Commit 69b1f8c8 authored by berge's avatar berge
Browse files

Added LDS_H* testcases

parent d9752fa8
Loading
Loading
Loading
Loading
+15 −1
Original line number Diff line number Diff line
@@ -75,7 +75,21 @@ module ePassport_MainModule {
    	execute(TC_LDS_G02()); 
    	
    	// LDS_H
    	execute(TC_LDS_H03());
    	execute(TC_LDS_H07());
    	execute(TC_LDS_H22());
    	execute(TC_LDS_H24());
    	execute(TC_LDS_H31());
    	execute(TC_LDS_H32());
    	execute(TC_LDS_H33());
    	execute(TC_LDS_H37());
    	execute(TC_LDS_H45());
    	execute(TC_LDS_H51());
    	execute(TC_LDS_H54());
    	execute(TC_LDS_H63());
    	execute(TC_LDS_H71());
    	execute(TC_LDS_H75());
    	execute(TC_LDS_H83());  
    	
    	// LDS_I
    	execute(TC_LDS_I01());       	
+615 −0
Original line number Diff line number Diff line
@@ -1539,6 +1539,312 @@ module ePassport_Testcases {

	group groupLDS_H {	

        // LDS_H03: RSASSA-PSS with SHA256, SHA256 DG hash, DS stored inside SOD
        // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD
		// contains RSASSAPSS with SHA256, SHA256 DG hash, DS stored inside SOD
        // Profile: AIP
        // Configuration file: default EAC + modif EF.SOD ( with incorrect Signature in SignerInfo)
        // Expected results: "ePassport inspection procedure successful"
        // Interface: BAC: PASS, PA: PASS, AA: NP, TA: PASS, CA: PASS, COM: PASS
        testcase TC_LDS_H03() runs on MRTD system MRTD_System {
        	
            var template IsVerdictList vt_expectedFailResults := {};
        	var template IsVerdictList vt_expectedPassResults := { 
        	    e_aisNoFailure,       	    
        	    e_aisBacAuthentication,
        	    e_aisPassiveAuthentication,
        	    e_aisChipAuthentication,
        	    e_aisTerminalAuthentication,
        	    e_aisCommunication
        	};
    
    		// Preamble
    	   	f_cfUp();
        	f_initializeMRTD("CFG.DFLT.EAC");
        	f_initializeIS(""); 
        	
    		// Test Body
    		t_ac.start(PXT_TWAIT);
        	alt {
        		[] a_advancedInspectionProcedure();
        
        		[PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports();
         		
        		[] t_ac.timeout {
        			log("**** TC_LDS_H03: Timeout: No more communication ****");
        		}
        	}       	    
        	
			f_establishVerdict("TC_LDS_H03", vt_expectedFailResults, vt_expectedPassResults);
			
			// Postamble
			f_cleanUp();
    	        
		} // end TC_LDS_H03

        // LDS_H07: RSASSA-PKCS1_v15 with SHA512, SHA512 DG hash, DS stored inside SOD
        // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD
		// contains RSASSAPKCS1_v15 with SHA512, SHA512 DG hash, DS stored inside SOD
        // Profile: AIP
        // Configuration file: default EAC + modif EF.SOD 
        // Expected results: "ePassport inspection procedure successful"
        // Interface: BAC: PASS, PA: PASS, AA: NP, TA: PASS, CA: PASS, COM: PASS
        testcase TC_LDS_H07() runs on MRTD system MRTD_System {
        	
            var template IsVerdictList vt_expectedFailResults := {};
        	var template IsVerdictList vt_expectedPassResults := { 
        	    e_aisNoFailure,       	    
        	    e_aisBacAuthentication,
        	    e_aisPassiveAuthentication,
        	    e_aisChipAuthentication,
        	    e_aisTerminalAuthentication,
        	    e_aisCommunication
        	};
    
    		// Preamble
    	   	f_cfUp();
        	f_initializeMRTD("CFG.EAC.LDS.H07");
        	f_initializeIS(""); 
        	
    		// Test Body
    		t_ac.start(PXT_TWAIT);
        	alt {
        		[] a_advancedInspectionProcedure();
        
        		[PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports();
         		
        		[] t_ac.timeout {
        			log("**** TC_LDS_H07: Timeout: No more communication ****");
        		}
        	}       	    
        	
			f_establishVerdict("TC_LDS_H07", vt_expectedFailResults, vt_expectedPassResults);
			
			// Postamble
			f_cleanUp();
    	        
