Newer
Older
log("f_processDenm: DENM=", p_geoNetworkingPdu.gnPacket.packet.payload);
if (PICS_SEND_DENM_INDICATION) {
var UtDenmEventInd v_utDenmEventInd;
var integer v_result;
// Extract DENM message
var octetstring v_payload := p_geoNetworkingPdu.gnPacket.packet.payload;
// Remove BTP layer
v_payload := substr(v_payload, 4, lengthof(v_payload) - 4);
// Send UtDenmEventInd
log("f_processDenm: v_payload=", v_payload);
v_enc_msg := oct2bit(v_payload);
if (decvalue(v_enc_msg, v_utDenmEventInd.denMsg) == 0) {
cfPort.send(v_utDenmEventInd);
}
}
}
function f_processSrem(
in GeoNetworkingPdu p_geoNetworkingPdu
) runs on ItsRSUsSimulator {
if (ispresent(p_geoNetworkingPdu.gnPacket.packet.payload)) {
/* TODO Decode and process GnPayload or use different ports
if (ispresent(p_geoNetworkingPdu.gnPacket.packet.payload.decodedPayload.btpPacket.payload.decodedPayload)) {
if (ischosen(p_geoNetworkingPdu.gnPacket.packet.payload.decodedPayload.btpPacket.payload.decodedPayload.sremPacket)) {
var SignalRequestMessage v_signalRequestMessage := p_geoNetworkingPdu.gnPacket.packet.payload.decodedPayload.btpPacket.payload.decodedPayload.sremPacket.srm;
var template (value) GnRawPayload v_payload;
log(v_signalRequestMessage);
// Build response
// TODO v_ssem.ssm.status
v_payload := valueof(
f_adaptPayload(
bit2oct(
encvalue(
valueof(
m_ssem(
v_signalRequestMessage
)))),
PICS_SSEM_BTP_DESTINATION_PORT,
PICS_SSEM_BTP_SOURCE_PORT
)
);
// Send SSEM
f_send(v_payload, PICS_SSEM_ITS_AID);
} // else, ignore message
} // else, ignore message
} // End of function f_processSrem
function f_incLocalSeqNumber() runs on ItsRSUsSimulator return UInt16 {
vc_localSeqNumber := (vc_localSeqNumber + 1) mod 65536;
return vc_localSeqNumber;
}
function f_incMsgIssueRevision() runs on ItsRSUsSimulator return MsgCount {
vc_msgIssueRevision := (vc_msgIssueRevision + 1) mod 128; // See MsgCount declaration
return vc_msgIssueRevision;
}
function f_getMsgIssueRevision() runs on ItsRSUsSimulator return MsgCount {
return vc_msgIssueRevision;
}
function f_incDenmSequenceNumber() runs on ItsRSUsSimulator return SequenceNumber {
vc_sequenceNumber := (vc_sequenceNumber + 1) mod 65536; // See SequenceNumber declaration
return vc_sequenceNumber;
}
function f_getDenmSequenceNumber() runs on ItsRSUsSimulator return SequenceNumber {
in integer p_src_port
) return template (present) octetstring {
//log(">>> f_payload_template: ", p_dest_port, " - ", p_src_port);
var template (value) Oct2 v_t1 := int2oct(p_dest_port, 2);
var template (value) Oct2 v_t2 := int2oct(p_src_port, 2);
var template (present) octetstring v_t3 := ? /*? length (5 .. 65535)*/;
var template (present) octetstring v_out := valueof(v_t1) & valueof(v_t2) & v_t3;
//log("<<< f_payload_template: v_out=", v_out);
return v_out
altstep a_process_cf_ut_command() runs on ItsRSUsSimulator {
var UtCamInitialize v_utCamInitialize;
var UtDenmInitialize v_utDenmInitialize;
var UtIvimInitialize v_utIvimInitialize;
var UtMapemSpatemInitialize v_utMapemSpatemInitialize;
var UtSremInitialize v_utSremInitialize;
var UtRtcmemInitialize v_utRtcmemInitialize;
var UtPkiInitialize v_utPkiInitialize;
var UtDenmTrigger v_utDenmTrigger;
var UtDenmUpdate v_utDenmUpdate;
var UtDenmTermination v_utDenmTermination;
var UtRtcmemTrigger v_utRtcmemTrigger;
var UtRtcmemUpdate v_utRtcmemUpdate;
var UtRtcmemTermination v_utRtcmemTermination;
var UtPkiTrigger v_utPkiTrigger;
[] cfPort.receive(UtGnInitialize:?) -> value v_utGnInitialize {
log("a_process_cf_ut_command: v_utGnInitialize = ", v_utGnInitialize);
v_geoNwPdu :=valueof(
m_geoNwPdu(
m_geoNwBeaconPacket(
vc_longPosVectorRsu
),
m_defaultLifetime,
1
)
);
v_geoNwPdu.gnPacket.packet.commonHeader.flags := f_isMobile();
vc_rsuMessagesValueList[vc_rsu_id].beacon := v_geoNwPdu;
cfPort.send(UtGnResults: { utGnInitializeResult := true } );
repeat;
}
log("a_process_cf_ut_command: v_utGnTrigger = ", v_utGnTrigger);
if (ischosen(v_utGnTrigger.geoUnicast)) {
var GnNonSecuredPacket v_geoNwUnicastPacket := valueof(
m_geoNwUnicastPacket_with_payload(
vc_longPosVectorRsu,
f_getIutShortPosVector(),
f_incLocalSeqNumber(),
c_defaultHopLimit,
v_utGnTrigger.geoUnicast.trafficClass,
v_utGnTrigger.geoUnicast.payload
var GeoNetworkingPdu v_geoNwPdu := valueof(
m_geoNwPdu(
v_geoNwUnicastPacket,
m_lifetimeBase1s(v_utGnTrigger.geoUnicast.lifetime / 1000),
v_geoNwPdu.gnPacket.packet.commonHeader.nextHeader := e_any;
v_geoNwPdu.gnPacket.packet.commonHeader.flags := f_isMobile();
v_geoNwPdu.gnPacket.packet.extendedHeader.geoUnicastHeader.dstPosVector.gnAddr := v_utGnTrigger.geoUnicast.gnAddress;
vc_rsuMessagesValueList[vc_rsu_id].beacon := v_geoNwPdu;
cfPort.send(UtGnResults: { utGnTriggerResult := true } );
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
} else if (ischosen(v_utGnTrigger.geoBroadcast)) {
var GeoBroadcastArea v_broadcastArea;
var GnNonSecuredPacket v_geoNwBroadcastPacket;
var GeoNetworkingPdu v_geoNwPdu;
if (v_utGnTrigger.geoBroadcast.shape == e_geoCircle) {
v_broadcastArea.geoBroadcastSubType := e_geoBroadcastCircle;
} else if (v_utGnTrigger.geoBroadcast.shape == e_geoRect) {
