Newer
Older
var octetstring v_payload := p_geoNetworkingPdu.gnPacket.packet.payload;
// Send UtGnEventInd
log("f_processBeacon: v_payload=", v_payload);
v_utGnEventInd.rawPayload := v_payload;
cfPort.send(v_utGnEventInd);
}
}
) runs on ItsRSUsSimulator {
var bitstring v_enc_msg;
log("f_processCam: CAM=", p_geoNetworkingPdu.gnPacket.packet.payload);
if (PICS_SEND_CAM_INDICATION) {
var UtCamEventInd v_utCamEventInd;
var integer v_result;
// Extract CAM message
var octetstring v_payload := p_geoNetworkingPdu.gnPacket.packet.payload;
// Remove BTP layer
v_payload := substr(v_payload, 4, lengthof(v_payload) - 4);
// Send UtCamEventInd
log("f_processCam: v_payload=", v_payload);
v_enc_msg := oct2bit(v_payload);
if (decvalue(v_enc_msg, v_utCamEventInd.camMsg) == 0) {
cfPort.send(v_utCamEventInd);
}
}
}
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
function f_processDenm(
in GeoNetworkingPdu p_geoNetworkingPdu
) runs on ItsRSUsSimulator {
var bitstring v_enc_msg;
log("f_processDenm: DENM=", p_geoNetworkingPdu.gnPacket.packet.payload);
if (PICS_SEND_DENM_INDICATION) {
var UtDenmEventInd v_utDenmEventInd;
var integer v_result;
// Extract DENM message
var octetstring v_payload := p_geoNetworkingPdu.gnPacket.packet.payload;
// Remove BTP layer
v_payload := substr(v_payload, 4, lengthof(v_payload) - 4);
// Send UtDenmEventInd
log("f_processDenm: v_payload=", v_payload);
v_enc_msg := oct2bit(v_payload);
if (decvalue(v_enc_msg, v_utDenmEventInd.denMsg) == 0) {
cfPort.send(v_utDenmEventInd);
}
}
}
function f_processSrem(
in GeoNetworkingPdu p_geoNetworkingPdu
) runs on ItsRSUsSimulator {
/*if (ispresent(p_geoNetworkingPdu.gnPacket.packet.payload)) {
if (ispresent(p_geoNetworkingPdu.gnPacket.packet.payload.decodedPayload.btpPacket.payload.decodedPayload)) {
if (ischosen(p_geoNetworkingPdu.gnPacket.packet.payload.decodedPayload.btpPacket.payload.decodedPayload.sremPacket)) {
var SignalRequestMessage v_signalRequestMessage := p_geoNetworkingPdu.gnPacket.packet.payload.decodedPayload.btpPacket.payload.decodedPayload.sremPacket.srm;
var template (value) GnRawPayload v_payload;
log(v_signalRequestMessage);
// Build response
// TODO v_ssem.ssm.status
v_payload := valueof(
f_adaptPayload(
bit2oct(
encvalue(
valueof(
m_ssem(
v_signalRequestMessage
)))),
PICS_SSEM_BTP_DESTINATION_PORT,
PICS_SSEM_BTP_SOURCE_PORT
)
);
// Send SSEM
f_send(v_payload, PICS_SSEM_ITS_AID);
} // else, ignore message
} // else, ignore message
if (PICS_SEND_SREM_INDICATION) {
var UtSremEventInd v_utSremEventInd;
var integer v_result;
// Extract SREM message
var octetstring v_payload := p_geoNetworkingPdu.gnPacket.packet.payload;
// Remove BTP layer
v_payload := substr(v_payload, 4, lengthof(v_payload) - 4);
// Send UtSremEventInd
log("f_processSrem: v_payload=", v_payload);
v_enc_msg := oct2bit(v_payload);
if (decvalue(v_enc_msg, v_utSremEventInd.sreMsg) == 0) {
cfPort.send(v_utSremEventInd);
}
} // else, ignore message
} // End of function f_processSrem
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
function f_processSsem(
in GeoNetworkingPdu p_geoNetworkingPdu
) runs on ItsRSUsSimulator {
var bitstring v_enc_msg;
log("f_processSsem: SSEM=", p_geoNetworkingPdu.gnPacket.packet.payload);
if (PICS_SEND_SSEM_INDICATION) {
var UtSsemEventInd v_utSsemEventInd;
var integer v_result;
// Extract SSEM message
var octetstring v_payload := p_geoNetworkingPdu.gnPacket.packet.payload;
// Remove BTP layer
v_payload := substr(v_payload, 4, lengthof(v_payload) - 4);
// Send UtSsemEventInd
log("f_processSsem: v_payload=", v_payload);
v_enc_msg := oct2bit(v_payload);
if (decvalue(v_enc_msg, v_utSsemEventInd.sseMsg) == 0) {
cfPort.send(v_utSsemEventInd);
}
} // else, ignore message
} // End of function f_processSsem
function f_incLocalSeqNumber() runs on ItsRSUsSimulator return UInt16 {
vc_localSeqNumber := (vc_localSeqNumber + 1) mod 65536;
return vc_localSeqNumber;
}
function f_incMsgIssueRevision() runs on ItsRSUsSimulator return MsgCount {
vc_msgIssueRevision := (vc_msgIssueRevision + 1) mod 128; // See MsgCount declaration
return vc_msgIssueRevision;
}
function f_getMsgIssueRevision() runs on ItsRSUsSimulator return MsgCount {
return vc_msgIssueRevision;
}
function f_incDenmSequenceNumber() runs on ItsRSUsSimulator return SequenceNumber {
vc_sequenceNumber := (vc_sequenceNumber + 1) mod 65536; // See SequenceNumber declaration
return vc_sequenceNumber;
}
function f_getDenmSequenceNumber() runs on ItsRSUsSimulator return SequenceNumber {
in integer p_src_port
) return template (present) octetstring {
//log(">>> f_payload_template: ", p_dest_port, " - ", p_src_port);
var template (value) Oct2 v_t1 := int2oct(p_dest_port, 2);
var template (value) Oct2 v_t2 := int2oct(p_src_port, 2);
var template (present) octetstring v_t3 := ? /*? length (5 .. 65535)*/;
var template (present) octetstring v_out := valueof(v_t1) & valueof(v_t2) & v_t3;
//log("<<< f_payload_template: v_out=", v_out);
return v_out
altstep a_process_cf_ut_command() runs on ItsRSUsSimulator {
var UtCamInitialize v_utCamInitialize;
var UtDenmInitialize v_utDenmInitialize;
var UtIvimInitialize v_utIvimInitialize;
var UtMapemSpatemInitialize v_utMapemSpatemInitialize;
var UtSremInitialize v_utSremInitialize;
var UtRtcmemInitialize v_utRtcmemInitialize;
var UtPkiInitialize v_utPkiInitialize;