		} // end TC_LDS_H07

        // LDS_H22: SignedData illegal digestAlgorithm (MD5)
        // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is
		// wrong (SignedData with illegal digestAlgorithm)
        // Profile: AIP
        // Configuration file: default EAC + EF.SOD with illegal digestAlgorithm in SignedData (MD5)
        // Expected results: "ePassport inspection procedure failed"
        // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL
        testcase TC_LDS_H22() runs on MRTD system MRTD_System {
        	
            var template IsVerdictList vt_expectedFailResults := {
            	e_aisPassiveAuthentication,
            	e_aisEfSod
            };
        	var template IsVerdictList vt_expectedPassResults := { 
        	    e_aisBacAuthentication,
        	    e_aisChipAuthentication,
        	    e_aisTerminalAuthentication,
        	    e_aisCommunication
        	};
    
    		// Preamble
    	   	f_cfUp();
        	f_initializeMRTD("CFG.EAC.LDS.H22");
        	f_initializeIS(""); 
        	
    		// Test Body
    		t_ac.start(PXT_TWAIT);
        	alt {
        		[] a_advancedInspectionProcedure();
        
        		[PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports();
         		
        		[] t_ac.timeout {
        			log("**** TC_LDS_H22: Timeout: No more communication ****");
        		}
        	}       	    
        	
			f_establishVerdict("TC_LDS_H22", vt_expectedFailResults, vt_expectedPassResults);
			
			// Postamble
			f_cleanUp();
    	        
		} // end TC_LDS_H22

        // LDS_H24: SignedData incorrect content type OID for id-icaoldsSecurityObject
        // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is
		// wrong (SignedData incorrect content type OID for idicaoldsSecurityObject)
        // Profile: AIP
        // Configuration file: default EAC + Use EF.SOD with incorrect content type OID for idicaoldsSecurityObject in SignedData
        // Expected results: "ePassport inspection procedure failed"
        // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL
        testcase TC_LDS_H24() runs on MRTD system MRTD_System {
        	
            var template IsVerdictList vt_expectedFailResults := {
            	e_aisPassiveAuthentication,
            	e_aisEfSod
            };
        	var template IsVerdictList vt_expectedPassResults := { 
        	    e_aisBacAuthentication,
        	    e_aisChipAuthentication,
        	    e_aisTerminalAuthentication,
        	    e_aisCommunication
        	};
    
    		// Preamble
    	   	f_cfUp();
        	f_initializeMRTD("CFG.EAC.LDS.H24");
        	f_initializeIS(""); 
        	
    		// Test Body
    		t_ac.start(PXT_TWAIT);
        	alt {
        		[] a_advancedInspectionProcedure();
        
        		[PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports();
         		
        		[] t_ac.timeout {
        			log("**** TC_LDS_H24: Timeout: No more communication ****");
        		}
        	}       	    
        	
			f_establishVerdict("TC_LDS_H24", vt_expectedFailResults, vt_expectedPassResults);
			
			// Postamble
			f_cleanUp();
    	        
		} // end TC_LDS_H24

        // LDS_H31: SignerInfo, missing digestAlgorithm
        // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is
		// wrong (SignerInfo, missing digestAlgorithm)
        // Profile: AIP
        // Configuration file: default EAC + EF.SOD with missing digestAlgorithm in SignerInfo
        // Expected results: "ePassport inspection procedure failed"
        // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL
        testcase TC_LDS_H31() runs on MRTD system MRTD_System {
        	
            var template IsVerdictList vt_expectedFailResults := {
            	e_aisPassiveAuthentication,
            	e_aisEfSod
            };
        	var template IsVerdictList vt_expectedPassResults := { 
        	    e_aisBacAuthentication,
        	    e_aisChipAuthentication,
        	    e_aisTerminalAuthentication,
        	    e_aisCommunication
        	};
    
    		// Preamble
    	   	f_cfUp();
        	f_initializeMRTD("CFG.EAC.LDS.H31");
        	f_initializeIS(""); 
        	
    		// Test Body
    		t_ac.start(PXT_TWAIT);
        	alt {
        		[] a_advancedInspectionProcedure();
        
        		[PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports();
         		
        		[] t_ac.timeout {
        			log("**** TC_LDS_H31: Timeout: No more communication ****");
        		}
        	}       	    
        	
			f_establishVerdict("TC_LDS_H31", vt_expectedFailResults, vt_expectedPassResults);
			
			// Postamble
			f_cleanUp();
    	        