v_broadcastArea.geoBroadcastSubType := e_geoBroadcastRect;
} else if (v_utGnTrigger.geoBroadcast.shape == e_geoElip) {
v_broadcastArea.geoBroadcastSubType := e_geoBroadcastElip;
} else {
v_broadcastArea.geoBroadcastSubType := e_reserved;
}
v_broadcastArea.geoBroadcastArea := v_utGnTrigger.geoBroadcast.area;
v_geoNwBroadcastPacket := valueof(
m_geoNwBroadcastPacket_payload(
vc_longPosVectorRsu,
f_incLocalSeqNumber(),
v_broadcastArea,
c_defaultHopLimit,
v_utGnTrigger.geoBroadcast.trafficClass,
v_utGnTrigger.geoBroadcast.payload
));
v_geoNwBroadcastPacket.commonHeader.flags := f_isMobile();
v_geoNwPdu := valueof(
m_geoNwPdu(
v_geoNwBroadcastPacket,
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
m_lifetimeBase1s(v_utGnTrigger.geoBroadcast.lifetime / 1000),
c_defaultHopLimit
));
v_geoNwPdu.gnPacket.packet.commonHeader.nextHeader := e_any;
v_geoNwPdu.gnPacket.packet.commonHeader.flags := f_isMobile();
vc_rsuMessagesValueList[vc_rsu_id].beacon := v_geoNwPdu;
cfPort.send(UtGnResults: { utGnTriggerResult := true } );
} else if (ischosen(v_utGnTrigger.geoAnycast)) {
var GeoAnycastArea v_anycastArea;
var GnNonSecuredPacket v_geoNwAnycastPacket;
var GeoNetworkingPdu v_geoNwPdu;
if (v_utGnTrigger.geoAnycast.shape == e_geoCircle) {
v_anycastArea.geoAnycastSubType := e_geoAnycastCircle;
} else if (v_utGnTrigger.geoAnycast.shape == e_geoRect) {
v_anycastArea.geoAnycastSubType := e_geoAnycastRect;
} else if (v_utGnTrigger.geoAnycast.shape == e_geoElip) {
v_anycastArea.geoAnycastSubType := e_geoAnycastElip;
} else {
v_anycastArea.geoAnycastSubType := e_reserved;
}
v_anycastArea.geoAnycastArea := v_utGnTrigger.geoAnycast.area;
v_geoNwAnycastPacket := valueof(
m_geoNwAnycastPacket_payload(
vc_longPosVectorRsu,
f_incLocalSeqNumber(),
v_anycastArea,
c_defaultHopLimit,
v_utGnTrigger.geoAnycast.trafficClass,
v_utGnTrigger.geoAnycast.payload
));
v_geoNwPdu := valueof(
m_geoNwPdu(
v_geoNwAnycastPacket,
m_lifetimeBase1s(v_utGnTrigger.geoAnycast.lifetime / 1000),
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
v_geoNwPdu.gnPacket.packet.commonHeader.flags := f_isMobile();
v_geoNwPdu.gnPacket.packet.commonHeader.nextHeader := e_any;
vc_rsuMessagesValueList[vc_rsu_id].beacon := v_geoNwPdu;
cfPort.send(UtGnResults: { utGnTriggerResult := true } );
} else if (ischosen(v_utGnTrigger.shb)) {
var GnNonSecuredPacket v_geoShbPacket;
var GeoNetworkingPdu v_geoNwPdu;
v_geoShbPacket := valueof(
m_geoNwShbPacket_payload(
vc_longPosVectorRsu,
v_utGnTrigger.shb.payload
));
v_geoShbPacket.commonHeader.maxHopLimit := 1;
v_geoShbPacket.commonHeader.trafficClass.scf := v_utGnTrigger.shb.trafficClass.scf;
v_geoShbPacket.commonHeader.trafficClass.channelOffload := v_utGnTrigger.shb.trafficClass.channelOffload;
v_geoShbPacket.commonHeader.trafficClass.tcId := v_utGnTrigger.shb.trafficClass.tcId;
v_geoNwPdu := valueof(
m_geoNwPdu(
v_geoShbPacket,
m_defaultLifetime,
1
));
v_geoNwPdu.gnPacket.packet.commonHeader.flags := f_isMobile();
v_geoNwPdu.gnPacket.packet.commonHeader.nextHeader := e_any;
vc_rsuMessagesValueList[vc_rsu_id].beacon := v_geoNwPdu;
cfPort.send(UtGnResults: { utGnTriggerResult := true } );
} else if (ischosen(v_utGnTrigger.tsb)) {
var GnNonSecuredPacket v_geoTsbPacket;
var GeoNetworkingPdu v_geoNwPdu;
v_geoTsbPacket := valueof(
m_geoNwTsbPacket_payload(
f_incLocalSeqNumber(),
vc_longPosVectorRsu,
-,
-,
v_utGnTrigger.tsb.payload
));
v_geoTsbPacket.commonHeader.trafficClass.scf := v_utGnTrigger.tsb.trafficClass.scf;
v_geoTsbPacket.commonHeader.trafficClass.channelOffload := v_utGnTrigger.tsb.trafficClass.channelOffload;
v_geoTsbPacket.commonHeader.trafficClass.tcId := v_utGnTrigger.tsb.trafficClass.tcId;
v_geoNwPdu := valueof(
m_geoNwPdu(
v_geoTsbPacket,
m_defaultLifetime,
c_defaultHopLimit
));
v_geoNwPdu.gnPacket.packet.commonHeader.nextHeader := e_any;
v_geoNwPdu.gnPacket.packet.commonHeader.flags := f_isMobile();
vc_rsuMessagesValueList[vc_rsu_id].beacon := v_geoNwPdu;
cfPort.send(UtGnResults: { utGnTriggerResult := true } );
} else {
cfPort.send(UtGnResults: { utGnTriggerResult := false } );
[vc_cam == true] cfPort.receive(UtCamInitialize:?) -> value v_utCamInitialize {
log("a_process_cf_ut_command: v_utCamInitialize = ", v_utCamInitialize);
if (oct2int(v_utCamInitialize.hashedId8) != 0) {
var charstring v_certificate_id;
var EtsiTs103097Certificate v_certificate;
log("a_process_cf_ut_command: Looking for certificate ", v_utCamInitialize.hashedId8);
f_getCertificateFromDigest(v_utCamInitialize.hashedId8, v_certificate, v_certificate_id);
log("a_process_cf_ut_command (pki): Change certificate to ", v_certificate_id);
f_acTriggerSecEvent(m_acEnableSecurity(v_certificate_id));
}
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency.curvature.curvatureValue := 0;
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency.heading.headingValue := 0;
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.lowFrequencyContainer.basicVehicleContainerLowFrequency.vehicleRole := default_;
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.specialVehicleContainer := omit;
