TestCodec_Certificates.ttcn 54.1 KB
Newer Older
garciay's avatar
garciay committed
/*
 * @author
 *     
 * @version
 *     1.0
 * @desc
 *     
 * @remark
 *     
 * @see
 *     
 */ 
module TestCodec_Certificates {
  // LibCommon
  import from LibCommon_BasicTypesAndValues all;
  import from LibCommon_DataStrings all;
garciay's avatar
garciay committed
  
  // LibIts
  import from IEEE1609dot2BaseTypes language "ASN.1:1997" all;
  import from IEEE1609dot2 language "ASN.1:1997" all;
  import from EtsiTs103097Module language "ASN.1:1997" all;
  
  // LibItsSecurity
  import from LibItsSecurity_EncdecDeclarations all;
  import from LibItsSecurity_TypesAndValues all;
  import from LibItsSecurity_Templates all;
  import from LibItsSecurity_Functions all;
  import from LibItsSecurity_Pixits all;
garciay's avatar
garciay committed
  // TestCodec
  import from TestCodec_TestAndSystem all;
  
garciay's avatar
garciay committed
  /**
   * @desc Root certificate / NistP256
   * @see ETSI TS 103 097 V1.3.1 Clause 7.2.1 Authorization tickets
   */
  testcase tc_root_certificate_sha256_1() runs on TCType system TCType {
    var template (value) EtsiTs103097Certificate v_cert; // ETSI TS 103 097 V1.3.1 Clause 6 Bullet 1
    var EtsiTs103097Certificate v_cert_dec; 
    var charstring v_certId := "STF538 Root Certificate";
    var HashAlgorithm v_self := sha256; // ETSI TS 103 097 V1.3.1 Clause 7.2.3 Root CA certificates Bullet 1
    var SequenceOfPsidSsp v_appPermissions := { // ETSI TS 102 965 Table A.1: ETSI ITS standardized ITS-AIDs
      valueof(m_appPermissions(36, { bitmapSsp := '830001'O })), 
      valueof(m_appPermissions(37, { bitmapSsp := '830001'O })) 
    };
    var SequenceOfPsidSspRange v_certIssuePermissions := { // ETSI TS 103 097 V1.3.1 Clause 7.2.3 Root CA certificates Bullet 3
      valueof(m_psidSspRange(1)) 
garciay's avatar
garciay committed
    };
    var Oct32 v_private_key := int2oct(0, 32);
    var Oct32 v_publicKeyX := int2oct(0, 32);
    var Oct32 v_publicKeyY := int2oct(0, 32);
    var Oct32 v_publicKeyCompressed := int2oct(0, 32);
    var integer v_compressedMode;
garciay's avatar
garciay committed
    var HashedId8 v_sha256AndDigest;
    var Oct32 v_sig := int2oct(0, 32);
    var bitstring v_encMsg := ''B;
    var EccP256CurvePoint v_eccPoint;
garciay's avatar
garciay committed
      
    // Generate Private/Public keys
    f_generate_key_pair_nistp256(v_private_key, v_publicKeyX, v_publicKeyY, v_publicKeyCompressed, v_compressedMode);
    // Fill Certificate template with the public compressed keys (canonical form)
    if (v_compressedMode == 0) {
      v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_0(v_publicKeyCompressed));
    } else {
      v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_1(v_publicKeyCompressed));
    }
garciay's avatar
garciay committed
  v_cert := m_etsiTs103097Certificate(
                                      m_issuerIdentifier_self(v_self),
                                      m_toBeSignedCertificate_ca(
                                                              { name := v_certId },
                                                              v_appPermissions,
                                                              { 
                                                                m_psidGroupPermissions(
                                                                                       m_subjectPermissions_explicit(
                                                                                                                     v_certIssuePermissions
                                                                                                                     ))
                                                                },
                                                              m_verificationKeyIndicator_verificationKey( 
                                                                                                         m_publicVerificationKey_ecdsaNistP256(
garciay's avatar
garciay committed
                                                              m_validityPeriod(
                                                                               17469212,
                                                                               m_duration_years(10)
                                                                               )
                                                              )
                                      );
    // Encode it ==> Get octetstring
garciay's avatar
garciay committed
    log("Encode template ", valueof(v_cert.toBeSigned));
    v_encMsg := encvalue(v_cert.toBeSigned);
garciay's avatar
garciay committed
    // Sign the certificate using ECDSA/SHA-256 (NIST p-256)
    // IEEE Std 1609.2-20XX Clause 5.3.1 ii) If the verification type is self-signed, signer identifier input shall be the empty string, i.e., a string of length 0.
    v_sig := f_signWithEcdsaNistp256WithSha256(bit2oct(v_encMsg), int2oct(0, 32), v_private_key);
    if (lengthof(v_sig) != 64) {
      log("Invalid signature: ", v_sig);
      setverdict(fail);
    }
    v_cert.signature_ := m_signature_ecdsaNistP256(
                                                   m_ecdsaP256Signature(
                                                                        m_eccP256CurvePoint_x_only(
                                                                                                   substr(v_sig, 0, 32)
                                                                                                   ),
                                                                        substr(v_sig, 32, 32)
                                                                        )
                                                   );
garciay's avatar
garciay committed
    // Final certificate
  v_encMsg := encvalue(v_cert);
    setverdict(pass, "Encoding passed.");
    // Decode and check signature
garciay's avatar
garciay committed
    if (decvalue(v_encMsg, v_cert_dec) != 0) {
      setverdict(fail);
      stop;
    }
    v_encMsg := encvalue(v_cert_dec.toBeSigned);
    if (ischosen(v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_0)) {
      v_compressedMode := 0;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_0;
    } else {
      v_compressedMode := 1;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_1;
    }
garciay's avatar
garciay committed
    if (f_verifyWithEcdsaNistp256WithSha256(
                                            bit2oct(v_encMsg), 
garciay's avatar
garciay committed
                                            v_cert_dec.signature_.ecdsaNistP256Signature.rSig.x_only & v_cert_dec.signature_.ecdsaNistP256Signature.sSig,
                                            v_publicKeyCompressed,
                                            v_compressedMode
garciay's avatar
garciay committed
                                            ) == false) {
garciay's avatar
garciay committed
      setverdict(fail);
    } else {
      setverdict(pass)
garciay's avatar
garciay committed
      }
    
garciay's avatar
garciay committed
  } // End of testcase tc_root_certificate_sha256_1
   
