Newer
Older
var integer v_result;
// Extract CAM message
var octetstring v_payload := p_geoNetworkingPdu.gnPacket.packet.payload;
// Remove BTP layer
v_payload := substr(v_payload, 4, lengthof(v_payload) - 4);
// Send UtCamEventInd
log("f_processCam: v_payload=", v_payload);
v_enc_msg := oct2bit(v_payload);
if (decvalue(v_enc_msg, v_utCamEventInd.camMsg) == 0) {
cfPort.send(v_utCamEventInd);
}
}
}
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
function f_processDenm(
in GeoNetworkingPdu p_geoNetworkingPdu
) runs on ItsRSUsSimulator {
var bitstring v_enc_msg;
log("f_processDenm: DENM=", p_geoNetworkingPdu.gnPacket.packet.payload);
if (PICS_SEND_DENM_INDICATION) {
var UtDenmEventInd v_utDenmEventInd;
var integer v_result;
// Extract DENM message
var octetstring v_payload := p_geoNetworkingPdu.gnPacket.packet.payload;
// Remove BTP layer
v_payload := substr(v_payload, 4, lengthof(v_payload) - 4);
// Send UtDenmEventInd
log("f_processDenm: v_payload=", v_payload);
v_enc_msg := oct2bit(v_payload);
if (decvalue(v_enc_msg, v_utDenmEventInd.denMsg) == 0) {
cfPort.send(v_utDenmEventInd);
}
}
}
function f_processSrem(
in GeoNetworkingPdu p_geoNetworkingPdu
) runs on ItsRSUsSimulator {
if (ispresent(p_geoNetworkingPdu.gnPacket.packet.payload)) {
/* TODO Decode and process GnPayload or use different ports
if (ispresent(p_geoNetworkingPdu.gnPacket.packet.payload.decodedPayload.btpPacket.payload.decodedPayload)) {
if (ischosen(p_geoNetworkingPdu.gnPacket.packet.payload.decodedPayload.btpPacket.payload.decodedPayload.sremPacket)) {
var SignalRequestMessage v_signalRequestMessage := p_geoNetworkingPdu.gnPacket.packet.payload.decodedPayload.btpPacket.payload.decodedPayload.sremPacket.srm;
var template (value) GnRawPayload v_payload;
log(v_signalRequestMessage);
// Build response
// TODO v_ssem.ssm.status
v_payload := valueof(
f_adaptPayload(
bit2oct(
encvalue(
valueof(
m_ssem(
v_signalRequestMessage
)))),
PICS_SSEM_BTP_DESTINATION_PORT,
PICS_SSEM_BTP_SOURCE_PORT
)
);
// Send SSEM
f_send(v_payload, PICS_SSEM_ITS_AID);
} // else, ignore message
} // else, ignore message
if (PICS_SEND_SREM_INDICATION) {
var UtSremEventInd v_utSremEventInd;
var integer v_result;
// Extract SREM message
var octetstring v_payload := p_geoNetworkingPdu.gnPacket.packet.payload;
// Remove BTP layer
v_payload := substr(v_payload, 4, lengthof(v_payload) - 4);
// Send UtSremEventInd
log("f_processSrem: v_payload=", v_payload);
v_enc_msg := oct2bit(v_payload);
if (decvalue(v_enc_msg, v_utSremEventInd.sreMsg) == 0) {
cfPort.send(v_utSremEventInd);
}
} // else, ignore message
} // End of function f_processSrem
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
function f_processSsem(
in GeoNetworkingPdu p_geoNetworkingPdu
) runs on ItsRSUsSimulator {
var bitstring v_enc_msg;
log("f_processSsem: SSEM=", p_geoNetworkingPdu.gnPacket.packet.payload);
if (PICS_SEND_SSEM_INDICATION) {
var UtSsemEventInd v_utSsemEventInd;
var integer v_result;
// Extract SSEM message
var octetstring v_payload := p_geoNetworkingPdu.gnPacket.packet.payload;
// Remove BTP layer
v_payload := substr(v_payload, 4, lengthof(v_payload) - 4);
// Send UtSsemEventInd
log("f_processSsem: v_payload=", v_payload);
v_enc_msg := oct2bit(v_payload);
if (decvalue(v_enc_msg, v_utSsemEventInd.sseMsg) == 0) {
cfPort.send(v_utSsemEventInd);
}
} // else, ignore message
} // End of function f_processSsem
function f_incLocalSeqNumber() runs on ItsRSUsSimulator return UInt16 {
vc_localSeqNumber := (vc_localSeqNumber + 1) mod 65536;
return vc_localSeqNumber;
}
function f_incMsgIssueRevision() runs on ItsRSUsSimulator return MsgCount {
vc_msgIssueRevision := (vc_msgIssueRevision + 1) mod 128; // See MsgCount declaration
return vc_msgIssueRevision;
}
function f_getMsgIssueRevision() runs on ItsRSUsSimulator return MsgCount {
return vc_msgIssueRevision;
}
function f_incDenmSequenceNumber() runs on ItsRSUsSimulator return SequenceNumber {
vc_sequenceNumber := (vc_sequenceNumber + 1) mod 65536; // See SequenceNumber declaration
return vc_sequenceNumber;
}
function f_getDenmSequenceNumber() runs on ItsRSUsSimulator return SequenceNumber {
in integer p_src_port
) return template (present) octetstring {
//log(">>> f_payload_template: ", p_dest_port, " - ", p_src_port);
var template (value) Oct2 v_t1 := int2oct(p_dest_port, 2);
var template (value) Oct2 v_t2 := int2oct(p_src_port, 2);
var template (present) octetstring v_t3 := ? /*? length (5 .. 65535)*/;
var template (present) octetstring v_out := valueof(v_t1) & valueof(v_t2) & v_t3;
//log("<<< f_payload_template: v_out=", v_out);
return v_out
altstep a_process_cf_ut_command() runs on ItsRSUsSimulator {
var UtCamInitialize v_utCamInitialize;
var UtDenmInitialize v_utDenmInitialize;
var UtIvimInitialize v_utIvimInitialize;
var UtMapemSpatemInitialize v_utMapemSpatemInitialize;
var UtSremInitialize v_utSremInitialize;
var UtRtcmemInitialize v_utRtcmemInitialize;
var UtPkiInitialize v_utPkiInitialize;
var UtSremTrigger v_utSremTrigger;
var UtDenmUpdate v_utDenmUpdate;
var UtSremUpdate v_utSremUpdate;
var UtDenmTermination v_utDenmTermination;
var UtSremCancelation v_utSremCancelation;
var UtPkiTrigger v_utPkiTrigger;
[] cfPort.receive(UtGnInitialize:?) -> value v_utGnInitialize {
log("a_process_cf_ut_command: v_utGnInitialize = ", v_utGnInitialize);
v_geoNwPdu :=valueof(
m_geoNwPdu(
m_geoNwBeaconPacket(
