Commit 22087834 authored by Yann Garcia's avatar Yann Garcia
Browse files

Add send templates for DC behavior

parent 319e13e2
......@@ -16,7 +16,7 @@ if [ -z `docker images -q stfubuntu` ]; then
docker build --no-cache --tag stfubuntu:18.04 -f Dockerfile.stfubuntu --force-rm . || exit 1
fi
TAG=etsiforge/titan-its
TAG=etsiforge/etsi-its-ts
# Temporary: Remove TTF002 image
docker image rm --force $TAG
......@@ -26,7 +26,7 @@ docker build --no-cache --tag $TAG --force-rm . || ( echo "Docker build failed:
docker images
docker inspect $TAG || ( echo "Docker inspect failed: $?"; exit 1 )
docker push $TAG:latest
#docker push $TAG:latest
# That's all Floks
exit 0
......@@ -5,32 +5,52 @@
# Enable Security support
LibItsGeoNetworking_Pics.PICS_GN_SECURITY := true
# Root path to access certificate stored in files, identified by certficate ID
LibItsSecurity_Pixits.PX_CERTIFICATE_POOL_PATH := "/home/vagrant/tmp"
LibItsSecurity_Pixits.PX_CERTIFICATE_POOL_PATH := "/home/yann/tmp"
# Configuration sub-directory to access certificate stored in files
LibItsSecurity_Pixits.PX_IUT_SEC_CONFIG_NAME := "asn1c_cert"
# Use this certificate if the RSU simulator act as IUT
LibItsCommon_Pixits.PX_CERT_FOR_TS := "CERT_IUT_A_AT"
LibItsHttp_Pics.PICS_HEADER_CTL_CONTENT_TYPE := "application/x-its-crl"
LibItsHttp_Pics.PICS_HEADER_CONTENT_TYPE := "application/x-its-request"
LibItsHttp_Pics.PICS_HEADER_HOST := "test.bsi.v2x-pilot.escrypt.com"
LibItsPki_Pics.PICS_HTTP_POST_URI_EC := "/ea/enrolment"
LibItsPki_Pics.PICS_HTTP_POST_URI_AT := "/aa/authorization"
LibItsPki_Pics.PICS_HTTP_POST_URI_ATV := "/ea/validation"
LibItsPki_Pics.PICS_MULTIPLE_END_POINT := false
LibItsHttp_Pics.PICS_HEADER_HOST := "test.bsi.v2x-pilot.escrypt.com"
LibItsPki_Pics.PICS_ITS_S_WITH_PRIVACY := false
LibItsPki_Pics.PICS_ITS_S_SIGN_NITSP256_PRIVATE_KEY := '749509D6C5243059A9F73C26DAD46EAE30E3606D83413D94CF134FBA9071617F'O
LibItsPki_Pics.PICS_ITS_S_CANONICAL_ID := '45534352595054000000000000000011'O
LibItsPki_Pics.PICS_TS_EA_CERTIFICATE_ID := "CERT_ESCRYPT_EA"
LibItsPki_Pics.PICS_TS_AA_CERTIFICATE_ID := "CERT_ESCRYPT_AA"
LibItsPki_Pics.PICS_HTTP_POST_URI_EC := "/ea/enrolment"
LibItsPki_Pics.PICS_HTTP_POST_URI_AT := "/aa/authorization"
LibItsPki_Pics.PICS_HTTP_POST_URI_ATV := "/ea/validation"
#LibItsPki_Pics.PICS_HTTP_GET_URI_CTL := "/getctl/1D3C7B499A054F8C";
#LibItsPki_Pics.PICS_HTTP_GET_URI_CRL := "/getcrl/1D3C7B499A054F8C";
#LibItsPki_Pics.PICS_HTTP_GET_URI_ECTL := "/data/certificates/ectl/ECTL_TEST_ETSI-PLUGTEST_6.0_2019-11-07.oer"
#LibItsPki_Pixits.PX_VE_ALG := e_brainpool_p256_r1
LibItsPki_Pixits.PX_EC_ALG_FOR_EC := e_brainpool_p256_r1
LibItsPki_Pixits.PX_EC_ALG_FOR_AT := e_nist_p256
LibItsPki_Pixits.PX_EC_ALG_FOR_ATV := e_brainpool_p256_r1
LibItsPki_Pics.PICS_ITS_S_SIGN_NITSP256_PRIVATE_KEY := '5C25F97607DFC62972A147FAD8B7A7C939569F0F95ECD4C641724A68B51836E5'O
LibItsPki_Pics.PICS_ITS_S_SIGN_NISTP256_PUBLIC_KEY := '020144E5174B0AFDA86BDB8B643B68D40030F5BDB9A9F090C64852CC3C20C9D5AD'O
LibItsPki_Pics.PICS_ITS_S_CANONICAL_ID := '455453492D4954532D30303100000000'O
LibItsPki_Pixits.PX_INCLUDE_ENCRYPTION_KEYS := false # No encryption key in Authorization request
#LibItsPki_Pixits.PICS_PKI_AUTH_POP := false # Do not use Signed for PoP in Authorization requet
LibItsPki_Pics.PICS_TS_EA_CERTIFICATE_ID := "CERT_ESCRYPT_PKI_EA"
LibItsPki_Pics.PICS_TS_AA_CERTIFICATE_ID := "CERT_TS_A_AA"
LibItsPki_Pics.PICS_IUT_AA_CERTIFICATE_ID := "CERT_ESCRYPT_PKI_AA"
LibItsPki_Pics.PICS_TS_CA_CERTIFICATE_ID := "CERT_ESCRYPT_PKI_RCA"
#LibItsPki_Pics.PICS_ITS_S_WITH_PRIVACY := false
#LibItsPki_Pics.PICS_PKI_AUTH_POP := false # Do not use Signed for PoP in Authorization requet
# Required for SECPKI_AA_AUTH_RCV_02_BV
#LibItsPki_Pics.PICS_SECPKI_REENROLMENT := false # Check in logs the pattern '==> EC ' to find the required information for re-enrolment
#LibItsPki_Pixits.PX_INCLUDE_ENCRYPTION_KEYS := false # No encryption key in Authorization request
#LibItsPki_Pixits.PX_VE_ALG := e_brainpool_p256_r1 # e_nist_p256, e_brainpool_p256_r1 or e_brainpool_p384_r1
