Skip to content
GitLab
Projects
Groups
Snippets
/
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Sign in
Toggle navigation
Menu
Open sidebar
ITS - Intelligent Transport Systems
ITS
Commits
e93663dc
Commit
e93663dc
authored
Nov 08, 2018
by
Denis Filatov
Browse files
Merge branch 'STF525' of
https://forge.etsi.org/gitlab/ITS/ITS
into STF525
parents
2a465d36
fe5140eb
Changes
61
Hide whitespace changes
Inline
Side-by-side
.TITAN_properties
View file @
e93663dc
...
...
@@ -3,7 +3,6 @@
<ActiveConfiguration>
Default
</ActiveConfiguration>
<ProjectProperties>
<MakefileSettings>
<incrementalDependencyRefresh>
false
</incrementalDependencyRefresh>
<functiontestRuntime>
true
</functiontestRuntime>
<targetExecutable>
bin/TSITS
</targetExecutable>
<TTCN3preprocessorDefines>
...
...
@@ -86,6 +85,13 @@
<ExcludeFromBuild>
true
</ExcludeFromBuild>
</FolderProperties>
</FolderResource>
<FolderResource>
<FolderPath>
html
</FolderPath>
<FolderProperties>
<CentralStorage>
false
</CentralStorage>
<ExcludeFromBuild>
true
</ExcludeFromBuild>
</FolderProperties>
</FolderResource>
<FolderResource>
<FolderPath>
javasrc
</FolderPath>
<FolderProperties>
...
...
@@ -318,13 +324,25 @@
</FileProperties>
</FileResource>
<FileResource>
<FilePath>
ccsrc/Ports/LibIts_ports/Pki_ports/AdapterControlPort_Pki.partC
</FilePath>
<FilePath>
ccsrc/Ports/LibIts_ports/Pki_ports/AdapterControlPkiPort.cc
</FilePath>
<FileProperties>
<ExcludeFromBuild>
true
</ExcludeFromBuild>
</FileProperties>
</FileResource>
<FileResource>
<FilePath>
ccsrc/Ports/LibIts_ports/Pki_ports/AdapterControlPkiPort.hh
</FilePath>
<FileProperties>
<ExcludeFromBuild>
true
</ExcludeFromBuild>
</FileProperties>
</FileResource>
<FileResource>
<FilePath>
ccsrc/Ports/LibIts_ports/Pki_ports/UpperTesterPort_Pki.partC
</FilePath>
<FileProperties>
<ExcludeFromBuild>
true
</ExcludeFromBuild>
</FileProperties>
</FileResource>
<FileResource>
<FilePath>
ccsrc/Ports/LibIts_ports/Pki_ports/
AdapterControl
Port_Pki.partH
</FilePath>
<FilePath>
ccsrc/Ports/LibIts_ports/Pki_ports/
UpperTester
Port_Pki.partH
</FilePath>
<FileProperties>
<ExcludeFromBuild>
true
</ExcludeFromBuild>
</FileProperties>
...
...
@@ -336,7 +354,7 @@
</FileProperties>
</FileResource>
<FileResource>
<FilePath>
ttcn/LibIts/asn1/Security/TS102921/EtsiTs102941Messages
CA
.asn
</FilePath>
<FilePath>
ttcn/LibIts/asn1/Security/TS102921/EtsiTs102941Messages
Itss
.asn
</FilePath>
<FileProperties>
<ExcludeFromBuild>
true
</ExcludeFromBuild>
</FileProperties>
...
...
ccsrc/EncDec/LibItsPki_Encdec.cc
View file @
e93663dc
...
...
