Commit b1937862 authored by garciay's avatar garciay
Browse files

STF507: Remove TODOs/FIXMEs

parent 01a180c2
......@@ -483,7 +483,7 @@ module ItsSecurity_TestCases {
* </pre>
*
* @see ETSI TS 103 096-2 v1.2.2 TC_SEC_ITSS_SND_CAM_01_01_BV
* @reference ETSI TS 103 097 [1], clause 5.4 and 7.1
* @reference ETSI TS 103 097 [1], clause 5.1
*/
testcase TC_SEC_ITSS_SND_CAM_01_01_BV() runs on ItsGeoNetworking system ItsSecSystem {
......@@ -572,7 +572,7 @@ module ItsSecurity_TestCases {
* </pre>
*
* @see ETSI TS 103 096-2 v1.2.2 TP_SEC_ITSS_SND_CAM_02_01_BV
* @reference ETSI TS 103 097 [1], clause 7.1
* @reference ETSI TS 103 097 [1], clause 6.3
*/
testcase TC_SEC_ITSS_SND_CAM_02_01_BV() runs on ItsGeoNetworking system ItsSecSystem {
......@@ -630,7 +630,6 @@ module ItsSecurity_TestCases {
for (var integer v_counter := 1; v_counter < lengthof(v_headersFields); v_counter := v_counter + 1) {
// Check forbidden header
// FIXME: 'generation_time_with_confidence' does not exist. is it e_generation_time_standard_deviation ?
if (match(v_headersFields[v_counter].type_, e_generation_time_standard_deviation)) {
log("*** " & testcasename() & ": FAIL: Forbidden header present");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_error);
......@@ -670,145 +669,6 @@ module ItsSecurity_TestCases {
f_cf01Down();
} // End of testcase TC_SEC_ITSS_SND_CAM_02_01_BV
// TODO To be removed
// /**
// * @desc Check that the secured CAM contains in the normal case the signer_info field of type certificate_digest_with_sha256
// * <pre>
// * Pics Selection: none
// * Config Id: CF01
// * Initial conditions:
// * with {
// * the IUT being in the 'authorized' state
// * and the IUT is configured to send more than one CAM per second
// * and the IUT having sent last CAM
// * containing header_fields['signer_info'].signer.type
// * indicating 'certificate'
// * }
// * ensure that {
// * when {
// * the IUT is requested to send next CAM
// * } then {
// * the IUT sends a SecuredMessage
// * containing header_fields['signer_info'] {
// * containing signer
// * containing type
// * indicating 'certificate_digest_with_sha256'
// * containing digest
// * containing header_fields['its_aid']
// * indicating 'AID_CAM'
// * }
// * }
// * }
// * </pre>
// *
// * @see FIXME - test case is not part of ETSI TS 103 096-2 v1.2.2
// * @reference ETSI TS 103 097 V1.1.15, clause 7.1
// */
// testcase TC_SEC_ITSS_SND_CAM_04_01_BV() runs on ItsGeoNetworking system ItsSecSystem {
//
// // Local variables
// var integer v_cntCert := 0;
// var integer v_cntDigest := 0;
// var integer v_cntTimeLimit := float2int(PX_TAC);
//
// var ItsCam v_component;
//
// // Test control
// if (not(PICS_GN_SECURITY)) {
// log("*** " & testcasename() & ":ERROR: 'PICS_GN_SECURITY' required for executing the TC ***");
// stop;
// }
//
// // Test component configuration
// f_cf01Up();
//
// // Test adapter configuration
//
// // Preamble
// f_prNeighbour();
// geoNetworkingPort.clear;
// v_component := f_setCamFrequencyGreatherThan1Hz();
// tc_ac.start;
// alt {
// [] geoNetworkingPort.receive(
// mw_geoNwInd(
// mw_geoNwSecPdu(
// mdw_securedMessage_CAMs(
// mw_header_field_signer_info_certificate
// )))) {
// tc_ac.stop;