cfPort.send(UtCamResults: { utCamInitializeResult := true } );
repeat;
[vc_cam == true] cfPort.receive(UtCamTrigger: { changeSpeed := ? }) -> value v_utCamTrigger {
log("a_process_cf_ut_command: v_utCamTrigger = ", v_utCamTrigger);
cfPort.send(UtCamResults: { utCamTriggerResult := true } );
vc_cam_timer_value := vc_cam_timer_value / 2.0;
repeat;
}
[vc_cam == true] cfPort.receive(UtCamTrigger: { changeCurvature := ? }) -> value v_utCamTrigger {
log("a_process_cf_ut_command: v_utCamTrigger = ", v_utCamTrigger);
if (ischosen(vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency)) {
cfPort.send(UtCamResults: { utCamTriggerResult := true } );
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency.curvature.curvatureValue := v_utCamTrigger.changeCurvature;
} else {
cfPort.send(UtCamResults: { utCamTriggerResult := false } );
}
[vc_cam == true] cfPort.receive(UtCamTrigger: { changeHeading := ? }) -> value v_utCamTrigger {
log("a_process_cf_ut_command: v_utCamTrigger = ", v_utCamTrigger);
if (ischosen(vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency)) {
cfPort.send(UtCamResults: { utCamTriggerResult := true } );
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency.heading.headingValue := valueof(vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.highFrequencyContainer.basicVehicleContainerHighFrequency.heading.headingValue) + v_utCamTrigger.changeHeading;
} else {
cfPort.send(UtCamResults: { utCamTriggerResult := false } );
}
repeat;
}
[vc_cam == true] cfPort.receive(UtCamTrigger: { setVehicleRole := ? }) -> value v_utCamTrigger {
log("a_process_cf_ut_command: v_utCamTrigger = ", v_utCamTrigger);
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.lowFrequencyContainer.basicVehicleContainerLowFrequency.vehicleRole := v_utCamTrigger.setVehicleRole;
vc_rsuMessagesValueList[vc_rsu_id].cam.cam.camParameters.specialVehicleContainer := { publicTransportContainer := { embarkationStatus := true, ptActivation := omit } };
cfPort.send(UtCamResults: { utCamTriggerResult := true } );
repeat;
}
[] cfPort.receive(UtDenmInitialize:?) -> value v_utDenmInitialize {
log("a_process_cf_ut_command: v_utDenmInitialize = ", v_utDenmInitialize);
vc_rsuMessagesValueList[vc_rsu_id].denms := {};
vc_denmEventCounter := 0;
vc_denm := true;
cfPort.send(UtDenmResults: { utDenmInitializeResult := true } );
repeat;
[vc_denm == true] cfPort.receive(UtDenmTrigger:?) -> value v_utDenmTrigger {
var template (value) DenmParmContainers v_denmParmContainers;
var DenmEventsParmsPerZone v_denmEventsParmsPerZone := PICS_DENM_EVENTS_RSU_UC1[vc_rsu_id][PX_ETSI_ZONE_ID - 1];
var integer seq_number := f_incDenmSequenceNumber();
log("a_process_cf_ut_command: v_utDenmTrigger: ", v_utDenmTrigger);
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
v_denmParmContainers := m_denmParmContainers(
PICS_RSU_PARAMS[vc_rsu_id].stationID,
seq_number,
v_utDenmTrigger.repetitionInterval,
v_denmEventsParmsPerZone[0].eventPosition,
v_utDenmTrigger.situation.eventType.causeCode,
v_denmEventsParmsPerZone[0].eventHistory,
v_denmEventsParmsPerZone[0].traces,
v_utDenmTrigger.validityDuration,
v_utDenmTrigger.relevanceDistance,
v_utDenmTrigger.relevanceTrafficDirection
);
v_denmParmContainers.managementContainer.detectionTime := v_utDenmTrigger.detectionTime;
vc_rsuMessagesValueList[vc_rsu_id].denms[lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms)] := valueof(
m_denmPdu_rsu(
PICS_RSU_PARAMS[vc_rsu_id].stationID,
m_denm(
v_denmParmContainers.managementContainer,
v_denmParmContainers.situationContainer,
v_denmParmContainers.locationContainer
)));
log("a_process_cf_ut_command: utDenmTrigger: denm=[" & int2char(lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) - 1) & "]=", vc_rsuMessagesValueList[vc_rsu_id].denms[lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) - 1]);
//denm={ { header := { protocolVersion := 2, messageID := 1, stationID := 1111101 }, denm := { management := { actionID := { originatingStationID := 1111101, sequenceNumber := 1 }, detectionTime := 510819417810, referenceTime := 510819420809, termination := omit, eventPosition := { latitude := 367467556, longitude := -45552381, positionConfidenceEllipse := { semiMajorConfidence := 100, semiMinorConfidence := 100, semiMajorOrientation := 0 }, altitude := { altitudeValue := 0, altitudeConfidence := alt_000_01 (0) } }, relevanceDistance := lessThan50m (0), relevanceTrafficDirection := upstreamTraffic (1), validityDuration := 2, transmissionInterval := omit, stationType := 15 }, situation := { informationQuality := 0, eventType := { causeCode := 91, subCauseCode := 0 }, linkedCause := omit, eventHistory := { { eventPosition := { deltaLatitude := 135, deltaLongitude := -147, deltaAltitude := 0 }, eventDeltaTime := omit, informationQuality := 0 }, { eventPosition := { deltaLatitude := -68, deltaLongitude := 74, deltaAltitude := 0 }, eventDeltaTime := omit, informationQuality := 0 } } }, location := { eventSpeed := omit, eventPositionHeading := omit, traces := { { { pathPosition := { deltaLatitude := -1086, deltaLongitude := 2551, deltaAltitude := 0 }, pathDeltaTime := omit }, { pathPosition := { deltaLatitude := -450, deltaLongitude := 1010, deltaAltitude := 0 }, pathDeltaTime := omit }, { pathPosition := { deltaLatitude := -460, deltaLongitude := 1000, deltaAltitude := 0 }, pathDeltaTime := omit }, { pathPosition := { deltaLatitude := -440, deltaLongitude := 1000, deltaAltitude := 0 }, pathDeltaTime := omit }, { pathPosition := { deltaLatitude := -440, deltaLongitude := 990, deltaAltitude := 0 }, pathDeltaTime := omit } } }, roadType := omit }, alacarte := omit } } }