  /**
   * @desc Root certificate / BrainpoolP256
   * @see ETSI TS 103 097 V1.3.1 Clause 7.2.1 Authorization tickets
   */
  testcase tc_root_certificate_sha256_2() runs on TCType system TCType {
    var template (value) EtsiTs103097Certificate v_cert; // ETSI TS 103 097 V1.3.1 Clause 6 Bullet 1
    var EtsiTs103097Certificate v_cert_dec; 
    var charstring v_certId := "STF538 Root Certificate";
    var HashAlgorithm v_self := sha256; // ETSI TS 103 097 V1.3.1 Clause 7.2.3 Root CA certificates Bullet 1
    var SequenceOfPsidSsp v_appPermissions := { // ETSI TS 102 965 Table A.1: ETSI ITS standardized ITS-AIDs
      valueof(m_appPermissions(36, { bitmapSsp := '830001'O })), 
      valueof(m_appPermissions(37, { bitmapSsp := '830001'O })) 
    };
    var SequenceOfPsidSspRange v_certIssuePermissions := { // ETSI TS 103 097 V1.3.1 Clause 7.2.3 Root CA certificates Bullet 3
      valueof(m_psidSspRange(1)) 
garciay's avatar
garciay committed
    };
    var Oct32 v_private_key := int2oct(0, 32);
    var Oct32 v_publicKeyX := int2oct(0, 32);
    var Oct32 v_publicKeyY := int2oct(0, 32);
    var Oct32 v_publicKeyCompressed := int2oct(0, 32);
    var integer v_compressedMode;
garciay's avatar
garciay committed
    var HashedId8 v_sha256AndDigest;
    var Oct32 v_sig := int2oct(0, 32);
    var bitstring v_encMsg := ''B;
    var EccP256CurvePoint v_eccPoint;
garciay's avatar
garciay committed
      
    // Generate Private/Public keys
    f_generate_key_pair_brainpoolp256(v_private_key, v_publicKeyX, v_publicKeyY, v_publicKeyCompressed, v_compressedMode);
    // Fill Certificate template with the public key using canonical form
    if (v_compressedMode == 0) {
      v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_0(v_publicKeyCompressed));
    } else {
      v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_1(v_publicKeyCompressed));
    }
garciay's avatar
garciay committed
  v_cert := m_etsiTs103097Certificate(
                                      m_issuerIdentifier_self(v_self),
                                      m_toBeSignedCertificate_ca(
garciay's avatar
garciay committed
                                                              { name := v_certId },
                                                              v_appPermissions,
                                                              { 
                                                                m_psidGroupPermissions(
                                                                                       m_subjectPermissions_explicit(
                                                                                                                     v_certIssuePermissions
                                                                                                                     ))
                                                                },
                                                              m_verificationKeyIndicator_verificationKey( 
                                                                                                         m_publicVerificationKey_ecdsaBrainpoolP256r1(
                                                                                                                                                      v_eccPoint
                                                                                                                                                      )),
garciay's avatar
garciay committed
                                                              m_validityPeriod(
                                                                               17469212,
                                                                               m_duration_years(10)
                                                                               )
                                                                 )
garciay's avatar
garciay committed
                                      );
    // Encode it ==> Get octetstring
garciay's avatar
garciay committed
    log("Encode template ", valueof(v_cert.toBeSigned));
    v_encMsg := encvalue(v_cert.toBeSigned);
garciay's avatar
garciay committed
    // Sign the certificate using ECDSA/SHA-256 (NIST p-256)
    v_sig := f_signWithEcdsaBrainpoolp256WithSha256(bit2oct(v_encMsg), int2oct(0, 32), v_private_key);
    if (lengthof(v_sig) != 64) {
      log("Invalid signature: ", v_sig);
      setverdict(fail);
    }
    v_cert.signature_ := m_signature_ecdsaBrainpoolP256r1(
                                                          m_ecdsaP256Signature(
                                                                               m_eccP256CurvePoint_x_only(
                                                                                                          substr(v_sig, 0, 32)
                                                                                                          ),
                                                                               substr(v_sig, 32, 32)
                                                                               )
                                                          );
garciay's avatar
garciay committed
    // Final certificate
  v_encMsg := encvalue(v_cert);
    setverdict(pass, "Encoding passed.");
    // Decode and check signature
garciay's avatar
garciay committed
    if (decvalue(v_encMsg, v_cert_dec) != 0) {
      setverdict(fail);
      stop;
    }
    v_encMsg := encvalue(v_cert_dec.toBeSigned);
    if (ischosen(v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_0)) {
      v_compressedMode := 0;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_0;
    } else {
      v_compressedMode := 1;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_1;
    }
garciay's avatar
garciay committed
    if (f_verifyWithEcdsaBrainpoolp256WithSha256(
                                                 bit2oct(v_encMsg), 
garciay's avatar
garciay committed
                                                 v_cert_dec.signature_.ecdsaBrainpoolP256r1Signature.rSig.x_only & v_cert_dec.signature_.ecdsaBrainpoolP256r1Signature.sSig,
                                                 v_publicKeyCompressed,
                                                 v_compressedMode
garciay's avatar
garciay committed
                                                 ) == false) {
garciay's avatar
garciay committed
      setverdict(fail);
    } else {
      setverdict(pass)
garciay's avatar
garciay committed
      }
    
garciay's avatar
garciay committed
  } // End of testcase tc_root_certificate_sha256_2
   
