Newer
Older
* @version $URL$
* $Id$
* @desc Testcases file for Security Protocol
* @copyright ETSI Copyright Notification
* No part may be reproduced except as authorized by written permission.
* The copyright and the foregoing restriction extend to reproduction in all media.
* All rights reserved.
// Libcommon
import from LibCommon_Time all;
import from LibCommon_VerdictControl all;
import from LibCommon_Sync all;
import from LibCommon_BasicTypesAndValues all;
// LibIts
import from DENM_PDU_Descriptions language "ASN.1:1997" all;
import from IEEE1609dot2BaseTypes language "ASN.1:1997" all;
import from IEEE1609dot2 language "ASN.1:1997" all;
import from EtsiTs103097Module language "ASN.1:1997" all;
// LibItsCommon
import from LibItsCommon_Functions all;
import from LibItsCommon_ASN1_NamedNumbers all;
// LibItsGeoNetworking
import from LibItsGeoNetworking_TestSystem all;
import from LibItsGeoNetworking_Functions all;
import from LibItsGeoNetworking_Templates all;
import from LibItsGeoNetworking_TypesAndValues all;
import from LibItsGeoNetworking_Pics all;
// LibItsCam
import from LibItsCam_Templates all;
import from LibItsCam_Functions all;
import from LibItsCam_Templates all;
import from LibItsCam_Functions all;
import from LibItsCam_TestSystem all;
// LibItsDenm
import from LibItsDenm_Templates all;
import from LibItsDenm_TestSystem all;
// LibItsSecurity
import from LibItsSecurity_TypesAndValues all;
import from LibItsSecurity_Templates all;
import from LibItsSecurity_Functions all;
import from LibItsSecurity_Pixits all;
import from LibItsSecurity_Pics all;
// AtsSecurity
import from ItsSecurity_TestSystem all;
import from ItsSecurity_Functions all;
import from ItsSecurity_Templates all;
import from ItsSecurity_Pics all;
/**
* @desc Sending behaviour test cases
* @see ETSI TS 103 096-2 V1.2.2 (2016-01) Clause 5.2 Sending behaviour
*/
group sendingBehavior {
/**
* @desc Check that ITS-S sends a Ieee1609Dot2Data containing protocol version set to 2
* <pre>
* Pics Selection: PICS_GN_SECURITY
* Config Id: CF01
* Initial conditions:
* with {
* the IUT being in the 'authorized' state
* }
* Expected behaviour:
* ensure that {
* when {
* the IUT is requested to send a Ieee1609Dot2Data
* containing protocol_version
* indicating value '2'
* }
* }
* @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_MSG_01_01_BV
* @reference ETSI TS 103 097 [1], clause 5.1
*/
testcase TC_SEC_ITSS_SND_MSG_01_01_BV() runs on ItsGeoNetworking system ItsSecSystem {
// Local variables
var LongPosVector v_longPosVectorIut;
// Test control
if (not(PICS_GN_SECURITY) or not(PICS_ITS_AID_OTHER_PROFILE)) {
log("*** " & testcasename() & ":ERROR: 'PICS_GN_SECURITY and PICS_ITS_AID_OTHER_PROFILE' required for executing the TC ***");
stop;
}
// Test component configuration
f_cf01Up();
v_longPosVectorIut := f_getPosition(c_compIut);
// Test adapter configuration
// Preamble
f_prNeighbour();
f_acTriggerEvent(m_startPassBeaconing(m_beaconHeader(v_longPosVectorIut).beaconHeader)); // Authorize the TA to forward the received beacons
f_selfOrClientSyncAndVerdictPreamble(c_prDone, e_success);
// Test Body
tc_ac.start;
alt {
[] geoNetworkingPort.receive(mw_geoNwInd(mw_geoNwSecPdu(mw_ieee1609Dot2Data_dummy))) {
tc_ac.stop;
log("*** " & testcasename() & ": PASS: Security protocol version set to 2 ***");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_success);
}
[] tc_ac.timeout {
log("*** " & testcasename() & ": INCONC: Expected message not received ***");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_timeout);
}
} // End of 'alt' statement
// Postamble
f_acTriggerEvent(m_stopPassBeaconing);
f_poNeighbour();
f_cf01Down();
} // End of testcase TC_SEC_ITSS_SND_MSG_01_01_BV
/**
* @desc Check that when IUT sends the message signed with the digest, then this digest points to the AT certificate
* <pre>
* Pics Selection: PICS_GN_SECURITY
* Config Id: CF01
* Initial conditions:
