TC_SEC_PKI_SND_EA_BV_01.log 1.7 MB
Newer Older
garciay's avatar
garciay committed
}
16:15:58.355825 mtc DEBUG ../ttcn/ItsPki_TestCases.ttcn:311(testcase:TC_SEC_PKI_SND_EA_BV_01) >>> PkiPort::receive_msg: {
    requestHash := 'E7C4913219D64F5263EF695E9003DFFD'O,
    responseCode := ok (0),
    certificate := {
        version := 3,
        type_ := explicit (0),
        issuer := {
            sha256AndDigest := 'B410FF61F20015AD'O
        },
        toBeSigned := {
            id := {
                none_ := NULL
            },
            cracaId := '000000'O,
            crlSeries := 0,
            validityPeriod := {
                start_ := 17469212,
                duration := {
                    years := 10
                }
            },
            region := {
                identifiedRegion := {
                    {
                        countryOnly := 12
                    },
                    {
                        countryOnly := 34
                    }
                }
            },
            assuranceLevel := omit,
            appPermissions := {
                {
                    psid := 36,
                    ssp := {
                        bitmapSsp := '830001'O
                    }
                },
                {
                    psid := 37,
                    ssp := {
                        bitmapSsp := '830001'O
                    }
                }
            },
            certIssuePermissions := omit,
            certRequestPermissions := omit,
            canRequestRollover := omit,
            encryptionKey := omit,
            verifyKeyIndicator := {
                verificationKey := {
                    ecdsaNistP256 := {
                        compressed_y_0 := '7029A9B20D22AE37B1344B7FCC2322C8F1E5ECE09C39CC289E500A9487298B9B'O
                    }
                }
            }
        },
        signature_ := {
            ecdsaNistP256Signature := {
                rSig := {
                    x_only := '79C4011314E53EE0893F40360851D50549E55B00668C56757E32ADF6CE5B7C75'O
                },
                sSig := '728CA50DFC72C2A23B20E9F9A6E85DF70E9DCB5FFB42D313289BE45956147E3A'O
            }
        }
    }
}
16:15:58.361222 mtc PORTEVENT ../ttcn/ItsPki_TestCases.ttcn:311(testcase:TC_SEC_PKI_SND_EA_BV_01) Message enqueued on pkiPort from system @EtsiTs102941TypesEnrolment.InnerEcResponse : {
    requestHash := 'E7C4913219D64F5263EF695E9003DFFD'O,
    responseCode := ok (0),
    certificate := {
        version := 3,
        type_ := explicit (0),
        issuer := {
            sha256AndDigest := 'B410FF61F20015AD'O
        },
        toBeSigned := {
            id := {
                none_ := NULL
            },
            cracaId := '000000'O,
            crlSeries := 0,
            validityPeriod := {
                start_ := 17469212,
                duration := {
                    years := 10
                }
            },
            region := {
                identifiedRegion := {
                    {
                        countryOnly := 12
                    },
                    {
                        countryOnly := 34
                    }
                }
            },
            assuranceLevel := omit,
            appPermissions := {
                {
                    psid := 36,
                    ssp := {
                        bitmapSsp := '830001'O
                    }
                },
                {
                    psid := 37,
                    ssp := {
                        bitmapSsp := '830001'O
                    }
                }
            },
            certIssuePermissions := omit,
            certRequestPermissions := omit,
            canRequestRollover := omit,
            encryptionKey := omit,
            verifyKeyIndicator := {
                verificationKey := {
                    ecdsaNistP256 := {
                        compressed_y_0 := '7029A9B20D22AE37B1344B7FCC2322C8F1E5ECE09C39CC289E500A9487298B9B'O
                    }
                }
            }
        },
        signature_ := {
            ecdsaNistP256Signature := {
                rSig := {
                    x_only := '79C4011314E53EE0893F40360851D50549E55B00668C56757E32ADF6CE5B7C75'O
                },
                sSig := '728CA50DFC72C2A23B20E9F9A6E85DF70E9DCB5FFB42D313289BE45956147E3A'O
            }
        }
    }
} id 1
16:15:58.362682 mtc EXECUTOR ../ttcn/ItsPki_TestCases.ttcn:311(testcase:TC_SEC_PKI_SND_EA_BV_01) tcp_layer::Handle_Fd_Event_Readable: Execution duration: 900.221008 ms
