loggers::get_instance().log("http_codec::encode_request: HTTP body field not present");
loggers::get_instance().log("http_codec::encode_response: HTTP body field not present");
_ec.length=0;
_ec.is_content_length_present=0x00;
}
// Encode Content-Length header
p_encoding_buffer.put_cs("Content-Length: ");
if(_ec.length!=0){
p_encoding_buffer.put_cs(int2str(_ec.length+2/*Stand for the last CRLF*/));
loggers::get_instance().log("http_codec::encode_request: Content-Length: %s",static_cast<constchar*>(int2str(_ec.length+2/*Stand for the last CRLF*/)));
p_encoding_buffer.put_cs(static_cast<constchar*>(int2str(_ec.length+2/*Stand for the last CRLF*/)));
# Check that IUT sends an enrolment request when triggered.
ItsPki_TestCases.TC_SECPKI_ITSS_ENR_01_BV
# If the enrolment request of the IUT is an initial enrolment request, the itsId (contained in the InnerECRequest) shall be set to the canonical identifier, the signer (contained in the outer EtsiTs1030971Data-Signed) shall be set to self and the outer signature shall be computed using the canonical private key.
#ItsPki_TestCases.TC_SECPKI_ITSS_ENR_02_BV
# In presence of a valid EC, the enrolment request of the IUT is a rekeying enrolment request with the itsId (contained in the InnerECRequest) and the SignerIdentifier (contained in the outer EtsiTs1030971Data-Signed) both declared as digest containing the HashedId8 of the EC and the outer signature computed using the current valid EC private key corresponding to the verification public key.