* with {
* the IUT being in the 'authorized' state
* and the IUT is configured to send more than one CAM per second
* and the IUT having sent last CAM
* containing header_fields['signer_info'].signer.type
* indicating 'certificate'
* }
* Expected behaviour:
* ensure that {
* when {
* the IUT is requested to send next CAM
* } then {
* containing header_fields ['signer_info']
* containing signer
* containing type
* indicating 'certificate_digest_with_sha256'
* and containing digest
* referencing the certificate
* containing subject_info.subject_type
* indicating 'authorization_ticket'
* }
* }
* @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_MSG_04_01_BV
* @reference ETSI TS 103 097 [1], clause 6.3
*/
testcase TC_SEC_ITSS_SND_MSG_04_01_BV() runs on ItsGeoNetworking system ItsSecSystem {
// Local variables
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
var Certificate v_cert;
var LongPosVector v_longPosVectorIut;
var ItsCam v_component;
// Test control
if (not(PICS_GN_SECURITY)) {
log("*** " & testcasename() & ":ERROR: 'PICS_GN_SECURITY' required for executing the TC ***");
stop;
}
// Test component configuration
f_cf01Up();
v_longPosVectorIut := f_getPosition(c_compIut);
// Test adapter configuration
// Preamble
f_prNeighbour();
v_component := f_setCamFrequencyGreatherThan1Hz();
// execution will be stopped if cert is not received during tc_ac
log("*** " & testcasename() & ": INFO: Waiting for the message containing certificate ***");
tc_ac.start;
if (not f_waitForCertificate(v_cert)) {
log("*** " & testcasename() & ": INCONC: Expected message not received ***");
f_selfOrClientSyncAndVerdictPreamble(c_tbDone, e_timeout);
}
tc_ac.stop;
if (v_cert.subject_info.subject_type != e_authorization_ticket) {
log("*** " & testcasename() & ": FAIL: received certificate is not an AT certificate ***");
f_selfOrClientSyncAndVerdictTestBody(c_prDone, e_error);
}
f_selfOrClientSyncAndVerdictPreamble(c_prDone, e_success);
// Test Body
tc_ac.start;
alt {
[] a_securedMessageWithDigest (v_recv) {
var SignerInfo v_si;
tc_ac.stop;
if (f_getMsgSignerInfo(v_recv, v_si) == true) {
if (v_si.signerInfo.digest == f_calculateDigestFromCertificate(v_cert)) {
log("*** " & testcasename() & ": PASS: Digest corresponds to the AT certificate ***");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_success);
} else {
log("*** " & testcasename() & ": FAIL: Digest corresponds to unknown certificate ***");
log("f_calculateDigestFromCertificate(v_cert)=", f_calculateDigestFromCertificate(v_cert));
log("v_si.signerInfo.digest=", v_si.signerInfo.digest);
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_error);
}
} else {
log("*** " & testcasename() & ": FAIL: Received message is not signed well ***");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_error);
}
}
[] tc_ac.timeout {
log("*** " & testcasename() & ": INCONC: Expected CAM not received ***");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_timeout);
}
} // End of 'alt' statement
// Postamble
f_terminateCam(v_component);
f_poNeighbour();
f_cf01Down();
} // End of testcase TC_SEC_ITSS_SND_MSG_04_01_BV
/**
* @desc Check that IUT uses the AT certificate to sign messages
* <pre>
* Pics Selection: PICS_GN_SECURITY
* Config Id: CF01
* Initial conditions:
* with {
* the IUT being in the 'authorized' state
* the IUT being requested to include certificate in the next CAM
* }
* ensure that {
* when {
* the IUT is requested to send a next CAM
* } then {
* containing header_fields ['signer_info']
* containing signer
* containing type
* indicating 'certificate'
* containing certificate
* containing subject_info.subject_type
* indicating 'authorization_ticket'
* }
* }
* @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_MSG_04_02_BV
* @reference ETSI TS 103 097 [1], clause 6.3
*/
testcase TC_SEC_ITSS_SND_MSG_04_02_BV() runs on ItsGeoNetworking system ItsSecSystem {
// Local variables