16:15:58.363266 mtc MATCHING ../ttcn/ItsPki_TestCases.ttcn:312(testcase:TC_SEC_PKI_SND_EA_BV_01) Matching on port pkiPort succeeded:  matched
16:15:58.363927 mtc PORTEVENT ../ttcn/ItsPki_TestCases.ttcn:312(testcase:TC_SEC_PKI_SND_EA_BV_01) Receive operation on port pkiPort succeeded, message from system(): @EtsiTs102941TypesEnrolment.InnerEcResponse : {
    requestHash := 'E7C4913219D64F5263EF695E9003DFFD'O,
    responseCode := ok (0),
    certificate := {
        version := 3,
        type_ := explicit (0),
        issuer := {
            sha256AndDigest := 'B410FF61F20015AD'O
        },
        toBeSigned := {
            id := {
                none_ := NULL
            },
            cracaId := '000000'O,
            crlSeries := 0,
            validityPeriod := {
                start_ := 17469212,
                duration := {
                    years := 10
                }
            },
            region := {
                identifiedRegion := {
                    {
                        countryOnly := 12
                    },
                    {
                        countryOnly := 34
                    }
                }
            },
            assuranceLevel := omit,
            appPermissions := {
                {
                    psid := 36,
                    ssp := {
                        bitmapSsp := '830001'O
                    }
                },
                {
                    psid := 37,
                    ssp := {
                        bitmapSsp := '830001'O
                    }
                }
            },
            certIssuePermissions := omit,
            certRequestPermissions := omit,
            canRequestRollover := omit,
            encryptionKey := omit,
            verifyKeyIndicator := {
                verificationKey := {
                    ecdsaNistP256 := {
                        compressed_y_0 := '7029A9B20D22AE37B1344B7FCC2322C8F1E5ECE09C39CC289E500A9487298B9B'O
                    }
                }
            }
        },
        signature_ := {
            ecdsaNistP256Signature := {
                rSig := {
                    x_only := '79C4011314E53EE0893F40360851D50549E55B00668C56757E32ADF6CE5B7C75'O
                },
                sSig := '728CA50DFC72C2A23B20E9F9A6E85DF70E9DCB5FFB42D313289BE45956147E3A'O
            }
        }
    }
} id 1
16:15:58.364883 mtc PORTEVENT ../ttcn/ItsPki_TestCases.ttcn:312(testcase:TC_SEC_PKI_SND_EA_BV_01) Message with id 1 was extracted from the queue of pkiPort.
16:15:58.366858 mtc TIMEROP ../ttcn/ItsPki_TestCases.ttcn:315(testcase:TC_SEC_PKI_SND_EA_BV_01) Stop timer tc_ac: 30 s
16:15:58.367725 mtc USER ../ttcn/ItsPki_TestCases.ttcn:316(testcase:TC_SEC_PKI_SND_EA_BV_01) *** TC_SEC_PKI_SND_EA_BV_01: PASS: InnerEcReponse received ***
16:15:58.368384 mtc VERDICTOP ../ttcn/ItsPki_TestCases.ttcn:317(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibCommon_Sync.ttcn:448(function:f_selfOrClientSyncAndVerdictTestBody)->../ttcn/LibCommon_Sync.ttcn:1153(function:f_selfSyncAndVerdictTestBody)->../ttcn/LibCommon_VerdictControl.ttcn:49(function:f_setVerdict) setverdict(pass): none -> pass
16:15:58.369130 mtc USER ../ttcn/ItsPki_TestCases.ttcn:317(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibCommon_Sync.ttcn:448(function:f_selfOrClientSyncAndVerdictTestBody)->../ttcn/LibCommon_Sync.ttcn:1154(function:f_selfSyncAndVerdictTestBody)->../ttcn/LibCommon_Sync.ttcn:1199(function:f_selfSync) **** f_selfSync: Successfully passed TEST BODY synchronization point. ****
16:15:58.369489 mtc PARALLEL ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:102(function:f_cfDown) Unmapping port mtc:pkiPort from system:pkiPort.
16:15:58.369980 mtc DEBUG ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:102(function:f_cfDown) >>> tcp_layer::Handle_Fd_Event: 6
16:15:58.370605 mtc DEBUG ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:102(function:f_cfDown) >>> tcp_layer::receive_message_on_fd: 6
16:15:58.371119 mtc DEBUG ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:102(function:f_cfDown) tcp_layer::receive_message_on_fd: Non secured mode
16:15:58.371819 mtc DEBUG ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:102(function:f_cfDown) >>> tcp_layer::peer_disconnected: 6
16:15:58.372555 mtc DEBUG ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:102(function:f_cfDown) >>> PkiPort::user_unmap: pkiPort
16:15:58.373013 mtc DEBUG ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:102(function:f_cfDown) >>> tcp_layer::~tcp_layer: -1
16:15:58.373566 mtc PORTEVENT ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:102(function:f_cfDown) Port pkiPort was unmapped from system:pkiPort.
16:15:58.374080 mtc PARALLEL ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:102(function:f_cfDown) Unmap operation of mtc:pkiPort from system:pkiPort finished.
16:15:58.375062 mtc PARALLEL ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:103(function:f_cfDown) Unmapping port mtc:acPkiPort from system:acPkiPort.
16:15:58.375703 mtc DEBUG ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:103(function:f_cfDown) >>> AdapterControlPkiPort::user_unmap: acPkiPort
16:15:58.376072 mtc PORTEVENT ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:103(function:f_cfDown) Port acPkiPort was unmapped from system:acPkiPort.
16:15:58.376501 mtc PARALLEL ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:103(function:f_cfDown) Unmap operation of mtc:acPkiPort from system:acPkiPort finished.
16:15:58.376899 mtc PARALLEL ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:104(function:f_cfDown)->../ttcn/LibCommon_Sync.ttcn:219(function:f_disconnect4SelfOrClientSync)->../ttcn/LibCommon_Sync.ttcn:1101(function:f_disconnect4SelfSync) Disconnecting ports mtc:syncSendPort and mtc:syncPort.
16:15:58.377364 mtc PORTEVENT ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:104(function:f_cfDown)->../ttcn/LibCommon_Sync.ttcn:219(function:f_disconnect4SelfOrClientSync)->../ttcn/LibCommon_Sync.ttcn:1101(function:f_disconnect4SelfSync) Port syncSendPort has terminated the connection with local port syncPort.
16:15:58.377886 mtc PORTEVENT ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:104(function:f_cfDown)->../ttcn/LibCommon_Sync.ttcn:219(function:f_disconnect4SelfOrClientSync)->../ttcn/LibCommon_Sync.ttcn:1101(function:f_disconnect4SelfSync) Port syncPort has terminated the connection with local port syncSendPort.
16:15:58.378360 mtc PARALLEL ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:104(function:f_cfDown)->../ttcn/LibCommon_Sync.ttcn:219(function:f_disconnect4SelfOrClientSync)->../ttcn/LibCommon_Sync.ttcn:1101(function:f_disconnect4SelfSync) Disconnect operation on mtc:syncSendPort and mtc:syncPort finished.
16:15:58.378918 mtc PARALLEL ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01) Terminating component type LibItsPki_TestSystem.ItsPki.
16:15:58.379346 mtc PORTEVENT ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01) Port syncPort was stopped.
16:15:58.379778 mtc PORTEVENT ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01) Port syncSendPort was stopped.
16:15:58.380096 mtc PORTEVENT ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01) Port acPkiPort was stopped.
16:15:58.380459 mtc DEBUG ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01) >>> PkiPort::user_stop
16:15:58.380751 mtc PORTEVENT ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01) Port pkiPort was stopped.
16:15:58.381124 mtc PARALLEL ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01) Component type LibItsPki_TestSystem.ItsPki was shut down inside testcase TC_SEC_PKI_SND_EA_BV_01.
16:15:58.381490 mtc EXECUTOR ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01) Waiting for PTCs to finish.
16:15:58.382108 mtc VERDICTOP ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01) Setting final verdict of the test case.
16:15:58.382395 mtc VERDICTOP ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01) Local verdict of MTC: pass
16:15:58.382771 mtc VERDICTOP ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01) No PTCs were created.
16:15:58.383126 mtc TESTCASE ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01) Test case TC_SEC_PKI_SND_EA_BV_01 finished. Verdict: pass
16:15:58.384208 mtc STATISTICS - Verdict statistics: 0 none (0.00 %), 1 pass (100.00 %), 0 inconc (0.00 %), 0 fail (0.00 %), 0 error (0.00 %).
16:15:58.384717 mtc STATISTICS - Test execution summary: 1 test case was executed. Overall verdict: pass
16:15:58.385075 mtc EXECUTOR - Exit was requested from MC. Terminating MTC.
16:15:58.386425 hc EXECUTOR - Exit was requested from MC. Terminating HC.
16:15:58.388313 hc EXECUTOR - Disconnected from MC.
16:15:58.388450 hc EXECUTOR - TTCN-3 Host Controller finished.