Commit 7fe37cfe authored by Yann Garcia's avatar Yann Garcia
Browse files

Validating ERRATA changes

parent 214bddfe
[MODULE_PARAMETERS]
# This section shall contain the values of all parameters that are defined in your TTCN-3 modules.
[MODULE_PARAMETERS]
# This section shall contain the values of all parameters that are defined in your TTCN-3 modules. # The GeoNetworking address of the IUT.
LibItsGeoNetworking_Pics.PICS_GN_LOCAL_GN_ADDR := {
# The GeoNetworking address of the IUT. typeOfAddress := e_manual,
LibItsGeoNetworking_Pics.PICS_GN_LOCAL_GN_ADDR := { typeOfAddress := e_manual, stationType := e_passengerCar,
stationType := e_passengerCar, stationCountryCode := 0,
stationCountryCode := 0, mid := '000000000001'O
mid := '000000000001'O # typeOfAddress := e_initial,
# typeOfAddress := e_initial, # stationType := e_unknown, #e_roadSideUnit,
# stationType := e_unknown, #e_roadSideUnit, # stationCountryCode := 0, #33,
# stationCountryCode := 0, #33, # mid := '4C5E0C14D2EA'O
# mid := '4C5E0C14D2EA'O }
}
LibItsGeoNetworking_Pixits.PX_GN_UPPER_LAYER := e_btpB
LibItsGeoNetworking_Pixits.PX_GN_UPPER_LAYER := e_btpB LibItsGeoNetworking_Pixits.PX_NEIGHBOUR_DISCOVERY_DELAY := 2.0
LibItsGeoNetworking_Pixits.PX_NEIGHBOUR_DISCOVERY_DELAY := 2.0
# Enable Security support
LibItsHttp_Pics.PICS_HEADER_CONTENT_TYPE := "application/x-its-request" LibItsGeoNetworking_Pics.PICS_GN_SECURITY := true
# Root path to access certificate stored in files, identified by certficate ID
# Gemalto LibItsSecurity_Pixits.PX_CERTIFICATE_POOL_PATH := "/home/vagrant/tmp"
#LibItsHttp_Pics.PICS_HEADER_HOST := "etsi.ea.msi-dev.acloud.gemalto.com" # Configuration sub-directory to access certificate stored in files
#LibItsPki_Pics.PICS_HTTP_POST_URI := "/" LibItsSecurity_Pixits.PX_IUT_SEC_CONFIG_NAME := "asn1c_cert"
# httpbin.org LibItsHttp_Pics.PICS_HEADER_CONTENT_TYPE := "application/x-its-request"
LibItsHttp_Pics.PICS_HEADER_HOST := "httpbin.org"
LibItsPki_Pics.PICS_HTTP_POST_URI := "/its" LibItsPki_Pics.PICS_MULTIPLE_END_POINT := true
LibItsSecurity_Pics.PICS_SEC_FIXED_KEYS := true # Seed LibItsPki_Pics.PICS_HEADER_HOST_EC := "etsi.enrolment.ea.msi-dev.acloud.gemalto.com"
LibItsPki_Pics.PICS_HEADER_HOST_ATV := "etsi.authvalidation.ea.msi-dev.acloud.gemalto.com"
# Enable Security support LibItsPki_Pics.PICS_HEADER_HOST_AT := "etsi.authorizationa.a.msi-dev.acloud.gemalto.com"
LibItsGeoNetworking_Pics.PICS_GN_SECURITY := true
# Root path to access certificate stored in files, identified by certficate ID LibItsPki_Pics.PICS_HTTP_POST_URI_EC := "/";
LibItsSecurity_Pixits.PX_CERTIFICATE_POOL_PATH := "/home/vagrant/tmp" LibItsPki_Pics.PICS_HTTP_POST_URI_AT := "/";
# Configuration sub-directory to access certificate stored in files LibItsPki_Pics.PICS_HTTP_POST_URI_ATV := "/";
LibItsSecurity_Pixits.PX_IUT_SEC_CONFIG_NAME := "asn1c_cert"
LibItsPki_Pics.PICS_ITS_S_SIGN_NITSP256_PRIVATE_KEY := '5C25F97607DFC62972A147FAD8B7A7C939569F0F95ECD4C641724A68B51836E5'O
LibItsPki_Pics.PICS_IUT_COMBINED_EA_AA_ROLE := true LibItsPki_Pics.PICS_ITS_S_SIGN_NISTP256_PUBLIC_KEY := '020144E5174B0AFDA86BDB8B643B68D40030F5BDB9A9F090C64852CC3C20C9D5AD'O
LibItsPki_Pics.PICS_ITS_S_CANONICAL_ID := '1B4CA1210123AE900BBE6C3EBAE7E87DA20DBDAB1E7B2EC0691C51C1021900AA'O
[LOGGING] LibItsPki_Pics.PICS_TS_EA_CERTIFICATE_ID := "CERT_GEMALTO_EA"
# In this section you can specify the name of the log file and the classes of events LibItsPki_Pics.PICS_TS_AA_CERTIFICATE_ID := "CERT_GEMALTO_AA"