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
var Certificate v_cert;
var LongPosVector v_longPosVectorIut;
// Test control
if (not(PICS_GN_SECURITY)) {
log("*** " & testcasename() & ":ERROR: 'PICS_GN_SECURITY' required for executing the TC ***");
stop;
}
// Test component configuration
f_cf01Up();
v_longPosVectorIut := f_getPosition(c_compIut);
// Test adapter configuration
// Preamble
f_prNeighbour();
f_selfOrClientSyncAndVerdictPreamble(c_prDone, e_success);
// Test Body
tc_ac.start;
alt {
[] a_securedMessageWithCertificate(v_recv) {
var SignerInfo v_si;
if (f_getMsgSignerInfo(v_recv, v_si)) {
v_cert := v_si.signerInfo.certificate;
if (v_cert.subject_info.subject_type != e_authorization_ticket ) {
log("*** " & testcasename() & ": FAIL: received certificate is not an AT certificate ***");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_error);
}
log("*** " & testcasename() & ": PASS: message signed with AT certificate");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_success);
} else {
log("*** " & testcasename() & ": FAIL: received message is not signed well ***");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_error);
}
}
[] tc_ac.timeout {
log("*** " & testcasename() & ": INCONC: Expected CAM not received ***");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_timeout);
}
} // End of 'alt' statement
// Postamble
f_poNeighbour();
f_cf01Down();
} // End of testcase TC_SEC_ITSS_SND_MSG_04_02_BV
/**
* @desc Check that the Ieee1609Dot2Data signature containes the ECC point of type set to either compressed_lsb_y_0, compressed_lsb_y_1 or x_coordinate_only
* <pre>
* Pics Selection: PICS_GN_SECURITY
* Config Id: CF01
* Initial conditions:
* with {
* the IUT being in the 'authorized' state
* }
* ensure that {
* when {
* the IUT is requested to send a next CAM
* } then {
* containing header_fields ['its_aid']
* containing its_aid
* indicating 'AID_CAM'
* and containing trailer_fields['signature']
* containing signature.ecdsa_signature
* containing R.type
* indicating compressed_lsb_y_0
* or indicating compressed_lsb_y_1
* or indicating x_coordinate_only
* }
* }
* @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_MSG_05_01_BV
* @reference ETSI TS 103 097 [1], clause 4.2.9
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
*/
testcase TC_SEC_ITSS_SND_MSG_05_01_BV() runs on ItsGeoNetworking system ItsSecSystem {
// Local variables
var LongPosVector v_longPosVectorIut;
// Test control
if (not(PICS_GN_SECURITY)) {
log("*** " & testcasename() & ":ERROR: 'PICS_GN_SECURITY' required for executing the TC ***");
stop;
}
// Test component configuration
f_cf01Up();
v_longPosVectorIut := f_getPosition(c_compIut);
// Test adapter configuration
// Preamble
f_prNeighbour();
f_selfOrClientSyncAndVerdictPreamble(c_prDone, e_success);
// Test Body
tc_ac.start;
alt {
[] geoNetworkingPort.receive(
mw_geoNwInd(
mw_geoNwSecPdu(
?,
?,
{
mw_trailer_field_signature(
mw_signature(
mw_ecdsaSignature(
mw_eccPointecdsa_nistp256_with_sha256_y0_coordinate_only,
?
)
)
)
}
),
?
))) {
tc_ac.stop;
log("*** " & testcasename() & ": PASS: Expected CAM message containing signature with the ECC point of type set to compressed_lsb_y_0 received ***");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_success);
}
[] geoNetworkingPort.receive(
mw_geoNwInd(
mw_geoNwSecPdu(
?,
?,
{
mw_trailer_field_signature(
mw_signature(
mw_ecdsaSignature(
mw_eccPointecdsa_nistp256_with_sha256_y1_coordinate_only,
?
)
)
)
}
),
?
))) {
tc_ac.stop;
log("*** " & testcasename() & ": PASS: Expected CAM message containing signature with the ECC point of type set to compressed_lsb_y_1 received ***");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_success);
}
[] geoNetworkingPort.receive(
mw_geoNwInd(
mw_geoNwSecPdu(
?,
?,
{
mw_trailer_field_signature(
mw_signature(
mw_ecdsaSignature(
mw_eccPointecdsa_nistp256_with_sha256_x_coordinate_only
)
)
)
}
),
?