var UtSremTrigger v_utSremTrigger;
var UtDenmTermination v_utDenmTermination;
var UtSremCancelation v_utSremCancelation;
var UtPkiTrigger v_utPkiTrigger;
[] cfPort.receive(UtGnInitialize:?) -> value v_utGnInitialize {
log("a_process_cf_ut_command: v_utGnInitialize = ", v_utGnInitialize);
v_geoNwPdu :=valueof(
m_geoNwPdu(
m_geoNwBeaconPacket(
vc_longPosVectorRsu
),
m_defaultLifetime,
1
)
);
v_geoNwPdu.gnPacket.packet.commonHeader.flags := f_isMobile();
vc_rsuMessagesValueList[vc_rsu_id].beacon := v_geoNwPdu;
cfPort.send(UtGnResults: { utGnInitializeResult := true } );
repeat;
}
log("a_process_cf_ut_command: v_utGnTrigger = ", v_utGnTrigger);
if (ischosen(v_utGnTrigger.geoUnicast)) {
var GnNonSecuredPacket v_geoNwUnicastPacket := valueof(
m_geoNwUnicastPacket_with_payload(
vc_longPosVectorRsu,
f_getIutShortPosVector(),
f_incLocalSeqNumber(),
c_defaultHopLimit,
v_utGnTrigger.geoUnicast.trafficClass,
v_utGnTrigger.geoUnicast.payload
var GeoNetworkingPdu v_geoNwPdu := valueof(
m_geoNwPdu(
v_geoNwUnicastPacket,
m_lifetimeBase1s(v_utGnTrigger.geoUnicast.lifetime / 1000),
v_geoNwPdu.gnPacket.packet.commonHeader.nextHeader := e_any;
v_geoNwPdu.gnPacket.packet.commonHeader.flags := f_isMobile();
v_geoNwPdu.gnPacket.packet.extendedHeader.geoUnicastHeader.dstPosVector.gnAddr := v_utGnTrigger.geoUnicast.gnAddress;
vc_rsuMessagesValueList[vc_rsu_id].beacon := v_geoNwPdu;
cfPort.send(UtGnResults: { utGnTriggerResult := true } );
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
} else if (ischosen(v_utGnTrigger.geoBroadcast)) {
var GeoBroadcastArea v_broadcastArea;
var GnNonSecuredPacket v_geoNwBroadcastPacket;
var GeoNetworkingPdu v_geoNwPdu;
if (v_utGnTrigger.geoBroadcast.shape == e_geoCircle) {
v_broadcastArea.geoBroadcastSubType := e_geoBroadcastCircle;
} else if (v_utGnTrigger.geoBroadcast.shape == e_geoRect) {
v_broadcastArea.geoBroadcastSubType := e_geoBroadcastRect;
} else if (v_utGnTrigger.geoBroadcast.shape == e_geoElip) {
v_broadcastArea.geoBroadcastSubType := e_geoBroadcastElip;
} else {
v_broadcastArea.geoBroadcastSubType := e_reserved;
}
v_broadcastArea.geoBroadcastArea := v_utGnTrigger.geoBroadcast.area;
v_geoNwBroadcastPacket := valueof(
m_geoNwBroadcastPacket_payload(
vc_longPosVectorRsu,
f_incLocalSeqNumber(),
v_broadcastArea,
c_defaultHopLimit,
v_utGnTrigger.geoBroadcast.trafficClass,
v_utGnTrigger.geoBroadcast.payload
));
v_geoNwBroadcastPacket.commonHeader.flags := f_isMobile();
v_geoNwPdu := valueof(
m_geoNwPdu(
v_geoNwBroadcastPacket,
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
m_lifetimeBase1s(v_utGnTrigger.geoBroadcast.lifetime / 1000),
c_defaultHopLimit
));
v_geoNwPdu.gnPacket.packet.commonHeader.nextHeader := e_any;
v_geoNwPdu.gnPacket.packet.commonHeader.flags := f_isMobile();
vc_rsuMessagesValueList[vc_rsu_id].beacon := v_geoNwPdu;
cfPort.send(UtGnResults: { utGnTriggerResult := true } );
} else if (ischosen(v_utGnTrigger.geoAnycast)) {
var GeoAnycastArea v_anycastArea;
var GnNonSecuredPacket v_geoNwAnycastPacket;
var GeoNetworkingPdu v_geoNwPdu;
if (v_utGnTrigger.geoAnycast.shape == e_geoCircle) {
v_anycastArea.geoAnycastSubType := e_geoAnycastCircle;
} else if (v_utGnTrigger.geoAnycast.shape == e_geoRect) {
v_anycastArea.geoAnycastSubType := e_geoAnycastRect;
} else if (v_utGnTrigger.geoAnycast.shape == e_geoElip) {
v_anycastArea.geoAnycastSubType := e_geoAnycastElip;
} else {
v_anycastArea.geoAnycastSubType := e_reserved;
}
v_anycastArea.geoAnycastArea := v_utGnTrigger.geoAnycast.area;
v_geoNwAnycastPacket := valueof(
m_geoNwAnycastPacket_payload(
vc_longPosVectorRsu,
f_incLocalSeqNumber(),
v_anycastArea,
c_defaultHopLimit,
v_utGnTrigger.geoAnycast.trafficClass,
v_utGnTrigger.geoAnycast.payload
));
v_geoNwPdu := valueof(
m_geoNwPdu(
v_geoNwAnycastPacket,
m_lifetimeBase1s(v_utGnTrigger.geoAnycast.lifetime / 1000),
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
v_geoNwPdu.gnPacket.packet.commonHeader.flags := f_isMobile();
v_geoNwPdu.gnPacket.packet.commonHeader.nextHeader := e_any;
vc_rsuMessagesValueList[vc_rsu_id].beacon := v_geoNwPdu;
cfPort.send(UtGnResults: { utGnTriggerResult := true } );
} else if (ischosen(v_utGnTrigger.shb)) {
var GnNonSecuredPacket v_geoShbPacket;
var GeoNetworkingPdu v_geoNwPdu;
v_geoShbPacket := valueof(
m_geoNwShbPacket_payload(
vc_longPosVectorRsu,
v_utGnTrigger.shb.payload
));
v_geoShbPacket.commonHeader.maxHopLimit := 1;
v_geoShbPacket.commonHeader.trafficClass.scf := v_utGnTrigger.shb.trafficClass.scf;
v_geoShbPacket.commonHeader.trafficClass.channelOffload := v_utGnTrigger.shb.trafficClass.channelOffload;
v_geoShbPacket.commonHeader.trafficClass.tcId := v_utGnTrigger.shb.trafficClass.tcId;
v_geoNwPdu := valueof(
m_geoNwPdu(
v_geoShbPacket,
m_defaultLifetime,
1
));
v_geoNwPdu.gnPacket.packet.commonHeader.flags := f_isMobile();
v_geoNwPdu.gnPacket.packet.commonHeader.nextHeader := e_any;
vc_rsuMessagesValueList[vc_rsu_id].beacon := v_geoNwPdu;
cfPort.send(UtGnResults: { utGnTriggerResult := true } );
} else if (ischosen(v_utGnTrigger.tsb)) {
var GnNonSecuredPacket v_geoTsbPacket;
var GeoNetworkingPdu v_geoNwPdu;
v_geoTsbPacket := valueof(
m_geoNwTsbPacket_payload(
f_incLocalSeqNumber(),
vc_longPosVectorRsu,
-,
-,
v_utGnTrigger.tsb.payload
));
v_geoTsbPacket.commonHeader.trafficClass.scf := v_utGnTrigger.tsb.trafficClass.scf;