# you want to log into the file or display on console (standard error).
[LOGGING]
LogFile := "../logs/%e.%h-%r.%s" # In this section you can specify the name of the log file and the classes of events
FileMask := LOG_ALL | USER | DEBUG | MATCHING # you want to log into the file or display on console (standard error).
ConsoleMask := LOG_ALL | USER | DEBUG | MATCHING
#FileMask := ERROR | WARNING | USER | MATCHING | EXECUTOR_RUNTIME | VERDICTOP LogFile := "../logs/%e.%h-%r.%s"
#ConsoleMask := ERROR | WARNING | USER | MATCHING | EXECUTOR_RUNTIME | VERDICTOP FileMask := LOG_ALL | USER | DEBUG | MATCHING
LogSourceInfo := Stack ConsoleMask := LOG_ALL | USER | DEBUG | MATCHING
LogEntityName:= Yes #FileMask := ERROR | WARNING | USER | MATCHING | EXECUTOR_RUNTIME | VERDICTOP
LogEventTypes:= Yes #ConsoleMask := ERROR | WARNING | USER | MATCHING | EXECUTOR_RUNTIME | VERDICTOP
#TimeStampFormat := DateTime LogSourceInfo := Stack
LogEntityName:= Yes
[TESTPORT_PARAMETERS] LogEventTypes:= Yes
# In this section you can specify parameters that are passed to Test Ports. #TimeStampFormat := DateTime
# CAM Layer
# next_header : btpA|btpB (overwrite BTP.type) [TESTPORT_PARAMETERS]
# header_type : tsb|gbc # Single GeoNetworkingPort component port
# header_sub_type : sh (single hop) system.geoNetworkingPort.params := "GN(ll_address=4C5E0C14D2EA,latitude=43551050,longitude=10298730)/ETH(mac_src=080027500f9b)/PCAP(mac_src=080027500f9b,nic=eth2)"
# DENM Layer # Single HTTP component port
# next_header : btpA|btpB (overwrite BTP.type) system.httpPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TCP(debug=1,server=etsi.enrolment.ea.msi-dev.acloud.gemalto.com,port=80,use_ssl=0)"
# header_type : tsb|gbc system.httpEcPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TCP(debug=1,server=etsi.enrolment.ea.msi-dev.acloud.gemalto.com,port=80,use_ssl=0)"
# BTP Layer system.httpAtVPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TCP(debug=1,server=etsi.authvalidation.ea.msi-dev.acloud.gemalto.com,port=80,use_ssl=0)"
# type : btpA|btpB system.httpAtPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TCP(debug=1,server=etsi.authorization.aa.msi-dev.acloud.gemalto.com,port=80,use_ssl=0)"
# destination port: dst_port
# source port : src_port # GeoNetworking UpperTester port based on UDP
# device_mode : Set to 1 if the layer shall encapsulate upper layer PDU system.utPort.params := "UT_PKI/UDP(dst_ip=172.23.0.1,dst_port=8000)"
# device_mode : Set to 1 if the layer shall encapsulate upper layer PDU
# GN Layer [EXECUTE]
# ll_address : GeoNetworking address of the Test System #ItsPki_TestCases.TC_SECPKI_ITSS_ENR_01_BV
# latitude : latitude of the Test System #ItsPki_TestCases.TC_SECPKI_ITSS_ENR_02_BV
# longitude : longitude of the Test System
# beaconing : Set to 1 if GnLayer shall start beaconing # The EnrolmentResponse message shall be sent by the EA to the ITS-S across the interface at reference point S3 in response to a received EnrolmentRequest message
# Beaconing timer expiry: expiry (ms) #ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_01_BV
# device_mode : Set to 1 if the layer shall encapsulate upper layer PDU # Check that EA doesn't accept Enrolment rekeying request when enrolment is not permitted by signing certificate
# secured_mode : Set to 1 if message exchanges shall be signed #ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_02_BI
# encrypted_mode : Set to 1 if message exchanges shall be encrypted
# NOTE: For signed & encrypted message exchanges, both secured_mode and encrypted_mode shall be set to 1 # The EnrolmentResponse message shall be encrypted using an ETSI TS 103 097 approved algorithm and the encryption shall be done with the same AES key as the one used by the ITS-S requestor for the encryption of the EnrolmentRequest message.