if (lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) == 1) {
tc_denm.start;
}
cfPort.send(UtDenmResults: { utDenmTriggerResult := { result := true, actionId := vc_rsuMessagesValueList[vc_rsu_id].denms[lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) - 1].denm.management.actionID } } );
repeat;
}
[vc_denm == true] cfPort.receive(UtDenmUpdate:?) -> value v_utDenmUpdate {
var integer v_i := 0;
var boolean v_found := false;
log("a_process_cf_ut_command: v_utDenmUpdate = ", v_utDenmUpdate);
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
for (v_i := 0; v_i < lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms); v_i := v_i + 1) {
if (v_utDenmUpdate.actionId.sequenceNumber == valueof(vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.actionID.sequenceNumber)) {
v_found := true;
break;
}
} // End of 'for' statement
if (v_found == true) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.detectionTime := v_utDenmUpdate.detectionTime;
if (ispresent(v_utDenmUpdate.validityDuration)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.validityDuration := v_utDenmUpdate.validityDuration;
}
if (ispresent(v_utDenmUpdate.situation)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.situation := v_utDenmUpdate.situation;
}
if (ispresent(v_utDenmUpdate.relevanceDistance)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.relevanceDistance := v_utDenmUpdate.relevanceDistance;
}
if (ispresent(v_utDenmUpdate.relevanceTrafficDirection)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.relevanceTrafficDirection := v_utDenmUpdate.relevanceTrafficDirection;
}
if (ispresent(v_utDenmUpdate.transmissionInterval)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.transmissionInterval := v_utDenmUpdate.transmissionInterval;
}
if (ispresent(v_utDenmUpdate.transmissionInterval)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.transmissionInterval := v_utDenmUpdate.transmissionInterval;
}
if (ispresent(v_utDenmUpdate.alacarte)) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.alacarte := v_utDenmUpdate.alacarte;
}
}
cfPort.send(UtDenmResults: { utDenmUpdateResult := { result := true, actionId := vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.actionID } } );
repeat;
}
[vc_denm == true] cfPort.receive(UtDenmTermination:?) -> value v_utDenmTermination {
var integer v_i := 0;
var boolean v_found := false;
log("a_process_cf_ut_command: v_utDenmTermination: ", v_utDenmTermination);
for (v_i := 0; v_i < lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms); v_i := v_i + 1) {
if (v_utDenmTermination.actionId.sequenceNumber == valueof(vc_rsuMessagesValueList[vc_rsu_id].denms[v_i].denm.management.actionID.sequenceNumber)) {
v_found := true;
break;
}
} // End of 'for' statement
if (v_found == true) {
log("a_process_cf_ut_command: v_utDenmTermination: v_i=", v_i);
log("a_process_cf_ut_command: v_utDenmTermination: l=", lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms));
if (lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) > 1) { //Shift elements
for (var integer v_j := v_i + 1; v_i < lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms); v_i := v_i + 1) {
vc_rsuMessagesValueList[vc_rsu_id].denms[v_i] := vc_rsuMessagesValueList[vc_rsu_id].denms[v_j];
v_j := v_j + 1;
} // End of 'for' statement
vc_rsuMessagesValueList[vc_rsu_id].denms[lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) - 1] := {}
} else {
vc_rsuMessagesValueList[vc_rsu_id].denms := {};
vc_denmEventCounter := 0;
}
log("v_utDenmTermination: New l=", lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms));
if (lengthof(vc_rsuMessagesValueList[vc_rsu_id].denms) == 0) {
tc_denm.stop;
f_sleep(1.0);
vc_denm := false;
}
cfPort.send(UtDenmResults: { utDenmTerminationResult := true } );
}
repeat;
}
[vc_ivim == true] cfPort.receive(UtIvimInitialize:?) -> value v_utIvimInitialize {
log("a_process_cf_ut_command: v_utIvimInitialize = ", v_utIvimInitialize);
if (oct2int(v_utIvimInitialize.hashedId8) != 0) {
var charstring v_certificate_id;
var EtsiTs103097Certificate v_certificate;
log("a_process_cf_ut_command: Looking for certificate ", v_utCamInitialize.hashedId8);
f_getCertificateFromDigest(v_utCamInitialize.hashedId8, v_certificate, v_certificate_id);
log("a_process_cf_ut_command (pki): Change certificate to ", v_certificate_id);
f_acTriggerSecEvent(m_acEnableSecurity(v_certificate_id));
}
//vc_rsuMessagesValueList[vc_rsu_id].ivim.ivi.mandatory.;
cfPort.send(UtIvimResults: { utIvimInitializeResult := true } );
repeat;
}
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