		} // end TC_LDS_H31

        // LDS_H32: SignerInfo, incorrect messageDigest attribute value
        // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is
		// wrong (SignerInfo, incorrect messageDigest attribute value)
        // Profile: AIP
        // Configuration file: default EAC + EF.SOD with incorrect messageDigest attribute value in SignerInfo
        // Expected results: "ePassport inspection procedure failed"
        // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL
        testcase TC_LDS_H32() runs on MRTD system MRTD_System {
        	
            var template IsVerdictList vt_expectedFailResults := {
            	e_aisPassiveAuthentication,
            	e_aisEfSod
            };
        	var template IsVerdictList vt_expectedPassResults := { 
        	    e_aisBacAuthentication,
        	    e_aisChipAuthentication,
        	    e_aisTerminalAuthentication,
        	    e_aisCommunication
        	};
    
    		// Preamble
    	   	f_cfUp();
        	f_initializeMRTD("CFG.EAC.LDS.H32");
        	f_initializeIS(""); 
        	
    		// Test Body
    		t_ac.start(PXT_TWAIT);
        	alt {
        		[] a_advancedInspectionProcedure();
        
        		[PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports();
         		
        		[] t_ac.timeout {
        			log("**** TC_LDS_H32: Timeout: No more communication ****");
        		}
        	}       	    
        	
			f_establishVerdict("TC_LDS_H32", vt_expectedFailResults, vt_expectedPassResults);
			
			// Postamble
			f_cleanUp();
    	        
		} // end TC_LDS_H32

        // LDS_H33: SignerInfo, missing messageDigest attribute
        // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is
		// wrong (SignerInfo, missing messageDigest attribute)
        // Profile: AIP
        // Configuration file: default EAC + EF.SOD with missing messageDigest attribute in SignerInfo
        // Expected results: "ePassport inspection procedure failed"
        // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL
        testcase TC_LDS_H33() runs on MRTD system MRTD_System {
        	
            var template IsVerdictList vt_expectedFailResults := {
            	e_aisPassiveAuthentication,
            	e_aisEfSod
            };
        	var template IsVerdictList vt_expectedPassResults := { 
        	    e_aisBacAuthentication,
        	    e_aisChipAuthentication,
        	    e_aisTerminalAuthentication,
        	    e_aisCommunication
        	};
    
    		// Preamble
    	   	f_cfUp();
        	f_initializeMRTD("CFG.EAC.LDS.H33");
        	f_initializeIS(""); 
        	
    		// Test Body
    		t_ac.start(PXT_TWAIT);
        	alt {
        		[] a_advancedInspectionProcedure();
        
        		[PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports();
         		
        		[] t_ac.timeout {
        			log("**** TC_LDS_H33: Timeout: No more communication ****");
        		}
        	}       	    
        	
			f_establishVerdict("TC_LDS_H33", vt_expectedFailResults, vt_expectedPassResults);
			
			// Postamble
			f_cleanUp();
    	        
		} // end TC_LDS_H33

        // LDS_H37: SignerInfo, incorrect Signature
        // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is
        // wrong (SignerInfo, incorrect Signature)
@@ -1583,6 +1889,315 @@ module ePassport_Testcases {
    	        
		} // end TC_LDS_H37

        // LDS_H45: LDS Security Object, additional DataGroup Hash value for DG10
        // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is
		// wrong (LDS Security Object, additional DataGroup Hash value for DG10)
        // Profile: AIP
        // Configuration file: default EAC + EF.SOD with additional DataGroup Hash value for DG10 in LDS
		//					   Security Object
        // Expected results: "ePassport inspection procedure failed"
        // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL
        testcase TC_LDS_H45() runs on MRTD system MRTD_System {
        	
            var template IsVerdictList vt_expectedFailResults := {
            	e_aisPassiveAuthentication,
            	e_aisEfSod
            };
        	var template IsVerdictList vt_expectedPassResults := { 
        	    e_aisBacAuthentication,
        	    e_aisChipAuthentication,
        	    e_aisTerminalAuthentication,
        	    e_aisCommunication
        	};
    
    		// Preamble
    	   	f_cfUp();
        	f_initializeMRTD("CFG.EAC.LDS.H45");
        	f_initializeIS(""); 
        	
    		// Test Body
    		t_ac.start(PXT_TWAIT);
        	alt {
        		[] a_advancedInspectionProcedure();
        
        		[PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports();
         		
        		[] t_ac.timeout {
        			log("**** TC_LDS_H45: Timeout: No more communication ****");
        		}
        	}       	    
        	
			f_establishVerdict("TC_LDS_H45", vt_expectedFailResults, vt_expectedPassResults);
			
			// Postamble
			f_cleanUp();
    	        
