinType();	\
-        CleanupStack::PushL(r);						\
-	  	r->ConstructL();						 	\
-	  	CleanupStack::Pop(r);						\
-        r->iType = type;                            \
-	  	return r;                              		\
-		}											\
-	}
-
-NClass(11113100, EAuthKnowledge);
-NClass(11113101, EAuthKnowledge);
-NClass(11113102, EAuthKnowledge);
-NClass(11113103, EAuthBiometric);
-NClass(11113104, EAuthToken);
-
-//=========================================================================		
-// Constants used in the utility functions -File locations, etc
-_LIT8(KDefaultData, "0000");
-_LIT(KInitInfoFile, "\\tAuth\\tAuthSvr\\testdata\\initialisation_Info.ini");
-_LIT(KPolicyFile, 	"\\tAuth\\tAuthSvr\\testdata\\AuthSvrPolicy.ini");
-
-_LIT(KPluginNamePin, "Pin1");
-_LIT(KPluginDescriptionPin, "Pin Plugin, can store and return known id and training data for each identity.");
-
-static const TInt KEntropyPin = 999;
-static const TInt KFalsePosPin = 100;
-static const TInt KFalseNegPin = 10;
-
-//From Step_Base.cpp
-_LIT(KPluginIniSection,			"SectionOne");
-_LIT(KAuthSvrPolicyFile, 		"\\tAuth\\tAuthSvr\\testdata\\AuthSvrPolicy.ini");
-_LIT(KDefaultPluginTag, 		"DefaultPlugin");
-_LIT(KEnteredPinTag, 			"EnteredPinValue");
-_LIT(KPinDbTag,					"Identity&PinValues");
-_LIT(KTotalDbTag,				"AllUserID&PinValues");
-_LIT(KInitPinDatabaseValue,		",");
-
-
-
-#endif	/* TPINAUTHPLUGIN_H */
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/tauthsvrservernc.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,136 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* tAuthSvrServer.cpp
-* Test code for the TestExecute Server
-*
-*/
-
-
-
-#include "tAuthSvrServer.h"
-#include "tAuthSvrStep.h"
-
-
-_LIT(KServerName,"tAuthSvrNC");	
-
-CTAuthSvrServer* CTAuthSvrServer::NewL()
-/**
- * @return - Instance of the test server
- * Called inside the MainL() function to create and start the
- * CTestServer derived server.
- */
-	{
-	CTAuthSvrServer* server = new (ELeave) CTAuthSvrServer();
-	CleanupStack::PushL(server);
-	
-	// Either use a StartL or ConstructL, the latter will permit
-	// server Logging.
-
-	//server->StartL(KServerName); 
-	server-> ConstructL(KServerName);
-	CleanupStack::Pop(server);
-	return server;
-	}
-
-
-// EKA2 much simpler
-// Just an E32Main and a MainL()
-
-LOCAL_C void MainL()
-/**
- * Much simpler, uses the new Rendezvous() call to sync with the client
- */
-	{
-	// Leave the hooks in for platform security
-#if (defined __DATA_CAGING__)
-	RProcess().DataCaging(RProcess::EDataCagingOn);
-	RProcess().SecureApi(RProcess::ESecureApiOn);
-#endif
-	CActiveScheduler* sched=NULL;
-	sched=new(ELeave) CActiveScheduler;
-	CleanupStack::PushL(sched);
-	CActiveScheduler::Install(sched);
-	
-	CTAuthSvrServer* server = NULL;
-	// Create the CTestServer derived server	
-	TRAPD(err,server = CTAuthSvrServer::NewL());
-	if(!err)
-		{
-		// Sync with the client and enter the active scheduler
-		RProcess::Rendezvous(KErrNone);
-		sched->Start();
-		}
-	CleanupStack::Pop(sched);
-	delete server;
-	delete sched;
-	}
-
-
-GLDEF_C TInt E32Main()
-/**
- * @return - Standard Epoc error code on exit
- */
-	{
-	CTrapCleanup* cleanup = CTrapCleanup::New();
-	if(cleanup == NULL)
-		{
-		return KErrNoMemory;
-		}
-	TRAP_IGNORE(MainL());
-	delete cleanup;
-	return KErrNone;
-    }
-
-
-CTestStep* CTAuthSvrServer::CreateTestStep(const TDesC& aStepName)
-/**
- * @return - A CTestStep derived instance
- * Implementation of CTestServer pure virtual
- */
-	{
-	CTestStep* testStep = NULL;
-	
-	// Test step name constant in the test step header file
-	// Created "just in time"
-	if(aStepName == KTFirstStart)
-		testStep = new CTFirstStart();
-	else if (aStepName == KTAuthSvrCheck)
-		testStep = new CTAuthSvrCheck();
-	else if (aStepName == KTRegIdentity)
-		testStep = new CTRegIdentity(*this);
-	else if (aStepName == KTIdentifyMultiple)
-		testStep = new CTIdentifyMultiple();
-	else if (aStepName == KTStepCreateTestDb)
-		testStep = new CTStepCreateTestDb();
-	else if (aStepName == KTRetrainPlugin)
-		testStep = new CTRetrainPlugin(*this);
-	else if (aStepName == KTRemoveDbs)
-		testStep = new CTRemoveDbs();
-	else if (aStepName == KTRemoveIdentity)
-		testStep = new CTRemoveIdentity(*this);
-	else if (aStepName == KTForgetPlugin)
-		testStep = new CTRemoveAuthMethod(*this);	
-	else if (aStepName == KTAuthenticate)
-		testStep = new CTAuthenticate(*this);
-	else if (aStepName == KTSetPrefs)
-		testStep = new CTSetAuthPrefs(*this);
-	else
-		{
-		ERR_PRINTF1(_L("The test step name specified does not exist."));
-		}
-	
-	return testStep;
-	}
-
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/tauthsvrserverwdd.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,136 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* tAuthSvrServer.cpp
-* Test code for the TestExecute Server
-*
-*/
-
-
-
-#include "tAuthSvrServer.h"
-#include "tAuthSvrStep.h"
-
-
-_LIT(KServerName,"tAuthSvrWDD");	
-
-CTAuthSvrServer* CTAuthSvrServer::NewL()
-/**
- * @return - Instance of the test server
- * Called inside the MainL() function to create and start the
- * CTestServer derived server.
- */
-	{
-	CTAuthSvrServer* server = new (ELeave) CTAuthSvrServer();
-	CleanupStack::PushL(server);
-	
-	// Either use a StartL or ConstructL, the latter will permit
-	// server Logging.
-
-	//server->StartL(KServerName); 
-	server-> ConstructL(KServerName);
-	CleanupStack::Pop(server);
-	return server;
-	}
-
-
-// EKA2 much simpler
-// Just an E32Main and a MainL()
-
-LOCAL_C void MainL()
-/**
- * Much simpler, uses the new Rendezvous() call to sync with the client
- */
-	{
-	// Leave the hooks in for platform security
-#if (defined __DATA_CAGING__)
-	RProcess().DataCaging(RProcess::EDataCagingOn);
-	RProcess().SecureApi(RProcess::ESecureApiOn);
-#endif
-	CActiveScheduler* sched=NULL;
-	sched=new(ELeave) CActiveScheduler;
-	CleanupStack::PushL(sched);
-	CActiveScheduler::Install(sched);
-	
-	CTAuthSvrServer* server = NULL;
-	// Create the CTestServer derived server	
-	TRAPD(err,server = CTAuthSvrServer::NewL());
-	if(!err)
-		{
-		// Sync with the client and enter the active scheduler
-		RProcess::Rendezvous(KErrNone);
-		sched->Start();
-		}
-	CleanupStack::Pop(sched);
-	delete server;
-	delete sched;
-	}
-
-
-GLDEF_C TInt E32Main()
-/**
- * @return - Standard Epoc error code on exit
- */
-	{
-	CTrapCleanup* cleanup = CTrapCleanup::New();
-	if(cleanup == NULL)
-		{
-		return KErrNoMemory;
-		}
-	TRAP_IGNORE(MainL());
-	delete cleanup;
-	return KErrNone;
-    }
-
-
-CTestStep* CTAuthSvrServer::CreateTestStep(const TDesC& aStepName)
-/**
- * @return - A CTestStep derived instance
- * Implementation of CTestServer pure virtual
- */
-	{
-	CTestStep* testStep = NULL;
-	
-	// Test step name constant in the test step header file
-	// Created "just in time"
-	if(aStepName == KTFirstStart)
-		testStep = new CTFirstStart();
-	else if (aStepName == KTAuthSvrCheck)
-		testStep = new CTAuthSvrCheck();
-	else if (aStepName == KTRegIdentity)
-		testStep = new CTRegIdentity(*this);
-	else if (aStepName == KTIdentifyMultiple)
-		testStep = new CTIdentifyMultiple();
-	else if (aStepName == KTStepCreateTestDb)
-		testStep = new CTStepCreateTestDb();
-	else if (aStepName == KTRetrainPlugin)
-		testStep = new CTRetrainPlugin(*this);
-	else if (aStepName == KTRemoveDbs)
-		testStep = new CTRemoveDbs();
-	else if (aStepName == KTRemoveIdentity)
-		testStep = new CTRemoveIdentity(*this);
-	else if (aStepName == KTForgetPlugin)
-		testStep = new CTRemoveAuthMethod(*this);	
-	else if (aStepName == KTAuthenticate)
-		testStep = new CTAuthenticate(*this);
-	else if (aStepName == KTSetPrefs)
-		testStep = new CTSetAuthPrefs(*this);
-	else
-		{
-		ERR_PRINTF1(_L("The test step name specified does not exist."));
-		}
-	
-	return testStep;
-	}
-
--- a/authenticationservices/authenticationserver/test/tAuthSvr/src/tpinauthpluginupgrade.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,1068 +0,0 @@
-/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* dummy dll upgrade implementation.
-*
-*/
-
-
-#include <f32file.h>
-
-#include "tPinAuthPlugin.h"
-#include <e32svr.h>
-
-#ifndef __INIPARSER_H__
-	#include <cinidata.h>
-#endif // __INIPARSER_H__
-
-_LIT(KPluginUpgradeNamePin, "Pin1-Upgrade");
-
-CTPinAuthPlugin::~CTPinAuthPlugin()
-	{
-	delete iClientMessage;
-	}
-
-CTPinAuthPlugin::CTPinAuthPlugin()
-	{}
-		
-void CTPinAuthPlugin::ConstructL()
-	{
-	iName.Set(KPluginUpgradeNamePin);
-	iDescription.Set(KPluginDescriptionPin);
-	iMinEntropy = KEntropyPin;
-	iFalsePositiveRate = KFalsePosPin;
-  	iFalseNegativeRate = KFalseNegPin;
-  	iClientMessage = HBufC::NewL(2048);
-	ReloadAllFromIniFile();
-	}
-	
-/**
-  Sets information like iActiveState and iSupportsDefaultData from 
-  the TEF ini file to the individual plugin database files
-*/	
-void CTPinAuthPlugin::ReloadAllFromIniFile()
-	{
-	// Set the file to be read, based on the Id of the plugin
-	
-	_LIT(KFileText, "\\tAuth\\tAuthSvr\\testdata\\Pin");
-	_LIT(KFileSuffix, "Db.ini");					
-	_LIT(KFormatFileName,"%S%x%S");
-	
-	TDriveUnit sysDrive (RFs::GetSystemDrive());
-	TBuf<64> fileText(sysDrive.Name());
-	fileText.Append(KFileText);
-	iFileToRead.Format(KFormatFileName,&fileText, Id(), &KFileSuffix);
-
-	//Read data from file to get initialisation information
-	
-	// Open and read in INI file
-	// Default path to look for INI file is in 'c:\system\data' 
-	// on target filesystem
-	
-	CIniData* file=NULL;
-	TRAPD(r,file=CIniData::NewL(iFileToRead));
-	
-	//Put file on the cleanupstack if anything else in this function is going to leave, but nothing does.	
-	
-	if(r!=KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &iFileToRead);
-		}
-	
-	else
-		{
-		// Look for a key under a named section, retrieve text value	
-		TPtrC result;		
-		TBool ret;	//return value from FindVar functions
-		ret=file->FindVar(_L("SectionOne"),_L("iSupportsDefaultData"),result);
-		if(!ret)
-			{
-			RDebug::Print(_L("Key or section not found. iSupportsDefaultData default value used."));
-			iSupportsDefaultData = ETrue;	// Default value
-			}
-		else
-			{
-			_LIT(KFalse,"false");
-			// Create a lower case copy of the data that is read from the file
-			TBuf<10> resultLowerCase;			
-			resultLowerCase.Copy(result);
-			resultLowerCase.LowerCase();
-			iSupportsDefaultData = (resultLowerCase.FindF(KFalse) == KErrNotFound);
-			}
-		// Set the active state of the plugin depending on the contents of the 
-		// corresponding file, which has been set as a member variable
-		ret =file->FindVar(_L("SectionOne"),_L("activeState"),result);
-		if(!ret)
-			{
-			RDebug::Print(_L("Key or section not found. iActiveState default value of ETRUE used."));			
-			iActiveState = ETrue;	// Default value
-			}
-		else
-			{
-			_LIT(KFalse,"false");
-			// Create a lower case copy of the data that is read from the file
-			TBuf<10> resultLowerCase;			
-			resultLowerCase.Copy(result);
-			resultLowerCase.LowerCase();
-			
-			// If the string 'false' was not found, we set the value to 'true' -the default value
-			iActiveState = (resultLowerCase.FindF(KFalse) == KErrNotFound);
-			}
-		TRAPD(r,file->WriteToFileL());
-		
-		if (KErrNone != r)
-			{
-			RDebug::Print(_L("Error occurred while writing to the file."));
-			TBuf<84> initInfoFile(sysDrive.Name());
-			initInfoFile.Append(KInitInfoFile);
-			RDebug::Print(_L("Filename = %S, KeyName = iSupportsDefaultData,"), &initInfoFile);
-			RDebug::Print(_L("value = %S."), &result);
-			}
-		delete file;
-		TRAP(r,file=CIniData::NewL(KAuthSvrPolicyFile));
-		TPtrC displayMessage;
-		ret=file->FindVar(_L("SectionOne"),_L("DisplayMessage"),displayMessage);
-		if(displayMessage.Length() == 0)   //Value = 0
-			{
-			RDebug::Print(_L("DisplayMessage not passed."));
-			iClientMessage = iClientMessage->ReAllocL(0);	// Default value
-			TPtr ptr(iClientMessage->Des());
-			ptr = KNullDesC();
-			ret=file->SetValue(_L("SectionOne"),_L("DisplayMessage"),displayMessage);
-			TRAP(r,file->WriteToFileL());
-			}
-		else
-			{
-			iClientMessage = iClientMessage->ReAllocL(displayMessage.Length());
-			TPtr ptr(iClientMessage->Des());
-			ptr = displayMessage;
-			ret=file->SetValue(_L("SectionOne"),_L("DisplayMessage"),displayMessage);
-			TRAP(r,file->WriteToFileL());
-			}
-		delete file;
-		}
-			
-	}
-
-void CTPinAuthPlugin::ReloadActiveStateFromIniFile() const
-	{
-	// Set the file to be read, based on the Id of the plugin
-	
-	_LIT(KFileText, "\\tAuth\\tAuthSvr\\testdata\\Pin");
-	_LIT(KFileSuffix, "Db.ini");
-	
-	_LIT(KFormatFileName,"%S%x%S");
-	
-	TDriveUnit sysDrive (RFs::GetSystemDrive());
-	TBuf<64> fileText(sysDrive.Name());
-	fileText.Append(KFileText);
-	iFileToRead.Format(KFormatFileName,&fileText, Id(), &KFileSuffix);
-
-	//Read data from file to get initialisation information
-	
-	// Open and read in INI file
-	// Default path to look for INI file is in 'c:\system\data' 
-	// on target filesystem
-	
-	CIniData* file=NULL;
-	TRAPD(r,file=CIniData::NewL(iFileToRead));
-	
-	//Put file on the cleanupstack if anything else in this function is going to leave, but nothing does.	
-	
-	if(r!=KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &iFileToRead);
-		}
-	
-	else
-		{
-		// Look for a key under a named section, retrieve text value	
-		TPtrC result;		
-		TBool ret=EFalse;	//return value from FindVar functions
-
-		// Set the active state of the plugin depending on the contents of the 
-		// corresponding file, which has been set as a member variable
-		ret =file->FindVar(_L("SectionOne"),_L("activeState"),result);
-		if(!ret)
-			{
-			RDebug::Print(_L("Key or section not found. iActiveState default value of ETRUE used."));			
-			iActiveState = ETrue;	// Default value
-			}
-		else
-			{
-			_LIT(KFalse,"false");
-			// Create a lower case copy of the data that is read from the file
-			TBuf<10> resultLowerCase;
-			resultLowerCase.Copy(result);
-			resultLowerCase.LowerCase();
-			if (resultLowerCase.FindF(KFalse) == KErrNotFound) 
-				iActiveState = ETrue;	// The string 'false' was not found, so we set the value to 'true' -the default value
-			else
-				iActiveState = EFalse;
-			}
-		TRAPD(r,file->WriteToFileL());
-		
-		if (KErrNone != r)
-			{
-			RDebug::Print(_L("Error occurred while writing to the file."));
-			TBuf<84> initInfoFile(sysDrive.Name());
-			initInfoFile.Append(KInitInfoFile);
-			RDebug::Print(_L("Filename = %S, KeyName = activeState,"), &initInfoFile);
-			RDebug::Print(_L("value = %S."), &result);
-			}
-		delete file;
-		}
-	}
-
-
-	
-//Implement CAuthPluginInterface definitions
-
-/**
- Normally, this would ask the user to input a 4-digit pin and then compare it to 
- the values that this plugin has been trained with. The result should be the 
- user that this PIN corresponds to.
- 'aResult' should be the 'hash' of the stored PIN (which corresponds to the freshly entered PIN)
- but in this case, it's returned as it was 'unhashed'.
-*/
-
-void CTPinAuthPlugin::Identify(TIdentityId& aId, const TDesC& aClientMessage,
-							   HBufC8*& aResult, TRequestStatus& aRequest)
-	{
-	ASSERT(IsActive());
-	
-	// We are simulating user input by reading from a file
-	// (The data contained in this file has been freshly written by the 'client part in TestExecute')
-	
-	if(aClientMessage != *ClientMessage())
-		{
-		TRequestStatus* status  = &aRequest;
-		User::RequestComplete(status, KErrGeneral);
-		RDebug::Print(_L("Display String Mismatch !!! ABORTING WITH KERRGENERAL"));
-		return;	
-		}
-	else
-		{
-		RDebug::Print(_L("Display String at the plugin matches the string sent !! "));
-		}
-	aRequest = KRequestPending;
-		
-	TBuf8<32> userInput;
-	TRAPD(result1, IdReadUserInput(userInput));	//Get the data from the AuthSvrPolicy.ini file
-	if (KErrNone != result1)
-		{
-		aRequest = result1;
-		}
-	else
-		{
-		// No errors, carry on					
-		//Convert the 8-bit string to a 16-bit string for printing in RDebug
-		HBufC* buf = 0;
-		buf = HBufC::New(32);
-		buf->Des().Copy(userInput);
-		_LIT(KMsgDebug1,"Identifying Userinput read from file = %S");    		
-		RDebug::Print(KMsgDebug1, buf);
-		delete buf;	//Memory cleanup. This string was only needed for the above Print function
-			
-		// Possibly, to allow for the cancellation or quitting, allow that to be the input string
-		_LIT8(KCancelText, "Cancel");	
-		_LIT8(KQuitText, "Quit");	
-		if (userInput == KCancelText)
-			{
-			TRequestStatus* status  = &aRequest;
-			User::RequestComplete(status, KErrAuthServPluginCancelled);
-			//aResult will not be updated, as specified
-			}
-		else if (userInput == KQuitText)
-			{
-			TRequestStatus* status  = &aRequest;
-			User::RequestComplete(status, KErrAuthServPluginQuit);
-			//aResult will not be updated, as specified
-			}
-		else
-			{
-			//compare with the known set of inputs and see if this is one of them.	
-			TInt result2 = CheckForStringPresence(aId, userInput, aRequest);
-			if (KErrNone == result2)	//The above function did not leave
-				{
-				//See if the string was found.
-				TInt length = userInput.Length();
-				
-				aResult = HBufC8::New(length);	
-				aResult->Des().Format(_L8("%S"), &userInput);
-				
-				RDebug::Printf("aResult has been updated. aResult = %S, userInput = %S", 
-									aResult, &userInput);
-				TRequestStatus* status  = &aRequest;
-				User::RequestComplete(status, result2);
-			
-				//Note: aRequest has been updated by the CheckForStringPresence function				
-				}
-			else if (KErrNotFound == result2)
-				{
-				RDebug::Printf("The data that the user input was not found (recognized)"
-								"Error = %d", result2);
-				
-				TRequestStatus* status  = &aRequest;
-				aId = KUnknownIdentity;
-				User::RequestComplete(status, KErrNone);
-				}			
-			else
-				{
-				//Caters for file access errors etc
-				RDebug::Printf("Error occurred while checking for the presence of the string"
-								"in the list. Error = %d", result2);
-				
-				TRequestStatus* status  = &aRequest;
-				aId = KUnknownIdentity;
-				User::RequestComplete(status, KErrNone);
-				}
-			}
-			//End of 'else' where the user did not cancel or quit the 'identify' process
-		}		
-	}
-	
-void CTPinAuthPlugin::Cancel()
-	{		
-	}
-
-void CTPinAuthPlugin::Train(TIdentityId aId, HBufC8*& aResult, TRequestStatus& aRequest)
-	{
-	
-	//Accept user input and update the list of inputs along with IDs.
-	
-ASSERT(IsActive());
-	
-	aRequest = KRequestPending;
-	//TInt result = KErrNone;
-	
-	TBuf8<32> userInput;
-	TRAPD(result1, TrainReadUserInput(userInput));
-	if (KErrNone != result1)
-		{
-		_LIT(KMsgDebug2,"Training Userinput read Error: result = %d");    
-		RDebug::Print(KMsgDebug2, result1);
-		}
-	else
-		{
-		// No errors, carry on		
-		//Convert the 8-bit string to a 16-bit string for printing in RDebug
-		HBufC* buf = 0;
-		buf = HBufC::New(32);
-		buf->Des().Copy(userInput);
-		_LIT(KMsgDebug3, "Training Userinput read from file = %S");
-		RDebug::Print(KMsgDebug3, buf);
-		delete buf;	//Memory cleanup. This string was only needed for the above Print function			
-		
-		// To allow for the cancellation or quitting, allow that to be the input string
-		TRequestStatus aRequest2 = KRequestPending;
-		_LIT8(KCancelText, "Cancel");
-		_LIT8(KQuitText, "Quit");
-		userInput.Trim();		
-		if (userInput.CompareF(KCancelText) == 0)
-			{ aRequest2 = KErrAuthServPluginCancelled; }		
-		else if (userInput.CompareF(KQuitText) == 0)
-			{ aRequest2 = KErrAuthServPluginQuit; }
-		else
-			{
-			//compare with the present set of inputs and see if this is one of them.
-			// update this list with this new user input, tagged to the aId
-			TRAPD(result2, CheckForNewStringPresenceL(aId, userInput, aRequest2));			
-			if (KErrNone != result2)
-				{
-				_LIT(KMsgDebug4, "Training Userinput read Error: results = %d");    
-				RDebug::Print(KMsgDebug4, result2);
-				}
-			else if(KErrNone == aRequest2.Int())
-				{
-				// No errors, update aResult.
-				// First allocate space for it since this variable will always be a 
-				// null pointer coming into this function
-				
-				aResult = HBufC8::New(userInput.Size());									
-				*aResult = userInput;
-				aRequest2 = KErrNone;
-				}			
-			else
-				{
-				_LIT(KMsgDebug5, "Error occurred during training. aRequest.Int() = %d");
-				RDebug::Print(KMsgDebug5, aRequest2.Int());
-				//aResult is not updated, nor is aId				
-				}
-			}
-		// Complete the asynchronous function
-		TRequestStatus* status  = &aRequest;
-		User::RequestComplete(status, aRequest2.Int());
-		}
-	}
-
-TBool CTPinAuthPlugin::IsActive () const
-	{
-	// There is never any user intervention required
-	//return true;
-	// As a future development note, this value may be read from a file (or a section in a file)
-	
-	ReloadActiveStateFromIniFile();
-	return iActiveState;
-	}
-	
-TInt CTPinAuthPlugin::Forget(TIdentityId aId)
-	{
-	// Open the list of userInputs that have been stored by this plugin
-	// Then find the one that corresponds to this id
-	// Then remove this string from the list and return the correct status value
-	
-	//Open the file
-	TRAPD(result3, FindStringAndRemoveL(aId));
-	return result3;
-			
-	}
-	
-TInt CTPinAuthPlugin::DefaultData(TIdentityId aId, HBufC8*& aOutputBuf)
-	{
-	
-	// This implementation of the PIN plugin does support default data.
-	// There will be cases where i don't want this available. Hence the addition of a 
-	// new class member iSupportsDefaultData
-	ReloadAllFromIniFile();
-	
-	TInt result = KErrNotSupported;
-	TRequestStatus aRequest2 = KRequestPending;
-	
-	if (iSupportsDefaultData)	//Class member initialised in the constructor
-		{
-		TBufC8<16> defaultBuf(KDefaultData);
-		//compare with the present set of inputs and see if this is one of them.
-		// update this list with this new user input, tagged to the aId
-		TRAPD(result2, CheckForNewStringPresenceL(aId, defaultBuf, aRequest2));			
-		if (KErrNone != result2)
-			{
-			_LIT(KMsgDebug4, "Training Userinput read Error: results = %d");    
-			RDebug::Print(KMsgDebug4, result2);
-			}
-		else if(KErrNone == aRequest2.Int())
-			{
-			// No errors, update aOutputBuf.
-			// First allocate space for it since this variable will always be a 
-			// null pointer coming into this function				
-			
-			TRAPD(resAlloc, (aOutputBuf = HBufC8::NewL(KDefaultData().Size())) );
-			if (KErrNone != resAlloc)
-				{
-				_LIT(KMsgAllocFailed2,"Failed to allocate memory for updating aOutputBuf");
-				RDebug::Print(KMsgAllocFailed2);
-				result = resAlloc;
-				}
-			else
-				{
-				*aOutputBuf = KDefaultData;
-				result = KErrNone;				
-				}
-			}			
-		else
-			{
-			_LIT(KMsgDebug5, "Error occurred during training. aRequest2.Int() = %d");
-			RDebug::Print(KMsgDebug5, aRequest2.Int());
-			//aOutputBuf is not updated, nor is aId				
-			}
-		}
-		
-	return result;	
-	}
-
-TInt CTPinAuthPlugin::Reset(TIdentityId/* aId*/, const TDesC&/* aRegistrationData*/, HBufC8*&/* aResult*/)
-	{
-	return KErrNotSupported;
-	}
-
-//--------------------------------------------------------------------------------
-
-/**
- Utility method to capture the data that the user has input 
- (in the form of data stored in a file)
-*/
-TInt CTPinAuthPlugin::IdReadUserInput(TBuf8<32>& aInputValue)
-	{
-
-	TInt retValue;
-	CIniData* file=NULL;
-	TRAPD(r,file=CIniData::NewL(iFileToRead));
-	if(r!=KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &iFileToRead);
-		retValue = r;
-		}
-	
-	else
-		{
-		// Look for a key under a named section, retrieve text value	
-		TPtrC result;		
-		TBool ret=EFalse;	//return value from FindVar functions
-		
-		ret=file->FindVar(_L("SectionOne"),_L("IdEnteredPinValue"),result);
-		if(!ret)
-			{
-			RDebug::Print(_L("Unable to find the key in the file %S. IdEnteredPinValue is not known, 9999 used. Error = %d"), &iFileToRead, ret);
-			_LIT8(KEnteredPinValueErr, "9999");
-			aInputValue = KEnteredPinValueErr;	// Default value
-			retValue = KErrNotFound;						
-			}
-		else
-			{
-			//Later,include a check to ensure that only digits were entered
-			aInputValue.Copy(result);
-			aInputValue.Trim();			
-			retValue = KErrNone;	//Not necessary
-			}
-		delete file;	//memory cleanup
-		}
-	
-	return retValue;
-	}
-
-TInt CTPinAuthPlugin::TrainReadUserInput(TBuf8<32>& aInputValue)
-	{
-
-	TInt retValue;
-	CIniData* file=NULL;
-	TRAPD(r,file=CIniData::NewL(iFileToRead));
-	if(r!=KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &iFileToRead);
-		retValue = r;
-		}
-	
-	else
-		{
-		// Look for a key under a named section, retrieve text value	
-		TPtrC result;		
-		TBool ret=EFalse;	//return value from FindVar functions
-		
-		ret=file->FindVar(_L("SectionOne"),_L("TrainEnteredPinValue"),result);
-		if(!ret)
-			{
-			RDebug::Print(_L("Unable to find the key in the file %S. TrainEnteredPinValue is not known, 9999 used. Error = %d"), &iFileToRead, ret);
-			_LIT8(KEnteredPinValueErr, "9999");
-			aInputValue = KEnteredPinValueErr;	// Default value
-			retValue = KErrNotFound;						
-			}
-		else
-			{
-   			aInputValue.Copy(result);
-			aInputValue.Trim();
-			retValue = KErrNone;	//Not necessary
-			}
-		delete file;	//memory cleanup
-		}
-	
-	return retValue;
-	}
-
-/**
- Utility method to compare the data that the user has input 
- with all the data that has been stored for users 
- Called by Identify()
- @return - success or failure value
-*/
-TInt CTPinAuthPlugin::CheckForStringPresence(TIdentityId& aId, TBuf8<32> aInputValue, TRequestStatus& aRequestValue)
-	{
-
-	TInt retValue = KErrNone;	
-	// First format the aInputValue string so that it starts with a ':' and ends with a ','.
-	_LIT8(KFormatValue2, ":%S,");
-	TBuf8<32> aInputValue2;
-	aInputValue2.Format(KFormatValue2, &aInputValue);
-
-	//Convert the 8-bit string to a 16-bit string for printing in RDebug
-	HBufC* buf = 0;
-	buf = HBufC::New(32);
-	buf->Des().Copy(aInputValue);		
-	RDebug::Print(_L("Formatted string: %S"), buf);
-	delete buf;	//Memory cleanup. This string was only needed for the above Print function
-
-	TBuf8<500> pinFileContents1, pinFileContents2;
-	// Read the contents of the file that contains all the ID/PIN combinations
-
-	CIniData* file=NULL;
-	TRAPD(r,file=CIniData::NewL(iFileToRead));
-	if(r!=KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &iFileToRead);
-		retValue = r;
-		}	
-	else
-		{
-		// Look for a key under a named section, retrieve text value	
-		TPtrC result;		
-		TBool ret=EFalse;	//return value from FindVar functions
-		
-		ret=file->FindVar(_L("SectionOne"),_L("Identity&PinValues"),result);
-		if(!ret)
-			{
-			RDebug::Print(_L("Unable to find the Identity&PinValues key in the file %S."), &iFileToRead);
-			retValue = KErrNotFound;
-			aRequestValue =KErrNotFound;
-			}
-		else
-			{
-			pinFileContents1.Copy(result);	
-			
-			TInt searchResult;
-			searchResult = pinFileContents1.Find(aInputValue2);
-			
-			if (KErrNotFound == searchResult)
-				{
-				RDebug::Print(_L("Userinput not found in the pinFile %S. Identification error"), &iFileToRead);
-				aRequestValue= KErrAuthServIdentityNotFound;
-				retValue  = searchResult;
-				}
-			else if (searchResult)	// a positive value
-				{				
-				// Now find the userID by searching back through the string for the "," marker				
-				pinFileContents2 = pinFileContents1.Left(searchResult);
-				TInt userIdStartPos = pinFileContents2.LocateReverse(',');
-								 
-				//Extract this userId for use by the calling function
-				TBuf8<50> p1 = pinFileContents2.Right(searchResult - userIdStartPos - 1);
-				TLex8 input (p1);
-				TRadix aRadix = EDecimal;
-				input.Val(aId, aRadix);
-				RDebug::Print(_L("UserId that is stored = %u"), aId);
-				aRequestValue = KErrNone;
-				retValue = KErrNone;
-				}				
-			else
-				{
-				RDebug::Print(_L("Unexpected error in the 'Find' function. Searchresult = %d"), searchResult);
-				aRequestValue = searchResult;
-				retValue = searchResult;				
-				}//End check for key&section search in file				
-			}//End check for safe file access
-		delete file;
-		}
-	
-	return retValue;
-	}
-
-/**
- Utility method to compare the data that the user has input 
- with all the data that has been stored for users 
- Used to find out if the input is unique. 
- -since KIdAmbiguous is no longer used, KIdCancel will be returned if the input is non-unique
- Called by Train() and DefaultData()
-*/
-TInt CTPinAuthPlugin::CheckForNewStringPresenceL(TIdentityId aId, TBuf8<32> aInputValue, TRequestStatus& aRequestValue)
-	{	
-	TBuf8<500> pinFileContents, pinFileContents2;
-	TInt retValue = KErrNone;
-
-	CIniData* file=NULL;
-	TRAPD(r,file=CIniData::NewL(iFileToRead));
-		
-	if(r!=KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &iFileToRead);
-		return r;
-		}	
-	
-	// Look for a key under a named section, retrieve text value	
-	TPtrC result;		
-	TBool ret=EFalse;	//return value from FindVar functions
-	aRequestValue = KErrAuthServIdentityNotFound;	//Initialisation		
-			
-	ret=file->FindVar(KPluginIniSection, KPinDbTag,result);
-	if(!ret)
-		{
-		RDebug::Print(_L("Unable to find the %S key in the file %S."), &KPinDbTag, &iFileToRead);
-		delete file;
-		return KErrNotFound;			
-		}
-	
-	//Copy the data from the named section in the file, and see if any previous user has used this input string
-	pinFileContents.Copy(result);			
-	
-	TInt searchResultPin;
-	TBuf8<50> searchStringPin;
-	_LIT8(KFormat3, ":%S,");
-	searchStringPin.Format(KFormat3, &aInputValue);
-	searchResultPin = pinFileContents.Find(searchStringPin);
-				
-	if (KErrNotFound == searchResultPin)
-		{				
-		//check that the identity is unique, if so, update the Db 
-		// with the new Id-PIN pair, as is done already
-		// else update the PIN only, ie training data for that identity
-		TInt searchResultId;
-		TBuf8<50> searchStringId;
-		_LIT8(KFormat4, ",%u:");
-		searchStringId.Format(KFormat4, aId);
-		
-		searchResultId = pinFileContents.Find(searchStringId);
-		
-		TDriveUnit sysDrive (RFs::GetSystemDrive());
-		TBuf<80> policyFile;
-		if (KErrNotFound == searchResultId)
-			{									
-			// Add this entry to the file
-			// This is a simple system, expecting a format as below:
-			// ",aId:inputPin,aId:inputPin,aId:inputPin,"				
-			
-			_LIT8(KFormat2, "%S%u:%S,");
-			if (pinFileContents.Size() == 0)
-				{
-				pinFileContents.Append(',');	//Initialisation
-				}
-			pinFileContents2.Format(KFormat2, &pinFileContents, aId, &aInputValue);				
-										
-			//For the purpose of writing the data to a file, i'll create a 16-bit version of pinFileContents
-			TInt ret2 = 0;
-			HBufC* buf = 0;
-			buf = HBufC::NewL(pinFileContents2.Length());
-			buf->Des().Copy(pinFileContents2);												
-			ret2 = file->SetValue(_L("SectionOne"),_L("Identity&PinValues"), *buf);
-			
-			TRAPD(r,file->WriteToFileL());
-			
-						
-			if (KErrNone != r)
-				{
-				policyFile.Copy(sysDrive.Name());
-				policyFile.Append(KPolicyFile);
-				RDebug::Print(_L("Error occurred while writing to the file. Filename = %S, KeyName = AllUserID&PinValues, value = %S."), &policyFile, buf);
-				}
-			delete buf;		//Memory cleanup. This string was only needed for the above Print function
-			
-			if(KErrNone == ret2)
-				{				
-				aRequestValue = KErrNone;
-				
-				//Update the global database
-				AddToGlobalDb(aId, aInputValue);
-				}
-			else
-				{
-				RDebug::Print(_L("Error occurred while writing data to file. Error = %d"), ret2);					
-				aRequestValue = ret2;
-				}
-			
-			}
-
-		else
-			{
-			//The Identity has already been trained with this plugin, 
-			// update the PIN (training data)
-			
-			//extract the string to the right of the end of the aId
-			pinFileContents2 = pinFileContents.Mid(searchResultId + searchStringId.Size());
-			
-			//Find the end of the PIN (Training data)
-			_LIT8(KPinEndMarker, ",");
-			TBufC8<5> bufPinEndMarker(KPinEndMarker);					
-			TInt pinEndPos = pinFileContents2.Find(bufPinEndMarker);
-			
-			//Replace this with the new PIN
-			pinFileContents.Replace((searchResultId + searchStringId.Size()),
-									 pinEndPos, aInputValue);	
-			
-			//For the purpose of writing the data to a file, i'll create a 16-bit version of pinFileContents
-			TInt ret2 = 0;
-			HBufC* buf = 0;
-			buf = HBufC::NewL(pinFileContents.Length());
-			buf->Des().Copy(pinFileContents);
-								
-			ret2 = file->SetValue(_L("SectionOne"),_L("Identity&PinValues"), *buf);
-			
-			TRAPD(r,file->WriteToFileL());
-			
-			if (KErrNone != r)
-				{
-				policyFile.Copy(sysDrive.Name());
-				policyFile.Append(KPolicyFile);
-				RDebug::Print(_L("Error occurred while writing to the file. Filename = %S, KeyName = AllUserID&PinValues, value = %S."), &policyFile, buf);
-				}
-			delete buf;		//Memory cleanup. This string was only needed for the above Print function
-			
-			if(KErrNone ==ret2)
-				{				
-				aRequestValue = KErrNone;
-				
-				//Update the global database
-				AddToGlobalDb(aId, aInputValue);
-				}
-			else
-				{
-				RDebug::Print(_L("Error occurred while writing data to file. Error = %d"), ret2);					
-				aRequestValue = ret2;
-				}
-			}
-		delete file;
-		return ret;
-		}
-	if (searchResultPin)	// a positive value
-		{
-		// A user has already tried to train this plugin using the given data.
-		// The pinFileContents are not updated, to avoid duplication
-		
-		aRequestValue = KErrAuthServPluginCancelled;
-		delete file;
-		return searchResultPin;
-		}	
-	
-	RDebug::Print(_L("Unexpected error in the 'Find' function. SearchresultPin = %d"), searchResultPin);
-	retValue = searchResultPin;
-
-	delete file;
-		
-	return retValue;
-	}
-
-	
-/**
- Utility function to remove the training data that is associated with a given Id
- Called by the Forget function
- @return - KIdSuccess, KIdUnknown or some error code  
- */ 
-TInt CTPinAuthPlugin::FindStringAndRemoveL (TIdentityId aId)
-	{
-	TBuf8<500> pinFileContents, pinFileContents2;
-	TInt retValue = KErrAuthServNoSuchIdentity;		//init
-	CIniData* file=NULL;
-	//First read the list of userId and PIN combinations from a file
-	TRAPD(r,file=CIniData::NewL(iFileToRead));
-	if(r!=KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &iFileToRead);
-		retValue = r;
-		}	
-	else
-		{
-		// Look for a key under a named section, retrieve text value	
-		TPtrC result;		
-		TBool ret=EFalse;	//return value from FindVar functions
-				
-		ret=file->FindVar(KPluginIniSection, KPinDbTag,result);
-		if(!ret)
-			{
-			RDebug::Print(_L("Config error: Unable to find the %S key in the file %S."), &KPinDbTag, &iFileToRead);
-			retValue = KErrNotFound;						
-			}
-		else
-			{
-			//Copy the data from the named section in the file, and see if any previous user has used this input string
-			pinFileContents.Copy(result);				
-			
-			//Format the searchstring as defined in the file so that it starts with a ',' and ends with a ':'.
-			_LIT8(KFormatValue3, ",%u:");			
-			
-			TBuf8<32> searchString;
-			searchString.Format(KFormatValue3, aId);
-
-			//For the purpose of printing the data to a file, i'll create a 16-bit version of pinFileContents
-			HBufC* buf = 0;
-			buf = HBufC::NewL(searchString.Length());
-			buf->Des().Copy(searchString);
-			RDebug::Print(_L("Formatted searchString used in 'FindStringAndRemove(): %S"), buf);
-			delete buf;
-
-			TInt userIdStartPos;	//The offset of the searchString within pinFileContents
-									//i.e the position of the '.' just before the identityId
-			userIdStartPos = pinFileContents.Find(searchString);
-			if (KErrNotFound == userIdStartPos)
-				{
-				RDebug::Print(_L("FindStringAndRemoveL: The specified ID was not found in the pinFile"));
-				retValue = KErrAuthServNoSuchIdentity;	//KIdUnknown;
-				}
-			else
-				{
-				
-				//Find where the string (including PIN) ends
-				TLex8 aLex = TLex8(pinFileContents);
-				TInt length(0);
-				aLex.Inc(userIdStartPos+1);
-				while(aLex.Peek() != ',') 
-					{
-					aLex.Inc();
-					length++;
-					}
-								
-				//remove the found (total) string from the list (including the starting ',')
-				pinFileContents.Delete(userIdStartPos,length+1);
-				
-				//Update the file
-				//For the purpose of writing the data to a file, i'll create a 16-bit version of pinFileContents
-				TInt ret2 = 0;
-				HBufC* buf;
-				buf = HBufC::NewL(pinFileContents.Length());	
-				buf->Des().Copy(pinFileContents);
-								
-				ret2 = file->SetValue(KPluginIniSection, KPinDbTag, *buf);
-				
-				TRAPD(r,file->WriteToFileL());
-				TDriveUnit sysDrive (RFs::GetSystemDrive());
-				TBuf<2> sysDriveName (sysDrive.Name());
-				TBuf<84> policyFile;
-								
-				if (KErrNone != r)
-					{
-					policyFile.Copy(sysDriveName);
-					policyFile.Append(KPolicyFile);
-					RDebug::Print(_L("Error occurred while writing to the file. Filename = %S, KeyName = AllUserID&PinValues, value = %S."), &policyFile, buf);
-					}
-				delete buf;		//Memory cleanup. This string was only needed for the above Print function
-				
-				if (KErrNone !=ret2)
-					{
-					policyFile .Copy(sysDriveName);
-					policyFile.Append(KAuthSvrPolicyFile);
-					RDebug::Print(_L("Error occurred in WriteToFileL(). Error = %d. Filename= %S"), ret2, &policyFile);
-					retValue = ret2;
-					}
-				else
-					{
-					retValue = KErrNone;		
-					}				
-				}			
-			}//End check for key&section search in file
-		delete file;
-		}//End check for safe file access
-	
-	return retValue;
-	}
-
-
-/**
- Utility function to Update the Global Db with the training data 
- that is associated with a given Id. The update will not happen if 
- the identity is already present in this list, i.e. it's been pu in 
- by another plugin
- Called by the CheckForNewStringPresence function
- @return - KErrNone, or some error code
-*/
-TInt CTPinAuthPlugin::AddToGlobalDb (TIdentityId aId, TBuf8<32> aInputValue)
-	{
-	
-	TBuf8<500> totalDbFileContents, totalDbFileContents2;
-	TInt retValue = KErrNone;
-	CIniData* file=NULL;
-	
-	TDriveUnit sysDrive (RFs::GetSystemDrive());
-	TDriveName sysDriveName (sysDrive.Name());
-	TBuf<128> authSvrPolicyFile(sysDriveName);
-	authSvrPolicyFile.Append(KAuthSvrPolicyFile);
-	
-	TRAPD(r,file=CIniData::NewL(authSvrPolicyFile));	
-	if(r!=KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &authSvrPolicyFile);
-		retValue = r;
-		}	
-	else
-		{
-		// Look for a key under a named section, retrieve text value	
-		TPtrC result;		
-		TBool ret=EFalse;	//return value from FindVar functions		
-				
-		ret=file->FindVar(KPluginIniSection, KTotalDbTag,result);
-		if(!ret)
-			{
-			RDebug::Print(_L("Unable to find the %S key in the file %S."), &KTotalDbTag, &authSvrPolicyFile);
-			retValue = KErrNotFound;		
-			}
-		else
-			{
-			//Copy the data from the named section in the file, and see if any previous user has used this input string
-			totalDbFileContents.Copy(result);
-			TBuf8<20> aidString;
-			aidString.Num(aId, EDecimal);			
-			TInt searchResult;			
-			searchResult = totalDbFileContents.Find(aidString);
-			
-			if (KErrNotFound == searchResult)
-				{
-				// Add this entry to the file
-				// This is a simple system, expecting a format as below:
-				// ",aId:inputPin,aId:inputPin,aId:inputPin,"				
-				_LIT8(KFormat2, "%S%u:%S,");
-				if (totalDbFileContents.Size() == 0)
-					{					
-					totalDbFileContents.Append(',');	//Initialisation
-					}
-				totalDbFileContents2.Format(KFormat2, &totalDbFileContents, aId, &aInputValue);				
-					
-				//For the purpose of writing the data to a file, i'll create a 16-bit version of pinFileContents
-				TInt ret2 = 0;
-				HBufC* buf = 0;
-				buf = HBufC::New(totalDbFileContents2.Length());
-				buf->Des().Copy(totalDbFileContents2);								
-				ret2 = file->SetValue(KPluginIniSection, KTotalDbTag, *buf);
-				
-				TRAPD(r,file->WriteToFileL());
-									
-				if (KErrNone != r)
-					{
-					TBuf<80> policyFile(sysDriveName);
-					policyFile.Append(KPolicyFile);
-					RDebug::Print(_L("Error occurred while writing to the file. Filename = %S, KeyName = AllUserID&PinValues, value = %S."), &policyFile, buf);
-					}
-				delete buf;		//Memory cleanup. This string was only needed for the above Print function
-				
-				if (KErrNone !=ret2)
-					{
-					RDebug::Print(_L("Error occurred in SetValue(). Error = %d. Filename= %S"), ret2, &authSvrPolicyFile);
-					retValue = ret2;
-					}
-				}
-			else
-				{
-				// A user has already tried to train this plugin using the given data.
-				// The pinFileContents are not updated, to avoid duplication				
-				retValue = KErrNone;													
-				}//End aidString search in the totalDbFileContents string (Find())
-			}//End check for key&section search in file (FindVar())
-			delete file;
-		}//End check for safe file access
-	return retValue;
-	}
-const HBufC* CTPinAuthPlugin::ClientMessage()
-	{
-	return iClientMessage;
-	}
-
-const TPtrC& CTPinAuthPlugin::Name() const
-  {
-  return iName;
-  }
-const TPtrC& CTPinAuthPlugin::Description() const
-  {
-  return iDescription;
-  }
-AuthServer::TAuthPluginType CTPinAuthPlugin::Type() const 
-  {
-  return iType;
-  }
-
-AuthServer::TEntropy CTPinAuthPlugin::MinEntropy() const
-  {
-  return iMinEntropy;
-  }
-
-AuthServer::TPercentage CTPinAuthPlugin::FalsePositiveRate() const
-  {
-  return iFalsePositiveRate;
-  }
-
-AuthServer::TPercentage CTPinAuthPlugin::FalseNegativeRate() const
-  {
-  return iFalseNegativeRate;
-  }
--- a/authenticationservices/authenticationserver/test/tAuthSvr/testdata/AuthSvrPolicy.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,70 +0,0 @@
-#EnteredPinValue 	- String that contains the PIN that the user has entered after being prompted
-#DefaultPlugin		- String used to define which plugin is the default plugin
-#AllUserID&PinValues	- string that contains the list of the userId and Pin 'pairs'. 
-#			  The format is ,UserId:Pin,
-#			  An empty one has just a comma
-
-
-[SectionOne]
-#EnteredPinValue = 5312
-EnteredPinValue = 0011
-DefaultPlugin = PIN
-LastAuthId = 0
-AllUserID&PinValues = ,597430:0011,82383:5555,0873948:2533,
-DisplayMessage = 
-
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
--- a/authenticationservices/authenticationserver/test/tAuthSvr/testdata/Pin10234100Db.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,71 +0,0 @@
-#EnteredPinValue 	- String that contains the PIN that the user has entered after being prompted
-#DefaultPlugin		- String used to define which plugin is the default plugin
-#AllUserID&PinValues	- string that contains the list of the userId and Pin 'pairs'. 
-#			  The format is ,UserId:Pin,
-#			  An empty one has just a comma
-
-
-[SectionOne]
-#EnteredPinValue = 5312
-TrainEnteredPinValue = 5000
-IdEnteredPinValue = 5000
-iSupportsDefaultData = true
-activeState = true
-DefaultPlugin = PIN
-Identity&PinValues = ,
-
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
--- a/authenticationservices/authenticationserver/test/tAuthSvr/testdata/Pin11113100Db.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,71 +0,0 @@
-#EnteredPinValue 	- String that contains the PIN that the user has entered after being prompted
-#DefaultPlugin		- String used to define which plugin is the default plugin
-#AllUserID&PinValues	- string that contains the list of the userId and Pin 'pairs'. 
-#			  The format is ,UserId:Pin,
-#			  An empty one has just a comma
-
-
-[SectionOne]
-#EnteredPinValue = 5312
-TrainEnteredPinValue = 5000
-IdEnteredPinValue = 5000
-iSupportsDefaultData = true
-activeState = true
-DefaultPlugin = PIN
-Identity&PinValues = ,
-
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
--- a/authenticationservices/authenticationserver/test/tAuthSvr/testdata/Pin11113101Db.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,71 +0,0 @@
-#EnteredPinValue 	- String that contains the PIN that the user has entered after being prompted
-#DefaultPlugin		- String used to define which plugin is the default plugin
-#AllUserID&PinValues	- string that contains the list of the userId and Pin 'pairs'. 
-#			  The format is ,UserId:Pin,
-#			  An empty one has just a comma
-
-
-[SectionOne]
-#EnteredPinValue = 5312
-TrainEnteredPinValue = 5000
-IdEnteredPinValue = 5000
-iSupportsDefaultData = true
-activeState = true
-DefaultPlugin = PIN
-Identity&PinValues = ,
-
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
--- a/authenticationservices/authenticationserver/test/tAuthSvr/testdata/Pin11113102Db.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,71 +0,0 @@
-#EnteredPinValue 	- String that contains the PIN that the user has entered after being prompted
-#DefaultPlugin		- String used to define which plugin is the default plugin
-#AllUserID&PinValues	- string that contains the list of the userId and Pin 'pairs'. 
-#			  The format is ,UserId:Pin,
-#			  An empty one has just a comma
-
-
-[SectionOne]
-#EnteredPinValue = 5312
-TrainEnteredPinValue = 5000
-IdEnteredPinValue = 5000
-iSupportsDefaultData = true
-activeState = true
-DefaultPlugin = PIN
-Identity&PinValues = ,
-
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
--- a/authenticationservices/authenticationserver/test/tAuthSvr/testdata/Pin11113103Db.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,71 +0,0 @@
-#EnteredPinValue 	- String that contains the PIN that the user has entered after being prompted
-#DefaultPlugin		- String used to define which plugin is the default plugin
-#AllUserID&PinValues	- string that contains the list of the userId and Pin 'pairs'. 
-#			  The format is ,UserId:Pin,
-#			  An empty one has just a comma
-
-
-[SectionOne]
-#EnteredPinValue = 5312
-TrainEnteredPinValue = 5000
-IdEnteredPinValue = 5000
-iSupportsDefaultData = true
-activeState = true
-DefaultPlugin = PIN
-Identity&PinValues = ,
-
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
--- a/authenticationservices/authenticationserver/test/tAuthSvr/testdata/Pin11113104Db.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,71 +0,0 @@
-#EnteredPinValue 	- String that contains the PIN that the user has entered after being prompted
-#DefaultPlugin		- String used to define which plugin is the default plugin
-#AllUserID&PinValues	- string that contains the list of the userId and Pin 'pairs'. 
-#			  The format is ,UserId:Pin,
-#			  An empty one has just a comma
-
-
-[SectionOne]
-#EnteredPinValue = 5312
-TrainEnteredPinValue = 5000
-IdEnteredPinValue = 5000
-iSupportsDefaultData = true
-activeState = true
-DefaultPlugin = PIN
-Identity&PinValues = ,
-
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
-# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file# end of file
Binary file authenticationservices/authenticationserver/test/tAuthSvr/testdata/cenrep1.txt has changed
Binary file authenticationservices/authenticationserver/test/tAuthSvr/testdata/cenrep2.txt has changed
Binary file authenticationservices/authenticationserver/test/tAuthSvr/testdata/cenrep3.txt has changed
--- a/authenticationservices/authenticationserver/test/tAuthSvr/testdata/initialisation_Info.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,2 +0,0 @@
-[SectionOne]
-iSupportsDefaultData = true
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/tAuthSvr/testdata/pin_Contents.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,2 +0,0 @@
-[SectionOne]
-AllUserID&PinValues = ,597430:0011,82383:5555,0873948:2533,
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/tAuthSvr/testdata/pin_Input.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,2 +0,0 @@
-[SectionOne]
-EnteredPinValue = 5312
\ No newline at end of file
Binary file authenticationservices/authenticationserver/test/tAuthSvr/testdata/unicode.txt has changed
--- a/authenticationservices/authenticationserver/test/tAuthSvr/tpostmarketplugins/main.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,27 +0,0 @@
-/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-
-#include <e32base.h>
-
-/** DLL Entry point */
-
-TBool E32Dll()
-	{
-	return (ETrue);
-	}
--- a/authenticationservices/authenticationserver/test/tAuthSvr/tpostmarketplugins/proxy.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,37 +0,0 @@
-/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-
-#include <e32std.h>
-#include <ecom/implementationproxy.h>	// ECOM header file
-
-#include "tpostmarketramplugin.h"			// Class definition for one of the dummy implementations
-
-
-// Map the interface UIDs to implementation factory functions
-const TImplementationProxy ImplementationTable[] = 
-	{
-	IMPLEMENTATION_PROXY_ENTRY(0x10234100,	CTPostMarketRAMPlugin10234100::NewL),
-	};
-
-// Exported proxy function to resolve intstantiation methods for an ECOM plugin dll
-EXPORT_C const TImplementationProxy* ImplementationGroupProxy(TInt& aTableCount)
-	{
-	aTableCount = sizeof(ImplementationTable) / sizeof(TImplementationProxy);
-	return ImplementationTable;
-	}
--- a/authenticationservices/authenticationserver/test/tAuthSvr/tpostmarketplugins/testdata/1023F3F4.rss	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,50 +0,0 @@
-/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Dummy registry file for tpostmarketramplugin implementation.
-* UIDs quick-ref
-* ECOM DLL UID:			0x1023F3F4 
-* ECOM interface UID:		0x102740FE 
-* ECOM Implementation:		0x10234100
-*
-*/
-
-
-#include <ecom/registryinfov2.rh>
-
-RESOURCE REGISTRY_INFO r_registry
-{
-	dll_uid = 0x1023F3F4;
-	resource_format_version = RESOURCE_FORMAT_VERSION_2;
-	interfaces =
-	{
-		INTERFACE_INFO
-		{ 
-		interface_uid = 0x102740FE;	// Const for all data recognisers
-		implementations = 
-			{
-			IMPLEMENTATION_INFO
-				{
-				implementation_uid = 0x10234100;
-				version_no = 1;
-				display_name = "PostMarketTestRAMPlugin";
-				default_data = "10234100";
-				opaque_data = "";
-				rom_only=0;
-				}
-			};
-		}
-	};
-}
-
--- a/authenticationservices/authenticationserver/test/tAuthSvr/tpostmarketplugins/testdata/buildpostmarketplugintestdata.fil	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,59 +0,0 @@
-MAKEDATA :
-!IF "$(PLATFORM)" == "GCCXML" || "$(PLATFORM)" == "TOOLS" || "$(PLATFORM)" == "TOOLS2"
-	cd
-	echo ----------------
-	echo  Do nothing ...
-	echo ----------------
-!ELSE
-	cd
-	echo ---------------------------------------------------------------------
-	echo Copy test upgrade dlls and rsc files to c:\tauth\tpostmarketplugins\
-	echo ---------------------------------------------------------------------
-	
-	if not exist %EPOCROOT%epoc32\winscw\c\tauth\tpostmarketplugins mkdir %EPOCROOT%epoc32\winscw\c\tauth\tpostmarketplugins
-	copy %EPOCROOT%epoc32\release\"$(PLATFORM)"\"$(CFG)"\tauthpluginupgrade.dll %EPOCROOT%epoc32\winscw\c\tauth\tpostmarketplugins\tauthpluginupgrade.dll
-	copy %EPOCROOT%epoc32\release\"$(PLATFORM)"\"$(CFG)"\testpluginsupgrade.dll %EPOCROOT%epoc32\winscw\c\tauth\tpostmarketplugins\testpluginsupgrade.dll
-	copy %EPOCROOT%epoc32\release\"$(PLATFORM)"\"$(CFG)"\tpostmarketramplugin.dll %EPOCROOT%epoc32\winscw\c\tauth\tpostmarketplugins\tpostmarketramplugin.dll
-
-	del %EPOCROOT%epoc32\release\"$(PLATFORM)"\"$(CFG)"\tauthpluginupgrade.dll
-	del %EPOCROOT%epoc32\release\"$(PLATFORM)"\"$(CFG)"\testpluginsupgrade.dll
-	del %EPOCROOT%epoc32\release\"$(PLATFORM)"\"$(CFG)"\tpostmarketramplugin.dll
-
-	if exist %EPOCROOT%epoc32\release\"$(PLATFORM)"\"$(CFG)"\z\resource\plugins\tauthpluginupgrade.rsc copy %EPOCROOT%epoc32\release\"$(PLATFORM)"\"$(CFG)"\z\resource\plugins\tauthpluginupgrade.rsc %EPOCROOT%epoc32\winscw\c\tauth\tpostmarketplugins\tauthpluginupgrade.rsc
-	if exist %EPOCROOT%epoc32\release\"$(PLATFORM)"\"$(CFG)"\z\resource\plugins\testpluginsupgrade.rsc copy %EPOCROOT%epoc32\release\"$(PLATFORM)"\"$(CFG)"\z\resource\plugins\testpluginsupgrade.rsc %EPOCROOT%epoc32\winscw\c\tauth\tpostmarketplugins\testpluginsupgrade.rsc
-	if exist %EPOCROOT%epoc32\release\"$(PLATFORM)"\"$(CFG)"\z\resource\plugins\tpostmarketramplugin.rsc copy %EPOCROOT%epoc32\release\"$(PLATFORM)"\"$(CFG)"\z\resource\plugins\tpostmarketramplugin.rsc %EPOCROOT%epoc32\winscw\c\tauth\tpostmarketplugins\tpostmarketramplugin.rsc
-
-	if exist %EPOCROOT%epoc32\data\z\resource\plugins\testpluginsupgrade.rsc copy /y %EPOCROOT%epoc32\data\z\resource\plugins\testpluginsupgrade.rsc %EPOCROOT%epoc32\winscw\c\tauth\tpostmarketplugins\testpluginsupgrade.rsc
-	if exist %EPOCROOT%epoc32\data\z\resource\plugins\tauthpluginupgrade.rsc copy /y %EPOCROOT%epoc32\data\z\resource\plugins\tauthpluginupgrade.rsc %EPOCROOT%epoc32\winscw\c\tauth\tpostmarketplugins\tauthpluginupgrade.rsc
-	if exist %EPOCROOT%epoc32\data\z\resource\plugins\tpostmarketramplugin.rsc copy /y %EPOCROOT%epoc32\data\z\resource\plugins\tpostmarketramplugin.rsc %EPOCROOT%epoc32\winscw\c\tauth\tpostmarketplugins\tpostmarketramplugin.rsc
-
-	if exist %EPOCROOT%epoc32\data\z\resource\plugins\testpluginsupgrade.rsc del %EPOCROOT%epoc32\data\z\resource\plugins\testpluginsupgrade.rsc
-	if exist %EPOCROOT%epoc32\data\z\resource\plugins\tauthpluginupgrade.rsc  del %EPOCROOT%epoc32\data\z\resource\plugins\tauthpluginupgrade.rsc 
-	if exist %EPOCROOT%epoc32\data\z\resource\plugins\tpostmarketramplugin.rsc del %EPOCROOT%epoc32\data\z\resource\plugins\tpostmarketramplugin.rsc
-
-	if exist %EPOCROOT%epoc32\release\"$(PLATFORM)"\"$(CFG)"\z\resource\plugins\tauthpluginupgrade.rsc del %EPOCROOT%epoc32\release\"$(PLATFORM)"\"$(CFG)"\z\resource\plugins\tauthpluginupgrade.rsc
-	if exist %EPOCROOT%epoc32\release\"$(PLATFORM)"\"$(CFG)"\z\resource\plugins\testpluginsupgrade.rsc del %EPOCROOT%epoc32\release\"$(PLATFORM)"\"$(CFG)"\z\resource\plugins\testpluginsupgrade.rsc
-	if exist %EPOCROOT%epoc32\release\"$(PLATFORM)"\"$(CFG)"\z\resource\plugins\tpostmarketramplugin.rsc del %EPOCROOT%epoc32\release\"$(PLATFORM)"\"$(CFG)"\z\resource\plugins\tpostmarketramplugin.rsc
-
-!ENDIF
-
-DO_NOTHING:
-	rem do nothing
-
-#
-# The targets invoked by abld...
-#
-
-MAKMAKE : DO_NOTHING
-FREEZE : DO_NOTHING
-LIB : DO_NOTHING
-RESOURCE : DO_NOTHING
-CLEANLIB : DO_NOTHING
-BLD : DO_NOTHING
-RELEASABLES : DO_NOTHING
-
-SAVESPACE : BLD
-
-FINAL : MAKEDATA
-
-CLEAN : 
--- a/authenticationservices/authenticationserver/test/tAuthSvr/tpostmarketplugins/testdata/epoc_enablepostmarketplugin.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,8 +0,0 @@
-PlatSecDiagnostics ON
-PlatSecEnforcement ON 
-PlatSecProcessIsolation ON 
-PlatSecEnforceSysBin ON
-
-_epoc_drive_d \epoc32\drive_d
-
-KEnablePostMarketAuthenticationPlugins 0x01
--- a/authenticationservices/authenticationserver/test/tAuthSvr/tpostmarketplugins/testdata/epoc_patchdatanegative.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,8 +0,0 @@
-PlatSecDiagnostics ON
-PlatSecEnforcement ON 
-PlatSecProcessIsolation ON 
-PlatSecEnforceSysBin ON
-
-_epoc_drive_d \epoc32\drive_d
-
-KEnablePostMarketAuthenticationPlugins -1
--- a/authenticationservices/authenticationserver/test/tAuthSvr/tpostmarketplugins/testdata/epoc_patchdatapositive.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,8 +0,0 @@
-PlatSecDiagnostics ON
-PlatSecEnforcement ON 
-PlatSecProcessIsolation ON 
-PlatSecEnforceSysBin ON
-
-_epoc_drive_d \epoc32\drive_d
-
-KEnablePostMarketAuthenticationPlugins 0x0A
--- a/authenticationservices/authenticationserver/test/tAuthSvr/tpostmarketplugins/tpostmarketramplugin.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,1076 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* dummy plugin to test post market plugin support.
-*
-*/
-
-
-#include <f32file.h>
-
-#include "tpostmarketramplugin.h"
-#include <e32svr.h>
-
-#ifndef __INIPARSER_H__
-	#include <cinidata.h>
-#endif // __INIPARSER_H__
-
-	
-//Implement CAuthPluginInterface definitions
-CTPostMarketRAMPlugin::~CTPostMarketRAMPlugin()
-	{
-	delete iClientMessage;
-	}
-
-CTPostMarketRAMPlugin::CTPostMarketRAMPlugin()
-	{	
-	// See ConstructL() for initialisation completion.
-	}
-		
-/**
- Safely complete the initialization of the constructed object	
-*/
-void CTPostMarketRAMPlugin::ConstructL()
-	{
-	iName.Set(KPluginNamePin);
-	iDescription.Set(KPluginDescriptionPin);
-	iMinEntropy = KEntropyPin;
-	iFalsePositiveRate = KFalsePosPin;
-  	iFalseNegativeRate = KFalseNegPin;
-  	iClientMessage = HBufC::NewL(2048);
-	ReloadAllFromIniFile();
-	}
-	
-/**
-  Sets information like iActiveState and iSupportsDefaultData from 
-  the TEF ini file to the individual plugin database files
-*/	
-void CTPostMarketRAMPlugin::ReloadAllFromIniFile()
-	{
-	// Set the file to be read, based on the Id of the plugin
-	
-	_LIT(KFileText, "\\tAuth\\tAuthSvr\\testdata\\Pin");
-	_LIT(KFileSuffix, "Db.ini");					
-	_LIT(KFormatFileName,"%S%x%S");
-	
-	TDriveUnit sysDrive (RFs::GetSystemDrive());
-	TBuf<64> fileText(sysDrive.Name());
-	fileText.Append(KFileText);
-	iFileToRead.Format(KFormatFileName,&fileText, Id(), &KFileSuffix);
-
-	//Read data from file to get initialisation information
-	
-	// Open and read in INI file
-	// Default path to look for INI file is in 'c:\system\data' 
-	// on target filesystem
-	
-	CIniData* file=NULL;
-	TRAPD(r,file=CIniData::NewL(iFileToRead));
-	
-	//Put file on the cleanupstack if anything else in this function is going to leave, but nothing does.	
-	
-	if(r!=KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &iFileToRead);
-		}
-	
-	else
-		{
-		// Look for a key under a named section, retrieve text value	
-		TPtrC result;		
-		TBool ret;	//return value from FindVar functions
-		ret=file->FindVar(_L("SectionOne"),_L("iSupportsDefaultData"),result);
-		if(!ret)
-			{
-			RDebug::Print(_L("Key or section not found. iSupportsDefaultData default value used."));
-			iSupportsDefaultData = ETrue;	// Default value
-			}
-		else
-			{
-			_LIT(KFalse,"false");
-			// Create a lower case copy of the data that is read from the file
-			TBuf<10> resultLowerCase;			
-			resultLowerCase.Copy(result);
-			resultLowerCase.LowerCase();
-			iSupportsDefaultData = (resultLowerCase.FindF(KFalse) == KErrNotFound);
-			}		
-				
-		// Set the active state of the plugin depending on the contents of the 
-		// corresponding file, which has been set as a member variable
-		ret =file->FindVar(_L("SectionOne"),_L("activeState"),result);
-		if(!ret)
-			{
-			RDebug::Print(_L("Key or section not found. iActiveState default value of ETRUE used."));			
-			iActiveState = ETrue;	// Default value
-			}
-		else
-			{
-			_LIT(KFalse,"false");
-			// Create a lower case copy of the data that is read from the file
-			TBuf<10> resultLowerCase;			
-			resultLowerCase.Copy(result);
-			resultLowerCase.LowerCase();
-			
-			// If the string 'false' was not found, we set the value to 'true' -the default value
-			iActiveState = (resultLowerCase.FindF(KFalse) == KErrNotFound);
-			}
-		TRAPD(r,file->WriteToFileL());
-		
-		if (KErrNone != r)
-			{
-			RDebug::Print(_L("Error occurred while writing to the file."));
-			TBuf<84> initInfoFile(sysDrive.Name());
-			initInfoFile.Append(KInitInfoFile);
-			RDebug::Print(_L("Filename = %S, KeyName = iSupportsDefaultData,"), &initInfoFile);
-			RDebug::Print(_L("value = %S."), &result);
-			}
-		
-		delete file;
-		TRAP(r,file=CIniData::NewL(KAuthSvrPolicyFile));
-		TPtrC displayMessage;
-		ret=file->FindVar(_L("SectionOne"),_L("DisplayMessage"),displayMessage);
-		if(displayMessage.Length() == 0)   //Value = 0
-			{
-			RDebug::Print(_L("DisplayMessage not passed."));
-			iClientMessage = iClientMessage->ReAllocL(0);	// Default value
-			TPtr ptr(iClientMessage->Des());
-			ptr = KNullDesC();
-			ret=file->SetValue(_L("SectionOne"),_L("DisplayMessage"),displayMessage);
-			TRAP(r,file->WriteToFileL());
-			}
-		else
-			{
-			iClientMessage = iClientMessage->ReAllocL(displayMessage.Length());
-			TPtr ptr(iClientMessage->Des());
-			ptr = displayMessage;
-			ret=file->SetValue(_L("SectionOne"),_L("DisplayMessage"),displayMessage);
-			TRAP(r,file->WriteToFileL());
-			}
-		delete file;
-		}
-			
-	}
-
-void CTPostMarketRAMPlugin::ReloadActiveStateFromIniFile() const
-	{
-	// Set the file to be read, based on the Id of the plugin
-	
-	_LIT(KFileText, "\\tAuth\\tAuthSvr\\testdata\\Pin");
-	_LIT(KFileSuffix, "Db.ini");
-	
-	_LIT(KFormatFileName,"%S%x%S");
-	
-	TDriveUnit sysDrive (RFs::GetSystemDrive());
-	TBuf<64> fileText(sysDrive.Name());
-	fileText.Append(KFileText);
-	iFileToRead.Format(KFormatFileName,&fileText, Id(), &KFileSuffix);
-
-	//Read data from file to get initialisation information
-	
-	// Open and read in INI file
-	// Default path to look for INI file is in 'c:\system\data' 
-	// on target filesystem
-	
-	CIniData* file=NULL;
-	TRAPD(r,file=CIniData::NewL(iFileToRead));
-	
-	//Put file on the cleanupstack if anything else in this function is going to leave, but nothing does.	
-	
-	if(r!=KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &iFileToRead);
-		}
-	
-	else
-		{
-		// Look for a key under a named section, retrieve text value	
-		TPtrC result;		
-		TBool ret=EFalse;	//return value from FindVar functions
-
-		// Set the active state of the plugin depending on the contents of the 
-		// corresponding file, which has been set as a member variable
-		ret =file->FindVar(_L("SectionOne"),_L("activeState"),result);
-		if(!ret)
-			{
-			RDebug::Print(_L("Key or section not found. iActiveState default value of ETRUE used."));			
-			iActiveState = ETrue;	// Default value
-			}
-		else
-			{
-			_LIT(KFalse,"false");
-			// Create a lower case copy of the data that is read from the file
-			TBuf<10> resultLowerCase;
-			resultLowerCase.Copy(result);
-			resultLowerCase.LowerCase();
-			if (resultLowerCase.FindF(KFalse) == KErrNotFound) 
-				iActiveState = ETrue;	// The string 'false' was not found, so we set the value to 'true' -the default value
-			else
-				iActiveState = EFalse;
-			}
-		TRAPD(r,file->WriteToFileL());
-		
-		if (KErrNone != r)
-			{
-			RDebug::Print(_L("Error occurred while writing to the file."));
-			TBuf<84> initInfoFile(sysDrive.Name());
-			initInfoFile.Append(KInitInfoFile);
-			RDebug::Print(_L("Filename = %S, KeyName = activeState,"), &initInfoFile);
-			RDebug::Print(_L("value = %S."), &result);
-			}
-		delete file;
-		}
-	}
-
-
-	
-//Implement CAuthPluginInterface definitions
-
-/**
- Normally, this would ask the user to input a 4-digit pin and then compare it to 
- the values that this plugin has been trained with. The result should be the 
- user that this PIN corresponds to.
- 'aResult' should be the 'hash' of the stored PIN (which corresponds to the freshly entered PIN)
- but in this case, it's returned as it was 'unhashed'.
-*/
-
-void CTPostMarketRAMPlugin::Identify(TIdentityId& aId, const TDesC& aClientMessage,
-							   HBufC8*& aResult, TRequestStatus& aRequest)
-	{
-	ASSERT(IsActive());
-	
-	// We are simulating user input by reading from a file
-	// (The data contained in this file has been freshly written by the 'client part in TestExecute')
-	
-	if(aClientMessage != *ClientMessage())
-		{
-		TRequestStatus* status  = &aRequest;
-		User::RequestComplete(status, KErrGeneral);
-		RDebug::Print(_L("Display String Mismatch !!! ABORTING WITH KERRGENERAL"));
-		return;	
-		}
-	else
-		{
-		RDebug::Print(_L("Display String at the plugin matches the string sent !! "));
-		}
-	aRequest = KRequestPending;
-		
-	TBuf8<32> userInput;
-	TRAPD(result1, IdReadUserInput(userInput));	//Get the data from the AuthSvrPolicy.ini file
-	if (KErrNone != result1)
-		{
-		aRequest = result1;
-		}
-	else
-		{
-		// No errors, carry on					
-		//Convert the 8-bit string to a 16-bit string for printing in RDebug
-		HBufC* buf = 0;
-		buf = HBufC::New(32);
-		buf->Des().Copy(userInput);
-		_LIT(KMsgDebug1,"Identifying Userinput read from file = %S");    		
-		RDebug::Print(KMsgDebug1, buf);
-		delete buf;	//Memory cleanup. This string was only needed for the above Print function
-			
-		// Possibly, to allow for the cancellation or quitting, allow that to be the input string
-		_LIT8(KCancelText, "Cancel");	
-		_LIT8(KQuitText, "Quit");	
-		if (userInput == KCancelText)
-			{
-			TRequestStatus* status  = &aRequest;
-			User::RequestComplete(status, KErrAuthServPluginCancelled);
-			//aResult will not be updated, as specified
-			}
-		else if (userInput == KQuitText)
-			{
-			TRequestStatus* status  = &aRequest;
-			User::RequestComplete(status, KErrAuthServPluginQuit);
-			//aResult will not be updated, as specified
-			}
-		else
-			{
-			//compare with the known set of inputs and see if this is one of them.	
-			TInt result2 = CheckForStringPresence(aId, userInput, aRequest);
-			if (KErrNone == result2)	//The above function did not leave
-				{
-				//See if the string was found.
-				TInt length = userInput.Length();
-				
-				aResult = HBufC8::New(length);	
-				aResult->Des().Format(_L8("%S"), &userInput);
-				
-				RDebug::Printf("aResult has been updated. aResult = %S, userInput = %S", 
-									aResult, &userInput);
-				TRequestStatus* status  = &aRequest;
-				User::RequestComplete(status, result2);
-			
-				//Note: aRequest has been updated by the CheckForStringPresence function				
-				}
-			else if (KErrNotFound == result2)
-				{
-				RDebug::Printf("The data that the user input was not found (recognized)"
-								"Error = %d", result2);
-				
-				TRequestStatus* status  = &aRequest;
-				aId = KUnknownIdentity;
-				User::RequestComplete(status, KErrNone);
-				}			
-			else
-				{
-				//Caters for file access errors etc
-				RDebug::Printf("Error occurred while checking for the presence of the string"
-								"in the list. Error = %d", result2);
-				
-				TRequestStatus* status  = &aRequest;
-				aId = KUnknownIdentity;
-				User::RequestComplete(status, KErrNone);
-				}
-			}
-			//End of 'else' where the user did not cancel or quit the 'identify' process
-		}		
-	}
-	
-void CTPostMarketRAMPlugin::Cancel()
-	{		
-	}
-
-void CTPostMarketRAMPlugin::Train(TIdentityId aId, HBufC8*& aResult, TRequestStatus& aRequest)
-	{
-	
-	//Accept user input and update the list of inputs along with IDs.
-	
-ASSERT(IsActive());
-	
-	aRequest = KRequestPending;
-	//TInt result = KErrNone;
-	
-	TBuf8<32> userInput;
-	TRAPD(result1, TrainReadUserInput(userInput));
-	if (KErrNone != result1)
-		{
-		_LIT(KMsgDebug2,"Training Userinput read Error: result = %d");    
-		RDebug::Print(KMsgDebug2, result1);
-		}
-	else
-		{
-		// No errors, carry on		
-		//Convert the 8-bit string to a 16-bit string for printing in RDebug
-		HBufC* buf = 0;
-		buf = HBufC::New(32);
-		buf->Des().Copy(userInput);
-		_LIT(KMsgDebug3, "Training Userinput read from file = %S");
-		RDebug::Print(KMsgDebug3, buf);
-		delete buf;	//Memory cleanup. This string was only needed for the above Print function			
-		
-		// To allow for the cancellation or quitting, allow that to be the input string
-		TRequestStatus aRequest2 = KRequestPending;
-		_LIT8(KCancelText, "Cancel");
-		_LIT8(KQuitText, "Quit");
-		userInput.Trim();		
-		if (userInput.CompareF(KCancelText) == 0)
-			{ aRequest2 = KErrAuthServPluginCancelled; }		
-		else if (userInput.CompareF(KQuitText) == 0)
-			{ aRequest2 = KErrAuthServPluginQuit; }
-		else
-			{
-			//compare with the present set of inputs and see if this is one of them.
-			// update this list with this new user input, tagged to the aId
-			TRAPD(result2, CheckForNewStringPresenceL(aId, userInput, aRequest2));			
-			if (KErrNone != result2)
-				{
-				_LIT(KMsgDebug4, "Training Userinput read Error: results = %d");    
-				RDebug::Print(KMsgDebug4, result2);
-				}
-			else if(KErrNone == aRequest2.Int())
-				{
-				// No errors, update aResult.
-				// First allocate space for it since this variable will always be a 
-				// null pointer coming into this function
-				
-				aResult = HBufC8::New(userInput.Size());									
-				*aResult = userInput;
-				aRequest2 = KErrNone;
-				}			
-			else
-				{
-				_LIT(KMsgDebug5, "Error occurred during training. aRequest.Int() = %d");
-				RDebug::Print(KMsgDebug5, aRequest2.Int());
-				//aResult is not updated, nor is aId				
-				}
-			}
-		// Complete the asynchronous function
-		TRequestStatus* status  = &aRequest;
-		User::RequestComplete(status, aRequest2.Int());
-		}
-	}
-
-TBool CTPostMarketRAMPlugin::IsActive () const
-	{
-	// There is never any user intervention required
-	//return true;
-	// As a future development note, this value may be read from a file (or a section in a file)
-	
-	ReloadActiveStateFromIniFile();
-	return iActiveState;
-	}
-	
-TInt CTPostMarketRAMPlugin::Forget(TIdentityId aId)
-	{
-	// Open the list of userInputs that have been stored by this plugin
-	// Then find the one that corresponds to this id
-	// Then remove this string from the list and return the correct status value
-	
-	//Open the file
-	TRAPD(result3, FindStringAndRemoveL(aId));
-	return result3;
-			
-	}
-	
-TInt CTPostMarketRAMPlugin::DefaultData(TIdentityId aId, HBufC8*& aOutputBuf)
-	{
-	
-	// This implementation of the PIN plugin does support default data.
-	// There will be cases where i don't want this available. Hence the addition of a 
-	// new class member iSupportsDefaultData
-	ReloadAllFromIniFile();
-	
-	TInt result = KErrNotSupported;
-	TRequestStatus aRequest2 = KRequestPending;
-	
-	if (iSupportsDefaultData)	//Class member initialised in the constructor
-		{
-		TBufC8<16> defaultBuf(KDefaultData);
-		//compare with the present set of inputs and see if this is one of them.
-		// update this list with this new user input, tagged to the aId
-		TRAPD(result2, CheckForNewStringPresenceL(aId, defaultBuf, aRequest2));			
-		if (KErrNone != result2)
-			{
-			_LIT(KMsgDebug4, "Training Userinput read Error: results = %d");    
-			RDebug::Print(KMsgDebug4, result2);
-			}
-		else if(KErrNone == aRequest2.Int())
-			{
-			// No errors, update aOutputBuf.
-			// First allocate space for it since this variable will always be a 
-			// null pointer coming into this function				
-			
-			TRAPD(resAlloc, (aOutputBuf = HBufC8::NewL(KDefaultData().Size())) );
-			if (KErrNone != resAlloc)
-				{
-				_LIT(KMsgAllocFailed2,"Failed to allocate memory for updating aOutputBuf");
-				RDebug::Print(KMsgAllocFailed2);
-				result = resAlloc;
-				}
-			else
-				{
-				*aOutputBuf = KDefaultData;
-				result = KErrNone;				
-				}
-			}			
-		else
-			{
-			_LIT(KMsgDebug5, "Error occurred during training. aRequest2.Int() = %d");
-			RDebug::Print(KMsgDebug5, aRequest2.Int());
-			//aOutputBuf is not updated, nor is aId				
-			}
-		}
-		
-	return result;	
-	}
-//--------------------------------------------------------------------------------
-
-/**
- Utility method to capture the data that the user has input 
- (in the form of data stored in a file)
-*/
-TInt CTPostMarketRAMPlugin::IdReadUserInput(TBuf8<32>& aInputValue)
-	{
-
-	TInt retValue;
-	CIniData* file=NULL;
-	TRAPD(r,file=CIniData::NewL(iFileToRead));
-	if(r!=KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &iFileToRead);
-		retValue = r;
-		}
-	
-	else
-		{
-		// Look for a key under a named section, retrieve text value	
-		TPtrC result;		
-		TBool ret=EFalse;	//return value from FindVar functions
-		
-		ret=file->FindVar(_L("SectionOne"),_L("IdEnteredPinValue"),result);
-		if(!ret)
-			{
-			RDebug::Print(_L("Unable to find the key in the file %S. IdEnteredPinValue is not known, 9999 used. Error = %d"), &iFileToRead, ret);
-			_LIT8(KEnteredPinValueErr, "9999");
-			aInputValue = KEnteredPinValueErr;	// Default value
-			retValue = KErrNotFound;						
-			}
-		else
-			{
-			//Later,include a check to ensure that only digits were entered
-			aInputValue.Copy(result);
-			aInputValue.Trim();			
-			retValue = KErrNone;	//Not necessary
-			}
-		delete file;	//memory cleanup
-		}
-	
-	return retValue;
-	}
-
-TInt CTPostMarketRAMPlugin::TrainReadUserInput(TBuf8<32>& aInputValue)
-	{
-
-	TInt retValue;
-	CIniData* file=NULL;
-	TRAPD(r,file=CIniData::NewL(iFileToRead));
-	if(r!=KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &iFileToRead);
-		retValue = r;
-		}
-	
-	else
-		{
-		// Look for a key under a named section, retrieve text value	
-		TPtrC result;		
-		TBool ret=EFalse;	//return value from FindVar functions
-		
-		ret=file->FindVar(_L("SectionOne"),_L("TrainEnteredPinValue"),result);
-		if(!ret)
-			{
-			RDebug::Print(_L("Unable to find the key in the file %S. TrainEnteredPinValue is not known, 9999 used. Error = %d"), &iFileToRead, ret);
-			_LIT8(KEnteredPinValueErr, "9999");
-			aInputValue = KEnteredPinValueErr;	// Default value
-			retValue = KErrNotFound;						
-			}
-		else
-			{
-   			aInputValue.Copy(result);
-			aInputValue.Trim();
-			retValue = KErrNone;	//Not necessary
-			}
-		delete file;	//memory cleanup
-		}
-	
-	return retValue;
-	}
-
-TInt CTPostMarketRAMPlugin::Reset(TIdentityId/* aId*/, const TDesC&/* aRegistrationData*/, HBufC8*&/* aResult*/)
-	{
-	return KErrNotSupported;
-	}
-
-/**
- Utility method to compare the data that the user has input 
- with all the data that has been stored for users 
- Called by Identify()
- @return - success or failure value
-*/
-TInt CTPostMarketRAMPlugin::CheckForStringPresence(TIdentityId& aId, TBuf8<32> aInputValue, TRequestStatus& aRequestValue)
-	{
-
-	TInt retValue = KErrNone;	
-	// First format the aInputValue string so that it starts with a ':' and ends with a ','.
-	_LIT8(KFormatValue2, ":%S,");
-	TBuf8<32> aInputValue2;
-	aInputValue2.Format(KFormatValue2, &aInputValue);
-
-	//Convert the 8-bit string to a 16-bit string for printing in RDebug
-	HBufC* buf = 0;
-	buf = HBufC::New(32);
-	buf->Des().Copy(aInputValue);		
-	RDebug::Print(_L("Formatted string: %S"), buf);
-	delete buf;	//Memory cleanup. This string was only needed for the above Print function
-
-	TBuf8<500> pinFileContents1, pinFileContents2;
-	// Read the contents of the file that contains all the ID/PIN combinations
-
-	CIniData* file=NULL;
-	TRAPD(r,file=CIniData::NewL(iFileToRead));
-	if(r!=KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &iFileToRead);
-		retValue = r;
-		}	
-	else
-		{
-		// Look for a key under a named section, retrieve text value	
-		TPtrC result;		
-		TBool ret=EFalse;	//return value from FindVar functions
-		
-		ret=file->FindVar(_L("SectionOne"),_L("Identity&PinValues"),result);
-		if(!ret)
-			{
-			RDebug::Print(_L("Unable to find the Identity&PinValues key in the file %S."), &iFileToRead);
-			retValue = KErrNotFound;
-			aRequestValue =KErrNotFound;
-			}
-		else
-			{
-			pinFileContents1.Copy(result);	
-			
-			TInt searchResult;
-			searchResult = pinFileContents1.Find(aInputValue2);
-			
-			if (KErrNotFound == searchResult)
-				{
-				RDebug::Print(_L("Userinput not found in the pinFile %S. Identification error"), &iFileToRead);
-				aRequestValue= KErrAuthServIdentityNotFound;
-				retValue  = searchResult;
-				}
-			else if (searchResult)	// a positive value
-				{				
-				// Now find the userID by searching back through the string for the "," marker				
-				pinFileContents2 = pinFileContents1.Left(searchResult);
-				TInt userIdStartPos = pinFileContents2.LocateReverse(',');
-								 
-				//Extract this userId for use by the calling function
-				TBuf8<50> p1 = pinFileContents2.Right(searchResult - userIdStartPos - 1);
-				TLex8 input (p1);
-				TRadix aRadix = EDecimal;
-				input.Val(aId, aRadix);
-				RDebug::Print(_L("UserId that is stored = %u"), aId);
-				aRequestValue = KErrNone;
-				retValue = KErrNone;
-				}				
-			else
-				{
-				RDebug::Print(_L("Unexpected error in the 'Find' function. Searchresult = %d"), searchResult);
-				aRequestValue = searchResult;
-				retValue = searchResult;				
-				}//End check for key&section search in file				
-			}//End check for safe file access
-		delete file;
-		}
-	
-	return retValue;
-	}
-
-/**
- Utility method to compare the data that the user has input 
- with all the data that has been stored for users 
- Used to find out if the input is unique. 
- -since KIdAmbiguous is no longer used, KIdCancel will be returned if the input is non-unique
- Called by Train() and DefaultData()
-*/
-TInt CTPostMarketRAMPlugin::CheckForNewStringPresenceL(TIdentityId aId, TBuf8<32> aInputValue, TRequestStatus& aRequestValue)
-	{	
-	TBuf8<500> pinFileContents, pinFileContents2;
-	TInt retValue = KErrNone;
-
-	CIniData* file=NULL;
-	TRAPD(r,file=CIniData::NewL(iFileToRead));
-		
-	if(r!=KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &iFileToRead);
-		return r;
-		}	
-	
-	// Look for a key under a named section, retrieve text value	
-	TPtrC result;		
-	TBool ret=EFalse;	//return value from FindVar functions
-	aRequestValue = KErrAuthServIdentityNotFound;	//Initialisation		
-			
-	ret=file->FindVar(KPluginIniSection, KPinDbTag,result);
-	if(!ret)
-		{
-		RDebug::Print(_L("Unable to find the %S key in the file %S."), &KPinDbTag, &iFileToRead);
-		delete file;
-		return KErrNotFound;			
-		}
-	
-	//Copy the data from the named section in the file, and see if any previous user has used this input string
-	pinFileContents.Copy(result);			
-	
-	TInt searchResultPin;
-	TBuf8<50> searchStringPin;
-	_LIT8(KFormat3, ":%S,");
-	searchStringPin.Format(KFormat3, &aInputValue);
-	searchResultPin = pinFileContents.Find(searchStringPin);
-				
-	if (KErrNotFound == searchResultPin)
-		{				
-		//check that the identity is unique, if so, update the Db 
-		// with the new Id-PIN pair, as is done already
-		// else update the PIN only, ie training data for that identity
-		TInt searchResultId;
-		TBuf8<50> searchStringId;
-		_LIT8(KFormat4, ",%u:");
-		searchStringId.Format(KFormat4, aId);
-		
-		searchResultId = pinFileContents.Find(searchStringId);
-		
-		TDriveUnit sysDrive (RFs::GetSystemDrive());
-		TBuf<80> policyFile;
-		if (KErrNotFound == searchResultId)
-			{									
-			// Add this entry to the file
-			// This is a simple system, expecting a format as below:
-			// ",aId:inputPin,aId:inputPin,aId:inputPin,"				
-			
-			_LIT8(KFormat2, "%S%u:%S,");
-			if (pinFileContents.Size() == 0)
-				{
-				pinFileContents.Append(',');	//Initialisation
-				}
-			pinFileContents2.Format(KFormat2, &pinFileContents, aId, &aInputValue);				
-										
-			//For the purpose of writing the data to a file, i'll create a 16-bit version of pinFileContents
-			TInt ret2 = 0;
-			HBufC* buf = 0;
-			buf = HBufC::NewL(pinFileContents2.Length());
-			buf->Des().Copy(pinFileContents2);												
-			ret2 = file->SetValue(_L("SectionOne"),_L("Identity&PinValues"), *buf);
-			
-			TRAPD(r,file->WriteToFileL());
-			
-						
-			if (KErrNone != r)
-				{
-				policyFile.Copy(sysDrive.Name());
-				policyFile.Append(KPolicyFile);
-				RDebug::Print(_L("Error occurred while writing to the file. Filename = %S, KeyName = AllUserID&PinValues, value = %S."), &policyFile, buf);
-				}
-			delete buf;		//Memory cleanup. This string was only needed for the above Print function
-			
-			if(KErrNone == ret2)
-				{				
-				aRequestValue = KErrNone;
-				
-				//Update the global database
-				AddToGlobalDb(aId, aInputValue);
-				}
-			else
-				{
-				RDebug::Print(_L("Error occurred while writing data to file. Error = %d"), ret2);					
-				aRequestValue = ret2;
-				}
-			
-			}
-
-		else
-			{
-			//The Identity has already been trained with this plugin, 
-			// update the PIN (training data)
-			
-			//extract the string to the right of the end of the aId
-			pinFileContents2 = pinFileContents.Mid(searchResultId + searchStringId.Size());
-			
-			//Find the end of the PIN (Training data)
-			_LIT8(KPinEndMarker, ",");
-			TBufC8<5> bufPinEndMarker(KPinEndMarker);					
-			TInt pinEndPos = pinFileContents2.Find(bufPinEndMarker);
-			
-			//Replace this with the new PIN
-			pinFileContents.Replace((searchResultId + searchStringId.Size()),
-									 pinEndPos, aInputValue);	
-			
-			//For the purpose of writing the data to a file, i'll create a 16-bit version of pinFileContents
-			TInt ret2 = 0;
-			HBufC* buf = 0;
-			buf = HBufC::NewL(pinFileContents.Length());
-			buf->Des().Copy(pinFileContents);
-								
-			ret2 = file->SetValue(_L("SectionOne"),_L("Identity&PinValues"), *buf);
-			
-			TRAPD(r,file->WriteToFileL());
-			
-			if (KErrNone != r)
-				{
-				policyFile.Copy(sysDrive.Name());
-				policyFile.Append(KPolicyFile);
-				RDebug::Print(_L("Error occurred while writing to the file. Filename = %S, KeyName = AllUserID&PinValues, value = %S."), &policyFile, buf);
-				}
-			delete buf;		//Memory cleanup. This string was only needed for the above Print function
-			
-			if(KErrNone ==ret2)
-				{				
-				aRequestValue = KErrNone;
-				
-				//Update the global database
-				AddToGlobalDb(aId, aInputValue);
-				}
-			else
-				{
-				RDebug::Print(_L("Error occurred while writing data to file. Error = %d"), ret2);					
-				aRequestValue = ret2;
-				}
-			}
-		delete file;
-		return ret;
-		}
-	if (searchResultPin)	// a positive value
-		{
-		// A user has already tried to train this plugin using the given data.
-		// The pinFileContents are not updated, to avoid duplication
-		
-		aRequestValue = KErrAuthServPluginCancelled;
-		delete file;
-		return searchResultPin;
-		}	
-	
-	RDebug::Print(_L("Unexpected error in the 'Find' function. SearchresultPin = %d"), searchResultPin);
-	retValue = searchResultPin;
-
-	delete file;
-		
-	return retValue;
-	}
-
-	
-/**
- Utility function to remove the training data that is associated with a given Id
- Called by the Forget function
- @return - KIdSuccess, KIdUnknown or some error code  
- */ 
-TInt CTPostMarketRAMPlugin::FindStringAndRemoveL (TIdentityId aId)
-	{
-	TBuf8<500> pinFileContents, pinFileContents2;
-	TInt retValue = KErrAuthServNoSuchIdentity;		//init
-	CIniData* file=NULL;
-	//First read the list of userId and PIN combinations from a file
-	TRAPD(r,file=CIniData::NewL(iFileToRead));
-	if(r!=KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &iFileToRead);
-		retValue = r;
-		}	
-	else
-		{
-		// Look for a key under a named section, retrieve text value	
-		TPtrC result;		
-		TBool ret=EFalse;	//return value from FindVar functions
-				
-		ret=file->FindVar(KPluginIniSection, KPinDbTag,result);
-		if(!ret)
-			{
-			RDebug::Print(_L("Config error: Unable to find the %S key in the file %S."), &KPinDbTag, &iFileToRead);
-			retValue = KErrNotFound;						
-			}
-		else
-			{
-			//Copy the data from the named section in the file, and see if any previous user has used this input string
-			pinFileContents.Copy(result);				
-			
-			//Format the searchstring as defined in the file so that it starts with a ',' and ends with a ':'.
-			_LIT8(KFormatValue3, ",%u:");			
-			
-			TBuf8<32> searchString;
-			searchString.Format(KFormatValue3, aId);
-
-			//For the purpose of printing the data to a file, i'll create a 16-bit version of pinFileContents
-			HBufC* buf = 0;
-			buf = HBufC::NewL(searchString.Length());
-			buf->Des().Copy(searchString);
-			RDebug::Print(_L("Formatted searchString used in 'FindStringAndRemove(): %S"), buf);
-			delete buf;
-
-			TInt userIdStartPos;	//The offset of the searchString within pinFileContents
-									//i.e the position of the '.' just before the identityId
-			userIdStartPos = pinFileContents.Find(searchString);
-			if (KErrNotFound == userIdStartPos)
-				{
-				RDebug::Print(_L("FindStringAndRemoveL: The specified ID was not found in the pinFile"));
-				retValue = KErrAuthServNoSuchIdentity;	//KIdUnknown;
-				}
-			else
-				{
-				
-				//Find where the string (including PIN) ends
-				TLex8 aLex = TLex8(pinFileContents);
-				TInt length(0);
-				aLex.Inc(userIdStartPos+1);
-				while(aLex.Peek() != ',') 
-					{
-					aLex.Inc();
-					length++;
-					}
-	
-				//remove the found (total) string from the list (including the starting ',')
-				pinFileContents.Delete(userIdStartPos,length+1);
-				
-				//Update the file
-				//For the purpose of writing the data to a file, i'll create a 16-bit version of pinFileContents
-				TInt ret2 = 0;
-				HBufC* buf;
-				buf = HBufC::NewL(pinFileContents.Length());	
-				buf->Des().Copy(pinFileContents);
-								
-				ret2 = file->SetValue(KPluginIniSection, KPinDbTag, *buf);
-				
-				TRAPD(r,file->WriteToFileL());
-				TDriveUnit sysDrive (RFs::GetSystemDrive());
-				TBuf<2> sysDriveName (sysDrive.Name());
-				TBuf<84> policyFile;
-								
-				if (KErrNone != r)
-					{
-					policyFile.Copy(sysDriveName);
-					policyFile.Append(KPolicyFile);
-					RDebug::Print(_L("Error occurred while writing to the file. Filename = %S, KeyName = AllUserID&PinValues, value = %S."), &policyFile, buf);
-					}
-				delete buf;		//Memory cleanup. This string was only needed for the above Print function
-				
-				if (KErrNone !=ret2)
-					{
-					policyFile .Copy(sysDriveName);
-					policyFile.Append(KAuthSvrPolicyFile);
-					RDebug::Print(_L("Error occurred in WriteToFileL(). Error = %d. Filename= %S"), ret2, &policyFile);
-					retValue = ret2;
-					}
-				else
-					{
-					retValue = KErrNone;		
-					}				
-				}			
-			}//End check for key&section search in file
-		delete file;
-		}//End check for safe file access
-	
-	return retValue;
-	}
-
-
-/**
- Utility function to Update the Global Db with the training data 
- that is associated with a given Id. The update will not happen if 
- the identity is already present in this list, i.e. it's been pu in 
- by another plugin
- Called by the CheckForNewStringPresence function
- @return - KErrNone, or some error code
-*/
-TInt CTPostMarketRAMPlugin::AddToGlobalDb (TIdentityId aId, TBuf8<32> aInputValue)
-	{
-	
-	TBuf8<500> totalDbFileContents, totalDbFileContents2;
-	TInt retValue = KErrNone;
-	CIniData* file=NULL;
-	
-	TDriveUnit sysDrive (RFs::GetSystemDrive());
-	TDriveName sysDriveName (sysDrive.Name());
-	TBuf<128> authSvrPolicyFile(sysDriveName);
-	authSvrPolicyFile.Append(KAuthSvrPolicyFile);
-	
-	TRAPD(r,file=CIniData::NewL(authSvrPolicyFile));	
-	if(r!=KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &authSvrPolicyFile);
-		retValue = r;
-		}	
-	else
-		{
-		// Look for a key under a named section, retrieve text value	
-		TPtrC result;		
-		TBool ret=EFalse;	//return value from FindVar functions		
-				
-		ret=file->FindVar(KPluginIniSection, KTotalDbTag,result);
-		if(!ret)
-			{
-			RDebug::Print(_L("Unable to find the %S key in the file %S."), &KTotalDbTag, &authSvrPolicyFile);
-			retValue = KErrNotFound;		
-			}
-		else
-			{
-			//Copy the data from the named section in the file, and see if any previous user has used this input string
-			totalDbFileContents.Copy(result);
-			TBuf8<20> aidString;
-			aidString.Num(aId, EDecimal);			
-			TInt searchResult;			
-			searchResult = totalDbFileContents.Find(aidString);
-			
-			if (KErrNotFound == searchResult)
-				{
-				// Add this entry to the file
-				// This is a simple system, expecting a format as below:
-				// ",aId:inputPin,aId:inputPin,aId:inputPin,"				
-				_LIT8(KFormat2, "%S%u:%S,");
-				if (totalDbFileContents.Size() == 0)
-					{					
-					totalDbFileContents.Append(',');	//Initialisation
-					}
-				totalDbFileContents2.Format(KFormat2, &totalDbFileContents, aId, &aInputValue);				
-					
-				//For the purpose of writing the data to a file, i'll create a 16-bit version of pinFileContents
-				TInt ret2 = 0;
-				HBufC* buf = 0;
-				buf = HBufC::New(totalDbFileContents2.Length());
-				buf->Des().Copy(totalDbFileContents2);								
-				ret2 = file->SetValue(KPluginIniSection, KTotalDbTag, *buf);
-				
-				TRAPD(r,file->WriteToFileL());
-									
-				if (KErrNone != r)
-					{
-					TBuf<80> policyFile(sysDriveName);
-					policyFile.Append(KPolicyFile);
-					RDebug::Print(_L("Error occurred while writing to the file. Filename = %S, KeyName = AllUserID&PinValues, value = %S."), &policyFile, buf);
-					}
-				delete buf;		//Memory cleanup. This string was only needed for the above Print function
-				
-				if (KErrNone !=ret2)
-					{
-					RDebug::Print(_L("Error occurred in SetValue(). Error = %d. Filename= %S"), ret2, &authSvrPolicyFile);
-					retValue = ret2;
-					}
-				}
-			else
-				{
-				// A user has already tried to train this plugin using the given data.
-				// The pinFileContents are not updated, to avoid duplication				
-				retValue = KErrNone;													
-				}//End aidString search in the totalDbFileContents string (Find())
-			}//End check for key&section search in file (FindVar())
-			delete file;
-		}//End check for safe file access
-	return retValue;
-	}
-
-const HBufC* CTPostMarketRAMPlugin::ClientMessage()
-	{
-	return iClientMessage;
-	}
-
-const TPtrC& CTPostMarketRAMPlugin::Name() const
-  {
-  return iName;
-  }
-const TPtrC& CTPostMarketRAMPlugin::Description() const
-  {
-  return iDescription;
-  }
-AuthServer::TAuthPluginType CTPostMarketRAMPlugin::Type() const 
-  {
-  return iType;
-  }
-
-AuthServer::TEntropy CTPostMarketRAMPlugin::MinEntropy() const
-  {
-  return iMinEntropy;
-  }
-
-AuthServer::TPercentage CTPostMarketRAMPlugin::FalsePositiveRate() const
-  {
-  return iFalsePositiveRate;
-  }
-
-AuthServer::TPercentage CTPostMarketRAMPlugin::FalseNegativeRate() const
-  {
-  return iFalseNegativeRate;
-  }
-
--- a/authenticationservices/authenticationserver/test/tAuthSvr/tpostmarketplugins/tpostmarketramplugin.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,149 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* CTPostRAMMarketPlugin is a dummy interface implementation for CAuthPluginInterface
-*
-*/
-
-
-
-#ifndef TPOSTMARKETRAMPLUGIN_H
-#define TPOSTMARKETRAMPLUGIN_H
-
-#include "authserver_client.h"
-#include <authserver/authplugininterface.h>
-
-//An implementation of the CAuthPluginInterface definition
-
-using namespace AuthServer;
-	
-//implementation_uid = 0x1023F3F3
-class CTPostMarketRAMPlugin : public CAuthPluginInterface
-	{
-public:
-	// Two phase constructor
-	static CTPostMarketRAMPlugin* NewL();
-	// Destructor
-	virtual ~CTPostMarketRAMPlugin();
-	//Implementation of CAuthPluginInterface definitions using a PIN system
-	virtual void Identify(TIdentityId& aId, const TDesC& aClientMessage, HBufC8*& aResult, TRequestStatus& aRequest);	
-	virtual void Cancel();	
-	virtual void Train(TIdentityId aId, HBufC8*& aResult, TRequestStatus& aRequest);		
-	virtual TBool IsActive() const;
-	virtual TInt Forget(TIdentityId aId);
-	virtual TInt DefaultData(TIdentityId aId, HBufC8*& aOutputBuf);
-	virtual TInt Reset(TIdentityId aId, const TDesC& aRegistrationData, HBufC8*& aResult);
-	virtual TPluginId Id() const = 0;
-	virtual const TPtrC& Name() const;
-	virtual const TPtrC& Description() const;
-	virtual AuthServer::TEntropy MinEntropy() const;
-	virtual AuthServer::TPercentage FalsePositiveRate() const;
-	virtual AuthServer::TPercentage FalseNegativeRate() const;
-	virtual AuthServer::TAuthPluginType Type() const;
-		
-	// Utility functions
-	TInt IdReadUserInput(TBuf8<32>& inputValue);
-	TInt TrainReadUserInput(TBuf8<32>& inputValue);
-	TInt CheckForStringPresence(TIdentityId& aId, TBuf8<32> aInputValue, TRequestStatus& aRequestValue);
-	TInt CheckForNewStringPresenceL(TIdentityId aId, TBuf8<32> aInputValue, TRequestStatus& aRequestValue);
-	TInt FindStringAndRemoveL(TIdentityId aId);
-	TInt AddToGlobalDb (TIdentityId aId, TBuf8<32> aInputValue);
-	TInt RemoveFromGlobalDb (TIdentityId aId);
-	const HBufC* ClientMessage ();
-	
-
-public:
-	mutable TBuf<70> iFileToRead;
-	void ConstructL();
-	CTPostMarketRAMPlugin();
-	void ReloadAllFromIniFile();
-	void ReloadActiveStateFromIniFile() const;
-
-protected:
- 	/// The name of the plugin. Derived classes should set this member.
- 	TPtrC iName;
- 	/// The plugin's description. Derived classes should set this member.
- 	TPtrC iDescription;
- 	/// The minumum entropy provided by the plugin. Derived classes should set
- 	/// this member.
- 	AuthServer::TEntropy iMinEntropy;
- 	/// The false positive rate of the plugin. Derived classes should set this
- 	/// member.
- 	AuthServer::TPercentage iFalsePositiveRate;
- 	/// The false negative rate of the plugin. Derived classes should set this
- 	/// member.
- 	AuthServer::TPercentage iFalseNegativeRate;
-  	/// The type of the plugin. Derived classes should set this member.
- 	AuthServer::TAuthPluginType iType;
-
-private:
-	// Data read from file determining if this plugin supports default data
-	TBool iSupportsDefaultData;
-	mutable TBool iActiveState;
-	HBufC* iClientMessage;
-	};
-
-
-//=========================================================================	
-// The various classes that are spawned from this base class by inheriting the implementations besides
-// the Id() function (Uses the #define macro)
-
-// number is hex, type is one of the TAuthPluginType enums
-// Id() returns the Id of the plugin
-
-
-#define NClass(id,type) class CTPostMarketRAMPlugin##id : public CTPostMarketRAMPlugin\
-	{                                        		\
-public:                                      		\
-	typedef CTPostMarketRAMPlugin##id TMyPinType;	    	\
-	TPluginId Id() const 		               		\
-		{ return 0x##id; }  	               		\
-	static TMyPinType* NewL()                   	\
-    	{										 	\
-        TMyPinType* r = new (ELeave) TMyPinType();	\
-        CleanupStack::PushL(r);						\
-	  	r->ConstructL();						 	\
-	  	CleanupStack::Pop(r);						\
-        r->iType = type;                            \
-	  	return r;                              		\
-		}											\
-	}
-
-NClass(10234100, EAuthKnowledge);
-	
-//=========================================================================		
-
-// Constants used in the utility functions -File locations, etc
-_LIT8(KDefaultData, "0000");
-_LIT(KInitInfoFile, "\\tAuth\\tAuthSvr\\testdata\\initialisation_Info.ini");
-_LIT(KPolicyFile, 	"\\tAuth\\tAuthSvr\\testdata\\AuthSvrPolicy.ini");
-
-_LIT(KPluginNamePin, "PostMarketRAMPlugin");
-_LIT(KPluginDescriptionPin, "Post Market RAM Plugin, a test plugin does nothing.");
-
-static const TInt KEntropyPin = 999;
-static const TInt KFalsePosPin = 100;
-static const TInt KFalseNegPin = 10;
-
-//From Step_Base.cpp
-_LIT(KPluginIniSection,			"SectionOne");
-_LIT(KAuthSvrPolicyFile, 		"\\tAuth\\tAuthSvr\\testdata\\AuthSvrPolicy.ini");
-_LIT(KDefaultPluginTag, 		"DefaultPlugin");
-_LIT(KEnteredPinTag, 			"EnteredPinValue");
-_LIT(KPinDbTag,					"Identity&PinValues");
-_LIT(KTotalDbTag,				"AllUserID&PinValues");
-_LIT(KInitPinDatabaseValue,		",");
-	
-
-#endif	/* TPOSTMARKETRAMPLUGIN_H */
--- a/authenticationservices/authenticationserver/test/tauthcliserv/scripts/tauthcliserv.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,107 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-//! @file
-// authentication client server classes tests
-
-
-// Prepare a clone of TAuthSvr to possess authserver's SID.
-// This is required for modifying the authserver's central repository file.
-// This clone must be deleted at the end of the test.
-
-RUN_PROGRAM 100 SETCAP tAuthSvr.exe 188b0 -SID 102740FC tAuthSvr_new.exe
-
-
-LOAD_SUITE tauthcliserv
-LOAD_SUITE tpinplugin
-LOAD_SUITE tAuthSvr_new
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHCLISVR-0004
-//! @SYMTestCaseDesc	Remove_PinPlugin_Data
-START_TESTCASE SEC-AUT-AUTHCLISVR-0004
-RUN_UTILS DeleteFile C:\pinplugin_inactive.txt
-RUN_TEST_STEP_RESULT 0 100	tAuthSvr_new 	INIT_CENREP c:\tauth\tAuthSvr\scripts\tauthsvr2.ini defaultplugin1
-
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_in.dat
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_out.dat
-END_TESTCASE SEC-AUT-AUTHCLISVR-0004
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHCLISVR-0005
-//! @SYMTestCaseDesc	Initialize_PinPlugin_Data
-START_TESTCASE SEC-AUT-AUTHCLISVR-0005
-RUN_TEST_STEP 100 tpinplugin CreateInputFile c:\tauth\tpinplugin\scripts\tpinplugin.ini datfile
-END_TESTCASE SEC-AUT-AUTHCLISVR-0005
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHCLISVR-0001
-//! @SYMTestCaseDesc	Tests that on first start only the default user in present in the database.
-//! @SYMREQ REQ 4953 
-//! @SYMTestPriority Medium
-//! @SYMTestActions  
-//! @SYMTestExpectedResults All tests pass.
-//! @SYMDevelopedForRelease 
-
-START_TESTCASE SEC-AUT-AUTHCLISVR-0001
-RUN_UTILS MKDIR C:\testplugin_active\
-RUN_TEST_STEP 40 tauthcliserv FIRSTSTART 
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-
-END_TESTCASE SEC-AUT-AUTHCLISVR-0001
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHCLISVR-0002
-//! @SYMTestCaseDesc	Tests that correct list of identities are retrieved from auth server 
-//!						database.
-//!						Expected plugins are listed correctly.
-//!						Authentication of a single and multiple user(s).
-//! @SYMREQ REQ 4948 
-//! @SYMTestPriority Medium
-//! @SYMTestActions  
-//! @SYMTestExpectedResults All tests pass.
-//! @SYMDevelopedForRelease 
-
-START_TESTCASE SEC-AUT-AUTHCLISVR-0002
-RUN_UTILS MKDIR C:\testplugin_active\
-RUN_TEST_STEP 120 tauthcliserv CLIENT 
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-
-END_TESTCASE SEC-AUT-AUTHCLISVR-0002
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHCLISVR-0003
-//! @SYMTestCaseDesc	Tests removal of identity, registration, training and retaining of plugin.
-//! @SYMREQ REQ 4948 
-//! @SYMTestPriority Medium
-//! @SYMTestActions  
-//! @SYMTestExpectedResults All tests pass.
-//! @SYMDevelopedForRelease 
-
-START_TESTCASE SEC-AUT-AUTHCLISVR-0003
-RUN_UTILS MKDIR C:\testplugin_active\
-RUN_TEST_STEP 120 tauthcliserv MGRCLIENT 
-RUN_UTILS DELETEDIRECTORY C:\testplugin_active\
-
-END_TESTCASE SEC-AUT-AUTHCLISVR-0003
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHCLISVR-0006
-//! @SYMTestCaseDesc	Remove_PinPlugin_Data
-START_TESTCASE SEC-AUT-AUTHCLISVR-0006
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_in.dat
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_out.dat
-END_TESTCASE SEC-AUT-AUTHCLISVR-0006
--- a/authenticationservices/authenticationserver/test/tauthcliserv/scripts/tauthcliserv_debug.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,30 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-//! @file
-// authentication db classes tests
-
-LOAD_SUITE tauthcliserv
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHCLISVR-0007
-//! @SYMTestCaseDesc	Authentication db classes test
-START_TESTCASE SEC-AUT-AUTHCLISVR-0007
-RUN_PANIC_STEP_RESULT 64 AUTHEXPR 10 tauthcliserv AuthExprTypePanic
-RUN_PANIC_STEP_RESULT 64 AUTHEXPR 10 tauthcliserv AuthExprTypePanicBadLeft
-RUN_PANIC_STEP_RESULT 64 AUTHEXPR 10 tauthcliserv AuthExprTypePanicBadRight
-END_TESTCASE SEC-AUT-AUTHCLISVR-0007
- 
--- a/authenticationservices/authenticationserver/test/tauthcliserv/scripts/tauthexpr.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,31 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-//! @file
-// authentication client server classes tests
-
-LOAD_SUITE tauthcliserv
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHCLISVR-0008
-//! @SYMTestCaseDesc	Authentication client server classes test
-START_TESTCASE SEC-AUT-AUTHCLISVR-0008
-RUN_TEST_STEP 10 tauthcliserv AuthExprBuild
-RUN_PANIC_STEP_RESULT 3 AuthServer 10 tauthcliserv AuthExprBadAuthExt
-RUN_TEST_STEP 10 tauthcliserv AuthExprHighVer
-RUN_TEST_STEP 300 tauthcliserv AuthExprEval
-END_TESTCASE SEC-AUT-AUTHCLISVR-0008
- 
--- a/authenticationservices/authenticationserver/test/tauthcliserv/step_authexpr_build.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,759 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include <s32mem.h>
-#include "tauthcliservstep.h"
-#include <scs/scsclient.h>
-using namespace AuthServer;
-
-inline void CorruptTypeField(const CAuthExpressionImpl* aExpr)
-/**
-	Corrupt the type field of the supplied
-	expression so the invariant-checking code fails.
-	
-	@param	aExpr			Expression to corrupt.  This
-							is const, even though it is
-							modified, because Left and
-							Right return pointers to const
-							expressions.
- */
-	{
-	// 4 == _FOFF(CAuthExpression, iType), but iType is private
-	// sizeof(CAuthExpression::iType) == 8
-	*(((TUint32*)aExpr) + 2) = ~0;
-	}
-
-
-CTStepAuthExprBuild::CTStepAuthExprBuild()
-/**
-	Record this test step's name.
- */
-	{
-	SetTestStepName(KTStepAuthExprBuild);
-	}
-
-
-TVerdict CTStepAuthExprBuild::doTestStepL()
-/**
-	Implement CTestStep by creating simple and
-	complex expression types.  In debug mode this
-	function also ensures the operations fail
-	cleanly in OOM.
- */
-	{
-	RunTestsL();		// create all expression types
-	TestFailedCombsL();
-	TestCorruptPersistL();
-	
-	// create all expression types in OOM
-#ifdef _DEBUG
-	TInt i = 1;
-	TBool failed = EFalse;
-	
-	do
-		{
-		__UHEAP_SETFAIL(RAllocator::EDeterministic, i);
-		TRAPD(r, RunTestsL());
-		TESTL(r == KErrNone || r == KErrNoMemory);
-		__UHEAP_RESET;
-		
-		failed = (r == KErrNoMemory);
-		++i;
-		} while (failed);
-	
-	// i is now one greater than the last alloc count.
-	// run the tests again, to ensure there really was
-	// enough memory, and this wasn't just an error case
-	// that wasn't handled properly.
-	
-	TInt lim = i * 2;
-	while (i++ < lim)
-		{
-		__UHEAP_SETFAIL(RAllocator::EDeterministic, i);
-		RunTestsL();
-		__UHEAP_RESET;
-		}
-#endif	
-	
-	return EPass;
-	}
-
-
-void CTStepAuthExprBuild::RunTestsL()
-/**
-	Helper function for doTestStepL.  This generates
-	authentication expressions.
-	
-	1. creating simple type and plugin id nodes.
-	2. creating simple AND and OR combinations
-	3. creating complex (multi-level) AND and OR combinations.
- */
-	{
-	TestSimpleExprL();
-	TestSimpleExprCombsConsL();
-	TestComplexExprCombsConsL();
-	}
-
-
-void CTStepAuthExprBuild::TestExprLD(
-	void (CTStepAuthExprBuild::*aTestFuncL)(CAuthExpression*),
-	CAuthExpression* aExpr)
-/**
-	Run the supplied test function on the supplied expression.
-	This function only exists to place the expression on the
-	cleanup stand and delete it afterwards.
-	
-	This function leaves with KErrNoMemory if the supplied
-	expression is NULL.
- */
-	{
-	User::LeaveIfNull(aExpr);
-	
-	CleanupStack::PushL(aExpr);
-	(this->*aTestFuncL)(aExpr);
-	
-	// test externalization and internalization
-	// (this can fail because of OOM.)
-	TSizeStream ss;
-	RWriteStream ws(&ss);
-	aExpr->ExternalizeL(ws);
-	
-	HBufC8* buf = HBufC8::NewLC(ss.Size());
-	TPtr8 bufPtr(buf->Des());	
-	RDesWriteStream dws(bufPtr);
-	aExpr->ExternalizeL(dws);
-	dws.CommitL();
-	
-	RDesReadStream drs(*buf);
-	CAuthExpression* aeRestore = CAuthExpressionImpl::NewL(drs);
-	CleanupStack::PushL(aeRestore);
-	
-	(this->*aTestFuncL)(aExpr);
-	
-	CleanupStack::PopAndDestroy(3, aExpr);
-	}
-
-
-void CTStepAuthExprBuild::TestSimpleExprL()
-/**
-	Test constructing leaf node expressions from
-	a plugin ID and a plugin type.
- */
-	{
-	__UHEAP_MARK;
-	
-	TestExprLD(&CTStepAuthExprBuild::TestPluginIdL, AuthExpr(KTestPluginId0));
-	TestExprLD(&CTStepAuthExprBuild::TestPluginTypeL, AuthExpr(EAuthKnowledge));
-
-	__UHEAP_MARKEND;
-	}
-
-
-void CTStepAuthExprBuild::TestPluginIdL(CAuthExpression* aExpr)
-/**
-	Tests the supplied expression is a simple expression
-	for plugin ID KTestPluginId0.
- */
-	{
-	CAuthExpressionImpl* impl = static_cast<CAuthExpressionImpl*>(aExpr);
-	TESTL(impl->Type() == KPluginId);
-	TESTL(impl->PluginId() == KTestPluginId0);
-	}
-
-
-void CTStepAuthExprBuild::TestPluginTypeL(CAuthExpression* aExpr)
-/**
-	Tests the supplied expression is a simple expression
-	for plugin type EAuthKnowledge.
- */
-	{
-	CAuthExpressionImpl* impl = static_cast<CAuthExpressionImpl*>(aExpr);
-	TESTL(impl->Type() == KPluginType);
-	TESTL(impl->PluginType() == EAuthKnowledge);
-	}
-
-
-void CTStepAuthExprBuild::TestSimpleExprCombsConsL()
-/**
-	Tests combining two simple types (plugin type or plugin id)
-	with the AuthAnd and AuthOr functions, and with the overloaded
-	binary AND (&) and OR (|) operators.
- */
-	{
-	__UHEAP_MARK;
-	
-	// type AND type
-	OpTestExprLD(&CTStepAuthExprBuild::TestTypeAndTypeL, AuthExpr(EAuthKnowledge) & AuthExpr(EAuthBiometric));
-	TestExprLD(&CTStepAuthExprBuild::TestTypeAndTypeL, AuthAnd(AuthExpr(EAuthKnowledge), AuthExpr(EAuthBiometric)));
-	
-	// id OR id
-	OpTestExprLD(&CTStepAuthExprBuild::TestTypeOrTypeL, AuthExpr(EAuthKnowledge) | AuthExpr(EAuthBiometric));
-	TestExprLD(&CTStepAuthExprBuild::TestTypeOrTypeL, AuthOr(AuthExpr(EAuthKnowledge), AuthExpr(EAuthBiometric)));
-	
-	// ID AND type
-	OpTestExprLD(&CTStepAuthExprBuild::TestIdAndTypeL, AuthExpr(KTestPluginId0) & AuthExpr(EAuthBiometric));
-	TestExprLD(&CTStepAuthExprBuild::TestIdAndTypeL, AuthAnd(AuthExpr(KTestPluginId0), AuthExpr(EAuthBiometric)));
-	
-	// type AND ID
-	OpTestExprLD(&CTStepAuthExprBuild::TestTypeAndIdL, AuthExpr(EAuthBiometric) & AuthExpr(KTestPluginId0));
-	TestExprLD(&CTStepAuthExprBuild::TestTypeAndIdL, AuthAnd(AuthExpr(EAuthBiometric), AuthExpr(KTestPluginId0)));
-	
-	// id AND id
-	OpTestExprLD(&CTStepAuthExprBuild::TestIdAndIdL, AuthExpr(KTestPluginId0) & AuthExpr(KTestPluginId1));
-	TestExprLD(&CTStepAuthExprBuild::TestIdAndIdL, AuthAnd(AuthExpr(KTestPluginId0), AuthExpr(KTestPluginId1)));
-	
-	__UHEAP_MARKEND;
-	}
-
-
-void CTStepAuthExprBuild::TestTypeAndTypeL(CAuthExpression* aExpr)
-/**
-	Test the supplied expression says know & bio.
- */
-	{
-	CAuthExpressionImpl* impl = static_cast<CAuthExpressionImpl*>(aExpr);
-	TESTL(impl->Type() == KAnd);
-	TESTL(impl->Left()->Type() == KPluginType);
-	TESTL(impl->Left()->PluginType() == EAuthKnowledge);
-	TESTL(impl->Right()->Type() == KPluginType);
-	TESTL(impl->Right()->PluginType() == EAuthBiometric);
-	}
-
-
-void CTStepAuthExprBuild::TestTypeOrTypeL(CAuthExpression* aExpr)
-/**
-	Test the supplied expression says know | bio.
- */
-	{
-	CAuthExpressionImpl* impl = static_cast<CAuthExpressionImpl*>(aExpr);
-	TESTL(impl->Type() == KOr);
-	TESTL(impl->Left()->Type() == KPluginType);
-	TESTL(impl->Left()->PluginType() == EAuthKnowledge);
-	TESTL(impl->Right()->Type() == KPluginType);
-	TESTL(impl->Right()->PluginType() == EAuthBiometric);
-	}
-
-
-void CTStepAuthExprBuild::TestIdAndTypeL(CAuthExpression* aExpr)
-/**
-	Test the supplied expression says id0 & bio.
- */
-	{
-	CAuthExpressionImpl* impl = static_cast<CAuthExpressionImpl*>(aExpr);
-	TESTL(impl->Type() == KAnd);
-	TESTL(impl->Left()->Type() == KPluginId);
-	TESTL(impl->Left()->PluginId() == KTestPluginId0);
-	TESTL(impl->Right()->Type() == KPluginType);
-	TESTL(impl->Right()->PluginType() == EAuthBiometric);
-	}
-
-
-void CTStepAuthExprBuild::TestTypeAndIdL(CAuthExpression* aExpr)
-/**
-	Test the supplied expression says bio & id0.
- */
-	{
-	CAuthExpressionImpl* impl = static_cast<CAuthExpressionImpl*>(aExpr);
-	TESTL(impl->Type() == KAnd);
-	TESTL(impl->Left()->Type() == KPluginType);
-	TESTL(impl->Left()->PluginType() == EAuthBiometric);
-	TESTL(impl->Right()->Type() == KPluginId);
-	TESTL(impl->Right()->PluginId() == KTestPluginId0);
-	}
-
-
-void CTStepAuthExprBuild::TestIdAndIdL(CAuthExpression* aExpr)
-/**
-	Test the supplied expression says id0 & id1.
- */
-	{
-	CAuthExpressionImpl* impl = static_cast<CAuthExpressionImpl*>(aExpr);
-	TESTL(impl->Type() == KAnd);
-	TESTL(impl->Left()->Type() == KPluginId);
-	TESTL(impl->Left()->PluginId() == KTestPluginId0);
-	TESTL(impl->Right()->Type() == KPluginId);
-	TESTL(impl->Right()->PluginId() == KTestPluginId1);
-	}
-
-
-void CTStepAuthExprBuild::TestComplexExprCombsConsL()
-/**
-	Test complex AND and OR combinations.
-	For the overloaded operators, this additionally checks
-	that precedence works as expected.
- */
-	{
-	__UHEAP_MARK;
-	
-	// complex combinations - ensure precedence works
-	
-	// id AND id AND id == (id AND id) AND id
-	OpTestExprLD(&CTStepAuthExprBuild::TestAndAndL, AuthExpr(KTestPluginId0) & AuthExpr(KTestPluginId1) & AuthExpr(KTestPluginId2));
-	TestExprLD(&CTStepAuthExprBuild::TestAndAndL, AuthAnd(AuthAnd(AuthExpr(KTestPluginId0), AuthExpr(KTestPluginId1)), AuthExpr(KTestPluginId2)));
-	
-	// id AND id AND id == (id AND id) OR id
-	OpTestExprLD(&CTStepAuthExprBuild::TestAndOrL, AuthExpr(KTestPluginId0) & AuthExpr(KTestPluginId1) | AuthExpr(KTestPluginId2));
-	TestExprLD(&CTStepAuthExprBuild::TestAndOrL, AuthOr(AuthAnd(AuthExpr(KTestPluginId0), AuthExpr(KTestPluginId1)), AuthExpr(KTestPluginId2)));
-	
-	// id OR id AND id == id OR (id AND id)
-	OpTestExprLD(&CTStepAuthExprBuild::TestOrAndL, AuthExpr(KTestPluginId0) | AuthExpr(KTestPluginId1) & AuthExpr(KTestPluginId2));
-	TestExprLD(&CTStepAuthExprBuild::TestOrAndL, AuthOr(AuthExpr(KTestPluginId0), AuthAnd(AuthExpr(KTestPluginId1), AuthExpr(KTestPluginId2))));
-	
-	// id OR id OR id == (id OR id) OR id
-	OpTestExprLD(&CTStepAuthExprBuild::TestOrOrL, AuthExpr(KTestPluginId0) | AuthExpr(KTestPluginId1) | AuthExpr(KTestPluginId2));
-	OpTestExprLD(&CTStepAuthExprBuild::TestOrOrL, AuthOr(AuthOr(AuthExpr(KTestPluginId0), AuthExpr(KTestPluginId1)), AuthExpr(KTestPluginId2)));
-	
-	__UHEAP_MARKEND;
-	}
-
-
-void CTStepAuthExprBuild::TestAndAndL(CAuthExpression* aExpr)
-/**
-	Test the supplied expression says (id0 & id1) & id2.
- */
-	{
-	CAuthExpressionImpl* impl = static_cast<CAuthExpressionImpl*>(aExpr);
-	TESTL(impl->Type() == KAnd);
-	TESTL(impl->Left()->Type() == KAnd);
-	TESTL(impl->Left()->Left()->Type() == KPluginId);
-	TESTL(impl->Left()->Left()->PluginId() == KTestPluginId0);
-	TESTL(impl->Left()->Right()->Type() == KPluginId);
-	TESTL(impl->Left()->Right()->PluginId() == KTestPluginId1);
-	TESTL(impl->Right()->Type() == KPluginId);
-	TESTL(impl->Right()->PluginId() == KTestPluginId2);
-	}
-
-
-void CTStepAuthExprBuild::TestAndOrL(CAuthExpression* aExpr)
-/**
-	Test the supplied expression says (id0 & id 1) | id2.
- */
-	{
-	CAuthExpressionImpl* impl = static_cast<CAuthExpressionImpl*>(aExpr);
-	TESTL(impl->Type() == KOr);
-	TESTL(impl->Left()->Type() == KAnd);
-	TESTL(impl->Left()->Left()->Type() == KPluginId);
-	TESTL(impl->Left()->Left()->PluginId() == KTestPluginId0);
-	TESTL(impl->Left()->Right()->Type() == KPluginId);
-	TESTL(impl->Left()->Right()->PluginId() == KTestPluginId1);
-	TESTL(impl->Right()->Type() == KPluginId);
-	TESTL(impl->Right()->PluginId() == KTestPluginId2);
-	}
-
-
-void CTStepAuthExprBuild::TestOrAndL(CAuthExpression* aExpr)
-/**
-	Test the supplied expression says id0 | (id1 & id2).
- */
-	{
-	CAuthExpressionImpl* impl = static_cast<CAuthExpressionImpl*>(aExpr);
-	TESTL(impl->Type() == KOr);
-	TESTL(impl->Left()->Type() == KPluginId);
-	TESTL(impl->Left()->PluginId() == KTestPluginId0);
-	TESTL(impl->Right()->Type() == KAnd);
-	TESTL(impl->Right()->Left()->Type() == KPluginId);
-	TESTL(impl->Right()->Left()->PluginId() == KTestPluginId1);
-	TESTL(impl->Right()->Right()->Type() == KPluginId);
-	TESTL(impl->Right()->Right()->PluginId() == KTestPluginId2);
-	}
-
-
-void CTStepAuthExprBuild::TestOrOrL(CAuthExpression* aExpr)
-/**
-	Test the supplied expression says (id0 | id1) | id2.
- */
-	{
-	CAuthExpressionImpl* impl = static_cast<CAuthExpressionImpl*>(aExpr);
-	TESTL(impl->Type() == KOr);
-	TESTL(impl->Left()->Type() == KOr);
-	TESTL(impl->Left()->Left()->Type() == KPluginId);
-	TESTL(impl->Left()->Left()->PluginId() == KTestPluginId0);
-	TESTL(impl->Left()->Right()->Type() == KPluginId);
-	TESTL(impl->Left()->Right()->PluginId() == KTestPluginId1);
-	TESTL(impl->Right()->Type() == KPluginId);
-	TESTL(impl->Right()->PluginId() == KTestPluginId2);
-	}
-
-
-void CTStepAuthExprBuild::TestFailedCombsL()
-/**
-	Test that complex expression builder fails cleanly
-	for all permutations of unallocated input.
- */
-	{
-	__UHEAP_MARK;
-	
-	// left null only
-	CAuthExpression* aeRight = AuthExpr(KTestPluginId0);
-	User::LeaveIfNull(aeRight);
-	CAuthExpression* aeLeftNull = AuthAnd(0, aeRight);
-	TESTL(aeLeftNull == 0);
-	
-	// right null only
-	CAuthExpression* aeLeft = AuthExpr(KTestPluginId1);
-	User::LeaveIfNull(aeRight);
-	CAuthExpression* aeRightNull = AuthAnd(aeLeft, 0);
-	TESTL(aeRightNull == 0);
-	
-	// both null
-	CAuthExpression* aeBothNull = AuthAnd(0, 0);
-	TESTL(aeBothNull == 0);
-	
-	__UHEAP_MARKEND;
-	}
-
-
-void CTStepAuthExprBuild::TestCorruptPersistL()
-/**
-	Test get expected errors when externalize or
-	internalize invalid expressions.
- */
-	{
-	TInt r;
-	
-	__UHEAP_MARK;
-	CAuthExpression* aeTest = AuthExpr(KTestPluginId0);
-	TESTL(aeTest != 0);
-	CleanupStack::PushL(aeTest);
-	
-	TSizeStream ss;
-	RWriteStream ws(&ss);
-	aeTest->ExternalizeL(ws);
-	
-	TInt len = ss.Size();
-	TAny* buf= User::AllocLC(ss.Size());
-	
-	// externalize valid expression
-	RMemWriteStream mwsValid(buf, len);
-	aeTest->ExternalizeL(mwsValid);
-	
-	// internalize unsupported expression stream
-	TInt8& verByteP = ((TInt8*)buf)[0];
-	TInt8 origVer = verByteP;
-	verByteP = KMaxTInt8;
-	RMemReadStream mrsHighVer(buf, len);
-	TRAP(r, /* ignore */ CAuthExpressionImpl::NewL(mrsHighVer));
-	TESTL(r == KErrAuthServUnsupportedExprVersion);
-	verByteP = origVer;
-	
-	// internalize corrupt expression stream
-	TInt8& typeByteP = ((TInt8*)buf)[1];
-	TInt8 origType = typeByteP;
-	typeByteP = ~0;
-	RMemReadStream mrsCorrupt(buf, len);
-	TRAP(r, /* ignore */ CAuthExpressionImpl::NewL(mrsCorrupt));
-	TESTL(r == KErrAuthServInvalidInternalizeExpr);
-	typeByteP = origType;
-	
-	// internalize valid expression stream
-	RMemReadStream mrsValid(buf, len);
-	CAuthExpression* aeRestore = CAuthExpressionImpl::NewL(mrsValid);
-	TESTL(aeRestore != 0);
-	delete aeRestore;
-	
-	CleanupStack::PopAndDestroy(2, aeTest);
-	__UHEAP_MARKEND;
-	}
-
-
-// -------- Server fails expressions from client --------
-
-
-namespace {
-
-class RTestAuthClient : public RAuthClient
-/**
-	This subclass of RAuthClient is used to
-	send a corrupt externalized expression
-	to the authentication server.
-	
-	The test code can't call SendReceive() on
-	an instance of RAuthClient because it is
-	protected.
- */
-	{
-public:
-	void SendCorruptAuthExprL();
-	void SendHighVerAuthExprL();
-
-	static HBufC8* GetAuthExprExternalizationLC();
-	};
-
-HBufC8* RTestAuthClient::GetAuthExprExternalizationLC()
-/**
-	Helper function for SendCorruptAuthExprL and
-	SendHighVerAuthExprL.  This allocates a buffer
-	containing an externalized auth expr, so the
-	calling function can corrupt it.
-	
-	@return					Buffer containing externalized
-							authentication expression.  This
-							is also placed on the cleanup stack.
-	@see SendCorruptAuthExprL
-	@see SendHighVerAuthExprL
- */
-	{
-	CAuthExpression* ae = AuthAnd(AuthExpr(KTestPluginId0), AuthExpr(KTestPluginId1));
-	User::LeaveIfNull(ae);
-	CleanupStack::PushL(ae);
-	
-	TSizeStream ss;
-	RWriteStream ws(&ss);
-	ae->ExternalizeL(ws);
-	
-	HBufC8* buf = HBufC8::NewLC(ss.Size());
-	TPtr8 bufPtr = buf->Des();
-	
-	RDesWriteStream dws(bufPtr);
-	ae->ExternalizeL(dws);
-	dws.CommitL();
-
-	CleanupStack::Pop(2, ae);
-	CleanupStack::PushL(buf);
-	
-	return buf;
-	}
-
-
-void RTestAuthClient::SendCorruptAuthExprL()
-/**
-	Send an authenticate request to the server,
-	with a corrupt authentication expression.
- */
-	{
-	HBufC8* buf = GetAuthExprExternalizationLC();
-	
-	// corrupt the type field, one byte after the version field
-	buf->Des()[1] = ~0;
-	
-	// the server should panick this thread with
-	// category "AuthServer" and reason EPanicBadExternalizedAuthExpr (3)
-	TRequestStatus rs;
-	CallSessionFunction(EAuthenticate, TIpcArgs(buf), rs);
-	
-	// this code will not be reached
-	User::WaitForRequest(rs);
-	CleanupStack::PopAndDestroy(buf);
-	}
-
-
-void RTestAuthClient::SendHighVerAuthExprL()
-/**
-	Send an authenticate request to the server,
-	with an unsupported version number.
-	
-	The server should fail the request with
-	KErrAuthServUnsupportedExprVersion.
- */
-	{
-	HBufC8* buf = GetAuthExprExternalizationLC();
-	
-	// change the version field, which is the first byte
-	buf->Des()[0] = KMaxTInt8;
-	
-	TRequestStatus rs;
-	CallSessionFunction(EAuthenticate, TIpcArgs(buf), rs);
-	User::WaitForRequest(rs);
-	
-	// this isn't semantically the right code to
-	// fail the test with, because it is expected.
-	// However, it is easy to find in the test code
-	// if it occurs.
-	if (rs != KErrAuthServUnsupportedExprVersion)
-		User::Leave(KErrAuthServUnsupportedExprVersion);
-	
-	CleanupStack::PopAndDestroy(buf);
-	}
-
-
-void RunTestAuthClientFunctionL(void (RTestAuthClient::* aTacFuncL)())
-/**
-	Connect to the authentication server using
-	RTestAuthClient, and call the supplied function.
-	
-	This is a helper function for CTStepBadExtAuthExpr
-	and CTStepAuthExprHighVer which both use
-	RTestAuthClient, and only call different functions.
-	
-	@param	aTacFuncL		Function to call on RTestAuthClient
-							once the connection has been made.
-							If this function leaves then the
-							leave code is propagated through this
-							(RunTestAuthClientFunctionL) function.
- */
-	{
-	RTestAuthClient tac;
-	User::LeaveIfError(tac.Connect());
-	CleanupClosePushL(tac);
-	
-	// this function should not return
-	(tac.*aTacFuncL)();
-	
-	CleanupStack::PopAndDestroy(&tac);
-	}
-
-
-}	// namespace
-
-
-CTStepBadExtAuthExpr::CTStepBadExtAuthExpr()
-/**
-	Record this test step's name.
- */
-	{
-	SetTestStepName(KTStepBadExtAuthExpr);
-	}
-
-
-TVerdict CTStepBadExtAuthExpr::doTestStepL()
-/**
-	Implement CTestStep by calling RAuthClient::Authenticate
-	with a corrupt externalized authentication expression.
-	
-	The current thread should be panicked with
-	category AuthServer and reason EPanicBadExternalizedAuthExpr.
- */
-	{
-	// this function should not return
-	RunTestAuthClientFunctionL(&RTestAuthClient::SendCorruptAuthExprL);
-	return EPass;
-	}
-
-
-CTStepAuthExprHighVer::CTStepAuthExprHighVer()
-/**
-	Record this test step's name.
- */
-	{
-	SetTestStepName(KTStepAuthExprHighVer);
-	}
-
-
-TVerdict CTStepAuthExprHighVer::doTestStepL()
-/**
-	Implement CTestStep by calling RAuthClient::SendHighVerAuthExprL()
-	and ensuring the server fails the request if
-	the externalized auth expr uses an unsupported
-	version number.
- */
-	{
-	RunTestAuthClientFunctionL(&RTestAuthClient::SendHighVerAuthExprL);
-	return EPass;
-	}
-
-
-// -------- Debug-mode client-side panicks --------
-
-
-#ifdef _DEBUG
-
-
-// -------- CTStepAuthExprTypePnc --------
-
-
-CTStepAuthExprTypePnc::CTStepAuthExprTypePnc()
-/**
-	Record this test step's name.
- */
-	{
-	SetTestStepName(KTStepAuthExprTypePnc);
-	}
-
-
-TVerdict CTStepAuthExprTypePnc::doTestStepL()
-/**
-	Implement CTestStep by creating a plugin id
-	node, corrupting the type field, and testing
-	that it is panicked when the type is
-	retrieved.  Debug only.
- */
-	{
-	CAuthExpression* ae = AuthExpr(KTestPluginId0);
-	User::LeaveIfNull(ae);
-	CAuthExpressionImpl* aeImpl = static_cast<CAuthExpressionImpl*>(ae);
-	CorruptTypeField(aeImpl);
-	/* ignore */ aeImpl->Type();
-	
-	// this code should never be reached
-	return EPass;
-	}
-
-
-// -------- CTStepAuthExprTypePncBadLeft --------
-
-
-CTStepAuthExprTypePncBadLeft::CTStepAuthExprTypePncBadLeft()
-/**
-	Record this test step's name.
- */
-	{
-	SetTestStepName(KTStepAuthExprTypePncBadLeft);
-	}
-
-
-TVerdict CTStepAuthExprTypePncBadLeft::doTestStepL()
-/**
-	Implement CTestStep by creating a complex
-	expression where the left subexpression is
-	corrupt.  This tests that the invariant
-	correctly validates the left subtree.
- */
-	{
-	CAuthExpression* ae = AuthAnd(AuthExpr(KTestPluginId0), AuthExpr(KTestPluginId1));
-	User::LeaveIfNull(ae);
-	CAuthExpressionImpl* aeImpl = static_cast<CAuthExpressionImpl*>(ae);
-	CorruptTypeField(aeImpl->Left());	
-	/* ignore */ aeImpl->Type();
-	
-	// this code should never be reached
-	return EPass;
-	}
-
-
-// -------- CTStepAuthExprTypePncBadRight --------
-
-
-CTStepAuthExprTypePncBadRight::CTStepAuthExprTypePncBadRight()
-/**
-	Record this test step's name.
- */
-	{
-	SetTestStepName(KTStepAuthExprTypePncBadRight);
-	}
-
-
-TVerdict CTStepAuthExprTypePncBadRight::doTestStepL()
-/**
-	Implement CTestStep by creating a complex
-	expression where the Right subexpression is
-	corrupt.  This tests that the invariant
-	correctly validates the Right subtree.
- */
-	{
-	CAuthExpression* ae = AuthAnd(AuthExpr(KTestPluginId0), AuthExpr(KTestPluginId1));
-	User::LeaveIfNull(ae);
-	CAuthExpressionImpl* aeImpl = static_cast<CAuthExpressionImpl*>(ae);
-	CorruptTypeField(aeImpl->Right());	
-	/* ignore */ aeImpl->Type();
-	
-	// this code should never be reached
-	return EPass;
-	}
-
-
-#endif	// #ifdef _DEBUG
--- a/authenticationservices/authenticationserver/test/tauthcliserv/step_authexpr_eval.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,697 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* This file contains functions which are used to
-* test evaluating authentication expressions.
-*
-*/
-
-
-#include "tauthcliservstep.h"
-
-using namespace AuthServer;
-
-typedef TTestPluginInterface::TCallEntry TCE;
-
-#define elemCount(___x)		(sizeof(___x) / sizeof(___x[0]))
-
-static TAuthExpressionWrapper BuildLeftAnd(TInt aRemainingLevels);
-static TAuthExpressionWrapper BuildRightAnd(TInt aRemainingLevels);
-static TAuthExpressionWrapper BuildBalancedAnd(TInt aRemainingLevels);
-static TAuthExpressionWrapper BuildFailedAnd(TInt aRemainingLevels);
-static TAuthExpressionWrapper BuildSuccessfulOr(TInt aRemainingLevels);
-
-
-// -------- CTStepActSch --------
-
-
-// -------- CTStepAuthExprEval --------
-
-
-void TTestPluginInterface::Evaluate(TPluginId aPluginId, TIdentityId& aIdentity,
-		   CAuthExpressionImpl::TType /*aType*/, TRequestStatus& aStatus)
-/**
-	Implement MEvaluatorPluginInterface by completing
-	the request with an identity equal to the plugin id.
- */
-	{
-	const TCallEntry ce(aPluginId);
-	TInt r = iCallLog.Append(ce);
-	
-	// this can be KErrNoMemory in OOM tests
-	if (r == KErrNone)
-		{
-		if (aPluginId == KTestPluginUnknown)
-			aIdentity = KUnknownIdentity;
-		else
-			aIdentity = static_cast<TIdentityId>(aPluginId);
-		}
-		
-	aStatus = KRequestPending;
-	TRequestStatus* rs = &aStatus;
-	User::RequestComplete(rs, r);
-	}
-
-
-void TTestPluginInterface::Evaluate(TAuthPluginType aPluginType, TIdentityId& aIdentity, 
-									CAuthExpressionImpl::TType /*aType*/, TRequestStatus& aStatus)
-/**
-	Implement MEvaluatorPluginInterface by completing
-	the request with an identity equal to the plugin type.
- */
-	{
-	const TCallEntry ce(aPluginType);
-	TInt r = iCallLog.Append(ce);
-	
-	// this can be KerrNoMemory in OOM tests
-	if (r == KErrNone)
-		aIdentity = static_cast<TIdentityId>(aPluginType);
-	
-	aStatus = KRequestPending;
-	TRequestStatus* rs = &aStatus;
-	User::RequestComplete(rs, KErrNone);
-	}
-
-
-bool TTestPluginInterface::TCallEntry::operator==(const TTestPluginInterface::TCallEntry& aRhs) const
-	{
-	if (iCallType != aRhs.iCallType)
-		return false;
-	
-	if (iCallType == CAuthExpressionImpl::EPluginId)
-		return iPluginId == aRhs.iPluginId;
-	else
-		return iPluginType == aRhs.iPluginType;
-	}
-
-
-void TTestClientInterface::EvaluationSucceeded(TIdentityId aIdentityId)
-/**
-	Implement MEvaluatorClientInterface by recording
-	that the evaluation succeeded, and the resulting identity.
- */
-	{
-	iMode = ESucceeded;
-	iIdentityId = aIdentityId;
-
-	CActiveScheduler::Stop();
-	}
-
-
-void TTestClientInterface::EvaluationFailed(TInt aReason)
-/**
-	Implement MEvaluatorClientInterface by recording
-	that the evaluation failed, and the failure reason.
- */
-	{
-	iMode = EFailed;
-	iReason = aReason;
-	
-	CActiveScheduler::Stop();
-	}
-
-
-CLaunchEval* CLaunchEval::NewL()
-/**
-	Factory function allocates new instance of CLaunchEval.
-	
-	@return					New instance of CLaunchEval.
- */
-	{
-	CLaunchEval* self = new(ELeave) CLaunchEval();
-	CleanupStack::PushL(self);
-	self->ConstructL();
-	CleanupStack::Pop(self);
-	return self;
-	}
-
-
-CLaunchEval::CLaunchEval()
-/**
-	Set timer priority and add self to active scheduler.
- */
-:	CActive(CActive::EPriorityStandard)
-	{
-	CActiveScheduler::Add(this);
-	}
-
-
-void CLaunchEval::ConstructL()
-/**
-	Allocate evaluator and initialize superclass timer.
- */
-	{
-//	CTimer::ConstructL();
-	iEval = CEvaluator::NewL(&iPluginInterface, &iClientInterface);
-	}
-
-
-CLaunchEval::~CLaunchEval()
-/**
-	Deletes evaluator which was allocated for this object.
- */
-	{
-	ResetInterfaces();
-	delete iEval;
-	}
-
-
-void CLaunchEval::ResetInterfaces()
-/**
-	Free resources used by plugin and client interfaces.
- */
-	{
-	iPluginInterface.iCallLog.Reset();
-	iClientInterface.iMode = TTestClientInterface::ENone;
-	}
-
-
-void CLaunchEval::Evaluate(const CAuthExpression* aExpr)
-/**
-	Queue this timer object and start the active
-	scheduler.  This function returns when the evaluation
-	has completed.
-	
-	This object's client and plugin interfaces are reset
-	before the expression is evaluated, so they can be
-	tested by the function which calls this.
-	
-	@param	aExpr			Expression to evaluate.
- */
-	{
-	ResetInterfaces();
-	iExpr = aExpr;			// store so can see in RunL
-	
-	// signal this object.  This ensures there
-	// is a pending active object before the scheduler
-	// is started.
-	iStatus = KRequestPending;
-	TRequestStatus* rs = &iStatus;
-	User::RequestComplete(rs, KErrNone);
-	SetActive();
-	
-	// block until the evaluation has completed.
-	CActiveScheduler::Start();
-	}
-
-
-void CLaunchEval::RunL()
-/**
-	Implement CActive by launching the evaluation.
-	At this point the active scheduler should have
-	been started.
- */
-	{
-	iEval->Evaluate(static_cast<const CAuthExpressionImpl*>(iExpr));
-	}
-
-
-void CLaunchEval::DoCancel()
-/**
-	Implement CActive by cancelling the evaluation
-	which is currently in progress.
-	
-	Not yet implemented.
- */
-	{
-	// empty.
-	}
-
-
-CTStepAuthExprEval::CTStepAuthExprEval()
-/**
-	Record this test step's name.
- */
-	{
-	SetTestStepName(KTStepAuthExprTypePncBadRight);
-	}
-
-
-TVerdict CTStepAuthExprEval::doTestStepL()
-	{
- 	CActiveScheduler::Install(iActSchd);
- 	User::SetJustInTime(ETrue);
- 	
- 	__UHEAP_MARK;
-	TestEvalCreateL();
-	TestEvalSimpleL();
-	TestEvalAndL();
-	TestEvalOrL();
-	TestRPNReallocL();
-	__UHEAP_MARKEND;
-	
-	return EPass;
-	}
-
-
-void CTStepAuthExprEval::TestEvalCreateL()
-/**
-	Test allocating and deleting an evaluator,
-	without using it for anything.
- */
-	{
-	__UHEAP_MARK;
-	
-	TTestClientInterface tci;
-	TTestPluginInterface tpi;
-	
-	CEvaluator* ev = CEvaluator::NewL(&tpi, &tci);
-	delete ev;
-	
-	__UHEAP_MARKEND;
-	}
-
-
-void CTStepAuthExprEval::TestEvalSimpleL()
-/**
-	Test evaluating a simple plugin id, and
-	evaluating a simple plugin type.
- */
-	{
-	__UHEAP_MARK;
-	
-	CLaunchEval* le = CLaunchEval::NewL();
-	CleanupStack::PushL(le);
-
-	// simple plugin id	
-	CAuthExpression* aeId = AuthExpr(KTestPluginId0);
-	User::LeaveIfNull(aeId);
-	le->Evaluate(aeId);
-	delete aeId;
-	
-	const TCE aceI0[] = {TCE(KTestPluginId0)};
-	TestEvalResultL(le, KTestPluginId0, aceI0, elemCount(aceI0));
-	
-	// simple plugin type
-	CAuthExpression* aeType = AuthExpr(EAuthBiometric);
-	User::LeaveIfNull(aeType);
-	le->Evaluate(aeType);
-	delete aeType;
-	
-	const TCE aceTB[] = {TCE(EAuthBiometric)};
-	TestEvalResultL(le, EAuthBiometric, aceTB, elemCount(aceTB));
-	
-	CleanupStack::PopAndDestroy(le);
-	
-	__UHEAP_MARKEND;
-	}
-
-
-void CTStepAuthExprEval::TestEvalAndL()
-/**
-	Test evaluating simple AND expressions.
- */
-	{
-	__UHEAP_MARK;
-	
-	CLaunchEval* le = CLaunchEval::NewL();
-	CleanupStack::PushL(le);
-
-	// U & U = U (sc)
-	CAuthExpression* aeUU = AuthAnd(AuthExpr(KTestPluginUnknown), AuthExpr(KTestPluginUnknown));
-	User::LeaveIfNull(aeUU);
-	le->Evaluate(aeUU);
-	delete aeUU;
-
-	const TCE aceUU[] = {TCE(KTestPluginUnknown)};
-	TestEvalResultL(le, KUnknownIdentity, aceUU, elemCount(aceUU));
-
-	// U & I1 = U (sc)
-	CAuthExpression* aeUI1 = AuthAnd(AuthExpr(KTestPluginUnknown), AuthExpr(KTestPluginId1));
-	User::LeaveIfNull(aeUI1);
-	le->Evaluate(aeUI1);
-	delete aeUI1;
-	
-	const TCE aceUI1[] = {TCE(KTestPluginUnknown)};
-	TestEvalResultL(le, KUnknownIdentity, aceUI1, elemCount(aceUI1));
-	
-	// I1 & U = U
-	CAuthExpression* aeI1U = AuthAnd(AuthExpr(KTestPluginId1), AuthExpr(KTestPluginUnknown));
-	User::LeaveIfNull(aeI1U);
-	le->Evaluate(aeI1U);
-	delete aeI1U;
-
-	const TCE aceI1U[] = {TCE(KTestPluginId1), TCE(KTestPluginUnknown)};
-	TestEvalResultL(le, KUnknownIdentity, aceI1U, elemCount(aceI1U));
-	
-	// I1 & I1 = I1
-	CAuthExpression* aeI1I1 = AuthAnd(AuthExpr(KTestPluginId1), AuthExpr(KTestPluginId1));
-	User::LeaveIfNull(aeI1I1);
-	le->Evaluate(aeI1I1);
-	delete aeI1I1;
-
-	const TCE aceI1I1[] = {TCE(KTestPluginId1), TCE(KTestPluginId1)};
-	TestEvalResultL(le, KTestPluginId1, aceI1I1, elemCount(aceI1I1));
-	
-	// I1 & I2 = U
-	CAuthExpression* aeI1I2 = AuthAnd(AuthExpr(KTestPluginId1), AuthExpr(KTestPluginId2));
-	User::LeaveIfNull(aeI1I2);
-	le->Evaluate(aeI1I2);
-	delete aeI1I2;
-	
-	const TCE aceI1I2[] = {TCE(KTestPluginId1), TCE(KTestPluginId2)};
-	TestEvalResultL(le, KUnknownIdentity, aceI1I2, elemCount(aceI1I2));
-	
-	CleanupStack::PopAndDestroy(le);
-	
-	__UHEAP_MARKEND;
-	}
-
-
-void CTStepAuthExprEval::TestEvalOrL()
-/**
-	Test evaluating simple OR expressions.
- */
-	{
-	__UHEAP_MARK;
-	
-	CLaunchEval* le = CLaunchEval::NewL();
-	CleanupStack::PushL(le);
-
-	// U | U = U
-	CAuthExpression* aeUU = AuthOr(AuthExpr(KTestPluginUnknown), AuthExpr(KTestPluginUnknown));
-	User::LeaveIfNull(aeUU);
-	le->Evaluate(aeUU);
-	delete aeUU;
-	
-	const TCE aceUU[] = {TCE(KTestPluginUnknown), TCE(KTestPluginUnknown)};
-	TestEvalResultL(le, KUnknownIdentity, aceUU, elemCount(aceUU));
-	
-	// U | I1 = I1
-	CAuthExpression* aeUI1 = AuthOr(AuthExpr(KTestPluginUnknown), AuthExpr(KTestPluginId1));
-	User::LeaveIfNull(aeUI1);
-	le->Evaluate(aeUI1);
-	delete aeUI1;
-	
-	const TCE aceUI1[] = {TCE(KTestPluginUnknown), TCE(KTestPluginId1)};
-	TestEvalResultL(le, KTestPluginId1, aceUI1, elemCount(aceUI1));
-	
-	// I1 | U = I1 (sc)
-	CAuthExpression* aeI1U = AuthOr(AuthExpr(KTestPluginId1), AuthExpr(KTestPluginUnknown));
-	User::LeaveIfNull(aeI1U);
-	le->Evaluate(aeI1U);
-	delete aeI1U;
-	
-	const TCE aceI1U[] = {TCE(KTestPluginId1)};
-	TestEvalResultL(le, KTestPluginId1, aceI1U, elemCount(aceI1U));
-	
-	// I1 | I1 = I1 (sc)
-	CAuthExpression* aeI1I1 = AuthOr(AuthExpr(KTestPluginId1), AuthExpr(KTestPluginId1));
-	User::LeaveIfNull(aeI1I1);
-	le->Evaluate(aeI1I1);
-	delete aeI1I1;
-	
-	const TCE aceI1I1[] = {TCE(KTestPluginId1)};
-	TestEvalResultL(le, KTestPluginId1, aceI1I1, elemCount(aceI1I1));
-	
-	// I1 | I2 = I1 (sc)
-	CAuthExpression* aeI1I2 = AuthOr(AuthExpr(KTestPluginId1), AuthExpr(KTestPluginId2));
-	User::LeaveIfNull(aeI1I2);
-	le->Evaluate(aeI1I2);
-	delete aeI1I2;
-	
-	const TCE aceI1I2[] = {TCE(KTestPluginId1)};
-	TestEvalResultL(le, KTestPluginId1, aceI1I2, elemCount(aceI1I2));
-	
-	CleanupStack::PopAndDestroy(le);
-	
-	__UHEAP_MARKEND;
-	}
-
-
-void CTStepAuthExprEval::TestEvalResultL(
-	CLaunchEval* aLaunchEval, TIdentityId aIdentityId,
-	const TTestPluginInterface::TCallEntry* aExpEntries, TInt aEntryCount)
-/**
-	Test the evaluation produced the expected result, and
-	that the expected plugins were called in the right order.
- */
-	{
-	const TTestClientInterface& cli = aLaunchEval->iClientInterface;
-	TESTL(cli.iMode == TTestClientInterface::ESucceeded);
-	TESTL(cli.iIdentityId == aIdentityId);
-	
-	const RArray<TCE>& log = aLaunchEval->iPluginInterface.iCallLog;
-	
-	TESTL(log.Count() == aEntryCount);
-	for (TInt i = 0; i < aEntryCount; ++i)
-		{
-		TESTL(log[i] == aExpEntries[i]);
-		}
-	}
-
-
-static TAuthExpressionWrapper BuildLeftAnd(TInt aRemainingLevels)
-/**
-	Build an expression where the left side is an
-	AND expression and the right side is a plugin ID.
-	
-	@param	aRemainingLevels The number of layers to build
-							below this layer.  If
-							aRemainingLevels == 0 this function
-							returns a simple plugin ID expression.
- */
-	{
-	return (aRemainingLevels == 0)
-		?	AuthExpr(KTestPluginId1)
-		:	AuthAnd(BuildLeftAnd(aRemainingLevels - 1), AuthExpr(KTestPluginId1));
-	}
-
-
-static TAuthExpressionWrapper BuildRightAnd(TInt aRemainingLevels)
-/**
-	Build an expression where the left side is a
-	plugin ID and the right side is an AND expression.
-
-	@param	aRemainingLevels The number of layers to build
-							below this layer.  If
-							aRemainingLevels == 0 this function
-							returns a simple plugin ID expression.
- */
-	{
-	return (aRemainingLevels == 0)
-		?	AuthExpr(KTestPluginId1)
-		:	AuthAnd(AuthExpr(KTestPluginId1), BuildRightAnd(aRemainingLevels - 1));
-	}
-
-
-static TAuthExpressionWrapper BuildBalancedAnd(TInt aRemainingLevels)
-/**
-	Build an expression where both the left and right side
-	have the same depth, aRemainingLevels - 1.
-	
-	@param	aRemainingLevels The number of layers to build
-							below this layer.  If
-							aRemainingLevels == 0 this function
-							returns a simple plugin ID expression.
- */
-	{
-	return (aRemainingLevels == 0)
-		?	AuthExpr(KTestPluginId1)
-		:	AuthAnd(
-				BuildBalancedAnd(aRemainingLevels - 1),
-				BuildBalancedAnd(aRemainingLevels - 1));
-	}
-
-
-static TAuthExpressionWrapper BuildFailedAnd(TInt aRemainingLevels)
-/**
-	This function creates an expression where the left node
-	is a simple plugin ID expression and the right node is
-	built recursively with this function.  The final AND node
-	has a left unknown plugin ID.
-	
-	This causes an unknown plugin ID to be automatically pushed
-	onto the RPN stack as a right value before the compounder is used.
-	
-	@param	aRemainingLevels Number of levels to generate after this.
-							If aRemainingLevels == 1 this function
-							creates an AND node where the left node
-							is unknown.  Otherwise it generates an
-							AND node where the left node is a known
-							plugin ID and the right node is generated
-							recursively.
- */
-	{
-	return (aRemainingLevels == 1)
-		?	AuthAnd(AuthExpr(KTestPluginUnknown), AuthExpr(KTestPluginId1))
-		:	AuthAnd(AuthExpr(KTestPluginId1), BuildFailedAnd(aRemainingLevels - 1));
-	}
-
-
-static TAuthExpressionWrapper BuildSuccessfulOr(TInt aRemainingLevels)
-/**
-	This function creates an AND node where the left node
-	is a known plugin ID, and the right right node is generated
-	recursively.  This creates a right-descent list, but the
-	penultimate node is an OR expression whose left node is a
-	known plugin ID.
-	
-	This puts a series of known plugin IDs on the RPN stack from
-	the left nodes of the AND nodes.  When the OR node is evaluated
-	the left node is known, and so automatically put on the
-	RPN stack.
-	
-	This means that an OR right node is automatically put on the
-	RPN stack at a known point, which is used to stress test failing
-	to append an OR right expression in OOM.
-
-	@param	aRemainingLevels Number of levels to generate after this.
-							If aRemainingLevels == 1 this function
-							generates an OR node.  Otherwise it creates
-							and AND node as described above.
- */
-	{
-	return (aRemainingLevels == 1)
-		?	AuthOr(AuthExpr(KTestPluginId1), AuthExpr(KTestPluginId1))
-		:	AuthAnd(AuthExpr(KTestPluginId1), BuildSuccessfulOr(aRemainingLevels - 1));
-	}
-
-
-void CTStepAuthExprEval::TestRPNReallocL()
-/**
-	Create a deeply nested expression which is
-	deep enough that the evaluator has to reallocate
-	its RPN stack, and checks the evaluation fails
-	gracefully in OOM.
- */
-	{
-	__UHEAP_MARK;
-	
-	RunOomTestsL(BuildLeftAnd, KTestPluginId1, 0);
-	RunOomTestsL(BuildRightAnd, KTestPluginId1, 0);
-	RunOomTestsL(BuildBalancedAnd, KTestPluginId1, 0);
-	RunOomTestsL(BuildFailedAnd, KUnknownIdentity, 1);
-	RunOomTestsL(BuildSuccessfulOr, KTestPluginId1, 1);
-	
-	__UHEAP_MARKEND;
-	}
-
-	
-void CTStepAuthExprEval::RunOomTestsL(
-	TAuthExpressionWrapper (*aAllocator)(TInt),
-	TIdentityId aExpectedIdentity, TInt aInitDepth)
-/**
-	Attempt to evaluate the supplied expresision in OOM.
-	
-	Running in OOM will both fail the evaluation, when the
-	plugin interface attempts to append to the call log, and
-	when the evaluator attempts to extend the RPN stack.
-	
-	OOM can only be tested in debug builds.  In release builds,
-	this function evaluates the expression at each depth and
-	tests the evaluator produces the correct result.
-	
-	@param	aAllocator		Function which allocates the expression.
-	@param	aExpectedIdentity Identity which should be returned on
-							successful evaluation.
-	@param	aInitDepth		Initial depth.
- */
-	{
-	CLaunchEval* le = CLaunchEval::NewL();
-	User::LeaveIfNull(le);
-	CleanupStack::PushL(le);
-	
-	const volatile TTestClientInterface& cli = le->iClientInterface;
-	
-	// depth starts at zero because, even though RPN stack
-	// is not used, the evaluator will attempt to grow its
-	// call log, and so fail the evaluation.  (This test is
-	// therefore also used to test failed plugin evaluations.)
-	
-	// max depth is 13 because CStepControl::StartL creates
-	// a worker thread with a 1MB maximum heap.  The
-	// number of allocated node cells for a balanced tree
-	// is 2^(depth+1) - 1.  When depth==13, there are
-	// 16383 cells using 327,672 bytes excluding cell headers.
-	// Allocation fails for depth == 14.
-	
-	const TInt KMaxDepth = 13;
-	for (TInt depth = aInitDepth; depth <= KMaxDepth; ++depth)
-		{
-		CAuthExpression* ae = aAllocator(depth);
-		User::LeaveIfNull(ae);
-		CleanupStack::PushL(ae);
-		
-		// OOM testing only available in debug builds
-#ifndef _DEBUG
-		le->Evaluate(ae);
-		TESTL(cli.iMode == TTestClientInterface::ESucceeded);
-		TESTL(cli.iIdentityId == aExpectedIdentity);
-#else
-		TInt i = 0;
-		do
-			{
-			// Ideally, the heap would be marked before and
-			// after the evaluation.  However, CEvaluator uses
-			// an CArrayFixFlat<TIdentityId> to store the RPN stack.
-			// When the first item is inserted, it allocates a
-			// CBufBase object to hold the data.  This object
-			// is reset but not deleted when the RPN stack is
-			// reset, so there will be a heap imbalance of one
-			// if anything was added to the RPN stack, even though
-			// the stack is reset.
-			
-			TInt preSize;
-			TInt preCount = User::AllocSize(preSize);
-//			__UHEAP_MARK;
-			
-			__UHEAP_SETFAIL(RAllocator::EDeterministic, i);
-			le->Evaluate(ae);
-			__UHEAP_RESET;
-			
-			TESTL(	cli.iMode == TTestClientInterface::EFailed
-				||	cli.iMode == TTestClientInterface::ESucceeded);
-			
-			if (cli.iMode == TTestClientInterface::EFailed)
-				{
-				TESTL(cli.iReason == KErrNoMemory);
-				}
-			else
-				{
-				TESTL(cli.iIdentityId == aExpectedIdentity);
-				}
-			
-			// clear call log so heap checking will work
-			le->iPluginInterface.iCallLog.Reset();
-			++i;
-
-			TInt postSize;
-			TInt postCount = User::AllocSize(postSize);			
-			TESTL(postCount == preCount || postCount == preCount + 1);
-//			__UHEAP_MARKEND;
-			} while (cli.iMode != TTestClientInterface::ESucceeded);
-		
-		// test evaluation still succeeds and failed allocation
-		// was not ignored
-		TInt limit = 2 * i;
-		while (i++ < limit)
-			{
-			__UHEAP_SETFAIL(RAllocator::EDeterministic, i++);
-			le->Evaluate(ae);
-			__UHEAP_RESET;
-			
-			TESTL(cli.iMode == TTestClientInterface::ESucceeded);
-			TESTL(cli.iIdentityId == aExpectedIdentity);
-			}
-
-		// clear plugin call log to reset mem usage for next iteration.
-		le->iPluginInterface.iCallLog.Reset();
-#endif	// #else #ifndef _DEBUG
-		CleanupStack::PopAndDestroy(ae);
-		}
-	
-	CleanupStack::PopAndDestroy(le);
-	}
-
--- a/authenticationservices/authenticationserver/test/tauthcliserv/step_base.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,122 +0,0 @@
-/*
-* Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include "tauthcliservstep.h"
-
-using namespace AuthServer;
-
-
-void CTAuthcliservStepBase::WaitForServerToReleaseDb()
-/**
-	Wait for the server to shut down and so
-	release the authentication database.
- */
-	{
-	TFullName name;
-	for (;;)
-		{
-		TFindServer find(::KAuthServerName);
-		if (find.Next(name) != KErrNone)
-			{
-			break;
-			}
-
-		// Wait for server to terminate
-		User::After(1 * 1000 * 1000);
-		}
-	}
-
-
-void CTAuthcliservStepBase::RemoveExistingDbL()
-/**
-	Remove any existing database file.
- */
-	{
-	WaitForServerToReleaseDb();
-	
-	TDriveUnit sysDrive (RFs::GetSystemDrive());
-	TDriveName sysDriveName (sysDrive.Name());
-	
-	TFileName dbName(KDbName);
-	dbName[0] = 'A' + sysDrive;	
-	TInt r = iFs.Delete(dbName);
-	User::LeaveIfError(r);
-	
-	//Reset the data 'AllUserID&PinValues' in AuthSvrPolicy.ini & the 
-	// individual plugin Db files
-	//_LIT(KInitPinDatabaseValue, ",");
-	TBufC<16> initPinDbBuffer(KInitPinDatabaseValue);
-	TPtr valueToWrite = initPinDbBuffer.Des();
-	
-	TBuf<64> fileName (sysDriveName);
-	fileName.Append(KAuthSvrPolicyFile);
-	writeToNamedConfig(fileName, KTotalDbTag, valueToWrite);
-	
-	fileName.Copy(sysDriveName);
-	fileName.Append(KPlugin3100File);
-	writeToNamedConfig(fileName, KPinDbTag, valueToWrite);
-
-	fileName.Copy(sysDriveName);
-	fileName.Append(KPlugin3101File);
-	writeToNamedConfig(fileName, KPinDbTag, valueToWrite);
-
-	fileName.Copy(sysDriveName);
-	fileName.Append(KPlugin3102File);
-	writeToNamedConfig(fileName, KPinDbTag, valueToWrite); 
-	}
-
-TInt CTAuthcliservStepBase::writeToNamedConfig(const TDesC &aFileName, const TDesC &aKeyName,const TPtrC &aResult)
-	{
-	
-	TInt retValue = KErrNone;
-	CIniData* file=NULL;
-	TRAPD(r,file=CIniData::NewL(aFileName));
-	
-	if(r!=KErrNone)
-		{
-		RDebug::Print(_L("Unable to create CIniData object. Error = %d, File = %S"), r, &aFileName);
-		retValue = r;
-		}
-	
-	else
-		{
-		// Look for a key under no named section, retrieve text value	
-		
-		TInt ret = KErrNone;	//return value from FindVar functions
-		ret=file->SetValue(aKeyName ,aResult);
-		if(ret != KErrNone)
-			{
-			if(ret == KErrNotFound)
-				{
-				RDebug::Print(_L("Key not found. Unable to set value in ini file. Filename: %S, KeyName = %S, value = %S."), &aFileName, &aKeyName, &aResult);
-				}			
-			else
-				{
-				RDebug::Print(_L("Unable to set value in ini file. Filename: %S, KeyName = %S, value = %S."), &aFileName, &aKeyName, &aResult);
-				}
-			retValue = ret;
-			}
-		TRAPD(r,file->WriteToFileL());
-		if (KErrNone != r)
-			{
-			RDebug::Print(_L("Error occurred while writing to the file. Filename = %S, KeyName = %S, value = %S."), &aFileName, &aKeyName, &aResult);
-			}
-		delete file;
-		}
-	return retValue;	
-	}
--- a/authenticationservices/authenticationserver/test/tauthcliserv/step_client.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,819 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include <test/testexecutelog.h>
-#include "tauthcliservstep.h"
-#include "authserver/aspubsubdefs.h"
-#include <e32property.h>
-#include <authserver/authpatchdata.h>
-#include <u32hal.h>
-#include <e32svr.h>
- 
-using namespace AuthServer;
-
-class CAuthActive : CActive
-    {
-public:
-    CAuthActive(RAuthClient& aClient, CIdentity*& aResult, CTStepClient* aStep,
-				TBool aStop = ETrue) : 
-         CActive(EPriorityNormal),
-         iFirstTime(true),
-         iClient(aClient), 
-         iResult(aResult), 
-         iStep(aStep),
-		 iStop(aStop)
-	    {
-        CActiveScheduler::Add(this);
-        }
-	
-    void doAuthenticate(TPluginId aPlugin, TTimeIntervalSeconds aTime )
-        {
-		iPlugin = aPlugin;
-        SetActive();		
-		TRequestStatus* status = &iStatus;		    
-		User::RequestComplete(status, KErrNone);
-		iFirstTime = ETrue;
-		iTime = aTime;
-        }
-	
-        void DoCancel() 
-        {
-        }
-        void RunL() 
-        {
-		static TBool client = ETrue;
-		static TBool withString = ETrue;
-		client = !client;
-        if (iFirstTime)
-            {
-			// inactive | plugin id
-            iAe = AuthExpr(0x10274106) | AuthExpr(iPlugin);
-			User::LeaveIfNull(iAe);
-			SetActive();
-            iStatus = KRequestPending;
-            iClient.AuthenticateL(*iAe, iTime, client, withString,
-								  iResult, iStatus);
-            iFirstTime = false;
-            }
-        else
-            {
-			if (iStop)
-				{
-				CActiveScheduler::Stop();
-				}
-            delete iAe;
-			}
-		iErr =  iStatus.Int();
-		}
-    TBool iFirstTime;
-    RAuthClient& iClient;
-    CIdentity*& iResult;
-    CTStepClient* iStep;
-    CAuthExpression* iAe;
-    TPluginId        iPlugin;
-	TTimeIntervalSeconds iTime;
-	TInt iErr;
-	TBool iStop;
-    };
-
-
-
-const TPluginId KIdentity1Id = 'I1ID';
-_LIT(KIdentity1Desc, "identity-1-desc");
-const TPluginId KIdentity2Id = 'I2ID';
-_LIT(KIdentity2Desc, "identity-2-desc");
-const TPluginId KIdentity3Id = 'I3ID';
-
-
-CTStepClient::CTStepClient()
-/**
-	Record this test step's name.
- */
-	{
- 	SetTestStepName(KTStepClient);
-	}
-
-
-void CTStepClient::TestIdentitiesL()
-/**
-	Test can retrieve correct identity arrays and
-	descritptinos from auth db.
- */
-	{
-	__UHEAP_MARK;
-	RemoveExistingDbL();
-	
-	RArray<TIdentityId> ids;
-	
-
-	// one identities (first start adds one)
-	GetIdentitiesLC(ids);
-	TESTL(ids.Count() == 1);
-	CleanupStack::PopAndDestroy(&ids);
-
-	
-	// two identity
-	AddIdentityL(KIdentity1Id, KIdentity1Desc);
-	GetIdentitiesLC(ids);
-	TESTL(ids.Count() == 2);
-	TESTL(ids[0] == KIdentity1Id || ids[1] == KIdentity1Id);
-	CleanupStack::PopAndDestroy(&ids);
-	TestIdentityL(KIdentity1Id, KIdentity1Desc);
-	
-	
-	// three identities
-	AddIdentityL(KIdentity2Id, KIdentity2Desc);
-	GetIdentitiesLC(ids);
-	TESTL(ids.Count() == 3);
-	TESTL(	ids.Find(KIdentity1Id) >= 0 && 
-	        ids.Find(KIdentity2Id) >= 0);
-	CleanupStack::PopAndDestroy(&ids);
-	TestIdentityL(KIdentity1Id, KIdentity1Desc);
-	TestIdentityL(KIdentity2Id, KIdentity2Desc);
-
-	// test fail to get description for non-existent identity
-	RAuthClient ac;
-	User::LeaveIfError(ac.Connect());
-	CleanupClosePushL(ac);
-	
-	
-	TRAPD(r, ac.IdentityStringL(KIdentity3Id));
-	TESTL(r == KErrAuthServIdentityNotFound);
-
-	// check id and string retrieval
-	RIdAndStringArray idWithString;
-	ac.IdentitiesWithStringL(idWithString);
-	CleanupClosePushL(idWithString);
-	
-    for (TInt i = 0 ; i < idWithString.Count() ; ++i)
-	    {
-	    TestIdentityL(idWithString[i]->Id(), *idWithString[i]->String());
-		INFO_PRINTF3(_L("0x%x - %S"), idWithString[i]->Id(), idWithString[i]->String()); 
-	    }
-
-	CleanupStack::PopAndDestroy(2,&ac);
-	
-	__UHEAP_MARKEND;
-	}
-
-
-void CTStepClient::GetIdentitiesLC(RArray<TIdentityId>& aIds)
-/**
-	Populate the supplied array with the currently available
-	identities, as returned by the server.
-	
-	@param	aIds			Array to populate.  Any existing entries
-							are removed when this function is called.
-							On success, the array is placed on the
-							cleanup stack.
- */
-	{
-	aIds.Reset();
-	CleanupClosePushL(aIds);
-	
-	RAuthClient ac;
-	User::LeaveIfError(ac.Connect());
-	CleanupClosePushL(ac);
-	ac.IdentitiesL(aIds);	// clears array on failure?
-	CleanupStack::PopAndDestroy(&ac);
-	}
-
-
-void CTStepClient::AddIdentityL(TIdentityId aIdentityId, const TDesC& aDesc)
-/**
-	Add the described identity directly to the database.
-	
-	This function does not use the authentication manager APIs.
- */
-	{
-	WaitForServerToReleaseDb();
-	CAuthDb2* db = CAuthDb2::NewL(iFs);
-	CleanupStack::PushL(db);
-	db->AddIdentityL(aIdentityId, aDesc);
-	CleanupStack::PopAndDestroy(db);
-	}
-
-
-void CTStepClient::TestIdentityL(TIdentityId aIdentityId, const TDesC& aExpDesc)
-/**
-	Test the supplied identity has the supplied description,
-	as read via the RAuthClient API.
-	
-	@param	aIdentityId		Identity to retrieve description for.
-	@param	aExpDesc		The expected description.
- */
-	{
-	RAuthClient ac;
-	CleanupClosePushL(ac);
-	User::LeaveIfError(ac.Connect());
-	HBufC* desc = ac.IdentityStringL(aIdentityId);
-	CleanupStack::PushL(desc);
-	TESTL(*desc == aExpDesc);
-	CleanupStack::PopAndDestroy(2, &ac);
-	}
-
-
-/**
-	TestClientPluginListsL poulates this with a description for
-	every plugin that can be seen with ECOM.
- */
-static RCPointerArray<CPluginDesc> allPlugins;
-
-/**
-	Total number of plugins on the device.  Should be equal to
-	allPlugins.Count().
- */
-static TInt totalCount;
-
-/**
-	Maximum number of plugins which can are expected.  This is
-	an arbitrary value which is used to size an array.  It can be
-	changed if required.
- */
-const TInt KMaxSeenCount = 17;
-
-/**
-	This array stores how many times each plugin from allPlugins
-	has been seen.  It is set by SetSeenCountsL.
- */
-static TFixedArray<TInt, KMaxSeenCount> seenCounts;
-
-
-void CTStepClient::GetDescriptionsFromEComL(RPointerArray<CPluginDesc>& aDescs)
-/**
-	Populate the supplied array with plugin descriptions generated
-	from the available ECOM plugins.  The array can then be used to
-	check the results from the server.
- */
-	{
-	WaitForServerToReleaseDb();
-	
-	CAuthDb2* db = CAuthDb2::NewL(iFs);
-	CleanupStack::PushL(db);
-	
-	// typedef RPointerArray<CImplementationInformation> RImplInfoPtrArray;
-	RCPointerArray<CImplementationInformation> implInfo;
-	REComSession::ListImplementationsL(KCAuthPluginInterfaceUid, implInfo);
-	CleanupClosePushL(implInfo);
-	
-	TInt implCount = implInfo.Count();
-	TInt err = 0;
-	for (TInt i = 0; i < implCount; ++i)
-		{
-		// avoid RVCT warning C2874W: pi may be used before being set
-		CAuthPluginInterface* pi = 0;
-
-		TEComResolverParams resolverParams;
-		TBufC8<16> pluginIdTxt;
-		  
-		pluginIdTxt.Des().Format(_L8("%x"), implInfo[i]->ImplementationUid().iUid);
-		pluginIdTxt.Des().UpperCase();	  
-		resolverParams.SetDataType(pluginIdTxt);
-		 
-		//To load plugins from sources other than ROM the patch 
-		// data KEnablePostMarketAuthenticationPlugins must be set to True.
-		TUint32 enablePostMarketPlugin = KEnablePostMarketAuthenticationPlugins;
-
-#ifdef __WINS__
-
-    	// Default SymbianOS behavior is to only load auth plugins from ROM.
-		enablePostMarketPlugin = 0;
-
-		// For the emulator allow the constant to be patched via epoc.ini
-		UserSvr::HalFunction(EHalGroupEmulator, EEmulatorHalIntProperty,
-		(TAny*)"KEnablePostMarketAuthenticationPlugins", &enablePostMarketPlugin); // read emulator property (if present)
-
-#endif			  
-		TAny* plugin = 0; 
-		TUid Dtor_ID_Key = TUid::Null();
-		if(enablePostMarketPlugin == 0) 
-			{
-			TRAP(err, plugin = 
-			REComSession::CreateImplementationL(KCAuthPluginInterfaceUid,
-												Dtor_ID_Key,
-												resolverParams,
-												KRomOnlyResolverUid));
-			}
-			  
-		else
-		  	{
-		  	TRAP(err, plugin = 
-			REComSession::CreateImplementationL(KCAuthPluginInterfaceUid,
-												Dtor_ID_Key,
-												resolverParams));
-		  	}
-					  
-		if (err == KErrAuthServNoSuchPlugin)
-			continue;
-		User::LeaveIfError(err);
-		pi = reinterpret_cast<CAuthPluginInterface*>(plugin);	
-	
-		// get training status from db
-		TAuthTrainingStatus ts = db->PluginStatusL(pi->Id());
-		
-		CleanupStack::PushL(pi);
-		CPluginDesc* pd = CPluginDesc::NewL(
-			pi->Id(), pi->Name(), pi->Type(),
-			ts, pi->MinEntropy(),
-			pi->FalsePositiveRate(), pi->FalseNegativeRate() );
-		CleanupStack::PopAndDestroy(pi);
-		REComSession::DestroyedImplementation(Dtor_ID_Key);
-		
-		CleanupStack::PushL(pd);
-		aDescs.AppendL(pd);
-		CleanupStack::Pop(pd);
-		}
-	
-	CleanupStack::PopAndDestroy(2, db);
-	REComSession::FinalClose();
-	}
-
-
-static TBool AreDescsEqual(const CPluginDesc& aLeft, const CPluginDesc& aRight)
-/**
-	Predicate function determines whether the two supplied
-	plugin descriptions contain the same information.
-
-	@param	aLeft			Plugin description to compare to aRight.
-	@param	aRight			Plugin description to compare to aLeft.
-	@return					Zero if the two descriptions contains different
-							information, non-zero otherwise.
- */
-	{
-	return	aLeft.Id() == aRight.Id()
-		&&	*aLeft.Name() == *aRight.Name()
-		&&	aLeft.Type() == aRight.Type()
-		&&	aLeft.TrainingStatus() == aRight.TrainingStatus()
-		&&	aLeft.MinEntropy() == aRight.MinEntropy()
-		&&	aLeft.FalsePositiveRate() == aRight.FalsePositiveRate()
-		&&	aLeft.FalseNegativeRate() == aRight.FalseNegativeRate();
-	}
-
-
-inline TBool AreDescsEqual(const CPluginDesc* aLeftP, const CPluginDesc* aRightP)
-	{
-	return AreDescsEqual(*aLeftP, *aRightP);
-	}
-	
-
-void CTStepClient::SetSeenCountsL(const RCPointerArray<const CPluginDesc>& aPlugins)
-/**
-	Update seenCounts array so each entry contains the
-	number of times that plugin was seen in aPlugins.
- */
-	{
-	const TInt suppliedCount = aPlugins.Count();
-	const TInt totalCount = allPlugins.Count();
-	
-	// i = index into seenCounts
-	for (TInt i = 0; i < totalCount; ++i)
-		{
-		seenCounts[i] = 0;
-		
-		// j = index into aPlugins
-		TInt j = 0;
-		for (; j < suppliedCount; ++j)
-			{
-			if (AreDescsEqual(*allPlugins[i], *aPlugins[j]))
-				{
-				++seenCounts[i];
-				break;		// assume plugins in allPlugins are unique
-				}
-			}
-		
-		// if plugin not found in reference set then abort
-		TESTL(j < totalCount);
-		}
-	}
-
-
-void CTStepClient::TestClientPluginListsL()
-/**
-	Test the expected plugins are returned when the
-	client asks the server to list them.
- */
-	{	
-	__UHEAP_MARK;
-	
-	CleanupClosePushL(allPlugins);
-	GetDescriptionsFromEComL(allPlugins);
-	PrepareTrainedPluginsL();
-	
-	// re-read plugins now training statuses have been set
-	allPlugins.ResetAndDestroy();	
-	GetDescriptionsFromEComL(allPlugins);
-	CleanupClosePushL(allPlugins);
-	
-	totalCount = allPlugins.Count();
-	TESTL(totalCount <= KMaxSeenCount);
-	
-	RAuthClient ac;
-	User::LeaveIfError(ac.Connect());
-	CleanupClosePushL(ac);
-	
-	// ensure all plugins are returned by PluginsL
-	RCPointerArray<const CPluginDesc> fullPlugins;
-	ac.PluginsL(fullPlugins);
-	CleanupClosePushL(fullPlugins);
-	TESTL(fullPlugins.Count() == totalCount);
-	SetSeenCountsL(fullPlugins);
-	for (TInt k = 0; k < totalCount; ++k)
-		{
-		TESTL(seenCounts[k] == 1);
-		}
-	CleanupStack::PopAndDestroy(&fullPlugins);
-	
-	// ensure expected plugins are returned for each type
-	TestTypedPluginsL(ac, EAuthKnowledge);
-	TestTypedPluginsL(ac, EAuthBiometric);
-	TestTypedPluginsL(ac, EAuthToken);
-
-	TestActivePluginsL(ac);
-	
-	CleanupStack::PopAndDestroy(&ac);
-	
-	TestTrainedPluginsL();
-	
-	CleanupStack::PopAndDestroy(2, &allPlugins);
-	
-	__UHEAP_MARKEND;
-	}
-
-
-void CTStepClient::TestTypedPluginsL(RAuthClient& aClient,
-									 TAuthPluginType aPluginType)
-/**
-	Ensure the plugin descriptions returned by the server
-	match those directly seen by ECOM.
-	
-	@param	aPluginType		Type of plugin to retrieve.
- */
-	{
-	__UHEAP_MARK;
-	RCPointerArray<const CPluginDesc> typedPlugins;
-	aClient.PluginsOfTypeL(aPluginType, typedPlugins);
-	CleanupClosePushL(typedPlugins);
-	SetSeenCountsL(typedPlugins);
-	
-	for (TInt k = 0; k < totalCount; ++k)
-		{
-		TInt& recCount = seenCounts[k];
-		TESTL(recCount == (allPlugins[k]->Type() == aPluginType) ? 1 : 0);
-		}
-	
-	CleanupStack::PopAndDestroy(&typedPlugins);
-	__UHEAP_MARKEND;
-	}
-
-
-void CTStepClient::TestActivePluginsL(RAuthClient& aClient)
-/**
-	Ensure the plugin descriptions returned by the server
-	match those directly seen by ECOM.
- */
-	{
-	__UHEAP_MARK;
-	RCPointerArray<const CPluginDesc> activePlugins;
-	aClient.ActivePluginsL(activePlugins);
-	CleanupClosePushL(activePlugins);
-		
-	CleanupStack::PopAndDestroy(&activePlugins);
-	__UHEAP_MARKEND;
-	}
-
-void CTStepClient::TestTrainedPluginsL()
-/**
-	Test the expected plugins are returned when filtering
-	for training types.
-	
-	@param	aClient			Client with open connection to auth server.
- */
-	{
-	RCPointerArray<const CPluginDesc> pids;
-	CleanupClosePushL(pids);
-	
-	RAuthClient ac;
-	User::LeaveIfError(ac.Connect());
-	CleanupClosePushL(ac);
-	
-	const CPluginDesc* pdsc0 = allPlugins[0];
-	const CPluginDesc* pdsc1 = allPlugins[1];
-	const CPluginDesc* pdsc2 = allPlugins[2];
-	const CPluginDesc* pdsc3 = allPlugins[3];
-
-	ac.PluginsWithTrainingStatusL(EAuthUntrained, pids);
-	TInt filterCount = pids.Count();
-	TESTL(filterCount == totalCount - 4);
-	for (TInt i = 0; i < filterCount; ++i)
-	{
-		const CPluginDesc* pidF = pids[i];
-		TBool eq0 = AreDescsEqual(pidF, pdsc0);
-		TBool eq1 = AreDescsEqual(pidF, pdsc1);
-		TBool eq2 = AreDescsEqual(pidF, pdsc2);
-		TBool eq3 = AreDescsEqual(pidF, pdsc3);
-		TESTL(!eq0 && !eq1 && !eq2 && !eq3);
-		}
-
-	pids.ResetAndDestroy();
-	ac.PluginsWithTrainingStatusL(EAuthTrained, pids);
-	TESTL(pids.Count() == 2);
-	TESTL(	(AreDescsEqual(pids[0], pdsc0) && AreDescsEqual(pids[1], pdsc1))
-		||	(AreDescsEqual(pids[0], pdsc1) && AreDescsEqual(pids[1], pdsc0)) );
-	
-	pids.ResetAndDestroy();
-	ac.PluginsWithTrainingStatusL(EAuthFullyTrained, pids);
-	TESTL(pids.Count() == 2);
-	TESTL(	(AreDescsEqual(pids[0], pdsc2) && AreDescsEqual(pids[1], pdsc3))
-		||	(AreDescsEqual(pids[0], pdsc3) && AreDescsEqual(pids[1], pdsc2)) );
-	
-	CleanupStack::PopAndDestroy(2, &pids);
-	}
-
-
-void CTStepClient::PrepareTrainedPluginsL()
-/**
-	Helper function for TestTrainedPluginsL.
-	
-	Train some plugins so they can be filtered out later.
-	This function replaces the database.
- */
-	{
-	// There have to be at least four available plugins
-	// to run the training status test.
-	TESTL(allPlugins.Count() >= 4);
-	
-	RemoveExistingDbL();
-	CAuthDb2* db = CAuthDb2::NewLC(iFs);
-
-	db->AddIdentityL(KIdentity1Id, KIdentity1Desc);
-	db->AddIdentityL(KIdentity2Id, KIdentity2Desc);
-
-	const CTransientKeyInfo& tki = *iId1Keys[0];
-	
-	// partially train plugins zero and one
-	TPluginId pid0 = allPlugins[0]->Id();
-	TPluginId pid1 = allPlugins[1]->Id();
-	db->SetTrainedPluginL(KIdentity1Id, pid0, tki);
-	db->SetTrainedPluginL(KIdentity2Id, pid1, tki);
-
-	// fully train plugins two and three
-	TPluginId pid2 = allPlugins[2]->Id();
-	TPluginId pid3 = allPlugins[3]->Id();
-	db->SetTrainedPluginL(KIdentity1Id, pid2, tki);
-	db->SetTrainedPluginL(KIdentity2Id, pid2, tki);
-	db->SetTrainedPluginL(KIdentity1Id, pid3, tki);
-	db->SetTrainedPluginL(KIdentity2Id, pid3, tki);
-
-	CleanupStack::PopAndDestroy(db);
-	}
-
-TBool CTStepClient::TestMultiAuthL()
-	{
-	INFO_PRINTF1(_L("Testing only a single client can make an auth "));
-	INFO_PRINTF1(_L("request at any one time"));	
-	
-	RAuthClient ac1;
-	User::LeaveIfError(ac1.Connect());
-	CleanupClosePushL(ac1);
-
-	RAuthClient ac2;
-	User::LeaveIfError(ac2.Connect());
-	CleanupClosePushL(ac2);
-
-    CIdentity* result1 = 0;
-    CAuthActive active1(ac1, result1, this);
-    active1.doAuthenticate(KTestPluginBlocking,0);
-
-    CIdentity* result2 = 0;
-    CAuthActive active2(ac2, result2, this, EFalse);
-    active2.doAuthenticate(KTestPluginBlocking,0);
-	
-	CActiveScheduler::Start();
-
-    TEST(active1.iErr == KErrNone);
-	TEST(active2.iErr == KErrServerBusy);
-	
-    delete result1;
-	delete result2;
-	
-	CleanupStack::PopAndDestroy(2,&ac1);
-	return ETrue;
-	}
-
-
-TBool CTStepClient::TestAuthenticateL()
-/**
-	Send simple authentication request.
- */
-	{
-	// create a transient key
-	CProtectionKey* key = CProtectionKey::NewLC(8);
-	CTransientKeyInfo* tki = CTransientKeyInfo::NewLC(KTestPluginId22);
-	
-	CTransientKey* tk = tki->CreateTransientKeyL(KIdentifyData);
-	CleanupStack::PushL(tk);
-	
-	CEncryptedProtectionKey* epKey = tk->EncryptL(*key);
-	CleanupStack::PushL(epKey);
-	
-	tki->SetEncryptedProtectionKeyL(epKey);
-	CleanupStack::Pop(epKey);	// now owned by tki
-	
-	// create identity 22, which identified by test plugin
-	WaitForServerToReleaseDb();
-	CAuthDb2* db = CAuthDb2::NewL(iFs);
-	CleanupStack::PushL(db);	
-	db->AddIdentityL(22, _L("22-desc"));
-	db->SetTrainedPluginL(22, KTestPluginId22, *tki);
-
-	CleanupStack::PopAndDestroy(4, key);	// tki, tk, db
-	
-	RAuthClient ac;
-	User::LeaveIfError(ac.Connect());
-	CleanupClosePushL(ac);
-
-	RAuthMgrClient amc;
-	User::LeaveIfError(amc.Connect());
-	CleanupClosePushL(amc);
-
-	TInt eventId = KUnknownIdentity;
-	TLastAuth lastAuth;
-	TPckg<TLastAuth> lastAuthPckg(lastAuth);
-
-	TInt err = RProperty::Get(KAuthServerSecureId, KUidAuthServerLastAuth,
-							  lastAuthPckg);
-	RProperty::Get(KAuthServerSecureId, KUidAuthServerAuthChangeEvent, eventId);
-	TESTL(eventId == KUnknownIdentity);
-	TESTL(lastAuth.iId == KUnknownIdentity);
-	TESTL(lastAuth.iAuthTime == 0);
-	TESTL(lastAuth.iMaxCombinations == 0);
-	TESTL(lastAuth.iFalsePositiveRate == 0);
-	TESTL(lastAuth.iFalseNegativeRate == 0);
-	TESTL(lastAuth.iNumFactors == 0);
-	
-	// authenticate the client with the test plugin but using type
-	
-	amc.SetPreferredTypePluginL(EAuthKnowledge,
-								KTestPluginId22);
-    CleanupStack::PopAndDestroy(&amc);
-	TESTL(KTestPluginId22 == ac.PreferredTypePluginL(EAuthKnowledge));
-
-	CAuthExpression* ae = AuthExpr(EAuthKnowledge);		// plugin type
-	User::LeaveIfNull(ae);
-	CleanupStack::PushL(ae);
-
-    CIdentity* result = 0;
-    result = ac.AuthenticateL(
-    	*ae,		// aExpression
-    	0,			// aTimeout
-    	ETrue,     // aClientSpecificKey       
-		EFalse);	// aWithString
-	INFO_PRINTF3(_L("1. Id = 0x%x , KeyLength = %d\n"), result->Id(),
-				 result->Key().KeyData().Size());
-	TESTL(result->Id() == 22);
-	delete result;
-
-	RProperty::Get(KAuthServerSecureId, KUidAuthServerLastAuth, lastAuthPckg);
-	RProperty::Get(KAuthServerSecureId, KUidAuthServerAuthChangeEvent, eventId);
-	TESTL(eventId == eventId);
-	TESTL(lastAuth.iId == 22);
-	TTime now;
-	TTimeIntervalSeconds since;
-	now.UniversalTime();
-	now.SecondsFrom(lastAuth.iAuthTime, since);
-	TESTL(since < TTimeIntervalSeconds(5));
-	TESTL(lastAuth.iMaxCombinations == KEntropy);
-	TESTL(lastAuth.iFalsePositiveRate == KFalsePos);
-	TESTL(lastAuth.iFalseNegativeRate == KFalseNeg);
-	TESTL(lastAuth.iNumFactors == 1);
-	
-	
-	// authenticate again, to get cached value
-    result = ac.AuthenticateL(
-    	*ae,		// aExpression
-    	55,			// aTimeout
-    	ETrue,      // aClientSpecificKey
-		ETrue);	    // aWithString
-	TDesC p = result->String();
-	INFO_PRINTF4(_L("2. Id = 0x%x , KeyLength = %d, String = %S\n"), result->Id(),
-				 result->Key().KeyData().Size(), &p);
-	TESTL(result->Id() == 22);
-	delete result;
-
-	
-	// deauthenticate
-	TRAP(err, ac.DeauthenticateL());
-	TESTL(err == KErrNone);
-
-	RProperty::Get(KAuthServerSecureId, KUidAuthServerLastAuth, lastAuthPckg);
-	RProperty::Get(KAuthServerSecureId, KUidAuthServerAuthChangeEvent, eventId);
-	TESTL(eventId == KUnknownIdentity);
-	TESTL(lastAuth.iId == KUnknownIdentity);	
-	TESTL(lastAuth.iAuthTime == 0);
-	TESTL(lastAuth.iMaxCombinations == 0);
-	TESTL(lastAuth.iFalsePositiveRate == 0);
-	TESTL(lastAuth.iFalseNegativeRate == 0);
-	TESTL(lastAuth.iNumFactors == 0);
-		
-    result = 0;
-    CAuthActive active(ac, result, this);
-    active.doAuthenticate(KTestPluginId22,0);		
-	CActiveScheduler::Start();
-	INFO_PRINTF3(_L("3. Id = 0x%x , KeyLength = %d"), result->Id(),
-				 result->Key().KeyData().Size());
-    TESTL(result->Id() == 22);
-	delete result;
-
-	
-	// unknown
-    result = 0;
-    active.doAuthenticate(KTestPluginIdUnknown,0);		
-	CActiveScheduler::Start();
-	INFO_PRINTF2(_L("4. Id = 0x%x"),result->Id());
-	TESTL(result->Id() == KUnknownIdentity);
-	delete result;
-
-	
-	// failure (bad plugin)
-    result = 0;
-    active.doAuthenticate(0xD0DAD0DA,0);		
-	CActiveScheduler::Start();
-	INFO_PRINTF3(_L("5. CAuthActive:RunL err %d : res = 0x%x"),
-				 active.iErr, result);
-	TESTL(active.iErr == KErrAuthServNoSuchPlugin && result == 0);
-	
-	CleanupStack::PopAndDestroy(2, &ac);	// ae, ac
-	return ETrue;
-	}
-
-void CTStepClient::TestSetIdentityStrL()
-    {
-	// assumes TestAuthenticateL has been called and id 22 is created
-	RAuthClient ac;
-	User::LeaveIfError(ac.Connect());
-	CleanupClosePushL(ac);
-
-	_LIT(KId22DescNew, "ID22NewDesc");
-
-	HBufC* desc = ac.IdentityStringL(22);
-	CleanupStack::PushL(desc);
-	TESTL(*desc == _L("22-desc")); 
-	CleanupStack::PopAndDestroy(desc); 
-	
-	ac.SetIdentityStringL(22, KId22DescNew);
-	
-	desc = ac.IdentityStringL(22);
-	CleanupStack::PushL(desc); 
-	TESTL(*desc == KId22DescNew); 
-	CleanupStack::PopAndDestroy(desc); 
-	
-	CleanupStack::PopAndDestroy(&ac);
-	}    
-
-						 
-
-TVerdict CTStepClient::doTestStepL()
-	{
-	if (TestStepResult() != EPass)
-		return TestStepResult();
-	SetTestStepResult(EPass);
-	__UHEAP_MARK;
-	
-	CActiveScheduler::Install(iActSchd);
-	
-	INFO_PRINTF1(_L("Test identities"));
-	TestIdentitiesL();
-	
-	INFO_PRINTF1(_L("Test ClientPluginLists"));
- 	TestClientPluginListsL();
- 	
- 	INFO_PRINTF1(_L("Test Authenticate"));
-	TestAuthenticateL();
-	
-	INFO_PRINTF1(_L("Test MultiAuth"));
-	TestMultiAuthL();
-	
-	INFO_PRINTF1(_L("Test SetIdentityStr"));
-	TestSetIdentityStrL();
-	
-	__UHEAP_MARKEND;	
-	
-	return EPass;
-	}
-
-
--- a/authenticationservices/authenticationserver/test/tauthcliserv/step_firststart.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,78 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include "tauthcliservstep.h"
-#include <test/testexecutelog.h>
-
-#include "authserver/authmgrclient.h"
-#include "authserver/identity.h"
-
-#include <s32file.h>
-
-using namespace AuthServer;
-
-CTStepFirstStart::CTStepFirstStart()
-	{
-	SetTestStepName(KTStepFirstStart);
-	}
-
-TVerdict CTStepFirstStart::doTestStepL()
-	{
-	if (TestStepResult() != EPass)
-		{
-		INFO_PRINTF1(_L("Previous step failed"));
-
-		return TestStepResult();
-		}
-__UHEAP_MARK;		// Check for memory leaks
-    SetTestStepResult(EFail);
-    
-	TBool res = ETrue;
-	TBool tmp = ETrue;
-	TInt  err = KErrNone;
-
- 	User::SetJustInTime(ETrue);
-
-    TRAP(err, RemoveExistingDbL());
-    
-	RAuthClient client;
-	err = client.Connect();
-	CleanupClosePushL(client);
-
-    TEST(tmp = (err == KErrNone));
-    res = tmp && res;
-    INFO_PRINTF2(_L("Connect result = %d"), err);
-    
-	RIdentityIdArray ids;
-	client.IdentitiesL(ids); 
-	
-	TEST(tmp = ids.Count() == 1);
-    res = tmp && res;
-
-	HBufC* str = client.IdentityStringL(ids[0]);
-	CleanupStack::PushL(str);
-	
-	ids.Close();
-	
-	SetTestStepResult(res ? EPass : EFail);
-
-	CleanupStack::PopAndDestroy(2, &client);
-__UHEAP_MARKEND;	
-	return TestStepResult();
-	}
-
--- a/authenticationservices/authenticationserver/test/tauthcliserv/step_mgrclient.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,501 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include <bautils.h>
-#include <s32file.h>
-#include <test/testexecutelog.h>
-
-#include "authserver/authmgrclient.h"
-#include "authserver/identity.h"
-#include "tauthcliservstep.h"
-
-using namespace AuthServer;
-
-class CRegActive : public CActive
-    {
-    public:
-    CRegActive(RAuthMgrClient& aClient, CIdentity*& aResult, TBool aStop = ETrue) : 
-         CActive(EPriorityNormal),
-         iFirstTime(true),
-         iClient(aClient), 
-         iResult(aResult),
-         iStop(aStop)
-        {
-        CActiveScheduler::Add(this);
-        }
-    void doReg()
-        {
-        SetActive();		
-		TRequestStatus* status = &iStatus;		    
-		User::RequestComplete(status, KErrNone);
-		iFirstTime = ETrue;				
-        }
-        void DoCancel() 
-        {
-        }
-     void RunL() 
-        {
-        if (iFirstTime)
-            {
-			SetActive();
-            iStatus = KRequestPending;
-            iClient.RegisterIdentityL(iResult, _L("SOMENAME"), iStatus);
-            iFirstTime = false;
-            }
-        else
-            {
-            if (iStop)
-                {
-                CActiveScheduler::Stop();
-                }
-            iErr = iStatus.Int();
-			}
-        }
-        TBool iFirstTime;
-        RAuthMgrClient& iClient;
-        CIdentity*& iResult;
-        TBool iStop;
-        TInt iErr;
-    };
-
-class CTrainActive : public CActive
-    {
-    public:
-    CTrainActive(RAuthMgrClient& aClient, TBool aStop = ETrue) : 
-         CActive(EPriorityNormal),
-         iClient(aClient),
-		 iResult(EFail),
-         iRunCount(0),
-         iStop(aStop)
-        {
-        CActiveScheduler::Add(this);
-        }
-    void doTrain() 
-        {
-
-        SetActive();		
-		TRequestStatus* status = &iStatus;		    
-		User::RequestComplete(status, KErrNone);
-		iRunCount = 0;
-        }
-        void DoCancel() 
-        {
-        }
-     void RunL() 
-        {
-        iErr = iStatus.Int();
-        if (iStatus.Int() != KErrNone)
-            {
-            }
-		switch (iRunCount)
-		  {
-		  case 0:
-            iStatus = KRequestPending;
-			iAe = AuthExpr(0x10274104);
-			iId = 0;
-
-			iClient.AuthenticateL(*iAe, 10, EFalse, EFalse, iId, iStatus);
-			SetActive();
-
-			break;
-		  case 1:
-			delete iAe;
-			delete iId;
-            iStatus = KRequestPending;
-            iClient.TrainPlugin(22, 0x10274104, iStatus);
-			SetActive();
-
-			break;
-   		  case 2:
-			iResult = iStatus.Int() == KErrNone ? EPass : EFail;
-            iErr = iStatus.Int();
-			if (iStop)
-                {
-                CActiveScheduler::Stop();
-                }
-
-			break;
-     	  default:
-			iResult = EFail;
-			
-			if (iStop)
-			    {
-			    CActiveScheduler::Stop();
-			    }
-		    }
-		  ++iRunCount;
-          }
-	RAuthMgrClient& iClient;
-	TVerdict iResult;
-	TInt iRunCount;
-	CAuthExpression* iAe;
-	CIdentity* iId;
-    TBool iStop;
-    TInt iErr;
-    };
-
-class CTrainActive2 : public CActive
-    {
-    public:
-    CTrainActive2(RAuthMgrClient& aClient, TBool aStop = ETrue) : 
-         CActive(EPriorityNormal),
-         iClient(aClient),
-         iRunCount(0),
-         iStop(aStop)
-        {
-        CActiveScheduler::Add(this);
-        }
-    void doTrain() 
-        {
-        SetActive();		
-		iClient.TrainPlugin(22, 0x10274105, iStatus);
-		}
-	void DoCancel() 
-        {
-        }
-	void RunL()
-	    {
-		iErr = iStatus.Int();
-		if (iStop)
-		    {
-			CActiveScheduler::Stop();
-		    }
-	    }
-	
-	RAuthMgrClient& iClient;
-	TInt iRunCount;
-	CAuthExpression* iAe;
-	CIdentity* iId;
-    TBool iStop;
-    TInt iErr;
-    };
-
-class CCancelActive : public CActive
-    {
-    public:
-    CCancelActive(RAuthMgrClient& aClient) : 
-         CActive(EPriorityNormal),
-         iClient(aClient),
-		 iResult(EFail),
-         iRunCount(0)
-        {
-        CActiveScheduler::Add(this);
-        }
-    void doIdCancel() 
-        {
-        SetActive();		
-		TRequestStatus* status = &iStatus;		    
-		User::RequestComplete(status, KErrNone);
-		iMode = 1;
-		iRunCount = 0;
-        }
-    void doRegCancel() 
-        {
-        SetActive();		
-		TRequestStatus* status = &iStatus;		    
-		User::RequestComplete(status, KErrNone);
-		iMode = 2;
-		iRunCount = 0;
-        }
-    void doTrainCancel() 
-        {
-        SetActive();		
-		TRequestStatus* status = &iStatus;		    
-		User::RequestComplete(status, KErrNone);
-		iMode = 0;
-		iRunCount = 0;
-        }
-	void DoCancel() 
-        {
-        }
-     void RunL() 
-        {
-        if (iStatus.Int() != KErrNone)
-            {
-			  //RDebug::Printf("CCancelActive error: %d", iStatus.Int());
-            }
-		switch (iRunCount)
-		  {
-		  case 0:
-            iStatus = KRequestPending;
-			iAe = AuthExpr(0x10274105);
-			iId = 0;
-			switch (iMode)
-			  {
-			  case 2:
-				iClient.RegisterIdentityL(iId, _L("RegCancelID"), iStatus);
-				break;
-			  case 1:
-				iClient.AuthenticateL(*iAe, 0, EFalse, ETrue, iId, iStatus);
-			    break;
-			  case 0:
-				iClient.TrainPlugin(22, 0x10274105, iStatus);
-				break;
-			  }
-			SetActive();
-            User::After(1000000);
-            iClient.Cancel();
-
-			break;
-		  case 1:
-			//iStatus = KRequestPending;
-
-			delete iAe;
-			delete iId;
-            //SetActive();
-
-		    //break;
-   		  case 2:
-			iResult = iStatus.Int() == KErrCancel ? EPass : EFail;
-            CActiveScheduler::Stop();
-
-			break;
-     	  default:
-			iResult = EFail;
-            CActiveScheduler::Stop();
-		  }
-		++iRunCount;
-        }
-	RAuthMgrClient& iClient;
-	TVerdict iResult;
-	TInt iRunCount;
-	CAuthExpression* iAe;
-	CIdentity* iId;
-	TInt iMode;
-    };
-
-
-CTStepMgrClient::CTStepMgrClient()
-	{
-	SetTestStepName(KTStepMgrClient);
-	}
-
-
-TBool CTStepMgrClient::TestMultiRegisterL(RAuthMgrClient& client)
-    {
-    CIdentity* result = 0;
-    CRegActive active(client, result);
-    
-    CIdentity* result2 = 0;
-    RAuthMgrClient client2;
-    User::LeaveIfError(client2.Connect());
-    CleanupClosePushL(client2);
-    
-    CRegActive active2(client2, result2, EFalse);
-
-    active.doReg();		
-    active2.doReg();		
-    
-	CActiveScheduler::Start();
-
-    TEST(active.iErr == KErrNone);
-    TEST(active2.iErr == KErrServerBusy);
-    
-    delete result;
-    delete result2;
-    CleanupStack::PopAndDestroy(&client2);
-	return ETrue;
-    
-    }
-
-TBool CTStepMgrClient::TestRegister(RAuthMgrClient& client)
-  {
-    CIdentity* result = 0;
-    CRegActive active(client, result);
-
-    active.doReg();		
-
-	CActiveScheduler::Start();
-    if (result == 0)
-        {
-        return EFalse;
-        }
-        
-	INFO_PRINTF3(_L("Id = %d , KeyLength = %d\n"), result->Id(), result->Key().KeyData().Size());
-	delete result;
-	result = 0;
-    return ETrue;
-  }
-
-TBool CTStepMgrClient::TestMultiTrainL(RAuthMgrClient& client)
-  {
-    CTrainActive2 active(client);
-    active.doTrain();		
-
-    RAuthMgrClient client2;
-    User::LeaveIfError(client2.Connect());
-    CleanupClosePushL(client2);
-    
-    CTrainActive2 active2(client2, EFalse);
-    active2.doTrain();		
-
-	CActiveScheduler::Start();
-	
-	TEST(active.iErr == KErrAuthServPluginCancelled); // blocking plugin returns
-	                                                  // cancelled if left to
-	                                                  // complete
-    TEST(active2.iErr == KErrServerBusy);
-    
-	CleanupStack::PopAndDestroy(&client2);	
-	INFO_PRINTF3(_L("Training Result (%d,%d)\n"),
-	     active.iErr,
-	     active2.iErr);
-	     
-	return true;
-  }
-
-
-TBool CTStepMgrClient::TestTrain(RAuthMgrClient& client)
-  {
-    CTrainActive active(client);
-    active.doTrain();		
-	CActiveScheduler::Start();
-	INFO_PRINTF2(_L("Training Result = %d\n"), active.iResult == EPass);
-	return active.iResult == EPass;
-  }
-
-TBool CTStepMgrClient::TestCancellation(RAuthMgrClient& client)
-  {
-    CCancelActive active(client);
-    
-    active.doTrainCancel();		
-	CActiveScheduler::Start();
-	TEST(active.iResult == EPass);
-	INFO_PRINTF2(_L("Training Cancel Result = %d\n"), active.iResult == EPass);
-
-    active.doTrainCancel();		
-	CActiveScheduler::Start();
-	TEST(active.iResult == EPass);
-	INFO_PRINTF2(_L("Training Cancel Result = %d\n"), active.iResult == EPass);
-
-    active.doTrainCancel();		
-	CActiveScheduler::Start();
-	TEST(active.iResult == EPass);
-	INFO_PRINTF2(_L("Training Cancel Result = %d\n"), active.iResult == EPass);
-
-    //User::After(5000000);
-    active.doIdCancel();		
-	CActiveScheduler::Start();
-	TEST(active.iResult == EPass);
-	INFO_PRINTF2(_L("Id Cancel Result = %d\n"), active.iResult == EPass);
-
-    active.doIdCancel();		
-	CActiveScheduler::Start();
-	TEST(active.iResult == EPass);
-	INFO_PRINTF2(_L("Id Cancel Result = %d\n"), active.iResult == EPass);
-
-	active.doRegCancel();		
-	CActiveScheduler::Start();
-	TEST(active.iResult == EPass);
-	INFO_PRINTF2(_L("Registration Cancel Result = %d\n"), active.iResult == EPass);
-		
-	return active.iResult == EPass;
-  }
-
-TVerdict CTStepMgrClient::doTestStepL()
-	{
-	TInt r = 0;
-	
-	if (TestStepResult() != EPass)
-		{
-		INFO_PRINTF1(_L("Previous step failed"));
-
-		return TestStepResult();
-		}
-
-		
-	WaitForServerToReleaseDb();
-	
-
-	TDriveUnit sysDrive (RFs::GetSystemDrive());
-	TDriveName sysDriveName (sysDrive.Name());
-	
-	_LIT(KDbSrcFile ,"\\authdb0.db");
-	TBuf<64> dbSrcFileName (sysDriveName);
-	dbSrcFileName.Append(KDbSrcFile);
-
-	TBuf<128> dbName(KDbName);
-	dbName[0] = 'A' + sysDrive;	
-
-	r = BaflUtils::CopyFile(iFs, dbSrcFileName, dbName);
-	
-	INFO_PRINTF2(_L("File copy returned %d"), r);
-
-	User::LeaveIfError(r);
-	
-
-	
-	__UHEAP_MARK;
-    SetTestStepResult(EPass);
-    
-	CActiveScheduler::Install(iActSchd);
-
-    
-	RAuthMgrClient mgrclient;
-	User::LeaveIfError(mgrclient.Connect());
-	CleanupClosePushL(mgrclient);
-	
-   	mgrclient.RemoveIdentityL(2);
-
-
-	RIdentityIdArray ids;
-	mgrclient.IdentitiesL(ids);
-	CleanupClosePushL(ids);
-
-	TESTL(ids.Count() == 3);
-
-	// ensure each expected identity occurs once.
-	// (This technique is simple but doesn't generalise.)
-	TInt sum = 0;
-	for (TInt i = 0; i < 3; ++i)
-		{
-		TIdentityId id = ids[i];
-		TESTL(id == 1 || id == 3 || id == 22);
-		sum += id;
-		}
-	TESTL(sum == 1 + 3 + 22);
-
-	CleanupStack::PopAndDestroy(&ids);
-
-	TEST(TestRegister(mgrclient));
-
-	mgrclient.IdentitiesL(ids);
-	CleanupClosePushL(ids);
-	TEST(ids.Count() == 4);
-	CleanupStack::PopAndDestroy(&ids);
-
-	TEST(TestTrain(mgrclient));
-
-	INFO_PRINTF1(_L("Testing cancellation"));
-    TEST(TestCancellation(mgrclient));
-    
-    INFO_PRINTF1(_L("Testing simultaneous registrations are blocked"));
-    TEST(TestMultiRegisterL(mgrclient));
-    
-    INFO_PRINTF1(_L("Testing simultaneous trainings are blocked"));
-    TestMultiTrainL(mgrclient);
-    
-	// Last plugin can't be removed 
-	TRAPD(err, mgrclient.ForgetPluginL(22,0x10274104));
-	TEST(err == KErrAuthServCanNotRemoveLastPlugin);
-	
-	CleanupStack::PopAndDestroy(1, &mgrclient);
-
-	__UHEAP_MARKEND;	
-	return EPass;
-	}
--- a/authenticationservices/authenticationserver/test/tauthcliserv/tauthcliserv.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,132 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* tauthdbserver.cpp
-* server implementation
-*
-*/
-
-
-/**
- @file 
-*/
-
-#include "tauthcliservstep.h"
-
-_LIT(KServerName,"tauthcliserv");
-
-/**
- * Called inside the MainL() function to create and start the CTestServer 
- * derived server.
- * @return Instance of the test server
- */
-CTAuthDbServer* CTAuthDbServer::NewL()
-	{
-	CTAuthDbServer * server = new (ELeave) CTAuthDbServer();
-	CleanupStack::PushL(server);
-	
-	// Either use a StartL or ConstructL, the latter will permit Server Logging.
-
-	server->ConstructL(KServerName);
-	CleanupStack::Pop(server);
-	return server;
-	}
-
-LOCAL_C void MainL()
-	{
-	// Leave the hooks in for platform security
-#if (defined __DATA_CAGING__)
-	RProcess().DataCaging(RProcess::EDataCagingOn);
-	RProcess().SecureApi(RProcess::ESecureApiOn);
-#endif
-	CActiveScheduler* sched=NULL;
-	sched=new(ELeave) CActiveScheduler;
-	CleanupStack::PushL(sched);
-	CActiveScheduler::Install(sched);
-	CTAuthDbServer* server = NULL;
-	// Create the CTestServer derived server
-	TRAPD(err,server = CTAuthDbServer::NewL());
-	if(!err)
-		{
-		RProcess::Rendezvous(KErrNone);
-		sched->Start();
-		}
-	CleanupStack::Pop(sched);
-	delete server;
-	delete sched;
-	}
-
-GLDEF_C TInt E32Main()
-	{
-	CTrapCleanup* cleanup = CTrapCleanup::New();
-	if(cleanup == NULL)
-		{
-		return KErrNoMemory;
-		}
-	TRAP_IGNORE(MainL());	
-	delete cleanup;
-	return KErrNone;
-    }
-
-CTestStep* CTAuthDbServer::CreateTestStep(const TDesC& aStepName)
-	{
-	CTestStep* testStep = NULL;
-
-	if(aStepName == KTStepClient)
-		{
-		testStep = new CTStepClient();
-		}
-	else if(aStepName == KTStepMgrClient)
-		{
-		testStep = new CTStepMgrClient();
-		}
-	else if(aStepName == KTStepFirstStart)
-		{
-		testStep = new CTStepFirstStart();
-		}
-
-	// authentication expression tests
-	else if (aStepName == KTStepAuthExprBuild)
-		{
-		testStep = new CTStepAuthExprBuild();
-		}
-	else if (aStepName == KTStepBadExtAuthExpr)
-		{
-		testStep = new CTStepBadExtAuthExpr();
-		}
-	else if (aStepName == KTStepAuthExprHighVer)
-		{
-		testStep = new CTStepAuthExprHighVer();
-		}
-	else if (aStepName == KTStepAuthExprEval)
-		{
-		testStep = new CTStepAuthExprEval();
-		}
-#ifdef _DEBUG
-	else if (aStepName == KTStepAuthExprTypePnc)
-		{
-		testStep = new CTStepAuthExprTypePnc();
-		}
-	else if (aStepName == KTStepAuthExprTypePncBadLeft)
-		{
-		testStep = new CTStepAuthExprTypePncBadLeft();
-		}
-	else if (aStepName == KTStepAuthExprTypePncBadRight)
-		{
-		testStep = new CTStepAuthExprTypePncBadRight();
-		}
-#endif
-
-	return testStep;
-	}
--- a/authenticationservices/authenticationserver/test/tauthcliserv/tauthcliserv.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,37 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* tauthdbserver.h
-* TAuthDbServer is the server for all authentication keys tests
-*
-*/
-
-
-#ifndef TAUTHDBSERVER_H
-#define TAUTHDBSERVER_H
-#include <test/testexecuteserverbase.h>
-
-class CTAuthDbServer : public CTestServer
-	{
-public:
-	static CTAuthDbServer*	NewL();
-	virtual CTestStep*      CreateTestStep(const TDesC& aStepName);
-	RFs& Fs()	{return iFs;};
-
-private:
-	RFs	iFs;
-	};
-
-#endif	/* TAUTHDBSERVER_H */
-
--- a/authenticationservices/authenticationserver/test/tauthcliserv/tauthcliserv.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,67 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-OPTION GCCE -Wno-multichar
-
-TARGET			tauthcliserv.exe
-TARGETTYPE		exe
-UID				0x1000007A 0x10204F0D
-VENDORID		0x70000001
-
-CAPABILITY TrustedUI ProtServ ReadDeviceData WriteDeviceData Location SurroundingsDD UserEnvironment ReadUserData WriteUserData AllFiles 
-
-USERINCLUDE		../../source/common
-USERINCLUDE		../../source/server
-USERINCLUDE		../../source/client
-USERINCLUDE		../../inc_private
-USERINCLUDE		../../inc/authserver
-
-OS_LAYER_SYSTEMINCLUDE
-SYSTEMINCLUDE OS_LAYER_PLATFORM_EXPORT_PATH(test)
-
-SOURCEPATH		.
-USERINCLUDE		.
-SOURCE			tauthcliserv.cpp
-SOURCE			step_base.cpp
-SOURCE			step_client.cpp
-SOURCE			step_mgrclient.cpp
-SOURCE			step_authexpr_build.cpp
-SOURCE			step_authexpr_eval.cpp
-SOURCE			step_firststart.cpp
-
-SOURCE			../../source/server/authserver.cpp
-SOURCE			../../source/server/authserversession.cpp
-SOURCE			../../source/server/authdb.cpp
-SOURCE			../../source/server/transientkeyinfo.cpp
-SOURCE			../../source/server/encryptedprotectionkey.cpp
-SOURCE			../../source/server/transientkey.cpp
-SOURCE			../../source/server/evaluator.cpp
-SOURCE			../../source/server/pluginmgr.cpp
-SOURCE			../../source/server/trainingmgr.cpp
-SOURCE			../../source/server/authtransaction.cpp
-SOURCE			../../source/server/pluginobserver.cpp
-SOURCE			../../source/server/authrepository.cpp
-
-LIBRARY			bafl.lib edbms.lib ecom.lib estor.lib efsrv.lib euser.lib 
-LIBRARY         testexecuteutils.lib testexecutelogclient.lib
-LIBRARY         authclient.lib authcommon.lib  scsclient.lib
-LIBRARY         cryptography.lib pbe.lib random.lib
-LIBRARY 		cinidata.lib	// add text INI file parsing ability
-LIBRARY			sectcbutil.lib
-LIBRARY			centralrepository.lib scsserver.lib
-SMPSAFE
--- a/authenticationservices/authenticationserver/test/tauthcliserv/tauthcliservstep.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,629 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#ifndef TAUTHCLISERVSTEP_H
-#define TAUTHCLISERVSTEP_H
-
-#include <e32cmn.h>
-#include <ct/rcpointerarray.h>
-#include <ecom/ecom.h>
-
-#include <test/testexecutestepbase.h>
-#include <test/testexecutelog.h>
-
-#include "tauthcliserv.h"
-
-#ifndef __INIPARSER_H__
-#include <cinidata.h>
-#endif // __INIPARSER_H__
-
-// publicly available include file
-#include "authserver_client.h"
-#include <authserver/authplugininterface.h>
-
-// these tests use some information which is normally
-// only visible to the server, or to the client DLL.
-
-#include "authserveripc.h"
-#include "authdb.h"
-#include "transientkey.h"
-#include "transientkeyinfo.h"
-#include "evaluator.h"
-
-// load test plugin data
-#include "../tauthplugins/consts.h"
-
-using AuthServer::TIdentityId;
-using AuthServer::TPluginId;
-using AuthServer::TAuthPluginType;
-using AuthServer::TAuthTrainingStatus;
-using AuthServer::CAuthExpression;
-using AuthServer::CAuthExpressionImpl;
-using AuthServer::TAuthExpressionWrapper;
-using AuthServer::CEvaluator;
-using AuthServer::CPluginDesc;
-using AuthServer::RAuthClient;
-
-// Authserver name
-_LIT(KAuthServerName, "!AuthServer");
-
-_LIT(KTStepCreateDb,"CREATEDB");
-_LIT(KTStepClient,	"CLIENT");
-_LIT(KTStepMgrClient,	"MGRCLIENT");
-_LIT(KTStepFirstStart,	"FIRSTSTART");
-
-_LIT(KTStepAuthExprBuild, "AuthExprBuild");
-_LIT(KTStepBadExtAuthExpr, "AuthExprBadAuthExt");
-_LIT(KTStepAuthExprHighVer, "AuthExprHighVer");
-_LIT(KTStepAuthExprEval, "AuthExprEval");
-
-// debug-mode tests for client-side panicks
-_LIT(KTStepAuthExprTypePnc, "AuthExprTypePanic");
-_LIT(KTStepAuthExprTypePncBadLeft, "AuthExprTypePanicBadLeft");
-_LIT(KTStepAuthExprTypePncBadRight, "AuthExprTypePanicBadRight");
-
-// These are used in the RemoveExistingDbL() function
-// applying to DBs used by tPinAuthPlugin
-_LIT(KPlugin3100File,		"\\tAuth\\tAuthSvr\\testdata\\Pin11113100Db.ini");
-_LIT(KPlugin3101File,		"\\tAuth\\tAuthSvr\\testdata\\Pin11113101Db.ini");
-_LIT(KPlugin3102File,		"\\tAuth\\tAuthSvr\\testdata\\Pin11113102Db.ini");
-_LIT(KAuthSvrPolicyFile, 	"\\tAuth\\tAuthSvr\\testdata\\AuthSvrPolicy.ini");
-_LIT(KPinDbTag,				"Identity&PinValues");
-_LIT(KTotalDbTag,			"AllUserID&PinValues");
-_LIT(KInitPinDatabaseValue,	",");
-_LIT(KDisplayMessage,		"DisplayMessage");
-
-#define KNumPlugins 8
-
-const TInt KTestPluginId22       = 0x10274104;
-const TInt KTestPluginBlocking   = 0x10274105;
-const TInt KTestPluginIdInactive = 0x10274106;
-const TInt KTestPluginIdUnknown  = 0x10274107;
-
-
-class CTAuthcliservStepBase : public CTestStep
-	{
-protected:
-	CTAuthcliservStepBase() {}
-	virtual ~CTAuthcliservStepBase();
-	virtual TVerdict doTestStepPreambleL()
-	   {
-	   iFs.Connect();
-	
-	   CreatePlugins();
-	   CreateKeyInfo();
-	   
-	   return TestStepResult();
-	   }
-	virtual TVerdict doTestStepPostambleL()
-    	{
-		iFs.Close();
-		return TestStepResult();
-		}
-	
-	inline void CreatePlugins();
-	inline void CreateKeyInfo();
-	HBufC* GetNameLC(TInt i);
-
-	void PluginData(AuthServer::TIdentityId aId,
-					AuthServer::TPluginId aPlugin,
-					TPtr8 aDes) 
-	{
-	aDes.Fill(aId*aPlugin);
-	}
-
-	void WaitForServerToReleaseDb();
-	void RemoveExistingDbL();
-	//Utility function allowing text INI file parsing abilities	
-	//Section name unspecified
-	TInt writeToNamedConfig(const TDesC &aFileName, const TDesC &aKeyName,const TPtrC &aResult);
-	
-	
-protected:
-	RFs		iFs;
-
-
-	AuthServer::CPluginDesc*       iPlugins[KNumPlugins];
-	AuthServer::CTransientKeyInfo* iId1Keys[KNumPlugins];
-	AuthServer::CTransientKeyInfo* iId2Keys[KNumPlugins];
-	AuthServer::CTransientKeyInfo* iId3Keys[KNumPlugins];
-  };
-
-inline CTAuthcliservStepBase::~CTAuthcliservStepBase() 
-    {
-    for (TInt i = 0 ; i < KNumPlugins ; ++i)
-        {
-        delete iPlugins[i];
-        delete iId1Keys[i];
-        delete iId2Keys[i];
-        delete iId3Keys[i];
-        }
-    }
-
-class CTStepActSch : public CTAuthcliservStepBase
-/**
-	This abstract subclass of CTAuthcliservStepBase
-	overrides the doTestStep(Pre|Post)ambleL functions
-	from CTestBase to allocate and free an active
-	scheduler.
-	
-	The scheduler is stored in the protected iActSchd
-	variable.  This class does not start or stop the
-	scheduler.
- */
-	{
-private:
-	// override CTestStep
-	inline virtual TVerdict doTestStepPreambleL();
-	inline virtual TVerdict doTestStepPostambleL();
-	
-protected:
-	/** The active scheduler which subclasses can use. */
-	CActiveScheduler* iActSchd;
-	};
-
-
-
-inline TVerdict CTStepActSch::doTestStepPreambleL()
-/**
-	Override CTestStep by allocating an active
-	scheduler which is available to the subclass.
-	
-	@return					This test step's result,
-							which isn't actually used
-							by ThreadStepExecutionL.
- */
-	{
-	CTAuthcliservStepBase::doTestStepPreambleL();
-	iActSchd = new(ELeave) CActiveScheduler;
-	return TestStepResult();
-	}
-
-
-inline TVerdict CTStepActSch::doTestStepPostambleL()
-/**
-	Override CTestStep by deleting the active
-	scheduler which allocated in doTestStepPreambleL.
-	
-	@return					This test step's result,
-							which isn't actually used
-							by ThreadStepExecutionL.
- */
-	{
-	CTAuthcliservStepBase::doTestStepPostambleL();
-	delete iActSchd;
-	return TestStepResult();
-	}
-
-
-class CTStepClient : public CTStepActSch
-	{
-public:
-	CTStepClient();
-	virtual TVerdict doTestStepL();
-	TBool TestAuthenticate(AuthServer::RAuthClient& client);
-	TBool TestAuthenticate2(AuthServer::RAuthClient& client);
-	TBool TestAuthenticate3(AuthServer::RAuthClient& client);
-	TBool TestAuthenticateFail(AuthServer::RAuthClient& client);
-
-
-
-private:
-	void GetDescriptionsFromEComL(RPointerArray<CPluginDesc>& aDescs);
-	
-	void TestIdentitiesL();
-	void GetIdentitiesLC(RArray<TIdentityId>& aIds);
-	void AddIdentityL(TIdentityId aIdentityId, const TDesC& aDesc);
-	void TestIdentityL(TIdentityId aIdentityId, const TDesC& aExpDesc);
-	void TestSetIdentityStrL();
-
-	void TestClientPluginListsL();
-	void SetSeenCountsL(const RCPointerArray<const CPluginDesc>& aPlugins);
-	void TestTypedPluginsL(RAuthClient& aClient, TAuthPluginType aPluginType);
-	void TestTrainedPluginsL();
-	void PrepareTrainedPluginsL();
-	void TestActivePluginsL(RAuthClient& aClient);
-	TBool TestAuthenticateL();
-	TBool TestMultiAuthL();
-	
-private:
-	RArray<TUid> iPluginIds;
-	};
-	
-class CTStepMgrClient : public CTStepActSch
-	{
-public:
-	CTStepMgrClient();
-	virtual TVerdict doTestStepL();
-	TBool TestRegister(AuthServer::RAuthMgrClient& client);
-	TBool TestMultiRegisterL(AuthServer::RAuthMgrClient& client);
-	
-	TBool TestMultiTrainL(AuthServer::RAuthMgrClient& client);
-	TBool TestTrain(AuthServer::RAuthMgrClient& client);
-	TBool TestCancellation(AuthServer::RAuthMgrClient& client);
-	};
-
-class CTStepFirstStart : public CTAuthcliservStepBase
-	{
-public:
-	CTStepFirstStart();
-	virtual TVerdict doTestStepL();
-	};
-
-
-inline HBufC* CTAuthcliservStepBase::GetNameLC(TInt id)
-    {
-    _LIT(nameTmpl, "Plugin_%d");
-	HBufC* name = HBufC::NewLC(15);
-	name->Des().Format(nameTmpl, id);
-	return name;
-    }
-    
-inline void CTAuthcliservStepBase::CreatePlugins()
-	{
-	using namespace AuthServer;
-	
-	const TAuthPluginType   types[KNumPlugins]
-		= { EAuthBiometric, EAuthToken, EAuthKnowledge,
-			EAuthBiometric, EAuthToken, EAuthKnowledge,
-			EAuthToken, EAuthKnowledge
-		};
-	const TAuthTrainingStatus   training[KNumPlugins]
-		= { EAuthUntrained, EAuthTrained, EAuthFullyTrained,
-			EAuthUntrained, EAuthTrained, EAuthFullyTrained,
-			EAuthTrained, EAuthFullyTrained
-		  };
-
-
-	for (TInt i = 0 ; i < KNumPlugins ; ++i)
-		{
-			HBufC* name = GetNameLC(i);
-			
-			iPlugins[i] = CPluginDesc::NewL(i,
-											*name,
-											types[i],
-											training[i],
-											i*10000,
-											i,
-											i*4);
-		    CleanupStack::PopAndDestroy(name);									
-		}
-	}
-inline void CTAuthcliservStepBase::CreateKeyInfo()
-	{
-	using namespace AuthServer;
-
-	CProtectionKey* protKey1 = CProtectionKey::NewLC(8);
-	CProtectionKey* protKey2 = CProtectionKey::NewLC(8);
-	CProtectionKey* protKey3 = CProtectionKey::NewLC(8);
-
-	HBufC8* data = HBufC8::NewLC(4);
-	
-	for (TInt plugin = 0 ; plugin < KNumPlugins ; ++plugin)
-		{
-			CTransientKey* transient = 0;
-			// id 1
-			iId1Keys[plugin] = CTransientKeyInfo::NewL(plugin);
-			PluginData(1, plugin, data->Des());
-			transient = iId1Keys[plugin]->CreateTransientKeyL(data->Des());
-			CEncryptedProtectionKey* epKey1 =
-				transient->EncryptL(*protKey1);
-			delete transient;
-			iId1Keys[plugin]->SetEncryptedProtectionKeyL(epKey1);
-			// id 2
-			PluginData(2, plugin, data->Des());
-			iId2Keys[plugin] = CTransientKeyInfo::NewL(plugin);
-			transient = iId2Keys[plugin]->CreateTransientKeyL(data->Des());
-			CEncryptedProtectionKey* epKey2 =
-				transient->EncryptL(*protKey2);
-			delete transient;
-			iId2Keys[plugin]->SetEncryptedProtectionKeyL(epKey2);
-			// id 3
-			PluginData(3, plugin, data->Des());
-			iId3Keys[plugin] = CTransientKeyInfo::NewL(plugin);
-			transient = iId3Keys[plugin]->CreateTransientKeyL(data->Des());
-			CEncryptedProtectionKey* epKey3 =
-				transient->EncryptL(*protKey3);
-			delete transient;
-			iId3Keys[plugin]->SetEncryptedProtectionKeyL(epKey3);
-		}
-	CleanupStack::Pop(4, protKey1);
-	}
-
-// -------- Authentication expression tests --------
-
-class CTStepAuthExprBuild : public CTAuthcliservStepBase
-/**
-	This test step ensures that complex authentication
-	expressions can be constructed, or fail cleanly in OOM.
- */
-	{
-public:
-	CTStepAuthExprBuild();
-	
-	// implement CTestStep
-	virtual TVerdict doTestStepL();
-	
-private:
-	void RunTestsL();
-	void TestExprLD(
-		void (CTStepAuthExprBuild::*aTestFuncL)(AuthServer::CAuthExpression*),
-		AuthServer::CAuthExpression* aExpr);
-
-#ifdef AUTH_EXPR_BINARY_OPS
-	inline void OpTestExprLD(
-		void (CTStepAuthExprBuild::*aTestFuncL)(AuthServer::CAuthExpression*),
-		AuthServer::CAuthExpression* aExpr)
-		{
-		TestExprLD(aTestFuncL, aExpr);
-		}
-#else
-	// this isn't an empty inline because don't want compiler
-	// to build expression with binary operators.
-	#define OpTestExprLD(___f, ___expr)
-#endif
-
-	void TestSimpleExprL();
-	void TestPluginIdL(AuthServer::CAuthExpression* aExpr);
-	void TestPluginTypeL(AuthServer::CAuthExpression* aExpr);
-
-	void TestSimpleExprCombsConsL();
-	void TestTypeAndTypeL(AuthServer::CAuthExpression* aExpr);
-	void TestTypeOrTypeL(AuthServer::CAuthExpression* aExpr);
-	void TestIdAndTypeL(AuthServer::CAuthExpression* aExpr);
-	void TestTypeAndIdL(AuthServer::CAuthExpression* aExpr);
-	void TestIdAndIdL(AuthServer::CAuthExpression* aExpr);
-
-	void TestComplexExprCombsConsL();
-	void TestAndAndL(AuthServer::CAuthExpression* aExpr);
-	void TestAndOrL(AuthServer::CAuthExpression* aExpr);
-	void TestOrAndL(AuthServer::CAuthExpression* aExpr);
-	void TestOrOrL(AuthServer::CAuthExpression* aExpr);
-
-	void TestFailedCombsL();
-	void TestCorruptPersistL();
-	};
-
-class CTStepAuthExprTypePnc : public CTAuthcliservStepBase
-/**
-	This test step ensures the client is panicked when
-	they attempt to retrieve the type of a corrupt expression.
- */
-	{
-public:
-	CTStepAuthExprTypePnc();
-	
-	// implement CTestStep
-	virtual TVerdict doTestStepL();
-	};
-
-class CTStepAuthExprTypePncBadLeft : public CTAuthcliservStepBase
-/**
-	This test step ensures the client is panicked when
-	they attempt to retrieve the type of a expression,
-	where the left subtree is corrupt.
- */
-	{
-public:
-	CTStepAuthExprTypePncBadLeft();
-	
-	// implement CTestStep
-	virtual TVerdict doTestStepL();
-	};
-
-class CTStepAuthExprTypePncBadRight : public CTAuthcliservStepBase
-/**
-	This test step ensures the client is panicked when
-	they attempt to retrieve the type of a expression,
-	where the right subtree is corrupt.
- */
-	{
-public:
-	CTStepAuthExprTypePncBadRight();
-	
-	// implement CTestStep
-	virtual TVerdict doTestStepL();
-	};
-
-class CTStepAuthExprHighVer : public CTAuthcliservStepBase
-/**
-	This step tests sending an unsupported authentication
-	expression to the server.
-	
-	The server should fail the request.
- */
-	{
-public:
-	CTStepAuthExprHighVer();
-	
-	// implement CTestStep
-	virtual TVerdict doTestStepL();
-	};
-	
-class CTStepBadExtAuthExpr : public CTAuthcliservStepBase
-/**
-	This step tests trying to authenticate a server with
-	an invalid authentication expression.
-	
-	The client code should be panicked.
- */
-	{
-public:
-	CTStepBadExtAuthExpr();
-	
-	// implement CTestStep
-	virtual TVerdict doTestStepL();
-	};
-	
-
-class TTestPluginInterface : public AuthServer::MEvaluatorPluginInterface
-/**
-	This implementation records which calls were made
-	to the interface, so the test code can test the
-	evaluator made the right calls in the right order.
- */
-	{
-public:
-	virtual void Evaluate(TPluginId aPluginId, TIdentityId& aIdentity,
-			   CAuthExpressionImpl::TType aType, TRequestStatus& aStatus);
-	virtual void Evaluate(TAuthPluginType aPluginType, TIdentityId& aIdentity,
-			   CAuthExpressionImpl::TType aType, TRequestStatus& aStatus);
-	virtual void CancelEvaluate() {} ;
-public:
-	class TCallEntry
-		{
-	public:
-		inline TCallEntry(TPluginId aPluginId)
-		:	iCallType(CAuthExpressionImpl::EPluginId),
-			iPluginId(aPluginId)
-			{
-			// empty.
-			}
-		
-		inline TCallEntry(TAuthPluginType aPluginType)
-		:	iCallType(CAuthExpressionImpl::EPluginType),
-			iPluginType(aPluginType)
-			{
-			// empty.
-			}
-		
-		bool operator==(const TCallEntry& aRhs) const;
-		
-	public:
-		/** Type of call - ID or plugin type. */
-		CAuthExpressionImpl::TType iCallType;
-		
-		union
-			{
-			TPluginId iPluginId;
-			TAuthPluginType iPluginType;
-			};
-		};
-
-	/**
-		The sequence of Evaluate requests which have been received
-		by this object.  This is a non-standard case of a T class
-		owning resources.  These resources are freed by CLaunchEval
-		because it is not worth making this an R-class or C-class
-		for test code.
-	 */
-	RArray<TCallEntry> iCallLog;
-	};
-
-class TTestClientInterface : public AuthServer::MEvaluatorClientInterface
-/**
-	This implementation records whether the evaluation
-	succeeded or failed, so the test code can check the
-	result.
- */
-	{
-public:
-	virtual void EvaluationSucceeded(TIdentityId aIdentityId);
-	virtual void EvaluationFailed(TInt aReason);
-	
-public:
-	enum TCompletionMode {ENone = 0x10, ESucceeded, EFailed};
-	TCompletionMode iMode;
-	/** This is valid iff iMode == ESucceeded. */
-	TIdentityId iIdentityId;
-	/** This is valid iff iMode == EFailed. */
-	TInt iReason;
-	};
-
-
-class CLaunchEval : public CActive
-/**
-	Active object which launches an evaluation.
-	
-	This object is defined so there is one pending
-	object when the active scheduler is started.
- */
-	{
-public:
-	static CLaunchEval* NewL();
-	virtual ~CLaunchEval();
-	
-	void Evaluate(const CAuthExpression* aExpr);
-	
-private:
-	CLaunchEval();
-	void ConstructL();
-	void ResetInterfaces();
-
-	// implement CActive
-	virtual void RunL();
-	virtual void DoCancel();
-
-public:	
-	TTestClientInterface iClientInterface;
-	TTestPluginInterface iPluginInterface;
-	
-private:
-	/**
-		Expression to evaluate.  This is set for each
-		call to Evaluate.
-	 */
-	const CAuthExpression* iExpr;
-	
-	/** Evaluator, which is allocated at construction. */
-	CEvaluator* iEval;
-	};
-
-
-class CTStepAuthExprEval : public CTStepActSch
-/**
-	This step tests trying to authenticate a server with
-	an invalid authentication expression.
-	
-	The client code should be panicked.
- */
-	{
-public:
-	CTStepAuthExprEval();
-	
-	// implement CTestStep
-	virtual TVerdict doTestStepL();
-	
-private:
-	void TestEvalCreateL();
-	void TestEvalSimpleL();
-	void TestEvalAndL();
-	void TestEvalOrL();
-	void TestEvalResultL(
-		CLaunchEval* aLaunchEval, TIdentityId aIdentityId,
-		const TTestPluginInterface::TCallEntry* aExpEntries, TInt aEntryCount);
-	
-	void TestRPNReallocL();
-	void RunOomTestsL(
-		TAuthExpressionWrapper (*aAllocator)(TInt),
-		TIdentityId aExpectedIdentity, TInt aInitDepth);
-	};
-	
-const TPluginId KTestPluginId0 = 'PID0';
-const TPluginId KTestPluginId1 = 'PID1';
-const TPluginId KTestPluginId2 = 'PID2';
-const TPluginId KTestPluginUnknown = 'UNKW';
-
-// These constants are defined to provide short
-// names for readability only.
-
-const CAuthExpressionImpl::TType KAnd = CAuthExpressionImpl::EAnd;
-const CAuthExpressionImpl::TType KOr = CAuthExpressionImpl::EOr;
-const CAuthExpressionImpl::TType KPluginId = CAuthExpressionImpl::EPluginId;
-const CAuthExpressionImpl::TType KPluginType = CAuthExpressionImpl::EPluginType;
-#endif	/* TAUTHCLISERVSTEP_H */
--- a/authenticationservices/authenticationserver/test/tauthdb/scripts/tauthdb.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,29 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-//! @file
-// authentication db classes tests
-
-LOAD_SUITE tauthdb
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHDB-0001
-//! @SYMTestCaseDesc	Authentication db classes test
-START_TESTCASE SEC-AUT-AUTHDB-0001
-RUN_TEST_STEP 15 tauthdb CreateTestDb
-RUN_TEST_STEP 15 tauthdb PERSIST2
-END_TESTCASE SEC-AUT-AUTHDB-0001
- 
--- a/authenticationservices/authenticationserver/test/tauthdb/step_createtestdb.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,113 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include <bautils.h>
-#include "tauthdbstep.h"
-
-using namespace AuthServer;
-
-
-CTStepCreateTestDb::CTStepCreateTestDb()
-	{
-	SetTestStepName(KTStepCreateTestDb);
-	}
-
-
-TVerdict CTStepCreateTestDb::doTestStepL()
-/**
-	Create a test database and copy the file to
-	authdb0.db to system drive.  This database is used by both
-	tauthdb and tauthsvr.
- */
-	{
-	TInt r;
-	
-	// create the server's private directory.  This happens
-	// when the server starts up, but some of the tests use
-	// the server's classes directly.
-	TDriveUnit sysDrive (RFs::GetSystemDrive());
-	TDriveName sysDriveName (sysDrive.Name());
-
-	TBuf<128> dbName(KDbName);
-	dbName[0] = 'A' + sysDrive;	
-	
-	r = iFs.MkDirAll(dbName);			// db name not used
-	if (r != KErrAlreadyExists)
-		User::LeaveIfError(r);
-	
-	RemoveExistingDbL();
-	
-	CAuthDb2* db = CAuthDb2::NewLC(iFs);
-	
-	_LIT(kId1Name, "Identity1");
-	_LIT(kId2Name, "Identity2");
-	_LIT(kId3Name, "Identity3");
-	_LIT(kId22Name, "Identity22");
-	
-	db->AddIdentityL(1, kId1Name);
-	const CTransientKeyInfo* tki1 = iId1Keys[0];
-	db->SetTrainedPluginL(1, tki1->PluginId(), *tki1);
-	
-	db->AddIdentityL(2, kId2Name);
-	const CTransientKeyInfo* tki2 = iId2Keys[0];
-	db->SetTrainedPluginL(2, tki2->PluginId(), *tki2);
-	
-	db->AddIdentityL(3, kId3Name);
-	const CTransientKeyInfo* tki3 = iId3Keys[0];
-	db->SetTrainedPluginL(3, tki3->PluginId(), *tki3); 
-	
-	// create additional trained plugins
-	for (TInt i = 1 ; i < KNumPlugins ; ++i)
-		{
-		db->SetTrainedPluginL(1, iId1Keys[i]->PluginId(), *iId1Keys[i]);
-		db->SetTrainedPluginL(2, iId1Keys[i]->PluginId(), *iId2Keys[i]);
-		db->SetTrainedPluginL(3, iId1Keys[i]->PluginId(), *iId3Keys[i]);
-		}
-    
-    // Add 1 more id for use with test plugin
-    CProtectionKey* key = CProtectionKey::NewLC(8);
-    
-    CTransientKeyInfo* tki = CTransientKeyInfo::NewLC(0x10274104);
-    
-	_LIT8(KIdentifyData, "ABABABABABABABABABAB");
-    CTransientKey* tk = tki->CreateTransientKeyL(KIdentifyData);
-    CleanupStack::PushL(tk);
-    
-    CEncryptedProtectionKey* epKey = tk->EncryptL(*key);
-    CleanupStack::PushL(epKey);	// epKey takes ownership
-        
-    tki->SetEncryptedProtectionKeyL(epKey);
-    CleanupStack::Pop(epKey);	// eki takes ownership
-    
-	db->AddIdentityL(22, kId22Name);
-	db->SetTrainedPluginL(22, tki->PluginId(), *tki); 
-
-	CleanupStack::PopAndDestroy(3, key);
-	
-	CleanupStack::PopAndDestroy(db);
-	
-	_LIT(KDbTrgFileName ,"\\authdb0.db");
-	TBuf<128> dbTrgFileName (sysDriveName);
-	dbTrgFileName.Append(KDbTrgFileName);
-	
-	// copy the file to the system drive 
-	r = BaflUtils::CopyFile(iFs, dbName, dbTrgFileName);
-	TESTL(r == KErrNone);
-	
-	return EPass;
-	}
--- a/authenticationservices/authenticationserver/test/tauthdb/step_persist2.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,595 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include <s32mem.h>
-#include "tauthdbstep.h"
-#include <f32file.h>
-
-using namespace AuthServer;
-
-const TIdentityId KIdentity1Id = 'I1ID';
-const TIdentityId KIdentity2Id = 'I2ID';
-const TIdentityId KIdentity3Id = 'I3ID';
-_LIT(KIdentity1Desc, "identity-1-desc");
-_LIT(KIdentity1DescB, "identity-1-descB");
-_LIT(KIdentity2Desc, "identity-2-desc");
-_LIT(KIdentity3Desc, "identity-3-desc");
-
-const TPluginId KPlugin1Id = 'PID1';
-const TPluginId KPlugin2Id = 'PID2';
-const TPluginId KPlugin3Id = 'PID3';
-const TPluginId KPlugin4Id = 'PID4';
-const TPluginId KPluginAId = 'PIDA';
-const TPluginId KPluginBId = 'PIDB';
-
-
-CTStepPersist2::CTStepPersist2()
-	{
-	SetTestStepName(KTStepCreateTestDb);
-	}
-
-
-TVerdict CTStepPersist2::doTestStepL()
-	{
-	__UHEAP_MARK;
-	
-	RemoveExistingDbL();
-		
-	TestOpenCloseL();
-	TestIdentitiesL();
-	TestPrefsL();
-	TestTrainedPluginsL();
-	TestTrainingStatusL();
-	TestRepairL();
-	TestCompressL();
-	
-	__UHEAP_MARKEND;
-	return EPass;
-	}
-
-
-void CTStepPersist2::TestOpenCloseL()
-/**
-	Test simply opening and closing a database,
-	without using any other operations.
- */
-	{
-	CAuthDb2* db = CAuthDb2::NewL(iFs);
-	delete db;
-	}
-
-
-void CTStepPersist2::TestIdentitiesL()
-	{
-	TInt r;
-	
-	__UHEAP_MARK;
-	RemoveExistingDbL();
-	CAuthDb2* db = CAuthDb2::NewLC(iFs);
-	
-	RArray<TIdentityId> ids;
-	
-	// get id list before any ids defined
-	ids.AppendL('SYMB');	// garbage; ensure removed
-	db->IdentitiesL(ids);
-	TESTL(ids.Count() == 0);
-	
-	// add an identity
-	db->AddIdentityL(KIdentity1Id, KIdentity1Desc);
-	db->IdentitiesL(ids);
-	TESTL(ids.Count() == 1);
-	TESTL(ids[0] == KIdentity1Id);
-	
-	// retrieve the identity's description
-	TestDescriptionL(db, KIdentity1Id, KIdentity1Desc);
-	
-	// change the identity's description
-	db->SetDescriptionL(KIdentity1Id, KIdentity1DescB);
-	TestDescriptionL(db, KIdentity1Id, KIdentity1DescB);
-
-	// change the identity's description to a string which is
-	// too long; ensure fails.
-	TBuf<KMaxDescLen + 1> dbuf;
-	dbuf.Fill('a', KMaxDescLen - 1);		// limit - 1
-	db->SetDescriptionL(KIdentity1Id, dbuf);
-	TestDescriptionL(db, KIdentity1Id, dbuf);
-	
-	dbuf.Fill('a', KMaxDescLen);			// limit
-	db->SetDescriptionL(KIdentity1Id, dbuf);
-	TestDescriptionL(db, KIdentity1Id, dbuf);
-	
-	db->SetDescriptionL(KIdentity1Id, KIdentity1DescB);
-	TestDescriptionL(db, KIdentity1Id, KIdentity1DescB);
-	dbuf.Fill('a', KMaxDescLen + 1);		// limit + 1
-	TRAP(r, db->SetDescriptionL(KIdentity1Id, dbuf));
-	TESTL(r == KErrAuthServDescTooLong);
-	TestDescriptionL(db, KIdentity1Id, KIdentity1DescB);	// keep old desc
-	
-	// add a second identity
-	db->AddIdentityL(KIdentity2Id, KIdentity2Desc);
-	db->IdentitiesL(ids);
-	TESTL(ids.Count() == 2);
-	TESTL(	(ids[0] == KIdentity1Id && ids[1] == KIdentity2Id)
-		||	(ids[0] == KIdentity2Id && ids[1] == KIdentity1Id) );
-	TestDescriptionL(db, KIdentity1Id, KIdentity1DescB);
-	TestDescriptionL(db, KIdentity2Id, KIdentity2Desc);
-	
-	// add an identity which already exists
-	TRAP(r, db->AddIdentityL(KIdentity2Id, KIdentity2Desc));
-	TESTL(r == KErrAuthServIdentityAlreadyExists);
-	
-	// retrieve description for an unregistered identity
-	TRAP(r, db->DescriptionL(KIdentity3Id));
-	TESTL(r == KErrAuthServIdentityNotFound);
-	
-	// set description for an unregistered identity
-	TRAP(r, db->SetDescriptionL(KIdentity3Id, KIdentity3Desc));
-	TESTL(r == KErrAuthServIdentityNotFound);
-	
-	// remove an unregistered identity
-	TRAP(r, db->RemoveIdentityL(KIdentity3Id));
-	TESTL(r == KErrAuthServIdentityNotFound);
-	
-	// remove an identity
-	db->RemoveIdentityL(KIdentity1Id);
-	db->IdentitiesL(ids);
-	TESTL(ids.Count() == 1);
-	TESTL(ids[0] == KIdentity2Id);
-	TestDescriptionL(db, KIdentity2Id, KIdentity2Desc);
-	
-	// remove the last identity
-	db->RemoveIdentityL(KIdentity2Id);
-	db->IdentitiesL(ids);
-	TESTL(ids.Count() == 0);
-	
-	// create an identity with a description to a string which is
-	// too long; ensure fails.
-	dbuf.Fill('a', KMaxDescLen - 1);		// limit - 1
-	db->AddIdentityL(KIdentity3Id, dbuf);
-	TestDescriptionL(db, KIdentity3Id, dbuf);
-	db->RemoveIdentityL(KIdentity3Id);
-	
-	dbuf.Fill('a', KMaxDescLen);			// limit
-	db->AddIdentityL(KIdentity3Id, dbuf);
-	TestDescriptionL(db, KIdentity3Id, dbuf);
-	db->RemoveIdentityL(KIdentity3Id);
-	
-	dbuf.Fill('a', KMaxDescLen + 1);		// limit + 1
-	TRAP(r, db->AddIdentityL(KIdentity3Id, dbuf));
-	TESTL(r == KErrAuthServDescTooLong);
-	db->IdentitiesL(ids);							// no identity created
-	TESTL(ids.Count() == 0);
-	
-	CleanupStack::PopAndDestroy(db);
-	__UHEAP_MARKEND;
-	}
-
-void CTStepPersist2::TestDescriptionL(
-	CAuthDb2* aDb, TIdentityId aIdentityId, const TDesC& aExpDesc)
-/**
-	Helper function for TestIdentitiesL.  Ensures the
-	supplied identity has the supplied description.
-	
-	@param	aDb				Database which contains the identity.
-	@param	aIdentity		Identity whose description should be
-							retrieved.
-	@param	aDesc			Expected description.
- */
-	{
-	HBufC* desc = aDb->DescriptionL(aIdentityId);
-	CleanupStack::PushL(desc);
-	TESTL(*desc == aExpDesc);
-	CleanupStack::PopAndDestroy(desc);
-	}
-
-
-void CTStepPersist2::TestPrefsL()
-/**
-	Tests adding, modifying, and removing
-	preferences from the database.
- */
-	{
-	TPluginId prefId;	
-	__UHEAP_MARK;
-	
-	RemoveExistingDbL();
-	CAuthDb2* db = CAuthDb2::NewLC(iFs);
-
-	// get a preferred plugin for a type with no preferred plugin
-	prefId = db->PreferredPluginL(EAuthBiometric);
-	TESTL(prefId == KUnknownPluginId);
-
-	// set a type's preferred plugin
-	db->SetPreferredPluginL(EAuthBiometric, KPlugin1Id);
-	prefId = db->PreferredPluginL(EAuthBiometric);
-	TESTL(prefId == KPlugin1Id);
-	
-	// change a type's preferred plugin
-	db->SetPreferredPluginL(EAuthBiometric, KPlugin2Id);
-	prefId = db->PreferredPluginL(EAuthBiometric);
-	TESTL(prefId == KPlugin2Id);
-	
-	// clear a type's preferred plugin
-	db->ClearPreferredPluginL(EAuthBiometric);
-	prefId = db->PreferredPluginL(EAuthBiometric);
-	TESTL(prefId == KUnknownPluginId);
-	
-	// set preferred plugin for more than one type
-	db->SetPreferredPluginL(EAuthBiometric, KPlugin3Id);
-	db->SetPreferredPluginL(EAuthKnowledge, KPlugin4Id);
-	prefId = db->PreferredPluginL(EAuthBiometric);
-	TESTL(prefId == KPlugin3Id);
-	prefId = db->PreferredPluginL(EAuthKnowledge);
-	TESTL(prefId == KPlugin4Id);
-	
-	CleanupStack::PopAndDestroy(db);
-	
-	__UHEAP_MARKEND;
-	}
-
-
-void CTStepPersist2::TestTrainedPluginsL()
-/**
-	Test adding and removing trained plugins.
- */
-	{
-	__UHEAP_MARK;
-	
-	TInt r;
-	RemoveExistingDbL();
-	CAuthDb2* db = CAuthDb2::NewLC(iFs);
-
-	const CTransientKeyInfo& tkiA = *iId1Keys[0];
-	const CTransientKeyInfo& tkiB = *iId1Keys[1];
-	const CTransientKeyInfo& tkiC = *iId1Keys[2];
-
-	// set key info for an unregistered identity
-	TRAP(r, db->SetTrainedPluginL(KIdentity1Id, KPluginAId, tkiA));
-	TESTL(r == KErrAuthServIdentityNotFound);
-
-	// set key info for a registered identity
-	db->AddIdentityL(KIdentity1Id, KIdentity1Desc);
-	db->SetTrainedPluginL(KIdentity1Id, KPluginAId, tkiA);
-	
-	// get key info for a trained identity
-	TestKeyPresentL(db, KIdentity1Id, KPluginAId, tkiA);
-
-	// change key info for a trained identity
-	db->SetTrainedPluginL(KIdentity1Id, KPluginAId, tkiB);
-	TestKeyPresentL(db, KIdentity1Id, KPluginAId, tkiB);
-
-	// ---- bad KeyInfoL args ----
-	
-	// get key info for registered identity but untrained plugin
-	TRAP(r, db->KeyInfoL(KIdentity1Id, KPluginBId))
-	TESTL(r == KErrAuthServTrainingNotFound);
-
-	// get key info for unregistered identity but trained plugin	
-	TRAP(r, db->KeyInfoL(KIdentity3Id, KPluginAId))
-	TESTL(r == KErrAuthServTrainingNotFound);
-	
-	// get key info for unregistered identity and untrained plugin
-	TRAP(r, db->KeyInfoL(KIdentity3Id, KPluginBId));
-	TESTL(r == KErrAuthServTrainingNotFound);
-	
-	// ---- bad RemoveTrainedPluginL args ----
-	
-	// clear key info for registered identity but untrained plugin
-	TRAP(r, db->KeyInfoL(KIdentity1Id, KPluginBId))
-	TESTL(r == KErrAuthServTrainingNotFound);
-
-	// clear key info for unregistered identity but trained plugin	
-	TRAP(r, db->RemoveTrainedPluginL(KIdentity3Id, KPluginAId))
-	TESTL(r == KErrAuthServTrainingNotFound);
-	
-	// clear key info for unregistered identity and untrained plugin
-	TRAP(r, db->RemoveTrainedPluginL(KIdentity3Id, KPluginBId));
-	TESTL(r == KErrAuthServTrainingNotFound);
-	
-	// -----
-
-	// clear a present trained plugin
-	db->RemoveTrainedPluginL(KIdentity1Id, KPluginAId);
-	TRAP(r, db->KeyInfoL(KIdentity3Id, KPluginAId))
-	TESTL(r == KErrAuthServTrainingNotFound);
-	
-	// register multiple trained plugins for a single identity	
-	db->SetTrainedPluginL(KIdentity1Id, KPluginAId, tkiA);
-	db->SetTrainedPluginL(KIdentity1Id, KPluginBId, tkiB);
-	TestKeyPresentL(db, KIdentity1Id, KPluginAId, tkiA);
-	TestKeyPresentL(db, KIdentity1Id, KPluginAId, tkiB);
-
-	// train a single plugin for multiple identities
-	db->AddIdentityL(KIdentity2Id, KIdentity2Desc);
-	db->SetTrainedPluginL(KIdentity2Id, KPluginAId, tkiC);
-	TestKeyPresentL(db, KIdentity1Id, KPluginAId, tkiA);
-	TestKeyPresentL(db, KIdentity1Id, KPluginBId, tkiB);
-	TestKeyPresentL(db, KIdentity2Id, KPluginAId, tkiC);
-	
-	// ---- atomic identity and key addition ----
-	
-	// add identity with trained plugin
-	db->AddIdentityWithTrainedPluginL(KIdentity3Id, KIdentity3Desc, tkiA);
-	TestKeyPresentL(db, KIdentity3Id, tkiA.PluginId(), tkiA);
-	
-	// fail to add identity with trained plugin - id already exists
-	TRAP(r, db->AddIdentityWithTrainedPluginL(KIdentity3Id, KIdentity3Desc, tkiA));
-	TESTL(r == KErrAuthServIdentityAlreadyExists);
-	
-	CleanupStack::PopAndDestroy(db);
-	
-	__UHEAP_MARKEND;
-	}
-
-
-void CTStepPersist2::TestKeyPresentL(
-	CAuthDb2* aAuthDb, TIdentityId aIdentityId, TPluginId aPluginId,
-	const CTransientKeyInfo& aTarget)
-/**
-	Helper function for TestTrainedPluginsL.
-	
-	Test the described transient key exists in the database,
-	and that is is equal to the supplied key.  Leaves if not
-	the case.
-
-	@param	aAuthDb			Authorisation database to retrieve
-							transient key info from.
-	@param	aIdentityId		Identity which should be trained for
-							the supplied plugin.
-	@param	aPluginId		Plugin for which the supplied identity
-							should be trained.
-	@param	aTarget			The retrieved transient key info should
-							be equal to this.
- */
-	{
-	CTransientKeyInfo* tkiActual = aAuthDb->KeyInfoL(aIdentityId, aPluginId);
-	CleanupStack::PushL(tkiActual);
-
-	// ensure key infos have same externalized size
-	TSizeStream ssTarget;
-	RWriteStream wsTarget(&ssTarget);
-	aTarget.ExternalizeL(wsTarget);
-	TInt targetSize = ssTarget.Size();
-
-	TSizeStream ssActual;
-	RWriteStream wsActual(&ssActual);
-	tkiActual->ExternalizeL(wsActual);
-	TESTL(targetSize == ssActual.Size());
-
-	HBufC8* targetBuf = HBufC8::NewLC(targetSize);
-	TPtr8 targetBufDes = targetBuf->Des();
-	RDesWriteStream dwsTarget(targetBufDes);
-	aTarget.ExternalizeL(dwsTarget);
-
-	HBufC8* actualBuf = HBufC8::NewLC(targetSize);
-	TPtr8 actualBufDes = actualBuf->Des();
-	RDesWriteStream dwsActual(actualBufDes);
-	tkiActual->ExternalizeL(dwsActual);
-
-	TESTL(targetBufDes == actualBufDes);
-
-	CleanupStack::PopAndDestroy(3, tkiActual);
-	}
-
-
-void CTStepPersist2::TestTrainingStatusL()
-/**
-	Test the plugins' training statuses accurately
-	reflect the identities which are registered
-	with them.
- */
-	{
-	__UHEAP_MARK;
-
-	RemoveExistingDbL();
-	
-	CAuthDb2* db = CAuthDb2::NewLC(iFs);
-
-	// if there are no users then a plugin should be marked
-	// as untrained, even though its training count is equal
-	// to the number of registered identities.
-	TESTL(db->PluginStatusL(KPluginAId) == EAuthUntrained);
-
-	// untrained when no users trained
-	db->AddIdentityL(KIdentity1Id, KIdentity1Desc);
-	TESTL(db->PluginStatusL(KPluginAId) == EAuthUntrained);
-	db->AddIdentityL(KIdentity2Id, KIdentity2Desc);
-	TESTL(db->PluginStatusL(KPluginAId) == EAuthUntrained);
-
-	// trained when some, but not all, users trained
-	const CTransientKeyInfo& tkiA = *iId1Keys[0];
-	db->SetTrainedPluginL(KIdentity1Id, KPluginAId, tkiA);
-	TESTL(db->PluginStatusL(KPluginAId) == EAuthTrained);
-	
-	// fully trained when all users trained
-	db->SetTrainedPluginL(KIdentity2Id, KPluginAId, tkiA);
-	TESTL(db->PluginStatusL(KPluginAId) == EAuthFullyTrained);
-	
-	// back to trained when identity untrained
-	db->RemoveTrainedPluginL(KIdentity1Id, KPluginAId);
-	TESTL(db->PluginStatusL(KPluginAId) == EAuthTrained);
-	
-	// back to untrained when last training removed
-	db->RemoveTrainedPluginL(KIdentity2Id, KPluginAId);
-	TESTL(db->PluginStatusL(KPluginAId) == EAuthUntrained);
-	
-	// restored to trained when identity trained
-	db->SetTrainedPluginL(KIdentity1Id, KPluginAId, tkiA);
-	TESTL(db->PluginStatusL(KPluginAId) == EAuthTrained);
-
-	// restored to fully trained when last identity trained
-	db->SetTrainedPluginL(KIdentity2Id, KPluginAId, tkiA);
-	TESTL(db->PluginStatusL(KPluginAId) == EAuthFullyTrained);
-	
-	// back to trained when new identity added
-	db->AddIdentityL(KIdentity3Id, KIdentity3Desc);
-	TESTL(db->PluginStatusL(KPluginAId) == EAuthTrained);
-
-	// upgraded to fully trained when untrained identity removed
-	db->RemoveIdentityL(KIdentity3Id);
-	TESTL(db->PluginStatusL(KPluginAId) == EAuthFullyTrained);
-	
-	// kept at fully trained when trained identity removed
-	db->RemoveIdentityL(KIdentity2Id);
-	TESTL(db->PluginStatusL(KPluginAId) == EAuthFullyTrained);
-	
-	// drop to untrained when last identity removed
-	db->RemoveIdentityL(KIdentity1Id);
-	TESTL(db->PluginStatusL(KPluginAId) == EAuthUntrained);
-	
-	CleanupStack::PopAndDestroy(db);
-	
-	__UHEAP_MARKEND;
-	}
-
-
-static void IdToTestDesc(TIdentityId aId, TDes& aDesc)
-/**
-	Helper function for TestRepairL generates a description
-	from the supplied identity.
-	
-	@param	aId				Identity Id.
-	@param	aDesc			Out paramater is populated with
-							description text.
- */
-	{
-	_LIT(KDescFmt, "desc_%08x");
-	aDesc.Format(KDescFmt, aId);
-	}
-
-
-void CTStepPersist2::TestRepairL()
-/**
-	Test CAuthDb repairs the database if possible.
- */
-	{
-	RemoveExistingDbL();
-	
-	CAuthDb2* db = CAuthDb2::NewLC(iFs);
-	
-	// create a set of identities
-	const TInt KTestIdCount = 8;
-	for (TInt i = 1; i <= KTestIdCount; ++i)
-		{
-		TBuf<13> buf;
-		IdToTestDesc(i, buf);
-		db->AddIdentityL(i, buf);
-		}
-	CleanupStack::PopAndDestroy(db);
-	
-	// damage the database by inserting a new entry but then
-	// rolling it back.
-	RDbNamedDatabase ndb;
-	TFileName dbName(KDbName);
-	dbName[0] = RFs::GetSystemDriveChar();
-	
-	User::LeaveIfError(ndb.Open(iFs, dbName));
-	CleanupClosePushL(ndb);
-	
-	User::LeaveIfError(ndb.Begin());
-	
-	RDbTable table;
-	CleanupClosePushL(table);
-	User::LeaveIfError(table.Open(ndb, KIdentitiesTableName));
-	
-	table.InsertL();
-	table.SetColL(KIdentitiesIdentityIdCol, KTestIdCount+1);
-	table.SetColL(KIdentitiesDescCol, _L("descb"));
-	table.PutL();
-	table.Close();
-	ndb.Rollback();
-	TESTL(ndb.IsDamaged());
-	
-	CleanupStack::PopAndDestroy(2, &ndb);	// table ndb
-	
-	// ensure db contains the same identities when it
-	// is reopened.
-	db = CAuthDb2::NewLC(iFs);
-	
-	RArray<TIdentityId> ids;
-	db->IdentitiesL(ids);
-	TInt idCount = ids.Count();
-	ids.Reset();
-	TESTL(idCount == KTestIdCount);
-	
-	for (TInt index = 1; index <= KTestIdCount; ++index)
-		{
-		TBuf<13> bufExp;
-		IdToTestDesc(index, bufExp);
-		TBuf<KMaxDescLen> actDesc;
-		HBufC* descAct = db->DescriptionL(index);
-		CleanupStack::PushL(descAct);
-		TESTL(bufExp == *descAct);
-		CleanupStack::PopAndDestroy(descAct);
-		}
-	CleanupStack::PopAndDestroy(db);
-	}
-
-
-void CTStepPersist2::TestCompressL()
-/**
-	Creates and deletes identities to create unused
-	space in database file, and tests compressed.
- */
-	{
-	RemoveExistingDbL();
-	CAuthDb2* db = CAuthDb2::NewLC(iFs);
-	
-	const TInt KIdentityCount = 32;
-	for (TInt i = 0; i < KIdentityCount; ++i)
-		{
-		_LIT(KCompDesc, "tc-test");
-		db->AddIdentityL(i, KCompDesc);
-		db->RemoveIdentityL(i);
-		}
-	CleanupStack::PopAndDestroy(db);
-	
-	TInt szPreComp = DbFileSizeL();
-	
-	db = CAuthDb2::NewLC(iFs);
-	db->CompactIfRequired();
-	CleanupStack::PopAndDestroy(db);
-	
-	TInt szPostComp = DbFileSizeL();
-	
-	TESTL(szPreComp > szPostComp);
-	}
-
-
-TInt CTStepPersist2::DbFileSizeL()
-/**
-	Helper function for TestCompressL returns
-	the size of the database file in bytes.
- */
-	{
-	RFile f;
-	TFileName dbName(KDbName);
-	dbName[0] = RFs::GetSystemDriveChar();
-
-	User::LeaveIfError(f.Open(iFs, dbName, EFileRead | EFileStream));
-	CleanupClosePushL(f);
-	
-	TInt sz;
-	User::LeaveIfError(f.Size(sz));
-	CleanupStack::PopAndDestroy(&f);
-	
-	return sz;
-	}
-
-
-
--- a/authenticationservices/authenticationserver/test/tauthdb/tauthdb.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,52 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-OPTION GCCE -Wno-multichar
-
-TARGET			tauthdb.exe
-TARGETTYPE		exe
-UID				0x1000007A 0x10204F0D
-VENDORID		0x70000001
-
-CAPABILITY		AllFiles
-
-SOURCEPATH		.
-SOURCE			tauthdbserver.cpp
-SOURCE			step_persist2.cpp
-SOURCE			step_createtestdb.cpp
-SOURCE          ../../source/server/authdb.cpp
-SOURCE          ../../source/server/encryptedprotectionkey.cpp
-SOURCE          ../../source/server/transientkey.cpp
-SOURCE          ../../source/server/transientkeyinfo.cpp
-
-USERINCLUDE		.
-USERINCLUDE		../../source/common
-USERINCLUDE		../../source/server
-USERINCLUDE		../../source/client
-USERINCLUDE		../../inc_private
-USERINCLUDE             ../../inc/authserver
-
-OS_LAYER_SYSTEMINCLUDE
-SYSTEMINCLUDE OS_LAYER_PLATFORM_EXPORT_PATH(test)
-
-LIBRARY			bafl.lib edbms.lib estor.lib efsrv.lib euser.lib
-LIBRARY         testexecuteutils.lib testexecutelogclient.lib
-LIBRARY         random.lib pbe.lib cryptography.lib
-LIBRARY         authclient.lib authcommon.lib
-LIBRARY			sectcbutil.lib
-SMPSAFE
--- a/authenticationservices/authenticationserver/test/tauthdb/tauthdbserver.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,96 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* server implementation
-*
-*/
-
-
-/**
- @file 
-*/
-
-#include "tauthdbserver.h"
-#include "tauthdbstep.h"
-
-_LIT(KServerName,"tauthdb");
-
-/**
- * Called inside the MainL() function to create and start the CTestServer 
- * derived server.
- * @return Instance of the test server
- */
-CTAuthDbServer* CTAuthDbServer::NewL()
-	{
-	CTAuthDbServer * server = new (ELeave) CTAuthDbServer();
-	CleanupStack::PushL(server);
-	
-	// Either use a StartL or ConstructL, the latter will permit Server Logging.
-
-	server->ConstructL(KServerName);
-	CleanupStack::Pop(server);
-	return server;
-	}
-
-LOCAL_C void MainL()
-	{
-	// Leave the hooks in for platform security
-#if (defined __DATA_CAGING__)
-	RProcess().DataCaging(RProcess::EDataCagingOn);
-	RProcess().SecureApi(RProcess::ESecureApiOn);
-#endif
-	CActiveScheduler* sched=NULL;
-	sched=new(ELeave) CActiveScheduler;
-	CleanupStack::PushL(sched);
-	CActiveScheduler::Install(sched);
-	CTAuthDbServer* server = NULL;
-	// Create the CTestServer derived server
-	TRAPD(err,server = CTAuthDbServer::NewL());
-	if(!err)
-		{
-		RProcess::Rendezvous(KErrNone);
-		sched->Start();
-		}
-	CleanupStack::Pop(sched);
-	delete server;
-	delete sched;
-	}
-
-GLDEF_C TInt E32Main()
-	{
-	CTrapCleanup* cleanup = CTrapCleanup::New();
-	if(cleanup == NULL)
-		{
-		return KErrNoMemory;
-		}
-	TRAP_IGNORE(MainL());	
-	delete cleanup;
-	return KErrNone;
-    }
-
-CTestStep* CTAuthDbServer::CreateTestStep(const TDesC& aStepName)
-	{
-	CTestStep* testStep = NULL;
-
-	if(aStepName == KTStepPersist2)
-		{
-		testStep = new CTStepPersist2();
-		}
-	else if (aStepName == KTStepCreateTestDb)
-		{
-		testStep = new CTStepCreateTestDb;
-		}
-	
-	return testStep;
-	}
--- a/authenticationservices/authenticationserver/test/tauthdb/tauthdbserver.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,36 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* TAuthDbServer is the server for all authentication keys tests
-*
-*/
-
-
-#ifndef TAUTHDBSERVER_H
-#define TAUTHDBSERVER_H
-#include <test/testexecuteserverbase.h>
-
-class CTAuthDbServer : public CTestServer
-	{
-public:
-	static CTAuthDbServer*	NewL();
-	virtual CTestStep*      CreateTestStep(const TDesC& aStepName);
-	RFs& Fs()	{return iFs;};
-
-private:
-	RFs	iFs;
-	};
-
-#endif	/* TAUTHDBSERVER_H */
-
--- a/authenticationservices/authenticationserver/test/tauthdb/tauthdbstep.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,233 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#ifndef TAUTHDBSTEP_H
-#define TAUTHDBSTEP_H
-
-#include <test/testexecutestepbase.h>
-#include <test/testexecutelog.h>
-#include "tauthdbserver.h"
-#include <f32file.h>
-
-#include "authdb.h"
-#include "encryptedprotectionkey.h"
-#include "transientkey.h"  
-#include "transientkey.h"  
-#include "transientkeyinfo.h"
-
-_LIT(KTStepCreateTestDb, "CreateTestDb");
-_LIT(KTStepPersist2, "PERSIST2");
-
-#define KNumPlugins 10
-
-
-class CTAuthDbStepBase : public CTestStep
-	{
-protected:
-	CTAuthDbStepBase() {}
-	virtual ~CTAuthDbStepBase();
-	
-	void CreatePlugins();
-	void CreateKeyInfo();
-		
-	virtual TVerdict doTestStepPreambleL()
-	   {
-	   iFs.Connect();
-	
-	   CreatePlugins();
-	   CreateKeyInfo();
-	   
-	   return TestStepResult();
-	   }
-	virtual TVerdict doTestStepPostambleL()
-    	{
-		iFs.Close();
-		return TestStepResult();
-		}
-	
-	void RemoveExistingDbL()
-	/**
-		Remove any existing database file.
-	 */
-		{
-		CFileMan* fm = CFileMan::NewL(iFs);
-		CleanupStack::PushL(fm);
-
-		TFileName dbName(AuthServer::KDbName);
-		dbName[0] = RFs::GetSystemDriveChar();
-
-		TInt r = fm->Delete(dbName);
-		if (r != KErrNotFound)
-			User::LeaveIfError(r);
-
-		CleanupStack::PopAndDestroy(fm);	
-		}
-
-	HBufC* GetNameLC(TInt i);
-
-	void PluginData(AuthServer::TIdentityId aId,
-					AuthServer::TPluginId aPlugin,
-					TPtr8 aDes) 
-	{
-	aDes.Fill(aId*aPlugin);
-	}
-protected:
-	RFs		iFs;
-
-
-	AuthServer::CPluginDesc*       iPlugins[KNumPlugins];
-	AuthServer::CTransientKeyInfo* iId1Keys[KNumPlugins];
-	AuthServer::CTransientKeyInfo* iId2Keys[KNumPlugins];
-	AuthServer::CTransientKeyInfo* iId3Keys[KNumPlugins];
-  };
-
-inline CTAuthDbStepBase::~CTAuthDbStepBase() 
-    {
-    for (TInt i = 0 ; i < KNumPlugins ; ++i)
-        {
-        delete iPlugins[i];
-        delete iId1Keys[i];
-        delete iId2Keys[i];
-        delete iId3Keys[i];
-        }
-    }
-
-
-class CTStepCreateTestDb : public CTAuthDbStepBase
-/**
-	Creates a test database which tauthcliserv can
-	use to test the manager later.
- */
-	{
-public:
-	CTStepCreateTestDb();
-	
-	// implement CTestStep
-	virtual TVerdict doTestStepL();
-	};
-
-
-class CTStepPersist2 : public CTAuthDbStepBase
-	{
-public:
-	CTStepPersist2();
-	
-private:
-	virtual TVerdict doTestStepL();
-	
-	void TestOpenCloseL();
-	
-	void TestIdentitiesL();
-	void TestDescriptionL(AuthServer::CAuthDb2* aDb, AuthServer::TIdentityId aIdentityId, const TDesC& aExpDesc);
-	
-	void TestPrefsL();
-	
-	void TestTrainedPluginsL();
-	void TestKeyPresentL(
-		AuthServer::CAuthDb2* aAuthDb, AuthServer::TIdentityId aIdentityId, AuthServer::TPluginId aPluginId,
-		const AuthServer::CTransientKeyInfo& aTarget);
-	
-	void TestTrainingStatusL();
-	
-	void TestRepairL();
-
-	void TestCompressL();
-	TInt DbFileSizeL();
-	};
-
-
-inline HBufC* CTAuthDbStepBase::GetNameLC(TInt id)
-    {
-    _LIT(nameTmpl, "Plugin_%d");
-	HBufC* name = HBufC::NewLC(15);
-	name->Des().Format(nameTmpl, id);
-	return name;
-    }
-    
-inline void CTAuthDbStepBase::CreatePlugins()
-	{
-	using namespace AuthServer;
-	
-	const TAuthPluginType   types[KNumPlugins]
-		= { EAuthBiometric, EAuthToken, EAuthKnowledge,
-			EAuthBiometric, EAuthToken, EAuthKnowledge,
-			EAuthToken, EAuthKnowledge
-		};
-	const TAuthTrainingStatus   training[KNumPlugins]
-		= { EAuthUntrained, EAuthTrained, EAuthFullyTrained,
-			EAuthUntrained, EAuthTrained, EAuthFullyTrained,
-			EAuthTrained, EAuthFullyTrained
-		  };
-
-
-	for (TInt i = 0 ; i < KNumPlugins ; ++i)
-		{
-			HBufC* name = GetNameLC(i);
-			
-			iPlugins[i] = CPluginDesc::NewL(i,
-											*name,
-											types[i],
-											training[i],
-											i*10000,
-											i,
-											i*4);
-		    CleanupStack::PopAndDestroy(name);									
-		}
-	}
-inline void CTAuthDbStepBase::CreateKeyInfo()
-	{
-	using namespace AuthServer;
-
-	CProtectionKey* protKey1 = CProtectionKey::NewLC(8);
-	CProtectionKey* protKey2 = CProtectionKey::NewLC(8);
-	CProtectionKey* protKey3 = CProtectionKey::NewLC(8);
-
-	HBufC8* data = HBufC8::NewLC(4);
-	
-	for (TInt plugin = 0 ; plugin < KNumPlugins ; ++plugin)
-		{
-			CTransientKey* transient = 0;
-			// id 1
-			iId1Keys[plugin] = CTransientKeyInfo::NewL(plugin);
-			PluginData(1, plugin, data->Des());
-			transient = iId1Keys[plugin]->CreateTransientKeyL(data->Des());
-			CEncryptedProtectionKey* epKey1 =
-				transient->EncryptL(*protKey1);
-			delete transient;
-			iId1Keys[plugin]->SetEncryptedProtectionKeyL(epKey1);
-			// id 2
-			PluginData(2, plugin, data->Des());
-			iId2Keys[plugin] = CTransientKeyInfo::NewL(plugin);
-			transient = iId2Keys[plugin]->CreateTransientKeyL(data->Des());
-			CEncryptedProtectionKey* epKey2 =
-				transient->EncryptL(*protKey2);
-			delete transient;
-			iId2Keys[plugin]->SetEncryptedProtectionKeyL(epKey2);
-			// id 3
-			PluginData(3, plugin, data->Des());
-			iId3Keys[plugin] = CTransientKeyInfo::NewL(plugin);
-			transient = iId3Keys[plugin]->CreateTransientKeyL(data->Des());
-			CEncryptedProtectionKey* epKey3 =
-				transient->EncryptL(*protKey3);
-			delete transient;
-			iId3Keys[plugin]->SetEncryptedProtectionKeyL(epKey3);
-		}
-	CleanupStack::Pop(4, protKey1);
-	}
-
-#endif	/* TAUTHDBSTEP_H */
--- a/authenticationservices/authenticationserver/test/tauthkeys/scripts/tauthkeys.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,31 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-// Description:
-//
-//! @file
-// authentication key classes tests
-
-LOAD_SUITE tauthkeys
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHKEYS-0001
-//! @SYMTestCaseDesc	Authentication key classes test
-START_TESTCASE SEC-AUT-AUTHKEYS-0001
-RUN_TEST_STEP 100 tauthkeys PERSIST 
-RUN_TEST_STEP 100 tauthkeys ENCRYPT_KEY
-END_TESTCASE SEC-AUT-AUTHKEYS-0001
- 
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/tauthkeys/step_encryptkey.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,134 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include <s32file.h>
-#include "tauthkeysstep.h"
-
-using namespace AuthServer;
-
-CTStepEncryptKey::CTStepEncryptKey()
-	{
-	SetTestStepName(KTStepEncryptKey);
-	}
-
-TVerdict CTStepEncryptKey::doTestStepL()
-	{
-	if (TestStepResult() != EPass)
-		{
-		return TestStepResult();
-		}
-__UHEAP_MARK;		// Check for memory leaks
-
-    TBool res = ETrue; 
-    TBool tmp = ETrue; 
-	TInt  err = KErrNone;
- 
-
-	_LIT8(KPluginData, "ABCDEFGHIJ");
-	_LIT8(KBadPluginData, "KLMNOPQRST");
-	_LIT(KPluginName, "PasswordPlugin");
-
-    HBufC* pluginName = HBufC::NewLC(14);
-	
-	*pluginName = KPluginName;
-
-	CTransientKeyInfo* transInfo =
-	  CTransientKeyInfo::NewLC(9999);
-	  
-	CTransientKey* transient =
-		transInfo->CreateTransientKeyL(KPluginData);
-	CleanupStack::PushL(transient);
-
-	CProtectionKey* protection =
-		CProtectionKey::NewL(8);
-	CleanupStack::PushL(protection);
-		
-	CEncryptedProtectionKey* encrypted =
-		transient->EncryptL(*protection);
-	
-	transInfo->SetEncryptedProtectionKeyL(encrypted);
-	
-	// try to set another key 
-	TRAP(err, transInfo->SetEncryptedProtectionKeyL(encrypted));
-	TEST(tmp = (err == KErrAlreadyExists));
-	res = tmp && res;
-	
-	// check the encrypted key is different from the protection key
-	TEST(tmp = (encrypted->KeyData() != protection->KeyData()));
-	res = tmp && res;
-	
-	CProtectionKey* decrypted =
-		transient->DecryptL(*encrypted);
-	CleanupStack::PushL(decrypted);
-
-	// check that the decrypted key is the same as the protection key
-	TEST(tmp = (protection->KeyData() == decrypted->KeyData()));
-	res = tmp && res;
-	
-	// check we can't use the wrong plugin data
-	CTransientKey* transient2 = 0;
-	TRAP(err, transient2 = transInfo->CreateTransientKeyL(KBadPluginData)); 
-	TEST(tmp = (err != KErrNone));
-	res = tmp && res;
-
-	// avoid set but unused warning...
-	if (transient2 == 0) transient2 = 0;
-	
-	CProtectionKey* client = protection->ClientKeyL(0xabababab);
-	CleanupStack::PushL(client);
-
-	CProtectionKey* client2 = protection->ClientKeyL(0xcdcdcdcd);
-	CleanupStack::PushL(client2);
-
-	// check protection key is different from the client key 
-	TEST(tmp = (protection->KeyData() != client->KeyData()));
-	res = tmp && res;
-	TEST(tmp = (protection->KeyData().Length() == client->KeyData().Length()));
-	res = tmp && res;
-
-	// check two client keys are different 
-	TEST(tmp = (client->KeyData() != client2->KeyData()));
-	res = tmp && res;
-	TEST(tmp = (client->KeyData().Length() == client2->KeyData().Length()));
-	res = tmp && res;
-
-	// check key lengths larger than SHA1 output is handled correctly 
-	CProtectionKey* protection2 =
-		CProtectionKey::NewL(512);
-	CleanupStack::PushL(protection2);
-
-	CProtectionKey* client3 = protection2->ClientKeyL(0xcdcdcdcd);
-	CleanupStack::PushL(client3);
-	
-	// check protection key is different from the client key 
-	TEST(tmp = (protection2->KeyData() != client3->KeyData()));
-	res = tmp && res;
-	TEST(tmp = (protection2->KeyData().Length() ==
-				client3->KeyData().Length()));
-	res = tmp && res;
-
-	// cleanup
-	CleanupStack::PopAndDestroy(8, transInfo);
-	CleanupStack::PopAndDestroy(pluginName);
-
-	SetTestStepResult(res ? EPass : EFail);
-	
-__UHEAP_MARKEND;	
-	return TestStepResult();
-	}
-
--- a/authenticationservices/authenticationserver/test/tauthkeys/step_persist.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,146 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include <s32file.h>
-#include "tauthkeysstep.h"
-#include <f32file.h>
-
-using namespace AuthServer;
-
-CTStepPersist::CTStepPersist()
-	{
-	SetTestStepName(KTStepPersist);
-	}
-
-TVerdict CTStepPersist::doTestStepL()
-	{
-	if (TestStepResult() != EPass)
-		{
-		return TestStepResult();
-		}
-__UHEAP_MARK;		// Check for memory leaks
-    
-    TBool res = ETrue;
-	TBool tmp = ETrue;
-
-	iFs.CreatePrivatePath(RFs::GetSystemDrive());
-    TBuf<50> path;
-    iFs.PrivatePath(path);
-    
-    _LIT(kProtFile, "prot.xxx");
-    _LIT(kTransFile, "trans.xxx");
-	_LIT8(KPluginData, "ABCDEFGHIJ");
-	_LIT(KPluginName, "PasswordPlugin");
-
-    HBufC* pluginName = HBufC::NewLC(14);
-	*pluginName = KPluginName;
-
-	// create elements
-	CTransientKeyInfo* transInfo =
-	  CTransientKeyInfo::NewLC(9999);
-	  
-    CTransientKey* transient =
-		transInfo->CreateTransientKeyL(KPluginData);
-	CleanupStack::PushL(transient);
-	
-	CProtectionKey* protection =
-		CProtectionKey::NewLC(8);
-	
-    CEncryptedProtectionKey* encrypted =
-		transient->EncryptL(*protection);
-	CleanupStack::PushL(encrypted);
-
-	transInfo->SetEncryptedProtectionKeyL(encrypted);
-	CleanupStack::Pop(encrypted);
-	
-	// write the encrypted key
-	RFileWriteStream writeProt;
-	
-    path.Insert(path.Length(), kProtFile);
-	User::LeaveIfError(writeProt.Replace(iFs, path,
-										 EFileShareExclusive | EFileStream));
-    CleanupClosePushL(writeProt);
-	
-	encrypted->ExternalizeL(writeProt);
-		
-	CleanupStack::PopAndDestroy(&writeProt);
-	
-	// read the encrypted key	
-	RFileReadStream readStream;
-
-	User::LeaveIfError(readStream.Open(iFs, path,
-									   EFileShareExclusive | EFileStream));
-	CleanupClosePushL(readStream);
-	
-	CEncryptedProtectionKey* encrypted2 =
-		CEncryptedProtectionKey::NewL(readStream);
-	CleanupStack::PushL(encrypted2);
- 
-	// test the restored key matches the saved
-	TEST(tmp = (encrypted->KeyData() == encrypted2->KeyData()));
-	res = tmp && res;
-
-	// write the transient key info
-	RFileWriteStream writeTrans;
-
-	iFs.PrivatePath(path);
-    path.Insert(path.Length(), kTransFile);
-	User::LeaveIfError(writeTrans.Replace(iFs, path,
-										 EFileShareExclusive | EFileStream));
-    CleanupClosePushL(writeTrans);
-	
-	transInfo->ExternalizeL(writeTrans);
-		
-	CleanupStack::PopAndDestroy(&writeTrans);
-
-	// read the transient key info 
-	RFileReadStream readStream2;
-
-	User::LeaveIfError(readStream2.Open(iFs, path,
-									   EFileShareExclusive | EFileStream));
-	CleanupClosePushL(readStream2);
-	
-	CTransientKeyInfo* transInfo2 =
-		CTransientKeyInfo::NewL(readStream2);
-	CleanupStack::PushL(transInfo2);
-
-	// recreate the transient key
-	CTransientKey* transient2 = 
-		transInfo2->CreateTransientKeyL(KPluginData);
-	CleanupStack::PushL(transient2);
-
-	// recreate the protection key.
-	CProtectionKey* decrypted =
-		transient2->DecryptL(transInfo2->EncryptedKey());
-	CleanupStack::PushL(decrypted);
-    
-    // test that the protection key and decrypted key are the same
-	TEST(tmp = (protection->KeyData() == decrypted->KeyData()));
-	res = tmp && res;
-		
-	SetTestStepResult(res ? EPass : EFail);
-
-	CleanupStack::PopAndDestroy(9, transInfo);
-    CleanupStack::PopAndDestroy(pluginName);
-
-    iFs.Delete(path);
-	
-__UHEAP_MARKEND;	
-	return TestStepResult();
-	}
-
--- a/authenticationservices/authenticationserver/test/tauthkeys/tauthkeys.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,52 +0,0 @@
-/*
-* Copyright (c) 2004-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-TARGET			tauthkeys.exe
-TARGETTYPE		exe
-UID				0x1000007A 0x10204F0D
-VENDORID		0x70000001
-
-SOURCEPATH		.
-SOURCE			tauthkeysserver.cpp
-SOURCE			step_persist.cpp
-SOURCE			step_encryptkey.cpp
-SOURCE          ../../source/server/encryptedprotectionkey.cpp
-SOURCE          ../../source/server/transientkey.cpp
-SOURCE          ../../source/server/transientkeyinfo.cpp
-
-USERINCLUDE		.
-USERINCLUDE		../../source/common
-USERINCLUDE		../../source/server
-USERINCLUDE		../../source/client
-USERINCLUDE		../../inc_private
-USERINCLUDE ../../inc/authserver
-
-OS_LAYER_SYSTEMINCLUDE
-SYSTEMINCLUDE OS_LAYER_PLATFORM_EXPORT_PATH(test)
-
-LIBRARY			euser.lib
-LIBRARY			efsrv.lib
-LIBRARY			estor.lib
-LIBRARY         testexecuteutils.lib
-LIBRARY         testexecutelogclient.lib
-LIBRARY         random.lib
-LIBRARY         pbe.lib
-LIBRARY         cryptography.lib
-LIBRARY         authclient.lib
-LIBRARY         authcommon.lib
-SMPSAFE
--- a/authenticationservices/authenticationserver/test/tauthkeys/tauthkeysserver.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,95 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* server implementation
-*
-*/
-
-
-/**
- @file 
-*/
-
-#include "tauthkeysserver.h"
-#include "tauthkeysstep.h"
-
-_LIT(KServerName,"tauthkeys");
-
-/**
- * Called inside the MainL() function to create and start the CTestServer 
- * derived server.
- * @return Instance of the test server
- */
-CTAuthKeysServer* CTAuthKeysServer::NewL()
-	{
-	CTAuthKeysServer * server = new (ELeave) CTAuthKeysServer();
-	CleanupStack::PushL(server);
-	
-	// Either use a StartL or ConstructL, the latter will permit Server Logging.
-
-	server->ConstructL(KServerName);
-	CleanupStack::Pop(server);
-	return server;
-	}
-
-LOCAL_C void MainL()
-	{
-	// Leave the hooks in for platform security
-#if (defined __DATA_CAGING__)
-	RProcess().DataCaging(RProcess::EDataCagingOn);
-	RProcess().SecureApi(RProcess::ESecureApiOn);
-#endif
-	CActiveScheduler* sched=NULL;
-	sched=new(ELeave) CActiveScheduler;
-	CleanupStack::PushL(sched);
-	CActiveScheduler::Install(sched);
-	CTAuthKeysServer* server = NULL;
-	// Create the CTestServer derived server
-	TRAPD(err,server = CTAuthKeysServer::NewL());
-	if(!err)
-		{
-		RProcess::Rendezvous(KErrNone);
-		sched->Start();
-		}
-	CleanupStack::Pop(sched);
-	delete server;
-	delete sched;
-	}
-
-GLDEF_C TInt E32Main()
-	{
-	CTrapCleanup* cleanup = CTrapCleanup::New();
-	if(cleanup == NULL)
-		{
-		return KErrNoMemory;
-		}
-	TRAP_IGNORE(MainL());	
-	delete cleanup;
-	return KErrNone;
-    }
-
-CTestStep* CTAuthKeysServer::CreateTestStep(const TDesC& aStepName)
-	{
-	CTestStep* testStep = NULL;
-
-	if(aStepName == KTStepPersist)
-		{
-		testStep = new CTStepPersist();
-		}
-	else if(aStepName == KTStepEncryptKey)
-		{
-		testStep = new CTStepEncryptKey();
-		}
-	return testStep;
-	}
--- a/authenticationservices/authenticationserver/test/tauthkeys/tauthkeysserver.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,37 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* TAuthKeysServer is the server for all authentication keys tests
-*
-*/
-
-
-#ifndef TAUTHKEYSSERVER_H
-#define TAUTHKEYSSERVER_H
-#include <test/testexecuteserverbase.h>
-
-
-class CTAuthKeysServer : public CTestServer
-	{
-public:
-	static CTAuthKeysServer*	NewL();
-	virtual CTestStep*			CreateTestStep(const TDesC& aStepName);
-	RFs& Fs()	{return iFs;};
-
-private:
-	RFs								iFs;
-	};
-
-#endif	/* TAUTHKEYSSERVER_H */
-
--- a/authenticationservices/authenticationserver/test/tauthkeys/tauthkeysstep.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,69 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#ifndef TAUTHKEYSSTEP_H
-#define TAUTHKEYSSTEP_H
-
-#include <test/testexecutestepbase.h>
-#include <test/testexecutelog.h>
-#include "tauthkeysserver.h"
-
-#include "encryptedprotectionkey.h"
-#include "transientkey.h"  
-#include "transientkey.h"  
-#include "transientkeyinfo.h"
-
-_LIT(KTStepPersist,	"PERSIST");
-_LIT(KTStepEncryptKey,	"ENCRYPT_KEY");
-
-class CTAuthKeysStepBase : public CTestStep
-	{
-protected:
-	CTAuthKeysStepBase() {}
-	~CTAuthKeysStepBase() {}
-	virtual TVerdict doTestStepPreambleL()
-	{
-	iFs.Connect();
- 	return TestStepResult();
-	}
-	virtual TVerdict doTestStepPostambleL()
-	{
-	iFs.Close();
-	return TestStepResult();
-	}
-	
-protected:
-	RFs		iFs;
-	};
-
-class CTStepPersist : public CTAuthKeysStepBase
-	{
-public:
-	CTStepPersist();
-	virtual TVerdict doTestStepL();
-	};
-
-
-class CTStepEncryptKey : public CTAuthKeysStepBase
-	{
-public:
-	CTStepEncryptKey();
-	virtual TVerdict doTestStepL();
-	};
-
-#endif	/* TAUTHKEYSSTEP_H */
--- a/authenticationservices/authenticationserver/test/tauthplugins/10204f0e.rss	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,76 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* 10274104.rss
-* UIDs quick-ref
-* ECOM DLL UID:			0x10204F0E 
-* ECOM interface UID:		0x12345678
-* ECOM Implementation:		0x102741040, 0x10274105
-*
-*/
-
-
-#include <ecom/registryinfov2.rh>
-
-RESOURCE REGISTRY_INFO r_registry
-{
-	dll_uid = 0x10204F0E;
-	resource_format_version = RESOURCE_FORMAT_VERSION_2;
-	interfaces =
-	{
-		INTERFACE_INFO
-		{ 
-		interface_uid = 0x102740FE;	// Const for all data recognisers
-		implementations = 
-			{
-			IMPLEMENTATION_INFO
-				{
-				implementation_uid = 0x10274104;
-				version_no = 1;
-				display_name = "testplugin1";
-				default_data = "10274104";
-				opaque_data = "";
-				rom_only=0;
-				},
-			IMPLEMENTATION_INFO
-				{
-				implementation_uid = 0x10274105;
-				version_no = 1;
-				display_name = "BlockingPlugin";
-				default_data = "10274105";
-				opaque_data = "";
-				rom_only=1;
-				},
-			IMPLEMENTATION_INFO
-				{
-				implementation_uid = 0x10274106;
-				version_no = 1;
-				display_name = "InactivePlugin";
-				default_data = "10274106";
-				opaque_data = "";
-				rom_only=1;
-				},
-			IMPLEMENTATION_INFO
-				{
-				implementation_uid = 0x10274107;
-				version_no = 1;
-				display_name = "UnknownIdPlugin";
-				default_data = "10274107";
-				opaque_data = "";
-				rom_only=1;
-				}
-			};
-		}
-	};
-}
--- a/authenticationservices/authenticationserver/test/tauthplugins/10204f0e_upgrade.rss	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,76 +0,0 @@
-/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* 1027410e_upgrade.rss
-* UIDs quick-ref
-* ECOM DLL UID:			0x10204F0E 
-* ECOM interface UID:		0x12345678
-* ECOM Implementation:		0x10274104, 0x10274105
-*
-*/
-
-
-#include <ecom/registryinfov2.rh>
-
-RESOURCE REGISTRY_INFO r_registry
-{
-	dll_uid = 0x10204F0E;
-	resource_format_version = RESOURCE_FORMAT_VERSION_2;
-	interfaces =
-	{
-		INTERFACE_INFO
-		{ 
-		interface_uid = 0x102740FE;	// Const for all data recognisers
-		implementations = 
-			{
-			IMPLEMENTATION_INFO
-				{
-				implementation_uid = 0x10274104;
-				version_no = 2;
-				display_name = "testplugin1";
-				default_data = "10274104";
-				opaque_data = "";
-				rom_only=0;
-				},
-			IMPLEMENTATION_INFO
-				{
-				implementation_uid = 0x10274105;
-				version_no = 1;
-				display_name = "BlockingPlugin";
-				default_data = "10274105";
-				opaque_data = "";
-				rom_only=1;
-				},
-			IMPLEMENTATION_INFO
-				{
-				implementation_uid = 0x10274106;
-				version_no = 1;
-				display_name = "InactivePlugin";
-				default_data = "10274106";
-				opaque_data = "";
-				rom_only=1;
-				},
-			IMPLEMENTATION_INFO
-				{
-				implementation_uid = 0x10274107;
-				version_no = 1;
-				display_name = "UnknownIdPlugin";
-				default_data = "10274107";
-				opaque_data = "";
-				rom_only=1;
-				}
-			};
-		}
-	};
-}
--- a/authenticationservices/authenticationserver/test/tauthplugins/consts.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,30 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include "authserver/authtypes.h"
-
-_LIT(KPluginName, "Test Plugin #1");
-_LIT(KPluginDescription, "Returns known id and data for each method.");
-
-_LIT8(KIdentifyData, "ABABABABABABABABABAB");
-_LIT8(KTrainData, "BABABABABABABABABABA");
-_LIT8(KRetrainData, "CCCCCCCCCCCCCCCCCCCC");
-
-static const TInt KEntropy = 999;
-static const TInt KFalsePos = 100;
-static const TInt KFalseNeg = 10;
--- a/authenticationservices/authenticationserver/test/tauthplugins/scripts/tauthplugins.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,28 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-//! @file
-// authentication plugins tests
-
-LOAD_SUITE tauthplugins
-
-////
-//! @SYMTestCaseID SEC-AUT-AUTHPLUGINS-0001
-//! @SYMTestCaseDesc	Authentication plugins test
-START_TESTCASE SEC-AUT-AUTHPLUGINS-0001
-RUN_TEST_STEP 100 tauthplugins INTERFACE 
-END_TESTCASE SEC-AUT-AUTHPLUGINS-0001
- 
\ No newline at end of file
--- a/authenticationservices/authenticationserver/test/tauthplugins/step_interface.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,269 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include "tauthpluginsstep.h"
-#include "consts.h"
-
-#include <test/testexecutelog.h>
-#include "authserver/authplugininterface.h"
-#include <e32std.h>
-#include <s32file.h>
-#include <ecom/implementationinformation.h>
-#include <ecom/ecom.h>
-#include <authserver/authpatchdata.h>
-#include <authserver/auth_srv_errs.h>
-#include <u32hal.h> 
-#include <e32svr.h>
-
-using namespace AuthServer;
-
-CTStepInterface::CTStepInterface()
-	{
-	SetTestStepName(KTStepInterface);
-	}
-
-CTStepInterface::~CTStepInterface()
-	{}
-
-TInt HexString2Num(const TDesC8& aStr)
-  {
-  	TInt data = 0;
-	TInt char2hex = 0;
-	TInt c = 0;
-	for (TInt i = 0 ; i < aStr.Length() ; ++i)
-	  {
-	  c = aStr[i];
-	  
-	  if (c < 'A')
-	    {
-	    char2hex='0';
-	    }
-	  else if (c < 'a')
-	    {
-	    char2hex=('A'-10);
-	    }
-	  else
-	    {
-	    char2hex=('a'-10);
-	    }
-	  data = data << 4;      
-	  data += aStr[i]-char2hex; 
-	  }
-	return data;
-  }
-
-TVerdict CTStepInterface::doTestStepPreambleL()
-	{
-	TVerdict verdict = CTAuthPluginsStepBase::doTestStepPreambleL();
-	iActiveScheduler = new(ELeave) CActiveScheduler();
-	CActiveScheduler::Install(iActiveScheduler);
-	return verdict;
-	}
-
-TVerdict CTStepInterface::doTestStepPostambleL()
-	{
-	TVerdict verdict = CTAuthPluginsStepBase::doTestStepPostambleL();
-	delete iActiveScheduler;
-	return verdict;
-	}
-	
-TVerdict CTStepInterface::doTestStepL()
-	{
-	if (TestStepResult() != EPass)
-		{
-		return TestStepResult();
-		}
-__UHEAP_MARK;		// Check for memory leaks
-	
-    TBool res = ETrue; 
-    TBool tmp = ETrue; 
-	TInt  err = KErrNone;
-
-	RImplInfoPtrArray impl;
-	CleanupClosePushL(impl);
-	REComSession::ListImplementationsL(KCAuthPluginInterfaceUid, impl);
-	
-	TEST(tmp = impl.Count() > 0);
-	res = tmp && res;
-
-	
-	TInt data = HexString2Num(impl[0]->DataType());
-
-    INFO_PRINTF2(_L("Implementation Id: 0x%x"),impl[0]->ImplementationUid().iUid);
-    INFO_PRINTF2(_L("Display Name: %S"),&impl[0]->DisplayName());
-    INFO_PRINTF2(_L("Default Data: %x"),data);
-    INFO_PRINTF2(_L("Rom Only: %d"),impl[0]->RomOnly());
-    INFO_PRINTF2(_L("Rom Based: %d"),impl[0]->RomBased());
-
-	CAuthPluginInterface* plugin = 0;
-
-	TEComResolverParams resolverParams;
-	TBufC8<16> pluginIdTxt;
-			  
-	pluginIdTxt.Des().Format(_L8("%x"), impl[0]->ImplementationUid().iUid);
-				  
-	resolverParams.SetDataType(pluginIdTxt);
-				  
-	TAny* tempPlugin = 0; 
-	TUid Dtor_ID_Key = TUid::Null();
-  	TRAP(err, tempPlugin = 
-	REComSession::CreateImplementationL(KCAuthPluginInterfaceUid,
-										Dtor_ID_Key,
-										resolverParams));
-  	
-  	plugin = reinterpret_cast<CAuthPluginInterface*>(tempPlugin);	
-	if (plugin != 0)
-	    {
-	    
-	    	
-
-	    TRequestStatus t;
-	    TIdentityId id;
-
-	    HBufC8* data = 0; 
-	    plugin->Identify(id, KNullDesC(), data,t);
-        CleanupStack::PushL(data);
-        
-	    TEST(tmp = id == 22);
-    	res = tmp && res;
-	    
-	    TEST(tmp = *data == KIdentifyData);
-    	res = tmp && res;
-
-	    HBufC8* data2 = 0; 
-        plugin->Train(id,data2,t);
-        CleanupStack::PushL(data2);
-        
-        TEST(tmp = *data2 == KTrainData);
-    	res = tmp && res;
-    	
-	    HBufC8* data4 = 0; 
-        TEST(tmp = plugin->DefaultData(0, data4) == KErrNotSupported);
-    	res = tmp && res;
-
-        TEST(tmp = plugin->Name() == KPluginName);
-    	res = tmp && res;		
-
-        TEST(tmp = plugin->Description() == KPluginDescription);
-    	res = tmp && res;
-
-        TEST(tmp = plugin->MinEntropy() == KEntropy);
-    	res = tmp && res;
-
-        TEST(tmp = plugin->FalsePositiveRate() == KFalsePos);
-    	res = tmp && res;
-
-        TEST(tmp = plugin->FalseNegativeRate() == KFalseNeg);
-    	res = tmp && res;
-		
-	    CleanupStack::PopAndDestroy(2);
-	    delete plugin;
-	    REComSession::DestroyedImplementation(Dtor_ID_Key);
-	    }
-	else
-	    {
-	    ERR_PRINTF1(_L("Failed to load plugin"));
-	        
-	    res = false;
-	    }
-	    
-	 
-	TInt count = impl.Count();		
-	for (TInt i = 0; i < count; i++)
-		{
-
-		TEComResolverParams resolverParams;
-		TBufC8<16> pluginIdTxt;
-			  
-		pluginIdTxt.Des().Format(_L8("%x"), impl[i]->ImplementationUid().iUid);
-		//paste begin
-
-    	pluginIdTxt.Des().UpperCase();
-		resolverParams.SetDataType(pluginIdTxt);
-			  
-		//To load plugins from sources other than ROM the patch 
-		// data KEnablePostMarketAuthenticationPlugins must be set to True.
-		TUint32 enablePostMarketPlugin = KEnablePostMarketAuthenticationPlugins;
-
-#ifdef __WINS__
-    
-		// Default SymbianOS behavior is to only load auth plugins from ROM.
-		enablePostMarketPlugin = 0;
-
-		// For the emulator allow the constant to be patched via epoc.ini
-		UserSvr::HalFunction(EHalGroupEmulator, EEmulatorHalIntProperty,
-       (TAny*)"KEnablePostMarketAuthenticationPlugins", &enablePostMarketPlugin); // read emulator property (if present)
-
-#endif
-
-    	  TAny* tempPlugin = 0;
-		  TInt err = 0;
-		  TUid Dtor_ID_Key = TUid::Null();
-			  
-		 if(enablePostMarketPlugin == 0) 
-		  	{
-		  	TRAP(err, tempPlugin = 
-			REComSession::CreateImplementationL(KCAuthPluginInterfaceUid,
-												Dtor_ID_Key,
-												resolverParams,
-												KRomOnlyResolverUid));
-		  	}
-		  
-		  else
-		  	{
-		  	TRAP(err, tempPlugin = 
-			REComSession::CreateImplementationL(KCAuthPluginInterfaceUid,
-												Dtor_ID_Key,
-												resolverParams));
-		  	}
-		  
-		 if (err == KErrNotFound)
-		    {
-		    err = KErrAuthServNoSuchPlugin;  
-		    }
-		  User::LeaveIfError(err);
-		    						  	  	
-		plugin = reinterpret_cast<CAuthPluginInterface*>(tempPlugin);	
-
-	    INFO_PRINTF2(_L("ID:           0x%x"),plugin->Id());
-	    INFO_PRINTF2(_L("Name:         %S"),&plugin->Name());
-	    INFO_PRINTF2(_L("Description:  %S"),&plugin->Description());
-	    INFO_PRINTF2(_L("Type          %x"),plugin->Type());
-	    INFO_PRINTF2(_L("MinEntropy:   %d"),plugin->MinEntropy());
-	    INFO_PRINTF2(_L("FPR           %d"),plugin->FalsePositiveRate());
-	    INFO_PRINTF2(_L("FNR           %d"),plugin->FalseNegativeRate());
-	    INFO_PRINTF2(_L("IsActive      %d"),plugin->IsActive());
-		HBufC8* buf = 0;
-		INFO_PRINTF2(_L("DefaultData   %d"),plugin->DefaultData(0,buf));
-		if (buf) { delete buf; }
-		
-	    delete plugin;
-		delete impl[i];
-		REComSession::DestroyedImplementation(Dtor_ID_Key);
-		}
-	
-	CleanupStack::PopAndDestroy(&impl);
-	
-	REComSession::FinalClose();
-
-	SetTestStepResult(res ? EPass : EFail);
-	
-__UHEAP_MARKEND;	
-	return TestStepResult();
-	}
-
--- a/authenticationservices/authenticationserver/test/tauthplugins/tauthplugins.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,46 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-TARGET			tauthplugins.exe
-TARGETTYPE		exe
-UID				0x1000007A 0x10204F0D
-VENDORID		0x70000001
-
-OS_LAYER_SYSTEMINCLUDE
-SYSTEMINCLUDE OS_LAYER_PLATFORM_EXPORT_PATH(test)
-
-USERINCLUDE			.
-USERINCLUDE			../../source/common
-USERINCLUDE			../../source/server
-USERINCLUDE			../../source/client
-USERINCLUDE			../../inc_private
-
-SOURCEPATH		.
-SOURCE			tauthpluginsserver.cpp
-SOURCE			step_interface.cpp
-
-SOURCE          ../../source/common/plugindesc.cpp
-
-LIBRARY			euser.lib
-LIBRARY			efsrv.lib
-LIBRARY			estor.lib
-LIBRARY         testexecuteutils.lib
-LIBRARY         testexecutelogclient.lib
-LIBRARY         ecom.lib
-LIBRARY			authcommon.lib
-SMPSAFE
--- a/authenticationservices/authenticationserver/test/tauthplugins/tauthpluginsserver.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,92 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* server implementation
-*
-*/
-
-
-/**
- @file 
-*/
-
-#include "tauthpluginsserver.h"
-#include "tauthpluginsstep.h"
-
-_LIT(KServerName,"tauthplugins");
-
-/**
- * Called inside the MainL() function to create and start the CTestServer 
- * derived server.
- * @return Instance of the test server
- */
-CTAuthPluginsServer* CTAuthPluginsServer::NewL()
-	{
-	CTAuthPluginsServer * server = new (ELeave) CTAuthPluginsServer();
-	CleanupStack::PushL(server);
-	
-	// Either use a StartL or ConstructL, the latter will permit Server Logging.
-
-	server->ConstructL(KServerName);
-	CleanupStack::Pop(server);
-	return server;
-	}
-
-LOCAL_C void MainL()
-	{
-	// Leave the hooks in for platform security
-#if (defined __DATA_CAGING__)
-	RProcess().DataCaging(RProcess::EDataCagingOn);
-	RProcess().SecureApi(RProcess::ESecureApiOn);
-#endif
-	CActiveScheduler* sched=NULL;
-	sched=new(ELeave) CActiveScheduler;
-	CleanupStack::PushL(sched);
-	CActiveScheduler::Install(sched);
-	CTAuthPluginsServer* server = NULL;
-	// Create the CTestServer derived server
-	TRAPD(err,server = CTAuthPluginsServer::NewL());
-	if(!err)
-		{
-		RProcess::Rendezvous(KErrNone);
-		sched->Start();
-		}
-	CleanupStack::Pop(sched);
-	delete server;
-	delete sched;
-	}
-
-GLDEF_C TInt E32Main()
-	{
-	CTrapCleanup* cleanup = CTrapCleanup::New();
-	if(cleanup == NULL)
-		{
-		return KErrNoMemory;
-		}
-	TRAP_IGNORE(MainL());	
-	delete cleanup;
-	return KErrNone;
-    }
-
-CTestStep* CTAuthPluginsServer::CreateTestStep(const TDesC& aStepName)
-	{
-	CTestStep* testStep = NULL;
-
-	if(aStepName == KTStepInterface)
-		{
-		testStep = new CTStepInterface();
-		}
-
-	return testStep;
-	}
--- a/authenticationservices/authenticationserver/test/tauthplugins/tauthpluginsserver.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,36 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* TAuthPluginsServer is the server for all authentication plugins tests
-*
-*/
-
-
-#ifndef TAUTHPLUGINSSERVER_H
-#define TAUTHPLUGINSSERVER_H
-#include <test/testexecuteserverbase.h>
-
-class CTAuthPluginsServer : public CTestServer
-	{
-public:
-	static CTAuthPluginsServer*	NewL();
-	virtual CTestStep*			CreateTestStep(const TDesC& aStepName);
-	RFs& Fs()	{return iFs;};
-
-private:
-	RFs								iFs;
-	};
-
-#endif	/* TAUTHPLUGINSSERVER_H */
-
--- a/authenticationservices/authenticationserver/test/tauthplugins/tauthpluginsstep.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,61 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#ifndef TAUTHPLUGINSSTEP_H
-#define TAUTHPLUGINSSTEP_H
-
-#include <test/testexecutestepbase.h>
-#include "tauthpluginsserver.h"
-
-_LIT(KTStepInterface, "INTERFACE");
-
-class CTAuthPluginsStepBase : public CTestStep
-	{
-protected:
-	CTAuthPluginsStepBase() {}
-	~CTAuthPluginsStepBase() {}
-	virtual TVerdict doTestStepPreambleL()
-	{
-	iFs.Connect();
- 	return TestStepResult();
-	}
-	virtual TVerdict doTestStepPostambleL()
-	{
-	iFs.Close();
-	return TestStepResult();
-	}
-	
-protected:
-	RFs		iFs;
-	};
-
-
-class CTStepInterface : public CTAuthPluginsStepBase
-	{
-public:
-	CTStepInterface();
-	~CTStepInterface();
-	virtual TVerdict doTestStepL();
-	virtual TVerdict doTestStepPreambleL();
-	virtual TVerdict doTestStepPostambleL();
-	
-private:
-	CActiveScheduler* iActiveScheduler;
-	};
-
-#endif	/* TAUTHPLUGINSSTEP_H */
--- a/authenticationservices/authenticationserver/test/tauthplugins/testplugins.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,249 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include "testplugins.h"
-#include <ecom/ecom.h>
-#include <f32file.h>
-#include "consts.h"
-
-using namespace AuthServer;
-
-TBool E32Dll()
-  {
-  return (ETrue);
-  }
-
-CTestPlugin1::CTestPlugin1()  : iActive(false)
-  {
-  iName.Set(KPluginName);
-  iDescription.Set(KPluginDescription);
-  iType = EAuthKnowledge;
-  iMinEntropy = KEntropy;
-  iFalsePositiveRate = KFalsePos;
-  iFalseNegativeRate = KFalseNeg;
-
-  RFs fs;
-  fs.Connect();
-  TEntry file;
-  
-  _LIT(KActiveFile, "\\testplugin_active\\");
-  TDriveUnit sysDrive (fs.GetSystemDrive());
-  TBuf<128> activeFile (sysDrive.Name());
-  activeFile.Append(KActiveFile);
-  iActive = fs.Entry(activeFile, file);;
-  fs.Close();
-  //RDebug::Printf("Plugin started, active = %d", iActive);
-  iActive = iActive != KErrNotFound;
-  //RDebug::Printf("Plugin started, active = %d", iActive);
-  }
-
-void CTestPlugin1::Identify(TIdentityId& aId, const TDesC& /*aClientMessage*/,
-							HBufC8*& aResult, TRequestStatus& aRequest)
-    {
-	aId = 22;
-	aResult = HBufC8::New(20);
-	
-	TRequestStatus *stat = &aRequest;
-	
-	if(aResult == NULL)
-			{
-			User::RequestComplete(stat, KErrNoMemory);
-			return;
-			}
-	
-	*aResult = KIdentifyData;
-	User::RequestComplete(stat, KErrNone);
-    }
-  
-void CTestPlugin1::Train(TIdentityId /*aId*/, HBufC8*& aResult,
-						 TRequestStatus& aRequest)
-    {
-	aResult = HBufC8::New(20);
-	
-	TRequestStatus* status = &aRequest;
-	
-	if(aResult == NULL)
-		{
-		User::RequestComplete(status, KErrNoMemory);
-		return;
-		}
-
-	*aResult = KTrainData;
-	User::RequestComplete(status, KErrNone);
-			
-	}
-
-
-void CUnknownPlugin::Identify(TIdentityId& aId, const TDesC& /*aClientMessage*/,
-							  HBufC8*& aResult, TRequestStatus& aRequest)
-    {
-	aId = KUnknownIdentity;
-	aResult = HBufC8::New(0);
-	
-	TRequestStatus *stat = &aRequest;
-	
-	if(aResult == NULL)
-		{
-		User::RequestComplete(stat, KErrNoMemory);
-		return;
-		}
-	
-	User::RequestComplete(stat, KErrNone);
-    }
-  
-void CUnknownPlugin::Train(TIdentityId /*aId*/, HBufC8*& aResult,
-						 TRequestStatus& aRequest)
-    {
-	aResult = HBufC8::New(0);
-	TRequestStatus* status = &aRequest;
-	
-	if(aResult == NULL)
-		{
-		User::RequestComplete(status, KErrNoMemory);
-		return;
-		}
-	
-	User::RequestComplete(status, KErrAuthServPluginCancelled);
-	}
-
-TBool CTestPlugin1::IsActive() const 
-    {
-	return iActive;
-	}
-
-
-TInt CTestPlugin1::Forget(TIdentityId /*aId*/)
-    {
-	return KErrNone;
-    }
-TInt CTestPlugin1::DefaultData(TIdentityId /*aId*/, HBufC8*& /*aOutputBuf*/)
-    {
-	return KErrNotSupported;
-    }
-
-TInt CTestPlugin1::Reset(TIdentityId /*aId*/, const TDesC& /*aRegistrationData*/, HBufC8*& /*aResult*/)
-	{
-	return KErrNotSupported;
-	}
-
-const TImplementationProxy ImplementationTable[] =
-  {
-	IMPLEMENTATION_PROXY_ENTRY(0x10274104, CTestPlugin1::NewL),
-	IMPLEMENTATION_PROXY_ENTRY(0x10274105, CBlockPlugin::NewL),
-	IMPLEMENTATION_PROXY_ENTRY(0x10274106, CInactivePlugin::NewL),
-	IMPLEMENTATION_PROXY_ENTRY(0x10274107, CUnknownPlugin::NewL)
-  };
-
-EXPORT_C const TImplementationProxy* ImplementationGroupProxy(TInt& aTableCount)
-  {
-  aTableCount = sizeof(ImplementationTable) /
-	sizeof(TImplementationProxy);
-  return ImplementationTable;
-  }
-
-const TPtrC& CTestPlugin1::Name() const
-  {
-  return iName;
-  }
-const TPtrC& CTestPlugin1::Description() const
-  {
-  return iDescription;
-  }
-TAuthPluginType CTestPlugin1::Type() const 
-  {
-  return iType;
-  }
-
-TEntropy CTestPlugin1::MinEntropy() const
-  {
-  return iMinEntropy;
-  }
-
-TPercentage CTestPlugin1::FalsePositiveRate() const
-  {
-  return iFalsePositiveRate;
-  }
-
-TPercentage CTestPlugin1::FalseNegativeRate() const
-  {
-  return iFalseNegativeRate;
-  }
-
-
-//Unknown Plugin
-
-const TPtrC& CUnknownPlugin::Name() const
-  {
-  return iName;
-  }
-const TPtrC& CUnknownPlugin::Description() const
-  {
-  return iDescription;
-  }
-AuthServer::TAuthPluginType CUnknownPlugin::Type() const 
-  {
-  return iType;
-  }
-
-AuthServer::TEntropy CUnknownPlugin::MinEntropy() const
-  {
-  return iMinEntropy;
-  }
-
-AuthServer::TPercentage CUnknownPlugin::FalsePositiveRate() const
-  {
-  return iFalsePositiveRate;
-  }
-
-AuthServer::TPercentage CUnknownPlugin::FalseNegativeRate() const
-  {
-  return iFalseNegativeRate;
-  }
-
-
-
-//Inactive Plugin
-
-const TPtrC& CInactivePlugin::Name() const
-  {
-  return iName;
-  }
-const TPtrC& CInactivePlugin::Description() const
-  {
-  return iDescription;
-  }
-AuthServer::TAuthPluginType CInactivePlugin::Type() const 
-  {
-  return iType;
-  }
-
-AuthServer::TEntropy CInactivePlugin::MinEntropy() const
-  {
-  return iMinEntropy;
-  }
-
-AuthServer::TPercentage CInactivePlugin::FalsePositiveRate() const
-  {
-  return iFalsePositiveRate;
-  }
-
-AuthServer::TPercentage CInactivePlugin::FalseNegativeRate() const
-  {
-  return iFalseNegativeRate;
-  }
-
--- a/authenticationservices/authenticationserver/test/tauthplugins/testplugins.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,231 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include <ecom/implementationproxy.h>
-#include <e32base.h>
-
-#include "authserver/authplugininterface.h"
-#include "authserver/authtypes.h"
-#include "authserver/auth_srv_errs.h"
-
-
-
-namespace AuthServer
-{
-class CTestPlugin1 : public CAuthPluginInterface
-	{
-public:
-	static CTestPlugin1* NewL()
-	{ return new (ELeave) CTestPlugin1(); }
-
-	CTestPlugin1();
-	virtual ~CTestPlugin1() {}
-	virtual TPluginId Id() const { return 0x10274104; }
-	virtual void Train(TIdentityId aId, HBufC8*& aResult,
-  					   TRequestStatus& aRequest);
-	virtual void Cancel() {};
- 
-	virtual  void Identify(TIdentityId& aId, const TDesC& aClientMessage,
-						   HBufC8*& aResult, TRequestStatus& aRequest);
-
-	virtual TBool IsActive() const;
-	virtual TInt Forget(TIdentityId aId);
-	virtual TInt DefaultData(TIdentityId aId, HBufC8*& aOutputBuf);
-	virtual TInt Reset(TIdentityId aId, const TDesC& aRegistrationData, HBufC8*& aResult);
-	virtual const TPtrC& Name() const;
-	virtual const TPtrC& Description() const;
-	virtual AuthServer::TEntropy MinEntropy() const;
-	virtual AuthServer::TPercentage FalsePositiveRate() const;
-	virtual AuthServer::TPercentage FalseNegativeRate() const;
-	virtual AuthServer::TAuthPluginType Type() const;
-
-protected:
- 	/// The name of the plugin. Derived classes should set this member.
- 	TPtrC iName;
- 	/// The plugin's description. Derived classes should set this member.
- 	TPtrC iDescription;
- 	/// The minumum entropy provided by the plugin. Derived classes should set
- 	/// this member.
- 	AuthServer::TEntropy iMinEntropy;
- 	/// The false positive rate of the plugin. Derived classes should set this
- 	/// member.
- 	AuthServer::TPercentage iFalsePositiveRate;
- 	/// The false negative rate of the plugin. Derived classes should set this
- 	/// member.
- 	AuthServer::TPercentage iFalseNegativeRate;
-  	/// The type of the plugin. Derived classes should set this member.
- 	AuthServer::TAuthPluginType iType;
- 	/// the state of the plugin.
- 	TBool iActive;
-
-    };
-
-class CInactivePlugin : public CTestPlugin1
-	{
-public:
-	static CInactivePlugin* NewL()
-	{ return new (ELeave) CInactivePlugin(); }
-
-	CInactivePlugin() {}
-	virtual ~CInactivePlugin() {}
-	virtual TPluginId Id() const { return 0x10274106; }
-
-	virtual TBool IsActive() const { return EFalse; }
-	virtual const TPtrC& Name() const;
-	virtual const TPtrC& Description() const;
-	virtual AuthServer::TEntropy MinEntropy() const;
-	virtual AuthServer::TPercentage FalsePositiveRate() const;
-	virtual AuthServer::TPercentage FalseNegativeRate() const;
-	virtual AuthServer::TAuthPluginType Type() const;
-    };
-
-
-class CUnknownPlugin : public CTestPlugin1
-	{
-public:
-	static CUnknownPlugin* NewL()
-	{ return new (ELeave) CUnknownPlugin(); }
-
-	CUnknownPlugin() {}
-	virtual ~CUnknownPlugin() {}
-	virtual TPluginId Id() const { return 0x10274107; }
-	virtual  void Identify(TIdentityId& aId,  const TDesC& aClientMessage,
-							HBufC8*& aResult, TRequestStatus& aRequest);
-
-	virtual void Train(TIdentityId aId, HBufC8*& aResult,
-  					   TRequestStatus& aRequest);
-	virtual TBool IsActive() const { return ETrue; }
-	const TPtrC& Name() const;
-	const TPtrC& Description() const;
-	virtual AuthServer::TEntropy MinEntropy() const;
-	virtual AuthServer::TPercentage FalsePositiveRate() const;
-	virtual AuthServer::TPercentage FalseNegativeRate() const;
-	virtual AuthServer::TAuthPluginType Type() const;
-    };
-    
-class CWaitToComplete : public CTimer
-    {
-    public: 
-    CWaitToComplete() : CTimer(EPriorityNormal)
-        { CTimer::ConstructL(); }
-        
-    void RunL()
-        {
-        RDebug::Printf("TestPlugin waittocomplete RUNL() : %d", iStatus.Int());
-        if (iStatus != KErrNone)
-            {
-            iReturn = iStatus.Int();
-            }
-        User::RequestComplete(iCliReq, iReturn); 
-        }
-        
-     
-    void SetCliStatus(TRequestStatus& aResult, TInt aReturn)    
-        { iCliReq = &aResult; iReturn = aReturn; }
-        
-    TRequestStatus* iCliReq;    
-    TInt iReturn; 
-    };
-    
-class CBlockPlugin : public CTestPlugin1
-	{
-public:
-	static CBlockPlugin* NewL()
-	{ return new (ELeave) CBlockPlugin(); }
-
-	CBlockPlugin() 
-	    {
-	    }
-	virtual ~CBlockPlugin() {}
-  
-	virtual TPluginId Id() const { return 0x10274105; }
-
-	virtual void Train(TIdentityId /*aId*/, HBufC8*& aResult,
-  					   TRequestStatus& aRequest)
-    	{
-		if (!iTimer.IsAdded())
-            {
-            CActiveScheduler::Add(&iTimer);
-            }
-        iClientStatus = &aRequest;
-        aRequest =  KRequestPending;
-        iTimer.SetCliStatus(aRequest, KErrAuthServPluginCancelled);
-        iTimer.After(5000000);        
-        aResult = 0;
-        }
-
-	virtual void Cancel()
-	    {
-        iTimer.Cancel();
-        User::RequestComplete(iClientStatus, KErrCancel);
-        }
- 
-	virtual  void Identify(TIdentityId& aId, const TDesC& /*aClientMessage*/,
-							HBufC8*& aResult, TRequestStatus& aRequest)
-	    {
-		if (!iTimer.IsAdded())
-            {
-            CActiveScheduler::Add(&iTimer);
-            }
-        iClientStatus = &aRequest;
-        aRequest =  KRequestPending;
-        iTimer.SetCliStatus(aRequest, KErrNone);
-        iTimer.After(5000000);  
-		aId = KUnknownIdentity;
-		aResult = 0;
-		}
-	virtual const TPtrC& Name() const
-	  {
-	  return iName;
-	  }
-	virtual const TPtrC& Description() const
-	  {
-	  return iDescription;
-	  }
-	virtual TAuthPluginType Type() const 
-	  {
-	  return iType;
-	  }
-
-	virtual TEntropy MinEntropy() const
-	  {
-	  return iMinEntropy;
-	  }
-
-	virtual TPercentage FalsePositiveRate() const
-	  {
-	  return iFalsePositiveRate;
-	  }
-
-	virtual TPercentage FalseNegativeRate() const
-	  {
-	  return iFalseNegativeRate;
-	  }
-
-	private:
-	
-	TRequestStatus  iStatus;
-	TRequestStatus* iClientStatus;
-	CWaitToComplete iTimer;
-	
-    };
-
-} 
-
-IMPORT_C const TImplementationProxy* ImplementationGroupProxy(TInt& aTableCount);
-  
--- a/authenticationservices/authenticationserver/test/tauthplugins/testplugins.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,47 +0,0 @@
-/*
-* Copyright (c) 2005-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-TARGET				testplugins.dll
-TARGETTYPE			PLUGIN
-UID					0x10009d8d 0x10204F0E
-VENDORID			0x70000001
-
-CAPABILITY			ALL -TCB
-
-OS_LAYER_SYSTEMINCLUDE
-
-USERINCLUDE			.
-USERINCLUDE			../../source/common
-USERINCLUDE			../../source/server
-USERINCLUDE			../../source/client
-USERINCLUDE			../../inc_private
-
-SOURCEPATH			.
-SOURCE				testplugins.cpp
-
-START RESOURCE        10204f0e.rss
-#ifdef SYMBIAN_SECURE_ECOM
-TARGET testplugins.rsc
-#endif
-END
-
-
-
-
-LIBRARY			euser.lib ecom.lib efsrv.lib authcommon.lib
-SMPSAFE
--- a/authenticationservices/authenticationserver/test/tauthplugins/testpluginsupgrade.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,251 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include "testplugins.h"
-#include <ecom/ecom.h>
-#include <f32file.h>
-#include "consts.h"
-
-using namespace AuthServer;
-
-_LIT(KTestPluginsUpgradeNamePin, "Test Plugin #1 - Upgrade");
-
-TBool E32Dll()
-  {
-  return (ETrue);
-  }
-
-CTestPlugin1::CTestPlugin1()  : iActive(false)
-  {
-  iName.Set(KTestPluginsUpgradeNamePin);
-  iDescription.Set(KPluginDescription);
-  iType = EAuthKnowledge;
-  iMinEntropy = KEntropy;
-  iFalsePositiveRate = KFalsePos;
-  iFalseNegativeRate = KFalseNeg;
-
-  RFs fs;
-  fs.Connect();
-  TEntry file;
-  
-  _LIT(KActiveFile, "\\testplugin_active\\");
-  TDriveUnit sysDrive (fs.GetSystemDrive());
-  TBuf<128> activeFile (sysDrive.Name());
-  activeFile.Append(KActiveFile);
-  iActive = fs.Entry(activeFile, file);;
-  fs.Close();
-  //RDebug::Printf("Plugin started, active = %d", iActive);
-  iActive = iActive != KErrNotFound;
-  //RDebug::Printf("Plugin started, active = %d", iActive);
-  }
-
-void CTestPlugin1::Identify(TIdentityId& aId, const TDesC& /*aClientMessage*/,
-							HBufC8*& aResult, TRequestStatus& aRequest)
-    {
-	aId = 22;
-	aResult = HBufC8::New(20);
-	
-	TRequestStatus *stat = &aRequest;
-	
-	if(aResult == NULL)
-			{
-			User::RequestComplete(stat, KErrNoMemory);
-			return;
-			}
-	
-	*aResult = KIdentifyData;
-	User::RequestComplete(stat, KErrNone);
-    }
-  
-void CTestPlugin1::Train(TIdentityId /*aId*/, HBufC8*& aResult,
-						 TRequestStatus& aRequest)
-    {
-	aResult = HBufC8::New(20);
-	
-	TRequestStatus* status = &aRequest;
-	
-	if(aResult == NULL)
-		{
-		User::RequestComplete(status, KErrNoMemory);
-		return;
-		}
-
-	*aResult = KTrainData;
-	User::RequestComplete(status, KErrNone);
-			
-	}
-
-
-void CUnknownPlugin::Identify(TIdentityId& aId, const TDesC& /*aClientMessage*/,
-							  HBufC8*& aResult, TRequestStatus& aRequest)
-    {
-	aId = KUnknownIdentity;
-	aResult = HBufC8::New(0);
-	
-	TRequestStatus *stat = &aRequest;
-	
-	if(aResult == NULL)
-		{
-		User::RequestComplete(stat, KErrNoMemory);
-		return;
-		}
-	
-	User::RequestComplete(stat, KErrNone);
-    }
-  
-void CUnknownPlugin::Train(TIdentityId /*aId*/, HBufC8*& aResult,
-						 TRequestStatus& aRequest)
-    {
-	aResult = HBufC8::New(0);
-	TRequestStatus* status = &aRequest;
-	
-	if(aResult == NULL)
-		{
-		User::RequestComplete(status, KErrNoMemory);
-		return;
-		}
-	
-	User::RequestComplete(status, KErrAuthServPluginCancelled);
-	}
-
-TBool CTestPlugin1::IsActive() const 
-    {
-	return iActive;
-	}
-
-
-TInt CTestPlugin1::Forget(TIdentityId /*aId*/)
-    {
-	return KErrNone;
-    }
-TInt CTestPlugin1::DefaultData(TIdentityId /*aId*/, HBufC8*& /*aOutputBuf*/)
-    {
-	return KErrNotSupported;
-    }
-
-TInt CTestPlugin1::Reset(TIdentityId /*aId*/, const TDesC& /*aRegistrationData*/, HBufC8*& /*aResult*/)
-	{
-	return KErrNotSupported;
-	}
-
-const TImplementationProxy ImplementationTable[] =
-  {
-	IMPLEMENTATION_PROXY_ENTRY(0x10274104, CTestPlugin1::NewL),
-	IMPLEMENTATION_PROXY_ENTRY(0x10274105, CBlockPlugin::NewL),
-	IMPLEMENTATION_PROXY_ENTRY(0x10274106, CInactivePlugin::NewL),
-	IMPLEMENTATION_PROXY_ENTRY(0x10274107, CUnknownPlugin::NewL)
-  };
-
-EXPORT_C const TImplementationProxy* ImplementationGroupProxy(TInt& aTableCount)
-  {
-  aTableCount = sizeof(ImplementationTable) /
-	sizeof(TImplementationProxy);
-  return ImplementationTable;
-  }
-
-const TPtrC& CTestPlugin1::Name() const
-  {
-  return iName;
-  }
-const TPtrC& CTestPlugin1::Description() const
-  {
-  return iDescription;
-  }
-TAuthPluginType CTestPlugin1::Type() const 
-  {
-  return iType;
-  }
-
-TEntropy CTestPlugin1::MinEntropy() const
-  {
-  return iMinEntropy;
-  }
-
-TPercentage CTestPlugin1::FalsePositiveRate() const
-  {
-  return iFalsePositiveRate;
-  }
-
-TPercentage CTestPlugin1::FalseNegativeRate() const
-  {
-  return iFalseNegativeRate;
-  }
-
-
-//Unknown Plugin
-
-const TPtrC& CUnknownPlugin::Name() const
-  {
-  return iName;
-  }
-const TPtrC& CUnknownPlugin::Description() const
-  {
-  return iDescription;
-  }
-AuthServer::TAuthPluginType CUnknownPlugin::Type() const 
-  {
-  return iType;
-  }
-
-AuthServer::TEntropy CUnknownPlugin::MinEntropy() const
-  {
-  return iMinEntropy;
-  }
-
-AuthServer::TPercentage CUnknownPlugin::FalsePositiveRate() const
-  {
-  return iFalsePositiveRate;
-  }
-
-AuthServer::TPercentage CUnknownPlugin::FalseNegativeRate() const
-  {
-  return iFalseNegativeRate;
-  }
-
-
-
-//Inactive Plugin
-
-const TPtrC& CInactivePlugin::Name() const
-  {
-  return iName;
-  }
-const TPtrC& CInactivePlugin::Description() const
-  {
-  return iDescription;
-  }
-AuthServer::TAuthPluginType CInactivePlugin::Type() const 
-  {
-  return iType;
-  }
-
-AuthServer::TEntropy CInactivePlugin::MinEntropy() const
-  {
-  return iMinEntropy;
-  }
-
-AuthServer::TPercentage CInactivePlugin::FalsePositiveRate() const
-  {
-  return iFalsePositiveRate;
-  }
-
-AuthServer::TPercentage CInactivePlugin::FalseNegativeRate() const
-  {
-  return iFalseNegativeRate;
-  }
-
--- a/authenticationservices/authenticationserver/test/tauthplugins/testpluginsupgrade.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,48 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-TARGET				testpluginsupgrade.dll
-TARGETTYPE			PLUGIN
-UID					0x10009d8d 0x10204F0E
-VENDORID			0x70000001
-
-CAPABILITY			ALL -TCB
-
-VERSION 10.1
-
-OS_LAYER_SYSTEMINCLUDE
-
-USERINCLUDE			.
-USERINCLUDE			../../source/common
-USERINCLUDE			../../source/server
-USERINCLUDE			../../source/client
-USERINCLUDE			../../inc_private
-
-SOURCEPATH			.
-SOURCE				testpluginsupgrade.cpp
-
-START RESOURCE        10204f0e_upgrade.rss
-#ifdef SYMBIAN_SECURE_ECOM
-TARGET testpluginsupgrade.rsc
-#endif
-END
-
-
-
-LIBRARY			euser.lib ecom.lib efsrv.lib authcommon.lib
-SMPSAFE
--- a/contentmgmt/contentaccessfwfordrm/BWINS/caf_v3u.def	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,193 +0,0 @@
-EXPORTS
-	?DataSizeL@CData@ContentAccess@@QAEXAAH@Z @ 1 NONAME ; public: void __thiscall ContentAccess::CData::DataSizeL(int &)
-	?EvaluateIntent@CData@ContentAccess@@QAEHW4TIntent@2@@Z @ 2 NONAME ; public: int __thiscall ContentAccess::CData::EvaluateIntent(enum ContentAccess::TIntent)
-	?ExecuteIntent@CData@ContentAccess@@QAEHW4TIntent@2@@Z @ 3 NONAME ; public: int __thiscall ContentAccess::CData::ExecuteIntent(enum ContentAccess::TIntent)
-	?GetL@CAttribute@ContentAccess@@QAEXXZ @ 4 NONAME ; public: void __thiscall ContentAccess::CAttribute::GetL(void)
-	?NewAttributeL@CContent@ContentAccess@@QAEPAVCAttribute@2@H@Z @ 5 NONAME ; public: class ContentAccess::CAttribute * __thiscall ContentAccess::CContent::NewAttributeL(int)
-	?NewL@CContent@ContentAccess@@SAPAV12@ABVTDesC16@@@Z @ 6 NONAME ; public: static class ContentAccess::CContent * __cdecl ContentAccess::CContent::NewL(class TDesC16 const &)
-	?NewLC@CContent@ContentAccess@@SAPAV12@ABVTDesC16@@@Z @ 7 NONAME ; public: static class ContentAccess::CContent * __cdecl ContentAccess::CContent::NewLC(class TDesC16 const &)
-	?OpenContentL@CContent@ContentAccess@@QAEPAVCData@2@W4TIntent@2@@Z @ 8 NONAME ; public: class ContentAccess::CData * __thiscall ContentAccess::CContent::OpenContentL(enum ContentAccess::TIntent)
-	?QuerySet@CAttribute@ContentAccess@@QAEAAVCBitset@2@XZ @ 9 NONAME ; public: class ContentAccess::CBitset & __thiscall ContentAccess::CAttribute::QuerySet(void)
-	?Read@CData@ContentAccess@@QBEHAAVTDes8@@@Z @ 10 NONAME ; public: int __thiscall ContentAccess::CData::Read(class TDes8 &)const 
-	?Read@CData@ContentAccess@@QBEHAAVTDes8@@H@Z @ 11 NONAME ; public: int __thiscall ContentAccess::CData::Read(class TDes8 &,int)const 
-	?Read@CData@ContentAccess@@QBEXAAVTDes8@@AAVTRequestStatus@@@Z @ 12 NONAME ; public: void __thiscall ContentAccess::CData::Read(class TDes8 &,class TRequestStatus &)const 
-	?Read@CData@ContentAccess@@QBEXAAVTDes8@@HAAVTRequestStatus@@@Z @ 13 NONAME ; public: void __thiscall ContentAccess::CData::Read(class TDes8 &,int,class TRequestStatus &)const 
-	?Reset@CAttribute@ContentAccess@@QAEXXZ @ 14 NONAME ; public: void __thiscall ContentAccess::CAttribute::Reset(void)
-	?ResponseSet@CAttribute@ContentAccess@@QBEABVCBitset@2@XZ @ 15 NONAME ; public: class ContentAccess::CBitset const & __thiscall ContentAccess::CAttribute::ResponseSet(void)const 
-	?Seek@CData@ContentAccess@@QBEHW4TSeek@@AAH@Z @ 16 NONAME ; public: int __thiscall ContentAccess::CData::Seek(enum TSeek,int &)const 
-	?SetQosL@CData@ContentAccess@@QAEXW4TQosAttribute@2@H@Z @ 17 NONAME ; public: void __thiscall ContentAccess::CData::SetQosL(enum ContentAccess::TQosAttribute,int)
-	?GetMimeTypeL@CData@ContentAccess@@QBEHAAVTDes8@@@Z @ 18 NONAME ; public: int __thiscall ContentAccess::CData::GetMimeTypeL(class TDes8 &)const 
-	?AttributesL@CSupplierOutputFile@ContentAccess@@QAEAAVCAttribute@2@H@Z @ 19 NONAME ; public: class ContentAccess::CAttribute & __thiscall ContentAccess::CSupplierOutputFile::AttributesL(int)
-	?ConsumerMimeTypes@CAgentResolver@ContentAccess@@QBEABV?$RArray@VTPtrC8@@@@XZ @ 20 NONAME ; public: class RArray<class TPtrC8> const & __thiscall ContentAccess::CAgentResolver::ConsumerMimeTypes(void)const 
-	?DeleteFileL@CManager@ContentAccess@@SAXABVTDesC16@@@Z @ 21 NONAME ; public: static void __cdecl ContentAccess::CManager::DeleteFileL(class TDesC16 const &)
-	?DoRecognizeL@CAgentResolver@ContentAccess@@QAEHABVTDesC16@@ABVTDesC8@@AAVTDes8@@2@Z @ 22 NONAME ; public: int __thiscall ContentAccess::CAgentResolver::DoRecognize(class TDesC16 const &,class TDesC8 const &,class TDes8 &,class TDes8 &)
-	?FileName@CSupplierOutputFile@ContentAccess@@QBE?AVTPtrC16@@XZ @ 23 NONAME ; public: class TPtrC16  __thiscall ContentAccess::CSupplierOutputFile::FileName(void)const 
-	?ImportFileL@CSupplier@ContentAccess@@QAEPAVCImportFile@2@AAVCCafMimeHeader@2@ABVTDesC16@@@Z @ 24 NONAME ; public: class ContentAccess::CImportFile * __thiscall ContentAccess::CSupplier::ImportFileL(class ContentAccess::CCafMimeHeader &,class TDesC16 const &)
-	?IsImportSupported@CSupplier@ContentAccess@@QAEHABVTDesC8@@@Z @ 25 NONAME ; public: int __thiscall ContentAccess::CSupplier::IsImportSupported(class TDesC8 const &)
-	?MimeTypeL@CSupplierOutputFile@ContentAccess@@QAE?AVTPtrC8@@XZ @ 26 NONAME ; public: class TPtrC8  __thiscall ContentAccess::CSupplierOutputFile::MimeTypeL(void)
-	?NewL@CAgentResolver@ContentAccess@@SAPAV12@H@Z @ 27 NONAME ; public: static class ContentAccess::CAgentResolver * __cdecl ContentAccess::CAgentResolver::NewL(int)
-	?NewL@CSupplier@ContentAccess@@SAPAV12@XZ @ 28 NONAME ; public: static class ContentAccess::CSupplier * __cdecl ContentAccess::CSupplier::NewL(void)
-	?NewL@CSupplierOutputFile@ContentAccess@@SAPAV12@ABVTDesC16@@W4TOutputType@2@@Z @ 29 NONAME ; public: static class ContentAccess::CSupplierOutputFile * __cdecl ContentAccess::CSupplierOutputFile::NewL(class TDesC16 const &,enum ContentAccess::TOutputType)
-	?NewLC@CAgentResolver@ContentAccess@@SAPAV12@H@Z @ 30 NONAME ; public: static class ContentAccess::CAgentResolver * __cdecl ContentAccess::CAgentResolver::NewLC(int)
-	?NewLC@CSupplier@ContentAccess@@SAPAV12@XZ @ 31 NONAME ; public: static class ContentAccess::CSupplier * __cdecl ContentAccess::CSupplier::NewLC(void)
-	?OutputFileCountL@CImportFile@ContentAccess@@QBEHXZ @ 32 NONAME ; public: int __thiscall ContentAccess::CImportFile::OutputFileCountL(void)const 
-	?OutputFileL@CImportFile@ContentAccess@@QBEAAVCSupplierOutputFile@2@H@Z @ 33 NONAME ; public: class ContentAccess::CSupplierOutputFile & __thiscall ContentAccess::CImportFile::OutputFileL(int)const 
-	?OutputType@CSupplierOutputFile@ContentAccess@@QBE?AW4TOutputType@2@XZ @ 34 NONAME ; public: enum ContentAccess::TOutputType  __thiscall ContentAccess::CSupplierOutputFile::OutputType(void)const 
-	?PreferredBufferSize@CAgentResolver@ContentAccess@@QAEHXZ @ 35 NONAME ; public: int __thiscall ContentAccess::CAgentResolver::PreferredBufferSize(void)
-	?SetOutputDirectoryL@CSupplier@ContentAccess@@QAEXABVTDesC16@@@Z @ 36 NONAME ; public: void __thiscall ContentAccess::CSupplier::SetOutputDirectoryL(class TDesC16 const &)
-	?SupplierMimeTypes@CAgentResolver@ContentAccess@@QBEABV?$RArray@VTPtrC8@@@@XZ @ 37 NONAME ; public: class RArray<class TPtrC8> const & __thiscall ContentAccess::CAgentResolver::SupplierMimeTypes(void)const 
-	?WriteData@CImportFile@ContentAccess@@QAEHABVTDesC8@@@Z @ 38 NONAME ; public: int __thiscall ContentAccess::CImportFile::WriteData(class TDesC8 const &)
-	?WriteData@CImportFile@ContentAccess@@QAEXABVTDesC8@@AAVTRequestStatus@@@Z @ 39 NONAME ; public: void __thiscall ContentAccess::CImportFile::WriteData(class TDesC8 const &,class TRequestStatus &)
-	?WriteDataComplete@CImportFile@ContentAccess@@QAEHXZ @ 40 NONAME ; public: int __thiscall ContentAccess::CImportFile::WriteDataComplete(void)
-	?WriteDataComplete@CImportFile@ContentAccess@@QAEXAAVTRequestStatus@@@Z @ 41 NONAME ; public: void __thiscall ContentAccess::CImportFile::WriteDataComplete(class TRequestStatus &)
-	?NewAttributeL@CContent@ContentAccess@@QAEPAVCAttribute@2@HW4TContentShareMode@2@@Z @ 42 NONAME ; public: class ContentAccess::CAttribute * __thiscall ContentAccess::CContent::NewAttributeL(int,enum ContentAccess::TContentShareMode)
-	?OpenContentL@CContent@ContentAccess@@QAEPAVCData@2@W4TIntent@2@W4TContentShareMode@2@@Z @ 43 NONAME ; public: class ContentAccess::CData * __thiscall ContentAccess::CContent::OpenContentL(enum ContentAccess::TIntent,enum ContentAccess::TContentShareMode)
-	?NewL@CContent@ContentAccess@@SAPAV12@AAVRFile@@@Z @ 44 NONAME ; class ContentAccess::CContent * ContentAccess::CContent::NewL(class RFile &)
-	?NewLC@CContent@ContentAccess@@SAPAV12@AAVRFile@@@Z @ 45 NONAME ; class ContentAccess::CContent * ContentAccess::CContent::NewLC(class RFile &)
-	??1CAgentFactory@ContentAccess@@UAE@XZ @ 46 NONAME ; ContentAccess::CAgentFactory::~CAgentFactory(void)
-	?Agent@CContent@ContentAccess@@QBEABVTAgent@2@XZ @ 47 NONAME ; class ContentAccess::TAgent const & ContentAccess::CContent::Agent(void) const
-	?AgentSpecificCommand@CContent@ContentAccess@@QAEHHABVTDesC8@@AAVTDes8@@@Z @ 48 NONAME ; int ContentAccess::CContent::AgentSpecificCommand(int, class TDesC8 const &, class TDes8 &)
-	?AgentSpecificCommand@CContent@ContentAccess@@QAEXHABVTDesC8@@AAVTDes8@@AAVTRequestStatus@@@Z @ 49 NONAME ; void ContentAccess::CContent::AgentSpecificCommand(int, class TDesC8 const &, class TDes8 &, class TRequestStatus &)
-	?AgentSpecificCommand@CManager@ContentAccess@@QAEHAAVTAgent@2@HABVTDesC8@@AAVTDes8@@@Z @ 50 NONAME ; int ContentAccess::CManager::AgentSpecificCommand(class ContentAccess::TAgent &, int, class TDesC8 const &, class TDes8 &)
-	?AgentSpecificCommand@CManager@ContentAccess@@QAEXAAVTAgent@2@HABVTDesC8@@AAVTDes8@@AAVTRequestStatus@@@Z @ 51 NONAME ; void ContentAccess::CManager::AgentSpecificCommand(class ContentAccess::TAgent &, int, class TDesC8 const &, class TDes8 &, class TRequestStatus &)
-	?CancelNotifyStatusChange@CContent@ContentAccess@@QAEHAAVTRequestStatus@@@Z @ 52 NONAME ; int ContentAccess::CContent::CancelNotifyStatusChange(class TRequestStatus &)
-	?CancelNotifyStatusChange@CContent@ContentAccess@@QAEHAAVTRequestStatus@@ABVTDesC16@@@Z @ 53 NONAME ; int ContentAccess::CContent::CancelNotifyStatusChange(class TRequestStatus &, class TDesC16 const &)
-	?CancelNotifyStatusChange@CManager@ContentAccess@@QAEHABVTDesC16@@AAVTRequestStatus@@@Z @ 54 NONAME ; int ContentAccess::CManager::CancelNotifyStatusChange(class TDesC16 const &, class TRequestStatus &)
-	?CancelRequestRights@CContent@ContentAccess@@QAEHAAVTRequestStatus@@@Z @ 55 NONAME ; int ContentAccess::CContent::CancelRequestRights(class TRequestStatus &)
-	?CancelRequestRights@CContent@ContentAccess@@QAEHAAVTRequestStatus@@ABVTDesC16@@@Z @ 56 NONAME ; int ContentAccess::CContent::CancelRequestRights(class TRequestStatus &, class TDesC16 const &)
-	?CloseContainer@CContent@ContentAccess@@QAEHXZ @ 57 NONAME ; int ContentAccess::CContent::CloseContainer(void)
-	?ContinueWithNewOutputFile@CImportFile@ContentAccess@@QAEHAAVRFile@@ABVTDesC16@@@Z @ 58 NONAME ; int ContentAccess::CImportFile::ContinueWithNewOutputFile(class RFile &, class TDesC16 const &)
-	?ContinueWithNewOutputFile@CImportFile@ContentAccess@@QAEXAAVRFile@@ABVTDesC16@@AAVTRequestStatus@@@Z @ 59 NONAME ; void ContentAccess::CImportFile::ContinueWithNewOutputFile(class RFile &, class TDesC16 const &, class TRequestStatus &)
-	?CopyFile@CManager@ContentAccess@@QBEHABVTDesC16@@0@Z @ 60 NONAME ; int ContentAccess::CManager::CopyFile(class TDesC16 const &, class TDesC16 const &) const
-	?CreateRightsManagerL@CManager@ContentAccess@@QBEPAVCRightsManager@2@AAVTAgent@2@@Z @ 61 NONAME ; class ContentAccess::CRightsManager * ContentAccess::CManager::CreateRightsManagerL(class ContentAccess::TAgent &) const
-	?DeleteAllRightsObjects@CRightsManager@ContentAccess@@QAEHABVTVirtualPathPtr@2@@Z @ 62 NONAME ; int ContentAccess::CRightsManager::DeleteAllRightsObjects(class ContentAccess::TVirtualPathPtr const &)
-	?DeleteFile@CManager@ContentAccess@@QBEHABVTDesC16@@@Z @ 63 NONAME ; int ContentAccess::CManager::DeleteFile(class TDesC16 const &) const
-	?DeleteRightsObject@CRightsManager@ContentAccess@@QAEHABVCRightsInfo@2@@Z @ 64 NONAME ; int ContentAccess::CRightsManager::DeleteRightsObject(class ContentAccess::CRightsInfo const &)
-	?DisplayInfoL@CContent@ContentAccess@@QBEXW4TDisplayInfo@2@@Z @ 65 NONAME ; void ContentAccess::CContent::DisplayInfoL(enum ContentAccess::TDisplayInfo) const
-	?DisplayInfoL@CContent@ContentAccess@@QBEXW4TDisplayInfo@2@ABVTDesC16@@@Z @ 66 NONAME ; void ContentAccess::CContent::DisplayInfoL(enum ContentAccess::TDisplayInfo, class TDesC16 const &) const
-	?DisplayInfoL@CManager@ContentAccess@@QAEXW4TDisplayInfo@2@ABVTVirtualPathPtr@2@@Z @ 67 NONAME ; void ContentAccess::CManager::DisplayInfoL(enum ContentAccess::TDisplayInfo, class ContentAccess::TVirtualPathPtr const &)
-	?DisplayManagementInfoL@CManager@ContentAccess@@QAEXAAVTAgent@2@@Z @ 68 NONAME ; void ContentAccess::CManager::DisplayManagementInfoL(class ContentAccess::TAgent &)
-	?ExternalizeL@CSupplierOutputFile@ContentAccess@@QBEXAAVRWriteStream@@@Z @ 69 NONAME ; void ContentAccess::CSupplierOutputFile::ExternalizeL(class RWriteStream &) const
-	?GetAttribute@CContent@ContentAccess@@QBEHHAAH@Z @ 70 NONAME ; int ContentAccess::CContent::GetAttribute(int, int &) const
-	?GetAttribute@CContent@ContentAccess@@QBEHHAAHABVTDesC16@@@Z @ 71 NONAME ; int ContentAccess::CContent::GetAttribute(int, int &, class TDesC16 const &) const
-	?GetAttribute@CData@ContentAccess@@QBEHHAAH@Z @ 72 NONAME ; int ContentAccess::CData::GetAttribute(int, int &) const
-	?GetAttribute@CManager@ContentAccess@@QBEHHAAHABVTVirtualPathPtr@2@@Z @ 73 NONAME ; int ContentAccess::CManager::GetAttribute(int, int &, class ContentAccess::TVirtualPathPtr const &) const
-	?GetAttributeSet@CContent@ContentAccess@@QBEHAAVRAttributeSet@2@@Z @ 74 NONAME ; int ContentAccess::CContent::GetAttributeSet(class ContentAccess::RAttributeSet &) const
-	?GetAttributeSet@CContent@ContentAccess@@QBEHAAVRAttributeSet@2@ABVTDesC16@@@Z @ 75 NONAME ; int ContentAccess::CContent::GetAttributeSet(class ContentAccess::RAttributeSet &, class TDesC16 const &) const
-	?GetAttributeSet@CData@ContentAccess@@QBEHAAVRAttributeSet@2@@Z @ 76 NONAME ; int ContentAccess::CData::GetAttributeSet(class ContentAccess::RAttributeSet &) const
-	?GetAttributeSet@CManager@ContentAccess@@QBEHAAVRAttributeSet@2@ABVTVirtualPathPtr@2@@Z @ 77 NONAME ; int ContentAccess::CManager::GetAttributeSet(class ContentAccess::RAttributeSet &, class ContentAccess::TVirtualPathPtr const &) const
-	?GetDir@CManager@ContentAccess@@QBEHABVTDesC16@@ABVTUidType@@IAAPAVCDir@@@Z @ 78 NONAME ; int ContentAccess::CManager::GetDir(class TDesC16 const &, class TUidType const &, unsigned int, class CDir * &) const
-	?GetDir@CManager@ContentAccess@@QBEHABVTDesC16@@IIAAPAVCDir@@1@Z @ 79 NONAME ; int ContentAccess::CManager::GetDir(class TDesC16 const &, unsigned int, unsigned int, class CDir * &, class CDir * &) const
-	?GetDir@CManager@ContentAccess@@QBEHABVTDesC16@@IIAAPAVCDir@@@Z @ 80 NONAME ; int ContentAccess::CManager::GetDir(class TDesC16 const &, unsigned int, unsigned int, class CDir * &) const
-	?GetEmbeddedObjectsL@CContent@ContentAccess@@QBEXAAV?$RStreamablePtrArray@VCEmbeddedObject@ContentAccess@@@2@@Z @ 81 NONAME ; void ContentAccess::CContent::GetEmbeddedObjectsL(class ContentAccess::RStreamablePtrArray<class ContentAccess::CEmbeddedObject> &) const
-	?GetEmbeddedObjectsL@CContent@ContentAccess@@QBEXAAV?$RStreamablePtrArray@VCEmbeddedObject@ContentAccess@@@2@W4TEmbeddedType@2@@Z @ 82 NONAME ; void ContentAccess::CContent::GetEmbeddedObjectsL(class ContentAccess::RStreamablePtrArray<class ContentAccess::CEmbeddedObject> &, enum ContentAccess::TEmbeddedType) const
-	?GetImportStatus@CImportFile@ContentAccess@@QBE?AW4TImportStatus@2@XZ @ 83 NONAME ; enum ContentAccess::TImportStatus ContentAccess::CImportFile::GetImportStatus(void) const
-	?GetRightsDataL@CRightsManager@ContentAccess@@QBEPAVMAgentRightsBase@2@ABVCRightsInfo@2@@Z @ 84 NONAME ; class ContentAccess::MAgentRightsBase * ContentAccess::CRightsManager::GetRightsDataL(class ContentAccess::CRightsInfo const &) const
-	?GetStringAttribute@CContent@ContentAccess@@QBEHHAAVTDes16@@@Z @ 85 NONAME ; int ContentAccess::CContent::GetStringAttribute(int, class TDes16 &) const
-	?GetStringAttribute@CContent@ContentAccess@@QBEHHAAVTDes16@@ABVTDesC16@@@Z @ 86 NONAME ; int ContentAccess::CContent::GetStringAttribute(int, class TDes16 &, class TDesC16 const &) const
-	?GetStringAttribute@CData@ContentAccess@@QBEHHAAVTDes16@@@Z @ 87 NONAME ; int ContentAccess::CData::GetStringAttribute(int, class TDes16 &) const
-	?GetStringAttribute@CManager@ContentAccess@@QBEHHAAVTDes16@@ABVTVirtualPathPtr@2@@Z @ 88 NONAME ; int ContentAccess::CManager::GetStringAttribute(int, class TDes16 &, class ContentAccess::TVirtualPathPtr const &) const
-	?GetStringAttributeSet@CContent@ContentAccess@@QBEHAAVRStringAttributeSet@2@@Z @ 89 NONAME ; int ContentAccess::CContent::GetStringAttributeSet(class ContentAccess::RStringAttributeSet &) const
-	?GetStringAttributeSet@CContent@ContentAccess@@QBEHAAVRStringAttributeSet@2@ABVTDesC16@@@Z @ 90 NONAME ; int ContentAccess::CContent::GetStringAttributeSet(class ContentAccess::RStringAttributeSet &, class TDesC16 const &) const
-	?GetStringAttributeSet@CData@ContentAccess@@QBEHAAVRStringAttributeSet@2@@Z @ 91 NONAME ; int ContentAccess::CData::GetStringAttributeSet(class ContentAccess::RStringAttributeSet &) const
-	?GetStringAttributeSet@CManager@ContentAccess@@QBEHAAVRStringAttributeSet@2@ABVTVirtualPathPtr@2@@Z @ 92 NONAME ; int ContentAccess::CManager::GetStringAttributeSet(class ContentAccess::RStringAttributeSet &, class ContentAccess::TVirtualPathPtr const &) const
-	?GetSuggestedOutputFileExtension@CImportFile@ContentAccess@@QAEHAAVTDes16@@@Z @ 93 NONAME ; int ContentAccess::CImportFile::GetSuggestedOutputFileExtension(class TDes16 &)
-	?GetSuggestedOutputFileName@CImportFile@ContentAccess@@QAEHAAVTDes16@@@Z @ 94 NONAME ; int ContentAccess::CImportFile::GetSuggestedOutputFileName(class TDes16 &)
-	?ImportFileL@CSupplier@ContentAccess@@QAEPAVCImportFile@2@ABVTDesC8@@ABVCMetaDataArray@2@@Z @ 95 NONAME ; class ContentAccess::CImportFile * ContentAccess::CSupplier::ImportFileL(class TDesC8 const &, class ContentAccess::CMetaDataArray const &)
-	?ImportFileL@CSupplier@ContentAccess@@QAEPAVCImportFile@2@ABVTDesC8@@ABVCMetaDataArray@2@ABVTDesC16@@@Z @ 96 NONAME ; class ContentAccess::CImportFile * ContentAccess::CSupplier::ImportFileL(class TDesC8 const &, class ContentAccess::CMetaDataArray const &, class TDesC16 const &)
-	?ListAgentsL@CManager@ContentAccess@@QAEXAAV?$RArray@VTAgent@ContentAccess@@@@@Z @ 97 NONAME ; void ContentAccess::CManager::ListAgentsL(class RArray<class ContentAccess::TAgent> &)
-	?ListAllRightsL@CRightsManager@ContentAccess@@QBEXAAV?$RStreamablePtrArray@VCRightsInfo@ContentAccess@@@2@@Z @ 98 NONAME ; void ContentAccess::CRightsManager::ListAllRightsL(class ContentAccess::RStreamablePtrArray<class ContentAccess::CRightsInfo> &) const
-	?ListContentL@CRightsManager@ContentAccess@@QBEXAAV?$RStreamablePtrArray@VCVirtualPath@ContentAccess@@@2@AAVCRightsInfo@2@@Z @ 99 NONAME ; void ContentAccess::CRightsManager::ListContentL(class ContentAccess::RStreamablePtrArray<class ContentAccess::CVirtualPath> &, class ContentAccess::CRightsInfo &) const
-	?ListRightsL@CRightsManager@ContentAccess@@QBEXAAV?$RStreamablePtrArray@VCRightsInfo@ContentAccess@@@2@AAVTVirtualPathPtr@2@@Z @ 100 NONAME ; void ContentAccess::CRightsManager::ListRightsL(class ContentAccess::RStreamablePtrArray<class ContentAccess::CRightsInfo> &, class ContentAccess::TVirtualPathPtr &) const
-	?ListRightsL@CRightsManager@ContentAccess@@QBEXAAV?$RStreamablePtrArray@VCRightsInfo@ContentAccess@@@2@ABVTDesC16@@@Z @ 101 NONAME ; void ContentAccess::CRightsManager::ListRightsL(class ContentAccess::RStreamablePtrArray<class ContentAccess::CRightsInfo> &, class TDesC16 const &) const
-	?MkDir@CManager@ContentAccess@@QBEHABVTDesC16@@@Z @ 102 NONAME ; int ContentAccess::CManager::MkDir(class TDesC16 const &) const
-	?MkDirAll@CManager@ContentAccess@@QBEHABVTDesC16@@@Z @ 103 NONAME ; int ContentAccess::CManager::MkDirAll(class TDesC16 const &) const
-	?Name@TAgent@ContentAccess@@QBEABVTDesC16@@XZ @ 104 NONAME ; class TDesC16 const & ContentAccess::TAgent::Name(void) const
-	?NewL@CContent@ContentAccess@@SAPAV12@ABVTDesC16@@W4TContentShareMode@2@@Z @ 105 NONAME ; class ContentAccess::CContent * ContentAccess::CContent::NewL(class TDesC16 const &, enum ContentAccess::TContentShareMode)
-	?NewL@CManager@ContentAccess@@SAPAV12@XZ @ 106 NONAME ; class ContentAccess::CManager * ContentAccess::CManager::NewL(void)
-	?NewL@CSupplierOutputFile@ContentAccess@@SAPAV12@AAVRReadStream@@@Z @ 107 NONAME ; class ContentAccess::CSupplierOutputFile * ContentAccess::CSupplierOutputFile::NewL(class RReadStream &)
-	?NewL@CSupplierOutputFile@ContentAccess@@SAPAV12@ABVTDesC16@@W4TOutputType@2@ABVTDesC8@@@Z @ 108 NONAME ; class ContentAccess::CSupplierOutputFile * ContentAccess::CSupplierOutputFile::NewL(class TDesC16 const &, enum ContentAccess::TOutputType, class TDesC8 const &)
-	?NewLC@CContent@ContentAccess@@SAPAV12@ABVTDesC16@@W4TContentShareMode@2@@Z @ 109 NONAME ; class ContentAccess::CContent * ContentAccess::CContent::NewLC(class TDesC16 const &, enum ContentAccess::TContentShareMode)
-	?NewLC@CManager@ContentAccess@@SAPAV12@XZ @ 110 NONAME ; class ContentAccess::CManager * ContentAccess::CManager::NewLC(void)
-	?NotifyStatusChange@CContent@ContentAccess@@QAEXW4TEventMask@2@AAVTRequestStatus@@@Z @ 111 NONAME ; void ContentAccess::CContent::NotifyStatusChange(enum ContentAccess::TEventMask, class TRequestStatus &)
-	?NotifyStatusChange@CContent@ContentAccess@@QAEXW4TEventMask@2@AAVTRequestStatus@@ABVTDesC16@@@Z @ 112 NONAME ; void ContentAccess::CContent::NotifyStatusChange(enum ContentAccess::TEventMask, class TRequestStatus &, class TDesC16 const &)
-	?NotifyStatusChange@CManager@ContentAccess@@QAEXABVTDesC16@@W4TEventMask@2@AAVTRequestStatus@@@Z @ 113 NONAME ; void ContentAccess::CManager::NotifyStatusChange(class TDesC16 const &, enum ContentAccess::TEventMask, class TRequestStatus &)
-	?OpenContainer@CContent@ContentAccess@@QAEHABVTDesC16@@@Z @ 114 NONAME ; int ContentAccess::CContent::OpenContainer(class TDesC16 const &)
-	?OpenContentL@CContent@ContentAccess@@QAEPAVCData@2@W4TIntent@2@ABVTDesC16@@@Z @ 115 NONAME ; class ContentAccess::CData * ContentAccess::CContent::OpenContentL(enum ContentAccess::TIntent, class TDesC16 const &)
-	?RenameFile@CManager@ContentAccess@@QBEHABVTDesC16@@0@Z @ 116 NONAME ; int ContentAccess::CManager::RenameFile(class TDesC16 const &, class TDesC16 const &) const
-	?RequestRights@CContent@ContentAccess@@QAEXAAVTRequestStatus@@@Z @ 117 NONAME ; void ContentAccess::CContent::RequestRights(class TRequestStatus &)
-	?RequestRights@CContent@ContentAccess@@QAEXAAVTRequestStatus@@ABVTDesC16@@@Z @ 118 NONAME ; void ContentAccess::CContent::RequestRights(class TRequestStatus &, class TDesC16 const &)
-	?RmDir@CManager@ContentAccess@@QBEHABVTDesC16@@@Z @ 119 NONAME ; int ContentAccess::CManager::RmDir(class TDesC16 const &) const
-	?Search@CContent@ContentAccess@@QAEHAAV?$RStreamablePtrArray@VCEmbeddedObject@ContentAccess@@@2@ABVTDesC8@@H@Z @ 120 NONAME ; int ContentAccess::CContent::Search(class ContentAccess::RStreamablePtrArray<class ContentAccess::CEmbeddedObject> &, class TDesC8 const &, int)
-	?SetProperty@CContent@ContentAccess@@QAEHW4TAgentProperty@2@H@Z @ 121 NONAME ; int ContentAccess::CContent::SetProperty(enum ContentAccess::TAgentProperty, int)
-	?SetProperty@CData@ContentAccess@@QAEHW4TAgentProperty@2@H@Z @ 122 NONAME ; int ContentAccess::CData::SetProperty(enum ContentAccess::TAgentProperty, int)
-	?SetProperty@CManager@ContentAccess@@QAEHW4TAgentProperty@2@H@Z @ 123 NONAME ; int ContentAccess::CManager::SetProperty(enum ContentAccess::TAgentProperty, int)
-	?SetProperty@CRightsManager@ContentAccess@@QAEHW4TAgentProperty@2@H@Z @ 124 NONAME ; int ContentAccess::CRightsManager::SetProperty(enum ContentAccess::TAgentProperty, int)
-	?PrepareHTTPRequestHeaders@CSupplier@ContentAccess@@QBEXAAVRStringPool@@AAVRHTTPHeaders@@@Z @ 125 NONAME ; void ContentAccess::CSupplier::PrepareHTTPRequestHeaders(class RStringPool &, class RHTTPHeaders &) const
-	?NewL@CData@ContentAccess@@SAPAV12@AAVRFile@@ABVTDesC16@@W4TIntent@2@@Z @ 126 NONAME ; class ContentAccess::CData * ContentAccess::CData::NewL(class RFile &, class TDesC16 const &, enum ContentAccess::TIntent)
-	?NewL@CData@ContentAccess@@SAPAV12@ABVTVirtualPathPtr@2@W4TIntent@2@W4TContentShareMode@2@@Z @ 127 NONAME ; class ContentAccess::CData * ContentAccess::CData::NewL(class ContentAccess::TVirtualPathPtr const &, enum ContentAccess::TIntent, enum ContentAccess::TContentShareMode)
-	?NewLC@CData@ContentAccess@@SAPAV12@AAVRFile@@ABVTDesC16@@W4TIntent@2@@Z @ 128 NONAME ; class ContentAccess::CData * ContentAccess::CData::NewLC(class RFile &, class TDesC16 const &, enum ContentAccess::TIntent)
-	?NewLC@CData@ContentAccess@@SAPAV12@ABVTVirtualPathPtr@2@W4TIntent@2@W4TContentShareMode@2@@Z @ 129 NONAME ; class ContentAccess::CData * ContentAccess::CData::NewLC(class ContentAccess::TVirtualPathPtr const &, enum ContentAccess::TIntent, enum ContentAccess::TContentShareMode)
-	?OpenContentLC@CContent@ContentAccess@@QAEPAVCData@2@W4TIntent@2@@Z @ 130 NONAME ; class ContentAccess::CData * ContentAccess::CContent::OpenContentLC(enum ContentAccess::TIntent)
-	?OpenContentLC@CContent@ContentAccess@@QAEPAVCData@2@W4TIntent@2@ABVTDesC16@@@Z @ 131 NONAME ; class ContentAccess::CData * ContentAccess::CContent::OpenContentLC(enum ContentAccess::TIntent, class TDesC16 const &)
-	?RenameDir@CManager@ContentAccess@@QBEHABVTDesC16@@0@Z @ 132 NONAME ; int ContentAccess::CManager::RenameDir(class TDesC16 const &, class TDesC16 const &) const
-	?RenameDir@CAgentManager@ContentAccess@@UAEHABVTDesC16@@0@Z @ 133 NONAME ; int ContentAccess::CAgentManager::RenameDir(class TDesC16 const &, class TDesC16 const &)
-	?Cancel@CAgentImportFile@ContentAccess@@UAEXXZ @ 134 NONAME ; void ContentAccess::CAgentImportFile::Cancel(void)
-	?Cancel@CImportFile@ContentAccess@@QAEXXZ @ 135 NONAME ; void ContentAccess::CImportFile::Cancel(void)
-	?NewL@CData@ContentAccess@@SAPAV12@AAVRFile@@ABVTDesC16@@@Z @ 136 NONAME ; class ContentAccess::CData * ContentAccess::CData::NewL(class RFile &, class TDesC16 const &)
-	?NewL@CData@ContentAccess@@SAPAV12@ABVTVirtualPathPtr@2@W4TContentShareMode@2@@Z @ 137 NONAME ; class ContentAccess::CData * ContentAccess::CData::NewL(class ContentAccess::TVirtualPathPtr const &, enum ContentAccess::TContentShareMode)
-	?NewLC@CData@ContentAccess@@SAPAV12@AAVRFile@@ABVTDesC16@@@Z @ 138 NONAME ; class ContentAccess::CData * ContentAccess::CData::NewLC(class RFile &, class TDesC16 const &)
-	?NewLC@CData@ContentAccess@@SAPAV12@ABVTVirtualPathPtr@2@W4TContentShareMode@2@@Z @ 139 NONAME ; class ContentAccess::CData * ContentAccess::CData::NewLC(class ContentAccess::TVirtualPathPtr const &, enum ContentAccess::TContentShareMode)
-	?CopyFile@CAgentManager@ContentAccess@@UAEHAAVRFile@@ABVTDesC16@@@Z @ 140 NONAME ; int ContentAccess::CAgentManager::CopyFile(class RFile &, class TDesC16 const &)
-	?CopyFile@CManager@ContentAccess@@QBEHAAVRFile@@ABVTDesC16@@@Z @ 141 NONAME ; int ContentAccess::CManager::CopyFile(class RFile &, class TDesC16 const &) const
-	?Read@CAgentData@ContentAccess@@UAEHHAAVTDes8@@HAAVTRequestStatus@@@Z @ 142 NONAME ; int ContentAccess::CAgentData::Read(int, class TDes8 &, int, class TRequestStatus &)
-	?Read_Unused@CData@ContentAccess@@ABEHHAAVTDes8@@HAAVTRequestStatus@@@Z @ 143 NONAME ; int ContentAccess::CData::Read_Unused(int, class TDes8 &, int, class TRequestStatus &) const
-	?KCafLoadPostProductionAgents@@3EB @ 144 NONAME ; unsigned char const KCafLoadPostProductionAgents
-	?ReadCancel@CData@ContentAccess@@QBEXAAVTRequestStatus@@@Z @ 145 NONAME ; void ContentAccess::CData::ReadCancel(class TRequestStatus &) const   
-	?ReadCancel@CAgentData@ContentAccess@@UAEXAAVTRequestStatus@@@Z @ 146 NONAME ; void ContentAccess::CAgentData::ReadCancel(class TRequestStatus &) const   
-	?DeleteAllRightsObjects@CAgentRightsManager@ContentAccess@@UAEHAAVRFile@@ABVTDesC16@@@Z @ 147 NONAME ; int ContentAccess::CAgentRightsManager::DeleteAllRightsObjects(class RFile &, class TDesC16 const &)
-	?DeleteAllRightsObjects@CRightsManager@ContentAccess@@QAEHAAVRFile@@ABVTDesC16@@@Z @ 148 NONAME ; int ContentAccess::CRightsManager::DeleteAllRightsObjects(class RFile &, class TDesC16 const &)
-	?DisplayInfoL@CAgentManager@ContentAccess@@UAEXW4TDisplayInfo@2@AAVRFile@@ABVTDesC16@@@Z @ 149 NONAME ; void ContentAccess::CAgentManager::DisplayInfoL(enum ContentAccess::TDisplayInfo, class RFile &, class TDesC16 const &)
-	?DisplayInfoL@CManager@ContentAccess@@QAEXW4TDisplayInfo@2@AAVRFile@@ABVTDesC16@@@Z @ 150 NONAME ; void ContentAccess::CManager::DisplayInfoL(enum ContentAccess::TDisplayInfo, class RFile &, class TDesC16 const &)
-	?GetAttribute@CAgentManager@ContentAccess@@UAEHHAAHAAVRFile@@ABVTDesC16@@@Z @ 151 NONAME ; int ContentAccess::CAgentManager::GetAttribute(int, int &, class RFile &, class TDesC16 const &)
-	?GetAttribute@CManager@ContentAccess@@QAEHHAAHAAVRFile@@ABVTDesC16@@@Z @ 152 NONAME ; int ContentAccess::CManager::GetAttribute(int, int &, class RFile &, class TDesC16 const &)
-	?GetAttributeSet@CAgentManager@ContentAccess@@UAEHAAVRAttributeSet@2@AAVRFile@@ABVTDesC16@@@Z @ 153 NONAME ; int ContentAccess::CAgentManager::GetAttributeSet(class ContentAccess::RAttributeSet &, class RFile &, class TDesC16 const &)
-	?GetAttributeSet@CManager@ContentAccess@@QAEHAAVRAttributeSet@2@AAVRFile@@ABVTDesC16@@@Z @ 154 NONAME ; int ContentAccess::CManager::GetAttributeSet(class ContentAccess::RAttributeSet &, class RFile &, class TDesC16 const &)
-	?GetStringAttribute@CAgentManager@ContentAccess@@UAEHHAAVTDes16@@AAVRFile@@ABVTDesC16@@@Z @ 155 NONAME ; int ContentAccess::CAgentManager::GetStringAttribute(int, class TDes16 &, class RFile &, class TDesC16 const &)
-	?GetStringAttribute@CManager@ContentAccess@@QAEHHAAVTDes16@@AAVRFile@@ABVTDesC16@@@Z @ 156 NONAME ; int ContentAccess::CManager::GetStringAttribute(int, class TDes16 &, class RFile &, class TDesC16 const &)
-	?GetStringAttributeSet@CAgentManager@ContentAccess@@UAEHAAVRStringAttributeSet@2@AAVRFile@@ABVTDesC16@@@Z @ 157 NONAME ; int ContentAccess::CAgentManager::GetStringAttributeSet(class ContentAccess::RStringAttributeSet &, class RFile &, class TDesC16 const &)
-	?GetStringAttributeSet@CManager@ContentAccess@@QAEHAAVRStringAttributeSet@2@AAVRFile@@ABVTDesC16@@@Z @ 158 NONAME ; int ContentAccess::CManager::GetStringAttributeSet(class ContentAccess::RStringAttributeSet &, class RFile &, class TDesC16 const &)
-	?ListRightsL@CAgentRightsManager@ContentAccess@@UBEXAAV?$RStreamablePtrArray@VCRightsInfo@ContentAccess@@@2@AAVRFile@@ABVTDesC16@@@Z @ 159 NONAME ; void ContentAccess::CAgentRightsManager::ListRightsL(class ContentAccess::RStreamablePtrArray<class ContentAccess::CRightsInfo> &, class RFile &, class TDesC16 const &) const
-	?ListRightsL@CRightsManager@ContentAccess@@QBEXAAV?$RStreamablePtrArray@VCRightsInfo@ContentAccess@@@2@AAVRFile@@ABVTDesC16@@@Z @ 160 NONAME ; void ContentAccess::CRightsManager::ListRightsL(class ContentAccess::RStreamablePtrArray<class ContentAccess::CRightsInfo> &, class RFile &, class TDesC16 const &) const
-	?ContentMimeTypeL@CAgentImportFile@ContentAccess@@UAEHAAVTDes8@@@Z @ 161 NONAME ; int ContentAccess::CAgentImportFile::ContentMimeTypeL(class TDes8 &)
-	?ContentMimeTypeL@CImportFile@ContentAccess@@QAEHAAVTDes8@@@Z @ 162 NONAME ; int ContentAccess::CImportFile::ContentMimeTypeL(class TDes8 &)
-	?DataSize64L@CAgentData@ContentAccess@@UAEXAA_J@Z @ 163 NONAME ; void ContentAccess::CAgentData::DataSize64L(long long &)
-	?DataSize64L@CData@ContentAccess@@QAEXAA_J@Z @ 164 NONAME ; void ContentAccess::CData::DataSize64L(long long &)
-	?Read64@CAgentData@ContentAccess@@UAEH_JAAVTDes8@@HAAVTRequestStatus@@@Z @ 165 NONAME ; int ContentAccess::CAgentData::Read64(long long, class TDes8 &, int, class TRequestStatus &)
-	?Read@CData@ContentAccess@@QBEH_JAAVTDes8@@HAAVTRequestStatus@@@Z @ 166 NONAME ; int ContentAccess::CData::Read(long long, class TDes8 &, int, class TRequestStatus &) const
-	?Seek64@CAgentData@ContentAccess@@UAEHW4TSeek@@AA_J@Z @ 167 NONAME ; int ContentAccess::CAgentData::Seek64(enum TSeek, long long &)
-	?Seek64@CData@ContentAccess@@QBEHW4TSeek@@AA_J@Z @ 168 NONAME ; int ContentAccess::CData::Seek64(enum TSeek, long long &) const
-	?GetStringAttribute@CManager@ContentAccess@@QBEHABVTDesC8@@HAAVTDes16@@@Z @ 169 NONAME ; int ContentAccess::CManager::GetStringAttribute(class TDesC8 const &, int, class TDes16 &) const
-	?GetStringAttributeSet@CAgentManager@ContentAccess@@UAEHABVTDesC8@@AAVRStringAttributeSet@2@@Z @ 170 NONAME ; int ContentAccess::CAgentManager::GetStringAttributeSet(class TDesC8 const &, class ContentAccess::RStringAttributeSet &)
-	?GetAttribute@CAgentManager@ContentAccess@@UAEHABVTDesC8@@HAAH@Z @ 171 NONAME ; int ContentAccess::CAgentManager::GetAttribute(class TDesC8 const &, int, int &)
-	?NewL@CData@ContentAccess@@SAPAV12@ABVTDesC8@@W4TIntent@2@@Z @ 172 NONAME ; class ContentAccess::CData * ContentAccess::CData::NewL(class TDesC8 const &, enum ContentAccess::TIntent)
-	?CreateContentBrowserL@CAgentFactory@ContentAccess@@UAEPAVCAgentContent@2@ABVTDesC8@@@Z @ 173 NONAME ; class ContentAccess::CAgentContent * ContentAccess::CAgentFactory::CreateContentBrowserL(class TDesC8 const &)
-	?Read@CData@ContentAccess@@QBEXABVTDesC8@@AAVTDes8@@AAVTRequestStatus@@@Z @ 174 NONAME ; void ContentAccess::CData::Read(class TDesC8 const &, class TDes8 &, class TRequestStatus &) const
-	?Read@CAgentData@ContentAccess@@UAEXABVTDesC8@@AAVTDes8@@AAVTRequestStatus@@@Z @ 175 NONAME ; void ContentAccess::CAgentData::Read(class TDesC8 const &, class TDes8 &, class TRequestStatus &)
-	?GetAttributeSet@CManager@ContentAccess@@QBEHABVTDesC8@@AAVRAttributeSet@2@@Z @ 176 NONAME ; int ContentAccess::CManager::GetAttributeSet(class TDesC8 const &, class ContentAccess::RAttributeSet &) const
-	?GetAttributeSet@CAgentManager@ContentAccess@@UAEHABVTDesC8@@AAVRAttributeSet@2@@Z @ 177 NONAME ; int ContentAccess::CAgentManager::GetAttributeSet(class TDesC8 const &, class ContentAccess::RAttributeSet &)
-	?DoRecognizeL@CAgentResolver@ContentAccess@@QAEHABVTDesC8@@AAVTDes8@@1@Z @ 178 NONAME ; int ContentAccess::CAgentResolver::DoRecognizeL(class TDesC8 const &, class TDes8 &, class TDes8 &)
-	?GetAttribute@CManager@ContentAccess@@QBEHABVTDesC8@@HAAH@Z @ 179 NONAME ; int ContentAccess::CManager::GetAttribute(class TDesC8 const &, int, int &) const
-	?NewLC@CContent@ContentAccess@@SAPAV12@ABVTDesC8@@@Z @ 180 NONAME ; class ContentAccess::CContent * ContentAccess::CContent::NewLC(class TDesC8 const &)
-	?GetStringAttributeSet@CManager@ContentAccess@@QBEHABVTDesC8@@AAVRStringAttributeSet@2@@Z @ 181 NONAME ; int ContentAccess::CManager::GetStringAttributeSet(class TDesC8 const &, class ContentAccess::RStringAttributeSet &) const
-	?CreateDataConsumerL@CAgentFactory@ContentAccess@@UAEPAVCAgentData@2@ABVTDesC8@@@Z @ 182 NONAME ; class ContentAccess::CAgentData * ContentAccess::CAgentFactory::CreateDataConsumerL(class TDesC8 const &)
-	?IsRecognizedL@CAgentManager@ContentAccess@@UBEHABVTDesC8@@@Z @ 183 NONAME ; int ContentAccess::CAgentManager::IsRecognizedL(class TDesC8 const &) const
-	?NewL@CData@ContentAccess@@SAPAV12@ABVTDesC8@@@Z @ 184 NONAME ; class ContentAccess::CData * ContentAccess::CData::NewL(class TDesC8 const &)
-	?Read@CAgentData@ContentAccess@@UAEHABVTDesC8@@AAVTDes8@@@Z @ 185 NONAME ; int ContentAccess::CAgentData::Read(class TDesC8 const &, class TDes8 &)
-	?GetStringAttribute@CAgentManager@ContentAccess@@UAEHABVTDesC8@@HAAVTDes16@@@Z @ 186 NONAME ; int ContentAccess::CAgentManager::GetStringAttribute(class TDesC8 const &, int, class TDes16 &)
-	?RecognizeContentL@CAgentManager@ContentAccess@@UBEHABVTDesC8@@AAVTDes8@@1@Z @ 187 NONAME ; int ContentAccess::CAgentManager::RecognizeContentL(class TDesC8 const &, class TDes8 &, class TDes8 &) const
-	?NewLC@CData@ContentAccess@@SAPAV12@ABVTDesC8@@@Z @ 188 NONAME ; class ContentAccess::CData * ContentAccess::CData::NewLC(class TDesC8 const &)
-	?Read@CData@ContentAccess@@QBEHABVTDesC8@@AAVTDes8@@@Z @ 189 NONAME ; int ContentAccess::CData::Read(class TDesC8 const &, class TDes8 &) const
-	?NewLC@CData@ContentAccess@@SAPAV12@ABVTDesC8@@W4TIntent@2@@Z @ 190 NONAME ; class ContentAccess::CData * ContentAccess::CData::NewLC(class TDesC8 const &, enum ContentAccess::TIntent)
-	?NewL@CContent@ContentAccess@@SAPAV12@ABVTDesC8@@@Z @ 191 NONAME ; class ContentAccess::CContent * ContentAccess::CContent::NewL(class TDesC8 const &)
-
--- a/contentmgmt/contentaccessfwfordrm/BWINS/cafutils_v2u.def	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,103 +0,0 @@
-EXPORTS
-	??4CBitset@ContentAccess@@QAEAAV01@ABV01@@Z @ 1 NONAME ; public: class ContentAccess::CBitset & __thiscall ContentAccess::CBitset::operator=(class ContentAccess::CBitset const &)
-	??8CBitset@ContentAccess@@QBEHABV01@@Z @ 2 NONAME ; public: int __thiscall ContentAccess::CBitset::operator==(class ContentAccess::CBitset const &)const 
-	?ExternalizeL@CBitset@ContentAccess@@QBEXAAVRWriteStream@@@Z @ 3 NONAME ; public: void __thiscall ContentAccess::CBitset::ExternalizeL(class RWriteStream &)const 
-	?InternalizeL@CBitset@ContentAccess@@QAEXAAVRReadStream@@@Z @ 4 NONAME ; public: void __thiscall ContentAccess::CBitset::InternalizeL(class RReadStream &)
-	?Invert@CBitset@ContentAccess@@QAEXXZ @ 5 NONAME ; public: void __thiscall ContentAccess::CBitset::Invert(void)
-	?IsSet@CBitset@ContentAccess@@QBEHH@Z @ 6 NONAME ; public: int __thiscall ContentAccess::CBitset::IsSet(int)const 
-	?IsSetList@CBitset@ContentAccess@@QBAHHZZ @ 7 NONAME ; public: int __cdecl ContentAccess::CBitset::IsSetList(int,...)const 
-	?NewL@CBitset@ContentAccess@@SAPAV12@ABV12@@Z @ 8 NONAME ; public: static class ContentAccess::CBitset * __cdecl ContentAccess::CBitset::NewL(class ContentAccess::CBitset const &)
-	?NewL@CBitset@ContentAccess@@SAPAV12@H@Z @ 9 NONAME ; public: static class ContentAccess::CBitset * __cdecl ContentAccess::CBitset::NewL(int)
-	?NewLC@CBitset@ContentAccess@@SAPAV12@ABV12@@Z @ 10 NONAME ; public: static class ContentAccess::CBitset * __cdecl ContentAccess::CBitset::NewLC(class ContentAccess::CBitset const &)
-	?NewLC@CBitset@ContentAccess@@SAPAV12@H@Z @ 11 NONAME ; public: static class ContentAccess::CBitset * __cdecl ContentAccess::CBitset::NewLC(int)
-	?Reset@CBitset@ContentAccess@@QAEXXZ @ 12 NONAME ; public: void __thiscall ContentAccess::CBitset::Reset(void)
-	?Set@CBitset@ContentAccess@@QAEXH@Z @ 13 NONAME ; public: void __thiscall ContentAccess::CBitset::Set(int)
-	?SetAll@CBitset@ContentAccess@@QAEXXZ @ 14 NONAME ; public: void __thiscall ContentAccess::CBitset::SetAll(void)
-	?SetListL@CBitset@ContentAccess@@QAAXHZZ @ 15 NONAME ; public: void __cdecl ContentAccess::CBitset::SetListL(int,...)
-	?Unset@CBitset@ContentAccess@@QAEXH@Z @ 16 NONAME ; public: void __thiscall ContentAccess::CBitset::Unset(int)
-	?MaxBits@CBitset@ContentAccess@@QBEHXZ @ 17 NONAME ; public: int __thiscall ContentAccess::CBitset::MaxBits(void)const 
-	??1CCafMimeHeader@ContentAccess@@UAE@XZ @ 18 NONAME ; public: virtual __thiscall ContentAccess::CCafMimeHeader::~CCafMimeHeader(void)
-	?AddNonStandardMimeL@CCafMimeHeader@ContentAccess@@QAEXABVTDesC8@@0@Z @ 19 NONAME ; public: void __thiscall ContentAccess::CCafMimeHeader::AddNonStandardMimeL(class TDesC8 const &,class TDesC8 const &)
-	?ExternalizeL@CCafMimeHeader@ContentAccess@@QBEXAAVRWriteStream@@@Z @ 20 NONAME ; public: void __thiscall ContentAccess::CCafMimeHeader::ExternalizeL(class RWriteStream &)const 
-	?InternalizeL@CCafMimeHeader@ContentAccess@@QAEXAAVRReadStream@@@Z @ 21 NONAME ; public: void __thiscall ContentAccess::CCafMimeHeader::InternalizeL(class RReadStream &)
-	?NewL@CCafMimeHeader@ContentAccess@@SAPAV12@ABVTDesC8@@@Z @ 22 NONAME ; public: static class ContentAccess::CCafMimeHeader * __cdecl ContentAccess::CCafMimeHeader::NewL(class TDesC8 const &)
-	?NonStandardMimeCount@CCafMimeHeader@ContentAccess@@QBEHXZ @ 23 NONAME ; public: int __thiscall ContentAccess::CCafMimeHeader::NonStandardMimeCount(void)const 
-	?NonStandardMimeData@CCafMimeHeader@ContentAccess@@QBE?AVTPtrC8@@H@Z @ 24 NONAME ; public: class TPtrC8  __thiscall ContentAccess::CCafMimeHeader::NonStandardMimeData(int)const 
-	?NonStandardMimeField@CCafMimeHeader@ContentAccess@@QBE?AVTPtrC8@@H@Z @ 25 NONAME ; public: class TPtrC8  __thiscall ContentAccess::CCafMimeHeader::NonStandardMimeField(int)const 
-	?SetStandardMimeDataL@CCafMimeHeader@ContentAccess@@QAEXABW4TMimeFields@2@ABVTDesC8@@@Z @ 26 NONAME ; public: void __thiscall ContentAccess::CCafMimeHeader::SetStandardMimeDataL(enum ContentAccess::TMimeFields const &,class TDesC8 const &)
-	?StandardMimeData@CCafMimeHeader@ContentAccess@@QBE?AVTPtrC8@@ABW4TMimeFields@2@@Z @ 27 NONAME ; public: class TPtrC8  __thiscall ContentAccess::CCafMimeHeader::StandardMimeData(enum ContentAccess::TMimeFields const &)const 
-	??0RAttributeSet@ContentAccess@@QAE@XZ @ 28 NONAME ; ContentAccess::RAttributeSet::RAttributeSet(void)
-	??0RStringAttributeSet@ContentAccess@@QAE@XZ @ 29 NONAME ; ContentAccess::RStringAttributeSet::RStringAttributeSet(void)
-	??0TVirtualPathPtr@ContentAccess@@QAE@ABV01@@Z @ 30 NONAME ; ContentAccess::TVirtualPathPtr::TVirtualPathPtr(class ContentAccess::TVirtualPathPtr const &)
-	??0TVirtualPathPtr@ContentAccess@@QAE@ABVTDesC16@@0@Z @ 31 NONAME ; ContentAccess::TVirtualPathPtr::TVirtualPathPtr(class TDesC16 const &, class TDesC16 const &)
-	??0TVirtualPathPtr@ContentAccess@@QAE@ABVTDesC16@@@Z @ 32 NONAME ; ContentAccess::TVirtualPathPtr::TVirtualPathPtr(class TDesC16 const &)
-	??4TVirtualPathPtr@ContentAccess@@QAEAAV01@ABV01@@Z @ 33 NONAME ; class ContentAccess::TVirtualPathPtr & ContentAccess::TVirtualPathPtr::operator=(class ContentAccess::TVirtualPathPtr const &)
-	??4TVirtualPathPtr@ContentAccess@@QAEAAV01@ABVTDesC16@@@Z @ 34 NONAME ; class ContentAccess::TVirtualPathPtr & ContentAccess::TVirtualPathPtr::operator=(class TDesC16 const &)
-	??ACDirStreamable@ContentAccess@@QBEABVTEntry@@H@Z @ 35 NONAME ; class TEntry const & ContentAccess::CDirStreamable::operator[](int) const
-	??ACMetaDataArray@ContentAccess@@QBEABVCMetaData@1@H@Z @ 36 NONAME ; class ContentAccess::CMetaData const & ContentAccess::CMetaDataArray::operator[](int) const
-	??ARAttributeSet@ContentAccess@@QBEHH@Z @ 37 NONAME ; int ContentAccess::RAttributeSet::operator[](int) const
-	??ARStringAttributeSet@ContentAccess@@QBEHH@Z @ 38 NONAME ; int ContentAccess::RStringAttributeSet::operator[](int) const
-	?AddL@CDirStreamable@ContentAccess@@QAEXABVTEntry@@@Z @ 39 NONAME ; void ContentAccess::CDirStreamable::AddL(class TEntry const &)
-	?AddL@CMetaDataArray@ContentAccess@@QAEXABVTDesC16@@0@Z @ 40 NONAME ; void ContentAccess::CMetaDataArray::AddL(class TDesC16 const &, class TDesC16 const &)
-	?AddL@CMetaDataArray@ContentAccess@@QAEXABVTDesC8@@0@Z @ 41 NONAME ; void ContentAccess::CMetaDataArray::AddL(class TDesC8 const &, class TDesC8 const &)
-	?AddL@RAttributeSet@ContentAccess@@QAEXH@Z @ 42 NONAME ; void ContentAccess::RAttributeSet::AddL(int)
-	?AddL@RStringAttributeSet@ContentAccess@@QAEXH@Z @ 43 NONAME ; void ContentAccess::RStringAttributeSet::AddL(int)
-	?Close@RAttributeSet@ContentAccess@@QAEXXZ @ 44 NONAME ; void ContentAccess::RAttributeSet::Close(void)
-	?Close@RStringAttributeSet@ContentAccess@@QAEXXZ @ 45 NONAME ; void ContentAccess::RStringAttributeSet::Close(void)
-	?Count@CDirStreamable@ContentAccess@@QBEHXZ @ 46 NONAME ; int ContentAccess::CDirStreamable::Count(void) const
-	?Count@CMetaDataArray@ContentAccess@@QBEHXZ @ 47 NONAME ; int ContentAccess::CMetaDataArray::Count(void) const
-	?Count@RAttributeSet@ContentAccess@@QBEHXZ @ 48 NONAME ; int ContentAccess::RAttributeSet::Count(void) const
-	?Count@RStringAttributeSet@ContentAccess@@QBEHXZ @ 49 NONAME ; int ContentAccess::RStringAttributeSet::Count(void) const
-	?Data8@CMetaData@ContentAccess@@QBEABVTDesC8@@XZ @ 50 NONAME ; class TDesC8 const & ContentAccess::CMetaData::Data8(void) const
-	?Data@CMetaData@ContentAccess@@QBEABVTDesC16@@XZ @ 51 NONAME ; class TDesC16 const & ContentAccess::CMetaData::Data(void) const
-	?Description@CRightsInfo@ContentAccess@@QBEABVTDesC16@@XZ @ 52 NONAME ; class TDesC16 const & ContentAccess::CRightsInfo::Description(void) const
-	?ExternalizeL@CDirStreamable@ContentAccess@@QBEXAAVRWriteStream@@@Z @ 53 NONAME ; void ContentAccess::CDirStreamable::ExternalizeL(class RWriteStream &) const
-	?ExternalizeL@CEmbeddedObject@ContentAccess@@QBEXAAVRWriteStream@@@Z @ 54 NONAME ; void ContentAccess::CEmbeddedObject::ExternalizeL(class RWriteStream &) const
-	?ExternalizeL@CMetaDataArray@ContentAccess@@QBEXAAVRWriteStream@@@Z @ 55 NONAME ; void ContentAccess::CMetaDataArray::ExternalizeL(class RWriteStream &) const
-	?ExternalizeL@CRightsInfo@ContentAccess@@QBEXAAVRWriteStream@@@Z @ 56 NONAME ; void ContentAccess::CRightsInfo::ExternalizeL(class RWriteStream &) const
-	?ExternalizeL@CVirtualPath@ContentAccess@@QBEXAAVRWriteStream@@@Z @ 57 NONAME ; void ContentAccess::CVirtualPath::ExternalizeL(class RWriteStream &) const
-	?ExternalizeL@RAttributeSet@ContentAccess@@QBEXAAVRWriteStream@@@Z @ 58 NONAME ; void ContentAccess::RAttributeSet::ExternalizeL(class RWriteStream &) const
-	?ExternalizeL@RStringAttributeSet@ContentAccess@@QBEXAAVRWriteStream@@@Z @ 59 NONAME ; void ContentAccess::RStringAttributeSet::ExternalizeL(class RWriteStream &) const
-	?Field8@CMetaData@ContentAccess@@QBEABVTDesC8@@XZ @ 60 NONAME ; class TDesC8 const & ContentAccess::CMetaData::Field8(void) const
-	?Field@CMetaData@ContentAccess@@QBEABVTDesC16@@XZ @ 61 NONAME ; class TDesC16 const & ContentAccess::CMetaData::Field(void) const
-	?GetCombinedUriUniqueId@CVirtualPath@ContentAccess@@QAEABVTDesC16@@XZ @ 62 NONAME ; class TDesC16 const & ContentAccess::CVirtualPath::GetCombinedUriUniqueId(void)
-	?GetValue@RAttributeSet@ContentAccess@@QBEHHAAH@Z @ 63 NONAME ; int ContentAccess::RAttributeSet::GetValue(int, int &) const
-	?GetValue@RStringAttributeSet@ContentAccess@@QBEHHAAVTDes16@@@Z @ 64 NONAME ; int ContentAccess::RStringAttributeSet::GetValue(int, class TDes16 &) const
-	?GetValueLength@RStringAttributeSet@ContentAccess@@QBEHH@Z @ 65 NONAME ; int ContentAccess::RStringAttributeSet::GetValueLength(int) const
-	?InternalizeL@RAttributeSet@ContentAccess@@QAEXAAVRReadStream@@@Z @ 66 NONAME ; void ContentAccess::RAttributeSet::InternalizeL(class RReadStream &)
-	?InternalizeL@RStringAttributeSet@ContentAccess@@QAEXAAVRReadStream@@@Z @ 67 NONAME ; void ContentAccess::RStringAttributeSet::InternalizeL(class RReadStream &)
-	?MimeType@CEmbeddedObject@ContentAccess@@QBEABVTDesC8@@XZ @ 68 NONAME ; class TDesC8 const & ContentAccess::CEmbeddedObject::MimeType(void) const
-	?Name@CEmbeddedObject@ContentAccess@@QBEABVTDesC16@@XZ @ 69 NONAME ; class TDesC16 const & ContentAccess::CEmbeddedObject::Name(void) const
-	?NewL@CDirStreamable@ContentAccess@@SAPAV12@AAVCDir@@@Z @ 70 NONAME ; class ContentAccess::CDirStreamable * ContentAccess::CDirStreamable::NewL(class CDir &)
-	?NewL@CDirStreamable@ContentAccess@@SAPAV12@VRReadStream@@@Z @ 71 NONAME ; class ContentAccess::CDirStreamable * ContentAccess::CDirStreamable::NewL(class RReadStream)
-	?NewL@CDirStreamable@ContentAccess@@SAPAV12@XZ @ 72 NONAME ; class ContentAccess::CDirStreamable * ContentAccess::CDirStreamable::NewL(void)
-	?NewL@CEmbeddedObject@ContentAccess@@SAPAV12@AAVRReadStream@@@Z @ 73 NONAME ; class ContentAccess::CEmbeddedObject * ContentAccess::CEmbeddedObject::NewL(class RReadStream &)
-	?NewL@CEmbeddedObject@ContentAccess@@SAPAV12@ABVTDesC16@@0ABVTDesC8@@W4TEmbeddedType@2@@Z @ 74 NONAME ; class ContentAccess::CEmbeddedObject * ContentAccess::CEmbeddedObject::NewL(class TDesC16 const &, class TDesC16 const &, class TDesC8 const &, enum ContentAccess::TEmbeddedType)
-	?NewL@CEmbeddedObject@ContentAccess@@SAPAV12@ABVTDesC16@@ABVTDesC8@@W4TEmbeddedType@2@@Z @ 75 NONAME ; class ContentAccess::CEmbeddedObject * ContentAccess::CEmbeddedObject::NewL(class TDesC16 const &, class TDesC8 const &, enum ContentAccess::TEmbeddedType)
-	?NewL@CMetaDataArray@ContentAccess@@SAPAV12@AAVRReadStream@@@Z @ 76 NONAME ; class ContentAccess::CMetaDataArray * ContentAccess::CMetaDataArray::NewL(class RReadStream &)
-	?NewL@CMetaDataArray@ContentAccess@@SAPAV12@XZ @ 77 NONAME ; class ContentAccess::CMetaDataArray * ContentAccess::CMetaDataArray::NewL(void)
-	?NewL@CRightsInfo@ContentAccess@@SAPAV12@AAVRReadStream@@@Z @ 78 NONAME ; class ContentAccess::CRightsInfo * ContentAccess::CRightsInfo::NewL(class RReadStream &)
-	?NewL@CRightsInfo@ContentAccess@@SAPAV12@ABVTDesC16@@0HW4TRightsStatus@2@@Z @ 79 NONAME ; class ContentAccess::CRightsInfo * ContentAccess::CRightsInfo::NewL(class TDesC16 const &, class TDesC16 const &, int, enum ContentAccess::TRightsStatus)
-	?NewL@CVirtualPath@ContentAccess@@SAPAV12@AAVRReadStream@@@Z @ 80 NONAME ; class ContentAccess::CVirtualPath * ContentAccess::CVirtualPath::NewL(class RReadStream &)
-	?NewL@CVirtualPath@ContentAccess@@SAPAV12@ABVTDesC16@@0@Z @ 81 NONAME ; class ContentAccess::CVirtualPath * ContentAccess::CVirtualPath::NewL(class TDesC16 const &, class TDesC16 const &)
-	?NewL@CVirtualPath@ContentAccess@@SAPAV12@ABVTDesC16@@@Z @ 82 NONAME ; class ContentAccess::CVirtualPath * ContentAccess::CVirtualPath::NewL(class TDesC16 const &)
-	?NewL@CVirtualPath@ContentAccess@@SAPAV12@ABVTVirtualPathPtr@2@@Z @ 83 NONAME ; class ContentAccess::CVirtualPath * ContentAccess::CVirtualPath::NewL(class ContentAccess::TVirtualPathPtr const &)
-	?NewLC@CMetaDataArray@ContentAccess@@SAPAV12@XZ @ 84 NONAME ; class ContentAccess::CMetaDataArray * ContentAccess::CMetaDataArray::NewLC(void)
-	?RightsStatus@CRightsInfo@ContentAccess@@QBE?AW4TRightsStatus@2@XZ @ 85 NONAME ; enum ContentAccess::TRightsStatus ContentAccess::CRightsInfo::RightsStatus(void) const
-	?RightsType@CRightsInfo@ContentAccess@@QBEHXZ @ 86 NONAME ; int ContentAccess::CRightsInfo::RightsType(void) const
-	?SearchL@CMetaDataArray@ContentAccess@@QBEABVTDesC16@@ABV3@H@Z @ 87 NONAME ; class TDesC16 const & ContentAccess::CMetaDataArray::SearchL(class TDesC16 const &, int) const
-	?SearchL@CMetaDataArray@ContentAccess@@QBEABVTDesC8@@ABV3@H@Z @ 88 NONAME ; class TDesC8 const & ContentAccess::CMetaDataArray::SearchL(class TDesC8 const &, int) const
-	?SetValue@RAttributeSet@ContentAccess@@QAEHHHH@Z @ 89 NONAME ; int ContentAccess::RAttributeSet::SetValue(int, int, int)
-	?SetValue@RStringAttributeSet@ContentAccess@@QAEHHABVTDesC16@@H@Z @ 90 NONAME ; int ContentAccess::RStringAttributeSet::SetValue(int, class TDesC16 const &, int)
-	?Sort@CDirStreamable@ContentAccess@@QAEHI@Z @ 91 NONAME ; int ContentAccess::CDirStreamable::Sort(unsigned int)
-	?Type@CEmbeddedObject@ContentAccess@@QBE?AW4TEmbeddedType@2@XZ @ 92 NONAME ; enum ContentAccess::TEmbeddedType ContentAccess::CEmbeddedObject::Type(void) const
-	?URI@CVirtualPath@ContentAccess@@QBEABVTDesC16@@XZ @ 93 NONAME ; class TDesC16 const & ContentAccess::CVirtualPath::URI(void) const
-	?URI@TVirtualPathPtr@ContentAccess@@QBEABVTDesC16@@XZ @ 94 NONAME ; class TDesC16 const & ContentAccess::TVirtualPathPtr::URI(void) const
-	?UniqueId@CEmbeddedObject@ContentAccess@@QBEABVTDesC16@@XZ @ 95 NONAME ; class TDesC16 const & ContentAccess::CEmbeddedObject::UniqueId(void) const
-	?UniqueId@CRightsInfo@ContentAccess@@QBEABVTDesC16@@XZ @ 96 NONAME ; class TDesC16 const & ContentAccess::CRightsInfo::UniqueId(void) const
-	?UniqueId@CVirtualPath@ContentAccess@@QBEABVTDesC16@@XZ @ 97 NONAME ; class TDesC16 const & ContentAccess::CVirtualPath::UniqueId(void) const
-	?UniqueId@TVirtualPathPtr@ContentAccess@@QBEABVTDesC16@@XZ @ 98 NONAME ; class TDesC16 const & ContentAccess::TVirtualPathPtr::UniqueId(void) const
-	?NewL@CCAFHelper@ContentAccess@@SAPAV12@XZ @ 99 NONAME ; class ContentAccess::CCAFHelper * ContentAccess::CCAFHelper::NewL(void)
-	?NewLC@CCAFHelper@ContentAccess@@SAPAV12@XZ @ 100 NONAME ; class ContentAccess::CCAFHelper * ContentAccess::CCAFHelper::NewLC(void)
-	??RCCAFHelper@ContentAccess@@QBEAAVMCAFHelperInterface@1@XZ @ 101 NONAME ; class ContentAccess::MCAFHelperInterface & ContentAccess::CCAFHelper::operator()(void) const
-
--- a/contentmgmt/contentaccessfwfordrm/EABI/caf_v3u.def	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,225 +0,0 @@
-EXPORTS
-	_ZN13ContentAccess10CAttribute4GetLEv @ 1 NONAME
-	_ZN13ContentAccess10CAttribute5ResetEv @ 2 NONAME
-	_ZN13ContentAccess10CAttribute8QuerySetEv @ 3 NONAME
-	_ZN13ContentAccess5CData13ExecuteIntentENS_7TIntentE @ 4 NONAME
-	_ZN13ContentAccess5CData14EvaluateIntentENS_7TIntentE @ 5 NONAME
-	_ZN13ContentAccess5CData7SetQosLENS_13TQosAttributeEi @ 6 NONAME
-	_ZN13ContentAccess5CData9DataSizeLERi @ 7 NONAME
-	_ZN13ContentAccess8CContent12OpenContentLENS_7TIntentE @ 8 NONAME
-	_ZN13ContentAccess8CContent13NewAttributeLEi @ 9 NONAME
-	_ZN13ContentAccess8CContent4NewLERK7TDesC16 @ 10 NONAME
-	_ZN13ContentAccess8CContent5NewLCERK7TDesC16 @ 11 NONAME
-	_ZNK13ContentAccess10CAttribute11ResponseSetEv @ 12 NONAME
-	_ZNK13ContentAccess5CData4ReadER5TDes8 @ 13 NONAME
-	_ZNK13ContentAccess5CData4ReadER5TDes8R14TRequestStatus @ 14 NONAME
-	_ZNK13ContentAccess5CData4ReadER5TDes8i @ 15 NONAME
-	_ZNK13ContentAccess5CData4ReadER5TDes8iR14TRequestStatus @ 16 NONAME
-	_ZNK13ContentAccess5CData4SeekE5TSeekRi @ 17 NONAME
-	_ZN13ContentAccess11CImportFile17WriteDataCompleteER14TRequestStatus @ 18 NONAME
-	_ZN13ContentAccess11CImportFile17WriteDataCompleteEv @ 19 NONAME
-	_ZN13ContentAccess11CImportFile9WriteDataERK6TDesC8 @ 20 NONAME
-	_ZN13ContentAccess11CImportFile9WriteDataERK6TDesC8R14TRequestStatus @ 21 NONAME
-	_ZN13ContentAccess14CAgentResolver12DoRecognizeLERK7TDesC16RK6TDesC8R5TDes8S8_ @ 22 NONAME
-	_ZN13ContentAccess14CAgentResolver19PreferredBufferSizeEv @ 23 NONAME
-	_ZN13ContentAccess14CAgentResolver4NewLEi @ 24 NONAME
-	_ZN13ContentAccess14CAgentResolver5NewLCEi @ 25 NONAME
-	_ZN13ContentAccess19CSupplierOutputFile11AttributesLEi @ 26 NONAME
-	_ZN13ContentAccess19CSupplierOutputFile4NewLERK7TDesC16NS_11TOutputTypeE @ 27 NONAME
-	_ZN13ContentAccess19CSupplierOutputFile9MimeTypeLEv @ 28 NONAME
-	_ZN13ContentAccess8CManager11DeleteFileLERK7TDesC16 @ 29 NONAME
-	_ZN13ContentAccess9CSupplier11ImportFileLERNS_14CCafMimeHeaderERK7TDesC16 @ 30 NONAME
-	_ZN13ContentAccess9CSupplier17IsImportSupportedERK6TDesC8 @ 31 NONAME
-	_ZN13ContentAccess9CSupplier19SetOutputDirectoryLERK7TDesC16 @ 32 NONAME
-	_ZN13ContentAccess9CSupplier4NewLEv @ 33 NONAME
-	_ZN13ContentAccess9CSupplier5NewLCEv @ 34 NONAME
-	_ZNK13ContentAccess11CImportFile11OutputFileLEi @ 35 NONAME
-	_ZNK13ContentAccess11CImportFile16OutputFileCountLEv @ 36 NONAME
-	_ZNK13ContentAccess14CAgentResolver17ConsumerMimeTypesEv @ 37 NONAME
-	_ZNK13ContentAccess14CAgentResolver17SupplierMimeTypesEv @ 38 NONAME
-	_ZNK13ContentAccess19CSupplierOutputFile10OutputTypeEv @ 39 NONAME
-	_ZNK13ContentAccess19CSupplierOutputFile8FileNameEv @ 40 NONAME
-	_ZNK13ContentAccess5CData12GetMimeTypeLER5TDes8 @ 41 NONAME
-	_ZN13ContentAccess8CContent12OpenContentLENS_7TIntentENS_17TContentShareModeE @ 42 NONAME
-	_ZN13ContentAccess8CContent13NewAttributeLEiNS_17TContentShareModeE @ 43 NONAME
-	_ZTIN13ContentAccess10CAgentInfoE @ 44 NONAME ; #<TI>#
-	_ZTIN13ContentAccess10CAttributeE @ 45 NONAME ; #<TI>#
-	_ZTIN13ContentAccess11CImportFileE @ 46 NONAME ; #<TI>#
-	_ZTIN13ContentAccess14CAgentResolverE @ 47 NONAME ; #<TI>#
-	_ZTIN13ContentAccess19CSupplierOutputFileE @ 48 NONAME ; #<TI>#
-	_ZTIN13ContentAccess5CDataE @ 49 NONAME ; #<TI>#
-	_ZTIN13ContentAccess8CContentE @ 50 NONAME ; #<TI>#
-	_ZTIN13ContentAccess9CSupplierE @ 51 NONAME ; #<TI>#
-	_ZTVN13ContentAccess10CAgentInfoE @ 52 NONAME ; #<VT>#
-	_ZTVN13ContentAccess10CAttributeE @ 53 NONAME ; #<VT>#
-	_ZTVN13ContentAccess11CImportFileE @ 54 NONAME ; #<VT>#
-	_ZTVN13ContentAccess14CAgentResolverE @ 55 NONAME ; #<VT>#
-	_ZTVN13ContentAccess19CSupplierOutputFileE @ 56 NONAME ; #<VT>#
-	_ZTVN13ContentAccess5CDataE @ 57 NONAME ; #<VT>#
-	_ZTVN13ContentAccess8CContentE @ 58 NONAME ; #<VT>#
-	_ZTVN13ContentAccess9CSupplierE @ 59 NONAME ; #<VT>#
-	_ZN13ContentAccess8CContent4NewLER5RFile @ 60 NONAME
-	_ZN13ContentAccess8CContent5NewLCER5RFile @ 61 NONAME
-	_ZN13ContentAccess11CImportFile25ContinueWithNewOutputFileER5RFileRK7TDesC16 @ 62 NONAME
-	_ZN13ContentAccess11CImportFile25ContinueWithNewOutputFileER5RFileRK7TDesC16R14TRequestStatus @ 63 NONAME
-	_ZN13ContentAccess11CImportFile26GetSuggestedOutputFileNameER6TDes16 @ 64 NONAME
-	_ZN13ContentAccess11CImportFile31GetSuggestedOutputFileExtensionER6TDes16 @ 65 NONAME
-	_ZN13ContentAccess13CAgentFactoryD0Ev @ 66 NONAME
-	_ZN13ContentAccess13CAgentFactoryD1Ev @ 67 NONAME
-	_ZN13ContentAccess13CAgentFactoryD2Ev @ 68 NONAME
-	_ZN13ContentAccess14CRightsManager11SetPropertyENS_14TAgentPropertyEi @ 69 NONAME
-	_ZN13ContentAccess14CRightsManager18DeleteRightsObjectERKNS_11CRightsInfoE @ 70 NONAME
-	_ZN13ContentAccess14CRightsManager22DeleteAllRightsObjectsERKNS_15TVirtualPathPtrE @ 71 NONAME
-	_ZN13ContentAccess19CSupplierOutputFile4NewLER11RReadStream @ 72 NONAME
-	_ZN13ContentAccess19CSupplierOutputFile4NewLERK7TDesC16NS_11TOutputTypeERK6TDesC8 @ 73 NONAME
-	_ZN13ContentAccess5CData11SetPropertyENS_14TAgentPropertyEi @ 74 NONAME
-	_ZN13ContentAccess8CContent11SetPropertyENS_14TAgentPropertyEi @ 75 NONAME
-	_ZN13ContentAccess8CContent12OpenContentLENS_7TIntentERK7TDesC16 @ 76 NONAME
-	_ZN13ContentAccess8CContent13OpenContainerERK7TDesC16 @ 77 NONAME
-	_ZN13ContentAccess8CContent13RequestRightsER14TRequestStatus @ 78 NONAME
-	_ZN13ContentAccess8CContent13RequestRightsER14TRequestStatusRK7TDesC16 @ 79 NONAME
-	_ZN13ContentAccess8CContent14CloseContainerEv @ 80 NONAME
-	_ZN13ContentAccess8CContent18NotifyStatusChangeENS_10TEventMaskER14TRequestStatus @ 81 NONAME
-	_ZN13ContentAccess8CContent18NotifyStatusChangeENS_10TEventMaskER14TRequestStatusRK7TDesC16 @ 82 NONAME
-	_ZN13ContentAccess8CContent19CancelRequestRightsER14TRequestStatus @ 83 NONAME
-	_ZN13ContentAccess8CContent19CancelRequestRightsER14TRequestStatusRK7TDesC16 @ 84 NONAME
-	_ZN13ContentAccess8CContent20AgentSpecificCommandEiRK6TDesC8R5TDes8 @ 85 NONAME
-	_ZN13ContentAccess8CContent20AgentSpecificCommandEiRK6TDesC8R5TDes8R14TRequestStatus @ 86 NONAME
-	_ZN13ContentAccess8CContent24CancelNotifyStatusChangeER14TRequestStatus @ 87 NONAME
-	_ZN13ContentAccess8CContent24CancelNotifyStatusChangeER14TRequestStatusRK7TDesC16 @ 88 NONAME
-	_ZN13ContentAccess8CContent4NewLERK7TDesC16NS_17TContentShareModeE @ 89 NONAME
-	_ZN13ContentAccess8CContent5NewLCERK7TDesC16NS_17TContentShareModeE @ 90 NONAME
-	_ZN13ContentAccess8CContent6SearchERNS_19RStreamablePtrArrayINS_15CEmbeddedObjectEEERK6TDesC8i @ 91 NONAME
-	_ZN13ContentAccess8CManager11ListAgentsLER6RArrayINS_6TAgentEE @ 92 NONAME
-	_ZN13ContentAccess8CManager11SetPropertyENS_14TAgentPropertyEi @ 93 NONAME
-	_ZN13ContentAccess8CManager12DisplayInfoLENS_12TDisplayInfoERKNS_15TVirtualPathPtrE @ 94 NONAME
-	_ZN13ContentAccess8CManager18NotifyStatusChangeERK7TDesC16NS_10TEventMaskER14TRequestStatus @ 95 NONAME
-	_ZN13ContentAccess8CManager20AgentSpecificCommandERNS_6TAgentEiRK6TDesC8R5TDes8 @ 96 NONAME
-	_ZN13ContentAccess8CManager20AgentSpecificCommandERNS_6TAgentEiRK6TDesC8R5TDes8R14TRequestStatus @ 97 NONAME
-	_ZN13ContentAccess8CManager22DisplayManagementInfoLERNS_6TAgentE @ 98 NONAME
-	_ZN13ContentAccess8CManager24CancelNotifyStatusChangeERK7TDesC16R14TRequestStatus @ 99 NONAME
-	_ZN13ContentAccess8CManager4NewLEv @ 100 NONAME
-	_ZN13ContentAccess8CManager5NewLCEv @ 101 NONAME
-	_ZN13ContentAccess9CSupplier11ImportFileLERK6TDesC8RKNS_14CMetaDataArrayE @ 102 NONAME
-	_ZN13ContentAccess9CSupplier11ImportFileLERK6TDesC8RKNS_14CMetaDataArrayERK7TDesC16 @ 103 NONAME
-	_ZNK13ContentAccess11CImportFile15GetImportStatusEv @ 104 NONAME
-	_ZNK13ContentAccess14CRightsManager11ListRightsLERNS_19RStreamablePtrArrayINS_11CRightsInfoEEERK7TDesC16 @ 105 NONAME
-	_ZNK13ContentAccess14CRightsManager11ListRightsLERNS_19RStreamablePtrArrayINS_11CRightsInfoEEERNS_15TVirtualPathPtrE @ 106 NONAME
-	_ZNK13ContentAccess14CRightsManager12ListContentLERNS_19RStreamablePtrArrayINS_12CVirtualPathEEERNS_11CRightsInfoE @ 107 NONAME
-	_ZNK13ContentAccess14CRightsManager14GetRightsDataLERKNS_11CRightsInfoE @ 108 NONAME
-	_ZNK13ContentAccess14CRightsManager14ListAllRightsLERNS_19RStreamablePtrArrayINS_11CRightsInfoEEE @ 109 NONAME
-	_ZNK13ContentAccess19CSupplierOutputFile12ExternalizeLER12RWriteStream @ 110 NONAME
-	_ZNK13ContentAccess5CData12GetAttributeEiRi @ 111 NONAME
-	_ZNK13ContentAccess5CData15GetAttributeSetERNS_13RAttributeSetE @ 112 NONAME
-	_ZNK13ContentAccess5CData18GetStringAttributeEiR6TDes16 @ 113 NONAME
-	_ZNK13ContentAccess5CData21GetStringAttributeSetERNS_19RStringAttributeSetE @ 114 NONAME
-	_ZNK13ContentAccess6TAgent4NameEv @ 115 NONAME
-	_ZNK13ContentAccess8CContent12DisplayInfoLENS_12TDisplayInfoE @ 116 NONAME
-	_ZNK13ContentAccess8CContent12DisplayInfoLENS_12TDisplayInfoERK7TDesC16 @ 117 NONAME
-	_ZNK13ContentAccess8CContent12GetAttributeEiRi @ 118 NONAME
-	_ZNK13ContentAccess8CContent12GetAttributeEiRiRK7TDesC16 @ 119 NONAME
-	_ZNK13ContentAccess8CContent15GetAttributeSetERNS_13RAttributeSetE @ 120 NONAME
-	_ZNK13ContentAccess8CContent15GetAttributeSetERNS_13RAttributeSetERK7TDesC16 @ 121 NONAME
-	_ZNK13ContentAccess8CContent18GetStringAttributeEiR6TDes16 @ 122 NONAME
-	_ZNK13ContentAccess8CContent18GetStringAttributeEiR6TDes16RK7TDesC16 @ 123 NONAME
-	_ZNK13ContentAccess8CContent19GetEmbeddedObjectsLERNS_19RStreamablePtrArrayINS_15CEmbeddedObjectEEE @ 124 NONAME
-	_ZNK13ContentAccess8CContent19GetEmbeddedObjectsLERNS_19RStreamablePtrArrayINS_15CEmbeddedObjectEEENS_13TEmbeddedTypeE @ 125 NONAME
-	_ZNK13ContentAccess8CContent21GetStringAttributeSetERNS_19RStringAttributeSetE @ 126 NONAME
-	_ZNK13ContentAccess8CContent21GetStringAttributeSetERNS_19RStringAttributeSetERK7TDesC16 @ 127 NONAME
-	_ZNK13ContentAccess8CContent5AgentEv @ 128 NONAME
-	_ZNK13ContentAccess8CManager10DeleteFileERK7TDesC16 @ 129 NONAME
-	_ZNK13ContentAccess8CManager10RenameFileERK7TDesC16S3_ @ 130 NONAME
-	_ZNK13ContentAccess8CManager12GetAttributeEiRiRKNS_15TVirtualPathPtrE @ 131 NONAME
-	_ZNK13ContentAccess8CManager15GetAttributeSetERNS_13RAttributeSetERKNS_15TVirtualPathPtrE @ 132 NONAME
-	_ZNK13ContentAccess8CManager18GetStringAttributeEiR6TDes16RKNS_15TVirtualPathPtrE @ 133 NONAME
-	_ZNK13ContentAccess8CManager20CreateRightsManagerLERNS_6TAgentE @ 134 NONAME
-	_ZNK13ContentAccess8CManager21GetStringAttributeSetERNS_19RStringAttributeSetERKNS_15TVirtualPathPtrE @ 135 NONAME
-	_ZNK13ContentAccess8CManager5MkDirERK7TDesC16 @ 136 NONAME
-	_ZNK13ContentAccess8CManager5RmDirERK7TDesC16 @ 137 NONAME
-	_ZNK13ContentAccess8CManager6GetDirERK7TDesC16RK8TUidTypejRP4CDir @ 138 NONAME
-	_ZNK13ContentAccess8CManager6GetDirERK7TDesC16jjRP4CDir @ 139 NONAME
-	_ZNK13ContentAccess8CManager6GetDirERK7TDesC16jjRP4CDirS6_ @ 140 NONAME
-	_ZNK13ContentAccess8CManager8CopyFileERK7TDesC16S3_ @ 141 NONAME
-	_ZNK13ContentAccess8CManager8MkDirAllERK7TDesC16 @ 142 NONAME
-	_ZTIN13ContentAccess13CAgentFactoryE @ 143 NONAME ; #<TI>#
-	_ZTIN13ContentAccess14CRightsManagerE @ 144 NONAME ; #<TI>#
-	_ZTIN13ContentAccess8CManagerE @ 145 NONAME ; #<TI>#
-	_ZTVN13ContentAccess13CAgentFactoryE @ 146 NONAME ; #<VT>#
-	_ZTVN13ContentAccess14CRightsManagerE @ 147 NONAME ; #<VT>#
-	_ZTVN13ContentAccess8CManagerE @ 148 NONAME ; #<VT>#
-	_ZNK13ContentAccess9CSupplier25PrepareHTTPRequestHeadersER11RStringPoolR12RHTTPHeaders @ 149 NONAME
-	_ZN13ContentAccess5CData4NewLER5RFileRK7TDesC16NS_7TIntentE @ 150 NONAME
-	_ZN13ContentAccess5CData4NewLERKNS_15TVirtualPathPtrENS_7TIntentENS_17TContentShareModeE @ 151 NONAME
-	_ZN13ContentAccess5CData5NewLCER5RFileRK7TDesC16NS_7TIntentE @ 152 NONAME
-	_ZN13ContentAccess5CData5NewLCERKNS_15TVirtualPathPtrENS_7TIntentENS_17TContentShareModeE @ 153 NONAME
-	_ZN13ContentAccess8CContent13OpenContentLCENS_7TIntentE @ 154 NONAME
-	_ZN13ContentAccess8CContent13OpenContentLCENS_7TIntentERK7TDesC16 @ 155 NONAME
-	_ZNK13ContentAccess8CManager9RenameDirERK7TDesC16S3_ @ 156 NONAME
-	_ZTIN13ContentAccess13CAgentManagerE @ 157 NONAME ; #<TI>#
-	_ZTVN13ContentAccess13CAgentManagerE @ 158 NONAME ; #<VT>#
-	_ZN13ContentAccess13CAgentManager9RenameDirERK7TDesC16S3_ @ 159 NONAME
-	_ZN13ContentAccess11CImportFile6CancelEv @ 160 NONAME
-	_ZN13ContentAccess16CAgentImportFile6CancelEv @ 161 NONAME
-	_ZTIN13ContentAccess16CAgentImportFileE @ 162 NONAME ; #<TI>#
-	_ZTVN13ContentAccess16CAgentImportFileE @ 163 NONAME ; #<VT>#
-	_ZN13ContentAccess5CData4NewLER5RFileRK7TDesC16 @ 164 NONAME
-	_ZN13ContentAccess5CData4NewLERKNS_15TVirtualPathPtrENS_17TContentShareModeE @ 165 NONAME
-	_ZN13ContentAccess5CData5NewLCER5RFileRK7TDesC16 @ 166 NONAME
-	_ZN13ContentAccess5CData5NewLCERKNS_15TVirtualPathPtrENS_17TContentShareModeE @ 167 NONAME
-	_ZN13ContentAccess13CAgentManager8CopyFileER5RFileRK7TDesC16 @ 168 NONAME
-	_ZNK13ContentAccess8CManager8CopyFileER5RFileRK7TDesC16 @ 169 NONAME
-	_ZN13ContentAccess10CAgentData4ReadEiR5TDes8iR14TRequestStatus @ 170 NONAME
-	_ZNK13ContentAccess5CData11Read_UnusedEiR5TDes8iR14TRequestStatus @ 171 NONAME
-	_ZTIN13ContentAccess10CAgentDataE @ 172 NONAME ; #<TI>#
-	_ZTVN13ContentAccess10CAgentDataE @ 173 NONAME ; #<VT>#
-	KCafLoadPostProductionAgents @ 174 NONAME DATA 1
-	_ZNK13ContentAccess5CData10ReadCancelER14TRequestStatus @ 175 NONAME
-	_ZN13ContentAccess10CAgentData10ReadCancelER14TRequestStatus @ 176 NONAME
-	_ZN13ContentAccess13CAgentManager12DisplayInfoLENS_12TDisplayInfoER5RFileRK7TDesC16 @ 177 NONAME
-	_ZN13ContentAccess13CAgentManager12GetAttributeEiRiR5RFileRK7TDesC16 @ 178 NONAME
-	_ZN13ContentAccess13CAgentManager15GetAttributeSetERNS_13RAttributeSetER5RFileRK7TDesC16 @ 179 NONAME
-	_ZN13ContentAccess13CAgentManager18GetStringAttributeEiR6TDes16R5RFileRK7TDesC16 @ 180 NONAME
-	_ZN13ContentAccess13CAgentManager21GetStringAttributeSetERNS_19RStringAttributeSetER5RFileRK7TDesC16 @ 181 NONAME
-	_ZN13ContentAccess14CRightsManager22DeleteAllRightsObjectsER5RFileRK7TDesC16 @ 182 NONAME
-	_ZN13ContentAccess19CAgentRightsManager22DeleteAllRightsObjectsER5RFileRK7TDesC16 @ 183 NONAME
-	_ZN13ContentAccess8CManager12DisplayInfoLENS_12TDisplayInfoER5RFileRK7TDesC16 @ 184 NONAME
-	_ZN13ContentAccess8CManager12GetAttributeEiRiR5RFileRK7TDesC16 @ 185 NONAME
-	_ZN13ContentAccess8CManager15GetAttributeSetERNS_13RAttributeSetER5RFileRK7TDesC16 @ 186 NONAME
-	_ZN13ContentAccess8CManager18GetStringAttributeEiR6TDes16R5RFileRK7TDesC16 @ 187 NONAME
-	_ZN13ContentAccess8CManager21GetStringAttributeSetERNS_19RStringAttributeSetER5RFileRK7TDesC16 @ 188 NONAME
-	_ZNK13ContentAccess14CRightsManager11ListRightsLERNS_19RStreamablePtrArrayINS_11CRightsInfoEEER5RFileRK7TDesC16 @ 189 NONAME
-	_ZNK13ContentAccess19CAgentRightsManager11ListRightsLERNS_19RStreamablePtrArrayINS_11CRightsInfoEEER5RFileRK7TDesC16 @ 190 NONAME
-	_ZTIN13ContentAccess19CAgentRightsManagerE @ 191 NONAME
-	_ZTVN13ContentAccess19CAgentRightsManagerE @ 192 NONAME
-	_ZN13ContentAccess11CImportFile16ContentMimeTypeLER5TDes8 @ 193 NONAME
-	_ZN13ContentAccess16CAgentImportFile16ContentMimeTypeLER5TDes8 @ 194 NONAME
-	_ZN13ContentAccess10CAgentData11DataSize64LERx @ 195 NONAME
-	_ZN13ContentAccess10CAgentData6Read64ExR5TDes8iR14TRequestStatus @ 196 NONAME
-	_ZN13ContentAccess10CAgentData6Seek64E5TSeekRx @ 197 NONAME
-	_ZN13ContentAccess5CData11DataSize64LERx @ 198 NONAME
-	_ZNK13ContentAccess5CData4ReadExR5TDes8iR14TRequestStatus @ 199 NONAME
-	_ZNK13ContentAccess5CData6Seek64E5TSeekRx @ 200 NONAME
-	_ZN13ContentAccess10CAgentData4ReadERK6TDesC8R5TDes8 @ 201 NONAME
-	_ZN13ContentAccess10CAgentData4ReadERK6TDesC8R5TDes8R14TRequestStatus @ 202 NONAME
-	_ZN13ContentAccess13CAgentFactory19CreateDataConsumerLERK6TDesC8 @ 203 NONAME
-	_ZN13ContentAccess13CAgentFactory21CreateContentBrowserLERK6TDesC8 @ 204 NONAME
-	_ZN13ContentAccess13CAgentManager12GetAttributeERK6TDesC8iRi @ 205 NONAME
-	_ZN13ContentAccess13CAgentManager15GetAttributeSetERK6TDesC8RNS_13RAttributeSetE @ 206 NONAME
-	_ZN13ContentAccess13CAgentManager18GetStringAttributeERK6TDesC8iR6TDes16 @ 207 NONAME
-	_ZN13ContentAccess13CAgentManager21GetStringAttributeSetERK6TDesC8RNS_19RStringAttributeSetE @ 208 NONAME
-	_ZN13ContentAccess14CAgentResolver12DoRecognizeLERK6TDesC8R5TDes8S5_ @ 209 NONAME
-	_ZN13ContentAccess5CData4NewLERK6TDesC8 @ 210 NONAME
-	_ZN13ContentAccess5CData4NewLERK6TDesC8NS_7TIntentE @ 211 NONAME
-	_ZN13ContentAccess5CData5NewLCERK6TDesC8 @ 212 NONAME
-	_ZN13ContentAccess5CData5NewLCERK6TDesC8NS_7TIntentE @ 213 NONAME
-	_ZN13ContentAccess8CContent4NewLERK6TDesC8 @ 214 NONAME
-	_ZN13ContentAccess8CContent5NewLCERK6TDesC8 @ 215 NONAME
-	_ZNK13ContentAccess13CAgentManager13IsRecognizedLERK6TDesC8 @ 216 NONAME
-	_ZNK13ContentAccess13CAgentManager17RecognizeContentLERK6TDesC8R5TDes8S5_ @ 217 NONAME
-	_ZNK13ContentAccess5CData4ReadERK6TDesC8R5TDes8 @ 218 NONAME
-	_ZNK13ContentAccess5CData4ReadERK6TDesC8R5TDes8R14TRequestStatus @ 219 NONAME
-	_ZNK13ContentAccess8CManager12GetAttributeERK6TDesC8iRi @ 220 NONAME
-	_ZNK13ContentAccess8CManager15GetAttributeSetERK6TDesC8RNS_13RAttributeSetE @ 221 NONAME
-	_ZNK13ContentAccess8CManager18GetStringAttributeERK6TDesC8iR6TDes16 @ 222 NONAME
-	_ZNK13ContentAccess8CManager21GetStringAttributeSetERK6TDesC8RNS_19RStringAttributeSetE @ 223 NONAME
-
--- a/contentmgmt/contentaccessfwfordrm/EABI/cafutils_v2U.DEF	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,128 +0,0 @@
-EXPORTS
-	_ZN13ContentAccess7CBitset12InternalizeLER11RReadStream @ 1 NONAME
-	_ZN13ContentAccess7CBitset3SetEi @ 2 NONAME
-	_ZN13ContentAccess7CBitset4NewLERKS0_ @ 3 NONAME
-	_ZN13ContentAccess7CBitset4NewLEi @ 4 NONAME
-	_ZN13ContentAccess7CBitset5NewLCERKS0_ @ 5 NONAME
-	_ZN13ContentAccess7CBitset5NewLCEi @ 6 NONAME
-	_ZN13ContentAccess7CBitset5ResetEv @ 7 NONAME
-	_ZN13ContentAccess7CBitset5UnsetEi @ 8 NONAME
-	_ZN13ContentAccess7CBitset6InvertEv @ 9 NONAME
-	_ZN13ContentAccess7CBitset6SetAllEv @ 10 NONAME
-	_ZN13ContentAccess7CBitset8SetListLEiz @ 11 NONAME
-	_ZN13ContentAccess7CBitsetaSERKS0_ @ 12 NONAME
-	_ZNK13ContentAccess7CBitset12ExternalizeLER12RWriteStream @ 13 NONAME
-	_ZNK13ContentAccess7CBitset5IsSetEi @ 14 NONAME
-	_ZNK13ContentAccess7CBitset7MaxBitsEv @ 15 NONAME
-	_ZNK13ContentAccess7CBitset9IsSetListEiz @ 16 NONAME
-	_ZNK13ContentAccess7CBitseteqERKS0_ @ 17 NONAME
-	_ZN13ContentAccess14CCafMimeHeader12InternalizeLER11RReadStream @ 18 NONAME
-	_ZN13ContentAccess14CCafMimeHeader19AddNonStandardMimeLERK6TDesC8S3_ @ 19 NONAME
-	_ZN13ContentAccess14CCafMimeHeader20SetStandardMimeDataLERKNS_11TMimeFieldsERK6TDesC8 @ 20 NONAME
-	_ZN13ContentAccess14CCafMimeHeader4NewLERK6TDesC8 @ 21 NONAME
-	_ZN13ContentAccess14CCafMimeHeaderD0Ev @ 22 NONAME
-	_ZN13ContentAccess14CCafMimeHeaderD1Ev @ 23 NONAME
-	_ZN13ContentAccess14CCafMimeHeaderD2Ev @ 24 NONAME
-	_ZNK13ContentAccess14CCafMimeHeader12ExternalizeLER12RWriteStream @ 25 NONAME
-	_ZNK13ContentAccess14CCafMimeHeader16StandardMimeDataERKNS_11TMimeFieldsE @ 26 NONAME
-	_ZNK13ContentAccess14CCafMimeHeader19NonStandardMimeDataEi @ 27 NONAME
-	_ZNK13ContentAccess14CCafMimeHeader20NonStandardMimeCountEv @ 28 NONAME
-	_ZNK13ContentAccess14CCafMimeHeader20NonStandardMimeFieldEi @ 29 NONAME
-	_ZTIN13ContentAccess14CCafMimeHeaderE @ 30 NONAME ; #<TI>#
-	_ZTVN13ContentAccess14CCafMimeHeaderE @ 31 NONAME ; #<VT>#
-	_ZTIN13ContentAccess7CBitsetE @ 32 NONAME ; #<TI>#
-	_ZTVN13ContentAccess7CBitsetE @ 33 NONAME ; #<VT>#
-	_ZN13ContentAccess11CRightsInfo4NewLER11RReadStream @ 34 NONAME
-	_ZN13ContentAccess11CRightsInfo4NewLERK7TDesC16S3_iNS_13TRightsStatusE @ 35 NONAME
-	_ZN13ContentAccess12CVirtualPath22GetCombinedUriUniqueIdEv @ 36 NONAME
-	_ZN13ContentAccess12CVirtualPath4NewLER11RReadStream @ 37 NONAME
-	_ZN13ContentAccess12CVirtualPath4NewLERK7TDesC16 @ 38 NONAME
-	_ZN13ContentAccess12CVirtualPath4NewLERK7TDesC16S3_ @ 39 NONAME
-	_ZN13ContentAccess12CVirtualPath4NewLERKNS_15TVirtualPathPtrE @ 40 NONAME
-	_ZN13ContentAccess13RAttributeSet12InternalizeLER11RReadStream @ 41 NONAME
-	_ZN13ContentAccess13RAttributeSet4AddLEi @ 42 NONAME
-	_ZN13ContentAccess13RAttributeSet5CloseEv @ 43 NONAME
-	_ZN13ContentAccess13RAttributeSet8SetValueEiii @ 44 NONAME
-	_ZN13ContentAccess13RAttributeSetC1Ev @ 45 NONAME
-	_ZN13ContentAccess13RAttributeSetC2Ev @ 46 NONAME
-	_ZN13ContentAccess14CDirStreamable4AddLERK6TEntry @ 47 NONAME
-	_ZN13ContentAccess14CDirStreamable4NewLE11RReadStream @ 48 NONAME
-	_ZN13ContentAccess14CDirStreamable4NewLER4CDir @ 49 NONAME
-	_ZN13ContentAccess14CDirStreamable4NewLEv @ 50 NONAME
-	_ZN13ContentAccess14CDirStreamable4SortEj @ 51 NONAME
-	_ZN13ContentAccess14CMetaDataArray4AddLERK6TDesC8S3_ @ 52 NONAME
-	_ZN13ContentAccess14CMetaDataArray4AddLERK7TDesC16S3_ @ 53 NONAME
-	_ZN13ContentAccess14CMetaDataArray4NewLER11RReadStream @ 54 NONAME
-	_ZN13ContentAccess14CMetaDataArray4NewLEv @ 55 NONAME
-	_ZN13ContentAccess14CMetaDataArray5NewLCEv @ 56 NONAME
-	_ZN13ContentAccess15CEmbeddedObject4NewLER11RReadStream @ 57 NONAME
-	_ZN13ContentAccess15CEmbeddedObject4NewLERK7TDesC16RK6TDesC8NS_13TEmbeddedTypeE @ 58 NONAME
-	_ZN13ContentAccess15CEmbeddedObject4NewLERK7TDesC16S3_RK6TDesC8NS_13TEmbeddedTypeE @ 59 NONAME
-	_ZN13ContentAccess15TVirtualPathPtrC1ERK7TDesC16 @ 60 NONAME
-	_ZN13ContentAccess15TVirtualPathPtrC1ERK7TDesC16S3_ @ 61 NONAME
-	_ZN13ContentAccess15TVirtualPathPtrC1ERKS0_ @ 62 NONAME
-	_ZN13ContentAccess15TVirtualPathPtrC2ERK7TDesC16 @ 63 NONAME
-	_ZN13ContentAccess15TVirtualPathPtrC2ERK7TDesC16S3_ @ 64 NONAME
-	_ZN13ContentAccess15TVirtualPathPtrC2ERKS0_ @ 65 NONAME
-	_ZN13ContentAccess15TVirtualPathPtraSERK7TDesC16 @ 66 NONAME
-	_ZN13ContentAccess15TVirtualPathPtraSERKS0_ @ 67 NONAME
-	_ZN13ContentAccess19RStringAttributeSet12InternalizeLER11RReadStream @ 68 NONAME
-	_ZN13ContentAccess19RStringAttributeSet4AddLEi @ 69 NONAME
-	_ZN13ContentAccess19RStringAttributeSet5CloseEv @ 70 NONAME
-	_ZN13ContentAccess19RStringAttributeSet8SetValueEiRK7TDesC16i @ 71 NONAME
-	_ZN13ContentAccess19RStringAttributeSetC1Ev @ 72 NONAME
-	_ZN13ContentAccess19RStringAttributeSetC2Ev @ 73 NONAME
-	_ZNK13ContentAccess11CRightsInfo10RightsTypeEv @ 74 NONAME
-	_ZNK13ContentAccess11CRightsInfo11DescriptionEv @ 75 NONAME
-	_ZNK13ContentAccess11CRightsInfo12ExternalizeLER12RWriteStream @ 76 NONAME
-	_ZNK13ContentAccess11CRightsInfo12RightsStatusEv @ 77 NONAME
-	_ZNK13ContentAccess11CRightsInfo8UniqueIdEv @ 78 NONAME
-	_ZNK13ContentAccess12CVirtualPath12ExternalizeLER12RWriteStream @ 79 NONAME
-	_ZNK13ContentAccess12CVirtualPath3URIEv @ 80 NONAME
-	_ZNK13ContentAccess12CVirtualPath8UniqueIdEv @ 81 NONAME
-	_ZNK13ContentAccess13RAttributeSet12ExternalizeLER12RWriteStream @ 82 NONAME
-	_ZNK13ContentAccess13RAttributeSet5CountEv @ 83 NONAME
-	_ZNK13ContentAccess13RAttributeSet8GetValueEiRi @ 84 NONAME
-	_ZNK13ContentAccess13RAttributeSetixEi @ 85 NONAME
-	_ZNK13ContentAccess14CDirStreamable12ExternalizeLER12RWriteStream @ 86 NONAME
-	_ZNK13ContentAccess14CDirStreamable5CountEv @ 87 NONAME
-	_ZNK13ContentAccess14CDirStreamableixEi @ 88 NONAME
-	_ZNK13ContentAccess14CMetaDataArray12ExternalizeLER12RWriteStream @ 89 NONAME
-	_ZNK13ContentAccess14CMetaDataArray5CountEv @ 90 NONAME
-	_ZNK13ContentAccess14CMetaDataArray7SearchLERK6TDesC8i @ 91 NONAME
-	_ZNK13ContentAccess14CMetaDataArray7SearchLERK7TDesC16i @ 92 NONAME
-	_ZNK13ContentAccess14CMetaDataArrayixEi @ 93 NONAME
-	_ZNK13ContentAccess15CEmbeddedObject12ExternalizeLER12RWriteStream @ 94 NONAME
-	_ZNK13ContentAccess15CEmbeddedObject4NameEv @ 95 NONAME
-	_ZNK13ContentAccess15CEmbeddedObject4TypeEv @ 96 NONAME
-	_ZNK13ContentAccess15CEmbeddedObject8MimeTypeEv @ 97 NONAME
-	_ZNK13ContentAccess15CEmbeddedObject8UniqueIdEv @ 98 NONAME
-	_ZNK13ContentAccess15TVirtualPathPtr3URIEv @ 99 NONAME
-	_ZNK13ContentAccess15TVirtualPathPtr8UniqueIdEv @ 100 NONAME
-	_ZNK13ContentAccess19RStringAttributeSet12ExternalizeLER12RWriteStream @ 101 NONAME
-	_ZNK13ContentAccess19RStringAttributeSet14GetValueLengthEi @ 102 NONAME
-	_ZNK13ContentAccess19RStringAttributeSet5CountEv @ 103 NONAME
-	_ZNK13ContentAccess19RStringAttributeSet8GetValueEiR6TDes16 @ 104 NONAME
-	_ZNK13ContentAccess19RStringAttributeSetixEi @ 105 NONAME
-	_ZNK13ContentAccess9CMetaData4DataEv @ 106 NONAME
-	_ZNK13ContentAccess9CMetaData5Data8Ev @ 107 NONAME
-	_ZNK13ContentAccess9CMetaData5FieldEv @ 108 NONAME
-	_ZNK13ContentAccess9CMetaData6Field8Ev @ 109 NONAME
-	_ZTIN13ContentAccess11CRightsInfoE @ 110 NONAME ; #<TI>#
-	_ZTIN13ContentAccess12CVirtualPathE @ 111 NONAME ; #<TI>#
-	_ZTIN13ContentAccess14CDirStreamableE @ 112 NONAME ; #<TI>#
-	_ZTIN13ContentAccess14CMetaDataArrayE @ 113 NONAME ; #<TI>#
-	_ZTIN13ContentAccess15CEmbeddedObjectE @ 114 NONAME ; #<TI>#
-	_ZTIN13ContentAccess16CStringAttributeE @ 115 NONAME ; #<TI>#
-	_ZTIN13ContentAccess9CMetaDataE @ 116 NONAME ; #<TI>#
-	_ZTVN13ContentAccess11CRightsInfoE @ 117 NONAME ; #<VT>#
-	_ZTVN13ContentAccess12CVirtualPathE @ 118 NONAME ; #<VT>#
-	_ZTVN13ContentAccess14CDirStreamableE @ 119 NONAME ; #<VT>#
-	_ZTVN13ContentAccess14CMetaDataArrayE @ 120 NONAME ; #<VT>#
-	_ZTVN13ContentAccess15CEmbeddedObjectE @ 121 NONAME ; #<VT>#
-	_ZTVN13ContentAccess16CStringAttributeE @ 122 NONAME ; #<VT>#
-	_ZTVN13ContentAccess9CMetaDataE @ 123 NONAME ; #<VT>#
-	_ZN13ContentAccess10CCAFHelper4NewLEv @ 124 NONAME
-	_ZN13ContentAccess10CCAFHelper5NewLCEv @ 125 NONAME
-	_ZNK13ContentAccess10CCAFHelperclEv @ 126 NONAME
-
--- a/contentmgmt/contentaccessfwfordrm/group/CafUtils.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/group/CafUtils.mmp	Wed Apr 14 17:48:59 2010 +0300
@@ -28,11 +28,7 @@
 UID			0x101FD9B8
 VENDORID	0x70000001
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-deffile		cafutils_v2.def
-#else
 deffile		cafutils.def
-#endif
 UNPAGED
 