[vc_rtcmem == true] cfPort.receive(UtRtcmemInitialize:?) -> value v_utRtcmemInitialize {
log("a_process_cf_ut_command: v_utRtcmemInitialize = ", v_utRtcmemInitialize);
if (oct2int(v_utRtcmemInitialize.hashedId8) != 0) {
var charstring v_certificate_id;
var EtsiTs103097Certificate v_certificate;
log("a_process_cf_ut_command: Looking for certificate ", v_utCamInitialize.hashedId8);
f_getCertificateFromDigest(v_utCamInitialize.hashedId8, v_certificate, v_certificate_id);
log("a_process_cf_ut_command (pki): Change certificate to ", v_certificate_id);
f_acTriggerSecEvent(m_acEnableSecurity(v_certificate_id));
}
//vc_rsuMessagesValueList[vc_rsu_id].rtcmem.gdd.;
cfPort.send(UtRtcmemResults: { utRtcmemInitializeResult := true } );
repeat;
}
[vc_rtcmem == true] cfPort.receive(UtRtcmemTrigger:?) -> value v_utRtcmemTrigger {
log("a_process_cf_ut_command: v_utRtcmemTrigger: ", v_utRtcmemTrigger);
cfPort.send(UtRtcmemResults: { utRtcmemTriggerResult := true } );
repeat;
}
[vc_rtcmem == true] cfPort.receive(UtRtcmemUpdate:?) -> value v_utRtcmemUpdate {
cfPort.send(UtRtcmemResults: { utRtcmemUpdateResult := true } );
repeat;
}
[vc_rtcmem == true] cfPort.receive(UtRtcmemTermination:?) -> value v_utRtcmemTermination {
log("a_process_cf_ut_command: v_utRtcmemTermination: ", v_utRtcmemTermination);
cfPort.send(UtRtcmemResults: { utRtcmemTerminationResult := true } );
repeat;
}
[vc_pki == true] cfPort.receive(UtPkiInitialize:?) -> value v_utPkiInitialize {
log("a_process_cf_ut_command: v_utPkiInitialize = ", v_utPkiInitialize);
if (oct2int(v_utPkiInitialize.hashedId8) != 0) {
var charstring v_certificate_id;
var EtsiTs103097Certificate v_certificate;
log("a_process_cf_ut_command: Looking for certificate ", v_utPkiInitialize.hashedId8);
f_getCertificateFromDigest(v_utPkiInitialize.hashedId8, v_certificate, v_certificate_id);
log("a_process_cf_ut_command (pki): Change certificate to ", v_certificate_id);
f_acTriggerSecEvent(m_acEnableSecurity(v_certificate_id));
vc_security_state := 0; // 0: initial
vc_reenrolment := false;
vc_ec_counter := 0;
vc_ec_certificates := {};
vc_at_counter := 0;
vc_at_certificates := {};
tc_cam.stop;
cfPort.send(UtPkiResults: { utPkiInitializeResult := true } );
repeat;
}
[vc_pki == true] cfPort.receive(UtPkiTrigger: { triggerEnrolmentRequest := ? }) -> value v_utPkiTrigger {
var ItsPkiHttpRsuSimulator v_pki;
var EcData v_ec_data;
log("a_process_cf_ut_command: v_utPkiTrigger=", v_utPkiTrigger);
cfPort.send(UtPkiResults: { utPkiTriggerResult := true } );
v_pki := ItsPkiHttpRsuSimulator.create("TriggeredEc") alive;
connect(v_pki:resultPort, self:resultPort);
v_pki.start(f_trigger_enrolment_request_await_response());
tc_wait.start;
alt {
[] resultPort.receive(EcData:?) -> value v_ec_data {
tc_wait.stop;
vc_ec_certificates[vc_ec_counter] := v_ec_data;
vc_ec_counter := vc_ec_counter + 1;
vc_reenrolment := true;
vc_security_state := 1; // 1:enrolled
}
[] tc_wait.timeout {
log("a_process_cf_ut_command: Failed to retrieve EcData");
vc_reenrolment := false;
vc_security_state := 0; // 0: initial
}
} // End of 'alt' statement
disconnect(v_pki:resultPort, self:resultPort);
v_pki.done;
v_pki.kill;
repeat;
}
[vc_pki == true] cfPort.receive(UtPkiTrigger: { triggerAuthorizationRequest := ? }) -> value v_utPkiTrigger {
var ItsPkiHttpRsuSimulator v_pki;
var AtData v_at_data;
cfPort.send(UtPkiResults: { utPkiTriggerResult := true } );
v_pki := ItsPkiHttpRsuSimulator.create("TriggeredAt") alive;
connect(v_pki:resultPort, self:resultPort);
v_pki.start(f_trigger_authorization_request_await_response(
vc_ec_counter,
tc_wait.start;
alt {
[] resultPort.receive(AtData:?) -> value v_at_data {
tc_wait.stop;
vc_at_certificates[vc_at_counter] := v_at_data;
vc_at_counter := vc_at_counter + 1;
vc_security_state := 2; // 2: authorization
}
[] tc_wait.timeout {
log("a_process_cf_ut_command: Failed to retrieve AtData");
vc_security_state := 1; // 1: enrolled
}
} // End of 'alt' statement
disconnect(v_pki:resultPort, self:resultPort);
v_pki.done;
v_pki.kill;
if (vc_security_state == 2) {
var octetstring v_cert := bit2oct(encvalue(vc_at_certificates[0].certificate));
var Oct32 v_wholeHash := f_hashWithSha256(v_cert);
var HashedId8 v_hashedId8_sha256 := f_hashedId8FromSha256(v_wholeHash);
var charstring v_cert_id;
var HashedId8 v_hashedId8;
var HashedId8 v_issuer;
var octetstring v_public_key_x := ''O;
var octetstring v_public_key_y := ''O;
var octetstring v_public_key_compressed;
var integer v_verify_compressed_mode;
var template (omit) octetstring v_public_enc_key_x := omit;
var template (omit) octetstring v_public_enc_key_y := omit;
var template (omit) octetstring v_public_enc_compressed_key := omit;
var template (omit) integer v_public_enc_key_compressed_mode := omit;
log("a_process_cf_ut_command: triggerAuthorizationRequest: vc_at_counter=", vc_at_counter);
log("a_process_cf_ut_command: triggerAuthorizationRequest: vc_at_certificates=", vc_at_certificates);
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
// Prepare to store the new certificate
if (ischosen(vc_at_certificates[0].certificate.issuer.sha256AndDigest)) {
