Newer
Older
21001
21002
21003
21004
21005
21006
21007
21008
21009
21010
21011
21012
21013
21014
21015
21016
21017
21018
21019
21020
21021
21022
21023
21024
21025
21026
21027
21028
21029
21030
21031
21032
21033
21034
21035
21036
21037
21038
21039
21040
21041
21042
21043
21044
21045
21046
21047
21048
21049
21050
21051
21052
21053
21054
21055
21056
21057
21058
21059
21060
21061
21062
21063
21064
21065
21066
21067
21068
21069
21070
21071
21072
21073
21074
21075
21076
21077
21078
21079
21080
21081
21082
21083
21084
21085
21086
21087
21088
21089
21090
21091
21092
21093
21094
21095
21096
21097
21098
21099
21100
21101
21102
21103
21104
21105
21106
21107
21108
21109
21110
21111
21112
21113
21114
21115
21116
21117
21118
21119
21120
21121
21122
21123
21124
21125
21126
21127
21128
21129
21130
21131
21132
21133
21134
21135
21136
21137
21138
21139
21140
21141
21142
21143
21144
21145
21146
21147
21148
21149
21150
21151
21152
21153
21154
21155
21156
21157
21158
21159
21160
21161
21162
21163
21164
21165
21166
21167
21168
21169
21170
21171
21172
21173
21174
21175
21176
21177
21178
21179
21180
21181
21182
21183
21184
21185
21186
21187
21188
21189
21190
21191
21192
21193
21194
21195
21196
21197
21198
21199
21200
21201
21202
21203
21204
21205
21206
21207
21208
21209
21210
21211
21212
21213
21214
21215
21216
21217
21218
21219
21220
21221
21222
21223
21224
21225
21226
21227
21228
21229
21230
21231
21232
21233
21234
21235
21236
21237
21238
21239
21240
21241
21242
21243
21244
21245
21246
21247
}
16:15:58.355825 mtc DEBUG ../ttcn/ItsPki_TestCases.ttcn:311(testcase:TC_SEC_PKI_SND_EA_BV_01) >>> PkiPort::receive_msg: {
requestHash := 'E7C4913219D64F5263EF695E9003DFFD'O,
responseCode := ok (0),
certificate := {
version := 3,
type_ := explicit (0),
issuer := {
sha256AndDigest := 'B410FF61F20015AD'O
},
toBeSigned := {
id := {
none_ := NULL
},
cracaId := '000000'O,
crlSeries := 0,
validityPeriod := {
start_ := 17469212,
duration := {
years := 10
}
},
region := {
identifiedRegion := {
{
countryOnly := 12
},
{
countryOnly := 34
}
}
},
assuranceLevel := omit,
appPermissions := {
{
psid := 36,
ssp := {
bitmapSsp := '830001'O
}
},
{
psid := 37,
ssp := {
bitmapSsp := '830001'O
}
}
},
certIssuePermissions := omit,
certRequestPermissions := omit,
canRequestRollover := omit,
encryptionKey := omit,
verifyKeyIndicator := {
verificationKey := {
ecdsaNistP256 := {
compressed_y_0 := '7029A9B20D22AE37B1344B7FCC2322C8F1E5ECE09C39CC289E500A9487298B9B'O
}
}
}
},
signature_ := {
ecdsaNistP256Signature := {
rSig := {
x_only := '79C4011314E53EE0893F40360851D50549E55B00668C56757E32ADF6CE5B7C75'O
},
sSig := '728CA50DFC72C2A23B20E9F9A6E85DF70E9DCB5FFB42D313289BE45956147E3A'O
}
}
}
}
16:15:58.361222 mtc PORTEVENT ../ttcn/ItsPki_TestCases.ttcn:311(testcase:TC_SEC_PKI_SND_EA_BV_01) Message enqueued on pkiPort from system @EtsiTs102941TypesEnrolment.InnerEcResponse : {
requestHash := 'E7C4913219D64F5263EF695E9003DFFD'O,
responseCode := ok (0),
certificate := {
version := 3,
type_ := explicit (0),
issuer := {
sha256AndDigest := 'B410FF61F20015AD'O
},
toBeSigned := {
id := {
none_ := NULL
},
cracaId := '000000'O,
crlSeries := 0,
validityPeriod := {
start_ := 17469212,
duration := {
years := 10
}
},
region := {
identifiedRegion := {
{
countryOnly := 12
},
{
countryOnly := 34
}
}
},
assuranceLevel := omit,
appPermissions := {
{
psid := 36,
ssp := {
bitmapSsp := '830001'O
}
},
{
psid := 37,
ssp := {
bitmapSsp := '830001'O