 SOURCEPATH	../source/cafutils
@@ -48,9 +44,6 @@
 SOURCE		Virtualpathptr.cpp
 SOURCE		dirstreamable.cpp
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-SOURCE		cafhelper.cpp
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 
 #ifndef REMOVE_CAF1
 // deprecated stuff from CAF 1.0
--- a/contentmgmt/contentaccessfwfordrm/group/bld.inf	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/group/bld.inf	Wed Apr 14 17:48:59 2010 +0300
@@ -71,10 +71,6 @@
 ../inc/StreamablePtrArray.inl	SYMBIAN_OS_LAYER_PUBLIC_EXPORT_PATH(caf/streamableptrarray.inl)
 ../inc/dirstreamable.h			SYMBIAN_OS_LAYER_PUBLIC_EXPORT_PATH(caf/dirstreamable.h)
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-../inc/cafhelper.h			SYMBIAN_OS_LAYER_PLATFORM_EXPORT_PATH(caf/cafhelper.h)
-../inc/cafhelperinterface.h		SYMBIAN_OS_LAYER_PLATFORM_EXPORT_PATH(caf/cafhelperinterface.h)
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 
 // ROMKIT includes
 ../inc/caf.iby /epoc32/rom/include/caf.iby
@@ -153,13 +149,6 @@
 ../../referencedrmagent/tcaf/testdata/Audio.content				z:/tcaf/testdata/audio.content
 ../../referencedrmagent/tcaf/testdata/Audiomulti.content			z:/tcaf/testdata/audiomulti.content
 ../../referencedrmagent/tcaf/testdata/notes1.txt				z:/tcaf/testdata/notes1.txt
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-../../referencedrmagent/tcaf/scripts/tcafhelper.script 				z:/tcaf/tcafhelper.script
-../../referencedrmagent/tcaf/scripts/tcafhelper.ini 				z:/tcaf/tcafhelper.ini
-../../referencedrmagent/tcaf/scripts/tcafwmdrmsupport.script 			z:/tcaf/tcafwmdrmsupport.script
-../../referencedrmagent/tcaf/scripts/tcafwmdrmsupport.ini 			z:/tcaf/tcafwmdrmsupport.ini
-../../referencedrmagent/tcaf/testdata/dummywm.asf				z:/tcaf/testdata/dummywm.asf
-#endif  //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 // ROM test iby
 ../inc/caftest.iby 						/epoc32/rom/include/caftest.iby
 
--- a/contentmgmt/contentaccessfwfordrm/group/caf.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/group/caf.mmp	Wed Apr 14 17:48:59 2010 +0300
@@ -31,11 +31,7 @@
 UNPAGED
 
 #ifdef SYMBIAN_ENABLE_64_BIT_FILE_SERVER_API
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-deffile		caf_v3.def
-#else
 deffile		caf_v2.def
-#endif
 #else
 deffile		caf.def
 #endif
--- a/contentmgmt/contentaccessfwfordrm/inc/agentfactory.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/inc/agentfactory.h	Wed Apr 14 17:48:59 2010 +0300
@@ -173,26 +173,6 @@
 		*/
 		virtual CAgentRightsManager* CreateRightsManagerL() = 0;
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT		
-		/**
-		Factory function creates a CAgentData object from header data of WMDRM file or stream content
-		for reading/decrypting WMDRM data packets.
-		 
-		@param aHeaderData	Header data of WMDRM file or stream content.
-		@return				A pointer to CAgentData object.
-		*/
-		virtual CAgentData* CreateDataConsumerL(const TDesC8& aHeaderData);
-		
-		/**
-		Factory function creates a CAgentContent object from header data of WMDRM file or stream content
-		for browsing WMDRM content.
-		 
-		@param aHeaderData	Header data of WMDRM file or stream content.
-		@return 			A pointer to CAgentContent object.
-		*/
-		virtual CAgentContent* CreateContentBrowserL(const TDesC8& aHeaderData);
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
 	private:
 		// ECOM session key. This is set by 
 		// REComSession::CreateImplementationL() during construction
--- a/contentmgmt/contentaccessfwfordrm/inc/agentinterface.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/inc/agentinterface.h	Wed Apr 14 17:48:59 2010 +0300
@@ -377,37 +377,6 @@
 		IMPORT_C virtual TInt Read64(TInt64 aPos, TDes8& aDes, TInt aLength, TRequestStatus& aStatus);
 #endif //SYMBIAN_ENABLE_64_BIT_FILE_SERVER_API
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-		/**
-		Decrypts the encrypted input data packet.Default implementation of this method returns KErrCANotSupported.
-		
-		@param aEncryptedInputDataPacket	Buffer descriptor containing the encrypted data packet supplied by client application. 
-		@param aDecryptedOutputDataPacket	Buffer descriptor supplied by the client application into which the decrypted data is written.
-											The length of this descriptor must be equal to or greater than the input packet.
-		@return								KErrNone if successful or KErrInsuffcientDataPacketLength, if a part of input data packet
-											is provided for decryption.Otherwise one of the CAF error codes defined in \c caferr.h  or 
-		 									one of the other system-wide error.
-		@capability 						DRM Access to DRM protected content is not permitted for processes without DRM capability.
-											Access to unprotected content is unrestricted.
-		*/
-		IMPORT_C virtual TInt Read(const TDesC8& aEncryptedInputDataPacket, TDes8& aDecryptedOutputDataPacket);
-		
-		
-		/**
-		Decrypts the encrypted input data packet asynchronously.Default implementation of this method returns KErrCANotSupported.
-	
-		@param aEncryptedInputDataPacket	Buffer descriptor containing the encrypted data packet supplied by client application. 
-		@param aDecryptedOutputDataPacket	Buffer descriptor supplied by the client application into which the decrypted data is written.
-											The length of this descriptor must be equal to or greater than the input packet.
-		@param aStatus						Asynchronous request status. On completion this will contain one of the following error codes:
-											KErrNone if the data packet was successfully decrypted or KErrInsuffcientDataPacketLength, if a part of input data packet
-											is provided for decryption.Otherwise one of the CAF error codes defined in \c caferr.h  or 
-		 									one of the other system-wide error codes.
-		@capability 						DRM Access to DRM protected content is not permitted for processes without DRM capability.
-										    Access to unprotected content is unrestricted. 
-		*/
-		IMPORT_C virtual void Read(const TDesC8& aEncryptedInputDataPacket, TDes8& aDecryptedOutputDataPacket, TRequestStatus& aStatus);
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 		};
 
 	/**	Defines the agent interface allowing clients to browse the objects 
@@ -1455,95 +1424,6 @@
 		*/
 		IMPORT_C virtual TInt CopyFile(RFile& aSource, const TDesC& aDestination);
 		
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-		/** 
-		Identifies whether or not the WMDRM content is handled by this agent using the header
-		data of WMDRM file or stream content.
-		
-		The agent should leave only if a temporary or permanent condition prevents it from knowing
-		whether it can detect the content's type.
-
-		@param aHeaderData	Header data of WMDRM file or stream content.
-	    @return ETrue 		If this agent recognises the given content. 
-		*/
-		IMPORT_C virtual TBool IsRecognizedL(const TDesC8& aHeaderData) const;
-		
-		/** 
-		 Determines whether or not the WMDRM content is recognized by this agent. 
-		 If it is recognized, the agent will populate the file and content mime 
-		 type. 
-		 
-		 The agent should leave only if a temporary or permanent condition prevents it from 
-		 detecting content's type.
-
-		 @param aHeaderData			Header data of WMDRM content.
-		 @param aFileMimeType 		Used to return the mime type of the content to the caller.
-		 @param aContentMimeType	Used to return the mime type of the content embedded within the file to the caller. This field should be zero length if there is no embedded content.
-	     @return					Whether or not the content was recognized.
- 		 @return ETrue 				If the content is handled by this agent. The aFileMimeType and aContentMimeType were updated.
-		 @return EFalse 			If the content was not recognized by this agent.
-		 */
-		IMPORT_C virtual TBool RecognizeContentL(const TDesC8& aHeaderData, TDes8& aFileMimeType, TDes8& aContentMimeType) const;
-		
-		/**  Get an attribute from WMDRM content.
-	
-		@param aHeaderData	Header data of WMDRM content.
-		@param aAttribute	The attribute to retrieve from ContentAccess::TAttribute.
-		@param aValue		Used to return the value of the attribute.
-		
-		@return				KErrNone if the attribute value was updated.
-		@return				KErrCANotSupported if the requested attribute is not supported for this content.
-		@return				Otherwise one of the other CAF error codes defined in \c caferr.h  or one of the 
-							other system-wide error codes for any other errors.
-		@capability DRM 	Access to DRM protected content is not permitted for processes without DRM capability. Access to unprotected content is unrestricted. 
-		*/
-		IMPORT_C virtual TInt GetAttribute(const TDesC8& aHeaderData, TInt aAttribute, TInt& aValue);
-		
-		/** Get a set of attributes from WMDRM content.
-
-		@param aHeaderData		Header data of WMDRM content.
-		@param aAttributeSet	The set of attributes to query and update.
-		
-		@return 				KErrNone if the attribute set was updated successfully.
-		@return 				Otherwise one of the other CAF error codes defined in \c caferr.h  or one of the 
-								other system-wide error codes for any other errors.
-		@capability DRM 		Access to DRM protected content is not permitted for processes without DRM capability. Access to unprotected content is unrestricted. 
-		*/
-		IMPORT_C virtual TInt GetAttributeSet(const TDesC8& aHeaderData, RAttributeSet& aAttributeSet);
-		
-		
-		/**  Get text string attributes or meta-data from WMDRM content.
-
-		@param aHeaderData	Header data of WMDRM content.
-		@param aAttribute	The attribute to retrieve from ContentAccess::TStringAttribute.
-		@param aValue		Used to return the value of the attribute.
-		
-		@return				KErrNone if the attribute was retrieved successfully.
-		@return				KErrNotFound if the content object does not exist.
-		@return				KErrCANotSupported if the requested attribute does not apply to this content object.
-		@return				KErrOverflow if the buffer was not large enough to return the result.
-		@return				Otherwise one of the other CAF error codes defined in \c caferr.h  or one of the 
-							other system-wide error codes for any other errors.
-		@capability DRM 	Access to DRM protected content is not permitted for processes without DRM capability. Access to unprotected content is unrestricted. 
-		*/
-		IMPORT_C virtual TInt GetStringAttribute(const TDesC8& aHeaderData, TInt aAttribute, TDes& aValue);
-		
-		/** Used to obtain a set of string attributes from WMDRM content.
-
-		@param aStringAttributeSet	The set of attributes to query and update.
-		@param aHeaderData			Header data of WMDRM content.
-	
-		@return 					KErrNone if the attribute set was updated successfully.
-		@return 					KErrNotFound if the object with the given virtual path was not found.
-		@return 					Otherwise one of the other CAF error codes defined in \c caferr.h  or one of the 
-									other system-wide error codes for any other errors.
-		@capability DRM 			Access to DRM protected content is not permitted for processes without DRM capability. Access to unprotected content is unrestricted. 
-		*/
-		IMPORT_C virtual TInt GetStringAttributeSet(const TDesC8& aHeaderData, RStringAttributeSet& aStringAttributeSet);
-
-
-#endif //#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-		
 		};
 
 		
--- a/contentmgmt/contentaccessfwfordrm/inc/attribute.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/inc/attribute.h	Wed Apr 14 17:48:59 2010 +0300
@@ -86,20 +86,6 @@
 		 @released
 		 */
 		static CAttribute* NewLC(TUid aAgentUid, const TDesC& aURI, TContentShareMode aShareMode=EContentShareReadOnly);
-
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT		
-		/**
-		 Constructs a new attribute given an agent and WMDRM header data.
-		 
-		 @param aAgentUid	The agent Uid
-		 @param aHeaderData	Header data of WMDRM content
-		 @return			The new CAttribute.
-		 
-		 @internalComponent
-		 @released		 
-		 */
-		static CAttribute* NewLC(TUid aAgentUid, const TDesC8& aHeaderData);
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 		
 		virtual ~CAttribute();
 
@@ -147,10 +133,6 @@
 		void ConstructL(TUid aAgentUid, RFile& aFile);
 		void ConstructL(TUid aAgentUid, const TDesC& aURI, TContentShareMode aShareMode=EContentShareReadOnly);
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-		void ConstructL(TUid aAgentUid, const TDesC8& aHeaderData);
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-	
 		CAttribute();
 				
 	private:
--- a/contentmgmt/contentaccessfwfordrm/inc/caferr.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/inc/caferr.h	Wed Apr 14 17:48:59 2010 +0300
@@ -137,18 +137,4 @@
 */ 
 const TInt KErrCACorruptContent = -17459;
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-/**
-
-This error is returned when only a part of encrypted input packet provided for decryption.
-*/
-const TInt KErrInsufficientDataPacketLength = -17460;
-
-/**
-
-This error is returned when only a part of encrypted input packet provided for decryption.
-*/
-const TInt KErrMissingWmdrmHeaderData = -17461;
-
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 #endif // __CAFERR_H__
--- a/contentmgmt/contentaccessfwfordrm/inc/cafhelper.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,96 +0,0 @@
-/*
-* Copyright (c) 2003-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-/** 
-@file 
-
-@publishedPartner
-@prototype
-*/
-
-#ifndef __CAFHELPER_H__
-#define __CAFHELPER_H__
-
-#include <e32base.h>
-#include <f32file.h>
-
-namespace ContentAccess
-	{
-	//forward declaration
-	class MCAFHelperInterface;
-	
-	/**
-	 CAF client application can use this class to load cafhelper.dll and get access to entry function pointer
-	 of the dll,using which the appropriate error handling APIs can be called.
-
-	 @publishedPartner
-	 @prototype
-	 */
-	 	
-	NONSHARABLE_CLASS(CCAFHelper) : public CBase
-		{
-	public:
-		
-		/** 
-		 Constructs a new CCAFHelper object.
-		 
-		 @return 		A pointer to an instance of CCAFHelper class.
-		 @capability	All -TCB. 
-		 */
-		 
-		IMPORT_C static CCAFHelper* NewL();
-		
-		/** 
-		 Constructs a new CCAFHelper object and puts a pointer to the new object 
-	 	 onto the cleanup stack..
-		 
-		 @return		A pointer to an instance of CCAFHelper class.
-		 @capability	All -TCB. 
-		 */
-		 
-		IMPORT_C static CCAFHelper* NewLC();
-		
-		/**
-		Accessor method which returns an entry point function pointer of cafhelper.dll,
-		using which the error handling APIs can be accessed.
-		
-		@return		Reference to an instance of MCafHelperInterface class.
-		@capability	All -TCB. 
-		*/
-		
-		IMPORT_C MCAFHelperInterface& operator()() const;
-		
-		// virtual destructor.		
-		virtual ~CCAFHelper(); 
-		
-			
-		private:
-		
-		CCAFHelper();
-		void ConstructL();
-		
-		private:
-		
-		RLibrary iLibrary;
-		MCAFHelperInterface* iHelper;
-		};
-
-	} // namespace ContentAccess
-	
-#endif // __CAFHELPER_H__
-
--- a/contentmgmt/contentaccessfwfordrm/inc/cafhelperinterface.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,91 +0,0 @@
-/*
-* Copyright (c) 2003-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-/** 
-@file 
-
-@publishedPartner
-@prototype
-*/
-
-#ifndef __CAFHELPERINTERFACE_H__
-#define __CAFHELPERINTERFACE_H__
-
-#include <e32base.h>
-#include <f32file.h>
-
-namespace ContentAccess
-	{
-	
-	// UID for CAF Helper Dll.
-	const TUid KCAFHelperInterfaceUID = {0x20024480};
-	
-	_LIT(KCAFHelperLibraryName, "cafhelper.dll");
-	
-	/**
-	 This interface defined by UID KCAFHelperInterfaceUID provides APIs to handle 
-	 CAF error messages when CAF client application is not interested /unable to handle 
-	 CAF errors.UI/device manufacturer will provide error handling functionality by 
-	 implementing this interface class as a dll which is enforced to be named as cafhelper.dll.
-
-	 @publishedPartner
-	 @prototype
-	 */
-	 	
-	class MCAFHelperInterface
-		{
-	public:
-		
-		/**  
-		 This method handles the CAF error received for a given file.
-		 @param aError		One of the CAF errors. 
-		 @param aFileName 	File name or file URI for which the error is received
-		 @return 			KErrNone if the error is handled successfully.Otherwise one of the other system-wide
-							errors.
-		 @capability DRM 	Access to DRM protected content is not permitted for processes without DRM capability. Access to unprotected content is unrestricted 
-		*/
-		virtual TInt HandleCAFErrorL(TInt aError, const TDesC& aFileName) = 0;
-		
-		/**  
-		 This method handles the CAF error received for a given file .
-		 @param aError		One of the CAF errors. 
-		 @param aFileHandle File handle for which the error is received
-		 @return 			KErrNone if the error is handled successfully.Otherwise one of the other system-wide
-							errors.
-		 @capability DRM 	Access to DRM protected content is not permitted for processes without DRM capability. Access to unprotected content is unrestricted 
-		*/	
-		virtual TInt HandleCAFErrorL(TInt aError, RFile& aFileHandle) = 0;
-		
-		/**  
-		 This method handles the CAF error received for WMDRM content .
-		 @param aError		One of the CAF errors. 
-		 @param aHeaderData The header data of the content for which the error is received
-		 @return 			KErrNone if the error is handled successfully.Otherwise one of the other system-wide
-							errors.
-		 @capability DRM 	Access to DRM protected content is not permitted for processes without DRM capability. Access to unprotected content is unrestricted 
-		*/
-		virtual TInt HandleCAFErrorL(TInt aError, const TDesC8& aHeaderData) = 0;
-		
-		virtual void Release() = 0;
-		
-		};
-		
-	} // namespace ContentAccess
-	
-#endif // __CAFHELPERINTERFACE_H__
-
--- a/contentmgmt/contentaccessfwfordrm/inc/caftest.iby	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/inc/caftest.iby	Wed Apr 14 17:48:59 2010 +0300
@@ -72,11 +72,4 @@
 data = DATAZ_\tcaf\testdata\audiomulti.content	tcaf\testdata\audiomulti.content
 data = DATAZ_\tcaf\testdata\notes1.txt			tcaf\testdata\notes1.txt
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-data = DATAZ_\tcaf\testdata\dummywm.asf			tcaf\testdata\dummywm.asf
-data = DATAZ_\tcaf\tcafwmdrmsupport.script		tcaf\tcafwmdrmsupport.script
-data = DATAZ_\tcaf\tcafwmdrmsupport.ini			tcaf\tcafwmdrmsupport.ini
-data = DATAZ_\tcaf\tcafhelper.script			tcaf\tcafhelper.script
-data = DATAZ_\tcaf\tcafhelper.ini			tcaf\tcafhelper.ini
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 #endif
--- a/contentmgmt/contentaccessfwfordrm/inc/content.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/inc/content.h	Wed Apr 14 17:48:59 2010 +0300
@@ -165,30 +165,6 @@
 		*/
 		IMPORT_C static CContent* NewL(RFile& aFile);
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT		
-		/** 
-		 Constructs a new CContent object.
-
-  		 @param aHeaderData	Header data of WMDRM file/stream content. 
-		 @return 			CContent object.
-		 @leave 			KErrMissingHeaderData if the header data is NULL or one of the CAF error codes defined in caferr.h  
-		 					or one of the system-wide error codes for any other errors.
-		 @capability DRM 	Access to DRM protected content is not permitted for processes without DRM capability. Access to unprotected content is unrestricted 
-	 	 */
-		IMPORT_C static CContent* NewL(const TDesC8& aHeaderData);
-		
-		/** 
-		 Constructs a new CContent object.
-  		 
-  		 @param aHeaderData	Header data of WMDRM file/stream content.  
-		 @return 			CContent object.
-		 @leave 			KErrMissingHeaderData if the header data is NULL or one of the CAF error codes defined in caferr.h  or one of the 
-							system-wide error codes for any other errors.
-		 @capability DRM 	Access to DRM protected content is not permitted for processes without DRM capability. Access to unprotected content is unrestricted 
-		 */
-		IMPORT_C static CContent* NewLC(const TDesC8& aHeaderData);
-		
-#endif //#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 
 		/** destructor */
 		virtual ~CContent();
@@ -991,34 +967,6 @@
 		CContent(); 
 		void ConstructL(RFile& aFile); 
 		void ConstructL(const TDesC& aURI, TContentShareMode aShareMode); 
-		
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-		void ConstructL(const TDesC8& aHeaderData);
-
-		/**
-		Create a CData object for reading WMDRM content.
-		
-		@param	aIntent		The intended use of the content.
-		@param	aHeaderData	Header data of WMDRM file/stream content.
-		@return				CData object.
-		@leave 				One of the CAF error codes defined in caferr.h  or one of the system-wide error codes for any errors.
-		@capability DRM 	Access to DRM agents is not permitted for processes without DRM capability.
-		*/
-		
-		CData* OpenContentL(TIntent aIntent, const TDesC8& aHeaderData);
-		
-		/**
-		Create a CData object for reading WMDRM content.
-		
-		@param	aIntent		The intended use of the content.
-		@param	aHeaderData	Header data of WMDRM file/stream content.
-		@return				CData object.
-		@leave 				One of the CAF error codes defined in caferr.h  or one of the system-wide error codes for any errors.
-		@capability DRM 	Access to DRM agents is not permitted for processes without DRM capability.
-		*/
-		CData* OpenContentLC(TIntent aIntent, const TDesC8& aHeaderData);
-		
-#endif //#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 
 	private:	
 	
@@ -1052,10 +1000,6 @@
 		RFile iFile;
 #endif //SYMBIAN_ENABLE_64_BIT_FILE_SERVER_API
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-		HBufC8* iHeaderData;
-#endif //#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
 		};
 
 #include <caf/content.inl>
--- a/contentmgmt/contentaccessfwfordrm/inc/data.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/inc/data.h	Wed Apr 14 17:48:59 2010 +0300
@@ -273,74 +273,6 @@
 		 */
 		static CData* NewLC(TUid aAgentUid, RFile& aFile, const TDesC& aUniqueId, TIntent aIntent);
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-		
-		/** 
-		 Creates a new CData object. 
-		 @param aHeaderData				Header data of WMDRM file/stream content. 
-		 @return 						CData object.
-		 @leave							One of the CAF error codes defined in caferr.h or one of the 
-										system-wide error for any other errors.
-		 @capability 					DRM Access to DRM protected content is not permitted for processes without DRM capability.
-										Access to unprotected content is unrestricted.
-		*/
-			
-		IMPORT_C static CData* NewL(const TDesC8& aHeaderData);
-		
-		/** 
-		 Creates a new CData object. 
-		 @param aHeaderData				Header data of WMDRM file/stream content.
-		 @param aIntent					The intended use of the content.
-		 @return 						CData object.
-		 @leave							One of the CAF error codes defined in caferr.h or one of the 
-										system-wide error for any other errors.
-		 @capability 					DRM Access to DRM protected content is not permitted for processes without DRM capability.
-										Access to unprotected content is unrestricted.
-		*/		
-		
-		IMPORT_C static CData* NewL(const TDesC8& aHeaderData, TIntent aIntent);
-		
-		/** 
-		 Creates a new CData object. 
-		 @param aHeaderData				Header data of WMDRM file/stream content. 
-		 @return 						CData object.
-		 @leave							One of the CAF error codes defined in caferr.h or one of the 
-										system-wide error for any other errors.
-		 @capability 					DRM Access to DRM protected content is not permitted for processes without DRM capability.
-										Access to unprotected content is unrestricted.
-		*/
-		
-		IMPORT_C static CData* NewLC(const TDesC8& aHeaderData);
-		
-		/** 
-		 Creates a new CData object. 
-		 @param aHeaderData				Header data of WMDRM file/stream content.
-		 @param aIntent					The intended use of the content. 
-		 @return 						CData object.
-		 @leave							One of the CAF error codes defined in caferr.h or one of the 
-										system-wide error for any other errors.
-		 @capability 					DRM Access to DRM protected content is not permitted for processes without DRM capability.
-										Access to unprotected content is unrestricted.
-		*/
-		
-		IMPORT_C static CData* NewLC(const TDesC8& aHeaderData, TIntent aIntent);
-		
-		/** 
-		 Creates a new CData object.
-		 @param	aAgentUid				UID of an agent which supports this content. 
-		 @param aHeaderData				Header data of WMDRM file/stream content.
-		 @param aIntent					The intended use of the content.
-		 @return 						CData object.
-		 @leave							One of the CAF error codes defined in caferr.h or one of the 
-										system-wide error for any other errors.
-		 @capability 					DRM Access to DRM protected content is not permitted for processes without DRM capability.
-										Access to unprotected content is unrestricted.
-		 
-		*/
-		
-		static CData* NewLC(TUid aAgentUid, const TDesC8& aHeaderData, TIntent aIntent);
-		
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 
 		/** destructor */
 		virtual ~CData();
@@ -809,37 +741,6 @@
 		IMPORT_C TBool GetMimeTypeL(TDes8& aMimeType) const;
 #endif	// REMOVE_CAF1
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-		/**
-		Decrypts the encrypted input data packet.
-		
-		@param aEncryptedInputDataPacket	Buffer descriptor containing the encrypted data packet supplied by client application. 
-		@param aDecryptedOutputDataPacket	Buffer descriptor supplied by the client application into which the decrypted data is written.
-											The length of this descriptor must be equal to or greater than the input packet.
-		@return								KErrNone if successful.KErrInsufficientDataPacketLength if a part of input packet is provided,
-											otherwise one of the CAF error codes defined in \c caferr.h  or 
-		 									one of the other system-wide error codes.
-		@capability 						DRM Access to DRM protected content is not permitted for processes without DRM capability.
-											Access to unprotected content is unrestricted.
-		*/
-
-		IMPORT_C TInt Read(const TDesC8& aEncryptedInputDataPacket, TDes8& aDecryptedOutputDataPacket) const;
-		
-		/**
-		Decrypts the encrypted input data packet asynchronously.
-		@param aEncryptedInputDataPacket	Buffer descriptor containing the encrypted data packet supplied by client application. 
-		@param aDecryptedOutputDataPacket	Buffer descriptor supplied by the client application into which the decrypted data is written.
-											The length of this descriptor must be equal to or greater than the input packet.
-		@param aStatus						Asynchronous request status. On completion this will contain one of the following error codes:
-											KErrNone if the data packet was successfully decrypted.KErrInsufficientDataPacketLength if a 
-											part of input packet is provided, otherwise one of the CAF error codes defined in \c caferr.h or 
-		 									one of the other system-wide error codes.
-		@capability 						DRM Access to DRM protected content is not permitted for processes without DRM capability.
-										    Access to unprotected content is unrestricted. 
-		*/
-		IMPORT_C void Read(const TDesC8& aEncryptedInputDataPacket, TDes8& aDecryptedOutputDataPacket, TRequestStatus& aStatus) const;
-
-#endif //#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 	
 	private:
 		CData();
@@ -853,15 +754,6 @@
 		void ConstructL(TUid aAgentUid, RFile& aFile, const TDesC& aUniqueId);
 		void ConstructL(TUid aAgentUid, const TVirtualPathPtr& aVirtualPath, TContentShareMode aShareMode); 
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-		
-		void ConstructL(TUid aAgentUid, const TDesC8& aHeaderData, TIntent aIntent);
-		void ConstructL(const TDesC8& aHeaderData);
-		void ConstructL(const TDesC8& aHeaderData, TIntent aIntent);
-		void ConstructL(TUid aAgentUid, const TDesC8& aHeaderData);
-		
-#endif //#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
 #ifdef SYMBIAN_ENABLE_64_BIT_FILE_SERVER_API
 		/*
 		 * This is the obselete 32bit Read and replaced by its 64bit counterpart
--- a/contentmgmt/contentaccessfwfordrm/inc/manager.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/inc/manager.h	Wed Apr 14 17:48:59 2010 +0300
@@ -690,66 +690,6 @@
 		IMPORT_C static void DeleteFileL (const TDesC &aFileName);
 #endif // REMOVE_CAF1
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
-		/**  Get an attribute from WMDRM content.
-	
-		@param aAttribute	The attribute to retrieve, from ContentAccess::TAttribute.
-		@param aValue		Used to return the value of the attribute.
-		@param aHeaderData	Header data of WMDRM content.
-		@return				Whether the attribute value was updated.
-		@return				KErrNone if the attribute value was updated.
-		@return				KErrCANotSupported if the requested attribute is not supported for this content.
-		@return				Otherwise one of the other CAF error codes defined in \c caferr.h  or one of the 
-							other system-wide error codes for any other errors.
-		@capability DRM 	Access to DRM protected content is not permitted for processes without DRM capability. Access to unprotected content is unrestricted. 
-		*/
-		IMPORT_C TInt GetAttribute(const TDesC8& aHeaderData, TInt aAttribute, TInt& aValue) const;
-		
-		/** Get a set of attributes from WMDRM content.
-
-		@param aAttributeSet	The set of attributes to query and update.
-		@param aHeaderData		Header data of WMDRM content.
-		@return 				Whether the attribute set was updated.
-		@return 				KErrNone if the attribute set was updated successfully.
-		@return 				Otherwise one of the other CAF error codes defined in \c caferr.h  or one of the 
-								other system-wide error codes for any other errors.
-		@capability DRM 		Access to DRM protected content is not permitted for processes without DRM capability. Access to unprotected content is unrestricted. 
-		*/
-		IMPORT_C TInt GetAttributeSet(const TDesC8& aHeaderData, RAttributeSet& aAttributeSet) const;
-		
-		
-		/**  Get text string attributes or meta-data from WMDRM content.
-
-		@param aAttribute	The attribute to retrieve, from ContentAccess::TStringAttribute.
-		@param aValue		Used to return the value of the attribute.
-		@param aHeaderData	Header data of WMDRM content.
-		@return				Whether the value was updated.
-		@return				KErrNone if the attribute was retrieved successfully.
-		@return				KErrNotFound if the content object does not exist.
-		@return				KErrCANotSupported if the requested attribute does not apply to this content object.
-		@return				KErrOverflow if the buffer was not large enough to return the result.
-		@return				Otherwise one of the other CAF error codes defined in \c caferr.h  or one of the 
-							other system-wide error codes for any other errors.
-		@capability DRM 	Access to DRM protected content is not permitted for processes without DRM capability. Access to unprotected content is unrestricted. 
-		*/
-		IMPORT_C TInt GetStringAttribute(const TDesC8& aHeaderData, TInt aAttribute, TDes& aValue) const;
-		
-		/** Used to obtain a set of string attributes from WMDRM content.
-
-		@param aStringAttributeSet	The set of attributes to query and update.
-		@param aHeaderData			Header data of WMDRM content.
-		@return 					Whether the string attribute set was updated.
-		@return 					KErrNone if the attribute set was updated successfully.
-		@return 					KErrNotFound if the object with the given virtual path was not found.
-		@return 					Otherwise one of the other CAF error codes defined in \c caferr.h  or one of the 
-									other system-wide error codes for any other errors.
-		@capability DRM 			Access to DRM protected content is not permitted for processes without DRM capability. Access to unprotected content is unrestricted. 
-		*/
-		IMPORT_C TInt GetStringAttributeSet(const TDesC8& aHeaderData, RStringAttributeSet& aStringAttributeSet) const;
-
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
 	private:
 		CManager();
 		void ConstructL();
@@ -783,13 +723,6 @@
 		void DoCancelNotifyStatusChangeL(const TDesC& aURI, TRequestStatus& aStatus);
 		void DoSetPropertyL(TAgentProperty aProperty, TInt aValue);
 		
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-		void DoGetAttributeL(const TDesC8& aHeaderData, TInt aAttribute, TInt& aValue) const;
-		void DoGetAttributeSetL(const TDesC8& aHeaderData, RAttributeSet& aAttributeSet) const;
-		void DoGetStringAttributeL(const TDesC8& aHeaderData, TInt aAttribute, TDes& aValue) const;
-		void DoGetStringAttributeSetL(const TDesC8& aHeaderData, RStringAttributeSet& aStringAttributeSet) const;	
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-	
 	private:
 		// Holds instances of all the agents
 		CAgentResolver* iResolver;
--- a/contentmgmt/contentaccessfwfordrm/source/caf/Agentfactory.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/source/caf/Agentfactory.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -122,64 +122,4 @@
 	User::Leave(KErrCANotSupported);
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-	
-EXPORT_C TInt CAgentData::Read(const TDesC8& /*aEncryptedInputDataPacket*/, TDes8& /*aDecryptedOutputDataPacket*/)
-	{
- 	return KErrCANotSupported;
- 	}
- 	
-EXPORT_C void CAgentData::Read(const TDesC8& /*aEncryptedInputDataPacket*/, TDes8& /*aDecryptedOutputDataPacket*/, TRequestStatus& aStatus)
- 	{
- 	TRequestStatus* status = &aStatus;
-  	User::RequestComplete(status, KErrCANotSupported);
- 	}
- 	
-EXPORT_C TBool CAgentManager::IsRecognizedL(const TDesC8& /*aHeaderData*/) const
- 	{
-  	return EFalse;
- 	}
- 	
-EXPORT_C TBool CAgentManager::RecognizeContentL(const TDesC8& /*aHeaderData*/, TDes8& aFileMimeType, TDes8& aContentMimeType) const
-	{
-	aFileMimeType.Copy(KNullDesC8());
-	aContentMimeType.Copy(KNullDesC8());
- 	return EFalse;
-	}
-	
-EXPORT_C TInt CAgentManager::GetAttribute(const TDesC8& /*aHeaderData*/, TInt /*aAttribute*/, TInt& /*aValue*/)
-	{
-	return KErrCANotSupported;
-	}
 
-EXPORT_C TInt CAgentManager::GetAttributeSet(const TDesC8& /*aHeaderData*/, RAttributeSet& /*aAttributeSet*/)
-	{
-	return KErrCANotSupported;
-	}
-	
-EXPORT_C TInt CAgentManager::GetStringAttribute(const TDesC8& /*aHeaderData*/, TInt /*aAttribute*/, TDes& /*aValue*/)
-	{
-	return KErrCANotSupported;
-	}
-	
-EXPORT_C TInt CAgentManager::GetStringAttributeSet(const TDesC8& /*aHeaderData*/, RStringAttributeSet& /*aStringAttributeSet*/)
-	{
-	return KErrCANotSupported;
-	}
- 	
-EXPORT_C CAgentData* CAgentFactory::CreateDataConsumerL(const TDesC8& /*aHeaderData*/)
- 	{
- 	User::Leave(KErrCANotSupported);
- 	// cannot reach here. The return statement is added to avoid warning.
- 	return NULL;
-  	}
- 		
-EXPORT_C CAgentContent* CAgentFactory::CreateContentBrowserL(const TDesC8& /*aHeaderData*/)
- 	{
- 	User::Leave(KErrCANotSupported);
- 	// cannot be reach here . The return statement is added to avoid warning.
- 	return NULL;
- 	}
- 	
-
-#endif //#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
--- a/contentmgmt/contentaccessfwfordrm/source/caf/attribute.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/source/caf/attribute.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -48,16 +48,6 @@
 	return self;
 	}
 	
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-CAttribute* CAttribute::NewLC(TUid aAgentUid, const TDesC8& aHeaderData)
-	{
-	CAttribute* self = new(ELeave) CAttribute();
-	CleanupStack::PushL(self);
-	self->ConstructL(aAgentUid, aHeaderData);
-	return self;
-	}
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
 CAttribute::CAttribute()
 	{
 	}
@@ -94,18 +84,6 @@
 	iResponseSet = CBitset::NewL(static_cast<TInt>(KAttrTop));
     }
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-void CAttribute::ConstructL(TUid aAgentUid, const TDesC8& aHeaderData)
-	{
-	// create a agent factory implementation (pseudo ECOM handle)
-	iAgentFactory = CAgentFactory::NewL(aAgentUid);
-	iAgentContent = iAgentFactory->CreateContentBrowserL(aHeaderData);
-
-	iQuerySet = CBitset::NewL(static_cast<TInt>(KAttrTop));
-	iResponseSet = CBitset::NewL(static_cast<TInt>(KAttrTop));
-    }
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
 EXPORT_C void CAttribute::Reset()
 	{
 	iQuerySet->Reset();
--- a/contentmgmt/contentaccessfwfordrm/source/caf/content.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/source/caf/content.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -75,24 +75,6 @@
 	return self;
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
-EXPORT_C CContent* CContent::NewLC(const TDesC8& aHeaderData) 
-	{
-	CContent* self = new(ELeave) CContent();
-	CleanupStack::PushL(self);
-	self->ConstructL(aHeaderData);
-	return self;
-	}
-
-EXPORT_C CContent* CContent::NewL(const TDesC8& aHeaderData) 
-	{
-	CContent* self=CContent::NewLC(aHeaderData);
-	CleanupStack::Pop(self);
-	return self;
-	}
-	
-#endif //#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 
 CContent::CContent() : iDefaultVirtualPath(KNullDesC(), KDefaultContentObject())
 	{ 
@@ -108,10 +90,6 @@
 		delete iVirtualPath;
 		}
 	
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-	delete iHeaderData;
-#endif //#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-	
 	// Finished with agent, this closes ECOM handle
 	delete iAgentFactory;
 	REComSession::FinalClose();
@@ -189,35 +167,6 @@
 	CleanupStack::PopAndDestroy(2, resolver); // actualUri
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
-void CContent::ConstructL(const TDesC8& aHeaderData) 
-	{
-	if(aHeaderData.Length() <= 0)
-		{
-		User::Leave(KErrMissingWmdrmHeaderData);
-		}
-	
-	iHeaderData = aHeaderData.AllocL();
-	
-	CAgentResolver* resolver = CAgentResolver::NewLC(EFalse);
-	
-	// Find the agent who handles the file
-	CAgentInfo& agentInfo = resolver->ResolveFileL(aHeaderData);
-
-	// copy the agent name and Uid
-	iAgent = agentInfo.Agent();
-
-	// Construct the agent factory (ECOM handle)
-	iAgentFactory = CAgentFactory::NewL(iAgent.ImplementationUid());
-	// Construct the CAgentContent object
-	iAgentContent = iAgentFactory->CreateContentBrowserL(aHeaderData);
-
-	// Finished with resolver (and the agentInfo object it owns)
-	CleanupStack::PopAndDestroy(resolver); 
-	}
-
-#endif //#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 
 EXPORT_C TInt CContent::OpenContainer(const TDesC &aUniqueId) 
 	{
@@ -351,26 +300,12 @@
 
 EXPORT_C CData* CContent::OpenContentL(TIntent aIntent)
 	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-	if(iHeaderData != NULL)
-		return OpenContentL(aIntent, *iHeaderData);
-    else
-		return OpenContentL(aIntent, iDefaultVirtualPath.UniqueId());
-#else
 	return OpenContentL(aIntent, iDefaultVirtualPath.UniqueId());
-#endif //#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 	}
 
 EXPORT_C CData* CContent::OpenContentLC(TIntent aIntent)
 	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-	if(iHeaderData != NULL)
-		return OpenContentLC(aIntent, *iHeaderData);
-	else
-		return OpenContentLC(aIntent, iDefaultVirtualPath.UniqueId());
-#else
 	return OpenContentLC(aIntent, iDefaultVirtualPath.UniqueId());
-#endif //#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 	}
 
 EXPORT_C CData* CContent::OpenContentL(TIntent aIntent, const TDesC &aUniqueId)
@@ -395,22 +330,6 @@
 		}
 	}
 	
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
-CData* CContent::OpenContentL(TIntent aIntent, const TDesC8& aHeaderData)
-	{
-	CData* data = OpenContentLC(aIntent, aHeaderData);
-	CleanupStack::Pop(data);
-	return data;
-	}
-
-CData* CContent::OpenContentLC(TIntent aIntent, const TDesC8& aHeaderData)
-	{
-	return CData::NewLC(iAgent.ImplementationUid(), aHeaderData, aIntent);
-	}
-	
-#endif //#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
 EXPORT_C const TAgent& CContent::Agent() const
 	{
 	// The agent handling this content
@@ -443,39 +362,6 @@
 	return NewAttributeL(aPreloaded, EContentShareReadOnly);
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-EXPORT_C CAttribute* CContent::NewAttributeL(TBool aPreloaded, TContentShareMode aShareMode)
-	{
-	CAttribute* attr = NULL;
-	
-	if(iVirtualPath)
-		{
-		// if we were opened with a file name
-		attr = CAttribute::NewLC(iAgent.ImplementationUid(), iDefaultVirtualPath.URI(), aShareMode);
-		}
-	else if(iHeaderData)
-		{
-		attr = CAttribute::NewLC(iAgent.ImplementationUid(), *iHeaderData);
-		}
-	else
-		{
-		// if we were opened with a file handle 
-		attr = CAttribute::NewLC(iAgent.ImplementationUid(), iFile);
-		}
-
-	// If aPreloaded is set, query the agent immediately for all the attributes
-	if (aPreloaded)
-		{
-		attr->QuerySet().SetAll();
-		attr->GetL();
-		}
-
-	CleanupStack::Pop(attr);
-	return attr;
-	}
-
-#else
-
 EXPORT_C CAttribute* CContent::NewAttributeL(TBool aPreloaded, TContentShareMode aShareMode)
 	{
 	CAttribute* attr = NULL;
@@ -502,8 +388,6 @@
 	return attr;
 	}
 
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
 #endif // REMOVE_CAF1
 
 // DLL entry point - only for EKA1
--- a/contentmgmt/contentaccessfwfordrm/source/caf/data.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/source/caf/data.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -111,47 +111,6 @@
 	return self;
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
-EXPORT_C CData* CData::NewL(const TDesC8& aHeaderData)
-	{
-	CData* self = CData::NewLC(aHeaderData);
-	CleanupStack::Pop(self);
-	return self;
-	}
-		
-EXPORT_C CData* CData::NewL(const TDesC8& aHeaderData, TIntent aIntent)
-	{
-	CData* self = CData::NewLC(aHeaderData, aIntent);
-	CleanupStack::Pop(self);
-	return self;
-	}
-		
-EXPORT_C CData* CData::NewLC(const TDesC8& aHeaderData)
-	{
-	CData* self = new (ELeave) CData();
-	CleanupStack::PushL(self);
-	self->ConstructL(aHeaderData);
-	return self;
-	}
-		
-EXPORT_C CData* CData::NewLC(const TDesC8& aHeaderData, TIntent aIntent)
-	{
-	CData* self = new (ELeave) CData();
-	CleanupStack::PushL(self);
-	self->ConstructL(aHeaderData, aIntent);
-	return self;
-	}
-		
-CData* CData::NewLC(TUid aAgentUid, const TDesC8& aHeaderData, TIntent aIntent)
-	{
-	CData* self = new (ELeave) CData();
-	CleanupStack::PushL(self);
-	self->ConstructL(aAgentUid, aHeaderData, aIntent);
-	return self;
-	}
-
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 
 CData::CData()
 	{ 
@@ -291,49 +250,6 @@
 	iAgentData = iAgentFactory->CreateDataConsumerL(aFile, aUniqueId);
   	}
   
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-  	
-void CData::ConstructL(const TDesC8& aHeaderData)
-	{
-	// Find the agent who handles the file
-	CAgentResolver* resolver = CAgentResolver::NewLC(EFalse);
-	CAgentInfo& agentInfo = resolver->ResolveFileL(aHeaderData);
-	
-	// Figure out the Uid of the agent
-	TUid agentUid = agentInfo.Agent().ImplementationUid();
-	CData::ConstructL(agentUid, aHeaderData);
-	
-	// Cleanup resolver after creating CData to unnecessary 
-	// unloading and loading of agent plug-ins
-	CleanupStack::PopAndDestroy(resolver); 
-	}
-
-void CData::ConstructL(const TDesC8& aHeaderData, TIntent aIntent)
-	{
-	CData::ConstructL(aHeaderData);
-	
-	// Ensure that client's intent is possible
-	User::LeaveIfError(iAgentData->EvaluateIntent(aIntent));
-	}
-	
-void CData::ConstructL(TUid aAgentUid, const TDesC8& aHeaderData)
-	{
-	iAgentUid = aAgentUid;
-	
-	iAgentFactory = CAgentFactory::NewL(iAgentUid);
-	// create an instance of agent's CAgentStreamData.
-	iAgentData = iAgentFactory->CreateDataConsumerL(aHeaderData);
-	}
-
-void CData::ConstructL(TUid aUid, const TDesC8& aHeaderData, TIntent aIntent)
-	{
-	CData::ConstructL(aUid, aHeaderData);
-	
-	// Ensure that client's intent is possible
-	User::LeaveIfError(iAgentData->EvaluateIntent(aIntent));
-	}
-	
-#endif //#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 	
 EXPORT_C void CData::DataSizeL(TInt& aSize)
 	{
@@ -402,20 +318,6 @@
 	iAgentData->ReadCancel(aStatus);
 	}
 	
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
-EXPORT_C TInt CData::Read(const TDesC8& aEncryptedInputDataPacket, TDes8& aDecryptedOutputPacket) const
-	{
-	return iAgentData->Read(aEncryptedInputDataPacket, aDecryptedOutputPacket);
-	}
-		
-EXPORT_C void CData::Read(const TDesC8& aEncryptedInputDataPacket, TDes8& aDecryptedOutputPacket, TRequestStatus& aStatus) const
-	{
-	iAgentData->Read(aEncryptedInputDataPacket, aDecryptedOutputPacket, aStatus);
-	}
-
-#endif //#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
 #ifdef SYMBIAN_ENABLE_64_BIT_FILE_SERVER_API
 	EXPORT_C TInt CData::Read_Unused(TInt aPos, TDes8& aDes, 
 								TInt aLength, TRequestStatus& aStatus) const
--- a/contentmgmt/contentaccessfwfordrm/source/caf/manager.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/source/caf/manager.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -703,63 +703,4 @@
 	}
 #endif // REMOVE_CAF1
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 
-EXPORT_C TInt CManager::GetAttribute(const TDesC8& aHeaderData, TInt aAttribute, TInt& aValue) const
-	{
-	TRAPD(err, DoGetAttributeL(aHeaderData, aAttribute, aValue));
-	return err;
-	}
-
-void CManager::DoGetAttributeL(const TDesC8& aHeaderData, TInt aAttribute, TInt& aValue) const
-	{
-	// Find the agent who handles the file 
-	CAgentInfo& agentInfo = iResolver->ResolveFileL(aHeaderData);
-	User::LeaveIfError(agentInfo.AgentManagerL().GetAttribute(aHeaderData, aAttribute, aValue));
-	}
-	
-EXPORT_C TInt CManager::GetAttributeSet(const TDesC8& aHeaderData, RAttributeSet& aAttributeSet) const
-	{
-	TRAPD(err, DoGetAttributeSetL(aHeaderData, aAttributeSet));
-	return err;
-	}
-
-void CManager::DoGetAttributeSetL(const TDesC8& aHeaderData, RAttributeSet& aAttributeSet) const	
-	{
-	// Find the agent who handles the file 
-	CAgentInfo& agentInfo = iResolver->ResolveFileL(aHeaderData);
-	
-	User::LeaveIfError(agentInfo.AgentManagerL().GetAttributeSet(aHeaderData, aAttributeSet));
-	}
-	
-EXPORT_C TInt CManager::GetStringAttribute(const TDesC8& aHeaderData, TInt aAttribute, TDes& aValue) const
-	{
-	TRAPD(err, DoGetStringAttributeL(aHeaderData, aAttribute, aValue));
-	return err;
-	}
-	
-void CManager::DoGetStringAttributeL(const TDesC8& aHeaderData, TInt aAttribute, TDes& aValue) const
-	{
-	// Find the agent who handles the file 
-	CAgentInfo& agentInfo = iResolver->ResolveFileL(aHeaderData);
-	
-	// find out the attribute
-	User::LeaveIfError(agentInfo.AgentManagerL().GetStringAttribute(aHeaderData, aAttribute, aValue));
-	}
-	
-EXPORT_C TInt CManager::GetStringAttributeSet(const TDesC8& aHeaderData, RStringAttributeSet& aStringAttributeSet) const
-	{
-	TRAPD(err, DoGetStringAttributeSetL(aHeaderData, aStringAttributeSet));
-	return err;
-	}
-
-void CManager::DoGetStringAttributeSetL(const TDesC8& aHeaderData, RStringAttributeSet& aStringAttributeSet) const
-	{
-	// Find the agent who handles the file 
-	CAgentInfo& agentInfo = iResolver->ResolveFileL(aHeaderData);
-
-	// find out the array of attributes
-	User::LeaveIfError(agentInfo.AgentManagerL().GetStringAttributeSet(aHeaderData, aStringAttributeSet));
-	}
-	
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
--- a/contentmgmt/contentaccessfwfordrm/source/caf/resolver.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/source/caf/resolver.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -353,75 +353,6 @@
 	return *iDefaultAgent;
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
-CAgentInfo& CAgentResolver::ResolveFileL(const TDesC8& aHeaderData)
-	{
-	// Go through all the agents and return the one which supports the given WMDRM content.
-	
-	TInt agentsCount(iAgentInfos.Count());
-	CAgentManager* agentManager = NULL;
-	
-	for (TInt i = 0; i < agentsCount; ++i)
-		{
-		TRAPD(result, agentManager = &iAgentInfos[i]->AgentManagerL());
-		if(result != KErrNone)
-			{
-			if(KErrNoMemory == result)
-				{
-				User::Leave(result);
-				}
-			else
-				{
-				continue;	
-				}
-			}
-			
-		if (agentManager->IsRecognizedL(aHeaderData))
-			{
-			return *iAgentInfos[i];
-			}
-		}
-		
-    // will never reach here	
-	return *iDefaultAgent;
-	}
-	
-	
-EXPORT_C TBool CAgentResolver::DoRecognizeL(const TDesC8& aHeader, TDes8& aFileMimeType, TDes8& aContentMimeType)
-	{
-	// Go through all the agents and return the one which supports the given WMDRM content.
-	TInt agentsCount(iAgentInfos.Count());
-	CAgentManager* agentManager = NULL;
-	for (TInt i = 0; i < agentsCount; ++i)
-		{
-		TRAPD(result, agentManager = &iAgentInfos[i]->AgentManagerL());
-		if(result != KErrNone)
-			{
-			if(KErrNoMemory == result)
-				{
-				User::Leave(result);
-				}
-			else
-				{
-				continue;	
-				}
-			}
-			
-		if (agentManager->RecognizeContentL(aHeader, aFileMimeType, aContentMimeType))
-			{
-			// force to lower case to ensure that chosen lower case scheme for mime types is maintained
-			aFileMimeType.LowerCase();
-			aContentMimeType.LowerCase();			
-			return ETrue;
-			}
-		}
-		
-	return EFalse;
-	}
-	
-#endif //#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-	
 TUid CAgentResolver::ResolveDirectory(const TDesC& aPath, TDes& aActualPath, TBool& aThePrivateDir) const
 	{
 	TInt i = 0;
--- a/contentmgmt/contentaccessfwfordrm/source/caf/resolver.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/source/caf/resolver.h	Wed Apr 14 17:48:59 2010 +0300
@@ -90,16 +90,7 @@
 			*/
 			CAgentInfo& ResolveFileL(RFile& aFile) const;			
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-			
-			/** Finds the agent which handles this piece of content.
-			@param aHeaderData	Header data of WMDRM file or stream content.
-			@return				CAgentInfo object associated with the agent that will handle WMDRM content.	
-			*/
-			CAgentInfo& ResolveFileL(const TDesC8& aHeaderData);
-			
-#endif //#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-						
+					
 			/** Finds the agent that handles a file and returns the actual URI of the content.
 			
 			If the aUri is of the form "c:\\private\\agent_name\\" 
@@ -174,20 +165,6 @@
 			*/
 			IMPORT_C const RArray<TPtrC8>& ConsumerMimeTypes() const;
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT			
-			/** This function should only be used by the CAF recogizer DLL.
-			
-			@param aHeader			Header data of WMDRM content.
-			@param aFileMimeType	If the content is recognized this will be populated with 
-									the mime type of the content.
-			@param aContentMimeType	If the content is recognized this will be populated with the mime type of the content. 
-
-			@return					ETrue if the content is recognized by content access agent
-			@return					EFalse if the content is not recognized by a content access agent
-			*/
-			IMPORT_C TBool DoRecognizeL(const TDesC8& aHeader, TDes8& aFileMimeType, TDes8& aContentMimeType);
-#endif //#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT	
-
 			/** Find an agent by it's Uid */
 			CAgentInfo& AgentInfoL(const TUid& aUid) const;
 			
--- a/contentmgmt/contentaccessfwfordrm/source/cafutils/cafhelper.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,74 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include "cafhelper.h"
-#include "cafhelperinterface.h"
-#include <e32def.h>
-#include <e32uid.h>
-
-using namespace ContentAccess;
-
-EXPORT_C CCAFHelper* CCAFHelper::NewL()
-	{
-	CCAFHelper* self = CCAFHelper::NewLC();
-	CleanupStack::Pop(self);
-	return self;
-	}
-
-EXPORT_C CCAFHelper* CCAFHelper::NewLC()
-	{
-	CCAFHelper* self = new (ELeave) CCAFHelper;
-	CleanupStack::PushL(self);
-	self->ConstructL();
-	return self;
-	}
-	
-CCAFHelper::CCAFHelper()
-	{
-	}
-
-void CCAFHelper::ConstructL()
-	{
-	// Dynamically load the DLL.
-	TUidType uidType(KDynamicLibraryUid, KCAFHelperInterfaceUID);
-	
-	User::LeaveIfError(iLibrary.Load(KCAFHelperLibraryName, uidType));
-	
-	// Function at ordinal 1 creates new CCAFAgentHelper.
-	TLibraryFunction entryFunc = iLibrary.Lookup(1);
-	if (entryFunc == NULL)
-    	{
-        iLibrary.Close();
-        User::Leave(KErrBadLibraryEntryPoint);
-    	}
-		
-	// Call the function to create new CCAFAgentHelper.
-	iHelper = (MCAFHelperInterface*)entryFunc();
-	}
-
-EXPORT_C MCAFHelperInterface& CCAFHelper::operator()() const
-	{
-	return *iHelper;
-	}
-	
-CCAFHelper::~CCAFHelper()
-	{
-	iHelper->Release();
-	iLibrary.Close();
-	}
-	
--- a/contentmgmt/contentaccessfwfordrm/source/f32agent/f32agentcontent.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/source/f32agent/f32agentcontent.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -42,16 +42,6 @@
 	return self;
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-CF32AgentContent* CF32AgentContent::NewL(const TDesC8& aHeaderData)
-	{
-	CF32AgentContent* self = new (ELeave) CF32AgentContent;
-	CleanupStack::PushL(self);
-	self->ConstructL(aHeaderData);
-	CleanupStack::Pop(self);
-	return self;
-	}
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 	
 CF32AgentContent::CF32AgentContent()
 	{
@@ -66,10 +56,6 @@
 		iFs.Close();
 		}
 	delete iURI;
-	
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT	
-	delete iHeaderData;
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 	}
   
 void CF32AgentContent::ConstructL(const TDesC& aURI, TContentShareMode aShareMode)
@@ -88,16 +74,6 @@
 	User::LeaveIfError(iFile.Duplicate(aFile));
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT	
-void CF32AgentContent::ConstructL(const TDesC8& aHeaderData)
-	{
-	if(aHeaderData.Length() > 0)
-		iHeaderData = aHeaderData.AllocL();
-	else
-		User::Leave(KErrMissingWmdrmHeaderData);
-	}
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
 TInt CF32AgentContent::OpenContainer(const TDesC&)
 	{
 	return KErrNotFound;
@@ -182,33 +158,6 @@
 	return err;
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-TInt CF32AgentContent::GetAttribute(TInt aAttribute, TInt& aValue, const TDesC& aUniqueId)
-	{
-	
-	// check that the unique Id exists
-	if(TF32DefaultAttributes::CheckUniqueId(aUniqueId) != KErrNone)
-		{
-		return KErrNotFound;	
-		}
-	
-	TInt err = KErrNone;
-	if(iURI)
-		{
-		err = TF32DefaultAttributes::GetAttribute(aAttribute, aValue, *iURI);
-		}
-	else if(iHeaderData)
-		{
-		err = TF32DefaultAttributes::GetAttribute(*iHeaderData, aAttribute, aValue);
-		}
-	else
-		{
-		err = TF32DefaultAttributes::GetAttribute(aAttribute, aValue, iFile);
-		}
-	return err;
-	}
-
-#else
 TInt CF32AgentContent::GetAttribute(TInt aAttribute, TInt& aValue, const TDesC& aUniqueId)
 	{
 	// check that the unique Id exists
@@ -228,35 +177,7 @@
 		}
 	return err;
 	}
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
-TInt CF32AgentContent::GetAttributeSet(RAttributeSet& aAttributeSet, const TDesC& aUniqueId)
-	{
-	// check that the unique Id exists
-	if(TF32DefaultAttributes::CheckUniqueId(aUniqueId) != KErrNone)
-		{
-		return KErrNotFound;	
-		}
-		
-	TInt err = KErrNone;
-	if(iURI)
-		{
-		err = TF32DefaultAttributes::GetAttributeSet(aAttributeSet, *iURI);
-		}
-	else if(iHeaderData)
-		{
-		err = TF32DefaultAttributes::GetAttributeSet(*iHeaderData, aAttributeSet);
-		}
-	else
-		{
-		err = TF32DefaultAttributes::GetAttributeSet(aAttributeSet, iFile);
-		}
-	return err;
-	}
-
-#else
 
 TInt CF32AgentContent::GetAttributeSet(RAttributeSet& aAttributeSet, const TDesC& aUniqueId)
 	{
@@ -278,35 +199,6 @@
 	return err;
 	}
 
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
-TInt CF32AgentContent::GetStringAttribute(TInt aAttribute, TDes& aValue, const TDesC& aUniqueId)
-	{
-	// check that the unique Id exists
-	if(TF32DefaultAttributes::CheckUniqueId(aUniqueId) != KErrNone)
-		{
-		return KErrNotFound;	
-		}
-		
-	TInt err = KErrNone;
-	if(iURI)
-		{
-		err = TF32DefaultAttributes::GetStringAttribute(aAttribute, aValue, *iURI);
-		}
-	else if(iHeaderData)
-		{
-		err = TF32DefaultAttributes::GetStringAttribute(*iHeaderData, aAttribute, aValue);
-		}
-	else
-		{
-		err = TF32DefaultAttributes::GetStringAttribute(aAttribute, aValue, iFile);
-		}
-	return err;
-	}
-
-#else
 TInt CF32AgentContent::GetStringAttribute(TInt aAttribute, TDes& aValue, const TDesC& aUniqueId)
 	{
 	// check that the unique Id exists
@@ -326,35 +218,7 @@
 		}
 	return err;
 	}
-#endif
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
-TInt CF32AgentContent::GetStringAttributeSet(RStringAttributeSet& aStringAttributeSet, const TDesC& aUniqueId)
-	{
-	// check that the unique Id exists
-	if(TF32DefaultAttributes::CheckUniqueId(aUniqueId) != KErrNone)
-		{
-		return KErrNotFound;	
-		}
-	
-	TInt err = KErrNone;
-	if(iURI)
-		{
-		err = TF32DefaultAttributes::GetStringAttributeSet(aStringAttributeSet, *iURI);
-		}
-	else if(iHeaderData)
-		{
-		err = TF32DefaultAttributes::GetStringAttributeSet(*iHeaderData, aStringAttributeSet);
-		}
-	else
-		{
-		err = TF32DefaultAttributes::GetStringAttributeSet(aStringAttributeSet, iFile);
-		}
-	return err;
-	}
-
-#else
 
 TInt CF32AgentContent::GetStringAttributeSet(RStringAttributeSet& aStringAttributeSet, const TDesC& aUniqueId)
 	{
@@ -376,8 +240,6 @@
 	return err;
 	}
 
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
 TInt CF32AgentContent::AgentSpecificCommand(TInt , const TDesC8& , TDes8& )
 	{
 	return KErrCANotSupported;
--- a/contentmgmt/contentaccessfwfordrm/source/f32agent/f32agentcontent.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/source/f32agent/f32agentcontent.h	Wed Apr 14 17:48:59 2010 +0300
@@ -52,10 +52,6 @@
 		// a file handle
 		static CF32AgentContent* NewL(RFile& aFile);
 		
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-		static CF32AgentContent* NewL(const TDesC8& aHeaderData);
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
 		virtual ~CF32AgentContent();
 
 	public: 
@@ -82,10 +78,7 @@
 		CF32AgentContent();
 		void ConstructL(const TDesC& aURI, TContentShareMode aShareMode);
 		void ConstructL(RFile& aFile);
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-		void ConstructL(const TDesC8& aHeaderData);
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-		
+	
 		CF32AgentUi& AgentUiL();		
 		void SearchL(RStreamablePtrArray<CEmbeddedObject>& aArray, const TDesC8& aMimeType, TBool aRecursive);
 
@@ -99,9 +92,6 @@
 		RFile iFile;
 #endif //SYMBIAN_ENABLE_64_BIT_FILE_SERVER_API
 		CF32AgentUi* iAgentUi;
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-		HBufC8* iHeaderData;
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 		};
 } // namespace ContentAccess
 #endif // __F32AgentContent_H__
--- a/contentmgmt/contentaccessfwfordrm/source/f32agent/f32agentdata.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/source/f32agent/f32agentdata.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -43,26 +43,6 @@
 	return self;
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
-CF32AgentData* CF32AgentData::NewL(const TDesC8& aHeaderData)
-	{
-	CF32AgentData* self = new (ELeave) CF32AgentData;
-	CleanupStack::PushL(self);
-	self->ConstructL(aHeaderData);
-	CleanupStack::Pop(self);
-	return self;
-	}
-	
-void CF32AgentData::ConstructL(const TDesC8& aHeaderData)
-	{
-	if(aHeaderData.Length() > 0)
-		iHeaderData = aHeaderData.AllocL();
-	else
-		User::Leave(KErrMissingWmdrmHeaderData);
-	}
-	
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 
 CF32AgentData::CF32AgentData()
 	{
@@ -79,9 +59,6 @@
 
 	delete iVirtualPath;
 	
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-	delete iHeaderData;			
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 	}
   
 void CF32AgentData::ConstructL(const TVirtualPathPtr& aVirtualPath, TContentShareMode aShareMode)
@@ -234,22 +211,6 @@
 
 TInt CF32AgentData::GetAttribute(TInt aAttribute, TInt& aValue)
 	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-	if(iHeaderData)
-		{
-		return TF32DefaultAttributes::GetAttribute(*iHeaderData, aAttribute, aValue);
-		}
-		
-	else if(iVirtualPath)
-		{
-		return TF32DefaultAttributes::GetAttribute(aAttribute, aValue, iVirtualPath->URI());
-		}
-		
-	else
-		{
-		return TF32DefaultAttributes::GetAttribute(aAttribute, aValue, iFile);
-		}
-#else
 	if(iVirtualPath)
 		{
 		return TF32DefaultAttributes::GetAttribute(aAttribute, aValue, iVirtualPath->URI());
@@ -258,27 +219,10 @@
 		{
 		return TF32DefaultAttributes::GetAttribute(aAttribute, aValue, iFile);
 		}
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 	}
 
 TInt CF32AgentData::GetAttributeSet(RAttributeSet& aAttributeSet)
 	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-	if(iHeaderData)
-		{
-		return TF32DefaultAttributes::GetAttributeSet(*iHeaderData, aAttributeSet);
-		}
-		
-	else if(iVirtualPath)
-		{
-		return TF32DefaultAttributes::GetAttributeSet(aAttributeSet, iVirtualPath->URI());
-		}
-			
-	else
-		{
-		return TF32DefaultAttributes::GetAttributeSet(aAttributeSet, iFile);
-		}
-#else
 	if(iVirtualPath)
 		{
 		return TF32DefaultAttributes::GetAttributeSet(aAttributeSet, iVirtualPath->URI());
@@ -287,26 +231,10 @@
 		{
 		return TF32DefaultAttributes::GetAttributeSet(aAttributeSet, iFile);
 		}	
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT		
 	}
 
 TInt CF32AgentData::GetStringAttribute(TInt aAttribute, TDes& aValue)
 	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-	if(iHeaderData)
-		{
-		return TF32DefaultAttributes::GetStringAttribute(*iHeaderData, aAttribute, aValue);
-		}
-	
-	else if(iVirtualPath)
-		{
-		return TF32DefaultAttributes::GetStringAttribute(aAttribute, aValue, iVirtualPath->URI());
-		}
-	else
-		{
-		return TF32DefaultAttributes::GetStringAttribute(aAttribute, aValue, iFile);
-		}
-#else
 	if(iVirtualPath)
 		{
 		return TF32DefaultAttributes::GetStringAttribute(aAttribute, aValue, iVirtualPath->URI());
@@ -315,26 +243,10 @@
 		{
 		return TF32DefaultAttributes::GetStringAttribute(aAttribute, aValue, iFile);
 		}
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT	
 	}
 
 TInt CF32AgentData::GetStringAttributeSet(RStringAttributeSet& aStringAttributeSet)
 	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-	if(iHeaderData)
-		{
-		return TF32DefaultAttributes::GetStringAttributeSet(*iHeaderData, aStringAttributeSet);
-		}
-		
-	else if(iVirtualPath)
-		{
-		return TF32DefaultAttributes::GetStringAttributeSet(aStringAttributeSet, iVirtualPath->URI());
-		}
-	else
-		{
-		return TF32DefaultAttributes::GetStringAttributeSet(aStringAttributeSet, iFile);
-		}
-#else
 	if(iVirtualPath)
 		{
 		return TF32DefaultAttributes::GetStringAttributeSet(aStringAttributeSet, iVirtualPath->URI());
@@ -343,7 +255,6 @@
 		{
 		return TF32DefaultAttributes::GetStringAttributeSet(aStringAttributeSet, iFile);
 		}
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 	}
 
 CF32AgentUi& CF32AgentData::AgentUiL()
@@ -356,29 +267,4 @@
 	return *iAgentUi;
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 
-TInt CF32AgentData::Read(const TDesC8& aEncryptedInputDataPacket, TDes8& aDecryptedOutputDataPacket)
-	{
-	if(aEncryptedInputDataPacket.Length() <= 0)
-		{
-		return KErrInsufficientDataPacketLength;
-		}
-	
-	aDecryptedOutputDataPacket = aEncryptedInputDataPacket;
-	return KErrNone;
-	}
-			
-void CF32AgentData::Read(const TDesC8& aEncryptedInputDataPacket, TDes8& aDecryptedOutputDataPacket, TRequestStatus& aStatus)
-	{
-	TRequestStatus* status = &aStatus;
-	if(aEncryptedInputDataPacket.Length() <= 0)
-		{
-		User::RequestComplete(status, KErrInsufficientDataPacketLength);		
-		}
-	
-	aDecryptedOutputDataPacket = aEncryptedInputDataPacket;
-	User::RequestComplete(status, KErrNone);
-	}
-
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
--- a/contentmgmt/contentaccessfwfordrm/source/f32agent/f32agentdata.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/source/f32agent/f32agentdata.h	Wed Apr 14 17:48:59 2010 +0300
@@ -46,10 +46,6 @@
 		static CF32AgentData* NewL(const TVirtualPathPtr& aVirtualPath, TContentShareMode aShareMode);
 		static CF32AgentData* NewL(RFile& aFile, const TDesC& aUniqueId);
 		
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-		static CF32AgentData* NewL(const TDesC8& aHeaderData);
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
 		~CF32AgentData();
 
 	public: // From CAgentData
@@ -78,20 +74,11 @@
 		virtual TInt Read64(TInt64 aPos, TDes8& aDes, TInt aLength, TRequestStatus& aStatus);
 #endif // SYMBIAN_ENABLE_64_BIT_FILE_SERVER_API
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-		virtual TInt Read(const TDesC8& aEncryptedInputDataPacket, TDes8& aDecryptedOutputDataPacket);		
-		virtual void Read(const TDesC8& aEncryptedInputDataPacket, TDes8& aDecryptedOutputDataPacket, TRequestStatus& aStatus);
-#endif	//SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
 	private:
 		CF32AgentData();
 		void ConstructL(const TVirtualPathPtr& aVirtualPath, TContentShareMode aShareMode);
 		void ConstructL(RFile& aFile, const TDesC& aUniqueId);
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-		void ConstructL(const TDesC8& aHeaderData);
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
 		CF32AgentUi& AgentUiL();
 		
 	private:
@@ -108,9 +95,6 @@
 		CVirtualPath* iVirtualPath;
 		CF32AgentUi* iAgentUi;
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-		HBufC8* iHeaderData;
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 		};
 } // namespace ContentAccess
 #endif // __F32AGENTDATA_H__
--- a/contentmgmt/contentaccessfwfordrm/source/f32agent/f32agentfactory.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/source/f32agent/f32agentfactory.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -80,14 +80,3 @@
 	return NULL;
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-CAgentData* CF32AgentFactory::CreateDataConsumerL(const TDesC8& aHeaderData)
-	{
-	return CF32AgentData::NewL(aHeaderData);
-	}
-
-CAgentContent* CF32AgentFactory::CreateContentBrowserL(const TDesC8& aHeaderData)
-	{
-	return CF32AgentContent::NewL(aHeaderData);
-	}
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
--- a/contentmgmt/contentaccessfwfordrm/source/f32agent/f32agentfactory.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/source/f32agent/f32agentfactory.h	Wed Apr 14 17:48:59 2010 +0300
@@ -88,11 +88,7 @@
 		@panic CAF EF32AgentRightsManagerNotSupported 
 		*/
 		virtual CAgentRightsManager* CreateRightsManagerL();
-		
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-		virtual CAgentData* CreateDataConsumerL(const TDesC8& aHeaderData);
-		virtual CAgentContent* CreateContentBrowserL(const TDesC8& aHeaderData);
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT		
+			
 		};
 } // namespace ContentAccess
 #endif // __F32AGENTFACTORY_H__
--- a/contentmgmt/contentaccessfwfordrm/source/f32agent/f32agentmanager.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/source/f32agent/f32agentmanager.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -340,38 +340,3 @@
 	User::Panic(KCafPanicString, ECafPanicF32AgentPrepareHTTPHeadersNotSupported);
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
-TBool CF32AgentManager::IsRecognizedL(const TDesC8& /*aHeaderData*/) const
-	{
-	// F32 should be the default agent and should never be called here
-	return EFalse;
-	}
-	
-TBool CF32AgentManager::RecognizeContentL(const TDesC8&, TDes8&, TDes8&) const
-	{
-	// F32 should be the default agent and should never be called here
-	return EFalse;
-	}
-	
-TInt CF32AgentManager::GetAttribute(const TDesC8& aHeaderData, TInt aAttribute, TInt& aValue)
-	{
-	return TF32DefaultAttributes::GetAttribute(aHeaderData, aAttribute, aValue);
-	}
-
-TInt CF32AgentManager::GetAttributeSet(const TDesC8& aHeaderData, RAttributeSet& aAttributeSet)
-	{
-	return TF32DefaultAttributes::GetAttributeSet(aHeaderData, aAttributeSet);
-	}
-
-TInt CF32AgentManager::GetStringAttribute(const TDesC8& aHeaderData, TInt aAttribute, TDes& aValue) 
-	{
-	return TF32DefaultAttributes::GetStringAttribute(aHeaderData, aAttribute, aValue);
-	}
-
-TInt CF32AgentManager::GetStringAttributeSet(const TDesC8& aHeaderData, RStringAttributeSet& aAttributeSet) 
-	{
-	return TF32DefaultAttributes::GetStringAttributeSet(aHeaderData, aAttributeSet);
-	}
-	
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
--- a/contentmgmt/contentaccessfwfordrm/source/f32agent/f32agentmanager.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/source/f32agent/f32agentmanager.h	Wed Apr 14 17:48:59 2010 +0300
@@ -89,14 +89,6 @@
 		virtual void PrepareHTTPRequestHeaders(RStringPool& aStringPool, RHTTPHeaders& aRequestHeaders) const;
 		virtual TInt RenameDir(const TDesC& aOldName, const TDesC& aNewName);
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-		virtual TBool IsRecognizedL(const TDesC8& aHeaderData) const;
-		virtual TBool RecognizeContentL(const TDesC8& aHeaderData, TDes8& aFileMimeType, TDes8& aContentMimeType) const;
-		virtual TInt GetAttribute(const TDesC8& aHeaderData, TInt aAttribute, TInt& aValue);
-		virtual TInt GetAttributeSet(const TDesC8& aHeaderData, RAttributeSet& aAttributeSet);
-		virtual TInt GetStringAttributeSet(const TDesC8& aHeaderData, RStringAttributeSet& aAttributeSet);
-		virtual TInt GetStringAttribute(const TDesC8& aHeaderData, TInt aAttribute, TDes& aValue);
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 
 	protected:
 		CF32AgentManager();
--- a/contentmgmt/contentaccessfwfordrm/source/f32agent/f32defaultattributes.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/source/f32agent/f32defaultattributes.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -286,73 +286,3 @@
 	return fileMode;
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-	
-TInt TF32DefaultAttributes::GetAttribute(const TDesC8& /*aHeaderData*/, TInt aAttribute, TInt& aValue)
-	{
-	return GetAttribute(aAttribute, aValue, KNullDesC);
-	}
-	
-TInt TF32DefaultAttributes::GetAttributeSet(const TDesC8& aHeaderData, RAttributeSet& aAttributeSet)
-	{
-	TInt i = 0;
-	TInt attribute = 0;
-	TInt value = 0;
-	TInt err = KErrNone;
-	TInt numAttributes = aAttributeSet.Count();
-	
-	// loop through all the attriutes in the set and find their values
-	for(i = 0; i < numAttributes; i++)
-		{
-		attribute = aAttributeSet[i];
-		err = GetAttribute(aHeaderData, attribute, value);
-		aAttributeSet.SetValue(attribute, value, err);
-		}	
-	return KErrNone;
-	}
-	
-TInt TF32DefaultAttributes::GetStringAttribute(const TDesC8& /*aHeaderData*/, TInt aAttribute, TDes& aValue)
-	{
-	TInt err = KErrNone;
-	TBuf8 <KMaxDataTypeLength> mimeType;
-
-	switch(aAttribute)
-		{
-		case EMimeType:
-			aValue.Copy(KNullDesC());
-			break;
-		case EContentID:
-			aValue.Copy(KDefaultContentObject());
-			break;
-		default:
-			err = KErrCANotSupported;
-			break;
-		};
-	return err;
-	}
-	
-TInt TF32DefaultAttributes::GetStringAttributeSet(const TDesC8& aHeaderData, RStringAttributeSet& aStringAttributeSet)
-	{
-	TInt i = 0;
-	TInt attribute = 0;
-	TInt err = KErrNone;
-	TBuf <KMaxDataTypeLength> buf;
-
-	TInt numAttributes = aStringAttributeSet.Count();
-
-	// loop through all the attriutes in the set and find their values
-	for(i = 0; i < numAttributes; i++)
-		{
-		buf.SetLength(0);
-		attribute = aStringAttributeSet[i];
-		err = GetStringAttribute(aHeaderData, attribute, buf);
-		err = aStringAttributeSet.SetValue(attribute, buf, err);
-		if(err != KErrNone)
-			{
-			return err;
-			}
-		}	
-	return KErrNone;
-	}
-
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
--- a/contentmgmt/contentaccessfwfordrm/source/f32agent/f32defaultattributes.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/contentaccessfwfordrm/source/f32agent/f32defaultattributes.h	Wed Apr 14 17:48:59 2010 +0300
@@ -55,13 +55,6 @@
 		static TInt GetStringAttributeSet(RStringAttributeSet& aStringAttributeSet, RFile& aFile);
 		static void GetMimeTypeL(RFile& aFile, TDes8& aMimeType);
 		