#LibItsPki_Pixits.PX_EC_ALG_FOR_EC := e_brainpool_p256_r1 # e_nist_p256, e_brainpool_p256_r1
#LibItsPki_Pixits.PX_EC_ALG_FOR_ATV := e_brainpool_p256_r1 # e_nist_p256, e_brainpool_p256_r1
#LibItsPki_Pixits.PX_EC_ALG_FOR_EC_SIGN := e_brainpool_p256_r1 # e_nist_p256, e_brainpool_p256_r1
#LibItsPki_Pixits.PX_EC_ALG_FOR_AT := e_brainpool_p256_r1 # e_nist_p256, e_brainpool_p256_r1
#LibItsPki_Pixits.PX_VE_ALG := e_brainpool_p256_r1
#LibItsPki_Pixits.PX_EC_ALG_FOR_EC := e_brainpool_p256_r1
#LibItsPki_Pixits.PX_EC_ALG_FOR_AT := e_nist_p256
#LibItsPki_Pixits.PX_EC_ALG_FOR_ATV := e_brainpool_p256_r1
#LibItsPki_Pixits.PX_EC_PRIVATE_KEY := '170D1EA638C300BD16F0025768C0F1FAA6BE23963E46AD10F79103914265D294'O
#LibItsPki_Pixits.PX_EC_HASH := 'DFEFC2A74C8ADD0C8B74B958EE072229D25DEAAAE30D134193D091890E8F3C2C'O
#LibItsPki_Pixits.PX_EC_HASHED_ID8 := '93D091890E8F3C2C'O
......@@ -56,37 +76,120 @@ system.httpPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TC
[EXECUTE]
# The EnrolmentResponse message shall be sent by the EA to the ITS-S across the interface at reference point S3 in response to a received EnrolmentRequest message
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_01_BV
# Check that EA doesn't accept Enrolment rekeying request when enrolment is not permitted by signing certificate
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_02_BI
# Check that EA doesn't accept Enrolment rekeying request when enrolment is not permitted by signing certificate (not containing an item of type PsidSsp)
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_02_BI_01
# Check that EA doesn't accept Enrolment rekeying request when enrolment is not permitted by signing certificate (containing opaque[0] (version) indicating other value than 1)
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_02_BI_02
# Check that EA doesn't accept Enrolment rekeying request when enrolment is not permitted by signing certificate (containing opaque[1] (value) indicating "Enrolment Request" (bit 1) set to 0)
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_02_BI_03
# Enroll an ITS-Station, but with a canonical-ID, that is not registered.
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_05_BI
# Enroll the ITS-Station, but the CSR re-quests more permissions than the issuer allows, i.e. request for security management SSP bit which is not set in the EA SSP
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_06_BI
# Enroll the ITS-Station, but the CSR requests a AID permission that the issuer does not allow, i.e. request for CAM AID
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_07_BI
# Enroll the ITS-Station, but the expiring date of the CSR is before the start date of the EA
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_08_BI
# Enroll the ITS-Station, but the start date of the CSR is before the start date of the EA
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_09_BI
# Enroll the ITS-Station, but the expiring date of the CSR is after the expiring date of the EA
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_10_BI
# Enroll the ITS-Station, but the start date of the CSR is after the expiring date of the EA
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_11_BI
# Enroll the ITS-Station, but the lifetime of the EC would be grater than allowed (considering values in C-ITS CP)
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_12_BI
# Enroll the ITS-Station, but the inner PoP signature in the CSR, created with the EC private key, can not be verified with the provided public key
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_13_BI
# The EnrolmentResponse message shall be encrypted using an ETSI TS 103 097 approved algorithm and the encryption shall be done with the same AES key as the one used by the ITS-S requestor for the encryption of the EnrolmentRequest message.
ItsPki_TestCases.TC_SECPKI_EA_ENR_01_BV
# The EnrolmentResponse message shall be encrypted using an ETSI TS 103 097 approved algorithm and the encryption shall be done with the same AES key as the one used by the ITS-S requestor for the encryption of the EnrolmentRequest message.