))) {
tc_ac.stop;
log("*** " & testcasename() & ": PASS: Expected CAM message containing signature with the ECC point of type set to x_coordinate_only received ***");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_success);
}
[] geoNetworkingPort.receive(
mw_geoNwInd(
mw_geoNwSecPdu(
))) {
tc_ac.stop;
log("*** " & testcasename() & ": Failed: Expected CAM message received ***");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_success);
}
[] tc_ac.timeout {
log("*** " & testcasename() & ": INCONC: Expected CAM not received ***");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_timeout);
}
} // End of 'alt' statement
// Postamble
f_poNeighbour();
f_cf01Down();
} // End of testcase TC_SEC_ITSS_SND_MSG_05_01_BV
/**
* @desc Sending behaviour test cases for CAM profile
* @see ETSI TS 103 096-2 V1.2.2 (2016-01) Clause 5.2.4 CAM profile
*/
group sendCAMProfile {
/**
* @desc Check that the sent Secured CAM contains a HeaderInfo its_aid that is set to 'AID_CAM'
* <pre>
* Pics Selection: PICS_GN_SECURITY
* Config Id: CF01
* Initial conditions:
* the IUT being in the 'authorized' state
* }
* ensure that {
* when {
* the IUT is requested to send a CAM
* } then {
* and containing header_fields['its_aid']
* indicating 'AID_CAM'
* }
* }
*
* @see ETSI TS 103 096-2 v1.3.1 TC_SEC_ITSS_SND_CAM_01_01_BV
* @reference ETSI TS 103 097 [1], clause 5.4 and 7.1
*/
testcase TC_SEC_ITSS_SND_CAM_01_01_BV() runs on ItsGeoNetworking system ItsSecSystem {
// Local variables
var GeoNetworkingInd v_geoNwInd;
var integer v_previousHeaderType;
// Test control
if (not(PICS_GN_SECURITY)) {
log("*** " & testcasename() & ":ERROR: 'PICS_GN_SECURITY' required for executing the TC ***");
stop;
}
// Test component configuration
f_cf01Up();
// Test adapter configuration
// Preamble
f_prNeighbour();
f_selfOrClientSyncAndVerdictPreamble(c_prDone, e_success);
// Test Body
tc_ac.start;
alt {
[] geoNetworkingPort.receive(
mw_geoNwInd(
mw_geoNwSecPdu(
)
),
?
))) -> value v_geoNwInd {
tc_ac.stop;
log("*** " & testcasename() & ": PASS: 'its_aid' is set to 'AID_CAM'");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_success);
}
[] tc_ac.timeout {
log("*** " & testcasename() & ": INCONC: Expected CAM not received ***");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_timeout);
}
} // End of 'alt' statement
// Postamble
f_poNeighbour();
f_cf01Down();
} // End of testcase TC_SEC_ITSS_SND_CAM_01_01_BV
/**
* @desc Check that the secured CAM contains exactly one element of these header fields: signer_info, generation_time, its_aid.
Check that the header fields are in the ascending order according to the numbering of the enumeration except of the signer_info, which is encoded first.