# sec_db_path : Path to the certificates and keys storage location #ItsPki_TestCases.TC_SECPKI_EA_ENR_01_BV
# hash : Hash algorithm to be used when secured mode is set # The EnrolmentResponse message shall be encrypted using an ETSI TS 103 097 approved algorithm and the encryption shall be done with the same AES key as the one used by the ITS-S requestor for the encryption of the EnrolmentRequest message
# Authorized values are SHA-256 or SHA-384 #ItsPki_TestCases.TC_SECPKI_EA_ENR_02_BV
# Default: SHA-256 # The outermost structure is an EtsiTs103097Data-Encrypted structure containing the component recipients containing one instance of RecipientInfo of choice pskRecipInfo, which contains the HashedId8 of the symmetric key used by the ITS-S to encrypt the EnrolmentRequest message to which the response is built and containing the component ciphertext, once decrypted, contains an EtsiTs103097Data-Signed structure
# signature : Signature algorithm to be used when secured mode is set #ItsPki_TestCases.TC_SECPKI_EA_ENR_03_BV
# Authorized values are NISTP-256, NISTP-384, BP-256 and BP-384 # Within the headerInfo of the tbsData, the psid shall be set to secured certificate request� as assigned in ETSI TS 102 965 and the generationTime shall be present.
# Default: NISTP-256 #ItsPki_TestCases.TC_SECPKI_EA_ENR_04_BV
# cypher : Cyphering algorithm to be used when secured mode is set #ItsPki_TestCases.TC_SECPKI_EA_ENR_05_BV
# Authorized values are NISTP-256, BP-256 and BP-384 #ItsPki_TestCases.TC_SECPKI_EA_ENR_06_BV
# Default: NISTP-256 #ItsPki_TestCases.TC_SECPKI_EA_ENR_07_BV
# Pki layer #ItsPki_TestCases.TC_SECPKI_EA_ENR_01_BV
# certificate : Certificate to be used by the Test System for signature and encryption. Default: CERT_TS_A_AT #ItsPki_TestCases.TC_SECPKI_EA_ENR_08_BV
# peer_certificate : Certificate to be used by the IUT for signature and encryption. Default: CERT_IUT_A_AT #ItsPki_TestCases.TC_SECPKI_EA_ENR_09_BV
# Ethernet layer #ItsPki_TestCases.TC_SECPKI_EA_ENR_10_BV
# mac_src :Source MAC address #ItsPki_TestCases.TC_SECPKI_EA_ENR_11_BV
# mac_bc :Broadcast address ItsPki_TestCases.TC_SECPKI_SND_EA_AA_BV_01
# eth_type : Ethernet type #ItsPki_TestCases.TC_SEC_PKI_SND_AA_BV_01
# Commsignia layer
# mac_src : Device MAC address, used to discard packets [MAIN_CONTROLLER]
# To indicate no filering, use the value 000000000000 # The options herein control the behavior of MC.
# mac_bc : Broadcast address KillTimer := 10.0
# eth_type : Ethernet type, used to discard packets LocalAddress := 127.0.0.1
# target_host : Device address TCPPort := 12000
# target_port : Device port NumHCs := 1
# source_port : Test System port
# interface_id: Interface id, used to discard packets
# tx_power : TX power (dB)
# UDP layer (IP/UDP based on Pcap)
# dst_ip : destination IPv4 address (aa.bb.cc.dd)
# dst_port: destination port
# src_ip : source IPv4 address (aa.bb.cc.dd)
# src_port: source port
# Pcap layer
# mac_src : Source MAC address, used to exclude from capture the acket sent by the Test System
# filter : Pcap filter (compliant with tcpdump syntax)
# Online mode:
# nic: Local NIC
# If set, online mode is used
# Offline mode (nic is present but not set):
# file : File to read
# frame_offset: Frame offset, used to skip packets with frame number < frame_offset
# time_offset : Time offset, used to skip packets with time offset < time_offset
# save_mode : 1 to save sent packet, 0 otherwise
# Single GeoNetworking component port
system.geoNetworkingPort.params := "GN(ll_address=4C5E0C14D2EA,latitude=43551050,longitude=10298730)/ETH(mac_src=080027500f9b)/PCAP(mac_src=080027500f9b,nic=eth2)"