@@ -3,12 +3,16 @@
#include
"etsi_ts102941_data.hh"
#include
"etsi_ts102941_types_enrolment_inner_request.hh"
#include
"etsi_ts102941_types_enrolment_inner_response.hh"
#include
"etsi_ts102941_types_authorization_inner_request.hh"
#include
"etsi_ts102941_types_authorization_inner_response.hh"
#include
"etsi_ts102941_types_authorization_shared_at_request.hh"
#include
"etsi_ts102941_types_authorization_validation_request.hh"
#include
"loggers.hh"
namespace
LibItsPki__EncdecDeclarations
{
BITSTRING
fx__enc__EtsiTs102941Data
(
const
EtsiTs102941Messages
Itss
::
EtsiTs102941Data
&
p_etsi_ts_102941_data
)
{
BITSTRING
fx__enc__EtsiTs102941Data
(
const
EtsiTs102941Messages
Ca
::
EtsiTs102941Data
&
p_etsi_ts_102941_data
)
{
loggers
::
get_instance
().
log_msg
(
">>> fx__enc__EtsiTs102941Data: "
,
p_etsi_ts_102941_data
);
etsi_ts102941_data
codec
;
...
...
@@ -21,7 +25,7 @@ namespace LibItsPki__EncdecDeclarations {
return
oct2bit
(
os
);
}
INTEGER
fx__dec__EtsiTs102941Data
(
BITSTRING
&
b
,
EtsiTs102941Messages
Itss
::
EtsiTs102941Data
&
p_etsi_ts_102941_data
)
{
INTEGER
fx__dec__EtsiTs102941Data
(
BITSTRING
&
b
,
EtsiTs102941Messages
Ca
::
EtsiTs102941Data
&
p_etsi_ts_102941_data
)
{
loggers
::
get_instance
().
log_msg
(
">>> fx__dec__EtsiTs102941Data: "
,
b
);
etsi_ts102941_data
codec
;
...
...
@@ -87,5 +91,113 @@ namespace LibItsPki__EncdecDeclarations {
loggers
::
get_instance
().
log_msg
(
"<<< fx__dec__InnerEcResponse: "
,
p_inner_response
);
return
0
;
}
BITSTRING
fx__enc__InnerAtRequest
(
const
EtsiTs102941TypesAuthorization
::
InnerAtRequest
&
p_inner_request
)
{
loggers
::
get_instance
().
log_msg
(
">>> fx_enc_InnerAtRequest: "
,
p_inner_request
);
etsi_ts102941_types_authorization_inner_request
codec
;
OCTETSTRING
os
;
if
(
codec
.
encode
(
p_inner_request
,
os
)
==
-
1
)
{
loggers
::
get_instance
().
warning
(
"fx_enc_InnerAtRequest: -1 result code was returned"
);
return
int2bit
(
0
,
1
);
}
return
oct2bit
(
os
);
}
INTEGER
fx__dec__InnerAtRequest
(
BITSTRING
&
b
,
EtsiTs102941TypesAuthorization
::
InnerAtRequest
&
p_inner_request
)
{
loggers
::
get_instance
().
log_msg
(
">>> fx__dec__InnerAtRequest: "
,
b
);
etsi_ts102941_types_authorization_inner_request
codec
;
OCTETSTRING
is
=
bit2oct
(
b
);
if
(
codec
.
decode
(
is
,
p_inner_request
)
==
-
1
)
{
loggers
::
get_instance
().
warning
(
"fx__dec__InnerAtRequest: -1 result code was returned"
);
return
-
1
;
}
loggers
::
get_instance
().
log_msg
(
"<<< fx__dec__InnerAtRequest: "
,
p_inner_request
);
return
0
;
}
BITSTRING
fx__enc__InnerAtResponse
(
const
EtsiTs102941TypesAuthorization
::
InnerAtResponse
&
p_inner_response
)
{
loggers
::
get_instance
().
log_msg
(
">>> fx__enc__InnerAtResponse: "
,
p_inner_response
);
etsi_ts102941_types_authorization_inner_response
codec
;
OCTETSTRING
os
;
if
(
codec
.
encode
(
p_inner_response
,
os
)
==
-
1
)
{
loggers
::
get_instance
().
warning
(
"fx__enc__InnerAtResponse: -1 result code was returned"
);
return
int2bit
(
0
,
1
);
}
return
oct2bit
(
os
);
}
INTEGER
fx__dec__InnerAtResponse
(
BITSTRING
&
b
,
EtsiTs102941TypesAuthorization
::
InnerAtResponse
&
p_inner_response
)
{
loggers
::
get_instance
().
log_msg
(
">>> fx__dec__InnerAtResponse: "
,
b
);
etsi_ts102941_types_authorization_inner_response
codec
;
OCTETSTRING
is
=
bit2oct
(
b
);
if
(
codec
.