Check that generation_time_standard_deviation, expiration, encryption_parameters, recipient_info are not used
* <pre>
* Pics Selection: PICS_GN_SECURITY
* Config Id: CF01
* Initial conditions:
* with {
* the IUT being in the 'authorized' state
* }
* ensure that {
* when {
* the IUT is requested to send a CAM
* } then {
* containing header_fields[0]
* containing type
* indicating 'signer_info'
* and containing header_fields [n].type
* indicating value < header_fields [n+1].type
* and containing header_fields ['generation_time']
* and containing header_fields['its_aid']
* indicating 'AID_CAM'
* and not containing header_fields['generation_time_standard_deviation']
* and not containing header_fields['expiration']
* and not containing header_fields['encryption_parameters']
* and not containing header_fields['recipient_info']
* }
* }
* }
* </pre>
*
* @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CAM_02_01_BV
* @reference ETSI TS 103 097 [1], clause 7.1
*/
testcase TC_SEC_ITSS_SND_CAM_02_01_BV() runs on ItsGeoNetworking system ItsSecSystem {
// Local variables
var GeoNetworkingInd v_geoNwInd;
var integer v_previousHeaderType;
// Test control
if (not(PICS_GN_SECURITY)) {
log("*** " & testcasename() & ":ERROR: 'PICS_GN_SECURITY' required for executing the TC ***");
stop;
}
// Test component configuration
f_cf01Up();
// Test adapter configuration
// Preamble
f_prNeighbour();
f_selfOrClientSyncAndVerdictPreamble(c_prDone, e_success);
// Test Body
tc_ac.start;
alt {
[] geoNetworkingPort.receive(
mw_geoNwInd(
mw_geoNwSecPdu(
superset(
mw_header_field(
e_signer_info
),
mw_header_field(e_generation_time),
)
),
mw_geoNwPduWithPayload(
?,
?,
?/*TODO mw_secCamPayload Check in the TC itself if it is a CAM payload*/).packet
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
))) -> value v_geoNwInd {
tc_ac.stop;
// Process header fields manually
v_headersFields := valueof(v_geoNwInd.msgIn.gnPacket.securedMsg.header_fields);
// Check that signerInfo is first header
if ((lengthof(v_headersFields) < 1) or v_headersFields[0].type_ != e_signer_info) {
log("*** " & testcasename() & ": FAIL: SignerInfo is not first header");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_error);
}
for (var integer v_counter := 1; v_counter < lengthof(v_headersFields); v_counter := v_counter + 1) {
// Check forbidden header
// FIXME: 'generation_time_with_confidence' does not exist. is it e_generation_time_standard_deviation ?
if (v_headersFields[v_counter].type_ == e_generation_time_standard_deviation) {
log("*** " & testcasename() & ": FAIL: Forbidden header present");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_error);
}
if (v_headersFields[v_counter].type_ == e_signer_info) {
log("*** " & testcasename() & ": FAIL: multiple instances of signer_info header");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_error);
}
if (v_counter > 1 ) {
// Check that headers are ordered
//FIXME v_previousHeaderType is not initialized before use, it will cause dynamic test case error (DTE)
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
if (enum2int(v_headersFields[v_counter].type_) <= v_previousHeaderType) {
// Check that header is duplicated
if (enum2int(v_headersFields[v_counter].type_) == v_previousHeaderType) {
log("*** " & testcasename() & ": FAIL: multiple instances of same header");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_error);
}else{
log("*** " & testcasename() & ": FAIL: headers not in correct order");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_error);
}
}
}
v_previousHeaderType := enum2int(v_headersFields[v_counter].type_);
} // End of 'for' statement
log("*** " & testcasename() & ": PASS: correct secured packet received");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_success);
}
[] tc_ac.timeout {
log("*** " & testcasename() & ": INCONC: Expected CAM not received ***");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_timeout);
}
} // End of 'alt' statement
// Postamble
f_poNeighbour();
f_cf01Down();
} // End of testcase TC_SEC_ITSS_SND_CAM_02_01_BV
/**
* @desc Check that the secured CAM contains the signer_info field of certificate when over the time of one
* second no other Ieee1609Dot2Data contained a signer_info of type certificate.
* <pre>
* Pics Selection: PICS_GN_SECURITY
* Config Id: CF01
* Initial conditions:
* the IUT being in the 'authorized' state
* and the IUT is configured to send more then one CAM per second