#ItsPki_TestCases.TC_SECPKI_EA_ENR_01_BV
#ItsPki_TestCases.TC_SECPKI_EA_ENR_02_BV
# The outermost structure is an EtsiTs103097Data-Encrypted structure containing the component recipients containing one instance of RecipientInfo of choice pskRecipInfo, which contains the HashedId8 of the symmetric key used by the ITS-S to encrypt the EnrolmentRequest message to which the response is built and containing the component ciphertext, once decrypted, contains an EtsiTs103097Data-Signed structure
#ItsPki_TestCases.TC_SECPKI_EA_ENR_03_BV
# If the ITS-S has been able to decrypt the content, this expected EtsiTs103097Data-Signed structure shall contain hashId, tbsData, signer and signature. The hashId shall indicate the hash algorithm to be used as specified in ETSI TS 103 097, the signer shall be declared as a digest, containing the HashedId8 of the EA certificate and the signature over tbsData shall be computed using the EA private key corresponding to its publicVerificationKey found in the referenced EA certificate
#ItsPki_TestCases.TC_SECPKI_EA_ENR_04_BV
# Within the headerInfo of the tbsData, the psid shall be set to secured certificate request as assigned in ETSI TS 102 965 and the generationTime shall be present
#ItsPki_TestCases.TC_SECPKI_EA_ENR_05_BV
# Within the headerInfo of the tbsData, aside from psid and generationTime, all other components of the component tbsData.headerInfo not used and absent
#ItsPki_TestCases.TC_SECPKI_EA_ENR_06_BV
# The EtsiTS102941Data shall contain the version set to v1 (integer value set to 1) and the content set to InnerECResponse
#ItsPki_TestCases.TC_SECPKI_EA_ENR_07_BV
#ItsPki_TestCases.TC_SECPKI_EA_ENR_01_BV
# The InnerECResponse shall contain the requestHash, which is the left-most 16 octets of the SHA256 digest of the EtsiTs103097Data - Signed structure received in the request and a responseCode indicating the result of the request
#ItsPki_TestCases.TC_SECPKI_EA_ENR_08_BV
# If the responseCode is 0, the InnerECResponse shall also contain an (enrolment) certificate
#ItsPki_TestCases.TC_SECPKI_EA_ENR_09_BV
# If the responseCode is different than 0, the InnerECResponse shall not contain a certificate
#ItsPki_TestCases.TC_SECPKI_EA_ENR_10_BV
# Check that signing of Enrolment response message is permitted by the EA certificate
#ItsPki_TestCases.TC_SECPKI_EA_ENR_11_BV
#ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_02_BI
# Check that generated EC certificate contains only allowed permissions
#ItsPki_TestCases.TC_SECPKI_EA_ENR_12_BV
#
# The AuthorizationValidationResponse message shall be sent by the EA to the AA across the interface at reference point S4 in response to a received AuthorizationValidationRequest message
#ItsPki_TestCases.TC_SECPKI_EA_AUTHVAL_RCV_01_BV
#
# Check that EA doesn't accept Authorization Validation Request when SharedAtRequest is signed with certificate without appropriate permissions
#ItsPki_TestCases.TC_SECPKI_EA_AUTHVAL_RCV_02_BI
# The EtsiTs103097Data-Encrypted is build with the component recipients containing one instance of RecipientInfo of choice pskRecipInfo, which contains the HashedId8 of the symmetric key used by the ITS-S to encrypt the AuthorizationRequest message to which the response is built and the component ciphertext containing the encrypted representation of the EtsiTs103097Data-Signed. The encryption uses a ETSI TS 103 097 [3] approved algorithm
#ItsPki_TestCases.TC_SECPKI_EA_AUTHVAL_01_BV
# To read an authorization validation response, the AA shall receive an EtsiTs103097Data-Encrypted structure, containing a EtsiTs103097Data-Signed structure, containing a EtsiTs102941Data structure, containing an AuthorizationValidationResponse structure
#ItsPki_TestCases.TC_SECPKI_EA_AUTHVAL_02_BV
# The AuthorizationValidationResponse structure contains the requestHash being the left-most 16 octets of the SHA256 digest of the EtsiTs103097Data-Signed structure received in the AuthorizationValidationRequest and a responseCode
#ItsPki_TestCases.TC_SECPKI_EA_AUTHVAL_03_BV
# If the responseCode is 0, the AuthorizationValidationResponse structure contains the component confirmedSubjectAttributes with the attributes the EA wishes to confirm, except for certIssuePermissions which is not allowed to be present
#ItsPki_TestCases.TC_SECPKI_EA_AUTHVAL_04_BV
# If the responseCode is different than 0, the AuthorizationValidationResponse structure does not contain the component confirmedSubjectAttributes
#ItsPki_TestCases.TC_SECPKI_EA_AUTHVAL_05_BV
# The component version of the EtsiTs102941Data structure is set to v1 (integer value set to 1)
#ItsPki_TestCases.TC_SECPKI_EA_AUTHVAL_06_BV
# Check that the EA/AA is able to decrypt the AuthorizationRequest message using the encryption private key corresponding to the recipient certificate...
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_01_BV
# Check that the AA is able to decrypt the AuthorizationRequest message using the encryption private key corresponding to the recipient certificate...