decode
(
is
,
p_inner_response
)
==
-
1
)
{
loggers
::
get_instance
().
warning
(
"fx__dec__InnerAtResponse: -1 result code was returned"
);
return
-
1
;
}
loggers
::
get_instance
().
log_msg
(
"<<< fx__dec__InnerAtResponse: "
,
p_inner_response
);
return
0
;
}
BITSTRING
fx__enc__SharedAtRequest
(
EtsiTs102941TypesAuthorization
::
SharedAtRequest
const
&
p_shared_at
)
{
loggers
::
get_instance
().
log_msg
(
">>> fx__enc__SharedAtRequest: "
,
p_shared_at
);
etsi_ts102941_types_authorization_shared_at_request
codec
;
OCTETSTRING
os
;
if
(
codec
.
encode
(
p_shared_at
,
os
)
==
-
1
)
{
loggers
::
get_instance
().
warning
(
"fx__enc__SharedAtRequest: -1 result code was returned"
);
return
int2bit
(
0
,
1
);
}
return
oct2bit
(
os
);
}
INTEGER
fx__dec__SharedAtRequest
(
BITSTRING
&
b
,
EtsiTs102941TypesAuthorization
::
SharedAtRequest
&
p_shared_at
)
{
loggers
::
get_instance
().
log_msg
(
">>> fx__dec__SharedAtRequest: "
,
b
);
etsi_ts102941_types_authorization_shared_at_request
codec
;
OCTETSTRING
is
=
bit2oct
(
b
);
if
(
codec
.
decode
(
is
,
p_shared_at
)
==
-
1
)
{
loggers
::
get_instance
().
warning
(
"fx__dec__SharedAtRequest: -1 result code was returned"
);
return
-
1
;
}
loggers
::
get_instance
().
log_msg
(
"<<< fx__dec__SharedAtRequest: "
,
p_shared_at
);
return
0
;
}
BITSTRING
fx__enc__AuthorizationValidationRequest
(
EtsiTs102941TypesAuthorizationValidation
::
AuthorizationValidationRequest
const
&
p_shared_at
)
{
loggers
::
get_instance
().
log_msg
(
">>> fx__enc__AuthorizationValidationRequest: "
,
p_shared_at
);
etsi_ts102941_types_authorization_validation_request
codec
;
OCTETSTRING
os
;
if
(
codec
.
encode
(
p_shared_at
,
os
)
==
-
1
)
{
loggers
::
get_instance
().
warning
(
"fx__enc__AuthorizationValidationRequest: -1 result code was returned"
);
return
int2bit
(
0
,
1
);
}
return
oct2bit
(
os
);
}
INTEGER
fx__dec__AuthorizationValidationRequest
(
BITSTRING
&
b
,
EtsiTs102941TypesAuthorizationValidation
::
AuthorizationValidationRequest
&
p_shared_at
)
{
loggers
::
get_instance
().
log_msg
(
">>> fx__dec__AuthorizationValidationRequest: "
,
b
);
etsi_ts102941_types_authorization_validation_request
codec
;
OCTETSTRING
is
=
bit2oct
(
b
);
if
(
codec
.
decode
(
is
,
p_shared_at
)
==
-
1
)
{
loggers
::
get_instance
().
warning
(
"fx__dec__AuthorizationValidationRequest: -1 result code was returned"
);
return
-
1
;
}
loggers
::
get_instance
().
log_msg
(
"<<< fx__dec__AuthorizationValidationRequest: "
,
p_shared_at
);
return
0
;
}
}
// End of namespace LibItsPki__EncdecDeclarations
ccsrc/Externals/LibItsSecurity_externals.cc
View file @
e93663dc
...
...