}
}
},
certIssuePermissions := omit,
certRequestPermissions := omit,
canRequestRollover := omit,
encryptionKey := omit,
verifyKeyIndicator := {
verificationKey := {
ecdsaNistP256 := {
compressed_y_0 := '7029A9B20D22AE37B1344B7FCC2322C8F1E5ECE09C39CC289E500A9487298B9B'O
}
}
}
},
signature_ := {
ecdsaNistP256Signature := {
rSig := {
x_only := '79C4011314E53EE0893F40360851D50549E55B00668C56757E32ADF6CE5B7C75'O
},
sSig := '728CA50DFC72C2A23B20E9F9A6E85DF70E9DCB5FFB42D313289BE45956147E3A'O
}
}
}
} id 1
16:15:58.362682 mtc EXECUTOR ../ttcn/ItsPki_TestCases.ttcn:311(testcase:TC_SEC_PKI_SND_EA_BV_01) tcp_layer::Handle_Fd_Event_Readable: Execution duration: 900.221008 ms
16:15:58.363266 mtc MATCHING ../ttcn/ItsPki_TestCases.ttcn:312(testcase:TC_SEC_PKI_SND_EA_BV_01) Matching on port pkiPort succeeded: matched
16:15:58.363927 mtc PORTEVENT ../ttcn/ItsPki_TestCases.ttcn:312(testcase:TC_SEC_PKI_SND_EA_BV_01) Receive operation on port pkiPort succeeded, message from system(): @EtsiTs102941TypesEnrolment.InnerEcResponse : {
requestHash := 'E7C4913219D64F5263EF695E9003DFFD'O,
responseCode := ok (0),
certificate := {
version := 3,
type_ := explicit (0),
issuer := {
sha256AndDigest := 'B410FF61F20015AD'O
},
toBeSigned := {
id := {
none_ := NULL
},
cracaId := '000000'O,
crlSeries := 0,
validityPeriod := {
start_ := 17469212,
duration := {
years := 10
}
},
region := {
identifiedRegion := {
{
countryOnly := 12
},
{
countryOnly := 34
}
}
},
assuranceLevel := omit,
appPermissions := {
{
psid := 36,
ssp := {
bitmapSsp := '830001'O
}
},
{
psid := 37,
ssp := {
bitmapSsp := '830001'O
}
}
},
certIssuePermissions := omit,
certRequestPermissions := omit,
canRequestRollover := omit,
encryptionKey := omit,
verifyKeyIndicator := {
verificationKey := {
ecdsaNistP256 := {
compressed_y_0 := '7029A9B20D22AE37B1344B7FCC2322C8F1E5ECE09C39CC289E500A9487298B9B'O
}
}
}
},
signature_ := {
ecdsaNistP256Signature := {
rSig := {
x_only := '79C4011314E53EE0893F40360851D50549E55B00668C56757E32ADF6CE5B7C75'O
},
sSig := '728CA50DFC72C2A23B20E9F9A6E85DF70E9DCB5FFB42D313289BE45956147E3A'O
}
}
}
} id 1
16:15:58.364883 mtc PORTEVENT ../ttcn/ItsPki_TestCases.ttcn:312(testcase:TC_SEC_PKI_SND_EA_BV_01) Message with id 1 was extracted from the queue of pkiPort.
16:15:58.366858 mtc TIMEROP ../ttcn/ItsPki_TestCases.ttcn:315(testcase:TC_SEC_PKI_SND_EA_BV_01) Stop timer tc_ac: 30 s
16:15:58.367725 mtc USER ../ttcn/ItsPki_TestCases.ttcn:316(testcase:TC_SEC_PKI_SND_EA_BV_01) *** TC_SEC_PKI_SND_EA_BV_01: PASS: InnerEcReponse received ***
16:15:58.368384 mtc VERDICTOP ../ttcn/ItsPki_TestCases.ttcn:317(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibCommon_Sync.ttcn:448(function:f_selfOrClientSyncAndVerdictTestBody)->../ttcn/LibCommon_Sync.ttcn:1153(function:f_selfSyncAndVerdictTestBody)->../ttcn/LibCommon_VerdictControl.ttcn:49(function:f_setVerdict) setverdict(pass): none -> pass
16:15:58.369130 mtc USER ../ttcn/ItsPki_TestCases.ttcn:317(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibCommon_Sync.ttcn:448(function:f_selfOrClientSyncAndVerdictTestBody)->../ttcn/LibCommon_Sync.ttcn:1154(function:f_selfSyncAndVerdictTestBody)->../ttcn/LibCommon_Sync.ttcn:1199(function:f_selfSync) **** f_selfSync: Successfully passed TEST BODY synchronization point. ****
16:15:58.369489 mtc PARALLEL ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:102(function:f_cfDown) Unmapping port mtc:pkiPort from system:pkiPort.