vc_longPosVectorRsu
),
m_defaultLifetime,
1
)
);
v_geoNwPdu.gnPacket.packet.commonHeader.flags := f_isMobile();
vc_rsuMessagesValueList[vc_rsu_id].beacon := v_geoNwPdu;
cfPort.send(UtGnResults: { utGnInitializeResult := true } );
repeat;
}
log("a_process_cf_ut_command: v_utGnTrigger = ", v_utGnTrigger);
if (ischosen(v_utGnTrigger.geoUnicast)) {
var GnNonSecuredPacket v_geoNwUnicastPacket := valueof(
m_geoNwUnicastPacket_with_payload(
vc_longPosVectorRsu,
f_getIutShortPosVector(),
f_incLocalSeqNumber(),
c_defaultHopLimit,
v_utGnTrigger.geoUnicast.trafficClass,
v_utGnTrigger.geoUnicast.payload
var GeoNetworkingPdu v_geoNwPdu := valueof(
m_geoNwPdu(
v_geoNwUnicastPacket,
m_lifetimeBase1s(v_utGnTrigger.geoUnicast.lifetime / 1000),
v_geoNwPdu.gnPacket.packet.commonHeader.nextHeader := e_any;
v_geoNwPdu.gnPacket.packet.commonHeader.flags := f_isMobile();
v_geoNwPdu.gnPacket.packet.extendedHeader.geoUnicastHeader.dstPosVector.gnAddr := v_utGnTrigger.geoUnicast.gnAddress;
vc_rsuMessagesValueList[vc_rsu_id].beacon := v_geoNwPdu;
cfPort.send(UtGnResults: { utGnTriggerResult := true } );
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
} else if (ischosen(v_utGnTrigger.geoBroadcast)) {
var GeoBroadcastArea v_broadcastArea;
var GnNonSecuredPacket v_geoNwBroadcastPacket;
var GeoNetworkingPdu v_geoNwPdu;
if (v_utGnTrigger.geoBroadcast.shape == e_geoCircle) {
v_broadcastArea.geoBroadcastSubType := e_geoBroadcastCircle;
} else if (v_utGnTrigger.geoBroadcast.shape == e_geoRect) {
v_broadcastArea.geoBroadcastSubType := e_geoBroadcastRect;
} else if (v_utGnTrigger.geoBroadcast.shape == e_geoElip) {
v_broadcastArea.geoBroadcastSubType := e_geoBroadcastElip;
} else {
v_broadcastArea.geoBroadcastSubType := e_reserved;
}
v_broadcastArea.geoBroadcastArea := v_utGnTrigger.geoBroadcast.area;
v_geoNwBroadcastPacket := valueof(
m_geoNwBroadcastPacket_payload(
vc_longPosVectorRsu,
f_incLocalSeqNumber(),
v_broadcastArea,
c_defaultHopLimit,
v_utGnTrigger.geoBroadcast.trafficClass,
v_utGnTrigger.geoBroadcast.payload
));
v_geoNwBroadcastPacket.commonHeader.flags := f_isMobile();
v_geoNwPdu := valueof(
m_geoNwPdu(
v_geoNwBroadcastPacket,
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
m_lifetimeBase1s(v_utGnTrigger.geoBroadcast.lifetime / 1000),
c_defaultHopLimit
));
v_geoNwPdu.gnPacket.packet.commonHeader.nextHeader := e_any;
v_geoNwPdu.gnPacket.packet.commonHeader.flags := f_isMobile();
vc_rsuMessagesValueList[vc_rsu_id].beacon := v_geoNwPdu;
cfPort.send(UtGnResults: { utGnTriggerResult := true } );
} else if (ischosen(v_utGnTrigger.geoAnycast)) {
var GeoAnycastArea v_anycastArea;
var GnNonSecuredPacket v_geoNwAnycastPacket;
var GeoNetworkingPdu v_geoNwPdu;
if (v_utGnTrigger.geoAnycast.shape == e_geoCircle) {
v_anycastArea.geoAnycastSubType := e_geoAnycastCircle;
} else if (v_utGnTrigger.geoAnycast.shape == e_geoRect) {
v_anycastArea.geoAnycastSubType := e_geoAnycastRect;
} else if (v_utGnTrigger.geoAnycast.shape == e_geoElip) {
v_anycastArea.geoAnycastSubType := e_geoAnycastElip;
} else {
v_anycastArea.geoAnycastSubType := e_reserved;
}
v_anycastArea.geoAnycastArea := v_utGnTrigger.geoAnycast.area;
v_geoNwAnycastPacket := valueof(
m_geoNwAnycastPacket_payload(
vc_longPosVectorRsu,
f_incLocalSeqNumber(),
v_anycastArea,
c_defaultHopLimit,
v_utGnTrigger.geoAnycast.trafficClass,
v_utGnTrigger.geoAnycast.payload
));
v_geoNwPdu := valueof(
m_geoNwPdu(
v_geoNwAnycastPacket,
m_lifetimeBase1s(v_utGnTrigger.geoAnycast.lifetime / 1000),
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
v_geoNwPdu.gnPacket.packet.commonHeader.flags := f_isMobile();
v_geoNwPdu.gnPacket.packet.commonHeader.nextHeader := e_any;
vc_rsuMessagesValueList[vc_rsu_id].beacon := v_geoNwPdu;
cfPort.send(UtGnResults: { utGnTriggerResult := true } );
} else if (ischosen(v_utGnTrigger.shb)) {
var GnNonSecuredPacket v_geoShbPacket;
var GeoNetworkingPdu v_geoNwPdu;
v_geoShbPacket := valueof(
m_geoNwShbPacket_payload(
vc_longPosVectorRsu,
v_utGnTrigger.shb.payload
));
v_geoShbPacket.commonHeader.maxHopLimit := 1;
v_geoShbPacket.commonHeader.trafficClass.scf := v_utGnTrigger.shb.trafficClass.scf;
v_geoShbPacket.commonHeader.trafficClass.channelOffload := v_utGnTrigger.shb.trafficClass.channelOffload;
v_geoShbPacket.commonHeader.trafficClass.tcId := v_utGnTrigger.shb.trafficClass.tcId;
v_geoNwPdu := valueof(
m_geoNwPdu(
v_geoShbPacket,
m_defaultLifetime,
1
));
v_geoNwPdu.gnPacket.packet.commonHeader.flags := f_isMobile();
v_geoNwPdu.gnPacket.packet.commonHeader.nextHeader := e_any;
vc_rsuMessagesValueList[vc_rsu_id].beacon := v_geoNwPdu;
cfPort.send(UtGnResults: { utGnTriggerResult := true } );
} else if (ischosen(v_utGnTrigger.tsb)) {
var GnNonSecuredPacket v_geoTsbPacket;
var GeoNetworkingPdu v_geoNwPdu;
v_geoTsbPacket := valueof(
m_geoNwTsbPacket_payload(
f_incLocalSeqNumber(),
vc_longPosVectorRsu,
-,
-,
v_utGnTrigger.tsb.payload
));
v_geoTsbPacket.commonHeader.trafficClass.scf := v_utGnTrigger.tsb.trafficClass.scf;
v_geoTsbPacket.commonHeader.trafficClass.channelOffload := v_utGnTrigger.tsb.trafficClass.channelOffload;
v_geoTsbPacket.commonHeader.trafficClass.tcId := v_utGnTrigger.tsb.trafficClass.tcId;
v_geoNwPdu := valueof(
m_geoNwPdu(
v_geoTsbPacket,
m_defaultLifetime,
c_defaultHopLimit
));
v_geoNwPdu.gnPacket.packet.commonHeader.nextHeader := e_any;
v_geoNwPdu.gnPacket.packet.commonHeader.flags := f_isMobile();
