TestCodec_Certificates.ttcn 60.3 KB
Newer Older
garciay's avatar
garciay committed
1
2
3
4
5
6
7
8
9
10
11
12
13
/*
 * @author
 *     
 * @version
 *     1.0
 * @desc
 *     
 * @remark
 *     
 * @see
 *     
 */ 
module TestCodec_Certificates {
garciay's avatar
garciay committed
14
  
garciay's avatar
garciay committed
15
16
17
  // LibCommon
  import from LibCommon_BasicTypesAndValues all;
  import from LibCommon_DataStrings all;
garciay's avatar
garciay committed
18
19
20
21
22
23
  
  // LibIts
  import from IEEE1609dot2BaseTypes language "ASN.1:1997" all;
  import from IEEE1609dot2 language "ASN.1:1997" all;
  import from EtsiTs103097Module language "ASN.1:1997" all;
  
24
25
  // LibItsSecurity
  import from LibItsSecurity_EncdecDeclarations all;
garciay's avatar
garciay committed
26
27
28
29
  import from LibItsSecurity_TypesAndValues all;
  import from LibItsSecurity_Templates all;
  import from LibItsSecurity_Functions all;
  import from LibItsSecurity_Pixits all;
30
  
garciay's avatar
garciay committed
31
32
33
  // TestCodec
  import from TestCodec_TestAndSystem all;
  
garciay's avatar
garciay committed
34
35
36
37
38
39
40
41
42
43
44
45
46
47
  /**
   * @desc Root certificate / NistP256
   * @see ETSI TS 103 097 V1.3.1 Clause 7.2.1 Authorization tickets
   */
  testcase tc_root_certificate_sha256_1() runs on TCType system TCType {
    var template (value) EtsiTs103097Certificate v_cert; // ETSI TS 103 097 V1.3.1 Clause 6 Bullet 1
    var EtsiTs103097Certificate v_cert_dec; 
    var charstring v_certId := "STF538 Root Certificate";
    var HashAlgorithm v_self := sha256; // ETSI TS 103 097 V1.3.1 Clause 7.2.3 Root CA certificates Bullet 1
    var SequenceOfPsidSsp v_appPermissions := { // ETSI TS 102 965 Table A.1: ETSI ITS standardized ITS-AIDs
      valueof(m_appPermissions(36, { bitmapSsp := '830001'O })), 
      valueof(m_appPermissions(37, { bitmapSsp := '830001'O })) 
    };
    var SequenceOfPsidSspRange v_certIssuePermissions := { // ETSI TS 103 097 V1.3.1 Clause 7.2.3 Root CA certificates Bullet 3
48
      valueof(m_psidSspRange(1)) 
garciay's avatar
garciay committed
49
50
51
52
    };
    var Oct32 v_private_key := int2oct(0, 32);
    var Oct32 v_publicKeyX := int2oct(0, 32);
    var Oct32 v_publicKeyY := int2oct(0, 32);
53
54
    var Oct32 v_publicKeyCompressed := int2oct(0, 32);
    var integer v_compressedMode;
garciay's avatar
garciay committed
55
56
57
    var HashedId8 v_sha256AndDigest;
    var Oct32 v_sig := int2oct(0, 32);
    var bitstring v_encMsg := ''B;
58
    var EccP256CurvePoint v_eccPoint;
garciay's avatar
garciay committed
59
60
      
    // Generate Private/Public keys
61
62
63
64
65
66
67
    f_generate_key_pair_nistp256(v_private_key, v_publicKeyX, v_publicKeyY, v_publicKeyCompressed, v_compressedMode);
    // Fill Certificate template with the public compressed keys (canonical form)
    if (v_compressedMode == 0) {
      v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_0(v_publicKeyCompressed));
    } else {
      v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_1(v_publicKeyCompressed));
    }
garciay's avatar
garciay committed
68
69
70
71
72
73
74
75
76
77
78
79
80
  v_cert := m_etsiTs103097Certificate(
                                      m_issuerIdentifier_self(v_self),
                                      m_toBeSignedCertificate_ca(
                                                              { name := v_certId },
                                                              v_appPermissions,
                                                              { 
                                                                m_psidGroupPermissions(
                                                                                       m_subjectPermissions_explicit(
                                                                                                                     v_certIssuePermissions
                                                                                                                     ))
                                                                },
                                                              m_verificationKeyIndicator_verificationKey( 
                                                                                                         m_publicVerificationKey_ecdsaNistP256(
81
82
                                                                                                                                               v_eccPoint
                                                                                                                                               )),
garciay's avatar
garciay committed
83
84
85
86
87
88
89
                                                              m_validityPeriod(
                                                                               17469212,
                                                                               m_duration_years(10)
                                                                               )
                                                              )
                                      );
    // Encode it ==> Get octetstring
garciay's avatar
garciay committed
90
    log("Encode template ", valueof(v_cert.toBeSigned));
91
    v_encMsg := encvalue(v_cert.toBeSigned);
garciay's avatar
garciay committed
92
    // Sign the certificate using ECDSA/SHA-256 (NIST p-256)
93
    // IEEE Std 1609.2-20XX Clause 5.3.1 ii) If the verification type is self-signed, signer identifier input shall be the empty string, i.e., a string of length 0.
94
    v_sig := f_signWithEcdsaNistp256WithSha256(bit2oct(v_encMsg), int2oct(0, 32), v_private_key);
95
96
97
98
99
100
101
102
103
104
105
106
    if (lengthof(v_sig) != 64) {
      log("Invalid signature: ", v_sig);
      setverdict(fail);
    }
    v_cert.signature_ := m_signature_ecdsaNistP256(
                                                   m_ecdsaP256Signature(
                                                                        m_eccP256CurvePoint_x_only(
                                                                                                   substr(v_sig, 0, 32)
                                                                                                   ),
                                                                        substr(v_sig, 32, 32)
                                                                        )
                                                   );
garciay's avatar
garciay committed
107
108
109
    // Final certificate
  v_encMsg := encvalue(v_cert);
    setverdict(pass, "Encoding passed.");
110
    // Decode and check signature
garciay's avatar
garciay committed
111
112
113
114
    if (decvalue(v_encMsg, v_cert_dec) != 0) {
      setverdict(fail);
      stop;
    }
115
116
117
118
119
120
121
122
    v_encMsg := encvalue(v_cert_dec.toBeSigned);
    if (ischosen(v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_0)) {
      v_compressedMode := 0;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_0;
    } else {
      v_compressedMode := 1;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_1;
    }
garciay's avatar
garciay committed
123
124
    if (f_verifyWithEcdsaNistp256WithSha256(
                                            bit2oct(v_encMsg), 
125
                                            int2oct(0, 32),
garciay's avatar
garciay committed
126
                                            v_cert_dec.signature_.ecdsaNistP256Signature.rSig.x_only & v_cert_dec.signature_.ecdsaNistP256Signature.sSig,
127
128
                                            v_publicKeyCompressed,
                                            v_compressedMode
garciay's avatar
garciay committed
129
                                            ) == false) {
garciay's avatar
garciay committed
130
131
132
      setverdict(fail);
    } else {
      setverdict(pass)
garciay's avatar
garciay committed
133
134
      }
    
garciay's avatar
garciay committed
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
  } // End of testcase tc_root_certificate_sha256_1
   