// log("*** " & testcasename() & ": INFO: Initial conditions: First CAM message with certificate received ***");
// f_selfOrClientSyncAndVerdictPreamble(c_prDone, e_success);
// }
// [] tc_ac.timeout {
// log("*** " & testcasename() & ": INCONC: Initial conditions: CAM message with certificate not received ***");
// f_selfOrClientSyncAndVerdictPreamble("error", e_timeout);
// }
// }
//
// // Test Body
// tc_ac.start;
// alt {
// [] geoNetworkingPort.receive(
// mw_geoNwInd(
// mw_geoNwSecPdu(
// mdw_securedMessage_CAMs(
// mw_header_field_signer_info_certificate
// )))) {
// v_cntCert := v_cntCert + 1;
// repeat;
// }
// [] geoNetworkingPort.receive(
// mw_geoNwInd(
// mw_geoNwSecPdu(
// mdw_securedMessage_CAMs(
// mw_header_field_signer_info_digest
// )))) {
// v_cntDigest := v_cntDigest + 1;
// repeat;
// }
// [] geoNetworkingPort.receive(
// mw_geoNwInd(
// mw_geoNwSecPdu(
// mdw_securedMessage_CAMs
// ))) {
// log("*** " & testcasename() & ": FAIL: Neither Certificate not Digest in received CAM ***");
// f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_error);
// }
// [] tc_ac.timeout {
// if (v_cntCert + v_cntDigest == 0 ){
//
// log("*** " & testcasename() & ": INCONC: Expected CAM not received ***");
// f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_timeout);
//
// }else{
//
// log("*** " & testcasename() & ": INFO: Data accumulation time finished ***");
//
// if (v_cntCert + v_cntDigest <= v_cntTimeLimit * 2 ){
// log("*** " & testcasename() & ": INCONC: The CAM frequency is too small ("
// & int2str((v_cntCert + v_cntDigest)/v_cntTimeLimit)
// & " per sec) ***");
// f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_timeout);
//
// } else if (f_abs(v_cntCert - v_cntTimeLimit) > 2){
// log("*** " & testcasename() & ": FAIL: Digests are not as frequant as expected ***");
// f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_error);
//
// } else {
// log("*** " & testcasename() & ": OK: Digests have been sent in normal case in high CAM frequency ***");
// f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_success);
// }
// }
// }
// } // End of 'alt' statement
//
// // Postamble
// f_terminateCam(v_component);
// f_poNeighbour();
// f_cf01Down();
// } // End of testcase TC_SEC_ITSS_SND_CAM_04_01_BV
//
/**
* @desc Check that the secured CAM contains the signer_info field of certificate when over the time of one
* second no other SecuredMessage contained a signer_info of type certificate.
......@@ -842,7 +702,7 @@ module ItsSecurity_TestCases {
* </pre>
*
* @see ETSI TS 103 096-2 v1.2.2 TP_SEC_ITSS_SND_CAM_05_01_BV
* @reference ETSI TS 103 097 [1], clause 7.1
* @reference ETSI TS 103 097 [1], clause 6.3
*/
testcase TC_SEC_ITSS_SND_CAM_05_01_BV() runs on ItsGeoNetworking system ItsSecSystem {
......@@ -978,7 +838,7 @@ module ItsSecurity_TestCases {
* </pre>
*
* @see ETSI TS 103 096-2 v1.2.2 TP_SEC_ITSS_SND_CAM_05_02_BV
* @reference ETSI TS 103 097 [1], clause 7.1
* @reference ETSI TS 103 097 [1], clause 4.2.9
*/
testcase TC_SEC_ITSS_SND_CAM_05_02_BV() runs on ItsGeoNetworking system ItsSecSystem {
// Local variables
......@@ -1110,7 +970,7 @@ module ItsSecurity_TestCases {
* </pre>
*
* @see ETSI TS 103 096-2 v1.2.2 TP_SEC_ITSS_SND_CAM_06_01_BV
* @reference ETSI TS 103 097 [1], clause 7.1