		} // end TC_LDS_H45

        // LDS_H51: DS certificate, signature element does not match SignatureAlgorithm
        // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is
		// wrong (DS certificate, signature element does not match SignatureAlgorithm)
        // Profile: AIP
        // Configuration file: default EAC + EF.SOD with signature element that does not match
		// 					   SignatureAlgorithm in DS certificate
        // Expected results: "ePassport inspection procedure failed"
        // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL
        testcase TC_LDS_H51() runs on MRTD system MRTD_System {
        	
            var template IsVerdictList vt_expectedFailResults := {
            	e_aisPassiveAuthentication,
            	e_aisEfSod
            };
        	var template IsVerdictList vt_expectedPassResults := { 
        	    e_aisBacAuthentication,
        	    e_aisChipAuthentication,
        	    e_aisTerminalAuthentication,
        	    e_aisCommunication
        	};
    
    		// Preamble
    	   	f_cfUp();
        	f_initializeMRTD("CFG.EAC.LDS.H51");
        	f_initializeIS(""); 
        	
    		// Test Body
    		t_ac.start(PXT_TWAIT);
        	alt {
        		[] a_advancedInspectionProcedure();
        
        		[PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports();
         		
        		[] t_ac.timeout {
        			log("**** TC_LDS_H51: Timeout: No more communication ****");
        		}
        	}       	    
        	
			f_establishVerdict("TC_LDS_H51", vt_expectedFailResults, vt_expectedPassResults);
			
			// Postamble
			f_cleanUp();
    	        
		} // end TC_LDS_H51

        // LDS_H54: DS certificate, issuer element does not match CSCA subject value
        // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is
		// wrong (DS certificate, incorrect issuer element (does not match CSCA subject value))
        // Profile: AIP
        // Configuration file: default EAC + EF.SOD with incorrect issuer element (does not match CSCA subject value) 
        //					   in DS certificate
        // Expected results: "ePassport inspection procedure failed"
        // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL
        testcase TC_LDS_H54() runs on MRTD system MRTD_System {
        	
            var template IsVerdictList vt_expectedFailResults := {
            	e_aisPassiveAuthentication,
            	e_aisEfSod
            };
        	var template IsVerdictList vt_expectedPassResults := { 
        	    e_aisBacAuthentication,
        	    e_aisChipAuthentication,
        	    e_aisTerminalAuthentication,
        	    e_aisCommunication
        	};
    
    		// Preamble
    	   	f_cfUp();
        	f_initializeMRTD("CFG.EAC.LDS.H54");
        	f_initializeIS(""); 
        	
    		// Test Body
    		t_ac.start(PXT_TWAIT);
        	alt {
        		[] a_advancedInspectionProcedure();
        
        		[PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports();
         		
        		[] t_ac.timeout {
        			log("**** TC_LDS_H54: Timeout: No more communication ****");
        		}
        	}       	    
        	
			f_establishVerdict("TC_LDS_H54", vt_expectedFailResults, vt_expectedPassResults);
			
			// Postamble
			f_cleanUp();
    	        
		} // end TC_LDS_H54

        // LDS_H63: DS certificate, incorrect keyUsage extension (digitalSignature bit not asserted)
        // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is
		// wrong (DS certificate, incorrect keyUsage extension (digitalSignature bit not asserted))
        // Profile: AIP
        // Configuration file: default EAC + EF.SOD with incorrect keyUsage extension (digitalSignature bit not
		//					   asserted) in DS certificate
        // Expected results: "ePassport inspection procedure failed"
        // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL
        testcase TC_LDS_H63() runs on MRTD system MRTD_System {
        	
            var template IsVerdictList vt_expectedFailResults := {
            	e_aisPassiveAuthentication,
            	e_aisEfSod
            };
        	var template IsVerdictList vt_expectedPassResults := { 
        	    e_aisBacAuthentication,
        	    e_aisChipAuthentication,
        	    e_aisTerminalAuthentication,
        	    e_aisCommunication
        	};
    
    		// Preamble
    	   	f_cfUp();
        	f_initializeMRTD("CFG.EAC.LDS.H63");
        	f_initializeIS(""); 
        	
    		// Test Body
    		t_ac.start(PXT_TWAIT);
        	alt {
        		[] a_advancedInspectionProcedure();
        
        		[PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports();
         		
        		[] t_ac.timeout {
        			log("**** TC_LDS_H63: Timeout: No more communication ****");
        		}
        	}       	    
        	
			f_establishVerdict("TC_LDS_H63", vt_expectedFailResults, vt_expectedPassResults);
			
			// Postamble
			f_cleanUp();
    	        