vc_rsuMessagesValueList[vc_rsu_id].beacon := v_geoNwPdu;
cfPort.send(UtGnResults: { utGnTriggerResult := true } );
} else {
cfPort.send(UtGnResults: { utGnTriggerResult := false } );
[vc_cam == true] cfPort.receive(UtCamInitialize:?) -> value v_utCamInitialize {
log("a_process_cf_ut_command: v_utCamInitialize = ", v_utCamInitialize);
if (oct2int(v_utCamInitialize.hashedId8) != 0) {
var charstring v_certificate_id;
var EtsiTs103097Certificate v_certificate;
log("a_process_cf_ut_command: Looking for certificate ", v_utCamInitialize.hashedId8);
f_getCertificateFromDigest(v_utCamInitialize.hashedId8, v_certificate, v_certificate_id);
log("a_process_cf_ut_command (pki): Change certificate to ", v_certificate_id);
f_acTriggerSecEvent(m_acEnableSecurity(v_certificate_id));
}
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency.curvature.curvatureValue := 0;
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency.heading.headingValue := 0;
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.lowFrequencyContainer.basicVehicleContainerLowFrequency.vehicleRole := default_;
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.specialVehicleContainer := omit;
cfPort.send(UtCamResults: { utCamInitializeResult := true } );
repeat;
[vc_cam == true] cfPort.receive(UtCamTrigger: { changeSpeed := ? }) -> value v_utCamTrigger {
log("a_process_cf_ut_command: v_utCamTrigger = ", v_utCamTrigger);
cfPort.send(UtCamResults: { utCamTriggerResult := true } );
vc_cam_timer_value := vc_cam_timer_value / 2.0;
repeat;
}
[vc_cam == true] cfPort.receive(UtCamTrigger: { changeCurvature := ? }) -> value v_utCamTrigger {
log("a_process_cf_ut_command: v_utCamTrigger = ", v_utCamTrigger);
if (ischosen(vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency)) {
cfPort.send(UtCamResults: { utCamTriggerResult := true } );
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency.curvature.curvatureValue := v_utCamTrigger.changeCurvature;
} else {
cfPort.send(UtCamResults: { utCamTriggerResult := false } );
}
[vc_cam == true] cfPort.receive(UtCamTrigger: { changeHeading := ? }) -> value v_utCamTrigger {
log("a_process_cf_ut_command: v_utCamTrigger = ", v_utCamTrigger);
if (ischosen(vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency)) {
cfPort.send(UtCamResults: { utCamTriggerResult := true } );
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency.heading.headingValue := valueof(vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency.heading.headingValue) + v_utCamTrigger.changeHeading;
} else {
cfPort.send(UtCamResults: { utCamTriggerResult := false } );
}
repeat;
}
[vc_cam == true] cfPort.receive(UtCamTrigger: { setVehicleRole := ? }) -> value v_utCamTrigger {
log("a_process_cf_ut_command: v_utCamTrigger = ", v_utCamTrigger);
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.lowFrequencyContainer.basicVehicleContainerLowFrequency.vehicleRole := v_utCamTrigger.setVehicleRole;
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.specialVehicleContainer := { publicTransportContainer := { embarkationStatus := true, ptActivation := omit } };
cfPort.send(UtCamResults: { utCamTriggerResult := true } );
repeat;
}
[] cfPort.receive(UtDenmInitialize:?) -> value v_utDenmInitialize {
log("a_process_cf_ut_command: v_utDenmInitialize = ", v_utDenmInitialize);
vc_rsuMessagesValueList[vc_rsu_id].denms := {};
vc_denmEventCounter := 0;
vc_denm := true;
cfPort.send(UtDenmResults: { utDenmInitializeResult := true } );
repeat;
[vc_denm == true] cfPort.receive(UtDenmTrigger:?) -> value v_utDenmTrigger {
var template (value) DenmParmContainers v_denmParmContainers;
var DenmEventsParmsPerZone v_denmEventsParmsPerZone := PICS_DENM_EVENTS_RSU_UC1[vc_rsu_id][PX_ETSI_ZONE_ID - 1];
var integer seq_number := f_incDenmSequenceNumber();
log("a_process_cf_ut_command: v_utDenmTrigger: ", v_utDenmTrigger);
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
v_denmParmContainers := m_denmParmContainers(
PICS_RSU_PARAMS[vc_rsu_id].stationID,
seq_number,
v_utDenmTrigger.repetitionInterval,
v_denmEventsParmsPerZone[0].eventPosition,
v_utDenmTrigger.situation.eventType.causeCode,
v_denmEventsParmsPerZone[0].eventHistory,
v_denmEventsParmsPerZone[0].traces,
v_utDenmTrigger.validityDuration,
v_utDenmTrigger.relevanceDistance,
v_utDenmTrigger.relevanceTrafficDirection
);
v_denmParmContainers.managementContainer.detectionTime := v_utDenmTrigger.detectionTime;
vc_rsuMessagesValueList[vc_rsu_id].denms[lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms)] := valueof(
m_denmPdu_rsu(
PICS_RSU_PARAMS[vc_rsu_id].stationID,
m_denm(
v_denmParmContainers.managementContainer,
v_denmParmContainers.situationContainer,
v_denmParmContainers.locationContainer
)));
log("a_process_cf_ut_command: utDenmTrigger: denm=[" & int2char(lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) - 1) & "]=", vc_rsuMessagesValueList[vc_rsu_id].denms[lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) - 1]);