* @reference ETSI TS 103 097 [1], clauses 5.4 and 7.1
*/
testcase TC_SEC_ITSS_SND_CAM_06_01_BV() runs on ItsGeoNetworking system ItsSecSystem {
......@@ -1799,91 +1659,6 @@ module ItsSecurity_TestCases {
f_cf01Down();
} // End of testcase TC_SEC_ITSS_SND_CAM_10_01_BV
// TODO To be removed
// /**
// * @desc Check that the sent Secured CAM contains exactly one HeaderField its_aid that is set to 'AID_CAM'
// * <pre>
// * Pics Selection: PICS_GN_SECURITY
// * Config Id: CF01
// * Initial conditions:
// * with {
// * the IUT being in the 'authorized' state
// * }
// * ensure that {
// * when {
// * the IUT is requested to send CAM
// * } then {
// * the IUT sends a SecuredMessage {
// * containing header_fields ['its_aid'] {
// * containing its_aid
// * indicating 'AID_CAM' (36)
// * }
// * }
// * }
// * }
// * </pre>
// *
// * @see ETSI TS 103 096-2 v1.2.2 TP_SEC_ITSS_SND_CAM_11_01_BV
// * @reference ETSI TS 103 097 [1], clauses 5.4 and 7.1
// */
// testcase TC_SEC_ITSS_SND_CAM_11_01_BV() runs on ItsGeoNetworking system ItsSecSystem {
// // Local variables
//
// // Test control
// if (not(PICS_GN_SECURITY)) {
// log("*** " & testcasename() & ":ERROR: 'PICS_GN_SECURITY' required for executing the TC ***");
// stop;
// }
//
// // Test component configuration
// f_cf01Up();
//
// // Test adapter configuration
//
// // Preamble
// f_prNeighbour();
// f_selfOrClientSyncAndVerdictPreamble(c_prDone, e_success);
//
// // Test Body
// tc_ac.start;
// alt {
// [] geoNetworkingPort.receive(
// mw_geoNwInd(
// mw_geoNwSecPdu(
// mdw_securedMessage_CAMs,
// mw_geoNwPduWithPayload(
// ?,
// ?,
// mw_secCamPayload).packet
// ))) {
// tc_ac.stop;
// log("*** " & testcasename() & ": PASS: CAM received as message_type 2");
// f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_success);
// }
// [] geoNetworkingPort.receive(
// mw_geoNwInd(
// mw_geoNwSecPdu(
// mdw_securedMessage_dummy,
// mw_geoNwPduWithPayload(
// ?,
// ?,
// mw_secCamPayload).packet
// ))) {
// tc_ac.stop;
// log("*** " & testcasename() & ": FAIL: CAM received with different message_type");
// f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_error);
// }
// [] tc_ac.timeout {
// log("*** " & testcasename() & ": INCONC: Expected CAM not received ***");
// f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_timeout);
// }
// } // End of 'alt' statement
//
// // Postamble
// f_poNeighbour();
// f_cf01Down();
// } // End of testcase TC_SEC_ITSS_SND_CAM_11_01_BV
//
/**
* @desc Check that the IUT sends certificate request when it receives a message from unknown station
* <pre>
......@@ -2224,7 +1999,7 @@ module ItsSecurity_TestCases {
* }
* </pre>
* @see ETSI TS 103 096-2 v1.2.2 TP_SEC_ITSS_SND_DENM_01_01_BV
* @reference ETSI TS 103 097 [1], clause 5.4 and 7.2
* @reference ETSI TS 103 097 [1], clauses 5.4 and 7.2
*/
testcase TC_SEC_ITSS_SND_DENM_01_01_BV() runs on ItsGeoNetworking system ItsSecSystem {
// Local variables
......@@ -2380,7 +2155,6 @@ module ItsSecurity_TestCases {
v_previousHeaderType := enum2int(v_headersFields[0].type_);
for (var integer v_counter := 1; v_counter < lengthof(v_headersFields); v_counter := v_counter + 1) {
// Check forbidden header
// FIXME: 'generation_time_with_confidence' does not exist. is it e_generation_time_standard_deviation ?