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT		
-		static TInt GetAttribute(const TDesC8& aHeaderData, TInt aAttribute, TInt& aValue);
-		static TInt GetAttributeSet(const TDesC8& aHeaderData, RAttributeSet& aAttributeSet);
-		static TInt GetStringAttribute(const TDesC8& aHeaderData, TInt aAttribute, TDes& aValue);
-		static TInt GetStringAttributeSet(const TDesC8& aHeaderData, RStringAttributeSet& aStringAttributeSet);
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
 		static TInt CheckUniqueId(const TDesC& aUniqueId);
 		static TInt CheckVirtualPath(const TVirtualPathPtr& aVirtualPath);	
 		static TUint GetFileMode(TContentShareMode aMode);
--- a/contentmgmt/referencedrmagent/RefTestAgent/BWINS/rtaclient_v3u.def	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,86 +0,0 @@
-EXPORTS
-	??0RRtaData@ReferenceTestAgent@@QAE@XZ @ 1 NONAME ; ReferenceTestAgent::RRtaData::RRtaData(void)
-	??0RRtaRights@ReferenceTestAgent@@QAE@XZ @ 2 NONAME ; ReferenceTestAgent::RRtaRights::RRtaRights(void)
-	?AddRightsL@RRtaRights@ReferenceTestAgent@@QAEXAAVCRightsObject@2@@Z @ 3 NONAME ; void ReferenceTestAgent::RRtaRights::AddRightsL(class ReferenceTestAgent::CRightsObject &)
-	?ClearAllRightsL@RRtaRights@ReferenceTestAgent@@QAEXXZ @ 4 NONAME ; void ReferenceTestAgent::RRtaRights::ClearAllRightsL(void)
-	?Connect@RRtaRights@ReferenceTestAgent@@QAEHXZ @ 5 NONAME ; int ReferenceTestAgent::RRtaRights::Connect(void)
-	?DataSize@RRtaData@ReferenceTestAgent@@QAEHAA_J@Z @ 6 NONAME ; int ReferenceTestAgent::RRtaData::DataSize(long long &)
-	?DumpRightsDatabaseL@RRtaRights@ReferenceTestAgent@@QAEXABVTDesC16@@@Z @ 7 NONAME ; void ReferenceTestAgent::RRtaRights::DumpRightsDatabaseL(class TDesC16 const &)
-	?EvaluateIntentL@RRtaData@ReferenceTestAgent@@QAEXW4TIntent@ContentAccess@@@Z @ 8 NONAME ; void ReferenceTestAgent::RRtaData::EvaluateIntentL(enum ContentAccess::TIntent)
-	?ExecuteIntentL@RRtaData@ReferenceTestAgent@@QAEXW4TIntent@ContentAccess@@@Z @ 9 NONAME ; void ReferenceTestAgent::RRtaData::ExecuteIntentL(enum ContentAccess::TIntent)
-	?GetAttribute@RRtaData@ReferenceTestAgent@@QBEHHAAH@Z @ 10 NONAME ; int ReferenceTestAgent::RRtaData::GetAttribute(int, int &) const
-	?GetAttributeSet@RRtaData@ReferenceTestAgent@@QBEHAAVRAttributeSet@ContentAccess@@@Z @ 11 NONAME ; int ReferenceTestAgent::RRtaData::GetAttributeSet(class ContentAccess::RAttributeSet &) const
-	?GetStringAttribute@RRtaData@ReferenceTestAgent@@QBEHHAAVTDes16@@@Z @ 12 NONAME ; int ReferenceTestAgent::RRtaData::GetStringAttribute(int, class TDes16 &) const
-	?GetStringAttributeSet@RRtaData@ReferenceTestAgent@@QBEHAAVRStringAttributeSet@ContentAccess@@@Z @ 13 NONAME ; int ReferenceTestAgent::RRtaData::GetStringAttributeSet(class ContentAccess::RStringAttributeSet &) const
-	?Open@RRtaData@ReferenceTestAgent@@QAEHAAVRFile@@ABVTDesC16@@@Z @ 14 NONAME ; int ReferenceTestAgent::RRtaData::Open(class RFile &, class TDesC16 const &)
-	?Open@RRtaData@ReferenceTestAgent@@QAEHABVTDesC16@@0I@Z @ 15 NONAME ; int ReferenceTestAgent::RRtaData::Open(class TDesC16 const &, class TDesC16 const &, unsigned int)
-	?Read@RRtaData@ReferenceTestAgent@@QAEHAAVTDes8@@H@Z @ 16 NONAME ; int ReferenceTestAgent::RRtaData::Read(class TDes8 &, int)
-	?Seek@RRtaData@ReferenceTestAgent@@QBEHW4TSeek@@AA_J@Z @ 17 NONAME ; int ReferenceTestAgent::RRtaData::Seek(enum TSeek, long long &) const
-	??0RRtaManager@ReferenceTestAgent@@QAE@XZ @ 18 NONAME ; ReferenceTestAgent::RRtaManager::RRtaManager(void)
-	?Connect@RRtaManager@ReferenceTestAgent@@QAEHXZ @ 19 NONAME ; int ReferenceTestAgent::RRtaManager::Connect(void)
-	?CopyFile@RRtaManager@ReferenceTestAgent@@QBEHABVTDesC16@@0@Z @ 20 NONAME ; int ReferenceTestAgent::RRtaManager::CopyFile(class TDesC16 const &, class TDesC16 const &) const
-	?DeleteFile@RRtaManager@ReferenceTestAgent@@QBEHABVTDesC16@@@Z @ 21 NONAME ; int ReferenceTestAgent::RRtaManager::DeleteFile(class TDesC16 const &) const
-	?GetDir@RRtaManager@ReferenceTestAgent@@QBEHABVTDesC16@@IIAAPAVCDir@@1@Z @ 22 NONAME ; int ReferenceTestAgent::RRtaManager::GetDir(class TDesC16 const &, unsigned int, unsigned int, class CDir * &, class CDir * &) const
-	?GetDir@RRtaManager@ReferenceTestAgent@@QBEHABVTDesC16@@IIAAPAVCDir@@@Z @ 23 NONAME ; int ReferenceTestAgent::RRtaManager::GetDir(class TDesC16 const &, unsigned int, unsigned int, class CDir * &) const
-	?GetDir@RRtaManager@ReferenceTestAgent@@QBEHABVTDesC16@@VTUidType@@IAAPAVCDir@@@Z @ 24 NONAME ; int ReferenceTestAgent::RRtaManager::GetDir(class TDesC16 const &, class TUidType, unsigned int, class CDir * &) const
-	?MkDir@RRtaManager@ReferenceTestAgent@@QBEHABVTDesC16@@@Z @ 25 NONAME ; int ReferenceTestAgent::RRtaManager::MkDir(class TDesC16 const &) const
-	?MkDirAll@RRtaManager@ReferenceTestAgent@@QBEHABVTDesC16@@@Z @ 26 NONAME ; int ReferenceTestAgent::RRtaManager::MkDirAll(class TDesC16 const &) const
-	?RenameFile@RRtaManager@ReferenceTestAgent@@QBEHABVTDesC16@@0@Z @ 27 NONAME ; int ReferenceTestAgent::RRtaManager::RenameFile(class TDesC16 const &, class TDesC16 const &) const
-	?RmDir@RRtaManager@ReferenceTestAgent@@QBEHABVTDesC16@@@Z @ 28 NONAME ; int ReferenceTestAgent::RRtaManager::RmDir(class TDesC16 const &) const
-	?RenameDir@RRtaManager@ReferenceTestAgent@@QBEHABVTDesC16@@0@Z @ 29 NONAME ; int ReferenceTestAgent::RRtaManager::RenameDir(class TDesC16 const &, class TDesC16 const &) const
-	?GetAttribute@RRtaManager@ReferenceTestAgent@@QBEHABVTVirtualPathPtr@ContentAccess@@HAAH@Z @ 30 NONAME ; int ReferenceTestAgent::RRtaManager::GetAttribute(class ContentAccess::TVirtualPathPtr const &, int, int &) const
-	?GetAttributeSet@RRtaManager@ReferenceTestAgent@@QBEHABVTVirtualPathPtr@ContentAccess@@AAVRAttributeSet@4@@Z @ 31 NONAME ; int ReferenceTestAgent::RRtaManager::GetAttributeSet(class ContentAccess::TVirtualPathPtr const &, class ContentAccess::RAttributeSet &) const
-	?GetStringAttribute@RRtaManager@ReferenceTestAgent@@QBEHABVTVirtualPathPtr@ContentAccess@@HAAVTDes16@@@Z @ 32 NONAME ; int ReferenceTestAgent::RRtaManager::GetStringAttribute(class ContentAccess::TVirtualPathPtr const &, int, class TDes16 &) const
-	?GetStringAttributeSet@RRtaManager@ReferenceTestAgent@@QBEHABVTVirtualPathPtr@ContentAccess@@AAVRStringAttributeSet@4@@Z @ 33 NONAME ; int ReferenceTestAgent::RRtaManager::GetStringAttributeSet(class ContentAccess::TVirtualPathPtr const &, class ContentAccess::RStringAttributeSet &) const
-	??0RRtaContent@ReferenceTestAgent@@QAE@XZ @ 34 NONAME ; ReferenceTestAgent::RRtaContent::RRtaContent(void)
-	?CloseContainer@RRtaContent@ReferenceTestAgent@@QBEHXZ @ 35 NONAME ; int ReferenceTestAgent::RRtaContent::CloseContainer(void) const
-	?GetAttribute@RRtaContent@ReferenceTestAgent@@QBEHABVTDesC16@@HAAH@Z @ 36 NONAME ; int ReferenceTestAgent::RRtaContent::GetAttribute(class TDesC16 const &, int, int &) const
-	?GetAttributeSet@RRtaContent@ReferenceTestAgent@@QBEHABVTDesC16@@AAVRAttributeSet@ContentAccess@@@Z @ 37 NONAME ; int ReferenceTestAgent::RRtaContent::GetAttributeSet(class TDesC16 const &, class ContentAccess::RAttributeSet &) const
-	?GetEmbeddedObjectsL@RRtaContent@ReferenceTestAgent@@QBEXAAV?$RStreamablePtrArray@VCEmbeddedObject@ContentAccess@@@ContentAccess@@@Z @ 38 NONAME ; void ReferenceTestAgent::RRtaContent::GetEmbeddedObjectsL(class ContentAccess::RStreamablePtrArray<class ContentAccess::CEmbeddedObject> &) const
-	?GetEmbeddedObjectsL@RRtaContent@ReferenceTestAgent@@QBEXAAV?$RStreamablePtrArray@VCEmbeddedObject@ContentAccess@@@ContentAccess@@W4TEmbeddedType@4@@Z @ 39 NONAME ; void ReferenceTestAgent::RRtaContent::GetEmbeddedObjectsL(class ContentAccess::RStreamablePtrArray<class ContentAccess::CEmbeddedObject> &, enum ContentAccess::TEmbeddedType) const
-	?GetStringAttribute@RRtaContent@ReferenceTestAgent@@QBEHABVTDesC16@@HAAVTDes16@@@Z @ 40 NONAME ; int ReferenceTestAgent::RRtaContent::GetStringAttribute(class TDesC16 const &, int, class TDes16 &) const
-	?GetStringAttributeSet@RRtaContent@ReferenceTestAgent@@QBEHABVTDesC16@@AAVRStringAttributeSet@ContentAccess@@@Z @ 41 NONAME ; int ReferenceTestAgent::RRtaContent::GetStringAttributeSet(class TDesC16 const &, class ContentAccess::RStringAttributeSet &) const
-	?Open@RRtaContent@ReferenceTestAgent@@QAEHAAVRFile@@@Z @ 42 NONAME ; int ReferenceTestAgent::RRtaContent::Open(class RFile &)
-	?Open@RRtaContent@ReferenceTestAgent@@QAEHABVTDesC16@@I@Z @ 43 NONAME ; int ReferenceTestAgent::RRtaContent::Open(class TDesC16 const &, unsigned int)
-	?OpenContainer@RRtaContent@ReferenceTestAgent@@QBEHABVTDesC16@@@Z @ 44 NONAME ; int ReferenceTestAgent::RRtaContent::OpenContainer(class TDesC16 const &) const
-	?Search@RRtaContent@ReferenceTestAgent@@QBEHAAV?$RStreamablePtrArray@VCEmbeddedObject@ContentAccess@@@ContentAccess@@ABVTDesC8@@H@Z @ 45 NONAME ; int ReferenceTestAgent::RRtaContent::Search(class ContentAccess::RStreamablePtrArray<class ContentAccess::CEmbeddedObject> &, class TDesC8 const &, int) const
-	?CopyFile@RRtaManager@ReferenceTestAgent@@QBEHAAVRFile@@ABVTDesC16@@@Z @ 46 NONAME ; int ReferenceTestAgent::RRtaManager::CopyFile(class RFile &, class TDesC16 const &) const
-	?DeleteRightsByKeyL@RRtaRights@ReferenceTestAgent@@QAEXABVTDesC8@@@Z @ 47 NONAME ; void ReferenceTestAgent::RRtaRights::DeleteRightsByKeyL(class TDesC8 const &)
-	?EraseDeleteKeyL@RRtaRights@ReferenceTestAgent@@QAEXABVTDesC8@@@Z @ 48 NONAME ; void ReferenceTestAgent::RRtaRights::EraseDeleteKeyL(class TDesC8 const &)
-	?Read@RRtaData@ReferenceTestAgent@@QAEH_JAAVTDes8@@H@Z @ 49 NONAME ; int ReferenceTestAgent::RRtaData::Read(long long, class TDes8 &, int)
-	?ReloadRightsDatabaseL@RRtaRights@ReferenceTestAgent@@QAEXABVTDesC16@@@Z @ 50 NONAME ; void ReferenceTestAgent::RRtaRights::ReloadRightsDatabaseL(class TDesC16 const &)
-	?GetAttribute@RRtaManager@ReferenceTestAgent@@QBEHHAAHAAVRFile@@ABVTDesC16@@@Z @ 51 NONAME ; int ReferenceTestAgent::RRtaManager::GetAttribute(int, int &, class RFile &, class TDesC16 const &) const
-	?GetAttributeSet@RRtaManager@ReferenceTestAgent@@QBEHAAVRAttributeSet@ContentAccess@@AAVRFile@@ABVTDesC16@@@Z @ 52 NONAME ; int ReferenceTestAgent::RRtaManager::GetAttributeSet(class ContentAccess::RAttributeSet &, class RFile &, class TDesC16 const &) const
-	?GetStringAttribute@RRtaManager@ReferenceTestAgent@@QBEHHAAVTDes16@@AAVRFile@@ABVTDesC16@@@Z @ 53 NONAME ; int ReferenceTestAgent::RRtaManager::GetStringAttribute(int, class TDes16 &, class RFile &, class TDesC16 const &) const
-	?GetStringAttributeSet@RRtaManager@ReferenceTestAgent@@QBEHAAVRStringAttributeSet@ContentAccess@@AAVRFile@@ABVTDesC16@@@Z @ 54 NONAME ; int ReferenceTestAgent::RRtaManager::GetStringAttributeSet(class ContentAccess::RStringAttributeSet &, class RFile &, class TDesC16 const &) const
-	?CancelNotifyStatusChange@RRtaContent@ReferenceTestAgent@@QBEHABVTDesC16@@@Z @ 55 NONAME ; int ReferenceTestAgent::RRtaContent::CancelNotifyStatusChange(class TDesC16 const &) const
-	?DisplayInfoL@RRtaManager@ReferenceTestAgent@@QBEXW4TDisplayInfo@ContentAccess@@ABVTVirtualPathPtr@4@@Z @ 56 NONAME ; void ReferenceTestAgent::RRtaManager::DisplayInfoL(enum ContentAccess::TDisplayInfo, class ContentAccess::TVirtualPathPtr const &) const
-	?AgentSpecificCommand@RRtaManager@ReferenceTestAgent@@QBEHHABVTDesC8@@AAVTDes8@@@Z @ 57 NONAME ; int ReferenceTestAgent::RRtaManager::AgentSpecificCommand(int, class TDesC8 const &, class TDes8 &) const
-	?CancelNotifyStatusChange@RRtaManager@ReferenceTestAgent@@QBEHABVTDesC16@@@Z @ 58 NONAME ; int ReferenceTestAgent::RRtaManager::CancelNotifyStatusChange(class TDesC16 const &) const
-	?CancelRequestRights@RRtaContent@ReferenceTestAgent@@QBEHABVTDesC16@@@Z @ 59 NONAME ; int ReferenceTestAgent::RRtaContent::CancelRequestRights(class TDesC16 const &) const
-	?DisplayInfoL@RRtaContent@ReferenceTestAgent@@QBEXW4TDisplayInfo@ContentAccess@@ABVTDesC16@@@Z @ 60 NONAME ; void ReferenceTestAgent::RRtaContent::DisplayInfoL(enum ContentAccess::TDisplayInfo, class TDesC16 const &) const
-	?NotifyStatusChangeL@RRtaManager@ReferenceTestAgent@@QBEXABVTDesC16@@W4TEventMask@ContentAccess@@@Z @ 61 NONAME ; void ReferenceTestAgent::RRtaManager::NotifyStatusChangeL(class TDesC16 const &, enum ContentAccess::TEventMask) const
-	?DisplayManagementInfoL@RRtaManager@ReferenceTestAgent@@QBEXXZ @ 62 NONAME ; void ReferenceTestAgent::RRtaManager::DisplayManagementInfoL(void) const
-	?AgentSpecificCommand@RRtaContent@ReferenceTestAgent@@QBEHHABVTDesC8@@AAVTDes8@@@Z @ 63 NONAME ; int ReferenceTestAgent::RRtaContent::AgentSpecificCommand(int, class TDesC8 const &, class TDes8 &) const
-	?SetProperty@RRtaData@ReferenceTestAgent@@QBEHW4TAgentProperty@ContentAccess@@H@Z @ 64 NONAME ; int ReferenceTestAgent::RRtaData::SetProperty(enum ContentAccess::TAgentProperty, int) const
-	?SetProperty@RRtaManager@ReferenceTestAgent@@QBEHW4TAgentProperty@ContentAccess@@H@Z @ 65 NONAME ; int ReferenceTestAgent::RRtaManager::SetProperty(enum ContentAccess::TAgentProperty, int) const
-	?DisplayInfoL@RRtaManager@ReferenceTestAgent@@QBEXW4TDisplayInfo@ContentAccess@@AAVRFile@@ABVTDesC16@@@Z @ 66 NONAME ; void ReferenceTestAgent::RRtaManager::DisplayInfoL(enum ContentAccess::TDisplayInfo, class RFile &, class TDesC16 const &) const
-	?SetProperty@RRtaContent@ReferenceTestAgent@@QBEHW4TAgentProperty@ContentAccess@@H@Z @ 67 NONAME ; int ReferenceTestAgent::RRtaContent::SetProperty(enum ContentAccess::TAgentProperty, int) const
-	?RequestRightsL@RRtaContent@ReferenceTestAgent@@QBEXABVTDesC16@@@Z @ 68 NONAME ; void ReferenceTestAgent::RRtaContent::RequestRightsL(class TDesC16 const &) const
-	?NotifyStatusChangeL@RRtaContent@ReferenceTestAgent@@QBEXW4TEventMask@ContentAccess@@ABVTDesC16@@@Z @ 69 NONAME ; void ReferenceTestAgent::RRtaContent::NotifyStatusChangeL(enum ContentAccess::TEventMask, class TDesC16 const &) const
-	?GetWmdrmAttribute@RRtaContent@ReferenceTestAgent@@QBEHABVTDesC16@@HAAH@Z @ 70 NONAME ; int ReferenceTestAgent::RRtaContent::GetWmdrmAttribute(class TDesC16 const &, int, int &) const
-	?GetWmdrmStringAttribute@RRtaContent@ReferenceTestAgent@@QBEHABVTDesC16@@HAAVTDes16@@@Z @ 71 NONAME ; int ReferenceTestAgent::RRtaContent::GetWmdrmStringAttribute(class TDesC16 const &, int, class TDes16 &) const
-	?GetStringAttribute@RRtaManager@ReferenceTestAgent@@QBEHABVTDesC8@@HAAVTDes16@@@Z @ 72 NONAME ; int ReferenceTestAgent::RRtaManager::GetStringAttribute(class TDesC8 const &, int, class TDes16 &) const
-	?GetWmdrmAttributeSet@RRtaData@ReferenceTestAgent@@QBEHAAVRAttributeSet@ContentAccess@@@Z @ 73 NONAME ; int ReferenceTestAgent::RRtaData::GetWmdrmAttributeSet(class ContentAccess::RAttributeSet &) const
-	?GetWmdrmStringAttribute@RRtaData@ReferenceTestAgent@@QBEHHAAVTDes16@@@Z @ 74 NONAME ; int ReferenceTestAgent::RRtaData::GetWmdrmStringAttribute(int, class TDes16 &) const
-	?GetWmdrmAttributeSet@RRtaContent@ReferenceTestAgent@@QBEHABVTDesC16@@AAVRAttributeSet@ContentAccess@@@Z @ 75 NONAME ; int ReferenceTestAgent::RRtaContent::GetWmdrmAttributeSet(class TDesC16 const &, class ContentAccess::RAttributeSet &) const
-	?GetWmdrmAttribute@RRtaData@ReferenceTestAgent@@QBEHHAAH@Z @ 76 NONAME ; int ReferenceTestAgent::RRtaData::GetWmdrmAttribute(int, int &) const
-	?Open@RRtaData@ReferenceTestAgent@@QAEHABVTDesC8@@@Z @ 77 NONAME ; int ReferenceTestAgent::RRtaData::Open(class TDesC8 const &)
-	?Open@RRtaContent@ReferenceTestAgent@@QAEHABVTDesC8@@@Z @ 78 NONAME ; int ReferenceTestAgent::RRtaContent::Open(class TDesC8 const &)
-	?Read@RRtaData@ReferenceTestAgent@@QAEHABVTDesC8@@AAVTDes8@@@Z @ 79 NONAME ; int ReferenceTestAgent::RRtaData::Read(class TDesC8 const &, class TDes8 &)
-	?GetAttribute@RRtaManager@ReferenceTestAgent@@QBEHABVTDesC8@@HAAH@Z @ 80 NONAME ; int ReferenceTestAgent::RRtaManager::GetAttribute(class TDesC8 const &, int, int &) const
-	?GetStringAttributeSet@RRtaManager@ReferenceTestAgent@@QBEHABVTDesC8@@AAVRStringAttributeSet@ContentAccess@@@Z @ 81 NONAME ; int ReferenceTestAgent::RRtaManager::GetStringAttributeSet(class TDesC8 const &, class ContentAccess::RStringAttributeSet &) const
-	?GetWmdrmStringAttributeSet@RRtaContent@ReferenceTestAgent@@QBEHABVTDesC16@@AAVRStringAttributeSet@ContentAccess@@@Z @ 82 NONAME ; int ReferenceTestAgent::RRtaContent::GetWmdrmStringAttributeSet(class TDesC16 const &, class ContentAccess::RStringAttributeSet &) const
-	?GetAttributeSet@RRtaManager@ReferenceTestAgent@@QBEHABVTDesC8@@AAVRAttributeSet@ContentAccess@@@Z @ 83 NONAME ; int ReferenceTestAgent::RRtaManager::GetAttributeSet(class TDesC8 const &, class ContentAccess::RAttributeSet &) const
-	?GetWmdrmStringAttributeSet@RRtaData@ReferenceTestAgent@@QBEHAAVRStringAttributeSet@ContentAccess@@@Z @ 84 NONAME ; int ReferenceTestAgent::RRtaData::GetWmdrmStringAttributeSet(class ContentAccess::RStringAttributeSet &) const
-
--- a/contentmgmt/referencedrmagent/RefTestAgent/BWINS/rtaparser_v3u.def	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,47 +0,0 @@
-EXPORTS
-	?Cid@CDrmFileContent@ReferenceTestAgent@@QAEABVTDesC8@@XZ @ 1 NONAME ; class TDesC8 const & ReferenceTestAgent::CDrmFileContent::Cid(void)
-	?Cid@CRightsObject@ReferenceTestAgent@@QAEABVTDesC8@@XZ @ 2 NONAME ; class TDesC8 const & ReferenceTestAgent::CRightsObject::Cid(void)
-	?CloseContainer@CDrmFiles@ReferenceTestAgent@@QAEHXZ @ 3 NONAME ; int ReferenceTestAgent::CDrmFiles::CloseContainer(void)
-	?CurrentContainer@CDrmFiles@ReferenceTestAgent@@QAEAAVCDrmFileContainer@2@XZ @ 4 NONAME ; class ReferenceTestAgent::CDrmFileContainer & ReferenceTestAgent::CDrmFiles::CurrentContainer(void)
-	?DrmFilesL@CDrmFilesParser@ReferenceTestAgent@@QAEAAVCDrmFiles@2@XZ @ 5 NONAME ; class ReferenceTestAgent::CDrmFiles & ReferenceTestAgent::CDrmFilesParser::DrmFilesL(void)
-	?DrmRightsL@CDrmRightsParser@ReferenceTestAgent@@QAEAAVCDrmRights@2@XZ @ 6 NONAME ; class ReferenceTestAgent::CDrmRights & ReferenceTestAgent::CDrmRightsParser::DrmRightsL(void)
-	?EvaluateIntent@CRightsObject@ReferenceTestAgent@@QAEHW4TIntent@ContentAccess@@@Z @ 7 NONAME ; int ReferenceTestAgent::CRightsObject::EvaluateIntent(enum ContentAccess::TIntent)
-	?ExecuteIntentL@CRightsObject@ReferenceTestAgent@@QAEXW4TIntent@ContentAccess@@@Z @ 8 NONAME ; void ReferenceTestAgent::CRightsObject::ExecuteIntentL(enum ContentAccess::TIntent)
-	?ExternalizeL@CRightsObject@ReferenceTestAgent@@QAEXAAVRWriteStream@@@Z @ 9 NONAME ; void ReferenceTestAgent::CRightsObject::ExternalizeL(class RWriteStream &)
-	?FindL@CDrmFiles@ReferenceTestAgent@@QAEAAVCDrmFileContent@2@ABVTDesC16@@@Z @ 10 NONAME ; class ReferenceTestAgent::CDrmFileContent & ReferenceTestAgent::CDrmFiles::FindL(class TDesC16 const &)
-	?GetAttribute@CDrmFileContent@ReferenceTestAgent@@QAEHHAAH@Z @ 11 NONAME ; int ReferenceTestAgent::CDrmFileContent::GetAttribute(int, int &)
-	?GetAttributeSet@CDrmFileContent@ReferenceTestAgent@@QAEHAAVRAttributeSet@ContentAccess@@@Z @ 12 NONAME ; int ReferenceTestAgent::CDrmFileContent::GetAttributeSet(class ContentAccess::RAttributeSet &)
-	?GetEmbeddedObjectsL@CDrmFileContainer@ReferenceTestAgent@@QAEXAAV?$RStreamablePtrArray@VCEmbeddedObject@ContentAccess@@@ContentAccess@@@Z @ 13 NONAME ; void ReferenceTestAgent::CDrmFileContainer::GetEmbeddedObjectsL(class ContentAccess::RStreamablePtrArray<class ContentAccess::CEmbeddedObject> &)
-	?GetEmbeddedObjectsL@CDrmFileContainer@ReferenceTestAgent@@QAEXAAV?$RStreamablePtrArray@VCEmbeddedObject@ContentAccess@@@ContentAccess@@W4TEmbeddedType@4@@Z @ 14 NONAME ; void ReferenceTestAgent::CDrmFileContainer::GetEmbeddedObjectsL(class ContentAccess::RStreamablePtrArray<class ContentAccess::CEmbeddedObject> &, enum ContentAccess::TEmbeddedType)
-	?GetStringAttribute@CDrmFileContent@ReferenceTestAgent@@QAEHHAAVTDes16@@@Z @ 15 NONAME ; int ReferenceTestAgent::CDrmFileContent::GetStringAttribute(int, class TDes16 &)
-	?GetStringAttributeSet@CDrmFileContent@ReferenceTestAgent@@QAEHAAVRStringAttributeSet@ContentAccess@@@Z @ 16 NONAME ; int ReferenceTestAgent::CDrmFileContent::GetStringAttributeSet(class ContentAccess::RStringAttributeSet &)
-	?MergeL@CRightsObject@ReferenceTestAgent@@QAEXAAV12@@Z @ 17 NONAME ; void ReferenceTestAgent::CRightsObject::MergeL(class ReferenceTestAgent::CRightsObject &)
-	?NewL@CDrmFilesParser@ReferenceTestAgent@@SAPAV12@AAVCVirtualFile@2@@Z @ 18 NONAME ; class ReferenceTestAgent::CDrmFilesParser * ReferenceTestAgent::CDrmFilesParser::NewL(class ReferenceTestAgent::CVirtualFile &)
-	?NewL@CDrmRightsParser@ReferenceTestAgent@@SAPAV12@AAVCVirtualFile@2@@Z @ 19 NONAME ; class ReferenceTestAgent::CDrmRightsParser * ReferenceTestAgent::CDrmRightsParser::NewL(class ReferenceTestAgent::CVirtualFile &)
-	?NewL@CDrmRightsParser@ReferenceTestAgent@@SAPAV12@XZ @ 20 NONAME ; class ReferenceTestAgent::CDrmRightsParser * ReferenceTestAgent::CDrmRightsParser::NewL(void)
-	?NewL@CRightsObject@ReferenceTestAgent@@SAPAV12@AAVRReadStream@@H@Z @ 21 NONAME ; class ReferenceTestAgent::CRightsObject * ReferenceTestAgent::CRightsObject::NewL(class RReadStream &, int)
-	?OpenContainer@CDrmFiles@ReferenceTestAgent@@QAEHABVTDesC16@@@Z @ 22 NONAME ; int ReferenceTestAgent::CDrmFiles::OpenContainer(class TDesC16 const &)
-	?ParseL@CDrmRightsParser@ReferenceTestAgent@@QAEXABVTDesC8@@@Z @ 23 NONAME ; void ReferenceTestAgent::CDrmRightsParser::ParseL(class TDesC8 const &)
-	?Read@CDrmFileContent@ReferenceTestAgent@@QAEHAAVTDes8@@H@Z @ 24 NONAME ; int ReferenceTestAgent::CDrmFileContent::Read(class TDes8 &, int)
-	?Search@CDrmFileContainer@ReferenceTestAgent@@QAEHAAV?$RStreamablePtrArray@VCEmbeddedObject@ContentAccess@@@ContentAccess@@ABVTDesC8@@H@Z @ 25 NONAME ; int ReferenceTestAgent::CDrmFileContainer::Search(class ContentAccess::RStreamablePtrArray<class ContentAccess::CEmbeddedObject> &, class TDesC8 const &, int)
-	?Seek@CDrmFileContent@ReferenceTestAgent@@QAEHW4TSeek@@AA_J@Z @ 26 NONAME ; int ReferenceTestAgent::CDrmFileContent::Seek(enum TSeek, long long &)
-	?Size@CDrmFileContent@ReferenceTestAgent@@QAEHAA_J@Z @ 27 NONAME ; int ReferenceTestAgent::CDrmFileContent::Size(long long &)
-	?WriteDescription@CRightsObject@ReferenceTestAgent@@QAEXAAVRFile@@@Z @ 28 NONAME ; void ReferenceTestAgent::CRightsObject::WriteDescription(class RFile &)
-	?Content@CDrmFiles@ReferenceTestAgent@@QAEAAVCDrmFileContent@2@H@Z @ 29 NONAME ; class ReferenceTestAgent::CDrmFileContent & ReferenceTestAgent::CDrmFiles::Content(int)
-	?ContentCount@CDrmFiles@ReferenceTestAgent@@QAEHXZ @ 30 NONAME ; int ReferenceTestAgent::CDrmFiles::ContentCount(void)
-	?FindL@CDrmFiles@ReferenceTestAgent@@QAEAAVCDrmFileContent@2@ABVTDesC8@@@Z @ 31 NONAME ; class ReferenceTestAgent::CDrmFileContent & ReferenceTestAgent::CDrmFiles::FindL(class TDesC8 const &)
-	?Remove@CDrmRights@ReferenceTestAgent@@QAEXH@Z @ 32 NONAME ; void ReferenceTestAgent::CDrmRights::Remove(int)
-	?Rights@CDrmRights@ReferenceTestAgent@@QAEAAVCRightsObject@2@H@Z @ 33 NONAME ; class ReferenceTestAgent::CRightsObject & ReferenceTestAgent::CDrmRights::Rights(int)
-	?RightsCount@CDrmRights@ReferenceTestAgent@@QAEHXZ @ 34 NONAME ; int ReferenceTestAgent::CDrmRights::RightsCount(void)
-	?SetCommonSourceFileL@CDrmFileContent@ReferenceTestAgent@@QAEXAAVRFile64@@AAVRSemaphore@@_J2@Z @ 35 NONAME ; void ReferenceTestAgent::CDrmFileContent::SetCommonSourceFileL(class RFile64 &, class RSemaphore &, long long, long long)
-	?MimeType@CDrmFileContent@ReferenceTestAgent@@QAEABVTDesC8@@XZ @ 36 NONAME ; class TDesC8 const & ReferenceTestAgent::CDrmFileContent::MimeType(void)
-	?SetEntireFileL@CDrmFiles@ReferenceTestAgent@@QAEXAAVRFile64@@AAVRSemaphore@@_J2@Z @ 37 NONAME ; void ReferenceTestAgent::CDrmFiles::SetEntireFileL(class RFile64 &, class RSemaphore &, long long, long long)
-	?SetDeleteKeyL@CRightsObject@ReferenceTestAgent@@QAEXABVTDesC8@@@Z @ 38 NONAME ; void ReferenceTestAgent::CRightsObject::SetDeleteKeyL(class TDesC8 const &)
-	?DeleteKey@CRightsObject@ReferenceTestAgent@@QAEABVTDesC8@@XZ @ 39 NONAME ; class TDesC8 const & ReferenceTestAgent::CRightsObject::DeleteKey(void)
-	?Read@CDrmFileContent@ReferenceTestAgent@@QAEH_JAAVTDes8@@H@Z @ 40 NONAME ; int ReferenceTestAgent::CDrmFileContent::Read(long long, class TDes8 &, int)
-	?GetStringAttribute@CWmdrmContentParser@ReferenceTestAgent@@QBEHHAAVTDes16@@@Z @ 41 NONAME ; int ReferenceTestAgent::CWmdrmContentParser::GetStringAttribute(int, class TDes16 &) const
-	?GetAttribute@CWmdrmContentParser@ReferenceTestAgent@@QBEHHAAH@Z @ 42 NONAME ; int ReferenceTestAgent::CWmdrmContentParser::GetAttribute(int, int &) const
-	?GetStringAttributeSetL@CWmdrmContentParser@ReferenceTestAgent@@QBEXAAVRStringAttributeSet@ContentAccess@@@Z @ 43 NONAME ; void ReferenceTestAgent::CWmdrmContentParser::GetStringAttributeSetL(class ContentAccess::RStringAttributeSet &) const
-	?GetAttributeSet@CWmdrmContentParser@ReferenceTestAgent@@QBEHAAVRAttributeSet@ContentAccess@@@Z @ 44 NONAME ; int ReferenceTestAgent::CWmdrmContentParser::GetAttributeSet(class ContentAccess::RAttributeSet &) const
-	?NewL@CWmdrmContentParser@ReferenceTestAgent@@SAPAV12@ABVTDesC8@@@Z @ 45 NONAME ; class ReferenceTestAgent::CWmdrmContentParser * ReferenceTestAgent::CWmdrmContentParser::NewL(class TDesC8 const &)
-
--- a/contentmgmt/referencedrmagent/RefTestAgent/EABI/rtaParser_v3u.DEF	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,87 +0,0 @@
-EXPORTS
-	_ZN18ReferenceTestAgent10CDrmRights11RightsCountEv @ 1 NONAME
-	_ZN18ReferenceTestAgent10CDrmRights6RemoveEi @ 2 NONAME
-	_ZN18ReferenceTestAgent10CDrmRights6RightsEi @ 3 NONAME
-	_ZN18ReferenceTestAgent13CRightsObject12ExternalizeLER12RWriteStream @ 4 NONAME
-	_ZN18ReferenceTestAgent13CRightsObject14EvaluateIntentEN13ContentAccess7TIntentE @ 5 NONAME
-	_ZN18ReferenceTestAgent13CRightsObject14ExecuteIntentLEN13ContentAccess7TIntentE @ 6 NONAME
-	_ZN18ReferenceTestAgent13CRightsObject3CidEv @ 7 NONAME
-	_ZN18ReferenceTestAgent13CRightsObject4NewLER11RReadStreami @ 8 NONAME
-	_ZN18ReferenceTestAgent13CRightsObject6MergeLERS0_ @ 9 NONAME
-	_ZN18ReferenceTestAgent15CDrmFileContent12GetAttributeEiRi @ 10 NONAME
-	_ZN18ReferenceTestAgent15CDrmFileContent15GetAttributeSetERN13ContentAccess13RAttributeSetE @ 11 NONAME
-	_ZN18ReferenceTestAgent15CDrmFileContent18GetStringAttributeEiR6TDes16 @ 12 NONAME
-	_ZN18ReferenceTestAgent15CDrmFileContent20SetCommonSourceFileLER7RFile64R10RSemaphorexx @ 13 NONAME
-	_ZN18ReferenceTestAgent15CDrmFileContent21GetStringAttributeSetERN13ContentAccess19RStringAttributeSetE @ 14 NONAME
-	_ZN18ReferenceTestAgent15CDrmFileContent3CidEv @ 15 NONAME
-	_ZN18ReferenceTestAgent15CDrmFileContent4ReadER5TDes8i @ 16 NONAME
-	_ZN18ReferenceTestAgent15CDrmFileContent4SeekE5TSeekRx @ 17 NONAME
-	_ZN18ReferenceTestAgent15CDrmFileContent4SizeERx @ 18 NONAME
-	_ZN18ReferenceTestAgent15CDrmFileContent8MimeTypeEv @ 19 NONAME
-	_ZN18ReferenceTestAgent15CDrmFilesParser4NewLERNS_12CVirtualFileE @ 20 NONAME
-	_ZN18ReferenceTestAgent15CDrmFilesParser9DrmFilesLEv @ 21 NONAME
-	_ZN18ReferenceTestAgent16CDrmRightsParser10DrmRightsLEv @ 22 NONAME
-	_ZN18ReferenceTestAgent16CDrmRightsParser4NewLERNS_12CVirtualFileE @ 23 NONAME
-	_ZN18ReferenceTestAgent16CDrmRightsParser4NewLEv @ 24 NONAME
-	_ZN18ReferenceTestAgent16CDrmRightsParser6ParseLERK6TDesC8 @ 25 NONAME
-	_ZN18ReferenceTestAgent17CDrmFileContainer19GetEmbeddedObjectsLERN13ContentAccess19RStreamablePtrArrayINS1_15CEmbeddedObjectEEE @ 26 NONAME
-	_ZN18ReferenceTestAgent17CDrmFileContainer19GetEmbeddedObjectsLERN13ContentAccess19RStreamablePtrArrayINS1_15CEmbeddedObjectEEENS1_13TEmbeddedTypeE @ 27 NONAME
-	_ZN18ReferenceTestAgent17CDrmFileContainer6SearchERN13ContentAccess19RStreamablePtrArrayINS1_15CEmbeddedObjectEEERK6TDesC8i @ 28 NONAME
-	_ZN18ReferenceTestAgent9CDrmFiles12ContentCountEv @ 29 NONAME
-	_ZN18ReferenceTestAgent9CDrmFiles13OpenContainerERK7TDesC16 @ 30 NONAME
-	_ZN18ReferenceTestAgent9CDrmFiles14CloseContainerEv @ 31 NONAME
-	_ZN18ReferenceTestAgent9CDrmFiles16CurrentContainerEv @ 32 NONAME
-	_ZN18ReferenceTestAgent9CDrmFiles5FindLERK6TDesC8 @ 33 NONAME
-	_ZN18ReferenceTestAgent9CDrmFiles5FindLERK7TDesC16 @ 34 NONAME
-	_ZN18ReferenceTestAgent9CDrmFiles7ContentEi @ 35 NONAME
-	_ZTIN18ReferenceTestAgent10CDrmRightsE @ 36 NONAME ; #<TI>#
-	_ZTIN18ReferenceTestAgent13CExpiryParserE @ 37 NONAME ; #<TI>#
-	_ZTIN18ReferenceTestAgent13CIntentParserE @ 38 NONAME ; #<TI>#
-	_ZTIN18ReferenceTestAgent13CRightsObjectE @ 39 NONAME ; #<TI>#
-	_ZTIN18ReferenceTestAgent13CRightsParserE @ 40 NONAME ; #<TI>#
-	_ZTIN18ReferenceTestAgent13CStringParserE @ 41 NONAME ; #<TI>#
-	_ZTIN18ReferenceTestAgent14CContentParserE @ 42 NONAME ; #<TI>#
-	_ZTIN18ReferenceTestAgent15CDrmFileContentE @ 43 NONAME ; #<TI>#
-	_ZTIN18ReferenceTestAgent15CDrmFilesParserE @ 44 NONAME ; #<TI>#
-	_ZTIN18ReferenceTestAgent16CAttributeParserE @ 45 NONAME ; #<TI>#
-	_ZTIN18ReferenceTestAgent16CContainerParserE @ 46 NONAME ; #<TI>#
-	_ZTIN18ReferenceTestAgent16CDrmRightsParserE @ 47 NONAME ; #<TI>#
-	_ZTIN18ReferenceTestAgent17CDrmFileContainerE @ 48 NONAME ; #<TI>#
-	_ZTIN18ReferenceTestAgent17CParseHandlerBaseE @ 49 NONAME ; #<TI>#
-	_ZTIN18ReferenceTestAgent20CRightsCriteriaCountE @ 50 NONAME ; #<TI>#
-	_ZTIN18ReferenceTestAgent21CRightsCriteriaExpiryE @ 51 NONAME ; #<TI>#
-	_ZTIN18ReferenceTestAgent22CStringAttributeParserE @ 52 NONAME ; #<TI>#
-	_ZTIN18ReferenceTestAgent7CIntentE @ 53 NONAME ; #<TI>#
-	_ZTIN18ReferenceTestAgent9CDrmFilesE @ 54 NONAME ; #<TI>#
-	_ZTIN18ReferenceTestAgent9MCriteriaE @ 55 NONAME ; #<TI>#
-	_ZTVN18ReferenceTestAgent10CDrmRightsE @ 56 NONAME ; #<VT>#
-	_ZTVN18ReferenceTestAgent13CExpiryParserE @ 57 NONAME ; #<VT>#
-	_ZTVN18ReferenceTestAgent13CIntentParserE @ 58 NONAME ; #<VT>#
-	_ZTVN18ReferenceTestAgent13CRightsObjectE @ 59 NONAME ; #<VT>#
-	_ZTVN18ReferenceTestAgent13CRightsParserE @ 60 NONAME ; #<VT>#
-	_ZTVN18ReferenceTestAgent13CStringParserE @ 61 NONAME ; #<VT>#
-	_ZTVN18ReferenceTestAgent14CContentParserE @ 62 NONAME ; #<VT>#
-	_ZTVN18ReferenceTestAgent15CDrmFileContentE @ 63 NONAME ; #<VT>#
-	_ZTVN18ReferenceTestAgent15CDrmFilesParserE @ 64 NONAME ; #<VT>#
-	_ZTVN18ReferenceTestAgent16CAttributeParserE @ 65 NONAME ; #<VT>#
-	_ZTVN18ReferenceTestAgent16CContainerParserE @ 66 NONAME ; #<VT>#
-	_ZTVN18ReferenceTestAgent16CDrmRightsParserE @ 67 NONAME ; #<VT>#
-	_ZTVN18ReferenceTestAgent17CDrmFileContainerE @ 68 NONAME ; #<VT>#
-	_ZTVN18ReferenceTestAgent17CParseHandlerBaseE @ 69 NONAME ; #<VT>#
-	_ZTVN18ReferenceTestAgent20CRightsCriteriaCountE @ 70 NONAME ; #<VT>#
-	_ZTVN18ReferenceTestAgent21CRightsCriteriaExpiryE @ 71 NONAME ; #<VT>#
-	_ZTVN18ReferenceTestAgent22CStringAttributeParserE @ 72 NONAME ; #<VT>#
-	_ZTVN18ReferenceTestAgent7CIntentE @ 73 NONAME ; #<VT>#
-	_ZTVN18ReferenceTestAgent9CDrmFilesE @ 74 NONAME ; #<VT>#
-	_ZTVN18ReferenceTestAgent9MCriteriaE @ 75 NONAME ; #<VT>#
-	_ZN18ReferenceTestAgent13CRightsObject16WriteDescriptionER5RFile @ 76 NONAME
-	_ZN18ReferenceTestAgent9CDrmFiles14SetEntireFileLER7RFile64R10RSemaphorexx @ 77 NONAME
-	_ZN18ReferenceTestAgent13CRightsObject13SetDeleteKeyLERK6TDesC8 @ 78 NONAME
-	_ZN18ReferenceTestAgent13CRightsObject9DeleteKeyEv @ 79 NONAME
-	_ZN18ReferenceTestAgent15CDrmFileContent4ReadExR5TDes8i @ 80 NONAME
-	_ZN18ReferenceTestAgent19CWmdrmContentParser4NewLERK6TDesC8 @ 81 NONAME
-	_ZNK18ReferenceTestAgent19CWmdrmContentParser12GetAttributeEiRi @ 82 NONAME
-	_ZNK18ReferenceTestAgent19CWmdrmContentParser15GetAttributeSetERN13ContentAccess13RAttributeSetE @ 83 NONAME
-	_ZNK18ReferenceTestAgent19CWmdrmContentParser18GetStringAttributeEiR6TDes16 @ 84 NONAME
-	_ZNK18ReferenceTestAgent19CWmdrmContentParser22GetStringAttributeSetLERN13ContentAccess19RStringAttributeSetE @ 85 NONAME
-
--- a/contentmgmt/referencedrmagent/RefTestAgent/EABI/rtaclient_v3u.DEF	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,90 +0,0 @@
-EXPORTS
-	_ZN18ReferenceTestAgent10RRtaRights10AddRightsLERNS_13CRightsObjectE @ 1 NONAME
-	_ZN18ReferenceTestAgent10RRtaRights15ClearAllRightsLEv @ 2 NONAME
-	_ZN18ReferenceTestAgent10RRtaRights19DumpRightsDatabaseLERK7TDesC16 @ 3 NONAME
-	_ZN18ReferenceTestAgent10RRtaRights7ConnectEv @ 4 NONAME
-	_ZN18ReferenceTestAgent10RRtaRightsC1Ev @ 5 NONAME
-	_ZN18ReferenceTestAgent10RRtaRightsC2Ev @ 6 NONAME
-	_ZN18ReferenceTestAgent8RRtaData14ExecuteIntentLEN13ContentAccess7TIntentE @ 7 NONAME
-	_ZN18ReferenceTestAgent8RRtaData15EvaluateIntentLEN13ContentAccess7TIntentE @ 8 NONAME
-	_ZN18ReferenceTestAgent8RRtaData4OpenER5RFileRK7TDesC16 @ 9 NONAME
-	_ZN18ReferenceTestAgent8RRtaData4OpenERK7TDesC16S3_j @ 10 NONAME
-	_ZN18ReferenceTestAgent8RRtaData4ReadER5TDes8i @ 11 NONAME
-	_ZN18ReferenceTestAgent8RRtaData8DataSizeERx @ 12 NONAME
-	_ZN18ReferenceTestAgent8RRtaDataC1Ev @ 13 NONAME
-	_ZN18ReferenceTestAgent8RRtaDataC2Ev @ 14 NONAME
-	_ZNK18ReferenceTestAgent8RRtaData12GetAttributeEiRi @ 15 NONAME
-	_ZNK18ReferenceTestAgent8RRtaData15GetAttributeSetERN13ContentAccess13RAttributeSetE @ 16 NONAME
-	_ZNK18ReferenceTestAgent8RRtaData18GetStringAttributeEiR6TDes16 @ 17 NONAME
-	_ZNK18ReferenceTestAgent8RRtaData21GetStringAttributeSetERN13ContentAccess19RStringAttributeSetE @ 18 NONAME
-	_ZNK18ReferenceTestAgent8RRtaData4SeekE5TSeekRx @ 19 NONAME
-	_ZN18ReferenceTestAgent11RRtaManager7ConnectEv @ 20 NONAME
-	_ZN18ReferenceTestAgent11RRtaManagerC1Ev @ 21 NONAME
-	_ZN18ReferenceTestAgent11RRtaManagerC2Ev @ 22 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager10DeleteFileERK7TDesC16 @ 23 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager10RenameFileERK7TDesC16S3_ @ 24 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager12GetAttributeERKN13ContentAccess15TVirtualPathPtrEiRi @ 25 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager15GetAttributeSetERKN13ContentAccess15TVirtualPathPtrERNS1_13RAttributeSetE @ 26 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager18GetStringAttributeERKN13ContentAccess15TVirtualPathPtrEiR6TDes16 @ 27 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager21GetStringAttributeSetERKN13ContentAccess15TVirtualPathPtrERNS1_19RStringAttributeSetE @ 28 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager5MkDirERK7TDesC16 @ 29 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager5RmDirERK7TDesC16 @ 30 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager6GetDirERK7TDesC168TUidTypejRP4CDir @ 31 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager6GetDirERK7TDesC16jjRP4CDir @ 32 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager6GetDirERK7TDesC16jjRP4CDirS6_ @ 33 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager8CopyFileERK7TDesC16S3_ @ 34 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager8MkDirAllERK7TDesC16 @ 35 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager9RenameDirERK7TDesC16S3_ @ 36 NONAME
-	_ZN18ReferenceTestAgent11RRtaContent4OpenER5RFile @ 37 NONAME
-	_ZN18ReferenceTestAgent11RRtaContent4OpenERK7TDesC16j @ 38 NONAME
-	_ZN18ReferenceTestAgent11RRtaContentC1Ev @ 39 NONAME
-	_ZN18ReferenceTestAgent11RRtaContentC2Ev @ 40 NONAME
-	_ZNK18ReferenceTestAgent11RRtaContent12GetAttributeERK7TDesC16iRi @ 41 NONAME
-	_ZNK18ReferenceTestAgent11RRtaContent13OpenContainerERK7TDesC16 @ 42 NONAME
-	_ZNK18ReferenceTestAgent11RRtaContent14CloseContainerEv @ 43 NONAME
-	_ZNK18ReferenceTestAgent11RRtaContent15GetAttributeSetERK7TDesC16RN13ContentAccess13RAttributeSetE @ 44 NONAME
-	_ZNK18ReferenceTestAgent11RRtaContent18GetStringAttributeERK7TDesC16iR6TDes16 @ 45 NONAME
-	_ZNK18ReferenceTestAgent11RRtaContent19GetEmbeddedObjectsLERN13ContentAccess19RStreamablePtrArrayINS1_15CEmbeddedObjectEEE @ 46 NONAME
-	_ZNK18ReferenceTestAgent11RRtaContent19GetEmbeddedObjectsLERN13ContentAccess19RStreamablePtrArrayINS1_15CEmbeddedObjectEEENS1_13TEmbeddedTypeE @ 47 NONAME
-	_ZNK18ReferenceTestAgent11RRtaContent21GetStringAttributeSetERK7TDesC16RN13ContentAccess19RStringAttributeSetE @ 48 NONAME
-	_ZNK18ReferenceTestAgent11RRtaContent6SearchERN13ContentAccess19RStreamablePtrArrayINS1_15CEmbeddedObjectEEERK6TDesC8i @ 49 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager8CopyFileER5RFileRK7TDesC16 @ 50 NONAME
-	_ZN18ReferenceTestAgent10RRtaRights18DeleteRightsByKeyLERK6TDesC8 @ 51 NONAME
-	_ZN18ReferenceTestAgent10RRtaRights15EraseDeleteKeyLERK6TDesC8 @ 52 NONAME
-	_ZN18ReferenceTestAgent8RRtaData4ReadExR5TDes8i @ 53 NONAME
-	_ZN18ReferenceTestAgent10RRtaRights21ReloadRightsDatabaseLERK7TDesC16 @ 54 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager12GetAttributeEiRiR5RFileRK7TDesC16 @ 55 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager15GetAttributeSetERN13ContentAccess13RAttributeSetER5RFileRK7TDesC16 @ 56 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager18GetStringAttributeEiR6TDes16R5RFileRK7TDesC16 @ 57 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager21GetStringAttributeSetERN13ContentAccess19RStringAttributeSetER5RFileRK7TDesC16 @ 58 NONAME
-	_ZNK18ReferenceTestAgent11RRtaContent11SetPropertyEN13ContentAccess14TAgentPropertyEi @ 59 NONAME
-	_ZNK18ReferenceTestAgent11RRtaContent12DisplayInfoLEN13ContentAccess12TDisplayInfoERK7TDesC16 @ 60 NONAME
-	_ZNK18ReferenceTestAgent11RRtaContent14RequestRightsLERK7TDesC16 @ 61 NONAME
-	_ZNK18ReferenceTestAgent11RRtaContent19CancelRequestRightsERK7TDesC16 @ 62 NONAME
-	_ZNK18ReferenceTestAgent11RRtaContent19NotifyStatusChangeLEN13ContentAccess10TEventMaskERK7TDesC16 @ 63 NONAME
-	_ZNK18ReferenceTestAgent11RRtaContent20AgentSpecificCommandEiRK6TDesC8R5TDes8 @ 64 NONAME
-	_ZNK18ReferenceTestAgent11RRtaContent24CancelNotifyStatusChangeERK7TDesC16 @ 65 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager11SetPropertyEN13ContentAccess14TAgentPropertyEi @ 66 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager12DisplayInfoLEN13ContentAccess12TDisplayInfoER5RFileRK7TDesC16 @ 67 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager12DisplayInfoLEN13ContentAccess12TDisplayInfoERKNS1_15TVirtualPathPtrE @ 68 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager19NotifyStatusChangeLERK7TDesC16N13ContentAccess10TEventMaskE @ 69 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager20AgentSpecificCommandEiRK6TDesC8R5TDes8 @ 70 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager22DisplayManagementInfoLEv @ 71 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager24CancelNotifyStatusChangeERK7TDesC16 @ 72 NONAME
-	_ZNK18ReferenceTestAgent8RRtaData11SetPropertyEN13ContentAccess14TAgentPropertyEi @ 73 NONAME
-	_ZN18ReferenceTestAgent11RRtaContent4OpenERK6TDesC8 @ 74 NONAME
-	_ZN18ReferenceTestAgent8RRtaData4OpenERK6TDesC8 @ 75 NONAME
-	_ZN18ReferenceTestAgent8RRtaData4ReadERK6TDesC8R5TDes8 @ 76 NONAME
-	_ZNK18ReferenceTestAgent11RRtaContent17GetWmdrmAttributeERK7TDesC16iRi @ 77 NONAME
-	_ZNK18ReferenceTestAgent11RRtaContent20GetWmdrmAttributeSetERK7TDesC16RN13ContentAccess13RAttributeSetE @ 78 NONAME
-	_ZNK18ReferenceTestAgent11RRtaContent23GetWmdrmStringAttributeERK7TDesC16iR6TDes16 @ 79 NONAME
-	_ZNK18ReferenceTestAgent11RRtaContent26GetWmdrmStringAttributeSetERK7TDesC16RN13ContentAccess19RStringAttributeSetE @ 80 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager12GetAttributeERK6TDesC8iRi @ 81 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager15GetAttributeSetERK6TDesC8RN13ContentAccess13RAttributeSetE @ 82 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager18GetStringAttributeERK6TDesC8iR6TDes16 @ 83 NONAME
-	_ZNK18ReferenceTestAgent11RRtaManager21GetStringAttributeSetERK6TDesC8RN13ContentAccess19RStringAttributeSetE @ 84 NONAME
-	_ZNK18ReferenceTestAgent8RRtaData17GetWmdrmAttributeEiRi @ 85 NONAME
-	_ZNK18ReferenceTestAgent8RRtaData20GetWmdrmAttributeSetERN13ContentAccess13RAttributeSetE @ 86 NONAME
-	_ZNK18ReferenceTestAgent8RRtaData23GetWmdrmStringAttributeEiR6TDes16 @ 87 NONAME
-	_ZNK18ReferenceTestAgent8RRtaData26GetWmdrmStringAttributeSetERN13ContentAccess19RStringAttributeSetE @ 88 NONAME
-
--- a/contentmgmt/referencedrmagent/RefTestAgent/RTAParser/wmdrmcontentparser.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,143 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include "wmdrmcontentparser.h"
-#include <caf/caferr.h>
-
-using namespace ReferenceTestAgent;
-using namespace ContentAccess;
-
-EXPORT_C CWmdrmContentParser* CWmdrmContentParser::NewL(const TDesC8& aHeaderData)
-	{
-	CWmdrmContentParser* self = new (ELeave) CWmdrmContentParser;
-	CleanupStack::PushL(self);
-	self->ConstructL(aHeaderData);
-	CleanupStack::Pop(self);
-	return self;
-	}
-
-
-CWmdrmContentParser::CWmdrmContentParser()
-	{
-	}
-
-
-void CWmdrmContentParser::ConstructL(const TDesC8& aHeaderData)
-	{
-	iHeaderData = aHeaderData.AllocL();	
-	
-	// Initialise default attributes.
-	CreateAttributeSetL();
-	CreateStringAttributeSetL();
-	}
-	
-void CWmdrmContentParser::CreateAttributeSetL()
-	{
-	// Initialise attributes
-	SetAttributeL(EIsProtected, ETrue, KErrNone);
-	SetAttributeL(EIsForwardable, EFalse, KErrNone);
-	SetAttributeL(EIsModifyable, EFalse, KErrNone);
-	SetAttributeL(EIsCopyable, EFalse, KErrNone);
-	SetAttributeL(ECanPlay, EFalse, KErrNone);
-	SetAttributeL(ECanPrint, EFalse, KErrNone);
-	SetAttributeL(ECanExecute, EFalse, KErrNone);
-	SetAttributeL(ECanView, EFalse, KErrNone);
-	SetAttributeL(ERightsNone, ETrue, KErrNone);
-	SetAttributeL(ERightsPending, EFalse, KErrNone);
-	SetAttributeL(ERightsHaveExpired, EFalse, KErrNone);
-	SetAttributeL(EPreviewAvailable, EFalse, KErrNone);
-	SetAttributeL(ECanRewind, EFalse, KErrNone);
-	SetAttributeL(ECopyPaste, EFalse, KErrNone);
-	SetAttributeL(ERightsConsumable, EFalse, KErrNone);
-	SetAttributeL(ERightsStateless, EFalse, KErrNone);
-	SetAttributeL(ECanMove, ETrue, KErrNone);
-	SetAttributeL(ECanRename, ETrue, KErrNone);
-	SetAttributeL(ECanAutomaticConsume, EFalse, KErrNone);
-	}
-	
-void CWmdrmContentParser::CreateStringAttributeSetL()
-	{
-	// Initialise string attributes.
-	_LIT(KDescription, "WMDRM");
-	SetStringAttributeL(EDescription , KDescription, KErrNone);
-	
-	_LIT(KMimeType, "application/vnd.drm.asf");
-
-	SetStringAttributeL(EMimeType, KMimeType, KErrNone);
-	}
-
-void CWmdrmContentParser::SetAttributeL(TInt aAttribute, TInt aValue, TInt aErrorCode)	
-	{
-	iAttributeSet.AddL(aAttribute);
-	User::LeaveIfError(iAttributeSet.SetValue(aAttribute, aValue, aErrorCode));
-	}
-	
-void CWmdrmContentParser::SetStringAttributeL(TInt aAttribute, const TDesC& aValue, TInt aErrorCode)	
-	{
-	iStringAttributeSet.AddL(aAttribute);
-	User::LeaveIfError(iStringAttributeSet.SetValue(aAttribute, aValue, aErrorCode));
-	}
-	
-CWmdrmContentParser::~CWmdrmContentParser()
-	{
-	delete iHeaderData;
-	
-	iAttributeSet.Close();
-	iStringAttributeSet.Close();
-	}
-
-EXPORT_C TInt CWmdrmContentParser::GetAttribute(TInt aAttribute, TInt& aValue) const
-	{
-	return iAttributeSet.GetValue(aAttribute, aValue);
-	}
-	
-EXPORT_C TInt CWmdrmContentParser::GetStringAttribute(TInt aAttribute, TDes& aValue) const
-	{
-	return iStringAttributeSet.GetValue(aAttribute, aValue);
-	}
-	
-EXPORT_C TInt CWmdrmContentParser::GetAttributeSet(RAttributeSet &aAttributeSet) const
-	{
-	TInt value = 0;
-	TInt err = KErrNone;
-	for(TInt i = 0; i < aAttributeSet.Count(); i++)
-		{
-		TInt attribute = aAttributeSet[i];
-		err = GetAttribute(attribute, value);
-		if(err != KErrNone)
-			{
-			break;
-			}
-	
-		aAttributeSet.SetValue(attribute, value, err);
-		}
-	return err;
-	}
-
-EXPORT_C void CWmdrmContentParser::GetStringAttributeSetL(RStringAttributeSet &aStringAttributeSet) const
-	{
-	for(TInt i = 0; i < aStringAttributeSet.Count(); i++)
-		{
-		TInt attribute = aStringAttributeSet[i];
-		HBufC* value = HBufC::NewLC(iStringAttributeSet.GetValueLength(attribute));
-		TPtr valuePtr = value->Des();
-		User::LeaveIfError(GetStringAttribute(attribute, valuePtr));
-		aStringAttributeSet.SetValue(attribute, valuePtr, KErrNone);
-		CleanupStack::PopAndDestroy(value);
-		}
-	}
--- a/contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Client/rtacontent.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Client/rtacontent.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -266,11 +266,7 @@
 	return err;
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-void RRtaContent::GetAttributeSetL (const TDesC& aUniqueId, RAttributeSet &aAttributeSet, TBool aWmdrmFlag) const     
-#else  
 void RRtaContent::GetAttributeSetL (const TDesC& aUniqueId, RAttributeSet &aAttributeSet) const
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 	{
 	TInt err = KErrOverflow;
 	TInt length = 0;
@@ -299,15 +295,8 @@
 		transferBuffer->Des().Copy(bufPtr);
 		TPtr8 transferPtr = transferBuffer->Des();
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-        if(aWmdrmFlag)     
-            err = SendReceive(EWMDRMGetAttributeSet, TIpcArgs(&aUniqueId, &transferPtr));     
-        else     
-            err = SendReceive(EGetAttributeSet, TIpcArgs(&aUniqueId, &transferPtr));     
-#else 
 		// attempt to retrieve the attributes
 		err = SendReceive(EGetAttributeSet, TIpcArgs(&aUniqueId, &transferPtr));
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 		if(err == KErrOverflow)
 			{
 			// Find out the length required to receive the resulting attribute set
@@ -339,11 +328,7 @@
 	return err;
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-void RRtaContent::GetStringAttributeSetL(const TDesC& aUniqueId, RStringAttributeSet &aStringAttributeSet, TBool aWmdrmFlag) const       
-#else 
 void RRtaContent::GetStringAttributeSetL (const TDesC& aUniqueId, RStringAttributeSet &aStringAttributeSet) const
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 	{
 	TInt err = KErrOverflow;
 	TInt length = 0;
@@ -371,15 +356,8 @@
 		HBufC8* transferBuffer = HBufC8::NewLC(length);
 		transferBuffer->Des().Copy(bufPtr);
 		TPtr8 transferPtr = transferBuffer->Des();
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-        if(aWmdrmFlag)     
-            err = SendReceive(EWMDRMGetStringAttributeSet, TIpcArgs(&aUniqueId, &transferPtr));     
-        else     
-            err = SendReceive(EGetStringAttributeSet, TIpcArgs(&aUniqueId, &transferPtr));     
-#else    
 		// attempt to retrieve the attributes
 		err = SendReceive(EGetStringAttributeSet, TIpcArgs(&aUniqueId, &transferPtr));	
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 		if(err == KErrOverflow)
 			{
 			// Find out the length required to receive the resulting attribute set
@@ -496,66 +474,3 @@
 	return err;
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-      
-EXPORT_C TInt RRtaContent::Open(const TDesC8& aHeaderData)     
-    {     
-    TInt err = RRtaClient::Connect();     
-    if (err != KErrNone)     
-        {     
-        return err;     
-        }     
-         
-    if(IsDrmCapabilityEnforced())     
-        {     
-        err = SendReceive(ECreateContentMessageHandler, TIpcArgs());     
-        if(err != KErrNone)     
-            {     
-            return err;     
-            }     
-             
-        err = SendReceive(EReadWMDRMHeaderData, TIpcArgs(&aHeaderData));     
-        }     
-             
-    else     
-        {     
-        err = SendReceive(ENoEnforceCreateContentMessageHandler, TIpcArgs());     
-        if(err != KErrNone)     
-            {     
-            return err;     
-            }     
-                 
-        err = SendReceive(ENoEnforceReadWMDRMHeaderData, TIpcArgs(&aHeaderData));     
-        }     
-             
-    return err;     
-    }     
-         
-EXPORT_C TInt RRtaContent::GetWmdrmAttribute(const TDesC& /*aUniqueId*/, TInt aAttribute, TInt& aValue) const     
-    {     
-    TPckg<TInt> valuePkg(aValue);     
-    TInt result = SendReceive(EWMDRMGetAttribute, TIpcArgs(aAttribute, &valuePkg));     
-    return result;     
-    }     
-         
-EXPORT_C TInt RRtaContent::GetWmdrmAttributeSet(const TDesC& aUniqueId, ContentAccess::RAttributeSet& aAttributeSet) const     
-    {     
-    TRAPD( err, GetAttributeSetL(aUniqueId, aAttributeSet, ETrue));     
-    return err;     
-    }     
-         
-EXPORT_C TInt RRtaContent::GetWmdrmStringAttribute(const TDesC& /*aUniqueId*/, TInt aAttribute, TDes& aValue) const     
-    {     
-    TIpcArgs ipcArgs(aAttribute, &aValue);     
-    TInt result = SendReceive(EWMDRMGetStringAttribute, ipcArgs);     
-    return result;     
-    }     
-      
-EXPORT_C TInt RRtaContent::GetWmdrmStringAttributeSet(const TDesC& aUniqueId, ContentAccess::RStringAttributeSet& aStringAttributeSet) const     
-    {     
-    TRAPD( err, GetStringAttributeSetL(aUniqueId, aStringAttributeSet, ETrue));     
-    return err;     
-    }     
-      
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
-
--- a/contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Client/rtadata.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Client/rtadata.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -234,11 +234,7 @@
 	return err;
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-void RRtaData::GetAttributeSetL (RAttributeSet &aAttributeSet, TBool aWmdrmFlag) const     
-#else 
 void RRtaData::GetAttributeSetL (RAttributeSet &aAttributeSet) const
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 	{
 	TInt err = KErrOverflow;
 	TInt length = 0;
@@ -267,15 +263,8 @@
 		transferBuffer->Des().Copy(bufPtr);
 		TPtr8 transferPtr = transferBuffer->Des();
 	
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-        if(aWmdrmFlag)     
-            err = SendReceive(EWMDRMGetAttributeSet, TIpcArgs(&transferPtr));     
-        else     
-            err = SendReceive(EGetAttributeSet, TIpcArgs(&transferPtr));         
-#else 
 		// attempt to retrieve the attributes
 		err = SendReceive(EGetAttributeSet, TIpcArgs(&transferPtr));	
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 		if(err == KErrOverflow)
 			{
 			// Find out the length required to receive the resulting attribute set
@@ -307,11 +296,7 @@
 	return err;
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-void RRtaData::GetStringAttributeSetL (RStringAttributeSet &aStringAttributeSet, TBool aWmdrmFlag) const     
-#else 
 void RRtaData::GetStringAttributeSetL (RStringAttributeSet &aStringAttributeSet) const
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 	{
 	TInt err = KErrOverflow;
 	TInt length = 0;
@@ -340,15 +325,8 @@
 		transferBuffer->Des().Copy(bufPtr);
 		TPtr8 transferPtr = transferBuffer->Des();
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-        if(aWmdrmFlag)     
-            err = SendReceive(EWMDRMGetStringAttributeSet, TIpcArgs(&transferPtr));     
-        else     
-            err = SendReceive(EGetStringAttributeSet, TIpcArgs(&transferPtr));       
-#else 
 		// attempt to retrieve the attributes
 		err = SendReceive(EGetStringAttributeSet, TIpcArgs(&transferPtr));	
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 		if(err == KErrOverflow)
 			{
 			// Find out the length required to receive the resulting attribute set
@@ -384,77 +362,3 @@
 	return err;
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-      
-EXPORT_C TInt RRtaData::Open(const TDesC8& aHeaderData)     
-    {     
-    TInt err = RRtaClient::Connect();     
-    if(err != KErrNone)     
-        {     
-        return err;     
-        }     
-         
-    if(IsDrmCapabilityEnforced())     
-        {     
-        err = SendReceive(ECreateDataMessageHandler, TIpcArgs());     
-        if(err != KErrNone)     
-            return err;     
-             
-        err = SendReceive(EReadWMDRMHeaderData, TIpcArgs(&aHeaderData));     
-        }     
-             
-    else     
-        {     
-        err = SendReceive(ENoEnforceCreateDataMessageHandler, TIpcArgs());     
-        if(err != KErrNone)     
-            return err;     
-             
-        err = SendReceive(ENoEnforceReadWMDRMHeaderData, TIpcArgs(&aHeaderData));     
-        }     
-      
-    return err;     
-    }     
-         
-EXPORT_C TInt RRtaData::Read(const TDesC8& aEncryptedInputPacket, TDes8& aDecryptedOutputPacket)     
-    {     
-    TInt err = 0;     
-    if(IsDrmCapabilityEnforced())     
-        {     
-        err =  SendReceive(EReadWMDRMDataPacket, TIpcArgs(&aEncryptedInputPacket, &aDecryptedOutputPacket));         
-        }     
-    else     
-        {     
-        err =  SendReceive(ENoEnforceReadWMDRMDataPacket, TIpcArgs(&aEncryptedInputPacket, &aDecryptedOutputPacket));        
-        }     
-         
-    return err;     
-    }     
-         
-      
-EXPORT_C TInt RRtaData::GetWmdrmAttribute(TInt aAttribute, TInt& aValue) const     
-    {     
-    TPckg<TInt> valuePkg(aValue);     
-    TInt err = SendReceive(EWMDRMGetAttribute, TIpcArgs(aAttribute, &valuePkg));     
-    return err;     
-    }     
-         
-EXPORT_C TInt RRtaData::GetWmdrmAttributeSet(ContentAccess::RAttributeSet& aAttributeSet) const     
-    {     
-    TRAPD( err, GetAttributeSetL(aAttributeSet, ETrue));     
-    return err;     
-    }     
-         
-EXPORT_C TInt RRtaData::GetWmdrmStringAttribute(TInt aAttribute, TDes& aValue) const     
-    {     
-    return SendReceive(EWMDRMGetStringAttribute, TIpcArgs(aAttribute, &aValue));     
-    }     
-      
-EXPORT_C TInt RRtaData::GetWmdrmStringAttributeSet(ContentAccess::RStringAttributeSet& aStringAttributeSet) const     
-    {     
-    TRAPD( err, GetStringAttributeSetL(aStringAttributeSet, ETrue));     
-    return err;     
-    }     
-      
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
-
-
--- a/contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Client/rtamanager.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Client/rtamanager.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -737,94 +737,3 @@
 		}
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-      
-EXPORT_C TInt RRtaManager::GetAttribute(const TDesC8& aHeaderData, TInt aAttribute, TInt& aValue) const     
-    {     
-    TPckg<TInt> valuePkg(aValue);     
-    TInt result = SendReceive(EWMDRMGetAttribute, TIpcArgs(&aHeaderData, aAttribute, &valuePkg));     
-    return result;     
-    }     
-         
-EXPORT_C TInt RRtaManager::GetAttributeSet(const TDesC8& aHeaderData, ContentAccess::RAttributeSet& aAttributeSet) const     
-    {     
-    TRAPD(err, GetAttributeSetL (aHeaderData, aAttributeSet));     
-    return err;     
-    }     
-         
-EXPORT_C TInt RRtaManager::GetStringAttribute(const TDesC8& aHeaderData, TInt aAttribute, TDes& aValue) const     
-    {     
-    TInt result = SendReceive(EWMDRMGetStringAttribute, TIpcArgs(&aHeaderData, aAttribute, &aValue));     
-    return result;     
-    }     
-      
-EXPORT_C TInt RRtaManager::GetStringAttributeSet(const TDesC8& aHeaderData, ContentAccess::RStringAttributeSet& aStringAttributeSet) const     
-    {     
-    TRAPD(err, GetStringAttributeSetL(aHeaderData, aStringAttributeSet));     
-    return err;     
-    }     
-         
-void RRtaManager::GetAttributeSetL(const TDesC8& aHeaderData, ContentAccess::RAttributeSet& aAttributeSet) const     
-    {     
-    // dynamic buffer since we don't know in advance the size required     
-    CBufFlat* buffer = CBufFlat::NewL(KDefaultBufferSize);     
-    CleanupStack::PushL(buffer);     
-         
-    RBufWriteStream stream(*buffer);     
-    CleanupClosePushL(stream);     
-         
-    // write the directory to the stream     
-    aAttributeSet.ExternalizeL(stream);     
-    CleanupStack::PopAndDestroy(&stream);     
-         
-    // Create an HBufC8 from the stream buf's length, and copy      
-    // the stream buffer into this descriptor     
-    HBufC8* transferBuffer = HBufC8::NewLC(buffer->Size() * 15);     
-    TPtr8 ptr = buffer->Ptr(0);     
-    transferBuffer->Des().Copy(ptr);     
-    TPtr8 transferPtr = transferBuffer->Des();     
-         
-    User::LeaveIfError(SendReceive(EWMDRMGetAttributeSet, TIpcArgs(&aHeaderData, &transferPtr)));     
-      
-    // read in the attribute values from the buffer     
-    RDesReadStream readStream(transferPtr);     
-    CleanupClosePushL(readStream);     
-    aAttributeSet.InternalizeL(readStream);     
-    CleanupStack::PopAndDestroy(&readStream);     
-         
-    CleanupStack::PopAndDestroy(2, buffer);     
-    }     
-         
-void RRtaManager::GetStringAttributeSetL(const TDesC8& aHeaderData, ContentAccess::RStringAttributeSet& aStringAttributeSet) const     
-    {     
-    // dynamic buffer since we don't know in advance the size required     
-    CBufFlat* buffer = CBufFlat::NewL(KDefaultBufferSize);     
-    CleanupStack::PushL(buffer);     
-         
-    RBufWriteStream stream(*buffer);     
-    CleanupClosePushL(stream);     
-         
-    // write the directory to the stream     
-    aStringAttributeSet.ExternalizeL(stream);     
-    CleanupStack::PopAndDestroy(&stream);     
-         
-    // Create an HBufC8 from the stream buf's length, and copy      
-    // the stream buffer into this descriptor     
-    HBufC8* transferBuffer = HBufC8::NewLC(buffer->Size()*15);     
-    TPtr8 ptr = buffer->Ptr(0);     
-    transferBuffer->Des().Copy(ptr);     
-    TPtr8 transferPtr = transferBuffer->Des();     
-         
-    User::LeaveIfError(SendReceive(EWMDRMGetStringAttributeSet, TIpcArgs(&aHeaderData, &transferPtr)));     
-         
-    // read in the attribute values from the buffer     
-    RDesReadStream readStream(transferPtr);     
-    CleanupClosePushL(readStream);     
-    aStringAttributeSet.InternalizeL(readStream);     
-    CleanupStack::PopAndDestroy(&readStream);     
-                     
-    CleanupStack::PopAndDestroy(2, buffer);     
-    }     
-         
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
-
--- a/contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Common/clientserver.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Common/clientserver.h	Wed Apr 14 17:48:59 2010 +0300
@@ -116,15 +116,7 @@
 		EManagerDisplayManagementInfo = 105,
 
 		EDataSetProperty = 106,
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-        EReadWMDRMHeaderData = 107,     
-        EReadWMDRMDataPacket = 108,     
-        EWMDRMGetAttribute = 109,     
-        EWMDRMGetStringAttribute = 110,     
-        EWMDRMGetAttributeSet = 111,     
-        EWMDRMGetStringAttributeSet = 112,     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
-		
+
 		// These operations do not require DRM capability
 		ESeparatorUnprotected   = 500,
 		EGetAttribute			= 501,
@@ -132,15 +124,6 @@
 		EGetStringAttribute 	= 503,
 		EGetStringAttributeSet  = 504,
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-        ENoEnforceReadWMDRMHeaderData = 701,     
-        ENoEnforceReadWMDRMDataPacket = 702,     
-        ENoEnforceWMDRMGetAttribute = 703,     
-        ENoEnforceWMDRMGetStringAttribute = 704,     
-        ENoEnforceWMDRMGetAttributeSet = 705,     
-        ENoEnforceWMDRMGetStringAttributeSet = 706,     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
-
 		// IPC messages to use when DRM capability enforcing is disabled
 		ENoEnforceAddRights		 = 1001,
 		ENoEnforceEvaluateIntent = 1002,
--- a/contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Server/rtacontenthandler.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Server/rtacontenthandler.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -50,9 +50,6 @@
 	{
 	delete iArchive;
 	iFile.Close();
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-    delete iWmdrmContentObject;     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
 	}
 
 void CRtaContentHandler::ServiceL(const RMessage2& aMessage)
@@ -130,32 +127,7 @@
 	case ENoEnforceContentSetProperty:
 		SetPropertyL(aMessage);
 		break;
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-    case EReadWMDRMHeaderData:     
-    case ENoEnforceReadWMDRMHeaderData:     
-        ReadWMDRMHeaderL(aMessage);     
-        break;     
-         
-    case EWMDRMGetAttribute:     
-    case ENoEnforceWMDRMGetAttribute:     
-        GetWMDRMAttributeL(aMessage);     
-        break;     
-             
-    case EWMDRMGetAttributeSet:     
-    case ENoEnforceWMDRMGetAttributeSet:     
-        GetWMDRMAttributeSetL(aMessage);     
-        break;     
-         
-    case EWMDRMGetStringAttribute:     
-    case ENoEnforceWMDRMGetStringAttribute:     
-        GetWMDRMStringAttributeL(aMessage);     
-        break;     
-             
-    case EWMDRMGetStringAttributeSet:     
-    case ENoEnforceWMDRMGetStringAttributeSet:     
-        GetWMDRMStringAttributeSetL(aMessage);     
-        break;     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
+
 	default:
 		CRtaSession::PanicClient(aMessage,EPanicIllegalFunction);
 		break;
@@ -407,102 +379,3 @@
 	User::Leave(KErrCANotSupported);
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-      
-void CRtaContentHandler::ReadWMDRMHeaderL(const RMessage2& aMessage)     
-    {     
-    HBufC8* headerData = ReadDesC8LC(aMessage, 0);       
-    iWmdrmContentObject = CWmdrmContentParser::NewL(*headerData);     
-         
-    CleanupStack::PopAndDestroy(headerData);     
-    }     
-         
-void CRtaContentHandler::GetWMDRMAttributeL(const RMessage2& aMessage)     
-    {     
-    TInt attribute = aMessage.Int0();     
-    TInt value;     
-    TPckg<TInt> valuePkg(value);     
-      
-    User::LeaveIfError(iWmdrmContentObject->GetAttribute(attribute, value));     
-    WriteL(aMessage, 1, valuePkg);     
-    }     
-         
-void CRtaContentHandler::GetWMDRMStringAttributeL(const RMessage2& aMessage)     
-    {     
-    TInt attribute = aMessage.Int0();     
-    HBufC* value = ReadDes16LC(aMessage, 1);     
-    TPtr valuePtr = value->Des();     
-      
-    User::LeaveIfError(iWmdrmContentObject->GetStringAttribute(attribute, valuePtr));     
-    WriteL(aMessage, 1, valuePtr);     
-         
-    CleanupStack::PopAndDestroy(value);     
-    }     
-         
-void CRtaContentHandler::GetWMDRMAttributeSetL(const RMessage2& aMessage)     
-    {     
-    RAttributeSet attributeSet;     
-    CleanupClosePushL(attributeSet);     
-         
-    HBufC8* value = ReadDes8LC(aMessage, 1);     
-    TPtr8 valuePtr = value->Des();     
-    RDesReadStream readStream(valuePtr);     
-    CleanupClosePushL(readStream);     
-         
-    attributeSet.InternalizeL(readStream);     
-    CleanupStack::PopAndDestroy(2, value);     
-         
-    iWmdrmContentObject->GetAttributeSet(attributeSet);     
-      
-    // Write the object out to a buffer, send to client     
-    CBufFlat* buf = CBufFlat::NewL(50);     
-    CleanupStack::PushL(buf);     
-         
-    // create write stream     
-    RBufWriteStream writeStream(*buf);     
-    CleanupClosePushL(writeStream);     
-         
-    // write the directory to the stream     
-    attributeSet.ExternalizeL(writeStream);     
-    CleanupStack::PopAndDestroy(&writeStream);     
-         
-    TPtr8 bufPtr = buf->Ptr(0);     
-    WriteL(aMessage, 1, bufPtr);     
-             
-    CleanupStack::PopAndDestroy(2, &attributeSet); // buf, attributeSet     
-    }     
-         
-void CRtaContentHandler::GetWMDRMStringAttributeSetL(const RMessage2& aMessage)     
-    {     
-    RStringAttributeSet attributeSet;     
-    CleanupClosePushL(attributeSet);     
-         
-    HBufC8* value = ReadDes8LC(aMessage, 1);     
-    TPtr8 valuePtr = value->Des();     
-    RDesReadStream readStream(valuePtr);     
-    CleanupClosePushL(readStream);     
-         
-    attributeSet.InternalizeL(readStream);     
-    CleanupStack::PopAndDestroy(2, value);     
-         
-    iWmdrmContentObject->GetStringAttributeSetL(attributeSet);     
-      
-    // Write the object out to a buffer, send to client     
-    CBufFlat* buf = CBufFlat::NewL(50);     
-    CleanupStack::PushL(buf);     
-    // create write stream     
-    RBufWriteStream writeStream(*buf);     
-    CleanupClosePushL(writeStream);     
-         
-    // write the directory to the stream     
-    attributeSet.ExternalizeL(writeStream);     
-    CleanupStack::PopAndDestroy(&writeStream);     
-         
-    TPtr8 bufPtr = buf->Ptr(0);     
-    WriteL(aMessage, 1, bufPtr);     
-             
-    CleanupStack::PopAndDestroy(2, &attributeSet); // buf, attributeSet     
-    }     
-      
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
-
--- a/contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Server/rtacontenthandler.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Server/rtacontenthandler.h	Wed Apr 14 17:48:59 2010 +0300
@@ -30,9 +30,6 @@
 #include "RTAserver.h"
 #include "rtamessagehandler.h"
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-#include "wmdrmcontentparser.h"     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
 
 namespace ReferenceTestAgent
 	{
@@ -71,13 +68,6 @@
 		void CancelRequestRightsL(const RMessage2& aMessage);
 		void DisplayInfoL(const RMessage2& aMessage);
 		void SetPropertyL(const RMessage2& aMessage);
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-        void ReadWMDRMHeaderL(const RMessage2& aMessage);     
-        void GetWMDRMAttributeL(const RMessage2& aMessage);     
-        void GetWMDRMStringAttributeL(const RMessage2& aMessage);     
-        void GetWMDRMAttributeSetL(const RMessage2& aMessage);     
-        void GetWMDRMStringAttributeSetL(const RMessage2& aMessage);     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
 
 	private:
 #ifdef SYMBIAN_ENABLE_64_BIT_FILE_SERVER_API
@@ -86,9 +76,6 @@
 		RFile iFile;
 #endif // SYMBIAN_ENABLE_64_BIT_FILE_SERVER_API
 		CRefTestAgentArchive* iArchive;
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT          
-        CWmdrmContentParser* iWmdrmContentObject;     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
 		};
 	} //namespace
 
--- a/contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Server/rtadatahandler.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Server/rtadatahandler.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -49,9 +49,6 @@
 	{
 	delete iArchive;
 	iFile.Close();
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT          
-    delete iWmdrmContentObject;     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
 	}
 
 void CRtaDataHandler::ServiceL(const RMessage2& aMessage)
@@ -109,37 +106,7 @@
 	case ENoEnforceDataSetProperty:
 		SetPropertyL(aMessage);
 		break;
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-    case EReadWMDRMHeaderData:     
-    case ENoEnforceReadWMDRMHeaderData:     
-        ReadWMDRMHeaderL(aMessage);     
-        break;     
-         
-    case EReadWMDRMDataPacket:     
-    case ENoEnforceReadWMDRMDataPacket:     
-        DecryptWMDRMDataPacketL(aMessage);     
-        break;     
-             
-    case EWMDRMGetAttribute:     
-    case ENoEnforceWMDRMGetAttribute:     
-        GetWMDRMAttributeL(aMessage);     
-        break;     
-             
-    case EWMDRMGetAttributeSet:     
-    case ENoEnforceWMDRMGetAttributeSet:     
-        GetWMDRMAttributeSetL(aMessage);     
-        break;     
-         
-    case EWMDRMGetStringAttribute:     
-    case ENoEnforceWMDRMGetStringAttribute:     
-        GetWMDRMStringAttributeL(aMessage);     
-        break;     
-             
-    case EWMDRMGetStringAttributeSet:     
-    case ENoEnforceWMDRMGetStringAttributeSet:     
-        GetWMDRMStringAttributeSetL(aMessage);     
-        break;     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT        
+     
 	default:
 		CRtaSession::PanicClient(aMessage,EPanicIllegalFunction);
 		break;
@@ -362,113 +329,3 @@
 	User::Leave(KErrCANotSupported);
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-      
-void CRtaDataHandler::ReadWMDRMHeaderL(const RMessage2& aMessage)     
-    {     
-    HBufC8* headerData = ReadDesC8LC(aMessage, 0);       
-    iWmdrmContentObject = CWmdrmContentParser::NewL(*headerData);     
-         
-    CleanupStack::PopAndDestroy(headerData);     
-    }     
-         
-void CRtaDataHandler::DecryptWMDRMDataPacketL(const RMessage2& aMessage)     
-    {     
-    HBufC8* inputPacket = ReadDesC8LC(aMessage, 0);     
-         
-    HBufC8* decryptedPacket = ReadDes8LC(aMessage, 1);     
-    TPtr8 decryptedPacketPtr = decryptedPacket->Des();     
-         
-    decryptedPacketPtr.Copy(*inputPacket);     
-         
-    WriteL(aMessage, 1, decryptedPacketPtr);     
-         
-    CleanupStack::PopAndDestroy(2, inputPacket);     
-    }     
-         
-void CRtaDataHandler::GetWMDRMAttributeL(const RMessage2& aMessage)     
-    {     
-    TInt attribute = aMessage.Int0();     
-    TInt value;     
-    TPckg <TInt> valuePckg(value);               
-    User::LeaveIfError(iWmdrmContentObject->GetAttribute(attribute, value));     
-         
-    WriteL(aMessage, 1, valuePckg);     
-    }     
-         
-void CRtaDataHandler::GetWMDRMStringAttributeL(const RMessage2& aMessage)     
-    {     
-    TInt attribute = aMessage.Int0();     
-    HBufC* value = ReadDes16LC(aMessage, 1);     
-    TPtr valuePtr = value->Des();     
-         
-    User::LeaveIfError(iWmdrmContentObject->GetStringAttribute(attribute, valuePtr));     
-    WriteL(aMessage, 1, valuePtr);     
-         
-    CleanupStack::PopAndDestroy(value);     
-    }     
-         
-void CRtaDataHandler::GetWMDRMAttributeSetL(const RMessage2& aMessage)     
-    {     
-    RAttributeSet attributeSet;     
-    CleanupClosePushL(attributeSet);     
-         
-    HBufC8* value = ReadDes8LC(aMessage, 0);     
-    TPtr8 valuePtr = value->Des();     
-    RDesReadStream readStream(valuePtr);     
-    CleanupClosePushL(readStream);     
-         
-    attributeSet.InternalizeL(readStream);     
-    CleanupStack::PopAndDestroy(2, value);     
-         
-    iWmdrmContentObject->GetAttributeSet(attributeSet);     
-      
-    // Write the object out to a buffer, send to client     
-    CBufFlat* buf = CBufFlat::NewL(50);     
-    CleanupStack::PushL(buf);     
-    // create write stream     
-    RBufWriteStream writeStream(*buf);     
-    CleanupClosePushL(writeStream);     
-         
-    // write the directory to the stream     
-    attributeSet.ExternalizeL(writeStream);     
-    CleanupStack::PopAndDestroy(&writeStream);     
-         
-    TPtr8 bufPtr = buf->Ptr(0);     
-    WriteL(aMessage, 0, bufPtr);     
-             
-    CleanupStack::PopAndDestroy(2, &attributeSet); // buf, attributeSet     
-    }     
-         
-void CRtaDataHandler::GetWMDRMStringAttributeSetL(const RMessage2& aMessage)     
-    {     
-    RStringAttributeSet attributeSet;     
-    CleanupClosePushL(attributeSet);     
-         
-    HBufC8* value = ReadDes8LC(aMessage, 0);     
-    TPtr8 valuePtr = value->Des();     
-    RDesReadStream readStream(valuePtr);     
-    CleanupClosePushL(readStream);     
-         
-    attributeSet.InternalizeL(readStream);     
-    CleanupStack::PopAndDestroy(2, value);     
-         
-    iWmdrmContentObject->GetStringAttributeSetL(attributeSet);     
-      
-    // Write the object out to a buffer, send to client     
-    CBufFlat* buf = CBufFlat::NewL(50);     
-    CleanupStack::PushL(buf);     
-    // create write stream     
-    RBufWriteStream writeStream(*buf);     
-    CleanupClosePushL(writeStream);     
-         
-    // write the directory to the stream     
-    attributeSet.ExternalizeL(writeStream);     
-    CleanupStack::PopAndDestroy(&writeStream);     
-         
-    TPtr8 bufPtr = buf->Ptr(0);     
-    WriteL(aMessage, 0, bufPtr);     
-             
-    CleanupStack::PopAndDestroy(2, &attributeSet); // buf, attributeSet     
-    }        
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
--- a/contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Server/rtadatahandler.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Server/rtadatahandler.h	Wed Apr 14 17:48:59 2010 +0300
@@ -30,9 +30,6 @@
 #include "RTAserver.h"
 #include "rtamessagehandler.h"
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-#include "wmdrmcontentparser.h"     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
 
 namespace ReferenceTestAgent
 	{
@@ -64,14 +61,6 @@
 		void GetStringAttributeL(const RMessage2& aMessage);
 		void GetStringAttributeSetL(const RMessage2& aMessage);
 		void SetPropertyL(const RMessage2& aMessage);
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-        void ReadWMDRMHeaderL(const RMessage2& aMessage);     
-        void DecryptWMDRMDataPacketL(const RMessage2& aMessage);     
-        void GetWMDRMAttributeL(const RMessage2& aMessage);     
-        void GetWMDRMStringAttributeL(const RMessage2& aMessage);     
-        void GetWMDRMAttributeSetL(const RMessage2& aMessage);     
-        void GetWMDRMStringAttributeSetL(const RMessage2& aMessage);     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT    
 
 	private:
 #ifdef SYMBIAN_ENABLE_64_BIT_FILE_SERVER_API
@@ -83,9 +72,6 @@
 		
 		// this pointer should not be deleted since it points to something owned by iArchive
 		CDrmFileContent* iContentObject;
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT          
-        CWmdrmContentParser* iWmdrmContentObject;     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
 		};
 	} //namespace
 
--- a/contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Server/rtamanagerhandler.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Server/rtamanagerhandler.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -68,9 +68,6 @@
 	{
 	delete iArchive;
 	iFile.Close();
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-    delete iWmdrmContentObject;     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
 	}
 
 void CRtaManagerHandler::ServiceL(const RMessage2& aMessage)
@@ -173,27 +170,7 @@
 	case ENoEnforceManagerDisplayManagementInfo:
 		DisplayManagementInfoL(aMessage);
 		break;
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-    case EWMDRMGetAttribute:     
-    case ENoEnforceWMDRMGetAttribute:     
-        GetWMDRMAttributeL(aMessage);     
-        break;     
-             
-    case EWMDRMGetAttributeSet:     
-    case ENoEnforceWMDRMGetAttributeSet:     
-        GetWMDRMAttributeSetL(aMessage);     
-        break;     
-         
-    case EWMDRMGetStringAttribute:     
-    case ENoEnforceWMDRMGetStringAttribute:     
-        GetWMDRMStringAttributeL(aMessage);     
-        break;     
-             
-    case EWMDRMGetStringAttributeSet:     
-    case ENoEnforceWMDRMGetStringAttributeSet:     
-        GetWMDRMStringAttributeSetL(aMessage);     
-        break;     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
+
 	default:
 		CRtaSession::PanicClient(aMessage,EPanicIllegalFunction);
 		break;
@@ -570,108 +547,3 @@
 	User::Leave(KErrCANotSupported);
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-      
-void CRtaManagerHandler::OpenWmdrmContentObjectL(const RMessage2& aMessage, TInt aHeaderParameter)     
-    {     
-    HBufC8* headerData = ReadDesC8LC(aMessage, aHeaderParameter);        
-    iWmdrmContentObject = CWmdrmContentParser::NewL(*headerData);     
-         
-    CleanupStack::PopAndDestroy(headerData);     
-    }     
-      
-void CRtaManagerHandler::GetWMDRMAttributeL(const RMessage2& aMessage)     
-    {     
-    OpenWmdrmContentObjectL(aMessage, 0);     
-         
-    TInt attribute = aMessage.Int1();     
-    TInt value;     
-    TPckg<TInt> valuePckg(value);     
-      
-    User::LeaveIfError(iWmdrmContentObject->GetAttribute(attribute, value));     
-    WriteL(aMessage, 2, valuePckg);     
-    }     
-         
-void CRtaManagerHandler::GetWMDRMStringAttributeL(const RMessage2& aMessage)     
-    {     
-    OpenWmdrmContentObjectL(aMessage, 0);     
-      
-    TInt attribute = aMessage.Int1();     
-    HBufC* value = ReadDes16LC(aMessage, 2);     
-    TPtr valuePtr = value->Des();     
-      
-    User::LeaveIfError(iWmdrmContentObject->GetStringAttribute(attribute, valuePtr));     
-    WriteL(aMessage, 2, valuePtr);     
-         
-    CleanupStack::PopAndDestroy(value);     
-    }     
-         
-void CRtaManagerHandler::GetWMDRMAttributeSetL(const RMessage2& aMessage)     
-    {     
-    OpenWmdrmContentObjectL(aMessage, 0);     
-         
-    RAttributeSet attributeSet;     
-    CleanupClosePushL(attributeSet);     
-         
-    HBufC8* value = ReadDes8LC(aMessage, 1);     
-    TPtr8 valuePtr = value->Des();     
-    RDesReadStream readStream(valuePtr);     
-    CleanupClosePushL(readStream);     
-         
-    attributeSet.InternalizeL(readStream);     
-    CleanupStack::PopAndDestroy(2, value);     
-         
-    iWmdrmContentObject->GetAttributeSet(attributeSet);     
-      
-    // Write the object out to a buffer, send to client     
-    CBufFlat* buf = CBufFlat::NewL(50);     
-    CleanupStack::PushL(buf);     
-    // create write stream     
-    RBufWriteStream writeStream(*buf);     
-    CleanupClosePushL(writeStream);     
-         
-    // write the directory to the stream     
-    attributeSet.ExternalizeL(writeStream);     
-    CleanupStack::PopAndDestroy(&writeStream);     
-         
-    TPtr8 bufPtr = buf->Ptr(0);     
-    WriteL(aMessage, 1, bufPtr);     
-             
-    CleanupStack::PopAndDestroy(2, &attributeSet); // buf, attributeSet     
-    }     
-         
-void CRtaManagerHandler::GetWMDRMStringAttributeSetL(const RMessage2& aMessage)     
-    {     
-    OpenWmdrmContentObjectL(aMessage, 0);     
-         
-    RStringAttributeSet attributeSet;     
-    CleanupClosePushL(attributeSet);     
-         
-    HBufC8* value = ReadDes8LC(aMessage, 1);     
-    TPtr8 valuePtr = value->Des();     
-    RDesReadStream readStream(valuePtr);     
-    CleanupClosePushL(readStream);     
-         
-    attributeSet.InternalizeL(readStream);     
-    CleanupStack::PopAndDestroy(2, value);     
-         
-    iWmdrmContentObject->GetStringAttributeSetL(attributeSet);     
-      
-    // Write the object out to a buffer, send to client     
-    CBufFlat* buf = CBufFlat::NewL(50);     
-    CleanupStack::PushL(buf);     
-    // create write stream     
-    RBufWriteStream writeStream(*buf);     
-    CleanupClosePushL(writeStream);     
-         
-    // write the directory to the stream     
-    attributeSet.ExternalizeL(writeStream);     
-    CleanupStack::PopAndDestroy(&writeStream);     
-         
-    TPtr8 bufPtr = buf->Ptr(0);     
-    WriteL(aMessage, 1, bufPtr);     
-             
-    CleanupStack::PopAndDestroy(2, &attributeSet); // buf, attributeSet     
-    }     
-      
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
--- a/contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Server/rtamanagerhandler.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/RefTestAgent/RTAServer/Server/rtamanagerhandler.h	Wed Apr 14 17:48:59 2010 +0300
@@ -30,10 +30,6 @@
 #include "clientserver.h"
 #include "RTAserver.h"
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-#include "wmdrmcontentparser.h"     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
-
 namespace ReferenceTestAgent
 	{
 	class CRefTestAgentArchive;
@@ -82,14 +78,6 @@
 		 */
 		void OpenContentObjectL(const RMessage2& aMessage, TInt aUriOrFileSession, TInt aUniqueIdOrFileHandle);
 		void WriteCDirToMessageL(const RMessage2& aMessage, TInt aParam, CDir& aDir);
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-        void GetWMDRMAttributeL(const RMessage2& aMessage);     
-        void GetWMDRMStringAttributeL(const RMessage2& aMessage);     
-        void GetWMDRMAttributeSetL(const RMessage2& aMessage);     
-        void GetWMDRMStringAttributeSetL(const RMessage2& aMessage);     
-             
-        void OpenWmdrmContentObjectL(const RMessage2& aMessage, TInt aParameter);     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
 
 	private:
 #ifdef SYMBIAN_ENABLE_64_BIT_FILE_SERVER_API
@@ -102,9 +90,6 @@
 		
 		// this pointer should not be deleted since it points to something owned by iArchive
 		CDrmFileContent* iContentObject;
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-        CWmdrmContentParser* iWmdrmContentObject;     
-#endif  //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
 		};
 	
 	} //namespace
--- a/contentmgmt/referencedrmagent/RefTestAgent/RefTestAgent/Reftestagentcontent.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/RefTestAgent/RefTestAgent/Reftestagentcontent.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -51,23 +51,6 @@
 	self->ConstructL(aFile);
 	return self;
 	}
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-CRefTestAgentContent* CRefTestAgentContent::NewL(const TDesC8& aHeaderData)  
-	{
-	CRefTestAgentContent* self = NewLC(aHeaderData);    
-    CleanupStack::Pop(self);
-    return self;
-	}
-          
-CRefTestAgentContent* CRefTestAgentContent::NewLC(const TDesC8& aHeaderData)  
-	{
-    CRefTestAgentContent* self = new (ELeave) CRefTestAgentContent;
-	CleanupStack::PushL(self);  
-	self->ConstructL(aHeaderData);
-	return self;
-	}
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
 
 CRefTestAgentContent::CRefTestAgentContent() 
 	{
@@ -76,9 +59,6 @@
 CRefTestAgentContent::~CRefTestAgentContent()
 	{
 	iContentSession.Close();
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-    delete iHeaderData;
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 	}
   
 void CRefTestAgentContent::ConstructL(const TDesC& aURI, TContentShareMode aShareMode)
@@ -115,14 +95,6 @@
 	CleanupStack::PopAndDestroy(&file);
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-void CRefTestAgentContent::ConstructL(const TDesC8& aHeaderData)     
-    {     
-    iHeaderData = aHeaderData.AllocL();     
-    User::LeaveIfError(iContentSession.Open(aHeaderData));     
-    }     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
-
 TInt CRefTestAgentContent::OpenContainer(const TDesC& aUniqueId)
 	{
 	return iContentSession.OpenContainer(aUniqueId);
@@ -150,50 +122,22 @@
 
 TInt CRefTestAgentContent::GetAttribute(TInt aAttribute, TInt& aValue, const TDesC& aUniqueId)
 	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-    if(iHeaderData != NULL)  
-        return iContentSession.GetWmdrmAttribute(aUniqueId, aAttribute, aValue); 
-    else
-        return iContentSession.GetAttribute(aUniqueId, aAttribute, aValue);
-#else
 	return iContentSession.GetAttribute(aUniqueId, aAttribute, aValue);
-#endif
 	}
 
 TInt CRefTestAgentContent::GetAttributeSet(RAttributeSet& aAttributeSet, const TDesC& aUniqueId)
 	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-    if(iHeaderData != NULL)
-        return iContentSession.GetWmdrmAttributeSet(aUniqueId, aAttributeSet);
-    else
-        return iContentSession.GetAttributeSet(aUniqueId, aAttributeSet);
-#else
 	return iContentSession.GetAttributeSet(aUniqueId, aAttributeSet);
-#endif
 	}
 
 TInt CRefTestAgentContent::GetStringAttribute(TInt aAttribute, TDes& aValue, const TDesC& aUniqueId)
 	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-    if(iHeaderData != NULL)
-        return iContentSession.GetWmdrmStringAttribute(aUniqueId, aAttribute, aValue);
-    else
-        return iContentSession.GetStringAttribute(aUniqueId, aAttribute, aValue);
-#else
 	return iContentSession.GetStringAttribute(aUniqueId, aAttribute, aValue);
-#endif
 	}
 
 TInt CRefTestAgentContent::GetStringAttributeSet(RStringAttributeSet& aStringAttributeSet, const TDesC& aUniqueId)
 	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-    if(iHeaderData != NULL)
-        return iContentSession.GetWmdrmStringAttributeSet(aUniqueId, aStringAttributeSet);
-    else
-        return iContentSession.GetStringAttributeSet(aUniqueId, aStringAttributeSet);
-#else
 	return iContentSession.GetStringAttributeSet(aUniqueId, aStringAttributeSet);
-#endif
 	}
 
 TInt CRefTestAgentContent::AgentSpecificCommand(TInt aCommand, const TDesC8& aInputBuffer, TDes8& aOutputBuffer)
--- a/contentmgmt/referencedrmagent/RefTestAgent/RefTestAgent/Reftestagentcontent.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/RefTestAgent/RefTestAgent/Reftestagentcontent.h	Wed Apr 14 17:48:59 2010 +0300
@@ -37,11 +37,6 @@
 	static CRefTestAgentContent* NewL(RFile& aFile);
 	static CRefTestAgentContent* NewLC(RFile& aFile);
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-        static CRefTestAgentContent* NewL(const TDesC8& aHeaderData);     
-        static CRefTestAgentContent* NewLC(const TDesC8& aHeaderData);     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
-
 	virtual ~CRefTestAgentContent();
 
 public: 
@@ -69,16 +64,8 @@
 	void ConstructL(const TDesC& aURI, ContentAccess::TContentShareMode aShareMode);
 	void ConstructL(RFile& aFile);
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-        void ConstructL(const TDesC8& aHeaderData);     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
-		
 private:
 	ReferenceTestAgent::RRtaContent iContentSession;
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-        HBufC8* iHeaderData;     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
-
 	};
 #endif // __REFTestAgentContent_H__
--- a/contentmgmt/referencedrmagent/RefTestAgent/RefTestAgent/Reftestagentdata.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/RefTestAgent/RefTestAgent/Reftestagentdata.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -53,31 +53,6 @@
 	return self;
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-      
-CRefTestAgentData* CRefTestAgentData::NewL(const TDesC8& aHeaderData)     
-    {     
-    CRefTestAgentData* self = NewLC(aHeaderData);     
-    CleanupStack::Pop(self);     
-    return self;     
-    }     
-      
-CRefTestAgentData* CRefTestAgentData::NewLC(const TDesC8& aHeaderData)     
-    {     
-    CRefTestAgentData* self = new (ELeave) CRefTestAgentData;     
-    CleanupStack::PushL(self);     
-    self->ConstructL(aHeaderData);     
-    return self;     
-    }     
-         
-void CRefTestAgentData::ConstructL(const TDesC8& aHeaderData)     
-    {     
-    iHeaderData = aHeaderData.AllocL();     
-    User::LeaveIfError(iServer.Open(aHeaderData));     
-    }     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-  
-
 CRefTestAgentData::CRefTestAgentData()
 	{
 	}
@@ -85,9 +60,6 @@
 CRefTestAgentData::~CRefTestAgentData()
 	{
 	iServer.Close();
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-    delete iHeaderData;     
-#endif 
 	}
   
 void CRefTestAgentData::ConstructL(const TVirtualPathPtr& aVirtualPath, TContentShareMode aShareMode)
@@ -209,50 +181,22 @@
 
 TInt CRefTestAgentData::GetAttribute(TInt aAttribute, TInt& aValue)
 	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-    if(iHeaderData != NULL)     
-        return iServer.GetWmdrmAttribute(aAttribute, aValue);     
-    else     
-        return iServer.GetAttribute(aAttribute, aValue);     
-#else     
     return iServer.GetAttribute(aAttribute, aValue);
-#endif
 	}
 
 TInt CRefTestAgentData::GetAttributeSet(RAttributeSet& aAttributeSet)
 	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-    if(iHeaderData != NULL)     
-        return iServer.GetWmdrmAttributeSet(aAttributeSet);     
-    else     
-        return iServer.GetAttributeSet(aAttributeSet);     
-#else 
 	return iServer.GetAttributeSet(aAttributeSet);
-#endif
 	}
 
 TInt CRefTestAgentData::GetStringAttribute(TInt aAttribute, TDes& aValue)
 	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-    if(iHeaderData != NULL)     
-        return iServer.GetWmdrmStringAttribute(aAttribute, aValue);     
-    else     
-        return iServer.GetStringAttribute(aAttribute, aValue);     
-#else 
 	return iServer.GetStringAttribute(aAttribute, aValue);
-#endif
 	}
 
 TInt CRefTestAgentData::GetStringAttributeSet(RStringAttributeSet& aStringAttributeSet)
 	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-    if(iHeaderData != NULL)     
-        return iServer.GetWmdrmStringAttributeSet(aStringAttributeSet);     
-    else     
-        return iServer.GetStringAttributeSet(aStringAttributeSet);     
-#else    
 	return iServer.GetStringAttributeSet(aStringAttributeSet);
-#endif
 	}
 
 #ifdef SYMBIAN_ENABLE_64_BIT_FILE_SERVER_API
@@ -282,18 +226,3 @@
 	// cannot be a situation where the consumer waits for an asynchronous operation to complete
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-      
-TInt CRefTestAgentData::Read(const TDesC8& aEncryptedInputDataPacket, TDes8& aDecryptedOutputDataPacket)     
-    {     
-    return iServer.Read(aEncryptedInputDataPacket, aDecryptedOutputDataPacket);     
-    }     
-                 
-void CRefTestAgentData::Read(const TDesC8& aEncryptedInputDataPacket, TDes8& aDecryptedOutputDataPacket, TRequestStatus& aStatus)     
-    {     
-    TInt err = Read(aEncryptedInputDataPacket, aDecryptedOutputDataPacket);     
-    TRequestStatus* status = &aStatus;     
-    User::RequestComplete(status, err);     
-    }     
-      
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
--- a/contentmgmt/referencedrmagent/RefTestAgent/RefTestAgent/Reftestagentdata.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/RefTestAgent/RefTestAgent/Reftestagentdata.h	Wed Apr 14 17:48:59 2010 +0300
@@ -34,11 +34,6 @@
 		static CRefTestAgentData* NewL(RFile& aFile, const TDesC& aUniqueId);
 		static CRefTestAgentData* NewLC(RFile& aFile, const TDesC& aUniqueId);
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-        static CRefTestAgentData* NewL(const TDesC8& aHeaderData);     
-        static CRefTestAgentData* NewLC(const TDesC8& aHeaderData);     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
-
 		virtual ~CRefTestAgentData();
 
 	public: // From CAgentData
@@ -64,24 +59,13 @@
 		virtual TInt Read64(TInt64 aPos, TDes8& aDes, TInt aLength, TRequestStatus& aStatus);
 #endif // SYMBIAN_ENABLE_64_BIT_FILE_SERVER_API
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-        virtual TInt Read(const TDesC8& aEncryptedInputDataPacket, TDes8& aDecryptedOutputDataPacket);           
-        virtual void Read(const TDesC8& aEncryptedInputDataPacket, TDes8& aDecryptedOutputDataPacket, TRequestStatus& aStatus);     
-#endif  //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
-
 	private:
 		CRefTestAgentData();
 		void ConstructL(const ContentAccess::TVirtualPathPtr& aVirtualPath, ContentAccess::TContentShareMode aShareMode);
 		void ConstructL(RFile& aFile, const TDesC& aUniqueId);
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-        void ConstructL(const TDesC8& aHeaderData);     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
 		
 	private:
 		ReferenceTestAgent::RRtaData iServer;
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-        HBufC8* iHeaderData;     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
 		};
 
 #endif // __REFTESTAGENTCONSUMER_H__
--- a/contentmgmt/referencedrmagent/RefTestAgent/RefTestAgent/Reftestagentfactory.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/RefTestAgent/RefTestAgent/Reftestagentfactory.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -71,14 +71,3 @@
 	return CRefTestAgentRightsManager::NewL();
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-CAgentData* CRefTestAgentFactory::CreateDataConsumerL(const TDesC8& aHeaderData)     
-    {     
-    return CRefTestAgentData::NewL(aHeaderData);     
-    }     
-      
-CAgentContent* CRefTestAgentFactory::CreateContentBrowserL(const TDesC8& aHeaderData)     
-    {     
-    return CRefTestAgentContent::NewL(aHeaderData);     
-    }     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
--- a/contentmgmt/referencedrmagent/RefTestAgent/RefTestAgent/Reftestagentfactory.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/RefTestAgent/RefTestAgent/Reftestagentfactory.h	Wed Apr 14 17:48:59 2010 +0300
@@ -37,10 +37,6 @@
 		virtual ContentAccess::CAgentImportFile* CreateImporterL(const TDesC8& aMimeType, const ContentAccess::CMetaDataArray& aMetaDataArray, const TDesC& aOutputDirectory, const TDesC& aSuggestedFileName);
 		virtual ContentAccess::CAgentImportFile* CreateImporterL(const TDesC8& aMimeType, const ContentAccess::CMetaDataArray& aMetaDataArray);
 		virtual ContentAccess::CAgentRightsManager* CreateRightsManagerL();	
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-        virtual ContentAccess::CAgentData* CreateDataConsumerL(const TDesC8& aHeaderData);     
-        virtual ContentAccess::CAgentContent* CreateContentBrowserL(const TDesC8& aHeaderData);     
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT   
 		};
 
 #endif // __REFTESTAGENTFACTORY_H__
--- a/contentmgmt/referencedrmagent/RefTestAgent/RefTestAgent/Reftestagentmanager.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/RefTestAgent/RefTestAgent/Reftestagentmanager.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -239,15 +239,6 @@
 	// Get the name of the file
 	TFileName fileName;
 	aFile.Name(fileName);
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-    TPtrC extension(fileName.Right(KRtaExtensionContent().Length()));     
-    TPtrC wmdrmExtn(fileName.Right(KRtaWmdrmFileExtension().Length()));     
-    if((extension.CompareF(KRtaExtensionContent) == 0) || (wmdrmExtn.CompareF(KRtaWmdrmFileExtension) == 0))     
-        {     
-        result = ETrue;     
-        }     
-      
-#else 
 	// Check that the file has content only, otherwise it should
 	// be put through the supplier API before it can be used
 	TPtrC extension(fileName.Right(KRtaExtensionContent().Length()));
@@ -255,7 +246,6 @@
 		{
 		result = ETrue;
 		}
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 	return result;
 	}
 
@@ -265,22 +255,7 @@
 	
 	// Check filename extension
 	TPtrC extension(aFileName.Right(KRtaExtensionContent().Length()));
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-    TPtrC wmdrmExtn(aFileName.Right(KRtaWmdrmFileExtension().Length()));     
-    if(wmdrmExtn.CompareF(KRtaWmdrmFileExtension) == 0)     
-        {     
-        aFileMimeType.Copy(KRtaWmaContentType);     
-        aContentMimeType.Copy(KRtaWmaContentType);     
-        result = ETrue;     
-        }     
-         
-    else if(extension.CompareF(KRtaExtensionContent) == 0)     
-        {     
-        aFileMimeType.Copy(KRtaMimeContent());     
-        CRefTestAgentArchive::GetDefaultMimeTypeFromHeaderL(aBuffer, aContentMimeType);     
-        result = ETrue;      
-        }     
-#else    
+
 	if(extension.CompareF(KRtaExtensionContent) == 0)
 		{
 		// It's a content file ready for applications to read
@@ -288,7 +263,6 @@
 		CRefTestAgentArchive::GetDefaultMimeTypeFromHeaderL(aBuffer, aContentMimeType);
 		result = ETrue;	
 		}
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 	else
 		{
 		extension.Set(aFileName.Right(KRtaExtensionContentRights().Length()));
@@ -363,51 +337,3 @@
 #endif
 
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-      
-TBool CRefTestAgentManager::IsRecognizedL(const TDesC8& aHeaderData) const
-    {
-    TBool result = EFalse;
-    if(aHeaderData.Find(KRtaAsfHeaderObject) != KErrNotFound)     
-        {     
-        result = ETrue;     
-        }     
-             
-    return result;     
-    }
-     
-TBool CRefTestAgentManager::RecognizeContentL(const TDesC8& aHeaderData, TDes8& aFileMimeType, TDes8& aContentMimeType) const     
-    {     
-    TBool result = EFalse;     
-    if(aHeaderData.Find(KRtaAsfHeaderObject) != KErrNotFound)     
-        {     
-        aFileMimeType.Copy(KRtaWmaContentType);     
-        aContentMimeType.Copy(KRtaWmaContentType);     
-        result = ETrue;     
-        }     
-         
-    return result;     
-    }     
-         
-TInt CRefTestAgentManager::GetAttribute(const TDesC8& aHeaderData, TInt aAttribute, TInt& aValue)     
-    {     
-    return iManagerSession.GetAttribute(aHeaderData, aAttribute, aValue);     
-    }     
-      
-TInt CRefTestAgentManager::GetAttributeSet(const TDesC8& aHeaderData, RAttributeSet& aAttributeSet)     
-    {     
-    return iManagerSession.GetAttributeSet(aHeaderData, aAttributeSet);     
-    }     
-      
-TInt CRefTestAgentManager::GetStringAttribute(const TDesC8& aHeaderData, TInt aAttribute, TDes& aValue)      
-    {     
-    return iManagerSession.GetStringAttribute(aHeaderData, aAttribute, aValue);     
-    }     
-      
-TInt CRefTestAgentManager::GetStringAttributeSet(const TDesC8& aHeaderData, RStringAttributeSet& aAttributeSet)      
-    {     
-    return iManagerSession.GetStringAttributeSet(aHeaderData, aAttributeSet);     
-    }     
-         
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
-
--- a/contentmgmt/referencedrmagent/RefTestAgent/RefTestAgent/Reftestagentmanager.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/RefTestAgent/RefTestAgent/Reftestagentmanager.h	Wed Apr 14 17:48:59 2010 +0300
@@ -70,14 +70,6 @@
 		virtual void AgentSpecificCommand(TInt aCommand, const TDesC8& aInputBuffer, TDes8& aOutputBuffer, TRequestStatus& aStatus);
 		virtual void DisplayManagementInfoL();
 		virtual void PrepareHTTPRequestHeaders(RStringPool& aStringPool, RHTTPHeaders& aRequestHeaders) const;
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-        virtual TBool IsRecognizedL(const TDesC8& aHeaderData) const;     
-        virtual TBool RecognizeContentL(const TDesC8& aHeaderData, TDes8& aFileMimeType, TDes8& aContentMimeType) const;     
-        virtual TInt GetAttribute(const TDesC8& aHeaderData, TInt aAttribute, TInt& aValue);     
-        virtual TInt GetAttributeSet(const TDesC8& aHeaderData, ContentAccess::RAttributeSet& aAttributeSet);     
-        virtual TInt GetStringAttributeSet(const TDesC8& aHeaderData, ContentAccess::RStringAttributeSet& aAttributeSet);     
-        virtual TInt GetStringAttribute(const TDesC8& aHeaderData, TInt aAttribute, TDes& aValue);     
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
 
 	private:
 		CRefTestAgentManager();
--- a/contentmgmt/referencedrmagent/RefTestAgent/group/RTAclient.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/RefTestAgent/group/RTAclient.mmp	Wed Apr 14 17:48:59 2010 +0300
@@ -34,11 +34,7 @@
 UNPAGED
 
 #ifdef SYMBIAN_ENABLE_64_BIT_FILE_SERVER_API
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-deffile     rtaclient_v3.def
-#else
 deffile		rtaclient_v2.def
-#endif
 #else
 deffile		rtaclient.def
 #endif
--- a/contentmgmt/referencedrmagent/RefTestAgent/group/RTAparser.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/RefTestAgent/group/RTAparser.mmp	Wed Apr 14 17:48:59 2010 +0300
@@ -32,11 +32,7 @@
 UNPAGED
 
 #ifdef SYMBIAN_ENABLE_64_BIT_FILE_SERVER_API
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-deffile     rtaparser_v3.def
-#else
 deffile		rtaparser_v2.def
-#endif
 #else
 deffile		rtaparser.def
 #endif
@@ -62,9 +58,6 @@
 SOURCE		rightscriteriacount.cpp
 SOURCE		rightscriteriaexpiry.cpp
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
-SOURCE          wmdrmcontentparser.cpp 
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
 
 USERINCLUDE		../RTAParser
 USERINCLUDE		../inc
--- a/contentmgmt/referencedrmagent/RefTestAgent/inc/reftestagentconstants.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/RefTestAgent/inc/reftestagentconstants.h	Wed Apr 14 17:48:59 2010 +0300
@@ -38,15 +38,7 @@
 
 _LIT(KRtaDefaultOutputDirectory, "c:\\");
 _LIT(KRtaDefaultOutputFile, "output");
-
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-      
-// Asf header object GUID.
-_LIT8(KRtaAsfHeaderObject, "75B22630668E11CFA6D900AA0062CE6C");
-_LIT8(KRtaWmaContentType, "audio/x-ms-wma");
-_LIT(KRtaWmdrmFileExtension, ".asf");
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-      
+   
 
 // combine KRtaDefaultOutputDirectory, KRtaDefaultOutputFile and
 // KRtaExtensionContent
--- a/contentmgmt/referencedrmagent/RefTestAgent/inc/rtacontent.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/RefTestAgent/inc/rtacontent.h	Wed Apr 14 17:48:59 2010 +0300
@@ -60,24 +60,11 @@
 		IMPORT_C void DisplayInfoL(ContentAccess::TDisplayInfo aInfo, const TDesC& aUniqueId) const;
 		IMPORT_C TInt SetProperty(ContentAccess::TAgentProperty aProperty, TInt aValue) const;
 		
-		#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-        IMPORT_C TInt Open(const TDesC8& aHeaderData);
-        IMPORT_C TInt GetWmdrmAttribute(const TDesC& aUniqueId, TInt aAttribute, TInt &aValue) const;
-        IMPORT_C TInt GetWmdrmAttributeSet(const TDesC& aUniqueId, ContentAccess::RAttributeSet &aAttributeSet) const; 
-        IMPORT_C TInt GetWmdrmStringAttribute(const TDesC& aUniqueId, TInt aAttribute, TDes &aValue) const; 
-        IMPORT_C TInt GetWmdrmStringAttributeSet(const TDesC& aUniqueId, ContentAccess::RStringAttributeSet &aStringAttributeSet) const;
-		#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
 	private:
 		void SearchL (ContentAccess::RStreamablePtrArray< ContentAccess::CEmbeddedObject > &aArray, const TDesC8 &aMimeType, TBool aRecursive) const;
 		
-		#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-            void GetAttributeSetL(const TDesC& aUniqueId, ContentAccess::RAttributeSet &aAttributeSet, TBool aWmdrmFlag = EFalse) const;
-            void GetStringAttributeSetL(const TDesC& aUniqueId, ContentAccess::RStringAttributeSet &aStringAttributeSet, TBool aWmdrmFlag = EFalse) const;
-		#else
-			void GetAttributeSetL (const TDesC& aUniqueId, ContentAccess::RAttributeSet &aAttributeSet) const;
-			void GetStringAttributeSetL (const TDesC& aUniqueId, ContentAccess::RStringAttributeSet &aStringAttributeSet) const;
-		#endif
+		void GetAttributeSetL (const TDesC& aUniqueId, ContentAccess::RAttributeSet &aAttributeSet) const;
+		void GetStringAttributeSetL (const TDesC& aUniqueId, ContentAccess::RStringAttributeSet &aStringAttributeSet) const;
 		};
 	} // namespace
 #endif
--- a/contentmgmt/referencedrmagent/RefTestAgent/inc/rtadata.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/RefTestAgent/inc/rtadata.h	Wed Apr 14 17:48:59 2010 +0300
@@ -59,23 +59,10 @@
 		IMPORT_C TInt GetStringAttribute (TInt aAttribute, TDes &aValue) const; 
 		IMPORT_C TInt GetStringAttributeSet (ContentAccess::RStringAttributeSet &aStringAttributeSet) const; 
 		IMPORT_C TInt SetProperty(ContentAccess::TAgentProperty aProperty, TInt aValue) const;
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-        IMPORT_C TInt Open(const TDesC8& aHeaderData);
-        IMPORT_C TInt Read(const TDesC8& aEncryptedInputPacket, TDes8& aDecryptedOutputPacket);
-        IMPORT_C TInt GetWmdrmAttribute(TInt aAttribute, TInt &aValue) const;
-        IMPORT_C TInt GetWmdrmAttributeSet(ContentAccess::RAttributeSet &aAttributeSet) const;
-        IMPORT_C TInt GetWmdrmStringAttribute(TInt aAttribute, TDes &aValue) const;
-        IMPORT_C TInt GetWmdrmStringAttributeSet(ContentAccess::RStringAttributeSet &aStringAttributeSet) const;
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 		
 	private:
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-        void GetAttributeSetL (ContentAccess::RAttributeSet &aAttributeSet, TBool aWmdrmFlag = EFalse) const;
-        void GetStringAttributeSetL (ContentAccess::RStringAttributeSet &aStringAttributeSet, TBool aWmdrmFlag = EFalse) const;
-#else
 		void GetAttributeSetL (ContentAccess::RAttributeSet &aAttributeSet) const;
 		void GetStringAttributeSetL (ContentAccess::RStringAttributeSet &aStringAttributeSet) const;
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 
 		};
 	} // namespace
--- a/contentmgmt/referencedrmagent/RefTestAgent/inc/rtamanager.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/RefTestAgent/inc/rtamanager.h	Wed Apr 14 17:48:59 2010 +0300
@@ -73,12 +73,6 @@
 		IMPORT_C void DisplayInfoL(ContentAccess::TDisplayInfo aInfo, RFile& aFile, const TDesC& aUniqueId) const;
 		IMPORT_C TInt AgentSpecificCommand(TInt aCommand, const TDesC8& aInputBuffer, TDes8& aOutputBuffer) const;		 
 		IMPORT_C void DisplayManagementInfoL() const;
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-        IMPORT_C TInt GetAttribute(const TDesC8& aHeaderData, TInt aAttribute, TInt& aValue) const;
-        IMPORT_C TInt GetAttributeSet(const TDesC8& aHeaderData, ContentAccess::RAttributeSet& aAttributeSet) const;
-        IMPORT_C TInt GetStringAttributeSet(const TDesC8& aHeaderData, ContentAccess::RStringAttributeSet& aAttributeSet) const;
-        IMPORT_C TInt GetStringAttribute(const TDesC8& aHeaderData, TInt aAttribute, TDes& aValue) const;
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 
 	private:
 		enum TRetrievalType
@@ -96,10 +90,6 @@
 		void GetStringAttributeSetL(ContentAccess::RStringAttributeSet& aStringAttributeSet, RFile& aFile, const TDesC& aUniqueId) const;
 		void AttributeSetL(const TRetrievalType& aRetrievalType,const ContentAccess::TVirtualPathPtr* aVirtualPath, ...) const;
 		void StringAttributeSetL(const TRetrievalType& aRetrievalType,const ContentAccess::TVirtualPathPtr* aVirtualPath, ...) const;
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-        void GetAttributeSetL(const TDesC8& aHeaderData, ContentAccess::RAttributeSet& aAttributeSet) const;
-        void GetStringAttributeSetL(const TDesC8& aHeaderData, ContentAccess::RStringAttributeSet& aAttributeSet) const;
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 
 		};
 	} // namespace
--- a/contentmgmt/referencedrmagent/tcaf/scripts/tcafhelper.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,18 +0,0 @@
-
-[CafHelperFilename]
-uri = c:\tcaf\testdata\test.drm
-error = -17452
-expected = -5
-flag = true
-
-[CafHelperFileHandle]
-uri = c:\tcaf\testdata\test.drm
-error = -17452
-expected = -5
-
-[CafHelperFileHeader]
-error = -17452
-expected = -5
-flag = false
-
-
--- a/contentmgmt/referencedrmagent/tcaf/scripts/tcafhelper.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,73 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-
-LOAD_SUITE tcaf
-
-RUN_UTILS MkDir c:\tcaf\
-RUN_UTILS MkDir c:\tcaf\testdata\
-RUN_UTILS MkDir c:\tcaf\testdata\TestAgentPrivateDir\
-
-RUN_UTILS CopyFile z:\rta\testdata\*.* c:\rta\testdata\*.*
-RUN_UTILS CopyFile z:\tcaf\testdata\*.* c:\tcaf\testdata\*.*
-RUN_UTILS CopyFile z:\tcaf\testdata\TestAgentPrivateDir\*.* c:\tcaf\testdata\TestAgentPrivateDir\*.*
-
-//! @file
-//! @SYMTestCaseID 		SEC-CAFHELPER-0001
-//! @SYMTestCaseDesc 		CafHelper API Test 1 
-//! @SYMPREQ			PREQ2086
-//! @SYMTestStatus		Implemented
-//! @SYMTestPriority		Medium
-//! @SYMTestActions		Constructs CCafHelper and tests if the reference cafhelper.dll gets loaded properly and 
-//!				calls the HandleCAFErrorL API overload which takes in the filename as input parameter.
-//! @SYMTestExpectedResults	Reference cafhelper.dll must be loaded successfully and the result of the HandleCAFErrorL
-//!				API must match the expected.
-//! @SYMTestType		CIT
-START_TESTCASE SEC-CAFHELPER-0001
-RUN_TEST_STEP 100 tcaf CAFHelperStep c:\tcaf\tcafhelper.ini CafHelperFilename
-END_TESTCASE SEC-CAFHELPER-0001
-
-//! @file
-//! @SYMTestCaseID 		SEC-CAFHELPER-0002
-//! @SYMTestCaseDesc 		CafHelper API Test 2 
-//! @SYMPREQ			PREQ2086
-//! @SYMTestStatus		Implemented
-//! @SYMTestPriority		Medium
-//! @SYMTestActions		Constructs CCafHelper and tests if the reference cafhelper.dll gets loaded properly and 
-//!				calls the HandleCAFErrorL API overload which takes in the filehandle as input parameter.
-//! @SYMTestExpectedResults	Reference cafhelper.dll must be loaded successfully and the result of the HandleCAFErrorL
-//!				API must match the expected.
-//! @SYMTestType		CIT
-START_TESTCASE SEC-CAF-UTILS-0002
-RUN_TEST_STEP 100 tcaf CAFHelperStep c:\tcaf\tcafhelper.ini CafHelperFileHandle
-END_TESTCASE SEC-CAF-UTILS-0002
-
-//! @file
-//! @SYMTestCaseID 		SEC-CAFHELPER-0003
-//! @SYMTestCaseDesc 		CafHelper API Test 3 
-//! @SYMPREQ			PREQ2086
-//! @SYMTestStatus		Implemented
-//! @SYMTestPriority		Medium
-//! @SYMTestActions		Constructs CCafHelper and tests if the reference cafhelper.dll gets loaded properly and 
-//!				calls the HandleCAFErrorL API overload which takes in the fileheader as input parameter.
-//! @SYMTestExpectedResults	Reference cafhelper.dll must be loaded successfully and the result of the HandleCAFErrorL
-//!				API must match the expected.
-//! @SYMTestType		CIT
-START_TESTCASE SEC-CAFHELPER-0003
-RUN_TEST_STEP 100 tcaf CAFHelperStep c:\tcaf\tcafhelper.ini CafHelperFileHeader
-END_TESTCASE SEC-CAFHELPER-0003
-
-
--- a/contentmgmt/referencedrmagent/tcaf/scripts/tcafwmdrmsupport.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,205 +0,0 @@
-[WMDRMDataReadSyncWithIntent]
-synchronous = true
-intent = false
-inputPacket = I\0N\0P\0U\0T\0D\0A\0T\0A\0
-outputPacket = I\0N\0P\0U\0T\0D\0A\0T\0A\0
-
-[WMDRMDataReadSyncWithoutIntent]
-synchronous = true
-intent = true
-inputPacket =  S\0O\0M\0E\0D\0A\0T\0A\0
-outputPacket = S\0O\0M\0E\0D\0A\0T\0A\0
-
-[WMDRMDataReadAsyncWithIntent]
-synchronous = false
-intent = false
-inputPacket = I\0N\0P\0U\0T\0D\0A\0T\0A\0
-outputPacket = I\0N\0P\0U\0T\0D\0A\0T\0A\0
-
-[WMDRMDataReadAsyncWithoutIntent]
-synchronous = false
-intent = true
-inputPacket =  S\0O\0M\0E\0D\0A\0T\0A\0
-outputPacket = S\0O\0M\0E\0D\0A\0T\0A\0
-
-[WMDRMManagerAttribute]
-attribute = 0
-value = 0
-wmdrmEnabled = true
-
-[WMDRMManagerAttributeSet]
-attribute1 = 0
-value1 = 0
-attribute2 = 1
-value2 = 1
-wmdrmEnabled = true
-
-[WMDRMManagerStringAttribute]
-attribute = 1
-value = 
-result = 0
-wmdrmEnabled = true
-result = 0
-
-[WMDRMManagerStringAttributeSet]
-attribute1 = 1
-value1 = 
-attribute2 = 7
-value2 = DEFAULT
-wmdrmEnabled = true
-
-[WMDRMManagerInvalidStringAttributeSet]
-attribute1 = 18
-value1 = 
-attribute2 = 20
-value2 = DEFAULT
-wmdrmEnabled = true
-
-[WMDRMContentNewAttribute]
-attribValue1= false
-attribValue2= true
-
-[WMDRMEmptyHeaderData]
-headerDataFlag = false
-
-[WMDRMDataReadAsyncEmptyInputPacket]
-synchronous = false
-intent = false
-inputPacket =
-
-[WMDRMDataReadSyncEmptyInputPacket]
-synchronous = true
-intent = true
-inputPacket =
-
-[WMDRMFileRecognizeTest]
-FileName = c:\tcaf\testdata\dummywm.asf
-Container = audio/x-ms-wma
-Content = audio/x-ms-wma
-Recognized = true
-
-[WMDRMStreamContentRecognizeTest]
-header = 75B22630668E11CFA6D900AA0062CE6C
-filemime = audio/x-ms-wma
-contentmime = audio/x-ms-wma
-recognized = true
-wmdrmEnabled = true
-
-[WMDRMRTADataAttribute]
-header = 75B22630668E11CFA6D900AA0062CE6C
-attribute = 1
-value = 0
-wmdrmEnabled = true
-
-[WMDRMRTADataAttributeSet]
-header = 75B22630668E11CFA6D900AA0062CE6C
-attribute1 = 0
-value1 = 1
-attribute2 = 1
-value2 = 0
-wmdrmEnabled = true
-
-[WMDRMRTADataStringAttribute]
-header = 75B22630668E11CFA6D900AA0062CE6C
-attribute = 0
-value = WMDRM
-result = 0
-wmdrmEnabled = true
-
-[WMDRMRTADataStringAttributeSet]
-header = 75B22630668E11CFA6D900AA0062CE6C
-attribute1 = 0
-value1 = WMDRM
-attribute2 = 1
-value2 = application/vnd.drm.asf
-wmdrmEnabled = true
-
-[WMDRMRTAContentAttribute]
-header = 75B22630668E11CFA6D900AA0062CE6C
-attribute = 0
-value = 1
-wmdrmEnabled = true
-
-[WMDRMRTAContentAttributeSet]
-header = 75B22630668E11CFA6D900AA0062CE6C
-attribute1 = 0
-value1 = 1
-attribute2 = 1
-value2 = 0
-wmdrmEnabled = true
-
-[WMDRMRTAContentStringAttribute]
-header = 75B22630668E11CFA6D900AA0062CE6C
-attribute = 0
-value = WMDRM
-wmdrmEnabled = true
-result = 0
-
-[WMDRMRTAContentStringAttributeSet]
-header = 75B22630668E11CFA6D900AA0062CE6C
-attribute1 = 0
-value1 = WMDRM
-attribute2 = 1
-value2 = application/vnd.drm.asf
-wmdrmEnabled = true
-
-[WMDRMRTAManagerAttribute]
-header = 75B22630668E11CFA6D900AA0062CE6C
-attribute = 0
-value = 1
-wmdrmEnabled = true
-
-[WMDRMRTAManagerAttributeSet]
-header = 75B22630668E11CFA6D900AA0062CE6C
-attribute1 = 0
-value1 = 1
-attribute2 = 1
-value2 = 0
-wmdrmEnabled = true
-
-[WMDRMRTAManagerStringAttribute]
-header = 75B22630668E11CFA6D900AA0062CE6C
-attribute = 0
-value = WMDRM
-wmdrmEnabled = true
-result = 0
-
-[WMDRMRTAManagerStringAttributeSet]
-header = 75B22630668E11CFA6D900AA0062CE6C
-attribute1 = 0
-value1 = WMDRM
-attribute2 = 1
-value2 = application/vnd.drm.asf
-wmdrmEnabled = true
-
-[WMDRMRTADataReadSyncWithIntent]
-header = 75B22630668E11CFA6D900AA0062CE6C
-synchronous = true
-intent = false
-inputPacket = R\0T\0A\0U\0T\0D\0A\0T\0A\0
-outputPacket = R\0T\0A\0U\0T\0D\0A\0T\0A\0
-wmdrmEnabled = true
-
-[WMDRMRTADataReadSyncWithoutIntent]
-header = 75B22630668E11CFA6D900AA0062CE6C
-synchronous = true
-intent = true
-inputPacket =  R\0O\0T\0A\0D\0A\0T\0A\0
-outputPacket = R\0O\0T\0A\0D\0A\0T\0A\0
-wmdrmEnabled = true
-
-[WMDRMRTADataReadAsyncWithIntent]
-header = 75B22630668E11CFA6D900AA0062CE6C
-synchronous = false
-intent = false
-inputPacket = R\0T\0A\0U\0T\0D\0A\0T\0A\0
-outputPacket = R\0T\0A\0U\0T\0D\0A\0T\0A\0
-wmdrmEnabled = true
-
-[WMDRMRTADataReadAsyncWithoutIntent]
-header = 75B22630668E11CFA6D900AA0062CE6C
-synchronous = false
-intent = true
-inputPacket =  R\0O\0T\0A\0D\0A\0T\0A\0
-outputPacket = R\0O\0T\0A\0D\0A\0T\0A\0
-wmdrmEnabled = true
--- a/contentmgmt/referencedrmagent/tcaf/scripts/tcafwmdrmsupport.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,422 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-
-LOAD_SUITE tcaf
-
-RUN_UTILS MkDir c:\tcaf\
-RUN_UTILS MkDir c:\tcaf\testdata\
-RUN_UTILS MkDir c:\tcaf\testdata\TestAgentPrivateDir\
-
-RUN_UTILS CopyFile z:\rta\testdata\*.* c:\rta\testdata\*.*
-RUN_UTILS CopyFile z:\tcaf\testdata\*.* c:\tcaf\testdata\*.*
-RUN_UTILS CopyFile z:\tcaf\testdata\TestAgentPrivateDir\*.* c:\tcaf\testdata\TestAgentPrivateDir\*.*
-
-START_TESTCASE 			SEC-CAF-WMDRM-0001
-//! @file
-//! @SYMTestCaseID 		SEC-CAF-WMDRM-0001
-//! @SYMTestCaseDesc 		Verifies the synchronous Read operation.
-//! @SYMPREQ			REQ11881, REQ11882
-//! @SYMTestStatus		Implemented
-//! @SYMTestPriority		Normal
-//! @SYMTestActions		Construct CData object from WMDRM header data and call the synchronous Read API providing an input data packet.The header data must not be recognized by any agent and F32 agent must handle this content.
-//! @SYMTestExpectedResults	CData object should be constructed successfully and the decrypted output packet resulting from Read operation must match the expected output packet.
-//! @SYMTestType		CIT
-RUN_TEST_STEP 100 tcaf WmdrmCAFReadStep c:\tcaf\tcafwmdrmsupport.ini WMDRMDataReadSyncWithIntent
-END_TESTCASE 			SEC-CAF-WMDRM-0001
-
-START_TESTCASE 			SEC-CAF-WMDRM-0002
-//! @file
-//! @SYMTestCaseID 		SEC-CAF-WMDRM-0002
-//! @SYMTestCaseDesc 		Verifies the synchronous Read operation.
-//! @SYMPREQ			REQ11881, REQ11882
-//! @SYMTestStatus		Implemented
-//! @SYMTestPriority		Normal
-//! @SYMTestActions		Construct CData object from WMDRM header data and call the synchronous Read API providing an input data packet.The header data must not be recognized by any agent and F32 agent must handle this content.
-//! @SYMTestExpectedResults	CData object should be constructed successfully and the decrypted output packet resulting from Read operation must match the expected output packet.
-//! @SYMTestType		CIT
-RUN_TEST_STEP 100 tcaf WmdrmCAFReadStep c:\tcaf\tcafwmdrmsupport.ini WMDRMDataReadSyncWithoutIntent
-END_TESTCASE 			SEC-CAF-WMDRM-0002
-
-START_TESTCASE 			SEC-CAF-WMDRM-0003
-//! @file
-//! @SYMTestCaseID 		SEC-CAF-WMDRM-0003
-//! @SYMTestCaseDesc 		Verifies the asynchronous Read operation.
-//! @SYMPREQ			REQ11881, REQ11882
-//! @SYMTestStatus		Implemented
-//! @SYMTestPriority		Normal
-//! @SYMTestActions		Construct CData object from WMDRM header data and call the asynchronous Read API providing an input data packet.The header data must not be recognized by any agent and F32 agent must handle this content.
-//! @SYMTestExpectedResults	CData object should be constructed successfully and the decrypted output packet resulting from Read operation must match the expected output packet.
-//! @SYMTestType		CIT
-RUN_TEST_STEP 100 tcaf WmdrmCAFReadStep c:\tcaf\tcafwmdrmsupport.ini WMDRMDataReadAsyncWithIntent
-END_TESTCASE 			SEC-CAF-WMDRM-0003
-
-START_TESTCASE 			SEC-CAF-WMDRM-0004
-//! @file
-//! @SYMTestCaseID 		SEC-CAF-WMDRM-0004
-//! @SYMTestCaseDesc 		Verifies the asynchronous Read operation.
-//! @SYMPREQ			REQ11881, REQ11882
-//! @SYMTestStatus		Implemented
-//! @SYMTestPriority		Normal
-//! @SYMTestActions		Construct CData object from WMDRM header data and call the asynchronous Read API providing an input data packet.The header data must not be recognized by any agent and F32 agent must handle this content.
-//! @SYMTestExpectedResults	CData object should be constructed successfully and the decrypted output packet resulting from Read operation must match the expected output packet.
-//! @SYMTestType		CIT
-RUN_TEST_STEP 100 tcaf WmdrmCAFReadStep c:\tcaf\tcafwmdrmsupport.ini WMDRMDataReadAsyncWithoutIntent
-END_TESTCASE 			SEC-CAF-WMDRM-0004
-
-START_TESTCASE 			SEC-CAF-WMDRM-0005
-//! @file
-//! @SYMTestCaseID 		SEC-CAF-WMDRM-0005
-//! @SYMTestCaseDesc 		Get a single attribute from WMDRM content.
-//!				(Manager_Attribute)
-//! @SYMREQ			REQ11881, REQ11882
-//! @SYMTestStatus		Implemented
-//! @SYMTestPriority		Normal
-//! @SYMTestActions		Construct CManager object and verify GetAttribute API overload taking WMDRM header data as input.The header data must not be supported by any agent and F32 agent must handle this content.
-//! @SYMTestExpectedResults	CManager object should be constructed successully and the attribute value obtained must match the expected.
-//! @SYMTestType		CIT
-RUN_TEST_STEP 100 tcaf CAFManagerAttributeStep c:\tcaf\tcafwmdrmsupport.ini WMDRMManagerAttribute
-END_TESTCASE 			SEC-CAF-WMDRM-0005
-
-START_TESTCASE 			SEC-CAF-WMDRM-0006
-//! @file
-//! @SYMTestCaseID 		SEC-CAF-WMDRM-0006
-//! @SYMTestCaseDesc 		Get a set of attributes from WMDRM content.
-//!				(Manager_AttributeSet)
-//! @SYMREQ			REQ11881, REQ11882
-//! @SYMTestStatus		Implemented
-//! @SYMTestPriority		Normal
-//! @SYMTestActions		Construct CManager object and verify GetAttributeSet API overload taking WMDRM header data as input.The header data must not be supported by any agent and F32 agent must handle this content.
-//! @SYMTestExpectedResults	CManager object should be constructed successully and the attribute set obtained must match the expected.
-//! @SYMTestType		CIT
-RUN_TEST_STEP 100 tcaf CAFManagerAttributeSetStep c:\tcaf\tcafwmdrmsupport.ini WMDRMManagerAttributeSet
-END_TESTCASE 			SEC-CAF-WMDRM-0006
-
-START_TESTCASE 			SEC-CAF-WMDRM-0007
-//! @file
-//! @SYMTestCaseID 		SEC-CAF-WMDRM-0007
-//! @SYMTestCaseDesc 		Get a string attribute from WMDRM content.
-//!				(Manager_Attribute)
-//! @SYMREQ			REQ11881, REQ11882
-//! @SYMTestStatus		Implemented
-//! @SYMTestPriority		Normal
-//! @SYMTestActions		Construct CManager object and verify GetStringAttribute API overload taking WMDRM header data as input.The header data must not be supported by any agent and F32 agent must handle this content.
-//! @SYMTestExpectedResults	CManager object should be constructed successully and the string attribute value obtained must match the expected.
-//! @SYMTestType		CIT
-RUN_TEST_STEP 100 tcaf CAFManagerStringAttributeStep c:\tcaf\tcafwmdrmsupport.ini WMDRMManagerStringAttribute
-END_TESTCASE 			SEC-CAF-WMDRM-0007
-
-START_TESTCASE 			SEC-CAF-WMDRM-0008
-//! @file
-//! @SYMTestCaseID 		SEC-CAF-WMDRM-0008
-//! @SYMTestCaseDesc 		Get a set of string attributes from WMDRM content.
-//!				(Manager_AttributeSet)
-//! @SYMREQ			REQ11881, REQ11882
-//! @SYMTestStatus		Implemented
-//! @SYMTestPriority		Normal
-//! @SYMTestActions		Construct CManager object and verify GetStringAttributeSet API overload taking WMDRM header data as input.The header data must not be supported by any agent and F32 agent must handle this content.
-//! @SYMTestExpectedResults	CManager object should be constructed successully and the string attribute set obtained must match the expected.
-//! @SYMTestType		CIT
-RUN_TEST_STEP 100 tcaf CAFManagerStringAttributeSetStep c:\tcaf\tcafwmdrmsupport.ini WMDRMManagerStringAttributeSet
-END_TESTCASE 			SEC-CAF-WMDRM-0008
-
-START_TESTCASE 			SEC-CAF-WMDRM-0009
-//! @file
-//! @SYMTestCaseID 		SEC-CAF-WMDRM-0009
-//! @SYMTestCaseDesc 		Verify CContent's NewAttributeL() API for WMDRM content.The header data must not be supported by any agent and F32 agent must handle this content.
-//! @SYMREQ			REQ11881, REQ11882
-//! @SYMTestStatus		Implemented
-//! @SYMTestPriority		Normal
-//! @SYMTestActions		Construct CContent object and verify the behaviour of NewAttributeL for WMDRM content.
-//! @SYMTestExpectedResults	CContent object should be constructed successully and the attribute value obtained must match the expected.
-//! @SYMTestType		CIT
-RUN_TEST_STEP 100 tcaf WmdrmCAFContentStep c:\tcaf\tcafwmdrmsupport.ini WMDRMContentNewAttribute
-END_TESTCASE 			SEC-CAF-WMDRM-0009
-
-START_TESTCASE 			SEC-CAF-WMDRM-0010
-//! @file
-//! @SYMTestCaseID 		SEC-CAF-WMDRM-0010
-//! @SYMTestCaseDesc 		Verify that CContent object construction fails when an empty wmdrm header data is used.
-//! @SYMREQ			REQ11882
-//! @SYMTestStatus		Implemented
-//! @SYMTestPriority		Normal
-//! @SYMTestActions		Construct CContent object and verify CContent object construction fails with KErrMissingWmdrmHeaderData.
-//! @SYMTestExpectedResults	CContent object construction should fail with KErrMissingWmdrmHeaderData.
-//! @SYMTestType		CIT
-RUN_TEST_STEP_RESULT -17461 100 tcaf WmdrmCAFContentStep c:\tcaf\tcafwmdrmsupport.ini WMDRMEmptyHeaderData
-END_TESTCASE 			SEC-CAF-WMDRM-0010
-
-START_TESTCASE 			SEC-CAF-WMDRM-0011
-//! @file
-//! @SYMTestCaseID 		SEC-CAF-WMDRM-0011
-//! @SYMTestCaseDesc 		Verifies that the synchronous Read operation fails with KErrInsufficientDataPacketLength when empty input data packet is provided.
-//! @SYMPREQ			REQ11881, REQ11882
-//! @SYMTestStatus		Implemented
-//! @SYMTestPriority		Normal
-//! @SYMTestActions		Construct CData object from WMDRM header data and call the synchronous Read API providing an empty input data packet.
-//! @SYMTestExpectedResults	Read operation must fail with KErrInsufficientDataPacketLength.
-//! @SYMTestType		CIT
-RUN_TEST_STEP_RESULT -17460 100 tcaf WmdrmCAFReadStep c:\tcaf\tcafwmdrmsupport.ini WMDRMDataReadSyncEmptyInputPacket
-END_TESTCASE 			SEC-CAF-WMDRM-0011
-
-START_TESTCASE 			SEC-CAF-WMDRM-0012
-//! @file
-//! @SYMTestCaseID 		SEC-CAF-WMDRM-0012
-//! @SYMTestCaseDesc 		Verifies that the asynchronous Read operation fails with KErrInsufficientDataPacketLength when empty input data packet is provided.
-//! @SYMPREQ			REQ11881, REQ11882
-//! @SYMTestStatus		Implemented
-//! @SYMTestPriority		Normal
-//! @SYMTestActions		Construct CData object from WMDRM header data and call the asynchronous Read API providing an empty input data packet.
-//! @SYMTestExpectedResults	Read operation must fail with KErrInsufficientDataPacketLength.
-//! @SYMTestType		CIT
-RUN_TEST_STEP_RESULT -17460 100 tcaf WmdrmCAFReadStep c:\tcaf\tcafwmdrmsupport.ini WMDRMDataReadAsyncEmptyInputPacket
-END_TESTCASE 			SEC-CAF-WMDRM-0012
-
-START_TESTCASE 			SEC-CAF-WMDRM-0013
-//! @file
-//! @SYMTestCaseID 		SEC-CAF-WMDRM-0013
-//! @SYMTestCaseDesc 		Verify resolver's DoRecognizeL API behaviour when WMDRM file is provided as input.The header data provided must match the one supported by RTA.
-//!				(DRM_Recognize)
-//! @SYMREQ			REQ12826,REQ
-//! @SYMTestStatus		Implemented
-//! @SYMTestPriority		Normal
-//! @SYMTestActions		Verify that RTA agent should recognize a given WMDRM file.
-//! @SYMTestExpectedResults	The WMDRM file should be recognized by RTA and the file mime type must match the expected.
-//! @SYMTestType		CIT
-RUN_TEST_STEP 100 tcaf CAFRecognizeStep c:\tcaf\tcafwmdrmsupport.ini WMDRMFileRecognizeTest
-END_TESTCASE 			SEC-CAF-WMDRM-0013
-
-START_TESTCASE 			SEC-CAF-WMDRM-0014
-//! @file
-//! @SYMTestCaseID 		SEC-CAF-WMDRM-0014
-//! @SYMTestCaseDesc 		Verify resolver's DoRecognizeL API behaviour when WMDRM header data is provided as input.The header data provided must match the one supported by RTA.
-//!				(DRM_Recognize)
-//! @SYMREQ			REQ12826
-//! @SYMTestStatus		Implemented
-//! @SYMTestPriority		Normal
-//! @SYMTestActions		Verify that RTA agent should recognize WMDRM stream content.
-//! @SYMTestExpectedResults	The WMDRM streamed content should be recognized by RTA and the content mime type must match the expected.
-//! @SYMTestType		CIT
-RUN_TEST_STEP 100 tcaf CAFRecognizeStep c:\tcaf\tcafwmdrmsupport.ini WMDRMStreamContentRecognizeTest
-END_TESTCASE 			SEC-CAF-WMDRM-0014
-
-START_TESTCASE 			SEC-CAF-WMDRM-0015
-//! @file
-//! @SYMTestCaseID 		SEC-CAF-WMDRM-0015
-//! @SYMTestCaseDesc 		Verifies RTA agent's synchronous Read API behaviour.
-//! @SYMPREQ			REQ12826, REQ12726
-//! @SYMTestStatus		Implemented
-//! @SYMTestPriority		Normal
-//! @SYMTestActions		Construct CData object from WMDRM header data and call the synchronous Read API providing an input data packet.
-//! @SYMTestExpectedResults	CData object should be constructed successfully and the decrypted output packet resulting from Read operation must match the expected output packet.
-//! @SYMTestType		CIT
-RUN_TEST_STEP 100 tcaf WmdrmCAFReadStep c:\tcaf\tcafwmdrmsupport.ini WMDRMRTADataReadSyncWithIntent
-END_TESTCASE 			SEC-CAF-WMDRM-0015
-
-START_TESTCASE 			SEC-CAF-WMDRM-0016
-//! @file
-//! @SYMTestCaseID 		SEC-CAF-WMDRM-0016
-//! @SYMTestCaseDesc 		Verifies RTA agent's synchronous Read API behaviour when intent is not provided.
-//! @SYMPREQ			REQ12826, REQ12726
-//! @SYMTestStatus		Implemented
-//! @SYMTestPriority		Normal
-//! @SYMTestActions		Construct CData object from WMDRM header data and call the synchronous Read API providing an input data packet.
-//! @SYMTestExpectedResults	CData object should be constructed successfully and the decrypted output packet resulting from Read operation must match the expected output packet.
-//! @SYMTestType		CIT
-RUN_TEST_STEP 100 tcaf WmdrmCAFReadStep c:\tcaf\tcafwmdrmsupport.ini WMDRMRTADataReadSyncWithoutIntent
-END_TESTCASE 			SEC-CAF-WMDRM-0016
-
-START_TESTCASE 			SEC-CAF-WMDRM-0017
-//! @file
-//! @SYMTestCaseID 		SEC-CAF-WMDRM-0017
-//! @SYMTestCaseDesc 		Verifies RTA agent's asynchronous Read behaviour.
-//! @SYMPREQ			REQ12826, REQ12726
-//! @SYMTestStatus		Implemented
-//! @SYMTestPriority		Normal
-//! @SYMTestActions		Construct CData object from WMDRM header data and call the asynchronous Read API providing an input data packet.
-//! @SYMTestExpectedResults	CData object should be constructed successfully and the decrypted output packet resulting from Read operation must match the expected output packet.
-//! @SYMTestType		CIT
-RUN_TEST_STEP 100 tcaf WmdrmCAFReadStep c:\tcaf\tcafwmdrmsupport.ini WMDRMRTADataReadAsyncWithIntent
-END_TESTCASE 			SEC-CAF-WMDRM-0017
-
-START_TESTCASE 			SEC-CAF-WMDRM-0018
-//! @file
-//! @SYMTestCaseID 		SEC-CAF-WMDRM-0018
-//! @SYMTestCaseDesc 		Verifies RTA agent's asynchronous Read behaviour when intent is not provided.
-//! @SYMPREQ			REQ12826, REQ12726
-//! @SYMTestStatus		Implemented
-//! @SYMTestPriority		Normal
-//! @SYMTestActions		Construct CData object from WMDRM header data and call the asynchronous Read API providing an input data packet.
-//! @SYMTestExpectedResults	CData object should be constructed successfully and the decrypted output packet resulting from Read operation must match the expected output packet.
-//! @SYMTestType		CIT
-RUN_TEST_STEP 100 tcaf WmdrmCAFReadStep c:\tcaf\tcafwmdrmsupport.ini WMDRMRTADataReadAsyncWithoutIntent
-END_TESTCASE 			SEC-CAF-WMDRM-0018
-
-START_TESTCASE 			SEC-CAF-WMDRM-0019
-//!@file
-//!SYMTestCaseID 		SEC-CAF-WMDRM-0019
-//!SYMTestCaseDesc 		Get an attribute from WMDRM content using CData.The header data provided must match the one supported by RTA.
-//!SYMPREQ			REQ12826
-//!SYMTestStatus		Implemented
-//!SYMTestPriority		Medium
-//!SYMTestActions		Verify RTA agent's GetAttribute API
-//!SYMTestExpectedResults	Attribute obtained must match the expected.
-//!SYMTestType			CIT
-RUN_TEST_STEP 100 tcaf CAFDataAttributeStep c:\tcaf\tcafwmdrmsupport.ini WMDRMRTADataAttribute
-END_TESTCASE			SEC-CAF-WMDRM-0019
-
-START_TESTCASE 			SEC-CAF-WMDRM-0020
-//!@file
-//!SYMTestCaseID 		SEC-CAF-WMDRM-0020
-//!SYMTestCaseDesc 		Get an attribute set from WMDRM content using CData.The header data provided must match the one supported by RTA.
-//!SYMPREQ			REQ12826
-//!SYMTestStatus		Implemented
-//!SYMTestPriority		Medium
-//!SYMTestActions		Verify RTA agent's GetAttributeSet API.
-//!SYMTestExpectedResults	Attributes obtained must match the expected.
-//!SYMTestType			CIT
-RUN_TEST_STEP 100 tcaf CAFDataAttributeSetStep c:\tcaf\tcafwmdrmsupport.ini WMDRMRTADataAttributeSet
-END_TESTCASE			SEC-CAF-WMDRM-0020
-
-START_TESTCASE 			SEC-CAF-WMDRM-0021
-//!@file
-//!SYMTestCaseID 		SEC-CAF-WMDRM-0021
-//!SYMTestCaseDesc 		Get a string attribute from WMDRM content using CData.The header data provided must match the one supported by RTA.
-//!SYMPREQ			REQ12826
-//!SYMTestStatus		Implemented
-//!SYMTestPriority		Medium
-//!SYMTestActions		Verify RTA agent's GetStringAttribute API.
-//!SYMTestExpectedResults	String attribute obtained must match the expected.
-//!SYMTestType			CIT
-RUN_TEST_STEP 100 tcaf CAFDataStringAttributeStep c:\tcaf\tcafwmdrmsupport.ini WMDRMRTADataStringAttribute
-END_TESTCASE			SEC-CAF-WMDRM-0021
-
-START_TESTCASE 			SEC-CAF-WMDRM-0022
-//!@file
-//!SYMTestCaseID 		SEC-CAF-WMDRM-0022
-//!SYMTestCaseDesc 		Get string attribute set from WMDRM content using CData.The header data provided must match the one supported by RTA.
-//!SYMPREQ			REQ12826
-//!SYMTestStatus		Implemented
-//!SYMTestPriority		Medium
-//!SYMTestActions		Verify RTA agent's GetStringAttributeSet API.
-//!SYMTestExpectedResults	String attributes obtained must match the expected.
-//!SYMTestType			CIT
-RUN_TEST_STEP 100 tcaf CAFDataStringAttributeSetStep c:\tcaf\tcafwmdrmsupport.ini WMDRMRTADataStringAttributeSet
-END_TESTCASE			SEC-CAF-WMDRM-0022
-
-START_TESTCASE 			SEC-CAF-WMDRM-0023
-//!@file
-//!SYMTestCaseID 		SEC-CAF-WMDRM-0023
-//!SYMTestCaseDesc 		Get an attribute from WMDRM content using CContent.The header data provided must match the one supported by RTA.
-//!SYMPREQ			REQ12826
-//!SYMTestStatus		Implemented
-//!SYMTestPriority		Medium
-//!SYMTestActions		Verify RTA agent's GetAttribute API.
-//!SYMTestExpectedResults	Attribute obtained must match the expected.
-//!SYMTestType			CIT
-RUN_TEST_STEP 100 tcaf CAFContentAttributeStep c:\tcaf\tcafwmdrmsupport.ini WMDRMRTAContentAttribute
-END_TESTCASE			SEC-CAF-WMDRM-0023
-
-START_TESTCASE 			SEC-CAF-WMDRM-0024
-//!@file
-//!SYMTestCaseID 		SEC-CAF-WMDRM-0024
-//!SYMTestCaseDesc 		Get an attribute set from WMDRM content using CContent.The header data provided must match the one supported by RTA.
-//!SYMPREQ			REQ12826
-//!SYMTestStatus		Implemented
-//!SYMTestPriority		Medium
-//!SYMTestActions		Verify RTA agent's GetAttributeSet API.
-//!SYMTestExpectedResults	Attributes obtained must match the expected.
-//!SYMTestType			CIT
-RUN_TEST_STEP 100 tcaf CAFContentAttributeSetStep c:\tcaf\tcafwmdrmsupport.ini WMDRMRTAContentAttributeSet
-END_TESTCASE			SEC-CAF-WMDRM-0024
-
-START_TESTCASE 			SEC-CAF-WMDRM-0025
-//!@file
-//!SYMTestCaseID 		SEC-CAF-WMDRM-0025
-//!SYMTestCaseDesc 		Get a string attribute from WMDRM content using CContent.The header data provided must match the one supported by RTA.
-//!SYMPREQ			REQ12826
-//!SYMTestStatus		Implemented
-//!SYMTestPriority		Medium
-//!SYMTestActions		Verify RTA agent's GetStringAttribute API.
-//!SYMTestExpectedResults	String attribute obtained must match the expected.
-//!SYMTestType			CIT
-RUN_TEST_STEP 100 tcaf CAFContentStringAttributeStep c:\tcaf\tcafwmdrmsupport.ini WMDRMRTAContentStringAttribute
-END_TESTCASE			SEC-CAF-WMDRM-0025
-
-START_TESTCASE 			SEC-CAF-WMDRM-0026
-//!@file
-//!SYMTestCaseID 		SEC-CAF-WMDRM-0026
-//!SYMTestCaseDesc 		Get string attribute set from WMDRM content using CContent.The header data provided must match the one supported by RTA.
-//!SYMPREQ			REQ12826
-//!SYMTestStatus		Implemented
-//!SYMTestPriority		Medium
-//!SYMTestActions		Verify RTA agent's GetStringAttributeSet API.
-//!SYMTestExpectedResults	String attributes obtained must match the expected.
-//!SYMTestType			CIT
-RUN_TEST_STEP 100 tcaf CAFContentStringAttributeSetStep c:\tcaf\tcafwmdrmsupport.ini WMDRMRTAContentStringAttributeSet
-END_TESTCASE			SEC-CAF-WMDRM-0026
-
-START_TESTCASE 			SEC-CAF-WMDRM-0027
-//!@file
-//!SYMTestCaseID 		SEC-CAF-WMDRM-0027
-//!SYMTestCaseDesc 		Get an attribute from WMDRM content using CManager.The header data provided must match the one supported by RTA.
-//!SYMPREQ			REQ12826
-//!SYMTestStatus		Implemented
-//!SYMTestPriority		Medium
-//!SYMTestActions		Verify RTA agent's GetAttribute API.
-//!SYMTestExpectedResults	Attribute obtained must match the expected.
-//!SYMTestType			CIT
-RUN_TEST_STEP 100 tcaf CAFManagerAttributeStep c:\tcaf\tcafwmdrmsupport.ini WMDRMRTAManagerAttribute
-END_TESTCASE			SEC-CAF-WMDRM-0027
-
-START_TESTCASE 			SEC-CAF-WMDRM-0028
-//!@file
-//!SYMTestCaseID 		SEC-CAF-WMDRM-0028
-//!SYMTestCaseDesc 		Get an attribute set from WMDRM content using CManager.The header data provided must match the one supported by RTA.
-//!SYMPREQ			REQ12826
-//!SYMTestStatus		Implemented
-//!SYMTestPriority		Medium
-//!SYMTestActions		Verify RTA agent's GetAttributeSet API.
-//!SYMTestExpectedResults	Attributes obtained must match the expected.
-//!SYMTestType			CIT
-RUN_TEST_STEP 100 tcaf CAFManagerAttributeSetStep c:\tcaf\tcafwmdrmsupport.ini WMDRMRTAManagerAttributeSet
-END_TESTCASE			SEC-CAF-WMDRM-0028
-
-START_TESTCASE 			SEC-CAF-WMDRM-0029
-//!@file
-//!SYMTestCaseID 		SEC-CAF-WMDRM-0029
-//!SYMTestCaseDesc 		Get a string attribute from WMDRM content using CManager.The header data provided must match the one supported by RTA.
-//!SYMPREQ			REQ12826
-//!SYMTestStatus		Implemented
-//!SYMTestPriority		Medium
-//!SYMTestActions		Verify RTA agent's GetStringAttribute API.
-//!SYMTestExpectedResults	String attribute obtained must match the expected.
-//!SYMTestType			CIT
-RUN_TEST_STEP 100 tcaf CAFManagerStringAttributeStep c:\tcaf\tcafwmdrmsupport.ini WMDRMRTAManagerStringAttribute
-END_TESTCASE			SEC-CAF-WMDRM-0029
-
-START_TESTCASE 			SEC-CAF-WMDRM-0030
-//!@file
-//!SYMTestCaseID 		SEC-CAF-WMDRM-0030
-//!SYMTestCaseDesc 		Get string attribute set from WMDRM content using CManager.The header data provided must match the one supported by RTA.
-//!SYMPREQ			REQ12826
-//!SYMTestStatus		Implemented
-//!SYMTestPriority		Medium
-//!SYMTestActions		Verify RTA agent's GetStringAttributeSet API.
-//!SYMTestExpectedResults	String attributes obtained must match the expected.
-//!SYMTestType			CIT
-RUN_TEST_STEP 100 tcaf CAFManagerStringAttributeSetStep c:\tcaf\tcafwmdrmsupport.ini WMDRMRTAManagerStringAttributeSet
-END_TESTCASE			SEC-CAF-WMDRM-0030
--- a/contentmgmt/referencedrmagent/tcaf/source/CafUtilsStep.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/tcaf/source/CafUtilsStep.h	Wed Apr 14 17:48:59 2010 +0300
@@ -34,10 +34,6 @@
 _LIT(KCAFRightsInfoStep,"CAFRightsInfoStep");
 _LIT(KCAFStreamablePtrArrayStep,"CAFStreamablePtrArrayStep");
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-_LIT(KCAFHelperStep,"CAFHelperStep");     
-#endif //#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
-
 class CCAFServer;
 
 /* 
@@ -140,20 +136,5 @@
 	CCAFServer& iParent;
 	};	
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-class CCafHelperStep : public CCAFStep     
-    {     
-public:     
-    CCafHelperStep();     
-    ~CCafHelperStep();     
-    virtual TVerdict doTestStepL();     
-      
-private:     
-    TInt TestFileHandleCaseL(TInt aError, const TDesC& aFileName);     
-    TInt TestHeaderDataCaseL(TInt aError);     
-    };     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT        
-     
-	
 #endif
 
--- a/contentmgmt/referencedrmagent/tcaf/source/CafutilsStep.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/tcaf/source/CafutilsStep.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -25,11 +25,6 @@
 #include "cafserver.h"
 #include "CafUtilsStep.h"
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-#include <test/refcafhelper.h>     
-#include <caf/cafhelper.h>     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
-
 using namespace ContentAccess;
 
 
@@ -843,108 +838,3 @@
 	return TestStepResult();
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
-CCafHelperStep::~CCafHelperStep()
-    {     
-    }     
-  
-CCafHelperStep::CCafHelperStep()
-    {     
-    SetTestStepName(KCAFHelperStep);     
-    }     
-      
-      
-TVerdict CCafHelperStep::doTestStepL()     
-    {     
-    SetTestStepResult(EFail);     
-__UHEAP_MARK;     
-         
-    TInt result;     
-         
-    TInt error;     
-    GetIntFromConfig(ConfigSection(),_L("error"),error);     
-         
-    TInt expectedValue;     
-    GetIntFromConfig(ConfigSection(),_L("expected"),expectedValue);     
-         
-    // fileheader case.     
-    TPtrC uri;     
-    if (!GetStringFromConfig(ConfigSection(), _L("uri"), uri))     
-        {     
-        INFO_PRINTF1(_L("CCafHelper test : HeaderData case."));     
-        result = TestHeaderDataCaseL(error);     
-        }     
-             
-    else     
-        {     
-        TBool isFileName = EFalse;     
-        GetBoolFromConfig(ConfigSection(),_L("flag"),isFileName);     
-             
-        // filehandle case     
-        if(isFileName == EFalse)     
-            {     
-            INFO_PRINTF1(_L("CCafHelper test : FileHandle case."));     
-            result = TestFileHandleCaseL(error, uri);     
-            }     
-             
-        // filename case.     
-        else     
-            {     
-            INFO_PRINTF1(_L("CCafHelper test : FileName case."));     
-         
-            CCAFHelper* helperObj = CCAFHelper::NewL();     
-            CleanupStack::PushL(helperObj);     
-             
-            result = (*helperObj)().HandleCAFErrorL(error, uri);     
-            CleanupStack::PopAndDestroy(helperObj);     
-            }        
-        }     
-         
-    if(result == expectedValue)     
-        {     
-        SetTestStepResult(EPass);     
-        }     
-             
-__UHEAP_MARKEND;     
-             
-    return TestStepResult();     
-    }     
-         
-TInt CCafHelperStep::TestFileHandleCaseL(TInt aError, const TDesC& aFileName)     
-    {     
-__UHEAP_MARK;     
-    RFs fs;     
-    RFile fileHandle;     
-    User::LeaveIfError(fs.Connect());     
-    CleanupClosePushL(fs);     
-    User::LeaveIfError(fileHandle.Open(fs, aFileName, EFileRead));     
-    CleanupClosePushL(fileHandle);     
-         
-    CCAFHelper* helperObj = CCAFHelper::NewL();     
-    CleanupStack::PushL(helperObj);     
-    TInt result = (*helperObj)().HandleCAFErrorL(aError, fileHandle);     
-    CleanupStack::PopAndDestroy(3, &fs);     
-__UHEAP_MARKEND;     
-      
-    return result;     
-    }     
-         
-TInt CCafHelperStep::TestHeaderDataCaseL(TInt aError)     
-    {     
-    _LIT8(KFileHeaderData,"W\0R\0M\0H\0E\0A\0D\0E\0R\0");     
-      
-__UHEAP_MARK;        
-    CCAFHelper* helperObj = CCAFHelper::NewL();     
-    CleanupStack::PushL(helperObj);     
-         
-    TInt result = (*helperObj)().HandleCAFErrorL(aError, KFileHeaderData);     
-    CleanupStack::PopAndDestroy(helperObj);     
-__UHEAP_MARKEND;     
-      
-    return result;     
-    }     
-         
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
-
-
--- a/contentmgmt/referencedrmagent/tcaf/source/Consumerstep.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/tcaf/source/Consumerstep.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -1818,18 +1818,7 @@
 	}
 
 TVerdict CCAFDataAttributeStep::doTestStepL()
-	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-    TBool wmdrmFlag = EFalse;     
-    GetBoolFromConfig(ConfigSection(),_L("wmdrmEnabled"), wmdrmFlag);     
-         
-    if(wmdrmFlag)     
-        {     
-        TVerdict verdict = doWmdrmTestStepL();     
-        return verdict;     
-        }     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-  
+	{  
 	TInt attribute;
 	TInt value = KErrNone;
 	TInt expectedValue = KErrNone;
@@ -1875,17 +1864,6 @@
 
 TVerdict CCAFDataAttributeSetStep::doTestStepL()
 	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-    TBool wmdrmFlag = EFalse;     
-    GetBoolFromConfig(ConfigSection(),_L("wmdrmEnabled"), wmdrmFlag);     
-         
-    if(wmdrmFlag)     
-        {     
-        TVerdict verdict = doWmdrmTestStepL();     
-        return verdict;     
-        }     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
-
 	TInt expectedValue1;
 	TInt expectedValue2;
 	TInt value1;
@@ -1951,17 +1929,6 @@
 
 TVerdict CCAFDataStringAttributeStep::doTestStepL()
 	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-    TBool wmdrmFlag = EFalse;     
-    GetBoolFromConfig(ConfigSection(),_L("wmdrmEnabled"), wmdrmFlag);     
-         
-    if(wmdrmFlag)     
-        {     
-        TVerdict verdict = doWmdrmTestStepL();     
-        return verdict;     
-        }     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
-
 	TInt expectedResult;
 	TInt attribute;
 	TPtrC expectedValue;
@@ -2016,17 +1983,6 @@
 
 TVerdict CCAFDataStringAttributeSetStep::doTestStepL()
 	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-    TBool wmdrmFlag = EFalse;     
-    GetBoolFromConfig(ConfigSection(),_L("wmdrmEnabled"), wmdrmFlag);     
-         
-    if(wmdrmFlag)     
-        {     
-        TVerdict verdict = doWmdrmTestStepL();     
-        return verdict;     
-        }     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-  
 	TPtrC expectedValue1;
 	TPtrC expectedValue2;
 	TBuf <200> value1;
@@ -2242,508 +2198,4 @@
 	iIterationSum += tickCounterValAfterFileOpen - tickCounterValBeforeFileOpen;
 	}
 	
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-      
-CWmdrmCAFContentStep::~CWmdrmCAFContentStep()     
-    {     
-    }     
-      
-CWmdrmCAFContentStep::CWmdrmCAFContentStep()     
-    {     
-    SetTestStepName(KWmdrmCAFContentStep);     
-    }     
-      
-      
-TVerdict CWmdrmCAFContentStep::doTestStepL()     
-    {     
-    SetTestStepResult(EFail);     
-    
-    TBool protectedVal;
-    GetBoolFromConfig(ConfigSection(),_L("attribValue1"), protectedVal);     
-    TBool forwardable;     
-    GetBoolFromConfig(ConfigSection(),_L("attribValue2"), forwardable);     
-         
-    TBool headerDataPresent = ETrue;     
-    GetBoolFromConfig(ConfigSection(),_L("headerDataFlag"), headerDataPresent);     
-         
-    INFO_PRINTF1(_L("Verify CContent APIs for WMDRM content"));      
-         
-    __UHEAP_MARK;     
-         
-    CContent* content = NULL;     
-         
-    // this condition verifies that CContent construction leaves with KErrMissingWmdrmHeaderData,     
-    // when no header data is provided.     
-    if(!headerDataPresent)     
-        {     
-        content = CContent::NewL(KNullDesC8());     
-        return EPass;     
-        }     
-         
-    // create a dummy header data.     
-    HBufC8* headerData = CreateWmdrmHeaderLC();     
-         
-    // Open a file and retrieve the attributes.     
-    // If headerDataPresent is false, the code will never reach here.s     
-    content = CContent::NewL(*headerData);     
-    CleanupStack::PushL(content);     
-    CAttribute* attrs = content->NewAttributeL(ETrue);     
-    CleanupStack::PushL(attrs);     
-      
-    TBool value1 = attrs->ResponseSet().IsSet(EIsProtected);     
-    TBool value2 = attrs->ResponseSet().IsSet(EIsForwardable);     
-    if(value1 == protectedVal && value2 == forwardable)     
-        {     
-        SetTestStepResult(EPass);     
-        }     
-      
-    CleanupStack::PopAndDestroy(3, headerData);      
-      
-    __UHEAP_MARKEND;     
-    return TestStepResult();     
-    }     
-      
-      
-CWmdrmCAFDataStep::~CWmdrmCAFDataStep()     
-    {     
-    }     
-      
-CWmdrmCAFDataStep::CWmdrmCAFDataStep()     
-    {     
-    SetTestStepName(KWmdrmCAFDataStep);     
-    }     
-      
-TVerdict CWmdrmCAFDataStep::doTestStepL()     
-    {     
-    SetTestStepResult(EFail);     
-         
-    TInt attribute;     
-    TInt expectedValue = KErrNone;     
-      
-    GetIntFromConfig(ConfigSection(),_L("attribute"), attribute);     
-    GetIntFromConfig(ConfigSection(),_L("value"), expectedValue);     
-         
-__UHEAP_MARK;     
-      
-    HBufC8* headerData = CreateWmdrmHeaderLC();     
-         
-    CContent *content = CContent::NewLC(*headerData);     
-    CData *data = content->OpenContentL(EPeek);     
-    TInt value = KErrNone;     
-    User::LeaveIfError(data->GetAttribute(attribute, value));     
-    delete data;     
-         
-    if(expectedValue == value)     
-        {     
-        SetTestStepResult(EPass);     
-        }     
-    else     
-        {     
-        INFO_PRINTF3(_L("CData::GetAttribute() Expected value: %d, actual value: %d"), expectedValue, value);        
-        }     
-         
-    CleanupStack::PopAndDestroy(2, headerData);                      
-__UHEAP_MARKEND;     
-         
-    return TestStepResult();     
-    }     
-      
-      
-CWmdrmCAFReadStep::~CWmdrmCAFReadStep()     
-    {     
-    }     
-      
-CWmdrmCAFReadStep::CWmdrmCAFReadStep()     
-    {     
-    SetTestStepName(KWmdrmCAFReadStep);     
-    }     
-      
-      
-TVerdict CWmdrmCAFReadStep::doTestStepL()     
-    {     
-    SetTestStepResult(EFail);     
-         
-    TBool synchronous = EFalse;     
-    GetBoolFromConfig(ConfigSection(),_L("synchronous"), synchronous);     
-    TBool intent = EFalse;     
-    GetBoolFromConfig(ConfigSection(),_L("intent"), intent);     
-    TPtrC inputPacket;     
-    GetStringFromConfig(ConfigSection(),_L("inputPacket"), inputPacket);     
-    TPtrC expectedOutput;     
-    GetStringFromConfig(ConfigSection(),_L("outputPacket"), expectedOutput);     
-         
-__UHEAP_MARK;     
-    TPtrC header;     
-    HBufC8* headerData = NULL;     
-         
-    if(GetStringFromConfig(ConfigSection(),_L("header"), header))     
-        {     
-        headerData = ConvertDes16toHBufC8LC(header);     
-        }     
-    else     
-        {     
-        headerData = CreateWmdrmHeaderLC();      
-        }     
-         
-    TInt result = 0;     
-    if(!synchronous)     
-        {     
-        result = TestAsynchronousReadL(*headerData, intent, inputPacket, expectedOutput);     
-        }     
-    else     
-        {     
-        result = TestSynchronousReadL(*headerData, intent, inputPacket, expectedOutput);     
-        }     
-      
-    if(result == KErrNone)     
-        {     
-        SetTestStepResult(EPass);     
-        }     
-             
-    CleanupStack::PopAndDestroy(headerData);     
-__UHEAP_MARKEND;     
-      
-    return TestStepResult();     
-    }     
-         
-TInt CWmdrmCAFReadStep::TestSynchronousReadL(const TDesC8& aHeaderData, TBool aIntent, TDesC& aInputPacket, TDesC& aExpectedOutput)     
-    {     
-__UHEAP_MARK;     
-    CData* data = NULL;     
-    TInt returnVal = KErrGeneral;     
-         
-    if(aIntent)     
-        {     
-        data = CData::NewL(aHeaderData, EPeek);     
-        }     
-    else     
-        {     
-        data = CData::NewL(aHeaderData);     
-        }     
-         
-    CleanupStack::PushL(data);     
-         
-    if(aInputPacket.Length() <= 0)     
-        {     
-        // dummy output buffer.This loop essentially tests the error condition KErrInsufficientDataPacketLength.     
-        TBuf8<2> outputBuffer;     
-        User::LeaveIfError(data->Read(KNullDesC8(), outputBuffer));     
-        }     
-             
-    else     
-        {     
-        HBufC8* inputPacket = ConvertDes16toHBufC8LC(aInputPacket);     
-        HBufC8* outputPacket = HBufC8::NewLC(aInputPacket.Length());     
-        TPtr8 outputPacketPtr = outputPacket->Des();     
-         
-        User::LeaveIfError(data->Read(*inputPacket, outputPacketPtr));     
-        HBufC8* expectedOutput = ConvertDes16toHBufC8LC(aExpectedOutput);     
-        if(expectedOutput->Compare(*outputPacket) == KErrNone)     
-            {     
-            returnVal = KErrNone;        
-            }     
-         
-        CleanupStack::PopAndDestroy(3, inputPacket);         
-        }     
-         
-    CleanupStack::PopAndDestroy(data);     
-__UHEAP_MARKEND;     
-         
-    return returnVal;     
-    }     
-         
-TInt CWmdrmCAFReadStep::TestAsynchronousReadL(const TDesC8& aHeaderData, TBool aIntent, TDesC& aInputPacket, TDesC& aExpectedOutput)     
-    {     
-__UHEAP_MARK;     
-    CData* data = NULL;     
-    TInt returnVal = KErrGeneral;     
-         
-    if(aIntent)     
-        {     
-        data = CData::NewL(aHeaderData, EPeek);     
-        }     
-    else     
-        {     
-        data = CData::NewL(aHeaderData);     
-        }     
-         
-    CleanupStack::PushL(data);     
-         
-    if(aInputPacket.Length() <= 0)     
-        {     
-        TBuf8<2> outputBuffer;     
-        User::LeaveIfError(data->Read(KNullDesC8(), outputBuffer));     
-        }     
-             
-    else     
-        {     
-        HBufC8* inputPacket = ConvertDes16toHBufC8LC(aInputPacket);     
-        HBufC8* outputPacket = HBufC8::NewLC(aInputPacket.Length());     
-        TPtr8 outputPacketPtr = outputPacket->Des();     
-         
-        TRequestStatus status;     
-        data->Read(*inputPacket, outputPacketPtr, status);     
-        User::WaitForRequest(status);     
-         
-        if(status.Int() != KErrNone)     
-            {     
-            CleanupStack::PopAndDestroy(3, data);     
-            return status.Int();     
-            }     
-             
-        HBufC8* expectedOutput = ConvertDes16toHBufC8LC(aExpectedOutput);     
-        if(expectedOutput->Compare(*outputPacket) == KErrNone)     
-            {     
-            returnVal = KErrNone;     
-            }     
-         
-        CleanupStack::PopAndDestroy(3, inputPacket);     
-        }     
-         
-    CleanupStack::PopAndDestroy(data);     
-__UHEAP_MARKEND;     
-         
-    return returnVal;     
-    }     
-         
-TVerdict CCAFDataAttributeStep::doWmdrmTestStepL()     
-    {     
-    SetTestStepResult(EFail);     
-         
-    TInt attribVal;     
-    GetIntFromConfig(ConfigSection(),_L("attribute"), attribVal);     
-         
-    TInt expectedValue;     
-    GetIntFromConfig(ConfigSection(),_L("value"), expectedValue);     
-      
-__UHEAP_MARK;     
-    TPtrC header;     
-    HBufC8* headerData = NULL;     
-         
-    if(GetStringFromConfig(ConfigSection(),_L("header"), header))     
-        {     
-        headerData = ConvertDes16toHBufC8LC(header);     
-        }     
-    else     
-        {     
-        headerData = CreateWmdrmHeaderLC();      
-        }     
-             
-    CContent *content = CContent::NewLC(*headerData);     
-    CData *data = content->OpenContentL(EPeek);     
-    TInt value;     
-    User::LeaveIfError(data->GetAttribute(attribVal, value));     
-    delete data;     
-         
-    if(expectedValue == value)     
-        {     
-        SetTestStepResult(EPass);     
-        }     
-    else     
-        {     
-        INFO_PRINTF3(_L("CData::GetAttribute() Expected value: %d, actual value: %d"), expectedValue, value);        
-        }     
-         
-    CleanupStack::PopAndDestroy(2, headerData);                      
-__UHEAP_MARKEND;     
-      
-    return TestStepResult();     
-    }     
-         
-      
-TVerdict CCAFDataAttributeSetStep::doWmdrmTestStepL()     
-    {     
-    SetTestStepResult(EFail);     
-         
-    TInt attribute1;     
-    GetIntFromConfig(ConfigSection(),_L("attribute1"),attribute1);     
-         
-    TInt attribute2;     
-    GetIntFromConfig(ConfigSection(),_L("attribute2"),attribute2);     
-         
-    TInt expectedValue1;     
-    GetIntFromConfig(ConfigSection(),_L("value1"),expectedValue1);     
-         
-    TInt expectedValue2;     
-    GetIntFromConfig(ConfigSection(),_L("value2"),expectedValue2);     
-      
-__UHEAP_MARK;     
-      
-    TPtrC header;     
-    HBufC8* headerData = NULL;     
-         
-    if(GetStringFromConfig(ConfigSection(),_L("header"), header))     
-        {     
-        headerData = ConvertDes16toHBufC8LC(header);     
-        }     
-    else     
-        {     
-        headerData = CreateWmdrmHeaderLC();      
-        }     
-         
-    CContent *content = CContent::NewLC(*headerData);     
-    CData *data = content->OpenContentL(EPeek);     
-                     
-    RAttributeSet attributeSet;     
-    CleanupClosePushL(attributeSet);     
-    attributeSet.AddL(attribute1);     
-    attributeSet.AddL(attribute2);     
-             
-    TInt result = data->GetAttributeSet(attributeSet);     
-    delete data;     
-         
-    if(result == KErrNone)     
-        {     
-        TInt value1;         
-        User::LeaveIfError(attributeSet.GetValue(attribute1, value1));     
-             
-        TInt value2;     
-        User::LeaveIfError(attributeSet.GetValue(attribute2, value2));     
-             
-        if(expectedValue1 == value1 && expectedValue2 == value2 && attributeSet.Count() == 2)     
-            {     
-            SetTestStepResult(EPass);     
-            }     
-        else     
-            {     
-            INFO_PRINTF1(_L("CData::GetAttributeSet() values don't match expected values"));     
-            }     
-        }     
-         
-    else     
-        {     
-        INFO_PRINTF1(_L("CData::GetAttributeSet() failed"));     
-        }     
-             
-    CleanupStack::PopAndDestroy(3, headerData);          
-         
-__UHEAP_MARKEND;     
-      
-    return TestStepResult();     
-    }     
-      
-      
-TVerdict CCAFDataStringAttributeStep::doWmdrmTestStepL()     
-    {     
-    SetTestStepResult(EFail);     
-         
-    TInt attribVal;     
-    GetIntFromConfig(ConfigSection(),_L("attribute"),attribVal);     
-         
-    TPtrC expectedValue;     
-    GetStringFromConfig(ConfigSection(),_L("value"),expectedValue);     
-         
-    TInt expectedResult;     
-    GetIntFromConfig(ConfigSection(),_L("result"),expectedResult);     
-         
-__UHEAP_MARK;     
-    TPtrC header;     
-    HBufC8* headerData = NULL;     
-         
-    if(GetStringFromConfig(ConfigSection(),_L("header"), header))     
-        {     
-        headerData = ConvertDes16toHBufC8LC(header);     
-        }     
-    else     
-        {     
-        headerData = CreateWmdrmHeaderLC();      
-        }     
-         
-    CContent *content = CContent::NewLC(*headerData);     
-    CData *data = content->OpenContentL(EPeek);     
-                 
-    TBuf <200> value;     
-    TInt result = data->GetStringAttribute(attribVal, value);     
-    delete data;     
-         
-    if(result == expectedResult && value == expectedValue)     
-        {     
-        SetTestStepResult(EPass);     
-        }     
-    else     
-        {     
-        INFO_PRINTF3(_L("CData::GetStringAttribute() Expected result: %d, actual result: %d"), expectedResult, result);     
-        INFO_PRINTF3(_L("CData::GetStringAttribute() Expected value: %S, actual value: %S"), &expectedValue, &value);     
-        }     
-             
-    CleanupStack::PopAndDestroy(2, headerData);          
-             
-__UHEAP_MARKEND;     
-      
-    return TestStepResult();     
-    }     
-      
-      
-TVerdict CCAFDataStringAttributeSetStep::doWmdrmTestStepL()     
-    {     
-    SetTestStepResult(EFail);     
-      
-    TInt attribute1;         
-    GetIntFromConfig(ConfigSection(),_L("attribute1"),attribute1);     
-         
-    TInt attribute2;     
-    GetIntFromConfig(ConfigSection(),_L("attribute2"),attribute2);     
-         
-    TPtrC expectedValue1;     
-    GetStringFromConfig(ConfigSection(),_L("value1"),expectedValue1);     
-         
-    TPtrC expectedValue2;     
-    GetStringFromConfig(ConfigSection(),_L("value2"),expectedValue2);     
-         
-__UHEAP_MARK;     
-    TPtrC header;     
-    HBufC8* headerData = NULL;     
-         
-    if(GetStringFromConfig(ConfigSection(),_L("header"), header))     
-        {     
-        headerData = ConvertDes16toHBufC8LC(header);     
-        }     
-    else     
-        {     
-        headerData = CreateWmdrmHeaderLC();      
-        }     
-         
-    CContent *content = CContent::NewLC(*headerData);     
-    CData *data = content->OpenContentL(EPeek);     
-         
-    RStringAttributeSet attributeSet;     
-    CleanupClosePushL(attributeSet);     
-    attributeSet.AddL(attribute1);     
-    attributeSet.AddL(attribute2);     
-             
-    TInt result = data->GetStringAttributeSet(attributeSet);     
-    delete data;     
-             
-    TBuf <200> value1;     
-    TBuf <200> value2;     
-    if(result == KErrNone)     
-        {     
-        TInt result3 = attributeSet.GetValue(attribute1, value1);     
-        TInt result4 = attributeSet.GetValue(attribute2, value2);     
-                 
-        if(value1 == expectedValue1 && value2 == expectedValue2 && attributeSet.Count() == 2     
-         && result3 == KErrNone && result4 == KErrNone)     
-            {     
-            SetTestStepResult(EPass);     
-            }     
-        else     
-            {     
-            INFO_PRINTF3(_L("RStringAttributeSet::GetValue() for attribute1.Expected value: %S, actual value: %S"), &expectedValue1, &value1);     
-            INFO_PRINTF3(_L("RStringAttributeSet::GetValue() for attribute2.Expected value: %S, actual value: %S"), &expectedValue2, &value2);     
-            INFO_PRINTF3(_L("RStringAttributeSet::GetValue() for attribute1. Expected result: %d, actual result: %d"), 0, result3);     
-            INFO_PRINTF3(_L("RStringAttributeSet::GetValue() for attribute2. Expected result: %d, actual result: %d"), 0, result4);      
-            }     
-        }     
-    else     
-        {     
-        INFO_PRINTF1(_L("CData::GetStringAttributeSet() failed"));     
-        }        
-         
-    CleanupStack::PopAndDestroy(3, headerData);          
-      
-__UHEAP_MARKEND;     
-      
-    return TestStepResult();     
-    }     
-      
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
+
--- a/contentmgmt/referencedrmagent/tcaf/source/Consumerstep.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/tcaf/source/Consumerstep.h	Wed Apr 14 17:48:59 2010 +0300
@@ -46,11 +46,6 @@
 _LIT(KCAFExecuteIntentStep,"CAFExecuteIntentStep");
 _LIT(KCAFDRMFileOpenPerformanceStep, "CAFDRMFileOpenPerformanceStep");
 
-//#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-_LIT(KWmdrmCAFContentStep,"WmdrmCAFContentStep");     
-_LIT(KWmdrmCAFDataStep,"WmdrmCAFDataStep");     
-_LIT(KWmdrmCAFReadStep, "WmdrmCAFReadStep");     
-//#endif //SYMBIAN_SDP-WMDRM 
 
 /* 
 * Used to open one file with RFile and the DRM packaged version of the same file with 
@@ -286,9 +281,6 @@
 	CCAFDataAttributeStep(CCAFServer& aParent);
 	~CCAFDataAttributeStep();
 	virtual TVerdict doTestStepL();
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-    TVerdict doWmdrmTestStepL();     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
 private:
 	CCAFServer& iParent;
 	};
@@ -309,9 +301,6 @@
 	CCAFDataAttributeSetStep(CCAFServer& aParent);
 	~CCAFDataAttributeSetStep();
 	virtual TVerdict doTestStepL();
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-    TVerdict doWmdrmTestStepL();     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
 private:
 	CCAFServer& iParent;
 	};
@@ -332,9 +321,6 @@
 	CCAFDataStringAttributeStep(CCAFServer& aParent);
 	~CCAFDataStringAttributeStep();
 	virtual TVerdict doTestStepL();
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-    TVerdict doWmdrmTestStepL();     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
 private:
 	CCAFServer& iParent;
 	};
@@ -355,9 +341,6 @@
 	CCAFDataStringAttributeSetStep(CCAFServer& aParent);
 	~CCAFDataStringAttributeSetStep();
 	virtual TVerdict doTestStepL();
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-    TVerdict doWmdrmTestStepL();     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
 private:
 	CCAFServer& iParent;
 	};
@@ -398,46 +381,5 @@
 	TUint32 iIterationSum;
 	};
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-/* Used to test behaviour of CContent object creation and attribute APIs for WMDRM content.  +-   
-* @internalComponent Exposure internally     
-*/     
-class CWmdrmCAFContentStep : public CCAFStep     
-    {     
-public:     
-    CWmdrmCAFContentStep();     
-    ~CWmdrmCAFContentStep();     
-    virtual TVerdict doTestStepL();     
-    };     
-      
-      
-/* Used to test the behaviour of CData object creation and attribute APIs for WMDRM content.     
-* @internalComponent Exposure internally     
-*/     
-class CWmdrmCAFDataStep : public CCAFStep     
-    {     
-public:     
-    CWmdrmCAFDataStep();     
-    ~CWmdrmCAFDataStep();     
-    virtual TVerdict doTestStepL();     
-    };     
-      
-         
-/* Used to test synchronous and asynchronous behaviour of ReadL() APIs of CData class for WMDRM content.     
-* @internalComponent Exposure internally     
-*/     
-class CWmdrmCAFReadStep : public CCAFStep     
-    {     
-public:     
-    CWmdrmCAFReadStep();     
-    ~CWmdrmCAFReadStep();     
-    virtual TVerdict doTestStepL();     
-      
-private:     
-    TInt TestSynchronousReadL(const TDesC8& aHeaderData, TBool aIntent, TDesC& aInputPacket, TDesC& aExpectedOuput);     
-    TInt TestAsynchronousReadL(const TDesC8& aHeaderData, TBool aIntent, TDesC& aInputPacket, TDesC& aExpectedOuput);     
-    };       
-      
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
 
 #endif
--- a/contentmgmt/referencedrmagent/tcaf/source/Contentstep.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/tcaf/source/Contentstep.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -47,17 +47,6 @@
 
 TVerdict CCAFContentAttributeStep::doTestStepL()
 	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-    TBool wmdrmFlag = EFalse;     
-    GetBoolFromConfig(ConfigSection(),_L("wmdrmEnabled"), wmdrmFlag);     
-         
-    if(wmdrmFlag)     
-        {     
-        TVerdict verdict = doWmdrmTestStepL();     
-        return verdict;     
-        }     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
-
 	TInt attribute;
 	TInt value = KErrNone;
 	TInt expectedValue;
@@ -125,17 +114,6 @@
 
 TVerdict CCAFContentAttributeSetStep::doTestStepL()
 	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-    TBool wmdrmFlag = EFalse;     
-    GetBoolFromConfig(ConfigSection(),_L("wmdrmEnabled"), wmdrmFlag);     
-         
-    if(wmdrmFlag)     
-        {     
-        TVerdict verdict = doWmdrmTestStepL();     
-        return verdict;     
-        }     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-  
 	TInt value1;
 	TInt value2;
 	TInt expectedValue1;
@@ -240,17 +218,6 @@
 
 TVerdict CCAFContentStringAttributeStep::doTestStepL()
 	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-    TBool wmdrmFlag = EFalse;     
-    GetBoolFromConfig(ConfigSection(),_L("wmdrmEnabled"), wmdrmFlag);     
-         
-    if(wmdrmFlag)     
-        {     
-        TVerdict verdict = doWmdrmTestStepL();     
-        return verdict;     
-        }     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
-
 	TInt expectedResult;
 	TInt attribute;
 	TInt unresolvedUri = EFalse;
@@ -339,17 +306,6 @@
 
 TVerdict CCAFContentStringAttributeSetStep::doTestStepL()
 	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-    TBool wmdrmFlag = EFalse;     
-    GetBoolFromConfig(ConfigSection(),_L("wmdrmEnabled"), wmdrmFlag);     
-         
-    if(wmdrmFlag)     
-        {     
-        TVerdict verdict = doWmdrmTestStepL();     
-        return verdict;     
-        }     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
-
 	TPtrC expectedValue1;
 	TPtrC expectedValue2;
 	TBuf <200> value1;
@@ -1034,238 +990,4 @@
 	return TestStepResult();
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-      
-// The following methods test the various content attribute APIs for WMDRM content.     
-      
-TVerdict CCAFContentAttributeStep::doWmdrmTestStepL()     
-    {     
-    SetTestStepResult(EFail);     
-         
-    TInt attribVal;     
-    GetIntFromConfig(ConfigSection(),_L("attribute"), attribVal);     
-         
-    TInt expectedValue;     
-    GetIntFromConfig(ConfigSection(),_L("value"), expectedValue);     
-      
-__UHEAP_MARK;     
-    TPtrC header;     
-    HBufC8* headerData = NULL;     
-         
-    if(GetStringFromConfig(ConfigSection(),_L("header"), header))     
-        {     
-        headerData = ConvertDes16toHBufC8LC(header);     
-        }     
-    else     
-        {     
-        headerData = CreateWmdrmHeaderLC();      
-        }     
-             
-    CContent *content = CContent::NewLC(*headerData);     
-    TInt value;     
-    User::LeaveIfError(content->GetAttribute(attribVal, value));     
-         
-    if(expectedValue == value)     
-        {     
-        SetTestStepResult(EPass);     
-        }     
-    else     
-        {     
-        INFO_PRINTF3(_L("CContent::GetAttribute() Expected value: %d, actual value: %d"), expectedValue, value);     
-        }     
-         
-    CleanupStack::PopAndDestroy(2, headerData);                      
-__UHEAP_MARKEND;     
-      
-    return TestStepResult();     
-    }     
-         
-      
-TVerdict CCAFContentAttributeSetStep::doWmdrmTestStepL()     
-    {     
-    SetTestStepResult(EFail);     
-         
-    TInt attribute1;     
-    GetIntFromConfig(ConfigSection(),_L("attribute1"),attribute1);     
-         
-    TInt attribute2;     
-    GetIntFromConfig(ConfigSection(),_L("attribute2"),attribute2);     
-         
-    TInt expectedValue1;     
-    GetIntFromConfig(ConfigSection(),_L("value1"),expectedValue1);     
-         
-    TInt expectedValue2;     
-    GetIntFromConfig(ConfigSection(),_L("value2"),expectedValue2);     
-      
-__UHEAP_MARK;     
-      
-    TPtrC header;     
-    HBufC8* headerData = NULL;     
-         
-    if(GetStringFromConfig(ConfigSection(),_L("header"), header))     
-        {     
-        headerData = ConvertDes16toHBufC8LC(header);     
-        }     
-    else     
-        {     
-        headerData = CreateWmdrmHeaderLC();      
-        }     
-         
-    CContent *content = CContent::NewLC(*headerData);     
-                     
-    RAttributeSet attributeSet;     
-    CleanupClosePushL(attributeSet);     
-    attributeSet.AddL(attribute1);     
-    attributeSet.AddL(attribute2);     
-             
-    TInt result = content->GetAttributeSet(attributeSet);     
-    if(result == KErrNone)     
-        {     
-        TInt value1;         
-        User::LeaveIfError(attributeSet.GetValue(attribute1, value1));     
-             
-        TInt value2;     
-        User::LeaveIfError(attributeSet.GetValue(attribute2, value2));     
-             
-        if(expectedValue1 == value1 && expectedValue2 == value2 && attributeSet.Count() == 2)     
-            {     
-            SetTestStepResult(EPass);     
-            }     
-        else     
-            {     
-            INFO_PRINTF1(_L("CContent::GetAttributeSet() values don't match expected values"));     
-            }     
-        }     
-         
-    else     
-        {     
-        INFO_PRINTF1(_L("CContent::GetAttributeSet() failed"));     
-        }     
-             
-    CleanupStack::PopAndDestroy(3, headerData);          
-         
-__UHEAP_MARKEND;     
-      
-    return TestStepResult();     
-    }     
-      
-      
-TVerdict CCAFContentStringAttributeStep::doWmdrmTestStepL()     
-    {     
-    SetTestStepResult(EFail);     
-         
-    TInt attribVal;     
-    GetIntFromConfig(ConfigSection(),_L("attribute"),attribVal);     
-         
-    TPtrC expectedValue;     
-    GetStringFromConfig(ConfigSection(),_L("value"),expectedValue);     
-         
-    TInt expectedResult;     
-    GetIntFromConfig(ConfigSection(),_L("result"),expectedResult);     
-         
-__UHEAP_MARK;     
-    TPtrC header;     
-    HBufC8* headerData = NULL;     
-         
-    if(GetStringFromConfig(ConfigSection(),_L("header"), header))     
-        {     
-        headerData = ConvertDes16toHBufC8LC(header);     
-        }     
-    else     
-        {     
-        headerData = CreateWmdrmHeaderLC();      
-        }     
-         
-    CContent *content = CContent::NewLC(*headerData);     
-                 
-    TBuf <200> value;     
-    TInt result = content->GetStringAttribute(attribVal, value);     
-    if(result == expectedResult && value == expectedValue)     
-        {     
-        SetTestStepResult(EPass);     
-        }     
-    else     
-        {     
-        INFO_PRINTF3(_L("CContent::GetStringAttribute() Expected result: %d, actual result: %d"), expectedResult, result);     
-        INFO_PRINTF3(_L("CContent::GetStringAttribute() Expected value: %S, actual value: %S"), &expectedValue, &value);     
-        }     
-             
-    CleanupStack::PopAndDestroy(2, headerData);          
-             
-__UHEAP_MARKEND;     
-      
-    return TestStepResult();     
-    }     
-      
-      
-TVerdict CCAFContentStringAttributeSetStep::doWmdrmTestStepL()     
-    {     
-    SetTestStepResult(EFail);     
-      
-    TInt attribute1;         
-    GetIntFromConfig(ConfigSection(),_L("attribute1"),attribute1);     
-         
-    TInt attribute2;     
-    GetIntFromConfig(ConfigSection(),_L("attribute2"),attribute2);     
-         
-    TPtrC expectedValue1;     
-    GetStringFromConfig(ConfigSection(),_L("value1"),expectedValue1);     
-         
-    TPtrC expectedValue2;     
-    GetStringFromConfig(ConfigSection(),_L("value2"),expectedValue2);     
-         
-__UHEAP_MARK;     
-    TPtrC header;     
-    HBufC8* headerData = NULL;     
-         
-    if(GetStringFromConfig(ConfigSection(),_L("header"), header))     
-        {     
-        headerData = ConvertDes16toHBufC8LC(header);     
-        }     
-    else     
-        {     
-        headerData = CreateWmdrmHeaderLC();      
-        }     
-         
-    CContent *content = CContent::NewLC(*headerData);     
-         
-    RStringAttributeSet attributeSet;     
-    CleanupClosePushL(attributeSet);     
-    attributeSet.AddL(attribute1);     
-    attributeSet.AddL(attribute2);     
-             
-    TInt result = content->GetStringAttributeSet(attributeSet);     
-    TBuf <200> value1;     
-    TBuf <200> value2;     
-    if(result == KErrNone)     
-        {     
-        TInt result3 = attributeSet.GetValue(attribute1, value1);     
-        TInt result4 = attributeSet.GetValue(attribute2, value2);     
-                 
-        if(value1 == expectedValue1 && value2 == expectedValue2 && attributeSet.Count() == 2     
-         && result3 == KErrNone && result4 == KErrNone)     
-            {     
-            SetTestStepResult(EPass);     
-            }     
-        else     
-            {     
-            INFO_PRINTF3(_L("RStringAttributeSet::GetValue() for attribute1.Expected value: %S, actual value: %S"), &expectedValue1, &value1);     
-            INFO_PRINTF3(_L("RStringAttributeSet::GetValue() for attribute2.Expected value: %S, actual value: %S"), &expectedValue2, &value2);     
-            INFO_PRINTF3(_L("RStringAttributeSet::GetValue() for attribute1. Expected result: %d, actual result: %d"), 0, result3);     
-            INFO_PRINTF3(_L("RStringAttributeSet::GetValue() for attribute2. Expected result: %d, actual result: %d"), 0, result4);      
-            }     
-        }     
-    else     
-        {     
-        INFO_PRINTF1(_L("CContent::GetStringAttributeSet() failed"));     
-        }        
-         
-    CleanupStack::PopAndDestroy(3, headerData);          
-      
-__UHEAP_MARKEND;     
-      
-    return TestStepResult();     
-    }     
-      
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
 
--- a/contentmgmt/referencedrmagent/tcaf/source/ManagerStep.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/tcaf/source/ManagerStep.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -880,17 +880,6 @@
 
 TVerdict CCAFManagerAttributeStep::doTestStepL()
 	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-    TBool wmdrmFlag = EFalse;     
-    GetBoolFromConfig(ConfigSection(),_L("wmdrmEnabled"), wmdrmFlag);     
-         
-    if(wmdrmFlag)     
-        {     
-        TVerdict verdict = doWmdrmTestStepL();     
-        return verdict;     
-        }     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT    
-
 	TInt attribute;
 	TInt value = KErrNone;
 	TInt expectedValue;
@@ -946,17 +935,6 @@
 
 TVerdict CCAFManagerAttributeSetStep::doTestStepL()
 	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-    TBool wmdrmFlag = EFalse;     
-    GetBoolFromConfig(ConfigSection(),_L("wmdrmEnabled"), wmdrmFlag);     
-         
-    if(wmdrmFlag)     
-        {     
-        TVerdict verdict = doWmdrmTestStepL();     
-        return verdict;     
-        }     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT    
-
 	TInt value1;
 	TInt value2;
 	TInt expectedValue1;
@@ -1031,17 +1009,6 @@
 
 TVerdict CCAFManagerStringAttributeStep::doTestStepL()
 	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-    TBool wmdrmFlag = EFalse;     
-    GetBoolFromConfig(ConfigSection(),_L("wmdrmEnabled"), wmdrmFlag);     
-         
-    if(wmdrmFlag)     
-        {     
-        TVerdict verdict = doWmdrmTestStepL();     
-        return verdict;     
-        }     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT        
-     
 	TInt expectedResult;
 	TInt attribute;
 	TPtrC expectedValue;
@@ -1106,17 +1073,6 @@
 
 TVerdict CCAFManagerStringAttributeSetStep::doTestStepL()
 	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-    TBool wmdrmFlag = EFalse;     
-    GetBoolFromConfig(ConfigSection(),_L("wmdrmEnabled"), wmdrmFlag);     
-         
-    if(wmdrmFlag)     
-        {     
-        TVerdict verdict = doWmdrmTestStepL();     
-        return verdict;     
-        }     
-#endif  //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-     
 	TPtrC expectedValue1;
 	TPtrC expectedValue2;
 	TBuf <200> value1;
@@ -1623,238 +1579,3 @@
 	return TestStepResult();
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-      
-// The following methods test the various manager attribute APIs for WMDRM content.     
-      
-TVerdict CCAFManagerAttributeStep::doWmdrmTestStepL()     
-    {     
-    SetTestStepResult(EFail);     
-         
-    TInt attribVal;     
-    GetIntFromConfig(ConfigSection(),_L("attribute"), attribVal);     
-         
-    TInt expectedValue;     
-    GetIntFromConfig(ConfigSection(),_L("value"), expectedValue);     
-      
-    __UHEAP_MARK;     
-         
-    TPtrC header;     
-    HBufC8* headerData = NULL;     
-         
-    if(GetStringFromConfig(ConfigSection(),_L("header"), header))     
-        {     
-        headerData = ConvertDes16toHBufC8LC(header);     
-        }     
-    else     
-        {     
-        headerData = CreateWmdrmHeaderLC();      
-        }     
-         
-    TInt value;     
-    CManager *manager = CManager::NewLC();     
-         
-    User::LeaveIfError(manager->GetAttribute(*headerData, attribVal, value));     
-    if(expectedValue == value)     
-        {     
-        SetTestStepResult(EPass);     
-        }     
-    else     
-        {     
-        INFO_PRINTF3(_L("CManager::GetAttribute() Expected value: %d, actual value: %d"), expectedValue, value);     
-        }     
-             
-    CleanupStack::PopAndDestroy(2, headerData);          
-                 
-    __UHEAP_MARKEND;     
-    return TestStepResult();     
-    }     
-         
-      
-TVerdict CCAFManagerAttributeSetStep::doWmdrmTestStepL()     
-    {     
-    SetTestStepResult(EFail);     
-         
-    TInt attribute1;     
-    GetIntFromConfig(ConfigSection(),_L("attribute1"),attribute1);     
-         
-    TInt attribute2;     
-    GetIntFromConfig(ConfigSection(),_L("attribute2"),attribute2);     
-         
-    TInt expectedValue1;     
-    GetIntFromConfig(ConfigSection(),_L("value1"),expectedValue1);     
-         
-    TInt expectedValue2;     
-    GetIntFromConfig(ConfigSection(),_L("value2"),expectedValue2);     
-      
-__UHEAP_MARK;     
-         
-    TPtrC header;     
-    HBufC8* headerData = NULL;     
-         
-    if(GetStringFromConfig(ConfigSection(),_L("header"), header))     
-        {     
-        headerData = ConvertDes16toHBufC8LC(header);     
-        }     
-    else     
-        {     
-        headerData = CreateWmdrmHeaderLC();      
-        }     
-                 
-    RAttributeSet attributeSet;     
-    CleanupClosePushL(attributeSet);     
-    attributeSet.AddL(attribute1);     
-    attributeSet.AddL(attribute2);     
-             
-    CManager *manager = CManager::NewLC();       
-    TInt result = manager->GetAttributeSet(*headerData, attributeSet);     
-    if(result == KErrNone)     
-        {     
-        SetTestStepResult(EPass);     
-        }     
-    else     
-        {     
-        INFO_PRINTF1(_L("CManager::GetAttributeSet() failed"));     
-        }     
-             
-    TInt value1;         
-    User::LeaveIfError(attributeSet.GetValue(attribute1, value1));     
-             
-    TInt value2;     
-    User::LeaveIfError(attributeSet.GetValue(attribute2, value2));     
-             
-    if(expectedValue1 == value1 && expectedValue2 == value2 && attributeSet.Count() == 2)     
-        {     
-        SetTestStepResult(EPass);     
-        }     
-    else     
-        {     
-        INFO_PRINTF1(_L("CManager::GetAttributeSet() values don't match expected values"));     
-        }     
-             
-    CleanupStack::PopAndDestroy(3, headerData);          
-      
-__UHEAP_MARKEND;     
-      
-    return TestStepResult();     
-    }     
-      
-      
-TVerdict CCAFManagerStringAttributeStep::doWmdrmTestStepL()     
-    {     
-    SetTestStepResult(EFail);     
-         
-    TInt attribVal;     
-    GetIntFromConfig(ConfigSection(),_L("attribute"),attribVal);     
-         
-    TPtrC expectedValue;     
-    GetStringFromConfig(ConfigSection(),_L("value"),expectedValue);     
-         
-    TInt expectedResult;     
-    GetIntFromConfig(ConfigSection(),_L("result"),expectedResult);     
-      
-__UHEAP_MARK;     
-         
-    TPtrC header;     
-    HBufC8* headerData = NULL;     
-         
-    if(GetStringFromConfig(ConfigSection(),_L("header"), header))     
-        {     
-        headerData = ConvertDes16toHBufC8LC(header);     
-        }     
-    else     
-        {     
-        headerData = CreateWmdrmHeaderLC();      
-        }     
-         
-    CManager* manager = CManager::NewLC();           
-    TBuf <200> value;     
-    TInt result = manager->GetStringAttribute(*headerData, attribVal, value);     
-    if(result == expectedResult && value == expectedValue)     
-        {     
-        SetTestStepResult(EPass);     
-        }     
-    else     
-        {     
-        INFO_PRINTF3(_L("CManager::GetStringAttribute() Expected result: %d, actual result: %d"), expectedResult, result);     
-        INFO_PRINTF3(_L("CManager::GetStringAttribute() Expected value: %S, actual value: %S"), &expectedValue, &value);     
-        }     
-             
-    CleanupStack::PopAndDestroy(2, headerData);          
-         
-__UHEAP_MARKEND;     
-      
-    return TestStepResult();     
-    }     
-      
-      
-TVerdict CCAFManagerStringAttributeSetStep::doWmdrmTestStepL()     
-    {     
-    SetTestStepResult(EFail);     
-      
-    TInt attribute1;         
-    GetIntFromConfig(ConfigSection(),_L("attribute1"),attribute1);     
-         
-    TInt attribute2;     
-    GetIntFromConfig(ConfigSection(),_L("attribute2"),attribute2);     
-         
-    TPtrC expectedValue1;     
-    GetStringFromConfig(ConfigSection(),_L("value1"),expectedValue1);     
-         
-    TPtrC expectedValue2;     
-    GetStringFromConfig(ConfigSection(),_L("value2"),expectedValue2);     
-         
-__UHEAP_MARK;     
-         
-    TPtrC header;     
-    HBufC8* headerData = NULL;     
-         
-    if(GetStringFromConfig(ConfigSection(),_L("header"), header))     
-        {     
-        headerData = ConvertDes16toHBufC8LC(header);     
-        }     
-    else     
-        {     
-        headerData = CreateWmdrmHeaderLC();      
-        }     
-      
-    RStringAttributeSet attributeSet;     
-    CleanupClosePushL(attributeSet);     
-    attributeSet.AddL(attribute1);     
-    attributeSet.AddL(attribute2);     
-             
-    CManager* manager = CManager::NewLC();       
-    TInt result = manager->GetStringAttributeSet(*headerData, attributeSet);     
-    TBuf <200> value1;     
-    TBuf <200> value2;     
-    if(result == KErrNone)     
-        {     
-        TInt result3 = attributeSet.GetValue(attribute1, value1);     
-        TInt result4 = attributeSet.GetValue(attribute2, value2);     
-                 
-        if(value1 == expectedValue1 && value2 == expectedValue2 && attributeSet.Count() == 2     
-         && result3 == KErrNone && result4 == KErrNone)     
-            {     
-            SetTestStepResult(EPass);     
-            }     
-        else     
-            {     
-            INFO_PRINTF3(_L("RStringAttributeSet::GetValue() for attribute1.Expected value: %S, actual value: %S"), &expectedValue1, &value1);     
-            INFO_PRINTF3(_L("RStringAttributeSet::GetValue() for attribute2.Expected value: %S, actual value: %S"), &expectedValue2, &value2);     
-            INFO_PRINTF3(_L("RStringAttributeSet::GetValue() for attribute1. Expected result: %d, actual result: %d"), 0, result3);     
-            INFO_PRINTF3(_L("RStringAttributeSet::GetValue() for attribute2. Expected result: %d, actual result: %d"), 0, result4);      
-            }     
-            }     
-    else     
-        {     
-        INFO_PRINTF1(_L("CManager::GetStringAttributeSet() failed"));     
-        }        
-         
-    CleanupStack::PopAndDestroy(3, headerData);          
-      
-__UHEAP_MARKEND;     
-      
-    return TestStepResult();     
-    }     
-      
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
--- a/contentmgmt/referencedrmagent/tcaf/source/ManagerStep.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/tcaf/source/ManagerStep.h	Wed Apr 14 17:48:59 2010 +0300
@@ -368,9 +368,6 @@
 	CCAFManagerAttributeStep(CCAFServer& aParent);
 	~CCAFManagerAttributeStep();
 	virtual TVerdict doTestStepL();
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-    TVerdict doWmdrmTestStepL();     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
 private:
 	CCAFServer& iParent;
 	};
@@ -393,9 +390,6 @@
 	CCAFManagerAttributeSetStep(CCAFServer& aParent);
 	~CCAFManagerAttributeSetStep();
 	virtual TVerdict doTestStepL();
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-    TVerdict doWmdrmTestStepL();     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
   
 private:
 	CCAFServer& iParent;
@@ -419,9 +413,6 @@
 	CCAFManagerStringAttributeStep(CCAFServer& aParent);
 	~CCAFManagerStringAttributeStep();
 	virtual TVerdict doTestStepL();
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-    TVerdict doWmdrmTestStepL();     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
   
 private:
 	CCAFServer& iParent;
@@ -445,10 +436,6 @@
 	CCAFManagerStringAttributeSetStep(CCAFServer& aParent);
 	~CCAFManagerStringAttributeSetStep();
 	virtual TVerdict doTestStepL();
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-    TVerdict doWmdrmTestStepL();     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-  
 private:
 	CCAFServer& iParent;
 	};
--- a/contentmgmt/referencedrmagent/tcaf/source/RecognizerStep.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/tcaf/source/RecognizerStep.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -52,17 +52,6 @@
  */
 TVerdict CCAFRecognizeStep::doTestStepL()
 	{
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-    TBool wmdrmFlag = EFalse;     
-    GetBoolFromConfig(ConfigSection(),_L("wmdrmEnabled"), wmdrmFlag);     
-         
-    if(wmdrmFlag)
-        {     
-        TVerdict verdict = doWmdrmTestStepL();     
-        return verdict;     
-        }     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT    
-
 	TBuf8 <KCAFTestApparcBufferSize> buf;
 
 	CAgentResolver *resolver;
@@ -505,51 +494,5 @@
 	return TestStepResult();
 	}
 	
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-  
-// Tests DoRecognizeL API for WMDRM content .
-      
-TVerdict CCAFRecognizeStep::doWmdrmTestStepL()     
-    {     
-    SetTestStepResult(EFail);     
-         
-    TPtrC expectedFileMimeType;     
-    GetStringFromConfig(ConfigSection(),_L("filemime"), expectedFileMimeType);     
-         
-    TPtrC expectedContentMimeType;     
-    GetStringFromConfig(ConfigSection(),_L("contentmime"), expectedContentMimeType);     
-         
-    TBool expectedResult;     
-    GetBoolFromConfig(ConfigSection(),_L("recognized"), expectedResult);     
-         
-    __UHEAP_MARK;     
-    TPtrC header;     
-    HBufC8* headerData = NULL;     
-         
-    if(GetStringFromConfig(ConfigSection(),_L("header"), header))     
-        {     
-        headerData = ConvertDes16toHBufC8LC(header);     
-        }     
-    else     
-        {     
-        headerData = CreateWmdrmHeaderLC();      
-        }     
-      
-    // Pass the WMDRM header data to CAF DoRecognize function     
-    CAgentResolver* resolver = CAgentResolver::NewLC(ETrue);     
-             
-    TBuf8 <KCafTestMaxDataTypeLength> fileMimeType;     
-    TBuf8 <KCafTestMaxDataTypeLength> contentMimeType;     
-             
-    TBool result = resolver->DoRecognizeL(*headerData, fileMimeType, contentMimeType);     
-         
-    CheckResultL(result, fileMimeType, contentMimeType, expectedResult, expectedFileMimeType, expectedContentMimeType);     
-      
-    CleanupStack::PopAndDestroy(2, headerData);      
-      
-    __UHEAP_MARKEND;     
-    return TestStepResult();     
-    }     
-      
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
 
+
--- a/contentmgmt/referencedrmagent/tcaf/source/RecognizerStep.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/tcaf/source/RecognizerStep.h	Wed Apr 14 17:48:59 2010 +0300
@@ -60,9 +60,6 @@
 	CCAFRecognizeStep(CCAFServer& aParent);
 	~CCAFRecognizeStep();
 	virtual TVerdict doTestStepL();
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-    TVerdict doWmdrmTestStepL();     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
 
 private:
 	void CheckResultL(TBool aResult, TDes8& aContainerMimeType, TDes8& aContentMimeType, TBool aExpectedResult, TDesC16& aExpectedContainerMime, TDesC16& aExpectedContentMime);
--- a/contentmgmt/referencedrmagent/tcaf/source/cafserver.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/tcaf/source/cafserver.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -280,17 +280,7 @@
 		testStep = new CCAFManagerStringAttributeByFileHandleStep(*this);
 	else if(aStepName == KCAFManagerStringAttributeSetByFileHandleStep)
 		testStep = new CCAFManagerStringAttributeSetByFileHandleStep(*this);
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-    else if(aStepName == KCAFHelperStep)     
-        testStep = new CCafHelperStep();     
-    else if(aStepName == KWmdrmCAFContentStep)     
-        testStep = new CWmdrmCAFContentStep();     
-    else if(aStepName == KWmdrmCAFDataStep)     
-        testStep = new CWmdrmCAFDataStep();     
-    else if(aStepName == KWmdrmCAFReadStep)     
-        testStep = new CWmdrmCAFReadStep();     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
-	
+
 	return testStep;
 	}
 
--- a/contentmgmt/referencedrmagent/tcaf/source/cafstep.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/tcaf/source/cafstep.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -105,21 +105,6 @@
 	return buf;
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-         
-HBufC8* CCAFStep::CreateWmdrmHeaderLC()     
-    {     
-    // create dummy header data.     
-    const TInt KMaxBufferLen = 64;     
-    _LIT8(KHeaderData, "W\0R\0M\0H\0E\0A\0D\0E\0R\0");     
-         
-    HBufC8* headerData = HBufC8::NewMaxLC(KMaxBufferLen);     
-    TPtr8 headerPtr = headerData->Des();     
-    headerPtr.Repeat(KHeaderData);     
-    return headerData;     
-    }     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-  
 
 void CCAFStep::LoadCafRecognizerL()
 	{
--- a/contentmgmt/referencedrmagent/tcaf/source/cafstep.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/tcaf/source/cafstep.h	Wed Apr 14 17:48:59 2010 +0300
@@ -49,16 +49,6 @@
 	*/
 	HBufC16* ConvertDes8toHBufC16LC(TDesC8& source);
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-      
-    /*     
-    * Utility method which creates dummy header data for WMDRM operations.     
-    * @return   A new HBufC8 allocated which contains the header data.     
-    */     
-    HBufC8* CreateWmdrmHeaderLC();     
-      
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
-
 	/* 
 	* Load CAFRECOGNIZER.MDL and create an instance of CApaCafRecognizer that can be used
 	* by derived classes
--- a/contentmgmt/referencedrmagent/tcaf/source/contentstep.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/contentmgmt/referencedrmagent/tcaf/source/contentstep.h	Wed Apr 14 17:48:59 2010 +0300
@@ -55,9 +55,6 @@
 	CCAFContentAttributeStep(CCAFServer& aParent);
 	~CCAFContentAttributeStep();
 	virtual TVerdict doTestStepL();
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-    TVerdict doWmdrmTestStepL();     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
 private:
 	CCAFServer& iParent;
 	};
@@ -78,9 +75,6 @@
 	CCAFContentAttributeSetStep(CCAFServer& aParent);
 	~CCAFContentAttributeSetStep();
 	virtual TVerdict doTestStepL();
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-    TVerdict doWmdrmTestStepL();     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT 
 private:
 	CCAFServer& iParent;
 	};
@@ -101,9 +95,6 @@
 	CCAFContentStringAttributeStep(CCAFServer& aParent);
 	~CCAFContentStringAttributeStep();
 	virtual TVerdict doTestStepL();
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-    TVerdict doWmdrmTestStepL();     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
   
 private:
 	CCAFServer& iParent;
@@ -125,9 +116,6 @@
 	CCAFContentStringAttributeSetStep(CCAFServer& aParent);
 	~CCAFContentStringAttributeSetStep();
 	virtual TVerdict doTestStepL();
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
-    TVerdict doWmdrmTestStepL();     
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT     
   
 private:
 	CCAFServer& iParent;
--- a/contentmgmt/referencedrmagent/tcaf/testdata/dummywm.asf	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,1 +0,0 @@
-SAMPLE WMDRMFILE
\ No newline at end of file
--- a/crypto/weakcryptospi/group/tcryptospi.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ b/crypto/weakcryptospi/group/tcryptospi.mmp	Wed Apr 14 17:48:59 2010 +0300
@@ -105,10 +105,6 @@
 SOURCE			symmetric_mac_incremental_with_copy_step.cpp
 #endif
 
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-SOURCE			dummyecccipherloadstep.cpp
-SOURCE			dummyeccsignerloadstep.cpp
-#endif
 
 USERINCLUDE     ..
 USERINCLUDE     ../test/tcryptospi/src
--- a/crypto/weakcryptospi/inc/cryptotests.iby	Thu Apr 01 00:24:41 2010 +0300
+++ b/crypto/weakcryptospi/inc/cryptotests.iby	Wed Apr 14 17:48:59 2010 +0300
@@ -26,9 +26,6 @@
 #include "tcryptospi.iby"
 #include "cryptospi_testplugins.iby"
 
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-#include "cryptospi_testwmdrmplugins.iby"
-#endif
 
 file=ABI_DIR\BUILD_DIR\tsymmetric.exe	System\Programs\tsymmetric.exe
 file=ABI_DIR\BUILD_DIR\tasymmetric.exe	System\Programs\tasymmetric.exe
--- a/crypto/weakcryptospi/inc/spi/cryptospidef.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/crypto/weakcryptospi/inc/spi/cryptospidef.h	Wed Apr 14 17:48:59 2010 +0300
@@ -641,78 +641,6 @@
 	const TUid KExtractableKeyUid={KExtractableKey};
 	const TUid KNonExtractableKeyUid={KNonExtractableKey};
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-	/**
-	 * The UID below is not specific to ECC. This should be used 
-	 * as a CKey key param, whenever the user of CryptoSPI just has
-	 * the handle and not the actual key with him. The SPI plugin 
-	 * should search for this ID and invoke the right apis for 
-	 * getting access to keys.
-	 */
-    const TInt32 KPassedHandleToKey = 0x20025161;
-    const TUid KPassedHandleToKeyUid = {KPassedHandleToKey};
-
-#ifdef SYMBIAN_ENABLE_SDP_ECC
-    /**
-    UIDs related to Ecc (which is Asymmetric Cipher)
-    */
-    const TInt32 KAlgorithmCipherEcc = 0x20024482;
-    const TInt32 KAlgorithmSignerEcc = 0x20024483;
-    const TInt32 KAlgorithmVerifierEcc = 0x20024486;
-    const TInt32 KAlgorithmECCKeyPairGenerator = 0x20024487;
-
-    const TUid KEccCipherUid = {KAlgorithmCipherEcc};
-    const TUid KEccSignerUid = {KAlgorithmSignerEcc};
-    const TUid KEccVerifierUid = {KAlgorithmVerifierEcc};
-    const TUid KEccKeyPairGeneratorUid = {KAlgorithmECCKeyPairGenerator};
-
-    /**
-    UIDs related to ECC keys
-    */
-    const TInt32 KEccKeyType = 0x20025160;
-    const TInt32 KEccPublicKey = 0x20024484;
-    const TInt32 KEccPrivateKey = 0x20024485;
-
-    const TUid KEccKeyTypeUid = {KEccKeyType};
-    const TUid KEccPublicKeyUid = {KEccPublicKey};
-    const TUid KEccPrivateKeyUid = {KEccPrivateKey};
-
-    /**
-    UIDs related to ECC key params
-    */
-    const TInt32 KEccFiniteFieldFP = 0x20025151;
-    const TInt32 KEccFiniteFieldF2M = 0x20025152;
-    const TInt32 KEccKeyGenerationSeed = 0x20025153;
-    const TInt32 KEccKeyParameterP = 0x20025154;
-    const TInt32 KEccKeyParameterA = 0x20025155;
-    const TInt32 KEccKeyParameterB = 0x20025156;
-    const TInt32 KEccKeyParameterG = 0x20025157;
-    const TInt32 KEccKeyParameterN = 0x20025158;
-    const TInt32 KEccKeyParameterH = 0x20025159;
-    const TInt32 KEccKeyParameterM = 0x2002515A;
-    const TInt32 KEccKeyParameterF = 0x2002515B;
-    const TInt32 KEccKeyParameterD = 0x2002515C;
-    const TInt32 KEccKeyParameterQ = 0x2002515D;
-    const TInt32 KEccSignatureParameterR = 0x2002515E;
-    const TInt32 KEccSignatureParameterS = 0x2002515F;
-
-    const TUid KEccFiniteFieldFPUid = {KEccFiniteFieldFP};
-    const TUid KEccFiniteFieldF2MUid = {KEccFiniteFieldF2M};
-    const TUid KEccKeyGenerationSeedUid = {KEccKeyGenerationSeed};
-    const TUid KEccKeyParameterPUid = {KEccKeyParameterP};
-    const TUid KEccKeyParameterAUid = {KEccKeyParameterA};
-    const TUid KEccKeyParameterBUid = {KEccKeyParameterB};
-    const TUid KEccKeyParameterGUid = {KEccKeyParameterG};
-    const TUid KEccKeyParameterNUid = {KEccKeyParameterN};
-    const TUid KEccKeyParameterHUid = {KEccKeyParameterH};
-    const TUid KEccKeyParameterMUid = {KEccKeyParameterM};
-    const TUid KEccKeyParameterFUid = {KEccKeyParameterF};
-    const TUid KEccKeyParameterDUid = {KEccKeyParameterD};
-    const TUid KEccKeyParameterQUid = {KEccKeyParameterQ};
-    const TUid KEccSignatureParameterRUid = {KEccSignatureParameterR};
-    const TUid KEccSignatureParameterSUid = {KEccSignatureParameterS};
-#endif //SYMBIAN_ENABLE_SDP_ECC
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 	}
 
 
--- a/crypto/weakcryptospi/inc/tcryptospi.iby	Thu Apr 01 00:24:41 2010 +0300
+++ b/crypto/weakcryptospi/inc/tcryptospi.iby	Wed Apr 14 17:48:59 2010 +0300
@@ -33,9 +33,6 @@
 data = ZRESOURCE\cryptospi\plug-ins.txt5 		resource\cryptospi\plug-ins.txt5
 data = ZRESOURCE\cryptospi\plug-ins.txt6 		resource\cryptospi\plug-ins.txt6
 data = ZRESOURCE\cryptospi\plug-ins.txt7 		resource\cryptospi\plug-ins.txt7
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-data = ZRESOURCE\cryptospi\tecchw-plug-ins.txt 		resource\cryptospi\tecchw-plug-ins.txt
-#endif
 
 data = ZDRIVE/testdata/tcryptospi/scripts/tcryptospi.script						\testdata\tcryptospi\scripts\tcryptospi.script
 data = ZDRIVE/testdata/tcryptospi/scripts/te_SymmetricCipherTestCases.script			\testdata\tcryptospi\scripts\te_SymmetricCipherTestCases.script
@@ -49,10 +46,6 @@
 data = ZDRIVE/testdata/tcryptospi/scripts/te_PluginCharsTestCases.script			\testdata\tcryptospi\scripts\te_PluginCharsTestCases.script
 data = ZDRIVE/testdata/tcryptospi/scripts/te_RuleSelectionTestCases.script			\testdata\tcryptospi\scripts\te_RuleSelectionTestCases.script
 
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-data = ZDRIVE/testdata/tcryptospi/scripts/te_dummyeccciphertestcases.script			\testdata\tcryptospi\scripts\te_dummyeccciphertestcases.script
-#endif
-
 data = ZDRIVE/testdata/tcryptospi/configs/SymmetricCipherPositiveObjectLoad.ini					\testdata\tcryptospi\configs\SymmetricCipherPositiveObjectLoad.ini
 data = ZDRIVE/testdata/tcryptospi/configs/SymmetricCipherEncryptedDataCheck.ini					\testdata\tcryptospi\configs\SymmetricCipherEncryptedDataCheck.ini
 data = ZDRIVE/testdata/tcryptospi/configs/SymmetricCipherEncryptDecrypt.ini						\testdata\tcryptospi\configs\SymmetricCipherEncryptDecrypt.ini
@@ -109,10 +102,6 @@
 data = ZDRIVE/testdata/tcryptospi/configs/ruleselection_matrix.ini				\testdata\tcryptospi\configs\ruleselection_matrix.ini
 data = ZDRIVE/testdata/tcryptospi/configs/ruleselection_extended.ini				\testdata\tcryptospi\configs\ruleselection_extended.ini
 
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-data = ZDRIVE/testdata/tcryptospi/configs/dummyeccciphertestcases.ini				\testdata\tcryptospi\configs\dummyeccciphertestcases.ini
-#endif
-
 data = ZDRIVE/testdata/tcryptospi/data/key64bit.txt							\testdata\tcryptospi\data\key64bit.txt
 data = ZDRIVE/testdata/tcryptospi/data/key128bit.txt							\testdata\tcryptospi\data\key128bit.txt
 data = ZDRIVE/testdata/tcryptospi/data/key192bit.txt							\testdata\tcryptospi\data\key192bit.txt
--- a/crypto/weakcryptospi/source/random/random.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/crypto/weakcryptospi/source/random/random.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -108,12 +108,7 @@
 
 EXPORT_C void RRandomSession::ConnectL(void)
 	{
-	// All of the ConnectL() code has moved to randomimpl.cpp
-	// in the new CryptoSPI pluggable framework. This is just
-	// a stub now that is retained for binary compatibility.
-
-	// Method replaced by shim
-	ASSERT(EFalse);
+	// No action required
 	}
 
 EXPORT_C TInt RRandomSession::GetRandom(TDes8& aDestination)
--- a/crypto/weakcryptospi/test/tcryptospi/group/bld.inf	Thu Apr 01 00:24:41 2010 +0300
+++ b/crypto/weakcryptospi/test/tcryptospi/group/bld.inf	Wed Apr 14 17:48:59 2010 +0300
@@ -42,9 +42,6 @@
 ./plug-ins.txt5 z:/resource/cryptospi/plug-ins.txt5
 ./plug-ins.txt6 z:/resource/cryptospi/plug-ins.txt6
 ./plug-ins.txt7 z:/resource/cryptospi/plug-ins.txt7
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-./tecchw-plug-ins.txt z:/resource/cryptospi/tecchw-plug-ins.txt
-#endif
 
 // Script Files
 ../scripts/te_symmetricciphertestcases.script		/epoc32/winscw/c/testdata/tcryptospi/scripts/te_symmetricciphertestcases.script
@@ -67,9 +64,7 @@
 ../scripts/te_ruleselectiontestcases.script			/epoc32/winscw/c/testdata/tcryptospi/scripts/te_ruleselectiontestcases.script
 #endif
 
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-../scripts/te_dummyeccciphertestcases.script				/epoc32/winscw/c/testdata/tcryptospi/scripts/te_dummyeccciphertestcases.script
-#endif
+
 //***********************************************************************************************************************
 
 // Symmetric Step Configuration Files
@@ -154,9 +149,6 @@
 ../testdata/ruleselection_matrix.ini						/epoc32/winscw/c/testdata/tcryptospi/configs/ruleselection_matrix.ini
 #endif
 
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-../testdata/dummyeccciphertestcases.ini						/epoc32/winscw/c/testdata/tcryptospi/configs/dummyeccciphertestcases.ini
-#endif
 //***********************************************************************************************************************
 
 // Asymmetric and Symmetric Data Files
@@ -262,7 +254,3 @@
 ../testdata/nistsp800-38atestvectors/ctr-aes256ciphertext.ctr	/epoc32/winscw/c/testdata/tcryptospi/data/nistsp800-38atestvectors/ctr-aes256ciphertext.ctr
 
 // Copy Batch files
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-../scripts/batchfiles/pre_dummyeccplugin.bat					/epoc32/winscw/c/testdata/tcryptospi/scripts/batchfiles/pre_dummyeccplugin.bat
-../scripts/batchfiles/post_dummyeccplugin.bat					/epoc32/winscw/c/testdata/tcryptospi/scripts/batchfiles/post_dummyeccplugin.bat
-#endif
\ No newline at end of file
Binary file crypto/weakcryptospi/test/tcryptospi/group/tecchw-plug-ins.txt has changed
--- a/crypto/weakcryptospi/test/tcryptospi/scripts/batchfiles/post_dummyeccplugin.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,21 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-del \epoc32\RELEASE\WINSCW\UDEB\z\resource\cryptospi\plug-ins.txt
-copy \epoc32\RELEASE\WINSCW\UDEB\z\resource\cryptospi\plug-ins.txt.backup \epoc32\RELEASE\WINSCW\UDEB\z\resource\cryptospi\plug-ins.txt
-del \epoc32\RELEASE\WINSCW\UDEB\z\resource\cryptospi\plug-ins.txt.backup
-del \epoc32\RELEASE\WINSCW\UREL\z\resource\cryptospi\plug-ins.txt
-copy \epoc32\RELEASE\WINSCW\UREL\z\resource\cryptospi\plug-ins.txt.backup \epoc32\RELEASE\WINSCW\UREL\z\resource\cryptospi\plug-ins.txt
-del \epoc32\RELEASE\WINSCW\UREL\z\resource\cryptospi\plug-ins.txt.backup
\ No newline at end of file
--- a/crypto/weakcryptospi/test/tcryptospi/scripts/batchfiles/pre_dummyeccplugin.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,19 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-copy \epoc32\RELEASE\WINSCW\UDEB\z\resource\cryptospi\plug-ins.txt \epoc32\RELEASE\WINSCW\UDEB\z\resource\cryptospi\plug-ins.txt.backup
-copy \epoc32\RELEASE\WINSCW\UDEB\z\resource\cryptospi\tecchw-plug-ins.txt \epoc32\RELEASE\WINSCW\UDEB\z\resource\cryptospi\plug-ins.txt
-copy \epoc32\RELEASE\WINSCW\UREL\z\resource\cryptospi\plug-ins.txt \epoc32\RELEASE\WINSCW\UREL\z\resource\cryptospi\plug-ins.txt.backup
-copy \epoc32\RELEASE\WINSCW\UREL\z\resource\cryptospi\tecchw-plug-ins.txt \epoc32\RELEASE\WINSCW\UREL\z\resource\cryptospi\plug-ins.txt
\ No newline at end of file
--- a/crypto/weakcryptospi/test/tcryptospi/scripts/te_dummyeccciphertestcases.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,39 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-
-PRINT Run all te_DummyEccCipherTestCases
-//
-
-//
-LOAD_SUITE Te_CryptoSpi
-//
-//! @SYMTestCaseID 	SEC-CRYPTOSPI-PREQ2086-0001
-//! @SYMTestCaseDesc	DummyEccCipherLoad
-
-START_TESTCASE SEC-CRYPTOSPI-PREQ2086-0001
-RUN_TEST_STEP 100 Te_CryptoSpi DummyEccCipherLoadStep c:\testdata\tcryptospi\configs\DummyEccCipherTestCases.ini Cipher0001
-END_TESTCASE SEC-CRYPTOSPI-PREQ2086-0001
-
-//
-//! @SYMTestCaseID 	SEC-CRYPTOSPI-PREQ2086-0002
-//! @SYMTestCaseDesc	DummyEccSignerLoad
-
-START_TESTCASE SEC-CRYPTOSPI-PREQ2086-0002
-RUN_TEST_STEP 100 Te_CryptoSpi DummyEccSignerLoadStep c:\testdata\tcryptospi\configs\DummyEccCipherTestCases.ini Signer0001
-END_TESTCASE SEC-CRYPTOSPI-PREQ2086-0002
-
-PRINT Complete_te_DummyEccCipherTestCases
--- a/crypto/weakcryptospi/test/tcryptospi/src/te_cryptospiconversion.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/crypto/weakcryptospi/test/tcryptospi/src/te_cryptospiconversion.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -140,10 +140,6 @@
 	else if (*this==_L("KMacInterface")) return KMacInterfaceUid;
 	else if (*this==_L("KMacModeType")) return KMacModeTypeUid;
 #endif
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-    else if (*this==_L("KAlgorithmCipherEcc")) return KEccCipherUid;
-    else if (*this==_L("KAlgorithmSignerEcc")) return KEccSignerUid;
-#endif
 	else
 		{
 		User::Panic(*this,KErrNotFound);
--- a/crypto/weakcryptospi/test/tcryptospi/src/te_cryptospiserver.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/crypto/weakcryptospi/test/tcryptospi/src/te_cryptospiserver.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -105,10 +105,6 @@
 
 #include "ruleselectcommonstep.h"
 
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-#include "dummyecccipherloadstep.h"
-#include "dummyeccsignerloadstep.h"
-#endif
 //#include "pluginruleselectstep.h"
 
 _LIT(KServerName,"Te_CryptoSpi");
@@ -335,12 +331,5 @@
 	else if(aStepName == KRuleSelectCommonStep)
 		testStep = new CRuleSelectCommonStep();		
 
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-    else if(aStepName == KDummyEccCipherLoadStep)
-        testStep = new CDummyEccCipherLoadStep();
-	else if(aStepName == KDummyEccSignerLoadStep)
-	        testStep = new CDummyEccSignerLoadStep();
-#endif
-	
 	return testStep;
 	}
--- a/crypto/weakcryptospi/test/tcryptospi/testdata/dummyeccciphertestcases.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,6 +0,0 @@
-[Cipher0001]
-AlgorithmUid			=KAlgorithmCipherEcc
-PaddingMode			=KPaddingModeNone
-
-[Signer0001]
-Key					="dummy"
\ No newline at end of file
--- a/cryptomgmtlibs/cryptotokenfw/docsrc/Framework.dox	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,289 +0,0 @@
-/**
-   @page page_cryptotoken_framework Cryptographic token framework
-   
-	@section cryptotokens_pas Purpose and scope
-This document specifies the APIs which we will define as specified in the Hurricane Security Framework Functional Specification [1]. 
-
-This document assumes familiarity with the functional specification. 
-
-The API definitions are organised into 4 sections:
-- @ref ct
-- @ref interfaces
-- @ref secdlg
-- @ref Securitydefs
-
-In addition, a guide to writing tokens is provided: @ref cryptotokens_Writing
-
-And a guide to the use of reference counting:@ref cryptotokens_refcount
-
-@section cryptotokens_notes General Notes
-
-- Clients of the Crypto Token Framework must use an active
-	scheduler. Crypto tokens may assume that an active scheduler is
-	present.
-
-	@subsection cryptotokens_refs References
-All Documents can be found in <code>\\\\Londata04\\Psisoft\\Dev\\GT\\0128 Hurricane WAP</code> unless otherwise stated.
-
--# Hurricane Security Framework Functional Specification, "HSF FS.doc"
--# Certificate Management(Hurricane) Functional Specification
-
-@section cryptotokens_tsecdlg The dummy security dialog notifier
-
-See @ref cryptotokens_TSecdlg
-
-@section cryptotokens_revs Revision History
-<TABLE>
-<TR><TD>Date	</TD><TD>Version	</TD><TD>Status	</TD><TD>Description</TD></TR>
-<TR><TD>25-10-2001	</TD><TD>0.01	</TD><TD>DRAFTversion	</TD><TD>First draftversion</TD></TR>
-<TR><TD>31-10-2001	</TD><TD>0.02	</TD><TD>DRAFTversion	</TD><TD>Updated after review</TD></TR>
-<TR><TD>15-11-2001	</TD><TD>0.03	</TD><TD>DRAFTversion	</TD><TD>Updated following small changes after actual implementation</TD></TR>
-<TR><TD>23-11-2001	</TD><TD>0.04	</TD><TD>DRAFTversion	</TD><TD>Changes to Security Dialog API - dropped Sign in favour of EstablishSecureConnection</TD></TR>
-<TR><TD>21-12-2001	</TD><TD>1.00	</TD><TD>ISSUED	</TD><TD>Issued</TD></TR>
-<TR><TD>02-01-2002	</TD><TD>1.01	</TD><TD>PROPOSED	</TD><TD>Extended, converted to Doxygen format and updated to reflect current APIs</TD></TR>
-<TR><TD>18-03-2002	</TD><TD>2.00	</TD><TD>ISSUED	</TD><TD>Minor updates</TD></TR>
-</TABLE>
-
-
-
- */
-/**
-   @page cryptotokens_Writing Writing a token type
-
-   A token type is an ECom plugin that represents a particular
-   implementation of cryptographic functions, for instance a WIM or a
-   particular file-based certificate store. 
-
-   The process of writing one can be divided into the following steps:
-
-   @ref cryptotokens_UIDs
-
-   @ref cryptotokens_Framework
-
-   @ref cryptotokens_Resource
-
-   @ref cryptotokens_TokenType
-
-   @ref cryptotokens_TokenInfo
-
-   @ref cryptotokens_Token
-
-   @ref cryptotokens_Interfaces
-
- */
-/**
-   @page cryptotokens_UIDs Understanding the use of UIDs in the framework
-
-   Lots of different things are associated with UIDs. It's important
-   to understand what they all are.
-
-   The Token Type base class is an Interface as far as ECom is
-   concerned, and has a UID to identify it. This UID is defined by the
-   framework, and there's a define for it, CT_INTERFACE_UID. All you
-   need to do with this UID is put it in the right place in the
-   resource file.
-
-   Each DLL has a UID, just like normal. Your DLL will need one. ECom
-   requires your resource file to be named after the UID of the DLL.
-
-   Each Token Type has a UID. It is possible (but unusual) to have several token
-   types in 1 DLL, which is why they each need a UID to identify them.
-
-   Each interface and attribute also has a UID to identify
-   them. Normaly the interfaces and attributes will have been defined
-   as part of the framework, so there will be defines for these
-   values.
-
-   Next: @ref cryptotokens_Framework
-   Previous: @ref cryptotokens_Writing
-
-  */
-/**
-   @page cryptotokens_Resource Writing the resource file.
-
-   The resouce file generaly follows the ordinary format of an ECom
-   resource file. It must be named after the UID of the
-   implementation. The match data is interpreted as a list of UIDs of
-   supported interfaces. The Opaque data contains the attributes,
-   which are represented as pairs of UIDs and 4 byte values.
-
-   Due to limitations in the format of ECom resource files, these
-   resources must be specified as a list of bytes, with the LSB being
-   first in each word of 4 bytes. An example is probably needed:
-   @code
-// 101F4E4e.RSS
-//
-
-// This header file contains all the defines you need.
-#include "ct/CryptoTokenRegistryInfo.rh"
-RESOURCE REGISTRY_INFO theInfo
-	{
-	// This is the UID of the DLL, and also the name of this file.
-	dll_uid = 0x101F4E4e;
-	interfaces = 
-		{
-		INTERFACE_INFO
-			{
-			// This is the ECom interface ID of all CT Token types
-			interface_uid = CT_INTERFACE_UID; 
-			implementations = 
-				{
-				BINARY_IMPLEMENTATION_INFO
-					{
-					implementation_uid = 0x101f4e4c; // UID of the token type
-					version_no = 1; // Version number of this token type
-					display_name = "Test Token Type 6"; // Human-readable name
-					// Supported interfaces:
-					default_data = {0x50, 0x4e, 0x1f, 0x10, // UID 0x101f4e50
-									0x51, 0x4e, 0x1f, 0x10, // UID 0x101f4e51
-									0x52, 0x4e, 0x1f, 0x10};// UID 0x101f4e52
-					opaque_data = {	0x4b, 0x4e, 0x1f, 0x10, // attr 2 UID 0x101f4e4b
-									0x02, 0x00, 0x00, 0x00, // attr 2 value (2)
-									0x4a, 0x4e, 0x1f, 0x10, // attr 1 UID 0x101f4e4a
-									0x01, 0x00, 0x00, 0x00};// attr 1 value (1)
-					}
-
-				};
-			}
-		};
-	}
-
-   @endcode
-
-   Next: @ref cryptotokens_TokenType
-   Previous: @ref cryptotokens_Resource
-
-
- */
-/**
-   @page cryptotokens_Framework Writing the framework of the DLL and static classes. 
-
-   The DLL must be built with the target type ECOMIIC. This is an
-   example of a simple mmp file for a token type DLL:
-   @code
-TARGET TestPlugin.dll
-TARGETTYPE ECOMIIC
-
-// ECom Dll recognition UID followed by the unique UID for this dll
-UID 0x10009D8D 0x101F4E4E
-
-SOURCEPATH	.
-SOURCE	TestPlugin.cpp
-
-SYSTEMINCLUDE 	\epoc32\include \epoc32\include\ecom
-
-RESOURCE	101F4E4E.rss
-
-LIBRARY euser.lib
-LIBRARY ctframework.lib
-   @endcode
-
-   The DLL will need an E32Dll function, like any other SymbianOS
-   DLL. For instance, in most cases it can look like this:
-   @code
-GLDEF_C TInt E32Dll(TDllReason)
-	{
-	return ETrue;
-	}
-   @endcode
-
-   Then a standard ECom ImplementationTable and
-   ImplementationGroupProxy function is needed. Assuming your plugin
-   has 1 token type in, it'll look something like this:
-   @code
-// An array listing the NewL functions of all the plugins. In this
-// case, there is only 1. The UID of the token type is 0x101F4E4D.
-const TImplementationProxy ImplementationTable[] = 
-	{
-		{{0x101F4E4D},	CTokenTypeImplementation::NewL},
-	};
-
-// This function is needed by ECom. It will probably always look like this.
-EXPORT_C const TImplementationProxy* ImplementationGroupProxy(TInt& aTableCount)
-	{
-	aTableCount = sizeof(ImplementationTable) / sizeof(TImplementationProxy);
-
-	return ImplementationTable;
-	}
-	@endcode
-
-   Next: @ref cryptotokens_Resource
-   Previous: @ref cryptotokens_UIDs
-
- */
-/**
-   @page cryptotokens_TokenType Writing the Token Type class
-
-   The token type class needs to implement the CTokenType
-   interface. This means it needs to return a list of CTokenInfo
-   objects representing every token available, and to open a token
-   based on a CTokenInfo object.
-
-   Both the listing of the token infos and opening tokens are
-   asynchronous as they may need to talk to slow external tokens such
-   as WIMs.
-
-   Next: @ref cryptotokens_TokenInfo
-   Previous: @ref cryptotokens_Resource
-
-
- */
-/**
-   @page cryptotokens_TokenInfo Writing the Token Info class
-
-   By default, the CTokenInfo contains just a label, which allows the
-   user to identify which token they want to use. You can add other
-   data to allow you to identify which token it refers to. If your
-   token type only supports 1 token, this class will be very trivial.
-
-   Next: @ref cryptotokens_Token
-   Previous: @ref cryptotokens_TokenType
-
- */
-/**
-   @page cryptotokens_Token Writing the Token class
-
-   The token is a subclass of MCTToken. You must define the functions
-   to create interfaces, and the release function. The client must
-   call Release once when it has finished with the token. In addition,
-   you may wish to implement a reference counting mechanism so that
-   the token object is held open until the Release functions in the
-   interfaces are called.
-
-   The token will almost certainly need a pointer to the token type,
-   and the interfaces to the token.
-
-   Next: @ref cryptotokens_Interfaces
-   Previous: @ref cryptotokens_TokenInfo
-
- */
-/**
-   @page cryptotokens_Interfaces Implementing the interfaces
-
-   You now need to implement the interfaces that your token
-   supports. How to do this is described in the documentation for each
-   interface.
-
-   Contents: @ref cryptotokens_Writing
-   
-*/
-/** @page cryptotokens_refcount The Use of Reference Counting in the framework
-The token type counts active references to it. When it is created its reference count is set to 1. Each time it constructs and returns a token it increments its reference count. Its Release decrements the reference count: if the result is zero the token type resources are freed. 
-
-The token counts active references to it. When it is created its reference count is set to 1. Each time it constructs and returns an interface it increments its reference count. Its Release() decrements the reference count: if the result is zero the token's own resources are freed, and the token calls TokenType().Release(), to signal that it no longer needs the token. 
-
-The token interface base class implements its Release() function by calling its DoRelease() function to free its own resources, then calling Token().Release() to signal to the token that it no longer needs it.
-
-This enables application code to create a token type, use it to create a token, then release the token type, then use the token to create an interface, then release the token; it can then, for example, pass the interface to another object without needing to worry about the fate of the token type, or the token. 
-
-The sequence diagram below shows the operation of the reference counting. 
-
-- the application creates a token type, whose reference count is set to 1 (1&2)
-- the application uses the token type to create two tokens A and B: each token is created with a reference count of one, and the token type's reference count is incremented each time (7&11) so is now 3
-- the application releases the token type, so its reference count is decremented (11 & 12)
-- the application opens two interfaces implemented on token A (interfaces 1 & 2); each time the token's reference count is incremented, so is now 3 (14-17)
-- the application releases token A, so its reference count is decremented to 2 (18-19)
-- this process is repeated for token B (20-28): now we have 1 token type which has generated 2 tokens, each of which has generated 2 interfaces, which hold the only handles to the interfaces. The application can now forget about the ownership of the token types and tokens.
-- when the application has finished with the interfaces it releases them. When each interface is released it releases the token hosting it, which decrements the reference count. When all the interfaces hosted by a token have released the token the reference count is zero and the token cleans up its own resources and releases the token type When both tokens have released the token type its own reference count is zero, so it frees its own resources.
-@image html sequence.bmp "Reference Counting Sequence Diagram"
-*/
Binary file cryptomgmtlibs/cryptotokenfw/docsrc/sequence.bmp has changed
--- a/cryptomgmtlibs/cryptotokenfw/docsrc/tsecdlg.dox	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,190 +0,0 @@
-/**
-
-@page cryptotokens_TSecdlg tsecdlg - The dummy security dialog notifier
-
-@section tsecdlg_intro Introduction
-
-This document describes tsecdlg, the dummy security dialog notifier.
-
-The security dialog API provides a way for components to ask the user various
-standard security-related questions.  For example, it contains methods to prompt
-the user to enter a passphrase, among others.  The API is defined in the file
-secdlg.h.
-
-It is necessary to write test harnesses for clients of this API which can be run
-unattended, without user intervention.  To achieve this, tsecdlg was developed.
-It allows user responses to security dialogs to be pre-defined, and enables a
-test harness to check that the expected dialogs would have been displayed to the
-user.
-
-@section tsecdlg_secdlg_implementation Security dialog implementation
-
-The dialogs that the user sees cannot be implemented as part of the security
-subsystem because they form part of the user interface layer.  So the security
-dialog API passes client requests to the security dialog notifier.  This is a
-type of plugin, and is typically supplied by the UI implementation - for example
-by techview.  The protocol used to pass messages to and from the plugin is
-defined in the file secDlgImplDefs.h.
-
-tsecdlg is just an implementation of the security dialog notifier that doesn't
-ask the user for information.  Instead it either gives default responses or
-reads them from a file.
-
-@section tsecdlg_when_to_use_tsecdlg When it's necessary to use tsecdlg
-
-Any test that directly or indirectly uses the security dialog API will require
-the use of tsecdlg if the tests are to be run unattended.  At the moment, the
-keystore is the main client of this API.  The keystore tests rely heavily on
-tsecdlg, and anything that uses keystore will probably need to use it as well -
-for example TLS.
-
-<hr>
-
-@section tsecdlg_preparation Preparation for running tests that use tsecdlg
-
-@section tsecdlg_building_tsecdlg Building tsecdlg
-
-Two versions of tsecdlg are built on all platforms - one for the extended
-notifier framework (ie graphical notifiers, or techview) and one for textshell.
-This means that tests will work in both environments.
-
-To build tsecdlg just requires building the test code supplied in the
-security cryptotokens component, eg:
-
-\code
-cd common\generic\security\cryptotokens\group
-bldmake bldfiles
-abld test build wins udeb
-\endcode
-
-There are two tsecdlg components: 
-
-<table>
-<tr><th>Name</th><th>Location</th><th>Description</th></tr>
-<tr><td>t_secdlg</td><td>z:\\system\\notifiers\\tsecdlg.dll</td><td>Extended notifier</td></tr>
-<tr><td>t_secdlg_text</td><td>z:\\system\\tnotifiers\\tsecdlg_text.dll</td><td>Textshell notifier</td></tr>
-</table>
-
-@section tsecdlg_emulator_testing Testing on the emulator 
-
-If you are running in techview mode, you must ensure that the techview
-implementation of the security dialog notifier (secdlg.dll) is not present (if
-both secldg.dll and tsecdlg.dll are present, epoc will crash).  This can be
-found in in z:\\system\\notifiers, for example
-\\epoc32\\release\\wins\\udeb\\z\\system\\notifiers for wins udeb.  The easiest
-way to ensure secdlg.dll is removed is to use the following command:
-
-\code
-del /s /f /q \epoc32\secdlg.dll
-\endcode
-
-This does not matter for textshell mode, because there is no default textshell
-security dialog plugin.
-
-@section tsecdlg_hardware_testing Testing on hardware
-
-To test on hardware, the appropriate dll (either techview or textshell) must be
-included in the ROM in the same location as it is in the emulator (ie
-z:\\system\\notifiers for techview mode).  This can be done adding the following
-line to an iby file:
-
-\code
-file=ABI_DIR\BUILD_DIR\tsecdlg.dll		System\Notifiers\tsecdlg.dll
-\endcode
-
-This is done for security tests in the file filetokenstests.iby.
-
-Note that if you are using techview mode, you must ensure that secdlg.dll is not
-included - you must edit \\epoc32\\rom\\include\\secui.iby and comment out the
-following line:
-
-\code
-file=ABI_DIR\BUILD_DIR\secdlg.dll		System\Notifiers\Secdlg.dll
-\endcode
-
-<hr>
-
-@section tsecdlg_cryptotokens_operation tsecdlg operation
-
-tsecdlg has two modes of operation:
-
-@li Default mode
-@li Scripted mode
-
-@section tsecdlg_default_mode Default mode
-
-This is the simpler mode.  Whenever the dialog for a passphrase is triggered,
-tsecdlg replies with a default passphrase ('pinkcloud').
-
-This is intended to used by test code that is not directly testing a client of
-the security dialog API, for example by TLS.
-
-tsecdlg runs in this mode when the files c:\\t_secdlg_in.dat and
-c:\\t_secdlg_out.dat are not present.
-
-@section tsecdlg_scripted_mode Scripted mode
-
-This mode is more complex, and is intended to be used by for testing direct
-clients of the security dialog API - for example the keystore.
-
-Before a test is run, a file of expected dialogs and the required responses is
-prepared.  Every time the security dialog API is called and tsecdlg invoked, it
-checks that the requested dialog is the one expected, and answers with the
-pre-determined response.  An unexpected dialog request produces an error.  A
-file containing the number of correctly answered dialog requests is maintained
-and this allows the test harness to determine whether all expected dialogs were
-triggered correctly.
-
-The list of expected dialogs is read from c:\\t_secdlg_in.dat.  This has the
-following format:
-
-<table>
-<tr><th>Type</th><th>Description</th></th>
-<tr><td>TInt32</td><td>Number of dialogs expected</td></tr>
-</table>
-
-Then, for every expected dialog, the following data is present.  Strings are
-represented with their size (TInt32) followed by that many bytes of data.
-
-<table>
-<tr><th>Type</th><th>Description</th></tr>
-<tr><td>TInt32</td><td>Expected operation</td></tr>
-<tr><td>String</td><td>Expected label</td></tr>
-<tr><td>String</td><td>Response 1</td></tr>
-<tr><td>String</td><td>Response 2 (not always used)</td></tr>
-</table>
-
-The expected operation should be a member of the TSecurityDialogOperation
-enumeration - this specifies the expected type of dialog that is requested (for
-example, the enter passphrase dialog).  If the requested operation is not the
-same as this, the operation is completed with KErrOperationMismatch.  If the
-operation is one that is not supported by tsecdlg (only the ones necessary for
-testing keystore are currently implemented), the operation is completed with
-KErrOperationNotSupported.
-
-The expected label allows the test code to specify the label passed to the API.
-It is matched if the actual label contains the expected label - this means that
-passing an empty string will always ensure a match.  If the expected label is
-not matched, the operation is completed with KErrLabelMismatch.
-
-The responses are the information tsecdlg passes back as if from the user.  Some
-operations (eg change PIN) return two pieces of information, but for the most
-part only the first one is used.  
-
-The error codes are summarised below.  Note that as this is test code, these are
-not officially allocated!
-
-<table>
-<tr><th>Name</th><th>Code</th><th>Description</th></tr>
-<tr><td>KErrTooManyDialogs</td><td>-12000</td><td>More dialogs have been requested than are described in the input file</td></tr>
-<tr><td>KErrLabelMismatch</td><td>-12001</td><td>The label requested did not match the expected value</td></tr>
-<tr><td>KErrOperationMismatch</td><td>-12002</td><td>The operation requested did not match the expected value</td></tr>
-<tr><td>KErrOperationNotSupported</td><td>-12003</td><td>The operation requested is not implemented by tsecdlg</td></tr>
-</table>
-
-Every time a request is succesfully answered, the file c:\\t_secdlg_out.dat is
-updated - it contains a single TInt32 that indicates the index of the current
-dialog in the list of expected dialogs described by c:\\t_secdlg_in.dat.  If it
-is not present, its value is assumed to be zero.
-
-*/
--- a/cryptomgmtlibs/cryptotokenfw/inc_interfaces/MCTKeyStoreManager_v2.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptomgmtlibs/cryptotokenfw/inc_interfaces/MCTKeyStoreManager_v2.h	Wed Apr 14 17:48:59 2010 +0300
@@ -278,194 +278,6 @@
 	/** Cancels an ongoing Relock() operation. */
 	virtual void CancelRelock() = 0;
 
-#ifdef SYMBIAN_AUTH_SERVER
-	/**
-	 * Generate a new key pair and store it in keystore. The key should be stored against an
-	 * already authenticated user. If there is no user currently authenticated then authentication
-	 * should be performed before creation of the key.
-	 *	
-	 * @param aReturnedKey				This is filled by the caller with required
-	 *									attributes, leaving the TKeyIdentifier iID and object handle 
-	 * 									iHandle	uninitialised - these values are set if the key is 
-	 * 									created successfully.
- 	 * @param aAuthenticationString		The expression through which a user can be authenticated.
-	 * 									Currently this should correspond to one of the alias values
-	 * 									set by the licensee for authentication server configuration.
-	 * 									This should be stored against the created key.
-	 * @param aFreshness				The validity to be considered for an already authenticated 
-	 * 									identity. This should be stored against the created key. 
-	 * 									Specification is in seconds.
-	 * 
-	 * @param aStatus					This will be completed with the final status code. Some specific
-	 * 									codes are as follows.
-	 * 									KErrPermissionDenied		If the caller does not have WriteUserData 
-	 * 																capability.
-	 * 									KErrAlreadyExists			If a key with the specified label already
-	 *																exists in the keystore for the specific
-	 * 																user.
-	 * 									KErrKeySize					If the requested key size is not supported.
-	 * 									KErrKeyAccess				If an invalid combination of key access 
-	 * 																flags were specified.
-	 * 									KErrKeyValidity				If a validity period was specified, but the 
-	 * 																end date was in the past.
-	 * 									KErrAuthenticationFailure	If the user authentication fails.
-	 * 
-	 * @see 							AuthServer::CAuthExpression
-	 * 
-	 * @capability WriteUserData	Should require the caller to have WriteUserData capability.
-	 */
-	virtual void CreateKey(	const TDesC& /*aAuthenticationString*/, 
-							TInt /*aFreshness*/,
-							CCTKeyInfo*& /*aReturnedKey*/,
-							TRequestStatus& aStatus )
-		{
-		TRequestStatus* status = &aStatus;
-		User::RequestComplete(status,KErrNotSupported);
-		}
-
-	/**
-	 * Imports a der-encoded PKCS#8 format key pair into the keystore. The key should be stored against an
-	 * already authenticated user. If there is no user currently authenticated then authentication
-	 * should be performed before creation of the key.
-	 *
-	 * 
-	 * @param aKey						This is a descriptor representation of the PKCS#8 key data.
-	 * @param aAuthenticationString		The expression through which a user can be authenticated.
-	 * 									Currently this should correspond to one of the alias values
-	 * 									set by the licensee for authentication server configuration.
-	 * 									This should be stored against the created key.
-	 * @param aFreshness				The validity to be considered for an already authenticated 
-	 * 									identity. This should be stored against the created key.
-	 * 									Specification is in seconds.
-	 * @param aReturnedKey				This is filled by the caller with required
-	 *									attributes, leaving the TKeyIdentifier iID and object handle 
-	 * 									iHandle	uninitialised - these values are set if the key is 
-	 * 									created successfully.
-	 * @param aStatus					This will be completed with the final status code. Some specific
-	 * 									codes are as follows.
-	 * 									KErrPermissionDenied	If the caller does not have WriteUserData 
-	 * 															capability.
-	 * 									KErrAlreadyExists		If a key with the specified label already 
-	 * 															exists in the keystore for the specific
-	 * 															user.
-	 * 									KErrKeySize				If the requested key size is not supported.
-	 * 									KErrKeyAccess			If an invalid combination of key access flags 
-	 * 															were specified.
-	 * 									KErrKeyValidity			If a validity period was specified, but the end
-	 *															date was in the past.
-	 * 									KErrArgument			If there is an error parsing the key data.
-	 * 									KErrAuthenticationFailure	If the user authentication fails.
-	 * 
-	 * @see 							AuthServer::CAuthExpression
-	 * 
-	 * @capability WriteUserData			Should require the caller to have WriteUserData capability
-	*/
-	virtual void ImportKey( const TDesC8& /*aKey*/, 
-							const TDesC& /*aAuthenticationString*/, 
-							TInt /*aFreshness*/, 
-							CCTKeyInfo*& /*aReturnedKey*/, 
-							TRequestStatus& aStatus )
-		{
-		TRequestStatus* status = &aStatus;
-		User::RequestComplete(status,KErrNotSupported);
-		}
-
-	/**
-	 * Imports an encrypted key pair into the keystore. The key should be stored against an
-	 * already authenticated user. If there is no user currently authenticated then authentication
-	 * should be performed before creation of the key.
-	 *
-	 * The import data should be der-encoded PKCS#8 format encrypted in accordance to PKCS#5 
-	 * specification.
-	 * 
-	 * @param aKey						This is a descriptor representation of the PKCS#8 key data.
-	 * 									Encrypted in accordance to PKCS#5 specification.	
-	 * @param aAuthenticationString		The expression through which a user can be authenticated.
-	 * 									Currently this should correspond to one of the alias values
-	 * 									set by the licensee for authentication server configuration.
-	 * 									This should be stored against the created key.
-	 * @param aFreshness				The validity to be considered for an already authenticated 
-	 * 									identity. This should be stored against the created key.
-	 * 									Specification is in seconds.
-	 * @param aReturnedKey				This is filled by the caller with required
-	 *									attributes, leaving the TKeyIdentifier iID and object handle 
-	 * 									iHandle	uninitialised - these values are set if the key is 
-	 * 									created successfully.
-	 * @param aStatus					This will be completed with the final status code. Some specific
-	 * 									codes are as follows.
-	 * 									KErrPermissionDenied	If the caller does not have WriteUserData 
-	 * 															capability.
-	 * 									KErrAlreadyExists		If a key with the specified label already 
-	 * 															exists in the keystore for the specific
-	 * 															user.
-	 * 									KErrKeySize				If the requested key size is not supported.
-	 * 									KErrKeyAccess			If an invalid combination of key access flags 
-	 * 															were specified.
-	 * 									KErrKeyValidity			If a validity period was specified, but the end
-	 *															date was in the past.
-	 * 									KErrArgument			If there is an error parsing the key data.
-	 * 									KErrAuthenticationFailure	If the user authentication fails.
-	 * 
-	 * @see 							AuthServer::CAuthExpression
-	 * 
-	 * @capability WriteUserData		Should require the caller to have WriteUserData capability
-	*/
-	virtual void ImportEncryptedKey( 	const TDesC8& /*aKey*/, 
-										const TDesC& /*aAuthenticationString*/, 
-										TInt /*aFreshness*/, 
-										CCTKeyInfo*& /*aReturnedKey*/, 
-										TRequestStatus& aStatus )
-		{
-		TRequestStatus* status = &aStatus;
-		User::RequestComplete(status, KErrNotSupported);
-		}
-	
-	/**
-	 *  Set the authentication policy for an already existing key in the store.
-	 * 
-	 * @param aHandle					The handle of the key whose policy is to be changed.
-	 * @param aAuthenticationString		The expression associated to this key.
-	 * @param aFreshness				The validity associated to this key.
-	 * 									Specification is in seconds.
-	 * @param aStatus					Final status of the operation.
-	 * 									KErrAuthenticationFailure	If the user authentication fails.
-	 * 
-	 * @see 							AuthServer::CAuthExpression
-	 *   
-	*/
-	virtual void SetAuthenticationPolicy(	const TCTTokenObjectHandle /*aHandle*/,
-											const TDesC& /*aAuthenticationString*/,
-											TInt /*aFreshness*/,
-											TRequestStatus& aStatus)
-		{
-		TRequestStatus* status = &aStatus;
-		User::RequestComplete(status, KErrNotSupported);
-		}
-	
-	/**
-	 *  Retrieve authentication policy for an already existing key in the store.
-	 * 
-	 * @param aHandle					The handle of the key whose policy is to be retrieved.
-	 * @param aAuthenticationString		The expression associated to this key. The memory would
-	 * 									be allocated at the server side.
-	 * @param aFreshness				The validity associated to this key.
-	 * 									Specification is in seconds.
-	 * @param aStatus					Final status of the operation.
-	 * 									KErrAuthenticationFailure	If the user authentication fails.
-	 * 
-	 * @see 							AuthServer::CAuthExpression
-	 *  
-	*/
-	virtual void GetAuthenticationPolicy(	const TCTTokenObjectHandle /*aHandle*/,
-											HBufC*& /*aAuthenticationString*/,
-											TInt& /*aFreshness*/,
-											TRequestStatus& aStatus)
-		{
-		TRequestStatus* status = &aStatus;
-		User::RequestComplete(status, KErrNotSupported);
-		}
-#endif // SYMBIAN_AUTH_SERVER
-
 };
 
 
--- a/cryptomgmtlibs/cryptotokenfw/inc_interfaces/MCTKeyStore_v2.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptomgmtlibs/cryptotokenfw/inc_interfaces/MCTKeyStore_v2.h	Wed Apr 14 17:48:59 2010 +0300
@@ -76,9 +76,6 @@
 		ERSA				= 1,
 		EDSA				= 2,
 		EDH					= 3,
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-		EECC                = 4,
-#endif
 		};
 
 	/** Flags for key access bitfield. */
--- a/cryptomgmtlibs/cryptotokenfw/inc_interfaces/doxygen_docs/Crypto_Interfaces_index.dox	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,11 +0,0 @@
-/**
-@page page_cryptoInterfaces Cryptographic interfaces
-
-Welcome to Cryptographic Interfaces
-
-@li Authentication object management interface
-@li Certificate storage interface
-@li Key storage interface
-
-
-*/
\ No newline at end of file
--- a/cryptomgmtlibs/cryptotokenfw/inc_interfaces/mkeystore_v2.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptomgmtlibs/cryptotokenfw/inc_interfaces/mkeystore_v2.h	Wed Apr 14 17:48:59 2010 +0300
@@ -37,14 +37,6 @@
 class CCTKeyInfo;
 struct TCTKeyAttributeFilter;
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-namespace CryptoSpi
-    {
-    class CSigner;
-    class CAsymmetricCipher;
-    class CCryptoParams;
-    }
-#endif /* SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT */
 
 /**
  * A template for signer objects.  It isn't possible to use a base class as the
@@ -391,163 +383,6 @@
 	/** Cancels an ongoing ExportPublic() operation */
 	virtual void CancelExportPublic() = 0;
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-    /**
-     * Opens a key for signing. This function returns a CryptoSPI
-     * signer object. SignL() method should be invoked on this object
-     * to perform the signing operation.
-     *
-     * @param aHandle The handle of the key to be opened.
-     * @param aSigner The returned CryptoSPI signer object.
-     * @param aStatus Returns the status of asynchronous operation, 
-     * possible values of which are given below:-
-     * KErrNone if successful, otherwise a system wide error 
-     * code (in such a case signer object is not allocated). The 
-     * most likely error codes are:-
-     * - KErrNotSupported Default value, used if licensee does not
-     * provide an implementation.
-     * - KErrPermissionDenied If the caller does not conform to
-     * the key use security policy.
-     * - KErrNotFound If the key the handle referes to does not
-     * exist.
-     * - KErrKeyUsage If the key doesn't have sign usage.
-     * - KErrKeyValidity If the key is not currently valid.
-     * - KErrKeySize If the key length is too small.
-     * - KErrKeyAccess If an invalid combination of key access
-     * flags were specified.
-     * 
-     * @capability Requires the caller to have the capabilities
-     * specified in the key use security policy.
-     */
-	virtual void Open(const TCTTokenObjectHandle& /*aHandle*/,
-	                  CryptoSpi::CSigner*& /*aSigner*/,
-	                  TRequestStatus& aStatus)
-		{
-		TRequestStatus* status = &aStatus;
-		User::RequestComplete(status,KErrNotSupported);
-		}
-
-    /**
-     * Opens a key for decryption. This function returns a CryptoSPI
-     * signer object. ProcessL() method should be invoked on this object
-     * to perform the decryption operation.
-     *
-     * @param aHandle The handle of the key to be opened.
-     * @param aAsymmetricCipher The returned CryptoSPI cipher object.
-     * @param aStatus Returns the status of asynchronous operation,
-     * possible values of which are given below:-
-     * KErrNone if successful, otherwise a system wide error 
-     * code (in such a case cipher object is not allocated). The 
-     * most likely error codes are:-
-     * - KErrNotSupported Default value, used if licensee does not
-     * provide an implementation.
-     * - KErrPermissionDenied If the caller does not conform to
-     * the key use security policy.
-     * - KErrNotFound If the key the handle referes to does not
-     * exist.
-     * - KErrKeyUsage If the key doesn't have sign usage.
-     * - KErrKeyValidity If the key is not currently valid.
-     * - KErrKeySize If the key length is too small.
-     * - KErrKeyAccess If an invalid combination of key access
-     * flags were specified.
-     *
-     * @capability Requires the caller to have the capabilities
-     * specified in the key use security policy.
-     */
-	virtual void Open(const TCTTokenObjectHandle& /*aHandle*/,
-	                  CryptoSpi::CAsymmetricCipher*& /*aAsymmetricCipher*/,
-	                  TRequestStatus& aStatus)
-		{
-		TRequestStatus* status = &aStatus;
-		User::RequestComplete(status,KErrNotSupported);
-		}
-
-	/**
-	 * This function takes a token handle and encrypted text as input
-	 * and stores the decrypted text as one of the output parameters.
-	 * This API would should be used by the licensees who want to perform
-	 * decryption operation inside the hardware without using CryptoSPI.
-	 *
-	 * @param aHandle The handle of the key to be used for decryption.
-     * @param aCiphertext Contains the encrypted text which has to be
-     * decrypted.
-     * @param aPlaintextPtr This contains the decrypted text. Caller
-     * should take responsibility of this pointer. Derived classes 
-     * should never take ownership of the passed pointer.
-     * @param aStatus Returns the status of asynchronous operation,
-     * possible values are given below:-
-     * KErrNone if successful, otherwise a system wide error 
-     * code (in such a case aPlaintextPtr is not allocated). The 
-     * most likely error codes are:-
-     * - KErrNotSupported Default value, used if licensee does not
-     * provide an implementation.
-     * - KErrPermissionDenied If the caller does not conform to
-     * the key use security policy.
-     * - KErrNotFound If the key the handle referes to does not
-     * exist.
-     * - KErrKeyUsage If the key doesn't have sign usage.
-     * - KErrKeyValidity If the key is not currently valid.
-     * - KErrKeySize If the key length is too small.
-     * - KErrKeyAccess If an invalid combination of key access
-     * flags were specified.
-     * 
-     * @capability Requires the caller to have the capabilities
-     * specified in the key use security policy.
-     */
-	virtual void Decrypt(const TCTTokenObjectHandle& /*aHandle*/,
-                         const TDesC8& /*aCiphertext*/,
-	                     HBufC8*& /*aPlaintextPtr*/,
-	                     TRequestStatus& aStatus)
-		{
-		TRequestStatus* status = &aStatus;
-		User::RequestComplete(status,KErrNotSupported);
-		}
-
-	/**
-	 * This function takes a token handle and plain text as input and
-	 * returns the signature as one of the output parameters. This API
-	 * would enable the licensees to sign a text by just having a handle
-	 * to key. The key can be stored in the hardware and does not come
-	 * out at all. This API should be used by the licensees who want to
-	 * perform signing operation inside the hardware without using
-	 * CryptoSPI.
-	 *
-	 * @param aHandle The handle of the key to be used for decryption.
-	 * @param aPlainText Text which has to be signed.
-	 * @param aSignature The cryptoSPI signature. Caller
-	 * should take responsibility of this pointer. Derived classes 
-     * should never take ownership of the passed pointer.
-	 * @param aStatus Returns the status of asynchronous operation,
-	 * possible values are:-
-	 * KErrNone if successful, otherwise a system wide error 
-     * code (in such a case aSignature is not allocated). The 
-     * most likely error codes are:-
-     * - KErrNotSupported Default value, used if licensee does not
-     * provide an implementation.
-     * - KErrPermissionDenied If the caller does not conform to
-     * the key use security policy.
-     * - KErrNotFound If the key the handle referes to does not
-     * exist.
-     * - KErrKeyUsage If the key doesn't have sign usage.
-     * - KErrKeyValidity If the key is not currently valid.
-     * - KErrKeySize If the key length is too small.
-     * - KErrKeyAccess If an invalid combination of key access
-     * flags were specified.
-     * 
-	 * @capability Requires the caller to have the capabilities
-	 * specified in the key use security policy.
-	 */
-	virtual void Sign(	const TCTTokenObjectHandle& /*aHandle*/,
-                        const TDesC8& /*aPlainText*/,
-	                    CryptoSpi::CCryptoParams*& /*aSignature*/,
-	                    TRequestStatus& aStatus)
-		{
-		TRequestStatus* status = &aStatus;
-		User::RequestComplete(status,KErrNotSupported);
-		}
-	
-#endif /* SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT */
-
 	};
 