@@ -595,7 +595,7 @@ namespace LibItsSecurity__Functions
// TODO Use common function for both fx__encryptWithEciesxxx and fx__decryptWithEciesxxx function
OCTETSTRING
fx__encryptWithEciesNistp256WithSha256
(
const
OCTETSTRING
&
p__toBeEncryptedSecuredMessage
,
const
OCTETSTRING
&
p__recipientsPublicKeyCompressed
,
const
INTEGER
&
p__compressedMode
,
OCTETSTRING
&
p__publicEphemeralKeyCompressed
,
INTEGER
&
p__ephemeralCompressedMode
,
OCTETSTRING
&
p__encrypted__sym__key
,
OCTETSTRING
&
p__authentication__vector
,
OCTETSTRING
&
p__nonce
)
{
loggers
::
get_instance
().
log_msg
(
">>> fx__encryptWithEciesNistp256WithSha256: p__toBeEncryptedSecuredMessage: "
,
p__toBeEncryptedSecuredMessage
);
loggers
::
get_instance
().
log_msg
(
">>> fx__encryptWithEciesNistp256WithSha256: p__recipientsPublicKey
X:
"
,
p__recipientsPublicKeyCompressed
);
loggers
::
get_instance
().
log_msg
(
">>> fx__encryptWithEciesNistp256WithSha256: p__recipientsPublicKey
Compressed
"
,
p__recipientsPublicKeyCompressed
);
loggers
::
get_instance
().
log
(
">>> fx__encryptWithEciesNistp256WithSha256: p__compressedMode: %d"
,
static_cast
<
int
>
(
p__compressedMode
));
// 1. Generate new Private/Public key
...
...
ccsrc/Ports/LibIts_ports/AdapterControlPort.cc
View file @
e93663dc
...
...
@@ -9,7 +9,7 @@
#include
"IVIM_ports/AdapterControlPort_IVIM.partC"
#include
"MapemSpatem_ports/AdapterControlPort_MapemSpatem.partC"
#include
"SremSsem_ports/AdapterControlPort_SremSsem.partC"
//
#include "Pki_ports/AdapterControlPort_Pki.partC"
#include
"Pki_ports/AdapterControlPort_Pki.partC"
//#include "V2G_ports/AdapterControlPort_V2G.partC"
#else //_NO_SOFTLINKS_
...
...
@@ -20,7 +20,7 @@
#include
"AdapterControlPort_MapemSpatem.partC"
#include
"AdapterControlPort_SremSsem.partC"
#include
"AdapterControlPort_GN.partC"
//
#include "AdapterControlPort_Pki.partC"
#include
"AdapterControlPort_Pki.partC"
/*
#include "AdapterControlPort_IVIM.partC"
#include "AdapterControlPort_MapemSpatem.partC"
...
...
ccsrc/Ports/LibIts_ports/AdapterControlPort.hh
View file @
e93663dc
...
...
@@ -12,7 +12,7 @@
#include
"IVIM_ports/AdapterControlPort_IVIM.partH"
#include
"MapemSpatem_ports/AdapterControlPort_MapemSpatem.partH"
#include
"SremSsem_ports/AdapterControlPort_SremSsem.partH"
//
#include "Pki_ports/AdapterControlPort_Pki.partH"
#include
"Pki_ports/AdapterControlPort_Pki.partH"
//#include "V2G_ports/AdapterControlPort_V2G.partH"
#else //_NO_SOFTLINKS_
...
...
@@ -23,7 +23,7 @@
#include
"AdapterControlPort_MapemSpatem.partH"
#include
"AdapterControlPort_SremSsem.partH"
#include
"AdapterControlPort_GN.partH"
//
#include "AdapterControlPort_Pki.partH"
#include
"AdapterControlPort_Pki.partH"
/*
#include "AdapterControlPort_IVIM.partH"
#include "AdapterControlPort_MapemSpatem.partH"
...
...
ccsrc/Ports/LibIts_ports/CAM_ports/AdapterControlPort_CAM.partC
View file @
e93663dc
...
...
@@ -98,7 +98,7 @@ void AdapterControlPort::outgoing_send(const LibItsCommon__TypesAndValues::AcSec
loggers::get_instance().log_msg("AdapterControlPort::outgoing_send: Send response: ", response);
incoming_message(response);
} else {
loggers::get_instance().error("AdapterControlPort::outgoing_send:
%s
not registered"
, "geoNetworkingPort"
);
loggers::get_instance().error("AdapterControlPort::outgoing_send:
CAM
not registered");
}
}
...