if (match(v_headersFields[v_counter].type_, e_generation_time_standard_deviation)) {
log("*** " & testcasename() & ": FAIL: Forbidden header present");
f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_error);
......@@ -3201,92 +2975,6 @@ module ItsSecurity_TestCases {
f_cf01Down();
} // End of testcase TC_SEC_ITSS_SND_DENM_05_06_BV
// TODO To be removed
// /**
// * @desc Check that the sent Secured DENM contains exactly one HeaderField its_aid that is set to 'AID_DENM'
// * <pre>
// * Pics Selection: PICS_GN_SECURITY
// * Config Id: CF01
// * Initial conditions:
// * with {
// * the IUT being in the 'authorized' state
// * }
// * Expected results:
// * ensure that {
// * when {
// * the IUT is requested to send a DENM
// * } then {
// * the IUT sends a SecuredMessage {
// * containing header_fields ['its_aid'] {
// * containing its_aid
// * indicating 'AID_DENM' (37)
// * }
// * }
// * }
// * }
// * </pre>
// * @see ETSI TS 103 096-2 v1.2.2 TP_SEC_ITSS_SND_DENM_06_01_BV
// * @reference ETSI TS 103 097 [1], clauses 5.4 and 7.2
// */
// testcase TC_SEC_ITSS_SND_DENM_06_01_BV() runs on ItsGeoNetworking system ItsSecSystem {
// // Local variables
// var ItsDenm v_denmComponent;
//
// // Test control
// if (not(PICS_GN_SECURITY)) {
// log("*** " & testcasename() & ":ERROR: 'PICS_GN_SECURITY' required for executing the TC ***");
// stop;
// }
//
// // Test component configuration
// f_cf01Up();
//
// // Test adapter configuration
//
// // Preamble
// f_prNeighbour();
// f_selfOrClientSyncAndVerdictPreamble(c_prDone, e_success);
//
// // Test Body
// v_denmComponent := f_triggerDenmEvent();
// tc_ac.start;
// alt {
// [] geoNetworkingPort.receive(
// mw_geoNwInd(
// mw_geoNwSecPdu(
// mdw_securedMessage_DENMs
// ))) {
// log("*** " & testcasename() & ": PASS: DENM ITS AID is right");
// f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_success);
// }
// [] geoNetworkingPort.receive(
// mw_geoNwInd(
// mw_geoNwSecPdu(
// mdw_securedMessage_CAMs
// ))) {
// log("*** " & testcasename() & ": INFO: Skip CAM");
// repeat;
// }
// [] geoNetworkingPort.receive(
// mw_geoNwInd(
// mw_geoNwSecPdu(
// mdw_securedMessage
// ))) {
// log("*** " & testcasename() & ": FAIL: DENM ITS AID is wrong");
// f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_error);
// }
// [] tc_ac.timeout {
// log("*** " & testcasename() & ": INCONC: Expected DENM not received ***");
// f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_timeout);
// }
// } // End of 'alt' statement
//
// // Postamble
// f_cancelDenmEvent(v_denmComponent);
// f_poNeighbour();
// f_cf01Down();
// } // End of testcase TC_SEC_ITSS_SND_DENM_06_01_BV
//
/**
* @desc Check that the Secured DENM contains exactly one non-empty payload of type signed
* <pre>
......@@ -5651,223 +5339,6 @@ module ItsSecurity_TestCases {
f_cf01Down();
} // End of testcase TC_SEC_ITSS_SND_CERT_06_02_BV
// TODO To be removed
// /**
// * @desc Check Identified Region:
// * Must contain value that correspond to numeric country codes as defined by United Nations Statistics Division
// * <pre>
// * Pics Selection: PICS_GN_SECURITY and PICS_USE_IDENTIFIED_REGION and PICS_USE_UN_STATS_REGION_DICTIONARY and PICS_CERTIFICATE_SELECTION
// * Config Id: CF01
// * with {
// * the IUT being in the 'authorized' state
// * the IUT being requested to include certificate in the next CAM
// * } ensure that {
// * when {
// * the IUT is requested to send a CAM
// * } then {
// * the IUT sends a SecuredMessage
// * containing header_fields['signer_info'].signer {
// * containing type
// * indicating 'certificate'
// * containing certificate {
// * containing validity_restrictions['region']{
// * containing region_type
// * indicating 'id'
// * containing id_region {
// * containing region_dictionary
// * indicating 'un_stats' (0)
// * containing region_dictionary
// * indicating 'un_stats' (0)
// * indicating length >=3 and <=12
// * indicating continuous region without holes and intersections
// * }
// * }
// * }
// * }
// * }
// * }
// * </pre>