  /**
   * @desc Root certificate / BrainpoolP256
   * @see ETSI TS 103 097 V1.3.1 Clause 7.2.1 Authorization tickets
   */
  testcase tc_root_certificate_sha256_2() runs on TCType system TCType {
    var template (value) EtsiTs103097Certificate v_cert; // ETSI TS 103 097 V1.3.1 Clause 6 Bullet 1
    var EtsiTs103097Certificate v_cert_dec; 
    var charstring v_certId := "STF538 Root Certificate";
    var HashAlgorithm v_self := sha256; // ETSI TS 103 097 V1.3.1 Clause 7.2.3 Root CA certificates Bullet 1
    var SequenceOfPsidSsp v_appPermissions := { // ETSI TS 102 965 Table A.1: ETSI ITS standardized ITS-AIDs
      valueof(m_appPermissions(36, { bitmapSsp := '830001'O })), 
      valueof(m_appPermissions(37, { bitmapSsp := '830001'O })) 
    };
    var SequenceOfPsidSspRange v_certIssuePermissions := { // ETSI TS 103 097 V1.3.1 Clause 7.2.3 Root CA certificates Bullet 3
151
      valueof(m_psidSspRange(1)) 
garciay's avatar
garciay committed
152
153
154
155
    };
    var Oct32 v_private_key := int2oct(0, 32);
    var Oct32 v_publicKeyX := int2oct(0, 32);
    var Oct32 v_publicKeyY := int2oct(0, 32);
156
157
    var Oct32 v_publicKeyCompressed := int2oct(0, 32);
    var integer v_compressedMode;
garciay's avatar
garciay committed
158
159
160
    var HashedId8 v_sha256AndDigest;
    var Oct32 v_sig := int2oct(0, 32);
    var bitstring v_encMsg := ''B;
161
    var EccP256CurvePoint v_eccPoint;
garciay's avatar
garciay committed
162
163
      
    // Generate Private/Public keys
164
165
166
167
168
169
170
    f_generate_key_pair_brainpoolp256(v_private_key, v_publicKeyX, v_publicKeyY, v_publicKeyCompressed, v_compressedMode);
    // Fill Certificate template with the public key using canonical form
    if (v_compressedMode == 0) {
      v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_0(v_publicKeyCompressed));
    } else {
      v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_1(v_publicKeyCompressed));
    }
garciay's avatar
garciay committed
171
172
173
  v_cert := m_etsiTs103097Certificate(
                                      m_issuerIdentifier_self(v_self),
                                      m_toBeSignedCertificate_ca(
garciay's avatar
garciay committed
174
175
176
177
178
179
180
181
182
                                                              { name := v_certId },
                                                              v_appPermissions,
                                                              { 
                                                                m_psidGroupPermissions(
                                                                                       m_subjectPermissions_explicit(
                                                                                                                     v_certIssuePermissions
                                                                                                                     ))
                                                                },
                                                              m_verificationKeyIndicator_verificationKey( 
183
184
185
                                                                                                         m_publicVerificationKey_ecdsaBrainpoolP256r1(
                                                                                                                                                      v_eccPoint
                                                                                                                                                      )),
garciay's avatar
garciay committed
186
187
188
189
190
                                                              m_validityPeriod(
                                                                               17469212,
                                                                               m_duration_years(10)
                                                                               )
                                                                 )
garciay's avatar
garciay committed
191
192
                                      );
    // Encode it ==> Get octetstring
garciay's avatar
garciay committed
193
    log("Encode template ", valueof(v_cert.toBeSigned));
194
    v_encMsg := encvalue(v_cert.toBeSigned);
garciay's avatar
garciay committed
195
    // Sign the certificate using ECDSA/SHA-256 (NIST p-256)
196
    v_sig := f_signWithEcdsaBrainpoolp256WithSha256(bit2oct(v_encMsg), int2oct(0, 32), v_private_key);
197
198
199
200
201
202
203
204
205
206
207
208
    if (lengthof(v_sig) != 64) {
      log("Invalid signature: ", v_sig);
      setverdict(fail);
    }
    v_cert.signature_ := m_signature_ecdsaBrainpoolP256r1(
                                                          m_ecdsaP256Signature(
                                                                               m_eccP256CurvePoint_x_only(
                                                                                                          substr(v_sig, 0, 32)
                                                                                                          ),
                                                                               substr(v_sig, 32, 32)
                                                                               )
                                                          );
garciay's avatar
garciay committed
209
210
211
    // Final certificate
  v_encMsg := encvalue(v_cert);
    setverdict(pass, "Encoding passed.");
212
    // Decode and check signature
garciay's avatar
garciay committed
213
214
215
216
217
    if (decvalue(v_encMsg, v_cert_dec) != 0) {
      setverdict(fail);
      stop;
    }
    v_encMsg := encvalue(v_cert_dec.toBeSigned);
218
219
220
221
222
223
224
    if (ischosen(v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_0)) {
      v_compressedMode := 0;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_0;
    } else {
      v_compressedMode := 1;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_1;
    }
garciay's avatar
garciay committed
225
226
    if (f_verifyWithEcdsaBrainpoolp256WithSha256(
                                                 bit2oct(v_encMsg), 
227
                                                 int2oct(0, 32),
garciay's avatar
garciay committed
228
                                                 v_cert_dec.signature_.ecdsaBrainpoolP256r1Signature.rSig.x_only & v_cert_dec.signature_.ecdsaBrainpoolP256r1Signature.sSig,
229
230
                                                 v_publicKeyCompressed,
                                                 v_compressedMode
garciay's avatar
garciay committed
231
                                                 ) == false) {
garciay's avatar
garciay committed
232
233
234
      setverdict(fail);
    } else {
      setverdict(pass)
garciay's avatar
garciay committed
235
236
      }
    
garciay's avatar
garciay committed
237
238
  } // End of testcase tc_root_certificate_sha256_2
   
