[MODULE_PARAMETERS] # IUT Station ID LibItsCommon_Pixits.PX_IUT_STATION_ID := 2533729309 LibItsGeoNetworking_Pixits.PX_GN_UPPER_LAYER := e_btpB LibItsCam_Pics.PICS_IS_IUT_SECURED := true [LOGGING] # In this section you can specify the name of the log file and the classes of events # you want to log into the file or display on console (standard error). LogFile := "../logs/%e.%h-%r.%s" FileMask := LOG_ALL | USER | DEBUG | MATCHING ConsoleMask := LOG_ALL | USER | DEBUG | MATCHING #FileMask := ERROR | USER | MATCHING | EXECUTOR_RUNTIME | VERDICTOP #ConsoleMask := ERROR | USER | MATCHING | EXECUTOR_RUNTIME | VERDICTOP LogSourceInfo := Stack LogEntityName:= Yes LogEventTypes:= Yes #TimeStampFormat := DateTime [TESTPORT_PARAMETERS] # In this section you can specify parameters that are passed to Test Ports. # CAM Layer # next_header : btpA|btpB (overwrite BTP.type) # header_type : tsb|gbc # header_sub_type : sh (single hop) # RTCMEM Layer # next_header : btpA|btpB (overwrite BTP.type) # header_type : tsb|gbc # BTP Layer # type : btpA|btpB # destination port: dst_port # source port : src_port # device_mode : Set to 1 if the layer shall encapsulate upper layer PDU # device_mode : Set to 1 if the layer shall encapsulate upper layer PDU # GN Layer # ll_address : GeoNetworking address of the Test System # latitude : latitude of the Test System # longitude : longitude of the Test System # beaconing : Set to 1 if GnLayer shall start beaconing # Beaconning timer expiry: expiry (ms) # device_mode : Set to 1 if the layer shall encapsulate upper layer PDU # secured_mode : Set to 1 if message exchanges shall be signed # encrypted_mode : Set to 1 if message exchanges shall be encrypted # NOTE: For signed & encrypted message exchanges, both secured_mode and encrypted_mode shall be set to 1 # secure_db_path : Path to the certificates and keys storage location # hash : Hash algorithm to be used when secured mode is set # Authorized values are SHA-256 or SHA-384 # Default: SHA-256 # signature : Signature algorithm to be used when secured mode is set # Authorized values are NISTP-256, NISTP-384, BP-256 and BP-384 # Default: NISTP-256 # cypher : Cyphering algorithm to be used when secured mode is set # Authorized values are NISTP-256, BP-256 and BP-384 # Default: NISTP-256 # Ethernet layer # mac_src :Source MAC address # mac_bc :Broadcast address # eth_type : Ethernet type # Commsignia layer # mac_src : Device MAC address, used to discard packets # To indicate no filering, use the value 000000000000 # mac_bc : Broadcast address # eth_type : Ethernet type, used to discard packets # target_host : Device address # target_port : Device port # source_port : Test System port # interface_id: Interface id, used to discard packets # tx_power : TX power (dB) # UDP layer (IP/UDP based on Pcap) # dst_ip : destination IPv4 address (aa.bb.cc.dd) # dst_port: destination port # src_ip : source IPv4 address (aa.bb.cc.dd) # src_port: source port # Pcap layer # mac_src : Source MAC address, used to exclude from capture the acket sent by the Test System # filter : Pcap filter (compliant with tcpdump syntax) # Online mode: # nic: Local NIC # If set, online mode is used # Offline mode (nic is present but not set): # file : File to read # frame_offset: Frame offset, used to skip packets with frame number < frame_offset # time_offset : Time offset, used to skip packets with time offset < time_offset # save_mode : 1 to save sent packet, 0 otherwise #Cygwin #system.rtcmemPort.params := "Rtcmem(next_header=btpB)/BTP(dst_port=2013)/GN(ll_address=4C5E0C14D2EA,latitude=43551050,longitude=10298730,distanceA=1500,distanceB=1500,angle=0,device_mode=1,secured_mode=0,sec_db_path=/home/yanng/tmp/asn1c_cert)/ETH(mac_src=e2b7b30429eb)/PCAP(mac_src=e2b7b30429eb,nic=CEBB111F-D749-4B40-8B4D-DBB060E90987,filter=and ether proto 0x8947)" # Linux system.rtcmemPort.params := "Rtcmem(next_header=btpB)/BTP(dst_port=2013)/GN(ll_address=4C5E0C14D2EA,latitude=43551050,longitude=10298730,distanceA=1500,distanceB=1500,angle=0,device_mode=1,secured_mode=1,sec_db_path=/home/yanng/tmp/asn1c_cert)/ETH(mac_src=dc536045af7e)/PCAP(mac_src=dc536045af7e,nic=wlp2s0,filter=and ether proto 0x8947)" # SremSsem UpperTester port based on UDP system.utPort.params := "UT_RTCMEM/UDP(dst_ip=127.0.0.1,dst_port=12345,src_port=12346)" [EXECUTE] # Check that protocolVersion is set to 1 and messageID is set to 13 #ItsRtcmem_TestCases.TC_IS_GPC_GEN_MSGF_BV_01 # Check that GPC Service generates a new RTCMEM on reception of a valid AppRTCMEM_Start request #ItsRtcmem_TestCases.TC_IS_GPC_GEN_EVGN_BV_01 # Check that GPC Service terminates on reception of a valid AppRTCMEM_Stop request #ItsRtcmem_TestCases.TC_IS_GPC_GEN_EVGN_BV_02 # Check that RTCMEM uses BTP_B packet # Check that the destination port for RTCMEM is set to 2013 #ItsRtcmem_TestCases.TC_IS_GPC_GEN_COM_BV_02 # Check that GPC service encapsulates RTCMEM in a GBC with the HeaderType field set to the value of 4 ItsRtcmem_TestCases.TC_IS_GPC_GEN_COM_BV_03 # Check that GPC service uses certificate containing valid ITS AID to sign RTCMEM messages #ItsRtcmem_TestCases.TC_IS_GPC_GEN_SEC_BV_01 # Check that GPC service uses generic security profile to sign RTCMEM message and does not include additional security header elements #ItsRtcmem_TestCases.TC_IS_GPC_GEN_SEC_BV_02 # Check that GPC service uses certificate containing valid Service Specific Permissions to sign RTCMEM messages and the SSP version is set to 1 #ItsRtcmem_TestCases.TC_IS_GPC_GEN_SSP_BV_01 # Check that the IUT accepts the RTCMEM message permitted by the signing certificate #ItsRtcmem_TestCases.TC_IS_GPC_RCV_SSP_BV_01 # Check that the IUT skips the RTCMEM message not permitted by the signing certificate #ItsRtcmem_TestCases.TC_IS_GPC_RCV_SSP_BO_02 # Check that the IUT can successfully process all mandatory fields of RTCMEM received #ItsRtcmem_TestCases.TC_IS_GPC_RCV_MSGF_BV_01 [MAIN_CONTROLLER] # The options herein control the behavior of MC. KillTimer := 10.0 LocalAddress := 127.0.0.1 TCPPort := 12000 NumHCs := 1