//denm={ { header := { protocolVersion := 2, messageID := 1, stationID := 1111101 }, denm := { management := { actionID := { originatingStationID := 1111101, sequenceNumber := 1 }, detectionTime := 510819417810, referenceTime := 510819420809, termination := omit, eventPosition := { latitude := 367467556, longitude := -45552381, positionConfidenceEllipse := { semiMajorConfidence := 100, semiMinorConfidence := 100, semiMajorOrientation := 0 }, altitude := { altitudeValue := 0, altitudeConfidence := alt_000_01 (0) } }, relevanceDistance := lessThan50m (0), relevanceTrafficDirection := upstreamTraffic (1), validityDuration := 2, transmissionInterval := omit, stationType := 15 }, situation := { informationQuality := 0, eventType := { causeCode := 91, subCauseCode := 0 }, linkedCause := omit, eventHistory := { { eventPosition := { deltaLatitude := 135, deltaLongitude := -147, deltaAltitude := 0 }, eventDeltaTime := omit, informationQuality := 0 }, { eventPosition := { deltaLatitude := -68, deltaLongitude := 74, deltaAltitude := 0 }, eventDeltaTime := omit, informationQuality := 0 } } }, location := { eventSpeed := omit, eventPositionHeading := omit, traces := { { { pathPosition := { deltaLatitude := -1086, deltaLongitude := 2551, deltaAltitude := 0 }, pathDeltaTime := omit }, { pathPosition := { deltaLatitude := -450, deltaLongitude := 1010, deltaAltitude := 0 }, pathDeltaTime := omit }, { pathPosition := { deltaLatitude := -460, deltaLongitude := 1000, deltaAltitude := 0 }, pathDeltaTime := omit }, { pathPosition := { deltaLatitude := -440, deltaLongitude := 1000, deltaAltitude := 0 }, pathDeltaTime := omit }, { pathPosition := { deltaLatitude := -440, deltaLongitude := 990, deltaAltitude := 0 }, pathDeltaTime := omit } } }, roadType := omit }, alacarte := omit } } }
if (lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) == 1) {
tc_denm.start;
}
cfPort.send(UtDenmResults: { utDenmTriggerResult := { result := true, actionId := vc_rsuMessagesValueList[vc_rsu_id].denms[lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) - 1].denm.management.actionID } } );
repeat;
}
[vc_denm == true] cfPort.receive(UtDenmUpdate:?) -> value v_utDenmUpdate {
var integer v_i := 0;
var boolean v_found := false;
log("a_process_cf_ut_command: v_utDenmUpdate = ", v_utDenmUpdate);
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
for (v_i := 0; v_i < lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms); v_i := v_i + 1) {
if (v_utDenmUpdate.actionId.sequenceNumber == valueof(vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.actionID.sequenceNumber)) {
v_found := true;
break;
}
} // End of 'for' statement
if (v_found == true) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.detectionTime := v_utDenmUpdate.detectionTime;
if (ispresent(v_utDenmUpdate.validityDuration)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.validityDuration := v_utDenmUpdate.validityDuration;
}
if (ispresent(v_utDenmUpdate.situation)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.situation := v_utDenmUpdate.situation;
}
if (ispresent(v_utDenmUpdate.relevanceDistance)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.relevanceDistance := v_utDenmUpdate.relevanceDistance;
}
if (ispresent(v_utDenmUpdate.relevanceTrafficDirection)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.relevanceTrafficDirection := v_utDenmUpdate.relevanceTrafficDirection;
}
if (ispresent(v_utDenmUpdate.transmissionInterval)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.transmissionInterval := v_utDenmUpdate.transmissionInterval;
}
if (ispresent(v_utDenmUpdate.transmissionInterval)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.transmissionInterval := v_utDenmUpdate.transmissionInterval;
}
if (ispresent(v_utDenmUpdate.alacarte)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.alacarte := v_utDenmUpdate.alacarte;
}
}
cfPort.send(UtDenmResults: { utDenmUpdateResult := { result := true, actionId := vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.actionID } } );
repeat;
}
[vc_denm == true] cfPort.receive(UtDenmTermination:?) -> value v_utDenmTermination {
var integer v_i := 0;
var boolean v_found := false;
log("a_process_cf_ut_command: v_utDenmTermination: ", v_utDenmTermination);
for (v_i := 0; v_i < lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms); v_i := v_i + 1) {
if (v_utDenmTermination.actionId.sequenceNumber == valueof(vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.actionID.sequenceNumber)) {
v_found := true;
break;
}
} // End of 'for' statement
if (v_found == true) {
log("a_process_cf_ut_command: v_utDenmTermination: v_i=", v_i);
log("a_process_cf_ut_command: v_utDenmTermination: l=", lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms));
if (lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) > 1) { //Shift elements
for (var integer v_j := v_i + 1; v_i < lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms); v_i := v_i + 1) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i] := vc_rsuMessagesValueList[vc_rsu_id].denms[v_j];
v_j := v_j + 1;
} // End of 'for' statement
vc_rsuMessagesValueList[vc_rsu_id].denms[lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) - 1] := {}
} else {
vc_rsuMessagesValueList[vc_rsu_id].denms := {};
vc_denmEventCounter := 0;
}
log("v_utDenmTermination: New l=", lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms));
if (lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) == 0) {
tc_denm.stop;
f_sleep(1.0);
vc_denm := false;
}
cfPort.send(UtDenmResults: { utDenmTerminationResult := true } );
}
repeat;
}
[vc_ivim == true] cfPort.receive(UtIvimInitialize:?) -> value v_utIvimInitialize {
log("a_process_cf_ut_command: v_utIvimInitialize = ", v_utIvimInitialize);
if (oct2int(v_utIvimInitialize.hashedId8) != 0) {