* containing header_fields['signer_info'].signer.type
* indicating 'certificate'
* contains header_fields['generation_time']
* indicating TIME_LAST
* }
* ensure that {
* when {
* the IUT is sending CAM
* containing header_fields['signer_info']
* containing signer
* containing type
* indicating 'certificate'
* } then {
* this message
* contains header_fields['generation_time']
* indicating TIME (TIME >= TIME_LAST + 1sec)
* }
* }
* </pre>
*
* @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CAM_05_01_BV
* @reference ETSI TS 103 097 [1], clause 7.1
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
*/
testcase TC_SEC_ITSS_SND_CAM_05_01_BV() runs on ItsGeoNetworking system ItsSecSystem {
// Local variables
const integer c_cntTimeLimit := 10;
const float c_certificateGenerationTime := 1.0;
timer t_minTransInterval := c_certificateGenerationTime * 0.8;
var integer v_cntTime := 0;
var GeoNetworkingInd v_geoNwInd;
var ItsCam v_component;
// Test control
if (not(PICS_GN_SECURITY)) {
log("*** " & testcasename() & ":ERROR: 'PICS_GN_SECURITY' required for executing the TC ***");
stop;
}
// Test component configuration
f_cf01Up();
// Test adapter configuration
// Preamble
f_prNeighbour();
geoNetworkingPort.clear;
v_component := f_setCamFrequencyGreatherThan1Hz();
tc_ac.start;
alt {
[] geoNetworkingPort.receive(
mw_geoNwInd(
mw_geoNwSecPdu(
mw_ieee1609Dot2Data_CAMs(
mw_header_info_signer_info_certificate
)))) {
tc_ac.stop;
// Removed in C2C t_minTransInterval.start;
log("*** " & testcasename() & ": INFO: Initial conditions: First CAM message with certificate received ***");
f_selfOrClientSyncAndVerdictPreamble(c_prDone, e_success);
}
[] tc_ac.timeout {
log("*** " & testcasename() & ": INCONC: Initial conditions: CAM message with certificate not received ***");
f_selfOrClientSyncAndVerdictPreamble("error", e_timeout);
}
} // End of 'alt' statement
// Test Body
tc_ac.start;
alt {
[] geoNetworkingPort.receive(
mw_geoNwInd(
mw_geoNwSecPdu(
mw_ieee1609Dot2Data_CAMs(
mw_header_info_signer_info_certificate
)))) {
if(t_minTransInterval.running){
t_minTransInterval.stop;
log("*** " & testcasename() & ": FAIL: CAM with certificate has been received inside 1 sec after previous one ***");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_error);
}
v_cntTime := v_cntTime + 1;
if (v_cntTime == c_cntTimeLimit) { // Exit message loop
log("*** " & testcasename() & ": PASS: Generation of CAM messages including certificate was successful ***");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_success);
// end of alt
}
else {
log("*** " & testcasename() & ": INFO: CAM retransmission with certificate ***");
t_minTransInterval.start;
repeat;
}
}
[] geoNetworkingPort.receive(
mw_geoNwInd(
mw_geoNwSecPdu(
mw_ieee1609Dot2Data_CAMs(
mw_header_info_signer_info_digest
)))) {
log("*** " & testcasename() & ": INFO: CAM retransmission with digest ***");
repeat;
}
[] geoNetworkingPort.receive(
mw_geoNwInd(
mw_geoNwSecPdu(
))) {
log("*** " & testcasename() & ": FAIL: Neither Certificate not Digest in received CAM ***");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_error);
}
[] t_minTransInterval.timeout {
log("*** " & testcasename() & ": INFO: One of next CAMS must have a certificate ***");
repeat;
}
[] tc_ac.timeout {
log("*** " & testcasename() & ": INCONC: Expected CAM not received ***");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_timeout);
}
} // End of 'alt' statement
// Postamble
f_terminateCam(v_component);
f_poNeighbour();
f_cf01Down();
} // End of testcase TC_SEC_ITSS_SND_CAM_05_01_BV
/**
* @desc Check that the secured CAM contains the signer_info field of certificate when the timeout of 1 second
* has been expired after the previous CAM containing the certificate.
* <pre>
* Pics Selection: PICS_GN_SECURITY
* Config Id: CF01
* Initial conditions:
* with {
* the IUT being in the 'authorized' state
* and the IUT is configured to send more than one CAM per second
* and the IUT having sent a CAM
* containing header_fields['signer_info'].signer.type
* indicating 'certificate'
* at TIME_LAST
* }
* ensure that {
* when {
* the IUT is sending a CAM
* containing header_fields['generation_time']
* indicating TIME >= TIME_LAST + 1sec
* } then {
* this message is
* containing header_fields ['signer_info']
* containing signer
* containing type
* indicating 'certificate'
* }
* }
* </pre>
*