// * @see ETSI TS 103 096-2 v1.2.2 TP_SEC_ITSS_SND_CERT_06_03_BV
// * @reference ETSI TS 103 097 [1], clause 4.2.26
// */
// testcase TC_SEC_ITSS_SND_CERT_06_03() runs on ItsGeoNetworking system ItsSecSystem {
// var Certificate v_cert;
// var ValidityRestriction v_vr;
// var integer v_counter;
//
// // Test control
// if (not(PICS_GN_SECURITY) or not(PICS_USE_IDENTIFIED_REGION) or not(PICS_USE_UN_STATS_REGION_DICTIONARY) or not(PICS_CERTIFICATE_SELECTION)) {
// log("*** " & testcasename() & ":ERROR: 'PICS_GN_SECURITY and PICS_USE_UN_STATS_REGION_DICTIONARY and PICS_USE_ISO31661_REGION_DICTIONARY and PICS_CERTIFICATE_SELECTION' required for executing the TC ***");
// stop;
// }
//
// // Test component configuration
// vc_hashedId8ToBeUsed := cc_iutCert_E;
// f_cf01Up();
//
// // Test adapter configuration
//
// // Preamble
// f_prNeighbour();
// f_selfOrClientSyncAndVerdictPreamble(c_prDone, e_success);
//
// // Test body
// tc_ac.start;
// f_waitForCertificate(v_cert);
// tc_ac.stop;
// if (f_getCertificateValidityRestriction(v_cert, e_region, v_vr)) {
// if (v_vr.validity.region.region_type == e_id) {
// if (not match (v_vr.validity.region, mw_geographicRegion_identified(mw_identifiedRegion_un_stats_any))) {
// log("*** " & testcasename() & ": FAIL: Identified region is not the UN Stats Region Code ***");
// f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_error);
// }
// }
// log("*** " & testcasename() & ": PASS: Certificate has a valid identified region restrictions ***");
// f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_success);
// } else {
// log("*** " & testcasename() & ": PASS: Certificate doesn't have any location restrictions ***");
// f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_success);
// }
//
// // Postamble
// f_poNeighbour();
// f_cf01Down();
// } // End of testcase TC_SEC_ITSS_SND_CERT_06_03
//
// /**
// * @desc Check Identified Region:
// * Must contain value that correspond to numeric country codes as defined by United Nations Statistics Division
// * Subordinate certificate restrictions must be a subset of the issuing certificate restrictions
// * <pre>
// * Pics Selection: PICS_GN_SECURITY and PICS_USE_IDENTIFIED_REGION and PICS_USE_UN_STATS_REGION_DICTIONARY and PICS_CERTIFICATE_SELECTION
// * Config Id: CF01
// * with {
// * the IUT being in the 'authorized' state
// * the IUT being requested to include certificate chain in the next CAM
// * } ensure that {
// * when {
// * the IUT is requested to send a CAM
// * } then {
// * the IUT sends a SecuredMessage
// * containing header_fields['signer_info'].signer {
// * containing type
// * indicating 'certificate_chain'
// * containing certificates
// * indicating CERTIFICATES {
// * containing CERTIFICATES[0] {
// * containing validity_restrictions['region'] {
// * containing region_type
// * indicating 'id'
// * containing id_region {
// * containing region_dictionary
// * indicating 'un_stats' (1)
// * containing region_identifier
// * indicating valid value according to UnStats document
// * containing local_region
// *
// * }
// * }
// * containing CERTIFICATES[n] (1..N) {
// * containing no validity restriction of type region or validity_restrictions['region'] {
// * containing region_type
// * indicating 'id'
// * containing id_region
// * containing region_dictionary
// * indicating 'un_stats' (1)
// * containing region_identifier
// * indicating CERTIFICATES[n-1].validity_restrictions['region'].id_region.region_identifier
// * containing local_region
// * indicating CERTIFICATES[n-1].validity_restrictions['region'].id_region.local_region
// * or any value if CERTIFICATES[n-1].validity_restrictions['region'].id_region.local_region == 0
// * }
// * }
// * }
// * }
// * }
// * }
// * }
// * </pre>
// * @see ETSI TS 103 096-2 v1.2.2 TP_SEC_ITSS_SND_CERT_06_04_BV
// * @reference ETSI TS 103 097 [1], clause 4.2.26
// */
// testcase TC_SEC_ITSS_SND_CERT_06_04() runs on ItsGeoNetworking system ItsSecSystem {
// var CertificateChain v_chain;