16:15:58.369980 mtc DEBUG ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:102(function:f_cfDown) >>> tcp_layer::Handle_Fd_Event: 6
16:15:58.370605 mtc DEBUG ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:102(function:f_cfDown) >>> tcp_layer::receive_message_on_fd: 6
16:15:58.371119 mtc DEBUG ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:102(function:f_cfDown) tcp_layer::receive_message_on_fd: Non secured mode
16:15:58.371819 mtc DEBUG ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:102(function:f_cfDown) >>> tcp_layer::peer_disconnected: 6
16:15:58.372555 mtc DEBUG ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:102(function:f_cfDown) >>> PkiPort::user_unmap: pkiPort
16:15:58.373013 mtc DEBUG ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:102(function:f_cfDown) >>> tcp_layer::~tcp_layer: -1
16:15:58.373566 mtc PORTEVENT ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:102(function:f_cfDown) Port pkiPort was unmapped from system:pkiPort.
16:15:58.374080 mtc PARALLEL ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:102(function:f_cfDown) Unmap operation of mtc:pkiPort from system:pkiPort finished.
16:15:58.375062 mtc PARALLEL ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:103(function:f_cfDown) Unmapping port mtc:acPkiPort from system:acPkiPort.
16:15:58.375703 mtc DEBUG ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:103(function:f_cfDown) >>> AdapterControlPkiPort::user_unmap: acPkiPort
16:15:58.376072 mtc PORTEVENT ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:103(function:f_cfDown) Port acPkiPort was unmapped from system:acPkiPort.
16:15:58.376501 mtc PARALLEL ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:103(function:f_cfDown) Unmap operation of mtc:acPkiPort from system:acPkiPort finished.
16:15:58.376899 mtc PARALLEL ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:104(function:f_cfDown)->../ttcn/LibCommon_Sync.ttcn:219(function:f_disconnect4SelfOrClientSync)->../ttcn/LibCommon_Sync.ttcn:1101(function:f_disconnect4SelfSync) Disconnecting ports mtc:syncSendPort and mtc:syncPort.
16:15:58.377364 mtc PORTEVENT ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:104(function:f_cfDown)->../ttcn/LibCommon_Sync.ttcn:219(function:f_disconnect4SelfOrClientSync)->../ttcn/LibCommon_Sync.ttcn:1101(function:f_disconnect4SelfSync) Port syncSendPort has terminated the connection with local port syncPort.
16:15:58.377886 mtc PORTEVENT ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:104(function:f_cfDown)->../ttcn/LibCommon_Sync.ttcn:219(function:f_disconnect4SelfOrClientSync)->../ttcn/LibCommon_Sync.ttcn:1101(function:f_disconnect4SelfSync) Port syncPort has terminated the connection with local port syncSendPort.
16:15:58.378360 mtc PARALLEL ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01)->../ttcn/LibItsPki_Functions.ttcn:104(function:f_cfDown)->../ttcn/LibCommon_Sync.ttcn:219(function:f_disconnect4SelfOrClientSync)->../ttcn/LibCommon_Sync.ttcn:1101(function:f_disconnect4SelfSync) Disconnect operation on mtc:syncSendPort and mtc:syncPort finished.
16:15:58.378918 mtc PARALLEL ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01) Terminating component type LibItsPki_TestSystem.ItsPki.
16:15:58.379346 mtc PORTEVENT ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01) Port syncPort was stopped.
16:15:58.379778 mtc PORTEVENT ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01) Port syncSendPort was stopped.
16:15:58.380096 mtc PORTEVENT ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01) Port acPkiPort was stopped.
16:15:58.380459 mtc DEBUG ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01) >>> PkiPort::user_stop
16:15:58.380751 mtc PORTEVENT ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01) Port pkiPort was stopped.
16:15:58.381124 mtc PARALLEL ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01) Component type LibItsPki_TestSystem.ItsPki was shut down inside testcase TC_SEC_PKI_SND_EA_BV_01.
16:15:58.381490 mtc EXECUTOR ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01) Waiting for PTCs to finish.
16:15:58.382108 mtc VERDICTOP ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01) Setting final verdict of the test case.
16:15:58.382395 mtc VERDICTOP ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01) Local verdict of MTC: pass
16:15:58.382771 mtc VERDICTOP ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01) No PTCs were created.
16:15:58.383126 mtc TESTCASE ../ttcn/ItsPki_TestCases.ttcn:331(testcase:TC_SEC_PKI_SND_EA_BV_01) Test case TC_SEC_PKI_SND_EA_BV_01 finished. Verdict: pass
16:15:58.384208 mtc STATISTICS - Verdict statistics: 0 none (0.00 %), 1 pass (100.00 %), 0 inconc (0.00 %), 0 fail (0.00 %), 0 error (0.00 %).
16:15:58.384717 mtc STATISTICS - Test execution summary: 1 test case was executed. Overall verdict: pass
16:15:58.385075 mtc EXECUTOR - Exit was requested from MC. Terminating MTC.
16:15:58.386425 hc EXECUTOR - Exit was requested from MC. Terminating HC.
16:15:58.388313 hc EXECUTOR - Disconnected from MC.
16:15:58.388450 hc EXECUTOR - TTCN-3 Host Controller finished.