 
--- a/cryptomgmtlibs/cryptotokenfw/source/ctframework/doxygen_docs/Key_management_index.dox	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,5 +0,0 @@
-/**
-
-@page mainpage_key_management Key Management
-
-*/
\ No newline at end of file
--- a/cryptomgmtlibs/securitydocs/Security_Glossary.html	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,718 +0,0 @@
-<HTML>
-<HEAD>
-<TITLE>Security Glossary</TITLE>
-</HEAD>
-<BODY>
-
-<H1><CENTER><b>Security Glossary</b></CENTER></H1>
-
-<P><center><TABLE WIDTH="90%" BORDER="1" CELLSPACING="1" CELLPADDING="2"><TR
-HEIGHT=0>
-<TD WIDTH="25%"></TD><TD WIDTH="75%"></TD></TD>
-</TR>
-
-<TR>
-<TD>
-Security Classification
-</td>
-<td>
-Internal
-</td>
-</tr>
-
-<TR>
-<TD>
-Document Reference
-</td>
-<td>
-SGL.GT0128.56
-</td>
-</tr>
-
-<TR>
-<TD>
-Status
-</td>
-<td>
-Draftversion
-</td>
-</tr>
-
-<TR>
-<TD>
-Version
-</td>
-<td>
-0.1
-</td>
-</tr>
-	
-<TR>
-<TD>
-Team/Department
-</td>
-<td>
-Security Team
-</td>
-</tr>
-
-<TR>
-<TD>
-Author
-</td>
-<td>
-William Bamberg
-</td>
-</tr>
-
-<TR>
-<TD>
-Owner
-</td>
-<td>
-Security Team
-</td>
-</tr>
-
-<TR HEIGHT=0><TD WIDTH="35%"></TD><TD
-WIDTH="65%"></TD></TR></TABLE></P></center>
-
-<P><center><TABLE WIDTH="90%" BORDER="1" CELLSPACING="1" CELLPADDING="2"><TR
-HEIGHT=0>
-<TD WIDTH="25%"></TD><TD WIDTH="75%"></TD></TD>
-</TR>
-
-<TR>
-<TD>
-<A name="Asymmetric Cryptography"></A>Asymmetric Cryptography
-</td>
-<td>
-A form of cryptography in which the 'key' is generated as a key pair: if one key is used for encryption
-only the other can be used to decrypt, and vice versa.
-<p>
-Using asymmetric cryptography, the problem of key distribution becomes one of authentication; i.e. how to make sure
-that a given key really does belong to the entity that claims to own it.
-</td>
-</tr>
-
-<TR>
-<TD>
-Attribute Certificate
-</td>
-<td>
-A digitally signed data structure including at least an identifier for an individual entity 
-and a set of attributes, whose function is to bind the entity with the attributes, usually for the
-purpose of authorisation.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Authentication"></A>Authentication
-</td>
-<td>
-Usually used to refer to a property of a communication; that the receiver of a message is able to ascertain its origin,
-so an attacker cannot successfully impersonate the sender.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Block Cipher"></A>Block Cipher
-</td>
-<td>
-A class of <A HREF="#Symmetric Cryptography">symmetric algorithm</A> in which several bits of the input data 
-are encrypted at once in a fixed-size block. 
-The cipher and its mode of operation define the block size: 
-the plaintext is split up into appropriately-sized blocks and each block is fed into the cipher. 
-</td>
-</tr>
-
-<TR>
-<TD>
-CA Certificate
-</td>
-<td>
-A certificate held by a <A HREF="#Certification Authority">CA</A>: the key pair associated with it is used for 
-signing certificates issued by that CA. May or may not be self-signed.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Certificate"></A>Certificate
-</td>
-<td>
-For our purposes, this is the same thing as a <A HREF="#Public Key Certificate">
-public key certificate</A>
-</td>
-</tr>
-
-<TR>
-<TD><A name="Certification Authority"></A>Certification Authority (CA)
-</td>
-<td>
-An organization which perform the following functions in a hierachical <A HREF="#Public Key Infrastructure">PKI</A>:
-<ul>
-<li>
-providing trusted ‘root’ certificates to users (<A HREF="#End Entities">End Entities</A>), by 
-supplying them with the CA’s public key via out-of-band means.
-</li>
-<li>
-certifying End Entities by generating and distributing certificates for them. 
-The certified EE is the subject of the certificate: the CA is the issuer.
-</li>
-<li>
-supporting certificate <A HREF="#Revocation">revocation</A> and revocation checking: if an EE suspects that their key has 
-been compromised, they contact the CA which issued it, who should revoke their certificate.
-</li>
-</ul>
-<p>A CA will always have a root certificate-signing key pair, which must be authenticated to End Entities via
-out of band channels. This key pair is not logically certified by anything, but it is usually distributed inside 
-a <A HREF="#Self-signed Certificate">self-signed certificate</A> to afford some degree of <A HREF="#Tamper Evidency">tamper evidency</A>. 
-<p>However, CAs do not have to use their root key pair to issue certificates directly to End Entities. For organizational 
-reasons and to reduce the exposure of keys, a CA may have a single root signing key pair, which it uses to certify a 
-set of subordinate key pairs, which in turn are used to certify End Entities. Also, CAs may certify the 
-signing keys of other CAs by issuing <A HREF="#Cross Certificate">cross certificates</A>, which enable interoperation 
-between two distinct PKIs.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Ciphertext"></A>Ciphertext
-</td>
-<td>
-The output of an <A HREF="#Encryption">encryption</A> operation, or 
-the input to a <A HREF="#Decryption">decryption</A> operation.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Client Authentication"></A>Client Authentication
-</td>
-<td>
-In a secure client-server protocol such as <A HREF="#Transport Layer Security">TLS</A>, the process in which the client
-<A HREF="#Authentication">authenticates</A> itself to the server, so the server knows who it's talking to.
-</td>
-</tr>
-
-<TR>
-<TD>
-Client/User/End Entity Certificate
-</td>
-<td>
-A <A HREF="#Certificate">certificate</A> issued by a <A HREF="#Certification Authority">CA</A> to an 
-<A HREF="#End Entity">end entity</A> (for example the user of a WID) who may use it 
-to demonstrate their ownership of the key pair associated with it
-</td>
-</tr>
-
-
-<TR>
-<TD>
-<A name="Cross Certificate"></A>Cross Certificate
-</td>
-<td>
-A <A HREF="#Certificate">certificate</A> issued by a <A HREF="#Certification Authority">CA</A> which certificates another
-CA's <A HREF="#Root Certificate">root certificate</A>. This is way of uniting two distinct certification hierarchies. 
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Decryption"></A>Decryption
-</td>
-<td>
-The process of turning encrypted data (called ciphertext) into the original information (called plaintext)
-using a cryptographic algorithm parameterised with a key.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Digital Signature"></A>Digital Signature
-</td>
-<td>
-A structure linking some data and a private key. A digital signature may be generated by the application of a 
-<A HREF="#Private Key">private key</A> to some piece of data. The original data 
-may be reconstructed by applying the corresponding public key, demonstrating that the signature could only have been generated by 
-someone with access to the private key. 
-<p>Digital signatures have two primary uses: to demonstrate someone's identity by signing some challenge, as in 
-<A HREF="#Client Authentication">client authentication</A> in <A HREF="#Transport Layer Security">TLS</A>, in which the client 
-signs a <A HREF="#Hash">hash</A> of the messages that have been exchanged, and more strongly, for someone to demonstrate their
-acceptance of some human-processable information (e.g. 'Please withdraw £10 000 from my bank account') as in the
-<A HREF="#WMLScript Crypto API">WMLScript Crypto API</A> <A HREF="#SignText">SignText</A> function.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="DSA"></A>Digital Signature Algorithm (DSA)
-</td>
-<td>
-NIST-approved <A HREF="#Asymmetric Cryptography">asymmetric algorithm</A>. It can only be used for generating and
-verifying <A HREF="#Digital Signature">digital signatures</A>, not for encryption. 
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="ECC"></A>Elliptic Curve Cryptography (ECC)
-</td>
-<td>
-Elliptical curve cryptography (ECC) is an <A HREF="#Asymmetric Cryptography">asymmetric algorithm</A>
- based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys. 
-Because ECC helps to establish equivalent security with lower computing power and battery resource usage, 
-it is becoming widely used for mobile applications.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Encryption"></A>Encryption
-</td>
-<td>
-The process of turning meaningful data (called plaintext) into meaningless gibberish (called ciphertext)
-using a cryptographic algorithm parameterised with a key.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="End Entity"></A>End Entity
-</td>
-<td>
-A leaf node in a certification hierarchy: any entity in a <A HREF="#Public Key Infrastructure">PKI</A>
-which has a certificate, but is not allowed to issue its own certificates.
-</td>
-</tr>
-
-
-<TR>
-<TD>
-<A name="Hash"></A>Hash
-</td>
-<td>
-Hash algorithms take a variable-length input and produce a fixed length output known as a digest, or hash, of the input. 
-For cryptographic purposes they need to be one-way functions: 
-it should not be possible to deduce the input from the digest, or even any part of the input.
- Also, it should be hard to find collisions: that is, two different inputs which produce the same output.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="HMAC"></A>HMAC
-</td>
-<td>
-Keyed-Hashing for Message Authentication. A mechanism for message authentication using cryptographic 
-<A HREF="#Hash">hashes</A>. It can be used with any iterative cryptographic 
-hash function, e.g., <A HREF="#MD5">MD5</A>, <A HREF="#SHA-1">SHA-1</A>, in combination with a secret shared key.  
-The cryptographic strength of HMAC depends on the properties of the underlying hash function.
-</td>
-</tr>
-
-<TR>
-<TD>
-ICC
-</td>
-<td>
-Integrated Circuit Card: removable card with at least data storage and sometimes processing 
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="IPSec"></A>IPSec
-</td>
-<td>
-A standard providing <A HREF="#Secrecy">secrecy</A> and <A HREF="#Authentication">authentication</A> at the network or 
-packet-processing layer of network communication. Earlier security approaches have inserted security at the 
-application layer of the communications model. IPsec will be especially useful for implementing virtual 
-private networks and for remote user access through dial-up connection to private networks. IPSec is mandatory in IPv6.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="MD2"></A>MD2
-</td>
-<td>
-Legacy <A HREF="#Hash">hash algorithm</A>. Considered insecure.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="MD5"></A>MD5
-</td>
-<td>
-Legacy <A HREF="#Hash">hash algorithm</A>. Considered vulnerable.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Message Digest Algorithm"></A>Message Digest Algorithm
-</td>
-<td>
-Same thing as a <A HREF="#Hash">hash algorithm</A>.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Nonrepudiation"></A>Nonrepudiation
-</td>
-<td>
-The process by which it is assured that an entity making a declaration cannot subsequently deny having made it: 
-so I can't claim that I never wrote that cheque. 
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="OCSP"></A>Online Certificate Status Protocol (OCSP)
-</td>
-<td>
-A protocol enabling a <A HREF="#Relying Party">relying party</A> to check that a 
-<A HREF="#Certificate">certificate</A> has not been <A HREF="#Revocation">revoked</A>. In this protocol the OCSP client 
-asks the OCSP server about the status of one or more certificates, and receives a 
-<A HREF="#Digital Signature">digitally signed</A> response. 
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Out Of Band"></A>Out Of Band
-</td>
-<td>
-A channel of communication which is distinct from the channel which we are using cryptography to try to secure,
-and which is secure on its own terms; that is, its security is not dependent on the cryptography we are using.
-<p>A common example of an out of band channel is a motorcycle courier. 
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Padding"></A>Padding
-</td>
-<td>
-The process of adding bytes to the input to a <A HREF="#Block Cipher">block cipher</A> so that the input matches the
-block size.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Plaintext"></A>Plaintext
-</td>
-<td>
-The output of an <A HREF="#Decryption">decryption</A> operation, or 
-the input to a <A HREF="#Encryption">encryption</A> operation.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="PGP"></A>Pretty Good Privacy (PGP)
-</td>
-<td>
-A very widely-used <A HREF="#Encryption">encryption</A> and <A HREF="#Digital Signature">digital signing</A>
-program.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Private Key"></A>Private Key
-</td>
-<td>
-In the context of <A HREF="#Public Key Cryptography">public key cryptography</A>, the private half of the key pair.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Public Key"></A>Public Key
-</td>
-<td>
-In the context of <A HREF="#Public Key Cryptography">public key cryptography</A>, the public half of the key pair.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Public Key Certificate"></A>Public Key Certificate
-</td>
-<td>
-A digitally signed structure including at least an identifier for an 
-individual entity and a public key, whose function is to bind the entity with the key.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Public Key Cryptography"></A>Public Key Cryptography
-</td>
-<td>
-A common application of <A HREF="#Asymmetric Cryptography">asymmetric cryptography</A> in which one half of the key pair is
-kept secrect (the <A HREF="#Private Key">private key</A>) and the other half is published 
-(the <A HREF="#Public Key">public key</A>.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Public Key Infrastructure"></A>Public Key Infrastructure
-</td>
-<td>
-
-<p>A way of modelling real-world trust relationships which enables users of <A HREF="#Public Key Cryptography">public key cryptography</A> 
-to have confidence in the ownership of
-the public keys they are using.  
-
-A PKI consists of:
-<ul>
-<li>
-a <A HREF="#Trusted Third Party">trusted third party</a> 
-</li>
-<li>
-an <A HREF="#Out Of Band">out of band</A>  means of distributing the TTP's <A HREF="#Public Key Certificate">public key certificate</A> 
-to <A HREF="#Relying Party">relying parties</a>
-</li>
-<li>
-a means of distributing other certificates to relying parties
-</li>
-<li>
-arrangements for the <A HREF="#Revocation">revocation</A> and renewal of these certificates
-</li>
-<li>
-certificate management and validation software on the relying party's computer
-</li>
-</ul>
-<p>The TTP uses its signing key pair to create certificates for other entities, which relying parties can use to authenticate these
-other entities.
-<p>We can classify PKIs according to whether they are hierachical or flat. In hierachical PKIs, such as the one defined in the <A HREF="#PKIX">PKIX</A> 
-set of standards, there is a distinction between users of the PKI such as <A HREF="#End Entity">End Entities</A> and 
-<A HREF="#Relying Party">Relying Parties</A>, and entities responsible for issuing and distributing certificates such as 
-<A HREF="#Certification Authority">CAs</A> and <A HREF="#Registration Authority">RAs</A>. In a flat PKI such as the 
-<A HREF="#Web of Trust">web of trust</A> underpinning <A HREF="#Pretty Good Privacy">PGP</A>, there are no entities whose
-sole role is to issue certificates; instead users of the PKI certify each other.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Registration Authority"></A>Registration Authority
-</td>
-<td>
-An organization responsible for registering new certificate users in a 
-<A HREF="#Public Key Infrastructure">PKI</A>, e.g. by gathering and verifying information which identifies the 
-certificate applicant.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Revocation"></A>Revocation
-</td>
-<td>
-The term used for asserting that a certificate is no longer valid: for example, because the private key 
-associated with it has been compromised.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Relying Party"></A>Relying Party
-</td>
-<td>
-An entity who relies on the authenticity of a <A HREF="#Public Key">public key</a>.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Root Certificate"></A>Root Certificate
-</td>
-<td>
-The certificate of a <A HREF="#Trusted Third Party">trusted third party</a>.  
-A certificate directly trusted by a <A HREF="#Relying Party">relying party</A>: that is, trust in it is not 
-established by cryptographic means, but trust in it is the prerequisite for establishing trust in the entity 
-which the relying party is trying to authenticate. 
-Trust in a root certificate must be established through <A HREF="#Out Of Band">out of band</A> means. A root certificate may or may not be self signed.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Secrecy"></A>Secrecy
-</td>
-<td>
-This means that access to information is controlled: for example, it means that two entities 
-(e.g. people, machines, processes) are able to communicate with one another without any other entities 
-being able to access the information communicated, or that an entity may store some information and be 
-assured that only this entity will be able to access it. 
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="SHA-1"></A>Secure Hash Algorithm 1(SHA-1)
-</td>
-<td>
-A widely used <A HREF="#Hash">hash algorithm</a>, producing a 160-bit digest.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="SSL"></A>Secure Sockets Layer (SSL)
-</td>
-<td>
-Precursor to <A HREF="#Transport Layer Security">TLS</a>. SSL has been through three versions:
-the first two are considered insecure, and the third is almost identical to TLS. 
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Server Authentication"></A>Server Authentication
-</td>
-<td>
-In a secure client-server protocol such as <A HREF="#Transport Layer Security">TLS</A>, the process in which the server
-<A HREF="#Authentication">authenticates</A> itself to the client, so the client knows who it's talking to.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="SignText"></A>SignText
-</td>
-<td>
-A function defined in the <A HREF="#WMLScript Crypto API">WMLScript Crypto API</A> which provides application-level
-<A HREF="#Authentication">Authentication</A> and <A HREF="#Nonrepudiation">Nonrepudiation</A> for transactions.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Stream Cipher"></A>Stream Cipher
-</td>
-<td>
-A class of <A HREF="#Symmetric Cryptography">symmetric algorithm</A> which is initialised with a key,
-then outputs a stream of pseudorandom bits. 
-This 'keystream' is typically XOR-ed with the plaintext to generate the ciphertext. 
-So they encrypt a bit of plaintext at a time.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Symmetric Cryptography"></A>Symmetric Cryptography
-</td>
-<td>
-A form of cryptography in which the same key is used for encryption and decryption
-<p>
-Symmetric cryptography is fast, but suffers from the problem of how to distribute the key privately.
-<A HREF="#Asymmetric Cryptography">Asymmetric cryptography</a> is an attempt to alleviate the key
-distribution problem, by reducing the requirement for the distributed key from one of privacy to one of
-authentication.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Transport Layer Security"></A>Transport Layer Security (TLS)
-</td>
-<td>
-A client-server security protocol providing <A HREF="#Secrecy">secrecy</a> and optionally <A HREF="#Authentication">authentication</a>, and 
-running over TCP/IP. 
-<p>In this protocol a client connects to a server; the two then perform a handshake in which they exchange a 
-<A HREF="#Symmetric Cryptography">symmetric</a> key by using <A HREF="#Asymmetric Cryptography">asymmetric cryptography</a>, 
-which is then used to encrypt their communications, providing the secrecy element. 
-<p>Without the authentication element secrecy is not very useful; although only client and server can understand the data 
-exchanged, the client doesn't know who the server is or vice versa. TLS provides the capability for 
-<A HREF="#Server Authentication">server authentication</a>, in which the client establishes who the server is, and 
-<A HREF="#Client Authentication">client authentication</a> in which the server establishes who the client is. 
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Trusted Third Party"></A>Trusted Third Party (TTP)
-</td>
-<td>
-An entity whose public key is known to a <A HREF="#Relying Party">relying party</a> due to its having been 
-received via <A HREF="#Out Of Band">out of band</A> means, and which is trusted to issue <A HREF="#Public Key Certificate">
-public key certificates</A> for other entities not directly known to the relying party.
-<p>A  <A HREF="#Certification Authority">CA</a> is a type of TTP.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="Web of Trust"></A>Web of Trust
-</td>
-<td>
-The set of social relationships between users of <A HREF="#PGP">PGP</a> that enables them to sign each others' keys, 
-essentially providing a <A HREF="#PKI">PKI</a> for this technology.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="WMLScript Crypto API"></A>WMLScript Crypto API
-</td>
-<td>
-A WAP Forum standard which defines cryptographic functions in WML, the scripting language used in WAP. 
-It defines a function for creating signed objects called <A HREF="#SignText">SignText</a>
-</td>
-</tr>
-
-
-<TR>
-<TD>
-<A name="WTLS"></A>WTLS
-</td>
-<td>
-A client-server security protocol providing <A HREF="#Secrecy">secrecy</a> and optionally <A HREF="#Authentication">authentication</a>, 
-running at the transport layer of the WAP stack. WTLS is closely modelled on <A HREF="#Transport Layer Security">TLS</a>, 
-and defines its own lightweight <A HREF="#Public Key Certificate">certificate</a> format.
-</td>
-</tr>
-
-<TR>
-<TD>
-<A name="X.509 Certificate"></A>X.509 Certificate
-</td>
-<td>
-A widely used type of <A HREF="#Public Key Certificate">public key certificates</A>, part of the
-now largely moribund X.500 series of standards.
-</td>
-</tr>
-
-<!--
-<TR><TD><A HREF="/rfc2459">RFC 2459</a></td>
-<td>PKIX Certificate and CRL Profile<br>
-<b>This RFC is being updated by two new Internet draftversions,
-<a href="/draftversion-ietf-pkix-new-part1">draftversion-ietf-pkix-new-part1</a>
-and <a href="/draftversion-ietf-pkix-ipki-pkalgs">draftversion-ietf-pkix-ipki-pkalgs</a>.</b>
-</td>
-</tr>
--->
-
-<!--
-<TR><TD><A
-HREF="/draftversion-ramsdell-role-names">draftversion-ramsdell-role-names</A></TD><TD>Role
-Names in X.509 Certificates</TD>
-<TD>Expired</TD></TR>
--->
-
-<TR HEIGHT=0><TD WIDTH="35%"></TD><TD
-WIDTH="65%"></TD></TR></TABLE></P></center>
-
-</BODY></HTML>
--- a/cryptomgmtlibs/securitydocs/building-certstore.txt	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,71 +0,0 @@
-Title:        Building Certificate Store
-Owner:        Gleb Dolgich
-Contributors: Xavier Leclercq, Gleb Dolgich
-Copyright (C) 2003 Symbian Limited. All rights reserved.
-================================================================================
-
-Purpose
--------
-
-This document describes how to build CACerts.dat (certificate store) and
-certclients.dat (certificate client applications) files. These files are stored
-on a device in c:\system\data\ directory. They are necessary for Software
-Install and SSL/TLS.
-
-Certificates and trusters
--------------------------
-
-Every certificate stored in CACerts.dat has a set of UIDs associated with it,
-each UID marking the certificate as good for a particular purpose (application).
-Currently the following applications/UIDs are defined:
-
-- SW Install (268452523, or 0x100042AB)--certificate is suitable for software
-  install (SIS files);
-- SW Install OCSP Signing (268478646, or 0x1000A8B6)--certificate is suitable
-  for OCSP checking (SIS files);
-- MIDlet Installation (270506792, or 0x101F9B28)--certificate is good for Java
-  MIDlet installation, which includes OCSP checking;
-- Server Authentication (268441661, or 0x1000183D)--certificate is suitable for
-  SSL/TLS server authentication.
-
-These UIDs are stored in certclients.dat file. Once certclients.dat is in
-c:\system\data on the device, the Certificates Control Panel applet allows
-manual assignment of applications to each certificate.
-
-Files needed
-------------
-
-The following files are needed to build a certificate store:
-
-- T_CERTSTORE.EXE test harness, which is located in security/certman/tcertstore;
-  build it from security/certman/group;
-- bldcertstore.txt: test script located in security/certman/tcertstore/scripts;
-  you can modify it depending on which certificates/applications you want
-  included in the store. This script is exported into device's
-  c:\tcertstore\scripts.
-
-The following certificates are used for running tests:
-
-- cacert.crt "TestCA"--SSL server CA certificate (self-signed)
-- thawtetest.crt "Thawte Root"--SW Install certificate
-- TOCSP-Root5-RSA.cer--SW Install and MIDlet Installation
-- TOCSP-Signing5-RSA.cer--OCSP Signing
-
-These certificates are copied into c:\tappinst\certs\ directory on the device.
-
-Building the store
-------------------
-
-To build a certificate store, perform the following steps:
-
-1. Build the T_CERTSTORE test harness and export test files for appinst and
-   certman.
-
-2. Go to the appropriate build directory (udeb or urel) and run the following
-   command:
-   
-   t_certstore c:\tcertman\scripts\bldcertstore.txt c:\bldcertstore.log
-   
-   This will build c:\system\data\cacerts.dat and c:\system\data\certclients.dat
-   with test certificates. If you need to add your own certificates, modify the
-   bldcertstore.txt script accordingly.
--- a/cryptomgmtlibs/securitydocs/building-swicertstore.txt	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,73 +0,0 @@
-swicertstoretool
-================
-
-swicertstoretool is a tool for creating the SWI cert store data file containing
-the root certificates used by software install.  
-
-Command syntax
---------------
-
-The syntax of the command is:
-
-swicertstoretool INPUT_FILE OUTPUT_FILE LOG_FILE
-
-INPUT_FILE is a text file describing the certificates to be put in the store.
-The format is described below.
-
-OUTPUT_FILE is where the cert store data file is written.  This will need to be
-copied to where the SWI cert store expects to find it,
-z:\resource\swicertstore.dat.
-
-LOG_FILE names a file that information is logged to when the command is run.
-This should be checked afterwards to see if the command succeeded.  Errors are
-indicated by lines starting with "***".
-
-Input file format
------------------
-
-The input file is in "ini" format.  Each section describes a certificate to be
-put in the store, with the section name taken as the certificate label.
-
-The following parameters can be specified for each certificate:
-
-Name			Description
---------------------------------------------------------------------------------
-file			The name of the file containing the DER encoded certificate. 
-				This field must be present.
-
-mandatory		Whether the certificate is marked as mandatory for software
-				install. The value must be either "0" or "1".  The field is
-				optional - if it is not present the default is "0".
-
-capability		The name of a capability that the certificate can sign for.
-				This field can be repeated to allow multiple capabilities to be
-				specified.  Allowed capabilities are:
-
-					TCB
-					CommDD
-					PowerMgmt
-					MultimediaDD
-					ReadDeviceData
-					WriteDeviceData
-					DRM
-					TrustedUI
-					ProtServ
-					DiskAdmin
-					NetworkControl
-					AllFiles
-					SwEvent
-					NetworkServices
-					LocalServices
-					ReadUserData
-					WriteUserData
-					Location
-
-application		The name of an application that the certificate can be used for.
-				This can be repeated, but it must appear at least once.  Allowed
-				applications are:
-
-					SWInstall		(Software install)
-					SWInstallOCSP	(Software install OCSP signing)
---------------------------------------------------------------------------------
-
-An example input file can be found in this directory.
--- a/cryptomgmtlibs/securitydocs/doxygen_docs/Security_API_migration_guide.dox	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,5 +0,0 @@
-/**
-@page api_migration_guide API migration guide
-
-
-*/
\ No newline at end of file
--- a/cryptomgmtlibs/securitydocs/doxygen_docs/Security_MainPage_index.dox	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,31 +0,0 @@
-/**
-@mainpage Security on Symbian OS
-
-The Security sub-system comprises:
-
-- @ref mainpage_certman
-- @ref mainpage_caf
-- @ref mainpage_caf2
-- @ref mainpage_cryptography
-- @ref mainpage_tokenframework
-- @ref mainpage_key_management
-- @ref mainpage_pbe
-- @ref mainpage_SWI
-
-<hr>
-
-Security on Symbian OS enables data confidentiality, integrity and @ref authentication; secure comms protocols 
-(for example, @ref SSL, @ref TLS, @ref WTLS, @ref IPSec, @ref SMIME "S/MIME"); and technology to support application 
-signing. It provides APIs for standard cryptography and @ref hash algorithms, key generation, 
-certificate management, and random number generation.
-
-@ref Security_intro provides a quick basic overview on Public Key Cryptography, Certificates, and Digital Signatures, 
-that Security APIs support. However, for detailed explanations refer to any of the standard security books available 
-(for example, Applied Cryptography by Bruce Schneier).
-
-For an overview of how the various security components are structured in the Symbian OS, see @ref Security_arch_overview.
-
-- @ref api_migration_guide
-- @ref security_glossary
-
-*/
--- a/cryptomgmtlibs/securitydocs/doxygen_docs/Security_architecture.dox	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,30 +0,0 @@
-/**
-@page Security_arch_overview Symbian OS Security Architecture Overview
-\n
-
-The Symbian OS security architecture fundamentally consists of two high level components:
-
-@li Certificate management (certman)
-
-@li Cryptography (cryptalg)
-
-Together these modules/components form the basis of a number of higher level components, which include:
-
-@li Certificate management control panel item (UI to certificate management allowing control of trusted root certificates)
-
-@li Software installation (@ref authentication / @ref digital_signature "digital signatures")
-
-@li Secure comms (@ref SSL / @ref TLS, @ref WTLS, @ref IPSec, etc.)
-
-<hr>
-
-\b Diagrams
-
-The following diagrams show the:
-
-@li @ref Security_arch_pre-v8	"Security architecture: pre-v8.0"
-@li @ref Security_arch_v8		"Security architecture: v8.0 showing component dependencies"
-@li @ref Security_arch_v8_dll	"Security architecture: v8.0 showing individual DLL dependencies"
-
-
-*/
Binary file cryptomgmtlibs/securitydocs/doxygen_docs/Security_architecture.gif has changed
Binary file cryptomgmtlibs/securitydocs/doxygen_docs/Security_architecture.vsd has changed
--- a/cryptomgmtlibs/securitydocs/doxygen_docs/Security_architecture_diagram_pre-v8.0.dox	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,11 +0,0 @@
-/**
-@page Security_arch_pre-v8 Symbian OS pre-v8.0 Security Architecture Diagram
-\n
-
-
-The diagram below shows the Security architecture before v8.0
-
-@image html Security_architecture.gif 
-
-
-*/
\ No newline at end of file
--- a/cryptomgmtlibs/securitydocs/doxygen_docs/Security_architecture_diagram_v8.0.dox	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,8 +0,0 @@
-/**
-@page Security_arch_v8 Symbian OS v8.0 Security Architecture Diagram
-\n
-
-@image html Security_architecture_v8.0.gif
-
-
-*/
\ No newline at end of file
--- a/cryptomgmtlibs/securitydocs/doxygen_docs/Security_architecture_diagram_v8.0_dll.dox	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,9 +0,0 @@
-/**
-@page Security_arch_v8_dll Symbian OS v8.0 Security Architecture Diagram
-\n
-
-@image html Security_architecture_v8.0_dep.gif
-
-
-
-*/
\ No newline at end of file
Binary file cryptomgmtlibs/securitydocs/doxygen_docs/Security_architecture_v8.0.gif has changed
Binary file cryptomgmtlibs/securitydocs/doxygen_docs/Security_architecture_v8.0_dep.gif has changed
Binary file cryptomgmtlibs/securitydocs/doxygen_docs/Security_architecture_v8.0_dep.vsd has changed
--- a/cryptomgmtlibs/securitydocs/doxygen_docs/Security_glossary.dox	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,615 +0,0 @@
-/**
-@page security_glossary Security glossary
-\n
-A glossary of security terms (mostly non-Symbian specific).
-\n\n
-@ref A, @ref B, @ref C, @ref D, @ref E, @ref F, @ref G, @ref H, @ref I, @ref J, @ref K, @ref L, @ref M, @ref N, @ref O, 
-@ref P, @ref Q, @ref R, @ref S, @ref T, @ref U, @ref V, @ref W, @ref X, @ref Y, @ref Z
-\n @anchor A \n
-
-<table>
-
-<tr><td><b>A</b></td><td></td></tr>
-
-<tr><td>@anchor AES AES</td>
-	<td>Advanced Encryption Standard -- The new conventional symmetric @ref block_cipher "block cipher" chosen by NIST as a 
-	replacement for @ref DES. It can process 128-bit data blocks using 
-	cipher keys with lengths of 128, 192, or 256 bits.</td></tr>
-
-<tr><td>@anchor ASN ASN.1</td>
-	<td>Abstract Syntax Notation 1 (See: <A HREF="http://asn1.elibel.tm.fr/en/introduction/index.htm">ASN.1</A>, 
-	ISO/IEC 8824, and ISO/IEC 8825.) -- A data specification meta-language widely used in @ref public_key_cryptography "public key cryptography" 
-	standards. (Also of interest: <A HREF="ftp://ftp.rsasecurity.com/pub/pkcs/doc/layman.doc">A Layman's Guide to 
-	a Subset of ASN.1, BER, and DER</A>.)</td></tr>
-	
-<tr><td>@anchor asymmetric @anchor Asymmetric Asymmetric Cryptography</td>
-	<td>A form of cryptography in which the 'key' is generated as a key pair: if one key is used for @ref encryption only the 
-	other can be used to decrypt, and vice versa. \n\n
-	Using asymmetric cryptography, the problem of key distribution becomes one of @ref authentication; i.e. how to make sure 
-	that a given key really does belong to the entity that claims to own it. See:
-	@li @ref asymmetric_cryptography
-	@li @ref SS_Cryptalg_asymmetric_ciphers.</td></tr>
-
-<tr><td>@anchor attribute_cert Attribute Certificate</td>
-	<td>A digitally signed data structure including at least an identifier for an individual entity and a set of 
-	attributes, whose function is to bind the entity with the attributes, usually for the purpose of authorisation. 
-	</td></tr>
-
-<tr><td>@anchor authentication @anchor Authentication Authentication</td>
-	<td>Usually used to refer to a property of a communication; that the receiver of a message is able to ascertain its 
-	origin, so an attacker cannot successfully impersonate the sender. </td></tr>
-
-
-
-</table>\n @anchor B \n<table>
-
-<tr><td><b>B</b></td><td></td></tr>
-
-<tr><td>@anchor BER BER</td>
-	<td>Basic Encoding Rules for @ref ASN "ASN.1", as defined in X.690. (Also of interest: 
-	<A HREF="ftp://ftp.rsasecurity.com/pub/pkcs/doc/layman.doc">A Layman's Guide to a Subset of ASN.1, BER, and DER</A>.)
-	</td></tr>
-	
-<tr><td>@anchor block_cipher Block Cipher</td>
-	<td>A class of symmetric algorithm in which several bits of the input data are encrypted at once in a fixed-size 
-	block. The cipher and its mode of operation define the block size: the @ref plaintext is split up into appropriately-sized 
-	blocks and each block is fed into the cipher. </td></tr>
-	
-	
-	
-</table>\n @anchor C \n<table>
-	
-<tr><td><b>C</b></td><td></td></tr>
-
-<tr><td>@anchor CA CA</td>
-	<td>Certification Authority -- An organisation that performs the following functions in a hierachical @ref PKI: 
-	@li	providing trusted @ref root_certificate "'root' certificates" to users (@ref EE "End Entities"), by supplying them with the CA's @ref public_key "public key" via 
-		out-of-band means. 
-	@li certifying End Entities (@ref EE "EE"s) by generating and distributing certificates for them. The certified @ref EE is the 
-		subject of the @ref certificate; the CA is the issuer. The CA validates the certificate holder's identity and 'signs' 
-		the @ref certificate so that it cannot be tampered with or forged. The @ref certificate issued by the CA binds a particular 
-		@ref public_key "public key" to the name of the @ref EE the @ref certificate identifies.
-	@li supporting certificate revocation and revocation checking: if an @ref EE suspects that their key has been compromised, 
-		they can contact the CA that issued it, who will then revoke their @ref certificate.
-	 
-	A CA will always have a root certificate-signing key pair that must be authenticated to End Entities via @ref out_of_band "out of band"
-	channels. This key pair is not logically certified by anything, but it is usually distributed inside a self-signed 
-	@ref certificate to afford some degree of tamper evidency. \n\n
-	However, CAs do not have to use their root key pair to issue certificates directly to End Entities. For organizational 
-	reasons and to reduce the exposure of keys, a CA may have a single root signing key pair, which it uses to certify a 
-	set of subordinate key pairs that in turn are used to certify End Entities. Also, CAs may certify the signing keys 
-	of other CAs by issuing cross certificates, which enable interoperation between two distinct @ref PKI "PKI"s.</td></tr>
-
-<tr><td>@anchor CA_certificate CA Certificate 
-	<td>A @ref certificate held by a @ref CA: the key pair associated with it is used for signing certificates issued by that 
-	@ref CA. May or may not be self-signed.</td></tr>
-
-<tr><td>@anchor CBC CBC</td>
-	<td>Cipher Block Chaining -- A cryptographic mode for @ref block_cipher "block ciphers". It is an @ref encryption method that protects 
-	against block replay attacks by making the encryption of a cipher block dependent on all blocks that precede it. 
-	Before it is encrypted, the @ref plaintext is XORed with the previous @ref ciphertext block (which has been stored in a 
-	feedback register). After the encryption, the resulting ciphertext is again stored in the feedback register, to 
-	be XORed with the next plaintext block, and so on until the end of the message.</td></tr>
-
-<tr><td>@anchor certificate @anchor certificates Certificate</td>
-	<td>For our purposes, this is the same thing as a @ref public_key_certificate "public key certificate".</td></tr>
-
-<tr><td>@anchor ciphermode Ciphermode</td>
-	<td> description</td></tr>
-
-<tr><td>@anchor ciphertext Ciphertext</td>
-	<td>The output of an @ref encryption operation, or the input to a @ref decryption operation.</td></tr>
-
-<tr><td>@anchor CLDC CLDC</td>
-	<td><A HREF="http://java.sun.com/products/cldc/">J2ME Connected Limited Device Configuration</A> -- Serves the market consisting of personal, mobile, and 
-	connected information devices. This configuration includes some new classes designed specifically to fit the 
-	needs of small-footprint devices.</td></tr>
-
-<tr><td>@anchor client_authentication Client Authentication</td>
-	<td>In a secure client-server protocol such as @ref TLS, the process in which the client authenticates itself to 
-	the server, so the server knows who it's talking to. \n See @ref WTLS_client_authentication "client authentication in WTLS". </td></tr>
-
-<tr><td>Client/User/End Entity Certificate</td>
-	<td>A @ref certificate issued by a @ref CA to an end entity, @ref EE, who may use it to demonstrate their 
-	ownership of the key pair associated with it.</td></tr>  
-
-<tr><td>@anchor CRL CRL</td>
-	<td>Certificate Revocation List -- A list of (identifiers for) @ref certificates that have been revoked by a 
-	particular @ref CA. The use of CRLs is for maintaining access to servers in a network, in a @ref PKI; in some cases, 
-	@ref OCSP has superseded CRL. See:
-	@li <A HREF="http://www.ietf.org/rfc/rfc2459.txt">RFC2459</A> 
-	-- Internet @ref X509 "X.509" @ref PKI Certificate and CRL Profile 
-	@li <A HREF="http://www.ietf.org/rfc/rfc3279.txt">RFC3279</A> 
-	-- Algorithms and Identifiers for the Internet @ref X509 "X.509" @ref PKI Certificate and Certificate Revocation List 
-	(@ref CRL) Profile
-	@li <A HREF="http://www.ietf.org/rfc/rfc3280.txt">RFC3280</A> 
-	-- Internet @ref X509 "X.509" @ref PKI Certificate and Certificate Revocation List (@ref CRL) Profile. 
-	</td></tr>
-
-<tr><td>@anchor cross_certificate Cross Certificate</td>
-	<td>A @ref certificate issued by a @ref CA which certificates another @ref CA's @ref root_certificate "root certificate". This is way of uniting two distinct 
-	certification hierarchies.</td></tr>  
-
-
-
-</table>\n @anchor D \n<table>
-
-<tr><td><b>D</b></td><td></td></tr>
-
-<tr><td>@anchor decryption Decryption</td>
-	<td>The process of turning encrypted data (called @ref ciphertext) into the original information (called 
-	@ref plaintext) using a cryptographic algorithm parameterised with a key.</td></tr>  
-
-<tr><td>@anchor DER DER</td>
-	<td>Distinguished Encoding Rules -- A set of rules for encoding @ref ASN "ASN.1" data structures as a byte stream, which 
-	has the property that any given @ref ASN "ASN.1" data structure will always encode to the same byte stream. DER is a 
-	subset of @ref BER. (Also of interest: 
-	<A HREF="ftp://ftp.rsasecurity.com/pub/pkcs/doc/layman.doc">A Layman's Guide to a Subset of ASN.1, BER, and DER</A>.)
-	</td></tr>
-	
-<tr><td>@anchor DES DES</td>
-	<td>Data Encryption Standard -- A symmetric @ref block_cipher "block cipher" (that is the U.S. and international standard) used for 
-	@ref encryption and @ref decryption. A 64-bit block cipher with a 56-bit key organized as 16 rounds of operations. </td></tr>
-	
-<tr><td>@anchor digital_signature Digital Signature</td>
-	<td>A structure linking some data and a @ref private_key "private key". A digital signature may be generated by the application of a 
-	private key to some piece of data. The original data may be reconstructed by applying the corresponding @ref public_key "public key", 
-	demonstrating that the signature could only have been generated by someone with access to the private key.\n\n
-	Digital signatures have two primary uses: to demonstrate someone's identity by signing some challenge, as in 
-	@ref client_authentication "client authentication" in @ref TLS, in which the client signs a @ref hash of the messages that have been exchanged; 
-	and more strongly, for someone to demonstrate their acceptance of some human-processable information (e.g. 
-	'Please withdraw £10,000 from my bank account') as in the @ref WMLScript Crypto API SignText function.\n\n
-	See: an introduction to @ref Security_signatures.</td></tr>
-	
-<tr><td>@anchor DN DN</td>
-	<td>Distinguished Name -- An @ref ASN "ASN.1" structure containing various attributes (name-value pairs) that together 
-	uniquely identify the entity for certification purposes. \n\n
-	The name used in @ref X509_certificate "X.509 certificates" is the X.500 Distinguished Name, which describes a path 
-	through an X.500 Directory Information Tree. Conventionally, a DN comprises <i> at least </i> three attributes: a user's 
-	name/ID (e.g., \c cn=Fred \c Bloggs), an organization name (e.g., \c o=Symbian \c UK \c Ltd), and a country designation 
-	(e.g., \c c=GB ).
-	</td></tr>
-	
-<tr><td>@anchor DSA DSA</td>
-	<td>Digital Signature Algorithm -- A NIST-approved @ref asymmetric algorithm. It can only be used for generating 
-	and verifying @ref digital_signature "digital signatures", not for @ref encryption. 
-	See: The <A HREF="http://www.itl.nist.gov/fipspubs/fip186.htm">Digital Signature Standard</A>.
-	</td></tr>
-
-
-
-</table>\n @anchor E \n<table>
-
-<tr><td><b>E</b></td><td></td></tr>
-
-<tr><td>@anchor ECB ECB</td>
-	<td>Electronic Codebook -- A cryptographic mode for @ref block_cipher "block ciphers". It is a mode that encrypts 
-	blocks of @ref plaintext to corresponding blocks of @ref ciphertext. Given use of the same key, a block of plaintext 
-	will always encrypt to the same block of ciphertext.</td></tr>
-
-<tr><td>@anchor ECC ECC</td>
-	<td>Elliptical Curve Cryptography -- An @ref asymmetric @ref encryption technique based on elliptic curve theory that 
-	can be used to create faster, smaller, and more efficient cryptographic keys.</td></tr>
-
-<tr><td>@anchor encryption Encryption</td>
-	<td>The process of turning meaningful data (called @ref plaintext) into meaningless gibberish (called @ref ciphertext)
-	using a cryptographic algorithm parameterised with a key.</td></tr>
-
-<tr><td>@anchor EE EE</td>
-	<td>End Entity -- A leaf node in a certification hierarchy: any entity in a @ref PKI which has a @ref certificate, but is
-	not allowed to issue its own certificates.</td></tr>
-
-
-
-</table>\n @anchor F \n<table>
-
-<tr><td><b>F</b></td><td></td></tr>
-
-
-
-</table>\n @anchor G \n<table>
-
-<tr><td><b>G</b></td><td></td></tr>
-
-
-
-</table>\n @anchor H \n<table>
-
-<tr><td><b>H</b></td><td></td></tr>
-
-<tr><td>@anchor hash Hash</td>
-	<td>Hash algorithms take a variable-length input and produce a fixed length output known as a digest, or hash, of the 
-	input. For cryptographic purposes they need to be one-way functions: it should not be possible to deduce the input 
-	from the digest, or even any part of the input. Also, it should be hard to find collisions: that is, two different 
-	inputs that produce the same output. See: 
-	@li @ref cryptographic_hash
-	@li @ref SS_Cryptalg_hash_algorithms.</td></tr>  
-
-<tr><td>@anchor HMAC HMAC</td>
-	<td>Keyed-Hashing for Message Authentication -- A mechanism for message @ref authentication using cryptographic hashes. It 
-	can be used with any iterative cryptographic @ref hash function, e.g., @ref MD5, @ref SHA "SHA-1", in combination with a secret 
-	shared key. The cryptographic strength of HMAC depends on the properties of the underlying @ref hash function.</td></tr>  
-
-
-
-</table>\n @anchor I \n<table>
-
-<tr><td><b>I</b></td><td></td></tr>
-
-<tr><td>@anchor ICC ICC</td>
-	<td>Integrated Circuit Card -- A removable card with at least data storage and sometimes processing.</td></tr>
-
-<tr><td>@anchor IPSec IPSec</td>
-	<td>IP Security Protocol -- A standard providing @ref secrecy and @ref authentication at the network or 
-	datagram layer of network communication. IPSec is mandatory in IPv6. \n 
-	See: <A HREF="http://www.ietf.org/html.charters/ipsec-charter.html">IPSec Working Group</A>.</td></tr>
-
-
-
-</table>\n @anchor J \n<table>
-
-<tr><td><b>J</b></td><td></td></tr>
-
-
-
-</table>\n @anchor K \n<table>
-
-<tr><td><b>K</b></td><td></td></tr>
-
-
-
-</table>\n @anchor L \n<table>
-
-<tr><td><b>L</b></td><td></td></tr>
-
-
-
-</table>\n @anchor M \n<table>
-
-<tr><td><b>M</b></td><td></td></tr>
-
-<tr><td>@anchor MD2 MD2</td>
-	<td>Legacy @ref hash algorithm. Considered insecure.</td></tr>
-
-<tr><td>@anchor MD5 MD5</td>
-	<td>Legacy @ref hash algorithm. Considered vulnerable.</td></tr>
-
-<tr><td>@anchor message_digest_algorithm Message Digest Algorithm</td>
-	<td>Same as a @ref hash algorithm. </td></tr>
-
-<tr><td>@anchor MIDP MIDP</td>
-	<td><A HREF="http://www.jcp.org/en/jsr/detail?id=118">Mobile Information Device Profile (JSP-118)</A>.
-	-- A set of Java APIs that is generally implemented on the @ref CLDC "Connected Limited Device Configuration" (CLDC). 
-	It provides a basic J2ME application runtime environment targeted at mobile information devices, such as 
-	mobile phones and two-way pagers. The MIDP specification addresses issues such as user interface, persistent storage, 
-	networking, and application model.</td></tr>
-
-
-
-</table>\n @anchor N \n<table>
-
-<tr><td><b>N</b></td><td></td></tr>
-	
-<tr><td>@anchor nonrepudiation Non-repudiation</td>
-	<td>The process by which it is assured that an entity making a declaration cannot subsequently deny having made it: 
-	so I can't claim that I never wrote that cheque. </td></tr>
-
-
-
-</table>\n @anchor O \n<table>
-
-<tr><td><b>O</b></td><td></td></tr>
-
-<tr><td>@anchor OAEP OAEP</td>
-	<td>Optimal Asymmetric Encryption Padding -- OAEP is a method for encoding messages, and addresses a potential 
-	vulnerability in <A HREF="http://www.rsasecurity.com/rsalabs/pkcs/pkcs-1/index.html">PKCS#1</A>. Padding means extra 
-	bits concatenated with a key, password, or @ref plaintext. @ref Padding helps against dictionary attacks.</td></tr>
-
-<tr><td>@anchor OCSP OCSP</td>
-	<td>@ref X509 "X.509" Internet Public Key Infrastructure Online Certificate Status Protocol -- A simple request/response 
-	protocol. To establish whether a given @ref certificate or list of certificates has/have been revoked, a client forms an 
-	OCSP request and sends this to an OCSP server. The server maintains revocation information in the form of, say, 
-	Certificate Revocation Lists (@ref CRL "CRL"s). The server replies to the client with a signed OCSP response, stating for
-	each certificate whether the status is Good, Revoked, or Unknown. This response in turn is checked to ensure that it
-	is valid, and that it is from an entity trusted for performing revocation checking.
-	See: 
-	@li <A HREF="http://www.ietf.org/rfc/rfc2560.txt">RFC2560</A>
-	-- @ref X509 "X.509" Internet @ref PKI Online Certificate Status Protocol - OCSP
-	@li @ref overview_OCSP overview. </td></tr>
-
-<tr><td>@anchor OID OID</td>
-	<td>Object Identifier -- A universal constant uniquely associated with an object type used in @ref ASN "ASN.1".</td></tr>
-
-<tr><td>@anchor OS OS Element</td>
-	<td>A discrete, identifiable entity within a ROM file that implements a set of interfaces. Examples of 
-	OS Elements include independently instantiable classes within DLLs, bitmaps within an MBM file, resource 
-	entries within a resource file. An OS Element identifies a part of a ROM file that could in principle be 
-	factored out or removed if it becomes architecturally advisable.</td></tr>
-
-<tr><td>@anchor out_of_band Out Of Band</td>
-	<td>A channel of communication that is distinct from the channel which we are using cryptography to try to secure, 
-	and which is secure on its own terms; that is, its security is not dependent on the cryptography we are using. 
-    A common example of an out of band channel is a motorcycle courier. 
- </td></tr>
-
-
-</table>\n @anchor P \n<table>
-
-<tr><td><b>P</b></td><td></td></tr>
-
-<tr><td>@anchor Padding @anchor padding Padding</td>
-	<td>Extending the size of a block of @ref plaintext to, say, a 64-bit block by addition of a regular or random pattern. 
-	For example, for use with @ref ECB. See: 
-	@li @ref rsa_padding
-	@li @ref symmetric_ciphers.</td></tr>
-
-<tr><td>@anchor PKCS PKCS</td>
-	<td><A HREF="http://www.rsasecurity.com/rsalabs/pkcs/index.html">Public-Key Cryptography Standards</A>.</td></tr>
-
-<tr><td><A HREF="http://www.rsasecurity.com/rsalabs/pkcs/pkcs-10/index.html">PKCS#10</A></td>
-	<td>@ref PKI standard that describes how to construct @ref certificate requests.</td></tr>
-
-<tr><td>@anchor PKG PKG file</td>
-	<td>A text file that defines a @ref SIS file. The PKG file is passed to the MAKESIS tool to produce the 
-	@ref SIS file.</td></tr>
-
-<tr><td>@anchor PKI PKI</td>
-	<td>Public Key Infrastructure -- A way of modelling real-world trust relationships that enables users of 
-	@ref public_key_cryptography "public key cryptography" to have confidence in the ownership of the @ref public_key "public keys" they are using. A PKI consists of: 
-	@li a trusted third party (@ref TTP)
-	@li an @ref out_of_band "out of band" means of distributing the @ref TTP's @ref public_key_certificate "public key certificate" to @ref relying_party "relying parties"
-	@li a means of distributing other certificates to @ref relying_party "relying parties"
-	@li arrangements for the @ref revocation and renewal of these certificates 
-	@li certificate management and validation software on the @ref relying_party "relying party's" computer 
-
-	The TTP uses its signing key pair to create certificates for other entities, which relying parties can use to 
-	authenticate these other entities. 
-
-	We can classify PKIs according to whether they are hierachical or flat. In hierachical PKIs, such as the one defined
-	in the PKIX set of standards, there is a distinction between users of the PKI such as End Entities (@ref EE "EE"s) and 
-	@ref relying_party "relying parties", and entities responsible for issuing and distributing certificates such as @ref CA "CA"s and 
-	@ref RA "RA"s. In a flat PKI such as the @ref web_of_trust "web of trust" underpinning @ref PGP, there are no entities whose sole role is
-	to issue certificates; instead users of the PKI certify each other. </td></tr>
-
-<tr><td>@anchor PKIX PKIX</td>
-	<td>Public-Key Infrastructure (X.509) -- A profile of @ref X509 "X.509" for the internet. See: 
-	@li @ref Certman_X509_Certificate_Validation
-	@li <A HREF="http://www.ietf.org/rfc/rfc2459.txt">RFC2459</A> 
-	-- Internet X.509 Public Key Infrastructure Certificate and CRL Profile.)</td></tr>
-
-<tr><td>@anchor plaintext Plaintext</td>
-	<td>The output of an @ref decryption operation, or the input to a @ref encryption operation.</td></tr>
-
-<tr><td>@anchor PGP PGP</td>
-	<td>Pretty Good Privacy -- A very widely-used @ref encryption and digital signing program.</td></tr> 
-
-<tr><td>@anchor private_key Private Key</td>
-	<td>In the context of @ref public_key_cryptography "public key cryptography", the private half of the key pair.</td></tr>
-
-<tr><td>@anchor public_key Public Key</td>
-	<td>In the context of @ref public_key_cryptography "public key cryptography", the public half of the key pair.</td></tr>
-
-<tr><td>@anchor public_key_certificate Public Key Certificate</td>
-	<td>A digitally signed structure including at least an identifier for an individual entity and a @ref public_key "public key", whose 
-	function is to bind the entity with the key. </td></tr>
-
-<tr><td>@anchor public_key_cryptography Public Key Cryptography</td>
-	<td>A common application of @ref asymmetric cryptography in which one half of the key pair is kept secrect 
-	(the @ref private_key "private key") and the other half is published (the @ref public_key "public key"). See:  
-	@li @ref asymmetric_cryptography
-	@li @ref Security_intro_PKC.</td></tr>
-
-
-
-</table>\n @anchor Q \n<table>
-
-<tr><td><b>Q</b></td><td></td></tr>
-
-
-
-</table>\n @anchor R \n<table>
-
-<tr><td><b>R</b></td><td></td></tr>
-
-<tr><td>@anchor RA Registration Authority</td>
-	<td>An organization responsible for registering new @ref certificate users in a @ref PKI, e.g. by gathering and verifying 
-	information which identifies the @ref certificate applicant.</td></tr> 
-
-<tr><td>@anchor revocation Revocation</td>
-	<td>The term used for asserting that a @ref certificate is no longer valid: for example, because the @ref private_key "private key" 
-	associated with it has been compromised.</td></tr>
-
-<tr><td>@anchor relying_party Relying Party</td>
-	<td>An entity who relies on the authenticity of a @ref public_key "public key".</td></tr>
-
-<tr><td>@anchor root_certificate Root Certificate</td>
-	<td>The @ref certificate of a @ref TTP "trusted third party". A certificate directly trusted by a @ref relying_party "relying party" 
-	that is, trust in it is not established by cryptographic means, but trust in it is the prerequisite for establishing 
-	trust in the entity which the relying party is trying to authenticate. Trust in a root certificate must be established
-	through @ref out_of_band "out of band" means. A root certificate may or may not be self signed.\n\n
-	See: @ref certman_certstore_root_cert_management.</td></tr> 
-
-<tr><td>@anchor RSA <A HREF="http://www.rsasecurity.com/rsalabs/rsa_algorithm/index.html">RSA</A></td>
-	<td>A @ref public_key "public key" algorithm used for both @ref encryption and @ref digital_signature "digital signatures", named after its creators: 
-	Rivest, Shamir, and Adleman.</td></tr>
-
-
-</table>\n @anchor S \n<table>
-
-<tr><td><b>S</b></td><td></td></tr>
-
-<tr><td>@anchor secrecy Secrecy</td>
-	<td>This means that access to information is controlled: for example, it means that two entities (e.g. people, 
-	machines, processes) are able to communicate with one another without any other entities being able to access the 
-	information communicated, or that an entity may store some information and be assured that only this entity will be 
-	able to access it.</td></tr>  
-
-<tr><td>@anchor SHA SHA-1</td>
-	<td>Secure Hash Algorithm 1 -- A widely used @ref hash algorithm, producing a 160-bit digest.  </td></tr>
-
-<tr><td>@anchor server_authentication Server Authentication</td>
-	<td>In a secure client-server protocol such as @ref TLS, the process in which the server authenticates itself to the 
-	client, so the client knows to whom it's talking. \n See: @ref WTLS_server_authentication "Server authentication in WTLS".</td></tr>
-
-<tr><td>@anchor SignText SignText</td>
-	<td>A function defined in the @ref WMLScript Crypto API that provides application-level @ref authentication and 
-	@ref nonrepudiation "non-repudiation" for transactions. </td></tr>
-
-
-<tr><td>@anchor SIS SIS file</td>
-	<td>A binary package file containing all the files for an installation, as well as metadata describing which 
-	directory to install them into, dependencies, etc..\n
-	See: @ref overview_SWI overview.</td></tr>
-
-<tr><td>@anchor Stub SIS Stub file</td>
-	<td>A @ref SIS file containing only the metadata, and not the files. After the installation, this file is archived 
-	on the device for uninstallation purposes, etc..</td></tr>
-
-<tr><td>@anchor SMIME S/MIME</td>
-	<td><A HREF="http://www.ietf.org/html.charters/smime-charter.html">Secure/Multipurpose Internet Mail Extensions</A> 
-	-- Provides a consistent way to send and receive secure MIME data. S/MIME provides the following cryptographic 
-	security services for electronic messaging applications: @ref authentication, message integrity and @ref nonrepudiation "non-repudiation" of 
-	origin (using @ref digital_signature "digital signatures") and privacy and data security (using @ref encryption); see 
-	<A HREF="http://www.ietf.org/rfc/rfc2633.txt">RFC2633</A> -- S/MIME Version 3 Message Specification.
-	</td></tr>
-
-<tr><td>@anchor SSL SSL</td>
-	<td>Secure Sockets Layer -- A protocol for securing network	connections that provides @ref authentication, @ref encryption, and 
-	data integrity using @ref PKI "Public Key Infrastructure" (PKI). Precursor to @ref TLS. SSL has been through three versions: 
-	the first two are considered insecure, and the third is almost identical to @ref TLS.</td></tr>
-
-<tr><td>@anchor stream_cipher Stream Cipher</td>
-	<td>A class of symmetric algorithm that is initialised with a key, then outputs a stream of pseudorandom bits. 
-	This 'keystream' is typically XOR-ed with the @ref plaintext to generate the @ref ciphertext. So they encrypt a bit of 
-	plaintext at a time. </td></tr>
-
-<tr><td>@anchor symmetric_cryptography Symmetric Cryptography</td>
-	<td>A form of cryptography in which the same key is used for @ref encryption and @ref decryption.\n\n 
-	Symmetric cryptography is fast, but suffers from the problem of how to distribute the key privately. @ref Asymmetric 
-	cryptography is an attempt to alleviate the key distribution problem, by reducing the requirement for the distributed 
-	key from one of privacy to one of @ref authentication. See:
-	@li @ref symmetric_ciphers
-	@li @ref SS_Cryptalg_symmetric_ciphers.</td></tr>
-
-
-</table>\n @anchor T \n<table>
-
-<tr><td><b>T</b></td><td></td></tr>
-
-<tr><td>@anchor TLS TLS</td>
-	<td>Transport Layer Security -- A protocol that provides communications secrecy, and optionally @ref authentication, 
-	over the Internet TCP/IP. The protocol allows client/server applications to communicate in a way that is designed to 
-	prevent eavesdropping, tampering, or message forgery.
-	
-	In this protocol a client connects to a server; the two then perform a handshake in which they exchange a 
-	symmetric key by using @ref asymmetric cryptography, which is then used to encrypt their communications, 
-	providing the @ref secrecy element. Without the @ref authentication element, @ref secrecy is not very useful; although 
-	only client and server can understand the data exchanged, the client doesn't know who the server is or vice versa. TLS 
-	provides the capability for @ref WTLS_server_authentication "server authentication", in which the client establishes who the server is, and 
-	@ref client_authentication "client authentication" in which the server establishes who the client is. \n\n
-	See: <A HREF="http://www.ietf.org/rfc/rfc2246.txt">RFC2246</A> --
-	The TLS Protocol). TLS is the successor to the @ref SSL "Secure Sockets Layer" (SSL). (Also, see: @ref WTLS.)</td></tr>
-
-<tr><td>@anchor TTP TTP</td>
-	<td>Trusted Third Party -- An entity whose @ref public_key "public key" is known to a @ref relying_party "relying party" due to its having been received 
-	via @ref out_of_band "out of band" means, and which is trusted to issue @ref public_key_certificate "public key certificates" for other entities not directly 
-	known to the relying party. A @ref CA is a type of TTP. </td></tr>
-
-
-</table>\n @anchor U \n<table>
-
-<tr><td><b>U</b></td><td></td></tr>
-
-<tr><td>@anchor URI URI</td>
-	<td>Uniform Resource Identifier -- A way to identify some content on the Internet, typically through the use of an 
-	identifier for the scheme (e.g. HTTP) through which the content may be accessed, and an identifier for the 
-	content that makes sense within that scheme. 
-	The most common form of URI is a Web page address, which is a particular form or subset of URI called a Uniform 
-	Resource Locator (URL).</td></tr>
-
-
-
-</table>\n @anchor V \n<table>
-
-<tr><td><b>V</b></td><td></td></tr>
-
-
-
-</table>\n @anchor W \n<table>
-
-<tr><td><b>W</b></td><td></td></tr>
-
-<tr><td>@anchor WAP WAP</td>
-	<td></td><A HREF="http://www.wapforum.org/index.htm">Wireless Application Protocol</A> -- A secure specification 
-	that enables users to access information instantly using devices such as mobile phones, pagers, two-way radios, 
-	smartphones and communicators. The WAP defines a set of protocols in transport, security, transaction, session, and 
-	application layers to enable the creation of advanced mobile services.</td></tr>
-
-<tr><td>@anchor web_of_trust  Web of Trust</td>
-	<td>The set of social relationships between users of @ref PGP that enables them to sign each others' keys, essentially
-	providing a @ref PKI for this technology.</td></tr>
-
-<tr><td>@anchor WIM WIM</td>
-	<td><A HREF="http://www.wmlclub.com/docs/especwap2.0/WAP-260-WIM-20010712-a.pdf">Wireless Identity Module</A> 
-	-- Used in performing @ref WTLS and application level security functions, and especially, to store and process 
-	information needed for user identification and @ref authentication. Examples of WIM implementations are a Subscriber 
-	Identity Module (SIM) card or an external smart card.</td></tr>
-
-<tr><td>@anchor WMLScript WMLScript Crypto API</td>
-	<td>A @ref WAP Forum standard that defines cryptographic functions in WML, the scripting language used in @ref WAP. 
-	It defines a function for creating signed objects called @ref SignText.</td></tr>
-
-<tr><td>@anchor WTLS WTLS</td>
-	<td><A HREF="http://www.wmlclub.com/docs/especwap2.0/WAP-261-WTLS-20010406-a.pdf">Wireless Transport Layer Security</A>
-	-- The security layer of the @ref WAP, providing privacy, data integrity and @ref authentication for WAP services. 
-	It is a @ref WAP variant of @ref TLS and defines its own lightweight @ref certificate format. \n\n
-	See: @ref overview_WTLS overview. </td></tr>
-
-<tr><td>@anchor WTLS_certificate WTLS certificate</td>
-	<td>@ref WAP variant of @ref X509_certificate "X.509 certificates".\n\n
-	See: @ref overview_WTLS overview.</td></tr>
-
-
-</table>\n @anchor X \n<table>
-
-<tr><td><b>X</b></td><td></td></tr>
-
-<tr><td>@anchor X509 X.509</td>
-	<td>A widely used standard for digital certificates. See: 
-	@li @ref Certman_X509_Certificate_Validation
-	@li <A HREF="http://www.ietf.org/rfc/rfc2459.txt">RFC2459</A> 
-	-- Internet @ref X509 "X.509" @ref PKI Certificate and @ref CRL Profile 
-	@li <A HREF="http://www.ietf.org/rfc/rfc3280.txt">RFC3280</A> 
-	-- Internet @ref X509 "X.509" @ref PKI Certificate and @ref CRL "Certificate Revocation List" Profile. 
-     </td></tr>
-
-<tr><td>@anchor X509_certificate  X.509 certificate</td>
-	<td>A widely used type of @ref public_key_certificate "public key certificate", part of the now largely moribund X.500 series of standards.\n\n
-	An X.509 certificate is a person's/company's @ref public_key "public key" digitally signed by a trusted third party and wrapped with 
-	attribute data such as identifying names. A hierarchy of certificates is often used tracing back to a single root 
-	@ref CA_certificate "CA certificate". If a user trusts the @ref CA, then they can trust that the @ref certificate belongs to the 
-	person/company given within the certificate. Using the public key within the certificate, they can then verify that 
-	other data has originated from the certificate owner via the use of @ref digital_signature "digital signatures" created using the corresponding
-	@ref private_key "private key". @ref X509 "X.509" basically defines the certificate format.</td></tr>
-
-
-
-</table>\n @anchor Y \n<table>
-
-<tr><td><b>Y</b></td><td></td></tr>
-
-
-</table>\n @anchor Z \n<table>
-
-<tr><td><b>Z</b></td><td></td></tr>
-
-<tr><td>@anchor zlib zlib</td>
-	<td>zlib is designed to be a free, general-purpose, legally unencumbered (i.e., not covered by any patents) lossless
-	 data-compression library for use on virtually any computer hardware and operating system. zlib was written by 
-	 Jean-loup Gailly (compression) and Mark Adler (decompression). See: 
-	 @li <A HREF="http://www.ietf.org/rfc/rfc1950.txt">RFC1950, zlib format</A>
-	 @li <A HREF="http://www.ietf.org/rfc/rfc1951.txt">RFC1951, deflate format</A>
-	 @li <A HREF="http://www.ietf.org/rfc/rfc1952.txt">RFC1952, gzip</A>.</td></tr>
-
-</table>
-*/
--- a/cryptomgmtlibs/securitydocs/doxygen_docs/Security_intro.dox	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,9 +0,0 @@
-/**
-@page Security_intro Introduction to Security
-
-@li @ref Security_intro_PKC 
-@li @ref Security_intro_certificates
-@li @ref Security_signatures
-
-
-*/
\ No newline at end of file
--- a/cryptomgmtlibs/securitydocs/doxygen_docs/Security_intro_PKC.dox	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,35 +0,0 @@
-/**
-@page Security_intro_PKC Public Key Cryptography 
-\n
-
-Public key (sometimes called @ref asymmetric) cryptography allows encrypted messages to be sent without the need to establish a
-shared secret key. It involves the use of two keys called a key pair: a private key and a public key. The private key is 
-kept secret, and a public key is made publically available. 
-
-All entities using such a system would typically possess a key pair. They will use these keys either for @ref encryption or 
-@ref decryption. In any case, if one of the keys is used for @ref encryption, then only the other key can be used for @ref decryption. 
-
-So, in public key cryptography, to send a message in an encrypted form to a receiver, the sender:
-@li Gets hold of the receiver's public key.
-@li Encrypts the message with the receiver's public key.
-@li Sends the encrypted message.
-
-The receiver then decrypts the message using its private key. Only the receiver, who has access to the corresponding 
-private key, can decrypt it.
-
-That is the basic process used for a pure PKC system. In the real world, however, public key cryptography is typically 
-used in conjunction with traditional symmetric key cryptography. This is done in order to reduce key management problems 
-while at same time taking advantage of the superior speed of the latter. The method for doing this is called a digital 
-envelope: a random symmetric private secret key is generated, the message is encrypted with this secret key using a 
-symmetric algorithm, and then the secret key is encrypted with the receiver's public key using an @ref asymmetric algorithm.
-
-The other main use for public key cryptography is in signing (see: @ref Security_signatures).
-
-While public key cryptography ensures that only the entity with access to the corresponding key will be able to read the 
-message or could have signed a given message, it gives no assurance that this entity is/are actually the entity they 
-claim to be. This is where certificates come in. @ref Security_intro_certificates are needed to solve the problem of 
-@ref authentication.
-
-
-
-*/
\ No newline at end of file
--- a/cryptomgmtlibs/securitydocs/doxygen_docs/Security_intro_certificates.dox	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,33 +0,0 @@
-/**
-@page Security_intro_certificates Certificates
-
-A @ref certificate binds a public key to a certain individual/entity. This is usually done using @ref digital_signature "digital signatures": if a 
-@ref certificate bearing a public key and an individual's name is signed with a key pair which you already trust, then you can 
-rest assure that the public key in the @ref certificate really does belong to the individual named in the @ref certificate.
-
-Different standards using public key cryptography employ different models for using certificates to establish trust. 
-Such a model, encompassing data structures, rules for their use, and users of them, may be referred to as a 
-@ref PKI "Public Key Infrastructure" (PKI). @ref SSL, @ref TLS and @ref SMIME "S/MIME" all use @ref X509 "X.509" v.3 certificates, and a 
-hierarchical @ref PKI in which users are certified by @ref CA "Certification Authorities" (CAs). 
-
-All data which appear in the interface between the Symbian OS and the rest of the world need a transport encoding, and it 
-is in this form that they are sent and received. The transport encoding for @ref X509 "X.509" data structures is @ref DER encoded
-@ref ASN "ASN.1".
-
-@section certification_authorities Certification Authorities
-
-@ref CA "Certification Authorities" (CAs) are trusted third parties which perform the following functions in the @ref PKIX public 
-key infrastructure:
-
-@li provide trusted 'root' certificates to users (@ref EE "End Entities"), by supplying them with the @ref CA's public key 
-@li certifying End Entities: checking that they are who they say they are, and generating certificates for them. The 
-certified End Entity is the \b subject of the @ref certificate: the @ref CA is the \b issuer
-@li supporting @ref certificate revocation and revocation checking: if an End Entity suspects that their key has been 
-compromised, they contact the Certification Authority which issued it. @ref CA "CA"s publish lists of revoked certificates 
-(known as @ref CRL "Certificate Revocation Lists") at regular intervals, which End Entities can use to check that 
-certificates sent to them have not been revoked 
-@li publishing certificates: the most likely place for this is an LDAP directory, since @ref X509_certificate "X.509 certificates" identify 
-their subjects and issuers by describing a path through an X.500 directory 
-
-
-*/
\ No newline at end of file
--- a/cryptomgmtlibs/securitydocs/doxygen_docs/Security_intro_signatures.dox	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,16 +0,0 @@
-/**
-@page Security_signatures Digital signatures
-
-A digital signature is used to verify that a message (or data) actually came from the sender (the one who signed the 
-message) and that it has not been tampered with.
-
-A signature is formed by producing a fixed-length digest (@ref hash) of the message using a hash algorithm, which is then 
-encrypted using the sender's private key. This signature and the message are then sent to the recipient.
-
-The receiver can then verify the signature as follows: a @ref hash is produced of the sender's message (using the hashing 
-algorithm sent with the signature); also, using the sender's public key, their signature is decrypted into a @ref hash. 
-These two hashes are compared: if they are the same, it is more or less certain that the public key used for the 
-@ref decryption corresponds to the private key used to create the signature, thus data integrity is validated.
-
-
-*/
\ No newline at end of file
--- a/cryptomgmtlibs/securitydocs/ocsp.txt	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,176 +0,0 @@
-How to use OSCP
-===============
-
-Note: The actual code snippets are indented.
-
-Include ocsp.h in your header file.
-
-	#include <ocsp.h>
-
-Link your project with ocsp.lib: add the following string to your project's .mmp
-file:
-
-	LIBRARY ocsp.lib
-
-Add the following to your class declaration, which should be derived from
-CActive:
-
-	COcspClient* iOcspClient;
-
-You will need to know revocation server URI. It is possible to get it from
-installer preferences. Most Software Install components accept the URI as a
-construction parameter. This is because they are started by the UI which stores
-preferences in its resource file. If you want to retrieve it yourself, you can
-use the following code (taken from InstallEngineImpl.cpp):
-
-	//	Open instapp's ini file
-	static CDictionaryStore* OpenIniFileLC(RFs& aFs)
-		{
-		CApaAppFinder* appFinder=CApaScanningAppFinder::NewL(aFs);
-		CleanupStack::PushL(appFinder);
-		TUid instAppUid={KUidInstallAppValue};
-		TFileName libName=appFinder->FindAppL(KInstallAppName,instAppUid);
-		CleanupStack::PopAndDestroy(appFinder); 
-		TParse parser;
-		User::LeaveIfError(parser.SetNoWild(KIniFileExtension,&KInstAppDriveC(),
-			&libName));
-		aFs.MkDirAll(parser.FullName()); // ignore the error
-		CDictionaryFileStore* dict = CDictionaryFileStore::OpenLC(aFs,
-			parser.FullName(),instAppUid);
-		return dict;
-		}
-
-	// get preferences from ini file
-	{
-	RFs fs;
-	User::LeaveIfError(fs.Connect());
-	CleanupClosePushL(fs);
-	CDictionaryStore* iniFile=OpenIniFileLC(fs); // see above
-	User::LeaveIfNull(iniFile);
-	RDictionaryReadStream readStream;
-	readStream.OpenLC(*iniFile,KUidInstallPrefs);
-	TInstallPrefs prefs; // this is what you need
-	TRAPD(ret,readStream >> prefs);   // will return KErrEof first time
-	CleanupStack::PopAndDestroy(2); //readStream, iniFile
-	CleanupStack::Pop(); // fs 
-	fs.Close();
-	}
-
-If at any time you want to cancel OCSP check, call
-
-	iOcspClient->CancelCheck();
-
-When ready to perform the check (the certificate chain is built), use the
-following code as a template (from JavaInstallerSecurityManager.cpp):
-
-	COCSPParameters* params = COCSPParameters::NewLC();
-	params->SetURIL(*iOCSPServerURI, ETrue);
-	params->AddCertificatesL(*iCertChain);
-	
-	// Set up authorisation scheme - we've a special UID registered with the
-	// certStore for the appropriate certificates
-	COCSPDirectAuthorisationScheme* scheme = 
-		COCSPDirectAuthorisationScheme::NewLC(
-		TUid::Uid(KCertStoreUIDForSWInstallOCSPSigning));
-	params->AddAuthorisationSchemeL(scheme);
-	CleanupStack::Pop(scheme);
-   		
-	// Won't set validation time - this uses the response producedAt time
-	// instead. This avoids us relying on an accurate time in the device.
-	// Caching of old responses avoided by use of the nonce.
-
-	iOcspClient = COcspClient::NewL(params);
-	CleanupStack::Pop(params);
-	iOcspClient->Check(iStatus);
-
-When the request completes and your class's RunL() is called, use the following
-function template to process the result:
-
-	TBool accept = ETrue;
-	switch (iStatus.Int())
-		{
-		case OCSP::KErrNoCertificates:
-			// No certs in OCSP request - no proper cert chain formed.
-			// Covered by check digital sig logic already, so we let it pass.
-			break;
-		case KErrNone:
-		    {
-			// Check the outcome of every transaction made
-			for (TInt index = 0; 
-				accept && index < iOcspClient->TransactionCount(); 
-				++index)
-				{
-				const TOCSPOutcome& outcome = iOcspClient->Outcome(index);
-
-				// We have the OCSP response.  Interpret it, asking the user
-				// what questions we need to.  Return determines whether we
-				// continue the install
-				switch (outcome.iStatus)
-					{
-					case OCSP::ETransportError:
-					case OCSP::EClientInternalError:
-					case OCSP::EMalformedRequest:
-					case OCSP::EServerInternalError:
-					case OCSP::ETryLater:
-					case OCSP::ESignatureRequired:
-					case OCSP::EClientUnauthorised:
-					case OCSP::EUnknownResponseType:
-						// Error: unable to obtain certificate status
-						break;
-					case OCSP::ENoServerSpecified:
-					case OCSP::EInvalidURI:
-						// Error: invalid revocation server URI
-						break;
-					case OCSP::EResponseSignatureValidationFailure:
-						// Error: response signature validation failed
-						break;
-					case OCSP::EThisUpdateTooLate:
-					case OCSP::EThisUpdateTooEarly:
-					case OCSP::ENextUpdateTooEarly:
-					case OCSP::ENonceMismatch:
-					case OCSP::EMalformedResponse:
-					case OCSP::EUnknownCriticalExtension:
-					case OCSP::EMissingCertificates:
-						// Error: invalid server response
-						break;
-					case OCSP::EMissingNonce:
-						// Error: missing nonce
-						break;
-					case OCSP::ECertificateNotValidAtValidationTime:
-						// Error: invalid certificate status information
-						break;
-					case OCSP::EValid:
-						switch(outcome.iResult)
-							{
-							case OCSP::EGood:
-								accept = ETrue;
-								break;
-							case OCSP::EUnknown:
-								// ask user
-								break;
-							case OCSP::ERevoked:
-								// ask user
-								break;
-							default:
-								ASSERT(EFalse);
-							}
-						break;
-					default:
-						ASSERT(EFalse);
-						break;
-					}
-				}	
-			break;
-			}
-		default:
-			// Error: cannot obtain certificate status, ask user
-			break;
-		}
-
-	delete iOcspClient;
-	iOcspClient = NULL;
-
-OCSP check can take a long time. Therefore it is a good thing to display a
-status dialog for the user telling her that OCSP check is in progress and
-allowing her to cancel it. Both SIS and Java installers delegate this function
-to their respective UI handlers.
--- a/cryptomgmtlibs/securitydocs/security_documentation.history.xml	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,37 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<relnotes name="DEVELOPERLIBRARY">
-  <purpose>
-  </purpose>
-
-  <defect number="DEF132732" title="Wrong 'CreateHashFuncLv2' definition in pluginentrydef.h" revision="007">
- 	corrected the word document section 5.b 
-	Changed method name from 'CreateHashFuncL' to 'CreateHashFuncLv2'	
-  </defect>
-  
-  <defect number="DEF124792" title="JMI certificate documentation needs to be updated" revision="006">
-    How to configure certstore to install signed midlet is updated in the documentation
-  </defect>
-
-  <defect number="DEF124949" title="swicertstoretool.mmp location" revision="005">
-    Changes in the documentation How-to Configure the SWI Certificate Store to update swicertstoretool.mmp location and SU flag.
-  </defect>
-
-  <deliverystep number="708" name="Security - Alignment of CBR and System Model components" osproject="Oghma" revision="004">
-    <milestone project="GT0313" number="MS3.7"/>
-    <preq number="775" title="Alignment of CBR and System Model components">
-      Changed the OSD and ipr category.
-    </preq>
-  </deliverystep>
-
-  <defect number="PDEF108896" title="Doc &quot;How-to configure SWI cert store&quot; is out-of-date" revision="003">
-    The document(Appendix section) is changed that all four certificates are used by the Software Installer and are placed in swicertstore.
-  </defect>
-
-  <minorchange revision="002">
-    Updated SWI daemon documentation in the SWI design doc.
-  </minorchange>
-
-  <minorchange revision="001">
-    Updated PC Connectivity documentation in TS0013.604
-  </minorchange>
-</relnotes>
--- a/cryptomgmtlibs/securitydocs/security_documentation.mrp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,9 +0,0 @@
-component	security_documentation
-
-source	\sf\os\security\cryptomgmtlibs\securitydocs\
-
-notes_source	\component_defs\release.src
-
-
-ipr G 
-
--- a/cryptomgmtlibs/securitytestfw/group/bld.inf	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptomgmtlibs/securitytestfw/group/bld.inf	Wed Apr 14 17:48:59 2010 +0300
@@ -54,7 +54,6 @@
 ../test/autotesting/autosimtsy.cfg /epoc32/winscw/c/autosimtsy.cfg
 ../test/autotesting/dummytefscript.script /epoc32/winscw/c/dummytefscript.script
 
-../test/autotesting/testMakesis.pl /epoc32/winscw/c/tswi/testmakesis.pl
 ../test/autotesting/panicscan.pl /epoc32/winscw/c/tswi/panicscan.pl
 ../test/autotesting/panicscan_authserver.pl /epoc32/winscw/c/tswi/panicscan_authserver.pl
 ../test/autotesting/checklocationofcertificates.pl /epoc32/winscw/c/checklocationofcertificates.pl
@@ -75,62 +74,37 @@
 	../test/autotesting/testsecurity_sdp.bat	     /epoc32/winscw/c/autohardware/testsecurity_sdp.bat
 	../test/autotesting/testsecurity_sdp_auth.bat	     /epoc32/winscw/c/autohardware/testsecurity_sdp_auth.bat
 	../test/autotesting/testsecurity_sdp_newrom.bat	     /epoc32/winscw/c/autohardware/testsecurity_sdp_newrom.bat
-	../test/autotesting/testsecurity_9.4_mcs.bat /epoc32/winscw/c/autohardware/testsecurity_9.4_mcs.bat
-	../test/autotesting/testsecurity_9.4_mcs_vfuture.bat /epoc32/winscw/c/autohardware/testsecurity_9.4_mcs_vfuture.bat
-	../test/autotesting/testsecurity_9.4_nonmcs.bat /epoc32/winscw/c/autohardware/testsecurity_9.4_nonmcs.bat
-	../test/autotesting/runcertman_9.5.bat /epoc32/winscw/c/autohardware/runcertman_9.5.bat
-
-	../test/autotesting/testsecurity_9.5_mcs.bat /epoc32/winscw/c/autohardware/testsecurity_9.5_mcs.bat
-	../test/autotesting/testsecurity_9.6_mcs.bat /epoc32/winscw/c/autohardware/testsecurity_9.6_mcs.bat
-	../test/autotesting/testsecurity_9.5_nonmcs.bat /epoc32/winscw/c/autohardware/testsecurity_9.5_nonmcs.bat
-	../test/autotesting/testsecurity_9.6_nonmcs.bat /epoc32/winscw/c/autohardware/testsecurity_9.6_nonmcs.bat
-	../test/autotesting/switextshell_nonmcs.bat	 /epoc32/winscw/c/autohardware/switextshell_nonmcs.bat
-
-#ifdef SYMBIAN_JAVA_NOT_INCLUDED
-	../test/autotesting/testsecurity_9.6_crypto.bat /epoc32/winscw/c/autohardware/testsecurity_9.6_crypto.bat
-#else
-	../test/autotesting/runjavamidletinstaller_9.4.bat /epoc32/winscw/c/autohardware/runjavamidletinstaller_9.4.bat
-	../test/autotesting/testsecurity_9.4_java.bat /epoc32/winscw/c/autohardware/testsecurity_9.4_java.bat
-	../test/autotesting/testsecurityonlyjava.bat /epoc32/winscw/c/autohardware/testsecurityonlyjava.bat
-#endif
+	../test/autotesting/runcertman.bat /epoc32/winscw/c/autohardware/runcertman.bat
 
 #ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 	../test/autotesting/runcrypto_wmdrm.bat /epoc32/winscw/c/autohardware/runcrypto_wmdrm.bat
 	../test/autotesting/runfiletokens_disableauth_with_wmdrm.bat /epoc32/winscw/c/autohardware/runfiletokens_disableauth_with_wmdrm.bat
 #endif
-#ifdef SYMBIAN_CRYPTOSPI
-	../test/autotesting/runcrypto_9.5.bat /epoc32/winscw/c/autohardware/runcrypto_9.5.bat
-	../test/autotesting/runhardwarecrypto.bat /epoc32/winscw/c/autohardware/runhardwarecrypto.bat
-#else
-	../test/autotesting/runcrypto_9.4.bat /epoc32/winscw/c/autohardware/runcrypto_9.4.bat
-#endif
-	../test/autotesting/runcryptotokens_9.4.bat /epoc32/winscw/c/autohardware/runcryptotokens_9.4.bat
-	../test/autotesting/runasnpkcs_9.4.bat /epoc32/winscw/c/autohardware/runasnpkcs_9.4.bat
+
+../test/autotesting/runcrypto.bat /epoc32/winscw/c/autohardware/runcrypto.bat
+../test/autotesting/runhardwarecrypto.bat /epoc32/winscw/c/autohardware/runhardwarecrypto.bat
+../test/autotesting/runcryptotokens.bat /epoc32/winscw/c/autohardware/runcryptotokens.bat
+../test/autotesting/runasnpkcs.bat /epoc32/winscw/c/autohardware/runasnpkcs.bat
+
 #ifdef SYMBIAN_AUTH_SERVER
 	../test/autotesting/runfiletokens_useauth.bat /epoc32/winscw/c/autohardware/runfiletokens_useauth.bat
 	../test/autotesting/runfiletokens_disableauth.bat /epoc32/winscw/c/autohardware/runfiletokens_disableauth.bat
+	../test/autotesting/runauthtests.bat /epoc32/winscw/c/autohardware/runauthtests.bat
+	../test/autotesting/runauthtests_macroenabled.bat /epoc32/winscw/c/autohardware/runauthtests_macroenabled.bat
 #else
-	../test/autotesting/runfiletokens_9.4.bat /epoc32/winscw/c/autohardware/runfiletokens_9.4.bat
+	../test/autotesting/runfiletokens.bat /epoc32/winscw/c/autohardware/runfiletokens.bat
 #endif // SYMBIAN_AUTH_SERVER
-	../test/autotesting/runsisinstaller_9.4.bat /epoc32/winscw/c/autohardware/runsisinstaller_9.4.bat
-	
 
-	../test/autotesting/runswiromtests_9.6.bat /epoc32/winscw/c/autohardware/runswiromtests_9.6.bat
-	../test/autotesting/runswiromtests_9.5.bat /epoc32/winscw/c/autohardware/runswiromtests_9.5.bat
+../test/autotesting/runupstests.bat /epoc32/winscw/c/autohardware/runupstests.bat
+../test/autotesting/runpkcs12tests.bat /epoc32/winscw/c/autohardware/runpkcs12tests.bat
 
-../test/autotesting/runswiromtests_9.4_mcs.bat /epoc32/winscw/c/autohardware/runswiromtests_9.4_mcs.bat
-../test/autotesting/runauthtests.bat /epoc32/winscw/c/autohardware/runauthtests.bat
-../test/autotesting/runauthtests_macroenabled.bat /epoc32/winscw/c/autohardware/runauthtests_macroenabled.bat
-../test/autotesting/runupstests_9.4.bat /epoc32/winscw/c/autohardware/runupstests_9.4.bat
-../test/autotesting/runpkcs12tests_9.4.bat /epoc32/winscw/c/autohardware/runpkcs12tests_9.4.bat
-../test/autotesting/runusiftests.bat /epoc32/winscw/c/autohardware/runusiftests.bat
 ../test/autotesting/runcommonutilstests.bat /epoc32/winscw/c/autohardware/runcommonutilstests.bat
 
 ../test/autotesting/testsecurityperformance_cryptalg.bat /epoc32/winscw/c/autohardware/testsecurityperformance_cryptalg.bat
 ../test/autotesting/testsecurityperformance_crypto.bat   /epoc32/winscw/c/autohardware/testsecurityperformance_crypto.bat
 
-../test/autotesting/runcaftests_9.5.bat /epoc32/winscw/c/autohardware/runcaftests_9.5.bat
-../test/autotesting/runcaftests_9.6.bat /epoc32/winscw/c/autohardware/runcaftests_9.6.bat
+../test/autotesting/runcaftests.bat /epoc32/winscw/c/autohardware/runcaftests.bat
+
 
 #ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 ../test/autotesting/runcaftests_wmdrm.bat /epoc32/winscw/c/autohardware/runcaftests_wmdrm.bat
--- a/cryptomgmtlibs/securitytestfw/group/t_testhandler2.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptomgmtlibs/securitytestfw/group/t_testhandler2.mmp	Wed Apr 14 17:48:59 2010 +0300
@@ -34,10 +34,6 @@
 USERINCLUDE ../inc
 OS_LAYER_SYSTEMINCLUDE_SYMBIAN
 
-#ifdef SYMBIAN_AUTH_SERVER
-SYSTEMINCLUDE OS_LAYER_PUBLIC_EXPORT_PATH(authserver)
-#endif
-
 SOURCEPATH	../test/testhandler2
 
 SOURCE t_testhandler.cpp
--- a/cryptomgmtlibs/securitytestfw/inc/SecurityTests.iby	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptomgmtlibs/securitytestfw/inc/SecurityTests.iby	Wed Apr 14 17:48:59 2010 +0300
@@ -24,7 +24,6 @@
 // Save build details in ROM
 data=\buildid.txt                 \buildid.txt
 
-define ZDRIVE \epoc32\winscw\c
 
 // This should be included in the Techview.oby file
 // All test data and scripts gets copied to the root of ROM drive.
@@ -38,146 +37,66 @@
 PlatSecEnforceSysBin ON
 PlatSecProcessIsolation ON
 }
+
 #include "setcap.iby"
-#include "testutil.iby"
+
 #include "testexecute.iby"
 #include "t_testhandler.iby"
-#include "xml.iby" // Needed for security tests
+#include "testutil.iby"
+//#include "xml.iby" // Needed for security tests
 
 #include "securityframeworktestserver.iby"
+
+
+#if defined SYMBIAN_KEYSTORE_USE_AUTH_SERVER || defined SDP_ROM1
+
+	#include "ups.iby"
+	#include "tups.iby"
+	#include "asnpkcstests.iby"
+	#include "certmantests.iby"
+	#include "tpkcs7server.iby"     
+	#include "tpkcs12integrationserver.iby"  	
+	#include "ctframeworktests.iby"
+	#include "cryptotests.iby"
+#else
+	#include "streamingcaf.iby"
+	// iby files for caf
+	#include "caf.iby"
+	#include "caftest.iby"
+	#include "reccafconfig.iby"
+	#include "rta.iby"
+	#include "rtatest.iby"
+	#include "cryptotests.iby"
+	#include "tscaf.iby"	
+	#include "randomtests.iby"
+	#include "hashtests.iby"
+
+	#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
+	#include "mtputils.iby"
+	#include "mtputilstest.iby"
+	#include "refcafhelper.iby"
+	#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
+
+#endif
+ 
+	
 // Common utils libraries
 #include "securitycommonutils.iby"
-// Common utils libraries test
-#include "installtestframework.iby"
-#include "securitytestframework.iby"		
-
-#include "streamingcaf.iby"
-
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-#include "mtputils.iby"
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
-#ifdef SYMBIAN_UNIVERSAL_INSTALL_FRAMEWORK
-	//Universal Software Install Framework production
-	#include "scr.iby" // Software Component Registry
-	#include "sif.iby"  // Software Install Framework
-	#include "sts.iby"  // Software Transaction Services
-	#include "sifrefinstaller.iby"  // Sif Reference Installer
-#endif //SYMBIAN_UNIVERSAL_INSTALL_FRAMEWORK
-
-#ifdef __SECURITY_NORMAL_SWICERTSTORE__
-	
-	#ifdef __SECURITY_ONLYJAVA__
-		
-		#ifndef SYMBIAN_JAVA_NOT_INCLUDED
-			#include "sisinstallertest.iby"
-			#include "JavaMIDletInstallerTest.iby"
-			#include "rtatest.iby"
-			#include "recjar.iby"
-		#endif
-	#elif __SECURITY_NORMAL__
-
-		#ifndef SYMBIAN_JAVA_NOT_INCLUDED
-  			#include "sisinstallertest.iby"
-		#endif
-
-		#include "tsistestdata.iby" 
+#include "securitytestframework.iby"	
+#include "secutiltests.iby"
 
-		ECOM_PLUGIN(tsecdlg.dll, 10204789.rsc)
-		
-		#include "tups.iby"
-		#include "ups.iby"
-		// iby files for caf
-		#include "caf.iby"
-		#include "caftest.iby"
-		#include "reccafconfig.iby"
-		#include "rta.iby"
-		#include "rtatest.iby"
-		#include "tpkcs12integrationserver.iby"
- 		// Dependency
-		file=ABI_DIR\BUILD_DIR\pkcs7.dll	System\Libs\pkcs7.dll
-
-		#include "tscaf.iby"
-
-		#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-		#include "mtputilstest.iby"
- 		#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
-		#ifdef SYMBIAN_UNIVERSAL_INSTALL_FRAMEWORK
-			//Universal Software Install Framework tests
-			#include "tscr.iby"
-			#include "tsif.iby"
-			#include "tsts.iby"
-			#include "tsifrefinstaller.iby"
-		#endif //SYMBIAN_UNIVERSAL_INSTALL_FRAMEWORK
-
-		
-	
-		
-		
-		
-		// Extra test data
-		#include "tswi.iby"
-		#include "tswiconsole.iby"
-		#include "tsissignedtestdata.iby"
-		#include "secutiltests.iby"
-
-	#endif
+//filetokens and authserver run in both the images.
+#include "filetokenstests.iby"
 
 
-
-	#ifndef SYMBIAN_JAVA_NOT_INCLUDED
-  		// Jar/Jad recogniser needed for CAF tests
-  		#include "recjar.iby"
-	#endif
-
-#elif __SECURITY_MANDATORY_SWICERTSTORE__
-	// Temp
- 	#include "cryptodeps.iby"
-             
-      #include "randomtests.iby"
-   	#include "hashtests.iby"
-  	#include "certmantests.iby"
-  	#include "ctframeworktests.iby"
-  	#include "tpkcs7server.iby"
-  	#include "filetokenstests.iby"
-  	#include "asnpkcstests.iby"
-  	#include "tsiscorrupttestdata.iby" 
-  	// uncomment authserver tests when authserver gets released
-	#ifdef SYMBIAN_AUTH_SERVER
-  		#include "tAuthSvr.iby"
-	#endif // SYMBIAN_AUTH_SERVER
-	#ifndef SYMBIAN_JAVA_NOT_INCLUDED
-		// Jar Download Reference Filter - sets user agent
-		ECOM_PLUGIN(midletuaheaderfilter.dll,10200a88.rsc)
-	#endif
-  
-  	// Extra test data
-  	#include "tswi.iby"
-  	#include "tswiconsole.iby"
-  	#include "tsissignedtestdata.iby"
-  	#include "secutiltests.iby"
-#elif __SECURITY_JAVA__
-	#ifndef SYMBIAN_JAVA_NOT_INCLUDED
-  		#include "JavaMIDletInstallerTest.iby"
-	#endif
-	
-	#include "cryptotests.iby"
-	#include "randomtests.iby"
-  	#include "hashtests.iby"
-	#include "rtatest.iby"
-	#include "rta.iby"
-#endif
-
-
-//***********
-// REMOVE ME WHEN AUTHSERVER IS ADDED TO MAIN BUILD
-//***********
 #ifdef SYMBIAN_AUTH_SERVER
+	#include "tAuthSvr.iby"
 	#include "authserver.iby"
 	#include "pinplugin.iby"
 #endif // SYMBIAN_AUTH_SERVER
 
+
+define ZDRIVE \epoc32\winscw\c
 // This is the bat file to run the security tests automatically
 // comms configuration (and configuration using sim.tsy)
 data = ZDRIVE\auto.cfg					\auto.cfg
@@ -189,113 +108,85 @@
 data = ZDRIVE\autohardware\hosts		     \hosts
 
 
-
 #ifdef __AUTO_HARDWARE_TESTS__
 	data = ZDRIVE\autohardware\autoexec.bat		\autoexec.bat
 #endif
 
-#ifdef __SECURITY_NORMAL_SWICERTSTORE__
-
-	#ifdef __SECURITY_ONLYJAVA__
 
-		#ifndef SYMBIAN_JAVA_NOT_INCLUDED
-			data = ZDRIVE\autohardware\runjavamidletinstaller_9.4.bat      	\runjavamidletinstaller.bat
-			data = ZDRIVE\autohardware\runsisinstaller_9.4.bat		\runsisinstaller.bat
-			data = ZDRIVE\autohardware\testsecurityonlyjava.bat	\testsecurity.bat
-		#endif
-	#elif __SECURITY_NORMAL__
-		#ifdef SYMBIAN_UNIVERSAL_INSTALL_FRAMEWORK
-			data = ZDRIVE\autohardware\testsecurity_9.6_nonmcs.bat	\testsecurity.bat
-			data = ZDRIVE\autohardware\runswiromtests_9.6.bat	\runswiromtests.bat
-			data = ZDRIVE\autohardware\runusiftests.bat		\runusiftests.bat
-			data = ZDRIVE\autohardware\runcommonutilstests.bat	\runcommonutilstests.bat
-		#else
-			data = ZDRIVE\autohardware\testsecurity_9.5_nonmcs.bat	\testsecurity.bat
-			data = ZDRIVE\autohardware\runswiromtests_9.5.bat	\runswiromtests.bat
-		#endif
+data = ZDRIVE\autohardware\runcertman.bat			\runcertman.bat
+data = ZDRIVE\autohardware\runasnpkcs.bat			\runasnpkcs.bat
+data = ZDRIVE\autohardware\runcryptotokens.bat		\runcryptotokens.bat
+data = ZDRIVE\autohardware\runupstests.bat			\runupstests.bat
+data = ZDRIVE\autohardware\runpkcs12tests.bat		\runpkcs12tests.bat
 
-		#ifndef SYMBIAN_JAVA_NOT_INCLUDED
-			data = ZDRIVE\autohardware\runsisinstaller_9.4.bat		\runsisinstaller.bat
-		#endif
-
-		
-
-		data = ZDRIVE\autohardware\runupstests_9.4.bat		\runupstests.bat
-		data = ZDRIVE\autohardware\runpkcs12tests_9.4.bat		\runpkcs12tests.bat
-
-#ifdef SYMBIAN_ENABLE_64_BIT_FILE_SERVER_API
 #ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-		data = ZDRIVE\autohardware\runcaftests_wmdrm.bat		\runcaftests.bat
+	data = ZDRIVE\autohardware\runcaftests_wmdrm.bat		\runcaftests.bat
 #else
-		data = ZDRIVE\autohardware\runcaftests_9.6.bat		\runcaftests.bat
+	data = ZDRIVE\autohardware\runcaftests.bat		\runcaftests.bat
 #endif
 
+
+#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
+	data = ZDRIVE\autohardware\runcrypto_wmdrm.bat	               	\runcrypto.bat
 #else
-		data = ZDRIVE\autohardware\runcaftests_9.5.bat		\runcaftests.bat
-#endif
-		
-
+	#ifdef __SECURITY_MANDATORY_SWICERTSTORE__
+		data = ZDRIVE\autohardware\runhardwarecrypto.bat				\runcrypto.bat
+	#else
+		data = ZDRIVE\autohardware\runcrypto.bat	               	\runcrypto.bat
 	#endif
-
-#elif __SECURITY_MANDATORY_SWICERTSTORE__
-	
-	#ifdef SYMBIAN_AUTH_SERVER
-		#ifdef SYMBIAN_ENABLE_POST_MARKET_AUTHENTICATION_PLUGINS
-			data = ZDRIVE\autohardware\runauthtests_macroenabled.bat		\runauthtests.bat
-			data = ZDRIVE\autohardware\testsecurity_9.6_mcs.bat			\testsecurity.bat
-		#else
-			data = ZDRIVE\autohardware\testsecurity_9.6_mcs.bat			\testsecurity.bat
-			data = ZDRIVE\autohardware\runauthtests.bat				\runauthtests.bat
-		#endif	//SYMBIAN_ENABLE_POST_MARKET_AUTHENTICATION_PLUGINS
-		#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-			data = ZDRIVE\autohardware\runfiletokens_useauth.bat		\runfiletokens.bat
-		#elif SYMBIAN_AUTH_SERVER
-			data = ZDRIVE\autohardware\runfiletokens_disableauth.bat		\runfiletokens.bat
-		#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	#else
-		data = ZDRIVE\autohardware\runfiletokens_9.4.bat		\runfiletokens.bat
-		data = ZDRIVE\autohardware\testsecurity_9.5_mcs.bat			\testsecurity.bat
-	#endif // SYMBIAN_AUTH_SERVER
-
-	data = ZDRIVE\autohardware\runcertman_9.5.bat		\runcertman.bat
-	data = ZDRIVE\autohardware\runasnpkcs_9.4.bat		\runasnpkcs.bat
-	data = ZDRIVE\autohardware\runcryptotokens_9.4.bat	\runcryptotokens.bat
-	data = ZDRIVE\autohardware\runswiromtests_9.4_mcs.bat	\runswiromtests.bat
-	
-#elif __SECURITY_JAVA__
-
-#ifndef SYMBIAN_JAVA_NOT_INCLUDED
-	
-	data = ZDRIVE\autohardware\runjavamidletinstaller_9.4.bat      	\runjavamidletinstaller.bat
-	data = ZDRIVE\autohardware\testsecurity_9.4_java.bat	\testsecurity.bat
-#else
-	data = ZDRIVE\autohardware\testsecurity_9.6_crypto.bat	\testsecurity.bat
 #endif
 
-#ifdef SYMBIAN_CRYPTOSPI
-	data = ZDRIVE\autohardware\runcrypto_9.5.bat	               	\runcrypto.bat
-#else
-	data = ZDRIVE\autohardware\runcrypto_9.4.bat	               	\runcrypto.bat
-#endif
-#endif
 
 data = ZDRIVE\autohardware\testsecurityperformance_cryptalg.bat	\testsecurityperformance_cryptalg.bat
 data = ZDRIVE\autohardware\testsecurityperformance_crypto.bat	\testsecurityperformance_crypto.bat
 
+#ifdef SYMBIAN_AUTH_SERVER
+	#ifdef SYMBIAN_ENABLE_POST_MARKET_AUTHENTICATION_PLUGINS
+		data = ZDRIVE\autohardware\runauthtests_macroenabled.bat		\runauthtests.bat
+	#else
+		data = ZDRIVE\autohardware\runauthtests.bat				\runauthtests.bat
+	#endif	//SYMBIAN_ENABLE_POST_MARKET_AUTHENTICATION_PLUGINS
+	#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
+		data = ZDRIVE\autohardware\runfiletokens_useauth.bat		\runfiletokens.bat
+	#else
+		#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
+			data = ZDRIVE\autohardware\runfiletokens_disableauth_with_wmdrm.bat		\runfiletokens.bat
+		#else
+			data = ZDRIVE\autohardware\runfiletokens_disableauth.bat		\runfiletokens.bat
+		#endif
+	#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
+#else
+	data = ZDRIVE\autohardware\runfiletokens.bat		\runfiletokens.bat
+#endif // SYMBIAN_AUTH_SERVER
+
+#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER 
+	data = ZDRIVE\autohardware\testsecurity_sdp_auth.bat		\testsecurity.bat
+#else
+#ifdef SDP_ROM1
+	data = ZDRIVE\autohardware\testsecurity_sdp_newrom.bat		\testsecurity.bat
+#else
+	data = ZDRIVE\autohardware\testsecurity_sdp.bat			\testsecurity.bat
+#endif
+#endif
+	
+
+
+
 //estor.dll is put in ROFS by deafult but we need to put it into CORE as well
 //core version will be used; see DEF113303 for details
 #ifdef __SECURITY_TEST_ROM__
 #ifdef _INTERNAL_MMC
-ROM_IMAGE[0]{
+ROM_IMAGE[0] {
 file = \epoc32\release\armv5\urel\estor.dll \sys\bin\estor.dll
 }
-#elif _NAND2
+#else
+#ifdef _NAND2
 ROM_IMAGE[0] {
 file = \epoc32\release\armv5\urel\estor.dll \sys\bin\estor.dll
 }
 #endif
 #endif
-
+#endif
 
 REM ---------- Comms-Infras ----------
 // ced is not included in release builds by default (in commdb.iby)
@@ -310,7 +201,6 @@
 #include "thindump.iby"
 #include "sntpclient.iby"
 
-
 // *** Additional includes and configuration for SSM Requirements ***
 #ifdef _SSMSTARTUPMODE
 data=MULTI_LINGUIFY(RSC EPOCROOT##epoc32\data\z\private\2000d75b\startup\0\eshell  private\2000d75b\startup\0\eshell)
@@ -328,5 +218,3 @@
 #include "ocsptests.iby"
 
 #endif
-
-
--- a/cryptomgmtlibs/securitytestfw/inc/SecurityTests_apr_9.5.iby	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,216 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-#ifndef __SECURITYTESTS_IBY__
-#define __SECURITYTESTS_IBY__
-
-// We need bigger ROFS files for tests with TBAS
-rofssize=0x2100000
-
-// Save build details in ROM
-data=\buildid.txt                 \buildid.txt
-
-
-
-// This should be included in the Techview.oby file
-// All test data and scripts gets copied to the root of ROM drive.
-// This should be copied to the relevant directory on the C drive.
-
-// platsec.oby should be included, but a problem in rombuild prevents build with watchers disabled and PlatSecEnforceSysBin ON
-//#include "platsec.oby"
-ROM_IMAGE[0] {
-PlatSecDiagnostics ON
-PlatSecEnforcement ON
-PlatSecEnforceSysBin ON
-PlatSecProcessIsolation ON
-}
-
-#include "setcap.iby"
-
-#include "testexecute.iby"
-
-#include "xml.iby" // Needed for security tests
-
-
-#include "streamingcaf.iby"
-
-#ifdef SYMBIAN_UNIVERSAL_INSTALL_FRAMEWORK
-	//Universal Software Install Framework production
-	#include "scr.iby" // Software Component Registry
-	#include "sif.iby"  // Software Install Framework
-	#include "sts.iby"  // Software Transaction Services
-	#include "sifrefinstaller.iby"  // Sif Reference Installer
-#endif //SYMBIAN_UNIVERSAL_INSTALL_FRAMEWORK
-
-#include "securitycommonutils.iby"	
-// Common utils libraries test
-#include "installtestframework.iby"		
-#include "aprrtautils.iby"
-
-#ifdef __SECURITY_NORMAL_SWICERTSTORE__
-
-	#ifdef __SECURITY_ONLYJAVA__
-		
-		#ifndef SYMBIAN_JAVA_NOT_INCLUDED
-			#include "sisinstallertest.iby"
-			#include "JavaMIDletInstallerTest.iby"
-			#include "recjar.iby"
-		#endif
-	#elif __SECURITY_NORMAL__
-
-		#ifndef SYMBIAN_JAVA_NOT_INCLUDED
-  			#include "sisinstallertest.iby"
-		#endif
-
-		#include "tsistestdata.iby" 
-
-	#ifdef SYMBIAN_UNIVERSAL_INSTALL_FRAMEWORK
-		//Universal Software Install Framework tests
-		#include "tscr.iby"
-		#include "tsif.iby"
-		#include "tsts.iby"
-		#include "tsifrefinstaller.iby"
-	#endif //SYMBIAN_UNIVERSAL_INSTALL_FRAMEWORK
-
-		// Extra test data
-		#include "tswi.iby"
-		#include "tswiconsole.iby"
-		#include "tsissignedtestdata.iby"
-
-	#endif
-
-
-	#ifndef SYMBIAN_JAVA_NOT_INCLUDED
-  		// Jar/Jad recogniser needed for CAF tests
-  		#include "recjar.iby"
-	#endif
-	#include "rta.iby"
-
-  
-#elif __SECURITY_MANDATORY_SWICERTSTORE__
-	// SWI cert store data file, with Root5CA mandatory
-	data = \epoc32\winscw\c\tswi\certstore\swicertstore_mandatory.dat	resource\swicertstore.dat attrib=r
-
-  	#include "tsiscorrupttestdata.iby" 
-  
-  	// Extra test data
-  	#include "tswi.iby"
-  	#include "tswiconsole.iby"
-  	#include "tsissignedtestdata.iby"
-
-	
-#elif __SECURITY_JAVA__
-  
-	#ifndef SYMBIAN_JAVA_NOT_INCLUDED
-  		#include "JavaMIDletInstallerTest.iby"
-	#endif
-	
-	#include "rta.iby"
-#endif
-
-
-define ZDRIVE \epoc32\winscw\c
-// This is the bat file to run the security tests automatically
-// comms configuration (and configuration using sim.tsy)
-data = ZDRIVE\auto.cfg					\auto.cfg
-data = ZDRIVE\auto_broken.cfg					\auto_broken.cfg
-data = ZDRIVE\autosimtsy.cfg					\autosimtsy.cfg
-data = ZDRIVE\prompt.cfg					\prompt.cfg
-
-// This the file which used to redirect the request from cam-ocsptest01 to ban-ocsptest01
-data = ZDRIVE\autohardware\hosts		     \hosts
-
-#ifdef __AUTO_HARDWARE_TESTS__
-	data = ZDRIVE\autohardware\autoexec.bat		\autoexec.bat
-#endif
-
-#ifdef __SECURITY_NORMAL_SWICERTSTORE__
-
-	#ifdef __SECURITY_ONLYJAVA__
-
-		#ifndef SYMBIAN_JAVA_NOT_INCLUDED
-		data = ZDRIVE\autohardware\runjavamidletinstaller_9.4.bat      	\runjavamidletinstaller.bat
-		data = ZDRIVE\autohardware\runsisinstaller_9.4.bat		\runsisinstaller.bat
-		data = ZDRIVE\autohardware\testsecurityonlyjava.bat	\testsecurity.bat
-		#endif
-	#elif __SECURITY_NORMAL__
-		#ifdef SYMBIAN_UNIVERSAL_INSTALL_FRAMEWORK
-			data = ZDRIVE\autohardware\testsecurity_9.6_nonmcs.bat	\testsecurity.bat
-			data = ZDRIVE\autohardware\runswiromtests_9.6.bat	\runswiromtests.bat
-			data = ZDRIVE\autohardware\runusiftests.bat		\runusiftests.bat
-			data = ZDRIVE\autohardware\runcommonutilstests.bat	\runcommonutilstests.bat
-		#else
-			data = ZDRIVE\autohardware\testsecurity_9.5_nonmcs.bat	\testsecurity.bat
-			data = ZDRIVE\autohardware\runswiromtests_9.5.bat	\runswiromtests.bat
-		#endif
-
-		#ifndef SYMBIAN_JAVA_NOT_INCLUDED
-			data = ZDRIVE\autohardware\runsisinstaller_9.4.bat		\runsisinstaller.bat
-		#endif
-
-	#endif
-
-#elif __SECURITY_MANDATORY_SWICERTSTORE__
-	data = ZDRIVE\autohardware\testsecurity_9.5_mcs.bat			\testsecurity.bat
-	data = ZDRIVE\autohardware\runswiromtests_9.4_mcs.bat	\runswiromtests.bat
-#elif __SECURITY_JAVA__
-
-#ifndef SYMBIAN_JAVA_NOT_INCLUDED
-	data = ZDRIVE\autohardware\testsecurity_9.4_java.bat	\testsecurity.bat
-	data = ZDRIVE\autohardware\runjavamidletinstaller_9.4.bat      	\runjavamidletinstaller.bat
-#endif
-
-#endif
-
-
-//estor.dll is put in ROFS by deafult but we need to put it into CORE as well
-//core version will be used; see DEF113303 for details
-#ifdef __SECURITY_TEST_ROM__
-#ifdef _NAND2
-ROM_IMAGE[0] {
-file = \epoc32\release\armv5\urel\estor.dll \sys\bin\estor.dll
-}
-#endif
-#endif
-
-
-REM ---------- Comms-Infras ----------
-// ced is not included in release builds by default (in commdb.iby)
-// so we include it explicitly here if _DEBUG is NOT defined
-file=ABI_DIR\BUILD_DIR\ced.exe                      System\Libs\ced.exe
-data=EPOCROOT##epoc32\data\z\system\data\meshpreface1.cfg		system\data\meshpreface1.cfg
-
-file=ABI_DIR\BUILD_DIR\ceddump.exe                  System\Programs\ceddump.exe
-
-file=ABI_DIR\BUILD_DIR\RUNTESTS.EXE                 System\Programs\RUNTESTS.EXE
-
-#include "thindump.iby"
-#include "sntpclient.iby"
-
-// *** Additional includes and configuration for SSM Requirements ***
-#ifdef _SSMSTARTUPMODE
-data=MULTI_LINGUIFY(RSC EPOCROOT##epoc32\data\z\private\2000d75b\startup\0\eshell  private\2000d75b\startup\0\eshell)
-
-// Addition IBY's required
-#include "aplp.iby"
-#include "amastart.iby"
-#include "shma.iby"
-#include "ssrefplugins.iby" 
-#endif
-
-
-#endif
--- a/cryptomgmtlibs/securitytestfw/inc/SecurityTests_sdp_9.5.iby	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,229 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-#ifndef __SECURITYTESTS_IBY__
-#define __SECURITYTESTS_IBY__
-
-// We need bigger ROFS files for tests with TBAS
-rofssize=0x2100000
-
-// Save build details in ROM
-data=\buildid.txt                 \buildid.txt
-
-
-// This should be included in the Techview.oby file
-// All test data and scripts gets copied to the root of ROM drive.
-// This should be copied to the relevant directory on the C drive.
-
-// platsec.oby should be included, but a problem in rombuild prevents build with watchers disabled and PlatSecEnforceSysBin ON
-//#include "platsec.oby"
-ROM_IMAGE[0] {
-PlatSecDiagnostics ON
-PlatSecEnforcement ON
-PlatSecEnforceSysBin ON
-PlatSecProcessIsolation ON
-}
-
-#include "setcap.iby"
-
-#include "testexecute.iby"
-#include "t_testhandler.iby"
-#include "testutil.iby"
-//#include "xml.iby" // Needed for security tests
-
-#include "securityframeworktestserver.iby"
-
-
-#if defined SYMBIAN_KEYSTORE_USE_AUTH_SERVER || defined SDP_ROM1
-
-	#include "ups.iby"
-	#include "tups.iby"
-	#include "asnpkcstests.iby"
-	#include "certmantests.iby"
-	#include "tpkcs7server.iby"     
-	#include "tpkcs12integrationserver.iby"  	
-	#include "ctframeworktests.iby"
-	#include "cryptotests.iby"
-#else
-	#include "streamingcaf.iby"
-	// iby files for caf
-	#include "caf.iby"
-	#include "caftest.iby"
-	#include "reccafconfig.iby"
-	#include "rta.iby"
-	#include "rtatest.iby"
-	#include "cryptotests.iby"
-	#include "tscaf.iby"	
-	#include "randomtests.iby"
-	#include "hashtests.iby"
-
-	#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-	#include "mtputils.iby"
-	#include "mtputilstest.iby"
-	#include "refcafhelper.iby"
-	#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-
-#endif
- 
-	
-// Common utils libraries
-#include "securitycommonutils.iby"
-#include "securitytestframework.iby"	
-#include "secutiltests.iby"
-
-//filetokens and authserver run in both the images.
-#include "filetokenstests.iby"
-
-
-#ifdef SYMBIAN_AUTH_SERVER
-	#include "tAuthSvr.iby"
-	#include "authserver.iby"
-	#include "pinplugin.iby"
-#endif // SYMBIAN_AUTH_SERVER
-
-
-define ZDRIVE \epoc32\winscw\c
-// This is the bat file to run the security tests automatically
-// comms configuration (and configuration using sim.tsy)
-data = ZDRIVE\auto.cfg					\auto.cfg
-data = ZDRIVE\auto_broken.cfg					\auto_broken.cfg
-data = ZDRIVE\autosimtsy.cfg					\autosimtsy.cfg
-data = ZDRIVE\prompt.cfg					\prompt.cfg
-
-// This the file which used to redirect the request from cam-ocsptest01 to ban-ocsptest01
-data = ZDRIVE\autohardware\hosts		     \hosts
-
-
-#ifdef __AUTO_HARDWARE_TESTS__
-	data = ZDRIVE\autohardware\autoexec.bat		\autoexec.bat
-#endif
-
-
-data = ZDRIVE\autohardware\runcertman_9.5.bat			\runcertman.bat
-data = ZDRIVE\autohardware\runasnpkcs_9.4.bat			\runasnpkcs.bat
-data = ZDRIVE\autohardware\runcryptotokens_9.4.bat		\runcryptotokens.bat
-data = ZDRIVE\autohardware\runupstests_9.4.bat			\runupstests.bat
-data = ZDRIVE\autohardware\runpkcs12tests_9.4.bat		\runpkcs12tests.bat
-
-#ifdef SYMBIAN_ENABLE_64_BIT_FILE_SERVER_API
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-	data = ZDRIVE\autohardware\runcaftests_wmdrm.bat		\runcaftests.bat
-#else
-	data = ZDRIVE\autohardware\runcaftests_9.6.bat		\runcaftests.bat
-#endif
-
-#else
-	data = ZDRIVE\autohardware\runcaftests_9.5.bat		\runcaftests.bat
-#endif
-
-#ifdef SYMBIAN_CRYPTOSPI
-	#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-		data = ZDRIVE\autohardware\runcrypto_wmdrm.bat	               	\runcrypto.bat
-	#else
-		#ifdef __SECURITY_MANDATORY_SWICERTSTORE__
-			data = ZDRIVE\autohardware\runhardwarecrypto.bat				\runcrypto.bat
-		#else
-			data = ZDRIVE\autohardware\runcrypto_9.5.bat	               	\runcrypto.bat
-		#endif
-	#endif
-#else
-	data = ZDRIVE\autohardware\runcrypto_9.4.bat	               	\runcrypto.bat
-#endif
-
-
-
-data = ZDRIVE\autohardware\testsecurityperformance_cryptalg.bat	\testsecurityperformance_cryptalg.bat
-data = ZDRIVE\autohardware\testsecurityperformance_crypto.bat	\testsecurityperformance_crypto.bat
-
-#ifdef SYMBIAN_AUTH_SERVER
-#ifdef SYMBIAN_ENABLE_POST_MARKET_AUTHENTICATION_PLUGINS
-	data = ZDRIVE\autohardware\runauthtests_macroenabled.bat		\runauthtests.bat
-#else
-	data = ZDRIVE\autohardware\runauthtests.bat				\runauthtests.bat
-#endif	//SYMBIAN_ENABLE_POST_MARKET_AUTHENTICATION_PLUGINS
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	data = ZDRIVE\autohardware\runfiletokens_useauth.bat		\runfiletokens.bat
-#else
-	#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-		data = ZDRIVE\autohardware\runfiletokens_disableauth_with_wmdrm.bat		\runfiletokens.bat
-	#else
-		data = ZDRIVE\autohardware\runfiletokens_disableauth.bat		\runfiletokens.bat
-	#endif
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-#else
-	data = ZDRIVE\autohardware\runfiletokens_9.4.bat		\runfiletokens.bat
-#endif // SYMBIAN_AUTH_SERVER
-
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER 
-	data = ZDRIVE\autohardware\testsecurity_sdp_auth.bat		\testsecurity.bat
-#else
-#ifdef SDP_ROM1
-	data = ZDRIVE\autohardware\testsecurity_sdp_newrom.bat		\testsecurity.bat
-#else
-	data = ZDRIVE\autohardware\testsecurity_sdp.bat			\testsecurity.bat
-#endif
-#endif
-	
-
-
-
-//estor.dll is put in ROFS by deafult but we need to put it into CORE as well
-//core version will be used; see DEF113303 for details
-#ifdef __SECURITY_TEST_ROM__
-#ifdef _INTERNAL_MMC
-ROM_IMAGE[0] {
-file = \epoc32\release\armv5\urel\estor.dll \sys\bin\estor.dll
-}
-#else
-#ifdef _NAND2
-ROM_IMAGE[0] {
-file = \epoc32\release\armv5\urel\estor.dll \sys\bin\estor.dll
-}
-#endif
-#endif
-#endif
-
-REM ---------- Comms-Infras ----------
-// ced is not included in release builds by default (in commdb.iby)
-// so we include it explicitly here if _DEBUG is NOT defined
-file=ABI_DIR\BUILD_DIR\ced.exe                      System\Libs\ced.exe
-data=EPOCROOT##epoc32\data\z\system\data\meshpreface1.cfg		system\data\meshpreface1.cfg
-
-file=ABI_DIR\BUILD_DIR\ceddump.exe                  System\Programs\ceddump.exe
-
-file=ABI_DIR\BUILD_DIR\RUNTESTS.EXE                 System\Programs\RUNTESTS.EXE
-
-#include "thindump.iby"
-#include "sntpclient.iby"
-
-// *** Additional includes and configuration for SSM Requirements ***
-#ifdef _SSMSTARTUPMODE
-data=MULTI_LINGUIFY(RSC EPOCROOT##epoc32\data\z\private\2000d75b\startup\0\eshell  private\2000d75b\startup\0\eshell)
-
-// Addition IBY's required
-#include "aplp.iby"
-#include "amastart.iby"
-#include "shma.iby"
-#include "ssrefplugins.iby" 
-#endif
-
-
-// DEF139848 fix - Forward Propogation from Symtb9.1 - Illegal dependency from OCSP to HTTP.
-#include "ocsp.iby" 
-#include "ocsptests.iby"
-
-#endif
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/apr_bld.inf	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,53 +0,0 @@
-/*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* BLD.INF
-* Builds for the apr subsystem 
-* This is the bld.inf file for building the secuirity subsystem.  It works for
-* both beech and cedar, using the appropriate macros (if defined) to determine
-* what gets built.
-*
-*/
-
-
-/**
- @file
-*/
-
-#ifndef TOOLS2
-// Disable everything except sistools and security_tools for TOOLS2 target
-
-#include "installtestframework/group/bld.inf"
-
-#include "installconfig/group/bld.inf"
-
-#include "swi/group/bld.inf"
-#include "swi/devicetools/group/bld.inf"
-#include "swi/pctools/group/bld.inf"
-
-
-#ifdef SYMBIAN_UNIVERSAL_INSTALL_FRAMEWORK 
-// SCR must be built before SIF, because SIF depends on the SCR
-#include "usif/scr/group/bld.inf"
-#include "usif/sif/group/bld.inf"
-#include "usif/sts/group/bld.inf"
-#include "usif/examples/installer/group/bld.inf"
-#include "usif/examples/appmanager/group/bld.inf"
-#endif
-
-#endif //TOOLS2
-
-// Only the SISTOOLS (makesis/signsis) and certapp build with TOOLS2
-#include "swi/sistools/group/bld.inf"
-
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/hosts	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptomgmtlibs/securitytestfw/test/autotesting/hosts	Wed Apr 14 17:48:59 2010 +0300
@@ -1,2 +1,2 @@
-10.253.18.15  cam-ocsptest01.intra
-10.253.18.15  cam-OCSPTEST01.prod.ad.symbian.intra
+10.253.27.175  cam-ocsptest01.intra
+10.253.27.175  cam-OCSPTEST01.prod.ad.symbian.intra
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/test/autotesting/runasnpkcs.bat	Wed Apr 14 17:48:59 2010 +0300
@@ -0,0 +1,25 @@
+@rem
+@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+@rem All rights reserved.
+@rem This component and the accompanying materials are made available
+@rem under the terms of the License "Eclipse Public License v1.0"
+@rem which accompanies this distribution, and is available
+@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
+@rem
+@rem Initial Contributors:
+@rem Nokia Corporation - initial contribution.
+@rem
+@rem Contributors:
+@rem
+@rem Description: 
+@rem
+md c:\tkeystore
+md c:\tkeystore\data
+copy /s z:\tkeystore\data\ c:\tkeystore\data\
+copy z:\tasnpkcstests.script c:\tasnpkcstests.script
+tasnpkcs c:\tasnpkcstests.script c:\logs\testexecute\tasnpkcstests.htm
+move c:\logs\testexecute\tasnpkcstests.htm e:\testresults\tasnpkcstests.htm
+del c:\tasnpkcstests.script
+del /s c:\tkeystore\data\
+attrib c:\*.* -r
+del c:\*.*
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/runasnpkcs_9.4.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,25 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-md c:\tkeystore
-md c:\tkeystore\data
-copy /s z:\tkeystore\data\ c:\tkeystore\data\
-copy z:\tasnpkcstests.script c:\tasnpkcstests.script
-tasnpkcs c:\tasnpkcstests.script c:\logs\testexecute\tasnpkcstests.htm
-move c:\logs\testexecute\tasnpkcstests.htm e:\testresults\tasnpkcstests.htm
-del c:\tasnpkcstests.script
-del /s c:\tkeystore\data\
-attrib c:\*.* -r
-del c:\*.*
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/test/autotesting/runcaftests.bat	Wed Apr 14 17:48:59 2010 +0300
@@ -0,0 +1,56 @@
+@rem
+@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+@rem All rights reserved.
+@rem This component and the accompanying materials are made available
+@rem under the terms of the License "Eclipse Public License v1.0"
+@rem which accompanies this distribution, and is available
+@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
+@rem
+@rem Initial Contributors:
+@rem Nokia Corporation - initial contribution.
+@rem
+@rem Contributors:
+@rem
+@rem Description: 
+@rem
+
+md c:\tcaf
+copy /s z:\tcaf\* c:\tcaf
+testexecute c:\tcaf\tcaf.script
+move c:\logs\testexecute\tcaf.htm e:\testresults\tcaf.htm
+del c:\tcaf\*.*
+
+md c:\tcaf
+copy /s z:\tcaf\* c:\tcaf
+testexecute c:\tcaf\tcafnodrmcap.script
+move c:\logs\testexecute\tcafnodrmcap.htm e:\testresults\tcafnodrmcap.htm
+del c:\tcaf\*.*
+
+md c:\tcaf
+copy /s z:\tcaf\* c:\tcaf
+testexecute c:\tcaf\drmfileperformance_armv5.script
+move c:\logs\testexecute\drmfileperformance_armv5.htm e:\testresults\drmfileperformance_armv5.htm
+del c:\tcaf\*.*
+
+md c:\rta
+copy /s z:\rta\* c:\rta
+testexecute c:\rta\rta.script
+move c:\logs\testexecute\rta.htm e:\testresults\rta.htm
+del c:\rta\*.*
+
+md c:\tcaf
+md c:\tcaf\tscaf
+copy /s z:\tcaf\tscaf\* c:\tcaf\tscaf
+testexecute c:\tcaf\tscaf\tscaf.script
+move c:\logs\testexecute\tscaf.htm e:\testresults\tscaf.htm
+
+md c:\rta
+copy /s z:\rta\* c:\rta
+testexecute c:\rta\rta_64bit.script
+move c:\logs\testexecute\rta_64bit.htm e:\testresults\rta_64bit.htm
+del c:\rta\*.*
+
+md c:\tcaf
+copy /s z:\tcaf\* c:\tcaf
+testexecute c:\tcaf\consumerstep_64bit.script
+move c:\logs\testexecute\consumerstep_64bit.htm e:\testresults\consumerstep_64bit.htm
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/runcaftests_9.4.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,27 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-md c:\tcaf
-copy /s z:\tcaf\* c:\tcaf
-testexecute c:\tcaf\tcaf.script
-move c:\logs\testexecute\tcaf.htm e:\testresults\tcaf.htm
-del c:\tcaf\*.*
-
-md c:\rta
-copy /s z:\rta\* c:\rta
-testexecute c:\rta\rta.script
-move c:\logs\testexecute\rta.htm e:\testresults\rta.htm
-del c:\rta\*.*
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/runcaftests_9.5.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,45 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-md c:\tcaf
-copy /s z:\tcaf\* c:\tcaf
-testexecute c:\tcaf\tcaf.script
-move c:\logs\testexecute\tcaf.htm e:\testresults\tcaf.htm
-del c:\tcaf\*.*
-
-md c:\tcaf
-copy /s z:\tcaf\* c:\tcaf
-testexecute c:\tcaf\tcafnodrmcap.script
-move c:\logs\testexecute\tcafnodrmcap.htm e:\testresults\tcafnodrmcap.htm
-del c:\tcaf\*.*
-
-md c:\tcaf
-copy /s z:\tcaf\* c:\tcaf
-testexecute c:\tcaf\drmfileperformance_armv5.script
-move c:\logs\testexecute\drmfileperformance_armv5.htm e:\testresults\drmfileperformance_armv5.htm
-del c:\tcaf\*.*
-
-md c:\rta
-copy /s z:\rta\* c:\rta
-testexecute c:\rta\rta.script
-move c:\logs\testexecute\rta.htm e:\testresults\rta.htm
-del c:\rta\*.*
-
-md c:\tcaf
-md c:\tcaf\tscaf
-copy /s z:\tcaf\tscaf\* c:\tcaf\tscaf
-testexecute c:\tcaf\tscaf\tscaf.script
-move c:\logs\testexecute\tscaf.htm e:\testresults\tscaf.htm
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/runcaftests_9.6.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,50 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-md c:\tcaf
-copy /s z:\tcaf\* c:\tcaf
-testexecute c:\tcaf\tcaf.script
-move c:\logs\testexecute\tcaf.htm e:\testresults\tcaf.htm
-del c:\tcaf\*.*
-
-md c:\tcaf
-copy /s z:\tcaf\* c:\tcaf
-testexecute c:\tcaf\drmfileperformance_armv5.script
-move c:\logs\testexecute\drmfileperformance_armv5.htm e:\testresults\drmfileperformance_armv5.htm
-del c:\tcaf\*.*
-
-md c:\rta
-copy /s z:\rta\* c:\rta
-testexecute c:\rta\rta.script
-move c:\logs\testexecute\rta.htm e:\testresults\rta.htm
-del c:\rta\*.*
-
-md c:\tcaf
-md c:\tcaf\tscaf
-copy /s z:\tcaf\tscaf\* c:\tcaf\tscaf
-testexecute c:\tcaf\tscaf\tscaf.script
-move c:\logs\testexecute\tscaf.htm e:\testresults\tscaf.htm
-
-md c:\rta
-copy /s z:\rta\* c:\rta
-testexecute c:\rta\rta_64bit.script
-move c:\logs\testexecute\rta_64bit.htm e:\testresults\rta_64bit.htm
-del c:\rta\*.*
-
-md c:\tcaf
-copy /s z:\tcaf\* c:\tcaf
-testexecute c:\tcaf\consumerstep_64bit.script
-move c:\logs\testexecute\consumerstep_64bit.htm e:\testresults\consumerstep_64bit.htm
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/runcaftests_wmdrm.bat	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptomgmtlibs/securitytestfw/test/autotesting/runcaftests_wmdrm.bat	Wed Apr 14 17:48:59 2010 +0300
@@ -22,6 +22,12 @@
 
 md c:\tcaf
 copy /s z:\tcaf\* c:\tcaf
+testexecute c:\tcaf\tcafnodrmcap.script
+move c:\logs\testexecute\tcafnodrmcap.htm e:\testresults\tcafnodrmcap.htm
+del c:\tcaf\*.*
+
+md c:\tcaf
+copy /s z:\tcaf\* c:\tcaf
 testexecute c:\tcaf\drmfileperformance_armv5.script
 move c:\logs\testexecute\drmfileperformance_armv5.htm e:\testresults\drmfileperformance_armv5.htm
 del c:\tcaf\*.*
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/test/autotesting/runcertman.bat	Wed Apr 14 17:48:59 2010 +0300
@@ -0,0 +1,218 @@
+@rem
+@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+@rem All rights reserved.
+@rem This component and the accompanying materials are made available
+@rem under the terms of the License "Eclipse Public License v1.0"
+@rem which accompanies this distribution, and is available
+@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
+@rem
+@rem Initial Contributors:
+@rem Nokia Corporation - initial contribution.
+@rem
+@rem Contributors:
+@rem
+@rem Description: 
+@rem
+copy /s z:\tpkcs7\ c:\tpkcs7\
+testexecute c:\tpkcs7\tpkcs7_v2.script
+move c:\logs\testexecute\tpkcs7_v2.htm e:\testresults\tpkcs7_v2.htm
+testexecute c:\tpkcs7\tcms.script
+move c:\logs\testexecute\tcms.htm e:\testresults\tcms.htm
+testexecute c:\tpkcs7\tinteg_cms.script
+move c:\logs\testexecute\tinteg_cms.htm e:\testresults\tinteg_cms.htm
+del /s c:\tpkcs7\
+
+rem TCERTSTORE
+rem copy tcertstore test data
+copy /s z:\tcertstore\ c:\tcertstore\
+copy z:\certappmanager.txt c:\certappmanager.txt
+copy /s z:\unifiedcertstore2\ c:\unifiedcertstore2\
+copy z:\tcertstore\data\TestKeyStore.txt c:\system\data\testkeystore.txt
+del c:\system\data\cacerts.dat
+
+del c:\system\data\certclients.dat
+t_certstore c:\tcertstore\scripts\t_certstore_sha2.script c:\testresults\t_certstore_sha2.htm
+move c:\testresults\t_certstore_sha2.htm e:\testresults\t_certstore_sha2.htm
+
+rem run tcertstore tests
+t_certstore c:\tcertstore\scripts\unifiedcertstore1-conf1.script c:\logs\testexecute\unifiedcertstore1-conf1.htm
+move c:\logs\testexecute\unifiedcertstore1-conf1.htm e:\testresults\unifiedcertstore1-conf1.htm
+
+del c:\system\data\cacerts.dat
+del c:\system\data\certclients.dat
+t_certstore c:\tcertstore\scripts\unifiedcertstore2-conf1.script c:\logs\testexecute\unifiedcertstore2-conf1.htm
+move c:\logs\testexecute\unifiedcertstore2-conf1.htm e:\testresults\unifiedcertstore2-conf1.htm
+
+del c:\system\data\cacerts.dat
+t_certstore c:\tcertstore\scripts\unifiedcertstore3-conf1.script c:\logs\testexecute\unifiedcertstore3-conf1.htm
+move c:\logs\testexecute\unifiedcertstore3-conf1.htm e:\testresults\unifiedcertstore3-conf1.htm
+
+del c:\system\data\cacerts.dat
+t_certstore c:\tcertstore\scripts\dsa.script c:\logs\testexecute\tcertstore-dsa.htm
+move c:\logs\testexecute\tcertstore-dsa.htm e:\testresults\tcertstore-dsa.htm
+
+del c:\system\data\cacerts.dat
+t_certstore c:\tcertstore\scripts\reload.script c:\logs\testexecute\tcertstore-reload.htm
+move c:\logs\testexecute\tcertstore-reload.htm e:\testresults\tcertstore-reload.htm
+
+del c:\system\data\cacerts.dat
+t_certstore c:\tcertstore\scripts\apipolicing.script c:\logs\testexecute\tcertstore-apipolicing.htm
+move c:\logs\testexecute\tcertstore-apipolicing.htm e:\testresults\tcertstore-apipolicing.htm
+
+del c:\system\data\cacerts.dat
+t_certstore c:\tcertstore\scripts\filecertstore_errors.script c:\logs\testexecute\tcertstore-errors.htm
+move c:\logs\testexecute\tcertstore-errors.htm e:\testresults\tcertstore-errors.htm
+
+del c:\system\data\cacerts.dat
+t_certstore c:\tcertstore\scripts\swicertstore1.script c:\logs\testexecute\swicertstore1.htm
+move c:\logs\testexecute\swicertstore1.htm e:\testresults\swicertstore1.htm
+
+t_certstore c:\tcertstore\scripts\swicertstore4.script c:\logs\testexecute\swicertstore4.htm
+move c:\logs\testexecute\swicertstore4.htm e:\testresults\swicertstore4.htm
+
+del c:\system\data\cacerts.dat
+t_certstore c:\tcertstore\scripts\wri-swicertstore1.script c:\logs\testexecute\wri-swicertstore1.htm
+move c:\logs\testexecute\wri-swicertstore1.htm e:\testresults\wri-swicertstore1.htm
+
+del c:\system\data\cacerts.dat
+
+REM Composite Certstore Configuration CR1393
+del c:\private\101f72a6\cacerts.dat
+del c:\private\101f72a6\certclients.dat
+t_certstore c:\tcertstore\multiple_certstore\scripts\tfilecertstore14.script c:\logs\testexecute\tfilecertstore14.htm
+move c:\logs\testexecute\tfilecertstore14.htm e:\testresults\tfilecertstore14.htm
+
+del c:\private\101f72a6\cacerts.dat
+del c:\private\101f72a6\certclients.dat
+
+rem deleting data on c: to save room and leave slots in root folder
+del /s c:\unifiedcertstore2\
+del /s c:\tcertstore\
+del c:\certappmanager.txt
+attrib c:\*.* -r
+del c:\*.*
+
+rem TOCSP
+rem copy tocsp test data
+copy /s z:\system\tocsp\ c:\system\tocsp\
+del c:\system\data\cacerts.dat
+
+rem run tocsp tests
+tocsp c:\system\tocsp\scripts\OPENSSL.script c:\logs\testexecute\TOCSP_openssl.htm
+del /s c:\system\tocsp\
+copy /s z:\system\tocsp\ c:\system\tocsp\
+
+
+tocsp c:\system\tocsp\scripts\XCERT-LOCAL.script c:\logs\testexecute\xcert_local.htm
+del /s c:\system\tocsp\
+copy /s z:\system\tocsp\ c:\system\tocsp\
+
+
+tocsp c:\system\tocsp\scripts\OPENSSL-LOCAL.script c:\logs\testexecute\xcert_openssl_local.htm
+del /s c:\system\tocsp\
+copy /s z:\system\tocsp\ c:\system\tocsp\
+
+tocsp c:\system\tocsp\scripts\error.script c:\logs\testexecute\ocsp_error.htm
+
+TOCSP c:\SYSTEM\TOCSP\SCRIPTS\DefaultPolicy.script c:\logs\testexecute\TOCSP_DefaultPolicy.htm
+
+rem copy test results to mmc card
+move c:\logs\testexecute\TOCSP_openssl.htm e:\testresults\TOCSP_openssl.htm
+move c:\logs\testexecute\xcert_local.htm e:\testresults\xcert_local.htm
+move c:\logs\testexecute\xcert_openssl_local.htm e:\testresults\xcert_openssl_local.htm
+move c:\logs\testexecute\ocsp_error.htm e:\testresults\ocsp_error.htm
+move c:\logs\testexecute\TOCSP_DefaultPolicy.htm e:\testresults\TOCSP_DefaultPolicy.htm
+
+rem deleting data on c: to save room and leave slots in root folder
+del /s c:\system\tocsp\
+attrib c:\*.* -r
+del c:\*.*
+
+rem TX509
+rem copy tx509 test data
+copy /s z:\tx509\ c:\tx509\
+
+rem run tx509 tests
+tx509 \TX509\SCRIPTS\TX509.script c:\logs\testexecute\tx509.htm
+rem copy results to mmc card 
+move c:\logs\testexecute\tx509.htm e:\testresults\tx509.htm
+rem run tx509 distinguished name tests
+tx509 \tx509\scripts\tx509-dnames.script c:\logs\testexecute\tx509_dnames.htm
+rem copy results to mmc card
+move c:\logs\testexecute\tx509_dnames.htm e:\testresults\tx509_dnames.htm
+rem run tx509 dev certs tests
+tx509 \TX509\SCRIPTS\TX509_DEV_CERTS.script c:\logs\testexecute\tx509_dev_certs.htm
+rem copy results to mmc card
+move c:\logs\testexecute\tx509_dev_certs.htm e:\testresults\tx509_dev_certs.htm
+rem tidy up
+del /s c:\tx509\
+attrib c:\*.* -r
+del c:\*.*
+
+rem TASN1
+rem run tasn1 tests
+copy /s z:\tasn1\ c:\tasn1\
+tasn1 c:\tasn1\scripts\tasn1.script c:\logs\testexecute\tasn1_log.htm
+rem copy test results to mmc card
+move c:\logs\testexecute\tasn1_log.htm e:\testresults\TASN1_log.htm
+del /s c:\tasn1\
+
+
+rem TWTLSCERT
+rem copy twtlscert test data
+copy /s z:\twtlscert\ c:\twtlscert\
+
+rem run twtlscert tests
+twtlscert c:\twtlscert\scripts\twtlscert.script c:\logs\testexecute\twtlscert.htm
+twtlscert c:\twtlscert\scripts\twtlscert1.script c:\logs\testexecute\twtlscert1.htm
+twtlscert c:\twtlscert\scripts\twtlscert2.script c:\logs\testexecute\twtlscert2.htm
+twtlscert c:\twtlscert\scripts\twtlscert3.script c:\logs\testexecute\twtlscert3.htm
+
+rem copy test results to mmc card 
+move c:\logs\testexecute\twtlscert.htm e:\testresults\twtlscert.htm
+move c:\logs\testexecute\twtlscert1.htm e:\testresults\twtlscert1.htm
+move c:\logs\testexecute\twtlscert2.htm e:\testresults\twtlscert2.htm
+move c:\logs\testexecute\twtlscert3.htm e:\testresults\twtlscert3.htm
+
+del /s c:\twtlscert\
+attrib c:\*.* -r
+del c:\*.*
+
+rem TPKIXCERT
+rem copy tpkixcert test data
+copy /s z:\tpkixcert\ c:\tpkixcert\
+copy /s z:\pkixtestdata\ c:\pkixtestdata\
+
+rem run tpkixcert tests
+tpkixcert c:\tpkixcert\scripts\tpkixtest_part1.script c:\logs\testexecute\tpkixtest1.htm
+tpkixcert c:\tpkixcert\scripts\tpkixtest_part2.script c:\logs\testexecute\tpkixtest2.htm
+tpkixcert c:\tpkixcert\scripts\cancel1.script c:\logs\testexecute\cancel1.htm
+
+rem copy test results to mmc card 
+move c:\logs\testexecute\tpkixtest1.htm e:\testresults\tpkixtest1.htm
+move c:\logs\testexecute\tpkixtest2.htm e:\testresults\tpkixtest2.htm
+move c:\logs\testexecute\cancel1.htm e:\testresults\tpkixcancel1.htm
+
+attrib c:\*.* -r
+del c:\*.*
+
+REM tpkcs10_v2 - Uses TEF
+copy /s z:\tpkcs10\ c:\tpkcs10\
+testexecute c:\tpkcs10\scripts\tpkcs10_v2.script
+move c:\logs\testexecute\tpkcs10_v2.htm e:\testresults\tpkcs10_v2.htm
+del /s c:\tpkcs10
+
+REM tpkixcert_tef
+copy /s z:\tpkixcert_tef\ c:\tpkixcert_tef\
+testexecute c:\tpkixcert_tef\scripts\tpkixcert_tef.script
+move c:\logs\testexecute\tpkixcert_tef.htm e:\testresults\tpkixcert_tef.htm
+del /s c:\tpkixcert_tef
+
+attrib c:\*.* -r
+del c:\*.*
+
+del c:\system\data\cacerts.dat
+del c:\system\data\certclients.dat
+
+
+ 
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/runcertman_9.4.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,202 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-copy /s z:\tpkcs7\ c:\tpkcs7\
-testexecute c:\tpkcs7\tpkcs7_v2.script
-move c:\logs\testexecute\tpkcs7_v2.htm e:\testresults\tpkcs7_v2.htm
-testexecute c:\tpkcs7\tcms.script
-move c:\logs\testexecute\tcms.htm e:\testresults\tcms.htm
-testexecute c:\tpkcs7\tinteg_cms.script
-move c:\logs\testexecute\tinteg_cms.htm e:\testresults\tinteg_cms.htm
-del /s c:\tpkcs7\
-
-rem TCERTSTORE
-rem copy tcertstore test data
-copy /s z:\tcertstore\ c:\tcertstore\
-copy z:\certappmanager.txt c:\certappmanager.txt
-copy /s z:\unifiedcertstore2\ c:\unifiedcertstore2\
-copy z:\tcertstore\data\TestKeyStore.txt c:\system\data\testkeystore.txt
-del c:\system\data\cacerts.dat
-
-rem run tcertstore tests
-t_certstore c:\tcertstore\scripts\unifiedcertstore1-conf1.txt c:\testresults\unifiedcertstore1-conf1.txt
-move c:\testresults\unifiedcertstore1-conf1.txt e:\testresults\unifiedcertstore1-conf1.txt
-
-del c:\system\data\cacerts.dat
-del c:\system\data\certclients.dat
-t_certstore c:\tcertstore\scripts\unifiedcertstore2-conf1.txt c:\testresults\unifiedcertstore2-conf1.txt
-move c:\testresults\unifiedcertstore2-conf1.txt e:\testresults\unifiedcertstore2-conf1.txt
-
-del c:\system\data\cacerts.dat
-t_certstore c:\tcertstore\scripts\unifiedcertstore3-conf1.txt c:\testresults\unifiedcertstore3-conf1.txt
-move c:\testresults\unifiedcertstore3-conf1.txt e:\testresults\unifiedcertstore3-conf1.txt
-
-del c:\system\data\cacerts.dat
-t_certstore c:\tcertstore\scripts\dsa.txt c:\testresults\tcertstore-dsa.txt
-move c:\testresults\tcertstore-dsa.txt e:\testresults\tcertstore-dsa.txt
-
-del c:\system\data\cacerts.dat
-t_certstore c:\tcertstore\scripts\reload.txt c:\testresults\tcertstore-reload.txt
-move c:\testresults\tcerstore-reload.txt e:\testresults\tcertstore-reload.txt
-
-del c:\system\data\cacerts.dat
-t_certstore c:\tcertstore\scripts\apipolicing.txt c:\testresults\tcertstore-apipolicing.txt
-move c:\testresults\tcertstore-apipolicing.txt e:\testresults\tcertstore-apipolicing.txt
-
-del c:\system\data\cacerts.dat
-t_certstore c:\tcertstore\scripts\filecertstore_errors.txt c:\testresults\tcertstore-errors.txt
-move c:\testresults\tcertstore-errors.txt e:\testresults\tcertstore-errors.txt
-
-del c:\system\data\cacerts.dat
-t_certstore c:\tcertstore\scripts\swicertstore1.txt c:\testresults\swicertstore.txt
-move c:\testresults\swicertstore.txt e:\testresults\swicertstore.txt
-
-t_certstore c:\tcertstore\scripts\swicertstore4.txt c:\testresults\swicertstore4.txt
-move c:\testresults\swicertstore4.txt e:\testresults\swicertstore4.txt
-
-del c:\system\data\cacerts.dat
-t_certstore c:\tcertstore\scripts\wri-swicertstore1.txt c:\testresults\wri-swicertstore.txt
-move c:\testresults\wri-swicertstore.txt e:\testresults\wri-swicertstore.txt
-
-del c:\system\data\cacerts.dat
-
-
-rem deleting data on c: to save room and leave slots in root folder
-del /s c:\unifiedcertstore2\
-del /s c:\tcertstore\
-del c:\certappmanager.txt
-attrib c:\*.* -r
-del c:\*.*
-
-rem TOCSP
-rem copy tocsp test data
-copy /s z:\system\tocsp\ c:\system\tocsp\
-del c:\system\data\cacerts.dat
-
-rem run tocsp tests
-tocsp c:\system\tocsp\scripts\openssl.txt c:\testresults\tocsp_openssl.log
-del /s c:\system\tocsp\
-copy /s z:\system\tocsp\ c:\system\tocsp\
-
-
-tocsp c:\system\tocsp\scripts\xcert-local.txt c:\testresults\tocsp_xcert_local.log
-del /s c:\system\tocsp\
-copy /s z:\system\tocsp\ c:\system\tocsp\
-
-
-tocsp c:\system\tocsp\scripts\openssl-local.txt c:\testresults\tocsp_openssl_local.log
-del /s c:\system\tocsp\
-copy /s z:\system\tocsp\ c:\system\tocsp\
-
-tocsp c:\system\tocsp\scripts\error.txt c:\testresults\tocsp_error.log
-
-tocsp c:\system\tocsp\scripts\defaultpolicy.txt c:\testresults\tocsp_defaultpolicy.log
-
-tocsp c:\system\tocsp\scripts\httpinterface.txt c:\testresults\tocsp_httpinterface.log
-
-rem copy test results to mmc card
-move c:\testresults\tocsp_openssl.log e:\testresults\tocsp_openssl.log
-move c:\testresults\tocsp_xcert_local.log e:\testresults\tocsp_xcert_local.log
-move c:\testresults\tocsp_openssl_local.log e:\testresults\tocsp_openssl_local.log
-move c:\testresults\tocsp_error.log e:\testresults\tocsp_error.log
-move c:\testresults\tocsp_defaultpolicy.log e:\testresults\tocsp_defaultpolicy.log
-move c:\testresults\tocsp_httpinterface.log e:\testresults\tocsp_httpinterface.log
-
-rem deleting data on c: to save room and leave slots in root folder
-del /s c:\system\tocsp\
-attrib c:\*.* -r
-del c:\*.*
-
-REM Test the JMI CenRep's production version initialization file
-tjmicenrep
-move c:\jmicenreptest.log e:\testresults\jmicenreptest.log
-
-rem TX509
-rem copy tx509 test data
-copy /s z:\tx509\ c:\tx509\
-
-rem run tx509 tests
-tx509 \TX509\SCRIPTS\TX509.TXT c:\testresults\tx509.log
-rem copy results to mmc card 
-move c:\testresults\tx509.log e:\testresults\tx509.log
-rem run tx509 dev certs tests
-tx509 \TX509\SCRIPTS\TX509_DEV_CERTS.TXT c:\testresults\tx509_dev_certs.log
-rem copy results to mmc card
-move c:\testresults\tx509_dev_certs.log e:\testresults\tx509_dev_certs.log
-rem tidy up
-del /s c:\tx509\
-attrib c:\*.* -r
-del c:\*.*
-
-rem TASN1
-rem run tasn1 tests
-copy /s z:\tasn1\ c:\tasn1\
-tasn1 c:\tasn1\scripts\tasn1.txt c:\testresults\tasn1_log.txt
-rem copy test results to mmc card
-move c:\testresults\tasn1_log.txt e:\testresults\TASN1_log.txt
-del /s c:\tasn1\
-
-
-rem TWTLSCERT
-rem copy twtlscert test data
-copy /s z:\twtlscert\ c:\twtlscert\
-
-rem run twtlscert tests
-twtlscert c:\twtlscert\scripts\twtlscert.txt c:\testresults\twtlscert.log
-twtlscert c:\twtlscert\scripts\twtlscert1.txt c:\testresults\twtlscert1.log
-twtlscert c:\twtlscert\scripts\twtlscert2.txt c:\testresults\twtlscert2.log
-twtlscert c:\twtlscert\scripts\twtlscert3.txt c:\testresults\twtlscert3.log
-
-rem copy test results to mmc card 
-move c:\testresults\twtlscert.log e:\testresults\twtlscert.log
-move c:\testresults\twtlscert1.log e:\testresults\twtlscert1.log
-move c:\testresults\twtlscert2.log e:\testresults\twtlscert2.log
-move c:\testresults\twtlscert3.log e:\testresults\twtlscert3.log
-
-del /s c:\twtlscert\
-attrib c:\*.* -r
-del c:\*.*
-
-rem TPKIXCERT
-rem copy tpkixcert test data
-copy /s z:\tpkixcert\ c:\tpkixcert\
-copy /s z:\pkixtestdata\ c:\pkixtestdata\
-
-rem run tpkixcert tests
-tpkixcert c:\tpkixcert\scripts\tpkixtest_part1.txt c:\testresults\tpkixtest1.txt
-tpkixcert c:\tpkixcert\scripts\tpkixtest_part2.txt c:\testresults\tpkixtest2.txt
-tpkixcert c:\tpkixcert\scripts\cancel1.txt c:\testresults\cancel1.txt
-
-rem copy test results to mmc card 
-move c:\testresults\tpkixtest1.txt e:\testresults\tpkixtest1.txt
-move c:\testresults\tpkixtest2.txt e:\testresults\tpkixtest2.txt
-move c:\testresults\cancel1.txt e:\testresults\tpkixcancel1.txt
-
-attrib c:\*.* -r
-del c:\*.*
-
-REM tpkcs10_v2 - Uses TEF
-copy /s z:\tpkcs10\ c:\tpkcs10\
-testexecute c:\tpkcs10\scripts\tpkcs10_v2.script
-move c:\logs\testexecute\tpkcs10_v2.htm e:\testresults\tpkcs10_v2.htm
-del /s c:\tpkcs10
-attrib c:\*.* -r
-del c:\*.*
-
-del c:\system\data\cacerts.dat
-del c:\system\data\certclients.dat
-
-
- 
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/runcertman_9.5.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,218 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-copy /s z:\tpkcs7\ c:\tpkcs7\
-testexecute c:\tpkcs7\tpkcs7_v2.script
-move c:\logs\testexecute\tpkcs7_v2.htm e:\testresults\tpkcs7_v2.htm
-testexecute c:\tpkcs7\tcms.script
-move c:\logs\testexecute\tcms.htm e:\testresults\tcms.htm
-testexecute c:\tpkcs7\tinteg_cms.script
-move c:\logs\testexecute\tinteg_cms.htm e:\testresults\tinteg_cms.htm
-del /s c:\tpkcs7\
-
-rem TCERTSTORE
-rem copy tcertstore test data
-copy /s z:\tcertstore\ c:\tcertstore\
-copy z:\certappmanager.txt c:\certappmanager.txt
-copy /s z:\unifiedcertstore2\ c:\unifiedcertstore2\
-copy z:\tcertstore\data\TestKeyStore.txt c:\system\data\testkeystore.txt
-del c:\system\data\cacerts.dat
-
-del c:\system\data\certclients.dat
-t_certstore c:\tcertstore\scripts\t_certstore_sha2.script c:\testresults\t_certstore_sha2.htm
-move c:\testresults\t_certstore_sha2.htm e:\testresults\t_certstore_sha2.htm
-
-rem run tcertstore tests
-t_certstore c:\tcertstore\scripts\unifiedcertstore1-conf1.script c:\logs\testexecute\unifiedcertstore1-conf1.htm
-move c:\logs\testexecute\unifiedcertstore1-conf1.htm e:\testresults\unifiedcertstore1-conf1.htm
-
-del c:\system\data\cacerts.dat
-del c:\system\data\certclients.dat
-t_certstore c:\tcertstore\scripts\unifiedcertstore2-conf1.script c:\logs\testexecute\unifiedcertstore2-conf1.htm
-move c:\logs\testexecute\unifiedcertstore2-conf1.htm e:\testresults\unifiedcertstore2-conf1.htm
-
-del c:\system\data\cacerts.dat
-t_certstore c:\tcertstore\scripts\unifiedcertstore3-conf1.script c:\logs\testexecute\unifiedcertstore3-conf1.htm
-move c:\logs\testexecute\unifiedcertstore3-conf1.htm e:\testresults\unifiedcertstore3-conf1.htm
-
-del c:\system\data\cacerts.dat
-t_certstore c:\tcertstore\scripts\dsa.script c:\logs\testexecute\tcertstore-dsa.htm
-move c:\logs\testexecute\tcertstore-dsa.htm e:\testresults\tcertstore-dsa.htm
-
-del c:\system\data\cacerts.dat
-t_certstore c:\tcertstore\scripts\reload.script c:\logs\testexecute\tcertstore-reload.htm
-move c:\logs\testexecute\tcertstore-reload.htm e:\testresults\tcertstore-reload.htm
-
-del c:\system\data\cacerts.dat
-t_certstore c:\tcertstore\scripts\apipolicing.script c:\logs\testexecute\tcertstore-apipolicing.htm
-move c:\logs\testexecute\tcertstore-apipolicing.htm e:\testresults\tcertstore-apipolicing.htm
-
-del c:\system\data\cacerts.dat
-t_certstore c:\tcertstore\scripts\filecertstore_errors.script c:\logs\testexecute\tcertstore-errors.htm
-move c:\logs\testexecute\tcertstore-errors.htm e:\testresults\tcertstore-errors.htm
-
-del c:\system\data\cacerts.dat
-t_certstore c:\tcertstore\scripts\swicertstore1.script c:\logs\testexecute\swicertstore1.htm
-move c:\logs\testexecute\swicertstore1.htm e:\testresults\swicertstore1.htm
-
-t_certstore c:\tcertstore\scripts\swicertstore4.script c:\logs\testexecute\swicertstore4.htm
-move c:\logs\testexecute\swicertstore4.htm e:\testresults\swicertstore4.htm
-
-del c:\system\data\cacerts.dat
-t_certstore c:\tcertstore\scripts\wri-swicertstore1.script c:\logs\testexecute\wri-swicertstore1.htm
-move c:\logs\testexecute\wri-swicertstore1.htm e:\testresults\wri-swicertstore1.htm
-
-del c:\system\data\cacerts.dat
-
-REM Composite Certstore Configuration CR1393
-del c:\private\101f72a6\cacerts.dat
-del c:\private\101f72a6\certclients.dat
-t_certstore c:\tcertstore\multiple_certstore\scripts\tfilecertstore14.script c:\logs\testexecute\tfilecertstore14.htm
-move c:\logs\testexecute\tfilecertstore14.htm e:\testresults\tfilecertstore14.htm
-
-del c:\private\101f72a6\cacerts.dat
-del c:\private\101f72a6\certclients.dat
-
-rem deleting data on c: to save room and leave slots in root folder
-del /s c:\unifiedcertstore2\
-del /s c:\tcertstore\
-del c:\certappmanager.txt
-attrib c:\*.* -r
-del c:\*.*
-
-rem TOCSP
-rem copy tocsp test data
-copy /s z:\system\tocsp\ c:\system\tocsp\
-del c:\system\data\cacerts.dat
-
-rem run tocsp tests
-tocsp c:\system\tocsp\scripts\OPENSSL.script c:\logs\testexecute\TOCSP_openssl.htm
-del /s c:\system\tocsp\
-copy /s z:\system\tocsp\ c:\system\tocsp\
-
-
-tocsp c:\system\tocsp\scripts\XCERT-LOCAL.script c:\logs\testexecute\xcert_local.htm
-del /s c:\system\tocsp\
-copy /s z:\system\tocsp\ c:\system\tocsp\
-
-
-tocsp c:\system\tocsp\scripts\OPENSSL-LOCAL.script c:\logs\testexecute\xcert_openssl_local.htm
-del /s c:\system\tocsp\
-copy /s z:\system\tocsp\ c:\system\tocsp\
-
-tocsp c:\system\tocsp\scripts\error.script c:\logs\testexecute\ocsp_error.htm
-
-TOCSP c:\SYSTEM\TOCSP\SCRIPTS\DefaultPolicy.script c:\logs\testexecute\TOCSP_DefaultPolicy.htm
-
-rem copy test results to mmc card
-move c:\logs\testexecute\TOCSP_openssl.htm e:\testresults\TOCSP_openssl.htm
-move c:\logs\testexecute\xcert_local.htm e:\testresults\xcert_local.htm
-move c:\logs\testexecute\xcert_openssl_local.htm e:\testresults\xcert_openssl_local.htm
-move c:\logs\testexecute\ocsp_error.htm e:\testresults\ocsp_error.htm
-move c:\logs\testexecute\TOCSP_DefaultPolicy.htm e:\testresults\TOCSP_DefaultPolicy.htm
-
-rem deleting data on c: to save room and leave slots in root folder
-del /s c:\system\tocsp\
-attrib c:\*.* -r
-del c:\*.*
-
-rem TX509
-rem copy tx509 test data
-copy /s z:\tx509\ c:\tx509\
-
-rem run tx509 tests
-tx509 \TX509\SCRIPTS\TX509.script c:\logs\testexecute\tx509.htm
-rem copy results to mmc card 
-move c:\logs\testexecute\tx509.htm e:\testresults\tx509.htm
-rem run tx509 distinguished name tests
-tx509 \tx509\scripts\tx509-dnames.script c:\logs\testexecute\tx509_dnames.htm
-rem copy results to mmc card
-move c:\logs\testexecute\tx509_dnames.htm e:\testresults\tx509_dnames.htm
-rem run tx509 dev certs tests
-tx509 \TX509\SCRIPTS\TX509_DEV_CERTS.script c:\logs\testexecute\tx509_dev_certs.htm
-rem copy results to mmc card
-move c:\logs\testexecute\tx509_dev_certs.htm e:\testresults\tx509_dev_certs.htm
-rem tidy up
-del /s c:\tx509\
-attrib c:\*.* -r
-del c:\*.*
-
-rem TASN1
-rem run tasn1 tests
-copy /s z:\tasn1\ c:\tasn1\
-tasn1 c:\tasn1\scripts\tasn1.script c:\logs\testexecute\tasn1_log.htm
-rem copy test results to mmc card
-move c:\logs\testexecute\tasn1_log.htm e:\testresults\TASN1_log.htm
-del /s c:\tasn1\
-
-
-rem TWTLSCERT
-rem copy twtlscert test data
-copy /s z:\twtlscert\ c:\twtlscert\
-
-rem run twtlscert tests
-twtlscert c:\twtlscert\scripts\twtlscert.script c:\logs\testexecute\twtlscert.htm
-twtlscert c:\twtlscert\scripts\twtlscert1.script c:\logs\testexecute\twtlscert1.htm
-twtlscert c:\twtlscert\scripts\twtlscert2.script c:\logs\testexecute\twtlscert2.htm
-twtlscert c:\twtlscert\scripts\twtlscert3.script c:\logs\testexecute\twtlscert3.htm
-
-rem copy test results to mmc card 
-move c:\logs\testexecute\twtlscert.htm e:\testresults\twtlscert.htm
-move c:\logs\testexecute\twtlscert1.htm e:\testresults\twtlscert1.htm
-move c:\logs\testexecute\twtlscert2.htm e:\testresults\twtlscert2.htm
-move c:\logs\testexecute\twtlscert3.htm e:\testresults\twtlscert3.htm
-
-del /s c:\twtlscert\
-attrib c:\*.* -r
-del c:\*.*
-
-rem TPKIXCERT
-rem copy tpkixcert test data
-copy /s z:\tpkixcert\ c:\tpkixcert\
-copy /s z:\pkixtestdata\ c:\pkixtestdata\
-
-rem run tpkixcert tests
-tpkixcert c:\tpkixcert\scripts\tpkixtest_part1.script c:\logs\testexecute\tpkixtest1.htm
-tpkixcert c:\tpkixcert\scripts\tpkixtest_part2.script c:\logs\testexecute\tpkixtest2.htm
-tpkixcert c:\tpkixcert\scripts\cancel1.script c:\logs\testexecute\cancel1.htm
-
-rem copy test results to mmc card 
-move c:\logs\testexecute\tpkixtest1.htm e:\testresults\tpkixtest1.htm
-move c:\logs\testexecute\tpkixtest2.htm e:\testresults\tpkixtest2.htm
-move c:\logs\testexecute\cancel1.htm e:\testresults\tpkixcancel1.htm
-
-attrib c:\*.* -r
-del c:\*.*
-
-REM tpkcs10_v2 - Uses TEF
-copy /s z:\tpkcs10\ c:\tpkcs10\
-testexecute c:\tpkcs10\scripts\tpkcs10_v2.script
-move c:\logs\testexecute\tpkcs10_v2.htm e:\testresults\tpkcs10_v2.htm
-del /s c:\tpkcs10
-
-REM tpkixcert_tef
-copy /s z:\tpkixcert_tef\ c:\tpkixcert_tef\
-testexecute c:\tpkixcert_tef\scripts\tpkixcert_tef.script
-move c:\logs\testexecute\tpkixcert_tef.htm e:\testresults\tpkixcert_tef.htm
-del /s c:\tpkixcert_tef
-
-attrib c:\*.* -r
-del c:\*.*
-
-del c:\system\data\cacerts.dat
-del c:\system\data\certclients.dat
-
-
- 
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/test/autotesting/runcrypto.bat	Wed Apr 14 17:48:59 2010 +0300
@@ -0,0 +1,149 @@
+@rem
+@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+@rem All rights reserved.
+@rem This component and the accompanying materials are made available
+@rem under the terms of the License "Eclipse Public License v1.0"
+@rem which accompanies this distribution, and is available
+@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
+@rem
+@rem Initial Contributors:
+@rem Nokia Corporation - initial contribution.
+@rem
+@rem Contributors:
+@rem
+@rem Description: 
+@rem
+
+REM hash
+copy /s z:\thash\ c:\thash\
+thash
+move c:\hashlog.txt c:\testresults\
+move c:\testresults\hashlog.txt e:\testresults\hashlog.txt
+del /s c:\thash\
+
+REM random
+t_random
+move c:\t_random.log c:\testresults\
+move c:\testresults\t_random.log e:\testresults\t_random.log
+
+REM padding - uses testexecute framework
+copy /s z:\tpadding\ c:\tpadding\
+testexecute c:\tpadding\tpadding.script
+move c:\logs\testexecute\tpadding.htm e:\testresults\tpadding.htm
+del /s c:\tpadding\
+
+REM new cryptospi tests
+copy /s z:\testdata\tcryptospi\ c:\testdata\tcryptospi\
+testexecute z:\testdata\tcryptospi\scripts\tcryptospi.script
+move c:\logs\testexecute\tcryptospi.htm e:\testresults\tcryptospi.htm
+del /s c:\testdata\tcryptospi\
+
+REM crypto, asymmetric
+
+REM tasymmetric z:\tasymmetric\asymmetricPerformance.txt c:\testresults\asymmetricPerformance.log
+
+tasymmetric z:\tasymmetric\tasymmetrictests.script c:\logs\testexecute\tasymmetrictests.htm
+move c:\logs\testexecute\tasymmetrictests.htm e:\testresults\tasymmetrictests.htm
+
+REM crypto, symmetric
+
+tsymmetric z:\tsymmetric\tsymmetrictests.script c:\logs\testexecute\tsymmetrictests.htm
+move c:\logs\testexecute\tsymmetrictests.htm e:\testresults\tsymmetrictests.htm
+
+tsymmetric z:\tsymmetric\AESECBVectorsScript.script c:\logs\testexecute\AESECBVectorsScript.htm
+move c:\logs\testexecute\AESECBVectorsScript.htm e:\testresults\AESECBVectorsScript.htm
+
+tsymmetric z:\tsymmetric\AESECB_KAT_VT.script c:\logs\testexecute\AESECB_KAT_VT.htm
+move c:\logs\testexecute\AESECB_KAT_VT.htm e:\testresults\AESECB_KAT_VT.htm
+
+tsymmetric z:\tsymmetric\AESECB_KAT_VK.script c:\logs\testexecute\AESECB_KAT_VK.htm
+move c:\logs\testexecute\AESECB_KAT_VK.htm e:\testresults\AESECB_KAT_VK.htm
+
+tsymmetric z:\tsymmetric\AESMonteCarloEncryptECB128.script c:\logs\testexecute\AESMonteCarloEncryptECB128.htm
+move c:\logs\testexecute\AESMonteCarloEncryptECB128.htm e:\testresults\AESMonteCarloEncryptECB128.htm
+
+tsymmetric z:\tsymmetric\AESMonteCarloEncryptECB192.script c:\logs\testexecute\AESMonteCarloEncryptECB192.htm
+move c:\logs\testexecute\AESMonteCarloEncryptECB192.htm e:\testresults\AESMonteCarloEncryptECB192.htm
+
+tsymmetric z:\tsymmetric\AESMonteCarloEncryptECB256.script c:\logs\testexecute\AESMonteCarloEncryptECB256.htm
+move c:\logs\testexecute\AESMonteCarloEncryptECB256.htm e:\testresults\AESMonteCarloEncryptECB256.htm
+
+tsymmetric z:\tsymmetric\AESMonteCarloDecryptECB128.script c:\logs\testexecute\AESMonteCarloDecryptECB128.htm
+move c:\logs\testexecute\AESMonteCarloDecryptECB128.htm e:\testresults\AESMonteCarloDecryptECB128.htm
+
+tsymmetric z:\tsymmetric\AESMonteCarloDecryptECB192.script c:\logs\testexecute\AESMonteCarloDecryptECB192.htm
+move c:\logs\testexecute\AESMonteCarloDecryptECB192.htm e:\testresults\AESMonteCarloDecryptECB192.htm
+
+tsymmetric z:\tsymmetric\AESMonteCarloDecryptECB256.script c:\logs\testexecute\AESMonteCarloDecryptECB256.htm
+move c:\logs\testexecute\AESMonteCarloDecryptECB256.htm e:\testresults\AESMonteCarloDecryptECB256.htm
+
+tsymmetric z:\tsymmetric\AESMonteCarloEncryptCBC128.script c:\logs\testexecute\AESMonteCarloEncryptCBC128.htm
+move c:\logs\testexecute\AESMonteCarloEncryptCBC128.htm e:\testresults\AESMonteCarloEncryptCBC128.htm
+
+tsymmetric z:\tsymmetric\AESMonteCarloEncryptCBC192A.script c:\logs\testexecute\AESMonteCarloEncryptCBC192A.htm
+move c:\logs\testexecute\AESMonteCarloEncryptCBC192A.htm e:\testresults\AESMonteCarloEncryptCBC192A.htm
+
+tsymmetric z:\tsymmetric\AESMonteCarloEncryptCBC192B.script c:\logs\testexecute\AESMonteCarloEncryptCBC192B.htm
+move c:\logs\testexecute\AESMonteCarloEncryptCBC192B.htm e:\testresults\AESMonteCarloEncryptCBC192B.htm
+
+tsymmetric z:\tsymmetric\AESMonteCarloEncryptCBC256.script c:\logs\testexecute\AESMonteCarloEncryptCBC256.htm
+move c:\logs\testexecute\AESMonteCarloEncryptCBC256.htm e:\testresults\AESMonteCarloEncryptCBC256.htm
+
+tsymmetric z:\tsymmetric\AESMonteCarloDecryptCBC128.script c:\logs\testexecute\AESMonteCarloDecryptCBC128.htm
+move c:\logs\testexecute\AESMonteCarloDecryptCBC128.htm e:\testresults\AESMonteCarloDecryptCBC128.htm
+
+tsymmetric z:\tsymmetric\AESMonteCarloDecryptCBC192.script c:\logs\testexecute\AESMonteCarloDecryptCBC192.htm
+move c:\logs\testexecute\AESMonteCarloDecryptCBC192.htm e:\testresults\AESMonteCarloDecryptCBC192.htm
+
+tsymmetric z:\tsymmetric\AESMonteCarloDecryptCBC256.script c:\logs\testexecute\AESMonteCarloDecryptCBC256.htm
+move c:\logs\testexecute\AESMonteCarloDecryptCBC256.htm e:\testresults\AESMonteCarloDecryptCBC256.htm
+
+
+
+REM crypto, bigint
+
+tbigint z:\tbigint\tconstructiontests.script c:\logs\testexecute\tconstruction.htm
+move c:\logs\testexecute\tconstruction.htm e:\testresults\tconstruction.htm
+
+tbigint z:\tbigint\tbasicmathstests.script c:\logs\testexecute\tbasicmaths.htm
+move c:\logs\testexecute\tbasicmaths.htm e:\testresults\tbasicmaths.htm
+
+tbigint z:\tbigint\tmontgomerytests.script c:\logs\testexecute\tmontgomery.htm
+move c:\logs\testexecute\tmontgomery.htm e:\testresults\tmontgomery.htm
+
+REM tbigint z:\tbigint\tperformancetests.script c:\logs\testexecute\tperformance.htm
+REM move c:\logs\testexecute\tperformance.htm e:\testresults\tperformance.htm
+
+tbigint z:\tbigint\tprimetests.script c:\logs\testexecute\tprime.htm
+move c:\logs\testexecute\tprime.htm e:\testresults\tprime.htm
+
+REM tbigint z:\tbigint\tprimetests2.script c:\logs\testexecute\tprime2.htm
+REM move c:\logs\testexecute\tprime2.htm e:\testresults\tprime2.htm
+
+tbigint z:\tbigint\tprimefailuretests.script  c:\logs\testexecute\tprimefailure.htm
+move c:\logs\testexecute\tprimefailure.htm e:\testresults\tprimefailure.htm
+
+tbigint z:\tbigint\tprimegen.script c:\logs\testexecute\tprimegen.htm
+move c:\logs\testexecute\tprimegen.htm e:\testresults\tprimegen.htm
+
+
+
+REM crypto, tpkcs5kdf
+md c:\tpkcs5kdf
+
+copy z:\tpkcs12kdftests.script c:\tpkcs5kdf\tpkcs12kdftests.script
+tpkcs5kdf c:\tpkcs5kdf\tpkcs12kdftests.script c:\tpkcs5kdf\tpkcs12kdftests.htm
+move c:\tpkcs5kdf\tpkcs12kdftests.htm e:\testresults\tpkcs12kdftests.htm
+del /s c:\tpkcs5kdf\
+
+
+REM crypto, pbe
+
+md c:\tpbe
+copy z:\tpbe\*.dat c:\tpbe
+attrib c:\tpbe\strong.dat -r
+attrib c:\tpbe\weak.dat -r
+tpbe z:\tpbe\tpbetests_v2.script c:\logs\testexecute\tpbetestsv2.htm
+move c:\logs\testexecute\tpbetestsv2.htm e:\testresults\tpbetestsv2.htm
+
+del /s c:\tpbe\
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/runcrypto_9.4.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,115 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-copy /s z:\thash\ c:\thash\
-thash
-move c:\hashlog.txt c:\testresults\
-move c:\testresults\hashlog.txt e:\testresults\hashlog.txt
-
-REM random
-t_random
-move c:\t_random.log c:\testresults\
-move c:\testresults\t_random.log e:\testresults\t_random.log
-
-
-REM padding - uses testexecute framework
-copy /s z:\tpadding\ c:\tpadding\
-testexecute c:\tpadding\tpadding.script
-move c:\logs\testexecute\tpadding.htm e:\testresults\tpadding.htm
-del /s c:\tpadding\
-
-REM crypto, asymmetric
-
-tasymmetric z:\tasymmetric\tasymmetrictests.txt c:\testresults\tasymmetrictests.log
-REM tasymmetric z:\tasymmetric\asymmetricPerformance.txt c:\testresults\asymmetricPerformance.log
-
-move c:\testresults\tasymmetrictests.log e:\testresults\tasymmetrictests.log
-
-REM crypto, symmetric
-
-tsymmetric z:\tsymmetric\tsymmetrictests.txt c:\testresults\tsymmetrictests.log
-tsymmetric z:\tsymmetric\AESECBVectorsScript.txt c:\testresults\AESECBVectorsScript.log
-tsymmetric z:\tsymmetric\AESECB_KAT_VT.txt c:\testresults\AESECB_KAT_VT.log
-tsymmetric z:\tsymmetric\AESECB_KAT_VK.txt c:\testresults\AESECB_KAT_VK.log
-tsymmetric z:\tsymmetric\AESMonteCarloEncryptECB128.txt c:\testresults\AESMonteCarloEncryptECB128.log
-tsymmetric z:\tsymmetric\AESMonteCarloEncryptECB192.txt c:\testresults\AESMonteCarloEncryptECB192.log
-tsymmetric z:\tsymmetric\AESMonteCarloEncryptECB256.txt c:\testresults\AESMonteCarloEncryptECB256.log
-tsymmetric z:\tsymmetric\AESMonteCarloDecryptECB128.txt c:\testresults\AESMonteCarloDecryptECB128.log
-tsymmetric z:\tsymmetric\AESMonteCarloDecryptECB192.txt c:\testresults\AESMonteCarloDecryptECB192.log
-tsymmetric z:\tsymmetric\AESMonteCarloDecryptECB256.txt c:\testresults\AESMonteCarloDecryptECB256.log
-tsymmetric z:\tsymmetric\AESMonteCarloEncryptCBC128.txt c:\testresults\AESMonteCarloEncryptCBC128.log
-tsymmetric z:\tsymmetric\AESMonteCarloEncryptCBC192.txt c:\testresults\AESMonteCarloEncryptCBC192.log
-tsymmetric z:\tsymmetric\AESMonteCarloEncryptCBC256.txt c:\testresults\AESMonteCarloEncryptCBC256.log
-tsymmetric z:\tsymmetric\AESMonteCarloDecryptCBC128.txt c:\testresults\AESMonteCarloDecryptCBC128.log
-tsymmetric z:\tsymmetric\AESMonteCarloDecryptCBC192.txt c:\testresults\AESMonteCarloDecryptCBC192.log
-tsymmetric z:\tsymmetric\AESMonteCarloDecryptCBC256.txt c:\testresults\AESMonteCarloDecryptCBC256.log
-
-
-rem copy logs to mmc card
-move c:\testresults\tsymmetrictests.log e:\testresults\tsymmetrictests.log
-move c:\testresults\AESECBVectorsScript.log e:\testresults\AESECBVectorsScript.log
-move c:\testresults\AESECB_KAT_VT.log e:\testresults\AESECB_KAT_VT.log
-move c:\testresults\AESECB_KAT_VK.log e:\testresults\AESECB_KAT_VK.log
-move c:\testresults\AESMonteCarloEncryptECB128.log e:\testresults\AESMonteCarloEncryptECB128.log
-move c:\testresults\AESMonteCarloEncryptECB192.log e:\testresults\AESMonteCarloEncryptECB192.log
-move c:\testresults\AESMonteCarloEncryptECB256.log e:\testresults\AESMonteCarloEncryptECB256.log
-move c:\testresults\AESMonteCarloDecryptECB128.log e:\testresults\AESMonteCarloDecryptECB128.log
-move c:\testresults\AESMonteCarloDecryptECB192.log e:\testresults\AESMonteCarloDecryptECB192.log
-move c:\testresults\AESMonteCarloDecryptECB256.log e:\testresults\AESMonteCarloDecryptECB256.log
-move c:\testresults\AESMonteCarloEncryptCBC128.log e:\testresults\AESMonteCarloEncryptCBC128.log
-move c:\testresults\AESMonteCarloEncryptCBC192.log e:\testresults\AESMonteCarloEncryptCBC192.log
-move c:\testresults\AESMonteCarloEncryptCBC256.log e:\testresults\AESMonteCarloEncryptCBC256.log
-move c:\testresults\AESMonteCarloDecryptCBC128.log e:\testresults\AESMonteCarloDecryptCBC128.log
-move c:\testresults\AESMonteCarloDecryptCBC192.log e:\testresults\AESMonteCarloDecryptCBC192.log
-move c:\testresults\AESMonteCarloDecryptCBC256.log e:\testresults\AESMonteCarloDecryptCBC256.log
-
-REM crypto, bigint
-
-tbigint z:\tbigint\tconstructiontests.txt c:\testresults\tconstruction.log
-tbigint z:\tbigint\tbasicmathstests.txt c:\testresults\tbasicmaths.log
-tbigint z:\tbigint\tmontgomerytests.txt c:\testresults\tmontgomery.log
-REM tbigint z:\tbigint\tperformancetests.txt c:\testresults\tperformance.log
-tbigint z:\tbigint\tprimetests.txt c:\testresults\tprime.log
-REM tbigint z:\tbigint\tprimetests2.txt c:\testresults\tprime2.log
-tbigint z:\tbigint\tprimefailuretests.txt  c:\testresults\tprimefailure.log
-tbigint z:\tbigint\tprimegen.txt c:\testresults\tprimegen.log
-
-rem copy logs to mmc card
-move c:\testresults\tconstruction.log e:\testresults\tconstruction.log
-move c:\testresults\tbasicmaths.log e:\testresults\tbasicmaths.log
-move c:\testresults\tmontgomery.log e:\testresults\tmontgomery.log
-REM move c:\testresults\tperformance.log e:\testresults\tperformance.log
-move c:\testresults\tprime.log e:\testresults\tprime.log
-REM move c:\testresults\tprime2.log e:\testresults\tprime2.log
-move c:\testresults\tprimefailure.log e:\testresults\tprimefailure.log
-move c:\testresults\tprimegen.log e:\testresults\tprimegen.log
-
-REM crypto, tpkcs5kdf
-md c:\tpkcs5kdf
-
-copy z:\tpkcs12kdftests.txt c:\tpkcs5kdf\tpkcs12kdftests.txt
-tpkcs5kdf c:\tpkcs5kdf\tpkcs12kdftests.txt c:\tpkcs5kdf\tpkcs12kdftests.log
-copy c:\tpkcs5kdf\tpkcs12kdftests.log e:\testresults\tpkcs12kdftests.log
-del /s c:\tpkcs5kdf\
-
-REM crypto, pbe
-
-md c:\tpbe
-copy z:\tpbe\*.dat c:\tpbe
-attrib c:\tpbe\strong.dat -r
-attrib c:\tpbe\weak.dat -r
-tpbe z:\tpbe\tpbetests_v2.txt c:\testresults\tpbetestsv2.log
-move c:\testresults\tpbetestsv2.log e:\testresults\tpbetestsv2.log
-del /s c:\tpbe\
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/runcrypto_9.5.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,149 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-REM hash
-copy /s z:\thash\ c:\thash\
-thash
-move c:\hashlog.txt c:\testresults\
-move c:\testresults\hashlog.txt e:\testresults\hashlog.txt
-del /s c:\thash\
-
-REM random
-t_random
-move c:\t_random.log c:\testresults\
-move c:\testresults\t_random.log e:\testresults\t_random.log
-
-REM padding - uses testexecute framework
-copy /s z:\tpadding\ c:\tpadding\
-testexecute c:\tpadding\tpadding.script
-move c:\logs\testexecute\tpadding.htm e:\testresults\tpadding.htm
-del /s c:\tpadding\
-
-REM new cryptospi tests
-copy /s z:\testdata\tcryptospi\ c:\testdata\tcryptospi\
-testexecute z:\testdata\tcryptospi\scripts\tcryptospi.script
-move c:\logs\testexecute\tcryptospi.htm e:\testresults\tcryptospi.htm
-del /s c:\testdata\tcryptospi\
-
-REM crypto, asymmetric
-
-REM tasymmetric z:\tasymmetric\asymmetricPerformance.txt c:\testresults\asymmetricPerformance.log
-
-tasymmetric z:\tasymmetric\tasymmetrictests.script c:\logs\testexecute\tasymmetrictests.htm
-move c:\logs\testexecute\tasymmetrictests.htm e:\testresults\tasymmetrictests.htm
-
-REM crypto, symmetric
-
-tsymmetric z:\tsymmetric\tsymmetrictests.script c:\logs\testexecute\tsymmetrictests.htm
-move c:\logs\testexecute\tsymmetrictests.htm e:\testresults\tsymmetrictests.htm
-
-tsymmetric z:\tsymmetric\AESECBVectorsScript.script c:\logs\testexecute\AESECBVectorsScript.htm
-move c:\logs\testexecute\AESECBVectorsScript.htm e:\testresults\AESECBVectorsScript.htm
-
-tsymmetric z:\tsymmetric\AESECB_KAT_VT.script c:\logs\testexecute\AESECB_KAT_VT.htm
-move c:\logs\testexecute\AESECB_KAT_VT.htm e:\testresults\AESECB_KAT_VT.htm
-
-tsymmetric z:\tsymmetric\AESECB_KAT_VK.script c:\logs\testexecute\AESECB_KAT_VK.htm
-move c:\logs\testexecute\AESECB_KAT_VK.htm e:\testresults\AESECB_KAT_VK.htm
-
-tsymmetric z:\tsymmetric\AESMonteCarloEncryptECB128.script c:\logs\testexecute\AESMonteCarloEncryptECB128.htm
-move c:\logs\testexecute\AESMonteCarloEncryptECB128.htm e:\testresults\AESMonteCarloEncryptECB128.htm
-
-tsymmetric z:\tsymmetric\AESMonteCarloEncryptECB192.script c:\logs\testexecute\AESMonteCarloEncryptECB192.htm
-move c:\logs\testexecute\AESMonteCarloEncryptECB192.htm e:\testresults\AESMonteCarloEncryptECB192.htm
-
-tsymmetric z:\tsymmetric\AESMonteCarloEncryptECB256.script c:\logs\testexecute\AESMonteCarloEncryptECB256.htm
-move c:\logs\testexecute\AESMonteCarloEncryptECB256.htm e:\testresults\AESMonteCarloEncryptECB256.htm
-
-tsymmetric z:\tsymmetric\AESMonteCarloDecryptECB128.script c:\logs\testexecute\AESMonteCarloDecryptECB128.htm
-move c:\logs\testexecute\AESMonteCarloDecryptECB128.htm e:\testresults\AESMonteCarloDecryptECB128.htm
-
-tsymmetric z:\tsymmetric\AESMonteCarloDecryptECB192.script c:\logs\testexecute\AESMonteCarloDecryptECB192.htm
-move c:\logs\testexecute\AESMonteCarloDecryptECB192.htm e:\testresults\AESMonteCarloDecryptECB192.htm
-
-tsymmetric z:\tsymmetric\AESMonteCarloDecryptECB256.script c:\logs\testexecute\AESMonteCarloDecryptECB256.htm
-move c:\logs\testexecute\AESMonteCarloDecryptECB256.htm e:\testresults\AESMonteCarloDecryptECB256.htm
-
-tsymmetric z:\tsymmetric\AESMonteCarloEncryptCBC128.script c:\logs\testexecute\AESMonteCarloEncryptCBC128.htm
-move c:\logs\testexecute\AESMonteCarloEncryptCBC128.htm e:\testresults\AESMonteCarloEncryptCBC128.htm
-
-tsymmetric z:\tsymmetric\AESMonteCarloEncryptCBC192A.script c:\logs\testexecute\AESMonteCarloEncryptCBC192A.htm
-move c:\logs\testexecute\AESMonteCarloEncryptCBC192A.htm e:\testresults\AESMonteCarloEncryptCBC192A.htm
-
-tsymmetric z:\tsymmetric\AESMonteCarloEncryptCBC192B.script c:\logs\testexecute\AESMonteCarloEncryptCBC192B.htm
-move c:\logs\testexecute\AESMonteCarloEncryptCBC192B.htm e:\testresults\AESMonteCarloEncryptCBC192B.htm
-
-tsymmetric z:\tsymmetric\AESMonteCarloEncryptCBC256.script c:\logs\testexecute\AESMonteCarloEncryptCBC256.htm
-move c:\logs\testexecute\AESMonteCarloEncryptCBC256.htm e:\testresults\AESMonteCarloEncryptCBC256.htm
-
-tsymmetric z:\tsymmetric\AESMonteCarloDecryptCBC128.script c:\logs\testexecute\AESMonteCarloDecryptCBC128.htm
-move c:\logs\testexecute\AESMonteCarloDecryptCBC128.htm e:\testresults\AESMonteCarloDecryptCBC128.htm
-
-tsymmetric z:\tsymmetric\AESMonteCarloDecryptCBC192.script c:\logs\testexecute\AESMonteCarloDecryptCBC192.htm
-move c:\logs\testexecute\AESMonteCarloDecryptCBC192.htm e:\testresults\AESMonteCarloDecryptCBC192.htm
-
-tsymmetric z:\tsymmetric\AESMonteCarloDecryptCBC256.script c:\logs\testexecute\AESMonteCarloDecryptCBC256.htm
-move c:\logs\testexecute\AESMonteCarloDecryptCBC256.htm e:\testresults\AESMonteCarloDecryptCBC256.htm
-
-
-
-REM crypto, bigint
-
-tbigint z:\tbigint\tconstructiontests.script c:\logs\testexecute\tconstruction.htm
-move c:\logs\testexecute\tconstruction.htm e:\testresults\tconstruction.htm
-
-tbigint z:\tbigint\tbasicmathstests.script c:\logs\testexecute\tbasicmaths.htm
-move c:\logs\testexecute\tbasicmaths.htm e:\testresults\tbasicmaths.htm
-
-tbigint z:\tbigint\tmontgomerytests.script c:\logs\testexecute\tmontgomery.htm
-move c:\logs\testexecute\tmontgomery.htm e:\testresults\tmontgomery.htm
-
-REM tbigint z:\tbigint\tperformancetests.script c:\logs\testexecute\tperformance.htm
-REM move c:\logs\testexecute\tperformance.htm e:\testresults\tperformance.htm
-
-tbigint z:\tbigint\tprimetests.script c:\logs\testexecute\tprime.htm
-move c:\logs\testexecute\tprime.htm e:\testresults\tprime.htm
-
-REM tbigint z:\tbigint\tprimetests2.script c:\logs\testexecute\tprime2.htm
-REM move c:\logs\testexecute\tprime2.htm e:\testresults\tprime2.htm
-
-tbigint z:\tbigint\tprimefailuretests.script  c:\logs\testexecute\tprimefailure.htm
-move c:\logs\testexecute\tprimefailure.htm e:\testresults\tprimefailure.htm
-
-tbigint z:\tbigint\tprimegen.script c:\logs\testexecute\tprimegen.htm
-move c:\logs\testexecute\tprimegen.htm e:\testresults\tprimegen.htm
-
-
-
-REM crypto, tpkcs5kdf
-md c:\tpkcs5kdf
-
-copy z:\tpkcs12kdftests.script c:\tpkcs5kdf\tpkcs12kdftests.script
-tpkcs5kdf c:\tpkcs5kdf\tpkcs12kdftests.script c:\tpkcs5kdf\tpkcs12kdftests.htm
-move c:\tpkcs5kdf\tpkcs12kdftests.htm e:\testresults\tpkcs12kdftests.htm
-del /s c:\tpkcs5kdf\
-
-
-REM crypto, pbe
-
-md c:\tpbe
-copy z:\tpbe\*.dat c:\tpbe
-attrib c:\tpbe\strong.dat -r
-attrib c:\tpbe\weak.dat -r
-tpbe z:\tpbe\tpbetests_v2.script c:\logs\testexecute\tpbetestsv2.htm
-move c:\logs\testexecute\tpbetestsv2.htm e:\testresults\tpbetestsv2.htm
-
-del /s c:\tpbe\
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/test/autotesting/runcryptotokens.bat	Wed Apr 14 17:48:59 2010 +0300
@@ -0,0 +1,18 @@
+@rem
+@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+@rem All rights reserved.
+@rem This component and the accompanying materials are made available
+@rem under the terms of the License "Eclipse Public License v1.0"
+@rem which accompanies this distribution, and is available
+@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
+@rem
+@rem Initial Contributors:
+@rem Nokia Corporation - initial contribution.
+@rem
+@rem Contributors:
+@rem
+@rem Description: 
+@rem
+t_ctframework
+copy c:\T_CTFrameworkLog.txt e:\testresults\T_CTFrameworkLog.txt
+move T_CTFrameworkLog.txt c:\testresults\
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/runcryptotokens_9.4.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,18 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-t_ctframework
-copy c:\T_CTFrameworkLog.txt e:\testresults\T_CTFrameworkLog.txt
-move T_CTFrameworkLog.txt c:\testresults\
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/test/autotesting/runfiletokens.bat	Wed Apr 14 17:48:59 2010 +0300
@@ -0,0 +1,55 @@
+@rem
+@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+@rem All rights reserved.
+@rem This component and the accompanying materials are made available
+@rem under the terms of the License "Eclipse Public License v1.0"
+@rem which accompanies this distribution, and is available
+@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
+@rem
+@rem Initial Contributors:
+@rem Nokia Corporation - initial contribution.
+@rem
+@rem Contributors:
+@rem
+@rem Description: 
+@rem
+
+copy /s z:\tkeystore\ c:\tkeystore\
+copy /s z:\tcertstore\ c:\tcertstore\
+copy /s z:\ttesttools\ c:\ttesttools\
+md c:\system\data\
+copy /s z:\system\data\test1certstore.dat c:\system\data\test1certstore.dat
+copy /s z:\system\data\test2certstore.dat c:\system\data\test2certstore.dat
+md c:\private\101f72a6\
+copy /s c:\ttesttools\data\certclients.dat c:\private\101f72a6\certclients.dat
+
+TESTEXECUTE c:\ttesttools\scripts\sec-filetokens-tools.script
+move c:\logs\testexecute\sec-filetokens-tools.htm e:\testresults\sec-filetokens-tools.htm
+
+del c:\private\101f72a6\certclients.dat
+del c:\system\data\test1certstore.dat
+
+del /s c:\ttesttools\
+del /s c:\tcertstore\
+del /s c:\tkeystore\
+
+rem TCERTAPPS
+copy /s z:\tcertapps\ c:\tcertapps\
+t_certapps c:\tcertapps\scripts\script1.script  c:\testresults\tcertapps.htm
+move c:\testresults\tcertapps.htm e:\testresults\tcertapps.htm
+t_certapps c:\tcertapps\scripts\apipolicing.script c:\testresults\tcertapps-apipolicing.htm
+move c:\testresults\tcertapps-apipolicing.htm e:\testresults\tcertapps-apipolicing.htm
+del /s c:\tcertapps\
+
+
+REM t_keystore
+copy /s z:\tkeystore\ c:\tkeystore\
+t_keystore c:\tkeystore\scripts\tkeystore.script c:\testresults\tkeystore.htm
+move c:\testresults\tkeystore.htm e:\testresults\tkeystore.htm
+t_keystore c:\tkeystore\scripts\authobjects.script c:\testresults\tkeystore_authobjects.htm
+move c:\testresults\tkeystore_authobjects.htm e:\testresults\tkeystore_authobjects.htm
+t_keystore c:\tkeystore\scripts\exportscript.script c:\testresults\tkeystore_export.htm
+move c:\testresults\tkeystore_export.htm e:\testresults\tkeystore_export.htm
+t_keystore c:\tkeystore\scripts\reload.script c:\testresults\tkeystore_reload.htm
+move c:\testresults\tkeystore_reload.htm e:\testresults\tkeystore_reload.htm
+del /s c:\tkeystore\
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/runfiletokens_9.4.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,55 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-copy /s z:\tkeystore\ c:\tkeystore\
-copy /s z:\tcertstore\ c:\tcertstore\
-copy /s z:\ttesttools\ c:\ttesttools\
-md c:\system\data\
-copy /s z:\system\data\test1certstore.dat c:\system\data\test1certstore.dat
-copy /s z:\system\data\test2certstore.dat c:\system\data\test2certstore.dat
-md c:\private\101f72a6\
-copy /s c:\ttesttools\data\certclients.dat c:\private\101f72a6\certclients.dat
-
-TESTEXECUTE c:\ttesttools\scripts\sec-filetokens-tools.script
-move c:\logs\testexecute\sec-filetokens-tools.htm e:\testresults\sec-filetokens-tools.htm
-
-del c:\private\101f72a6\certclients.dat
-del c:\system\data\test1certstore.dat
-
-del /s c:\ttesttools\
-del /s c:\tcertstore\
-del /s c:\tkeystore\
-
-rem TCERTAPPS
-copy /s z:\tcertapps\ c:\tcertapps\
-t_certapps c:\tcertapps\scripts\script1.script  c:\testresults\tcertapps.htm
-move c:\testresults\tcertapps.htm e:\testresults\tcertapps.htm
-t_certapps c:\tcertapps\scripts\apipolicing.script c:\testresults\tcertapps-apipolicing.htm
-move c:\testresults\tcertapps-apipolicing.htm e:\testresults\tcertapps-apipolicing.htm
-del /s c:\tcertapps\
-
-
-REM t_keystore
-copy /s z:\tkeystore\ c:\tkeystore\
-t_keystore c:\tkeystore\scripts\tkeystore.script c:\testresults\tkeystore.htm
-move c:\testresults\tkeystore.htm e:\testresults\tkeystore.htm
-t_keystore c:\tkeystore\scripts\authobjects.script c:\testresults\tkeystore_authobjects.htm
-move c:\testresults\tkeystore_authobjects.htm e:\testresults\tkeystore_authobjects.htm
-t_keystore c:\tkeystore\scripts\exportscript.script c:\testresults\tkeystore_export.htm
-move c:\testresults\tkeystore_export.htm e:\testresults\tkeystore_export.htm
-t_keystore c:\tkeystore\scripts\reload.script c:\testresults\tkeystore_reload.htm
-move c:\testresults\tkeystore_reload.htm e:\testresults\tkeystore_reload.htm
-del /s c:\tkeystore\
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/runjavamidletinstaller_9.4.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,237 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-copy /s z:\tJarDownloader\ c:\tJarDownloader\
-copy z:\certclients.dat c:\system\data\certclients.dat
-copy z:\cacerts.dat c:\system\data\cacerts.dat
-attrib c:\system\data\cacerts.dat -r
-attrib c:\system\data\certclients.dat -r
-
-rem run tJarDownloader tests
-tJarDownloader c:\tJarDownloader\Scripts\script1.txt c:\testresults\tjardownloader.log
-move c:\testresults\tjardownloader.log e:\testresults\tjardownloader.log
-del /s c:\tJarDownloader\
-del /s c:\tjartest\
-del /s c:\private\200008d1\
-
-rem ITHARNESSMIDP
-rem copy test data
-copy /s z:\midpfiles\ c:\midpfiles\
-copy /s z:\itharnessmidp\ c:\itharnessmidp\
-copy z:\javatest.txt c:\javatest.txt
-copy z:\javatest2.txt c:\javatest2.txt
-copy z:\javatest3.txt c:\javatest3.txt
-copy z:\leavetest.txt c:\leavetest.txt
-copy z:\otatests.txt c:\otatests.txt
-copy z:\javaiaptest.txt c:\javaiaptest.txt
-attrib c:\system\data\cacerts.dat -r
-attrib c:\system\data\certclients.dat -r
-copy z:\cacerts.dat c:\system\data\cacerts.dat
-copy z:\certclients.dat c:\system\data\certclients.dat
-attrib c:\system\data\cacerts.dat -r
-attrib c:\system\data\certclients.dat -r
-
-
-rem run ITHARNESSMIDP
-itharnessmidp c:\javatest.txt c:\testresults\java1.txt
-
-rem copy test results to mmc card
-move c:\testresults\java1.txt e:\testresults\java1.txt
-
-del c:\sys\install\integrityservices\E130772A2A09A5.drv
-
-rem run ITHARNESSMIDP
-itharnessmidp c:\javatest2.txt c:\testresults\java2.txt
-
-rem copy test results to mmc card
-move c:\testresults\java2.txt e:\testresults\java2.txt
-
-
-rem run ITHARNESSMIDP
-itharnessmidp c:\javatest3.txt c:\testresults\java3.txt
-
-rem copy test results to mmc card
-move c:\testresults\java3.txt e:\testresults\java3.txt
-
-rem run ITHARNESSMIDP
-itharnessmidp c:\leavetest.txt c:\testresults\leavetest.txt
-
-rem copy test results to mmc card
-move c:\testresults\leavetest.txt e:\testresults\leavetest.txt
-
-rem run ITHARNESSMIDP
-copy z:\certclients.dat c:\system\data\certclients.dat
-copy z:\cacerts.dat c:\system\data\cacerts.dat
-attrib c:\system\data\cacerts.dat -r
-attrib c:\system\data\certclients.dat -r
-itharnessmidp c:\otatests.txt c:\testresults\java4.txt
-
-rem copy test results to mmc card
-move c:\testresults\java4.txt e:\testresults\java4.txt
-
-rem run ITHARNESSMIDP
-rem copy z:\prompt.cfg c:\prompt.cfg
-rem ced -i c:\prompt.cfg
-itharnessmidp c:\javaiaptest.txt c:\testresults\java5.txt
-rem ced -i c:\auto.cfg
-
-rem copy test results to mmc card
-move c:\testresults\java5.txt e:\testresults\java5.txt
-
-rem delete midpfiles
-del /s c:\midpfiles\
-del c:\javatest.txt
-del c:\javatest2.txt
-del c:\javatest3.txt
-del c:\otatests.txt
-del c:\javaiaptest.txt
-del /s c:\private\200008d1\
-del /s c:\system\install\
-
-rem tjavafile
-rem copy scripts and data
-copy /s z:\tJavaFile\scripts\ c:\tJavaFile\scripts\
-copy /s z:\tJavaFile\data\ c:\tJavaFile\data\
-
-rem run tjavafile tests
-tJavaFile c:\tJavaFile\scripts\midpjartest.txt c:\testresults\tJavaFilejar.log
-tJavaFile c:\tJavaFile\scripts\midpjadtest.txt c:\testresults\tJavaFilejad.log
-tJavaFile c:\tJavaFile\scripts\attributestest.txt c:\testresults\tJavaFileattributes.log
-
-rem copy results to mmc card
-move c:\testresults\tJavaFilejar.log e:\testresults\tJavaFilejar.log
-move c:\testresults\tJavaFilejad.log e:\testresults\tJavaFilejad.log
-move c:\testresults\tJavaFileattributes.log e:\testresults\tJavaFileattributes.log
-
-
-rem delete tJavaFile stuff
-del /s c:\tJavaFile\
-
-REM tmidletuaheaderfilter tests - uses testexecute framework
-copy /s z:\tmidletuaheaderfilter\ c:\tmidletuaheaderfilter\
-testexecute c:\tmidletuaheaderfilter\tmidletuaheaderfilter.script
-move c:\logs\testexecute\tmidletuaheaderfilter.htm e:\testresults\tmidletuaheaderfilter.htm
-del /s c:\tmidletuaheaderfilter\
-
-rem tjavahelper
-rem copy scripts
-copy /s z:\tJavaHelper\ c:\tJavaHelper\
-copy /s z:\rta\ c:\rta\
-copy /s z:\drmdata\ c:\drmdata\
-copy /s z:\midpfiles\ c:\midpfiles\
-
-rem copy rockz.jar which is not duplicated in the ROM but also used for the tJavaInstaller test
-copy z:\tJavaFile\Data\Invalid\rockz.jar c:\midpfiles\rockz.jar
-rem copy invalid midlet data
-rem copy  valid midlet data
-md c:\tJavaFile
-md c:\tJavaFile\data
-md c:\tJavaFile\data\Invalid
-md c:\tJavaFile\data\valid
-copy z:\tJavaFile\data\Invalid\kfirewithoutmidletname.jad c:\tJavaFile\data\Invalid\kfirewithoutmidletname.jad
-copy z:\tJavaFile\data\Invalid\kfirewithoutmidletname.jar c:\tJavaFile\data\Invalid\kfirewithoutmidletname.jar
-copy z:\tJavaFile\data\Invalid\kfirewithoutclassname.jad c:\tJavaFile\data\Invalid\kfirewithoutclassname.jad
-copy z:\tJavaFile\data\Invalid\kfirewithoutclassname.jar c:\tJavaFile\data\Invalid\kfirewithoutclassname.jar
-copy z:\tjavaFile\data\invalid\LongUrlinstallnotify.jad c:\tjavaFile\data\invalid\LongUrlinstallnotify.jad
-
-copy z:\tJavaFile\data\invalid\kfirewithicon2_nospaceaftercolon.jar c:\tJavaFile\data\invalid\kfirewithicon2_nospaceaftercolon.jar
-copy z:\tJavaFile\data\invalid\kfirewithicon2_invalidcharaftercolon.jar c:\tJavaFile\data\invalid\kfirewithicon2_invalidcharaftercolon.jar
-copy z:\tJavaFile\data\invalid\kfirewithicon2_novendorval.jar c:\tJavaFile\data\invalid\kfirewithicon2_novendorval.jar
-copy z:\tJavaFile\data\invalid\kfirewithicon2_noversionval.jar c:\tJavaFile\data\invalid\kfirewithicon2_noversionval.jar
-copy z:\tJavaFile\data\invalid\kfirewithicon2_nonameval.jar c:\tJavaFile\data\invalid\kfirewithicon2_nonameval.jar
-
-copy z:\tJavaFile\data\valid\kfirewithicon2_nodescriptionval.jar c:\tJavaFile\data\valid\kfirewithicon2_nodescriptionval.jar
-copy z:\tJavaFile\data\valid\kfirewithicon2_noinfourlval.jar c:\tJavaFile\data\valid\kfirewithicon2_noinfourlval.jar
-copy z:\tJavaFile\data\valid\nojarvalue.jad c:\tJavaFile\data\valid\nojarvalue.jad
-copy z:\tJavaFile\data\valid\nojarvalue.jar c:\tJavaFile\data\valid\nojarvalue.jar
-
-rem copy ocsp certs
-copy z:\cacerts.dat c:\system\data\cacerts.dat
-copy z:\certclients.dat c:\system\data\certclients.dat
-attrib c:\system\data\cacerts.dat -r
-attrib c:\system\data\certclients.dat -r
-
-rem copy files for PDEF099222
-md c:\private\102033E6
-md c:\private\102033E6\MIDlets
-md c:\private\102033E6\MIDlets\[1010fcaf]
-copy z:\tJavaFile\data\valid\mazegame.jar c:\private\102033E6\MIDlets\[1010fcaf]\mazegame.jar
-copy z:\tJavaFile\data\valid\PDEF099222_uids c:\private\102033E6\MIDlets\[1010fcaf]\uids
-md c:\system\install\
-md c:\system\install\registry
-copy z:\tJavaFile\data\valid\PDEF099222_1010FCAF.reg c:\system\install\registry\1010FCAF.reg
-
-rem run tjavahelper tests
-tJavaHelper c:\tJavaHelper\Scripts\MIDPLaunchInfoTest.txt c:\testresults\MIDPLaunchInfoTest.log
-tJavaHelper c:\tJavaHelper\Scripts\tJavaInstaller.txt c:\testresults\tJavaInstaller.log
-tJavaHelper c:\tJavaHelper\Scripts\tJavaInstallerocsp.txt c:\testresults\tJavaInstallerocsp.log
-tJavaHelper c:\tJavaHelper\Scripts\tjmiocsphttpfilter.txt c:\testresults\tjmiocsphttpfilter.log
-tJavaHelper c:\tJavaHelper\Scripts\tjavarunoninstall.txt c:\testresults\tjavarunoninstall.log
-tJavaHelper c:\tJavaHelper\Scripts\tJavaDRM.txt c:\testresults\tJavaDRM.log
-
-rem NQP tests
-tJavaHelper c:\tJavaHelper\Scripts\tjmiotaex.txt c:\testresults\tjmiotaex.log
-
-rem uncomment the below line once the 'DEF100676: OOM tests failing in JMI component' is fixed
-rem tJavaHelper c:\tJavaHelper\Scripts\tjmioom.txt c:\testresults\tjmioom.log
-
-rem copy results to mmc card
-move c:\testresults\MIDPLaunchInfoTest.log e:\testresults\MIDPLaunchInfoTest.log
-move c:\testresults\tJavaInstaller.log e:\testresults\tJavaInstaller.log
-move c:\testresults\tJavaInstallerocsp.log e:\testresults\tJavaInstallerocsp.log
-move c:\testresults\tjmiocsphttpfilter.log e:\testresults\tjmiocsphttpfilter.log
-move c:\testresults\tjavarunoninstall.log e:\testresults\tjavarunoninstall.log
-move c:\testresults\tJavaDRM.log e:\testresults\tJavaDRM.log
-
-rem NQP tests
-move c:\testresults\tjmiotaex.log e:\testresults\tjmiotaex.log
-
-rem uncomment the below line once the 'DEF100676: OOM tests failing in JMI component' is fixed
-rem move c:\testresults\tjmioom.log e:\testresults\tjmioom.log
-
-del /s c:\midpfiles\
-del /s c:\itharnessmidp\
-del /s c:\tJavaFile\
-del /s c:\sys\bin\
-del /s c:\tjavahelper\
-del /s c:\system\install\
-del /s c:\private\00000000\
-del /s c:\private\10205ea5\
-del /s c:\private\102033E6\MIDlets\[1010fcaf]\
- 
-rem tjavaregistry
-copy /s z:\tJavaRegistry\ c:\tJavaRegistry\
-tJavaRegistry c:\tJavaRegistry\scripts\script1.txt c:\testresults\tJavaRegistry.log
-move c:\testresults\tJavaRegistry.log e:\testresults\tJavaRegistry.log
-del /s c:\tJavaRegistry\
-
-attrib c:\*.* -r
-del c:\*.*
-
-REM TJAVAHELPERSERVER tests - uses testexecute framework
-copy /s z:\private\10204805\ c:\private\10204805\
-testexecute c:\private\10204805\scripts\tjavahelperserver.script
-move c:\logs\testexecute\tjavahelperserver.htm e:\testresults\tjavahelperserver.htm
-del /s c:\private\10204805\
-del /s c:\sys\bin\
-
-REM Run recognizer tests
-md c:\trecog
-copy /s z:\trecog\* c:\trecog
-
-testexecute z:\trecog\trecogjava.script
-move c:\logs\testexecute\trecogjava.htm e:\testresults\trecogjava.htm
-
-del c:\trecog\*.*
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/test/autotesting/runpkcs12tests.bat	Wed Apr 14 17:48:59 2010 +0300
@@ -0,0 +1,21 @@
+@rem
+@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+@rem All rights reserved.
+@rem This component and the accompanying materials are made available
+@rem under the terms of the License "Eclipse Public License v1.0"
+@rem which accompanies this distribution, and is available
+@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
+@rem
+@rem Initial Contributors:
+@rem Nokia Corporation - initial contribution.
+@rem
+@rem Contributors:
+@rem
+@rem Description: 
+@rem
+copy /s z:\tpkcs12intg\ c:\tpkcs12intg\
+testexecute c:\tpkcs12intg\data\tpkcs12lib.script
+move c:\logs\testexecute\tpkcs12lib.htm e:\testresults\tpkcs12lib.htm
+del /s c:\tpkcs12intg
+attrib c:\*.* -r
+del c:\*.*
\ No newline at end of file
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/runpkcs12tests_9.4.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,21 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-copy /s z:\tpkcs12intg\ c:\tpkcs12intg\
-testexecute c:\tpkcs12intg\data\tpkcs12lib.script
-move c:\logs\testexecute\tpkcs12lib.htm e:\testresults\tpkcs12lib.htm
-del /s c:\tpkcs12intg
-attrib c:\*.* -r
-del c:\*.*
\ No newline at end of file
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/runsisinstaller_9.4.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,46 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-copy /s z:\tInstalledAppsRegistry\ c:\tInstalledAppsRegistry\
-md c:\System
-md c:\System\Install
-md c:\System\Install\Registry
-md e:\System
-md e:\System\Install
-md e:\System\Install\Registry
-attrib c:\tInstalledAppsRegistry\Data\0000000C.REG -r
-attrib c:\tInstalledAppsRegistry\Data\0000000D.REG -r
-copy c:\tInstalledAppsRegistry\Data\0000000C.REG c:\System\Install\Registry\
-copy c:\tInstalledAppsRegistry\Data\0000000D.REG e:\System\Install\Registry\
-del c:\tInstalledAppsRegistry\Data\0000000C.REG
-del c:\tInstalledAppsRegistry\Data\0000000D.REG
-
-rem run tinstalledappsregistry tests    		
-tInstalledAppsRegistry c:\tInstalledAppsRegistry\scripts\script1.txt c:\testresults\tInstalledAppsRegistry.log
-
-rem copy logs to mmc card
-move c:\testresults\tInstalledAppsRegistry.log e:\testresults\tInstalledAppsRegistry.log
-
-attrib c:\*.* -r
-del c:\*.*
-
-REM tintegritysupport 					
-
-REM copy /s z:\tIntegritySupport\data\ c:\tIntegritySupport\data\
-REM tIntegritySupport z:\tIntegritySupport\scripts\tisrecovery.txt c:\testresults\tisrecovery.log
-REM tIntegritySupport z:\tIntegritySupport\scripts\tisrecoveryapp.txt c:\testresults\tisrecoveryapp.log
-REM del /s c:\tIntegritySupport\data\
-
-
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/runswiromtests_9.4.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,315 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-md c:\savedresults
-copy /s e:\testresults\* c:\savedresults
-
-REM Save the USB Bootloader and BATS hardware board config file
-md c:\USBLoader
-copy /s e:\usbload.zip c:\USBLoader
-copy /s e:\_hw_board_* c:\USBLoader
-
-REM Run test
-testexecute z:\tswi\tuiscriptadaptors\scripts\tsilent_h2.script
-
-REM Run test
-testexecute z:\tswi\tuiscriptadaptors\scripts\tswidaemonstub_h2.script
-
-REM Run test
-testexecute z:\tswi\tuiscriptadaptors\scripts\inc098114_h2.script
-
-md c:\tswi
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\tcleanupinfrastructure.script
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\tpropagation_arm.script
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\test_pa_sapropagated_notdelete.script
-
-
-REM Restore results
-md e:\testresults
-copy /s c:\savedresults e:\testresults\*
-del /s c:\savedresults\*
-
-REM Restore USB Bootloader and BATS hardware board config file
-copy c:\USBLoader\usbload.zip e:\usbload.zip
-copy c:\USBLoader\_hw_board_* e:\_hw_board_*
-del /s c:\USBLoader\*
-
-# Save Silent Install, cleanupinfrastructure and tpropagation test results
-move c:\logs\testexecute\tsilent_h2.htm e:\testresults\tsilent_h2.htm
-move c:\logs\testexecute\tswidaemonstub_h2.htm e:\testresults\tswidaemonstub_h2.htm
-move c:\logs\testexecute\inc098114_h2.htm e:\testresults\inc098114_h2.htm
-move c:\logs\testexecute\tcleanupinfrastructure.htm e:\testresults\tcleanupinfrastructure.htm
-copy c:\logs\testexecute\tpropagation_arm.htm e:\testresults\tpropagation_arm.htm
-move c:\logs\testexecute\test_pa_sapropagated_notdelete.htm e:\testresults\test_pa_sapropagated_notdelete.htm
-
-REM Run recognizer tests
-md c:\trecog
-copy /s z:\trecog\* c:\trecog
-
-testexecute z:\trecog\trecogcert.script
-move c:\logs\testexecute\trecogcert.htm e:\testresults\trecogcert.htm
-
-testexecute z:\trecog\trecogpkcs12.script
-move c:\logs\testexecute\trecogpkcs12.htm e:\testresults\trecogpkcs12.htm
-
-testexecute z:\tswi\swicaptests\scripts\swicaptests.script
-move c:\logs\testexecute\swicaptests.htm e:\testresults\swicaptests.htm
-
-testexecute z:\tswi\tsis\scripts\tsis.script
-move c:\logs\testexecute\tsis.htm e:\testresults\tsis.htm
-
-testexecute z:\tswi\tsis\scripts\tsis_signed.script
-move c:\logs\testexecute\tsis_signed.htm e:\testresults\tsis_signed.htm
-
-testexecute z:\tswi\tintegrityservices\scripts\tintegrityservices.script
-move c:\logs\testexecute\tintegrityservices.htm e:\testresults\tintegrityservices.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testuninstallation_arm_only.script
-move c:\logs\testexecute\testuninstallation_arm_only.htm e:\testresults\testuninstallation_arm_only.htm
-
-testexecute z:\tswi\tsishelper\scripts\tsishelper.script
-move c:\logs\testexecute\tsishelper.htm e:\testresults\tsishelper.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testwritableswicertstore.script
-move c:\logs\testexecute\testwritableswicertstore.htm e:\testresults\testwritableswicertstore.htm
-
-REM NQP Tests for DataProvider
-testexecute z:\tswi\tdataprovider\scripts\tdataprovider.script
-move c:\logs\testexecute\tdataprovider.htm e:\testresults\tdataprovider.htm
-
-md c:\private
-md c:\private\101f72a6\
-copy z:\tswi\tsis\data\certstore\* c:\private\101f72a6\ 
-
-attrib c:\tswi\*.* -r
-
-copy z:\auto.cfg c:\
-copy z:\auto_broken.cfg c:\
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\tuiscriptadaptors.script
-move c:\logs\testexecute\tuiscriptadaptors.htm e:\testresults\tuiscriptadaptors.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\tuninstallpkgs_h4.script
-move c:\logs\testexecute\tuninstallpkgs_h4.htm e:\testresults\tuninstallpkgs_h4.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testvids.script
-move c:\logs\testexecute\testvids.htm e:\testresults\testvids.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testasync.script
-move c:\logs\testexecute\testasync.htm e:\testresults\testasync.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testdrmasync.script
-move c:\logs\testexecute\testdrmasync.htm e:\testresults\testdrmasync.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\tuiscriptadaptorsFH.script
-move c:\logs\testexecute\tuiscriptadaptorsFH.htm e:\testresults\tuiscriptadaptorsFH.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testexpressions.script
-move c:\logs\testexecute\testexpressions.htm e:\testresults\testexpressions.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testdrives.script
-move c:\logs\testexecute\testdrives.htm e:\testresults\testdrives.htm
-
-copy z:\auto.cfg c:\auto.cfg
-attrib c:\auto.cfg -r
-md c:\tswi\tbackuprestore
-testexecute z:\tswi\tbackuprestore\scripts\tbackuprestore.script
-move c:\logs\testexecute\tbackuprestore.htm e:\testresults\tbackuprestore.htm
-
-testexecute z:\tswi\tbackuprestore\scripts\tbackuprestoredrive_armv5.script
-move c:\logs\testexecute\tbackuprestoredrive_armv5.htm e:\testresults\tbackuprestoredrive_armv5.htm
-
-testexecute z:\tswi\tbackuprestore\scripts\tbackuptrestore_exploratory.script
-move c:\logs\testexecute\tbackuptrestore_exploratory.htm e:\testresults\tbackuptrestore_exploratory.htm
-
-testexecute z:\tswi\trevocation\scripts\trevocation.script
-move c:\logs\testexecute\trevocation.htm e:\testresults\trevocation.htm
-
-testexecute z:\tswi\tdaemon\scripts\tdaemon.script
-move c:\logs\testexecute\tdaemon.htm e:\testresults\tdaemon.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testlocations.script
-move c:\logs\testexecute\testlocations.htm e:\testresults\testlocations.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testcancel.script
-move c:\logs\testexecute\testcancel.htm e:\testresults\testcancel.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testasynccancel.script
-move c:\logs\testexecute\testasynccancel.htm e:\testresults\testasynccancel.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testrun.script
-move c:\logs\testexecute\testrun.htm e:\testresults\testrun.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testrunft.script
-move c:\logs\testexecute\testrunft.htm e:\testresults\testrunft.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testupgrades.script
-move c:\logs\testexecute\testupgrades.htm e:\testresults\testupgrades.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testaugmentations.script
-move c:\logs\testexecute\testaugmentations.htm e:\testresults\testaugmentations.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testpreinstalled.script
-move c:\logs\testexecute\testpreinstalled.htm e:\testresults\testpreinstalled.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testdependencies.script
-move c:\logs\testexecute\testdependencies.htm e:\testresults\testdependencies.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testshutdown.script
-move c:\logs\testexecute\testshutdown.htm e:\testresults\testshutdown.htm
-
-testexecute z:\tswi\tsisregistrytest\scripts\tsisregistrytest.script
-move c:\logs\testexecute\tsisregistrytest.htm e:\testresults\tsisregistrytest.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\tsisstub.script
-move c:\logs\testexecute\tsisstub.htm e:\testresults\tsisstub.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testdrm.script
-move c:\logs\testexecute\testdrm.htm e:\testresults\testdrm.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testdrmFH.script
-move c:\logs\testexecute\testdrmFH.htm e:\testresults\testdrmFH.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testmulti.script
-move c:\logs\testexecute\testmulti.htm e:\testresults\testmulti.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testextension.script
-move c:\logs\testexecute\testextension.htm e:\testresults\testextension.htm
-
-REM install automated commdb using sim.tsy for tdev
-ced -i z:\autosimtsy.cfg
-
-copy z:\tswi\tdevcerts\config.txt c:\config.txt
-testexecute z:\tswi\tdevcerts\scripts\devcerts_match.script
-move c:\logs\testexecute\devcerts_match.htm e:\testresults\devcerts_match.htm
-
-testexecute z:\tswi\tdevcerts\scripts\devcerts_mismatch.script
-move c:\logs\testexecute\devcerts_mismatch.htm e:\testresults\devcerts_mismatch.htm
-
-testexecute z:\tswi\tdevcerts\scripts\devcerts_aggregate.script
-move c:\logs\testexecute\devcerts_aggregate.htm e:\testresults\devcerts_aggregate.htm
-
-testexecute z:\tswi\tdevcerts\scripts\devcerts_corrupt.script
-move c:\logs\testexecute\devcerts_corrupt.htm e:\testresults\devcerts_corrupt.htm
-
-testexecute z:\tswi\tdevcerts\scripts\devcerts_backuprestore.script
-move c:\logs\testexecute\devcerts_backuprestore.htm e:\testresults\devcerts_backuprestore.htm
-
-testexecute z:\tswi\tdevcerts\scripts\devcerts_backup.script
-move c:\logs\testexecute\devcerts_backup.htm e:\testresults\devcerts_backup.htm
-
-attrib c:\config.txt -r
-del c:\config.txt
-copy z:\tswi\tdevcerts\config2.txt c:\config.txt
-testexecute z:\tswi\tdevcerts\scripts\devcerts_restore.script
-move c:\logs\testexecute\devcerts_restore.htm e:\testresults\devcerts_restore.htm
-attrib c:\config.txt -r
-del c:\config.txt
-
-REM restore standard automated commdb for the rest of the tests
-ced -i z:\auto.cfg
-
-testexecute z:\tswi\tdevcerts\scripts\devcerts_ocsp.script
-move c:\logs\testexecute\devcerts_ocsp.htm e:\testresults\devcerts_ocsp.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testeclipse.script
-move c:\logs\testexecute\testeclipse.htm e:\testresults\testeclipse.htm
-
-#testexecute z:\tswi\tuiscriptadaptors\scripts\tuileavedialog.script
-#move c:\logs\testexecute\tuileavedialog.htm e:\testresults\tuileavedialog.htm
-
-#testexecute z:\tswi\tuiscriptadaptors\scripts\tuileavedialogasync.script
-#move c:\logs\testexecute\tuileavedialogasync.htm e:\testresults\tuileavedialogasync.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testappinuse.script
-move c:\logs\testexecute\testappinuse.htm e:\testresults\testappinuse.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testVFP.script
-move c:\logs\testexecute\testVFP.htm e:\testresults\testVFP.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\switermination.script
-move c:\logs\testexecute\switermination.htm e:\testresults\switermination.htm
-
-REM Test non removable flag
-testexecute z:\tswi\tuiscriptadaptors\scripts\testnonremovable_armv5.script
-move c:\logs\testexecute\testnonremovable_armv5.htm e:\testresults\testnonremovable_armv5.htm
-
-md c:\tswi\tbackuprestore
-testexecute z:\tswi\tuiscriptadaptors\scripts\tresetdevice.script
-move c:\logs\testexecute\tresetdevice.htm e:\testresults\tresetdevice.htm
-
-REM DevInfoSupport test
-tdevinfosupport
-copy c:\swi.log e:\testresults\swi.log
-del c:\swi.log
-testexecute z:\tswi\tuiscriptadaptors\scripts\tuileavedialog.script
-move c:\logs\testexecute\tuileavedialog.htm e:\testresults\tuileavedialog.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\tuileavedialogasync.script
-move c:\logs\testexecute\tuileavedialogasync.htm e:\testresults\tuileavedialogasync.htm
-
-REM SwiConsole Tests
-testexecute z:\tswi\tswiconsole\scripts\tswiconsole.script
-move c:\logs\testexecute\tswiconsole.htm e:\testresults\tswiconsole.htm
-
-REM DEF083628: Orphaned files in protected dirs can be overwritten by untrusted packages
-testexecute z:\tswi\tuiscriptadaptors\scripts\overwriteprivate_positive.script
-move c:\logs\testexecute\overwriteprivate_positive.htm e:\testresults\overwriteprivate_positive.script.htm
-
-testexecute z:\tswi\tautosigning\scripts\tautosigning.script
-copy c:\logs\testexeute\tautosigning.htm e:\testresults\tautosigning.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testasynccaps.script
-move c:\logs\testexecute\testasynccaps.htm e:\testresults\testasynccaps.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testdiskfullemulator.script
-move c:\logs\testexecute\testdiskfullemulator.htm e:\testresults\testdiskfullemulator.htm
-
-del e:\BigTempFile
-
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testmandatory_HW.script
-move c:\logs\testexecute\testmandatory_hw.htm e:\testresults\testmandatory.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testsystemcaps.script
-move c:\logs\testexecute\testsystemcaps.htm e:\testresults\testsystemcaps.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testusercaps.script
-move c:\logs\testexecute\testusercaps.htm e:\testresults\testusercaps.htm
-REM Demandpaging  tests
-testexecute z:\tswi\tuiscriptadaptors\scripts\tdempaging_armv5.script
-move c:\logs\testexecute\tdempaging_armv5.htm e:\testresults\tdempaging_armv5.htm
-
-REM CR0914Tests
-testexecute z:\tswi\tsisregistrytest\scripts\integritychecktest.script
-move c:\logs\testexecute\integritychecktest.htm e:\testresults\integritychecktest.htm
-
-REM NQP Tests for DataProvider
-testexecute z:\tswi\tdataprovider\scripts\tdataprovider.script
-move c:\logs\testexecute\tdataprovider.htm e:\testresults\tdataprovider.htm
-
-REM SWI Adorned filename handling tests
-testexecute.exe z:\tswi\tuiscriptadaptors\scripts\adornedfilenames.script
-copy c:\logs\testexecute\adornedfilenames.htm e:\testresults\adornedfilenames.htm
-
-del c:\temp\*.*
-attrib c:\tswi\*.* -r
-del c:\tswi\*.*
-
-attrib c:\logs\testexecute\*.* -r
-del c:\logs\testexecute\*.*
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/runswiromtests_9.4_mcs.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,59 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-	
-md c:\tswi\
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testpastub.script
-move c:\logs\testexecute\testpastub.htm e:\testresults\testpastub.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testsapropagatedstub.script
-move c:\logs\testexecute\testsapropagatedstub.htm e:\testresults\testsapropagatedstub.htm
-
-testexecute z:\tswi\tsis\scripts\tsis_failure.script
-move c:\logs\testexecute\tsis_failure.htm e:\testresults\tsis_failure.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testnotargetdevices.script
-move c:\logs\testexecute\testnotargetdevices.htm e:\testresults\testnotargetdevices.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testpreinstalled_delete.script
-move c:\logs\testexecute\testpreinstalled_delete.htm e:\testresults\testpreinstalled_delete.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\tsisstub_delete.script
-move c:\logs\testexecute\tsisstub_delete.htm e:\testresults\tsisstub_delete.htm
-
-REM DEF096906: Regression in SIS file functionality 
-testexecute z:\tswi\tuiscriptadaptors\scripts\testuninstallation.script
-move c:\logs\testexecute\testuninstallation.htm e:\testresults\testuninstallation.htm
-
-md c:\tswi\tbackuprestore\
-md c:\drive_r\
-setsubst r: c:\drive_r\
-testexecute z:\tswi\tpathsubst\scripts\tpathsubst.script
-move c:\logs\testexecute\tpathsubst.htm e:\testresults\tpathsubst.htm
-setsubst r:
-del c:\drive_r\*.*
-
-
-REM DEF083628: Orphaned files in protected dirs can be overwritten by untrusted packages
-testexecute z:\tswi\tuiscriptadaptors\scripts\overwriteprivate.script
-move c:\logs\testexecute\overwriteprivate.htm e:\testresults\overwriteprivate.script.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\cr956_test_armv5.script
-move c:\logs\testexecute\cr956_test_armv5.htm e:\testresults\cr956_test_armv5.htm
-
-del c:\temp\*.*
-attrib c:\tswi\*.* -r
-del c:\tswi\*.*
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/runswiromtests_9.5.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,330 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-md c:\savedresults
-copy /s e:\testresults\* c:\savedresults
-
-REM Save the USB Bootloader and BATS hardware board config file
-md c:\USBLoader
-copy /s e:\usbload.zip c:\USBLoader
-copy /s e:\_hw_board_* c:\USBLoader
-
-REM Run test
-testexecute z:\tswi\tuiscriptadaptors\scripts\tsilent_h2.script
-
-REM Run test
-testexecute z:\tswi\tuiscriptadaptors\scripts\tswidaemonstub_h2.script
-
-REM Run test
-testexecute z:\tswi\tuiscriptadaptors\scripts\inc098114_h2.script
-
-md c:\tswi
-md c:\tswi\tbackuprestore
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\tcleanupinfrastructure.script
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\tpropagation_arm.script
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\test_pa_sapropagated_notdelete.script
-
-REM Restore results
-md e:\testresults
-copy /s c:\savedresults e:\testresults\*
-del /s c:\savedresults\*
-
-REM Restore USB Bootloader and BATS hardware board config file
-copy c:\USBLoader\usbload.zip e:\usbload.zip
-copy c:\USBLoader\_hw_board_* e:\_hw_board_*
-del /s c:\USBLoader\*
-
-# Save Silent Install, cleanupinfrastructure and tpropagation test results
-move c:\logs\testexecute\tsilent_h2.htm e:\testresults\tsilent_h2.htm
-move c:\logs\testexecute\inc098114_h2.htm e:\testresults\inc098114_h2.htm
-move c:\logs\testexecute\tcleanupinfrastructure.htm e:\testresults\tcleanupinfrastructure.htm
-move c:\logs\testexecute\tpropagation_arm.htm e:\testresults\tpropagation_arm.htm
-move c:\logs\testexecute\test_pa_sapropagated_notdelete.htm e:\testresults\test_pa_sapropagated_notdelete.htm
-
-REM Run recognizer tests
-md c:\trecog
-copy /s z:\trecog\* c:\trecog
-
-testexecute z:\trecog\trecogcert.script
-move c:\logs\testexecute\trecogcert.htm e:\testresults\trecogcert.htm
-
-testexecute z:\trecog\trecogpkcs12.script
-move c:\logs\testexecute\trecogpkcs12.htm e:\testresults\trecogpkcs12.htm
-
-testexecute z:\tswi\swicaptests\scripts\swicaptests.script
-move c:\logs\testexecute\swicaptests.htm e:\testresults\swicaptests.htm
-
-testexecute z:\tswi\tsis\scripts\tsis.script
-move c:\logs\testexecute\tsis.htm e:\testresults\tsis.htm
-
-testexecute z:\tswi\tsis\scripts\tsis_signed.script
-move c:\logs\testexecute\tsis_signed.htm e:\testresults\tsis_signed.htm
-
-testexecute z:\tswi\tintegrityservices\scripts\tintegrityservices.script
-move c:\logs\testexecute\tintegrityservices.htm e:\testresults\tintegrityservices.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testuninstallation_arm_only.script
-move c:\logs\testexecute\testuninstallation_arm_only.htm e:\testresults\testuninstallation_arm_only.htm
-
-testexecute z:\tswi\tsishelper\scripts\tsishelper.script
-move c:\logs\testexecute\tsishelper.htm e:\testresults\tsishelper.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testwritableswicertstore.script
-move c:\logs\testexecute\testwritableswicertstore.htm e:\testresults\testwritableswicertstore.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testrucert.script
-move c:\logs\testexecute\testrucert.htm e:\testresults\testrucert.htm
-
-
-REM NQP Tests for DataProvider
-testexecute z:\tswi\tdataprovider\scripts\tdataprovider.script
-move c:\logs\testexecute\tdataprovider.htm e:\testresults\tdataprovider.htm
-
-md c:\private
-md c:\private\101f72a6\
-copy z:\tswi\tsis\data\certstore\* c:\private\101f72a6\ 
-
-attrib c:\tswi\*.* -r
-
-copy z:\auto.cfg c:\
-copy z:\auto_broken.cfg c:\
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\tuiscriptadaptors.script
-move c:\logs\testexecute\tuiscriptadaptors.htm e:\testresults\tuiscriptadaptors.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\tuninstallpkgs_h4.script
-move c:\logs\testexecute\tuninstallpkgs_h4.htm e:\testresults\tuninstallpkgs_h4.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testvids.script
-move c:\logs\testexecute\testvids.htm e:\testresults\testvids.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testasync.script
-move c:\logs\testexecute\testasync.htm e:\testresults\testasync.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testdrmasync.script
-move c:\logs\testexecute\testdrmasync.htm e:\testresults\testdrmasync.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\tuiscriptadaptorsFH.script
-move c:\logs\testexecute\tuiscriptadaptorsFH.htm e:\testresults\tuiscriptadaptorsFH.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testexpressions.script
-move c:\logs\testexecute\testexpressions.htm e:\testresults\testexpressions.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testdrives.script
-move c:\logs\testexecute\testdrives.htm e:\testresults\testdrives.htm
-
-copy z:\auto.cfg c:\auto.cfg
-attrib c:\auto.cfg -r
-
-testexecute z:\tswi\trevocation\scripts\trevocation.script
-move c:\logs\testexecute\trevocation.htm e:\testresults\trevocation.htm
-
-testexecute z:\tswi\tdaemon\scripts\tdaemon.script
-move c:\logs\testexecute\tdaemon.htm e:\testresults\tdaemon.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testlocations.script
-move c:\logs\testexecute\testlocations.htm e:\testresults\testlocations.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testcancel.script
-move c:\logs\testexecute\testcancel.htm e:\testresults\testcancel.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testasynccancel.script
-move c:\logs\testexecute\testasynccancel.htm e:\testresults\testasynccancel.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testrun.script
-move c:\logs\testexecute\testrun.htm e:\testresults\testrun.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testrunft.script
-move c:\logs\testexecute\testrunft.htm e:\testresults\testrunft.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testupgrades.script
-move c:\logs\testexecute\testupgrades.htm e:\testresults\testupgrades.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testaugmentations.script
-move c:\logs\testexecute\testaugmentations.htm e:\testresults\testaugmentations.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testpreinstalled.script
-move c:\logs\testexecute\testpreinstalled.htm e:\testresults\testpreinstalled.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testdependencies.script
-move c:\logs\testexecute\testdependencies.htm e:\testresults\testdependencies.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testshutdown.script
-move c:\logs\testexecute\testshutdown.htm e:\testresults\testshutdown.htm
-
-testexecute z:\tswi\tsisregistrytest\scripts\tsisregistrytest.script
-move c:\logs\testexecute\tsisregistrytest.htm e:\testresults\tsisregistrytest.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\tsisstub.script
-move c:\logs\testexecute\tsisstub.htm e:\testresults\tsisstub.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testdrm.script
-move c:\logs\testexecute\testdrm.htm e:\testresults\testdrm.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testdrmFH.script
-move c:\logs\testexecute\testdrmFH.htm e:\testresults\testdrmFH.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testmulti.script
-move c:\logs\testexecute\testmulti.htm e:\testresults\testmulti.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testextension.script
-move c:\logs\testexecute\testextension.htm e:\testresults\testextension.htm
-
-REM install automated commdb using sim.tsy for tdev
-ced -i z:\autosimtsy.cfg
-
-copy z:\tswi\tdevcerts\config.txt c:\config.txt
-testexecute z:\tswi\tdevcerts\scripts\devcerts_match.script
-move c:\logs\testexecute\devcerts_match.htm e:\testresults\devcerts_match.htm
-
-testexecute z:\tswi\tdevcerts\scripts\devcerts_mismatch.script
-move c:\logs\testexecute\devcerts_mismatch.htm e:\testresults\devcerts_mismatch.htm
-
-testexecute z:\tswi\tdevcerts\scripts\devcerts_aggregate.script
-move c:\logs\testexecute\devcerts_aggregate.htm e:\testresults\devcerts_aggregate.htm
-
-testexecute z:\tswi\tdevcerts\scripts\devcerts_corrupt.script
-move c:\logs\testexecute\devcerts_corrupt.htm e:\testresults\devcerts_corrupt.htm
-
-md c:\tswi\tbackuprestore
-testexecute z:\tswi\tdevcerts\scripts\devcerts_backuprestore.script
-move c:\logs\testexecute\devcerts_backuprestore.htm e:\testresults\devcerts_backuprestore.htm
-
-testexecute z:\tswi\tdevcerts\scripts\devcerts_backup.script
-move c:\logs\testexecute\devcerts_backup.htm e:\testresults\devcerts_backup.htm
-
-attrib c:\config.txt -r
-del c:\config.txt
-copy z:\tswi\tdevcerts\config2.txt c:\config.txt
-testexecute z:\tswi\tdevcerts\scripts\devcerts_restore.script
-move c:\logs\testexecute\devcerts_restore.htm e:\testresults\devcerts_restore.htm
-attrib c:\config.txt -r
-del c:\config.txt
-
-REM restore standard automated commdb for the rest of the tests
-ced -i z:\auto.cfg
-
-testexecute z:\tswi\tdevcerts\scripts\devcerts_ocsp.script
-move c:\logs\testexecute\devcerts_ocsp.htm e:\testresults\devcerts_ocsp.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testeclipse.script
-move c:\logs\testexecute\testeclipse.htm e:\testresults\testeclipse.htm
-
-#testexecute z:\tswi\tuiscriptadaptors\scripts\tuileavedialog.script
-#move c:\logs\testexecute\tuileavedialog.htm e:\testresults\tuileavedialog.htm
-
-#testexecute z:\tswi\tuiscriptadaptors\scripts\tuileavedialogasync.script
-#move c:\logs\testexecute\tuileavedialogasync.htm e:\testresults\tuileavedialogasync.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testappinuse.script
-move c:\logs\testexecute\testappinuse.htm e:\testresults\testappinuse.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testVFP.script
-move c:\logs\testexecute\testVFP.htm e:\testresults\testVFP.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\switermination.script
-move c:\logs\testexecute\switermination.htm e:\testresults\switermination.htm
-
-REM Test non removable flag
-testexecute z:\tswi\tuiscriptadaptors\scripts\testnonremovable.script
-move c:\logs\testexecute\testnonremovable.htm e:\testresults\testnonremovable.htm
-
-md c:\tswi\tbackuprestore
-testexecute z:\tswi\tuiscriptadaptors\scripts\tresetdevice.script
-move c:\logs\testexecute\tresetdevice.htm e:\testresults\tresetdevice.htm
-
-REM DevInfoSupport test
-tdevinfosupport
-copy c:\swi.log e:\testresults\swi.log
-del c:\swi.log
-testexecute z:\tswi\tuiscriptadaptors\scripts\tuileavedialog.script
-move c:\logs\testexecute\tuileavedialog.htm e:\testresults\tuileavedialog.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\tuileavedialogasync.script
-move c:\logs\testexecute\tuileavedialogasync.htm e:\testresults\tuileavedialogasync.htm
-
-REM SwiConsole Tests
-testexecute z:\tswi\tswiconsole\scripts\tswiconsole.script
-move c:\logs\testexecute\tswiconsole.htm e:\testresults\tswiconsole.htm
-
-REM DEF083628: Orphaned files in protected dirs can be overwritten by untrusted packages
-testexecute z:\tswi\tuiscriptadaptors\scripts\overwriteprivate_positive.script
-move c:\logs\testexecute\overwriteprivate_positive.htm e:\testresults\overwriteprivate_positive.script.htm
-
-testexecute z:\tswi\tautosigning\scripts\tautosigning.script
-move c:\logs\testexecute\tautosigning.htm e:\testresults\tautosigning.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testasynccaps.script
-move c:\logs\testexecute\testasynccaps.htm e:\testresults\testasynccaps.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testdiskfullemulator.script
-move c:\logs\testexecute\testdiskfullemulator.htm e:\testresults\testdiskfullemulator.htm
-
-del e:\BigTempFile
-
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testmandatory_HW.script
-move c:\logs\testexecute\testmandatory_hw.htm e:\testresults\testmandatory.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testsystemcaps.script
-move c:\logs\testexecute\testsystemcaps.htm e:\testresults\testsystemcaps.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testusercaps.script
-move c:\logs\testexecute\testusercaps.htm e:\testresults\testusercaps.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testusercaps_nousergrantcaps_hw.script
-move c:\logs\testexecute\testusercaps_nousergrantcaps_hw.htm e:\testresults\testusercaps_nousergrantcaps_hw.htm
-
-REM Demandpaging  tests
-testexecute z:\tswi\tuiscriptadaptors\scripts\tdempaging_armv5.script
-move c:\logs\testexecute\tdempaging_armv5.htm e:\testresults\tdempaging_armv5.htm
-
-REM CR0914Tests
-testexecute z:\tswi\tsisregistrytest\scripts\integritychecktest.script
-move c:\logs\testexecute\integritychecktest.htm e:\testresults\integritychecktest.htm
-
-REM NQP Tests for DataProvider
-testexecute z:\tswi\tdataprovider\scripts\tdataprovider.script
-move c:\logs\testexecute\tdataprovider.htm e:\testresults\tdataprovider.htm
-
-REM SWI Observer Tests
-testexecute z:\tswi\tswiobserver\scripts\testswiobserver.script
-copy c:\logs\testexecute\testswiobserver.htm e:\testresults\testswiobserver.htm
-
-REM SWI Adorned filename handling tests
-testexecute.exe z:\tswi\tuiscriptadaptors\scripts\adornedfilenames.script
-copy c:\logs\testexecute\adornedfilenames.htm e:\testresults\adornedfilenames.htm
-
-REM Backup/restore tests
-md c:\tswi\tbackuprestore
-
-testexecute z:\tswi\tbackuprestore\scripts\tbackuptrestore_exploratory.script
-move c:\logs\testexecute\tbackuptrestore_exploratory.htm e:\testresults\tbackuptrestore_exploratory.htm
-
-testexecute z:\tswi\tbackuprestore\scripts\tbackuprestore.script
-move c:\logs\testexecute\tbackuprestore.htm e:\testresults\tbackuprestore.htm
-
-testexecute z:\tswi\tbackuprestore\scripts\tbackuprestoredrive_armv5.script
-move c:\logs\testexecute\tbackuprestoredrive_armv5.htm e:\testresults\tbackuprestoredrive_armv5.htm
-
-del c:\temp\*.*
-attrib c:\tswi\*.* -r
-del c:\tswi\*.*
-
-attrib c:\logs\testexecute\*.* -r
-del c:\logs\testexecute\*.*
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/runswiromtests_9.6.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,334 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-md c:\savedresults
-copy /s e:\testresults\* c:\savedresults
-
-REM Save the USB Bootloader and BATS hardware board config file
-md c:\USBLoader
-copy /s e:\usbload.zip c:\USBLoader
-copy /s e:\_hw_board_* c:\USBLoader
-
-REM Run test
-testexecute z:\tswi\tuiscriptadaptors\scripts\tsilent_h2.script
-
-REM Run test
-testexecute z:\tswi\tuiscriptadaptors\scripts\tswidaemonstub_h2.script
-
-REM Run test
-testexecute z:\tswi\tuiscriptadaptors\scripts\inc098114_h2.script
-
-md c:\tswi
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\tcleanupinfrastructure.script
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\tpropagation_arm.script
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\test_pa_sapropagated_notdelete.script
-
-REM Restore results
-md e:\testresults
-copy /s c:\savedresults e:\testresults\*
-del /s c:\savedresults\*
-
-REM Restore USB Bootloader and BATS hardware board config file
-copy c:\USBLoader\usbload.zip e:\usbload.zip
-copy c:\USBLoader\_hw_board_* e:\_hw_board_*
-del /s c:\USBLoader\*
-
-# Save Silent Install, cleanupinfrastructure and tpropagation test results
-move c:\logs\testexecute\tsilent_h2.htm e:\testresults\tsilent_h2.htm
-move c:\logs\testexecute\tswidaemonstub_h2.htm e:\testresults\tswidaemonstub_h2.htm
-move c:\logs\testexecute\inc098114_h2.htm e:\testresults\inc098114_h2.htm
-move c:\logs\testexecute\tcleanupinfrastructure.htm e:\testresults\tcleanupinfrastructure.htm
-move c:\logs\testexecute\tpropagation_arm.htm e:\testresults\tpropagation_arm.htm
-move c:\logs\testexecute\test_pa_sapropagated_notdelete.htm e:\testresults\test_pa_sapropagated_notdelete.htm
-
-REM Run recognizer tests
-md c:\trecog
-copy /s z:\trecog\* c:\trecog
-
-testexecute z:\trecog\trecogcert.script
-move c:\logs\testexecute\trecogcert.htm e:\testresults\trecogcert.htm
-
-testexecute z:\trecog\trecogpkcs12.script
-move c:\logs\testexecute\trecogpkcs12.htm e:\testresults\trecogpkcs12.htm
-
-testexecute z:\tswi\swicaptests\scripts\swicaptests.script
-move c:\logs\testexecute\swicaptests.htm e:\testresults\swicaptests.htm
-
-testexecute z:\tswi\tsis\scripts\tsis.script
-move c:\logs\testexecute\tsis.htm e:\testresults\tsis.htm
-
-testexecute z:\tswi\tsis\scripts\tsis_signed.script
-move c:\logs\testexecute\tsis_signed.htm e:\testresults\tsis_signed.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testuninstallation_arm_only.script
-move c:\logs\testexecute\testuninstallation_arm_only.htm e:\testresults\testuninstallation_arm_only.htm
-
-testexecute z:\tswi\tsishelper\scripts\tsishelper.script
-move c:\logs\testexecute\tsishelper.htm e:\testresults\tsishelper.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testwritableswicertstore.script
-move c:\logs\testexecute\testwritableswicertstore.htm e:\testresults\testwritableswicertstore.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testrucert.script
-move c:\logs\testexecute\testrucert.htm e:\testresults\testrucert.htm
-
-
-REM NQP Tests for DataProvider
-testexecute z:\tswi\tdataprovider\scripts\tdataprovider.script
-move c:\logs\testexecute\tdataprovider.htm e:\testresults\tdataprovider.htm
-
-md c:\private
-md c:\private\101f72a6\
-copy z:\tswi\tsis\data\certstore\* c:\private\101f72a6\ 
-
-attrib c:\tswi\*.* -r
-
-copy z:\auto.cfg c:\
-copy z:\auto_broken.cfg c:\
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\tuiscriptadaptors.script
-move c:\logs\testexecute\tuiscriptadaptors.htm e:\testresults\tuiscriptadaptors.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\tuninstallpkgs_h4.script
-move c:\logs\testexecute\tuninstallpkgs_h4.htm e:\testresults\tuninstallpkgs_h4.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testvids.script
-move c:\logs\testexecute\testvids.htm e:\testresults\testvids.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testasync.script
-move c:\logs\testexecute\testasync.htm e:\testresults\testasync.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testdrmasync.script
-move c:\logs\testexecute\testdrmasync.htm e:\testresults\testdrmasync.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\tuiscriptadaptorsFH.script
-move c:\logs\testexecute\tuiscriptadaptorsFH.htm e:\testresults\tuiscriptadaptorsFH.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testexpressions.script
-move c:\logs\testexecute\testexpressions.htm e:\testresults\testexpressions.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testdrives.script
-move c:\logs\testexecute\testdrives.htm e:\testresults\testdrives.htm
-
-copy z:\auto.cfg c:\auto.cfg
-attrib c:\auto.cfg -r
-md c:\tswi\tbackuprestore
-testexecute z:\tswi\tbackuprestore\scripts\tbackuprestore.script
-move c:\logs\testexecute\tbackuprestore.htm e:\testresults\tbackuprestore.htm
-
-testexecute z:\tswi\tbackuprestore\scripts\tbackuprestoredrive_armv5.script
-move c:\logs\testexecute\tbackuprestoredrive_armv5.htm e:\testresults\tbackuprestoredrive_armv5.htm
-
-testexecute z:\tswi\tbackuprestore\scripts\tbackuptrestore_exploratory.script
-move c:\logs\testexecute\tbackuptrestore_exploratory.htm e:\testresults\tbackuptrestore_exploratory.htm
-
-testexecute z:\tswi\trevocation\scripts\trevocation.script
-move c:\logs\testexecute\trevocation.htm e:\testresults\trevocation.htm
-
-testexecute z:\tswi\tdaemon\scripts\tdaemon.script
-move c:\logs\testexecute\tdaemon.htm e:\testresults\tdaemon.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testlocations.script
-move c:\logs\testexecute\testlocations.htm e:\testresults\testlocations.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testcancel.script
-move c:\logs\testexecute\testcancel.htm e:\testresults\testcancel.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testrun.script
-move c:\logs\testexecute\testrun.htm e:\testresults\testrun.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testrunft.script
-move c:\logs\testexecute\testrunft.htm e:\testresults\testrunft.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testupgrades.script
-move c:\logs\testexecute\testupgrades.htm e:\testresults\testupgrades.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testaugmentations.script
-move c:\logs\testexecute\testaugmentations.htm e:\testresults\testaugmentations.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testpreinstalled.script
-move c:\logs\testexecute\testpreinstalled.htm e:\testresults\testpreinstalled.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testdependencies.script
-move c:\logs\testexecute\testdependencies.htm e:\testresults\testdependencies.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testshutdown.script
-move c:\logs\testexecute\testshutdown.htm e:\testresults\testshutdown.htm
-
-testexecute z:\tswi\tsisregistrytest\scripts\tsisregistrytest.script
-move c:\logs\testexecute\tsisregistrytest.htm e:\testresults\tsisregistrytest.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\tsisstub.script
-move c:\logs\testexecute\tsisstub.htm e:\testresults\tsisstub.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testdrm.script
-move c:\logs\testexecute\testdrm.htm e:\testresults\testdrm.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testdrmFH.script
-move c:\logs\testexecute\testdrmFH.htm e:\testresults\testdrmFH.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testmulti.script
-move c:\logs\testexecute\testmulti.htm e:\testresults\testmulti.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testextension.script
-move c:\logs\testexecute\testextension.htm e:\testresults\testextension.htm
-
-REM install automated commdb using sim.tsy for tdev
-ced -i z:\autosimtsy.cfg
-
-copy z:\tswi\tdevcerts\config.txt c:\config.txt
-testexecute z:\tswi\tdevcerts\scripts\devcerts_match.script
-move c:\logs\testexecute\devcerts_match.htm e:\testresults\devcerts_match.htm
-
-testexecute z:\tswi\tdevcerts\scripts\devcerts_mismatch.script
-move c:\logs\testexecute\devcerts_mismatch.htm e:\testresults\devcerts_mismatch.htm
-
-testexecute z:\tswi\tdevcerts\scripts\devcerts_aggregate.script
-move c:\logs\testexecute\devcerts_aggregate.htm e:\testresults\devcerts_aggregate.htm
-
-testexecute z:\tswi\tdevcerts\scripts\devcerts_corrupt.script
-move c:\logs\testexecute\devcerts_corrupt.htm e:\testresults\devcerts_corrupt.htm
-
-testexecute z:\tswi\tdevcerts\scripts\devcerts_backuprestore.script
-move c:\logs\testexecute\devcerts_backuprestore.htm e:\testresults\devcerts_backuprestore.htm
-
-testexecute z:\tswi\tdevcerts\scripts\devcerts_backup.script
-move c:\logs\testexecute\devcerts_backup.htm e:\testresults\devcerts_backup.htm
-
-attrib c:\config.txt -r
-del c:\config.txt
-copy z:\tswi\tdevcerts\config2.txt c:\config.txt
-testexecute z:\tswi\tdevcerts\scripts\devcerts_restore.script
-move c:\logs\testexecute\devcerts_restore.htm e:\testresults\devcerts_restore.htm
-attrib c:\config.txt -r
-del c:\config.txt
-
-REM restore standard automated commdb for the rest of the tests
-ced -i z:\auto.cfg
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\tswiregcompfields.script
-move c:\logs\testexecute\tswiregcompfields.htm e:\testresults\tswiregcompfields.htm
-
-testexecute z:\tswi\tdevcerts\scripts\devcerts_ocsp.script
-move c:\logs\testexecute\devcerts_ocsp.htm e:\testresults\devcerts_ocsp.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testeclipse.script
-move c:\logs\testexecute\testeclipse.htm e:\testresults\testeclipse.htm
-
-#testexecute z:\tswi\tuiscriptadaptors\scripts\tuileavedialog.script
-#move c:\logs\testexecute\tuileavedialog.htm e:\testresults\tuileavedialog.htm
-
-#testexecute z:\tswi\tuiscriptadaptors\scripts\tuileavedialogasync.script
-#move c:\logs\testexecute\tuileavedialogasync.htm e:\testresults\tuileavedialogasync.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testappinuse.script
-move c:\logs\testexecute\testappinuse.htm e:\testresults\testappinuse.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testVFP.script
-move c:\logs\testexecute\testVFP.htm e:\testresults\testVFP.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\switermination.script
-move c:\logs\testexecute\switermination.htm e:\testresults\switermination.htm
-
-REM Test non removable flag
-testexecute z:\tswi\tuiscriptadaptors\scripts\testnonremovable.script
-move c:\logs\testexecute\testnonremovable.htm e:\testresults\testnonremovable.htm
-
-md c:\tswi\tbackuprestore
-testexecute z:\tswi\tuiscriptadaptors\scripts\tresetdevice.script
-move c:\logs\testexecute\tresetdevice.htm e:\testresults\tresetdevice.htm
-
-REM Demandpaging  tests
-testexecute z:\tswi\tuiscriptadaptors\scripts\tdempaging_armv5.script
-move c:\logs\testexecute\tdempaging_armv5.htm e:\testresults\tdempaging_armv5.htm
-
-REM DevInfoSupport test
-tdevinfosupport
-copy c:\swi.log e:\testresults\swi.log
-del c:\swi.log
-testexecute z:\tswi\tuiscriptadaptors\scripts\tuileavedialog.script
-move c:\logs\testexecute\tuileavedialog.htm e:\testresults\tuileavedialog.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\tuileavedialogasync.script
-move c:\logs\testexecute\tuileavedialogasync.htm e:\testresults\tuileavedialogasync.htm
-
-REM SwiConsole Tests
-testexecute z:\tswi\tswiconsole\scripts\tswiconsole.script
-move c:\logs\testexecute\tswiconsole.htm e:\testresults\tswiconsole.htm
-
-REM DEF083628: Orphaned files in protected dirs can be overwritten by untrusted packages
-testexecute z:\tswi\tuiscriptadaptors\scripts\overwriteprivate_positive.script
-move c:\logs\testexecute\overwriteprivate_positive.htm e:\testresults\overwriteprivate_positive.script.htm
-
-REM SWI Observer Tests
-testexecute z:\tswi\tswiobserver\scripts\testswiobserver.script
-copy c:\logs\testexecute\testswiobserver.htm e:\testresults\testswiobserver.htm
-
-testexecute z:\tswi\tautosigning\scripts\tautosigning.script
-copy c:\logs\testexeute\tautosigning.htm e:\testresults\tautosigning.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testasynccaps.script
-move c:\logs\testexecute\testasynccaps.htm e:\testresults\testasynccaps.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testdiskfullemulator.script
-move c:\logs\testexecute\testdiskfullemulator.htm e:\testresults\testdiskfullemulator.htm
-
-del e:\BigTempFile
-
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testmandatory_HW.script
-move c:\logs\testexecute\testmandatory_hw.htm e:\testresults\testmandatory.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testsystemcaps.script
-move c:\logs\testexecute\testsystemcaps.htm e:\testresults\testsystemcaps.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testusercaps.script
-move c:\logs\testexecute\testusercaps.htm e:\testresults\testusercaps.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testusercaps_nousergrantcaps_hw.script
-move c:\logs\testexecute\testusercaps_nousergrantcaps_hw.htm e:\testresults\testusercaps_nousergrantcaps_hw.htm
-
-testexecute z:\tswi\tuiscriptadaptors\scripts\testasynccancel.script
-move c:\logs\testexecute\testasynccancel.htm e:\testresults\testasynccancel.htm
-
-REM CR0914Tests
-testexecute z:\tswi\tsisregistrytest\scripts\integritychecktest.script
-move c:\logs\testexecute\integritychecktest.htm e:\testresults\integritychecktest.htm
-
-REM NQP Tests for DataProvider
-testexecute z:\tswi\tdataprovider\scripts\tdataprovider.script
-move c:\logs\testexecute\tdataprovider.htm e:\testresults\tdataprovider.htm
-
-REM SWI Adorned filename handling tests
-testexecute.exe z:\tswi\tuiscriptadaptors\scripts\adornedfilenames.script
-copy c:\logs\testexecute\adornedfilenames.htm e:\testresults\adornedfilenames.htm
-
-REM Tests for Post manufacture installation of a Layered Execution Environment
-testexecute z:\tswi\tuiscriptadaptors\scripts\tswtype.script
-move c:\logs\testexecute\tswtype.htm e:\testresults\tswtype.htm
-
-REM SISREgistry performance tests are run last as they modify the registry directly and can impact later tests
-testexecute z:\tswi\tsisregistrytest\scripts\tsisregistry_performance.script
-move c:\logs\testexecute\tsisregistry_performance.htm e:\testresults\tsisregistry_performance.htm
-
-del c:\temp\*.*
-attrib c:\tswi\*.* -r
-del c:\tswi\*.*
-
-attrib c:\logs\testexecute\*.* -r
-del c:\logs\testexecute\*.*
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptomgmtlibs/securitytestfw/test/autotesting/runupstests.bat	Wed Apr 14 17:48:59 2010 +0300
@@ -0,0 +1,50 @@
+@rem
+@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
+@rem All rights reserved.
+@rem This component and the accompanying materials are made available
+@rem under the terms of the License "Eclipse Public License v1.0"
+@rem which accompanies this distribution, and is available
+@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
+@rem
+@rem Initial Contributors:
+@rem Nokia Corporation - initial contribution.
+@rem
+@rem Contributors:
+@rem
+@rem Description: 
+@rem
+
+md e:\testresults\
+testexecute z:\tups\tupsdb\scripts\tupsdb.script 
+move c:\logs\testexecute\tupsdb.htm e:\testresults\tupsdb.htm
+
+testexecute z:\tups\tupsdb\scripts\tupsdbperformance.script 
+move c:\logs\testexecute\tupsdbperformance.htm e:\testresults\tupsdbperformance.htm
+
+rem UPS policy library unit tests
+testexecute z:\tups\tpolicies\scripts\tpolicycache.script
+move c:\logs\testexecute\tpolicycache.htm e:\testresults\tpolicycache.htm
+testexecute z:\tups\tpolicies\scripts\tpolicyreader.script
+move c:\logs\testexecute\tpolicyreader.htm e:\testresults\tpolicyreader.htm
+testexecute z:\tups\tpolicies\scripts\tserviceconfig.script
+move c:\logs\testexecute\tserviceconfig.htm e:\testresults\tserviceconfig.htm
+
+rem ups integration tests
+rem Creates temporary folder for backup and restore tests.
+md c:\tswi
+md c:\tswi\tbackuprestore
+
+testexecute z:\tups\integ\scripts\tups_integ.script
+move c:\logs\testexecute\tups_integ.htm e:\testresults\tups_integ.htm
+
+tmsgapp.exe
+move c:\tmsgapp.log e:\testresults\tmsgapp.log
+del c:\tmsgapp.log
+
+attrib c:\logs\testexecute\*.* -r
+del c:\logs\testexecute\*.*
+
+rem Deletes temporary folder for backup and restore tests.
+attrib c:\tswi\*.* -r
+del c:\tswi\*.*
+
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/runupstests_9.4.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,50 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-md e:\testresults\
-testexecute z:\tups\tupsdb\scripts\tupsdb.script 
-move c:\logs\testexecute\tupsdb.htm e:\testresults\tupsdb.htm
-
-testexecute z:\tups\tupsdb\scripts\tupsdbperformance.script 
-move c:\logs\testexecute\tupsdbperformance.htm e:\testresults\tupsdbperformance.htm
-
-rem UPS policy library unit tests
-testexecute z:\tups\tpolicies\scripts\tpolicycache.script
-move c:\logs\testexecute\tpolicycache.htm e:\testresults\tpolicycache.htm
-testexecute z:\tups\tpolicies\scripts\tpolicyreader.script
-move c:\logs\testexecute\tpolicyreader.htm e:\testresults\tpolicyreader.htm
-testexecute z:\tups\tpolicies\scripts\tserviceconfig.script
-move c:\logs\testexecute\tserviceconfig.htm e:\testresults\tserviceconfig.htm
-
-rem ups integration tests
-rem Creates temporary folder for backup and restore tests.
-md c:\tswi
-md c:\tswi\tbackuprestore
-
-testexecute z:\tups\integ\scripts\tups_integ.script
-move c:\logs\testexecute\tups_integ.htm e:\testresults\tups_integ.htm
-
-tmsgapp.exe
-move c:\tmsgapp.log e:\testresults\tmsgapp.log
-del c:\tmsgapp.log
-
-attrib c:\logs\testexecute\*.* -r
-del c:\logs\testexecute\*.*
-
-rem Deletes temporary folder for backup and restore tests.
-attrib c:\tswi\*.* -r
-del c:\tswi\*.*
-
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/runusiftests.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,46 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-REM run SIF tests
-testexecute z:\tusif\tsif\tsif.script
-move c:\logs\testexecute\tsif.htm e:\testresults\tsif.htm
-
-testexecute z:\tusif\tsifintegration\tsifintegration.script
-move c:\logs\testexecute\tsifintegration.htm e:\testresults\tsifintegration.htm
-
-testexecute z:\tusif\tsifrefinstaller\tsifrefinstaller.script
-move c:\logs\testexecute\tsifrefinstaller.htm e:\testresults\tsifrefinstaller.htm
-
-REM run integration tests for Post manufacture installation of a Layered Execution Environment
-testexecute z:\tusif\tswtype\tsifswtypeintegration.script
-move c:\logs\testexecute\tsifswtypeintegration.htm e:\testresults\tsifswtypeintegration.htm
-
-REM run SCR tests
-testexecute z:\tusif\tscr\tscr.script
-move c:\logs\testexecute\tscr.htm e:\testresults\tscr.htm
-
-testexecute z:\tusif\tscr\tscr_performance.script
-move c:\logs\testexecute\tscr_performance.htm e:\testresults\tscr_performance.htm
-
-REM run STS tests
-testexecute z:\tusif\tsts\tsts.script
-move c:\logs\testexecute\tsts.htm e:\testresults\tsts.htm
-
-testexecute z:\tusif\tsts\tintegrityservices\scripts\tsts_tintegrityservices.script
-move c:\logs\testexecute\tsts_tintegrityservices.htm e:\testresults\tsts_tintegrityservices.htm
-
-testexecute z:\tusif\tsts\tsts_rollbackall.script
-move c:\logs\testexecute\tsts_rollbackall.htm e:\testresults\tsts_rollbackall.htm
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/sdp_bld.inf	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptomgmtlibs/securitytestfw/test/autotesting/sdp_bld.inf	Wed Apr 14 17:48:59 2010 +0300
@@ -1,5 +1,5 @@
 /*
-* Copyright (c) 2008-2009 Nokia Corporation and/or its subsidiary(-ies).
+* Copyright (c) 2008-2010 Nokia Corporation and/or its subsidiary(-ies).
 * All rights reserved.
 * This component and the accompanying materials are made available
 * under the terms of the License "Eclipse Public License v1.0"
@@ -53,24 +53,15 @@
 #include "os/security/securityanddataprivacytools/securityconfig/group/bld.inf"
 #include "os/security/cryptomgmtlibs/securitytestfw/group/bld.inf"
 #include "os/security/contentmgmt/cafrecogniserconfig/bld.inf"
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-#include "os/security/contentmgmt/referencedrmagent/refcafhelper/group/bld.inf"
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 #include "os/security/contentmgmt/contentaccessfwfordrm/group/bld.inf"
 #include "os/security/contentmgmt/cafstreamingsupport/group/bld.inf"
 #include "os/security/contentmgmt/referencedrmagent/RefTestAgent/group/bld.inf"
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-#include "os/security/contentmgmt/mtputils/group/bld.inf"
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 
 #include "os/security/authorisation/userpromptservice/group/bld.inf"
 #include "os/security/authorisation/userpromptutils/group/bld.inf"
 
 
-#ifdef SYMBIAN_AUTH_SERVER
-#include "os/security/authenticationservices/authenticationserver/group/bld.inf"
-#endif
 