v_hashedId8 := v_hashedId8_sha256;
v_issuer := vc_at_certificates[0].certificate.issuer.sha256AndDigest;
} else if (ischosen(vc_at_certificates[0].certificate.issuer.sha384AndDigest)) {
v_hashedId8 := f_hashedId8FromSha384(f_hashWithSha384(v_cert));
v_issuer := vc_at_certificates[0].certificate.issuer.sha384AndDigest;
} else {
log("a_process_cf_ut_command: Wrong certificate format, self_ not expected as issuer, back to initial");
vc_security_state := 0; // 0: initial
vc_reenrolment := false;
vc_ec_counter := 0;
vc_ec_certificates := {};
vc_at_counter := 0;
vc_at_certificates := {};
repeat;
}
v_cert_id := hex2str(oct2hex(v_hashedId8));
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_cert_id =", v_cert_id);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_cert =", v_cert);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_wholeHash =", v_wholeHash);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_hashedId8_sha256 =", v_hashedId8_sha256);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_hashedId8 =", v_hashedId8);
// Extract verification keys
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256)) {
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_0)) {
v_public_key_compressed := vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_0;
v_verify_compressed_mode := 0;
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_1)) {
v_public_key_compressed := vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaNistP256.compressed_y_1;
v_verify_compressed_mode := 1;
} else { // TODO
}
if (lengthof(v_public_key_x) == 0) {
v_public_key_x := v_public_key_compressed; // Key X-Coordinate
fx_get_uncompressed_key_nistp256(vc_at_certificates[0].private_key, v_public_key_compressed, v_verify_compressed_mode, v_public_key_y); // Key Y-Coordinate
}
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1)) {
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_0)) {
v_public_key_compressed := vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_0;
v_verify_compressed_mode := 0;
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_1)) {
v_public_key_compressed := vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP256r1.compressed_y_1;
v_verify_compressed_mode := 1;
} else { // TODO
}
if (lengthof(v_public_key_x) == 0) {
v_public_key_x := v_public_key_compressed; // Key X-Coordinate
fx_get_uncompressed_key_brainpoolp256r1(vc_at_certificates[0].private_key, v_public_key_compressed, v_verify_compressed_mode, v_public_key_y); // Key Y-Coordinate
}
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP384r1)) {
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP384r1.compressed_y_0)) {
v_public_key_compressed := vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP384r1.compressed_y_0;
v_verify_compressed_mode := 0;
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP384r1.compressed_y_1)) {
v_public_key_compressed := vc_at_certificates[0].certificate.toBeSigned.verifyKeyIndicator.verificationKey.ecdsaBrainpoolP384r1.compressed_y_1;
v_verify_compressed_mode := 1;
} else { // TODO
}
if (lengthof(v_public_key_x) == 0) {
v_public_key_x := v_public_key_compressed; // Key X-Coordinate
fx_get_uncompressed_key_brainpoolp384r1(vc_at_certificates[0].private_key, v_public_key_compressed, v_verify_compressed_mode, v_public_key_y); // Key Y-Coordinate
}
} else {
log("a_process_cf_ut_command: Wrong certificate format, invalid verification key, back to initial");
vc_security_state := 0; // 0: initial
vc_reenrolment := false;
vc_ec_counter := 0;
vc_ec_certificates := {};
vc_at_counter := 0;
vc_at_certificates := {};
repeat;
}
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_key_x =", v_public_key_x);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_key_y =", v_public_key_y);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_key_compressed =", v_public_key_compressed);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_verify_compressed_mode=", v_verify_compressed_mode);
// Extract encryption key
if (ispresent(vc_at_certificates[0].certificate.toBeSigned.encryptionKey)) {
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesNistP256)) {
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesNistP256.compressed_y_0)) {
v_public_enc_compressed_key := vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesNistP256.compressed_y_0;
v_public_enc_key_compressed_mode := 0;
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesNistP256.compressed_y_1)) {
v_public_enc_compressed_key := vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesNistP256.compressed_y_1;
v_public_enc_key_compressed_mode := 1;
} else { // TODO
}
if (not(ispresent(v_public_enc_key_x))) {
var octetstring v_key;
v_public_enc_key_x := v_public_enc_compressed_key; // Key X-Coordinate
fx_get_uncompressed_key_nistp256(vc_at_certificates[0].private_enc_key, valueof(v_public_enc_compressed_key), valueof(v_public_enc_key_compressed_mode), v_key); // Key Y-Coordinate
v_public_enc_key_y := v_key;
}
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesBrainpoolP256r1)) {