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
  /**
   * @desc Root certificate / BrainpoolP256
   * @see ETSI TS 103 097 V1.3.1 Clause 7.2.1 Authorization tickets
   */
  testcase tc_root_certificate_sha256_3() runs on TCType system TCType {
    var template (value) EtsiTs103097Certificate v_cert; // ETSI TS 103 097 V1.3.1 Clause 6 Bullet 1
    var EtsiTs103097Certificate v_cert_dec; 
    var charstring v_certId := "STF538 Root Certificate";
    var HashAlgorithm v_self := sha256; // ETSI TS 103 097 V1.3.1 Clause 7.2.3 Root CA certificates Bullet 1
    var SequenceOfPsidSsp v_appPermissions := { // ETSI TS 102 965 Table A.1: ETSI ITS standardized ITS-AIDs
      valueof(m_appPermissions(36, { bitmapSsp := '830001'O })), 
      valueof(m_appPermissions(37, { bitmapSsp := '830001'O })) 
    };
    var SequenceOfPsidSspRange v_certIssuePermissions := { // ETSI TS 103 097 V1.3.1 Clause 7.2.3 Root CA certificates Bullet 3
      valueof(m_psidSspRange(1)) 
    };
    var Oct32 v_private_key := int2oct(0, 32);
    var Oct32 v_publicKeyX := int2oct(0, 32);
    var Oct32 v_publicKeyY := int2oct(0, 32);
258
    var Oct32 v_publicKeyCompressed := int2oct(0, 32);
259
260
261
    var Oct32 v_enc_private_key := int2oct(0, 32);
    var Oct32 v_enc_publicKeyX := int2oct(0, 32);
    var Oct32 v_enc_publicKeyY := int2oct(0, 32);
262
263
264
    var Oct32 v_enc_publicKeyCompressed := int2oct(0, 32);
    var integer v_compressedMode;
    var integer v_enc_compressedMode;
265
266
267
    var HashedId8 v_sha256AndDigest;
    var Oct32 v_sig := int2oct(0, 32);
    var bitstring v_encMsg := ''B;
268
    var EccP256CurvePoint v_eccPoint;
269
270
      
    // Generate Private/Public keys for signature
271
272
273
274
275
276
    f_generate_key_pair_brainpoolp256(v_private_key, v_publicKeyX, v_publicKeyY, v_publicKeyCompressed, v_compressedMode);
    if (v_compressedMode == 0) {
      v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_0(v_publicKeyCompressed));
    } else {
      v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_1(v_publicKeyCompressed));
    }
277
    // Generate Private/Public keys for encryption
278
    f_generate_key_pair_brainpoolp256(v_enc_private_key, v_enc_publicKeyX, v_enc_publicKeyY, v_enc_publicKeyCompressed, v_enc_compressedMode);
279
280
281
282
283
284
285
286
287
288
289
290
291
    // Fill Certificate template with the public key      
  v_cert := m_etsiTs103097Certificate(
                                      m_issuerIdentifier_self(v_self),
                                      m_toBeSignedCertificate_ca(
                                                                 { name := v_certId },
                                                                 v_appPermissions,
                                                                 { 
                                                                   m_psidGroupPermissions(
                                                                                          m_subjectPermissions_explicit(
                                                                                                                        v_certIssuePermissions
                                                                                                                        ))
                                                                   },
                                                                 m_verificationKeyIndicator_verificationKey( 
292
293
294
                                                                                                            m_publicVerificationKey_ecdsaBrainpoolP256r1(
                                                                                                                                                         v_eccPoint
                                                                                                                                                         )),
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
                                                                 m_validityPeriod(
                                                                                  17469212,
                                                                                  m_duration_years(10)
                                                                                  ),
                                                                 -, -, 
                                                                 m_encryptionKey(
                                                                                 aes128Ccm, 
                                                                                 m_publicEncryptionKey_eciesBrainpoolP256r1(                                                                                                                                                                       m_eccP256CurvePoint_uncompressed(
                                                                                                                                                                                                                                                                                                                                    v_enc_publicKeyX,
                                                                                                                                                                                                                                                                                                                                    v_enc_publicKeyY
                                                                                                                                                                                                                                                                                                                                    )
                                                                                                                                                                                                                                                                                                   )
                                                                                 )
                                                                 )
                                      );
    // Encode it ==> Get octetstring
    log("Encode template ", valueof(v_cert.toBeSigned));
312
    v_encMsg := encvalue(v_cert.toBeSigned);
313
    // Sign the certificate using ECDSA/SHA-256 (NIST p-256)
314
    v_sig := f_signWithEcdsaBrainpoolp256WithSha256(bit2oct(v_encMsg), int2oct(0, 32), v_private_key);
315
316
317
318
319
320
321
322
323
324
325
326
    if (lengthof(v_sig) != 64) {
      log("Invalid signature: ", v_sig);
      setverdict(fail);
    }
    v_cert.signature_ := m_signature_ecdsaBrainpoolP256r1(
                                                          m_ecdsaP256Signature(
                                                                               m_eccP256CurvePoint_x_only(
                                                                                                          substr(v_sig, 0, 32)
                                                                                                          ),
                                                                               substr(v_sig, 32, 32)
                                                                               )
                                                          );
327
328
329
330
331
332
333
334
335
    // Final certificate
  v_encMsg := encvalue(v_cert);
    setverdict(pass, "Encoding passed.");
    // Decode and check signature
    if (decvalue(v_encMsg, v_cert_dec) != 0) {
      setverdict(fail);
      stop;
    }
    v_encMsg := encvalue(v_cert_dec.toBeSigned);
336
337
338
339
340
341
342
    if (ischosen(v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_0)) {
      v_compressedMode := 0;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_0;
    } else {
      v_compressedMode := 1;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_1;
    }
343
344
    if (f_verifyWithEcdsaBrainpoolp256WithSha256(
                                                 bit2oct(v_encMsg), 
345
                                                 int2oct(0, 32),
346
                                                 v_cert_dec.signature_.ecdsaBrainpoolP256r1Signature.rSig.x_only & v_cert_dec.signature_.ecdsaBrainpoolP256r1Signature.sSig,
347
348
                                                 v_publicKeyCompressed,
                                                 v_compressedMode
349
350
351
352
353
354
355
356
                                                 ) == false) {
      setverdict(fail);
    } else {
      setverdict(pass)
      }
    