system.httpPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TCP(server=75.75.74.66,port=8000,use_ssl=0)" # httpbin.org
#system.httpPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TCP(server=52.85.200.75,port=80,use_ssl=0)" # Gemalto
#system.httpPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TCP(server=etsi.ea.msi-dev.acloud.gemalto.com,port=80,use_ssl=0)" # Gemalto
# GeoNetworking UpperTester port based on UDP
system.utPort.params := "UT_PKI/UDP(dst_ip=172.23.0.1,dst_port=8000)"
[EXECUTE]
#ItsPki_TestCases.TC_SEC_PKI_ITSS_ENR_BV_01
#ItsPki_TestCases.TC_SEC_PKI_ITSS_ENR_BV_02
#ItsPki_TestCases.TC_SEC_PKI_SND_EA_BV_01
#ItsPki_TestCases.TC_SEC_PKI_SND_EA_BV_02
#ItsPki_TestCases.TC_SEC_PKI_SND_EA_BV_03
#ItsPki_TestCases.TC_SEC_PKI_SND_EA_BV_04
#ItsPki_TestCases.TC_SEC_PKI_SND_EA_BV_05
#ItsPki_TestCases.TC_SEC_PKI_SND_EA_BV_06
#ItsPki_TestCases.TC_SEC_PKI_SND_EA_BV_07
#ItsPki_TestCases.TC_SEC_PKI_SND_EA_BV_08
#ItsPki_TestCases.TC_SEC_PKI_SND_EA_BV_09
#ItsPki_TestCases.TC_SEC_PKI_SND_EA_BV_10
#ItsPki_TestCases.TC_SEC_PKI_SND_EA_BV_11
#ItsPki_TestCases.TC_SEC_PKI_SND_EA_BV_12
ItsPki_TestCases.TC_SEC_PKI_SND_EA_AA_BV_01
#ItsPki_TestCases.TC_SEC_PKI_SND_AA_BV_01
[MAIN_CONTROLLER]
# The options herein control the behavior of MC.
KillTimer := 10.0
LocalAddress := 127.0.0.1
TCPPort := 12000
NumHCs := 1
...@@ -15,14 +15,6 @@ LibItsGeoNetworking_Pics.PICS_GN_LOCAL_GN_ADDR := { ...@@ -15,14 +15,6 @@ LibItsGeoNetworking_Pics.PICS_GN_LOCAL_GN_ADDR := {
LibItsGeoNetworking_Pixits.PX_GN_UPPER_LAYER := e_btpB LibItsGeoNetworking_Pixits.PX_GN_UPPER_LAYER := e_btpB
LibItsGeoNetworking_Pixits.PX_NEIGHBOUR_DISCOVERY_DELAY := 2.0 LibItsGeoNetworking_Pixits.PX_NEIGHBOUR_DISCOVERY_DELAY := 2.0
LibItsHttp_Pics.PICS_HEADER_CONTENT_TYPE := "application/x-its-request"
LibItsHttp_Pics.PICS_HEADER_HOST := "etsi.ea.msi-dev.acloud.gemalto.com"
LibItsPki_Pics.PICS_HTTP_POST_URI := "/"
LibItsPki_Pics.PICS_HTTP_POST_URI := "/its"
#LibItsSecurity_Pics.PICS_SEC_FIXED_KEYS := true # Seed
# Enable Security support # Enable Security support
LibItsGeoNetworking_Pics.PICS_GN_SECURITY := true LibItsGeoNetworking_Pics.PICS_GN_SECURITY := true
# Root path to access certificate stored in files, identified by certficate ID # Root path to access certificate stored in files, identified by certficate ID
...@@ -30,11 +22,17 @@ LibItsSecurity_Pixits.PX_CERTIFICATE_POOL_PATH := "/home/vagrant/tmp" ...@@ -30,11 +22,17 @@ LibItsSecurity_Pixits.PX_CERTIFICATE_POOL_PATH := "/home/vagrant/tmp"
# Configuration sub-directory to access certificate stored in files # Configuration sub-directory to access certificate stored in files
LibItsSecurity_Pixits.PX_IUT_SEC_CONFIG_NAME := "asn1c_cert" LibItsSecurity_Pixits.PX_IUT_SEC_CONFIG_NAME := "asn1c_cert"
LibItsPki_Pics.PICS_ITS_S_SIGN_NITSP256_PRIVATE_KEY := '5C25F97607DFC62972A147FAD8B7A7C939569F0F95ECD4C641724A68B51836E5'O LibItsHttp_Pics.PICS_HEADER_CONTENT_TYPE := "application/x-its-request"
