diff --git a/ttcn/AtsSecurity/ItsSecurity_TestCases.ttcn b/ttcn/AtsSecurity/ItsSecurity_TestCases.ttcn index 486e0af6f680a7dac11d128ea23db7aecee8fa87..fce3594ab2e7cce9a6c022cf193b05138f806b58 100644 --- a/ttcn/AtsSecurity/ItsSecurity_TestCases.ttcn +++ b/ttcn/AtsSecurity/ItsSecurity_TestCases.ttcn @@ -68,27 +68,23 @@ module ItsSecurity_TestCases { group sendingBehavior { /** - * @desc Check that ITS-S sends a SecuredMessage containing protocol version set to 2 + * @desc Check that ITS-S sends a SecuredMessage containing protocol version set to 2 *
          * Pics Selection: PICS_GN_SECURITY
          * Config Id: CF01
          * Initial conditions:
-         *  with {
-         *      the IUT being in the 'authorized' state
-         *  }
-         * Expected behaviour:
-         * ensure that {
-         *     when { 
-         *         the IUT is requested to send a SecuredMessage
-         *     } then {
-         *         the IUT sends a SecuredMessage
-         *             containing protocol_version 
-         *                 indicating value '2'
-         *     }
-         * }
+         *   with
+         *     the IUT being in the 'authorized' state
+         * Expected results:
+         *   ensure that
+         *     when
+         *       the IUT is requested to send a SecuredMessage
+         *     then
+         *       the IUT sends a SecuredMessage
+         *         containing protocol_version
+         *           indicating value '2'
          * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_MSG_01_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_MSG_01_01_BV * @reference ETSI TS 103 097 [1], clause 5.1 */ testcase TC_SEC_ITSS_SND_MSG_01_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -135,37 +131,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_MSG_01_01_BV /** - * @desc Check that when IUT sends the message signed with the digest, then this digest points to the AT certificate + * @desc Check that when IUT sends the message signed with the digest, then this digest points to the AT certificate *
          * Pics Selection: PICS_GN_SECURITY
          * Config Id: CF01
          * Initial conditions:
-         *    with {
-         *        the IUT being in the 'authorized' state
-         *        and the IUT is configured to send more than one CAM per second
-         *        and the IUT having sent last CAM
-         *            containing header_fields['signer_info'].signer.type
-         *                indicating 'certificate'
-         *   }
-         * Expected behaviour:
-         *   ensure that {
-         *       when {
-         *           the IUT is requested to send next CAM
-         *       } then {
-         *           the IUT sends a SecuredMessage
-         *               containing header_fields ['signer_info']
-         *                  containing signer
-         *                      containing type
-         *                          indicating 'certificate_digest_with_sha256'
-         *                      and containing digest
-         *                          referencing the certificate
-         *                              containing subject_info.subject_type
-         *                                  indicating 'authorization_ticket'
-         *     }
-         *   } 
+         *   with
+         *     the IUT being in the 'authorized' state
+         *     and the IUT is configured to send more than one CAM per second
+         *     and the IUT having sent last CAM
+         *       containing header_fields['signer_info'].signer.type
+         *         indicating 'certificate'
+         * Expected results:
+         *   ensure that
+         *     when
+         *       the IUT is requested to send next CAM
+         *     then
+         *       the IUT sends a SecuredMessage
+         *         containing header_fields ['signer_info']
+         *           containing signer
+         *             containing type
+         *               indicating 'certificate_digest_with_sha256'
+         *             and containing digest
+         *               referencing the certificate
+         *                 containing subject_info.subject_type
+         *                   indicating 'authorization_ticket'
          * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_MSG_04_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_MSG_04_01_BV * @reference ETSI TS 103 097 [1], clause 6.3 */ testcase TC_SEC_ITSS_SND_MSG_04_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -240,32 +232,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_MSG_04_01_BV /** - * @desc Check that IUT uses the AT certificate to sign messages + * @desc Check that IUT uses the AT certificate to sign messages *
          * Pics Selection: PICS_GN_SECURITY
          * Config Id: CF01
          * Initial conditions:
-         *   with {
-         *       the IUT being in the 'authorized' state
-         *       the IUT being requested to include certificate in the next CAM
-         *   }
-         *   ensure that {
-         *     when {
-         *         the IUT is requested to send a next CAM
-         *     } then {
-         *         the IUT sends a SecuredMessage
-         *             containing header_fields ['signer_info']
-         *                 containing signer
-         *                     containing type
-         *                         indicating 'certificate'
-         *                     containing certificate
-         *                         containing subject_info.subject_type
-         *                             indicating 'authorization_ticket'
-         *       }
-         *   }
+         *   with
+         *     the IUT being in the 'authorized' state
+         *     the IUT being requested to include certificate in the next CAM
+         * Expected results:
+         *   ensure that
+         *     when
+         *       the IUT is requested to send a next CAM
+         *     then
+         *       the IUT sends a SecuredMessage
+         *         containing header_fields ['signer_info']
+         *           containing signer
+         *             containing type
+         *               indicating 'certificate'
+         *             and containing certificate
+         *               containing subject_info.subject_type
+         *                 indicating 'authorization_ticket'
          * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_MSG_04_02_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_MSG_04_02_BV * @reference ETSI TS 103 097 [1], clause 6.3 */ testcase TC_SEC_ITSS_SND_MSG_04_02_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -321,33 +310,30 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_MSG_04_02_BV /** - * @desc Check that the SecuredMessage signature containes the ECC point of type set to either compressed_lsb_y_0, compressed_lsb_y_1 or x_coordinate_only + * @desc Check that the SecuredMessage signature contains the ECC point of type set to either compressed_lsb_y_0, compressed_lsb_y_1 or x_coordinate_only *
          * Pics Selection: PICS_GN_SECURITY
          * Config Id: CF01
          * Initial conditions:
-         *   with {
-         *       the IUT being in the 'authorized' state
-         *   }
-         *   ensure that {
-         *     when {
-         *         the IUT is requested to send a next CAM
-         *     } then {
-         *         the IUT sends a SecuredMessage 
-         *             containing header_fields ['its_aid']
-         *                 containing its_aid
-         *                     indicating 'AID_CAM'
-         *             and containing trailer_fields['signature']
-         *                 containing signature.ecdsa_signature
-         *                     containing R.type
-         *                         indicating compressed_lsb_y_0
-         *                         or indicating compressed_lsb_y_1 
-         *                         or indicating x_coordinate_only
-         *     }
-         *  }
+         *   with
+         *     the IUT being in the 'authorized' state
+         * Expected results:
+         *   ensure that
+         *     when
+         *       the IUT is requested to send a CAM
+         *     then
+         *       the IUT sends a SecuredMessage
+         *         containing header_fields ['its_aid']
+         *           containing its_aid
+         *             indicating 'AID_CAM'
+         *         and containing trailer_fields['signature']
+         *           containing signature.ecdsa_signature
+         *             containing R.type
+         *               indicating 'compressed_lsb_y_0'
+         *               or indicating 'compressed_lsb_y_1'
+         *               or indicating 'x_coordinate_only'
          * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_MSG_05_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_MSG_05_01_BV * @reference ETSI TS 103 097 [1], clause 4.2.9 */ testcase TC_SEC_ITSS_SND_MSG_05_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -469,26 +455,24 @@ module ItsSecurity_TestCases { group sendCAMProfile { /** - * @desc Check that the sent Secured CAM contains a HeaderField its_aid that is set to 'AID_CAM' + * @desc Check that the sent Secured CAM contains a HeaderField its_aid that is set to 'AID_CAM' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
+             *   with
              *     the IUT being in the 'authorized' state
-             * }
-             * ensure that {
-             *     when {
-             *         the IUT is requested to send a CAM
-             *     } then {
-             *         the IUT sends a SecuredMessage
-             *             and containing header_fields['its_aid']
-             *                 indicating 'AID_CAM'
-             *     }
-             * }
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send CAM
+             *     then
+             *       the IUT sends a SecuredMessage
+             *         containing header_fields ['its_aid']
+             *           containing its_aid
+             *             indicating 'AID_CAM'
              * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TC_SEC_ITSS_SND_CAM_01_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CAM_01_01_BV * @reference ETSI TS 103 097 [1], clause 5.4 and 7.1 */ testcase TC_SEC_ITSS_SND_CAM_01_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -545,39 +529,34 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CAM_01_01_BV /** - * @desc Check that the secured CAM contains exactly one element of these header fields: signer_info, generation_time, its_aid. - Check that the header fields are in the ascending order according to the numbering of the enumeration except of the signer_info, which is encoded first. - Check that generation_time_standard_deviation, expiration, encryption_parameters, recipient_info are not used + * @desc Check that the secured CAM contains exactly one element of these header fields: signer_info, generation_time, its_aid; + * Check that the header fields are in the ascending order according to the numbering of the enumeration except of the signer_info, which is encoded first; + * Check that generation_time_standard_deviation, expiration, encryption_parameters, recipient_info are not used *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *     the IUT being in the 'authorized' state
-             * }
-             * ensure that {
-             *     when {
-             *         the IUT is requested to send a CAM
-             *     } then {
-             *         the IUT sends a SecuredMessage  {
-             *             containing header_fields[0]
-             *                 containing type 
-             *                     indicating 'signer_info'
-             *             and containing header_fields [n].type
-             *                 indicating value < header_fields [n+1].type
-             *             and containing header_fields ['generation_time']
-             *             and containing header_fields['its_aid']
-             *                 indicating 'AID_CAM'
-             *             and not containing header_fields['generation_time_standard_deviation']
-             *             and not containing header_fields['expiration']
-             *             and not containing header_fields['encryption_parameters']
-             *             and not containing header_fields['recipient_info']
-             *         }
-             *     }
-             * }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CAM_02_01_BV + * with + * the IUT being in the 'authorized' state + * Expected results: + * ensure that + * when + * the IUT is requested to send a CAM + * then + * the IUT sends a SecuredMessage + * containing header_fields[0] + * containing type + * indicating 'signer_info' + * and containing header_fields [1..N] + * indicating header_fields [n].type < header_fields [n+1].type + * and containing header_fields ['generation_time'] + * and containing header_fields['its_aid'] + * and not containing header_fields['generation_time_standard_deviation'] + * and not containing header_fields['expiration'] + * and not containing header_fields['encryption_parameters'] + * and not containing header_fields['recipient_info'] + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CAM_02_01_BV * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_SND_CAM_02_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -593,7 +572,6 @@ module ItsSecurity_TestCases { stop; } - // Test component configuration f_cf01Up(); @@ -648,7 +626,7 @@ module ItsSecurity_TestCases { if (v_counter > 1 ) { // Check that headers are ordered -//FIXME v_previousHeaderType is not initialized before use, it will cause dynamic test case error (DTE) + //FIXME v_previousHeaderType is not initialized before use, it will cause dynamic test case error (DTE) if (enum2int(v_headersFields[v_counter].type_) <= v_previousHeaderType) { // Check that header is duplicated if (enum2int(v_headersFields[v_counter].type_) == v_previousHeaderType) { @@ -678,37 +656,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CAM_02_01_BV /** - * @desc Check that the secured CAM contains the signer_info field of certificate when over the time of one - * second no other SecuredMessage contained a signer_info of type certificate. + * @desc Check that the secured CAM contains the signer_info field of certificate when over the time of one second no other SecuredMessage contained a signer_info of type certificate *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with {
+             *   with
              *     the IUT being in the 'authorized' state
-             *     and the IUT is configured to send more then one CAM per second
+             *     and the IUT is configured to send more than one CAM per second
              *     and the IUT having sent a CAM
-             *         containing header_fields['signer_info'].signer.type
-             *             indicating 'certificate'
-             *         contains header_fields['generation_time']
-             *             indicating TIME_LAST
-             *     }
-             * ensure that {
-             *     when {
-             *         the IUT is sending CAM
-             *             containing header_fields['signer_info']
-             *                 containing signer
-             *                     containing type
-             *                         indicating 'certificate'
-             *     } then {
-             *         this message
-             *             contains header_fields['generation_time']
-             *                 indicating TIME (TIME >= TIME_LAST + 1sec)
-             *     }
-             * }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CAM_05_01_BV + * containing header_fields['signer_info'].signer.type + * indicating 'certificate' + * and contains header_fields['generation_time'] + * indicating TIME_LAST + * Expected results: + * ensure that + * when + * the IUT is sending CAM + * containing header_fields['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * then + * this message is + * containing header_fields['generation_time'] + * indicating TIME (TIME >= TIME_LAST + 1sec) + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CAM_05_01_BV * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_SND_CAM_05_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -816,36 +790,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CAM_05_01_BV /** - * @desc Check that the secured CAM contains the signer_info field of certificate when the timeout of 1 second - * has been expired after the previous CAM containing the certificate. + * @desc Check that the secured CAM contains the signer_info field of certificate when the timeout of one second has been expired after the previous CAM containing the certificate *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT is configured to send more than one CAM per second
-             *      and the IUT having sent a CAM
-             *          containing header_fields['signer_info'].signer.type
-             *              indicating 'certificate'
-             *          at TIME_LAST 
-             *  }
-             *  ensure that {
-             *      when {
-             *          the IUT is sending a CAM
-             *              containing header_fields['generation_time']
-             *                  indicating TIME >= TIME_LAST + 1sec
-             *      } then {
-             *          this message is
-             *              containing header_fields ['signer_info']
-             *                  containing signer
-             *                      containing type
-             *                          indicating 'certificate'
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CAM_05_02_BV + * with + * the IUT being in the 'authorized' state + * and the IUT is configured to send more than one CAM per second + * and the IUT having sent a CAM + * containing header_fields['signer_info'].signer.type + * indicating 'certificate' + * at TIME_LAST + * Expected results: + * ensure that + * when + * the IUT is sending a CAM + * containing header_fields['generation_time'] + * indicating TIME >= TIME_LAST + 1sec + * then + * this message is + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * and containing certificate + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CAM_05_02_BV * @reference ETSI TS 103 097 [1], clause 4.2.9 */ testcase TC_SEC_ITSS_SND_CAM_05_02_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -940,44 +911,42 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CAM_05_02_BV /** - * @desc Check that ITS-S sends a Secured CAM containing the signer_info of type certificate - * when the ITS-S received a CAM from an unknown ITS-S + * @desc Check that ITS-S sends a Secured CAM containing the signer_info of type certificate when the ITS-S received a CAM from an unknown ITS-S *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT is configured to send more than one CAM per second
-             *      and the IUT having already sent CAM at TIME_1
-             *          containing header_fields['signer_info'].signer.type
-             *              indicating 'certificate'
-             *      and the IUT having received a SecuredMessage at TIME_2 (TIME_1 < TIME_2 < TIME_1+ 1sec)
-             *          containing header_fields['signer_info']
-             *              containing signer
-             *                  containing type
-             *                      indicating 'certificate_digest_with_sha256'
-             *                  containing digest
-             *                      indicating HashedId3 value
-             *                          referenced to unknown certificate
-             *  }
-             *  ensure that {
-             *      when {
-             *          the IUT is requested to send CAM at TIME_3 (TIME_1 < TIME_2 < TIME_3 < TIME_1 + 1sec)
-             *      } then {
-             *          the IUT sends a SecuredMessage
-             *              containing header_fields[0]
-             *                  containing type 
-             *                      indicating 'signer_info'
-             *                  and containing signer
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CAM_06_01_BV + * with + * the IUT being in the 'authorized' state + * and the IUT is configured to send more than one CAM per second + * and the IUT having already sent CAM at TIME_1 + * containing header_fields['signer_info'].signer.type + * indicating 'certificate' + * and the IUT having received a SecuredMessage + * at TIME_2 (TIME_1 < TIME_2 < TIME_1+1sec) + * and containing header_fields['signer_info'] + * containing signer + * containing type + * indicating 'certificate_digest_with_sha256' + * and containing digest + * indicating HashedId3 value + * referencing an unknown certificate + * Expected results: + * ensure that + * when + * the IUT is requested to send CAM + * at TIME_3 (TIME_1 < TIME_2 < TIME_3 < TIME_1 + 1sec) + * then + * the IUT sends a SecuredMessage + * and containing header_fields[0] + * containing type + * indicating 'signer_info' + * and containing signer + * containing type + * indicating 'certificate' + * and containing certificate + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CAM_06_01_BV * @reference ETSI TS 103 097 [1], clauses 5.4 and 7.1 */ testcase TC_SEC_ITSS_SND_CAM_06_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -1063,38 +1032,36 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CAM_06_01_BV /** - * @desc Check that IUT restart the certificate sending timer when the certificate has been sent + * @desc Check that IUT restarts the certificate sending timer when the certificate has been sent *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT is configured to send more then one CAM per second
-             *      and the IUT having already sent CAM at TIME_1
-             *          containing header_fields['signer_info'].signer.type
-             *              indicating 'certificate'
-             *      and the IUT having received a CAM at TIME_2 (TIME_1 +0.3sec)
-             *          containing header_fields['request_unrecognized_certificate']
-             *              containing digests
-             *                  containing HashedId3 value
-             *                      referencing to the the IUT certificate
-             *      and the IUT having sent CAM at TIME_3 (TIME_3 > TIME_2)
-             *          containing header_fields['signer_info'].signer.type
-             *              indicating 'certificate'
-             *  }
-             *  ensure that {
-             *      when {
-             *          the IUT is sending the next CAM at TIME_4
-             *              containing header_fields['signer_info'].signer.type
-             *                  indicating 'certificate'
-             *      } then {
-             *          the difference between TIME_4 and TIME_3 is about of 1sec
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CAM_07_01_TI + * with + * the IUT being in the 'authorized' state + * and the IUT is configured to send more than one CAM per second + * and the IUT having already sent CAM at TIME_1 + * containing header_fields['signer_info'].signer.type + * indicating 'certificate' + * and the IUT having received a CAM + * at TIME_2 (TIME_1 +0.3sec) + * containing header_fields['signer_info'].signer.type + * indicating 'certificate_digest_with_ecdsap256' + * and containing header_fields['signer_info'].signer.digest + * referencing an unknown certificate + * and the IUT having sent CAM at TIME_3 (TIME_3 > TIME_2) + * containing header_fields['signer_info'].signer.type + * indicating 'certificate' + * Expected results: + * ensure that + * when + * the IUT is sending the next CAM at TIME_4 + * containing header_fields['signer_info'].signer.type + * indicating 'certificate' + * then + * the difference between TIME_4 and TIME_3 is about 1sec + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CAM_07_01_TI * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_SND_CAM_07_01_TI() runs on ItsGeoNetworking system ItsSecSystem { @@ -1209,44 +1176,40 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CAM_07_01_TI /** - * @desc Check that the IUT sends the Secured CAM containing the signer_info of type certificate - * when it received a CAM containing a request of unrecognized certificate that matches - * with the currently used AT certificate ID of the IUT + * @desc Check that the IUT sends the Secured CAM containing the signer_info of type certificate when it received a CAM containing a request of unrecognized certificate that matches with the currently used AT certificate ID of the IUT *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT is configured to send more than one CAM per second
-             *      and the IUT having already sent CAM at TIME_1
-             *          containing header_fields['signer_info'].signer.type
-             *              indicating 'certificate' 
-             *      and the IUT having received a SecuredMessage at TIME_2 (TIME_1 < TIME_2 < TIME_1 + 1sec)
-             *          containing header_fields['request_unrecognized_certificate']
-             *              containing digests {
-             *                  containing HashedId3 value
-             *                      referencing to the AT certificate
-             *                  and not containing HashedId3 value
-             *                      referencing to the AA certificate
-             *              }
-             *  }
-             *  ensure that {
-             *      when {
-             *          the IUT is requested to send a CAM at TIME_3 (TIME_1 < TIME_2 < TIME_3 < TIME_1 + 1sec)
-             *      } then {
-             *          the IUT sends a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  containing signer
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      containing certificate
-             *                          referenced by the requested digest 
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CAM_08_01_BV + * with + * the IUT being in the 'authorized' state + * and the IUT is configured to send more than one CAM per second + * and the IUT having already sent CAM at TIME_1 + * containing header_fields['signer_info'].signer.type + * indicating 'certificate' + * and the IUT having received a SecuredMessage + * at TIME_2 (TIME_1 < TIME_2 < TIME_1+1sec) + * containing header_fields['request_unrecognized_certificate'] + * containing digests + * containing HashedId3 value + * referencing to the AT certificate + * and not containing HashedId3 value + * referencing to the AA certificate + * Expected results: + * ensure that + * when + * the IUT is requested to send a CAM + * at TIME_3 (TIME_1 < TIME_2 < TIME_3 < TIME_1+1sec) + * then + * the IUT sends a SecuredMessage + * containing header_fields['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * and containing certificate + * referenced by the requested digest + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CAM_08_01_BV * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_SND_CAM_08_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -1355,48 +1318,41 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CAM_08_01_BV /** - * @desc Check that the sent secured CAM contains the signer_info of type certificate_chain - * when the ITS-S has received a CAM containing a request of unrecognized certificate that matches - * with the AA certificate ID that issued its currently used AT certificate ID of the IUT + * @desc Check that the sent secured CAM contains the signer_info of type certificate_chain when the ITS-S has received a CAM containing a request of unrecognized certificate that matches with the AA certificate ID that issued its currently used AT certificate ID of the IUT *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT is configured to send more than one CAM per second
-             *      and the IUT having already sent a CAM
-             *          containing header_fields['signer_info'].signer.type
-             *              indicating 'certificate'
-             *          at TIME_1
-             *      and the IUT having received a SecuredMessage
-             *          containing header_fields['request_unrecognized_certificate'] {
-             *              containing digests {
-             *                  containing HashedId3 value
-             *                      referencing to the AA certificate
-             *              }
-             *          }
-             *          at TIME_2 (TIME_1 < TIME_2 < TIME_1+ 1sec)
-             *  }
-             *  ensure that {
-             *      when {
-             *          the IUT is requested to send a CAM
-             *              at TIME_3 (TIME_1 < TIME_2 < TIME_3 < TIME_1+ 1sec)
-             *      } then {
-             *          the IUT sends a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  containing signer
-             *                      containing type
-             *                          indicating 'certificate_chain'
-             *                      containing certificates[last]
-             *                          indicating the AT certificate
-             *                      containing certificates[last-1]
-             *                          indicating the AA certificate
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CAM_09_01_BV + * with + * the IUT being in the 'authorized' state + * and the IUT is configured to send more than one CAM per second + * and the IUT having already sent a CAM + * containing header_fields['signer_info'].signer.type + * indicating 'certificate' + * at TIME_1 + * and the IUT having received a SecuredMessage + * containing header_fields['request_unrecognized_certificate'] + * containing digests + * containing HashedId3 value + * referencing to the AA certificate + * at TIME_2 (TIME_1 < TIME_2 < TIME_1+1sec) + * Expected results: + * ensure that + * when + * the IUT is requested to send a CAM + * at TIME_3 (TIME_1 < TIME_2 < TIME_3 < TIME_1+1sec) + * then + * the IUT sends a SecuredMessage + * and containing header_fields['signer_info'] + * containing signer + * containing type + * indicating 'certificate_chain' + * and containing certificates[last] + * indicating the AT certificate + * and containing certificates[last-1] + * indicating the AA certificate + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CAM_09_01_BV * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_SND_CAM_09_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -1523,45 +1479,44 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CAM_09_01_BV /** - * @desc Check that the IUT doesn't send a secured CAM contains the signer_info of type certificate_chain - * when the AA certificate was previously requested and already received from another ITS-S + * @desc Check that the IUT doesn't send a secured CAM contains the signer_info of type certificate_chain when the AA certificate was previously requested and already received from another ITS-S *
-             * Pics Selection: PICS_GN_SECURITY PICS_PLUGTEST_VERSION
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * 
- * with + * with * the IUT being in the 'authorized' state * and the IUT is configured to send more than one CAM per second * and the IUT having already sent a CAM - * containing header_fields['signer_info'].signer.type - * indicating 'certificate' - * at TIME_1 + * containing header_fields['signer_info'].signer.type + * indicating 'certificate' + * at TIME_1 * and the IUT having received a SecuredMessage - * containing header_fields['request_unrecognized_certificate'] - * containing digests - * containing HashedId3 value (HASH1) - * referencing to the AA certificate - * at TIME_2 (TIME_1 < TIME_2 < TIME_1+1sec) + * containing header_fields['request_unrecognized_certificate'] + * containing digests + * containing HashedId3 value (HASH1) + * referencing to the AA certificate + * at TIME_2 (TIME_1 < TIME_2 < TIME_1+1sec) * and the IUT having received a SecuredMessage - * containing header_fields['signer_info'].signer.type - * indicating 'certificate_chain' - * containing AA certificate - * having HashedId3 value of HASH1 - * at TIME_3 (TIME_2 < TIME_3 < TIME_2+0.1sec) - * ensure that + * containing header_fields['signer_info'].signer.type + * indicating 'certificate_chain' + * containing AA certificate + * having HashedId3 value of HASH1 + * at TIME_3 (TIME_2 < TIME_3 < TIME_2+0.1sec) + * Expected results: + * ensure that * when - * the IUT is requested to send a CAM - * at TIME_3 (TIME_1 < TIME_2 < TIME_3 < TIME_1+1sec) - * then - * the IUT sends a SecuredMessage - * and containing header_fields['signer_info'] - * containing signer - * containing type - * indicating 'digest' - * or indicating 'certificate' - * - * @see ETSI TS 103 096-2 v1.3.3 TP_SEC_ITSS_SND_CAM_09_02_BV + * the IUT is requested to send a CAM + * at TIME_3 (TIME_1 < TIME_2 < TIME_3 < TIME_1+1sec) + * then + * the IUT sends a SecuredMessage + * and containing header_fields['signer_info'] + * containing signer + * containing type + * indicating 'digest' + * or indicating 'certificate' + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CAM_09_02_BV * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_SND_CAM_09_02_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -1679,49 +1634,44 @@ module ItsSecurity_TestCases { /** - * @desc Check that the sent secured CAM contains exactly one HeaderField generation_time which is inside - * the validity time of the certificate referenced by the signer_info + * @desc Check that Secured CAM generation time is inside the validity period of the signing certificate; + * Check that message generation time value is realistic *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      the IUT being requested to include certificate in the next CAM 
-             *  }
-             *  ensure that {
-             *      when {
-             *          the IUT is requested to send CAM
-             *      } then {
-             *          the IUT sends a SecuredMessage 
-             *              containing security_profile
-             *                  indicating '1'
-             *              containing header_fields ['generation_time'] 
-             *                  containing generation_time
-             *                      indicating TIME_1 (CUR_TIME - 5min <= TIME_1 <= CUR_TIME + 5min)
-             *              containing header_fields ['signer_info'] 
-             *                  containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate 
-             *                          containing validity_restrictions['time_end']
-             *                              containing end_validity
-             *                                  indicating value > GEN_TIME
-             *                          or containing validity_restrictions['time_start_and_end']
-             *                              containing start_validity
-             *                                  indicating value <= GEN_TIME
-             *                              and containing end_validity
-             *                                  indicating value > GEN_TIME
-             *                          or containing validity_restrictions['time_start_and_duration']
-             *                              containing start_validity (X_START_VALIDITY)
-             *                                  indicating value <= GEN_TIME
-             *                              and containing duration
-             *                                  indicating value > GEN_TIME - X_START_VALIDITY 
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CAM_10_01_BV + * with + * the IUT being in the 'authorized' state + * the IUT being requested to include certificate in the next CAM + * Expected results: + * ensure that + * when + * the IUT is requested to send CAM + * then + * the IUT sends a SecuredMessage + * containing header_fields ['generation_time'] + * containing generation_time + * indicating GEN_TIME (CUR_TIME - 5min <= GEN_TIME <= CUR_TIME + 5min) + * and containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * and containing certificate + * containing validity_restrictions['time_end'] + * containing end_validity + * indicating value > GEN_TIME + * or containing validity_restrictions['time_start_and_end'] + * containing start_validity + * indicating value <= GEN_TIME + * and containing end_validity + * indicating value > GEN_TIME + * or containing validity_restrictions['time_start_and_duration'] + * containing start_validity (X_START_VALIDITY) + * indicating value <= GEN_TIME + * and containing duration + * indicating value > GEN_TIME - X_START_VALIDITY + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CAM_10_01_BV * @reference ETSI TS 103 097 [1], clauses 5.4 and 7.1 */ testcase TC_SEC_ITSS_SND_CAM_10_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -1838,35 +1788,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CAM_10_01_BV /** - * @desc Check that the IUT sends certificate request when it receives a message from unknown station + * @desc Check that the IUT sends certificate request when it receives a message from unknown station *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT has receiving a SecuredMessage
-             *          containing header_fields['signer_info'].signer
-             *              containing type
-             *                  indicating 'certificate_digest_with_sha256'
-             *              containing digest
-             *                  indicating HashedId3 value DIGEST_A
-             *                      referenced to unknown certificate
-             *  }
-             *  ensure that {
-             *      when {
-             *          the IUT is requested to send CAM
-             *      } then {
-             *          the IUT sends a SecuredMessage
-             *              containing header_fields['request_unrecognized_certificate']
-             *                  containing digests
-             *                      containing HashedId3 value
-             *                          indicating DIGEST_A
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CAM_12_01_BV + * with + * the IUT being in the 'authorized' state + * and the IUT has receiving a SecuredMessage + * containing header_fields['signer_info'].signer + * containing type + * indicating 'certificate_digest_with_sha256' + * and containing digest + * indicating HashedId3 value DIGEST_A + * referencing an unknown certificate + * Expected results: + * ensure that + * when + * the IUT is requested to send CAM + * then + * the IUT sends a SecuredMessage + * containing header_fields['request_unrecognized_certificate'] + * containing digests + * containing HashedId3 value + * indicating DIGEST_A + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CAM_12_01_BV * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_SND_CAM_12_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -1950,29 +1897,25 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CAM_12_01_BV /** - * @desc Check that the Secured CAM contains non-empty payload of type signed + * @desc Check that the Secured CAM contains non-empty payload of type signed *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *  }
-             *  ensure that {
-             *      when {
-             *          the IUT is requested to send a CAM
-             *      } then {
-             *          the IUT sends a SecuredMessage
-             *              containing payload_field
-             *                  containing exactly one element of type Payload
-             *                      containing type
-             *                          indicating 'signed'
-             *                      containing not-empty data
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CAM_14_01_BV + * with + * the IUT being in the 'authorized' state + * Expected results: + * ensure that + * when + * the IUT is requested to send a CAM + * then + * the IUT sends a SecuredMessage + * and containing payload_field + * containing type + * indicating 'signed' + * and containing not-empty data + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CAM_14_01_BV * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_SND_CAM_14_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -2020,28 +1963,26 @@ module ItsSecurity_TestCases { f_cf01Down(); } // End of testcase TC_SEC_ITSS_SND_CAM_14_01_BV /** - * @desc Check that the secured CAM contains only the trailer field of type signature - * and no other trailer fields + * @desc Check that the secured CAM contains only the trailer field of type signature and no other trailer fields *
-             * Pics Selection: PICS_GN_SECURITY PICS_PLUGTEST_VERSION
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with
-             *         the IUT being in the 'authorized' state
-             * ensure that
+             *   with
+             *     the IUT being in the 'authorized' state
+             * Expected results:
+             *   ensure that
              *     when
-             *         the IUT is requested to send a CAM
-             *     then
-             *         the IUT sends a SecuredMessage
-             *             containing trailer_fields
-             *                 containing trailer_fields[0]
-             *                     containing type
-             *                         indicating 'signature'
-             *                 and not containing any other items
-
+             *       the IUT is requested to send a CAM
+             *     then
+             *       the IUT sends a SecuredMessage
+             *         containing trailer_fields
+             *           containing trailer_fields[0]
+             *             containing type
+             *               indicating 'signature'
+             *           and not containing any other items
              * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CAM_15_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CAM_15_01_BV * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_SND_CAM_15_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -2116,48 +2057,44 @@ module ItsSecurity_TestCases { /** - * @desc Check that the secured CAM contains only one TrailerField of type signature. - * Check that the signature contained in the SecuredMessage is calculated over the right fields by - * cryptographically verifying the signature. + * @desc Check that the secured CAM contains only one TrailerField of type signature; + * Check that the signature contained in the SecuredMessage is calculated over the right fields by cryptographically verifying the signature *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *  }
-             *  ensure that {
-             *      when {
-             *          the IUT is requested to send a CAM
-             *      } then {
-             *          the IUT sends a SecuredMessage
-            *              containing header_fields ['signer_info']
-             *                  containing signer
-             *                      containing type
-             *                          indicating 'certificate_digest_with_sha256'
-             *                      containing digest
-             *                          referenced to the certificate
-             *                              containing subject_info.subject_type
-             *                                  indicating 'authorization_ticket' (2)
-             *                              and containing subject_attributes['verification key'] (KEY)
-             *                  or containing signer
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      containing certificate
-             *                          containing subject_info.subject_type
-             *                              indicating 'authorization_ticket' (2)
-             *                          and containing subject_attributes['verification key'] (KEY)
-             *              containing trailer_fields
-             *                  containing single instance of type TrailerField
-             *                      containing type
-             *                          indicating 'signature'
-             *                      containing signature
-             *                          verifiable using KEY
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CAM_16_01_BV + * with + * the IUT being in the 'authorized' state + * Expected results: + * ensure that + * when + * the IUT is requested to send a CAM + * then + * the IUT sends a SecuredMessage + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate_digest_with_ecdsap256' + * and containing digest + * referencing the certificate + * containing subject_info.subject_type + * indicating 'authorization_ticket' + * and containing subject_attributes['verification key'] (KEY) + * or containing signer + * containing type + * indicating 'certificate' + * and containing certificate + * containing subject_info.subject_type + * indicating 'authorization_ticket' (2) + * and containing subject_attributes['verification key'] (KEY) + * containing trailer_fields + * containing single instance of type TrailerField + * containing type + * indicating 'signature' + * and containing signature + * verifiable using KEY + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CAM_16_01_BV * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_SND_CAM_16_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -2252,26 +2189,24 @@ module ItsSecurity_TestCases { group sendDENMProfile { /** - * @desc Check that the sent Secured DENM contains a HeaderField its_aid that is set to 'AID_DENM' + * @desc Check that the sent Secured DENM contains a HeaderField its_aid that is set to 'AID_DENM' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with {
-             *   the IUT being in the 'authorized' state
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is requested to send DENM
-             *   } then {
-             *     the IUT sends a SecuredMessage
+             *   with
+             *     the IUT being in the 'authorized' state
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send a DENM
+             *     then
+             *       the IUT sends a SecuredMessage
              *         containing header_fields ['its_aid']
-             *             containing its_aid
-             *                 indicating 'AID_DENM'
-             *   }
-             * }
+             *           containing its_aid
+             *             indicating 'AID_DENM'
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_DENM_01_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_DENM_01_01_BV * @reference ETSI TS 103 097 [1], clauses 5.4 and 7.2 */ testcase TC_SEC_ITSS_SND_DENM_01_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -2343,35 +2278,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_DENM_01_01_BV /** - * @desc Check that the secured DENM contains exactly one element of these header fields: signer_info, generation_time, - * generation_location, message_type. - * Check that the header fields are in the ascending order according to the numbering of the enumeration except - * of the signer_info, which is encoded first. - * Check that generation_time_with_confidence (generation_time_standard_deviation) is not used + * @desc Check that the secured DENM contains exactly one element of these header fields: signer_info, generation_time, generation_location, message_type; + * Check that the header fields are in the ascending order according to the numbering of the enumeration except of the signer_info, which is encoded first; + * Check that generation_time_with_confidence (generation_time_standard_deviation) is not used *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with {
-             *   the IUT being in the 'authorized' state
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is requested to send DENM
-             *   } then {
-             *     the IUT sends a SecuredMessage
-             *       containing header_fields[0]
-             *         containing type 
-             *           indicating 'signer_info'
-             *       containing header_fields [n].type
-             *         indicating value less then header_fields [n+ 1].type
-             *       containing header_fields ['generation_time']
-             *       containing header_fields ['generation_location']
-             *       not containing header_fields ['generation_time_with_confidence']
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_DENM_02_01_BV + * with + * the IUT being in the 'authorized' state + * Expected results: + * ensure that + * when + * the IUT is requested to send DENM + * then + * the IUT sends a SecuredMessage + * containing header_fields[0] + * containing type + * indicating 'signer_info' + * and containing header_fields [n].type + * indicating value less than header_fields [n+1].type + * and containing header_fields ['generation_time'] + * and containing header_fields ['generation_location'] + * and containing header_fields ['its_aid'] + * and not containing header_fields ['generation_time_with_confidence'] + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_DENM_02_01_BV * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_SND_DENM_02_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -2481,28 +2413,26 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_DENM_02_01_BV /** - * @desc Check that secured DENM contains the certificate as a signer_info + * @desc Check that secured DENM contains the certificate as a signer_info *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with {
-             *   the IUT being in the 'authorized' state
-             * }
-             * ensure that {
-             *   when {
+             *   with
+             *     the IUT being in the 'authorized' state
+             * Expected results:
+             *   ensure that
+             *     when
              *       the IUT is requested to send a DENM
-             *   } then {
+             *     then
              *       the IUT sends a SecuredMessage
-             *           containing header_fields['signer_info']
-             *               containing signer
-             *                   containing type
-             *                       indicating 'certificate'
-             *                   and containing certificate
-             *   }
-             * }
+             *         containing header_fields['signer_info']
+             *           containing signer
+             *             containing type
+             *               indicating 'certificate'
+             *             and containing certificate
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_DENM_03_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_DENM_03_01_BV * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_SND_DENM_03_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -2575,45 +2505,43 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_DENM_03_01_BV /** - * @desc Check that Secured DENM generation time is inside the validity period of the signing certificate - * Check that generation time value is realistic + * @desc Check that Secured DENM generation time is inside the validity period of the signing certificate; + * Check that generation time value is realistic *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with {
-             *   the IUT being in the 'authorized' state
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is requested to send a DENM
-             *   } then {
-             *     the IUT sends a SecuredMessage
-             *       containing exactly one header_fields['generation_time'] 
+             *   with
+             *     the IUT being in the 'authorized' state
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send a DENM
+             *     then
+             *       the IUT sends a SecuredMessage
+             *         containing exactly one header_fields['generation_time']
              *           containing generation_time
-             *               indicating TIME_1 (CUR_TIME - 10min <= TIME_1 <= CUR_TIME + 10min)
-             *       containing header_fields['signer_info']
-             *           containing signer {
-             *               containing type
-             *                   indicating 'certificate'
-             *               containing certificate
-             *                   containing validity_restrictions['time_end']
-             *                       containing end_validity
-             *                           indicating value > TIME_1
+             *             indicating GEN_TIME (CUR_TIME - 10min <= GEN_TIME < CUR_TIME + 10min)
+             *         containing header_fields['signer_info']
+             *           containing signer
+             *             containing type
+             *               indicating 'certificate'
+             *             containing certificate
+             *               containing validity_restrictions['time_end']
+             *                 and containing end_validity
+             *                   indicating value > GEN_TIME
              *               or containing validity_restrictions['time_start_and_end']
-             *                   containing start_validity
-             *                       indicating value <= GEN_TIME
-             *                   and containing end_validity
-             *                       indicating value > GEN_TIME
+             *                 containing start_validity
+             *                   indicating value <= GEN_TIME
+             *                 and containing end_validity
+             *                   indicating value > GEN_TIME
              *               or containing validity_restrictions['time_start_and_duration']
-             *                   containing start_validity (CERT_START_VALIDITY)
-             *                       indicating value <= GEN_TIME
-             *                   and containing duration
-             *                       indicating value > GEN_TIME - CERT_START_VALIDITY
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_DENM_04_01_BV + * containing start_validity (X_START_VALIDITY) + * indicating value <= GEN_TIME + * and containing duration + * indicating value > GEN_TIME - X_START_VALIDITY + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_DENM_04_01_BV * @reference ETSI TS 103 097 [1], clauses 5.4 and 7.2 */ testcase TC_SEC_ITSS_SND_DENM_04_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -2735,26 +2663,24 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_DENM_04_01_BV /** - * @desc Check that the secured DENM contains exactly one HeaderField generation_location - * when AT certificate does not contain any region restrictions + * @desc Check that the secured DENM contains exactly one HeaderField generation_location when AT certificate does not contain any region restrictions *
-             * Pics Selection: PICS_GN_SECURITY and PICS_CERTIFICATE_SELECTION 
+             * Pics Selection: PICS_GN_SECURITY AND PICS_CERTIFICATE_SELECTION
              * Config Id: CF01
-             * with {
-             *   the IUT has been authorized with the AT certificate (CERT_IUT_A)
-             *     not containing validity_restrictions['region']
-             * }
-             * ensure that {
-             *   when {
+             * Initial conditions:
+             *   with
+             *     the IUT has been authorized with the AT certificate (CERT_IUT_A_AT)
+             *       not containing validity_restrictions['region']
+             * Expected results:
+             *   ensure that
+             *     when
              *       the IUT is requested to send DENM
-             *   } then {
+             *     then
              *       the IUT sends a SecuredMessage
-             *           containing exactly one header_fields ['generation_location']
-             *               containing generation_location
-             *   }
-             * }
+             *         containing exactly one header_field ['generation_location']
+             *           containing generation_location
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_DENM_05_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_DENM_05_01_BV * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_SND_DENM_05_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -2943,37 +2869,30 @@ module ItsSecurity_TestCases { } // End of function f_TC_SEC_ITSS_SND_DENM_05_BV /** - * @desc Check that the secured DENM contains exactly one HeaderField generation_location - * which is inside the circular region containing in the validity restriction of the - * certificate pointed by the signer_info field - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_CERTIFICATE_SELECTION and PICS_USE_CIRCULAR_REGION
-             * Config Id: CF01
-             * with {
-             *   the IUT has been authorized with the AT certificate (CERT_IUT_B) {
-             *     containing validity_restrictions ['region'] {
-             *       containing region{
-             *         containing region_type
-             *           indicating 'circle'
-             *         containing circular_region
-             *           indicating REGION
-             *       }
-             *     }
-             *   }
-             * }
-             * ensure that {
-             *   when {
+             * @desc  Check that the secured DENM contains exactly one HeaderField generation_location which is inside the circular region defined by the validity restriction of the certificate pointed by the signer_info field
+             * 
+             * Pics Selection: PICS_GN_SECURITY AND PICS_CERTIFICATE_SELECTION AND PICS_USE_CIRCULAR_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT has been authorized with the AT certificate (CERT_IUT_B_AT)
+             *       containing validity_restrictions ['region']
+             *         containing region
+             *           containing region_type
+             *             indicating 'circle'
+             *           containing circular_region
+             *             indicating REGION
+             * Expected results:
+             *   ensure that
+             *     when
              *       the IUT is requested to send a DENM
-             *   } then {
+             *     then
              *       the IUT sends a SecuredMessage
-             *           containing exactly one header_fields ['generation_location']
-             *               containing generation_location
-             *                   indicating value inside the REGION
-             *     }
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_DENM_05_02_BV + * containing exactly one header_field ['generation_location'] + * containing generation_location + * indicating value inside the REGION + *
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_DENM_05_02_BV * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_SND_DENM_05_02_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -3005,33 +2924,31 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_DENM_05_02_BV /** - * @desc Check that the secured DENM contains exactly one HeaderField generation_location - * which is inside the rectangular region containing in the validity restriction - * of the certificate pointed by the signer_info field + * @desc Check that the secured DENM contains exactly one HeaderField generation_location which is inside the rectangular region defined by the validity restriction of the certificate pointed by the signer_info field *
-             * Pics Selection: PICS_GN_SECURITY and PICS_CERTIFICATE_SELECTION and PICS_USE_RECTANGULAR_REGION
+             * Pics Selection: PICS_GN_SECURITY AND PICS_CERTIFICATE_SELECTION AND PICS_USE_RECTANGULAR_REGION
              * Config Id: CF01
-             * with {
-             *     the IUT has been authorized with the AT certificate (CERT_IUT_C)
-             *         containing validity_restrictions ['region']
-             *             containing region
-             *                 containing region_type
-             *                    indicating 'rectangle'
-             *                 containing rectangular_region
-             *                    indicating REGION
-             * }
-             * ensure that {
-             *   when {
-             *       the IUT is requested to send a DENM
-             *   } then {
+             * Initial conditions:
+             *   with
+             *     the IUT has been authorized with the AT certificate (CERT_IUT_C_AT)
+             *       containing validity_restrictions ['region']
+             *         containing region
+             *           containing region_type
+             *             indicating 'rectangle'
+             *           containing rectangular_region
+             *             containing instance of RectangularRegion
+             *               indicating REGION
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send DENM
+             *     then
              *       the IUT sends a SecuredMessage
-             *           containing exactly one header_field ['generation_location']
-             *               containing generation_location
-             *                   indicating value inside the REGION
-             *   }
-             * }
+             *         containing exactly one header_field ['generation_location']
+             *           containing generation_location
+             *             indicating value inside the REGION
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_DENM_05_03_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_DENM_05_03_BV * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_SND_DENM_05_03_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -3062,34 +2979,30 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_DENM_05_03_BV /** - * @desc Check that the secured DENM contains exactly one HeaderField generation_location - * which is inside the polygonal region containing in the validity restriction - * of the certificate pointed by the signer_info field + * @desc Check that the secured DENM contains exactly one HeaderField generation_location which is inside the polygonal region defined by the validity restriction of the certificate pointed by the signer_info field *
-             * Pics Selection: PICS_GN_SECURITY and PICS_CERTIFICATE_SELECTION and PICS_USE_POLYGONAL_REGION
+             * Pics Selection: PICS_GN_SECURITY AND PICS_CERTIFICATE_SELECTION AND PICS_USE_POLYGONAL_REGION
              * Config Id: CF01
-             * with {
-             *     the IUT has been authorized with the AT certificate (CERT_IUT_D)
-             *         containing validity_restrictions ['region']
-             *             containing region
-             *                 containing region_type
-             *                     indicating 'polygon'
-             *                 containing polygonal_region
-             *                     containing instance of RectangularRegion
-             *                         indicating REGION
-             * }
-             * ensure that {
-             *   when {
-             *         the IUT is requested to send a DENM
-             *   } then {
-             *         the IUT sends a SecuredMessage
-             *             containing exactly one header_field ['generation_location']
-             *                 containing generation_location
-             *                     indicating value inside the REGION
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_DENM_05_04_BV + * Initial conditions: + * with + * the IUT has been authorized with the AT certificate (CERT_IUT_D_AT) + * containing validity_restrictions ['region'] + * containing region + * containing region_type + * indicating 'polygon' + * containing polygonal_region + * indicating REGION + * Expected results: + * ensure that + * when + * the IUT is requested to send a DENM + * then + * the IUT sends a SecuredMessage + * containing exactly one header_field ['generation_location'] + * containing generation_location + * indicating value inside the REGION + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_DENM_05_04_BV * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_SND_DENM_05_04_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -3120,33 +3033,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_DENM_05_04_BV /** - * @desc Check that the secured DENM contains exactly one HeaderField generation_location - * which is inside the identified region containing in the validity restriction - * of the certificate pointed by the signer_info field + * @desc Check that the secured DENM contains exactly one HeaderField generation_location which is inside the identified region defined by the validity restriction of the certificate pointed by the signer_info field *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_IDENTIFIED_REGION and PICS_CERTIFICATE_SELECTION
+             * Pics Selection: PICS_GN_SECURITY AND PICS_CERTIFICATE_SELECTION AND PICS_USE_IDENTIFIED_REGION
              * Config Id: CF01
-             * with {
-             *     the IUT has been authorized with the AT certificate (CERT_IUT_E)
-             *         containing validity_restrictions ['region']
-             *             containing region
-             *                 containing region_type
-             *                     indicating 'id_region'
-             *                 containing identified_region
-             *                     indicating REGION
-             * }
-             * ensure that {
-             *   when {
+             * Initial conditions:
+             *   with
+             *     the IUT has been authorized with the AT certificate (CERT_IUT_E_AT)
+             *       containing validity_restrictions ['region']
+             *         containing region
+             *           containing region_type
+             *             indicating 'id_region'
+             *           containing identified_region
+             *             indicating REGION
+             * Expected results:
+             *   ensure that
+             *     when
              *       the IUT is requested to send a DENM
-             *   } then {
-             *       the IUT sends a SecuredMessage 
-             *           containing exactly one header_fields ['generation_location']
-             *               containing generation_location
-             *                   indicating value inside the REGION
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_DENM_05_05_BV + * then + * the IUT sends a SecuredMessage + * containing header_fields + * containing exactly one instance of HeaderField + * containing type + * indicating 'generation_location' + * containing generation_location + * indicating value inside the REGION + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_DENM_05_05_BV * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_SND_DENM_05_05_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -3178,32 +3091,28 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_DENM_05_05_BV /** - * @desc Check that the Secured DENM contains exactly one non-empty payload of type signed + * @desc Check that the Secured DENM contains non-empty payload of type signed *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with {
+             *   with
              *     the IUT being in the 'authorized' state
-             * }
              * Expected results:
-             * ensure that {
-             *     when {
-             *         the IUT is requested to send a DENM
-             *     } then {
-             *         the IUT sends a SecuredMessage
-             *             containing payload_field
-             *                 containing exactly one element of type Payload
-             *                     containing type
-             *                         indicating 'signed'
-             *                      and containing not-empty data
-             *     }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_DENM_08_01_BV - * @reference ETSI TS 103 097 [1], clause 7.2 - */ - testcase TC_SEC_ITSS_SND_DENM_08_01_BV() runs on ItsGeoNetworking system ItsSecSystem { + * ensure that + * when + * the IUT is requested to send a DENM + * then + * the IUT sends a SecuredMessage + * containing payload_field + * containing type + * indicating 'signed' + * and containing not-empty data + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_DENM_08_01_BV + * @reference ETSI TS 103 097 [1], clause 7.2 + */ + testcase TC_SEC_ITSS_SND_DENM_08_01_BV() runs on ItsGeoNetworking system ItsSecSystem { // Local variables var ItsDenm v_denmComponent; @@ -3267,26 +3176,26 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_DENM_08_01_BV /** - * @desc Check that the secured DENM contains only the trailer field of type signature - * and no other trailer fields + * @desc Check that the secured DENM contains only the trailer field of type signature and no other trailer fields *
-             * Pics Selection: PICS_GN_SECURITY and PICS_PLUGTEST_VERSION
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with
+             *   with
              *     the IUT being in the 'authorized' state
-             * ensure that
+             * Expected results:
+             *   ensure that
              *     when
-             *         the IUT is requested to send DENM
+             *       the IUT is requested to send DENM
              *     then
-             *         the IUT sends a SecuredMessage
-             *             containing trailer_fields
-             *                 containing trailer_fields[0]
-             *                     containing type
-             *                         indicating 'signature'
-             *                 and not containing other items
+             *       the IUT sends a SecuredMessage
+             *         containing trailer_fields
+             *           containing trailer_fields[0]
+             *             containing type
+             *               indicating 'signature'
+             *           and not containing other items
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_DENM_09_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_DENM_09_01_BV * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_SND_DENM_09_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -3369,39 +3278,36 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_DENM_09_01_BV /** - * @desc Check that the secured DENM contains only one TrailerField of type signature. - * Check that the signature contained in the SecuredMessage is calculated - * over the right fields by cryptographically verifying the signature. + * @desc Check that the secured DENM contains only one TrailerField of type signature; + * Check that the signature contained in the SecuredMessage is calculated over the right fields by cryptographically verifying the signature *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with {
-             *   the IUT being in the 'authorized' state
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is requested to send DENM
-             *   } then {
-             *     the IUT sends a SecuredMessage
+             *   with
+             *     the IUT being in the 'authorized' state
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send DENM
+             *     then
+             *       the IUT sends a SecuredMessage
              *         containing header_field ['signer_info']
-             *             containing signer
-             *                 containing type
-             *                   indicating 'certificate'
-             *             containing certificate
-             *                 containing subject_info.subject_type
-             *                     indicating 'authorization_ticket' (2)
-             *                 and containing subject_attributes['verification key'] (KEY)
-             *                     containing trailer_fields
-             *                         containing single instance of type TrailerField
-             *                             containing type
-             *                                 indicating 'signature'
-             *                             and containing signature
-             *                                 verifiable using KEY
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_DENM_10_01_BV + * containing signer + * containing type + * indicating 'certificate' + * and containing certificate + * containing subject_info.subject_type + * indicating 'authorization_ticket' (2) + * and containing subject_attributes['verification key'] (KEY) + * and containing trailer_fields + * containing single instance of type TrailerField + * containing type + * indicating 'signature' + * and containing signature + * verifiable using KEY + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_DENM_10_01_BV * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_SND_DENM_10_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -3476,28 +3382,24 @@ module ItsSecurity_TestCases { group sendOtherProfile { /** - * @desc Check that the secured message contains of type signed + * @desc Check that the sent Secured Message contains HeaderField its_aid that is set to other value then AID_CAM and AID_DENM *
-             * Pics Selection: PICS_GN_SECURITY and PICS_ITS_AID_OTHER_PROFILE
+             * Pics Selection: PICS_GN_SECURITY AND PICS_ITS_AID_OTHER_PROFILE = non-zero
              * Config Id: CF01
              * Initial conditions:
-             * with {
+             *   with
              *     the IUT being in the 'authorized' state
-             * }
              * Expected results:
-             * ensure that {
-             *     when {
-             *         the IUT is requested to send a Beacon
-             *     } then {
-             *         the IUT sends a SecuredMessage {
-             *            containing header_field ['its_aid']
-             *                containing its_aid
-             *                    indicating 'AID_BEACON'
-             *         }
-             *     }
-             * }
+             *   ensure that
+             *     when
+             *       the IUT is requested to send a Beacon
+             *     then
+             *       the IUT sends a SecuredMessage
+             *         containing header_fields ['its_aid']
+             *           containing its_aid
+             *             indicating 'AID_BEACON'
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_GENMSG_06_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_GENMSG_01_01_BV * @reference ETSI TS 103 097 [1], clause 5.4 */ testcase TC_SEC_ITSS_SND_GENMSG_01_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -3554,35 +3456,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_GENMSG_01_01_BV /** - * @desc Check that the generic secured message contains exactly one element of these header fields: - * signer_info, generation_time, generation_location. - * Check that the header fields are in the ascending order according to the numbering of the enumeration - * except of the signer_info, which is encoded first. + * @desc Check that the generic secured message contains exactly one element of these header fields: signer_info, generation_time, generation_location; + * Check that the header fields are in the ascending order according to the numbering of the enumeration except of the signer_info, which is encoded first *
-             * Pics Selection: PICS_GN_SECURITY and PICS_ITS_AID_OTHER_PROFILE
+             * Pics Selection: PICS_GN_SECURITY AND PICS_ITS_AID_OTHER_PROFILE = non-zero
              * Config Id: CF01
              * Initial conditions:
-             * with {
-             *   the IUT being in the 'authorized' state
-             * }
-             * Expected Results:
-             * ensure that {
-             *   when {
-             *     the IUT is requested to send a Beacon
-             *   } then {
-             *     the IUT sends a SecuredMessage
+             *   with
+             *     the IUT being in the 'authorized' state
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send a Beacon
+             *     then
+             *       the IUT sends a SecuredMessage
              *         containing header_fields [0].type
-             *             indicating 'signer_info'
-             *         and containing header_fields [1..n] 
-             *             where header_fields [v_counter].type < header_fields [v_counter + 1].type
+             *           indicating 'signer_info'
+             *         and containing header_fields [1..n]
+             *           where header_fields [i].type < header_fields [i+1].type
              *         and containing header_fields ['generation_time']
              *         and containing header_fields ['generation_location']
-             *         and containing header_field ['its_aid']
-             *     }
-             *   }  
-             * }
+             *         and containing header_fields ['its_aid']
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_GENMSG_02_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_GENMSG_02_01_BV * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_SND_GENMSG_02_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -3676,30 +3572,26 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_GENMSG_02_01_BV /** - * @desc Check that generic secured message contains the certificate as a signer_info + * @desc Check that generic secured message contains the certificate as a signer_info *
-             * Pics Selection: PICS_GN_SECURITY and PICS_ITS_AID_OTHER_PROFILE
+             * Pics Selection: PICS_GN_SECURITY AND PICS_ITS_AID_OTHER_PROFILE = non-zero
              * Config Id: CF01
-             * Initial Conditions:
-             * with {
-             *   the IUT being in the 'authorized' state
-             * }
-             * Expected Behaviour
-             * ensure that {
-             *   when {
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             * Expected results:
+             *   ensure that
+             *     when
              *       the IUT is requested to send a Beacon
-             *   } then {
+             *     then
              *       the IUT sends a SecuredMessage
-             *           containing exactly one header_fields ['signer_info']
-             *               containing signer
-             *                   containing type
-             *                       indicating 'certificate'
-             *                   and containing certificate
-             *       }
-             *   }
-             * 
+             *         containing exactly one header_fields ['signer_info']
+             *           containing signer
+             *             containing type
+             *               indicating 'certificate'
+             *             and containing certificate
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_GENMSG_03_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_GENMSG_03_01_BV * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_SND_GENMSG_03_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -3767,46 +3659,43 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_GENMSG_03_01_BV /** - * @desc Check that message generation time is inside the validity period of the signing certificate - * Check that message generation time value is realistic + * @desc Check that message generation time is inside the validity period of the signing certificate; + * Check that message generation time value is realistic *
-             * Pics Selection: PICS_GN_SECURITY and PICS_ITS_AID_OTHER_PROFILE
+             * Pics Selection: PICS_GN_SECURITY AND PICS_ITS_AID_OTHER_PROFILE = non-zero
              * Config Id: CF01
              * Initial conditions:
-             * with {
-             *   the IUT being in the 'authorized' state
-             * }
-             * Expected behaviour:
-             * ensure that {
-             *   when {
-             *     the IUT is requested to send a Beacon
-             *   } then {
-             *     the IUT sends a SecuredMessage
-             *       containing exactly one header_fields['generation_time']
+             *   with
+             *     the IUT being in the 'authorized' state
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send a Beacon
+             *     then
+             *       the IUT sends a SecuredMessage
+             *         containing exactly one header_fields['generation_time']
              *           containing generation_time
-             *               indicating TIME_1 (CUR_TIME - 10min <= TIME_1 <= CUR_TIME + 10min)
-             *       containing header_fields['signer_info']
+             *             indicating GEN_TIME (CUR_TIME - 10min <= GEN_TIME < CUR_TIME + 10min)
+             *         and containing header_fields['signer_info']
              *           containing signer
-             *               containing type
-             *                   indicating 'certificate'
-             *           containing certificate
+             *             containing type
+             *               indicating 'certificate'
+             *             containing certificate
              *               containing validity_restrictions['time_end']
-                                 containing end_validity
-                                     indicating value > GEN_TIME
-             *               and containing validity_restrictions['time_start_and_end']
-             *                   containing start_validity
-             *                       indicating value <= TIME_1
-             *                   and containing end_validity
-             *                       indicating value > TIME_1
+             *                 and containing end_validity
+             *                   indicating value > GEN_TIME
+             *               or containing validity_restrictions['time_start_and_end']
+             *                 containing start_validity
+             *                   indicating value <= GEN_TIME
+             *                 and containing end_validity
+             *                   indicating value > GEN_TIME
              *               or containing validity_restrictions['time_start_and_duration']
-             *                   containing start_validity (CERT_START_VALIDITY)
-             *                       indicating value <= GEN_TIME
-             *                   and containing duration
-             *                       indicating value > GEN_TIME - CERT_START_VALIDITY
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_GENMSG_04_01_BV + * containing start_validity (X_START_VALIDITY) + * indicating value <= GEN_TIME + * and containing duration + * indicating value > GEN_TIME - X_START_VALIDITY + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_GENMSG_04_01_BV * @reference ETSI TS 103 097 [1], clauses 5.4 and 7.3 */ testcase TC_SEC_ITSS_SND_GENMSG_04_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -3944,26 +3833,24 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_GENMSG_04_01_BV /** - * @desc Check that the secured GN Beacon contains exactly one HeaderField generation_location - * when AT certificate does not contain any region restrictions + * @desc Check that the secured GeoNetworking message contains exactly one HeaderField generation_location when AT certificate does not contain any region restrictions *
-             * Pics Selection: PICS_GN_SECURITY and PICS_ITS_AID_OTHER_PROFILE and PICS_CERTIFICATE_SELECTION
+             * Pics Selection: PICS_GN_SECURITY AND PICS_ITS_AID_OTHER_PROFILE = non-zero AND PICS_CERTIFICATE_SELECTION
              * Config Id: CF01
-             * with {
-             *   the IUT has been authorized with the AT certificate (CERT_IUT_A)
+             * Initial conditions:
+             *   with
+             *     the IUT has been authorized with the AT certificate (CERT_AT_A)
              *       not containing validity_restrictions['region']
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is requested to send a Beacon
-             *   } then {
-             *     the IUT sends a SecuredMessage
-             *         containing exactly one header_fields ['generation_location']
-             *             containing generation_location
-             *   }
-             * }
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send a Beacon
+             *     then
+             *       the IUT sends a SecuredMessage
+             *         containing exactly one header_fields['generation_location']
+             *           containing generation_location