if (ischosen(vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesBrainpoolP256r1.compressed_y_0)) {
v_public_enc_compressed_key := vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesBrainpoolP256r1.compressed_y_0;
v_public_enc_key_compressed_mode := 0;
} else if (ischosen(vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesBrainpoolP256r1.compressed_y_1)) {
v_public_enc_compressed_key := vc_at_certificates[0].certificate.toBeSigned.encryptionKey.publicKey.eciesBrainpoolP256r1.compressed_y_1;
v_public_enc_key_compressed_mode := 1;
} else { // TODO
}
if (not(ispresent(v_public_enc_key_x))) {
var octetstring v_key;
v_public_enc_key_x := v_public_enc_compressed_key; // Key X-Coordinate
fx_get_uncompressed_key_brainpoolp256r1(vc_at_certificates[0].private_enc_key, valueof(v_public_enc_compressed_key), valueof(v_public_enc_key_compressed_mode), v_key); // Key Y-Coordinate
v_public_enc_key_y := v_key;
}
} else {
log("a_process_cf_ut_command: Wrong certificate format, invalid verification key, back to initial");
vc_security_state := 0; // 0: initial
vc_reenrolment := false;
vc_ec_counter := 0;
vc_ec_certificates := {};
vc_at_counter := 0;
vc_at_certificates := {};
repeat;
}
}
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_enc_key_x =", v_public_enc_key_x);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_enc_key_y =", v_public_enc_key_y);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_enc_compressed_key =", v_public_enc_compressed_key);
log("a_process_cf_ut_command: Prepare to store new AT certificate: v_public_enc_key_compressed_mode=", v_public_enc_key_compressed_mode);
// Store the certificate
log("a_process_cf_ut_command: Store new AT certificate");
if (fx_store_certificate(v_cert_id, v_cert, vc_at_certificates[0].private_key, v_public_key_x, v_public_key_y, v_public_key_compressed, v_verify_compressed_mode, v_wholeHash, v_hashedId8_sha256, v_hashedId8, v_issuer, vc_at_certificates[0].private_enc_key, v_public_enc_key_x, v_public_enc_key_y, v_public_enc_compressed_key, v_public_enc_key_compressed_mode) == false) {
log("a_process_cf_ut_command: Failed to store certificate, back to initial");
vc_security_state := 0; // 0: initial
vc_reenrolment := false;
vc_ec_counter := 0;
vc_ec_certificates := {};
vc_at_counter := 0;
vc_at_certificates := {};
repeat;
}
// Update the Test System
log("a_process_cf_ut_command (pki): Change certificate to ", v_cert_id);
f_acTriggerSecEvent(m_acEnableSecurity(v_cert_id));
// Enrolled & Authorized, start CAM emission
tc_cam.start(vc_cam_timer_value);
}
[] cfPort.receive {
// Ignore it
log("*** " & testcasename() & ": INFO: Unexpected CF message received ***");
repeat;
}
} // End of 'altstep' statement
function f_trigger_enrolment_request_await_response() runs on ItsPkiHttpRsuSimulator {
// Local variables
var Oct32 v_private_key;
var Oct32 v_compressed_public_key;
var integer v_compressed_mode;
var Oct32 v_request_hash;
var Oct16 v_encrypted_sym_key;
var Oct16 v_aes_sym_key;
var Oct16 v_authentication_vector;
var Oct12 v_nonce;
var octetstring v_salt;
var Ieee1609Dot2Data v_ieee1609dot2_signed_and_encrypted_data;
var HttpMessage v_response;
var EtsiTs102941Data v_etsi_ts_102941_data;
timer v_t := 5.0;
log(">>> f_trigger_enrolment_request_await_response");
f_cfHttpUp(PICS_IUT_EA_CERTIFICATE_ID, PICS_IUT_AA_CERTIFICATE_ID);
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
f_http_build_inner_ec_request(v_private_key, v_compressed_public_key, v_compressed_mode, v_aes_sym_key, v_encrypted_sym_key, v_authentication_vector, v_nonce, v_salt, v_ieee1609dot2_signed_and_encrypted_data, v_request_hash);
f_init_default_headers_list(-, "inner_ec_request", v_headers);
httpPort.send(
m_http_request(
m_http_request_post(
PICS_HTTP_POST_URI,
v_headers,
m_http_message_body_binary(
m_binary_body_ieee1609dot2_data(
v_ieee1609dot2_signed_and_encrypted_data
)))));
// Wait for the resposne
v_t.start;
alt {
[] httpPort.receive(
mw_http_response(
mw_http_response_ok(
mw_http_message_body_binary(
mw_binary_body_ieee1609dot2_data(
mw_enrolmentResponseMessage(
mw_encryptedData(
-,
mw_SymmetricCiphertext_aes128ccm
))))))) -> value v_response {
v_t.stop;
log("f_trigger_enrolment_request_await_response: v_response=", v_response);
if (f_verify_pki_response_message(v_private_key, v_aes_sym_key, v_authentication_vector, vc_eaWholeHash, v_response.response.body.binary_body.ieee1609dot2_data, false, -, v_etsi_ts_102941_data) == false) {
log("f_trigger_enrolment_request_await_response: Failed to verify PKI message ***");
} else {
log("f_trigger_enrolment_request_await_response: v_etsi_ts_102941_data=", v_etsi_ts_102941_data);
// Verify the received EC certificate
log("f_trigger_enrolment_request_await_response: match ", match(v_etsi_ts_102941_data.content, mw_enrolmentResponse(mw_innerEcResponse_ok(substr(v_request_hash, 0, 16), mw_etsiTs103097Certificate(-, mw_toBeSignedCertificate_ec, -)))), " ***"); // TODO In TITAN, this is the only way to get the unmatching in log
