AtsPki_Idnomic.cfg_ 6.68 KB
Newer Older
[MODULE_PARAMETERS]
# This section shall contain the values of all parameters that are defined in your TTCN-3 modules.

# Enable Security support
LibItsGeoNetworking_Pics.PICS_GN_SECURITY := true
# Root path to access certificate stored in files, identified by certficate ID
LibItsSecurity_Pixits.PX_CERTIFICATE_POOL_PATH := "/home/vagrant/tmp"
# Configuration sub-directory to access certificate stored in files
LibItsSecurity_Pixits.PX_IUT_SEC_CONFIG_NAME := "asn1c_cert"

LibItsHttp_Pics.PICS_HEADER_CONTENT_TYPE  := "application/x-its-request"

LibItsPki_Pics.PICS_MULTIPLE_END_POINT := true
LibItsPki_Pics.PICS_HEADER_HOST_EC  := "ea.utopia.plugtests2019.innovation.keynectis.net"
LibItsPki_Pics.PICS_HEADER_HOST_ATV := "ea.utopia.plugtests2019.innovation.keynectis.net"
LibItsPki_Pics.PICS_HEADER_HOST_AT  := "aa.utopia.plugtests2019.innovation.keynectis.net"

Yann Garcia's avatar
Yann Garcia committed
LibItsPki_Pics.PICS_HTTP_POST_URI_EC                 := "/"
LibItsPki_Pics.PICS_HTTP_POST_URI_AT                 := "/"
LibItsPki_Pics.PICS_HTTP_POST_URI_ATV                := "/"
LibItsPki_Pics.PICS_ITS_S_SIGN_NITSP256_PRIVATE_KEY  := '5C25F97607DFC62972A147FAD8B7A7C939569F0F95ECD4C641724A68B51836E5'O
LibItsPki_Pics.PICS_ITS_S_SIGN_NISTP256_PUBLIC_KEY   := '020144E5174B0AFDA86BDB8B643B68D40030F5BDB9A9F090C64852CC3C20C9D5AD'O
LibItsPki_Pics.PICS_ITS_S_CANONICAL_ID               := '455453492D4954532D303031'O
LibItsPki_Pics.PICS_TS_EA_CERTIFICATE_ID             := "CERT_IDNOMIC_EA"
LibItsPki_Pics.PICS_TS_AA_CERTIFICATE_ID             := "CERT_IUT_A_AA" # "CERT_IUT_A_AA" is the wrong one, should be "CERT_TS_A_AA"?
LibItsPki_Pics.PICS_IUT_AA_CERTIFICATE_ID            := "CERT_IDNOMIC_AA"
LibItsPki_Pics.PICS_TS_CA_CERTIFICATE_ID             := "CERT_IDNOMIC_RCA"

#LibItsPki_Pics.PICS_PKI_AUTH_POP                     := false # Do not use Signed for PoP in Authorization requet
                                                               # Required for SECPKI_AA_AUTH_RCV_02_BV
#LibItsPki_Pics.PICS_SECPKI_REENROLMENT := false # Check in logs the pattern '==> EC ' to find the required information for re-enrolment
#LibItsPki_Pixits.PX_INCLUDE_ENCRYPTION_KEYS := false # No encryption key in Authorization request

#LibItsPki_Pixits.PX_VE_ALG        := e_nist_p256 # e_brainpool_p256_r1 or e_brainpool_p384_r1
#LibItsPki_Pixits.PX_EC_ALG_FOR_EC := e_nist_p256 # e_brainpool_p256_r1
#LibItsPki_Pixits.PX_EC_ALG_FOR_AT := e_nist_p256 # e_brainpool_p256_r1

#LibItsPki_Pixits.PX_EC_PRIVATE_KEY     := '170D1EA638C300BD16F0025768C0F1FAA6BE23963E46AD10F79103914265D294'O
#LibItsPki_Pixits.PX_EC_HASH            := 'DFEFC2A74C8ADD0C8B74B958EE072229D25DEAAAE30D134193D091890E8F3C2C'O
#LibItsPki_Pixits.PX_EC_HASHED_ID8      := '93D091890E8F3C2C'O

[LOGGING]
# In this section you can specify the name of the log file and the classes of events
# you want to log into the file or display on console (standard error).