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_GENMSG_05_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_GENMSG_05_01_BV * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_SND_GENMSG_05_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -4049,33 +3936,30 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_GENMSG_05_01_BV /** - * @desc Check that the secured GN Beacon contains exactly one HeaderField generation_location - * which is inside the circular region containing in the validity restriction of the - * certificate pointed by the signer_info field + * @desc Check that the secured GeoNetworking message contains exactly one HeaderField generation_location which is inside the circular region containing in the validity restriction of the certificate pointed by the signer_info field *
-             * Pics Selection: PICS_GN_SECURITY and PICS_ITS_AID_OTHER_PROFILE and PICS_CERTIFICATE_SELECTION and PICS_USE_CIRCULAR_REGION
+             * Pics Selection: PICS_GN_SECURITY AND PICS_ITS_AID_OTHER_PROFILE = non-zero AND PICS_CERTIFICATE_SELECTION AND PICS_USE_CIRCULAR_REGION
              * Config Id: CF01
-             * with {
-             *   the IUT has been authorized with the AT certificate (CERT_IUT_B)
-             *       containing validity_restrictions['region']
-             *           containing region
-             *               containing region_type
-             *                   indicating 'circle'
-             *               and containing circular_region
-             *                   indicating REGION
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is requested to send a GN Beacon
-             *   } then {
-             *     the IUT sends a SecuredMessage 
+             * Initial conditions:
+             *   with
+             *     the IUT has been authorized with the AT certificate (CERT_AT_B)
+             *       containing validity_restrictions ['region']
+             *         containing region
+             *           containing region_type
+             *             indicating 'circle'
+             *           and containing circular_region
+             *             indicating REGION
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send a Beacon
+             *     then
+             *       the IUT sends a SecuredMessage
              *         containing exactly one header_fields['generation_location']
-             *             containing generation_location
-             *                 indicating value inside the REGION
-             *   }
-             * }
+             *           containing generation_location
+             *             indicating value inside the REGION
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_GENMSG_05_02_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_GENMSG_05_02_BV * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_SND_GENMSG_05_02_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -4111,34 +3995,31 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_GENMSG_05_02_BV /** - * @desc Check that the secured GN Beacon contains exactly one HeaderField generation_location - * which is inside the rectangular region containing in the validity restriction - * of the certificate pointed by the signer_info field + * @desc Check that the secured GeoNetworking message contains exactly one HeaderField generation_location which is inside the rectangular region containing in the validity restriction of the certificate pointed by the signer_info field *
-             * Pics Selection: PICS_GN_SECURITY and PICS_ITS_AID_OTHER_PROFILE and PICS_CERTIFICATE_SELECTION and PICS_USE_RECTANGULAR_REGION
+             * Pics Selection: PICS_GN_SECURITY AND PICS_ITS_AID_OTHER_PROFILE = non-zero AND PICS_CERTIFICATE_SELECTION AND PICS_USE_RECTANGULAR_REGION
              * Config Id: CF01
-             * with {
-             *   the IUT has been authorized with the AT certificate (CERT_IUT_C)
+             * Initial conditions:
+             *   with
+             *     the IUT has been authorized with the AT certificate (CERT_AT_C)
              *       containing validity_restrictions ['region']
-             *           containing region
-             *               containing region_type
-             *                   indicating 'rectangle'
-             *               containing rectangular_region
-             *                   indicating REGION
-             * }
-             * ensure that {
-             *   when {
-             *       the IUT is requested to send a DENM
-             *   } then {
+             *         containing region
+             *           containing region_type
+             *             indicating 'rectangle'
+             *           containing rectangular_region
+             *             containing instance of RectangularRegion
+             *               indicating REGION
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send a Beacon
+             *     then
              *       the IUT sends a SecuredMessage
-             *           containing exactly one header_fields ['generation_location']
-             *               containing generation_location
-             *                   containing instance of RectangularRegion
-             *                       indicating value inside the REGION
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_GENMSG_05_03_BV + * containing exactly one header_fields['generation_location'] + * containing generation_location + * indicating value inside the REGION + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_GENMSG_05_03_BV * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_SND_GENMSG_05_03_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -4174,33 +4055,30 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_GENMSG_05_03_BV /** - * @desc Check that the secured GN Message contains exactly one HeaderField generation_location - * which is inside the polygonal region containing in the validity restriction - * of the certificate pointed by the signer_info field + * @desc Check that the secured GeoNetworking message contains exactly one HeaderField generation_location which is inside the polygonal region containing in the validity restriction of the certificate pointed by the signer_info field *
-             * Pics Selection: PICS_GN_SECURITY and PICS_ITS_AID_OTHER_PROFILE and PICS_CERTIFICATE_SELECTION and PICS_USE_POLYGONAL_REGION
+             * Pics Selection: PICS_GN_SECURITY AND PICS_ITS_AID_OTHER_PROFILE = non-zero AND PICS_CERTIFICATE_SELECTION AND PICS_USE_POLYGONAL_REGION
              * Config Id: CF01
-             * with {
-             *   the IUT has been authorized with the AT certificate (CERT_AT_D)
+             * Initial conditions:
+             *   with
+             *     the IUT has been authorized with the AT certificate (CERT_AT_D)
              *       containing validity_restrictions ['region']
-             *           containing region
-             *               containing region_type
-             *                   indicating 'polygon'
-             *               containing polygonal_region
-             *                   indicating REGION
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is requested to send a Beacon
-             *   } then {
-             *     the IUT sends a SecuredMessage
-             *       containing exactly one header_fields ['generation_location']
-             *         containing generation_location
-             *           indicating value inside the REGION
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_GENMSG_05_04_BV + * containing region + * containing region_type + * indicating 'polygon' + * containing polygonal_region + * indicating REGION + * Expected results: + * ensure that + * when + * the IUT is requested to send a Beacon + * then + * the IUT sends a SecuredMessage + * containing exactly one header_fields['generation_location'] + * containing generation_location + * indicating value inside the REGION + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_GENMSG_05_04_BV * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_SND_GENMSG_05_04_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -4236,33 +4114,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_GENMSG_05_04_BV /** - * @desc Check that the secured GN Message contains exactly one HeaderField generation_location - * which is inside the identified region containing in the validity restriction - * of the certificate pointed by the signer_info field + * @desc Check that the secured GeoNetworking message contains exactly one HeaderField generation_location which is inside the identified region containing in the validity restriction of the certificate pointed by the signer_info field *
-             * Pics Selection: PICS_GN_SECURITY and PICS_ITS_AID_OTHER_PROFILE and PICS_USE_IDENTIFIED_REGION and PICS_CERTIFICATE_SELECTION
+             * Pics Selection: PICS_GN_SECURITY AND PICS_ITS_AID_OTHER_PROFILE = non-zero AND PICS_CERTIFICATE_SELECTION AND PICS_USE_IDENTIFIED_REGION
              * Config Id: CF01
-             * with {
-             *   the IUT has been authorized with the AT certificate (CERT_IUT_E) 
-             *       containing validity_restrictions ['region'] 
-             *           containing region
-             *               containing region_type
-             *                   indicating 'id_region'
-             *               containing identified_region
-             *                   indicating REGION
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is requested to send a Beacon
-             *   } then {
-             *     the IUT sends a SecuredMessage
-             *       containing exactly one header_fields ['generation_location']
-             *         containing generation_location
-             *           indicating value inside the REGION
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_GENMSG_05_05_BV + * Initial conditions: + * with + * the IUT has been authorized with the AT certificate (CERT_AT_E) + * containing validity_restrictions ['region'] + * containing region + * containing region_type + * indicating 'id_region' + * containing identified_region + * indicating REGION + * Expected results: + * ensure that + * when + * the IUT is requested to send a Beacon + * then + * the IUT sends a SecuredMessage + * containing header_fields ['its_aid'] + * indicating 'AID_BEACON' + * containing exactly one header_fields['generation_location'] + * containing generation_location + * indicating value inside the REGION + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_GENMSG_05_05_BV * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_SND_GENMSG_05_05_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -4297,45 +4174,45 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_GENMSG_05_05_BV /** - * @desc Check that the secured GN Message contains exactly one HeaderField generation_location - * which is inside the certificate pointed by the signer_info field + * @desc Check that the secured GeoNetworking message contains exactly one HeaderField generation_location and this location is inside the certificate validation restriction *
-             * Pics Selection: PICS_GN_SECURITY and PICS_ITS_AID_OTHER_PROFILE and not PICS_CERTIFICATE_SELECTION
+             * Pics Selection: PICS_GN_SECURITY AND PICS_ITS_AID_OTHER_PROFILE = non-zero AND NOT PICS_CERTIFICATE_SELECTION
              * Config Id: CF01
-             * with {
-             *   the IUT being in the 'authorized' state
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is requested to send a Beacon
-             *   } then {
-             *     the IUT sends a SecuredMessage
-             *       containing header_fields['signed_info'].certificate
-             *         containing validity_restrictions ['region']
-             *           containing region.region_type
-             *             indicating 'circle'
-             *           containing region.circular_region
-             *             indicating REGION
-             *         or containing region.region_type
-             *             indicating 'rectangle'
-             *           containing region.rectangular_region
-             *             containing array of rectangles
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send a Beacon
+             *     then
+             *       the IUT sends a SecuredMessage
+             *         containing header_fields['signed_info'].certificate
+             *           containing validity_restrictions ['region']
+             *             containing region.region_type
+             *               indicating 'none'
+             *           or containing region.region_type
+             *               indicating 'circle'
+             *             containing region.circular_region
              *               indicating REGION
-             *         or containing region.region_type
-             *             indicating 'polygonal'
-             *           containing region.polygonal_region
-             *             indicating REGION
-             *         or containing region.region_type
-             *             indicating 'id_region'
-             *           containing region.circular_region
-             *             indicating REGION
-             *       and containing exactly one header_fields['generation_location']
-             *         containing generation_location
-             *           indicating location inside the REGION
-             *   }
-             * }
+             *           or containing region.region_type
+             *               indicating 'rectangle'
+             *             containing region.rectangular_region
+             *               containing array of rectangles
+             *                 indicating REGION
+             *           or containing region.region_type
+             *               indicating 'polygonal'
+             *             containing region.polygonal_region
+             *               indicating REGION
+             *           or containing region.region_type
+             *               indicating 'id_region'
+             *             containing region.circular_region
+             *               indicating REGION
+             *         and containing exactly one header_fields['generation_location']
+             *           containing generation_location
+             *             indicating location inside the REGION
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_GENMSG_05_06_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_GENMSG_05_06_BV * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_SND_GENMSG_05_06_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -4462,27 +4339,24 @@ module ItsSecurity_TestCases { } // End of group f_TC_SEC_ITSS_SND_GENMSG_05_xx /** - * @desc Check that the secured message contains of type signed, signed_external or signed_and_encrypted + * @desc Check that the secured message contains the Payload element of type signed, signed_external or signed_and_encrypted *
-             * Pics Selection: PICS_GN_SECURITY and PICS_ITS_AID_OTHER_PROFILE
+             * Pics Selection: PICS_GN_SECURITY AND PICS_ITS_AID_OTHER_PROFILE = non-zero
              * Config Id: CF01
              * Initial conditions:
-             * with {
+             *   with
              *     the IUT being in the 'authorized' state
-             * }
              * Expected results:
-             * ensure that {
-             *     when {
-             *         the IUT is requested to send a Beacon
-             *     } then {
-             *         the IUT sends a SecuredMessage {
-             *             containing payload_fields
-             *                 containing exactly one element of type Payload
-             *                     containing type
-             *                         indicating 'signed' or 'signed_external' or 'signed_and_encrypted'
-             * }
+             *   ensure that
+             *     when
+             *       the IUT is requested to send a Beacon
+             *     then
+             *       the IUT sends a SecuredMessage
+             *         containing payload_field
+             *           containing type
+             *             indicating 'signed' or 'signed_external' or 'signed_and_encrypted'
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_GENMSG_06_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_GENMSG_06_01_BV * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_SND_GENMSG_06_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -4581,34 +4455,31 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_GENMSG_06_01_BV /** - * @desc Check that the secured GN Message contains only one TrailerField of type signature ; - * Check that the signature contained in the SecuredMessage is calculated over the right fields by - * cryptographically verifying the signature + * @desc Check that the secured message contains only one TrailerField of type signature; + * Check that the signature contained in the SecuredMessage is calculated over the right fields by cryptographically verifying the signature *
-             * Pics Selection: PICS_GN_SECURITY and PICS_ITS_AID_OTHER_PROFILE
+             * Pics Selection: PICS_GN_SECURITY AND PICS_ITS_AID_OTHER_PROFILE = non-zero
              * Config Id: CF01
              * Initial conditions:
-             * with {
-             *   the IUT being in the 'authorized' state
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is requested to send Beacon
-             *   } then {
-             *     the IUT sends a SecuredMessage
+             *   with
+             *     the IUT being in the 'authorized' state
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send a Beacon
+             *     then
+             *       the IUT sends a SecuredMessage
              *         containing header_fields ['signer_info']
-             *             containing signer
-             *                 containing type
-             *                     indicating 'certificate'
-             *             and containing certificate
-             *                 indicating CERT
-             *         and containing trailer_fields['signature']
-             *             containing signature
-             *                 verifiable using CERT.subject_attributes['verification_key'] 
-             *   }
-             * }
+             *           containing signer
+             *             containing type
+             *               indicating 'certificate'
+             *             containing certificate
+             *               indicating CERT
+             *         and containing trailer_fields ['signature']
+             *           containing signature
+             *             verifiable using CERT.subject_attributes['verification_key']
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_GENMSG_07_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_GENMSG_07_01_BV * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_SND_GENMSG_07_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -4685,31 +4556,28 @@ module ItsSecurity_TestCases { group sendCertificatesProfile { /** - * @desc Check that AT certificate has version 2 + * @desc Check that AT certificate has version 2 *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   the IUT being requested to include certificate in the next CAM
-             * }
-             * Expected Behaviour:
-             * ensure that {
-             *    when {
-             *     the IUT is requested to send a CAM
-             *   } then {
-             *     the IUT sends a SecuredMessage
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     the IUT being requested to include certificate in the SecuredMessage
+             * Expected results:
+             *   ensure that
+             *      when
+             *       the IUT is requested to send a SecuredMessage
+             *     then
+             *       the IUT sends a SecuredMessage
              *         containing header_fields['signer_info'].signer
-             *             containing type
-             *                 indicating certificate
-             *             containing certificate
-             *                 containing version
-             *                     indicating '2'
-             *   }
-             * }
+             *           containing type
+             *             indicating certificate
+             *           containing certificate
+             *             containing version
+             *               indicating '2'
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_01_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_01_01_BV * @reference ETSI TS 103 097 [1], clauses 6.1 and 7.4.1 */ testcase TC_SEC_ITSS_SND_CERT_01_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -4769,33 +4637,30 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_01_01_BV /** - * @desc Check that AA certificate has version 2 + * @desc Check that AA certificate has version 2 *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *      the IUT being requested to include certificate chain in the next CAM
-             * }
-             * Expected Behaviour:
-             * ensure that {
-             *    when {
-             *     the IUT is requested to send a CAM
-             *   } then {
-             *     the IUT sends a SecuredMessage
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     the IUT being requested to include certificate chain in the next CAM
+             * Expected results:
+             *   ensure that
+             *      when
+             *       the IUT is requested to send a CAM
+             *     then
+             *       the IUT sends a SecuredMessage
              *         containing header_fields['signer_info'].signer
-             *             containing type
-             *                 indicating 'certificate_chain'
-             *             and containing certificates
-             *                 indicating length > 0
-             *                 and containing certificates[n] (0..N)
-             *                     containing version
-             *                         indicating '2'
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_01_02_BV + * containing type + * indicating 'certificate_chain' + * and containing certificates + * indicating length N > 0 + * and containing certificates [n] (0..N) + * containing version + * indicating '2' + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_01_02_BV * @reference ETSI TS 103 097 [1], clauses 6.1 and 7.4.1 */ testcase TC_SEC_ITSS_SND_CERT_01_02_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -4868,46 +4733,45 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_01_02_BV /** - * @desc Check that the references in the certificate chain are valid - * Check that signer_info type of all certificates in the chain are 'certificate_digest_with_sha256', - * 'certificate_digest_with_other_algorithm' or 'self' + * @desc Check that the references in the certificate chain are valid + * Check that signer_info type of all certificates in the chain are 'certificate_digest_with_sha256', 'certificate_digest_with_other_algorithm'or 'self' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   the IUT being requested to include certificate chain in the next CAM
-             * } ensure that {
-             *    when {
-             *     the IUT is requested to send a CAM
-             *   } then {
-             *     the IUT sends a SecuredMessage
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     the IUT being requested to include certificate chain in the next CAM
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send a CAM
+             *     then
+             *       the IUT sends a SecuredMessage
              *         containing header_fields['signer_info'].signer
-             *             containing type
-             *                 indicating 'certificate_chain'
-             *             and containing certificates
-             *                 indicating length > 0
+             *           containing type
+             *             indicating 'certificate_chain'
+             *           and containing certificates
+             *             indicating length N > 1
              *             and containing certificates[0]
-             *                 containing signer_info
-             *                     containing type
-             *                         indicating 'certificate_digest_with_sha256'
-             *                         or indicating 'certificate_digest_with_other_algorythm'
-             *                     and containing digest
-             *                         referenced to the trusted certificate
-             *                 or containing signer_info
-             *                     containing type
-             *                         indicating 'self'
+             *               containing signer_info
+             *                 containing type
+             *                   indicating 'certificate_digest_with_sha256'
+             *                   or indicating 'certificate_digest_with_other_algorythm'
+             *                 and containing digest
+             *                   referencing the trusted certificate
+             *               or containing signer_info
+             *                 containing type
+             *                   indicating 'self'
              *             and containing certificates[n] (1..N)
-             *                 containing signer_info
-             *                     containing type
-             *                         indicating 'certificate_digest_with_sha256'
-             *                         or indicating 'certificate_digest_with_other_algorythm'
-             *                     and containing digest
-             *                         referenced to the certificates[n-1]
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_02_01_BV + * containing signer_info + * containing type + * indicating 'certificate_digest_with_sha256' + * or indicating 'certificate_digest_with_other_algorythm' + * and containing digest + * referencing the certificates[n-1] + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_02_01_BV * @reference ETSI TS 103 097 [1], clause 4.2.10, 6.1 and 7.4.1 */ testcase TC_SEC_ITSS_SND_CERT_02_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -4980,39 +4844,37 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_02_01_BV /** - * @desc Check that the rectangular region validity restriction of the message signing certificate - * contains not more than six valid rectangles; - * Check that the rectangular region validity restriction of the message signing certificate is - * continuous and does not contain any holes + * @desc Check that the rectangular region validity restriction of the message signing certificate contains not more than six valid rectangles; + * Check that the rectangular region validity restriction of the message signing certificate is continuous and does not contain any holes *
-             * Pics Selection: PICS_GN_SECURITY and PICS_CERTIFICATE_SELECTION and PICS_USE_RECTANGULAR_REGION
+             * Pics Selection: PICS_GN_SECURITY AND PICS_CERTIFICATE_SELECTION AND PICS_USE_RECTANGULAR_REGION
              * Config Id: CF01
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   the IUT being requested to include certificate in the next CAM
-             * } ensure that {
-             *    when {
-             *     the IUT is requested to send a CAM
-             *   } then {
-             *     the IUT sends a SecuredMessage
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     the IUT being requested to include certificate in the next CAM
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send a CAM
+             *     then
+             *       the IUT sends a SecuredMessage
              *         containing header_fields['signer_info'].signer
-             *             containing type
-             *                 indicating 'certificate'
-             *             containing certificate
-             *                 containing validity_restrictions['region']
-             *                     containing region_type
-             *                         indicating 'rectangle'
-             *                     and containing rectangular_region
-             *                         indicating length <= 6
-             *                         and containing elements of type RectangularRegion
-             *                             indicating continuous region without holes
-             *                             and containing northwest and southeast
-             *                                 indicating northwest is on the north from southeast
-             *   }
-             * }
-             * @remark Certificate: cc_taCert_C
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_04_01_BV + * containing type + * indicating 'certificate' + * containing certificate + * containing validity_restrictions['region'] + * containing region + * containing region_type + * indicating 'rectangle' + * and containing rectangular_region + * indicating length <= 6 + * and containing elements of type RectangularRegion + * indicating continuous region without holes + * and containing northwest and southeast + * indicating northwest is on the north from southeast + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_04_01_BV * @reference ETSI TS 103 097 [1], clauses 4.2.20 and 4.2.23 */ testcase TC_SEC_ITSS_SND_CERT_04_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -5094,42 +4956,40 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_04_01_BV /** - * @desc Check that the rectangular region validity restriction of all certificates contains not more than - * six valid rectangles; - * Check that the rectangular region validity restriction of the AT certificate is continuous and - * does not contain any holes - * Check that the rectangular certificate validity region of the subordinate certificate is well formed and - * inside the validity region of the issuing certificate + * @desc Check that the rectangular region validity restriction of all certificates contains not more than six valid rectangles; + * Check that the rectangular region validity restriction of the AT certificate is continuous and does not contain any holes + * Check that the rectangular certificate validity region of the subordinate certificate is well formed and inside the validity region of the issuing certificate *
-             * Pics Selection: PICS_GN_SECURITY and PICS_CERTIFICATE_SELECTION and PICS_USE_RECTANGULAR_REGION
+             * Pics Selection: PICS_GN_SECURITY AND PICS_CERTIFICATE_SELECTION AND PICS_USE_RECTANGULAR_REGION
              * Config Id: CF01
-             * with {
+             * Initial conditions:
+             *   with
              *     the IUT being in the 'authorized' state
              *     the IUT being requested to include certificate chain in the next CAM
-             * } ensure that {
-             *   when {
-             *     the IUT is requested to send a CAM
-             * } then {
-             *     the IUT sends a SecuredMessage
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send a CAM
+             *     then
+             *       the IUT sends a SecuredMessage
              *         containing header_fields['signer_info'].signer
-             *             containing type
-             *                 indicating 'certificate_chain'
-             *             containing certificates
-             *                indicating length N > 0
-             *                and containing certificates [n] 0..n
-             *                    containing validity_restrictions['region']
-             *                        containing region_type
-             *                            indicating 'rectangle'
-             *                        and containing rectangular_region
-             *                            indicating length <= 6
-             *                            and containing elements of type RectangularRegion
-             *                                containing northwest and southeast
-             *                                    indicating northwest  on the north from southeast
-             *                                and indicating continuous region without holes
-             *    }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_04_02_BV + * containing type + * indicating 'certificate_chain' + * containing certificates + * indicating length N > 0 + * and containing certificates [n] (0..N) + * containing validity_restrictions['region'] + * containing region + * containing region_type + * indicating 'rectangle' + * and containing rectangular_region + * indicating length <= 6 + * and containing elements of type RectangularRegion + * containing northwest and southeast + * indicating northwest on the north from southeast + * and indicating continuous region without holes + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_04_02_BV * @reference ETSI TS 103 097 [1], clauses 4.2.20 and 4.2.23 */ testcase TC_SEC_ITSS_SND_CERT_04_02_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -5222,33 +5082,34 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_04_02_BV /** - * @desc Check that the polygonal certificate validity region contains at least three and no more than 12 points - * Check that the polygonal certificate validity region does not contain intersections and holes + * @desc Check that the polygonal certificate validity region contains at least three and no more than 12 points; + * Check that the polygonal certificate validity region does not contain intersections and holes *
-             * Pics Selection: PICS_GN_SECURITY and PICS_CERTIFICATE_SELECTION and PICS_USE_POLYGONAL_REGION
+             * Pics Selection: PICS_GN_SECURITY AND PICS_CERTIFICATE_SELECTION AND PICS_USE_POLYGONAL_REGION
              * Config Id: CF01
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   the IUT being requested to include certificate in the next CAM
-             * } ensure that {
-             *    when {
-             *     the IUT is requested to send a CAM
-             *   } then {
-             *     the IUT sends a SecuredMessage
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     the IUT being requested to include certificate in the next CAM
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send a CAM
+             *     then
+             *       the IUT sends a SecuredMessage
              *         containing header_fields['signer_info'].signer
-             *             containing type
-             *                 indicating 'certificate'
-             *             containing certificate
-             *                 containing validity_restrictions['region']
-             *                 and containing region_type
-             *                     indicating 'polygon'
-             *                 and containing polygonal_region 
-             *                     indicating length >=3 and <=12
-             *                     and indicating continuous region without holes and intersections
-             *   }
-             * }
+             *           containing type
+             *             indicating 'certificate'
+             *           containing certificate
+             *             containing validity_restrictions['region']
+             *               containing region
+             *                 containing region_type
+             *                   indicating 'polygon'
+             *                 and containing polygonal_region
+             *                   indicating length >=3 and <=12
+             *                   and indicating continuous region without holes and intersections
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_05_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_05_01_BV * @reference ETSI TS 103 097 [1], clause 4.2.24 */ testcase TC_SEC_ITSS_SND_CERT_05_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -5314,36 +5175,37 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_05_01_BV /** - * @desc Check that the polygonal certificate validity region is inside the validity region of the issuing certificate - * Check that the issuing polygonal certificate validity region contains at least three and no more than 12 points - * Check that the issuing polygonal certificate validity region does not contain intersections and holes + * @desc Check that the polygonal certificate validity region is inside the validity region of the issuing certificate; + * Check that the issuing polygonal certificate validity region contains at least three and no more than 12 points; + * Check that the issuing polygonal certificate validity region does not contain intersections and holes *
-             * Pics Selection: PICS_GN_SECURITY and PICS_CERTIFICATE_SELECTION and PICS_USE_POLYGONAL_REGION
+             * Pics Selection: PICS_GN_SECURITY AND PICS_CERTIFICATE_SELECTION AND PICS_USE_POLYGONAL_REGION
              * Config Id: CF01
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   the IUT being requested to include certificate chain in the next CAM
-             * } ensure that {
-             *    when {
-             *     the IUT is requested to send a CAM
-             *   } then {
-             *     the IUT sends a SecuredMessage
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     the IUT being requested to include certificate chain in the next CAM
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send a CAM
+             *     then
+             *       the IUT sends a SecuredMessage
              *         containing header_fields['signer_info'].signer
-             *             containing type
-             *                 indicating 'certificate_chain'
-             *             and containing certificates
-             *                 indicating length > 0
-             *             and containing certificates [n] (0..n)
-             *                 containing validity_restrictions['region']
-             *                     containing region_type
-             *                         indicating 'polygon'
-             *                     and containing polygonal_region
-             *                         indicating length >=3 and <=12
-             *                         and indicating continuous region without holes and intersections
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_05_02_BV + * containing type + * indicating 'certificate_chain' + * and containing certificates + * indicating length N > 0 + * and containing certificates [n] (0..N) + * containing validity_restrictions['region'] + * containing region + * containing region_type + * indicating 'polygon' + * and containing polygonal_region + * indicating length >=3 and <=12 + * and indicating continuous region without holes and intersections + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_05_02_BV * @reference ETSI TS 103 097 [1], clause 4.2.24 */ testcase TC_SEC_ITSS_SND_CERT_05_02_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -5436,44 +5298,42 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_05_02_BV /** - * @desc Check that the identified certificate validity region contains values that correspond to numeric country codes - * as defined in ISO 3166-1 or defined by United Nations Statistics Division + * @desc Check that the identified certificate validity region contains values that correspond to numeric country codes as defined in ISO 3166-1 or defined by United Nations Statistics Division *
-             * Pics Selection: PICS_GN_SECURITY and PICS_CERTIFICATE_SELECTION and PICS_USE_IDENTIFIED_REGION
+             * Pics Selection: PICS_GN_SECURITY AND PICS_CERTIFICATE_SELECTION AND PICS_USE_IDENTIFIED_REGION
              * Config Id: CF01
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   the IUT being requested to include certificate in the next CAM
-             * } ensure that {
-             *    when {
-             *     the IUT is requested to send a CAM
-             *   } then {
-             *     the IUT sends a SecuredMessage
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     the IUT being requested to include certificate in the next CAM
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send a CAM
+             *     then
+             *       the IUT sends a SecuredMessage
              *         containing header_fields['signer_info'].signer
-             *             containing type
-             *                 indicating 'certificate'
-             *             and containing certificate 
-             *                 containing validity_restrictions['region']
-             *                     containing region
-             *                         containing region_type
-             *                             indicating 'id'
-             *                         and containing id_region
-             *                             containing region_dictionary
-             *                                 indicating 'iso_3166_1' (0)
-             *                             and containing region_identifier
-             *                                 indicating valid value according to 'iso_3166_1'
-             *                         and containing local_region
-             *                     or containing region
-             *                         containing id_region
-             *                             containing region_dictionary
-             *                                  indicating 'un_stats'
-             *                             and containing region_identifier
-             *                                 indicating valid value according to UN STATS
-             *                             and containing local_region
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_06_01_BV + * containing type + * indicating 'certificate' + * and containing certificate + * containing validity_restrictions['region'] + * containing region + * containing region_type + * indicating 'id' + * and containing id_region + * containing region_dictionary + * indicating 'iso_3166_1' + * and containing region_identifier + * indicating valid value according to ISO-2166-1 + * and containing local_region + * or containing id_region + * containing region_dictionary + * indicating 'un_stats' + * and containing region_identifier + * indicating valid value according to UN STATS + * and containing local_region + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_06_01_BV * @reference ETSI TS 103 097 [1], clause 4.2.26 and 7.4.1 */ testcase TC_SEC_ITSS_SND_CERT_06_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -5528,49 +5388,48 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_06_01_BV /** - * @desc Check that the identified certificate validity region contains values that correspond to numeric country codes - * as defined in ISO 3166-1 or defined by United Nations Statistics Division - * Check that the identified certificate validity region contains values defining the region which is inside - * the validity region of the issuing certificate - * @remark The case when signing certificate and issuing certificate contain different type of region validity restriction is not supported by this test + * @desc Check that the identified certificate validity region contains values that correspond to numeric country codes as defined in ISO 3166-1 or defined by United Nations Statistics Division; + * Check that the identified certificate validity region contains values defining the region which is inside the validity region of the issuing certificate *
-             * Pics Selection: PICS_GN_SECURITY and PICS_CERTIFICATE_SELECTION and PICS_USE_IDENTIFIED_REGION
+             * Pics Selection: PICS_GN_SECURITY AND PICS_CERTIFICATE_SELECTION AND PICS_USE_IDENTIFIED_REGION
              * Config Id: CF01
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   the IUT being requested to include certificate chain in the next CAM
-             * } ensure that {
-             *    when {
-             *     the IUT is requested to send a CAM
-             *   } then {
-             *     the IUT sends a SecuredMessage
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     the IUT being requested to include certificate chain in the next CAM
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send a CAM
+             *     then
+             *       the IUT sends a SecuredMessage
              *         containing header_fields['signer_info'].signer
-             *             containing type
-             *                 indicating 'certificate_chain'
-             *             and containing certificate 
-             *                 indicating length N > 1
-             *                 and containing certificates[n] (0..N)
-             *                     containing validity_restrictions['region']
-             *                         containing region
-             *                             containing region_type
-             *                                 indicating 'id'
-             *                             and containing id_region
-             *                                     containing region_dictionary
-             *                                     indicating 'iso_3166_1' (0)
-             *                                 and containing region_identifier
-             *                                     indicating valid value according to 'iso_3166_1'
-             *                             and containing local_region
-             *                         or containing region
-             *                             containing id_region
-             *                                 containing region_dictionary
-             *                                     indicating 'un_stats'
-             *                                 and containing region_identifier
-             *                                     indicating valid value according to UN STATS
-             *                                 and containing local_region
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_06_02_BV + * containing type + * indicating 'certificate_chain' + * and containing certificates + * indicating length N > 1 + * and containing certificates[n](0..N) + * containing validity_restrictions['region'] + * containing region + * containing region_type + * indicating 'id' + * and containing id_region + * containing region_dictionary + * indicating 'iso_3166_1' + * and containing region_identifier + * indicating valid value according to ISO_3166-1 dictionary + * and containing local_region + * or containing region + * containing region_type + * indicating 'id' + * and containing id_region + * containing region_dictionary + * indicating 'un_stats' + * and containing region_identifier + * indicating valid value according to UN STATS dictionary + * and containing local_region + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_06_02_BV * @reference ETSI TS 103 097 [1], clause 4.2.26 and 7.4.1 */ testcase TC_SEC_ITSS_SND_CERT_06_02_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -5653,63 +5512,63 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_06_02_BV /** - * @desc Check that the region of the subordinate certificate validity restriction is inside the region of the issuing certificate validity restriction + * @desc Check that the region of the subordinate certificate validity restriction is inside the region of the issuing certificate validity restriction *
-             * Pics Selection: PICS_GN_SECURITY and PICS_CERTIFICATE_SELECTION
+             * Pics Selection: PICS_GN_SECURITY AND PICS_CERTIFICATE_SELECTION
              * Config Id: CF01
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   the IUT being requested to include certificate chain in the next CAM
-             * } ensure that {
-             *    when {
-             *     the IUT is requested to send a CAM
-             *   } then {
-             *     the IUT sends a SecuredMessage
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     the IUT being requested to include certificate chain in the next CAM
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send a CAM
+             *     then
+             *       the IUT sends a SecuredMessage
              *         containing header_fields['signer_info'].signer
-             *             containing type
-             *                 indicating 'certificate_chain'
-             *             and containing certificates 
-             *                 indicating length N > 1
-             *                 and containing certificates[n] (0..N)
-             *                     indicating certificate
-             *                         not containing validity_restrictions['region']
-             *                         and containing signer_info
-             *                             containing digest
-             *                                 referenced to the certificate
-             *                                     not containing validity_restrictions['region']
-             *                     or indicating certificate
-             *                         containing validity_restrictions['region']
-             *                             containing region.region_type
-             *                                 indicating 'none'
-             *                         and containing signer_info
-             *                             containing digest
-             *                                 referenced to the certificate
-             *                                     not containing validity_restrictions['region']
-             *                                     or containing validity_restrictions['region']
-             *                                         containing region.region_type
-             *                                             indicating 'none'
-             *                     or indicating certificate
-             *                         containing validity_restrictions['region']
-             *                             containing region.region_type
-             *                                 indicated 'circle'
-             *                                 or indicated 'rectangle'
-             *                                 or indicated 'polygon'
-             *                                 or indicated 'id'
-             *                             and containing region (X_CERT__REGION)
-             *                         and containing signer_info
-             *                             containing digest
-             *                                 referenced to the certificate
-             *                                     not containing validity_restrictions['region']
-             *                                     or containing validity_restrictions['region']
-             *                                         containing region.region_type
-             *                                             indicating 'none'
-             *                                     or containing validity_restrictions['region']
-             *                                         containing region
-             *                                             indicating region fully covering the X_CERT_REGION
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_07_01_BV + * containing type + * indicating 'certificate_chain' + * and containing certificates + * indicating length N > 1 + * and containing certificates[n](0..N) + * indicating certificate + * not containing validity_restrictions['region'] + * and containing signer_info + * containing digest + * referencing the certificate + * not containing validity_restrictions['region'] + * or indicating certificate + * containing validity_restrictions['region'] + * containing region.region_type + * indicating 'none' + * and containing signer_info + * containing digest + * referencing the certificate + * not containing validity_restrictions['region'] + * or containing validity_restrictions['region'] + * containing region.region_type + * indicating 'none' + * or indicating certificate + * containing validity_restrictions['region'] + * containing region.region_type + * indicated 'circle' + * or indicated 'rectangle' + * or indicated 'polygon' + * or indicated 'id' + * and containing region (X_CERT__REGION) + * and containing signer_info + * containing digest + * referencing the certificate + * not containing validity_restrictions['region'] + * or containing validity_restrictions['region'] + * containing region.region_type + * indicating 'none' + * or containing validity_restrictions['region'] + * containing region + * indicating region fully covering the X_CERT_REGION + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_07_01_BV * @reference ETSI TS 103 097 [1], clause 4.2.26 and 7.4.1 */ testcase TC_SEC_ITSS_SND_CERT_07_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -5800,60 +5659,61 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_07_01_BV /** - * @desc Check that the region of the subordinate certificate validity restriction is inside the region of the issuing certificate validity restriction + * @desc Check that the identified region validity restriction of the subordinate certificate is included in the identified region validity restriction of the issuing certificate *
-             * Pics Selection: PICS_GN_SECURITY and PICS_CERTIFICATE_SELECTION and PICS_USE_IDENTIFIED_REGION
+             * Pics Selection: PICS_GN_SECURITY AND PICS_CERTIFICATE_SELECTION AND PICS_USE_IDENTIFIED_REGION
              * Config Id: CF01
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   the IUT being requested to include certificate chain in the next CAM
-             *   the IUT being requested to include certificate chain in the next CAM
-             * } ensure that {
-             *    when {
-             *     the IUT is requested to send a CAM
-             *   } then {
-             *     the IUT sends a SecuredMessage
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     the IUT is using both AA and AT certificates with identified region validity restriction
+             *     the IUT being requested to include certificate chain in the next CAM
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send a CAM
+             *     then
+             *       the IUT sends a SecuredMessage
              *         containing header_fields['signer_info'].signer
-             *             containing type
-             *                 indicating 'certificate_chain'
-             *             and containing certificates 
-             *                 indicating length N > 1
-             *                 and containing certificates[n] (0..N)
-             *                     indicating certificate
-             *                         containing validity_restrictions['region']
-             *                             containing region.region_type
-             *                                 indicated 'id'
-             *                             and containing id_region
-             *                                 containing region_dictionary
-             *                                     indicating 'iso_3166_1' 
-             *                                     or indicating 'un_stat' 
-             *                                 and containing region_identifier (X_CERT_REGION_ID)
-             *                                     indicating valid value according to 'iso_3166_1' or 'un_stat' 
-             *                                 and containing local_region (X_CERT_LOCAL_REGION)
-             *                         and containing signer_info
-             *                             containing digest
-             *                                 referenced to the certificate
-             *                                     containing validity_restrictions['region']
-             *                                         containing region
-             *                                             indicated 'id'
-             *                                         and containing id_region
-             *                                             containing region_dictionary
-             *                                                 indicating 'iso_3166_1' 
-             *                                                 or indicating 'un_stat' 
-             *                                             and containing region_identifier
-             *                                                 indicating value == X_CERT_REGION_ID
-             *                                             and containing local_region
-             *                                                 indicating value == X_CERT_LOCAL_REGION
-             *                                                 or indicating 0
-             *                                             or containing id_region
-             *                                                 containing region_dictionary
-             *                                                    indicating 'un_stats'
-             *                                                 and containing region_identifier
-             *                                                     indicating region fully covering the X_CERT_REGION
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_07_02_BV + * containing type + * indicating 'certificate_chain' + * containing certificates + * indicating length > 1 + * and containing certificates [n] (0..N) + * containing validity_restrictions['region'] + * containing region + * containing region_type + * indicating 'id' + * containing id_region + * containing region_dictionary + * indicating 'iso_3166_1' + * or indicating 'un_stats' + * containing region_identifier (X_CERT_REGION_ID) + * indicating valid value according to ISO_3166-1 or UN STATS dictionary + * containing local_region (X_CERT_LOCAL_REGION) + * and containing signer_info + * containing digest + * referencing the certificate + * containing validity_restrictions['region'] + * containing region + * containing region_type + * indicating 'id' + * containing id_region + * containing region_dictionary + * indicating 'iso_3166_1' + * or indicating 'un_stats' + * and containing region_identifier + * indicating value == X_CERT_REGION_ID + * and containing local_region + * indicating value == X_CERT_LOCAL_REGION + * or indicating 0 + * or containing id_region + * containing region_dictionary + * indicating 'un_stats' + * and containing region_identifier + * indicating value fully covering the X_CERT_REGION_ID + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_07_02_BV * @reference ETSI TS 103 097 [1], clause 4.2.26 and 7.4.1 */ testcase TC_SEC_ITSS_SND_CERT_07_02_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -5944,49 +5804,64 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_02_01_BV /** - * @desc Check the certificate chain to ensure that the time validity restriction of the subordinate certificate is inside the time validity restriction of the issuing certificate + * @desc Check the certificate chain to ensure that the time validity restriction of the subordinate certificate is inside the time validity restriction of the issuing certificate *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   the IUT being requested to include certificate chain in the next CAM
-             * } ensure that {
-             *    when {
-             *     the IUT is requested to send a CAM
-             *   } then {
-             *     the IUT sends a SecuredMessage
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     the IUT being requested to include certificate chain in the next CAM
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send a CAM
+             *     then
+             *       the IUT sends a SecuredMessage
              *         containing header_fields['signer_info'].signer
-             *             containing type
-             *                 indicating 'certificate_chain'
-             *             containing certificates
-             *                 containing certificates[last-1]
-             *                     containing validity_restrictions
-             *                         containing validity_restrictions['time_start_and_end']
-             *                             containing start_validity
-             *                                 indicating START_AA_VALIDITY
-             *                             containing end_validity
-             *                                 indicating END_AA_VALIDITY >= START_AA_VALIDITY
-             *                     and containing signer_info
-             *                         containing digest
-             *                             referenced to the trusted certificate
-             *                                 containing validity_restrictions['time_end']
-             *                                     containing end_validity
-             *                                         indicating value > AA_END_VALIDITY
-             *                                 or containing validity_restrictions['time_start_and_end']
-             *                                     containing start_validity
-             *                                         indicating value <= AA_START_VALIDITY
-             *                                      and containing end_validity
-             *                                         indicating value > AA_END_VALIDITY
-             *                                 or containing validity_restrictions['time_start_and_duration']
-             *                                     containing start_validity
-             *                                         indicating X_START_VALIDITY <= AA_START_VALIDITY
-             *                                     and containing duration
-             *                                         indicating value > AA_END_VALIDITY - X_START_VALIDITY
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_08_01_BV + * containing type + * indicating 'certificate_chain' + * containing certificates + * indicating length N > 1 + * and containing certificates[n] (0..N) + * containing validity_restrictions + * containing validity_restrictions['time_end'] + * containing end_validity + * indicating X_END_VALIDITY_AT + * or containing validity_restrictions['time_start_and_end'] + * containing start_validity + * indicating X_START_VALIDITY_AT + * and containing end_validity + * indicating X_END_VALIDITY_AT >X_START_VALIDITY_AT + * or containing validity_restrictions['time_start_and_duration'] + * containing start_validity + * indicating X_START_VALIDITY_AT + * and containing end_validity + * indicating X_DURATION_AT > 0 + * and containing signer_info + * containing digest + * referencing the certificate + * containing validity_restrictions['time_end'] + * containing end_validity + * indicating value >= X_END_VALIDITY_AT if defined + * or indicating value >= X_START_VALIDITY_AT + X_DURATION_AT + * or containing validity_restrictions['time_start_and_end'] + * containing start_validity + * indicating value <= X_START_VALIDITY_AT if defined + * or indicating value <= CURRENT_TIME + * and containing end_validity + * indicating value >= X_END_VALIDITY_AT if defined + * or indicating value >= X_START_VALIDITY_AT + X_DURATION_AT + * or containing validity_restrictions['time_start_and_duration'] + * containing start_validity + * indicating X_START_VALIDITY_AA <= X_START_VALIDITY_AT if defined + * or indicating X_START_VALIDITY_AA <= CURRENT_TIME + * and containing duration + * indicating value >= X_END_VALIDITY_AT - X_START_VALIDITY_AA if defined + * or indicating value >= X_START_VALIDITY_AT + X_DURATION_AT - + * X_START_VALIDITY_AA + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_08_01_BV * @reference ETSI TS 103 097 [1], clauses 7.4.4 */ testcase TC_SEC_ITSS_SND_CERT_08_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -6088,35 +5963,31 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_08_01_BV /** - * @desc Check that the certificate signature contains ECC point of type set to either compressed_lsb_y_0, compressed_lsb_y_1 - * or x_coordinate_only + * @desc Check that the certificate signature contains ECC point of type set to either compressed_lsb_y_0, compressed_lsb_y_1 or x_coordinate_only *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *      the IUT being requested to include certificate in the next CAM
-             * }
-             * Expected Behaviour:
-             * ensure that {
-             *    when {
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     the IUT being requested to include certificate in the next CAM
+             * Expected results:
+             *   ensure that
+             *     when
              *       the IUT is requested to send a CAM
-             *   } then {
+             *     then
              *       the IUT sends a SecuredMessage
-             *           containing header_fields['signer_info'].signer
-             *               containing type
-             *                   indicating certificate
-             *               containing certificate
-             *                   containing signature.ecdsa_signature
-             *                       containing R.type
-             *                           indicating compressed_lsb_y_0
-             *                           or indicating compressed_lsb_y_1 
-             *                           or indicating x_coordinate_only
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_09_01_BV + * containing header_fields['signer_info'].signer + * containing type + * indicating 'certificate' + * containing certificate + * containing signature.ecdsa_signature + * containing R.type + * indicating compressed_lsb_y_0 + * or indicating compressed_lsb_y_1 + * or indicating x_coordinate_only + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_09_01_BV * @reference ETSI TS 103 097 [1], clause 4.2.9 */ testcase TC_SEC_ITSS_SND_CERT_09_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -6218,37 +6089,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_09_01_BV /** - * @desc Check that the all certificates in a chain have signatures contains ECC point of type set to either compressed_lsb_y_0, compressed_lsb_y_1 - * or x_coordinate_only + * @desc Check that the all certificates in a chain have signatures contains ECC point of type set to either compressed_lsb_y_0, compressed_lsb_y_1 or x_coordinate_only *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   the IUT being requested to include certificate in the next CAM
-             * }
-             * Expected Behaviour:
-             * ensure that {
-             *    when {
-             *     the IUT is requested to send a CAM
-             *   } then {
-             *     the IUT sends a SecuredMessage
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     the IUT being requested to include certificate in the next CAM
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send a CAM
+             *     then
+             *       the IUT sends a SecuredMessage
              *         containing header_fields['signer_info'].signer
-             *             containing type
-             *                 indicating 'certificate_chain'
-             *             containing certificates
-             *                 indicating length N > 1
-             *                 and indicating certificates[n] (0..N)
-             *                     containing signature.ecdsa_signature
-             *                         containing R.type
-             *                             indicating compressed_lsb_y_0
-             *                             or indicating compressed_lsb_y_1 
-             *                             or indicating x_coordinate_only 
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_09_02_BV + * containing type + * indicating 'certificate_chain' + * containing certificates + * indicating length N > 1 + * and containing certificates[n](0..N) + * containing signature.ecdsa_signature + * containing R.type + * indicating compressed_lsb_y_0 + * or indicating compressed_lsb_y_1 + * or indicating x_coordinate_only + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_09_02_BV * @reference ETSI TS 103 097 [1], clause 4.2.9 */ testcase TC_SEC_ITSS_SND_CERT_09_02_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -6317,35 +6184,31 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_09_02_BV /** - * @desc Check that the certificate verification key contains ECC point of type set to either compressed_lsb_y_0, compressed_lsb_y_1 - * or uncompressed + * @desc Check that the certificate verification key contains ECC point of type set to either compressed_lsb_y_0, compressed_lsb_y_1 or uncompressed *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   the IUT being requested to include certificate in the next CAM
-             * }
-             * Expected Behaviour:
-             * ensure that {
-             *    when {
-             *     the IUT is requested to send a CAM
-             *   } then {
-             *     the IUT sends a SecuredMessage
-             *       containing header_fields['signer_info'].signer
-             *         containing type
-             *           indicating certificate
-             *         containing certificate
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     the IUT being requested to include certificate in the next CAM
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send a CAM
+             *     then
+             *       the IUT sends a SecuredMessage
+             *         containing header_fields['signer_info'].signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate
              *             containing subject_attributes['verification_key']
-             *                 containing key.public_key.type
-             *                     indicating compressed_lsb_y_0
-             *                     or indicating compressed_lsb_y_1 
-             *                     or indicating x_coordinate_only
-             *   }
-             * }
+             *               containing key.public_key.type
+             *                 indicating compressed_lsb_y_0
+             *                 or indicating compressed_lsb_y_1
+             *                 or indicating uncompressed
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_10_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_10_01_BV * @reference ETSI TS 103 097 [1], clause 4.2.4 */ testcase TC_SEC_ITSS_SND_CERT_10_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -6453,37 +6316,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_10_01_BV /** - * @desc Check that all certificate in a chain have verification keys contains ECC point of type set to either compressed_lsb_y_0, compressed_lsb_y_1 - * or uncompressed + * @desc Check that all certificate in a chain have verification keys contains ECC point of type set to either compressed_lsb_y_0, compressed_lsb_y_1 or uncompressed *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   the IUT being requested to include certificate in the next CAM
-             * }
-             * Expected Behaviour:
-             * ensure that {
-             *    when {
-             *     the IUT is requested to send a CAM
-             *   } then {
-             *     the IUT sends a SecuredMessage
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     the IUT being requested to include certificate in the next CAM
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send a CAM
+             *     then
+             *       the IUT sends a SecuredMessage
              *         containing header_fields['signer_info'].signer
-             *             containing type
-             *                 indicating 'certificate_chain'
-             *             containing certificates
-             *                 indicating length N > 1
-             *                 and indicating certificates[n] (0..N)
-             *                     containing signature.ecdsa_signature
-             *                         containing subject_attributes['verification_key']
-             *                             indicating compressed_lsb_y_0
-             *                             or indicating compressed_lsb_y_1 
-             *                             or indicating uncompressed 
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_10_02_BV + * containing type + * indicating 'certificate_chain' + * and containing certificates + * indicating length N > 0 + * containing certificates [n] (0..N) + * containing subject_attributes['verification_key'] + * containing key.public_key.type + * indicating compressed_lsb_y_0 + * or indicating compressed_lsb_y_1 + * or indicating uncompressed + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_10_02_BV * @reference ETSI TS 103 097 [1], clause 4.2.4 */ testcase TC_SEC_ITSS_SND_CERT_10_02_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -6549,34 +6408,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_10_02_BV /** - * @desc Check the certificate signature + * @desc Check the certificate signature *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   the IUT being requested to include certificate in the next CAM
-             * } ensure that {
-             *    when {
-             *     the IUT is requested to send a CAM
-             *   } then {
-             *     the IUT sends a SecuredMessage
-             *       containing header_fields['signer_info'].signer
-             *         containing type
-             *           indicating 'certificate'
-             *         ND containing certificate
-             *           containing signer_info
-             *             containing type
-             *               indicating 'certificate_digest_with_sha256'
-             *             containing digest
-             *               referenced to the certificate CERT
-             *           and containing signature
-             *             verifiable using CERT.subject_attributes['verification_key'].key
-             *   }
-             * }
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     the IUT being requested to include certificate in the next CAM
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send a CAM
+             *     then
+             *       the IUT sends a SecuredMessage
+             *         containing header_fields['signer_info'].signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate
+             *             containing signer_info
+             *               containing type
+             *                 indicating 'certificate_digest_with_sha256'
+             *               and containing digest
+             *                 referencing the certificate CERT
+             *             and containing signature
+             *               verifiable using CERT.subject_attributes['verification_key'].key
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_09_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_11_01_BV * @reference ETSI TS 103 097 [1], clauses 6.1 and 7.4.1 */ testcase TC_SEC_ITSS_SND_CERT_11_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -6681,44 +6539,45 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_11_01_BV /** - * @desc Check the signatures of the certificates in the chain + * @desc Check the validity of signatures of all certificates in the chain *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   the IUT being requested to include certificate chain in the next CAM
-             * } ensure that {
-             *    when {
-             *     the IUT is requested to send a CAM
-             *   } then {
-             *     the IUT sends a SecuredMessage
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     the IUT being requested to include certificate chain in the next CAM
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is requested to send a CAM
+             *     then
+             *       the IUT sends a SecuredMessage
              *         containing header_fields['signer_info'].signer
              *           containing type
-             *               indicating 'certificate_chain'
-             *         and containing certificates
+             *             indicating 'certificate_chain'
+             *           and containing certificates
              *             indicating length N > 1
-             *             and containing certificate[0]
-             *                 containing signer_info
-             *                     containing type
-             *                         indicating 'certificate_digest_with_sha256'
-             *                     and containing digest
-             *                         referenced to the trusted certificate (CERT_ROOT)
-             *                 and containing signature
-             *                     verifiable using CERTIFICATES[N-1].subject_attributes['verification_key'].key
+             *             and containing certificates[0]
+             *               containing signer_info
+             *                 containing type
+             *                   indicating 'certificate_digest_with_sha256'
+             *                 and containing digest
+             *                   referencing the trusted certificate (CERT_ROOT)
+             *               and containing signature
+             *                 verifiable using CERT_ROOT
+             *                     .subject_attributes['verification_key'].key
              *             and containing certificates[n] (1..N)
-             *                 containing signer_info {
-             *                     containing type
-             *                         indicating 'certificate_digest_with_sha256'
-             *                     and containing digest
-             *                         referenced to the certificates[n-1]
-             *                 and containing signature
-             *                     verifiable using certificates[n-1].subject_attributes['verification_key'].key
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_09_02_BV + * containing signer_info + * containing type + * indicating 'certificate_digest_with_sha256' + * and containing digest + * referencing the certificates[n-1] + * and containing signature + * verifiable using certificates[n-1] + * .subject_attributes['verification_key'].key + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_11_02_BV * @reference ETSI TS 103 097 [1], clauses 6.1 and 7.4.1 */ testcase TC_SEC_ITSS_SND_CERT_11_02_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -6811,39 +6670,39 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_11_02_BV /** - * @desc Check that the assurance level of the subordinate certificate is equal to or less than the assurance level of the issuing certificate + * @desc Check that the assurance level of the subordinate certificate is equal to or less than the assurance level of the issuing certificate *
-             * Pics Selection: PICS_GN_SECURITY and PICS_CERTIFICATE_SELECTION
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   the IUT being requested to include certificate chain in the next CAM
-             * } ensure that {
-             *    when {
-             *     the IUT is requested to send a CAM
-             *   } then {
-             *     the IUT sends a SecuredMessage
-             *       containing header_fields['signer_info'].signer
-             *         containing type
-             *           indicating 'certificate_chain'
-             *         containing certificates
-             *           indicating length N > 1
-             *           and containing certificates[n](0..N)
-             *             containing subject_attributes ['assurance_level']
-             *               containig assurance_level
-             *                 containing bits [5-7]
-             *                   indicating assurance level CERT_AL
-             *             and containing signer_info
-             *               containing digest
-             *                 referenced to the certificate
-             *                   containing subject_attributes ['assurance_level']
-             *                     containing assurance_level
-             *                       containing bits [5-7]
-             *                         indicating value <= CERT_AL
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_12_01_BV + * Initial conditions: + * with + * the IUT being in the 'authorized' state + * the IUT being requested to include certificate chain in the next CAM + * Expected results: + * ensure that + * when + * the IUT is requested to send a CAM + * then + * the IUT sends a SecuredMessage + * containing header_fields['signer_info'].signer + * containing type + * indicating 'certificate_chain' + * containing certificates + * indicating length N > 1 + * and containing certificates[n](0..N) + * containing subject_attributes ['assurance_level'] + * containing assurance_level + * containing bits [5-7] + * indicating assurance level CERT_AL + * and containing signer_info + * containing digest + * referencing the certificate + * containing subject_attributes ['assurance_level'] + * containing assurance_level + * containing bits [5-7] + * indicating value <= CERT_AL + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_12_01_BV * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_SND_CERT_12_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -6913,28 +6772,29 @@ module ItsSecurity_TestCases { group AA_Certificates { /** - * @desc Check that the subject_type of the AA certificate is set to authorization_authority + * @desc Check that the subject_type of the AA certificate is set to authorization_authority *
                  * Pics Selection: PICS_GN_SECURITY
                  * Config Id: CF01
-                 * with {
-                 *   the IUT being in the 'authorized' state
-                 *   the IUT being requested to include certificate chain in the next CAM
-                 * } ensure that {
-                 *    when {
-                 *     the IUT is requested to send a CAM
-                 *   } then {
-                 *     the IUT sends a SecuredMessage
-                 *       containing header_fields['signer_info'].signer
-                 *         containing type
-                 *           indicating 'certificate_chain'
-                 *         containing certificates[last-1]
-                 *           containing subject_info.subject_type
-                 *             indicating 'authorization_authority' (2)
-                 *   }
-                 * }
+                 * Initial conditions:
+                 *   with
+                 *     the IUT being in the 'authorized' state
+                 *     the IUT being requested to include certificate chain in the next CAM
+                 * Expected results:
+                 *   ensure that
+                 *     when
+                 *       the IUT is requested to send a CAM
+                 *     then
+                 *       the IUT sends a SecuredMessage
+                 *         containing header_fields['signer_info'].signer
+                 *           containing type
+                 *             indicating 'certificate_chain'
+                 *           and containing certificates
+                 *             containing certificates[last-1]
+                 *               containing subject_info.subject_type
+                 *                 indicating 'authorization_authority'
                  * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_AA_01_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_AA_01_01_BV * @reference ETSI TS 103 097 [1], clause 7.4.4 */ testcase TC_SEC_ITSS_SND_CERT_AA_01_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -6980,28 +6840,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_AA_01_01_BV /** - * @desc Check that the AA certificsate subject_name variable-length vector contains 32 bytes maximum + * @desc Check that the AA certificsate subject_name variable-length vector contains 32 bytes maximum *
                  * Pics Selection: PICS_GN_SECURITY
                  * Config Id: CF01
-                 * with {
-                 *   the IUT being in the 'authorized' state
-                 *   the IUT being requested to include certificate chain in the next CAM
-                 * } ensure that {
-                 *    when {
-                 *     the IUT is requested to send a CAM
-                 *   } then {