...
ccsrc/Ports/LibIts_ports/Pki_ports/AdapterControlPkiPort.hh
View file @
e93663dc
...
...
@@ -38,3 +38,4 @@ protected:
};
}
/* end of namespace */
ccsrc/Ports/LibIts_ports/Pki_ports/AdapterControlPort_Pki.partC
View file @
e93663dc
#include <TTCN3.hh>
#include "LibItsPki_TestSystem.hh"
#include "loggers.hh"
#include "registration.hh"
...
...
@@ -10,87 +8,87 @@
//=============================================================================
namespace LibItsPki__TestSystem {
AdapterControlP
kiP
ort::AdapterControlP
kiP
ort(const char *par_port_name)
: AdapterControlP
kiP
ort_BASE(par_port_name), _params()
AdapterControlPort::AdapterControlPort(const char *par_port_name)
: AdapterControlPort_BASE(par_port_name), _params()
{
loggers::get_instance().log("AdapterControlP
kiP
ort::AdapterControlP
kiP
ort");
loggers::get_instance().log("AdapterControlPort::AdapterControlPort");
}
AdapterControlP
kiP
ort::~AdapterControlP
kiP
ort()
AdapterControlPort::~AdapterControlPort()
{
}
void AdapterControlP
kiP
ort::set_parameter(const char * parameter_name, const char * parameter_value)
void AdapterControlPort::set_parameter(const char * parameter_name, const char * parameter_value)
{
loggers::get_instance().log("AdapterControlP
kiP
ort::set_parameter: %s=%s", parameter_name, parameter_value);
loggers::get_instance().log("AdapterControlPort::set_parameter: %s=%s", parameter_name, parameter_value);
}
/*void AdapterControlP
kiP
ort::Handle_Fd_Event(int fd, boolean is_readable,
/*void AdapterControlPort::Handle_Fd_Event(int fd, boolean is_readable,
boolean is_writable, boolean is_error) {}*/
void AdapterControlP
kiP
ort::Handle_Fd_Event_Error(int /*fd*/)
void AdapterControlPort::Handle_Fd_Event_Error(int /*fd*/)
{
}
void AdapterControlP
kiP
ort::Handle_Fd_Event_Writable(int /*fd*/)
void AdapterControlPort::Handle_Fd_Event_Writable(int /*fd*/)
{
}
void AdapterControlP
kiP
ort::Handle_Fd_Event_Readable(int /*fd*/)
void AdapterControlPort::Handle_Fd_Event_Readable(int /*fd*/)
{
}
/*void AdapterControlP
kiP
ort::Handle_Timeout(double time_since_last_call) {}*/
/*void AdapterControlPort::Handle_Timeout(double time_since_last_call) {}*/
void AdapterControlP
kiP
ort::user_map(const char * system_port)
void AdapterControlPort::user_map(const char * system_port)
{
loggers::get_instance().log(">>> AdapterControlP
kiP
ort::user_map: %s", system_port);
loggers::get_instance().log(">>> AdapterControlPort::user_map: %s", system_port);
}
void AdapterControlP
kiP
ort::user_unmap(const char * system_port)
void AdapterControlPort::user_unmap(const char * system_port)
{
loggers::get_instance().log(">>> AdapterControlP
kiP
ort::user_unmap: %s", system_port);
loggers::get_instance().log(">>> AdapterControlPort::user_unmap: %s", system_port);
}
void AdapterControlP
kiP
ort::user_start()
void AdapterControlPort::user_start()
{
}
void AdapterControlP
kiP
ort::user_stop()
void AdapterControlPort::user_stop()
{
}
void AdapterControlP
kiP
ort::outgoing_send(const LibItsPki__TypesAndValues::AcPkiPrimitive& send_par)
void AdapterControlPort::outgoing_send(const LibItsPki__TypesAndValues::AcPkiPrimitive& send_par)
{
loggers::get_instance().log_msg(">>> AdapterControlP
kiP
ort::outgoing_send: ", send_par);
loggers::get_instance().log_msg(">>> AdapterControlPort::outgoing_send: ", send_par);
// Register this object for AdapterControlP
kiP
ort
// Register this object for AdapterControlPort
pki_layer* p = registration<pki_layer>::get_instance().get_item(std::string("PKI"));