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_02_BV
# Check that the AA skips the AuthorizationRequest message if it is not addressed to this AA
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_03_BI
# Check that the AA skips the AuthorizationRequest message if it unable to decrypt the encKey
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_04_BI
# Check that the AA skips the AuthorizationRequest message if it unable to decrypt the encKey
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_05_BI
# Check that the AA rejects the AuthorizationRequest message if it unable to verify the POP signature
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_06_BI
ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_07_BI
# Check that the AA rejects the AuthorizationRequest message if it unable to verify the integrity of the request using hmacKey
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_07_BI
# Send a correctly encoded AT request, but the ITS-Station is not enrolled at the EA
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_08_BI
# Send an AT request, but the inner signer (valid EC) is not issued by the EA which is known / trusted by the AA. The AA trusts only EAs listet on the RCA-CTL
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_09_BI
# Send an AT request, but the generation time of the CSR is in the past
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_10_BI
# Send an AT request, but the generation time of the CSR is in the future
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_11_BI
# Send an AT request, but the expiry date of the CSR is before the start date of the EC
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_12_BI
# Send an AT request, but the start date of the CSR is before the start date of the EC
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_13_BI
# Send an AT request, but the expiry date of the CSR is after the expiry date of the EC
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_14_BI
# Send an AT request, but the start date of the CSR is after the expiring date of the EC
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_15_BI
# Send an AT request, but the expiry date of the CSR is after now + maximum pre-loading period (considering values in C-ITS CP)
#ItsPki_TestCases.TC_SECPKI_AA_AUTH_RCV_16_BI
# Check that the AA sends AuthorizationValidationRequest after receiving of the AuthorizationRequest
#ItsPki_TestCases.TC_SECPKI_AA_AUTHVAL_01_BV
# Check that the RootCA generates the Full CTL when new EA is about to be added to the Root CTL
#ItsPki_TestCases.TC_RCA_CTLGEN_01_BV
# Check that the RootCA generates the CRL when CA certificate is about to be revoked
#ItsPki_TestCases.TC_RCA_CRLGEN_02_BV
# Check that the TLM generates the ECTL when new RootCA is about to be added
#ItsPki_TestCases.TC_TLM_ECTLGEN_01_BV
[MAIN_CONTROLLER]
# The options herein control the behavior of MC.
KillTimer := 10.0
......
[MODULE_PARAMETERS]
# This section shall contain the values of all parameters that are defined in your TTCN-3 modules.
......@@ -18,24 +19,24 @@ LibItsPki_Pics.PICS_MULTIPLE_END_POINT := true
LibItsPki_Pics.PICS_HEADER_HOST_EC := "ea.utopia.plugtests2019.innovation.keynectis.net"
LibItsPki_Pics.PICS_HEADER_HOST_ATV := "ea.utopia.plugtests2019.innovation.keynectis.net"
LibItsPki_Pics.PICS_HEADER_HOST_AT := "aa.utopia.plugtests2019.innovation.keynectis.net"
LibItsPki_Pics.PICS_HEADER_HOST_CA := "dc.plugtests2019.innovation.keynectis.net"
LibItsPki_Pics.PICS_HEADER_HOST_TLM := "cpoc.jrc.ec.europa.eu"
LibItsPki_Pics.PICS_HEADER_HOST_CA := "0.atos-dc.l0.c-its-pki.eu"
LibItsPki_Pics.PICS_HEADER_HOST_TLM := "0.atos-dc.l0.c-its-pki.eu"
LibItsPki_Pics.PICS_HTTP_POST_URI_EC := "/"
LibItsPki_Pics.PICS_HTTP_POST_URI_AT := "/"
LibItsPki_Pics.PICS_HTTP_POST_URI_ATV := "/"
LibItsPki_Pics.PICS_HTTP_GET_URI_CTL := "/getctl/1D3C7B499A054F8C";
LibItsPki_Pics.PICS_HTTP_GET_URI_CRL := "/getcrl/1D3C7B499A054F8C";
LibItsPki_Pics.PICS_HTTP_GET_URI_ECTL := "/data/certificates/ectl/ECTL_TEST_ETSI-PLUGTEST_6.0_2019-11-07.oer"
LibItsPki_Pics.PICS_HTTP_GET_URI_CTL := "/103600/3-1/getctl/347A3B143C94C298"
LibItsPki_Pics.PICS_HTTP_GET_URI_CRL := "/103600/3-1/getcrl/347A3B143C94C298"
LibItsPki_Pics.PICS_HTTP_GET_URI_ECTL := "/103600/3-1/getctl/347A3B143C94C298"
LibItsPki_Pics.PICS_ITS_S_SIGN_NITSP256_PRIVATE_KEY := '5C25F97607DFC62972A147FAD8B7A7C939569F0F95ECD4C641724A68B51836E5'O
LibItsPki_Pics.PICS_ITS_S_SIGN_NISTP256_PUBLIC_KEY := '020144E5174B0AFDA86BDB8B643B68D40030F5BDB9A9F090C64852CC3C20C9D5AD'O
LibItsPki_Pics.PICS_ITS_S_CANONICAL_ID := '455453492D4954532D303031'O