-                 *     the IUT sends a SecuredMessage
-                 *       containing header_fields['signer_info'].signer
-                 *         containing type
-                 *           indicating 'certificate_chain'
-                 *         containing certificates[last-1]
-                 *           containing subject_info.subject_name
-                 *             indicating length <= 32 bytes
-                 *   }
-                 * }
+                 * Initial conditions:
+                 *   with
+                 *     the IUT being in the 'authorized' state
+                 *     the IUT being requested to include certificate chain in the next CAM
+                 * Expected results:
+                 *   ensure that
+                 *     when
+                 *       the IUT is requested to send a CAM
+                 *     then
+                 *       the IUT sends a SecuredMessage
+                 *         containing header_fields['signer_info'].signer
+                 *           containing type
+                 *             indicating 'certificate_chain'
+                 *           and containing certificates
+                 *             containing certificates[last-1]
+                 *               containing subject_info.subject_name
+                 *                 indicating length <= 32 bytes
                  * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_AA_02_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_AA_02_01_BV * @reference ETSI TS 103 097 [1], clause 6.2 */ testcase TC_SEC_ITSS_SND_CERT_AA_02_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -7048,29 +6909,30 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_AA_02_01_BV /** - * @desc Check that signer_info type of AA certificates is set to 'certificate_digest_with_sha256' + * @desc Check that signer_info type of AA certificates is set to 'certificate_digest_with_sha256' *
                  * Pics Selection: PICS_GN_SECURITY
                  * Config Id: CF01
-                 * with {
-                 *   the IUT being in the 'authorized' state
-                 *   the IUT being requested to include certificate chain in the next CAM
-                 * } ensure that {
-                 *    when {
-                 *     the IUT is requested to send a CAM
-                 *   } then {
-                 *     the IUT sends a SecuredMessage
-                 *       containing header_fields['signer_info'].signer
-                 *         containing type
-                 *           indicating 'certificate_chain'
-                 *         containing certificates[last-1]
-                 *           containing signer_info
-                 *             containing type
-                 *               indicating 'certificate_digest_with_sha256'
-                 *   }
-                 * }
+                 * Initial conditions:
+                 *   with
+                 *     the IUT being in the 'authorized' state
+                 *     the IUT being requested to include certificate chain in the next CAM
+                 * Expected results:
+                 *   ensure that
+                 *     when
+                 *       the IUT is requested to send a CAM
+                 *     then
+                 *       the IUT sends a SecuredMessage
+                 *         containing header_fields['signer_info'].signer
+                 *           containing type
+                 *             indicating 'certificate_chain'
+                 *           and containing certificates
+                 *             containing certificates[last-1]
+                 *               containing signer_info
+                 *                 containing type
+                 *                   indicating 'certificate_digest_with_sha256'
                  * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_AA_03_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_AA_03_01_BV * @reference ETSI TS 103 097 [1], clause 7.4.4 */ testcase TC_SEC_ITSS_SND_CERT_AA_03_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -7118,36 +6980,36 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_AA_03_01_BV /** - * @desc Check that AA certificate is signed by Root CA or other authority - * @remark There is no clear specification that AA cert shall be signed by the Root CA only + * @desc Check that AA certificate is signed by Root CA or other authority + * NOTE: there is no clear specification that AA cert shall be signed by the Root CA only *
                  * Pics Selection: PICS_GN_SECURITY
                  * Config Id: CF01
-                 * with {
-                 *   the IUT being in the 'authorized' state
-                 *   the IUT being requested to include certificate in the next CAM
-                 * } ensure that {
-                 *    when {
-                 *     the IUT is requested to send a CAM
-                 *   } then {
-                 *     the IUT sends a SecuredMessage
-                 *       containing header_fields['signer_info'].signer
-                 *         containing type
-                 *           indicating 'certificate_chain'
-                 *         containing certificates
-                 *           containing certificates[last-1]
-                 *             containing signer_info
-                 *               containing type
-                 *                 indicating 'certificate_digest_with_ecdsap256'
-                 *               and containing digest
-                 *                 referencing to the trusted certificate
-                 *                   containing subject_info.subject_type
-                 *                     indicating 'root_ca'
-                 *                     or indicating 'authorisation_authority'
-                 *   }
-                 * }
+                 * Initial conditions:
+                 *   with
+                 *     the IUT being in the 'authorized' state
+                 *     the IUT being requested to include certificate chain in the next CAM
+                 * Expected results:
+                 *   ensure that
+                 *     when
+                 *       the IUT is requested to send a CAM
+                 *     then
+                 *       the IUT sends a SecuredMessage
+                 *         containing header_fields['signer_info'].signer
+                 *           containing type
+                 *             indicating 'certificate_chain'
+                 *           and containing certificates
+                 *             containing certificates[last-1]
+                 *               containing signer_info
+                 *                 containing type
+                 *                   indicating 'certificate_digest_with_ecdsap256'
+                 *                 and containing digest
+                 *                   referencing to the trusted certificate
+                 *                     containing subject_info.subject_type
+                 *                       indicating 'root_ca'
+                 *                       or indicating 'authorisation_authority'
                  * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_AA_04_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_AA_04_01_BV * @reference ETSI TS 103 097 [1], clauses 6.3 */ testcase TC_SEC_ITSS_SND_CERT_AA_04_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -7212,31 +7074,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_AA_04_01_BV /** - * @desc Check that all neccesary subject attributes are present and arranged in accesing order + * @desc Check that all necessary subject attributes are present and arranged in ascending order *
                  * Pics Selection: PICS_GN_SECURITY
                  * Config Id: CF01
-                 * with {
-                 *   the IUT being in the 'authorized' state
-                 *   the IUT being requested to include certificate chain in the next CAM
-                 * } ensure that {
-                 *    when {
-                 *     the IUT is requested to send a CAM
-                 *   } then {
-                 *     the IUT sends a SecuredMessage
-                 *       containing header_fields['signer_info'].signer
-                 *         containing type
-                 *           indicating 'certificate_chain'
-                 *         containing certificates[last-1]
-                 *           containing subject_attributes [0..N]
-                 *             indicating subject_attributes[n].type < subject_attributes[n+ 1].type
-                 *             containing subject_attributes['verification_key']
-                 *             containing subject_attributes['assurance_level']
-                 *             containing subject_attributes['its_aid_list']
-                 *   }
-                 * }
+                 * Initial conditions:
+                 *   with
+                 *     the IUT being in the 'authorized' state
+                 *     the IUT being requested to include certificate chain in the next CAM
+                 * Expected results:
+                 *   ensure that
+                 *     when
+                 *       the IUT is requested to send a CAM
+                 *     then
+                 *       the IUT sends a SecuredMessage
+                 *         containing header_fields['signer_info'].signer
+                 *           containing type
+                 *             indicating 'certificate_chain'
+                 *           and containing certificates
+                 *             containing certificates[last-1]
+                 *               containing subject_attributes [0..N]
+                 *                 indicating subject_attributes[n].type
+                 *                     < subject_attributes[n+1].type
+                 *                 and containing subject_attributes['verification_key']
+                 *                 and containing subject_attributes['assurance_level']
+                 *                 and containing subject_attributes['its_aid_list']
                  * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_AA_05_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_AA_05_01_BV * @reference ETSI TS 103 097 [1], clauses 6.1, 7.4.1 and 7.4.4 */ testcase TC_SEC_ITSS_SND_CERT_AA_05_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -7297,30 +7161,31 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_AA_05_01_BV /** - * @desc Check that all AIDs containing in the its_aid_list in AA certificate are unique - * Check that AID list contains not more then 31 items + * @desc Check that all AIDs containing in the its_aid_list in AA certificate are unique + * Check that AID list contains not more than 31 items *
                  * Pics Selection: PICS_GN_SECURITY
                  * Config Id: CF01
-                 * with {
-                 *   the IUT being in the 'authorized' state
-                 *   the IUT being requested to include certificate chain in the next CAM
-                 * } ensure that {
-                 *    when {
-                 *     the IUT is requested to send a CAM
-                 *   } then {
-                 *     the IUT sends a SecuredMessage
-                 *       containing header_fields['signer_info'].signer
-                 *         containing type
-                 *           indicating 'certificate_chain'
-                 *         containing certificates[last-1]
-                 *           containing subject_attributes['its_aid_list']
-                 *             containing its_aid_list[0..N]
-                 *               containing no more then 31 unique item
-                 *   }
-                 * }
+                 * Initial conditions:
+                 *   with
+                 *     the IUT being in the 'authorized' state
+                 *     the IUT being requested to include certificate chain in the next CAM
+                 * Expected results:
+                 *   ensure that
+                 *     when
+                 *       the IUT is requested to send a CAM
+                 *     then
+                 *       the IUT sends a SecuredMessage
+                 *         containing header_fields['signer_info'].signer
+                 *           containing type
+                 *             indicating 'certificate_chain'
+                 *           and containing certificates
+                 *             containing certificates[last-1]
+                 *               containing subject_attributes['its_aid_list']
+                 *                 containing its_aid_list
+                 *                   containing not more than 31 unique items
                  * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_AA_08_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_AA_08_01_BV * @reference ETSI TS 103 097 [1], clauses 7.4.4 */ testcase TC_SEC_ITSS_SND_CERT_AA_08_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -7385,32 +7250,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_AA_08_01_BV /** - * @desc Check that all mandatory validity restrictions are present and arranged in ascending order + * @desc Check that all mandatory validity restrictions are present and arranged in ascending order *
                  * Pics Selection: PICS_GN_SECURITY
                  * Config Id: CF01
-                 * with {
-                 *   the IUT being in the 'authorized' state
-                 *   the IUT being requested to include certificate chain in the next CAM
-                 * } ensure that {
-                 *    when {
-                 *     the IUT is requested to send a CAM
-                 *   } then {
-                 *     the IUT sends a SecuredMessage
-                 *       containing header_fields['signer_info'].signer
+                 * Initial conditions:
+                 *   with
+                 *     the IUT being in the 'authorized' state
+                 *     the IUT being requested to include certificate chain in the next CAM
+                 * Expected results:
+                 *   ensure that
+                 *     when
+                 *       the IUT is requested to send a CAM
+                 *     then
+                 *       the IUT sends a SecuredMessage
+                 *         containing header_fields['signer_info'].signer
                  *           containing type
-                 *               indicating 'certificate_chain'
+                 *             indicating 'certificate_chain'
                  *           and containing certificates
-                 *               containing certificates[last-1]
-                 *                   containing validity_restrictions[0..N]
-                 *                       indicating validity_restrictions[n].type < validity_restrictions[n+1].type
-                 *                       and containing validity_restrictions['time_start_and_end']
-                 *                       and not containing validity_restrictions['time_end']
-                 *                       and not containing validity_restrictions['time_start_and_duration']
-                 *   }
-                 * }
+                 *             containing certificates[last-1]
+                 *               containing validity_restrictions[0..N]
+                 *                 indicating validity_restrictions[n].type
+                 *                     < validity_restrictions[n+1].type
+                 *                 and containing validity_restrictions['time_start_and_end']
+                 *                 and not containing validity_restrictions['time_end']
+                 *                 and not containing validity_restrictions['time_start_and_duration']
                  * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_AA_10_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_AA_10_01_BV * @reference ETSI TS 103 097 [1], clauses 6.1, 6.7 and 7.4.1 */ testcase TC_SEC_ITSS_SND_CERT_AA_10_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -7489,50 +7355,51 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_AA_10_01_BV /** - * @desc Check that time_start_and_end is included in the AA certificate validation restrictions; - * Check that end_validity is greater than start_validity - * Check that validity restriction of AA certificate is inside the validity restriction of its issuing certificate + * @desc Check that time_start_and_end is included in the AA certificate validation restrictions; + * Check that end_validity is greater than start_validity; + * Check that validity restriction of AA certificate is inside the validity restriction of its issuing certificate *
                  * Pics Selection: PICS_GN_SECURITY
                  * Config Id: CF01
-                 * with {
-                 *   the IUT being in the 'authorized' state
-                 *   the IUT being requested to include certificate chain in the next CAM
-                 * } ensure that {
-                 *    when {
-                 *     the IUT is requested to send a CAM
-                 *   } then {
-                 *     the IUT sends a SecuredMessage
-                 *       containing header_fields['signer_info'].signer
-                 *         containing type
-                 *           indicating 'certificate_chain'
-                 *         containing certificates[last-1] {
-                 *           containing validity_restrictions
-                 *             containing validity_restrictions['time_start_and_end']
-                 *               containing start_validity
-                 *                 indicating START_AA_VALIDITY
-                 *               containing end_validity
-                 *                 indicating END_AA_VALIDITY >=START_AA_VALIDITY
-                 *             and containing signer_info
-                 *               containing digest
-                 *                 referenced to the trusted certificate
-                 *                   containing validity_restrictions['time_end']
-                 *                     containing end_validity
-                 *                       indicating value > AA_END_VALIDITY
-                 *                   or containing validity_restrictions['time_start_and_end']
-                 *                     containing start_validity
-                 *                       indicating value <= AA_START_VALIDITY
-                 *                     and containing end_validity
-                 *                       indicating value > AA_END_VALIDITY
-                 *                   or containing validity_restrictions['time_start_and_duration']
-                 *                     containing start_validity
-                 *                       indicating X_START_VALIDITY <= AA_START_VALIDITY
-                 *                     and containing duration
-                 *                       indicating value > AA_END_VALIDITY - X_START_VALIDITY
-                 *   }
-                 * }
+                 * Initial conditions:
+                 *   with
+                 *     the IUT being in the 'authorized' state
+                 *     the IUT being requested to include certificate chain in the next CAM
+                 * Expected results:
+                 *   ensure that
+                 *     when
+                 *       the IUT is requested to send a CAM
+                 *     then
+                 *       the IUT sends a SecuredMessage
+                 *         containing header_fields['signer_info'].signer
+                 *           containing type
+                 *             indicating 'certificate_chain'
+                 *           containing certificates
+                 *             containing certificates[last-1]
+                 *               containing validity_restrictions
+                 *                 containing validity_restrictions['time_start_and_end']
+                 *                   containing start_validity
+                 *                     indicating START_VALIDITY_AA
+                 *                   containing end_validity
+                 *                     indicating END_VALIDITY_AA >=START_VALIDITY_AA
+                 *               and containing signer_info
+                 *                 containing digest
+                 *                   referencing the trusted certificate
+                 *                     containing validity_restrictions['time_end']
+                 *                       containing end_validity
+                 *                         indicating value > END_VALIDITY_AA
+                 *                     or containing validity_restrictions['time_start_and_end']
+                 *                       containing start_validity
+                 *                         indicating value <= START_VALIDITY_AA
+                 *                       and containing end_validity
+                 *                         indicating value > END_VALIDITY_AA
+                 *                     or containing validity_restrictions['time_start_and_duration']
+                 *                       containing start_validity
+                 *                         indicating X_START_VALIDITY <= START_VALIDITY_AA
+                 *                       and containing duration
+                 *                         indicating value > END_VALIDITY_AA - X_START_VALIDITY
                  * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_AA_11_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_AA_11_01_BV * @reference ETSI TS 103 097 [1], clauses 7.4.4 */ testcase TC_SEC_ITSS_SND_CERT_AA_11_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -7602,28 +7469,28 @@ module ItsSecurity_TestCases { group AT_Certificates { /** - * @desc Check that the subject_type of the AT certificate is set to 'authorization_ticket' + * @desc Check that the subject_type of the AT certificate is set to 'authorization_ticket' *
                  * Pics Selection: PICS_GN_SECURITY
                  * Config Id: CF01
-                 * with {
+                 * Initial conditions:
+                 *   with
                  *     the IUT being in the 'authorized' state
                  *     the IUT being requested to include certificate in the next CAM
-                 * } ensure that {
-                 *      when {
-                 *          the IUT is requested to send a CAM
-                 *     } then {
-                 *         the IUT sends a SecuredMessage
-                 *             containing header_fields['signer_info'].signer
-                 *                 containing type
-                 *                     indicating 'certificate'
-                 *                 and containing certificate
-                 *                     containing subject_info.subject_type
-                 *                         indicating 'authorization_ticket' (1)
-                 *     }
-                 * }
+                 * Expected results:
+                 *   ensure that
+                 *     when
+                 *       the IUT is requested to send a CAM
+                 *     then
+                 *       the IUT sends a SecuredMessage
+                 *         containing header_fields['signer_info'].signer
+                 *           containing type
+                 *             indicating 'certificate'
+                 *           and containing certificate
+                 *             containing subject_info.subject_type
+                 *               indicating 'authorization_ticket'
                  * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_AT_01_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_AT_01_01_BV * @reference ETSI TS 103 097 [1], clause 7.4.2 */ testcase TC_SEC_ITSS_SND_CERT_AT_01_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -7665,28 +7532,28 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_AT_01_01_BV /** - * @desc Check that the subject_name variable-length vector is empty for AT certificates + * @desc Check that the subject_name variable-length vector is empty for AT certificates *
                  * Pics Selection: PICS_GN_SECURITY
                  * Config Id: CF01
-                 * with {
+                 * Initial conditions:
+                 *   with
                  *     the IUT being in the 'authorized' state
                  *     the IUT being requested to include certificate in the next CAM
-                 * } ensure that {
-                 *      when {
-                 *          the IUT is requested to send a CAM
-                 *      } then {
-                 *          the IUT sends a SecuredMessage
-                 *              containing header_fields['signer_info'].signer
-                 *                  containing type
-                 *                      indicating 'certificate'
-                 *                  and containing certificates
-                 *                      containing subject_info.subject_name
-                 *                          indicating length = 0
-                 *     }
-                 * }
+                 * Expected results:
+                 *   ensure that
+                 *     when
+                 *       the IUT is requested to send a CAM
+                 *     then
+                 *       the IUT sends a SecuredMessage
+                 *         containing header_fields['signer_info'].signer
+                 *           containing type
+                 *             indicating 'certificate'
+                 *           and containing certificate
+                 *             containing subject_info.subject_name
+                 *               indicating length = 0
                  * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_AT_02_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_AT_02_01_BV * @reference ETSI TS 103 097 [1], clause 7.4.2 */ testcase TC_SEC_ITSS_SND_CERT_AT_02_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -7728,29 +7595,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_AT_02_01_BV /** - * @desc Check that signer_info type of AT certificates is set to 'certificate_digest_with_sha256' + * @desc Check that signer_info type of AT certificates is set to 'certificate_digest_with_sha256' *
                  * Pics Selection: PICS_GN_SECURITY
                  * Config Id: CF01
-                 * with {
+                 * Initial conditions:
+                 *   with
                  *     the IUT being in the 'authorized' state
                  *     the IUT being requested to include certificate in the next CAM
-                 * } ensure that {
-                 *      when {
-                 *          the IUT is requested to send a CAM
-                 *      } then {
-                 *          the IUT sends a SecuredMessage
-                 *              containing header_fields['signer_info'].signer
-                 *                  containing type
-                 *                      indicating 'certificate'
-                 *                  and containing certificate
-                 *                      containing signer_info
-                 *                          containing type
-                 *                              indicating 'certificate_digest_with_sha256'
-                 *      }
-                 * }
+                 * Expected results:
+                 *   ensure that
+                 *     when
+                 *       the IUT is requested to send a CAM
+                 *     then
+                 *       the IUT sends a SecuredMessage
+                 *         containing header_fields['signer_info'].signer
+                 *           containing type
+                 *             indicating 'certificate'
+                 *           and containing certificate
+                 *             containing signer_info.
+                 *               containing type
+                 *                 indicating 'certificate_digest_with_sha256'
                  * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_AT_03_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_AT_03_01_BV * @reference ETSI TS 103 097 [1], clauses 7.4.2 */ testcase TC_SEC_ITSS_SND_CERT_AT_03_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -7794,31 +7661,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_AT_03_01_BV /** - * @desc Check that subject attributes are present and arranged in ascending order + * @desc Check that subject attributes are present and arranged in ascending order *
                  * Pics Selection: PICS_GN_SECURITY
                  * Config Id: CF01
-                 * with {
+                 * Initial conditions:
+                 *   with
                  *     the IUT being in the 'authorized' state
                  *     the IUT being requested to include certificate in the next CAM
-                 * } ensure that {
-                 *     when {
-                 *         the IUT is requested to send a CAM
-                 *     } then {
-                 *         the IUT sends a SecuredMessage
-                 *             containing header_fields['signer_info'].signer
-                 *                 containing type
-                 *                     indicating 'certificate'
-                 *             containing certificate
-                 *                 containing subject_attributes [0..N]
-                 *                     indicating subject_attributes[n].type < subject_attributes[n+ 1].type
-                 *                 containing subject_attributes['verification_key']
-                 *                 containing subject_attributes['assurance_level']
-                 *                 containing subject_attributes['its_aid_ssp_list']
-                 *     }
-                 * }
+                 * Expected results:
+                 *   ensure that
+                 *     when
+                 *       the IUT is requested to send a CAM
+                 *     then
+                 *       the IUT sends a SecuredMessage
+                 *         containing header_fields['signer_info'].signer
+                 *           containing type
+                 *             indicating 'certificate'
+                 *           containing certificate
+                 *             containing subject_attributes [0..N]
+                 *               indicating subject_attributes[n].type
+                 *                     < subject_attributes[n+1].type
+                 *               containing subject_attributes['verification_key']
+                 *               containing subject_attributes['assurance_level']
+                 *               containing subject_attributes['its_aid_ssp_list']
                  * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_AT_04_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_AT_04_01_BV * @reference ETSI TS 103 097 [1], clauses 7.4.1 and 7.4.2 */ testcase TC_SEC_ITSS_SND_CERT_AT_04_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -7878,51 +7746,51 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_AT_04_01_BV /** - * @desc Check that time_start_and_end is included in the AT certificate validation restrictions - * Check that time_start_and_end is inside the AA certificate time restrictions - * Check that validity restriction of AT certificate is inside the validity restriction of its issuing certificate + * @desc Check that time_start_and_end is included in the AT certificate validation restrictions; + * Check that time_start_and_end is inside the AA certificate time restrictions + * Check that validity restriction of AT certificate is inside the validity restriction of its issuing certificate *
                  * Pics Selection: PICS_GN_SECURITY
                  * Config Id: CF01
-                 * with {
-                 *   the IUT being in the 'authorized' state
-                 *   the IUT being requested to include certificate chain in the next CAM
-                 * } ensure that {
-                 *    when {
-                 *     the IUT is requested to send a CAM
-                 *   } then {
-                 *     the IUT sends a SecuredMessage
-                 *       containing header_fields['signer_info'].signer
-                 *         containing type
-                 *           indicating 'certificate_chain'
-                 *         containing certificates[last] 
-                 *           containing subject_info.subject_type
-                 *             indicating 'authorization_ticket' (1)
-                 *           not containing validity_restrictions['time_end']
-                 *           and not containing validity_restrictions['time_start_and_duration']
-                 *           and containing validity_restrictions['time_start_and_end'] 
-                 *             containing start_validity
-                 *               indicating START_AT_VALIDITY
-                 *             and containing end_validity
-                 *               indicating END_AT_VALIDITY
-                 *         and containing certificates[last-1] 
-                 *           containing validity_restrictions['time_end']
-                 *             containing end_validity
-                 *               indicating value > AT_END_VALIDITY
-                 *           or containing validity_restrictions['time_start_and_end']
-                 *             containing start_validity
-                 *               indicating value <= AT_START_VALIDITY
-                 *             containing end_validity
-                 *               indicating value > AT_END_VALIDITY
-                 *           or containing validity_restrictions['time_start_and_duration']
-                 *             containing start_validity
-                 *               indicating X_START_VALIDITY <= AT_START_VALIDITY
-                 *             and containing duration
-                 *               indicating value > AT_END_VALIDITY - X_START_VALIDITY
-                 *   }
-                 * }
+                 * Initial conditions:
+                 *   with
+                 *     the IUT being in the 'authorized' state
+                 *     the IUT being requested to include certificate chain in the next CAM
+                 * Expected results:
+                 *   ensure that
+                 *     when
+                 *       the IUT is requested to send a CAM
+                 *     then
+                 *       the IUT sends a SecuredMessage
+                 *         containing header_fields['signer_info'].signer
+                 *           containing type
+                 *             indicating certificate_chain
+                 *           containing certificates[last]
+                 *             containing subject_info.subject_type
+                 *               indicating 'authorization_ticket'
+                 *              not containing validity_restrictions['time_end']
+                 *                and not containing validity_restrictions['time_start_and_duration']
+                 *             and containing validity_restrictions['time_start_and_end']
+                 *               containing start_validity
+                 *                 indicating START_VALIDITY_AT
+                 *               containing end_validity
+                 *                 indicating END_VALIDITY_AT
+                 *           containing certificates[last-1]
+                 *             containing validity_restrictions['time_end']
+                 *               containing end_validity
+                 *                 indicating value > END_VALIDITY_AT
+                 *             or containing validity_restrictions['time_start_and_end']
+                 *               containing start_validity
+                 *                 indicating value <= START_VALIDITY_AT
+                 *               and containing end_validity
+                 *                 indicating value > END_VALIDITY_AT
+                 *             or containing validity_restrictions['time_start_and_duration']
+                 *               containing start_validity
+                 *                 indicating X_START_VALIDITY <= START_VALIDITY_AT
+                 *               and containing duration
+                 *                 indicating value > END_VALIDITY_AT - X_START_VALIDITY
                  * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_AT_05_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_AT_05_01_BV * @reference ETSI TS 103 097 [1], clause 7.4.2 */ testcase TC_SEC_ITSS_SND_CERT_AT_05_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -8016,44 +7884,43 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_AT_05_01_BV /** - * @desc Check that all AIDs containing in the its_aid_ssp_list in AT certificate are unique - * Check that all AIDs containing in the its_aid_ssp_list in AT certificate are also containing in the - * its_aid_list in the correspondent AA certificate - * Check that the length of SSP of each AID is 31 octet maximum + * @desc Check that all AIDs containing in the its_aid_ssp_list in AT certificate are unique; + * Check that all AIDs containing in the its_aid_ssp_list in AT certificate are also containing in the its_aid_list in the correspondent AA certificate; + * Check that the length of SSP of each AID is 31 octets maximum *
                  * Pics Selection: PICS_GN_SECURITY
                  * Config Id: CF01
-                 * with {
-                 *   the IUT being in the 'authorized' state
-                 *   the IUT being requested to include certificate chain in the next CAM
-                 * } ensure that {
-                 *    when {
-                 *     the IUT is requested to send a CAM
-                 *   } then {
-                 *     the IUT sends a SecuredMessage
-                 *       containing header_fields['signer_info'].signer
-                 *         containing type
-                 *           indicating 'certificate_chain'
-                 *         containing certificates[last-1] 
-                 *           containing subject_info.subject_type
-                 *             indicating 'authorization_authority' (2)
-                 *           containing subject_attributes['its_aid_list']
-                 *             containing its_aid_list[0..N]
-                 *               indicating ITS_AID_LIST_AA
-                 *         containing certificates[last] 
-                 *           containing subject_info.subject_type
-                 *             indicating 'authorization_ticket' (1)
-                 *           containing subject_attributes['its_aid_ssp_list']
-                 *             containing its_aid_ssp_list[0..N] 
-                 *               containing its_aid_ssp_list[n]
-                 *                 containing its_aid
-                 *                   indicating unique value containing in the  ITS_AID_LIST_AA
-                 *                 containing service_specific_permissions
-                 *                   indicating length <= 31 octet
-                 *   }
-                 * }
+                 * Initial conditions:
+                 *   with
+                 *     the IUT being in the 'authorized' state
+                 *     the IUT being requested to include certificate chain in the next CAM
+                 * Expected results:
+                 *   ensure that
+                 *     when
+                 *       the IUT is requested to send a CAM
+                 *     then
+                 *       the IUT sends a SecuredMessage
+                 *         containing header_fields['signer_info'].signer
+                 *           containing type
+                 *             indicating certificate_chain
+                 *           containing certificates[last-1]
+                 *             containing subject_info.subject_type
+                 *               indicating 'authorization_authority'
+                 *             and containing subject_attributes['its_aid_list']
+                 *               containing its_aid_list[0..N]
+                 *                 indicating ITS_AID_LIST_AA
+                 *           and containing certificates[last]
+                 *             containing subject_info.subject_type
+                 *               indicating 'authorization_ticket'
+                 *             and containing subject_attributes['its_aid_ssp_list']
+                 *               containing its_aid_ssp_list[0..N]
+                 *                 containing its_aid_ssp_list[n]
+                 *                   containing its_aid
+                 *                     indicating unique value containing in the  ITS_AID_LIST_AA
+                 *                   and containing service_specific_permissions
+                 *                     indicating length <= 31 octet
                  * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_AT_07_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_AT_07_01_BV * @reference ETSI TS 103 097 [1], clauses 6.9 and 7.4.2 */ testcase TC_SEC_ITSS_SND_CERT_AT_07_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -8132,39 +7999,39 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_AT_07_01_BV /** - * @desc Check that AT certificate is signed by AA cert + * @desc Check that AT certificate is signed by AA cert *
                  * Pics Selection: PICS_GN_SECURITY
                  * Config Id: CF01
-                 * with {
-                 *   the IUT being in the 'authorized' state
-                 *   the IUT being requested to include certificate chain in the next CAM
-                 * } ensure that {
-                 *    when {
-                 *     the IUT is requested to send a CAM
-                 *   } then {
-                 *     the IUT sends a SecuredMessage
-                 *       containing header_fields['signer_info'].signer
-                 *         containing type
-                 *           indicating 'certificate_chain'
-                 *         containing certificates[last-1] (CERT_AA)
-                 *           containing subject_info.subject_type
-                 *             indicating 'authorization_authority' (2)
-                 *           and containing subject_attributes['verification key'] (KEY)
-                 *         containing certificates[last] 
-                 *           containing subject_info.subject_type
-                 *             indicating 'authorization_ticket' (1)
-                 *           and containing signer_info[0]
-                 *             containing type
-                 *               indicating 'certificate_digest_with_sha256'
-                 *             containing digest
-                 *               referencing to CERT_AA
-                 *           and containing signature
-                 *             verifiable using KEY
-                 *   }
-                 * }
+                 * Initial conditions:
+                 *   with
+                 *     the IUT being in the 'authorized' state
+                 *     the IUT being requested to include certificate chain in the next CAM
+                 * Expected results:
+                 *   ensure that
+                 *     when
+                 *       the IUT is requested to send a CAM
+                 *     then
+                 *       the IUT sends a SecuredMessage
+                 *         containing header_fields['signer_info'].signer
+                 *           containing type
+                 *             indicating certificate_chain
+                 *           containing certificates[last-1] (CERT_AA)
+                 *             containing subject_info.subject_type
+                 *               indicating 'authorization_authority'
+                 *             and containing subject_attributes['verification key'] (KEY)
+                 *           containing certificates[last]
+                 *             containing subject_info.subject_type
+                 *               indicating 'authorization_ticket'
+                 *             and containing signer_info
+                 *               containing type
+                 *                 indicating 'certificate_digest_with_ecdsap256'
+                 *               and containing digest
+                 *                 referencing to CERT_AA
+                 *             and containing signature
+                 *               verifiable using KEY
                  * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_AT_08_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_AT_08_01_BV * @reference ETSI TS 103 097 [1], clause 6.3 */ testcase TC_SEC_ITSS_SND_CERT_AT_08_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -8223,31 +8090,31 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_SND_CERT_AT_08_01_BV /** - * @desc Check that all necessary validity restrictions are present and arranged in ascending order + * @desc Check that all necessary validity restrictions are present and arranged in ascending order *
                  * Pics Selection: PICS_GN_SECURITY
                  * Config Id: CF01
-                 * with {
-                 *   the IUT being in the 'authorized' state
-                 *   the IUT being requested to include certificate in the next CAM
-                 * } ensure that {
-                 *    when {
-                 *     the IUT is requested to send a CAM
-                 *   } then {
-                 *     the IUT sends a SecuredMessage
-                 *       containing header_fields['signer_info'].signer
-                 *         containing type
-                 *           indicating 'certificate'
-                 *         containing certificate
-                 *           containing subject_attributes [0..N]
-                 *             indicating subject_attributes[n].type < subject_attributes[n+ 1].type
-                 *             containing subject_attributes['verification_key']
-                 *             containing subject_attributes['assurance_level']
-                 *             containing subject_attributes['its_aid_ssp_list']
-                 *   }
-                 * }
+                 * Initial conditions:
+                 *   with
+                 *     the IUT being in the 'authorized' state
+                 *     the IUT being requested to include certificate in the next CAM
+                 * Expected results:
+                 *   ensure that
+                 *     when
+                 *       the IUT is requested to send a CAM
+                 *     then
+                 *       the IUT sends a SecuredMessage
+                 *         containing header_fields['signer_info'].signer
+                 *           containing type
+                 *             indicating 'certificate'
+                 *           containing certificate
+                 *             containing validity_restrictions
+                 *               indicating validity_restrictions[n].type < validity_restrictions[n+1].type
+                 *               and containing validity_restrictions['time_start_and_end']
+                 *               and not containing validity_restrictions['time_end']
+                 *               and not containing validity_restrictions['time_start_and_duration']
                  * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_SND_CERT_AT_10_01_BV + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_SND_CERT_AT_10_01_BV * @reference ETSI TS 103 097 [1], clauses 6.1 */ testcase TC_SEC_ITSS_SND_CERT_AT_10_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -8324,75 +8191,71 @@ module ItsSecurity_TestCases { group recvCamProfile { /** - * @desc Check that IUT accepts a well-formed Secured CAM containing certificate in signer_info + * @desc Check that IUT accepts a well-formed Secured CAM containing certificate in signer_info *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing protocol_version 
-             *                  indicating value '2'
-             *              and containing header_fields[0]
-             *                  containing type 
-             *                      indicating 'signer_info'
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_AT_A)
-             *                          containing subject_info.subject_type
-             *                              indicating 'authorization_ticket' (2)
-             *                          and containing subject_attributes['verification key'] (KEY)
-             *              and containing header_fields [1]
-             *                  containing type
-             *                      indicating 'generation_time'
-             *                  containing generation_time
-             *                      indicating CURRENT_TIME
-             *              and containing header_fields[2] 
-             *                  containing type
-             *                      indicating 'its_aid'
-             *                  containing its_aid
-             *                      indicating 'AID_CAM'
-             *              and not containing any other header fields
-             *              and containing payload_field 
-             *                  containing type
-             *                      indicating 'signed'
-             *                  containing data
-             *                      indicating length > 0
-             *                      containing CAM payload
-             *              and containing trailer_fields 
-             *                  containing single instance of type TrailerField
-             *                      containing type
-             *                          indicating 'signature'
-             *                      containing signature
-             *                          verifiable using KEY
-             *      } then {
-             *          the IUT accepts the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_01_01_BV - * @reference ETSI TS 103 097 [1], clause 7.1 - */ - testcase TC_SEC_ITSS_RCV_CAM_01_01_BV() runs on ItsGeoNetworking system ItsSecSystem { - - // Local variables - var integer i; - var GeoNetworkingPdu v_securedGnPdu; - var GnRawPayload v_sentRawPayload; - - // Test adapter configuration - if (not(PICS_GN_SECURITY)) { - log("*** " & testcasename() & ":ERROR: 'PICS_GN_SECURITY' required for executing the TC ***"); - stop; - } - + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage + * containing protocol_version + * indicating value '2' + * and containing header_fields[0] + * containing type + * indicating 'signer_info' + * and containing signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_A_AT) + * containing subject_info.subject_type + * indicating 'authorization_ticket' + * and containing subject_attributes['verification key'] (KEY) + * and containing header_fields [1] + * containing type + * indicating 'generation_time' + * and containing generation_time + * indicating CURRENT_TIME + * and containing header_fields[2] + * containing type + * indicating 'its_aid' + * and containing its_aid + * indicating 'AID_CAM' + * and containing payload_field + * containing type + * indicating 'signed' + * and containing data + * indicating length > 0 + * containing CAM payload + * and containing trailer_fields + * containing trailer_fields[0] + * containing type + * indicating 'signature' + * containing signature + * verifiable using KEY + * then + * the IUT accepts the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_01_01_BV + * @reference ETSI TS 103 097 [1], clause 7.1 + */ + testcase TC_SEC_ITSS_RCV_CAM_01_01_BV() runs on ItsGeoNetworking system ItsSecSystem { + + // Local variables + var integer i; + var GeoNetworkingPdu v_securedGnPdu; + var GnRawPayload v_sentRawPayload; + + // Test adapter configuration + if (not(PICS_GN_SECURITY)) { + log("*** " & testcasename() & ":ERROR: 'PICS_GN_SECURITY' required for executing the TC ***"); + stop; + } + // Test component configuration f_cf01Up(); @@ -8425,62 +8288,58 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_01_01_BV /** - * @desc Check that IUT accepts a well-formed Secured CAM containing certificate digest of the known certificate in signer_info + * @desc Check that IUT accepts a well-formed Secured CAM containing certificate digest of the known certificate in signer_info *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             *      and the IUT already sent a Secured message containing certificate (CERT_TS_A_AT)
-             *          containing subject_info.subject_type
-             *              indicating 'authorization_ticket' (2)
-             *          and containing subject_attributes['verification key'] (KEY)
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing protocol_version 
-             *                  indicating value '2'
-             *              and containing header_fields[0]
-             *                  containing type 
-             *                      indicating 'signer_info'
-             *                  and containing signer
-             *                      containing type
-             *                          indicating 'certificate_digest_with_sha256'
-             *                      and containing digest
-             *                          referencing to certificate (CERT_TS_A_AT)
-             *              and containing header_fields [1]
-             *                  containing type
-             *                      indicating 'generation_time'
-             *                  containing generation_time
-             *                      indicating CURRENT_TIME
-             *              and containing header_fields[2]
-             *                  containing type
-             *                      indicating 'its_aid'
-             *                  containing its_aid
-             *                      indicating 'AID_CAM'
-             *              and not containing any other header fields
-             *              and containing payload_field 
-             *                  containing type
-             *                      indicating 'signed'
-             *                  containing data
-             *                      indicating length > 0
-             *                      containing CAM payload
-             *              and containing trailer_fields
-             *                  containing single instance of type TrailerField
-             *                      containing type
-             *                          indicating 'signature'
-             *                      containing signature
-             *                          verifiable using KEY
-             *      } then {
-             *          the IUT accepts the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_01_02_BV + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * and the IUT already received a Secured message containing certificate (CERT_TS_A_AT) + * containing subject_info.subject_type + * indicating 'authorization_ticket' + * and containing subject_attributes['verification key'] (KEY) + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage + * containing protocol_version + * indicating value '2' + * and containing header_fields[0] + * containing type + * indicating 'signer_info' + * and containing signer + * containing type + * indicating 'certificate_digest_with_sha256' + * and containing digest + * referencing to certificate (CERT_TS_A_AT) + * and containing header_fields [1] + * containing type + * indicating 'generation_time' + * and containing generation_time + * indicating CURRENT_TIME + * and containing header_fields[2] + * containing type + * indicating 'its_aid' + * and containing its_aid + * indicating 'AID_CAM' + * and containing payload_field + * containing type + * indicating 'signed' + * and containing data + * indicating length > 0 + * containing CAM payload + * and containing trailer_fields + * containing trailer_fields[0] + * containing type + * indicating 'signature' + * containing signature + * verifiable using KEY + * then + * the IUT accepts the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_01_02_BV * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_01_02_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -8528,72 +8387,68 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_01_02_BV /** - * @desc Check that IUT accepts a well-formed Secured CAM containing certificate chain in signer_info + * @desc Check that IUT accepts a well-formed Secured CAM containing certificate chain in signer_info *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing protocol_version 
-             *                  indicating value '2'
-             *              and containing header_fields[0]
-             *                  containing type 
-             *                      indicating 'signer_info'
-             *                  and containing signer
-             *                      containing type
-             *                          indicating 'certificate_chain'
-             *                      and containing certificates
-             *                          containing certificate (CERT_TS_A_AA) at index 0 
-             *                              containing subject_info.subject_type
-             *                                  indicating 'authorization_authority'
-             *                              and containing subject_attributes['verification key'] (KEY_TS_AA)
-             *                          and containing certificate (CERT_TS_A_AT) at index 1 
-             *                              containing subject_info.subject_type
-             *                                  indicating 'authorization_ticket'
-             *                              and containing signer_info 
-             *                                  containing type
-             *                                      indicating 'certificate_digest_with_sha256'
-             *                                  containing digest
-             *                                      referencing to the CERT_TS_A_AA
-             *                              and containing signature
-             *                                  verifiable using KEY_TS_AA
-             *                              and containing subject_attributes['verification key'] (KEY_TS_AT)
-             *              and containing header_fields [1] 
-             *                  containing type
-             *                      indicating 'generation_time'
-             *                  containing generation_time
-             *                      indicating CURRENT_TIME
-             *              and containing header_fields[2] 
-             *                  containing type
-             *                      indicating 'its_aid'
-             *                  containing its_aid
-             *                      indicating 'AID_CAM'
-             *              and not containing any other header fields
-             *              and containing payload_field 
-             *                  containing type
-             *                      indicating 'signed'
-             *                  containing data
-             *                      indicating length > 0
-             *                      containing CAM payload
-             *              and containing trailer_fields 
-             *                  containing single instance of type TrailerField 
-             *                      containing type
-             *                          indicating 'signature'
-             *                      containing signature
-             *                          verifiable using KEY_TC_AT
-             *      } then {
-             *          the IUT accepts the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_01_03_BV + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage + * containing protocol_version + * indicating value '2' + * and containing header_fields[0] + * containing type + * indicating 'signer_info' + * and containing signer + * containing type + * indicating 'certificate_chain' + * and containing certificates + * containing certificates[0] (CERT_TS_A_AA) + * containing subject_info.subject_type + * indicating 'authorization_authority' + * and containing subject_attributes['verification key'] (KEY_TS_AA) + * and containing certificates[1] (CERT_TS_A_AT) + * containing subject_info.subject_type + * indicating 'authorization_ticket' + * and containing signer_info + * containing type + * indicating 'certificate_digest_with_sha256' + * and containing digest + * referencing to the CERT_TS_A_AA + * and containing signature + * verifiable using KEY_TS_AA + * and containing subject_attributes['verification key'] (KEY_TS_AT) + * and containing header_fields [1] + * containing type + * indicating 'generation_time' + * and containing generation_time + * indicating CURRENT_TIME + * and containing header_fields[2] + * containing type + * indicating 'its_aid' + * and containing its_aid + * indicating 'AID_CAM' + * and containing payload_field + * containing type + * indicating 'signed' + * and containing data + * indicating length > 0 + * containing CAM payload + * and containing trailer_fields + * containing trailer_fields[0] + * containing type + * indicating 'signature' + * and containing signature + * verifiable using KEY_TC_AT + * then + * the IUT accepts the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_01_03_BV * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_01_03_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -8641,27 +8496,24 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_01_03_BV /** - * @desc Check that IUT discards a Secured CAM containing protocol version set to a value less then 2 + * @desc Check that IUT discards a Secured CAM containing protocol version set to a value less than 2 *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-             *              containing protocol_version 
-             *                  indicating 1
-             *      } then {
-             *          the IUT discards a SecuredMessage
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_02_01_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing protocol_version + * indicating 1 + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_02_01_BO * @reference ETSI TS 103 097 [1], clause 5.1 */ testcase TC_SEC_ITSS_RCV_CAM_02_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -8709,26 +8561,24 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_02_01_BO /** - * @desc Check that IUT discards a Secured CAM containing protocol version set to a value greater then 2 + * @desc Check that IUT discards a Secured CAM containing protocol version set to a value greater than 2 *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-             *              containing protocol_version 
-             *                  indicating 3
-             *      } then {
-             *          the IUT discards a SecuredMessage
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_02_02_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing protocol_version + * indicating 3 + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_02_02_BO * @reference ETSI TS 103 097 [1], clause 5.1 */ testcase TC_SEC_ITSS_RCV_CAM_02_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -8776,37 +8626,31 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_02_02_BO /** - * @desc Check that IUT discards a secured CAM if the header_fields contains more than one element of header field type: signer_info + * @desc Check that IUT discards a secured CAM if the header_fields contains more than header field 'signer_info' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[2].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[3]
-             *              containing type
-             *                  indicating 'its_aid'
-             *              containing its_aid
-             *                  indicating 'AID_CAM'
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_04_01_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields[0].type + * indicating 'signer_info' + * and containing header_fields[1].type + * indicating 'signer_info' + * and containing header_fields[2].type + * indicating 'generation_time' + * and containing header_fields[3].type + * indicating 'its_aid' + * and not containing other header fields + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_04_01_BO * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_04_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -8871,33 +8715,27 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_04_01_BO /** - * @desc Check that IUT discards a secured CAM if the header_fields does not contain the header field type: signer_info + * @desc Check that IUT discards a secured CAM if the header_fields does not contain the header 'signer_info' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when {  
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) 
-             *          containing header_fields[0].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[1]
-             *              containing type
-             *                  indicating 'its_aid'
-             *              containing its_aid
-             *                  indicating 'AID_CAM'
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_04_02_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields[0].type + * indicating 'generation_time' + * and containing header_fields[1].type + * indicating 'its_aid' + * and not containing other header fields + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_04_02_BO * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_04_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -8957,37 +8795,30 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_04_02_BO /** - * @desc Check that IUT is able to receive a secured CAM if the signer_info header field is not encoded first + * @desc Check that IUT is able to receive a secured CAM where the header fields 'signer_info' is not encoded first *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when {  
-             *    the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-             *      containing header_fields[0].type
-             *        indicating 'signer_info'
-             *      and containing header_fields[1].type
-             *        indicating 'generation_time'
-             *      and containing header_fields[2].type
-             *        indicating 'signer_info'
-             *      and containing header_fields[3]
-             *        containing type
-             *          indicating 'its_aid'
-             *        containing its_aid
-             *          indicating 'AID_CAM'
-             *      and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_04_03_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * and the IUT is sending CAMs + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields[0].type + * indicating 'generation_time' + * and containing header_fields[1].type + * indicating 'its_aid' + * and containing header_fields[2].type + * indicating 'signer_info' + * and not containing other header fields + * then + * the IUT discards the SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_04_03_BO * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_04_03_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -9048,33 +8879,31 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_04_03_BO /** - * @desc Check that IUT discards a secured CAM if the header_fields doesn't contain the element of header field of type: generation_time + * @desc Check that IUT discards a secured CAM if the header_fields contains more than one header field 'generation_time' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when {  
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1]
-             *              containing type
-             *                  indicating 'its_aid'
-             *              containing its_aid
-             *                  indicating 'AID_CAM'
-             *       and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_04_04_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields[0].type + * indicating 'signer_info' + * and containing header_fields[1].type + * indicating 'generation_time' + * and containing header_fields[2].type + * indicating 'generation_time' + * and containing header_fields[3].type + * indicating 'its_aid' + * and not containing other header fields + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_04_04_BO * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_04_04_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -9134,33 +8963,27 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_04_04_BO /** - * @desc Check that IUT discards a secured CAM if the header_fields does not contain the header field type: generation_time + * @desc Check that IUT discards a secured CAM if the header_fields does not contain the header field 'generation_time' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when {  
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1]
-             *              containing type
-             *                  indicating 'its_aid'
-             *              containing its_aid
-             *                  indicating 'AID_CAM'
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_04_05_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields[0].type + * indicating 'signer_info' + * and containing header_fields[1].type + * indicating 'its_aid' + * and not containing other header fields + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_04_05_BO * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_04_05_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -9220,40 +9043,37 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_04_05_BO /** - * @desc Check that IUT discards a secured CAM if the header_fields contain more than one element of header field of type: its_aid + * @desc Check that IUT discards a secured CAM if the header_fields contain more than one element of header field 'its_aid' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when {  
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[2]
-             *              containing type
-             *                  indicating 'its_aid'
-             *              containing its_aid
-             *                  indicating 'AID_CAM'
-             *          and containing header_fields[3]
-             *              containing type
-             *                  indicating 'its_aid'
-             *              containing its_aid
-             *                  indicating 'AID_DENM'
-             *       and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_04_06_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields[0].type + * indicating 'signer_info' + * and containing header_fields[1].type + * indicating 'generation_time' + * and containing header_fields[2] + * containing type + * indicating 'its_aid' + * and containing its_aid + * indicating 'AID_CAM' + * and containing header_fields[3] + * containing type + * indicating 'its_aid' + * and containing its_aid + * indicating 'AID_DENM' + * and not containing other header fields + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_04_06_BO * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_04_06_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -9315,30 +9135,27 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_04_06_BO /** - * @desc Check that IUT discards a secured CAM if the header_fields contain more than one element of header field of type: its_aid + * @desc Check that IUT discards a secured CAM if the header_fields does not contain the header field 'its_aid' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when {  
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_time'
-             *       and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_04_06a_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields[0].type + * indicating 'signer_info' + * and containing header_fields[1].type + * indicating 'generation_time' + * and not containing other header fields + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_04_06a_BO * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_04_06a_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -9398,35 +9215,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_04_06a_BO /** - * @desc Check that IUT discards a secured CAM if the header fields are not in the ascending order according to the numbering of the enumeration + * @desc Check that IUT discards a secured CAM if the header fields are not in the ascending order according to the numbering of the enumeration. *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when {  
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1]
-             *              containing type
-             *                  indicating 'its_aid'
-             *              containing its_aid
-             *                  indicating 'AID_CAM'
-             *          and containing header_fields[2].type
-             *              indicating 'generation_time'
-             *       and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_04_07_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields[0].type + * indicating 'signer_info' + * and containing header_fields[1].type + * indicating 'its_aid' + * and containing header_fields[2].type + * indicating 'generation_time' + * and not containing other header fields + * then + * the IUT discards the SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_04_07_BO * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_04_07_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -9487,39 +9298,37 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_04_07_BO /** - * @desc Check that IUT ignores the HeaderFields generation_time_standard_deviation of received Secured CAM + * @desc Check that IUT discards the Secured CAM containing the header field 'generation_time_standard_deviation' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when {  
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_time'
-             *                  indicating TIME_1 inside the validity period of the signer certificate
-             *          and containing header_fields[2].type
-             *              indicating 'generation_time_with_standard_deviation'
-             *                  indicating TIME_2 inside the validity period of the signer certificate
-             *          and containing header_fields[3]
-             *              containing type
-             *                  indicating 'its_aid'
-             *              containing its_aid
-             *                  indicating 'AID_CAM'
-             *       and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_04_08_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields[0].type + * indicating 'signer_info' + * and containing header_fields[1] + * containing type + * indicating 'generation_time' + * and containing generation_time + * indicating GEN_TIME inside the validity period of the signer certificate + * and containing header_fields[2] + * containing type + * indicating 'generation_time_with_standard_deviation' + * and containing generation_time_with_standard_deviation + * indicating GEN_TIME inside the validity period of the signer certificate + * and containing header_fields[3].type + * indicating 'its_aid' + * and not containing other header fields + * then + * the IUT discards the SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_04_08_BO * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_04_08_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -9584,42 +9393,7 @@ module ItsSecurity_TestCases { f_cf01Down(); } // End of testcase TC_SEC_ITSS_RCV_CAM_04_08_BO - /** - * @desc Check that IUT ignores the HeaderFields generation_time_standard_deviation of received Secured CAM - *
-             * Pics Selection: PICS_GN_SECURITY
-             * Config Id: CF01
-             * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when {  
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_time'
-             *                  indicating TIME_1 outside the validity period of the signer certificate
-             *          and containing header_fields[2].type
-             *              indicating 'generation_time_with_standard_deviation'
-             *                  indicating TIME_2 inside the validity period of the signer certificate
-             *          and containing header_fields[3]
-             *              containing type
-             *                  indicating 'its_aid'
-             *              containing its_aid
-             *                  indicating 'AID_CAM'
-             *       and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_04_09_BO - * @reference ETSI TS 103 097 [1], clause 7.1 - */ + testcase TC_SEC_ITSS_RCV_CAM_04_09_BO() runs on ItsGeoNetworking system ItsSecSystem { // Local variables @@ -9683,41 +9457,37 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_04_09_BO /** - * @desc Check that IUT discards the Secured CAM containing the expiry_time HeaderField + * @desc Check that IUT discards the Secured CAM containing the header field 'expiry_time' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when {  
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_time'
-             *                  indicating CURRENT_TIME
-             *          and containing header_fields[2]
-             *              containing type
-             *                  indicating 'expiration'
-             *              and containing expiry_time
-             *                  indicating CURRENT_TIME + 1h
-             *          and containing header_fields[3]
-             *              containing type
-             *                  indicating 'its_aid'
-             *              containing its_aid
-             *                  indicating 'AID_CAM'
-             *       and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_04_10_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields[0].type + * indicating 'signer_info' + * and containing header_fields[1] + * containing type + * indicating 'generation_time' + * containing generation_time + * indicating CURRENT_TIME + * and containing header_fields[2] + * containing type + * indicating 'expiration' + * and containing expiry_time + * indicating CURRENT_TIME + 1h + * and containing header_fields[3].type + * indicating 'its_aid' + * and not containing other header fields + * then + * the IUT discards the SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_04_10_BO * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_04_10_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -9783,46 +9553,41 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_04_10_BO /** - * @desc Check that IUT ignores the HeaderFields generation_location of received Secured CAM + * @desc Check that IUT discards the Secured CAM containing the header field 'generation_location' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when {  
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *              and containing signer
-             *                  containing type
-             *                      indicating certificate
-             *                  and containing certificate (CERT_TS_AT_B)
-             *                      containing validity_restrictions['region']
-             *                          containing region (X_CERT_REGION)
-             *          and containing header_fields[1].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[2]
-             *              containing type
-             *                  indicating 'generation_location'
-             *              and containing generation_location
-             *                  indicating position outside of the validity restriction of X_CERT_REGION
-             *          and containing header_fields[3]
-             *              containing type
-             *                  indicating 'its_aid'
-             *              containing its_aid
-             *                  indicating 'AID_CAM'
-             *       and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_04_11_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields[0] + * containing type + * indicating 'signer_info' + * and containing signer + * containing type + * indicating certificate + * and containing certificate (CERT_TS_B_AT) + * containing validity_restrictions['region'] + * containing region (X_CERT_REGION) + * and containing header_fields[1].type + * indicating 'generation_time' + * and containing header_fields[2] + * containing type + * indicating 'generation_location' + * and containing generation_location + * indicating position outside of the validity restriction of X_CERT_REGION + * and containing header_fields[3].type + * indicating 'its_aid' + * and not containing other header fields + * then + * the IUT discards the SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_04_11_BO * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_04_11_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -9886,39 +9651,34 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_04_11_BO /** - * @desc Check that IUT accepts the Secured CAM containing additional non-standard HeaderField + * @desc Check that IUT accepts the Secured CAM containing additional non-standard HeaderField *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when {  
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[2].type
-             *                  indicating 'its_aid'
-             *              containing its_aid
-             *                  indicating 'AID_CAM'
-             *          and containing header_fields[3]
-             *              containing type
-             *                  indicating non-standard header field type (200)
-             *              and containing other_header
-             *                  indicating non-empty data
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_04_12_BV + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields[0].type + * indicating 'signer_info' + * and containing header_fields[1].type + * indicating 'generation_time' + * and containing header_fields[2].type + * indicating 'its_aid' + * and containing header_fields[3] + * containing type + * indicating non-standard header field type (1000) + * and containing other_header + * indicating non-empty data + * and not containing other header fields + * then + * the IUT accepts the SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_04_12_BV * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_04_12_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -9983,51 +9743,46 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_04_12_BV /** - * @desc Check that IUT discards the Secured CAM containing the header field 'encryption_parameter and recipient_info' + * @desc Check that IUT discards the Secured CAM containing the header field 'encryption_parameter' and 'recipient_info' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when {  
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[2].type
-             *                  indicating 'its_aid'
-             *              containing its_aid
-             *                  indicating 'AID_CAM'
-             *          and containing header_fields[3]
-             *              containing type
-             *                  indicating 'encryption_parameters'
-             *              and containing enc_params
-             *                  containing symm_algorithm
-             *                      indicating 'aes_128_ccm'
-             *                  and containing nonce
-             *              and containing header_fields[4]
-             *                  containing type
-             *                      indicating 'recipient_info'
-             *                  and containing recipients
-             *                      containing recipients[0]
-             *                          containing cert_id
-             *                              referencing to CERT_IUT_A_AT
-             *                          and containing pk_encryption
-             *                              indicating 'ecies_nistp256'
-             *                          and containing enc_key