if (p != NULL) {
loggers::get_instance().log("AdapterControlP
kiP
ort::outgoing_send: Got PKI layer %p", p);
loggers::get_instance().log("AdapterControlPort::outgoing_send: Got PKI layer %p", p);
LibItsPki__TypesAndValues::AcPkiResponse response;
response.result() = BOOLEAN(false);
if (send_par.ischosen(LibItsPki__TypesAndValues::AcPkiPrimitive::ALT_acSetSecurityData)) {
loggers::get_instance().log("AdapterControlP
kiP
ort::outgoing_send: AcSetSecurityData");
loggers::get_instance().log("AdapterControlPort::outgoing_send: AcSetSecurityData");
p->set_pki_keys(send_par.acSetSecurityData());
response.result() = BOOLEAN(true);
}
// Send response
loggers::get_instance().log_msg("AdapterControlP
kiP
ort::outgoing_send: Send response: ", response);
loggers::get_instance().log_msg("AdapterControlPort::outgoing_send: Send response: ", response);
incoming_message(response);
} else {
loggers::get_instance().error("AdapterControlP
kiP
ort::outgoing_send: pkiPort not registered");
loggers::get_instance().error("AdapterControlPort::outgoing_send: pkiPort not registered");
}
}
...
...
ccsrc/Ports/LibIts_ports/Pki_ports/AdapterControlPort_Pki.partH
View file @
e93663dc
...
...
@@ -3,18 +3,14 @@
#include "params.hh"
namespace LibItsPki__TypesAndValues {
class AcPkiPrimitive;
}
namespace LibItsPki__TestSystem {
class AdapterControlP
kiP
ort : public AdapterControlP
kiP
ort_BASE {
class AdapterControlPort : public AdapterControlPort_BASE {
params _params;
public:
AdapterControlP
kiP
ort(const char *par_port_name = NULL);
~AdapterControlP
kiP
ort();
AdapterControlPort(const char *par_port_name = NULL);
~AdapterControlPort();
void set_parameter(const char *parameter_name,
const char *parameter_value);
...
...
ccsrc/Ports/LibIts_ports/Pki_ports/PkiPort.cc
View file @
e93663dc
...
...
@@ -113,6 +113,19 @@ namespace LibItsPki__TestSystem {
}
void
PkiPort
::
outgoing_send
(
const
EtsiTs102941TypesAuthorizationValidation
::
AuthorizationValidationRequest
&
send_par
)
{
loggers
::
get_instance
().
log_msg
(
">>> PkiPort::outgoing_send: payload="
,
send_par
);
float
duration
;
loggers
::
get_instance
().
set_start_time
(
_time_key
);
params
params
;
static_cast
<
pki_layer
*>
(
_layer
)
->
sendMsg
(
send_par
,
params
);
loggers
::
get_instance
().
set_stop_time
(
_time_key
,
duration
);
}
void
PkiPort
::
outgoing_send
(
const
EtsiTs102941TypesAuthorizationValidation
::
AuthorizationValidationResponse
&
send_par
)
{
}
void
PkiPort
::
receiveMsg
(
const
EtsiTs102941TypesEnrolment
::
InnerEcRequest
&
p_ind
,
const
params
&
p_params
)
{
loggers
::
get_instance
().
log_msg
(
">>> PkiPort::receive_msg: "
,
p_ind
);
// Sanity check
...
...
@@ -132,6 +145,26 @@ namespace LibItsPki__TestSystem {
incoming_message
(
p_ind
);
}
void
PkiPort
::
receiveMsg
(
const
EtsiTs102941TypesAuthorizationValidation
::
AuthorizationValidationRequest
&
p_ind
,
const
params
&
p_params
)
{
loggers
::
get_instance
().
log_msg
(
">>> PkiPort::receive_msg: "
,
p_ind
);
// Sanity check
if
(
!
p_ind
.
is_bound
())
{
return
;
}
incoming_message
(
p_ind
);
}
void
PkiPort
::
receiveMsg
(
const
EtsiTs102941TypesAuthorizationValidation
::
AuthorizationValidationResponse
&
p_ind
,
const
params
&
p_params
)
{
loggers
::
get_instance
().
log_msg
(
">>> PkiPort::receive_msg: "
,
p_ind
);
// Sanity check
if
(
!
p_ind
.
is_bound
())
{
return
;
}
incoming_message
(
p_ind
);
}
}
/* end of namespace */
ccsrc/Ports/LibIts_ports/Pki_ports/PkiPort.hh
View file @
e93663dc
...