var charstring v_certificate_id;
var EtsiTs103097Certificate v_certificate;
log("a_process_cf_ut_command: Looking for certificate ", v_utIvimInitialize.hashedId8);
f_getCertificateFromDigest(v_utIvimInitialize.hashedId8, v_certificate, v_certificate_id);
log("a_process_cf_ut_command (pki): Change certificate to ", v_certificate_id);
f_acTriggerSecEvent(m_acEnableSecurity(v_certificate_id));
}
//vc_rsuMessagesValueList[vc_rsu_id].ivim.ivi.mandatory.;
cfPort.send(UtIvimResults: { utIvimInitializeResult := true } );
repeat;
}
[vc_rtcmem == true] cfPort.receive(UtRtcmemInitialize:?) -> value v_utRtcmemInitialize {
log("a_process_cf_ut_command: v_utRtcmemInitialize = ", v_utRtcmemInitialize);
if (oct2int(v_utRtcmemInitialize.hashedId8) != 0) {
var charstring v_certificate_id;
var EtsiTs103097Certificate v_certificate;
log("a_process_cf_ut_command: Looking for certificate ", v_utRtcmemInitialize.hashedId8);
f_getCertificateFromDigest(v_utRtcmemInitialize.hashedId8, v_certificate, v_certificate_id);
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
log("a_process_cf_ut_command (pki): Change certificate to ", v_certificate_id);
f_acTriggerSecEvent(m_acEnableSecurity(v_certificate_id));
}
//vc_rsuMessagesValueList[vc_rsu_id].rtcmem.gdd.;
cfPort.send(UtRtcmemResults: { utRtcmemInitializeResult := true } );
repeat;
}
[vc_rtcmem == true] cfPort.receive(UtRtcmemTrigger:?) -> value v_utRtcmemTrigger {
log("a_process_cf_ut_command: v_utRtcmemTrigger: ", v_utRtcmemTrigger);
cfPort.send(UtRtcmemResults: { utRtcmemTriggerResult := true } );
repeat;
}
[vc_rtcmem == true] cfPort.receive(UtRtcmemUpdate:?) -> value v_utRtcmemUpdate {
cfPort.send(UtRtcmemResults: { utRtcmemUpdateResult := true } );
repeat;
}
[vc_rtcmem == true] cfPort.receive(UtRtcmemTermination:?) -> value v_utRtcmemTermination {
log("a_process_cf_ut_command: v_utRtcmemTermination: ", v_utRtcmemTermination);
cfPort.send(UtRtcmemResults: { utRtcmemTerminationResult := true } );
repeat;
}
[vc_srem == true] cfPort.receive(UtSremInitialize:?) -> value v_utSremInitialize {
log("a_process_cf_ut_command: v_utSremInitialize = ", v_utSremInitialize);
if (oct2int(v_utSremInitialize.hashedId8) != 0) {
var charstring v_certificate_id;
var EtsiTs103097Certificate v_certificate;
log("a_process_cf_ut_command: Looking for certificate ", v_utSremInitialize.hashedId8);
f_getCertificateFromDigest(v_utSremInitialize.hashedId8, v_certificate, v_certificate_id);
log("a_process_cf_ut_command (pki): Change certificate to ", v_certificate_id);
f_acTriggerSecEvent(m_acEnableSecurity(v_certificate_id));
}
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
vc_rsuMessagesValueList[vc_rsu_id].srem := valueof(
m_sremPdu(
m_srem(
m_requestorDescription(
m_vehicleID(
f_getIutStationId()
),
m_requestorType(
basicVehicle
)
),
{
m_signalRequestPackage(
m_signalRequest(
LibItsSremSsem_Templates.m_intersectionReferenceID(
PX_INTERSECTION_ID
),
PX_REQUEST_ID,
priorityRequest,
{ lane := 1 }
)
)
}
)
)
);
cfPort.send(UtSremResults: { utSremInitializeResult := true } );
repeat;
}
[vc_srem == true] cfPort.receive(UtSremTrigger:?) -> value v_utSremTrigger {
log("a_process_cf_ut_command: v_utSremTrigger: ", v_utSremTrigger);
cfPort.send(UtSremResults: { utSremTriggerResult := true } );
repeat;
}
[vc_srem == true] cfPort.receive(UtSremUpdate:?) -> value v_utSremUpdate {
cfPort.send(UtSremResults: { utSremUpdateResult := true } );
repeat;
}
[vc_srem == true] cfPort.receive(UtSremCancelation:?) -> value v_utSremCancelation {
log("a_process_cf_ut_command: v_utSremCancelation: ", v_utSremCancelation);
cfPort.send(UtSremResults: { utSremCancelationResult := true } );
repeat;
}
[vc_pki == true] cfPort.receive(UtPkiInitialize:?) -> value v_utPkiInitialize {
log("a_process_cf_ut_command: v_utPkiInitialize = ", v_utPkiInitialize);
if (oct2int(v_utPkiInitialize.hashedId8) != 0) {
var charstring v_certificate_id;
var EtsiTs103097Certificate v_certificate;
log("a_process_cf_ut_command: Looking for certificate ", v_utPkiInitialize.hashedId8);
f_getCertificateFromDigest(v_utPkiInitialize.hashedId8, v_certificate, v_certificate_id);
log("a_process_cf_ut_command (pki): Change certificate to ", v_certificate_id);
f_acTriggerSecEvent(m_acEnableSecurity(v_certificate_id));
vc_security_state := 0; // 0: initial
vc_reenrolment := false;
vc_ec_counter := 0;
vc_ec_certificates := {};
vc_at_counter := 0;
vc_at_certificates := {};
tc_cam.stop;
cfPort.send(UtPkiResults: { utPkiInitializeResult := true } );
repeat;
}
[vc_pki == true] cfPort.receive(UtPkiTrigger: { triggerEnrolmentRequest := ? }) -> value v_utPkiTrigger {
var ItsPkiHttpRsuSimulator v_pki;
var EcData v_ec_data;
log("a_process_cf_ut_command: v_utPkiTrigger=", v_utPkiTrigger);
cfPort.send(UtPkiResults: { utPkiTriggerResult := true } );
v_pki := ItsPkiHttpRsuSimulator.create("TriggeredEc") alive;
connect(v_pki:resultPort, self:resultPort);
v_pki.start(f_trigger_enrolment_request_await_response());
tc_wait.start;
alt {
[] resultPort.receive(EcData:?) -> value v_ec_data {
tc_wait.stop;
vc_ec_certificates[vc_ec_counter] := v_ec_data;
vc_ec_counter := vc_ec_counter + 1;
vc_reenrolment := true;
vc_security_state := 1; // 1:enrolled
}
[] tc_wait.timeout {
log("a_process_cf_ut_command: Failed to retrieve EcData");
vc_reenrolment := false;
vc_security_state := 0; // 0: initial
}