LibItsPki_Pics.PICS_ITS_S_SIGN_NISTP256_PUBLIC_KEY := '020144E5174B0AFDA86BDB8B643B68D40030F5BDB9A9F090C64852CC3C20C9D5AD'O LibItsHttp_Pics.PICS_HEADER_HOST := "horus-pki.com"
LibItsPki_Pics.PICS_ITS_S_CANONICAL_ID := '1B4CA1210123AE900BBE6C3EBAE7E87DA20DBDAB1E7B2EC0691C51C1021900AA'O
LibItsPki_Pics.PICS_TS_EA_CERTIFICATE_ID := "CERT_ATOS_EA" LibItsPki_Pics.PICS_HTTP_POST_URI_EC := "/enrol"
LibItsPki_Pics.PICS_TS_AA_CERTIFICATE_ID := "CERT_ATOS_AA" LibItsPki_Pics.PICS_HTTP_POST_URI_AT := "/authorize"
LibItsPki_Pics.PICS_HTTP_POST_URI_ATV := "/validate"
LibItsPki_Pics.PICS_ITS_S_SIGN_NITSP256_PRIVATE_KEY := '5C25F97607DFC62972A147FAD8B7A7C939569F0F95ECD4C641724A68B51836E5'O
LibItsPki_Pics.PICS_ITS_S_SIGN_NISTP256_PUBLIC_KEY := '020144E5174B0AFDA86BDB8B643B68D40030F5BDB9A9F090C64852CC3C20C9D5AD'O
LibItsPki_Pics.PICS_ITS_S_CANONICAL_ID := '1B4CA1210123AE900BBE6C3EBAE7E87DA20DBDAB1E7B2EC0691C51C1021900AA'O
LibItsPki_Pics.PICS_TS_EA_CERTIFICATE_ID := "CERT_ATOS_EA"
LibItsPki_Pics.PICS_TS_AA_CERTIFICATE_ID := "CERT_ATOS_AA"
[LOGGING] [LOGGING]
# In this section you can specify the name of the log file and the classes of events # In this section you can specify the name of the log file and the classes of events
...@@ -120,26 +118,35 @@ LogEventTypes:= Yes ...@@ -120,26 +118,35 @@ LogEventTypes:= Yes
# save_mode : 1 to save sent packet, 0 otherwise # save_mode : 1 to save sent packet, 0 otherwise
# Single GeoNetworking component port # Single GeoNetworking component port
system.httpPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TCP(server=etsi.ea.msi-dev.acloud.gemalto.com,port=80,use_ssl=0)" system.geoNetworkingPort.params := "GN(ll_address=4C5E0C14D2EA,latitude=43551050,longitude=10298730)/ETH(mac_src=080027500f9b)/PCAP(mac_src=080027500f9b,nic=eth2)"
# Single HTTP component port
system.httpPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TCP(server=horus-pki.com,port=80,use_ssl=0)"
# GeoNetworking UpperTester port based on UDP # GeoNetworking UpperTester port based on UDP
system.utPort.params := "UT_PKI/UDP(dst_ip=172.23.0.1,dst_port=8000)" system.utPort.params := "UT_PKI/UDP(dst_ip=172.23.0.1,dst_port=8000)"
[EXECUTE] [EXECUTE]
#ItsPki_TestCases.TC_SEC_PKI_ITSS_ENR_BV_01 #ItsPki_TestCases.TC_SECPKI_ITSS_ENR_01_BV
#ItsPki_TestCases.TC_SEC_PKI_ITSS_ENR_BV_02 #ItsPki_TestCases.TC_SECPKI_ITSS_ENR_02_BV
#ItsPki_TestCases.TC_SEC_PKI_SND_EA_BV_01
#ItsPki_TestCases.TC_SEC_PKI_SND_EA_BV_02 # The EnrolmentResponse message shall be sent by the EA to the ITS-S across the interface at reference point S3 in response to a received EnrolmentRequest message
#ItsPki_TestCases.TC_SEC_PKI_SND_EA_BV_03 ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_01_BV
#ItsPki_TestCases.TC_SEC_PKI_SND_EA_BV_04 # Check that EA doesn't accept Enrolment rekeying request when enrolment is not permitted by signing certificate
#ItsPki_TestCases.TC_SEC_PKI_SND_EA_BV_05 #ItsPki_TestCases.TC_SECPKI_EA_ENR_RCV_02_BI
#ItsPki_TestCases.TC_SEC_PKI_SND_EA_BV_06
#ItsPki_TestCases.TC_SEC_PKI_SND_EA_BV_07 # The EnrolmentResponse message shall be encrypted using an ETSI TS 103 097 approved algorithm and the encryption shall be done with the same AES key as the one used by the ITS-S requestor for the encryption of the EnrolmentRequest message.