...
@@ -29,6 +29,8 @@ public:
void
set_parameter
(
const
char
*
parameter_name
,
const
char
*
parameter_value
);
void
receiveMsg
(
const
EtsiTs102941TypesEnrolment
::
InnerEcRequest
&
p_ind
,
const
params
&
p_params
);
void
receiveMsg
(
const
EtsiTs102941TypesEnrolment
::
InnerEcResponse
&
p_ind
,
const
params
&
p_params
);
void
receiveMsg
(
const
EtsiTs102941TypesAuthorizationValidation
::
AuthorizationValidationRequest
&
p_ind
,
const
params
&
p_params
);
void
receiveMsg
(
const
EtsiTs102941TypesAuthorizationValidation
::
AuthorizationValidationResponse
&
p_ind
,
const
params
&
p_params
);
private:
/* void Handle_Fd_Event(int fd, boolean is_readable,
...
...
@@ -46,6 +48,8 @@ protected:
void
outgoing_send
(
const
EtsiTs102941TypesEnrolment
::
InnerEcRequest
&
send_par
);
void
outgoing_send
(
const
EtsiTs102941TypesEnrolment
::
InnerEcResponse
&
send_par
);
void
outgoing_send
(
const
EtsiTs102941TypesAuthorizationValidation
::
AuthorizationValidationRequest
&
send_par
);
void
outgoing_send
(
const
EtsiTs102941TypesAuthorizationValidation
::
AuthorizationValidationResponse
&
send_par
);
};
}
/* end of namespace */
ccsrc/Ports/LibIts_ports/Pki_ports/UpperTesterPkiPort.cc
0 → 100644
View file @
e93663dc
#include
<TTCN3.hh>
#include
"LibItsPki_TestSystem.hh"
#include
"loggers.hh"
#include
"uppertester_pki_layer_factory.hh"
#include
"uppertester_pki_layer.hh"
//=============================================================================
namespace
LibItsPki__TestSystem
{
UpperTesterPkiPort
::
UpperTesterPkiPort
(
const
char
*
par_port_name
)
:
UpperTesterPkiPort_BASE
(
par_port_name
),
_cfg_params
(),
_layer_params
(),
_layer
(
NULL
),
_time_key
(
"UpperTesterPkiPort_Pki::outgoing_send"
)
{
loggers
::
get_instance
().
log
(
"UpperTesterPkiPort_Pki::UpperTesterPkiPort_Pki"
);
}
UpperTesterPkiPort
::~
UpperTesterPkiPort
()
{
if
(
_layer
!=
NULL
)
{
delete
_layer
;
}
}
void
UpperTesterPkiPort
::
set_parameter
(
const
char
*
parameter_name
,
const
char
*
parameter_value
)
{
loggers
::
get_instance
().
log
(
"UpperTesterPkiPort_Pki::set_parameter: %s=%s"
,
parameter_name
,
parameter_value
);
_cfg_params
.
insert
(
std
::
pair
<
std
::
string
,
std
::
string
>
(
std
::
string
(
parameter_name
),
std
::
string
(
parameter_value
)));
_cfg_params
.
log
();
}
/*void UpperTesterPkiPort::Handle_Fd_Event(int fd, boolean is_readable,
boolean is_writable, boolean is_error) {}*/
void
UpperTesterPkiPort
::
Handle_Fd_Event_Error
(
int
/*fd*/
)
{
}
void
UpperTesterPkiPort
::
Handle_Fd_Event_Writable
(
int
/*fd*/
)
{
}
void
UpperTesterPkiPort
::
Handle_Fd_Event_Readable
(
int
/*fd*/
)
{
}
/*void UpperTesterPkiPort::Handle_Timeout(double time_since_last_call) {}*/
void
UpperTesterPkiPort
::
user_map
(
const
char
*
system_port
)
{
loggers
::
get_instance
().