v_geoTsbPacket.commonHeader.trafficClass.channelOffload := v_utGnTrigger.tsb.trafficClass.channelOffload;
v_geoTsbPacket.commonHeader.trafficClass.tcId := v_utGnTrigger.tsb.trafficClass.tcId;
v_geoNwPdu := valueof(
m_geoNwPdu(
v_geoTsbPacket,
m_defaultLifetime,
c_defaultHopLimit
));
v_geoNwPdu.gnPacket.packet.commonHeader.nextHeader := e_any;
v_geoNwPdu.gnPacket.packet.commonHeader.flags := f_isMobile();
vc_rsuMessagesValueList[vc_rsu_id].beacon := v_geoNwPdu;
cfPort.send(UtGnResults: { utGnTriggerResult := true } );
} else {
cfPort.send(UtGnResults: { utGnTriggerResult := false } );
[vc_cam == true] cfPort.receive(UtCamInitialize:?) -> value v_utCamInitialize {
log("a_process_cf_ut_command: v_utCamInitialize = ", v_utCamInitialize);
if (oct2int(v_utCamInitialize.hashedId8) != 0) {
var charstring v_certificate_id;
var EtsiTs103097Certificate v_certificate;
log("a_process_cf_ut_command: Looking for certificate ", v_utCamInitialize.hashedId8);
f_getCertificateFromDigest(v_utCamInitialize.hashedId8, v_certificate, v_certificate_id);
log("a_process_cf_ut_command (pki): Change certificate to ", v_certificate_id);
f_acTriggerSecEvent(m_acEnableSecurity(v_certificate_id));
}
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency.curvature.curvatureValue := 0;
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency.heading.headingValue := 0;
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.lowFrequencyContainer.basicVehicleContainerLowFrequency.vehicleRole := default_;
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.specialVehicleContainer := omit;
cfPort.send(UtCamResults: { utCamInitializeResult := true } );
repeat;
[vc_cam == true] cfPort.receive(UtCamTrigger: { changeSpeed := ? }) -> value v_utCamTrigger {
log("a_process_cf_ut_command: v_utCamTrigger = ", v_utCamTrigger);
cfPort.send(UtCamResults: { utCamTriggerResult := true } );
vc_cam_timer_value := vc_cam_timer_value / 2.0;
repeat;
}
[vc_cam == true] cfPort.receive(UtCamTrigger: { changeCurvature := ? }) -> value v_utCamTrigger {
log("a_process_cf_ut_command: v_utCamTrigger = ", v_utCamTrigger);
if (ischosen(vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency)) {
cfPort.send(UtCamResults: { utCamTriggerResult := true } );
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency.curvature.curvatureValue := v_utCamTrigger.changeCurvature;
} else {
cfPort.send(UtCamResults: { utCamTriggerResult := false } );
}
[vc_cam == true] cfPort.receive(UtCamTrigger: { changeHeading := ? }) -> value v_utCamTrigger {
log("a_process_cf_ut_command: v_utCamTrigger = ", v_utCamTrigger);
if (ischosen(vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency)) {
cfPort.send(UtCamResults: { utCamTriggerResult := true } );
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency.heading.headingValue := valueof(vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency.heading.headingValue) + v_utCamTrigger.changeHeading;
} else {
cfPort.send(UtCamResults: { utCamTriggerResult := false } );
}
repeat;
}
[vc_cam == true] cfPort.receive(UtCamTrigger: { setVehicleRole := ? }) -> value v_utCamTrigger {
log("a_process_cf_ut_command: v_utCamTrigger = ", v_utCamTrigger);
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.lowFrequencyContainer.basicVehicleContainerLowFrequency.vehicleRole := v_utCamTrigger.setVehicleRole;
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.specialVehicleContainer := { publicTransportContainer := { embarkationStatus := true, ptActivation := omit } };
cfPort.send(UtCamResults: { utCamTriggerResult := true } );
repeat;
}
[] cfPort.receive(UtDenmInitialize:?) -> value v_utDenmInitialize {
log("a_process_cf_ut_command: v_utDenmInitialize = ", v_utDenmInitialize);
vc_rsuMessagesValueList[vc_rsu_id].denms := {};
vc_denmEventCounter := 0;
vc_denm := true;
cfPort.send(UtDenmResults: { utDenmInitializeResult := true } );
repeat;
[vc_denm == true] cfPort.receive(UtDenmTrigger:?) -> value v_utDenmTrigger {
var template (value) DenmParmContainers v_denmParmContainers;
var DenmEventsParmsPerZone v_denmEventsParmsPerZone := PICS_DENM_EVENTS_RSU_UC1[vc_rsu_id][PX_ETSI_ZONE_ID - 1];
var integer seq_number := f_incDenmSequenceNumber();
log("a_process_cf_ut_command: v_utDenmTrigger: ", v_utDenmTrigger);
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
v_denmParmContainers := m_denmParmContainers(
PICS_RSU_PARAMS[vc_rsu_id].stationID,
seq_number,
v_utDenmTrigger.repetitionInterval,
v_denmEventsParmsPerZone[0].eventPosition,
v_utDenmTrigger.situation.eventType.causeCode,
v_denmEventsParmsPerZone[0].eventHistory,
v_denmEventsParmsPerZone[0].traces,
v_utDenmTrigger.validityDuration,
v_utDenmTrigger.relevanceDistance,
v_utDenmTrigger.relevanceTrafficDirection
);
v_denmParmContainers.managementContainer.detectionTime := v_utDenmTrigger.detectionTime;
vc_rsuMessagesValueList[vc_rsu_id].denms[lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms)] := valueof(
m_denmPdu_rsu(
PICS_RSU_PARAMS[vc_rsu_id].stationID,
m_denm(
v_denmParmContainers.managementContainer,
v_denmParmContainers.situationContainer,
v_denmParmContainers.locationContainer
)));
log("a_process_cf_ut_command: utDenmTrigger: denm=[" & int2char(lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) - 1) & "]=", vc_rsuMessagesValueList[vc_rsu_id].denms[lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) - 1]);
//denm={ { header := { protocolVersion := 2, messageID := 1, stationID := 1111101 }, denm := { management := { actionID := { originatingStationID := 1111101, sequenceNumber := 1 }, detectionTime := 510819417810, referenceTime := 510819420809, termination := omit, eventPosition := { latitude := 367467556, longitude := -45552381, positionConfidenceEllipse := { semiMajorConfidence := 100, semiMinorConfidence := 100, semiMajorOrientation := 0 }, altitude := { altitudeValue := 0, altitudeConfidence := alt_000_01 (0) } }, relevanceDistance := lessThan50m (0), relevanceTrafficDirection := upstreamTraffic (1), validityDuration := 2, transmissionInterval := omit, stationType := 15 }, situation := { informationQuality := 0, eventType := { causeCode := 91, subCauseCode := 0 }, linkedCause := omit, eventHistory := { { eventPosition := { deltaLatitude := 135, deltaLongitude := -147, deltaAltitude := 0 }, eventDeltaTime := omit, informationQuality := 0 }, { eventPosition := { deltaLatitude := -68, deltaLongitude := 74, deltaAltitude := 0 }, eventDeltaTime := omit, informationQuality := 0 } } }, location := { eventSpeed := omit, eventPositionHeading := omit, traces := { { { pathPosition := { deltaLatitude := -1086, deltaLongitude := 2551, deltaAltitude := 0 }, pathDeltaTime := omit }, { pathPosition := { deltaLatitude := -450, deltaLongitude := 1010, deltaAltitude := 0 }, pathDeltaTime := omit }, { pathPosition := { deltaLatitude := -460, deltaLongitude := 1000, deltaAltitude := 0 }, pathDeltaTime := omit }, { pathPosition := { deltaLatitude := -440, deltaLongitude := 1000, deltaAltitude := 0 }, pathDeltaTime := omit }, { pathPosition := { deltaLatitude := -440, deltaLongitude := 990, deltaAltitude := 0 }, pathDeltaTime := omit } } }, roadType := omit }, alacarte := omit } } }
if (lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) == 1) {
tc_denm.start;
}
cfPort.send(UtDenmResults: { utDenmTriggerResult := { result := true, actionId := vc_rsuMessagesValueList[vc_rsu_id].denms[lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) - 1].denm.management.actionID } } );
repeat;
}
[vc_denm == true] cfPort.receive(UtDenmUpdate:?) -> value v_utDenmUpdate {
var integer v_i := 0;
var boolean v_found := false;
log("a_process_cf_ut_command: v_utDenmUpdate = ", v_utDenmUpdate);
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
for (v_i := 0; v_i < lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms); v_i := v_i + 1) {
if (v_utDenmUpdate.actionId.sequenceNumber == valueof(vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.actionID.sequenceNumber)) {
v_found := true;
break;
}
} // End of 'for' statement
if (v_found == true) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.detectionTime := v_utDenmUpdate.detectionTime;
if (ispresent(v_utDenmUpdate.validityDuration)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.validityDuration := v_utDenmUpdate.validityDuration;
}
if (ispresent(v_utDenmUpdate.situation)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.situation := v_utDenmUpdate.situation;
}
if (ispresent(v_utDenmUpdate.relevanceDistance)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.relevanceDistance := v_utDenmUpdate.relevanceDistance;
}
if (ispresent(v_utDenmUpdate.relevanceTrafficDirection)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.relevanceTrafficDirection := v_utDenmUpdate.relevanceTrafficDirection;
}
if (ispresent(v_utDenmUpdate.transmissionInterval)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.transmissionInterval := v_utDenmUpdate.transmissionInterval;
}
if (ispresent(v_utDenmUpdate.transmissionInterval)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.transmissionInterval := v_utDenmUpdate.transmissionInterval;
}
if (ispresent(v_utDenmUpdate.alacarte)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.alacarte := v_utDenmUpdate.alacarte;
}
}
cfPort.send(UtDenmResults: { utDenmUpdateResult := { result := true, actionId := vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.actionID } } );
repeat;
}
[vc_denm == true] cfPort.receive(UtDenmTermination:?) -> value v_utDenmTermination {
var integer v_i := 0;
var boolean v_found := false;
log("a_process_cf_ut_command: v_utDenmTermination: ", v_utDenmTermination);
for (v_i := 0; v_i < lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms); v_i := v_i + 1) {
if (v_utDenmTermination.actionId.sequenceNumber == valueof(vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.actionID.sequenceNumber)) {
v_found := true;
break;
}
} // End of 'for' statement
if (v_found == true) {
log("a_process_cf_ut_command: v_utDenmTermination: v_i=", v_i);
log("a_process_cf_ut_command: v_utDenmTermination: l=", lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms));
if (lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) > 1) { //Shift elements
for (var integer v_j := v_i + 1; v_i < lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms); v_i := v_i + 1) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i] := vc_rsuMessagesValueList[vc_rsu_id].denms[v_j];
v_j := v_j + 1;
} // End of 'for' statement
vc_rsuMessagesValueList[vc_rsu_id].denms[lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) - 1] := {}
} else {
vc_rsuMessagesValueList[vc_rsu_id].denms := {};
vc_denmEventCounter := 0;
}
log("v_utDenmTermination: New l=", lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms));
if (lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) == 0) {
tc_denm.stop;
f_sleep(1.0);
vc_denm := false;
}
cfPort.send(UtDenmResults: { utDenmTerminationResult := true } );
}
repeat;
}
[] cfPort.receive(UtIvimInitialize:?) -> value v_utIvimInitialize {
log("a_process_cf_ut_command: v_utIvimInitialize = ", v_utIvimInitialize);
if (oct2int(v_utIvimInitialize.hashedId8) != 0) {
var charstring v_certificate_id;
var EtsiTs103097Certificate v_certificate;
log("a_process_cf_ut_command: Looking for certificate ", v_utIvimInitialize.hashedId8);
f_getCertificateFromDigest(v_utIvimInitialize.hashedId8, v_certificate, v_certificate_id);
log("a_process_cf_ut_command (pki): Change certificate to ", v_certificate_id);
f_acTriggerSecEvent(m_acEnableSecurity(v_certificate_id));
}
//vc_rsuMessagesValueList[vc_rsu_id].ivim.ivi.mandatory.;
cfPort.send(UtIvimResults: { utIvimInitializeResult := true } );
repeat;
}
[vc_ivim == true] cfPort.receive(UtIvimTrigger:?) -> value v_utIvimTrigger {
log("a_process_cf_ut_command: v_utIvimTrigger: ", v_utIvimTrigger);
cfPort.send(UtIvimResults: { utIvimTriggerResult := { result:= true, iviIdentificationNumber := 10 } } );
tc_ivim.start;
repeat;
}
[vc_ivim == true] cfPort.receive(UtIvimUpdate:?) -> value v_utIvimUpdate {
cfPort.send(UtIvimResults: { utIvimUpdateResult := { result:= true, iviIdentificationNumber := 10 } } );
repeat;
}
[vc_ivim == true] cfPort.receive(UtIvimTermination:?) -> value v_utIvimTermination {
log("a_process_cf_ut_command: v_utIvimTermination: ", v_utIvimTermination);
tc_ivim.stop;
vc_ivim := false;
cfPort.send(UtIvimResults: { utIvimTerminationResult := true } );
repeat;
}
[] cfPort.receive(UtRtcmemInitialize:?) -> value v_utRtcmemInitialize {
log("a_process_cf_ut_command: v_utRtcmemInitialize = ", v_utRtcmemInitialize);
if (oct2int(v_utRtcmemInitialize.hashedId8) != 0) {
var charstring v_certificate_id;
var EtsiTs103097Certificate v_certificate;
log("a_process_cf_ut_command: Looking for certificate ", v_utRtcmemInitialize.hashedId8);
f_getCertificateFromDigest(v_utRtcmemInitialize.hashedId8, v_certificate, v_certificate_id);
log("a_process_cf_ut_command (pki): Change certificate to ", v_certificate_id);
f_acTriggerSecEvent(m_acEnableSecurity(v_certificate_id));
}
vc_rsuMessagesValueList[vc_rsu_id].rtcmem := valueof(
m_rtcmemPdu(
m_defaultRtcmem(
123,
-,
{ '00000000'O, '01010101'O }
)));
vc_rtcmem := true;
cfPort.send(UtRtcmemResults: { utRtcmemInitializeResult := true } );
repeat;
}
[vc_rtcmem == true] cfPort.receive(UtRtcmemTrigger:?) -> value v_utRtcmemTrigger {
log("a_process_cf_ut_command: v_utRtcmemTrigger: ", v_utRtcmemTrigger);
vc_rsuMessagesValueList[vc_rsu_id].rtcmem.rtcmc.msgCnt := v_utRtcmemTrigger.msgCnt;
vc_rsuMessagesValueList[vc_rsu_id].rtcmem.rtcmc.rev := v_utRtcmemTrigger.rev;
vc_rsuMessagesValueList[vc_rsu_id].rtcmem.rtcmc.msgs := v_utRtcmemTrigger.msgs;
// TODO Add optional part
cfPort.send(UtRtcmemResults: { utRtcmemTriggerResult := true } );
repeat;
}
[vc_rtcmem == true] cfPort.receive(UtRtcmemUpdate:?) -> value v_utRtcmemUpdate {
vc_rsuMessagesValueList[vc_rsu_id].rtcmem.rtcmc.msgs := v_utRtcmemUpdate.msgs;
cfPort.send(UtRtcmemResults: { utRtcmemUpdateResult := true } );
repeat;
}
[vc_rtcmem == true] cfPort.receive(UtRtcmemTermination:?) -> value v_utRtcmemTermination {
log("a_process_cf_ut_command: v_utRtcmemTermination: ", v_utRtcmemTermination);
cfPort.send(UtRtcmemResults: { utRtcmemTerminationResult := true } );
repeat;
}
[] cfPort.receive(UtSremInitialize:?) -> value v_utSremInitialize {
log("a_process_cf_ut_command: v_utSremInitialize = ", v_utSremInitialize);
if (oct2int(v_utSremInitialize.hashedId8) != 0) {
var charstring v_certificate_id;
var EtsiTs103097Certificate v_certificate;
log("a_process_cf_ut_command: Looking for certificate ", v_utSremInitialize.hashedId8);
f_getCertificateFromDigest(v_utSremInitialize.hashedId8, v_certificate, v_certificate_id);
log("a_process_cf_ut_command (pki): Change certificate to ", v_certificate_id);
f_acTriggerSecEvent(m_acEnableSecurity(v_certificate_id));
}
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
vc_rsuMessagesValueList[vc_rsu_id].srem := valueof(
m_sremPdu(
m_srem(
m_requestorDescription(
m_vehicleID(
f_getIutStationId()
),
m_requestorType(
basicVehicle
)
),
{
m_signalRequestPackage(
m_signalRequest(
LibItsSremSsem_Templates.m_intersectionReferenceID(
PX_INTERSECTION_ID
),
PX_REQUEST_ID,
priorityRequest,
{ lane := 1 }
)
)
}
)
)
);
cfPort.send(UtSremResults: { utSremInitializeResult := true } );
repeat;
}
[vc_srem == true] cfPort.receive(UtSremTrigger:?) -> value v_utSremTrigger {
log("a_process_cf_ut_command: v_utSremTrigger: ", v_utSremTrigger);
cfPort.send(UtSremResults: { utSremTriggerResult := true } );
repeat;
}
[vc_srem == true] cfPort.receive(UtSremUpdate:?) -> value v_utSremUpdate {
cfPort.send(UtSremResults: { utSremUpdateResult := true } );
repeat;
}
[vc_srem == true] cfPort.receive(UtSremCancelation:?) -> value v_utSremCancelation {
log("a_process_cf_ut_command: v_utSremCancelation: ", v_utSremCancelation);
cfPort.send(UtSremResults: { utSremCancelationResult := true } );
repeat;
}
[vc_pki == true] cfPort.receive(UtPkiInitialize:?) -> value v_utPkiInitialize {
log("a_process_cf_ut_command: v_utPkiInitialize = ", v_utPkiInitialize);
if (oct2int(v_utPkiInitialize.hashedId8) != 0) {
var charstring v_certificate_id;
var EtsiTs103097Certificate v_certificate;
log("a_process_cf_ut_command: Looking for certificate ", v_utPkiInitialize.hashedId8);
f_getCertificateFromDigest(v_utPkiInitialize.hashedId8, v_certificate, v_certificate_id);
log("a_process_cf_ut_command (pki): Change certificate to ", v_certificate_id);
f_acTriggerSecEvent(m_acEnableSecurity(v_certificate_id));
vc_security_state := 0; // 0: initial
vc_reenrolment := false;
vc_ec_counter := 0;
vc_ec_certificates := {};
vc_at_counter := 0;
vc_at_certificates := {};
tc_cam.stop;
cfPort.send(UtPkiResults: { utPkiInitializeResult := true } );
repeat;
}
[vc_pki == true] cfPort.receive(UtPkiTrigger: { triggerEnrolmentRequest := ? }) -> value v_utPkiTrigger {
var ItsPkiHttpRsuSimulator v_pki;
var EcData v_ec_data;
log("a_process_cf_ut_command: v_utPkiTrigger=", v_utPkiTrigger);
cfPort.send(UtPkiResults: { utPkiTriggerResult := true } );
v_pki := ItsPkiHttpRsuSimulator.create("TriggeredEc") alive;
connect(v_pki:resultPort, self:resultPort);
v_pki.start(f_trigger_enrolment_request_await_response());
tc_wait.start;
alt {
[] resultPort.receive(EcData:?) -> value v_ec_data {
tc_wait.stop;
vc_ec_certificates[vc_ec_counter] := v_ec_data;
vc_ec_counter := vc_ec_counter + 1;
vc_reenrolment := true;
vc_security_state := 1; // 1:enrolled
}
[] tc_wait.timeout {
log("a_process_cf_ut_command: Failed to retrieve EcData");
vc_reenrolment := false;
vc_security_state := 0; // 0: initial
}
} // End of 'alt' statement
disconnect(v_pki:resultPort, self:resultPort);
v_pki.done;
v_pki.kill;
repeat;
}
[vc_pki == true] cfPort.receive(UtPkiTrigger: { triggerAuthorizationRequest := ? }) -> value v_utPkiTrigger {
var ItsPkiHttpRsuSimulator v_pki;
var AtData v_at_data;
cfPort.send(UtPkiResults: { utPkiTriggerResult := true } );
v_pki := ItsPkiHttpRsuSimulator.create("TriggeredAt") alive;
connect(v_pki:resultPort, self:resultPort);
v_pki.start(f_trigger_authorization_request_await_response(
vc_ec_counter,
tc_wait.start;
alt {
[] resultPort.receive(AtData:?) -> value v_at_data {
tc_wait.stop;
vc_at_certificates[vc_at_counter] := v_at_data;
vc_at_counter := vc_at_counter + 1;
vc_security_state := 2; // 2: authorization
}
[] tc_wait.timeout {
log("a_process_cf_ut_command: Failed to retrieve AtData");
vc_security_state := 1; // 1: enrolled
}
} // End of 'alt' statement
disconnect(v_pki:resultPort, self:resultPort);
v_pki.done;
v_pki.kill;
if (vc_security_state == 2) {
var octetstring v_cert := bit2oct(encvalue(vc_at_certificates[0].certificate));
var Oct32 v_wholeHash := f_hashWithSha256(v_cert);
var HashedId8 v_hashedId8_sha256 := f_hashedId8FromSha256(v_wholeHash);
var charstring v_cert_id;
var HashedId8 v_hashedId8;
var HashedId8 v_issuer;
var octetstring v_public_key_x := ''O;
var octetstring v_public_key_y := ''O;
var octetstring v_public_key_compressed;
var integer v_verify_compressed_mode;
var template (omit) octetstring v_public_enc_key_x := omit;
var template (omit) octetstring v_public_enc_key_y := omit;
var template (omit) octetstring v_public_enc_compressed_key := omit;
var template (omit) integer v_public_enc_key_compressed_mode := omit;
log("a_process_cf_ut_command: triggerAuthorizationRequest: vc_at_counter=", vc_at_counter);
log("a_process_cf_ut_command: triggerAuthorizationRequest: vc_at_certificates=", vc_at_certificates);
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
1828
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
1846
1847
1848
1849
1850
1851
1852
1853
1854
1855
1856
1857
1858
1859
1860
1861
1862
1863
1864
1865
1866
1867
1868
1869
1870
1871
1872
1873
1874
1875
1876
1877
1878
1879
1880
// Prepare to store the new certificate
if (ischosen(vc_at_certificates[0].certificate.issuer.sha256AndDigest)) {
v_hashedId8 := v_hashedId8_sha256;
v_issuer := vc_at_certificates[0].certificate.issuer.sha256AndDigest;
} else if (ischosen(vc_at_certificates[0].certificate.issuer.sha384AndDigest)) {
v_hashedId8 := f_hashedId8FromSha384(f_hashWithSha384(v_cert));
v_issuer := vc_at_certificates[0].certificate.issuer.sha384AndDigest;
} else {
log("a_process_cf_ut_command: Wrong certificate format, self_ not expected as issuer, back to initial");
vc_security_state := 0; // 0: initial
vc_reenrolment := false;
vc_ec_counter := 0;
vc_ec_certificates := {};
vc_at_counter := 0;
vc_at_certificates := {};
repeat;
}
v_cert_id := hex2str(oct2hex(v_hashedId8));
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_cert_id =", v_cert_id);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_cert =", v_cert);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_wholeHash =", v_wholeHash);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_hashedId8_sha256 =", v_hashedId8_sha256);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_hashedId8 =", v_hashedId8);
// Extract verification keys
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256)) {
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_0)) {
v_public_key_compressed := vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_0;
v_verify_compressed_mode := 0;
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_1)) {
v_public_key_compressed := vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_1;
v_verify_compressed_mode := 1;
} else { // TODO
}
if (lengthof(v_public_key_x) == 0) {
v_public_key_x := v_public_key_compressed; // Key X-Coordinate
fx_get_uncompressed_key_nistp256(vc_at_certificates[0].private_key, v_public_key_compressed, v_verify_compressed_mode, v_public_key_y); // Key Y-Coordinate
}
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1)) {
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_0)) {
v_public_key_compressed := vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_0;
v_verify_compressed_mode := 0;
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_1)) {
v_public_key_compressed := vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_1;
v_verify_compressed_mode := 1;
} else { // TODO
}
if (lengthof(v_public_key_x) == 0) {
v_public_key_x := v_public_key_compressed; // Key X-Coordinate
fx_get_uncompressed_key_brainpoolp256r1(vc_at_certificates[0].private_key, v_public_key_compressed, v_verify_compressed_mode, v_public_key_y); // Key Y-Coordinate
}
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP384r1)) {
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP384r1.compressed_y_0)) {
v_public_key_compressed := vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP384r1.compressed_y_0;
v_verify_compressed_mode := 0;
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP384r1.compressed_y_1)) {
v_public_key_compressed := vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP384r1.compressed_y_1;
v_verify_compressed_mode := 1;
} else { // TODO
}
if (lengthof(v_public_key_x) == 0) {
v_public_key_x := v_public_key_compressed; // Key X-Coordinate
fx_get_uncompressed_key_brainpoolp384r1(vc_at_certificates[0].private_key, v_public_key_compressed, v_verify_compressed_mode, v_public_key_y); // Key Y-Coordinate
}
} else {
log("a_process_cf_ut_command: Wrong certificate format, invalid verification key, back to initial");
vc_security_state := 0; // 0: initial
vc_reenrolment := false;
vc_ec_counter := 0;
vc_ec_certificates := {};
vc_at_counter := 0;
vc_at_certificates := {};
repeat;
}
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_key_x =", v_public_key_x);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_key_y =", v_public_key_y);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_key_compressed =", v_public_key_compressed);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_verify_compressed_mode=", v_verify_compressed_mode);
// Extract encryption key
if (ispresent(vc_at_certificates[0].certificate.toBeSigned.encryptionKey)) {
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesNistP256)) {
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesNistP256.compressed_y_0)) {
v_public_enc_compressed_key := vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesNistP256.compressed_y_0;
v_public_enc_key_compressed_mode := 0;
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesNistP256.compressed_y_1)) {
v_public_enc_compressed_key := vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesNistP256.compressed_y_1;
v_public_enc_key_compressed_mode := 1;
} else { // TODO
}
if (not(ispresent(v_public_enc_key_x))) {
var octetstring v_key;
v_public_enc_key_x := v_public_enc_compressed_key; // Key X-Coordinate
fx_get_uncompressed_key_nistp256(vc_at_certificates[0].private_enc_key, valueof(v_public_enc_compressed_key), valueof(v_public_enc_key_compressed_mode), v_key); // Key Y-Coordinate
v_public_enc_key_y := v_key;
}
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesBrainpoolP256r1)) {
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesBrainpoolP256r1.compressed_y_0)) {
v_public_enc_compressed_key := vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesBrainpoolP256r1.compressed_y_0;
v_public_enc_key_compressed_mode := 0;
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesBrainpoolP256r1.compressed_y_1)) {
v_public_enc_compressed_key := vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesBrainpoolP256r1.compressed_y_1;
v_public_enc_key_compressed_mode := 1;
} else { // TODO
}
if (not(ispresent(v_public_enc_key_x))) {
var octetstring v_key;
v_public_enc_key_x := v_public_enc_compressed_key; // Key X-Coordinate
fx_get_uncompressed_key_brainpoolp256r1(vc_at_certificates[0].private_enc_key, valueof(v_public_enc_compressed_key), valueof(v_public_enc_key_compressed_mode), v_key); // Key Y-Coordinate
v_public_enc_key_y := v_key;
}
} else {
log("a_process_cf_ut_command: Wrong certificate format, invalid verification key, back to initial");
vc_security_state := 0; // 0: initial
vc_reenrolment := false;
vc_ec_counter := 0;
vc_ec_certificates := {};
vc_at_counter := 0;
vc_at_certificates := {};
repeat;
}
}
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_enc_key_x =", v_public_enc_key_x);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_enc_key_y =", v_public_enc_key_y);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_enc_compressed_key =", v_public_enc_compressed_key);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_enc_key_compressed_mode=", v_public_enc_key_compressed_mode);
// Store the certificate
log("a_process_cf_ut_command: Store new AT certificate");
if (fx_store_certificate(v_cert_id, v_cert, vc_at_certificates[0].private_key, v_public_key_x, v_public_key_y, v_public_key_compressed, v_verify_compressed_mode, v_wholeHash, v_hashedId8_sha256, v_hashedId8, v_issuer, vc_at_certificates[0].private_enc_key, v_public_enc_key_x, v_public_enc_key_y, v_public_enc_compressed_key, v_public_enc_key_compressed_mode) == false) {
log("a_process_cf_ut_command: Failed to store certificate, back to initial");
vc_security_state := 0; // 0: initial
vc_reenrolment := false;
vc_ec_counter := 0;
vc_ec_certificates := {};
vc_at_counter := 0;
vc_at_certificates := {};
repeat;
}
// Update the Test System
log("a_process_cf_ut_command (pki): Change certificate to ", v_cert_id);
f_acTriggerSecEvent(m_acEnableSecurity(v_cert_id));
// Enrolled & Authorized, start CAM emission
tc_cam.start(vc_cam_timer_value);
}
[] cfPort.receive {
// Ignore it
log("*** " & testcasename() & ": INFO: Unexpected CF message received ***");
repeat;
}
} // End of 'altstep' statement
function f_trigger_enrolment_request_await_response() runs on ItsPkiHttpRsuSimulator {
// Local variables
var Oct32 v_private_key;
var Oct32 v_compressed_public_key;
var integer v_compressed_mode;
var Oct32 v_request_hash;
var Oct16 v_encrypted_sym_key;
var Oct16 v_aes_sym_key;
var Oct16 v_authentication_vector;
var Oct12 v_nonce;
var octetstring v_salt;
var Ieee1609Dot2Data v_ieee1609dot2_signed_and_encrypted_data;
var HttpMessage v_response;
var EtsiTs102941Data v_etsi_ts_102941_data;
timer v_t := 5.0;
log(">>> f_trigger_enrolment_request_await_response");
f_cfHttpUp(PICS_IUT_EA_CERTIFICATE_ID, PICS_IUT_AA_CERTIFICATE_ID);
1913
1914
1915
1916
1917
1918
1919
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
1932
1933
1934
1935
1936
1937
1938
f_http_build_inner_ec_request(v_private_key, v_compressed_public_key, v_compressed_mode, v_aes_sym_key, v_encrypted_sym_key, v_authentication_vector, v_nonce, v_salt, v_ieee1609dot2_signed_and_encrypted_data, v_request_hash);
f_init_default_headers_list(-, "inner_ec_request", v_headers);
httpPort.send(
m_http_request(
m_http_request_post(
PICS_HTTP_POST_URI,
v_headers,
m_http_message_body_binary(
m_binary_body_ieee1609dot2_data(
v_ieee1609dot2_signed_and_encrypted_data
)))));
// Wait for the resposne
v_t.start;
alt {
[] httpPort.receive(
mw_http_response(
mw_http_response_ok(
mw_http_message_body_binary(
mw_binary_body_ieee1609dot2_data(
mw_enrolmentResponseMessage(
mw_encryptedData(
-,
mw_SymmetricCiphertext_aes128ccm
))))))) -> value v_response {
v_t.stop;
log("f_trigger_enrolment_request_await_response: v_response=", v_response);
if (f_verify_pki_response_message(v_private_key, v_aes_sym_key, v_authentication_vector, vc_eaWholeHash, v_response.response.body.binary_body.ieee1609dot2_data, false, -, v_etsi_ts_102941_data) == false) {
log("f_trigger_enrolment_request_await_response: Failed to verify PKI message ***");
} else {
log("f_trigger_enrolment_request_await_response: v_etsi_ts_102941_data=", v_etsi_ts_102941_data);
// Verify the received EC certificate
log("f_trigger_enrolment_request_await_response: match ", match(v_etsi_ts_102941_data.content, mw_enrolmentResponse(mw_innerEcResponse_ok(substr(v_request_hash, 0, 16), mw_etsiTs103097Certificate(-, mw_toBeSignedCertificate_ec, -)))), " ***"); // TODO In TITAN, this is the only way to get the unmatching in log
if (match(v_etsi_ts_102941_data.content, mw_enrolmentResponse(mw_innerEcResponse_ok(substr(v_request_hash, 0, 16), mw_etsiTs103097Certificate(-, mw_toBeSignedCertificate_ec, -))))) {
var InnerEcResponse v_inner_ec_response := v_etsi_ts_102941_data.content.enrolmentResponse;
if (f_verify_ec_certificate(v_etsi_ts_102941_data.content.enrolmentResponse.certificate, vc_eaCertificate, vc_eaHashedId8, v_compressed_public_key, v_compressed_mode)) {
var EcData v_ec_data;
log("f_trigger_enrolment_request_await_response: p_inner_ec_response= ", v_inner_ec_response);
// Send the new certificate for storing
v_ec_data.private_key := v_private_key;
v_ec_data.aes_sym_key := v_aes_sym_key;
v_ec_data.certificate := v_inner_ec_response.certificate;
log("f_trigger_enrolment_request_await_response: send v_ec_data=", v_ec_data);
resultPort.send(v_ec_data);
} else {
log("f_trigger_enrolment_request_await_response: Cannot verify EC certificate signature ***");
}
} else {
log("f_trigger_enrolment_request_await_response: Unexpected message received ***");
}
}
}
[] v_t.timeout {
log("*** " & testcasename() & ": INCONC: Expected message not received ***");
}
} // End of 'alt' statement
f_cfHttpDown();
log("<<< f_trigger_enrolment_request_await_response");
}
function f_trigger_authorization_request_await_response(
in integer p_ec_counter,
in SequenceOfEcData p_ec_certificates
) runs on ItsPkiHttpRsuSimulator {
var Oct32 v_private_key_at;
var Oct32 v_public_compressed_key_at;
var integer p_compressed_mode_at;
var Oct32 v_private_enc_key_at;
var Oct32 v_public_compressed_enc_key_at;
var integer v_compressed_enc_mode_at;
var Oct16 v_encrypted_sym_key;
var Oct16 v_aes_sym_key;
var HashedId8 v_aes_sym_key_hashed_id8;
var Oct16 v_authentication_vector;
var Oct12 v_nonce;
var octetstring v_salt;
var Ieee1609Dot2Data v_ieee1609dot2_signed_and_encrypted_data;
var Oct32 v_request_hash;
var bitstring v_encoded_value;
var Ieee1609Dot2Data v_authorization_response;
var HttpMessage v_response;
var EtsiTs102941Data v_etsi_ts_102941_data;