#ItsPki_TestCases.TC_SEC_PKI_SND_EA_BV_08 #ItsPki_TestCases.TC_SECPKI_EA_ENR_01_BV
#ItsPki_TestCases.TC_SEC_PKI_SND_EA_BV_09 #ItsPki_TestCases.TC_SECPKI_EA_ENR_02_BV
#ItsPki_TestCases.TC_SEC_PKI_SND_EA_BV_10 #ItsPki_TestCases.TC_SECPKI_EA_ENR_03_BV
#ItsPki_TestCases.TC_SEC_PKI_SND_EA_BV_11 #ItsPki_TestCases.TC_SECPKI_EA_ENR_04_BV
#ItsPki_TestCases.TC_SEC_PKI_SND_EA_BV_12 #ItsPki_TestCases.TC_SECPKI_EA_ENR_05_BV
#ItsPki_TestCases.TC_SECPKI_EA_ENR_06_BV
#ItsPki_TestCases.TC_SECPKI_EA_ENR_07_BV
#ItsPki_TestCases.TC_SECPKI_EA_ENR_01_BV
#ItsPki_TestCases.TC_SECPKI_EA_ENR_08_BV
#ItsPki_TestCases.TC_SECPKI_EA_ENR_09_BV
#ItsPki_TestCases.TC_SECPKI_EA_ENR_10_BV
#ItsPki_TestCases.TC_SECPKI_EA_ENR_11_BV
#ItsPki_TestCases.TC_SEC_PKI_SND_EA_AA_BV_01 #ItsPki_TestCases.TC_SEC_PKI_SND_EA_AA_BV_01
#ItsPki_TestCases.TC_SEC_PKI_SND_AA_BV_01 #ItsPki_TestCases.TC_SEC_PKI_SND_AA_BV_01
......
...@@ -15,11 +15,6 @@ LibItsGeoNetworking_Pics.PICS_GN_LOCAL_GN_ADDR := { ...@@ -15,11 +15,6 @@ LibItsGeoNetworking_Pics.PICS_GN_LOCAL_GN_ADDR := {
LibItsGeoNetworking_Pixits.PX_GN_UPPER_LAYER := e_btpB LibItsGeoNetworking_Pixits.PX_GN_UPPER_LAYER := e_btpB
LibItsGeoNetworking_Pixits.PX_NEIGHBOUR_DISCOVERY_DELAY := 2.0 LibItsGeoNetworking_Pixits.PX_NEIGHBOUR_DISCOVERY_DELAY := 2.0
LibItsHttp_Pics.PICS_HEADER_CONTENT_TYPE := "application/x-its-request"
LibItsHttp_Pics.PICS_HEADER_HOST := "test.bsi.v2x-pilot.escrypt.com"
LibItsPki_Pics.PICS_HTTP_POST_URI := "/ea/enrolment"
# Enable Security support # Enable Security support
LibItsGeoNetworking_Pics.PICS_GN_SECURITY := true LibItsGeoNetworking_Pics.PICS_GN_SECURITY := true
# Root path to access certificate stored in files, identified by certficate ID # Root path to access certificate stored in files, identified by certficate ID
...@@ -27,14 +22,20 @@ LibItsSecurity_Pixits.PX_CERTIFICATE_POOL_PATH := "/home/vagrant/tmp" ...@@ -27,14 +22,20 @@ LibItsSecurity_Pixits.PX_CERTIFICATE_POOL_PATH := "/home/vagrant/tmp"
# Configuration sub-directory to access certificate stored in files # Configuration sub-directory to access certificate stored in files
LibItsSecurity_Pixits.PX_IUT_SEC_CONFIG_NAME := "asn1c_cert" LibItsSecurity_Pixits.PX_IUT_SEC_CONFIG_NAME := "asn1c_cert"
LibItsPki_Pics.PICS_ITS_S_SIGN_NITSP256_PRIVATE_KEY := '5C25F97607DFC62972A147FAD8B7A7C939569F0F95ECD4C641724A68B51836E5'O LibItsHttp_Pics.PICS_HEADER_CONTENT_TYPE := "application/x-its-request"
LibItsPki_Pics.PICS_ITS_S_SIGN_NISTP256_PUBLIC_KEY := '020144E5174B0AFDA86BDB8B643B68D40030F5BDB9A9F090C64852CC3C20C9D5AD'O LibItsHttp_Pics.PICS_HEADER_HOST := "test.bsi.v2x-pilot.escrypt.com"
LibItsPki_Pics.PICS_ITS_S_CANONICAL_ID := '45545349504C55470000000000000000'O
LibItsPki_Pics.PICS_TS_EA_CERTIFICATE_ID := "CERT_ESCRYPT_EA" LibItsPki_Pics.PICS_HTTP_POST_URI_EC := "/ea/enrolment"
LibItsPki_Pics.PICS_TS_AA_CERTIFICATE_ID := "CERT_ESCRYPT_AA" LibItsPki_Pics.PICS_HTTP_POST_URI_AT := "/aa/authorize"
LibItsPki_Pics.PICS_HTTP_POST_URI_ATV := "/aa/authorize"
LibItsPki_Pics.PICS_ITS_S_SIGN_NITSP256_PRIVATE_KEY := '5C25F97607DFC62972A147FAD8B7A7C939569F0F95ECD4C641724A68B51836E5'O
LibItsPki_Pics.PICS_ITS_S_SIGN_NISTP256_PUBLIC_KEY := '020144E5174B0AFDA86BDB8B643B68D40030F5BDB9A9F090C64852CC3C20C9D5AD'O