 #endif //TOOLS2
 
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/testMakesis.pl	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,2850 +0,0 @@
-#
-# Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-# All rights reserved.
-# This component and the accompanying materials are made available
-# under the terms of the License "Eclipse Public License v1.0"
-# which accompanies this distribution, and is available
-# at the URL "http://www.eclipse.org/legal/epl-v10.html".
-#
-# Initial Contributors:
-# Nokia Corporation - initial contribution.
-#
-# Contributors:
-#
-# Description:
-# Perl script that creates PKG files and test MAKESIS tools with different ranges
-# 
-
-#
-
-
-$logFile = "/epoc32/winscw/c/makesis_test.txt";
-$makesisExeLocation = "/epoc32/tools/makesis";
-$dumpsisExeLocation = "/epoc32/tools/dumpsis";
-
-sub GetTmpFilesCount()
-{
-	# get a number of temp files
-	if ($^O =~ /^MSWIN32$/i)
-		{
-		my $dirname = "$ENV{'TEMP'}";
-		opendir ( DIR, "$dirname" ) or die ( "Can't open dir: $dirname" ); #!
-		my @List = readdir DIR;
-		closedir DIR;
-		
-		my @TmpFiles = grep( /^~SI.*.tmp/ , @List );
-		}
-	else
-		{
-		my $dirname = "/tmp/";
-		opendir ( DIR, "$dirname" ) or die ( "Can't open dir: $dirname" ); #!
-		my @List = readdir DIR;
-		closedir DIR;
-
-		my @TmpFiles = grep( /tmp*/ , @List );
-		}
-
-	my $TmpCountBefore = @TmpFiles;
-	
-	return $TmpCountBefore;
-}
-
-#
-#Function to write log into file
-#
-sub WriteLog {
-	my ($log) = @_;
-	#public $logfile;
-
-	unless( open($fh, ">> $logFile")) {
-		printf STDERR "Can\'t open $logfile:$!\n";
-		return;
-	}
-	printf $fh $log;
-	printf $log;
-	close $fh;
-}
-
-
-#
-# Function to create a file (test.txt or any PKG)
-#
-sub CreateFile {
-	my ($filename, $contents) = @_;
-
-	unless (open($fh, "> $filename")) {
-		printf STDERR "Can't open $filename: $!\n";
-		return;
-	}
-	print $fh $contents;
-	close $fh;
-
-
-}
-
-#
-# Function to check the log file of the makesis result
-#
-sub CheckLog {
-	my ($pkgfile) = @_[0];
-	my ($expectedLog) = @_[1];
-
-	$logMsg = sprintf "Expected Log: %s\n", $expectedLog;
-	WriteLog( $logMsg);	
-
-	unless (open($resultlog, "$pkgfile.log")) {
-		printf STDERR "Can't open $pkgfile.log: $!\n";
-		return 0;
-	}
-
-	foreach $line (<$resultlog>) {
-		if ( $line =~ m/\Q$expectedLog\E/i) {
-			close($resultlog);
-			return 1;
-		}	
-	}	
-	close($resultlog);
-	return 0;
-}
-
-#
-# Run MAKESIS with prepared pkg file, log and administrate its result
-#
-sub MakeSISFile {
-
-	my ($pkgfile) = @_[0];
-	my ($expectedResult) = @_[1];
-	my ($expectedLog) = @_[2];
-	$pkgfile =~ s/\.pkg//;
-
-	if($pkgfile ne "testinterpretflag") {
-		@retval = system("$makesisExeLocation -v $pkgfile.pkg $pkgfile-tmp.sis > $pkgfile.log");
-	}
-	else {
-		@retval = system("$makesisExeLocation -v -c $pkgfile.pkg $pkgfile-tmp.sis > $pkgfile.log");
-	}
-
-	$logMsg = sprintf "Expected code:%5d   result Code:%5d\n", $expectedResult, $?;
-	WriteLog( $logMsg);
-
-	$NumberOfTests++;
-
-	if( $? == $expectedResult ) {
-		if(CheckLog($pkgfile, $expectedLog)) {
-			$NumberOfPassed++;
-			WriteLog("Passed\n\n");
-		}
-		else {
-			$NumberOfFailed++;
-			WriteLog("Failed : Unexpected Error Log\n\n");
-		}
-	}
-	else {
-		$NumberOfFailed++;
-		WriteLog("Failed : Unexpected Error Code\n\n");
-	}
-
-	unlink("$pkgfile-tmp.sis");
-	unlink("$pkgfile.log");
-	unlink("$pkgfile.pkg");
-
-}
-
-#
-# Additional test to check that stub files don't change every time 
-# they are built.
-#
-sub TestSISStubFile {
-
-	$teststubpkg = "teststub.pkg";
-	$teststubsis = "teststub.sis";
-	$comparisonsis = "comparison.sis";
-	$teststublog = "teststub.log";
-
-	WriteLog("Test invariant stub file\n");
-
-	# Generate test PKG file contents
-	$PkgFile = sprintf( $PkgFileTempl, "-1,-1,-1"); 
-	# Create PKG file
-	CreateFile($teststubpkg, $PkgFile);	
-
-	# Create a stub sis file
-	my $result = system("$makesisExeLocation -s $teststubpkg $teststubsis > $teststublog");
-	
-	# Wait at least a second and generate it again
-	sleep 2;
-	rename($teststubsis, $comparisonsis) or  
-        warn "Couldn't rename $teststubsis to $comparisonsis: $!\n";
-
-	my $result2 = system("$makesisExeLocation -s $teststubpkg $teststubsis > $teststublog");
-
-	# Check that the files are the same and log the result
-	use File::Compare;
-	$NumberOfTests++;
-	if (compare($teststubsis, $comparisonsis) == 0 
-	    && $result == 0
-		&& $result2 == 0) 
-		{
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-		}
-	else 
-		{
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-		}
-
-	unlink $teststublog;
-	unlink $teststubpkg;
-	unlink $teststubsis ;
-	unlink $comparisonsis;
-}
-
-#
-# New test code for DEF083525 - makesis -vs does not create a stub sis file 
-# This is based on TestSISStubFile, it builds the stub file with -s and -vs options 
-# and checks the resulting files are the same.  The defects was that the "s" option
-# was ignored so a stub file was not built.
-#
-sub TestDEF083525 {
-
-	$teststubpkg = "teststub.pkg";
-	$teststubsis = "teststub.sis";
-	$comparisonsis = "comparison.sis";
-	$teststublog = "teststub.log";
-
-	WriteLog("Test for DEF083525 - makesis -vs does not create a stub sis file\n");
-
-	# Generate test PKG file contents
-	$PkgFile = sprintf( $PkgFileTempl, "-1,-1,-1"); 
-	# Create PKG file
-	CreateFile($teststubpkg, $PkgFile);	
-
-	# Create a stub sis file
-	my $result = system("$makesisExeLocation -s $teststubpkg $teststubsis > $teststublog");
-	
-	# Wait at least a second and generate it again this time using the -vs options
-	# This defect was that the -vs options was ignored
-	sleep 2;
-	rename $teststubsis, $comparisonsis;
-	my $result2 = system("$makesisExeLocation -vs $teststubpkg $teststubsis > $teststublog");
-
-	# Check that the files are the same and log the result
-	use File::Compare;
-	$NumberOfTests++;
-	if (compare($teststubsis, $comparisonsis) == 0 
-	    && $result == 0
-		&& $result2 == 0) 
-		{
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-		}
-	else 
-		{
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-		}
-
-	unlink $teststublog;
-	unlink $teststubpkg;
-	unlink $teststubsis ;
-	unlink $comparisonsis;
-}
-
-#
-# New test code for PDEF081989 - makesis parameter -d does not work any more. 
-# This creates a testembedded.sis file embedding testembedding.sis. This test checks the 
-# working of -d parameter where the search directory containing the embedding sis file is  
-# specified with -d option.
-#
-
-sub TestPDEF081989 {
-
-	$testembeddingpkg = "testembedding.pkg";
-	$testembeddingsis = "testembedding.sis";
-	$testembeddedpkg = "testembedded.pkg";
-	$testembeddedsis = "testembedded.sis";
-	$sisFileToEmbed = "/epoc32/winscw/c/";
-	$outputFile = $sisFileToEmbed.$testembeddingsis;
-	$testEmbedLog = "testembedded.log";
-
-	WriteLog("Test for PDEF081989 - Test for successful creation of a sis file with -d option.\n");
-
-	# Generate test PKG file contents for embedding pkg file.
-	$PkgFile = sprintf( $PkgFileTempl, "-1,-1,-1"); 
-	# Create PKG file
-	CreateFile($testembeddingpkg, $PkgFile);	
-	
-	# Generate test PKG file contents for embedded pkg file.
-	$PkgFile = sprintf( $embedContents, "-1,-1,-1"); 
-	# Create PKG file
-	CreateFile($testembeddedpkg , $PkgFile);
-
-	
-	# Create an embedding sis file
-	my $result = system("$makesisExeLocation $testembeddingpkg $outputFile > $testEmbedLog");
-	
-	# Create an embedded sis file.Here the sis file embedded is situated elsewhere(in "\\epoc32\\winscw\\c\\").
-	# Makesis -d option is used to specify the directory to search for sis file embedded. 
-	my $result1 = system("$makesisExeLocation -d$sisFileToEmbed $testembeddedpkg $testembeddedsis > $testEmbedLog");
-	
-	$NumberOfTests++;
-	if ($result == 0 && $result1 == 0) 
-		{
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-		}
-	else 
-		{
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-		}
-
-	unlink $testembeddingpkg;
-	unlink $outputFile;
-	unlink $testembeddedpkg;
-	unlink $testembeddedsis;
-	unlink $testEmbedLog;
-	
-}
-
-#
-# Test code for DEF104895 - makesis with -d option
-# This creates a testembedded.sis file embedding testembedding.sis. This test checks the 
-# working of -d parameter where the search directory(bacward slashes) containing the embedding sis file is  
-# specified with -d option.
-#
-
-sub TestDEF104895 {
-
-	$testembeddingpkg = "testembedding.pkg";
-	$testembeddingsis = "testembedding.sis";
-	$testembeddedpkg = "testembedded.pkg";
-	$testembeddedsis = "testembedded.sis";
-	$sisFileToEmbed = "\\epoc32\\winscw\\c\\";
-	$outputFile = $sisFileToEmbed.$testembeddingsis;
-	$testEmbedLog = "testembedded.log";
-
-	WriteLog("Test for DEF104895 - Test for successful creation of a sis file with -d option.\n");
-
-	# Generate test PKG file contents for embedding pkg file.
-	$PkgFile = sprintf( $PkgFileTempl, "-1,-1,-1"); 
-	# Create PKG file
-	CreateFile($testembeddingpkg, $PkgFile);	
-	
-	# Generate test PKG file contents for embedded pkg file.
-	$PkgFile = sprintf( $embedContents, "-1,-1,-1"); 
-	# Create PKG file
-	CreateFile($testembeddedpkg , $PkgFile);
-
-	
-	# Create an embedding sis file
-	my $result = system("$makesisExeLocation $testembeddingpkg $outputFile > $testEmbedLog");
-	
-	# Create an embedded sis file.Here the sis file embedded is situated elsewhere(in "\\epoc32\\winscw\\c\\").
-	# Makesis -d option is used to specify the directory to search for sis file embedded. 
-	my $result1 = system("$makesisExeLocation -d$sisFileToEmbed $testembeddedpkg $testembeddedsis > $testEmbedLog");
-	
-	$NumberOfTests++;
-	if ($result == 0 && $result1 == 0) 
-		{
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-		}
-	else 
-		{
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-		}
-
-	unlink $testembeddingpkg;
-	unlink $outputFile;
-	unlink $testembeddedpkg;
-	unlink $testembeddedsis;
-	unlink $testEmbedLog;
-	
-}
-
-#
-# New test code for DEF107033 - makesis parameter -d does not work with language dependent files
-# 
-#
-
-sub TestDEF107033() {
-
-	$testlanguagepkg = "testlanguage.pkg";
-	$testlanguagesis = "testlanguagesis.sis";
-	$testlanguagelog = "testlanguage.log";
-
-	WriteLog("Test makesis parameter -d does not work with language dependent files\n");
-
-	# Generate test PKG file contents
-	$PkgFile = sprintf( $PkgLanguageFileTemp); 
-	# Create PKG file
-	CreateFile($testlanguagepkg, $PkgFile);	
-
-	# Create a stub sis file
-	my $result = system("$makesisExeLocation -d/epoc32/winscw/c/tswi/ $testlanguagepkg $testlanguagesis > $testlanguagelog");
-	
-
-	$NumberOfTests++;
-
-	if ($result == 0) {
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-	}
-	else {
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-	}
-
-	unlink $testlanguagepkg;
-	unlink $testlanguagesis;
-	unlink $testlanguagelog ;
-
-}
-
-#
-# Test code for DEF104895 - makesis with -d option
-# This creates a testembedded.sis file embedding testembedding.sis. This test checks the 
-# working of -d parameter where the search directory(bacward slashes) containing the embedding sis file is  
-# specified with -d option.
-#
-
-sub TestLDEF104895 {
-
-	$testembeddingpkg = "testembedding.pkg";
-	$testembeddingsis = "testembedding.sis";
-	$testembeddedpkg = "testembedded.pkg";
-	$testembeddedsis = "testembedded.sis";
-	$sisFileToEmbed = "\\\\epoc32\\\\winscw\\\\c\\\\";
-	$outputFile = $sisFileToEmbed.$testembeddingsis;
-	$testEmbedLog = "testembedded.log";
-
-	WriteLog("Test for DEF104895 - Test for successful creation of a sis file with -d option.\n");
-
-	# Generate test PKG file contents for embedding pkg file.
-	$PkgFile = sprintf( $PkgFileTempl, "-1,-1,-1"); 
-	# Create PKG file
-	CreateFile($testembeddingpkg, $PkgFile);	
-	
-	# Generate test PKG file contents for embedded pkg file.
-	$PkgFile = sprintf( $embedContents, "-1,-1,-1"); 
-	# Create PKG file
-	CreateFile($testembeddedpkg , $PkgFile);
-
-	
-	# Create an embedding sis file
-	my $result = system("$makesisExeLocation $testembeddingpkg $outputFile > $testEmbedLog");
-	
-	# Create an embedded sis file.Here the sis file embedded is situated elsewhere(in "\\epoc32\\winscw\\c\\").
-	# Makesis -d option is used to specify the directory to search for sis file embedded. 
-	my $result1 = system("$makesisExeLocation -d$sisFileToEmbed $testembeddedpkg $testembeddedsis > $testEmbedLog");
-	
-	$NumberOfTests++;
-	if ($result == 0 && $result1 == 0) 
-		{
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-		}
-	else 
-		{
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-		}
-
-	unlink $testembeddingpkg;
-	unlink $outputFile;
-	unlink $testembeddedpkg;
-	unlink $testembeddedsis;
-	unlink $testEmbedLog;
-	
-}
-
-
-#
-# New test code for DEF090878 - unexpected error by makesis when processing pkg file saved in UTF8 format
-# This test uses existing utf8.pkg which contains UTF-8 encoded characters and in turn refers to utf8.txt
-#
-sub TestDEF090878 {
-
-	my $path = "/epoc32/winscw/c/tswi";
-	my $pkgfile = "$path/utf8";
-	my $expectedResult = 0;
-
-	WriteLog("Test for DEF090878 - unexpected error by makesis when processing pkg file saved in UTF8 format\n");
-	WriteLog("UTF-8 encoded file: $pkgfile.pkg\n");
-	
-	# Do MAKESIS test
-	@retval = system("$makesisExeLocation $pkgfile.pkg $pkgfile-tmp.sis > $pkgfile.log");
-	
-	$logMsg = sprintf "Expected code:%5d   result Code:%5d\n", $expectedResult, $?;
-	WriteLog( $logMsg);
-
-	$NumberOfTests++;
-	
-	if( $? == $expectedResult ) {
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-	}
-	else {
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-	}
-
-	unlink("$pkgfile-tmp.sis");
-	unlink("$pkgfile.sis");
-	unlink("$pkgfile.log");
-}
-
-#
-# Test code for DEF112831 - makesis crashes on .pkg containing non-existing embedded sis
-#
-
-sub TestDEF112831() {
-
-	my $expectedResult = 256;
-	$testmissingembeddedpkg = "missingembedded.pkg";
-	$testmissingembeddedsis = "missingembedded.sis";
-	$testmissingembeddedlog = "missingembedded.log";
-
-	WriteLog("Test for DEF112831 - makesis crashes on .pkg containing non-existing embedded sis\n");
-
-	# Generate test PKG file contents
-	$PkgFile = sprintf( $missingEmbed); 
-	# Create PKG file
-	CreateFile($testmissingembeddedpkg, $PkgFile);	
-
-	# Create a stub sis file
-	my $result = system("$makesisExeLocation -d/epoc32/winscw/c/tswi/ $testmissingembeddedpkg $testmissingembeddedsis > $testmissingembeddedlog");
-
-	$logMsg = sprintf "Expected code:%5d   result Code:%5d\n", $expectedResult, $?;
-	WriteLog( $logMsg);
-
-	$NumberOfTests++;
-
-	if ($result == 256) {
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-	}
-	else {
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-	}
-
-	unlink $testmissingembeddedpkg;
-	unlink $testmissingembeddedsis;
-	unlink $testmissingembeddedlog ;
-
-}
-
-# Windows Test
-# Test code for  DEF091942
-# Test case generates a SIS from a Japanese named pkg file. Checks to see if the SIS fle generated has the same name.
-# NOTE: Does not validate the console output.
- 
-sub TestDEF091942 {
-
-	my $path = "\\epoc32\\winscw\\c\\tswi";
-	
-	$NumberOfTests++;
-	WriteLog("Test for DEF091942 - makesis can not handle package files names written with japanese symbols\n");
-	
-	# Generate Japanese pkg 
-	system("WScript.exe //B //Nologo $path\\displayjpn_1.vbs");
-
-	# Check to see if the sis file has been generated
-	system("WScript.exe //B //Nologo $path\\displayjpn_2.vbs");
-
-	if ( -f "$path\\passed.txt") {
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-	} else {
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-	}
-
-	# Tidy up
-	system("WScript.exe //B //Nologo $path\\displayjpn_3.vbs");
-}
-
-# Linux Test
-# Test code for  DEF091942 
-# Test case generates a SIS from a Japanese named pkg file. Checks to see if the SIS fle generated has the same name.
-# NOTE: Does not validate the console output.
- 
-sub TestLDEF091942{
-
-	$pkgfile = "ã‚Žã‚ã“ã‚“ã‚¡ã‚¢é¾é¾‘.pkg";
-	$sisfile = "ã‚Žã‚ã“ã‚“ã‚¡ã‚¢é¾é¾‘.sis";
-	$logfile = "ã‚Žã‚ã“ã‚“ã‚¡ã‚¢é¾é¾‘.log";
-
-	$NumberOfTests++;
-
-	my $file = "/epoc32/winscw/c/tswi/passed.txt";
-	
-	WriteLog("Test for DEF091942 - makesis can not handle package files names written with japanese symbols\n");
-	
-	# Generate test PKG file contents for japanese pkg file.
-	$PkgFile = sprintf( $JAPPkgFileTempl); 
-	# Create PKG file
-	CreateFile($pkgfile, $PkgFile);
-
-	# Do MAKESIS test
-	@retval = system("$makesisExeLocation -v $pkgfile > logfile");
-
-	$logMsg = sprintf "Expected code:%5d   result Code:%5d\n", $expectedResult, $?;
-	WriteLog( $logMsg);
-
-	if(-f $sisfile){
-		CreateFile($file,$TempData);
-	}
-
-	if( -f $file ) {
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-	}
-	else {
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-	}
-
-	unlink("$pkgfile.sis");
-	unlink("$pkgfile.log");
-	unlink("$pkgfile.pkg");
-}
-
-
- 
-#
-# New test code for DEF091780 - Makesis have problems parsing IF-ENDIF block
-# test files are generated according to defect description, except that ALL files are located in current folder
-#
-sub TestDEF091780 {
-
-	my $ifendif = "ifendif.pkg";
-	my $expectedResult = 0;
-
-	WriteLog("Test for DEF091780 - Makesis have problems parsing IF-ENDIF block\n");
-
-	# Create PKG file
-	CreateFile($ifendif , $ifendifContent);
-	$ifendif =~ s/\.pkg//;
-	
-	# Create options-related files
-	CreateFile('osver1J.txt', "1J");
-	CreateFile('osver2J.txt', "2J");
-	CreateFile('osver1F.txt', "1F");
-	CreateFile('osver2F.txt', "2F");
-
-	# Do MAKESIS test
-	@retval = system("$makesisExeLocation $ifendif.pkg $ifendif-tmp.sis > $ifendif.log");
-	
-	$logMsg = sprintf "Expected code:%5d   result Code:%5d\n", $expectedResult, $?;
-	WriteLog( $logMsg);
-
-	$NumberOfTests++;
-	
-	if( $? == $expectedResult ) {
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-	}
-	else {
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-	}	
-	
-	# tidy up
-	unlink("$ifendif.pkg");
-	unlink("$ifendif-tmp.sis");
-	unlink("$ifendif.sis");
-	unlink("$ifendif.log");
-	unlink("osver1J.txt");
-	unlink("osver2J.txt");
-	unlink("osver1F.txt");
-	unlink("osver2F.txt");
-}
-
-#
-# Test code for SIS files with comma at the end of the file - DEF108815
-# 
-#
-sub TestEndFileComma {
-
-	my $pkgName = "endFileComma.pkg";
-	my $logName = "endFileComma.log";
-	my $sisName = "endFileComma.sis";
-	my $expectedResult = 256;
-	
-	WriteLog("Test for DEF108815 - makesis crashes if a trailing comma is present on an install-file \n");
-
-	# Create PKG file
-	CreateFile($pkgName, $endFileCommaContent);
-	$ifendif =~ s/\.pkg//;
-	
-	# Do MAKESIS test
-	@retval = system("$makesisExeLocation $pkgName $sisName > $logName");
-	
-	$logMsg = sprintf "Expected code:%5d   result Code:%5d\n", $expectedResult, $?;
-	WriteLog( $logMsg);
-
-	$NumberOfTests++;
-	
-	if( $? == $expectedResult ) {
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-	}
-	else {
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-	}	
-	
-	# tidy up
-	#unlink("$pkgName");
-	unlink("$sisName");
-	unlink("$logName");
-}
-
-#
-# Test code for package file containing very long destination folder name - DEF115795
-# 
-#
-sub TestLongFolderName {
-
-	my $pkgName = "longfolder.pkg";
-	my $logName = "longfolder.log";
-	my $sisName = "longfolder.sis";
-	my $expectedResult = 256;
-	
-	WriteLog("Test for DEF115795 - SWI completes the installation despite the files not being installed \n");
-
-	# Create PKG file
-	CreateFile($pkgName, $longfolder);
-	$ifendif =~ s/\.pkg//;
-	
-	# Do MAKESIS test
-	@retval = system("$makesisExeLocation $pkgName $sisName > $logName");
-	
-	$logMsg = sprintf "Expected code:%5d   result Code:%5d\n", $expectedResult, $?;
-	WriteLog( $logMsg);
-
-	$NumberOfTests++;
-	
-	if( $? == $expectedResult ) {
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-	}
-	else {
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-	}	
-	
-	# tidy up
-	unlink("$pkgName");
-	unlink("$sisName");
-	unlink("$logName");
-}
-
-#
-#  Test code for invalid version number in pkg file - DEF112718
-# 
-#
-sub TestInvalidVersion1 {
-
-	my $pkgName = "invalidVersion.pkg";
-	my $LogFile = "invalidVersion.log";
-	my $sisName = "invalidVersion.sis";
-	my $ExpectedLogFile = "InvalidVersionExpected.log";
-	
-	WriteLog("Test for DEF112718 - Invalid version number in pkg file \n");
-
-	# Create PKG file
-	CreateFile($pkgName, $invalidVersion1);
-	
-	my $trailingData = "Created  $sisName.";
-	my $OutputData = "Processing $pkgName...\n$DEF112718ExpectedOutput$trailingData";
-	
-	# Create expected log file
-	CreateFile($ExpectedLogFile ,$OutputData);
-
-	# Create a sis file
-	my $result = system("$makesisExeLocation $pkgName $sisName > $LogFile");
-	
-	use File::Compare;
-	my $result1;
-
-	if(compare($LogFile ,$ExpectedLogFile)== 0)
- 		{ 
- 		$result1 = 0;			
- 		}
- 	else
- 		{
- 		$result1 = 1;
- 		}
-	$NumberOfTests++;
-
- 	if ($result == 0 && $result1 == 0) 
- 		{
- 		$NumberOfPassed++;
- 		WriteLog("Passed\n\n");
- 		}
- 	else 
- 		{
- 		$NumberOfFailed++;
- 		WriteLog("Failed\n\n");
- 		}
-
-	
-	# tidy up
-	unlink("$pkgName");
-	unlink("$sisName");
-	unlink("$logName");
-	unlink ("$LogFile");
-}
-
-#
-#  Test code for invalid version number in pkg file - DEF112718
-# 
-#
-
-sub TestInvalidVersion2 {
-
-	my $pkgName = "invalidVersion.pkg";
-	my $logName = "invalidVersion.log";
-	my $sisName = "invalidVersion.sis";
-	my $expectedResult = 256;
-	
-	WriteLog("Test for DEF112718 - Invalid version number in pkg file with negative values \n");
-
-	# Create PKG file
-	CreateFile($pkgName, $invalidVersion2);
-	
-	
-	# Do MAKESIS test
-	@retval = system("$makesisExeLocation $pkgName $sisName > $logName");
-	
-	$logMsg = sprintf "Expected code:%5d   result Code:%5d\n", $expectedResult, $?;
-	WriteLog( $logMsg);
-
-	$NumberOfTests++;
-	
-	if( $? == $expectedResult ) {
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-	}
-	else {
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-	}	
-	
-	# tidy up
-	unlink("$pkgName");
-	unlink("$sisName");
-	unlink("$logName");
-}
-
-
-#
-#  Test code for Preinstalled pkg files without having sourcefiles - DEF113569
-# 
-#
-sub TestPreInstalledWithoutSourceFiles {
-
-	my $pkgName = "preinstalledwithoutsourcefile.pkg";
-	my $logName = "preinstalledwithoutsourcefile.log";
-	my $sisName = "preinstalledwithoutsourcefile.sis";
-	my $ExpectedLogFile = "preinstalledwithoutsourcefileExpected.log";
-
-	WriteLog("Test for DEF113569 - Preinstalled pkg files without having sourcefiles \n");
-
-	# Create PKG file
-	CreateFile($pkgName, $PreinstalledPkgWithoutSourcefiles);
-
-	my $OutputData = "Processing $pkgName...\n$DEF113569ExpectedOutput";
-	
-	# Create expected log file
-	CreateFile($ExpectedLogFile ,$OutputData);
-
-	# Do MAKESIS test
-	@retval = system("$makesisExeLocation $pkgName $sisName > $logName");
-
-	use File::Compare;
-	my $result1;
-
-	if(compare($logName ,$ExpectedLogFile)== 0)
- 		{ 
- 		$result1 = 0;			
- 		}
- 	else
- 		{
- 		$result1 = 1;
- 		}
-
-	$NumberOfTests++;
-
-	
-	if ($result == 0 && $result1 == 0) 
- 		{
- 		$NumberOfPassed++;
- 		WriteLog("Passed\n\n");
- 		}
- 	else 
- 		{
- 		$NumberOfFailed++;
- 		WriteLog("Failed\n\n");
- 		}
-
-	# tidy up
-	unlink("$pkgName");
-	unlink("$sisName");
-	unlink("$logName");
-	unlink ("$ExpectedLogFile");
-}
-
-
-# New test code for DEF091860 - Quotes missing in reversed package produced by dumpsis for IF EXIST statement. 
-# This creates a DEF091860.sis file . This test checks whether the pkg file generated by dumpsis when reprocessed 
-# by makesis generates a sis file successfully.
-#
-sub TestDEF091860() {
-
-	$DEF091860pkg = "DEF091860.pkg";
-	$DEF091860sis = "DEF091860.sis";
-	$DumpsisGenPkgPath = "\/DEF091860";
-	$DEF091860Log = "DEF091860.log";
-
-				
-	WriteLog("Test for DEF091860 - Test for successful creation of a sis file when pkg file generated from dumpsis is used.\n");
-
-	# Generate test PKG file contents for embedding pkg file.
-	$PkgFile = sprintf( $DEF091860PkgContents, "-1,-1,-1"); 
-	# Create PKG file
-	CreateFile($DEF091860pkg, $PkgFile);	
-	
-	# Create DEF091860.sis file
-	my $result = system("$makesisExeLocation $DEF091860pkg $DEF091860sis > $DEF091860Log");
-	
-	WriteLog("result: $result\n");
-
-	# Execute DumpSIS on the created DEF091860.sis.
-	my $result1 = system("/epoc32/tools/DUMPSIS -x $DEF091860sis > $DEF091860Log");
-	
-	WriteLog("result1: $result1[0]\n");
-
-	use Cwd;
-    $dir = cwd;
-	chdir $dir.$DumpsisGenPkgPath;
-	
-	#Regenerate DEF091860.sis from the dumpsis generated pkg file.
-	$result2  = system("$makesisExeLocation $DEF091860pkg $DEF091860sis > $DEF091860Log");
-	chdir $dir;
-	
-	WriteLog("result2: $result2\n");
-
-	$NumberOfTests++;
-	if ($result == 0 && $result1 == 0 && $result2 == 0) 
-		{
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-		}
-	else 
-		{
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-		}
-
-	unlink $DEF091860pkg;
-	unlink $DEF091860sis;
-	unlink $DEF091860Log;
-	use File::Path;
-	rmtree "$dir$DumpsisGenPkgPath";
-}
-
-#
-# New test code for DEF090912  makesis shows error: file I/O fault. for PC folder with unicode (katakana) UCS2 
-# NB: japanese source file is located in current folder instead of on folder tree for simplicity
-#
-sub TestDEF090912 {
-
-	my $path = "\\epoc32\\winscw\\c\\tswi";
-	my $ucs2 = "$path\\ucs2jpn";
-	my $expectedResult = 0;
-
-	WriteLog("Test for DEF090912: makesis shows error \"file I/O fault\" for PC folder with unicode (katakana) UCS2\n");
-	
-	# tricky thing to create file with Japanese  name on any locale
-	# use //B to launch script engine in batch mode
-	system("WScript.exe //B //Nologo $path\\ucs2jpn.vbs");
-
-	# Do MAKESIS test
-	@retval = system("$makesisExeLocation $ucs2.pkg $ucs2-tmp.sis > $ucs2.log");
-	
-	$logMsg = sprintf "Expected code:%5d   result Code:%5d\n", $expectedResult, $?;
-	WriteLog( $logMsg);
-
-	$NumberOfTests++;
-	
-	if( $? == $expectedResult ) {
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-	}
-	else {
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-	}	
-	
-	# tidy up
-	unlink("$ucs2-tmp.sis");
-	unlink("$ucs2.log");
-	system("WScript.exe //B //Nologo $path\\rmucs2jpn.vbs");
-}
-
-
-# Linux Test
-# New test code for DEF090912  makesis shows error: file I/O fault. for PC folder with unicode (katakana) UCS2 
-# NB: japanese source file is located in current folder instead of on folder tree for simplicity
-#
-sub TestLDEF090912 {
-
-	my $path = "/epoc32/winscw/c/tswi";
-	my $ucs2 = "$path/ナソト.txt";
-	my $pkgfile = "$path/ucs2jpn";
-	my $expectedResult = 0;
-
-	WriteLog("Test for DEF090912: makesis shows error \"file I/O fault\" for PC folder with unicode (katakana) UCS2\n");
-	
-		
-	# Create PKG file
-	
-	CreateFile($ucs2, $TempData);
-
-	# Do MAKESIS test
-	@retval = system("$makesisExeLocation -v $pkgfile.pkg  > $pkgfile.log");
-	
-	$logMsg = sprintf "Expected code:%5d   result Code:%5d\n", $expectedResult, $?;
-	WriteLog( $logMsg);
-
-	$NumberOfTests++;
-	
-	if( $? == $expectedResult ) {
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-	}
-	else {
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-	}	
-	
-	# tidy up
-	unlink("$pkgfile.log");
-	unlink("$pkgfile.sis");
-}
-
-
-
-
-#
-# New test code for DEF093400:  Temporary files are left undeleted after MakeSIS/SignSIS call 
-# NB: japanese source file is located in current folder instead of on folder tree for simplicity
-#
-
-sub TestDEF093400 
-{
-	WriteLog("Test for DEF093400: Temporary files are left undeleted after MakeSIS/SignSIS call\n");
-	
-	my $pkg = "temp.pkg";
-	my $expectedResult = 0;
-
-	# Create PKG file
-	chmod S_IWUSR | S_IWGRP | S_IWOTH, '$pkg';
-	my $temp = sprintf $PkgFileTempl, "-1,-1,-1"; 
-	CreateFile($pkg, $temp);
-	$pkg =~ s/\.pkg//;
-	
-	# Create options-related files
-	chmod S_IWUSR | S_IWGRP | S_IWOTH, '$pkg.txt';
-	CreateFile("$pkg.txt", "temp file");
-	chmod S_IRUSR | S_IRGRP | S_IROTH, '$pkg.txt';
-
-	my $TmpCountBefore = GetTmpFilesCount();
-
-	# Do MAKESIS test
-	@retval = system("$makesisExeLocation $pkg.pkg $pkg-tmp.sis > $pkg.log");
-
-	my $TmpCountAfter = GetTmpFilesCount();
-	
-	$logMsg = sprintf "Expected code:%5d   result Code:%5d\n", $expectedResult, $?;
-	WriteLog( $logMsg);
-	$logMsg = sprintf "Temp Files detected - Before:%5d   After:%5d\n", $TmpCountBefore, $TmpCountAfter;
-	WriteLog( $logMsg);
-
-	$NumberOfTests++;
-	
-	if(  $? == $expectedResult && $TmpCountBefore == $TmpCountAfter ) {
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-	}
-	else {
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-	}	
-	
-	# tidy up
-	unlink("$pkg.pkg");
-	unlink("$pkg-tmp.sis");
-	unlink("$pkg.txt");
-	unlink("$pkg.log");
-}
-
-
-#
-# New test code for DEF093156 - MAKEKEYS does not process correctly non European symbols in cmd line 
-# This test checks whether the certificate and key files which have names with japanese symbols are created successfully .
-#
-sub TestDEF093156 {
-
-	my $path = "\\epoc32\\winscw\\c\\tswi";
- 	$DEF093156Log = "DEF093156.log";
-	$ResFile1="ex.txt";
-	$ResFile2="ResultMakeKeys.txt";
- 
-	WriteLog("Test for DEF093156 - Makekeys test for successful creation of a certificate and key file with japanese symbols.\n");
-  
- 	# create a key file and a certificate file with japanese symbols
-	system("WScript.exe //B //Nologo $path\\testmakekeys.vbs > $DEF093156Log");
-
- 	$NumberOfTests++;
-	if ( !-f $ResFile1 )
-	{
- 		$NumberOfFailed++;
- 		WriteLog("Failed In Step 1\n\n");
-		unlink $DEF093156Log;
-		exit;
-	}
-	
-	#Make sure that the DN in the created certificate with japanese symbols is encoded properly
-	system("WScript.exe //B //Nologo $path\\testmakekeys2.vbs $path 1 > $DEF093156Log");
-	
-	if ( -f $ResFile2 )
-	{
-		$NumberOfPassed++;
- 		WriteLog("Passed\n\n");
- 	}
-	else
-	{
- 		$NumberOfFailed++;
- 		WriteLog("Failed In Step 2\n\n");
-	}
-
- 	unlink $DEF093156Log;
-	unlink $ResFile1;
-	unlink $ResFile2;
-}
-
-#
-# New test code for INC092755: Makesis includes the same file to the generated SIS file if the pkg file has IF-ELSE condition block where only the destination path changes
-#
-sub TestINC092755 {
-
-	WriteLog("Test for INC092755: Makesis includes the same file for IF-ELSE where only the dest path changes\n");
-	
-	my $path = "\\epoc32\\winscw\\c\\tswi";
-	my $INC092755 = "INC092755";
-	
-	# Call DumpSIS to compare SIS file against expected result and number of files extracted
-	WriteLog("Calling DumpSIS...\n");
-	@retval = system("/epoc32/tools/DUMPSIS -x $path\\$INC092755.sis > $INC092755.log");
-	
-	use Cwd;
-    my $dir = cwd."/$INC092755";
-	opendir ( DIR, "$dir" ) or die ( "Can't open dir: $dir" ); #!
-	my @List = readdir DIR;
-	closedir DIR;
-	
-	my @files = grep( /^file[0-9]*/ , @List );
-	my $fileCount = @files;
-	print "Extracted: $fileCount file(s)	Expected: 1 file(s)\n";
-	
-	$NumberOfTests++;
-	if ( $fileCount == 1 )
-	{
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-	}
-	else
-	{
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-	}
-
-	unlink("$INC092755.log");
-	rmdir("$INC092755");
-	unlink("$INC092755.sis");
-}
-
-#
-# New test code for CR904  
-# This test checks for the successful creation of sis file when pkg file contains the parameter $ (which represents 
-# system drive) in the destination file.
-# 
-
-
-sub TestsysDriveparameter {
-
-	$pkgFilewithsysDriveparameter = "testsysDrive.pkg";
-	$sisFile = "testsysDrive.sis";
-	$LogFile = "testsysDrive.log";
-	
-
-	WriteLog("Test for successful creation of a sis file with $ parameter specified in pkg file to represent system drive.\n");
-
-	# Generate test PKG file contents for embedding pkg file.
-	$PkgFile = sprintf( $PkgFileTemp2, "-1,-1,-1"); 
-
-	# Create PKG file
-	CreateFile($pkgFilewithsysDriveparameter, $PkgFile);	
-	
-		
-	# Create an embedding sis file
-	my $result = system("$makesisExeLocation $pkgFilewithsysDriveparameter $sisFile > $LogFile");
-	
-	
-	$NumberOfTests++;
-	if ($result == 0 ) 
-		{
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-		}
-	else 
-		{
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-		}
-
-	unlink $pkgFilewithsysDriveparameter;
-	unlink $sisFile;
-	unlink $LogFile
-	
-}
-
-
-#
-# New test code for CR1027 - SA ROM Upgrade  
-# This test checks for the successful creation of sis file when PKG file contains the newly added ( as part of CR1027 ) 
-# ROM upgrade capability install flag RU with one of the right install types SA ( only SA, PU & SP are valid with RU).
-# 
-
-sub TestSisRUWithSA {
-
-	$pkgFilewithRUAndSA = "testsysRUWithSA.pkg";
-	$sisFile = "testsysRUWithSA.sis";
-	$LogFile = "testsysRUWithSA.log";
-	
-
-	WriteLog("CR1027 - Test for successful creation of a sis file with the ROM Upgrade install flag RU with the right install type SA.\n");
-
-	# Generate test PKG file contents for embedding pkg file.
-	$PkgFile = sprintf( $PkgFileRUWithSA, "-1,-1,-1"); 
-
-	# Create PKG file
-	CreateFile($pkgFilewithRUAndSA, $PkgFile);	
-	
-		
-	# Create an embedding sis file
-	my $result = system("$makesisExeLocation $pkgFilewithRUAndSA  $sisFile > $LogFile");
-	
-	$NumberOfTests++;
-	if ($result == 0 ) 
-		{
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-		}
-	else 
-		{
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-		}
-
-	unlink $pkgFilewithRUAndSA;
-	unlink $sisFile;
-	unlink $LogFile	
-}
-
-
-
-#
-# New test code for CR1027 - SA ROM Upgrade  
-# This test checks for the un-successful creation of sis file when PKG file contains the newly added ( as part of CR1027 ) 
-# ROM upgrade capability install flag RU with the wrong install type other than SA, PU & SP (like PA & PP.).
-# 
-
-sub TestSisRUWithNonSA {
-
-	$pkgFilewithRUAndNonSA = "testsysRUWithNonSA.pkg";
-	$sisFile = "testsysRUWithNonSA.sis";
-	$LogFile = "testsysRUWithNonSA.log";
-	
-
-	WriteLog("CR1027 - Test for Un-successful creation of a sis file with the ROM Upgrade install flag RU with the wrong install type, anything other than SA.\n");
-
-	# Generate test PKG file contents for embedding pkg file.
-	$PkgFile = sprintf( $PkgFileRUWithNonSA, "-1,-1,-1"); 
-
-	# Create PKG file
-	CreateFile($pkgFilewithRUAndNonSA, $PkgFile);	
-	
-		
-	# Create an embedding sis file
-	my $result = system("$makesisExeLocation $pkgFilewithRUAndNonSA  $sisFile > $LogFile");
-	
-	
-	$NumberOfTests++;
-	if ($result != 0 ) 
-		{
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-		}
-	else 
-		{
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-		}
-
-	unlink $pkgFilewithRUAndNonSA;
-	unlink $sisFile;
-	unlink $LogFile	
-}
-
-#
-# New test code for CR1122 - WildCard Support for ROM Stubs.
-# This test checks for the successful creation of sis file when PKG file contains the wildcard charetors(? and *) in it. 
-# These packages can be upgraded (eclipsed) in much wider way as per the wildcard charector's behaviour.
-# 
-
-sub TestSISWithWildCards {
-
-	$pkgFilewithWildCards = "testSysWithWildCards.pkg";
-	$sisFile = "testSysWithWildCards.sis";
-	$LogFile = "testSysWithWildCards.log";
-	
-
-	WriteLog("CR1122 - Test for successful creation of a sis file for wildcarded ROM stub package file.\n");
-
-	# Generate test PKG file contents for embedding pkg file.
-	$PkgFile = sprintf( $WildCardedpkgFile, "-1,-1,-1"); 
-
-	# Create PKG file
-	CreateFile($pkgFilewithWildCards, $PkgFile);	
-	
-		
-	# Create an embedding sis file
-	my $result = system("$makesisExeLocation -s $pkgFilewithWildCards  $sisFile > $LogFile");
-	
-	
-	$NumberOfTests++;
-	if ($result == 0 ) 
-		{
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-		}
-	else 
-		{
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-		}
-
-	unlink $pkgFilewithWildCards;
-	unlink $sisFile;
-	unlink $LogFile;
-}
-
-
-#
-# New test code for CR1122 - WildCard Support for ROM Stubs.
-# This test checks for the Un-successful creation of sis file when PKG file contains the wildcard charetors(? and *) and PA install type in it.
-# 
-
-sub TestSISWithWildCardsPA {
-
-	$pkgFilewithWildCards = "testSysWithWildCards.pkg";
-	$sisFile = "testSysWithWildCards.sis";
-	$LogFile = "testSysWithWildCards.log";
-	
-
-	WriteLog("CR1122 - Test for un-successful creation of a SIS file for wildcarded PA package file.\n");
-
-	# Generate test PKG file contents for embedding pkg file.
-	$PkgFile = sprintf( $WildCardedPApkgFile, "-1,-1,-1"); 
-
-	# Create PKG file
-	CreateFile($pkgFilewithWildCards, $PkgFile);	
-	
-		
-	# Create an embedding sis file
-	my $result = system("$makesisExeLocation $pkgFilewithWildCards  $sisFile > $LogFile");
-	
-	
-	$NumberOfTests++;
-	if ($result != 0 ) 
-		{
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-		}
-	else 
-		{
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-		}
-
-	unlink $pkgFilewithWildCards;
-	unlink $sisFile;
-	unlink $LogFile;
-}
-
-
-#
-# New test code for CR1122 - WildCard Support for ROM Stubs.
-# This test checks for the Un-successful creation of sis file when PKG file contains the wildcard charetors(? and *) and PP install type in it.
-#
-sub TestSISWithWildCardsPP {
-
-	$pkgFilewithWildCards = "testSysWithWildCards.pkg";
-	$sisFile = "testSysWithWildCards.sis";
-	$LogFile = "testSysWithWildCards.log";
-	
-
-	WriteLog("CR1122 - Test for un-successful creation of a SIS file for wildcarded PA package file.\n");
-
-	# Generate test PKG file contents for embedding pkg file.
-	$PkgFile = sprintf( $WildCardedPPpkgFile, "-1,-1,-1"); 
-
-	# Create PKG file
-	CreateFile($pkgFilewithWildCards, $PkgFile);	
-	
-		
-	# Create an embedding sis file
-	my $result = system("$makesisExeLocation $pkgFilewithWildCards  $sisFile > $LogFile");
-	
-	
-	$NumberOfTests++;
-	if ($result != 0 ) 
-		{
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-		}
-	else 
-		{
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-		}
-
-	unlink $pkgFilewithWildCards;
-	unlink $sisFile;
-	unlink $LogFile;
-}
-
-
-sub TestSingleCharFilename {
-
-	$pkgFileName = "temp.pkg";
-	$sisFile = "t.sis";
-	$LogFile = "singleCharFilename.log";
-	
-	WriteLog("Test for successful creation of a sis file with a single char in its filename.\n"); #DEF108728
-
-	# Generate test PKG file contents for embedding pkg file.
-	$PkgFile = sprintf( $PkgFileTemp2, "-1,-1,-1"); 
-
-	# Create PKG file
-	CreateFile($pkgFileName, $PkgFile);	
-			
-	# Create an embedding sis file
-	my $result = system("$makesisExeLocation $pkgFileName $sisFile > $LogFile");
-	
-	
-	$NumberOfTests++;
-	if ($result == 0 ) 
-		{
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-		}
-	else 
-		{
-		$NumberOfFailed++;
-		WriteLog("Failed with result $result\n\n");
-		}
-
-	unlink $pkgFileName;
-	unlink $sisFile;
-	unlink $LogFile
-}
-
-
-#
-# Test code for DEF111264 - Makesis should warn if wildcards are used in the \sys\bin\ directory in ROM stubs .
-# This test checks verifies that a warning is generated when a ROM Stub file contains an exe with wildcards(* or ?) specified . 
-# 
-
-sub TestDEF111264 {
-
-	$pkgFile = "ROMStubWildCardWarning.pkg";
-	$sisFile = "ROMStubWildCardWarning.sis";
-	$LogFile = "ROMStubWildCardWarning.log";
-	$ExpectedLogFile = "ROMStubWildCardExpected.log";
-
-	WriteLog("DEF111264 - Makesis should warn if wildcards are used in the \sys\bin\ directory in ROM stubs.\n");
-
-	# Generate test PKG file contents for pkg file.
-	$PkgFile = sprintf( $ExeWithWildCardpkgFile, "-1,-1,-1"); 
-	
-	# Create PKG file
-	CreateFile($pkgFile, $PkgFile);	
-
-	# Create expected log file
-	my $trailingData = "Created  $sisFile.";
-	my $OutputData = "Processing $pkgFile...\n$DEF111264ExpectedOutput$trailingData";
-	
-	CreateFile($ExpectedLogFile ,$OutputData);
-
-	# Create a sis file
-	my $result = system("/epoc32/tools/makesis -s $pkgFile  $sisFile > $LogFile");
-
-	use File::Compare;
-	my $result1;
-	
-	if(compare($LogFile ,$ExpectedLogFile)== 0)
-		{ 
-		$result1 = 0;			
-		}
-	else
-		{
-		$result1 = 1;
-		}
-
-	$NumberOfTests++;
-	
-	if ($result == 0 && $result1 == 0) 
-		{
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-		}
-	else 
-		{
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-		}
-
-	unlink $pkgFile; 
-	unlink $sisFile;
-	unlink $LogFile;
-	unlink $ExpectedLogFile;
-}
-
-
-#
-# Test code for DEF113349 - Attempting to embed a PP SIS file in an SA SIS file causes makesis to crash.
-# This test checks verifies that a warning is generated when attempted to embed a PP/PA SIS file in an SA SIS. 
-# 
-
-sub TestDEF113349 {
-
-	$pkgEmbeddedFile = "EmdeddedPA.pkg";
-	$sisEmbeddedFile = "EmbeddedPA.sis";
-	$pkgFile = "EmdeddingPA.pkg";
-	$sisFile = "EmbeddingPA.sis";
-	$LogFile = "DEF113349.log";
-	$ExpectedLogFile = "DEF113349Expected.log";
-
-	WriteLog("DEF113349 - Attempting to embed a PP SIS file in an SA SIS file causes makesis to crash.\n");
-
-	# Generate test PKG file contents for the embedded pkg file.
-	$PkgFile = sprintf( $EmbeddedPApkgFile, "-1,-1,-1"); 
-	
-	# Create PKG file
-	CreateFile($pkgEmbeddedFile, $PkgFile);	
-
-	# Create SIS file for the embedded package of type = PA.
-	my $result = system("/epoc32/tools/makesis $pkgEmbeddedFile $sisEmbeddedFile > $LogFile");
-
-	# Generate test PKG file contents for embedding pkg file.
-	$PkgFile = sprintf( $EmbeddingPApkgFile, "-1,-1,-1"); 
-	
-	# Create PKG file
-	CreateFile($pkgFile , $PkgFile);	
-	
-	# Create SIS file for the embedding package of type = SA.
-	my $result1 = system("/epoc32/tools/makesis $pkgFile $sisFile > $LogFile");
-	
-	my $OutputData = "Processing $pkgFile...\n$DEF113349ExpectedOutput";
-	
-	# Create expected log file
-	CreateFile($ExpectedLogFile ,$OutputData);
-
-	use File::Compare;
-	my $result2;
-	
-	if(compare($LogFile ,$ExpectedLogFile)== 0)
-		{ 
-		$result2 = 0;			
-		}
-	else
-		{
-		$result2 = 1;
-		}
-
-	$NumberOfTests++;
-	
-	if ($result == 0 && $result1 == 256 && $result2 == 0) 
-		{
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-		}
-	else 
-		{
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-		}
-	
-	unlink $pkgEmbeddedFile;
-	unlink $sisEmbeddedFile;
-	unlink $pkgFile; 
-	unlink $sisFile;
-	unlink $LogFile;
-	unlink $ExpectedLogFile;
-}
-
-#
-# Test code for DEF113116 : It is not possible to abort an installation without causing an error. 
-# This test checks for the successful creation of sis file when pkg file contains a new display text option
-# ForceAbort (FA).
-# 
-
-
-sub TestDEF113116 {
-
-	$pkgFile = "textoption_FA.pkg";
-	$sisFile = "textoption_FA.sis";
-	$LogFile = "textoption_FA.log";
-	$DumpsisGenPkgPath = "\/textoption_FA";
-
-	WriteLog("DEF113116 : Test MakeSIS and DumpSIS support for ForceAbort (FA) text option.\n");
-
-	# Generate test PKG file contents for embedding pkg file.
-	$PkgFile = sprintf( $PkgFileWithFAOption, "-1,-1,-1"); 
-
-	# Create PKG file
-	CreateFile($pkgFile , $PkgFile);	
-
-	# Create sis file using MakeSIS
-	my $result = system("$makesisExeLocation $pkgFile $sisFile > $LogFile");
-
-	# Recreate pkg file using DumpSIS.
-	my $result1 = system("$dumpsisExeLocation $sisFile > $LogFile");
-	
-	$NumberOfTests++;
-	if ($result == 0 && $result1 == 0) 
-		{
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-		}
-	else 
-		{
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-		}
-
-	use cwd;
-	$dir = cwd;
-
-	unlink $pkgFile;
-	unlink $sisFile;
-	unlink $LogFile;
-
-	use File::Path;
-	rmtree "$dir$DumpsisGenPkgPath";
-	
-}
-
-#
-# Test code for Makesis -c option.
-# This test verifies that errors are reported where the SIS file being generated will not be installable by InterpretSIS.
-# 
-
-sub TestInterpretsisReport {
-
-	$pkgEmbeddedFile = "Emdedded.pkg";
-	$sisEmbeddedFile = "Embedded.sis";
-	$pkgFile = "Interpretsis.pkg";
-	$sisFile = "Interpretsis.sis";
-	$LogFile = "Interpretsis.log";
-	$ExpectedLogFile = "InterpretsisExpected.log";
-
-	WriteLog("Makesis -c\n");
-
-	# Generate test PKG file contents for the embedded pkg file.
-	$PkgFile = sprintf( $PkgFileTempl, "-1,-1,-1"); 
-	
-	# Create PKG file
-	CreateFile($pkgEmbeddedFile, $PkgFile);	
-
-	# Create SIS file for the embedded package.
-	my $result = system("/epoc32/tools/makesis $pkgEmbeddedFile $sisEmbeddedFile > $LogFile");
-
-	# Generate test PKG file contents for embedding pkg file.
-	$PkgFile = sprintf( $PkgFileInterpretsisVersionTemplate, "-1,-1,-1"); 
-	
-	# Create PKG file
-	CreateFile($pkgFile , $PkgFile);	
-	
-	# Create SIS file for the embedding package of type = SA.
-	my $result1 = system("/epoc32/tools/makesis -c $pkgFile $sisFile > $LogFile");
-	
-	# Create expected log file
-	my $trailingData = "Created  $sisFile.";
-	my $OutputData = "Processing $pkgFile...\n$InterpretsisExpectedOutput$trailingData";
-	
-	CreateFile($ExpectedLogFile ,$OutputData);
-	
-	use File::Compare;
-	my $result2;
-	
-	if(compare($LogFile ,$ExpectedLogFile)== 0)
-		{ 
-		$result2 = 0;			
-		}
-	else
-		{
-		$result2 = 1;
-		}
-
-	$NumberOfTests++;
-	
-	if ($result == 0 && $result1 == 256 && $result2 == 0) 
-		{
-		$NumberOfPassed++;
-		WriteLog("Passed\n\n");
-		}
-	else 
-		{
-		$NumberOfFailed++;
-		WriteLog("Failed\n\n");
-		}
-	
-	unlink $pkgEmbeddedFile;
-	unlink $sisEmbeddedFile;
-	unlink $pkgFile; 
-	unlink $sisFile;
-	unlink $LogFile;
-	unlink $ExpectedLogFile;
-}
-
-#
-# Main
-#
-# Create environment and control test flow to testing MAKESIS.EXE 
-# (generate text.txt, pkg file, test makesis and check the result)
-#
-
-unlink($logFile);
-WriteLog("makesis test.\n\n");
-
-#
-# Generate test.txt this is the only one element of every PKGs.
-#
-$contents = "This is a test text.";
-CreateFile('TEST.txt', $contents);
-
-#
-# Generate HelloApp.exe this is the only one element of every PKGs.
-#
-$contents = "This is a test exe.";
-CreateFile('HelloApp.exe', $contents);
-
-#
-# Counters for results
-#
-$NumberOfTests  = 0;
-$NUmberOfPassed = 0;
-$NumberOfFailed = 0;
-
-#
-# Array of contents of test pkgs and expected results
-#
-#                file name,            	range,      		expected, expected log,            		Title
-#                                	(from)      (to)   	result    message
-#               ----------------------------------------------------------------------------------------------------------------------------------------- 
-@TestItems = (	["test01.pkg", 		"-1,-1,-1",		0,	"Generating SIS installation file...",	"Range not specified 1."],
-		["test02.pkg", 		"-1,-1,-1 ~ -1,-1,-1",	0,	"Generating SIS installation file...",	"Range not specified 2."],
-		["test03.pkg", 		"1, 0, 0",		0,	"Generating SIS installation file...",	"Only from specified 1."],
-		["test04.pkg", 		"1,-1,-1 ~ -1,-1,-1",	0,	"Generating SIS installation file...",	"Only from specified 2."],
-		["test05.pkg", 		"1,-1,-1 ~  2,-1,-1",	0,	"Generating SIS installation file...",	"Correct from and to specified."],
-		["test06.pkg", 		"-1,-1,-1 ~  2,-1,-1",	0,	"Generating SIS installation file...",	"Only to specified."],
-		["test07.pkg", 		"1,-1,-1 ~  1,-1,-1",	0,	"Generating SIS installation file...", 	"Correct. Same Major, not minor specified."],
-		["test08.pkg", 		"1, 1,-1 ~  1, 1,-1",	0,	"Generating SIS installation file...", 	"Correct. Same Major, minor and not build specified."],		
-		["test09.pkg", 		"1, 1,-1 ~  1, 2,-1",	0,	"Generating SIS installation file...",	"Correct. Same Major and differ minor specified."],
-		["test10.pkg", 		"1, 1, 1 ~  1, 1, 2",	0,	"Generating SIS installation file...",	"Correct. Same Major, Minor and differ build specified."],
-		["test11.pkg", 		"1, 1,-1 ~  1, 1, 2",	0,	"Generating SIS installation file...",	"Correct. Same Major, Minor and differ build specified."],
-		["test12.pkg", 		"1, 1, 1 ~  1, 1, 1",	0,	"Generating SIS installation file...",	"Correct. Same Major, minor and build specified."],
-		["test13.pkg", 		"4,-1,-1 ~  2,-1,-1",	256,	"verification failure",			"Wrong range of major of from and to."],
-		["test14.pkg", 		"1, 2,-1 ~  1, 1,-1",	256,	"verification failure",			"Wrong range of minor of from and to."],
-		["test15.pkg", 		"1, 2, 2 ~  1, 2, 1", 	256,	"verification failure",			"Wrong range of build of from and to."],
-		["test16.pkg", 		"1,-1,-1 ~  2,1,1 ",	256,	"invalid destination path or syntax",	"exe name contains non ascii characters."],
-		["test17.pkg", 		"1,-1,-1 ~  2,1,1 ",	256,	"invalid destination path or syntax",	"package file encoding is not supported."],
-		["testForward.pkg", 	"1,-1,-1 ~  2,1,1 ",	0,	"Generating SIS installation file...",	"package file can have forward slash."],
-		["testFN_RI.pkg", 	"1,0,0 ~ 1,0,0", 0, "Generating SIS installation file...", "DEF126367: Check interaction between FN and RI."]
-	     );
-
-
-# For DEF92320
-# Test for filename & Dir name, should not contain symbols like |,/,<,>,:,?,*
-# Array of contents of test pkgs 
-#
-#              	file name,     		symbols ,  	expected , 	expected log,            		Title
-#                                			result     	message
-#               -------------------------------------------------------------------------------------------------------------------------- 
-@TestItems1 = (	["test01.pkg", 		"*", 		256,		"invalid destination path or syntax", 	"File paths should not contain *,:,<,>"],
-		["test02.pkg", 		"\"<42>\"", 	256,		"invalid destination path or syntax",	"File paths should not contain *,:,<,>"],
-		["test03.pkg", 		"?", 		256,		"invalid destination path or syntax",	"File paths should not contain *,:,<,>"],
-		["test05.pkg", 		" \"", 		256,		"error: unknown line",			"File paths should not contain *,:,<,>"],
-		["test06.pkg", 		"<", 		256,		"invalid destination path or syntax",	"File paths should not contain *,:,<,>"],
-		["test07.pkg", 		">",  		256,		"invalid destination path or syntax",	"File paths should not contain *,:,<,>"],
-		["test08.pkg", 		"|",  		256,		"invalid destination path or syntax",	"File paths should not contain *,:,<,>"],
-		["test11.pkg",  	"\"<58>\"",	256,		"invalid destination path or syntax",	"File paths should not contain *,:,<,>"],
-		["test12.pkg", 		":",		256,		"invalid destination path or syntax",	"File paths should not contain *,:,<,>"],
-		["test13.pkg",   	"\"<63>\"",	256,		"invalid destination path or syntax",	"File paths should not contain *,:,<,>"],
-		["test14.pkg", 		"\"<34>\"", 	256,		"invalid destination path or syntax",	"File paths should not contain *,:,<,>"],
-		["test15.pkg", 		"\"<62>\"", 	256,		"invalid destination path or syntax",	"File paths should not contain *,:,<,>"],
-		["test16.pkg", 		"\"<124>\"", 	256,	 	"invalid destination path or syntax",	"File paths should not contain *,:,<,>"],
-		["test17.pkg", 		"\"<60>\"", 	256,		"invalid destination path or syntax",	"File paths should not contain *,:,<,>"],
-		["test18.pkg", 		"\"<92>\"", 	0,		"Generating SIS installation file...",	"contain \\"],
-		["test19.pkg", 		"*", 		256,		"invalid destination path or syntax",	"DIR paths should not contain *,:,<,>"],
-		["test20.pkg", 		"\"<42>\"", 	256,		"invalid destination path or syntax",	"DIR paths should not contain *,:,<,>"],
-		["test21.pkg", 		"?", 		256,		"invalid destination path or syntax",	"DIR paths should not contain *,:,<,>"],
-		["test23.pkg", 		" \"", 		256,		"error: unknown line",			"DIR paths should not contain *,:,<,>"],
-		["test24.pkg", 		"<", 		256,		"invalid destination path or syntax",	"DIR paths should not contain *,:,<,>"],
-		["test25.pkg", 		">",  		256,		"invalid destination path or syntax",	"DIR paths should not contain *,:,<,>"],
-		["test26.pkg", 		"|",  		256,		"invalid destination path or syntax",	"DIR paths should not contain *,:,<,>"],
-		["test28.pkg", 		"\"<58>\"",	256,		"invalid destination path or syntax",	"DIR paths should not contain *,:,<,>"],
-		["test29.pkg", 		":",		256,		"invalid destination path or syntax",	"DIR paths should not contain *,:,<,>"],
-		["test30.pkg", 		"\"<63>\"",	256,		"invalid destination path or syntax",	"DIR paths should not contain *,:,<,>"],
-		["test31.pkg", 		"\"<34>\"", 	256,		"invalid destination path or syntax",	"DIR paths should not contain *,:,<,>"],
-		["test32.pkg", 		"\"<62>\"", 	256,		"invalid destination path or syntax",	"DIR paths should not contain *,:,<,>"],
-		["test33.pkg", 		"\"<124>\"", 	256,		"invalid destination path or syntax",	"DIR paths should not contain *,:,<,>"],
-		["test34.pkg", 		"\"<60>\"", 	256,		"invalid destination path or syntax",	"DIR paths should not contain *,:,<,>"],
-		["test35.pkg", 		"\"<92>\"", 	0,		"Generating SIS installation file...",	"DIR pcontain\\"],
-	    );
-
-
-
-# CR1125 - Add Package Versions to SIS File Conditionals Test Cases
-# Array of test PKG data and expected results for each test case and associated itterations
-#
-#              	file name,	conditional statement,			Expected,	Expected					Test Case ID
-#									result		log
-#               ------------------------------------------------------------------------------------------------------------------------------------ 
-@TestItems2 = (	["test01.pkg", "VERSION(0xE1000001,=,1,2,3)",		0,		"Generating SIS installation file...",		"CR1125 SEC-SWI-PKGVER-A001 : A"],
-		["test02.pkg", "VERSION(0xE1000001,<>,1,2,3)",		0,		"Generating SIS installation file...",		"CR1125 SEC-SWI-PKGVER-A001 : B"],
-		["test03.pkg", "VERSION(0xE1000001,>,1,2,3)",		0,		"Generating SIS installation file...",		"CR1125 SEC-SWI-PKGVER-A001 : C"],
-		["test04.pkg", "VERSION(0xE1000001,>=,1,2,3)",		0,		"Generating SIS installation file...",		"CR1125 SEC-SWI-PKGVER-A001 : D"],
-		["test05.pkg", "VERSION(0xE1000001,<,1,2,3)",		0,		"Generating SIS installation file...",		"CR1125 SEC-SWI-PKGVER-A001 : E"],
-		["test06.pkg", "VERSION(0xE1000001,<=,1,2,3)",		0,		"Generating SIS installation file...",		"CR1125 SEC-SWI-PKGVER-A001 : F"],
-		["test07.pkg", "VERSION(test,=,1,2,3)",			256,		"Expected numeric value read alphanumeric value",	"CR1125 SEC-SWI-PKGVER-A002 : A"],
-		["test08.pkg", "VERSION(0xE1000001,test,1,2,3)",	256,		"Invalid Relational Operator",			"CR1125 SEC-SWI-PKGVER-A002 : B"],
-		["test09.pkg", "VERSION(0xE1000001,=,test,2,3)",	256,		"Expected numeric value read alphanumeric value",	"CR1125 SEC-SWI-PKGVER-A002 : C"],
-		["test10.pkg", "VERSION(0xE1000001,=,1,test,3)",	256,		"Expected numeric value read alphanumeric value",	"CR1125 SEC-SWI-PKGVER-A002 : D"],
-		["test11.pkg", "VERSION(0xE1000001,=,1,2,test)",	256,		"Expected numeric value read alphanumeric value",	"CR1125 SEC-SWI-PKGVER-A002 : E"],
-		["test12.pkg", "VERSION(0xE1000001,=,-2,2,3)",		256,		"Negative version components are not supported",	"CR1125 SEC-SWI-PKGVER-A003 : A"],
-		["test13.pkg", "VERSION(0xE1000001,=,-1,2,3)",		256,		"Wildcards are not supported",			"CR1125 SEC-SWI-PKGVER-A003 : B"],
-		["test14.pkg", "VERSION(0xE1000001,=,0,2,3)",		0,		"Generating SIS installation file...",		"CR1125 SEC-SWI-PKGVER-A003 : C"],
-		["test15.pkg", "VERSION(0xE1000001,=,1,2,3)",		0,		"Generating SIS installation file...",		"CR1125 SEC-SWI-PKGVER-A003 : D"],
-		["test16.pkg", "VERSION(0xE1000001,=,126,2,3)",		0,		"Generating SIS installation file...",		"CR1125 SEC-SWI-PKGVER-A003 : E"],
-		["test17.pkg", "VERSION(0xE1000001,=,127,2,3)",		0,		"Generating SIS installation file...",		"CR1125 SEC-SWI-PKGVER-A003 : F"],
-		["test18.pkg", "VERSION(0xE1000001,=,128,2,3)",		0,		"Warning : The valid version number ranges are :",		"CR1125 SEC-SWI-PKGVER-A003 : G"],
-		["test19.pkg", "VERSION(0xE1000001,=,1,-2,3)",		256,		"Negative version components are not supported",	"CR1125 SEC-SWI-PKGVER-A003 : H"],
-		["test20.pkg", "VERSION(0xE1000001,=,1,-1,3)",		256,		"Wildcards are not supported",			"CR1125 SEC-SWI-PKGVER-A003 : I"],
-		["test21.pkg", "VERSION(0xE1000001,=,1,0,3)",		0,		"Generating SIS installation file...",		"CR1125 SEC-SWI-PKGVER-A003 : J"],
-		["test22.pkg", "VERSION(0xE1000001,=,1,1,3)",		0,		"Generating SIS installation file...",		"CR1125 SEC-SWI-PKGVER-A003 : K"],
-		["test23.pkg", "VERSION(0xE1000001,=,1,98,3)",		0,		"Generating SIS installation file...",		"CR1125 SEC-SWI-PKGVER-A003 : L"],
-		["test24.pkg", "VERSION(0xE1000001,=,1,99,3)",		0,		"Generating SIS installation file...",		"CR1125 SEC-SWI-PKGVER-A003 : M"],
-		["test25.pkg", "VERSION(0xE1000001,=,1,100,3)",		0,		"Warning : The valid version number ranges are :",		"CR1125 SEC-SWI-PKGVER-A003 : N"],
-		["test26.pkg", "VERSION(0xE1000001,=,1,2,-2)",		256,		"Negative version components are not supported",	"CR1125 SEC-SWI-PKGVER-A003 : O"],
-		["test27.pkg", "VERSION(0xE1000001,=,1,2,-1)",		256,		"Wildcards are not supported",			"CR1125 SEC-SWI-PKGVER-A003 : P"],
-		["test28.pkg", "VERSION(0xE1000001,=,1,2,0)",		0,		"Generating SIS installation file...",		"CR1125 SEC-SWI-PKGVER-A003 : Q"],
-		["test29.pkg", "VERSION(0xE1000001,=,1,2,1)",		0,		"Generating SIS installation file...",		"CR1125 SEC-SWI-PKGVER-A003 : R"],
-		["test30.pkg", "VERSION(0xE1000001,=,1,2,32766)",	0,		"Generating SIS installation file...",		"CR1125 SEC-SWI-PKGVER-A003 : S"],
-		["test31.pkg", "VERSION(0xE1000001,=,1,2,32767)",	0,		"Generating SIS installation file...",		"CR1125 SEC-SWI-PKGVER-A003 : T"],
-		["test32.pkg", "VERSION(0xE1000001,=,1,2,32768)",	0,		"Warning : The valid version number ranges are :",		"CR1125 SEC-SWI-PKGVER-A003 : U"],
-		["test33.pkg", "VERSION(0xE1000001,=,*,2,3)",		256,		"Wildcards are not supported",	"CR1125 SEC-SWI-PKGVER-A004 : A"],
-		["test34.pkg", "VERSION(0xE1000001,=,1,*,3)",		256,		"Wildcards are not supported",	"CR1125 SEC-SWI-PKGVER-A004 : B"],
-		["test35.pkg", "VERSION(0xE1000001,=,1,2,*)",		256,		"Wildcards are not supported",	"CR1125 SEC-SWI-PKGVER-A004 : C"],
-		["test36.pkg", "VERSION(0xE1000001,=,1,2,)",		256,		"Expected numeric value read ",	"CR1125 SEC-SWI-PKGVER-A005 : A"],
-		["test37.pkg", "VERSION(0xE1000001,=,1,)",		256,		"Expected numeric value read ",	"CR1125 SEC-SWI-PKGVER-A005 : B"],
-		["test38.pkg", "VERSION(0xE1000001,=,)",		256,		"Expected numeric value read ",	"CR1125 SEC-SWI-PKGVER-A005 : C"],
-		["test39.pkg", "VERSION(0xE1000001,)",			256,		"Invalid Relational Operator",	"CR1125 SEC-SWI-PKGVER-A005 : D"],
-		["test40.pkg", "VERSION()",				256,		"Expected numeric value read ",	"CR1125 SEC-SWI-PKGVER-A005 : E"],
-		["testinterpretflag.pkg", "VERSION(0x11113011,=,1,2,3)",		0,		"SIS installation file VALID for InterpretSis",	"CR1125 SEC-SWI-PKGVER-A006"],
-	     );
-
-
-#
-# Template string to generate PKG file
-#
-$AnotherPkgFileTempl = "
-;
-; Autogenerated test install file
-;
-&EN
-;
-#{\"my test\"}, (0x80002233), 1, 2, 3, TYPE=SA
-;
-%%{\"Vendor\"}
-;
-;Installation name and header data
-(0x101f74aa),%s,{\"test\"}
-;
-;Made up files to install
-\"HelloApp.exe\"-\"c:\\sys\\bin\\multiÅžÑÂEÂEžÑÂEÂE”Ê.exe\"
-;
-";
-
-
-#
-# Template string to generate PKG file
-#
-$PkgFileTempl = "
-;
-; Autogenerated test install file
-;
-&EN
-;
-#{\"test\"}, (0x101f74aa), 1, 0, 0, TYPE=SA
-;
-%%{\"Ati\"}
-;
-;Installation name and header data
-(0x101f74aa),%s,{\"test\"}
-;
-;Made up files to install
-\"TEST.txt\"-\"!:\\System\\Apps\\TEST.txt\"
-;
-
-";
-
-#
-#
-# Pkg file can have forward slashes for source and destination file
-$ForwardSlash = "
-;
-; Autogenerated test install file
-;
-&EN
-;
-#{\"test\"}, (0x101f74aa), 1, 0, 0, TYPE=SA
-;
-%{\"Ati\"}
-;
-
-;Made up files to install
-
-\"TEST.txt\"-\"!:/Documents/InstTest/file1.txt\" 
-;
-";
-
-#
-#
-# Package file contains a FileNull followed by a RunInstall. The wildcard in the FN should be allowed and 
-# makesis should not be confused by the flags in the RI
-$FN_RI =" 
-&EN
-#{\"Symbian Email\"}, (0x800126e5), 1, 0, 0, TYPE=SA
-%{\"Symbian\"}
-:\"Symbian\"
-
-\"\"- \"C:/private/80009b91/temp/*.*\", FN
-\"HelloApp.exe\"-\"C:/sys/bin/postinstall.exe\", FR, RI
-";
-
-#
-#
-# Pkg file can have forward slashes for source and destination file
-$ForwardSlash = "
-;
-; Autogenerated test install file
-;
-&EN
-;
-#{\"test\"}, (0x101f74aa), 1, 0, 0, TYPE=SA
-;
-%{\"Ati\"}
-;
-
-;Made up files to install
-
-\"TEST.txt\"-\"!:/Documents/InstTest/file1.txt\" 
-;
-";
-
-
-#
-# Template string to generate PKG file
-#
-$PkgFileTemp2 = "
-;
-; Autogenerated test install file
-;
-&EN
-;
-#{\"test\"}, (0x101f74aa), 1, 0, 0, TYPE=SA
-;
-%%{\"Ati\"}
-;
-;Installation name and header data
-(0x101f74aa),%s,{\"test\"}
-;
-;Made up files to install
-\"TEST.txt\"-\"\$\:\\System\\Apps\\TEST.txt\"
-;
-";
-
-#
-# Template string to generate embedded package (testembedded.pkg).This is used for testing -d option of makesis .
-#
-$embedContents = "
-;
-; Autogenerated test install file for testing -d option.
-;
-&EN
-;
-#{\"embed\"}, (0x101f74a0), 1, 0, 0, TYPE=SA
-;
-%{\"Ati\"}
-;
-;Installation name and header data
-(0x101f74a0),%s,{\"embed\"}
-;
-;embedded sis file
-\@\"testembedding.sis\",(0x101f74aa)
-
-;Made up files to install
-\"TEST.txt\"-\"!:\\System\\Apps\\TEST.txt\"
-;
-";
-
-#
-# Template string to generate a package with 0xA0 chars (No-Break Space) inside
-#
-$ifendifContent = "
-;
-; Autogenerated test install file for testing DEF091780: Makesis have problems parsing IF-ENDIF block
-;
-
-;Languages
-&JA,FR
-
-;Header
-#{\"JA hira UCS2\",\"FR hira UCS2\" }, (0x80000003), 1, 2, 3, TYPE=SA
-%{\"AA-JA\",\"CC-FR\"}
-:\"venDor\"
-
-!({\"JAOpt1\",\"FROpt1\"},{\"JAOpt3\",\"FROpt3\"})
-
-if option1 
-\xA0\xA0\xA0{\"osver1J.txt\" \"osver1F.txt\"}-\"!:\\documents\\hello.txt\"; 
-endif
-
-if option2 
-\xA0\xA0\xA0{\"osver2J.txt\" \"osver2F.txt\"}-\"!:\\documents\\hello.txt\"; 
-endif
-";
-
-#
-#
-# A string to generate a package with Japanese JIS 0208-1990 encoding
-$unsupportedEncContent = "
-;Languages
-&JA
-
-;Header
-#{\"PC Japanese JIS 0208-1990 encoding\"}, (0xA2000222), 1, 2, 3, TYPE=SA
-
-%{\"Vendor\"}
-:\"Vendor\"
-
-\"TEST.txt\"-\"!:\Documents\InstTest\ñÃÂñ┘ñâ”ÂEtxt\" 
-";
-
-
-#
-# Template string to generate PKG file with If Exist statement for DEF091860.
-#
-$DEF091860PkgContents = "
-;
-; PKG file designed to test conditional installation.
-; Autogenerated test install file
-;
-&EN
-;
-#{\"test\"}, (0x101f74aa), 1, 0, 0, TYPE=SA
-;
-%{\"Ati\"}
-;
-;Installation name and header data
-(0x101f74aa),%s,{\"test\"}
-;
-;Made up files to install
-\"TEST.txt\"-\"!:\\System\\Apps\\TEST.txt\"
-;
-; The file “test1.txtâ€ÂEis expected to exist.
-if exists(\"test1.txt\")
-\"TEST.txt\"-\"!:\\System\\Apps\\TEST1.txt\"
-else
-\"TEST.txt\"-\"!:\\System\\Apps\\TEST2.txt\"
-endif
-
-; The file “test2.txtâ€ÂEis not expected to exist.
-if exists(\"test2.txt\")
-\"TEST.txt\"-\"!:\\System\\Apps\\TEST3.txt\"
-else
-\"TEST.txt\"-\"!:\\System\\Apps\\TEST4.txt\"
-endif
-;
-";
-
-#
-# Template string to generate PKG file for language dependent files
-#
-$PkgLanguageFileTemp = "
-;
-;
-&EN,FR,98
-;
-#{\"Language-EN\",\"Langauge-FR\",\"Language-Zulu\"}, (0x101f74aa), 1, 0, 0, TYPE=SA
-;
-%%{\"Vendor\",\"Vendour\",\"Verkoper\"}
-;
-;
-;Made up files to install
-{\"englishfile.txt\" \"frenchfile.txt\" \"germanfile.txt\"}  -\"!:\\System\\Apps\\TEST.txt\"
-;
-";
-
-
-
-# For DEF92320
-# Template string to generate PKG file,File name contain symbols like |,/,<,>,:,?,*
-#
-$PkgFileWithSymbol = "
-;
-; Autogenerated test install file
-;
-&EN
-;
-#{\"test\"}, (0x101f74aa), 1, 2, 3, TYPE=SA
-;
-%%{\"Ati\"}
-;
-;Made up files to install
-\"TEST.txt\"-\"!:\\System\\Apps\\TEST%s.txt\"
-;
-";
-
-# For DEF92320
-# Template string to generate PKG file, DIR path contain symbols like |,/,<,>,:,?,*
-#
-$PkgFileWithSymbol1 = "
-;
-; Autogenerated test install file
-;
-&EN
-;
-#{\"test\"}, (0x101f74aa), 1, 2, 3, TYPE=SA
-;
-%%{\"Ati\"}
-;
-;Made up files to install
-\"TEST.txt\"-\"!:\\System\\Ap%sps\\TEST.txt\"
-;
-";
-
-# For DEF115795
-# Template string to generate a package with very long destination folder
-#
-$longfolder = "
-;
-&EN
-;
-#{\"STSisapt444\"},(0x88900000),1,1,1,NOCOMPRESS,TYPE= SA
-;
-%{\"Test\"}
-;
-;
-\"TEST.txt\"-\"!:\siv1aaa\\10003a3f\\import\\apps\\siv2aa\\10003a3f\\import\\apps\\siv3aa\\10003a3f\\import\\apps\\siv4aa\\10003a3f\\import\\apps\\siv5aa\\10003a3f\\import\\apps\\siv6aa\\10003a3f\\import\\apps\\siv7aa\\10003a3f\\import\\apps\\siv8aa\\10003a3f\\import\\apps\\siv9aa\\10003a3f\\import\\apps\\siv10a\\10003a3f\\import\\apps\\siv11a\\10003a3f\\import\\appspp\\file1.txt\"
-;
-";	
-
-#
-# Template string to generate a package with comma at the end
-#
-$endFileCommaContent = "
-; A simple SIS file
-
-;Languages
-&EN,FR
-
-;Header
-#{\"Simple\",\"Simple-FR\"}, (0x80000001), 4, 5, 6
-
-%{\"Simple-Vendor\",\"Simple-Vendor-FR\"}
-:\"Unique Vendor Name\"
-	
-;Ordinary file to selected drive
-\"TEST.txt\"-\"!:/Documents/InstTest/file1.txt\",
-";
-	
-
-# Data to write in the created file for Linux test 
-$TempData = "Osver";
-
-#
-# Template string to generate PKG file
-#
-$JAPPkgFileTempl = "
-;
-; Autogenerated test install file
-;
-&JA
-;
-#{\"names large sample UTF8\"}, (0xA2000222), 1, 2, 3, TYPE=SA
-;
-%%{\"Vendor\"}
-;
-
-;Made up files to install
-\"\\epoc32\\winscw\\c\\tswi\\utf8.txt\"-\"!:\\utf8.txt\"
-;
-
-";
-
-
-#
-# Package template string to generate PKG file with RU and SA
-#
-$PkgFileRUWithSA = "
-;
-; Autogenerated test install file
-;
-&EN
-;
-#{\"SA ROM Upgrade\"}, (0x802730A2), 1, 0, 0, TYPE=SA, RU
-;
-%%{\"Security Services\"}
-;
-;Installation name and header data
-(0x802730A2),%s,{\"SA ROM Upgrade\"}
-;
-;Made up files to install
-\"TEST.txt\"-\"\$\:\\System\\Apps\\TEST.txt\"
-;
-";
-
-#
-# Package template string to generate PKG file with RU and non SA or PU or SP
-#
-$PkgFileRUWithNonSA = "
-;
-; Autogenerated test install file
-;
-&EN
-;
-#{\"SA ROM Upgrade\"}, (0x802730A2), 1, 0, 0, TYPE=PP, RU
-;
-%%{\"Security Services\"}
-;
-;Installation name and header data
-(0x802730A2),%s,{\"SA ROM Upgrade\"}
-;
-;Made up files to install
-\"TEST.txt\"-\"\$\:\\System\\Apps\\TEST.txt\"
-;
-";
-
-#
-# Package template string to generate PKG file with wildcards for ROM Stub.
-#
-$WildCardedpkgFile = "
-;
-; Autogenerated test install file
-;
-&EN
-;
-#{\"Wildcard Suported ROM App\"}, (0x802730B1), 1, 2, 3
-;
-%%{\"Security Services\"}
-;
-;Installation name and header data
-(0x802730B1),%s,{\"Wildcard Suported ROM App\"}
-;
-;Made up files to install
-\"\"-\"z:\\sys\\bin\\wildcard_rom_stub_lib?.dll\"
-;
-\"\"-\"z:\\sys\\bin\\*.exe\"
-;
-
-; Misc data files for baseline eclipsing test
-\"\"-\"z:\\cr1122test\\*.txt\"
-;
-\"\"-\"z:\\cr1122etst\\wildcard_config?.cnf\"
-;
-";
-
-
-#
-# Package template string to generate PKG file with wildcards for PA package
-#
-$WildCardedPApkgFile = "
-;
-; Autogenerated test install file
-;
-&EN
-;
-#{\"Wildcarded PA\"}, (0x802730B1), 1, 2, 3, TYPE = PA
-;
-%%{\"Security Services\"}
-;
-;Installation name and header data
-(0x802730B1),%s,{\"wildcarded PA\"}
-;
-;Made up files to install
-\"\\epoc32\\release\\<PLATFORM>\\<CONFIGURATION>\\tsaromupgradeexe.exe\"-\"c:\\sys\\bin\\*exe_PA?.exe\"
-;
-";
-
-#
-# Package template string to generate PKG file with wildcards for PP package
-#
-$WildCardedPApkgFile = "
-;
-; Autogenerated test install file
-;
-&EN
-;
-#{\"Wildcarded PP\"}, (0x802730B1), 1, 2, 3, TYPE = PP
-;
-%%{\"Security Services\"}
-;
-;Installation name and header data
-(0x802730B1),%s,{\"Wildcarded PP\"}
-;
-;Made up files to install
-\"\\epoc32\\release\\<PLATFORM>\\<CONFIGURATION>\\tsaromupgradeexe.exe\"-\"c:\\sys\\bin\\*exe_PA?.exe\"
-;
-";
-
-#
-# Package template string to generate PKG file having wildcards specified in the executable filename.
-#
-$ExeWithWildCardpkgFile = "
-;
-; Autogenerated test install file
-;
-&EN
-;
-#{\"Wildcard in Exe Name\"}, (0x801130c1), 1, 2, 3
-;
-%%{\"Security Services\"}
-;
-;Installation name and header data
-(0x801130c1),%s,{\"Wildcard in Exe Name\"}
-;
-;Made up files to install
-\"\"-\"z:\\sys\\bin\\wildcard_rom_stub.*\"
-;
-\"\"-\"z:\\sys\\bin\\wildcard_rom_stub?.dll\"
-;
-";
-
-#
-# Template string to generate a package with invalid version
-#
-$invalidVersion1 = "
-; A simple SIS file
-
-;Languages
-&EN,FR
-
-;Header
-#{\"Simple\",\"Simple-FR\"}, (0x80000001), 32767, 32767, 32767
-
-%{\"Simple-Vendor\",\"Simple-Vendor-FR\"}
-:\"Unique Vendor Name\"
-	
-;Ordinary file to selected drive
-\"TEST.txt\"-\"!:/Documents/InstTest/file1.txt\"
-";
-
-
-#
-# Template string to generate a package with invalid version number for negative values
-#
-$invalidVersion2 = "
-; A simple SIS file
-
-;Languages
-&EN,FR
-
-;Header
-#{\"Simple\",\"Simple-FR\"}, (0x80000001), -26, -1, -3245
-
-%{\"Simple-Vendor\",\"Simple-Vendor-FR\"}
-:\"Unique Vendor Name\"
-	
-;Ordinary file to selected drive
-\"TEST.txt\"-\"!:/Documents/InstTest/file1.txt\"
-";
-
-#
-# Template string to generate a pkg with an embedded sis file. The embedded sis file is missing on the computer.
-#
-$missingEmbed = "
-;
-; Pkg referencing missing embedded package.
-;
-&EN
-;
-#{\"missing embedded\"}, (0x80000001), 1, 0, 0, TYPE=SA
-;
-;missing embedded sis file
-\@\"missingembedded.sis\",(0x80000002)
-;
-";
-
-# Package template string to generate PKG file with ForceAbort (FA) text option.
-#
-$PkgFileWithFAOption = "
-;
-; Autogenerated test install file
-;
-&EN
-;
-#{\"Force Abort Text Option\"}, (0x8072302A), 1, 0, 0, TYPE=SA
-;
-%%{\"Security Services\"}
-;
-;Installation name and header data
-(0x802730A2),%s,{\"SA ROM Upgrade\"}
-;
-;Made up files to install
-\"TEST.txt\"-\"\", FT , FA
-;
-";
-
-#
-#Test code for Preinstalled pkg files without having sourcefiles
-#
-$PreinstalledPkgWithoutSourcefiles = "
-;A preinstalled SIS file
-
-;Languages
-&EN,FR
-
-;Header
-#{\"Simple\",\"Simple-FR\"}, (0x80000001), 1, 2, 3, TYPE = PA
-
-%{\"Simple-Vendor\",\"Simple-Vendor-FR\"}
-:\"Unique Vendor Name\"
-	
-;Ordinary file to selected drive
-\"\"-\"!:/Documents/InstTest/file1.txt\"
-";
-
-
-
-#
-# Template string to generate Expected output file for ROM stub file (containing exe with wildcards) created by makesis for DEF111264.
-#
-$DEF111264ExpectedOutput= "Unique vendor name not found.
-
-Warning: Executables should be included explicitly (without wildcards),to enable SID checks to work as expected.
-";
-
-#
-# Template string to generate Expected output file for Preinstalled APP package having no source files specified.
-#
-$DEF113569ExpectedOutput= " Error : Source file is missing for PreInstalled APP : 
-(14) : error: file I/O fault, Source file is missing for PreInstalled APP 
-";
-
-
-#
-# Template string to generate Expected output file when the version range is invalid.
-
-$DEF112718ExpectedOutput= "Warning : The valid version number ranges are : (Major: 0..127) (Minor: 0..99 ) (Build: 0..32,767).\n";
- 
-#
-# Package template string to generate an embedded PKG file of type PA.
-#
-$EmbeddedPApkgFile = "
-;
-; Autogenerated test install file
-;
-&EN
-;
-#{\"Test Embedded PA\"}, (0x01101335), 1, 1, 1, TYPE=PA
-;
-%{\"Symbian Software Ltd\"}
-:\"Symbian Software Ltd\"
-;
-;Installation name and header data
-(0x01101335),%s,{\"Test Embedded PA\"}
-;
-";
-
-#
-# Package template string to generate an embedding PKG file whose embedded pkg is of type=PA.
-#
-$EmbeddingPApkgFile = "
-;
-; Autogenerated test install file
-;
-&EN
-;
-#{\"Test Embedding PA\"}, (0x01011243), 1, 0, 1, TYPE=SA
-;
-%{\"Symbian Software Ltd\"}
-:\"Symbian Software Ltd\"
-;
-;Installation name and header data
-(0x01011243),%s,{\"Test Embedding PA\"}
-;
-\@\"embeddedPA.sis\" , (0x01101335)
-;
-";
-
-#
-# CR1125 VERSION Condition Package template string to generate PKG files
-#
-$PkgFileCR1125VersionTemplate = "
-;
-; Auto Generated Template PKG File
-; VERSION Conditional Testing
-;
-&EN
-;
-#{\"CR1125 SEC-SWI-PKGVER\"}, (0xEA001000), 1, 0, 2, TYPE=SA
-%{\"Symbian Software Ltd.\"}
-: \"Symbian Software Ltd.\"
-;
-; Version Conditional Block
-IF %s
-    {
-    \"TEST.txt\"
-    }-\"C:\\tswi\\tpkgver\\test_result_etrue.txt\"
-ENDIF
-;
-";
-
-#
-# Package template string to generate a PKG with features not installable by InterpretSIS
-#
-$PkgFileInterpretsisVersionTemplate = "
-;
-; Autogenerated test install file
-;
-&EN
-;
-#{\"Test Makesis -c\"}, (0x01011243), 1, 0, 1, TYPE=PP
-;
-%{\"Symbian Software Ltd\"}
-:\"Symbian Software Ltd\"
-;
-!({\"Add-on 1 (20KB)\"},{\"Add-on 2 (75KB)\"},{\"Add-on 3 (80KB)\"}) 
-;
-\@\"Embedded.sis\" , (0x101f74aa)
-;
-";
-
-#
-# Template string to generate Expected output file for DEF113349.
-#
-$DEF113349ExpectedOutput= "embeddedPA.sis is a stub.	 
-WARNING : Embedded Preinstalled Stub (PA/PP type) SIS file is not supported.
-(16) : error: SISfile error, Stub File
-";
-
-#
-# 
-#
-$InterpretsisExpectedOutput= "*** SIS installation file INVALID for InterpretSis ***
-(8) : Invalid Application Type. Package type PP not supported
-(12) : User options are not supported
-(14) : Embedded SIS file will not be installed by InterpretSis
-";
-
-#
-# Do test for each elements of TestItems array
-#
-for my $Test ( @TestItems )  {
-
-	# Generating PKG file contents
-	if( $Test->[0] eq  "test16.pkg" )
-		{
-		$PkgFile = sprintf( $AnotherPkgFileTempl, $Test->[1]);
-		}
-	elsif ( $Test->[0] eq  "test17.pkg" )
-		{
-		$PkgFile = $unsupportedEncContent;
-		}
-	elsif ( $Test->[0] eq  "testForward.pkg" )
-		{
-		$PkgFile = $ForwardSlash;
-		}
-	elsif ( $Test->[0] eq  "testFN_RI.pkg" )
-		{
-		$PkgFile = $FN_RI;
-		}
-	else
-		{
- 		$PkgFile = sprintf( $PkgFileTempl, $Test->[1]); 
-		}
-	
-	# Create PKG file
-	CreateFile($Test->[0], $PkgFile);	
-
-	# Do MAKESIS test
-
-	$logMsg = sprintf "%s\n (symbol:%s)\n", $Test->[4], $Test->[1];
-	WriteLog($logMsg);
-
-	MakeSISFile($Test->[0], $Test->[2], $Test->[3]);
-
-}
-
-#
-# Do test for each elements of TestItems1 array
-#
- $Count = 1;
-for my $Test1 ( @TestItems1 )  {
-
-	# Generating PKG file contents
-	if( $Count >= 19 )
-		{
-		$PkgFile = sprintf( $PkgFileWithSymbol1 , $Test1->[1]);
-		$Count ++  ;
-		}
-	else
-		{
-		$PkgFile = sprintf( $PkgFileWithSymbol , $Test1->[1]);
-		$Count++ ;
-		}
-
-	# Create PKG file
-	CreateFile($Test1->[0], $PkgFile);	
-
-	# Do MAKESIS test
-
-	$logMsg1 = sprintf "%s\n (Symbol:%s)\n", $Test1->[4], $Test1->[1];
-	WriteLog($logMsg1);
-
-	MakeSISFile($Test1->[0], $Test1->[2], $Test1->[3]);
-
-}
-
-
-#
-# Run CR1125 MakeSIS Tests (TestItems2 array)
-#
-for my $Test2 ( @TestItems2 )  {
-
-	# Generating PKG file contents
-	$PkgFile = sprintf( $PkgFileCR1125VersionTemplate , $Test2->[1]);
-
-	# Create PKG file
-	CreateFile($Test2->[0], $PkgFile);	
-
-	# Do MAKESIS test
-	$logMsg1 = sprintf "%s\n (Condition: %s)\n", $Test2->[4], $Test2->[1];
-	WriteLog($logMsg1);
-
-	MakeSISFile($Test2->[0], $Test2->[2], $Test2->[3]);
-}
-
-
-#
-# Additional test to check that stub files don't change every time 
-# they are built.
-#
-TestSISStubFile();
-
-#
-# Test for Test$parameter()
-#
-TestsysDriveparameter();
-
-# Call the tests for CR1027 - ROM Upgrade with SA SIS package.
-TestSisRUWithSA();
-TestSisRUWithNonSA();
-
-# Call the test for CR1122 - Wildcard support for ROM stub.
-TestSISWithWildCards();
-TestSISWithWildCardsPA();
-TestSISWithWildCardsPP();
-
-#
-# Test for DEF111264.Verifying that warnings are generated by Makesis 
-# when wildcards are used in \sys\bin directory in ROM stubs. 
-#
-
-TestDEF111264();
-
-#
-# Test for DEF113116.
-#  
-TestDEF113116();
-
-#
-# Test for DEF083525
-#
-TestDEF083525();
-
-#
-# Test for PDEF081989.Testing the working of Makesis -d option .
-#
-
-TestPDEF081989();
-
-
-#
-# Test for DEF093400
-#
-TestDEF093400();
-
-#
-# Test for DEF090878
-#
-TestDEF090878();
-
-#
-# Test for DEF107033.Testing the working of Makesis -d option with language dependent files.
-#
-
-TestDEF107033();
-
-# Test for an output filename with a single char - DEF108728
-TestSingleCharFilename();
-
-# Test for DEF108815
-TestEndFileComma();
-
-
-# Test for DEF115795
-TestLongFolderName();
-
-# Test for DEF112718-1
-TestInvalidVersion1();
- 
-# Test for DEF112718-2
-TestInvalidVersion2();
-
-# Test for DEF112831
-TestDEF112831();
-
-#
-# Test for DEF113349.
-#
-
-TestDEF113349();
-
-# Test for DEF113569
-TestPreInstalledWithoutSourceFiles();
-
-#
-# Test for Makesis -c option. Added as part of the fix for DEF126467.
-#
-TestInterpretsisReport();
-
-#
-# These tests are very specific to windows OS only
-#
-#
-
-if ($^O =~ /^MSWIN32$/i)
-{
-#
-# Test for DEF091860
-#
-TestDEF091860();
-
-#
-# Test for DEF091942.
-#
-TestDEF091942();
-
-#
-# Test for INC092755
-#
-TestINC092755();
-
-#
-# Test for DEF090912
-#
-TestDEF090912();
-
-#
-# Test for DEF093156
-#
-TestDEF093156();
-
-#
-# Test for TestDEF091780
-#
-TestDEF091780();
-
-#
-# Test for DEF104895.Testing the working of Makesis -d option with 
-# embedding sis file in path containing backward slasesh.
-#
-
-TestDEF104895();
-}
-
-#
-# These tests are very specific to Linux OS only
-#
-#
-if ($^O =~ /^LINUX$/i)
-{
-
-#
-# Test for DEF091942.
-#
-TestLDEF091942();
-
-
-#
-# Test for DEF090912
-#
-TestLDEF090912();
-
-#
-# Test for DEF104895.Testing the working of Makesis -d option with 
-# embedding sis file in path containing backward slasesh.
-#
-
-TestLDEF104895();
-
-}
-
-
-unlink("Test.txt");
-unlink("HelloApp.exe");
-unlink("test1.txt");
-unlink("test2.txt");
-
-#
-# Display the result
-#
-WriteLog("\n\nTests completed OK\n");
-WriteLog(sprintf "Run: %d\n", $NumberOfTests );
-WriteLog(sprintf "Passed: %d\n", $NumberOfPassed );
-WriteLog(sprintf "%d tests failed out of %d\n", $NumberOfFailed, $NumberOfTests ); 
-
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/test_spec.txt	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptomgmtlibs/securitytestfw/test/autotesting/test_spec.txt	Wed Apr 14 17:48:59 2010 +0300
@@ -17,15 +17,15 @@
 #
 # WARNING - There must not be more than one test block for any of the components.  
 # E.g. SWI has one and only one [SWI] section in this file.  Otherwise 
-# \security\testframework\test\test_launcher.pl will be broken.
+# %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\test_launcher.pl will be broken.
 
   
 ###############################################################################
 #                             COMPONENT ASSIGNMENT                            #
 ###############################################################################
-{9.5}=Init,Crypto,CryptoTokens,CAF2,Common,Certman,SWI,IntegrityServices,Asnpkcs,Filetokens,SisTools,SwiTools95Only,SwiTools,CryptoSpi,UPS,StreamingCAF,SecurityTools,Misc,ToolsLegacy,UptoMCL
-{9.6}=Init,Crypto,CryptoTokens,CAF2,CAF296,Common,Certman,SWI,Asnpkcs,Filetokens,FileTokens_UseAuth,SisTools,SwiTools,CryptoSpi,UPS,StreamingCAF,SecurityTools,USIF,Misc,ToolsNew,SwiDiran,AuthServer
-{future}=Init,Crypto,CryptoTokens,CAF2,CAF296,CAF2Future,Common,Certman,SWI,Asnpkcs,Filetokens,FileTokens_UseAuth,SisTools,SwiTools,CryptoSpi,UPS,AuthServer,StreamingCAF,SecurityTools,USIF,Misc,ToolsNew,SwiDiran
+{tb92SF}=Init,Crypto,CryptoTokens,CAF2,CAF296,Common,Certman,Asnpkcs,Filetokens,CryptoSpi,UPS,StreamingCAF,SecurityTools,Misc
+{tb101SF}=Init,Crypto,CryptoTokens,CAF2,CAF296,CAF2Future,Common,Certman,Asnpkcs,Filetokens,FileTokens_UseAuth,CryptoSpi,UPS,AuthServer,StreamingCAF,SecurityTools,Misc,FileTokens_HwImpl
+
 
 ###############################################################################
 #                               TEST DEFINITION                               #
@@ -53,36 +53,6 @@
 TESTEXECUTE, \logs\testexecute\tpaddingudeb.htm,, -Dtextshell -- \tpadding\tpaddingudeb.script, 300, UDEB,,
 
 # CRYPTO 
-tasymmetric, \tasymmetrictests.log,, -Dtextshell -- \tasymmetric\tasymmetrictests.txt \tasymmetrictests.log, 300, UDEB#UREL,,
-tsymmetric, \tsymmetrictests.log,, -Dtextshell -- \tsymmetric\tsymmetrictests.txt \tsymmetrictests.log, 300, UDEB#UREL,,
-tsymmetric, \AESECBVectorsScript.log,, -Dtextshell -- \tsymmetric\AESECBVectorsScript.txt \AESECBVectorsScript.log, 300, UDEB#UREL,,
-tsymmetric, \AESECB_KAT_VT.log,, -Dtextshell -- \tsymmetric\AESECB_KAT_VT.txt \AESECB_KAT_VT.log, 300, UDEB#UREL,,
-tsymmetric, \AESECB_KAT_VK.log,, -Dtextshell -- \tsymmetric\AESECB_KAT_VK.txt \AESECB_KAT_VK.log, 300, UDEB#UREL,,
-tsymmetric, \AESMonteCarloEncryptECB128.log,, -Dtextshell -- \tsymmetric\AESMonteCarloEncryptECB128.txt \AESMonteCarloEncryptECB128.log, 300, UDEB#UREL,,
-tsymmetric, \AESMonteCarloEncryptECB192.log,, -Dtextshell -- \tsymmetric\AESMonteCarloEncryptECB192.txt \AESMonteCarloEncryptECB192.log, 300, UDEB#UREL,,
-tsymmetric, \AESMonteCarloEncryptECB256.log,, -Dtextshell -- \tsymmetric\AESMonteCarloEncryptECB256.txt \AESMonteCarloEncryptECB256.log, 300, UDEB#UREL,,
-tsymmetric, \AESMonteCarloDecryptECB128.log,, -Dtextshell -- \tsymmetric\AESMonteCarloDecryptECB128.txt \AESMonteCarloDecryptECB128.log, 300, UDEB#UREL,,
-tsymmetric, \AESMonteCarloDecryptECB192.log,, -Dtextshell -- \tsymmetric\AESMonteCarloDecryptECB192.txt \AESMonteCarloDecryptECB192.log, 300, UDEB#UREL,,
-tsymmetric, \AESMonteCarloDecryptECB256.log,, -Dtextshell -- \tsymmetric\AESMonteCarloDecryptECB256.txt \AESMonteCarloDecryptECB256.log, 300, UDEB#UREL,,
-tsymmetric, \AESMonteCarloEncryptCBC128.log,, -Dtextshell -- \tsymmetric\AESMonteCarloEncryptCBC128.txt \AESMonteCarloEncryptCBC128.log, 300, UDEB#UREL,,
-tsymmetric, \AESMonteCarloEncryptCBC192.log,, -Dtextshell -- \tsymmetric\AESMonteCarloEncryptCBC192.txt \AESMonteCarloEncryptCBC192.log, 300, UDEB#UREL,,
-tsymmetric, \AESMonteCarloEncryptCBC256.log,, -Dtextshell -- \tsymmetric\AESMonteCarloEncryptCBC256.txt \AESMonteCarloEncryptCBC256.log, 300, UDEB#UREL,,
-tsymmetric, \AESMonteCarloDecryptCBC128.log,, -Dtextshell -- \tsymmetric\AESMonteCarloDecryptCBC128.txt \AESMonteCarloDecryptCBC128.log, 300, UDEB#UREL,,
-tsymmetric, \AESMonteCarloDecryptCBC192.log,, -Dtextshell -- \tsymmetric\AESMonteCarloDecryptCBC192.txt \AESMonteCarloDecryptCBC192.log, 300, UDEB#UREL,,
-tsymmetric, \AESMonteCarloDecryptCBC256.log,, -Dtextshell -- \tsymmetric\AESMonteCarloDecryptCBC256.txt \AESMonteCarloDecryptCBC256.log, 300, UDEB#UREL,,
-tsymmetric, \symmetricOOMtests.log,, -Dtextshell -- \tsymmetric\symmetricOOMtests.txt  \symmetricOOMtests.log, 300, UDEB#UREL,,
-
-tbigint, \tconstruction.log,, -Dtextshell -- \tbigint\tconstructiontests.txt  \tconstruction.log, 300, UDEB#UREL,,
-tbigint, \tbasicmaths.log,, -Dtextshell -- \tbigint\tbasicmathstests.txt  \tbasicmaths.log, 1500, UDEB#UREL,,
-tbigint, \tmontgomery.log,, -Dtextshell -- \tbigint\tmontgomerytests.txt  \tmontgomery.log, 300, UDEB#UREL,,
-tbigint, \tprime.log,, -Dtextshell -- \tbigint\tprimetests.txt  \tprime.log, 300, UDEB#UREL,,
-tbigint, \tprime2.log,, -Dtextshell -- \tbigint\tprimetests2.txt  \tprime2.log, 600, UDEB#UREL,,
-tbigint, \tprimegen.log,, -Dtextshell -- \tbigint\tprimegen.txt  \tprimegen.log, 300, UDEB#UREL,,
-tbigint, \tprimefailure.log,, -Dtextshell -- \tbigint\tprimefailuretests.txt  \tprimefailure.log, 300, UDEB#UREL,,
-
-tpkcs5kdf, \tpkcs12kdftests.log,, -Dtextshell -- \tpkcs5kdf\tpkcs12kdftests.txt   \tpkcs12kdftests.log, 600, UDEB#UREL,,
-TPBE, \tpbetestsv2.log,, -Dtextshell -- \tpbe\tpbetests_v2.txt \tpbetestsv2.log, 3000, UDEB#UREL,,
-
 # CRYPTO TMS SUPPORT
 tasymmetric, \logs\testexecute\tasymmetrictests.htm,, -Dtextshell -- \tasymmetric\tasymmetrictests.script \logs\testexecute\tasymmetrictests.htm, 300, UDEB#UREL,,
 tsymmetric, \logs\testexecute\tsymmetrictests.htm,, -Dtextshell -- \tsymmetric\tsymmetrictests.script \logs\testexecute\tsymmetrictests.htm, 300, UDEB#UREL,,
@@ -104,15 +74,15 @@
 tsymmetric, \logs\testexecute\AESMonteCarloDecryptCBC256.htm,, -Dtextshell -- \tsymmetric\AESMonteCarloDecryptCBC256.script \logs\testexecute\AESMonteCarloDecryptCBC256.htm, 300, UDEB#UREL,,
 tsymmetric, \logs\testexecute\symmetricOOMtests.htm,, -Dtextshell -- \tsymmetric\symmetricOOMtests.script  \logs\testexecute\symmetricOOMtests.htm, 300, UDEB#UREL,,
 
-tbigint, \logs\testexecute\tconstruction.htm,, -Dtextshell -- \tbigint\tconstructiontests.script  \logs\testexecute\tconstruction.htm, 300, UDEB#UREL,,
-tbigint, \logs\testexecute\tbasicmaths.htm,, -Dtextshell -- \tbigint\tbasicmathstests.script  \logs\testexecute\tbasicmaths.htm, 1500, UDEB#UREL,,
-tbigint, \logs\testexecute\tmontgomery.htm,, -Dtextshell -- \tbigint\tmontgomerytests.script  \logs\testexecute\tmontgomery.htm, 300, UDEB#UREL,,
-tbigint, \logs\testexecute\tprime.htm,, -Dtextshell -- \tbigint\tprimetests.script  \logs\testexecute\tprime.htm, 300, UDEB#UREL,,
-tbigint, \logs\testexecute\tprime2.htm,, -Dtextshell -- \tbigint\tprimetests2.script  \logs\testexecute\tprime2.htm, 600, UDEB#UREL,,
-tbigint, \logs\testexecute\tprimegen.htm,, -Dtextshell -- \tbigint\tprimegen.script  \logs\testexecute\tprimegen.htm, 300, UDEB#UREL,,
-tbigint, \logs\testexecute\tprimefailure.htm,, -Dtextshell -- \tbigint\tprimefailuretests.script  \logs\testexecute\tprimefailure.htm, 300, UDEB#UREL,,
+tbigint, \logs\testexecute\tconstruction.htm,, -Dtextshell -- \tbigint\tconstructiontests.script \logs\testexecute\tconstruction.htm, 300, UDEB#UREL,,
+tbigint, \logs\testexecute\tbasicmaths.htm,, -Dtextshell -- \tbigint\tbasicmathstests.script \logs\testexecute\tbasicmaths.htm, 1500, UDEB#UREL,,
+tbigint, \logs\testexecute\tmontgomery.htm,, -Dtextshell -- \tbigint\tmontgomerytests.script \logs\testexecute\tmontgomery.htm, 300, UDEB#UREL,,
+tbigint, \logs\testexecute\tprime.htm,, -Dtextshell -- \tbigint\tprimetests.script \logs\testexecute\tprime.htm, 300, UDEB#UREL,,
+tbigint, \logs\testexecute\tprime2.htm,, -Dtextshell -- \tbigint\tprimetests2.script \logs\testexecute\tprime2.htm, 600, UDEB#UREL,,
+tbigint, \logs\testexecute\tprimegen.htm,, -Dtextshell -- \tbigint\tprimegen.script \logs\testexecute\tprimegen.htm, 300, UDEB#UREL,,
+tbigint, \logs\testexecute\tprimefailure.htm,, -Dtextshell -- \tbigint\tprimefailuretests.script \logs\testexecute\tprimefailure.htm, 300, UDEB#UREL,,
 
-tpkcs5kdf, \logs\testexecute\tpkcs12kdftests.htm,, -Dtextshell -- \tpkcs5kdf\tpkcs12kdftests.script   \logs\testexecute\tpkcs12kdftests.htm, 600, UDEB#UREL,,
+tpkcs5kdf, \logs\testexecute\tpkcs12kdftests.htm,, -Dtextshell -- \tpkcs5kdf\tpkcs12kdftests.script \logs\testexecute\tpkcs12kdftests.htm, 600, UDEB#UREL,,
 TPBE, \logs\testexecute\tpbetestsv2.htm,, -Dtextshell -- \tpbe\tpbetests_v2.script \logs\testexecute\tpbetestsv2.htm, 3000, UDEB#UREL,,
 
 
@@ -128,7 +98,6 @@
 TESTEXECUTE, \logs\testexecute\RTA.htm,, z:\RTA\RTA.script,1800, UDEB#UREL,\techview.bat,
 TESTEXECUTE, \logs\testexecute\tcafnodrmcap.htm,, z:\tcaf\tcafnodrmcap.script,300, UDEB#UREL,\techview.bat,
 
-
 [CAF296]
 # Should be run v9.6 onwards
 TESTEXECUTE, \logs\testexecute\RTA_64bit.htm,, z:\RTA\rta_64bit.script,1800, UDEB#UREL,\techview.bat,
@@ -140,6 +109,12 @@
 TESTEXECUTE, \logs\testexecute\tmtputils.htm,, z:\tcaf\tmtputils\tmtputils.script,1800, UDEB#UREL,\techview.bat,
 TESTEXECUTE, \logs\testexecute\tcafhelper.htm,, z:\tcaf\tcafhelper.script,1800, UDEB#UREL,\techview.bat,
 
+[StreamingCAF]
+#Streaming CAF Tests
+TESTEXECUTE, \logs\testexecute\tscaf.htm,,-Dtextshell --  z:\tcaf\tscaf\tscaf.script, 300, UDEB#UREL, ,
+TESTEXECUTE, \logs\testexecute\tscaf_oom.htm,,-Dtextshell --  z:\tcaf\tscaf\tscaf_oom.script, 300, UDEB, ,
+
+
 
 [Common]
 TESTEXECUTE, \logs\testexecute\trecogcert.htm,, \trecog\trecogcert.script, 300, UDEB#UREL,,
@@ -182,14 +157,14 @@
 
 tJarDownloader, \tJarDownloader.log,, -Dstartupmode=1 \tJarDownloader\scripts\script1.txt \tJarDownloader.log, 300, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\jardownloaderwithauto.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat
 
-TESTEXECUTE, \logs\testexecute\tmidletuaheaderfilter.htm,,  -Dtextshell -- \tmidletuaheaderfilter\tmidletuaheaderfilter.script, 600, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_jmi.bat, %SECURITYSOURCEDIR%\testframework\test\autotesting\preparetjardownloader.bat
+TESTEXECUTE, \logs\testexecute\tmidletuaheaderfilter.htm,,  -Dtextshell -- \tmidletuaheaderfilter\tmidletuaheaderfilter.script, 600, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_jmi.bat, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\preparetjardownloader.bat
 
 ITHARNESSMIDP, \itharnessmidp-conf1.log,, \JAVATEST.TXT \itharnessmidp-conf1.log, 1600, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cert_copy.bat,
 ITHARNESSMIDP, \itharnessmidp-conf2.log,, \JAVATEST2.TXT \itharnessmidp-conf2.log, 600, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\backup_jmi_autodeletefiles.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\replace_jmi_autodeletefiles.bat
 ITHARNESSMIDP, \itharnessmidp-conf3.log,, \JAVATEST3.TXT \itharnessmidp-conf3.log, 300, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cert_copy.bat,
 ITHARNESSMIDP, \itharnessmidp-conf4.log,, \OTATests.txt \itharnessmidp-conf4.log, 1200, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_otasetup.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat revertotasetup
 ITHARNESSMIDP, \leavetest.log,, \leavetest.txt \leavetest.log, 600, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cert_copy.bat auto.cfg,
-ITHARNESSMIDP, \itharnessmidp-conf5.log,, \javaiaptest.txt \itharnessmidp-conf5.log, 1200, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cert_copy.bat prompt.cfg, %SECURITYSOURCEDIR%\testframework\test\autotesting\runced c:\auto.cfg
+ITHARNESSMIDP, \itharnessmidp-conf5.log,, \javaiaptest.txt \itharnessmidp-conf5.log, 1200, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cert_copy.bat prompt.cfg, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\runced c:\auto.cfg
 
 ITHARNESSMIDP, \itharnessmidp-ocsp-default.log,, \itharnessmidp\scripts\ocsp-Default.txt \itharnessmidp-ocsp-default.log, 300, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cert_copy.bat ocsp-default,
 ITHARNESSMIDP, \itharnessmidp-ocsp-allWarnings.log,, \itharnessmidp\scripts\ocsp-allWarnings.txt \itharnessmidp-ocsp-allWarnings.log, 600, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cert_copy.bat ocsp-allWarnings,
@@ -215,14 +190,6 @@
 #New tpkixcert tests using TEF framework
 TESTEXECUTE, \logs\testexecute\tpkixcert_tef.htm,, -Dtextshell --  \tpkixcert_tef\scripts\tpkixcert_tef.script, 900, UDEB#UREL,,
 
-TASN1, \TASN1.log,, -Dtextshell -- \tasn1\scripts\tasn1.txt \tasn1.log, 300, UDEB#UREL,, \epoc32\winscw\c\tasn1\scripts\batchfiles\tasn1_cleanup.bat
-Tx509, \tx509.log,, -Dtextshell -- \tx509\scripts\tx509.txt \tx509.log, 300, UDEB#UREL,, \epoc32\winscw\c\tx509\scripts\batchfiles\tx509_cleanup.bat
-Tx509, \tx509_dev_certs.log,, -Dtextshell -- \tx509\scripts\tx509_dev_certs.txt \tx509_dev_certs.log, 300, UDEB#UREL,,
-Tx509, \outFileOOM1.log,, -Dtextshell -- \TX509\SCRIPTS\TX509-OOM1.TXT \outFileOOM1.log, 300, UDEB#UREL,, \epoc32\winscw\c\tx509\scripts\batchfiles\tx509_cleanup.bat
-Tx509, \outFileOOM2.log,, -Dtextshell -- \TX509\SCRIPTS\TX509-OOM2.TXT \outFileOOM2.log, 300, UDEB#UREL,,
-Tx509, \tx509_dev_certs_oom.log,, -Dtextshell -- \tx509\scripts\tx509_dev_certs_oom.txt \tx509_dev_certs_oom.log, 300, UDEB#UREL,,
-tx509, \tx509_dnames.log,, -Dtextshell -- \tx509\scripts\tx509-dnames.txt \tx509_dnames.log, 300, UDEB#UREL,,
-
 # TMS SUPPORT
 TASN1, \logs\testexecute\TASN1.htm,, -Dtextshell -- \tasn1\scripts\tasn1.script \logs\testexecute\tasn1.htm, 300, UDEB#UREL,, \epoc32\winscw\c\tasn1\scripts\batchfiles\tasn1_cleanup.bat
 Tx509, \logs\testexecute\tx509.htm,, -Dtextshell -- \tx509\scripts\tx509.script \logs\testexecute\tx509.htm, 300, UDEB#UREL,, \epoc32\winscw\c\tx509\scripts\batchfiles\tx509_cleanup.bat
@@ -232,25 +199,12 @@
 Tx509, \logs\testexecute\tx509_dev_certs_oom.htm,, -Dtextshell -- \tx509\scripts\tx509_dev_certs_oom.script \logs\testexecute\tx509_dev_certs_oom.htm, 300, UDEB#UREL,,
 tx509, \logs\testexecute\tx509_dnames.htm,, -Dtextshell -- \tx509\scripts\tx509-dnames.script \logs\testexecute\tx509_dnames.htm, 300, UDEB#UREL,,
 
-TWTLSCERT, \twtlscert.log,, -Dtextshell -- \twtlscert\scripts\twtlscert.txt \twtlscert.log, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-TWTLSCERT, \wtlstests1.log,, -Dtextshell -- \twtlscert\scripts\TWTLSCERT1.TXT \wtlstests1.log, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-TWTLSCERT, \wtlstests2.log,, -Dtextshell -- \twtlscert\scripts\TWTLSCERT2.TXT \wtlstests2.log, 300, UDEB#UREL,, \epoc32\winscw\c\twtlscert\scripts\batchfiles\twtlscert_cleanup.bat
-TWTLSCERT, \wtlstests3.log,, -Dtextshell -- \twtlscert\scripts\TWTLSCERT3.TXT \wtlstests3.log, 900, UDEB#UREL,, \epoc32\winscw\c\twtlscert\scripts\batchfiles\twtlscert_cleanup.bat
-
 # TMS SUPPORT
 TWTLSCERT, \logs\testexecute\twtlscert.htm,, -Dtextshell -- \twtlscert\scripts\twtlscert.script \logs\testexecute\twtlscert.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
 TWTLSCERT, \logs\testexecute\wtlstests1.htm,, -Dtextshell -- \twtlscert\scripts\TWTLSCERT1.script \logs\testexecute\wtlstests1.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
 TWTLSCERT, \logs\testexecute\wtlstests2.htm,, -Dtextshell -- \twtlscert\scripts\TWTLSCERT2.script \logs\testexecute\wtlstests2.htm, 300, UDEB#UREL,, \epoc32\winscw\c\twtlscert\scripts\batchfiles\twtlscert_cleanup.bat
 TWTLSCERT, \logs\testexecute\wtlstests3.htm,, -Dtextshell -- \twtlscert\scripts\TWTLSCERT3.script \logs\testexecute\wtlstests3.htm, 900, UDEB#UREL,, \epoc32\winscw\c\twtlscert\scripts\batchfiles\twtlscert_cleanup.bat
 
-TPKIXCERT, \TPKIXCERT_log1.txt,,	-Dtextshell -- \TPKIXCERT\SCRIPTS\TPKIXTEST_part1.TXT \TPKIXCERT_log1.txt, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-TPKIXCERT, \TPKIXCERT_log2.txt,,	-Dtextshell -- \TPKIXCERT\SCRIPTS\TPKIXTEST_part2.TXT \TPKIXCERT_log2.txt, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-TPKIXCERT, \TPKIXCERT_logcancel.txt,, -Dtextshell -- \TPKIXCERT\SCRIPTS\CANCEL1.TXT \TPKIXCERT_logcancel.txt, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-TPKIXCERT, \TPKIXCERT_logoom1.txt,, -Dtextshell -- \TPKIXCERT\SCRIPTS\OOM1.TXT \TPKIXCERT_logoom1.txt, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-TPKIXCERT, \TPKIXCERT_logoom2.txt,, -Dtextshell -- \TPKIXCERT\SCRIPTS\OOM2.TXT \TPKIXCERT_logoom2.txt, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-TPKIXCERT, \TPKIXCERT_logoom3.txt,, -Dtextshell -- \TPKIXCERT\SCRIPTS\OOM3.TXT \TPKIXCERT_logoom3.txt, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-TPKIXCERT, \TPKIXCERT_logoom4.txt,, -Dtextshell -- \TPKIXCERT\SCRIPTS\OOM4.TXT \TPKIXCERT_logoom4.txt, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-
 # TMS SUPPORT
 TPKIXCERT, \logs\testexecute\TPKIXCERT_log1.htm,,	-Dtextshell -- \TPKIXCERT\SCRIPTS\TPKIXTEST_part1.script \logs\testexecute\TPKIXCERT_log1.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
 TPKIXCERT, \logs\testexecute\TPKIXCERT_log2.htm,,	-Dtextshell -- \TPKIXCERT\SCRIPTS\TPKIXTEST_part2.script \logs\testexecute\TPKIXCERT_log2.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
@@ -261,62 +215,33 @@
 TPKIXCERT, \logs\testexecute\TPKIXCERT_logoom4.htm,, -Dtextshell -- \TPKIXCERT\SCRIPTS\OOM4.script \logs\testexecute\TPKIXCERT_logoom4.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
 
 
-tocsp, \tocsp_openssl.log,,         \system\tocsp\scripts\openssl.txt       \tocsp_openssl.log,          300, UDEB, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	\epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
-tocsp, \tocsp_logxcert_local.log,,  \system\tocsp\scripts\xcert-local.txt   \tocsp_logxcert_local.log,   300, UDEB, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	\epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
-tocsp, \tocsp_logopenssl_local.log,,\system\tocsp\scripts\openssl-local.txt \tocsp_logopenssl_local.log, 300, UDEB, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	\epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
-tocsp, \tocsp_logerror.log,,        \system\tocsp\scripts\error.txt         \tocsp_logerror.log,         300, UDEB, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	\epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
-tocsp, \tocsp_defaultpolicy.log,,   \system\tocsp\scripts\defaultpolicy.txt \tocsp_defaultpolicy.log,    300, UDEB, \epoc32\winscw\c\system\tocsp\scripts\setupocsppolicy.bat ocsppolicy.ini,
-tocsp, \tocsp_newpolicy.log,,       \system\tocsp\scripts\newpolicy.txt     \tocsp_newpolicy.log,        300, UDEB, \epoc32\winscw\c\system\tocsp\scripts\setupocsppolicy.bat newpolicy.ini, 	\epoc32\winscw\c\system\tocsp\scripts\setupocsppolicy.bat ocsppolicy.ini
-tocsp, \tocsp_httpinterface.log,,   \system\tocsp\scripts\httpinterface.txt \tocsp_httpinterface.log,	 300, UDEB, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	\epoc32\winscw\c\tcertstore\scripts\batchfiles\post_httpinterface_restore.bat
-
-tocsp, \tocsp_openssl.log,, -Dtextshell --          \system\tocsp\scripts\openssl.txt 	    \tocsp_openssl.log,          300, UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	   \epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
-tocsp, \tocsp_logxcert_local.log,, -Dtextshell --   \system\tocsp\scripts\xcert-local.txt   \tocsp_logxcert_local.log,   300, UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	   \epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
-tocsp, \tocsp_logopenssl_local.log,, -Dtextshell -- \system\tocsp\scripts\openssl-local.txt \tocsp_logopenssl_local.log, 300, UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	   \epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
-tocsp, \tocsp_logerror.log,, -Dtextshell --         \system\tocsp\scripts\error.txt         \tocsp_logerror.log,         300, UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	   \epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
-tocsp, \tocsp_defaultpolicy.log,, -Dtextshell --    \system\tocsp\scripts\defaultpolicy.txt \tocsp_defaultpolicy.log,    300, UREL, \epoc32\winscw\c\system\tocsp\scripts\setupocsppolicy_urel.bat ocsppolicy.ini,
-tocsp, \tocsp_newpolicy.log,, -Dtextshell --        \system\tocsp\scripts\newpolicy.txt     \tocsp_newpolicy.log,        300, UREL, \epoc32\winscw\c\system\tocsp\scripts\setupocsppolicy_urel.bat newpolicy.ini,  \epoc32\winscw\c\system\tocsp\scripts\setupocsppolicy_urel.bat ocsppolicy.ini
-tocsp, \tocsp_httpinterface.log,, -Dtextshell --    \system\tocsp\scripts\httpinterface.txt \tocsp_httpinterface.log,    300, UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	   \epoc32\winscw\c\tcertstore\scripts\batchfiles\post_httpinterface_restore.bat
-tocsp, \tocsp_logoom.log,, -Dtextshell -- 			\system\tocsp\scripts\xcert-oom.txt     \tocsp_logoom.log,           900, UDEB#UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	\epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
-
 # TMS SUPPORT
-tocsp, \logs\testexecute\tocsp_openssl.htm,,         \system\tocsp\scripts\openssl.script \logs\testexecute\tocsp_openssl.htm,          300, UDEB, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	\epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
-tocsp, \logs\testexecute\tocsp_logxcert_local.htm,,  \system\tocsp\scripts\xcert-local.script \logs\testexecute\tocsp_logxcert_local.htm,   300, UDEB, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	\epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
-tocsp, \logs\testexecute\tocsp_logopenssl_local.htm,,\system\tocsp\scripts\openssl-local.script \logs\testexecute\tocsp_logopenssl_local.htm, 300, UDEB, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	\epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
-tocsp, \logs\testexecute\tocsp_logerror.htm,,        \system\tocsp\scripts\error.script \logs\testexecute\tocsp_logerror.htm,         300, UDEB, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	\epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
-tocsp, \logs\testexecute\tocsp_defaultpolicy.htm,,   \system\tocsp\scripts\defaultpolicy.script \logs\testexecute\tocsp_defaultpolicy.htm,    300, UDEB, \epoc32\winscw\c\system\tocsp\scripts\setupocsppolicy.bat ocsppolicy.ini,
-tocsp, \logs\testexecute\tocsp_newpolicy.htm,,       \system\tocsp\scripts\newpolicy.script \logs\testexecute\tocsp_newpolicy.htm,        300, UDEB, \epoc32\winscw\c\system\tocsp\scripts\setupocsppolicy.bat newpolicy.ini, 	\epoc32\winscw\c\system\tocsp\scripts\setupocsppolicy.bat ocsppolicy.ini
+tocsp, \logs\testexecute\tocsp_openssl.htm,,         \system\tocsp\scripts\openssl.script       \logs\testexecute\tocsp_openssl.htm,          300, UDEB, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	\epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
+tocsp, \logs\testexecute\tocsp_logxcert_local.htm,,  \system\tocsp\scripts\xcert-local.script   \logs\testexecute\tocsp_logxcert_local.htm,   300, UDEB, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	\epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
+tocsp, \logs\testexecute\tocsp_logopenssl_local.htm,, \system\tocsp\scripts\openssl-local.script \logs\testexecute\tocsp_logopenssl_local.htm, 300, UDEB, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	\epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
+tocsp, \logs\testexecute\tocsp_logerror.htm,,        \system\tocsp\scripts\error.script         \logs\testexecute\tocsp_logerror.htm,         300, UDEB, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	\epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
+tocsp, \logs\testexecute\tocsp_defaultpolicy.htm,,   \system\tocsp\scripts\defaultpolicy.script \logs\testexecute\tocsp_defaultpolicy.htm,    300, UDEB,,
+tocsp, \logs\testexecute\tocsp_newpolicy.htm,,       \system\tocsp\scripts\newpolicy.script     \logs\testexecute\tocsp_newpolicy.htm,        300, UDEB, \epoc32\winscw\c\system\tocsp\scripts\setupocsppolicy.bat 2002b28b-new.txt, 	\epoc32\winscw\c\system\tocsp\scripts\setupocsppolicy.bat 2002b28b.txt
 tocsp, \logs\testexecute\tocsp_httpinterface.htm,,   \system\tocsp\scripts\httpinterface.script \logs\testexecute\tocsp_httpinterface.htm,	 300, UDEB, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	\epoc32\winscw\c\tcertstore\scripts\batchfiles\post_httpinterface_restore.bat
 
-tocsp, \tocsp_openssl.htm,, -Dtextshell --          \system\tocsp\scripts\openssl.script 	    \tocsp_openssl.htm,          300, UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	   \epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
-tocsp, \tocsp_logxcert_local.htm,, -Dtextshell --   \system\tocsp\scripts\xcert-local.script   \tocsp_logxcert_local.htm,   300, UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	   \epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
-tocsp, \tocsp_logopenssl_local.htm,, -Dtextshell -- \system\tocsp\scripts\openssl-local.script \tocsp_logopenssl_local.htm, 300, UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	   \epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
-tocsp, \tocsp_logerror.htm,, -Dtextshell --         \system\tocsp\scripts\error.script         \tocsp_logerror.htm,         300, UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	   \epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
-tocsp, \tocsp_defaultpolicy.htm,, -Dtextshell --    \system\tocsp\scripts\defaultpolicy.script \tocsp_defaultpolicy.htm,    300, UREL, \epoc32\winscw\c\system\tocsp\scripts\setupocsppolicy_urel.bat ocsppolicy.ini,
-tocsp, \tocsp_newpolicy.htm,, -Dtextshell --        \system\tocsp\scripts\newpolicy.script     \tocsp_newpolicy.htm,        300, UREL, \epoc32\winscw\c\system\tocsp\scripts\setupocsppolicy_urel.bat newpolicy.ini,  \epoc32\winscw\c\system\tocsp\scripts\setupocsppolicy_urel.bat ocsppolicy.ini
-tocsp, \tocsp_httpinterface.htm,, -Dtextshell --    \system\tocsp\scripts\httpinterface.script \tocsp_httpinterface.htm,    300, UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	   \epoc32\winscw\c\tcertstore\scripts\batchfiles\post_httpinterface_restore.bat
-tocsp, \tocsp_logoom.htm,, -Dtextshell -- 			\system\tocsp\scripts\xcert-oom.script     \tocsp_logoom.htm,           900, UDEB#UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	\epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
+tocsp, \logs\testexecute\tocsp_openssl.htm,, -Dtextshell --          \system\tocsp\scripts\openssl.script 	    \logs\testexecute\tocsp_openssl.htm,          300, UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	   \epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
+tocsp, \logs\testexecute\tocsp_logxcert_local.htm,, -Dtextshell --   \system\tocsp\scripts\xcert-local.script   \logs\testexecute\tocsp_logxcert_local.htm,   300, UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	   \epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
+tocsp, \logs\testexecute\tocsp_logopenssl_local.htm,, -Dtextshell -- \system\tocsp\scripts\openssl-local.script \logs\testexecute\tocsp_logopenssl_local.htm, 300, UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	   \epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
+tocsp, \logs\testexecute\tocsp_logerror.htm,, -Dtextshell --         \system\tocsp\scripts\error.script         \logs\testexecute\tocsp_logerror.htm,         300, UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	   \epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
+tocsp, \logs\testexecute\tocsp_defaultpolicy.htm,, -Dtextshell --    \system\tocsp\scripts\defaultpolicy.script \logs\testexecute\tocsp_defaultpolicy.htm,    300, UREL, \epoc32\winscw\c\system\tocsp\scripts\setupocsppolicy_urel.bat donothing,
+tocsp, \logs\testexecute\tocsp_newpolicy.htm,, -Dtextshell --        \system\tocsp\scripts\newpolicy.script     \logs\testexecute\tocsp_newpolicy.htm,        300, UREL, \epoc32\winscw\c\system\tocsp\scripts\setupocsppolicy_urel.bat 2002b28b-new.txt,  \epoc32\winscw\c\system\tocsp\scripts\setupocsppolicy_urel.bat 2002b28b.txt
+tocsp, \logs\testexecute\tocsp_httpinterface.htm,, -Dtextshell --    \system\tocsp\scripts\httpinterface.script \logs\testexecute\tocsp_httpinterface.htm,    300, UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	   \epoc32\winscw\c\tcertstore\scripts\batchfiles\post_httpinterface_restore.bat
+tocsp, \logs\testexecute\tocsp_logoom.htm,, -Dtextshell -- 			\system\tocsp\scripts\xcert-oom.script     \logs\testexecute\tocsp_logoom.htm,           900, UDEB#UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	\epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
 
 
-t_certstore, \tcertstore_conf1.1.txt,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore1-conf1.txt \tcertstore_conf1.1.txt, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certstore, \tcertstore_conf1.2.txt,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore2-conf1.txt \tcertstore_conf1.2.txt, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certstore, \tcertstore_conf1.3.txt,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore3-conf1.txt \tcertstore_conf1.3.txt, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certstore, \t_handle_1.txt,, -Dtextshell -- \tcertstore\scripts\t_handle_1.txt \t_handle_1.txt, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-
 # TMS SUPPORT
 t_certstore, \logs\testexecute\tcertstore_conf1.1.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore1-conf1.script \logs\testexecute\tcertstore_conf1.1.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
 t_certstore, \logs\testexecute\tcertstore_conf1.2.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore2-conf1.script \logs\testexecute\tcertstore_conf1.2.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
 t_certstore, \logs\testexecute\tcertstore_conf1.3.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore3-conf1.script \logs\testexecute\tcertstore_conf1.3.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
 t_certstore, \logs\testexecute\t_handle_1.htm,, -Dtextshell -- \tcertstore\scripts\t_handle_1.script \logs\testexecute\t_handle_1.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
 
-
-t_certstore, \tcertstore_oom.conf1.1.log,, -Dtextshell -- \tcertstore\scripts\oom1.txt \tcertstore_oom.conf1.1.log, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certstore, \tcertstore_oom.conf1.2.log,, -Dtextshell -- \tcertstore\scripts\oom2.txt \tcertstore_oom.conf1.2.log, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certstore, \tcertstore_oom.conf1.3.log,, -Dtextshell -- \tcertstore\scripts\oom3.txt \tcertstore_oom.conf1.3.log, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certstore, \tcertstore_cancel.conf1.1.log,, -Dtextshell -- \tcertstore\scripts\cancel1.txt \tcertstore_cancel.conf1.1.log, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certstore, \tcertstore_dsa.conf1.log,, -Dtextshell -- \tcertstore\scripts\dsa.txt \tcertstore_dsa.conf1.log, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certstore, \tcertstore_reload.log,, -Dtextshell -- \tcertstore\scripts\reload.txt \tcertstore_reload.log, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certstore, \tcertstore_apipolicing.log,, -Dtextshell -- \tcertstore\scripts\apipolicing.txt \tcertstore_apipolicing.log, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certstore, \tcertstore_errors.log,, -Dtextshell -- \tcertstore\scripts\filecertstore_errors.txt \tcertstore_errors.log, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
+//TEF Format
+t_certstore, \logs\testexecute\t_certstore_sha2.htm,, -Dtextshell -- \tcertstore\scripts\t_certstore_sha2.script \logs\testexecute\t_certstore_sha2.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
 
 # TMS SUPPORT
 t_certstore, \logs\testexecute\tcertstore_oom.conf1.1.htm,, -Dtextshell -- \tcertstore\scripts\oom1.script \logs\testexecute\tcertstore_oom.conf1.1.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
@@ -331,63 +256,39 @@
 
 
 # Configuration 2
-
-t_certstore, \tcertstore_conf2.1.txt,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore1-conf2.txt \tcertstore_conf2.1.txt, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\Configuration2.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\enableplugin.bat 
-t_certstore, \tcertstore_conf2.2.txt,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore2-conf2.txt \tcertstore_conf2.2.txt, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\cert_backup1.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certstore, \tcertstore_conf2.3.txt,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore3-conf2.txt \tcertstore_conf2.3.txt, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\cert_backup1.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-
 # Configuration 2 - TMS SUPPORT
-t_certstore, \logs\testexecute\tcertstore_conf2.1.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore1-conf2.script \logs\testexecute\tcertstore_conf2.1.htm, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\Configuration2.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\enableplugin.bat 
+t_certstore, \logs\testexecute\tcertstore_conf2.1.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore1-conf2.script \logs\testexecute\tcertstore_conf2.1.htm, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\Configuration2.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\enableplugin.bat 
 t_certstore, \logs\testexecute\tcertstore_conf2.2.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore2-conf2.script \logs\testexecute\tcertstore_conf2.2.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\cert_backup1.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
 t_certstore, \logs\testexecute\tcertstore_conf2.3.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore3-conf2.script \logs\testexecute\tcertstore_conf2.3.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\cert_backup1.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
 
 
 # Configuration 2a (asynch store)
-
-t_certstore, \tcertstore_conf2a.1.txt,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore1-conf2.txt  \tcertstore_conf2a.1.txt, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\Configuration2a.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\enableplugin.bat 
-t_certstore, \tcertstore_conf2a.2.txt,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore2-conf2a.txt \tcertstore_conf2a.2.txt, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\cert_backup1.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certstore, \tcertstore_conf2a.3.txt,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore3-conf2.txt  \tcertstore_conf2a.3.txt, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\cert_backup1.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-
 # Configuration 2a TMS SUPPORT
-t_certstore, \logs\testexecute\tcertstore_conf2a.1.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore1-conf2.script  \logs\testexecute\tcertstore_conf2a.1.htm, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\Configuration2a.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\enableplugin.bat 
+t_certstore, \logs\testexecute\tcertstore_conf2a.1.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore1-conf2.script  \logs\testexecute\tcertstore_conf2a.1.htm, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\Configuration2a.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\enableplugin.bat 
 t_certstore, \logs\testexecute\tcertstore_conf2a.2.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore2-conf2a.script \logs\testexecute\tcertstore_conf2a.2.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\cert_backup1.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
 t_certstore, \logs\testexecute\tcertstore_conf2a.3.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore3-conf2.script  \logs\testexecute\tcertstore_conf2a.3.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\cert_backup1.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
 
 
 # Configuration 3
-
-t_certstore, \tcertstore_conf3.1.txt,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore1-conf3.txt \tcertstore_conf3.1.txt, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\Configuration3.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\enableplugin.bat
-t_certstore, \tcertstore_conf3.2.txt,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore2-conf3.txt \tcertstore_conf3.2.txt, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\cert_backup2.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certstore, \tcertstore_conf3.3.txt,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore3-conf3.txt \tcertstore_conf3.3.txt, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\cert_backup2.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-
 # Configuration 3 TMS SUPPORT
-t_certstore, \logs\testexecute\tcertstore_conf3.1.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore1-conf3.script \logs\testexecute\tcertstore_conf3.1.htm, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\Configuration3.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\enableplugin.bat
+t_certstore, \logs\testexecute\tcertstore_conf3.1.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore1-conf3.script \logs\testexecute\tcertstore_conf3.1.htm, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\Configuration3.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\enableplugin.bat
 t_certstore, \logs\testexecute\tcertstore_conf3.2.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore2-conf3.script \logs\testexecute\tcertstore_conf3.2.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\cert_backup2.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
 t_certstore, \logs\testexecute\tcertstore_conf3.3.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore3-conf3.script \logs\testexecute\tcertstore_conf3.3.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\cert_backup2.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
 
 
 # Configuration multicertstore
 
-t_certstore, \tcertstore_multi.txt,, -Dtextshell -- \tcertstore\scripts\multiplecertstoresfilter.txt \tcertstore_multi.txt, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\Configurationmulti.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\enableplugin.bat
+t_certstore, \logs\testexecute\tcertstore_multi.htm,, -Dtextshell -- \tcertstore\scripts\multiplecertstoresfilter.script \logs\testexecute\tcertstore_multi.htm, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\Configurationmulti.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\enableplugin.bat
 
 # Configuration multicertstore 1
 
-t_certstore, \tcertstore_multi.1.txt,, -Dtextshell -- \tcertstore\scripts\multiplecertstoresfilter1.txt \tcertstore_multi.1.txt, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\Configurationmulti1.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\enableplugin.bat
+t_certstore, \logs\testexecute\tcertstore_multi.1.htm,, -Dtextshell -- \tcertstore\scripts\multiplecertstoresfilter1.script \logs\testexecute\tcertstore_multi.1.htm, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\Configurationmulti1.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\enableplugin.bat
 
 # Configuration multicertstore 2
 
-t_certstore, \tcertstore_multi.2.txt,, -Dtextshell -- \tcertstore\scripts\multiplecertstoresfilter2.txt \tcertstore_multi.2.txt, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\Configurationmulti2.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\enableplugin.bat
+t_certstore, \logs\testexecute\tcertstore_multi.2.htm,, -Dtextshell -- \tcertstore\scripts\multiplecertstoresfilter2.script \logs\testexecute\tcertstore_multi.2.htm, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\Configurationmulti2.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\enableplugin.bat
 
 # Configuration 4
-
-t_certstore, \swicertstore1.txt,, -Dtextshell --          \tcertstore\scripts\swicertstore1.txt \swicertstore1.txt,       300, UDEB#UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_backup.bat, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_restore.bat
-t_certstore, \swicertstore2.txt,, -Dtextshell --          \tcertstore\scripts\swicertstore2.txt \swicertstore2.txt,       300, UDEB#UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_backup.bat, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_restore.bat 
-t_certstore, \swicertstore4.txt,, -Dtextshell --          \tcertstore\scripts\swicertstore4.txt \swicertstore4.txt,       300, UDEB#UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_backup.bat, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_restore.bat 
-t_certstore, \swicertstore_oom.txt,, -Dtextshell --    -o \tcertstore\scripts\swicertstore1.txt \swicertstore_oom.txt,    300, UDEB#UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_backup.bat, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_restore.bat 
-t_certstore, \swicertstore_cancel.txt,, -Dtextshell -- -c \tcertstore\scripts\swicertstore1.txt \swicertstore_cancel.txt, 300, UDEB#UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_backup.bat, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_restore.bat
-t_certstore, \wri-swicertstore1.txt,, -Dtextshell --      \tcertstore\scripts\wri-swicertstore1.txt \wri-swicertstore1.txt,300, UDEB#UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_backup.bat, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_restore.bat
-t_certstore, \wri-swicertstore2.txt,, -Dtextshell --      \tcertstore\scripts\wri-swicertstore2.txt \wri-swicertstore2.txt,300, UDEB#UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_backup.bat, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_restore.bat
-
 # Configuration 4 TMS SUPPORT
 t_certstore, \logs\testexecute\swicertstore1.htm,, -Dtextshell --          \tcertstore\scripts\swicertstore1.script \logs\testexecute\swicertstore1.htm,       300, UDEB#UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_backup.bat, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_restore.bat
 t_certstore, \logs\testexecute\swicertstore2.htm,, -Dtextshell --          \tcertstore\scripts\swicertstore2.script \logs\testexecute\swicertstore2.htm,       300, UDEB#UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_backup.bat, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_restore.bat 
@@ -399,52 +300,11 @@
 
 
 # Configuration 5
-t_certstore, \wri-swicertstore3.txt,, -Dtextshell --      \tcertstore\scripts\wri-swicertstore3.txt \wri-swicertstore3.txt,300, UDEB#UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_backup1.bat, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_restore.bat
-
 # Configuration 5 TMS SUPPORT
 t_certstore, \logs\testexecute\wri-swicertstore3.htm,, -Dtextshell --      \tcertstore\scripts\wri-swicertstore3.script \logs\testexecute\wri-swicertstore3.htm,300, UDEB#UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_backup1.bat, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_restore.bat
 
 
 ######### Composite Certstore Testing###################################################################################
-t_certstore, \tfilecertstore01.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore01.txt \tfilecertstore01.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore 5 void, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tfilecertstore02.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore02.txt \tfilecertstore02.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore corrupt 6 5, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tfilecertstore03.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore03.txt \tfilecertstore03.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore corrupt 4 5 3, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tfilecertstore04.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore04.txt \tfilecertstore04.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore corrupt 6 5 3, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tfilecertstore05.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore05.txt \tfilecertstore05.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore corrupt 4 5, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tfilecertstore06.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore06.txt \tfilecertstore06.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore corrupt 1, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tfilecertstore07.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore07.txt \tfilecertstore07.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore corrupt 4 3 2, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tfilecertstore08.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore08.txt \tfilecertstore08.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore corrupt middle 3 2, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tfilecertstore09.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore09.txt \tfilecertstore09.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore corrupt 1 3 2, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tfilecertstore10.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore10.txt \tfilecertstore10.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore 5 3 2, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tfilecertstore11.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore11.txt \tfilecertstore11.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore renamed 1 3 2, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tfilecertstore12.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore12.txt \tfilecertstore12.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore 3 2, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tfilecertstore13.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore13.txt \tfilecertstore13.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore corrupt 3 2 1, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tfilecertstore14.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore14.txt \tfilecertstore14.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore corrupt middle 2 1, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tfilecertstore15.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore15.txt \tfilecertstore15.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore corrupt 0 2 1, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tfilecertstore16.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore16.txt \tfilecertstore16.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore 2 1, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tfilecertstore17.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore17.txt \tfilecertstore17.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore void, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tfilecertstore18.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore18.txt \tfilecertstore18.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore 5 3 2 1 0, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-
-t_certstore, \tswicertstore01.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore01.txt \tswicertstore01.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore 5 void, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tswicertstore02.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore02.txt \tswicertstore02.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore corrupt 6 5, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tswicertstore03.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore03.txt \tswicertstore03.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore corrupt 4 5 3, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tswicertstore04.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore04.txt \tswicertstore04.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore corrupt 6 5 3, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tswicertstore05.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore05.txt \tswicertstore05.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore corrupt 4 5, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tswicertstore06.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore06.txt \tswicertstore06.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore corrupt 1, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tswicertstore07.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore07.txt \tswicertstore07.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore corrupt 4 3 2, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tswicertstore08.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore08.txt \tswicertstore08.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore corrupt middle 3 2, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tswicertstore09.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore09.txt \tswicertstore09.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore corrupt 1 3 2, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tswicertstore10.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore10.txt \tswicertstore10.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore 5 3 2, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tswicertstore11.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore11.txt \tswicertstore11.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore renamed 1 3 2, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tswicertstore12.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore12.txt \tswicertstore12.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore 3 2, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tswicertstore13.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore13.txt \tswicertstore13.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore corrupt 3 2 1, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tswicertstore14.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore14.txt \tswicertstore14.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore corrupt middle 2 1, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tswicertstore15.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore15.txt \tswicertstore15.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore corrupt 0 2 1, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tswicertstore16.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore16.txt \tswicertstore16.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore 2 1, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tswicertstore17.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore17.txt \tswicertstore17.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore void, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tswicertstore18.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore18.txt \tswicertstore18.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore 5 3 2 1 0, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \tswicertstore19.log,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore19.txt \tswicertstore19.log, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore writable void, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-
 # Composite Certstore Testing - TMS SUPPORT
 
 t_certstore, \logs\testexecute\tfilecertstore01.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore01.script \logs\testexecute\tfilecertstore01.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore 5 void, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
@@ -490,11 +350,10 @@
 ######### Composite Certstore Testing###################################################################################
 
 
-
 [SWI]
 # Requires the following additional components to be built: SisTools, Certman
 
-TESTEXECUTE, \logs\testexecute\dummytefscript.htm,, \dummytefscript.script, 2500, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\copyswitestfiles.bat,
+TESTEXECUTE, \logs\testexecute\dummytefscript.htm,, \dummytefscript.script, 2500, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\copyswitestfiles.bat,
 
 #NQP Tests for DataProvider
 TESTEXECUTE, \logs\testexecute\tdataprovider.htm,, -Dstartupmode=1 -- z:\tswi\tdataprovider\scripts\tdataprovider.script, 600, UDEB#UREL,,
@@ -524,60 +383,57 @@
 
 TESTEXECUTE, \logs\testexecute\testaugmentations.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testaugmentations.script, 300, UDEB#UREL,,
 TESTEXECUTE, \logs\testexecute\testpreinstalled.htm,, \tswi\tuiscriptadaptors\scripts\testpreinstalled.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testpreinstalled_delete.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testpreinstalled_delete.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_deletepreinstalledfiles.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
+TESTEXECUTE, \logs\testexecute\testpreinstalled_delete.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testpreinstalled_delete.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_deletepreinstalledfiles.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
 TESTEXECUTE, \logs\testexecute\testdependencies.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testdependencies.script, 300, UDEB#UREL,,
 
 TESTEXECUTE, \logs\testexecute\tuiscriptadaptors.htm,, \tswi\tuiscriptadaptors\scripts\tuiscriptadaptors.script, 10000, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\tuiscriptadaptors_pre.bat, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\tuiscriptadaptors_post.bat
 TESTEXECUTE, \logs\testexecute\tuiscriptadaptors_winscw.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\tuiscriptadaptors_winscw.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\copytuiscriptadaptors.bat,
 TESTEXECUTE, \logs\testexecute\testvids.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testvids.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tuiscriptadaptorsFH.htm,, \tswi\tuiscriptadaptors\scripts\tuiscriptadaptorsFH.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\useautocfg.bat,
+TESTEXECUTE, \logs\testexecute\tuiscriptadaptorsFH.htm,, \tswi\tuiscriptadaptors\scripts\tuiscriptadaptorsFH.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\useautocfg.bat,
 
 TESTEXECUTE, \logs\testexecute\testrucert.htm,, \tswi\tuiscriptadaptors\scripts\testrucert.script, 500, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\romupdate_withoutstubs_pre.bat, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\romupdate_withoutstubs_post.bat
 
-TESTEXECUTE, \logs\testexecute\testrun.htm,, \tswi\tuiscriptadaptors\scripts\testrun.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_shortrunwait.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\testrunft.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testrunft.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_shortrunwait.ini,
+TESTEXECUTE, \logs\testexecute\testrun.htm,, \tswi\tuiscriptadaptors\scripts\testrun.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_shortrunwait.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
+TESTEXECUTE, \logs\testexecute\testrunft.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testrunft.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_shortrunwait.ini,
 
-TESTEXECUTE, \logs\testexecute\testrun2.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testrun2.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_notallowrun.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
+TESTEXECUTE, \logs\testexecute\testrun2.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testrun2.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_notallowrun.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
 TESTEXECUTE, \logs\testexecute\testshutdown.htm,, \tswi\tuiscriptadaptors\scripts\testshutdown.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testasync.htm,, \tswi\tuiscriptadaptors\scripts\testasync.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\useautocfg.bat,
+TESTEXECUTE, \logs\testexecute\testasync.htm,, \tswi\tuiscriptadaptors\scripts\testasync.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\useautocfg.bat,
 TESTEXECUTE, \logs\testexecute\testasynccancel.htm,, \tswi\tuiscriptadaptors\scripts\testasynccancel.script, 3000, UDEB#UREL,,
 
 TESTEXECUTE, \logs\testexecute\tsisstub.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\tsisstub.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tsisstub_delete.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\tsisstub_delete.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_deletepreinstalledfiles.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
+TESTEXECUTE, \logs\testexecute\tsisstub_delete.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\tsisstub_delete.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_deletepreinstalledfiles.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
 TESTEXECUTE, \logs\testexecute\testasynccaps.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testasynccaps.script, 300, UDEB#UREL,,
 
-TESTEXECUTE, \logs\testexecute\devcerts_match.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_match.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\useautosimtsycfg.bat, %SECURITYSOURCEDIR%\testframework\test\autotesting\useautocfg.bat
+TESTEXECUTE, \logs\testexecute\devcerts_match.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_match.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\useautosimtsycfg.bat, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\useautocfg.bat
 TESTEXECUTE, \logs\testexecute\devcerts_mismatch.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_mismatch.script, 300, UDEB#UREL,,
 TESTEXECUTE, \logs\testexecute\devcerts_aggregate.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_aggregate.script, 300, UDEB#UREL,,
 TESTEXECUTE, \logs\testexecute\devcerts_corrupt.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_corrupt.script, 300, UDEB#UREL,,
 TESTEXECUTE, \logs\testexecute\devcerts_ocsp.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_ocsp.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\devcerts_backuprestore.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_backuprestore.script, 300, UDEB#UREL,%SECURITYSOURCEDIR%\testframework\test\autotesting\useautosimtsycfg.bat, %SECURITYSOURCEDIR%\testframework\test\autotesting\useautocfg.bat
-TESTEXECUTE, \logs\testexecute\devcerts_backup.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_backup.script, 300, UDEB#UREL,%SECURITYSOURCEDIR%\testframework\test\autotesting\useautosimtsycfg.bat, %SECURITYSOURCEDIR%\testframework\test\autotesting\useautocfg.bat
-TESTEXECUTE, \logs\testexecute\devcerts_restore.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_restore.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\changedevid.bat, \epoc32\winscw\c\tswi\tdevcerts\scripts\batchfiles\devcerts_restore_post.bat
+TESTEXECUTE, \logs\testexecute\devcerts_backuprestore.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_backuprestore.script, 300, UDEB#UREL,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\useautosimtsycfg.bat, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\useautocfg.bat
+TESTEXECUTE, \logs\testexecute\devcerts_backup.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_backup.script, 300, UDEB#UREL,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\useautosimtsycfg.bat, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\useautocfg.bat
+TESTEXECUTE, \logs\testexecute\devcerts_restore.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_restore.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\changedevid.bat, \epoc32\winscw\c\tswi\tdevcerts\scripts\batchfiles\devcerts_restore_post.bat
 
-TESTEXECUTE, \logs\testexecute\tsisregistrytest.htm,, -Dstartupmode=1 -- \tswi\tsisregistrytest\scripts\tsisregistrytest.script, 1500, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\useautocfg.bat, \epoc32\winscw\c\tswi\tsisregistrytest\Scripts\batchfiles\tsisregistrytest_post.bat
+TESTEXECUTE, \logs\testexecute\tsisregistrytest.htm,, -Dstartupmode=1 -- \tswi\tsisregistrytest\scripts\tsisregistrytest.script, 1500, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\useautocfg.bat, \epoc32\winscw\c\tswi\tsisregistrytest\Scripts\batchfiles\tsisregistrytest_post.bat
 TESTEXECUTE, \logs\testexecute\testVFPOnEmulator.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testVFPOnEmulator.script, 300, UDEB#UREL,,
 TESTEXECUTE, \logs\testexecute\tdaemon.htm,, -Dstartupmode=1 -- \tswi\tdaemon\scripts\tdaemon.script, 300, UDEB#UREL,,  
 
 # createandsignunicode.pl needs to be run as it builds some SIS files the following tests rely on, however it is a SisTools test so it is run through a batch file and the results not recorded here
-TESTEXECUTE, \logs\testexecute\dummytefscript.htm,, \dummytefscript.script, 2500, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\callcreateandsignunicode.bat,
+TESTEXECUTE, \logs\testexecute\dummytefscript.htm,, \dummytefscript.script, 2500, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\callcreateandsignunicode.bat,
 TESTEXECUTE, \logs\testexecute\tbackuprestore.htm,, -Dstartupmode=1 -- \tswi\tbackuprestore\scripts\tbackuprestore.script, 1500, UDEB#UREL,\epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_pre.bat, \epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_post.bat
-TESTEXECUTE, \logs\testexecute\tbackuprestore_second_part.htm,, -Dstartupmode=1 -- \tswi\tbackuprestore\scripts\tbackuprestore_second_part.script, 300, UDEB, \epoc32\winscw\c\tswi\tbackuprestore\scripts\tbackuprestore_second_part_pre.bat, \epoc32\winscw\c\tswi\tbackuprestore\scripts\tbackuprestore_second_part_post.bat
 TESTEXECUTE, \logs\testexecute\tbackuprestoredrive_emulator.htm,, -Dstartupmode=1 -- \tswi\tbackuprestore\scripts\tbackuprestoredrive_emulator.script, 300, UDEB#UREL,,
 TESTEXECUTE, \logs\testexecute\tbackuprestore_emulator.htm,, -Dstartupmode=1 -- \tswi\tbackuprestore\scripts\tbackuprestore_emulator.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_pre.bat, \epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_post.bat
 TESTEXECUTE, \logs\testexecute\tbackuprestore_policy_prepost_emulator.htm,, -Dstartupmode=1 -- \tswi\tbackuprestore\scripts\tbackuprestore_policy_prepost_emulator.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_policy_pre.bat, \epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_policy_post.bat
 TESTEXECUTE, \logs\testexecute\tbackuprestore_policylst_certfst_emulator.htm,, -Dstartupmode=1 -- \tswi\tbackuprestore\scripts\tbackuprestore_policylst_certfst_emulator.script, 300, UDEB#UREL, ,
 TESTEXECUTE, \logs\testexecute\tbackuprestore_cert_prepost_emulator.htm,, -Dstartupmode=1 -- \tswi\tbackuprestore\scripts\tbackuprestore_cert_prepost_emulator.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_cert_pre.bat, \epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_cert_post.bat
 TESTEXECUTE, \logs\testexecute\tbackuptrestore_exploratory.htm,, -Dstartupmode=1 -- \tswi\tbackuprestore\scripts\tbackuptrestore_exploratory.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tbackuprestore_no_overwrite.htm,, -Dstartupmode=1 -- \tswi\tbackuprestore\scripts\tbackuprestore_no_overwrite.script, 1500, UDEB#UREL,\epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_no_overwrite_pre.bat, \epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_no_overwrite_post.bat
-
 TESTEXECUTE, \logs\testexecute\tgenbackupmeta_udeb.htm,, -Dstartupmode=1 -- \tswi\tgenbackupmeta\scripts\tgenbackupmeta_udeb.script, 300, UDEB,\epoc32\winscw\c\tswi\tgenbackupmeta\scripts\premeta.bat,
 TESTEXECUTE, \logs\testexecute\tgenbackupmeta_urel.htm,, -Dstartupmode=1 -- \tswi\tgenbackupmeta\scripts\tgenbackupmeta_urel.script, 300, UREL,\epoc32\winscw\c\tswi\tgenbackupmeta\scripts\premeta.bat,
 
-TESTEXECUTE, \logs\testexecute\tgenbackupmeta_mandatory_udeb.htm,, -Dstartupmode=1 -- \tswi\tgenbackupmeta\scripts\tgenbackupmeta_mandatory_udeb.script, 300,UDEB,%SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiCertstore.bat swicertstore_mandatory.dat,\epoc32\winscw\c\tswi\tgenbackupmeta\scripts\postmeta.bat
-TESTEXECUTE, \logs\testexecute\tgenbackupmeta_mandatory_urel.htm,, -Dstartupmode=1 -- \tswi\tgenbackupmeta\scripts\tgenbackupmeta_mandatory_urel.script, 300,UREL,%SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiCertstore.bat swicertstore_mandatory.dat,\epoc32\winscw\c\tswi\tgenbackupmeta\scripts\postmeta.bat
+TESTEXECUTE, \logs\testexecute\tgenbackupmeta_mandatory_udeb.htm,, -Dstartupmode=1 -- \tswi\tgenbackupmeta\scripts\tgenbackupmeta_mandatory_udeb.script, 300,UDEB,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiCertstore.bat swicertstore_mandatory.dat,\epoc32\winscw\c\tswi\tgenbackupmeta\scripts\postmeta.bat
+TESTEXECUTE, \logs\testexecute\tgenbackupmeta_mandatory_urel.htm,, -Dstartupmode=1 -- \tswi\tgenbackupmeta\scripts\tgenbackupmeta_mandatory_urel.script, 300,UREL,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiCertstore.bat swicertstore_mandatory.dat,\epoc32\winscw\c\tswi\tgenbackupmeta\scripts\postmeta.bat
 TESTEXECUTE, \logs\testexecute\trevocation.htm,, -Dstartupmode=1 -- \tswi\trevocation\scripts\trevocation.script, 600, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\trevocation_unsigned.htm,, -Dstartupmode=1 -- \tswi\trevocation\scripts\trevocation_unsigned.script, 600, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_allowunsigned.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
+TESTEXECUTE, \logs\testexecute\trevocation_unsigned.htm,, -Dstartupmode=1 -- \tswi\trevocation\scripts\trevocation_unsigned.script, 600, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_allowunsigned.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
 TESTEXECUTE, \logs\testexecute\tautosigning.htm,, -Dstartupmode=1 -- \tswi\tautosigning\scripts\tautosigning.script, 300, UDEB#UREL,,
 TESTEXECUTE, \logs\testexecute\testdrm.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testdrm.script, 300, UDEB#UREL,,
 TESTEXECUTE, \logs\testexecute\testdrmasync.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testdrmasync.script, 300, UDEB#UREL,,
@@ -585,27 +441,27 @@
 TESTEXECUTE, \logs\testexecute\testdiskfullemulator.htm,, \tswi\tuiscriptadaptors\scripts\testdiskfullemulator.script, 300, UDEB#UREL,,
 
 TESTEXECUTE, \logs\testexecute\testcancel.htm,, \tswi\tuiscriptadaptors\scripts\testcancel.script, 1500, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testmandatory.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testmandatory.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiCertstore.bat swicertstore_mandatory.dat, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiCertstore.bat swicertstore.dat
-TESTEXECUTE, \logs\testexecute\testnotargetdevices.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testnotargetdevices.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_incompifnotargetdevices.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\testsystemcaps.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testsystemcaps.script, 300, UDEB, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiCertstore.bat swicertstore.dat,
+TESTEXECUTE, \logs\testexecute\testmandatory.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testmandatory.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiCertstore.bat swicertstore_mandatory.dat, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiCertstore.bat swicertstore.dat
+TESTEXECUTE, \logs\testexecute\testnotargetdevices.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testnotargetdevices.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_incompifnotargetdevices.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
+TESTEXECUTE, \logs\testexecute\testsystemcaps.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testsystemcaps.script, 300, UDEB, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiCertstore.bat swicertstore.dat,
 TESTEXECUTE, \logs\testexecute\testsystemcaps.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testsystemcaps.script, 300, UREL,,
-TESTEXECUTE, \logs\testexecute\testusercaps.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testusercaps.script, 300, UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini,
+TESTEXECUTE, \logs\testexecute\testusercaps.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testusercaps.script, 300, UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini,
 TESTEXECUTE, \logs\testexecute\testusercaps.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testusercaps.script, 300, UDEB,,
 
-TESTEXECUTE, \logs\testexecute\testusercaps_nousergrantcaps.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testusercaps_nousergrantcaps.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_nousergrantcaps.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\testusercaps_restrictedusercaps.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testusercaps_restrictedusercaps.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_restrictedusercaps.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\testnoorphanedoverwrite.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testnoorphanedoverwrite.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_noorphanedoverwrite.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\overwriteprivate.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\overwriteprivate.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_noprotectedorphanoverwrite.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini 
+TESTEXECUTE, \logs\testexecute\testusercaps_nousergrantcaps.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testusercaps_nousergrantcaps.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_nousergrantcaps.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
+TESTEXECUTE, \logs\testexecute\testusercaps_restrictedusercaps.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testusercaps_restrictedusercaps.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_restrictedusercaps.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
+TESTEXECUTE, \logs\testexecute\testnoorphanedoverwrite.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testnoorphanedoverwrite.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_noorphanedoverwrite.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
+TESTEXECUTE, \logs\testexecute\overwriteprivate.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\overwriteprivate.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_noprotectedorphanoverwrite.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini 
 TESTEXECUTE, \logs\testexecute\overwriteprivate_positive.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\overwriteprivate_positive.script, 300, UDEB, \epoc32\release\winscw\UDEB\Z\tswi\tuiscriptadaptors\scripts\overwriteprivate_positive.bat swipolicy.ini 
-TESTEXECUTE, \logs\testexecute\overwriteprivate_positive.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\overwriteprivate_positive.script, 300, UREL,%SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini 
-TESTEXECUTE, \logs\testexecute\testallowunsigned.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testallowunsigned.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_allowunsigned.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\tpathsubst.htm,, -Dstartupmode=1 -- \tswi\tpathsubst\scripts\tpathsubst.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_pathsubst.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\tpathsubstsysdrive.htm,, -Dstartupmode=1 -- \tswi\tpathsubst\scripts\tpathsubstsysdrive.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_verifysysdrive.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
+TESTEXECUTE, \logs\testexecute\overwriteprivate_positive.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\overwriteprivate_positive.script, 300, UREL,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini 
+TESTEXECUTE, \logs\testexecute\testallowunsigned.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testallowunsigned.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_allowunsigned.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
+TESTEXECUTE, \logs\testexecute\tpathsubst.htm,, -Dstartupmode=1 -- \tswi\tpathsubst\scripts\tpathsubst.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_pathsubst.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
+TESTEXECUTE, \logs\testexecute\tpathsubstsysdrive.htm,, -Dstartupmode=1 -- \tswi\tpathsubst\scripts\tpathsubstsysdrive.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_verifysysdrive.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
 
 TESTEXECUTE, \logs\testexecute\tpropagation_winscw.htm,, -Dtextshell -- \tswi\tuiscriptadaptors\scripts\tpropagation_winscw.script, 600, UDEB#UREL,,
 
 
-TESTEXECUTE, \logs\testexecute\testeclipseemulator.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testeclipseemulator.script, 300, UDEB#UREL,%SECURITYSOURCEDIR%\testframework\test\autotesting\pre_testeclipseemulator.bat,%SECURITYSOURCEDIR%\testframework\test\autotesting\delstubtemp.bat
+TESTEXECUTE, \logs\testexecute\testeclipseemulator.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testeclipseemulator.script, 300, UDEB#UREL,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\pre_testeclipseemulator.bat,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\delstubtemp.bat
 
 TESTEXECUTE, \logs\testexecute\testeclipse.htm,, \tswi\tuiscriptadaptors\scripts\testeclipse.script, 500, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\testeclipse_pre.bat,\epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\testeclipse_post.bat
 
@@ -621,25 +477,25 @@
 
 TESTEXECUTE, \logs\testexecute\cr956_test.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\cr956_test.script, 2000, UDEB#UREL,,
 
-TESTEXECUTE, \logs\testexecute\testuninstallation.htm,, \tswi\tuiscriptadaptors\scripts\testuninstallation.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\testuninstallation_pre.bat, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
+TESTEXECUTE, \logs\testexecute\testuninstallation.htm,, \tswi\tuiscriptadaptors\scripts\testuninstallation.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\testuninstallation_pre.bat, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
 
 TESTEXECUTE, \logs\testexecute\tuninstallpkgs.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\tuninstallpkgs.script, 1000, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testlogging.htm,, -Dstartupmode=1 -- z:\tswi\tsisregistrytest\scripts\testlogging.script, 100, UDEB#UREL,\epoc32\winscw\c\tswi\tsisregistrytest\Scripts\batchfiles\testlogging_pre.bat,%SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.iniwinscw\c\tswi\tsisregistrytest\Scripts\batchfiles\testlogging_pre.bat,%SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
+TESTEXECUTE, \logs\testexecute\testlogging.htm,, -Dstartupmode=1 -- z:\tswi\tsisregistrytest\scripts\testlogging.script, 100, UDEB#UREL,\epoc32\winscw\c\tswi\tsisregistrytest\Scripts\batchfiles\testlogging_pre.bat,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.iniwinscw\c\tswi\tsisregistrytest\Scripts\batchfiles\testlogging_pre.bat,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
 
 TESTEXECUTE, \logs\testexecute\test_pa_sapropagated_notdelete.htm,, \tswi\tuiscriptadaptors\scripts\test_pa_sapropagated_notdelete.script, 100, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testpastub.htm,, \tswi\tuiscriptadaptors\scripts\testpastub.script, 100, UDEB#UREL,%SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_deletepreinstalledfiles.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\testsapropagatedstub.htm,, \tswi\tuiscriptadaptors\scripts\testsapropagatedstub.script, 100, UDEB#UREL,%SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_deletepreinstalledfiles.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
+TESTEXECUTE, \logs\testexecute\testpastub.htm,, \tswi\tuiscriptadaptors\scripts\testpastub.script, 100, UDEB#UREL,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_deletepreinstalledfiles.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
+TESTEXECUTE, \logs\testexecute\testsapropagatedstub.htm,, \tswi\tuiscriptadaptors\scripts\testsapropagatedstub.script, 100, UDEB#UREL,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_deletepreinstalledfiles.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
 
 
 # Extended Key Usage check while installation of signed sis files.
-TESTEXECUTE, \logs\testexecute\testextension.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testextension.script, 300, UDEB#UREL,%SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini,
-TESTEXECUTE, \logs\testexecute\testextension_mandatecodesigning.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testextension_mandatecodesigning.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_mandatecodesigning.ini,
-TESTEXECUTE, \logs\testexecute\testextension_alternatecodesigningoid.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testextension_alternatecodesigningoid.script, 300, UDEB#UREL,%SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_altcodesigningoid.ini,
-TESTEXECUTE, \logs\testexecute\testextension_mandatecodesigning_altcodesigningoid.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testextension_mandatecodesigning_altcodesigningoid.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_mandatecodesigning_altcodesigningoid.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
+TESTEXECUTE, \logs\testexecute\testextension.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testextension.script, 300, UDEB#UREL,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini,
+TESTEXECUTE, \logs\testexecute\testextension_mandatecodesigning.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testextension_mandatecodesigning.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_mandatecodesigning.ini,
+TESTEXECUTE, \logs\testexecute\testextension_alternatecodesigningoid.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testextension_alternatecodesigningoid.script, 300, UDEB#UREL,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_altcodesigningoid.ini,
+TESTEXECUTE, \logs\testexecute\testextension_mandatecodesigning_altcodesigningoid.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testextension_mandatecodesigning_altcodesigningoid.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_mandatecodesigning_altcodesigningoid.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
 
 # SwiConsole Tests
 TESTEXECUTE, \logs\testexecute\tswiconsole.htm,, -Dstartupmode=1 -- \tswi\tswiconsole\scripts\tswiconsole.script, 300, UDEB#UREL,
-TESTEXECUTE, \logs\testexecute\tswiconsole_allowunsigned.htm,, -Dstartupmode=1 -- \tswi\tswiconsole\scripts\tswiconsole_allowunsigned.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_allowunsigned.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
+TESTEXECUTE, \logs\testexecute\tswiconsole_allowunsigned.htm,, -Dstartupmode=1 -- \tswi\tswiconsole\scripts\tswiconsole_allowunsigned.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_allowunsigned.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
 
 TESTEXECUTE, \logs\testexecute\testmulti.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testmulti.script, 300, UDEB#UREL,
 TESTEXECUTE, \logs\testexecute\generateregistrytestdata.htm,, -Dstartupmode=1 -- \tswi\tsisregistrytest\scripts\generateregistrytestdata.script, 300, UDEB#UREL,,
@@ -647,7 +503,7 @@
 TESTEXECUTE, \logs\testexecute\removeregistrytestdata.htm,, -Dstartupmode=1 -- \tswi\tsisregistrytest\scripts\removeregistrytestdata.script, 300, UDEB#UREL,,
 TESTEXECUTE, \logs\testexecute\truststatus.htm,, -Dstartupmode=1 -- \tswi\trevocation\scripts\truststatus.script, 600, UDEB#UREL,, 
 TESTEXECUTE, \logs\testexecute\testtruststatus.htm,, \tswi\tuiscriptadaptors\scripts\testtruststatus.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tresetdevice.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\tresetdevice.script, 600, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_deletepreinstalledfiles.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
+TESTEXECUTE, \logs\testexecute\tresetdevice.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\tresetdevice.script, 600, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_deletepreinstalledfiles.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
 
 # Test Non-Removable Flag
 TESTEXECUTE, \logs\testexecute\testnonremovable.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testnonremovable.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\testnonremovable_pre.bat, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\testnonremovable_post.bat
@@ -667,7 +523,7 @@
 #CR0914 Tests
 TESTEXECUTE, \logs\testexecute\integritychecktest.htm,, -Dstartupmode=1 -- z:\tswi\tsisregistrytest\scripts\integritychecktest.script, 1000, UDEB#UREL,,
 TESTEXECUTE, \logs\testexecute\integritychecktest5Install_winscw.htm,, -Dstartupmode=1 -- z:\tswi\tsisregistrytest\scripts\integritychecktest5Install_winscw.script, 1000, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\integritychecktest5verify_winscw.htm,, -Dstartupmode=1 -- z:\tswi\tsisregistrytest\scripts\integritychecktest5verify_winscw.script, 1000, UDEB#UREL,%SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiCertstore.bat some_swicertstore.dat,%SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiCertstore.bat swicertstore.dat
+TESTEXECUTE, \logs\testexecute\integritychecktest5verify_winscw.htm,, -Dstartupmode=1 -- z:\tswi\tsisregistrytest\scripts\integritychecktest5verify_winscw.script, 1000, UDEB#UREL,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiCertstore.bat some_swicertstore.dat,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiCertstore.bat swicertstore.dat
 
 TESTEXECUTE, \logs\testexecute\testswiobserver.htm,, -Dstartupmode=1 -- z:\tswi\tswiobserver\scripts\testswiobserver.script, 300, UDEB#UREL,,
 swiobservertest.exe, \swiobservertest.log,, , 800, UDEB#UREL,,
@@ -687,8 +543,6 @@
 
 
 [Asnpkcs]
-TASNPKCS, \tasnpkcstests.log,, -Dtextshell -- \tasnpkcstests.txt \tasnpkcstests.log,	 300, UDEB#UREL,,
-
 # TMS SUPPORT
 TASNPKCS, \logs\testexecute\tasnpkcstests.htm,, -Dtextshell -- \tasnpkcstests.script \logs\testexecute\tasnpkcstests.htm,	 300, UDEB#UREL,,
 
@@ -696,27 +550,18 @@
 [Filetokens]
 TESTEXECUTE, \logs\testexecute\sec-filetokens-tools.htm,,  -Dstartupmode=1 -- \ttesttools\scripts\sec-filetokens-tools.script, 600, UDEB#UREL, \epoc32\winscw\c\ttesttools\data\pretools.bat, \epoc32\winscw\c\ttesttools\data\posttools.bat
 
-T_KEYSTORE, \tkeystore.log,,		     -Dstartupmode=1 -- \tkeystore\scripts\tkeystore.txt	\tkeystore.log,				300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\RemoveSecDlg.bat, \epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_post.bat 
-T_KEYSTORE, \tkeystore_authobjects.log,, -Dstartupmode=1 -- \tkeystore\scripts\authobjects.txt	\tkeystore_authobjects.log,		300, UDEB#UREL,,  
-T_KEYSTORE, \tkeystore_export.log,,      -Dstartupmode=1 -- \tkeystore\scripts\exportscript.txt	\tkeystore_export.log,			300, UDEB#UREL,, 
-T_KEYSTORE, \tkeystore_oom.log,,         -Dstartupmode=1 -- \tkeystore\scripts\oom.txt		\tkeystore_oom.log,			300, UDEB#UREL,, 
-T_KEYSTORE, \tkeystore_cancel.log,,      -Dstartupmode=1 -- \tkeystore\scripts\cancel.txt		\tkeystore_cancel.log,			300, UDEB#UREL,, 
-T_KEYSTORE, \tkeystore_servoom.log,,	 -Dstartupmode=1 -- \tkeystore\scripts\servoom.txt		\tkeystore_servoom.log,			1800, UDEB,, 
-T_KEYSTORE, \tkeystore_reload.log,,      -Dstartupmode=1 -- \tkeystore\scripts\reload.txt		\tkeystore_reload.log,			300, UDEB#UREL,, 
+# TMS support
+T_KEYSTORE, \logs\testexecute\tkeystore.htm,,		     -Dstartupmode=1 -- \tkeystore\scripts\tkeystore.script	\logs\testexecute\tkeystore.htm,				300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\RemoveSecDlg.bat, \epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_post.bat 
 
-# TMS support
-T_KEYSTORE, \logs\testexecute\tkeystore.htm,,		     -Dstartupmode=1 -- \tkeystore\scripts\tkeystore.script	\logs\testexecute\tkeystore.htm,				300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\RemoveSecDlg.bat, \epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_post.bat 
+T_KEYSTORE, \logs\testexecute\tkeystore_authobjects.htm,, -Dstartupmode=1 -- \tkeystore\scripts\authobjects.script  \logs\testexecute\tkeystore_authobjects.htm, 300, UDEB#UREL,, \epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_authobject_post.bat 
+
 T_KEYSTORE, \logs\testexecute\tkeystore_export.htm,,      -Dstartupmode=1 -- \tkeystore\scripts\exportscript.script	\logs\testexecute\tkeystore_export.htm,			300, UDEB#UREL,, 
 T_KEYSTORE, \logs\testexecute\tkeystore_oom.htm,,         -Dstartupmode=1 -- \tkeystore\scripts\oom.script \logs\testexecute\tkeystore_oom.htm,			300, UDEB#UREL,, 
 T_KEYSTORE, \logs\testexecute\tkeystore_cancel.htm,,      -Dstartupmode=1 -- \tkeystore\scripts\cancel.script \logs\testexecute\tkeystore_cancel.htm,			300, UDEB#UREL,, 
-T_KEYSTORE, \logs\testexecute\tkeystore_servoom.htm,,	 -Dstartupmode=1 -- \tkeystore\scripts\servoom.script \logs\testexecute\tkeystore_servoom.htm,			1800, UDEB,, 
+T_KEYSTORE, \logs\testexecute\tkeystore_servoom.htm,,	  -Dstartupmode=1 -- \tkeystore\scripts\servoom.script \logs\testexecute\tkeystore_servoom.htm,			1800, UDEB,, 
 T_KEYSTORE, \logs\testexecute\tkeystore_reload.htm,,      -Dstartupmode=1 -- \tkeystore\scripts\reload.script \logs\testexecute\tkeystore_reload.htm,			300, UDEB#UREL,, 
 
 
-t_certapps, \tcertapps.log,, -Dstartupmode=1 -- \tcertapps\scripts\script1.txt \tcertapps.log, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certapps, \tcertapps-oom.log,, -Dstartupmode=1 -- -o \tcertapps\scripts\script1.txt \tcertapps-oom.log, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certapps, \tcertapps-apipolicing.log,, -Dstartupmode=1 -- \tcertapps\scripts\apipolicing.txt \tcertapps-apipolicing.log, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-
 # TMS support
 
 t_certapps, \logs\testexecute\tcertapps.htm,, -Dstartupmode=1 -- \tcertapps\scripts\script1.script \logs\testexecute\tcertapps.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
@@ -724,40 +569,39 @@
 t_certapps, \logs\testexecute\tcertapps-apipolicing.htm,, -Dstartupmode=1 -- \tcertapps\scripts\apipolicing.script \logs\testexecute\tcertapps-apipolicing.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
 
 [FileTokens_UseAuth]
-T_KEYSTORE, \oldserver_newfeature.log,,	-Dstartupmode=1 -- \tkeystore\scripts\oldserver_newfeature.txt	\oldserver_newfeature.log,				300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\RemoveSecDlg.bat, 
+T_KEYSTORE, \logs\testexecute\oldserver_newfeature.htm,,		     -Dstartupmode=1 -- \tkeystore\scripts\oldserver_newfeature.script	\logs\testexecute\oldserver_newfeature.htm,				300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\RemoveSecDlg.bat,
 # The batch file run as part of first test is requried for running all tests in this section.
 TESTEXECUTE, \logs\testexecute\initialize.htm,, -Dstartupmode=1 --  \tkeystore\scripts\initialize.script, 100, UDEB#UREL,,
-T_KEYSTORE, \tkeystore_nouserregistered.log,, -Dstartupmode=1 -- \tkeystore\scripts\tkeystore_nouserregistered.txt	\tkeystore_nouserregistered.log,			300, UDEB#UREL, \epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_useauthserver_pre.bat,
 
 # TMS support
-T_KEYSTORE, \logs\testexecute\tkeystore_nouserregistered.htm,, -Dstartupmode=1 -- \tkeystore\scripts\tkeystore_nouserregistered.script	\logs\testexecute\tkeystore_nouserregistered.htm,			300, UDEB#UREL, \epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_useauthserver_pre.bat,
+T_KEYSTORE, \logs\testexecute\tkeystore_nouserregistered.htm,,		     -Dstartupmode=1 -- \tkeystore\scripts\tkeystore_nouserregistered.script	\logs\testexecute\tkeystore_nouserregistered.htm,			300, UDEB#UREL, \epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_useauthserver_pre.bat,
+
+# the execution of this code is a prerequisite for running the keystore tests against the test plugins.
 
 TESTEXECUTE, \logs\testexecute\reg_first_identity.htm,, -Dstartupmode=1 --  \tkeystore\scripts\reg_first_identity.script, 100, UDEB#UREL,,
 # These set of tests run when keystore has been enabled to use authentication server.
-T_KEYSTORE, \tkeystore_useauth.log,,     -Dstartupmode=1 -- \tkeystore\scripts\tkeystore_useauth.txt	\tkeystore_useauth.log,			300, UDEB#UREL,, \epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_post.bat 
-T_KEYSTORE, \tkeystore_authobjects_useauth.log,, -Dstartupmode=1 -- \tkeystore\scripts\authobjects_useauth.txt	\tkeystore_authobjects_useauth.log,		300, UDEB#UREL,, \epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_authobject_post.bat 
-T_KEYSTORE, \tkeystore_export_useauth.log,,      -Dstartupmode=1 -- \tkeystore\scripts\exportscript_useauth.txt	\tkeystore_export_useauth.log,			300, UDEB#UREL,, 
-T_KEYSTORE, \tkeystore_oom_useauth.log,,         -Dstartupmode=1 -- \tkeystore\scripts\oom_useauth.txt		\tkeystore_oom_useauth.log,			300, UDEB#UREL,, 
-T_KEYSTORE, \tkeystore_cancel_useauth.log,,      -Dstartupmode=1 -- \tkeystore\scripts\cancel_useauth.txt		\tkeystore_cancel_useauth.log,			300, UDEB#UREL,, 
-T_KEYSTORE, \tkeystore_servoom_useauth.log,,	 -Dstartupmode=1 -- \tkeystore\scripts\servoom_useauth.txt		\tkeystore_servoom_useauth.log,			5000, UDEB,, 
-T_KEYSTORE, \tkeystore_reload_useauth.log,,      -Dstartupmode=1 -- \tkeystore\scripts\reload_useauth.txt		\tkeystore_reload_useauth.log,			300, UDEB#UREL,, 
-T_KEYSTORE, \tkeystore_capability_useauth.log,,	 -Dstartupmode=1 -- \tkeystore\scripts\capability_useauth.txt		\tkeystore_capability_useauth.log,	1800, UDEB,, 
-T_KEYSTORE, \tkeystore_authenticate_useauth.log,,	 -Dstartupmode=1 -- \tkeystore\scripts\authenticate_useauth.txt		\tkeystore_authenticate_useauth.log,	1800, UDEB,, 
-T_KEYSTORE, \tkeystore_authentication1.log,,	 -Dstartupmode=1 -- \tkeystore\scripts\tkeystore_authentication1.txt		\tkeystore_authentication1.log,	1800, UDEB,, 
-TESTEXECUTE, \logs\testexecute\reg_second_identity.htm,, -Dstartupmode=1 --  \tkeystore\scripts\reg_second_identity.script, 100, UDEB#UREL,,
-T_KEYSTORE, \tkeystore_authentication2.log,,      -Dstartupmode=1 -- \tkeystore\scripts\tkeystore_authentication2.txt		\tkeystore_authentication2.log,			300, UDEB#UREL,, \epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_useauthserver_post.bat
+
+# TMS support
+T_KEYSTORE, \logs\testexecute\tkeystore_useauth.htm,,     -Dstartupmode=1 -- \tkeystore\scripts\tkeystore_useauth.script	\logs\testexecute\tkeystore_useauth.htm,			300, UDEB#UREL,, \epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_post.bat 
+T_KEYSTORE, \logs\testexecute\tkeystore_authobjects_useauth.htm,, -Dstartupmode=1 -- \tkeystore\scripts\authobjects_useauth.script	\logs\testexecute\tkeystore_authobjects_useauth.htm,		300, UDEB#UREL,, \epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_authobject_post.bat 
 
 # TMS support
-T_KEYSTORE, \tkeystore_useauth.htm,,     -Dstartupmode=1 -- \tkeystore\scripts\tkeystore_useauth.script	\tkeystore_useauth.htm,			300, UDEB#UREL,, \epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_post.bat 
-T_KEYSTORE, \tkeystore_export_useauth.htm,,      -Dstartupmode=1 -- \tkeystore\scripts\exportscript_useauth.script	\tkeystore_export_useauth.htm,			300, UDEB#UREL,, 
-T_KEYSTORE, \tkeystore_oom_useauth.htm,,         -Dstartupmode=1 -- \tkeystore\scripts\oom_useauth.script		\tkeystore_oom_useauth.htm,			300, UDEB#UREL,, 
-T_KEYSTORE, \tkeystore_cancel_useauth.htm,,      -Dstartupmode=1 -- \tkeystore\scripts\cancel_useauth.script		\tkeystore_cancel_useauth.htm,			300, UDEB#UREL,, 
-T_KEYSTORE, \tkeystore_servoom_useauth.htm,,	 -Dstartupmode=1 -- \tkeystore\scripts\servoom_useauth.script		\tkeystore_servoom_useauth.htm,			5000, UDEB,, 
-T_KEYSTORE, \tkeystore_reload_useauth.htm,,      -Dstartupmode=1 -- \tkeystore\scripts\reload_useauth.script		\tkeystore_reload_useauth.htm,			300, UDEB#UREL,, 
-T_KEYSTORE, \tkeystore_capability_useauth.htm,,	 -Dstartupmode=1 -- \tkeystore\scripts\capability_useauth.script		\tkeystore_capability_useauth.htm,	1800, UDEB,, 
-T_KEYSTORE, \tkeystore_authenticate_useauth.htm,,	 -Dstartupmode=1 -- \tkeystore\scripts\authenticate_useauth.script		\tkeystore_authenticate_useauth.htm,	1800, UDEB,, 
-T_KEYSTORE, \tkeystore_authentication1.htm,,	 -Dstartupmode=1 -- \tkeystore\scripts\tkeystore_authentication1.script		\tkeystore_authentication1.htm,	1800, UDEB,, 
-T_KEYSTORE, \tkeystore_authentication2.htm,,      -Dstartupmode=1 -- \tkeystore\scripts\tkeystore_authentication2.script		\tkeystore_authentication2.htm,			300, UDEB#UREL,, \epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_useauthserver_post.bat
+T_KEYSTORE, \logs\testexecute\tkeystore_export_useauth.htm,,      -Dstartupmode=1 -- \tkeystore\scripts\exportscript_useauth.script	\logs\testexecute\tkeystore_export_useauth.htm,			300, UDEB#UREL,, 
+T_KEYSTORE, \logs\testexecute\tkeystore_oom_useauth.htm,,         -Dstartupmode=1 -- \tkeystore\scripts\oom_useauth.script \logs\testexecute\tkeystore_oom_useauth.htm,			600, UDEB#UREL,, 
+T_KEYSTORE, \logs\testexecute\tkeystore_cancel_useauth.htm,,      -Dstartupmode=1 -- \tkeystore\scripts\cancel_useauth.script \logs\testexecute\tkeystore_cancel_useauth.htm,			300, UDEB#UREL,, 
+T_KEYSTORE, \logs\testexecute\tkeystore_servoom_useauth.htm,,	 -Dstartupmode=1 -- \tkeystore\scripts\servoom_useauth.script \logs\testexecute\tkeystore_servoom_useauth.htm,			6000, UDEB,, 
+T_KEYSTORE, \logs\testexecute\tkeystore_reload_useauth.htm,,      -Dstartupmode=1 -- \tkeystore\scripts\reload_useauth.script \logs\testexecute\tkeystore_reload_useauth.htm,			300, UDEB#UREL,, 
+T_KEYSTORE, \logs\testexecute\tkeystore_capability_useauth.htm,,	 -Dstartupmode=1 -- \tkeystore\scripts\capability_useauth.script \logs\testexecute\tkeystore_capability_useauth.htm,	1800, UDEB#UREL,, 
+T_KEYSTORE, \logs\testexecute\tkeystore_createoldkeystore.htm,,	 -Dstartupmode=1 -- \tkeystore\scripts\createoldkeystore.script		\logs\testexecute\tkeystore_createoldkeystore.htm,	1800, UDEB#UREL,\epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_migrate_pre.bat, \epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_migrate_copykeys.bat
+TESTEXECUTE, \logs\testexecute\keytool_migrate.htm,,  -Dstartupmode=1 -- \ttesttools\scripts\keytool_migrate.script, 600, UDEB#UREL,,
+T_KEYSTORE, \logs\testexecute\tkeystore_testnewkeystore.htm,,	 -Dstartupmode=1 -- \tkeystore\scripts\testnewkeystore.script		\logs\testexecute\tkeystore_testnewkeystore.htm,	1800, UDEB#UREL,\epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_migrate_post.bat, 
+
+
+# TMS support
+T_KEYSTORE, \logs\testexecute\tkeystore_authenticate_useauth.htm,,	 -Dstartupmode=1 -- \tkeystore\scripts\authenticate_useauth.script \logs\testexecute\tkeystore_authenticate_useauth.htm,	1800, UDEB#UREL,, 
+T_KEYSTORE, \logs\testexecute\tkeystore_authentication1.htm,,	 -Dstartupmode=1 -- \tkeystore\scripts\tkeystore_authentication1.script \logs\testexecute\tkeystore_authentication1.htm,	1800, UDEB#UREL,, 
+TESTEXECUTE, \logs\testexecute\reg_second_identity.htm,, -Dstartupmode=1 --  \tkeystore\scripts\reg_second_identity.script, 100, UDEB#UREL,,
+T_KEYSTORE, \logs\testexecute\tkeystore_authentication2.htm,,      -Dstartupmode=1 -- \tkeystore\scripts\tkeystore_authentication2.script \logs\testexecute\tkeystore_authentication2.htm,			300, UDEB#UREL,, \epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_useauthserver_post.bat
 
 
 [ToolsLegacy]
@@ -768,9 +612,6 @@
 # DUMPSIS test
 PERL, \dumpsis_test.txt,,\epoc32\winscw\c\tswi\tdumpsis\testDumpsis.pl, 300, UDEB,,\epoc32\winscw\c\tswi\tdumpsis\postdumpsistest.bat
 
-# Interpretsis
-PERL, \interpretsis_test.txt,,\epoc32\winscw\c\tswi\tinterpretsis\runtests.pl, 300, UDEB,, 
-
 [SisTools]
 # MAKESIS test
 # program,log,commdb,script,timeout,release,pre cmd,post cmd
@@ -781,10 +622,10 @@
 # SIGNSIS test
 PERL, \signsis_test.txt,,\epoc32\winscw\c\tswi\tsignsis\testSignsis.pl, 300, UDEB,,
 
-[ToolsNew]
+# Interpretsis
+PERL, \interpretsis_test.txt,,\epoc32\winscw\c\tswi\tinterpretsis\runtests.pl, 300, UDEB,, 
 
-# Interpretsis
-PERL, \interpretsis_test.txt,,\epoc32\winscw\c\tswi\tinterpretsis\runtests.pl usif, 300, UDEB,, 
+[ToolsNew]
 
 # Interpretsis Test Harness
 PERL, \interpretsis_test_harness.txt,,\epoc32\winscw\c\tswi\tinterpretsisinteg\runtest1.pl usifnative, 1000, UDEB,,
@@ -832,41 +673,36 @@
 upstest.exe, \upstest.log,,, 800, UDEB#UREL,,
 upstestobsif.exe, \upstestobsif.log,,, 800, UDEB#UREL,,
 upstestoom.exe, \upstestoom.log,,  , 800, UDEB,,
-upstestobsifoom.exe, \upstestobsifoom.log,, , 800, UDEB,,
+upstestobsifoom.exe, \upstestobsifoom.log,, , 800, UDEB,,\epoc32\data\Z\tups\integ\scripts\tups_networkingupsdisable.bat
 tmsgapp.exe, \tmsgapp.log,, -Dtextshell -- , 800, UDEB#UREL,,
 
 
 
 [AuthServer]
 # AuthServer tests
-TESTEXECUTE, \logs\testexecute\tauthkeys.htm,, -Dstartupmode=1 --  \tauth\tauthkeys\scripts\tauthkeys.script, 30, UDEB#UREL,,
+TESTEXECUTE, \logs\testexecute\tauthkeys.htm,,-Dstartupmode=1 --   \tauth\tauthkeys\scripts\tauthkeys.script, 30, UDEB#UREL,,
 TESTEXECUTE, \logs\testexecute\tauthdb.htm,, -Dstartupmode=1 --  \tauth\tauthdb\scripts\tauthdb.script, 30, UDEB#UREL,,
 TESTEXECUTE, \logs\testexecute\tauthcliserv.htm,, -Dstartupmode=1 --   \tauth\tauthcliserv\scripts\tauthcliserv.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tauthcliserv_debug.htm,, -Dstartupmode=1 --   \tauth\tauthcliserv\scripts\tauthcliserv_debug.script, 30, UDEB,,
-TESTEXECUTE, \logs\testexecute\tauthexpr.htm,, -Dstartupmode=1 --  \tauth\tauthexpr\scripts\tauthexpr.script, 500, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tauthplugins.htm,, -Dstartupmode=1 --  \tauth\tauthplugins\scripts\tauthplugins.script, 30, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tauthsvr2.htm,, -Dstartupmode=1 --   \tauth\tauthsvr\scripts\tauthsvr2.script, 1600, UDEB#UREL,,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\post_tauthsvr.bat
-TESTEXECUTE, \logs\testexecute\tpostmarketplugin.htm,, -Dstartupmode=1 --  \tauth\tauthsvr\scripts\tpostmarketplugin.script, 1600, UDEB#UREL,,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\post_postmarketplugin.bat
-TESTEXECUTE, \logs\testexecute\tpostmarketplugin_macroenabled.htm,, -Dstartupmode=1 --  \tauth\tauthsvr\scripts\tpostmarketplugin_macroenabled.script, 1600, UDEB#UREL,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\pre_postmarketplugin.bat,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\post_postmarketplugin.bat
-TESTEXECUTE, \logs\testexecute\tpostmarketpluginenabled1_winscw.htm,, -Dstartupmode=1 --   \tauth\tauthsvr\scripts\tpostmarketpluginenabled1_winscw.script, 1600, UDEB#UREL,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\pre_patchdata_positive.bat,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\post_postmarketplugin.bat
-TESTEXECUTE, \logs\testexecute\tpostmarketpluginenabled_winscw.htm,, -Dstartupmode=1 --  \tauth\tauthsvr\scripts\tpostmarketpluginenabled_winscw.script, 1600, UDEB#UREL,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\pre_patchdata_negative.bat,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\post_postmarketplugin.bat
+TESTEXECUTE, \logs\testexecute\tauthcliserv_debug.htm,,-Dstartupmode=1 --   \tauth\tauthcliserv\scripts\tauthcliserv_debug.script, 30, UDEB,,
+TESTEXECUTE, \logs\testexecute\tauthexpr.htm,, -Dstartupmode=1 --   \tauth\tauthexpr\scripts\tauthexpr.script, 500, UDEB#UREL,,
+TESTEXECUTE, \logs\testexecute\tauthplugins.htm,, -Dstartupmode=1 --   \tauth\tauthplugins\scripts\tauthplugins.script, 30, UDEB#UREL,,
+TESTEXECUTE, \logs\testexecute\tauthsvr2.htm,, -Dstartupmode=1 --  \tauth\tauthsvr\scripts\tauthsvr2.script, 1600, UDEB#UREL,,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\post_tauthsvr.bat
+TESTEXECUTE, \logs\testexecute\tauthsvrclock.htm,, -Dstartupmode=1 --  \tauth\tauthsvr\scripts\tauthsvrclock.script, 1600, UDEB#UREL,,
+TESTEXECUTE, \logs\testexecute\tpostmarketplugin.htm,, -Dstartupmode=1 --   \tauth\tauthsvr\scripts\tpostmarketplugin.script, 1600, UDEB#UREL,,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\post_postmarketplugin.bat
+TESTEXECUTE, \logs\testexecute\tpostmarketplugin_macroenabled.htm,,-Dstartupmode=1 --   \tauth\tauthsvr\scripts\tpostmarketplugin_macroenabled.script, 1600, UDEB#UREL,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\pre_postmarketplugin.bat,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\post_postmarketplugin.bat
+TESTEXECUTE, \logs\testexecute\tpostmarketpluginenabled1_winscw.htm,, -Dstartupmode=1 --  \tauth\tauthsvr\scripts\tpostmarketpluginenabled1_winscw.script, 1600, UDEB#UREL,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\pre_patchdata_positive.bat,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\post_postmarketplugin.bat
+TESTEXECUTE, \logs\testexecute\tpostmarketpluginenabled_winscw.htm,, -Dstartupmode=1 --   \tauth\tauthsvr\scripts\tpostmarketpluginenabled_winscw.script, 1600, UDEB#UREL,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\pre_patchdata_negative.bat,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\post_postmarketplugin.bat
 TESTEXECUTE, \logs\testexecute\tclientsidsupport.htm,, -Dstartupmode=1 --  \tauth\tauthsvr\scripts\tclientsidsupport.script, 1600, UDEB#UREL,,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\post_tclientsidsupport.bat
 TESTEXECUTE, \logs\testexecute\authsecuritytests.htm,, -Dstartupmode=1 --   \tauth\securitytests\scripts\authsecuritytests.script, 1600, UDEB#UREL,, \epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\post_tauthsvr.bat
-TESTEXECUTE, \logs\testexecute\tauthsvroom.htm,, -Dstartupmode=1 --   \tauth\tauthsvr\scripts\tauthsvroom.script, 5000, UDEB#UREL,,
-
+TESTEXECUTE, \logs\testexecute\tauthsvroom.htm,, -Dstartupmode=1 --  \tauth\tauthsvr\scripts\tauthsvroom.script, 5000, UDEB#UREL,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\pretauthsvroom.bat,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\posttauthsvroom.bat
 # Pinplugin test
-TESTEXECUTE, \logs\testexecute\tpinplugin.htm,, \tauth\tpinplugin\scripts\tpinplugin.script, 300, UDEB,,
+TESTEXECUTE, \logs\testexecute\tpinplugin.htm,, -Dstartupmode=1 -- \tauth\tpinplugin\scripts\tpinplugin.script, 300, UDEB#UREL,,
 
 # Scan for unexpected panics in epocwind.out files
 PERL, \panicscanlog.txt,,\epoc32\winscw\c\tswi\panicscan_authserver.pl, 300, UDEB,,
 
 
 
-[StreamingCAF]
-#Streaming CAF Tests
-TESTEXECUTE, \logs\testexecute\tscaf.htm,,-Dtextshell --  z:\tcaf\tscaf\tscaf.script, 300, UDEB#UREL, ,
-TESTEXECUTE, \logs\testexecute\tscaf_oom.htm,,-Dtextshell --  z:\tcaf\tscaf\tscaf_oom.script, 300, UDEB, ,
-
 [USIF]
 #Universal Software Install Framework Tests
 TESTEXECUTE, \logs\testexecute\usifsecuritytests.htm,,z:\tusif\securitytests\usifsecuritytests.script, 300, UDEB#UREL,,
@@ -882,10 +718,14 @@
 
 [SecurityTools]
 # Security tools tests
-PERL, \security_tools\tcertapp\tCertapp_Output.txt,, \epoc32\winscw\c\security_tools\tcertapp\run_tcertapp.pl, 1600, UDEB#UREL,,
-t_certapps, \SDP-Security_Tools-CertApp-CCDAT-EMU00.log,, -Dtextshell -- \security_tools\tcertapp\SDP-Security_Tools-CertApp-CCDAT-EMU00.txt \SDP-Security_Tools-CertApp-CCDAT-EMU00.log, 300, UDEB#UREL, \epoc32\winscw\c\security_tools\tcertapp\pre_tcertapp.bat, \epoc32\winscw\c\security_tools\tcertapp\post_tcertapp.bat
-t_certstore, \SDP-Security_Tools-CertApp-FILEDAT-EMU00.log,, -Dtextshell -- \security_tools\tcertapp\SDP-Security_Tools-CertApp-FILEDAT-EMU00.txt \SDP-Security_Tools-CertApp-FILEDAT-EMU00.log, 600, UDEB#UREL, \epoc32\winscw\c\security_tools\tcertapp\pre_tcertapp.bat, \epoc32\winscw\c\security_tools\tcertapp\post_tcertapp.bat
-t_certstore, \SDP-Security_Tools-CertApp-SWIDAT-EMU00.log,, -Dtextshell -- \security_tools\tcertapp\SDP-Security_Tools-CertApp-SWIDAT-EMU00.txt \SDP-Security_Tools-CertApp-SWIDAT-EMU00.log, 600, UDEB#UREL, \epoc32\winscw\c\security_tools\tcertapp\pre_tcertapp.bat, \epoc32\winscw\c\security_tools\tcertapp\post_tcertapp.bat
+PERL, \security_tools\tcertapp\tCertapp_Output.htm,, \epoc32\winscw\c\security_tools\tcertapp\run_tcertapp.pl, 1600, UDEB#UREL,,
+t_certapps, \logs\testexecute\SDP-Security_Tools-CertApp-CCDAT-EMU00.htm,, -Dtextshell -- \security_tools\tcertapp\SDP-Security_Tools-CertApp-CCDAT-EMU00.script \logs\testexecute\SDP-Security_Tools-CertApp-CCDAT-EMU00.htm, 300, UDEB#UREL, \epoc32\winscw\c\security_tools\tcertapp\pre_tcertapp.bat, \epoc32\winscw\c\security_tools\tcertapp\post_tcertapp.bat
+t_certstore, \logs\testexecute\SDP-Security_Tools-CertApp-FILEDAT-EMU00.htm,, -Dtextshell -- \security_tools\tcertapp\SDP-Security_Tools-CertApp-FILEDAT-EMU00.script \logs\testexecute\SDP-Security_Tools-CertApp-FILEDAT-EMU00.htm, 600, UDEB#UREL, \epoc32\winscw\c\security_tools\tcertapp\pre_tcertapp.bat, \epoc32\winscw\c\security_tools\tcertapp\post_tcertapp.bat
+t_certstore, \logs\testexecute\SDP-Security_Tools-CertApp-SWIDAT-EMU00.htm,, -Dtextshell -- \security_tools\tcertapp\SDP-Security_Tools-CertApp-SWIDAT-EMU00.script \logs\testexecute\SDP-Security_Tools-CertApp-SWIDAT-EMU00.htm, 600, UDEB#UREL, \epoc32\winscw\c\security_tools\tcertapp\pre_tcertapp.bat, \epoc32\winscw\c\security_tools\tcertapp\post_tcertapp.bat
+
+[UptoMCL]
+# Scan for unexpected panics in epocwind.out files
+PERL, \panicscanlog.txt,,\epoc32\winscw\c\tswi\panicscan.pl, 300, UDEB,,
 
 
 [Misc]
@@ -897,9 +737,8 @@
 
 # Categorisation tags are checked for all of security sub-system 
 PERL, \searchtags.txt,,\epoc32\winscw\c\tswi\searchtags.pl, 300, UDEB,,
+[FileTokens_HwImpl]
+T_KEYSTORE, \logs\testexecute\thwkeystore.htm,,		     -Dstartupmode=1 -- \tkeystore\scripts\thwkeystore.script	\logs\testexecute\thwkeystore.htm,				300, UDEB#UREL, \epoc32\winscw\c\testdata\tcryptospi\scripts\batchfiles\pre_dummyeccplugin.bat, \epoc32\winscw\c\testdata\tcryptospi\scripts\batchfiles\post_dummyeccplugin.bat
+TESTEXECUTE, \logs\testexecute\te_dummyeccciphertestcases.htm,, -Dtextshell -- \testdata\tcryptospi\scripts\te_dummyeccciphertestcases.script, 900, UDEB#UREL, \epoc32\winscw\c\testdata\tcryptospi\scripts\batchfiles\pre_dummyeccplugin.bat, \epoc32\winscw\c\testdata\tcryptospi\scripts\batchfiles\post_dummyeccplugin.bat
 
-[UptoMCL]
-# Scan for unexpected panics in epocwind.out files
-PERL, \panicscanlog.txt,,\epoc32\winscw\c\tswi\panicscan.pl, 300, UDEB,,
-# END of file
 
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/test_spec_apr_9.5.txt	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,397 +0,0 @@
-# This file defines a test specification for all the MCL codelines and consists
-# of the two following sections: COMPONENT ASSIGNMENT and TEST DEFINITION
-#
-# COMPONENT ASSIGNMENT - this section assigns components (defined below) to
-# codelines they should be run for.
-#
-# TEST DEFINITION - this section defines Security tests and assigns them to
-# components. A component is defined using square brackets and its scope ends
-# at the next component. A component can be a Security component, for example
-# [SWI], [JMI], [Crypto] but also a group of various tests, for example [Misc]
-# that contains panicscan.pl and cdrive.pl.
-# It is strongly recommended to use the UDEB#UREL option if possible in order
-# to define the udeb and urel tests at once.
-#
-
-# Tests are executed according to the sequence in the TEST DEFINITION section.
-#
-# WARNING - There must not be more than one test block for any of the components.  
-# E.g. SWI has one and only one [SWI] section in this file.  Otherwise 
-# \security\testframework\test\test_launcher.pl will be broken.
-
-  
-###############################################################################
-#                             COMPONENT ASSIGNMENT                            #
-###############################################################################
-{9.5}=Common,SWI,IntegrityServices,SisTools,SwiTools95Only,SwiTools,Misc,ToolsLegacy,UptoMCL
-{9.6}=Common,SWI,SisTools,SwiTools,USIF,Misc,ToolsNew,UptoMCL,SwiDiran
-{future}=Common,SWI,SisTools,SwiTools,USIF,Misc,ToolsNew,SwiDiran
-
-
-###############################################################################
-#                               TEST DEFINITION                               #
-###############################################################################
-
-# Each test defines the following:
-# program,log,commdb,script,timeout(secs),release,pre cmd,post cmd
-
-# Configuration 1
-
-
-[Common]
-TESTEXECUTE, \logs\testexecute\tsecurityutils.htm,, z:\tsecurityutils\tsecurityutils.script, 300, UDEB, \epoc32\winscw\c\config_udeb.bat, %SECURITYSOURCEDIR%\testframework\test\autotesting\copyswitestfiles.bat
-TESTEXECUTE, \logs\testexecute\tsecurityutils.htm,, z:\tsecurityutils\tsecurityutils.script, 300, UREL, \config_urel.bat, %SECURITYSOURCEDIR%\testframework\test\autotesting\copyswitestfiles.bat
-
-[recjava]
-TESTEXECUTE, \logs\testexecute\trecogjava.htm,, \trecog\trecogjava.script, 300, UDEB#UREL,,
-
-
-[JavaMIDletInstaller]
-# Test JMI CenRep's production version initialization file
-tjmicenrep, \jmicenreptest.log,, -Dtextshell --, 300, UDEB, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cenrep_prod.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cenrep.bat
-tjmicenrep, \jmicenreptest.log,, -Dtextshell --, 300, UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cenrep_prod.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cenrep.bat
-
-tJavaHelper, \tJavaDRMUREL.log,, \tJavaHelper\Scripts\tJavaDRM.txt \tJavaDRMUREL.log, 300, UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_jmi.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat
-tJavaHelper, \tJavaDRMUDEB.log,, \tJavaHelper\Scripts\tJavaDRM.txt \tJavaDRMUDEB.log, 300, UDEB, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_jmi.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat
-
-tJavaRegistry, \tJavaRegistry.log,, -Dstartupmode=1 \tJavaRegistry\scripts\script1.txt  \tJavaRegistry.log, 300, UDEB#UREL,\epoc32\winscw\c\itharnessmidp\scripts\batchfiles\cenrep_cleanup.bat,
-
-tJavaFile, \tJavaFilemidpjar.log,, -Dstartupmode=1 \tJavaFile\scripts\midpjartest.txt \tJavaFilemidpjar.log, 300, UDEB#UREL,\epoc32\winscw\c\itharnessmidp\scripts\batchfiles\cenrep_cleanup.bat,
-tJavaFile, \tJavaFilemidpjad.log,, -Dstartupmode=1 \tJavaFile\Scripts\midpjadtest.txt \tJavaFilemidpjad.log, 300, UDEB#UREL,\epoc32\winscw\c\itharnessmidp\scripts\batchfiles\cenrep_cleanup.bat,
-tJavaFile, \tJavaFileattribute.log,, -Dstartupmode=1 \tJavaFile\Scripts\attributestest.txt \tJavaFileattribute.log, 300, UDEB#UREL,\epoc32\winscw\c\itharnessmidp\scripts\batchfiles\cenrep_cleanup.bat,
-
-tJavaHelper, \tJavaHelper.log,, -Dstartupmode=1 \tJavaHelper\Scripts\MIDPLaunchInfoTest.txt \tJavaHelper.log, 300, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\cenrep_cleanup.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat
-tJavaHelper, \tJavaInstaller.log,, -Dstartupmode=1 \tJavaHelper\Scripts\tJavaInstaller.txt \tJavaInstaller.log, 3000, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\jardownloaderwithauto.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat
-tJavaHelper, \tJavaInstallerocsp.log,, \tJavaHelper\Scripts\tJavaInstallerocsp.txt \tJavaInstallerocsp.log, 1500, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\jardownloaderwithauto.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat
-tJavaHelper, \tjmiocsphttpfilter.log,, \tJavaHelper\Scripts\tjmiocsphttpfilter.txt \tjmiocsphttpfilter.log, 1500, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\jardownloaderwithauto.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat
-tJavaHelper, \tjmiocspallerrors.log,, \tJavaHelper\Scripts\tjmiocspallerrors.txt \tjmiocspallerrors.log, 1500, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_jmiocspallerrors.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmiocspallerrors.bat
-tJavaHelper, \tjmiocspfilterallerrors.log,, \tJavaHelper\Scripts\tjmiocspfilterallerrors.txt \tjmiocspfilterallerrors.log, 1500, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_jmiocspallerrors.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmiocspallerrors.bat
-tJavaHelper, \tjavainstall_noplugin.log,, -Dstartupmode=1 \tJavaHelper\Scripts\tjavainstall_noplugin.txt \tjavainstall_noplugin.log, 600, UDEB#UREL, \epoc32\winscw\c\tjavahelper\scripts\backup_jmi_plugin.bat, \epoc32\winscw\c\tjavahelper\scripts\restore_jmi_plugin.bat
-tJavaHelper, \tjavarunoninstall.log,, -Dstartupmode=1 \tJavaHelper\Scripts\tjavarunoninstall.txt \tjavarunoninstall.log, 3600, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\jardownloaderwithauto.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat
-tJavaHelper, \tJavaMultiInstaller.log,, -Dstartupmode=1 \tJavaHelper\Scripts\tJavaMultiInstaller.txt \tJavaMultiInstaller.log, 300, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cert_copy.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat
-
-tJavaHelper, \tjmiotaex.log,, -Dstartupmode=1 \tJavaHelper\Scripts\tjmiotaex.txt \tjmiotaex.log, 600, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\jardownloaderwithauto.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat
-tJavaHelper, \tjmioom.log,, -Dstartupmode=1 \tJavaHelper\Scripts\tjmioom.txt \tjmioom.log, 3300, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\jardownloaderwithauto.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat
-
-
-TESTEXECUTE, \logs\testexecute\tjavahelperserver.htm,,  -Dtextshell -- \private\10204805\scripts\tjavahelperserver.script, 300, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\cenrep_cleanup.bat,  \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat
-
-tJarDownloader, \tJarDownloader.log,, -Dstartupmode=1 \tJarDownloader\scripts\script1.txt \tJarDownloader.log, 300, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\jardownloaderwithauto.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat
-
-TESTEXECUTE, \logs\testexecute\tmidletuaheaderfilter.htm,,  -Dtextshell -- \tmidletuaheaderfilter\tmidletuaheaderfilter.script, 600, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_jmi.bat, %SECURITYSOURCEDIR%\testframework\test\autotesting\preparetjardownloader.bat
-
-ITHARNESSMIDP, \itharnessmidp-conf1.log,, \JAVATEST.TXT \itharnessmidp-conf1.log, 1600, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cert_copy.bat,
-ITHARNESSMIDP, \itharnessmidp-conf2.log,, \JAVATEST2.TXT \itharnessmidp-conf2.log, 600, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\backup_jmi_autodeletefiles.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\replace_jmi_autodeletefiles.bat
-ITHARNESSMIDP, \itharnessmidp-conf3.log,, \JAVATEST3.TXT \itharnessmidp-conf3.log, 300, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cert_copy.bat,
-ITHARNESSMIDP, \itharnessmidp-conf4.log,, \OTATests.txt \itharnessmidp-conf4.log, 1200, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_otasetup.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat revertotasetup
-ITHARNESSMIDP, \leavetest.log,, \leavetest.txt \leavetest.log, 600, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cert_copy.bat auto.cfg,
-ITHARNESSMIDP, \itharnessmidp-conf5.log,, \javaiaptest.txt \itharnessmidp-conf5.log, 1200, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cert_copy.bat prompt.cfg, %SECURITYSOURCEDIR%\testframework\test\autotesting\runced c:\auto.cfg
-
-ITHARNESSMIDP, \itharnessmidp-ocsp-default.log,, \itharnessmidp\scripts\ocsp-Default.txt \itharnessmidp-ocsp-default.log, 300, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cert_copy.bat ocsp-default,
-ITHARNESSMIDP, \itharnessmidp-ocsp-allWarnings.log,, \itharnessmidp\scripts\ocsp-allWarnings.txt \itharnessmidp-ocsp-allWarnings.log, 600, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cert_copy.bat ocsp-allWarnings,
-ITHARNESSMIDP, \itharnessmidp-ocsp-allErrors.log,, \itharnessmidp\scripts\ocsp-allErrors.txt \itharnessmidp-ocsp-allErrors.log, 300, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cert_copy_allerrors.bat ocsp-allErrors, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_cert_copy_allerrors.bat
-
-# WinSignMIDlet test
-PERL, \winsignmidlet_test.txt,, -Dtextshell -- %SECURITYSOURCEDIR%\JavaMIDletInstaller\test\tWinSignMIDlet\testwinsignmidlet.pl, 300, UDEB#UREL,,
-
-
-
-
-
-[SWI]
-# Requires the following additional components to be built: SisTools, Certman
-
-#NQP Tests for DataProvider
-TESTEXECUTE, \logs\testexecute\tdataprovider.htm,, -Dstartupmode=1 -- z:\tswi\tdataprovider\scripts\tdataprovider.script, 600, UDEB#UREL,,
-
-TESTEXECUTE, \logs\testexecute\testwritableswicertstore.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testwritableswicertstore.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\copytuiscriptadaptors.bat, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\cleanswicertstore.bat
-TESTEXECUTE, \logs\testexecute\tsilent_winscw.htm,, \tswi\tuiscriptadaptors\scripts\tsilent_winscw.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\copytuiscriptadaptors.bat, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\cleanswicertstore.bat
-TESTEXECUTE, \logs\testexecute\tswidaemonstub.htm,, \tswi\tuiscriptadaptors\scripts\tswidaemonstub.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\inc098114_winscw.htm,, \tswi\tuiscriptadaptors\scripts\inc098114_winscw.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\copytuiscriptadaptors.bat
-TESTEXECUTE, \logs\testexecute\tcleanupinfrastructure.htm,, \tswi\tuiscriptadaptors\scripts\tcleanupinfrastructure.script, 300, UDEB#UREL,\epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\tcleanupinfrastructure_pre.bat, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\tcleanupinfrastructure_post.bat
-
-TESTEXECUTE, \logs\testexecute\tsis.htm,, \tswi\tsis\scripts\tsis.script, 600, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tsis_signed.htm,, -Dstartupmode=1 -- \tswi\tsis\scripts\tsis_signed.script, 600, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tsis_failure.htm,, -Dstartupmode=1 -- \tswi\tsis\scripts\tsis_failure.script, 600, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tsis_large.htm,, -Dstartupmode=1 -- \tswi\tsis\scripts\tsis_large.script, 600, UDEB#UREL,, 
-TESTEXECUTE, \logs\testexecute\tsis_new_recognizer.htm,, \tswi\tsis\scripts\tsis_new_recognizer.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tsis\batchfiles\new_recognizer_pre.bat, \epoc32\winscw\c\tswi\tsis\batchfiles\new_recognizer_post.bat
-TESTEXECUTE, \logs\testexecute\tsishelper.htm,, -Dstartupmode=1 -- \tswi\tsishelper\scripts\tsishelper.script, 300, UDEB#UREL,,
-
-[IntegrityServices]
-TESTEXECUTE, \logs\testexecute\tstartuprecovery.htm,, \tswi\tintegrityservices\scripts\tstartuprecovery.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tintegrityservices\scripts\batchfiles\recoverystartup_pre.bat,
-TESTEXECUTE, \logs\testexecute\tintegrityservices.htm,, -Dstartupmode=1 -- \tswi\tintegrityservices\scripts\tintegrityservices.script, 300, UDEB#UREL,,
-
-[SWI]
-TESTEXECUTE, \logs\testexecute\testexpressions.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testexpressions.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testdrives.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testdrives.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testlocations.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testlocations.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testupgrades.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testupgrades.script, 300, UDEB#UREL,\epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\copytuiscriptadaptors.bat, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\cleanswicertstore.bat
-
-TESTEXECUTE, \logs\testexecute\testaugmentations.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testaugmentations.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testpreinstalled.htm,, \tswi\tuiscriptadaptors\scripts\testpreinstalled.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testpreinstalled_delete.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testpreinstalled_delete.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_deletepreinstalledfiles.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\testdependencies.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testdependencies.script, 300, UDEB#UREL,,
-
-TESTEXECUTE, \logs\testexecute\tuiscriptadaptors.htm,, \tswi\tuiscriptadaptors\scripts\tuiscriptadaptors.script, 10000, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\tuiscriptadaptors_pre.bat, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\tuiscriptadaptors_post.bat
-TESTEXECUTE, \logs\testexecute\tuiscriptadaptors_winscw.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\tuiscriptadaptors_winscw.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\copytuiscriptadaptors.bat,
-TESTEXECUTE, \logs\testexecute\testvids.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testvids.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tuiscriptadaptorsFH.htm,, \tswi\tuiscriptadaptors\scripts\tuiscriptadaptorsFH.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\useautocfg.bat,
-
-TESTEXECUTE, \logs\testexecute\testrucert.htm,, \tswi\tuiscriptadaptors\scripts\testrucert.script, 500, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\romupdate_withoutstubs_pre.bat, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\romupdate_withoutstubs_post.bat
-
-TESTEXECUTE, \logs\testexecute\testrun.htm,, \tswi\tuiscriptadaptors\scripts\testrun.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_shortrunwait.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\testrunft.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testrunft.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_shortrunwait.ini,
-
-TESTEXECUTE, \logs\testexecute\testrun2.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testrun2.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_notallowrun.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\testshutdown.htm,, \tswi\tuiscriptadaptors\scripts\testshutdown.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testasync.htm,, \tswi\tuiscriptadaptors\scripts\testasync.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\useautocfg.bat,
-TESTEXECUTE, \logs\testexecute\testasynccancel.htm,, \tswi\tuiscriptadaptors\scripts\testasynccancel.script, 3000, UDEB#UREL,,
-
-TESTEXECUTE, \logs\testexecute\tsisstub.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\tsisstub.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tsisstub_delete.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\tsisstub_delete.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_deletepreinstalledfiles.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\testasynccaps.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testasynccaps.script, 300, UDEB#UREL,,
-
-TESTEXECUTE, \logs\testexecute\devcerts_match.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_match.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\useautosimtsycfg.bat, %SECURITYSOURCEDIR%\testframework\test\autotesting\useautocfg.bat
-TESTEXECUTE, \logs\testexecute\devcerts_mismatch.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_mismatch.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\devcerts_aggregate.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_aggregate.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\devcerts_corrupt.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_corrupt.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\devcerts_ocsp.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_ocsp.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\devcerts_backuprestore.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_backuprestore.script, 300, UDEB#UREL,%SECURITYSOURCEDIR%\testframework\test\autotesting\useautosimtsycfg.bat, %SECURITYSOURCEDIR%\testframework\test\autotesting\useautocfg.bat
-TESTEXECUTE, \logs\testexecute\devcerts_backup.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_backup.script, 300, UDEB#UREL,%SECURITYSOURCEDIR%\testframework\test\autotesting\useautosimtsycfg.bat, %SECURITYSOURCEDIR%\testframework\test\autotesting\useautocfg.bat
-TESTEXECUTE, \logs\testexecute\devcerts_restore.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_restore.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\changedevid.bat, \epoc32\winscw\c\tswi\tdevcerts\scripts\batchfiles\devcerts_restore_post.bat
-
-TESTEXECUTE, \logs\testexecute\tsisregistrytest.htm,, -Dstartupmode=1 -- \tswi\tsisregistrytest\scripts\tsisregistrytest.script, 1500, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\useautocfg.bat, \epoc32\winscw\c\tswi\tsisregistrytest\Scripts\batchfiles\tsisregistrytest_post.bat
-TESTEXECUTE, \logs\testexecute\testVFPOnEmulator.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testVFPOnEmulator.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tdaemon.htm,, -Dstartupmode=1 -- \tswi\tdaemon\scripts\tdaemon.script, 300, UDEB#UREL,, %SECURITYSOURCEDIR%\testframework\test\autotesting\callcreateandsignunicode.bat
-
-# createandsignunicode.pl needs to be run as it builds some SIS files the following tests rely on, however it is a SisTools test so it is run through a batch file and the results not recorded here
-TESTEXECUTE, \logs\testexecute\tbackuprestore.htm,, -Dstartupmode=1 -- \tswi\tbackuprestore\scripts\tbackuprestore.script, 1500, UDEB#UREL,\epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_pre.bat, \epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_post.bat
-TESTEXECUTE, \logs\testexecute\tbackuprestore_second_part.htm,, -Dstartupmode=1 -- \tswi\tbackuprestore\scripts\tbackuprestore_second_part.script, 300, UDEB, \epoc32\winscw\c\tswi\tbackuprestore\scripts\tbackuprestore_second_part_pre.bat, \epoc32\winscw\c\tswi\tbackuprestore\scripts\tbackuprestore_second_part_post.bat
-TESTEXECUTE, \logs\testexecute\tbackuprestoredrive_emulator.htm,, -Dstartupmode=1 -- \tswi\tbackuprestore\scripts\tbackuprestoredrive_emulator.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tbackuprestore_emulator.htm,, -Dstartupmode=1 -- \tswi\tbackuprestore\scripts\tbackuprestore_emulator.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_pre.bat, \epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_post.bat
-TESTEXECUTE, \logs\testexecute\tbackuprestore_policy_prepost_emulator.htm,, -Dstartupmode=1 -- \tswi\tbackuprestore\scripts\tbackuprestore_policy_prepost_emulator.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_policy_pre.bat, \epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_policy_post.bat
-TESTEXECUTE, \logs\testexecute\tbackuprestore_policylst_certfst_emulator.htm,, -Dstartupmode=1 -- \tswi\tbackuprestore\scripts\tbackuprestore_policylst_certfst_emulator.script, 300, UDEB#UREL, ,
-TESTEXECUTE, \logs\testexecute\tbackuprestore_cert_prepost_emulator.htm,, -Dstartupmode=1 -- \tswi\tbackuprestore\scripts\tbackuprestore_cert_prepost_emulator.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_cert_pre.bat, \epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_cert_post.bat
-TESTEXECUTE, \logs\testexecute\tbackuptrestore_exploratory.htm,, -Dstartupmode=1 -- \tswi\tbackuprestore\scripts\tbackuptrestore_exploratory.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tbackuprestore_no_overwrite.htm,, -Dstartupmode=1 -- \tswi\tbackuprestore\scripts\tbackuprestore_no_overwrite.script, 1500, UDEB#UREL,\epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_no_overwrite_pre.bat, \epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_no_overwrite_post.bat
-
-TESTEXECUTE, \logs\testexecute\tgenbackupmeta_udeb.htm,, -Dstartupmode=1 -- \tswi\tgenbackupmeta\scripts\tgenbackupmeta_udeb.script, 300, UDEB,\epoc32\winscw\c\tswi\tgenbackupmeta\scripts\premeta.bat,
-TESTEXECUTE, \logs\testexecute\tgenbackupmeta_urel.htm,, -Dstartupmode=1 -- \tswi\tgenbackupmeta\scripts\tgenbackupmeta_urel.script, 300, UREL,\epoc32\winscw\c\tswi\tgenbackupmeta\scripts\premeta.bat,
-
-TESTEXECUTE, \logs\testexecute\tgenbackupmeta_mandatory_udeb.htm,, -Dstartupmode=1 -- \tswi\tgenbackupmeta\scripts\tgenbackupmeta_mandatory_udeb.script, 300,UDEB,%SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiCertstore.bat swicertstore_mandatory.dat,\epoc32\winscw\c\tswi\tgenbackupmeta\scripts\postmeta.bat
-TESTEXECUTE, \logs\testexecute\tgenbackupmeta_mandatory_urel.htm,, -Dstartupmode=1 -- \tswi\tgenbackupmeta\scripts\tgenbackupmeta_mandatory_urel.script, 300,UREL,%SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiCertstore.bat swicertstore_mandatory.dat,\epoc32\winscw\c\tswi\tgenbackupmeta\scripts\postmeta.bat
-TESTEXECUTE, \logs\testexecute\trevocation.htm,, -Dstartupmode=1 -- \tswi\trevocation\scripts\trevocation.script, 600, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\trevocation_unsigned.htm,, -Dstartupmode=1 -- \tswi\trevocation\scripts\trevocation_unsigned.script, 600, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_allowunsigned.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\tautosigning.htm,, -Dstartupmode=1 -- \tswi\tautosigning\scripts\tautosigning.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testdrm.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testdrm.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testdrmasync.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testdrmasync.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testdrmFH.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testdrmFH.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testdiskfullemulator.htm,, \tswi\tuiscriptadaptors\scripts\testdiskfullemulator.script, 300, UDEB#UREL,,
-
-TESTEXECUTE, \logs\testexecute\testcancel.htm,, \tswi\tuiscriptadaptors\scripts\testcancel.script, 1500, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testmandatory.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testmandatory.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiCertstore.bat swicertstore_mandatory.dat, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiCertstore.bat swicertstore.dat
-TESTEXECUTE, \logs\testexecute\testnotargetdevices.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testnotargetdevices.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_incompifnotargetdevices.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\testsystemcaps.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testsystemcaps.script, 300, UDEB, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiCertstore.bat swicertstore.dat,
-TESTEXECUTE, \logs\testexecute\testsystemcaps.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testsystemcaps.script, 300, UREL,,
-TESTEXECUTE, \logs\testexecute\testusercaps.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testusercaps.script, 300, UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini,
-TESTEXECUTE, \logs\testexecute\testusercaps.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testusercaps.script, 300, UDEB,,
-
-TESTEXECUTE, \logs\testexecute\testusercaps_nousergrantcaps.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testusercaps_nousergrantcaps.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_nousergrantcaps.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\testusercaps_restrictedusercaps.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testusercaps_restrictedusercaps.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_restrictedusercaps.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\testnoorphanedoverwrite.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testnoorphanedoverwrite.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_noorphanedoverwrite.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\overwriteprivate.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\overwriteprivate.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_noprotectedorphanoverwrite.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini 
-TESTEXECUTE, \logs\testexecute\overwriteprivate_positive.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\overwriteprivate_positive.script, 300, UDEB, \epoc32\release\winscw\UDEB\Z\tswi\tuiscriptadaptors\scripts\overwriteprivate_positive.bat swipolicy.ini 
-TESTEXECUTE, \logs\testexecute\overwriteprivate_positive.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\overwriteprivate_positive.script, 300, UREL,%SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini 
-TESTEXECUTE, \logs\testexecute\testallowunsigned.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testallowunsigned.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_allowunsigned.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\tpathsubst.htm,, -Dstartupmode=1 -- \tswi\tpathsubst\scripts\tpathsubst.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_pathsubst.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\tpathsubstsysdrive.htm,, -Dstartupmode=1 -- \tswi\tpathsubst\scripts\tpathsubstsysdrive.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_verifysysdrive.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-
-TESTEXECUTE, \logs\testexecute\tpropagation_winscw.htm,, -Dtextshell -- \tswi\tuiscriptadaptors\scripts\tpropagation_winscw.script, 600, UDEB#UREL,,
-
-
-TESTEXECUTE, \logs\testexecute\testeclipseemulator.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testeclipseemulator.script, 300, UDEB#UREL,%SECURITYSOURCEDIR%\testframework\test\autotesting\pre_testeclipseemulator.bat,%SECURITYSOURCEDIR%\testframework\test\autotesting\delstubtemp.bat
-
-TESTEXECUTE, \logs\testexecute\testeclipse.htm,, \tswi\tuiscriptadaptors\scripts\testeclipse.script, 500, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\testeclipse_pre.bat,\epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\testeclipse_post.bat
-
-TESTEXECUTE, \logs\testexecute\swicaptests.htm,, -Dstartupmode=1 -- \tswi\swicaptests\scripts\swicaptests.script, 500, UDEB#UREL,,
-
-TESTEXECUTE, \logs\testexecute\testappinuse.htm,, \tswi\tuiscriptadaptors\scripts\testappinuse.script, 1500, UDEB#UREL,,
-
-
-TESTEXECUTE, \logs\testexecute\switermination.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\switermination.script, 500, UDEB#UREL,,
-
-TESTEXECUTE, \logs\testexecute\tuileavedialog.htm,, \tswi\tuiscriptadaptors\scripts\tuileavedialog.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\tuileavedialog_pre.bat, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\tuileavedialog_post.bat
-TESTEXECUTE, \logs\testexecute\tuileavedialogasync.htm,, \tswi\tuiscriptadaptors\scripts\tuileavedialogasync.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\tuileavedialog_pre.bat, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\tuileavedialog_post.bat
-
-TESTEXECUTE, \logs\testexecute\cr956_test.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\cr956_test.script, 2000, UDEB#UREL,,
-
-TESTEXECUTE, \logs\testexecute\testuninstallation.htm,, \tswi\tuiscriptadaptors\scripts\testuninstallation.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\testuninstallation_pre.bat, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-
-TESTEXECUTE, \logs\testexecute\tuninstallpkgs.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\tuninstallpkgs.script, 1000, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testlogging.htm,, -Dstartupmode=1 -- z:\tswi\tsisregistrytest\scripts\testlogging.script, 100, UDEB#UREL,\epoc32\winscw\c\tswi\tsisregistrytest\Scripts\batchfiles\testlogging_pre.bat,%SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.iniwinscw\c\tswi\tsisregistrytest\Scripts\batchfiles\testlogging_pre.bat,%SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-
-TESTEXECUTE, \logs\testexecute\test_pa_sapropagated_notdelete.htm,, \tswi\tuiscriptadaptors\scripts\test_pa_sapropagated_notdelete.script, 100, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testpastub.htm,, \tswi\tuiscriptadaptors\scripts\testpastub.script, 100, UDEB#UREL,%SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_deletepreinstalledfiles.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\testsapropagatedstub.htm,, \tswi\tuiscriptadaptors\scripts\testsapropagatedstub.script, 100, UDEB#UREL,%SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_deletepreinstalledfiles.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-
-
-# Extended Key Usage check while installation of signed sis files.
-TESTEXECUTE, \logs\testexecute\testextension.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testextension.script, 300, UDEB#UREL,%SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini,
-TESTEXECUTE, \logs\testexecute\testextension_mandatecodesigning.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testextension_mandatecodesigning.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_mandatecodesigning.ini,
-TESTEXECUTE, \logs\testexecute\testextension_alternatecodesigningoid.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testextension_alternatecodesigningoid.script, 300, UDEB#UREL,%SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_altcodesigningoid.ini,
-TESTEXECUTE, \logs\testexecute\testextension_mandatecodesigning_altcodesigningoid.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testextension_mandatecodesigning_altcodesigningoid.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_mandatecodesigning_altcodesigningoid.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-
-# SwiConsole Tests
-TESTEXECUTE, \logs\testexecute\tswiconsole.htm,, -Dstartupmode=1 -- \tswi\tswiconsole\scripts\tswiconsole.script, 300, UDEB#UREL,
-TESTEXECUTE, \logs\testexecute\tswiconsole_allowunsigned.htm,, -Dstartupmode=1 -- \tswi\tswiconsole\scripts\tswiconsole_allowunsigned.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_allowunsigned.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-
-TESTEXECUTE, \logs\testexecute\testmulti.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testmulti.script, 300, UDEB#UREL,
-TESTEXECUTE, \logs\testexecute\generateregistrytestdata.htm,, -Dstartupmode=1 -- \tswi\tsisregistrytest\scripts\generateregistrytestdata.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\runregistrytests.htm,, -Dstartupmode=1 -- \tswi\tsisregistrytest\scripts\runregistrytests.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\removeregistrytestdata.htm,, -Dstartupmode=1 -- \tswi\tsisregistrytest\scripts\removeregistrytestdata.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\truststatus.htm,, -Dstartupmode=1 -- \tswi\trevocation\scripts\truststatus.script, 600, UDEB#UREL,, 
-TESTEXECUTE, \logs\testexecute\testtruststatus.htm,, \tswi\tuiscriptadaptors\scripts\testtruststatus.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tresetdevice.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\tresetdevice.script, 600, UDEB#UREL, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy_deletepreinstalledfiles.ini, %SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-
-# Test Non-Removable Flag
-TESTEXECUTE, \logs\testexecute\testnonremovable.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testnonremovable.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\testnonremovable_pre.bat, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\testnonremovable_post.bat
-
-# Adorned filename handling tests
-TESTEXECUTE, \logs\testexecute\adornedfilenames.htm,, \tswi\tuiscriptadaptors\scripts\adornedfilenames.script, 300, UDEB#UREL,, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\adornedfilenames_pre.bat, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\adornedfilenames_post.bat
-
-# Testing asynchronous cancellation of installation
-TESTEXECUTE, \logs\testexecute\asynccancel.htm,, \tswi\tasynccancel\scripts\asynccancel.script, 10000, UDEB,,
-
-# DevInfoSupport test -
-tdevinfosupport,\swi.log,,-Dtextshell -- ,  300, UDEB,,
-
-# DemandPaging tests - these run using testexecute
-TESTEXECUTE, \logs\testexecute\tdempaging_winscw.htm,, -Dstartupmode=1 -- z:\tswi\tuiscriptadaptors\scripts\tdempaging_winscw.script, 1000, UDEB#UREL,,
-
-#CR0914 Tests
-TESTEXECUTE, \logs\testexecute\integritychecktest.htm,, -Dstartupmode=1 -- z:\tswi\tsisregistrytest\scripts\integritychecktest.script, 1000, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\integritychecktest5Install_winscw.htm,, -Dstartupmode=1 -- z:\tswi\tsisregistrytest\scripts\integritychecktest5Install_winscw.script, 1000, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\integritychecktest5verify_winscw.htm,, -Dstartupmode=1 -- z:\tswi\tsisregistrytest\scripts\integritychecktest5verify_winscw.script, 1000, UDEB#UREL,%SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiCertstore.bat some_swicertstore.dat,%SECURITYSOURCEDIR%\testframework\test\autotesting\setupSwiCertstore.bat swicertstore.dat
-
-TESTEXECUTE, \logs\testexecute\testswiobserver.htm,, -Dstartupmode=1 -- z:\tswi\tswiobserver\scripts\testswiobserver.script, 300, UDEB#UREL,,
-swiobservertest.exe, \swiobservertest.log,, , 800, UDEB#UREL,,
-swiobservertestoom.exe, \swiobservertestoom.log,, , 800, UDEB#UREL,,
-
-
-[SwiDiran]
-TESTEXECUTE, \logs\testexecute\tswiregcompfields.htm,, \tswi\tuiscriptadaptors\scripts\tswiregcompfields.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tswtype.htm,, \tswi\tuiscriptadaptors\scripts\tswtype.script, 300, UDEB#UREL,,
-
-[SISInstaller]
-tIntegritySupport, \tisrecovery.log,, -Dtextshell -- \tIntegritySupport\scripts\tisrecovery.txt \tisrecovery.log, 300, UDEB#UREL,, \epoc32\winscw\c\tIntegritySupport\scripts\batchfiles\tIntegritySupport_post.bat
-tIntegritySupport, \tisrecoveryapp.log,, -Dtextshell -- \tIntegritySupport\scripts\tisrecoveryapp.txt \tisrecoveryapp.log, 300, UDEB#UREL,,
-
-tInstalledAppsRegistry, \tInstalledAppsRegistry.log,, -Dtextshell -- \tInstalledAppsRegistry\scripts\script1.txt \tInstalledAppsRegistry.log, 300, UDEB#UREL, \epoc32\winscw\c\tInstalledAppsRegistry\scripts\batchfiles\tInstalledAppsRegistry_pre.bat, \epoc32\winscw\c\tInstalledAppsRegistry\scripts\batchfiles\tInstalledAppsRegistry_post.bat
-
-
-
-[ToolsLegacy]
-
-# Interpretsis Test Harness
-PERL, \interpretsis_test_harness.txt,,\epoc32\winscw\c\tswi\tinterpretsisinteg\runtest1.pl native, 1000, UDEB,,
-
-# DUMPSIS test
-PERL, \dumpsis_test.txt,,\epoc32\winscw\c\tswi\tdumpsis\testDumpsis.pl, 300, UDEB,,\epoc32\winscw\c\tswi\tdumpsis\postdumpsistest.bat
-
-# Interpretsis
-PERL, \interpretsis_test.txt,,\epoc32\winscw\c\tswi\tinterpretsis\runtests.pl, 300, UDEB,, 
-
-[SisTools]
-# MAKESIS test
-# program,log,commdb,script,timeout,release,pre cmd,post cmd
-PERL, \createandsignunicode.txt,,\epoc32\winscw\c\tswi\tsignsis\createandsignunicode.pl, 300, UDEB#UREL,,
-
-PERL, \makesis_test.txt,,\epoc32\winscw\c\tswi\testMakesis.pl, 300, UDEB,, 
-
-# SIGNSIS test
-PERL, \signsis_test.txt,,\epoc32\winscw\c\tswi\tsignsis\testSignsis.pl, 300, UDEB,,
-
-[ToolsNew]
-
-# Interpretsis
-PERL, \interpretsis_test.txt,,\epoc32\winscw\c\tswi\tinterpretsis\runtests.pl usif, 300, UDEB,, 
-
-# Interpretsis Test Harness
-PERL, \interpretsis_test_harness.txt,,\epoc32\winscw\c\tswi\tinterpretsisinteg\runtest1.pl usifnative, 1000, UDEB,,
-
-# Interpretsis Test Harness - This test is for testing the installation using database to store registration information.
-PERL, \interpretsis_test_harness_db.txt,,\epoc32\winscw\c\tswi\tinterpretsisinteg\runtest1.pl usif, 1000, UDEB,,
-
-# tdbtool 
-PERL, \tdbtool.txt,,\epoc32\winscw\c\tswi\tdbtool\tdbtool.pl, 300, UDEB,,\epoc32\winscw\c\tswi\tdbtool\postdbtool.bat 
-
-# DUMPSIS test for USIF
-PERL, \dumpsis_test_usif.txt,,\epoc32\winscw\c\tswi\tdumpsis\testDumpsis.pl usif, 300, UDEB,,\epoc32\winscw\c\tswi\tdumpsis\postdumpsistest.bat
-
-[SwiTools]
-# DUMPCHAINVALIDITY test
-PERL, \dumpchainvalidity_test.txt,,\epoc32\winscw\c\tswi\tchainvalidity\testChainValidity.pl, 300, UDEB,,
-# DUMPINSTALLFILESTATUS test
-PERL, \dumpinstallstatus_test.txt,,\epoc32\winscw\c\tswi\tinstallfilestatus\testInstallStatus.pl, 300, UDEB,,
-
-[SwiTools95Only]
-# DUMPSWICERTSTORE test
-PERL, \dumpswicertstore_test.txt,,\epoc32\winscw\c\tswi\tdumpcertstore\testswiCertstore.pl, 600, UDEB,\epoc32\winscw\c\tswi\tdumpcertstore\predumpcertstoretest.bat, \epoc32\winscw\c\tswi\tdumpcertstore\postdumpcertstoretest.bat
-# DUMPSWIREGISTRY test
-PERL, \dumpregistry_test.txt,,\epoc32\winscw\c\tswi\tdumpregistry\testregistry.pl, 300, UDEB,,
-
-TESTEXECUTE, \logs\testexecute\tauthkeys.htm,,-Dstartupmode=1 --  \tauth\tauthkeys\scripts\tauthkeys.script, 30, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tauthdb.htm,, -Dstartupmode=1 --  \tauth\tauthdb\scripts\tauthdb.script, 30, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tauthcliserv.htm,, -Dstartupmode=1 --   \tauth\tauthcliserv\scripts\tauthcliserv.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tauthcliserv_debug.htm,,-Dstartupmode=1 --    \tauth\tauthcliserv\scripts\tauthcliserv_debug.script, 30, UDEB,,
-TESTEXECUTE, \logs\testexecute\tauthexpr.htm,,-Dstartupmode=1 --  \tauth\tauthexpr\scripts\tauthexpr.script, 500, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tauthplugins.htm,, -Dstartupmode=1 --  \tauth\tauthplugins\scripts\tauthplugins.script, 30, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tauthsvr2.htm,, -Dstartupmode=1 --  \tauth\tauthsvr\scripts\tauthsvr2.script, 1600, UDEB#UREL,,\epoc32\winscw\c\tauth\tauthsvr\scripts\post_tauthsvr.bat
-TESTEXECUTE, \logs\testexecute\tpostmarketplugin.htm,, -Dstartupmode=1 --  \tauth\tauthsvr\scripts\tpostmarketplugin.script, 1600, UDEB#UREL,,\epoc32\winscw\c\tauth\tauthsvr\scripts\post_postmarketplugin.bat
-TESTEXECUTE, \logs\testexecute\tpostmarketplugin_macroenabled.htm,, -Dstartupmode=1 --  \tauth\tauthsvr\scripts\tpostmarketplugin_macroenabled.script, 1600, UDEB#UREL,\epoc32\winscw\c\tauth\tauthsvr\scripts\pre_postmarketplugin.bat,\epoc32\winscw\c\tauth\tauthsvr\scripts\post_postmarketplugin.bat
-TESTEXECUTE, \logs\testexecute\tauthsvroom.htm,, -Dstartupmode=1 --   \tauth\tauthsvr\scripts\tauthsvroom.script, 5000, UDEB#UREL,,
-# Scan for unexpected panics in epocwind.out files
-PERL, \panicscanlog.txt,,\epoc32\winscw\c\tswi\panicscan_authserver.pl, 300, UDEB,,
-
-
-
-[StreamingCAF]
-#Streaming CAF Tests
-TESTEXECUTE, \logs\testexecute\tscaf.htm,,-Dtextshell --  z:\tcaf\tscaf\tscaf.script, 300, UDEB#UREL, ,
-TESTEXECUTE, \logs\testexecute\tscaf_oom.htm,,-Dtextshell --  z:\tcaf\tscaf\tscaf_oom.script, 300, UDEB, ,
-
-[USIF]
-#Universal Software Install Framework Tests
-TESTEXECUTE, \logs\testexecute\usifsecuritytests.htm,,z:\tusif\securitytests\usifsecuritytests.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tsifintegration.htm,,z:\tusif\tsifintegration\tsifintegration.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tsif.htm,,z:\tusif\tsif\tsif.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tsifoom.htm,,z:\tusif\tsif\tsifoom.script, 300, UDEB,,
-TESTEXECUTE, \logs\testexecute\tscr.htm,,z:\tusif\tscr\tscr.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tsts_bootuptimerecovery.htm,,z:\tusif\tsts\tsts_bootuptimerecovery.script, 300, UDEB#UREL, \epoc32\data\z\tusif\tsts\batchfiles\tsts_bootuptimerecovery.bat,
-TESTEXECUTE, \logs\testexecute\tsts_rollbackall.htm,,z:\tusif\tsts\tsts_rollbackall.script, 300, UDEB#UREL, ,
-TESTEXECUTE, \logs\testexecute\tsts.htm,,z:\tusif\tsts\tsts.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tsts_tintegrityservices.htm,,z:\tusif\tsts\tintegrityservices\scripts\tsts_tintegrityservices.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tsifrefinstaller.htm,,z:\tusif\tsifrefinstaller\tsifrefinstaller.script, 300, UDEB#UREL,,
-
-[SecurityTools]
-# Security tools tests
-PERL, \security_tools\tcertapp\tCertapp_Output.txt,, \epoc32\winscw\c\security_tools\tcertapp\run_tcertapp.pl, 1600, UDEB#UREL,,
-t_certapps, \SDP-Security_Tools-CertApp-CCDAT-EMU00.log,, -Dtextshell -- \security_tools\tcertapp\SDP-Security_Tools-CertApp-CCDAT-EMU00.txt \SDP-Security_Tools-CertApp-CCDAT-EMU00.log, 300, UDEB#UREL, \epoc32\winscw\c\security_tools\tcertapp\pre_tcertapp.bat, \epoc32\winscw\c\security_tools\tcertapp\post_tcertapp.bat
-t_certstore, \SDP-Security_Tools-CertApp-FILEDAT-EMU00.log,, -Dtextshell -- \security_tools\tcertapp\SDP-Security_Tools-CertApp-FILEDAT-EMU00.txt \SDP-Security_Tools-CertApp-FILEDAT-EMU00.log, 600, UDEB#UREL, \epoc32\winscw\c\security_tools\tcertapp\pre_tcertapp.bat, \epoc32\winscw\c\security_tools\tcertapp\post_tcertapp.bat
-t_certstore, \SDP-Security_Tools-CertApp-SWIDAT-EMU00.log,, -Dtextshell -- \security_tools\tcertapp\SDP-Security_Tools-CertApp-SWIDAT-EMU00.txt \SDP-Security_Tools-CertApp-SWIDAT-EMU00.log, 600, UDEB#UREL, \epoc32\winscw\c\security_tools\tcertapp\pre_tcertapp.bat, \epoc32\winscw\c\security_tools\tcertapp\post_tcertapp.bat
-
-
-[Misc]
-# Check that there are no test certificates in invalid locations in the source code
-PERL, \checklocationofcertificateslog.txt,, \epoc32\winscw\c\checklocationofcertificates.pl %SECURITYSOURCEDIR%, 300, UDEB,,
-
-# Scan for occurrences of "C: , EDriveC and [<index>]='C' in source files
-PERL, \cdrivewarnings.htm,,\epoc32\winscw\c\cdrive.pl --exclude=\epoc32\winscw\c\cdrive_exclude.txt --excludedir=%SECURITYSOURCEDIR%\usif\scr\sqlite_secure\ --log=cdrivewarnings.htm %SECURITYSOURCEDIR%,300,UDEB,,
-
-# Categorisation tags are checked for all of security sub-system 
-PERL, \searchtags.txt,,\epoc32\winscw\c\tswi\searchtags.pl, 300, UDEB,,
-
-[UptoMCL]
-# Scan for unexpected panics in epocwind.out files
-PERL, \panicscanlog.txt,,\epoc32\winscw\c\tswi\panicscan.pl, 300, UDEB,,
-# END of file
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/test_spec_sdp_9.5.txt	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,744 +0,0 @@
-# This file defines a test specification for all the MCL codelines and consists
-# of the two following sections: COMPONENT ASSIGNMENT and TEST DEFINITION
-#
-# COMPONENT ASSIGNMENT - this section assigns components (defined below) to
-# codelines they should be run for.
-#
-# TEST DEFINITION - this section defines Security tests and assigns them to
-# components. A component is defined using square brackets and its scope ends
-# at the next component. A component can be a Security component, for example
-# [SWI], [JMI], [Crypto] but also a group of various tests, for example [Misc]
-# that contains panicscan.pl and cdrive.pl.
-# It is strongly recommended to use the UDEB#UREL option if possible in order
-# to define the udeb and urel tests at once.
-#
-
-# Tests are executed according to the sequence in the TEST DEFINITION section.
-#
-# WARNING - There must not be more than one test block for any of the components.  
-# E.g. SWI has one and only one [SWI] section in this file.  Otherwise 
-# %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\test_launcher.pl will be broken.
-
-  
-###############################################################################
-#                             COMPONENT ASSIGNMENT                            #
-###############################################################################
-{tb92SF}=Init,Crypto,CryptoTokens,CAF2,CAF296,Common,Certman,Asnpkcs,Filetokens,CryptoSpi,UPS,StreamingCAF,SecurityTools,Misc
-{tb101SF}=Init,Crypto,CryptoTokens,CAF2,CAF296,CAF2Future,Common,Certman,Asnpkcs,Filetokens,FileTokens_UseAuth,CryptoSpi,UPS,AuthServer,StreamingCAF,SecurityTools,Misc,FileTokens_HwImpl
-
-
-###############################################################################
-#                               TEST DEFINITION                               #
-###############################################################################
-
-# Each test defines the following:
-# program,log,commdb,script,timeout(secs),release,pre cmd,post cmd
-
-# Configuration 1
-
-[Init]
-# Setup the emulator network support and backup/restore emulator drives.
-TESTEXECUTE, \logs\testexecute\dummytefscript.htm,, \dummytefscript.script, 2500, UDEB, \epoc32\winscw\c\config_udeb.bat, 
-TESTEXECUTE, \logs\testexecute\dummytefscript.htm,, \dummytefscript.script, 2500, UREL, \config_urel.bat, 
-
-
-
-[Crypto]
-thash, \hashlog.txt,, -Dtextshell --, 2500, UDEB,, 
-thash, \hashlog.txt,, -Dtextshell --, 2500, UREL,, 
-t_random, \t_random.log,, -Dtextshell --, 300, UDEB#UREL,,
-
-# Padding tests - these run using testexecute
-TESTEXECUTE, \logs\testexecute\tpadding.htm,, -Dtextshell -- \tpadding\tpadding.script, 300, UDEB,,
-TESTEXECUTE, \logs\testexecute\tpaddingudeb.htm,, -Dtextshell -- \tpadding\tpaddingudeb.script, 300, UDEB,,
-
-# CRYPTO 
-# CRYPTO TMS SUPPORT
-tasymmetric, \logs\testexecute\tasymmetrictests.htm,, -Dtextshell -- \tasymmetric\tasymmetrictests.script \logs\testexecute\tasymmetrictests.htm, 300, UDEB#UREL,,
-tsymmetric, \logs\testexecute\tsymmetrictests.htm,, -Dtextshell -- \tsymmetric\tsymmetrictests.script \logs\testexecute\tsymmetrictests.htm, 300, UDEB#UREL,,
-tsymmetric, \logs\testexecute\AESECBVectorsScript.htm,, -Dtextshell -- \tsymmetric\AESECBVectorsScript.script \logs\testexecute\AESECBVectorsScript.htm, 300, UDEB#UREL,,
-tsymmetric, \logs\testexecute\AESECB_KAT_VT.htm,, -Dtextshell -- \tsymmetric\AESECB_KAT_VT.script \logs\testexecute\AESECB_KAT_VT.htm, 300, UDEB#UREL,,
-tsymmetric, \logs\testexecute\AESECB_KAT_VK.htm,, -Dtextshell -- \tsymmetric\AESECB_KAT_VK.script \logs\testexecute\AESECB_KAT_VK.htm, 300, UDEB#UREL,,
-tsymmetric, \logs\testexecute\AESMonteCarloEncryptECB128.htm,, -Dtextshell -- \tsymmetric\AESMonteCarloEncryptECB128.script \logs\testexecute\AESMonteCarloEncryptECB128.htm, 300, UDEB#UREL,,
-tsymmetric, \logs\testexecute\AESMonteCarloEncryptECB192.htm,, -Dtextshell -- \tsymmetric\AESMonteCarloEncryptECB192.script \logs\testexecute\AESMonteCarloEncryptECB192.htm, 300, UDEB#UREL,,
-tsymmetric, \logs\testexecute\AESMonteCarloEncryptECB256.htm,, -Dtextshell -- \tsymmetric\AESMonteCarloEncryptECB256.script \logs\testexecute\AESMonteCarloEncryptECB256.htm, 300, UDEB#UREL,,
-tsymmetric, \logs\testexecute\AESMonteCarloDecryptECB128.htm,, -Dtextshell -- \tsymmetric\AESMonteCarloDecryptECB128.script \logs\testexecute\AESMonteCarloDecryptECB128.htm, 300, UDEB#UREL,,
-tsymmetric, \logs\testexecute\AESMonteCarloDecryptECB192.htm,, -Dtextshell -- \tsymmetric\AESMonteCarloDecryptECB192.script \logs\testexecute\AESMonteCarloDecryptECB192.htm, 300, UDEB#UREL,,
-tsymmetric, \logs\testexecute\AESMonteCarloDecryptECB256.htm,, -Dtextshell -- \tsymmetric\AESMonteCarloDecryptECB256.script \logs\testexecute\AESMonteCarloDecryptECB256.htm, 300, UDEB#UREL,,
-tsymmetric, \logs\testexecute\AESMonteCarloEncryptCBC128.htm,, -Dtextshell -- \tsymmetric\AESMonteCarloEncryptCBC128.script \logs\testexecute\AESMonteCarloEncryptCBC128.htm, 300, UDEB#UREL,,
-tsymmetric, \logs\testexecute\AESMonteCarloEncryptCBC192A.htm,, -Dtextshell -- \tsymmetric\AESMonteCarloEncryptCBC192A.script \logs\testexecute\AESMonteCarloEncryptCBC192A.htm, 300, UDEB#UREL,,
-tsymmetric, \logs\testexecute\AESMonteCarloEncryptCBC192B.htm,, -Dtextshell -- \tsymmetric\AESMonteCarloEncryptCBC192B.script \logs\testexecute\AESMonteCarloEncryptCBC192B.htm, 300, UDEB#UREL,,
-tsymmetric, \logs\testexecute\AESMonteCarloEncryptCBC256.htm,, -Dtextshell -- \tsymmetric\AESMonteCarloEncryptCBC256.script \logs\testexecute\AESMonteCarloEncryptCBC256.htm, 300, UDEB#UREL,,
-tsymmetric, \logs\testexecute\AESMonteCarloDecryptCBC128.htm,, -Dtextshell -- \tsymmetric\AESMonteCarloDecryptCBC128.script \logs\testexecute\AESMonteCarloDecryptCBC128.htm, 300, UDEB#UREL,,
-tsymmetric, \logs\testexecute\AESMonteCarloDecryptCBC192.htm,, -Dtextshell -- \tsymmetric\AESMonteCarloDecryptCBC192.script \logs\testexecute\AESMonteCarloDecryptCBC192.htm, 300, UDEB#UREL,,
-tsymmetric, \logs\testexecute\AESMonteCarloDecryptCBC256.htm,, -Dtextshell -- \tsymmetric\AESMonteCarloDecryptCBC256.script \logs\testexecute\AESMonteCarloDecryptCBC256.htm, 300, UDEB#UREL,,
-tsymmetric, \logs\testexecute\symmetricOOMtests.htm,, -Dtextshell -- \tsymmetric\symmetricOOMtests.script  \logs\testexecute\symmetricOOMtests.htm, 300, UDEB#UREL,,
-
-tbigint, \logs\testexecute\tconstruction.htm,, -Dtextshell -- \tbigint\tconstructiontests.script \logs\testexecute\tconstruction.htm, 300, UDEB#UREL,,
-tbigint, \logs\testexecute\tbasicmaths.htm,, -Dtextshell -- \tbigint\tbasicmathstests.script \logs\testexecute\tbasicmaths.htm, 1500, UDEB#UREL,,
-tbigint, \logs\testexecute\tmontgomery.htm,, -Dtextshell -- \tbigint\tmontgomerytests.script \logs\testexecute\tmontgomery.htm, 300, UDEB#UREL,,
-tbigint, \logs\testexecute\tprime.htm,, -Dtextshell -- \tbigint\tprimetests.script \logs\testexecute\tprime.htm, 300, UDEB#UREL,,
-tbigint, \logs\testexecute\tprime2.htm,, -Dtextshell -- \tbigint\tprimetests2.script \logs\testexecute\tprime2.htm, 600, UDEB#UREL,,
-tbigint, \logs\testexecute\tprimegen.htm,, -Dtextshell -- \tbigint\tprimegen.script \logs\testexecute\tprimegen.htm, 300, UDEB#UREL,,
-tbigint, \logs\testexecute\tprimefailure.htm,, -Dtextshell -- \tbigint\tprimefailuretests.script \logs\testexecute\tprimefailure.htm, 300, UDEB#UREL,,
-
-tpkcs5kdf, \logs\testexecute\tpkcs12kdftests.htm,, -Dtextshell -- \tpkcs5kdf\tpkcs12kdftests.script \logs\testexecute\tpkcs12kdftests.htm, 600, UDEB#UREL,,
-TPBE, \logs\testexecute\tpbetestsv2.htm,, -Dtextshell -- \tpbe\tpbetests_v2.script \logs\testexecute\tpbetestsv2.htm, 3000, UDEB#UREL,,
-
-
-
-[CryptoTokens]
-T_CTFRAMEWORK, \T_CTFRAMEWORKlog.txt,, -Dtextshell --, 300, UDEB#UREL,,
-
-
-
-[CAF2] 
-# Requires the following additional components to be built: RefTestAgent
-TESTEXECUTE, \logs\testexecute\TCAF.htm,, z:\TCAF\TCAF.script,1800, UDEB#UREL,\techview.bat,
-TESTEXECUTE, \logs\testexecute\RTA.htm,, z:\RTA\RTA.script,1800, UDEB#UREL,\techview.bat,
-TESTEXECUTE, \logs\testexecute\tcafnodrmcap.htm,, z:\tcaf\tcafnodrmcap.script,300, UDEB#UREL,\techview.bat,
-
-[CAF296]
-# Should be run v9.6 onwards
-TESTEXECUTE, \logs\testexecute\RTA_64bit.htm,, z:\RTA\rta_64bit.script,1800, UDEB#UREL,\techview.bat,
-TESTEXECUTE, \logs\testexecute\consumerstep_64bit.htm,, z:\tcaf\consumerstep_64bit.script,1800, UDEB#UREL,\techview.bat,
-
-[CAF2Future]
-# Should run for vfuture onwards.
-TESTEXECUTE, \logs\testexecute\tcafwmdrmsupport.htm,, z:\tcaf\tcafwmdrmsupport.script,1800, UDEB#UREL,\techview.bat,
-TESTEXECUTE, \logs\testexecute\tmtputils.htm,, z:\tcaf\tmtputils\tmtputils.script,1800, UDEB#UREL,\techview.bat,
-TESTEXECUTE, \logs\testexecute\tcafhelper.htm,, z:\tcaf\tcafhelper.script,1800, UDEB#UREL,\techview.bat,
-
-[StreamingCAF]
-#Streaming CAF Tests
-TESTEXECUTE, \logs\testexecute\tscaf.htm,,-Dtextshell --  z:\tcaf\tscaf\tscaf.script, 300, UDEB#UREL, ,
-TESTEXECUTE, \logs\testexecute\tscaf_oom.htm,,-Dtextshell --  z:\tcaf\tscaf\tscaf_oom.script, 300, UDEB, ,
-
-
-
-[Common]
-TESTEXECUTE, \logs\testexecute\trecogcert.htm,, \trecog\trecogcert.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\trecogpkcs12.htm,, \trecog\trecogpkcs12.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tsecurityutils.htm,, z:\tsecurityutils\tsecurityutils.script, 300, UDEB#UREL,,
-
-[recjava]
-TESTEXECUTE, \logs\testexecute\trecogjava.htm,, \trecog\trecogjava.script, 300, UDEB#UREL,,
-
-
-[JavaMIDletInstaller]
-# Test JMI CenRep's production version initialization file
-tjmicenrep, \jmicenreptest.log,, -Dtextshell --, 300, UDEB, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cenrep_prod.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cenrep.bat
-tjmicenrep, \jmicenreptest.log,, -Dtextshell --, 300, UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cenrep_prod.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cenrep.bat
-
-tJavaHelper, \tJavaDRMUREL.log,, \tJavaHelper\Scripts\tJavaDRM.txt \tJavaDRMUREL.log, 300, UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_jmi.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat
-tJavaHelper, \tJavaDRMUDEB.log,, \tJavaHelper\Scripts\tJavaDRM.txt \tJavaDRMUDEB.log, 300, UDEB, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_jmi.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat
-
-tJavaRegistry, \tJavaRegistry.log,, -Dstartupmode=1 \tJavaRegistry\scripts\script1.txt  \tJavaRegistry.log, 300, UDEB#UREL,\epoc32\winscw\c\itharnessmidp\scripts\batchfiles\cenrep_cleanup.bat,
-
-tJavaFile, \tJavaFilemidpjar.log,, -Dstartupmode=1 \tJavaFile\scripts\midpjartest.txt \tJavaFilemidpjar.log, 300, UDEB#UREL,\epoc32\winscw\c\itharnessmidp\scripts\batchfiles\cenrep_cleanup.bat,
-tJavaFile, \tJavaFilemidpjad.log,, -Dstartupmode=1 \tJavaFile\Scripts\midpjadtest.txt \tJavaFilemidpjad.log, 300, UDEB#UREL,\epoc32\winscw\c\itharnessmidp\scripts\batchfiles\cenrep_cleanup.bat,
-tJavaFile, \tJavaFileattribute.log,, -Dstartupmode=1 \tJavaFile\Scripts\attributestest.txt \tJavaFileattribute.log, 300, UDEB#UREL,\epoc32\winscw\c\itharnessmidp\scripts\batchfiles\cenrep_cleanup.bat,
-
-tJavaHelper, \tJavaHelper.log,, -Dstartupmode=1 \tJavaHelper\Scripts\MIDPLaunchInfoTest.txt \tJavaHelper.log, 300, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\cenrep_cleanup.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat
-tJavaHelper, \tJavaInstaller.log,, -Dstartupmode=1 \tJavaHelper\Scripts\tJavaInstaller.txt \tJavaInstaller.log, 3000, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\jardownloaderwithauto.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat
-tJavaHelper, \tJavaInstallerocsp.log,, \tJavaHelper\Scripts\tJavaInstallerocsp.txt \tJavaInstallerocsp.log, 1500, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\jardownloaderwithauto.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat
-tJavaHelper, \tjmiocsphttpfilter.log,, \tJavaHelper\Scripts\tjmiocsphttpfilter.txt \tjmiocsphttpfilter.log, 1500, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\jardownloaderwithauto.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat
-tJavaHelper, \tjmiocspallerrors.log,, \tJavaHelper\Scripts\tjmiocspallerrors.txt \tjmiocspallerrors.log, 1500, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_jmiocspallerrors.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmiocspallerrors.bat
-tJavaHelper, \tjmiocspfilterallerrors.log,, \tJavaHelper\Scripts\tjmiocspfilterallerrors.txt \tjmiocspfilterallerrors.log, 1500, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_jmiocspallerrors.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmiocspallerrors.bat
-tJavaHelper, \tjavainstall_noplugin.log,, -Dstartupmode=1 \tJavaHelper\Scripts\tjavainstall_noplugin.txt \tjavainstall_noplugin.log, 600, UDEB#UREL, \epoc32\winscw\c\tjavahelper\scripts\backup_jmi_plugin.bat, \epoc32\winscw\c\tjavahelper\scripts\restore_jmi_plugin.bat
-tJavaHelper, \tjavarunoninstall.log,, -Dstartupmode=1 \tJavaHelper\Scripts\tjavarunoninstall.txt \tjavarunoninstall.log, 3600, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\jardownloaderwithauto.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat
-tJavaHelper, \tJavaMultiInstaller.log,, -Dstartupmode=1 \tJavaHelper\Scripts\tJavaMultiInstaller.txt \tJavaMultiInstaller.log, 300, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cert_copy.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat
-
-tJavaHelper, \tjmiotaex.log,, -Dstartupmode=1 \tJavaHelper\Scripts\tjmiotaex.txt \tjmiotaex.log, 600, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\jardownloaderwithauto.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat
-tJavaHelper, \tjmioom.log,, -Dstartupmode=1 \tJavaHelper\Scripts\tjmioom.txt \tjmioom.log, 3300, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\jardownloaderwithauto.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat
-
-
-TESTEXECUTE, \logs\testexecute\tjavahelperserver.htm,,  -Dtextshell -- \private\10204805\scripts\tjavahelperserver.script, 300, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\cenrep_cleanup.bat,  \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat
-
-tJarDownloader, \tJarDownloader.log,, -Dstartupmode=1 \tJarDownloader\scripts\script1.txt \tJarDownloader.log, 300, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\jardownloaderwithauto.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat
-
-TESTEXECUTE, \logs\testexecute\tmidletuaheaderfilter.htm,,  -Dtextshell -- \tmidletuaheaderfilter\tmidletuaheaderfilter.script, 600, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_jmi.bat, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\preparetjardownloader.bat
-
-ITHARNESSMIDP, \itharnessmidp-conf1.log,, \JAVATEST.TXT \itharnessmidp-conf1.log, 1600, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cert_copy.bat,
-ITHARNESSMIDP, \itharnessmidp-conf2.log,, \JAVATEST2.TXT \itharnessmidp-conf2.log, 600, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\backup_jmi_autodeletefiles.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\replace_jmi_autodeletefiles.bat
-ITHARNESSMIDP, \itharnessmidp-conf3.log,, \JAVATEST3.TXT \itharnessmidp-conf3.log, 300, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cert_copy.bat,
-ITHARNESSMIDP, \itharnessmidp-conf4.log,, \OTATests.txt \itharnessmidp-conf4.log, 1200, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_otasetup.bat, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_jmi_cleanup.bat revertotasetup
-ITHARNESSMIDP, \leavetest.log,, \leavetest.txt \leavetest.log, 600, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cert_copy.bat auto.cfg,
-ITHARNESSMIDP, \itharnessmidp-conf5.log,, \javaiaptest.txt \itharnessmidp-conf5.log, 1200, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cert_copy.bat prompt.cfg, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\runced c:\auto.cfg
-
-ITHARNESSMIDP, \itharnessmidp-ocsp-default.log,, \itharnessmidp\scripts\ocsp-Default.txt \itharnessmidp-ocsp-default.log, 300, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cert_copy.bat ocsp-default,
-ITHARNESSMIDP, \itharnessmidp-ocsp-allWarnings.log,, \itharnessmidp\scripts\ocsp-allWarnings.txt \itharnessmidp-ocsp-allWarnings.log, 600, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cert_copy.bat ocsp-allWarnings,
-ITHARNESSMIDP, \itharnessmidp-ocsp-allErrors.log,, \itharnessmidp\scripts\ocsp-allErrors.txt \itharnessmidp-ocsp-allErrors.log, 300, UDEB#UREL, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\pre_cert_copy_allerrors.bat ocsp-allErrors, \epoc32\winscw\c\itharnessmidp\scripts\batchfiles\post_cert_copy_allerrors.bat
-
-# WinSignMIDlet test
-PERL, \winsignmidlet_test.txt,, -Dtextshell -- %SECURITYSOURCEDIR%\JavaMIDletInstaller\test\tWinSignMIDlet\testwinsignmidlet.pl, 300, UDEB#UREL,,
-
-
-
-[Certman]
-# PKCS7 tests - these run using testexecute
-TESTEXECUTE, \logs\testexecute\tpkcs7_v2.htm,, -Dtextshell --  \tpkcs7\tpkcs7_v2.script, 300, UDEB#UREL,,
-
-# PKCS12 tests - these run using testexecute
-TESTEXECUTE, \logs\testexecute\tpkcs12lib.htm,, -Dtextshell -- \tpkcs12intg\data\tpkcs12lib.script, 600, UDEB#UREL,,
-# CMS tests - these run using testexecute
-TESTEXECUTE, \logs\testexecute\tcms.htm,, -Dtextshell -- \tpkcs7\tcms.script, 300, UDEB#UREL,,
-# CMS tests by integration - these run using testexecute
-TESTEXECUTE, \logs\testexecute\tinteg_cms.htm,, -Dtextshell -- \tpkcs7\tinteg_cms.script, 1200, UDEB#UREL,,
-# New tpkcs10 testframe work these run using testexecute
-TESTEXECUTE, \logs\testexecute\tpkcs10_v2.htm,, -Dtextshell --  \tpkcs10\scripts\tpkcs10_v2.script, 900, UDEB#UREL, \epoc32\winscw\c\tpkcs10\batchfiles\t_pkcs10_backup.bat, \epoc32\winscw\c\tpkcs10\batchfiles\t_pkcs10_cleanup.bat
-#New tpkixcert tests using TEF framework
-TESTEXECUTE, \logs\testexecute\tpkixcert_tef.htm,, -Dtextshell --  \tpkixcert_tef\scripts\tpkixcert_tef.script, 900, UDEB#UREL,,
-
-# TMS SUPPORT
-TASN1, \logs\testexecute\TASN1.htm,, -Dtextshell -- \tasn1\scripts\tasn1.script \logs\testexecute\tasn1.htm, 300, UDEB#UREL,, \epoc32\winscw\c\tasn1\scripts\batchfiles\tasn1_cleanup.bat
-Tx509, \logs\testexecute\tx509.htm,, -Dtextshell -- \tx509\scripts\tx509.script \logs\testexecute\tx509.htm, 300, UDEB#UREL,, \epoc32\winscw\c\tx509\scripts\batchfiles\tx509_cleanup.bat
-Tx509, \logs\testexecute\tx509_dev_certs.htm,, -Dtextshell -- \tx509\scripts\tx509_dev_certs.script \logs\testexecute\tx509_dev_certs.htm, 300, UDEB#UREL,,
-Tx509, \logs\testexecute\outFileOOM1.htm,, -Dtextshell -- \TX509\SCRIPTS\TX509-OOM1.script \logs\testexecute\outFileOOM1.htm, 300, UDEB#UREL,, \epoc32\winscw\c\tx509\scripts\batchfiles\tx509_cleanup.bat
-Tx509, \logs\testexecute\outFileOOM2.htm,, -Dtextshell -- \TX509\SCRIPTS\TX509-OOM2.script \logs\testexecute\outFileOOM2.htm, 300, UDEB#UREL,,
-Tx509, \logs\testexecute\tx509_dev_certs_oom.htm,, -Dtextshell -- \tx509\scripts\tx509_dev_certs_oom.script \logs\testexecute\tx509_dev_certs_oom.htm, 300, UDEB#UREL,,
-tx509, \logs\testexecute\tx509_dnames.htm,, -Dtextshell -- \tx509\scripts\tx509-dnames.script \logs\testexecute\tx509_dnames.htm, 300, UDEB#UREL,,
-
-# TMS SUPPORT
-TWTLSCERT, \logs\testexecute\twtlscert.htm,, -Dtextshell -- \twtlscert\scripts\twtlscert.script \logs\testexecute\twtlscert.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-TWTLSCERT, \logs\testexecute\wtlstests1.htm,, -Dtextshell -- \twtlscert\scripts\TWTLSCERT1.script \logs\testexecute\wtlstests1.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-TWTLSCERT, \logs\testexecute\wtlstests2.htm,, -Dtextshell -- \twtlscert\scripts\TWTLSCERT2.script \logs\testexecute\wtlstests2.htm, 300, UDEB#UREL,, \epoc32\winscw\c\twtlscert\scripts\batchfiles\twtlscert_cleanup.bat
-TWTLSCERT, \logs\testexecute\wtlstests3.htm,, -Dtextshell -- \twtlscert\scripts\TWTLSCERT3.script \logs\testexecute\wtlstests3.htm, 900, UDEB#UREL,, \epoc32\winscw\c\twtlscert\scripts\batchfiles\twtlscert_cleanup.bat
-
-# TMS SUPPORT
-TPKIXCERT, \logs\testexecute\TPKIXCERT_log1.htm,,	-Dtextshell -- \TPKIXCERT\SCRIPTS\TPKIXTEST_part1.script \logs\testexecute\TPKIXCERT_log1.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-TPKIXCERT, \logs\testexecute\TPKIXCERT_log2.htm,,	-Dtextshell -- \TPKIXCERT\SCRIPTS\TPKIXTEST_part2.script \logs\testexecute\TPKIXCERT_log2.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-TPKIXCERT, \logs\testexecute\TPKIXCERT_logcancel.htm,, -Dtextshell -- \TPKIXCERT\SCRIPTS\CANCEL1.script \logs\testexecute\TPKIXCERT_logcancel.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-TPKIXCERT, \logs\testexecute\TPKIXCERT_logoom1.htm,, -Dtextshell -- \TPKIXCERT\SCRIPTS\OOM1.script \logs\testexecute\TPKIXCERT_logoom1.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-TPKIXCERT, \logs\testexecute\TPKIXCERT_logoom2.htm,, -Dtextshell -- \TPKIXCERT\SCRIPTS\OOM2.script \logs\testexecute\TPKIXCERT_logoom2.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-TPKIXCERT, \logs\testexecute\TPKIXCERT_logoom3.htm,, -Dtextshell -- \TPKIXCERT\SCRIPTS\OOM3.script \logs\testexecute\TPKIXCERT_logoom3.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-TPKIXCERT, \logs\testexecute\TPKIXCERT_logoom4.htm,, -Dtextshell -- \TPKIXCERT\SCRIPTS\OOM4.script \logs\testexecute\TPKIXCERT_logoom4.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-
-
-# TMS SUPPORT
-tocsp, \logs\testexecute\tocsp_openssl.htm,,         \system\tocsp\scripts\openssl.script       \logs\testexecute\tocsp_openssl.htm,          300, UDEB, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	\epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
-tocsp, \logs\testexecute\tocsp_logxcert_local.htm,,  \system\tocsp\scripts\xcert-local.script   \logs\testexecute\tocsp_logxcert_local.htm,   300, UDEB, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	\epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
-tocsp, \logs\testexecute\tocsp_logopenssl_local.htm,, \system\tocsp\scripts\openssl-local.script \logs\testexecute\tocsp_logopenssl_local.htm, 300, UDEB, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	\epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
-tocsp, \logs\testexecute\tocsp_logerror.htm,,        \system\tocsp\scripts\error.script         \logs\testexecute\tocsp_logerror.htm,         300, UDEB, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	\epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
-tocsp, \logs\testexecute\tocsp_defaultpolicy.htm,,   \system\tocsp\scripts\defaultpolicy.script \logs\testexecute\tocsp_defaultpolicy.htm,    300, UDEB,,
-tocsp, \logs\testexecute\tocsp_newpolicy.htm,,       \system\tocsp\scripts\newpolicy.script     \logs\testexecute\tocsp_newpolicy.htm,        300, UDEB, \epoc32\winscw\c\system\tocsp\scripts\setupocsppolicy.bat 2002b28b-new.txt, 	\epoc32\winscw\c\system\tocsp\scripts\setupocsppolicy.bat 2002b28b.txt
-tocsp, \logs\testexecute\tocsp_httpinterface.htm,,   \system\tocsp\scripts\httpinterface.script \logs\testexecute\tocsp_httpinterface.htm,	 300, UDEB, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	\epoc32\winscw\c\tcertstore\scripts\batchfiles\post_httpinterface_restore.bat
-
-tocsp, \logs\testexecute\tocsp_openssl.htm,, -Dtextshell --          \system\tocsp\scripts\openssl.script 	    \logs\testexecute\tocsp_openssl.htm,          300, UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	   \epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
-tocsp, \logs\testexecute\tocsp_logxcert_local.htm,, -Dtextshell --   \system\tocsp\scripts\xcert-local.script   \logs\testexecute\tocsp_logxcert_local.htm,   300, UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	   \epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
-tocsp, \logs\testexecute\tocsp_logopenssl_local.htm,, -Dtextshell -- \system\tocsp\scripts\openssl-local.script \logs\testexecute\tocsp_logopenssl_local.htm, 300, UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	   \epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
-tocsp, \logs\testexecute\tocsp_logerror.htm,, -Dtextshell --         \system\tocsp\scripts\error.script         \logs\testexecute\tocsp_logerror.htm,         300, UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	   \epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
-tocsp, \logs\testexecute\tocsp_defaultpolicy.htm,, -Dtextshell --    \system\tocsp\scripts\defaultpolicy.script \logs\testexecute\tocsp_defaultpolicy.htm,    300, UREL, \epoc32\winscw\c\system\tocsp\scripts\setupocsppolicy_urel.bat donothing,
-tocsp, \logs\testexecute\tocsp_newpolicy.htm,, -Dtextshell --        \system\tocsp\scripts\newpolicy.script     \logs\testexecute\tocsp_newpolicy.htm,        300, UREL, \epoc32\winscw\c\system\tocsp\scripts\setupocsppolicy_urel.bat 2002b28b-new.txt,  \epoc32\winscw\c\system\tocsp\scripts\setupocsppolicy_urel.bat 2002b28b.txt
-tocsp, \logs\testexecute\tocsp_httpinterface.htm,, -Dtextshell --    \system\tocsp\scripts\httpinterface.script \logs\testexecute\tocsp_httpinterface.htm,    300, UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	   \epoc32\winscw\c\tcertstore\scripts\batchfiles\post_httpinterface_restore.bat
-tocsp, \logs\testexecute\tocsp_logoom.htm,, -Dtextshell -- 			\system\tocsp\scripts\xcert-oom.script     \logs\testexecute\tocsp_logoom.htm,           900, UDEB#UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\pre_tocsp_backup.bat, 	\epoc32\winscw\c\tcertstore\scripts\batchfiles\post_tocsp_restore.bat
-
-
-# TMS SUPPORT
-t_certstore, \logs\testexecute\tcertstore_conf1.1.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore1-conf1.script \logs\testexecute\tcertstore_conf1.1.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certstore, \logs\testexecute\tcertstore_conf1.2.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore2-conf1.script \logs\testexecute\tcertstore_conf1.2.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certstore, \logs\testexecute\tcertstore_conf1.3.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore3-conf1.script \logs\testexecute\tcertstore_conf1.3.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certstore, \logs\testexecute\t_handle_1.htm,, -Dtextshell -- \tcertstore\scripts\t_handle_1.script \logs\testexecute\t_handle_1.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-
-//TEF Format
-t_certstore, \logs\testexecute\t_certstore_sha2.htm,, -Dtextshell -- \tcertstore\scripts\t_certstore_sha2.script \logs\testexecute\t_certstore_sha2.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-
-# TMS SUPPORT
-t_certstore, \logs\testexecute\tcertstore_oom.conf1.1.htm,, -Dtextshell -- \tcertstore\scripts\oom1.script \logs\testexecute\tcertstore_oom.conf1.1.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certstore, \logs\testexecute\tcertstore_oom.conf1.2.htm,, -Dtextshell -- \tcertstore\scripts\oom2.script \logs\testexecute\tcertstore_oom.conf1.2.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certstore, \logs\testexecute\tcertstore_oom.conf1.3.htm,, -Dtextshell -- \tcertstore\scripts\oom3.script \logs\testexecute\tcertstore_oom.conf1.3.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certstore, \logs\testexecute\tcertstore_cancel.conf1.1.htm,, -Dtextshell -- \tcertstore\scripts\cancel1.script \logs\testexecute\tcertstore_cancel.conf1.1.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certstore, \logs\testexecute\tcertstore_dsa.conf1.htm,, -Dtextshell -- \tcertstore\scripts\dsa.script \logs\testexecute\tcertstore_dsa.conf1.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certstore, \logs\testexecute\tcertstore_reload.htm,, -Dtextshell -- \tcertstore\scripts\reload.script \logs\testexecute\tcertstore_reload.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certstore, \logs\testexecute\tcertstore_apipolicing.htm,, -Dtextshell -- \tcertstore\scripts\apipolicing.script \logs\testexecute\tcertstore_apipolicing.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certstore, \logs\testexecute\tcertstore_errors.htm,, -Dtextshell -- \tcertstore\scripts\filecertstore_errors.script \logs\testexecute\tcertstore_errors.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-
-
-
-# Configuration 2
-# Configuration 2 - TMS SUPPORT
-t_certstore, \logs\testexecute\tcertstore_conf2.1.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore1-conf2.script \logs\testexecute\tcertstore_conf2.1.htm, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\Configuration2.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\enableplugin.bat 
-t_certstore, \logs\testexecute\tcertstore_conf2.2.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore2-conf2.script \logs\testexecute\tcertstore_conf2.2.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\cert_backup1.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certstore, \logs\testexecute\tcertstore_conf2.3.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore3-conf2.script \logs\testexecute\tcertstore_conf2.3.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\cert_backup1.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-
-
-# Configuration 2a (asynch store)
-# Configuration 2a TMS SUPPORT
-t_certstore, \logs\testexecute\tcertstore_conf2a.1.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore1-conf2.script  \logs\testexecute\tcertstore_conf2a.1.htm, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\Configuration2a.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\enableplugin.bat 
-t_certstore, \logs\testexecute\tcertstore_conf2a.2.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore2-conf2a.script \logs\testexecute\tcertstore_conf2a.2.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\cert_backup1.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certstore, \logs\testexecute\tcertstore_conf2a.3.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore3-conf2.script  \logs\testexecute\tcertstore_conf2a.3.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\cert_backup1.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-
-
-# Configuration 3
-# Configuration 3 TMS SUPPORT
-t_certstore, \logs\testexecute\tcertstore_conf3.1.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore1-conf3.script \logs\testexecute\tcertstore_conf3.1.htm, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\Configuration3.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\enableplugin.bat
-t_certstore, \logs\testexecute\tcertstore_conf3.2.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore2-conf3.script \logs\testexecute\tcertstore_conf3.2.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\cert_backup2.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certstore, \logs\testexecute\tcertstore_conf3.3.htm,, -Dtextshell -- \tcertstore\scripts\unifiedcertstore3-conf3.script \logs\testexecute\tcertstore_conf3.3.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\cert_backup2.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-
-
-# Configuration multicertstore
-
-t_certstore, \logs\testexecute\tcertstore_multi.htm,, -Dtextshell -- \tcertstore\scripts\multiplecertstoresfilter.script \logs\testexecute\tcertstore_multi.htm, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\Configurationmulti.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\enableplugin.bat
-
-# Configuration multicertstore 1
-
-t_certstore, \logs\testexecute\tcertstore_multi.1.htm,, -Dtextshell -- \tcertstore\scripts\multiplecertstoresfilter1.script \logs\testexecute\tcertstore_multi.1.htm, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\Configurationmulti1.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\enableplugin.bat
-
-# Configuration multicertstore 2
-
-t_certstore, \logs\testexecute\tcertstore_multi.2.htm,, -Dtextshell -- \tcertstore\scripts\multiplecertstoresfilter2.script \logs\testexecute\tcertstore_multi.2.htm, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\Configurationmulti2.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\enableplugin.bat
-
-# Configuration 4
-# Configuration 4 TMS SUPPORT
-t_certstore, \logs\testexecute\swicertstore1.htm,, -Dtextshell --          \tcertstore\scripts\swicertstore1.script \logs\testexecute\swicertstore1.htm,       300, UDEB#UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_backup.bat, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_restore.bat
-t_certstore, \logs\testexecute\swicertstore2.htm,, -Dtextshell --          \tcertstore\scripts\swicertstore2.script \logs\testexecute\swicertstore2.htm,       300, UDEB#UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_backup.bat, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_restore.bat 
-t_certstore, \logs\testexecute\swicertstore4.htm,, -Dtextshell --          \tcertstore\scripts\swicertstore4.script \logs\testexecute\swicertstore4.htm,       300, UDEB#UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_backup.bat, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_restore.bat 
-t_certstore, \logs\testexecute\swicertstore_oom.htm,, -Dtextshell --    -o \tcertstore\scripts\swicertstore1.script \logs\testexecute\swicertstore_oom.htm,    300, UDEB#UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_backup.bat, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_restore.bat 
-t_certstore, \logs\testexecute\swicertstore_cancel.htm,, -Dtextshell -- -c \tcertstore\scripts\swicertstore1.script \logs\testexecute\swicertstore_cancel.htm, 300, UDEB#UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_backup.bat, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_restore.bat
-t_certstore, \logs\testexecute\wri-swicertstore1.htm,, -Dtextshell --      \tcertstore\scripts\wri-swicertstore1.script \logs\testexecute\wri-swicertstore1.htm,300, UDEB#UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_backup.bat, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_restore.bat
-t_certstore, \logs\testexecute\wri-swicertstore2.htm,, -Dtextshell --      \tcertstore\scripts\wri-swicertstore2.script \logs\testexecute\wri-swicertstore2.htm,300, UDEB#UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_backup.bat, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_restore.bat
-
-
-# Configuration 5
-# Configuration 5 TMS SUPPORT
-t_certstore, \logs\testexecute\wri-swicertstore3.htm,, -Dtextshell --      \tcertstore\scripts\wri-swicertstore3.script \logs\testexecute\wri-swicertstore3.htm,300, UDEB#UREL, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_backup1.bat, \epoc32\winscw\c\tcertstore\scripts\batchfiles\swicert_restore.bat
-
-
-######### Composite Certstore Testing###################################################################################
-# Composite Certstore Testing - TMS SUPPORT
-
-t_certstore, \logs\testexecute\tfilecertstore01.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore01.script \logs\testexecute\tfilecertstore01.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore 5 void, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tfilecertstore02.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore02.script \logs\testexecute\tfilecertstore02.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore corrupt 6 5, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tfilecertstore03.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore03.script \logs\testexecute\tfilecertstore03.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore corrupt 4 5 3, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tfilecertstore04.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore04.script \logs\testexecute\tfilecertstore04.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore corrupt 6 5 3, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tfilecertstore05.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore05.script \logs\testexecute\tfilecertstore05.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore corrupt 4 5, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tfilecertstore06.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore06.script \logs\testexecute\tfilecertstore06.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore corrupt 1, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tfilecertstore07.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore07.script \logs\testexecute\tfilecertstore07.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore corrupt 4 3 2, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tfilecertstore08.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore08.script \logs\testexecute\tfilecertstore08.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore corrupt middle 3 2, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tfilecertstore09.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore09.script \logs\testexecute\tfilecertstore09.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore corrupt 1 3 2, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tfilecertstore10.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore10.script \logs\testexecute\tfilecertstore10.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore 5 3 2, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tfilecertstore11.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore11.script \logs\testexecute\tfilecertstore11.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore renamed 1 3 2, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tfilecertstore12.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore12.script \logs\testexecute\tfilecertstore12.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore 3 2, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tfilecertstore13.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore13.script \logs\testexecute\tfilecertstore13.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore corrupt 3 2 1, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tfilecertstore14.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore14.script \logs\testexecute\tfilecertstore14.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore corrupt middle 2 1, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tfilecertstore15.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore15.script \logs\testexecute\tfilecertstore15.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore corrupt 0 2 1, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tfilecertstore16.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore16.script \logs\testexecute\tfilecertstore16.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore 2 1, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tfilecertstore17.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore17.script \logs\testexecute\tfilecertstore17.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore void, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tfilecertstore18.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tfilecertstore18.script \logs\testexecute\tfilecertstore18.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialisefilecertstore 5 3 2 1 0, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-
-t_certstore, \logs\testexecute\tswicertstore01.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore01.script \logs\testexecute\tswicertstore01.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore 5 void, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tswicertstore02.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore02.script \logs\testexecute\tswicertstore02.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore corrupt 6 5, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tswicertstore03.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore03.script \logs\testexecute\tswicertstore03.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore corrupt 4 5 3, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tswicertstore04.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore04.script \logs\testexecute\tswicertstore04.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore corrupt 6 5 3, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tswicertstore05.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore05.script \logs\testexecute\tswicertstore05.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore corrupt 4 5, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tswicertstore06.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore06.script \logs\testexecute\tswicertstore06.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore corrupt 1, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tswicertstore07.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore07.script \logs\testexecute\tswicertstore07.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore corrupt 4 3 2, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tswicertstore08.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore08.script \logs\testexecute\tswicertstore08.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore corrupt middle 3 2, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tswicertstore09.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore09.script \logs\testexecute\tswicertstore09.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore corrupt 1 3 2, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tswicertstore10.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore10.script \logs\testexecute\tswicertstore10.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore 5 3 2, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tswicertstore11.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore11.script \logs\testexecute\tswicertstore11.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore renamed 1 3 2, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tswicertstore12.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore12.script \logs\testexecute\tswicertstore12.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore 3 2, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tswicertstore13.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore13.script \logs\testexecute\tswicertstore13.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore corrupt 3 2 1, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tswicertstore14.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore14.script \logs\testexecute\tswicertstore14.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore corrupt middle 2 1, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tswicertstore15.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore15.script \logs\testexecute\tswicertstore15.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore corrupt 0 2 1, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tswicertstore16.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore16.script \logs\testexecute\tswicertstore16.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore 2 1, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tswicertstore17.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore17.script \logs\testexecute\tswicertstore17.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore void, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tswicertstore18.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore18.script \logs\testexecute\tswicertstore18.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore 5 3 2 1 0, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-t_certstore, \logs\testexecute\tswicertstore19.htm,, -Dtextshell -- \tcertstore\multiple_certstore\scripts\tswicertstore19.script \logs\testexecute\tswicertstore19.htm, 600, UDEB#UREL, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/initialise_certstore.bat initialiseswicertstore writable void, /epoc32/winscw/c/tcertstore/multiple_certstore/scripts/batchfiles/cleanup_certstore.bat
-
-
-######### Composite Certstore Testing###################################################################################
-
-
-[SWI]
-# Requires the following additional components to be built: SisTools, Certman
-
-TESTEXECUTE, \logs\testexecute\dummytefscript.htm,, \dummytefscript.script, 2500, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\copyswitestfiles.bat,
-
-#NQP Tests for DataProvider
-TESTEXECUTE, \logs\testexecute\tdataprovider.htm,, -Dstartupmode=1 -- z:\tswi\tdataprovider\scripts\tdataprovider.script, 600, UDEB#UREL,,
-
-TESTEXECUTE, \logs\testexecute\testwritableswicertstore.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testwritableswicertstore.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\copytuiscriptadaptors.bat, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\cleanswicertstore.bat
-TESTEXECUTE, \logs\testexecute\tsilent_winscw.htm,, \tswi\tuiscriptadaptors\scripts\tsilent_winscw.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\copytuiscriptadaptors.bat, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\cleanswicertstore.bat
-TESTEXECUTE, \logs\testexecute\tswidaemonstub.htm,, \tswi\tuiscriptadaptors\scripts\tswidaemonstub.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\inc098114_winscw.htm,, \tswi\tuiscriptadaptors\scripts\inc098114_winscw.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\copytuiscriptadaptors.bat
-TESTEXECUTE, \logs\testexecute\tcleanupinfrastructure.htm,, \tswi\tuiscriptadaptors\scripts\tcleanupinfrastructure.script, 300, UDEB#UREL,\epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\tcleanupinfrastructure_pre.bat, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\tcleanupinfrastructure_post.bat
-
-TESTEXECUTE, \logs\testexecute\tsis.htm,, \tswi\tsis\scripts\tsis.script, 600, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tsis_signed.htm,, -Dstartupmode=1 -- \tswi\tsis\scripts\tsis_signed.script, 600, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tsis_failure.htm,, -Dstartupmode=1 -- \tswi\tsis\scripts\tsis_failure.script, 600, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tsis_large.htm,, -Dstartupmode=1 -- \tswi\tsis\scripts\tsis_large.script, 600, UDEB#UREL,, 
-TESTEXECUTE, \logs\testexecute\tsis_new_recognizer.htm,, \tswi\tsis\scripts\tsis_new_recognizer.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tsis\batchfiles\new_recognizer_pre.bat, \epoc32\winscw\c\tswi\tsis\batchfiles\new_recognizer_post.bat
-TESTEXECUTE, \logs\testexecute\tsishelper.htm,, -Dstartupmode=1 -- \tswi\tsishelper\scripts\tsishelper.script, 300, UDEB#UREL,,
-
-[IntegrityServices]
-TESTEXECUTE, \logs\testexecute\tstartuprecovery.htm,, \tswi\tintegrityservices\scripts\tstartuprecovery.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tintegrityservices\scripts\batchfiles\recoverystartup_pre.bat,
-TESTEXECUTE, \logs\testexecute\tintegrityservices.htm,, -Dstartupmode=1 -- \tswi\tintegrityservices\scripts\tintegrityservices.script, 300, UDEB#UREL,,
-
-[SWI]
-TESTEXECUTE, \logs\testexecute\testexpressions.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testexpressions.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testdrives.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testdrives.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testlocations.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testlocations.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testupgrades.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testupgrades.script, 300, UDEB#UREL,\epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\copytuiscriptadaptors.bat, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\cleanswicertstore.bat
-
-TESTEXECUTE, \logs\testexecute\testaugmentations.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testaugmentations.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testpreinstalled.htm,, \tswi\tuiscriptadaptors\scripts\testpreinstalled.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testpreinstalled_delete.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testpreinstalled_delete.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_deletepreinstalledfiles.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\testdependencies.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testdependencies.script, 300, UDEB#UREL,,
-
-TESTEXECUTE, \logs\testexecute\tuiscriptadaptors.htm,, \tswi\tuiscriptadaptors\scripts\tuiscriptadaptors.script, 10000, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\tuiscriptadaptors_pre.bat, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\tuiscriptadaptors_post.bat
-TESTEXECUTE, \logs\testexecute\tuiscriptadaptors_winscw.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\tuiscriptadaptors_winscw.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\copytuiscriptadaptors.bat,
-TESTEXECUTE, \logs\testexecute\testvids.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testvids.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tuiscriptadaptorsFH.htm,, \tswi\tuiscriptadaptors\scripts\tuiscriptadaptorsFH.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\useautocfg.bat,
-
-TESTEXECUTE, \logs\testexecute\testrucert.htm,, \tswi\tuiscriptadaptors\scripts\testrucert.script, 500, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\romupdate_withoutstubs_pre.bat, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\romupdate_withoutstubs_post.bat
-
-TESTEXECUTE, \logs\testexecute\testrun.htm,, \tswi\tuiscriptadaptors\scripts\testrun.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_shortrunwait.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\testrunft.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testrunft.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_shortrunwait.ini,
-
-TESTEXECUTE, \logs\testexecute\testrun2.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testrun2.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_notallowrun.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\testshutdown.htm,, \tswi\tuiscriptadaptors\scripts\testshutdown.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testasync.htm,, \tswi\tuiscriptadaptors\scripts\testasync.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\useautocfg.bat,
-TESTEXECUTE, \logs\testexecute\testasynccancel.htm,, \tswi\tuiscriptadaptors\scripts\testasynccancel.script, 3000, UDEB#UREL,,
-
-TESTEXECUTE, \logs\testexecute\tsisstub.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\tsisstub.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tsisstub_delete.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\tsisstub_delete.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_deletepreinstalledfiles.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\testasynccaps.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testasynccaps.script, 300, UDEB#UREL,,
-
-TESTEXECUTE, \logs\testexecute\devcerts_match.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_match.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\useautosimtsycfg.bat, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\useautocfg.bat
-TESTEXECUTE, \logs\testexecute\devcerts_mismatch.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_mismatch.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\devcerts_aggregate.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_aggregate.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\devcerts_corrupt.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_corrupt.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\devcerts_ocsp.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_ocsp.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\devcerts_backuprestore.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_backuprestore.script, 300, UDEB#UREL,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\useautosimtsycfg.bat, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\useautocfg.bat
-TESTEXECUTE, \logs\testexecute\devcerts_backup.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_backup.script, 300, UDEB#UREL,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\useautosimtsycfg.bat, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\useautocfg.bat
-TESTEXECUTE, \logs\testexecute\devcerts_restore.htm,, -Dstartupmode=1 -- \tswi\tdevcerts\scripts\devcerts_restore.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\changedevid.bat, \epoc32\winscw\c\tswi\tdevcerts\scripts\batchfiles\devcerts_restore_post.bat
-
-TESTEXECUTE, \logs\testexecute\tsisregistrytest.htm,, -Dstartupmode=1 -- \tswi\tsisregistrytest\scripts\tsisregistrytest.script, 1500, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\useautocfg.bat, \epoc32\winscw\c\tswi\tsisregistrytest\Scripts\batchfiles\tsisregistrytest_post.bat
-TESTEXECUTE, \logs\testexecute\testVFPOnEmulator.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testVFPOnEmulator.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tdaemon.htm,, -Dstartupmode=1 -- \tswi\tdaemon\scripts\tdaemon.script, 300, UDEB#UREL,,  
-
-# createandsignunicode.pl needs to be run as it builds some SIS files the following tests rely on, however it is a SisTools test so it is run through a batch file and the results not recorded here
-TESTEXECUTE, \logs\testexecute\dummytefscript.htm,, \dummytefscript.script, 2500, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\callcreateandsignunicode.bat,
-TESTEXECUTE, \logs\testexecute\tbackuprestore.htm,, -Dstartupmode=1 -- \tswi\tbackuprestore\scripts\tbackuprestore.script, 1500, UDEB#UREL,\epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_pre.bat, \epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_post.bat
-TESTEXECUTE, \logs\testexecute\tbackuprestoredrive_emulator.htm,, -Dstartupmode=1 -- \tswi\tbackuprestore\scripts\tbackuprestoredrive_emulator.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tbackuprestore_emulator.htm,, -Dstartupmode=1 -- \tswi\tbackuprestore\scripts\tbackuprestore_emulator.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_pre.bat, \epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_post.bat
-TESTEXECUTE, \logs\testexecute\tbackuprestore_policy_prepost_emulator.htm,, -Dstartupmode=1 -- \tswi\tbackuprestore\scripts\tbackuprestore_policy_prepost_emulator.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_policy_pre.bat, \epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_policy_post.bat
-TESTEXECUTE, \logs\testexecute\tbackuprestore_policylst_certfst_emulator.htm,, -Dstartupmode=1 -- \tswi\tbackuprestore\scripts\tbackuprestore_policylst_certfst_emulator.script, 300, UDEB#UREL, ,
-TESTEXECUTE, \logs\testexecute\tbackuprestore_cert_prepost_emulator.htm,, -Dstartupmode=1 -- \tswi\tbackuprestore\scripts\tbackuprestore_cert_prepost_emulator.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_cert_pre.bat, \epoc32\winscw\c\tswi\tbackuprestore\scripts\batchfiles\tbackuprestore_cert_post.bat
-TESTEXECUTE, \logs\testexecute\tbackuptrestore_exploratory.htm,, -Dstartupmode=1 -- \tswi\tbackuprestore\scripts\tbackuptrestore_exploratory.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tgenbackupmeta_udeb.htm,, -Dstartupmode=1 -- \tswi\tgenbackupmeta\scripts\tgenbackupmeta_udeb.script, 300, UDEB,\epoc32\winscw\c\tswi\tgenbackupmeta\scripts\premeta.bat,
-TESTEXECUTE, \logs\testexecute\tgenbackupmeta_urel.htm,, -Dstartupmode=1 -- \tswi\tgenbackupmeta\scripts\tgenbackupmeta_urel.script, 300, UREL,\epoc32\winscw\c\tswi\tgenbackupmeta\scripts\premeta.bat,
-
-TESTEXECUTE, \logs\testexecute\tgenbackupmeta_mandatory_udeb.htm,, -Dstartupmode=1 -- \tswi\tgenbackupmeta\scripts\tgenbackupmeta_mandatory_udeb.script, 300,UDEB,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiCertstore.bat swicertstore_mandatory.dat,\epoc32\winscw\c\tswi\tgenbackupmeta\scripts\postmeta.bat
-TESTEXECUTE, \logs\testexecute\tgenbackupmeta_mandatory_urel.htm,, -Dstartupmode=1 -- \tswi\tgenbackupmeta\scripts\tgenbackupmeta_mandatory_urel.script, 300,UREL,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiCertstore.bat swicertstore_mandatory.dat,\epoc32\winscw\c\tswi\tgenbackupmeta\scripts\postmeta.bat
-TESTEXECUTE, \logs\testexecute\trevocation.htm,, -Dstartupmode=1 -- \tswi\trevocation\scripts\trevocation.script, 600, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\trevocation_unsigned.htm,, -Dstartupmode=1 -- \tswi\trevocation\scripts\trevocation_unsigned.script, 600, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_allowunsigned.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\tautosigning.htm,, -Dstartupmode=1 -- \tswi\tautosigning\scripts\tautosigning.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testdrm.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testdrm.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testdrmasync.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testdrmasync.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testdrmFH.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testdrmFH.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testdiskfullemulator.htm,, \tswi\tuiscriptadaptors\scripts\testdiskfullemulator.script, 300, UDEB#UREL,,
-
-TESTEXECUTE, \logs\testexecute\testcancel.htm,, \tswi\tuiscriptadaptors\scripts\testcancel.script, 1500, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testmandatory.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testmandatory.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiCertstore.bat swicertstore_mandatory.dat, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiCertstore.bat swicertstore.dat
-TESTEXECUTE, \logs\testexecute\testnotargetdevices.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testnotargetdevices.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_incompifnotargetdevices.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\testsystemcaps.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testsystemcaps.script, 300, UDEB, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiCertstore.bat swicertstore.dat,
-TESTEXECUTE, \logs\testexecute\testsystemcaps.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testsystemcaps.script, 300, UREL,,
-TESTEXECUTE, \logs\testexecute\testusercaps.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testusercaps.script, 300, UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini,
-TESTEXECUTE, \logs\testexecute\testusercaps.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testusercaps.script, 300, UDEB,,
-
-TESTEXECUTE, \logs\testexecute\testusercaps_nousergrantcaps.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testusercaps_nousergrantcaps.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_nousergrantcaps.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\testusercaps_restrictedusercaps.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testusercaps_restrictedusercaps.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_restrictedusercaps.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\testnoorphanedoverwrite.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testnoorphanedoverwrite.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_noorphanedoverwrite.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\overwriteprivate.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\overwriteprivate.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_noprotectedorphanoverwrite.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini 
-TESTEXECUTE, \logs\testexecute\overwriteprivate_positive.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\overwriteprivate_positive.script, 300, UDEB, \epoc32\release\winscw\UDEB\Z\tswi\tuiscriptadaptors\scripts\overwriteprivate_positive.bat swipolicy.ini 
-TESTEXECUTE, \logs\testexecute\overwriteprivate_positive.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\overwriteprivate_positive.script, 300, UREL,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini 
-TESTEXECUTE, \logs\testexecute\testallowunsigned.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testallowunsigned.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_allowunsigned.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\tpathsubst.htm,, -Dstartupmode=1 -- \tswi\tpathsubst\scripts\tpathsubst.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_pathsubst.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\tpathsubstsysdrive.htm,, -Dstartupmode=1 -- \tswi\tpathsubst\scripts\tpathsubstsysdrive.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_verifysysdrive.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-
-TESTEXECUTE, \logs\testexecute\tpropagation_winscw.htm,, -Dtextshell -- \tswi\tuiscriptadaptors\scripts\tpropagation_winscw.script, 600, UDEB#UREL,,
-
-
-TESTEXECUTE, \logs\testexecute\testeclipseemulator.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testeclipseemulator.script, 300, UDEB#UREL,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\pre_testeclipseemulator.bat,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\delstubtemp.bat
-
-TESTEXECUTE, \logs\testexecute\testeclipse.htm,, \tswi\tuiscriptadaptors\scripts\testeclipse.script, 500, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\testeclipse_pre.bat,\epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\testeclipse_post.bat
-
-TESTEXECUTE, \logs\testexecute\swicaptests.htm,, -Dstartupmode=1 -- \tswi\swicaptests\scripts\swicaptests.script, 500, UDEB#UREL,,
-
-TESTEXECUTE, \logs\testexecute\testappinuse.htm,, \tswi\tuiscriptadaptors\scripts\testappinuse.script, 1500, UDEB#UREL,,
-
-
-TESTEXECUTE, \logs\testexecute\switermination.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\switermination.script, 500, UDEB#UREL,,
-
-TESTEXECUTE, \logs\testexecute\tuileavedialog.htm,, \tswi\tuiscriptadaptors\scripts\tuileavedialog.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\tuileavedialog_pre.bat, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\tuileavedialog_post.bat
-TESTEXECUTE, \logs\testexecute\tuileavedialogasync.htm,, \tswi\tuiscriptadaptors\scripts\tuileavedialogasync.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\tuileavedialog_pre.bat, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\tuileavedialog_post.bat
-
-TESTEXECUTE, \logs\testexecute\cr956_test.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\cr956_test.script, 2000, UDEB#UREL,,
-
-TESTEXECUTE, \logs\testexecute\testuninstallation.htm,, \tswi\tuiscriptadaptors\scripts\testuninstallation.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\testuninstallation_pre.bat, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-
-TESTEXECUTE, \logs\testexecute\tuninstallpkgs.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\tuninstallpkgs.script, 1000, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testlogging.htm,, -Dstartupmode=1 -- z:\tswi\tsisregistrytest\scripts\testlogging.script, 100, UDEB#UREL,\epoc32\winscw\c\tswi\tsisregistrytest\Scripts\batchfiles\testlogging_pre.bat,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.iniwinscw\c\tswi\tsisregistrytest\Scripts\batchfiles\testlogging_pre.bat,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-
-TESTEXECUTE, \logs\testexecute\test_pa_sapropagated_notdelete.htm,, \tswi\tuiscriptadaptors\scripts\test_pa_sapropagated_notdelete.script, 100, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\testpastub.htm,, \tswi\tuiscriptadaptors\scripts\testpastub.script, 100, UDEB#UREL,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_deletepreinstalledfiles.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-TESTEXECUTE, \logs\testexecute\testsapropagatedstub.htm,, \tswi\tuiscriptadaptors\scripts\testsapropagatedstub.script, 100, UDEB#UREL,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_deletepreinstalledfiles.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-
-
-# Extended Key Usage check while installation of signed sis files.
-TESTEXECUTE, \logs\testexecute\testextension.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testextension.script, 300, UDEB#UREL,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini,
-TESTEXECUTE, \logs\testexecute\testextension_mandatecodesigning.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testextension_mandatecodesigning.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_mandatecodesigning.ini,
-TESTEXECUTE, \logs\testexecute\testextension_alternatecodesigningoid.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testextension_alternatecodesigningoid.script, 300, UDEB#UREL,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_altcodesigningoid.ini,
-TESTEXECUTE, \logs\testexecute\testextension_mandatecodesigning_altcodesigningoid.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testextension_mandatecodesigning_altcodesigningoid.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_mandatecodesigning_altcodesigningoid.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-
-# SwiConsole Tests
-TESTEXECUTE, \logs\testexecute\tswiconsole.htm,, -Dstartupmode=1 -- \tswi\tswiconsole\scripts\tswiconsole.script, 300, UDEB#UREL,
-TESTEXECUTE, \logs\testexecute\tswiconsole_allowunsigned.htm,, -Dstartupmode=1 -- \tswi\tswiconsole\scripts\tswiconsole_allowunsigned.script, 300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_allowunsigned.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-
-TESTEXECUTE, \logs\testexecute\testmulti.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testmulti.script, 300, UDEB#UREL,
-TESTEXECUTE, \logs\testexecute\generateregistrytestdata.htm,, -Dstartupmode=1 -- \tswi\tsisregistrytest\scripts\generateregistrytestdata.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\runregistrytests.htm,, -Dstartupmode=1 -- \tswi\tsisregistrytest\scripts\runregistrytests.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\removeregistrytestdata.htm,, -Dstartupmode=1 -- \tswi\tsisregistrytest\scripts\removeregistrytestdata.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\truststatus.htm,, -Dstartupmode=1 -- \tswi\trevocation\scripts\truststatus.script, 600, UDEB#UREL,, 
-TESTEXECUTE, \logs\testexecute\testtruststatus.htm,, \tswi\tuiscriptadaptors\scripts\testtruststatus.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tresetdevice.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\tresetdevice.script, 600, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy_deletepreinstalledfiles.ini, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiPolicy.bat swipolicy.ini
-
-# Test Non-Removable Flag
-TESTEXECUTE, \logs\testexecute\testnonremovable.htm,, -Dstartupmode=1 -- \tswi\tuiscriptadaptors\scripts\testnonremovable.script, 300, UDEB#UREL, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\testnonremovable_pre.bat, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\testnonremovable_post.bat
-
-# Adorned filename handling tests
-TESTEXECUTE, \logs\testexecute\adornedfilenames.htm,, \tswi\tuiscriptadaptors\scripts\adornedfilenames.script, 300, UDEB#UREL,, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\adornedfilenames_pre.bat, \epoc32\winscw\c\tswi\tuiscriptadaptors\scripts\batchfiles\adornedfilenames_post.bat
-
-# Testing asynchronous cancellation of installation
-TESTEXECUTE, \logs\testexecute\asynccancel.htm,, \tswi\tasynccancel\scripts\asynccancel.script, 10000, UDEB,,
-
-# DevInfoSupport test -
-tdevinfosupport,\swi.log,,-Dtextshell -- ,  300, UDEB,,
-
-# DemandPaging tests - these run using testexecute
-TESTEXECUTE, \logs\testexecute\tdempaging_winscw.htm,, -Dstartupmode=1 -- z:\tswi\tuiscriptadaptors\scripts\tdempaging_winscw.script, 1000, UDEB#UREL,,
-
-#CR0914 Tests
-TESTEXECUTE, \logs\testexecute\integritychecktest.htm,, -Dstartupmode=1 -- z:\tswi\tsisregistrytest\scripts\integritychecktest.script, 1000, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\integritychecktest5Install_winscw.htm,, -Dstartupmode=1 -- z:\tswi\tsisregistrytest\scripts\integritychecktest5Install_winscw.script, 1000, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\integritychecktest5verify_winscw.htm,, -Dstartupmode=1 -- z:\tswi\tsisregistrytest\scripts\integritychecktest5verify_winscw.script, 1000, UDEB#UREL,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiCertstore.bat some_swicertstore.dat,%SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\setupSwiCertstore.bat swicertstore.dat
-
-TESTEXECUTE, \logs\testexecute\testswiobserver.htm,, -Dstartupmode=1 -- z:\tswi\tswiobserver\scripts\testswiobserver.script, 300, UDEB#UREL,,
-swiobservertest.exe, \swiobservertest.log,, , 800, UDEB#UREL,,
-swiobservertestoom.exe, \swiobservertestoom.log,, , 800, UDEB#UREL,,
-
-
-[SwiDiran]
-TESTEXECUTE, \logs\testexecute\tswiregcompfields.htm,, \tswi\tuiscriptadaptors\scripts\tswiregcompfields.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tswtype.htm,, \tswi\tuiscriptadaptors\scripts\tswtype.script, 300, UDEB#UREL,,
-
-[SISInstaller]
-tIntegritySupport, \tisrecovery.log,, -Dtextshell -- \tIntegritySupport\scripts\tisrecovery.txt \tisrecovery.log, 300, UDEB#UREL,, \epoc32\winscw\c\tIntegritySupport\scripts\batchfiles\tIntegritySupport_post.bat
-tIntegritySupport, \tisrecoveryapp.log,, -Dtextshell -- \tIntegritySupport\scripts\tisrecoveryapp.txt \tisrecoveryapp.log, 300, UDEB#UREL,,
-
-tInstalledAppsRegistry, \tInstalledAppsRegistry.log,, -Dtextshell -- \tInstalledAppsRegistry\scripts\script1.txt \tInstalledAppsRegistry.log, 300, UDEB#UREL, \epoc32\winscw\c\tInstalledAppsRegistry\scripts\batchfiles\tInstalledAppsRegistry_pre.bat, \epoc32\winscw\c\tInstalledAppsRegistry\scripts\batchfiles\tInstalledAppsRegistry_post.bat
-
-
-
-[Asnpkcs]
-# TMS SUPPORT
-TASNPKCS, \logs\testexecute\tasnpkcstests.htm,, -Dtextshell -- \tasnpkcstests.script \logs\testexecute\tasnpkcstests.htm,	 300, UDEB#UREL,,
-
-
-[Filetokens]
-TESTEXECUTE, \logs\testexecute\sec-filetokens-tools.htm,,  -Dstartupmode=1 -- \ttesttools\scripts\sec-filetokens-tools.script, 600, UDEB#UREL, \epoc32\winscw\c\ttesttools\data\pretools.bat, \epoc32\winscw\c\ttesttools\data\posttools.bat
-
-# TMS support
-T_KEYSTORE, \logs\testexecute\tkeystore.htm,,		     -Dstartupmode=1 -- \tkeystore\scripts\tkeystore.script	\logs\testexecute\tkeystore.htm,				300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\RemoveSecDlg.bat, \epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_post.bat 
-
-T_KEYSTORE, \logs\testexecute\tkeystore_authobjects.htm,, -Dstartupmode=1 -- \tkeystore\scripts\authobjects.script  \logs\testexecute\tkeystore_authobjects.htm, 300, UDEB#UREL,, \epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_authobject_post.bat 
-
-T_KEYSTORE, \logs\testexecute\tkeystore_export.htm,,      -Dstartupmode=1 -- \tkeystore\scripts\exportscript.script	\logs\testexecute\tkeystore_export.htm,			300, UDEB#UREL,, 
-T_KEYSTORE, \logs\testexecute\tkeystore_oom.htm,,         -Dstartupmode=1 -- \tkeystore\scripts\oom.script \logs\testexecute\tkeystore_oom.htm,			300, UDEB#UREL,, 
-T_KEYSTORE, \logs\testexecute\tkeystore_cancel.htm,,      -Dstartupmode=1 -- \tkeystore\scripts\cancel.script \logs\testexecute\tkeystore_cancel.htm,			300, UDEB#UREL,, 
-T_KEYSTORE, \logs\testexecute\tkeystore_servoom.htm,,	  -Dstartupmode=1 -- \tkeystore\scripts\servoom.script \logs\testexecute\tkeystore_servoom.htm,			1800, UDEB,, 
-T_KEYSTORE, \logs\testexecute\tkeystore_reload.htm,,      -Dstartupmode=1 -- \tkeystore\scripts\reload.script \logs\testexecute\tkeystore_reload.htm,			300, UDEB#UREL,, 
-
-
-# TMS support
-
-t_certapps, \logs\testexecute\tcertapps.htm,, -Dstartupmode=1 -- \tcertapps\scripts\script1.script \logs\testexecute\tcertapps.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certapps, \logs\testexecute\tcertapps-oom.htm,, -Dstartupmode=1 -- -o \tcertapps\scripts\script1.script \logs\testexecute\tcertapps-oom.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-t_certapps, \logs\testexecute\tcertapps-apipolicing.htm,, -Dstartupmode=1 -- \tcertapps\scripts\apipolicing.script \logs\testexecute\tcertapps-apipolicing.htm, 300, UDEB#UREL, \epoc32\winscw\c\twtlscert\scripts\batchfiles\precert_backup.bat, \epoc32\winscw\c\twtlscert\scripts\batchfiles\postcert_restore.bat
-
-[FileTokens_UseAuth]
-T_KEYSTORE, \logs\testexecute\oldserver_newfeature.htm,,		     -Dstartupmode=1 -- \tkeystore\scripts\oldserver_newfeature.script	\logs\testexecute\oldserver_newfeature.htm,				300, UDEB#UREL, %SECURITYSOURCEDIR%\os\security\cryptomgmtlibs\securitytestfw\test\autotesting\RemoveSecDlg.bat,
-# The batch file run as part of first test is requried for running all tests in this section.
-TESTEXECUTE, \logs\testexecute\initialize.htm,, -Dstartupmode=1 --  \tkeystore\scripts\initialize.script, 100, UDEB#UREL,,
-
-# TMS support
-T_KEYSTORE, \logs\testexecute\tkeystore_nouserregistered.htm,,		     -Dstartupmode=1 -- \tkeystore\scripts\tkeystore_nouserregistered.script	\logs\testexecute\tkeystore_nouserregistered.htm,			300, UDEB#UREL, \epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_useauthserver_pre.bat,
-
-# the execution of this code is a prerequisite for running the keystore tests against the test plugins.
-
-TESTEXECUTE, \logs\testexecute\reg_first_identity.htm,, -Dstartupmode=1 --  \tkeystore\scripts\reg_first_identity.script, 100, UDEB#UREL,,
-# These set of tests run when keystore has been enabled to use authentication server.
-
-# TMS support
-T_KEYSTORE, \logs\testexecute\tkeystore_useauth.htm,,     -Dstartupmode=1 -- \tkeystore\scripts\tkeystore_useauth.script	\logs\testexecute\tkeystore_useauth.htm,			300, UDEB#UREL,, \epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_post.bat 
-T_KEYSTORE, \logs\testexecute\tkeystore_authobjects_useauth.htm,, -Dstartupmode=1 -- \tkeystore\scripts\authobjects_useauth.script	\logs\testexecute\tkeystore_authobjects_useauth.htm,		300, UDEB#UREL,, \epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_authobject_post.bat 
-
-# TMS support
-T_KEYSTORE, \logs\testexecute\tkeystore_export_useauth.htm,,      -Dstartupmode=1 -- \tkeystore\scripts\exportscript_useauth.script	\logs\testexecute\tkeystore_export_useauth.htm,			300, UDEB#UREL,, 
-T_KEYSTORE, \logs\testexecute\tkeystore_oom_useauth.htm,,         -Dstartupmode=1 -- \tkeystore\scripts\oom_useauth.script \logs\testexecute\tkeystore_oom_useauth.htm,			600, UDEB#UREL,, 
-T_KEYSTORE, \logs\testexecute\tkeystore_cancel_useauth.htm,,      -Dstartupmode=1 -- \tkeystore\scripts\cancel_useauth.script \logs\testexecute\tkeystore_cancel_useauth.htm,			300, UDEB#UREL,, 
-T_KEYSTORE, \logs\testexecute\tkeystore_servoom_useauth.htm,,	 -Dstartupmode=1 -- \tkeystore\scripts\servoom_useauth.script \logs\testexecute\tkeystore_servoom_useauth.htm,			6000, UDEB,, 
-T_KEYSTORE, \logs\testexecute\tkeystore_reload_useauth.htm,,      -Dstartupmode=1 -- \tkeystore\scripts\reload_useauth.script \logs\testexecute\tkeystore_reload_useauth.htm,			300, UDEB#UREL,, 
-T_KEYSTORE, \logs\testexecute\tkeystore_capability_useauth.htm,,	 -Dstartupmode=1 -- \tkeystore\scripts\capability_useauth.script \logs\testexecute\tkeystore_capability_useauth.htm,	1800, UDEB#UREL,, 
-T_KEYSTORE, \logs\testexecute\tkeystore_createoldkeystore.htm,,	 -Dstartupmode=1 -- \tkeystore\scripts\createoldkeystore.script		\logs\testexecute\tkeystore_createoldkeystore.htm,	1800, UDEB#UREL,\epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_migrate_pre.bat, \epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_migrate_copykeys.bat
-TESTEXECUTE, \logs\testexecute\keytool_migrate.htm,,  -Dstartupmode=1 -- \ttesttools\scripts\keytool_migrate.script, 600, UDEB#UREL,,
-T_KEYSTORE, \logs\testexecute\tkeystore_testnewkeystore.htm,,	 -Dstartupmode=1 -- \tkeystore\scripts\testnewkeystore.script		\logs\testexecute\tkeystore_testnewkeystore.htm,	1800, UDEB#UREL,\epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_migrate_post.bat, 
-
-
-# TMS support
-T_KEYSTORE, \logs\testexecute\tkeystore_authenticate_useauth.htm,,	 -Dstartupmode=1 -- \tkeystore\scripts\authenticate_useauth.script \logs\testexecute\tkeystore_authenticate_useauth.htm,	1800, UDEB#UREL,, 
-T_KEYSTORE, \logs\testexecute\tkeystore_authentication1.htm,,	 -Dstartupmode=1 -- \tkeystore\scripts\tkeystore_authentication1.script \logs\testexecute\tkeystore_authentication1.htm,	1800, UDEB#UREL,, 
-TESTEXECUTE, \logs\testexecute\reg_second_identity.htm,, -Dstartupmode=1 --  \tkeystore\scripts\reg_second_identity.script, 100, UDEB#UREL,,
-T_KEYSTORE, \logs\testexecute\tkeystore_authentication2.htm,,      -Dstartupmode=1 -- \tkeystore\scripts\tkeystore_authentication2.script \logs\testexecute\tkeystore_authentication2.htm,			300, UDEB#UREL,, \epoc32\winscw\c\tkeystore\scripts\batchfiles\tkeystore_useauthserver_post.bat
-
-
-[ToolsLegacy]
-
-# Interpretsis Test Harness
-PERL, \interpretsis_test_harness.txt,,\epoc32\winscw\c\tswi\tinterpretsisinteg\runtest1.pl native, 1000, UDEB,,
-
-# DUMPSIS test
-PERL, \dumpsis_test.txt,,\epoc32\winscw\c\tswi\tdumpsis\testDumpsis.pl, 300, UDEB,,\epoc32\winscw\c\tswi\tdumpsis\postdumpsistest.bat
-
-[SisTools]
-# MAKESIS test
-# program,log,commdb,script,timeout,release,pre cmd,post cmd
-PERL, \createandsignunicode.txt,,\epoc32\winscw\c\tswi\tsignsis\createandsignunicode.pl, 300, UDEB#UREL,,
-
-PERL, \makesis_test.txt,,\epoc32\winscw\c\tswi\testMakesis.pl, 300, UDEB,, 
-
-# SIGNSIS test
-PERL, \signsis_test.txt,,\epoc32\winscw\c\tswi\tsignsis\testSignsis.pl, 300, UDEB,,
-
-# Interpretsis
-PERL, \interpretsis_test.txt,,\epoc32\winscw\c\tswi\tinterpretsis\runtests.pl, 300, UDEB,, 
-
-[ToolsNew]
-
-# Interpretsis Test Harness
-PERL, \interpretsis_test_harness.txt,,\epoc32\winscw\c\tswi\tinterpretsisinteg\runtest1.pl usifnative, 1000, UDEB,,
-
-# Interpretsis Test Harness - This test is for testing the installation using database to store registration information.
-PERL, \interpretsis_test_harness_db.txt,,\epoc32\winscw\c\tswi\tinterpretsisinteg\runtest1.pl usif, 1000, UDEB,,
-
-# tdbtool 
-PERL, \tdbtool.txt,,\epoc32\winscw\c\tswi\tdbtool\tdbtool.pl, 300, UDEB,,\epoc32\winscw\c\tswi\tdbtool\postdbtool.bat 
-
-# DUMPSIS test for USIF
-PERL, \dumpsis_test_usif.txt,,\epoc32\winscw\c\tswi\tdumpsis\testDumpsis.pl usif, 300, UDEB,,\epoc32\winscw\c\tswi\tdumpsis\postdumpsistest.bat
-
-[SwiTools]
-# DUMPCHAINVALIDITY test
-PERL, \dumpchainvalidity_test.txt,,\epoc32\winscw\c\tswi\tchainvalidity\testChainValidity.pl, 300, UDEB,,
-# DUMPINSTALLFILESTATUS test
-PERL, \dumpinstallstatus_test.txt,,\epoc32\winscw\c\tswi\tinstallfilestatus\testInstallStatus.pl, 300, UDEB,,
-
-[SwiTools95Only]
-# DUMPSWICERTSTORE test
-PERL, \dumpswicertstore_test.txt,,\epoc32\winscw\c\tswi\tdumpcertstore\testswiCertstore.pl, 600, UDEB,\epoc32\winscw\c\tswi\tdumpcertstore\predumpcertstoretest.bat, \epoc32\winscw\c\tswi\tdumpcertstore\postdumpcertstoretest.bat
-# DUMPSWIREGISTRY test
-PERL, \dumpregistry_test.txt,,\epoc32\winscw\c\tswi\tdumpregistry\testregistry.pl, 300, UDEB,,
-
-[CryptoSpi]
-TESTEXECUTE, \logs\testexecute\tcryptospi.htm,, -Dtextshell -- \testdata\tcryptospi\scripts\tcryptospi.script, 900, UDEB#UREL,,
-tmacapiusage.exe, \t_mac_apis.log,, -Dtextshell -- , 600, UDEB#UREL,,
-
-
-[UPS]
-# UPS tests by integration - these run using testexecute
-TESTEXECUTE, \logs\testexecute\tups_integ.htm,, -Dtextshell --  z:\tups\integ\scripts\tups_integ.script, 500, UDEB#UREL,\epoc32\data\Z\tups\integ\scripts\tups_integ_pre.bat, \epoc32\data\Z\tups\integ\scripts\tups_integ_post.bat
-
-#PREQ1262 Tests
-TESTEXECUTE, \logs\testexecute\tupsdb.htm,, -Dtextshell --  z:\tups\tupsdb\scripts\tupsdb.script,300,UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tupsdbperformance.htm,, -Dtextshell --  z:\tups\tupsdb\scripts\tupsdbperformance.script,300,UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tpolicycache.htm,,  z:\tups\tpolicies\scripts\tpolicycache.script,300,UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tpolicyreader.htm,,-Dtextshell --  z:\tups\tpolicies\scripts\tpolicyreader.script,300,UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tserviceconfig.htm,,-Dtextshell --  z:\tups\tpolicies\scripts\tserviceconfig.script,300,UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tpolicycacheoom.htm,,-Dtextshell --  z:\tups\tpolicies\scripts\tpolicycacheoom.script,300,UDEB#UREL,,
-
-dumpupsdb.exe, \upsdb.txt,, -Dtextshell -- -e -db c:\private\10283690\tups.db -f c:\upsdb.txt -t, 800, UDEB#UREL,,
-scstest.exe, \scstest.log,, -Dtextshell --, 800, UDEB#UREL,,
-upstest.exe, \upstest.log,,, 800, UDEB#UREL,,
-upstestobsif.exe, \upstestobsif.log,,, 800, UDEB#UREL,,
-upstestoom.exe, \upstestoom.log,,  , 800, UDEB,,
-upstestobsifoom.exe, \upstestobsifoom.log,, , 800, UDEB,,\epoc32\data\Z\tups\integ\scripts\tups_networkingupsdisable.bat
-tmsgapp.exe, \tmsgapp.log,, -Dtextshell -- , 800, UDEB#UREL,,
-
-
-
-[AuthServer]
-# AuthServer tests
-TESTEXECUTE, \logs\testexecute\tauthkeys.htm,,-Dstartupmode=1 --   \tauth\tauthkeys\scripts\tauthkeys.script, 30, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tauthdb.htm,, -Dstartupmode=1 --  \tauth\tauthdb\scripts\tauthdb.script, 30, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tauthcliserv.htm,, -Dstartupmode=1 --   \tauth\tauthcliserv\scripts\tauthcliserv.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tauthcliserv_debug.htm,,-Dstartupmode=1 --   \tauth\tauthcliserv\scripts\tauthcliserv_debug.script, 30, UDEB,,
-TESTEXECUTE, \logs\testexecute\tauthexpr.htm,, -Dstartupmode=1 --   \tauth\tauthexpr\scripts\tauthexpr.script, 500, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tauthplugins.htm,, -Dstartupmode=1 --   \tauth\tauthplugins\scripts\tauthplugins.script, 30, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tauthsvr2.htm,, -Dstartupmode=1 --  \tauth\tauthsvr\scripts\tauthsvr2.script, 1600, UDEB#UREL,,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\post_tauthsvr.bat
-TESTEXECUTE, \logs\testexecute\tauthsvrclock.htm,, -Dstartupmode=1 --  \tauth\tauthsvr\scripts\tauthsvrclock.script, 1600, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tpostmarketplugin.htm,, -Dstartupmode=1 --   \tauth\tauthsvr\scripts\tpostmarketplugin.script, 1600, UDEB#UREL,,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\post_postmarketplugin.bat
-TESTEXECUTE, \logs\testexecute\tpostmarketplugin_macroenabled.htm,,-Dstartupmode=1 --   \tauth\tauthsvr\scripts\tpostmarketplugin_macroenabled.script, 1600, UDEB#UREL,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\pre_postmarketplugin.bat,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\post_postmarketplugin.bat
-TESTEXECUTE, \logs\testexecute\tpostmarketpluginenabled1_winscw.htm,, -Dstartupmode=1 --  \tauth\tauthsvr\scripts\tpostmarketpluginenabled1_winscw.script, 1600, UDEB#UREL,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\pre_patchdata_positive.bat,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\post_postmarketplugin.bat
-TESTEXECUTE, \logs\testexecute\tpostmarketpluginenabled_winscw.htm,, -Dstartupmode=1 --   \tauth\tauthsvr\scripts\tpostmarketpluginenabled_winscw.script, 1600, UDEB#UREL,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\pre_patchdata_negative.bat,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\post_postmarketplugin.bat
-TESTEXECUTE, \logs\testexecute\tclientsidsupport.htm,, -Dstartupmode=1 --  \tauth\tauthsvr\scripts\tclientsidsupport.script, 1600, UDEB#UREL,,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\post_tclientsidsupport.bat
-TESTEXECUTE, \logs\testexecute\authsecuritytests.htm,, -Dstartupmode=1 --   \tauth\securitytests\scripts\authsecuritytests.script, 1600, UDEB#UREL,, \epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\post_tauthsvr.bat
-TESTEXECUTE, \logs\testexecute\tauthsvroom.htm,, -Dstartupmode=1 --  \tauth\tauthsvr\scripts\tauthsvroom.script, 5000, UDEB#UREL,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\pretauthsvroom.bat,\epoc32\winscw\c\tauth\tauthsvr\scripts\batchfiles\posttauthsvroom.bat
-# Pinplugin test
-TESTEXECUTE, \logs\testexecute\tpinplugin.htm,, -Dstartupmode=1 -- \tauth\tpinplugin\scripts\tpinplugin.script, 300, UDEB#UREL,,
-
-# Scan for unexpected panics in epocwind.out files
-PERL, \panicscanlog.txt,,\epoc32\winscw\c\tswi\panicscan_authserver.pl, 300, UDEB,,
-
-
-
-[USIF]
-#Universal Software Install Framework Tests
-TESTEXECUTE, \logs\testexecute\usifsecuritytests.htm,,z:\tusif\securitytests\usifsecuritytests.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tsifintegration.htm,,z:\tusif\tsifintegration\tsifintegration.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tsif.htm,,z:\tusif\tsif\tsif.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tsifoom.htm,,z:\tusif\tsif\tsifoom.script, 300, UDEB,,
-TESTEXECUTE, \logs\testexecute\tscr.htm,,z:\tusif\tscr\tscr.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tsts_bootuptimerecovery.htm,,z:\tusif\tsts\tsts_bootuptimerecovery.script, 300, UDEB#UREL, \epoc32\data\z\tusif\tsts\batchfiles\tsts_bootuptimerecovery.bat,
-TESTEXECUTE, \logs\testexecute\tsts_rollbackall.htm,,z:\tusif\tsts\tsts_rollbackall.script, 300, UDEB#UREL, ,
-TESTEXECUTE, \logs\testexecute\tsts.htm,,z:\tusif\tsts\tsts.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tsts_tintegrityservices.htm,,z:\tusif\tsts\tintegrityservices\scripts\tsts_tintegrityservices.script, 300, UDEB#UREL,,
-TESTEXECUTE, \logs\testexecute\tsifrefinstaller.htm,,z:\tusif\tsifrefinstaller\tsifrefinstaller.script, 300, UDEB#UREL,,
-
-[SecurityTools]
-# Security tools tests
-PERL, \security_tools\tcertapp\tCertapp_Output.htm,, \epoc32\winscw\c\security_tools\tcertapp\run_tcertapp.pl, 1600, UDEB#UREL,,
-t_certapps, \logs\testexecute\SDP-Security_Tools-CertApp-CCDAT-EMU00.htm,, -Dtextshell -- \security_tools\tcertapp\SDP-Security_Tools-CertApp-CCDAT-EMU00.script \logs\testexecute\SDP-Security_Tools-CertApp-CCDAT-EMU00.htm, 300, UDEB#UREL, \epoc32\winscw\c\security_tools\tcertapp\pre_tcertapp.bat, \epoc32\winscw\c\security_tools\tcertapp\post_tcertapp.bat
-t_certstore, \logs\testexecute\SDP-Security_Tools-CertApp-FILEDAT-EMU00.htm,, -Dtextshell -- \security_tools\tcertapp\SDP-Security_Tools-CertApp-FILEDAT-EMU00.script \logs\testexecute\SDP-Security_Tools-CertApp-FILEDAT-EMU00.htm, 600, UDEB#UREL, \epoc32\winscw\c\security_tools\tcertapp\pre_tcertapp.bat, \epoc32\winscw\c\security_tools\tcertapp\post_tcertapp.bat
-t_certstore, \logs\testexecute\SDP-Security_Tools-CertApp-SWIDAT-EMU00.htm,, -Dtextshell -- \security_tools\tcertapp\SDP-Security_Tools-CertApp-SWIDAT-EMU00.script \logs\testexecute\SDP-Security_Tools-CertApp-SWIDAT-EMU00.htm, 600, UDEB#UREL, \epoc32\winscw\c\security_tools\tcertapp\pre_tcertapp.bat, \epoc32\winscw\c\security_tools\tcertapp\post_tcertapp.bat
-
-[UptoMCL]
-# Scan for unexpected panics in epocwind.out files
-PERL, \panicscanlog.txt,,\epoc32\winscw\c\tswi\panicscan.pl, 300, UDEB,,
-
-
-[Misc]
-# Check that there are no test certificates in invalid locations in the source code
-PERL, \checklocationofcertificateslog.txt,, \epoc32\winscw\c\checklocationofcertificates.pl %SECURITYSOURCEDIR%, 300, UDEB,,
-
-# Scan for occurrences of "C: , EDriveC and [<index>]='C' in source files
-PERL, \cdrivewarnings.htm,,\epoc32\winscw\c\cdrive.pl --exclude=\epoc32\winscw\c\cdrive_exclude.txt --excludedir=%SECURITYSOURCEDIR%\usif\scr\sqlite_secure\ --log=cdrivewarnings.htm %SECURITYSOURCEDIR%,300,UDEB,,
-
-# Categorisation tags are checked for all of security sub-system 
-PERL, \searchtags.txt,,\epoc32\winscw\c\tswi\searchtags.pl, 300, UDEB,,
-[FileTokens_HwImpl]
-T_KEYSTORE, \logs\testexecute\thwkeystore.htm,,		     -Dstartupmode=1 -- \tkeystore\scripts\thwkeystore.script	\logs\testexecute\thwkeystore.htm,				300, UDEB#UREL, \epoc32\winscw\c\testdata\tcryptospi\scripts\batchfiles\pre_dummyeccplugin.bat, \epoc32\winscw\c\testdata\tcryptospi\scripts\batchfiles\post_dummyeccplugin.bat
-TESTEXECUTE, \logs\testexecute\te_dummyeccciphertestcases.htm,, -Dtextshell -- \testdata\tcryptospi\scripts\te_dummyeccciphertestcases.script, 900, UDEB#UREL, \epoc32\winscw\c\testdata\tcryptospi\scripts\batchfiles\pre_dummyeccplugin.bat, \epoc32\winscw\c\testdata\tcryptospi\scripts\batchfiles\post_dummyeccplugin.bat
-
-
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/testsecurity_9.4_java.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,40 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-REM Attempt to stop the execution in case it's accidentally started on a PC
-ECHO About to run Security Team Hardware Tests
-pause
-
-REM create testresults directory
-md c:\testresults
-md e:\testresults
-copy z:\buildid.txt e:\
-copy z:\buildid.txt e:\testresults
-
-REM copy hosts file to redirect cam-ocspserver request to ban-ocspserver
-md c:\private
-md c:\private\10000882
-copy z:\hosts c:\private\10000882\hosts
-
-REM install automated commdb
-copy z:\auto.cfg c:\auto.cfg
-ced -i c:\auto.cfg
-
-sntpclient -savings cbtime01.symbian.intra bantime01.symbian.intra
-
-runcrypto.bat
-
-runjavamidletinstaller.bat
\ No newline at end of file
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/testsecurity_9.4_mcs.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,51 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-REM Attempt to stop the execution in case it's accidentally started on a PC
-ECHO About to run Security Team Hardware Tests
-pause
-
-REM create testresults directory
-md c:\testresults
-md e:\testresults
-copy z:\buildid.txt e:\
-copy z:\buildid.txt e:\testresults
-
-REM copy hosts file to redirect cam-ocspserver request to ban-ocspserver
-md c:\private
-md c:\private\10000882
-copy z:\hosts c:\private\10000882\hosts
-
-REM install automated commdb
-copy z:\auto.cfg c:\auto.cfg
-ced -i c:\auto.cfg
-
-sntpclient -savings cbtime01.symbian.intra bantime01.symbian.intra
-                                                    
-runcertman.bat
-
-runasnpkcs.bat
-
-runfiletokens.bat
-
-runcryptotokens.bat
-
-
-runswiromtests.bat
-
-// uncomment the authserver tests when it is released
-//runauthtests.bat
-
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/testsecurity_9.4_mcs_vfuture.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,49 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-REM Attempt to stop the execution in case it's accidentally started on a PC
-ECHO About to run Security Team Hardware Tests
-pause
-
-REM create testresults directory
-md c:\testresults
-md e:\testresults
-copy z:\buildid.txt e:\
-copy z:\buildid.txt e:\testresults
-
-REM copy hosts file to redirect cam-ocspserver request to ban-ocspserver
-md c:\private
-md c:\private\10000882
-copy z:\hosts c:\private\10000882\hosts
-
-REM install automated commdb
-copy z:\auto.cfg c:\auto.cfg
-ced -i c:\auto.cfg
-
-sntpclient -savings cbtime01.symbian.intra bantime01.symbian.intra
-                                                    
-runcertman.bat
-
-runasnpkcs.bat
-
-runfiletokens.bat
-
-runcryptotokens.bat
-
-runswiromtests.bat
-
-REM authserver test
-runauthtests.bat
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/testsecurity_9.4_nonmcs.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,48 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-REM Attempt to stop the execution in case it's accidentally started on a PC
-ECHO About to run Security Team Hardware Tests
-pause
-
-REM create testresults directory
-md c:\testresults
-md e:\testresults
-copy z:\buildid.txt e:\
-copy z:\buildid.txt e:\testresults
-
-REM copy hosts file to redirect cam-ocspserver request to ban-ocspserver
-md c:\private
-md c:\private\10000882
-copy z:\hosts c:\private\10000882\hosts
-
-REM install automated commdb
-copy z:\auto.cfg c:\auto.cfg
-ced -i c:\auto.cfg
-
-sntpclient -savings cbtime01.symbian.intra bantime01.symbian.intra
-
-runcaftests.bat
-
-runsisinstaller.bat
-
-runswiromtests.bat
-
-REM Enable the following test when DEF076875(or relevant CR) is done.
-REM runtlsclientauth.bat
-
-REM Temporary solution for ROM overflow issues (DEF109635)
-runpkcs12tests.bat
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/testsecurity_9.5_mcs.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,49 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-REM Attempt to stop the execution in case it's accidentally started on a PC
-ECHO About to run Security Team Hardware Tests
-pause
-
-REM create testresults directory
-md c:\testresults
-md e:\testresults
-copy z:\buildid.txt e:\
-copy z:\buildid.txt e:\testresults
-
-REM copy hosts file to redirect cam-ocspserver request to ban-ocspserver
-md c:\private
-md c:\private\10000882
-copy z:\hosts c:\private\10000882\hosts
-
-REM install automated commdb
-copy z:\auto.cfg c:\auto.cfg
-ced -i c:\auto.cfg
-
-sntpclient -savings cbtime01.symbian.intra bantime01.symbian.intra
-                                                    
-runcertman.bat
-
-runfiletokens.bat
-
-runcryptotokens.bat
-
-
-runswiromtests.bat
-
-// uncomment the authserver tests when it is released
-//runauthtests.bat
-
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/testsecurity_9.5_nonmcs.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,50 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-REM Attempt to stop the execution in case it's accidentally started on a PC
-ECHO About to run Security Team Hardware Tests
-pause
-
-REM create testresults directory
-md c:\testresults
-md e:\testresults
-copy z:\buildid.txt e:\
-copy z:\buildid.txt e:\testresults
-
-REM copy hosts file to redirect cam-ocspserver request to ban-ocspserver
-md c:\private
-md c:\private\10000882
-copy z:\hosts c:\private\10000882\hosts
-
-REM install automated commdb
-copy z:\auto.cfg c:\auto.cfg
-ced -i c:\auto.cfg
-
-sntpclient -savings cbtime01.symbian.intra bantime01.symbian.intra
-
-runcaftests.bat
-
-runsisinstaller.bat
-
-runswiromtests.bat
-
-REM Enable the following test when DEF076875(or relevant CR) is done.
-REM runtlsclientauth.bat
-
-runupstests.bat
-
-REM Temporary solution for ROM overflow issues (DEF109635)
-runpkcs12tests.bat
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/testsecurity_9.6_crypto.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,38 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-REM Attempt to stop the execution in case it's accidentally started on a PC
-ECHO About to run Security Team Hardware Tests
-pause
-
-REM create testresults directory
-md c:\testresults
-md e:\testresults
-copy z:\buildid.txt e:\
-copy z:\buildid.txt e:\testresults
-
-REM copy hosts file to redirect cam-ocspserver request to ban-ocspserver
-md c:\private
-md c:\private\10000882
-copy z:\hosts c:\private\10000882\hosts
-
-REM install automated commdb
-copy z:\auto.cfg c:\auto.cfg
-ced -i c:\auto.cfg
-
-sntpclient -savings cbtime01.symbian.intra bantime01.symbian.intra
-
-runcrypto.bat
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/testsecurity_9.6_mcs.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,50 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-REM Attempt to stop the execution in case it's accidentally started on a PC
-ECHO About to run Security Team Hardware Tests
-pause
-
-REM create testresults directory
-md c:\testresults
-md e:\testresults
-copy z:\buildid.txt e:\
-copy z:\buildid.txt e:\testresults
-
-REM copy hosts file to redirect cam-ocspserver request to ban-ocspserver
-md c:\private
-md c:\private\10000882
-copy z:\hosts c:\private\10000882\hosts
-
-REM install automated commdb
-copy z:\auto.cfg c:\auto.cfg
-ced -i c:\auto.cfg
-
-sntpclient -savings cbtime01.symbian.intra bantime01.symbian.intra
-                                                    
-runasnpkcs.bat
-
-runcryptotokens.bat
-
-
-runswiromtests.bat
-
-REM authserver test
-runauthtests.bat
-
-runfiletokens.bat
-
-runcertman.bat
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/testsecurity_9.6_nonmcs.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,52 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-REM Attempt to stop the execution in case it's accidentally started on a PC
-ECHO About to run Security Team Hardware Tests
-pause
-
-REM create testresults directory
-md c:\testresults
-md e:\testresults
-copy z:\buildid.txt e:\
-copy z:\buildid.txt e:\testresults
-
-REM copy hosts file to redirect cam-ocspserver request to ban-ocspserver
-md c:\private
-md c:\private\10000882
-copy z:\hosts c:\private\10000882\hosts
-
-REM install automated commdb
-copy z:\auto.cfg c:\auto.cfg
-ced -i c:\auto.cfg
-
-sntpclient -savings cbtime01.symbian.intra bantime01.symbian.intra
-
-runcaftests.bat
-
-runswiromtests.bat
-
-REM Enable the following test when DEF076875(or relevant CR) is done.
-REM runtlsclientauth.bat
-
-runupstests.bat
-
-runusiftests.bat
-
-REM Temporary solution for ROM overflow issues (DEF109635)
-runpkcs12tests.bat
-
-runcommonutilstests.bat
\ No newline at end of file
--- a/cryptomgmtlibs/securitytestfw/test/autotesting/testsecurityonlyjava.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,41 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-REM Attempt to stop the execution in case it's accidentally started on a PC
-ECHO About to run Security Team Hardware Tests
-pause
-
-REM create testresults directory
-md c:\testresults
-md e:\testresults
-copy z:\buildid.txt e:\
-copy z:\buildid.txt e:\testresults
-
-REM copy hosts file to redirect cam-ocspserver request to ban-ocspserver
-md c:\private
-md c:\private\10000882
-copy z:\hosts c:\private\10000882\hosts
-
-REM install automated commdb
-copy z:\auto.cfg c:\auto.cfg
-ced -i c:\auto.cfg
-
-sntpclient -savings cbtime01.symbian.intra bantime01.symbian.intra
-
-runjavamidletinstaller.bat
-
-runsisinstaller.bat
-
--- a/cryptomgmtlibs/securitytestfw/test/testhandler2/t_tefinput.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptomgmtlibs/securitytestfw/test/testhandler2/t_tefinput.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -22,9 +22,6 @@
 #include <securityerr.h>
 #include <keystore_errs.h>
 