  } // End of testcase tc_root_certificate_sha256_3
   
garciay's avatar
garciay committed
357
358
359
360
361
362
363
364
365
366
367
368
369
370
  /**
   * @desc Root certificate / BrainpoolP284
   * @see ETSI TS 103 097 V1.3.1 Clause 7.2.1 Authorization tickets
   */
  testcase tc_root_certificate_sha384_1() runs on TCType system TCType {
    var template (value) EtsiTs103097Certificate v_cert; // ETSI TS 103 097 V1.3.1 Clause 6 Bullet 1
    var EtsiTs103097Certificate v_cert_dec; 
    var charstring v_certId := "STF538 Root Certificate";
    var HashAlgorithm v_self := sha384; // ETSI TS 103 097 V1.3.1 Clause 7.2.3 Root CA certificates Bullet 1
    var SequenceOfPsidSsp v_appPermissions := { // ETSI TS 102 965 Table A.1: ETSI ITS standardized ITS-AIDs
      valueof(m_appPermissions(36, { bitmapSsp := '830001'O })), 
      valueof(m_appPermissions(37, { bitmapSsp := '830001'O })) 
    };
    var SequenceOfPsidSspRange v_certIssuePermissions := { // ETSI TS 103 097 V1.3.1 Clause 7.2.3 Root CA certificates Bullet 3
371
      valueof(m_psidSspRange(1)) 
garciay's avatar
garciay committed
372
373
374
375
    };
    var Oct48 v_private_key := int2oct(0, 48);
    var Oct48 v_publicKeyX := int2oct(0, 48);
    var Oct48 v_publicKeyY := int2oct(0, 48);
376
377
    var Oct48 v_publicKeyCompressed := int2oct(0, 48);
    var integer v_compressedMode;
garciay's avatar
garciay committed
378
379
380
    var HashedId8 v_sha256AndDigest;
    var Oct48 v_sig := int2oct(0, 48);
    var bitstring v_encMsg := ''B;
381
    var EccP384CurvePoint v_eccPoint;
garciay's avatar
garciay committed
382
383
      
    // Generate Private/Public keys
384
385
386
387
388
389
    f_generate_key_pair_brainpoolp384(v_private_key, v_publicKeyX, v_publicKeyY, v_publicKeyCompressed, v_compressedMode);
    if (v_compressedMode == 0) {
      v_eccPoint := valueof(m_eccP384CurvePoint_compressed_y_0(v_publicKeyCompressed));
    } else {
      v_eccPoint := valueof(m_eccP384CurvePoint_compressed_y_1(v_publicKeyCompressed));
    }
garciay's avatar
garciay committed
390
391
392
393
394
395
396
397
398
399
400
401
402
    // Fill Certificate template with the public key      
  v_cert := m_etsiTs103097Certificate(
                                      m_issuerIdentifier_self(v_self),
                                      m_toBeSignedCertificate_ca(
                                                                  { name := v_certId },
                                                                  v_appPermissions,
                                                                  { 
                                                                    m_psidGroupPermissions(
                                                                                           m_subjectPermissions_explicit(
                                                                                                                         v_certIssuePermissions
                                                                                                                         ))
                                                                    },
                                                                  m_verificationKeyIndicator_verificationKey(
403
404
405
                                                                                                             m_publicVerificationKey_ecdsaBrainpoolP384r1(
                                                                                                                                                          v_eccPoint
                                                                                                                                                          )),
garciay's avatar
garciay committed
406
407
408
409
410
                                                                  m_validityPeriod(
                                                                                   17469212,
                                                                                   m_duration_years(10)
                                                                                   )
                                                                 )
garciay's avatar
garciay committed
411
                                      );
412
    // Encode it ==> Get octetstring
garciay's avatar
garciay committed
413
    log("Encode template ", valueof(v_cert.toBeSigned));
414
    v_encMsg := encvalue(v_cert.toBeSigned);
garciay's avatar
garciay committed
415
    // Sign the certificate
416
    v_sig := f_signWithEcdsaBrainpoolp384WithSha384(bit2oct(v_encMsg), int2oct(0, 48), v_private_key);
417
418
419
420
421
422
423
424
425
426
427
428
    if (lengthof(v_sig) != 96) {
      log("Invalid signature: ", v_sig);
      setverdict(fail);
    }
    v_cert.signature_ := m_signature_ecdsaBrainpoolP384r1(
                                                          m_ecdsaP384Signature(
                                                                               m_eccP384CurvePoint_x_only(
                                                                                                          substr(v_sig, 0, 48)
                                                                                                          ),
                                                                               substr(v_sig, 48, 48)
                                                                               )
                                                          );
garciay's avatar
garciay committed
429
430
431
    // Final certificate
  v_encMsg := encvalue(v_cert);
    setverdict(pass, "Encoding passed.");
432
    // Decode and check signature
garciay's avatar
garciay committed
433
434
435
436
437
    if (decvalue(v_encMsg, v_cert_dec) != 0) {
      setverdict(fail);
      stop;
    }
    v_encMsg := encvalue(v_cert_dec.toBeSigned);
438
439
440
441
442
443
444
    if (ischosen(v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP384r1.compressed_y_0)) {
      v_compressedMode := 0;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP384r1.compressed_y_0;
    } else {
      v_compressedMode := 1;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP384r1.compressed_y_1;
    }
garciay's avatar
garciay committed
445
446
    if (f_verifyWithEcdsaBrainpoolp384WithSha384(
                                                 bit2oct(v_encMsg), 
447
                                                 int2oct(0, 48),
448
449
450
                                                 v_cert_dec.signature_.ecdsaBrainpoolP384r1Signature.rSig.x_only & v_cert_dec.signature_.ecdsaBrainpoolP384r1Signature.sSig,
                                                 v_publicKeyCompressed,
                                                 v_compressedMode
garciay's avatar
garciay committed
451
                                                 ) == false) {
garciay's avatar
garciay committed
452
453
454
455
456
457
458
459
      setverdict(fail);
    } else {
      setverdict(pass)
    }

  } // End of testcase tc_root_certificate_sha384_1
   
  /**
460
   * @desc EA certificate / NistP256
garciay's avatar
garciay committed
461
462
463
464
465
466
467
468
469
470
471
472
473
474
   * @see ETSI TS 103 097 V1.3.1 Clause 7.2.1 Authorization tickets
   */
  testcase tc_ea_certificate_sha256_1() runs on TCType system TCType {
    var template (value) EtsiTs103097Certificate v_cert; // ETSI TS 103 097 V1.3.1 Clause 6 Bullet 1
    var EtsiTs103097Certificate v_cert_dec; 
    var charstring v_certId := "STF538 EA Certificate"; // ETSI TS 103 097 V1.3.1 Clause 7.2.2 Enrolment credential #5
    var HashedId8 v_sha256AndDigest := f_HashedId8FromSha256(f_hashWithSha256('616263'O)); // ETSI TS 103 097 V1.3.1 Clause 7.2.2 Enrolment credential #2
    var SequenceOfPsidSsp v_appPermissions := { // ETSI TS 102 965 Table A.1: ETSI ITS standardized ITS-AIDs
      valueof(m_appPermissions(36, { bitmapSsp := 'FF0001'O })), 
      valueof(m_appPermissions(37, { bitmapSsp := 'FF0001'O })) 
    };
    var Oct32 v_private_key := int2oct(0, 32);
    var Oct32 v_publicKeyX := int2oct(0, 32);
    var Oct32 v_publicKeyY := int2oct(0, 32);
475
476
    var Oct32 v_publicKeyCompressed := int2oct(0, 32);
    var integer v_compressedMode;
garciay's avatar
garciay committed
477
478
    var Oct32 v_sig := int2oct(0, 32);
    var bitstring v_encMsg := ''B;
479
    var EccP256CurvePoint v_eccPoint;
garciay's avatar
garciay committed
480
481
      