// var ValidityRestriction v_vr := valueof(m_validity_restriction_unknown), v_vri := valueof(m_validity_restriction_unknown); // current and issuing cert validity restrictions
// var boolean f_vr := false, f_vri := false;
//
// // Test control
// if (not(PICS_GN_SECURITY) or not(PICS_USE_IDENTIFIED_REGION) or not(PICS_USE_UN_STATS_REGION_DICTIONARY) or not(PICS_CERTIFICATE_SELECTION)) {
// log("*** " & testcasename() & ":ERROR: 'PICS_GN_SECURITY and PICS_USE_UN_STATS_REGION_DICTIONARY and PICS_USE_ISO31661_REGION_DICTIONARY and PICS_CERTIFICATE_SELECTION' required for executing the TC ***");
// stop;
// }
//
// // Test component configuration
// vc_hashedId8ToBeUsed := cc_iutCert_E;
// f_cf01Up();
//
// // Test adapter configuration
//
// // Preamble
// f_prNeighbour();
// log("*** " & testcasename() & ": INFO: Request and waiting for the message containing certificate chain ***");
// tc_ac.start;
// if (not f_askAndWaitForCertificateChain(v_chain, f_generateDefaultCam())) {
// log("*** " & testcasename() & ": INCONC: Expected message not received ***");
// f_selfOrClientSyncAndVerdictPreamble(c_tbDone, e_timeout);
// } else {
// f_selfOrClientSyncAndVerdictPreamble(c_prDone, e_success);
// }
//
// // Test Body
// f_vr := false;
// tc_ac.stop;
// for (var integer v_counter := 0; v_counter < lengthof(v_chain); v_counter := v_counter + 1) {
// v_vri := v_vr;
// f_vri := f_vr;
// f_vr := f_getCertificateValidityRestriction(v_chain[v_counter], e_region, v_vr);
//
// if (f_vr) {
// if (v_vr.validity.region.region_type == e_id) {
// if (not match (v_vr.validity.region, mw_geographicRegion_identified(mw_identifiedRegion_un_stats_any))) {
// log("*** " & testcasename() & ": FAIL: Identified region is not the UN Stats Region Code ***");
// f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_error);
// }
// }
//
// if (f_vri) {
// // the region code must be the same
// if (v_vr.validity.region.region.id_region.region_identifier !=
// v_vri.validity.region.region.id_region.region_identifier) {
// log("*** " & testcasename() & ": FAIL: Certificate validity restriction identified region in cert " & int2str(v_counter) & " is not the same as in the issuing one ***");
// f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_error);
// }
// if ( v_vri.validity.region.region.id_region.local_region != 0
// and v_vri.validity.region.region.id_region.local_region != v_vr.validity.region.region.id_region.local_region
// and not f_isIdentifiedRegionInside(v_vri.validity.region.region.id_region.local_region, v_vr.validity.region.region.id_region.local_region)
// ) {
// log("*** " & testcasename() & ": FAIL: Certificate validity restriction local identified region in cert " & int2str(v_counter) & " is not the subregion of the issuing one ***");
// f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_error);
// }
// }
//
// } else {
// // Region validity restriction is not exist
// if (f_vri) {
// log("*** " & testcasename() & ": FAIL: Certificate validity restriction identified region must be set in the certificate " & int2str(v_counter) &
// "because this restriction exists in the issuing certificate ***");
// f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_error);
// }
// }
// }
// log("*** " & testcasename() & ": PASS: All certificates has a valid identified region restrictions ***");
// f_selfOrClientSyncAndVerdictTestBody(c_tbDone, e_success);
//
// // Postamble
// f_poNeighbour();
// f_cf01Down();
//
// } // End of testcase TC_SEC_ITSS_SND_CERT_06_04
//
/**
* @desc Check that the region of the subordinate certificate validity restriction is inside the region of the issuing certificate validity restriction
* <pre>
......@@ -7335,7 +6806,99 @@ module ItsSecurity_TestCases {
f_cf01Down();
} // End of testcase TC_SEC_ITSS_SND_CERT_AA_03_01_BV
// TODO Add TC_SEC_ITSS_SND_CERT_AA_04_01_BV
/**
* @desc Check that AA certificate is signed by Root CA or other authority
* @remark There is no clear specification that AA cert shall be signed by the Root CA only
* <pre>
* Pics Selection: PICS_GN_SECURITY
* Config Id: CF01
* with {
* the IUT being in the 'authorized' state