* @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CAM_05_02_BV
* @reference ETSI TS 103 097 [1], clause 4.2.9
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
*/
testcase TC_SEC_ITSS_SND_CAM_05_02_BV() runs on ItsGeoNetworking system ItsSecSystem {
// Local variables
const integer c_cntTimeLimit := 10;
const float c_certificateGenerationTime := 1.0;
timer t_maxTransInterval := c_certificateGenerationTime * 1.15;
var integer v_cntTime := 0;
var GeoNetworkingInd v_geoNwInd;
var ItsCam v_component;
// Test control
if (not(PICS_GN_SECURITY)) {
log("*** " & testcasename() & ":ERROR: 'PICS_GN_SECURITY' required for executing the TC ***");
stop;
}
// Test component configuration
f_cf01Up();
// Test adapter configuration
// Preamble
f_prNeighbour();
geoNetworkingPort.clear;
v_component := f_setCamFrequencyGreatherThan1Hz();
tc_ac.start;
alt {
[] geoNetworkingPort.receive(
mw_geoNwInd(
mw_geoNwSecPdu(
mw_ieee1609Dot2Data_CAMs(
mw_header_info_signer_info_certificate
)))) {
t_maxTransInterval.start;
tc_ac.stop;
log("*** " & testcasename() & ": INFO: Initial conditions: First CAM message with certificate received ***");
f_selfOrClientSyncAndVerdictPreamble(c_prDone, e_success);
}
[] tc_ac.timeout {
log("*** " & testcasename() & ": INCONC: Initial conditions: CAM message with certificate not received ***");
f_selfOrClientSyncAndVerdictPreamble("error", e_timeout);
}
} // End of 'alt' statement
// Test Body
tc_ac.start;
alt {
[] geoNetworkingPort.receive(
mw_geoNwInd(
mw_geoNwSecPdu(
mw_ieee1609Dot2Data_CAMs(
mw_header_info_signer_info_certificate
)))) {
t_maxTransInterval.stop;
v_cntTime := v_cntTime + 1;
if (v_cntTime == c_cntTimeLimit) { // Exit message loop
log("*** " & testcasename() & ": PASS: Generation of CAM messages including certificate was successful ***");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_success);
// end of alt
}
else {
t_maxTransInterval.start;
log("*** " & testcasename() & ": INFO: CAM retransmission with certificate ***");
repeat;
}
}
[] geoNetworkingPort.receive(
mw_geoNwInd(
mw_geoNwSecPdu(
mw_ieee1609Dot2Data_CAMs(
mw_header_info_signer_info_digest
)))) {
log("*** " & testcasename() & ": INFO: CAM retransmission with digest ***");
repeat;
}
[] t_maxTransInterval.timeout {
log("*** " & testcasename() & ": FAIL: CAM with certificate was not received in 1 sec after previous one ***");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_error);
}
[] tc_ac.timeout {
log("*** " & testcasename() & ": INCONC: Expected CAM not received ***");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_timeout);
}
} // End of 'alt' statement
// Postamble
f_terminateCam(v_component);
f_poNeighbour();
f_cf01Down();
} // End of testcase TC_SEC_ITSS_SND_CAM_05_02_BV
/**
* @desc Check that ITS-S sends a Secured CAM containing the signer_info of type certificate
* when the ITS-S received a CAM from an unknown ITS-S
* <pre>
* Pics Selection: PICS_GN_SECURITY
* Config Id: CF01
* Initial conditions:
* with {
* the IUT being in the 'authorized' state
* and the IUT is configured to send more than one CAM per second
* and the IUT having already sent CAM at TIME_1
* containing header_fields['signer_info'].signer.type
* indicating 'certificate'
* and the IUT having received a Ieee1609Dot2Data at TIME_2 (TIME_1 < TIME_2 < TIME_1+ 1sec)
* containing header_fields['signer_info']
* containing signer
* containing type
* indicating 'certificate_digest_with_sha256'
* containing digest
* indicating HashedId3 value
* referenced to unknown certificate
* }
* ensure that {
* when {
* the IUT is requested to send CAM at TIME_3 (TIME_1 < TIME_2 < TIME_3 < TIME_1 + 1sec)
* } then {
* containing header_fields[0]
* containing type
* indicating 'signer_info'
* and containing signer
* containing type
* indicating 'certificate'
* and containing certificate
* }
* }
* </pre>
*
* @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CAM_06_01_BV
* @reference ETSI TS 103 097 [1], clauses 5.4 and 7.1
*/
testcase TC_SEC_ITSS_SND_CAM_06_01_BV() runs on ItsGeoNetworking system ItsSecSystem {
// Local variables
var GeoNetworkingInd v_geoNwInd;
var ItsCam v_component;
// Test control
if (not(PICS_GN_SECURITY)) {
log("*** " & testcasename() & ":ERROR: 'PICS_GN_SECURITY' required for executing the TC ***");
stop;
}
// Test component configuration
f_cf01Up();
// Test adapter configuration
// Preamble
f_prNeighbour();
v_component := f_setCamFrequencyGreatherThan1Hz();