} // End of 'alt' statement
disconnect(v_pki:resultPort, self:resultPort);
v_pki.done;
v_pki.kill;
repeat;
}
[vc_pki == true] cfPort.receive(UtPkiTrigger: { triggerAuthorizationRequest := ? }) -> value v_utPkiTrigger {
var ItsPkiHttpRsuSimulator v_pki;
var AtData v_at_data;
cfPort.send(UtPkiResults: { utPkiTriggerResult := true } );
v_pki := ItsPkiHttpRsuSimulator.create("TriggeredAt") alive;
connect(v_pki:resultPort, self:resultPort);
v_pki.start(f_trigger_authorization_request_await_response(
vc_ec_counter,
tc_wait.start;
alt {
[] resultPort.receive(AtData:?) -> value v_at_data {
tc_wait.stop;
vc_at_certificates[vc_at_counter] := v_at_data;
vc_at_counter := vc_at_counter + 1;
vc_security_state := 2; // 2: authorization
}
[] tc_wait.timeout {
log("a_process_cf_ut_command: Failed to retrieve AtData");
vc_security_state := 1; // 1: enrolled
}
} // End of 'alt' statement
disconnect(v_pki:resultPort, self:resultPort);
v_pki.done;
v_pki.kill;
if (vc_security_state == 2) {
var octetstring v_cert := bit2oct(encvalue(vc_at_certificates[0].certificate));
var Oct32 v_wholeHash := f_hashWithSha256(v_cert);
var HashedId8 v_hashedId8_sha256 := f_hashedId8FromSha256(v_wholeHash);
var charstring v_cert_id;
var HashedId8 v_hashedId8;
var HashedId8 v_issuer;
var octetstring v_public_key_x := ''O;
var octetstring v_public_key_y := ''O;
var octetstring v_public_key_compressed;
var integer v_verify_compressed_mode;
var template (omit) octetstring v_public_enc_key_x := omit;
var template (omit) octetstring v_public_enc_key_y := omit;
var template (omit) octetstring v_public_enc_compressed_key := omit;
var template (omit) integer v_public_enc_key_compressed_mode := omit;
log("a_process_cf_ut_command: triggerAuthorizationRequest: vc_at_counter=", vc_at_counter);
log("a_process_cf_ut_command: triggerAuthorizationRequest: vc_at_certificates=", vc_at_certificates);
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
// Prepare to store the new certificate
if (ischosen(vc_at_certificates[0].certificate.issuer.sha256AndDigest)) {
v_hashedId8 := v_hashedId8_sha256;
v_issuer := vc_at_certificates[0].certificate.issuer.sha256AndDigest;
} else if (ischosen(vc_at_certificates[0].certificate.issuer.sha384AndDigest)) {
v_hashedId8 := f_hashedId8FromSha384(f_hashWithSha384(v_cert));
v_issuer := vc_at_certificates[0].certificate.issuer.sha384AndDigest;
} else {
log("a_process_cf_ut_command: Wrong certificate format, self_ not expected as issuer, back to initial");
vc_security_state := 0; // 0: initial
vc_reenrolment := false;
vc_ec_counter := 0;
vc_ec_certificates := {};
vc_at_counter := 0;
vc_at_certificates := {};
repeat;
}
v_cert_id := hex2str(oct2hex(v_hashedId8));
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_cert_id =", v_cert_id);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_cert =", v_cert);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_wholeHash =", v_wholeHash);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_hashedId8_sha256 =", v_hashedId8_sha256);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_hashedId8 =", v_hashedId8);
// Extract verification keys
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256)) {
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_0)) {
v_public_key_compressed := vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_0;
v_verify_compressed_mode := 0;
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_1)) {
v_public_key_compressed := vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_1;
v_verify_compressed_mode := 1;
} else { // TODO
}
if (lengthof(v_public_key_x) == 0) {
v_public_key_x := v_public_key_compressed; // Key X-Coordinate
fx_get_uncompressed_key_nistp256(vc_at_certificates[0].private_key, v_public_key_compressed, v_verify_compressed_mode, v_public_key_y); // Key Y-Coordinate
}
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1)) {
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_0)) {
v_public_key_compressed := vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_0;
v_verify_compressed_mode := 0;
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_1)) {
v_public_key_compressed := vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_1;
v_verify_compressed_mode := 1;
} else { // TODO
}
if (lengthof(v_public_key_x) == 0) {
v_public_key_x := v_public_key_compressed; // Key X-Coordinate
fx_get_uncompressed_key_brainpoolp256r1(vc_at_certificates[0].private_key, v_public_key_compressed, v_verify_compressed_mode, v_public_key_y); // Key Y-Coordinate
}
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP384r1)) {
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP384r1.compressed_y_0)) {
v_public_key_compressed := vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP384r1.compressed_y_0;
v_verify_compressed_mode := 0;
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP384r1.compressed_y_1)) {
v_public_key_compressed := vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP384r1.compressed_y_1;
v_verify_compressed_mode := 1;
} else { // TODO
}
if (lengthof(v_public_key_x) == 0) {
v_public_key_x := v_public_key_compressed; // Key X-Coordinate
fx_get_uncompressed_key_brainpoolp384r1(vc_at_certificates[0].private_key, v_public_key_compressed, v_verify_compressed_mode, v_public_key_y); // Key Y-Coordinate
}
} else {
log("a_process_cf_ut_command: Wrong certificate format, invalid verification key, back to initial");