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_04_13_BO + * with + * the IUT being in the 'authorized' state with CERT_IUT_A_AT + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields[0].type + * indicating 'signer_info' + * and containing header_fields[1].type + * indicating 'generation_time' + * and containing header_fields[2].type + * indicating 'its_aid' + * and containing header_fields[3] + * containing type + * indicating 'encryption_parameters' + * and containing enc_params + * containing symm_algorithm + * indicating 'aes_128_ccm' + * and containing nonce + * and containing header_fields[4] + * containing type + * indicating 'recipient_info' + * and containing recipients + * containing recipients[0] + * containing cert_id + * referencing to CERT_IUT_A_AT + * and containing pk_encryption + * indicating 'ecies_nistp256' + * and containing enc_key + * and not containing other header fields + * then + * the IUT discards the SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_04_13_BO * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_04_13_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -10120,29 +9875,25 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_04_13_BO /** - * @desc Check that IUT discards a secured CAM if the header_fields contains a signer of type 'self' + * @desc Check that IUT discards a secured CAM if the header_fields contains a signer of type 'self' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *                  containing signer.type
-             *                      indicating 'self'
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_05_01_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields['signer_info'] + * containing signer.type + * indicating 'self' + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_05_01_BO * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_05_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -10205,29 +9956,25 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_05_01_BO /** - * @desc Check that IUT discards a secured CAM if the header_fields contains a signer of type certificate_digest_with_other_algorithm + * @desc Check that IUT discards a secured CAM if the header_fields contains a signer of type certificate_digest_with_other_algorithm *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_02) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *                  containing signer.type
-             *                      indicating 'certificate_digest_with_other_algorithm'
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_05_02_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_02) + * containing header_fields['signer_info'] + * containing signer.type + * indicating 'certificate_digest_with_other_algorithm' + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_05_02_BO * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_05_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -10292,31 +10039,28 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_05_02_BO /** - * @desc Check that IUT discards a secured CAM if the header_fields contains a signer of type certificate_chain and the chain is empty + * @desc Check that IUT discards a secured CAM if the header_fields contains a signer of type certificate_chain and the chain is empty *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_02) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *                  containing signer.type
-             *                      indicating 'certificate_chain'
-             *                  and containing certificates
-             *                      indicating length = 0
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_05_03_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_03) + * containing header_fields['signer_info'] + * containing signer + * containing type + * indicating 'certificate_chain' + * and containing certificates + * indicating length = 0 + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_05_03_BO * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_05_03_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -10380,31 +10124,28 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_05_03_BO /** - * @desc Check that IUT discards a secured CAM if the header_fields contains a signer of type certificate_chain and the chain contains only one certificate + * @desc Check that IUT discards a secured CAM if the header_fields contains a signer of type certificate_chain and the chain contains only one certificate *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_03) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *                  containing signer.type
-             *                      indicating 'certificate_chain'
-             *                  and containing certificates
-             *                      indicating length = 1
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_05_04_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_03)) + * containing header_fields['signer_info'] + * containing signer + * containing type + * indicating 'certificate_chain' + * and containing certificates + * indicating length = 1 + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_05_04_BO * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_05_04_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -10465,32 +10206,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_05_04_BO /** - * @desc Check that IUT discards a secured CAM if the header_fields contains a signer info of unknown or reserved type + * @desc Check that IUT discards a secured CAM if the header_fields contains a signer info of unknown or reserved type *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_02) 
-             *          containing header_fields['signer_info']
-             *                  containing signer.type
-             *                      indicating X_UNKNOWN_SIGNERINFO_TYPE
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_05_05_BO - * @reference ETSI TS 103 097 [1], clause 7.1 - */ - testcase TC_SEC_ITSS_RCV_CAM_05_05_BO() runs on ItsGeoNetworking system ItsSecSystem { - + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_02) + * containing header_fields['signer_info'] + * containing signer.type + * indicating X_UNKNOWN_SIGNERINFO_TYPE + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_05_05_BO + * @reference ETSI TS 103 097 [1], clause 7.1 + */ + testcase TC_SEC_ITSS_RCV_CAM_05_05_BO() runs on ItsGeoNetworking system ItsSecSystem { + // Local variables var integer i; var GeoNetworkingPdu v_securedGnPdu; @@ -10547,35 +10285,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_05_05_BO /** - * @desc Check that IUT discards message containing generation_time before the certificate validity period + * @desc Check that IUT discards message containing generation_time before the certificate validity period *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-             *              and containing header_fields['signer_info'].signer 
-             *                  containing certificate (CERT_TS_MSG_06_01_BO_AT)
-             *                      containing validity_restrictions['time_start_and_end']
-             *                          containing start_validity
-             *                              indicating START_VALIDITY_AT
-             *                          and containing end_validity
-             *                              indicating END_VALIDITY_AT
-             *              and containing header_fields ['generation_time']
-             *                  containing generation_time
-             *                      indicating GEN_TIME < START_VALIDITY_AT
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_06_01_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields['signer_info'].signer + * containing certificate (CERT_TS_MSG_06_01_BO_AT) + * containing validity_restrictions['time_start_and_end'] + * containing start_validity + * indicating START_VALIDITY_AT + * and containing end_validity + * indicating END_VALIDITY_AT + * and containing header_fields ['generation_time'] + * containing generation_time + * indicating GEN_TIME < START_VALIDITY_AT + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_06_01_BO * @reference ETSI TS 103 097 [1], clauses 5.4 and 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_06_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -10634,35 +10369,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_06_01_BO /** - * @desc Check that IUT discards message containing generation_time after the certificate validity period + * @desc Check that IUT discards message containing generation_time after the certificate validity period *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-             *              and containing header_fields['signer_info'].signer 
-             *                  containing certificate (CERT_TS_MSG_06_02_BO_AT)
-             *                      containing validity_restrictions['time_start_and_end']
-             *                          containing start_validity
-             *                              indicating START_VALIDITY_AT
-             *                          and containing end_validity
-             *                              indicating END_VALIDITY_AT
-             *              and containing header_fields ['generation_time']
-             *                  containing generation_time
-             *                      indicating GEN_TIME > END_VALIDITY_AT
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_06_02_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields['signer_info'].signer + * containing certificate (CERT_TS_MSG_06_02_BO_AT) + * containing validity_restrictions['time_start_and_end'] + * containing start_validity + * indicating START_VALIDITY_AT + * and containing end_validity + * indicating END_VALIDITY_AT + * and containing header_fields ['generation_time'] + * containing generation_time + * indicating GEN_TIME > END_VALIDITY_AT + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_06_02_BO * @reference ETSI TS 103 097 [1], clauses 5.4 and 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_06_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -10721,28 +10453,25 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_06_02_BO /** - * @desc Check that IUT discards Secured CAM if the generation_time is more than 5 minute in the past (C2C only) + * @desc Check that IUT discards Secured CAM if the generation_time is more than 5 minute in the past (C2C only) *
-             * Pics Selection: PICS_GN_SECURITY
+             * Pics Selection: PICS_GN_SECURITY AND PICS_C2C
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *          containing header_fields ['generation_time']
-             *              containing generation_time
-             *                  indicating GEN_TIME ( CURRENT_TIME - 302sec )
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_06_03_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields ['generation_time'] + * containing generation_time + * indicating GEN_TIME ( CURRENT_TIME - 302sec ) + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_06_03_BO * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_06_03_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -10799,28 +10528,25 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_06_03_BO /** - * @desc Check that IUT discards Secured CAM if the generation_time is more than 5 minute in the future(C2C only) + * @desc Check that IUT discards Secured CAM if the generation_time is more than 5 minute in the future(C2C only) *
-             * Pics Selection: PICS_GN_SECURITY
+             * Pics Selection: PICS_GN_SECURITY AND PICS_C2C
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *          containing header_fields ['generation_time']
-             *              containing generation_time
-             *                  indicating GEN_TIME ( CURRENT_TIME + 302sec )
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_06_04_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields ['generation_time'] + * containing generation_time + * indicating GEN_TIME ( CURRENT_TIME + 302sec ) + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_06_04_BO * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_06_04_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -10877,33 +10603,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_06_04_BO /** - * @desc Check that IUT discards secured CAM when its_aid value is not AID_CAM + * @desc Check that IUT discards secured CAM when its_aid value is defined but not the AID_CAM *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *     when {  
-             *         the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) 
-             *             containing header_fields['its_aid'] 
-             *                 indicating AID_DENM 
-             *             and containing payload_field { 
-             *                 containing type 
-             *                     indicating 'signed' 
-             *                 containing data 
-             *                     containing CAM payload 
-             *             } 
-             *     } then { 
-             *         the IUT discards the message 
-             *     } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_07_01_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields['its_aid'] + * indicating 'AID_DENM' + * and containing payload_field + * containing type + * indicating 'signed' + * and containing data + * containing CAM payload + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_07_01_BO * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_07_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -10958,33 +10680,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_07_01_BO /** - * @desc Check that IUT discards secured CAM when its_aid value is undefined + * @desc Check that IUT discards secured CAM when its_aid value is undefined *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *     when {  
-             *         the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) 
-             *             containing header_fields['its_aid'] 
-             *                 indicating 'AID_UNDEFINED' 
-             *             and containing payload_field { 
-             *                 containing type 
-             *                     indicating 'signed' 
-             *                 containing data 
-             *                     containing CAM payload 
-             *             } 
-             *     } then { 
-             *         the IUT discards the message 
-             *     } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_07_02_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields['its_aid'] + * indicating 'AID_UNDEFINED' + * and containing payload_field + * containing type + * indicating 'signed' + * and containing data + * containing CAM payload + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_07_02_BO * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_07_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -11039,32 +10757,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_07_02_BO /** - * @desc Check that IUT discards the Secured CAM containing empty payload of type 'signed'. - *
-            * Pics Selection: PICS_GN_SECURITY
-            * Config Id: CF01
-            * Initial conditions:
-            *   with {
-            *       the IUT being in the 'authorized' state
-            *       and the IUT current time is inside the time validity period of CERT_TS_A_AT
-            *   }
-            *   ensure that {
-            *       when {
-            *           the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-            *               containing payload_field
-            *                   containing type
-            *                       indicating 'signed'
-            *                   and containing data
-            *                       indicating length 0
-            *       } then {
-            *           the IUT discards the message
-            *       }
-            *   }
-            * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_09_02_BO - * @reference ETSI TS 103 097 [1], clause 7.1 - */ + * @desc Check that IUT discards the Secured CAM containing empty payload of type 'signed' + *
+             * Pics Selection: PICS_GN_SECURITY
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
+             *         containing payload_field
+             *           containing type
+             *             indicating 'signed'
+             *           and containing data
+             *             indicating length 0
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_09_02_BO + * @reference ETSI TS 103 097 [1], clause 7.1 + */ testcase TC_SEC_ITSS_RCV_CAM_09_02_BO() runs on ItsGeoNetworking system ItsSecSystem { // Local variables @@ -11132,32 +10847,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_09_02_BO /** - * @desc Check that IUT discards the Secured CAM containing non-empty payload of type 'unsecured' - *
-            * Pics Selection: PICS_GN_SECURITY
-            * Config Id: CF01
-            * Initial conditions:
-            *   with {
-            *       the IUT being in the 'authorized' state
-            *       and the IUT current time is inside the time validity period of CERT_TS_A_AT
-            *   }
-            *   ensure that {
-            *       when {
-            *           the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-            *               containing payload_field
-            *                   containing type
-            *                       indicating 'unsecured'
-            *                   and containing data
-            *                       indicating length > 0
-            *       } then {
-            *           the IUT discards the message
-            *       }
-            *   }
-            * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_09_03_BO - * @reference ETSI TS 103 097 [1], clause 7.1 - */ + * @desc Check that IUT discards the Secured CAM containing non-empty payload of type 'unsecured' + *
+             * Pics Selection: PICS_GN_SECURITY
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
+             *         containing payload_field
+             *           containing type
+             *             indicating 'unsecured'
+             *           and containing data
+             *             indicating length > 0
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_09_03_BO + * @reference ETSI TS 103 097 [1], clause 7.1 + */ testcase TC_SEC_ITSS_RCV_CAM_09_03_BO() runs on ItsGeoNetworking system ItsSecSystem { // Local variables @@ -11225,32 +10937,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_09_03_BO /** - * @desc Check that IUT discards the Secured CAM containing non-empty payload of type 'encrypted' - *
-            * Pics Selection: PICS_GN_SECURITY
-            * Config Id: CF01
-            * Initial conditions:
-            *   with {
-            *       the IUT being in the 'authorized' state
-            *       and the IUT current time is inside the time validity period of CERT_TS_A_AT
-            *   }
-            *   ensure that {
-            *       when {
-            *           the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-            *               and containing payload_field
-            *                   containing type
-            *                       indicating 'encrypted'
-            *                   and containing data
-            *                       indicating length > 0
-            *       } then {
-            *           the IUT discards the message
-            *       }
-            *   }
-            * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_09_04_BO - * @reference ETSI TS 103 097 [1], clause 7.1 - */ + * @desc Check that IUT discards the Secured CAM containing non-empty payload of type 'encrypted' + *
+             * Pics Selection: PICS_GN_SECURITY
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
+             *         containing payload_field
+             *           containing type
+             *             indicating 'encrypted'
+             *           and containing data
+             *             indicating length > 0
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_09_04_BO + * @reference ETSI TS 103 097 [1], clause 7.1 + */ testcase TC_SEC_ITSS_RCV_CAM_09_04_BO() runs on ItsGeoNetworking system ItsSecSystem { // Local variables @@ -11318,32 +11027,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_09_04_BO /** - * @desc Check that IUT discards the Secured CAM containing exactly one non-empty payload of type 'signed_external' - *
-            * Pics Selection: PICS_GN_SECURITY
-            * Config Id: CF01
-            * Initial conditions:
-            *   with {
-            *       the IUT being in the 'authorized' state
-            *       and the IUT current time is inside the time validity period of CERT_TS_A_AT
-            *   }
-            *   ensure that {
-            *       when {
-            *           the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-            *              containing payload_field
-            *                   containing type
-            *                       indicating 'signed_external'
-            *                   and containing data
-            *                       indicating length > 0
-            *       } then {
-            *           the IUT discards the message
-            *       }
-            *   }
-            * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_09_05_BO - * @reference ETSI TS 103 097 [1], clause 7.1 - */ + * @desc Check that IUT discards the Secured CAM containing non-empty payload of type 'signed_external' + *
+             * Pics Selection: PICS_GN_SECURITY
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
+             *         containing payload_field
+             *           containing type
+             *             indicating 'signed_external'
+             *           and containing data
+             *             indicating length > 0
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_09_05_BO + * @reference ETSI TS 103 097 [1], clause 7.1 + */ testcase TC_SEC_ITSS_RCV_CAM_09_05_BO() runs on ItsGeoNetworking system ItsSecSystem { // Local variables @@ -11411,32 +11117,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_09_05_BO /** - * @desc Check that IUT discards the Secured CAM containing non-empty payload of type 'signed_and_encrypted' - *
-            * Pics Selection: PICS_GN_SECURITY
-            * Config Id: CF01
-            * Initial conditions:
-            *   with {
-            *       the IUT being in the 'authorized' state
-            *       and the IUT current time is inside the time validity period of CERT_TS_A_AT
-            *   }
-            *   ensure that {
-            *       when {
-            *           the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-            *              containing payload_field
-            *                   containing type
-            *                       indicating 'signed_and_encrypted'
-            *                   and containing data
-            *                       indicating length > 0
-            *       } then {
-            *           the IUT discards the message
-            *       }
-            *   }
-            * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_09_06_BO - * @reference ETSI TS 103 097 [1], clause 7.1 - */ + * @desc Check that IUT discards the Secured CAM containing non-empty payload of type 'signed_and_encrypted' + *
+             * Pics Selection: PICS_GN_SECURITY
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
+             *         containing payload_field
+             *           containing type
+             *             indicating 'signed_and_encrypted'
+             *           and containing data
+             *             indicating length > 0
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_09_06_BO + * @reference ETSI TS 103 097 [1], clause 7.1 + */ testcase TC_SEC_ITSS_RCV_CAM_09_06_BO() runs on ItsGeoNetworking system ItsSecSystem { // Local variables @@ -11504,32 +11207,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_09_06_BO /** - * @desc Check that IUT discards the Secured CAM containing non-empty payload of unknown type - *
-            * Pics Selection: PICS_GN_SECURITY
-            * Config Id: CF01
-            * Initial conditions:
-            *   with {
-            *       the IUT being in the 'authorized' state
-            *       and the IUT current time is inside the time validity period of CERT_TS_A_AT
-            *   }
-            *   ensure that {
-            *       when {
-            *           the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-            *              containing payload_field
-            *                   containing type
-            *                       indicating X_UNKNOWN_PAYLOAD_TYPE
-            *                   and containing data
-            *                       indicating length > 0
-            *       } then {
-            *           the IUT discards the message
-            *       }
-            *   }
-            * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_09_07_BO - * @reference ETSI TS 103 097 [1], clause 7.1 - */ + * @desc Check that IUT discards the Secured CAM containing non-empty payload of unknown type + *
+             * Pics Selection: PICS_GN_SECURITY
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
+             *         containing payload_field
+             *           containing type
+             *             indicating X_UNKNOWN_PAYLOAD_TYPE
+             *           and containing data
+             *             indicating length > 0
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_09_07_BO + * @reference ETSI TS 103 097 [1], clause 7.1 + */ testcase TC_SEC_ITSS_RCV_CAM_09_07_BO() runs on ItsGeoNetworking system ItsSecSystem { // Local variables @@ -11597,31 +11297,28 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_09_07_BO /** - * @desc Check that IUT discards the Secured CAM doesn't containing the TrailerField of type 'signature' - *
-            * Pics Selection: PICS_GN_SECURITY
-            * Config Id: CF01
-            * Initial conditions:
-            *    with {
-            *        the IUT being in the 'authorized' state
-            *        and the IUT current time is inside the time validity period of CERT_TS_A_AT
-            *    }
-            *    ensure that {
-            *        when {
-            *            the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-            *                containing trailer_fields
-            *                    not containing any instance of type TrailerField
-            *                        containing type
-            *                            indicating 'signature'
-            *        } then {
-            *            the IUT discards the message
-            *        }
-            *    }
-            * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_10_01_BO - * @reference ETSI TS 103 097 [1], clause 7.1 - */ + * @desc Check that IUT discards the Secured CAM if the message does not contain the trailer field of type 'signature' + *
+             * Pics Selection: PICS_GN_SECURITY
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
+             *         containing trailer_fields
+             *           not containing any instance of type TrailerField
+             *             containing type
+             *               indicating 'signature'
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_10_01_BO + * @reference ETSI TS 103 097 [1], clause 7.1 + */ testcase TC_SEC_ITSS_RCV_CAM_10_01_BO() runs on ItsGeoNetworking system ItsSecSystem { // Local variables @@ -11667,33 +11364,30 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_10_01_BO /** - * @desc Check that IUT discards the Secured CAM containing more then one instance of TrailerField of type 'signature' - *
-            * Pics Selection: PICS_GN_SECURITY
-            * Config Id: CF01
-            * Initial conditions:
-            *   with {
-            *       the IUT being in the 'authorized' state
-            *       and the IUT current time is inside the time validity period of CERT_TS_A_AT
-            *   }
-            *   ensure that {
-            *       when {
-            *           the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-            *              containing trailer_fields[0].type
-            *                  containing type
-            *                      indicating 'signature'
-            *              and containing trailer_fields[1].type
-            *                  containing type
-            *                      indicating 'signature'
-            *       } then {
-            *           the IUT discards the message
-            *       }
-            *   }
-            * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_10_02_BO - * @reference ETSI TS 103 097 [1], clause 7.1 - */ + * @desc Check that IUT discards the Secured CAM containing more than one instance of TrailerField of type 'signature' + *
+             * Pics Selection: PICS_GN_SECURITY
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
+             *         containing trailer_fields[0]
+             *           containing type
+             *             indicating 'signature'
+             *         and containing trailer_fields[1]
+             *           containing type
+             *             indicating 'signature'
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_10_02_BO + * @reference ETSI TS 103 097 [1], clause 7.1 + */ testcase TC_SEC_ITSS_RCV_CAM_10_02_BO() runs on ItsGeoNetworking system ItsSecSystem { // Local variables @@ -11739,36 +11433,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_10_02_BO /** - * @desc Check that the IUT discards Secured message containing signature that is not verified using the - * verification key from the certificate contained in the message's signer info - *
-            * Pics Selection: PICS_GN_SECURITY
-            * Config Id: CF01
-            * Initial conditions:
-            *   with {
-            *       the IUT being in the 'authorized' state
-            *       and the IUT current time is inside the time validity period of CERT_TS_A_AT
-            *   }
-            *   ensure that {
-            *       when {
-            *           the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-            *               containing header_fields ['signer_info']
-            *                   containing certificate
-            *                       containing subject_attributes['verification key'] (KEY)
-            *               and containing trailer_fields[0]
-            *                   containing type
-            *                       indicating 'signature'
-            *                   and containing signature
-            *                       NOT verifiable using KEY
-            *       } then {
-            *           the IUT discards the message
-            *       }
-            *   }
-            * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_11_01_BO - * @reference ETSI TS 103 097 [1], clause 7.1 - */ + * @desc Check that the IUT discards Secured message containing signature that is not verified using the verification key from the certificate contained in the message's signer info + *
+             * Pics Selection: PICS_GN_SECURITY
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
+             *         containing header_fields ['signer_info'].signer
+             *           containing certificate
+             *             containing subject_attributes['verification key']
+             *               containing key (KEY)
+             *         and containing trailer_fields[0]
+             *           containing type
+             *             indicating 'signature'
+             *           and containing signature
+             *             NOT verifiable using KEY
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_11_01_BO + * @reference ETSI TS 103 097 [1], clause 7.1 + */ testcase TC_SEC_ITSS_RCV_CAM_11_01_BO() runs on ItsGeoNetworking system ItsSecSystem { // Local variables @@ -11821,37 +11512,34 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_11_01_BO /** - * @desc Check that the IUT discards Secured message containing signature that is not verified using the - * verification key from the certificate, referenced by the digest contained in the message's signer info - *
-            * Pics Selection: PICS_GN_SECURITY
-            * Config Id: CF01
-            * Initial conditions:
-            *   with {
-            *       the IUT being in the 'authorized' state
-            *       and the IUT current time is inside the time validity period of CERT_TS_A_AT
-            *   }
-            *   ensure that {
-            *       when {
-            *           the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_02)
-            *               containing header_fields ['signer_info'].signer
-            *                   containing digest
-            *                       referencing to the certificate (CERT_TS_AT_A)
-            *                           containing subject_attributes['verification key'] (KEY)
-            *               and containing trailer_fields[0]
-            *                   containing type
-            *                       indicating 'signature'
-            *                   and containing signature
-            *                       NOT verifiable using KEY
-            *       } then {
-            *           the IUT discards the message
-            *       }
-            *   }
-            * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_11_02_BO - * @reference ETSI TS 103 097 [1], clause 7.1 - */ + * @desc Check that the IUT discards Secured message containing signature that is not verified using the verification key from the certificate, referenced by the digest contained in the message's signer info + *
+             * Pics Selection: PICS_GN_SECURITY
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_02)
+             *         containing header_fields ['signer_info'].signer
+             *           containing digest
+             *             referencing to the certificate (CERT_TS_A_AT)
+             *               containing subject_attributes['verification key']
+             *                 containing key (KEY)
+             *         and containing trailer_fields[0]
+             *           containing type
+             *             indicating 'signature'
+             *           and containing signature
+             *             NOT verifiable using KEY
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_11_02_BO + * @reference ETSI TS 103 097 [1], clause 7.1 + */ testcase TC_SEC_ITSS_RCV_CAM_11_02_BO() runs on ItsGeoNetworking system ItsSecSystem { // Local variables @@ -11904,33 +11592,30 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_11_02_BO /** - * @desc Check that IUT discards the Secured CAM if the message contains trailer field of type 'signature' with reserved public key algorythms - * @remark Values to be provided as X_RESERVED_PK_ALGORYTHM are: 240, 255 - *
-            * Pics Selection: PICS_GN_SECURITY
-            * Config Id: CF01
-            * Initial conditions:
-            *   with {
-            *       the IUT being in the 'authorized' state
-            *       and the IUT current time is inside the time validity period of CERT_TS_A_AT
-            *   }
-            *   ensure that {
-            *       when {
-            *           the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-            *               containing an instance of type trailer_field
-            *                   containing type
-            *                       indicating 'signature'
-            *                   and containing signature.algorithm
-            *                       indicating X_RESERVED_PK_ALGORYTHM
-            *       } then {
-            *           the IUT discards the message
-            *       }
-            *   }
-            * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_11_03_BO - * @reference ETSI TS 103 097 [1], clause 7.1 - */ + * @desc Check that IUT discards the Secured CAM if the message contains trailer field of type 'signature' with reserved public key algorythms + *
+             * Pics Selection: PICS_GN_SECURITY
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
+             *         containing trailer_fields
+             *           containing an instance of type TrailerField
+             *             containing type
+             *               indicating 'signature'
+             *             and containing signature.algorithm
+             *               indicating X_RESERVED_PK_ALGORYTHM
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_11_03_BO + * @reference ETSI TS 103 097 [1], clause 7.1 + */ testcase TC_SEC_ITSS_RCV_CAM_11_03_BO() runs on ItsGeoNetworking system ItsSecSystem { // Local variables @@ -11981,32 +11666,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_11_03_BO /** - * @desc Check that IUT discards a Secured CAM if the signer certificate of the message contains the subject type 'enrolment_credential' + * @desc Check that IUT discards a Secured CAM if the signer certificate of the message contains the subject type 'enrolment_credential' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * Expected behaviour:
-             * ensure that {
-             *   when {
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-             *          containing header_fields['signer_info']
-             *              containing signer
-             *                  containing type
-             *                      indicating 'certificate'
-             *                  containing certificate (CERT_TS_EC_A)
-             *                      containing subject_info.subject_type
-             *                          indicating 'enrolment_credentials'
-             *   } then { 
-             *      the IUT discards the message 
-             *   }
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_12_01_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * containing certificate (CERT_TS_A_EC) + * containing subject_info.subject_type + * indicating 'enrolment_credentials' + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_12_01_BO * @reference ETSI TS 103 097 [1], clauses 6.3 */ testcase TC_SEC_ITSS_RCV_CAM_12_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -12063,32 +11745,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_12_01_BO /** - * @desc Check that IUT discards a Secured CAM if the signer certificate of the message contains the subject type 'authorization_authority' + * @desc Check that IUT discards a Secured CAM if the signer certificate of the message contains the subject type 'authorization_authority' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * Expected behaviour:
-             * ensure that {
-             *   when {
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-             *          containing header_fields['signer_info']
-             *              containing signer
-             *                  containing type
-             *                      indicating 'certificate'
-             *                  containing certificate (CERT_TS_AA_A)
-             *                      containing subject_info.subject_type
-             *                          indicating 'authorization_authority'
-             *   } then { 
-             *      the IUT discards the message 
-             *   }
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_12_02_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * containing certificate (CERT_TS_A_AA) + * containing subject_info.subject_type + * indicating 'authorization_authority' + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_12_02_BO * @reference ETSI TS 103 097 [1], clauses 6.3 */ testcase TC_SEC_ITSS_RCV_CAM_12_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -12145,32 +11824,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_12_02_BO /** - * @desc Check that IUT discards a Secured CAM if the signer certificate of the message contains the subject type 'enrolment_authority' + * @desc Check that IUT discards a Secured CAM if the signer certificate of the message contains the subject type 'enrolment_authority' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * Expected behaviour:
-             * ensure that {
-             *   when {
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-             *          containing header_fields['signer_info']
-             *              containing signer
-             *                  containing type
-             *                      indicating 'certificate'
-             *              and certificate (CERT_TS_EA_A)
-             *                  containing subject_info.subject_type
-             *                      indicating 'enrolment_authority'
-             *   } then { 
-             *      the IUT discards the message 
-             *   }
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_12_03_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * containing certificate (CERT_TS_A_EA) + * containing subject_info.subject_type + * indicating 'enrolment_authority' + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_12_03_BO * @reference ETSI TS 103 097 [1], clauses 6.3 */ testcase TC_SEC_ITSS_RCV_CAM_12_03_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -12227,33 +11903,30 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_12_03_BO /** - * @desc Check that IUT discards a Secured CAM if the signer certificate of the message contains the subject type 'root_ca' + * @desc Check that IUT discards a Secured CAM if the signer certificate of the message contains the subject type 'root_ca' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * Expected behaviour:
-             * ensure that {
-             *   when {
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-             *          containing header_fields['signer_info']
-             *              containing signer
-             *                  containing type
-             *                      indicating 'certificate'
-             *              and certificate (CERT_TS_ROOT)
-             *                  containing subject_info.subject_type
-             *                      indicating 'root_ca'
-             *   } then { 
-             *      the IUT discards the message 
-             *   }
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_12_04_BO - * @reference ETSI TS 103 097 [1], clauses 6.3 + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * containing certificate (CERT_TS_ROOT) + * containing subject_info.subject_type + * indicating 'root_ca' + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_12_04_BO + * @reference ETSI TS 103 097 [1], clauses 6.3 */ testcase TC_SEC_ITSS_RCV_CAM_12_04_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -12309,32 +11982,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_12_04_BO /** - * @desc Check that IUT discards secured CAM signed with the not yet valid certificate + * @desc Check that IUT discards secured CAM signed with the not yet valid certificate *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_MSG_13_01_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-             *              containing header_fields['signer_info'].signer 
-             *                  containing certificate (CERT_TS_MSG_13_01_BO_AT)
-             *                      containing validity_restrictions['time_start_and_end']
-             *                          containing start_validity
-             *                              indicating START_VALIDITY_AT > CURRENT_TIME
-             *                          and containing end_validity
-             *                              indicating END_VALIDITY_AT > START_VALIDITY_AT
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_13_01_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is before the time validity period of CERT_TS_MSG_13_01_BO_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields['signer_info'].signer + * containing certificate (CERT_TS_MSG_13_01_BO_AT) + * containing validity_restrictions['time_start_and_end'] + * containing start_validity + * indicating START_VALIDITY_AT > CURRENT_TIME + * and containing end_validity + * indicating END_VALIDITY_AT > START_VALIDITY_AT + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_13_01_BO * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_13_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -12382,32 +12052,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_13_01_BO /** - * @desc Check that IUT discards secured CAM signed with the expired certificate + * @desc Check that IUT discards secured CAM signed with the expired certificate *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_MSG_13_02_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-             *              containing header_fields['signer_info'].signer 
-             *                  containing certificate (CERT_TS_MSG_13_02_BO_AT)
-             *                      containing validity_restrictions['time_start_and_end']
-             *                          containing start_validity
-             *                              indicating START_VALIDITY_AT < CURRENT_TIME
-             *                          and containing end_validity
-             *                              indicating END_VALIDITY_AT < START_VALIDITY_AT
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_13_02_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is before the time validity period of CERT_TS_MSG_13_02_BO_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields['signer_info'].signer + * containing certificate (CERT_TS_MSG_13_02_BO_AT) + * containing validity_restrictions['time_start_and_end'] + * containing start_validity + * indicating START_VALIDITY_AT < CURRENT_TIME + * and containing end_validity + * indicating END_VALIDITY_AT < CURRENT_TIME + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_13_02_BO * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_13_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -12455,35 +12122,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_13_02_BO /** - * @desc Check that IUT discards secured CAM when IUT location is outside the circular validity restriction of the signing certificate + * @desc Check that IUT discards secured CAM when IUT location is outside the circular validity restriction of the signing certificate *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_MSG_13_03_BO_AT
-             *      and the IUT current location is set to CURRENT_IUT_LOCATION
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-             *              containing header_fields['signer_info'].signer 
-             *                  containing certificate (CERT_TS_MSG_13_03_BO_AT)
-             *                      containing validity_restrictions['region']
-             *                          containing region
-             *                              containing region_type
-             *                                  indicating 'circle'
-             *                              and containing circular_region
-             *                                  indicating REGION
-             *                                      not containing the CURRENT_IUT_LOCATION
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_13_03_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the validity period of CERT_TS_MSG_13_03_BO_AT + * and the IUT current location is set to CURRENT_IUT_LOCATION + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields['signer_info'].signer + * containing certificate (CERT_TS_MSG_13_03_BO_AT) + * containing validity_restrictions['region'] + * containing region + * containing region_type + * indicating 'circle' + * and containing circular_region + * indicating REGION + * not containing the CURRENT_IUT_LOCATION + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_13_03_BO * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_13_03_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -12531,35 +12195,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_13_03_BO /** - * @desc Check that IUT discards secured CAM when IUT location is outside the rectangular validity restriction of the signing certificate + * @desc Check that IUT discards secured CAM when IUT location is outside the rectangular validity restriction of the signing certificate *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_MSG_13_04_BO_AT
-             *      and the IUT current location is set to CURRENT_IUT_LOCATION
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-             *              containing header_fields['signer_info'].signer 
-             *                  containing certificate (CERT_TS_MSG_13_04_BO_AT)
-             *                      containing validity_restrictions['region']
-             *                          containing region
-             *                              containing region_type
-             *                                  indicating 'rectangle'
-             *                              and containing rectanglar_region
-             *                                  indicating REGION
-             *                                      not containing the CURRENT_IUT_LOCATION
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_13_04_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the validity period of CERT_TS_MSG_13_04_BO_AT + * and the IUT current location is set to CURRENT_IUT_LOCATION + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields['signer_info'].signer + * containing certificate (CERT_TS_MSG_13_04_BO_AT) + * containing validity_restrictions['region'] + * containing region + * containing region_type + * indicating 'rectangle' + * and containing rectangular_regions + * indicating REGION + * not containing the CURRENT_IUT_LOCATION + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_13_04_BO * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_13_04_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -12607,35 +12268,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_13_04_BO /** - * @desc Check that IUT discards secured CAM when IUT location is outside the polygonal validity restriction of the signing certificate + * @desc Check that IUT discards secured CAM when IUT location is outside the polygonal validity restriction of the signing certificate *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_MSG_13_05_BO_AT
-             *      and the IUT current location is set to CURRENT_IUT_LOCATION
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-             *              containing header_fields['signer_info'].signer 
-             *                  containing certificate (CERT_TS_MSG_13_05_BO_AT)
-             *                      containing validity_restrictions['region']
-             *                          containing region
-             *                              containing region_type
-             *                                  indicating 'polygon'
-             *                              and containing polygonal_region
-             *                                  indicating REGION
-             *                                      not containing the CURRENT_IUT_LOCATION
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_13_05_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the validity period of CERT_TS_MSG_13_05_BO_AT + * and the IUT current location is set to CURRENT_IUT_LOCATION + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields['signer_info'].signer + * containing certificate (CERT_TS_MSG_13_05_BO_AT) + * containing validity_restrictions['region'] + * containing region + * containing region_type + * indicating 'polygon' + * and containing polygonal_region + * indicating REGION + * not containing the CURRENT_IUT_LOCATION + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_13_05_BO * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_13_05_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -12683,35 +12341,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CAM_13_05_BO /** - * @desc Check that IUT discards secured CAM when IUT location is outside the identified validity restriction of the signing certificate + * @desc Check that IUT discards secured CAM when IUT location is outside the identified validity restriction of the signing certificate *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_MSG_13_06_BO_AT
-             *      and the IUT current location is set to CURRENT_IUT_LOCATION
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01)
-             *              containing header_fields['signer_info'].signer 
-             *                  containing certificate (CERT_TS_MSG_13_06_BO_AT)
-             *                      containing validity_restrictions['region']
-             *                          containing region
-             *                              containing region_type
-             *                                  indicating 'id'
-             *                              and containing id_region
-             *                                  indicating REGION
-             *                                      not containing the CURRENT_IUT_LOCATION
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CAM_13_06_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the validity period of CERT_TS_MSG_13_06_BO_AT + * and the IUT current location is set to CURRENT_IUT_LOCATION + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_CAM_01) + * containing header_fields['signer_info'].signer + * containing certificate (CERT_TS_MSG_13_06_BO_AT) + * containing validity_restrictions['region'] + * containing region + * containing region_type + * indicating 'id' + * and containing id_region + * indicating REGION + * not containing the CURRENT_IUT_LOCATION + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CAM_13_06_BO * @reference ETSI TS 103 097 [1], clause 7.1 */ testcase TC_SEC_ITSS_RCV_CAM_13_06_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -12767,62 +12422,60 @@ module ItsSecurity_TestCases { group recvDenmProfile { /** - * @desc Check that IUT accepts a well-formed Secured DENM signed with the certificate without region validity restriction - * @remark The message defined in this test purpose is used in the subsequent test purposes with the snippet name ‘MSG_SEC_RCV_DENM_A’. Only differences to this snippet are mentioned in subsequent test purposes. + * @desc Check that IUT accepts a well-formed Secured DENM signed with the certificate without region validity restriction *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is receiving a SecuredMessage
-             *          containing header_fields[0]
-             *              containing type 
-             *                  indicating 'signer_info'
-             *              and containing signer
-             *                  containing type
-             *                      indicating 'certificate'
-             *                  and containing certificate (CERT_AT_A)
-             *                      containing subject_info.subject_type
-             *                          indicating 'authorization_ticket' (2)
-             *                      and containing subject_attributes['verification key'] (KEY)
-             *             and not containing validity_restrictions['region']
-             *       and containing header_fields [1]
-             *         containing type 
-             *           indicating 'generation_time'
-             *              containing generation_time
-             *                  indicating CURRENT_TIME
-             *       and containing header_fields [2]
-             *         containing type 
-             *           indicating 'generation_location'
-             *              containing generation_location
-             *       and containing header_fields[3]
-             *         containing type 
-             *           indicating 'its_aid'
-             *         containing its_aid
-             *              indicating 'AID_DENM'
-             *          and containing payload_field
-             *              containing type
-             *                  indicating 'signed'
-             *              containing data
-             *                  indicating length > 0
-             *                  containing DENM payload
-             *          and containing trailer_fields
-             *              containing single instance of type TrailerField
-             *                  containing type
-             *                      indicating 'signature'
-             *                  containing signature
-             *                      verifiable using KEY
-             *   } then {
-             *     the IUT accepts the message
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_01_01_BV + * Initial conditions: + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage + * containing header_fields[0] + * containing type + * indicating 'signer_info' + * and containing signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_A_AT) + * containing subject_info.subject_type + * indicating 'authorization_ticket' + * and containing subject_attributes['verification key'] + * containing key (KEY) + * and not containing validity_restrictions['region'] + * and containing header_fields [1] + * containing type + * indicating 'generation_time' + * and containing generation_time + * indicating CURRENT_TIME + * and containing header_fields [2] + * containing type + * indicating 'generation_location' + * and containing generation_location + * and containing header_fields[3] + * containing type + * indicating 'its_aid' + * and containing its_aid + * indicating 'AID_DENM' + * and containing payload_field + * containing type + * indicating 'signed' + * and containing data + * indicating length > 0 + * and containing DENM payload + * and containing trailer_fields + * containing single instance of type TrailerField + * containing type + * indicating 'signature' + * and containing signature + * verifiable using KEY + * then + * the IUT accepts the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_01_01_BV * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_01_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -12870,76 +12523,67 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_01_01_BV /** - * @desc Check that IUT accepts a well-formed Secured DENM signe with the certificate with a circular region validity restriction - * @remark The message defined in this test purpose is used in the subsequent test purposes with the snippet name ‘MSG_SEC_RCV_DENM_A’. Only differences to this snippet are mentioned in subsequent test purposes. + * @desc Check that IUT accepts a well-formed Secured DENM signed with the certificate with a circular region validity restriction *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_B_AT
-             *   and the IUT current location is inside the region validity period of CERT_TS_B_AT
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is receiving a SecuredMessage
-             *       and containing header_fields[0]
-             *              containing type 
-             *                  indicating 'signer_info'
-             *              and containing signer {
-             *                  containing type
-             *                      indicating 'certificate'
-             *                  and containing certificate (CERT_AT_B) {
-             *                      containing subject_info.subject_type
-             *                          indicating 'authorization_ticket' (2)
-             *                      and containing subject_attributes['verification key'] (KEY)
-             *                      and containing validity_restrictions['region'] {
-             *                          containing region{
-             *                              containing region_type
-             *                                  indicating 'circle'
-             *                              and containing circular_region
-             *                                  indicating REGION
-             *                          }
-             *                      }
-             *                  }
-             *       and containing header_fields [1]
-             *         containing type 
-             *           indicating 'generation_time'
-             *              containing generation_time
-             *                  indicating CURRENT_TIME
-             *       and containing header_fields [2]
-             *         containing type 
-             *           indicating 'generation_location'
-             *              containing generation_location
-             *                  indicating position inside the REGION
-             *       and containing header_fields[3]
-             *         containing type 
-             *           indicating 'its_aid'
-             *         containing its_aid
-             *              indicating 'AID_DENM'
-             *       and not containing any other header_fields
-             *       and containing payload_fields {
-             *              containing type
-             *                  indicating 'signed'
-             *              containing data
-             *                  indicating length > 0
-             *                  containing DENM payload
-             *          }
-             *          and containing trailer_fields {
-             *              containing single instance of type TrailerField {
-             *                  containing type
-             *                      indicating 'signature'
-             *                  containing signature
-             *                      verifiable using KEY
-             *              }
-             *          }
-             *   } then {
-             *     the IUT accepts the message
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_01_02_BV + * Initial conditions: + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_B_AT + * and the IUT current location is inside the region validity period of CERT_TS_B_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage + * and containing header_fields[0] + * containing type + * indicating 'signer_info' + * and containing signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_B_AT) + * containing subject_info.subject_type + * indicating 'authorization_ticket' + * and containing subject_attributes['verification key'] (KEY) + * and containing validity_restrictions['region'] + * containing region + * containing region_type + * indicating 'circle' + * and containing circular_region + * indicating REGION + * and containing header_fields [1] + * containing type + * indicating 'generation_time' + * and containing generation_time + * indicating CURRENT_TIME + * and containing header_fields [2] + * containing type + * indicating 'generation_location' + * and containing generation_location + * indicating position inside the REGION + * and containing header_fields[3] + * containing type + * indicating 'its_aid' + * and containing its_aid + * indicating 'AID_DENM' + * and not containing any other header_fields + * and containing payload_fields + * containing type + * indicating 'signed' + * and containing data + * indicating length > 0 + * and containing DENM payload + * and containing trailer_fields + * containing single instance of type TrailerField + * containing type + * indicating 'signature' + * and containing signature + * verifiable using KEY + * then + * the IUT accepts the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_01_02_BV * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_01_02_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -12987,72 +12631,69 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_01_02_BV /** - * @desc Check that IUT accepts a well-formed Secured DENM signe with the certificate with a rectangular region validity restriction - * @remark The message defined in this test purpose is used in the subsequent test purposes with the snippet name ‘MSG_SEC_RCV_DENM_A’. Only differences to this snippet are mentioned in subsequent test purposes. + * @desc Check that IUT accepts a well-formed Secured DENM signed with the certificate with a rectangular region validity restriction *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected Behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_C_AT
-             *   and the IUT current location is inside the region validity period of CERT_TS_C_AT
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is receiving a SecuredMessage
-             *       containing protocol_version 
-             *         indicating value '2'
-             *       and containing header_fields[0]
-             *              containing type 
-             *                  indicating 'signer_info'
-             *              and containing signer
-             *                  containing type
-             *                      indicating 'certificate'
-             *                  and containing certificate (CERT_AT_C)
-             *                      containing subject_info.subject_type
-             *                          indicating 'authorization_ticket' (2)
-             *                      and containing subject_attributes['verification key'] (KEY)
-             *                      and containing validity_restrictions['region']
-             *                          containing region
-             *                              containing region_type
-             *                                  indicating 'rectangle'
-             *                              and containing rectangular_regions
-             *                                  indicating REGIONS
-             *       and containing header_fields [1]
-             *         containing type 
-             *           indicating 'generation_time'
-             *              containing generation_time
-             *                  indicating CURRENT_TIME
-             *       and containing header_fields [2]
-             *         containing type 
-             *           indicating 'generation_location'
-             *              containing generation_location
-             *           indicating position inside the REGION
-             *       and containing header_fields[3]
-             *         containing type 
-             *           indicating 'its_aid'
-             *         containing its_aid
-             *              indicating 'AID_DENM'
-             *       and not containing any other header_fields
-             *          and containing payload_field
-             *              containing type
-             *                  indicating 'signed'
-             *              containing data
-             *                  indicating length > 0
-             *                  containing DENM payload
-             *          and containing trailer_fields
-             *              containing single instance of type TrailerField
-             *                  containing type
-             *                      indicating 'signature'
-             *                  containing signature
-             *                      verifiable using KEY
-             *   } then {
-             *     the IUT accepts the message
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_01_03_BV + * Initial conditions: + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_C_AT + * and the IUT current location is inside the region validity period of CERT_TS_C_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage + * containing protocol_version + * indicating value '2' + * and containing header_fields[0] + * containing type + * indicating 'signer_info' + * and containing signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_C_AT) + * containing subject_info.subject_type + * indicating 'authorization_ticket' + * and containing subject_attributes['verification key'] (KEY) + * and containing validity_restrictions['region'] + * containing region + * containing region_type + * indicating 'rectangle' + * and containing rectangular_regions + * indicating REGIONS + * and containing header_fields [1] + * containing type + * indicating 'generation_time' + * and containing generation_time + * indicating CURRENT_TIME + * and containing header_fields [2] + * containing type + * indicating 'generation_location' + * and containing generation_location + * indicating position inside the REGION + * and containing header_fields[3] + * containing type + * indicating 'its_aid' + * and containing its_aid + * indicating 'AID_DENM' + * and not containing any other header_fields + * and containing payload_field + * containing type + * indicating 'signed' + * and containing data + * indicating length > 0 + * and containing DENM payload + * and containing trailer_fields + * containing single instance of type TrailerField + * containing type + * indicating 'signature' + * and containing signature + * verifiable using KEY + * then + * the IUT accepts the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_01_03_BV * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_01_03_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -13100,72 +12741,69 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_01_03_BV /** - * @desc Check that IUT accepts a well-formed Secured DENM signe with the certificate with a polygonal region validity restriction - * @remark The message defined in this test purpose is used in the subsequent test purposes with the snippet name ‘MSG_SEC_RCV_DENM_A’. Only differences to this snippet are mentioned in subsequent test purposes. + * @desc Check that IUT accepts a well-formed Secured DENM signed with the certificate with a polygonal region validity restriction *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected Behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_D_AT
-             *   and the IUT current location is inside the region validity period of CERT_TS_D_AT
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is receiving a SecuredMessage
-             *       containing protocol_version 
-             *         indicating value '2'
-             *       and containing header_fields[0]
-             *              containing type 
-             *                  indicating 'signer_info'
-             *              and containing signer
-             *                  containing type
-             *                      indicating 'certificate'
-             *                  and containing certificate (CERT_AT_D) 
-             *                      containing subject_info.subject_type
-             *                          indicating 'authorization_ticket' (2)
-             *                      and containing subject_attributes['verification key'] (KEY)
-             *                      and containing validity_restrictions['region'] 
-             *                          containing region
-             *                              containing region_type
-             *                                  indicating 'polygon'
-             *                              and containing polygonal_region
-             *                   indicating REGION
-             *       and containing header_fields [1]
-             *         containing type 
-             *           indicating 'generation_time'
-             *              containing generation_time
-             *                  indicating CURRENT_TIME
-             *       and containing header_fields [2]
-             *         containing type 
-             *           indicating 'generation_location'
-             *              containing generation_location
-             *           indicating position inside the REGION
-             *       and containing header_fields[3]
-             *         containing type 
-             *           indicating 'its_aid'
-             *         containing its_aid
-             *              indicating 'AID_DENM'
-             *       and not containing any other header_fields
-             *          and containing payload_field 
-             *              containing type
-             *                  indicating 'signed'
-             *              containing data
-             *                  indicating length > 0
-             *                  containing DENM payload
-             *          and containing trailer_fields
-             *              containing single instance of type TrailerField
-             *                  containing type
-             *                      indicating 'signature'
-             *                  containing signature
-             *                      verifiable using KEY
-             *   } then {
-             *     the IUT accepts the message
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_01_04_BV + * Initial conditions: + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_D_AT + * and the IUT current location is inside the region validity period of CERT_TS_D_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage + * containing protocol_version + * indicating value '2' + * and containing header_fields[0] + * containing type + * indicating 'signer_info' + * and containing signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_D_AT) + * containing subject_info.subject_type + * indicating 'authorization_ticket' + * and containing subject_attributes['verification key'] (KEY) + * and containing validity_restrictions['region'] + * containing region + * containing region_type + * indicating 'polygon' + * and containing polygonal_region + * indicating REGION + * and containing header_fields [1] + * containing type + * indicating 'generation_time' + * and containing generation_time + * indicating CURRENT_TIME + * and containing header_fields [2] + * containing type + * indicating 'generation_location' + * and containing generation_location + * indicating position inside the REGION + * and containing header_fields[3] + * containing type + * indicating 'its_aid' + * and containing its_aid + * indicating 'AID_DENM' + * and not containing any other header_fields + * and containing payload_field + * containing type + * indicating 'signed' + * and containing data + * indicating length > 0 + * and containing DENM payload + * and containing trailer_fields + * containing single instance of type TrailerField + * containing type + * indicating 'signature' + * and containing signature + * verifiable using KEY + * then + * the IUT accepts the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_01_04_BV * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_01_04_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -13213,72 +12851,69 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_01_04_BV /** - * @desc Check that IUT accepts a well-formed Secured DENM signe with the certificate with a identified region validity restriction - * @remark The message defined in this test purpose is used in the subsequent test purposes with the snippet name ‘MSG_SEC_RCV_DENM_A’. Only differences to this snippet are mentioned in subsequent test purposes. + * @desc Check that IUT accepts a well-formed Secured DENM signed with the certificate with a identified region validity restriction *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected Behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_D_AT
-             *   and the IUT current location is inside the region validity period of CERT_TS_D_AT
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is receiving a SecuredMessage
-             *       containing protocol_version 
-             *         indicating value '2'
-             *       and containing header_fields[0]
-             *              containing type 
-             *                  indicating 'signer_info'
-             *              and containing signer 
-             *                  containing type
-             *                      indicating 'certificate'
-             *           and containing certificate (CERT_AT_E) 
-             *                      containing subject_info.subject_type
-             *                          indicating 'authorization_ticket' (2)
-             *                      and containing subject_attributes['verification key'] (KEY)
-             *                      and containing validity_restrictions['region'] 
-             *                          containing region
-             *                              containing region_type
-             *                                  indicating 'id_region'
-             *                              and containing identified_region
-             *                                  indicating REGION
-             *       and containing header_fields [1]
-             *         containing type 
-             *           indicating 'generation_time'
-             *              containing generation_time
-             *                  indicating CURRENT_TIME
-             *       and containing header_fields [2]
-             *         containing type 
-             *           indicating 'generation_location'
-             *              containing generation_location
-             *                  indicating position inside the REGION
-             *       and containing header_fields[3]
-             *         containing type 
-             *           indicating 'its_aid'
-             *         containing its_aid
-             *              indicating 'AID_DENM'
-             *       and not containing any other header_fields
-             *          and containing payload_field 
-             *              containing type
-             *                  indicating 'signed'
-             *              containing data
-             *                  indicating length > 0
-             *                  containing DENM payload
-             *          and containing trailer_fields 
-             *              containing single instance of type TrailerField 
-             *                  containing type
-             *                      indicating 'signature'
-             *                  containing signature
-             *                      verifiable using KEY
-             *   } then {
-             *     the IUT accepts the message
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_01_05_BV + * Initial conditions: + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_E_AT + * and the IUT current location is inside the region validity period of CERT_TS_E_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage + * containing protocol_version + * indicating value '2' + * and containing header_fields[0] + * containing type + * indicating 'signer_info' + * and containing signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_E_AT) + * containing subject_info.subject_type + * indicating 'authorization_ticket' + * and containing subject_attributes['verification key'] (KEY) + * and containing validity_restrictions['region'] + * containing region + * containing region_type + * indicating 'id_region' + * and containing identified_region + * indicating REGION + * and containing header_fields [1] + * containing type + * indicating 'generation_time' + * and containing generation_time + * indicating CURRENT_TIME + * and containing header_fields [2] + * containing type + * indicating 'generation_location' + * and containing generation_location + * indicating position inside the REGION + * and containing header_fields[3] + * containing type + * indicating 'its_aid' + * and containing its_aid + * indicating 'AID_DENM' + * and not containing any other header_fields + * and containing payload_field + * containing type + * indicating 'signed' + * and containing data + * indicating length > 0 + * and containing DENM payload + * and containing trailer_fields + * containing single instance of type TrailerField + * containing type + * indicating 'signature' + * and containing signature + * verifiable using KEY + * then + * the IUT accepts the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_01_05_BV * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_01_05_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -13326,27 +12961,24 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_01_05_BV /** - * @desc Check that IUT discards a Secured DENM containing protocol version set to a value less then 2 + * @desc Check that IUT discards a Secured DENM containing protocol version set to a value less than 2 *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A)
-             *              containing protocol_version 
-             *                  indicating 1
-             *      } then {
-             *          the IUT discards a SecuredMessage
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_02_01_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing protocol_version + * indicating 1 + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_02_01_BO * @reference ETSI TS 103 097 [1], clause 5.1 */ testcase TC_SEC_ITSS_RCV_DENM_02_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -13394,27 +13026,24 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_02_01_BO /** - * @desc Check that IUT discards a Secured DENM containing protocol version set to a value greater then 2 + * @desc Check that IUT discards a Secured DENM containing protocol version set to a value greater than 2 *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A)
-             *              containing protocol_version 
-             *                  indicating 3
-             *      } then {
-             *          the IUT discards a SecuredMessage
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_02_02_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing protocol_version + * indicating 3 + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_02_02_BO * @reference ETSI TS 103 097 [1], clause 5.1 */ testcase TC_SEC_ITSS_RCV_DENM_02_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -13462,36 +13091,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_02_02_BO /** - * @desc Check that IUT discards a secured DENM if the message contains more than one header field of type 'signer_info' + * @desc Check that IUT discards a secured DENM if the message contains more than one header field of type 'signer_info' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[2].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[3].type
-             *              indicating 'generation_location'
-             *          and containing header_fields[4].type
-             *              indicating 'its_aid'
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_04_01_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing header_fields[0].type + * indicating 'signer_info' + * and containing header_fields[1].type + * indicating 'signer_info' + * and containing header_fields[2].type + * indicating 'generation_time' + * and containing header_fields[3].type + * indicating 'generation_location' + * and containing header_fields[4].type + * indicating 'its_aid' + * and not containing other header fields + * then + * the IUT discards the SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_04_01_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_04_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -13564,32 +13190,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_04_01_BO /** - * @desc Check that IUT discards a secured DENM if the message does not contain the header field of type 'signer_info' + * @desc Check that IUT discards a secured DENM if the message does not contain the header field of type 'signer_info' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing header_fields[0].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_location'
-             *          and containing header_fields[2].type
-             *                  indicating 'its_aid'
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_04_02_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing header_fields[0].type + * indicating 'generation_time' + * and containing header_fields[1].type + * indicating 'generation_location' + * and containing header_fields[2].type + * indicating 'its_aid' + * and not containing other header fields + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_04_02_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_04_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -13654,34 +13277,31 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_04_02_BO /** - * @desc Check that IUT discards the Secured DENM if the signer_info header field is not encoded first + * @desc Check that IUT discards the Secured DENM if the signer_info header field is not encoded first. *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing header_fields[0].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_location'