    // Generate Private/Public keys
482
483
484
485
486
487
    f_generate_key_pair_nistp256(v_private_key, v_publicKeyX, v_publicKeyY, v_publicKeyCompressed, v_compressedMode);
    if (v_compressedMode == 0) {
      v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_0(v_publicKeyCompressed));
    } else {
      v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_1(v_publicKeyCompressed));
    }
garciay's avatar
garciay committed
488
489
490
491
492
493
    // Fill Certificate template with the public key      
  v_cert := m_etsiTs103097Certificate(
                                      m_issuerIdentifier_sha256AndDigest(v_sha256AndDigest),
                                      m_toBeSignedCertificate_ea(
                                                                 { name := v_certId },
                                                                 v_appPermissions,
494
                                                                 m_verificationKeyIndicator_verificationKey(
garciay's avatar
garciay committed
495
                                                                                                            m_publicVerificationKey_ecdsaNistP256(
496
497
                                                                                                                                                  v_eccPoint
                                                                                                                                                  )),
498
499
500
501
502
503
504
505
506
507
508
                                                                 m_validityPeriod(
                                                                                  17469212,
                                                                                  m_duration_years(10)
                                                                                  ),
                                                                 m_geographicRegion_identifiedRegion(
                                                                                                     {
                                                                                                       m_identifiedRegion_country_only(12), 
                                                                                                       m_identifiedRegion_country_only(34)
                                                                                                     }
                                                                                                     )
                                                                 )
garciay's avatar
garciay committed
509
510
511
                                      );
    // Encode it ==> Get octetstring
    log("Encode template ", valueof(v_cert));
512
    v_encMsg := encvalue(v_cert.toBeSigned);
garciay's avatar
garciay committed
513
    // Sign the certificate using ECDSA/SHA-256 (NIST p-256)
514
    v_sig := f_signWithEcdsaNistp256WithSha256(bit2oct(v_encMsg), int2oct(10, 32), v_private_key);
515
516
517
518
519
520
521
522
523
524
525
526
    if (lengthof(v_sig) != 64) {
      log("Invalid signature: ", v_sig);
      setverdict(fail);
    }
    v_cert.signature_ := m_signature_ecdsaNistP256(
                                                   m_ecdsaP256Signature(
                                                                        m_eccP256CurvePoint_x_only(
                                                                                                   substr(v_sig, 0, 32)
                                                                                                   ),
                                                                        substr(v_sig, 32, 32)
                                                                        )
                                                   );
garciay's avatar
garciay committed
527
528
529
530
    // Final certificate
  v_encMsg := encvalue(v_cert);
      
    setverdict(pass, "Encoding passed.");
531
    // Decode and check signature
garciay's avatar
garciay committed
532
533
534
535
536
    if (decvalue(v_encMsg, v_cert_dec) != 0) {
      setverdict(fail);
      stop;
    }
    v_encMsg := encvalue(v_cert_dec.toBeSigned);
537
538
539
540
541
542
543
    if (ischosen(v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_0)) {
      v_compressedMode := 0;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_0;
    } else {
      v_compressedMode := 1;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_1;
    }
garciay's avatar
garciay committed
544
545
    if (f_verifyWithEcdsaNistp256WithSha256(
                                            bit2oct(v_encMsg), 
546
                                            int2oct(10, 32),
garciay's avatar
garciay committed
547
                                            v_cert_dec.signature_.ecdsaNistP256Signature.rSig.x_only & v_cert_dec.signature_.ecdsaNistP256Signature.sSig,
548
549
                                            v_publicKeyCompressed,
                                            v_compressedMode
garciay's avatar
garciay committed
550
551
552
553
554
555
556
557
                                           ) == false) {
      setverdict(fail);
    } else {
      setverdict(pass)
    }

  } // End of testcase tc_ea_certificate_sha256_1
   
garciay's avatar
garciay committed
558
559
560
561
562
563
  /**
   * @desc Authorisation Ticket certificate
   * @see ETSI TS 103 097 V1.3.1 Clause 7.2.1 Authorization tickets
   */
  testcase tc_at_certificate_sha256_1() runs on TCType system TCType {
    var template (value) EtsiTs103097Certificate v_cert; // ETSI TS 103 097 V1.3.1 Clause 6 Bullet 1
garciay's avatar
garciay committed
564
    var EtsiTs103097Certificate v_cert_dec; 
garciay's avatar
garciay committed
565
566
567
568
569
    var HashedId8 v_sha256AndDigest := f_HashedId8FromSha256(f_hashWithSha256('616263'O)); // ETSI TS 103 097 V1.3.1 Clause 7.2.1 Authorization tickets #2
    var SequenceOfPsidSsp v_appPermissions := { // ETSI TS 102 965 Table A.1: ETSI ITS standardized ITS-AIDs
      valueof(m_appPermissions(36, { bitmapSsp := '830001'O })), 
      valueof(m_appPermissions(37, { bitmapSsp := '830001'O })) 
    };
garciay's avatar
garciay committed
570
571
572
    var Oct32 v_private_key := int2oct(0, 32);
    var Oct32 v_publicKeyX := int2oct(0, 32);
    var Oct32 v_publicKeyY := int2oct(0, 32);
573
574
    var Oct32 v_publicKeyCompressed := int2oct(0, 32);
    var integer v_compressedMode;
garciay's avatar
garciay committed
575
    var Oct32 v_sig := int2oct(0, 32);
garciay's avatar
garciay committed
576
    var bitstring v_encMsg := ''B;
577
    var EccP256CurvePoint v_eccPoint;
garciay's avatar
garciay committed
578