LogFile := "../logs/%e.%h-%r.%s"
FileMask := LOG_ALL | USER | DEBUG | MATCHING
ConsoleMask := LOG_ALL | USER | DEBUG | MATCHING
#FileMask := ERROR | WARNING | USER | MATCHING | EXECUTOR_RUNTIME | VERDICTOP
#ConsoleMask := ERROR | WARNING | USER | MATCHING | EXECUTOR_RUNTIME | VERDICTOP
LogSourceInfo := Stack
LogEntityName:= Yes
LogEventTypes:= Yes
#TimeStampFormat := DateTime

[TESTPORT_PARAMETERS]
# Multiple HTTP component ports
system.httpEcPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TCP(server=ea.utopia.plugtests2019.innovation.keynectis.net)"
system.httpAtVPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TCP(server=ea.utopia.plugtests2019.innovation.keynectis.net)"
#system.httpAtVPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TCP(server=2.15.180.66,local_port=8080)" # Multiple HTTP component ports specific to TC_SECPKI_AA_AUTHVAL_xx
system.httpAtPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TCP(server=aa.utopia.plugtests2019.innovation.keynectis.net)"

[EXECUTE]
# The EnrolmentResponse message shall be sent by the EA to the ITS-S across the interface at reference point S3 in response to a received EnrolmentRequest message
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_01_BV
# Check that EA doesn't accept Enrolment rekeying request when enrolment is not permitted by signing certificate
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_02_BI
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_05_BI
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_06_BI
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_07_BI
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_08_BI
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_08_BI
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_09_BI
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_10_BI
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_11_BI
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_12_BI
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_13_BI

# The EnrolmentResponse message shall be encrypted using an ETSI TS 103 097 approved algorithm and the encryption shall be done with the same AES key as the one used by the ITS-S requestor for the encryption of the EnrolmentRequest message.
#ItsPki_TestCases.TC_SECPKI_EA_ENR_01_BV
#ItsPki_TestCases.TC_SECPKI_EA_ENR_02_BV
#ItsPki_TestCases.TC_SECPKI_EA_ENR_03_BV
#ItsPki_TestCases.TC_SECPKI_EA_ENR_04_BV
#ItsPki_TestCases.TC_SECPKI_EA_ENR_05_BV
#ItsPki_TestCases.TC_SECPKI_EA_ENR_06_BV
#ItsPki_TestCases.TC_SECPKI_EA_ENR_07_BV
#ItsPki_TestCases.TC_SECPKI_EA_ENR_08_BV
#ItsPki_TestCases.TC_SECPKI_EA_ENR_09_BV
#ItsPki_TestCases.TC_SECPKI_EA_ENR_10_BV
#ItsPki_TestCases.TC_SECPKI_EA_ENR_11_BV
#ItsPki_TestCases.TC_SECPKI_EA_ENR_12_BV
#ItsPki_TestCases.TC_SECPKI_EA_AUTHVAL_RCV_01_BV
#ItsPki_TestCases.TC_SECPKI_EA_AUTHVAL_RCV_02_BI

#
#ItsPki_TestCases.TC_SECPKI_EA_AUTHVAL_01_BV
#ItsPki_TestCases.TC_SECPKI_EA_AUTHVAL_02_BV
#ItsPki_TestCases.TC_SECPKI_EA_AUTHVAL_03_BV
#ItsPki_TestCases.TC_SECPKI_EA_AUTHVAL_04_BV
#ItsPki_TestCases.TC_SECPKI_EA_AUTHVAL_05_BV
#ItsPki_TestCases.TC_SECPKI_EA_AUTHVAL_06_BV
#ItsPki_TestCases.TC_SECPKI_EA_AUTHVAL_07_BV
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_01_BV
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_02_BV
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_03_BI
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_04_BI
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_05_BI
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_06_BI
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_07_BI
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_08_BI
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_09_BI
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_10_BI
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_11_BI
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_12_BI
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_13_BI
ItsPki_TestCases.TC_SECPKI_AA_AUTHVAL_01_BV

[MAIN_CONTROLLER]
# The options herein control the behavior of MC.
KillTimer := 10.0
LocalAddress := 127.0.0.1
TCPPort := 12000
NumHCs := 1