-#ifdef SYMBIAN_AUTH_SERVER
-#include <auth_srv_errs.h>
-#endif
 
 _LIT8(KSpace, " ");
 _LIT8(KTab, "\t");
@@ -575,83 +572,6 @@
 			{
 			aReturnTag.Copy(_L8("\r\n\t\t<return>KErrAuthenticationFailure</return>"));
 			}
-
-#ifdef SYMBIAN_AUTH_SERVER
-	else if(aErrCode == KErrAuthServUnsupportedExprVersion)
-			{
-			aReturnTag.Copy(_L8("\r\n\t\t<return>KErrAuthServUnsupportedExprVersion</return>"));
-			}
-	else if(aErrCode == KErrAuthServNoSuchPlugin)
-			{
-			aReturnTag.Copy(_L8("\r\n\t\t<return>KErrAuthServNoSuchPlugin</return>"));
-			}
-	else if(aErrCode == KErrAuthServNoSuchIdentity)
-			{
-			aReturnTag.Copy(_L8("\r\n\t\t<return>KErrAuthServNoSuchIdentity</return>"));
-			}
-	else if(aErrCode == KErrAuthServPluginCancelled)
-			{
-			aReturnTag.Copy(_L8("\r\n\t\t<return>KErrAuthServPluginCancelled</return>"));
-			}
-	else if(aErrCode == KErrAuthServPluginQuit)
-			{
-			aReturnTag.Copy(_L8("\r\n\t\t<return>KErrAuthServPluginQuit</return>"));
-			}
-	else if(aErrCode == KErrAuthServAuthenticationRequired)
-			{
-			aReturnTag.Copy(_L8("\r\n\t\t<return>KErrAuthServAuthenticationRequired</return>"));
-			}
-	else if(aErrCode == KErrAuthServIdentityAlreadyExists)
-			{
-			aReturnTag.Copy(_L8("\r\n\t\t<return>KErrAuthServIdentityAlreadyExists</return>"));
-			}
-	else if(aErrCode == KErrAuthServIdentityNotFound)
-			{
-			aReturnTag.Copy(_L8("\r\n\t\t<return>KErrAuthServIdentityNotFound</return>"));
-			}
-	else if(aErrCode == KErrAuthServTrainingNotFound)
-			{
-			aReturnTag.Copy(_L8("\r\n\t\t<return>KErrAuthServTrainingNotFound</return>"));
-			}
-	else if(aErrCode == KErrAuthServRegistrationFailed)
-			{
-			aReturnTag.Copy(_L8("\r\n\t\t<return>KErrAuthServRegistrationFailed</return>"));
-			}
-	else if(aErrCode == KErrAuthServCanNotRemoveLastIdentity)
-			{
-			aReturnTag.Copy(_L8("\r\n\t\t<return>KErrAuthServCanNotRemoveLastIdentity</return>"));
-			}
-	else if(aErrCode == KErrAuthServCanNotRemoveLastPlugin)
-			{
-			aReturnTag.Copy(_L8("\r\n\t\t<return>KErrAuthServCanNotRemoveLastPlugin</return>"));
-			}
-	else if(aErrCode == KErrAuthServPluginNotActive)
-			{
-			aReturnTag.Copy(_L8("\r\n\t\t<return>KErrAuthServPluginNotActive</return>"));
-			}
-	else if(aErrCode == KErrAuthServDescTooLong)
-			{
-			aReturnTag.Copy(_L8("\r\n\t\t<return>KErrAuthServDescTooLong</return>"));
-			}
-	else if(aErrCode == KErrUnknownAuthStrengthAlias)
-			{
-			aReturnTag.Copy(_L8("\r\n\t\t<return>KErrUnknownAuthStrengthAlias</return>"));
-			}
-	else if(aErrCode == KErrAuthStrengthAliasNotDefined)
-			{
-			aReturnTag.Copy(_L8("\r\n\t\t<return>KErrAuthStrengthAliasNotDefined</return>"));
-			}
-	else if(aErrCode == KErrAuthServInvalidAliasStringExpression)
-			{
-			aReturnTag.Copy(_L8("\r\n\t\t<return>KErrAuthServInvalidAliasStringExpression/return>"));
-			}
-	else if(aErrCode == KErrAuthServResetMayLoseIdentity)
-			{
-			aReturnTag.Copy(_L8("\r\n\t\t<return>KErrAuthServResetMayLoseIdentity/return>"));
-			}
-#endif
-
-
 //	
 	
 	return err;
--- a/cryptoplugins/cryptospiplugins/group/bld.inf	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoplugins/cryptospiplugins/group/bld.inf	Wed Apr 14 17:48:59 2010 +0300
@@ -22,9 +22,6 @@
 */
 
 #include "../test/h4drv/bld.inf"
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-#include "../test/dummyecchwplugin/group/bld.inf"
-#endif
 
 PRJ_PLATFORMS
 default
@@ -56,9 +53,6 @@
 // ROMKIT includes
 ../inc/cryptospi_testplugins.iby /epoc32/rom/include/cryptospi_testplugins.iby
 
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-../inc/cryptospi_testwmdrmplugins.iby /epoc32/rom/include/cryptospi_testwmdrmplugins.iby
-#endif
 
 
 
--- a/cryptoplugins/cryptospiplugins/inc/cryptospi_testwmdrmplugins.iby	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,23 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-file=ABI_DIR\BUILD_DIR\cryptospihai.dll 	"sys\bin\cryptospihai.dll"
-file=ABI_DIR\BUILD_DIR\dummyecchwplugin.dll 	"sys\bin\dummyecchwplugin.dll"
-#endif
-
--- a/cryptoplugins/cryptospiplugins/test/dummyecchwplugin/bwins/cryptospihaiu.def	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,4 +0,0 @@
-EXPORTS
-	?SignL@CCryptoSpiHai@CryptoSpiHai@@SAXHABVTDesC8@@AAVCCryptoParams@CryptoSpi@@@Z @ 1 NONAME ; void CryptoSpiHai::CCryptoSpiHai::SignL(int, class TDesC8 const &, class CryptoSpi::CCryptoParams &)
-	?DecryptL@CCryptoSpiHai@CryptoSpiHai@@SAXHABVTDesC8@@AAVTDes8@@@Z @ 2 NONAME ; void CryptoSpiHai::CCryptoSpiHai::DecryptL(int, class TDesC8 const &, class TDes8 &)
-
--- a/cryptoplugins/cryptospiplugins/test/dummyecchwplugin/bwins/dummyecchwpluginu.def	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,12 +0,0 @@
-EXPORTS
-	?Enumerate@CCryptoPluginEntry@@SAPAPBXVTUid@@AAH@Z @ 1 NONAME ; void const * * CCryptoPluginEntry::Enumerate(class TUid, int &)
-	?GetExtendedCharacteristicsL@CCryptoPluginEntry@@SAXVTUid@@AAPAVCExtendedCharacteristics@CryptoSpi@@@Z @ 2 NONAME ; void CCryptoPluginEntry::GetExtendedCharacteristicsL(class TUid, class CryptoSpi::CExtendedCharacteristics * &)
-	?CreateAsymmetricCipherL@CCryptoPluginEntry@@SAXAAPAVMAsymmetricCipher@CryptoSpi@@VTUid@@ABVCKey@3@11PBVCCryptoParams@3@@Z @ 3 NONAME ; void CCryptoPluginEntry::CreateAsymmetricCipherL(class CryptoSpi::MAsymmetricCipher * &, class TUid, class CryptoSpi::CKey const &, class TUid, class TUid, class CryptoSpi::CCryptoParams const *)
-	?CreateAsymmetricSignerL@CCryptoPluginEntry@@SAXAAPAVMSigner@CryptoSpi@@VTUid@@ABVCKey@3@1PBVCCryptoParams@3@@Z @ 4 NONAME ; void CCryptoPluginEntry::CreateAsymmetricSignerL(class CryptoSpi::MSigner * &, class TUid, class CryptoSpi::CKey const &, class TUid, class CryptoSpi::CCryptoParams const *)
-	?CreateAsymmetricVerifierL@CCryptoPluginEntry@@SAXAAPAVMVerifier@CryptoSpi@@VTUid@@ABVCKey@3@1PBVCCryptoParams@3@@Z @ 5 NONAME ; void CCryptoPluginEntry::CreateAsymmetricVerifierL(class CryptoSpi::MVerifier * &, class TUid, class CryptoSpi::CKey const &, class TUid, class CryptoSpi::CCryptoParams const *)
-	?CreateHashL@CCryptoPluginEntry@@SAXAAPAVMHash@CryptoSpi@@VTUid@@1PBVCKey@3@PBVCCryptoParams@3@@Z @ 6 NONAME ; void CCryptoPluginEntry::CreateHashL(class CryptoSpi::MHash * &, class TUid, class TUid, class CryptoSpi::CKey const *, class CryptoSpi::CCryptoParams const *)
-	?CreateKeyAgreementL@CCryptoPluginEntry@@SAXAAPAVMKeyAgreement@CryptoSpi@@VTUid@@ABVCKey@3@PBVCCryptoParams@3@@Z @ 7 NONAME ; void CCryptoPluginEntry::CreateKeyAgreementL(class CryptoSpi::MKeyAgreement * &, class TUid, class CryptoSpi::CKey const &, class CryptoSpi::CCryptoParams const *)
-	?CreateKeyPairGeneratorL@CCryptoPluginEntry@@SAXAAPAVMKeyPairGenerator@CryptoSpi@@VTUid@@PBVCCryptoParams@3@@Z @ 8 NONAME ; void CCryptoPluginEntry::CreateKeyPairGeneratorL(class CryptoSpi::MKeyPairGenerator * &, class TUid, class CryptoSpi::CCryptoParams const *)
-	?CreateRandomL@CCryptoPluginEntry@@SAXAAPAVMRandom@CryptoSpi@@VTUid@@PBVCCryptoParams@3@@Z @ 9 NONAME ; void CCryptoPluginEntry::CreateRandomL(class CryptoSpi::MRandom * &, class TUid, class CryptoSpi::CCryptoParams const *)
-	?CreateSymmetricCipherL@CCryptoPluginEntry@@SAXAAPAVMSymmetricCipher@CryptoSpi@@VTUid@@ABVCKey@3@111PBVCCryptoParams@3@@Z @ 10 NONAME ; void CCryptoPluginEntry::CreateSymmetricCipherL(class CryptoSpi::MSymmetricCipher * &, class TUid, class CryptoSpi::CKey const &, class TUid, class TUid, class TUid, class CryptoSpi::CCryptoParams const *)
-	
--- a/cryptoplugins/cryptospiplugins/test/dummyecchwplugin/eabi/cryptospihaiu.def	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,4 +0,0 @@
-EXPORTS
-	_ZN12CryptoSpiHai13CCryptoSpiHai5SignLEiRK6TDesC8RN9CryptoSpi13CCryptoParamsE @ 1 NONAME
-	_ZN12CryptoSpiHai13CCryptoSpiHai8DecryptLEiRK6TDesC8R5TDes8 @ 2 NONAME
-
--- a/cryptoplugins/cryptospiplugins/test/dummyecchwplugin/eabi/dummyecchwpluginu.def	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,18 +0,0 @@
-EXPORTS
-	_ZN18CCryptoPluginEntry9EnumerateE4TUidRi @ 1 NONAME
-	_ZN18CCryptoPluginEntry27GetExtendedCharacteristicsLE4TUidRPN9CryptoSpi24CExtendedCharacteristicsE @ 2 NONAME
-	_ZN18CCryptoPluginEntry23CreateAsymmetricCipherLERPN9CryptoSpi17MAsymmetricCipherE4TUidRKNS0_4CKeyES4_S4_PKNS0_13CCryptoParamsE @ 3 NONAME
-	_ZN18CCryptoPluginEntry23CreateAsymmetricSignerLERPN9CryptoSpi7MSignerE4TUidRKNS0_4CKeyES4_PKNS0_13CCryptoParamsE @ 4 NONAME
-	_ZN18CCryptoPluginEntry25CreateAsymmetricVerifierLERPN9CryptoSpi9MVerifierE4TUidRKNS0_4CKeyES4_PKNS0_13CCryptoParamsE @ 5 NONAME
-	_ZN18CCryptoPluginEntry11CreateHashLERPN9CryptoSpi5MHashE4TUidS4_PKNS0_4CKeyEPKNS0_13CCryptoParamsE @ 6 NONAME
-	_ZN18CCryptoPluginEntry19CreateKeyAgreementLERPN9CryptoSpi13MKeyAgreementE4TUidRKNS0_4CKeyEPKNS0_13CCryptoParamsE @ 7 NONAME
-	_ZN18CCryptoPluginEntry23CreateKeyPairGeneratorLERPN9CryptoSpi17MKeyPairGeneratorE4TUidPKNS0_13CCryptoParamsE @ 8 NONAME
-	_ZN18CCryptoPluginEntry13CreateRandomLERPN9CryptoSpi7MRandomE4TUidPKNS0_13CCryptoParamsE @ 9 NONAME
-	_ZN18CCryptoPluginEntry22CreateSymmetricCipherLERPN9CryptoSpi16MSymmetricCipherE4TUidRKNS0_4CKeyES4_S4_S4_PKNS0_13CCryptoParamsE @ 10 NONAME
-	
-	
-	
-
-	
-
-
--- a/cryptoplugins/cryptospiplugins/test/dummyecchwplugin/group/bld.inf	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,29 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-PRJ_TESTMMPFILES
-
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-cryptospihai.mmp
-dummyecchwplugin.mmp
-#endif
-
-PRJ_TESTEXPORTS
-
-
-// End of file
--- a/cryptoplugins/cryptospiplugins/test/dummyecchwplugin/group/cryptospihai.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,52 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* cryptospihai.dll provides a reference implementation for cryptospi 
-* hardware abstraction interface (HAI). This is used by a cryptospi  
-* plugin, in the case where actual keys are stored in hardware. This 
-* plugin does the following:-
-* a) extracts the key from Crypto Token HAI
-* b) performs the operations (signing and decryption)
-* c) returns the results to the spi plugin. 
-* Licensees can use this plug-in as a reference for implementing a 
-* similar plug-in.
-*
-*/
-
-
-TARGET 		cryptospihai.dll
-TARGETTYPE	dll
-
-CAPABILITY 	All -Tcb
-
-UID 		0xA000D693 0xA000D694
-VENDORID	0x70000001
-
-DEFFILE cryptospihai.def
-
-USERINCLUDE		.
-OS_LAYER_SYSTEMINCLUDE
-USERINCLUDE	../../../../../crypto/weakcryptospi/inc/spi
-USERINCLUDE	../../../../../cryptoservices/filebasedcertificateandkeystores/test/tcryptotokenhai
-
-SOURCEPaTH ../src
-SOURCE		cryptospihai.cpp
-
-LIBRARY		euser.lib
-LIBRARY		cryptospi.lib
-LIBRARY		tcryptotokenhai.lib
-LIBRARY     cryptography.lib
-
-SMPSAFE
-
--- a/cryptoplugins/cryptospiplugins/test/dummyecchwplugin/group/dummyecchwplugin.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,51 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* dummyecchwplugin.dll is a cryptospi plug-in which provides a dummy 
-* implementation of Ecc. This is used for reference and testing 
-* purposes only. This does not actually implement the ecc algorithm. 
-* This plug-in performs cryptographic operations without having access 
-* to the actual key. It accomplishes this in the following way:-
-* a) extracts the key handle
-* b) uses this handle to invoke cryptospihai.dll. cryptospihai.dll 
-* performs the operations and returns the output back.
-* Licensees can use this plug-in as a reference for implementing a 
-* similar plug-in.
-*
-*/
-
-
-TARGET 		dummyecchwplugin.dll
-TARGETTYPE	dll
-
-CAPABILITY 	All -Tcb
-
-UID 		0xA000D695 0xA000D696
-VENDORID	0x70000001
-
-DEFFILE dummyecchwplugin.def
-
-USERINCLUDE		.
-USERINCLUDE	../../../../../crypto/weakcryptospi/inc/spi
-OS_LAYER_SYSTEMINCLUDE
-
-SOURCEPATH ../src
-SOURCE		pluginentry.cpp
-SOURCE		dummyeccimpl.cpp
-SOURCE		dummyeccsignerimpl.cpp
-
-LIBRARY		euser.lib cryptospi.lib cryptospihai.lib
-
-SMPSAFE
-
--- a/cryptoplugins/cryptospiplugins/test/dummyecchwplugin/src/cryptospihai.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,109 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include "cryptospihai.h"
-#include "keys.h"
-#include <e32def.h>
-#include <cryptospi/cryptohashapi.h>
-#include <pbedata.h>
-#include "tcryptotokenhai.h"
-
-using namespace CryptoSpiHai;
-
-/**
- * Performs the signing operation.
- * 
- * A cryptoSPI plugin uses this, when it does not have access to the  
- * actual key.
- * 
- * @param aKeyHandle The key handle retrieved from hw crypto 
- * token
- * @param aInput The text which has to be signed. This is not being 
- * used due to signing logic used in this function.
- * @param aSignature Output param. The cryptoSPI signature.
- * 
- * @leave Can leave with all the leave codes present in HAI of 
- * reference crypto token implementation.
- * 
- * @note This function does not actually implement ECC signing. This 
- * function just shows how the private key can be extracted from 
- * crypto token hai. This function just returns the private key as 
- * output signature. The caller can verify the signature by ensuring 
- * that test case has same public and private keys and then comparing 
- * the signature with public key.
- */
-EXPORT_C void CCryptoSpiHai::SignL(TInt aKeyHandle,
-        const TDesC8& /*aInput*/, CryptoSpi::CCryptoParams& aSignature)
-    {
-    MCTToken* token = NULL;
-    /**
-     * We are dereferencing a NULL pointer below. We need to pass 
-     * MCTToken here. It is not used currently.
-     */
-    CCryptoTokenHai *cryptoTokenHai = CCryptoTokenHai::NewLC(token);
-
-    //Call Crypto Token HAI to get the actual key
-    HBufC8* actualKey = NULL;
-    cryptoTokenHai->ExportPrivateKeyL(aKeyHandle, actualKey);
-    CleanupStack::PushL(actualKey);
-
-    aSignature.AddL(*actualKey, CryptoSpi::KEccKeyTypeUid);
-    CleanupStack::PopAndDestroy(actualKey);
-    CleanupStack::PopAndDestroy(cryptoTokenHai);
-    }
-
-/**
- * Performs the decryption operation.
- * 
- * A cryptoSPI plugin uses this, when it does not have access to the 
- * actual key.
- * 
- * @param aKeyHandle The key handle retrieved from hw crypto token
- * @param aInput The cipher text. This is not being used due to signing  
- * logic used in this function.
- * @param aOutput Output param. The decrypted plain text
- * 
- * @leave Can leave with all the leave codes present in HAI of 
- * reference crypto token implementation.
- *
- * @note This function does not actually implement ECC decryption. This 
- * function just shows how the private key can be extracted from 
- * crypto token hai. This function just returns the private key as 
- * decrypted text. The caller can verify the decryption by ensuring 
- * that test case has same public and private keys and then comparing 
- * the decrypted text with public key. 
- */
-EXPORT_C void CCryptoSpiHai::DecryptL(TInt aKeyHandle,
-        const TDesC8& /*aInput*/, TDes8& aOutput)
-    {
-    MCTToken* token = NULL;
-    CCryptoTokenHai *cryptoTokenHai = CCryptoTokenHai::NewLC(token);
-
-    //Call Crypto Token HAI to get the actual key
-    HBufC8* actualKey = NULL;
-    cryptoTokenHai->ExportPrivateKeyL(aKeyHandle, actualKey);
-    CleanupStack::PushL(actualKey);
-    aOutput.Copy(*actualKey);
-
-    CleanupStack::PopAndDestroy(actualKey);
-    CleanupStack::PopAndDestroy(cryptoTokenHai);
-    }
-
-// End of file
-
-
--- a/cryptoplugins/cryptospiplugins/test/dummyecchwplugin/src/cryptospihai.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,81 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-/**
- @file
- @internalComponent
- @released
- */
-#ifndef	CCRYPTOSPIHAI_H
-#define	CCRYPTOSPIHAI_H
-
-#include <e32base.h>
-#include <e32cmn.h>
-#include <cryptospi/cryptospidef.h>
-#include <cryptospi/cryptoparams.h>
-
-namespace CryptoSpiHai
-    {
-    /**
-     * This class forms the hardware abstraction interface part of the 
-     * cryptoSPI. In the production code, this should be replaced by a 
-     * device driver. This layer abstracts the hardware from a cryptoSPI
-     * plugin. It interacts with the HAI of crypto token to get the actual 
-     * key and performs the operations. This layer should be implemented in
-     * kernel space.
-     */
-    NONSHARABLE_CLASS(CCryptoSpiHai) : public CBase
-        {
-    public:
-        /**
-         * Performs the signing operation.
-         * 
-         * A cryptoSPI plugin uses this, when it does not have access 
-         * to the actual key.
-         * 
-         * @param aKeyHandle The key handle retrieved from hw crypto 
-         * token
-         * @param aInput The text which has to be signed.
-         * @param aSignature Output param. The cryptoSPI signature.
-         * 
-         * @leave Can leave with all the leave codes present in HAI of 
-         * reference crypto token implementation. 
-         */
-        IMPORT_C static void SignL(TInt aKeyHandle,
-                const TDesC8& aInput, CryptoSpi::CCryptoParams& aSignature);
-        
-        /**
-         * Performs the decryption operation.
-         * 
-         * A cryptoSPI plugin uses this, when it does not have access 
-         * to the actual key.
-         * 
-         * @param aKeyHandle The key handle retrieved from hw crypto 
-         * token
-         * @param aInput The cipher text.
-         * @param aOutput Output param. The decrypted plain text
-         * 
-         * @leave Can leave with all the leave codes present in HAI of 
-         * reference crypto token implementation. 
-         */        
-        IMPORT_C static void DecryptL(TInt aKeyHandle,
-                const TDesC8& aInput, TDes8& aOuput);
-        };
-    }
-
-#endif	//	CCRYPTOSPIHAI_H
--- a/cryptoplugins/cryptospiplugins/test/dummyecchwplugin/src/dummyeccimpl.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,189 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include "dummyeccimpl.h"
-
-#include <e32def.h>
-#include <cryptospi/cryptospidef.h>
-#include "keys.h"
-#include <cryptospi/plugincharacteristics.h>
-#include "pluginconfig.h"
-#include "cryptospihai.h"
-
-using namespace DummyEccHwCrypto;
-using namespace CryptoSpiHai;
-
-/**
- * These are just randomly selected numbers. There is no logic behind 
- * their values.
- */ 
-const TInt KMaxOutputLength = 50;
-const TInt KMaxInputLength = 50;
-
-CDummyECCCipherImpl* CDummyECCCipherImpl::NewL(const CKey& aKey,
-        TUid aCryptoMode, TUid aPaddingMode)
-    {
-    CDummyECCCipherImpl* self = CDummyECCCipherImpl::NewLC(aKey, aCryptoMode,
-            aPaddingMode);
-    CleanupStack::Pop(self);
-    return self;
-    }
-
-CDummyECCCipherImpl* CDummyECCCipherImpl::NewLC(const CKey& aKey,
-        TUid aCryptoMode, TUid aPaddingMode)
-    {
-    CDummyECCCipherImpl* self = new (ELeave) CDummyECCCipherImpl(aCryptoMode,
-            aPaddingMode);
-    CleanupStack::PushL(self);
-    self->ConstructL(aKey);
-    return self;
-    }
-
-CDummyECCCipherImpl::CDummyECCCipherImpl(TUid aCryptoMode, TUid aPaddingMode) :
-    iCryptoMode(aCryptoMode), iPaddingMode(aPaddingMode)
-    {
-    }
-
-void CDummyECCCipherImpl::ConstructL(const CKey& aKey)
-    {
-    SetKeyL(aKey);
-    }
-
-// MPlugin Interface Start
-void CDummyECCCipherImpl::Close()
-    {
-    delete this;
-    }
-
-void CDummyECCCipherImpl::Reset()
-    {
-    }
-
-void CDummyECCCipherImpl::GetCharacteristicsL(
-        const TCharacteristics*& aPluginCharacteristics)
-    {
-    TInt numCiphers = sizeof(KAsymmetricCipherCharacteristics)
-            / sizeof(TAsymmetricCipherCharacteristics*);
-    TInt32 implUid = ImplementationUid().iUid;
-    for (TInt i = 0; i < numCiphers; ++i)
-        {
-        if (KAsymmetricCipherCharacteristics[i]->cmn.iImplementationUID
-                == implUid)
-            {
-            aPluginCharacteristics = KAsymmetricCipherCharacteristics[i];
-            break;
-            }
-        }
-    }
-
-const CExtendedCharacteristics* CDummyECCCipherImpl::GetExtendedCharacteristicsL()
-    {
-    // All Symbian software plug-ins have unlimited concurrency, cannot be reserved
-    // for exclusive use and are not CERTIFIED to be standards compliant.
-    return CExtendedCharacteristics::NewL(KMaxTInt, EFalse);
-    }
-
-TAny* CDummyECCCipherImpl::GetExtension(TUid /* aExtensionId */)
-    {
-    return 0;
-    }
-// End of MPlugin Interface
-
-// MAsymmetricCipherBase Interface
-void CDummyECCCipherImpl::SetKeyL(const CKey& aKey)
-    {
-    // delete any previous key and recreate the key
-    delete iKey;
-    iKey = NULL;
-    iKey = CKey::NewL(aKey);
-    }
-
-void CDummyECCCipherImpl::SetCryptoModeL(TUid aCryptoMode)
-    {
-    switch (aCryptoMode.iUid)
-        {
-        case KCryptoModeEncrypt:
-        case KCryptoModeDecrypt:
-            break;
-        default:
-            User::Leave(KErrNotSupported);
-        }
-    iCryptoMode = aCryptoMode;
-    }
-
-void CDummyECCCipherImpl::SetPaddingModeL(TUid /* aPaddingMode */)
-    {
-    User::Leave(KErrNotSupported);
-    }
-
-TInt CDummyECCCipherImpl::GetMaximumInputLengthL() const
-    {
-    return KMaxInputLength;
-    }
-
-TInt CDummyECCCipherImpl::GetMaximumOutputLengthL() const
-    {
-    return KMaxOutputLength;
-    }
-// End of MAsymmetricCipherBase Interface
-
-// MAsymmetricCipher Interface
-void CDummyECCCipherImpl::ProcessL(const TDesC8& aInput, TDes8& aOutput)
-    {
-    if (iCryptoMode.iUid == KCryptoModeEncrypt)
-        {
-        EncryptL(aInput, aOutput);
-        }
-    else
-        {
-        DecryptL(aInput, aOutput);
-        }
-    }
-
-TUid CDummyECCCipherImpl::ImplementationUid() const
-    {
-    return KCryptoPluginEccCipherUid;
-    }
-
-CDummyECCCipherImpl::~CDummyECCCipherImpl()
-    {
-    delete iKey;
-    }
-
-void CDummyECCCipherImpl::EncryptL(const TDesC8& /* aInput */, TDes8& /* aOuput */)
-    {
-    User::Leave(KErrNotSupported);
-    }
-
-void CDummyECCCipherImpl::DecryptL(const TDesC8& aInput, TDes8& aOutput)
-    {
-    if (iKey->IsPresent(KPassedHandleToKeyUid))
-        {
-        const TInt& keyHandle = iKey->GetTIntL(KPassedHandleToKeyUid);
-
-        // Invoke the Spi HAI to perform the operation
-        CCryptoSpiHai::DecryptL(keyHandle, aInput, aOutput);
-        }
-    else
-        {
-        User::Leave(KErrNotSupported);
-        }
-    }
-// End of file
-
-
--- a/cryptoplugins/cryptospiplugins/test/dummyecchwplugin/src/dummyeccimpl.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,97 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-/**
- @file
- @internalComponent
- @released
-*/
-#ifndef	CDUMMYECCIMPL_H
-#define	CDUMMYECCIMPL_H
-
-#include <e32base.h>
-#include <e32cmn.h>
-#include <cryptospi/cryptospidef.h>
-#include "keys.h"
-#include "asymmetriccipherplugin.h"
-
-namespace DummyEccHwCrypto
-	{
-	using namespace CryptoSpi;
-	
-	/**
-	 * Implements the MAsymmetricCipher interface.
-	 * 
-	 * This should be used to create the cipher object to perform 
-	 * encryption / decryption using ECC.
-	 */
-	NONSHARABLE_CLASS(CDummyECCCipherImpl) : public CBase, public MAsymmetricCipher
-		{
-	public:
-	    static CDummyECCCipherImpl* NewL(const CKey& aKey, TUid aCryptoMode, TUid aPaddingMode);
-	    static CDummyECCCipherImpl* NewLC(const CKey& aKey, TUid aCryptoMode, TUid aPaddingMode);
-	    
-	    // MPlugin Interface
-	    void Close();
-	    void Reset();
-	    void GetCharacteristicsL(const TCharacteristics*& aPluginCharacteristics);
-	    const CExtendedCharacteristics* GetExtendedCharacteristicsL();
-	    TAny* GetExtension(TUid aExtensionId); 
-	    // End of MPlugin Interface
-	    
-	    // MAsymmetricCipherBase Interface
-	    void SetKeyL(const CKey& aKey);
-	    void SetCryptoModeL(TUid aCryptoMode);
-	    void SetPaddingModeL(TUid aPaddingMode);
-	    TInt GetMaximumInputLengthL() const;
-	    TInt GetMaximumOutputLengthL() const;
-	    // End of MAsymmetricCipherBase Interface
-	    
-		// MAsymmetricCipher Interface
-		void ProcessL(const TDesC8& aInput, TDes8& aOutput);
-		
-		TUid ImplementationUid() const;
-		// Destructor
-		~CDummyECCCipherImpl();
-
-	private:
-		CDummyECCCipherImpl(TUid aCryptoMode, TUid aPaddingMode);
-		void ConstructL(const CKey& aKey);
-		void DecryptL(const TDesC8& aInput, TDes8& aOutput);
-		void EncryptL(const TDesC8& aInput, TDes8& aOutput);
-		
-	private:
-		/* The key extracted from a CKey object. This would just have 
-		 * a handle to the key stored in hardware. Hence the actual key 
-		 * would not be available to the user of this cryptoSPI plugin.
-		 */
-	    CKey* iKey;
-		
-		/// encryption or decryption
-		TUid iCryptoMode;		
-
-		/* The current padding scheme. This is not being used in the 
-		 * reference implementation.
-		 */
-		TUid iPaddingMode;
-		};
-
-			
-	}
-
-#endif	//	CDUMMYECCIMPL_H
--- a/cryptoplugins/cryptospiplugins/test/dummyecchwplugin/src/dummyeccsignerimpl.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,147 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include "dummyeccsignerimpl.h"
-#include "keys.h"
-#include "pluginconfig.h"
-#include "cryptospihai.h"
-
-using namespace DummyEccHwCrypto;
-using namespace CryptoSpiHai;
-
-const TInt KMaxSignerOutputLength = 50;
-const TInt KMaxSignerInputLength = 50;
-
-// CDummyECCSignerImpl
-CDummyECCSignerImpl* CDummyECCSignerImpl::NewL(const CKey& aKey,
-        TUid aPaddingMode)
-    {
-    CDummyECCSignerImpl* self =
-            CDummyECCSignerImpl::NewLC(aKey, aPaddingMode);
-    CleanupStack::Pop(self);
-    return self;
-    }
-
-CDummyECCSignerImpl* CDummyECCSignerImpl::NewLC(const CKey& aKey,
-        TUid aPaddingMode)
-    {
-    CDummyECCSignerImpl* self =
-            new (ELeave) CDummyECCSignerImpl(aPaddingMode);
-    CleanupStack::PushL(self);
-    self->ConstructL(aKey);
-    return self;
-    }
-
-CDummyECCSignerImpl::CDummyECCSignerImpl(TUid aPaddingMode) :
-    iPaddingMode(aPaddingMode)
-    {
-    }
-
-CDummyECCSignerImpl::~CDummyECCSignerImpl()
-    {
-    delete iKey;
-    }
-
-void CDummyECCSignerImpl::ConstructL(const CKey& aKey)
-    {
-    SetKeyL(aKey);
-    }
-
-// MPlugin Interface
-void CDummyECCSignerImpl::Close()
-    {
-    delete this;
-    }
-void CDummyECCSignerImpl::Reset()
-    {
-    }
-void CDummyECCSignerImpl::GetCharacteristicsL(
-        const TCharacteristics*& aPluginCharacteristics)
-    {
-    TInt numCiphers = sizeof(KSignerCharacteristics)
-            / sizeof(TAsymmetricSignatureCharacteristics*);
-    TInt32 implUid = ImplementationUid().iUid;
-    for (TInt i = 0; i < numCiphers; ++i)
-        {
-        if (KSignerCharacteristics[i]->cmn.iImplementationUID == implUid)
-            {
-            aPluginCharacteristics = KSignerCharacteristics[i];
-            break;
-            }
-        }
-    }
-
-const CExtendedCharacteristics* CDummyECCSignerImpl::GetExtendedCharacteristicsL()
-    {
-    // All Symbian software plug-ins have unlimited concurrency, cannot be reserved
-    // for exclusive use and are not CERTIFIED to be standards compliant.
-    return CExtendedCharacteristics::NewL(KMaxTInt, EFalse);
-    }
-
-TAny* CDummyECCSignerImpl::GetExtension(TUid /* aExtensionId */)
-    {
-    return 0;
-    }
-// End of MPlugin Interface
-
-// MSignatureBase Interface
-void CDummyECCSignerImpl::SetPaddingModeL(TUid /* aPaddingMode */)
-    {
-    User::Leave(KErrNotSupported);
-    }
-
-void CDummyECCSignerImpl::SetKeyL(const CKey& aKey)
-    {
-    // delete any previous key and recreate the key
-    delete iKey;
-    iKey = NULL;
-    iKey = CKey::NewL(aKey);
-    }
-
-TInt CDummyECCSignerImpl::GetMaximumInputLengthL() const
-    {
-    return KMaxSignerInputLength;
-    }
-
-TInt CDummyECCSignerImpl::GetMaximumOutputLengthL() const
-    {
-    return KMaxSignerOutputLength;
-    }
-
-TUid CDummyECCSignerImpl::ImplementationUid() const
-    {
-    return KCryptoPluginEccSignerUid;
-    }
-
-void CDummyECCSignerImpl::SignL(const TDesC8& aInput,
-        CCryptoParams& aSignature)
-    {
-    if (iKey->IsPresent(KPassedHandleToKeyUid))
-        {
-        const TInt keyHandle = iKey->GetTIntL(KPassedHandleToKeyUid);
-
-        // Invoke the Spi HAI to perform the operation
-        CCryptoSpiHai::SignL(keyHandle, aInput, aSignature);
-        }
-    else
-        {
-        User::Leave(KErrNotSupported);
-        }
-    }
-
-// End of file
--- a/cryptoplugins/cryptospiplugins/test/dummyecchwplugin/src/dummyeccsignerimpl.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,85 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-/**
- @file
- @internalComponent
- @released
-*/
-#ifndef	CDUMMYECCSIGNERIMPL_H
-#define	CDUMMYECCSIGNERIMPL_H
-#include <e32base.h>
-#include <e32cmn.h>
-#include "keys.h"
-#include "signerplugin.h"
-
-namespace DummyEccHwCrypto
-	{
-	using namespace CryptoSpi;
-
-    /**
-     * Implements the MSigner interface.
-     * 
-     * This should be used to create the signer object to perform 
-     * signing using ECC.
-     */
-	NONSHARABLE_CLASS(CDummyECCSignerImpl) : public CBase, public MSigner
-		{
-	public:
-		static CDummyECCSignerImpl* NewL(const CryptoSpi::CKey& aKey, 
-			TUid aPaddingMode);
-		static CDummyECCSignerImpl* NewLC(const CryptoSpi::CKey& aKey, 
-			TUid aPaddingMode);
-
-		// MPlugin Interface
-		void Close();
-        void Reset();
-        void GetCharacteristicsL(const TCharacteristics*& aPluginCharacteristics);
-        const CExtendedCharacteristics* GetExtendedCharacteristicsL();
-        TAny* GetExtension(TUid aExtensionId);
-        // End of MPlugin Interface    
-        
-        // MSignatureBase inteface
-		void SetPaddingModeL(TUid aPaddingMode);
-		void SetKeyL(const CKey& aPrivateKey);
-		TInt GetMaximumInputLengthL() const;
-		TInt GetMaximumOutputLengthL() const;
-		// End of MSignatureBase inteface
-		
-		// MSigner interface
-		void SignL(const TDesC8& aInput, CCryptoParams& aSignature);
-
-		TUid ImplementationUid() const;
-		/// Destructor
-		~CDummyECCSignerImpl();
-
-	private:
-		CDummyECCSignerImpl(TUid aPaddingMode);
-		void ConstructL(const CryptoSpi::CKey& aKey);
-
-	private:
-	    /* The key extracted from a CKey object. This would just have 
-         * a handle to the key stored in hardware. Hence the actual key 
-         * would not be available to the user of this cryptoSPI plugin.
-         */
-        CKey* iKey;
-	    TUid iPaddingMode;
-		};
-	}
-
-#endif //CDUMMYECCSIGNERIMPL_H
--- a/cryptoplugins/cryptospiplugins/test/dummyecchwplugin/src/pluginconfig.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,133 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-/**
- @file
- @internalComponent
- @released
- */
-#ifndef CCRYPTOAPI_DUMMYECCHWPLUGINCONFIG_H
-#define CCRYPTOAPI_DUMMYECCHWPLUGINCONFIG_H
-
-#include <cryptospi/cryptoparams.h>
-#include <e32cmn.h>
-#include <cryptospi/romlit.h>
-#include "cryptospi/cryptospidef.h"
-
-namespace DummyEccHwCrypto
-    {
-    using namespace CryptoSpi;
-    /**
-     Creator Name
-     */
-    _ROMLIT16(KNokia, "Nokia");
-    /**
-     implementation Name
-     */
-    _ROMLIT16(KEccCipherDescription, "Ecc");
-    _ROMLIT16(KEccSignerDescription, "EccSigner");
-
-    /**
-     ECC Cipher Characteristics
-     */
-    static const TInt32 KCryptoPluginEccCipher = 0xA000D697;
-    static const TUid KCryptoPluginEccCipherUid =
-        {
-        KCryptoPluginEccCipher
-        };
-    static const TInt32 KECCCipherPaddingModes[] =
-        {
-        KPaddingModeNone
-        };
-
-    static const TAsymmetricCipherCharacteristics KECC_1 =
-        {
-        KAsymmetricCipherInterface, /* iInterfaceUID */
-        KAlgorithmCipherEcc, /* iAlgorithmUID */
-        KCryptoPluginEccCipher, /* iImplementationUID */
-        &KNokia, /* iCreatorName */
-        EFalse, /* iIsFIPSApproved */
-        ETrue, /* iIsHardwareSupported */
-        6, /* iMaxConcurrencySupported */
-        &KEccCipherDescription, /* iAlgorithmName */
-        100, /* iLatency */
-        90, /* iThroughput */
-        360, /* iMaximumKeyLength */
-        KECCCipherPaddingModes, /* iSupportedPaddingModes */
-        sizeof(KECCCipherPaddingModes) / sizeof(KECCCipherPaddingModes[0]), /* iPaddingModeNum */
-        3
-        /* iKeySupportMode */
-        };
-
-    /**
-     ECC Signer Characteristics
-     */
-    static const TInt32 KCryptoPluginEccSigner = 0xA000D698;
-    static const TUid KCryptoPluginEccSignerUid =
-        {
-        KCryptoPluginEccSigner
-        };
-    static const TInt32 KECCSignerPaddingModes[] =
-        {
-        KPaddingModeNone
-        };
-
-    static const TAsymmetricSignatureCharacteristics KECCSigner_1 =
-        {
-        KSignerInterface, /* iInterfaceUID */
-        KAlgorithmSignerEcc, /* iAlgorithmUID */
-        KCryptoPluginEccSigner, /* iImplementationUID */
-        &KNokia, /* iCreatorName */
-        EFalse, /* iIsFIPSApproved */
-        ETrue, /* iIsHardwareSupported */
-        6, /* iMaxConcurrencySupported */
-        &KEccSignerDescription, /* iAlgorithmName */
-        100, /* iLatency */
-        90, /* iThroughput */
-        360, /* iMaximumKeyLength */
-        KECCCipherPaddingModes, /* iSupportedPaddingModes */
-        sizeof(KECCCipherPaddingModes) / sizeof(KECCCipherPaddingModes[0]), /* iPaddingModeNum */
-        3
-        /* iKeySupportMode */
-        };
-
-    /**
-     For each crypto algorithm type implemented in this plugin list the characteristics
-     */
-
-    /**
-     Asymmetric Cipher implementation characteristic table
-     */
-    static const TAsymmetricCipherCharacteristics
-            * const KAsymmetricCipherCharacteristics[] =
-                {
-                &KECC_1
-                };
-
-    /**
-     Signer implementation characteristic table
-     */
-    static const TAsymmetricSignatureCharacteristics
-            * const KSignerCharacteristics[] =
-                {
-                &KECCSigner_1
-                };
-
-    }
-
-#endif //CCRYPTOAPI_DUMMYECCHWPLUGINCONFIG_H
--- a/cryptoplugins/cryptospiplugins/test/dummyecchwplugin/src/pluginentry.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,141 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include "pluginentry.h"
-#include "pluginconfig.h"
-#include "dummyeccimpl.h"
-#include "dummyeccsignerimpl.h"
-#include "keys.h"
-#include <cryptospi/cryptospidef.h>
-
-using namespace DummyEccHwCrypto;
-
-EXPORT_C const TCharacteristics** CCryptoPluginEntry::Enumerate(
-        TUid aInterface, TInt& aNumPlugins)
-    {
-    const TCharacteristics** ptr(0);
-
-    switch (aInterface.iUid)
-        {
-        case KAsymmetricCipherInterface:
-            {
-            aNumPlugins = sizeof(KAsymmetricCipherCharacteristics)
-                    / sizeof(TAsymmetricCipherCharacteristics*);
-            ptr
-                    = (const TCharacteristics**) &KAsymmetricCipherCharacteristics[0];
-            }
-            break;
-
-        case KSignerInterface:
-            {
-            aNumPlugins = sizeof(KSignerCharacteristics)
-                    / sizeof(TAsymmetricSignatureCharacteristics*);
-            ptr = (const TCharacteristics**) &KSignerCharacteristics[0];
-            }
-            break;
-
-        default:
-            aNumPlugins = 0;
-        }
-
-    return ptr;
-    }
-
-EXPORT_C void CCryptoPluginEntry::GetExtendedCharacteristicsL(
-        TUid /* aImplementationUid */, CExtendedCharacteristics*& /* aExt */)
-    {
-    User::Leave(KErrNotSupported);
-    }   
-
-EXPORT_C void CCryptoPluginEntry::CreateAsymmetricCipherL(
-        MAsymmetricCipher*& aPlugin, TUid aImplementationId,
-        const CKey& aKey, TUid aCryptoMode, TUid aPaddingMode,
-        const CCryptoParams* /* aAlgorithmParams */)
-    {
-    switch (aImplementationId.iUid)
-        {
-        case KCryptoPluginEccCipher:
-            {
-            aPlugin = CDummyECCCipherImpl::NewL(aKey, aCryptoMode, aPaddingMode);
-            }
-            break;
-
-        default:
-            User::Leave(KErrNotFound);
-        }
-    }
-
-EXPORT_C void CCryptoPluginEntry::CreateAsymmetricSignerL(
-        MSigner*& aPlugin, TUid aImplementationId,
-        const CKey& aKey, TUid aPaddingMode, const CCryptoParams* /* aAlgorithmParams */)
-    {
-    switch (aImplementationId.iUid)
-        {
-        case KCryptoPluginEccSigner:
-            {
-            aPlugin = CDummyECCSignerImpl::NewL(aKey, aPaddingMode);
-            }
-            break;
-
-        default:
-            User::Leave(KErrNotFound);
-        }
-    }
-
-EXPORT_C void CCryptoPluginEntry::CreateAsymmetricVerifierL(
-        MVerifier*& /*aPlugin*/, TUid /*aImplementationId*/,
-        const CKey& /*aKey*/, TUid /*aPaddingMode*/, const CCryptoParams* /*aAlgorithmParams*/)
-    {
-    User::Leave(KErrNotFound);
-    }
-
-EXPORT_C void CCryptoPluginEntry::CreateHashL(MHash*& /*aPlugin*/,
-        TUid /*aImplementationId*/, TUid /*aOperationMode*/,
-        const CKey* /*aKey*/, const CCryptoParams* /*aAlgorithmParams*/)
-    {
-    User::Leave(KErrNotFound);
-    }
-
-EXPORT_C void CCryptoPluginEntry::CreateKeyAgreementL(
-        MKeyAgreement*& /*aPlugin*/, TUid /*aImplementationId*/,
-        const CKey& /*aPrivateKey*/, const CCryptoParams* /*aAlgorithmParams*/)
-    {
-    User::Leave(KErrNotFound);
-    }
-
-EXPORT_C void CCryptoPluginEntry::CreateKeyPairGeneratorL(
-        MKeyPairGenerator*& /*aPlugin*/, TUid /*aImplementationId*/,
-        const CCryptoParams* /*aAlgorithmParams*/)
-    {
-    User::Leave(KErrNotFound);
-    }
-
-EXPORT_C void CCryptoPluginEntry::CreateRandomL(MRandom*& /*aPlugin*/,
-        TUid /*aImplementationId*/, const CCryptoParams* /*aAlgorithmParams*/)
-    {
-    User::Leave(KErrNotFound);
-    }
-
-EXPORT_C void CCryptoPluginEntry::CreateSymmetricCipherL(
-        MSymmetricCipher*& /*aPlugin*/, TUid /*aImplementationId*/, const CKey& /*aKey*/,
-        TUid /*aCryptoMode*/, TUid /*aOperationMode*/, TUid /*aPadding*/,
-        const CCryptoParams* /*aAlgorithmParams*/)
-    {
-    User::Leave(KErrNotSupported);
-    }
-// End of file
--- a/cryptoplugins/cryptospiplugins/test/dummyecchwplugin/src/pluginentry.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,210 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-/**
- * @file
- * @internalComponent
- * @released
- */
-#ifndef CPLUGINENTRY_H
-#define CPLUGINENTRY_H
-
-#include <cryptospi/cryptoparams.h>
-#include <e32cmn.h>
-#include <cryptospi/cryptospidef.h>
-#include "keys.h"
-#include <cryptospi/hashplugin.h>
-#include <cryptospi/randomplugin.h>
-#include "symmetriccipherplugin.h"
-#include "asymmetriccipherplugin.h"
-#include "signerplugin.h"
-#include "verifierplugin.h"
-#include "keypairgeneratorplugin.h"
-#include "keyagreementplugin.h"
-
-using namespace CryptoSpi;
-
-class CCryptoPluginEntry
-    {
-public:
-    /**
-     * Enumerates the set of plug-ins supported by the module for a given interface
-     * e.g. all of the hash plug-ins.
-     *
-     * @param aInterface The UID of the plug-in interface type. If the UID is not recognised
-     * then the NULL pointer must be returned.
-     * @param aNumPlugins The number of plug-in characteristics objects in the result.
-     */
-    IMPORT_C static const TCharacteristics** Enumerate(TUid aInterface,
-            TInt& aNumPlugins);
-
-    IMPORT_C static void GetExtendedCharacteristicsL(TUid aImplementationUid,
-            CExtendedCharacteristics*&);
-    
-    /**
-     * Creates a new instance of an asymmetric cipher
-     *
-     * @param aPlugin A reference to a pointer that should be set to point to 
-     * the new asymmetric cipher object.
-     * @param aImplementationId The UID of the asymmetric cipher plug-in to instantiate.
-     * @param aKey The encryption/decryption key.
-     * @param aPaddingMode The padding mode.
-     * @param aAlgorithmParams The parameters that are specific to a particular 
-     * algorithm. This is for extendibility and will normally be null.
-     * 
-     * @leave Function can leave with any system wide error codes in 
-     * case of failure.
-     */
-    IMPORT_C static void CreateAsymmetricCipherL(MAsymmetricCipher*& aPlugin,
-            TUid aImplementationId, const CKey& aKey, TUid aCryptoMode,
-            TUid aPaddingMode, const CCryptoParams* aAlgorithmParams);
-
-    /**
-     * Creates a new instance of an asymmetric signer.
-     *
-     * @param aPlugin A reference to a pointer that should be set to point to 
-     * the new asymmetric signer object.
-     * @param aImplementationId The UID of the signer plug-in to instantiate.
-     * @param aKey The signing key.
-     * @param aPaddingMode The padding mode.
-     * @param aAlgorithmParams The parameters that are specific to a particular 
-     * algorithm. This is for extendibility and will normally be null.
-     * 
-     * @leave Function can leave with any system wide error codes in 
-     * case of failure.
-     */
-    IMPORT_C static void CreateAsymmetricSignerL(MSigner*& aPlugin,
-            TUid aImplementationId, const CKey& aKey, TUid aPaddingMode,
-            const CCryptoParams* aAlgorithmParams);
-
-    /**
-     * Creates a new instance of an asymmetric verifier.
-     *
-     * @param aPlugin A reference to a pointer that should be set to point to 
-     * the new asymmetric verifier object.
-     * @param aImplementationId The UID of the verifier plug-in to instantiate.
-     * @param aKey The key to verify the signature with.
-     * @param aAlgorithmParams The parameters that are specific to a particular 
-     * algorithm. This is for extendibility and will normally be null.
-     *
-     * @leave Function can leave with any system wide error codes in 
-     * case of failure.
-     */
-    IMPORT_C static void CreateAsymmetricVerifierL(MVerifier*& aPlugin,
-                                                   TUid aImplementationId,
-                                                   const CKey& aKey,
-                                                   TUid aPaddingMode,
-                                                   const CCryptoParams* aAlgorithmParams);
-
-    /**
-     * Creates a new instance of a Hash object.
-     *
-     * @param aPlugin A reference to a pointer that should be set to point to 
-     * the new hash object.
-     * @param aImplementationId The UID of the hash plug-in to instantiate.
-     * @param aAlgorithmParams The parameters that are specific to a particular 
-     * algorithm. This is for extendibility and will normally be null.
-     *
-     * @leave Function can leave with any system wide error codes in 
-     * case of failure.
-     */
-    IMPORT_C static void CreateHashL(MHash*& aPlugin,
-                                     TUid aImplementationId,
-                                     TUid aOperationMode,
-                                     const CKey* aKey,
-                                     const CCryptoParams* aAlgorithmParams);
-
-    /**
-     * Creates a new instance of a Random object.
-     *
-     * @param aPlugin A reference to a pointer that should be set to point to the new random object.
-     * @param aImplementationId The UID of the random plug-in to instantiate.
-     * @param aAlgorithmParams The parameters that are specific to a particular 
-     * algorithm. This is for extendibility and will normally be null.
-     *
-     * @leave Function can leave with any system wide error codes in 
-     * case of failure.
-     */
-    IMPORT_C static void CreateRandomL(MRandom*& aPlugin,
-                                       TUid aImplementationId,
-                                       const CCryptoParams* aAlgorithmParams);
-
-
-    /**
-     * Creates a new instance of a key agreement system.
-     *
-     * @param aPlugin A reference to a pointer that should be set to point to 
-     * the new asymmetric key pair generator object.
-     * @param aImplementationId The UID of the key agreement plug-in to instantiate.
-     * @param aPrivateKey The private key to combine with the other parties public key
-     * during the agreement.
-     * @param aAlgorithmParams The parameters that are specific to a particular 
-     * algorithm. This is for extendibility and will normally be null.
-     *
-     * @leave Function can leave with any system wide error codes in 
-     * case of failure.
-     */
-    IMPORT_C static void CreateKeyAgreementL(MKeyAgreement*& aPlugin,
-                                             TUid aImplementationId,
-                                             const CKey& aPrivateKey,
-                                             const CCryptoParams* aAlgorithmParams);
-
-    /**
-     * Creates a new instance of an asymmetric key pair generator.
-     *
-     * @param aPlugin A reference to a pointer that should be set to point to 
-     * the new asymmetric key pair generator object.
-     * @param aImplementationId The UID of the verifier plug-in to instantiate.
-     * @param aAlgorithmParams The parameters that are specific to a particular 
-     * algorithm. This is for extendibility and will normally be null.
-     *
-     * @leave Function can leave with any system wide error codes in 
-     * case of failure.
-     */
-    IMPORT_C static void CreateKeyPairGeneratorL(MKeyPairGenerator*& aPlugin,
-                                                 TUid aImplementationId,
-                                                 const CCryptoParams* aAlgorithmParams);
-                                        
-    /**
-     * Creates a new instance of a symmetric cipher
-     *
-     * @param aPlugin A reference to a pointer that should be set to point to 
-     * the new asymmetric object.
-     * @param aImplementationId The UID of the symmetric cipher plug-in to instantiate.
-     * @param aKey The encryption/decryption key.
-     * @param aCryptoMode Encrypt or Decrypt.
-     * @param aOperationMode the block cipher mode to use ECB, CBC, CTR etc
-     * @param aPadding the padding scheme to use.
-     * @param aAlgorithmParams The parameters that are specific to a particular 
-     * algorithm. This is for extendibility and will normally be null.
-     *
-     * @leave Function can leave with any system wide error codes in 
-     * case of failure.
-     */
-    IMPORT_C static void CreateSymmetricCipherL(MSymmetricCipher*& aPlugin,
-                                                TUid aImplementationId,
-                                                const CKey& aKey,
-                                                TUid aCryptoMode,
-                                                TUid aOperationMode,
-                                                TUid aPadding,
-                                                const CCryptoParams* aAlgorithmParams);
-
-
-    };
-
-#endif // CPLUGINENTRY_H
--- a/cryptoservices/certificateandkeymgmt/bwins/certstoreu.def	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,64 +0,0 @@
-EXPORTS
-	??1CCertificateAppInfoManager@@UAE@XZ @ 1 NONAME ; CCertificateAppInfoManager::~CCertificateAppInfoManager(void)
-	??1CUnifiedCertStore@@UAE@XZ @ 2 NONAME ; CUnifiedCertStore::~CUnifiedCertStore(void)
-	??1CUnifiedKeyStore@@UAE@XZ @ 3 NONAME ; CUnifiedKeyStore::~CUnifiedKeyStore(void)
-	?AddL@CCertificateAppInfoManager@@QAEXABVTCertificateAppInfo@@@Z @ 4 NONAME ; void CCertificateAppInfoManager::AddL(class TCertificateAppInfo const &)
-	?ApplicationL@CCertificateAppInfoManager@@QBEABVTCertificateAppInfo@@ABVTUid@@AAH@Z @ 5 NONAME ; class TCertificateAppInfo const & CCertificateAppInfoManager::ApplicationL(class TUid const &, int &) const
-	?Applications@CCertificateAppInfoManager@@QBEABV?$RArray@VTCertificateAppInfo@@@@XZ @ 6 NONAME ; class RArray<class TCertificateAppInfo> const & CCertificateAppInfoManager::Applications(void) const
-	?CancelCreateKey@CUnifiedKeyStore@@QAEXXZ @ 7 NONAME ; void CUnifiedKeyStore::CancelCreateKey(void)
-	?CancelDeleteKey@CUnifiedKeyStore@@QAEXXZ @ 8 NONAME ; void CUnifiedKeyStore::CancelDeleteKey(void)
-	?CancelExportEncryptedKey@CUnifiedKeyStore@@QAEXXZ @ 9 NONAME ; void CUnifiedKeyStore::CancelExportEncryptedKey(void)
-	?CancelExportKey@CUnifiedKeyStore@@QAEXXZ @ 10 NONAME ; void CUnifiedKeyStore::CancelExportKey(void)
-	?CancelImportKey@CUnifiedKeyStore@@QAEXXZ @ 11 NONAME ; void CUnifiedKeyStore::CancelImportKey(void)
-	?CancelInitialize@CUnifiedCertStore@@QAEXXZ @ 12 NONAME ; void CUnifiedCertStore::CancelInitialize(void)
-	?CancelInitialize@CUnifiedKeyStore@@QAEXXZ @ 13 NONAME ; void CUnifiedKeyStore::CancelInitialize(void)
-	?CancelRelock@CUnifiedKeyStore@@QAEXXZ @ 14 NONAME ; void CUnifiedKeyStore::CancelRelock(void)
-	?CancelRemove@CUnifiedCertStore@@QAEXXZ @ 15 NONAME ; void CUnifiedCertStore::CancelRemove(void)
-	?CancelSetApplicability@CUnifiedCertStore@@QAEXXZ @ 16 NONAME ; void CUnifiedCertStore::CancelSetApplicability(void)
-	?CancelSetManagementPolicy@CUnifiedKeyStore@@QAEXXZ @ 17 NONAME ; void CUnifiedKeyStore::CancelSetManagementPolicy(void)
-	?CancelSetPassphraseTimeout@CUnifiedKeyStore@@QAEXXZ @ 18 NONAME ; void CUnifiedKeyStore::CancelSetPassphraseTimeout(void)
-	?CancelSetTrust@CUnifiedCertStore@@QAEXXZ @ 19 NONAME ; void CUnifiedCertStore::CancelSetTrust(void)
-	?CancelSetUsePolicy@CUnifiedKeyStore@@QAEXXZ @ 20 NONAME ; void CUnifiedKeyStore::CancelSetUsePolicy(void)
-	?CertStore@CUnifiedCertStore@@QAEAAVMCTCertStore@@H@Z @ 21 NONAME ; class MCTCertStore & CUnifiedCertStore::CertStore(int)
-	?CertStoreCount@CUnifiedCertStore@@QBEHXZ @ 22 NONAME ; int CUnifiedCertStore::CertStoreCount(void) const
-	?CreateKey@CUnifiedKeyStore@@QAEXHW4TKeyUsagePKCS15@@IABVTDesC16@@W4EKeyAlgorithm@CKeyInfoBase@@HVTTime@@3AAPAVCCTKeyInfo@@AAVTRequestStatus@@@Z @ 23 NONAME ; void CUnifiedKeyStore::CreateKey(int, enum TKeyUsagePKCS15, unsigned int, class TDesC16 const &, enum CKeyInfoBase::EKeyAlgorithm, int, class TTime, class TTime, class CCTKeyInfo * &, class TRequestStatus &)
-	?DeleteKey@CUnifiedKeyStore@@QAEXVTCTTokenObjectHandle@@AAVTRequestStatus@@@Z @ 24 NONAME ; void CUnifiedKeyStore::DeleteKey(class TCTTokenObjectHandle, class TRequestStatus &)
-	?ExportEncryptedKey@CUnifiedKeyStore@@QAEXVTCTTokenObjectHandle@@ABVCPBEncryptParms@@AAPAVHBufC8@@AAVTRequestStatus@@@Z @ 25 NONAME ; void CUnifiedKeyStore::ExportEncryptedKey(class TCTTokenObjectHandle, class CPBEncryptParms const &, class HBufC8 * &, class TRequestStatus &)
-	?ExportKey@CUnifiedKeyStore@@QAEXVTCTTokenObjectHandle@@AAPAVHBufC8@@AAVTRequestStatus@@@Z @ 26 NONAME ; void CUnifiedKeyStore::ExportKey(class TCTTokenObjectHandle, class HBufC8 * &, class TRequestStatus &)
-	?ImportKey@CUnifiedKeyStore@@QAEXHABVTDesC8@@W4TKeyUsagePKCS15@@ABVTDesC16@@HVTTime@@3AAPAVCCTKeyInfo@@AAVTRequestStatus@@@Z @ 27 NONAME ; void CUnifiedKeyStore::ImportKey(int, class TDesC8 const &, enum TKeyUsagePKCS15, class TDesC16 const &, int, class TTime, class TTime, class CCTKeyInfo * &, class TRequestStatus &)
-	?Initialize@CUnifiedCertStore@@QAEXAAVTRequestStatus@@@Z @ 28 NONAME ; void CUnifiedCertStore::Initialize(class TRequestStatus &)
-	?Initialize@CUnifiedKeyStore@@QAEXAAVTRequestStatus@@@Z @ 29 NONAME ; void CUnifiedKeyStore::Initialize(class TRequestStatus &)
-	?KeyStore@CUnifiedKeyStore@@QAEAAVMCTKeyStore@@H@Z @ 30 NONAME ; class MCTKeyStore & CUnifiedKeyStore::KeyStore(int)
-	?KeyStoreCount@CUnifiedKeyStore@@QBEHXZ @ 31 NONAME ; int CUnifiedKeyStore::KeyStoreCount(void) const
-	?KeyStoreManager@CUnifiedKeyStore@@QAEAAVMCTKeyStoreManager@@H@Z @ 32 NONAME ; class MCTKeyStoreManager & CUnifiedKeyStore::KeyStoreManager(int)
-	?KeyStoreManagerCount@CUnifiedKeyStore@@QBEHXZ @ 33 NONAME ; int CUnifiedKeyStore::KeyStoreManagerCount(void) const
-	?List@CUnifiedCertStore@@QAEXAAV?$RMPointerArray@VCCTCertInfo@@@@ABVCCertAttributeFilter@@ABVTDesC8@@AAVTRequestStatus@@@Z @ 34 NONAME ; void CUnifiedCertStore::List(class RMPointerArray<class CCTCertInfo> &, class CCertAttributeFilter const &, class TDesC8 const &, class TRequestStatus &)
-	?List@CUnifiedCertStore@@QAEXAAV?$RMPointerArray@VCCTCertInfo@@@@ABVCCertAttributeFilter@@V?$RPointerArray@$$CBVTDesC8@@@@AAVTRequestStatus@@@Z @ 35 NONAME ; void CUnifiedCertStore::List(class RMPointerArray<class CCTCertInfo> &, class CCertAttributeFilter const &, class RPointerArray<class TDesC8 const >, class TRequestStatus &)
-	?NewL@CCertificateAppInfoManager@@SAPAV1@AAVRFs@@H@Z @ 36 NONAME ; class CCertificateAppInfoManager * CCertificateAppInfoManager::NewL(class RFs &, int)
-	?NewL@CCertificateAppInfoManager@@SAPAV1@XZ @ 37 NONAME ; class CCertificateAppInfoManager * CCertificateAppInfoManager::NewL(void)
-	?NewL@CUnifiedCertStore@@SAPAV1@AAVRFs@@H@Z @ 38 NONAME ; class CUnifiedCertStore * CUnifiedCertStore::NewL(class RFs &, int)
-	?NewL@CUnifiedKeyStore@@SAPAV1@AAVRFs@@@Z @ 39 NONAME ; class CUnifiedKeyStore * CUnifiedKeyStore::NewL(class RFs &)
-	?NewLC@CCertificateAppInfoManager@@SAPAV1@AAVRFs@@H@Z @ 40 NONAME ; class CCertificateAppInfoManager * CCertificateAppInfoManager::NewLC(class RFs &, int)
-	?NewLC@CCertificateAppInfoManager@@SAPAV1@XZ @ 41 NONAME ; class CCertificateAppInfoManager * CCertificateAppInfoManager::NewLC(void)
-	?NewLC@CUnifiedCertStore@@SAPAV1@AAVRFs@@H@Z @ 42 NONAME ; class CUnifiedCertStore * CUnifiedCertStore::NewLC(class RFs &, int)
-	?NewLC@CUnifiedKeyStore@@SAPAV1@AAVRFs@@@Z @ 43 NONAME ; class CUnifiedKeyStore * CUnifiedKeyStore::NewLC(class RFs &)
-	?ReadOnlyCertStore@CUnifiedCertStore@@QAEAAVMCTCertStore@@H@Z @ 44 NONAME ; class MCTCertStore & CUnifiedCertStore::ReadOnlyCertStore(int)
-	?ReadOnlyCertStoreCount@CUnifiedCertStore@@QBEHXZ @ 45 NONAME ; int CUnifiedCertStore::ReadOnlyCertStoreCount(void) const
-	?Relock@CUnifiedKeyStore@@QAEXAAVTRequestStatus@@@Z @ 46 NONAME ; void CUnifiedKeyStore::Relock(class TRequestStatus &)
-	?Remove@CUnifiedCertStore@@QAEXABVCCTCertInfo@@AAVTRequestStatus@@@Z @ 47 NONAME ; void CUnifiedCertStore::Remove(class CCTCertInfo const &, class TRequestStatus &)
-	?RemoveL@CCertificateAppInfoManager@@QAEXABVTUid@@@Z @ 48 NONAME ; void CCertificateAppInfoManager::RemoveL(class TUid const &)
-	?Retrieve@CUnifiedCertStore@@QAEXABVCCTCertInfo@@AAPAVCCertificate@@AAVTRequestStatus@@@Z @ 49 NONAME ; void CUnifiedCertStore::Retrieve(class CCTCertInfo const &, class CCertificate * &, class TRequestStatus &)
-	?SetApplicability@CUnifiedCertStore@@QAEXABVCCTCertInfo@@ABV?$RArray@VTUid@@@@AAVTRequestStatus@@@Z @ 50 NONAME ; void CUnifiedCertStore::SetApplicability(class CCTCertInfo const &, class RArray<class TUid> const &, class TRequestStatus &)
-	?SetManagementPolicy@CUnifiedKeyStore@@QAEXVTCTTokenObjectHandle@@ABVTSecurityPolicy@@AAVTRequestStatus@@@Z @ 51 NONAME ; void CUnifiedKeyStore::SetManagementPolicy(class TCTTokenObjectHandle, class TSecurityPolicy const &, class TRequestStatus &)
-	?SetPassphraseTimeout@CUnifiedKeyStore@@QAEXHAAVTRequestStatus@@@Z @ 52 NONAME ; void CUnifiedKeyStore::SetPassphraseTimeout(int, class TRequestStatus &)
-	?SetTrust@CUnifiedCertStore@@QAEXABVCCTCertInfo@@HAAVTRequestStatus@@@Z @ 53 NONAME ; void CUnifiedCertStore::SetTrust(class CCTCertInfo const &, int, class TRequestStatus &)
-	?SetUsePolicy@CUnifiedKeyStore@@QAEXVTCTTokenObjectHandle@@ABVTSecurityPolicy@@AAVTRequestStatus@@@Z @ 54 NONAME ; void CUnifiedKeyStore::SetUsePolicy(class TCTTokenObjectHandle, class TSecurityPolicy const &, class TRequestStatus &)
-	?WritableCertStore@CUnifiedCertStore@@QAEAAVMCTWritableCertStore@@H@Z @ 55 NONAME ; class MCTWritableCertStore & CUnifiedCertStore::WritableCertStore(int)
-	?WritableCertStoreCount@CUnifiedCertStore@@QBEHXZ @ 56 NONAME ; int CUnifiedCertStore::WritableCertStoreCount(void) const
-	?NewL@CUnifiedCertStore@@SAPAV1@AAVRFs@@HAAV?$RArray@H@@@Z @ 57 NONAME ; class CUnifiedCertStore * CUnifiedCertStore::NewL(class RFs &, int, class RArray<int> &)
-	?NewLC@CUnifiedCertStore@@SAPAV1@AAVRFs@@HAAV?$RArray@H@@@Z @ 58 NONAME ; class CUnifiedCertStore * CUnifiedCertStore::NewLC(class RFs &, int, class RArray<int> &)
-	?ImportKey@CUnifiedKeyStore@@QAEXHABVTDesC8@@W4TKeyUsagePKCS15@@ABVTDesC16@@HVTTime@@32HAAPAVCCTKeyInfo@@AAVTRequestStatus@@@Z @ 59 NONAME ; void CUnifiedKeyStore::ImportKey(int, class TDesC8 const &, enum TKeyUsagePKCS15, class TDesC16 const &, int, class TTime, class TTime, class TDesC16 const &, int, class CCTKeyInfo * &, class TRequestStatus &)
-	?CreateKey@CUnifiedKeyStore@@QAEXHW4TKeyUsagePKCS15@@IABVTDesC16@@W4EKeyAlgorithm@CKeyInfoBase@@HVTTime@@31HAAPAVCCTKeyInfo@@AAVTRequestStatus@@@Z @ 60 NONAME ; void CUnifiedKeyStore::CreateKey(int, enum TKeyUsagePKCS15, unsigned int, class TDesC16 const &, enum CKeyInfoBase::EKeyAlgorithm, int, class TTime, class TTime, class TDesC16 const &, int, class CCTKeyInfo * &, class TRequestStatus &)
-	?SetAuthenticationPolicy@CUnifiedKeyStore@@QAEXVTCTTokenObjectHandle@@ABVTDesC16@@HAAVTRequestStatus@@@Z @ 61 NONAME ; void CUnifiedKeyStore::SetAuthenticationPolicy(class TCTTokenObjectHandle, class TDesC16 const &, int, class TRequestStatus &)
-	?GetAuthenticationPolicy@CUnifiedKeyStore@@QAEXVTCTTokenObjectHandle@@AAPAVHBufC16@@AAHAAVTRequestStatus@@@Z @ 62 NONAME ; void CUnifiedKeyStore::GetAuthenticationPolicy(class TCTTokenObjectHandle, class HBufC16 * &, int &, class TRequestStatus &)
-
--- a/cryptoservices/certificateandkeymgmt/certstore/certstore.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/certificateandkeymgmt/certstore/certstore.mmp	Wed Apr 14 17:48:59 2010 +0300
@@ -28,11 +28,8 @@
 
 UID 0x1000008d 0x10005e0a
 VENDORID 0x70000001
-#ifdef SYMBIAN_AUTH_SERVER
-DEFFILE certstore.def
-#else
+
 DEFFILE CERTSTORE_V2.DEF
-#endif // SYMBIAN_AUTH_SERVER
 
 SOURCEPATH	.
 
--- a/cryptoservices/certificateandkeymgmt/certstore/unifiedkeystore.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/certificateandkeymgmt/certstore/unifiedkeystore.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -372,49 +372,6 @@
 		}
 	}
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-void CUnifiedKeyStore::Open(const TCTTokenObjectHandle& aHandle,
-                            CryptoSpi::CSigner*& aSigner,
-                            TRequestStatus& aStatus)
-    {
-    if (DoOpen(aHandle, aStatus))
-        {
-        iKeyStore->Open(aHandle, aSigner, iStatus);
-        }
-    }
-
-void CUnifiedKeyStore::Open(const TCTTokenObjectHandle& aHandle,
-                            CryptoSpi:: CAsymmetricCipher*& asymmetricCipherObj,
-                            TRequestStatus& aStatus)
-    {
-    if (DoOpen(aHandle, aStatus))
-        {
-        iKeyStore->Open(aHandle, asymmetricCipherObj, iStatus);
-        }
-    }
-
-void CUnifiedKeyStore::Decrypt(const TCTTokenObjectHandle& aHandle,
-                               const TDesC8& aCiphertext,
-                               HBufC8*& aPlaintextPtr,
-                               TRequestStatus& aStatus)
-    {
-    if (DoOpen(aHandle, aStatus))
-        {
-        iKeyStore->Decrypt(aHandle, aCiphertext, aPlaintextPtr, iStatus);
-        }
-    }
-
-void CUnifiedKeyStore::Sign(const TCTTokenObjectHandle& aHandle,
-                            const TDesC8& aPlaintext,
-                            CryptoSpi::CCryptoParams*& aSignature,
-                            TRequestStatus& aStatus)
-    {
-    if (DoOpen(aHandle, aStatus))
-        {
-        iKeyStore->Sign(aHandle, aPlaintext, aSignature, iStatus);
-        }
-    }
-#endif //SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
 
 //	************************************************************************
 //	MKeyStoreManager
@@ -637,112 +594,6 @@
 	return *result;
 	}
 
-#ifdef SYMBIAN_AUTH_SERVER
-	
-EXPORT_C void CUnifiedKeyStore::CreateKey(	TInt aKeyStoreIndex, TKeyUsagePKCS15 aUsage,TUint aSize, 
-								const TDesC& aLabel, CCTKeyInfo::EKeyAlgorithm aAlgorithm, 
-								TInt aAccessType, TTime aStartDate, TTime aEndDate, 
-								const TDesC& aAuthenticationString, TInt aFreshness,
-								CCTKeyInfo*& aKeyInfoOut, TRequestStatus& aStatus)
-		{
-		
-		StartAsyncOperation(ECreateKey, aStatus);
-		TRAPD(err, PrepareToCreateKeyL(aKeyStoreIndex, aUsage, aSize, aLabel, aAlgorithm, aAccessType,
-									   aStartDate, aEndDate, aStatus));
-		if (KErrNone != err)
-			{
-			Complete(err);
-			return;
-			}
-		
-		iKeyInfoOut = &aKeyInfoOut;
-		aKeyInfoOut = NULL;
-		iKeyStoreManager->CreateKey(aAuthenticationString, aFreshness, iKeyInfo, iStatus);
-		SetActive();
-		
-		}
-
-
-EXPORT_C void CUnifiedKeyStore::ImportKey(	TInt aKeyStoreIndex, const TDesC8& aKeyData,
-								TKeyUsagePKCS15 aUsage, const TDesC& aLabel, 
-								TInt aAccessType, TTime aStartDate, TTime aEndDate, 
-								const TDesC& aAuthenticationString, TInt aFreshness,
-								CCTKeyInfo*& aKeyInfoOut, TRequestStatus& aStatus)
-		{
-		TBool isEncrypted = TASN1DecPKCS8::IsEncryptedPKCS8Data(aKeyData);
-		StartAsyncOperation(isEncrypted ? EImportKeyEncrypted : EImportKey, aStatus);
-
-		ASSERT(!iKeyData);
-		iKeyData = aKeyData.Alloc();
-		if (!iKeyData)	//	OOM or some other catastrophe
-			{
-			Complete(KErrNoMemory);
-			return;
-			}
-		
-		TRAPD(err, PrepareToCreateKeyL(aKeyStoreIndex, aUsage, 0, aLabel, CCTKeyInfo::EInvalidAlgorithm, aAccessType,
-									   aStartDate, aEndDate, aStatus));
-		if (KErrNone != err)
-			{
-			Complete(err);
-			return;
-			}
-
-		iKeyInfoOut = &aKeyInfoOut;
-		aKeyInfoOut = NULL;
-
-		if (isEncrypted)
-			{
-			iKeyStoreManager->ImportEncryptedKey(*iKeyData, aAuthenticationString, aFreshness, iKeyInfo, iStatus);
-			}
-		else
-			{
-			iKeyStoreManager->ImportKey(*iKeyData, aAuthenticationString, aFreshness, iKeyInfo, iStatus);
-			}
-		SetActive();
-		}
-
-EXPORT_C void CUnifiedKeyStore::SetAuthenticationPolicy(	const TCTTokenObjectHandle aHandle, 
-															const TDesC& aAuthenticationString,
-															TInt aFreshness,					
-															TRequestStatus& aStatus)
-	{
-	StartAsyncOperation(ESetAuthenticationPolicy, aStatus);
-		
-	ASSERT(!iKeyStoreManager);	
-	iKeyStoreManager = FindKeyStoreManager(aHandle);
-	if (!iKeyStoreManager)
-		{
-		Complete(KErrNotFound);
-		return;
-		} 
-		
-	iKeyStoreManager->SetAuthenticationPolicy(aHandle, aAuthenticationString, aFreshness, iStatus);
-	SetActive();
-		
-	}
-
-EXPORT_C void CUnifiedKeyStore::GetAuthenticationPolicy(	const TCTTokenObjectHandle aHandle, 
-															HBufC*& aAuthenticationString,
-															TInt& aFreshness,					
-															TRequestStatus& aStatus)
-	{
-	StartAsyncOperation(EGetAuthenticationPolicy, aStatus);
-		
-	ASSERT(!iKeyStoreManager);	
-	iKeyStoreManager = FindKeyStoreManager(aHandle);
-	if (!iKeyStoreManager)
-		{
-		Complete(KErrNotFound);
-		return;
-		} 
-		
-	iKeyStoreManager->GetAuthenticationPolicy(aHandle, aAuthenticationString, aFreshness, iStatus);
-	SetActive();
-		
-	}
-
-#endif // SYMBIAN_AUTH_SERVER
 
 CUnifiedKeyStore::CUnifiedKeyStore(RFs& aFs)
 	:	CActive(EPriorityNormal), iFs(aFs), iState(EIdle)
--- a/cryptoservices/certificateandkeymgmt/documentation/Building a certificate store.rtf	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,440 +0,0 @@
-{\rtf1\ansi\ansicpg1252\uc1\deff1\stshfdbch0\stshfloch0\stshfhich0\stshfbi0\deflang2057\deflangfe2057{\fonttbl{\f0\froman\fcharset0\fprq2{\*\panose 02020603050405020304}Times New Roman;}{\f1\fswiss\fcharset0\fprq2{\*\panose 020b0604020202020204}Arial;}
-{\f2\fmodern\fcharset0\fprq1{\*\panose 02070309020205020404}Courier New;}{\f10\fnil\fcharset2\fprq2{\*\panose 05000000000000000000}Wingdings;}{\f36\froman\fcharset238\fprq2 Times New Roman CE;}{\f37\froman\fcharset204\fprq2 Times New Roman Cyr;}
-{\f39\froman\fcharset161\fprq2 Times New Roman Greek;}{\f40\froman\fcharset162\fprq2 Times New Roman Tur;}{\f41\froman\fcharset177\fprq2 Times New Roman (Hebrew);}{\f42\froman\fcharset178\fprq2 Times New Roman (Arabic);}
-{\f43\froman\fcharset186\fprq2 Times New Roman Baltic;}{\f44\froman\fcharset163\fprq2 Times New Roman (Vietnamese);}{\f46\fswiss\fcharset238\fprq2 Arial CE;}{\f47\fswiss\fcharset204\fprq2 Arial Cyr;}{\f49\fswiss\fcharset161\fprq2 Arial Greek;}
-{\f50\fswiss\fcharset162\fprq2 Arial Tur;}{\f51\fswiss\fcharset177\fprq2 Arial (Hebrew);}{\f52\fswiss\fcharset178\fprq2 Arial (Arabic);}{\f53\fswiss\fcharset186\fprq2 Arial Baltic;}{\f54\fswiss\fcharset163\fprq2 Arial (Vietnamese);}
-{\f56\fmodern\fcharset238\fprq1 Courier New CE;}{\f57\fmodern\fcharset204\fprq1 Courier New Cyr;}{\f59\fmodern\fcharset161\fprq1 Courier New Greek;}{\f60\fmodern\fcharset162\fprq1 Courier New Tur;}{\f61\fmodern\fcharset177\fprq1 Courier New (Hebrew);}
-{\f62\fmodern\fcharset178\fprq1 Courier New (Arabic);}{\f63\fmodern\fcharset186\fprq1 Courier New Baltic;}{\f64\fmodern\fcharset163\fprq1 Courier New (Vietnamese);}}{\colortbl;\red0\green0\blue0;\red0\green0\blue255;\red0\green255\blue255;
-\red0\green255\blue0;\red255\green0\blue255;\red255\green0\blue0;\red255\green255\blue0;\red255\green255\blue255;\red0\green0\blue128;\red0\green128\blue128;\red0\green128\blue0;\red128\green0\blue128;\red128\green0\blue0;\red128\green128\blue0;
-\red128\green128\blue128;\red192\green192\blue192;}{\stylesheet{\ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 \snext0 Normal;}{
-\s1\ql \li0\ri0\keepn\widctlpar\faauto\outlinelevel0\adjustright\rin0\lin0\itap0 \b\f1\fs28\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 \sbasedon0 \snext0 heading 1;}{
-\s2\ql \li0\ri0\sb240\sa60\keepn\widctlpar\faauto\outlinelevel1\adjustright\rin0\lin0\itap0 \b\i\f1\fs24\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 \sbasedon0 \snext0 heading 2;}{
-\s3\ql \li0\ri0\sb240\sa60\keepn\widctlpar\faauto\outlinelevel2\adjustright\rin0\lin0\itap0 \f1\fs24\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 \sbasedon0 \snext0 heading 3;}{
-\s4\ql \li0\ri0\keepn\widctlpar\faauto\outlinelevel3\adjustright\rin0\lin0\itap0 \b\f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 \sbasedon0 \snext0 heading 4;}{\*\cs10 \additive \ssemihidden Default Paragraph Font;}{\*
-\ts11\tsrowd\trftsWidthB3\trpaddl108\trpaddr108\trpaddfl3\trpaddft3\trpaddfb3\trpaddfr3\trcbpat1\trcfpat1\tscellwidthfts0\tsvertalt\tsbrdrt\tsbrdrl\tsbrdrb\tsbrdrr\tsbrdrdgl\tsbrdrdgr\tsbrdrh\tsbrdrv 
-\ql \li0\ri0\widctlpar\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0 \fs20\lang1024\langfe1024\cgrid\langnp1024\langfenp1024 \snext11 \ssemihidden Normal Table;}{\s15\ql \li0\ri0\sa120\widctlpar\faauto\adjustright\rin0\lin0\itap0 
-\f2\fs20\lang2057\langfe2057\cgrid\langnp2057\langfenp2057 \sbasedon0 \snext15 Plain Text;}}{\*\listtable{\list\listtemplateid134807557\listsimple{\listlevel\levelnfc23\levelnfcn23\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0
-{\leveltext\'01\u-3929 ?;}{\levelnumbers;}\f10\fbias0 \fi-360\li360\jclisttab\tx360\lin360 }{\listname ;}\listid57175370}{\list\listtemplateid134807557\listsimple{\listlevel\levelnfc23\levelnfcn23\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0
-\levelindent0{\leveltext\'01\u-3929 ?;}{\levelnumbers;}\f10\fbias0 \fi-360\li360\jclisttab\tx360\lin360 }{\listname ;}\listid76369953}{\list\listtemplateid134807557\listsimple{\listlevel\levelnfc23\levelnfcn23\leveljc0\leveljcn0\levelfollow0\levelstartat1
-\levelspace0\levelindent0{\leveltext\'01\u-3929 ?;}{\levelnumbers;}\f10\fbias0 \fi-360\li360\jclisttab\tx360\lin360 }{\listname ;}\listid87585882}{\list\listtemplateid134807557\listsimple{\listlevel\levelnfc23\levelnfcn23\leveljc0\leveljcn0\levelfollow0
-\levelstartat1\levelspace0\levelindent0{\leveltext\'01\u-3929 ?;}{\levelnumbers;}\f10\fbias0 \fi-360\li360\jclisttab\tx360\lin360 }{\listname ;}\listid103771911}{\list\listtemplateid134807557\listsimple{\listlevel\levelnfc23\levelnfcn23\leveljc0\leveljcn0
-\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext\'01\u-3929 ?;}{\levelnumbers;}\f10\fbias0 \fi-360\li360\jclisttab\tx360\lin360 }{\listname ;}\listid207691058}{\list\listtemplateid134807557\listsimple{\listlevel\levelnfc23\levelnfcn23
-\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext\'01\u-3929 ?;}{\levelnumbers;}\f10\fbias0 \fi-360\li360\jclisttab\tx360\lin360 }{\listname ;}\listid382677438}{\list\listtemplateid134807557\listsimple{\listlevel
-\levelnfc23\levelnfcn23\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext\'01\u-3929 ?;}{\levelnumbers;}\f10\fbias0 \fi-360\li360\jclisttab\tx360\lin360 }{\listname ;}\listid640959204}{\list\listtemplateid134807557
-\listsimple{\listlevel\levelnfc23\levelnfcn23\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext\'01\u-3929 ?;}{\levelnumbers;}\f10\fbias0 \fi-360\li360\jclisttab\tx360\lin360 }{\listname ;}\listid641151899}
-{\list\listtemplateid134807557\listsimple{\listlevel\levelnfc23\levelnfcn23\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext\'01\u-3929 ?;}{\levelnumbers;}\f10\fbias0 \fi-360\li360\jclisttab\tx360\lin360 }{\listname 
-;}\listid809130454}{\list\listtemplateid134807557\listsimple{\listlevel\levelnfc23\levelnfcn23\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext\'01\u-3929 ?;}{\levelnumbers;}\f10\fbias0 \fi-360\li360
-\jclisttab\tx360\lin360 }{\listname ;}\listid940797453}{\list\listtemplateid134807557\listsimple{\listlevel\levelnfc23\levelnfcn23\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext\'01\u-3929 ?;}{\levelnumbers;}\f10\fbias0 
-\fi-360\li360\jclisttab\tx360\lin360 }{\listname ;}\listid960839331}{\list\listtemplateid134807557\listsimple{\listlevel\levelnfc23\levelnfcn23\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext\'01\u-3929 ?;}{\levelnumbers
-;}\f10\fbias0 \fi-360\li360\jclisttab\tx360\lin360 }{\listname ;}\listid1056972387}{\list\listtemplateid134807557\listsimple{\listlevel\levelnfc23\levelnfcn23\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext
-\'01\u-3929 ?;}{\levelnumbers;}\f10\fbias0 \fi-360\li360\jclisttab\tx360\lin360 }{\listname ;}\listid1098327032}{\list\listtemplateid-693208200{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat3\levelspace0\levelindent0
-{\leveltext\'01\'00;}{\levelnumbers\'01;}\fbias0 \fi-525\li525\jclisttab\tx525\lin525 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext\'03\'00.\'01;}{\levelnumbers\'01\'03;}\fbias0 
-\fi-525\li525\jclisttab\tx525\lin525 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat5\levelspace0\levelindent0{\leveltext\'05\'00.\'01.\'02;}{\levelnumbers\'01\'03\'05;}\fbias0 \fi-720\li720\jclisttab\tx720\lin720 }
-{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext\'07\'00.\'01.\'02.\'03;}{\levelnumbers\'01\'03\'05\'07;}\fbias0 \fi-1080\li1080\jclisttab\tx1080\lin1080 }{\listlevel\levelnfc0\levelnfcn0
-\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext\'09\'00.\'01.\'02.\'03.\'04;}{\levelnumbers\'01\'03\'05\'07\'09;}\fbias0 \fi-1080\li1080\jclisttab\tx1080\lin1080 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0
-\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext\'0b\'00.\'01.\'02.\'03.\'04.\'05;}{\levelnumbers\'01\'03\'05\'07\'09\'0b;}\fbias0 \fi-1440\li1440\jclisttab\tx1440\lin1440 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0
-\levelstartat1\levelspace0\levelindent0{\leveltext\'0d\'00.\'01.\'02.\'03.\'04.\'05.\'06;}{\levelnumbers\'01\'03\'05\'07\'09\'0b\'0d;}\fbias0 \fi-1440\li1440\jclisttab\tx1440\lin1440 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0
-\levelstartat1\levelspace0\levelindent0{\leveltext\'0f\'00.\'01.\'02.\'03.\'04.\'05.\'06.\'07;}{\levelnumbers\'01\'03\'05\'07\'09\'0b\'0d\'0f;}\fbias0 \fi-1800\li1800\jclisttab\tx1800\lin1800 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0
-\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext\'11\'00.\'01.\'02.\'03.\'04.\'05.\'06.\'07.\'08;}{\levelnumbers\'01\'03\'05\'07\'09\'0b\'0d\'0f\'11;}\fbias0 \fi-1800\li1800\jclisttab\tx1800\lin1800 }{\listname ;}\listid1159809835}
-{\list\listtemplateid134807557\listsimple{\listlevel\levelnfc23\levelnfcn23\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext\'01\u-3929 ?;}{\levelnumbers;}\f10\fbias0 \fi-360\li360\jclisttab\tx360\lin360 }{\listname 
-;}\listid1213081872}{\list\listtemplateid1293425904{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext\'02\'00.;}{\levelnumbers\'01;}\fbias0 \fi-360\li360\jclisttab\tx360\lin360 }{\listlevel
-\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat1\levellegal\levelspace0\levelindent0{\leveltext\'03\'00.\'01;}{\levelnumbers\'01\'03;}\fbias0 \fi-390\li390\jclisttab\tx390\lin390 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0
-\levelfollow0\levelstartat1\levellegal\levelspace0\levelindent0{\leveltext\'05\'00.\'01.\'02;}{\levelnumbers\'01\'03\'05;}\fbias0 \fi-720\li720\jclisttab\tx720\lin720 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat1
-\levellegal\levelspace0\levelindent0{\leveltext\'07\'00.\'01.\'02.\'03;}{\levelnumbers\'01\'03\'05\'07;}\fbias0 \fi-720\li720\jclisttab\tx720\lin720 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat1\levellegal\levelspace0
-\levelindent0{\leveltext\'09\'00.\'01.\'02.\'03.\'04;}{\levelnumbers\'01\'03\'05\'07\'09;}\fbias0 \fi-1080\li1080\jclisttab\tx1080\lin1080 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat1\levellegal\levelspace0\levelindent0
-{\leveltext\'0b\'00.\'01.\'02.\'03.\'04.\'05;}{\levelnumbers\'01\'03\'05\'07\'09\'0b;}\fbias0 \fi-1080\li1080\jclisttab\tx1080\lin1080 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat1\levellegal\levelspace0\levelindent0
-{\leveltext\'0d\'00.\'01.\'02.\'03.\'04.\'05.\'06;}{\levelnumbers\'01\'03\'05\'07\'09\'0b\'0d;}\fbias0 \fi-1440\li1440\jclisttab\tx1440\lin1440 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat1\levellegal\levelspace0
-\levelindent0{\leveltext\'0f\'00.\'01.\'02.\'03.\'04.\'05.\'06.\'07;}{\levelnumbers\'01\'03\'05\'07\'09\'0b\'0d\'0f;}\fbias0 \fi-1440\li1440\jclisttab\tx1440\lin1440 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat1
-\levellegal\levelspace0\levelindent0{\leveltext\'11\'00.\'01.\'02.\'03.\'04.\'05.\'06.\'07.\'08;}{\levelnumbers\'01\'03\'05\'07\'09\'0b\'0d\'0f\'11;}\fbias0 \fi-1800\li1800\jclisttab\tx1800\lin1800 }{\listname ;}\listid1217356200}
-{\list\listtemplateid134807557\listsimple{\listlevel\levelnfc23\levelnfcn23\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext\'01\u-3929 ?;}{\levelnumbers;}\f10\fbias0 \fi-360\li360\jclisttab\tx360\lin360 }{\listname 
-;}\listid1385762102}{\list\listtemplateid134807557\listsimple{\listlevel\levelnfc23\levelnfcn23\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext\'01\u-3929 ?;}{\levelnumbers;}\f10\fbias0 \fi-360\li360
-\jclisttab\tx360\lin360 }{\listname ;}\listid1730421560}{\list\listtemplateid134807557\listsimple{\listlevel\levelnfc23\levelnfcn23\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext\'01\u-3929 ?;}{\levelnumbers;}
-\f10\fbias0 \fi-360\li360\jclisttab\tx360\lin360 }{\listname ;}\listid1810439737}{\list\listtemplateid516748504{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat3\levelspace0\levelindent0{\leveltext\'01\'00;}{\levelnumbers\'01;}
-\fbias0 \fi-525\li525\jclisttab\tx525\lin525 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext\'03\'00.\'01;}{\levelnumbers\'01\'03;}\fbias0 \fi-525\li525\jclisttab\tx525\lin525 }
-{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat3\levelspace0\levelindent0{\leveltext\'05\'00.\'01.\'02;}{\levelnumbers\'01\'03\'05;}\fbias0 \fi-720\li720\jclisttab\tx720\lin720 }{\listlevel\levelnfc0\levelnfcn0\leveljc0
-\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext\'07\'00.\'01.\'02.\'03;}{\levelnumbers\'01\'03\'05\'07;}\fbias0 \fi-1080\li1080\jclisttab\tx1080\lin1080 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0
-\levelstartat1\levelspace0\levelindent0{\leveltext\'09\'00.\'01.\'02.\'03.\'04;}{\levelnumbers\'01\'03\'05\'07\'09;}\fbias0 \fi-1080\li1080\jclisttab\tx1080\lin1080 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat1
-\levelspace0\levelindent0{\leveltext\'0b\'00.\'01.\'02.\'03.\'04.\'05;}{\levelnumbers\'01\'03\'05\'07\'09\'0b;}\fbias0 \fi-1440\li1440\jclisttab\tx1440\lin1440 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0
-\levelindent0{\leveltext\'0d\'00.\'01.\'02.\'03.\'04.\'05.\'06;}{\levelnumbers\'01\'03\'05\'07\'09\'0b\'0d;}\fbias0 \fi-1440\li1440\jclisttab\tx1440\lin1440 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0
-\levelindent0{\leveltext\'0f\'00.\'01.\'02.\'03.\'04.\'05.\'06.\'07;}{\levelnumbers\'01\'03\'05\'07\'09\'0b\'0d\'0f;}\fbias0 \fi-1800\li1800\jclisttab\tx1800\lin1800 }{\listlevel\levelnfc0\levelnfcn0\leveljc0\leveljcn0\levelfollow0\levelstartat1
-\levelspace0\levelindent0{\leveltext\'11\'00.\'01.\'02.\'03.\'04.\'05.\'06.\'07.\'08;}{\levelnumbers\'01\'03\'05\'07\'09\'0b\'0d\'0f\'11;}\fbias0 \fi-1800\li1800\jclisttab\tx1800\lin1800 }{\listname ;}\listid1839415847}{\list\listtemplateid134807557
-\listsimple{\listlevel\levelnfc23\levelnfcn23\leveljc0\leveljcn0\levelfollow0\levelstartat1\levelspace0\levelindent0{\leveltext\'01\u-3929 ?;}{\levelnumbers;}\f10\fbias0 \fi-360\li360\jclisttab\tx360\lin360 }{\listname ;}\listid1893424460}}
-{\*\listoverridetable{\listoverride\listid1217356200\listoverridecount0\ls1}{\listoverride\listid1213081872\listoverridecount0\ls2}{\listoverride\listid76369953\listoverridecount0\ls3}{\listoverride\listid1056972387\listoverridecount0\ls4}
-{\listoverride\listid103771911\listoverridecount0\ls5}{\listoverride\listid960839331\listoverridecount0\ls6}{\listoverride\listid1098327032\listoverridecount0\ls7}{\listoverride\listid640959204\listoverridecount0\ls8}{\listoverride\listid1730421560
-\listoverridecount0\ls9}{\listoverride\listid1385762102\listoverridecount0\ls10}{\listoverride\listid87585882\listoverridecount0\ls11}{\listoverride\listid1893424460\listoverridecount0\ls12}{\listoverride\listid1810439737\listoverridecount0\ls13}
-{\listoverride\listid382677438\listoverridecount0\ls14}{\listoverride\listid57175370\listoverridecount0\ls15}{\listoverride\listid1839415847\listoverridecount0\ls16}{\listoverride\listid1159809835\listoverridecount0\ls17}{\listoverride\listid207691058
-\listoverridecount0\ls18}{\listoverride\listid940797453\listoverridecount0\ls19}{\listoverride\listid809130454\listoverridecount0\ls20}{\listoverride\listid641151899\listoverridecount0\ls21}}{\*\rsidtbl \rsid1522105\rsid12475093\rsid12857379\rsid13650984
-\rsid14158268\rsid16284029}{\*\generator Microsoft Word 10.0.6764;}{\info{\title Building a certificate store}{\author WilliamB}{\operator Chris Davies}{\creatim\yr2002\mo11\dy13\hr15\min43}{\revtim\yr2005\mo12\dy1\hr16\min54}
-{\printim\yr2002\mo11\dy13\hr15\min48}{\version11}{\edmins9}{\nofpages7}{\nofwords1546}{\nofchars8818}{\*\company Symbian}{\nofcharsws10344}{\vern16391}}
-\widowctrl\ftnbj\aenddoc\noxlattoyen\expshrtn\noultrlspc\dntblnsbdb\nospaceforul\hyphcaps0\formshade\horzdoc\dghspace120\dgvspace120\dghorigin1701\dgvorigin1984\dghshow0\dgvshow3
-\jcompress\viewkind1\viewscale100\pgbrdrhead\pgbrdrfoot\nolnhtadjtbl\rsidroot16284029 \fet0\sectd \linex0\endnhere\sectdefaultcl\sftnbj {\*\pnseclvl1\pnucrm\pnstart1\pnindent720\pnhang {\pntxta .}}{\*\pnseclvl2\pnucltr\pnstart1\pnindent720\pnhang 
-{\pntxta .}}{\*\pnseclvl3\pndec\pnstart1\pnindent720\pnhang {\pntxta .}}{\*\pnseclvl4\pnlcltr\pnstart1\pnindent720\pnhang {\pntxta )}}{\*\pnseclvl5\pndec\pnstart1\pnindent720\pnhang {\pntxtb (}{\pntxta )}}{\*\pnseclvl6\pnlcltr\pnstart1\pnindent720\pnhang 
-{\pntxtb (}{\pntxta )}}{\*\pnseclvl7\pnlcrm\pnstart1\pnindent720\pnhang {\pntxtb (}{\pntxta )}}{\*\pnseclvl8\pnlcltr\pnstart1\pnindent720\pnhang {\pntxtb (}{\pntxta )}}{\*\pnseclvl9\pnlcrm\pnstart1\pnindent720\pnhang {\pntxtb (}{\pntxta )}}\pard\plain 
-\s1\ql \li0\ri0\keepn\widctlpar\faauto\outlinelevel0\adjustright\rin0\lin0\itap0 \b\f1\fs28\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 Building a certificate store
-\par }\pard\plain \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 
-\par }\pard\plain \s4\ql \li0\ri0\keepn\widctlpar\faauto\outlinelevel3\adjustright\rin0\lin0\itap0 \b\f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 Revision 0.02
-\par }\pard\plain \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 
-\par {\listtext\pard\plain\s1 \b\f1\fs28\lang1033\langfe2057\langnp1033\insrsid12475093 \hich\af1\dbch\af0\loch\f1 1.\tab}}\pard\plain \s1\ql \fi-360\li360\ri0\keepn\widctlpar\jclisttab\tx360\faauto\ls1\outlinelevel0\adjustright\rin0\lin360\itap0 
-\b\f1\fs28\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 Purpose 
-\par }\pard\plain \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 
-\par This note describes how to build a certificate store in Symbian OS version 7 and above which contains appropriate values for your application.
-\par 
-\par {\listtext\pard\plain\s1 \b\f1\fs28\lang1033\langfe2057\langnp1033\insrsid12475093 \hich\af1\dbch\af0\loch\f1 2.\tab}}\pard\plain \s1\ql \fi-360\li360\ri0\keepn\widctlpar\jclisttab\tx360\faauto\ls1\outlinelevel0\adjustright\rin0\lin360\itap0 
-\b\f1\fs28\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 Overview
-\par }\pard\plain \s2\ql \li0\ri0\sb240\sa60\keepn\widctlpar\faauto\outlinelevel1\adjustright\rin0\lin0\itap0 \b\i\f1\fs24\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 2.1 Clients and root certificates
-\par }\pard\plain \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 
-\par To do certificate validation a client must have at least one cert
-ificate which it trusts directly. This is called a root certificate. It's pretty clear that different clients are going to trust different certificates: so TLS might trust VeriSign's secure server root, but software install would not. 
-\par 
-\par To handle this situ
-ation, the certificate store contains zero or more 'clients' (sometimes known as 'applications' in the documentation). Each client consists of a UID and a human-readable name, and represents an application which is going to use the certificate validation 
-interface. For example, TLS is a client, as is software installation. Each certificate is marked as trusted by zero or more of these clients: this is what makes it a root certificate for that application. 
-\par 
-\par The clients are stored in a file called certclients.dat. Certificates are stored in a separate file called cacerts.dat.
-\par 
-\par The way it works is this: the application using the certificate validation interface will supply the appropriate UID to the certificate validation object, which will use this to select 
-the subset of certificates which are trusted by that application: these form the set of 'candidate' root certificates. The UID can be anything at all, as long as the same UID is used in the store as is supplied to certificate validation. (In particular, i
-t doesn't need to be the app UID, although this might be a sensible choice.)
-\par 
-\par So to get your app working with certificate validation, you need to:
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls2\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls2\adjustright\rin0\lin360\itap0 {\insrsid12475093 add an entry for your app into the list of clients
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls2\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls2\adjustright\rin0\lin360\itap0 {\insrsid12475093 add any certificates you need 
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls2\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls2\adjustright\rin0\lin360\itap0 {\insrsid12475093 mark them as trusted by your client
-\par }\pard \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 {\insrsid12475093 
-\par }\pard\plain \s2\ql \li0\ri0\sb240\sa60\keepn\widctlpar\faauto\outlinelevel1\adjustright\rin0\lin0\itap0 \b\i\f1\fs24\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 2.2 Using the test code
-\par }\pard\plain \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 
-\par In Symbian OS v7 and above, you should use the test code for the certificate store to do this. 
-\par The test code takes a script file and  the name of an log file as input, then executes the actions specified in the script file, checks the results and logs them to the log file.
-\par 
-\par So the steps are:
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls4\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls4\adjustright\rin0\lin360\itap0 {\insrsid12475093 create appropriate script files
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls3\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls3\adjustright\rin0\lin360\itap0 {\insrsid12475093 build the test code
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls3\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls3\adjustright\rin0\lin360\itap0 {\insrsid12475093 run the test code
-\par }\pard \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 {\insrsid12475093 
-\par 
-\par 
-\par 
-\par 
-\par {\listtext\pard\plain\s1 \b\f1\fs28\lang1033\langfe2057\langnp1033\insrsid12475093 \hich\af1\dbch\af0\loch\f1 3.\tab}}\pard\plain \s1\ql \fi-360\li360\ri0\keepn\widctlpar\jclisttab\tx360\faauto\ls1\outlinelevel0\adjustright\rin0\lin360\itap0 
-\b\f1\fs28\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 Creating the scripts
-\par }\pard\plain \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 
-\par Each action in the test script will have:
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li420\ri0\widctlpar\jclisttab\tx420{\*\pn \pnlvlblt\ilvl0\ls6\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls6\adjustright\rin0\lin420\itap0 {\insrsid12475093 the action name, used to log the action: this can be anything
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li420\ri0\widctlpar\jclisttab\tx420{\*\pn \pnlvlblt\ilvl0\ls6\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls6\adjustright\rin0\lin420\itap0 {\insrsid12475093 the action type: an identifier for the type of action to be performed
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li420\ri0\widctlpar\jclisttab\tx420{\*\pn \pnlvlblt\ilvl0\ls6\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls6\adjustright\rin0\lin420\itap0 {\insrsid12475093 the action body, whose syntax is dependent on the type of action
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li420\ri0\widctlpar\jclisttab\tx420{\*\pn \pnlvlblt\ilvl0\ls6\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls6\adjustright\rin0\lin420\itap0 {\insrsid12475093 the expected result: this consists of a return value, which will always be KErrNone in these scripts, and extra fields which depend on the action type
-\par }\pard \ql \li60\ri0\widctlpar\faauto\adjustright\rin0\lin60\itap0 {\insrsid12475093 
-\par See the appendix for sample scripts. Your best bet is probably to edit these. Although the scripts to add clients and add certificates are described separately, it is possible to have a single script that does both - just append one to the other.
-\par {\listtext\pard\plain\s2 \b\i\f1\lang1033\langfe2057\langnp1033\insrsid12475093 \hich\af1\dbch\af0\loch\f1 3.1\tab}}\pard\plain \s2\ql \fi-390\li390\ri0\sb240\sa60\keepn\widctlpar
-\jclisttab\tx390\faauto\ls1\ilvl1\outlinelevel1\adjustright\rin0\lin390\itap0 \b\i\f1\fs24\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 Adding clients
-\par }\pard\plain \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 To add clients, you need the script to execute the following actions:
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls5\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls5\adjustright\rin0\lin360\itap0 {\insrsid12475093 create the client manager
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls5\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls5\adjustright\rin0\lin360\itap0 {\insrsid12475093 add each client
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls5\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls5\adjustright\rin0\lin360\itap0 {\insrsid12475093 list the clients, optionally (this is useful as it shows you whether you have successfully added the right set of clients)
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls5\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls5\adjustright\rin0\lin360\itap0 {\insrsid12475093 delete the client manager
-\par }\pard\plain \s3\ql \li0\ri0\sb240\sa60\keepn\widctlpar\faauto\outlinelevel2\adjustright\rin0\lin0\itap0 \f1\fs24\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 3.1.1 Creating the client manager
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard\plain \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls7\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls7\adjustright\rin0\lin360\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 identifier: }{\f2\insrsid12475093 initappmanager}{\insrsid12475093 
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls8\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls8\adjustright\rin0\lin360\itap0 {\insrsid12475093 body: empty
-\par }\pard\plain \s3\ql \li0\ri0\sb240\sa60\keepn\widctlpar\faauto\outlinelevel2\adjustright\rin0\lin0\itap0 \f1\fs24\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 3.1.2 Adding clients
-\par }\pard\plain \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 For each client you wish to add, you need to have a separate 'add client' action. 
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls9\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls9\adjustright\rin0\lin360\itap0 {\insrsid12475093 identifier: }{\f2\insrsid12475093 addclient
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls10\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls10\adjustright\rin0\lin360\itap0 {\insrsid12475093 body:
-\par }\pard \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 {\insrsid12475093 \tab name: the name of your client
-\par \tab UID: your client's UID, specified in decimal
-\par {\listtext\pard\plain\s3 \f1\lang1033\langfe2057\langnp1033\insrsid12475093 \hich\af1\dbch\af0\loch\f1 3.1.3\tab}}\pard\plain \s3\ql \fi-720\li720\ri0\sb240\sa60\keepn\widctlpar
-\jclisttab\tx720\faauto\ls16\ilvl2\outlinelevel2\adjustright\rin0\lin720\itap0 \f1\fs24\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 Listing clients
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard\plain \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls11\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls11\adjustright\rin0\lin360\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 identifier: }{\f2\insrsid12475093 getclients}{\insrsid12475093 
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls12\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls12\adjustright\rin0\lin360\itap0 {\insrsid12475093 body: empty
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls13\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls13\adjustright\rin0\lin360\itap0 {\insrsid12475093 expected result: for each client you have added, its UID (this enables it to check that the contents of the store are what you expect)
-\par }\pard\plain \s3\ql \li0\ri0\sb240\sa60\keepn\widctlpar\faauto\outlinelevel2\adjustright\rin0\lin0\itap0 \f1\fs24\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 3.1.4 Deleting the client manager
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard\plain \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls7\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls7\adjustright\rin0\lin360\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 identifier: }{\f2\insrsid12475093 deleteappmanager}{\insrsid12475093 
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls14\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls14\adjustright\rin0\lin360\itap0 {\insrsid12475093 body: empty
-\par {\listtext\pard\plain\s2 \b\i\f1\lang1033\langfe2057\langnp1033\insrsid12475093 \hich\af1\dbch\af0\loch\f1 3.2\tab}}\pard\plain \s2\ql \fi-525\li525\ri0\sb240\sa60\keepn\widctlpar
-\jclisttab\tx525\faauto\ls16\ilvl1\outlinelevel1\adjustright\rin0\lin525\itap0 \b\i\f1\fs24\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 Adding certificates
-\par }\pard\plain \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 To add certificates, you need the script to execute the following actions:
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls15\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls15\adjustright\rin0\lin360\itap0 {\insrsid12475093 create a new file cert store (this is optional: if you want to add certificates to an existing store, do not include this action)
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls15\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls15\adjustright\rin0\lin360\itap0 {\insrsid12475093 initialise the store
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls15\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls15\adjustright\rin0\lin360\itap0 {\insrsid12475093 add the certificates
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls15\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls15\adjustright\rin0\lin360\itap0 {\insrsid12475093 set your client as a truster for each certificate you wish to use as a root
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls15\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls15\adjustright\rin0\lin360\itap0 {\insrsid12475093 mark as trusted each each certificate you wish to use as a root
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls15\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls15\adjustright\rin0\lin360\itap0 {\insrsid12475093 optionally, check that the new certificates exist and are trusted
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls15\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls15\adjustright\rin0\lin360\itap0 {\insrsid12475093 delete the store manager
-\par }\pard\plain \s3\ql \li0\ri0\sb240\sa60\keepn\widctlpar\faauto\outlinelevel2\adjustright\rin0\lin0\itap0 \f1\fs24\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 3.2.1 Create file cert store
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard\plain \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls9\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls9\adjustright\rin0\lin360\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 identifier: }{\f2\insrsid12475093 createfilecertstore
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls10\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls10\adjustright\rin0\lin360\itap0 {\insrsid12475093 body:
-\par }\pard \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 {\insrsid12475093 \tab filename: full path and filename for where the store should be created
-\par }\pard\plain \s3\ql \li0\ri0\sb240\sa60\keepn\widctlpar\faauto\outlinelevel2\adjustright\rin0\lin0\itap0 \f1\fs24\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 3.2.2 Initialise store
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard\plain \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls9\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls9\adjustright\rin0\lin360\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 identifier: }{\f2\insrsid12475093 init
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls10\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls10\adjustright\rin0\lin360\itap0 {\insrsid12475093 body:
-\par }\pard \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 {\insrsid12475093 \tab mode: should be }{\f2\insrsid12475093 write
-\par }\pard\plain \s3\ql \li0\ri0\sb240\sa60\keepn\widctlpar\faauto\outlinelevel2\adjustright\rin0\lin0\itap0 \f1\fs24\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 3.2.3 Add certificate
-\par }\pard\plain \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 For each certificate you want to add, you need a separate add certificate action.
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls9\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls9\adjustright\rin0\lin360\itap0 {\insrsid12475093 identifier: }{\f2\insrsid12475093 addcert
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls10\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls10\adjustright\rin0\lin360\itap0 {\insrsid12475093 body:
-\par }\pard \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 {\insrsid12475093 \tab format: }{\f2\insrsid12475093 X509 }{\insrsid12475093 or}{\f2\insrsid12475093  WTLS
-\par }{\insrsid12475093 \tab label: human-readable label, must be unique to that store
-\par \tab issuer key: only needed for user certificates
-\par \tab subject key: only needed for user certificates
-\par \tab certstore: identifies which store to add it to: use }{\f2\insrsid12475093 0
-\par \tab }{\insrsid12475093 certfile: full path and filename for the certificate to add. The certificate needs to be DER-encoded ASN.1 (i.e. }{\i\insrsid12475093 not}{\insrsid12475093  PEM). The path is the emulator's view, so 'c:\\' corresponds to \\epoc32\\
-release\\win\\c'
-\par \tab the type of certificate: }{\f2\insrsid12475093 CA}{\insrsid12475093  or }{\f2\insrsid12475093 user}{\insrsid12475093 : use }{\f2\insrsid12475093 CA}{\insrsid12475093  here }{\f2\insrsid12475093 
-\par }\pard\plain \s3\ql \li0\ri0\sb240\sa60\keepn\widctlpar\faauto\outlinelevel2\adjustright\rin0\lin0\itap0 \f1\fs24\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 3.2.4 Set applications
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard\plain \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls9\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls9\adjustright\rin0\lin360\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 identifier: }{\f2\insrsid12475093 setapplications
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls18\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls18\adjustright\rin0\lin360\itap0 {\insrsid12475093 body:}{\f2\insrsid12475093 
-\par }\pard \ql \li720\ri0\widctlpar\faauto\adjustright\rin0\lin720\itap0 {\insrsid12475093 label: the label of the relevant certificate 
-\par UID: the UID for the relevant application
-\par }\pard\plain \s3\ql \li0\ri0\sb240\sa60\keepn\widctlpar\faauto\outlinelevel2\adjustright\rin0\lin0\itap0 \f1\fs24\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 3.2.5 Set trust
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard\plain \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls9\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls9\adjustright\rin0\lin360\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 identifier: }{\f2\insrsid12475093 settrust
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls18\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls18\adjustright\rin0\lin360\itap0 {\insrsid12475093 body:}{\f2\insrsid12475093 
-\par }\pard \ql \li720\ri0\widctlpar\faauto\adjustright\rin0\lin720\itap0 {\insrsid12475093 label: the label of the relevant certificate 
-\par }\pard \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 {\insrsid12475093 \tab trust: 1 to trust this certificate}{\f2\insrsid12475093 
-\par }\pard\plain \s3\ql \li0\ri0\sb240\sa60\keepn\widctlpar\faauto\outlinelevel2\adjustright\rin0\lin0\itap0 \f1\fs24\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 3.2.6 Get trusters
-\par }\pard\plain \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 This is optional. It will show you the list of clients which trust a specified certificate. 
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls9\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls9\adjustright\rin0\lin360\itap0 {\insrsid12475093 identifier: }{\f2\insrsid12475093 getapplications
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls18\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls18\adjustright\rin0\lin360\itap0 {\insrsid12475093 body:}{\f2\insrsid12475093 
-\par }\pard \ql \li720\ri0\widctlpar\faauto\adjustright\rin0\lin720\itap0 {\insrsid12475093 label: the label of the relevant certificate 
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls20\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls20\adjustright\rin0\lin360\itap0 {\insrsid12475093 result
-\par }\pard \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 {\insrsid12475093 \tab the UID of each application we expect
-\par }\pard\plain \s3\ql \li0\ri0\sb240\sa60\keepn\widctlpar\faauto\outlinelevel2\adjustright\rin0\lin0\itap0 \f1\fs24\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 3.2.7 Deleting the store manager
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard\plain \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls9\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls9\adjustright\rin0\lin360\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 identifier: }{\f2\insrsid12475093 delete
-\par {\pntext\pard\plain\f10\fs20\lang1033\langfe2057\langnp1033\insrsid12475093 \loch\af10\dbch\af0\hich\f10 \'a7\tab}}\pard \ql \fi-360\li360\ri0\widctlpar\jclisttab\tx360{\*\pn \pnlvlblt\ilvl0\ls18\pnrnot0\pnf10\pnstart1\pnindent360\pnsp120\pnhang 
-{\pntxtb \'a7}}\faauto\ls18\adjustright\rin0\lin360\itap0 {\insrsid12475093 body:}{\f2\insrsid12475093  }{\insrsid12475093 empty
-\par }\pard \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 {\insrsid12475093 
-\par 
-\par {\listtext\pard\plain\s1 \b\f1\fs28\lang1033\langfe2057\langnp1033\insrsid12475093 \hich\af1\dbch\af0\loch\f1 4\tab}}\pard\plain \s1\ql \fi-525\li525\ri0\keepn\widctlpar\jclisttab\tx525\faauto\ls16\outlinelevel0\adjustright\rin0\lin525\itap0 
-\b\f1\fs28\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 Building and running the test code
-\par {\listtext\pard\plain\s2 \b\i\f1\lang1033\langfe2057\langnp1033\insrsid12475093 \hich\af1\dbch\af0\loch\f1 4.1\tab}}\pard\plain \s2\ql \fi-525\li525\ri0\sb240\sa60\keepn\widctlpar
-\jclisttab\tx525\faauto\ls16\ilvl1\outlinelevel1\adjustright\rin0\lin525\itap0 \b\i\f1\fs24\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 Building the test framework
-\par }\pard\plain \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 The test framework used by the certificate store test code is located in }{\f2\insrsid12475093 'security\\
-testframework'}{\insrsid12475093 . From }{\f2\insrsid12475093 security\\testframework\\group}{\insrsid12475093 , type:
-\par 
-\par }{\f2\insrsid12475093 bldmake bldfiles
-\par able test build}{\insrsid12475093 
-\par 
-\par {\listtext\pard\plain\s2 \b\i\f1\lang1033\langfe2057\langnp1033\insrsid12475093 \hich\af1\dbch\af0\loch\f1 4.2\tab}}\pard\plain \s2\ql \fi-525\li525\ri0\sb240\sa60\keepn\widctlpar
-\jclisttab\tx525\faauto\ls16\ilvl1\outlinelevel1\adjustright\rin0\lin525\itap0 \b\i\f1\fs24\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 Building the certificate store test code
-\par }\pard\plain \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 The test framework used by the certificate store test code is located in }{\f2\insrsid12475093 'security\\
-certman'}{\insrsid12475093 . From }{\f2\insrsid12475093 security\\certman\\group}{\insrsid12475093 , type:
-\par 
-\par }{\f2\insrsid12475093 bldmake bldfiles
-\par able test build
-\par {\listtext\pard\plain\s2 \b\i\f1\lang1033\langfe2057\langnp1033\insrsid12475093 \hich\af1\dbch\af0\loch\f1 4.3\tab}}\pard\plain \s2\ql \fi-525\li525\ri0\sb240\sa60\keepn\widctlpar
-\jclisttab\tx525\faauto\ls16\ilvl1\outlinelevel1\adjustright\rin0\lin525\itap0 \b\i\f1\fs24\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 Running the test code
-\par }\pard\plain \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 The test harness to run is t_certstore.exe (it is located in \\epoc32\\release\\wins\\udeb\\
-). The test harness takes two command line arguments : the name of the script to run and the name of a log file. In order to run a script called }{\i\insrsid12475093 script.txt}{\insrsid12475093  and output the result to }{\i\insrsid12475093 log.txt, }{
-\insrsid12475093 you have to type the following command:
-\par 
-\par }\pard\plain \s15\ql \li0\ri0\sa120\widctlpar\faauto\adjustright\rin0\lin0\itap0 \f2\fs20\lang2057\langfe2057\cgrid\langnp2057\langfenp2057 {\insrsid12475093 t_certstore script.txt log.txt
-\par }\pard\plain \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 Because the test code runs in the emulator, its view of the file system is that }{\f2\insrsid12475093 c:\\}
-{\insrsid12475093  is found at NT's }{\f2\insrsid12475093 \\epoc32\\wins\\c}{\insrsid12475093 . So in the example above, }{\f2\insrsid12475093 script}{\insrsid12475093  needs to be placed at }{\f2\insrsid12475093 \\epoc32\\wins\\c}{\insrsid12475093 , and 
-}{\f2\insrsid12475093 log}{\insrsid12475093  will be created in }{\f2\insrsid12475093 \\epoc32\\wins\\c}{\insrsid12475093 .  The \lquote console\rquote  option is necessary to ensure the tool can operate independently of the UI environment.
-\par 
-\par By default, the test harness runs and closes the emulator immediately. This makes it impossible to view the results on the screen (but they a
-re in the log) but makes it possible to run the test unattended. It is possible to request that the test harness waits for a key press before closing the emulator by adding a \endash w at the end of the command line. You would then type
-\par }\pard\plain \s15\ql \li0\ri0\sa120\widctlpar\faauto\adjustright\rin0\lin0\itap0 \f2\fs20\lang2057\langfe2057\cgrid\langnp2057\langfenp2057 {\insrsid12475093 t_certstore script.txt log.txt -w
-\par }\pard\plain \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 and you have to press a key to close the emulator after the end of the tests.
-\par 
-\par 
-\par 
-\par 
-\par 
-\par 
-\par 
-\par 
-\par 
-\par 
-\par 
-\par 
-\par 
-\par 
-\par 
-\par 
-\par 
-\par 
-\par 
-\par }\pard\plain \s1\ql \li0\ri0\keepn\widctlpar\faauto\outlinelevel0\adjustright\rin0\lin0\itap0 \b\f1\fs28\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 Appendix: Sample scripts
-\par }\pard\plain \s2\ql \li0\ri0\sb240\sa60\keepn\widctlpar\faauto\outlinelevel1\adjustright\rin0\lin0\itap0 \b\i\f1\fs24\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 Adding clients
-\par }\pard\plain \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 
-\par The following script will add a single client called 'MyClient' with a UID of 123456.
-\par 
-\par }{\f2\insrsid12475093 <action>
-\par \tab <actionname>Creating a CertificateAppInfoManager</actionname>
-\par \tab <actiontype>initappmanager</actiontype>
-\par \tab <actionbody></actionbody>
-\par \tab <actionresult>
-\par \tab \tab <return>KErrNone</return>
-\par \tab </actionresult>
-\par </action>
-\par <action>
-\par \tab <actionname>Adding client MyClient</actionname>
-\par \tab <actiontype>addclient</actiontype>
-\par \tab <actionbody>
-\par \tab \tab <name>MyClient</name>
-\par \tab \tab <uid>123456</uid>
-\par \tab </actionbody>
-\par \tab <actionresult>
-\par \tab \tab <return>KErrNone</return>
-\par \tab </actionresult>
-\par </action>
-\par 
-\par <action>
-\par \tab <actionname>Retrieving the clients</actionname>
-\par \tab <actiontype>getclients</actiontype>
-\par \tab <actionbody></actionbody>
-\par \tab <actionresult>
-\par \tab \tab <return>KErrNone</return>
-\par \tab \tab <uid>123456</uid>
-\par \tab </actionresult>
-\par </action>
-\par 
-\par <action>
-\par \tab <actionname>Deleting the CertificateAppInfoManager</actionname>
-\par \tab <actiontype>deleteappmanager</actiontype>
-\par \tab <actionbody></actionbody>
-\par \tab <actionresult>
-\par \tab \tab <return>KErrNone</return>
-\par \tab </actionresult>
-\par </action>
-\par }{\insrsid12475093 
-\par 
-\par 
-\par 
-\par 
-\par 
-\par 
-\par 
-\par 
-\par }\pard\plain \s2\ql \li0\ri0\sb240\sa60\keepn\widctlpar\faauto\outlinelevel1\adjustright\rin0\lin0\itap0 \b\i\f1\fs24\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 Adding certificates
-\par }\pard\plain \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 \f1\fs20\lang1033\langfe2057\cgrid\langnp1033\langfenp2057 {\insrsid12475093 The following script will create a new certificate store, and add the X.509 certificate found in c:\\
-thawtetest.crt as a CA certificate with the label 'Thawte Root', trusted by the client with UID 123456. 
-\par }\pard \ql \fi60\li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 {\insrsid12475093 
-\par }\pard \ql \li0\ri0\widctlpar\faauto\adjustright\rin0\lin0\itap0 {\f2\insrsid12475093 <action>
-\par \tab <actionname>Creating a new file certstore</actionname>
-\par \tab <actiontype>createfilecertstore</actiontype>
-\par \tab <actionbody>
-\par \tab \tab <filename>c:\\cacerts.dat</filename>
-\par \tab </actionbody>
-\par \tab <actionresult>
-\par \tab \tab <return>KErrNone</return>
-\par \tab </actionresult>
-\par </action>
-\par 
-\par <action>
-\par \tab <actionname>Initializing a CUnifiedCertStore</actionname>
-\par \tab <actiontype>init</actiontype>
-\par \tab <actionbody>
-\par \tab \tab <mode>write</mode>
-\par \tab </actionbody>
-\par \tab <actionresult>
-\par \tab \tab <return>KErrNone</return>
-\par \tab </actionresult>
-\par </action>
-\par 
-\par <action>
-\par \tab <actionname>Add the certificate Thawte Root</actionname>
-\par \tab <actiontype>addcert</actiontype>
-\par \tab <actionbody>
-\par \tab \tab <format>X509</format>
-\par \tab \tab <label>Thawte Root</label>
-\par \tab \tab <issuerkey></issuerkey>
-\par \tab \tab <subjectkey></subjectkey>
-\par \tab \tab <certstore>0</certstore>
-\par \tab \tab <certfile>c:\\thawtetest.crt</certfile>
-\par \tab \tab <certowner>CA</certowner>
-\par \tab </actionbody>
-\par \tab <actionresult>
-\par \tab \tab <return>KErrNone</return>
-\par \tab </actionresult>
-\par </action>
-\par 
-\par <action>
-\par \tab <actionname>Set applications for Thawte Root</actionname>
-\par \tab <actiontype>setapplications</actiontype>
-\par \tab <actionbody>
-\par \tab \tab <label>Thawte Root</label>
-\par \tab \tab <uid>123456</uid>
-\par \tab </actionbody>
-\par \tab <actionresult>
-\par \tab \tab <return>KErrNone</return>
-\par \tab </actionresult>
-\par </action>
-\par 
-\par <action>
-\par \tab <actionname>Set the trust for Thawte Root </actionname>
-\par \tab <actiontype>settrust</actiontype>
-\par \tab <actionbody>
-\par \tab \tab <label>Thawte Root</label>
-\par \tab \tab <trust>1</trust>
-\par \tab </actionbody>
-\par \tab <actionresult>
-\par \tab \tab <return>KErrNone</return>
-\par \tab </actionresult>
-\par </action>
-\par 
-\par <action>
-\par \tab <actionname>Get applications for Thawte Root</actionname>
-\par \tab <actiontype>getapplications</actiontype>
-\par \tab <actionbody>
-\par \tab \tab <label>Thawte Root</label>
-\par \tab </actionbody>
-\par \tab <actionresult>
-\par \tab \tab <return>KErrNone</return>
-\par \tab \tab <uid>123456</uid>
-\par \tab </actionresult>
-\par </action>
-\par 
-\par <action>
-\par \tab <actionname>Deleting the certificate store manager</actionname>
-\par \tab <actiontype>delete</actiontype>
-\par \tab <actionbody></actionbody>
-\par \tab <actionresult>
-\par \tab \tab <return>KErrNone</return>
-\par \tab </actionresult>
-\par </action>
-\par }{\insrsid12475093 
-\par }}
\ No newline at end of file
--- a/cryptoservices/certificateandkeymgmt/documentation/building-certstore.txt	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,76 +0,0 @@
-Title:        Building Certificate Store
-Owner:        Gleb Dolgich
-Contributors: Xavier Leclercq, Gleb Dolgich
-Copyright (C) 2003 Symbian Limited. All rights reserved.
-================================================================================
-
-Purpose
--------
-
-This document describes how to build CACerts.dat (certificate store) and
-certclients.dat (certificate client applications) files. These files are stored
-on a device in c:\system\data\ directory. They are necessary for Software
-Install and SSL/TLS.
-
-Certificates and trusters
--------------------------
-
-Every certificate stored in CACerts.dat has a set of UIDs associated with it,
-each UID marking the certificate as good for a particular purpose (application).
-Currently the following applications/UIDs are defined:
-
-- SW Install (268452523, or 0x100042AB)--certificate is suitable for software
-  install (SIS files);
-- SW Install OCSP Signing (268478646, or 0x1000A8B6)--certificate is suitable
-  for OCSP checking (SIS files);
-- MIDlet Installation (270506792, or 0x101F9B28)--certificate is good for Java
-  MIDlet installation, which includes OCSP checking;
-- Server Authentication (268441661, or 0x1000183D)--certificate is suitable for
-  SSL/TLS server authentication.
-
-These UIDs are stored in certclients.dat file. Once certclients.dat is in
-c:\system\data on the device, the Certificates Control Panel applet allows
-manual assignment of applications to each certificate.
-
-Files needed
-------------
-
-The following files are needed to build a certificate store:
-
-- T_CERTSTORE.EXE test harness, which is located in security/certman/tcertstore;
-  build it from security/certman/group;
-- bldcertstore.txt: test script located in security/certman/tcertstore/scripts;
-  you can modify it depending on which certificates/applications you want
-  included in the store. This script is exported into device's
-  c:\tcertstore\scripts.
-
-The following certificates are used for running tests:
-
-- Symbiana.der "Identity ACS Root"--Symbian application signing certificate that
-  is provided for reference only and is not used by tests
-- Symbianb.der "Testing ACS Root"--Symbian application signing test certificate
-  that is provided for reference only and is not used by tests
-- cacert.crt "TestCA"--SSL server CA certificate (self-signed)
-- thawtetest.crt "Thawte Root"--SW Install certificate
-- TOCSP-Root5-RSA.cer--SW Install and MIDlet Installation
-- TOCSP-Signing5-RSA.cer--OCSP Signing
-
-These certificates are copied into c:\tappinst\certs\ directory on the device.
-
-Building the store
-------------------
-
-To build a certificate store, perform the following steps:
-
-1. Build the T_CERTSTORE test harness and export test files for appinst and
-   certman.
-
-2. Go to the appropriate build directory (udeb or urel) and run the following
-   command:
-   
-   t_certstore c:\tcertstore\scripts\bldcertstore.txt c:\bldcertstore.log
-   
-   This will build c:\system\data\cacerts.dat and c:\system\data\certclients.dat
-   with test certificates. If you need to add your own certificates, modify the
-   bldcertstore.txt script accordingly.  The ‘console’ option is necessary to ensure 
-   the tool can operate independently of the UI environment.
--- a/cryptoservices/certificateandkeymgmt/eabi/certstoreu.def	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,72 +0,0 @@
-EXPORTS
-	_ZN16CUnifiedKeyStore10InitializeER14TRequestStatus @ 1 NONAME
-	_ZN16CUnifiedKeyStore12CancelRelockEv @ 2 NONAME
-	_ZN16CUnifiedKeyStore12SetUsePolicyE20TCTTokenObjectHandleRK15TSecurityPolicyR14TRequestStatus @ 3 NONAME
-	_ZN16CUnifiedKeyStore15CancelCreateKeyEv @ 4 NONAME
-	_ZN16CUnifiedKeyStore15CancelDeleteKeyEv @ 5 NONAME
-	_ZN16CUnifiedKeyStore15CancelExportKeyEv @ 6 NONAME
-	_ZN16CUnifiedKeyStore15CancelImportKeyEv @ 7 NONAME
-	_ZN16CUnifiedKeyStore15KeyStoreManagerEi @ 8 NONAME
-	_ZN16CUnifiedKeyStore16CancelInitializeEv @ 9 NONAME
-	_ZN16CUnifiedKeyStore18CancelSetUsePolicyEv @ 10 NONAME
-	_ZN16CUnifiedKeyStore18ExportEncryptedKeyE20TCTTokenObjectHandleRK15CPBEncryptParmsRP6HBufC8R14TRequestStatus @ 11 NONAME
-	_ZN16CUnifiedKeyStore19SetManagementPolicyE20TCTTokenObjectHandleRK15TSecurityPolicyR14TRequestStatus @ 12 NONAME
-	_ZN16CUnifiedKeyStore20SetPassphraseTimeoutEiR14TRequestStatus @ 13 NONAME
-	_ZN16CUnifiedKeyStore24CancelExportEncryptedKeyEv @ 14 NONAME
-	_ZN16CUnifiedKeyStore25CancelSetManagementPolicyEv @ 15 NONAME
-	_ZN16CUnifiedKeyStore26CancelSetPassphraseTimeoutEv @ 16 NONAME
-	_ZN16CUnifiedKeyStore4NewLER3RFs @ 17 NONAME
-	_ZN16CUnifiedKeyStore5NewLCER3RFs @ 18 NONAME
-	_ZN16CUnifiedKeyStore6RelockER14TRequestStatus @ 19 NONAME
-	_ZN16CUnifiedKeyStore8KeyStoreEi @ 20 NONAME
-	_ZN16CUnifiedKeyStore9CreateKeyEi15TKeyUsagePKCS15jRK7TDesC16N12CKeyInfoBase13EKeyAlgorithmEi5TTimeS6_RP10CCTKeyInfoR14TRequestStatus @ 21 NONAME
-	_ZN16CUnifiedKeyStore9DeleteKeyE20TCTTokenObjectHandleR14TRequestStatus @ 22 NONAME
-	_ZN16CUnifiedKeyStore9ExportKeyE20TCTTokenObjectHandleRP6HBufC8R14TRequestStatus @ 23 NONAME
-	_ZN16CUnifiedKeyStore9ImportKeyEiRK6TDesC815TKeyUsagePKCS15RK7TDesC16i5TTimeS7_RP10CCTKeyInfoR14TRequestStatus @ 24 NONAME
-	_ZN16CUnifiedKeyStoreD0Ev @ 25 NONAME
-	_ZN16CUnifiedKeyStoreD1Ev @ 26 NONAME
-	_ZN16CUnifiedKeyStoreD2Ev @ 27 NONAME
-	_ZN17CUnifiedCertStore10InitializeER14TRequestStatus @ 28 NONAME
-	_ZN17CUnifiedCertStore12CancelRemoveEv @ 29 NONAME
-	_ZN17CUnifiedCertStore14CancelSetTrustEv @ 30 NONAME
-	_ZN17CUnifiedCertStore16CancelInitializeEv @ 31 NONAME
-	_ZN17CUnifiedCertStore16SetApplicabilityERK11CCTCertInfoRK6RArrayI4TUidER14TRequestStatus @ 32 NONAME
-	_ZN17CUnifiedCertStore17ReadOnlyCertStoreEi @ 33 NONAME
-	_ZN17CUnifiedCertStore17WritableCertStoreEi @ 34 NONAME
-	_ZN17CUnifiedCertStore22CancelSetApplicabilityEv @ 35 NONAME
-	_ZN17CUnifiedCertStore4ListER14RMPointerArrayI11CCTCertInfoERK20CCertAttributeFilter13RPointerArrayIK6TDesC8ER14TRequestStatus @ 36 NONAME
-	_ZN17CUnifiedCertStore4ListER14RMPointerArrayI11CCTCertInfoERK20CCertAttributeFilterRK6TDesC8R14TRequestStatus @ 37 NONAME
-	_ZN17CUnifiedCertStore4NewLER3RFsi @ 38 NONAME
-	_ZN17CUnifiedCertStore5NewLCER3RFsi @ 39 NONAME
-	_ZN17CUnifiedCertStore6RemoveERK11CCTCertInfoR14TRequestStatus @ 40 NONAME
-	_ZN17CUnifiedCertStore8RetrieveERK11CCTCertInfoRP12CCertificateR14TRequestStatus @ 41 NONAME
-	_ZN17CUnifiedCertStore8SetTrustERK11CCTCertInfoiR14TRequestStatus @ 42 NONAME
-	_ZN17CUnifiedCertStore9CertStoreEi @ 43 NONAME
-	_ZN17CUnifiedCertStoreD0Ev @ 44 NONAME
-	_ZN17CUnifiedCertStoreD1Ev @ 45 NONAME
-	_ZN17CUnifiedCertStoreD2Ev @ 46 NONAME
-	_ZN26CCertificateAppInfoManager4AddLERK19TCertificateAppInfo @ 47 NONAME
-	_ZN26CCertificateAppInfoManager4NewLER3RFsi @ 48 NONAME
-	_ZN26CCertificateAppInfoManager4NewLEv @ 49 NONAME
-	_ZN26CCertificateAppInfoManager5NewLCER3RFsi @ 50 NONAME
-	_ZN26CCertificateAppInfoManager5NewLCEv @ 51 NONAME
-	_ZN26CCertificateAppInfoManager7RemoveLERK4TUid @ 52 NONAME
-	_ZN26CCertificateAppInfoManagerD0Ev @ 53 NONAME
-	_ZN26CCertificateAppInfoManagerD1Ev @ 54 NONAME
-	_ZN26CCertificateAppInfoManagerD2Ev @ 55 NONAME
-	_ZNK16CUnifiedKeyStore13KeyStoreCountEv @ 56 NONAME
-	_ZNK16CUnifiedKeyStore20KeyStoreManagerCountEv @ 57 NONAME
-	_ZNK17CUnifiedCertStore14CertStoreCountEv @ 58 NONAME
-	_ZNK17CUnifiedCertStore22ReadOnlyCertStoreCountEv @ 59 NONAME
-	_ZNK17CUnifiedCertStore22WritableCertStoreCountEv @ 60 NONAME
-	_ZNK26CCertificateAppInfoManager12ApplicationLERK4TUidRi @ 61 NONAME
-	_ZNK26CCertificateAppInfoManager12ApplicationsEv @ 62 NONAME
-	_ZTI26CCertificateAppInfoManager @ 63 NONAME ; #<TI>#
-	_ZTV26CCertificateAppInfoManager @ 64 NONAME ; #<VT>#
-	_ZN17CUnifiedCertStore4NewLER3RFsiR6RArrayIiE @ 65 NONAME
-	_ZN17CUnifiedCertStore5NewLCER3RFsiR6RArrayIiE @ 66 NONAME
-	_ZN16CUnifiedKeyStore23GetAuthenticationPolicyE20TCTTokenObjectHandleRP7HBufC16RiR14TRequestStatus @ 67 NONAME
-	_ZN16CUnifiedKeyStore23SetAuthenticationPolicyE20TCTTokenObjectHandleRK7TDesC16iR14TRequestStatus @ 68 NONAME
-	_ZN16CUnifiedKeyStore9CreateKeyEi15TKeyUsagePKCS15jRK7TDesC16N12CKeyInfoBase13EKeyAlgorithmEi5TTimeS6_S3_iRP10CCTKeyInfoR14TRequestStatus @ 69 NONAME
-	_ZN16CUnifiedKeyStore9ImportKeyEiRK6TDesC815TKeyUsagePKCS15RK7TDesC16i5TTimeS7_S6_iRP10CCTKeyInfoR14TRequestStatus @ 70 NONAME
-
--- a/cryptoservices/certificateandkeymgmt/inc/pkcs10attr.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/certificateandkeymgmt/inc/pkcs10attr.h	Wed Apr 14 17:48:59 2010 +0300
@@ -28,6 +28,7 @@
 
 class CASN1EncBase;
 class CASN1EncSequence;
+class CASN1EncSet;
 
 //
 // Class capturing common functionality of a PKCS attribute.
--- a/cryptoservices/certificateandkeymgmt/inc/unifiedkeystore_v2.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/certificateandkeymgmt/inc/unifiedkeystore_v2.h	Wed Apr 14 17:48:59 2010 +0300
@@ -32,14 +32,6 @@
 
 #include <mctkeystoremanager.h>
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-namespace CryptoSpi
-    {
-    class CSigner;
-    class CAsymmetricCipher;
-    class CCryptoParams;
-    }
-#endif
 
 /**
  * Unified KeyStore panics 
@@ -136,22 +128,6 @@
 							  TRequestStatus& aStatus);
 	virtual void CancelExportPublic();
 
-#ifdef SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT
-    virtual void Open(const TCTTokenObjectHandle& aHandle,
-                      CryptoSpi::CSigner*& aSigner,
-                      TRequestStatus& aStatus);
-    virtual void Open(const TCTTokenObjectHandle& aHandle,
-                      CryptoSpi::CAsymmetricCipher*& asymmetricCipherObj,
-                      TRequestStatus& aStatus);
-    virtual void Decrypt(const TCTTokenObjectHandle& aHandle,
-                         const TDesC8& aCiphertext,
-                         HBufC8*& aPlaintextPtr,
-                         TRequestStatus& aStatus);
-    virtual void Sign(const TCTTokenObjectHandle& aHandle,
-                      const TDesC8& aPlaintext,
-                      CryptoSpi::CCryptoParams*& aSignature,
-                      TRequestStatus& aStatus);
-#endif
 
 public:		//	For MCTKeyStoreManager except those (CreateKey, ImportKey, ImportEncryptedKey)
 			//	that require a caller-specified store
@@ -459,135 +435,6 @@
 	 * 								or equal to the value returned by KeyStoreManagerCount().
 	 */
 	IMPORT_C MCTKeyStoreManager& KeyStoreManager(TInt aIndex);
-
-#ifdef SYMBIAN_AUTH_SERVER
-public:
-	/**
-		 * Generates a new key pair. The creation of key is for currently authenticated 
-		 * user. If currently there is no authenticated user then authentication of an user 
-		 * would be required.
-		 *
-		 * For the software key store, the owner of the new key is set to the
-		 * calling process.  Users can subsequently be added by calling SetUsers().
-		 *	
-		 * @param aKeyStoreIndex  			The index of the key store manager in which to
-		 *                        			create the key.  Must be between zero and
-		 *	                      			KeyStoreMangerCount() exclusive.		
-		 * @param aUsage		  			The key usage flags in the PKCS#15 format.
-		 * @param aSize		      			The size of the key in bits.
-		 * @param aLabel		  			A textual label for the key.
-		 * @param aAlgorithm	  			The type of key.
-		 * @param aAccessType     			The key access type - a bitfield specifying key
-		 *	                      			access requirements.  Allowed values are zero, or
-		 *	                      			a comination of CCTKeyInfo::EKeyAccess::ESenstive
-		 *	                      			and CCTKeyInfo::EKeyAccess::EExtractable
-		 * @param aStartDate	  			The start of the validity period.
-		 * @param aEndDate		  			The end of the validity period.	
-		 * @param aAuthenticationString		The expression through which a user can be authenticated.
-		 * 									Currently this should correspond to one of the alias values
-		 * 									set by the licensee for authentication server configuration.
-		 * @param aFreshness				The validity to be considered for an already authenticated 
-		 * 									identity. Specification is in seconds.	
-		 * @param aKeyInfoOut     			A pointer that is set to a newly created key info
-		 *	                      			object on successful completion.
-		 * @param aStatus		  			Final status of the operation. 
-		 *   
-		 * @capability WriteUserData		Requires the caller to have WriteUserData capability
-		 * @leave KErrPermissionDenied		If the caller does not have WriteUserData capability
-		 * @leave KErrKeyUsage				If the key usage flags are not valid or not
-		 *									consistent with the key algorithm.
-		 * @leave KErrKeyValidity			If the validity start and end dates are specified
-		 *									but do not form a valid time period.
-		 * @leave KErrAuthenticationFailure	If the user authentication fails.
-		 * @leave ...						Any of the system wide error code.
-		 * @panic							If aKeyStoreIndex does not specify a valid keystore manager.
-	*/
-
-	IMPORT_C void CreateKey(TInt aKeyStoreIndex, TKeyUsagePKCS15 aUsage,TUint aSize, 
-							const TDesC& aLabel, CCTKeyInfo::EKeyAlgorithm aAlgorithm, 
-							TInt aAccessType, TTime aStartDate, TTime aEndDate,
-							const TDesC& aAuthenticationString, TInt aFreshness,
-							CCTKeyInfo*& aKeyInfoOut, TRequestStatus& aStatus) ;
-
-	/**
-		 * Imports a key pair. The import of key is for currently authenticated 
-		 * user. If currently there is no authenticated user then authentication 
-		 * of an user would be required.
-		 *
-		 * For the software key store, the owner of the new key is set to the
-		 * calling process.  Users can subsequently be added by calling SetUsers().
-		 *
-		 * The key data should be in PKCS#8 format.  Both encrypted and cleartext
-		 * versions are allowed.
-		 *
-		 * @param aKeyStoreIndex  			The index of the key store manager in which to
-		 *	                      			create the key.  Must be between zero and
-		 *	                      			KeyStoreMangerCount() exclusive.			
-		 * @param aKeyData		  			The key data to import, ASN.1 DER encoded PKCS#8.
-		 * @param aUsage		  			The key usage flags in the PKCS#15 format.
-		 * @param aLabel		  			A textual label for the key.
-		 * @param aAccessType     			The key access type - a bitfield specifying key
-		 *	                      			access requirements.  Allowed values are zero, or
-		 *	                      			a comination of CCTKeyInfo::EKeyAccess::ESenstive
-		 *	                      			and CCTKeyInfo::EKeyAccess::EExtractable
-		 * @param aStartDate	  			The start of the validity period.
-		 * @param aEndDate		  			The end of the validity period.
-		 * @param aAuthenticationString		The expression through which a user can be authenticated.
-		 * 									Currently this should correspond to one of the alias values
-		 * 									set by the licensee for authentication server configuration.
-		 * @param aFreshness				The validity to be considered for an already authenticated 
-		 * 									identity. Specification is in seconds.	
-		 * @param aKeyInfoOut     			A pointer that is set to a newly created key info
-		 *	                      			object on successful completion.
-		 * @param aStatus		  			Final status of the operation. 
-		 *	                      
-		 * @capability WriteUserData	Requires the caller to have WriteUserData capability
-		 * @leave KErrPermissionDenied	If the caller does not have WriteUserData capability
-		 * @leave KErrKeyUsage			If the key usage flags are not valid or not
-		 *								consistent with the key algorithm.
-		 * @leave KErrKeyValidity		If the validity start and end dates are specified
-		 *								but do not form a valid time period.
-		 * @leave KErrArgument			If the key data cannot be parsed.
-		 * @panic						If aKeyStoreIndex does not specify a valid keystore manager.
-	*/
-	
-	IMPORT_C void ImportKey(	TInt aKeyStoreIndex, const TDesC8& aKeyData,
-								TKeyUsagePKCS15 aUsage, const TDesC& aLabel, 
-								TInt aAccessType, TTime aStartDate, TTime aEndDate, 
-								const TDesC& aAuthenticationString, TInt aFreshness,
-								CCTKeyInfo*& aKeyInfoOut, TRequestStatus& aStatus);
-	
-	/**
-	 *  Set the authentication policy for an already existing key in the store.
-	 * 
-	 * @param aHandle					The handle of the key whose policy is to be changed.
-	 * @param aAuthenticationString		The expression associated to this key.
-	 * @param aFreshness				The validity associated to this key.
-	 * 									Specification is in seconds.
-	 * @param aStatus					Final status of the operation.  
-	*/
-	
-	IMPORT_C void SetAuthenticationPolicy(	const TCTTokenObjectHandle aHandle, 
-											const TDesC& aAuthenticationString,
-											TInt aFreshness,					
-											TRequestStatus& aStatus);
-
-	/**
-	 *  Retrieve authentication policy for an already existing key in the store.
-	 * 
-	 * @param aHandle					The handle of the key whose policy is to be retrieved.
-	 * @param aAuthenticationString		The expression associated to this key. The memory would
-	 * 									be allocated at the server side.
-	 * @param aFreshness				The validity associated to this key.
-	 * 									Specification is in seconds.
-	 * @param aStatus					Final status of the operation. 
-	*/
-	
-	IMPORT_C void GetAuthenticationPolicy(	const TCTTokenObjectHandle aHandle, 
-											HBufC*& aAuthenticationString,
-											TInt& aFreshness,					
-											TRequestStatus& aStatus);
-#endif // SYMBIAN_AUTH_SERVER
 	
 private:
 	CUnifiedKeyStore(RFs& aFs);
Binary file cryptoservices/certificateandkeymgmt/pkixCert/doxygen_docs/Certman_X509_Certificate_Validation_chain.png has changed
--- a/cryptoservices/certificateandkeymgmt/pkixCert/doxygen_docs/Certman_X509_Certificate_Validation_overview.dox	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,164 +0,0 @@
-/**
-@page overview_Certificate_Validation_in_PKIX Certificate Validation in PKIX
-
-<hr>
-
-@section certificate_chain Certificate Chain
-
-Certificate validation is a recursive process. It begins with the need to verify the @ref digital_signature "digital signature" on some data presented by 
-an @ref EE "End Entity" (EE). This involves checking that the key pair is actually owned by that @ref EE. To do this, the 
-public signing key of that EE is acquired by getting its @ref certificate. That @ref certificate would have been 
-signed by the EE's @ref CA "certification authority" (CA), so the @ref digital_signature "digital signature" on the @ref certificate can be 
-verified by getting the @ref CA's public signing key. In turn, the @ref CA's certificate may need verifying, in which case
-the process is repeated until it bottoms out when an entity that is already trusted is reached; that entity is 
-usually self signed. This process is illustrated in the figure below:
-
-@image html Certman_X509_Certificate_Validation_chain.png 
-\n\n
-
-The set of @ref certificates from an @ref EE up to a trusted root @ref CA_certificate "CA certificate" is called a certificate chain. 
-Once a certificate chain has been constructed, the @ref EE's key pair at the start can validated.
-
-<hr>
-
-@section input_to_certificate_validation Input to Certificate Validation
-
-The following inputs need to be supplied to the validation process:
-
-@li @ref End_Entity_and_Intermediate_Certificates
-@li @ref Trusted_Root_Certificates
-@li @ref Validation_Time
-@li @ref Acceptable_Policies
-
-@subsection End_Entity_and_Intermediate_Certificates End Entity & Intermediate Certificates
-
-A set of @ref certificates, from the entity requesting @ref authentication up to, but not including, one already trusted 
-by the @ref relying_party "relying party". 
-
-Where these @ref certificates come from is potentially a difficult problem, if certificate management is expected to search
-for intermediate certificates in remote repositories; however for @ref TLS, at least servers are required to supply a 
-complete, ordered set of certificates in the form of @ref DER encoded @ref ASN "ASN.1"; so client code can just pass this into 
-the certificate chain object.
-
-@subsection Trusted_Root_Certificates Trusted Root Certificates
-
-@ref Authentication cannot be done entirely by software: there must be a point at which the user confirms that they trust 
-a particular entity. The validation algorithm can only ascertain that if the user trusts certificate X then they may also 
-trust certificate Y. Certificates that the user trusts directly are called @ref root_certificate "root certificates" because they are the root
-of the validation chain; they are usually self-signed. 
-
-It is likely that different applications will have different requirements about which @ref certificates may be considered 
-trust roots, and for the level of protection they require for trust roots. To this end, applications will pass in a unique
-ID (\c TUid) which Certificate Management will use to identify the application, and so work out which @ref certificates 
-can be considered trusted for that application. 
-
-For additional flexibility, an overload is provided enabling clients to pass a set of @ref root_certificate "root certificates" directly into
-the validation function. 
-
-For more detailed discussion of the storage and management of root certificates 
-see Root Certificate Management and Storage.
-
-
-@subsection Validation_Time Validation Time
-
-The time for which validation will be performed.
-
-
-@subsection Acceptable_Policies Acceptable Policies
-
-A set of @ref OID "OID"s, each of which represents a certification policy acceptable to the application. This enables client 
-code to restrict the @ref certificates that may occur in a valid certificate chain. Client code does not have to specify 
-any preferred policies here. An empty set is interpreted as any policy.
-
-
-<hr>
-
-@section chain_validation Chain Validation
-
-@subsection chain_construction Chain Construction
-
-The chain object parses the encoded set of certificates. The first certificate is considered to be the @ref EE 
-certificate, and subsequent @ref certificates must each certify the preceding one. The chain object then searches the set 
-of trusted @ref root_certificate "root certificates" for a certificate trusted by the client and whose subject name matches the issuer name 
-in the last certificate in the decoded set. If two or more match, it will attempt to resolve this be comparing the 
-authority key ID in the last certificate with the subject key ID in each candidate root. If this extension is not present,
-it will attempt to find a single root by signature verification. If no root is found, validation will fail immediately 
-with an error.
-
-
-@subsection initialisation_of_chain_validation_algorithm Initialisation of Chain Validation Algorithm
-
-The certificate chain initialises the following state variables:
-
-@li Validation Time: time for which validation is calculated. Initialised to the time supplied by client code. 
-
-@li Initial Policies: set of policy @ref OIDs, initialised to the policies supplied by client code 
-
-@li Acceptable Policies: set of X.509 policy information objects, initially any policy 
-
-@li Mapped Policies: set of policy @ref OIDs, initially empty
-
-@li Excluded Subtrees: set of X.500 General Name objects, initially empty
-
-@li Permitted Subtrees: set of X.500 General Name objects, initially any subtree
-
-@li Max Path Length: integer representing the maximum path length. Initially the actual path length 
-
-@li Inhibit Policy Mapping: integer whose value is the number of certificates that may appear after the current one before
-	policy mapping is no longer permitted. Initially the chain length
-
-@li Require Explicit Policy: integer whose value is the number of certificates that may appear after the current one 
-	before an acceptable policy @ref OID must appear in the certificate. Initially the chain length
-
-@li Current Cert: integer whose value is the position of the current certificate in the chain. Initially the chain length -1
-
-
-<hr>
-
-@section validation_algorithm Validation Algorithm
-
-Validation of a certificate chain starts at the root and ends at the @ref EE "End Entity" (EE). It returns a result object which
-includes:
-
-@li a single error value, which consists of a reason for the error and an integer identifying which @ref certificate the 
-	error is associated with. If the reason is anything other than \c EValidatedOK then validation has failed.
-
-@li a set of warning values, each consisting of a reason for the warning and an integer identifying which @ref certificate the 
-	warning is associated with. 
-
-@li a set of policies accepted in the course of validating the chain.
-
-The reason the warnings are present is that it is sometimes impossible for Certificate Management to work out if an 
-irregularity is an error or not, because it depends on the context of the @ref certificate (e.g. the use to which its key 
-will be put) which is only known by client code. Warnings give client code a chance to evaluate these irregularities.
-
-For each @ref certificate the actions described below are performed:
-
-@li Signature Verification & Name Chaining -- Each @ref certificate must be signed by, and its subject name should match the
-	issuer name in, the certificate above it in the chain. The only exception is the @ref root_certificate "root certificate", which, if it 
-	claims to be self signed (i.e. its subject and issuer names match) must really be self signed; otherwise its signature
-	is not verified, but a warning is generated. 
-
-@li Validity Period Checking -- For each certificate, the Validation Time must lie within the validity period in the 
-	certificate. 
-
-@li Extension Processing -- Extensions can be marked critical; all critical extensions must be 'recognized and processed' 
-	or the certificate must be rejected. For some extensions it is either unclear what this means, or it clearly makes no 
-	sense, and in these cases a common response is to reject the certificate if the extension is marked critical. It is 
-	impossible to guarantee support for some extensions.
-
-@li Revocation Checking
-
-Additionally, for each certificate:
-
-@li the \em Max \em Path \em Length, \em Inhibit \em Policy \em Mapping and \em Require \em Explicit \em Policy variables 
-	are decremented, 
-
-@li and Current Cert must be less than or equal to \em Max \em Path \em Length.
-
-When validation is complete the \em Acceptable \em Policies variable will be copied into the set of policies in the result
-object.
-
-
-
-*/
\ No newline at end of file
--- a/cryptoservices/certificateandkeymgmt/pkixCert/doxygen_docs/Certman_X509_PKIXCert_overview.dox	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,13 +0,0 @@
-/**
-@page overview_X509_PKIXCert PKIXCert Overview
-
-This DLL implements certificate validation according to the @ref PKIX Certificate and @ref CRL profile. It is the main public 
-interface to certificate management. Given a set of @ref certificates supplied by a third party, and a local store of 
-trusted @ref root_certificate "root certificates", this component will attempt to validate the identity of the third party. Two public 
-classes are defined here:
-
-\c CPKIXCertChain -- performs certificate validation.
-
-\c CPKIXValidationResult -- encapsulates the result of the validation operation.
-
-*/
\ No newline at end of file
--- a/cryptoservices/certificateandkeymgmt/wtlscert/doxygen_docs/Certman_WTLS_overview.dox	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,223 +0,0 @@
-/**
-
-@page overview_WTLS WTLS
-\n
-
-@section WTLS_component_overview WTLS Certificate Management component overview
- 
-The WTLS component provides support for validating WTLS certificate chains. 
-WTLS certificates are used for server authentication in the @ref protocol_WTLS "WTLS protocol". 
-
-WTLS certificate management is implemented as a single DLL, \c WTLSCert.DLL. This includes an implementation of the WTLS 
-certificate class and its components, and an implementation of the WTLS certificate validation algorithm.
-
-Symbian OS supports only @ref WTLS_server_authentication "WTLS server authentication" (class 2), which involves parsing, 
-validating and storing WTLS certificates.
-The WTLS Certificate Management component only offers support for the validation of chains composed exclusively of 
-WTLS certificates. The component offers the following functionality for processing WTLS certificates:
-
-@li ability to parse a set of WTLS certificates, sent from the server, from their binary encoded form into a form in which
-	they are useful, and in which client code can extract interesting information (e.g. name information)
-
-@li	use of these certificates to construct a chain back to a locally stored trusted @ref root_certificate "root certificate"
-
-@li validation of this certificate chain; this includes verifying the signature and validity dates on each @ref certificate.
-
-<hr>
-
-@section WTLS_certificate WTLS certificate
-
-@section basic_data_structures Basic data structures
-
-The following classes derive from their counterparts in \c Crypto.DLL, and add only a set of constructors for construction 
-from encoded binary data:
-@li \c CWTLSValidityPeriod: derived from \c CValidityPeriod
-@li \c CWTLSAlgorithmIdentifier: derived from \c CAlgorithmIdentifier
-@li \c CWTLSSigningAlgorithmIdentifier: derived from \c CSigningAlgorithmIdentifier
-@li \c CWTLSSubjectPublicKeyInfo: derived from \c CSubjectPublicKeyInfo
-@li \c CWTLSRSAPublicKey: derived from \c CRSAPublicKey 
-
-Classes representing public keys are derived from the corresponding classes in \c cryptalg.h and add only a set of 
-constructors for construction from encoded binary data. The WTLS Certificate Management component only offers support for 
-RSA asymmetric algorithms (and RSA with SHA-1).
-
-@section name_forms Name forms
-
-The name forms/identifiers supported are: text strings (Latin-1 and Unicode), and X.500 Distinguished Names.
-The WTLS name is implemented in the \c CWTLSName class and stores the type of the underlying name (as a value for the 
-\c TWTLSNameType enumeration, accessible through the \c CWTLSName::NameType() function) and the encoding of the underlying type 
-(accessible as a pointer descriptor through the \c CWTLSName::NameData() function). The \c CWTLSName class also provides a function 
-to do matching, \c CWTLSName::ExactMatchL(), which returns a boolean value. This function is needed for constructing/validating 
-certificate chains and performs a simple byte comparison of the name forms.
-
-@section text_type Text type
-
-The \c CWTLSText class is provided to represent the text type, and can be constructed from encoded binary data. It provides 
-the function, \c CWTLSText::CharacterSet(), for accessing the character set, which in turn is an integer representing the IANA designated 
-number for the character set. The text can be retreived using the \c CWTLSText::Name() function. \c CWTLSText also provides the function,
-\c CWTLSText::ExactMatchL(), for matching, for which two strings that are the same, but represented in different character sets, 
-should match. This differs from \c CWTLSName::ExactMatchL() for which the same two strings would not match as the bytes 
-would be different.
-
-@section structured_text_type Structured text type
-
-Structured text types are represented by a subclass of \c CWTLSText called \c CWTLSStructuredText. For this type, the name 
-is parsed into a set of fields. Accessors are provided for the mandatory fields: \c CWTLSStructuredText::ServiceName(), \c CWTLSStructuredText::Organization(), 
-\c CWTLSStructuredText::Country(). Optional fields are represented by the \c TWTLSStructuredTextField class. This provides two accessors, 
-\c TWTLSStructuredTextField::Type() and \c TWTLSStructuredTextField::Value(), to return the type of the field (this is the part of the field text on the left hand side of the 
-assignment operator in the name) and its value. To access the optional fields in \c CWTLSStructuredText, functions are 
-provided to return the number of fields, \c CWTLSStructuredText::Count(), and to return a particular field by its index, \c CWTLSStructuredText::FieldByIndex(). It 
-is also possible to access a field value by its type using the \c CWTLSStructuredText::FieldByName() function, giving as a parameter the type of 
-the desired field. This function returns a pointer because the field may not be present, in which case the return value is
-\c NULL. However, the field returned remains the property of \c CWTLSStructuredText, so calling code should not destroy it.
-
-
-@section CWTLSCertificate_class CWTLSCertificate class
-
-The \c CWTLSCertificate class is a subclass of \c CCertificate. It offers eight differing \c CWTLSCertificate::NewL()/NewLC() functions that 
-allow class construction from encoded binary form, streams, or from the @ref  WTLS_certificate_storage "certificate store".
-The \c CWTLSCertificate::IsEqualL() function tests whether two certificates are equal, which is not a simple as it sounds. 
-For @ref X509_certificate "X.509 certificates", equality means that the issuer name and serial number fields are the same. 
-This guarantees equality since a @ref CA "Certification Authority" (CA) must ensure that every certificate it issues has a 
-unique serial number. But WTLS certificates do not include serial numbers, so there seems to be no definition of equality. 
-The equality operator here will use a byte-for-byte comparison of the signatures on the certificates: this should not 
-result in any false positives, but may give false negatives if CAs do naughty things like recertifying the same key (which 
-they have been known to do).
-
-The functions \c CWTLSCertificate::IssuerName() and \c CWTLSCertificate::SubjectName() return the certificate's issuer and subject names, respectively, as 
-@ref name_forms "WTLSName objects". If the certificate is an X.509 certificate, then if the name contains a Common name, 
-that will be returned; otherwise, if the name contains an Organization name, that will be returned. Otherwise, an empty 
-string will be returned. If the certificate is a WTLS certificate, then if the name is an X.500 @ref DN then the same rules
-will apply as for X.509 certificates. If the name is null, an empty string will be returned. If the name is of type text, 
-then if the name is not a 'structured' name, the entire string will be returned; otherwise, the same procedure will be 
-followed as for X.509 certificates.
-
-The \c CWTLSCertificate::ExternalizeL() function externalises the certificate to a stream. This should not be used if client code is using 
-certstore. The \c CWTLSCertificate::InternalizeL() function initialises the certificate from a stream. This should not be called by client 
-code; instead one of the \c CWTLSCertificate::NewL()/NewLC() static factory functions above should be used. If a client is using the 
-certstore component for storage then it should use \c MCTWritableCertStore::AddL() for externalising and 
-\c CWTLSCert::NewL(CCertStore& aStore, const CCertStoreEntry& aEntry) for restoring. The \c CWTLSCertificate::IsTCAL() 
-function tests whether the certificate is capable of signing other certificates. Currently, this only supports structured 
-text variety of WTLS certificates; other certificate types will return \c EFalse. 
-
-
-
-<hr>
-
-@section WTLS_certificate_processing WTLS Certificate processing
-
-This specifies how the certificates are used for authentication: that is, how a collection of certificates is made 
-into a chain terminating at a trusted root, and how that chain is then validated.
-
-The following inputs need to be supplied to the validation process:
-@li the time for which validation is to be performed
-@li a set of one or more encoded WTLS certificates sent from the server
-@li some way of indicating where to find trusted roots to complete the chain.
-
-For WTLS, the server is expected to supply an ordered collection of certificates; that is, the first certificate should be
-the server's own certificate, each subsequent certificate should certify the one immediately preceding it in the chain. 
-Some checks are run on the chain in advance of validation to limit the number of requests made to the 
-@ref WTLS_certificate_storage "certificate store". In particular, the chain is checked to ensure that each parent 
-certificate has the authority to sign subsequent child certificates.  Additionally, the chain is scanned for the earliest
-certificate in the chain that may already be declared to be trusted by the user, therefore cutting down on both retrieval 
-and validation time.  Finally, if no trusted certificate can be found within the given chain, a search of the local store 
-is made to see whether any trusted certificates exist that can complete and validate the chain.
-
-To work around the absence of a means within the WTLS certificate data structure for a @ref CA to indicate whether the 
-entity it is certifying is a CA or an @ref EE "End Entity" (EE), the maximum length of a WTLS certificate chain will be 2:
-that is, there may be no intermediate CAs.
-
-The result is a @ref CWTLSValidationResult_class object indicating the success or failure of the operation, with a reason 
-for failure if appropriate and an integer indicating which certificate in the chain was bad, if appropriate. It is possible
-for client code to iterate through the certificates in the chain to retrieve and examine them.
-
-Client code uses the \c CWTLSCertificate class to do actual validation, using a set of one or more certificates supplied by a 
-server and a local store of trusted root certificates. It uses two public classes, \c CWTLSCertChain and 
-\c CWTLSValidationResult.
-
-@section CWTLSCertChain_class CWTLSCertChain
-
-Validation consists of constructing a chain from a set of one or more certificates supplied by the client, a set of trusted 
-root certificates, and a time for which validation is to be performed.  Each subsequent certificate must directly certify 
-the preceding one. The chain object will attempt to construct a valid chain ending in a trusted root from the encoded 
-certificates supplied by the server and the set of trusted roots.
-
-The chain supplied by the client is limited only by memory considerations.  However, a check of the proposed chain is done
-to attempt to validate the shortest chain possible.  For example, if the client supplied 15 certificates, but the third 
-certificate is marked as trusted in the @ref WTLS_certificate_storage "certificate store", then validation will proceed 
-with only the first three certificates. The remaining 12 certificates are discarded and are no longer part of the chain. 
-
-Validating the chain consists in ensuring that:
-@li the issuer name for each certificate is the same as the subject name on the next certificate in the chain: this is 
-	really guaranteed in the construction process
-@li every certificate is within its validity period for the time specified
-@li the signature on each certificate is valid
-@li all non-self-signed CA certificates contain the appropriate values within the certificate allowing them to sign child
-	certificates. In the case of @ref structured_text_type "WTLS structured text certificates", this is indicated by the 
-	presence of the extension field \c "T=ca" in the subject, where \c T stands for WTLS title.
-
-This class may be constructed in one of two ways:
-
-
-@li @code IMPORT_C static CWTLSCertChain* NewL(RFs& aFs, const TPtrC8& aEncodedCerts, const TUid aClient); @endcode
-	Here, the first parameter is an open file server session, the second is a single descriptor containing a simple 
-	concatenation of one or more encoded WTLS certificates. The third parameter is a UID identifying the client for whom 
-	validation is being performed. With this version of	the function the certstore is used to find candidate root 
-	certificates; only certificates in the store which are trusted by that client will be considered as valid.
-
-@li	@code IMPORT_C static CWTLSCertChain* NewL(RFs& aFs, const TPtrC8& aEncodedCerts, const CArrayPtr<CWTLSCertificate>& aRootCerts); @endcode
-	The only difference here is that rather than using the certstore for root certificates, the client supplies a 
-	collection of WTLS certificates which may be considered candidate roots for the validation process. This version should 
-	be used when clients do not want to use the certificate store provided (for example, an application may require that a 
-	certificate chain can only be completed by a certificate found on the device's WIM). Because they're not using the 
-	certificate store clients don't have to supply a UID.
-
-The \c CWTLSCertChain::ValidateL() function actually does the validation and takes a single parameter, which is the time for which 
-validation should be performed. Clients can find the number of certificates in the chain using the \c CWTLSCertChain::Count() function, and
-retrieve individual certificates using the \c CWTLSCertChain::Cert() function. It should be noted that both of these functions return 
-undefined values after the call to \c CWTLSCertChain::ValidateL() and until the completion of the associated active object. This is because 
-the validation procedure potentially optimises the chain handed to it and thus the chain can change after validation.  
-In summary:
-@li	Before calling \c CWTLSCertChain::ValidateL(), these functions return values consistent with the certificates that have been added to 
-	the chain.
-@li	During the execution of the active object, these return undefined values.
-@li	After the completion of the active object, these functions return values consistent with the chain that was actually 
-	used for validation.  These values may or may not be same as before the call to \c CWTLSCertChain::ValidateL().
-	
-The \c CWTLSCertChain::AppendCertsL() function can be used to append one or more encoded certificates to the certificate chain.
-
-
-@section CWTLSValidationResult_class CWTLSValidationResult
-
-The \c CWTLSValidationResult object encapsulates the result of the validation operation. The \c CWTLSValidationResult::Error() function returns 
-the error status for the chain. Any errors here are considered fatal: validation has failed. The \c CWTLSValidationResult::Warnings() function 
-returns an array of any warnings generated: these may or may not be fatal, depending on the context, which the client is 
-expected to provide. 
-
-
-Class \c TWTLSValidationStatus contains the following public data: \c iReason, and \c iCert.
-The reason for the error is given by \c iReason, while \c iCert gives the index number for the certificate that gave rise 
-to the error. Some errors cannot be blamed on any single certificate, in which case the \c iCert value is meaningless. The 
-same structure is used for errors and for warnings.
- 
-The following errors are defined in the \c TValidationError enumeration:
-@li \c EChainHasNoRoot: it was not possible to find a trusted root to complete the chain; the \c iCert variable is 
-	meaningless.
-@li \c ESignatureInvalid: signature verification failed; the \c iCert variable is set to the position in the chain of the 
-	certificate whose signature failed to verify.
-@li	\c EDateOutOfRange: the date supplied to the validation algorithm lay outside the validity period for one of the 
-	certificates; the \c iCert variable is set to the position in the chain of the certificate whose validity period did 
-	not include the supplied time.
-
-<hr>
-
-@section WTLS_certificate_storage Certificate storage
-
-Certificate management already provides a means for applications to store certificates, retrieve them from storage, and 
-mark them as trusted or untrusted for various applications. It currently does this using a kind of registration scheme 
-where users of certificate-based authentication supply a UID to the certificate store, and users can edit the certificates
-associated with each UID through a control panel application. When they require validation they supply the UID to the 
-validation component, which uses this to select a set of those certificates in the store that may be considered trust roots 
-for this application. 
-
-*/
\ No newline at end of file
--- a/cryptoservices/certificateandkeymgmt/x500/doxygen_docs/Certman_X509_and_X500_overview.dox	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,23 +0,0 @@
-/**
-@page overview_X500_and_X509 X.500 and X.509 Overview
-
-The X.500 component is a general component that provides services for the handling of X.500 distinguished names.
-It implements the @ref DN "Distinguished Name" (DN) as defined in the X.500 standard. An X.500 Distinguished Name consists of a
-sequence of \c AttributeTypeAndValue objects, as defined in the X.520 standard. Thus the two public classes implemented in
-this DLL are \c CX520AttributeTypeAndValue and \c CX500DistinguishedName.
-
-The X.509 component provides classes for handling @ref X509_certificate "X.509 certificates". It provides an implementation of the X.509 
-certificate and its components. In fact X.500 also includes structures from X.520, but for simplicity they are considered 
-to be part of X.500.
-
-For the most part, these DLLs simply represent data that the PKIXCert DLL operates on: they are the primary 
-input to certificate validation.
-
-In the X.500, X.509 and X.520 standards the structures are specified with Abstract Syntax Notation 1 (@ref ASN "ASN.1") and are 
-encoded for transport using the @ref "Basic Encoding Rules" (BER) which encode @ref ASN "ASN.1" as 8-bit binary data.
-
-In addition, when they represent data to be signed, as they do within certificate management, the signature is calculated 
-on the data encoded using @ref DER "Distinguished Encoding Rules" (DER: a subset of @ref BER which has the property that the 
-same data always encodes to the same binary representation).
-
-*/
\ No newline at end of file
--- a/cryptoservices/certificateandkeymgmt/x509/doxygen_docs/Certman_X509_index.dox	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,10 +0,0 @@
-/**
-
-@page Certman_X509_Certificate_Validation X.509 Certificate Validation
-\n
-
-@li @ref overview_X509_and_PKIX
-@li @ref overview_Certificate_Validation_in_PKIX
-@li @ref overview_X509_PKIXCert
-@li @ref overview_X500_and_X509
-*/
\ No newline at end of file
--- a/cryptoservices/certificateandkeymgmt/x509/doxygen_docs/Certman_X509_overview.dox	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,103 +0,0 @@
-/**
-
-@page overview_X509_and_PKIX X.509 and PKIX
-\n
-
-A @ref certificate consists of a public key together with some identifying information, all of which is signed with a 
-@ref CA "Certificate Authority's" (CA's) private key. Different @ref certificate specifications elaborate on this in different ways 
-with varying syntax, encoding rules and processing requirements. 
-
-Currently, X.509 is the dominant specification and is used by @ref TLS, @ref SMIME "S/MIME" and @ref IPSec. In addition to this 
-certificate type, the Symbian OS also provides support for and implements @ref WTLS certificates: this page deals with 
-X.509, for information on WTLS see @ref overview_WTLS Certificates Overview.
-
-
-<hr>
-
-@section need_for_profiles_in_x509 The need for profiles in X.509
-
-The X.509 specification alone is not restrictive or specific enough to form the basis of an implementation of a 
-certificate management component. Realisation of this fact has led to the creation of a set of mostly incompatible 
-profiles.
-
-While X.509 defines an extensible syntax for all the data structures required to perform certificate management, a profile
-adds three things:
-@li a restriction on the sorts of data structures that an implementation is required to understand
-@li a requirement that certain specific sorts of data structure be present, so an implementation may rely on their 
-presence
-@li a clear definition of the behaviour of a certificate management component, i.e. a specification of what it is supposed 
-to do with the data structures involved
-
-The best example of this is seen in certificate extensions. X.509 defines the syntax of a series of extension types, and 
-permits new extensions to be defined using object identifiers. It does not require the presence of any extensions and does
-not clearly indicate what it means to support a particular extension. Thus an implementation cannot know which extensions 
-will be present, or exactly what to do with them. A profile like PKIX defines a set of extensions that a PKIX-compliant 
-certificate management component must be able to deal with, which extensions can be assumed to be present, and a definition
-of what it means to deal with them. 
-
-The distinction between X.509 and its profiles is largely one of syntax versus behaviour: X.509 defines the syntax of the
-objects, and the profile defines how the presence and values of objects affects the behaviour of certificate management. 
-In addition, a profile may define extra pieces of syntax, specific to the application for which it is designed.
-
-
- 
-
-<hr>
-
-@section profile_support_in_certman Profile support in Certman
-
-Certificate Management implements X.509 along with one profile, the PKIX profile, defined in RFC 2549. Its design attempts
-to incorporate the distinction between X.509 and its profiles, enabling further additions to be made to the X.509 part 
-without affecting any profiles, and enabling further profiles to be defined without affecting the X.509 specific part.
-
-The decision to use a particular profile rests with the application.
-
-All general classes defined in X.509 are prefixed with 'X509', all profile specific classes are prefixed with the name of 
-the profile.
-
-
-<hr>
-
-@section x509_specific_part X.509 specific part
-
-The @ref X509_certificate "X.509 certificate" itself and the generic extension object are both clearly part of X.509 itself.
-
-The generic extension object is simply an ASN1 'any defined by' structure, with accessors for its @ref OID and its encapsulated
-data.
-
-The @ref X509_certificate "X.509 certificate" provides a function that, given a particular @ref OID, returns a pointer to a particular extension object
-or NULL if the extension is not present. It also provides functions to verify its signature, given a key, and return the 
-various data members that @ref X509 "X.509" requires, such as its subject and issuer DNs. However, it does not provide accessors for 
-any particular extensions (e.g. there is no KeyUsage() function, since it cannot be assumed that key usage is present).
-
-A generic certificate chain object is also provided; this simply has a set of X.509 certificates, provides accessors to 
-them and implements a function to decode a set of certificates from @ref DER encoded @ref ASN "ASN.1".
-
-Specific extension classes are in a bit of a no-man's land. This is because many of them are defined by @ref X509 "X.509", but more 
-can be added by any profile, and a profile will require the use of a particular set of extensions. So, all the extensions 
-used by @ref PKIX in @ref X509 "X.509" have been implemented on the assumption that they are likely to be useful for other profiles, 
-however, profiles are free to define extra extensions. Since these extension classes are implemented in @ref X509 "X.509", they only 
-define the syntax of the extension, not the way it should be used. Because they are radically different they do not share 
-a common base class.
-
-
-<hr>
-
-@section profile_specific_part Profile specific part
-
-The profile specific part defines two significant public classes:
-
-@li \b PKIX \b certificate \b chain \b object \n
-	This is main class which encapsulates path processing in the @ref PKIX profile. Thus it defines which extensions are 
-	required, which extensions are understood, and how they are understood. 
-
-@li \b PKIX \b validation \b result \b object \n
-	This is constructed by the chain object in the course of validation and handed to the client to examine.
-
-These classes are described in more detail in Certificate validation in @ref PKIX; the validation process discussed there is 
-@ref PKIX specific.
-
-
-
-
-*/
\ No newline at end of file
--- a/cryptoservices/filebasedcertificateandkeystores/Inc/filetokens.iby	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/Inc/filetokens.iby	Wed Apr 14 17:48:59 2010 +0300
@@ -28,13 +28,7 @@
 ECOM_PLUGIN(filecertstore.dll,101f5015.rsc)
 ECOM_PLUGIN(filekeystore.dll,101f7332.rsc)
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-file=ABI_DIR\BUILD_DIR\fstokenserver_useauth.exe		sys\bin\fstokenserver.exe
-data=\epoc32\data\z\private\10202BE9\200218e6.txt   \private\10202be9\200218e6.txt
-
-#else
 file=ABI_DIR\BUILD_DIR\fstokenserver.exe				sys\bin\fstokenserver.exe
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 
 
 #include "filetokensconfig.iby"
--- a/cryptoservices/filebasedcertificateandkeystores/Inc/filetokenstests.iby	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/Inc/filetokenstests.iby	Wed Apr 14 17:48:59 2010 +0300
@@ -45,50 +45,10 @@
 ECOM_PLUGIN(101faaa3.dll, 101faaa3.rsc)
 ECOM_PLUGIN(101faaa5.dll, 101faaa5.rsc)
 
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-data = ZDRIVE\tkeystore\scripts\thwkeystore.script		tkeystore\scripts\thwkeystore.script
-data = ZDRIVE\tkeystore\scripts\thwkeystore.ini			tkeystore\scripts\thwkeystore.ini
-data = ZPRIVATE\101f7e95\hwkeys.dat					private\101f7e95\hwkeys.dat
-data = ZDRIVE\tkeystore\data\hwkeys.dat				tkeystore\scripts\hwkeys.dat
-file = ABI_DIR\BUILD_DIR\tcryptotokenhai.dll			sys\bin\tcryptotokenhai.dll
-ECOM_PLUGIN(101faaaa.dll, 101faaaa.rsc)
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 
 //scripts
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-data = ZDRIVE\tkeystore\scripts\registration.ini		tkeystore\scripts\registration.ini
-data = ZDRIVE\tkeystore\scripts\initialize.script	tkeystore\scripts\initialize.script
-data = ZDRIVE\tkeystore\scripts\reg_first_identity.script	tkeystore\scripts\reg_first_identity.script
-data = ZDRIVE\tkeystore\scripts\reg_second_identity.script	tkeystore\scripts\reg_second_identity.script
-data = ZDRIVE\tkeystore\scripts\authobjects_useauth.script	tkeystore\scripts\authobjects_useauth.script
-data = ZDRIVE\tkeystore\scripts\authobjects_useauth.ini	tkeystore\scripts\authobjects_useauth.ini
 
 //TMS support
-data = ZDRIVE\tkeystore\scripts\cancel_useauth.script		tkeystore\scripts\cancel_useauth.script
-data = ZDRIVE\tkeystore\scripts\exportscript_useauth.script	tkeystore\scripts\exportscript_useauth.script
-data = ZDRIVE\tkeystore\scripts\oom_useauth.script			tkeystore\scripts\oom_useauth.script
-data = ZDRIVE\tkeystore\scripts\reload_useauth.script		tkeystore\scripts\reload_useauth.script
-data = ZDRIVE\tkeystore\scripts\servoom_useauth.script		tkeystore\scripts\servoom_useauth.script
-data = ZDRIVE\tkeystore\scripts\tkeystore_authentication1.script	tkeystore\scripts\tkeystore_authentication1.script
-data = ZDRIVE\tkeystore\scripts\tkeystore_authentication2.script	tkeystore\scripts\tkeystore_authentication2.script
-data = ZDRIVE\tkeystore\scripts\tkeystore_nouserregistered.script	tkeystore\scripts\tkeystore_nouserregistered.script
-data = ZDRIVE\tkeystore\scripts\tkeystore_useauth.script		tkeystore\scripts\tkeystore_useauth.script
-data = ZDRIVE\tkeystore\scripts\capability_useauth.script		tkeystore\scripts\capability_useauth.script
-data = ZDRIVE\tkeystore\scripts\authenticate_useauth.script		tkeystore\scripts\authenticate_useauth.script
-data = ZDRIVE\tkeystore\scripts\cancel_useauth.ini		tkeystore\scripts\cancel_useauth.ini
-data = ZDRIVE\tkeystore\scripts\exportscript_useauth.ini	tkeystore\scripts\exportscript_useauth.ini
-data = ZDRIVE\tkeystore\scripts\oom_useauth.ini			tkeystore\scripts\oom_useauth.ini
-data = ZDRIVE\tkeystore\scripts\reload_useauth.ini		tkeystore\scripts\reload_useauth.ini
-data = ZDRIVE\tkeystore\scripts\servoom_useauth.ini		tkeystore\scripts\servoom_useauth.ini
-data = ZDRIVE\tkeystore\scripts\tkeystore_authentication1.ini	tkeystore\scripts\tkeystore_authentication1.ini
-data = ZDRIVE\tkeystore\scripts\tkeystore_authentication2.ini	tkeystore\scripts\tkeystore_authentication2.ini
-data = ZDRIVE\tkeystore\scripts\tkeystore_nouserregistered.ini	tkeystore\scripts\tkeystore_nouserregistered.ini
-data = ZDRIVE\tkeystore\scripts\tkeystore_useauth.ini		tkeystore\scripts\tkeystore_useauth.ini
-data = ZDRIVE\tkeystore\scripts\capability_useauth.ini		tkeystore\scripts\capability_useauth.ini
-data = ZDRIVE\tkeystore\scripts\authenticate_useauth.ini		tkeystore\scripts\authenticate_useauth.ini
-
-#else
-//TMS support
 data = ZDRIVE\tkeystore\scripts\tkeystore.script		tkeystore\scripts\tkeystore.script
 data = ZDRIVE\tkeystore\scripts\cancel.script		tkeystore\scripts\cancel.script
 data = ZDRIVE\tkeystore\scripts\oom.script			tkeystore\scripts\oom.script
@@ -107,11 +67,6 @@
 data = ZDRIVE\tkeystore\scripts\authobjects.ini		tkeystore\scripts\authobjects.ini
 data = ZDRIVE\tkeystore\scripts\reload.ini		tkeystore\scripts\reload.ini
 
-#ifdef SYMBIAN_AUTH_SERVER
-data = ZDRIVE\tkeystore\scripts\oldserver_newfeature.script		tkeystore\scripts\oldserver_newfeature.script
-data = ZDRIVE\tkeystore\scripts\oldserver_newfeature.ini		tkeystore\scripts\oldserver_newfeature.ini
-#endif // SYMBIAN_AUTH_SERVER
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 
 //	test data
 data = ZDRIVE\tkeystore\data\pkcs8dh.001			tkeystore\data\pkcs8dh.001
@@ -277,7 +232,7 @@
 data = ZDRIVE\tcertapps\scripts\script1.ini			tcertapps\scripts\script1.ini attrib=r
 data = ZDRIVE\tcertapps\scripts\apipolicing.ini	tcertapps\scripts\apipolicing.ini attrib=r
 
-#if defined SYMBIAN_KEYSTORE_USE_AUTH_SERVER || defined SDP_ROM1
+#if defined SDP_ROM1
 //Nothing is included
 #else
 // additional certstore needed in normal rom for sec-filetokens tests which uses certstore1 ,2,...
@@ -298,6 +253,6 @@
 // Test keystore. Contains two keys, a DSA key (label gm0) and a RSA key (label gm1)
 // The passphrase timeout is set to 30
 data = ZPRIVATE\101F72A6\keys.dat          	private\101F72A6\keys.dat
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
+#endif // SDP_ROM1
 
 #endif
--- a/cryptoservices/filebasedcertificateandkeystores/Inc/fsdatatypes.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/Inc/fsdatatypes.h	Wed Apr 14 17:48:59 2010 +0300
@@ -33,11 +33,6 @@
 #include <cctcertinfo.h>
 #include <bigint.h>
 
-#ifdef SYMBIAN_AUTH_SERVER
-#include "authserver/authtypes.h"
-#endif // SYMBIAN_AUTH_SERVER
-
-
 /**
  * Server-side key info.
  * 
@@ -77,30 +72,9 @@
 	/** Sets the set of DER encoded PKCS8 attributes. */
 	IMPORT_C void SetPKCS8AttributeSet(HBufC8* aPKCS8AttributeSet);
 	
-#ifdef SYMBIAN_AUTH_SERVER
-	inline AuthServer::TIdentityId Identity() const;
-	inline const TDesC& AuthExpression() const;
-	inline TInt Freshness() const;
-	inline void SetIdentity(AuthServer::TIdentityId aIdentityId);
-	// Will set the authexpresssion aasociated with this key. The
-	// ownership is not transferred to this object.
-	inline void SetAuthExpressionL(const TDesC& aAuthExpression);
-	inline void SetFreshness(TInt aFreshness);
-	inline void ResetAuthExpression();
-#endif // SYMBIAN_AUTH_SERVER
-	
 private:
 	
 	inline CKeyInfo();
-
-#ifdef SYMBIAN_AUTH_SERVER
-private:
-	AuthServer::TIdentityId iIdentityId;
-	HBufC* iAuthExpression;
-	TInt iFreshness;
-#endif // SYMBIAN_AUTH_SERVER
-
-	
 	};
 
 /**
--- a/cryptoservices/filebasedcertificateandkeystores/Inc/fsdatatypes.inl	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/Inc/fsdatatypes.inl	Wed Apr 14 17:48:59 2010 +0300
@@ -24,9 +24,6 @@
 
 inline CKeyInfo::~CKeyInfo()
 	{
-#ifdef SYMBIAN_AUTH_SERVER
-	delete iAuthExpression;
-#endif // SYMBIAN_AUTH_SERVER
 	}
 
 inline void CKeyInfo::CleanupPushL()
@@ -44,49 +41,6 @@
 	iAccessType = aAccessType;
 	}
 
-#ifdef SYMBIAN_AUTH_SERVER
-inline AuthServer::TIdentityId CKeyInfo::Identity() const
-	{
-	return iIdentityId;
-	}
-
-inline const TDesC& CKeyInfo::AuthExpression() const
-	{
-	return *iAuthExpression;
-	}
-
-inline TInt CKeyInfo::Freshness() const
-	{
-	return iFreshness;
-	}
-
-inline void CKeyInfo::SetIdentity(AuthServer::TIdentityId aIdentityId)
-	{
-	iIdentityId = aIdentityId;
-	}
-
-inline void CKeyInfo::SetAuthExpressionL(const TDesC& aAuthExpression)
-	{
-	delete iAuthExpression;
-	iAuthExpression = NULL;
-	iAuthExpression = aAuthExpression.AllocL();
-	iAuthExpression->Des().Copy(aAuthExpression);
-	}
-
-inline void CKeyInfo::SetFreshness(TInt aFreshness)
-	{
-	iFreshness = aFreshness;
-	}
-
-inline void CKeyInfo::ResetAuthExpression()
-	{
-	delete iAuthExpression;
-	iAuthExpression = NULL;
-	}
-
-#endif // SYMBIAN_AUTH_SERVER
-
-
 inline const TInteger& CDHParams::N() const
 	{
 	return iN;
--- a/cryptoservices/filebasedcertificateandkeystores/group/bld.inf	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/group/bld.inf	Wed Apr 14 17:48:59 2010 +0300
@@ -34,11 +34,6 @@
 // ROMKIT includes
 ../Inc/filetokens.iby /epoc32/rom/include/filetokens.iby
 
-#ifdef SYMBIAN_AUTH_SERVER
-// file tokens cenrep file for storing the default authentication policy.
-../source/keystore/Server/200218e6.txt			z:/private/10202be9/200218e6.txt
-#endif // SYMBIAN_AUTH_SERVER
-
 PRJ_TESTEXPORTS
 //	keystore
 
@@ -70,57 +65,6 @@
 ../test/tkeystore/scripts/batchfiles/tkeystore_authobject_post.bat	/epoc32/winscw/c/tkeystore/scripts/batchfiles/tkeystore_authobject_post.bat	
 ../test/tkeystore/scripts/batchfiles/tkeystore_export_post.bat	/epoc32/winscw/c/tkeystore/scripts/batchfiles/tkeystore_export_post.bat	
 
-#ifdef SYMBIAN_AUTH_SERVER
-../test/tkeystore/scripts/authobjects_v2_useauth.script	/epoc32/winscw/c/tkeystore/scripts/authobjects_useauth.script
-../test/tkeystore/scripts/authobjects_v2_useauth.ini	/epoc32/winscw/c/tkeystore/scripts/authobjects_useauth.ini
-
-../test/tkeystore/scripts/createoldkeystore.script			/epoc32/winscw/c/tkeystore/scripts/createoldkeystore.script
-../test/tkeystore/scripts/createoldkeystore.ini			/epoc32/winscw/c/tkeystore/scripts/createoldkeystore.ini
-../test/tkeystore/scripts/testnewkeystore.script			/epoc32/winscw/c/tkeystore/scripts/testnewkeystore.script
-../test/tkeystore/scripts/testnewkeystore.ini			/epoc32/winscw/c/tkeystore/scripts/testnewkeystore.ini
-
-../test/tkeystore/scripts/oldserver_newfeature.script		/epoc32/winscw/c/tkeystore/scripts/oldserver_newfeature.script
-../test/tkeystore/scripts/tkeystore_useauth.script			/epoc32/winscw/c/tkeystore/scripts/tkeystore_useauth.script
-../test/tkeystore/scripts/oom_useauth.script				/epoc32/winscw/c/tkeystore/scripts/oom_useauth.script
-../test/tkeystore/scripts/servoom_useauth.script			/epoc32/winscw/c/tkeystore/scripts/servoom_useauth.script
-../test/tkeystore/scripts/exportscript_useauth.script		/epoc32/winscw/c/tkeystore/scripts/exportscript_useauth.script
-../test/tkeystore/scripts/reload_useauth.script			/epoc32/winscw/c/tkeystore/scripts/reload_useauth.script
-../test/tkeystore/scripts/cancel_useauth.script			/epoc32/winscw/c/tkeystore/scripts/cancel_useauth.script
-../test/tkeystore/scripts/tkeystore_authentication1.script	/epoc32/winscw/c/tkeystore/scripts/tkeystore_authentication1.script
-../test/tkeystore/scripts/tkeystore_authentication2.script	/epoc32/winscw/c/tkeystore/scripts/tkeystore_authentication2.script
-../test/tkeystore/scripts/tkeystore_nouserregistered.script /epoc32/winscw/c/tkeystore/scripts/tkeystore_nouserregistered.script
-../test/tkeystore/scripts/capability_useauth.script	/epoc32/winscw/c/tkeystore/scripts/capability_useauth.script
-../test/tkeystore/scripts/authenticate_useauth.script	/epoc32/winscw/c/tkeystore/scripts/authenticate_useauth.script
-
-../test/tkeystore/scripts/oldserver_newfeature.ini		/epoc32/winscw/c/tkeystore/scripts/oldserver_newfeature.ini
-../test/tkeystore/scripts/tkeystore_useauth.ini			/epoc32/winscw/c/tkeystore/scripts/tkeystore_useauth.ini
-../test/tkeystore/scripts/oom_useauth.ini				/epoc32/winscw/c/tkeystore/scripts/oom_useauth.ini
-../test/tkeystore/scripts/servoom_useauth.ini			/epoc32/winscw/c/tkeystore/scripts/servoom_useauth.ini
-../test/tkeystore/scripts/exportscript_useauth.ini		/epoc32/winscw/c/tkeystore/scripts/exportscript_useauth.ini
-../test/tkeystore/scripts/reload_useauth.ini			/epoc32/winscw/c/tkeystore/scripts/reload_useauth.ini
-../test/tkeystore/scripts/cancel_useauth.ini			/epoc32/winscw/c/tkeystore/scripts/cancel_useauth.ini
-../test/tkeystore/scripts/tkeystore_authentication1.ini	/epoc32/winscw/c/tkeystore/scripts/tkeystore_authentication1.ini
-../test/tkeystore/scripts/tkeystore_authentication2.ini	/epoc32/winscw/c/tkeystore/scripts/tkeystore_authentication2.ini
-../test/tkeystore/scripts/tkeystore_nouserregistered.ini /epoc32/winscw/c/tkeystore/scripts/tkeystore_nouserregistered.ini
-../test/tkeystore/scripts/capability_useauth.ini	/epoc32/winscw/c/tkeystore/scripts/capability_useauth.ini
-../test/tkeystore/scripts/authenticate_useauth.ini	/epoc32/winscw/c/tkeystore/scripts/authenticate_useauth.ini
-
-../test/tkeystore/scripts/registration.ini				/epoc32/winscw/c/tkeystore/scripts/registration.ini
-../test/tkeystore/scripts/reg_first_identity.script		/epoc32/winscw/c/tkeystore/scripts/reg_first_identity.script
-../test/tkeystore/scripts/reg_second_identity.script	/epoc32/winscw/c/tkeystore/scripts/reg_second_identity.script
-../test/tkeystore/scripts/initialize.script				/epoc32/winscw/c/tkeystore/scripts/initialize.script
-
-../test/tkeystore/scripts/batchfiles/epoc_keystoreusesauthserver.ini	/epoc32/winscw/c/tkeystore/scripts/batchfiles/epoc_keystoreusesauthserver.ini
-../test/tkeystore/scripts/batchfiles/replace_epoc_ini.bat				/epoc32/winscw/c/tkeystore/scripts/batchfiles/replace_epoc_ini.bat
-../test/tkeystore/scripts/batchfiles/restore_epoc_ini.bat				/epoc32/winscw/c/tkeystore/scripts/batchfiles/restore_epoc_ini.bat
-../test/tkeystore/scripts/batchfiles/tkeystore_useauthserver_post.bat	/epoc32/winscw/c/tkeystore/scripts/batchfiles/tkeystore_useauthserver_post.bat
-../test/tkeystore/scripts/batchfiles/tkeystore_useauthserver_pre.bat	/epoc32/winscw/c/tkeystore/scripts/batchfiles/tkeystore_useauthserver_pre.bat
-../test/tkeystore/scripts/batchfiles/tkeystore_migrate_pre.bat			/epoc32/winscw/c/tkeystore/scripts/batchfiles/tkeystore_migrate_pre.bat
-../test/tkeystore/scripts/batchfiles/tkeystore_migrate_post.bat			/epoc32/winscw/c/tkeystore/scripts/batchfiles/tkeystore_migrate_post.bat
-../test/tkeystore/scripts/batchfiles/tkeystore_migrate_copykeys.bat		/epoc32/winscw/c/tkeystore/scripts/batchfiles/tkeystore_migrate_copykeys.bat
-
-#endif // SYMBIAN_AUTH_SERVER
-
 // ttesttools data
 
 ../test/ttesttools/data/cert_addapps.txt	/epoc32/winscw/c/ttesttools/data/cert_addapps.txt
@@ -214,16 +158,6 @@
 ../test/ttesttools/scripts/sec-filetokens-tools.script	/epoc32/winscw/c/ttesttools/scripts/sec-filetokens-tools.script
 ../test/ttesttools/scripts/sec-filetokens-tools.ini	/epoc32/winscw/c/ttesttools/scripts/sec-filetokens-tools.ini
 
-#ifdef SYMBIAN_AUTH_SERVER
-../test/ttesttools/data/key_migrate.txt	/epoc32/winscw/c/ttesttools/data/key_migrate.txt
-../test/ttesttools/data/key_migrated_param_missing1.txt	/epoc32/winscw/c/ttesttools/data/key_migrated_param_missing1.txt
-../test/ttesttools/data/key_migrated_param_missing2.txt	/epoc32/winscw/c/ttesttools/data/key_migrated_param_missing2.txt
-../test/ttesttools/data/key_migrate_default.txt			/epoc32/winscw/c/ttesttools/data/key_migrate_default.txt
-../test/ttesttools/data/key_migrated_help.txt			/epoc32/winscw/c/ttesttools/data/key_migrated_help.txt
-../test/ttesttools/scripts/keytool_migrate.script		/epoc32/winscw/c/ttesttools/scripts/keytool_migrate.script
-../test/ttesttools/scripts/keytool_migrate.ini			/epoc32/winscw/c/ttesttools/scripts/keytool_migrate.ini
-#endif // SYMBIAN_AUTH_SERVER
-
 
 //	keystore data
 
@@ -340,14 +274,6 @@
 // ROMKIT includes
 ../Inc/filetokenstests.iby /epoc32/rom/include/filetokenstests.iby
 
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-../test/tkeystore/scripts/thwkeystore.script			/epoc32/winscw/c/tkeystore/scripts/thwkeystore.script
-../test/tkeystore/scripts/thwkeystore.ini			/epoc32/winscw/c/tkeystore/scripts/thwkeystore.ini
-../test/tkeystore/data/hwkeys.dat				/epoc32/data/z/private/101f7e95/hwkeys.dat
-../test/tkeystore/data/hwkeys.dat				/epoc32/release/winscw/udeb/z/private/101f7e95/hwkeys.dat
-../test/tkeystore/data/hwkeys.dat				/epoc32/release/winscw/urel/z/private/101f7e95/hwkeys.dat
-../test/tkeystore/data/hwkeys.dat				/epoc32/winscw/c/tkeystore/data/hwkeys.dat
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 
 PRJ_MMPFILES
 
@@ -357,10 +283,6 @@
 fstokencli.mmp
 fstokenserver.mmp
 
-#ifdef SYMBIAN_AUTH_SERVER
-fstokenserver_useauth.mmp
-#endif
-
 filekeystoreplugin.mmp
 filecertstoreplugin.mmp
 #endif // TOOLS2
@@ -370,10 +292,6 @@
 
 #ifndef TOOLS
 #ifndef TOOLS2
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-../test/tcryptotokenhai/tcryptotokenhai.mmp
-../test/thwkeystore/client/thwkeystoreclient.mmp
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 
 ../test/tfiletokens/tfiletokens.mmp
 ../test/tkeystore/tkeystore.mmp
--- a/cryptoservices/filebasedcertificateandkeystores/group/fstokenserver_useauth.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,40 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* File store token server executable
-* fstokenserver_useauth.exe File store token server executable
-*
-*/
-
-
-/**
- @file
-*/
-
-MACRO SYMBIAN_KEYSTORE_USE_AUTH_SERVER=1
-
-target fstokenserver_useauth.exe
-
-CAPABILITY TrustedUI ProtServ ReadUserData
-
-#include "fstokenserver.mmh"
-
-sourcepath ../source/keystore/Server
-source	keystorecenrepconfig.cpp
-
-LIBRARY authclient.lib 
-LIBRARY	authcommon.lib
-LIBRARY centralrepository.lib
-
-SMPSAFE
--- a/cryptoservices/filebasedcertificateandkeystores/source/generic/client/clientsession.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/source/generic/client/clientsession.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -22,14 +22,6 @@
 #include "clientutils.h"
 #include "fstokenservername.h"
 
-#ifdef SYMBIAN_AUTH_SERVER
-
-#ifdef __WINS__
-#include <u32hal.h>
-#endif //__WINS__
-
-#include <e32svr.h>
-#endif // SYMBIAN_AUTH_SERVER
 
 //	\\	//	\\	//	\\	//	\\	//	\\	//	\\	//	\\	//	\\	//	\\	//	\\	
 //	Tokentype session class for file based certificate store
@@ -38,11 +30,7 @@
 //	\\	//	\\	//	\\	//	\\	//	\\	//	\\	//	\\	//	\\	//	\\	//	\\	
 
 _LIT(KFSTokenServerImg,"fstokenserver");
-#ifdef SYMBIAN_AUTH_SERVER
-#ifdef __WINS__
-_LIT(KFSNewTokenServerImg,"fstokenserver_useauth");
-#endif // __WINS__
-#endif // SYMBIAN_AUTH_SERVER
+
 
 RFileStoreClientSession::RFileStoreClientSession()
 {}
@@ -73,13 +61,6 @@
 // Connect to the server, attempting to start it if necessary
 //
 
-#ifdef SYMBIAN_AUTH_SERVER
-#ifdef __WINS__
-
-static bool UseAuthServer(void);
-
-#endif // SYMBIAN_AUTH_SERVER
-#endif // __WINS__
 
 TInt RFileStoreClientSession::Connect(ETokenEnum aToken)
 	{
@@ -93,15 +74,6 @@
 	for (;;)
 		{
 		TInt err = KErrNone;
-#ifdef SYMBIAN_AUTH_SERVER
-#ifdef __WINS__
-		if(UseAuthServer())
-			{
-			err = CreateSession(KFSNewTokenServerName, version, 1);
-			}
-		else
-#endif // __WINS__
-#endif // SYMBIAN_AUTH_SERVER
 			{
 			err = CreateSession(KFSTokenServerName, version, 1);
 			}
@@ -116,25 +88,6 @@
 		}
 	}
 
-#ifdef SYMBIAN_AUTH_SERVER
-#ifdef __WINS__
-
-/*static*/ bool UseAuthServer(void)
-	{
-	bool useAuthServer = false;
-	
-	TUint32 useAuth = 0;
-	// For the emulator allow the constant to be patched via epoc.ini
-	UserSvr::HalFunction(EHalGroupEmulator, EEmulatorHalIntProperty,
-	(TAny*)"KKeyStoreUseAuthServer", &useAuth); // read emulator property (if present)
-	if(useAuth)
-		{
-		useAuthServer = true;
-		}
-	return useAuthServer; 
-	}
-#endif // __WINS__
-#endif // SYMBIAN_AUTH_SERVER
 
 TInt StartServer()
 	{
@@ -144,16 +97,6 @@
 
 	RProcess server;
 	TInt error = KErrNone;
-	
-#ifdef SYMBIAN_AUTH_SERVER
-#ifdef __WINS__
-	if(UseAuthServer())
-		{
-		error = server.Create(KFSNewTokenServerImg, KNullDesC, serverUid);
-		}
-	else
-#endif // __WINS__
-#endif // SYMBIAN_AUTH_SERVER
 		{
 		error = server.Create(KFSTokenServerImg, KNullDesC, serverUid);
 		}
--- a/cryptoservices/filebasedcertificateandkeystores/source/generic/common/fstokencliserv.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/source/generic/common/fstokencliserv.h	Wed Apr 14 17:48:59 2010 +0300
@@ -132,18 +132,7 @@
 	ERemoveApp              = 121,
 	EGetAppCount            = 122,
 	EGetApps                = 123,
-	EGetApplication         = 124,
-	
-#ifdef SYMBIAN_AUTH_SERVER
-	
-	EUseNewKeyServer = 125,
-	ECreateUserKey		= 126,
-	EImportUserKey		= 127,
-	EImportEncryptedUserKey	= 128,
-	ESetAuthenticationPolicy = 129,
-	EGetAuthenticationPolicy = 130,
-
-#endif // SYMBIAN_AUTH_SERVER	
+	EGetApplication         = 124,	
 	
 	};
 
--- a/cryptoservices/filebasedcertificateandkeystores/source/generic/common/fstokenservername.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/source/generic/common/fstokenservername.h	Wed Apr 14 17:48:59 2010 +0300
@@ -30,8 +30,5 @@
 
 // Define the server name
 _LIT(KFSTokenServerName, "!FSTokenServer");
-#ifdef SYMBIAN_AUTH_SERVER
-_LIT(KFSNewTokenServerName, "!FSTokenServer_useauth");
-#endif // SYMBIAN_AUTH_SERVER
 
 #endif
--- a/cryptoservices/filebasedcertificateandkeystores/source/generic/server/fsserver.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/source/generic/server/fsserver.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -132,13 +132,6 @@
 	FSDialog::InitialiseL();
 	
 	TPtrC serverName(KFSTokenServerName());
-		// Naming the server thread after the server helps to debug panics
-#ifdef __WINS__
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	serverName.Set(KFSNewTokenServerName());
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-#endif // __WINS__
-		
 	StartL(serverName);
 	
 	// Ensure that the server still exits even if the 1st client fails to connect
@@ -264,12 +257,7 @@
 static void RunServerL()
 	{
 	TPtrC serverName(KFSTokenServerName());
-	// Naming the server thread after the server helps to debug panics
-#ifdef __WINS__
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	serverName.Set(KFSNewTokenServerName());
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-#endif // __WINS__
+
 	
 	User::LeaveIfError(User::RenameThread(serverName));
 	
--- a/cryptoservices/filebasedcertificateandkeystores/source/keystore/Client/cfskeystoreclient.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/source/keystore/Client/cfskeystoreclient.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -86,23 +86,13 @@
 	: CFSClient(aUID, aToken, aClient),
 	  // Reference count starts at one as we're always created and returned by a GetInterface() call on the token
 	  iRefCount(1)
-#ifdef SYMBIAN_AUTH_SERVER
-	  ,iUseNewKeyServer(EFalse)
-#endif // SYMBIAN_AUTH_SERVER
 	{
 	LOG(_L("CFSKeyStoreClient::CFSKeyStoreClient: keystore client interface created"));
 	}
 
 void CFSKeyStoreClient::ConstructL()
 	{
-	CActiveScheduler::Add(this);
-
-#ifdef SYMBIAN_AUTH_SERVER
-	TPckg<TBool> idNewKeyServer(iUseNewKeyServer);
-	iClient.SendRequest(EUseNewKeyServer, TIpcArgs(0,&idNewKeyServer));
-	
-	if(iUseNewKeyServer == EFalse)
-#endif // SYMBIAN_AUTH_SERVER		
+	CActiveScheduler::Add(this);	
 		{
 		iAuthObject = CKeyStoreAuthObject::NewL(*this);
 		iAuthObject->AddRef();
@@ -199,14 +189,6 @@
 	
 	switch (iCurrentRequest.OutstandingRequest())
 		{
-#ifdef SYMBIAN_AUTH_SERVER
-		case ESetAuthenticationPolicy:
-			break;
-		case ECreateUserKey:
-		case EImportUserKey:
-		case EImportEncryptedUserKey:
-#endif //SYMBIAN_AUTH_SERVER
-		
 		case ECreateKey:
 		case EImportKey:
 		case EImportEncryptedKey:
@@ -374,33 +356,19 @@
 void CFSKeyStoreClient::DoListL(const TCTKeyAttributeFilter& aFilter, MKeyInfoArray& aOut)
 	{
 	TInt startOfNew = aOut.Count();
-#ifdef SYMBIAN_AUTH_SERVER
-	if(iUseNewKeyServer == EFalse)
-		{
-#endif // SYMBIAN_AUTH_SERVER
 		ASSERT(iAuthObject);
-#ifdef SYMBIAN_AUTH_SERVER
-		}
-#endif // SYMBIAN_AUTH_SERVER
 	
 	TPckg<TCTKeyAttributeFilter> filterPckg(aFilter);
 	SendSyncRequestAndHandleOverflowL(EListKeys, KInitialBufSizeList, TIpcArgs(&filterPckg, 0, &iRequestPtr));
    
 	CleanupClosePushL(aOut);
 	TokenDataMarshaller::ReadL(iRequestPtr, iToken, aOut);
-#ifdef SYMBIAN_AUTH_SERVER
-	if(iUseNewKeyServer == EFalse)
-		{
-#endif //SYMBIAN_AUTH_SERVER
 		for (TInt index = startOfNew ; index < aOut.Count() ; ++index)
 			{		
 			iAuthObject->AddRef();
 			LOG1(_L("CFSKeyStoreClient::DoListL: adding keyinfo %08x."), aOut[index]);
 			aOut[index]->SetProtector(*iAuthObject);
 			}
-#ifdef SYMBIAN_AUTH_SERVER
-		}
-#endif // SYMBIAN_AUTH_SERVER
 	CleanupStack::Pop(&aOut);
 	}
 
@@ -1060,14 +1028,6 @@
 
 void CFSKeyStoreClient::SetPassphraseTimeout(TInt aTimeout, TRequestStatus& aStatus)
 	{
-#ifdef SYMBIAN_AUTH_SERVER
-	if(iUseNewKeyServer)
-		{
-		TRequestStatus* stat = &aStatus;
-		User::RequestComplete(stat, KErrNotSupported);
-		return;
-		}
-#endif // SYMBIAN_AUTH_SERVER
 	SetTimeout(aTimeout, aStatus);
 	}
 
@@ -1078,14 +1038,6 @@
 
 void CFSKeyStoreClient::Relock(TRequestStatus& aStatus)
 	{
-#ifdef SYMBIAN_AUTH_SERVER
-	if(iUseNewKeyServer)
-		{
-		TRequestStatus* stat = &aStatus;
-		User::RequestComplete(stat, KErrNotSupported);
-		return;
-		}
-#endif // SYMBIAN_AUTH_SERVER
 	TInt err = iClient.SendRequest(ERelock, TIpcArgs());
 	TRequestStatus* status = &aStatus;
 	User::RequestComplete(status, err);
@@ -1113,14 +1065,6 @@
 	// Set size and algorithm - only strictly necessary for import
 	keyInfo.SetSize(update.iSize);
 	keyInfo.SetAlgorithm(update.iAlgorithm);
-#ifdef SYMBIAN_AUTH_SERVER
-	if(iUseNewKeyServer == EFalse)
-		{
-		ASSERT(iAuthObject);
-		iAuthObject->AddRef();
-		keyInfo.SetProtector(*iAuthObject);
-		}
-#endif // SYMBIAN_AUTH_SERVER
 	LOG_DEC_INDENT();	
 	}
 
@@ -1128,14 +1072,6 @@
 
 void CFSKeyStoreClient::ListProtectedObjects(RMPointerArray<MCTTokenObject>& aObjects, TRequestStatus& aStatus)
 	{
-#ifdef SYMBIAN_AUTH_SERVER
-	if(iUseNewKeyServer)
-		{
-		TRequestStatus* stat = &aStatus;
-		User::RequestComplete(stat, KErrNotSupported);
-		return;
-		}
-#endif //SYMBIAN_AUTH_SERVER
 	TCTKeyAttributeFilter filter;
 	filter.iPolicyFilter = TCTKeyAttributeFilter::EUsableOrManageableKeys;
 	TKeyInfoArray<MCTTokenObject> array(aObjects);
@@ -1147,14 +1083,6 @@
 
 void CFSKeyStoreClient::ChangeReferenceData(TRequestStatus &aStatus)
 	{
-#ifdef SYMBIAN_AUTH_SERVER
-	if(iUseNewKeyServer)
-		{
-		TRequestStatus* stat = &aStatus;
-		User::RequestComplete(stat, KErrNotSupported);
-		return;
-		}
-#endif //SYMBIAN_AUTH_SERVER
 	iCurrentRequest(EChangePassphrase, &aStatus);
 	SetActive();
 	iClient.SendAsyncRequest(EChangePassphrase, TIpcArgs(), &iStatus);
@@ -1162,12 +1090,6 @@
 
 void CFSKeyStoreClient::CancelChangeReferenceData()
 	{
-#ifdef SYMBIAN_AUTH_SERVER
-	if(iUseNewKeyServer)
-		{
-		return;
-		}
-#endif //SYMBIAN_AUTH_SERVER
 	if (iCurrentRequest.OutstandingRequest() == EChangePassphrase)
 		{
 		Cancel();
@@ -1176,26 +1098,11 @@
 
 TUint32 CFSKeyStoreClient::AuthStatus() const
 	{
-#ifdef SYMBIAN_AUTH_SERVER
-	if(iUseNewKeyServer)
-		{
-		return 0;
-		}
-#endif // SYMBIAN_AUTH_SERVER
-	
 	return EEnabled | EUnblockDisabled;
 	}
 
 void CFSKeyStoreClient::AuthOpen(TRequestStatus& aStatus)
 	{
-#ifdef SYMBIAN_AUTH_SERVER
-	if(iUseNewKeyServer)
-		{
-		TRequestStatus* stat = &aStatus;
-		User::RequestComplete(stat, KErrNotSupported);
-		return;
-		}
-#endif // SYMBIAN_AUTH_SERVER
 	iCurrentRequest(EAuthOpen, &aStatus);
 	SetActive();
 	iClient.SendAsyncRequest(EAuthOpen, TIpcArgs(), &iStatus);	
@@ -1203,12 +1110,6 @@
 
 void CFSKeyStoreClient::CancelAuthOpen()
 	{
-#ifdef SYMBIAN_AUTH_SERVER
-	if(iUseNewKeyServer)
-		{
-		return;
-		}
-#endif // SYMBIAN_AUTH_SERVER
 	if (iCurrentRequest.OutstandingRequest() == EAuthOpen)
 		{
 		Cancel();
@@ -1217,14 +1118,6 @@
 
 void CFSKeyStoreClient::AuthClose(TRequestStatus& aStatus)
 	{
-#ifdef SYMBIAN_AUTH_SERVER
-	if(iUseNewKeyServer)
-		{
-		TRequestStatus* stat = &aStatus;
-		User::RequestComplete(stat, KErrNotSupported);
-		return;
-		}
-#endif //SYMBIAN_AUTH_SERVER
 	TInt err = iClient.SendRequest(EAuthClose, TIpcArgs());
 	TRequestStatus* status = &aStatus;
 	User::RequestComplete(status, err);
@@ -1232,14 +1125,6 @@
 
 void CFSKeyStoreClient::TimeRemaining(TInt& aTime, TRequestStatus& aStatus)
 	{
-#ifdef SYMBIAN_AUTH_SERVER
-	if(iUseNewKeyServer)
-		{
-		TRequestStatus* stat = &aStatus;
-		User::RequestComplete(stat, KErrNotSupported);
-		return;
-		}
-#endif //SYMBIAN_AUTH_SERVER
 	TInt result = iClient.SendRequest(EAuthTimeRemaining, TIpcArgs());
 	if (result >= 0)
 		{
@@ -1252,14 +1137,6 @@
 
 void CFSKeyStoreClient::SetTimeout(TInt aTime, TRequestStatus& aStatus)
 	{
-#ifdef SYMBIAN_AUTH_SERVER
-	if(iUseNewKeyServer)
-		{
-		TRequestStatus* stat = &aStatus;
-		User::RequestComplete(stat, KErrNotSupported);
-		return;
-		}
-#endif //SYMBIAN_AUTH_SERVER
 	TInt err = iClient.SendRequest(ESetTimeout, TIpcArgs(0, aTime));	
 	TRequestStatus* status = &aStatus;
 	User::RequestComplete(status, err);
@@ -1267,14 +1144,6 @@
 
 void CFSKeyStoreClient::Timeout(TInt& aTime, TRequestStatus& aStatus)
 	{
-#ifdef SYMBIAN_AUTH_SERVER
-	if(iUseNewKeyServer)
-		{
-		TRequestStatus* stat = &aStatus;
-		User::RequestComplete(stat, KErrNotSupported);
-		return;
-		}
-#endif //SYMBIAN_AUTH_SERVER
 	TInt result = iClient.SendRequest(EGetTimeout, TIpcArgs());	
 	if (result >= 0)
 		{
@@ -1285,118 +1154,4 @@
 	User::RequestComplete(status, result);
 	}
 
-#ifdef SYMBIAN_AUTH_SERVER
 
-void CFSKeyStoreClient::CreateKey(	const TDesC& aAuthenticationString, 
-									TInt aFreshness,
-									CCTKeyInfo*& aReturnedKey,
-									TRequestStatus& aStatus )
-	{
-	LOG(_L("CFSKeyStoreClient::CreateKey: create key (starting)"));
-#ifdef SYMBIAN_AUTH_SERVER
-	if(iUseNewKeyServer == EFalse)
-		{
-		TRequestStatus* stat = &aStatus;
-		User::RequestComplete(stat, KErrNotSupported);
-		return;
-		}
-#endif //SYMBIAN_AUTH_SERVER
-	//	[in, out] CCTKeyInfo, caller fills with data required to create the key, 
-	//	If request succeeds, iId and iHandle members are filled in by server
-
-	TInt r = MarshalKeyInfo(*aReturnedKey);
-	if (KErrNone!=r)
-		{
-		TRequestStatus* stat = &aStatus;
-		User::RequestComplete(stat, r);
-		return;
-		}
-
-	//	Store CCTKeyInfo to write into later (server will put extra data into it)
-	iClientPtr.iKeyInfo = &aReturnedKey;
-	SetActive();
-	iCurrentRequest(ECreateUserKey, &aStatus);
-	
-	iClient.SendAsyncRequest(ECreateUserKey, TIpcArgs(0, &iRequestPtr, &aAuthenticationString, aFreshness), &iStatus);
-	
-	}
-
-void CFSKeyStoreClient::ImportKey( const TDesC8& aKey, 
-							const TDesC& aAuthenticationString, 
-							TInt aFreshness, CCTKeyInfo*& aReturnedKey, 
-							TRequestStatus& aStatus )
-	{
-#ifdef SYMBIAN_AUTH_SERVER
-	if(iUseNewKeyServer == EFalse)
-		{
-		TRequestStatus* stat = &aStatus;
-		User::RequestComplete(stat, KErrNotSupported);
-		return;
-		}
-#endif //SYMBIAN_AUTH_SERVER
-	DoImportUserKey(EImportUserKey, aKey, aReturnedKey, aAuthenticationString, aFreshness, aStatus);
-	}
-			
-
-void CFSKeyStoreClient::ImportEncryptedKey(const TDesC8& aKey, 
-									const TDesC& aAuthenticationString, 
-									TInt aFreshness, CCTKeyInfo*& aReturnedKey, 
-									TRequestStatus& aStatus )
-	{
-#ifdef SYMBIAN_AUTH_SERVER
-	if(iUseNewKeyServer == EFalse)
-		{
-		TRequestStatus* stat = &aStatus;
-		User::RequestComplete(stat, KErrNotSupported);
-		return;
-		}
-#endif //SYMBIAN_AUTH_SERVER
-	DoImportUserKey(EImportEncryptedUserKey, aKey, aReturnedKey, aAuthenticationString, aFreshness, aStatus);
-	
-	}
-
-void CFSKeyStoreClient::SetAuthenticationPolicy(	
-		const TCTTokenObjectHandle aHandle,
-		const TDesC& aAuthenticationString,
-		TInt aFreshness,
-		TRequestStatus& aStatus)
-		{
-#ifdef SYMBIAN_AUTH_SERVER
-		if(iUseNewKeyServer == EFalse)
-			{
-			TRequestStatus* stat = &aStatus;
-			User::RequestComplete(stat, KErrNotSupported);
-			return;
-			}
-		iCurrentRequest(ESetAuthenticationPolicy, &aStatus);
-		SetActive();
-		iClient.SendAsyncRequest(ESetAuthenticationPolicy, TIpcArgs(aHandle.iObjectId, &aAuthenticationString, aFreshness), &iStatus);
-			
-#endif //SYMBIAN_AUTH_SERVER
-		}
-
-void CFSKeyStoreClient::GetAuthenticationPolicy( const TCTTokenObjectHandle aHandle,
-												HBufC*& aAuthenticationString,
-												TInt& aFreshness,
-												TRequestStatus& aStatus)
-	{
-#ifdef SYMBIAN_AUTH_SERVER
-	if(iUseNewKeyServer == EFalse)
-		{
-		TRequestStatus* stat = &aStatus;
-		User::RequestComplete(stat, KErrNotSupported);
-		return;
-		}
-	iAuthExpression = aAuthenticationString;
-	iFreshness = aFreshness;
-	TPckg<TInt> freshness(aFreshness);
-	TPtr authPtr = iAuthExpression->Des();
-	TInt err = iClient.SendRequest(EGetAuthenticationPolicy, TIpcArgs(aHandle.iObjectId, &authPtr, &freshness));
-	TRequestStatus* status = &aStatus;
-	User::RequestComplete(status, err);
-	
-#endif //SYMBIAN_AUTH_SERVER
-	
-	
-	}
-#endif // SYMBIAN_AUTH_SERVER
--- a/cryptoservices/filebasedcertificateandkeystores/source/keystore/Client/cfskeystoreclient.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/source/keystore/Client/cfskeystoreclient.h	Wed Apr 14 17:48:59 2010 +0300
@@ -113,36 +113,6 @@
 	virtual void CancelSetPassphraseTimeout();	
 	virtual void Relock(TRequestStatus& aStatus);
 	virtual void CancelRelock();
-
-#ifdef SYMBIAN_AUTH_SERVER
-
-	virtual void CreateKey(	const TDesC& aAuthenticationString, 
-							TInt aFreshness,
-							CCTKeyInfo*& aReturnedKey,
-							TRequestStatus& aStatus );
-
-	virtual void ImportKey( const TDesC8& aKey, 
-							const TDesC& aAuthenticationString, 
-							TInt aFreshness, CCTKeyInfo*& aReturnedKey, 
-							TRequestStatus& aStatus );
-			
-
-	virtual void ImportEncryptedKey(const TDesC8& aKey, 
-									const TDesC& aAuthenticationString, 
-									TInt aFreshness, CCTKeyInfo*& aReturnedKey, 
-									TRequestStatus& aStatus );
-	
-	virtual void SetAuthenticationPolicy(	const TCTTokenObjectHandle aHandle,
-											const TDesC& aAuthenticationString,
-											TInt aFreshness,
-											TRequestStatus& aStatus);
-
-	virtual void GetAuthenticationPolicy(	const TCTTokenObjectHandle aHandle,
-											HBufC*& aAuthenticationString,
-											TInt& aFreshness,
-											TRequestStatus& aStatus);
-
-#endif // SYMBIAN_AUTH_SERVER
 	
 	void ReleaseObject(const TCTTokenObjectHandle& aObject);
 public:	
@@ -239,12 +209,6 @@
 	CKeyStoreAuthObject* iAuthObject;   ///< The single auth object that serves as protector for all keys
 	CDHParams* iDHParams;				///< DH params for DH public key
 	HBufC8* iPbeParamsBuf;				///< Buffer holding PBE parameters for encrypted key export
-
-#ifdef SYMBIAN_AUTH_SERVER
-	TBool iUseNewKeyServer;
-	HBufC* iAuthExpression;
-	TInt iFreshness;
-#endif // SYMBIAN_AUTH_SERVER
 	
 };
 
Binary file cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/200218e6.txt has changed
--- a/cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/CKeyDataManager.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/CKeyDataManager.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -24,12 +24,7 @@
 
 _LIT(KKeyStoreFilename,"keys.dat");
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-#include <e32property.h>
-#include <authserver/aspubsubdefs.h>
-#else
 const TInt KDefaultPassphraseTimeout = 30;
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 
 //	*********************************************************************
 //	Key store data manager - maintains array of objects representing keys
@@ -57,18 +52,13 @@
 		
 	iKeys.ResetAndDestroy();
 	iKeys.Close();
-	#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	iIdentityId.Close();
-	#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	}
 
 CFileKeyDataManager::CFileKeyDataManager() :
 	iRootStreamId(KNullStreamId),
 	iInfoStreamId(KNullStreamId)
-#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	,iPassStreamId(KNullStreamId),
 	iTimeoutStreamId(KNullStreamId)
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	{
 	}
 
@@ -81,13 +71,8 @@
 	RStoreReadStream lookupStream;
 	lookupStream.OpenLC(*iFileStore, iInfoStreamId);
 
-	#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	User::LeaveIfError(iIdentityId.Attach(	AuthServer::KAuthServerSecureId,
-											AuthServer::KUidAuthServerAuthChangeEvent));
-	#else
 	iPassStreamId = (TStreamId) lookupStream.ReadUint32L();
 	iTimeoutStreamId = (TStreamId) lookupStream.ReadUint32L();
-	#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 
 	TInt count = lookupStream.ReadInt32L();
 	for (TInt index = 0; index < count; index++)
@@ -101,11 +86,7 @@
 		}
 	
 	CleanupStack::PopAndDestroy(&lookupStream);
-
-#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	ReadPassphraseTimeoutL();
-#endif //SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	
 	}
 
 CPassphraseManager* CFileKeyDataManager::CreatePassphraseManagerLC()
@@ -184,23 +165,19 @@
 	TCleanupItem cleanupStore(RevertStore, iFileStore);
 	CleanupStack::PushL(cleanupStore);
 	
-#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	// Create timeout stream with default timeout
 	RStoreWriteStream timeoutStream;
 	iTimeoutStreamId = timeoutStream.CreateLC(*iFileStore);
 	timeoutStream.WriteUint32L(KDefaultPassphraseTimeout);
 	timeoutStream.CommitL();
 	CleanupStack::PopAndDestroy(&timeoutStream);
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	
 	// Create info stream - Currently no passphrase created, and no keys
 	RStoreWriteStream infoStream;
 	iInfoStreamId = infoStream.CreateLC(*iFileStore);
 	
-#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	infoStream.WriteUint32L(KNullStreamId.Value());
 	infoStream.WriteUint32L(iTimeoutStreamId.Value());
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	
 	infoStream.WriteUint32L(0); // Write key count of zero
 	infoStream.CommitL();
@@ -262,10 +239,9 @@
 	RStoreWriteStream lookupStream;
 	lookupStream.ReplaceLC(*iFileStore, iInfoStreamId);
 
-	#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-		lookupStream.WriteUint32L(iPassStreamId.Value());
-		lookupStream.WriteUint32L(iTimeoutStreamId.Value());
-	#endif //SYMBIAN_KEYSTORE_USE_AUTH_SERVER
+	lookupStream.WriteUint32L(iPassStreamId.Value());
+	lookupStream.WriteUint32L(iTimeoutStreamId.Value());
+
 	
 	TInt keyCount = iKeys.Count();
 	lookupStream.WriteInt32L(keyCount);
@@ -287,15 +263,11 @@
 void CFileKeyDataManager::AddL(const CFileKeyData* aKeyData)
 	{
 	ASSERT(aKeyData);
-#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-		ASSERT(aKeyData->PassphraseStreamId() != KNullStreamId);
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
+	ASSERT(aKeyData->PassphraseStreamId() != KNullStreamId);
 
 	// Add the key to to the array, rewrite the infostream and 
 	// ONLY THEN commit the store
 	User::LeaveIfError(iKeys.Append(aKeyData));
-
-#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	TStreamId oldDefaultPassphraseId;
 
 	// Set the default passphrase id if this is the first key
@@ -304,16 +276,13 @@
 		{
 		iPassStreamId = aKeyData->PassphraseStreamId();
 		}
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	
 	TRAPD(err,UpdateStoreL());
 	
 	if (err != KErrNone)
 		{
 		iKeys.Remove(iKeys.Count() - 1);
-		#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-			iPassStreamId = oldDefaultPassphraseId;
-		#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
+		iPassStreamId = oldDefaultPassphraseId;
 		User::Leave(err);
 		}
 	}
@@ -361,7 +330,6 @@
 	iFileStore->DeleteL(key->PublicDataStreamId());
 	iFileStore->DeleteL(key->InfoDataStreamId());
 
-#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	// Remove the passphrase if it's the last key
 	TStreamId oldPassphraseId = iPassStreamId;
 	if (Count() == 1)
@@ -369,7 +337,6 @@
 		iFileStore->DeleteL(iPassStreamId);
 		iPassStreamId = KNullStreamId;
 		}
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	
 	// Remove the key
 	iKeys.Remove(index);
@@ -378,9 +345,8 @@
 
 	if (res != KErrNone)
 		{
-#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER		
 		iPassStreamId = oldPassphraseId;
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
+
 		User::LeaveIfError(iKeys.Append(key)); // Put it back, shouldn't leave
 		User::Leave(res);
 		}
@@ -394,24 +360,6 @@
 	CompactStore();
 }
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-TBool CFileKeyDataManager::IsKeyAlreadyInStore(const TDesC& aKeyLabel, AuthServer::TIdentityId aIdentity) const
-	{//	Check each key in the store to determine if aKeyLabel already exists
-	TInt keyCount = iKeys.Count();
-	TBool isInStore = EFalse;
-	for (TInt index = 0; index < keyCount; ++index)
-		{
-		const TDesC& keyLabel = iKeys[index]->Label();
-		if (keyLabel.Compare(aKeyLabel)==0 && (iKeys[index]->Identity() == aIdentity))
-			{
-			isInStore = ETrue;
-			break;
-			}
-		}
-	return (isInStore);
-	}
-
-#else
 TBool CFileKeyDataManager::IsKeyAlreadyInStore(const TDesC& aKeyLabel) const
 {//	Check each key in the store to determine if aKeyLabel already exists
 	TInt keyCount = iKeys.Count();
@@ -429,7 +377,6 @@
 	return (isInStore);
 }
 
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 
 TInt CFileKeyDataManager::Count() const
 	{
@@ -458,18 +405,6 @@
 //	Management of file and store therein
 //	*********************************************************************
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
-const CFileKeyData* CFileKeyDataManager::CreateKeyDataLC(const TDesC& aLabel, AuthServer::TIdentityId aIdentityId)
-	{
-	TInt objectId = ++iKeyIdentifier;
-	TStreamId infoData = CreateWriteStreamL();
-	TStreamId publicKeyData = CreateWriteStreamL();
-	TStreamId privateKeyData = CreateWriteStreamL();
-	return CFileKeyData::NewLC(objectId, aLabel, infoData, publicKeyData, privateKeyData, aIdentityId);
-	}
-
-#else
 const CFileKeyData* CFileKeyDataManager::CreateKeyDataLC(const TDesC& aLabel, TStreamId aPassStreamId)
 	{
 	ASSERT(aPassStreamId != KNullStreamId);
@@ -480,7 +415,6 @@
 	return CFileKeyData::NewLC(objectId, aLabel, infoData, aPassStreamId, publicKeyData, privateKeyData);
 	}
 
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 
 //	Creates a new write stream in the store (which it then closes)
 //	Returns the TStreamId associated with it
@@ -508,9 +442,6 @@
 	stream.OpenLC(*iFileStore, aKeyData.InfoDataStreamId());
 	CKeyInfo* info = CKeyInfo::NewL(stream);
 	
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	ReadAuthDetailsL(stream, *info);
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	CleanupStack::PopAndDestroy(&stream);
 	info->CleanupPushL();
 	if (info->Handle() != aKeyData.Handle())
@@ -525,31 +456,10 @@
 	RStoreWriteStream infoStream;
 	OpenInfoDataStreamLC(aKeyData, infoStream);
 	infoStream << aKeyInfo;
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	WriteAuthDetailsL(infoStream, aKeyInfo);
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	infoStream.CommitL();
 	CleanupStack::PopAndDestroy(&infoStream);
 	}
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-void CFileKeyDataManager::WriteAuthDetailsL( RStoreWriteStream& aInfoStream, const CKeyInfo& aKeyInfo )
-	{
-	aInfoStream.WriteInt32L(aKeyInfo.Identity());
-	aInfoStream << aKeyInfo.AuthExpression();
-  	aInfoStream.WriteInt32L(aKeyInfo.Freshness());
-	}
-
-void CFileKeyDataManager::ReadAuthDetailsL( RStoreReadStream& aInfoStream, CKeyInfo& aKeyInfo ) const
-	{
-	aKeyInfo.SetIdentity(aInfoStream.ReadInt32L());
-	HBufC* expression = HBufC::NewLC(aInfoStream, KMaxTInt);
-	aKeyInfo.SetAuthExpressionL(*expression);
-	aKeyInfo.SetFreshness(aInfoStream.ReadInt32L());
-	CleanupStack::PopAndDestroy(expression);
-	}
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
 void CFileKeyDataManager::SafeWriteKeyInfoL(const CFileKeyData& aKeyData, const CKeyInfo& aKeyInfo)
 	{
 	TCleanupItem cleanupStore(RevertStore, iFileStore);
@@ -579,22 +489,6 @@
 	aStream.OpenLC(*iFileStore, aKeyData.PublicDataStreamId());
 	}
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
-void CFileKeyDataManager::OpenPrivateDataStreamLC(const CFileKeyData& aKeyData, RStoreWriteStream& aStream) 
-	{
-	__ASSERT_DEBUG(iFileStore, PanicServer(EPanicStoreInitialised));
-	aStream.ReplaceLC(*iFileStore, aKeyData.PrivateDataStreamId());
-	}
-
-void CFileKeyDataManager::OpenPrivateDataStreamLC(const CFileKeyData& aKeyData, RStoreReadStream& aStream) const
-	{
-	__ASSERT_DEBUG(iFileStore, PanicServer(EPanicStoreInitialised));
-	aStream.OpenLC(*iFileStore, aKeyData.PrivateDataStreamId());
-	}
-
-#else
-
 void CFileKeyDataManager::OpenPrivateDataStreamLC(const CFileKeyData& aKeyData, CPassphrase& aPassphrase,
 												  RStoreReadStream& aStream) 
 	{
@@ -610,9 +504,6 @@
 	}
 
 
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
-#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 TInt CFileKeyDataManager::GetPassphraseTimeout() const
 	{
 	return iTimeout;
@@ -658,7 +549,6 @@
 	return iPassStreamId;
 	}
 
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 
 /**
  * Attempt to compact the store - it doesn't matter if these calls leave, it
@@ -670,28 +560,8 @@
 	TRAP_IGNORE(iFileStore->ReclaimL(); iFileStore->CompactL());
 	}
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-TUint32 CFileKeyDataManager::CachedIdentity()
-	{
-	TInt value = 0;
-	iIdentityId.Get(value);
-	return value;
-	}
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
 // CFileKeyData ////////////////////////////////////////////////////////////////
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-CFileKeyData* CFileKeyData::NewLC(	TInt aObjectId, const TDesC& aLabel, TStreamId aInfoData,
-								  TStreamId aPublicData, TStreamId aPrivateData,
-								  AuthServer::TIdentityId aIdentityId)
-	{
-	CFileKeyData* self = new (ELeave) CFileKeyData(aObjectId, aInfoData, aPublicData, aPrivateData, aIdentityId);
-	CleanupStack::PushL(self);
-	self->ConstructL(aLabel);
-	return self;
-	}
-#else
 CFileKeyData* CFileKeyData::NewLC(TInt aObjectId, const TDesC& aLabel, TStreamId aInfoData,
 								  TStreamId aPassphraseId, TStreamId aPublicData, TStreamId aPrivateData)
 	{
@@ -701,7 +571,6 @@
 	return self;
 	}
 
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 
 CFileKeyData* CFileKeyData::NewL(RStoreReadStream& aReadStream)
 	{
@@ -717,21 +586,6 @@
 	delete iLabel;
 	}
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-CFileKeyData::CFileKeyData(TInt aObjectId, TStreamId aInfoData,  
-						   TStreamId aPublicData, TStreamId aPrivateData,
-						   AuthServer::TIdentityId aIdentityId) :
-	iObjectId(aObjectId), iInfoData(aInfoData), 
-	iPublicKeyData(aPublicData), iPrivateKeyData(aPrivateData),
-	iIdentityId(aIdentityId)
-	{
-	ASSERT(iObjectId);
-	ASSERT(iInfoData != KNullStreamId);
-	ASSERT(iPublicKeyData != KNullStreamId);
-	ASSERT(iPrivateKeyData != KNullStreamId);
-	ASSERT(iIdentityId);
-	}
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 #ifdef KEYTOOL
 CFileKeyData::CFileKeyData(TInt aObjectId, TStreamId aInfoData,  
 						   TStreamId aPublicData, TStreamId aPrivateData,
@@ -777,9 +631,7 @@
 {
 	iObjectId = aReadStream.ReadInt32L();
 	iInfoData.InternalizeL(aReadStream);
-#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	iPassphraseId.InternalizeL(aReadStream);
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	iPublicKeyData.InternalizeL(aReadStream);
 	iPrivateKeyData.InternalizeL(aReadStream);
 	
@@ -788,18 +640,13 @@
 	TPtr theLabel((TUint16*)iLabel->Ptr(), labelLen, labelLen);
 	theLabel.FillZ(labelLen);
 	aReadStream.ReadL(theLabel);
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	iIdentityId = aReadStream.ReadInt32L();
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 }
 
 void CFileKeyData::ExternalizeL(RWriteStream& aWriteStream) const
 {
 	aWriteStream.WriteInt32L(iObjectId);
 	iInfoData.ExternalizeL(aWriteStream);
-#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	iPassphraseId.ExternalizeL(aWriteStream);
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	iPublicKeyData.ExternalizeL(aWriteStream);
 	iPrivateKeyData.ExternalizeL(aWriteStream);
 
@@ -808,10 +655,6 @@
 	TPtr theLabel(iLabel->Des());
 	theLabel.SetLength(labelLen);
 	aWriteStream.WriteL(theLabel);
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	aWriteStream.WriteInt32L(iIdentityId);
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
 }
 
 #ifdef KEYTOOL
--- a/cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/CKeyDataManager.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/CKeyDataManager.h	Wed Apr 14 17:48:59 2010 +0300
@@ -33,11 +33,6 @@
 class CPassphraseManager;
 class CPassphrase;
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-#include <authserver/authtypes.h>
-#include <e32property.h>
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
 #ifdef KEYTOOL
 #include <authserver/authtypes.h>
 #include <e32property.h>
@@ -57,12 +52,6 @@
     /// Read a key data object from a stream
 	static CFileKeyData* NewL(RStoreReadStream& aReadStream);
 	
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	static CFileKeyData* NewLC(	TInt aObjectId, const TDesC& aLabel, 
-								TStreamId aInfoData, TStreamId aPublicData, 
-								TStreamId aPrivateData, AuthServer::TIdentityId aIdentityId);
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	
 #ifdef KEYTOOL
 	static CFileKeyData* CreateOldKeyL(RStoreReadStream& aReadStream);
 #endif // KEYTOOL
@@ -81,9 +70,6 @@
 	inline TStreamId PassphraseStreamId() const;
 	inline TStreamId PublicDataStreamId() const;
 	inline TStreamId PrivateDataStreamId() const;
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	inline AuthServer::TIdentityId Identity() const;
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 #ifdef KEYTOOL
 	inline void SetInfoDataStreamId( TStreamId& aInfoDataStreamId );
 	inline void SetPublicDataStreamId( TStreamId& aPublicDataStreamId );
@@ -94,12 +80,6 @@
 	CFileKeyData(TInt aObjectId, TStreamId aInfoData, TStreamId aPassphraseId,
 				 TStreamId aPublicData, TStreamId aPrivateData);
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	CFileKeyData(	TInt aObjectId, TStreamId aInfoData,  
-					TStreamId aPublicData, TStreamId aPrivateData, 
-					AuthServer::TIdentityId aIdentityId);
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
 #ifdef KEYTOOL
 	CFileKeyData(	TInt aObjectId, TStreamId aInfoData,  
 					TStreamId aPublicData, TStreamId aPrivateData, 
@@ -120,9 +100,6 @@
 	TStreamId iPublicKeyData;	///< ID of stream holding public key data
 	TStreamId iPrivateKeyData;	///< ID of stream holding private key data
 	HBufC* iLabel;				///< Key label data
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	AuthServer::TIdentityId iIdentityId;
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 #ifdef KEYTOOL
 	AuthServer::TIdentityId iIdentityId;
 #endif // KEYTOOL
@@ -158,12 +135,6 @@
 	return iPrivateKeyData;
 	}
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-inline AuthServer::TIdentityId CFileKeyData::Identity() const
-	{
-	return iIdentityId;
-	}
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 
 #ifdef KEYTOOL
 	inline void CFileKeyData::SetInfoDataStreamId( TStreamId& aInfoDataStreamId )
@@ -196,22 +167,13 @@
 	CPassphraseManager* CreatePassphraseManagerLC();
 	void AddL(const CFileKeyData*);
 	void RemoveL(TInt aObjectId);
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	TBool IsKeyAlreadyInStore(const TDesC& aKeyLabel, AuthServer::TIdentityId aIdentity) const;
-#else
 	TBool IsKeyAlreadyInStore(const TDesC& aKeyLabel) const;
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 public:
 	/// Get the id of the default passphrase, or KNullStreamId if it doesn't exist yet.
 	TStreamId DefaultPassphraseId() const;
 	/// Create a new key data object for a key create/import and leave it one the cleanup stack
 	const CFileKeyData* CreateKeyDataLC(const TDesC& aLabel, TStreamId aPassphrase);
 	
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	const CFileKeyData* CreateKeyDataLC(const TDesC& aLabel, AuthServer::TIdentityId aIdentity);
-	TUint32 CachedIdentity();
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	
 	///	Reads the info data for a given key, returning a new CKeyInfo that's on the cleanup stack
 	CKeyInfo* ReadKeyInfoLC(const CFileKeyData& aKeyData) const;
 	
@@ -224,13 +186,8 @@
 	void OpenPublicDataStreamLC(const CFileKeyData& aKeyData, RStoreReadStream& aStream) const;
 	void OpenPrivateDataStreamLC(const CFileKeyData& aKeyData, CPassphrase& aPassphrase, RStoreReadStream& aStream);	
 	
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	void OpenPrivateDataStreamLC(const CFileKeyData& aKeyData, RStoreWriteStream& aStream);
-	void OpenPrivateDataStreamLC(const CFileKeyData& aKeyData, RStoreReadStream& aStream) const;
-#else
 	void OpenPrivateDataStreamLC(const CFileKeyData& aKeyData, CPassphrase& aPassphrase, RStoreWriteStream& aStream);
 
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	
 	/*
 	 * not currently implemented, but might be someday
@@ -268,12 +225,7 @@
 	void ReadPassphraseTimeoutL();
 	void WritePassphraseTimeoutL();
 	void CompactStore();
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	const HBufC8* DecryptKey(const TDesC8& aEncryptedKey);
-	void WriteAuthDetailsL( RStoreWriteStream& aInfoStream, const CKeyInfo& aKeyInfo );
-	void ReadAuthDetailsL( RStoreReadStream& aInfoStream, CKeyInfo& aKeyInfo ) const;
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	
+
 private:
 	RFile iFile;
 	RFs iFs;
@@ -281,12 +233,8 @@
 	TStreamId iRootStreamId;	 		///< Root of the store
 	TStreamId iInfoStreamId;	 		///< Stream that contains list of key data
 	
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	RProperty iIdentityId;
-#else
 	TStreamId iPassStreamId;	 		///< Stream for the default passphrase
 	TStreamId iTimeoutStreamId;  		///< Stream for timeout data
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	
 private:
 	TInt iKeyIdentifier;
--- a/cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/CKeyStoreConduit.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/CKeyStoreConduit.h	Wed Apr 14 17:48:59 2010 +0300
@@ -41,10 +41,6 @@
 class CPBEncryptParms;
 class CDHPublicKey;
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-#include <authserver/identity.h>
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
 
 /**
  * The key store server object (CFSKeyStoreServer) owns one instance of this
@@ -94,18 +90,6 @@
 	void OpenKeyL(const RMessage2& aMessage, CKeyStoreSession& aSession, TUid aType);
 	void CloseObjectL(const RMessage2& aMessage, CKeyStoreSession& aSession);
 	
-#ifdef SYMBIAN_AUTH_SERVER
-	void IsKeyServerNewL(const RMessage2& aMessage);
-#endif // SYMBIAN_AUTH_SERVER
-	
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	
-	void CreateUserKeyL(const RMessage2& aMessage);
-	void ImportUserKeyL(const RMessage2& aMessage);
-	void SetAuthenticationPolicyL(const RMessage2& aMessage);
-	void GetAuthenticationPolicyL(const RMessage2& aMessage);
-	
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	
  private:
 	// For MCTAuthenticationObject
--- a/cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/Cfskeystoreserver.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/Cfskeystoreserver.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -40,24 +40,6 @@
 #include <e32math.h>
 #include "x509keyencoder.h"
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-#include <s32mem.h>
-#include <e32std.h>
-#include <authserver/authclient.h>
-#include <authserver/authexpression.h>
-#include <authserver/auth_srv_errs.h>
-#include <authserver/aspubsubdefs.h>
-#include <authserver/authtypes.h>
-
-#include <asymmetrickeys.h>
-#include "keystorecenrepconfig.h"
-#include "keystore_errs.h"
-#include "cfskeystoreserver.inl"
-
-// Length set to retrieve the authentication expression
-// from the central repository.
-const TInt KAuthStringLength = 255;
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 
 // We don't currently allow any keys larger than 2048 bits.  It may be necessary to
 // increase this limit in the future. 
@@ -65,9 +47,7 @@
 const TUint KTheMaxKeySize = 2048;
 
 // Security policies
-#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 _LIT_SECURITY_POLICY_C1(KSetTimeoutSecurityPolicy, ECapabilityWriteDeviceData);
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 _LIT_SECURITY_POLICY_C1(KWriteUserDataPolicy, ECapabilityWriteUserData);
 _LIT_SECURITY_POLICY_C1(KReadUserDataPolicy, ECapabilityReadUserData);
 
@@ -92,10 +72,6 @@
 
 	iConduit = CKeyStoreConduit::NewL(*this);
 	
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	User::LeaveIfError(iAuthClient.Connect());		
-	iKeyStoreCenrep = CKeyStoreCenrep::NewL();	
-#endif	// SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	
 	iKeyDataManager = CFileKeyDataManager::NewL();
 	
@@ -110,14 +86,6 @@
 	delete iConduit;
 	delete iKeyCreator;
 	iSessions.Close();
-
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	iAuthClient.Close();	
-	delete iUserIdentity;
-	delete iKeyStoreCenrep;
-	delete iAuthString;	
-#endif //SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
 	}
 
 CKeyStoreSession* CFSKeyStoreServer::CreateSessionL()
@@ -170,22 +138,6 @@
 		User::Leave(KErrPermissionDenied);
 		}
 		
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	iIdentityId = iKeyDataManager->CachedIdentity(); 
-	if(iIdentityId == AuthServer::KUnknownIdentity)
-		{
-		HBufC* authExpression = HBufC::NewLC(KAuthStringLength);
-		TPtr ptr = authExpression->Des();
-		iKeyStoreCenrep->AuthExpressionL(ptr);
-		TInt freshness = iKeyStoreCenrep->FreshnessL();
-		CheckRangeL(freshness);
-		
-		AuthServer::CIdentity* identity = SyncAuthenticateLC(*authExpression,freshness);
-		iIdentityId = identity->Id();
-		CleanupStack::PopAndDestroy(2, authExpression); // identity
-		}
-#endif //SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	
 	TInt count = iKeyDataManager->Count();
 
 	for (TInt i = 0; i < count; ++i)
@@ -194,20 +146,10 @@
 		CKeyInfo* info = iKeyDataManager->ReadKeyInfoLC(*data);
 		if (KeyMatchesFilterL(*info, aFilter))
 			{
-			#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-			if(info->Identity() == iIdentityId)
-				{
-				// this is required as the client side object does
-				// not contain authentication details.
-				info->ResetAuthExpression();
-			#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 				
 				User::LeaveIfError(aKeys.Append(info));
 				CleanupStack::Pop(info);
 				
-			#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-				}
-			#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 			}
 		else	
 			{
@@ -288,45 +230,11 @@
 		User::Leave(KErrPermissionDenied);
 		}
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	iIdentityId = iKeyDataManager->CachedIdentity(); 
-	if(iIdentityId == AuthServer::KUnknownIdentity)
-		{
-		AuthServer::CIdentity* userIdentity = SyncAuthenticateLC(keyInfo->AuthExpression(), keyInfo->Freshness());
-		iIdentityId = userIdentity->Id();
-		CleanupStack::PopAndDestroy(userIdentity);
-		}
-	if(iIdentityId != keyInfo->Identity())
-		{
-		User::Leave(KErrNotFound);
-		}
-#endif //SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	
 	aInfo = keyInfo;
 	CleanupStack::Pop(keyInfo);
 	}
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
-AuthServer::CIdentity* CFSKeyStoreServer::SyncAuthenticateLC(const TDesC& aAuthExpression, TInt aFreshness)
-	{
-	AuthServer::CAuthExpression* expression = iAuthClient.CreateAuthExpressionL(aAuthExpression);
-	CleanupStack::PushL(expression);
-	TUid uid = TUid::Uid(0);
-	AuthServer::CIdentity* userIdentity = iAuthClient.AuthenticateL(*expression,aFreshness, EFalse, uid, EFalse, KNullDesC);
-	CleanupStack::PushL(userIdentity);
-	if(userIdentity->Id() == AuthServer::KUnknownIdentity)
-		{
-		User::Leave(KErrAuthenticationFailure);
-		}
-	CleanupStack::Pop(userIdentity);
-	CleanupStack::PopAndDestroy(expression);
-	CleanupStack::PushL(userIdentity);
-	return userIdentity;
-	}
-
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
 TInt CFSKeyStoreServer::GetKeyLengthL(TInt aObjectId)
 	{
 	const CFileKeyData* keyData = iKeyDataManager->Lookup(aObjectId);
@@ -368,15 +276,6 @@
 
 	CKeyInfo* keyInfo = iKeyDataManager->ReadKeyInfoLC(*keyData);
 
-	#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	AuthServer::CIdentity* identity = SyncAuthenticateLC(keyInfo->AuthExpression(), keyInfo->Freshness());
-	if(identity->Id() != keyInfo->Identity())
-		{
-		User::Leave(KErrNotFound);
-		}
-	CleanupStack::PopAndDestroy(identity);
-	#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
 	RStoreReadStream stream;
 	iKeyDataManager->OpenPublicDataStreamLC(*keyData, stream);
 
@@ -517,18 +416,10 @@
 	return KErrNone;
 	}
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-/**
- * This method uses the default authentication policy to 
- * authenticated a user and encrypt the key using the protection
- * key and store it against the authenticated user .
- */
-#else
 /**
  * This method stores the keys in the keystore and encrypts the 
  * entire keystore with a passphrase.
  */
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 
 void CFSKeyStoreServer::CreateKey(CKeyInfo& aReturnedKey, TRequestStatus& aStatus)
 	{
@@ -537,15 +428,7 @@
 	aStatus = KRequestPending;
 	iCallerRequest = &aStatus;
 		
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	// the next state would ask for the user to be authenticated.
-	// we do not use the cached identity directly through the
-	// published value as the protection key of the user would 
-	// be required to store the key in encrypted form. 
-	iAction = ESetAuthPolicy;
-#else
 	iAction = EGetPassphrase;
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	
 	// Check the calling process has WriteUserData capability
 	if (!KWriteUserDataPolicy.CheckPolicy(*iMessage))
@@ -568,99 +451,6 @@
 		}
 	}
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
-void CFSKeyStoreServer::AsyncAuthenticateL(	const TDesC& aAuthString,
-											TInt aFreshness)
-	{
-	TUid uid = TUid::Uid(0);
-	AuthServer::CAuthExpression* expression = iAuthClient.CreateAuthExpressionL(aAuthString);
-	CleanupStack::PushL(expression);
-	iAuthClient.AuthenticateL(*expression,aFreshness, EFalse, uid, EFalse, KNullDesC, iUserIdentity, iStatus);
-	SetActive();
-	CleanupStack::PopAndDestroy(expression);
-	}
-
-/**
- * This method uses the authentication policy as supplied in the 
- * call to authenticate an user and encrypt the key using its 
- * protection key and store it against the authenticated user .
- */
-void CFSKeyStoreServer::CreateUserKey(	CKeyInfo& aReturnedKey,
-										const TDesC& aAuthString,
-										TInt aFreshness,
-										TRequestStatus& aStatus)
-	{
-	iAction = EAuthenticate;
-	iNextAction = ECreateUserKey;
-		
-	iKeyInfo = &aReturnedKey;
-	aStatus = KRequestPending;
-	iCallerRequest = &aStatus;
-		
-	// Check the calling process has WriteUserData capability
-	if (!KWriteUserDataPolicy.CheckPolicy(*iMessage))
-		{
-		CompleteClientRequest(KErrPermissionDenied);
-		return;
-		}
-		
-	TRAPD(err,iKeyInfo->SetAuthExpressionL(aAuthString));
-	if(err != KErrNone)
-		{
-		CompleteClientRequest(err);
-		return;
-		}
-	
-	iKeyInfo->SetFreshness(aFreshness);
-	
-	SetActive();
-	TRequestStatus* status = &iStatus;
-	User::RequestComplete(status, KErrNone);
-	}
-
-
-void CFSKeyStoreServer::ImportUserKey(	const TDesC8& aKey, 
-										CKeyInfo& aReturnedKey, 
-										TBool aIsEncrypted,
-										const TDesC& aAuthString,
-										TInt aFreshness,
-										TRequestStatus& aStatus)
-	{
-	ASSERT(iMessage);
- 
-	iPKCS8Data.Set(aKey);
-	iImportingEncryptedKey = aIsEncrypted;
-	iKeyInfo = &aReturnedKey;
-	aStatus = KRequestPending;
-	iCallerRequest = &aStatus;
-	
-	// Check the calling process has WriteUserData capability
-	if (!KWriteUserDataPolicy.CheckPolicy(*iMessage))
-		{
-		CompleteClientRequest(KErrPermissionDenied);
-		return;
-		}
-		
-	TRAPD(err,iKeyInfo->SetAuthExpressionL(aAuthString));
-	if(err != KErrNone)
-		{
-		CompleteClientRequest(err);
-		return;
-		}
-		
-	iKeyInfo->SetFreshness(aFreshness);
-	
-	iAction = EAuthenticate;
-	iNextAction = EImportUserKey;
-	
-	SetActive();
-	TRequestStatus* status = &iStatus;
-	User::RequestComplete(status, KErrNone);
-		
-	}
-
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 
 void CFSKeyStoreServer::CancelCreateKey()
 	{
@@ -669,22 +459,11 @@
 		{
 		Cancel();
 		}
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	if (iAction == ECreateUserKey || 
-		iAction == ECreateKeyFinal)
-		{
-		Cancel();
-		}
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	}
 
 void CFSKeyStoreServer::DoCreateKeyL()
 {
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	__ASSERT_DEBUG(iAction==ECreateUserKey, PanicServer(EPanicECreateKeyNotReady));
-#else
 	__ASSERT_DEBUG(iAction==ECreateKeyCreate, PanicServer(EPanicECreateKeyNotReady));
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	
 	__ASSERT_DEBUG(iKeyInfo, PanicServer(EPanicNoClientData));
 	
@@ -696,130 +475,6 @@
 	iKeyCreator->DoCreateKeyAsync(iKeyInfo->Algorithm(), iKeyInfo->Size(), iStatus);
 	}
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
-void CFSKeyStoreServer::SetAuthenticationPolicy(	
-							TInt aObjectId, 
-							HBufC* aAuthString,
-							TInt aFreshness, 
-							TRequestStatus& aStatus)
-	{
-	aStatus = KRequestPending;
-	iCallerRequest = &aStatus;
-	iObjectId = aObjectId;
-	iAuthString = aAuthString;
-	iFreshness = aFreshness;
-	
-	// Check the calling process has WriteUserData capability
-	if (!KWriteUserDataPolicy.CheckPolicy(*iMessage))
-		{
-		CompleteClientRequest(KErrPermissionDenied);
-		return;
-		}
-		
-	iAction = EDoSetAuthenticationPolicy;
-	SetActive();
-	TRequestStatus* status = &iStatus;
-	User::RequestComplete(status, KErrNone);
-			
-	}
-
-HBufC* CFSKeyStoreServer::AuthExpressionL( TInt aObjectId)
-	{
-	// Check the calling process has ReadUserData capability
-	if (!KReadUserDataPolicy.CheckPolicy(*iMessage))
-		{
-		User::Leave(KErrPermissionDenied);
-		}
-	
-	CKeyInfo* keyInfo = KeyDetailsLC(aObjectId);
-	HBufC* authExpression = keyInfo->AuthExpression().AllocL();
-	CleanupStack::PopAndDestroy(keyInfo);
-	
-	return authExpression;
-	}
-
-TInt CFSKeyStoreServer::FreshnessL(TInt aObjectId)
-	{
-	// Check the calling process has ReadUserData capability
-	if (!KReadUserDataPolicy.CheckPolicy(*iMessage))
-		{
-		User::Leave(KErrPermissionDenied);
-		}
-		
-	CKeyInfo* keyInfo = KeyDetailsLC(aObjectId);
-	TInt freshness = keyInfo->Freshness();
-	CleanupStack::PopAndDestroy(keyInfo);
-			
-	return freshness;
-	}
-
-CKeyInfo* CFSKeyStoreServer::KeyDetailsLC(TInt aObjectId)
-	{
-	const CFileKeyData* keyData = iKeyDataManager->Lookup(aObjectId);
-	if (!keyData)
-		{
-		User::Leave(KErrNotFound);
-		}
-	
-	CKeyInfo* keyInfo = iKeyDataManager->ReadKeyInfoLC(*keyData);
-	AuthServer::TIdentityId identityId = iKeyDataManager->CachedIdentity(); 
-		
-	if( identityId == AuthServer::KUnknownIdentity)
-		{
-		AuthServer::CIdentity* userIdentity = SyncAuthenticateLC(keyInfo->AuthExpression(), keyInfo->Freshness());
-		identityId = userIdentity->Id();
-		CleanupStack::PopAndDestroy(userIdentity);		
-		}
-	if(identityId == AuthServer::KUnknownIdentity)
-		{
-		User::Leave(KErrAuthenticationFailure);
-		}
-	if(identityId != keyInfo->Identity())
-		{
-		User::Leave(KErrNotFound);
-		}
-	
-	return keyInfo;
-	}
-
-/*
- * This method is used to set the default authentication policy for a key which is being
- * created using the old methods.
- */
-
-void CFSKeyStoreServer::SetDefaultAuthPolicyL()
-	{
-	ASSERT(iKeyInfo);
-	
-	HBufC* authExpression = HBufC::NewLC(KAuthStringLength);
-	TPtr ptr = authExpression->Des();
-	iKeyStoreCenrep->AuthExpressionL(ptr);
-	TInt freshness = iKeyStoreCenrep->FreshnessL();
-	CheckRangeL(freshness);
-	
-	iKeyInfo->SetAuthExpressionL(*authExpression);
-	iKeyInfo->SetFreshness(freshness);
-	CleanupStack::PopAndDestroy(authExpression);			
-	}
-
-void CFSKeyStoreServer::WriteAuthenticationPolicyL()
-	{
-	ASSERT(iKeyInfo);
-	
-	if(iIdentityId != iKeyInfo->Identity())
-		{
-		User::Leave(KErrNotFound);
-		}
-	
-	iKeyInfo->SetAuthExpressionL(*iAuthString);
-	delete iAuthString;
-	iAuthString = NULL;
-	iKeyInfo->SetFreshness(iFreshness);
-	iKeyDataManager->SafeWriteKeyInfoL(*iKeyData, *iKeyInfo);
-	}	
-
-#else
 /**
  * Get the default passphrase for the store, or create one if it hasn't been set
  * yet.  This is used for key creation, import and export.
@@ -843,8 +498,6 @@
 	SetActive();
 	}
 
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
 /**
  * Store a key.
  *
@@ -868,20 +521,12 @@
 	__ASSERT_DEBUG(iAction==ECreateKeyFinal, PanicServer(EPanicECreateKeyNotReady));
 	__ASSERT_DEBUG(iKeyInfo, PanicServer(EPanicNoClientData));
 	__ASSERT_DEBUG(iKeyCreator, PanicServer(ENoCreatedKeyData));
-#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	ASSERT(iPassphrase);
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	
 	const CFileKeyData* keyData = NULL;
 	RStoreWriteStream privateStream;
 	
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	keyData = iKeyDataManager->CreateKeyDataLC(iKeyInfo->Label(), iKeyInfo->Identity());
-	iKeyDataManager->OpenPrivateDataStreamLC(*keyData, privateStream);
-#else
 	keyData = iKeyDataManager->CreateKeyDataLC(iKeyInfo->Label(), iPassphrase->StreamId());
 	iKeyDataManager->OpenPrivateDataStreamLC(*keyData, *iPassphrase, privateStream);
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	
 	
 	CKeyInfo::EKeyAlgorithm keyAlgorithm = iKeyInfo->Algorithm();
@@ -894,11 +539,7 @@
 			{
 			CRSAKeyPair* newKey = iKeyCreator->GetCreatedRSAKey();
 			KeyIdentifierUtil::RSAKeyIdentifierL(newKey->PublicKey(), theKeyId);			
-			#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-				EncryptAndStoreL(newKey->PrivateKey(), privateStream);
-			#else
-				privateStream << newKey->PrivateKey();
-			#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
+			privateStream << newKey->PrivateKey();
 			break;
 			}
 			
@@ -906,11 +547,7 @@
 			{
 			CDSAKeyPair* newKey = iKeyCreator->GetCreatedDSAKey();			
 			KeyIdentifierUtil::DSAKeyIdentifierL(newKey->PublicKey(), theKeyId);
-			#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-				EncryptAndStoreL(newKey->PrivateKey(), privateStream);
-			#else
-				privateStream << newKey->PrivateKey();
-			#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER	
+			privateStream << newKey->PrivateKey();
 			break;
 			}
 
@@ -923,11 +560,7 @@
 			if (newKey.IsZero())
 				User::Leave(KErrArgument);
 
-			#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER	
-				EncryptAndStoreL(newKey, privateStream);
-			#else
-				privateStream << newKey;
-			#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
+			privateStream << newKey;
 			break;
 			}
 		
@@ -983,37 +616,6 @@
 	
 }
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-void CFSKeyStoreServer::StoreKeyL(const TDesC8& aKeyData, RStoreWriteStream& aStream)
-	{
-	// retrieve the protection key of the current authenticated user for encrypting the 
-	// user's private key.
-	TPtrC8 key = iUserIdentity->Key().KeyData();
-	// used for pbe, the class can be used for encryption/decryption based on the 
-	// password supplied.
-	CPBEncryptElement* pbeEncrypt = CPBEncryptElement::NewL(key);
-	CleanupStack::PushL(pbeEncrypt);
-	// create an object for ecryption
-	CPBEncryptor* encryptor = pbeEncrypt->NewEncryptLC();
-	// cerate the buffer size required for storing the encrypted data.
-	HBufC8* ciphertext = HBufC8::NewLC(encryptor->MaxFinalOutputLength(aKeyData.Length()));
-	TPtr8 ciphertextTemp = ciphertext->Des();
-	// data gets encrypted and stored in the buffer
-	encryptor->ProcessFinalL(aKeyData, ciphertextTemp);
-	// externalixe the encryption parameters, this information is required later
-	// for decrypting the text later.
-	pbeEncrypt->EncryptionData().ExternalizeL(aStream);
-	// write out the cipher data length
-	aStream.WriteInt32L(ciphertext->Length());
-	// write the cipher data to the stream.
-	aStream.WriteL(*ciphertext);
-	// once the key has been store, delete the user identity
-	delete iUserIdentity;
-	iUserIdentity = NULL;
-	CleanupStack::PopAndDestroy(3, pbeEncrypt); // ciphertext,encryptor
-	}
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
 void CFSKeyStoreServer::ImportKey(const TDesC8& aKey, CKeyInfo& aReturnedKey, TBool aIsEncrypted, TRequestStatus& aStatus)
 	{
 	ASSERT(iMessage);
@@ -1035,12 +637,6 @@
 	
 	SetActive();
 	
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	iAction = EDoImportKey;
-	
-	TRequestStatus* status = &iStatus;
-	User::RequestComplete(status, KErrNone);
-#else
 	TInt err = CheckImportKeyPolicy(iImportingEncryptedKey ? ENewKeyImportEncrypted : ENewKeyImportPlaintext);
 	if(err != KErrNone)
 		{
@@ -1061,7 +657,6 @@
 		User::RequestComplete(status, KErrNone);
 		}
 
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	}
 
 void CFSKeyStoreServer::CheckExportKeyPolicyL()
@@ -1121,18 +716,11 @@
 	TInt err = CheckKeyAttributes(*iKeyInfo, aKeyOperation);		
 	
 	
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	if (err == KErrNone && iKeyDataManager->IsKeyAlreadyInStore(iKeyInfo->Label(), iKeyInfo->Identity()))
-		{
-		err = KErrAlreadyExists;
-		}
-#else
 	if (err == KErrNone && iKeyDataManager->IsKeyAlreadyInStore(iKeyInfo->Label()))
 		{
 		err = KErrAlreadyExists;
 		}
 
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	
 	return err;
 	}
@@ -1169,12 +757,6 @@
 		{
 		Cancel();
 		}
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	if (iAction == EImportUserKey)
-		{
-		Cancel();
-		}
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	}
 
 void CFSKeyStoreServer::DoImportKeyL()
@@ -1207,9 +789,7 @@
 
 void CFSKeyStoreServer::PKCS8ToKeyL(CDecPKCS8Data* aPKCS8Data)
 { 
-#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	ASSERT(iPassphrase);
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	ASSERT(aPKCS8Data);
 	
 	MPKCS8DecodedKeyPairData* keyPairData = aPKCS8Data->KeyPairData();
@@ -1232,19 +812,11 @@
 		}
 		
 	const CFileKeyData* keyData = NULL;
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	keyData = iKeyDataManager->CreateKeyDataLC(iKeyInfo->Label(),iKeyInfo->Identity());
-#else
 	keyData = iKeyDataManager->CreateKeyDataLC(iKeyInfo->Label(), iPassphrase->StreamId());
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	
 	RStoreWriteStream privateStream;
 	
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	iKeyDataManager->OpenPrivateDataStreamLC(*keyData, privateStream);
-#else
 	iKeyDataManager->OpenPrivateDataStreamLC(*keyData, *iPassphrase, privateStream);
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	
 	// Generate the key identifier
 	TKeyIdentifier theKeyId;
@@ -1261,21 +833,13 @@
 		{
 		case (CKeyInfo::ERSA):
 			{
-			#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-			EncryptAndStoreL(static_cast<CPKCS8KeyPairRSA*>(keyPairData)->PrivateKey(), privateStream);
-			#else
 			privateStream << static_cast<CPKCS8KeyPairRSA*>(keyPairData)->PrivateKey();
-			#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 			
 			break;
 			}
 		case (CKeyInfo::EDSA):
 			{
-			#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-			EncryptAndStoreL(static_cast<CPKCS8KeyPairDSA*>(keyPairData)->PrivateKey(), privateStream);
-			#else
-				privateStream << static_cast<CPKCS8KeyPairDSA*>(keyPairData)->PrivateKey();
-			#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
+			privateStream << static_cast<CPKCS8KeyPairDSA*>(keyPairData)->PrivateKey();
 			
 			break;
 			}	
@@ -1370,19 +934,13 @@
 
 void CFSKeyStoreServer::CompleteKeyExportL(TBool encrypted /*=EFalse*/)
 	{
-#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	ASSERT(iPassphrase);
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	ASSERT(iKeyData);
 	ASSERT(iExportBuf.Ptr());
 	
 	CKeyInfo::EKeyAlgorithm keyAlgorithm = iKeyInfo->Algorithm();
 	RStoreReadStream privStream;
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	iKeyDataManager->OpenPrivateDataStreamLC(*iKeyData, privStream);
-#else
 	iKeyDataManager->OpenPrivateDataStreamLC(*iKeyData, *iPassphrase, privStream);
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	
 	CASN1EncSequence* encoded = NULL;
 			
@@ -1398,20 +956,7 @@
 			CleanupStack::PushL(publicKey);
 					
 			CRSAPrivateKey* privateKey = NULL;
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-			
-			TPtrC8 key = iUserIdentity->Key().KeyData();
-			HBufC8* plaintext = DecryptFromStreamL(privStream, key);
-			CleanupStack::PushL(plaintext);
-			TAny* ptr = const_cast<TAny*>(static_cast<const TAny*>(plaintext->Des().Ptr()));
-			RMemReadStream decryptedStream(ptr, plaintext->Length());
-			CleanupClosePushL(decryptedStream);
-			CreateL(decryptedStream, privateKey);
-			CleanupStack::PopAndDestroy(2,plaintext);
-
-#else
 			CreateL(privStream, privateKey);
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 			
 			ASSERT(privateKey);
 			CleanupStack::PushL(privateKey);			
@@ -1438,18 +983,7 @@
 			{
 			CDSAPrivateKey* privateKey = NULL;
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-			TPtrC8 key = iUserIdentity->Key().KeyData();
-			HBufC8* plaintext = DecryptFromStreamL(privStream, key);
-			CleanupStack::PushL(plaintext);
-			TAny* ptr = const_cast<TAny*>(static_cast<const TAny*>(plaintext->Des().Ptr()));
-			RMemReadStream decryptedStream(ptr, plaintext->Length());
-			CleanupClosePushL(decryptedStream);
-			CreateL(decryptedStream, privateKey);
-			CleanupStack::PopAndDestroy(2,plaintext);
-#else
 			CreateL(privStream, privateKey);
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 
 			ASSERT(privateKey);
 			CleanupStack::PushL(privateKey);
@@ -1514,20 +1048,7 @@
 		User::Leave(KErrPermissionDenied);
 		}
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	AuthServer::TIdentityId identity = iKeyDataManager->CachedIdentity();
-	if(identity == AuthServer::KUnknownIdentity)
-		{
-		AuthServer::CIdentity* userIdentity = SyncAuthenticateLC(keyInfo->AuthExpression(), keyInfo->Freshness());
-		identity = userIdentity->Id();
-		CleanupStack::PopAndDestroy(userIdentity);
-		}
-	if(identity != keyInfo->Identity())
-		{
-		User::Leave(KErrNotFound);
-		}
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	
+
 	CleanupStack::PopAndDestroy(keyInfo);
 
 	// Check if any session has this key open
@@ -1561,20 +1082,6 @@
 		User::Leave(KErrPermissionDenied);
 		}
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	AuthServer::TIdentityId identity = iKeyDataManager->CachedIdentity();
-	if(identity == AuthServer::KUnknownIdentity)
-		{
-		AuthServer::CIdentity* userIdentity = SyncAuthenticateLC(keyInfo->AuthExpression(), keyInfo->Freshness());
-		identity = userIdentity->Id();
-		CleanupStack::PopAndDestroy(userIdentity);
-		}
-	if(identity != keyInfo->Identity())
-		{
-		User::Leave(KErrNotFound);
-		}
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	
 	//should revert change if write fails
 	keyInfo->SetUsePolicy(aPolicy); 
 	iKeyDataManager->SafeWriteKeyInfoL(*keyData, *keyInfo);	
@@ -1606,19 +1113,6 @@
 		User::Leave(KErrArgument);
 		}
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	AuthServer::TIdentityId identity = iKeyDataManager->CachedIdentity();
-	if(identity == AuthServer::KUnknownIdentity)
-		{
-		AuthServer::CIdentity* userIdentity = SyncAuthenticateLC(keyInfo->AuthExpression(), keyInfo->Freshness());
-		identity = userIdentity->Id();
-		CleanupStack::PopAndDestroy(userIdentity);
-		}
-	if(identity != keyInfo->Identity())
-		{
-		User::Leave(KErrNotFound);
-		}
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	
 	//should revert change if write fails
 	keyInfo->SetManagementPolicy(aPolicy);
@@ -1627,7 +1121,6 @@
 	CleanupStack::PopAndDestroy(keyInfo);
 	}
 
-#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 // For MCTAuthenticationObject
 
 void CFSKeyStoreServer::ChangePassphrase(TRequestStatus& aStatus)
@@ -1728,7 +1221,6 @@
 		}			
 	}
 
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 
 //	*********************************************************************************
 //	From CActive
@@ -1759,10 +1251,6 @@
 		iAction == EExportEncryptedKeyGetPassphrase ||
 		iAction == EExportKey ||
 		iAction == EExportEncryptedKey
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-		|| iAction == ESetAuthenticationPolicy 
-		|| iAction == EDoSetAuthenticationPolicy
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 		)
 		{
 		// we only own iKeyInfo for export operations
@@ -1770,24 +1258,7 @@
 		iKeyInfo = NULL;
 		}
 	
-	#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	delete iUserIdentity;
-	iUserIdentity = NULL;
-	delete iAuthString;
-	iAuthString = NULL;
-	
-	// this is a design restriction, the ckeyinfo object 
-	// contains the authexpression, but while sending 
-	// the key info back to the client, the authentication
-	// data needs to be deleted.
-	if(	iAction == EImportKey || iAction == EAuthenticate ||
-		iAction == EImportUserKey || iAction == EDoImportKey ||
-		iAction == ECreateKeyFinal )
-		{
-		iKeyInfo->ResetAuthExpression();
-		}
-	#endif //SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	
+
 	// Zero pointers to things we don't own
 	iPassphrase = NULL;
 	iKeyInfo = NULL;
@@ -1845,32 +1316,14 @@
 			}
 		break;
 		case EExportEncryptedKey:
-			{
-		#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-			if(iUserIdentity->Id() == 0)
-				{
-				User::Leave(KErrAuthenticationFailure);
-				}
-		#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-			
+			{	
 			TPasswordManager::ExportPassword(iPassword, iStatus); 
 			iAction = EExportKey;
 			SetActive();
 			}	
 			break;
 		case EExportKey:
-			{
-		#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-			if( iUserIdentity->Id() == AuthServer::KUnknownIdentity )
-				{
-				User::Leave(KErrAuthenticationFailure);
-				}
-			if(iUserIdentity->Id() != iKeyInfo->Identity())
-				{
-				User::Leave(KErrNotFound);
-				}
-		#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-			
+			{			
 			CompleteKeyExportL(iExportingKeyEncrypted);
 			}
 			break;				
@@ -1879,20 +1332,6 @@
 			{
 			CheckExportKeyPolicyL();
 			
-			#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-				if (iExportingKeyEncrypted)
-					{
-					iAction = EExportEncryptedKey;		
-					}
-				else
-					{
-					iAction = EExportKey;
-					}
-				
-				AsyncAuthenticateL(iKeyInfo->AuthExpression(), iKeyInfo->Freshness());
-				
-			#else
-				
 				if (iExportingKeyEncrypted)
 					{
 					iAction = EExportEncryptedKeyGetPassphrase;
@@ -1904,7 +1343,6 @@
 				SetActive();
 				TRequestStatus* status = &iStatus;
 				User::RequestComplete(status, KErrNone);		
-			#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 			}
 			break;
 				
@@ -1915,101 +1353,6 @@
 			CompleteClientRequest(KErrNone);
 			break;
 		
-		#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-		
-		case ECreateUserKey:
-			iIdentityId = iUserIdentity->Id();
-			if(iIdentityId == AuthServer::KUnknownIdentity)
-				{
-				User::Leave(KErrAuthenticationFailure);
-				}
-			iKeyInfo->SetIdentity(iIdentityId);
-			User::LeaveIfError(CheckCreateKeyPolicy()); 
-			DoCreateKeyL();
-			iAction = ECreateKeyFinal;
-			
-			break;
-					
-		case EImportUserKey:
-			iIdentityId = iUserIdentity->Id();
-			if( iIdentityId == AuthServer::KUnknownIdentity )
-				{
-				User::Leave(KErrAuthenticationFailure);
-				}
-			iKeyInfo->SetIdentity(iIdentityId);
-			User::LeaveIfError(CheckImportKeyPolicy(iImportingEncryptedKey ? ENewKeyImportEncrypted : ENewKeyImportPlaintext));
-			
-			iAction = EImportKey;
-			SetActive();
-			if (iImportingEncryptedKey)
-				{
-				TPasswordManager::ImportPassword(iPassword, iStatus);
-				}
-			else
-				{
-				TRequestStatus* status = &iStatus;
-				User::RequestComplete(status, KErrNone);
-				}			
-			break;
-		
-		case EDoSetAuthenticationPolicy:
-			{
-			CheckRangeL(iFreshness);
-			iKeyData = iKeyDataManager->Lookup(iObjectId);
-			if (!iKeyData)
-				{
-				User::Leave(KErrNotFound);
-				}
-				
-			iKeyInfo = iKeyDataManager->ReadKeyInfoLC(*iKeyData);
-			CleanupStack::Pop(iKeyInfo);
-			
-			// retrieve the authentication expression stored 
-			// against this identity and authenticate
-			// the user for changing the policy
-			iAction = EAuthenticate;
-			iNextAction = ESetAuthenticationPolicy;
-			SetActive();
-			TRequestStatus* status = &iStatus;
-			User::RequestComplete(status, KErrNone);
-			}
-			break;
-						
-		case ESetAuthenticationPolicy:
-			{
-			iIdentityId = iUserIdentity->Id();
-			WriteAuthenticationPolicyL();
-			CompleteClientRequest(KErrNone);
-			}
-			break;
-		
-		case ESetAuthPolicy:
-			{
-			//sets the default authentication policy to iKeyInfo
-			SetDefaultAuthPolicyL();
-			AsyncAuthenticateL(iKeyInfo->AuthExpression(), iKeyInfo->Freshness());
-			iAction = ECreateUserKey;
-			}
-			break;
-			
-		case EDoImportKey:
-			{
-			SetDefaultAuthPolicyL();
-			AsyncAuthenticateL(iKeyInfo->AuthExpression(), iKeyInfo->Freshness());
-			iAction = EImportUserKey;
-			}
-			break;
-
-		case EAuthenticate:
-			{
-			ASSERT(iKeyInfo);
-			CheckRangeL(iKeyInfo->Freshness());
-			AsyncAuthenticateL(iKeyInfo->AuthExpression(), iKeyInfo->Freshness());
-			iAction = iNextAction;
-			iNextAction = EIdle;
-			}
-			break;
-		#else
 
 		case EImportOpenPrivateStream:
 			ASSERT(iKeyInfo);
@@ -2041,7 +1384,6 @@
 			User::LeaveIfError(CheckCreateKeyPolicy()); 
 			GetKeystorePassphrase(ECreateKeyCreate);
 			break;
-		#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 			
 		default:
 			ASSERT(EFalse);
--- a/cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/Ckeystoreconduit.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/Ckeystoreconduit.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -29,11 +29,6 @@
 #include "cfskeystoreserver.h"
 #include <mctkeystoreuids.h>
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-#include <authserver/identity.h>
-#include <e32debug.h>
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
 
 // CKeyStoreConduit ////////////////////////////////////////////////////////////
 
@@ -178,25 +173,7 @@
    	case ECancelDH:
 		CancelDH(aMessage, aSession);
 		break;	
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 
-	case ECreateUserKey:
-		CreateUserKeyL(aMessage);
-		break;
-	
-	case EImportUserKey:
-	case EImportEncryptedUserKey:
-		ImportUserKeyL(aMessage);
-		break;
-		
-	case ESetAuthenticationPolicy:
-		SetAuthenticationPolicyL(aMessage);
-		break;
-	
-	case EGetAuthenticationPolicy:
-		GetAuthenticationPolicyL(aMessage);
-		break;
-#else
 	case EChangePassphrase:
 		ChangePassphrase(aMessage);
 		break;
@@ -224,14 +201,7 @@
 	case ERelock:
 		Relock(aMessage);
 		break;	
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	
-#ifdef SYMBIAN_AUTH_SERVER
-	case EUseNewKeyServer:
-			IsKeyServerNewL(aMessage);
-			break;
-#endif // SYMBIAN_AUTH_SERVER
-			
 	default:	//	Should not reach here
 		PanicClient(aMessage,EPanicIllegalFunction);
 		break;
@@ -342,151 +312,6 @@
 	iServer.CreateKey(*iKeyInfo, iStatus);
 	}
 
-#ifdef SYMBIAN_AUTH_SERVER
-void CKeyStoreConduit::IsKeyServerNewL(const RMessage2& aMessage)
-	{
-	TBool newKeyServer = EFalse;
-	#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	newKeyServer = ETrue;
-	#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
-	TPckg<TBool> idNewKeyServer(newKeyServer);
-	aMessage.WriteL(1,idNewKeyServer);
-	aMessage.Complete(KErrNone);
-	}
-#endif // SYMBIAN_AUTH_SERVER
-
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
-void CKeyStoreConduit::CreateUserKeyL(const RMessage2& aMessage)
-	{
-	ASSERT(!iKeyInfo);
-		
-	//	p[0] has the length of the buffer. Check our buffer is big
-	//	enough, to cope with requests for keys with very long labels.
-
-	TInt bufLength = User::LeaveIfError(aMessage.GetDesLength(1));
-	iServer.CheckRangeL(bufLength);
-	
-	TInt authExprLength = User::LeaveIfError(aMessage.GetDesLength(2));
-	iServer.CheckRangeL(authExprLength);
-	HBufC* authExprBuf = HBufC::NewMaxLC(authExprLength);
-
-	//	p[2] has the authentication expression
-	TPtr authExprPtr(authExprBuf->Des());
-	authExprPtr.FillZ();
-	
-	aMessage.ReadL(2, authExprPtr);
-	
-	TInt freshness = aMessage.Int3();
-	
-	// the iKeyInfo buffer should be read at the last as in 
-	// case of OOM this memory would not get freed.
-	HBufC8* keyInfoBuf = HBufC8::NewMaxLC(bufLength);
-
-	//	p[1] has the CKeyInfo structure required to create a key
-	//	Read it and convert from descriptor back to a CKeyInfo
-	TPtr8 thePtr(keyInfoBuf->Des());
-	thePtr.FillZ();
-
-	aMessage.ReadL(1, thePtr);
-	TokenDataMarshaller::ReadL(*keyInfoBuf, iKeyInfo);
-	CleanupStack::PopAndDestroy(keyInfoBuf);
-			
-	iCurrentRequest.Set(ECreateUserKey, aMessage);
-	
-	SetActive();
-	iServer.CreateUserKey(*iKeyInfo, *authExprBuf, freshness, iStatus);
-	CleanupStack::PopAndDestroy(authExprBuf);
-	}
-
-void CKeyStoreConduit::ImportUserKeyL(const RMessage2& aMessage)
-	{
-	ASSERT(!iImportKey);
-	ASSERT(!iKeyInfo);
-	
-	// p[0] has the descriptor containing the PKCS8 object (may or may not be encrypted)
-	TInt keyLen = User::LeaveIfError(aMessage.GetDesLength(0));
-	iServer.CheckRangeL(keyLen);
-	
-	HBufC8* importBuf = HBufC8::NewMaxLC(keyLen);
-	TPtr8 theKeyData(importBuf->Des());
-	theKeyData.FillZ();
-	aMessage.ReadL(0, theKeyData);
-
-		
-	TInt bufLen = User::LeaveIfError(aMessage.GetDesLength(1));
-	iServer.CheckRangeL(bufLen);
-	
-	// retrieve the authentication expression
-	TInt authExprLength = User::LeaveIfError(aMessage.GetDesLength(2));
-	iServer.CheckRangeL(authExprLength);
-	HBufC* authExprBuf = HBufC::NewMaxLC(authExprLength);
-
-	//	p[2] has the authentication expression
-	TPtr authExprPtr(authExprBuf->Des());
-	authExprPtr.FillZ();
-	
-	aMessage.ReadL(2, authExprPtr);
-	
-	// retrieve the freshness value
-	TInt freshness = aMessage.Int3();
-	
-	HBufC8* keyInfoBuf = HBufC8::NewMaxLC(bufLen);
-
-	// p[1] has the CKeyInfo structure required to create a key
-	// Read it and convert from descriptor back to a CKeyInfo
-	TPtr8 thePtr(keyInfoBuf->Des());
-	thePtr.FillZ();
-	aMessage.ReadL(1, thePtr);
-
-	TokenDataMarshaller::ReadL(*keyInfoBuf, iKeyInfo);
-	CleanupStack::PopAndDestroy(keyInfoBuf);
-
-	iImportKey = importBuf;
-	iCurrentRequest.Set(static_cast<TFSTokenMessages>(aMessage.Function()), aMessage);
-	
-	TBool isEncrypted = (aMessage.Function() == EImportEncryptedUserKey);
-	SetActive();
-	iServer.ImportUserKey(*iImportKey, *iKeyInfo, isEncrypted, *authExprBuf, freshness, iStatus);
-	CleanupStack::PopAndDestroy(authExprBuf);
-	CleanupStack::Pop(importBuf);
-}
-
-void CKeyStoreConduit::SetAuthenticationPolicyL(const RMessage2& aMessage)
-	{
-	TInt objectId = aMessage.Int0();
-	
-	TInt authExprLen = User::LeaveIfError(aMessage.GetDesLength(1));
-	iServer.CheckRangeL(authExprLen);
-	HBufC* authExpr = HBufC::NewMaxLC(authExprLen);
-	TPtr authExprPtr(authExpr->Des());
-	authExprPtr.FillZ();
-	aMessage.ReadL(1, authExprPtr);
-
-	TInt freshness = aMessage.Int2();
-	iCurrentRequest.Set(ESetAuthenticationPolicy, aMessage);
-		
-	SetActive();
-	// ownership of authExpr is with the caller
-	iServer.SetAuthenticationPolicy(objectId, authExpr, freshness, iStatus);
-	CleanupStack::Pop(authExpr);
-	}
-
-void CKeyStoreConduit::GetAuthenticationPolicyL(const RMessage2& aMessage)
-	{
-	TInt objectId = aMessage.Int0();
-	HBufC* authExpression = iServer.AuthExpressionL(objectId);
-	CleanupStack::PushL(authExpression);
-	TInt freshness = iServer.FreshnessL(objectId);
-	TPckg<TInt> pckgFreshness(freshness); 
-	aMessage.WriteL(1, *authExpression);
-	aMessage.WriteL(2, pckgFreshness);
-	CleanupStack::PopAndDestroy(authExpression);
-	aMessage.Complete(KErrNone);
-	}
-
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 
 void CKeyStoreConduit::CancelCreateKey(const RMessage2& aMessage)
 	{
@@ -910,8 +735,6 @@
 	aMessage.Complete(KErrNone);
 	}
 
-#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
 void CKeyStoreConduit::ChangePassphrase(const RMessage2& aMessage)
 	{
 	iCurrentRequest.Set(EChangePassphrase, aMessage);
@@ -983,8 +806,6 @@
 	aMessage.Complete(KErrNone);
 	}
 
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
 //
 //	CActive functions
 //
@@ -1020,14 +841,6 @@
 			iServer.CancelExportEncryptedKey();
 			break;
 			
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-		case ECreateUserKey:
-			iServer.CancelCreateKey();
-			break;
-		case EImportUserKey:
-		case EImportEncryptedUserKey:
-			iServer.CancelImportKey();
-#else
 		case EChangePassphrase:
 			iServer.CancelChangePassphrase();
 			break;
@@ -1035,9 +848,6 @@
 		case EAuthOpen:
 			iServer.CancelAuthOpen();
 			break;
-
-			
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 			
 		default:
 			// Nothing to do
@@ -1060,13 +870,6 @@
 
 	switch (iCurrentRequest.OutstandingRequest())
 		{
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-		case ESetAuthenticationPolicy:
-			break;
-		case ECreateUserKey:
-		case EImportUserKey:
-		case EImportEncryptedUserKey:
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER	
 		case ECreateKey:
 		case EImportKey:
 		case EImportEncryptedKey:
@@ -1144,13 +947,10 @@
 		case EDHAgree:
 			FinishDHAgreeL();
 			break;
-#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 		case EChangePassphrase:
 		case EAuthOpen:
 			// Nothing to do
-			break;
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-			
+			break;	
 		default:
 			__ASSERT_DEBUG(EFalse, PanicServer(EPanicInvalidRequest));
 			User::Leave(KErrNotSupported);
--- a/cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/OpenedKeys.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/OpenedKeys.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -30,12 +30,6 @@
 #include <e32base.h>
 #include <mctkeystoreuids.h>
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-#include <authserver/authtypes.h>
-#include <authserver/auth_srv_errs.h>
-#include <s32mem.h>
-#include "keystore_errs.h"
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 
 // COpenedKey //////////////////////////////////////////////////////////////////
 
@@ -76,9 +70,6 @@
 	iKeyData(aKeyData),
 	iKeyDataMan(aKeyDataMan),
 	iPassMan(aPassMan)
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	,iUserIdentity(NULL)
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	{
 	}
 
@@ -89,9 +80,6 @@
 	iKeyInfo = keyInfo;
 	CheckKeyL(aMessage);
 	iLabel = iKeyInfo->Label().AllocL();
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	User::LeaveIfError(iAuthClient.Connect());
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	CActiveScheduler::Add(this);
 	}
 
@@ -100,11 +88,6 @@
 	Cancel();
 	delete iLabel;
 	delete iKeyInfo;
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	iAuthClient.Close();
-	delete iExpression;
-	delete iUserIdentity;
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 
 	}
 
@@ -154,7 +137,6 @@
 		
 	}
 
-#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 void COpenedKey::GetPassphrase(TRequestStatus& aStatus)
 	{
 	ASSERT(iState == EIdle);
@@ -168,16 +150,7 @@
 	iState = EGetPassphrase;
 	SetActive();
 	}
-#else
-void COpenedKey::AuthenticateL()
-	{	
-	iExpression = iAuthClient.CreateAuthExpressionL(iKeyInfo->AuthExpression());
-	TUid uid = TUid::Uid(0);
-	iAuthClient.AuthenticateL(*iExpression,iKeyInfo->Freshness(), EFalse, uid, EFalse, KNullDesC, iUserIdentity, iStatus);
-	iState = EAuthenticate;
-	SetActive();
-	}
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
+
 
 void COpenedKey::RunL()
 	{
@@ -185,41 +158,6 @@
 
 	switch (iState)
 		{
-		#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-		case EDoAuthenticate:
-			AuthenticateL();
-			break;
-			
-		case EAuthenticate:
-			if(iUserIdentity->Id() == AuthServer::KUnknownIdentity)
-				{
-				User::Leave(KErrAuthenticationFailure);
-				}
-					
-			if (!iKeyRead)
-				{
-				RStoreReadStream stream;
-				iKeyDataMan.OpenPrivateDataStreamLC(iKeyData, stream);
-				TPtrC8 key = iUserIdentity->Key().KeyData();
-				HBufC8* plaintext = DecryptFromStreamL(stream, key);
-				CleanupStack::PushL(plaintext);
-				TAny* ptr = const_cast<TAny*>(static_cast<const TAny*>(plaintext->Des().PtrZ()));
-							
-				RMemReadStream decryptedStream(ptr, plaintext->Length());
-				decryptedStream.PushL();
-				ReadPrivateKeyL(decryptedStream);
-				CleanupStack::PopAndDestroy(3,&stream); // plaintext, decryptedStream
-				iKeyRead = ETrue;
-				}
-			
-			delete iUserIdentity;
-			iUserIdentity = NULL;
-			delete iExpression;
-			iExpression = NULL;
-			PerformOperationL();
-			Complete(KErrNone);
-			break;
-		#else
 		case EGetPassphrase:
 			ASSERT(iPassphrase);
 			if (!iKeyRead)
@@ -233,7 +171,6 @@
 			PerformOperationL();
 			Complete(KErrNone);
 			break;	
-		#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 		default:
 			ASSERT(EFalse);
 		}
@@ -263,12 +200,7 @@
 
 void COpenedKey::Cleanup()
 	{
-	#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-		delete iUserIdentity;
-		iUserIdentity = NULL;
-		delete iExpression;
-		iExpression = NULL;
-	#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
+
 	}
 
 // CRSARepudiableSigner ////////////////////////////////////////////////////////
@@ -306,16 +238,7 @@
 	ASSERT(iSignaturePtr == NULL);
 	iPlaintext.Set(aPlaintext);
 	iSignaturePtr = &aSignature;
-#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	GetPassphrase(aStatus);
-#else
-	aStatus = KRequestPending;
-	iClientStatus = &aStatus;
-	iState = EDoAuthenticate;
-	SetActive();
-	TRequestStatus* status = &iStatus;
-	User::RequestComplete(status, KErrNone);
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	}
 
 void CRSARepudiableSigner::ReadPrivateKeyL(RReadStream& aStream)
@@ -336,9 +259,6 @@
 
 void CRSARepudiableSigner::Cleanup()
 	{
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	COpenedKey::Cleanup();
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	iPlaintext.Set(NULL, 0);
 	iSignaturePtr = NULL;
 	}
@@ -378,16 +298,7 @@
 	ASSERT(iSignaturePtr == NULL);
 	iPlaintext.Set(aPlaintext);
 	iSignaturePtr = &aSignature;
-#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	GetPassphrase(aStatus);
-#else
-	aStatus = KRequestPending;
-	iClientStatus = &aStatus;
-	iState = EDoAuthenticate;
-	SetActive();
-	TRequestStatus* status = &iStatus;
-	User::RequestComplete(status, KErrNone);
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	}
 
 void CDSARepudiableSigner::ReadPrivateKeyL(RReadStream& aStream)
@@ -408,10 +319,6 @@
 
 void CDSARepudiableSigner::Cleanup()
 	{
-	#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	COpenedKey::Cleanup();
-	#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
 	iPlaintext.Set(NULL, 0);
 	iSignaturePtr = NULL;
 	}
@@ -451,16 +358,7 @@
 	ASSERT(iPlaintextPtr == NULL);
 	iCiphertext.Set(aCiphertext);
 	iPlaintextPtr = &aPlaintext;
-#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	GetPassphrase(aStatus);
-#else
-	aStatus = KRequestPending;
-	iClientStatus = &aStatus;
-	iState = EDoAuthenticate;
-	SetActive();
-	TRequestStatus* status = &iStatus;
-	User::RequestComplete(status, KErrNone);
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	}
 
 void CFSRSADecryptor::ReadPrivateKeyL(RReadStream& aStream)
@@ -485,10 +383,6 @@
 
 void CFSRSADecryptor::Cleanup()
 	{
-	#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	COpenedKey::Cleanup();
-	#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
 	iCiphertext.Set(NULL, 0);
 	iPlaintextPtr = NULL;
 	}
@@ -527,16 +421,7 @@
 	iPKParams = &aParameters;
 	iPKPublicKeyPtr = &aPublicKey;
 	iDHState = EPublicKey;
-#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	GetPassphrase(aStatus);
-#else
-	aStatus = KRequestPending;
-	iClientStatus = &aStatus;
-	iState = EDoAuthenticate;
-	SetActive();
-	TRequestStatus* status = &iStatus;
-	User::RequestComplete(status, KErrNone);
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	}
 
 void CDHAgreement::Agree(CDHPublicKey& aY, HBufC8*& aAgreedKey, TRequestStatus& aStatus)
@@ -546,16 +431,7 @@
 	iAKPublicKey = &aY;
 	iAKAgreedKeyPtr = &aAgreedKey;
 	iDHState = EAgree;
-#ifndef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	GetPassphrase(aStatus);
-#else
-	aStatus = KRequestPending;
-	iClientStatus = &aStatus;
-	iState = EDoAuthenticate;
-	SetActive();
-	TRequestStatus* status = &iStatus;
-	User::RequestComplete(status, KErrNone);
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	}
 
 void CDHAgreement::ReadPrivateKeyL(RReadStream& aStream)
@@ -620,10 +496,6 @@
 
 void CDHAgreement::Cleanup()
 	{
-	#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	COpenedKey::Cleanup();
-	#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
 	iPKParams = NULL;
 	iPKPublicKeyPtr = NULL;
 	iAKPublicKey = NULL;
--- a/cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/OpenedKeys.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/OpenedKeys.h	Wed Apr 14 17:48:59 2010 +0300
@@ -29,10 +29,6 @@
 #include "keystorepassphrase.h"
 #include "fsdatatypes.h"
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-#include <authserver/authclient.h>
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
 class CRSAPrivateKey;
 class CRSASignature;
 class CDSAPrivateKey;
@@ -48,11 +44,7 @@
 	enum TState
 		{
 		EIdle,
-		EGetPassphrase,
-		#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-		EDoAuthenticate,
-		EAuthenticate,
-		#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
+		EGetPassphrase
 		};
 	
 public:
@@ -88,10 +80,6 @@
 	/// Clean up, called after normal end error completion
 	virtual void Cleanup() = 0;
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-protected:
-	void AuthenticateL();
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	
 private:
 	virtual void RunL();
@@ -111,11 +99,6 @@
 	
 	CPassphrase*		 iPassphrase;
 	CKeyInfo* 			iKeyInfo;
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	AuthServer::CIdentity* iUserIdentity;
-	AuthServer::RAuthClient iAuthClient;
-	AuthServer::CAuthExpression* iExpression;
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 protected:
 	TState				 iState;
 	TRequestStatus*		 iClientStatus;
--- a/cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/cfskeystoreserver.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/cfskeystoreserver.h	Wed Apr 14 17:48:59 2010 +0300
@@ -47,13 +47,6 @@
 class CKeyStoreSession;
 class CKeyStoreConduit;
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
-#include <authserver/authclient.h>
-
-class CKeyStoreCenrep;
-
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 
 /**	Server side implementation of keystore interfaces as an active object. */
 class CFSKeyStoreServer : public CActive
@@ -68,15 +61,6 @@
 		EExportKey,
 		EExportEncryptedKey,
 		EDoExportKey,
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-		ECreateUserKey,
-		EImportUserKey,
-		ESetAuthenticationPolicy,
-		ESetAuthPolicy,
-		EDoImportKey,
-		EDoSetAuthenticationPolicy,
-		EAuthenticate,
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 		EImportOpenPrivateStream,
 		EExportKeyGetPassphrase,
 		EExportEncryptedKeyGetPassphrase,
@@ -125,30 +109,7 @@
 	void SetManagementPolicyL(TInt aObjectId, const TSecurityPolicy& aPolicy);
 	void CheckRangeL(TInt aFreshness);
 	
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	
-	void CreateUserKey(	CKeyInfo& aReturnedKey,
-						const TDesC& aAuthString,
-						TInt aFreshness,
-						TRequestStatus& aStatus);
 
-	void ImportUserKey(	const TDesC8& aKey, CKeyInfo& aReturnedKey, 
-						TBool aIsEncrypted,
-						const TDesC& aAuthString,
-						TInt aFreshness,
-						TRequestStatus& aStatus);
-	
-	void SetAuthenticationPolicy(	
-								TInt aObjectId, 
-								HBufC* aAuthString,
-								TInt aFreshness, 
-								TRequestStatus& aStatus);
-
-	HBufC* AuthExpressionL( TInt aObjectId);
-	TInt FreshnessL(TInt aObjectId);
-	CKeyInfo* KeyDetailsLC(TInt aObjectId);
-
-#else
 	// For MCTAuthenticationObject
 	void ChangePassphrase(TRequestStatus& aStatus);
 	void CancelChangePassphrase();
@@ -159,7 +120,7 @@
 	TInt GetTimeRemainingL();
 	void SetTimeoutL(TInt aTimeout);
 	TInt GetTimeout();
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
+
 	
 private:
 	CFSKeyStoreServer();
@@ -189,21 +150,10 @@
 	void CheckExportKeyPolicyL();
 	void CompleteClientRequest(TInt aCompletionCode);
 		
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-	template <class T> inline void EncryptAndStoreL(const T& aKey, RStoreWriteStream& aStream );
-	void StoreKeyL(const TDesC8& aKeyData, RStoreWriteStream& aStream);
-	
-	AuthServer::CIdentity* SyncAuthenticateLC(const TDesC& aAuthExpression, TInt aFreshness);
-	void AsyncAuthenticateL(const TDesC& aAuthString,
-							TInt aFreshness);
-	void SetDefaultAuthPolicyL();
-	void WriteAuthenticationPolicyL();
-#else	
 	void GetKeystorePassphrase(TCurrentAction aNextState);
 	void OpenPrivateStream();
 	void DoChangePassphrase();
 	void RemoveCachedPassphrases(TStreamId aStreamId);
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	
 private:
 	void PKCS8ToKeyL(CDecPKCS8Data* aPKCS8Data);
@@ -236,16 +186,6 @@
 	const CFileKeyData* iKeyData;
 	CPassphrase* iPassphrase;
 	
-#ifdef 	SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
-private:
-	AuthServer::RAuthClient iAuthClient;
-	AuthServer::CIdentity* iUserIdentity;
-	AuthServer::TIdentityId iIdentityId;
-	CKeyStoreCenrep* iKeyStoreCenrep;
-	HBufC* iAuthString;
-	TInt iFreshness;
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 	
 };
 
--- a/cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/cfskeystoreserver.inl	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,58 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Implements method to encrypt the private key.  
-*
-*/
-
-
-/**
- @file 
- @internalTechnology
-*/
-
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
-#ifndef CFSKEYSTORESERVER_INL
-#define CFSKEYSTORESERVER_INL
-
-// the size allocated to retrieve the private key.
-const TInt KSize = 2048;
-
-#include "cfskeystoreserver.h"
-
-template <class T> inline void CFSKeyStoreServer::EncryptAndStoreL(const T& aKey, RStoreWriteStream& aStream )
-		{
-		RMemWriteStream writeStream;
-		CleanupClosePushL(writeStream);
-		// create the buffer for storing the encrypted private key
-		HBufC8* privateKey = HBufC8::NewLC(KSize);
-		TPtr8 keyPtr(privateKey->Des());
-		keyPtr.FillZ(KSize);
-		
-		// a pointer to the data is required to pass it to the stream
-		TAny* ptr = const_cast<TAny*>(static_cast<const TAny*>(privateKey->Des().Ptr()));
-		writeStream.Open( ptr,KSize);
-		writeStream << aKey;
-		writeStream.CommitL();
-		TStreamPos pos = writeStream.Sink()->TellL(MStreamBuf::EWrite);
-		keyPtr.SetLength(pos.Offset());
-		StoreKeyL(keyPtr, aStream);
-		CleanupStack::PopAndDestroy(2, &writeStream); // privateKey
-
-		}
-
-#endif // CFSKEYSTORESERVER_INL
-
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
--- a/cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/keystreamutils.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/keystreamutils.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -19,11 +19,6 @@
 #include "keystreamutils.h"
 #include "asymmetrickeys.h"
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-#include <s32mem.h>
-#include <pbe.h>
-#include <pbedata.h>
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
 
 #include <e32debug.h>
 
@@ -141,40 +136,5 @@
 	CleanupStack::Pop(4, &P);
 	}
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
-/**
- * The input stream contains data in encrypted form. This method 
- * supports pbe. In this case the key is the password. It 
- * retrieves the plaintext data by decrypting the data using the 
- * supplied key.
- */
-
-HBufC8* DecryptFromStreamL( RReadStream& aInStream, TPtrC8& aKey )
-	{
-	
-	CPBEncryptionData* data = CPBEncryptionData::NewL(aInStream);
-	CleanupStack::PushL(data);
 
-	TInt32 encKeyLength = aInStream.ReadInt32L();
-	HBufC8* encKey = HBufC8::NewMaxLC(encKeyLength);
-	TPtr8 encKeyPtr(encKey->Des());
-	encKeyPtr.FillZ();
-	aInStream.ReadL(encKeyPtr,encKeyLength);
-	
-	CPBEncryptElement* encryption = CPBEncryptElement::NewLC(*data,aKey);
 
-	CPBDecryptor* decryptor = encryption->NewDecryptLC();
-	HBufC8* plaintext = HBufC8::NewLC(decryptor->MaxOutputLength(encKeyPtr.Length())); 
-	TPtr8 plaintextPtr = plaintext->Des();	
-	plaintextPtr.FillZ();
-	decryptor->ProcessFinalL(encKeyPtr, plaintextPtr);
-
-	CleanupStack::Pop(plaintext);
-	CleanupStack::PopAndDestroy(4,data); // encKey, encryption, decryptor 
-	
-	return plaintext;
-	}
-
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-
--- a/cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/keystreamutils.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/source/keystore/Server/keystreamutils.h	Wed Apr 14 17:48:59 2010 +0300
@@ -26,9 +26,7 @@
 #define __KEYSTREAMUTILS_H__
 
 #include <s32strm.h>
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-#include <s32std.h>
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
+
 #include "fsmarshaller.h"
 
 class CRSAPublicKey;
@@ -52,7 +50,5 @@
 void CreateL(RReadStream& aStream, CDSAPublicKey*& aOut);
 void CreateL(RReadStream& aStream, CDSAPrivateKey*& aOut);
 
-#ifdef SYMBIAN_KEYSTORE_USE_AUTH_SERVER
-HBufC8* DecryptFromStreamL( RReadStream& aInStream, TPtrC8& aKey );
-#endif // SYMBIAN_KEYSTORE_USE_AUTH_SERVER
+
 #endif
--- a/cryptoservices/filebasedcertificateandkeystores/test/bwins/tcryptotokenhaiu.def	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,12 +0,0 @@
-EXPORTS
-	?NewLC@CCryptoTokenHai@@SAPAV1@PAVMCTToken@@@Z @ 1 NONAME ; class CCryptoTokenHai * CCryptoTokenHai::NewLC(class MCTToken *)
-	?KeyPresent@CCryptoTokenHai@@QAEHH@Z @ 2 NONAME ; int CCryptoTokenHai::KeyPresent(int)
-	?ListL@CCryptoTokenHai@@QBEXABUTCTKeyAttributeFilter@@AAV?$RPointerArray@VCCTKeyInfo@@@@@Z @ 3 NONAME ; void CCryptoTokenHai::ListL(struct TCTKeyAttributeFilter const &, class RPointerArray<class CCTKeyInfo> &) const
-	?ExportPublicKeyL@CCryptoTokenHai@@QAEXHAAPAVHBufC8@@@Z @ 4 NONAME ; void CCryptoTokenHai::ExportPublicKeyL(int, class HBufC8 * &)
-	?DecryptL@CCryptoTokenHai@@QAEXHABVTDesC8@@AAPAVHBufC8@@@Z @ 5 NONAME ; void CCryptoTokenHai::DecryptL(int, class TDesC8 const &, class HBufC8 * &)
-	?ExportPrivateKeyL@CCryptoTokenHai@@QAEXHAAPAVHBufC8@@@Z @ 6 NONAME ; void CCryptoTokenHai::ExportPrivateKeyL(int, class HBufC8 * &)
-	?ImportKeyL@CCryptoTokenHai@@QAEXABVTDesC16@@ABVTDesC8@@1@Z @ 7 NONAME ; void CCryptoTokenHai::ImportKeyL(class TDesC16 const &, class TDesC8 const &, class TDesC8 const &)
-	?SignL@CCryptoTokenHai@@QAEXHABVTDesC8@@AAPAVHBufC8@@@Z @ 8 NONAME ; void CCryptoTokenHai::SignL(int, class TDesC8 const &, class HBufC8 * &)
-	?NewL@CCryptoTokenHai@@SAPAV1@PAVMCTToken@@@Z @ 9 NONAME ; class CCryptoTokenHai * CCryptoTokenHai::NewL(class MCTToken *)
-	??1CCryptoTokenHai@@UAE@XZ @ 10 NONAME ; CCryptoTokenHai::~CCryptoTokenHai(void)
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/eabi/tcryptotokenhaiu.def	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,16 +0,0 @@
-EXPORTS
-	_ZN15CCryptoTokenHai10ImportKeyLERK7TDesC16RK6TDesC8S5_ @ 1 NONAME
-	_ZN15CCryptoTokenHai10KeyPresentEi @ 2 NONAME
-	_ZN15CCryptoTokenHai16ExportPublicKeyLEiRP6HBufC8 @ 3 NONAME
-	_ZN15CCryptoTokenHai17ExportPrivateKeyLEiRP6HBufC8 @ 4 NONAME
-	_ZN15CCryptoTokenHai4NewLEP8MCTToken @ 5 NONAME
-	_ZN15CCryptoTokenHai5NewLCEP8MCTToken @ 6 NONAME
-	_ZN15CCryptoTokenHai5SignLEiRK6TDesC8RP6HBufC8 @ 7 NONAME
-	_ZN15CCryptoTokenHai8DecryptLEiRK6TDesC8RP6HBufC8 @ 8 NONAME
-	_ZN15CCryptoTokenHaiD0Ev @ 9 NONAME
-	_ZN15CCryptoTokenHaiD1Ev @ 10 NONAME
-	_ZN15CCryptoTokenHaiD2Ev @ 11 NONAME
-	_ZNK15CCryptoTokenHai5ListLERK21TCTKeyAttributeFilterR13RPointerArrayI10CCTKeyInfoE @ 12 NONAME
-	_ZTI11CKeyDetails @ 13 NONAME
-	_ZTV11CKeyDetails @ 14 NONAME
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/keytool/keytool.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/test/keytool/keytool.mmp	Wed Apr 14 17:48:59 2010 +0300
@@ -20,9 +20,6 @@
 /**
  @file
 */
-#ifdef SYMBIAN_AUTH_SERVER
-MACRO KEYTOOL=1
-#endif // SYMBIAN_AUTH_SERVER
 
 TARGET		keytool.exe
 TARGETTYPE	exe
@@ -46,17 +43,6 @@
 SOURCE 		keytool_liststores.cpp
 SOURCE 		keytoolfileview.cpp  
 SOURCE 		keytool_setpolicy.cpp
-#ifdef SYMBIAN_AUTH_SERVER
-SOURCE		keytool_migratestore.cpp
-SOURCE		../../source/keystore/server/ckeydatamanager.cpp
-SOURCE		../../source/shared/ckeyinfo.cpp
-SOURCE		../../source/keystore/server/keystorecenrepconfig.cpp
-SOURCE		../../source/keystore/server/keystorepassphrase.cpp
-SOURCE		../../source/generic/server/fstokenutil.cpp
-SOURCE		../../source/keystore/server/keystreamutils.cpp
-SOURCE		../../source/generic/server/fsdialog.cpp
-SOURCE		../../source/generic/server/fsresources.cpp
-#endif // SYMBIAN_AUTH_SERVER
 
 START RESOURCE	keytool.rss
 HEADER
@@ -65,30 +51,13 @@
 
 USERINCLUDE	. 
 USERINCLUDE	../certtool
-#ifdef SYMBIAN_AUTH_SERVER
-USERINCLUDE	../../Inc
-USERINCLUDE	../../source/generic/common
-USERINCLUDE	../../source/generic/server
-USERINCLUDE	../../source/keystore/server
-#endif // SYMBIAN_AUTH_SERVER
+
 OS_LAYER_SYSTEMINCLUDE_SYMBIAN
 
-#ifdef SYMBIAN_AUTH_SERVER
-SYSTEMINCLUDE	/epoc32/include/ct
-#endif // SYMBIAN_AUTH_SERVER
-
 LIBRARY	euser.lib efsrv.lib 
 LIBRARY certstore.lib crypto.lib 
 LIBRARY ctframework.lib 
 LIBRARY bafl.lib charconv.lib
 LIBRARY estor.lib
-#ifdef SYMBIAN_AUTH_SERVER
-LIBRARY centralrepository.lib
-LIBRARY pbe.lib
-LIBRARY authclient.lib 
-LIBRARY	authcommon.lib
-LIBRARY fstokenshared.lib
-LIBRARY cryptography.lib
-#endif // SYMBIAN_AUTH_SERVER
 
 SMPSAFE
--- a/cryptoservices/filebasedcertificateandkeystores/test/keytool/keytool.rls	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/test/keytool/keytool.rls	Wed Apr 14 17:48:59 2010 +0300
@@ -23,9 +23,7 @@
 // Usage
 rls_string STRING_r_keytool_usage "Usage: keytool \t[{-list -l} {-liststores -ls} {-import -i} {-remove -r} "
 rls_string STRING_r_keytool_usage2 "\t\t {-page -p } {-help -h} {-setuser -s} {-setallusers -a} {-removeuser -ru} {-setmanager -m}] {KeyLabel}"
-#ifdef SYMBIAN_AUTH_SERVER
-rls_string STRING_r_keytool_usage5 "\t\t or [ {-migratestore} old key file name ]"
-#endif // SYMBIAN_AUTH_SERVER
+
 rls_string STRING_r_keytool_usage3 "Type keytool -h {CommandName} for details on a particular command."
 
 rls_string STRING_r_keytool_usage4 "Type keytool -h noninteractive for details on how to run the commands in noninteractive mode."
@@ -61,20 +59,6 @@
 rls_string STRING_r_keytool_usage_keyaccess "-access  Displays tool usage"
 rls_string STRING_r_keytool_usage_keyaccesses "Possible access restrictions are: Extractable, Sensitive."
 
-#ifdef SYMBIAN_AUTH_SERVER
-
-rls_string STRING_r_keytool_usage_migrate 	"-migrate OldKeyFile Passphrase [-new NewKeyFile] [-expr AuthExpression] [-freshness Freshness]."
-rls_string STRING_r_keytool_usage_migrate1 	"Migrates the old key file to the new format. If new key file name"
-rls_string STRING_r_keytool_usage_migrate2 	"is provided then it is saved using that name otherwise it is saved"
-rls_string STRING_r_keytool_usage_migrate3 	"as newkeys.dat in the system drive. Every key store in old implementation was encrypted" 
-rls_string STRING_r_keytool_usage_migrate4 	"with a passphrase, this should be supplied for successful porting."
-rls_string STRING_r_keytool_usage_migrate5 	"If authexpression is not provided it uses the system wide default plugin. "
-rls_string STRING_r_keytool_usage_migrate6 	"If freshness is not provided then it uses 0 as the default freshness which" 
-rls_string STRING_r_keytool_usage_migrate7 	"means always authenticate the user. The supplied auth expression and freshness "
-rls_string STRING_r_keytool_usage_migrate8 	"would be used to determine whether to use the current authenticated identity" 
-rls_string STRING_r_keytool_usage_migrate9 	"if available or to authenticate the user again."
-
-#endif // SYMBIAN_AUTH_SERVER
 
 // Errors
 rls_string STRING_r_keytool_err_command "Invalid Command."
@@ -119,8 +103,3 @@
 rls_string STRING_r_keytool_err_nousers "No users specified."
 rls_string STRING_r_keytool_err_nokey "No key specified."
 
-#ifdef SYMBIAN_AUTH_SERVER
-rls_string STRING_r_keytool_err_migrationfail "Key Migration Failed..."
-rls_string STRING_r_keytool_usage_oldkey_absent "Key file to be migrated not provided."
-rls_string STRING_r_keytool_usage_passphrase_absent "Passphrase absent."
-#endif // SYMBIAN_AUTH_SERVER
--- a/cryptoservices/filebasedcertificateandkeystores/test/keytool/keytool.rss	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/test/keytool/keytool.rss	Wed Apr 14 17:48:59 2010 +0300
@@ -71,12 +71,6 @@
 	buf = STRING_r_keytool_usage4;
 	}	
 
-#ifdef SYMBIAN_AUTH_SERVER
-RESOURCE TBUF r_keytool_usage5
-	{
-	buf = STRING_r_keytool_usage5;
-	}	
-#endif // SYMBIAN_AUTH_SERVER
 RESOURCE TBUF r_keytool_usage_list
 	{
 	buf = STRING_r_keytool_usage_list;
@@ -192,68 +186,6 @@
 	buf = STRING_r_keytool_usage_noninteractive1;
 	}
 
-#ifdef SYMBIAN_AUTH_SERVER
-RESOURCE TBUF r_keytool_usage_migrate
-	{
-	buf = STRING_r_keytool_usage_migrate;
-	}
-
-RESOURCE TBUF r_keytool_usage_migrate1
-	{
-	buf = STRING_r_keytool_usage_migrate1;
-	}
-
-RESOURCE TBUF r_keytool_usage_migrate2
-	{
-	buf = STRING_r_keytool_usage_migrate2;
-	}
-
-RESOURCE TBUF r_keytool_usage_migrate3
-	{
-	buf = STRING_r_keytool_usage_migrate3;
-	}
-
-RESOURCE TBUF r_keytool_usage_migrate4
-	{
-	buf = STRING_r_keytool_usage_migrate4;
-	}
-
-RESOURCE TBUF r_keytool_usage_migrate5
-	{
-	buf = STRING_r_keytool_usage_migrate5;
-	}
-
-RESOURCE TBUF r_keytool_usage_migrate6
-	{
-	buf = STRING_r_keytool_usage_migrate6;
-	}
-
-RESOURCE TBUF r_keytool_usage_migrate7
-	{
-	buf = STRING_r_keytool_usage_migrate7;
-	}
-
-RESOURCE TBUF r_keytool_usage_migrate8
-	{
-	buf = STRING_r_keytool_usage_migrate8;
-	}
-
-RESOURCE TBUF r_keytool_usage_migrate9
-	{
-	buf = STRING_r_keytool_usage_migrate9;
-	}
-
-RESOURCE TBUF r_keytool_usage_oldkey_absent
-	{
-	buf = STRING_r_keytool_usage_oldkey_absent;
-	}
-
-RESOURCE TBUF r_keytool_usage_passphrase_absent
-	{
-	buf = STRING_r_keytool_usage_passphrase_absent;
-	}
-
-#endif // SYMBIAN_AUTH_SERVER
 // Keytool error strings
 
 RESOURCE TBUF r_keytool_err_deletefail
@@ -431,12 +363,6 @@
 	buf = STRING_r_keytool_err_remove;
 	}
 	
-#ifdef SYMBIAN_AUTH_SERVER
-RESOURCE TBUF r_keytool_err_migrationfail
-	{
-	buf = STRING_r_keytool_err_migrationfail;
-	}
-#endif // SYMBIAN_AUTH_SERVER
 	