-             *          and containing header_fields[2].type
-             *              containing its_aid
-             *          and containing header_fields[3].type
-             *              indicating 'signer_info'
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_04_03_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing header_fields[0].type + * indicating 'generation_time' + * and containing header_fields[1].type + * indicating 'generation_location' + * and containing header_fields[2].type + * indicating 'its_aid' + * and containing header_fields[3].type + * indicating 'signer_info' + * and not containing other header fields + * then + * the IUT discards the SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_04_03_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_04_03_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -13750,36 +13370,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_04_03_BO /** - * @desc Check that IUT discards a secured DENM if the message contains more than one header field of type 'generation_time' + * @desc Check that IUT discards a secured DENM if the message contains more than one header field of type 'generation_time' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[2].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[3].type
-             *              indicating 'generation_location'
-             *          and containing header_fields[4].type
-             *              containing its_aid
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_04_04_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing header_fields[0].type + * indicating 'signer_info' + * containing header_fields[1].type + * indicating 'generation_time' + * and containing header_fields[2].type + * indicating 'generation_time' + * and containing header_fields[3].type + * indicating 'generation_location' + * and containing header_fields[4].type + * indicating 'its_aid' + * and not containing other header fields + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_04_04_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_04_04_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -13849,32 +13466,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_04_04_BO /** - * @desc Check that IUT discards a secured DENM if the message does not contain the header field of type 'generation_time' + * @desc Check that IUT discards a secured DENM if the message does not contain the header field of type 'generation_time' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_location'
-             *          and containing header_fields[2].type
-             *              containing its_aid
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_04_05_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing header_fields[0].type + * indicating 'signer_info' + * containing header_fields[1].type + * indicating 'generation_location' + * and containing header_fields[2].type + * indicating 'its_aid' + * and not containing other header fields + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_04_05_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_04_05_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -13942,36 +13556,39 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_04_05_BO /** - * @desc Check that IUT discards a secured DENM if the message contains more than one header field of type 'its_aid' + * @desc Check that IUT discards a secured DENM if the message contains more than one header field of type 'its_aid' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[2].type
-             *              indicating 'generation_location'
-             *          and containing header_fields[3].type
-             *              containing its_aid
-             *          and containing header_fields[4].type
-             *              containing its_aid
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_04_06_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing header_fields[0].type + * indicating 'signer_info' + * and containing header_fields[1].type + * indicating 'generation_time' + * and containing header_fields[2].type + * indicating 'generation_location' + * and containing header_fields[3] + * containing type + * indicating 'its_aid' + * containing its_aid + * indicating 'AID_DENM' + * and containing header_fields[4] + * containing type + * indicating 'its_aid' + * containing its_aid + * indicating 'AID_DENM' + * and not containing other header fields + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_04_06_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_04_06_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -14041,35 +13658,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_04_06_BO /** - * @desc Check that IUT discards a secured DENM if the message does not contain the header field of type 'its_aid' + * @desc Check that IUT discards a secured DENM if the message does not contain the header field of type 'its_aid' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[2].type
-             *              indicating 'generation_location'
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_04_06a_BO - * @reference ETSI TS 103 097 [1], clause 7.2 - */ - testcase TC_SEC_ITSS_RCV_DENM_04_06a_BO() runs on ItsGeoNetworking system ItsSecSystem { + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing header_fields[0].type + * indicating 'signer_info' + * and containing header_fields[1].type + * indicating 'generation_time' + * and containing header_fields[2].type + * indicating 'generation_location' + * and not containing other header fields + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_04_06a_BO + * @reference ETSI TS 103 097 [1], clause 7.2 + */ + testcase TC_SEC_ITSS_RCV_DENM_04_06a_BO() runs on ItsGeoNetworking system ItsSecSystem { // Local variables var integer i; @@ -14134,36 +13748,39 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_04_06a_BO /** - * @desc Check that IUT discards a secured DENM if the message contains more than one header field of type 'generation_location' + * @desc Check that IUT discards a secured DENM if the message contains more than one header field of type 'generation_location' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[2].type
-             *              indicating 'generation_location'
-             *          and containing header_fields[3].type
-             *              containing 'generation_location'
-             *          and containing header_fields[4].type
-             *              containing its_aid
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_04_07_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing header_fields[0].type + * indicating 'signer_info' + * and containing header_fields[1].type + * indicating 'generation_time' + * and containing header_fields[2] + * containing type + * indicating 'generation_location' + * and containing generation_location + * indicating X_LOCATION + * and containing header_fields[3] + * containing type + * indicating 'generation_location' + * and containing generation_location + * indicating X_LOCATION + * and containing header_fields[4].type + * indicating 'its_aid' + * and not containing other header fields + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_04_07_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_04_07_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -14239,32 +13856,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_04_07_BO /** - * @desc Check that IUT discards a secured DENM if the message does not contain the header field of type 'generation_location' + * @desc Check that IUT discards a secured DENM if the message does not contain the header field of type 'generation_location' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[2].type
-             *              containing its_aid
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_04_08_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing header_fields[0].type + * indicating 'signer_info' + * containing header_fields[1].type + * indicating 'generation_time' + * and containing header_fields[2].type + * indicating 'its_aid' + * and not containing other header fields + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_04_08_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_04_08_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -14326,36 +13940,30 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_04_08_BO /** - * @desc Check that IUT discards a Secured DENM if the header fields are not in the ascending order according to the numbering of the enumeration + * @desc Check that IUT discards a Secured DENM if the header fields are not in the ascending order according to the numbering of the enumeration. *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              containing its_aid
-             *          and containing header_fields[2].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[3].type
-             *              indicating 'generation_location'
-             *          and containing header_fields[4].type
-             *              containing 'generation_location'
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_04_09_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing header_fields[0].type + * indicating 'signer_info' + * and containing header_fields[1].type + * indicating 'its_aid' + * and containing header_fields[2].type + * indicating 'generation_time' + * and containing header_fields[3].type + * indicating 'generation_location' + * then + * the IUT discards the SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_04_09_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_04_09_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -14424,41 +14032,38 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_04_09_BO /** - * @desc Check that IUT discards a Secured DENM containing header field of type 'generation_time_standard_deviation' + * @desc Check that IUT discards a Secured DENM containing header field of type 'generation_time_standard_deviation' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_time'
-             *              and containing time
-             *                  indicating CURRENT_TIME
-             *          and containing header_fields[2]
-             *              containing type
-             *                  indicating 'generation_time_standard_deviation'
-             *              and containing log_std_dev 
-             *                  indicating 255
-             *          and containing header_fields[3].type
-             *                  indicating 'generation_location'
-             *          and containing header_fields[4].type
-             *              containing its_aid
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_04_10_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing header_fields[0].type + * indicating 'signer_info' + * and containing header_fields[1].type + * indicating 'generation_time' + * and containing header_fields[2] + * containing type + * indicating 'generation_time_standard_deviation' + * and containing generation_time_with_standard_deviation + * containing time + * indicating CURRENT_TIME + * and containing log_std_dev + * indicating 255 + * and containing header_fields[3].type + * indicating 'generation_location' + * and containing header_fields[4].type + * indicating 'its_aid' + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_04_10_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_04_10_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -14533,41 +14138,39 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_04_10_BO /** - * @desc Check that IUT discards the Secured DENM containing the header fields of type 'expiry_time' + * @desc Check that IUT discards the Secured DENM containing the header fields of type 'expiry_time' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_time'
-             *              and containing time
-             *                  indicating CURRENT_TIME
-             *          and containing header_fields[2]
-             *              containing type
-             *                  indicating 'expiration'
-             *              and containing expiry_time 
-             *                  indicating CURRENT_TIME + 1 h 
-             *          and containing header_fields[3].type
-             *                  indicating 'generation_location'
-             *          and containing header_fields[4].type
-             *              containing its_aid
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_04_11_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing header_fields[0].type + * indicating 'signer_info' + * and containing header_fields[1] + * containing type + * indicating 'generation_time' + * containing generation_time + * indicating CURRENT_TIME + * and containing header_fields[2] + * containing type + * indicating 'expiration' + * and containing expiry_time + * indicating CURRENT_TIME + 1 h + * and containing header_fields[3].type + * indicating 'generation_location' + * and containing header_fields[4].type + * indicating 'its_aid' + * and not containing other header fields + * then + * the IUT discards the SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_04_11_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_04_11_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -14638,40 +14241,7 @@ module ItsSecurity_TestCases { f_cf01Down(); } // End of testcase TC_SEC_ITSS_RCV_DENM_04_11_BO - /** - * @desc Check that IUT accepts the Secured DENM containing additional non-standard HeaderField - *
-             * Pics Selection: PICS_GN_SECURITY
-             * Config Id: CF01
-             * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[3].type
-             *              containing its_aid
-             *          and containing header_fields[4]
-             *              containing type
-             *                  indicating non-standard header field type (200)
-             *              and containing other_header
-             *                  indicating non-empty data
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_04_12_BO - * @reference ETSI TS 103 097 [1], clause 7.2 - */ + testcase TC_SEC_ITSS_RCV_DENM_04_12_BO() runs on ItsGeoNetworking system ItsSecSystem { // Local variables @@ -14739,49 +14309,48 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_04_12_BO /** - * @desc Check that IUT discards the Secured CAM containing the header field 'encryption_parameter and recipient_info' + * @desc Check that IUT discards the Secured CAM containing the header field 'encryption_parameter' and 'recipient_info' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[3].type
-             *              containing its_aid
-             *          and containing header_fields[4]
-             *              containing type
-             *                  indicating 'encryption_parameters'
-             *              and containing enc_params
-             *                  containing symm_algorithm
-             *                      indicating 'aes_128_ccm'
-             *                  and containing nonce
-             *              and containing header_fields[4]
-             *                  containing type
-             *                      indicating 'recipient_info'
-             *                  and containing recipients
-             *                      containing recipients[0]
-             *                          containing cert_id
-             *                              referencing to CERT_IUT_A_AT
-             *                          and containing pk_encryption
-             *                              indicating 'ecies_nistp256'
-             *                          and containing enc_key
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_04_13_BO + * with + * the IUT being in the 'authorized' state with CERT_IUT_A_AT + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing header_fields[0].type + * indicating 'signer_info' + * and containing header_fields[1].type + * indicating 'generation_time' + * and containing header_fields[2].type + * indicating 'generation_location' + * and containing header_fields[3].type + * indicating 'its_aid' + * and containing header_fields[4] + * containing type + * indicating 'encryption_parameters' + * and containing enc_params + * containing symm_algorithm + * indicating 'aes_128_ccm' + * and containing nonce + * and containing header_fields[5] + * containing type + * indicating 'recipient_info' + * and containing recipients + * containing recipients[0] + * containing cert_id + * referencing to CERT_IUT_A_AT + * and containing pk_encryption + * indicating 'ecies_nistp256' + * and containing enc_key + * and not containing other header fields + * then + * the IUT discards the SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_04_13_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_04_13_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -14878,40 +14447,39 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_04_13_BO /** - * @desc Check that IUT discards the Secured DENM containing the header fields of type 'request_unrecognized_certificate' + * @desc Check that IUT discards the Secured DENM containing the header fields of type 'request_unrecognized_certificate' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_time'
-             *              and containing generation_time
-             *                  indicating CURRENT_TIME
-             *          and containing header_fields[2].type
+             *   with
+             *     the IUT being in the 'authorized' state with X_IUT_AT_CERT
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A)
+             *         containing header_fields[0].type
+             *           indicating 'signer_info'
+             *         and containing header_fields[1]
+             *           containing type
+             *             indicating 'generation_time'
+             *           containing generation_time
+             *             indicating CURRENT_TIME
+             *         and containing header_fields[2]
+             *           containing type
              *             indicating 'request_unrecognized_certificate'
-             *             and containing digests[0]
-             *                 indicating the digest of X_IUT_AT_CERT
-             *          and containing header_fields[3].type
-             *              indicating 'generation_location'
-             *          and containing header_fields[4].type
-             *              indicating 'its_aid'
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_04_14_BO + * and containing digests[0] + * indicating the digest of X_IUT_AT_CERT + * and containing header_fields[3].type + * indicating 'generation_location' + * and containing header_fields[4].type + * indicating 'its_aid' + * and not containing other header fields + * then + * the IUT discards the SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_04_14_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_04_14_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -14996,29 +14564,25 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_04_14_BO /** - * @desc Check that IUT discards a Secured DENM if the header_fields contains a signer of type 'self' + * @desc Check that IUT discards a Secured DENM if the header_fields contains a signer of type 'self' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *                  containing signer.type
-             *                      indicating 'self'
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_05_01_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing header_fields['signer_info'] + * containing signer.type + * indicating 'self' + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_05_01_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_05_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -15086,29 +14650,25 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_05_01_BO /** - * @desc Check that IUT discards a Secured DENM if the header_fields contains a signer of type 'certificate_digest_with_other_algorithm' + * @desc Check that IUT discards a Secured DENM if the header_fields contains a signer of type 'certificate_digest_with_other_algorithm' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *                  containing signer.type
-             *                      indicating 'certificate_digest_with_other_algorithm'
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_05_02_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing header_fields['signer_info'] + * containing signer.type + * indicating 'certificate_digest_with_other_algorithm' + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_05_02_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_05_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -15178,29 +14738,25 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_05_02_BO /** - * @desc Check that IUT discards a Secured DENM if the header_fields contains a signer of type certificate_chain + * @desc Check that IUT discards a Secured DENM if the header_fields contains a signer of type certificate_chain *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *                  containing signer.type
-             *                      indicating 'certificate_digest_with_other_algorithm'
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_05_03_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing header_fields['signer_info'] + * containing signer.type + * indicating 'certificate_chain' + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_05_03_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_05_03_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -15269,29 +14825,25 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_05_03_BO /** - * @desc Check that IUT discards a secured DENM if the header_fields contains a signer info of unknown or reserved type + * @desc Check that IUT discards a secured DENM if the header_fields contains a signer info of unknown or reserved type *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *                  containing signer.type
-             *                      indicating X_UNKNOWN_SIGNERINFO_TYPE
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_05_04_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing header_fields['signer_info'] + * containing signer.type + * indicating X_UNKNOWN_SIGNERINFO_TYPE + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_05_04_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_05_04_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -15360,35 +14912,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_05_04_BO /** - * @desc Check that IUT discards a Secured DENM containing generation_time before the certificate validity period + * @desc Check that IUT discards a Secured DENM containing generation_time before the certificate validity period *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing header_fields['signer_info'].signer 
-             *              containing certificate (CERT_TS_MSG_06_01_BO_AT)
-             *                  containing validity_restrictions['time_start_and_end']
-             *                      containing start_validity
-             *                          indicating START_VALIDITY_AT
-             *                      and containing end_validity
-             *                          indicating END_VALIDITY_AT
-             *          and containing header_fields ['generation_time']
-             *              containing generation_time
-             *                  indicating GEN_TIME < START_VALIDITY_AT
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_06_01_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing header_fields['signer_info'] + * containing certificate (CERT_TS_MSG_06_01_BO_AT) + * containing validity_restrictions['time_start_and_end'] + * containing start_validity + * indicating START_VALIDITY_AT + * and containing end_validity + * indicating END_VALIDITY_AT + * and containing header_fields ['generation_time'] + * containing generation_time + * indicating GEN_TIME < START_VALIDITY_AT + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_06_01_BO * @reference ETSI TS 103 097 [1], clauses 5.4 and 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_06_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -15448,35 +14997,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_06_01_BO /** - * @desc Check that IUT discards a Secured DENM containing generation_time before the certificate validity period + * @desc Check that IUT discards a Secured DENM containing generation_time after the certificate validity period *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A)
-             *          containing header_fields['signer_info'].signer 
-             *              containing certificate (CERT_TS_MSG_06_02_BO_AT)
-             *                  containing validity_restrictions['time_start_and_end']
-             *                      containing start_validity
-             *                          indicating START_VALIDITY_AT
-             *                      and containing end_validity
-             *                          indicating END_VALIDITY_AT
-             *          and containing header_fields ['generation_time']
-             *              containing generation_time
-             *                  indicating GEN_TIME > END_VALIDITY_AT
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_06_02_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing header_fields['signer_info'] + * containing certificate (CERT_TS_MSG_06_02_BO_AT) + * containing validity_restrictions['time_start_and_end'] + * containing start_validity + * indicating START_VALIDITY_AT + * and containing end_validity + * indicating END_VALIDITY_AT + * and containing header_fields ['generation_time'] + * containing generation_time + * indicating GEN_TIME > END_VALIDITY_AT + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_06_02_BO * @reference ETSI TS 103 097 [1], clauses 5.4 and 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_06_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -15536,28 +15082,25 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_06_02_BO /** - * @desc Check that IUT discards a Secured DENM if the generation_time is more than 10 minute in the past (C2C only) + * @desc Check that IUT discards a Secured DENM if the generation_time is more than 10 minute in the past (C2C only) *
-             * Pics Selection: PICS_GN_SECURITY
+             * Pics Selection: PICS_GN_SECURITY AND PICS_C2C
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing header_fields ['generation_time']
-             *              containing generation_time
-             *                  indicating GEN_TIME ( CURRENT_TIME - 11min )
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_06_03_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing header_fields ['generation_time'] + * containing generation_time + * indicating CURRENT_TIME - 11min + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_06_03_BO * @reference ETSI TS 103 097 [1], clauses 5.4 and 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_06_03_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -15615,28 +15158,25 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_06_03_BO /** - * @desc Check that IUT discards a Secured DENM if the generation_time is more than 10 minute in the future(C2C only) + * @desc Check that IUT discards a Secured DENM if the generation_time is more than 10 minute in the future(C2C only) *
-             * Pics Selection: PICS_GN_SECURITY
+             * Pics Selection: PICS_GN_SECURITY AND PICS_C2C
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing header_fields ['generation_time']
-             *              containing generation_time
-             *                  indicating GEN_TIME ( CURRENT_TIME + 11min )
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_06_04_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing header_fields ['generation_time'] + * containing generation_time + * indicating CURRENT_TIME + 11min + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_06_04_BO * @reference ETSI TS 103 097 [1], clauses 5.4 and 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_06_04_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -15694,30 +15234,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_06_04_BO /** - * @desc Check that IUT discards secured DENM when its_aid value is not equal to AID_DENM + * @desc Check that IUT discards a Secured DENM when its_aid value is not AID_DENM *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A)
-             *              containing header_fields['its_aid']
-             *                  indicating 'AID_CAM'
-             *              and containing payload_field 
-             *                  containing type    
-             *                    indicating 'signed' 
-             *                  containing data    
-             *                    containing DENM payload
-             *      } then {
-             *          the IUT discards the DENM
-             *      }
-             *  }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_07_01_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing header_fields['its_aid'] + * indicating 'AID_CAM' + * and containing payload_field + * containing type + * indicating 'signed' + * and containing data + * containing DENM payload + * then + * the IUT discards the DENM message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_07_01_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_07_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -15776,25 +15315,24 @@ module ItsSecurity_TestCases { * Pics Selection: PICS_GN_SECURITY * Config Id: CF01 * Initial conditions: - * with { - * the IUT being in the 'authorized' state - * } - * ensure that { - * when { - * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) - * containing header_fields['its_aid'] - * indicating 'AID_UNDEFINED' - * and containing payload_field { - * containing type - * indicating 'signed' - * containing data - * containing DENM payload - * } then { - * the IUT discards the DENM - * } - * } - * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_07_02_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing header_fields['its_aid'] + * indicating 'AID_UNDEFINED' + * and containing payload_field + * containing type + * indicating 'signed' + * and containing data + * containing DENM payload + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_07_02_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_07_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -15848,39 +15386,35 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_07_02_BO /** - * @desc Check that IUT discards Secured DENM if the HeaderField generation_location is outside of the circular validity region of the signing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_CIRCULAR_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             * with {
-             *   the IUT being in the 'authorized' state
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is requested to send DENM
-             *   } then {
-             *     the IUT is receiving a SecuredMessage
-             *          containing header_fields['signer_info'].type
-             *              indicating 'certificate'
-             *          and containing  header_fields ['signer_info'].certificate (CERT_AT_B)
-             *              containing validity_restrictions['region']
-             *                  containing region
-             *                      containing region_type
-             *                          indicating 'circle'
-             *                      and containing circular_region
-             *                          indicating REGION
-             *          and containing header_fields ['generation_location']
-             *              containing generation_location
-             *                  indicating position outside the REGION
-             *          and containing header_fields['its_aid']
-             *              indicating 'AID_DENM'
-             *      } then {
-             *          the IUT discards the DENM
-             *      }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_08_01_BO + * @desc Check that IUT discards Secured DENM if the HeaderField generation_location is outside of the circular validity region of the signing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_CIRCULAR_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage
+             *         and containing header_fields ['signer_info'].type
+             *           indicating certificate
+             *         and containing header_fields ['signer_info'].certificate (CERT_TS_AT_B)
+             *           containing validity_restrictions ['region']
+             *             containing region
+             *               containing region_type
+             *                 indicating 'circle'
+             *               and containing circular_region
+             *                 indicating REGION
+             *         and containing header_fields ['generation_location']
+             *           containing generation_location
+             *             indicating value outside of the REGION
+             *         and containing header_fields['its_aid']
+             *           indicating 'AID_DENM'
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_08_01_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_08_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -15928,39 +15462,35 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_08_01_BO /** - * @desc Check that IUT discards Secured DENM if the HeaderField generation_location is outside of the rectangilar validity region of the signing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_RECTANGULAR_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             * with {
-             *   the IUT being in the 'authorized' state
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is requested to send DENM
-             *   } then {
-             *     the IUT is receiving a SecuredMessage
-             *          containing header_fields['signer_info'].type
-             *              indicating 'certificate'
-             *          and containing  header_fields ['signer_info'].certificate (CERT_AT_C)
-             *              containing validity_restrictions['region']
-             *                  containing region
-             *                      containing region_type
-             *                          indicating 'rectangle'
-             *                      and containing rectangular_regions
-             *                          indicating REGION
-             *          and containing header_fields ['generation_location']
-             *              containing generation_location
-             *                  indicating position outside the REGION
-             *          and containing header_fields['its_aid']
-             *              indicating 'AID_DENM'
-             *      } then {
-             *          the IUT discards the DENM
-             *      }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_08_02_BO + * @desc Check that IUT discards Secured DENM if the HeaderField generation_location is outside of the rectangular validity region of the signing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_RECTANGULAR_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage
+             *         containing header_fields ['signer_info'].type
+             *           indicating certificate
+             *         and containing header_fields ['signer_info'].certificate (CERT_TS_AT_C)
+             *           containing validity_restrictions ['region']
+             *             containing region
+             *               containing region_type
+             *                 indicating 'rectangle'
+             *               and containing rectangular_regions
+             *                 indicating REGION
+             *         and containing header_fields ['generation_location']
+             *           containing generation_location
+             *             indicating value outside of the REGION
+             *         and containing header_fields['its_aid']
+             *           indicating 'AID_DENM'
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_08_02_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_08_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -16008,39 +15538,35 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_08_02_BO /** - * @desc Check that IUT discards Secured DENM if the HeaderField generation_location is outside of the polygonal validity region of the signing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_POLYGONAL_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             * with {
-             *   the IUT being in the 'authorized' state
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is requested to send DENM
-             *   } then {
-             *     the IUT is receiving a SecuredMessage
-             *          containing header_fields['signer_info'].type
-             *              indicating 'certificate'
-             *          and containing  header_fields ['signer_info'].certificate (CERT_AT_D)
-             *              containing validity_restrictions['region']
-             *                  containing region
-             *                      containing region_type
-             *                          indicating 'polygon'
-             *                      and containing polygonal_region
-             *                          indicating REGION
-             *          and containing header_fields ['generation_location']
-             *              containing generation_location
-             *                  indicating position outside the REGION
-             *          and containing header_fields['its_aid']
-             *              indicating 'AID_DENM'
-             *      } then {
-             *          the IUT discards the DENM
-             *      }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_08_03_BO + * @desc Check that IUT discards Secured DENM if the HeaderField generation_location is outside of the polygonal validity region of the signing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_POLYGONAL_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage
+             *         containing header_fields ['signer_info'].type
+             *           indicating certificate
+             *         and containing header_fields ['signer_info'].certificate (CERT_TS_AT_D)
+             *           containing validity_restrictions ['region']
+             *             containing region
+             *               containing region_type
+             *                 indicating 'polygon'
+             *               and containing polygonal_region
+             *                 indicating REGION
+             *         and containing header_fields ['generation_location']
+             *           containing generation_location
+             *             indicating value outside of the REGION
+             *         and containing header_fields['its_aid']
+             *           indicating 'AID_DENM'
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_08_03_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_08_03_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -16088,39 +15614,35 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_08_03_BO /** - * @desc Check that IUT discards Secured DENM if the HeaderField generation_location is outside of the identified validity region of the signing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_IDENTIFIED_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             * with {
-             *   the IUT being in the 'authorized' state
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is requested to send DENM
-             *   } then {
-             *     the IUT is receiving a SecuredMessage
-             *          containing header_fields['signer_info'].type
-             *              indicating 'certificate'
-             *          and containing  header_fields ['signer_info'].certificate (CERT_AT_E)
-             *              containing validity_restrictions['region']
-             *                  containing region
-             *                      containing region_type
-             *                          indicating 'id_region'
-             *                      and containing identified_region
-             *                          indicating REGION
-             *          and containing header_fields ['generation_location']
-             *              containing generation_location
-             *                  indicating position outside the REGION
-             *          and containing header_fields['its_aid']
-             *              indicating 'AID_DENM'
-             *      } then {
-             *          the IUT discards the DENM
-             *      }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_08_04_BO + * @desc Check that IUT discards Secured DENM if the HeaderField generation_location is outside of the identified validity region of the signing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_IDENTIFIED_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage
+             *         containing header_fields ['signer_info'].type
+             *           indicating certificate
+             *         and containing header_fields ['signer_info'].certificate (CERT_TS_AT_E)
+             *           containing validity_restrictions ['region']
+             *             containing region
+             *               containing region_type
+             *                 indicating 'id_region'
+             *               and and containing identified_region
+             *                 indicating REGION
+             *         and containing header_fields ['generation_location']
+             *           containing generation_location
+             *             indicating value outside of the REGION
+             *         and containing header_fields['its_aid']
+             *           indicating 'AID_DENM'
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_08_04_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_08_04_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -16168,28 +15690,25 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_08_04_BO /** - * @desc Check that IUT accepts a Secured DENM if the distance between the current position of IUT and the value of optional HeaderField generation_location is 29.9 km (C2C only) + * @desc Check that IUT accepts a Secured DENM if the distance between the current position of IUT and the value of optional HeaderField generation_location is 29.9 km (C2C only) *
-             * Pics Selection: PICS_GN_SECURITY
+             * Pics Selection: PICS_GN_SECURITY AND PICS_C2C
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A)
-             *          containing header_fields[generation_location].type 
-             *              indicating 'generation_location'
-             *          and containing generation_location
-             *              indicating position in 29.9 km from the current position of IUT
-             *   } then {
-             *     the IUT accepts the message
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_08_05_BV + * Initial conditions: + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing header_fields ['generation_location'] + * containing generation_location + * indicating position in 29.9 km from the current position of IUT + * then + * the IUT accepts the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_08_05_BV * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_08_05_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -16262,28 +15781,25 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_08_05_BV /** - * @desc Check that IUT discards Secured DENM if the distance between the current position of IUT and the value of optional HeaderField generation_location is more than 30 km + * @desc Check that IUT discards Secured DENM if the distance between the current position of IUT and the value of optional HeaderField generation_location is more than 30 km *
-             * Pics Selection: PICS_GN_SECURITY
+             * Pics Selection: PICS_GN_SECURITY AND PICS_C2C
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A)
-             *          containing header_fields[generation_location].type 
-             *              indicating 'generation_location'
-             *          and containing generation_location
-             *              indicating position in 31 km from the current position of IUT
-             *   } then {
-             *     the IUT discards the message
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_08_06_BO + * Initial conditions: + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage + * and containing header_fields ['generation_location'] + * containing generation_location + * indicating position in 31 km from the current position of IUT + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_08_06_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_08_06_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -16356,37 +15872,34 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_08_06_BO /** - * @desc Check that IUT discards the Secured DENM containing empty payload of type 'signed' + * @desc Check that IUT discards the Secured DENM containing empty payload of type 'signed' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing payload_field
-             *              containing type
-             *                  indicating 'signed'
-             *              and containing data
-             *                  indicating length 0
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_09_02_BO - * @reference ETSI TS 103 097 [1], clause 7.2 - */ - testcase TC_SEC_ITSS_RCV_DENM_09_02_BO() runs on ItsGeoNetworking system ItsSecSystem { - - // Local variables - var integer i; - var GnNonSecuredPacket v_gnNonSecuredPacket; + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing payload_field + * containing type + * indicating 'signed' + * and containing data + * indicating length 0 + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_09_02_BO + * @reference ETSI TS 103 097 [1], clause 7.2 + */ + testcase TC_SEC_ITSS_RCV_DENM_09_02_BO() runs on ItsGeoNetworking system ItsSecSystem { + + // Local variables + var integer i; + var GnNonSecuredPacket v_gnNonSecuredPacket; var octetstring v_gnPayload; var template (value) SecuredMessage v_securedMessage; var GeoNetworkingPdu v_securedGnPdu; @@ -16473,30 +15986,27 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_09_02_BO /** - * @desc Check that IUT discards the Secured DENM containing payload of type 'unsecured' + * @desc Check that IUT discards the Secured DENM containing payload of type 'unsecured' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing payload_field
-             *              containing type
-             *                  indicating 'unsecured'
-             *              and containing data
-             *                  indicating length > 0
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_09_03_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing payload_field + * containing type + * indicating 'unsecured' + * and containing data + * indicating length > 0 + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_09_03_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_09_03_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -16590,30 +16100,27 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_09_03_BO /** - * @desc Check that IUT discards the Secured DENM containing payload of type 'encrypted' + * @desc Check that IUT discards the Secured DENM containing payload of type 'encrypted' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing payload_field
-             *              containing type
-             *                  indicating 'encrypted'
-             *              and containing data
-             *                  indicating length > 0
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_09_04_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing payload_field + * containing type + * indicating 'encrypted' + * and containing data + * indicating length > 0 + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_09_04_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_09_04_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -16707,30 +16214,27 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_09_04_BO /** - * @desc Check that IUT discards the Secured DENM containing payload of type 'signed_external' + * @desc Check that IUT discards the Secured DENM containing payload of type 'signed_external' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing payload_field
-             *              containing type
-             *                  indicating 'signed_external'
-             *              and containing data
-             *                  indicating length > 0
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_09_05_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing payload_field + * containing type + * indicating 'signed_external' + * and containing data + * indicating length > 0 + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_09_05_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_09_05_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -16824,30 +16328,27 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_09_05_BO /** - * @desc Check that IUT discards the Secured DENM containing exactly one non-empty payload of type 'signed_and_encrypted' + * @desc Check that IUT discards the Secured DENM containing exactly one non-empty payload of type 'signed_and_encrypted' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *  the IUT being in the 'authorized' state 
-             *  and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) 
-             *          containing payload_field
-             *              containing type
-             *                  indicating 'signed_and_encrypted'
-             *              and containing data
-             *                  indicating length > 0
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_09_06_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing payload_field + * containing type + * indicating 'signed_and_encrypted' + * and containing data + * indicating length > 0 + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_09_06_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_09_06_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -16941,28 +16442,24 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_09_06_BO /** - * @desc Check that IUT discards the Secured DENM if the message does not contain the trailer field of type signature + * @desc Check that IUT discards the Secured DENM if the message does not contain the trailer field of type signature *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A)
-            *            containing trailer_fields
-            *                not containing any instance of type TrailerField
-            *                    containing type
-            *                        indicating 'signature'
-             *   } then {
-             *     the IUT discards the message
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_10_01_BO + * Initial conditions: + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing trailer_fields + * not containing trailer_fields['signature'] + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_10_01_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_10_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -17010,30 +16507,28 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_10_01_BO /** - * @desc Check that IUT discards the Secured DENM containing more than one instance of TrailerField of type 'signature' + * @desc Check that IUT discards the Secured DENM containing more than one instance of TrailerField of type 'signature' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A)
-            *          containing trailer_fields[0].type
-            *              containing type
-            *                  indicating 'signature'
-            *          and containing trailer_fields[1].type
-            *              containing type
-            *                  indicating 'signature'
-             *   } then {
-             *     the IUT discards the message
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_10_02_BO + * Initial conditions: + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing trailer_fields[0] + * containing type + * indicating 'signature' + * and containing trailer_fields[1] + * containing type + * indicating 'signature' + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_10_02_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_10_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -17081,32 +16576,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_10_02_BO /** - * @desc Check that the IUT discards Secured DENM containing signature that is not verified using the verification key from the certificate contained in the message's signer info + * @desc Check that the IUT discards Secured DENM containing signature that is not verified using the verification key from the certificate contained in the message's signer info *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             *   with {
+             * Initial conditions:
+             *   with
              *     the IUT being in the 'authorized' state
              *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             *   }
-             *   ensure that {
-             *     when {
-             *         the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A)
-            *               containing header_fields ['signer_info']
-            *                   containing certificate (CERT_TS_A_AT)
-            *                       containing subject_attributes['verification key'] (KEY)
-            *               and containing trailer_fields[0]
-            *                   containing type
-            *                       indicating 'signature'
-            *                   and containing signature
-            *                       NOT verifiable using KEY
-             *   } then {
-             *     the IUT discards the message
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_11_01_BO + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing header_fields ['signer_info'] + * containing signer + * containing certificate (CERT_TS_A_AT) + * containing subject_attributes['verification key'] + * containing key (KEY) + * and containing trailer_fields[0] + * containing type + * indicating 'signature' + * containing signature + * NOT verifiable using KEY + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_11_01_BO * @reference ETSI TS 103 097 [1], clauses 4.2.2 & 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_11_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -17160,30 +16655,28 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_11_01_BO /** - * @desc Check that IUT discards the Secured DENM if the message contains trailer field of type 'signature' with reserved public key algorythms + * @desc Check that IUT discards the Secured DENM if the message contains trailer field of type 'signature' with reserved public key algorythms *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             *   with {
+             * Initial conditions:
+             *   with
              *     the IUT being in the 'authorized' state
              *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             *   }
-             *   ensure that {
-             *     when {
-             *         the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A)
-            *               containing trailer_fields
-            *                   containing an instance of type TrailerField
-            *                       containing type
-            *                           indicating 'signature'
-            *                       and containing signature.algorithm
-            *                           indicating X_RESERVED_PK_ALGORYTHM
-             *   } then {
-             *     the IUT discards the message
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_11_02_BO + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A) + * containing trailer_fields + * containing an instance of type TrailerField + * containing type + * indicating 'signature' + * and containing signature.algorithm + * indicating X_RESERVED_PK_ALGORYTHM + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_11_02_BO * @reference ETSI TS 103 097 [1], clauses 4.2.2 & 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_11_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -17235,31 +16728,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_11_02_BO /** - * @desc Check that IUT discards a Secured DENM if the signer certificate of the message contains the subject type 'enrolment_credential' + * @desc Check that IUT discards a Secured DENM if the signer certificate of the message contains the subject type 'enrolment_credential' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *     when {
-             *         the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A)
-             *          containing header_fields['signer_info']
-             *              containing signer
-             *                  containing type
-             *                      indicating 'certificate'
-             *                  containing certificate (CERT_TS_EC_A)
-             *                      containing subject_info.subject_type
-             *                          indicating 'enrolment_credentials'
-             *   } then {
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage
+             *         containing header_fields ['signer_info']
+             *           containing signer.type
+             *             indicating 'certificate'
+             *           containing signer.certificate (CERT_TS_EA_A)
+             *             containing subject_info.subject_type
+             *               indicating 'enrolment_credentials'
+             *         containing header_fields['its_aid']
+             *           indicating 'AID_DENM'
+             *     then
              *       the IUT discards the message
-             *   }
-             * }
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_12_01_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_12_01_BO * @reference ETSI TS 103 097 [1], clause 6.3 */ testcase TC_SEC_ITSS_RCV_DENM_12_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -17314,31 +16805,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_12_01_BO /** - * @desc Check that IUT discards a Secured DENM if the signer certificate of the message contains the subject type "authorization_authority" + * @desc Check that IUT discards a Secured DENM if the signer certificate of the message contains the subject type "authorization_authority" *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *     when {
-             *         the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A)
-             *          containing header_fields['signer_info']
-             *              containing signer
-             *                  containing type
-             *                      indicating 'certificate'
-             *                  containing certificate (CERT_TS_A_AA)
-             *                      containing subject_info.subject_type
-             *                          indicating 'authorization_authority'
-             *   } then {
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage
+             *         containing header_fields ['signer_info']
+             *           containing signer.type
+             *             indicating 'certificate'
+             *           containing signer.certificate (CERT_TS_AA_A)
+             *             containing subject_info.subject_type
+             *               indicating 'authorization_authority'
+             *         containing header_fields['its_aid']
+             *           indicating 'AID_DENM'
+             *     then
              *       the IUT discards the message
-             *   }
-             * }
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_12_02_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_12_02_BO * @reference ETSI TS 103 097 [1], clause 6.3 */ testcase TC_SEC_ITSS_RCV_DENM_12_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -17393,31 +16882,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_12_02_BO /** - * @desc Check that IUT discards a Secured DENM if the signer certificate of the message contains the subject type 'enrolment_authority' + * @desc Check that IUT discards a Secured DENM if the signer certificate of the message contains the subject type 'enrolment_authority' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *     when {
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A)
-             *          containing header_fields['signer_info']
-             *              containing signer
-             *                  containing type
-             *                      indicating 'certificate'
-             *              and certificate (CERT_TS_EA_A)
-             *                  containing subject_info.subject_type
-             *                      indicating 'enrolment_authority'
-             *   } then {
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A)
+             *         containing header_fields ['signer_info']
+             *           containing signer
+             *             containing type
+             *               indicating 'certificate'
+             *             containing certificate (CERT_TS_A_EA)
+             *               containing subject_info.subject_type
+             *                 indicating 'enrolment_authority'
+             *     then
              *       the IUT discards the message
-             *   }
-             * }
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_12_03_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_12_03_BO * @reference ETSI TS 103 097 [1], clause 6.3 */ testcase TC_SEC_ITSS_RCV_DENM_12_03_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -17472,31 +16959,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_12_03_BO /** - * @desc Check that IUT discards a Secured DENM if the signer certificate of the message contains the subject type 'root_ca' + * @desc Check that IUT discards a Secured DENM if the signer certificate of the message contains the subject type 'root_ca' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *     when {
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A)
-             *          containing header_fields['signer_info']
-             *              containing signer
-             *                  containing type
-             *                      indicating 'certificate'
-             *              and certificate (CERT_TS_ROOT)
-             *                  containing subject_info.subject_type
-             *                      indicating 'root_ca'
-             *   } then {
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A)
+             *         containing header_fields ['signer_info']
+             *           containing signer
+             *             containing type
+             *               indicating 'certificate'
+             *             containing certificate (CERT_TS_ROOT)
+             *               containing subject_info.subject_type
+             *                 indicating 'root_ca'
+             *     then
              *       the IUT discards the message
-             *   }
-             * }
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_12_04_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_12_04_BO * @reference ETSI TS 103 097 [1], clause 6.3 */ testcase TC_SEC_ITSS_RCV_DENM_12_04_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -17551,31 +17036,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_12_04_BO /** - * @desc Check that IUT discards secured DENM signed with the not yet valid certificate + * @desc Check that IUT discards secured DENM signed with the not yet valid certificate *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *     when {
-             *          the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A)
-             *              containing header_fields['signer_info'].signer 
-             *                  containing certificate (CERT_TS_MSG_13_01_BO_AT)
-             *                      containing validity_restrictions['time_start_and_end']
-             *                          containing start_validity
-             *                              indicating START_VALIDITY_AT > CURRENT_TIME
-             *                          and containing end_validity
-             *                              indicating END_VALIDITY_AT > START_VALIDITY_AT
-             *   } then {
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is before the time validity period of CERT_TS_MSG_13_01_BO_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A)
+             *         containing header_fields['signer_info'].signer
+             *           containing certificate (CERT_TS_MSG_13_01_BO_AT)
+             *             containing validity_restrictions['time_start_and_end']
+             *               containing start_validity
+             *                 indicating START_VALIDITY_AT > CURRENT_TIME
+             *               and containing end_validity
+             *                 indicating END_VALIDITY_AT > START_VALIDITY_AT
+             *     then
              *       the IUT discards the message
-             *   }
-             * }
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_13_01_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_13_01_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_13_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -17623,31 +17106,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_13_01_BO /** - * @desc Check that IUT discards secured DENM signed with the expired certificate + * @desc Check that IUT discards secured DENM signed with the expired certificate *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *     when {
-             *          the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A)
-             *              containing header_fields['signer_info'].signer 
-             *                  containing certificate (CERT_TS_MSG_13_02_BO_AT)
-             *                      containing validity_restrictions['time_start_and_end']
-             *                          containing start_validity
-             *                              indicating START_VALIDITY_AT < CURRENT_TIME
-             *                          and containing end_validity
-             *                              indicating END_VALIDITY_AT < START_VALIDITY_AT
-             *   } then {
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is before the time validity period of CERT_TS_MSG_13_02_BO_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A)
+             *         containing header_fields['signer_info'].signer
+             *           containing certificate (CERT_TS_MSG_13_02_BO_AT)
+             *             containing validity_restrictions['time_start_and_end']
+             *               containing start_validity
+             *                 indicating START_VALIDITY_AT < CURRENT_TIME
+             *               and containing end_validity
+             *                 indicating END_VALIDITY_AT < CURRENT_TIME
+             *     then
              *       the IUT discards the message
-             *   }
-             * }
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_13_02_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_13_02_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_13_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -17695,33 +17176,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_13_02_BO /** - * @desc Check that IUT discards secured DENM when IUT location is outside the circular validity restriction of the signing certificate + * @desc Check that IUT discards secured DENM when IUT location is outside the circular validity restriction of the signing certificate *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *     when {
-             *          the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A)
-             *              containing header_fields['signer_info'].signer 
-             *                  containing certificate (CERT_TS_MSG_13_03_BO_AT)
-             *                      containing validity_restrictions['region']
-             *                          containing region
-             *                              containing region_type
-             *                                  indicating 'circle'
-             *                              and containing circular_region
-             *                                  indicating REGION
-             *                                      not containing the CURRENT_IUT_LOCATION
-             *   } then {
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the validity period of CERT_TS_MSG_13_03_BO_AT
+             *     and the IUT current location is set to CURRENT_IUT_LOCATION
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_B)
+             *         containing header_fields['signer_info'].signer
+             *           containing certificate (CERT_TS_MSG_13_03_BO_AT)
+             *             containing validity_restrictions['region']
+             *               containing region
+             *                 containing region_type
+             *                   indicating 'circle'
+             *                 and containing circular_region
+             *                   indicating REGION
+             *                     not containing the CURRENT_IUT_LOCATION
+             *     then
              *       the IUT discards the message
-             *   }
-             * }
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_13_03_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_13_03_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_13_03_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -17769,33 +17249,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_13_03_BO /** - * @desc Check that IUT discards secured DENM when IUT location is outside the rectangular validity restriction of the signing certificate + * @desc Check that IUT discards secured DENM when IUT location is outside the rectangular validity restriction of the signing certificate *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *     when {
-             *          the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A)
-             *              containing header_fields['signer_info'].signer 
-             *                  containing certificate (CERT_TS_MSG_13_04_BO_AT)
-             *                      containing validity_restrictions['region']
-             *                          containing region
-             *                              containing region_type
-             *                                  indicating 'polygon'
-             *                              and containing polygonal_region
-             *                                  indicating REGION
-             *                                      not containing the CURRENT_IUT_LOCATION
-             *   } then {
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the validity period of CERT_TS_MSG_13_04_BO_AT
+             *     and the IUT current location is set to CURRENT_IUT_LOCATION
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_C)
+             *         containing header_fields['signer_info'].signer
+             *           containing certificate (CERT_TS_MSG_13_04_BO_AT)
+             *             containing validity_restrictions['region']
+             *               containing region
+             *                 containing region_type
+             *                   indicating 'rectangle'
+             *                 and containing rectangular_regions
+             *                   indicating REGION
+             *                     not containing the CURRENT_IUT_LOCATION
+             *     then
              *       the IUT discards the message
-             *   }
-             * }
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_13_04_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_13_04_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_13_04_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -17843,33 +17322,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_13_04_BO /** - * @desc Check that IUT discards secured DENM when IUT location is outside the polygonal validity restriction of the signing certificate + * @desc Check that IUT discards secured DENM when IUT location is outside the polygonal validity restriction of the signing certificate *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *     when {
-             *          the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A)
-             *              containing header_fields['signer_info'].signer 
-             *                  containing certificate (CERT_TS_MSG_13_05_BO_AT)
-             *                      containing validity_restrictions['region']
-             *                          containing region
-             *                              containing region_type
-             *                                  indicating 'rectangle'
-             *                              and containing rectanglar_region
-             *                                  indicating REGION
-             *                                      not containing the CURRENT_IUT_LOCATION
-             *   } then {
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the validity period of CERT_TS_MSG_13_05_BO_AT
+             *     and the IUT current location is set to CURRENT_IUT_LOCATION
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_D)
+             *         containing header_fields['signer_info'].signer
+             *           containing certificate (CERT_TS_MSG_13_05_BO_AT)
+             *             containing validity_restrictions['region']
+             *               containing region
+             *                 containing region_type
+             *                   indicating 'polygon'
+             *                 and containing polygonal_region
+             *                   indicating REGION
+             *                     not containing the CURRENT_IUT_LOCATION
+             *     then
              *       the IUT discards the message
-             *   }
-             * }
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_13_05_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_13_05_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_13_05_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -17917,33 +17395,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_DENM_13_05_BO /** - * @desc Check that IUT discards secured DENM when IUT location is outside the identified validity restriction of the signing certificate + * @desc Check that IUT discards secured DENM when IUT location is outside the identified validity restriction of the signing certificate *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *     when {
-             *          the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A)
-             *              containing header_fields['signer_info'].signer 
-             *                  containing certificate (CERT_TS_MSG_13_06_BO_AT)
-             *                      containing validity_restrictions['region']
-             *                          containing region
-             *                              containing region_type
-             *                                  indicating 'id'
-             *                              and containing id_region
-             *                                  indicating REGION
-             *                                      not containing the CURRENT_IUT_LOCATION
-             *   } then {
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the validity period of CERT_TS_MSG_13_06_BO_AT
+             *     and the IUT current location is set to CURRENT_IUT_LOCATION
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_E)
+             *         containing header_fields['signer_info'].signer
+             *           containing certificate (CERT_TS_MSG_13_06_BO_AT)
+             *             containing validity_restrictions['region']
+             *               containing region
+             *                 containing region_type
+             *                   indicating 'id'
+             *                 and containing id_region
+             *                   indicating REGION
+             *                     not containing the CURRENT_IUT_LOCATION
+             *     then
              *       the IUT discards the message
-             *   }
-             * }
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_DENM_13_06_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_DENM_13_06_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_DENM_13_06_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -18108,65 +17585,63 @@ module ItsSecurity_TestCases { } // End of goup commonFunctions /** - * @desc Check that IUT accepts a well-formed Secured GN Beacon signed with the certificate without region validity restriction - * @remark The message defined in this test purpose is used in the subsequent test purposes with the snippet name ‘MSG_SEC_RCV_GENMSG_C’. Only differences to this snippet are mentioned in subsequent test purposes - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
-             * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is receiving a SecuredMessage
-             *          containing header_fields[0]
-             *              containing type 
-             *                  indicating 'signer_info'
-             *              and containing signer
-             *                  containing type
-             *                      indicating 'certificate'
-             *                  and containing certificate (CERT_AT_A)
-             *                      containing subject_info.subject_type
-             *                          indicating 'authorization_ticket' (2)
-             *                      and containing subject_attributes['verification key'] (KEY)
-             *                      and containing validity_restrictions['time_start_and_end']
-             *                          indicating CERT_TS_AT_TIME_VALIDITY
-             *             and not containing validity_restrictions['region']
-             *       and containing header_fields [1]
-             *         containing type 
-             *           indicating 'generation_time'
-             *              containing generation_time
-             *                  indicating CURRENT_TIME
-             *                      inside CERT_TS_AT_TIME_VALIDITY
-             *       and containing header_fields [2]
-             *           containing type 
-             *               indicating 'generation_location'
-             *                   containing generation_location
+             * @desc  Check that IUT accepts a well-formed Secured GN Beacon signed with the certificate without region validity restriction
+             * 
+             * Pics Selection: PICS_GN_SECURITY
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage
+             *         containing protocol_version
+             *           indicating value '2'
+             *         and containing header_fields[0]
+             *           containing type
+             *             indicating 'signer_info'
+             *           and containing signer
+             *             containing type
+             *               indicating 'certificate'
+             *             and containing certificate (CERT_TS_A_AT)
+             *               containing subject_info.subject_type
+             *                 indicating 'authorization_ticket'
+             *               and containing subject_attributes['verification key'] (KEY)
+             *               and containing validity_restrictions['time_start_and_end']
+             *                 indicating CERT_TS_AT_TIME_VALIDITY
+             *               and not containing validity_restrictions['region']
+             *         and containing header_fields [1]
+             *           containing type
+             *             indicating 'generation_time'
+             *           and containing generation_time
+             *             indicating CURRENT_TIME
+             *               inside CERT_TS_AT_TIME_VALIDITY
+             *         and containing header_fields [2]
+             *           containing type
+             *             indicating 'generation_location'
              *           and containing generation_location
-             *       and containing header_fields[3]
-             *           containing type 
-             *               indicating 'its_aid'
+             *         and containing header_fields[3]
+             *           containing type
+             *             indicating 'its_aid'
              *           and containing its_aid
-             *              indicating 'AID_BEACON'
-             *          and containing payload_field 
-             *               containing type
-             *                  indicating 'signed'
-             *              containing data
-             *                  indicating length > 0
-             *          and containing trailer_fields 
-             *              containing single instance of type TrailerField 
-             *                  containing type
-             *                      indicating 'signature'
-             *                  containing signature
-             *                      verifiable using KEY
-             *   } then {
-             *     the IUT accepts the message
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_01_01_BV + * indicating 'AID_BEACON' + * and containing payload_field + * containing type + * indicating 'signed' + * and containing data + * indicating length > 0 + * and containing trailer_fields + * containing trailer_fields[0] + * containing type + * indicating 'signature' + * and containing signature + * verifiable using KEY + * then + * the IUT accepts the message + *
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_01_01_BV * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_01_01_BV() runs on ItsMtc system ItsSecSystem { @@ -18202,71 +17677,69 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_GENMSG_01_01_BV /** - * @desc Check that IUT accepts a well-formed Secured GN Beacon signed with the certificate with a circular region validity restriction - * @remark The message defined in this test purpose is used in the subsequent test purposes with the snippet name ‘MSG_SEC_RCV_GENMSG_C’. Only differences to this snippet are mentioned in subsequent test purposes + * @desc Check that IUT accepts a well-formed Secured GN Beacon signed with the certificate with a circular region validity restriction *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_B_AT
-             *   and the IUT current location is inside the region validity period of CERT_TS_B_AT
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is receiving a SecuredMessage
-             *         containing protocol_version 
-             *             indicating value '2'
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_B_AT
+             *     and the IUT current location is inside the region validity period of CERT_TS_B_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage
+             *         containing protocol_version
+             *           indicating value '2'
              *         and containing header_fields[0]
-             *              containing type 
-             *                  indicating 'signer_info'
-             *              and containing signer
-             *                  containing type
-             *                      indicating 'certificate'