  /**
   * @desc Root certificate / BrainpoolP256
   * @see ETSI TS 103 097 V1.3.1 Clause 7.2.1 Authorization tickets
   */
  testcase tc_root_certificate_sha256_3() runs on TCType system TCType {
    var template (value) EtsiTs103097Certificate v_cert; // ETSI TS 103 097 V1.3.1 Clause 6 Bullet 1
    var EtsiTs103097Certificate v_cert_dec; 
    var charstring v_certId := "STF538 Root Certificate";
    var HashAlgorithm v_self := sha256; // ETSI TS 103 097 V1.3.1 Clause 7.2.3 Root CA certificates Bullet 1
    var SequenceOfPsidSsp v_appPermissions := { // ETSI TS 102 965 Table A.1: ETSI ITS standardized ITS-AIDs
      valueof(m_appPermissions(36, { bitmapSsp := '830001'O })), 
      valueof(m_appPermissions(37, { bitmapSsp := '830001'O })) 
    };
    var SequenceOfPsidSspRange v_certIssuePermissions := { // ETSI TS 103 097 V1.3.1 Clause 7.2.3 Root CA certificates Bullet 3
      valueof(m_psidSspRange(1)) 
    };
    var Oct32 v_private_key := int2oct(0, 32);
    var Oct32 v_publicKeyX := int2oct(0, 32);
    var Oct32 v_publicKeyY := int2oct(0, 32);
    var Oct32 v_publicKeyCompressed := int2oct(0, 32);
    var Oct32 v_enc_private_key := int2oct(0, 32);
    var Oct32 v_enc_publicKeyX := int2oct(0, 32);
    var Oct32 v_enc_publicKeyY := int2oct(0, 32);
    var Oct32 v_enc_publicKeyCompressed := int2oct(0, 32);
    var integer v_compressedMode;
    var integer v_enc_compressedMode;
    var HashedId8 v_sha256AndDigest;
    var Oct32 v_sig := int2oct(0, 32);
    var bitstring v_encMsg := ''B;
    var EccP256CurvePoint v_eccPoint;
      
    // Generate Private/Public keys for signature
    f_generate_key_pair_brainpoolp256(v_private_key, v_publicKeyX, v_publicKeyY, v_publicKeyCompressed, v_compressedMode);
    if (v_compressedMode == 0) {
      v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_0(v_publicKeyCompressed));
    } else {
      v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_1(v_publicKeyCompressed));
    }
    // Generate Private/Public keys for encryption
    f_generate_key_pair_brainpoolp256(v_enc_private_key, v_enc_publicKeyX, v_enc_publicKeyY, v_enc_publicKeyCompressed, v_enc_compressedMode);
    // Fill Certificate template with the public key      
  v_cert := m_etsiTs103097Certificate(
                                      m_issuerIdentifier_self(v_self),
                                      m_toBeSignedCertificate_ca(
                                                                 { name := v_certId },
                                                                 v_appPermissions,
                                                                 { 
                                                                   m_psidGroupPermissions(
                                                                                          m_subjectPermissions_explicit(
                                                                                                                        v_certIssuePermissions
                                                                                                                        ))
                                                                   },
                                                                 m_verificationKeyIndicator_verificationKey( 
                                                                                                            m_publicVerificationKey_ecdsaBrainpoolP256r1(
                                                                                                                                                         v_eccPoint
                                                                                                                                                         )),
                                                                 m_validityPeriod(
                                                                                  17469212,
                                                                                  m_duration_years(10)
                                                                                  ),
                                                                 -, -, 
                                                                 m_encryptionKey(
                                                                                 aes128Ccm, 
                                                                                 m_publicEncryptionKey_eciesBrainpoolP256r1(                                                                                                                                                                       m_eccP256CurvePoint_uncompressed(
                                                                                                                                                                                                                                                                                                                                    v_enc_publicKeyX,
                                                                                                                                                                                                                                                                                                                                    v_enc_publicKeyY
                                                                                                                                                                                                                                                                                                                                    )
                                                                                                                                                                                                                                                                                                   )
                                                                                 )
                                                                 )
                                      );
    // Encode it ==> Get octetstring
    log("Encode template ", valueof(v_cert.toBeSigned));
    v_encMsg := encvalue(v_cert.toBeSigned);
    // Sign the certificate using ECDSA/SHA-256 (NIST p-256)
    v_sig := f_signWithEcdsaBrainpoolp256WithSha256(bit2oct(v_encMsg), int2oct(0, 32), v_private_key);
    if (lengthof(v_sig) != 64) {
      log("Invalid signature: ", v_sig);
      setverdict(fail);
    }
    v_cert.signature_ := m_signature_ecdsaBrainpoolP256r1(
                                                          m_ecdsaP256Signature(
                                                                               m_eccP256CurvePoint_x_only(
                                                                                                          substr(v_sig, 0, 32)
                                                                                                          ),
                                                                               substr(v_sig, 32, 32)
                                                                               )
                                                          );
    // Final certificate
  v_encMsg := encvalue(v_cert);
    setverdict(pass, "Encoding passed.");
    // Decode and check signature
    if (decvalue(v_encMsg, v_cert_dec) != 0) {
      setverdict(fail);
      stop;
    }
    v_encMsg := encvalue(v_cert_dec.toBeSigned);
    if (ischosen(v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_0)) {
      v_compressedMode := 0;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_0;
    } else {
      v_compressedMode := 1;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_1;
    }
    if (f_verifyWithEcdsaBrainpoolp256WithSha256(
                                                 bit2oct(v_encMsg), 
                                                 v_cert_dec.signature_.ecdsaBrainpoolP256r1Signature.rSig.x_only & v_cert_dec.signature_.ecdsaBrainpoolP256r1Signature.sSig,
                                                 v_publicKeyCompressed,
                                                 v_compressedMode
                                                 ) == false) {
      setverdict(fail);
    } else {
      setverdict(pass)
      }
    