LibItsPki_Pics.PICS_ITS_S_CANONICAL_ID := '45545349504C55470000000000000000'O
LibItsPki_Pics.PICS_TS_EA_CERTIFICATE_ID := "CERT_ESCRYPT_EA"
LibItsPki_Pics.PICS_TS_AA_CERTIFICATE_ID := "CERT_ESCRYPT_AA"
LibItsPki_Pixits.PX_VE_ALG := e_brainpool_p256_r1 LibItsPki_Pixits.PX_VE_ALG := e_brainpool_p256_r1
LibItsPki_Pixits.PX_EC_ALG := e_brainpool_p256_r1 LibItsPki_Pixits.PX_EC_ALG := e_brainpool_p256_r1
[LOGGING] [LOGGING]
# In this section you can specify the name of the log file and the classes of events # In this section you can specify the name of the log file and the classes of events
...@@ -119,7 +120,9 @@ LogEventTypes:= Yes ...@@ -119,7 +120,9 @@ LogEventTypes:= Yes
# time_offset : Time offset, used to skip packets with time offset < time_offset # time_offset : Time offset, used to skip packets with time offset < time_offset
# save_mode : 1 to save sent packet, 0 otherwise # save_mode : 1 to save sent packet, 0 otherwise
# Single GeoNetworking component port # Single GeoNetworkingPort component port
system.geoNetworkingPort.params := "GN(ll_address=4C5E0C14D2EA,latitude=43551050,longitude=10298730)/ETH(mac_src=080027500f9b)/PCAP(mac_src=080027500f9b,nic=eth2)"
# Single HTTP component port
system.httpPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TCP(server=test.bsi.v2x-pilot.escrypt.com,use_ssl=0)" system.httpPort.params := "HTTP(codecs=http_its:http_etsi_ieee1609dot2_codec)/TCP(server=test.bsi.v2x-pilot.escrypt.com,use_ssl=0)"
# PKI UpperTester port based on UDP # PKI UpperTester port based on UDP
......
...@@ -286,6 +286,8 @@ system.pkiPort.params := "PKI/HTTP(device_mode=1,uri=/its/inner_ec_request,host= ...@@ -286,6 +286,8 @@ system.pkiPort.params := "PKI/HTTP(device_mode=1,uri=/its/inner_ec_request,host=
# Security tests # Security tests
# Security Functions # Security Functions
#TestCodec_SecuredFuntions.tc_sha256_1 #TestCodec_SecuredFuntions.tc_sha256_1
#TestCodec_SecuredFuntions.tc_sha256_2
TestCodec_SecuredFuntions.tc_sha256_3
#TestCodec_SecuredFuntions.tc_sha384_1 #TestCodec_SecuredFuntions.tc_sha384_1
#TestCodec_SecuredFuntions.tc_f_generate_key_pair_1 #TestCodec_SecuredFuntions.tc_f_generate_key_pair_1
#TestCodec_SecuredFuntions.tc_f_generate_key_pair_2 #TestCodec_SecuredFuntions.tc_f_generate_key_pair_2
...@@ -332,7 +334,7 @@ system.pkiPort.params := "PKI/HTTP(device_mode=1,uri=/its/inner_ec_request,host= ...@@ -332,7 +334,7 @@ system.pkiPort.params := "PKI/HTTP(device_mode=1,uri=/its/inner_ec_request,host=
#TestCodec_SecuredFuntions.tc_read_certificate_1 #TestCodec_SecuredFuntions.tc_read_certificate_1
#TestCodec_SecuredFuntions.tc_read_certificate_2 #TestCodec_SecuredFuntions.tc_read_certificate_2
#TestCodec_SecuredFuntions.tc_read_certificate_digest #TestCodec_SecuredFuntions.tc_read_certificate_digest
TestCodec_SecuredFuntions.tc_read_certificate_hashed_id3 #TestCodec_SecuredFuntions.tc_read_certificate_hashed_id3
#TestCodec_SecuredFuntions.tc_read_certificate_hash #TestCodec_SecuredFuntions.tc_read_certificate_hash
# Encryption # Encryption
#TestCodec_SignedAndEncryptedMessages.tc_test_hmac_sha256_test1 #TestCodec_SignedAndEncryptedMessages.tc_test_hmac_sha256_test1
......