log
(
">>> UpperTesterPkiPort_Pki::user_map: %s"
,
system_port
);
// Build layer stack
params
::
iterator
it
=
_cfg_params
.
find
(
std
::
string
(
"params"
));
if
(
it
!=
_cfg_params
.
end
())
{
loggers
::
get_instance
().
log
(
"UpperTesterPkiPort_Pki::user_map: %s"
,
it
->
second
.
c_str
());
_layer
=
layer_stack_builder
::
get_instance
()
->
create_layer_stack
(
it
->
second
.
c_str
());
if
(
static_cast
<
uppertester_pki_layer
*>
(
_layer
)
==
NULL
)
{
loggers
::
get_instance
().
error
(
"UpperTesterPkiPort_Pki::user_map: Invalid stack configuration: %s"
,
it
->
second
.
c_str
());
}
static_cast
<
uppertester_pki_layer
*>
(
_layer
)
->
add_upper_port
(
this
);
}
else
{
loggers
::
get_instance
().
error
(
"UpperTesterPkiPort_Pki::user_map: No layers defined in configuration file"
);
}
}
void
UpperTesterPkiPort
::
user_unmap
(
const
char
*
system_port
)
{
loggers
::
get_instance
().
log
(
">>> UpperTesterPkiPort_Pki::user_unmap: %s"
,
system_port
);
if
(
_layer
!=
NULL
)
{
delete
_layer
;
_layer
=
NULL
;
}
}
void
UpperTesterPkiPort
::
user_start
()
{
}
void
UpperTesterPkiPort
::
user_stop
()
{
}
void
UpperTesterPkiPort
::
outgoing_send
(
const
LibItsPki__TypesAndValues
::
UtPkiInitialize
&
send_par
)
{
loggers
::
get_instance
().
log_msg
(
">>> UppertesterPort::outgoing_send: "
,
send_par
);
float
duration
;
loggers
::
get_instance
().
set_start_time
(
_time_key
);
static_cast
<
uppertester_pki_layer
*>
(
_layer
)
->
sendMsg
(
send_par
,
_layer_params
);
loggers
::
get_instance
().
set_stop_time
(
_time_key
,
duration
);
}
void
UpperTesterPkiPort
::
outgoing_send
(
const
LibItsPki__TypesAndValues
::
UtPkiTrigger
&
send_par
)
{
loggers
::
get_instance
().
log_msg
(
">>> UppertesterPort::outgoing_send: "
,
send_par
);
float
duration
;
loggers
::
get_instance
().
set_start_time
(
_time_key
);
static_cast
<
uppertester_pki_layer
*>
(
_layer
)
->
sendMsg
(
send_par
,
_layer_params
);
loggers
::
get_instance
().
set_stop_time
(
_time_key
,
duration
);
}
void
UpperTesterPkiPort
::
receiveMsg
(
const
Base_Type
&
p_ind
,
const
params
&
p_params
)
{
loggers
::
get_instance
().
log_msg
(
">>> UpperTesterPkiPort_Pki::receive_msg: "
,
p_ind
);
// Sanity check
if
(
!
p_ind
.
is_bound
())
{
return
;
}
if
(
std
::
string
(
p_ind
.
get_descriptor
()
->
name
).
compare
(
"@LibItsPki_TypesAndValues.UtPkiResults"
)
==
0
)
{
// TODO To be refined
incoming_message
(
static_cast
<
const
LibItsPki__TypesAndValues
::
UtPkiResults
&>
(
p_ind
));
}
else
{
loggers
::
get_instance
().
warning
(
"UpperTesterPkiPort_Pki::receive_msg: Message not processed: %s"
,
p_ind
.
get_descriptor
()
->
name
);
}
}
}
/* end of namespace */
ccsrc/Ports/LibIts_ports/Pki_ports/UpperTesterPkiPort.hh
0 → 100644
View file @
e93663dc
//=============================================================================
#include
"LibItsPki_TestSystem.hh"
#include
"layer.hh"
#include
"params.hh"
namespace
LibItsPki__TestSystem
{