-             *                  and containing certificate (CERT_TS_B_AT)
-             *                      containing subject_info.subject_type
-             *                          indicating 'authorization_ticket' (2)
-             *                      and containing subject_attributes['verification key'] (KEY)
-             *                      and containing validity_restrictions['time_start_and_end']
-             *                          indicating CERT_TS_AT_TIME_VALIDITY
-             *                      and containing validity_restrictions['region']
-             *                          containing region
-             *                              containing region_type
-             *                                  indicating 'circle'
-             *                              and containing circular_region
-             *                                  indicating REGION
-             *       and containing header_fields [1]
-             *         containing type 
-             *           indicating 'generation_time'
-             *              containing generation_time
-             *                  indicating CURRENT_TIME
-             *       and containing header_fields [2]
-             *           containing type 
-             *               indicating 'generation_location'
+             *           containing type
+             *             indicating 'signer_info'
+             *           and containing signer
+             *             containing type
+             *               indicating 'certificate'
+             *             and containing certificate (CERT_TS_B_AT)
+             *               containing subject_info.subject_type
+             *                 indicating 'authorization_ticket'
+             *               and containing subject_attributes['verification key'] (KEY)
+             *               and containing validity_restrictions['time_start_and_end']
+             *                 indicating CERT_TS_AT_TIME_VALIDITY
+             *               and containing validity_restrictions['region']
+             *                 containing region
+             *                   containing region_type
+             *                     indicating 'circle'
+             *                   and containing circular_region
+             *                     indicating REGION
+             *         and containing header_fields [1]
+             *           containing type
+             *             indicating 'generation_time'
+             *           and containing generation_time
+             *             indicating CURRENT_TIME
+             *         and containing header_fields [2]
+             *           containing type
+             *             indicating 'generation_location'
              *           and containing generation_location
-             *       and containing header_fields[3]
-             *           containing type 
-             *               indicating 'its_aid'
+             *             indicating position inside the REGION
+             *         and containing header_fields[3]
+             *           containing type
+             *             indicating 'its_aid'
              *           and containing its_aid
-             *               indicating 'AID_BEACON'
-             *          and containing payload_field 
-             *               containing type
-             *                  indicating 'signed'
-             *              containing data
-             *                  indicating length > 0
-             *          and containing trailer_fields 
-             *              containing single instance of type TrailerField 
-             *                  containing type
-             *                      indicating 'signature'
-             *                  containing signature
-             *                      verifiable using KEY
-             *   } then {
-             *     the IUT accepts the message
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_01_02_BV + * indicating 'AID_BEACON' + * and containing payload_field + * containing type + * indicating 'signed' + * and containing data + * indicating length > 0 + * and containing trailer_fields + * containing trailer_fields[0] + * containing type + * indicating 'signature' + * and containing signature + * verifiable using KEY + * then + * the IUT accepts the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_01_02_BV * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_01_02_BV() runs on ItsMtc system ItsSecSystem { @@ -18302,71 +17775,69 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_GENMSG_01_02_BV /** - * @desc Check that IUT accepts a well-formed Secured GN Beacon signed with the certificate with a rectangular region validity restriction - * @remark The message defined in this test purpose is used in the subsequent test purposes with the snippet name ‘MSG_SEC_RCV_GENMSG_C’. Only differences to this snippet are mentioned in subsequent test purposes + * @desc Check that IUT accepts a well-formed Secured GN Beacon signed with the certificate with a rectangular region validity restriction *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_C_AT
-             *   and the IUT current location is inside the region validity period of CERT_TS_C_AT
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is receiving a SecuredMessage
-             *         containing protocol_version 
-             *             indicating value '2'
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_C_AT
+             *     and the IUT current location is inside the region validity period of CERT_TS_C_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage
+             *         containing protocol_version
+             *           indicating value '2'
              *         and containing header_fields[0]
-             *              containing type 
-             *                  indicating 'signer_info'
-             *              and containing signer
-             *                  containing type
-             *                      indicating 'certificate'
-             *                  and containing certificate (CERT_TS_C_AT)
-             *                      containing subject_info.subject_type
-             *                          indicating 'authorization_ticket' (2)
-             *                      and containing subject_attributes['verification key'] (KEY)
-             *                      and containing validity_restrictions['time_start_and_end']
-             *                          indicating CERT_TS_AT_TIME_VALIDITY
-             *                      and containing validity_restrictions['region']
-             *                          containing region
-             *                              containing region_type
-             *                                  indicating 'rectangle'
-             *                              and containing rectangular_region
-             *                                  indicating REGION
-             *       and containing header_fields [1]
-             *         containing type 
-             *           indicating 'generation_time'
-             *              containing generation_time
-             *                  indicating CURRENT_TIME
-             *       and containing header_fields [2]
-             *           containing type 
-             *               indicating 'generation_location'
+             *           containing type
+             *             indicating 'signer_info'
+             *           and containing signer
+             *             containing type
+             *               indicating 'certificate'
+             *             and containing certificate (CERT_TS_C_AT)
+             *               containing subject_info.subject_type
+             *                 indicating 'authorization_ticket'
+             *               and containing subject_attributes['verification key'] (KEY)
+             *               and containing validity_restrictions['time_start_and_end']
+             *                 indicating CERT_TS_AT_TIME_VALIDITY
+             *               and containing validity_restrictions['region']
+             *                 containing region
+             *                   containing region_type
+             *                     indicating 'rectangle'
+             *                   and containing rectangular_regions
+             *                     indicating REGIONS
+             *         and containing header_fields [1]
+             *           containing type
+             *             indicating 'generation_time'
+             *           and containing generation_time
+             *             indicating CURRENT_TIME
+             *         and containing header_fields [2]
+             *           containing type
+             *             indicating 'generation_location'
              *           and containing generation_location
-             *       and containing header_fields[3]
-             *           containing type 
-             *               indicating 'its_aid'
+             *             indicating position inside the REGION
+             *         and containing header_fields[3]
+             *           containing type
+             *             indicating 'its_aid'
              *           and containing its_aid
-             *               indicating 'AID_BEACON'
-             *          and containing payload_field 
-             *               containing type
-             *                  indicating 'signed'
-             *              containing data
-             *                  indicating length > 0
-             *          and containing trailer_fields 
-             *              containing single instance of type TrailerField 
-             *                  containing type
-             *                      indicating 'signature'
-             *                  containing signature
-             *                      verifiable using KEY
-             *   } then {
-             *     the IUT accepts the message
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_01_03_BV + * indicating 'AID_BEACON' + * and containing payload_field + * containing type + * indicating 'signed' + * and containing data + * indicating length > 0 + * and containing trailer_fields + * containing trailer_fields[0] + * containing type + * indicating 'signature' + * containing signature + * verifiable using KEY + * then + * the IUT accepts the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_01_03_BV * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_01_03_BV() runs on ItsMtc system ItsSecSystem { @@ -18402,71 +17873,69 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_GENMSG_01_03_BV /** - * @desc Check that IUT accepts a well-formed Secured GN Beacon signed with the certificate with a rectangular region validity restriction - * @remark The message defined in this test purpose is used in the subsequent test purposes with the snippet name ‘MSG_SEC_RCV_GENMSG_C’. Only differences to this snippet are mentioned in subsequent test purposes + * @desc Check that IUT accepts a well-formed Secured GN Beacon signed with the certificate with a polygonal region validity restriction *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_D_AT
-             *   and the IUT current location is inside the region validity period of CERT_TS_D_AT
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is receiving a SecuredMessage
-             *         containing protocol_version 
-             *             indicating value '2'
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_D_AT
+             *     and the IUT current location is inside the region validity period of CERT_TS_D_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage
+             *         containing protocol_version
+             *           indicating value '2'
              *         and containing header_fields[0]
-             *              containing type 
-             *                  indicating 'signer_info'
-             *              and containing signer
-             *                  containing type
-             *                      indicating 'certificate'
-             *                  and containing certificate (CERT_TS_D_AT)
-             *                      containing subject_info.subject_type
-             *                          indicating 'authorization_ticket' (2)
-             *                      and containing subject_attributes['verification key'] (KEY)
-             *                      and containing validity_restrictions['time_start_and_end']
-             *                          indicating CERT_TS_AT_TIME_VALIDITY
-             *                      and containing validity_restrictions['region']
-             *                          containing region
-             *                              containing region_type
-             *                                  indicating 'polygon'
-             *                              and containing polygonal_region
-             *                                  indicating REGION
-             *       and containing header_fields [1]
-             *         containing type 
-             *           indicating 'generation_time'
-             *              containing generation_time
-             *                  indicating CURRENT_TIME
-             *       and containing header_fields [2]
-             *           containing type 
-             *               indicating 'generation_location'
+             *           containing type
+             *             indicating 'signer_info'
+             *           and containing signer
+             *             containing type
+             *               indicating 'certificate'
+             *             and containing certificate (CERT_TS_D_AT)
+             *               containing subject_info.subject_type
+             *                 indicating 'authorization_ticket'
+             *               and containing subject_attributes['verification key'] (KEY)
+             *               and containing validity_restrictions['time_start_and_end']
+             *                 indicating CERT_TS_AT_TIME_VALIDITY
+             *               and containing validity_restrictions['region']
+             *                 containing region
+             *                   containing region_type
+             *                     indicating 'polygon'
+             *                   and containing polygonal_region
+             *                     indicating REGION
+             *         and containing header_fields [1]
+             *           containing type
+             *             indicating 'generation_time'
+             *           and containing generation_time
+             *             indicating CURRENT_TIME
+             *         and containing header_fields [2]
+             *           containing type
+             *             indicating 'generation_location'
              *           and containing generation_location
-             *       and containing header_fields[3]
-             *           containing type 
-             *               indicating 'its_aid'
+             *             indicating position inside the REGION
+             *         and containing header_fields[3]
+             *           containing type
+             *             indicating 'its_aid'
              *           and containing its_aid
-             *               indicating 'AID_BEACON'
-             *          and containing payload_field 
-             *               containing type
-             *                  indicating 'signed'
-             *              containing data
-             *                  indicating length > 0
-             *          and containing trailer_fields 
-             *              containing single instance of type TrailerField 
-             *                  containing type
-             *                      indicating 'signature'
-             *                  containing signature
-             *                      verifiable using KEY
-             *   } then {
-             *     the IUT accepts the message
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_01_04_BV + * indicating 'AID_BEACON' + * and containing payload_field + * containing type + * indicating 'signed' + * and containing data + * indicating length > 0 + * and containing trailer_fields + * containing trailer_fields[0] + * containing type + * indicating 'signature' + * and containing signature + * verifiable using KEY + * then + * the IUT accepts the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_01_04_BV * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_01_04_BV() runs on ItsMtc system ItsSecSystem { @@ -18502,71 +17971,69 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_GENMSG_01_04_BV /** - * @desc Check that IUT accepts a well-formed Secured GN Beacon signed with the certificate with a rectangular region validity restriction - * @remark The message defined in this test purpose is used in the subsequent test purposes with the snippet name ‘MSG_SEC_RCV_GENMSG_C’. Only differences to this snippet are mentioned in subsequent test purposes + * @desc Check that IUT accepts a well-formed Secured GN Beacon signed with the certificate with an identified region validity restriction *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_E_AT
-             *   and the IUT current location is inside the region validity period of CERT_TS_E_AT
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is receiving a SecuredMessage
-             *         containing protocol_version 
-             *             indicating value '2'
-             *         and containing header_fields[0]
-             *              containing type 
-             *                  indicating 'signer_info'
-             *              and containing signer
-             *                  containing type
-             *                      indicating 'certificate'
-             *                  and containing certificate (CERT_TS_E_AT)
-             *                      containing subject_info.subject_type
-             *                          indicating 'authorization_ticket' (2)
-             *                      and containing subject_attributes['verification key'] (KEY)
-             *                      and containing validity_restrictions['time_start_and_end']
-             *                          indicating CERT_TS_AT_TIME_VALIDITY
-             *                      and containing validity_restrictions['region']
-             *                          containing region
-             *                              containing region_type
-             *                                  indicating 'id_region'
-             *                              and containing id_region
-             *                                  indicating REGION
-             *       and containing header_fields [1]
-             *         containing type 
-             *           indicating 'generation_time'
-             *              containing generation_time
-             *                  indicating CURRENT_TIME
-             *       and containing header_fields [2]
-             *           containing type 
-             *               indicating 'generation_location'
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_E_AT
+             *     and the IUT current location is inside the region validity period of CERT_TS_E_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage
+             *         containing protocol_version
+             *           indicating value '2'
+             *         and containing header_fields[0]
+             *           containing type
+             *             indicating 'signer_info'
+             *           and containing signer
+             *             containing type
+             *               indicating 'certificate'
+             *             and containing certificate (CERT_TS_E_AT)
+             *               containing subject_info.subject_type
+             *                 indicating 'authorization_ticket'
+             *               and containing subject_attributes['verification key'] (KEY)
+             *               and containing validity_restrictions['time_start_and_end']
+             *                 indicating CERT_TS_AT_TIME_VALIDITY
+             *               and containing validity_restrictions['region']
+             *                 containing region
+             *                   containing region_type
+             *                     indicating 'id_region'
+             *                   and containing identified_region
+             *                     indicating REGION
+             *         and containing header_fields [1]
+             *           containing type
+             *             indicating 'generation_time'
+             *           and containing generation_time
+             *             indicating CURRENT_TIME
+             *         and containing header_fields [2]
+             *           containing type
+             *             indicating 'generation_location'
              *           and containing generation_location
-             *       and containing header_fields[3]
-             *           containing type 
-             *               indicating 'its_aid'
+             *             indicating position inside the REGION
+             *         and containing header_fields[3]
+             *           containing type
+             *             indicating 'its_aid'
              *           and containing its_aid
-             *               indicating 'AID_BEACON'
-             *          and containing payload_field 
-             *               containing type
-             *                  indicating 'signed'
-             *              containing data
-             *                  indicating length > 0
-             *          and containing trailer_fields 
-             *              containing single instance of type TrailerField 
-             *                  containing type
-             *                      indicating 'signature'
-             *                  containing signature
-             *                      verifiable using KEY
-             *   } then {
-             *     the IUT accepts the message
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_01_05_BV + * indicating 'AID_BEACON' + * and containing payload_field + * containing type + * indicating 'signed' + * and containing data + * indicating length > 0 + * and containing trailer_fields + * containing trailer_fields[0] + * containing type + * indicating 'signature' + * and containing signature + * verifiable using KEY + * then + * the IUT accepts the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_01_05_BV * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_01_05_BV() runs on ItsMtc system ItsSecSystem { @@ -18634,26 +18101,24 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_01_0x_BV /** - * @desc Check that IUT discards a Secured GN Message containing protocol version set to a value less than 2 + * @desc Check that IUT discards a Secured GN Message containing protocol version set to a value less than 2 *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is receiving a SecuredMessage
-             *         containing protocol_version 
-             *             indicating 1
-             *   } then {
-             *     the IUT discards the message
-             *   }
-             * }
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
+             *         containing protocol_version
+             *           indicating 1
+             *     then
+             *       the IUT discards a SecuredMessage
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_02_01_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_02_01_BO * @reference ETSI TS 103 097 [1], clause 5.1 */ testcase TC_SEC_ITSS_RCV_GENMSG_02_01_BO() runs on ItsMtc system ItsSecSystem { @@ -18689,26 +18154,24 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_GENMSG_02_01_BO /** - * @desc Check that IUT discards a Secured GN Message containing protocol version set to a value greater than 2 + * @desc Check that IUT discards a Secured GN Message containing protocol version set to a value greater than 2 *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is receiving a SecuredMessage
-             *         containing protocol_version 
-             *             indicating 3
-             *   } then {
-             *     the IUT discards the message
-             *   }
-             * }
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
+             *         containing protocol_version
+             *           indicating 3
+             *     then
+             *       the IUT discards a SecuredMessage
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_02_02_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_02_02_BO * @reference ETSI TS 103 097 [1], clause 5.1 */ testcase TC_SEC_ITSS_RCV_GENMSG_02_02_BO() runs on ItsMtc system ItsSecSystem { @@ -18776,37 +18239,33 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_02_0x_BV /** - * @desc Check that IUT discards a secured GN Message if the header_fields contains more than one header field of type 'signer_info' - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
-             * Config Id: CF01
-             * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[2].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[3].type
-             *              indicating ''generation_location''
-             *          and containing header_fields[4].type
-             *              containing its_aid
-             *                  indicating 'AID_BEACON'
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_04_01_BO + * @desc Check that IUT discards a secured GN Message if the header_fields contains more than one header field of type 'signer_info' + *
+             * Pics Selection: PICS_GN_SECURITY
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
+             *         containing header_fields[0].type
+             *           indicating 'signer_info'
+             *         and containing header_fields[1].type
+             *           indicating 'signer_info'
+             *         and containing header_fields[2].type
+             *           indicating 'generation_time'
+             *         and containing header_fields[3].type
+             *           indicating 'generation_location'
+             *         and containing header_fields[4].type
+             *           indicating 'its_aid'
+             *         and not containing other header fields
+             *     then
+             *       the IUT discards a SecuredMessage
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_04_01_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_04_01_BO() runs on ItsMtc system ItsSecSystem { @@ -18897,35 +18356,29 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_04_01_BO /** - * @desc Check that IUT discards a secured GN Message if the header_fields does not contain the header field of type 'signer_info' - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
-             * Config Id: CF01
-             * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A) 
-             *          and containing header_fields[0].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_location'
-             *          and containing header_fields[2].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[3].type
-             *              containing its_aid
-             *                  indicating 'AID_BEACON'
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_04_02_BO + * @desc Check that IUT discards a secured GN Message if the header_fields does not contain the header field of type 'signer_info' + *
+             * Pics Selection: PICS_GN_SECURITY
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
+             *         containing header_fields[0].type
+             *           indicating 'generation_time'
+             *         and containing header_fields[1].type
+             *           indicating 'generation_location'
+             *         and containing header_fields[2].type
+             *           indicating 'its_aid
+             *         and not containing other header fields
+             *     then
+             *       the IUT discards a SecuredMessage
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_04_02_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_04_02_BO() runs on ItsMtc system ItsSecSystem { @@ -19008,35 +18461,31 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_04_02_BO /** - * @desc Check that IUT is able to receive a secured GN Message if the signer_info header field is not encoded first. - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
-             * Config Id: CF01
-             * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A) 
-             *          and containing header_fields[0].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_location'
-             *          and containing header_fields[2].type
-             *              containing its_aid
-             *                  indicating 'AID_BEACON'
-             *          and containing header_fields[3].type
-             *              indicating 'signer_info'
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_04_03_BO + * @desc Check that IUT is able to receive a secured GN Message if the signer_info header field is not encoded first. + *
+             * Pics Selection: PICS_GN_SECURITY
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
+             *         containing header_fields[0].type
+             *           indicating 'generation_time'
+             *         and containing header_fields[1].type
+             *           indicating 'generation_location'
+             *         and containing header_fields[2].type
+             *           indicating 'its_aid'
+             *         and containing header_fields[3].type
+             *           indicating 'signer_info'
+             *         and not containing other header fields
+             *     then
+             *       the IUT discards the SecuredMessage
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_04_03_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_04_03_BO() runs on ItsMtc system ItsSecSystem { @@ -19123,37 +18572,33 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_04_03_BO /** - * @desc Check that IUT discards a secured GN Message if the message contains more than one header field of type 'generation_time' - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
-             * Config Id: CF01
-             * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[2].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[3].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[4].type
-             *              containing its_aid
-             *                  indicating 'AID_BEACON'
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_04_04_BO + * @desc Check that IUT discards a secured GN Message if the message contains more than one header field of type 'generation_time' + *
+             * Pics Selection: PICS_GN_SECURITY
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
+             *         containing header_fields[0].type
+             *           indicating 'signer_info'
+             *         containing header_fields[1].type
+             *           indicating 'generation_time'
+             *         and containing header_fields[2].type
+             *           indicating 'generation_time'
+             *         and containing header_fields[3].type
+             *           indicating 'generation_location'
+             *         and containing header_fields[4].type
+             *           indicating 'its_aid'
+             *         and not containing other header fields
+             *     then
+             *       the IUT discards a SecuredMessage
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_04_04_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_04_04_BO() runs on ItsMtc system ItsSecSystem { @@ -19241,33 +18686,29 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_04_04_BO /** - * @desc Check that IUT discards a secured GN Message if the message does not contain the header field of type 'generation_time' - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
-             * Config Id: CF01
-             * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[2].type
-             *              containing its_aid
-             *                  indicating 'AID_BEACON'
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_04_05_BO + * @desc Check that IUT discards a secured GN Message if the message does not contain the header field of type 'generation_time' + *
+             * Pics Selection: PICS_GN_SECURITY
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
+             *         containing header_fields[0].type
+             *           indicating 'signer_info'
+             *         and containing header_fields[1].type
+             *           indicating 'generation_location'
+             *         and containing header_fields[2].type
+             *           indicating 'its_aid'
+             *         and not containing other header fields
+             *     then
+             *       the IUT discards a SecuredMessage
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_04_05_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_04_05_BO() runs on ItsMtc system ItsSecSystem { @@ -19353,40 +18794,39 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_04_05_BO /** - * @desc Check that IUT discards a Secured GN Message if the message contains more than one header field of type 'its_aid' - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
-             * Config Id: CF01
-             * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[2].type
-             *              indicating 'generation_location'
-             *          and containing header_fields[3]
-             *              containing type
-             *                  indicating 'its_aid'
-             *              containing its_aid
-             *                  indicating 'AID_BEACON'
-             *          and containing header_fields[4].type
-             *              containing its_aid
-             *                  indicating 'AID_BEACON'
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_04_06_BO + * @desc Check that IUT discards a Secured GN Message if the message contains more than one header field of type 'its_aid' + *
+             * Pics Selection: PICS_GN_SECURITY
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
+             *         containing header_fields[0].type
+             *           indicating 'signer_info'
+             *         and containing header_fields[1].type
+             *           indicating 'generation_time'
+             *         and containing header_fields[2].type
+             *           indicating 'generation_location'
+             *         and containing header_fields[3]
+             *           containing type
+             *             indicating 'its_aid'
+             *           containing its_aid
+             *             indicating 'AID_BEACON'
+             *         and containing header_fields[4]
+             *           containing type
+             *             indicating 'its_aid'
+             *           containing its_aid
+             *             indicating 'AID_BEACON'
+             *         and not containing other header fields
+             *     then
+             *       the IUT discards a SecuredMessage
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_04_06_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_04_06_BO() runs on ItsMtc system ItsSecSystem { @@ -19474,32 +18914,29 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_04_06_BO /** - * @desc Check that IUT discards a secured GN Message if the message does not contain the header field of type 'its_aid' - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
-             * Config Id: CF01
-             * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[2].type
-             *              indicating 'generation_location'
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_04_06a_BO + * @desc Check that IUT discards a secured GN Message if the message does not contain the header field of type 'its_aid' + *
+             * Pics Selection: PICS_GN_SECURITY
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
+             *         containing header_fields[0].type
+             *           indicating 'signer_info'
+             *         and containing header_fields[1].type
+             *           indicating 'generation_time'
+             *         and containing header_fields[2].type
+             *           indicating 'generation_location'
+             *         and not containing other header fields
+             *     then
+             *       the IUT discards a SecuredMessage
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_04_06a_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_04_06a_BO() runs on ItsMtc system ItsSecSystem { @@ -19585,39 +19022,33 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_04_06a_BO /** - * @desc Check that IUT discards a secured GN Message if the message contains more than one header field of type 'generation_location' - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
-             * Config Id: CF01
-             * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[2].type
-             *              indicating 'generation_location'
-             *          and containing header_fields[3].type
-             *              indicating 'generation_location'
-             *          and containing header_fields[4]
-             *              containing type
-             *                  indicating 'its_aid'
-             *              containing its_aid
-             *                  indicating 'AID_BEACON'
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_04_07_BO + * @desc Check that IUT discards a secured GN Message if the message contains more than one header field of type 'generation_location' + *
+             * Pics Selection: PICS_GN_SECURITY
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
+             *         containing header_fields[0].type
+             *           indicating 'signer_info'
+             *         and containing header_fields[1].type
+             *           indicating 'generation_time'
+             *         and containing header_fields[2].type
+             *           indicating 'generation_location'
+             *         and containing header_fields[3].type
+             *           indicating 'generation_location'
+             *         and containing header_fields['its_aid']
+             *           indicating 'AID_BEACON'
+             *         and not containing other header fields
+             *     then
+             *       the IUT discards a SecuredMessage
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_04_07_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_04_07_BO() runs on ItsMtc system ItsSecSystem { @@ -19711,35 +19142,29 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_04_07_BO /** - * @desc Check that IUT discards a secured GN Message if the message contains more than one header field of type 'generation_location' - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
-             * Config Id: CF01
-             * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[2].type
-             *          and containing header_fields[4].type
-             *              indicating 'its_aid'
-             *                  containing its_aid
-             *                      indicating 'AID_BEACON'
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_04_08_BO + * @desc Check that IUT discards a secured GN Message if the header_fields contains no element of header field of type 'generation_location' + *
+             * Pics Selection: PICS_GN_SECURITY
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
+             *         containing header_fields[0].type
+             *           indicating 'signer_info'
+             *         and containing header_fields[1].type
+             *           indicating 'generation_time'
+             *         and containing header_fields['its_aid']
+             *           indicating 'AID_BEACON'
+             *         and not containing other header fields
+             *     then
+             *       the IUT discards a SecuredMessage
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_04_08_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_04_08_BO() runs on ItsMtc system ItsSecSystem { @@ -19819,33 +19244,30 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_04_08_BO /** - * @desc Check that IUT is able to receive a Secured GN Beacon if the header fields are not in the ascending order according to the numbering of the enumeration - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
-             * Config Id: CF01
-             * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'its_aid'
-             *          and containing header_fields[2].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[3].type
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_04_09_BO + * @desc Check that IUT is able to receive a Secured GN Beacon if the header fields are not in the ascending order according to the numbering of the enumeration. + *
+             * Pics Selection: PICS_GN_SECURITY
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
+             *         containing header_fields[0].type
+             *           indicating 'signer_info'
+             *         and containing header_fields[1].type
+             *           indicating 'its_aid'
+             *         and containing header_fields[2].type
+             *           indicating 'generation_time'
+             *         and containing header_fields[3].type
+             *           indicating 'generation_location'
+             *     then
+             *       the IUT discards the SecuredMessage
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_04_09_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_04_09_BO() runs on ItsMtc system ItsSecSystem { @@ -19931,36 +19353,7 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_04_09_BO - /** - * @desc Check that IUT accepts a GN Secured Message containing optional header field of type 'expiry_time' - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
-             * Config Id: CF01
-             * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'its_aid'
-             *          and containing header_fields[2].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[3].type
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_04_11_BO - * @reference ETSI TS 103 097 [1], clause 7.3 - */ + testcase TC_SEC_ITSS_RCV_GENMSG_04_11_BO() runs on ItsMtc system ItsSecSystem { // Local variables @@ -20047,41 +19440,7 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_04_11_BO - /** - * @desc Check that IUT accepts the Secured GN Message containing additional non-standard HeaderField - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
-             * Config Id: CF01
-             * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[2].type
-             *          and containing header_fields[3].type
-             *              indicating 'its_aid'
-             *          and containing header_fields[4]
-             *              containing type
-             *                  indicating non-standard header field type (1000)
-             *              and containing other_header
-             *                  indicating non-empty data
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_04_12_BO - * @reference ETSI TS 103 097 [1], clause 7.3 - */ + testcase TC_SEC_ITSS_RCV_GENMSG_04_12_BO() runs on ItsMtc system ItsSecSystem { // Local variables @@ -20169,53 +19528,7 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_04_12_BO - /** - * @desc Check that IUT accepts the Secured GN Message containing additional non-standard HeaderField - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
-             * Config Id: CF01
-             * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *          and containing header_fields[1].type
-             *              indicating 'generation_time'
-             *          and containing header_fields[2].type
-             *          and containing header_fields[3].type
-             *              indicating 'its_aid'
-             *          and containing header_fields[4]
-             *              containing type
-             *                  indicating 'encryption_parameters'
-             *              and containing enc_params
-             *                  containing symm_algorithm
-             *                      indicating 'aes_128_ccm'
-             *                  and containing nonce
-             *              and containing header_fields[4]
-             *                  containing type
-             *                      indicating 'recipient_info'
-             *                  and containing recipients
-             *                      containing recipients[0]
-             *                          containing cert_id
-             *                              referencing to CERT_IUT_A_AT
-             *                          and containing pk_encryption
-             *                              indicating 'ecies_nistp256'
-             *                          and containing enc_key
-             *          and not containing other header fields
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_04_13_BO - * @reference ETSI TS 103 097 [1], clause 7.3 - */ + testcase TC_SEC_ITSS_RCV_GENMSG_04_13_BO() runs on ItsMtc system ItsSecSystem { // Local variables @@ -20331,28 +19644,25 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_04_13_BO /** - * @desc Check that IUT discards a secured GN Beacon if the header_fields contains a signer of type 'self' + * @desc Check that IUT discards a secured GN Beacon if the header_fields contains a signer of type 'self' *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A) 
-             *          containing header_fields['signer_info']
-             *              containing signer.type
-             *                  indicating 'self''
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
+             *         containing header_fields['signer_info']
+             *           containing signer.type
+             *             indicating 'self'
+             *     then
+             *       the IUT discards a SecuredMessage
              * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_05_01_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_05_01_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_05_01_BO() runs on ItsMtc system ItsSecSystem { @@ -20438,28 +19748,25 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_05_01_BO /** - * @desc Check that IUT discards a secured GN Beacon if the header_fields contains a signer of type 'certificate_digest_with_other_algorithm' + * @desc Check that IUT discards a secured GN Beacon if the header_fields contains a signer of type 'certificate_digest_with_other_algorithm' *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A) 
-             *          containing header_fields['signer_info']
-             *              containing signer.type
-             *                  indicating 'certificate_digest_with_other_algorithm'
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
+             *         containing header_fields['signer_info']
+             *           containing signer.type
+             *             indicating 'certificate_digest_with_other_algorithm'
+             *     then
+             *       the IUT discards a SecuredMessage
              * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_05_02_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_05_02_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_05_02_BO() runs on ItsMtc system ItsSecSystem { @@ -20547,28 +19854,25 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_05_02_BO /** - * @desc Check that IUT discards a secured GN Beacon if the header_fields contains a signer of type 'certificate_chain' + * @desc Check that IUT discards a secured GN Beacon if the header_fields contains a signer of type 'certificate_chain' *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A) 
-             *          containing header_fields['signer_info']
-             *              containing signer.type
-             *                  indicating 'certificate_chain'
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
+             *         containing header_fields['signer_info']
+             *           containing signer.type
+             *             indicating 'certificate_chain'
+             *     then
+             *       the IUT discards a SecuredMessage
              * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_05_03_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_05_03_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_05_03_BO() runs on ItsMtc system ItsSecSystem { @@ -20655,29 +19959,25 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_05_03_BO /** - * @desc Check that IUT discards a Secured Messageif the header_fields contains a signer info of unknown or reserved type - * @remark Values to be used as X_UNKNOWN_SIGNERINFO_TYPE are 5, 239, 240 and 255 + * @desc Check that IUT discards a Secured Messageif the header_fields contains a signer info of unknown or reserved type *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A) 
-             *          containing header_fields['signer_info']
-             *              containing signer.type
-             *                  indicating X_UNKNOWN_SIGNERINFO_TYPE
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
+             *         containing header_fields['signer_info']
+             *           containing signer.type
+             *             indicating X_UNKNOWN_SIGNERINFO_TYPE
+             *     then
+             *       the IUT discards a SecuredMessage
              * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_05_04_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_05_04_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_05_04_BO() runs on ItsMtc system ItsSecSystem { @@ -20764,36 +20064,32 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_05_04_BO /** - * @desc Check that IUT discards a secured GN Message containing generation_time before the message signing certificate validity period - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
-             * Config Id: CF01
-             * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
-             *          containing header_fields['signer_info'].type
-             *              indicating 'signer_info'
-             *                  containing certificate (CERT_TS_MSG_06_01_BO_AT)
-             *                      containing validity_restrictions['time_start_and_end']
-             *                          containing start_validity
-             *                              indicating START_VALIDITY_AT
-             *                          and containing end_validity
-             *                              indicating END_VALIDITY_AT
-             *                  and containing header_fields ['generation_time']
-             *                      containing generation_time
-             *                          indicating GEN_TIME < TIME_CERT_TS_AT_START
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_06_01_BO + * @desc Check that IUT discards a secured GN Message containing generation_time before the message signing certificate validity period + *
+             * Pics Selection: PICS_GN_SECURITY
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
+             *         containing header_fields['signer_info']
+             *             containing certificate (CERT_TS_MSG_06_01_BO_AT)
+             *               containing validity_restrictions['time_start_and_end']
+             *                 containing start_validity
+             *                   indicating START_VALIDITY_AT
+             *                 and containing end_validity
+             *                   indicating END_VALIDITY_AT
+             *         and containing header_fields ['generation_time']
+             *           containing generation_time
+             *             indicating GEN_TIME < START_VALIDITY_AT
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_06_01_BO * @reference ETSI TS 103 097 [1], clauses 5.4 and 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_06_01_BO() runs on ItsMtc system ItsSecSystem { @@ -20884,36 +20180,32 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_06_01_BO /** - * @desc Check that IUT discards the secured GN Message containing generation_time after the message signing certificate validity period - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
-             * Config Id: CF01
-             * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A) 
-             *          containing header_fields['signer_info'].type
-             *              indicating 'signer_info'
-             *                  containing certificate (CERT_TS_MSG_06_02_BO_AT)
-             *                      containing validity_restrictions['time_start_and_end']
-             *                          containing start_validity
-             *                              indicating START_VALIDITY_AT
-             *                          and containing end_validity
-             *                              indicating END_VALIDITY_AT
-             *                  and containing header_fields ['generation_time']
-             *                      containing generation_time
-             *                          indicating GEN_TIME > TIME_CERT_TS_E_ATND
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_06_02_BO + * @desc Check that IUT discards the secured GN Message containing generation_time after the message signing certificate validity period + *
+             * Pics Selection: PICS_GN_SECURITY
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
+             *         containing header_fields['signer_info']
+             *             containing certificate (CERT_TS_MSG_06_02_BO_AT)
+             *               containing validity_restrictions['time_start_and_end']
+             *                 containing start_validity
+             *                   indicating START_VALIDITY_AT
+             *                 and containing end_validity
+             *                   indicating END_VALIDITY_AT
+             *         and containing header_fields ['generation_time']
+             *           containing generation_time
+             *             indicating GEN_TIME > END_VALIDITY_AT
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_06_02_BO * @reference ETSI TS 103 097 [1], clauses 5.4 & 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_06_02_BO() runs on ItsMtc system ItsSecSystem { @@ -21004,30 +20296,27 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_06_02_BO /** - * @desc Check that IUT discards Secured GN Message if the generation_time is more than 10 minute in the past (C2C only) + * @desc Check that IUT discards Secured GN Message if the generation_time is more than 10 minute in the past (C2C only) *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY AND PICS_C2C
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A) 
-             *          containing header_fields ['generation_time']
-             *              containing generation_time
-             *                  indicating TIME_1 (TIME_1 < CUR_TIME - 10min)
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_06_03_BO - * @reference ETSI TS 103 097 [1], clause 7.3 - */ + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A) + * containing header_fields ['generation_time'] + * containing generation_time + * indicating TIME_1 (TIME_1 < CUR_TIME - 10min) + * then + * the IUT discards a SecuredMessage + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_06_03_BO + * @reference ETSI TS 103 097 [1], clause 7.3 + */ testcase TC_SEC_ITSS_RCV_GENMSG_06_03_BO() runs on ItsMtc system ItsSecSystem { // Local variables @@ -21101,28 +20390,25 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_06_03_BO /** - * @desc Check that IUT discards Secured GN Message if the generation_time is more than 10 minute in the future(C2C only) + * @desc Check that IUT discards Secured GN Message if the generation_time is more than 10 minute in the future(C2C only) *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY AND PICS_C2C
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A) 
-             *          containing header_fields ['generation_time']
-             *              containing generation_time
-             *                  indicating TIME_1 (TIME_1 > CUR_TIME + 10min)
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
+             *         containing header_fields ['generation_time']
+             *           containing generation_time
+             *             indicating TIME_1 (TIME_1 > CUR_TIME + 10min)
+             *     then
+             *       the IUT discards a SecuredMessage
              * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_06_04_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_06_04_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_06_04_BO() runs on ItsMtc system ItsSecSystem { @@ -21198,27 +20484,24 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_06_04_BO /** - * @desc Check that IUT discards SecuredMessage when its_aid value is undefined + * @desc Check that IUT discards SecuredMessage when its_aid value is undefined *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
-             *          containing header_fields['its_aid']
-             *              indicating indicating 'AID_UNDEFINED'
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
+             *         containing header_fields['its_aid']
+             *           indicating 'AID_UNDEFINED'
+             *     then
+             *       the IUT discards the message
              * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_07_01_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_07_01_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_07_01_BO() runs on ItsMtc system ItsSecSystem { @@ -21292,37 +20575,33 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_07_01_BO /** - * @desc Check that IUT discards Secured GN Message if the HeaderField generation_location is outside of the circular validity region of the signing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRCand PICS_USE_CIRCULAR_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_B_AT
-             *    and the IUT current location is inside the validity region of CERT_TS_B_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage ((MSG_SEC_RCV_GENMSG_B)) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *                  containing certificate (CERT_TS_B_AT)
-             *                      containing validity_restrictions ['region']
-             *                          containing region
-             *                              containing region_type
-             *                                  indicating 'circle'
-             *                              and containing circular_region
-             *                                  indicating REGION
-             *          and containing header_fields ['generation_location']
-             *              indicating location outside of the REGION
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_08_01_BO + * @desc Check that IUT discards Secured GN Message if the HeaderField generation_location is outside of the circular validity region of the signing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_CIRCULAR_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_B_AT
+             *     and the IUT current location is inside the validiti region of CERT_TS_B_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_B)
+             *         containing header_fields ['signer_info']
+             *           containing certificate (CERT_TS_B_AT)
+             *             containing validity_restrictions ['region']
+             *               containing region
+             *                 containing region_type
+             *                   indicating 'circle'
+             *                 and containing circular_region
+             *                   indicating REGION
+             *         and containing header_fields ['generation_location']
+             *           indicating location outside of the REGION
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_08_01_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_08_01_BO() runs on ItsMtc system ItsSecSystem { @@ -21358,37 +20637,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_GENMSG_08_01_BO /** - * @desc Check that IUT discards Secured GN Message if the HeaderField generation_location is outside of the rectangular validity region of the signing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC and PICS_USE_RECTANGULAR_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_C_AT
-             *    and the IUT current location is inside the validity region of CERT_TS_C_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage ((MSG_SEC_RCV_GENMSG_C)) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *                  containing certificate (CERT_TS_C_AT)
-             *                      containing validity_restrictions ['region']
-             *                          containing region
-             *                              containing region_type
-             *                                  indicating 'rectangle'
-             *                              and containing rectanglar_region
-             *                                  indicating REGION
-             *          and containing header_fields ['generation_location']
-             *              indicating location outside of the REGION
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_08_02_BO + * @desc Check that IUT discards Secured GN Message if the HeaderField generation_location is outside of the rectangular validity region of the signing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_RECTANGULAR_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_C_AT
+             *     and the IUT current location is inside the validiti region of CERT_TS_C_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_C)
+             *         containing header_fields ['signer_info']
+             *           containing certificate (CERT_TS_C_AT)
+             *             containing validity_restrictions ['region']
+             *               containing region
+             *                 containing region_type
+             *                   indicating 'rectangle'
+             *                 and containing rectangular_regions
+             *                   indicating REGION
+             *         and containing header_fields ['generation_location']
+             *           indicating locatoin outside of the REGION
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_08_02_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_08_02_BO() runs on ItsMtc system ItsSecSystem { @@ -21424,37 +20699,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_GENMSG_08_02_BO /** - * @desc Check that IUT discards Secured GN Message if the HeaderField generation_location is outside of the rectangular validity region of the signing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC and PICS_USE_POLYGONAL_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_D_AT
-             *    and the IUT current location is inside the validity region of CERT_TS_D_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage ((MSG_SEC_RCV_GENMSG_D)) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *                  containing certificate (CERT_TS_D_AT)
-             *                      containing validity_restrictions ['region']
-             *                          containing region
-             *                              containing region_type
-             *                                  indicating 'polygon'
-             *                              and containing polygonal_region
-             *                                  indicating REGION
-             *          and containing header_fields ['generation_location']
-             *              indicating location outside of the REGION
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_08_03_BO + * @desc Check that IUT discards Secured GN Message if the optional HeaderField generation_location is outside of the polygonal validity region of the signing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_POLYGONAL_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_D_AT
+             *     and the IUT current location is inside the validiti region of CERT_TS_D_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_D)
+             *         containing header_fields ['signer_info']
+             *           containing certificate (CERT_TS_D_AT)
+             *             containing validity_restrictions ['region']
+             *               containing region
+             *                 containing region_type
+             *                   indicating 'polygon'
+             *                 and containing polygonal_region
+             *                   indicating REGION
+             *         and containing header_fields ['generation_location']
+             *           indicating location outside of the REGION
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_08_03_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_08_03_BO() runs on ItsMtc system ItsSecSystem { @@ -21490,37 +20761,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_GENMSG_08_03_BO /** - * @desc Check that IUT discards Secured GN Message if the optional HeaderField generation_location is outside of the identified validity region of the signing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC and PICS_USE_IDENTIFIED_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_E_AT
-             *    and the IUT current location is inside the validity region of CERT_TS_E_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage ((MSG_SEC_RCV_GENMSG_E)) 
-             *          containing header_fields[0].type
-             *              indicating 'signer_info'
-             *                  containing certificate (CERT_TS_E_AT)
-             *                      containing validity_restrictions ['region']
-             *                          containing region
-             *                              containing region_type
-             *                                  indicating 'id_region'
-             *                              and containing identified_region
-             *                                  indicating REGION
-             *          and containing header_fields ['generation_location']
-             *              indicating location outside of the REGION
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_08_04_BO + * @desc Check that IUT discards Secured GN Message if the optional HeaderField generation_location is outside of the identified validity region of the signing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_IDENTIFIED_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_E_AT
+             *     and the IUT current location is inside the validiti region of CERT_TS_E_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_E)
+             *         containing header_fields ['signer_info']
+             *           containing certificate (CERT_TS_E_AT)
+             *             containing validity_restrictions ['region']
+             *               containing region
+             *                 containing region_type
+             *                   indicating 'id_region'
+             *                 and containing identified_region
+             *                   indicating REGION
+             *         and containing header_fields ['generation_location']
+             *           indicating location outside of the REGION
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_08_04_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_08_04_BO() runs on ItsMtc system ItsSecSystem { @@ -21556,28 +20823,27 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_GENMSG_08_04_BO /** - * @desc Check that IUT accepts a Secured DENM if the distance between the current position of IUT and the value of optional HeaderField generation_location is 29.9 km (C2C only) + * @desc Check that IUT accepts Secured GN Message if the distance between the current position of IUT and the value of optional HeaderField generation_location is 29.9 km *
-             * Pics Selection: PICS_GN_SECURITY
+             * Pics Selection: PICS_GN_SECURITY AND PICS_C2C
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
-             *          containing header_fields[generation_location].type 
-             *              indicating 'generation_location'
-             *          and containing generation_location
-             *              indicating position in 29.9 km from the current position of IUT
-             *   } then {
-             *     the IUT accepts the message
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_08_05_BV + * Initial conditions: + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage + * containing header_fields ['generation_location'] + * containing generation_location + * indicating position in 29.9 km from the current position of IUT + * and containing header_fields['its_aid'] + * indicating 'AID_BEACON' + * then + * the IUT accepts the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_08_05_BV * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_GENMSG_08_05_BV() runs on ItsMtc system ItsSecSystem { @@ -21613,28 +20879,27 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_GENMSG_08_05_BV /** - * @desc Check that IUT discards Secured DENM if the distance between the current position of IUT and the value of optional HeaderField generation_location is more than 30 km + * @desc Check that IUT discards Secured GN Message if the distance between the current position of IUT and the value of optional HeaderField generation_location is more than 30 km *
-             * Pics Selection: PICS_GN_SECURITY
+             * Pics Selection: PICS_GN_SECURITY AND PICS_C2C
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
-             *          containing header_fields[generation_location].type 
-             *              indicating 'generation_location'
-             *          and containing generation_location
-             *              indicating position in 31 km from the current position of IUT
-             *   } then {
-             *     the IUT discards the message
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_08_06_BO + * Initial conditions: + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage + * containing header_fields ['generation_location'] + * containing generation_location + * indicating position in 31 km from the current position of IUT + * and containing header_fields['its_aid'] + * indicating 'AID_BEACON' + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_08_06_BO * @reference ETSI TS 103 097 [1], clause 7.2 */ testcase TC_SEC_ITSS_RCV_GENMSG_08_06_BO() runs on ItsMtc system ItsSecSystem { @@ -21827,30 +21092,27 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_08_xx_BO /** - * @desc Check that IUT discards the Secured GN Message containing empty payload of type 'signed' + * @desc Check that IUT discards the Secured GN Message containing empty payload of type 'signed' *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A) 
-             *          containing payload_field
-             *              containing type
-             *                  indicating 'signed'
-             *              and containing data
-             *                  indicating length 0
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
+             *         containing payload_field
+             *           containing type
+             *             indicating 'signed'
+             *           and containing data
+             *             indicating length 0
+             *     then
+             *       the IUT discards the message
              * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_09_02_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_09_02_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_09_02_BO() runs on ItsMtc system ItsSecSystem { @@ -21947,30 +21209,27 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_09_02_BO /** - * @desc Check that IUT discards the Secured GN Message containing payload element of type 'unsecured' + * @desc Check that IUT discards the Secured GN Message containing payload element of type 'unsecured' *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A) 
-             *          containing payload_field
-             *              containing type
-             *                  indicating 'unsecured'
-             *              and containing data
-             *                  indicating length > 0
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
+             *         containing payload_field
+             *           containing type
+             *             indicating 'unsecured'
+             *           and containing data
+             *             indicating length > 0
+             *     then
+             *       the IUT discards the message
              * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_09_03_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_09_03_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_09_03_BO() runs on ItsMtc system ItsSecSystem { @@ -22067,30 +21326,27 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_09_03_BO /** - * @desc Check that IUT discards the Secured GN Message containing payload element of type 'encrypted' + * @desc Check that IUT discards the Secured GN Message containing payload element of type 'encrypted' *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A) 
-             *          containing payload_field
-             *              containing type
-             *                  indicating 'encrypted'
-             *              and containing data
-             *                  indicating length > 0
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
+             *         containing payload_field
+             *           containing type
+             *             indicating 'encrypted'
+             *           and containing data
+             *             indicating length > 0
+             *     then
+             *       the IUT discards the message
              * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_09_04_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_09_04_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_09_04_BO() runs on ItsMtc system ItsSecSystem { @@ -22186,33 +21442,7 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_09_04_BO - /** - * @desc Check that IUT accepts a well-formed Secured GN Message containing payload of type signed_external - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
-             * Config Id: CF01
-             * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A) 
-             *          containing payload_field
-             *              containing type
-             *                  indicating 'signed_external'
-             *              and containing data
-             *                  indicating length > 0
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_09_05_BO - * @reference ETSI TS 103 097 [1], clause 7.3 - */ + testcase TC_SEC_ITSS_RCV_GENMSG_09_05_BO() runs on ItsMtc system ItsSecSystem { // Local variables @@ -22306,33 +21536,7 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_09_05_BO - /** - * @desc Check that IUT accepts a well-formed Secured GN Message containing payload of type signed_and_encrypted - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
-             * Config Id: CF01
-             * Initial conditions:
-             * with { 
-             *    the IUT being in the 'authorized' state 
-             *    and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * } 
-             * ensure that { 
-             *  when { 
-             *      the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A) 
-             *          containing payload_field
-             *              containing type
-             *                  indicating 'signed_and_encrypted'
-             *              and containing data
-             *                  indicating length > 0
-             *  } then { 
-             *      the IUT discards the message 
-             *  } 
-             * } 
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_09_06_BO - * @reference ETSI TS 103 097 [1], clause 7.3 - */ + testcase TC_SEC_ITSS_RCV_GENMSG_09_06_BO() runs on ItsMtc system ItsSecSystem { // Local variables @@ -22427,26 +21631,24 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_09_06_BO /** - * @desc Check that IUT discards the Secured GN Message if the message does not contain the trailer field of type 'signature' + * @desc Check that IUT discards the Secured GN Message if the message does not contain the trailer field of type 'signature' *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is receiving a SecuredMessage
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
              *         containing trailer_fields
-             *             not containing trailer_fields['signature']
-             *   } then {
-             *     the IUT discards the message
-             *   }
-             * }
+             *           not containing trailer_fields['signature']
+             *     then
+             *       the IUT discards the message
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_10_01_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_10_01_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_10_01_BO() runs on ItsMtc system ItsSecSystem { @@ -22482,30 +21684,28 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_GENMSG_10_01_BO /** - * @desc Check that IUT discards the Secured GN Message containing more than one instance of TrailerField of type 'signature' + * @desc Check that IUT discards the Secured GN Message containing more than one instance of TrailerField of type 'signature' *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *   when {
-             *     the IUT is receiving a SecuredMessage
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_DENM_A)
              *         containing trailer_fields[0]
-             *             containing type
-             *                 indicating 'signature'
-             *             and containing trailer_fields[1]
-             *                 containing type
-             *                     indicating 'signature'
-             *   } then {
-             *     the IUT discards the message
-             *   }
-             * }
+             *           containing type
+             *             indicating 'signature'
+             *         and containing trailer_fields[1]
+             *           containing type
+             *             indicating 'signature'
+             *     then
+             *       the IUT discards the message
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_10_02_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_10_02_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_10_02_BO() runs on ItsMtc system ItsSecSystem { @@ -22567,34 +21767,32 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_10_0x_BV /** - * @desc Check that the IUT discards Secured GN Message containing signature that is not verified using the verification key from the certificate contained in the message's signer info + * @desc Check that the IUT discards Secured GN Message containing signature that is not verified using the verification key from the certificate contained in the message's signer info *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *   when {
-             *       the IUT is receiving a SecuredMessage
-            *            the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
-            *                containing header_fields ['signer_info']
-            *                    containing certificate
-            *                        containing subject_attributes['verification key'] 
-            *                            containing key (KEY)
-            *                and containing trailer_fields[0]
-            *                    containing type
-            *                        indicating 'signature'
-            *                    and containing signature
-            *                        NOT verifiable using KEY
-             *   } then {
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
+             *         containing header_fields ['signer_info']
+             *           containing signer
+             *             containing certificate (CERT_TS_A_AT)
+             *               containing subject_attributes['verification key']
+             *                 containing key (KEY)
+             *         and containing trailer_fields[0]
+             *           containing type
+             *             indicating 'signature'
+             *           containing signature
+             *             NOT verifiable using KEY
+             *     then
              *       the IUT discards the message
-             *   }
-             * }
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_11_01_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_11_01_BO * @reference ETSI TS 103 097 [1], clauses 4.2.2 & 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_11_01_BO() runs on ItsMtc system ItsSecSystem { @@ -22630,31 +21828,28 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_GENMSG_11_01_BO /** - * @desc Check that IUT discards the Secured Message if the message contains trailer field of type 'signature' with reserved public key algorythms + * @desc Check that IUT discards the Secured Message if the message contains trailer field of type 'signature' with reserved public key algorythms *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *   when {
-             *       the IUT is receiving a SecuredMessage
-            *            the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
-            *                containing trailer_fields
-            *                    containing an instance of type TrailerField
-            *                        containing type
-            *                            indicating 'signature'
-            *                        and containing signature
-            *                            indicating X_RESERVED_PK_ALGORYTHM
-             *   } then {
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
+             *         containing trailer_fields
+             *           containing an instance of type TrailerField
+             *             containing type
+             *               indicating 'signature'
+             *             and containing signature.algorithm
+             *               indicating X_RESERVED_PK_ALGORYTHM
+             *     then
              *       the IUT discards the message
-             *   }
-             * }
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_11_02_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_11_02_BO * @reference ETSI TS 103 097 [1], clauses 4.2.2 & 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_11_02_BO() runs on ItsMtc system ItsSecSystem { @@ -22722,31 +21917,29 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_11_0x_BV /** - * @desc Check that IUT discards a Secured GN Message if the signer certificate of the message contains the subject type 'enrolment_credential' + * @desc Check that IUT discards a Secured GN Message if the signer certificate of the message contains the subject type 'enrolment_credential' *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *   when {
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
              *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
-             *          containing header_fields['signer_info']
-             *              containing signer
-             *                  containing type
-             *                      indicating 'certificate'
-             *                  containing certificate (CERT_TS_EC_A)
-             *                      containing subject_info.subject_type
-             *                          indicating 'enrolment_credentials'
-             *   } then {
+             *         containing header_fields ['signer_info']
+             *           containing signer
+             *             containing type
+             *               indicating 'certificate'
+             *             containing certificate (CERT_TS_A_EC)
+             *               containing subject_info.subject_type
+             *                 indicating 'enrolment_credentials'
+             *     then
              *       the IUT discards the message
-             *   }
-             * }
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_12_01_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_12_01_BO * @reference ETSI TS 103 097 [1], clauses 6.3 & 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_12_01_BO() runs on ItsMtc system ItsSecSystem { @@ -22782,31 +21975,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_GENMSG_12_01_BO /** - * @desc Check that IUT discards a Secured GN Message if the signer certificate of the message contains the subject type 'authorization_authority' + * @desc Check that IUT discards a Secured GN Message if the signer certificate of the message contains the subject type 'authorization_authority' *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *   when {
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
              *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
-             *          containing header_fields['signer_info']
-             *              containing signer
-             *                  containing type
-             *                      indicating 'certificate'
-             *                  containing certificate (CERT_TS_A_AA)
-             *                      containing subject_info.subject_type
-             *                          indicating 'enrolment_credentials'
-             *   } then {
+             *         containing header_fields ['signer_info']
+             *           containing signer
+             *             containing type
+             *               indicating 'certificate'
+             *             containing certificate (CERT_TS_A_AA)
+             *               containing subject_info.subject_type
+             *                 indicating 'authorization_authority'
+             *     then
              *       the IUT discards the message
-             *   }
-             * }
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_12_02_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_12_02_BO * @reference ETSI TS 103 097 [1], clauses 6.3 & 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_12_02_BO() runs on ItsMtc system ItsSecSystem { @@ -22842,31 +22033,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_GENMSG_12_02_BO /** - * @desc Check that IUT discards a Secured GN Message if the signer certificate of the message contains the subject type 'enrolment_authority' + * @desc Check that IUT discards a Secured GN Message if the signer certificate of the message contains the subject type 'enrolment_authority' *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *   when {
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
              *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
-             *          containing header_fields['signer_info']
-             *              containing signer
-             *                  containing type
-             *                      indicating 'certificate'
-             *                  containing certificate (CERT_TS_A_EA)
-             *                      containing subject_info.subject_type
-             *                          indicating 'enrolment_credentials'
-             *   } then {
+             *         containing header_fields ['signer_info']
+             *           containing signer
+             *             containing type
+             *               indicating 'certificate'
+             *             containing certificate (CERT_TS_A_EA)
+             *               containing subject_info.subject_type
+             *                 indicating 'enrolment_authority'
+             *     then
              *       the IUT discards the message
-             *   }
-             * }
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_12_03_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_12_03_BO * @reference ETSI TS 103 097 [1], clauses 6.3 & 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_12_03_BO() runs on ItsMtc system ItsSecSystem { @@ -22902,31 +22091,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_GENMSG_12_03_BO /** - * @desc Check that IUT discards a Secured GN Message if the signer certificate of the message contains the subject type 'root_ca' + * @desc Check that IUT discards a Secured GN Message if the signer certificate of the message contains the subject type 'root_ca' *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *   when {
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_A_AT
+             * Expected results:
+             *   ensure that
+             *     when
              *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
-             *          containing header_fields['signer_info']
-             *              containing signer
-             *                  containing type
-             *                      indicating 'certificate'
-             *                  containing certificate (CERT_TS_A_CA)
-             *                      containing subject_info.subject_type
-             *                          indicating 'enrolment_credentials'
-             *   } then {
+             *         containing header_fields ['signer_info']
+             *           containing signer
+             *             containing type
+             *               indicating 'certificate'
+             *             containing certificate (CERT_TS_ROOT)
+             *               containing subject_info.subject_type
+             *                 indicating 'root_ca'
+             *     then
              *       the IUT discards the message
-             *   }
-             * }
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_12_04_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_12_04_BO * @reference ETSI TS 103 097 [1], clauses 6.3 & 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_12_04_BO() runs on ItsMtc system ItsSecSystem { @@ -23009,31 +22196,29 @@ module ItsSecurity_TestCases { } // End of group g_TC_SEC_ITSS_RCV_GENMSG_12_0x_BV /** - * @desc Check that IUT discards secured message signed with the not yet valid certificate + * @desc Check that IUT discards secured message signed with the not yet valid certificate *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *   when {
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is before the time validity period of CERT_TS_MSG_13_01_BO_AT
+             * Expected results:
+             *   ensure that
+             *     when
              *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
-             *              containing header_fields['signer_info'].signer 
-             *                  containing certificate (CERT_TS_MSG_13_01_BO_AT)
-             *                      containing validity_restrictions['time_start_and_end']
-             *                          containing start_validity
-             *                              indicating START_VALIDITY_AT > CURRENT_TIME
-             *                          and containing end_validity
-             *                              indicating END_VALIDITY_AT > START_VALIDITY_AT
-             *   } then {
+             *         containing header_fields['signer_info'].signer
+             *           containing certificate (CERT_TS_MSG_13_01_BO_AT)
+             *             containing validity_restrictions['time_start_and_end']
+             *               containing start_validity
+             *                 indicating START_VALIDITY_AT > CURRENT_TIME
+             *               and containing end_validity
+             *                 indicating END_VALIDITY_AT > START_VALIDITY_AT
+             *     then
              *       the IUT discards the message
-             *   }
-             * }
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_13_01_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_13_01_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_13_01_BO() runs on ItsMtc system ItsSecSystem { @@ -23069,31 +22254,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_GENMSG_13_01_BO /** - * @desc Check that IUT discards secured message signed with the expired certificate + * @desc Check that IUT discards secured message signed with the expired certificate *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *   when {
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is before the time validity period of CERT_TS_MSG_13_02_BO_AT
+             * Expected results:
+             *   ensure that
+             *     when
              *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
-             *              containing header_fields['signer_info'].signer 
-             *                  containing certificate (CERT_TS_MSG_13_02_BO_AT)
-             *                      containing validity_restrictions['time_start_and_end']
-             *                          containing start_validity
-             *                              indicating START_VALIDITY_AT < CURRENT_TIME
-             *                          and containing end_validity
-             *                              indicating END_VALIDITY_AT < START_VALIDITY_AT
-             *   } then {
+             *         containing header_fields['signer_info'].signer
+             *           containing certificate (CERT_TS_MSG_13_02_BO_AT)
+             *             containing validity_restrictions['time_start_and_end']
+             *               containing start_validity
+             *                 indicating START_VALIDITY_AT < CURRENT_TIME
+             *               and containing end_validity
+             *                 indicating END_VALIDITY_AT < CURRENT_TIME
+             *     then
              *       the IUT discards the message
-             *   }
-             * }
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_13_02_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_13_02_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_13_02_BO() runs on ItsMtc system ItsSecSystem { @@ -23129,33 +22312,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_GENMSG_13_02_BO /** - * @desc Check that IUT discards secured message when IUT location is outside the circular validity restriction of the signing certificate + * @desc Check that IUT discards secured message when IUT location is outside the circular validity restriction of the signing certificate *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *   when {
-             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
-             *              containing header_fields['signer_info'].signer 
-             *                  containing certificate (CERT_TS_MSG_13_03_BO_AT)
-             *                      containing validity_restrictions['region']
-             *                          containing region
-             *                              containing region_type
-             *                                  indicating 'circle'
-             *                              and containing circular_region
-             *                                  indicating REGION
-             *                                      not containing the CURRENT_IUT_LOCATION
-             *   } then {
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the validity period of CERT_TS_MSG_13_03_BO_AT
+             *     and the IUT current location is set to CURRENT_IUT_LOCATION
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_B)
+             *         containing header_fields['signer_info'].signer
+             *           containing certificate (CERT_TS_MSG_13_03_BO_AT)
+             *             containing validity_restrictions['region']
+             *               containing region
+             *                 containing region_type
+             *                   indicating 'circle'
+             *                 and containing circular_region
+             *                   indicating REGION
+             *                     not containing the CURRENT_IUT_LOCATION
+             *     then
              *       the IUT discards the message
-             *   }
-             * }
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_13_03_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_13_03_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_13_03_BO() runs on ItsMtc system ItsSecSystem { @@ -23191,33 +22373,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_GENMSG_13_03_BO /** - * @desc Check that IUT discards secured message when IUT location is outside the rectangular validity restriction of the signing certificate + * @desc Check that IUT discards secured message when IUT location is outside the rectangular validity restriction of the signing certificate *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *   when {
-             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
-             *              containing header_fields['signer_info'].signer 
-             *                  containing certificate (CERT_TS_MSG_13_04_BO_AT)
-             *                      containing validity_restrictions['region']
-             *                          containing region
-             *                              containing region_type
-             *                                  indicating 'polygon'
-             *                              and containing polygonal_region
-             *                                  indicating REGION
-             *                                      not containing the CURRENT_IUT_LOCATION
-             *   } then {
-             *       the IUT discards the message
-             *   }
-             * }
-             * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_13_04_BO + * Initial conditions: + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the validity period of CERT_TS_MSG_13_04_BO_AT + * and the IUT current location is set to CURRENT_IUT_LOCATION + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_C) + * containing header_fields['signer_info'].signer + * containing certificate (CERT_TS_MSG_13_04_BO_AT) + * containing validity_restrictions['region'] + * containing region + * containing region_type + * indicating 'rectangle' + * and containing rectangular_regions + * indicating REGION + * not containing the CURRENT_IUT_LOCATION + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_13_04_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_13_04_BO() runs on ItsMtc system ItsSecSystem { @@ -23253,33 +22434,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_GENMSG_13_04_BO /** - * @desc Check that IUT discards secured message when IUT location is outside the polygonal validity restriction of the signing certificate + * @desc Check that IUT discards secured message when IUT location is outside the polygonal validity restriction of the signing certificate *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *   when {
-             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
-             *              containing header_fields['signer_info'].signer 
-             *                  containing certificate (CERT_TS_MSG_13_05_BO_AT)
-             *                      containing validity_restrictions['region']
-             *                          containing region
-             *                              containing region_type
-             *                                  indicating 'rectangle'
-             *                              and containing rectanglar_region
-             *                                  indicating REGION
-             *                                      not containing the CURRENT_IUT_LOCATION
-             *   } then {
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the validity period of CERT_TS_MSG_13_05_BO_AT
+             *     and the IUT current location is set to CURRENT_IUT_LOCATION
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_D)
+             *         containing header_fields['signer_info'].signer
+             *           containing certificate (CERT_TS_MSG_13_05_BO_AT)
+             *             containing validity_restrictions['region']
+             *               containing region
+             *                 containing region_type
+             *                   indicating 'polygon'
+             *                 and containing polygonal_region
+             *                   indicating REGION
+             *                     not containing the CURRENT_IUT_LOCATION
+             *     then
              *       the IUT discards the message
-             *   }
-             * }
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_13_05_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_13_05_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_13_05_BO() runs on ItsMtc system ItsSecSystem { @@ -23315,33 +22495,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_GENMSG_13_05_BO /** - * @desc Check that IUT discards secured message when IUT location is outside the identified validity restriction of the signing certificate + * @desc Check that IUT discards secured message when IUT location is outside the identified validity restriction of the signing certificate *
-             * Pics Selection: PICS_GN_SECURITY and PICS_GN_GBC_SRC
+             * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
-             * Expected behavior:
-             * with {
-             *   the IUT being in the 'authorized' state
-             *   and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             * }
-             * ensure that {
-             *   when {
-             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_A)
-             *              containing header_fields['signer_info'].signer 
-             *                  containing certificate (CERT_TS_MSG_13_06_BO_AT)
-             *                      containing validity_restrictions['region']
-             *                          containing region
-             *                              containing region_type
-             *                                  indicating 'id'
-             *                              and containing id_region
-             *                                  indicating REGION
-             *                                      not containing the CURRENT_IUT_LOCATION
-             *   } then {
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the validity period of CERT_TS_MSG_13_06_BO_AT
+             *     and the IUT current location is set to CURRENT_IUT_LOCATION
+             * Expected results:
+             *   ensure that
+             *     when
+             *       the IUT is receiving a SecuredMessage (MSG_SEC_RCV_GENMSG_E)
+             *         containing header_fields['signer_info'].signer
+             *           containing certificate (CERT_TS_MSG_13_06_BO_AT)
+             *             containing validity_restrictions['region']
+             *               containing region
+             *                 containing region_type
+             *                   indicating 'id'
+             *                 and containing id_region
+             *                   indicating REGION
+             *                     not containing the CURRENT_IUT_LOCATION
+             *     then
              *       the IUT discards the message
-             *   }
-             * }
              * 
- * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_GENMSG_13_06_BO + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_GENMSG_13_06_BO * @reference ETSI TS 103 097 [1], clause 7.3 */ testcase TC_SEC_ITSS_RCV_GENMSG_13_06_BO() runs on ItsMtc system ItsSecSystem { @@ -23412,31 +22591,28 @@ module ItsSecurity_TestCases { group recvCertificatesProfile { /** - * @desc Check that IUT discards the AT certificate with version 3 + * @desc Check that IUT discards the AT certificate with version 3 *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_01_01_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info'].signer
-             *                  containing type
-             *                      indicating 'certificate'
-             *                  and containing certificate (CERT_TS_01_01_BO_AT)
-             *                      containing  version
-             *                          indicating '3'
-             *      } then {
-             *          the IUT discards  the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_01_01_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_01_01_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_01_01_BO_AT) + * containing version + * indicating '3' + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_01_01_BO * @reference ETSI TS 103 097 [1], clauses 6.1 & 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_01_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -23484,31 +22660,28 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_01_01_BO /** - * @desc Check that IUT discards the AT certificate with version 1 + * @desc Check that IUT discards the AT certificate with version 1 *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_01_02_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info'].signer
-             *                  containing type
-             *                      indicating 'certificate'
-             *                  and containing certificate (CERT_TS_01_02_BO_AT)
-             *                      containing  version
-             *                          indicating '1'
-             *      } then {
-             *          the IUT discards  the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_01_02_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_01_02_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_01_02_BO_AT) + * containing version + * indicating '1' + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_01_02_BO * @reference ETSI TS 103 097 [1], clauses 6.1 & 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_01_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -23556,36 +22729,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_01_02_BO /** - * @desc Check that IUT discards the AA certificate with version 3 + * @desc Check that IUT discards the AA certificate with version 3 *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_01_03_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info'].signer
-             *                  containing type
-             *                      indicating 'certificate_chain'
-             *                  and containing certificate[0] (CERT_TS_01_03_BO_AA)
-             *                      containing  version
-             *                          indicating '3'
-             *                  and containing certificate[1] (CERT_TS_01_03_BO_AT)
-             *                      containing signer_info.type
-             *                          indicating 'certificate_digest_with_sha256'
-             *                      and containing signer_info.digest
-             *                          referencing to CERT_TS_01_03_BO_AA
-             *      } then {
-             *          the IUT discards  the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_01_03_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_01_03_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate_chain' + * and containing certificates[0] (CERT_TS_01_03_BO_AA) + * containing version + * indicating '3' + * and containing certificates[1] (CERT_TS_01_03_BO_AT) + * containing signer_info.type + * indicating 'certificate_digest_with_sha256' + * and containing signer_info.digest + * referencing to CERT_TS_01_03_BO_AA + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_01_03_BO * @reference ETSI TS 103 097 [1], clauses 6.1 & 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_01_03_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -23633,34 +22803,31 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_01_03_BO /** - * @desc Check that IUT discards the AA certificate with version 1 + * @desc Check that IUT discards the AA certificate with version 1 *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_01_04_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info'].signer
-             *                  containing type
-             *                      indicating 'certificate_chain'
-             *                  and containing certificate[0] (CERT_TS_01_04_BO_AA)
-             *                      containing  version
-             *                          indicating '1'
-             *                  and containing certificate[1] (CERT_TS_01_04_BO_AT)
-             *                      and containing signer_info.digest
-             *                          referencing to CERT_TS_01_04_BO_AA
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_01_04_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_01_04_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate_chain' + * containing certificates[0] (CERT_TS_01_04_BO_AA) + * containing version + * indicating '1' + * and containing certificates[1] (CERT_TS_01_04_BO_AT) + * containing signer_info.digest + * referencing to CERT_TS_01_04_BO_AA + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_01_04_BO * @reference ETSI TS 103 097 [1], clauses 6.1 & 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_01_04_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -23711,35 +22878,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_01_04_BO /** - * @desc Check that IUT discards a SecuredMessage if the issuer certificate of the authorization ticket certificate contains the subject type 'enrolment_credential' + * @desc Check that IUT discards a SecuredMessage if the issuer certificate of the authorization ticket certificate contains the subject type 'enrolment_credential' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_02_01_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info'].signer
-             *                  containing type
-             *                      indicating 'certificate'
-             *                  and containing certificate (CERT_TS_02_01_BO_AT)
-             *                      containing signer_info.type
-             *                          indicating 'certificate_digest_with_sha256'
-             *                      and containing signer_info.digest
-             *                          referencing to certificate (CERT_TS_A_EC)
-             *                              containing subject_info.subject_type
-             *                                 indicating 'enrolment_credential'
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_02_01_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_02_01_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_02_01_BO_AT) + * containing signer_info.type + * indicating 'certificate_digest_with_sha256' + * and containing signer_info.digest + * referencing to certificate (CERT_TS_A_EC) + * containing subject_info.subject_type + * indicating 'enrolment_credential' + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_02_01_BO * @reference ETSI TS 103 097 [1], clause 6.3 */ testcase TC_SEC_ITSS_RCV_CERT_02_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -23787,36 +22951,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_02_01_BO /** - * @desc Check that IUT discards a SecuredMessage if the issuer certificate of the authorization authority certificate contains the subject type 'enrolment_credential' + * @desc Check that IUT discards a SecuredMessage if the issuer certificate of the authorization authority certificate contains the subject type 'enrolment_credential' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_02_02_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info'].signer
-             *                  containing type
-             *                      indicating 'certificate_chain'
-             *                  and containing certificates[0] (CERT_TS_02_02_BO_AA)
-             *                      containing signer_info.digest
-             *                          referencing to certificate CERT_TS_A_EC
-             *                              containing subject_info.subject_type
-             *                                  indicating 'enrolment_credential'
-             *                  and containing certificates[1] (CERT_TS_02_02_BO_AT)
-             *                      containing signer_info.digest
-             *                          referencing to CERT_TS_02_02_BO_AA
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_02_02_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_02_02_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate_chain' + * and containing certificates[0] (CERT_TS_02_02_BO_AA) + * containing signer_info.digest + * referencing to certificate CERT_TS_A_EC + * containing subject_info.subject_type + * indicating 'enrolment_credential' + * and containing certificates[1] (CERT_TS_02_02_BO_AT) + * containing signer_info.digest + * referencing to CERT_TS_02_02_BO_AA + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_02_02_BO * @reference ETSI TS 103 097 [1], clause 6.3 */ testcase TC_SEC_ITSS_RCV_CERT_02_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -23864,35 +23025,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_02_02_BO /** - * @desc Check that IUT discards a SecuredMessage if the issuer certificate of the authorization ticket certificate contains the subject type 'enrolment_authority' + * @desc Check that IUT discards a SecuredMessage if the issuer certificate of the authorization ticket certificate contains the subject type 'enrolment_authority' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_02_03_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info'].signer
-             *                  containing type
-             *                      indicating 'certificate'
-             *                  and containing certificate (CERT_TS_02_03_BO_AT)
-             *                      containing signer_info.type
-             *                          indicating 'certificate_digest_with_sha256'
-             *                  and containing signer_info.digest
-             *                          referencing to certificate (CERT_TS_A_EA)
-             *                              containing subject_info.subject_type
-             *                                  indicating 'enrolment_authority'
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_02_03_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_02_03_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_02_03_BO_AT) + * containing signer_info.type + * indicating 'certificate_digest_with_sha256' + * and containing signer_info.digest + * referencing to certificate (CERT_TS_A_EA) + * containing subject_info.subject_type + * indicating 'enrolment_authority' + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_02_03_BO * @reference ETSI TS 103 097 [1], clause 6.3 */ testcase TC_SEC_ITSS_RCV_CERT_02_03_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -23940,36 +23098,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_02_03_BO /** - * @desc Check that IUT discards a SecuredMessage if the issuer certificate of the authorization authority certificate contains the subject type 'enrolment_authority' + * @desc Check that IUT discards a SecuredMessage if the issuer certificate of the authorization authority certificate contains the subject type 'enrolment_authority' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_02_04_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info'].signer
-             *                  containing type
-             *                      indicating 'certificate_chain'
-             *                  and containing certificates[0] (CERT_TS_02_04_BO_AA)
-             *                      containing signer_info.digest
-             *                          referencing to certificate CERT_TS_A_EA
-             *                              containing subject_info.subject_type
-             *                                  indicating 'enrolment_authority'
-             *                  and containing certificates[1] (CERT_TS_02_04_BO_AT)
-             *                      containing signer_info.digest
-             *                          referencing to CERT_TS_02_04_BO_AA
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_02_04_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_02_04_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate_chain' + * and containing certificates[0] (CERT_TS_02_04_BO_AA) + * containing signer_info.digest + * referencing to certificate CERT_TS_A_EA + * containing subject_info.subject_type + * indicating 'enrolment_authority' + * and containing certificates[1] (CERT_TS_02_04_BO_AT) + * containing signer_info.digest + * referencing to CERT_TS_02_04_BO_AA + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_02_04_BO * @reference ETSI TS 103 097 [1], clause 6.3 */ testcase TC_SEC_ITSS_RCV_CERT_02_04_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -24017,31 +23172,27 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_02_04_BO /** - * @desc Check that IUT discards a SecuredMessage if the issuer certificate of the authorization ticket certificate contains the subject type 'authorization_ticket' + * @desc Check that IUT discards a SecuredMessage if the issuer certificate of the authorization ticket certificate contains the subject type 'authorization_ticket' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_03_01_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields ['signer_info'].signer
-             *                  containing certificate (CERT_TS_03_01_BO_AT)
-             *                      containing signer_info.digest
-             *                          referencing to CERT_TS_03_BO_CA
-             *                              containing subject_info.subject_type
-             *                                  indicating 'authorization_ticket'
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_03_01_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_03_01_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'].signer + * containing certificate (CERT_TS_03_01_BO_AT) + * containing signer_info.digest + * referencing to CERT_TS_03_BO_CA + * containing subject_info.subject_type + * indicating 'authorization_ticket' + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_03_01_BO * @reference ETSI TS 103 097 [1], clause 6.3 */ testcase TC_SEC_ITSS_RCV_CERT_03_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -24089,36 +23240,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_03_01_BO /** - * @desc Check that IUT discards a SecuredMessage if the issuer certificate of the authorization authority certificate contains the subject type 'authorization_ticket' + * @desc Check that IUT discards a SecuredMessage if the issuer certificate of the authorization authority certificate contains the subject type 'authorization_ticket' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_03_02_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields ['signer_info'].signer
-             *                  containing type
-             *                      indicating 'certificate_chain'
-             *                  and containing certificates[0] (CERT_TS_03_02_BO_AA)
-             *                      containing signer_info.digest
-             *                          referencing to CERT_TS_03_BO_CA
-             *                              containing subject_info.subject_type
-             *                                  indicating 'authorization_ticket'
-             *                  and containing certificates[1] (CERT_TS_03_02_BO_AT)
-             *                      containing signer_info.digest
-             *                      referencing to CERT_TS_03_02_BO_AA
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_03_02_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_03_02_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate_chain' + * and containing certificates[0] (CERT_TS_03_02_BO_AA) + * containing signer_info.digest + * referencing to CERT_TS_03_BO_CA + * containing subject_info.subject_type + * indicating 'authorization_ticket' + * and containing certificates[1] (CERT_TS_03_02_BO_AT) + * containing signer_info.digest + * referencing to CERT_TS_03_02_BO_AA + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_03_02_BO * @reference ETSI TS 103 097 [1], clause 6.3 */ testcase TC_SEC_ITSS_RCV_CERT_03_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -24166,34 +23314,31 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_03_02_BO /** - * @desc Check that IUT discards a SecuredMessage if the issuer certificate of the AA certificate contains the subject type 'authorization_authority' + * @desc Check that IUT discards a SecuredMessage if the issuer certificate of the AA certificate contains the subject type 'authorization_authority' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_04_01_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields ['signer_info'].signer
-             *                  containing type
-             *                      indicating 'certificate_chain'
-             *                  and containing certificates[0] (CERT_TS_04_01_BO_AA)
-             *                      containing signer_info.digest
-             *                          referencing to CERT_TS_A_AA
-             *                  and containing certificates[1] (CERT_TS_04_01_BO_AT)
-             *                      containing signer_info.digest
-             *                      referencing to CERT_TS_04_01_BO_AA
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_04_01_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_04_01_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate_chain' + * and containing certificates[0] (CERT_TS_04_01_BO_AA) + * containing signer_info.digest + * referencing to CERT_TS_A_AA + * and containing certificates[1] (CERT_TS_04_01_BO_AT) + * containing signer_info.digest + * referencing to CERT_TS_04_01_BO_AA + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_04_01_BO * @reference ETSI TS 103 097 [1], clause 6.3 */ testcase TC_SEC_ITSS_RCV_CERT_04_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -24241,33 +23386,30 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_04_01_BO /** - * @desc Check that IUT discards the message when signing AT certificate has an invalid signature + * @desc Check that IUT discards the message when signing AT certificate has an invalid signature *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields ['signer_info'].signer
-             *                  containing type
-             *                      indicating 'certificate'
-             *                  and containing certificates (CERT_TS_A_AT)
-             *                      containing signer_info.digest
-             *                          referencing to CERT_TS_A_AA
-             *                      and containing signature
-             *                          NOT verifiable with CERT_TS_A_AA.subject_attributes['verification_key'].key
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_05_01_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_A_AT) + * containing signer_info.digest + * referencing to a CERT_TS_A_AA + * and containing signature + * NOT verifiable with CERT_TS_A_AA.subject_attributes['verification_key'].key + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_05_01_BO * @reference ETSI TS 103 097 [1], clauses 6.1 and 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_05_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -24324,36 +23466,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_05_01_BO /** - * @desc Check that IUT discards the message when the issuing AA certificate of the signing AT certificate has an invalid signature + * @desc Check that IUT discards the message when the issuing AA certificate of the signing AT certificate has an invalid signature *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_A_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields ['signer_info'].signer
-             *                  containing type
-             *                      indicating 'certificate_chain'
-             *                  and containing certificates[0] (CERT_TS_A_AT)
-             *                      containing signer_info.digest
-             *                          referencing to CERT_ROOT
-             *                      and containing signature
-             *                          NOT verifiable with CERT_ROOT.subject_attributes['verification_key'].key
-             *                  and containing certificates[1] (CERT_TS_A_AT)
-             *                      containing signer_info.digest
-             *                          referencing to a CERT_TS_A_AA
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_05_02_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_A_AT + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate_chain' + * and containing certificates[0] (CERT_TS_A_AA) + * containing signer_info.digest + * referencing to a CERT_ROOT + * and containing signature + * NOT verifiable with CERT_ROOT.subject_attributes['verification_key'].key + * and containing certificates[1] (CERT_TS_A_AT) + * containing signer_info.digest + * referencing to a CERT_TS_A_AA + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_05_02_BO * @reference ETSI TS 103 097 [1], clauses 6.1 and 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_05_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -24411,43 +23550,39 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_05_02_BO /** - * @desc Check that the IUT accepts a message when the signing certificate of this message contains the same circular region validity restriction as its issuing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_RECTANGULAR_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_06_01_BV_AT
-             *      and the IUT current location is inside the CURCULAR_REGION_AA
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_06_01_BV_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'circle'
-             *                              containing circular_region
-             *                                  indicating CURCULAR_REGION_AA
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_B_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'circle'
-             *                                      and containing circular_region
-             *                                          indicating CURCULAR_REGION_AA
-             *      } then {
-             *          the IUT accepts the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_06_01_BV + * @desc Check that the IUT accepts a message when the signing certificate of this message contains the same circular region validity restriction as its issuing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_CIRCULAR_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_06_01_BV_AT
+             *     and the IUT current location is inside the CURCULAR_REGION_AA
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           containing certificate (CERT_TS_06_01_BV_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'circle'
+             *               containing circular_region
+             *                 indicating CURCULAR_REGION_AA
+             *             containing signer_info.digest
+             *               referencing to a CERT_TS_B_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'circle'
+             *                   and containing circular_region
+             *                     indicating CURCULAR_REGION_AA
+             *     then
+             *       the IUT accepts the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_06_01_BV * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_06_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -24495,44 +23630,40 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_06_01_BV /** - * @desc Check that the IUT accepts a message when the signing certificate of this message contains the circular region validity restriction which is fully inside in the circular region validity restriction of its issuing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_RECTANGULAR_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_06_02_BV_AT
-             *      and the IUT current location is inside the CURCULAR_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_06_02_BV_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'circle'
-             *                              containing circular_region
-             *                                  indicating CURCULAR_REGION_AT
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_B_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'circle'
-             *                                      and containing circular_region
-             *                                          indicating CURCULAR_REGION_AA
-             *                                              fully covering CURCULAR_REGION_AT
-             *      } then {
-             *          the IUT accepts the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_06_02_BV + * @desc Check that the IUT accepts a message when the signing certificate of this message contains the circular region validity restriction which is fully inside in the circular region validity restriction of its issuing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_CIRCULAR_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_06_02_BV_AT
+             *     and the IUT current location is inside the CURCULAR_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_06_02_BV_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'circle'
+             *               and containing circular_region
+             *                 indicating CURCULAR_REGION_AT
+             *             and containing signer_info.digest
+             *               referencing to a certificate CERT_TS_B_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'circle'
+             *                   and containing circular_region
+             *                     indicating CURCULAR_REGION_AA
+             *                       fully covering CURCULAR_REGION_AT
+             *     then
+             *       the IUT accepts the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_06_02_BV * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_06_02_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -24580,44 +23711,40 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_06_02_BV /** - * @desc Check that the IUT accepts a message when the signing certificate of this message contains the circular region validity restriction which is fully inside in the rectangular region validity restriction of its issuing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_RECTANGULAR_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_06_03_BV_AT
-             *      and the IUT current location is inside the CURCULAR_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_06_03_BV_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'circle'
-             *                              containing circular_region
-             *                                  indicating CURCULAR_REGION_AT
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_C_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'rectangle'
-             *                                      and containing rectangular_region[0]
-             *                                          indicating RECT_REGION_AA
-             *                                              fully covering CURCULAR_REGION_AT
-             *      } then {
-             *          the IUT accepts the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_06_03_BV + * @desc Check that the IUT accepts a message when the signing certificate of this message contains the circular region validity restriction which is fully inside in the rectangular region validity restriction of its issuing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_CIRCULAR_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_06_03_BV_AT
+             *     and the IUT current location is inside the CURCULAR_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_06_03_BV_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'circle'
+             *               and containing circular_region
+             *                 indicating CURCULAR_REGION_AT
+             *             and containing signer_info.digest
+             *               referencing to a certificate CERT_TS_C_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'rectangular'
+             *                   and containing rectangular_region[0]
+             *                     indicating RECT_REGION_AA
+             *                       fully covering CURCULAR_REGION_AT
+             *      then
+             *       the IUT accepts the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_06_03_BV * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_06_03_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -24665,44 +23792,40 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_06_03_BV /** - * @desc Check that the IUT accepts a message when the signing certificate of this message contains the circular region validity restriction which is fully inside in the polygonal region validity restriction of its issuing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_RECTANGULAR_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_06_04_BV_AT
-             *      and the IUT current location is inside the CURCULAR_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_06_04_BV_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'circle'
-             *                              containing circular_region
-             *                                  indicating CURCULAR_REGION_AT
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_D_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'polygon'
-             *                                      and containing polygonal_region
-             *                                          indicating POLYGON_REGION_AA
-             *                                              fully covering CURCULAR_REGION_AT
-             *      } then {
-             *          the IUT accepts the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_06_04_BV + * @desc Check that the IUT accepts a message when the signing certificate of this message contains the circular region validity restriction which is fully inside in the polygonal region validity restriction of its issuing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_CIRCULAR_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_06_04_BV_AT
+             *     and the IUT current location is inside the CURCULAR_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_06_04_BV_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'circle'
+             *               and containing circular_region
+             *                 indicating CURCULAR_REGION_AT
+             *             and containing signer_info.digest
+             *               referencing to a certificate CERT_TS_D_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'polygon'
+             *                   and containing polygonal_region
+             *                     indicating POLYGON_REGION_AA
+             *                       fully covering CURCULAR_REGION_AT
+             *     then
+             *       the IUT accepts the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_06_04_BV * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_06_04_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -24750,49 +23873,45 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_06_04_BV /** - * @desc Check that the IUT accepts a message when the signing certificate of this message contains the circular region validity restriction which is fully inside in the identified region validity restriction of its issuing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_RECTANGULAR_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_06_05_BV_AT
-             *      and the IUT current location is inside the CURCULAR_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_06_05_BV_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'circle'
-             *                              containing circular_region
-             *                                  indicating CURCULAR_REGION_AT
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_E_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'id'
-             *                                      and containing id_region
-             *                                          containing region_dictionary
-             *                                              indicating 'iso_3166_1'
-             *                                          and containing local_region
-             *                                              indicating 0
-             *                                          and containing region_identifier
-             *                                              indicating ID_REGION_AT
-             *                                                  fully covering CURCULAR_REGION_AT
-             *      } then {
-             *          the IUT accepts the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_06_05_BV + * @desc Check that the IUT accepts a message when the signing certificate of this message contains the circular region validity restriction which is fully inside in the identified region validity restriction of its issuing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_CIRCULAR_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_06_05_BV_AT
+             *     and the IUT current location is inside the CURCULAR_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           containing certificate (CERT_TS_06_05_BV_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'circle'
+             *               and containing circular_region
+             *                 indicating CURCULAR_REGION_AT
+             *             and containing signer_info.digest
+             *               referencing to a certificate CERT_TS_E_AA
+             *                 containing validity_restrictions['region']
+             *                   and containing region_type
+             *                     indicating 'id'
+             *                   and containing id_region
+             *                     containing region_dictionary
+             *                       indicating 'iso_3166_1'
+             *                     and containing local_region
+             *                       indicating 0
+             *                     and containing region_identifier
+             *                       indicating ID_REGION_AT
+             *                         fully covering CURCULAR_REGION_AT
+             *     then
+             *       the IUT accepts the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_06_05_BV * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_06_05_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -24840,43 +23959,35 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_06_05_BV /** - * @desc Check that the IUT discards a message when the signing certificate of this message does not contain the region validity restriction but its issuing certificate contains the circular region validity restriction - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_RECTANGULAR_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_06_06_BO_AT
-             *      and the IUT current location is inside the CURCULAR_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_06_06_BO_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'circle'
-             *                              containing circular_region
-             *                                  indicating CURCULAR_REGION_AT
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_B_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'circle'
-             *                                      and containing circular_region
-             *                                          indicating CURCULAR_REGION_AT
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_06_06_BO + * @desc Check that the IUT discards a message when the signing certificate of this message does not contain the region validity restriction but its issuing certificate contains the circular region validity restriction + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_CIRCULAR_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_06_06_BO_AT
+             *     and the IUT current location is inside the CURCULAR_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_06_06_BO_AT)
+             *             not containing validity_restrictions['region']
+             *             and containing signer_info.digest
+             *               referencing to a CERT_TS_B_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'circle'
+             *                   and containing circular_region
+             *                     indicating CURCULAR_REGION_AT
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_06_06_BO * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_06_06_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -24924,44 +24035,40 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_06_06_BO /** - * @desc Check that the IUT discards a message when the signing certificate of this message contains circular region validity restriction which is outside of the circular region validity restriction of its issuing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_RECTANGULAR_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_06_07_BO_AT
-             *      and the IUT current location is inside the CURCULAR_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_06_07_BO_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'circle'
-             *                              containing circular_region
-             *                                  indicating CURCULAR_REGION_AT
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_06_07_BO_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'circle'
-             *                                      and containing circular_region
-             *                                          indicating CURCULAR_REGION_AA_OUTSIDE
-             *                                              not including CURCULAR_REGION_AT
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_06_07_BO + * @desc Check that the IUT discards a message when the signing certificate of this message contains circular region validity restriction which is outside of the circular region validity restriction of its issuing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_CIRCULAR_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_06_07_BO_AT
+             *     and the IUT current location is inside the CURCULAR_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_06_07_BO_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'circle'
+             *               and containing circular_region
+             *                 indicating CURCULAR_REGION_AT
+             *             and containing signer_info.digest
+             *               referencing to a CERT_TS_06_07_BO_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'circle'
+             *                   and containing circular_region
+             *                     indicating CURCULAR_REGION_AA_OUTSIDE
+             *                       not including CURCULAR_REGION_AT
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_06_07_BO * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_06_07_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -25009,44 +24116,40 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_06_07_BO /** - * @desc Check that the IUT discards a message when the signing certificate of this message contains circular region validity restriction which is not fully covered by the the circular region validity restriction of its issuing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_RECTANGULAR_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_06_08_BO_AT
-             *      and the IUT current location is inside the CURCULAR_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_06_08_BO_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'circle'
-             *                              containing circular_region
-             *                                  indicating CURCULAR_REGION_AT
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_06_08_BO_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'circle'
-             *                                      and containing circular_region
-             *                                          indicating CURCULAR_REGION_AA_INTERSECT
-             *                                              including partially CURCULAR_REGION_AT
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_06_08_BO + * @desc Check that the IUT discards a message when the signing certificate of this message contains circular region validity restriction which is not fully covered by the the circular region validity restriction of its issuing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_CIRCULAR_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_06_08_BO_AT
+             *     and the IUT current location is inside the CURCULAR_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_06_08_BO_AT)
+             *             containing validity_restrictions['region']
+             *                 containing region_type
+             *                   indicating 'circle'
+             *                 and containing circular_region
+             *                   indicating CURCULAR_REGION_AT
+             *             and containing signer_info.digest
+             *               referencing to a CERT_TS_06_08_BO_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'circle'
+             *                   and containing circular_region
+             *                     indicating CURCULAR_REGION_AA_INTERSECT
+             *                       including partially CURCULAR_REGION_AT
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_06_08_BO * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_06_08_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -25094,43 +24197,39 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_06_08_BO /** - * @desc Check that the IUT accepts a message when the signing certificate of this message contains the same rectangular region validity restriction as its issuing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_CIRCULAR_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_07_01_BV_AT
-             *      and the IUT current location is inside the RECT_REGION_AA
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_07_01_BV_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'rectangle'
-             *                              containing rectangular_region[0]
-             *                                  indicating RECT_REGION_AA
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_C_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'rectangle'
-             *                                      and containing rectangular_region[0]
-             *                                          indicating RECT_REGION_AA
-             *      } then {
-             *          the IUT accepts the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_07_01_BV + * @desc Check that the IUT accepts a message when the signing certificate of this message contains the same rectangular region validity restriction as its issuing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_RECTANGULAR_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_07_01_BV_AT
+             *     and the IUT current location is inside the RECT_REGION_AA
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_07_01_BV_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'rectangle'
+             *               and containing rectangular_region[0]
+             *                 indicating RECT_REGION_AA
+             *             and containing signer_info.digest
+             *               referencing to a CERT_TS_C_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'rectangular'
+             *                   and containing rectangular_region[0]
+             *                     indicating RECT_REGION_AA
+             *     then
+             *       the IUT accepts the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_07_01_BV * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_07_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -25178,44 +24277,40 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_07_01_BV /** - * @desc Check that the IUT accepts a message when the signing certificate of this message contains the rectangular region validity restriction which is fully inside in the circular region validity restriction of its issuing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_CIRCULAR_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_07_02_BV_AT
-             *      and the IUT current location is inside the RECT_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_07_02_BV_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'rectangle'
-             *                              containing rectangular_region[0]
-             *                                  indicating RECT_REGION_AA
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_B_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'circle'
-             *                                      and containing circular_region
-             *                                          indicating CURCULAR_REGION_AA
-                                                            fully covering the RECT_REGION_AT
-             *      } then {
-             *          the IUT accepts the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_07_02_BV + * @desc Check that the IUT accepts a message when the signing certificate of this message contains the rectangular region validity restriction which is fully inside in the circular region validity restriction of its issuing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_RECTANGULAR_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_07_02_BV_AT
+             *     and the IUT current location is inside the RECT_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_07_02_BV_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'rectangle'
+             *               and containing rectangular_region[0]
+             *                 indicating RECT_REGION_AT
+             *             and containing signer_info.digest
+             *               referencing to a certificate CERT_TS_B_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'circle'
+             *                   and containing circular_region
+             *                     indicating CURCULAR_REGION_AA
+             *                       fully covering the RECT_REGION_AT
+             *     then
+             *       the IUT accepts the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_07_02_BV * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_07_02_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -25263,52 +24358,48 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_07_02_BV /** - * @desc Check that the IUT accepts a message when the signing certificate of this message contains the validity restriction with rectangular region which is fully inside in the rectangular region validity restriction of its issuing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_CIRCULAR_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_07_03_BV_AT
-             *      and the IUT current location is inside the RECT_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_07_03_BV_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'rectangle'
-             *                              containing rectangular_region[0]
-             *                                  indicating RECT_REGION_AA
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_B_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'rectangle'
-             *                                      and containing rectangular_region
-             *                                          indicating RECT_REGION_AA
-                                                            fully covering RECT_REGION_AT
-             *      } then {
-             *          the IUT accepts the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_07_03_BV - * @reference ETSI TS 103 097 [1], clause 7.4.1 - */ - testcase TC_SEC_ITSS_RCV_CERT_07_03_BV() runs on ItsGeoNetworking system ItsSecSystem { - - // Local variables - var integer i; - var GeoNetworkingPdu v_securedGnPdu; - var GnRawPayload v_sentRawPayload; + * @desc Check that the IUT accepts a message when the signing certificate of this message contains the validity restriction with rectangular region which is fully inside in the rectangular region validity restriction of its issuing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_RECTANGULAR_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_07_03_BV_AT
+             *     and the IUT current location is inside the RECT_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_07_03_BV_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'rectangle'
+             *               and containing rectangular_region[0]
+             *                 indicating RECT_REGION_AT
+             *             and containing signer_info.digest
+             *               referencing to a certificate CERT_TS_C_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'rectangular'
+             *                   and containing rectangular_region[0]
+             *                     indicating RECT_REGION_AA
+             *                       fully covering RECT_REGION_AT
+             *     then
+             *       the IUT accepts the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_07_03_BV + * @reference ETSI TS 103 097 [1], clause 7.4.1 + */ + testcase TC_SEC_ITSS_RCV_CERT_07_03_BV() runs on ItsGeoNetworking system ItsSecSystem { + + // Local variables + var integer i; + var GeoNetworkingPdu v_securedGnPdu; + var GnRawPayload v_sentRawPayload; // Test adapter configuration if (not(PICS_GN_SECURITY) or not(PICS_USE_CIRCULAR_REGION)) { @@ -25348,44 +24439,40 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_07_03_BV /** - * @desc Check that the IUT accepts a message when the signing certificate of this message contains the rectangular region validity restriction which is fully inside in the polygonal region validity restriction of its issuing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_CIRCULAR_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_07_04_BV_AT
-             *      and the IUT current location is inside the RECT_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_07_04_BV_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'rectangle'
-             *                              containing rectangular_region[0]
-             *                                  indicating RECT_REGION_AA
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_D_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'polygon'
-             *                                      and containing polygonal_region
-             *                                          indicating POLYGON_REGION_AA
-                                                            fully covering RECT_REGION_AT
-             *      } then {
-             *          the IUT accepts the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_07_04_BV + * @desc Check that the IUT accepts a message when the signing certificate of this message contains the rectangular region validity restriction which is fully inside in the polygonal region validity restriction of its issuing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_RECTANGULAR_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_07_04_BV_AT
+             *     and the IUT current location is inside the RECT_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           containing certificate (CERT_TS_07_04_BV_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'rectangle'
+             *               containing rectangular_region[0]
+             *                 indicating RECT_REGION_AT
+             *             containing signer_info.digest
+             *               referencing to a certificate CERT_TS_D_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'polygon'
+             *                   containing polygonal_region
+             *                     indicating POLYGON_REGION_AA
+             *                       fully covering RECT_REGION_AT
+             *     then
+             *       the IUT accepts the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_07_04_BV * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_07_04_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -25433,49 +24520,45 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_07_04_BV /** - * @desc Check that the IUT accepts a message when the signing certificate of this message contains the rectangular region validity restriction which is fully inside in the identified region validity restriction of its issuing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_CIRCULAR_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_07_05_BV_AT
-             *      and the IUT current location is inside the RECT_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_07_05_BV_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'rectangle'
-             *                              containing rectangular_region[0]
-             *                                  indicating RECT_REGION_AA
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_E_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'id'
-             *                                      and containing id_region
-             *                                          containing region_dictionary
-             *                                              indicating 'iso_3166_1'
-             *                                          and containing local_region
-             *                                              indicating 0
-             *                                          and containing region_identifier
-             *                                              indicating ID_REGION_AT
-                                                                fully covering RECT_REGION_AT
-             *      } then {
-             *          the IUT accepts the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_07_05_BV + * @desc Check that the IUT accepts a message when the signing certificate of this message contains the rectangular region validity restriction which is fully inside in the identified region validity restriction of its issuing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_RECTANGULAR_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_07_05_BV_AT
+             *     and the IUT current location is inside the RECT_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_07_05_BV_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'rectangle'
+             *               and containing rectangular_region[0]
+             *                 indicating RECT_REGION_AT
+             *             and containing signer_info.digest
+             *               referencing to a certificate CERT_TS_E_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'id'
+             *                   and containing id_region
+             *                     containing region_dictionary
+             *                       indicating 'iso_3166_1' (0)
+             *                     and containing local_region
+             *                       indicating 0
+             *                     and containing region_identifier
+             *                       indicating ID_REGION_AT
+             *                         fully covering RECT_REGION_AT
+             *     then
+             *       the IUT accepts the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_07_05_BV * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_07_05_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -25523,37 +24606,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_07_05_BV /** - * @desc Check that the IUT discards a message when the signing certificate of this message does not contain the region validity restriction but its issuing certificate contains the rectangular region validity restriction - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_CIRCULAR_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_07_06_BO_AT
-             *      and the IUT current location is inside the RECT_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_07_06_BO_AT)
-             *                          not containing validity_restrictions['region']
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_C_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'rectangle'
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_07_06_BO + * @desc Check that the IUT discards a message when the signing certificate of this message does not contain the region validity restriction but its issuing certificate contains the rectangular region validity restriction + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_RECTANGULAR_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_07_06_BO_AT
+             *     and the IUT current location is inside the RECT_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           containing certificate (CERT_TS_07_06_BO_AT)
+             *             not containing validity_restrictions['region']
+             *             and containing signer_info.digest
+             *               referencing to a CERT_TS_C_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'rectangular'
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_07_06_BO * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_07_06_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -25601,44 +24680,40 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_07_06_BO /** - * @desc Check that the IUT discards a message when the signing certificate of this message contains rectangular region validity restriction which is outside of the rectangular region validity restriction of its issuing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_CIRCULAR_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_07_07_BO_AT
-             *      and the IUT current location is inside the RECT_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_07_07_BO_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'rectangle'
-             *                              containing rectangular_region[0]
-             *                                  indicating RECT_REGION_AT
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_07_07_BO_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'rectangle'
-             *                                      and containing rectangular_region[0]
-             *                                          indicating RECT_REGION_AA_OUTSIDE
-             *                                              not including RECT_REGION_AT
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_07_07_BO + * @desc Check that the IUT discards a message when the signing certificate of this message contains rectangular region validity restriction which is outside of the rectangular region validity restriction of its issuing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_RECTANGULAR_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_07_07_BO_AT
+             *     and the IUT current location is inside the RECT_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_07_07_BO_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'rectangle'
+             *               and containing rectangular_region[0]
+             *                 indicating RECT_REGION_AT
+             *             and containing signer_info.digest
+             *               referencing to a CERT_TS_07_07_BO_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'rectangle'
+             *                   and containing rectangular_region[0]
+             *                     indicating RECT_REGION_AA_OUTSIDE
+             *                       not including RECT_REGION_AT
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_07_07_BO * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_07_07_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -25686,44 +24761,40 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_07_07_BO /** - * @desc Check that the IUT discards a message when the signing certificate of this message contains rectangular region validity restriction which is not fully covered by the the rectangular region validity restriction of its issuing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_CIRCULAR_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_07_08_BO_AT
-             *      and the IUT current location is inside the RECT_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_07_08_BO_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'rectangle'
-             *                              containing rectangular_region[0]
-             *                                  indicating RECT_REGION_AT
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_07_08_BO_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'rectangle'
-             *                                      and containing rectangular_region[0]
-             *                                          indicating RECT_REGION_AA_INTERSECT
-             *                                              not partialy RECT_REGION_AT
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_07_08_BO + * @desc Check that the IUT discards a message when the signing certificate of this message contains rectangular region validity restriction which is not fully covered by the the rectangular region validity restriction of its issuing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_RECTANGULAR_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_07_08_BO_AT
+             *     and the IUT current location is inside the RECT_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_07_08_BO_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'rectangle'
+             *               and containing rectangular_region[0]
+             *                 indicating RECT_REGION_AT
+             *             and containing signer_info.digest
+             *               referencing to a CERT_TS_07_08_BO_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'rectangle'
+             *                   and containing rectangular_region[0]
+             *                     indicating RECT_REGION_AA_INTERSECT
+             *                       including partialy RECT_REGION_AT
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_07_08_BO * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_07_08_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -25771,43 +24842,39 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_07_08_BO /** - * @desc Check that the IUT accepts a message when the signing certificate of this message contains the same polygonal region validity restriction as its issuing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_POLYGONAL_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_08_01_BV_AT
-             *      and the IUT current location is inside the POLYGON_REGION_AA
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_08_01_BV_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'polygon'
-             *                              containing polygonal_region
-             *                                  indicating POLYGON_REGION_AA
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_D_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'polygon'
-             *                                      and containing polygonal_region
-             *                                          indicating POLYGON_REGION_AA
-             *      } then {