vc_security_state := 0; // 0: initial
vc_reenrolment := false;
vc_ec_counter := 0;
vc_ec_certificates := {};
vc_at_counter := 0;
vc_at_certificates := {};
repeat;
}
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_key_x =", v_public_key_x);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_key_y =", v_public_key_y);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_key_compressed =", v_public_key_compressed);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_verify_compressed_mode=", v_verify_compressed_mode);
// Extract encryption key
if (ispresent(vc_at_certificates[0].certificate.toBeSigned.encryptionKey)) {
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesNistP256)) {
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesNistP256.compressed_y_0)) {
v_public_enc_compressed_key := vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesNistP256.compressed_y_0;
v_public_enc_key_compressed_mode := 0;
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesNistP256.compressed_y_1)) {
v_public_enc_compressed_key := vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesNistP256.compressed_y_1;
v_public_enc_key_compressed_mode := 1;
} else { // TODO
}
if (not(ispresent(v_public_enc_key_x))) {
var octetstring v_key;
v_public_enc_key_x := v_public_enc_compressed_key; // Key X-Coordinate
fx_get_uncompressed_key_nistp256(vc_at_certificates[0].private_enc_key, valueof(v_public_enc_compressed_key), valueof(v_public_enc_key_compressed_mode), v_key); // Key Y-Coordinate
v_public_enc_key_y := v_key;
}
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesBrainpoolP256r1)) {
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesBrainpoolP256r1.compressed_y_0)) {
v_public_enc_compressed_key := vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesBrainpoolP256r1.compressed_y_0;
v_public_enc_key_compressed_mode := 0;
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesBrainpoolP256r1.compressed_y_1)) {
v_public_enc_compressed_key := vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesBrainpoolP256r1.compressed_y_1;
v_public_enc_key_compressed_mode := 1;
} else { // TODO
}
if (not(ispresent(v_public_enc_key_x))) {
var octetstring v_key;
v_public_enc_key_x := v_public_enc_compressed_key; // Key X-Coordinate
fx_get_uncompressed_key_brainpoolp256r1(vc_at_certificates[0].private_enc_key, valueof(v_public_enc_compressed_key), valueof(v_public_enc_key_compressed_mode), v_key); // Key Y-Coordinate
v_public_enc_key_y := v_key;
}
} else {
log("a_process_cf_ut_command: Wrong certificate format, invalid verification key, back to initial");
vc_security_state := 0; // 0: initial
vc_reenrolment := false;
vc_ec_counter := 0;
vc_ec_certificates := {};
vc_at_counter := 0;
vc_at_certificates := {};
repeat;
}
}
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_enc_key_x =", v_public_enc_key_x);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_enc_key_y =", v_public_enc_key_y);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_enc_compressed_key =", v_public_enc_compressed_key);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_enc_key_compressed_mode=", v_public_enc_key_compressed_mode);
// Store the certificate
log("a_process_cf_ut_command: Store new AT certificate");
if (fx_store_certificate(v_cert_id, v_cert, vc_at_certificates[0].private_key, v_public_key_x, v_public_key_y, v_public_key_compressed, v_verify_compressed_mode, v_wholeHash, v_hashedId8_sha256, v_hashedId8, v_issuer, vc_at_certificates[0].private_enc_key, v_public_enc_key_x, v_public_enc_key_y, v_public_enc_compressed_key, v_public_enc_key_compressed_mode) == false) {
log("a_process_cf_ut_command: Failed to store certificate, back to initial");
vc_security_state := 0; // 0: initial
vc_reenrolment := false;
vc_ec_counter := 0;
vc_ec_certificates := {};
vc_at_counter := 0;
vc_at_certificates := {};
repeat;
}
// Update the Test System
log("a_process_cf_ut_command (pki): Change certificate to ", v_cert_id);
f_acTriggerSecEvent(m_acEnableSecurity(v_cert_id));
// Enrolled & Authorized, start CAM emission
tc_cam.start(vc_cam_timer_value);
}
[] cfPort.receive {
// Ignore it
log("*** " & testcasename() & ": INFO: Unexpected CF message received ***");
repeat;
}
} // End of 'altstep' statement
function f_trigger_enrolment_request_await_response() runs on ItsPkiHttpRsuSimulator {
// Local variables
var Oct32 v_private_key;
var Oct32 v_compressed_public_key;
var integer v_compressed_mode;
var Oct32 v_request_hash;
var Oct16 v_encrypted_sym_key;
var Oct16 v_aes_sym_key;
var Oct16 v_authentication_vector;
var Oct12 v_nonce;
var octetstring v_salt;
var Ieee1609Dot2Data v_ieee1609dot2_signed_and_encrypted_data;
var HttpMessage v_response;
var EtsiTs102941Data v_etsi_ts_102941_data;
timer v_t := 5.0;
log(">>> f_trigger_enrolment_request_await_response");
f_cfHttpUp(PICS_IUT_EA_CERTIFICATE_ID, PICS_IUT_AA_CERTIFICATE_ID);
1860
1861
1862
1863
1864
1865
1866
1867
1868
1869
1870
1871
1872
1873
1874
1875
1876
1877
1878
1879
1880
1881
1882
1883
1884
1885
f_http_build_inner_ec_request(v_private_key, v_compressed_public_key, v_compressed_mode, v_aes_sym_key, v_encrypted_sym_key, v_authentication_vector, v_nonce, v_salt, v_ieee1609dot2_signed_and_encrypted_data, v_request_hash);
f_init_default_headers_list(-, "inner_ec_request", v_headers);
httpPort.send(
m_http_request(