LibItsPki_Pics.PICS_TS_EA_CERTIFICATE_ID := "CERT_IDNOMIC_EA"
LibItsPki_Pics.PICS_TS_EA_CERTIFICATE_ID := "CERT_IDNOMIC_PKI_EA"
LibItsPki_Pics.PICS_TS_AA_CERTIFICATE_ID := "CERT_TS_A_AA"
LibItsPki_Pics.PICS_IUT_AA_CERTIFICATE_ID := "CERT_IDNOMIC_AA"
LibItsPki_Pics.PICS_TS_CA_CERTIFICATE_ID := "CERT_IDNOMIC_RCA"
LibItsPki_Pics.PICS_IUT_AA_CERTIFICATE_ID := "CERT_IDNOMIC_PKI_AA"
LibItsPki_Pics.PICS_TS_CA_CERTIFICATE_ID := "CERT_IDNOMIC_PKI_RCA"
#LibItsPki_Pics.PICS_PKI_AUTH_POP := false # Do not use Signed for PoP in Authorization requet
# Required for SECPKI_AA_AUTH_RCV_02_BV
......@@ -73,8 +74,8 @@ system.httpEcPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/
system.httpAtVPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TCP(server=ea.utopia.plugtests2019.innovation.keynectis.net)"
#system.httpAtVPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TCP(debug=1,server_mode=1,server=192.168.1.41,local_port=80)" # Multiple HTTP component ports specific to TC_SECPKI_AA_AUTHVAL_xx
system.httpAtPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TCP(server=aa.utopia.plugtests2019.innovation.keynectis.net)"
system.httpCaPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TCP(server=dc.plugtests2019.innovation.keynectis.net)"
system.httpTlmPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TCP(debug=1,server=cpoc.jrc.ec.europa.eu,use_ssl=1)"
system.httpCaPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TCP(debug=1,server=90.84.246.190,use_ssl=1)"
system.httpTlmPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TCP(debug=1,server=90.84.246.190,use_ssl=1)"
[EXECUTE]
# The EnrolmentResponse message shall be sent by the EA to the ITS-S across the interface at reference point S3 in response to a received EnrolmentRequest message
......@@ -187,11 +188,11 @@ system.httpTlmPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)
# Check that the RootCA generates the Full CTL when new EA is about to be added to the Root CTL
#ItsPki_TestCases.TC_RCA_CTLGEN_01_BV
# Check that the RootCA generates the CRL when CA certificate is about to be revoked
#ItsPki_TestCases.TC_RCA_CRLGEN_02_BV
# Check that the RootCA generates the CRL signed with appropriate certificate.
ItsPki_TestCases.TC_RCA_CRLGEN_01_BV
# Check that the TLM generates the ECTL when new RootCA is about to be added
ItsPki_TestCases.TC_TLM_ECTLGEN_01_BV
#ItsPki_TestCases.TC_TLM_ECTLGEN_01_BV
[MAIN_CONTROLLER]
# The options herein control the behavior of MC.
......
......@@ -43,21 +43,21 @@ ItsRSUsSimulator_Pics.PICS_GENERATE_MAPEM := false
ItsRSUsSimulator_Pics.PICS_GENERATE_SPATEM := false
ItsRSUsSimulator_Pics.PICS_GENERATE_SSEM := false
ItsRSUsSimulator_Pics.PICS_ITS_S_ROLE := true;
ItsRSUsSimulator_Pics.PICS_ITS_S_ROLE := false
ItsRSUsSimulator_Pics.PICS_PKI_SUPPORT := true
ItsRSUsSimulator_Pics.PICS_BEACON_FREQUENCY := 1.0
ItsRSUsSimulator_Pics.PICS_CAM_FREQUENCY := 1.0
ItsRSUsSimulator_Pics.PICS_DENM_FREQUENCY := 1.0
ItsRSUsSimulator_Pics.PICS_SEND_BEACON_INDICATION := false
ItsRSUsSimulator_Pics.PICS_SEND_BEACON_INDICATION := true
ItsRSUsSimulator_Pics.PICS_SEND_CAM_INDICATION := true
ItsRSUsSimulator_Pics.PICS_SEND_DENM_INDICATION := true
# Enable Security support
LibItsGeoNetworking_Pics.PICS_GN_SECURITY := true
# Root path to access certificate stored in files, identified by certficate ID
LibItsSecurity_Pixits.PX_CERTIFICATE_POOL_PATH := "/home/vagrant/tmp"
LibItsSecurity_Pixits.PX_CERTIFICATE_POOL_PATH := "/home/yann/tmp"
# Configuration sub-directory to access certificate stored in files
LibItsSecurity_Pixits.PX_IUT_SEC_CONFIG_NAME := "asn1c_cert"
......@@ -163,21 +163,22 @@ LogEventTypes:= Yes
# its_aid=36: CAM
# its_aid=37: DENM
# its_aid=141: GeoMet
system.geoNetworkingPort.params := "GN(ll_address=4C5E0C14D2EB,latitude=43551050,longitude=10298730,its_aid=36,secured_mode=1,certificate=CERT_IUT_A_AT,sec_db_path=/home/vagrant/tmp/asn1c_cert)/ETH(mac_src=080027128a53)/PCAP(mac_src=080027128a53,nic=eth1,filter=and ether proto 0x8947)"
system.geoNetworkingPort.params := "GN(ll_address=4C5E0C14D2EB,latitude=43551050,longitude=10298730,its_aid=36,secured_mode=1,certificate=CERT_IUT_A_AT,sec_db_path=/home/yann/tmp/asn1c_cert)/ETH(mac_src=f8cab8083918)/PCAP(mac_src=f8cab8083918,nic=eno1,filter=and ether proto 0x8947)"
#system.geoNetworkingPort.params := "GN(ll_address=4C5E0C14D2EB,latitude=43551050,longitude=10298730,its_aid=36,secured_mode=1,certificate=CERT_IUT_A_AT,sec_db_path=/home/yann/tmp/asn1c_cert)/ETH(mac_src=dc536045af7e)/PCAP(mac_src=dc536045af7e,nic=wlp2s0,filter=and ether proto 0x8947)"