		} // end TC_LDS_H63

        // LDS_H71: ECDSA with SHA256 (ANSI OID), SHA256 DG hash, DS stored inside SOD
        // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD
		// contains ECDSA with SHA256 (ANSI OID), SHA256 DG hash, DS stored inside SOD
        // Profile: AIP
        // Configuration file: default EAC + modif EF.SOD
        // Expected results: "ePassport inspection procedure successful"
        // Interface: BAC: PASS, PA: PASS, AA: NP, TA: PASS, CA: PASS, COM: PASS
        testcase TC_LDS_H71() runs on MRTD system MRTD_System {
        	
            var template IsVerdictList vt_expectedFailResults := {};
        	var template IsVerdictList vt_expectedPassResults := {
        	    e_aisNoFailure, 
        	    e_aisBacAuthentication,
            	e_aisPassiveAuthentication,
        	    e_aisChipAuthentication,
        	    e_aisTerminalAuthentication,
        	    e_aisCommunication
        	};
    
    		// Preamble
    	   	f_cfUp();
        	f_initializeMRTD("CFG.EAC.LDS.H71");
        	f_initializeIS(""); 
        	
    		// Test Body
    		t_ac.start(PXT_TWAIT);
        	alt {
        		[] a_advancedInspectionProcedure();
        
        		[PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports();
         		
        		[] t_ac.timeout {
        			log("**** TC_LDS_H71: Timeout: No more communication ****");
        		}
        	}       	    
        	
			f_establishVerdict("TC_LDS_H71", vt_expectedFailResults, vt_expectedPassResults);
			
			// Postamble
			f_cleanUp();
    	        
		} // end TC_LDS_H71

        // LDS_H75: Different valid signature algorithms in SOD and DS
        // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD
		// contains contains two different valid signature algorithms in SOD and DS
        // Profile: AIP
        // Configuration file: default EAC + modif EF.SOD
        // Expected results: "ePassport inspection procedure successful"
        // Interface: BAC: PASS, PA: PASS, AA: NP, TA: PASS, CA: PASS, COM: PASS
        testcase TC_LDS_H75() runs on MRTD system MRTD_System {
        	
            var template IsVerdictList vt_expectedFailResults := {};
        	var template IsVerdictList vt_expectedPassResults := {
        	    e_aisNoFailure, 
        	    e_aisBacAuthentication,
            	e_aisPassiveAuthentication,
        	    e_aisChipAuthentication,
        	    e_aisTerminalAuthentication,
        	    e_aisCommunication
        	};
    
    		// Preamble
    	   	f_cfUp();
        	f_initializeMRTD("CFG.EAC.LDS.H75");
        	f_initializeIS(""); 
        	
    		// Test Body
    		t_ac.start(PXT_TWAIT);
        	alt {
        		[] a_advancedInspectionProcedure();
        
        		[PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports();
         		
        		[] t_ac.timeout {
        			log("**** TC_LDS_H75: Timeout: No more communication ****");
        		}
        	}       	    
        	
			f_establishVerdict("TC_LDS_H75", vt_expectedFailResults, vt_expectedPassResults);
			
			// Postamble
			f_cleanUp();
    	        
		} // end TC_LDS_H75

        // LDS_H83: RSASSA-PKCS1_v15 with SHA512, SHA512 DG hash, DS stored inside SOD, RSA OID
        // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD
		// contains RSASSAPKCS1_v15 with SHA512, SHA512 DG hash, DS stored inside SOD
        // Profile: AIP
        // Configuration file: default EAC + modif EF.SOD
        // Expected results: "ePassport inspection procedure successful"
        // Interface: BAC: PASS, PA: PASS, AA: NP, TA: PASS, CA: PASS, COM: PASS
        testcase TC_LDS_H83() runs on MRTD system MRTD_System {
        	
            var template IsVerdictList vt_expectedFailResults := {};
        	var template IsVerdictList vt_expectedPassResults := {
        	    e_aisNoFailure, 
        	    e_aisBacAuthentication,
            	e_aisPassiveAuthentication,
        	    e_aisChipAuthentication,
        	    e_aisTerminalAuthentication,
        	    e_aisCommunication
        	};
    
    		// Preamble
    	   	f_cfUp();
        	f_initializeMRTD("CFG.EAC.LDS.H83");
        	f_initializeIS(""); 
        	
    		// Test Body
    		t_ac.start(PXT_TWAIT);
        	alt {
        		[] a_advancedInspectionProcedure();
        
        		[PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports();
         		
        		[] t_ac.timeout {
        			log("**** TC_LDS_H83: Timeout: No more communication ****");
        		}
        	}       	    
        	
			f_establishVerdict("TC_LDS_H83", vt_expectedFailResults, vt_expectedPassResults);
			
			// Postamble
			f_cleanUp();
    	        
		} // end TC_LDS_H83
		
	} // end groupLDS_H
	
	group groupLDS_I {