if (match(v_etsi_ts_102941_data.content, mw_enrolmentResponse(mw_innerEcResponse_ok(substr(v_request_hash, 0, 16), mw_etsiTs103097Certificate(-, mw_toBeSignedCertificate_ec, -))))) {
var InnerEcResponse v_inner_ec_response := v_etsi_ts_102941_data.content.enrolmentResponse;
if (f_verify_ec_certificate(v_etsi_ts_102941_data.content.enrolmentResponse.certificate, vc_eaCertificate, vc_eaHashedId8, v_compressed_public_key, v_compressed_mode)) {
var EcData v_ec_data;
log("f_trigger_enrolment_request_await_response: p_inner_ec_response= ", v_inner_ec_response);
// Send the new certificate for storing
v_ec_data.private_key := v_private_key;
v_ec_data.aes_sym_key := v_aes_sym_key;
v_ec_data.certificate := v_inner_ec_response.certificate;
log("f_trigger_enrolment_request_await_response: send v_ec_data=", v_ec_data);
resultPort.send(v_ec_data);
} else {
log("f_trigger_enrolment_request_await_response: Cannot verify EC certificate signature ***");
}
} else {
log("f_trigger_enrolment_request_await_response: Unexpected message received ***");
}
}
}
[] v_t.timeout {
log("*** " & testcasename() & ": INCONC: Expected message not received ***");
}
} // End of 'alt' statement
f_cfHttpDown();
log("<<< f_trigger_enrolment_request_await_response");
}
function f_trigger_authorization_request_await_response(
in integer p_ec_counter,
in SequenceOfEcData p_ec_certificates
) runs on ItsPkiHttpRsuSimulator {
var Oct32 v_private_key_at;
var Oct32 v_public_compressed_key_at;
var integer p_compressed_mode_at;
var Oct32 v_private_enc_key_at;
var Oct32 v_public_compressed_enc_key_at;
var integer v_compressed_enc_mode_at;
var Oct16 v_encrypted_sym_key;
var Oct16 v_aes_sym_key;
var HashedId8 v_aes_sym_key_hashed_id8;
var Oct16 v_authentication_vector;
var Oct12 v_nonce;
var octetstring v_salt;
var Ieee1609Dot2Data v_ieee1609dot2_signed_and_encrypted_data;
var Oct32 v_request_hash;
var bitstring v_encoded_value;
var Ieee1609Dot2Data v_authorization_response;
var HttpMessage v_response;
var EtsiTs102941Data v_etsi_ts_102941_data;
f_cfHttpUp(PICS_IUT_EA_CERTIFICATE_ID, PICS_IUT_AA_CERTIFICATE_ID);
f_http_build_authorization_request(
p_ec_certificates[p_ec_counter - 1].certificate,
p_ec_certificates[p_ec_counter - 1].private_key,
v_private_key_at,
v_public_compressed_key_at,
p_compressed_mode_at,
v_private_enc_key_at,
v_public_compressed_enc_key_at,
v_compressed_enc_mode_at,
v_aes_sym_key,
v_encrypted_sym_key,
v_authentication_vector,
v_nonce,
v_salt,
v_ieee1609dot2_signed_and_encrypted_data,
v_request_hash);
log("f_trigger_authorization_request_await_response: v_ieee1609dot2_signed_and_encrypted_data=", v_ieee1609dot2_signed_and_encrypted_data);
v_aes_sym_key_hashed_id8 := f_hashedId8FromSha256(f_hashWithSha256('80'O & v_aes_sym_key)); // Used to match the response
f_init_default_headers_list(-, "inner_at_request", v_headers);
httpPort.send(
m_http_request(
m_http_request_post(
v_headers,
m_http_message_body_binary(
m_binary_body_ieee1609dot2_data(
v_ieee1609dot2_signed_and_encrypted_data
)))));
// Wait for the resposne
v_t.start;
alt {
[] httpPort.receive(
mw_http_response(
mw_http_response_ok(
mw_http_message_body_binary(
mw_binary_body_ieee1609dot2_data(
mw_enrolmentResponseMessage(
mw_encryptedData(
-,
mw_SymmetricCiphertext_aes128ccm
))))))) -> value v_response {
v_t.stop;
log("f_trigger_authorization_request_await_response: v_response=", v_response);
if (f_verify_pki_response_message(v_private_key_at, v_aes_sym_key, v_authentication_vector, v_request_hash, v_response.response.body.binary_body.ieee1609dot2_data, false, -, v_etsi_ts_102941_data) == false) {
log("f_trigger_authorization_request_await_response: Failed to verify PKI message");
log("f_trigger_authorization_request_await_response: v_etsi_ts_102941_data=", v_etsi_ts_102941_data);
// Verify the received AT certificate
log(match(v_etsi_ts_102941_data.content, mw_authorizationResponse(mw_innerAtResponse_ok(substr(v_request_hash, 0, 16), mw_etsiTs103097Certificate(-, mw_toBeSignedCertificate_at, -))))); // TODO In TITAN, this is the only way to get the unmatching in log
if (match(v_etsi_ts_102941_data.content, mw_authorizationResponse(mw_innerAtResponse_ok(substr(v_request_hash, 0, 16), mw_etsiTs103097Certificate(-, mw_toBeSignedCertificate_at, -)))) == true) {
var InnerAtResponse v_inner_at_response := v_etsi_ts_102941_data.content.authorizationResponse;
var AtData v_at_data;
log("f_trigger_enrolment_request_await_response: p_inner_at_response= ", v_inner_at_response);
// Send the new certificate for storing
v_at_data.private_key := v_private_key_at;
v_at_data.aes_sym_key := v_aes_sym_key;
v_at_data.certificate := v_inner_at_response.certificate;
log("f_trigger_enrolment_request_await_response: send v_at_data=", v_at_data);
resultPort.send(v_at_data);
// TODO Provide the new certificate to the Test System
// TODO Start CAM emission
log("f_trigger_authorization_request_await_response: Cannot verify AT certificate signature ***");
log("*** " & testcasename() & ": INCONC: Expected message not received ***");
}
} // End of 'alt' statement
log("<<< f_trigger_authorization_request_await_response");
} // End of module ItsRSUsSimulator_Functions