579
    if (f_generate_key_pair_nistp256(v_private_key, v_publicKeyX, v_publicKeyY, v_publicKeyCompressed, v_compressedMode) == false) {
garciay's avatar
garciay committed
580
581
582
      setverdict(fail);
      stop;
    }
583
584
585
586
587
    if (v_compressedMode == 0) {
      v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_0(v_publicKeyCompressed));
    } else {
      v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_1(v_publicKeyCompressed));
    }
garciay's avatar
garciay committed
588
589
590
591
  v_cert := m_etsiTs103097Certificate(
                                      m_issuerIdentifier_sha256AndDigest(v_sha256AndDigest),
                                      m_toBeSignedCertificate_at(
                                                                 v_appPermissions,
592
                                                                 m_verificationKeyIndicator_verificationKey(
garciay's avatar
garciay committed
593
                                                                                                            m_publicVerificationKey_ecdsaNistP256(
594
595
                                                                                                                                                  v_eccPoint
                                                                                                                                                  )),
garciay's avatar
garciay committed
596
597
598
                                                                 m_validityPeriod(
                                                                                  17469212,
                                                                                  m_duration_years(10)
599
600
601
602
603
604
605
                                                                                  ),
                                                                 m_geographicRegion_identifiedRegion(
                                                                                                     {
                                                                                                       m_identifiedRegion_country_only(12), 
                                                                                                       m_identifiedRegion_country_only(34)
                                                                                                       }
                                                                                                     )
garciay's avatar
garciay committed
606
607
608
609
                                                                )
                                     );
    // Encode it ==> Get octetstring
    log("Encode template ", valueof(v_cert.toBeSigned));
610
    v_encMsg := encvalue(v_cert.toBeSigned);
garciay's avatar
garciay committed
611
    // Sign the certificate using ECDSA/SHA-256 (NIST p-256)
612
    v_sig := f_signWithEcdsaNistp256WithSha256(bit2oct(v_encMsg), int2oct(11, 32), v_private_key);
613
614
615
616
617
618
619
620
621
622
623
624
    if (lengthof(v_sig) != 64) {
      log("Invalid signature: ", v_sig);
      setverdict(fail);
    }
    v_cert.signature_ := m_signature_ecdsaNistP256(
                                                   m_ecdsaP256Signature(
                                                                        m_eccP256CurvePoint_x_only(
                                                                                                   substr(v_sig, 0, 32)
                                                                                                   ),
                                                                        substr(v_sig, 32, 32)
                                                                        )
                                                   );
garciay's avatar
garciay committed
625
    // Final certificate
garciay's avatar
garciay committed
626
    v_encMsg := TestEtsiTs103097Certificate(v_cert, false);
627
    // Decode and check signature
garciay's avatar
garciay committed
628
629
630
631
632
    if (decvalue(v_encMsg, v_cert_dec) != 0) {
      setverdict(fail);
      stop;
    }
    v_encMsg := encvalue(v_cert_dec.toBeSigned);
633
634
635
636
637
638
639
    if (ischosen(v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_0)) {
      v_compressedMode := 0;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_0;
    } else {
      v_compressedMode := 1;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_1;
    }
garciay's avatar
garciay committed
640
641
    if (f_verifyWithEcdsaNistp256WithSha256(
                                            bit2oct(v_encMsg), 
642
                                            int2oct(11, 32),
garciay's avatar
garciay committed
643
                                            v_cert_dec.signature_.ecdsaNistP256Signature.rSig.x_only & v_cert_dec.signature_.ecdsaNistP256Signature.sSig,
644
645
                                            v_publicKeyCompressed,
                                            v_compressedMode
garciay's avatar
garciay committed
646
647
648
649
650
651
                                           ) == false) {
      setverdict(fail);
    } else {
      setverdict(pass)
    }

garciay's avatar
garciay committed
652
653
654
655
656
657
658
659
660
661
662
663
664
665
  } // End of testcase tc_at_certificate_sha256_1
   
  /**
   * @desc Authorisation Ticket certificate
   * @see ETSI TS 103 097 V1.3.1 Clause 7.2.1 Authorization tickets
   */
  testcase tc_at_certificate_sha256_2() runs on TCType system TCType {
    var template (value) EtsiTs103097Certificate v_cert; // ETSI TS 103 097 V1.3.1 Clause 6 Bullet 1
    var EtsiTs103097Certificate v_cert_dec; 
    var HashedId8 v_sha256AndDigest := f_HashedId8FromSha256(f_hashWithSha256('616263'O)); // ETSI TS 103 097 V1.3.1 Clause 7.2.1 Authorization tickets #2
    var SequenceOfPsidSsp v_appPermissions := { // ETSI TS 102 965 Table A.1: ETSI ITS standardized ITS-AIDs
      valueof(m_appPermissions(36, { bitmapSsp := '830001'O })), 
      valueof(m_appPermissions(37, { bitmapSsp := '830001'O })) 
    };
666
    var SequenceOfPsidSspRange v_certRequestPermissions := { 
garciay's avatar
garciay committed
667
668
      valueof(m_psidSspRange(2)) 
    };
garciay's avatar
garciay committed
669
670
671
    var Oct32 v_private_key := int2oct(0, 32);
    var Oct32 v_publicKeyX := int2oct(0, 32);
    var Oct32 v_publicKeyY := int2oct(0, 32);
672
673
    var Oct32 v_publicKeyCompressed := int2oct(0, 32);
    var integer v_compressedMode;
garciay's avatar
garciay committed
674
    var Oct32 v_sig := int2oct(0, 32);
garciay's avatar
garciay committed
675
    var bitstring v_encMsg := ''B;
676
    var EccP256CurvePoint v_eccPoint;
garciay's avatar
garciay committed
677