  } // End of testcase tc_root_certificate_sha256_3
   
garciay's avatar
garciay committed
  /**
   * @desc Root certificate / BrainpoolP284
   * @see ETSI TS 103 097 V1.3.1 Clause 7.2.1 Authorization tickets
   */
  testcase tc_root_certificate_sha384_1() runs on TCType system TCType {
    var template (value) EtsiTs103097Certificate v_cert; // ETSI TS 103 097 V1.3.1 Clause 6 Bullet 1
    var EtsiTs103097Certificate v_cert_dec; 
    var charstring v_certId := "STF538 Root Certificate";
    var HashAlgorithm v_self := sha384; // ETSI TS 103 097 V1.3.1 Clause 7.2.3 Root CA certificates Bullet 1
    var SequenceOfPsidSsp v_appPermissions := { // ETSI TS 102 965 Table A.1: ETSI ITS standardized ITS-AIDs
      valueof(m_appPermissions(36, { bitmapSsp := '830001'O })), 
      valueof(m_appPermissions(37, { bitmapSsp := '830001'O })) 
    };
    var SequenceOfPsidSspRange v_certIssuePermissions := { // ETSI TS 103 097 V1.3.1 Clause 7.2.3 Root CA certificates Bullet 3
      valueof(m_psidSspRange(1)) 
garciay's avatar
garciay committed
    };
    var Oct48 v_private_key := int2oct(0, 48);
    var Oct48 v_publicKeyX := int2oct(0, 48);
    var Oct48 v_publicKeyY := int2oct(0, 48);
    var Oct48 v_publicKeyCompressed := int2oct(0, 48);
    var integer v_compressedMode;
garciay's avatar
garciay committed
    var HashedId8 v_sha256AndDigest;
    var Oct48 v_sig := int2oct(0, 48);
    var bitstring v_encMsg := ''B;
    var EccP384CurvePoint v_eccPoint;
garciay's avatar
garciay committed
      
    // Generate Private/Public keys
    f_generate_key_pair_brainpoolp384(v_private_key, v_publicKeyX, v_publicKeyY, v_publicKeyCompressed, v_compressedMode);
    if (v_compressedMode == 0) {
      v_eccPoint := valueof(m_eccP384CurvePoint_compressed_y_0(v_publicKeyCompressed));
    } else {
      v_eccPoint := valueof(m_eccP384CurvePoint_compressed_y_1(v_publicKeyCompressed));
    }
garciay's avatar
garciay committed
    // Fill Certificate template with the public key      
  v_cert := m_etsiTs103097Certificate(
                                      m_issuerIdentifier_self(v_self),
                                      m_toBeSignedCertificate_ca(
                                                                  { name := v_certId },
                                                                  v_appPermissions,
                                                                  { 
                                                                    m_psidGroupPermissions(
                                                                                           m_subjectPermissions_explicit(
                                                                                                                         v_certIssuePermissions
                                                                                                                         ))
                                                                    },
                                                                  m_verificationKeyIndicator_verificationKey(
                                                                                                             m_publicVerificationKey_ecdsaBrainpoolP384r1(
                                                                                                                                                          v_eccPoint
                                                                                                                                                          )),
garciay's avatar
garciay committed
                                                                  m_validityPeriod(
                                                                                   17469212,
                                                                                   m_duration_years(10)
                                                                                   )
                                                                 )
    // Encode it ==> Get octetstring
garciay's avatar
garciay committed
    log("Encode template ", valueof(v_cert.toBeSigned));
    v_encMsg := encvalue(v_cert.toBeSigned);
garciay's avatar
garciay committed
    // Sign the certificate
    v_sig := f_signWithEcdsaBrainpoolp384WithSha384(bit2oct(v_encMsg), int2oct(0, 48), v_private_key);
    if (lengthof(v_sig) != 96) {
      log("Invalid signature: ", v_sig);
      setverdict(fail);
    }
    v_cert.signature_ := m_signature_ecdsaBrainpoolP384r1(
                                                          m_ecdsaP384Signature(
                                                                               m_eccP384CurvePoint_x_only(
                                                                                                          substr(v_sig, 0, 48)
                                                                                                          ),
                                                                               substr(v_sig, 48, 48)
                                                                               )
                                                          );
garciay's avatar
garciay committed
    // Final certificate
  v_encMsg := encvalue(v_cert);
    setverdict(pass, "Encoding passed.");
    // Decode and check signature
garciay's avatar
garciay committed
    if (decvalue(v_encMsg, v_cert_dec) != 0) {
      setverdict(fail);
      stop;
    }
    v_encMsg := encvalue(v_cert_dec.toBeSigned);
    if (ischosen(v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP384r1.compressed_y_0)) {
      v_compressedMode := 0;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP384r1.compressed_y_0;
    } else {
      v_compressedMode := 1;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP384r1.compressed_y_1;
    }
garciay's avatar
garciay committed
    if (f_verifyWithEcdsaBrainpoolp384WithSha384(
                                                 bit2oct(v_encMsg), 
                                                 v_cert_dec.signature_.ecdsaBrainpoolP384r1Signature.rSig.x_only & v_cert_dec.signature_.ecdsaBrainpoolP384r1Signature.sSig,
                                                 v_publicKeyCompressed,
                                                 v_compressedMode
garciay's avatar
garciay committed
                                                 ) == false) {
garciay's avatar
garciay committed
      setverdict(fail);
    } else {
      setverdict(pass)
    }

  } // End of testcase tc_root_certificate_sha384_1
   
  /**
   * @desc EA certificate / NistP256
garciay's avatar
garciay committed
   * @see ETSI TS 103 097 V1.3.1 Clause 7.2.1 Authorization tickets
   */
  testcase tc_ea_certificate_sha256_1() runs on TCType system TCType {
    var template (value) EtsiTs103097Certificate v_cert; // ETSI TS 103 097 V1.3.1 Clause 6 Bullet 1
    var EtsiTs103097Certificate v_cert_dec; 
    var charstring v_certId := "STF538 EA Certificate"; // ETSI TS 103 097 V1.3.1 Clause 7.2.2 Enrolment credential #5
    var HashedId8 v_sha256AndDigest := f_HashedId8FromSha256(f_hashWithSha256('616263'O)); // ETSI TS 103 097 V1.3.1 Clause 7.2.2 Enrolment credential #2
    var SequenceOfPsidSsp v_appPermissions := { // ETSI TS 102 965 Table A.1: ETSI ITS standardized ITS-AIDs
      valueof(m_appPermissions(36, { bitmapSsp := 'FF0001'O })), 
      valueof(m_appPermissions(37, { bitmapSsp := 'FF0001'O })) 
    };
    var Oct32 v_private_key := int2oct(0, 32);
    var Oct32 v_publicKeyX := int2oct(0, 32);
    var Oct32 v_publicKeyY := int2oct(0, 32);
    var Oct32 v_publicKeyCompressed := int2oct(0, 32);
    var integer v_compressedMode;
garciay's avatar
garciay committed
    var Oct32 v_sig := int2oct(0, 32);
    var bitstring v_encMsg := ''B;
    var EccP256CurvePoint v_eccPoint;
garciay's avatar
garciay committed
      
    // Generate Private/Public keys
    f_generate_key_pair_nistp256(v_private_key, v_publicKeyX, v_publicKeyY, v_publicKeyCompressed, v_compressedMode);
    if (v_compressedMode == 0) {
      v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_0(v_publicKeyCompressed));
    } else {
      v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_1(v_publicKeyCompressed));
    }
garciay's avatar
garciay committed
    // Fill Certificate template with the public key      
  v_cert := m_etsiTs103097Certificate(
                                      m_issuerIdentifier_sha256AndDigest(v_sha256AndDigest),
                                      m_toBeSignedCertificate_ea(
                                                                 { name := v_certId },
                                                                 v_appPermissions,
                                                                 m_verificationKeyIndicator_verificationKey(
garciay's avatar
garciay committed
                                                                                                            m_publicVerificationKey_ecdsaNistP256(
                                                                 m_validityPeriod(
                                                                                  17469212,
                                                                                  m_duration_years(10)
                                                                                  ),
                                                                 m_geographicRegion_identifiedRegion(
                                                                                                     {
                                                                                                       m_identifiedRegion_country_only(12), 
                                                                                                       m_identifiedRegion_country_only(34)
                                                                                                     }
                                                                                                     )
                                                                 )
garciay's avatar
garciay committed
                                      );
    // Encode it ==> Get octetstring
    log("Encode template ", valueof(v_cert));
    v_encMsg := encvalue(v_cert.toBeSigned);
garciay's avatar
garciay committed
    // Sign the certificate using ECDSA/SHA-256 (NIST p-256)
    v_sig := f_signWithEcdsaNistp256WithSha256(bit2oct(v_encMsg), int2oct(0, 32), v_private_key);
    if (lengthof(v_sig) != 64) {
      log("Invalid signature: ", v_sig);
      setverdict(fail);
    }
    v_cert.signature_ := m_signature_ecdsaNistP256(
                                                   m_ecdsaP256Signature(
                                                                        m_eccP256CurvePoint_x_only(
                                                                                                   substr(v_sig, 0, 32)
                                                                                                   ),
                                                                        substr(v_sig, 32, 32)
                                                                        )
                                                   );
garciay's avatar
garciay committed
    // Final certificate
  v_encMsg := encvalue(v_cert);
      
    setverdict(pass, "Encoding passed.");
    // Decode and check signature
garciay's avatar
garciay committed
    if (decvalue(v_encMsg, v_cert_dec) != 0) {
      setverdict(fail);
      stop;
    }
    v_encMsg := encvalue(v_cert_dec.toBeSigned);
    if (ischosen(v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_0)) {
      v_compressedMode := 0;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_0;
    } else {
      v_compressedMode := 1;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_1;
    }
garciay's avatar
garciay committed
    if (f_verifyWithEcdsaNistp256WithSha256(
                                            bit2oct(v_encMsg), 
garciay's avatar
garciay committed
                                            v_cert_dec.signature_.ecdsaNistP256Signature.rSig.x_only & v_cert_dec.signature_.ecdsaNistP256Signature.sSig,
                                            v_publicKeyCompressed,
                                            v_compressedMode
garciay's avatar
garciay committed
                                           ) == false) {
      setverdict(fail);
    } else {
      setverdict(pass)
    }

  } // End of testcase tc_ea_certificate_sha256_1
   
garciay's avatar
garciay committed
  /**
   * @desc Authorisation Ticket certificate
   * @see ETSI TS 103 097 V1.3.1 Clause 7.2.1 Authorization tickets
   */
  testcase tc_at_certificate_sha256_1() runs on TCType system TCType {
    var template (value) EtsiTs103097Certificate v_cert; // ETSI TS 103 097 V1.3.1 Clause 6 Bullet 1
garciay's avatar
garciay committed
    var EtsiTs103097Certificate v_cert_dec; 
garciay's avatar
garciay committed
    var HashedId8 v_sha256AndDigest := f_HashedId8FromSha256(f_hashWithSha256('616263'O)); // ETSI TS 103 097 V1.3.1 Clause 7.2.1 Authorization tickets #2
    var SequenceOfPsidSsp v_appPermissions := { // ETSI TS 102 965 Table A.1: ETSI ITS standardized ITS-AIDs
      valueof(m_appPermissions(36, { bitmapSsp := '830001'O })), 
      valueof(m_appPermissions(37, { bitmapSsp := '830001'O })) 
    };
garciay's avatar
garciay committed
    var Oct32 v_private_key := int2oct(0, 32);
    var Oct32 v_publicKeyX := int2oct(0, 32);
    var Oct32 v_publicKeyY := int2oct(0, 32);
    var Oct32 v_publicKeyCompressed := int2oct(0, 32);
    var integer v_compressedMode;
garciay's avatar
garciay committed
    var Oct32 v_sig := int2oct(0, 32);
garciay's avatar
garciay committed
    var bitstring v_encMsg := ''B;
    var EccP256CurvePoint v_eccPoint;
garciay's avatar
garciay committed

    if (f_generate_key_pair_nistp256(v_private_key, v_publicKeyX, v_publicKeyY, v_publicKeyCompressed, v_compressedMode) == false) {
garciay's avatar
garciay committed
      setverdict(fail);
      stop;
    }
    if (v_compressedMode == 0) {
      v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_0(v_publicKeyCompressed));
    } else {
      v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_1(v_publicKeyCompressed));
    }
garciay's avatar
garciay committed
  v_cert := m_etsiTs103097Certificate(
                                      m_issuerIdentifier_sha256AndDigest(v_sha256AndDigest),
                                      m_toBeSignedCertificate_at(
                                                                 v_appPermissions,
                                                                 m_verificationKeyIndicator_verificationKey(
garciay's avatar
garciay committed
                                                                                                            m_publicVerificationKey_ecdsaNistP256(
garciay's avatar
garciay committed
                                                                 m_validityPeriod(
                                                                                  17469212,
                                                                                  m_duration_years(10)
                                                                                  ),
                                                                 m_geographicRegion_identifiedRegion(
                                                                                                     {
                                                                                                       m_identifiedRegion_country_only(12), 
                                                                                                       m_identifiedRegion_country_only(34)
                                                                                                       }
                                                                                                     )
garciay's avatar
garciay committed
                                                                )
                                     );
    // Encode it ==> Get octetstring
    log("Encode template ", valueof(v_cert.toBeSigned));
    v_encMsg := encvalue(v_cert.toBeSigned);
garciay's avatar
garciay committed
    // Sign the certificate using ECDSA/SHA-256 (NIST p-256)
    v_sig := f_signWithEcdsaNistp256WithSha256(bit2oct(v_encMsg), int2oct(0, 32), v_private_key);
    if (lengthof(v_sig) != 64) {
      log("Invalid signature: ", v_sig);
      setverdict(fail);
    }
    v_cert.signature_ := m_signature_ecdsaNistP256(
                                                   m_ecdsaP256Signature(
                                                                        m_eccP256CurvePoint_x_only(
                                                                                                   substr(v_sig, 0, 32)
                                                                                                   ),
                                                                        substr(v_sig, 32, 32)
                                                                        )
                                                   );
garciay's avatar
garciay committed
    // Final certificate
garciay's avatar
garciay committed
    v_encMsg := TestEtsiTs103097Certificate(v_cert, false);
    // Decode and check signature
garciay's avatar
garciay committed
    if (decvalue(v_encMsg, v_cert_dec) != 0) {
      setverdict(fail);
      stop;
    }
    v_encMsg := encvalue(v_cert_dec.toBeSigned);
    if (ischosen(v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_0)) {
      v_compressedMode := 0;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_0;
    } else {
      v_compressedMode := 1;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_1;
    }
garciay's avatar
garciay committed
    if (f_verifyWithEcdsaNistp256WithSha256(
                                            bit2oct(v_encMsg), 
garciay's avatar
garciay committed
                                            v_cert_dec.signature_.ecdsaNistP256Signature.rSig.x_only & v_cert_dec.signature_.ecdsaNistP256Signature.sSig,
                                            v_publicKeyCompressed,
                                            v_compressedMode
garciay's avatar
garciay committed
                                           ) == false) {
      setverdict(fail);
    } else {
      setverdict(pass)
    }

garciay's avatar
garciay committed
  } // End of testcase tc_at_certificate_sha256_1
   
  /**
   * @desc Authorisation Ticket certificate
   * @see ETSI TS 103 097 V1.3.1 Clause 7.2.1 Authorization tickets
   */
  testcase tc_at_certificate_sha256_2() runs on TCType system TCType {
    var template (value) EtsiTs103097Certificate v_cert; // ETSI TS 103 097 V1.3.1 Clause 6 Bullet 1
    var EtsiTs103097Certificate v_cert_dec; 
    var HashedId8 v_sha256AndDigest := f_HashedId8FromSha256(f_hashWithSha256('616263'O)); // ETSI TS 103 097 V1.3.1 Clause 7.2.1 Authorization tickets #2
    var SequenceOfPsidSsp v_appPermissions := { // ETSI TS 102 965 Table A.1: ETSI ITS standardized ITS-AIDs
      valueof(m_appPermissions(36, { bitmapSsp := '830001'O })), 
      valueof(m_appPermissions(37, { bitmapSsp := '830001'O })) 
    };
    var SequenceOfPsidSspRange v_certRequestPermissions := { 
garciay's avatar
garciay committed
      valueof(m_psidSspRange(2)) 
    };
garciay's avatar
garciay committed
    var Oct32 v_private_key := int2oct(0, 32);
    var Oct32 v_publicKeyX := int2oct(0, 32);
    var Oct32 v_publicKeyY := int2oct(0, 32);
    var Oct32 v_publicKeyCompressed := int2oct(0, 32);
    var integer v_compressedMode;
garciay's avatar
garciay committed
    var Oct32 v_sig := int2oct(0, 32);
garciay's avatar
garciay committed
    var bitstring v_encMsg := ''B;
    var EccP256CurvePoint v_eccPoint;
    if (f_generate_key_pair_brainpoolp256(v_private_key, v_publicKeyX, v_publicKeyY, v_publicKeyCompressed, v_compressedMode) == false) {
garciay's avatar
garciay committed
      setverdict(fail);
      stop;
    }
    if (v_compressedMode == 0) {
      v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_0(v_publicKeyCompressed));
    } else {
      v_eccPoint := valueof(m_eccP256CurvePoint_compressed_y_1(v_publicKeyCompressed));
    }
garciay's avatar
garciay committed
  v_cert := m_etsiTs103097Certificate(
                                      m_issuerIdentifier_sha256AndDigest(v_sha256AndDigest),
                                      m_toBeSignedCertificate_at(
                                                                 v_appPermissions,
                                                                 m_verificationKeyIndicator_verificationKey(
                                                                                                            m_publicVerificationKey_ecdsaBrainpoolP256r1(
                                                                                                                                                         v_eccPoint
                                                                                                                                                         )),
garciay's avatar
garciay committed
                                                                 m_validityPeriod(
                                                                                  17469212,
                                                                                  m_duration_years(10)
                                                                                  )
                                                                )
                                     );
    // Encode it ==> Get octetstring
    log("Encode template ", valueof(v_cert.toBeSigned));
    v_encMsg := encvalue(v_cert.toBeSigned);
garciay's avatar
garciay committed
    // Sign the certificate using ECDSA/SHA-256 (BP p-256)
    v_sig := f_signWithEcdsaBrainpoolp256WithSha256(bit2oct(v_encMsg), int2oct(0, 32), v_private_key);
    if (lengthof(v_sig) != 64) {
      log("Invalid signature: ", v_sig);
      setverdict(fail);
    }
    v_cert.signature_ := m_signature_ecdsaBrainpoolP256r1(
                                                          m_ecdsaP256Signature(
                                                                               m_eccP256CurvePoint_x_only(
                                                                                                          substr(v_sig, 0, 32)
                                                                                                          ),
                                                                               substr(v_sig, 32, 32)
                                                                               )
                                                          );
garciay's avatar
garciay committed
    // Final certificate
garciay's avatar
garciay committed
  v_encMsg := TestEtsiTs103097Certificate(v_cert, false);
    // Decode and check signature
garciay's avatar
garciay committed
    if (decvalue(v_encMsg, v_cert_dec) != 0) {
garciay's avatar
garciay committed
      setverdict(fail);
      stop;
    }
garciay's avatar
garciay committed
    v_encMsg := encvalue(v_cert_dec.toBeSigned);
    if (ischosen(v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_0)) {
      v_compressedMode := 0;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_0;
    } else {
      v_compressedMode := 1;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_1;
    }
garciay's avatar
garciay committed
    if (f_verifyWithEcdsaBrainpoolp256WithSha256(
garciay's avatar
garciay committed
                                                 bit2oct(v_encMsg), 
garciay's avatar
garciay committed
                                                 v_cert_dec.signature_.ecdsaBrainpoolP256r1Signature.rSig.x_only & v_cert_dec.signature_.ecdsaBrainpoolP256r1Signature.sSig,
                                                 v_publicKeyCompressed,
                                                 v_compressedMode
                                                 ) == false) {
garciay's avatar
garciay committed
      setverdict(fail);
    } else {
      setverdict(pass)
    }

  } // End of testcase tc_at_certificate_sha256_2
garciay's avatar
garciay committed
   
  testcase tc_at_certificate_sha256_3() runs on TCType system TCType {
    var octetstring v_enc_msg := '80030080EAF64113B8B74C6610810D434552545F4955545F415F415400000000005A497A008410E001038001248104038300018001258104038300018002008D8104038300018080849574CBDD2E471BA599CD99E4C350C415761B368D82BB9D9D7BE202A16E69CE41276EEC554EEBC2EFFC12B15132BD8398CB58BB7CE47B1AEB1238FA6F741C469280809BD2B881DBD1ABD7B997A1C55E7F2E55E305F7351CA7514765C900371B4D3DD1C52B8C4613FA8B54754B56B73B1B61E452A99F3B3EB7A37F7BE3FDC0F804BF96'O;
    var EtsiTs103097Certificate v_decMsg;
    var bitstring v_encMsg;
    var integer v_res;

    v_encMsg := oct2bit(v_enc_msg);
    v_res := decvalue(v_encMsg, v_decMsg);
    log("Decoded message: ", v_decMsg);
    setverdict(pass);
  } // End of testcase tc_at_certificate_sha256_3
   
garciay's avatar
garciay committed
  testcase tc_certificate_asn1c_1() runs on TCType system TCType { // CERT_IUT_A_RCA
garciay's avatar
garciay committed
    var EtsiTs103097Certificate v_cert_dec;
garciay's avatar
garciay committed
    var Oct32 v_private_key := 'a005b04678dd9c1fb4f4f99816badd4bda288721c05c5108c4352c24cb539b07'O; // CERT_IUT_A_RCA.vkey
    var bitstring v_enc_msg := oct2bit('8003008100288300000000001874e3808466a8c001012080010780012482080301ffff0301ffff800125820a0401ffffff0401ffffff800189820a0401ffffff0401ffffff80018a820a0401ffffff0401ffffff80018b820a0401ffffff0401ffffff80018c820a0401ffffff0401ffffff00018d00808082cb6d12f0886798e4c2fac41e92e5cdf6c81682e705e0c2905b5aeaceca5bddae8080424789359de2597ab0d78a17f08acdebb10d31d3f0a25b1362e0b56c1a5080135638e7e68c8bf24a0356e570df6465b980ed52317db89822d099c6e6ee72d39d'O); // CERT_IUT_A_RCA.oer
garciay's avatar
garciay committed
    var integer v_compressedMode;
    var Oct32 v_publicKeyCompressed := int2oct(0, 32);
garciay's avatar
garciay committed
    var Oct32 v_sig := int2oct(0, 32);
garciay's avatar
garciay committed
    var EtsiTs103097Certificate v_cert_exp := {
    version := 3,
    type_ := explicit,
    issuer := {
      self_ := sha256
    },
    toBeSigned := {
        id := {
            none_ := NULL
        },
        cracaId := '000000'O,
        crlSeries := 0,
        validityPeriod := {
            start_ := 410313600,
            duration := {
                hours := 26280
            }
        },
        region := omit,
        assuranceLevel := 'C0'O,
        appPermissions := omit,
        certIssuePermissions := {
            {
                subjectPermissions := {
                    explicit := {
                        {
                            psid := 36,
                            sspRange := {
                                bitmapSspRange := {
                                    sspValue := '01FFFF'O,
                                    sspBitmask := '01FFFF'O
                                }
                            }
                        },
                        {
                            psid := 37,
                            sspRange := {
                                bitmapSspRange := {
                                    sspValue := '01FFFFFF'O,
                                    sspBitmask := '01FFFFFF'O
                                }
                            }
                        },
                        {
                            psid := 137,
                            sspRange := {
                                bitmapSspRange := {
                                    sspValue := '01FFFFFF'O,
                                    sspBitmask := '01FFFFFF'O
                                }
                            }
                        },
                        {
                            psid := 138,
                            sspRange := {
                                bitmapSspRange := {
                                    sspValue := '01FFFFFF'O,
                                    sspBitmask := '01FFFFFF'O
                                }
                            }
                        },
                        {
                            psid := 139,
                            sspRange := {
                                bitmapSspRange := {
                                    sspValue := '01FFFFFF'O,
                                    sspBitmask := '01FFFFFF'O
                                }
                            }
                        },
                        {
                            psid := 140,
                            sspRange := {
                                bitmapSspRange := {
                                    sspValue := '01FFFFFF'O,
                                    sspBitmask := '01FFFFFF'O
                                }
                            }
                        },
                        {
                            psid := 141,
                            sspRange := omit
                        }
                    }
                },
                minChainLength := 0,
                chainLengthRange := 0,
                eeType := '00000000'B
            }
        },
        certRequestPermissions := omit,
        canRequestRollover := omit,
        encryptionKey := omit,
        verifyKeyIndicator := {
            verificationKey := {
                ecdsaNistP256 := {
                    compressed_y_0 := 'CB6D12F0886798E4C2FAC41E92E5CDF6C81682E705E0C2905B5AEACECA5BDDAE'O
                }
            }
        }
    },
    signature_ := {
        ecdsaNistP256Signature := {
            rSig := {
                x_only := '424789359DE2597AB0D78A17F08ACDEBB10D31D3F0A25B1362E0B56C1A508013'O
            },
            sSig := '5638E7E68C8BF24A0356E570DF6465B980ED52317DB89822D099C6E6EE72D39D'O
        }
    }
    };
garciay's avatar
garciay committed
    var integer v_res := decvalue(v_enc_msg, v_cert_dec);
garciay's avatar
garciay committed
      log("Decoded message: ", v_cert_dec);
garciay's avatar
garciay committed
      setverdict(pass, "Decoded succeed");
garciay's avatar
garciay committed
      /* TODO Waiting for bug fixed from Ericson
garciay's avatar
garciay committed
      if (not(match(v_cert_exp, v_cert_dec))) {
        setverdict(fail, "Templates mismatch");
      } else {
        setverdict(pass, "Templates match");
garciay's avatar
garciay committed
        }*/
garciay's avatar
garciay committed
        setverdict(fail, "Decoding failed");
garciay's avatar
garciay committed

    // Create signature and compare with cprovide one
    v_enc_msg := encvalue(v_cert_exp.toBeSigned);
    v_sig := f_signWithEcdsaNistp256WithSha256(bit2oct(v_enc_msg), int2oct(0, 32), v_private_key);
    if (not(match(v_sig, v_cert_dec.signature_.ecdsaNistP256Signature.rSig.x_only & v_cert_dec.signature_.ecdsaNistP256Signature.sSig))) {
        setverdict(fail, "Signature generation mismatch");
      } else {
        setverdict(pass, "Signature generation match");
    }
garciay's avatar
garciay committed
    
garciay's avatar
garciay committed
    if (ischosen(v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_0)) {
      v_compressedMode := 0;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_0;
    } else {
      v_compressedMode := 1;
      v_publicKeyCompressed := v_cert_dec.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_1;
    }
garciay's avatar
garciay committed
    if (f_verifyWithEcdsaNistp256WithSha256(
                                            bit2oct(v_enc_msg), 
                                            int2oct(0, 32),
                                            v_cert_dec.signature_.ecdsaNistP256Signature.rSig.x_only & v_cert_dec.signature_.ecdsaNistP256Signature.sSig,
                                            v_publicKeyCompressed,
                                            v_compressedMode
                                            ) == false) {
garciay's avatar
garciay committed
      setverdict(fail);
    } else {
      setverdict(pass)
    }
garciay's avatar
garciay committed
  } // End of testcase tc_certificate_asn1c_1
garciay's avatar
garciay committed
  group encdec_functions {
        
    function TestEtsiTs103097Certificate(
                                         in template (value) EtsiTs103097Certificate p_cert,
                                         in boolean p_decode := true, 
                                         in template (omit) bitstring p_expEncMsg := omit 
garciay's avatar
garciay committed
                                         ) runs on TCType return bitstring {
garciay's avatar
garciay committed
      var bitstring v_encMsg;
      var template (omit) TestRecord v_tr := { bs := p_expEncMsg };
      var EtsiTs103097Certificate v_decMsg;
      var integer v_res := 0;
    
      // Encode template
      log("Encode template ", valueof(p_cert));
    v_encMsg := encvalue(p_cert);
      log("Encoded message:  ", bit2oct(v_encMsg));
      // Check result
      if (not isbound(v_encMsg)) {
        setverdict(fail, "Encoding failed!");
        stop;
      }
      if (ispresent(v_tr.bs)) {
        if (not match(v_encMsg, p_expEncMsg)) {
          log("Expected message: ", bit2oct(valueof(p_expEncMsg)));
          setverdict(fail, "Encoding failed, not the expected result!");
          stop;
        }
      }
garciay's avatar
garciay committed
      setverdict(pass, "Encoding passed.");
garciay's avatar
garciay committed
    
      // Check decoding
      if (p_decode == true) {
      v_res := decvalue(v_encMsg, v_decMsg);
        log("Decoded message: ", v_decMsg);
        select (v_res) {
        case (0) {
          if(match(v_decMsg, p_cert)) {
            setverdict(pass);
          } else {
            setverdict(fail);
          }
        }
        case (1) {
          setverdict(fail, "Decoding failed.");
        }
        case (2) {
          setverdict(fail, "Not enough bits.");
        }
        }
      }
garciay's avatar
garciay committed
      return v_encMsg;
garciay's avatar
garciay committed
    }
  } // End of group encdec_functions
garciay's avatar
garciay committed
   
garciay's avatar
garciay committed
  control {
garciay's avatar
garciay committed
    execute(tc_root_certificate_sha256_1());
    execute(tc_root_certificate_sha256_2());
    execute(tc_root_certificate_sha384_1());
    execute(tc_ea_certificate_sha256_1());
garciay's avatar
garciay committed
    execute(tc_at_certificate_sha256_1());
    execute(tc_at_certificate_sha256_2());
    execute(tc_at_certificate_sha256_3());
garciay's avatar
garciay committed
    execute(tc_certificate_asn1c_1());
garciay's avatar
garciay committed
  }
garciay's avatar
garciay committed
} // End of module TestCodec_Certificates