m_http_request_post(
PICS_HTTP_POST_URI,
v_headers,
m_http_message_body_binary(
m_binary_body_ieee1609dot2_data(
v_ieee1609dot2_signed_and_encrypted_data
)))));
// Wait for the resposne
v_t.start;
alt {
[] httpPort.receive(
mw_http_response(
mw_http_response_ok(
mw_http_message_body_binary(
mw_binary_body_ieee1609dot2_data(
mw_enrolmentResponseMessage(
mw_encryptedData(
-,
mw_SymmetricCiphertext_aes128ccm
))))))) -> value v_response {
v_t.stop;
log("f_trigger_enrolment_request_await_response: v_response=", v_response);
if (f_verify_pki_response_message(v_private_key, v_aes_sym_key, v_authentication_vector, vc_eaWholeHash, v_response.response.body.binary_body.ieee1609dot2_data, false, -, v_etsi_ts_102941_data) == false) {
log("f_trigger_enrolment_request_await_response: Failed to verify PKI message ***");
} else {
log("f_trigger_enrolment_request_await_response: v_etsi_ts_102941_data=", v_etsi_ts_102941_data);
// Verify the received EC certificate
log("f_trigger_enrolment_request_await_response: match ", match(v_etsi_ts_102941_data.content, mw_enrolmentResponse(mw_innerEcResponse_ok(substr(v_request_hash, 0, 16), mw_etsiTs103097Certificate(-, mw_toBeSignedCertificate_ec, -)))), " ***"); // TODO In TITAN, this is the only way to get the unmatching in log
if (match(v_etsi_ts_102941_data.content, mw_enrolmentResponse(mw_innerEcResponse_ok(substr(v_request_hash, 0, 16), mw_etsiTs103097Certificate(-, mw_toBeSignedCertificate_ec, -))))) {
var InnerEcResponse v_inner_ec_response := v_etsi_ts_102941_data.content.enrolmentResponse;
if (f_verify_ec_certificate(v_etsi_ts_102941_data.content.enrolmentResponse.certificate, vc_eaCertificate, vc_eaHashedId8, v_compressed_public_key, v_compressed_mode)) {
var EcData v_ec_data;
log("f_trigger_enrolment_request_await_response: p_inner_ec_response= ", v_inner_ec_response);
// Send the new certificate for storing
v_ec_data.private_key := v_private_key;
v_ec_data.aes_sym_key := v_aes_sym_key;
v_ec_data.certificate := v_inner_ec_response.certificate;
log("f_trigger_enrolment_request_await_response: send v_ec_data=", v_ec_data);
resultPort.send(v_ec_data);
} else {
log("f_trigger_enrolment_request_await_response: Cannot verify EC certificate signature ***");
}
} else {
log("f_trigger_enrolment_request_await_response: Unexpected message received ***");
}
}
}
[] v_t.timeout {
log("*** " & testcasename() & ": INCONC: Expected message not received ***");
}
} // End of 'alt' statement
f_cfHttpDown();
log("<<< f_trigger_enrolment_request_await_response");
}
function f_trigger_authorization_request_await_response(
in integer p_ec_counter,
in SequenceOfEcData p_ec_certificates
) runs on ItsPkiHttpRsuSimulator {
var Oct32 v_private_key_at;
var Oct32 v_public_compressed_key_at;
var integer p_compressed_mode_at;
var Oct32 v_private_enc_key_at;
var Oct32 v_public_compressed_enc_key_at;
var integer v_compressed_enc_mode_at;
var Oct16 v_encrypted_sym_key;
var Oct16 v_aes_sym_key;
var HashedId8 v_aes_sym_key_hashed_id8;
var Oct16 v_authentication_vector;
var Oct12 v_nonce;
var octetstring v_salt;
var Ieee1609Dot2Data v_ieee1609dot2_signed_and_encrypted_data;
var Oct32 v_request_hash;
var bitstring v_encoded_value;
var Ieee1609Dot2Data v_authorization_response;
var HttpMessage v_response;
var EtsiTs102941Data v_etsi_ts_102941_data;
f_cfHttpUp(PICS_IUT_EA_CERTIFICATE_ID, PICS_IUT_AA_CERTIFICATE_ID);
f_http_build_authorization_request(
p_ec_certificates[p_ec_counter - 1].certificate,
p_ec_certificates[p_ec_counter - 1].private_key,
v_private_key_at,
v_public_compressed_key_at,
p_compressed_mode_at,
v_private_enc_key_at,
v_public_compressed_enc_key_at,
v_compressed_enc_mode_at,
v_aes_sym_key,
v_encrypted_sym_key,
v_authentication_vector,
v_nonce,
v_salt,
v_ieee1609dot2_signed_and_encrypted_data,
v_request_hash);
log("f_trigger_authorization_request_await_response: v_ieee1609dot2_signed_and_encrypted_data=", v_ieee1609dot2_signed_and_encrypted_data);
v_aes_sym_key_hashed_id8 := f_hashedId8FromSha256(f_hashWithSha256('80'O & v_aes_sym_key)); // Used to match the response
f_init_default_headers_list(-, "inner_at_request", v_headers);
httpPort.send(
m_http_request(
m_http_request_post(
v_headers,
m_http_message_body_binary(
m_binary_body_ieee1609dot2_data(
v_ieee1609dot2_signed_and_encrypted_data
)))));
// Wait for the resposne
v_t.start;
alt {
[] httpPort.receive(
mw_http_response(
mw_http_response_ok(
mw_http_message_body_binary(
mw_binary_body_ieee1609dot2_data(
mw_enrolmentResponseMessage(
mw_encryptedData(
-,
mw_SymmetricCiphertext_aes128ccm
))))))) -> value v_response {
v_t.stop;
log("f_trigger_authorization_request_await_response: v_response=", v_response);
if (f_verify_pki_response_message(v_private_key_at, v_aes_sym_key, v_authentication_vector, v_request_hash, v_response.response.body.binary_body.ieee1609dot2_data, false, -, v_etsi_ts_102941_data) == false) {
log("f_trigger_authorization_request_await_response: Failed to verify PKI message");
log("f_trigger_authorization_request_await_response: v_etsi_ts_102941_data=", v_etsi_ts_102941_data);
// Verify the received AT certificate
log(match(v_etsi_ts_102941_data.content, mw_authorizationResponse(mw_innerAtResponse_ok(substr(v_request_hash, 0, 16), mw_etsiTs103097Certificate(-, mw_toBeSignedCertificate_at, -))))); // TODO In TITAN, this is the only way to get the unmatching in log