# Commsignia
#system.geoNetworkingPort.params := "GN(ll_address=4C5E0C14D2EB,latitude=43551050,longitude=10298730,its_aid=37,secured_mode=0,encrypted_mode=0,certificate=CERT_IUT_A_AT,peer_certificate=CERT_TS_A_AT,sec_db_path=/home/vagrant/tmp/asn1c_cert)/COMMSIGNIA(xport_mode=LTE-V2X,mac_src=080027F44E7D,interface_id=2,target_host=192.168.0.54)/UDP(dst_ip=192.168.0.54,src_port=9091,dst_port=7946)"
#system.geoNetworkingPort.params := "GN(ll_address=4C5E0C14D2EB,latitude=43551050,longitude=10298730,its_aid=37,secured_mode=0,encrypted_mode=0,certificate=CERT_IUT_A_AT,peer_certificate=CERT_TS_A_AT,sec_db_path=/home/yann/tmp/asn1c_cert)/COMMSIGNIA(xport_mode=LTE-V2X,mac_src=080027F44E7D,interface_id=2,target_host=192.168.0.54)/UDP(dst_ip=192.168.0.54,src_port=9091,dst_port=7946)"
# Qualcom
#system.geoNetworkingPort.params := "GN(ll_address=4C5E0C14D2EB,latitude=36747486,longitude=-4556772,distanceA=25,distanceB=25,its_aid=37,secured_mode=1,encrypted_mode=0,certificate=CERT_MICROSEC_AT_01,peer_certificate=CERT_TS_A_AT,sec_db_path=/home/vagrant/tmp/asn1c_cert)/QUALCOMM/UDP(dst_ip=10.200.1.113,src_port=9091,dst_port=4041)"
#system.geoNetworkingPort.params := "GN(ll_address=4C5E0C14D2EB,latitude=36747486,longitude=-4556772,distanceA=25,distanceB=25,its_aid=37,secured_mode=1,encrypted_mode=0,certificate=CERT_MICROSEC_AT_01,peer_certificate=CERT_TS_A_AT,sec_db_path=/home/yann/tmp/asn1c_cert)/QUALCOMM/UDP(dst_ip=10.200.1.113,src_port=9091,dst_port=4041)"
#system.httpPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TCP(debug=1,server=192.168.42.25,port=80)"
#system.httpPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TCP(debug=1,server=192.168.1.25,port=80)"
#system.httpPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TCP(debug=1,server=192.168.1.25,port=8080)"
system.httpPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TCP(debug=1,server=192.168.1.39,port=8080)"
# Config port based on UDP
#system.cfPort.params := "CF(ut=cam)/UDP(src_port=12345,reuse_incoming_source_adddress=1)"
system.cfPort.params := "CF(ut=cam)/UDP(src_port=12345,reuse_incoming_source_adddress=1)"
#system.cfPort.params := "CF(ut=denm)/UDP(src_port=12345,reuse_incoming_source_adddress=1)"
#system.cfPort.params := "CF(ut=gn)/UDP(src_port=12345,reuse_incoming_source_adddress=1)"
system.cfPort.params := "CF(ut=pki)/UDP(src_port=12345,reuse_incoming_source_adddress=1)"
#system.cfPort.params := "CF(ut=pki)/UDP(src_port=12345,reuse_incoming_source_adddress=1)"
[EXECUTE]
ItsRSUsSimulator_TestCases.TC_RSUSIMU_BV_01
......
......@@ -78,6 +78,10 @@ module ItsPki_TestCases {
group itss_helpers {
 
/**
* @desc The purpose of this function is verify the EC request and extract InnerEcRequest and build the InnerEcResponse for the HTTP response
* Note: This function accepts additional parameters to alter the reponse
*/
function f_verify_http_ec_request_from_iut_itss(
in Request p_request,
in Headers p_headers,
......@@ -151,6 +155,10 @@ module ItsPki_TestCases {
log("<<< f_verify_http_ec_request_from_iut_itss: p_result: ", p_result);
} // End of function f_verify_http_ec_request_from_iut_itss
 
/**
* @desc The purpose of this function is verify the AT request and extract InnerAtRequest and build the InnerAtResponse for the HTTP response
* Note: This function accepts additional parameters to alter the reponse
*/
function f_verify_http_at_request_from_iut_itss(
in Request p_request,
in Headers p_headers,
......@@ -227,7 +235,7 @@ module ItsPki_TestCases {
if (match(p_inner_at_request.sharedAtRequest.keyTag, v_key_tag) == false) {
// Send error message: No enrolment request
f_http_build_authorization_response(p_inner_at_request, its_aa_keysdontmatch, v_request_hash, -, -, v_aes_enc_key, p_inner_at_response, v_ieee1609dot2_signed_and_encrypted_data);
v_response := m_http_response(m_http_response_ok(m_http_message_body_binary(m_binary_body_ieee1609dot2_data(v_ieee1609dot2_signed_and_encrypted_data)), p_headers));
v_response := m_http_response(m_http_response_ok(m_http_message_body_binary(m_binary_body_ieee1609dot2_data(v_ieee1609dot2_signed_and_encrypted_data)), p_headers));
// Set verdict
p_result := -5;
......@@ -255,7 +263,7 @@ module ItsPki_TestCases {
} // End of function f_verify_http_at_request_from_iut_itss
 
/**
* @desc Await CA message using the default AT certificate
* @desc Await ITS CA message using the default AT certificate
*/
altstep a_await_cam_with_current_cert(
in HashedId8 p_certificate_digest,
......@@ -266,7 +274,7 @@ module ItsPki_TestCases {
mw_geoNwSecPdu(
mw_etsiTs103097Data_signed(
mw_signedData(
sha256,
sha256,
mw_toBeSignedData(
mw_signedDataPayload,
mw_headerInfo_cam
......@@ -338,7 +346,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_ITSS_ENR_01_BV
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_ITSS_ENR_01_BV
* @reference ETSI TS 102 941 [2], clause 6.1.3
*/
testcase TC_SECPKI_ITSS_ENR_01_BV() runs on ItsMtc system ItsPkiItssSystem {
......@@ -507,7 +515,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_ITSS_ENR_02_BV
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_ITSS_ENR_02_BV
* @reference ETSI TS 102 941, clause 6.1.3
*/
testcase TC_SECPKI_ITSS_ENR_02_BV() runs on ItsMtc system ItsPkiItssSystem {
......@@ -566,7 +574,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_ITSS_ENR_03_BV
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_ITSS_ENR_03_BV
* @reference ETSI TS 102 941, clause 6.1.3
*/
testcase TC_SECPKI_ITSS_ENR_03_BV() runs on ItsMtc system ItsPkiItssSystem {
......@@ -610,10 +618,10 @@ module ItsPki_TestCases {
// Test adapter configuration
// Preamble
// Initial state: No CAM shall be emitted
geoNetworkingPort.clear;
// Initial state: No CAM shall be emitted
geoNetworkingPort.clear;
tc_noac.start;
alt {
alt {
[] geoNetworkingPort.receive {
log("No CA message expected");
f_selfOrClientSyncAndVerdict(c_prDone, e_error);
......@@ -636,8 +644,8 @@ module ItsPki_TestCases {
f_selfOrClientSyncAndVerdict(c_tbDone, e_error);
}
[] tc_noac.timeout {
log("*** " & testcasename() & ": PASS: Enrolment trigger sent succesfully ***");
f_selfOrClientSyncAndVerdict(c_tbDone, e_success);
log("*** " & testcasename() & ": PASS: Enrolment trigger sent succesfully ***");
f_selfOrClientSyncAndVerdict(c_tbDone, e_success);
}
} // End of 'alt' statement
......@@ -780,7 +788,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_ITSS_ENR_04_BV
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_ITSS_ENR_04_BV
* @reference ETSI TS 102 941, clause 6.1.3, 6.2.3.2.1
*/
testcase TC_SECPKI_ITSS_ENR_04_BV() runs on ItsMtc system ItsPkiItssSystem {
......@@ -824,7 +832,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_ITSS_ENR_05_BV
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_ITSS_ENR_05_BV
* @reference ETSI TS 102 941, clause 6.1.3, 6.2.3.2.1
*/
testcase TC_SECPKI_ITSS_ENR_05_BV() runs on ItsMtc system ItsPkiItssSystem {
......@@ -870,7 +878,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_ITSS_ENR_06_BV
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_ITSS_ENR_06_BV
* @reference ETSI TS 102 941, clause 6.1.3
*/
testcase TC_SECPKI_ITSS_ENR_06_BV() runs on ItsMtc system ItsPkiItssSystem {
......@@ -1086,7 +1094,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_ITSS_ENR_07_BV
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_ITSS_ENR_07_BV
* @reference ETSI TS 102 941, clause 6.2.3.2.1
*/
testcase TC_SECPKI_ITSS_ENR_07_BV() runs on ItsMtc system ItsPkiItssSystem {
......@@ -1147,7 +1155,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_ITSS_ENR_08_BV
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_ITSS_ENR_08_BV
* @reference ETSI TS 102 941, clause 6.2.3.2.1
*/
testcase TC_SECPKI_ITSS_ENR_08_BV() runs on ItsMtc system ItsPkiItssSystem {
......@@ -1203,7 +1211,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_ITSS_ENR_09_BV
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_ITSS_ENR_09_BV
* @reference ETSI TS 102 941, clause 6.2.3.2.1
*/
testcase TC_SECPKI_ITSS_ENR_09_BV() runs on ItsMtc system ItsPkiItssSystem {
......@@ -1261,7 +1269,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_ITSS_ENR_10_BV
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_ITSS_ENR_10_BV
* @reference ETSI TS 102 941, clause 6.2.3.2.1
*/
testcase TC_SECPKI_ITSS_ENR_10_BV() runs on ItsMtc system ItsPkiItssSystem {
......@@ -1317,7 +1325,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_ITSS_ENR_11_BV
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_ITSS_ENR_11_BV
* @reference ETSI TS 102 941, clause 6.2.3.2.1
*/
testcase TC_SECPKI_ITSS_ENR_11_BV() runs on ItsMtc system ItsPkiItssSystem {
......@@ -1374,7 +1382,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_ITSS_ENR_12_BV
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_ITSS_ENR_12_BV
* @reference ETSI TS 102 941, clause 6.1.3, 6.2.3.2.1
*/
testcase TC_SECPKI_ITSS_ENR_12_BV() runs on ItsMtc system ItsPkiItssSystem {
......@@ -1424,7 +1432,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_ITSS_ENR_RECV_01_BV
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_ITSS_ENR_RECV_01_BV
* @reference ETSI TS 102 941, clause 6.1.3, 6.2.3.2.1
*/
testcase TC_SECPKI_ITSS_ENR_RECV_01_BV() runs on ItsMtc system ItsPkiItssSystem {