678
    if (f_generate_key_pair_brainpoolp256(v_private_key, v_publicKeyX, v_publicKeyY, v_publicKeyCompressed, v_compressedMode) == false) {
garciay's avatar
garciay committed
679
680
681
      setverdict(fail);
      stop;
    }
682
683
684
685
686
    if (v_compressedMode == 0) {
      v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_0(v_publicKeyCompressed));
    } else {
      v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_1(v_publicKeyCompressed));
    }
garciay's avatar
garciay committed
687
688
689
690
  v_cert := m_etsiTs103097Certificate(
                                      m_issuerIdentifier_sha256AndDigest(v_sha256AndDigest),
                                      m_toBeSignedCertificate_at(
                                                                 v_appPermissions,
691
                                                                 m_verificationKeyIndicator_verificationKey(
692
693
694
                                                                                                            m_publicVerificationKey_ecdsaBrainpoolP256r1(
                                                                                                                                                         v_eccPoint
                                                                                                                                                         )),
garciay's avatar
garciay committed
695
696
697
698
699
700
701
702
                                                                 m_validityPeriod(
                                                                                  17469212,
                                                                                  m_duration_years(10)
                                                                                  )
                                                                )
                                     );
    // Encode it ==> Get octetstring
    log("Encode template ", valueof(v_cert.toBeSigned));
703
    v_encMsg := encvalue(v_cert.toBeSigned);
garciay's avatar
garciay committed
704
    // Sign the certificate using ECDSA/SHA-256 (BP p-256)
705
    v_sig := f_signWithEcdsaBrainpoolp256WithSha256(bit2oct(v_encMsg), int2oct(10, 32), v_private_key);
706
707
708
709
710
711
712
713
714
715
716
717
    if (lengthof(v_sig) != 64) {
      log("Invalid signature: ", v_sig);
      setverdict(fail);
    }
    v_cert.signature_ := m_signature_ecdsaBrainpoolP256r1(
                                                          m_ecdsaP256Signature(
                                                                               m_eccP256CurvePoint_x_only(
                                                                                                          substr(v_sig, 0, 32)
                                                                                                          ),
                                                                               substr(v_sig, 32, 32)
                                                                               )
                                                          );
garciay's avatar
garciay committed
718
    // Final certificate
garciay's avatar
garciay committed
719
  v_encMsg := TestEtsiTs103097Certificate(v_cert, false);
720
    // Decode and check signature
garciay's avatar
garciay committed
721
    if (decvalue(v_encMsg, v_cert_dec) != 0) {
garciay's avatar
garciay committed
722
723
724
      setverdict(fail);
      stop;
    }
garciay's avatar
garciay committed
725
    v_encMsg := encvalue(v_cert_dec.toBeSigned);
726
727
728
729
730
731
732
    if (ischosen(v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_0)) {
      v_compressedMode := 0;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_0;
    } else {
      v_compressedMode := 1;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_1;
    }
garciay's avatar
garciay committed
733
    if (f_verifyWithEcdsaBrainpoolp256WithSha256(
garciay's avatar
garciay committed
734
                                                 bit2oct(v_encMsg), 
735
                                                 int2oct(10, 32),
garciay's avatar
garciay committed
736
                                                 v_cert_dec.signature_.ecdsaBrainpoolP256r1Signature.rSig.x_only & v_cert_dec.signature_.ecdsaBrainpoolP256r1Signature.sSig,
737
738
739
                                                 v_publicKeyCompressed,
                                                 v_compressedMode
                                                 ) == false) {
garciay's avatar
garciay committed
740
741
742
743
744
745
      setverdict(fail);
    } else {
      setverdict(pass)
    }

  } // End of testcase tc_at_certificate_sha256_2
garciay's avatar
garciay committed
746
   
747
748
749
750
751
752
753
754
755
756
757
758
  testcase tc_at_certificate_sha256_3() runs on TCType system TCType {
    var octetstring v_enc_msg := '80030080EAF64113B8B74C6610810D434552545F4955545F415F415400000000005A497A008410E001038001248104038300018001258104038300018002008D8104038300018080849574CBDD2E471BA599CD99E4C350C415761B368D82BB9D9D7BE202A16E69CE41276EEC554EEBC2EFFC12B15132BD8398CB58BB7CE47B1AEB1238FA6F741C469280809BD2B881DBD1ABD7B997A1C55E7F2E55E305F7351CA7514765C900371B4D3DD1C52B8C4613FA8B54754B56B73B1B61E452A99F3B3EB7A37F7BE3FDC0F804BF96'O;
    var EtsiTs103097Certificate v_decMsg;
    var bitstring v_encMsg;
    var integer v_res;

    v_encMsg := oct2bit(v_enc_msg);
    v_res := decvalue(v_encMsg, v_decMsg);
    log("Decoded message: ", v_decMsg);
    setverdict(pass);
  } // End of testcase tc_at_certificate_sha256_3
   