...@@ -173,6 +173,7 @@ do ...@@ -173,6 +173,7 @@ do
fi fi
cp ${TTCN_3_ORG_PATH}/$i/*.ttcn ${TTCN_3_DST_PATH}/$i/ttcn cp ${TTCN_3_ORG_PATH}/$i/*.ttcn ${TTCN_3_DST_PATH}/$i/ttcn
cp ${TTCN_3_ORG_PATH}/../etc/$i/*.cfg ${TTCN_3_DST_PATH}/$i/etc cp ${TTCN_3_ORG_PATH}/../etc/$i/*.cfg ${TTCN_3_DST_PATH}/$i/etc
cp ${TTCN_3_ORG_PATH}/../etc/$i/*.cfg_ ${TTCN_3_DST_PATH}/$i/etc
cp ${TTCN_3_ORG_PATH}/../docs/$i/o2.cfg ${TTCN_3_DST_PATH}/$i/docs cp ${TTCN_3_ORG_PATH}/../docs/$i/o2.cfg ${TTCN_3_DST_PATH}/$i/docs
done done
......
This diff is collapsed.
...@@ -36,7 +36,7 @@ module ItsPki_TestControl { ...@@ -36,7 +36,7 @@ module ItsPki_TestControl {
} }
} }
if (PICS_IUT_EA_ROLE or PICS_IUT_COMBINED_EA_AA_ROLE) { if (PICS_IUT_EA_ROLE) {
execute(TC_SECPKI_EA_ENR_RCV_01_BV()); execute(TC_SECPKI_EA_ENR_RCV_01_BV());
execute(TC_SECPKI_EA_ENR_RCV_02_BI()); execute(TC_SECPKI_EA_ENR_RCV_02_BI());
...@@ -53,20 +53,13 @@ module ItsPki_TestControl { ...@@ -53,20 +53,13 @@ module ItsPki_TestControl {
execute(TC_SECPKI_EA_ENR_11_BV()); execute(TC_SECPKI_EA_ENR_11_BV());
execute(TC_SECPKI_EA_ENR_12_BV()); execute(TC_SECPKI_EA_ENR_12_BV());
if (not PICS_IUT_COMBINED_EA_AA_ROLE) { execute(TC_SECPKI_EA_AUTHVAL_RCV_01_BV());
execute(TC_SECPKI_EA_AUTHVAL_RCV_01_BV()); execute(TC_SECPKI_EA_AUTHVAL_RCV_02_BI());
execute(TC_SECPKI_EA_AUTHVAL_RCV_02_BI());
}
} }
if (PICS_IUT_COMBINED_EA_AA_ROLE) {
execute(TC_SECPKI_SND_EA_AA_BV_01());
}
if (PICS_IUT_AA_ROLE) { if (PICS_IUT_AA_ROLE) {
execute(TC_SECPKI_SND_AA_BV_01()); execute(TC_SECPKI_AA_AUTH_RCV_01_BV());
execute(TC_SECPKI_SND_AA_BV_02()); }
execute(TC_SECPKI_SND_AA_BV_03());
}
} // End of 'control' statement } // End of 'control' statement
......
Subproject commit 4f503327e80ec1096c8d4396a5c7da2b718d684a Subproject commit cdcc7f0f5bc5c590db75ec4e106697e81106efbf
...@@ -199,6 +199,21 @@ module TestCodec_SecuredFuntions { ...@@ -199,6 +199,21 @@ module TestCodec_SecuredFuntions {
} }
} // End of testcase tc_sha256_2 } // End of testcase tc_sha256_2
testcase tc_sha256_3() runs on TCType system TCType {
var octetstring v_test := '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'O;
var Oct16 v_exp_hash := 'BFB2998BBC413736505B4AA5F6B8FC4A'O;
var Oct32 v_hash;
v_hash := f_hashWithSha256(v_test);
log(match(substr(v_hash, 0, 16), v_exp_hash));
if (match(substr(v_hash, 0, 16), v_exp_hash) == false) {
setverdict(fail);
} else {
setverdict(pass);
}
} // End of testcase tc_sha256_2
testcase tc_sha384_1() runs on TCType system TCType { testcase tc_sha384_1() runs on TCType system TCType {
var octetstring v_test := '616263'O; var octetstring v_test := '616263'O;
var Oct48 v_exp_hash := 'CB00753F45A35E8BB5A03D699AC65007272C32AB0EDED1631A8B605A43FF5BED8086072BA1E7CC2358BAECA134C825A7'O; var Oct48 v_exp_hash := 'CB00753F45A35E8BB5A03D699AC65007272C32AB0EDED1631A8B605A43FF5BED8086072BA1E7CC2358BAECA134C825A7'O;
......
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment