Newer
Older
function f_getMsgIssueRevision() runs on ItsRSUsSimulator return MsgCount {
return vc_msgIssueRevision;
}
function f_incDenmSequenceNumber() runs on ItsRSUsSimulator return SequenceNumber {
vc_sequenceNumber := (vc_sequenceNumber + 1) mod 65536; // See SequenceNumber declaration
return vc_sequenceNumber;
}
function f_getDenmSequenceNumber() runs on ItsRSUsSimulator return SequenceNumber {
in integer p_src_port
) return template (present) octetstring {
//log(">>> f_payload_template: ", p_dest_port, " - ", p_src_port);
var template (value) Oct2 v_t1 := int2oct(p_dest_port, 2);
var template (value) Oct2 v_t2 := int2oct(p_src_port, 2);
var template (present) octetstring v_t3 := ? /*? length (5 .. 65535)*/;
var template (present) octetstring v_out := valueof(v_t1) & valueof(v_t2) & v_t3;
//log("<<< f_payload_template: v_out=", v_out);
return v_out
altstep a_process_cf_ut_command() runs on ItsRSUsSimulator {
var UtCamInitialize v_utCamInitialize;
var UtDenmInitialize v_utDenmInitialize;
var UtPkiInitialize v_utPkiInitialize;
var UtDenmTrigger v_utDenmTrigger;
var UtDenmUpdate v_utDenmUpdate;
var UtDenmTermination v_utDenmTermination;
var UtPkiTrigger v_utPkiTrigger;
[] cfPort.receive(UtGnInitialize:?) -> value v_utGnInitialize {
log("a_process_cf_ut_command: v_utGnInitialize = ", v_utGnInitialize);
v_geoNwPdu :=valueof(
m_geoNwPdu(
m_geoNwBeaconPacket(
vc_longPosVectorRsu
),
m_defaultLifetime,
1
)
);
v_geoNwPdu.gnPacket.packet.commonHeader.flags := f_isMobile();
vc_rsuMessagesValueList[vc_rsu_id].beacon := v_geoNwPdu;
cfPort.send(UtGnResults: { utGnInitializeResult := true } );
repeat;
}
log("a_process_cf_ut_command: v_utGnTrigger = ", v_utGnTrigger);
if (ischosen(v_utGnTrigger.geoUnicast)) {
var GnNonSecuredPacket v_geoNwUnicastPacket := valueof(
m_geoNwUnicastPacket_with_payload(
vc_longPosVectorRsu,
f_getIutShortPosVector(),
f_incLocalSeqNumber(),
c_defaultHopLimit,
v_utGnTrigger.geoUnicast.trafficClass,
v_utGnTrigger.geoUnicast.payload
var GeoNetworkingPdu v_geoNwPdu := valueof(
m_geoNwPdu(
v_geoNwUnicastPacket,
m_lifetimeBase1s(v_utGnTrigger.geoUnicast.lifetime / 1000),
v_geoNwPdu.gnPacket.packet.commonHeader.nextHeader := e_any;
v_geoNwPdu.gnPacket.packet.commonHeader.flags := f_isMobile();
v_geoNwPdu.gnPacket.packet.extendedHeader.geoUnicastHeader.dstPosVector.gnAddr := v_utGnTrigger.geoUnicast.gnAddress;
vc_rsuMessagesValueList[vc_rsu_id].beacon := v_geoNwPdu;
cfPort.send(UtGnResults: { utGnTriggerResult := true } );
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
} else if (ischosen(v_utGnTrigger.geoBroadcast)) {
var GeoBroadcastArea v_broadcastArea;
var GnNonSecuredPacket v_geoNwBroadcastPacket;
var GeoNetworkingPdu v_geoNwPdu;
if (v_utGnTrigger.geoBroadcast.shape == e_geoCircle) {
v_broadcastArea.geoBroadcastSubType := e_geoBroadcastCircle;
} else if (v_utGnTrigger.geoBroadcast.shape == e_geoRect) {
v_broadcastArea.geoBroadcastSubType := e_geoBroadcastRect;
} else if (v_utGnTrigger.geoBroadcast.shape == e_geoElip) {
v_broadcastArea.geoBroadcastSubType := e_geoBroadcastElip;
} else {
v_broadcastArea.geoBroadcastSubType := e_reserved;
}
v_broadcastArea.geoBroadcastArea := v_utGnTrigger.geoBroadcast.area;
v_geoNwBroadcastPacket := valueof(
m_geoNwBroadcastPacket_payload(
vc_longPosVectorRsu,
f_incLocalSeqNumber(),
v_broadcastArea,
c_defaultHopLimit,
v_utGnTrigger.geoBroadcast.trafficClass,
v_utGnTrigger.geoBroadcast.payload
));
v_geoNwBroadcastPacket.commonHeader.flags := f_isMobile();
v_geoNwPdu := valueof(
m_geoNwPdu(
v_geoNwBroadcastPacket,
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
m_lifetimeBase1s(v_utGnTrigger.geoBroadcast.lifetime / 1000),
c_defaultHopLimit
));
v_geoNwPdu.gnPacket.packet.commonHeader.nextHeader := e_any;
v_geoNwPdu.gnPacket.packet.commonHeader.flags := f_isMobile();
vc_rsuMessagesValueList[vc_rsu_id].beacon := v_geoNwPdu;
cfPort.send(UtGnResults: { utGnTriggerResult := true } );
} else if (ischosen(v_utGnTrigger.geoAnycast)) {
var GeoAnycastArea v_anycastArea;
var GnNonSecuredPacket v_geoNwAnycastPacket;
var GeoNetworkingPdu v_geoNwPdu;
if (v_utGnTrigger.geoAnycast.shape == e_geoCircle) {
v_anycastArea.geoAnycastSubType := e_geoAnycastCircle;
} else if (v_utGnTrigger.geoAnycast.shape == e_geoRect) {
v_anycastArea.geoAnycastSubType := e_geoAnycastRect;
} else if (v_utGnTrigger.geoAnycast.shape == e_geoElip) {
v_anycastArea.geoAnycastSubType := e_geoAnycastElip;
} else {
v_anycastArea.geoAnycastSubType := e_reserved;
}
v_anycastArea.geoAnycastArea := v_utGnTrigger.geoAnycast.area;
v_geoNwAnycastPacket := valueof(
m_geoNwAnycastPacket_payload(
vc_longPosVectorRsu,
f_incLocalSeqNumber(),
v_anycastArea,
c_defaultHopLimit,
v_utGnTrigger.geoAnycast.trafficClass,
v_utGnTrigger.geoAnycast.payload
));
v_geoNwPdu := valueof(
m_geoNwPdu(
v_geoNwAnycastPacket,
m_lifetimeBase1s(v_utGnTrigger.geoAnycast.lifetime / 1000),
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
v_geoNwPdu.gnPacket.packet.commonHeader.flags := f_isMobile();
v_geoNwPdu.gnPacket.packet.commonHeader.nextHeader := e_any;
vc_rsuMessagesValueList[vc_rsu_id].beacon := v_geoNwPdu;
cfPort.send(UtGnResults: { utGnTriggerResult := true } );
} else if (ischosen(v_utGnTrigger.shb)) {
var GnNonSecuredPacket v_geoShbPacket;
var GeoNetworkingPdu v_geoNwPdu;
v_geoShbPacket := valueof(
m_geoNwShbPacket_payload(
vc_longPosVectorRsu,
v_utGnTrigger.shb.payload
));
v_geoShbPacket.commonHeader.maxHopLimit := 1;
v_geoShbPacket.commonHeader.trafficClass.scf := v_utGnTrigger.shb.trafficClass.scf;
v_geoShbPacket.commonHeader.trafficClass.channelOffload := v_utGnTrigger.shb.trafficClass.channelOffload;
v_geoShbPacket.commonHeader.trafficClass.tcId := v_utGnTrigger.shb.trafficClass.tcId;
v_geoNwPdu := valueof(
m_geoNwPdu(
v_geoShbPacket,
m_defaultLifetime,
1
));
v_geoNwPdu.gnPacket.packet.commonHeader.flags := f_isMobile();
v_geoNwPdu.gnPacket.packet.commonHeader.nextHeader := e_any;
vc_rsuMessagesValueList[vc_rsu_id].beacon := v_geoNwPdu;
cfPort.send(UtGnResults: { utGnTriggerResult := true } );
} else if (ischosen(v_utGnTrigger.tsb)) {
var GnNonSecuredPacket v_geoTsbPacket;
var GeoNetworkingPdu v_geoNwPdu;
v_geoTsbPacket := valueof(
m_geoNwTsbPacket_payload(
f_incLocalSeqNumber(),
vc_longPosVectorRsu,
-,
-,
v_utGnTrigger.tsb.payload
));
v_geoTsbPacket.commonHeader.trafficClass.scf := v_utGnTrigger.tsb.trafficClass.scf;
v_geoTsbPacket.commonHeader.trafficClass.channelOffload := v_utGnTrigger.tsb.trafficClass.channelOffload;
v_geoTsbPacket.commonHeader.trafficClass.tcId := v_utGnTrigger.tsb.trafficClass.tcId;
v_geoNwPdu := valueof(
m_geoNwPdu(
v_geoTsbPacket,
m_defaultLifetime,
c_defaultHopLimit
));
v_geoNwPdu.gnPacket.packet.commonHeader.nextHeader := e_any;
v_geoNwPdu.gnPacket.packet.commonHeader.flags := f_isMobile();
vc_rsuMessagesValueList[vc_rsu_id].beacon := v_geoNwPdu;
cfPort.send(UtGnResults: { utGnTriggerResult := true } );
} else {
cfPort.send(UtGnResults: { utGnTriggerResult := false } );
[vc_cam == true] cfPort.receive(UtCamInitialize:?) -> value v_utCamInitialize {
log("a_process_cf_ut_command: v_utCamInitialize = ", v_utCamInitialize);
if (oct2int(v_utCamInitialize.hashedId8) != 0) {
var charstring v_certificate_id;
var EtsiTs103097Certificate v_certificate;
log("a_process_cf_ut_command: Looking for certificate ", v_utCamInitialize.hashedId8);
f_getCertificateFromDigest(v_utCamInitialize.hashedId8, v_certificate, v_certificate_id);
log("a_process_cf_ut_command (pki): Change certificate to ", v_certificate_id);
f_acTriggerSecEvent(m_acEnableSecurity(v_certificate_id));
}
vc_cam_timer_value := 1.0; // Reset CAM timer
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency.curvature.curvatureValue := 0
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency.heading.headingValue := 0;
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.lowFrequencyContainer.basicVehicleContainerLowFrequency.vehicleRole := default_;
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.specialVehicleContainer := omit;
cfPort.send(UtCamResults: { utCamInitializeResult := true } );
repeat;
[vc_cam == true] cfPort.receive(UtCamTrigger: { changeSpeed := ? }) -> value v_utCamTrigger {
log("a_process_cf_ut_command: v_utCamTrigger = ", v_utCamTrigger);
cfPort.send(UtCamResults: { utCamTriggerResult := true } );
vc_cam_timer_value := vc_cam_timer_value / 2.0;
repeat;
}
[vc_cam == true] cfPort.receive(UtCamTrigger: { changeCurvature := ? }) -> value v_utCamTrigger {
log("a_process_cf_ut_command: v_utCamTrigger = ", v_utCamTrigger);
if (ischosen(vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency)) {
cfPort.send(UtCamResults: { utCamTriggerResult := true } );
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency.curvature.curvatureValue := v_utCamTrigger.changeCurvature;
} else {
cfPort.send(UtCamResults: { utCamTriggerResult := false } );
}
[vc_cam == true] cfPort.receive(UtCamTrigger: { changeHeading := ? }) -> value v_utCamTrigger {
log("a_process_cf_ut_command: v_utCamTrigger = ", v_utCamTrigger);
if (ischosen(vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency)) {
cfPort.send(UtCamResults: { utCamTriggerResult := true } );
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency.heading.headingValue := valueof(vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency.heading.headingValue) + v_utCamTrigger.changeHeading;
} else {
cfPort.send(UtCamResults: { utCamTriggerResult := false } );
}
repeat;
}
[vc_cam == true] cfPort.receive(UtCamTrigger: { setVehicleRole := ? }) -> value v_utCamTrigger {
log("a_process_cf_ut_command: v_utCamTrigger = ", v_utCamTrigger);
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.lowFrequencyContainer.basicVehicleContainerLowFrequency.vehicleRole := v_utCamTrigger.setVehicleRole;
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.specialVehicleContainer := { publicTransportContainer := { embarkationStatus := true, ptActivation := omit } };
cfPort.send(UtCamResults: { utCamTriggerResult := true } );
repeat;
}
[] cfPort.receive(UtDenmInitialize:?) -> value v_utDenmInitialize {
log("a_process_cf_ut_command: v_utDenmInitialize = ", v_utDenmInitialize);
vc_rsuMessagesValueList[vc_rsu_id].denms := {};
vc_denmEventCounter := 0;
vc_denm := true;
cfPort.send(UtDenmResults: { utDenmInitializeResult := true } );
repeat;
[vc_denm == true] cfPort.receive(UtDenmTrigger:?) -> value v_utDenmTrigger {
var template (value) DenmParmContainers v_denmParmContainers;
var DenmEventsParmsPerZone v_denmEventsParmsPerZone := PICS_DENM_EVENTS_RSU_UC1[vc_rsu_id][PX_ETSI_ZONE_ID - 1];
var integer seq_number := f_incDenmSequenceNumber();
log("a_process_cf_ut_command: v_utDenmTrigger: ", v_utDenmTrigger);
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
v_denmParmContainers := m_denmParmContainers(
PICS_RSU_PARAMS[vc_rsu_id].stationID,
seq_number,
v_utDenmTrigger.repetitionInterval,
v_denmEventsParmsPerZone[0].eventPosition,
v_utDenmTrigger.situation.eventType.causeCode,
v_denmEventsParmsPerZone[0].eventHistory,
v_denmEventsParmsPerZone[0].traces,
v_utDenmTrigger.validityDuration,
v_utDenmTrigger.relevanceDistance,
v_utDenmTrigger.relevanceTrafficDirection
);
v_denmParmContainers.managementContainer.detectionTime := v_utDenmTrigger.detectionTime;
vc_rsuMessagesValueList[vc_rsu_id].denms[lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms)] := valueof(
m_denmPdu_rsu(
PICS_RSU_PARAMS[vc_rsu_id].stationID,
m_denm(
v_denmParmContainers.managementContainer,
v_denmParmContainers.situationContainer,
v_denmParmContainers.locationContainer
)));
log("a_process_cf_ut_command: utDenmTrigger: denm=[" & int2char(lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) - 1) & "]=", vc_rsuMessagesValueList[vc_rsu_id].denms[lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) - 1]);
//denm={ { header := { protocolVersion := 2, messageID := 1, stationID := 1111101 }, denm := { management := { actionID := { originatingStationID := 1111101, sequenceNumber := 1 }, detectionTime := 510819417810, referenceTime := 510819420809, termination := omit, eventPosition := { latitude := 367467556, longitude := -45552381, positionConfidenceEllipse := { semiMajorConfidence := 100, semiMinorConfidence := 100, semiMajorOrientation := 0 }, altitude := { altitudeValue := 0, altitudeConfidence := alt_000_01 (0) } }, relevanceDistance := lessThan50m (0), relevanceTrafficDirection := upstreamTraffic (1), validityDuration := 2, transmissionInterval := omit, stationType := 15 }, situation := { informationQuality := 0, eventType := { causeCode := 91, subCauseCode := 0 }, linkedCause := omit, eventHistory := { { eventPosition := { deltaLatitude := 135, deltaLongitude := -147, deltaAltitude := 0 }, eventDeltaTime := omit, informationQuality := 0 }, { eventPosition := { deltaLatitude := -68, deltaLongitude := 74, deltaAltitude := 0 }, eventDeltaTime := omit, informationQuality := 0 } } }, location := { eventSpeed := omit, eventPositionHeading := omit, traces := { { { pathPosition := { deltaLatitude := -1086, deltaLongitude := 2551, deltaAltitude := 0 }, pathDeltaTime := omit }, { pathPosition := { deltaLatitude := -450, deltaLongitude := 1010, deltaAltitude := 0 }, pathDeltaTime := omit }, { pathPosition := { deltaLatitude := -460, deltaLongitude := 1000, deltaAltitude := 0 }, pathDeltaTime := omit }, { pathPosition := { deltaLatitude := -440, deltaLongitude := 1000, deltaAltitude := 0 }, pathDeltaTime := omit }, { pathPosition := { deltaLatitude := -440, deltaLongitude := 990, deltaAltitude := 0 }, pathDeltaTime := omit } } }, roadType := omit }, alacarte := omit } } }
if (lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) == 1) {
tc_denm.start;
}
cfPort.send(UtDenmResults: { utDenmTriggerResult := { result := true, actionId := vc_rsuMessagesValueList[vc_rsu_id].denms[lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) - 1].denm.management.actionID } } );
repeat;
}
[vc_denm == true] cfPort.receive(UtDenmUpdate:?) -> value v_utDenmUpdate {
var integer v_i := 0;
var boolean v_found := false;
log("a_process_cf_ut_command: v_utDenmUpdate = ", v_utDenmUpdate);
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
for (v_i := 0; v_i < lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms); v_i := v_i + 1) {
if (v_utDenmUpdate.actionId.sequenceNumber == valueof(vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.actionID.sequenceNumber)) {
v_found := true;
break;
}
} // End of 'for' statement
if (v_found == true) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.detectionTime := v_utDenmUpdate.detectionTime;
if (ispresent(v_utDenmUpdate.validityDuration)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.validityDuration := v_utDenmUpdate.validityDuration;
}
if (ispresent(v_utDenmUpdate.situation)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.situation := v_utDenmUpdate.situation;
}
if (ispresent(v_utDenmUpdate.relevanceDistance)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.relevanceDistance := v_utDenmUpdate.relevanceDistance;
}
if (ispresent(v_utDenmUpdate.relevanceTrafficDirection)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.relevanceTrafficDirection := v_utDenmUpdate.relevanceTrafficDirection;
}
if (ispresent(v_utDenmUpdate.transmissionInterval)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.transmissionInterval := v_utDenmUpdate.transmissionInterval;
}
if (ispresent(v_utDenmUpdate.transmissionInterval)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.transmissionInterval := v_utDenmUpdate.transmissionInterval;
}
if (ispresent(v_utDenmUpdate.alacarte)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.alacarte := v_utDenmUpdate.alacarte;
}
}
cfPort.send(UtDenmResults: { utDenmUpdateResult := { result := true, actionId := vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.actionID } } );
repeat;
}
[vc_denm == true] cfPort.receive(UtDenmTermination:?) -> value v_utDenmTermination {
var integer v_i := 0;
var boolean v_found := false;
log("a_process_cf_ut_command: v_utDenmTermination: ", v_utDenmTermination);
for (v_i := 0; v_i < lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms); v_i := v_i + 1) {
if (v_utDenmTermination.actionId.sequenceNumber == valueof(vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.actionID.sequenceNumber)) {
v_found := true;
break;
}
} // End of 'for' statement
if (v_found == true) {
log("a_process_cf_ut_command: v_utDenmTermination: v_i=", v_i);
log("a_process_cf_ut_command: v_utDenmTermination: l=", lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms));
if (lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) > 1) { //Shift elements
for (var integer v_j := v_i + 1; v_i < lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms); v_i := v_i + 1) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i] := vc_rsuMessagesValueList[vc_rsu_id].denms[v_j];
v_j := v_j + 1;
} // End of 'for' statement
vc_rsuMessagesValueList[vc_rsu_id].denms[lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) - 1] := {}
} else {
vc_rsuMessagesValueList[vc_rsu_id].denms := {};
vc_denmEventCounter := 0;
}
log("v_utDenmTermination: New l=", lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms));
if (lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) == 0) {
tc_denm.stop;
f_sleep(1.0);
vc_denm := false;
}
cfPort.send(UtDenmResults: { utDenmTerminationResult := true } );
}
repeat;
}
[vc_pki == true] cfPort.receive(UtPkiInitialize:?) -> value v_utPkiInitialize {
log("a_process_cf_ut_command: v_utPkiInitialize = ", v_utPkiInitialize);
if (oct2int(v_utPkiInitialize.hashedId8) != 0) {
var charstring v_certificate_id;
var EtsiTs103097Certificate v_certificate;
log("a_process_cf_ut_command: Looking for certificate ", v_utPkiInitialize.hashedId8);
f_getCertificateFromDigest(v_utPkiInitialize.hashedId8, v_certificate, v_certificate_id);
log("a_process_cf_ut_command (pki): Change certificate to ", v_certificate_id);
f_acTriggerSecEvent(m_acEnableSecurity(v_certificate_id));
vc_security_state := 0; // 0: initial
vc_reenrolment := false;
vc_ec_counter := 0;
vc_ec_certificates := {};
vc_at_counter := 0;
vc_at_certificates := {};
tc_cam.stop;
cfPort.send(UtPkiResults: { utPkiInitializeResult := true } );
repeat;
}
[vc_pki == true] cfPort.receive(UtPkiTrigger: { triggerEnrolmentRequest := ? }) -> value v_utPkiTrigger {
var ItsPkiHttpRsuSimulator v_pki;
var EcData v_ec_data;
log("a_process_cf_ut_command: v_utPkiTrigger=", v_utPkiTrigger);
cfPort.send(UtPkiResults: { utPkiTriggerResult := true } );
v_pki := ItsPkiHttpRsuSimulator.create("TriggeredEc") alive;
connect(v_pki:resultPort, self:resultPort);
v_pki.start(f_trigger_enrolment_request_await_response());
tc_wait.start;
alt {
[] resultPort.receive(EcData:?) -> value v_ec_data {
tc_wait.stop;
vc_ec_certificates[vc_ec_counter] := v_ec_data;
vc_ec_counter := vc_ec_counter + 1;
vc_reenrolment := true;
vc_security_state := 1; // 1:enrolled
}
[] tc_wait.timeout {
log("a_process_cf_ut_command: Failed to retrieve EcData");
vc_reenrolment := false;
vc_security_state := 0; // 0: initial
}
} // End of 'alt' statement
disconnect(v_pki:resultPort, self:resultPort);
v_pki.done;
v_pki.kill;
repeat;
}
[vc_pki == true] cfPort.receive(UtPkiTrigger: { triggerAuthorizationRequest := ? }) -> value v_utPkiTrigger {
var ItsPkiHttpRsuSimulator v_pki;
var AtData v_at_data;
cfPort.send(UtPkiResults: { utPkiTriggerResult := true } );
v_pki := ItsPkiHttpRsuSimulator.create("TriggeredAt") alive;
connect(v_pki:resultPort, self:resultPort);
v_pki.start(f_trigger_authorization_request_await_response(
vc_ec_counter,
tc_wait.start;
alt {
[] resultPort.receive(AtData:?) -> value v_at_data {
tc_wait.stop;
vc_at_certificates[vc_at_counter] := v_at_data;
vc_at_counter := vc_at_counter + 1;
vc_security_state := 2; // 2: authorization
}
[] tc_wait.timeout {
log("a_process_cf_ut_command: Failed to retrieve AtData");
vc_security_state := 1; // 1: enrolled
}
} // End of 'alt' statement
disconnect(v_pki:resultPort, self:resultPort);
v_pki.done;
v_pki.kill;
if (vc_security_state == 2) {
var octetstring v_cert := bit2oct(encvalue(vc_at_certificates[0].certificate, "", "LibItsSecurity_asn1"));
var Oct32 v_wholeHash := f_hashWithSha256(v_cert);
var HashedId8 v_hashedId8_sha256 := f_hashedId8FromSha256(v_wholeHash);
var charstring v_cert_id;
var HashedId8 v_hashedId8;
var HashedId8 v_issuer;
var octetstring v_public_key_x := ''O;
var octetstring v_public_key_y := ''O;
var octetstring v_public_key_compressed;
var integer v_verify_compressed_mode;
var template (omit) octetstring v_public_enc_key_x := omit;
var template (omit) octetstring v_public_enc_key_y := omit;
var template (omit) octetstring v_public_enc_compressed_key := omit;
var template (omit) integer v_public_enc_key_compressed_mode := omit;
log("a_process_cf_ut_command: triggerAuthorizationRequest: vc_at_counter=", vc_at_counter);
log("a_process_cf_ut_command: triggerAuthorizationRequest: vc_at_certificates=", vc_at_certificates);
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
// Prepare to store the new certificate
if (ischosen(vc_at_certificates[0].certificate.issuer.sha256AndDigest)) {
v_hashedId8 := v_hashedId8_sha256;
v_issuer := vc_at_certificates[0].certificate.issuer.sha256AndDigest;
} else if (ischosen(vc_at_certificates[0].certificate.issuer.sha384AndDigest)) {
v_hashedId8 := f_hashedId8FromSha384(f_hashWithSha384(v_cert));
v_issuer := vc_at_certificates[0].certificate.issuer.sha384AndDigest;
} else {
log("a_process_cf_ut_command: Wrong certificate format, self_ not expected as issuer, back to initial");
vc_security_state := 0; // 0: initial
vc_reenrolment := false;
vc_ec_counter := 0;
vc_ec_certificates := {};
vc_at_counter := 0;
vc_at_certificates := {};
repeat;
}
v_cert_id := hex2str(oct2hex(v_hashedId8));
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_cert_id =", v_cert_id);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_cert =", v_cert);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_wholeHash =", v_wholeHash);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_hashedId8_sha256 =", v_hashedId8_sha256);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_hashedId8 =", v_hashedId8);
// Extract verification keys
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256)) {
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_0)) {
v_public_key_compressed := vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_0;
v_verify_compressed_mode := 0;
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_1)) {
v_public_key_compressed := vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_1;
v_verify_compressed_mode := 1;
} else { // TODO
}
if (lengthof(v_public_key_x) == 0) {
v_public_key_x := v_public_key_compressed; // Key X-Coordinate
fx_get_uncompressed_key_nistp256(vc_at_certificates[0].private_key, v_public_key_compressed, v_verify_compressed_mode, v_public_key_y); // Key Y-Coordinate
}
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1)) {
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_0)) {
v_public_key_compressed := vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_0;
v_verify_compressed_mode := 0;
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_1)) {
v_public_key_compressed := vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_1;
v_verify_compressed_mode := 1;
} else { // TODO
}
if (lengthof(v_public_key_x) == 0) {
v_public_key_x := v_public_key_compressed; // Key X-Coordinate
fx_get_uncompressed_key_brainpoolp256r1(vc_at_certificates[0].private_key, v_public_key_compressed, v_verify_compressed_mode, v_public_key_y); // Key Y-Coordinate
}
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP384r1)) {
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP384r1.compressed_y_0)) {
v_public_key_compressed := vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP384r1.compressed_y_0;
v_verify_compressed_mode := 0;
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP384r1.compressed_y_1)) {
v_public_key_compressed := vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP384r1.compressed_y_1;
v_verify_compressed_mode := 1;
} else { // TODO
}
if (lengthof(v_public_key_x) == 0) {
v_public_key_x := v_public_key_compressed; // Key X-Coordinate
fx_get_uncompressed_key_brainpoolp384r1(vc_at_certificates[0].private_key, v_public_key_compressed, v_verify_compressed_mode, v_public_key_y); // Key Y-Coordinate
}
} else {
log("a_process_cf_ut_command: Wrong certificate format, invalid verification key, back to initial");
vc_security_state := 0; // 0: initial
vc_reenrolment := false;
vc_ec_counter := 0;
vc_ec_certificates := {};
vc_at_counter := 0;
vc_at_certificates := {};
repeat;
}
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_key_x =", v_public_key_x);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_key_y =", v_public_key_y);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_key_compressed =", v_public_key_compressed);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_verify_compressed_mode=", v_verify_compressed_mode);
// Extract encryption key
if (ispresent(vc_at_certificates[0].certificate.toBeSigned.encryptionKey)) {
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesNistP256)) {
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesNistP256.compressed_y_0)) {
v_public_enc_compressed_key := vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesNistP256.compressed_y_0;
v_public_enc_key_compressed_mode := 0;
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesNistP256.compressed_y_1)) {
v_public_enc_compressed_key := vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesNistP256.compressed_y_1;
v_public_enc_key_compressed_mode := 1;
} else { // TODO
}
if (not(ispresent(v_public_enc_key_x))) {
var octetstring v_key;
v_public_enc_key_x := v_public_enc_compressed_key; // Key X-Coordinate
fx_get_uncompressed_key_nistp256(vc_at_certificates[0].private_enc_key, valueof(v_public_enc_compressed_key), valueof(v_public_enc_key_compressed_mode), v_key); // Key Y-Coordinate
v_public_enc_key_y := v_key;
}
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesBrainpoolP256r1)) {
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesBrainpoolP256r1.compressed_y_0)) {
v_public_enc_compressed_key := vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesBrainpoolP256r1.compressed_y_0;
v_public_enc_key_compressed_mode := 0;
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesBrainpoolP256r1.compressed_y_1)) {
v_public_enc_compressed_key := vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesBrainpoolP256r1.compressed_y_1;
v_public_enc_key_compressed_mode := 1;
} else { // TODO
}
if (not(ispresent(v_public_enc_key_x))) {
var octetstring v_key;
v_public_enc_key_x := v_public_enc_compressed_key; // Key X-Coordinate
fx_get_uncompressed_key_brainpoolp256r1(vc_at_certificates[0].private_enc_key, valueof(v_public_enc_compressed_key), valueof(v_public_enc_key_compressed_mode), v_key); // Key Y-Coordinate
v_public_enc_key_y := v_key;
}
} else {
log("a_process_cf_ut_command: Wrong certificate format, invalid verification key, back to initial");
vc_security_state := 0; // 0: initial
vc_reenrolment := false;
vc_ec_counter := 0;
vc_ec_certificates := {};
vc_at_counter := 0;
vc_at_certificates := {};
repeat;
}
}
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_enc_key_x =", v_public_enc_key_x);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_enc_key_y =", v_public_enc_key_y);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_enc_compressed_key =", v_public_enc_compressed_key);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_enc_key_compressed_mode=", v_public_enc_key_compressed_mode);
// Store the certificate
log("a_process_cf_ut_command: Store new AT certificate");
if (fx_store_certificate(v_cert_id, v_cert, vc_at_certificates[0].private_key, v_public_key_x, v_public_key_y, v_public_key_compressed, v_verify_compressed_mode, v_wholeHash, v_hashedId8_sha256, v_hashedId8, v_issuer, vc_at_certificates[0].private_enc_key, v_public_enc_key_x, v_public_enc_key_y, v_public_enc_compressed_key, v_public_enc_key_compressed_mode) == false) {
log("a_process_cf_ut_command: Failed to store certificate, back to initial");
vc_security_state := 0; // 0: initial
vc_reenrolment := false;
vc_ec_counter := 0;
vc_ec_certificates := {};
vc_at_counter := 0;
vc_at_certificates := {};
repeat;
}
// Update the Test System
log("a_process_cf_ut_command (pki): Change certificate to ", v_cert_id);
f_acTriggerSecEvent(m_acEnableSecurity(v_cert_id));
// Enrolled & Authorized, start CAM emission
tc_cam.start(vc_cam_timer_value);
}
[] cfPort.receive {
// Ignore it
log("*** " & testcasename() & ": INFO: Unexpected CF message received ***");
repeat;
}
} // End of 'altstep' statement
function f_trigger_enrolment_request_await_response() runs on ItsPkiHttpRsuSimulator {
// Local variables
var Oct32 v_private_key;
var Oct32 v_compressed_public_key;
var integer v_compressed_mode;
var Oct32 v_request_hash;
var Oct16 v_encrypted_sym_key;
var Oct16 v_aes_sym_key;
var Oct16 v_authentication_vector;
var Oct12 v_nonce;
var octetstring v_salt;
var Ieee1609Dot2Data v_ieee1609dot2_signed_and_encrypted_data;
var HttpMessage v_response;
var EtsiTs102941Data v_etsi_ts_102941_data;
timer v_t := 5.0;
log(">>> f_trigger_enrolment_request_await_response");
f_cfHttpUp(PICS_IUT_EA_CERTIFICATE_ID, PICS_IUT_AA_CERTIFICATE_ID);
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
f_http_build_inner_ec_request(v_private_key, v_compressed_public_key, v_compressed_mode, v_aes_sym_key, v_encrypted_sym_key, v_authentication_vector, v_nonce, v_salt, v_ieee1609dot2_signed_and_encrypted_data, v_request_hash);
f_init_default_headers_list(-, "inner_ec_request", v_headers);
httpPort.send(
m_http_request(
m_http_request_post(
PICS_HTTP_POST_URI,
v_headers,
m_http_message_body_binary(
m_binary_body_ieee1609dot2_data(
v_ieee1609dot2_signed_and_encrypted_data
)))));
// Wait for the resposne
v_t.start;
alt {
[] httpPort.receive(
mw_http_response(
mw_http_response_ok(
mw_http_message_body_binary(
mw_binary_body_ieee1609dot2_data(
mw_enrolmentResponseMessage(
mw_encryptedData(
-,
mw_SymmetricCiphertext_aes128ccm
))))))) -> value v_response {
v_t.stop;
log("f_trigger_enrolment_request_await_response: v_response=", v_response);
if (f_verify_pki_response_message(v_private_key, v_aes_sym_key, v_authentication_vector, vc_eaWholeHash, v_response.response.body.binary_body.ieee1609dot2_data, false, -, v_etsi_ts_102941_data) == false) {
log("f_trigger_enrolment_request_await_response: Failed to verify PKI message ***");
} else {
log("f_trigger_enrolment_request_await_response: v_etsi_ts_102941_data=", v_etsi_ts_102941_data);
// Verify the received EC certificate
log("f_trigger_enrolment_request_await_response: match ", match(v_etsi_ts_102941_data.content, mw_enrolmentResponse(mw_innerEcResponse_ok(substr(v_request_hash, 0, 16), mw_etsiTs103097Certificate(-, mw_toBeSignedCertificate_ec, -)))), " ***"); // TODO In TITAN, this is the only way to get the unmatching in log
if (match(v_etsi_ts_102941_data.content, mw_enrolmentResponse(mw_innerEcResponse_ok(substr(v_request_hash, 0, 16), mw_etsiTs103097Certificate(-, mw_toBeSignedCertificate_ec, -))))) {
var InnerEcResponse v_inner_ec_response := v_etsi_ts_102941_data.content.enrolmentResponse;
if (f_verify_ec_certificate(v_etsi_ts_102941_data.content.enrolmentResponse.certificate, vc_eaCertificate, vc_eaHashedId8, v_compressed_public_key, v_compressed_mode)) {
var EcData v_ec_data;
log("f_trigger_enrolment_request_await_response: p_inner_ec_response= ", v_inner_ec_response);
// Send the new certificate for storing
v_ec_data.private_key := v_private_key;