 //\\//\\//\\//\\//\\//\\//\\//\\//\\//\\//\\//\\//\\
 
--- a/cryptoservices/filebasedcertificateandkeystores/test/keytool/keytool_usage.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/test/keytool/keytool_usage.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -73,9 +73,6 @@
 		// Display general usage!
         iController->DisplayLocalisedMsgL(R_KEYTOOL_USAGE);
         iController->DisplayLocalisedMsgL(R_KEYTOOL_USAGE2);
-#ifdef SYMBIAN_AUTH_SERVER
-        iController->DisplayLocalisedMsgL(R_KEYTOOL_USAGE5);
-#endif // SYMBIAN_AUTH_SERVER
         iController->DisplayLocalisedMsgL(R_KEYTOOL_USAGE3);		        
         iController->DisplayLocalisedMsgL(R_KEYTOOL_USAGE4);
         return;
--- a/cryptoservices/filebasedcertificateandkeystores/test/tcryptotokenhai/tcryptotokenhai.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,619 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* This class implements the reference Crypto Token Hardware Abstraction 
-* Interface (HAI). It is just intended to show how operations using 
-* device keys can be performed using crypto token framework. In the 
-* real world scenario, this HAI should be replaced by device drivers 
-* by the licensees. In such a case, all the operations performed by 
-* the replacing class would be performed in Kernel Space.
-*
-*/
-
-
-#include "tcryptotokenhai.h"
-#include "tkeydetails.h"
-#include "cryptosignatureapi.h"
-#include "keys.h"
-
-#include <cryptospi/cryptoparams.h>
-#include <cryptospi/cryptospidef.h>
-
-EXPORT_C CCryptoTokenHai* CCryptoTokenHai::NewLC(MCTToken* aToken)
-	{
-	CCryptoTokenHai* instance = new(ELeave) CCryptoTokenHai(*aToken);
-	CleanupStack::PushL(instance);
-	instance->ConstructL();
-	return instance;
-	}
-
-EXPORT_C CCryptoTokenHai* CCryptoTokenHai::NewL(MCTToken* aToken)
-	{
-	CCryptoTokenHai* instance = CCryptoTokenHai::NewLC(aToken);
-	CleanupStack::Pop(instance);
-	return instance;
-	}
-
-void CCryptoTokenHai::ConstructL()
-	{
-	User::LeaveIfError(iFs.Connect());
-	OpenStoreL();
-	}
-
-CCryptoTokenHai::CCryptoTokenHai(MCTToken& aToken)
-	:iToken(aToken)
-	{}
-
-EXPORT_C CCryptoTokenHai::~CCryptoTokenHai()
-	{
-	if(iFileStore)
-        {
-        CompactStore();
-        delete iFileStore;
-        }
-	
-	iFs.Close();
-	iKeys.ResetAndDestroy();
-    iKeys.Close();
-	}
-
-/**
- * Performs the decryption operation.
- * 
- * This API gets called when the decryption is supposed to be done in  
- * the hardware.
- * 
- * @param aHandle The key handle
- * @param aCiphertext The cipher text. This is not being used presently 
- * due to decryption logic used in this function.
- * @param aPlainText Output param. The decrypted plain text. Ownership 
- * of the pointer lies with the caller.
- * 
- * @leave This function can leave with following error codes:-
- * - KErrNotFound - If the key corresponding to given handle is not 
- * found.
- * - Any other error code returned by AllocL().
- *
- * @note This function does not actually implement ECC decryption. It 
- * just intends to show that the key is with this class and it can 
- * do actual ECC decryption here. This function just returns the 
- * private key as decrypted text. The caller can verify the decryption 
- * by ensuring that test case has same public and private keys and then 
- * comparing the decrypted text with public key. 
- */
-EXPORT_C void CCryptoTokenHai::DecryptL(	TInt aHandle,	
-											const TDesC8& /* aCiphertext */,
-											HBufC8*& aPlainText )
-	{
-    TInt keyIndex = KeyPresent(aHandle);
-    if(keyIndex == KErrNotFound)
-        {
-        User::Leave(KErrNotFound);
-        }
-    
-    ExportPrivateKeyL(aHandle, aPlainText);
-	}
-
-/**
- * Performs the signing operation.
- * 
- * This API gets called when the signing is supposed to be done inside 
- * the hardware.
- * 
- * @param aHandle The key handle
- * @param aPlaintext The text which has to be signed. This is not being 
- * used due to signing logic used in this function.
- * @param aSignature Output param. The signature in HBufC8 format.  
- * Ownership of the pointer lies with the caller. This should be 
- * converted to CCryptoParams by the crypto token reference plugin. 
- * 
- * @leave This function can leave with following error codes:-
- * - KErrNotFound - If the key corresponding to given handle is not 
- * found.
- * - Any other error code returned by AllocL().
- * 
- * @note This function does not actually implement ECC signing. It 
- * just intends to show that the key is with this class and it can 
- * do actual ECC signing here. Currently this function just returns 
- * the private key as output signature. The caller can verify the 
- * signature by ensuring that test case has same public and private 
- * keys and then comparing the signature with public key.
- */
-EXPORT_C void CCryptoTokenHai::SignL( 	TInt aHandle,
-										const TDesC8& /* aPlaintext */,
-										HBufC8*& aSignature )
-	{
-	TInt keyIndex = KeyPresent(aHandle);
-	if(keyIndex == KErrNotFound)
-	    {
-	    User::Leave(KErrNotFound);
-	    }
-	
-	ExportPrivateKeyL(aHandle, aSignature);
-	}
-
-/**
- * Returns the index of the key whose handle is given.
- * 
- * @param aHandle Handle of the key. This is used to search the key.
- * 
- * @return index of the key if search is successful, KErrNotFound 
- * otherwise.
- */
-EXPORT_C TInt CCryptoTokenHai::KeyPresent( TInt aHandle )
-	{
-	int keysCount = iKeys.Count();
-	for(TInt i=0; i < keysCount; ++i)
-		{
-		if(iKeys[i]->Handle() == aHandle)
-			{
-			return i;
-			}
-		}
-	return KErrNotFound;
-	}
-
-/**
- * Extracts the private key.
- * 
- * @param aHandle Handle of the private key to be extracted.
- * @param aKey Output Parameter. Stores the private key on success. 
- * Ownership of pointer is with the caller.
- * 
- * @leave Following leave codes possible:-
- * - Any leave code returned by AllocL().
- * - KErrNotFound - If key corresponding to the given handle is not 
- * found.
- * 
- * @note In the actual implementation, licensees should ensure that 
- * this function can be called only in Kernel space. In the reference 
- * implementation, this function gets called only by CCryptoSpiHai, 
- * which is assumed to operate in kernel space. This would ensure that 
- * the private key always stays inside the hardware.
- */
-EXPORT_C void CCryptoTokenHai::ExportPrivateKeyL( TInt aHandle, HBufC8*& aKey )
-	{
-	int keysCount = iKeys.Count();
-	for(int i = 0; i < keysCount; ++i)
-		{
-		if(iKeys[i]->Handle() == aHandle)
-			{
-			aKey = iKeys[i]->PrivateKey()->AllocL();
-			return;
-			}
-		}
-	User::Leave(KErrNotFound);
-	}
-
-/**
- * Extracts the public key.
- * 
- * @param aHandle Handle of the public key to be extracted.
- * @param aKey Output Parameter. Stores the public key on success.
- * Ownership of pointer is with the caller.
- * 
- * @leave Following leave codes possible:-
- * - Any leave code returned by AllocL().
- * - KErrNotFound - If key corresponding to the given handle is not 
- * found.
- */
-EXPORT_C void CCryptoTokenHai::ExportPublicKeyL( TInt aHandle, HBufC8*& aKey )
-    {
-    int keysCount = iKeys.Count();
-    for(int i = 0; i < keysCount; ++i)
-        {
-        if(iKeys[i]->Handle() == aHandle)
-            {
-            aKey = iKeys[i]->PublicKey()->AllocL();
-            return;
-            }
-        }
-    User::Leave(KErrNotFound);
-    }
-
-/**
- * Stores the key with given details.
- * 
- * @param aLabel Label of the key.
- * @param aPrivateKey Private component of the key.
- * @param aPublicKey Public component of the key.
- * 
- * @leave Following leave codes possible:-
- * - KErrAlreadyExists If there is already a key with the inputted
- * label.
- * - Any other leave code returned by NewL() or AppendL().
- *  
- * @note In the present reference implementation this function is not 
- * being used, since device keys are pre-provisioned by the licensees. 
- * Hence licensees may decide not to implement this function in their 
- * real implementation. 
- */
-EXPORT_C void CCryptoTokenHai::ImportKeyL(const TDesC& aLabel, 
-        const TDesC8& aPrivateKey, const TDesC8& aPublicKey)
-	{
-	int keysCount = iKeys.Count();
-	for(int i = 0; i < keysCount; ++i)
-		{
-		if(iKeys[i]->Label() == aLabel)
-			{
-			User::Leave(KErrAlreadyExists);
-			}
-		}
-	CKeyDetails* keyDetails = CKeyDetails::NewL(keysCount+1,aLabel,aPrivateKey,aPublicKey);
-	iKeys.AppendL(keyDetails);
-	}
-
-/**
- * Populates the string containing full RAM path of file containing 
- * keys.
- */
-void CCryptoTokenHai::MakePrivateFilenameL(RFs& aFs, const TDesC& aLeafName, TDes& aNameOut)
-    {
-    aNameOut.SetLength(0);  
-    aNameOut.Append(RFs::GetSystemDriveChar());
-
-    aNameOut.Append(':');
-
-    // Get private path
-    TBuf<20> privatePath;
-    User::LeaveIfError(aFs.PrivatePath(privatePath));
-    aNameOut.Append(privatePath);
-    
-    aNameOut.Append(aLeafName);
-    }
-
-/**
- * Creates the corresponding directory, if it does not exist.
- */
-void CCryptoTokenHai::EnsurePathL(RFs& aFs, const TDesC& aFile)
-    {
-    TInt err = aFs.MkDirAll(aFile);
-    if (err != KErrNone && err != KErrAlreadyExists)
-        {
-        User::Leave(err);
-        }
-    }
-
-/**
- * Populates the string containing full ROM path of the keys file.
- */
-void CCryptoTokenHai::MakePrivateROMFilenameL(RFs& aFs, const TDesC& aLeafName, TDes& aNameOut)
-    {
-    _LIT(KFileStoreROMDrive, "Z:");
-    
-    aNameOut.Copy(KFileStoreROMDrive);
-
-    // Get private path
-    TBuf<20> privatePath;
-    User::LeaveIfError(aFs.PrivatePath(privatePath)); 
-    aNameOut.Append(privatePath);
-    aNameOut.Append(aLeafName);
-    }
-
-/**
- * Copies the contents of source file to destination file.
- * 
- * This is typically used to copy the keys file from ROM to RAM.
- */
-void CCryptoTokenHai::CopyL(RFs& aFs, const TDesC& aSouce, const TDesC& aDest)
-    {
-    RFileReadStream in;
-    User::LeaveIfError(in.Open(aFs, aSouce, EFileRead | EFileShareReadersOnly));
-    CleanupClosePushL(in);
-
-    RFileWriteStream out;
-    User::LeaveIfError(out.Replace(aFs, aDest, EFileWrite | EFileShareExclusive));
-    CleanupClosePushL(out);
-
-    in.ReadL(out);  
-    CleanupStack::PopAndDestroy(2, &in);
-    }
-
-/**
- * Keys corresponding to this store are present in hwkeys.dat. 
- * In the production code written by licensees, this would be the path 
- * where device keys are stored.
- */
-_LIT(KKeyStoreFilename,"hwkeys.dat");
-
-/**
- * Opens a store containing hardware keys.
- * 
- * This function uses the following logic to open the store:-
- * -# Try to open the store from the private directory.
- * -# If this fails copy the file from ROM to RAM.
- * -# If both fail, create your own keys store from scratch.
- */
-void CCryptoTokenHai::OpenStoreL()
-	{
-	TFileName fullPath;
-	MakePrivateFilenameL(iFs, KKeyStoreFilename, fullPath);
-
-	EnsurePathL(iFs, fullPath);
-	TRAPD(result, OpenStoreInFileL(fullPath));
-
-	if (result == KErrInUse  ) 
-		{		
-		// Cannot access the file now. Abort rather than wiping the keystore.
-		User::Leave(result); 
-		}
-	
-	if (result != KErrNone )
-		{		
-		/*
-		 * Not yet opened a valid store, either no file to be found, or 
-		 * no valid store in it. Copy the original one stored in the 
-		 * ROM.
-		 */
-		TRAPD(result2, CopyStoreFromROML(fullPath, result));
-				
-		if (KErrNone != result2)
-			{
-			/*
-			 * We tried to copy the keystore from ROM. For some reason this
-			 * failed and we still cannot open the file. Create a new one from
-			 * scratch.
-			 */ 
-			CreateStoreInFileL(fullPath);
-			}
-		}
-
-	}
-
-/**
- * Copies the key store file from ROM to RAM.
- */
-void CCryptoTokenHai::CopyStoreFromROML(const TDesC& fullPath, TInt result)
-    {
-    if (result != KErrNotFound)
-        {
-        // Wipe the keystore if we can't open it (it's corrupt anyway)
-        User::LeaveIfError(iFs.Delete(fullPath));
-        }
-
-    TFileName romPath;
-    MakePrivateROMFilenameL(iFs, KKeyStoreFilename, romPath);
-
-    // Copy data from rom and open it   
-    CopyL(iFs, romPath, fullPath);
-    OpenStoreInFileL(fullPath);
-    }
-
-/**
- * Opens a store from the given file.
- */
-void CCryptoTokenHai::OpenStoreInFileL(const TDesC& aFile)
-	{
-	RFile file;
-	User::LeaveIfError(file.Open(iFs, aFile, EFileRead | EFileWrite | EFileShareAny));
-	CleanupClosePushL(file);
-    delete iFileStore;
-    iFileStore = NULL;
-
-	iFileStore = CPermanentFileStore::FromL(file);
-    // iFileStore takes ownership of file now
-	CleanupStack::Pop(&file);
-	
-    // Get the salt, root and manager TStreamIds
-    iRootStreamId = iFileStore->Root();
-    if (iRootStreamId == KNullStreamId)
-        {
-        User::Leave(KErrCorrupt);
-        }
-    RStoreReadStream rootStream;
-    rootStream.OpenLC(*iFileStore, iRootStreamId);
-    ReadKeysFromStoreL();
-    CleanupStack::PopAndDestroy(&rootStream);
-    }
-
-/**
- * Creates a keys store in RAM from scratch.
- * 
- * @note This function should never get called as hwkeys.dat should be 
- * always present in ROM. If this function somehow gets called, it 
- * will create a hwkeys.dat file from scratch. However, this file would 
- * not contain any keys and tests would not pass.
- */
-void CCryptoTokenHai::CreateStoreInFileL(const TDesC& aFile)
-	{
-	TInt r = iFs.MkDirAll(aFile);
-	if ( (r!=KErrNone) && (r!=KErrAlreadyExists) )
-		User::Leave(r);
-
-    delete iFileStore;
-    iFileStore = NULL;
-	iFileStore = CPermanentFileStore::ReplaceL(iFs, aFile, EFileRead | EFileWrite | EFileShareExclusive);
-	iFileStore->SetTypeL(KPermanentFileStoreLayoutUid);
-
-	TCleanupItem cleanupStore(RevertStore, iFileStore);
-	CleanupStack::PushL(cleanupStore);
-	
-	// Create root stream - just contains id of info stream
-	RStoreWriteStream rootStream;
-	iRootStreamId = rootStream.CreateLC(*iFileStore);
-	iFileStore->SetRootL(iRootStreamId);
-	WriteKeysToStoreL(rootStream);
-	iFileStore->CommitL();
-	CleanupStack::PopAndDestroy(&rootStream);
-	CleanupStack::Pop(); // cleanupStore
-	}
-
-/**
- * Copies the keys stored in the instance to inputted write stream.
- * 
- * This invokes the CKeyDetails::ExternalizeL() function.
- */
-void CCryptoTokenHai::WriteKeysToStoreL(RStoreWriteStream& aRootStream)
-	{
-	TInt keyCount = iKeys.Count();
-	aRootStream.WriteInt32L(keyCount);
-
-	for (TInt index = 0; index < keyCount; index++)
-		{
-		aRootStream << *iKeys[index];
-		}
-	aRootStream.CommitL();
-	}
-
-/**
- * Copies the keys present in the read store to instance of class.
- * 
- * This eventually invokes the CKeyDetails::InternalizeL() function.
- */
-void CCryptoTokenHai::ReadKeysFromStoreL()
-	{
-	RStoreReadStream rootStream;
-	
-	rootStream.OpenLC(*iFileStore, iRootStreamId);
-	TInt keyCount = rootStream.ReadInt32L();
-
-	for (TInt index = 0; index < keyCount; index++)
-		{
-		CKeyDetails* keyDetails = CKeyDetails::NewL(rootStream);
-		iKeys.Append(keyDetails);
-		}
-	CleanupStack::PopAndDestroy(&rootStream);
-	}
-
-/**
- * This is a cleanup item that reverts the store.
- */
-void CCryptoTokenHai::RevertStore(TAny* aStore)
-	{
-	CPermanentFileStore* store = reinterpret_cast<CPermanentFileStore*>(aStore);
-	TRAP_IGNORE(store->RevertL());
-	}
-
-/**
- * Compacts the store.
- */
-void CCryptoTokenHai::CompactStore()
-    {
-    ASSERT(iFileStore);
-    TRAP_IGNORE(iFileStore->ReclaimL(); iFileStore->CompactL());
-    }
-
-/**
- * Populates the list of keys based on the input filter.
- * 
- * @param aFilter Set of conditions to be used to decide which keys 
- * should be listed
- * @param aKeys Output param. Contains the array of keys which fulfil 
- * criteria mentioned in filter. Caller should take responsibility of 
- * this array.
- * 
- * @leave Any of the system wide error codes.
- * 
- * @note Though Crypto Token HAI internally operates in CKeyDetails, 
- * this function returns CCTKeyInfo array.
- */
-EXPORT_C void CCryptoTokenHai::ListL(const TCTKeyAttributeFilter&  aFilter , 
-                RPointerArray<CCTKeyInfo>& aKeys) const
-    {
-    TInt count = iKeys.Count();
-    for(TInt index = 0 ;index < count; ++ index)
-    	{
-    	const CKeyDetails* keyDetails = iKeys[index];
-    	
-    	if(KeyMatchesFilterL(*keyDetails,aFilter))
-    		{
-			MCTAuthenticationObject* authObject = NULL;
-			HBufC8* attribute = keyDetails->PKCS8AttributeSet().AllocLC();
-			HBufC* label = keyDetails->Label().AllocLC();
-			
-			CCTKeyInfo* keyInfo = CCTKeyInfo::NewL(
-					keyDetails->ID(),keyDetails->Usage(),keyDetails->Size(),
-					authObject,label,iToken,keyDetails->Handle(),keyDetails->UsePolicy(),
-					keyDetails->ManagementPolicy(),keyDetails->Algorithm(),keyDetails->AccessType(),
-					keyDetails->Native(),keyDetails->StartDate(),keyDetails->EndDate(),attribute);
-			
-			CleanupStack::Pop(2, attribute); // label
-			CleanupReleasePushL(*keyInfo);
-						
-			User::LeaveIfError(aKeys.Append(keyInfo));
-			CleanupStack::Pop(keyInfo); 
-			
-			}
-    	}
-    	
-    }
-
-/**
- * Takes in a filter and key details and decides if key fulfils the 
- * filter criteria.
- * 
- * @param aInfo The Key Details
- * @param aFilter Filter specifying the conditions to be satisfied for 
- * listing the keys.
- * 
- * @retval ETrue if key satisfies the conditions specified in filter
- * @retval EFalse otherwise.
- * 
- * @leave KErrArgument If there is an issue in policy filter.
- */
-TBool CCryptoTokenHai::KeyMatchesFilterL(const CKeyDetails& aInfo,
-										   const TCTKeyAttributeFilter& aFilter) const
-	{
-		
-	if (aFilter.iKeyId.Length() && aFilter.iKeyId != aInfo.ID())
-		{
-		return EFalse;
-		}
-
-	if (aFilter.iUsage != EPKCS15UsageAll)
-		{
-		if ((aInfo.Usage() & aFilter.iUsage) == 0)
-			return EFalse;
-		}
-
-	if (aFilter.iKeyAlgorithm != CCTKeyInfo::EInvalidAlgorithm && 
-		aFilter.iKeyAlgorithm != aInfo.Algorithm())
-		{
-		return EFalse;
-		}
-	
-	switch (aFilter.iPolicyFilter)
-		{
-		case TCTKeyAttributeFilter::EAllKeys:
-			// All keys pass
-			break;
-			   
-		case TCTKeyAttributeFilter::EUsableKeys:
-			if (!aInfo.UsePolicy().CheckPolicy(RThread()))
-				{
-				return EFalse;
-				}
-			break;
-		case TCTKeyAttributeFilter::EManageableKeys:
-			// As this key store implementation is a hardware simulation,
-			// the support for managing through software interface has been diabled.
-			return EFalse;
-
-		case TCTKeyAttributeFilter::EUsableOrManageableKeys:
-			if (!aInfo.UsePolicy().CheckPolicy(RThread()) &&
-				!aInfo.ManagementPolicy().CheckPolicy(RThread()))
-				{
-				return EFalse;
-				}
-			break;
-						
-		default:
-			User::Leave(KErrArgument);
-		}
-
-	return ETrue;
-	}
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tcryptotokenhai/tcryptotokenhai.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,93 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* This class implements the reference Crypto Token Hardware Abstraction 
-* Interface (HAI). It is just intended to show how operations using 
-* device keys can be performed using crypto token framework. In the 
-* real world scenario, this HAI should be replaced by device drivers 
-* by the licensees. In such a case, all the operations performed by 
-* the replacing class would be performed in Kernel Space.
-*
-*/
-
-
-/**
- * @file
- * @internalComponent
- * @released
- */
-#ifndef CCRYPTOTOKENHAI_H
-#define CCRYPTOTOKENHAI_H
-
-#include <e32base.h>
-#include <f32file.h>
-#include <S32FILE.H>
-#include <mctkeystore.h>
-
-class CKeyDetails;
-class MCTToken;
-
-namespace CryptoSpi
-	{
-	class CSigner;
-	}
-
-NONSHARABLE_CLASS(CCryptoTokenHai) : public CBase
-	{
-	public:
-		IMPORT_C static CCryptoTokenHai* NewLC(MCTToken* aToken);
-		IMPORT_C static CCryptoTokenHai* NewL(MCTToken* aToken);
-		IMPORT_C ~CCryptoTokenHai();
-		
-	public:
-		IMPORT_C void DecryptL(TInt aHandle,
-								const TDesC8& aCiphertext,
-								HBufC8*& aPlaintext );
-	
-		IMPORT_C void SignL( 	TInt aHandle,
-								const TDesC8& aPlaintext,
-								HBufC8*& aSignature );
-	
-		IMPORT_C TInt KeyPresent( TInt aHandle );
-		IMPORT_C void ExportPrivateKeyL( TInt aHandle, HBufC8*& aKey );
-		IMPORT_C void ExportPublicKeyL( TInt aHandle, HBufC8*& aKey );
-		IMPORT_C void ImportKeyL( const TDesC& aLabel, const TDesC8& aPrivateKey, const TDesC8& aPublicKey );
-		IMPORT_C void ListL(const TCTKeyAttributeFilter& aFilter, RPointerArray<CCTKeyInfo>& aKeys) const;
-		
-	private:
-		void ConstructL();
-		CCryptoTokenHai(MCTToken& aToken);
-	    void OpenStoreL();
-	    void OpenStoreInFileL(const TDesC& aFile);
-	    void CreateStoreInFileL(const TDesC& aFile);
-	    void MakePrivateFilenameL(RFs& aFs, const TDesC& aLeafName, TDes& aNameOut);
-		void EnsurePathL(RFs& aFs, const TDesC& aFile);
-		void MakePrivateROMFilenameL(RFs& aFs, const TDesC& aLeafName, TDes& aNameOut);
-		void CopyL(RFs& aFs, const TDesC& aSouce, const TDesC& aDest);
-		void CompactStore();
-		static void RevertStore(TAny* aStore);
-		void ReadKeysFromStoreL();
-		TBool KeyMatchesFilterL(const CKeyDetails& aInfo, const TCTKeyAttributeFilter& aFilter) const;
-		void CopyStoreFromROML(const TDesC& fullPath, TInt result);
-		void WriteKeysToStoreL(RStoreWriteStream& aRootStream);
-		
-	private:
-		RPointerArray<CKeyDetails> iKeys;
-		RFs iFs;
-		CPermanentFileStore* iFileStore;
-		TStreamId iRootStreamId;
-		MCTToken& iToken;
-	};
-
-#endif	//	CCRYPTOTOKENHAI_H
--- a/cryptoservices/filebasedcertificateandkeystores/test/tcryptotokenhai/tcryptotokenhai.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,56 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Reference crypto token implementation
-*
-*/
-
-
-
-/**
- @file
-*/
-
-// reference implementation for hardware adaptation interface
-
-target tcryptotokenhai.dll
-targettype dll
-
-// ECom Dll recognition UID followed by the unique UID for this dll
-UID 0x10009D8D 0x101Faaa1
-VENDORID 0x70000001
-CAPABILITY All -TCB
-
-DEFFILE tcryptotokenhai.def
-
-SOURCEPATH	.
-SOURCE tcryptotokenhai.cpp
-
-SOURCEPATH ../thwkeystore/common
-SOURCE tkeydetails.cpp
-
-OS_LAYER_SYSTEMINCLUDE
-
-USERINCLUDE .
-USERINCLUDE ../thwkeystore/common
-USERINCLUDE ../../../../crypto/weakcryptospi/inc/spi
-
-LIBRARY	euser.lib 
-LIBRARY cryptospi.lib
-LIBRARY ctframework.lib
-LIBRARY efsrv.lib
-LIBRARY estor.lib
-
-SMPSAFE
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/thwkeystore/client/101faaaa.rss	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,45 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Registration data for reference hardware plugin dll
-*
-*/
-
-
-#include <cryptotokenregistryinfo.rh>
-
-RESOURCE REGISTRY_INFO theInfo
-	{
-	dll_uid = 0x101Faaaa;
-	interfaces = 
-		{
-		INTERFACE_INFO
-			{
-			interface_uid = CT_INTERFACE_UID;
-			implementations = 
-				{
-				BINARY_IMPLEMENTATION_INFO
-					{
-					implementation_uid = 0x101FFFF4;
-					version_no = 1;
-					display_name = "Test reference hardware plugin implementation";
-					default_data = { 0x34, 0x73, 0x1F, 0x10,	//	MKeyStore
-									 0x35, 0x73, 0x1F, 0x10 };	//	KeyStore Manager
-					opaque_data = {	CT_SOFTWARE,CT_FALSE,
-									CT_REMOVABLE, CT_FALSE};
-					}
-				};
-			}
-		};
-	}
--- a/cryptoservices/filebasedcertificateandkeystores/test/thwkeystore/client/thwkeystore.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,42 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include <e32std.h>
-#include <ecom/implementationproxy.h>
-#include "thwtokentypeclient.h"
-
-const TInt KHardwareImplementationId = 0x101FFFF4;
-
-static CCTTokenType* NewFunctionL();
-
-CCTTokenType* NewFunctionL()
-	{
-	CCTTokenType* hardwareKeyStore = CHardwareTokenTypeClient::NewL();
-	return hardwareKeyStore;
-	}
-
-const TImplementationProxy ImplementationTable[] =
-	{
-	IMPLEMENTATION_PROXY_ENTRY(KHardwareImplementationId, NewFunctionL)
-	};
-
-EXPORT_C const TImplementationProxy* ImplementationGroupProxy(TInt& aTableCount)
-	{
-	aTableCount = sizeof(ImplementationTable) / sizeof(TImplementationProxy);
-	return (ImplementationTable);
-	}
--- a/cryptoservices/filebasedcertificateandkeystores/test/thwkeystore/client/thwkeystoreclient.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,503 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Contains the implementation of CHardwareKeyStoreClient. In this 
-* class only the newly added APIs for WMDRM have been implemented. 
-* So this is not a full functional crypto token.
-*
-*/
-
-
-#include "thwkeystoreclient.h"
-#include "thwkeystoredefs.h"
-#include "keys.h"
-#include <cryptospi/cryptospidef.h>
-#include "cryptoasymmetriccipherapi.h"
-#include "cryptosignatureapi.h"
-#include <s32mem.h>
-
-MCTTokenInterface* CHardwareKeyStoreClient::NewKeyStoreInterfaceL(MCTToken& aToken)
-	{
-	//	Destroyed by MCTTokenInterface::DoRelease() 
-	CHardwareKeyStoreClient* me = new (ELeave) CHardwareKeyStoreClient(aToken);
-	CleanupStack::PushL(me);
-	me->ConstructL();
-	CleanupStack::Pop(me);
-	return (me);
-	}
-
-CHardwareKeyStoreClient::CHardwareKeyStoreClient(MCTToken& aToken)
-	: CActive(EPriorityNormal), 
-	// Reference count starts at one as we're always created and returned by a GetInterface() call on the token
-	iRefCount(1),
-	iToken(aToken)
-	{
-	}
-
-void CHardwareKeyStoreClient::ConstructL()
-	{
-	CActiveScheduler::Add(this);
-	iCryptoTokenHai = CCryptoTokenHai::NewL(&iToken);
-	}
-
-CHardwareKeyStoreClient::~CHardwareKeyStoreClient()
-	{
-	Cancel();
-	delete iCryptoTokenHai;
-	}
-
-MCTToken& CHardwareKeyStoreClient::Token()
-	{
-	return iToken;
-	}
-
-void CHardwareKeyStoreClient::AddRef()
-	{
-	++iRefCount;
-	
-	iToken.AddRef();
-	}
-
-void CHardwareKeyStoreClient::DoRelease()
-	{
-	--iRefCount;
-
-	ASSERT(iRefCount >= 0);
-	if (iRefCount == 0)
-		{
-		MCTTokenInterface::DoRelease();
-		}
-	}
-
-void CHardwareKeyStoreClient::ReleaseObject(const TCTTokenObjectHandle& /*aHandle*/)
-	{
-	}
-
-void CHardwareKeyStoreClient::RunL()
-	{
-	User::LeaveIfError(iStatus.Int());
-	
-	switch(iState)
-		{
-		case ECreateSigner:
-		{
-			if(iCryptoTokenHai->KeyPresent(iHandle.iObjectId) != KErrNotFound)
-			    {
-                CryptoSpi::TKeyProperty keyProperty;
-                keyProperty.iAlgorithmUid = CryptoSpi::KEccSignerUid;
-                    
-                CryptoSpi::CCryptoParams* keyParameters = CryptoSpi::CCryptoParams::NewLC();
-                keyParameters->AddL(iHandle.iObjectId, CryptoSpi::KPassedHandleToKeyUid);
-                CryptoSpi::CKey* newKey = CryptoSpi::CKey::NewL(keyProperty, *keyParameters);
-                CleanupStack::PushL(newKey);
-                
-                CryptoSpi::CSignatureFactory::CreateSignerL( *(iClientBuffer.iSigner), CryptoSpi::KEccSignerUid, 
-                                                            *newKey, CryptoSpi::KPaddingModeNoneUid, 
-                                                            NULL );
-                
-                CleanupStack::PopAndDestroy(newKey);
-                CleanupStack::PopAndDestroy(keyParameters);
-			    }
-			else
-                {
-                User::Leave(KErrNotFound);
-                }
-		}
-		break;
-		case ECreateAsymmetricCipher:
-		{
-			if(iCryptoTokenHai->KeyPresent(iHandle.iObjectId) != KErrNotFound)
-                {
-                CryptoSpi::TKeyProperty keyProperty;
-                keyProperty.iAlgorithmUid = CryptoSpi::KEccCipherUid;
-                    
-                CryptoSpi::CCryptoParams* keyParameters = CryptoSpi::CCryptoParams::NewLC();
-                keyParameters->AddL(iHandle.iObjectId, CryptoSpi::KPassedHandleToKeyUid);
-                CryptoSpi::CKey* newKey = CryptoSpi::CKey::NewL(keyProperty, *keyParameters);
-                CleanupStack::PushL(newKey);
-                
-                CryptoSpi::CAsymmetricCipherFactory::CreateAsymmetricCipherL(
-                                    *(iClientBuffer.iAsymmetricCipher), CryptoSpi::KEccCipherUid,
-                                    *newKey, CryptoSpi::KCryptoModeDecryptUid,
-                                    CryptoSpi::KPaddingModeNoneUid, NULL);
-                
-                CleanupStack::PopAndDestroy(newKey);
-                CleanupStack::PopAndDestroy(keyParameters);
-                }
-			else
-			    {
-			    User::Leave(KErrNotFound);
-			    }
-		}
-		break;
-		case EDecryptInHardware:
-        {
-            if(iCryptoTokenHai->KeyPresent(iHandle.iObjectId) != KErrNotFound)
-                {
-                iCryptoTokenHai->DecryptL(iHandle.iObjectId, *iPtr, *(iClientBuffer.decryptedText));
-                }
-            else
-                {
-                User::Leave(KErrNotFound);
-                }
-        }
-        break;
-        case ESignInHardware:
-        	{
-            if(iCryptoTokenHai->KeyPresent(iHandle.iObjectId) != KErrNotFound)
-                {
-                HBufC8* signature;
-                iCryptoTokenHai->SignL(iHandle.iObjectId, *iPtr, signature);
-                CleanupStack::PushL(signature);
-                iClientBuffer.iSignature->AddL(signature->Des(), CryptoSpi::KEccKeyTypeUid);
-                CleanupStack::PopAndDestroy(signature);
-                }
-            else
-                {
-                User::Leave(KErrNotFound);
-                }
-            break;
-        	}
-        		
-		case EExportKey:
-			{
-		    if(iCryptoTokenHai->KeyPresent(iHandle.iObjectId) != KErrNotFound)
-		        {
-		        iCryptoTokenHai->ExportPublicKeyL(iHandle.iObjectId, *iPublicKey);
-		        }
-		    else
-		        {
-		        User::Leave(KErrNotFound);
-		        }
-		    break;
-			}
-		default:
-			User::Leave(KErrArgument);
-		}
-	
-	User::RequestComplete(iClientStatus,KErrNone);	
-	}
-
-void CHardwareKeyStoreClient::DoCancel()
-	{
-	User::RequestComplete(iClientStatus,KErrCancel);	
-	}
-
-TInt CHardwareKeyStoreClient::RunError(TInt aError)
-    {
-    User::RequestComplete(iClientStatus, aError);
-    return KErrNone;
-    }
-
-/*
- * MKeystore interfaces
- */	
-	
-void CHardwareKeyStoreClient::List(
-		RMPointerArray<CCTKeyInfo>& aKeys, 
-		const TCTKeyAttributeFilter& aFilter, 
-		TRequestStatus& aStatus)
-	{
-	iClientStatus = &aStatus;
-    *iClientStatus = KRequestPending;
-    TRequestStatus* status = &aStatus;
-    TRAPD(err,iCryptoTokenHai->ListL(aFilter,aKeys));
-    User::RequestComplete(status, err);
-    }
-
-void CHardwareKeyStoreClient::CancelList()
-	{
-	
-	}
-
-void CHardwareKeyStoreClient::GetKeyInfo(TCTTokenObjectHandle /*aHandle*/, CCTKeyInfo*& /*aInfo*/, 
-								   TRequestStatus& aStatus)
-	{	
-	TRequestStatus* status = &aStatus;
-	User::RequestComplete(status, KErrNotSupported);
-	}
-
-void CHardwareKeyStoreClient::CancelGetKeyInfo()
-	{
-	// synchronous, nothing to do
-	}
-
-void CHardwareKeyStoreClient::Open(const TCTTokenObjectHandle& /*aHandle*/, 
-							 MRSASigner*& /*aSigner*/, 
-							 TRequestStatus& aStatus)
-	{
-	TRequestStatus* status = &aStatus;
-	User::RequestComplete(status, KErrNotSupported);
-	}
-
-void CHardwareKeyStoreClient::Open(const TCTTokenObjectHandle& /*aHandle*/, 
-							 MCTSigner<CDSASignature*>*& /*aSigner*/, 
-							 TRequestStatus& aStatus)
-	{
-	TRequestStatus* status = &aStatus;
-	User::RequestComplete(status, KErrNotSupported);
-	}
-
-void CHardwareKeyStoreClient::Open(const TCTTokenObjectHandle& /*aHandle*/, 
-							 MCTDecryptor*& /*aDecryptor*/,
-							 TRequestStatus& aStatus)
-	{
-	TRequestStatus* status = &aStatus;
-	User::RequestComplete(status, KErrNotSupported);
-	}
-
-void CHardwareKeyStoreClient::Open(const TCTTokenObjectHandle& /*aHandle*/, 
-							 MCTDH*& /*aDH*/, TRequestStatus& aStatus)
-	{
-	TRequestStatus* status = &aStatus;
-	User::RequestComplete(status, KErrNotSupported);
-	}
-
-void CHardwareKeyStoreClient::CancelOpen()
-	{
-	// synchronous, nothing to do
-	}
-
-/** Returns the public key in DER-encoded ASN-1 */
-void CHardwareKeyStoreClient::ExportPublic(const TCTTokenObjectHandle& aHandle,
-									 HBufC8*& aPublicKey,
-									 TRequestStatus& aStatus)
-	{
-	//TRequestStatus* status = &aStatus;
-	iClientStatus = &aStatus;
-	
-	iStatus = KRequestPending;
-    *iClientStatus = KRequestPending;
-    iPublicKey = &aPublicKey;
-    iHandle = aHandle;
-    TRequestStatus* status = &iStatus;
-    SetActive();
-    iState = EExportKey;
-    
-    User::RequestComplete(status, KErrNone);
-	}
-
-void CHardwareKeyStoreClient::CancelExportPublic()
-	{
-	// synchronous, nothing to do
-	}
-
-//	*********************************************************************************
-//	MCTKeyStoreManager
-//	*********************************************************************************
-void CHardwareKeyStoreClient::CreateKey(CCTKeyInfo*& /*aReturnedKey*/, TRequestStatus& aStatus)
-	{
-	TRequestStatus* status = &aStatus;
-	User::RequestComplete(status, KErrNotSupported);
-	}
-
-void CHardwareKeyStoreClient::CancelCreateKey()
-	{
-	}
-
-/**
- * This function is not implemented since in the WMDRM case, device 
- * are preprovisioned inside the device. Hence implementing this 
- * function is not required.
- */
-void CHardwareKeyStoreClient::ImportKey(const TDesC8& /*aKey*/, CCTKeyInfo*& /*aReturnedKey*/, TRequestStatus& aStatus)
-	{
-	TRequestStatus* status = &aStatus;
-	User::RequestComplete(status, KErrNotSupported);
-	}
-
-void CHardwareKeyStoreClient::CancelImportKey()
-	{
-	}
-
-void CHardwareKeyStoreClient::ImportEncryptedKey(const TDesC8& /*aKey*/, CCTKeyInfo*& /*aReturnedKey*/, TRequestStatus& aStatus)
-	{
-	TRequestStatus* status = &aStatus;
-	User::RequestComplete(status, KErrNotSupported);
-	}
-
-void CHardwareKeyStoreClient::CancelImportEncryptedKey()
-	{
-	}
-
-void CHardwareKeyStoreClient::ExportKey(TCTTokenObjectHandle /*aHandle*/, HBufC8*& /*aKey*/, TRequestStatus& aStatus)
-	{
-	TRequestStatus* status = &aStatus;
-	User::RequestComplete(status, KErrNotSupported);
-	}
-
-void CHardwareKeyStoreClient::CancelExportKey()
-	{
-	}
-
-void CHardwareKeyStoreClient::ExportEncryptedKey(TCTTokenObjectHandle /*aHandle*/, const CPBEncryptParms& /*aParams*/,  HBufC8*& /*aKey*/, TRequestStatus& aStatus)
- 	{
-	TRequestStatus* status = &aStatus;
-	User::RequestComplete(status, KErrNotSupported);
- 	}
-
-void CHardwareKeyStoreClient::CancelExportEncryptedKey()
-	{
-	}
-
-void CHardwareKeyStoreClient::DeleteKey(TCTTokenObjectHandle /*aHandle*/, TRequestStatus& aStatus)
-	{
-	TRequestStatus* status = &aStatus;
-	User::RequestComplete(status, KErrNotSupported);
-	}
-
-void CHardwareKeyStoreClient::CancelDeleteKey()
-	{
-	// synchronous, nothing to do
-	}
-
-void CHardwareKeyStoreClient::SetUsePolicy(TCTTokenObjectHandle /*aHandle*/, 
-									 const TSecurityPolicy& /*aPolicy*/,
-									 TRequestStatus& aStatus)
-	{
-	TRequestStatus* status = &aStatus;
-	User::RequestComplete(status, KErrNotSupported);
-	}
-
-void CHardwareKeyStoreClient::CancelSetUsePolicy()
-	{
-	// synchronous, nothing to do
-	}
-
-void CHardwareKeyStoreClient::SetManagementPolicy(TCTTokenObjectHandle /*aHandle*/, 
-											const TSecurityPolicy& /*aPolicy*/,
-											TRequestStatus& aStatus)
-	{
-	TRequestStatus* status = &aStatus;
-	User::RequestComplete(status, KErrNotSupported);
-	}
-
-void CHardwareKeyStoreClient::CancelSetManagementPolicy()
-	{
-	// synchronous, nothing to do
-	}
-
-/**
- * @todo
- * This interface should return KErrNotSupported but because of the way 
- * it has been implemented in unifiedkeystore this is returning 
- * KErrNone. This should be fixed later.
- */ 
-void CHardwareKeyStoreClient::SetPassphraseTimeout(TInt /*aTimeout*/, TRequestStatus& aStatus)
-	{
-	TRequestStatus* status = &aStatus;
-	User::RequestComplete(status, KErrNone);
-	}
-
-void CHardwareKeyStoreClient::CancelSetPassphraseTimeout()
-	{
-	// No point cancelling, not asynchronous
-	}
-
-/**
- * @todo
- * This interface should return KErrNotSupported but because of the way 
- * it has been implemented in unifiedkeystore this is returning 
- * KErrNone. This should be fixed later.
- */ 
-void CHardwareKeyStoreClient::Relock(TRequestStatus& aStatus)
-	{
-	TRequestStatus* status = &aStatus;
-	User::RequestComplete(status, KErrNone);
-	}
-
-void CHardwareKeyStoreClient::CancelRelock()
-	{
-	// No point cancelling, not asynchronous
-	}
-
-
-void CHardwareKeyStoreClient::Open(	const TCTTokenObjectHandle& aHandle,
-									CryptoSpi::CSigner*& aSigner,
-									TRequestStatus& aStatus )
-	{
-	iClientStatus = &aStatus;    
-    iStatus = KRequestPending;
-    *iClientStatus = KRequestPending;
-    iClientBuffer.iSigner = &aSigner;
-    iHandle = aHandle;
-    TRequestStatus* status = &iStatus;
-    SetActive();
-    iState = ECreateSigner;
-    User::RequestComplete(status, KErrNone);
-	}
-
-void CHardwareKeyStoreClient::Open(	const TCTTokenObjectHandle& aHandle,
-									CryptoSpi::CAsymmetricCipher*& aAsymmetricCipher,
-									TRequestStatus& aStatus )
-	{
-    iClientStatus = &aStatus;    
-    iStatus = KRequestPending;
-    *iClientStatus = KRequestPending;
-    iClientBuffer.iAsymmetricCipher = &aAsymmetricCipher;
-    iHandle = aHandle;
-    TRequestStatus* status = &iStatus;
-    SetActive();
-    iState = ECreateAsymmetricCipher;
-    User::RequestComplete(status, KErrNone);
-	}
-
-
-void CHardwareKeyStoreClient::Decrypt(	const TCTTokenObjectHandle& aHandle,
-        const TDesC8& aCiphertext,
-										HBufC8*& aPlaintextPtr,
-										TRequestStatus& aStatus )
-	{
-    iClientStatus = &aStatus;    
-    iStatus = KRequestPending;
-    *iClientStatus = KRequestPending;
-    iHandle = aHandle;
-    iPtr = &aCiphertext;
-    iClientBuffer.decryptedText = &aPlaintextPtr;
-    TRequestStatus* status = &iStatus;
-    SetActive();
-    iState = EDecryptInHardware;
-    User::RequestComplete(status, KErrNone);
-	}
-
-void CHardwareKeyStoreClient::Sign(	const TCTTokenObjectHandle& aHandle,
-        const TDesC8& aPlaintext,
-										CryptoSpi::CCryptoParams*& aSignature,
-										TRequestStatus& aStatus )
-	{
-    iClientStatus = &aStatus;    
-    iStatus = KRequestPending;
-    *iClientStatus = KRequestPending;
-    iHandle = aHandle;
-    iPtr = &aPlaintext;
-    iClientBuffer.iSignature = aSignature;
-    TRequestStatus* status = &iStatus;
-    SetActive();
-    iState = ESignInHardware;
-    User::RequestComplete(status, KErrNone);
-	}
-
-
-void CHardwareKeyStoreClient::ImportKey(	TPtr /* aLabel */, 
-											TPtr8 /* aPrivateKey */, TPtr8 /* aPublicKey */ , 
-											TRequestStatus& aStatus)
-	{
-    TRequestStatus* status = &aStatus;
-    User::RequestComplete(status, KErrNone);
-	}
-
-
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/thwkeystore/client/thwkeystoreclient.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,175 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Implements the MCTKeyStoreManager interface.
-*
-*/
-
-
-/**
- * @file
- * @internalComponent
- * @released
- */
-#ifndef CHARDWAREKEYSTORECLIENT_H
-#define CHARDWAREKEYSTORECLIENT_H
-
-#include <mctkeystoremanager.h>
-
-#include "cryptoasymmetriccipherapi.h"
-#include <asymmetric.h>
-#include <cryptospi/cryptoparams.h>
-#include "thwkeystoredefs.h"
-#include "tcryptotokenhai.h"
-
-/**
- * Implements the MCTKeyStoreManager interface.
- *
- * The class implements the keystore manager token interface for the software
- * keystore.  It will be created and owned by the unified keystore.
- */
-NONSHARABLE_CLASS(CHardwareKeyStoreClient) : public CActive, public MCTKeyStoreManager
-{
-public:
-	static MCTTokenInterface* NewKeyStoreInterfaceL(MCTToken& aToken);
-
-public:
-	virtual ~CHardwareKeyStoreClient();
-	void AddRef();
-
-public:
-	void RunL();
-	virtual void DoCancel();
-	TInt RunError(TInt aError);
-	
-public:
-//	MKeyStore
-	virtual void List(RMPointerArray<CCTKeyInfo>& aKeys, const TCTKeyAttributeFilter& aFilter, TRequestStatus& aStatus);
-	virtual void CancelList();
-	virtual void GetKeyInfo(TCTTokenObjectHandle aHandle, CCTKeyInfo*& aInfo, TRequestStatus& aStatus);
-	virtual void CancelGetKeyInfo();
-	
-	// Open an RSA key for signing
-	virtual void Open(const TCTTokenObjectHandle& aHandle, 
-					  MRSASigner*& aSigner,
-					  TRequestStatus& aStatus);
-	// Open a DSA key for signing
-	virtual void Open(const TCTTokenObjectHandle& aHandle, 
-					  MDSASigner*& aSigner, 
-					  TRequestStatus& aStatus);
-	// Open a RSA key for private decryption
-	virtual void Open(const TCTTokenObjectHandle& aHandle, 
-					  MCTDecryptor*& aDecryptor,
-					  TRequestStatus& aStatus);
-	// Open a DH key for key agreement
-	virtual void Open(const TCTTokenObjectHandle& aHandle, 
-					  MCTDH*& aDH, TRequestStatus& aStatus);
-
-
-	// Cancels an ongoing open request
-	virtual void CancelOpen();
-	
-	// Returns the public key in DER-encoded ASN-1
-	virtual void ExportPublic(const TCTTokenObjectHandle& aHandle,
-							  HBufC8*& aPublicKey,
-							  TRequestStatus& aStatus);
-	virtual void CancelExportPublic();
-
-	virtual void Open(const TCTTokenObjectHandle& aHandle,
-		                  CryptoSpi::CSigner*& aSigner,
-		                  TRequestStatus& aStatus);
-	
-	virtual void Open(const TCTTokenObjectHandle& aHandle,
-		                  CryptoSpi::CAsymmetricCipher*& asymmetricCipherObj,
-		                  TRequestStatus& aStatus);
-	
-	virtual void Decrypt(const TCTTokenObjectHandle& aHandle,
-                            const TDesC8& aCiphertext,
-		                       HBufC8*& aPlaintextPtr,
-		                       TRequestStatus& aStatus);
-	
-	virtual void Sign(const TCTTokenObjectHandle& aHandle,
-                           const TDesC8& aPlaintext,
-		                    CryptoSpi::CCryptoParams*& aSignature,
-		                    TRequestStatus& aStatus);
-
-public:
-//	MCTKeyStoreManager
-	virtual void CreateKey(CCTKeyInfo*& aReturnedKey, TRequestStatus& aStatus);
-	virtual void CancelCreateKey();
-	virtual void ImportKey(const TDesC8& aKey, CCTKeyInfo*& aReturnedKey, TRequestStatus& aStatus);
-	virtual void CancelImportKey();
-	virtual void ImportEncryptedKey(const TDesC8& aKey, CCTKeyInfo*& aReturnedKey, TRequestStatus& aStatus);
-	virtual void CancelImportEncryptedKey();
-	virtual void ExportKey(TCTTokenObjectHandle aHandle, HBufC8*& aKey, TRequestStatus& aStatus); 
-	virtual void CancelExportKey();
-	virtual void ExportEncryptedKey(TCTTokenObjectHandle aHandle, const CPBEncryptParms& aParams, HBufC8*& aKey, TRequestStatus& aStatus);
-	virtual void CancelExportEncryptedKey();
-	virtual void DeleteKey(TCTTokenObjectHandle aHandle, TRequestStatus& aStatus);
-	virtual void CancelDeleteKey();	
-	virtual void SetUsePolicy(TCTTokenObjectHandle aHandle, const TSecurityPolicy& aPolicy, TRequestStatus& aStatus);
-	virtual void CancelSetUsePolicy();
-	virtual void SetManagementPolicy(TCTTokenObjectHandle aHandle, const TSecurityPolicy& aPolicy, TRequestStatus& aStatus);
-	virtual void CancelSetManagementPolicy();
-	virtual void SetPassphraseTimeout(TInt aTimeout, TRequestStatus& aStatus);
-	virtual void CancelSetPassphraseTimeout();	
-	virtual void Relock(TRequestStatus& aStatus);
-	virtual void CancelRelock();	
-
-	void ReleaseObject(const TCTTokenObjectHandle& aObject);
-
-public:
-	/**
-	 * this method os not a part of the framework, has been added so 
-	 * that addition of keys to the hardware can be simulated for 
-	 * testing purposes.
-	 */ 
-	void ImportKey(	TPtr aLabel, TPtr8 aPrivateKey, 
-					TPtr8 aPublicKey , TRequestStatus& aStatus);
-
-public:	
-//	From MCTTokenInterface
-	virtual MCTToken& Token();
-
-protected:
-//	From MCTTokenInterface
-	virtual void DoRelease();
-
-protected:
-	CHardwareKeyStoreClient(MCTToken& aToken);
-	virtual void ConstructL();
-
-private:
-	TInt iRefCount;
-	MCTToken& iToken;					// The token we belong to
-	THwKeystoreMessages iState;
-	TRequestStatus* iClientStatus;
-	TCTTokenObjectHandle iHandle;
-	RPointerArray<CCTKeyInfo>* iKeys;
-	TBuf8<256> iBuffer;
-	CCryptoTokenHai* iCryptoTokenHai;
-	HBufC8** iPublicKey;
-	const TDesC8* iPtr; 
-	TCTKeyAttributeFilter iFilter;
-	union
-	{
-	CryptoSpi::CSigner** iSigner;
-	CryptoSpi::CAsymmetricCipher** iAsymmetricCipher;
-	CryptoSpi::CCryptoParams* iSignature;
-	HBufC8** decryptedText;
-	}iClientBuffer;
-	
-};
-
-#endif	//	CHARDWAREKEYSTORECLIENT_H
--- a/cryptoservices/filebasedcertificateandkeystores/test/thwkeystore/client/thwkeystoreclient.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,63 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Reference plugin for simulating crypto token hardware plugin. 
-*
-*/
-
-
-
-target 101faaaa.dll
-targettype plugin
-
-// ECom Dll recognition UID followed by the unique UID for this dll
-UID 0x10009D8D 0x101Faaaa
-VENDORID 0x70000001
-CAPABILITY All -TCB
-
-SOURCEPATH	.
-
-SOURCE thwkeystore.cpp
-SOURCE thwkeystoreclient.cpp
-SOURCE thwtokentypeclient.cpp
-SOURCE thwtokenclient.cpp
-
-start resource 101faaaa.rss
-target 101faaaa.rsc
-end
-
-OS_LAYER_SYSTEMINCLUDE
-/*
- * Need to put "/epoc32/include/ecom" as one of the system includes 
- * as cryptotokenregistryinfo.rh has the line, '#include "registryinfo.rh"'
- * in place of '#include <ecom/registryinfo.rh>'
- */
-SYSTEMINCLUDE OS_LAYER_PUBLIC_EXPORT_PATH(ecom)
-
-USERINCLUDE .
-USERINCLUDE	../../../../../crypto/weakcryptospi/inc
-USERINCLUDE	../../../../../crypto/weakcryptospi/inc/spi
-USERINCLUDE ../common
-USERINCLUDE ../../tcryptotokenhai
-
-LIBRARY	euser.lib 
-LIBRARY estor.lib
-LIBRARY ctframework.lib
-LIBRARY cryptospi.lib
-LIBRARY scsclient.lib 
-LIBRARY fstokenshared.lib
-LIBRARY tcryptotokenhai.lib
-
-SMPSAFE
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/thwkeystore/client/thwtokenclient.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,88 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include "thwtokenclient.h"
-#include "thwkeystoreclient.h"
-
-_LIT(KTokenString, "Hardware plugin implementation");
-
-
-MCTToken* CHardwareTokenClient::NewL(MCTTokenType* aTokenType)
-	{
-	CHardwareTokenClient* self = new (ELeave) CHardwareTokenClient(aTokenType);
-	return static_cast<MCTToken*>(self);
-	}
-
-CHardwareTokenClient::CHardwareTokenClient(MCTTokenType* aTokenType)
-			:	iTokenType(aTokenType),
-				iRefCount(0)
-	{
-	}
-
-MCTTokenType& CHardwareTokenClient::TokenType()
-	{
-	return *iTokenType;
-	}
-
-const TDesC& CHardwareTokenClient::Label()
-	{
-	return KTokenString();
-	}
-
-TCTTokenHandle CHardwareTokenClient::Handle()
-	{
-	return (TCTTokenHandle(iTokenType->Type(), 0));
-	}
-
-TInt& CHardwareTokenClient::ReferenceCount()
-	{
-	return iRefCount;
-	}
-
-void CHardwareTokenClient::DoGetInterface(TUid aRequiredInterface, MCTTokenInterface*& aReturnedInterface, TRequestStatus& aStatus)
-	{
-	// No longer calls server to get the interface - just creates a client object of the appropriate type
-	TUid userUid = {0x101F7334};
-	TUid managerUid = {0x101F7335};
-
-	aReturnedInterface = NULL;
-	TInt err = KErrGeneral;
-	
-	if( userUid == aRequiredInterface || managerUid == aRequiredInterface )
-		{
-		TRAP(err, aReturnedInterface = CHardwareKeyStoreClient::NewKeyStoreInterfaceL(*this));
-		}
-						
-	if (NULL == aReturnedInterface)
-		{
-		Release();
-		}
-	
-	TRequestStatus* status = &aStatus;
-	User::RequestComplete(status, err);		
-	}
-
-TBool CHardwareTokenClient::DoCancelGetInterface()
-	{//	Not an asynchronous call for current file store, so nothing to do
-	return EFalse;
-	}
-
-const TDesC& CHardwareTokenClient::Information(TTokenInformation /*aRequiredInformation*/)
-	{
-	return KNullDesC;
-	}
--- a/cryptoservices/filebasedcertificateandkeystores/test/thwkeystore/client/thwtokenclient.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,56 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* This class inherits from class MCTToken and implements all the pure 
-* virtual methods exposed by MCTToken. This provides the 
-* MCTTokenInterface and also provides reference counting.
-*
-*/
-
-
-/**
- * @file
- * @internalComponent
- * @released
- */
-#ifndef CHARDWARETOKENCLIENT_H
-#define	CHARDWARETOKENCLIENT_H
-
-#include <ct.h>
-
-NONSHARABLE_CLASS(CHardwareTokenClient) : public CBase, public MCTToken
-{
-public:
-	static MCTToken* NewL(MCTTokenType* aTokenType);
-
-public:	//	From MCTToken
-	virtual MCTTokenType& TokenType();
-	virtual const TDesC& Label();
-	virtual TCTTokenHandle Handle();
-
-protected:	//	From MCTToken
-	virtual TInt& ReferenceCount();
-	virtual void DoGetInterface(TUid aRequiredInterface, MCTTokenInterface*& aReturnedInterface, TRequestStatus& aStatus);
-	virtual TBool DoCancelGetInterface();
-	virtual const TDesC& Information(TTokenInformation aRequiredInformation);
-
-private:
-	CHardwareTokenClient(MCTTokenType* aTokenType);
-
-private:
-	MCTTokenType* iTokenType;
-	TInt iRefCount;
-};
-
-#endif // CHARDWARETOKENCLIENT_H
--- a/cryptoservices/filebasedcertificateandkeystores/test/thwkeystore/client/thwtokentypeclient.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,105 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-*
-*/
-
-
-#include "thwtokentypeclient.h"
-#include "thwtokenclient.h"
-
-_LIT(KTokenDesc, "Default Token");
-	
-CCTTokenType* CHardwareTokenTypeClient::NewL()
-	{
-	//	Destroyed by call to CCTTokenType::Release (refcounted)
-	CHardwareTokenTypeClient* self = new (ELeave) CHardwareTokenTypeClient();
-	CleanupStack::PushL(self);
-	self->ConstructL();
-	CleanupStack::Pop(self);
-
-	return self;
-	}
-
-CHardwareTokenTypeClient::CHardwareTokenTypeClient()
-	{
-	}
-
-CHardwareTokenTypeClient::~CHardwareTokenTypeClient()
-	{
-	}
-
-void CHardwareTokenTypeClient::ConstructL()
-	{
-	}
-	
-void CHardwareTokenTypeClient::List(RCPointerArray<HBufC>& aTokens, TRequestStatus& aStatus)
-	{
-	HBufC* name = NULL;
-	TRAPD(err, name = KTokenDesc().AllocL());
-	
-	if(KErrNone == err)
-		{
-		err = aTokens.Append(name);
-		}
-
-	if(KErrNone != err)
-		{
-		delete name;
-		}
-	
-	TRequestStatus* status = &aStatus;
-	User::RequestComplete(status, err);
-	}
-
-void CHardwareTokenTypeClient::CancelList()
-	{
-	// implementation not asynchronous
-	}
-
-void CHardwareTokenTypeClient::OpenToken(const TDesC& /*aTokenInfo*/, MCTToken*& aToken, TRequestStatus& aStatus)
-	{
-	// Token Information not used. TokenClient will be created for all tokeninfo
-	aToken = NULL;
-	TRAPD(err, aToken = CHardwareTokenClient::NewL(this));
-
-	//	Token opened, increment our reference count
-	if(err == KErrNone)
-		{
-		IncReferenceCount();
-		}
-
-	TRequestStatus* status = &aStatus;
-	User::RequestComplete(status, err);
-	}
-
-void CHardwareTokenTypeClient::OpenToken(TCTTokenHandle /*aHandle*/, MCTToken*& aToken, TRequestStatus& aStatus)
-	{
-	aToken = NULL;
-	TRAPD(err, aToken = CHardwareTokenClient::NewL(this));
-
-	//	Token opened, increment our reference count
-	if(NULL != aToken)
-		{
-		IncReferenceCount();
-		}
-
-	TRequestStatus* status = &aStatus;
-	User::RequestComplete(status, err);
-	}
-
-void CHardwareTokenTypeClient::CancelOpenToken()
-	{
-	// implementation not asynchronous
-	}
--- a/cryptoservices/filebasedcertificateandkeystores/test/thwkeystore/client/thwtokentypeclient.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,59 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* This class inherits from class CCTTokenType which in turn inherits 
-* from the class MCTTokenType. This class implements all the pure 
-* virtual functions exposed by class MCTTokenType. This defines a new 
-* crypto token type.
-*
-*/
-
-
-/**
- * @file
- * @internalComponent
- * @released
- */
-#ifndef CHARDWARETOKENTYPECLIENT_H
-#define CHARDWARETOKENTYPECLIENT_H
-
-#include <ct/ccttokentype.h>
-
-NONSHARABLE_CLASS(CHardwareTokenTypeClient) :  public CCTTokenType
-{
-public:
-	/** Creates a representation of the CCTTokenType
-	 *	Called by ECom or directly accessible.
-	 */
-	static CCTTokenType* NewL();
-
-public:
-	virtual ~CHardwareTokenTypeClient();
-
-public:	//	From MCTTokenType
-	virtual void List(RCPointerArray<HBufC>& aTokens, TRequestStatus& aStatus);
-	virtual void CancelList();
-	virtual void OpenToken(const TDesC& aTokenInfo, MCTToken*& aToken, TRequestStatus& aStatus);
-	virtual void OpenToken(TCTTokenHandle aHandle, MCTToken*& aToken, TRequestStatus& aStatus);
-	virtual void CancelOpenToken();
-
-private:
-	void OpenToken(MCTTokenType* aTokenType);
-
-private:
-	CHardwareTokenTypeClient();
-	void ConstructL();
-};
-
-#endif	//	CHARDWARETOKENTYPECLIENT_H
--- a/cryptoservices/filebasedcertificateandkeystores/test/thwkeystore/common/thwkeystoredefs.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,56 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Contains the messages which the ctf plug-in sends to itself. In a 
-* client server model, these messages will be sent to server.
-*
-*/
-
-
-/**
- @file 
- @internalTechnology
-*/
-
-#ifndef HWKEYSTOREDEFS_H
-#define HWKEYSTOREDEFS_H
-
-#include <e32base.h>
-
-const TInt KHwKeystoreMajorVersion = 1;
-const TInt KHwKeystoreMinorVersion = 0;
-const TInt KHwKeystoreBuildVersion = 0;
-
-/**	
- * Request message enumeration within the client. This is needed since 
- * unified key store calls are asynchronous in nature. Hence client 
- * needs to send messages to itself.
- */
-enum THwKeystoreMessages
-	{
-	ERequireNoCapabilities=0x00,
-	EIdle,
-	ECancel,
-	EImportKey,
-	EExportKey,
-	EKeyPresent,
-	ECreateSigner,
-	ECreateAsymmetricCipher,
-	ESignInHardware,
-	EDecryptInHardware
-	};
-
-
-
-#endif	//	HWKEYSTOREDEFS_H
--- a/cryptoservices/filebasedcertificateandkeystores/test/thwkeystore/common/tkeydetails.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,154 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Defines the class which represents the structure of the key on 
-* which Crypto Token HAI internally operates. It contains the key 
-* information relevant to Crypto Token HAI.
-*
-*/
-
-
-#include "tkeydetails.h"
-#include <mctkeystore.h>
-
-CKeyDetails::CKeyDetails()
-	{}
-
-CKeyDetails::CKeyDetails(	
-		TKeyIdentifier aID,
-		TKeyUsagePKCS15 aUsage,
-		TUint aSize, 
-		HBufC* aLabel,
-		TInt aHandle,
-		const TSecurityPolicy& aUsePolicy,
-		const TSecurityPolicy& aManagementPolicy,
-		EKeyAlgorithm aAlgorithm,
-		TInt aAccessType,
-		TBool aNative,
-		TTime aStartDate,
-		TTime aEndDate,
-		HBufC8* aPKCS8AttributeSet)
-		: CKeyInfoBase(	aID,aUsage,aSize,aLabel,aHandle,
-						aUsePolicy,aManagementPolicy,aAlgorithm,
-						aAccessType,aNative,aStartDate,aEndDate,aPKCS8AttributeSet)
-		{}
-
-CKeyDetails::~CKeyDetails()
-	{
-	delete iPrivateKey;
-	delete iPublicKey;
-	}
-
-TInt CKeyDetails::Handle() const
-	{
-	return iHandle;
-	}
-
-HBufC8* CKeyDetails::PrivateKey() const
-	{
-	return iPrivateKey;
-	}
-
-HBufC8* CKeyDetails::PublicKey() const
-    {
-    return iPublicKey;
-    }
-
-CKeyDetails* CKeyDetails::NewL(	TInt aHandle, 
-								const TDesC& aLabel, 
-								const TDesC8& aPrivateKey, 
-								const TDesC8& aPublicKey )
-	{
-	TKeyIdentifier keyID;
-	keyID.FillZ(keyID.MaxSize());
-	TKeyUsagePKCS15 usage = EPKCS15UsageNone;
-	TUint size = 0;
-	TInt handle = aHandle;
-	const TSecurityPolicy& usePolicy = TSecurityPolicy::EAlwaysPass;
-	const TSecurityPolicy& managementPolicy = TSecurityPolicy::EAlwaysPass;
-	EKeyAlgorithm algorithm = EECC;
-	TInt accessType = CKeyInfoBase::ENeverExtractable;
-	accessType |= CKeyInfoBase::ELocal;
-	TBool native = ETrue;
-	TTime startDate = 0;
-	TTime endDate = 0;
-	HBufC8* pkcs8AttributeSet = NULL;
-	
-	HBufC* label = HBufC::NewLC(aLabel.Length());
-	label->Des().Copy(aLabel);
-
-	CKeyDetails* keyDetails = new (ELeave) CKeyDetails(keyID,usage,size,label,handle,usePolicy,managementPolicy,algorithm,accessType,native,startDate,endDate,pkcs8AttributeSet);
-	
-	CleanupStack::Pop(label);
-	CleanupStack::PushL(keyDetails);
-	keyDetails->ConstructL(aPrivateKey, aPublicKey);
-	CleanupStack::Pop(keyDetails);
-	return keyDetails;
-	}
-
-
-CKeyDetails* CKeyDetails::NewL(RStoreReadStream& aReadStream)
-    {
-    CKeyDetails* self = new (ELeave) CKeyDetails();
-    CleanupStack::PushL(self);
-    self->ConstructL(aReadStream);
-    CleanupStack::Pop(self);
-    return (self);
-    }
-
-void CKeyDetails::ConstructL( const TDesC8& aPrivateKey, const TDesC8& aPublicKey )
-	{
-	iPrivateKey = aPrivateKey.AllocL();
-	iPublicKey = aPublicKey.AllocL();   
-	}
-
-void CKeyDetails::ConstructL(RStoreReadStream& aReadStream)
-	{
-	CKeyInfoBase::ConstructL(aReadStream);
-	InternalizeL(aReadStream);
-	}
-
-void CKeyDetails::ExternalizeL(RWriteStream& aWriteStream) const
-    {		
-    CKeyInfoBase::ExternalizeL(aWriteStream);
-    
-    TInt stringLen = iPrivateKey->Length();
-    aWriteStream.WriteInt32L(stringLen);
-    TPtr8 keyPtr = iPrivateKey->Des();
-    keyPtr.SetLength(stringLen);
-    aWriteStream.WriteL(keyPtr);
-        
-    stringLen = iPublicKey->Length();
-    aWriteStream.WriteInt32L(stringLen);
-    keyPtr = iPublicKey->Des();
-    keyPtr.SetLength(stringLen);
-    aWriteStream.WriteL(keyPtr);
-    
-    }
-
-void CKeyDetails::InternalizeL(RReadStream& aReadStream)
-    {
-    TInt stringLen = aReadStream.ReadInt32L();
-    iPrivateKey = HBufC8::NewMaxL(stringLen);
-    TPtr8 privateKeyPtr((TUint8*)iPrivateKey->Ptr(), stringLen, stringLen);
-    privateKeyPtr.FillZ(stringLen);
-    aReadStream.ReadL(privateKeyPtr);
-        
-    stringLen = aReadStream.ReadInt32L();
-    iPublicKey = HBufC8::NewMaxL(stringLen);
-    TPtr8 publicKeyPtr((TUint8*)iPublicKey->Ptr(), stringLen, stringLen);
-    publicKeyPtr.FillZ(stringLen);
-    aReadStream.ReadL(publicKeyPtr);
-    
-    }
--- a/cryptoservices/filebasedcertificateandkeystores/test/thwkeystore/common/tkeydetails.h	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,74 +0,0 @@
-/*
-* Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Defines the class which represents the structure of the key on 
-* which Crypto Token HAI internally operates. It contains the key 
-* information relevant to Crypto Token HAI.
-*
-*/
-
-
-/**
- @file
- @internalComponent
- @released
-*/
-
-#ifndef TKEYDETAILS_H
-#define TKEYDETAILS_H
-
-#include <e32base.h>
-#include <mctkeystore.h>
-
-class CKeyDetails : public CKeyInfoBase
-	{
-public:
-	static CKeyDetails* NewL(	TInt aHandle, const TDesC& aLabel, 
-								const TDesC8& aPrivateKey, const TDesC8& aPublicKey );
-	static CKeyDetails* NewL(RStoreReadStream& aReadStream);
-	~CKeyDetails();
-
-public:
-	/** Get the handle of the key. */
-	TInt Handle() const;
-	HBufC8* PrivateKey() const;
-	HBufC8* PublicKey() const;
-	void ExternalizeL(RWriteStream&) const;
-	
-private:
-	CKeyDetails(TKeyIdentifier aID,
-				TKeyUsagePKCS15 aUsage,
-				TUint aSize, 
-				HBufC* aLabel,
-				TInt aHandle,
-				const TSecurityPolicy& aUsePolicy,
-				const TSecurityPolicy& aManagementPolicy,
-				EKeyAlgorithm aAlgorithm,
-				TInt aAccessType,
-				TBool aNative,
-				TTime aStartDate,
-				TTime aEndDate,
-				HBufC8* aPKCS8AttributeSet);
-		
-	void ConstructL(const TDesC8& aPrivateKey, const TDesC8& aPublicKey );
-	void ConstructL( RStoreReadStream& aReadStream);
-	CKeyDetails();
-	void InternalizeL(RReadStream& aReadStream);
-	
-private:
-	HBufC8* iPrivateKey;
-	HBufC8* iPublicKey;
-	};
-
-#endif // TKEYDETAILS_H
Binary file cryptoservices/filebasedcertificateandkeystores/test/tkeystore/data/hwkeys.dat has changed
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/authenticate_useauth.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,164 +0,0 @@
-[SEC-AUTHENTICATE_USEAUTH-0001-002]
-
-<actionbody>
-
-	<mode>manager</mode>
-
-</actionbody>
-
-
-
-[SEC-AUTHENTICATE_USEAUTH-0001-003]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>cheeku</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keystore>0</keystore>
-
-</actionbody>
-
-
-
-[SEC-AUTHENTICATE_USEAUTH-0001-004]
-
-<actionbody>
-
-	<foundkey>cheeku</foundkey>
-
-		<authenticate>1</authenticate>
-
-</actionbody>
-
-
-
-[SEC-AUTHENTICATE_USEAUTH-0001-005]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>cheeku</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-	<authenticate>1</authenticate>
-
-</actionbody>
-
-
-
-[SEC-AUTHENTICATE_USEAUTH-0001-006]
-
-<actionbody>
-
-	<authmode>set</authmode>
-
-	<keylabel>cheeku</keylabel>
-
-	<authexpression>medium</authexpression>
-
-	<freshness>21</freshness>
-
-	<authenticate>1</authenticate>
-
-</actionbody>
-
-
-
-[SEC-AUTHENTICATE_USEAUTH-0001-007]
-
-<actionbody>
-
-	<authmode>get</authmode>
-
-	<keylabel>cheeku</keylabel>
-
-	<expectedexpression>medium</expectedexpression>
-
-	<expectedfreshness>21</expectedfreshness>
-
-	<authenticate>1</authenticate>
-
-</actionbody>
-
-
-
-[SEC-AUTHENTICATE_USEAUTH-0001-008]
-
-<actionbody>
-
-	<keylabel>cheeku</keylabel>
-
-	<policy>
-
-	<secureid>0x101FFFFF</secureid>
-
-	<capability>DRM</capability>
-
-	<capability>ReadUserData</capability>
-
-	</policy>
-
-	<authenticate>1</authenticate>
-
-</actionbody>
-
-
-
-[SEC-AUTHENTICATE_USEAUTH-0001-009]
-
-<actionbody>
-
-	<keylabel>cheeku</keylabel>
-
-	<policy>
-
-	<capability>DRM</capability>
-
-	<capability>ReadUserData</capability>
-
-	<capability>WriteUserData</capability>
-
-	</policy>
-
-	<authenticate>1</authenticate>
-
-</actionbody>
-
-
-
-[SEC-AUTHENTICATE_USEAUTH-0001-010]
-
-<actionbody>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-AUTHENTICATE_USEAUTH-0001-012]
-
-<actionbody>
-
-	<seconds>5</seconds>
-
-</actionbody>
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/authenticate_useauth.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,90 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-START_TESTCASE                SEC-AUTHENTICATE_USEAUTH-0001
-
-//! @SYMTestCaseID            SEC-AUTHENTICATE_USEAUTH-0001
-
-//! @SYMTestCaseDesc          //////////////////////////////////////////////////////////////////////////////////
-
-//!                           Adding a key
-
-//!                           //////////////////////////////////////////////////////////////////////////////////
-
-//!                           The action name now bears, when relevant, the TEST ID which will help map the
-
-//!                           resulting log to the DLRs, a mapping of these (TEST IDs to REQ number) can be found in
-
-//!                           "V:\Dev\GT\GT 0140 Security\Test and Integration\Test Specifications\DLR mappings\keystore.xls"
-
-//! @SYMTestActions           1) Delete keystore data file
-
-//!                           2) 1.0.0.0.2,Opening key store 2 in manager mode
-
-//!                           3) 1.0.0.1.0,Add a key (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           4) 1.0.0.1.1,List all keys (TEST ID: INC103084-KEY001)
-
-//!                           5) 1.0.0.2,Get it again
-
-//!                           6) Set a new authentication policy for a key with which the user is not registered
-
-//!                           7) Gets authentication policy for a key
-
-//!                           8) 6.2.1, Set cheeku's use policy based on SID and capabilities
-
-//!                           9) 6.2.7.4, Set cheeku's management policy based on just capabilities
-
-//!                           10) 1.4.4.999, Delete everything
-
-//!                           11) 1.4.999.1,Closing key store
-
-//!                           12) 1.4.999.2, Sleep 5 seconds
-
-//!                           13) 1.4.999.3, Check for server heap error
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeystoredata  
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   authenticate_useauth.ini   SEC-AUTHENTICATE_USEAUTH-0001-002
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 authenticate_useauth.ini   SEC-AUTHENTICATE_USEAUTH-0001-003
-
-RUN_TEST_STEP                 -1    CTestHandler        listallkeys            authenticate_useauth.ini   SEC-AUTHENTICATE_USEAUTH-0001-004
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             authenticate_useauth.ini   SEC-AUTHENTICATE_USEAUTH-0001-005
-
-RUN_TEST_STEP                 -1    CTestHandler        authenticationpolicy   authenticate_useauth.ini   SEC-AUTHENTICATE_USEAUTH-0001-006
-
-RUN_TEST_STEP                 -1    CTestHandler        authenticationpolicy   authenticate_useauth.ini   SEC-AUTHENTICATE_USEAUTH-0001-007
-
-RUN_TEST_STEP                 -1    CTestHandler        setusepolicy           authenticate_useauth.ini   SEC-AUTHENTICATE_USEAUTH-0001-008
-
-RUN_TEST_STEP                 -1    CTestHandler        setmanagementpolicy    authenticate_useauth.ini   SEC-AUTHENTICATE_USEAUTH-0001-009
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             authenticate_useauth.ini   SEC-AUTHENTICATE_USEAUTH-0001-010
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP                 -1    CTestHandler        sleep                  authenticate_useauth.ini   SEC-AUTHENTICATE_USEAUTH-0001-012
-
-RUN_TEST_STEP                 -1    CTestHandler        checkserverheaperror
-
-END_TESTCASE                  SEC-AUTHENTICATE_USEAUTH-0001
-
-
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/authobjects_v2_useauth.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,2872 +0,0 @@
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-1-002]
-
-<actionbody>
-
-	<mode>manager</mode>
-
-</actionbody>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-2-001]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>banana</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-2-005]
-
-<actionbody>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>mango</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-2-006]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>tomato</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-2-007]
-
-<actionbody>
-
-	<foundkey>banana</foundkey>
-
-	<foundkey>mango</foundkey>
-
-	<foundkey>tomato</foundkey>
-
-</actionbody>
-
-
-
-
-
-
-
-
-
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-3-001]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-</actionbody>
-
-<actionresult>
-
-	<policy>
-
-			<secureid>0x101F7E95</secureid>
-
-		</policy>
-
-</actionresult>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-3-002]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-</actionbody>
-
-<actionresult>
-
-	<policy>
-
-			<secureid>0x101F7E95</secureid>
-
-		</policy>
-
-</actionresult>
-
-
-
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-001]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<policy>
-
-	<secureid>0x101FFFFF</secureid>
-
-	<capability>DRM</capability>
-
-	<capability>ReadUserData</capability>
-
-	</policy>
-
-</actionbody>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-002]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-</actionbody>
-
-<actionresult>
-
-	<policy>
-
-			<secureid>0x101FFFFF</secureid>
-
-			<capability>DRM</capability>
-
-			<capability>ReadUserData</capability>
-
-		</policy>
-
-</actionresult>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-003]
-
-<actionbody>
-
-	<keylabel>mango</keylabel>
-
-	<policy>
-
-	<vendorid>0x70000007</vendorid>
-
-	<capability>DRM</capability>
-
-	<capability>ReadUserData</capability>
-
-	</policy>
-
-</actionbody>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-004]
-
-<actionbody>
-
-	<keylabel>mango</keylabel>
-
-</actionbody>
-
-<actionresult>
-
-	<policy>
-
-			<vendorid>0x70000007</vendorid>
-
-			<capability>DRM</capability>
-
-			<capability>ReadUserData</capability>
-
-		</policy>
-
-</actionresult>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-005]
-
-<actionbody>
-
-	<keylabel>tomato</keylabel>
-
-	<policy>
-
-	<capability>DRM</capability>
-
-	<capability>ReadUserData</capability>
-
-	<capability>WriteUserData</capability>
-
-	<capability>ReadDeviceData</capability>
-
-	<capability>WriteDeviceData</capability>
-
-	</policy>
-
-</actionbody>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-006]
-
-<actionbody>
-
-	<keylabel>tomato</keylabel>
-
-</actionbody>
-
-<actionresult>
-
-	<policy>
-
-			<capability>DRM</capability>
-
-			<capability>ReadUserData</capability>
-
-			<capability>WriteUserData</capability>
-
-			<capability>ReadDeviceData</capability>
-
-			<capability>WriteDeviceData</capability>
-
-		</policy>
-
-</actionresult>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-007]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<policy>
-
-	<capability>DRM</capability>
-
-	<capability>ReadUserData</capability>
-
-	<capability>WriteUserData</capability>
-
-	<capability>NetworkControl</capability>
-
-	</policy>
-
-</actionbody>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-008]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<policy>
-
-	<secureid>0x101F7E96</secureid>
-
-	<capability>DRM</capability>
-
-	<capability>ReadUserData</capability>
-
-	<capability>WriteUserData</capability>
-
-	</policy>
-
-</actionbody>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-009]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<policy>
-
-	<vendorid>0x70000002</vendorid>
-
-	<capability>DRM</capability>
-
-	<capability>ReadUserData</capability>
-
-	<capability>WriteUserData</capability>
-
-	</policy>
-
-</actionbody>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-010]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<policy>
-
-	<capability>DRM</capability>
-
-	<capability>ReadUserData</capability>
-
-	<capability>WriteUserData</capability>
-
-	</policy>
-
-</actionbody>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-011]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-</actionbody>
-
-<actionresult>
-
-	<policy>
-
-			<capability>DRM</capability>
-
-			<capability>ReadUserData</capability>
-
-			<capability>WriteUserData</capability>
-
-		</policy>
-
-</actionresult>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-012]
-
-<actionbody>
-
-	<keylabel>mango</keylabel>
-
-	<policy>
-
-	<secureid>0x101F7E95</secureid>
-
-	<capability>ReadUserData</capability>
-
-	<capability>DRM</capability>
-
-	<capability>ReadDeviceData</capability>
-
-	</policy>
-
-</actionbody>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-013]
-
-<actionbody>
-
-	<keylabel>mango</keylabel>
-
-</actionbody>
-
-<actionresult>
-
-	<policy>
-
-			<secureid>0x101F7E95</secureid>
-
-			<capability>ReadUserData</capability>
-
-			<capability>DRM</capability>
-
-			<capability>ReadDeviceData</capability>
-
-		</policy>
-
-</actionresult>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-014]
-
-<actionbody>
-
-	<keylabel>tomato</keylabel>
-
-	<policy>
-
-	<vendorid>0x70000001</vendorid>
-
-	<capability>ReadUserData</capability>
-
-	<capability>DRM</capability>
-
-	<capability>WriteDeviceData</capability>
-
-	</policy>
-
-</actionbody>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-015]
-
-<actionbody>
-
-	<keylabel>tomato</keylabel>
-
-</actionbody>
-
-<actionresult>
-
-	<policy>
-
-			<vendorid>0x70000001</vendorid>
-
-			<capability>ReadUserData</capability>
-
-			<capability>DRM</capability>
-
-			<capability>WriteDeviceData</capability>
-
-		</policy>
-
-</actionresult>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-5-001]
-
-<actionbody>
-
-	<testexe>t_keystore.exe</testexe>
-
-	<excludedcapabilities>
-
-	<capability>TCB</capability>
-
-	</excludedcapabilities>
-
-	<policy>
-
-	<secureid>0x101FFFFF</secureid>
-
-	<capability>DRM</capability>
-
-	<capability>ReadUserData</capability>
-
-	</policy>
-
-
-
-	<preactions>
-
-	<action>
-
-		<actionname>1, Open key store in manager mode</actionname>
-
-		<actiontype>init</actiontype>
-
-		<actionbody>
-
-			<mode>manager</mode>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-	</preactions>
-
-
-
-	<passactions>
-
-	<action>
-
-		<actionname>2, Get key info</actionname>
-
-		<actiontype>getkeyinfo</actiontype>
-
-		<actionbody>
-
-			<keylabel>banana</keylabel>
-
-			<keyusage>allusagesbutNR</keyusage>
-
-			<keysize>512</keysize>
-
-			<keyalgorithm>RSA</keyalgorithm>
-
-			<keyaccesstype>Extractable</keyaccesstype>
-
-			<keyaccesstype>Local</keyaccesstype>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>3, Sign</actionname>
-
-		<actiontype>sign</actiontype>
-
-		<actionbody>
-
-			<keylabel>banana</keylabel>
-
-			<open>RSA</open>
-
-			<text>This is text of 20 .</text>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>4, Decrypt</actionname>
-
-		<actiontype>decrypt</actiontype>
-
-		<actionbody>
-
-			<keylabel>banana</keylabel>
-
-			<text>Ook!</text>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-	</passactions>
-
-
-
-	<failactions>
-
-	<action>
-
-		<actionname>2, Get key info</actionname>
-
-		<actiontype>getkeyinfo</actiontype>
-
-		<actionbody>
-
-			<keylabel>banana</keylabel>
-
-			<keyusage>allusagesbutNR</keyusage>
-
-			<keysize>512</keysize>
-
-			<keyalgorithm>RSA</keyalgorithm>
-
-			<keyaccesstype>Extractable</keyaccesstype>
-
-			<keyaccesstype>Local</keyaccesstype>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrPermissionDenied</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>3, Sign</actionname>
-
-		<actiontype>sign</actiontype>
-
-		<actionbody>
-
-			<keylabel>banana</keylabel>
-
-			<open>RSA</open>
-
-			<text>This is text of 20 .</text>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrPermissionDenied</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>4, Decrypt</actionname>
-
-		<actiontype>decrypt</actiontype>
-
-		<actionbody>
-
-			<keylabel>banana</keylabel>
-
-			<text>Ook!</text>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrPermissionDenied</return>
-
-		</actionresult>
-
-	</action>
-
-	</failactions>
-
-
-
-	<postactions>
-
-	<action>
-
-		<actionname>5, Close key store</actionname>
-
-		<actiontype>delete</actiontype>
-
-		<actionbody></actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-	</postactions>
-
-</actionbody>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-5-002]
-
-<actionbody>
-
-	<testexe>t_keystore.exe</testexe>
-
-	<excludedcapabilities>
-
-	<capability>TCB</capability>
-
-	</excludedcapabilities>
-
-	<policy>
-
-	<vendorid>0x70000007</vendorid>
-
-	<capability>DRM</capability>
-
-	<capability>ReadUserData</capability>
-
-	</policy>
-
-
-
-	<preactions>
-
-	<action>
-
-		<actionname>1, Open key store in manager mode</actionname>
-
-		<actiontype>init</actiontype>
-
-		<actionbody>
-
-			<mode>manager</mode>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-	</preactions>
-
-
-
-	<passactions>
-
-	<action>
-
-		<actionname>2, Get key info</actionname>
-
-		<actiontype>getkeyinfo</actiontype>
-
-		<actionbody>
-
-			<keylabel>mango</keylabel>
-
-			<keyusage>allusagesbutNR</keyusage>
-
-			<keysize>512</keysize>
-
-			<keyalgorithm>DSA</keyalgorithm>
-
-			<keyaccesstype>Extractable</keyaccesstype>
-
-			<keyaccesstype>Local</keyaccesstype>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>3, Sign</actionname>
-
-		<actiontype>sign</actiontype>
-
-		<actionbody>
-
-			<keylabel>mango</keylabel>
-
-			<open>DSA</open>
-
-			<text>This is text of 20 .</text>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-	</passactions>
-
-
-
-	<failactions>
-
-	<action>
-
-		<actionname>2, Get key info</actionname>
-
-		<actiontype>getkeyinfo</actiontype>
-
-		<actionbody>
-
-			<keylabel>mango</keylabel>
-
-			<keyusage>allusagesbutNR</keyusage>
-
-			<keysize>512</keysize>
-
-			<keyalgorithm>DSA</keyalgorithm>
-
-			<keyaccesstype>Extractable</keyaccesstype>
-
-			<keyaccesstype>Local</keyaccesstype>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrPermissionDenied</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>3, Sign</actionname>
-
-		<actiontype>sign</actiontype>
-
-		<actionbody>
-
-			<keylabel>mango</keylabel>
-
-			<open>DSA</open>
-
-			<text>This is text of 20 .</text>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrPermissionDenied</return>
-
-		</actionresult>
-
-	</action>
-
-	</failactions>
-
-
-
-	<postactions>
-
-	<action>
-
-		<actionname>4, Close key store</actionname>
-
-		<actiontype>delete</actiontype>
-
-		<actionbody></actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-	</postactions>
-
-</actionbody>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-5-003]
-
-<actionbody>
-
-	<testexe>t_keystore.exe</testexe>
-
-	<excludedcapabilities>
-
-	<capability>TCB</capability>
-
-	</excludedcapabilities>
-
-	<policy>
-
-	<capability>DRM</capability>
-
-	<capability>ReadUserData</capability>
-
-	<capability>WriteUserData</capability>
-
-	<capability>ReadDeviceData</capability>
-
-	<capability>WriteDeviceData</capability>
-
-	</policy>
-
-
-
-	<preactions>
-
-	<action>
-
-		<actionname>1, Open key store in manager mode</actionname>
-
-		<actiontype>init</actiontype>
-
-		<actionbody>
-
-			<mode>manager</mode>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-	</preactions>
-
-
-
-	<passactions>
-
-	<action>
-
-		<actionname>2, Get key info</actionname>
-
-		<actiontype>getkeyinfo</actiontype>
-
-		<actionbody>
-
-			<keylabel>tomato</keylabel>
-
-			<keyusage>allusagesbutNR</keyusage>
-
-			<keysize>512</keysize>
-
-			<keyalgorithm>DH</keyalgorithm>
-
-			<keyaccesstype>Extractable</keyaccesstype>
-
-			<keyaccesstype>Local</keyaccesstype>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>2, Test derive</actionname>
-
-		<actiontype>derive</actiontype>
-
-		<actionbody>
-
-			<keylabel>tomato</keylabel>
-
-			<n>DA9A18547FF03B385CC16508C173A7EF4EB61CB40EF8FEF3B31F145051676166BCDC3FE6B799FC394D08C26385F9413F896E09117E46209D6923602683CEA100924A6EE695281775C619DAA94EA8CB3691B4275B0183F1D39639EBC92995FE645D6C1BC28D409E585549BBD2C5DCDD6C208B04EADD8B7A6D997F72CBAD88390F</n>
-
-			<g>02</g>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-	</passactions>
-
-
-
-	<failactions>
-
-	<action>
-
-		<actionname>2, Get key info</actionname>
-
-		<actiontype>getkeyinfo</actiontype>
-
-		<actionbody>
-
-			<keylabel>tomato</keylabel>
-
-			<keyusage>allusagesbutNR</keyusage>
-
-			<keysize>512</keysize>
-
-			<keyalgorithm>DH</keyalgorithm>
-
-			<keyaccesstype>Extractable</keyaccesstype>
-
-			<keyaccesstype>Local</keyaccesstype>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrPermissionDenied</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>2, Test derive</actionname>
-
-		<actiontype>derive</actiontype>
-
-		<actionbody>
-
-			<keylabel>tomato</keylabel>
-
-			<n>DA9A18547FF03B385CC16508C173A7EF4EB61CB40EF8FEF3B31F145051676166BCDC3FE6B799FC394D08C26385F9413F896E09117E46209D6923602683CEA100924A6EE695281775C619DAA94EA8CB3691B4275B0183F1D39639EBC92995FE645D6C1BC28D409E585549BBD2C5DCDD6C208B04EADD8B7A6D997F72CBAD88390F</n>
-
-			<g>02</g>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrPermissionDenied</return>
-
-		</actionresult>
-
-	</action>
-
-	</failactions>
-
-
-
-	<postactions>
-
-	<action>
-
-		<actionname>3, Close key store</actionname>
-
-		<actiontype>delete</actiontype>
-
-		<actionbody></actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-	</postactions>
-
-</actionbody>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-5-004]
-
-<actionbody>
-
-	<testexe>t_keystore.exe</testexe>
-	
-	<excludedcapabilities>
-
-	<capability>TCB</capability>
-
-	</excludedcapabilities>
-
-	<policy>
-
-	<capability>DRM</capability>
-
-	<capability>ReadUserData</capability>
-
-	<capability>WriteUserData</capability>
-
-	</policy>
-
-
-
-	<preactions>
-
-	<action>
-
-		<actionname>1, Open key store in manager mode</actionname>
-
-		<actiontype>init</actiontype>
-
-		<actionbody>
-
-			<mode>manager</mode>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-	</preactions>
-
-
-
-	<passactions>
-
-
-
-	<action>
-
-		<actionname>1, Export</actionname>
-
-		<actiontype>exportkey</actiontype>
-
-		<actionbody>
-
-			<ExportFile>exported_banana.der</ExportFile>
-
-			<keyusage>allusagesbutNR</keyusage>
-
-			<keylabel>banana</keylabel>
-
-			<keyalgorithm>RSA</keyalgorithm>
-
-			<encrypted>0</encrypted>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>2, Export encrypted</actionname>
-
-		<actiontype>exportkey</actiontype>
-
-		<actionbody>
-
-			<ExportFile>exported_encrypted_banana.der</ExportFile>
-
-			<keyusage>allusagesbutNR</keyusage>
-
-			<keylabel>banana</keylabel>
-
-			<keyalgorithm>RSA</keyalgorithm>
-
-			<encrypted>1</encrypted>
-
-			<passphrase>export clanger</passphrase>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>3, Check use policy</actionname>
-
-		<actiontype>getusepolicy</actiontype>
-
-		<actionbody>
-
-			<keylabel>banana</keylabel>
-
-		</actionbody>
-
-		<actionresult>
-
-			<policy>
-
-				<secureid>0x101FFFFF</secureid>
-
-				<capability>DRM</capability>
-
-				<capability>ReadUserData</capability>
-
-			</policy>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>4, Set use policy</actionname>
-
-		<actiontype>setusepolicy</actiontype>
-
-		<actionbody>
-
-			<keylabel>banana</keylabel>
-
-			<policy>
-
-				<capability>ReadUserData</capability>
-
-				<capability>WriteUserData</capability>
-
-			</policy>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>5, Check use policy</actionname>
-
-		<actiontype>getusepolicy</actiontype>
-
-		<actionbody>
-
-			<keylabel>banana</keylabel>
-
-		</actionbody>
-
-		<actionresult>
-
-			<policy>
-
-				<capability>ReadUserData</capability>
-
-				<capability>WriteUserData</capability>
-
-			</policy>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>6, Check management policy</actionname>
-
-		<actiontype>getmanagementpolicy</actiontype>
-
-		<actionbody>
-
-			<keylabel>banana</keylabel>
-
-		</actionbody>
-
-		<actionresult>
-
-			<policy>
-
-				<capability>DRM</capability>
-
-				<capability>ReadUserData</capability>
-
-				<capability>WriteUserData</capability>
-
-			</policy>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>7, Set management policy</actionname>
-
-		<actiontype>setmanagementpolicy</actiontype>
-
-		<actionbody>
-
-			<keylabel>banana</keylabel>
-
-			<policy>
-
-				<capability>ReadUserData</capability>
-
-				<capability>WriteUserData</capability>
-
-			</policy>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>8, Check management policy</actionname>
-
-		<actiontype>getmanagementpolicy</actiontype>
-
-		<actionbody>
-
-			<keylabel>banana</keylabel>
-
-		</actionbody>
-
-		<actionresult>
-
-			<policy>
-
-				<capability>ReadUserData</capability>
-
-				<capability>WriteUserData</capability>
-
-			</policy>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>9, Delete key</actionname>
-
-		<actiontype>deletekeys</actiontype>
-
-		<actionbody>
-
-			<keylabel>banana</keylabel>
-
-			<deletecount>1</deletecount>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	</passactions>
-
-
-
-	<failactions>
-
-
-
-	<action>
-
-		<actionname>1, Export</actionname>
-
-		<actiontype>exportkey</actiontype>
-
-		<actionbody>
-
-			<ExportFile>exported_banana.der</ExportFile>
-
-			<keyusage>allusagesbutNR</keyusage>
-
-			<keylabel>banana</keylabel>
-
-			<keyalgorithm>RSA</keyalgorithm>
-
-			<encrypted>0</encrypted>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrPermissionDenied</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>2, Export encrypted</actionname>
-
-		<actiontype>exportkey</actiontype>
-
-		<actionbody>
-
-			<ExportFile>exported_encrypted_banana.der</ExportFile>
-
-			<keyusage>allusagesbutNR</keyusage>
-
-			<keylabel>banana</keylabel>
-
-			<keyalgorithm>RSA</keyalgorithm>
-
-			<encrypted>1</encrypted>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrPermissionDenied</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>3, Set use policy</actionname>
-
-		<actiontype>setusepolicy</actiontype>
-
-		<actionbody>
-
-			<keylabel>banana</keylabel>
-
-			<policy>
-
-				<capability>ReadUserData</capability>
-
-				<capability>WriteUserData</capability>
-
-			</policy>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrPermissionDenied</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>5, Set management policy</actionname>
-
-		<actiontype>setmanagementpolicy</actiontype>
-
-		<actionbody>
-
-			<keylabel>banana</keylabel>
-
-			<policy>
-
-				<capability>ReadUserData</capability>
-
-				<capability>WriteUserData</capability>
-
-			</policy>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrPermissionDenied</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>7, Delete key</actionname>
-
-		<actiontype>deletekeys</actiontype>
-
-		<actionbody>
-
-			<keylabel>banana</keylabel>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrPermissionDenied</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	</failactions>
-
-
-
-	<postactions>
-
-	<action>
-
-		<actionname>4, Close key store</actionname>
-
-		<actiontype>delete</actiontype>
-
-		<actionbody></actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-	</postactions>
-
-</actionbody>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-5-005]
-
-<actionbody>
-
-	<testexe>t_keystore.exe</testexe>
-
-	<excludedcapabilities>
-
-	<capability>TCB</capability>
-
-	</excludedcapabilities>
-
-	<policy>
-
-	<secureid>0x101F7E95</secureid>
-
-	<capability>ReadUserData</capability>
-
-	<capability>DRM</capability>
-
-	<capability>ReadDeviceData</capability>
-
-	</policy>
-
-
-
-	<preactions>
-
-	<action>
-
-		<actionname>1, Open key store in manager mode</actionname>
-
-		<actiontype>init</actiontype>
-
-		<actionbody>
-
-			<mode>manager</mode>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-	</preactions>
-
-
-
-	<passactions>
-
-
-
-	<action>
-
-		<actionname>2, Export</actionname>
-
-		<actiontype>exportkey</actiontype>
-
-		<actionbody>
-
-			<ExportFile>exported_mango.der</ExportFile>
-
-			<keyusage>DSAUsage</keyusage>
-
-			<keylabel>mango</keylabel>
-
-			<keyalgorithm>DSA</keyalgorithm>
-
-			<encrypted>0</encrypted>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>3, Export encrypted</actionname>
-
-		<actiontype>exportkey</actiontype>
-
-		<actionbody>
-
-			<ExportFile>exported_encrypted_mango.der</ExportFile>
-
-			<keyusage>DSAUsage</keyusage>
-
-			<keylabel>mango</keylabel>
-
-			<keyalgorithm>DSA</keyalgorithm>
-
-			<encrypted>1</encrypted>	
-
-			<passphrase>export clanger</passphrase>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>4, Check use policy</actionname>
-
-		<actiontype>getusepolicy</actiontype>
-
-		<actionbody>
-
-			<keylabel>mango</keylabel>
-
-		</actionbody>
-
-		<actionresult>
-
-			<policy>
-
-				<vendorid>0x70000007</vendorid>
-
-				<capability>DRM</capability>
-
-				<capability>ReadUserData</capability>
-
-			</policy>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>5, Set use policy</actionname>
-
-		<actiontype>setusepolicy</actiontype>
-
-		<actionbody>
-
-			<keylabel>mango</keylabel>
-
-			<policy>
-
-				<capability>ReadUserData</capability>
-
-				<capability>WriteUserData</capability>
-
-			</policy>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>6, Check use policy</actionname>
-
-		<actiontype>getusepolicy</actiontype>
-
-		<actionbody>
-
-			<keylabel>mango</keylabel>
-
-		</actionbody>
-
-		<actionresult>
-
-			<policy>
-
-				<capability>ReadUserData</capability>
-
-				<capability>WriteUserData</capability>
-
-			</policy>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>7, Check management policy</actionname>
-
-		<actiontype>getmanagementpolicy</actiontype>
-
-		<actionbody>
-
-			<keylabel>mango</keylabel>
-
-		</actionbody>
-
-		<actionresult>
-
-			<policy>
-
-				<secureid>0x101F7E95</secureid>
-
-				<capability>ReadUserData</capability>
-
-				<capability>DRM</capability>
-
-				<capability>ReadDeviceData</capability>
-
-			</policy>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>8, Set management policy</actionname>
-
-		<actiontype>setmanagementpolicy</actiontype>
-
-		<actionbody>
-
-			<keylabel>mango</keylabel>
-
-			<policy>
-
-				<capability>DRM</capability>
-
-				<capability>ReadDeviceData</capability>
-
-			</policy>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>9, Check management policy</actionname>
-
-		<actiontype>getmanagementpolicy</actiontype>
-
-		<actionbody>
-
-			<keylabel>mango</keylabel>
-
-		</actionbody>
-
-		<actionresult>
-
-			<policy>
-
-				<capability>DRM</capability>
-
-				<capability>ReadDeviceData</capability>
-
-			</policy>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>10, Delete key</actionname>
-
-		<actiontype>deletekeys</actiontype>
-
-		<actionbody>
-
-			<keylabel>mango</keylabel>
-
-			<deletecount>1</deletecount>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	</passactions>
-
-
-
-	<failactions>
-
-
-
-	<action>
-
-		<actionname>2, Export</actionname>
-
-		<actiontype>exportkey</actiontype>
-
-		<actionbody>
-
-			<ExportFile>exported_mango.der</ExportFile>
-
-			<keyusage>DSAUsage</keyusage>
-
-			<keylabel>mango</keylabel>
-
-			<keyalgorithm>DSA</keyalgorithm>
-
-			<encrypted>0</encrypted>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrPermissionDenied</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>3, Export encrypted</actionname>
-
-		<actiontype>exportkey</actiontype>
-
-		<actionbody>
-
-			<ExportFile>exported_encrypted_mango.der</ExportFile>
-
-			<keyusage>DSAUsage</keyusage>
-
-			<keylabel>mango</keylabel>
-
-			<keyalgorithm>DSA</keyalgorithm>
-
-			<encrypted>1</encrypted>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrPermissionDenied</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>4, Set use policy</actionname>
-
-		<actiontype>setusepolicy</actiontype>
-
-		<actionbody>
-
-			<keylabel>mango</keylabel>
-
-			<policy>
-
-				<capability>ReadUserData</capability>
-
-				<capability>WriteUserData</capability>
-
-			</policy>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrPermissionDenied</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>5, Set management policy</actionname>
-
-		<actiontype>setmanagementpolicy</actiontype>
-
-		<actionbody>
-
-			<keylabel>mango</keylabel>
-
-			<policy>
-
-				<capability>DRM</capability>
-
-				<capability>ReadDeviceData</capability>
-
-			</policy>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrPermissionDenied</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>6, Delete key</actionname>
-
-		<actiontype>deletekeys</actiontype>
-
-		<actionbody>
-
-			<keylabel>mango</keylabel>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrPermissionDenied</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	</failactions>
-
-
-
-	<postactions>
-
-	<action>
-
-		<actionname>11, Close key store</actionname>
-
-		<actiontype>delete</actiontype>
-
-		<actionbody></actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-	</postactions>
-
-</actionbody>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-5-006]
-
-<actionbody>
-
-	<testexe>t_keystore.exe</testexe>
-
-	<excludedcapabilities>
-
-	<capability>TCB</capability>
-
-	</excludedcapabilities>
-
-	<policy>
-
-	<vendorid>0x70000001</vendorid>
-
-	<capability>ReadUserData</capability>
-
-	<capability>DRM</capability>
-
-	<capability>WriteDeviceData</capability>
-
-	</policy>
-
-
-
-	<preactions>
-
-	<action>
-
-		<actionname>1, Open key store in manager mode</actionname>
-
-		<actiontype>init</actiontype>
-
-		<actionbody>
-
-			<mode>manager</mode>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-	</preactions>
-
-
-
-	<passactions>
-
-
-
-	<action>
-
-		<actionname>2, Check use policy</actionname>
-
-		<actiontype>getusepolicy</actiontype>
-
-		<actionbody>
-
-			<keylabel>tomato</keylabel>
-
-		</actionbody>
-
-		<actionresult>
-
-			<policy>
-
-				<capability>DRM</capability>
-
-				<capability>ReadUserData</capability>
-
-				<capability>WriteUserData</capability>
-
-				<capability>ReadDeviceData</capability>
-
-				<capability>WriteDeviceData</capability>
-
-			</policy>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>3, Set use policy</actionname>
-
-		<actiontype>setusepolicy</actiontype>
-
-		<actionbody>
-
-			<keylabel>tomato</keylabel>
-
-			<policy>
-
-				<capability>ReadUserData</capability>
-
-				<capability>WriteUserData</capability>
-
-			</policy>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>4, Check use policy</actionname>
-
-		<actiontype>getusepolicy</actiontype>
-
-		<actionbody>
-
-			<keylabel>tomato</keylabel>
-
-		</actionbody>
-
-		<actionresult>
-
-			<policy>
-
-				<capability>ReadUserData</capability>
-
-				<capability>WriteUserData</capability>
-
-			</policy>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>5, Check management policy</actionname>
-
-		<actiontype>getmanagementpolicy</actiontype>
-
-		<actionbody>
-
-			<keylabel>tomato</keylabel>
-
-		</actionbody>
-
-		<actionresult>
-
-			<policy>
-
-				<vendorid>0x70000001</vendorid>
-
-				<capability>ReadUserData</capability>
-
-				<capability>DRM</capability>
-
-				<capability>WriteDeviceData</capability>
-
-			</policy>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>6, Set management policy</actionname>
-
-		<actiontype>setmanagementpolicy</actiontype>
-
-		<actionbody>
-
-			<keylabel>tomato</keylabel>
-
-			<policy>
-
-				<capability>DRM</capability>
-
-				<capability>WriteDeviceData</capability>
-
-			</policy>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>7, Check management policy</actionname>
-
-		<actiontype>getmanagementpolicy</actiontype>
-
-		<actionbody>
-
-			<keylabel>tomato</keylabel>
-
-		</actionbody>
-
-		<actionresult>
-
-			<policy>
-
-				<capability>DRM</capability>
-
-				<capability>WriteDeviceData</capability>
-
-			</policy>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>8, Delete key</actionname>
-
-		<actiontype>deletekeys</actiontype>
-
-		<actionbody>
-
-			<keylabel>tomato</keylabel>
-
-			<deletecount>1</deletecount>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	</passactions>
-
-
-
-	<failactions>
-
-
-
-	<action>
-
-		<actionname>2, Set use policy</actionname>
-
-		<actiontype>setusepolicy</actiontype>
-
-		<actionbody>
-
-			<keylabel>tomato</keylabel>
-
-			<policy>
-
-				<capability>ReadUserData</capability>
-
-				<capability>WriteUserData</capability>
-
-			</policy>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrPermissionDenied</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>3, Set management policy</actionname>
-
-		<actiontype>setmanagementpolicy</actiontype>
-
-		<actionbody>
-
-			<keylabel>tomato</keylabel>
-
-			<policy>
-
-				<capability>DRM</capability>
-
-				<capability>WriteDeviceData</capability>
-
-			</policy>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrPermissionDenied</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>4, Delete key</actionname>
-
-		<actiontype>deletekeys</actiontype>
-
-		<actionbody>
-
-			<keylabel>tomato</keylabel>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrPermissionDenied</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	</failactions>
-
-
-
-	<postactions>
-
-	<action>
-
-		<actionname>9, Close key store</actionname>
-
-		<actiontype>delete</actiontype>
-
-		<actionbody></actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-	</postactions>
-
-</actionbody>
-
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-6-001]
-
-<actionbody>
-
-	<testexe>t_keystore.exe</testexe>
-
-	<excludedcapabilities>
-
-	<capability>TCB</capability>
-
-	</excludedcapabilities>
-
-	<policy>
-
-	<capability>WriteUserData</capability>
-
-	</policy>
-
-
-
-	<preactions>
-
-	<action>
-
-		<actionname>1, Open key store</actionname>
-
-		<actiontype>init</actiontype>
-
-		<actionbody>
-
-			<mode>manager</mode>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-	</preactions>
-
-
-
-	<passactions>
-
-	<action>
-
-		<actionname>2, Create key</actionname>
-
-		<actiontype>addkey</actiontype>
-
-		<actionbody>
-
-			<keyusage>allusagesbutNR</keyusage>
-
-			<keysize>512</keysize>
-
-			<keylabel>raspberry</keylabel>
-
-			<keyalgorithm>RSA</keyalgorithm>
-
-			<keyaccesstype>Extractable</keyaccesstype>
-
-			<keystore>0</keystore>
-
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>3, Import key</actionname>
-
-		<actiontype>importkey</actiontype>
-
-		<actionbody>
-
-			<ImportData>pkcs8rsa.001</ImportData>
-
-			<keyusage>allusagesbutNR</keyusage>
-
-			<keylabel>blueberry</keylabel>
-
-			<keyaccesstype>Extractable</keyaccesstype>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-	</passactions>
-
-
-
-	<failactions>
-
-	<action>
-
-		<actionname>2, Create key</actionname>
-
-		<actiontype>addkey</actiontype>
-
-		<actionbody>
-
-			<keyusage>allusagesbutNR</keyusage>
-
-			<keysize>512</keysize>
-
-			<keylabel>raspberry</keylabel>
-
-			<keyalgorithm>RSA</keyalgorithm>
-
-			<keyaccesstype>Extractable</keyaccesstype>
-
-			<keystore>0</keystore>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrPermissionDenied</return>
-
-		</actionresult>
-
-	</action>
-
-
-
-	<action>
-
-		<actionname>3, Import key</actionname>
-
-		<actiontype>importkey</actiontype>
-
-		<actionbody>
-
-			<ImportData>pkcs8rsa.001</ImportData>
-
-			<keyusage>allusagesbutNR</keyusage>
-
-			<keylabel>blueberry</keylabel>
-
-			<keyaccesstype>Extractable</keyaccesstype>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrPermissionDenied</return>
-
-		</actionresult>
-
-	</action>
-
-	</failactions>
-
-
-
-	<postactions>
-
-	<action>
-
-		<actionname>5, Close key store</actionname>
-
-		<actiontype>delete</actiontype>
-
-		<actionbody></actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-	</postactions>
-
-</actionbody>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-6-002]
-
-<actionbody>
-
-	<testexe>t_keystore.exe</testexe>
-
-	<excludedcapabilities>
-
-	<capability>TCB</capability>
-
-	</excludedcapabilities>
-
-	<policy>
-
-	<capability>ReadUserData</capability>
-
-	</policy>
-
-
-
-	<preactions>
-
-	<action>
-
-		<actionname>1, Open key store</actionname>
-
-		<actiontype>init</actiontype>
-
-		<actionbody>
-
-			<mode>manager</mode>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-	</preactions>
-
-
-
-	<passactions>
-
-	<action>
-
-		<actionname>2, List keys</actionname>
-
-		<actiontype>listkeys</actiontype>
-
-		<actionbody>
-
-			<foundkey>raspberry</foundkey>
-
-			<foundkey>blueberry</foundkey>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-	</passactions>
-
-
-
-	<failactions>
-
-	<action>
-
-		<actionname>2, List keys</actionname>
-
-		<actiontype>listkeys</actiontype>
-
-		<actionbody>
-
-		</actionbody>
-
-		<actionresult>
-
-			<return>KErrPermissionDenied</return>
-
-		</actionresult>
-
-	</action>
-
-	</failactions>
-
-
-
-	<postactions>
-
-	<action>
-
-		<actionname>4, Close key store</actionname>
-
-		<actiontype>delete</actiontype>
-
-		<actionbody></actionbody>
-
-		<actionresult>
-
-			<return>KErrNone</return>
-
-		</actionresult>
-
-	</action>
-
-	</postactions>
-
-</actionbody>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-7-001]
-
-<actionbody>
-
-	<foundkey>raspberry</foundkey>
-
-	<foundkey>blueberry</foundkey>
-
-</actionbody>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-7-002]
-
-<actionbody>
-
-	<deletecount>2</deletecount>
-
-</actionbody>
-
-
-
-[SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-7-004]
-
-<actionbody>
-
-	<seconds>5</seconds>
-
-</actionbody>
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/authobjects_v2_useauth.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,310 +0,0 @@
-/*
-* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
-* All rights reserved.
-* This component and the accompanying materials are made available
-* under the terms of the License "Eclipse Public License v1.0"
-* which accompanies this distribution, and is available
-* at the URL "http://www.eclipse.org/legal/epl-v10.html".
-*
-* Initial Contributors:
-* Nokia Corporation - initial contribution.
-*
-* Contributors:
-*
-* Description: 
-* Library to add s32strm support for IPC (ie. stream via multiple IPC read/writes instead of
-* copying to a buffer and streaming to/from there.
-*
-*/
-
-START_TESTCASE                SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-0001
-
-//! @SYMTestCaseID            SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-0001
-
-//! @SYMTestCaseDesc          Script 2: Test authentication, paspphrase caching, etc
-
-//!                           
-
-//!                           //////////////////////////////////////////////////////////////////////////////
-
-//!                           0. Initialisation
-
-//!                           //////////////////////////////////////////////////////////////////////////////
-
-//!                           
-
-//!                           First we delete the keystore data file, so that we know we are setting the
-
-//!                           passphrase with our first key add operation.
-
-//!                           Then we set up some keys for the rest of the test script to use:
-
-//!                           
-
-//!                           Key:     Type:
-
-//!                           banana	RSA
-
-//!                           mango	DSA
-
-//!                           tomato	DH
-
-//!                           
-
-//!                           test passphrase timeout affects all keys, and all processes
-
-//! @SYMTestActions           1) 0.1, Delete keystore data file
-
-//!                           2) 0.2, Opening key store in manager mode
-
-//!                           3) 0.3 Delete everything
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeystoredata  
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   authobjects_useauth.ini	SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-1-002
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys          
-
-END_TESTCASE                  SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-0001
-
-
-
-
-
-START_TESTCASE                SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-0002
-
-//! @SYMTestCaseID            SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-0002
-
-//! @SYMTestCaseDesc          //////////////////////////////////////////////////////////////////////////////
-
-//!                           1. Test passphrase caching
-
-//!                           //////////////////////////////////////////////////////////////////////////////
-
-//!                           
-
-//!                           1.1 Test adding a key leaves it open and with default timeout of 30 seconds
-
-//! @SYMTestActions           1) 1.1.1, Add key banana
-
-//!                           5) 1.1.5, Add key mango
-
-//!                           6) 1.1.6, Add key tomato
-
-//!                           7) 1.1.7, Check everything added ok
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-2-001
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-2-005
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-2-006
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-2-007
-
-END_TESTCASE                  SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-0002
-
-
-
-
-START_TESTCASE                SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-0003
-
-//! @SYMTestCaseID            SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-0003
-
-//! @SYMTestCaseDesc          //////////////////////////////////////////////////////////////////////////////
-
-//!                           6. Test security policies
-
-//!                           //////////////////////////////////////////////////////////////////////////////
-
-//!                           
-
-//!                           6.1 Test default policy is to police based on SID of the creator
-
-//! @SYMTestActions           1) 6.1.1, Get default use policy
-
-//!                           2) 6.1.2, Get default management policy
-
-RUN_TEST_STEP                 -1    CTestHandler        getusepolicy           authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-3-001
-
-RUN_TEST_STEP                 -1    CTestHandler        getmanagementpolicy    authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-3-002
-
-END_TESTCASE                  SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-0003
-
-
-
-
-
-START_TESTCASE                SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-0004
-
-//! @SYMTestCaseID            SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-0004
-
-//! @SYMTestCaseDesc          6.2 Test setting policies for the keys
-
-//! @SYMTestActions           1) 6.2.1, Set banana's use policy based on SID and capabilities
-
-//!                           2) 6.2.2, Check banana's use policy set correctly
-
-//!                           3) 6.2.3, Set mango's use policy based on VID and capabilities
-
-//!                           4) 6.2.4, Check mango's use policy set correctly
-
-//!                           5) 6.2.5, Set tomato's use policy based on just capabilities
-
-//!                           6) 6.2.6, Check tomato's use policy set correctly
-
-//!                           7) 6.2.7.1, Test we can't set management policy that doesn't include the calling process
-
-//!                           8) 6.2.7.2, Test we can't set management policy that doesn't include the calling process
-
-//!                           9) 6.2.7.3, Test we can't set management policy that doesn't include the calling process
-
-//!                           10) 6.2.7.4, Set banana's management policy based on just capabilities
-
-//!                           11) 6.2.8, Check banana's management policy set correctly
-
-//!                           12) 6.2.9, Set mango's management policy based on SID and capabilities
-
-//!                           13) 6.2.10, Check mango's management policy set correctly
-
-//!                           14) 6.2.11, Set tomato's management policy based on VID and capabilities
-
-//!                           15) 6.2.12, Check tomato's management policy set correctly
-
-RUN_TEST_STEP                 -1    CTestHandler        setusepolicy           authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-001
-
-RUN_TEST_STEP                 -1    CTestHandler        getusepolicy           authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-002
-
-RUN_TEST_STEP                 -1    CTestHandler        setusepolicy           authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-003
-
-RUN_TEST_STEP                 -1    CTestHandler        getusepolicy           authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-004
-
-RUN_TEST_STEP                 -1    CTestHandler        setusepolicy           authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-005
-
-RUN_TEST_STEP                 -1    CTestHandler        getusepolicy           authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-006
-
-RUN_TEST_STEP !Error=-6       -1    CTestHandler        setmanagementpolicy    authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-007
-
-RUN_TEST_STEP !Error=-6       -1    CTestHandler        setmanagementpolicy    authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-008
-
-RUN_TEST_STEP !Error=-6       -1    CTestHandler        setmanagementpolicy    authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-009
-
-RUN_TEST_STEP                 -1    CTestHandler        setmanagementpolicy    authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-010
-
-RUN_TEST_STEP                 -1    CTestHandler        getmanagementpolicy    authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-011
-
-RUN_TEST_STEP                 -1    CTestHandler        setmanagementpolicy    authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-012
-
-RUN_TEST_STEP                 -1    CTestHandler        getmanagementpolicy    authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-013
-
-RUN_TEST_STEP                 -1    CTestHandler        setmanagementpolicy    authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-014
-
-RUN_TEST_STEP                 -1    CTestHandler        getmanagementpolicy    authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-4-015
-
-END_TESTCASE                  SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-0004
-
-
-
-
-
-START_TESTCASE                SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-0005
-
-//! @SYMTestCaseID            SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-0005
-
-//! @SYMTestCaseDesc          6.3 Test enforcement of security policies
-
-//! @SYMTestActions           1) 6.3.1, Test use policy enforcement for SID and capabilities
-
-//!                           2) 6.3.2, Test use policy enforcement for VID and capabilities
-
-//!                           3) 6.3.3, Test use policy enforcement for just capabilities
-
-//!                           4) 6.3.4, Test banana's management policy enforcement (just capabilities)
-
-//!                           5) 6.3.5, Test mango's management policy enforcement (SID and capabilities)
-
-//!                           6) 6.3.6, Test tomato's management policy enforcement (VID and capabilities)
-
-RUN_TEST_STEP                 -1    CTestHandler        policytest             authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-5-001
-
-RUN_TEST_STEP                 -1    CTestHandler        policytest             authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-5-002
-
-RUN_TEST_STEP                 -1    CTestHandler        policytest             authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-5-003
-
-RUN_TEST_STEP                 -1    CTestHandler        policytest             authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-5-004
-
-RUN_TEST_STEP                 -1    CTestHandler        policytest             authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-5-005
-
-RUN_TEST_STEP                 -1    CTestHandler        policytest             authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-5-006
-
-END_TESTCASE                  SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-0005
-
-
-
-
-
-START_TESTCASE                SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-0006
-
-//! @SYMTestCaseID            SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-0006
-
-//! @SYMTestCaseDesc          //////////////////////////////////////////////////////////////////////////////
-
-//!                           7. Test policing of other APIs
-
-//!                           //////////////////////////////////////////////////////////////////////////////
-
-//!                           
-
-//!                           7.1 Test set timeout is policed with WriteDeviceData capability
-
-//! @SYMTestActions           1) 7.1, Test policing of set timeout
-
-//!                           2) 7.2, Test policing of create and import by WriteUserData
-
-//!                           3) 7.3, Test policing of list by ReadUserData
-
-RUN_TEST_STEP                 -1    CTestHandler        policytest             authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-6-001
-
-RUN_TEST_STEP                 -1    CTestHandler        policytest             authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-6-002
-
-END_TESTCASE                  SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-0006
-
-
-
-
-
-START_TESTCASE                SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-0007
-
-//! @SYMTestCaseID            SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-0007
-
-//! @SYMTestCaseDesc          //////////////////////////////////////////////////////////////////////////////
-
-//!                           Cleanup
-
-//!                           //////////////////////////////////////////////////////////////////////////////
-
-//! @SYMTestActions           1) 8.0, List keys
-
-//!                           2) 8.1, Delete keys
-
-//!                           3) 8.2, Close key store
-
-//!                           4) 8.3, Sleep 5 seconds
-
-//!                           5) 8.4, Check for server heap error
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-7-001
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-7-002
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP                 -1    CTestHandler        sleep                  authobjects_useauth.ini   SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-7-004
-
-RUN_TEST_STEP                 -1    CTestHandler        checkserverheaperror
-
-END_TESTCASE                  SEC-FILETOKENS-AUTHOBJECTS_V2_USEAUTH-0007
-
-
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/batchfiles/epoc_keystoreusesauthserver.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,12 +0,0 @@
-PlatSecDiagnostics ON
-PlatSecEnforcement ON 
-PlatSecProcessIsolation ON 
-PlatSecEnforceSysBin ON
-
-_epoc_drive_d \epoc32\drive_d 
-_epoc_drive_e \epoc32\drive_e 
-_epoc_drive_r \epoc32\drive_r 
-PlatSecDisabledCaps SwEvent 
-JustInTime none 
-KKeyStoreUseAuthServer=1
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/batchfiles/replace_epoc_ini.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,26 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-copy /Y \epoc32\data\epoc.ini \epoc32\data\backup_epoc.ini
-del /f /q \epoc32\data\epoc.ini
-copy /Y \epoc32\winscw\c\tkeystore\scripts\batchfiles\epoc_keystoreusesauthserver.ini \epoc32\data\epoc.ini
-
-
-
-
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/batchfiles/restore_epoc_ini.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,25 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-del /f /q \epoc32\data\epoc.ini
-copy /Y \epoc32\data\backup_epoc.ini \epoc32\data\epoc.ini
-del /f /q \epoc32\data\backup_epoc.ini
-
-
-
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/batchfiles/tkeystore_migrate_copykeys.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,17 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-call copy /Y \epoc32\winscw\c\private\101f72a6\keys.dat \epoc32\winscw\c\ttesttools\data\keys_old.dat
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/batchfiles/tkeystore_migrate_post.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,23 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-call \epoc32\winscw\c\tkeystore\scripts\batchfiles\replace_epoc_ini.bat
-call del /f /q \epoc32\data\z\private\101f72a6\keys.dat
-call del /f /q \epoc32\release\winscw\udeb\z\private\101f72a6\keys.dat
-call del /f /q \epoc32\release\winscw\urel\z\private\101f72a6\keys.dat
-call del /f /q \epoc32\winscw\c\private\101f72a6\keys.dat
-call del /f /q \epoc32\private\101f72a6\keys.dat
-call copy /Y \epoc32\winscw\c\ttesttools\data\newkeys.dat \epoc32\winscw\c\private\101f72a6\keys.dat
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/batchfiles/tkeystore_migrate_pre.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,22 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-call \epoc32\winscw\c\tkeystore\scripts\batchfiles\restore_epoc_ini.bat
-call del /f /q \epoc32\data\z\private\101f72a6\keys.dat
-call del /f /q \epoc32\release\winscw\udeb\z\private\101f72a6\keys.dat
-call del /f /q \epoc32\release\winscw\urel\z\private\101f72a6\keys.dat
-call del /f /q \epoc32\winscw\c\private\101f72a6\keys.dat
-call del /f /q \epoc32\private\101f72a6\keys.dat
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/batchfiles/tkeystore_useauthserver_post.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,31 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-call del /f /q \epoc32\winscw\c\t_secdlg_in.dat
-call copy /Y \epoc32\data\z\private\101f72a6\keys_backup.dat \epoc32\data\z\private\101f72a6\keys.dat
-call del /f /q \epoc32\data\z\private\101f72a6\keys_backup.dat
-call copy /Y \epoc32\release\winscw\udeb\z\private\101f72a6\keys_backup.dat \epoc32\release\winscw\udeb\z\private\101f72a6\keys.dat
-call del /f /q \epoc32\release\winscw\udeb\z\private\101f72a6\keys_backup.dat
-call copy /Y \epoc32\release\winscw\urel\z\private\101f72a6\keys_backup.dat \epoc32\release\winscw\urel\z\private\101f72a6\keys.dat
-call del /f /q \epoc32\release\winscw\urel\z\private\101f72a6\keys_backup.dat
-call copy /Y \epoc32\winscw\c\private\101f72a6\keys_backup.dat \epoc32\winscw\c\private\101f72a6\keys.dat
-call del /f /q \epoc32\winscw\c\private\101f72a6\keys_backup.dat
-call copy /Y \epoc32\private\101f72a6\keys_backup.dat \epoc32\private\101f72a6\keys.dat 
-call del /f /q \epoc32\private\101f72a6\keys_backup.dat
-
-call \epoc32\winscw\c\tkeystore\scripts\batchfiles\restore_epoc_ini.bat
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/batchfiles/tkeystore_useauthserver_pre.bat	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,35 +0,0 @@
-@rem
-@rem Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-@rem All rights reserved.
-@rem This component and the accompanying materials are made available
-@rem under the terms of the License "Eclipse Public License v1.0"
-@rem which accompanies this distribution, and is available
-@rem at the URL "http://www.eclipse.org/legal/epl-v10.html".
-@rem
-@rem Initial Contributors:
-@rem Nokia Corporation - initial contribution.
-@rem
-@rem Contributors:
-@rem
-@rem Description: 
-@rem
-
-call %SECURITYSOURCEDIR%\testframework\test\autotesting\RemoveSecDlg.bat
-call copy /Y \epoc32\data\z\private\101f72a6\keys.dat \epoc32\data\z\private\101f72a6\keys_backup.dat
-call del /f /q \epoc32\data\z\private\101f72a6\keys.dat
-call copy /Y \epoc32\release\winscw\udeb\z\private\101f72a6\keys.dat \epoc32\release\winscw\udeb\z\private\101f72a6\keys_backup.dat
-call del /f /q \epoc32\release\winscw\udeb\z\private\101f72a6\keys.dat
-call copy /Y \epoc32\release\winscw\urel\z\private\101f72a6\keys.dat \epoc32\release\winscw\urel\z\private\101f72a6\keys_backup.dat
-call del /f /q \epoc32\release\winscw\urel\z\private\101f72a6\keys.dat
-call copy /Y \epoc32\winscw\c\private\101f72a6\keys.dat \epoc32\winscw\c\private\101f72a6\keys_backup.dat
-call del /f /q \epoc32\winscw\c\private\101f72a6\keys.dat
-call copy /Y \epoc32\private\101f72a6\keys.dat \epoc32\private\101f72a6\keys_backup.dat
-call del /f /q \epoc32\private\101f72a6\keys.dat
-
-call \epoc32\winscw\c\tkeystore\scripts\batchfiles\replace_epoc_ini.bat
-
-
-
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/cancel_useauth.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,1242 +0,0 @@
-[SEC-CANCEL_USEAUTH-0002-001]
-
-<actionbody>
-
-	<mode>manager</mode>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0002-003]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>banana</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyexportable>IsExportable</keyexportable>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0003-001]
-
-<actionbody>
-
-	<foundkey>banana</foundkey>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0003-002]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>banana</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0003-003]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<open>RSA</open>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0003-004]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<open>Decrypt</open>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0003-005]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0003-006]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<open>RSA</open>
-
-	<signdigest>1</signdigest>
-
-	<text>digested!</text>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0003-007]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<text>Ook!</text>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0004-001]
-
-<actionbody>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0005-001]
-
-<actionbody>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0005-002]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>1024</keysize>
-
-	<keylabel>bigbanana</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyexportable>IsExportable</keyexportable>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0005-003]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>1024</keysize>
-
-	<keylabel>
-
-To be, or not to be: that is the question:
-
-Whether 'tis nobler in the mind to suffer
-
-The slings and arrows of outrageous fortune,
-
-Or to take arms against a sea of troubles,
-
-And by opposing end them? To die: to sleep;
-
-No more; and by a sleep to say we end
-
-The heart-ache and the thousand natural shocks
-
-That flesh is heir to, 'tis a consummation
-
-Devoutly to be wish'd. To die, to sleep;
-
-To sleep: perchance to dream: ay, there's the rub;
-
-For in that sleep of death what dreams may come
-
-When we have shuffled off this mortal coil,
-
-Must give us pause: there's the respect
-
-That makes calamity of so long life;
-
-For who would bear the whips and scorns of time,
-
-The oppressor's wrong, the proud man's contumely,
-
-The pangs of despised love, the law's delay,
-
-The insolence of office and the spurns
-
-That patient merit of the unworthy takes,
-
-When he himself might his quietus make
-
-With a bare bodkin? Who would fardels bear,
-
-To grunt and sweat under a weary life,
-
-But that the dread of something after death,
-
-The undiscover'd country from whose bourn
-
-No traveller returns, puzzles the will
-
-And makes us rather bear those ills we have
-
-Than fly to others that we know not of?
-
-Thus conscience does make cowards of us all;
-
-And thus the native hue of resolution
-
-Is sicklied o'er with the pale cast of thought,
-
-And enterprises of great pith and moment
-
-With this regard their currents turn awry,
-
-And lose the name of action.--Soft you now!
-
-The fair Ophelia! Nymph, in thy orisons
-
-Be all my sins remember'd. 
-
-	</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0005-004]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>1024</keysize>
-
-	<keylabel>
-
-To be, or not to be: that is the question:
-
-Whether 'tis nobler in the mind to suffer
-
-The slings and arrows of outrageous fortune,
-
-Or to take arms against a sea of troubles,
-
-And by opposing end them? To die: to sleep;
-
-No more; and by a sleep to say we end
-
-The heart-ache and the thousand natural shocks
-
-That flesh is heir to, 'tis a consummation
-
-Devoutly to be wish'd. To die, to sleep;
-
-To sleep: perchance to dream: ay, there's the rub;
-
-For in that sleep of death what dreams may come
-
-When we have shuffled off this mortal coil,
-
-Must give us pause: there's the respect
-
-That makes calamity of so long life;
-
-For who would bear the whips and scorns of time,
-
-The oppressor's wrong, the proud man's contumely,
-
-The pangs of despised love, the law's delay,
-
-The insolence of office and the spurns
-
-That patient merit of the unworthy takes,
-
-When he himself might his quietus make
-
-With a bare bodkin? Who would fardels bear,
-
-To grunt and sweat under a weary life,
-
-But that the dread of something after death,
-
-The undiscover'd country from whose bourn
-
-No traveller returns, puzzles the will
-
-And makes us rather bear those ills we have
-
-Than fly to others that we know not of?
-
-Thus conscience does make cowards of us all;
-
-And thus the native hue of resolution
-
-Is sicklied o'er with the pale cast of thought,
-
-And enterprises of great pith and moment
-
-With this regard their currents turn awry,
-
-And lose the name of action.--Soft you now!
-
-The fair Ophelia! Nymph, in thy orisons
-
-Be all my sins remember'd. 
-
-	</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0005-005]
-
-<actionbody>
-
-	<keylabel>
-
-To be, or not to be: that is the question:
-
-Whether 'tis nobler in the mind to suffer
-
-The slings and arrows of outrageous fortune,
-
-Or to take arms against a sea of troubles,
-
-And by opposing end them? To die: to sleep;
-
-No more; and by a sleep to say we end
-
-The heart-ache and the thousand natural shocks
-
-That flesh is heir to, 'tis a consummation
-
-Devoutly to be wish'd. To die, to sleep;
-
-To sleep: perchance to dream: ay, there's the rub;
-
-For in that sleep of death what dreams may come
-
-When we have shuffled off this mortal coil,
-
-Must give us pause: there's the respect
-
-That makes calamity of so long life;
-
-For who would bear the whips and scorns of time,
-
-The oppressor's wrong, the proud man's contumely,
-
-The pangs of despised love, the law's delay,
-
-The insolence of office and the spurns
-
-That patient merit of the unworthy takes,
-
-When he himself might his quietus make
-
-With a bare bodkin? Who would fardels bear,
-
-To grunt and sweat under a weary life,
-
-But that the dread of something after death,
-
-The undiscover'd country from whose bourn
-
-No traveller returns, puzzles the will
-
-And makes us rather bear those ills we have
-
-Than fly to others that we know not of?
-
-Thus conscience does make cowards of us all;
-
-And thus the native hue of resolution
-
-Is sicklied o'er with the pale cast of thought,
-
-And enterprises of great pith and moment
-
-With this regard their currents turn awry,
-
-And lose the name of action.--Soft you now!
-
-The fair Ophelia! Nymph, in thy orisons
-
-Be all my sins remember'd. 
-
-	</keylabel>
-
-	<open>RSA</open>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0005-006]
-
-<actionbody>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>carrot</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0005-007]
-
-<actionbody>
-
-	<keylabel>carrot</keylabel>
-
-	<open>DSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0005-008]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>mango</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0005-009]
-
-<actionbody>
-
-	<keylabel>mango</keylabel>
-
-	<open>DH</open>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0005-010]
-
-<actionbody>
-
-	<keylabel>mango</keylabel>
-
-	<n>DA9A18547FF03B385CC16508C173A7EF4EB61CB40EF8FEF3B31F145051676166BCDC3FE6B799FC394D08C26385F9413F896E09117E46209D6923602683CEA100924A6EE695281775C619DAA94EA8CB3691B4275B0183F1D39639EBC92995FE645D6C1BC28D409E585549BBD2C5DCDD6C208B04EADD8B7A6D997F72CBAD88390F</n>
-
-	<g>02</g>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0005-011]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>jackfruit</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0005-012]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>custard apple</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0005-013]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keyusage>NR</keyusage>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>grape</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0005-014]
-
-<actionbody>
-
-   		<foundkey>bigbanana</foundkey>
-
-	<foundkey>carrot</foundkey>
-
-	<foundkey>mango</foundkey>
-
-	<foundkey>
-
-To be, or not to be: that is the question:
-
-Whether 'tis nobler in the mind to suffer
-
-The slings and arrows of outrageous fortune,
-
-Or to take arms against a sea of troubles,
-
-And by opposing end them? To die: to sleep;
-
-No more; and by a sleep to say we end
-
-The heart-ache and the thousand natural shocks
-
-That flesh is heir to, 'tis a consummation
-
-Devoutly to be wish'd. To die, to sleep;
-
-To sleep: perchance to dream: ay, there's the rub;
-
-For in that sleep of death what dreams may come
-
-When we have shuffled off this mortal coil,
-
-Must give us pause: there's the respect
-
-That makes calamity of so long life;
-
-For who would bear the whips and scorns of time,
-
-The oppressor's wrong, the proud man's contumely,
-
-The pangs of despised love, the law's delay,
-
-The insolence of office and the spurns
-
-That patient merit of the unworthy takes,
-
-When he himself might his quietus make
-
-With a bare bodkin? Who would fardels bear,
-
-To grunt and sweat under a weary life,
-
-But that the dread of something after death,
-
-The undiscover'd country from whose bourn
-
-No traveller returns, puzzles the will
-
-And makes us rather bear those ills we have
-
-Than fly to others that we know not of?
-
-Thus conscience does make cowards of us all;
-
-And thus the native hue of resolution
-
-Is sicklied o'er with the pale cast of thought,
-
-And enterprises of great pith and moment
-
-With this regard their currents turn awry,
-
-And lose the name of action.--Soft you now!
-
-The fair Ophelia! Nymph, in thy orisons
-
-Be all my sins remember'd. 
-
-	</foundkey>	
-
-   		<foundkey>jackfruit</foundkey>
-
-   		<foundkey>custard apple</foundkey>
-
-   		<foundkey>grape</foundkey>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0005-015]
-
-<actionbody>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-   		<foundkey>carrot</foundkey>
-
-   		<foundkey>custard apple</foundkey>
-
-   		<foundkey>grape</foundkey>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0005-016]
-
-<actionbody>
-
-	<keyusage>DSAUsage</keyusage>
-
-   		<foundkey>bigbanana</foundkey>
-
-   		<foundkey>carrot</foundkey>
-
-	<foundkey>
-
-To be, or not to be: that is the question:
-
-Whether 'tis nobler in the mind to suffer
-
-The slings and arrows of outrageous fortune,
-
-Or to take arms against a sea of troubles,
-
-And by opposing end them? To die: to sleep;
-
-No more; and by a sleep to say we end
-
-The heart-ache and the thousand natural shocks
-
-That flesh is heir to, 'tis a consummation
-
-Devoutly to be wish'd. To die, to sleep;
-
-To sleep: perchance to dream: ay, there's the rub;
-
-For in that sleep of death what dreams may come
-
-When we have shuffled off this mortal coil,
-
-Must give us pause: there's the respect
-
-That makes calamity of so long life;
-
-For who would bear the whips and scorns of time,
-
-The oppressor's wrong, the proud man's contumely,
-
-The pangs of despised love, the law's delay,
-
-The insolence of office and the spurns
-
-That patient merit of the unworthy takes,
-
-When he himself might his quietus make
-
-With a bare bodkin? Who would fardels bear,
-
-To grunt and sweat under a weary life,
-
-But that the dread of something after death,
-
-The undiscover'd country from whose bourn
-
-No traveller returns, puzzles the will
-
-And makes us rather bear those ills we have
-
-Than fly to others that we know not of?
-
-Thus conscience does make cowards of us all;
-
-And thus the native hue of resolution
-
-Is sicklied o'er with the pale cast of thought,
-
-And enterprises of great pith and moment
-
-With this regard their currents turn awry,
-
-And lose the name of action.--Soft you now!
-
-The fair Ophelia! Nymph, in thy orisons
-
-Be all my sins remember'd. 
-
-	</foundkey>
-
-   		<foundkey>jackfruit</foundkey>
-
-   		<foundkey>grape</foundkey>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0005-017]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-   		<foundkey>jackfruit</foundkey>
-
-	<foundkey>carrot</foundkey>
-
-	<foundkey>
-
-To be, or not to be: that is the question:
-
-Whether 'tis nobler in the mind to suffer
-
-The slings and arrows of outrageous fortune,
-
-Or to take arms against a sea of troubles,
-
-And by opposing end them? To die: to sleep;
-
-No more; and by a sleep to say we end
-
-The heart-ache and the thousand natural shocks
-
-That flesh is heir to, 'tis a consummation
-
-Devoutly to be wish'd. To die, to sleep;
-
-To sleep: perchance to dream: ay, there's the rub;
-
-For in that sleep of death what dreams may come
-
-When we have shuffled off this mortal coil,
-
-Must give us pause: there's the respect
-
-That makes calamity of so long life;
-
-For who would bear the whips and scorns of time,
-
-The oppressor's wrong, the proud man's contumely,
-
-The pangs of despised love, the law's delay,
-
-The insolence of office and the spurns
-
-That patient merit of the unworthy takes,
-
-When he himself might his quietus make
-
-With a bare bodkin? Who would fardels bear,
-
-To grunt and sweat under a weary life,
-
-But that the dread of something after death,
-
-The undiscover'd country from whose bourn
-
-No traveller returns, puzzles the will
-
-And makes us rather bear those ills we have
-
-Than fly to others that we know not of?
-
-Thus conscience does make cowards of us all;
-
-And thus the native hue of resolution
-
-Is sicklied o'er with the pale cast of thought,
-
-And enterprises of great pith and moment
-
-With this regard their currents turn awry,
-
-And lose the name of action.--Soft you now!
-
-The fair Ophelia! Nymph, in thy orisons
-
-Be all my sins remember'd. 
-
-	</foundkey>	
-
-   		<foundkey>jackfruit</foundkey>
-
-   		<foundkey>grape</foundkey>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0005-018]
-
-<actionbody>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<deletecount>2</deletecount>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0005-019]
-
-<actionbody>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0005-020]
-
-<actionbody>
-
-	<foundkey>carrot</foundkey>
-
-	<foundkey>mango</foundkey>
-
-   		<foundkey>jackfruit</foundkey>
-
-   		<foundkey>custard apple</foundkey>
-
-   		<foundkey>grape</foundkey>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0005-021]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>banana</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0005-022]
-
-<actionbody>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0005-023]
-
-<actionbody>
-
-	<foundkey>carrot</foundkey>
-
-	<foundkey>mango</foundkey>
-
-	<foundkey>banana</foundkey>
-
-   		<foundkey>jackfruit</foundkey>
-
-   		<foundkey>custard apple</foundkey>
-
-   		<foundkey>grape</foundkey>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0005-024]
-
-<actionbody>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0005-025]
-
-<actionbody>
-
-	<deletecount>5</deletecount>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0005-026]
-
-<actionbody>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0006-001]
-
-<actionbody>
-
-	<ImportData>encryptPK8dsa4DER.txt</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>*IMPORTED* encrypted purple plum</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<encrypted>1</encrypted>
-
-	<passphrase>import clanger</passphrase>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0006-002]
-
-<actionbody>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<foundkey>*IMPORTED* encrypted purple plum</foundkey>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0006-003]
-
-<actionbody>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0007-001]
-
-<actionbody>
-
-	<ImportData>pkcs8rsa.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>gm0RSA</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<encrypted>0</encrypted>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0007-002]
-
-<actionbody>
-
-	<ExportFile>oom_export_pkcs8rsa_0.001</ExportFile>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>gm0RSA</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<encrypted>0</encrypted>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0007-003]
-
-<actionbody>
-
-	<ImportData>pkcs8dsa.001</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>gm0DSA</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<encrypted>0</encrypted>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0007-004]
-
-<actionbody>
-
-	<ExportFile>oom_export_pkcs8dsa_0.001</ExportFile>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>gm0DSA</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<encrypted>0</encrypted>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0007-005]
-
-<actionbody>
-
-	<ExportFile>oom_encrypted_export_pkcs8rsa.001</ExportFile>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>gm0RSA</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<encrypted>1</encrypted>
-
-
-
-	<passphrase>export clanger</passphrase>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0007-006]
-
-<actionbody>
-
-	<ExportFile>oom_encrypted_export_pkcs8dsa.001</ExportFile>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>gm0DSA</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<encrypted>1</encrypted>
-
-
-
-	<passphrase>export clanger</passphrase>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0008-001]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>banana</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0008-002]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<foundkey>banana</foundkey>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0008-003]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<timeout>15</timeout>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0008-004]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<timeout>15</timeout>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0008-005]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0008-006]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<timeout>15</timeout>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0008-007]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0008-008]
-
-<actionbody>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-CANCEL_USEAUTH-0009-003]
-
-<actionbody>
-
-	<seconds>5</seconds>
-
-</actionbody>
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/cancel_useauth.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,382 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-START_TESTCASE                SEC-CANCEL_USEAUTH-0001
-
-//! @SYMTestCaseID            SEC-CANCEL_USEAUTH-0001
-
-//! @SYMTestCaseDesc          
-
-//! @SYMTestActions           1) 1, Delete keystore data file
-
-//!                           2) None
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeystoredata  
-
-RUN_TEST_STEP                 -1    CTestHandler        startcancellation   
-
-END_TESTCASE                  SEC-CANCEL_USEAUTH-0001
-
-
-
-
-
-START_TESTCASE                SEC-CANCEL_USEAUTH-0002
-
-//! @SYMTestCaseID            SEC-CANCEL_USEAUTH-0002
-
-//! @SYMTestCaseDesc          Start of testing
-
-//! @SYMTestActions           1) 1.2,Opening key store in manager mode
-
-//!                           2) 1.2.0.1 NOT A TEST Delete everything
-
-//!                           3) 2,Add a key
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   cancel_useauth.ini   SEC-CANCEL_USEAUTH-0002-001
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys          
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 cancel_useauth.ini   SEC-CANCEL_USEAUTH-0002-003
-
-END_TESTCASE                  SEC-CANCEL_USEAUTH-0002
-
-
-
-
-
-START_TESTCASE                SEC-CANCEL_USEAUTH-0003
-
-//! @SYMTestCaseID            SEC-CANCEL_USEAUTH-0003
-
-//! @SYMTestCaseDesc          /////////////////////////////////////////////////////////////////////////////
-
-//!                           Test case 3: List the keys, should only find "Banana"
-
-//!                           /////////////////////////////////////////////////////////////////////////////
-
-//! @SYMTestActions           1) 3 List everything
-
-//!                           2) 3.1,Get it again
-
-//!                           3) 3.2,Open it
-
-//!                           4) 3.3,Open a banana for decrypt
-
-//!                           5) 3.4, Sign with a banana, 20 char text
-
-//!                           6) 3.5, Sign digest with a banana
-
-//!                           7) 3.6, Decrypt with a banana
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               cancel_useauth.ini   SEC-CANCEL_USEAUTH-0003-001
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             cancel_useauth.ini   SEC-CANCEL_USEAUTH-0003-002
-
-RUN_TEST_STEP                 -1    CTestHandler        open                   cancel_useauth.ini   SEC-CANCEL_USEAUTH-0003-003
-
-RUN_TEST_STEP                 -1    CTestHandler        open                   cancel_useauth.ini   SEC-CANCEL_USEAUTH-0003-004
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   cancel_useauth.ini   SEC-CANCEL_USEAUTH-0003-005
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   cancel_useauth.ini   SEC-CANCEL_USEAUTH-0003-006
-
-RUN_TEST_STEP                 -1    CTestHandler        decrypt                cancel_useauth.ini   SEC-CANCEL_USEAUTH-0003-007
-
-END_TESTCASE                  SEC-CANCEL_USEAUTH-0003
-
-
-
-
-
-START_TESTCASE                SEC-CANCEL_USEAUTH-0004
-
-//! @SYMTestCaseID            SEC-CANCEL_USEAUTH-0004
-
-//! @SYMTestCaseDesc          /////////////////////////////////////////////////////////////////////////////
-
-//!                           Test case 4: Delete "Banana" key
-
-//!                           /////////////////////////////////////////////////////////////////////////////
-
-//! @SYMTestActions           1) 4. Delete the key
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             cancel_useauth.ini   SEC-CANCEL_USEAUTH-0004-001
-
-END_TESTCASE                  SEC-CANCEL_USEAUTH-0004
-
-
-
-
-
-START_TESTCASE                SEC-CANCEL_USEAUTH-0005
-
-//! @SYMTestCaseID            SEC-CANCEL_USEAUTH-0005
-
-//! @SYMTestCaseDesc          /////////////////////////////////////////////////////////////////////////////
-
-//!                           Test case 5: List the keys, should find nothing
-
-//!                           /////////////////////////////////////////////////////////////////////////////
-
-//! @SYMTestActions           1) 5 List everything
-
-//!                           2) 6,Add a larger key
-
-//!                           3) 7,Add a key with a very long label
-
-//!                           4) 8,Get that key again
-
-//!                           5) 9,Open that key again
-
-//!                           6) 1.1.5.6,Add a key
-
-//!                           7) 1.1.5.6.1, Sign with a carrot, 20 char text
-
-//!                           8) 1.1.5.7,Add a key
-
-//!                           9) 1.1.5.7.1,Open it
-
-//!                           10) 1.1.5.7.2, Test derive
-
-//!                           11) 10,Add a key with illegal usage
-
-//!                           12) 11,Add a key with illegal usage
-
-//!                           13) 12,Add a key with illegal usage
-
-//!                           14) 13 List everything (including illegal usage keys)
-
-//!                           15) 14 List DSA keys (including illegal usage keys)
-
-//!                           16) 15 List Sign-usage keys (including illegal usage keys)
-
-//!                           17) 16 List 'All usages' keys (including illegal usage keys)
-
-//!                           18) 17, Delete RSA keys
-
-//!                           19) 18 List RSA keys
-
-//!                           20) 19 List everything (including illegal usage keys)
-
-//!                           21) 20,Add a key that was previously deleted
-
-//!                           22) 21 List RSA keys
-
-//!                           23) 22 List everything (including illegal usage keys)
-
-//!                           24) 23, Delete it again
-
-//!                           25) 24, Delete everything
-
-//!                           26) 25 List everything
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               cancel_useauth.ini   SEC-CANCEL_USEAUTH-0005-001
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 cancel_useauth.ini   SEC-CANCEL_USEAUTH-0005-002
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 cancel_useauth.ini   SEC-CANCEL_USEAUTH-0005-003
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             cancel_useauth.ini   SEC-CANCEL_USEAUTH-0005-004
-
-RUN_TEST_STEP                 -1    CTestHandler        open                   cancel_useauth.ini   SEC-CANCEL_USEAUTH-0005-005
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 cancel_useauth.ini   SEC-CANCEL_USEAUTH-0005-006
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   cancel_useauth.ini   SEC-CANCEL_USEAUTH-0005-007
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 cancel_useauth.ini   SEC-CANCEL_USEAUTH-0005-008
-
-RUN_TEST_STEP                 -1    CTestHandler        open                   cancel_useauth.ini   SEC-CANCEL_USEAUTH-0005-009
-
-RUN_TEST_STEP                 -1    CTestHandler        derive                 cancel_useauth.ini   SEC-CANCEL_USEAUTH-0005-010
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 cancel_useauth.ini   SEC-CANCEL_USEAUTH-0005-011
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 cancel_useauth.ini   SEC-CANCEL_USEAUTH-0005-012
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 cancel_useauth.ini   SEC-CANCEL_USEAUTH-0005-013
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               cancel_useauth.ini   SEC-CANCEL_USEAUTH-0005-014
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               cancel_useauth.ini   SEC-CANCEL_USEAUTH-0005-015
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               cancel_useauth.ini   SEC-CANCEL_USEAUTH-0005-016
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               cancel_useauth.ini   SEC-CANCEL_USEAUTH-0005-017
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             cancel_useauth.ini   SEC-CANCEL_USEAUTH-0005-018
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               cancel_useauth.ini   SEC-CANCEL_USEAUTH-0005-019
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               cancel_useauth.ini   SEC-CANCEL_USEAUTH-0005-020
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 cancel_useauth.ini   SEC-CANCEL_USEAUTH-0005-021
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               cancel_useauth.ini   SEC-CANCEL_USEAUTH-0005-022
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               cancel_useauth.ini   SEC-CANCEL_USEAUTH-0005-023
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             cancel_useauth.ini   SEC-CANCEL_USEAUTH-0005-024
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             cancel_useauth.ini   SEC-CANCEL_USEAUTH-0005-025
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               cancel_useauth.ini   SEC-CANCEL_USEAUTH-0005-026
-
-END_TESTCASE                  SEC-CANCEL_USEAUTH-0005
-
-
-
-
-
-START_TESTCASE                SEC-CANCEL_USEAUTH-0006
-
-//! @SYMTestCaseID            SEC-CANCEL_USEAUTH-0006
-
-//! @SYMTestCaseDesc          Test importing keys
-
-//! @SYMTestActions           1) 26, Import a PKCS5 encrypted DSA key
-
-//!                           2) 27, List DSA keys (TEST ID: GT0140-KEY001)
-
-//!                           3) 28, Delete everything
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              cancel_useauth.ini   SEC-CANCEL_USEAUTH-0006-001
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               cancel_useauth.ini   SEC-CANCEL_USEAUTH-0006-002
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             cancel_useauth.ini   SEC-CANCEL_USEAUTH-0006-003
-
-END_TESTCASE                  SEC-CANCEL_USEAUTH-0006
-
-
-
-
-
-START_TESTCASE                SEC-CANCEL_USEAUTH-0007
-
-//! @SYMTestCaseID            SEC-CANCEL_USEAUTH-0007
-
-//! @SYMTestCaseDesc          Test export
-
-//! @SYMTestActions           1) 1.1.1 Import a RSA key
-
-//!                           2) 1.1.5 Export a RSA key
-
-//!                           3) 1.4.1 Import a DSA key
-
-//!                           4) 1.4.6 Export a DSA key
-
-//!                           5) 1.7.6 Export a RSA key in encrypted format
-
-//!                           6) 1.9.6 Export a DSA key in encrypted format
-
-//!                           7) 1.10.0 NOT A TEST Delete everything 
-
-                    ** Basic sanity check for PKCS8 encrypted DSA key import/export **
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              cancel_useauth.ini   SEC-CANCEL_USEAUTH-0007-001
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              cancel_useauth.ini   SEC-CANCEL_USEAUTH-0007-002
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              cancel_useauth.ini   SEC-CANCEL_USEAUTH-0007-003
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              cancel_useauth.ini   SEC-CANCEL_USEAUTH-0007-004
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              cancel_useauth.ini   SEC-CANCEL_USEAUTH-0007-005
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              cancel_useauth.ini   SEC-CANCEL_USEAUTH-0007-006
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys          
-
-END_TESTCASE                  SEC-CANCEL_USEAUTH-0007
-
-
-
-
-
-START_TESTCASE                SEC-CANCEL_USEAUTH-0008
-
-//! @SYMTestCaseID            SEC-CANCEL_USEAUTH-0008
-
-//! @SYMTestCaseDesc          Test authentication objects (snippets of authobjects.txt)
-
-//! @SYMTestActions           1) 2.1, Add a key
-
-//!                           2) 2.2, List protected objects
-
-//!                           3) 0.7.2, Set passphrase timeout to 15 seconds
-
-//!                           4) 1.1.2, Get timeout, expect 15 seconds
-
-//!                           5) 1.4.1.5, Open banana
-
-//!                           6) 1.3.1, Get time remaining, expect 15 seconds
-
-//!                           7) 1.4.2.2, Close object
-
-//!                           8) 3.8, Delete everything
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 cancel_useauth.ini   SEC-CANCEL_USEAUTH-0008-001
-
-RUN_TEST_STEP !Error=-1       -1    CTestHandler        listprotectedobjects   cancel_useauth.ini   SEC-CANCEL_USEAUTH-0008-002
-
-RUN_TEST_STEP !Error=-5       -1    CTestHandler        settimeout             cancel_useauth.ini   SEC-CANCEL_USEAUTH-0008-003
-
-RUN_TEST_STEP !Error=-1       -1    CTestHandler        gettimeout             cancel_useauth.ini   SEC-CANCEL_USEAUTH-0008-004
-
-RUN_TEST_STEP !Error=-1       -1    CTestHandler        authopen               cancel_useauth.ini   SEC-CANCEL_USEAUTH-0008-005
-
-RUN_TEST_STEP !Error=-1       -1    CTestHandler        timeremaining          cancel_useauth.ini   SEC-CANCEL_USEAUTH-0008-006
-
-RUN_TEST_STEP !Error=-1       -1    CTestHandler        authclose              cancel_useauth.ini   SEC-CANCEL_USEAUTH-0008-007
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             cancel_useauth.ini   SEC-CANCEL_USEAUTH-0008-008
-
-END_TESTCASE                  SEC-CANCEL_USEAUTH-0008
-
-
-
-
-
-START_TESTCASE                SEC-CANCEL_USEAUTH-0009
-
-//! @SYMTestCaseID            SEC-CANCEL_USEAUTH-0009
-
-//! @SYMTestCaseDesc          End of testing
-
-//! @SYMTestActions           1) 29,Closing key store
-
-//!                           2) 999.1
-
-//!                           3) 999.2, Sleep 5 seconds
-
-//!                           4) 999.3, Check for server heap error
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP                 -1    CTestHandler        stopcancellation    
-
-RUN_TEST_STEP                 -1    CTestHandler        sleep                  cancel_useauth.ini   SEC-CANCEL_USEAUTH-0009-003
-
-RUN_TEST_STEP                 -1    CTestHandler        checkserverheaperror
-
-END_TESTCASE                  SEC-CANCEL_USEAUTH-0009
-
-
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/capability_useauth.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,313 +0,0 @@
-[SEC-CAPABILITY_USEAUTH-0001-002]
-<actionbody>
-	<mode>manager</mode>
-</actionbody>
-
-[SEC-CAPABILITY_USEAUTH-0001-003]
-<actionbody>
-	<keyusage>allusagesbutNR</keyusage>
-	<keysize>512</keysize>
-	<keylabel>additionalkey</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<authexpression>strong</authexpression>
-	<freshness>200</freshness>
-</actionbody>
-
-[SEC-CAPABILITY_USEAUTH-0002-001]
-<actionbody>
-	<testexe>t_keystore.exe</testexe>
-	<excludedcapabilities>
-	<capability>TCB</capability>
-	</excludedcapabilities>
-	<policy>
-	<capability>WriteUserData</capability>
-	</policy>
-
-	<preactions>
-	<action>
-		<actionname>1, Open key store in manager mode</actionname>
-		<actiontype>init</actiontype>
-		<actionbody>
-			<mode>manager</mode>
-		</actionbody>
-		<actionresult>
-			<return>KErrNone</return>
-		</actionresult>
-	</action>
-	</preactions>
-
-	<passactions>
-	<action>
-		<actionname>Add key banana</actionname>
-		<actiontype>addkey</actiontype>
-		<actionbody>
-			<keyusage>allusagesbutNR</keyusage>
-			<keysize>512</keysize>
-			<keylabel>banana</keylabel>
-			<keyalgorithm>RSA</keyalgorithm>
-			<keyaccesstype>Extractable</keyaccesstype>
-			<authexpression>strong</authexpression>
-			<freshness>20</freshness>
-		</actionbody>
-		<actionresult>
-			<return>KErrNone</return> 
-		</actionresult>
-	</action>
-
-	<action>
-		<actionname>1.1.0 Import a RSA key</actionname>
-		<actiontype>importkey</actiontype>
-		<actionbody>
-			<ImportData>pkcs8rsa.001</ImportData>
-			<keyusage>allusagesbutNR</keyusage>
-			<keylabel>gm0</keylabel>
-			<keyaccesstype>Extractable</keyaccesstype>
-			<authexpression>strong</authexpression>
-			<freshness>25</freshness>
-
-		</actionbody>
-		<actionresult>
-			<return>KErrNone</return>
-		</actionresult>
-	</action>
-
-
-	<action>
-		<actionname>Import a key</actionname>
-		<actiontype>importkey</actiontype>
-		<actionbody>
-			<ImportData>export_pkcs8rsa_0_3DES_CBC.001</ImportData>
-			<keyusage>allusagesbutNR</keyusage>
-			<keylabel>gm_export_pkcs8rsa_0_3DES_CBC.001</keylabel>
-			<keyalgorithm>RSA</keyalgorithm>
-			<keyaccesstype>Extractable</keyaccesstype>
-			<encrypted>1</encrypted>
-			<passphrase>import clanger</passphrase>
-			<disabledialogcheck>1</disabledialogcheck>
-			<authexpression>strong</authexpression>
-			<freshness>50</freshness>
-		</actionbody>
-		<actionresult>
-			<return>KErrNone</return>
-		</actionresult>
-	</action>
-
-	
-	</passactions>
-
-	<failactions>
-	<action>
-		<actionname>Add key banana</actionname>
-		<actiontype>addkey</actiontype>
-		<actionbody>
-			<keyusage>allusagesbutNR</keyusage>
-			<keysize>512</keysize>
-			<keylabel>banana</keylabel>
-			<keyalgorithm>RSA</keyalgorithm>
-			<keyaccesstype>Extractable</keyaccesstype>
-			<authexpression>strong</authexpression>
-			<freshness>20</freshness>
-		</actionbody>
-		<actionresult> 
-			<return>KErrPermissionDenied</return> 
-		</actionresult>
-	</action>
-
-	<action>
-		<actionname>1.1.0 Import a RSA key</actionname>
-		<actiontype>importkey</actiontype>
-		<actionbody>
-			<ImportData>pkcs8rsa.001</ImportData>
-			<keyusage>allusagesbutNR</keyusage>
-			<keylabel>gm0</keylabel>
-			<keyaccesstype>Extractable</keyaccesstype>
-			<authexpression>strong</authexpression>
-			<freshness>25</freshness>
-
-		</actionbody>
-		<actionresult>
-			<return>KErrPermissionDenied</return>
-		</actionresult>
-	</action>
-
-
-	<action>
-		<actionname>Import a key</actionname>
-		<actiontype>importkey</actiontype>
-		<actionbody>
-			<ImportData>export_pkcs8rsa_0_3DES_CBC.001</ImportData>
-			<keyusage>allusagesbutNR</keyusage>
-			<keylabel>gm_export_pkcs8rsa_0_3DES_CBC.001</keylabel>
-			<keyalgorithm>RSA</keyalgorithm>
-			<keyaccesstype>Extractable</keyaccesstype>
-			<encrypted>1</encrypted>
-			<passphrase>import clanger</passphrase>
-			<disabledialogcheck>1</disabledialogcheck>
-			<authexpression>strong</authexpression>
-			<freshness>50</freshness>
-		</actionbody>
-		<actionresult>
-			<return>KErrPermissionDenied</return> 
-		</actionresult>
-	</action>
-	
-	</failactions>
-
-	<postactions>
-	<action>
-		<actionname>5, Close key store</actionname>
-		<actiontype>delete</actiontype>
-		<actionbody></actionbody>
-		<actionresult>
-			<return>KErrNone</return>
-		</actionresult>
-	</action>
-	</postactions>
-</actionbody>
-
-[SEC-CAPABILITY_USEAUTH-0002-002]
-<actionbody>
-	<testexe>t_keystore.exe</testexe>
-	<excludedcapabilities>
-	<capability>TCB</capability>
-	</excludedcapabilities>
-	<policy>
-	<capability>ReadUserData</capability>
-	<capability>WriteUserData</capability>
-	</policy>
-
-	<preactions>
-	<action>
-		<actionname>1, Open key store in manager mode</actionname>
-		<actiontype>init</actiontype>
-		<actionbody>
-			<mode>manager</mode>
-		</actionbody>
-		<actionresult>
-			<return>KErrNone</return>
-		</actionresult>
-	</action>
-	</preactions>
-
-	<passactions>
-	
-	<action>
-		<actionname>Set a authentication policy for a key </actionname>
-		<actiontype>authenticationpolicy</actiontype>
-		<actionbody>
-			<authmode>set</authmode>
-			<keylabel>gm_export_pkcs8rsa_0_3DES_CBC.001</keylabel>
-			<authexpression>medium</authexpression>
-			<freshness>0</freshness>
-		</actionbody>
-		<actionresult>
-			<return>KErrNone</return>
-		</actionresult>
-	</action>
-
-	</passactions>
-
-	<failactions>
-	<action>
-		<actionname>Set a authentication policy for a key </actionname>
-		<actiontype>authenticationpolicy</actiontype>
-		<actionbody>
-			<authmode>set</authmode>
-			<keylabel>gm_export_pkcs8rsa_0_3DES_CBC.001</keylabel>
-			<authexpression>medium</authexpression>
-			<freshness>0</freshness>
-		</actionbody>
-		<actionresult>
-			<return>KErrPermissionDenied</return>
-		</actionresult>
-	</action>
-
-	</failactions>
-
-	<postactions>
-	<action>
-		<actionname>5, Close key store</actionname>
-		<actiontype>delete</actiontype>
-		<actionbody></actionbody>
-		<actionresult>
-			<return>KErrNone</return>
-		</actionresult>
-	</action>
-	</postactions>
-</actionbody>
-
-[SEC-CAPABILITY_USEAUTH-0002-003]
-<actionbody>
-	<testexe>t_keystore.exe</testexe>
-	<excludedcapabilities>
-	<capability>TCB</capability>
-	</excludedcapabilities>
-	<policy>
-	<capability>ReadUserData</capability>
-	</policy>
-
-	<preactions>
-	<action>
-		<actionname>1, Open key store in manager mode</actionname>
-		<actiontype>init</actiontype>
-		<actionbody>
-			<mode>manager</mode>
-		</actionbody>
-		<actionresult>
-			<return>KErrNone</return>
-		</actionresult>
-	</action>
-	</preactions>
-
-	<passactions>
-	
-	<action>
-		<actionname>Try to get authentication policy for a key</actionname>
-		<actiontype>authenticationpolicy</actiontype>
-		<actionbody>
-			<authmode>get</authmode>
-			<keylabel>additionalkey</keylabel>
-			<expectedexpression>strong</expectedexpression>
-			<expectedfreshness>200</expectedfreshness>
-		</actionbody>
-		<actionresult>
-			<return>KErrNone</return>
-		</actionresult>
-	</action>
-
-	</passactions>
-
-	<failactions>
-	<action>
-		<actionname>Try to get authentication policy for a key</actionname>
-		<actiontype>authenticationpolicy</actiontype>
-		<actionbody>
-			<authmode>get</authmode>
-			<keylabel>additionalkey</keylabel>
-			<expectedexpression>strong</expectedexpression>
-			<expectedfreshness>200</expectedfreshness>
-		</actionbody>
-		<actionresult>
-			<return>KErrPermissionDenied</return>
-		</actionresult>
-	</action>
-	</failactions>
-
-	<postactions>
-	<action>
-		<actionname>5, Close key store</actionname>
-		<actiontype>delete</actiontype>
-		<actionbody></actionbody>
-		<actionresult>
-			<return>KErrNone</return>
-		</actionresult>
-	</action>
-	</postactions>
-</actionbody>
-
-[SEC-CAPABILITY_USEAUTH-0003-002]
-<actionbody>
-	<seconds>5</seconds>
-</actionbody>
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/capability_useauth.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,124 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-START_TESTCASE                SEC-CAPABILITY_USEAUTH-0001
-
-//! @SYMTestCaseID            SEC-CAPABILITY_USEAUTH-0001
-
-//! @SYMTestCaseDesc          Script 2: Test new apis for create, import and setting authentication policy
-
-//!                           
-
-//!                           //////////////////////////////////////////////////////////////////////////////
-
-//!                           0. Initialisation
-
-//!                           //////////////////////////////////////////////////////////////////////////////
-
-//!                           
-
-//!                           First we delete the keystore data file, so that we know we are setting the
-
-//!                           passphrase with our first key add operation.
-
-//!                           Then we set up some keys for the rest of the test script to use:
-
-//!                           
-
-//!                           Key:     Type:
-
-//!                           banana	RSA
-
-//!                           mango	DSA
-
-//!                           tomato	DH
-
-//!                           
-
-//!                           todo
-
-//!                           test passphrase timeout affects all keys, and all processes
-
-//! @SYMTestActions           1) 0.1, Delete keystore data file
-
-//!                           2) 0.2, Opening key store in manager mode
-
-//!                           3) Add key banana
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeystoredata  
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   capability_useauth.ini   SEC-CAPABILITY_USEAUTH-0001-002
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 capability_useauth.ini   SEC-CAPABILITY_USEAUTH-0001-003
-
-END_TESTCASE                  SEC-CAPABILITY_USEAUTH-0001
-
-
-
-
-
-START_TESTCASE                SEC-CAPABILITY_USEAUTH-0002
-
-//! @SYMTestCaseID            SEC-CAPABILITY_USEAUTH-0002
-
-//! @SYMTestCaseDesc          1. Capability testing
-
-//! @SYMTestActions           1) 6.3.1, Test use policy enforcement for SID and capabilities
-
-//!                           2) 6.3.2, Test use policy enforcement setting authentication policy
-
-//!                           3) 6.3.2, Test use policy enforcement setting authentication policy
-
-RUN_TEST_STEP                 -1    CTestHandler        policytest             capability_useauth.ini   SEC-CAPABILITY_USEAUTH-0002-001
-
-RUN_TEST_STEP                 -1    CTestHandler        policytest             capability_useauth.ini   SEC-CAPABILITY_USEAUTH-0002-002
-
-RUN_TEST_STEP                 -1    CTestHandler        policytest             capability_useauth.ini   SEC-CAPABILITY_USEAUTH-0002-003
-
-END_TESTCASE                  SEC-CAPABILITY_USEAUTH-0002
-
-
-
-
-
-START_TESTCASE                SEC-CAPABILITY_USEAUTH-0003
-
-//! @SYMTestCaseID            SEC-CAPABILITY_USEAUTH-0003
-
-//! @SYMTestCaseDesc          //////////////////////////////////////////////////////////////////////////////
-
-//!                           Cleanup
-
-//!                           //////////////////////////////////////////////////////////////////////////////
-
-//! @SYMTestActions           1) 8.2, Close key store
-
-//!                           2) 8.3, Sleep 5 seconds
-
-//!                           3) 8.4, Check for server heap error
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP                 -1    CTestHandler        sleep                  capability_useauth.ini   SEC-CAPABILITY_USEAUTH-0003-002
-
-RUN_TEST_STEP                 -1    CTestHandler        checkserverheaperror
-
-END_TESTCASE                  SEC-CAPABILITY_USEAUTH-0003
-
-
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/createoldkeystore.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,59 +0,0 @@
-[SEC-FILETOKENS-CREATEOLDKEYSTORE-1-002]
-<actionbody>
-	<mode>manager</mode>
-</actionbody>
-
-
-[SEC-FILETOKENS-CREATEOLDKEYSTORE-1-004]
-<actionbody>
-	<keyusage>Derive</keyusage>
-	<keysize>512</keysize>
-	<keylabel>dhkey</keylabel>
-	<keyalgorithm>DH</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<keystore>0</keystore>
-	<passphrase>create pinkcloud</passphrase>
-</actionbody>
-
-
-[SEC-FILETOKENS-CREATEOLDKEYSTORE-1-005]
-<actionbody>
-	<keyusage>allusagesbutNR</keyusage>
-	<keysize>512</keysize>
-	<keylabel>rsakey</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<keystore>0</keystore>
-</actionbody>
-
-
-[SEC-FILETOKENS-CREATEOLDKEYSTORE-1-006]
-<actionbody>
-	<keyusage>DSAUsage</keyusage>
-	<keysize>512</keysize>
-	<keylabel>dsakey</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-		
-		
-</actionbody>
-
-
-[SEC-FILETOKENS-CREATEOLDKEYSTORE-1-007]
-<actionbody>
-	<foundkey>dhkey</foundkey>
-	<foundkey>rsakey</foundkey>
-	<foundkey>dsakey</foundkey>
-</actionbody>
-
-
-
-[SEC-FILETOKENS-CREATEOLDKEYSTORE-1-009]
-<actionbody>
-        <seconds>5</seconds>
-</actionbody>
-
-
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/createoldkeystore.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,72 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-//
-
-
-START_TESTCASE               SEC-FILETOKENS-CREATEOLDKEYSTORE-1-0001
-
-//! @SYMTestCaseID           SEC-FILETOKENS-CREATEOLDKEYSTORE-1-0001
-
-//! @SYMTestCaseDesc          
-
-					///////////////////////////////////////////////////////////////////////////////
-					//	Create an old key store
-					////////////////////////////////////////////////////////////////////////////////////
-
-//! @SYMTestActions           1) Delete keystore data file
-
-//!                           2) Opening key store in manager mode
-
-//!                           3) Delete default keys
-
-//!                           4) Add a DH key
-
-//!                           5) Add a RSA key
-
-//!                           6) Add a DSA key
-
-//!                           7) List all keys
-
-//!                           8) Closing key store
-
-//!                           9) Sleep 5 seconds
-
-//!                          10) Check for server heap error
-
-
-
-RUN_TEST_STEP -1 CTestHandler deletekeystoredata
- 
-RUN_TEST_STEP -1 CTestHandler init createoldkeystore.ini SEC-FILETOKENS-CREATEOLDKEYSTORE-1-002
-
-RUN_TEST_STEP -1 CTestHandler deletekeys
-
-RUN_TEST_STEP -1 CTestHandler addkey createoldkeystore.ini SEC-FILETOKENS-CREATEOLDKEYSTORE-1-004
-
-RUN_TEST_STEP -1 CTestHandler addkey createoldkeystore.ini SEC-FILETOKENS-CREATEOLDKEYSTORE-1-005
-
-RUN_TEST_STEP -1 CTestHandler addkey createoldkeystore.ini SEC-FILETOKENS-CREATEOLDKEYSTORE-1-006
-
-RUN_TEST_STEP -1 CTestHandler listallkeys createoldkeystore.ini SEC-FILETOKENS-CREATEOLDKEYSTORE-1-007
-
-RUN_TEST_STEP -1 CTestHandler delete
-
-RUN_TEST_STEP -1 CTestHandler sleep createoldkeystore.ini SEC-FILETOKENS-CREATEOLDKEYSTORE-1-009
-
-RUN_TEST_STEP -1 CTestHandler checkserverheaperror
-
-END_TESTCASE                 SEC-FILETOKENS-CREATEOLDKEYSTORE-1-0001
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/exportscript_useauth.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,1142 +0,0 @@
-[SEC-EXPORTSCRIPT_USEAUTH-0001-002]
-<actionbody>
-	<mode>manager</mode>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-004]
-<actionbody>
-	<ImportData>pkcs8dh.001</ImportData>
-	<keyusage>Derive</keyusage>
-	<keylabel>cheeku</keylabel>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-005]
-<actionbody>
-	<ImportData>pkcs8rsa.001</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm0</keylabel>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-006]
-<actionbody>
-	<ImportData>pkcs8rsa1.001</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm1</keylabel>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-007]
-<actionbody>
-	<ImportData>pkcs8rsa2.001</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm2</keylabel>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-008]
-<actionbody>
-	<ImportData>pkcs8rsa3.001</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm3</keylabel>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-009]
-<actionbody>
-	<ImportData>pkcs8rsa4.001</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm4</keylabel>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-010]
-<actionbody>
-	<ExportFile>export_pkcs8rsa_0.001</ExportFile>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm0</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<encrypted>0</encrypted>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-011]
-<actionbody>
-	<ExportFile>export_pkcs8rsa_1.001</ExportFile>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm1</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<encrypted>0</encrypted>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-012]
-<actionbody>
-	<ExportFile>export_pkcs8rsa_2.001</ExportFile>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm2</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<encrypted>0</encrypted>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-013]
-<actionbody>
-	<ExportFile>export_pkcs8rsa_3.001</ExportFile>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm3</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<encrypted>0</encrypted>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-014]
-<actionbody>
-	<ExportFile>export_pkcs8rsa_4.001</ExportFile>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm4</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<encrypted>0</encrypted>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-015]
-<actionbody>
-	<ExportFile>export_public_rsa_0.001</ExportFile>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm0</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<encrypted>0</encrypted>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-016]
-<actionbody>
-	<ExportFile>export_public_rsa_1.001</ExportFile>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm1</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<encrypted>0</encrypted>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-017]
-<actionbody>
-	<ExportFile>export_public_rsa_2.001</ExportFile>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm2</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<encrypted>0</encrypted>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-018]
-<actionbody>
-	<ExportFile>export_public_rsa_3.001</ExportFile>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm3</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<encrypted>0</encrypted>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-019]
-<actionbody>
-	<ImportData>export_pkcs8rsa_0.001</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm0_from_exported</keylabel>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-020]
-<actionbody>
-	<ImportData>export_pkcs8rsa_1.001</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm1_from_exported</keylabel>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-021]
-<actionbody>
-	<ImportData>export_pkcs8rsa_2.001</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm2_from_exported</keylabel>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-022]
-<actionbody>
-	<ImportData>export_pkcs8rsa_3.001</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm3_from_Exported</keylabel>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-023]
-<actionbody>
-	<ImportData>export_pkcs8rsa_4.001</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm4_from_Exported</keylabel>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-024]
-<actionbody>
-	<originalfile>pkcs8rsa1.001</originalfile>
-	<newfile>export_pkcs8rsa_1.001</newfile>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-025]
-<actionbody>
-	<originalfile>pkcs8rsa2.001</originalfile>
-	<newfile>export_pkcs8rsa_2.001</newfile>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-026]
-<actionbody>
-	<originalfile>pkcs8rsa3.001</originalfile>
-	<newfile>export_pkcs8rsa_3.001</newfile>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-027]
-<actionbody>
-	<originalfile>pkcs8rsa4.001</originalfile>
-	<newfile>export_pkcs8rsa_4.001</newfile>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-028]
-<actionbody>
-	<originalfile>pkcs8rsa.001</originalfile>
-	<newfile>export_pkcs8rsa_0.001</newfile>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-029]
-<actionbody>
-	<originalfile>rsapub.txt</originalfile>
-	<newfile>export_public_rsa_0.001</newfile>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-030]
-<actionbody>
-	<originalfile>rsapub1.txt</originalfile>
-	<newfile>export_public_rsa_1.001</newfile>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-031]
-<actionbody>
-	<originalfile>rsapub2.txt</originalfile>
-	<newfile>export_public_rsa_2.001</newfile>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-032]
-<actionbody>
-	<originalfile>rsapub3.txt</originalfile>
-	<newfile>export_public_rsa_3.001</newfile>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-034]
-<actionbody>
-	<ImportData>pkcs8dsa.001</ImportData>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gm0</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-035]
-<actionbody>
-	<ImportData>pkcs8dsa1.001</ImportData>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gm1</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-036]
-<actionbody>
-	<ImportData>pkcs8dsa2.001</ImportData>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gm2</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-037]
-<actionbody>
-	<ImportData>pkcs8dsa3.001</ImportData>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gm3</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-038]
-<actionbody>
-	<ImportData>pkcs8dsa4.001</ImportData>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gm4</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-039]
-<actionbody>
-	<ExportFile>export_pkcs8dsa_0.001</ExportFile>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gm0</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<encrypted>0</encrypted>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-040]
-<actionbody>
-	<ExportFile>export_pkcs8dsa_1.001</ExportFile>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gm1</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<encrypted>0</encrypted>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-041]
-<actionbody>
-	<ExportFile>export_pkcs8dsa_2.001</ExportFile>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gm2</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<encrypted>0</encrypted>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-042]
-<actionbody>
-	<ExportFile>export_pkcs8dsa_3.001</ExportFile>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gm3</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<encrypted>0</encrypted>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-043]
-<actionbody>
-	<ExportFile>export_pkcs8dsa_4.001</ExportFile>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gm4</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<encrypted>0</encrypted>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-044]
-<actionbody>
-	<ExportFile>export_public_dsa_0.001</ExportFile>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gm0</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<encrypted>0</encrypted>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-045]
-<actionbody>
-	<ExportFile>export_public_dsa_1.001</ExportFile>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gm1</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<encrypted>0</encrypted>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-046]
-<actionbody>
-	<ExportFile>export_public_dsa_2.001</ExportFile>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gm2</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<encrypted>0</encrypted>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-047]
-<actionbody>
-	<ExportFile>export_public_dsa_3.001</ExportFile>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gm3</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<encrypted>0</encrypted>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-048]
-<actionbody>
-	<ExportFile>export_public_dsa_4.001</ExportFile>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gm4</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<encrypted>0</encrypted>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-049]
-<actionbody>
-	<originalfile>dsapub.txt</originalfile>
-	<newfile>export_public_dsa_0.001</newfile>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-050]
-<actionbody>
-	<originalfile>dsapub1.txt</originalfile>
-	<newfile>export_public_dsa_1.001</newfile>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-051]
-<actionbody>
-	<originalfile>dsapub2.txt</originalfile>
-	<newfile>export_public_dsa_2.001</newfile>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-052]
-<actionbody>
-	<originalfile>dsapub3.txt</originalfile>
-	<newfile>export_public_dsa_3.001</newfile>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-053]
-<actionbody>
-	<originalfile>dsapub4.txt</originalfile>
-	<newfile>export_public_dsa_4.001</newfile>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-054]
-<actionbody>
-	<ImportData>export_pkcs8dsa_0.001</ImportData>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gm0_from_exported</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-055]
-<actionbody>
-	<ImportData>export_pkcs8dsa_1.001</ImportData>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gm1_from_exported</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-056]
-<actionbody>
-	<ImportData>export_pkcs8dsa_2.001</ImportData>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gm2_from_exported</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-057]
-<actionbody>
-	<ImportData>export_pkcs8dsa_3.001</ImportData>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gm3_from_Exported</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-058]
-<actionbody>
-	<ImportData>export_pkcs8dsa_4.001</ImportData>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gm4_from_exported</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-059]
-<actionbody>
-	<originalfile>pkcs8dsa.001</originalfile>
-	<newfile>export_pkcs8dsa_0.001</newfile>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-060]
-<actionbody>
-	<originalfile>pkcs8dsa1.001</originalfile>
-	<newfile>export_pkcs8dsa_1.001</newfile>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-061]
-<actionbody>
-	<originalfile>pkcs8dsa2.001</originalfile>
-	<newfile>export_pkcs8dsa_2.001</newfile>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-062]
-<actionbody>
-	<originalfile>pkcs8dsa3.001</originalfile>
-	<newfile>export_pkcs8dsa_3.001</newfile>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-063]
-<actionbody>
-	<originalfile>pkcs8dsa4.001</originalfile>
-	<newfile>export_pkcs8dsa_4.001</newfile>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-065]
-<actionbody>
-	<ImportData>encryptPK8rsaDER.txt</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gmRSA0</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<passphrase>import clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-066]
-<actionbody>
-	<ImportData>encryptPK8rsa1DER.txt</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gmRSA1</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<passphrase>import clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-067]
-<actionbody>
-	<ImportData>encryptPK8rsa2DER.txt</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gmRSA2</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<passphrase>import clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-068]
-<actionbody>
-	<ImportData>encryptPK8rsa3DER.txt</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gmRSA3</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<passphrase>import clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-069]
-<actionbody>
-	<ImportData>encryptPK8rsa4DER.txt</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gmRSA4</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<passphrase>import clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-070]
-<actionbody>
-	<ExportFile>encrypted_export_pkcs8rsa.001</ExportFile>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gmRSA0</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<encrypted>1</encrypted>
-
-	<passphrase>export clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-071]
-<actionbody>
-	<ExportFile>encrypted_export_pkcs8rsa1.001</ExportFile>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gmRSA1</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<encrypted>1</encrypted>
-
-	<passphrase>export clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-072]
-<actionbody>
-	<ExportFile>encrypted_export_pkcs8rsa2.001</ExportFile>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gmRSA2</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<encrypted>1</encrypted>
-
-	<passphrase>export clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-073]
-<actionbody>
-	<ExportFile>encrypted_export_pkcs8rsa3.001</ExportFile>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gmRSA3</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<encrypted>1</encrypted>
-
-	<passphrase>export clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-074]
-<actionbody>
-	<ExportFile>encrypted_export_pkcs8rsa4.001</ExportFile>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gmRSA4</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<encrypted>1</encrypted>
-
-	<passphrase>export clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-075]
-<actionbody>
-	<ImportData>pkcs8rsa1_3des.der</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gmRSA_3DES</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<passphrase>import clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-077]
-<actionbody>
-	<ImportData>pkcs8rsa.001</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm0</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-078]
-<actionbody>
-	<ExportFile>encrypted_export_pkcs8rsa.001</ExportFile>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm0</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<encrypted>1</encrypted>
-
-	<passphrase>export clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-080]
-<actionbody>
-	<ImportData>encrypted_export_pkcs8rsa.001</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm0</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<passphrase>import clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-081]
-<actionbody>
-	<ExportFile>exportFromImport_pkcs8rsa.001</ExportFile>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm0</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<encrypted>0</encrypted>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-082]
-<actionbody>
-	<originalfile>pkcs8rsa.001</originalfile>
-	<newfile>exportFromImport_pkcs8rsa.001</newfile>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-084]
-<actionbody>
-	<ImportData>encryptPK8dsaDER.txt</ImportData>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gmDSA0</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<passphrase>import clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-085]
-<actionbody>
-	<ImportData>encryptPK8dsa1DER.txt</ImportData>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gmDSA1</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<passphrase>import clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-086]
-<actionbody>
-	<ImportData>encryptPK8dsa2DER.txt</ImportData>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gmDSA2</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<passphrase>import clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-087]
-<actionbody>
-	<ImportData>encryptPK8dsa3DER.txt</ImportData>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gmDSA3</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<passphrase>import clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-088]
-<actionbody>
-	<ImportData>encryptPK8dsa4DER.txt</ImportData>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gmDSA4</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<passphrase>import clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-089]
-<actionbody>
-	<ExportFile>encrypted_export_pkcs8dsa.001</ExportFile>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gmDSA0</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<encrypted>1</encrypted>
-
-	<passphrase>export clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-090]
-<actionbody>
-	<ExportFile>encrypted_export_pkcs8dsa1.001</ExportFile>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gmDSA1</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<encrypted>1</encrypted>
-
-	<passphrase>export clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-091]
-<actionbody>
-	<ExportFile>encrypted_export_pkcs8dsa2.001</ExportFile>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gmDSA2</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<encrypted>1</encrypted>
-
-	<passphrase>export clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-092]
-<actionbody>
-	<ExportFile>encrypted_export_pkcs8dsa3.001</ExportFile>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gmDSA3</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<encrypted>1</encrypted>
-
-	<passphrase>export clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-093]
-<actionbody>
-	<ExportFile>encrypted_export_pkcs8dsa4.001</ExportFile>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gmDSA4</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<encrypted>1</encrypted>
-
-	<passphrase>export clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-094]
-<actionbody>
-	<ExportFile>export_public_dsa_0.001</ExportFile>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gmDSA0</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<encrypted>0</encrypted>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-096]
-<actionbody>
-	<ImportData>pkcs8dsa.001</ImportData>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gmDSA0</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-097]
-<actionbody>
-	<ExportFile>encrypted_export_pkcs8dsa.001</ExportFile>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gmDSA0</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<encrypted>1</encrypted>
-
-	<passphrase>export clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-099]
-<actionbody>
-	<ImportData>encrypted_export_pkcs8dsa.001</ImportData>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gmDSA0_encrypted</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<passphrase>import clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-100]
-<actionbody>
-	<ExportFile>exportFromImport_pkcs8dsa.001</ExportFile>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gmDSA0_encrypted</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<encrypted>0</encrypted>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-101]
-<actionbody>
-	<originalfile>pkcs8dsa.001</originalfile>
-	<newfile>exportFromImport_pkcs8dsa.001</newfile>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-103]
-<actionbody>
-	<ImportData>pkcs8rsa1_3des.der</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gmRSA_3DES</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<passphrase>import clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-104]
-<actionbody>
-	<ImportData>pkcs8rsa1_rc2.der</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gmRSA_RC2</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<passphrase>import clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-105]
-<actionbody>
-	<ImportData>pkcs8rsa1_rc4.der</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gmRSA_RC4</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-106]
-<actionbody>
-	<ImportData>pkcs8dsa1_des3_nsdh.der</ImportData>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gmDSA_nsdb</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<passphrase>import clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-107]
-<actionbody>
-	<ImportData>pkcs8rsa1_des3_nooctet.der</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gmRSA_nooct</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<passphrase>import clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-108]
-<actionbody>
-	<ImportData>pkcs8dsa1_des3_embed.der</ImportData>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gmDSA_embed</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<passphrase>import clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-110]
-<actionbody>
-	<ImportData>pkcs8rsa_attr.001</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm0_attr</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-111]
-<actionbody>
-	<ImportData>pkcs8dsa_attr.001</ImportData>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gm1_attr</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-112]
-<actionbody>
-	<ExportFile>export_pkcs8rsa_attr.001</ExportFile>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm0_attr</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<encrypted>0</encrypted>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-113]
-<actionbody>
-	<ExportFile>export_pkcs8dsa_attr.001</ExportFile>
-	<keyusage>DSAUsage</keyusage>
-	<keylabel>gm1_attr</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<encrypted>0</encrypted>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-114]
-<actionbody>
-	<originalfile>pkcs8rsa_attr.001</originalfile>
-	<newfile>export_pkcs8rsa_attr.001</newfile>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-115]
-<actionbody>
-	<originalfile>pkcs8dsa_attr.001</originalfile>
-	<newfile>export_pkcs8dsa_attr.001</newfile>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-117]
-<actionbody>
-	<ImportData>pkcs8rsa.001</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm0</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-118]
-<actionbody>
-	<ExportFile>export_pkcs8rsa_0_3DES_CBC.001</ExportFile>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm0</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<encrypted>1</encrypted>
-                <cipher>ECipher3DES_CBC</cipher>
-
-	<passphrase>export clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-119]
-<actionbody>
-	<ExportFile>export_pkcs8rsa_0_DES_CBC.001</ExportFile>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm0</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<encrypted>1</encrypted>
-                <cipher>ECipherDES_CBC</cipher>
-
-	<passphrase>export clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-120]
-<actionbody>
-	<ExportFile>export_pkcs8rsa_0_RC2_CBC_40.001</ExportFile>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm0</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<encrypted>1</encrypted>
-                <cipher>ECipherRC2_CBC_40</cipher>
-
-	<passphrase>export clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-121]
-<actionbody>
-	<ExportFile>export_pkcs8rsa_0_RC2_CBC_128.001</ExportFile>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm0</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<encrypted>1</encrypted>
-                <cipher>ECipherRC2_CBC_128</cipher>
-
-	<passphrase>export clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-122]
-<actionbody>
-	<ExportFile>export_pkcs8rsa_0_RC2_CBC_40_16.001</ExportFile>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm0</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<encrypted>1</encrypted>
-                <cipher>ECipherRC2_CBC_40_16</cipher>
-
-	<passphrase>export clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-123]
-<actionbody>
-	<ExportFile>export_pkcs8rsa_0_RC2_CBC_128_16.001</ExportFile>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm0</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<encrypted>1</encrypted>
-                <cipher>ECipherRC2_CBC_128_16</cipher>
-
-	<passphrase>export clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-124]
-<actionbody>
-	<ImportData>export_pkcs8rsa_0_RC2_CBC_40.001</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm_export_pkcs8rsa_0_RC2_CBC_40</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<passphrase>import clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-125]
-<actionbody>
-	<ImportData>export_pkcs8rsa_0_RC2_CBC_128.001</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm_export_pkcs8rsa_0_RC2_CBC_128</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<passphrase>import clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-126]
-<actionbody>
-	<ImportData>export_pkcs8rsa_0_RC2_CBC_40_16.001</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm_export_pkcs8rsa_0_RC2_CBC_40_16</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<passphrase>import clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-127]
-<actionbody>
-	<ImportData>export_pkcs8rsa_0_RC2_CBC_128_16.001</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm_export_pkcs8rsa_0_RC2_CBC_128_16</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<passphrase>import clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-128]
-<actionbody>
-	<ImportData>export_pkcs8rsa_0_DES_CBC.001</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm_export_pkcs8rsa_0_DES_CBC.001</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<passphrase>import clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-129]
-<actionbody>
-	<ImportData>export_pkcs8rsa_0_3DES_CBC.001</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm_export_pkcs8rsa_0_3DES_CBC.001</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<encrypted>1</encrypted>
-	<passphrase>import clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-131]
-<actionbody>
-	<ImportData>pkcs8rsa.001</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm0</keylabel>
-	<keyaccesstype>Sensitive</keyaccesstype>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-132]
-<actionbody>
-	<keyusage>allusagesbutNR</keyusage>
-	<keysize>512</keysize>
-	<keylabel>gm0</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<keyaccesstype>Sensitive</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-133]
-<actionbody>
-	<ImportData>encryptPK8rsaDER.txt</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gmRSA0</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<keyaccesstype>Sensitive</keyaccesstype>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<passphrase>import clanger</passphrase>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-134]
-<actionbody>
-	<keyusage>allusagesbutNR</keyusage>
-	<keysize>512</keysize>
-	<keylabel>gmRSA0</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<keyaccesstype>Sensitive</keyaccesstype>
-	<keyaccesstype>AlwaysSensitive</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-135]
-<actionbody>
-	<ImportData>pkcs8rsa.001</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm3</keylabel>
-	<keyaccesstype>Sensitive</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-136]
-<actionbody>
-	<keyusage>allusagesbutNR</keyusage>
-	<keysize>512</keysize>
-	<keylabel>gm3</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<keyaccesstype>Sensitive</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-137]
-<actionbody>
-	<keyusage>DSAUsage</keyusage>
-	<keysize>512</keysize>
-	<keylabel>carrot</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<keyaccesstype>Sensitive</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-138]
-<actionbody>
-	<keyusage>allusagesbutNR</keyusage>
-	<keysize>512</keysize>
-	<keylabel>carrot</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<keyaccesstype>Sensitive</keyaccesstype>
-	<keyaccesstype>AlwaysSensitive</keyaccesstype>
-	<keyaccesstype>Local</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-139]
-<actionbody>
-	<keyusage>DSAUsage</keyusage>
-	<keysize>512</keysize>
-	<keylabel>carrot2</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<keyaccesstype>Sensitive</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-140]
-<actionbody>
-	<keyusage>allusagesbutNR</keyusage>
-	<keysize>512</keysize>
-	<keylabel>carrot2</keylabel>
-	<keyalgorithm>DSA</keyalgorithm>
-	<keyaccesstype>NeverExtractable</keyaccesstype>
-	<keyaccesstype>Sensitive</keyaccesstype>
-	<keyaccesstype>AlwaysSensitive</keyaccesstype>
-	<keyaccesstype>Local</keyaccesstype>
-</actionbody>
-
-[SEC-EXPORTSCRIPT_USEAUTH-0001-143]
-<actionbody>
-	<seconds>5</seconds>
-</actionbody>
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/exportscript_useauth.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,630 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-START_TESTCASE                SEC-EXPORTSCRIPT_USEAUTH-0001
-
-//! @SYMTestCaseID            SEC-EXPORTSCRIPT_USEAUTH-0001
-
-//! @SYMTestCaseDesc          //////////////////////////////////////////////////////////////////////////////////
-
-//!                           Exporting  a key
-
-//!                           //////////////////////////////////////////////////////////////////////////////////
-
-//! @SYMTestActions           1) Delete keystore data file
-
-//!                           2) 1.0.1 Opening key store in manager mode
-
-//!                           3) 1.0.2 NOT A TEST Delete everything ** Basic PKCS8 cleartext RSA key import/export**
-
-//!                           4) 1.0.1.0, Import a DH key
-
-//!                           5) 1.1.0 Import a RSA key
-
-//!                           6) 1.1.1 Import a RSA key
-
-//!                           7) 1.1.2 Import a RSA key
-
-//!                           8) 1.1.3 Import a RSA key
-
-//!                           9) 1.1.4 Import a RSA key
-
-//!                           10) 1.1.5 Export a RSA key
-
-//!                           11) 1.1.6 Export a RSA key
-
-//!                           12) 1.1.7 Export a RSA key
-
-//!                           13) 1.1.8 Export a RSA key
-
-//!                           14) 1.1.9 Export a RSA key
-
-//!                           15) 1.1.8 Export a public RSA key
-
-//!                           16) 1.1.8 Export a public RSA key
-
-//!                           17) 1.1.8 Export a public RSA key
-
-//!                           18) 1.1.8 Export a public RSA key
-
-//!                           19) 1.2.0 Import a RSA key from a previously exported one
-
-//!                           20) 1.2.1 Import a RSA key from a previously exported one
-
-//!                           21) 1.2.2 Import a RSA key from a previously exported one
-
-//!                           22) 1.2.3 Import a RSA key from a previously exported one
-
-//!                           23) 1.2.4 Import a RSA key from a previously exported one
-
-//!                           24) 1.3.0 Bitwise Comparison of original key and exported one (RSA, cleartext)
-
-//!                           25) 1.3.1 Bitwise Comparison of original key and exported one (RSA, cleartext)
-
-//!                           26) 1.3.2 Bitwise Comparison of original key and exported one (RSA, cleartext)
-
-//!                           27) 1.3.3 Bitwise Comparison of original key and exported one (RSA, cleartext)
-
-//!                           28) 1.3.4 Bitwise Comparison of original key and exported one (RSA, cleartext)
-
-//!                           29) 1.3.5 Bitwise Comparison of original key and exported one (RSA public)
-
-//!                           30) 1.3.6 Bitwise Comparison of original key and exported one (RSA public)
-
-//!                           31) 1.3.7 Bitwise Comparison of original key and exported one (RSA public)
-
-//!                           32) 1.3.8 Bitwise Comparison of original key and exported one (RSA public)
-
-//!                           33) 1.4.0 NOT A TEST Delete everything 
-
-                    ** Basic PKCS8 cleartext DSA key import/export**
-
-//!                           34) 1.4.1 Import a DSA key
-
-//!                           35) 1.4.2 Import a DSA key
-
-//!                           36) 1.4.3 Import a DSA key
-
-//!                           37) 1.4.4 Import a DSA key
-
-//!                           38) 1.4.5 Import a DSA key
-
-//!                           39) 1.4.6 Export a DSA key
-
-//!                           40) 1.4.7 Export a DSA key
-
-//!                           41) 1.4.8 Export a DSA key
-
-//!                           42) 1.4.9 Export a DSA key
-
-//!                           43) 1.4.10 Export a DSA key
-
-//!                           44) 1.4.12 Export a DSA public key
-
-//!                           45) 1.4.13 Export a DSA public key
-
-//!                           46) 1.4.14 Export a DSA public key
-
-//!                           47) 1.4.15 Export a DSA public key
-
-//!                           48) 1.4.16 Export a DSA public key
-
-//!                           49) 1.4.1.5 Bitwise Comparison of original key and exported one (DSA public)
-
-//!                           50) 1.4.1.6 Bitwise Comparison of original key and exported one (DSA public)
-
-//!                           51) 1.4.1.7 Bitwise Comparison of original key and exported one (DSA public)
-
-//!                           52) 1.4.1.8 Bitwise Comparison of original key and exported one (DSA public)
-
-//!                           53) 1.4.1.9 Bitwise Comparison of original key and exported one (DSA public)
-
-//!                           54) 1.5.0 Import a DSA key from a previously exported one
-
-//!                           55) 1.5.1 Import a DSA key from a previously exported one
-
-//!                           56) 1.5.2 Import a DSA key from a previously exported one
-
-//!                           57) 1.5.3 Import a DSA key from a previously exported one
-
-//!                           58) 1.5.4 Import a DSA key from a previously exported one
-
-//!                           59) 1.6.0 Bitwise Comparison of original key and exported one (DSA, cleartext)
-
-//!                           60) 1.6.1 Bitwise Comparison of original key and exported one (DSA, cleartext)
-
-//!                           61) 1.6.2 Bitwise Comparison of original key and exported one (DSA, cleartext)
-
-//!                           62) 1.6.3 Bitwise Comparison of original key and exported one (DSA, cleartext)
-
-//!                           63) 1.6.4 Bitwise Comparison of original key and exported one (DSA, cleartext)
-
-//!                           64) 1.7.0 NOT A TEST Delete everything 
-
-                    **Basic PKCS8 encrypted RSA key import/export**
-
-//!                           65) 1.7.1 Import a PKCS5 encrypted RSA key
-
-//!                           66) 1.7.2 Import a PKCS5 encrypted RSA key
-
-//!                           67) 1.7.3 Import a PKCS5 encrypted RSA key
-
-//!                           68) 1.7.4 Import a PKCS5 encrypted RSA key
-
-//!                           69) 1.7.5 Import a PKCS5 encrypted RSA key
-
-//!                           70) 1.7.6 Export a RSA key in encrypted format
-
-//!                           71) 1.7.7 Export a RSA key in encrypted format
-
-//!                           72) 1.7.8 Export a RSA key in encrypted format
-
-//!                           73) 1.7.8 Export a RSA key in encrypted format
-
-//!                           74) 1.7.9 Export a RSA key in encrypted format
-
-//!                           75) 1.7.10 Import a PKCS5 encrypted RSA key encrypted with 3DES
-
-//!                           76) 1.8.0 NOT A TEST Delete everything ** PKCS8 encrypted RSA export sanity check ** Import a clear text key. Export it encrypted. Import it. Export it clear text. Compare.
-
-//!                           77) 1.8.1 Import a RSA key
-
-//!                           78) 1.8.2 Export a RSA key in encrypted format
-
-//!                           79) 1.8.3 NOT A TEST Delete everything
-
-//!                           80) 1.8.4 Import a PKCS5 encrypted RSA key from the result of previous export action
-
-//!                           81) 1.8.5 Export a RSA key (cleartext) which has been imported from a
-
-            generated encrypted pkcs8 file
-
-//!                           82) 1.8.6 Bitwise Comparison of original key and exported one
-
-//!                           83) 1.9.0 NOT A TEST Delete everything 
-
-                    ** Basic PKCS8 encrypted DSA key import/export **
-
-//!                           84) 1.9.1 Import a PKCS5 encrypted DSA key
-
-//!                           85) 1.9.2 Import a PKCS5 encrypted DSA key
-
-//!                           86) 1.9.3 Import a PKCS5 encrypted DSA key
-
-//!                           87) 1.9.4 Import a PKCS5 encrypted DSA key
-
-//!                           88) 1.9.5 Import a PKCS5 encrypted DSA key
-
-//!                           89) 1.9.6 Export a DSA key in encrypted format
-
-//!                           90) 1.9.7 Export a DSA key in encrypted format
-
-//!                           91) 1.9.8 Export a DSA key in encrypted format
-
-//!                           92) 1.9.9 Export a DSA key in encrypted format
-
-//!                           93) 1.9.10 Export a DSA key in encrypted format
-
-//!                           94) 1.9.11 Export a DSA public key
-
-//!                           95) 1.10.0 NOT A TEST Delete everything 
-
-                    ** Basic sanity check for PKCS8 encrypted DSA key import/export **
-
-//!                           96) 1.10.1 Import a DSA key
-
-//!                           97) 1.10.2 Export a DSA key in encrypted format
-
-//!                           98) 1.10.3 NOT A TEST Delete everything
-
-//!                           99) 1.10.4 Import a PKCS5 encrypted DSA key from a previously exported one
-
-//!                           100) 1.10.5 Export a DSA key (cleartext) which has been imported from a
-
-            generated encrypted pkcs8 file
-
-//!                           101) 1.10.6 Bitwise Comparison of original key and exported one
-
-//!                           102) 1.11.0.0 NOT A TEST Delete everything 
-
-                    ** Test import/export of weird encrypted pkcs8 **
-
-//!                           103) 1.11.0 Import a PKCS5 encrypted RSA key encrypted with 3DES
-
-//!                           104) 1.11.1 Import a PKCS5 encrypted RSA key encrypted with RC2
-
-//!                           105) 1.11.3 Try to Import a PKCS5 encrypted RSA key encrypted with RC4 (Unsupported)
-
-//!                           106) 1.11.4 Try to Import a PKCS5 encrypted DSA key encrypted with DES3 Broken Netscape format (Unsupported)
-
-//!                           107) 1.11.5 Try to Import a PKCS5 encrypted RSA key encrypted with DES3 Broken Nooctet format (Unsupported)
-
-//!                           108) 1.11.6 Try to Import a PKCS5 encrypted DSA key encrypted with DES3 Broken embed format (Unsupported)
-
-//!                           109) 1.12.0 NOT A TEST Delete everything 
-
-                    ** key import/export of keys with optional PKC#8 attribuets **
-
-//!                           110) 1.12.1 Import a RSA key containing PKCS#8 attributes
-
-//!                           111) 1.12.2 Import a DSA key
-
-//!                           112) 1.12.3 Export a RSA key with optional PKCS8 attributes
-
-//!                           113) 1.12.4 Export a DSA key with optional PKCS#8 encryption
-
-//!                           114) 1.12.5 Bitwise Comparison of original key and exported one (RSA, attributes)
-
-//!                           115) 1.12.6 Bitwise Comparison of original key and exported one (DSA, attributes)
-
-//!                           116) 1.12.0.1 NOT A TEST Delete everything 
-
-                    ** Sanity check all ciphers **
-
-//!                           117) 1.12.0.2 Import a RSA key
-
-//!                           118) 1.12.0.7 Export a RSA key with ECipher3DES_CBC
-
-//!                           119) 1.12.0.8 Export a RSA key with ECipherDES_CBC
-
-//!                           120) 1.12.0.9 Export a RSA key with ECipherRC2_CBC_40
-
-//!                           121) 1.12.0.10 Export a RSA key with ECipherRC2_CBC_128
-
-//!                           122) 1.12.0.9 Export a RSA key with ECipherRC2_CBC_40_16
-
-//!                           123) 1.12.0.10 Export a RSA key with ECipherRC2_CBC_128_16
-
-//!                           124) 1.12.0.11 Import a PKCS5 encrypted RSA key previously exported with ECipherRC2_CBC_40
-
-//!                           125) 1.12.0.12 Import a PKCS5 encrypted RSA key previously exported with ECipherRC2_CBC_128
-
-//!                           126) 1.12.0.11b Import a PKCS5 encrypted RSA key previously exported with ECipherRC2_CBC_40_16
-
-//!                           127) 1.12.0.12b Import a PKCS5 encrypted RSA key previously exported with ECipherRC2_CBC_128_16
-
-//!                           128) 1.12.0.13 Import a PKCS5 encrypted RSA key previously exported with ECipherDES_CBC
-
-//!                           129) 1.12.0.14 Import a PKCS5 encrypted RSA key previously exported with ECipher3DES_CBC
-
-//!                           130) 1.13.1 NOT A TEST Delete everything 
-
-                    ** Test access modifiers Sensitive, AlwaysSensitive, Extractable and NeverExtractable **
-
-//!                           131) 1.13.1 Import a cleartext RSA key ** Cannot become AlwaysSensitive **
-
-//!                           132) 1.13.2 Check access settings ** Cannot be AlwaysSensitive **
-
-//!                           133) 1.13.2 Import a PKCS5 encrypted RSA key ** Must become AlwaysSensitive **
-
-//!                           134) 1.13.3 Check access settings ** Must be AlwaysSensitive **
-
-//!                           135) 1.13.4 Import a cleartext RSA key make it not extractable ** Cannot become NeverExtractable **
-
-//!                           136) 1.13.5 Check access settings ** Cannot be NeverExtractable **
-
-//!                           137) 1.13.6 Create a key, set the extractable flag ** Cannot be NeverExtractble **
-
-//!                           138) 1.13.7 Check access settings ** Cannot be NeverExtractable, must be AlwaysSensitive **
-
-//!                           139) 1.13.8 Create a key ** Must be NeverExtractble **
-
-//!                           140) 1.13.9 Check access settings ** Must be NeverExtractable, must be AlwaysSensitive **
-
-//!                           141) 1.13.X NOT A TEST Delete everything 
-
-                    ** Test access modifiers Sensitive, AlwaysSensitive, Extractable and NeverExtractable **
-
-//!                           142) 1.14.1 Closing key store
-
-//!                           143) 1.14.2 Sleep 5 seconds
-
-//!                           144) 1.14.3 Check for server heap error
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeystoredata  
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-002
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys          
-
-RUN_TEST_STEP !Error=-5       -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-004
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-005
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-006
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-007
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-008
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-009
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-010
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-011
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-012
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-013
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-014
-
-RUN_TEST_STEP                 -1    CTestHandler        exportpublickey        exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-015
-
-RUN_TEST_STEP                 -1    CTestHandler        exportpublickey        exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-016
-
-RUN_TEST_STEP                 -1    CTestHandler        exportpublickey        exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-017
-
-RUN_TEST_STEP                 -1    CTestHandler        exportpublickey        exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-018
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-019
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-020
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-021
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-022
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-023
-
-RUN_TEST_STEP                 -1    CTestHandler        compare                exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-024
-
-RUN_TEST_STEP                 -1    CTestHandler        compare                exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-025
-
-RUN_TEST_STEP                 -1    CTestHandler        compare                exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-026
-
-RUN_TEST_STEP                 -1    CTestHandler        compare                exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-027
-
-RUN_TEST_STEP                 -1    CTestHandler        compare                exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-028
-
-RUN_TEST_STEP                 -1    CTestHandler        compare                exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-029
-
-RUN_TEST_STEP                 -1    CTestHandler        compare                exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-030
-
-RUN_TEST_STEP                 -1    CTestHandler        compare                exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-031
-
-RUN_TEST_STEP                 -1    CTestHandler        compare                exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-032
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys          
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-034
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-035
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-036
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-037
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-038
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-039
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-040
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-041
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-042
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-043
-
-RUN_TEST_STEP                 -1    CTestHandler        exportpublickey        exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-044
-
-RUN_TEST_STEP                 -1    CTestHandler        exportpublickey        exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-045
-
-RUN_TEST_STEP                 -1    CTestHandler        exportpublickey        exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-046
-
-RUN_TEST_STEP                 -1    CTestHandler        exportpublickey        exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-047
-
-RUN_TEST_STEP                 -1    CTestHandler        exportpublickey        exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-048
-
-RUN_TEST_STEP                 -1    CTestHandler        compare                exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-049
-
-RUN_TEST_STEP                 -1    CTestHandler        compare                exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-050
-
-RUN_TEST_STEP                 -1    CTestHandler        compare                exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-051
-
-RUN_TEST_STEP                 -1    CTestHandler        compare                exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-052
-
-RUN_TEST_STEP                 -1    CTestHandler        compare                exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-053
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-054
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-055
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-056
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-057
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-058
-
-RUN_TEST_STEP                 -1    CTestHandler        compare                exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-059
-
-RUN_TEST_STEP                 -1    CTestHandler        compare                exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-060
-
-RUN_TEST_STEP                 -1    CTestHandler        compare                exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-061
-
-RUN_TEST_STEP                 -1    CTestHandler        compare                exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-062
-
-RUN_TEST_STEP                 -1    CTestHandler        compare                exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-063
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys          
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-065
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-066
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-067
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-068
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-069
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-070
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-071
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-072
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-073
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-074
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-075
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys          
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-077
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-078
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys          
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-080
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-081
-
-RUN_TEST_STEP                 -1    CTestHandler        compare                exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-082
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys          
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-084
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-085
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-086
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-087
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-088
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-089
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-090
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-091
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-092
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-093
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-094
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys          
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-096
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-097
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys          
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-099
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-100
-
-RUN_TEST_STEP                 -1    CTestHandler        compare                exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-101
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys          
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-103
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-104
-
-RUN_TEST_STEP !Error=-6       -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-105
-
-RUN_TEST_STEP !Error=-6       -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-106
-
-RUN_TEST_STEP !Error=-6       -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-107
-
-RUN_TEST_STEP !Error=-6       -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-108
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys          
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-110
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-111
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-112
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-113
-
-RUN_TEST_STEP                 -1    CTestHandler        compare                exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-114
-
-RUN_TEST_STEP                 -1    CTestHandler        compare                exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-115
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys          
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-117
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-118
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-119
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-120
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-121
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-122
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-123
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-124
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-125
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-126
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-127
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-128
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-129
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys          
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-131
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-132
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-133
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-134
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-135
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-136
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-137
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-138
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-139
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-140
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys          
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP                 -1    CTestHandler        sleep                  exportscript_useauth.ini   SEC-EXPORTSCRIPT_USEAUTH-0001-143
-
-RUN_TEST_STEP                 -1    CTestHandler        checkserverheaperror
-
-END_TESTCASE                  SEC-EXPORTSCRIPT_USEAUTH-0001
-
-
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/initialize.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,37 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-
-PRINT Initialize authentication server to run key store test.
-
-RUN_PROGRAM 100 SETCAP tAuthSvr.exe 188b0 -SID 102740FC tAuthSvr_new.exe
-
-LOAD_SUITE tAuthSvr
-LOAD_SUITE tAuthSvr_new
-
-
-//! @SYMTestCaseID SEC-FSTOKEN-KEYSTORE-0001
-//! @SYMTestCaseDesc Initialize all authentication server data. Set the values in the cenrep file.
-START_TESTCASE SEC-FSTOKEN-KEYSTORE-0001
-RUN_UTILS DeleteFile C:\pinplugin_inactive.txt
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_in.dat
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_out.dat
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !Result=0 100	tAuthSvr_new	INIT_CENREP	c:\tkeystore\scripts\registration.ini Alias
-RUN_TEST_STEP !Result=0 100	tAuthSvr_new	INIT_CENREP	c:\tauth\tauthsvr\scripts\tauthsvr2.ini defaultplugin
-END_TESTCASE SEC-FSTOKEN-KEYSTORE-0001
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/oldserver_newfeature.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,80 +0,0 @@
-[SEC-OLDSERVER_NEWFEATURE-0001-002]
-<actionbody>
-	<mode>manager</mode>
-	<CheckKeyStoreLabel>1</CheckKeyStoreLabel>
-	<keystoreindex>2</keystoreindex>
-	<keystorelabel>Dummy KeyStore Manager1</keystorelabel>
-</actionbody>
-
-[SEC-OLDSERVER_NEWFEATURE-0001-004]
-<actionbody>
-	<mode>manager</mode>
-	<CheckKeyStoreLabel>1</CheckKeyStoreLabel>
-	<keystoreindex>4</keystoreindex>
-	<keystorelabel>Dummy KeyStore Manager1</keystorelabel>
-</actionbody>
-
-[SEC-OLDSERVER_NEWFEATURE-0001-006]
-<actionbody>
-	<mode>manager</mode>
-</actionbody>
-
-[SEC-OLDSERVER_NEWFEATURE-0001-007]
-<actionbody>
-	<mode>manager</mode>
-</actionbody>
-
-[SEC-OLDSERVER_NEWFEATURE-0001-009]
-<actionbody>
-	<keyusage>Derive</keyusage>
-	<keysize>512</keysize>
-	<keylabel>cheeku</keylabel>
-	<keyalgorithm>DH</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<keystore>1</keystore>
-	<passphrase>create pinkcloud</passphrase>
-</actionbody>
-
-[SEC-OLDSERVER_NEWFEATURE-0001-010]
-<actionbody>
-	<keyusage>Derive</keyusage>
-	<keysize>512</keysize>
-	<keylabel>cheeku</keylabel>
-	<keyalgorithm>DH</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<keystore>1</keystore>
-	<authexpression>strong</authexpression>
-	<freshness>0</freshness>
-</actionbody>
-
-[SEC-OLDSERVER_NEWFEATURE-0001-011]
-<actionbody>
-	<authmode>set</authmode>
-	<keylabel>cheeku</keylabel>
-	<authexpression>medium</authexpression>
-	<freshness>21</freshness>
-</actionbody>
-
-[SEC-OLDSERVER_NEWFEATURE-0001-012]
-<actionbody>
-	<authmode>get</authmode>
-	<keylabel>cheeku</keylabel>
-	<expectedexpression>medium</expectedexpression>
-	<expectedfreshness>21</expectedfreshness>
-</actionbody>
-
-[SEC-OLDSERVER_NEWFEATURE-0001-013]
-<actionbody>
-	<ImportData>pkcs8rsa.001</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm0</keylabel>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<authexpression>strong</authexpression>
-	<freshness>25</freshness>
-</actionbody>
-
-[SEC-OLDSERVER_NEWFEATURE-0001-016]
-<actionbody>
-	<seconds>5</seconds>
-</actionbody>
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/oldserver_newfeature.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,96 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-START_TESTCASE                SEC-OLDSERVER_NEWFEATURE-0001
-
-//! @SYMTestCaseID            SEC-OLDSERVER_NEWFEATURE-0001
-
-//! @SYMTestCaseDesc          
-
-//! @SYMTestActions           1) Delete keystore data file
-
-//!                           2) Retrieving label of a particular key store
-
-//!                           3) Closing key store
-
-//!                           4) Retrieving label of a particular key store
-
-//!                           5) Closing key store
-
-//!                           6) 1.0.0.0.1,Opening key store 1 in manager mode
-
-//!                           7) 1.0.0.0.2,Opening key store 2 in manager mode
-
-//!                           8) 1.0.0.1 NOT A TEST Delete default keys
-
-//!                           9) 1.0.0.1.0,Add a key (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           10) 1.0.0.1.0,Add a key (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           11) Set a new authentication policy for a key with which the user is not registered
-
-//!                           12) Gets authentication policy for a key
-
-//!                           13) 1.1.0 Import a RSA key
-
-//!                           14) 1.2.0.69.0 Closing key store 1
-
-//!                           15) 1.2.0.69.1 Closing key store 2
-
-//!                           16) 1.4.999.2, Sleep 5 seconds
-
-//!                           17) 1.4.999.3, Check for server heap error
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeystoredata  
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   oldserver_newfeature.ini   SEC-OLDSERVER_NEWFEATURE-0001-002
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP !Error=-2       -1    CTestHandler        init                   oldserver_newfeature.ini   SEC-OLDSERVER_NEWFEATURE-0001-004
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   oldserver_newfeature.ini   SEC-OLDSERVER_NEWFEATURE-0001-006
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   oldserver_newfeature.ini   SEC-OLDSERVER_NEWFEATURE-0001-007
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys          
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 oldserver_newfeature.ini   SEC-OLDSERVER_NEWFEATURE-0001-009
-
-RUN_TEST_STEP !Error=-5       -1    CTestHandler        addkey                 oldserver_newfeature.ini   SEC-OLDSERVER_NEWFEATURE-0001-010
-
-RUN_TEST_STEP !Error=-5       -1    CTestHandler        authenticationpolicy   oldserver_newfeature.ini   SEC-OLDSERVER_NEWFEATURE-0001-011
-
-RUN_TEST_STEP !Error=-5       -1    CTestHandler        authenticationpolicy   oldserver_newfeature.ini   SEC-OLDSERVER_NEWFEATURE-0001-012
-
-RUN_TEST_STEP !Error=-5       -1    CTestHandler        importkey              oldserver_newfeature.ini   SEC-OLDSERVER_NEWFEATURE-0001-013
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP                 -1    CTestHandler        sleep                  oldserver_newfeature.ini   SEC-OLDSERVER_NEWFEATURE-0001-016
-
-RUN_TEST_STEP                 -1    CTestHandler        checkserverheaperror
-
-END_TESTCASE                  SEC-OLDSERVER_NEWFEATURE-0001
-
-
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/oom_useauth.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,1282 +0,0 @@
-[SEC-OOM_USEAUTH-0002-001]
-
-<actionbody>
-
-	<mode>manager</mode>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0002-003]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>banana</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyexportable>IsExportable</keyexportable>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0003-001]
-
-<actionbody>
-
-	<foundkey>banana</foundkey>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0003-002]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>banana</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0003-003]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<open>RSA</open>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0003-004]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<open>Decrypt</open>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0003-005]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0003-006]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<open>RSA</open>
-
-	<signdigest>1</signdigest>
-
-	<text>digested!</text>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0003-007]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<text>Ook!</text>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0004-001]
-
-<actionbody>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0005-001]
-
-<actionbody>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0005-002]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>1024</keysize>
-
-	<keylabel>bigbanana</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyexportable>IsExportable</keyexportable>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0005-003]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>1024</keysize>
-
-	<keylabel>
-
-To be, or not to be: that is the question:
-
-Whether 'tis nobler in the mind to suffer
-
-The slings and arrows of outrageous fortune,
-
-Or to take arms against a sea of troubles,
-
-And by opposing end them? To die: to sleep;
-
-No more; and by a sleep to say we end
-
-The heart-ache and the thousand natural shocks
-
-That flesh is heir to, 'tis a consummation
-
-Devoutly to be wish'd. To die, to sleep;
-
-To sleep: perchance to dream: ay, there's the rub;
-
-For in that sleep of death what dreams may come
-
-When we have shuffled off this mortal coil,
-
-Must give us pause: there's the respect
-
-That makes calamity of so long life;
-
-For who would bear the whips and scorns of time,
-
-The oppressor's wrong, the proud man's contumely,
-
-The pangs of despised love, the law's delay,
-
-The insolence of office and the spurns
-
-That patient merit of the unworthy takes,
-
-When he himself might his quietus make
-
-With a bare bodkin? Who would fardels bear,
-
-To grunt and sweat under a weary life,
-
-But that the dread of something after death,
-
-The undiscover'd country from whose bourn
-
-No traveller returns, puzzles the will
-
-And makes us rather bear those ills we have
-
-Than fly to others that we know not of?
-
-Thus conscience does make cowards of us all;
-
-And thus the native hue of resolution
-
-Is sicklied o'er with the pale cast of thought,
-
-And enterprises of great pith and moment
-
-With this regard their currents turn awry,
-
-And lose the name of action.--Soft you now!
-
-The fair Ophelia! Nymph, in thy orisons
-
-Be all my sins remember'd. 
-
-	</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0005-004]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>1024</keysize>
-
-	<keylabel>
-
-To be, or not to be: that is the question:
-
-Whether 'tis nobler in the mind to suffer
-
-The slings and arrows of outrageous fortune,
-
-Or to take arms against a sea of troubles,
-
-And by opposing end them? To die: to sleep;
-
-No more; and by a sleep to say we end
-
-The heart-ache and the thousand natural shocks
-
-That flesh is heir to, 'tis a consummation
-
-Devoutly to be wish'd. To die, to sleep;
-
-To sleep: perchance to dream: ay, there's the rub;
-
-For in that sleep of death what dreams may come
-
-When we have shuffled off this mortal coil,
-
-Must give us pause: there's the respect
-
-That makes calamity of so long life;
-
-For who would bear the whips and scorns of time,
-
-The oppressor's wrong, the proud man's contumely,
-
-The pangs of despised love, the law's delay,
-
-The insolence of office and the spurns
-
-That patient merit of the unworthy takes,
-
-When he himself might his quietus make
-
-With a bare bodkin? Who would fardels bear,
-
-To grunt and sweat under a weary life,
-
-But that the dread of something after death,
-
-The undiscover'd country from whose bourn
-
-No traveller returns, puzzles the will
-
-And makes us rather bear those ills we have
-
-Than fly to others that we know not of?
-
-Thus conscience does make cowards of us all;
-
-And thus the native hue of resolution
-
-Is sicklied o'er with the pale cast of thought,
-
-And enterprises of great pith and moment
-
-With this regard their currents turn awry,
-
-And lose the name of action.--Soft you now!
-
-The fair Ophelia! Nymph, in thy orisons
-
-Be all my sins remember'd. 
-
-	</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0005-005]
-
-<actionbody>
-
-	<keylabel>
-
-To be, or not to be: that is the question:
-
-Whether 'tis nobler in the mind to suffer
-
-The slings and arrows of outrageous fortune,
-
-Or to take arms against a sea of troubles,
-
-And by opposing end them? To die: to sleep;
-
-No more; and by a sleep to say we end
-
-The heart-ache and the thousand natural shocks
-
-That flesh is heir to, 'tis a consummation
-
-Devoutly to be wish'd. To die, to sleep;
-
-To sleep: perchance to dream: ay, there's the rub;
-
-For in that sleep of death what dreams may come
-
-When we have shuffled off this mortal coil,
-
-Must give us pause: there's the respect
-
-That makes calamity of so long life;
-
-For who would bear the whips and scorns of time,
-
-The oppressor's wrong, the proud man's contumely,
-
-The pangs of despised love, the law's delay,
-
-The insolence of office and the spurns
-
-That patient merit of the unworthy takes,
-
-When he himself might his quietus make
-
-With a bare bodkin? Who would fardels bear,
-
-To grunt and sweat under a weary life,
-
-But that the dread of something after death,
-
-The undiscover'd country from whose bourn
-
-No traveller returns, puzzles the will
-
-And makes us rather bear those ills we have
-
-Than fly to others that we know not of?
-
-Thus conscience does make cowards of us all;
-
-And thus the native hue of resolution
-
-Is sicklied o'er with the pale cast of thought,
-
-And enterprises of great pith and moment
-
-With this regard their currents turn awry,
-
-And lose the name of action.--Soft you now!
-
-The fair Ophelia! Nymph, in thy orisons
-
-Be all my sins remember'd. 
-
-	</keylabel>
-
-	<open>RSA</open>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0005-006]
-
-<actionbody>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>carrot</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0005-007]
-
-<actionbody>
-
-	<keylabel>carrot</keylabel>
-
-	<open>DSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0005-008]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>mango</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0005-009]
-
-<actionbody>
-
-	<keylabel>mango</keylabel>
-
-	<open>DH</open>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0005-010]
-
-<actionbody>
-
-	<keylabel>mango</keylabel>
-
-	<n>DA9A18547FF03B385CC16508C173A7EF4EB61CB40EF8FEF3B31F145051676166BCDC3FE6B799FC394D08C26385F9413F896E09117E46209D6923602683CEA100924A6EE695281775C619DAA94EA8CB3691B4275B0183F1D39639EBC92995FE645D6C1BC28D409E585549BBD2C5DCDD6C208B04EADD8B7A6D997F72CBAD88390F</n>
-
-	<g>02</g>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0005-011]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>jackfruit</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0005-012]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>custard apple</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0005-013]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keyusage>NR</keyusage>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>grape</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0005-014]
-
-<actionbody>
-
-	<foundkey>bigbanana</foundkey>
-
-	<foundkey>carrot</foundkey>
-
-	<foundkey>mango</foundkey>
-
-	<foundkey>
-
-To be, or not to be: that is the question:
-
-Whether 'tis nobler in the mind to suffer
-
-The slings and arrows of outrageous fortune,
-
-Or to take arms against a sea of troubles,
-
-And by opposing end them? To die: to sleep;
-
-No more; and by a sleep to say we end
-
-The heart-ache and the thousand natural shocks
-
-That flesh is heir to, 'tis a consummation
-
-Devoutly to be wish'd. To die, to sleep;
-
-To sleep: perchance to dream: ay, there's the rub;
-
-For in that sleep of death what dreams may come
-
-When we have shuffled off this mortal coil,
-
-Must give us pause: there's the respect
-
-That makes calamity of so long life;
-
-For who would bear the whips and scorns of time,
-
-The oppressor's wrong, the proud man's contumely,
-
-The pangs of despised love, the law's delay,
-
-The insolence of office and the spurns
-
-That patient merit of the unworthy takes,
-
-When he himself might his quietus make
-
-With a bare bodkin? Who would fardels bear,
-
-To grunt and sweat under a weary life,
-
-But that the dread of something after death,
-
-The undiscover'd country from whose bourn
-
-No traveller returns, puzzles the will
-
-And makes us rather bear those ills we have
-
-Than fly to others that we know not of?
-
-Thus conscience does make cowards of us all;
-
-And thus the native hue of resolution
-
-Is sicklied o'er with the pale cast of thought,
-
-And enterprises of great pith and moment
-
-With this regard their currents turn awry,
-
-And lose the name of action.--Soft you now!
-
-The fair Ophelia! Nymph, in thy orisons
-
-Be all my sins remember'd. 
-
-	</foundkey>	
-
-	<foundkey>jackfruit</foundkey>
-
-	<foundkey>custard apple</foundkey>
-
-	<foundkey>grape</foundkey>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0005-015]
-
-<actionbody>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-   		<foundkey>carrot</foundkey>
-
-	<foundkey>custard apple</foundkey>
-
-	<foundkey>grape</foundkey>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0005-016]
-
-<actionbody>
-
-	<keyusage>DSAUsage</keyusage>
-
-   		<foundkey>carrot</foundkey>
-
-	<foundkey>
-
-To be, or not to be: that is the question:
-
-Whether 'tis nobler in the mind to suffer
-
-The slings and arrows of outrageous fortune,
-
-Or to take arms against a sea of troubles,
-
-And by opposing end them? To die: to sleep;
-
-No more; and by a sleep to say we end
-
-The heart-ache and the thousand natural shocks
-
-That flesh is heir to, 'tis a consummation
-
-Devoutly to be wish'd. To die, to sleep;
-
-To sleep: perchance to dream: ay, there's the rub;
-
-For in that sleep of death what dreams may come
-
-When we have shuffled off this mortal coil,
-
-Must give us pause: there's the respect
-
-That makes calamity of so long life;
-
-For who would bear the whips and scorns of time,
-
-The oppressor's wrong, the proud man's contumely,
-
-The pangs of despised love, the law's delay,
-
-The insolence of office and the spurns
-
-That patient merit of the unworthy takes,
-
-When he himself might his quietus make
-
-With a bare bodkin? Who would fardels bear,
-
-To grunt and sweat under a weary life,
-
-But that the dread of something after death,
-
-The undiscover'd country from whose bourn
-
-No traveller returns, puzzles the will
-
-And makes us rather bear those ills we have
-
-Than fly to others that we know not of?
-
-Thus conscience does make cowards of us all;
-
-And thus the native hue of resolution
-
-Is sicklied o'er with the pale cast of thought,
-
-And enterprises of great pith and moment
-
-With this regard their currents turn awry,
-
-And lose the name of action.--Soft you now!
-
-The fair Ophelia! Nymph, in thy orisons
-
-Be all my sins remember'd. 
-
-	</foundkey>
-
-	<foundkey>jackfruit</foundkey>
-
-	<foundkey>grape</foundkey>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0005-017]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<foundkey>carrot</foundkey>
-
-	<foundkey>
-
-To be, or not to be: that is the question:
-
-Whether 'tis nobler in the mind to suffer
-
-The slings and arrows of outrageous fortune,
-
-Or to take arms against a sea of troubles,
-
-And by opposing end them? To die: to sleep;
-
-No more; and by a sleep to say we end
-
-The heart-ache and the thousand natural shocks
-
-That flesh is heir to, 'tis a consummation
-
-Devoutly to be wish'd. To die, to sleep;
-
-To sleep: perchance to dream: ay, there's the rub;
-
-For in that sleep of death what dreams may come
-
-When we have shuffled off this mortal coil,
-
-Must give us pause: there's the respect
-
-That makes calamity of so long life;
-
-For who would bear the whips and scorns of time,
-
-The oppressor's wrong, the proud man's contumely,
-
-The pangs of despised love, the law's delay,
-
-The insolence of office and the spurns
-
-That patient merit of the unworthy takes,
-
-When he himself might his quietus make
-
-With a bare bodkin? Who would fardels bear,
-
-To grunt and sweat under a weary life,
-
-But that the dread of something after death,
-
-The undiscover'd country from whose bourn
-
-No traveller returns, puzzles the will
-
-And makes us rather bear those ills we have
-
-Than fly to others that we know not of?
-
-Thus conscience does make cowards of us all;
-
-And thus the native hue of resolution
-
-Is sicklied o'er with the pale cast of thought,
-
-And enterprises of great pith and moment
-
-With this regard their currents turn awry,
-
-And lose the name of action.--Soft you now!
-
-The fair Ophelia! Nymph, in thy orisons
-
-Be all my sins remember'd. 
-
-	</foundkey>	
-
-	<foundkey>jackfruit</foundkey>
-
-	<foundkey>grape</foundkey>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0005-018]
-
-<actionbody>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<deletecount>2</deletecount>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0005-019]
-
-<actionbody>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0005-020]
-
-<actionbody>
-
-	<foundkey>carrot</foundkey>
-
-	<foundkey>mango</foundkey>
-
-	<foundkey>jackfruit</foundkey>
-
-	<foundkey>custard apple</foundkey>
-
-	<foundkey>grape</foundkey>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0005-021]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>banana</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0005-022]
-
-<actionbody>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0005-023]
-
-<actionbody>
-
-	<foundkey>carrot</foundkey>
-
-	<foundkey>mango</foundkey>
-
-	<foundkey>banana</foundkey>
-
-	<foundkey>jackfruit</foundkey>
-
-	<foundkey>custard apple</foundkey>
-
-	<foundkey>grape</foundkey>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0005-024]
-
-<actionbody>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0005-025]
-
-<actionbody>
-
-	<deletecount>5</deletecount>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0005-026]
-
-<actionbody>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0006-001]
-
-<actionbody>
-
-	<ImportData>encryptPK8dsa4DER.txt</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>*IMPORTED* encrypted purple plum</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<encrypted>1</encrypted>
-
-	<passphrase>import clanger</passphrase>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0006-002]
-
-<actionbody>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<foundkey>*IMPORTED* encrypted purple plum</foundkey>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0006-003]
-
-<actionbody>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0007-001]
-
-<actionbody>
-
-	<ImportData>pkcs8rsa.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>gm0RSA</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<encrypted>0</encrypted>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0007-002]
-
-<actionbody>
-
-	<ExportFile>oom_export_pkcs8rsa_0.001</ExportFile>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>gm0RSA</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<encrypted>0</encrypted>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0007-003]
-
-<actionbody>
-
-	<ImportData>pkcs8dsa.001</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>gm0DSA</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<encrypted>0</encrypted>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0007-004]
-
-<actionbody>
-
-	<ExportFile>oom_export_pkcs8dsa_0.001</ExportFile>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>gm0DSA</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<encrypted>0</encrypted>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0007-005]
-
-<actionbody>
-
-	<ExportFile>oom_encrypted_export_pkcs8rsa.001</ExportFile>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>gm0RSA</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<encrypted>1</encrypted>
-
-
-
-	<passphrase>export clanger</passphrase>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0007-006]
-
-<actionbody>
-
-	<ExportFile>oom_encrypted_export_pkcs8dsa.001</ExportFile>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>gm0DSA</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<encrypted>1</encrypted>
-
-
-
-	<passphrase>export clanger</passphrase>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0008-001]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>cheeku</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keystore>0</keystore>
-
-	<authexpression>strong</authexpression>
-
-	<freshness>0</freshness>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0008-002]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>cheeku</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0008-003]
-
-<actionbody>
-
-	<authmode>set</authmode>
-
-	<keylabel>cheeku</keylabel>
-
-	<authexpression>medium</authexpression>
-
-	<freshness>21</freshness>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0008-004]
-
-<actionbody>
-
-	<authmode>get</authmode>
-
-	<keylabel>cheeku</keylabel>
-
-	<expectedexpression>medium</expectedexpression>
-
-	<expectedfreshness>21</expectedfreshness>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0008-005]
-
-<actionbody>
-
-	<ImportData>pkcs8rsa.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>gm0</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<authexpression>strong</authexpression>
-
-	<freshness>25</freshness>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0008-006]
-
-<actionbody>
-
-	<ExportFile>export_pkcs8rsa_0.001</ExportFile>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>gm0</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<encrypted>0</encrypted>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0008-007]
-
-<actionbody>
-
-	<ImportData>export_pkcs8rsa_0_3DES_CBC.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>gm_export_pkcs8rsa_0_3DES_CBC.001</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<encrypted>0</encrypted>
-
-	<passphrase>import clanger</passphrase>
-
-	<authexpression>strong</authexpression>
-
-	<freshness>50</freshness>
-
-</actionbody>
-
-
-
-[SEC-OOM_USEAUTH-0009-003]
-
-<actionbody>
-
-	<seconds>5</seconds>
-
-</actionbody>
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/oom_useauth.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,378 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-START_TESTCASE                SEC-OOM_USEAUTH-0001
-
-//! @SYMTestCaseID            SEC-OOM_USEAUTH-0001
-
-//! @SYMTestCaseDesc          
-
-//! @SYMTestActions           1) 1, Delete keystore data file
-
-//!                           2) None
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeystoredata  
-
-RUN_TEST_STEP                 -1    CTestHandler        startmemfailure     
-
-END_TESTCASE                  SEC-OOM_USEAUTH-0001
-
-
-
-
-
-START_TESTCASE                SEC-OOM_USEAUTH-0002
-
-//! @SYMTestCaseID            SEC-OOM_USEAUTH-0002
-
-//! @SYMTestCaseDesc          Start of testing
-
-//! @SYMTestActions           1) 1.2,Opening key store in manager mode
-
-//!                           2) 1.2.0.1 NOT A TEST Delete everything
-
-//!                           3) 2,Add a key
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   oom_useauth.ini   SEC-OOM_USEAUTH-0002-001
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys          
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 oom_useauth.ini   SEC-OOM_USEAUTH-0002-003
-
-END_TESTCASE                  SEC-OOM_USEAUTH-0002
-
-
-
-
-
-START_TESTCASE                SEC-OOM_USEAUTH-0003
-
-//! @SYMTestCaseID            SEC-OOM_USEAUTH-0003
-
-//! @SYMTestCaseDesc          /////////////////////////////////////////////////////////////////////////////
-
-//!                           Test case 3: List the keys, should only find "Banana"
-
-//!                           /////////////////////////////////////////////////////////////////////////////
-
-//! @SYMTestActions           1) 3 List everything
-
-//!                           2) 3.1,Get it again
-
-//!                           3) 3.2,Open it
-
-//!                           4) 3.3,Open a banana for decrypt
-
-//!                           5) 3.4, Sign with a banana, 20 char text
-
-//!                           6) 3.5, Sign digest with a banana
-
-//!                           7) 3.6, Decrypt with a banana
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               oom_useauth.ini   SEC-OOM_USEAUTH-0003-001
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             oom_useauth.ini   SEC-OOM_USEAUTH-0003-002
-
-RUN_TEST_STEP                 -1    CTestHandler        open                   oom_useauth.ini   SEC-OOM_USEAUTH-0003-003
-
-RUN_TEST_STEP                 -1    CTestHandler        open                   oom_useauth.ini   SEC-OOM_USEAUTH-0003-004
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   oom_useauth.ini   SEC-OOM_USEAUTH-0003-005
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   oom_useauth.ini   SEC-OOM_USEAUTH-0003-006
-
-RUN_TEST_STEP                 -1    CTestHandler        decrypt                oom_useauth.ini   SEC-OOM_USEAUTH-0003-007
-
-END_TESTCASE                  SEC-OOM_USEAUTH-0003
-
-
-
-
-
-START_TESTCASE                SEC-OOM_USEAUTH-0004
-
-//! @SYMTestCaseID            SEC-OOM_USEAUTH-0004
-
-//! @SYMTestCaseDesc          /////////////////////////////////////////////////////////////////////////////
-
-//!                           Test case 4: Delete "Banana" key
-
-//!                           /////////////////////////////////////////////////////////////////////////////
-
-//! @SYMTestActions           1) 4. Delete the key
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             oom_useauth.ini   SEC-OOM_USEAUTH-0004-001
-
-END_TESTCASE                  SEC-OOM_USEAUTH-0004
-
-
-
-
-
-START_TESTCASE                SEC-OOM_USEAUTH-0005
-
-//! @SYMTestCaseID            SEC-OOM_USEAUTH-0005
-
-//! @SYMTestCaseDesc          /////////////////////////////////////////////////////////////////////////////
-
-//!                           Test case 5: List the keys, should find nothing
-
-//!                           /////////////////////////////////////////////////////////////////////////////
-
-//! @SYMTestActions           1) 5 List everything
-
-//!                           2) 6,Add a larger key
-
-//!                           3) 7,Add a key with a very long label
-
-//!                           4) 8,Get that key again
-
-//!                           5) 9,Open that key again
-
-//!                           6) 1.1.5.6,Add a key
-
-//!                           7) 1.1.5.6.1, Sign with a carrot, 20 char text
-
-//!                           8) 1.1.5.7,Add a key
-
-//!                           9) 1.1.5.7.1,Open it
-
-//!                           10) 1.1.5.7.2, Test derive
-
-//!                           11) 10,Add a key with illegal usage
-
-//!                           12) 11,Add a key with illegal usage
-
-//!                           13) 12,Add a key with illegal usage
-
-//!                           14) 13 List everything (including illegal usage keys)
-
-//!                           15) 14 List DSA keys (including illegal usage keys)
-
-//!                           16) 15 List Sign-usage keys (including illegal usage keys)
-
-//!                           17) 16 List 'All usages' keys (including illegal usage keys)
-
-//!                           18) 17, Delete RSA keys
-
-//!                           19) 18 List RSA keys
-
-//!                           20) 19 List everything (including illegal usage keys)
-
-//!                           21) 20,Add a key that was previously deleted
-
-//!                           22) 21 List RSA keys
-
-//!                           23) 22 List everything (including illegal usage keys)
-
-//!                           24) 23, Delete it again
-
-//!                           25) 24, Delete everything
-
-//!                           26) 25 List everything
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               oom_useauth.ini   SEC-OOM_USEAUTH-0005-001
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 oom_useauth.ini   SEC-OOM_USEAUTH-0005-002
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 oom_useauth.ini   SEC-OOM_USEAUTH-0005-003
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             oom_useauth.ini   SEC-OOM_USEAUTH-0005-004
-
-RUN_TEST_STEP                 -1    CTestHandler        open                   oom_useauth.ini   SEC-OOM_USEAUTH-0005-005
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 oom_useauth.ini   SEC-OOM_USEAUTH-0005-006
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   oom_useauth.ini   SEC-OOM_USEAUTH-0005-007
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 oom_useauth.ini   SEC-OOM_USEAUTH-0005-008
-
-RUN_TEST_STEP                 -1    CTestHandler        open                   oom_useauth.ini   SEC-OOM_USEAUTH-0005-009
-
-RUN_TEST_STEP                 -1    CTestHandler        derive                 oom_useauth.ini   SEC-OOM_USEAUTH-0005-010
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 oom_useauth.ini   SEC-OOM_USEAUTH-0005-011
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 oom_useauth.ini   SEC-OOM_USEAUTH-0005-012
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 oom_useauth.ini   SEC-OOM_USEAUTH-0005-013
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               oom_useauth.ini   SEC-OOM_USEAUTH-0005-014
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               oom_useauth.ini   SEC-OOM_USEAUTH-0005-015
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               oom_useauth.ini   SEC-OOM_USEAUTH-0005-016
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               oom_useauth.ini   SEC-OOM_USEAUTH-0005-017
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             oom_useauth.ini   SEC-OOM_USEAUTH-0005-018
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               oom_useauth.ini   SEC-OOM_USEAUTH-0005-019
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               oom_useauth.ini   SEC-OOM_USEAUTH-0005-020
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 oom_useauth.ini   SEC-OOM_USEAUTH-0005-021
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               oom_useauth.ini   SEC-OOM_USEAUTH-0005-022
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               oom_useauth.ini   SEC-OOM_USEAUTH-0005-023
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             oom_useauth.ini   SEC-OOM_USEAUTH-0005-024
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             oom_useauth.ini   SEC-OOM_USEAUTH-0005-025
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               oom_useauth.ini   SEC-OOM_USEAUTH-0005-026
-
-END_TESTCASE                  SEC-OOM_USEAUTH-0005
-
-
-
-
-
-START_TESTCASE                SEC-OOM_USEAUTH-0006
-
-//! @SYMTestCaseID            SEC-OOM_USEAUTH-0006
-
-//! @SYMTestCaseDesc          Test importing keys
-
-//! @SYMTestActions           1) 26, Import a PKCS5 encrypted DSA key
-
-//!                           2) 27, List DSA keys (TEST ID: GT0140-KEY001)
-
-//!                           3) 28, Delete everything
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              oom_useauth.ini   SEC-OOM_USEAUTH-0006-001
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               oom_useauth.ini   SEC-OOM_USEAUTH-0006-002
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             oom_useauth.ini   SEC-OOM_USEAUTH-0006-003
-
-END_TESTCASE                  SEC-OOM_USEAUTH-0006
-
-
-
-
-
-START_TESTCASE                SEC-OOM_USEAUTH-0007
-
-//! @SYMTestCaseID            SEC-OOM_USEAUTH-0007
-
-//! @SYMTestCaseDesc          Test export
-
-//! @SYMTestActions           1) 1.1.1 Import a RSA key
-
-//!                           2) 1.1.5 Export a RSA key
-
-//!                           3) 1.4.1 Import a DSA key
-
-//!                           4) 1.4.6 Export a DSA key
-
-//!                           5) 1.7.6 Export a RSA key in encrypted format
-
-//!                           6) 1.9.6 Export a DSA key in encrypted format
-
-//!                           7) 1.10.0 NOT A TEST Delete everything 
-
-                    ** Basic sanity check for PKCS8 encrypted DSA key import/export **
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              oom_useauth.ini   SEC-OOM_USEAUTH-0007-001
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              oom_useauth.ini   SEC-OOM_USEAUTH-0007-002
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              oom_useauth.ini   SEC-OOM_USEAUTH-0007-003
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              oom_useauth.ini   SEC-OOM_USEAUTH-0007-004
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              oom_useauth.ini   SEC-OOM_USEAUTH-0007-005
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              oom_useauth.ini   SEC-OOM_USEAUTH-0007-006
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys          
-
-END_TESTCASE                  SEC-OOM_USEAUTH-0007
-
-
-
-
-
-START_TESTCASE                SEC-OOM_USEAUTH-0008
-
-//! @SYMTestCaseID            SEC-OOM_USEAUTH-0008
-
-//! @SYMTestCaseDesc          testing new apis for keystore
-
-//! @SYMTestActions           1) 1.0.0.1.0,Add a key (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           2) 1.0.0.51.1, Get it again
-
-//!                           3) Set a new authentication policy for a key
-
-//!                           4) Gets authentication policy for a key
-
-//!                           5) 1.1.0 Import a RSA key
-
-//!                           6) 1.1.5 Export a RSA key
-
-//!                           7) 1.12.0.14 Import a PKCS5 encrypted RSA key previously exported with ECipher3DES_CBC
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 oom_useauth.ini   SEC-OOM_USEAUTH-0008-001
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             oom_useauth.ini   SEC-OOM_USEAUTH-0008-002
-
-RUN_TEST_STEP                 -1    CTestHandler        authenticationpolicy   oom_useauth.ini   SEC-OOM_USEAUTH-0008-003
-
-RUN_TEST_STEP                 -1    CTestHandler        authenticationpolicy   oom_useauth.ini   SEC-OOM_USEAUTH-0008-004
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              oom_useauth.ini   SEC-OOM_USEAUTH-0008-005
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              oom_useauth.ini   SEC-OOM_USEAUTH-0008-006
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              oom_useauth.ini   SEC-OOM_USEAUTH-0008-007
-
-END_TESTCASE                  SEC-OOM_USEAUTH-0008
-
-
-
-
-
-START_TESTCASE                SEC-OOM_USEAUTH-0009
-
-//! @SYMTestCaseID            SEC-OOM_USEAUTH-0009
-
-//! @SYMTestCaseDesc          End of testing
-
-//! @SYMTestActions           1) 29,Closing key store
-
-//!                           2) 999.1
-
-//!                           3) 999.2, Sleep 5 seconds
-
-//!                           4) 999.3, Check for server heap error
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP                 -1    CTestHandler        stopmemfailure      
-
-RUN_TEST_STEP                 -1    CTestHandler        sleep                  oom_useauth.ini   SEC-OOM_USEAUTH-0009-003
-
-RUN_TEST_STEP                 -1    CTestHandler        checkserverheaperror
-
-END_TESTCASE                  SEC-OOM_USEAUTH-0009
-
-
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/reg_first_identity.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,59 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-
-PRINT Authentication Server tests...
-
-LOAD_SUITE tAuthSvr
-
-//! @SYMTestCaseID SEC-AUT-AUTHSVR-0144
-//! @SYMTestCaseDesc Remove_PinPlugin_Data
-START_TESTCASE Remove_PinPlugin_Data
-RUN_UTILS DeleteFile C:\pinplugin_inactive.txt
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_in.dat
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_out.dat
-END_TESTCASE Remove_PinPlugin_Data
-
-//
-//! @SYMTestCaseID SEC-FSTOKEN-KEYSTORE-0001
-//! @SYMTestCaseDesc An authclient successfully authenticates where the user specifies the auth method
-//!                  given that no preferred method exists
-//! 		     (Authenticate13_UserSelectsMethod)
-//! 
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have 3 plugins that support default data and are active, all trained with the default identity
-//!                  and a second identity
-//!                  Call authenticate, expecting the 2nd identity with a freshness of 0 seconds and an auth expression
-//!                  of (2nd OR 3rd plugin). Supply correct input for the 3rd plugin, but wrong info for the 2nd plugin
-//!                  Call authenticate, expecting the 2nd identity with a freshness of 300 seconds and an auth
-//!                  expression of (Default AND 2nd plugin). Supply wrong input for the 2nd plugin and the default plugin
-//! @SYMTestExpectedResults All plugins are successfully registered.
-//!
-//! @SYMDevelopedForRelease Intulo
-
-START_TESTCASE SEC-FSTOKEN-KEYSTORE-0001
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	REMOVE_DBS
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	REG_IDENTITY	c:\tkeystore\scripts\registration.ini RegisterFirst
-END_TESTCASE SEC-FSTOKEN-KEYSTORE-0001
-
-
-START_TESTCASE Remove_PinPlugin_Data
-RUN_UTILS DeleteFile C:\pinplugin_inactive.txt
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_in.dat
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_out.dat
-END_TESTCASE Remove_PinPlugin_Data
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/reg_second_identity.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,53 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-PRINT Authentication Server tests...
-
-// Prepare a clone of TAuthSvr to possess authserver's SID.
-// This is required for modifying the authserver's central repository file.
-// This clone must be deleted at the end of the test.
-
-LOAD_SUITE tAuthSvr
-
-//
-//! @SYMTestCaseID SEC-FSTOKEN-KEYSTORE-0002
-//! @SYMTestCaseDesc An authclient successfully authenticates where the user specifies the auth method
-//!                  given that no preferred method exists
-//! 		     (Authenticate13_UserSelectsMethod)
-//! 
-//! @SYMTestPriority Medium
-//! @SYMTestActions  Have 3 plugins that support default data and are active, all trained with the default identity
-//!                  and a second identity
-//!                  Call authenticate, expecting the 2nd identity with a freshness of 0 seconds and an auth expression
-//!                  of (2nd OR 3rd plugin). Supply correct input for the 3rd plugin, but wrong info for the 2nd plugin
-//!                  Call authenticate, expecting the 2nd identity with a freshness of 300 seconds and an auth
-//!                  expression of (Default AND 2nd plugin). Supply wrong input for the 2nd plugin and the default plugin
-//! @SYMTestExpectedResults All plugins are successfully registered.
-//!
-//! @SYMDevelopedForRelease Intulo
-
-START_TESTCASE SEC-FSTOKEN-KEYSTORE-0001
-RUN_TEST_STEP !Result=0 100	tAuthSvr 	REG_IDENTITY	c:\tkeystore\scripts\registration.ini RegisterSecond
-END_TESTCASE SEC-FSTOKEN-KEYSTORE-0001
-
-
-START_TESTCASE Remove_PinPlugin_Data
-RUN_UTILS DeleteFile C:\pinplugin_inactive.txt
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_in.dat
-RUN_UTILS DeleteFile  C:\t_pinplugindlg_out.dat
-END_TESTCASE Remove_PinPlugin_Data
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/registration.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,60 +0,0 @@
-# Index of key values
-#iSupportsDefaultData 	- bool that defines if the chosen plugin supports default data
-#NumIdentities		- int that defines the expected number of identities that are registered on the server
-#pluginType		- 
-#isDefaultPlugin	- No longer in use. defaultPlugin is used instead
-#defaultPlugin		- string that defines which plugin to use as the default. Used to update the AuthServer policy file
-#pluginId		- Hex string that is the uid of the Ecom implementation. In the Test0000 to Test0009, it's used as a cue, and is also the expected UserId
-#userResult		- Int that contains what the user has input on being prompted to 'identify', i.e. the PIN
-#			In cases where this is absent, then we're expecting the 'data' returned to be the same as the pluginId value (cueValue)
-#userId			- String that contains the expected Id
-
-#plugin1Id		- Hex string that is the uid of the Ecom implementation
-#			  	In the RetrainPlugin steps, this is the plugin that is to be trained.
-#plugin1Status		- Int that specifies the expected status of the above plugin 
-				(0, 64, 128 -EAuthUntrained, EAuthTrained, EAuthFullyTrained)
-#Pin11113100Default	- bool that defines whether the plugins support default data. Also Pin11113101Default and Pin11113102Default
-#Pin11113100Active	- bool that defines whether the plugin is active or not. Also Pin11113101Active, Pin11113102Active
-#Pin11113100InputId	- string that defines the input to the plugin. Else, the default is used. (in Identify function)
-#Pin11113100InputTrain	- string that defines the input to the plugin. Else, the default is used. (in Train function)
-#finalUserName 		- string that defines the new name (description or identitystring) of a given identity
-#retryRemove		- bool that defines whether the attempt to remove an identity is tried again in the same test step
-#freshness		- Int that defines the number of seconds(timeout) within which a cached identity is returned 
-				(Authentication is skipped)
-#forgetPlugin 		- Hex that specifies the plugin that is to be forgotten
-#forgetUnknown 		- Bool that if true means we're trying to forget an unknown identity
-
-#==============================
-[RegisterFirst]
-Pin11113100InputId = 5110
-Pin11113100InputTrain = 5110
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113101InputId = 5111
-Pin11113101InputTrain = 5111
-Pin11113101Default = true
-Pin11113101Active = true 
-Pin11113102Active = false 
-Pin11113103Active = false 
-Pin11113104Active = false 
-
-[RegisterSecond]
-Pin11113100InputId = 6110
-Pin11113100InputTrain = 6110
-Pin11113100Default = true
-Pin11113100Active = true 
-Pin11113101InputId = 6111
-Pin11113101InputTrain = 6111
-Pin11113101Default = true
-Pin11113101Active = true 
-Pin11113102Active = false 
-Pin11113103Active = false 
-Pin11113104Active = false 
-
-[Alias]
-aliasString0 = 11113100
-aliasString1 = 11113101
-aliasString2 = 11113102
-aliasString3 = 11113103
-
-#==============================
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/reload_useauth.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,612 +0,0 @@
-[SEC-RELOAD_USEAUTH-0001-001]
-
-<actionbody>
-
-	<mode>manager</mode>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0001-003]
-
-<actionbody>
-
-	<ImportData>pkcs8rsa.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>gm0_rsa</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0001-004]
-
-<actionbody>
-
-	<ImportData>pkcs8dsa1.001</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>gm1_dsa</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0001-005]
-
-<actionbody>
-
-	<foundkey>gm0_rsa</foundkey>
-
-	<foundkey>gm1_dsa</foundkey>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0001-007]
-
-<actionbody>
-
-	<seconds>5</seconds>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0001-008]
-
-<actionbody>
-
-	<mode>manager</mode>
-
-	<serveroom>0</serveroom>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0001-009]
-
-<actionbody>
-
-	<foundkey>gm0_rsa</foundkey>
-
-	<foundkey>gm1_dsa</foundkey>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0002-001]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>gm0_rsa</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0002-002]
-
-<actionbody>
-
-	<keylabel>gm0_rsa</keylabel>
-
-	<open>RSA</open>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0002-003]
-
-<actionbody>
-
-	<keylabel>gm0_rsa</keylabel>
-
-	<open>Decrypt</open>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0002-004]
-
-<actionbody>
-
-	<keylabel>gm0_rsa</keylabel>
-
-	<text>Ook!</text>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0002-005]
-
-<actionbody>
-
-	<keylabel>gm0_rsa</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0002-006]
-
-<actionbody>
-
-	<keylabel>gm0_rsa</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of thirty-two chars</text>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0002-007]
-
-<actionbody>
-
-	<keylabel>gm0_rsa</keylabel>
-
-	<open>RSA</open>
-
-	<signdigest>1</signdigest>
-
-	<text>digested!</text>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0002-008]
-
-<actionbody>
-
-	<keylabel>gm0_rsa</keylabel>
-
-	<open>RSA</open>
-
-	<signdigest>2</signdigest>
-
-	<text>Had we but world enough, and time,
-
-This coyness, lady, were no crime.
-
-We would sit down and think which way
-
-To walk, and pass our long love's day;
-
-Thou by the Indian Ganges' side
-
-Shouldst rubies find; I by the tide
-
-Of Humber would complain. I would
-
-Love you ten years before the Flood;
-
-And you should, if you please, refuse
-
-Till the conversion of the Jews.
-
-My vegetable love should grow
-
-Vaster than empires, and more slow.
-
-An hundred years should go to praise
-
-Thine eyes, and on thy forehead gaze;
-
-Two hundred to adore each breast,
-
-But thirty thousand to the rest;
-
-An age at least to every part,
-
-And the last age should show your heart.
-
-For, lady, you deserve this state,
-
-Nor would I love at lower rate.
-
-
-
-        But at my back I always hear
-
-Time's winged chariot hurrying near;
-
-And yonder all before us lie
-
-Deserts of vast eternity.
-
-Thy beauty shall no more be found,
-
-Nor, in thy marble vault, shall sound
-
-My echoing song; then worms shall try
-
-That long preserv'd virginity,
-
-And your quaint honour turn to dust,
-
-And into ashes all my lust.
-
-The grave's a fine and private place,
-
-But none I think do there embrace.
-
-
-
-        Now therefore, while the youthful hue
-
-Sits on thy skin like morning dew,
-
-And while thy willing soul transpires
-
-At every pore with instant fires,
-
-Now let us sport us while we may;
-
-And now, like am'rous birds of prey,
-
-Rather at once our time devour,
-
-Than languish in his slow-chapp'd power.
-
-Let us roll all our strength, and all
-
-Our sweetness, up into one ball;
-
-And tear our pleasures with rough strife
-
-Thorough the iron gates of life.
-
-Thus, though we cannot make our sun
-
-Stand still, yet we will make him run</text>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0002-009]
-
-<actionbody>
-
-	<keylabel>gm0_rsa</keylabel>
-
-	<open>DSA</open>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0002-010]
-
-<actionbody>
-
-	<keylabel>gm0_rsa</keylabel>
-
-	<open>DH</open>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0002-011]
-
-<actionbody>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>gm1_dsa</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0002-012]
-
-<actionbody>
-
-	<keylabel>gm1_dsa</keylabel>
-
-	<open>DSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0002-013]
-
-<actionbody>
-
-	<keylabel>gm1_dsa</keylabel>
-
-	<open>DSA</open>
-
-	<text>This is a text of 21.</text>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0002-014]
-
-<actionbody>
-
-	<keylabel>gm1_dsa</keylabel>
-
-	<open>DSA</open>
-
-	<signdigest>1</signdigest>
-
-
-
-	<text>Had we but world enough, and time,
-
-This coyness, lady, were no crime.
-
-We would sit down and think which way
-
-To walk, and pass our long love's day;
-
-Thou by the Indian Ganges' side
-
-Shouldst rubies find; I by the tide
-
-Of Humber would complain. I would
-
-Love you ten years before the Flood;
-
-And you should, if you please, refuse
-
-Till the conversion of the Jews.
-
-My vegetable love should grow
-
-Vaster than empires, and more slow.
-
-An hundred years should go to praise
-
-Thine eyes, and on thy forehead gaze;
-
-Two hundred to adore each breast,
-
-But thirty thousand to the rest;
-
-An age at least to every part,
-
-And the last age should show your heart.
-
-For, lady, you deserve this state,
-
-Nor would I love at lower rate.
-
-
-
-        But at my back I always hear
-
-Time's winged chariot hurrying near;
-
-And yonder all before us lie
-
-Deserts of vast eternity.
-
-Thy beauty shall no more be found,
-
-Nor, in thy marble vault, shall sound
-
-My echoing song; then worms shall try
-
-That long preserv'd virginity,
-
-And your quaint honour turn to dust,
-
-And into ashes all my lust.
-
-The grave's a fine and private place,
-
-But none I think do there embrace.
-
-
-
-        Now therefore, while the youthful hue
-
-Sits on thy skin like morning dew,
-
-And while thy willing soul transpires
-
-At every pore with instant fires,
-
-Now let us sport us while we may;
-
-And now, like am'rous birds of prey,
-
-Rather at once our time devour,
-
-Than languish in his slow-chapp'd power.
-
-Let us roll all our strength, and all
-
-Our sweetness, up into one ball;
-
-And tear our pleasures with rough strife
-
-Thorough the iron gates of life.
-
-Thus, though we cannot make our sun
-
-Stand still, yet we will make him run</text>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0002-015]
-
-<actionbody>
-
-	<keylabel>gm1_dsa</keylabel>
-
-	<open>DSA</open>
-
-	<signdigest>2</signdigest>
-
-	<text>digest!</text>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0003-003]
-
-<actionbody>
-
-	<seconds>5</seconds>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0003-005]
-
-<actionbody>
-
-	<mode>manager</mode>
-
-	<serveroom>0</serveroom>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0003-006]
-
-<actionbody>
-
-	<ImportData>pkcs8dsa1.001</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>gm1_dsa</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0003-007]
-
-<actionbody>
-
-	<foundkey>gm1_dsa</foundkey>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0003-008]
-
-<actionbody>
-
-	<corruption>Once upon a time...</corruption>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0003-009]
-
-<actionbody>
-
-	<foundkey>gm1_dsa</foundkey>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0003-011]
-
-<actionbody>
-
-	<seconds>5</seconds>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0003-012]
-
-<actionbody>
-
-	<corruption> CERT has been criticized in the past for being frugal with vulnerability information.  They don't publish exploits, for one, which means k1ddi3z prefer FD. </corruption>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0003-013]
-
-<actionbody>
-
-	<mode>manager</mode>
-
-	<serveroom>0</serveroom>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0003-014]
-
-<actionbody>
-
-</actionbody>
-
-
-
-[SEC-RELOAD_USEAUTH-0003-017]
-
-<actionbody>
-
-	<seconds>5</seconds>
-
-</actionbody>
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/reload_useauth.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,220 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-START_TESTCASE                SEC-RELOAD_USEAUTH-0001
-
-//! @SYMTestCaseID            SEC-RELOAD_USEAUTH-0001
-
-//! @SYMTestCaseDesc          
-
-//! @SYMTestActions           1) 1.0.0.0,Opening key store in manager mode
-
-//!                           2) 1.0 Delete everything * Test keystore close & reload consistency *
-
-//!                           3) 1.1.2 Import a RSA key
-
-//!                           4) 1.1.4 Import a DSA key
-
-//!                           5) 1.1.5 List everything (TEST ID: GT0140-KEY001)
-
-//!                           6) 1.1.6 Closing key store
-
-//!                           7) 1.1.7 Sleep 5 seconds
-
-//!                           8) 1.1.8 Opening key store in manager mode
-
-//!                           9) 1.1.9 List everything (TEST ID: GT0140-KEY001)
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   reload_useauth.ini   SEC-RELOAD_USEAUTH-0001-001
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys          
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              reload_useauth.ini   SEC-RELOAD_USEAUTH-0001-003
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              reload_useauth.ini   SEC-RELOAD_USEAUTH-0001-004
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               reload_useauth.ini   SEC-RELOAD_USEAUTH-0001-005
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP                 -1    CTestHandler        sleep                  reload_useauth.ini   SEC-RELOAD_USEAUTH-0001-007
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   reload_useauth.ini   SEC-RELOAD_USEAUTH-0001-008
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               reload_useauth.ini   SEC-RELOAD_USEAUTH-0001-009
-
-END_TESTCASE                  SEC-RELOAD_USEAUTH-0001
-
-
-
-
-
-START_TESTCASE                SEC-RELOAD_USEAUTH-0002
-
-//! @SYMTestCaseID            SEC-RELOAD_USEAUTH-0002
-
-//! @SYMTestCaseDesc          Test keys still work ok
-
-//! @SYMTestActions           1) 1.1.10.0,Get it again
-
-//!                           2) 1.1.10.1,Open it
-
-//!                           3) 1.1.10.2,Open a gm0_rsa for decrypt
-
-//!                           4) Decrypt
-
-//!                           5) 1.1.10.2.1, Sign with a gm0_rsa, 20 char text
-
-//!                           6) 1.1.10.2.2, Sign with a gm0_rsa, 32 char text
-
-//!                           7) 1.1.10.2.2.1, Sign digest with a gm0_rsa
-
-//!                           8) 1.1.10.2.3, Sign digest with a gm0_rsa, text too large
-
-//!                           9) 1.1.10.3,Open a gm0_rsa as a DSA key
-
-//!                           10) 1.1.10.4,Open a gm0_rsa as a DH key
-
-//!                           11) 1.1.11,Get it again
-
-//!                           12) 1.1.11.1, Sign with a gm1_dsa, 20 char text
-
-//!                           13) 1.1.11.2, Sign with gm1_dsa, text too long (21 chars)
-
-//!                           14) 1.1.11.2, Sign digest with gm1_dsa
-
-//!                           15) 1.1.11.3, Sign digest with a gm1_dsa, fail hash
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             reload_useauth.ini   SEC-RELOAD_USEAUTH-0002-001
-
-RUN_TEST_STEP                 -1    CTestHandler        open                   reload_useauth.ini   SEC-RELOAD_USEAUTH-0002-002
-
-RUN_TEST_STEP                 -1    CTestHandler        open                   reload_useauth.ini   SEC-RELOAD_USEAUTH-0002-003
-
-RUN_TEST_STEP                 -1    CTestHandler        decrypt                reload_useauth.ini   SEC-RELOAD_USEAUTH-0002-004
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   reload_useauth.ini   SEC-RELOAD_USEAUTH-0002-005
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   reload_useauth.ini   SEC-RELOAD_USEAUTH-0002-006
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   reload_useauth.ini   SEC-RELOAD_USEAUTH-0002-007
-
-RUN_TEST_STEP !Error=-9       -1    CTestHandler        sign                   reload_useauth.ini   SEC-RELOAD_USEAUTH-0002-008
-
-RUN_TEST_STEP !Error=-11006   -1    CTestHandler        open                   reload_useauth.ini   SEC-RELOAD_USEAUTH-0002-009
-
-RUN_TEST_STEP !Error=-11006   -1    CTestHandler        open                   reload_useauth.ini   SEC-RELOAD_USEAUTH-0002-010
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             reload_useauth.ini   SEC-RELOAD_USEAUTH-0002-011
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   reload_useauth.ini   SEC-RELOAD_USEAUTH-0002-012
-
-RUN_TEST_STEP !Error=-9       -1    CTestHandler        sign                   reload_useauth.ini   SEC-RELOAD_USEAUTH-0002-013
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   reload_useauth.ini   SEC-RELOAD_USEAUTH-0002-014
-
-RUN_TEST_STEP !Error=-2       -1    CTestHandler        sign                   reload_useauth.ini   SEC-RELOAD_USEAUTH-0002-015
-
-END_TESTCASE                  SEC-RELOAD_USEAUTH-0002
-
-
-
-
-
-START_TESTCASE                SEC-RELOAD_USEAUTH-0003
-
-//! @SYMTestCaseID            SEC-RELOAD_USEAUTH-0003
-
-//! @SYMTestCaseDesc          
-
-//! @SYMTestActions           1) 1.2.0.0 Test keystore copy-from-rom-if-not-found behaviour
-
-//!                           2) 1.2.0.1 Closing key store
-
-//!                           3) 1.2.0.2 Sleep 5 seconds, when we wake up keys.dat is not in use anymore
-
-//!                           4) 1.2.1 Delete keystore data file
-
-//!                           5) 1.2.2 Opening key store in manager mode
-
-//!                           6) 1.2.4 Import a DSA key
-
-//!                           7) 1.2.5 List everything
-
-//!                           8) 1.3.0 Test keystore copy-from-rom-if-corrupt behaviour (store open, canot corrupt)
-
-//!                           9) 1.2.5 List everything
-
-//!                           10) 1.2.6 Closing key store
-
-//!                           11) 1.2.7 Sleep 5 seconds, when we wake up keys.dat is not in use anymore
-
-//!                           12) 1.2.8 Test keystore copy-from-rom-if-corrupt behaviour
-
-//!                           13) 1.2.2 Opening key store in manager mode
-
-//!                           14) 1.2.9 List everything (rom keystore contains 2 keys)
-
-//!                           15) 1.2.10 Delete everything
-
-//!                           16) 1.2.11 Closing key store
-
-//!                           17) 1.2.12, Sleep 5 seconds
-
-//!                           18) 1.2.13, Check for server heap error
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys          
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP                 -1    CTestHandler        sleep                  reload_useauth.ini   SEC-RELOAD_USEAUTH-0003-003
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeystoredata  
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   reload_useauth.ini   SEC-RELOAD_USEAUTH-0003-005
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              reload_useauth.ini   SEC-RELOAD_USEAUTH-0003-006
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               reload_useauth.ini   SEC-RELOAD_USEAUTH-0003-007
-
-RUN_TEST_STEP !Error=-14      -1    CTestHandler        corrupt                reload_useauth.ini   SEC-RELOAD_USEAUTH-0003-008
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               reload_useauth.ini   SEC-RELOAD_USEAUTH-0003-009
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP                 -1    CTestHandler        sleep                  reload_useauth.ini   SEC-RELOAD_USEAUTH-0003-011
-
-RUN_TEST_STEP                 -1    CTestHandler        corrupt                reload_useauth.ini   SEC-RELOAD_USEAUTH-0003-012
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   reload_useauth.ini   SEC-RELOAD_USEAUTH-0003-013
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               reload_useauth.ini   SEC-RELOAD_USEAUTH-0003-014
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys          
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP                 -1    CTestHandler        sleep                  reload_useauth.ini   SEC-RELOAD_USEAUTH-0003-017
-
-RUN_TEST_STEP                 -1    CTestHandler        checkserverheaperror
-
-END_TESTCASE                  SEC-RELOAD_USEAUTH-0003
-
-
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/servoom_useauth.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,1360 +0,0 @@
-[SEC-SERVOOM_USEAUTH-0001-003]
-
-<actionbody>
-
-	<mode>manager</mode>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0002-001]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>banana</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyexportable>IsExportable</keyexportable>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0003-001]
-
-<actionbody>
-
-	<foundkey>banana</foundkey>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0004-001]
-
-<actionbody>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<deletecount>1</deletecount>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0005-001]
-
-<actionbody>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0005-002]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>1024</keysize>
-
-	<keylabel>bigbanana</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyexportable>IsExportable</keyexportable>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<serveroom>0</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0005-003]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>1024</keysize>
-
-	<keylabel>
-
-To be, or not to be: that is the question:
-
-Whether 'tis nobler in the mind to suffer
-
-The slings and arrows of outrageous fortune,
-
-Or to take arms against a sea of troubles,
-
-And by opposing end them? To die: to sleep;
-
-No more; and by a sleep to say we end
-
-The heart-ache and the thousand natural shocks
-
-That flesh is heir to, 'tis a consummation
-
-Devoutly to be wish'd. To die, to sleep;
-
-To sleep: perchance to dream: ay, there's the rub;
-
-For in that sleep of death what dreams may come
-
-When we have shuffled off this mortal coil,
-
-Must give us pause: there's the respect
-
-That makes calamity of so long life;
-
-For who would bear the whips and scorns of time,
-
-The oppressor's wrong, the proud man's contumely,
-
-The pangs of despised love, the law's delay,
-
-The insolence of office and the spurns
-
-That patient merit of the unworthy takes,
-
-When he himself might his quietus make
-
-With a bare bodkin? Who would fardels bear,
-
-To grunt and sweat under a weary life,
-
-But that the dread of something after death,
-
-The undiscover'd country from whose bourn
-
-No traveller returns, puzzles the will
-
-And makes us rather bear those ills we have
-
-Than fly to others that we know not of?
-
-Thus conscience does make cowards of us all;
-
-And thus the native hue of resolution
-
-Is sicklied o'er with the pale cast of thought,
-
-And enterprises of great pith and moment
-
-With this regard their currents turn awry,
-
-And lose the name of action.--Soft you now!
-
-The fair Ophelia! Nymph, in thy orisons
-
-Be all my sins remember'd. 
-
-	</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<serveroom>0</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0005-004]
-
-<actionbody>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>carrot</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0005-005]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>mango</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0005-006]
-
-<actionbody>
-
-	<keylabel>mango</keylabel>
-
-	<open>DH</open>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0005-007]
-
-<actionbody>
-
-	<keylabel>mango</keylabel>
-
-	<n>DA9A18547FF03B385CC16508C173A7EF4EB61CB40EF8FEF3B31F145051676166BCDC3FE6B799FC394D08C26385F9413F896E09117E46209D6923602683CEA100924A6EE695281775C619DAA94EA8CB3691B4275B0183F1D39639EBC92995FE645D6C1BC28D409E585549BBD2C5DCDD6C208B04EADD8B7A6D997F72CBAD88390F</n>
-
-	<g>02</g>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0005-008]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>jackfruit</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0005-009]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>custard apple</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0005-010]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keyusage>NR</keyusage>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>grape</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0005-011]
-
-<actionbody>
-
-	<foundkey>carrot</foundkey>
-
-	<foundkey>mango</foundkey>
-
-	<foundkey>
-
-To be, or not to be: that is the question:
-
-Whether 'tis nobler in the mind to suffer
-
-The slings and arrows of outrageous fortune,
-
-Or to take arms against a sea of troubles,
-
-And by opposing end them? To die: to sleep;
-
-No more; and by a sleep to say we end
-
-The heart-ache and the thousand natural shocks
-
-That flesh is heir to, 'tis a consummation
-
-Devoutly to be wish'd. To die, to sleep;
-
-To sleep: perchance to dream: ay, there's the rub;
-
-For in that sleep of death what dreams may come
-
-When we have shuffled off this mortal coil,
-
-Must give us pause: there's the respect
-
-That makes calamity of so long life;
-
-For who would bear the whips and scorns of time,
-
-The oppressor's wrong, the proud man's contumely,
-
-The pangs of despised love, the law's delay,
-
-The insolence of office and the spurns
-
-That patient merit of the unworthy takes,
-
-When he himself might his quietus make
-
-With a bare bodkin? Who would fardels bear,
-
-To grunt and sweat under a weary life,
-
-But that the dread of something after death,
-
-The undiscover'd country from whose bourn
-
-No traveller returns, puzzles the will
-
-And makes us rather bear those ills we have
-
-Than fly to others that we know not of?
-
-Thus conscience does make cowards of us all;
-
-And thus the native hue of resolution
-
-Is sicklied o'er with the pale cast of thought,
-
-And enterprises of great pith and moment
-
-With this regard their currents turn awry,
-
-And lose the name of action.--Soft you now!
-
-The fair Ophelia! Nymph, in thy orisons
-
-Be all my sins remember'd. 
-
-	</foundkey>
-
-	<foundkey>jackfruit</foundkey>
-
-	<foundkey>custard apple</foundkey>
-
-	<foundkey>grape</foundkey>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0005-012]
-
-<actionbody>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<foundkey>carrot</foundkey>
-
-	<foundkey>custard apple</foundkey>
-
-	<foundkey>grape</foundkey>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0005-013]
-
-<actionbody>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<foundkey>bigbanana</foundkey>
-
-	<foundkey>
-
-To be, or not to be: that is the question:
-
-Whether 'tis nobler in the mind to suffer
-
-The slings and arrows of outrageous fortune,
-
-Or to take arms against a sea of troubles,
-
-And by opposing end them? To die: to sleep;
-
-No more; and by a sleep to say we end
-
-The heart-ache and the thousand natural shocks
-
-That flesh is heir to, 'tis a consummation
-
-Devoutly to be wish'd. To die, to sleep;
-
-To sleep: perchance to dream: ay, there's the rub;
-
-For in that sleep of death what dreams may come
-
-When we have shuffled off this mortal coil,
-
-Must give us pause: there's the respect
-
-That makes calamity of so long life;
-
-For who would bear the whips and scorns of time,
-
-The oppressor's wrong, the proud man's contumely,
-
-The pangs of despised love, the law's delay,
-
-The insolence of office and the spurns
-
-That patient merit of the unworthy takes,
-
-When he himself might his quietus make
-
-With a bare bodkin? Who would fardels bear,
-
-To grunt and sweat under a weary life,
-
-But that the dread of something after death,
-
-The undiscover'd country from whose bourn
-
-No traveller returns, puzzles the will
-
-And makes us rather bear those ills we have
-
-Than fly to others that we know not of?
-
-Thus conscience does make cowards of us all;
-
-And thus the native hue of resolution
-
-Is sicklied o'er with the pale cast of thought,
-
-And enterprises of great pith and moment
-
-With this regard their currents turn awry,
-
-And lose the name of action.--Soft you now!
-
-The fair Ophelia! Nymph, in thy orisons
-
-Be all my sins remember'd. 
-
-	</foundkey>
-
-	<foundkey>carrot</foundkey>
-
-	<foundkey>jackfruit</foundkey>
-
-	<foundkey>grape</foundkey>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0005-014]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<foundkey>bigbanana</foundkey>
-
-	<foundkey>
-
-To be, or not to be: that is the question:
-
-Whether 'tis nobler in the mind to suffer
-
-The slings and arrows of outrageous fortune,
-
-Or to take arms against a sea of troubles,
-
-And by opposing end them? To die: to sleep;
-
-No more; and by a sleep to say we end
-
-The heart-ache and the thousand natural shocks
-
-That flesh is heir to, 'tis a consummation
-
-Devoutly to be wish'd. To die, to sleep;
-
-To sleep: perchance to dream: ay, there's the rub;
-
-For in that sleep of death what dreams may come
-
-When we have shuffled off this mortal coil,
-
-Must give us pause: there's the respect
-
-That makes calamity of so long life;
-
-For who would bear the whips and scorns of time,
-
-The oppressor's wrong, the proud man's contumely,
-
-The pangs of despised love, the law's delay,
-
-The insolence of office and the spurns
-
-That patient merit of the unworthy takes,
-
-When he himself might his quietus make
-
-With a bare bodkin? Who would fardels bear,
-
-To grunt and sweat under a weary life,
-
-But that the dread of something after death,
-
-The undiscover'd country from whose bourn
-
-No traveller returns, puzzles the will
-
-And makes us rather bear those ills we have
-
-Than fly to others that we know not of?
-
-Thus conscience does make cowards of us all;
-
-And thus the native hue of resolution
-
-Is sicklied o'er with the pale cast of thought,
-
-And enterprises of great pith and moment
-
-With this regard their currents turn awry,
-
-And lose the name of action.--Soft you now!
-
-The fair Ophelia! Nymph, in thy orisons
-
-Be all my sins remember'd. 
-
-	</foundkey>
-
-	<foundkey>carrot</foundkey>
-
-	<foundkey>jackfruit</foundkey>
-
-	<foundkey>grape</foundkey>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0005-015]
-
-<actionbody>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<deletecount>2</deletecount>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0005-016]
-
-<actionbody>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0005-017]
-
-<actionbody>
-
-	<foundkey>carrot</foundkey>
-
-	<foundkey>mango</foundkey>
-
-	<foundkey>jackfruit</foundkey>
-
-	<foundkey>custard apple</foundkey>
-
-	<foundkey>grape</foundkey>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0005-018]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>banana</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<serveroom>0</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0005-019]
-
-<actionbody>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0005-020]
-
-<actionbody>
-
-	<foundkey>carrot</foundkey>
-
-	<foundkey>mango</foundkey>
-
-	<foundkey>banana</foundkey>
-
-	<foundkey>jackfruit</foundkey>
-
-	<foundkey>custard apple</foundkey>
-
-	<foundkey>grape</foundkey>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0006-001]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<open>RSA</open>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0006-002]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<open>Decrypt</open>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0006-003]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<text>Ook!</text>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0006-004]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of 20 .</text>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0006-005]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of thirty-two chars</text>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0006-006]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<open>RSA</open>
-
-	<signdigest>1</signdigest>
-
-	<text>digested!</text>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0006-007]
-
-<actionbody>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<deletecount>1</deletecount>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0007-001]
-
-<actionbody>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>carrot</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0007-002]
-
-<actionbody>
-
-	<keylabel>carrot</keylabel>
-
-	<open>DSA</open>
-
-	<text>This is text of 20 .</text>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0007-003]
-
-<actionbody>
-
-	<keylabel>carrot</keylabel>
-
-	<open>DSA</open>
-
-	<text>This is a text of 21.</text>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0007-004]
-
-<actionbody>
-
-	<keylabel>carrot</keylabel>
-
-	<open>DSA</open>
-
-	<signdigest>1</signdigest>
-
-
-
-	<text>Had we but world enough, and time,
-
-This coyness, lady, were no crime.
-
-We would sit down and think which way
-
-To walk, and pass our long love's day;
-
-Thou by the Indian Ganges' side
-
-Shouldst rubies find; I by the tide
-
-Of Humber would complain. I would
-
-Love you ten years before the Flood;
-
-And you should, if you please, refuse
-
-Till the conversion of the Jews.
-
-My vegetable love should grow
-
-Vaster than empires, and more slow.
-
-An hundred years should go to praise
-
-Thine eyes, and on thy forehead gaze;
-
-Two hundred to adore each breast,
-
-But thirty thousand to the rest;
-
-An age at least to every part,
-
-And the last age should show your heart.
-
-For, lady, you deserve this state,
-
-Nor would I love at lower rate.
-
-
-
-        But at my back I always hear
-
-Time's winged chariot hurrying near;
-
-And yonder all before us lie
-
-Deserts of vast eternity.
-
-Thy beauty shall no more be found,
-
-Nor, in thy marble vault, shall sound
-
-My echoing song; then worms shall try
-
-That long preserv'd virginity,
-
-And your quaint honour turn to dust,
-
-And into ashes all my lust.
-
-The grave's a fine and private place,
-
-But none I think do there embrace.
-
-
-
-        Now therefore, while the youthful hue
-
-Sits on thy skin like morning dew,
-
-And while thy willing soul transpires
-
-At every pore with instant fires,
-
-Now let us sport us while we may;
-
-And now, like am'rous birds of prey,
-
-Rather at once our time devour,
-
-Than languish in his slow-chapp'd power.
-
-Let us roll all our strength, and all
-
-Our sweetness, up into one ball;
-
-And tear our pleasures with rough strife
-
-Thorough the iron gates of life.
-
-Thus, though we cannot make our sun
-
-Stand still, yet we will make him run</text>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0007-005]
-
-<actionbody>
-
-	<keylabel>carrot</keylabel>
-
-	<open>DSA</open>
-
-	<signdigest>2</signdigest>
-
-	<text>digest!</text>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0007-006]
-
-<actionbody>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<deletecount>3</deletecount>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0007-007]
-
-<actionbody>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0007-008]
-
-<actionbody>
-
-	<deletecount>2</deletecount>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0007-009]
-
-<actionbody>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0008-001]
-
-<actionbody>
-
-	<ImportData>encryptPK8dsa4DER.txt</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>*IMPORTED* encrypted purple plum</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<passphrase>import clanger</passphrase>
-
-	<serveroom>1</serveroom>
-
-	<disabledialogcheck>1</disabledialogcheck>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0008-002]
-
-<actionbody>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<foundkey>*IMPORTED* encrypted purple plum</foundkey>
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0008-003]
-
-<actionbody>
-
-	<deletecount>1</deletecount>		
-
-	<serveroom>1</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0009-001]
-
-<actionbody>
-
-	<ImportData>pkcs8rsa.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>gm0RSA</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0009-002]
-
-<actionbody>
-
-	<ExportFile>oom_export_pkcs8rsa_0.001</ExportFile>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>gm0RSA</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<encrypted>0</encrypted>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0009-003]
-
-<actionbody>
-
-	<ImportData>pkcs8dsa.001</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>gm0DSA</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0009-004]
-
-<actionbody>
-
-	<ExportFile>oom_export_pkcs8dsa_0.001</ExportFile>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>gm0DSA</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<encrypted>0</encrypted>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0009-005]
-
-<actionbody>
-
-	<ExportFile>oom_encrypted_export_pkcs8rsa.001</ExportFile>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>gm0RSA</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<encrypted>1</encrypted>
-
-
-
-	<passphrase>export clanger</passphrase>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0009-006]
-
-<actionbody>
-
-	<ExportFile>oom_encrypted_export_pkcs8dsa.001</ExportFile>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>gm0DSA</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<encrypted>1</encrypted>
-
-
-
-	<passphrase>export clanger</passphrase>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0010-001]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>cheeku</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keystore>0</keystore>
-
-	<authexpression>strong</authexpression>
-
-	<freshness>0</freshness>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0010-002]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>cheeku</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0010-003]
-
-<actionbody>
-
-	<authmode>set</authmode>
-
-	<keylabel>cheeku</keylabel>
-
-	<authexpression>medium</authexpression>
-
-	<freshness>21</freshness>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0010-004]
-
-<actionbody>
-
-	<authmode>get</authmode>
-
-	<keylabel>cheeku</keylabel>
-
-	<expectedexpression>medium</expectedexpression>
-
-	<expectedfreshness>21</expectedfreshness>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0010-005]
-
-<actionbody>
-
-	<ImportData>pkcs8dsa.001</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>gm0DSA</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<authexpression>strong</authexpression>
-
-	<freshness>50</freshness>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0010-006]
-
-<actionbody>
-
-	<ImportData>export_pkcs8rsa_0_3DES_CBC.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>gm_export_pkcs8rsa_0_3DES_CBC.001</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<encrypted>0</encrypted>
-
-	<passphrase>import clanger</passphrase>
-
-	<authexpression>strong</authexpression>
-
-	<freshness>50</freshness>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0010-007]
-
-<actionbody>
-
-	<deletecount>3</deletecount>
-
-	<serveroom>0</serveroom>
-
-</actionbody>
-
-
-
-[SEC-SERVOOM_USEAUTH-0011-003]
-
-<actionbody>
-
-	<seconds>5</seconds>
-
-</actionbody>
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/servoom_useauth.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,442 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-START_TESTCASE                SEC-SERVOOM_USEAUTH-0001
-
-//! @SYMTestCaseID            SEC-SERVOOM_USEAUTH-0001
-
-//! @SYMTestCaseDesc          
-
-//!                           Keystore server OOM tests
-
-//!                           
-
-//!                           Testing key generatation has been diabled for the moment.
-
-//!                           
-
-//!                           
-
-//!                           /////////////////////////////////////////////////////////////////////////////
-
-//!                           Test case 1: Initialise the store
-
-//!                           /////////////////////////////////////////////////////////////////////////////
-
-//! @SYMTestActions           1) Delete keystore data file
-
-//!                           2) Start server OOM testing
-
-//!                           3) 1,Opening key store in manager mode
-
-//!                           4) 1.0.1 NOT A TEST Delete everything
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeystoredata  
-
-RUN_TEST_STEP                 -1    CTestHandler        startserveroom      
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0001-003
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys          
-
-END_TESTCASE                  SEC-SERVOOM_USEAUTH-0001
-
-
-
-
-
-START_TESTCASE                SEC-SERVOOM_USEAUTH-0002
-
-//! @SYMTestCaseID            SEC-SERVOOM_USEAUTH-0002
-
-//! @SYMTestCaseDesc          /////////////////////////////////////////////////////////////////////////////
-
-//!                           Test case 2: Add the "Banana" key
-
-//!                           /////////////////////////////////////////////////////////////////////////////
-
-//! @SYMTestActions           1) 2,Add a key
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0002-001
-
-END_TESTCASE                  SEC-SERVOOM_USEAUTH-0002
-
-
-
-
-
-START_TESTCASE                SEC-SERVOOM_USEAUTH-0003
-
-//! @SYMTestCaseID            SEC-SERVOOM_USEAUTH-0003
-
-//! @SYMTestCaseDesc          /////////////////////////////////////////////////////////////////////////////
-
-//!                           Test case 3: List the keys, should only find "Banana"
-
-//!                           /////////////////////////////////////////////////////////////////////////////
-
-//! @SYMTestActions           1) 3 List everything
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0003-001
-
-END_TESTCASE                  SEC-SERVOOM_USEAUTH-0003
-
-
-
-
-
-START_TESTCASE                SEC-SERVOOM_USEAUTH-0004
-
-//! @SYMTestCaseID            SEC-SERVOOM_USEAUTH-0004
-
-//! @SYMTestCaseDesc          /////////////////////////////////////////////////////////////////////////////
-
-//!                           Test case 4: Delete "Banana" key
-
-//!                           /////////////////////////////////////////////////////////////////////////////
-
-//! @SYMTestActions           1) 4. Delete the key
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0004-001
-
-END_TESTCASE                  SEC-SERVOOM_USEAUTH-0004
-
-
-
-
-
-START_TESTCASE                SEC-SERVOOM_USEAUTH-0005
-
-//! @SYMTestCaseID            SEC-SERVOOM_USEAUTH-0005
-
-//! @SYMTestCaseDesc          /////////////////////////////////////////////////////////////////////////////
-
-//!                           Test case 5: List the keys, should find nothing
-
-//!                           /////////////////////////////////////////////////////////////////////////////
-
-//! @SYMTestActions           1) 3 List everything
-
-//!                           2) 2,Add a larger key
-
-//!                           3) 1.1.5.4,Add a key with a very long label
-
-//!                           4) 1.1.5.6,Add a DSA key
-
-//!                           5) 1.1.5.7,Add a DH key
-
-//!                           6) 1.1.5.7.1,Open it
-
-//!                           7) 1.1.5.7.2, Test derive
-
-//!                           8) 1.1.6,Add a key with illegal usage
-
-//!                           9) 1.1.7,Add a key with illegal usage
-
-//!                           10) 1.1.8,Add a key with illegal usage
-
-//!                           11) 1.2 List everything (including illegal usage keys)
-
-//!                           12) 1.3.1 List DSA keys (including illegal usage keys)
-
-//!                           13) 1.3.2 List Sign-usage keys (including illegal usage keys)
-
-//!                           14) 1.3.3 List 'All usages' keys (including illegal usage keys)
-
-//!                           15) 1.4.1, Delete RSA keys
-
-//!                           16) 1.4.2 List RSA keys
-
-//!                           17) 1.4.3 List everything (including illegal usage keys)
-
-//!                           18) 1.4.4,Add a key that was previously deleted
-
-//!                           19) 1.4.5 List RSA keys (including illegal usage keys)
-
-//!                           20) 1.4.6 List everything (including illegal usage keys)
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0005-001
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0005-002
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0005-003
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0005-004
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0005-005
-
-RUN_TEST_STEP                 -1    CTestHandler        open                   servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0005-006
-
-RUN_TEST_STEP                 -1    CTestHandler        derive                 servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0005-007
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0005-008
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0005-009
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0005-010
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0005-011
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0005-012
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0005-013
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0005-014
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0005-015
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0005-016
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0005-017
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0005-018
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0005-019
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0005-020
-
-END_TESTCASE                  SEC-SERVOOM_USEAUTH-0005
-
-
-
-
-
-START_TESTCASE                SEC-SERVOOM_USEAUTH-0006
-
-//! @SYMTestCaseID            SEC-SERVOOM_USEAUTH-0006
-
-//! @SYMTestCaseDesc          //////////////////////////////////////////////////////////////////////////////
-
-//!                           Test RSA signing
-
-//!                           //////////////////////////////////////////////////////////////////////////////
-
-//! @SYMTestActions           1) 1.0.0.2.1,Open it
-
-//!                           2) 1.0.0.2.2,Open a banana for decrypt
-
-//!                           3) Decrypt
-
-//!                           4) 1.0.0.2.2.1, Sign with a banana, 20 char text
-
-//!                           5) 1.0.0.2.2.2, Sign with a banana, 32 char text
-
-//!                           6) 1.0.0.2.2.2.1, Sign digest with a banana
-
-//!                           7) 1.4.5, Delete it again
-
-RUN_TEST_STEP                 -1    CTestHandler        open                   servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0006-001
-
-RUN_TEST_STEP                 -1    CTestHandler        open                   servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0006-002
-
-RUN_TEST_STEP                 -1    CTestHandler        decrypt                servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0006-003
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0006-004
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0006-005
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0006-006
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0006-007
-
-END_TESTCASE                  SEC-SERVOOM_USEAUTH-0006
-
-
-
-
-
-START_TESTCASE                SEC-SERVOOM_USEAUTH-0007
-
-//! @SYMTestCaseID            SEC-SERVOOM_USEAUTH-0007
-
-//! @SYMTestCaseDesc          //////////////////////////////////////////////////////////////////////////////
-
-//!                           Test DSA signing
-
-//!                           //////////////////////////////////////////////////////////////////////////////
-
-//! @SYMTestActions           1) 1.0.0.10,Get carrot
-
-//!                           2) 1.0.0.10.1, Sign with a carrot, 20 char text
-
-//!                           3) 1.0.0.10.2, Sign with carrot, text too long (21 chars)
-
-//!                           4) 1.0.0.10.2, Sign digest with carrot
-
-//!                           5) 1.0.0.10.3, Sign digest with a carrot, fail hash
-
-//!                           6) 1.4.5, Delete it again
-
-//!                           7) 1.5.8.1 List everything (including illegal usage keys)
-
-//!                           8) 1.5.8.2, Delete everything
-
-//!                           9) 1.5.9 List everything
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0007-001
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0007-002
-
-RUN_TEST_STEP !Error=-9       -1    CTestHandler        sign                   servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0007-003
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0007-004
-
-RUN_TEST_STEP !Error=-2       -1    CTestHandler        sign                   servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0007-005
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0007-006
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0007-007
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0007-008
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0007-009
-
-END_TESTCASE                  SEC-SERVOOM_USEAUTH-0007
-
-
-
-
-
-START_TESTCASE                SEC-SERVOOM_USEAUTH-0008
-
-//! @SYMTestCaseID            SEC-SERVOOM_USEAUTH-0008
-
-//! @SYMTestCaseDesc          Test importing keys
-
-//! @SYMTestActions           1) 26, Import a PKCS5 encrypted DSA key
-
-//!                           2) 27, List DSA keys (TEST ID: GT0140-KEY001)
-
-//!                           3) 28, Delete everything
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0008-001
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0008-002
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0008-003
-
-END_TESTCASE                  SEC-SERVOOM_USEAUTH-0008
-
-
-
-
-
-START_TESTCASE                SEC-SERVOOM_USEAUTH-0009
-
-//! @SYMTestCaseID            SEC-SERVOOM_USEAUTH-0009
-
-//! @SYMTestCaseDesc          Test exporting keys
-
-//! @SYMTestActions           1) 1.1.0 Import a RSA key
-
-//!                           2) 1.1.5 Export a RSA key
-
-//!                           3) 1.4.1 Import a DSA key
-
-//!                           4) 1.4.6 Export a DSA key
-
-//!                           5) 1.7.6 Export a RSA key in encrypted format
-
-//!                           6) 1.9.6 Export a DSA key in encrypted format
-
-//!                           7) 1.10.0 NOT A TEST Delete everything 
-
-                    ** Basic sanity check for PKCS8 encrypted DSA key import/export **
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0009-001
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0009-002
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0009-003
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0009-004
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0009-005
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0009-006
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys          
-
-END_TESTCASE                  SEC-SERVOOM_USEAUTH-0009
-
-
-
-
-
-START_TESTCASE                SEC-SERVOOM_USEAUTH-0010
-
-//! @SYMTestCaseID            SEC-SERVOOM_USEAUTH-0010
-
-//! @SYMTestCaseDesc          Tests for the new apis
-
-//! @SYMTestActions           1) 1.0.0.1.0,Add a key (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           2) 1.0.0.51.1, Get it again
-
-//!                           3) Set a new authentication policy for a key
-
-//!                           4) Gets authentication policy for a key
-
-//!                           5) 1.4.1 Import a DSA key
-
-//!                           6) 1.12.0.14 Import a PKCS5 encrypted RSA key previously exported with ECipher3DES_CBC
-
-//!                           7) 3.8, Delete everything
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0010-001
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0010-002
-
-RUN_TEST_STEP                 -1    CTestHandler        authenticationpolicy   servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0010-003
-
-RUN_TEST_STEP                 -1    CTestHandler        authenticationpolicy   servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0010-004
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0010-005
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0010-006
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0010-007
-
-END_TESTCASE                  SEC-SERVOOM_USEAUTH-0010
-
-
-
-
-
-START_TESTCASE                SEC-SERVOOM_USEAUTH-0011
-
-//! @SYMTestCaseID            SEC-SERVOOM_USEAUTH-0011
-
-//! @SYMTestCaseDesc          End of testing
-
-//! @SYMTestActions           1) 999.1, Closing key store
-
-//!                           2) Stop server OOM testing
-
-//!                           3) 999.2, Sleep 5 seconds
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP                 -1    CTestHandler        stopserveroom       
-
-RUN_TEST_STEP                 -1    CTestHandler        sleep                  servoom_useauth.ini   SEC-SERVOOM_USEAUTH-0011-003
-
-END_TESTCASE                  SEC-SERVOOM_USEAUTH-0011
-
-
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/testnewkeystore.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,67 +0,0 @@
-[SEC-FILETOKENS-TESTNEWKEYSTORE-1-001]
-	<actionbody>
-		<mode>manager</mode>
-	</actionbody>
-
-
-[SEC-FILETOKENS-TESTNEWKEYSTORE-1-002]
-   	<actionbody>
-   		<foundkey>dhkey</foundkey>
-		<foundkey>rsakey</foundkey>
-		<foundkey>dsakey</foundkey>
-   	</actionbody>
-
-
-[SEC-FILETOKENS-TESTNEWKEYSTORE-1-003]
-	<actionbody>
-		<keylabel>dhkey</keylabel>
-		<open>DH</open>
-	</actionbody>
-
-
-[SEC-FILETOKENS-TESTNEWKEYSTORE-1-004]
-	<actionbody>
-		<keylabel>dhkey</keylabel>
-		<n>DA9A18547FF03B385CC16508C173A7EF4EB61CB40EF8FEF3B31F145051676166BCDC3FE6B799FC394D08C26385F9413F896E09117E46209D6923602683CEA100924A6EE695281775C619DAA94EA8CB3691B4275B0183F1D39639EBC92995FE645D6C1BC28D409E585549BBD2C5DCDD6C208B04EADD8B7A6D997F72CBAD88390F</n>
-		<g>02</g>
-	</actionbody>
-
-
-[SEC-FILETOKENS-TESTNEWKEYSTORE-1-005]
-	<actionbody>
-		<keylabel>rsakey</keylabel>
-		<open>RSA</open>
-		<text>This is text of 20 .</text>		
-	</actionbody>
-
-
-
-[SEC-FILETOKENS-TESTNEWKEYSTORE-1-006]
-	<actionbody>
-		<keylabel>rsakey</keylabel>
-		<text>Ook!</text>		
-	</actionbody>
-
-
-[SEC-FILETOKENS-TESTNEWKEYSTORE-1-007]
-	<actionbody>
-		<keylabel>dsakey</keylabel>
-		<open>DSA</open>
-		<text>This is text of 20 .</text>		
-	</actionbody>
-
-
-
-
-[SEC-FILETOKENS-TESTNEWKEYSTORE-1-009]
-	<actionbody>
-          <seconds>5</seconds>
-        </actionbody>
-
-
-
-
-
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/testnewkeystore.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,73 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-//
-
-
-START_TESTCASE               SEC-FILETOKENS-TESTNEWKEYSTORE-1-0001
-
-//! @SYMTestCaseID           SEC-FILETOKENS-TESTNEWKEYSTORE-1-0001
-
-//! @SYMTestCaseDesc     
-     
-//!					////////////////////////////////////////////////////////////////////////////////////
-//!					//	Operations on migrated key store
-//!					////////////////////////////////////////////////////////////////////////////////////
-
-//! @SYMTestActions           1) Opening key store in manager mode
-
-//!                           2) List all keys
-
-//!                           3) Open a DH key
-
-//!                           4) derive for dhkey
-
-//!                           5) Sign with RSA key
-
-//!                           6) Decrypt with RSA key
-
-//!                           7) Closing key store
-
-//!                           8) Closing key store
-
-//!                           9) Sleep 5 seconds
-
-//!                          10) Check for server heap error
-
-
-RUN_TEST_STEP -1 CTestHandler init testnewkeystore.ini SEC-FILETOKENS-TESTNEWKEYSTORE-1-001
-
-RUN_TEST_STEP -1 CTestHandler listallkeys testnewkeystore.ini SEC-FILETOKENS-TESTNEWKEYSTORE-1-002
-
-RUN_TEST_STEP -1 CTestHandler open testnewkeystore.ini SEC-FILETOKENS-TESTNEWKEYSTORE-1-003
-
-RUN_TEST_STEP -1 CTestHandler derive testnewkeystore.ini SEC-FILETOKENS-TESTNEWKEYSTORE-1-004
-
-RUN_TEST_STEP -1 CTestHandler sign testnewkeystore.ini SEC-FILETOKENS-TESTNEWKEYSTORE-1-005
-
-RUN_TEST_STEP -1 CTestHandler decrypt testnewkeystore.ini SEC-FILETOKENS-TESTNEWKEYSTORE-1-006
-
-RUN_TEST_STEP -1 CTestHandler sign testnewkeystore.ini SEC-FILETOKENS-TESTNEWKEYSTORE-1-007
-
-RUN_TEST_STEP -1 CTestHandler delete
-
-RUN_TEST_STEP -1 CTestHandler sleep testnewkeystore.ini SEC-FILETOKENS-TESTNEWKEYSTORE-1-009
-
-RUN_TEST_STEP -1 CTestHandler checkserverheaperror
-
-
-END_TESTCASE                SEC-FILETOKENS-TESTNEWKEYSTORE-1-0001
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/thwkeystore.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,251 +0,0 @@
-[SEC-FILETOKENS-THWKEYSTORE-1-002]
-	<actionbody>
-		<mode>manager</mode>
-		<CheckKeyStoreLabel>1</CheckKeyStoreLabel>
-		<keystoreindex>3</keystoreindex>
-		<keystorelabel>Hardware plugin implementation</keystorelabel>
-	</actionbody>
-
-
-
-
-[SEC-FILETOKENS-THWKEYSTORE-1-004]
-	<actionbody>
-		<listcount>2</listcount>
-		<foundkey>ecckey</foundkey>
-		<foundkey>ecckey2</foundkey>
-	</actionbody>
-
-
-[SEC-FILETOKENS-THWKEYSTORE-1-005]
-	<actionbody>
-		<hwtype>1</hwtype>
-		<operationtype>sign</operationtype>
-		<keylabel>ecckey</keylabel>
-		<open>ECC</open>
-	</actionbody>
-
-
-
-[SEC-FILETOKENS-THWKEYSTORE-1-006]
-	<actionbody>
-		<hwtype>1</hwtype>
-		<operationtype>decrypt</operationtype>
-		<keylabel>ecckey</keylabel>
-		<open>ECC</open>
-	</actionbody>
-
-
-
-[SEC-FILETOKENS-THWKEYSTORE-1-007]
-	<actionbody>
-		<hwtype>0</hwtype>
-		<operationtype>sign</operationtype>
-		<keylabel>ecckey</keylabel>
-		<open>ECC</open>
-		<keystorelabel>Hardware plugin implementation</keystorelabel>
-	<text>sample text</text>
-	</actionbody>
-
-
-
-[SEC-FILETOKENS-THWKEYSTORE-1-008]
-	<actionbody>
-		<hwtype>0</hwtype>
-		<operationtype>decrypt</operationtype>
-		<keylabel>ecckey2</keylabel>
-		<open>ECC</open>
-		<keystorelabel>Hardware plugin implementation</keystorelabel>
-	<text>sample text</text>
-	</actionbody>
-
-
-
-[SEC-FILETOKENS-THWKEYSTORE-1-009]
-	<actionbody>
-		<hwtype>1</hwtype>
-		<operationtype>sign</operationtype>
-		<keylabel>ecckey</keylabel>
-		<open>ECC</open>
-		<keystorelabel>Hardware plugin implementation</keystorelabel>
-	<text>sample text</text>
-	</actionbody>
-
-
-[SEC-FILETOKENS-THWKEYSTORE-1-010]
-	<actionbody>
-		<hwtype>1</hwtype>
-		<operationtype>decrypt</operationtype>
-		<keylabel>ecckey2</keylabel>
-		<open>ECC</open>
-		<keystorelabel>Hardware plugin implementation</keystorelabel>
-	<text>sample text</text>
-	</actionbody>
-
-
-
-[SEC-FILETOKENS-THWKEYSTORE-1-011]
-	<actionbody>
-		<foundkey>ecckey3</foundkey>
-		<listingstatus>fail</listingstatus>
-	</actionbody>
-
-
-
-[SEC-FILETOKENS-THWKEYSTORE-1-012]
-	<actionbody>
-		<keyusage>allusagesbutNR</keyusage>
-		<keysize>512</keysize>
-		<keylabel>banana</keylabel>
-		<keyalgorithm>RSA</keyalgorithm>
-		<keyaccesstype>Extractable</keyaccesstype>
-		<keystore>0</keystore>
-		<usekeystore>Hardware plugin implementation</usekeystore>
-	</actionbody>
-	<actionresult>
-		<return>KErrNotSupported</return>
-	</actionresult>
-
-
-
-[SEC-FILETOKENS-THWKEYSTORE-1-013]
-	<actionbody>
-		<keylabel>ecckey</keylabel>
-	</actionbody>
-	<actionresult>
-		<return>KErrNotSupported</return>
-	</actionresult>
-
-
-
-[SEC-FILETOKENS-THWKEYSTORE-1-014]
-	<actionbody>
-		<keylabel>ecckey</keylabel>
-		<open>RSA</open>
-	</actionbody>
-	<actionresult>
-		<return>KErrNotSupported</return>
-	</actionresult>
-
-
-
-[SEC-FILETOKENS-THWKEYSTORE-1-015]
-	<actionbody>
-		<keylabel>ecckey</keylabel>
-		<open>DSA</open>
-	</actionbody>
-	<actionresult>
-		<return>KErrNotSupported</return>
-	</actionresult>
-
-
-
-[SEC-FILETOKENS-THWKEYSTORE-1-016]
-	<actionbody>
-		<keylabel>ecckey</keylabel>
-		<open>Decrypt</open>
-	</actionbody>
-	<actionresult>
-		<return>KErrNotSupported</return>
-	</actionresult>
-
-
-
-[SEC-FILETOKENS-THWKEYSTORE-1-017]
-	<actionbody>
-		<ImportData>pkcs8rsa.001</ImportData>
-		<keyusage>allusagesbutNR</keyusage>
-		<keylabel>ImportHardwareKey</keylabel>
-		<keyaccesstype>NeverExtractable</keyaccesstype>
-		<usekeystore>Hardware plugin implementation</usekeystore>
-	</actionbody>
-	<actionresult>
-		<return>KErrNotSupported</return>
-	</actionresult>
-
-
-
-[SEC-FILETOKENS-THWKEYSTORE-1-018]
-	<actionbody>
-		<ImportData>encryptPK8rsaDER.txt</ImportData>
-		<keyusage>allusagesbutNR</keyusage>
-		<keylabel>ImportEncryptedHardwareKey</keylabel>
-		<keyaccesstype>NeverExtractable</keyaccesstype>
-		<usekeystore>Hardware plugin implementation</usekeystore>
-	</actionbody>
-	<actionresult>
-		<return>KErrNotSupported</return>
-	</actionresult>
-
-
-
-[SEC-FILETOKENS-THWKEYSTORE-1-019]
-	<actionbody>
-		<ExportFile>export_hardware_key</ExportFile>
-		<keyusage>Derive</keyusage>
-		<keylabel>ecckey</keylabel>
-		<keyalgorithm>ECC</keyalgorithm>
-		<encrypted>0</encrypted>
-	</actionbody>
-	<actionresult>
-		<return>KErrNotSupported</return>
-	</actionresult>
-
-
-[SEC-FILETOKENS-THWKEYSTORE-1-020]
-	<actionbody>
-		<ExportFile>export_encrypted_hardware_key</ExportFile>
-		<keyusage>Derive</keyusage>
-		<keylabel>ecckey</keylabel>
-		<keyalgorithm>ECC</keyalgorithm>
-		<encrypted>1</encrypted>
-	</actionbody>
-	<actionresult>
-		<return>KErrNotSupported</return>
-	</actionresult>
-
-
-[SEC-FILETOKENS-THWKEYSTORE-1-021]
-	<actionbody>
-		<keylabel>ecckey</keylabel>
-		<policy>
-			<secureid>0x101FFFFF</secureid>
-			<capability>DRM</capability>
-			<capability>ReadUserData</capability>
-		</policy>
-	</actionbody>
-	<actionresult>
-		<return>KErrNotSupported</return>
-	</actionresult>
-
-
-[SEC-FILETOKENS-THWKEYSTORE-1-022]
-	<actionbody>
-		<keylabel>ecckey</keylabel>
-		<policy>
-			<secureid>0x101FFFFF</secureid>
-			<capability>DRM</capability>
-			<capability>ReadUserData</capability>
-		</policy>
-	</actionbody>
-	<actionresult>
-		<return>KErrNotSupported</return>
-	</actionresult>
-
-
-[SEC-FILETOKENS-THWKEYSTORE-1-023]
-	<actionbody>
-		<keyalgorithm>ECC</keyalgorithm>
-		<keylabel>ecckey</keylabel>
-	</actionbody>
-	<actionresult>
-		<return>KErrNotSupported</return>
-	</actionresult>
-
-
-
-[SEC-FILETOKENS-THWKEYSTORE-1-025]
-	<actionbody>
-          <seconds>5</seconds>
-        </actionbody>
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/thwkeystore.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,129 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-//
-
-START_TESTCASE               SEC-FILETOKENS-THWKEYSTORE-1-0001
-
-//! @SYMTestCaseID           SEC-FILETOKENS-THWKEYSTORE-1-0001
-
-//! @SYMTestCaseDesc     
-     
-//!					////////////////////////////////////////////////////////////////////////////////////
-//!					//	Testing hardware token implementation
-//!					////////////////////////////////////////////////////////////////////////////////////
-
-//! @SYMTestActions           1) Delete keystore data file
-
-//!                           2) Retrieving label of a particular key store
-
-//!                           3) delete keys
-
-//!                           4) List Keys
-
-//!                           5) Open a key for signing
-
-//!                           6) Open a key for decryption
-
-//!                           7) Open a key for signing
-
-//!                           8) Open a key for decryption
-
-//!                           9) Open a key for signing
-
-//!                          10) Open a key for decryption
-
-//!			           11) List Keys
-
-//!                          12) Add a key
-
-//!                          13) Get key information
-
-//!                          14) Open a key as a RSA signer
-
-//!                          15) Open a key as a DSA signer
-
-//!                          16) Open key for decrypt
-
-//!                          17) Import a key
-
-//!                          18) Import a PKCS5 encrypted RSA key
-
-//!                          19) Export a key
-
-//!                          20) Set use policy
-
-//!                          21) Open key for decrypt
-
-//!                          22) Set use policy
-
-//!                          23) Delete a key
-
-//!                          24) Closing key store
-
-//!                          25) Sleep 5 seconds
-
-
-RUN_TEST_STEP -1 CTestHandler deletekeystoredata
-
-RUN_TEST_STEP -1 CTestHandler init thwkeystore.ini SEC-FILETOKENS-THWKEYSTORE-1-002
-
-RUN_TEST_STEP -1 CTestHandler deletekeys
-
-RUN_TEST_STEP -1 CTestHandler listallkeys thwkeystore.ini SEC-FILETOKENS-THWKEYSTORE-1-004
-
-RUN_TEST_STEP -1 CTestHandler open thwkeystore.ini SEC-FILETOKENS-THWKEYSTORE-1-005
-
-RUN_TEST_STEP -1 CTestHandler open thwkeystore.ini SEC-FILETOKENS-THWKEYSTORE-1-006
-
-RUN_TEST_STEP -1 CTestHandler sign thwkeystore.ini SEC-FILETOKENS-THWKEYSTORE-1-007
-
-RUN_TEST_STEP -1 CTestHandler decrypt thwkeystore.ini SEC-FILETOKENS-THWKEYSTORE-1-008
-
-RUN_TEST_STEP -1 CTestHandler sign thwkeystore.ini SEC-FILETOKENS-THWKEYSTORE-1-009
-
-RUN_TEST_STEP -1 CTestHandler decrypt thwkeystore.ini SEC-FILETOKENS-THWKEYSTORE-1-010
-
-RUN_TEST_STEP -1 CTestHandler listkeys thwkeystore.ini SEC-FILETOKENS-THWKEYSTORE-1-011
-
-RUN_TEST_STEP !Error=-5 -1 CTestHandler addkey thwkeystore.ini SEC-FILETOKENS-THWKEYSTORE-1-012
-
-RUN_TEST_STEP !Error=-5 -1 CTestHandler getkeyinfo thwkeystore.ini SEC-FILETOKENS-THWKEYSTORE-1-013
-
-RUN_TEST_STEP !Error=-5 -1 CTestHandler open thwkeystore.ini SEC-FILETOKENS-THWKEYSTORE-1-014
-
-RUN_TEST_STEP !Error=-5 -1 CTestHandler open thwkeystore.ini SEC-FILETOKENS-THWKEYSTORE-1-015
-
-RUN_TEST_STEP !Error=-5 -1 CTestHandler open thwkeystore.ini SEC-FILETOKENS-THWKEYSTORE-1-016
-
-RUN_TEST_STEP !Error=-5 -1 CTestHandler importkey thwkeystore.ini SEC-FILETOKENS-THWKEYSTORE-1-017
-
-RUN_TEST_STEP !Error=-5 -1 CTestHandler importkey thwkeystore.ini SEC-FILETOKENS-THWKEYSTORE-1-018
-
-RUN_TEST_STEP !Error=-5 -1 CTestHandler exportkey thwkeystore.ini SEC-FILETOKENS-THWKEYSTORE-1-019
-
-RUN_TEST_STEP !Error=-5 -1 CTestHandler exportkey thwkeystore.ini SEC-FILETOKENS-THWKEYSTORE-1-020
-
-RUN_TEST_STEP !Error=-5 -1 CTestHandler setusepolicy thwkeystore.ini SEC-FILETOKENS-THWKEYSTORE-1-021
-
-RUN_TEST_STEP !Error=-5 -1 CTestHandler setmanagementpolicy thwkeystore.ini SEC-FILETOKENS-THWKEYSTORE-1-022
-
-RUN_TEST_STEP !Error=-5 -1 CTestHandler deletekeys thwkeystore.ini SEC-FILETOKENS-THWKEYSTORE-1-023
-
-RUN_TEST_STEP -1 CTestHandler delete
-
-RUN_TEST_STEP -1 CTestHandler sleep thwkeystore.ini SEC-FILETOKENS-THWKEYSTORE-1-025
-
-END_TESTCASE               SEC-FILETOKENS-THWKEYSTORE-1-0001
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/tkeystore_authentication1.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,306 +0,0 @@
-[SEC-TKEYSTORE_AUTHENTICATION1-0001-002]
-
-<actionbody>
-
-	<mode>manager</mode>
-
-	<CheckKeyStoreLabel>1</CheckKeyStoreLabel>
-
-	<keystoreindex>2</keystoreindex>
-
-	<keystorelabel>Dummy KeyStore Manager1</keystorelabel>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION1-0001-004]
-
-<actionbody>
-
-	<mode>manager</mode>
-
-	<CheckKeyStoreLabel>1</CheckKeyStoreLabel>
-
-	<keystoreindex>4</keystoreindex>
-
-	<keystorelabel>Dummy KeyStore Manager1</keystorelabel>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION1-0001-006]
-
-<actionbody>
-
-	<mode>manager</mode>
-
-	<CheckStoreCount>1</CheckStoreCount>
-
-	<KeyStoreCount>4</KeyStoreCount>
-
-	<KeyStoreManagerCount>3</KeyStoreManagerCount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION1-0001-007]
-
-<actionbody>
-
-	<mode>manager</mode>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION1-0001-008]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>cheeku</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keystore>0</keystore>
-
-	<authexpression>strong</authexpression>
-
-	<freshness>0</freshness>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION1-0001-009]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>cheeku</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION1-0001-010]
-
-<actionbody>
-
-	<authmode>set</authmode>
-
-	<keylabel>cheeku</keylabel>
-
-	<authexpression>medium</authexpression>
-
-	<freshness>21</freshness>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION1-0001-011]
-
-<actionbody>
-
-	<authmode>get</authmode>
-
-	<keylabel>cheeku</keylabel>
-
-	<expectedexpression>medium</expectedexpression>
-
-	<expectedfreshness>21</expectedfreshness>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION1-0001-012]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>cheeku</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION1-0001-013]
-
-<actionbody>
-
-	<foundkey>cheeku</foundkey>
-
-		<foundkey>cheeku</foundkey>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION1-0001-014]
-
-<actionbody>
-
-	<ExportFile>export_DHkey.001</ExportFile>
-
-	<keyusage>Derive</keyusage>
-
-	<keylabel>cheeku</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<encrypted>0</encrypted>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION1-0001-015]
-
-<actionbody>
-
-	<ImportData>pkcs8rsa.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>gm0</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<authexpression>strong</authexpression>
-
-	<freshness>25</freshness>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION1-0001-016]
-
-<actionbody>
-
-	<ExportFile>export_pkcs8rsa_0.001</ExportFile>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>gm0</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<encrypted>0</encrypted>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION1-0001-017]
-
-<actionbody>
-
-	<authmode>set</authmode>
-
-	<keylabel>gm0</keylabel>
-
-	<authexpression>medium</authexpression>
-
-	<freshness>0</freshness>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION1-0001-018]
-
-<actionbody>
-
-	<ExportFile>export_pkcs8rsa_0.001</ExportFile>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>gm0</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<encrypted>0</encrypted>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION1-0001-019]
-
-<actionbody>
-
-	<ImportData>export_pkcs8rsa_0_3DES_CBC.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>gm_export_pkcs8rsa_0_3DES_CBC.001</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<encrypted>1</encrypted>
-
-	<passphrase>import clanger</passphrase>
-
-	<authexpression>strong</authexpression>
-
-	<freshness>50</freshness>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION1-0001-020]
-
-<actionbody>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<foundkey>gm0</foundkey>
-
-	<foundkey>gm_export_pkcs8rsa_0_3DES_CBC.001</foundkey>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION1-0001-023]
-
-<actionbody>
-
-	<seconds>5</seconds>
-
-</actionbody>
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/tkeystore_authentication1.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,120 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-START_TESTCASE                SEC-TKEYSTORE_AUTHENTICATION1-0001
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_AUTHENTICATION1-0001
-
-//! @SYMTestCaseDesc          
-
-//! @SYMTestActions           1) Delete keystore data file
-
-//!                           2) Retrieving label of a particular key store
-
-//!                           3) Closing key store
-
-//!                           4) Retrieving label of a particular key store
-
-//!                           5) Closing key store
-
-//!                           6) 1.0.0.0.1,Opening key store 1 in manager mode - deprecated
-
-//!                           7) 1.0.0.0.2,Opening key store 2 in manager mode
-
-//!                           8) 1.0.0.1.0,Add a key (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           9) 1.0.0.51.1, Get it again
-
-//!                           10) Set a new authentication policy for a key with which the user is not registered
-
-//!                           11) Gets authentication policy for a key
-
-//!                           12) 1.0.0.51.1, Get it again
-
-//!                           13) 1.0.0.1.1,List all keys (TEST ID: INC103084-KEY001)
-
-//!                           14) 1.0.0.1.0.0,export a DH key
-
-//!                           15) 1.1.0 Import a RSA key
-
-//!                           16) 1.1.5 Export a RSA key
-
-//!                           17) Set a new authentication policy for a key with which the user is not registered
-
-//!                           18) 1.1.5 Export a RSA key
-
-//!                           19) 1.12.0.14 Import a PKCS5 encrypted RSA key previously exported with ECipher3DES_CBC
-
-//!                           20) 1.1.0.24 List RSA keys (TEST ID: GT0140-KEY001)
-
-//!                           21) 1.2.0.69.0 Closing key store 1 - deprecated
-
-//!                           22) 1.2.0.69.1 Closing key store 2
-
-//!                           23) 1.4.999.2, Sleep 5 seconds
-
-//!                           24) 1.4.999.3, Check for server heap error
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeystoredata  
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   tkeystore_authentication1.ini   SEC-TKEYSTORE_AUTHENTICATION1-0001-002
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP !Error=-2       -1    CTestHandler        init                   tkeystore_authentication1.ini   SEC-TKEYSTORE_AUTHENTICATION1-0001-004
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   tkeystore_authentication1.ini   SEC-TKEYSTORE_AUTHENTICATION1-0001-007
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_authentication1.ini   SEC-TKEYSTORE_AUTHENTICATION1-0001-008
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_authentication1.ini   SEC-TKEYSTORE_AUTHENTICATION1-0001-009
-
-RUN_TEST_STEP                 -1    CTestHandler        authenticationpolicy   tkeystore_authentication1.ini   SEC-TKEYSTORE_AUTHENTICATION1-0001-010
-
-RUN_TEST_STEP                 -1    CTestHandler        authenticationpolicy   tkeystore_authentication1.ini   SEC-TKEYSTORE_AUTHENTICATION1-0001-011
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_authentication1.ini   SEC-TKEYSTORE_AUTHENTICATION1-0001-012
-
-RUN_TEST_STEP                 -1    CTestHandler        listallkeys            tkeystore_authentication1.ini   SEC-TKEYSTORE_AUTHENTICATION1-0001-013
-
-RUN_TEST_STEP !Error=-5       -1    CTestHandler        exportkey              tkeystore_authentication1.ini   SEC-TKEYSTORE_AUTHENTICATION1-0001-014
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_authentication1.ini   SEC-TKEYSTORE_AUTHENTICATION1-0001-015
-
-RUN_TEST_STEP                 -1    CTestHandler        exportkey              tkeystore_authentication1.ini   SEC-TKEYSTORE_AUTHENTICATION1-0001-016
-
-RUN_TEST_STEP                 -1    CTestHandler        authenticationpolicy   tkeystore_authentication1.ini   SEC-TKEYSTORE_AUTHENTICATION1-0001-017
-
-RUN_TEST_STEP !Error=-11012   -1    CTestHandler        exportkey              tkeystore_authentication1.ini   SEC-TKEYSTORE_AUTHENTICATION1-0001-018
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_authentication1.ini   SEC-TKEYSTORE_AUTHENTICATION1-0001-019
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               tkeystore_authentication1.ini   SEC-TKEYSTORE_AUTHENTICATION1-0001-020
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP                 -1    CTestHandler        sleep                  tkeystore_authentication1.ini   SEC-TKEYSTORE_AUTHENTICATION1-0001-023
-
-RUN_TEST_STEP                 -1    CTestHandler        checkserverheaperror
-
-END_TESTCASE                  SEC-TKEYSTORE_AUTHENTICATION1-0001
-
-
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/tkeystore_authentication2.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,530 +0,0 @@
-[SEC-TKEYSTORE_AUTHENTICATION2-0001-002]
-
-<actionbody>
-
-	<mode>manager</mode>
-
-	<CheckKeyStoreLabel>1</CheckKeyStoreLabel>
-
-	<keystoreindex>2</keystoreindex>
-
-	<keystorelabel>Dummy KeyStore Manager1</keystorelabel>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION2-0001-004]
-
-<actionbody>
-
-	<mode>manager</mode>
-
-	<CheckKeyStoreLabel>1</CheckKeyStoreLabel>
-
-	<keystoreindex>4</keystoreindex>
-
-	<keystorelabel>Dummy KeyStore Manager1</keystorelabel>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION2-0001-006]
-
-<actionbody>
-
-	<mode>manager</mode>
-
-	<CheckStoreCount>1</CheckStoreCount>
-
-	<KeyStoreCount>4</KeyStoreCount>
-
-	<KeyStoreManagerCount>3</KeyStoreManagerCount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION2-0001-007]
-
-<actionbody>
-
-	<mode>manager</mode>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION2-0001-008]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>cheeku</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keystore>0</keystore>
-
-	<authexpression>strong</authexpression>
-
-	<freshness>0</freshness>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION2-0001-009]
-
-<actionbody>
-
-	<authmode>set</authmode>
-
-	<keylabel>cheeku</keylabel>
-
-	<authexpression>strong</authexpression>
-
-	<negativefreshness>1</negativefreshness>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION2-0001-010]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>cheeku</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION2-0001-011]
-
-<actionbody>
-
-	<ImportData>pkcs8rsa.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>user2Key</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION2-0001-012]
-
-<actionbody>
-
-		<foundkey>cheeku</foundkey>
-
-	<foundkey>user2Key</foundkey>
-
-		<foundkey>cheeku</foundkey>
-
-	<foundkey>user2Key</foundkey>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION2-0001-013]
-
-<actionbody>
-
-	<ExportFile>export_pkcs8rsa_0.001</ExportFile>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>gm0</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<encrypted>0</encrypted>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION2-0001-014]
-
-<actionbody>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION2-0001-015]
-
-<actionbody>
-
-	<keylabel>*IMPORTED* encrypted raddicio</keylabel>
-
-	<deletecount>0</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION2-0001-016]
-
-<actionbody>
-
-	<authmode>set</authmode>
-
-	<keylabel>*IMPORTED* encrypted raddicio</keylabel>
-
-	<authexpression>medium</authexpression>
-
-	<freshness>21</freshness>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION2-0001-017]
-
-<actionbody>
-
-	<authmode>get</authmode>
-
-	<keylabel>*IMPORTED* encrypted raddicio</keylabel>
-
-	<expectedexpression>medium</expectedexpression>
-
-	<expectedfreshness>21</expectedfreshness>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION2-0001-018]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>negativefreshness</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keystore>0</keystore>
-
-	<authexpression>strong</authexpression>
-
-	<negativefreshness>1</negativefreshness>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION2-0001-019]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>negativefreshness</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keystore>0</keystore>
-
-	<authexpression>strong</authexpression>
-
-	<freshness>2147483648</freshness>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION2-0001-020]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>invalidaliasvalue</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keystore>0</keystore>
-
-	<authexpression>invalid</authexpression>
-
-	<freshness>10</freshness>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION2-0001-021]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>verybigexpression</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keystore>0</keystore>
-
-	<authexpression>
-
-To be, or not to be: that is the question:
-
-Whether 'tis nobler in the mind to suffer
-
-The slings and arrows of outrageous fortune,
-
-Or to take arms against a sea of troubles,
-
-And by opposing end them? To die: to sleep;
-
-No more; and by a sleep to say we end
-
-The heart-ache and the thousand natural shocks
-
-That flesh is heir to, 'tis a consummation
-
-Devoutly to be wish'd. To die, to sleep;
-
-To sleep: perchance to dream: ay, there's the rub;
-
-For in that sleep of death what dreams may come
-
-When we have shuffled off this mortal coil,
-
-Must give us pause: there's the respect
-
-That makes calamity of so long life;
-
-For who would bear the whips and scorns of time,
-
-The oppressor's wrong, the proud man's contumely,
-
-The pangs of despised love, the law's delay,
-
-The insolence of office and the spurns
-
-That patient merit of the unworthy takes,
-
-When he himself might his quietus make
-
-With a bare bodkin? Who would fardels bear,
-
-To grunt and sweat under a weary life,
-
-But that the dread of something after death,
-
-The undiscover'd country from whose bourn
-
-No traveller returns, puzzles the will
-
-And makes us rather bear those ills we have
-
-Than fly to others that we know not of?
-
-Thus conscience does make cowards of us all;
-
-And thus the native hue of resolution
-
-Is sicklied o'er with the pale cast of thought,
-
-And enterprises of great pith and moment
-
-With this regard their currents turn awry,
-
-And lose the name of action.--Soft you now!
-
-The fair Ophelia! Nymph, in thy orisons
-
-Be all my sins remember'd. 
-
-	</authexpression>
-
-	<freshness>10</freshness>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION2-0001-022]
-
-<actionbody>
-
-	<ImportData>pkcs8rsa.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>gm0</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<authexpression>strong</authexpression>
-
-	<negativefreshness>1</negativefreshness>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION2-0001-023]
-
-<actionbody>
-
-	<ImportData>pkcs8rsa.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>gm0</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<authexpression>strong</authexpression>
-
-	<freshness>2147483648</freshness>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION2-0001-024]
-
-<actionbody>
-
-	<ImportData>export_pkcs8rsa_0_3DES_CBC.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>gm_export_pkcs8rsa_0_3DES_CBC.001</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<encrypted>1</encrypted>
-
-	<passphrase>import clanger</passphrase>
-
-	<disabledialogcheck>1</disabledialogcheck>	
-
-	<authexpression>strong</authexpression>
-
-	<negativefreshness>1</negativefreshness>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION2-0001-025]
-
-<actionbody>
-
-	<ImportData>export_pkcs8rsa_0_3DES_CBC.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>gm_export_pkcs8rsa_0_3DES_CBC.001</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<encrypted>1</encrypted>
-
-	<passphrase>import clanger</passphrase>
-
-	<disabledialogcheck>1</disabledialogcheck>
-
-	<authexpression>strong</authexpression>
-
-	<freshness>2147483648</freshness>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION2-0001-026]
-
-<actionbody>
-
-	<authmode>set</authmode>
-
-	<keylabel>cheeku</keylabel>
-
-	<authexpression>strong</authexpression>
-
-	<negativefreshness>1</negativefreshness>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION2-0001-027]
-
-<actionbody>
-
-	<authmode>set</authmode>
-
-	<keylabel>cheeku</keylabel>
-
-	<authexpression>strong</authexpression>
-
-	<freshness>2147483648</freshness>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_AUTHENTICATION2-0001-030]
-
-<actionbody>
-
-	<seconds>5</seconds>
-
-</actionbody>
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/tkeystore_authentication2.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,148 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-START_TESTCASE                SEC-TKEYSTORE_AUTHENTICATION2-0001
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_AUTHENTICATION2-0001
-
-//! @SYMTestCaseDesc          
-
-//! @SYMTestActions           1) Delete keystore data file
-
-//!                           2) Retrieving label of a particular key store
-
-//!                           3) Closing key store
-
-//!                           4) Retrieving label of a particular key store
-
-//!                           5) Closing key store
-
-//!                           6) 1.0.0.0.1,Opening key store 1 in manager mode - deprecated
-
-//!                           7) 1.0.0.0.2,Opening key store 2 in manager mode
-
-//!                           8) 1.0.0.1.0,Add a key (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           9) Set a new authentication policy for a key with which the user is not registered
-
-//!                           10) 1.0.0.51.1, Get it again
-
-//!                           11) 1.1.0 Import a RSA key
-
-//!                           12) List all keys specific to this user
-
-//!                           13) 1.1.5 Export a RSA key
-
-//!                           14) Delete key of the curent authenticated user (TEST ID: GT0140KEY004)
-
-//!                           15) Try to delete key of some other registered user (TEST ID: GT0140KEY004)
-
-//!                           16) Try to set authentication policy for a key of some other registered user
-
-//!                           17) Try to get authentication policy for a key of some other registered user
-
-//!                           18) Try to add a key with negative freshness value (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           19) Try to add a key with out of range freshness value (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           20) Try to add a key when authexpression does not exist(TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           21) Try to add a key when authexpression is very big(TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           22) 1.1.0 Import a RSA key
-
-//!                           23) 1.1.0 Import a RSA key
-
-//!                           24) 1.12.0.14 Import a PKCS5 encrypted RSA key previously exported with ECipher3DES_CBC
-
-//!                           25) 1.12.0.14 Import a PKCS5 encrypted RSA key previously exported with ECipher3DES_CBC
-
-//!                           26) Set a new authentication policy for a key with which the user is not registered
-
-//!                           27) Set a new authentication policy for a key with which the user is not registered
-
-//!                           28) 1.2.0.69.0 Closing key store 1 - deprecated
-
-//!                           29) 1.2.0.69.0 Closing key store 1
-
-//!                           30) 1.4.999.2, Sleep 5 seconds
-
-//!                           31) 1.4.999.3, Check for server heap error
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeystoredata  
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   tkeystore_authentication2.ini   SEC-TKEYSTORE_AUTHENTICATION2-0001-002
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP !Error=-2       -1    CTestHandler        init                   tkeystore_authentication2.ini   SEC-TKEYSTORE_AUTHENTICATION2-0001-004
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   tkeystore_authentication2.ini   SEC-TKEYSTORE_AUTHENTICATION2-0001-007
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_authentication2.ini   SEC-TKEYSTORE_AUTHENTICATION2-0001-008
-
-RUN_TEST_STEP !Error=-9       -1    CTestHandler        authenticationpolicy   tkeystore_authentication2.ini   SEC-TKEYSTORE_AUTHENTICATION2-0001-009
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_authentication2.ini   SEC-TKEYSTORE_AUTHENTICATION2-0001-010
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_authentication2.ini   SEC-TKEYSTORE_AUTHENTICATION2-0001-011
-
-RUN_TEST_STEP                 -1    CTestHandler        listallkeys            tkeystore_authentication2.ini   SEC-TKEYSTORE_AUTHENTICATION2-0001-012
-
-RUN_TEST_STEP !Error=-1       -1    CTestHandler        exportkey              tkeystore_authentication2.ini   SEC-TKEYSTORE_AUTHENTICATION2-0001-013
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             tkeystore_authentication2.ini   SEC-TKEYSTORE_AUTHENTICATION2-0001-014
-
-RUN_TEST_STEP !Error=-1       -1    CTestHandler        deletekeys             tkeystore_authentication2.ini   SEC-TKEYSTORE_AUTHENTICATION2-0001-015
-
-RUN_TEST_STEP !Error=-1       -1    CTestHandler        authenticationpolicy   tkeystore_authentication2.ini   SEC-TKEYSTORE_AUTHENTICATION2-0001-016
-
-RUN_TEST_STEP !Error=-1       -1    CTestHandler        authenticationpolicy   tkeystore_authentication2.ini   SEC-TKEYSTORE_AUTHENTICATION2-0001-017
-
-RUN_TEST_STEP !Error=-9       -1    CTestHandler        addkey                 tkeystore_authentication2.ini   SEC-TKEYSTORE_AUTHENTICATION2-0001-018
-
-RUN_TEST_STEP !Error=-9       -1    CTestHandler        addkey                 tkeystore_authentication2.ini   SEC-TKEYSTORE_AUTHENTICATION2-0001-019
-
-RUN_TEST_STEP !Error=-10815   -1    CTestHandler        addkey                 tkeystore_authentication2.ini   SEC-TKEYSTORE_AUTHENTICATION2-0001-020
-
-RUN_TEST_STEP !Error=-10815   -1    CTestHandler        addkey                 tkeystore_authentication2.ini   SEC-TKEYSTORE_AUTHENTICATION2-0001-021
-
-RUN_TEST_STEP !Error=-9       -1    CTestHandler        importkey              tkeystore_authentication2.ini   SEC-TKEYSTORE_AUTHENTICATION2-0001-022
-
-RUN_TEST_STEP !Error=-9       -1    CTestHandler        importkey              tkeystore_authentication2.ini   SEC-TKEYSTORE_AUTHENTICATION2-0001-023
-
-RUN_TEST_STEP !Error=-9       -1    CTestHandler        importkey              tkeystore_authentication2.ini   SEC-TKEYSTORE_AUTHENTICATION2-0001-024
-
-RUN_TEST_STEP !Error=-9       -1    CTestHandler        importkey              tkeystore_authentication2.ini   SEC-TKEYSTORE_AUTHENTICATION2-0001-025
-
-RUN_TEST_STEP !Error=-9       -1    CTestHandler        authenticationpolicy   tkeystore_authentication2.ini   SEC-TKEYSTORE_AUTHENTICATION2-0001-026
-
-RUN_TEST_STEP !Error=-9       -1    CTestHandler        authenticationpolicy   tkeystore_authentication2.ini   SEC-TKEYSTORE_AUTHENTICATION2-0001-027
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP                 -1    CTestHandler        sleep                  tkeystore_authentication2.ini   SEC-TKEYSTORE_AUTHENTICATION2-0001-030
-
-RUN_TEST_STEP                 -1    CTestHandler        checkserverheaperror
-
-END_TESTCASE                  SEC-TKEYSTORE_AUTHENTICATION2-0001
-
-
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/tkeystore_nouserregistered.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,134 +0,0 @@
-[SEC-TKEYSTORE_NOUSERREGISTERED-0001-002]
-<actionbody>
-	<mode>manager</mode>
-	<CheckKeyStoreLabel>1</CheckKeyStoreLabel>
-	<keystoreindex>4</keystoreindex>
-	<keystorelabel>Dummy KeyStore Manager1</keystorelabel>
-</actionbody>
-
-[SEC-TKEYSTORE_NOUSERREGISTERED-0001-004]
-<actionbody>
-	<mode>manager</mode>
-</actionbody>
-
-[SEC-TKEYSTORE_NOUSERREGISTERED-0001-005]
-<actionbody>
-	<mode>manager</mode>
-</actionbody>
-
-[SEC-TKEYSTORE_NOUSERREGISTERED-0001-006]
-<actionbody>
-	<keyusage>Derive</keyusage>
-	<keysize>512</keysize>
-	<keylabel>cheeku</keylabel>
-	<keyalgorithm>DH</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<keystore>1</keystore>
-	<authexpression>strong</authexpression>
-	<freshness>0</freshness>
-</actionbody>
-
-[SEC-TKEYSTORE_NOUSERREGISTERED-0001-007]
-<actionbody>
-	<keyalgorithm>DH</keyalgorithm>
-	<deletecount>0</deletecount>
-</actionbody>
-
-[SEC-TKEYSTORE_NOUSERREGISTERED-0001-008]
-<actionbody>
-	<keyusage>Derive</keyusage>
-	<keysize>512</keysize>
-	<keylabel>cheeku</keylabel>
-	<keyalgorithm>DH</keyalgorithm>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<keyaccesstype>Local</keyaccesstype>
-</actionbody>
-
-[SEC-TKEYSTORE_NOUSERREGISTERED-0001-009]
-<actionbody>
-	<authmode>set</authmode>
-	<keylabel>cheeku</keylabel>
-	<authexpression>medium</authexpression>
-	<freshness>21</freshness>
-</actionbody>
-
-[SEC-TKEYSTORE_NOUSERREGISTERED-0001-010]
-<actionbody>
-	<authmode>get</authmode>
-	<keylabel>cheeku</keylabel>
-	<expectedexpression>medium</expectedexpression>
-	<expectedfreshness>21</expectedfreshness>
-</actionbody>
-
-[SEC-TKEYSTORE_NOUSERREGISTERED-0001-011]
-<actionbody>
-	<listcount>2</listcount>
-	<foundkey>cheeku</foundkey>
-		<foundkey>cheeku</foundkey>
-</actionbody>
-
-[SEC-TKEYSTORE_NOUSERREGISTERED-0001-012]
-<actionbody>
-	<ImportData>pkcs8rsa.001</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm0</keylabel>
-	<keyaccesstype>Extractable</keyaccesstype>
-</actionbody>
-
-[SEC-TKEYSTORE_NOUSERREGISTERED-0001-013]
-<actionbody>
-	<ImportData>pkcs8rsa.001</ImportData>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm0</keylabel>
-	<keyaccesstype>Extractable</keyaccesstype>
-	<encrypted>1</encrypted>
-	<passphrase>importmykey</passphrase>
-	<disabledialogcheck>1</disabledialogcheck>
-</actionbody>
-
-[SEC-TKEYSTORE_NOUSERREGISTERED-0001-014]
-<actionbody>
-	<keylabel>cheeku</keylabel>
-	<policy>
-	<secureid>0x101FFFFF</secureid>
-	<capability>DRM</capability>
-	<capability>ReadUserData</capability>
-	</policy>
-	<authenticate>1</authenticate>
-</actionbody>
-
-[SEC-TKEYSTORE_NOUSERREGISTERED-0001-015]
-<actionbody>
-	<keylabel>cheeku</keylabel>
-	<policy>
-	<capability>DRM</capability>
-	<capability>ReadUserData</capability>
-	<capability>WriteUserData</capability>
-	</policy>
-	<authenticate>1</authenticate>
-</actionbody>
-
-[SEC-TKEYSTORE_NOUSERREGISTERED-0001-016]
-<actionbody>
-	<ExportFile>export_pkcs8rsa_0.001</ExportFile>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm0</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<encrypted>0</encrypted>
-</actionbody>
-
-[SEC-TKEYSTORE_NOUSERREGISTERED-0001-017]
-<actionbody>
-	<ExportFile>export_pkcs8rsa_0.001</ExportFile>
-	<keyusage>allusagesbutNR</keyusage>
-	<keylabel>gm0</keylabel>
-	<keyalgorithm>RSA</keyalgorithm>
-	<encrypted>1</encrypted>
-	<passphrase>exportmykey</passphrase>
-</actionbody>
-
-[SEC-TKEYSTORE_NOUSERREGISTERED-0001-020]
-<actionbody>
-	<seconds>5</seconds>
-</actionbody>
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/tkeystore_nouserregistered.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,112 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-START_TESTCASE                SEC-TKEYSTORE_NOUSERREGISTERED-0001
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_NOUSERREGISTERED-0001
-
-//! @SYMTestCaseDesc          
-
-//! @SYMTestActions           1) Delete keystore data file
-
-//!                           2) Retrieving label of a particular key store
-
-//!                           3) Closing key store
-
-//!                           4) 1.0.0.0.1,Opening key store 1 in manager mode
-
-//!                           5) 1.0.0.0.2,Opening key store 2 in manager mode
-
-//!                           6) 1.0.0.1.0,Add a key (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           7) Delete key (TEST ID: GT0140KEY004)
-
-//!                           8) 1.0.0.51.1, Get it again
-
-//!                           9) Set a new authentication policy for a key with which the user is not registered
-
-//!                           10) Gets authentication policy for a key
-
-//!                           11) 1.0.0.1.1,List all keys (TEST ID: INC103084-KEY001)
-
-//!                           12) 1.1.0 Import a RSA key
-
-//!                           13) 1.1.0 Import a RSA key
-
-//!                           14) 6.2.1, Set cheeku's use policy based on SID and capabilities
-
-//!                           15) 6.2.7.4, Set cheeku's management policy based on just capabilities
-
-//!                           16) 1.1.5 Export a RSA key
-
-//!                           17) 1.1.5 Export a RSA key
-
-//!                           18) 1.2.0.69.0 Closing key store 1
-
-//!                           19) 1.2.0.69.1 Closing key store 2
-
-//!                           20) 1.4.999.2, Sleep 5 seconds
-
-//!                           21) 1.4.999.3, Check for server heap error
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeystoredata  
-
-RUN_TEST_STEP !Error=-2       -1    CTestHandler        init                   tkeystore_nouserregistered.ini   SEC-TKEYSTORE_NOUSERREGISTERED-0001-002
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   tkeystore_nouserregistered.ini   SEC-TKEYSTORE_NOUSERREGISTERED-0001-004
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   tkeystore_nouserregistered.ini   SEC-TKEYSTORE_NOUSERREGISTERED-0001-005
-
-RUN_TEST_STEP !Error=-11012   -1    CTestHandler        addkey                 tkeystore_nouserregistered.ini   SEC-TKEYSTORE_NOUSERREGISTERED-0001-006
-
-RUN_TEST_STEP !Error=-11012   -1    CTestHandler        deletekeys             tkeystore_nouserregistered.ini   SEC-TKEYSTORE_NOUSERREGISTERED-0001-007
-
-RUN_TEST_STEP !Error=-11012   -1    CTestHandler        getkeyinfo             tkeystore_nouserregistered.ini   SEC-TKEYSTORE_NOUSERREGISTERED-0001-008
-
-RUN_TEST_STEP !Error=-11012   -1    CTestHandler        authenticationpolicy   tkeystore_nouserregistered.ini   SEC-TKEYSTORE_NOUSERREGISTERED-0001-009
-
-RUN_TEST_STEP !Error=-11012   -1    CTestHandler        authenticationpolicy   tkeystore_nouserregistered.ini   SEC-TKEYSTORE_NOUSERREGISTERED-0001-010
-
-RUN_TEST_STEP !Error=-11012   -1    CTestHandler        listallkeys            tkeystore_nouserregistered.ini   SEC-TKEYSTORE_NOUSERREGISTERED-0001-011
-
-RUN_TEST_STEP !Error=-11012   -1    CTestHandler        importkey              tkeystore_nouserregistered.ini   SEC-TKEYSTORE_NOUSERREGISTERED-0001-012
-
-RUN_TEST_STEP !Error=-11012   -1    CTestHandler        importkey              tkeystore_nouserregistered.ini   SEC-TKEYSTORE_NOUSERREGISTERED-0001-013
-
-RUN_TEST_STEP !Error=-11012   -1    CTestHandler        setusepolicy           tkeystore_nouserregistered.ini   SEC-TKEYSTORE_NOUSERREGISTERED-0001-014
-
-RUN_TEST_STEP !Error=-11012   -1    CTestHandler        setmanagementpolicy    tkeystore_nouserregistered.ini   SEC-TKEYSTORE_NOUSERREGISTERED-0001-015
-
-RUN_TEST_STEP !Error=-11012   -1    CTestHandler        exportkey              tkeystore_nouserregistered.ini   SEC-TKEYSTORE_NOUSERREGISTERED-0001-016
-
-RUN_TEST_STEP !Error=-11012   -1    CTestHandler        exportkey              tkeystore_nouserregistered.ini   SEC-TKEYSTORE_NOUSERREGISTERED-0001-017
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP                 -1    CTestHandler        sleep                  tkeystore_nouserregistered.ini   SEC-TKEYSTORE_NOUSERREGISTERED-0001-020
-
-RUN_TEST_STEP                 -1    CTestHandler        checkserverheaperror
-
-END_TESTCASE                  SEC-TKEYSTORE_NOUSERREGISTERED-0001
-
-
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/tkeystore_useauth.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,5958 +0,0 @@
-[SEC-TKEYSTORE_USEAUTH-0001-002]
-
-<actionbody>
-
-	<mode>manager</mode>
-
-	<CheckKeyStoreLabel>1</CheckKeyStoreLabel>
-
-	<keystoreindex>2</keystoreindex>
-
-	<keystorelabel>Dummy KeyStore Manager1</keystorelabel>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0001-004]
-
-<actionbody>
-
-	<mode>manager</mode>
-
-	<CheckKeyStoreLabel>1</CheckKeyStoreLabel>
-
-	<keystoreindex>4</keystoreindex>
-
-	<keystorelabel>Dummy KeyStore Manager1</keystorelabel>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0001-006]
-
-<actionbody>
-
-	<mode>manager</mode>
-
-	<CheckStoreCount>1</CheckStoreCount>
-
-	<KeyStoreCount>4</KeyStoreCount>
-
-	<KeyStoreManagerCount>3</KeyStoreManagerCount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0001-007]
-
-<actionbody>
-
-	<mode>manager</mode>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0001-008]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>cheeku</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keystore>0</keystore>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0001-009]
-
-<actionbody>
-
-	<foundkey>cheeku</foundkey>
-
-		<foundkey>cheeku</foundkey>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0001-010]
-
-<actionbody>
-
-	<ExportFile>export_DHkey.001</ExportFile>
-
-	<keyusage>Derive</keyusage>
-
-	<keylabel>cheeku</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<encrypted>0</encrypted>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0001-011]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>banana</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keystore>0</keystore>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0001-012]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<keystore>0</keystore>
-
-	<timeout>0</timeout>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0001-013]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>banana</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0001-014]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<open>RSA</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0001-015]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<open>Decrypt</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0001-016]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>cheeku</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keystore>0</keystore>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0001-017]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<text>Ook!</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0001-018]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0001-019]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of thirty-two chars</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0001-020]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<open>RSA</open>
-
-	<signdigest>1</signdigest>
-
-	<text>digested!</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0001-021]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<open>RSA</open>
-
-	<signdigest>2</signdigest>
-
-	<text>Had we but world enough, and time,
-
-This coyness, lady, were no crime.
-
-We would sit down and think which way
-
-To walk, and pass our long love's day;
-
-Thou by the Indian Ganges' side
-
-Shouldst rubies find; I by the tide
-
-Of Humber would complain. I would
-
-Love you ten years before the Flood;
-
-And you should, if you please, refuse
-
-Till the conversion of the Jews.
-
-My vegetable love should grow
-
-Vaster than empires, and more slow.
-
-An hundred years should go to praise
-
-Thine eyes, and on thy forehead gaze;
-
-Two hundred to adore each breast,
-
-But thirty thousand to the rest;
-
-An age at least to every part,
-
-And the last age should show your heart.
-
-For, lady, you deserve this state,
-
-Nor would I love at lower rate.
-
-
-
-        But at my back I always hear
-
-Time's winged chariot hurrying near;
-
-And yonder all before us lie
-
-Deserts of vast eternity.
-
-Thy beauty shall no more be found,
-
-Nor, in thy marble vault, shall sound
-
-My echoing song; then worms shall try
-
-That long preserv'd virginity,
-
-And your quaint honour turn to dust,
-
-And into ashes all my lust.
-
-The grave's a fine and private place,
-
-But none I think do there embrace.
-
-
-
-        Now therefore, while the youthful hue
-
-Sits on thy skin like morning dew,
-
-And while thy willing soul transpires
-
-At every pore with instant fires,
-
-Now let us sport us while we may;
-
-And now, like am'rous birds of prey,
-
-Rather at once our time devour,
-
-Than languish in his slow-chapp'd power.
-
-Let us roll all our strength, and all
-
-Our sweetness, up into one ball;
-
-And tear our pleasures with rough strife
-
-Thorough the iron gates of life.
-
-Thus, though we cannot make our sun
-
-Stand still, yet we will make him run</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0001-022]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<open>DSA</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0001-023]
-
-<actionbody>
-
-	<keylabel>banana</keylabel>
-
-	<open>DH</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0002-001]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>banana</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0003-001]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>mangosteen</keylabel>
-
-	<keyalgorithm>BAD</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0003-002]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>1024</keysize>
-
-	<keylabel>
-
-To be, or not to be: that is the question:
-
-Whether 'tis nobler in the mind to suffer
-
-The slings and arrows of outrageous fortune,
-
-Or to take arms against a sea of troubles,
-
-And by opposing end them? To die: to sleep;
-
-No more; and by a sleep to say we end
-
-The heart-ache and the thousand natural shocks
-
-That flesh is heir to, 'tis a consummation
-
-Devoutly to be wish'd. To die, to sleep;
-
-To sleep: perchance to dream: ay, there's the rub;
-
-For in that sleep of death what dreams may come
-
-When we have shuffled off this mortal coil,
-
-Must give us pause: there's the respect
-
-That makes calamity of so long life;
-
-For who would bear the whips and scorns of time,
-
-The oppressor's wrong, the proud man's contumely,
-
-The pangs of despised love, the law's delay,
-
-The insolence of office and the spurns
-
-That patient merit of the unworthy takes,
-
-When he himself might his quietus make
-
-With a bare bodkin? Who would fardels bear,
-
-To grunt and sweat under a weary life,
-
-But that the dread of something after death,
-
-The undiscover'd country from whose bourn
-
-No traveller returns, puzzles the will
-
-And makes us rather bear those ills we have
-
-Than fly to others that we know not of?
-
-Thus conscience does make cowards of us all;
-
-And thus the native hue of resolution
-
-Is sicklied o'er with the pale cast of thought,
-
-And enterprises of great pith and moment
-
-With this regard their currents turn awry,
-
-And lose the name of action.--Soft you now!
-
-The fair Ophelia! Nymph, in thy orisons
-
-Be all my sins remember'd. 
-
-	</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0003-003]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>1024</keysize>
-
-	<keylabel>
-
-To be, or not to be: that is the question:
-
-Whether 'tis nobler in the mind to suffer
-
-The slings and arrows of outrageous fortune,
-
-Or to take arms against a sea of troubles,
-
-And by opposing end them? To die: to sleep;
-
-No more; and by a sleep to say we end
-
-The heart-ache and the thousand natural shocks
-
-That flesh is heir to, 'tis a consummation
-
-Devoutly to be wish'd. To die, to sleep;
-
-To sleep: perchance to dream: ay, there's the rub;
-
-For in that sleep of death what dreams may come
-
-When we have shuffled off this mortal coil,
-
-Must give us pause: there's the respect
-
-That makes calamity of so long life;
-
-For who would bear the whips and scorns of time,
-
-The oppressor's wrong, the proud man's contumely,
-
-The pangs of despised love, the law's delay,
-
-The insolence of office and the spurns
-
-That patient merit of the unworthy takes,
-
-When he himself might his quietus make
-
-With a bare bodkin? Who would fardels bear,
-
-To grunt and sweat under a weary life,
-
-But that the dread of something after death,
-
-The undiscover'd country from whose bourn
-
-No traveller returns, puzzles the will
-
-And makes us rather bear those ills we have
-
-Than fly to others that we know not of?
-
-Thus conscience does make cowards of us all;
-
-And thus the native hue of resolution
-
-Is sicklied o'er with the pale cast of thought,
-
-And enterprises of great pith and moment
-
-With this regard their currents turn awry,
-
-And lose the name of action.--Soft you now!
-
-The fair Ophelia! Nymph, in thy orisons
-
-Be all my sins remember'd. 
-
-	</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0003-004]
-
-<actionbody>
-
-	<keylabel>
-
-To be, or not to be: that is the question:
-
-Whether 'tis nobler in the mind to suffer
-
-The slings and arrows of outrageous fortune,
-
-Or to take arms against a sea of troubles,
-
-And by opposing end them? To die: to sleep;
-
-No more; and by a sleep to say we end
-
-The heart-ache and the thousand natural shocks
-
-That flesh is heir to, 'tis a consummation
-
-Devoutly to be wish'd. To die, to sleep;
-
-To sleep: perchance to dream: ay, there's the rub;
-
-For in that sleep of death what dreams may come
-
-When we have shuffled off this mortal coil,
-
-Must give us pause: there's the respect
-
-That makes calamity of so long life;
-
-For who would bear the whips and scorns of time,
-
-The oppressor's wrong, the proud man's contumely,
-
-The pangs of despised love, the law's delay,
-
-The insolence of office and the spurns
-
-That patient merit of the unworthy takes,
-
-When he himself might his quietus make
-
-With a bare bodkin? Who would fardels bear,
-
-To grunt and sweat under a weary life,
-
-But that the dread of something after death,
-
-The undiscover'd country from whose bourn
-
-No traveller returns, puzzles the will
-
-And makes us rather bear those ills we have
-
-Than fly to others that we know not of?
-
-Thus conscience does make cowards of us all;
-
-And thus the native hue of resolution
-
-Is sicklied o'er with the pale cast of thought,
-
-And enterprises of great pith and moment
-
-With this regard their currents turn awry,
-
-And lose the name of action.--Soft you now!
-
-The fair Ophelia! Nymph, in thy orisons
-
-Be all my sins remember'd. 
-
-	</keylabel>
-
-	<open>RSA</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0003-005]
-
-<actionbody>
-
-	<keylabel>
-
-To be, or not to be: that is the question:
-
-Whether 'tis nobler in the mind to suffer
-
-The slings and arrows of outrageous fortune,
-
-Or to take arms against a sea of troubles,
-
-And by opposing end them? To die: to sleep;
-
-No more; and by a sleep to say we end
-
-The heart-ache and the thousand natural shocks
-
-That flesh is heir to, 'tis a consummation
-
-Devoutly to be wish'd. To die, to sleep;
-
-To sleep: perchance to dream: ay, there's the rub;
-
-For in that sleep of death what dreams may come
-
-When we have shuffled off this mortal coil,
-
-Must give us pause: there's the respect
-
-That makes calamity of so long life;
-
-For who would bear the whips and scorns of time,
-
-The oppressor's wrong, the proud man's contumely,
-
-The pangs of despised love, the law's delay,
-
-The insolence of office and the spurns
-
-That patient merit of the unworthy takes,
-
-When he himself might his quietus make
-
-With a bare bodkin? Who would fardels bear,
-
-To grunt and sweat under a weary life,
-
-But that the dread of something after death,
-
-The undiscover'd country from whose bourn
-
-No traveller returns, puzzles the will
-
-And makes us rather bear those ills we have
-
-Than fly to others that we know not of?
-
-Thus conscience does make cowards of us all;
-
-And thus the native hue of resolution
-
-Is sicklied o'er with the pale cast of thought,
-
-And enterprises of great pith and moment
-
-With this regard their currents turn awry,
-
-And lose the name of action.--Soft you now!
-
-The fair Ophelia! Nymph, in thy orisons
-
-Be all my sins remember'd. 
-
-	</keylabel>
-
-	<open>RSA</open>
-
-	<text>Ook!</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0003-006]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>beansprout</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Sensitive</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0003-007]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>beansprout</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Sensitive</keyaccesstype>
-
-	<keyaccesstype>AlwaysSensitive</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0003-008]
-
-<actionbody>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>carrot</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0003-009]
-
-<actionbody>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>carrot</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0003-010]
-
-<actionbody>
-
-	<keylabel>carrot</keylabel>
-
-	<open>DSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0003-011]
-
-<actionbody>
-
-	<keylabel>carrot</keylabel>
-
-	<open>DSA</open>
-
-	<text>This is a text of 21.</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0003-012]
-
-<actionbody>
-
-	<keylabel>carrot</keylabel>
-
-	<open>DSA</open>
-
-	<signdigest>1</signdigest>
-
-
-
-
-
-	<text>Had we but world enough, and time,
-
-This coyness, lady, were no crime.
-
-We would sit down and think which way
-
-To walk, and pass our long love's day;
-
-Thou by the Indian Ganges' side
-
-Shouldst rubies find; I by the tide
-
-Of Humber would complain. I would
-
-Love you ten years before the Flood;
-
-And you should, if you please, refuse
-
-Till the conversion of the Jews.
-
-My vegetable love should grow
-
-Vaster than empires, and more slow.
-
-An hundred years should go to praise
-
-Thine eyes, and on thy forehead gaze;
-
-Two hundred to adore each breast,
-
-But thirty thousand to the rest;
-
-An age at least to every part,
-
-And the last age should show your heart.
-
-For, lady, you deserve this state,
-
-Nor would I love at lower rate.
-
-
-
-        But at my back I always hear
-
-Time's winged chariot hurrying near;
-
-And yonder all before us lie
-
-Deserts of vast eternity.
-
-Thy beauty shall no more be found,
-
-Nor, in thy marble vault, shall sound
-
-My echoing song; then worms shall try
-
-That long preserv'd virginity,
-
-And your quaint honour turn to dust,
-
-And into ashes all my lust.
-
-The grave's a fine and private place,
-
-But none I think do there embrace.
-
-
-
-        Now therefore, while the youthful hue
-
-Sits on thy skin like morning dew,
-
-And while thy willing soul transpires
-
-At every pore with instant fires,
-
-Now let us sport us while we may;
-
-And now, like am'rous birds of prey,
-
-Rather at once our time devour,
-
-Than languish in his slow-chapp'd power.
-
-Let us roll all our strength, and all
-
-Our sweetness, up into one ball;
-
-And tear our pleasures with rough strife
-
-Thorough the iron gates of life.
-
-Thus, though we cannot make our sun
-
-Stand still, yet we will make him run</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0003-013]
-
-<actionbody>
-
-	<keylabel>carrot</keylabel>
-
-	<open>DSA</open>
-
-	<signdigest>2</signdigest>
-
-	<text>digest!</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0003-014]
-
-<actionbody>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keysize>1024</keysize>
-
-	<keylabel>artichoke</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0003-015]
-
-<actionbody>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keysize>1024</keysize>
-
-	<keylabel>artichoke</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0003-016]
-
-<actionbody>
-
-	<keylabel>artichoke</keylabel>
-
-	<open>DSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0003-017]
-
-<actionbody>
-
-	<keylabel>artichoke</keylabel>
-
-	<open>DSA</open>
-
-	<text>This is a text of 21.</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0003-018]
-
-<actionbody>
-
-	<keylabel>artichoke</keylabel>
-
-	<open>DSA</open>
-
-	<signdigest>1</signdigest>
-
-	<text>Had we but world enough, and time,
-
-This coyness, lady, were no crime.
-
-We would sit down and think which way
-
-To walk, and pass our long love's day;
-
-Thou by the Indian Ganges' side
-
-Shouldst rubies find; I by the tide
-
-Of Humber would complain. I would
-
-Love you ten years before the Flood;
-
-And you should, if you please, refuse
-
-Till the conversion of the Jews.
-
-My vegetable love should grow
-
-Vaster than empires, and more slow.
-
-An hundred years should go to praise
-
-Thine eyes, and on thy forehead gaze;
-
-Two hundred to adore each breast,
-
-But thirty thousand to the rest;
-
-An age at least to every part,
-
-And the last age should show your heart.
-
-For, lady, you deserve this state,
-
-Nor would I love at lower rate.
-
-
-
-        But at my back I always hear
-
-Time's winged chariot hurrying near;
-
-And yonder all before us lie
-
-Deserts of vast eternity.
-
-Thy beauty shall no more be found,
-
-Nor, in thy marble vault, shall sound
-
-My echoing song; then worms shall try
-
-That long preserv'd virginity,
-
-And your quaint honour turn to dust,
-
-And into ashes all my lust.
-
-The grave's a fine and private place,
-
-But none I think do there embrace.
-
-
-
-        Now therefore, while the youthful hue
-
-Sits on thy skin like morning dew,
-
-And while thy willing soul transpires
-
-At every pore with instant fires,
-
-Now let us sport us while we may;
-
-And now, like am'rous birds of prey,
-
-Rather at once our time devour,
-
-Than languish in his slow-chapp'd power.
-
-Let us roll all our strength, and all
-
-Our sweetness, up into one ball;
-
-And tear our pleasures with rough strife
-
-Thorough the iron gates of life.
-
-Thus, though we cannot make our sun
-
-Stand still, yet we will make him run</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0003-019]
-
-<actionbody>
-
-	<keylabel>artichoke</keylabel>
-
-	<open>DSA</open>
-
-	<signdigest>2</signdigest>
-
-
-
-
-
-	<text>TheDigest</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0003-020]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>mango</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0003-021]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>mango</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0003-022]
-
-<actionbody>
-
-	<keylabel>mango</keylabel>
-
-	<open>DH</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0003-023]
-
-<actionbody>
-
-	<keylabel>mango</keylabel>
-
-	<n>DA9A18547FF03B385CC16508C173A7EF4EB61CB40EF8FEF3B31F145051676166BCDC3FE6B799FC394D08C26385F9413F896E09117E46209D6923602683CEA100924A6EE695281775C619DAA94EA8CB3691B4275B0183F1D39639EBC92995FE645D6C1BC28D409E585549BBD2C5DCDD6C208B04EADD8B7A6D997F72CBAD88390F</n>
-
-	<g>02</g>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-001]
-
-<actionbody>
-
-	<keyusage>NR</keyusage>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>apple123</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-002]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>jackfruit</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-003]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>custard apple</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-004]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keyusage>NR</keyusage>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>grape</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-005]
-
-<actionbody>
-
-	<keyusage>NR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pomegranet</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-006]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>511</keysize>
-
-	<keylabel>veryshort</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-007]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>2049</keysize>
-
-	<keylabel>pear</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-008]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>2048</keysize>
-
-	<keylabel>guava</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-009]
-
-<actionbody>
-
-	<keylabel>guava</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-010]
-
-<actionbody>
-
-	<keylabel>guava</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of thirty-two chars</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-011]
-
-<actionbody>
-
-	<keylabel>guava</keylabel>
-
-	<open>RSA</open>
-
-	<signdigest>1</signdigest>
-
-	<text>predigested</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-012]
-
-<actionbody>
-
-	<keylabel>guava</keylabel>
-
-	<open>RSA</open>
-
-	<signdigest>2</signdigest>
-
-	<text>Had we but world enough, and time,
-
-This coyness, lady, were no crime.
-
-We would sit down and think which way
-
-To walk, and pass our long love's day;
-
-Thou by the Indian Ganges' side
-
-Shouldst rubies find; I by the tide
-
-Of Humber would complain. I would
-
-Love you ten years before the Flood;
-
-And you should, if you please, refuse
-
-Till the conversion of the Jews.
-
-My vegetable love should grow
-
-Vaster than empires, and more slow.
-
-An hundred years should go to praise
-
-Thine eyes, and on thy forehead gaze;
-
-Two hundred to adore each breast,
-
-But thirty thousand to the rest;
-
-An age at least to every part,
-
-And the last age should show your heart.
-
-For, lady, you deserve this state,
-
-Nor would I love at lower rate.
-
-
-
-        But at my back I always hear
-
-Time's winged chariot hurrying near;
-
-And yonder all before us lie
-
-Deserts of vast eternity.
-
-Thy beauty shall no more be found,
-
-Nor, in thy marble vault, shall sound
-
-My echoing song; then worms shall try
-
-That long preserv'd virginity,
-
-And your quaint honour turn to dust,
-
-And into ashes all my lust.
-
-The grave's a fine and private place,
-
-But none I think do there embrace.
-
-
-
-        Now therefore, while the youthful hue
-
-Sits on thy skin like morning dew,
-
-And while thy willing soul transpires
-
-At every pore with instant fires,
-
-Now let us sport us while we may;
-
-And now, like am'rous birds of prey,
-
-Rather at once our time devour,
-
-Than languish in his slow-chapp'd power.
-
-Let us roll all our strength, and all
-
-Our sweetness, up into one ball;
-
-And tear our pleasures with rough strife
-
-Thorough the iron gates of life.
-
-Thus, though we cannot make our sun
-
-Stand still, yet we will make him run</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-013]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>523</keysize>
-
-	<keylabel>kiwi</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-014]
-
-<actionbody>
-
-	<keylabel>kiwi</keylabel>
-
-	<open>Decrypt</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-015]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>523</keysize>
-
-	<keylabel>kiwi</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-016]
-
-<actionbody>
-
-	<foundkey>cheeku</foundkey>
-
-	<foundkey>banana</foundkey>
-
-	<foundkey>beansprout</foundkey>
-
-	<foundkey>carrot</foundkey>
-
-	<foundkey>mango</foundkey>
-
-	<foundkey>apple123</foundkey>
-
-	<foundkey>
-
-To be, or not to be: that is the question:
-
-Whether 'tis nobler in the mind to suffer
-
-The slings and arrows of outrageous fortune,
-
-Or to take arms against a sea of troubles,
-
-And by opposing end them? To die: to sleep;
-
-No more; and by a sleep to say we end
-
-The heart-ache and the thousand natural shocks
-
-That flesh is heir to, 'tis a consummation
-
-Devoutly to be wish'd. To die, to sleep;
-
-To sleep: perchance to dream: ay, there's the rub;
-
-For in that sleep of death what dreams may come
-
-When we have shuffled off this mortal coil,
-
-Must give us pause: there's the respect
-
-That makes calamity of so long life;
-
-For who would bear the whips and scorns of time,
-
-The oppressor's wrong, the proud man's contumely,
-
-The pangs of despised love, the law's delay,
-
-The insolence of office and the spurns
-
-That patient merit of the unworthy takes,
-
-When he himself might his quietus make
-
-With a bare bodkin? Who would fardels bear,
-
-To grunt and sweat under a weary life,
-
-But that the dread of something after death,
-
-The undiscover'd country from whose bourn
-
-No traveller returns, puzzles the will
-
-And makes us rather bear those ills we have
-
-Than fly to others that we know not of?
-
-Thus conscience does make cowards of us all;
-
-And thus the native hue of resolution
-
-Is sicklied o'er with the pale cast of thought,
-
-And enterprises of great pith and moment
-
-With this regard their currents turn awry,
-
-And lose the name of action.--Soft you now!
-
-The fair Ophelia! Nymph, in thy orisons
-
-Be all my sins remember'd. 
-
-	</foundkey>
-
-	<foundkey>artichoke</foundkey>
-
-	<foundkey>guava</foundkey>
-
-	<foundkey>kiwi</foundkey>
-
-   		<foundkey>jackfruit</foundkey>
-
-   		<foundkey>custard apple</foundkey>
-
-   		<foundkey>grape</foundkey>
-
-   		<foundkey>pomegranet</foundkey>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-017]
-
-<actionbody>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<foundkey>carrot</foundkey>
-
-	<foundkey>artichoke</foundkey>
-
-   		<foundkey>custard apple</foundkey>
-
-   		<foundkey>grape</foundkey>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-018]
-
-<actionbody>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<foundkey>banana</foundkey>
-
-	<foundkey>beansprout</foundkey>
-
-	<foundkey>carrot</foundkey>
-
-	<foundkey>artichoke</foundkey>
-
-	<foundkey>guava</foundkey>
-
-	<foundkey>apple123</foundkey>
-
-	<foundkey>kiwi</foundkey>
-
-   		<foundkey>jackfruit</foundkey>
-
-   		<foundkey>grape</foundkey>
-
-	<foundkey>
-
-To be, or not to be: that is the question:
-
-Whether 'tis nobler in the mind to suffer
-
-The slings and arrows of outrageous fortune,
-
-Or to take arms against a sea of troubles,
-
-And by opposing end them? To die: to sleep;
-
-No more; and by a sleep to say we end
-
-The heart-ache and the thousand natural shocks
-
-That flesh is heir to, 'tis a consummation
-
-Devoutly to be wish'd. To die, to sleep;
-
-To sleep: perchance to dream: ay, there's the rub;
-
-For in that sleep of death what dreams may come
-
-When we have shuffled off this mortal coil,
-
-Must give us pause: there's the respect
-
-That makes calamity of so long life;
-
-For who would bear the whips and scorns of time,
-
-The oppressor's wrong, the proud man's contumely,
-
-The pangs of despised love, the law's delay,
-
-The insolence of office and the spurns
-
-That patient merit of the unworthy takes,
-
-When he himself might his quietus make
-
-With a bare bodkin? Who would fardels bear,
-
-To grunt and sweat under a weary life,
-
-But that the dread of something after death,
-
-The undiscover'd country from whose bourn
-
-No traveller returns, puzzles the will
-
-And makes us rather bear those ills we have
-
-Than fly to others that we know not of?
-
-Thus conscience does make cowards of us all;
-
-And thus the native hue of resolution
-
-Is sicklied o'er with the pale cast of thought,
-
-And enterprises of great pith and moment
-
-With this regard their currents turn awry,
-
-And lose the name of action.--Soft you now!
-
-The fair Ophelia! Nymph, in thy orisons
-
-Be all my sins remember'd. 
-
-	</foundkey>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-019]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<foundkey>banana</foundkey>
-
-	<foundkey>beansprout</foundkey>
-
-	<foundkey>artichoke</foundkey>
-
-	<foundkey>guava</foundkey>
-
-	<foundkey>apple123</foundkey>
-
-	<foundkey>kiwi</foundkey>
-
-	<foundkey>
-
-To be, or not to be: that is the question:
-
-Whether 'tis nobler in the mind to suffer
-
-The slings and arrows of outrageous fortune,
-
-Or to take arms against a sea of troubles,
-
-And by opposing end them? To die: to sleep;
-
-No more; and by a sleep to say we end
-
-The heart-ache and the thousand natural shocks
-
-That flesh is heir to, 'tis a consummation
-
-Devoutly to be wish'd. To die, to sleep;
-
-To sleep: perchance to dream: ay, there's the rub;
-
-For in that sleep of death what dreams may come
-
-When we have shuffled off this mortal coil,
-
-Must give us pause: there's the respect
-
-That makes calamity of so long life;
-
-For who would bear the whips and scorns of time,
-
-The oppressor's wrong, the proud man's contumely,
-
-The pangs of despised love, the law's delay,
-
-The insolence of office and the spurns
-
-That patient merit of the unworthy takes,
-
-When he himself might his quietus make
-
-With a bare bodkin? Who would fardels bear,
-
-To grunt and sweat under a weary life,
-
-But that the dread of something after death,
-
-The undiscover'd country from whose bourn
-
-No traveller returns, puzzles the will
-
-And makes us rather bear those ills we have
-
-Than fly to others that we know not of?
-
-Thus conscience does make cowards of us all;
-
-And thus the native hue of resolution
-
-Is sicklied o'er with the pale cast of thought,
-
-And enterprises of great pith and moment
-
-With this regard their currents turn awry,
-
-And lose the name of action.--Soft you now!
-
-The fair Ophelia! Nymph, in thy orisons
-
-Be all my sins remember'd. 
-
-	</foundkey>
-
-   		<foundkey>jackfruit</foundkey>
-
-   		<foundkey>carrot</foundkey>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-020]
-
-<actionbody>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<deletecount>6</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-021]
-
-<actionbody>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-022]
-
-<actionbody>
-
-	<foundkey>cheeku</foundkey>
-
-	<foundkey>carrot</foundkey>
-
-	<foundkey>mango</foundkey>
-
-	<foundkey>artichoke</foundkey>
-
-   		<foundkey>jackfruit</foundkey>
-
-   		<foundkey>custard apple</foundkey>
-
-   		<foundkey>grape</foundkey>
-
-   		<foundkey>pomegranet</foundkey>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-023]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>banana</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-024]
-
-<actionbody>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-025]
-
-<actionbody>
-
-	<foundkey>carrot</foundkey>
-
-	<foundkey>cheeku</foundkey>
-
-	<foundkey>mango</foundkey>
-
-	<foundkey>banana</foundkey>
-
-	<foundkey>artichoke</foundkey>
-
-   		<foundkey>jackfruit</foundkey>
-
-   		<foundkey>custard apple</foundkey>
-
-   		<foundkey>grape</foundkey>
-
-   		<foundkey>pomegranet</foundkey>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-026]
-
-<actionbody>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-027]
-
-<actionbody>
-
-	<nonexistent>1</nonexistent>
-
-	<deletecount>0</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-028]
-
-<actionbody>
-
-	<nonexistent>1</nonexistent>
-
-	<deletecount>0</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-029]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>Cabbage</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-030]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>Cabbage</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-031]
-
-<actionbody>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>Courgette</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-032]
-
-<actionbody>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>Courgette</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-033]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>1024</keysize>
-
-	<keylabel>Cauliflower</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-034]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>1024</keysize>
-
-	<keylabel>Cauliflower</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-035]
-
-<actionbody>
-
-	<keylabel>Cauliflower</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-036]
-
-<actionbody>
-
-	<keylabel>Cauliflower</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of thirty-two chars</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-037]
-
-<actionbody>
-
-	<keylabel>Cauliflower</keylabel>
-
-	<open>RSA</open>
-
-	<signdigest>1</signdigest>
-
-	<text>hashed cauli</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-038]
-
-<actionbody>
-
-	<keylabel>Cauliflower</keylabel>
-
-	<open>RSA</open>
-
-	<signdigest>2</signdigest>
-
-	<text>Had we but world enough, and time,
-
-This coyness, lady, were no crime.
-
-We would sit down and think which way
-
-To walk, and pass our long love's day;
-
-Thou by the Indian Ganges' side
-
-Shouldst rubies find; I by the tide
-
-Of Humber would complain. I would
-
-Love you ten years before the Flood;
-
-And you should, if you please, refuse
-
-Till the conversion of the Jews.
-
-My vegetable love should grow
-
-Vaster than empires, and more slow.
-
-An hundred years should go to praise
-
-Thine eyes, and on thy forehead gaze;
-
-Two hundred to adore each breast,
-
-But thirty thousand to the rest;
-
-An age at least to every part,
-
-And the last age should show your heart.
-
-For, lady, you deserve this state,
-
-Nor would I love at lower rate.
-
-
-
-        But at my back I always hear
-
-Time's winged chariot hurrying near;
-
-And yonder all before us lie
-
-Deserts of vast eternity.
-
-Thy beauty shall no more be found,
-
-Nor, in thy marble vault, shall sound
-
-My echoing song; then worms shall try
-
-That long preserv'd virginity,
-
-And your quaint honour turn to dust,
-
-And into ashes all my lust.
-
-The grave's a fine and private place,
-
-But none I think do there embrace.
-
-
-
-        Now therefore, while the youthful hue
-
-Sits on thy skin like morning dew,
-
-And while thy willing soul transpires
-
-At every pore with instant fires,
-
-Now let us sport us while we may;
-
-And now, like am'rous birds of prey,
-
-Rather at once our time devour,
-
-Than languish in his slow-chapp'd power.
-
-Let us roll all our strength, and all
-
-Our sweetness, up into one ball;
-
-And tear our pleasures with rough strife
-
-Thorough the iron gates of life.
-
-Thus, though we cannot make our sun
-
-Stand still, yet we will make him run</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-039]
-
-<actionbody>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>Cashew</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-040]
-
-<actionbody>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>Cashew</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-041]
-
-<actionbody>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>cranberry</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-042]
-
-<actionbody>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>cranberry</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-043]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>curly kale</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-044]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>curly kale</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-045]
-
-<actionbody>
-
-	<foundkey>cheeku</foundkey>
-
-	<foundkey>carrot</foundkey>
-
-	<foundkey>mango</foundkey>
-
-	<foundkey>artichoke</foundkey>
-
-	<foundkey>Cabbage</foundkey>
-
-	<foundkey>Courgette</foundkey>
-
-	<foundkey>Cauliflower</foundkey>
-
-	<foundkey>Cashew</foundkey>
-
-	<foundkey>cranberry</foundkey>
-
-	<foundkey>curly kale</foundkey>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-046]
-
-<actionbody>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<foundkey>Cabbage</foundkey>
-
-	<foundkey>Cauliflower</foundkey>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-047]
-
-<actionbody>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<foundkey>carrot</foundkey>
-
-	<foundkey>Courgette</foundkey>
-
-	<foundkey>Cashew</foundkey>
-
-	<foundkey>cranberry</foundkey>
-
-	<foundkey>artichoke</foundkey>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-048]
-
-<actionbody>
-
-	<keylabel>carrot</keylabel>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-049]
-
-<actionbody>
-
-	<ImportData>pkcs8rsa.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>*IMPORTED*banana</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-050]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>*IMPORTED*banana</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-051]
-
-<actionbody>
-
-	<keylabel>*IMPORTED*banana</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-052]
-
-<actionbody>
-
-	<keylabel>*IMPORTED*banana</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of thirty-two chars</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-053]
-
-<actionbody>
-
-	<keylabel>*IMPORTED*banana</keylabel>
-
-	<open>RSA</open>
-
-	<signdigest>1</signdigest>
-
-	<text>digestible</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-054]
-
-<actionbody>
-
-	<keylabel>*IMPORTED*banana</keylabel>
-
-	<open>RSA</open>
-
-	<signdigest>2</signdigest>
-
-	<text>Had we but world enough, and time,
-
-This coyness, lady, were no crime.
-
-We would sit down and think which way
-
-To walk, and pass our long love's day;
-
-Thou by the Indian Ganges' side
-
-Shouldst rubies find; I by the tide
-
-Of Humber would complain. I would
-
-Love you ten years before the Flood;
-
-And you should, if you please, refuse
-
-Till the conversion of the Jews.
-
-My vegetable love should grow
-
-Vaster than empires, and more slow.
-
-An hundred years should go to praise
-
-Thine eyes, and on thy forehead gaze;
-
-Two hundred to adore each breast,
-
-But thirty thousand to the rest;
-
-An age at least to every part,
-
-And the last age should show your heart.
-
-For, lady, you deserve this state,
-
-Nor would I love at lower rate.
-
-
-
-        But at my back I always hear
-
-Time's winged chariot hurrying near;
-
-And yonder all before us lie
-
-Deserts of vast eternity.
-
-Thy beauty shall no more be found,
-
-Nor, in thy marble vault, shall sound
-
-My echoing song; then worms shall try
-
-That long preserv'd virginity,
-
-And your quaint honour turn to dust,
-
-And into ashes all my lust.
-
-The grave's a fine and private place,
-
-But none I think do there embrace.
-
-
-
-        Now therefore, while the youthful hue
-
-Sits on thy skin like morning dew,
-
-And while thy willing soul transpires
-
-At every pore with instant fires,
-
-Now let us sport us while we may;
-
-And now, like am'rous birds of prey,
-
-Rather at once our time devour,
-
-Than languish in his slow-chapp'd power.
-
-Let us roll all our strength, and all
-
-Our sweetness, up into one ball;
-
-And tear our pleasures with rough strife
-
-Thorough the iron gates of life.
-
-Thus, though we cannot make our sun
-
-Stand still, yet we will make him run</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-055]
-
-<actionbody>
-
-	<ImportData>pkcs8rsa1.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>*IMPORTED*strawberry</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-056]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>*IMPORTED*strawberry</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-057]
-
-<actionbody>
-
-	<ImportData>pkcs8rsa2.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>*IMPORTED*pumpkin</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-058]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>*IMPORTED*pumpkin</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-059]
-
-<actionbody>
-
-	<ImportData>pkcs8rsa3.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>*IMPORTED*coconut</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-060]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>1024</keysize>
-
-	<keylabel>*IMPORTED*coconut</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-061]
-
-<actionbody>
-
-	<keylabel>*IMPORTED*coconut</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-062]
-
-<actionbody>
-
-	<keylabel>*IMPORTED*coconut</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of thirty-two chars</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-063]
-
-<actionbody>
-
-	<keylabel>*IMPORTED*coconut</keylabel>
-
-	<open>RSA</open>
-
-	<signdigest>1</signdigest>
-
-	<text>coconuthash</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-064]
-
-<actionbody>
-
-	<keylabel>*IMPORTED*coconut</keylabel>
-
-	<open>RSA</open>
-
-	<signdigest>2</signdigest>
-
-	<text>Had we but world enough, and time,
-
-This coyness, lady, were no crime.
-
-We would sit down and think which way
-
-To walk, and pass our long love's day;
-
-Thou by the Indian Ganges' side
-
-Shouldst rubies find; I by the tide
-
-Of Humber would complain. I would
-
-Love you ten years before the Flood;
-
-And you should, if you please, refuse
-
-Till the conversion of the Jews.
-
-My vegetable love should grow
-
-Vaster than empires, and more slow.
-
-An hundred years should go to praise
-
-Thine eyes, and on thy forehead gaze;
-
-Two hundred to adore each breast,
-
-But thirty thousand to the rest;
-
-An age at least to every part,
-
-And the last age should show your heart.
-
-For, lady, you deserve this state,
-
-Nor would I love at lower rate.
-
-
-
-        But at my back I always hear
-
-Time's winged chariot hurrying near;
-
-And yonder all before us lie
-
-Deserts of vast eternity.
-
-Thy beauty shall no more be found,
-
-Nor, in thy marble vault, shall sound
-
-My echoing song; then worms shall try
-
-That long preserv'd virginity,
-
-And your quaint honour turn to dust,
-
-And into ashes all my lust.
-
-The grave's a fine and private place,
-
-But none I think do there embrace.
-
-
-
-        Now therefore, while the youthful hue
-
-Sits on thy skin like morning dew,
-
-And while thy willing soul transpires
-
-At every pore with instant fires,
-
-Now let us sport us while we may;
-
-And now, like am'rous birds of prey,
-
-Rather at once our time devour,
-
-Than languish in his slow-chapp'd power.
-
-Let us roll all our strength, and all
-
-Our sweetness, up into one ball;
-
-And tear our pleasures with rough strife
-
-Thorough the iron gates of life.
-
-Thus, though we cannot make our sun
-
-Stand still, yet we will make him run</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-065]
-
-<actionbody>
-
-	<ImportData>pkcs8rsa4.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>*IMPORTED*mango</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-066]
-
-<actionbody>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keysize>2048</keysize>
-
-	<keylabel>*IMPORTED*mango</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-067]
-
-<actionbody>
-
-	<keylabel>*IMPORTED*mango</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-068]
-
-<actionbody>
-
-	<keylabel>*IMPORTED*mango</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of thirty-two chars</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-069]
-
-<actionbody>
-
-	<keylabel>*IMPORTED*mango</keylabel>
-
-	<open>RSA</open>
-
-	<signdigest>1</signdigest>
-
-	<text>DigestedMango</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-070]
-
-<actionbody>
-
-	<keylabel>*IMPORTED*mango</keylabel>
-
-	<open>RSA</open>
-
-	<signdigest>2</signdigest>
-
-	<text>Had we but world enough, and time,
-
-This coyness, lady, were no crime.
-
-We would sit down and think which way
-
-To walk, and pass our long love's day;
-
-Thou by the Indian Ganges' side
-
-Shouldst rubies find; I by the tide
-
-Of Humber would complain. I would
-
-Love you ten years before the Flood;
-
-And you should, if you please, refuse
-
-Till the conversion of the Jews.
-
-My vegetable love should grow
-
-Vaster than empires, and more slow.
-
-An hundred years should go to praise
-
-Thine eyes, and on thy forehead gaze;
-
-Two hundred to adore each breast,
-
-But thirty thousand to the rest;
-
-An age at least to every part,
-
-And the last age should show your heart.
-
-For, lady, you deserve this state,
-
-Nor would I love at lower rate.
-
-
-
-        But at my back I always hear
-
-Time's winged chariot hurrying near;
-
-And yonder all before us lie
-
-Deserts of vast eternity.
-
-Thy beauty shall no more be found,
-
-Nor, in thy marble vault, shall sound
-
-My echoing song; then worms shall try
-
-That long preserv'd virginity,
-
-And your quaint honour turn to dust,
-
-And into ashes all my lust.
-
-The grave's a fine and private place,
-
-But none I think do there embrace.
-
-
-
-        Now therefore, while the youthful hue
-
-Sits on thy skin like morning dew,
-
-And while thy willing soul transpires
-
-At every pore with instant fires,
-
-Now let us sport us while we may;
-
-And now, like am'rous birds of prey,
-
-Rather at once our time devour,
-
-Than languish in his slow-chapp'd power.
-
-Let us roll all our strength, and all
-
-Our sweetness, up into one ball;
-
-And tear our pleasures with rough strife
-
-Thorough the iron gates of life.
-
-Thus, though we cannot make our sun
-
-Stand still, yet we will make him run</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-071]
-
-<actionbody>
-
-	<ImportData>pkcs8invalidrsa.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>*IMPORTED*badberry</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-072]
-
-<actionbody>
-
-	<ImportData>pkcs8dsa.001</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>*IMPORTED*DSA*raspberry</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-073]
-
-<actionbody>
-
-	<ImportData>pkcs8dsa1.001</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>*IMPORTED*DSA*strawberry</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-074]
-
-<actionbody>
-
-	<ImportData>pkcs8dsa2.001</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>*IMPORTED*DSA*gooseberry</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-075]
-
-<actionbody>
-
-	<ImportData>pkcs8dsa3.001</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>*IMPORTED*DSA*cranberry</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-076]
-
-<actionbody>
-
-	<ImportData>pkcs8dsa4.001</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>*IMPORTED*DSA*Stichbury</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-077]
-
-<actionbody>
-
-	<ImportData>pkcs8invaliddsa.001</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>*IMPORTED*DSA*blackberry</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-078]
-
-<actionbody>
-
-	<foundkey>cheeku</foundkey>
-
-	<foundkey>carrot</foundkey>
-
-	<foundkey>mango</foundkey>
-
-	<foundkey>artichoke</foundkey>
-
-	<foundkey>Cabbage</foundkey>
-
-	<foundkey>Courgette</foundkey>
-
-	<foundkey>Cauliflower</foundkey>
-
-	<foundkey>Cashew</foundkey>
-
-	<foundkey>cranberry</foundkey>
-
-	<foundkey>curly kale</foundkey>
-
-	<foundkey>*IMPORTED*banana</foundkey>
-
-	<foundkey>*IMPORTED*strawberry</foundkey>
-
-	<foundkey>*IMPORTED*pumpkin</foundkey>
-
-	<foundkey>*IMPORTED*coconut</foundkey>
-
-	<foundkey>*IMPORTED*mango</foundkey>
-
-	<foundkey>*IMPORTED*DSA*raspberry</foundkey>
-
-	<foundkey>*IMPORTED*DSA*strawberry</foundkey>
-
-	<foundkey>*IMPORTED*DSA*gooseberry</foundkey>
-
-	<foundkey>*IMPORTED*DSA*cranberry</foundkey>
-
-	<foundkey>*IMPORTED*DSA*Stichbury</foundkey>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-079]
-
-<actionbody>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<foundkey>Cabbage</foundkey>
-
-	<foundkey>Cauliflower</foundkey>
-
-	<foundkey>*IMPORTED*banana</foundkey>
-
-	<foundkey>*IMPORTED*strawberry</foundkey>
-
-	<foundkey>*IMPORTED*pumpkin</foundkey>
-
-	<foundkey>*IMPORTED*coconut</foundkey>
-
-	<foundkey>*IMPORTED*mango</foundkey>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-080]
-
-<actionbody>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<foundkey>carrot</foundkey>
-
-	<foundkey>Courgette</foundkey>
-
-	<foundkey>Cashew</foundkey>
-
-	<foundkey>cranberry</foundkey>
-
-	<foundkey>artichoke</foundkey>
-
-	<foundkey>*IMPORTED*DSA*raspberry</foundkey>
-
-	<foundkey>*IMPORTED*DSA*strawberry</foundkey>
-
-	<foundkey>*IMPORTED*DSA*gooseberry</foundkey>
-
-	<foundkey>*IMPORTED*DSA*cranberry</foundkey>
-
-	<foundkey>*IMPORTED*DSA*Stichbury</foundkey>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-081]
-
-<actionbody>
-
-	<keylabel>The fruit of the tree of life</keylabel>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-082]
-
-<actionbody>
-
-	<deletecount>24</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-083]
-
-<actionbody>
-
-	<ImportData>pkcs8rsa.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>*IMPORTED*banana</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-084]
-
-<actionbody>
-
-	<ImportData>pkcs8rsa1.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>*IMPORTED*strawberry</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-085]
-
-<actionbody>
-
-	<ImportData>pkcs8rsa2.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>*IMPORTED*pumpkin</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-086]
-
-<actionbody>
-
-	<ImportData>pkcs8rsa3.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>*IMPORTED*coconut</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-087]
-
-<actionbody>
-
-	<ImportData>pkcs8rsa4.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>*IMPORTED*mango</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-088]
-
-<actionbody>
-
-	<ImportData>pkcs8invalidrsa.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>*IMPORTED*badberry</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-089]
-
-<actionbody>
-
-	<ImportData>pkcs8dsa.001</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>*IMPORTED*DSA*raspberry</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-090]
-
-<actionbody>
-
-	<ImportData>pkcs8dsa1.001</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>*IMPORTED*DSA*strawberry</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-091]
-
-<actionbody>
-
-	<ImportData>pkcs8dsa2.001</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>*IMPORTED*DSA*gooseberry</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-092]
-
-<actionbody>
-
-	<ImportData>pkcs8dsa3.001</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>*IMPORTED*DSA*cranberry</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-093]
-
-<actionbody>
-
-	<ImportData>pkcs8dsa4.001</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>*IMPORTED*DSA*Stichbury</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-094]
-
-<actionbody>
-
-	<ImportData>pkcs8invaliddsa.001</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>*IMPORTED*DSA*blackberry</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-095]
-
-<actionbody>
-
-	<foundkey>*IMPORTED*banana</foundkey>
-
-	<foundkey>*IMPORTED*strawberry</foundkey>
-
-	<foundkey>*IMPORTED*pumpkin</foundkey>
-
-	<foundkey>*IMPORTED*coconut</foundkey>
-
-	<foundkey>*IMPORTED*mango</foundkey>
-
-	<foundkey>*IMPORTED*DSA*raspberry</foundkey>
-
-	<foundkey>*IMPORTED*DSA*strawberry</foundkey>
-
-	<foundkey>*IMPORTED*DSA*gooseberry</foundkey>
-
-	<foundkey>*IMPORTED*DSA*cranberry</foundkey>
-
-	<foundkey>*IMPORTED*DSA*Stichbury</foundkey>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-096]
-
-<actionbody>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<foundkey>*IMPORTED*banana</foundkey>
-
-	<foundkey>*IMPORTED*strawberry</foundkey>
-
-	<foundkey>*IMPORTED*pumpkin</foundkey>
-
-	<foundkey>*IMPORTED*coconut</foundkey>
-
-	<foundkey>*IMPORTED*mango</foundkey>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-097]
-
-<actionbody>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<foundkey>*IMPORTED*DSA*raspberry</foundkey>
-
-	<foundkey>*IMPORTED*DSA*strawberry</foundkey>
-
-	<foundkey>*IMPORTED*DSA*gooseberry</foundkey>
-
-	<foundkey>*IMPORTED*DSA*cranberry</foundkey>
-
-	<foundkey>*IMPORTED*DSA*Stichbury</foundkey>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-098]
-
-<actionbody>
-
-	<ImportData>encryptPK8rsaDER.txt</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>*IMPORTED* encrypted raddicio</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<passphrase>import clanger</passphrase>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-099]
-
-<actionbody>
-
-	<ImportData>encryptPK8rsaDER.txt</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>*IMPORTED* encrypted fig</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<passphrase>import pinkcloud</passphrase>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-100]
-
-<actionbody>
-
-	<ImportData>encryptPK8rsa1DER.txt</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>*IMPORTED* encrypted lollo rosso</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<passphrase>import clanger</passphrase>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-101]
-
-<actionbody>
-
-	<ImportData>encryptPK8rsa2DER.txt</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>*IMPORTED* encrypted rocket</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<passphrase>import clanger</passphrase>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-102]
-
-<actionbody>
-
-	<ImportData>encryptPK8rsa3DER.txt</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>*IMPORTED* encrypted iceberg lettuce</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<passphrase>import clanger</passphrase>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-103]
-
-<actionbody>
-
-	<ImportData>encryptPK8rsa4DER.txt</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>*IMPORTED* encrypted watercress</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<passphrase>import clanger</passphrase>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-104]
-
-<actionbody>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<foundkey>*IMPORTED*banana</foundkey>
-
-	<foundkey>*IMPORTED*strawberry</foundkey>
-
-	<foundkey>*IMPORTED*pumpkin</foundkey>
-
-	<foundkey>*IMPORTED*coconut</foundkey>
-
-	<foundkey>*IMPORTED*mango</foundkey>
-
-	<foundkey>*IMPORTED* encrypted raddicio</foundkey>
-
-	<foundkey>*IMPORTED* encrypted lollo rosso</foundkey>
-
-	<foundkey>*IMPORTED* encrypted rocket</foundkey>
-
-	<foundkey>*IMPORTED* encrypted iceberg lettuce</foundkey>
-
-	<foundkey>*IMPORTED* encrypted watercress</foundkey>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-105]
-
-<actionbody>
-
-	<ImportData>encryptPK8dsaDER.txt</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>*IMPORTED* encrypted physalis</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<passphrase>import clanger</passphrase>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-106]
-
-<actionbody>
-
-	<ImportData>encryptPK8dsa1DER.txt</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>*IMPORTED* encrypted papaya</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<passphrase>import clanger</passphrase>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-107]
-
-<actionbody>
-
-	<ImportData>encryptPK8dsa2DER.txt</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>*IMPORTED* encrypted pomegranate</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<passphrase>import clanger</passphrase>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-108]
-
-<actionbody>
-
-	<ImportData>encryptPK8dsa3DER.txt</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>*IMPORTED* encrypted pear</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<passphrase>import clanger</passphrase>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-109]
-
-<actionbody>
-
-	<ImportData>encryptPK8dsa4DER.txt</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>*IMPORTED* encrypted purple plum</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<passphrase>import clanger</passphrase>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-110]
-
-<actionbody>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<foundkey>*IMPORTED*DSA*raspberry</foundkey>
-
-	<foundkey>*IMPORTED*DSA*strawberry</foundkey>
-
-	<foundkey>*IMPORTED*DSA*gooseberry</foundkey>
-
-	<foundkey>*IMPORTED*DSA*cranberry</foundkey>
-
-	<foundkey>*IMPORTED*DSA*Stichbury</foundkey>
-
-	<foundkey>*IMPORTED* encrypted physalis</foundkey>
-
-	<foundkey>*IMPORTED* encrypted papaya</foundkey>
-
-	<foundkey>*IMPORTED* encrypted pomegranate</foundkey>
-
-	<foundkey>*IMPORTED* encrypted pear</foundkey>
-
-	<foundkey>*IMPORTED* encrypted purple plum</foundkey>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-111]
-
-<actionbody>
-
-	<ImportData>testvector1.bin</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>*IMPORTED* encrypted evil one</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<passphrase>import clanger</passphrase>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-112]
-
-<actionbody>
-
-	<ImportData>binarygarbage.bin</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>*IMPORTED* encrypted evil one</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-113]
-
-<actionbody>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<foundkey>*IMPORTED*banana</foundkey>
-
-	<foundkey>*IMPORTED*strawberry</foundkey>
-
-	<foundkey>*IMPORTED*pumpkin</foundkey>
-
-	<foundkey>*IMPORTED*coconut</foundkey>
-
-	<foundkey>*IMPORTED*mango</foundkey>
-
-	<foundkey>*IMPORTED* encrypted raddicio</foundkey>
-
-	<foundkey>*IMPORTED* encrypted lollo rosso</foundkey>
-
-	<foundkey>*IMPORTED* encrypted rocket</foundkey>
-
-	<foundkey>*IMPORTED* encrypted iceberg lettuce</foundkey>
-
-	<foundkey>*IMPORTED* encrypted watercress</foundkey>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-114]
-
-<actionbody>
-
-	<deletecount>20</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-115]
-
-<actionbody>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0004-118]
-
-<actionbody>
-
-	<mode>user</mode>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0005-001]
-
-<actionbody>
-
-	<mode>user</mode>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0005-002]
-
-<actionbody>
-
-	<mode>manager</mode>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0006-001]
-
-<actionbody>
-
-	<mode>manager</mode>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0006-002]
-
-<actionbody>
-
-	<mode>user</mode>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0007-001]
-
-<actionbody>
-
-	<mode>manager</mode>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0008-001]
-
-<actionbody>
-
-	<keyusage>none</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0008-002]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<timeout>0</timeout>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0008-003]
-
-<actionbody>
-
-	<keyusage>none</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-	<native>1</native>
-
-	<startdate>unset</startdate>
-
-	<enddate>unset</enddate>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0008-004]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0008-005]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>Decrypt</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0008-006]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>DH</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0008-007]
-
-<actionbody>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0009-001]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0009-002]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-	<native>1</native>
-
-	<startdate>unset</startdate>
-
-	<enddate>unset</enddate>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0009-003]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0009-004]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>Decrypt</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0009-005]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>DH</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0009-006]
-
-<actionbody>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0010-001]
-
-<actionbody>
-
-	<keyusage>SignRecover</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0010-002]
-
-<actionbody>
-
-	<keyusage>SignRecover</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-	<native>1</native>
-
-	<startdate>unset</startdate>
-
-	<enddate>unset</enddate>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0010-003]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0010-004]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>Decrypt</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0010-005]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>DH</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0010-006]
-
-<actionbody>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0011-001]
-
-<actionbody>
-
-	<keyusage>Decrypt</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0011-002]
-
-<actionbody>
-
-	<keyusage>Decrypt</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-	<native>1</native>
-
-	<startdate>unset</startdate>
-
-	<enddate>unset</enddate>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0011-003]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0011-004]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>Decrypt</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0011-005]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>DH</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0011-006]
-
-<actionbody>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0012-001]
-
-<actionbody>
-
-	<keyusage>Unwrap</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0012-002]
-
-<actionbody>
-
-	<keyusage>Unwrap</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-	<native>1</native>
-
-	<startdate>unset</startdate>
-
-	<enddate>unset</enddate>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0012-003]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0012-004]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>Decrypt</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0012-005]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>DH</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0012-006]
-
-<actionbody>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0013-001]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0013-002]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-	<native>1</native>
-
-	<startdate>unset</startdate>
-
-	<enddate>unset</enddate>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0013-003]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>DSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0013-004]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>Decrypt</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0013-005]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>DH</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0013-006]
-
-<actionbody>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0014-001]
-
-<actionbody>
-
-	<keyusage>SignRecover</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0014-002]
-
-<actionbody>
-
-	<keyusage>SignRecover</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-	<native>1</native>
-
-	<startdate>unset</startdate>
-
-	<enddate>unset</enddate>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0014-003]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>DSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0014-004]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>Decrypt</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0014-005]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>DH</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0014-006]
-
-<actionbody>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0015-001]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0015-002]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-	<native>1</native>
-
-	<startdate>unset</startdate>
-
-	<enddate>unset</enddate>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0015-003]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0015-004]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>Decrypt</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0015-005]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>DH</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0015-006]
-
-<actionbody>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0016-001]
-
-<actionbody>
-
-	<keyusage>NR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0016-002]
-
-<actionbody>
-
-	<keyusage>NR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-	<native>1</native>
-
-	<startdate>unset</startdate>
-
-	<enddate>unset</enddate>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0016-003]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0016-004]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>Decrypt</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0016-005]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>DH</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0016-006]
-
-<actionbody>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0017-001]
-
-<actionbody>
-
-	<keyusage>NR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0017-002]
-
-<actionbody>
-
-	<keyusage>NR</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>DSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-	<native>1</native>
-
-	<startdate>unset</startdate>
-
-	<enddate>unset</enddate>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0017-003]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0017-004]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>Decrypt</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0017-005]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>DH</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0017-006]
-
-<actionbody>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0018-001]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0018-002]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-	<keyaccesstype>NeverExtractable</keyaccesstype>
-
-	<native>1</native>
-
-	<startdate>unset</startdate>
-
-	<enddate>unset</enddate>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0018-003]
-
-<actionbody>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0019-001]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Sensitive</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0019-002]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-	<keyaccesstype>NeverExtractable</keyaccesstype>
-
-	<keyaccesstype>Sensitive</keyaccesstype>
-
-	<keyaccesstype>AlwaysSensitive</keyaccesstype>
-
-	<native>1</native>
-
-	<startdate>unset</startdate>
-
-	<enddate>unset</enddate>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0019-003]
-
-<actionbody>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0020-001]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0020-002]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<native>1</native>
-
-	<startdate>unset</startdate>
-
-	<enddate>unset</enddate>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0020-003]
-
-<actionbody>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0021-001]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Sensitive</keyaccesstype>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0021-002]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-	<keyaccesstype>Sensitive</keyaccesstype>
-
-	<keyaccesstype>AlwaysSensitive</keyaccesstype>
-
-	<native>1</native>
-
-	<startdate>unset</startdate>
-
-	<enddate>unset</enddate>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0021-003]
-
-<actionbody>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0022-001]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>AlwaysSensitive</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0022-002]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>NeverExtractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0022-003]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<keyaccesstype>Local</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0023-001]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0023-002]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<native>1</native>
-
-	<startdate>unset</startdate>
-
-	<enddate>unset</enddate>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0023-003]
-
-<actionbody>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0024-001]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-
-
-	<startdate>10/08/1977 12:43:59</startdate>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0024-002]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<native>1</native>
-
-	<startdate>10/08/1977 12:43:59</startdate>
-
-	<enddate>unset</enddate>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0024-003]
-
-<actionbody>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0025-001]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-
-
-	<enddate>27/09/2079 23:23:23</enddate>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0025-002]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<native>1</native>
-
-	<enddate>27/09/2079 23:23:23</enddate>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0025-003]
-
-<actionbody>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0026-001]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-
-
-	<startdate>10/08/1977 12:43:59</startdate>
-
-	<enddate>27/09/2079 23:23:23</enddate>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0026-002]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<native>1</native>
-
-	<startdate>10/08/1977 12:43:59</startdate>
-
-	<enddate>27/09/2079 23:23:23</enddate>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0026-003]
-
-<actionbody>
-
-	<deletecount>1</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0027-001]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<startdate>27/09/2079 23:23:23</startdate>
-
-	<enddate>10/08/1977 12:43:59</enddate>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0028-001]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-	<startdate>27/09/1879 23:23:23</startdate>
-
-	<enddate>10/08/1977 12:43:59</enddate>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0029-001]
-
-<actionbody>
-
-	<hometime>01/01/2000 00:00:00</hometime>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0029-002]
-
-<actionbody>
-
-	<keyusage>Sign</keyusage>
-
-	<keyusage>Decrypt</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>pineapple</keylabel>
-
-	<keyalgorithm>RSA</keyalgorithm>
-
-
-
-	<enddate>01/01/2001 00:00:00</enddate>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0029-003]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<timeout>0</timeout>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0029-004]
-
-<actionbody>
-
-	<keyusage>Derive</keyusage>
-
-	<keysize>512</keysize>
-
-	<keylabel>mango</keylabel>
-
-	<keyalgorithm>DH</keyalgorithm>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-
-
-	<enddate>01/01/2001 00:00:00</enddate>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0029-005]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0029-006]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<text>Ook!</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0029-007]
-
-<actionbody>
-
-	<keylabel>mango</keylabel>
-
-	<open>DH</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0029-008]
-
-<actionbody>
-
-	<hometime>01/01/2003 00:00:00</hometime>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0029-009]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0029-010]
-
-<actionbody>
-
-	<keylabel>pineapple</keylabel>
-
-	<text>Ook!</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0029-011]
-
-<actionbody>
-
-	<keylabel>mango</keylabel>
-
-	<open>DH</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0029-012]
-
-<actionbody>
-
-	<deletecount>2</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0029-013]
-
-<actionbody>
-
-	<ImportData>pkcs8rsa4.001</ImportData>
-
-	<keyusage>allusagesbutNR</keyusage>
-
-	<keylabel>BIGRSA</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0029-014]
-
-<actionbody>
-
-	<keylabel>BIGRSA</keylabel>
-
-	<timeout>0</timeout>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0029-015]
-
-<actionbody>
-
-	<keylabel>BIGRSA</keylabel>
-
-	<open>Decrypt</open>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0029-016]
-
-<actionbody>
-
-	<keylabel>BIGRSA</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0029-017]
-
-<actionbody>
-
-	<keylabel>BIGRSA</keylabel>
-
-	<open>RSA</open>
-
-	<text>This is text of thirty-two chars</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0029-018]
-
-<actionbody>
-
-	<keylabel>BIGRSA</keylabel>
-
-	<open>RSA</open>
-
-	<signdigest>1</signdigest>
-
-	<text>digested!</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0029-019]
-
-<actionbody>
-
-	<ImportData>pkcs8dsa4.001</ImportData>
-
-	<keyusage>DSAUsage</keyusage>
-
-	<keylabel>BIGDSA</keylabel>
-
-	<keyaccesstype>Extractable</keyaccesstype>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0029-020]
-
-<actionbody>
-
-	<keylabel>BIGDSA</keylabel>
-
-	<open>DSA</open>
-
-	<text>This is text of 20 .</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0029-021]
-
-<actionbody>
-
-	<keylabel>BIGDSA</keylabel>
-
-	<open>DSA</open>
-
-	<text>This is a text of 21.</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0029-022]
-
-<actionbody>
-
-	<keylabel>BIGDSA</keylabel>
-
-	<open>DSA</open>
-
-	<signdigest>1</signdigest>
-
-
-
-	<text>Had we but world enough, and time,
-
-This coyness, lady, were no crime.
-
-We would sit down and think which way
-
-To walk, and pass our long love's day;
-
-Thou by the Indian Ganges' side
-
-Shouldst rubies find; I by the tide
-
-Of Humber would complain. I would
-
-Love you ten years before the Flood;
-
-And you should, if you please, refuse
-
-Till the conversion of the Jews.
-
-My vegetable love should grow
-
-Vaster than empires, and more slow.
-
-An hundred years should go to praise
-
-Thine eyes, and on thy forehead gaze;
-
-Two hundred to adore each breast,
-
-But thirty thousand to the rest;
-
-An age at least to every part,
-
-And the last age should show your heart.
-
-For, lady, you deserve this state,
-
-Nor would I love at lower rate.
-
-
-
-        But at my back I always hear
-
-Time's winged chariot hurrying near;
-
-And yonder all before us lie
-
-Deserts of vast eternity.
-
-Thy beauty shall no more be found,
-
-Nor, in thy marble vault, shall sound
-
-My echoing song; then worms shall try
-
-That long preserv'd virginity,
-
-And your quaint honour turn to dust,
-
-And into ashes all my lust.
-
-The grave's a fine and private place,
-
-But none I think do there embrace.
-
-
-
-        Now therefore, while the youthful hue
-
-Sits on thy skin like morning dew,
-
-And while thy willing soul transpires
-
-At every pore with instant fires,
-
-Now let us sport us while we may;
-
-And now, like am'rous birds of prey,
-
-Rather at once our time devour,
-
-Than languish in his slow-chapp'd power.
-
-Let us roll all our strength, and all
-
-Our sweetness, up into one ball;
-
-And tear our pleasures with rough strife
-
-Thorough the iron gates of life.
-
-Thus, though we cannot make our sun
-
-Stand still, yet we will make him run</text>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0029-023]
-
-<actionbody>
-
-	<deletecount>2</deletecount>
-
-</actionbody>
-
-
-
-[SEC-TKEYSTORE_USEAUTH-0029-025]
-
-<actionbody>
-
-	<seconds>5</seconds>
-
-</actionbody>
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/scripts/tkeystore_useauth.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,1558 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0001
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0001
-
-//! @SYMTestCaseDesc          //////////////////////////////////////////////////////////////////////////////////
-
-//!                           Adding a key
-
-//!                           //////////////////////////////////////////////////////////////////////////////////
-
-//!                           The action name now bears, when relevant, the TEST ID which will help map the
-
-//!                           resulting log to the DLRs, a mapping of these (TEST IDs to REQ number) can be found in
-
-//!                           "V:\Dev\GT\GT 0140 Security\Test and Integration\Test Specifications\DLR mappings\keystore.xls"
-
-//! @SYMTestActions           1) Delete keystore data file
-
-//!                           2) Retrieving label of a particular key store
-
-//!                           3) Closing key store
-
-//!                           4) Retrieving label of a particular key store
-
-//!                           5) Closing key store
-
-//!                           6) 1.0.0.0.1,Opening key store 1 in manager mode - deprecated
-
-//!                           7) 1.0.0.0.2,Opening key store 2 in manager mode
-
-//!                           8) 1.0.0.1.0,Add a key (TEST ID: SEC-FileTokens-PREQ218-0001)
-
-//!                           9) 1.0.0.1.1,List all keys (TEST ID: SEC-FileTokens-PREQ218-0002)
-
-//!                           10) 1.0.0.1.0.0,export a DH key
-
-//!                           11) 1.0.0.1,Add a key (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           12) 1.0.0.1.1,Set passphrase timeout to "don't cache"
-
-//!                           13) 1.0.0.2,Get it again
-
-//!                           14) 1.0.0.2.1,Open it
-
-//!                           15) 1.0.0.2.2,Open a banana for decrypt
-
-//!                           16) Changing password - First two wrong tries, third correct passphrase
-
-//!                           17) Decrypt
-
-//!                           18) 1.0.0.2.2.1, Sign with a banana, 20 char text
-
-//!                           19) 1.0.0.2.2.2, Sign with a banana, 32 char text
-
-//!                           20) 1.0.0.2.2.2.1, Sign digest with a banana
-
-//!                           21) 1.0.0.2.2.3, Sign digest with a banana, text too large
-
-//!                           22) 1.0.0.2.3,Open a banana as a DSA key
-
-//!                           23) 1.0.0.2.4,Open a banana as a DH key
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeystoredata  
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0001-002
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP !Error=-2       -1    CTestHandler        init                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0001-004
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0001-007
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0001-008
-
-RUN_TEST_STEP                 -1    CTestHandler        listallkeys            tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0001-009
-
-RUN_TEST_STEP !Error=-5       -1    CTestHandler        exportkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0001-010
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0001-011
-
-RUN_TEST_STEP !Error=-5       -1    CTestHandler        settimeout             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0001-012
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0001-013
-
-RUN_TEST_STEP                 -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0001-014
-
-RUN_TEST_STEP                 -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0001-015
-
-RUN_TEST_STEP !Error=-1       -1    CTestHandler        changepassphrase       tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0001-016
-
-RUN_TEST_STEP                 -1    CTestHandler        decrypt                tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0001-017
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0001-018
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0001-019
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0001-020
-
-RUN_TEST_STEP !Error=-9       -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0001-021
-
-RUN_TEST_STEP !Error=-11006   -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0001-022
-
-RUN_TEST_STEP !Error=-11006   -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0001-023
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0001
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0002
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0002
-
-//! @SYMTestCaseDesc          Try to add a key that is already there - should fail with KErrAlreadyExists
-
-//! @SYMTestActions           1) 1.0.0.3,Add a key (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-RUN_TEST_STEP !Error=-11      -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0002-001
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0002
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0003
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0003
-
-//! @SYMTestCaseDesc          Add a key with an unsupported algorithm
-
-//! @SYMTestActions           1) 1.0.0.4,Add a key with an unsupported algorithm (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           2) 1.0.0.5,Add a key with a very long label (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           3) 1.0.0.6,Get that key again
-
-//!                           4) 1.0.0.6.1,Open that key again
-
-//!                           5) 1.0.0.6.2 Sign long key
-
-//!                           6) 1.0.0.7,Add a key (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           7) 1.0.0.8,Check getting it again
-
-//!                           8) 1.0.0.9,Add a key (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           9) 1.0.0.10,Get it again
-
-//!                           10) 1.0.0.10.1, Sign with a carrot, 20 char text
-
-//!                           11) 1.0.0.10.2, Sign with carrot, text too long (21 chars)
-
-//!                           12) 1.0.0.10.2, Sign digest with carrot
-
-//!                           13) 1.0.0.10.3, Sign digest with a carrot, fail hash
-
-//!                           14) 1.0.0.10.4,Add a key
-
-//!                           15) 1.0.0.10.5,Get it again
-
-//!                           16) 1.0.0.10.6, Sign with a artichoke, 20 char text
-
-//!                           17) 1.0.0.10.7, Sign with artichoke, text too long (21 chars)
-
-//!                           18) 1.0.0.10.7, Sign digest with artichoke
-
-//!                           19) 1.0.0.10.8, Sign digest with artichoke, fail hash
-
-//!                           20) 1.0.0.11,Add a key (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           21) 1.0.0.12,Get key info
-
-//!                           22) 1.0.0.12.1,Open it
-
-//!                           23) 1.0.0.12.2, Test derive
-
-RUN_TEST_STEP !Error=-11006   -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0003-001
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0003-002
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0003-003
-
-RUN_TEST_STEP                 -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0003-004
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0003-005
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0003-006
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0003-007
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0003-008
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0003-009
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0003-010
-
-RUN_TEST_STEP !Error=-9       -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0003-011
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0003-012
-
-RUN_TEST_STEP !Error=-2       -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0003-013
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0003-014
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0003-015
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0003-016
-
-RUN_TEST_STEP !Error=-9       -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0003-017
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0003-018
-
-RUN_TEST_STEP !Error=-2       -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0003-019
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0003-020
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0003-021
-
-RUN_TEST_STEP                 -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0003-022
-
-RUN_TEST_STEP                 -1    CTestHandler        derive                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0003-023
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0003
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0004
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0004
-
-//! @SYMTestCaseDesc          test added for combined NR and Sign usage
-
-//! @SYMTestActions           1) 1.0.0.12.0.0,Add a key with legal usage
-
-//!                           2) 1.0.0.13,Add a key with illegal usage (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           3) 1.0.0.14,Add a key with illegal usage (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           4) 1.0.0.15,Add a key with illegal usage (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           5) 1.0.0.16,Add a key with illegal usage (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           6) 1.0.0.17,Add a key with an unacceptably short length (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           7) 1.0.0.18,Add a key with an unacceptably long length (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           8) 1.0.0.19,Add a long key (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           9) 1.0.0.19.1, Sign with a guava, 20 char text
-
-//!                           10) 1.0.0.19.2, Sign with a guava, 32 char text
-
-//!                           11) 1.0.0.19.2, Sign digest with a guava
-
-//!                           12) 1.0.0.2.2.3, Sign digest with a guava, text too large
-
-//!                           13) 1.0.0.20,Add a strangely-lengthed key (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           14) 1.0.0.21.1,Open it
-
-//!                           15) 1.0.0.21,Get key info
-
-//!                           16) 1.0.0.22 List everything (TEST ID: GT0140-KEY001) (including illegal usage keys)
-
-//!                           17) 1.0.0.23 List DSA keys (TEST ID: GT0140-KEY001) (including illegal usage keys)
-
-//!                           18) 1.0.0.24 List Sign-usage keys (TEST ID: GT0140-KEY001) (including illegal usage keys)
-
-//!                           19) 1.0.0.25 List 'All usages' keys (TEST ID: GT0140-KEY001) (including illegal usage keys)
-
-//!                           20) 1.0.0.26, Delete RSA keys (TEST ID: GT0140KEY004)
-
-//!                           21) 1.0.0.27 List RSA keys (TEST ID: GT0140-KEY001)
-
-//!                           22) 1.0.0.28 List everything (TEST ID: GT0140-KEY001) (including illegal usage keys)
-
-//!                           23) 1.0.0.29, Add a key that was previously deleted (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           24) 1.0.0.30 List RSA keys (TEST ID: GT0140-KEY001)
-
-//!                           25) 1.0.0.31 List everything (TEST ID: GT0140-KEY001) (including illegal usage keys)
-
-//!                           26) 1.0.0.32, Delete it again (TEST ID: GT0140KEY004)
-
-//!                           27) 1.0.0.33, Try to delete a non existent key (TEST ID: GT0140KEY004)
-
-//!                           28) 1.0.0.34, Try to delete a non existent key (TEST ID: GT0140KEY004)
-
-//!                           29) 1.0.0.35, Add a key (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           30) 1.0.0.36, Get key info
-
-//!                           31) 1.0.0.37, Add a key (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           32) 1.0.0.38, Get the key
-
-//!                           33) 1.0.0.39, Add a key (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           34) 1.0.0.40, Get key info
-
-//!                           35) 1.0.0.40.1, Sign with a cauliflower, 20 char text
-
-//!                           36) 1.0.0.40.2, Sign with a cauliflower, 32 char text
-
-//!                           37) 1.0.0.40.2, Sign digest with a cauliflower
-
-//!                           38) 1.0.0.40.3, Sign digest with a cauliflower, text too large
-
-//!                           39) 1.0.0.41, Add a key (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           40) 1.0.0.42, Get key info
-
-//!                           41) 1.0.0.43, Add a key (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           42) 1.0.0.44, Get it
-
-//!                           43) 1.0.0.45, Add a key (TEST ID: GT0140-KEY002 and GT0140-KEY003)
-
-//!                           44) 1.0.0.46, Get key info
-
-//!                           45) 1.0.0.47 List everything (TEST ID: GT0140-KEY001) (including illegal usage keys)
-
-//!                           46) 1.0.0.48 List RSA keys (TEST ID: GT0140-KEY001)
-
-//!                           47) 1.0.0.49 List DSA keys (TEST ID: GT0140-KEY001) (including illegal usage keys)
-
-//!                           48) 1.0.0.50, Get a carrot
-
-//!                           49) 1.0.0.51 Import a RSA key (TEST ID: SEC-FileTokens-PREQ218-0003)
-
-//!                           50) 1.0.0.51.1, Get it again
-
-//!                           51) 1.0.0.51.2, Sign with an imported banana, 20 char text
-
-//!                           52) 1.0.0.51.3, Sign with a *IMPORTED*banana, 32 char text
-
-//!                           53) 1.0.0.51.3, Sign digest with a *IMPORTED*banana
-
-//!                           54) 1.0.0.51.4, Sign digest with a *IMPORTED*banana, text too large
-
-//!                           55) 1.0.0.52 Import a RSA key
-
-//!                           56) 1.0.0.52.1, Get it again
-
-//!                           57) 1.0.0.53 Import a RSA key
-
-//!                           58) 1.0.0.54, Get it again
-
-//!                           59) 1.0.0.54.1 Import a RSA key
-
-//!                           60) 1.0.0.54.2, Get it again
-
-//!                           61) 1.0.0.54.3, Sign with a *IMPORTED*coconut, 20 char text
-
-//!                           62) 1.0.0.54.4, Sign with a *IMPORTED*coconut, 32 char text
-
-//!                           63) 1.0.0.54.4, Sign digest with a *IMPORTED*coconut
-
-//!                           64) 1.0.0.54.5, Sign digest with a *IMPORTED*coconut, text too large
-
-//!                           65) 1.0.0.55 Import a RSA key
-
-//!                           66) 1.0.0.55.1, Get it again
-
-//!                           67) 1.0.0.55.2, Sign with a *IMPORTED*mango, 20 char text
-
-//!                           68) 1.0.0.55.3, Sign with a *IMPORTED*mango, 32 char text
-
-//!                           69) 1.0.0.55.3, Sign digest with a *IMPORTED*mango
-
-//!                           70) 1.0.0.55.4, Sign digest with a *IMPORTED*mango, text too large
-
-//!                           71) 1.0.0.56 Try to import an invalid length RSA key
-
-//!                           72) 1.0.0.57 Import a DSA key
-
-//!                           73) 1.0.0.58 Import a DSA key
-
-//!                           74) 1.0.0.59 Import a DSA key
-
-//!                           75) 1.0.0.60 Import a DSA key
-
-//!                           76) 1.0.0.61 Import a DSA key
-
-//!                           77) 1.0.0.62 Try to import an invalid length DSA key
-
-//!                           78) 1.0.0.63 List everything (TEST ID: GT0140-KEY001) (including illegal usage keys)
-
-//!                           79) 1.0.0.64 List RSA keys (TEST ID: GT0140-KEY001)
-
-//!                           80) 1.0.0.65 List DSA keys (TEST ID: GT0140-KEY001) (including illegal usage keys)
-
-//!                           81) 1.0.0.66 Get a nonexistent key
-
-//!                           82) 1.0.0.67 Delete everything (TEST ID: GT0140KEY004)
-
-//!                           83) 1.1.0.4 Import a RSA key
-
-//!                           84) 1.1.0.5 Import a RSA key
-
-//!                           85) 1.1.0.6 Import a RSA key
-
-//!                           86) 1.1.0.7 Import a RSA key
-
-//!                           87) 1.1.0.8 Import a RSA key
-
-//!                           88) 1.1.0.9 Try to import an invalid length RSA key
-
-//!                           89) 1.1.0.10 Import a DSA key
-
-//!                           90) 1.1.0.11 Import a DSA key
-
-//!                           91) 1.1.0.12 Import a DSA key
-
-//!                           92) 1.1.0.13 Import a DSA key
-
-//!                           93) 1.1.0.14 Import a DSA key
-
-//!                           94) 1.1.0.15 Try to import an invalid length DSA key
-
-//!                           95) 1.1.0.16 List everything (TEST ID: GT0140-KEY001)
-
-//!                           96) 1.1.0.17 List RSA keys (TEST ID: GT0140-KEY001)
-
-//!                           97) 1.1.0.18 List DSA keys (TEST ID: GT0140-KEY001)
-
-//!                           98) 1.1.0.19 Import a PKCS5 encrypted RSA key (TEST ID: SEC-FileTokens-PREQ218-0004)
-
-//!                           99) 1.1.0.19.1 Import a PKCS5 encrypted RSA key with the wrong password
-
-//!                           100) 1.1.0.20 Import a PKCS5 encrypted RSA key
-
-//!                           101) 1.1.0.21 Import a PKCS5 encrypted RSA key
-
-//!                           102) 1.1.0.22 Import a PKCS5 encrypted RSA key
-
-//!                           103) 1.1.0.23 Import a PKCS5 encrypted RSA key
-
-//!                           104) 1.1.0.24 List RSA keys (TEST ID: GT0140-KEY001)
-
-//!                           105) 1.1.0.25 Import a PKCS5 encrypted DSA key
-
-//!                           106) 1.1.0.26 Import a PKCS5 encrypted DSA key
-
-//!                           107) 1.1.0.27 Import a PKCS5 encrypted DSA key
-
-//!                           108) 1.1.0.28 Import a PKCS5 encrypted DSA key
-
-//!                           109) 1.1.0.29 Import a PKCS5 encrypted DSA key
-
-//!                           110) 1.1.0.29.1 List DSA keys (TEST ID: GT0140-KEY001)
-
-//!                           111) 1.1.0.29.2 Try to import invalid data (PKCS5 encrypted RSA key, not PKCS8)
-
-//!                           112) 1.1.0.29.4 Try to import invalid data (garbage)
-
-//!                           113) 1.1.0.33 List RSA keys (TEST ID: GT0140-KEY001)
-
-//!                           114) 1.2, Delete everything (TEST ID: GT0140KEY004)
-
-//!                           115) 1.2.0.68 List everything (TEST ID: GT0140-KEY001)
-
-//!                           116) 1.2.0.69.0 Closing key store 1 - deprecated
-
-//!                           117) 1.2.0.69.1 Closing key store 2
-
-//!                           118) 1.3.2.1,Opening a key store in user mode
-
-//!                           119) 1.3.2.2,Closing key store
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-001
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-002
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-003
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-004
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-005
-
-RUN_TEST_STEP !Error=-11009   -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-006
-
-RUN_TEST_STEP !Error=-11009   -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-007
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-008
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-009
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-010
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-011
-
-RUN_TEST_STEP !Error=-9       -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-012
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-013
-
-RUN_TEST_STEP !Error=-11007   -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-014
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-015
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-016
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-017
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-018
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-019
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-020
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-021
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-022
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-023
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-024
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-025
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-026
-
-RUN_TEST_STEP !Error=-1       -1    CTestHandler        deletekeys             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-027
-
-RUN_TEST_STEP !Error=-1       -1    CTestHandler        deletekeys             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-028
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-029
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-030
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-031
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-032
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-033
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-034
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-035
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-036
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-037
-
-RUN_TEST_STEP !Error=-9       -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-038
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-039
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-040
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-041
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-042
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-043
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-044
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-045
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-046
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-047
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-048
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-049
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-050
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-051
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-052
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-053
-
-RUN_TEST_STEP !Error=-9       -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-054
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-055
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-056
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-057
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-058
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-059
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-060
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-061
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-062
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-063
-
-RUN_TEST_STEP !Error=-9       -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-064
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-065
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-066
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-067
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-068
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-069
-
-RUN_TEST_STEP !Error=-9       -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-070
-
-RUN_TEST_STEP !Error=-11009   -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-071
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-072
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-073
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-074
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-075
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-076
-
-RUN_TEST_STEP !Error=-11009   -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-077
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-078
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-079
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-080
-
-RUN_TEST_STEP !Error=-1       -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-081
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-082
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-083
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-084
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-085
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-086
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-087
-
-RUN_TEST_STEP !Error=-11009   -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-088
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-089
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-090
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-091
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-092
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-093
-
-RUN_TEST_STEP !Error=-11009   -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-094
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-095
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-096
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-097
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-098
-
-RUN_TEST_STEP !Error=-6       -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-099
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-100
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-101
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-102
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-103
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-104
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-105
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-106
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-107
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-108
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-109
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-110
-
-RUN_TEST_STEP !Error=-6       -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-111
-
-RUN_TEST_STEP !Error=-6       -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-112
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-113
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-114
-
-RUN_TEST_STEP                 -1    CTestHandler        listkeys               tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-115
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0004-118
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0004
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0005
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0005
-
-//! @SYMTestCaseDesc          //////////////////////////////////////////////////////////////////////////////////
-
-//!                           Opening Unfied Key Store first in user mode, then in manager mode
-
-//!                           //////////////////////////////////////////////////////////////////////////////////
-
-//! @SYMTestActions           1) 1.3.3.1,Opening a key store in user mode
-
-//!                           2) 1.3.3.2,Opening key store again in manager mode
-
-//!                           3) 1.3.3.3,Closing key store
-
-//!                           4) 1.3.3.3.1,Closing key store
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0005-001
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0005-002
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0005
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0006
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0006
-
-//! @SYMTestCaseDesc          //////////////////////////////////////////////////////////////////////////////////
-
-//!                           Opening Unified Key Store first in manager mode, then in user mode
-
-//!                           //////////////////////////////////////////////////////////////////////////////////
-
-//! @SYMTestActions           1) 1.3.4.1,Opening a key store in manager mode
-
-//!                           2) 1.3.4.2,Opening key store again in user mode
-
-//!                           3) 1.3.4.3,Closing key store
-
-//!                           4) 1.3.4.3.1,Closing key store
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0006-001
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0006-002
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0006
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0007
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0007
-
-//! @SYMTestCaseDesc          //////////////////////////////////////////////////////////////////////////////////
-
-//! @SYMTestActions           1) 1.4.0,Opening key store in manager mode
-
-RUN_TEST_STEP                 -1    CTestHandler        init                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0007-001
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0007
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0008
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0008
-
-//! @SYMTestCaseDesc          1.4.1 Test key usage
-
-//!                           
-
-//!                           1.4.1.1. Test keys with no usage
-
-//! @SYMTestActions           1) 1.4.1.1.1, Add key (usage: none)
-
-//!                           2) 1.4.1.1.2, Set passphrase timeout to "don't cache"
-
-//!                           3) 1.4.1.1.3, Check info
-
-//!                           4) 1.4.1.1.4, Sign, expect failure
-
-//!                           5) 1.4.1.1.5, Decrypt, expect failure
-
-//!                           6) 1.4.1.1.6, Derive, expect failure
-
-//!                           7) 1.4.1.1.7, Delete it again
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0008-001
-
-RUN_TEST_STEP !Error=-5       -1    CTestHandler        settimeout             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0008-002
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0008-003
-
-RUN_TEST_STEP !Error=-11007   -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0008-004
-
-RUN_TEST_STEP !Error=-11007   -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0008-005
-
-RUN_TEST_STEP !Error=-11006   -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0008-006
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0008-007
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0008
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0009
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0009
-
-//! @SYMTestCaseDesc          1.4.1.2. Test keys with sign usage only
-
-//! @SYMTestActions           1) 1.4.1.2.1, Add key
-
-//!                           2) 1.4.1.2.2, Check info
-
-//!                           3) 1.4.1.2.3, Sign, expect success
-
-//!                           4) 1.4.1.2.4, Decrypt, expect failure
-
-//!                           5) 1.4.1.2.5, Derive, expect failure
-
-//!                           6) 1.4.1.2.6, Delete it again
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0009-001
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0009-002
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0009-003
-
-RUN_TEST_STEP !Error=-11007   -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0009-004
-
-RUN_TEST_STEP !Error=-11006   -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0009-005
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0009-006
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0009
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0010
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0010
-
-//! @SYMTestCaseDesc          1.4.1.3. Test keys with signRecover usage only
-
-//! @SYMTestActions           1) 1.4.1.3.1, Add key
-
-//!                           2) 1.4.1.3.2, Check info
-
-//!                           3) 1.4.1.3.3, Sign, expect success
-
-//!                           4) 1.4.1.3.4, Decrypt, expect failure
-
-//!                           5) 1.4.1.3.5, Derive, expect failure
-
-//!                           6) 1.4.1.3.6, Delete it again
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0010-001
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0010-002
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0010-003
-
-RUN_TEST_STEP !Error=-11007   -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0010-004
-
-RUN_TEST_STEP !Error=-11006   -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0010-005
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0010-006
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0010
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0011
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0011
-
-//! @SYMTestCaseDesc          1.4.1.5. Test keys with decrypt usages
-
-//! @SYMTestActions           1) 1.4.1.5.1, Add key
-
-//!                           2) 1.4.1.5.2, Check info
-
-//!                           3) 1.4.1.5.3, Sign, expect failure
-
-//!                           4) 1.4.1.5.4, Decrypt
-
-//!                           5) 1.4.1.5.5, Derive, expect failure
-
-//!                           6) 1.4.1.5.6, Delete it again
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0011-001
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0011-002
-
-RUN_TEST_STEP !Error=-11007   -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0011-003
-
-RUN_TEST_STEP                 -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0011-004
-
-RUN_TEST_STEP !Error=-11006   -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0011-005
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0011-006
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0011
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0012
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0012
-
-//! @SYMTestCaseDesc          1.4.1.8. Test keys with unwrap usage
-
-//! @SYMTestActions           1) 1.4.1.8.1, Add key
-
-//!                           2) 1.4.1.8.2, Check info
-
-//!                           3) 1.4.1.8.3, Sign, expect failure
-
-//!                           4) 1.4.1.8.4, Decrypt
-
-//!                           5) 1.4.1.8.5, Derive, expect failure
-
-//!                           6) 1.4.1.8.6, Delete it again
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0012-001
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0012-002
-
-RUN_TEST_STEP !Error=-11007   -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0012-003
-
-RUN_TEST_STEP                 -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0012-004
-
-RUN_TEST_STEP !Error=-11006   -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0012-005
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0012-006
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0012
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0013
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0013
-
-//! @SYMTestCaseDesc          1.4.1.9. Test DSA keys with sign usage only
-
-//! @SYMTestActions           1) 1.4.1.9.1, Add key
-
-//!                           2) 1.4.1.9.2, Check info
-
-//!                           3) 1.4.1.9.3, Sign, expect success
-
-//!                           4) 1.4.1.9.4, Decrypt, expect failure
-
-//!                           5) 1.4.1.9.5, Derive, expect failure
-
-//!                           6) 1.4.1.9.6, Delete it again
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0013-001
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0013-002
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0013-003
-
-RUN_TEST_STEP !Error=-11006   -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0013-004
-
-RUN_TEST_STEP !Error=-11006   -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0013-005
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0013-006
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0013
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0014
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0014
-
-//! @SYMTestCaseDesc          1.4.1.10. Test DSA keys with signRecover usage only
-
-//! @SYMTestActions           1) 1.4.1.10.1, Add key
-
-//!                           2) 1.4.1.10.2, Check info
-
-//!                           3) 1.4.1.10.3, Sign, expect success
-
-//!                           4) 1.4.1.10.4, Decrypt, expect failure
-
-//!                           5) 1.4.1.10.5, Derive, expect failure
-
-//!                           6) 1.4.1.10.6, Delete it again
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0014-001
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0014-002
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0014-003
-
-RUN_TEST_STEP !Error=-11006   -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0014-004
-
-RUN_TEST_STEP !Error=-11006   -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0014-005
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0014-006
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0014
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0015
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0015
-
-//! @SYMTestCaseDesc          1.4.1.12. Test keys with derive usage
-
-//! @SYMTestActions           1) 1.4.1.12.1, Add key
-
-//!                           2) 1.4.1.12.2, Check info
-
-//!                           3) 1.4.1.12.3, Sign, expect failure
-
-//!                           4) 1.4.1.12.4, Decrypt, expect failure
-
-//!                           5) 1.4.1.12.5, Derive, expect failure
-
-//!                           6) 1.4.1.12.6, Delete it again
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0015-001
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0015-002
-
-RUN_TEST_STEP !Error=-11006   -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0015-003
-
-RUN_TEST_STEP !Error=-11006   -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0015-004
-
-RUN_TEST_STEP                 -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0015-005
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0015-006
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0015
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0016
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0016
-
-//! @SYMTestCaseDesc          1.4.1.16. Test RSA keys with NR usage
-
-//! @SYMTestActions           1) 1.4.1.16.1, Add key
-
-//!                           2) 1.4.1.16.3, Check info
-
-//!                           3) 1.4.1.16.4, Sign, expect failure
-
-//!                           4) 1.4.1.16.5, Decrypt, expect failure
-
-//!                           5) 1.4.1.16.6, Derive, expect failure
-
-//!                           6) 1.4.1.16.7, Delete it again
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0016-001
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0016-002
-
-RUN_TEST_STEP !Error=-11007   -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0016-003
-
-RUN_TEST_STEP !Error=-11007   -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0016-004
-
-RUN_TEST_STEP !Error=-11006   -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0016-005
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0016-006
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0016
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0017
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0017
-
-//! @SYMTestCaseDesc          1.4.1.17. Test RSA keys with NR usage
-
-//! @SYMTestActions           1) 1.4.1.17.1, Add key
-
-//!                           2) 1.4.1.17.3, Check info
-
-//!                           3) 1.4.1.17.4, Sign, expect failure
-
-//!                           4) 1.4.1.17.5, Decrypt, expect failure
-
-//!                           5) 1.4.1.17.6, Derive, expect failure
-
-//!                           6) 1.4.1.17.7, Delete it again
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0017-001
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0017-002
-
-RUN_TEST_STEP !Error=-11006   -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0017-003
-
-RUN_TEST_STEP !Error=-11006   -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0017-004
-
-RUN_TEST_STEP !Error=-11006   -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0017-005
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0017-006
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0017
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0018
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0018
-
-//! @SYMTestCaseDesc          1.4.2 Test access flags
-
-//!                           
-
-//!                           1.4.2.1 Test RSA key with no access flags specified
-
-//! @SYMTestActions           1) 1.4.2.1.1, Add key with no flags specified
-
-//!                           2) 1.4.2.1.2, Check info
-
-//!                           3) 1.4.2.1.3, Delete it again
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0018-001
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0018-002
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0018-003
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0018
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0019
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0019
-
-//! @SYMTestCaseDesc          1.4.2.2 Test RSA key with sensitive access flag specified
-
-//! @SYMTestActions           1) 1.4.2.2.1, Add key
-
-//!                           2) 1.4.2.2.2, Check info
-
-//!                           3) 1.4.2.2.3, Delete it again
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0019-001
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0019-002
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0019-003
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0019
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0020
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0020
-
-//! @SYMTestCaseDesc          1.4.2.3 Test RSA key with extractable access flag specified
-
-//! @SYMTestActions           1) 1.4.2.3.1, Add key
-
-//!                           2) 1.4.2.3.2, Check info
-
-//!                           3) 1.4.2.3.3, Delete it again
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0020-001
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0020-002
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0020-003
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0020
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0021
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0021
-
-//! @SYMTestCaseDesc          1.4.2.4 Test RSA key with sensitive, extractable access flags specified
-
-//! @SYMTestActions           1) 1.4.2.4.1, Add key
-
-//!                           2) 1.4.2.4.2, Check info
-
-//!                           3) 1.4.2.4.3, Delete it again
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0021-001
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0021-002
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0021-003
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0021
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0022
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0022
-
-//! @SYMTestCaseDesc          1.4.2.5 Failure tests
-
-//! @SYMTestActions           1) 1.4.2.5.1, Add key, expect failure
-
-//!                           2) 1.4.2.5.2, Add key, expect failure
-
-//!                           3) 1.4.2.5.3, Add key, expect failure
-
-RUN_TEST_STEP !Error=-11010   -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0022-001
-
-RUN_TEST_STEP !Error=-11010   -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0022-002
-
-RUN_TEST_STEP !Error=-11010   -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0022-003
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0022
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0023
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0023
-
-//! @SYMTestCaseDesc          1.4.3 Test start time and end time
-
-//!                           
-
-//!                           1.4.3.1 Start time and end time not set
-
-//! @SYMTestActions           1) 1.4.3.1.1, Add key with no start date and end date
-
-//!                           2) 1.4.3.1.2, Check info
-
-//!                           3) 1.4.3.1.3, Delete it again
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0023-001
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0023-002
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0023-003
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0023
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0024
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0024
-
-//! @SYMTestCaseDesc          1.4.3.2 Specify start time only
-
-//! @SYMTestActions           1) 1.4.3.2.1, Add key
-
-//!                           2) 1.4.3.2.2, Check info
-
-//!                           3) 1.4.3.2.3, Delete it again
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0024-001
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0024-002
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0024-003
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0024
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0025
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0025
-
-//! @SYMTestCaseDesc          1.4.3.3 Specify end time only
-
-//! @SYMTestActions           1) 1.4.3.3.1, Add key
-
-//!                           2) 1.4.3.3.2, Check info
-
-//!                           3) 1.4.3.3.3, Delete it again
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0025-001
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0025-002
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0025-003
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0025
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0026
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0026
-
-//! @SYMTestCaseDesc          1.4.3.4 Specify start time and end time
-
-//! @SYMTestActions           1) 1.4.3.4.1, Add key
-
-//!                           2) 1.4.3.4.2, Check info
-
-//!                           3) 1.4.3.4.3, Delete it again
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0026-001
-
-RUN_TEST_STEP                 -1    CTestHandler        getkeyinfo             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0026-002
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0026-003
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0026
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0027
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0027
-
-//! @SYMTestCaseDesc          1.4.3.5 Failure tests
-
-//!                           
-
-//!                           1.4.3.5.1 Specify start time and end time the wrong way round
-
-//! @SYMTestActions           1) 1.4.3.5.1, Add key
-
-RUN_TEST_STEP !Error=-11008   -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0027-001
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0027
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0028
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0028
-
-//! @SYMTestCaseDesc          1.4.3.5.2 Specify end date in the past
-
-//! @SYMTestActions           1) 1.4.3.5.2, Add key
-
-RUN_TEST_STEP !Error=-11008   -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0028-001
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0028
-
-
-
-
-
-START_TESTCASE                SEC-TKEYSTORE_USEAUTH-0029
-
-//! @SYMTestCaseID            SEC-TKEYSTORE_USEAUTH-0029
-
-//! @SYMTestCaseDesc          1.4.3.6 Test that you can't use expired keys
-
-//! @SYMTestActions           1) 1.4.3.6.1, Set the time
-
-//!                           2) 1.4.3.6.2, Add key
-
-//!                           3) 1.4.3.6.2.1, Set passphrase timeout to "don't cache"
-
-//!                           4) 1.4.3.6.3, Add a key
-
-//!                           5) 1.4.3.6.4, Sign
-
-//!                           6) 1.4.3.6.5, Decrypt
-
-//!                           7) 1.4.3.6.6, Derive
-
-//!                           8) 1.4.3.6.7, Set the time past key's expiry date
-
-//!                           9) 1.4.3.6.8, Sign with a banana, expect failure
-
-//!                           10) 1.4.3.6.9, Decrypt, expect failure
-
-//!                           11) 1.4.3.6.10, Derive, expect failure
-
-//!                           12) 1.4.3.6.11, Delete them
-
-//!                           13) 1.4.4.1 Import a RSA key
-
-//!                           14) 1.4.4.2,Set passphrase timeout to "don't cache"
-
-//!                           15) 1.4.4.3,Open a BIGRSA for decrypt
-
-//!                           16) 1.4.4.4, Sign with a BIGRSA, 20 char text
-
-//!                           17) 1.4.4.5, Sign with a BIGRSA, 32 char text
-
-//!                           18) 1.4.4.6, Sign digest with a BIGRSA
-
-//!                           19) 1.4.4.7 Import a BIG DSA key
-
-//!                           20) 1.4.4.8, Sign with a BIGDSA, 20 char text
-
-//!                           21) 1.4.4.9, Sign with BIGDSA, text too long (21 chars)
-
-//!                           22) 1.4.4.10, Sign digest with BIGDSA
-
-//!                           23) 1.4.4.999, Delete everything
-
-//!                           24) 1.4.999.1,Closing key store
-
-//!                           25) 1.4.999.2, Sleep 5 seconds
-
-//!                           26) 1.4.999.3, Check for server heap error
-
-RUN_TEST_STEP                 -1    CTestHandler        settime                tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0029-001
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0029-002
-
-RUN_TEST_STEP !Error=-5       -1    CTestHandler        settimeout             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0029-003
-
-RUN_TEST_STEP                 -1    CTestHandler        addkey                 tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0029-004
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0029-005
-
-RUN_TEST_STEP                 -1    CTestHandler        decrypt                tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0029-006
-
-RUN_TEST_STEP                 -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0029-007
-
-RUN_TEST_STEP                 -1    CTestHandler        settime                tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0029-008
-
-RUN_TEST_STEP !Error=-11008   -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0029-009
-
-RUN_TEST_STEP !Error=-11008   -1    CTestHandler        decrypt                tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0029-010
-
-RUN_TEST_STEP !Error=-11008   -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0029-011
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0029-012
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0029-013
-
-RUN_TEST_STEP !Error=-5       -1    CTestHandler        settimeout             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0029-014
-
-RUN_TEST_STEP                 -1    CTestHandler        open                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0029-015
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0029-016
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0029-017
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0029-018
-
-RUN_TEST_STEP                 -1    CTestHandler        importkey              tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0029-019
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0029-020
-
-RUN_TEST_STEP !Error=-9       -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0029-021
-
-RUN_TEST_STEP                 -1    CTestHandler        sign                   tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0029-022
-
-RUN_TEST_STEP                 -1    CTestHandler        deletekeys             tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0029-023
-
-RUN_TEST_STEP                 -1    CTestHandler        delete              
-
-RUN_TEST_STEP                 -1    CTestHandler        sleep                  tkeystore_useauth.ini   SEC-TKEYSTORE_USEAUTH-0029-025
-
-RUN_TEST_STEP                 -1    CTestHandler        checkserverheaperror
-
-END_TESTCASE                  SEC-TKEYSTORE_USEAUTH-0029
-
-
-
-
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/t_addkey.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/t_addkey.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -89,20 +89,10 @@
 					{
 					SetKeyStoreIndex(keyStore);
 					}
-					
-			#ifdef SYMBIAN_AUTH_SERVER		
-			if(iUseNewApi)
-				{
-				keyStore->CreateKey(iKeyStoreImplIndex, iUsage, iSize, *iLabel, iAlgorithm,
-												iAccessType, iStartDate, iEndDate, *iAuthExpression, iFreshness, iKeyInfo, aStatus);
-				}
-			else
-			#endif // SYMBIAN_AUTH_SERVER
-				{
+
 				keyStore->CreateKey(iKeyStoreImplIndex, iUsage, iSize, *iLabel, iAlgorithm,
 								iAccessType, iStartDate, iEndDate, iKeyInfo, aStatus);
 
-				}			
 			iState = EFinished;
 			}
 			break;
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/t_import.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/t_import.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -30,10 +30,6 @@
 #include <x509cert.h>
 #include <x509keys.h>
 
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-#include "tcryptotokenhai.h"
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
-
 /////////////////////////////////////////////////////////////////////////////////
 // CImportKey
 /////////////////////////////////////////////////////////////////////////////////
@@ -67,13 +63,6 @@
 		{
 		iKeyInfo->Release();
 		}
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-	if(iImportHardwareType)
-		{
-		delete iPublicKey;
-		delete iPrivateKey;
-		}
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 }
 
 CImportKey::CImportKey(RFs& aFs,CConsoleBase& aConsole, Output& aOut) :
@@ -92,20 +81,6 @@
 	iImportFileName = HBufC8::NewL(256); // Reasonable max length of a file name
 	TPtr8 temp(iImportFileName->Des());
 	temp.Copy(Input::ParseElement(aTestActionSpec.iActionBody, KImportDataFile, KImportDataFileEnd, pos, err));
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-	if(iHardwareType)
-		{
-		TPtrC8 buffer;
-		buffer.Set(Input::ParseElement(aTestActionSpec.iActionBody, KPublicKeyStart, KPublicKeyEnd, pos, err));
-		iPublicKey = HBufC8::NewMaxL(buffer.Length());
-		TPtr8 publicKeyPtr = iPublicKey->Des();
-		publicKeyPtr.Copy(buffer);
-		buffer.Set(Input::ParseElement(aTestActionSpec.iActionBody, KPrivateKeyStart, KPrivateKeyEnd, pos, err));
-		iPrivateKey = HBufC8::NewMaxL(buffer.Length());
-		TPtr8 privateKeyPtr = iPrivateKey->Des();
-		privateKeyPtr.Copy(buffer);
-		}
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 }
 
 void CImportKey::SetKeyDataFileL(const TDesC8& aDes)
@@ -162,14 +137,7 @@
 		case EImportKey:
 			{
 			TInt result = KErrNone;
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-			if(iHardwareType == 0)
-				{
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 				TRAP(result, SetKeyDataFileL(*iImportFileName));
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-				}
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 			if (KErrNone != result) 
 				{
 				iState = EFinished;			
@@ -182,48 +150,10 @@
 			if(iKeyStoreImplLabel.Length() != 0)
 				{
 				SetKeyStoreIndex(keyStore);
-				}
-			
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-			if(iHardwareType)
+				}		
 				{
-				MCTToken* token = NULL;
-				CCryptoTokenHai* cryptoTokenHai = NULL;
-				TRAP(result, cryptoTokenHai = CCryptoTokenHai::NewL(token));
-				if (KErrNone != result) 
-                    {
-                    iState = EFinished;         
-                    TRequestStatus *status = &aStatus;
-                    User::RequestComplete(status,result);
-                    break;          
-                    }
-				TRAP(result, cryptoTokenHai->ImportKeyL(iLabel->Des(),iPrivateKey->Des(),iPublicKey->Des()));
-				                
-				TRequestStatus *status = &aStatus;
-				if (KErrNone != result) 
-                    {
-                    User::RequestComplete(status,result);
-                    }
-				else
-				    {
-				    User::RequestComplete(status, aStatus.Int());
-				    }
-				}
-			else
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
-				{
-				#ifdef SYMBIAN_AUTH_SERVER
-				if(iUseNewApi)
-					{
-					keyStore->ImportKey(iKeyStoreImplIndex, iKeyData->Des(), iUsage, *iLabel, iAccessType,
-										TTime(0), TTime(0), *iAuthExpression, iFreshness, iKeyInfo, aStatus);
-					}
-				else
-				#endif // SYMBIAN_AUTH_SERVER
-					{
 					keyStore->ImportKey(iKeyStoreImplIndex, iKeyData->Des(), iUsage, *iLabel, iAccessType,
 										TTime(0), TTime(0), iKeyInfo, aStatus);
-					}
 				} // else
 			iState = EFinished;
 			}		
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/t_keystore.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/t_keystore.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -72,9 +72,7 @@
 	SCRIPT_ITEM(CCheckServerHeapError, KCheckServerHeapError),
 	SCRIPT_ITEM(CServerOOMTestStart, KServerOOMTestStart),
 	SCRIPT_ITEM(CServerOOMTestStop, KServerOOMTestStop)
-#ifdef SYMBIAN_AUTH_SERVER
-	,SCRIPT_ITEM(CAuthenticationPolicy, KAuthenticationPolicy)
-#endif // SYMBIAN_AUTH_SERVER
+
 	END_SCRIPT_LIST
 
 	// this bit is because of heap checking problems with techview
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/t_keystore_actions.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/t_keystore_actions.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -26,11 +26,6 @@
 #include <x509keys.h>
 #include <securityerr.h>
 
-#ifdef SYMBIAN_AUTH_SERVER
-#include <keystore_errs.h>
-#include <authserver/auth_srv_errs.h>
-#include <authserver/authclient.h>
-#endif // SYMBIAN_AUTH_SERVER
 
 static void TestKeyStorePanic(TKSPanicCode aPanicCode)
 {
@@ -81,9 +76,6 @@
 	delete iLabel;
 	iExpectedDialogs.ResetAndDestroy();
 	iKeys.Close();
-#ifdef SYMBIAN_AUTH_SERVER	
-	delete iAuthExpression;
-#endif // SYMBIAN_AUTH_SERVER
 
 	}
 
@@ -93,13 +85,6 @@
 	iFs(aFs),
 	iDisableCheckDialog(0),
 	iKeyStoreImplIndex(0)
-#ifdef SYMBIAN_AUTH_SERVER
-	,iUseNewApi(EFalse),
-	iFreshness(0)
-#endif // SYMBIAN_AUTH_SERVER
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-	,iHardwareType(-1)
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 	{
 	iFilter.iPolicyFilter = TCTKeyAttributeFilter::EAllKeys;
 	}
@@ -132,45 +117,7 @@
 
 	pos = 0;
 	iKeyStoreImplLabel.Copy(Input::ParseElement(aTestActionSpec.iActionBody, KUseKeyStoreStart, KUseKeyStoreEnd, pos));
-	
-#ifdef SYMBIAN_AUTH_SERVER
-	TPtrC8 authExpr;
-	TInt authExprPresent = KErrNone;
-	authExpr.Set(Input::ParseElement(aTestActionSpec.iActionBody, KAuthExpressionStart, KAuthExpressionEnd, pos , authExprPresent));
-	if(authExpr.Compare(_L8("null")) != 0)
-		{
-		TInt size = authExpr.Size();
-		if (size != 0)
-			{
-			iAuthExpression = HBufC::NewMaxL(size);
-			TPtr authExp(iAuthExpression->Des());
-			authExp.FillZ();
-			authExp.Copy(authExpr);
-			}
-		}
-	TInt freshnessPresent = KErrNone;
-	TInt negativeFreshness = Input::ParseIntElement(aTestActionSpec.iActionBody, KNegativeFreshnessStart, KNegativeFreshnessEnd);
-	if(negativeFreshness == 1)
-		{
-		iFreshness = -1;
-		}
-	else
-		{
-		iFreshness = Input::ParseIntElement(aTestActionSpec.iActionBody, KFreshnessStart, KFreshnessEnd, pos, freshnessPresent);
-		}
-	if(authExprPresent == KErrNone && freshnessPresent == KErrNone)
-		{
-		iUseNewApi = ETrue;
-		}
-	
-	iDeauthenticate = Input::ParseIntElement(aTestActionSpec.iActionBody, KAuthenticateStart, KAuthenticateEnd);
 		
-#endif // SYMBIAN_AUTH_SERVER
-	
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-	iHardwareType = Input::ParseIntElement(aTestActionSpec.iActionBody, KHwTypeStart, KHwTypeEnd, pos);
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
-	
 	}
 
 TBool CKeyStoreTestAction::AddExpectedDialogL(const TDesC8& aData)
@@ -349,13 +296,6 @@
 		return KErrPermissionDenied;
 	else if (aResult==KErrNoMemoryString)
 			return KErrNoMemory;
-#ifdef SYMBIAN_AUTH_SERVER
-	else if (aResult==KErrAuthFailureString)
-		return KErrAuthenticationFailure;
-	else if (aResult==KErrUnknownAuthStrengthAliasString)
-		return KErrUnknownAuthStrengthAlias;
-#endif // SYMBIAN_AUTH_SERVER
-	
 	else
 		{
 		iOut.writeString(_L("Unknown expected result: "));
@@ -496,15 +436,6 @@
 void CKeyStoreTestAction::DoPerformPrerequisite(TRequestStatus& aStatus)
 	{
 	TInt err = KErrNone;
-	#ifdef SYMBIAN_AUTH_SERVER
-	if(iDeauthenticate == 1)
-		{
-		AuthServer::RAuthClient authClient;
-		authClient.Connect();
-		TRAP(err,authClient.DeauthenticateL());
-		authClient.Close();
-		}
-	#endif // SYMBIAN_AUTH_SERVER
 	
 	TRAP(err, WriteExpectedDialogDataL());
 	
@@ -671,12 +602,6 @@
 	{
 		iType = EDH;
 	}
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-    else if (aKeyType.Compare(KAlgEcc)==0)
-        {
-        iType = EECC;
-        }
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 }
 
 /////////////////////////////////////////////////////////////////
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/t_keystore_actions.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/t_keystore_actions.h	Wed Apr 14 17:48:59 2010 +0300
@@ -94,9 +94,6 @@
 		EDSASign,
 		EDH,
 		EDecrypt,
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-		EECC,
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 		};
 protected:
 	TUint iServerAlloc;
@@ -116,17 +113,6 @@
 	TInt iKeyStoreImplIndex;
 	TBuf8<50> iKeyStoreImplLabel;
 	
-#ifdef SYMBIAN_AUTH_SERVER
-	// this variable would be used to retrieve the rom build variant 
-	// for key store.
-	TBool iUseNewApi;
-	HBufC* iAuthExpression;
-	TInt iFreshness;
-	TInt iDeauthenticate;
-#endif // SYMBIAN_AUTH_SERVER
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-	TInt iHardwareType;
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 };
 
 class CInitialiseKeyStore : public CKeyStoreTestAction
@@ -399,11 +385,6 @@
 	HBufC8*  iImportFileName;
 	HBufC8* iKeyData;
 	CCTKeyInfo* iKeyInfo;
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-	TUint iImportHardwareType;
-	HBufC8* iPublicKey;
-	HBufC8* iPrivateKey;
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 private:
 	enum TState
 		{
@@ -587,13 +568,6 @@
 		EFinished
 		};
 	
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-	enum TOperationType
-		{
-		ESigning,
-		EDecryption,
-		};
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 private:
 	TState iState;
 	TCTTokenObjectHandle iDeleteHandle;
@@ -602,11 +576,6 @@
 	MDSASigner* iDSASigner;
 	MCTDecryptor* iDecryptor;
 	MCTDH* iDH;
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-	TOperationType iOperationType;
-	CryptoSpi::CSigner* iSigner;
-	CryptoSpi::CAsymmetricCipher* iDecrypt;
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 };
 
 //	Allows script to sign, filter on keys algorithm (or all) and deletes listed keys
@@ -637,10 +606,6 @@
 		ESign,
 		EExportPublic,
 		EVerify,
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-		ESignInHardware,
-		EVerifyHwSignature,
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 		EFinished,
 		};
 
@@ -659,11 +624,6 @@
 	CRSASignature* iRSASignature;
 	CMessageDigest* iHash;
 	TBool iFailHashDigest;	//	Should hash the digest beforehand, but doesn't to test failure mode
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-	CryptoSpi::CSigner* iSigner;
-	CryptoSpi::CCryptoParams* iSpiSignature;
-	TCTTokenObjectHandle iTokenHandle;
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 };							
 
 class CDecrypt : public CKeyStoreTestAction
@@ -704,9 +664,6 @@
 	TPtr8 iPlainTextPtr;
 	MCTDecryptor* iDecryptor;
 	HBufC8* iPublic;
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-	CryptoSpi::CAsymmetricCipher* iDecrypt;
-#endif
 };
 
 class CDHKeyPair;
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/t_keystore_defs.h	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/t_keystore_defs.h	Wed Apr 14 17:48:59 2010 +0300
@@ -67,9 +67,7 @@
 _LIT8(KGetManagementPolicy, "getmanagementpolicy");
 _LIT8(KSetManagementPolicy, "setmanagementpolicy");
 _LIT8(KKeyStoreLabel, "getkeystorelabel");
-#ifdef SYMBIAN_AUTH_SERVER
-_LIT8(KAuthenticationPolicy, "authenticationpolicy");
-#endif // SYMBIAN_AUTH_SERVER
+
 // Action types for the key store
 _LIT8(KUnifiedKeyStoreInit, "UnifiedKeyStore Init");
 _LIT8(KUnifiedKeyStoreDelete, "UnifiedKeyStore Delete");
@@ -140,9 +138,6 @@
 _LIT8(KAlgRSA, "RSA");
 _LIT8(KAlgDSA, "DSA");
 _LIT8(KAlgDH, "DH");
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-_LIT8(KAlgEcc,"ECC");
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 _LIT8(KAlgBAD, "BAD");
 
 _LIT8(KKeyExportableStart, "<keyexportable>");
@@ -321,45 +316,5 @@
 _LIT8(KUseKeyStoreStart,"<usekeystore>");
 _LIT8(KUseKeyStoreEnd,"</usekeystore>");
 
-#ifdef SYMBIAN_AUTH_SERVER
-// tags for authentication expression
-_LIT8(KAuthExpressionStart, "<authexpression>");
-_LIT8(KAuthExpressionEnd, "</authexpression>");
-
-// tags for freshness
-_LIT8(KFreshnessStart, "<freshness>");
-_LIT8(KFreshnessEnd, "</freshness>");
-
-// tags for freshness
-_LIT8(KNegativeFreshnessStart, "<negativefreshness>");
-_LIT8(KNegativeFreshnessEnd, "</negativefreshness>");
-
-// tags for authentication expression
-_LIT8(KExpectedExpressionStart, "<expectedexpression>");
-_LIT8(KExpectedExpressionEnd, "</expectedexpression>");
-
-// tags for freshness
-_LIT8(KExpectedFreshnessStart, "<expectedfreshness>");
-_LIT8(KExpectedFreshnessEnd, "</expectedfreshness>");
-
-_LIT8(KAuthModeStart, "<authmode>");
-_LIT8(KAuthModeEnd, "</authmode>");
-
-_LIT8(KAuthenticateStart, "<authenticate>");
-_LIT8(KAuthenticateEnd, "</authenticate>");
-
-#endif // SYMBIAN_AUTH_SERVER
-
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-_LIT8(KHwTypeStart, "<hwtype>");
-_LIT8(KHwTypeEnd, "</hwtype>");
-_LIT8(KPublicKeyStart, "<publickey>");
-_LIT8(KPublicKeyEnd, "</publickey>");
-_LIT8(KPrivateKeyStart, "<privatekey>");
-_LIT8(KPrivateKeyEnd, "</privatekey>");
-_LIT8(KOperationTypeStart, "<operationtype>");
-_LIT8(KOperationTypeEnd, "</operationtype>");
-
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 
 #endif	//	__T_TCERTSTOREDEFS_H__
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/t_open.cpp	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/t_open.cpp	Wed Apr 14 17:48:59 2010 +0300
@@ -26,12 +26,6 @@
 #include <x509keys.h>
 #include <asymmetrickeys.h>
 
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-#include <cryptospidef.h>
-#include "cryptoasymmetriccipherapi.h"
-#include "cryptosignatureapi.h"
-#include <cryptospi/cryptoparams.h>
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC && SYMBIAN_ENABLE_SDP_ECC
 
 /*static*/ CTestAction* COpenKey::NewL(RFs& aFs, CConsoleBase& aConsole, Output& aOut, const TTestActionSpec& aTestActionSpec)
 {
@@ -50,10 +44,6 @@
 
 COpenKey::~COpenKey()
 {
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-    delete iSigner;
-    delete iDecrypt;
-#endif
 	iKeys.Close();
 }
 
@@ -100,21 +90,6 @@
 					case EDH:
 						keyStore->Open(*keyInfo, iDH, aStatus);
 						break;
-					#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-					case EECC:
-						{
-						ASSERT(iHardwareType);
-						if(iOperationType == ESigning)
-							{
-							keyStore->Open(keyInfo->Handle(),iSigner,aStatus);
-							}
-						if(iOperationType == EDecryption)
-							{
-							keyStore->Open(keyInfo->Handle(),iDecrypt,aStatus);
-							}
-						break;
-						}
-					#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 						}
 					break;
 					}
@@ -166,22 +141,7 @@
 							iDH->Release();
 							}
 						break;
-	#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-					case EECC:
-						{
-						ASSERT(iHardwareType);
-						if(iOperationType == ESigning && iSigner == NULL
-								|| iOperationType == EDecryption && iDecrypt == NULL)
-							{
-							completionCode = KErrGeneral;
-							}
-						break;
-						}
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 				} // switch
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-				if(iHardwareType == 0)
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 					{
 					if (*label != *iLabel)
 						aStatus = KErrBadName;
@@ -253,12 +213,6 @@
 		iDH->Release();
 		iDH = NULL;
 		}
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-    delete iSigner;
-    iSigner = NULL;
-    delete iDecrypt;
-    iDecrypt = NULL;
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 	}
 
 void COpenKey::DoReportAction()
@@ -310,18 +264,6 @@
 	{
 	CKeyStoreTestAction::ConstructL(aTestActionSpec);
 	
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-	TInt pos = 0, err = 0;
-	TPtrC8 operationType = Input::ParseElement(aTestActionSpec.iActionBody, KOperationTypeStart, KOperationTypeEnd, pos, err);
-	if(operationType.Compare(_L8("sign")) == 0)
-		{
-		iOperationType = ESigning;
-		}
-	else if (operationType.Compare(_L8("decrypt")) == 0)
-		{
-		iOperationType = EDecryption;
-		}
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 	
 	iState = EListKeysPreOpen;
 
@@ -353,10 +295,6 @@
 	delete iRSASignature;
 	delete iDSASignature;
 	delete iHash;
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-    delete iSigner;
-    delete iSpiSignature;
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 }
 
 void CSign::PerformAction(TRequestStatus& aStatus)
@@ -405,22 +343,6 @@
 						case EDecrypt:
 							break;	//	Nothing to do, for the compiler
 						
-						#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-						case EECC:
-							{
-							iTokenHandle = keyInfo->Handle();
-							if(iHardwareType == 0)
-								{
-								keyStore->Open(iTokenHandle, iSigner, aStatus);
-								}
-							else
-								{
-								TRequestStatus* status = &aStatus;
-								User::RequestComplete(status, KErrNone);
-								}
-							}
-							break;
-						#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
                         }
                     } // if
                 if (i == keyCount)
@@ -468,38 +390,6 @@
 					}
 				}
 				break;
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-                case EECC:
-                    {
-                    TRAPD(err, iSpiSignature = CryptoSpi::CCryptoParams::NewL());
-                    if(err == KErrNone)
-                        {
-                        if(iHardwareType)
-                            {
-                            CUnifiedKeyStore* keyStore = CSharedKeyStores::TheUnifiedKeyStores().operator[](iKeystore);
-                            ASSERT(keyStore);   //  Flag it up
-                            keyStore->Sign(iTokenHandle, *iReadText, iSpiSignature, aStatus);
-                            }
-                        else
-                            {
-                            if(iSigner)
-                                {
-                                TRAP(err, iSigner->SignL(*iReadText, *iSpiSignature));
-                                aStatus = err;
-                                }
-                            TRequestStatus* status = &aStatus;
-                            User::RequestComplete(status, aStatus.Int());
-                            }
-                        }
-                    else
-                        {
-                        aStatus = err;
-                        TRequestStatus* status = &aStatus;
-                        User::RequestComplete(status, aStatus.Int());
-                        }
-                    }
-                break;
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 
 				default:
 					ASSERT(EFalse);
@@ -535,14 +425,6 @@
 						case EDH:
 						case EDecrypt:
 							break;	//	Nothing to do, for the compiler
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-						case EECC:
-							{
-							keyStore->ExportPublic(iExportHandle, iExportedPublicKey, aStatus);
-							iState = EVerify;
-							}
-							break;
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 						}
 					break;
 					}
@@ -568,9 +450,6 @@
 					{
 					iExportHandle = keyInfo->Handle();
 					CX509SubjectPublicKeyInfo* ki = NULL;
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-					if(iType != EECC)
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 						ki = CX509SubjectPublicKeyInfo::NewLC(*iExportedPublicKey);
 
 					switch (iType)
@@ -626,39 +505,10 @@
 						}
 						break;
 				
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-					case EECC:
-						{
-						iVerifyResult = EFalse;
-						if (iSpiSignature && iSpiSignature->IsPresent(CryptoSpi::KEccKeyTypeUid))
-							{
-							TDesC8* actualSignature = NULL;
-							TRAPD(err, actualSignature = const_cast<TDesC8*>(&(iSpiSignature->GetTDesC8L(CryptoSpi::KEccKeyTypeUid))));
-							if(err == KErrNone)
-							    {
-							    if(iExportedPublicKey->Des() == *actualSignature)
-							        {
-							        iVerifyResult = ETrue;
-							        }
-							    }
-							else
-							    {
-							    aStatus = err;
-							    }
-							}
-						_LIT(KReturned, "Returned... ");
-						iOut.writeString(KReturned);
-						iOut.writeNewLine();
-						}
-					break;
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC	
 					default:
 						ASSERT(EFalse);
 
 						}
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-					if(iType != EECC)
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 						CleanupStack::PopAndDestroy(ki);
 					}
 				}
@@ -782,12 +632,6 @@
 	iRSASignature = NULL;
 	delete iDSASignature;
 	iDSASignature = NULL;
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-	delete iSigner;
-	iSigner = NULL;
-	delete iSpiSignature;
-	iSpiSignature = NULL;
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 	}
 
 void CSign::DoReportAction()
@@ -897,9 +741,6 @@
 	delete iReadText;
 	delete iPlainText;
 	delete iPublic;
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-    delete iDecrypt;
-#endif
 }
 
 void CDecrypt::PerformAction(TRequestStatus& aStatus)
@@ -938,22 +779,6 @@
 					{
 					switch(iType)
 						{
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-						case EECC:
-						if(iHardwareType == 0)
-							{
-							keyStore->Open(keyInfo->Handle(), iDecrypt, aStatus);
-							}
-						else if(iHardwareType == 1 )
-							{
-							/**
-							 * Call the decrypt of hardware directly. iPlainText 
-							 * would be populated.
-							 */
-							keyStore->Decrypt(keyInfo->Handle(), *iReadText, iPlainText, aStatus);
-							}
-						break;
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 					default:
 						{
 						keyStore->Open(*keyInfo, iDecryptor, aStatus);
@@ -1025,57 +850,6 @@
 				}
 			switch(iType)
 				{
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-				case EECC:
-					{
-					if(iHardwareType)
-						{
-						if(*iPlainText == *iPublic)
-							{
-							aStatus = KErrNone;
-							}
-						else
-							{
-							aStatus = KErrGeneral;
-							}
-						}
-					else
-						{
-                        aStatus = KErrGeneral;
-                        if (iDecrypt)
-                            {
-                            HBufC8* decryptedText = NULL;
-                            TRAPD(err, decryptedText = HBufC8::NewL(iDecrypt->GetMaximumOutputLengthL()));
-                            
-                            if (err == KErrNone)
-                                {
-                                CleanupStack::PushL(decryptedText);
-                                TPtr8 decryptedTextPtr = decryptedText->Des();
-
-                                TRAP(err, (iDecrypt->ProcessL(*iReadText, decryptedTextPtr)));
-                                if(err != KErrNone)
-                                    {
-                                    aStatus = err;
-                                    }
-                                if ((err == KErrNone) && (decryptedTextPtr
-                                        == iPublic->Des()))
-                                    {
-                                    aStatus = KErrNone;
-                                    }
-                                CleanupStack::PopAndDestroy(decryptedText);
-                                }
-                            else
-                                {
-                                aStatus = err;
-                                }
-                            }
-                        }
-					iState = EFinished;
-					TRequestStatus* status = &aStatus;
-					User::RequestComplete(status, aStatus.Int());
-					}
-					break;
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 				default:
 					{
 					CX509SubjectPublicKeyInfo* ki = 
@@ -1110,17 +884,6 @@
 
 		case EFinished:
 			{
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-			if(iType == EECC)
-				{
-				iActionState = EPostrequisite;
-				iResult = (aStatus.Int() == iExpectedResult);
-					
-				TRequestStatus* status = &aStatus;
-				User::RequestComplete(status, aStatus.Int());
-				}
-			else
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 				{
 				if (aStatus == KErrNone && (!iPlainText || 
 											*iPlainText != *iReadText))
@@ -1188,10 +951,6 @@
 	iPlainText = NULL;
 	delete iPublic;
 	iPublic = NULL;
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-    delete iDecrypt;
-    iDecrypt = NULL;
-#endif
 	}
 
 void CDecrypt::DoReportAction()
--- a/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/tkeystore.mmp	Thu Apr 01 00:24:41 2010 +0300
+++ b/cryptoservices/filebasedcertificateandkeystores/test/tkeystore/tkeystore.mmp	Wed Apr 14 17:48:59 2010 +0300
@@ -56,9 +56,6 @@
 SOURCE t_corrupt.cpp
 SOURCE t_listall.cpp
 SOURCE t_policyaccessors.cpp
-#ifdef SYMBIAN_AUTH_SERVER
-SOURCE t_authenticationpolicy.cpp
-#endif // SYMBIAN_AUTH_SERVER
 
 USERINCLUDE ../../../../cryptomgmtlibs/securitytestfw/test/testhandler2
 USERINCLUDE ../../../../cryptomgmtlibs/securitytestfw/inc
@@ -71,11 +68,6 @@
 
 OS_LAYER_SYSTEMINCLUDE_SYMBIAN
 
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-USERINCLUDE ../tcryptotokenhai
-USERINCLUDE	../../../../crypto/weakcryptospi/inc
-USERINCLUDE	../../../../crypto/weakcryptospi/inc/spi
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 
 USERINCLUDE ../../../../crypto/weakcrypto/inc
 USERINCLUDE ../../source/generic/client
@@ -83,22 +75,11 @@
 OS_LAYER_SYSTEMINCLUDE_SYMBIAN
 USERINCLUDE ../../Inc
 
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-SYSTEMINCLUDE OS_LAYER_PUBLIC_EXPORT_PATH(cryptospi)
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 
 LIBRARY	euser.lib efsrv.lib ecom.lib cryptography.lib
 LIBRARY certstore.lib crypto.lib hash.lib
 LIBRARY t_testhandler2.lib ctframework.lib x509.lib
 LIBRARY estor.lib pbe.lib random.lib tfiletokens.lib
 
-#ifdef SYMBIAN_AUTH_SERVER
-LIBRARY	authclient.lib
-#endif // SYMBIAN_AUTH_SERVER
-
-#if (defined(SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT) && defined(SYMBIAN_ENABLE_SDP_ECC))
-LIBRARY tcryptotokenhai.lib
-LIBRARY cryptospi.lib
-#endif // SYMBIAN_ENABLE_SDP_WMDRM_SUPPORT && SYMBIAN_ENABLE_SDP_ECC
 
 SMPSAFE
--- a/cryptoservices/filebasedcertificateandkeystores/test/ttesttools/data/key_migrate.txt	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,1 +0,0 @@
--migratestore c:\ttesttools\data\keys_old.dat pinkcloud -new c:\ttesttools\data\newkeys.dat -expr 0x200032E5 -freshness 0
\ No newline at end of file
--- a/cryptoservices/filebasedcertificateandkeystores/test/ttesttools/data/key_migrate_default.txt	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,1 +0,0 @@
--migratestore c:\ttesttools\data\keys_old.dat pinkcloud 
\ No newline at end of file
--- a/cryptoservices/filebasedcertificateandkeystores/test/ttesttools/data/key_migrated_help.txt	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,1 +0,0 @@
--h migratestore
\ No newline at end of file
--- a/cryptoservices/filebasedcertificateandkeystores/test/ttesttools/data/key_migrated_param_missing1.txt	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,1 +0,0 @@
-keytool -migratestore
\ No newline at end of file
--- a/cryptoservices/filebasedcertificateandkeystores/test/ttesttools/data/key_migrated_param_missing2.txt	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,1 +0,0 @@
-keytool -migratestore c:\oldkeys.dat
\ No newline at end of file
--- a/cryptoservices/filebasedcertificateandkeystores/test/ttesttools/scripts/keytool_migrate.ini	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,47 +0,0 @@
-
-[keytool_list_migrated_keys]
-expectedlabel1=dhkey
-expectedlabel2=rsakey
-expectedlabel3=dsakey
-
-[keytool_migrate_default]
-file=c:\newkeys.dat
-check=present
-
-[keytool_migrated_param_missing1]
-actualoutput=c:\output.txt
-numlines=8
-line0=Key file to be migrated not provided.
-line1=Passphrase absent.
-line2=Usage
-line3= keytool 	[{-list -l} {-liststores -ls} {-import -i} {-remove -r} 
-line4={-page -p } {-help -h} {-setuser -s} {-setallusers -a} {-removeuser -ru} {-setmanager -m}] {KeyLabel}
-line5=or [ {-migratestore} old key file name ]
-line6=Type keytool -h {CommandName} for details on a particular command.
-line7=Type keytool -h noninteractive for details on how to run the commands in noninteractive mode.
-
-[keytool_migrated_param_missing2]
-actualoutput=c:\output.txt
-numlines=7
-line0=Passphrase absent.
-line1=Usage
-line2= keytool 	[{-list -l} {-liststores -ls} {-import -i} {-remove -r} 
-line3={-page -p } {-help -h} {-setuser -s} {-setallusers -a} {-removeuser -ru} {-setmanager -m}] {KeyLabel}
-line4=or [ {-migratestore} old key file name ]
-line5=Type keytool -h {CommandName} for details on a particular command.
-line6=Type keytool -h noninteractive for details on how to run the commands in noninteractive mode.
-
-[keytool_migrated_help]
-actualoutput=c:\output.txt
-numlines=10
-line0=-migrate OldKeyFile Passphrase [-new NewKeyFile] [-expr AuthExpression] [-freshness Freshness].
-line1=Migrates the old key file to the new format. If new key file name
-line2=is provided then it is saved using that name otherwise it is saved
-line3=as newkeys.dat in the system drive. Every key store in old implementation was encrypted
-line4=with a passphrase, this should be supplied for successful porting.
-line5=If authexpression is not provided it uses the system wide default plugin. 
-line6=If freshness is not provided then it uses 0 as the default freshness which
-line7=means always authenticate the user. The supplied auth expression and freshness 
-line8=would be used to determine whether to use the current authenticated identity
-line9=if available or to authenticate the user again.
-
--- a/cryptoservices/filebasedcertificateandkeystores/test/ttesttools/scripts/keytool_migrate.script	Thu Apr 01 00:24:41 2010 +0300
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,79 +0,0 @@
-//
-// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
-// All rights reserved.
-// This component and the accompanying materials are made available
-// under the terms of the License "Eclipse Public License v1.0"
-// which accompanies this distribution, and is available
-// at the URL "http://www.eclipse.org/legal/epl-v10.html".
-//
-// Initial Contributors:
-// Nokia Corporation - initial contribution.
-//
-// Contributors:
-//
-// Description: 
-//
-//! @file
-// filetokens tools unit (integration) tests
-PRINT Run  test for migrating old keys data to new format.
-LOAD_SUITE ttesttools
-
-//! @SYMTestCaseID 		SEC-FILETOKENS-DEF136406-0001
-//! @SYMTestCaseDesc 	Migrate the old keys.dat to the new format
-//! @SYMTestPriority	Medium
-//! @SYMTestActions  	Call keytool to migrate key store from old to new format.
-//! @SYMTestExpectedResults Keystore would be successfully migrated.
-//! @SYMDevelopedForRelease Diran
-
-START_TESTCASE SEC-FILETOKENS-DEF136406-0001
-RUN_PROGRAM keytool.exe c:\ttesttools\data\key_migrate.txt c:\output.txt
-RUN_TEST_STEP 100 ttesttools ListKeyStep c:\ttesttools\scripts\keytool_migrate.ini keytool_list_migrated_keys
-END_TESTCASE SEC-FILETOKENS-DEF136406-0001
-
-//! @SYMTestCaseID 		SEC-FILETOKENS-DEF136406-0002
-//! @SYMTestCaseDesc 	Migrate the old keys.dat to the new format using default parameters
-//! @SYMTestPriority	Medium
-//! @SYMTestActions  	Call keytool to migrate key store from old to new format.
-//! @SYMTestExpectedResults Keystore would be successfully migrated.
-//! @SYMDevelopedForRelease Diran
-
-START_TESTCASE SEC-FILETOKENS-DEF136406-0002
-RUN_PROGRAM keytool.exe c:\ttesttools\data\key_migrate_default.txt c:\output.txt
-RUN_TEST_STEP 100 ttesttools CheckFile c:\ttesttools\scripts\keytool_migrate.ini keytool_migrate_default
-END_TESTCASE SEC-FILETOKENS-DEF136406-0002
-
-//! @SYMTestCaseID 		SEC-FILETOKENS-DEF136406-0003
-//! @SYMTestCaseDesc 	keytool check for mandatory parameter, name of the key file to be migrated
-//! @SYMTestPriority	Medium
-//! @SYMTestActions  	Call keytool to display message that mandatory param is missing.
-//! @SYMTestExpectedResults mandatory param missing message displayed alongwith the usage.
-//! @SYMDevelopedForRelease Diran
-
-START_TESTCASE SEC-FILETOKENS-DEF136406-0003
-RUN_PROGRAM keytool.exe c:\ttesttools\data\key_migrated_param_missing1.txt c:\output.txt
-RUN_TEST_STEP 100 ttesttools ParseFileStep c:\ttesttools\scripts\keytool_migrate.ini keytool_migrated_param_missing1
-END_TESTCASE SEC-FILETOKENS-DEF136406-0003
-
-//! @SYMTestCaseID 		SEC-FILETOKENS-DEF136406-0004
-//! @SYMTestCaseDesc 	keytool check for mandatory parameter, passphrase required for old key store
-//! @SYMTestPriority	Medium
-//! @SYMTestActions  	Call keytool to display message that mandatory param is missing.
-//! @SYMTestExpectedResults mandatory param missing message displayed alongwith the usage.
-//! @SYMDevelopedForRelease Diran
-
-START_TESTCASE SEC-FILETOKENS-DEF136406-0004
-RUN_PROGRAM keytool.exe c:\ttesttools\data\key_migrated_param_missing2.txt c:\output.txt
-RUN_TEST_STEP 100 ttesttools ParseFileStep c:\ttesttools\scripts\keytool_migrate.ini keytool_migrated_param_missing2
-END_TESTCASE SEC-FILETOKENS-DEF136406-0004
-
-//! @SYMTestCaseID 		SEC-FILETOKENS-DEF136406-0005
-//! @SYMTestCaseDesc 	keytool check for detail help for migration
-//! @SYMTestPriority	Medium
-//! @SYMTestActions  	Call keytool to display detail help message.
-//! @SYMTestExpectedResults Displays detail help message for migration of old store.
-//! @SYMDevelopedForRelease Diran
-
-START_TESTCASE SEC-FILETOKENS-DEF136406-0005
-RUN_PROGRAM keytool.exe c:\ttesttools\data\key_migrated_help.txt c:\output.txt
-RUN_TEST_STEP 100 ttesttools ParseFileStep c:\ttesttools\scripts\keytool_migrate.ini keytool_migrated_help
-END_TESTCASE SEC-FILETOKENS-DEF136406-0005
--- a/package_definition.xml	Thu Apr 01 00:24:41 2010 +0300
+++ b/package_definition.xml	Wed Apr 14 17:48:59 2010 +0300
@@ -1,11 +1,6 @@
 <?xml version="1.0" encoding="UTF-8"?>
 <SystemDefinition schema="3.0.0">
   <package id="security" name="OS Security" levels="physical-abstraction plugins libraries management services utilities">
-	<collection id="authenticationservices" name="Authentication Services" level="utilities">
-      <component id="authenticationserver" name="Authentication Server" introduced="^3" purpose="optional">
-        <unit bldFile="authenticationservices/authenticationserver/group" mrp="authenticationservices/authenticationserver/group/security_authserver.mrp"/>
-      </component>
-    </collection>
     <collection id="authorisation" name="Authorisation" level="utilities">
       <component id="userpromptservice" name="User Prompt Service" introduced="^3" purpose="mandatory">
         <unit bldFile="authorisation/userpromptservice/group" mrp="authorisation/userpromptservice/group/security_ups.mrp"/>
Binary file securityanddataprivacytools/securityconfig/authserver/2001ea7f.txt has changed
Binary file securityanddataprivacytools/securityconfig/conf/securityconfig.confml has changed
Binary file securityanddataprivacytools/securityconfig/conf/securityconfig_2001ea7f.crml has changed
--- a/securityanddataprivacytools/securityconfig/group/bld.inf	Thu Apr 01 00:24:41 2010 +0300
+++ b/securityanddataprivacytools/securityconfig/group/bld.inf	Wed Apr 14 17:48:59 2010 +0300
@@ -35,15 +35,8 @@
 // Optional Replaceable files for UPS
 ../ups/backup/backup_registration.xml		z:/private/10283558/backup_registration.xml
 
-#ifdef SYMBIAN_AUTH_SERVER
-// AuthServer cenrep file.
-// NOTE: this is required for emulator and target hardware testing only. It is not used in production.
-../authserver/2001ea7f.txt					z:/private/10202be9/2001ea7f.txt
-
-#endif // SYMBIAN_AUTH_SERVER
 // ConfML Files
 ../conf/securityconfig.confml            OS_LAYER_EXPORTS_CONFML(securityconfig.confml)
-../conf/securityconfig_2001ea7f.crml	 OS_LAYER_EXPORTS_CRML(securityconfig_2001ea7f.crml)
 
 // crml file for customizing the OCSP central reposiroty settings - GenerateResponseForMissingUri and EnableGetHttpMethod. 
 ../conf/securityconfig_2002b28b.crml	 OS_LAYER_EXPORTS_CRML(securityconfig_2002b28b.crml)