garciay's avatar
garciay committed
759
  testcase tc_certificate_asn1c_1() runs on TCType system TCType { // CERT_IUT_A_RCA
garciay's avatar
garciay committed
760
    const octetstring c_cert := '8003008100288300000000001874e3808466a8c001018080010e80012482080301ffff0301ffff800125820a0401ffffff0401ffffff800189820a0401ffffff0401ffffff80018a820a0401ffffff0401ffffff80018b820a0401ffffff0401ffffff80018c820a0401ffffff0401ffffff00018d0001600001610001620001630001640001650001660102808083a72b88b6a1adeeba7fc18772952f053a81bd18635ee5ab08ed1376c107b541398080c0290e397381bf7502a0e6a6b271d8e2f18fc8311f591f0528a673ee5169f670e224ac455b5e67eb251cc1467f6ffc6840987c8c8eb9245c22be73322b64ca54'O; // CERT_IUT_A_RCA.oer
garciay's avatar
garciay committed
761
    var EtsiTs103097Certificate v_cert_dec;
garciay's avatar
garciay committed
762
    var Oct32 v_private_key := 'd79ef1d533b0385463a5d15708e94ff4f0d281cccbef504acd3afbb82dc0499f'O; // CERT_IUT_A_RCA.vkey
garciay's avatar
garciay committed
763
    var bitstring v_enc_msg := oct2bit(c_cert);
garciay's avatar
garciay committed
764
765
    var integer v_compressedMode;
    var Oct32 v_publicKeyCompressed := int2oct(0, 32);
garciay's avatar
garciay committed
766
    var Oct32 v_sig := int2oct(0, 32);
garciay's avatar
garciay committed
767
768
769
770
771
772
773
    var EtsiTs103097Certificate v_cert_exp := {
    version := 3,
    type_ := explicit,
    issuer := {
      self_ := sha256
    },
    toBeSigned := {
garciay's avatar
garciay committed
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
      id := {
        none_ := NULL
      },
      cracaId := '000000'O,
      crlSeries := 0,
      validityPeriod := {
        start_ := 410313600,
        duration := {
          hours := 26280
        }
      },
      region := omit,
      assuranceLevel := 'C0'O,
      appPermissions := omit,
      certIssuePermissions := {
          {
          subjectPermissions := {
            explicit := {
              {
              psid := 36,
              sspRange := {
                bitmapSspRange := {
                  sspValue := '01FFFF'O,
                  sspBitmask := '01FFFF'O
                }
              }
              },
              {
              psid := 37,
              sspRange := {
                bitmapSspRange := {
                  sspValue := '01FFFFFF'O,
                  sspBitmask := '01FFFFFF'O
                }
              }
              },
              {
              psid := 137,
              sspRange := {
                bitmapSspRange := {
                  sspValue := '01FFFFFF'O,
                  sspBitmask := '01FFFFFF'O
garciay's avatar
garciay committed
816
                }
garciay's avatar
garciay committed
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
              }
              },
              {
              psid := 138,
              sspRange := {
                bitmapSspRange := {
                  sspValue := '01FFFFFF'O,
                  sspBitmask := '01FFFFFF'O
                }
              }
              },
              {
              psid := 139,
              sspRange := {
                bitmapSspRange := {
                  sspValue := '01FFFFFF'O,
                  sspBitmask := '01FFFFFF'O
                }
              }
              },
              {
              psid := 140,
              sspRange := {
                bitmapSspRange := {
                  sspValue := '01FFFFFF'O,
                  sspBitmask := '01FFFFFF'O
                }
              }
              },
              {
              psid := 141,
              sspRange := omit
garciay's avatar
garciay committed
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
              },
              {
              psid := 96,
              sspRange := omit
              },
              {
              psid := 97,
              sspRange := omit
              },
              {
              psid := 98,
              sspRange := omit
              },
              {
              psid := 99,
              sspRange := omit
              },
              {
              psid := 100,
              sspRange := omit
              },
              {
              psid := 101,
              sspRange := omit
              },
              {
              psid := 102,
              sspRange := omit
garciay's avatar
garciay committed
877
              }
garciay's avatar
garciay committed
878
            }
garciay's avatar
garciay committed
879
          },
garciay's avatar
garciay committed
880
          minChainLength := 2,
garciay's avatar
garciay committed
881
882
883
884
885
886
887
888
889
890
          chainLengthRange := 0,
          eeType := '00000000'B
          }
      },
      certRequestPermissions := omit,
      canRequestRollover := omit,
      encryptionKey := omit,
      verifyKeyIndicator := {
        verificationKey := {
          ecdsaNistP256 := {
garciay's avatar
garciay committed
891
            compressed_y_1 := 'A72B88B6A1ADEEBA7FC18772952F053A81BD18635EE5AB08ED1376C107B54139'O
garciay's avatar
garciay committed
892
          }
garciay's avatar
garciay committed
893
        }
garciay's avatar
garciay committed
894
      }
garciay's avatar
garciay committed
895
896
    },
    signature_ := {
garciay's avatar
garciay committed
897
898
      ecdsaNistP256Signature := {
        rSig := {
garciay's avatar
garciay committed
899
          x_only := 'C0290E397381BF7502A0E6A6B271D8E2F18FC8311F591F0528A673EE5169F670'O
garciay's avatar
garciay committed
900
        },
garciay's avatar
garciay committed
901
        sSig := 'E224AC455B5E67EB251CC1467F6FFC6840987C8C8EB9245C22BE73322B64CA54'O
garciay's avatar
garciay committed
902
      }
garciay's avatar
garciay committed
903
904
    }
    };
905
    
garciay's avatar
garciay committed
906
    var integer v_res := decvalue(v_enc_msg, v_cert_dec);
907
    if (v_res == 0) {
garciay's avatar
garciay committed
908
      log("Decoded message: ", v_cert_dec);
garciay's avatar
garciay committed
909
910
911
      setverdict(pass, "Decoded succeed");
      if (not(match(v_cert_exp, v_cert_dec))) {
        setverdict(fail, "Templates mismatch");
garciay's avatar
garciay committed
912
        stop;
garciay's avatar
garciay committed
913
914
      } else {
        setverdict(pass, "Templates match");
garciay's avatar
garciay committed
915
      }
916
    } else {
garciay's avatar
garciay committed
917
        setverdict(fail, "Decoding failed");
918
    }
garciay's avatar
garciay committed
919
    
garciay's avatar
garciay committed
920
921
922
923
924
925
926
    if (ischosen(v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_0)) {
      v_compressedMode := 0;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_0;
    } else {
      v_compressedMode := 1;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_1;
    }
927
    v_enc_msg := encvalue(v_cert_dec.toBeSigned);
garciay's avatar
garciay committed
928
    if (f_verifyWithEcdsaNistp256WithSha256(
929
                                            bit2oct(v_enc_msg), 
930
                                            int2oct(0, 32),
garciay's avatar
garciay committed
931
932
933
934
                                            v_cert_dec.signature_.ecdsaNistP256Signature.rSig.x_only & v_cert_dec.signature_.ecdsaNistP256Signature.sSig,
                                            v_publicKeyCompressed,
                                            v_compressedMode
                                            ) == false) {
garciay's avatar
garciay committed
935
936
937
938
      setverdict(fail);
    } else {
      setverdict(pass)
    }
garciay's avatar
garciay committed
939
  } // End of testcase tc_certificate_asn1c_1
940
  
garciay's avatar
garciay committed
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
  testcase tc_certificate_asn1c_2() runs on TCType system TCType { // CERT_IUT_A_RCA
    const octetstring c_cert := '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'O; // CERT_IUT_C_RCA.oer
    var EtsiTs103097Certificate v_cert_dec;
    var Oct32 v_private_key := 'e04336196816a49ac1dc7d39252ee4a90a5c0a3b243645ee84d5acd0aa161c7e'O; // CERT_IUT_C_RCA.vkey
    var Oct32 v_enc_private_key := 'f393bce9c68abbdd733e1ba9766ac11ce407a90e295d130c6cc6d8a61624be93'O; // CERT_IUT_C_RCA.ekey
    var bitstring v_enc_msg := oct2bit(c_cert);
    var integer v_compressedMode;
    var Oct32 v_publicKeyCompressed := int2oct(0, 32);
    var Oct32 v_sig := int2oct(0, 32);
    var EtsiTs103097Certificate v_cert_exp := {
    version := 3,
    type_ := explicit,
    issuer := {
      self_ := sha256
    },
    toBeSigned := {
      id := {
        none_ := NULL
      },
      cracaId := '000000'O,
      crlSeries := 0,
      validityPeriod := {
        start_ := 410313600,
        duration := {
          hours := 26280
        }
      },
      region := {
        rectangularRegion := {
          {
          northWest := {
            latitude := 436618657,
            longitude := 70083912
          },
          southEast := {
            latitude := 435720322,
            longitude := 70982247
          }
          }
        }
      },
      assuranceLevel := 'C0'O,
      appPermissions := omit,
      certIssuePermissions := {
          {
          subjectPermissions := {
            explicit := {
              {
              psid := 36,
              sspRange := {
                bitmapSspRange := {
                  sspValue := '01FFFF'O,
                  sspBitmask := '01FFFF'O
                }
              }
              },
              {
              psid := 37,
              sspRange := {
                bitmapSspRange := {
For faster browsing, not all history is shown. View entire blame