v_ec_data.aes_sym_key := v_aes_sym_key;
v_ec_data.certificate := v_inner_ec_response.certificate;
log("f_trigger_enrolment_request_await_response: send v_ec_data=", v_ec_data);
resultPort.send(v_ec_data);
} else {
log("f_trigger_enrolment_request_await_response: Cannot verify EC certificate signature ***");
}
} else {
log("f_trigger_enrolment_request_await_response: Unexpected message received ***");
}
}
}
[] v_t.timeout {
log("*** " & testcasename() & ": INCONC: Expected message not received ***");
}
} // End of 'alt' statement
f_cfHttpDown();
log("<<< f_trigger_enrolment_request_await_response");
}
function f_trigger_authorization_request_await_response(
in integer p_ec_counter,
in SequenceOfEcData p_ec_certificates
) runs on ItsPkiHttpRsuSimulator {
var Oct32 v_private_key_at;
var Oct32 v_public_compressed_key_at;
var integer p_compressed_mode_at;
var Oct32 v_private_enc_key_at;
var Oct32 v_public_compressed_enc_key_at;
var integer v_compressed_enc_mode_at;
var Oct16 v_encrypted_sym_key;
var Oct16 v_aes_sym_key;
var HashedId8 v_aes_sym_key_hashed_id8;
var Oct16 v_authentication_vector;
var Oct12 v_nonce;
var octetstring v_salt;
var Ieee1609Dot2Data v_ieee1609dot2_signed_and_encrypted_data;
var Oct32 v_request_hash;
var bitstring v_encoded_value;
var Ieee1609Dot2Data v_authorization_response;
var HttpMessage v_response;
var EtsiTs102941Data v_etsi_ts_102941_data;
f_cfHttpUp(PICS_IUT_EA_CERTIFICATE_ID, PICS_IUT_AA_CERTIFICATE_ID);
f_http_build_authorization_request(
p_ec_certificates[p_ec_counter - 1].certificate,
p_ec_certificates[p_ec_counter - 1].private_key,
v_private_key_at,
v_public_compressed_key_at,
p_compressed_mode_at,
v_private_enc_key_at,
v_public_compressed_enc_key_at,
v_compressed_enc_mode_at,
v_aes_sym_key,
v_encrypted_sym_key,
v_authentication_vector,
v_nonce,
v_salt,
v_ieee1609dot2_signed_and_encrypted_data,
v_request_hash);
log("f_trigger_authorization_request_await_response: v_ieee1609dot2_signed_and_encrypted_data=", v_ieee1609dot2_signed_and_encrypted_data);
v_aes_sym_key_hashed_id8 := f_hashedId8FromSha256(f_hashWithSha256('80'O & v_aes_sym_key)); // Used to match the response
f_init_default_headers_list(-, "inner_at_request", v_headers);
httpPort.send(
m_http_request(
m_http_request_post(
v_headers,
m_http_message_body_binary(
m_binary_body_ieee1609dot2_data(
v_ieee1609dot2_signed_and_encrypted_data
)))));
// Wait for the resposne
v_t.start;
alt {
[] httpPort.receive(
mw_http_response(
mw_http_response_ok(
mw_http_message_body_binary(
mw_binary_body_ieee1609dot2_data(
mw_enrolmentResponseMessage(
mw_encryptedData(
-,
mw_SymmetricCiphertext_aes128ccm
))))))) -> value v_response {
v_t.stop;
log("f_trigger_authorization_request_await_response: v_response=", v_response);
if (f_verify_pki_response_message(v_private_key_at, v_aes_sym_key, v_authentication_vector, v_request_hash, v_response.response.body.binary_body.ieee1609dot2_data, false, -, v_etsi_ts_102941_data) == false) {
log("f_trigger_authorization_request_await_response: Failed to verify PKI message");
log("f_trigger_authorization_request_await_response: v_etsi_ts_102941_data=", v_etsi_ts_102941_data);
// Verify the received AT certificate
log(match(v_etsi_ts_102941_data.content, mw_authorizationResponse(mw_innerAtResponse_ok(substr(v_request_hash, 0, 16), mw_etsiTs103097Certificate(-, mw_toBeSignedCertificate_at, -))))); // TODO In TITAN, this is the only way to get the unmatching in log
if (match(v_etsi_ts_102941_data.content, mw_authorizationResponse(mw_innerAtResponse_ok(substr(v_request_hash, 0, 16), mw_etsiTs103097Certificate(-, mw_toBeSignedCertificate_at, -)))) == true) {
var InnerAtResponse v_inner_at_response := v_etsi_ts_102941_data.content.authorizationResponse;
var AtData v_at_data;
log("f_trigger_enrolment_request_await_response: p_inner_at_response= ", v_inner_at_response);
// Send the new certificate for storing
v_at_data.private_key := v_private_key_at;
v_at_data.aes_sym_key := v_aes_sym_key;
v_at_data.certificate := v_inner_at_response.certificate;
log("f_trigger_enrolment_request_await_response: send v_at_data=", v_at_data);
resultPort.send(v_at_data);
// TODO Provide the new certificate to the Test System
// TODO Start CAM emission
log("f_trigger_authorization_request_await_response: Cannot verify AT certificate signature ***");
log("*** " & testcasename() & ": INCONC: Expected message not received ***");
}
} // End of 'alt' statement
log("<<< f_trigger_authorization_request_await_response");
} // End of module ItsRSUsSimulator_Functions