......@@ -1586,7 +1594,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_ITSS_ENR_RECV_02_BV
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_ITSS_ENR_RECV_02_BV
* @reference ETSI TS 102 941, clause 6.1.3, 6.2.3.2.1
*/
testcase TC_SECPKI_ITSS_ENR_RECV_02_BV() runs on ItsMtc system ItsPkiItssSystem {
......@@ -1706,7 +1714,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_ITSS_AUTH_01_BV
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_ITSS_AUTH_01_BV
* @reference ETSI TS 102 941 [2], clause 6.2.3.3.0
*/
testcase TC_SECPKI_ITSS_AUTH_01_BV() runs on ItsMtc system ItsPkiItssSystem {
......@@ -1908,7 +1916,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_ITSS_AUTH_02_BV
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_ITSS_AUTH_02_BV
* @reference ETSI TS 102 941 [2], clause 6.2.3.3.1
*/
testcase TC_SECPKI_ITSS_AUTH_02_BV() runs on ItsMtc system ItsPkiItssSystem {
......@@ -1963,7 +1971,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_ITSS_AUTH_03_BV
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_ITSS_AUTH_03_BV
* @reference ETSI TS 102 941 [2], clause 6.2.3.3.1
*/
testcase TC_SECPKI_ITSS_AUTH_03_BV() runs on ItsMtc system ItsPkiItssSystem {
......@@ -2018,7 +2026,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_ITSS_AUTH_04_BV
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_ITSS_AUTH_04_BV
* @reference ETSI TS 102 941 [2], clause 6.2.3.3.1
*/
testcase TC_SECPKI_ITSS_AUTH_04_BV() runs on ItsMtc system ItsPkiItssSystem {
......@@ -2238,7 +2246,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_ITSS_AUTH_05_BV
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_ITSS_AUTH_05_BV
* @reference ETSI TS 102 941 [2], clause 6.2.3.3.1
*/
testcase TC_SECPKI_ITSS_AUTH_05_BV() runs on ItsMtc system ItsPkiItssSystem {
......@@ -2313,7 +2321,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 TP SECPKI_EA_ENR_RCV_01_BV
* @see ETSI TS 103 525-2 v1.1.3 TP SECPKI_EA_ENR_RCV_01_BV
* @reference ETSI TS 102 941, clause 6.2.3.2.2
*/
testcase TC_SECPKI_EA_ENR_RCV_01_BV() runs on ItsPkiHttp system ItsPkiHttpSystem {
......@@ -6251,7 +6259,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_AA_AUTH_RCV_01_BV
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_AA_AUTH_RCV_01_BV
* @reference ETSI TS 102 941, clause 6.2.3.3.1
*/
testcase TC_SECPKI_AA_AUTH_RCV_01_BV() runs on ItsPkiHttp system ItsPkiHttpSystem {
......@@ -6413,7 +6421,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_AA_AUTH_RCV_02_BV
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_AA_AUTH_RCV_02_BV
* @reference ETSI TS 102 941, clause 6.2.3.3.1
*/
testcase TC_SECPKI_AA_AUTH_RCV_02_BV() runs on ItsPkiHttp system ItsPkiHttpSystem {
......@@ -6557,7 +6565,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_AA_AUTH_RCV_03_BI
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_AA_AUTH_RCV_03_BI
* @reference ETSI TS 102 941, clause 6.2.3.3.1
*/
testcase TC_SECPKI_AA_AUTH_RCV_03_BI() runs on ItsPkiHttp system ItsPkiHttpSystem {
......@@ -6697,7 +6705,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_AA_AUTH_RCV_04_BI
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_AA_AUTH_RCV_04_BI
* @reference ETSI TS 102 941, clause 6.2.3.3.1
*/
testcase TC_SECPKI_AA_AUTH_RCV_04_BI() runs on ItsPkiHttp system ItsPkiHttpSystem {
......@@ -6832,7 +6840,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_AA_AUTH_RCV_05_BI
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_AA_AUTH_RCV_05_BI
* @reference ETSI TS 102 941, clause 6.2.3.3.1
*/
testcase TC_SECPKI_AA_AUTH_RCV_05_BI() runs on ItsPkiHttp system ItsPkiHttpSystem {
......@@ -6980,7 +6988,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_AA_AUTH_RCV_06_BI
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_AA_AUTH_RCV_06_BI
* @reference ETSI TS 102 941, clause 6.2.3.3.1
*/
testcase TC_SECPKI_AA_AUTH_RCV_06_BI() runs on ItsPkiHttp system ItsPkiHttpSystem {
......@@ -7135,7 +7143,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_AA_AUTH_RCV_07_BI
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_AA_AUTH_RCV_07_BI
* @reference ETSI TS 102 941, clause 6.2.3.3.1
*/
testcase TC_SECPKI_AA_AUTH_RCV_07_BI() runs on ItsPkiHttp system ItsPkiHttpSystem {
......@@ -8413,7 +8421,7 @@ module ItsPki_TestCases {
* }
* </pre>
*
* @see ETSI TS 103 525-2 v1.1.1 SECPKI_AA_AUTHVAL_01_BV
* @see ETSI TS 103 525-2 v1.1.3 SECPKI_AA_AUTHVAL_01_BV
* @reference ETSI TS 102 941, clause 6.2.3.3.2
*/
testcase TC_SECPKI_AA_AUTHVAL_01_BV() runs on ServerSyncComp system ItsPkiHttpSystem {
......@@ -8671,7 +8679,7 @@ module ItsPki_TestCases {
* }
* </pre>