-             *          the IUT accepts the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_08_01_BV + * @desc Check that the IUT accepts a message when the signing certificate of this message contains the same polygonal region validity restriction as its issuing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_POLYGONAL_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_08_01_BV_AT
+             *     and the IUT current location is inside the POLYGON_REGION_AA
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_08_01_BV_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'polygon'
+             *               and containing polygonal_region
+             *                 indicating POLYGON_REGION_AA
+             *             and containing signer_info.digest
+             *               referencing to a CERT_TS_D_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'polygon'
+             *                   and containing polygonal_region
+             *                     indicating POLYGON_REGION_AA
+             *     then
+             *       the IUT accepts the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_08_01_BV * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_08_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -25855,44 +24922,40 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_08_01_BV /** - * @desc Check that the IUT accepts a message when the signing certificate of this message contains the polygonal region validity restriction which is fully inside in the circular region validity restriction of its issuing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_POLYGONAL_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_08_02_BV_AT
-             *      and the IUT current location is inside the POLYGON_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_08_02_BV_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'polygon'
-             *                              containing polygonal_region
-             *                                  indicating POLYGON_REGION_AT
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_B_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'circle'
-             *                                      and containing circular_region
-             *                                          indicating CURCULAR_REGION_AA
-             *                                              fully including POLYGON_REGION_AT
-             *      } then {
-             *          the IUT accepts the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_08_02_BV + * @desc Check that the IUT accepts a message when the signing certificate of this message contains the polygonal region validity restriction which is fully inside in the circular region validity restriction of its issuing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_POLYGONAL_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_08_02_BV_AT
+             *     and the IUT current location is inside the POLYGON_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_08_02_BV_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'polygon'
+             *               and containing polygonal_region
+             *                 indicating POLYGON_REGION_AT
+             *             and containing signer_info.digest
+             *               referencing to a certificate CERT_TS_B_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'circle'
+             *                   and containing circular_region
+             *                     indicating CURCULAR_REGION_AA
+             *                       fully including POLYGON_REGION_AT
+             *     then
+             *       the IUT accepts the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_08_02_BV * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_08_02_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -25940,44 +25003,40 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_08_02_BV /** - * @desc Check that the IUT accepts a message when the signing certificate of this message contains the polygonal region validity restriction which is fully inside in the rectangular region validity restriction of its issuing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_POLYGONAL_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_08_03_BV_AT
-             *      and the IUT current location is inside the POLYGON_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_08_03_BV_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'polygon'
-             *                              containing polygonal_region
-             *                                  indicating POLYGON_REGION_AT
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_C_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'rectangle'
-             *                                      and containing rectangular_region[0]
-             *                                          indicating RECT_REGION_AA
-             *                                              fully including POLYGON_REGION_AT
-             *      } then {
-             *          the IUT accepts the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_08_03_BV + * @desc Check that the IUT accepts a message when the signing certificate of this message contains the polygonal region validity restriction which is fully inside in the rectangular region validity restriction of its issuing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_POLYGONAL_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_08_03_BV_AT
+             *     and the IUT current location is inside the POLYGON_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_08_03_BV_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'polygon'
+             *               and containing polygonal_region
+             *                 indicating POLYGON_REGION_AT
+             *             and containing signer_info.digest
+             *               referencing to a certificate CERT_TS_C_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'rectangular'
+             *                   and containing rectangular_region[0]
+             *                     indicating RECT_REGION_AA
+             *                       fully covering POLYGON_REGION_AT
+             *     then
+             *       the IUT accepts the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_08_03_BV * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_08_03_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -26025,44 +25084,40 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_08_03_BV /** - * @desc Check that the IUT accepts a message when the signing certificate of this message contains the polygonal region validity restriction which is fully inside in the polygonal region validity restriction of its issuing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_POLYGONAL_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_08_04_BV_AT
-             *      and the IUT current location is inside the POLYGON_REGION_AA
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_08_04_BV_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'polygon'
-             *                              containing polygonal_region
-             *                                  indicating POLYGON_REGION_AT
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_D_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'polygon'
-             *                                      and containing polygonal_region[0]
-             *                                          indicating POLYGON_REGION_AA
-             *                                              fully including POLYGON_REGION_AT
-             *      } then {
-             *          the IUT accepts the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_08_04_BV + * @desc Check that the IUT accepts a message when the signing certificate of this message contains the polygonal region validity restriction which is fully inside in the polygonal region validity restriction of its issuing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_POLYGONAL_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_08_04_BV_AT
+             *     and the IUT current location is inside the POLYGON_REGION_AA
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_08_04_BV_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'polygon'
+             *               and containing polygonal_region
+             *                 indicating POLYGON_REGION_AT
+             *             and containing signer_info.digest
+             *               referencing to a CERT_TS_D_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'polygon'
+             *                   and containing polygonal_region
+             *                     indicating POLYGON_REGION_AA
+             *                       fully including POLYGON_REGION_AT
+             *     then
+             *       the IUT accepts the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_08_04_BV * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_08_04_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -26110,49 +25165,45 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_08_04_BV /** - * @desc Check that the IUT accepts a message when the signing certificate of this message contains the polygonal region validity restriction which is fully inside in the identified region validity restriction of its issuing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_POLYGONAL_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_08_05_BV_AT
-             *      and the IUT current location is inside the POLYGON_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_08_05_BV_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'polygon'
-             *                              containing polygonal_region
-             *                                  indicating POLYGON_REGION_AT
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_D_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'id'
-             *                                      and containing id_region
-             *                                          containing region_dictionary
-             *                                              indicating 'iso_3166_1'
-             *                                          and containing local_region
-             *                                              indicating 0
-             *                                          and containing region_identifier
-             *                                              indicating ID_REGION_AT
-             *                                                  fully including POLYGON_REGION_AT
-             *      } then {
-             *          the IUT accepts the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_08_05_BV + * @desc Check that the IUT accepts a message when the signing certificate of this message contains the polygonal region validity restriction which is fully inside in the identified region validity restriction of its issuing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_POLYGONAL_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_08_04_BV_AT
+             *     and the IUT current location is inside the POLYGON_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_08_05_BV_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'polygon'
+             *               and containing polygonal_region
+             *                 indicating POLYGON_REGION_AT
+             *             and containing signer_info.digest
+             *               referencing to a certificate CERT_TS_E_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'id'
+             *                   and containing id_region
+             *                     containing region_dictionary
+             *                       indicating 'iso_3166_1' (0)
+             *                     and containing local_region
+             *                       indicating 0
+             *                     and containing region_identifier
+             *                       indicating ID_REGION_AT
+             *                         fully including POLYGON_REGION_AT
+             *     then
+             *       the IUT accepts the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_08_05_BV * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_08_05_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -26200,37 +25251,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_08_05_BV /** - * @desc Check that the IUT discards a message when the signing certificate of this message does not contain the region validity restriction but its issuing certificate contains the polygonal region validity restriction - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_POLYGONAL_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_08_06_BO_AT
-             *      and the IUT current location is inside the POLYGON_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_08_06_BO_AT)
-             *                          not containing validity_restrictions['region']
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_C_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'rectangle'
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_08_06_BO + * @desc Check that the IUT discards a message when the signing certificate of this message does not contain the region validity restriction but its issuing certificate contains the polygonal region validity restriction + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_POLYGONAL_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_08_06_BO_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_08_06_BO_AT)
+             *             not containing validity_restrictions['region']
+             *             and containing signer_info.digest
+             *               referencing to a CERT_TS_D_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'polygon'
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_08_06_BO * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_08_06_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -26278,44 +25324,40 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_08_06_BO /** - * @desc Check that the IUT discards a message when the signing certificate of this message does not contain the region validity restriction but its issuing certificate contains the polygonal region validity restriction - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_POLYGONAL_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_08_07_BO_AT
-             *      and the IUT current location is inside the POLYGON_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_08_07_BO_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'polygon'
-             *                              containing polygonal_region (POLYGON_REGION_08_04_BO)
-             *                                  indicating length = 2
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_D_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'polygon'
-             *                                      and containing polygonal_region
-             *                                          indicating POLYGON_REGION_AA
-             *                                              fully covering all points of POLYGON_REGION_08_04_BO
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_08_07_BO + * @desc Check that the IUT discards a message when the signing certificate of this message contains polygonal region validity restriction containing less than 3 points + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_POLYGONAL_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_08_07_BO_AT
+             *     and the IUT current location is inside the POLYGON_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_08_07_BO_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'polygon'
+             *               and containing polygonal_region (POLYGON_REGION_08_04_BO)
+             *                 indicating length = 2
+             *             and containing signer_info.digest
+             *               referencing to a CERT_TS_D_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'polygon'
+             *                   and containing polygonal_region
+             *                     indicating POLYGON_REGION_AA
+             *                       fully covering all points of POLYGON_REGION_08_04_BO
+             *      then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_08_07_BO * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_08_07_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -26363,44 +25405,40 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_08_07_BO /** - * @desc Check that the IUT discards a message when the signing certificate of this message contains polygonal region validity restriction which is outside of the polygonal region validity restriction of its issuing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_POLYGONAL_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_08_08_BO_AT
-             *      and the IUT current location is inside the POLYGON_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_08_08_BO_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'polygon'
-             *                              containing polygonal_region
-             *                                  indicating POLYGON_REGION_AT
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_D_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'polygon'
-             *                                      and containing polygonal_region
-             *                                          indicating POLYGON_REGION_AA_OUTSIDE
-             *                                              not including POLYGON_REGION_AT
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_08_08_BO + * @desc Check that the IUT discards a message when the signing certificate of this message contains polygonal region validity restriction which is outside of the polygonal region validity restriction of its issuing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_POLYGONAL_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_08_08_BO_AT
+             *     and the IUT current location is inside the POLYGON_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_08_08_BO_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'polygon'
+             *               and containing polygonal_region
+             *                 indicating POLYGON_REGION_AT
+             *             and containing signer_info.digest
+             *               referencing to a CERT_TS_08_08_BO_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'polygon'
+             *                   and containing polygonal_region
+             *                     indicating POLYGON_REGION_AA_OUTSIDE
+             *                       not including POLYGON_REGION_AT
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_08_08_BO * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_08_08_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -26448,44 +25486,40 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_08_08_BO /** - * @desc Check that the IUT discards a message when the signing certificate of this message contains polygonal region validity restriction which is not fully covered by the the polygonal region validity restriction of its issuing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_POLYGONAL_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_08_09_BO_AT
-             *      and the IUT current location is inside the POLYGON_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_08_09_BO_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'polygon'
-             *                              containing polygonal_region
-             *                                  indicating POLYGON_REGION_AT
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_08_08_BO_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'polygon'
-             *                                      and containing polygonal_region
-             *                                          indicating POLYGON_REGION_AA_INTERSECT
-             *                                              including partialy POLYGON_REGION_AT
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_08_09_BO + * @desc Check that the IUT discards a message when the signing certificate of this message contains polygonal region validity restriction which is not fully covered by the the polygonal region validity restriction of its issuing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_POLYGONAL_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_08_09_BO_AT
+             *     and the IUT current location is inside the POLYGON_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_08_09_BO_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'polygon'
+             *               and containing polygonal_region
+             *                 indicating POLYGON_REGION_AT
+             *             and containing signer_info.digest
+             *               referencing to a CERT_TS_08_09_BO_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'polygon'
+             *                   and containing polygonal_region
+             *                     indicating POLYGON_REGION_AA_INTERSECT
+             *                       including partialy POLYGON_REGION_AT
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_08_09_BO * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_08_09_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -26533,53 +25567,48 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_08_09_BO /** - * @desc Check that the IUT accepts a message when its signing certificate contains the identified region validity restriction with the same identified region as the issuing certificate and without local area definition - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_IDENTIFIED_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_09_01_BV_AT
-             *      and the IUT current location is inside the ID_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_09_01_BV_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'id'
-             *                              and containing id_region
-             *                                  containing region_dictionary
-             *                                      indicating 'iso_3166_1'
-             *                                  and containing region_identifier
-             *                                      indicating ID_REGION_AT
-             *                                  and containing local_region
-             *                                      indicating 0
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_E_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'id'
-             *                                      and containing id_region
-             *                                          containing region_dictionary
-             *                                              indicating 'iso_3166_1'
-             *                                          and containing region_identifier
-             *                                              indicating ID_REGION_AT
-             *                                          and containing local_region
-             *                                              indicating 0
-             *      } then {
-             *          the IUT accepts the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_09_01_BV + * @desc Check that the IUT accepts a message when its signing certificate contains the identified region validity restriction with the same identified region as the issuing certificate and without local area definition + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_IDENTIFIED_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_09_01_BV_AT
+             *     and the IUT current location is inside the ID_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_09_01_BV_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'id'
+             *               and containing id_region
+             *                 containing region_dictionary
+             *                   indicating 'iso_3166_1'
+             *                 and containing region_identifier
+             *                   indicating ID_REGION_AT
+             *                 and containing local_region
+             *                   indicating 0
+             *             containing signer_info.digest
+             *               referencing to a certificate CERT_TS_E_AA
+             *                 containing region_type
+             *                   indicating 'id'
+             *                 and containing id_region
+             *                   containing region_dictionary
+             *                     indicating 'iso_3166_1'
+             *                   and containing region_identifier
+             *                     indicating ID_REGION_AT
+             *                   and containing local_region
+             *                     indicating 0
+             *     then
+             *       the IUT accepts the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_09_01_BV * @reference ETSI TS 103 097 [1], clauses 4.2.26 and 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_09_01_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -26627,53 +25656,48 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_09_01_BV /** - * @desc Check that the IUT accepts a message when its signing certificate contains the identified region validity restriction with the same identified region as the issuing certificate and with local area definition - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_IDENTIFIED_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_09_02_BV_AT
-             *      and the IUT current location is inside the ID_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_09_02_BV_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'id'
-             *                              and containing id_region
-             *                                  containing region_dictionary
-             *                                      indicating 'iso_3166_1'
-             *                                  and containing region_identifier
-             *                                      indicating ID_REGION_AT
-             *                                  and containing local_region
-             *                                      indicating ID_LOCAL_REGION_1
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_E_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'id'
-             *                                      and containing id_region
-             *                                          containing region_dictionary
-             *                                              indicating 'iso_3166_1'
-             *                                          and containing region_identifier
-             *                                              indicating ID_REGION_AT
-             *                                          and containing local_region
-             *                                              indicating 0
-             *      } then {
-             *          the IUT accepts the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_09_02_BV + * @desc Check that the IUT accepts a message when its signing certificate contains the identified region validity restriction with the same identified region as the issuing certificate and with local area definition + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_IDENTIFIED_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_09_02_BV_AT
+             *     and the IUT current location is inside the ID_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_09_02_BV_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'id'
+             *               and containing id_region
+             *                 containing region_dictionary
+             *                   indicating 'iso_3166_1'
+             *                 and containing region_identifier
+             *                   indicating ID_REGION_AT
+             *                 and containing local_region
+             *                   indicating ID_LOCAL_REGION_1
+             *             containing signer_info.digest
+             *               referencing to a certificate CERT_TS_E_AA
+             *                 containing region_type
+             *                   indicating 'id'
+             *                 and containing id_region
+             *                   containing region_dictionary
+             *                     indicating 'iso_3166_1'
+             *                   and containing region_identifier
+             *                     indicating ID_REGION_AT
+             *                   and containing local_region
+             *                     indicating 0
+             *     then
+             *       the IUT accepts the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_09_02_BV * @reference ETSI TS 103 097 [1], clauses 4.2.26 and 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_09_02_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -26721,48 +25745,44 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_09_02_BV /** - * @desc Check that the IUT accepts a message when its signing certificate contains the identified region validity restriction fully containing in the circular validity restriction of its issuing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_IDENTIFIED_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_09_03_BV_AT
-             *      and the IUT current location is inside the ID_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_09_03_BV_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'id'
-             *                              and containing id_region
-             *                                  containing region_dictionary
-             *                                      indicating 'iso_3166_1'
-             *                                  and containing region_identifier
-             *                                      indicating ID_REGION_AT
-             *                                  and containing local_region
-             *                                      indicating 0
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_09_03_BV_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'circle'
-             *                                      and containing circular_region
-             *                                          fully covering ID_REGION_AT
-             *      } then {
-             *          the IUT accepts the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_09_03_BV + * @desc Check that the IUT accepts a message when its signing certificate contains the identified region validity restriction fully containing in the circular validity restriction of its issuing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_IDENTIFIED_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_09_03_BV_AT
+             *     and the IUT current location is inside the ID_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_09_03_BV_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'id'
+             *               and containing id_region
+             *                 containing region_dictionary
+             *                   indicating 'iso_3166_1'
+             *                 and containing region_identifier
+             *                   indicating ID_REGION_AT
+             *                 and containing local_region
+             *                   indicating 0
+             *             and containing signer_info.digest
+             *               referencing to a certificate CERT_TS_09_03_BV_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'circle'
+             *                   and containing circular_region
+             *                     fully covering ID_REGION_AT
+             *     then
+             *       the IUT accepts the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_09_03_BV * @reference ETSI TS 103 097 [1], clauses 4.2.26 and 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_09_03_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -26810,48 +25830,44 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_09_03_BV /** - * @desc Check that the IUT accepts a message when the signing certificate of this message contains the polygonal region validity restriction which is fully inside in the rectangular region validity restriction of its issuing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_IDENTIFIED_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_09_04_BV_AT
-             *      and the IUT current location is inside the ID_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_09_04_BV_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'id'
-             *                              and containing id_region
-             *                                  containing region_dictionary
-             *                                      indicating 'iso_3166_1'
-             *                                  and containing region_identifier
-             *                                      indicating ID_REGION_AT
-             *                                  and containing local_region
-             *                                      indicating 0
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_E_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'rectangle'
-             *                                      and containing rectangular_region[0]
-             *                                          fully covering ID_REGION_AT
-             *      } then {
-             *          the IUT accepts the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_09_04_BV + * @desc Check that the IUT accepts a message when the signing certificate of this message contains the polygonal region validity restriction which is fully inside in the rectangular region validity restriction of its issuing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_IDENTIFIED_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_09_03_BV_AT
+             *     and the IUT current location is inside the ID_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_09_04_BV_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'id'
+             *               and containing id_region
+             *                 containing region_dictionary
+             *                   indicating 'iso_3166_1'
+             *                 and containing region_identifier
+             *                   indicating ID_REGION_AT
+             *                 and containing local_region
+             *                   indicating 0
+             *             and containing signer_info.digest
+             *               referencing to a certificate CERT_TS_09_04_BV_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'rectangular'
+             *                   containing rectangular_region[0]
+             *                     fully covering ID_REGION_AT
+             *     then
+             *       the IUT accepts the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_09_04_BV * @reference ETSI TS 103 097 [1], clauses 4.2.26 and 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_09_04_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -26899,48 +25915,44 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_09_04_BV /** - * @desc Check that the IUT accepts a message when the signing certificate of this message contains the polygonal region validity restriction which is fully inside in the polygonal region validity restriction of its issuing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_IDENTIFIED_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_09_05_BV_AT
-             *      and the IUT current location is inside the ID_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_09_05_BV_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'id'
-             *                              and containing id_region
-             *                                  containing region_dictionary
-             *                                      indicating 'iso_3166_1'
-             *                                  and containing region_identifier
-             *                                      indicating ID_REGION_AT
-             *                                  and containing local_region
-             *                                      indicating 0
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_E_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'polygon'
-             *                                      and containing polygonal_region
-             *                                          fully covering ID_REGION_AT
-             *      } then {
-             *          the IUT accepts the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_09_05_BV + * @desc Check that the IUT accepts a message when the signing certificate of this message contains the polygonal region validity restriction which is fully inside in the polygonal region validity restriction of its issuing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_IDENTIFIED_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_09_05_BV_AT
+             *     and the IUT current location is inside the ID_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_09_05_BV_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'id'
+             *               and containing id_region
+             *                 containing region_dictionary
+             *                   indicating 'iso_3166_1'
+             *                 and containing region_identifier
+             *                   indicating ID_REGION_AT
+             *                 and containing local_region
+             *                   indicating 0
+             *             and containing signer_info.digest
+             *               referencing to a certificate CERT_TS_09_05_BV_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'polygon'
+             *                   and containing polygonal_region
+             *                     fully covering ID_REGION_AT
+             *     then
+             *       the IUT accepts the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_09_05_BV * @reference ETSI TS 103 097 [1], clauses 4.2.26 and 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_09_05_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -26988,54 +26000,50 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_09_05_BV /** - * @desc Check that the IUT accepts a message when the signing certificate of the message contains the identified region validity restriction with the identified region which is fully covered by the identified region of the validity restriction of its issuing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_IDENTIFIED_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_09_06_BV_AT
-             *      and the IUT current location is inside the ID_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_09_06_BV_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'id'
-             *                              and containing id_region
-             *                                  containing region_dictionary
-             *                                      indicating 'iso_3166_1'
-             *                                  and containing region_identifier
-             *                                      indicating ID_REGION_AT
-             *                                  and containing local_region
-             *                                      indicating 0
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_E_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'id'
-             *                                      and containing id_region
-             *                                          containing region_dictionary
-             *                                              indicating 'un_stats'
-             *                                          and containing region_identifier
-             *                                              indicating ID_REGION_AA_UNSTATS
-             *                                                  which includes ID_REGION_AT
-             *                                          and containing local_region
-             *                                              indicating 0
-             *      } then {
-             *          the IUT accepts the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_09_06_BV + * @desc Check that the IUT accepts a message when the signing certificate of the message contains the identified region validity restriction with the identified region which is fully covered by the identified region of the validity restriction of its issuing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_IDENTIFIED_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_09_06_BV_AT
+             *     and the IUT current location is inside the ID_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_09_06_BV_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'id'
+             *               and containing id_region
+             *                 containing region_dictionary
+             *                   indicating 'un_stats'
+             *                 and containing region_identifier
+             *                   indicating ID_REGION_AT
+             *                 and containing local_region
+             *                   indicating 0
+             *             and containing signer_info.digest
+             *               referencing to a CERT_TS_09_06_BV_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'id'
+             *                   and containing id_region
+             *                     containing region_dictionary
+             *                       indicating 'un_stats'
+             *                     and containing region_identifier
+             *                       indicating ID_REGION_AA_UNSTATS
+             *                         which includes ID_REGION_AT
+             *                     and containing local_region
+             *                       indicating 0
+             *     then
+             *       the IUT accepts the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_09_06_BV * @reference ETSI TS 103 097 [1], clauses 4.2.26 and 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_09_06_BV() runs on ItsGeoNetworking system ItsSecSystem { @@ -27083,37 +26091,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_09_06_BV /** - * @desc Check that the IUT discards a message when the signing certificate of this message does not contain the region validity restriction but its issuing certificate contains the identified region validity restriction - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_IDENTIFIED_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_09_07_BO_AT
-             *      and the IUT current location is inside the ID_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_09_07_BO_AT)
-             *                          not containing validity_restrictions['region']
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_E_AA
-             *                                  containing validity_restrictions['region']
-             *                                      containing region_type
-             *                                          indicating 'id'
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_09_07_BO + * @desc Check that the IUT discards a message when the signing certificate of this message does not contain the region validity restriction but its issuing certificate contains the identified region validity restriction + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_IDENTIFIED_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_09_07_BO_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_09_07_BO_AT)
+             *             not containing validity_restrictions['region']
+             *             and containing signer_info.digest
+             *               referencing to the certificate CERT_TS_E_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'id'
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_09_07_BO * @reference ETSI TS 103 097 [1], clauses 4.2.26 and 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_09_07_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -27161,53 +26164,50 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_09_07_BO /** - * @desc Check that the IUT discards a message when the signing certificate and its issuing certificate are both containing the identified region validity restrictions with the same region id but different local regions - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_IDENTIFIED_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_09_08_BO_AT
-             *      and the IUT current location is inside the ID_REGION_AA, local region 1
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_09_08_BO_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'id'
-             *                              and containing id_region
-             *                                  containing region_dictionary
-             *                                      indicating 'iso_3166_1'
-             *                                  and containing region_identifier
-             *                                      indicating ID_REGION_AT
-             *                                  and containing local_region
-             *                                      indicating ID_LOCAL_REGION_1
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_09_08_BO_AA
-             *                                  containing validity_restrictions['region']
-             *                                          indicating 'id'
-             *                                  and containing id_region
-             *                                      containing region_dictionary
-             *                                          indicating 'iso_3166_1'
-             *                                      and containing region_identifier
-             *                                          indicating ID_REGION_AA
-             *                                      and containing local_region
-             *                                          indicating ID_LOCAL_REGION_2
-             *                                              not equal to ID_LOCAL_REGION_1
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_09_08_BO + * @desc Check that the IUT discards a message when the signing certificate and its issuing certificate are both containing the identified region validity restrictions with the same region id but different local regions + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_IDENTIFIED_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_09_08_BO_AT
+             *     and the IUT current location is inside the ID_REGION_AA, local region 1
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_09_08_BO_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'id'
+             *               and containing id_region
+             *                 containing region_dictionary
+             *                   indicating 'iso_3166_1'
+             *                 containing region_identifier
+             *                   indicating ID_REGION_AA
+             *                 containing local_region
+             *                   indicating ID_LOCAL_REGION_1
+             *             containing signer_info.digest
+             *               referencing to a CERT_TS_09_08_BO_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'id'
+             *                   containing id_region
+             *                     containing region_dictionary
+             *                       indicating 'iso_3166_1'
+             *                     containing region_identifier
+             *                       indicating ID_REGION_AA
+             *                     containing local_region
+             *                       indicating ID_LOCAL_REGION_2
+             *                         not equal to ID_LOCAL_REGION_1
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_09_08_BO * @reference ETSI TS 103 097 [1], clauses 4.2.26 and 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_09_08_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -27255,53 +26255,50 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_09_08_BO /** - * @desc Check that the IUT discards a message when the identified region of the validity restriction of its signing certificate is different and not fully covered by the one in the issuing certificate - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_IDENTIFIED_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_09_09_BO_AT
-             *      and the IUT current location is inside the ID_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_09_09_BO_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'id'
-             *                              and containing id_region
-             *                                  containing region_dictionary
-             *                                      indicating 'iso_3166_1'
-             *                                  and containing region_identifier
-             *                                      indicating ID_REGION_AT
-             *                                  and containing local_region
-             *                                      indicating 0
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_09_09_BO_AA
-             *                                  containing validity_restrictions['region']
-             *                                          indicating 'id'
-             *                                  and containing id_region
-             *                                      containing region_dictionary
-             *                                          indicating 'iso_3166_1'
-             *                                      and containing region_identifier
-             *                                          indicating ID_REGION_AA_OTHER
-             *                                              other than ID_REGION_AT
-             *                                      and containing local_region
-             *                                          indicating 0
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_09_09_BO + * @desc Check that the IUT discards a message when the identified region of the validity restriction of its signing certificate is different and not fully covered by the one in the issuing certificate + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_IDENTIFIED_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_09_09_BO_AT
+             *     and the IUT current location is inside the ID_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_09_09_BO_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'id'
+             *               and containing id_region
+             *                 containing region_dictionary
+             *                   indicating 'iso_3166_1'
+             *                 and containing region_identifier
+             *                   indicating ID_REGION_AT
+             *                 and containing local_region
+             *                   indicating 0
+             *             containing signer_info.digest
+             *               referencing to a CERT_TS_09_09_BO_AA
+             *                 containing validity_restrictions['region']
+             *                   containing region_type
+             *                     indicating 'id'
+             *                   and containing id_region
+             *                     containing region_dictionary
+             *                       indicating 'iso_3166_1'
+             *                     and containing region_identifier
+             *                       indicating ID_REGION_AA_OTHER
+             *                         other than ID_REGION_AT
+             *                     and containing local_region
+             *                       indicating 0
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_09_09_BO * @reference ETSI TS 103 097 [1], clauses 4.2.26 and 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_09_09_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -27349,44 +26346,41 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_09_09_BO /** - * @desc Check that the IUT discards a message when the identified region validity restriction of its signing certificate contains unknown area code - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_IDENTIFIED_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_09_10_BO_AT
-             *      and the IUT current location is inside the ID_REGION_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_09_10_BO_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'id'
-             *                              and containing id_region
-             *                                  containing region_dictionary
-             *                                      indicating 'iso_3166_1'
-             *                                  and containing region_identifier
-             *                                      indicating ID_REGION_UNKNOWN
-             *                                  and containing local_region
-             *                                      indicating 0
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_A_AA
-             *                                  not containing validity_restrictions['region']
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_09_10_BO + * @desc Check that the IUT discards a message when the identified region validity restriction of its signing certificate contains unknown area code + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_IDENTIFIED_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_09_10_BO_AT
+             *     and the IUT current location is inside the ID_REGION_AT
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_09_10_BO_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'id'
+             *               and containing id_region
+             *                 containing region_dictionary
+             *                   indicating 'iso_3166_1'
+             *                 and containing region_identifier
+             *                   indicating ID_REGION_UNKNOWN
+             *                     not existing in ISO 3166-1
+             *                 and containing local_region
+             *                   indicating 0
+             *             and containing signer_info.digest
+             *               referencing to a CERT_TS_A_AA
+             *                 not containing validity_restrictions['region']
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_09_10_BO * @reference ETSI TS 103 097 [1], clauses 4.2.26 and 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_09_10_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -27434,44 +26428,40 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_09_10_BO /** - * @desc Check that the IUT discards a message when the validity restriction of its signing certificate contains the identified region of type iso-3166-1 but region code is from the UN-Stats dictionary - *
-             * Pics Selection: PICS_GN_SECURITY and PICS_USE_IDENTIFIED_REGION
-             * Config Id: CF01
-             * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_09_11_BO_AT
-             *      and the IUT current location is inside the ID_REGION_AA_UNSTATS
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_09_11_BO_AT)
-             *                          containing validity_restrictions['region']
-             *                              containing region_type
-             *                                  indicating 'id'
-             *                              and containing id_region
-             *                                  containing region_dictionary
-             *                                      indicating 'iso_3166_1'
-             *                                  and containing region_identifier
-             *                                      indicating ID_REGION_AA_UNSTATS
-             *                                  and containing local_region
-             *                                      indicating 0
-             *                          and containing signer_info.digest
-             *                              referencing to a CERT_TS_A_AA
-             *                                  not containing validity_restrictions['region']
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_09_11_BO + * @desc Check that the IUT discards a message when the validity restriction of its signing certificate contains the identified region of type iso-3166-1 but region code is from the UN-Stats dictionary + *
+             * Pics Selection: PICS_GN_SECURITY AND PICS_USE_IDENTIFIED_REGION
+             * Config Id: CF01
+             * Initial conditions:
+             *   with
+             *     the IUT being in the 'authorized' state
+             *     and the IUT current time is inside the time validity period of CERT_TS_09_11_BO_AT
+             *     and the IUT current location is inside the  ID_REGION_AA_UNSTATS
+             * Expected results:
+             *   ensure that
+             *     when the IUT is receiving a SecuredMessage
+             *       containing header_fields ['signer_info']
+             *         containing signer
+             *           containing type
+             *             indicating 'certificate'
+             *           and containing certificate (CERT_TS_09_11_BO_AT)
+             *             containing validity_restrictions['region']
+             *               containing region_type
+             *                 indicating 'id'
+             *               and containing id_region
+             *                 containing region_dictionary
+             *                   indicating 'iso_3166_1'
+             *                 and containing region_identifier
+             *                   indicating ID_REGION_AA_UNSTATS
+             *                 and containing local_region
+             *                   indicating 0
+             *             and containing signer_info.digest
+             *               referencing to a CERT_TS_A_AA
+             *                 not containing validity_restrictions['region']
+             *     then
+             *       the IUT discards the message
+             * 
+ * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_09_11_BO * @reference ETSI TS 103 097 [1], clauses 4.2.26 and 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_09_11_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -27519,34 +26509,28 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_09_11_BO /** - * @desc Check that the IUT discards a message when its signing certificate does not contain the time validity restriction + * @desc Check that the IUT discards a message when its signing certificate does not contain the time validity restriction *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_10_01_BO_AT
-             *      and the IUT current location is inside the CERT_TS_10_01_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_10_01_BO_AT)
-             *                          containing validity_restrictions['time_start_and_end']
-             *                          and not containing validity_restrictions['time_end']
-             *                          and not containing validity_restrictions['time_start_and_duration']
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_10_01_BO + * with + * the IUT being in the 'authorized' state + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * containing certificate (CERT_TS_10_01_BO_AT) + * not containing validity_restrictions['time_start_and_end'] + * and not containing validity_restrictions['time_end'] + * and not containing validity_restrictions['time_start_and_duration'] + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_10_01_BO * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_10_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -27594,35 +26578,29 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_10_01_BO /** - * @desc Check that the IUT discards a message when the issuing certificate of the message signing certificate does not contain the time validity restriction + * @desc Check that the IUT discards a message when the issuing certificate of the message signing certificate does not contain the time validity restriction *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current location is inside the CERT_TS_10_02_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_10_02_BO_AT)
-             *                          containing signer_info.digest
-             *                              referencing to CERT_TS_10_02_BO_AA
-             *                                  containing validity_restrictions['time_start_and_end']
-             *                                  and not containing validity_restrictions['time_end']
-             *                                  and not containing validity_restrictions['time_start_and_duration']
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_10_02_BO + * with + * the IUT being in the 'authorized' state + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'].signer + * containing type + * indicating 'certificate' + * containing certificate (CERT_TS_10_02_BO_AT) + * containing signer_info.digest + * referencing to CERT_TS_10_02_BO_AA + * not containing validity_restrictions['time_start_and_end'] + * and not containing validity_restrictions['time_end'] + * and not containing validity_restrictions['time_start_and_duration'] + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_10_02_BO * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_10_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -27670,32 +26648,27 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_10_02_BO /** - * @desc Check that the IUT discards a message when its signing certificate contains 'time_end' validity restriction + * @desc Check that the IUT discards a message when its signing certificate contains 'time_end' validity restriction *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is less then time_end validity restricyion of CERT_TS_10_03_BO_AT
-             *      and the IUT current location is inside the CERT_TS_10_02_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_10_03_BO_AT)
-             *                          containing validity_restrictions['time_end']
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_10_03_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is less then time_end validity restricyion of CERT_TS_10_03_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * containing certificate (CERT_TS_10_03_BO_AT) + * containing validity_restrictions['time_end'] + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_10_03_BO * @reference ETSI TS 103 097 [1], clauses 7.4.2 & 7.4.4 */ testcase TC_SEC_ITSS_RCV_CERT_10_03_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -27743,32 +26716,27 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_10_03_BO /** - * @desc Check that the IUT discards a message when its signing certificate contains 'time_start_and_duration' validity restriction + * @desc Check that the IUT discards a message when its signing certificate contains 'time_start_and_duration' validity restriction *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_10_04_BO_AT
-             *      and the IUT current location is inside the CERT_TS_10_04_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_10_04_BO_AT)
-             *                          containing validity_restrictions['time_start_and_duration']
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_10_04_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_10_04_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * containing certificate (CERT_TS_10_04_BO_AT) + * containing validity_restrictions['time_start_and_duration'] + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_10_04_BO * @reference ETSI TS 103 097 [1], clauses 7.4.2 & 7.4.4 */ testcase TC_SEC_ITSS_RCV_CERT_10_04_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -27816,34 +26784,28 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_10_04_BO /** - * @desc Check that the IUT discards a message when the issuing certificate of the message signing certificate contains 'time_end' validity restriction + * @desc Check that the IUT discards a message when the issuing certificate of the message signing certificate contains 'time_end' validity restriction *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is less then time_end validity restricyion of CERT_TS_10_05_BO_AT
-             *      and the IUT current location is inside the CERT_TS_10_05_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_10_05_BO_AT)
-             *                          containing signer_info.digest
-             *                              referencing to CERT_TS_10_05_BO_AA
-             *                                  containing validity_restrictions['time_end']
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_10_05_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is less then time_end validity restricyion of CERT_TS_10_05_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'].signer + * containing type + * indicating 'certificate' + * containing certificate (CERT_TS_10_05_BO_AT) + * containing signer_info.digest + * referencing to CERT_TS_10_05_BO_AA + * containing validity_restrictions['time_end'] + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_10_05_BO * @reference ETSI TS 103 097 [1], clauses 7.4.2 & 7.4.4 */ testcase TC_SEC_ITSS_RCV_CERT_10_05_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -27891,34 +26853,28 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_10_05_BO /** - * @desc Check that the IUT discards a message when its signing certificate contains 'time_start_and_duration' validity restriction + * @desc Check that the IUT discards a message when its signing certificate contains 'time_start_and_duration' validity restriction *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is less then time_end validity restricyion of CERT_TS_10_06_BO_AT
-             *      and the IUT current location is inside the CERT_TS_10_06_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields['signer_info']
-             *                  and containing signer 
-             *                      containing type
-             *                          indicating 'certificate'
-             *                      and containing certificate (CERT_TS_10_06_BO_AT)
-             *                          containing signer_info.digest
-             *                              referencing to CERT_TS_10_06_BO_AA
-             *                                  containing validity_restrictions['time_start_and_duration']
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_10_06_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is less then time_end validity restricyion of CERT_TS_10_06_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'].signer + * containing type + * indicating 'certificate' + * containing certificate (CERT_TS_10_06_BO_AT) + * containing signer_info.digest + * referencing to CERT_TS_10_06_BO_AA + * containing validity_restrictions['time_start_and_duration'] + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_10_06_BO * @reference ETSI TS 103 097 [1], clauses 7.4.2 & 7.4.4 */ testcase TC_SEC_ITSS_RCV_CERT_10_06_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -27966,38 +26922,35 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_10_06_BO /** - * @desc Check that the IUT discards a message when the validity period of the signing certificate ends after the validity period of its issuing certificate + * @desc Check that the IUT discards a message when the validity period of the signing certificate ends after the validity period of its issuing certificate *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is greater than START_VALIDITY_AA and less than END_VALIDITY_AA
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields ['signer_info'].signer.certificate (CERT_TS_11_01_BO_AT)
-             *                  containing signer_info.digest
-             *                      referencing to CERT_TS_A_AA
-             *                          containing validity_restrictions['time_start_and_end']
-             *                              containing start_validity
-             *                                  indicating START_VALIDITY_AA
-             *                              and containing end_validity
-             *                                  indicating END_VALIDITY_AA
-             *              and containing validity_restrictions['time_start_and_end'] 
-             *                  containing start_validity
-             *                      indicating START_VALIDITY_AA
-             *                  and containing end_validity
-             *                      indicating END_VALIDITY_AA + 1d
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_11_01_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is greater than START_VALIDITY_AA and less than END_VALIDITY_AA + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'].signer.certificate (CERT_TS_11_01_BO_AT) + * containing signer_info.digest + * referencing to CERT_TS_A_AA + * containing validity_restrictions['time_start_and_end'] + * containing start_validity + * indicating START_VALIDITY_AA + * containing end_validity + * indicating END_VALIDITY_AA + * containing validity_restrictions['time_start_and_end'] + * containing start_validity + * indicating START_VALIDITY_AA + * containing end_validity + * indicating END_VALIDITY_AA + 1d + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_11_01_BO * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_11_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -28045,38 +26998,34 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_11_01_BO /** - * @desc Check that the IUT discards a message when the validity period of its signing certificate starts before the validity period of the issuing certificate + * @desc Check that the IUT discards a message when the validity period of its signing certificate starts before the validity period of the issuing certificate *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is greater than START_VALIDITY_AA and less than END_VALIDITY_AA
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields ['signer_info'].signer.certificate (CERT_TS_11_02_BO_AT)
-             *                  containing signer_info.digest
-             *                      referencing to CERT_TS_A_AA
-             *                          containing validity_restrictions['time_start_and_end']
-             *                              containing start_validity
-             *                                  indicating START_VALIDITY_AA
-             *                              and containing end_validity
-             *                                  indicating END_VALIDITY_AA
-             *              and containing validity_restrictions['time_start_and_end'] 
-             *                  containing start_validity
-             *                      indicating START_VALIDITY_AA - 1d
-             *                  and containing end_validity
-             *                      indicating END_VALIDITY_AA
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_11_02_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is greater than START_VALIDITY_AA and less than END_VALIDITY_AA + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'].signer.certificate (CERT_TS_11_02_BO_AT) + * containing signer_info.digest + * referencing to CERT_TS_A_AA + * containing validity_restrictions['time_start_and_end'] + * containing start_validity + * indicating START_VALIDITY_AA + * and containing end_validity + * indicating END_VALIDITY_AA + * and containing validity_restrictions['time_start_and_end'] + * containing start_validity + * indicating START_VALIDITY_AA - 1d + * and containing end_validity + * indicating END_VALIDITY_AA + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_11_02_BO * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_11_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -28124,38 +27073,34 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_11_02_BO /** - * @desc Check that the IUT discards a message when the issuing certificate of signing certificate is expired but the signing certificate is not expired yet. + * @desc Check that the IUT discards a message when the issuing certificate of signing certificate is expired but the signing certificate is not expired yet. *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is greater than START_VALIDITY_AA and less than END_VALIDITY_AA
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields ['signer_info'].signer.certificate (CERT_TS_11_03_BO_AT)
-             *                  containing signer_info.digest
-             *                      referencing to CERT_TS_A_AA
-             *                          containing validity_restrictions['time_start_and_end']
-             *                              containing start_validity
-             *                                  indicating START_VALIDITY_AA - 365d
-             *                              and containing end_validity
-             *                                  indicating END_VALIDITY_AA - 1d
-             *              and containing validity_restrictions['time_start_and_end'] 
-             *                  containing start_validity
-             *                      indicating START_VALIDITY_AA - 365d
-             *                  and containing end_validity
-             *                      indicating END_VALIDITY_AA
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_11_03_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is greater than START_VALIDITY_AA and less than END_VALIDITY_AA + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'].signer.certificate (CERT_TS_11_03_BO_AT) + * containing signer_info.digest + * referencing to CERT_TS_11_03_BO_AA + * containing validity_restrictions['time_start_and_end'] + * containing start_validity + * indicating START_VALIDITY_AA - 365d + * and containing end_validity + * indicating START_VALIDITY_AA - 1d + * and containing validity_restrictions['time_start_and_end'] + * containing start_validity + * indicating START_VALIDITY_AA - 365d + * and containing end_validity + * indicating END_VALIDITY_AA + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_11_03_BO * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_11_03_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -28203,38 +27148,34 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_11_03_BO /** - * @desc Check that the IUT discards a message when the validity period of the signing certificate is after the validity period of its issuing certificate + * @desc Check that the IUT discards a message when the validity period of the signing certificate is after the validity period of its issuing certificate *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is greater than START_VALIDITY_AA and less than END_VALIDITY_AA
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage
-             *              containing header_fields ['signer_info'].signer.certificate (CERT_TS_11_04_BO_AT)
-             *                  containing signer_info.digest
-             *                      referencing to CERT_TS_A_AA
-             *                          containing validity_restrictions['time_start_and_end']
-             *                              containing start_validity
-             *                                  indicating START_VALIDITY_AA
-             *                              and containing end_validity
-             *                                  indicating END_VALIDITY_AA + 365d
-             *              and containing validity_restrictions['time_start_and_end'] 
-             *                  containing start_validity
-             *                      indicating START_VALIDITY_AA
-             *                  and containing end_validity
-             *                      indicating END_VALIDITY_AA + 365d
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_11_04_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is greater than START_VALIDITY_AA and less than END_VALIDITY_AA + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'].signer.certificate (CERT_TS_11_04_BO_AT) + * containing signer_info.digest + * referencing to CERT_TS_11_04_BO_AA + * containing validity_restrictions['time_start_and_end'] + * containing start_validity + * indicating END_VALIDITY_AA + * and containing end_validity + * indicating END_VALIDITY_AA + 365d + * and containing validity_restrictions['time_start_and_end'] + * containing start_validity + * indicating START_VALIDITY_AA + * and containing end_validity + * indicating END_VALIDITY_AA +365d + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_11_04_BO * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_11_04_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -28282,27 +27223,27 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_11_04_BO /** - * @desc Check that the IUT discards a message when its signing certificate does not contain the SSP-AID subject attribute + * @desc Check that the IUT discards a message when its signing certificate does not contain the SSP-AID subject attribute *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_12_01_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a SecuredMessage 
-             *              containing header_fields ['signer_info'].signer.certificate (CERT_TS_12_01_BO_AT)
-             *                  not containing subject_attributes['its_aid_ssp_list']
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_12_01_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_12_01_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_12_01_BO_AT) + * not containing subject_attributes['its_aid_ssp_list'] + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_12_01_BO * @reference ETSI TS 103 097 [1], clause 7.4.2 */ testcase TC_SEC_ITSS_RCV_CERT_12_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -28350,36 +27291,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_12_01_BO /** - * @desc Check that the IUT discards a Secured CAM when its signing certificate does not contain a record with AID_CAM in the its_aid_ssp_list subject attribute + * @desc Check that the IUT discards a Secured CAM when its signing certificate does not contain a record with AID_CAM in the its_aid_ssp_list subject attribute *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_12_02_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_01)
-             *              containing header_fields ['its_aid']
-             *                      containing its_aid
-             *                          indicating 'AID_CAM'
-             *              and containing header_fields ['signer_info']
-             *                  containing signer
-             *                      containing certificate 
-             *                          indicating CERT_TS_12_02_BO_AT
-             *                              containing subject_attributes['its_aid_ssp_list']
-             *                                  not containing an item
-             *                                      containing its_aid
-             *                                          indicating 'AID_CAM'
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_12_02_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_12_02_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_01) + * containing header_fields ['its_aid'] + * containing its_aid + * indicating 'AID_CAM' + * and containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_12_02_BO_AT) + * containing subject_attributes['its_aid_ssp_list'] + * not containing an item + * containing its_aid + * indicating 'AID_CAM' + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_12_02_BO * @reference ETSI TS 103 097 [1], clause 7.4.2 */ testcase TC_SEC_ITSS_RCV_CERT_12_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -28427,36 +27365,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_12_02_BO /** - * @desc Check that the IUT discards a Secured DENM when its signing certificate does not contain a record with AID_DENM in the its_aid_ssp_list subject attribute + * @desc Check that the IUT discards a Secured DENM when its signing certificate does not contain a record with AID_DENM in the its_aid_ssp_list subject attribute *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_12_03_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a Secured DENM (MSG_SEC_RCV_DENM_A)
-             *              containing header_fields ['its_aid']
-             *                      containing its_aid
-             *                          indicating 'AID_DENM'
-             *              and containing header_fields ['signer_info']
-             *                  containing signer
-             *                      containing certificate 
-             *                          indicating CERT_TS_12_03_BO_AT
-             *                              containing subject_attributes['its_aid_ssp_list']
-             *                                  not containing an item
-             *                                      containing its_aid
-             *                                          indicating 'AID_DENM'
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_12_03_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_12_03_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a Secured DENM (MSG_SEC_RCV_DENM_A) + * containing header_fields ['its_aid'] + * containing its_aid + * indicating 'AID_DENM' + * and containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_12_03_BO_AT) + * containing subject_attributes['its_aid_ssp_list'] + * not containing an item + * containing its_aid + * indicating 'AID_DENM' + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_12_03_BO * @reference ETSI TS 103 097 [1], clause 7.4.2 */ testcase TC_SEC_ITSS_RCV_CERT_12_03_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -28504,38 +27439,34 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_12_03_BO /** - * @desc Check that the IUT discards a Secured CAM when its signing certificate contains two records with AID_CAM in the its_aid_ssp_list subject attribute + * @desc Check that the IUT discards a Secured CAM when its signing certificate contains two records with AID_CAM in the its_aid_ssp_list subject attribute *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is greater than START_VALIDITY_AA and less than END_VALIDITY_AA
-             *      and the IUT current location is inside the CERT_TS_12_04_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_01)
-             *              containing header_fields ['its_aid']
-             *                      containing its_aid
-             *                          indicating 'AID_CAM'
-             *              and containing header_fields ['signer_info']
-             *                  containing signer
-             *                      containing certificate 
-             *                          indicating CERT_TS_12_04_BO_AT
-             *                              containing subject_attributes['its_aid_ssp_list']
-             *                                  containing item [0].its_aid
-             *                                      indicating 'AID_CAM'
-             *                                  and containing item [1].its_aid
-             *                                      indicating 'AID_CAM'
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_12_04_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_12_04_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_01) + * containing header_fields ['its_aid'] + * containing its_aid + * indicating 'AID_CAM' + * and containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_12_04_BO_AT) + * containing subject_attributes['its_aid_ssp_list'] + * containing item [0].its_aid + * indicating 'AID_CAM' + * and containing item [1].its_aid + * indicating 'AID_CAM' + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_12_04_BO * @reference ETSI TS 103 097 [1], clause 7.4.2 */ testcase TC_SEC_ITSS_RCV_CERT_12_04_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -28583,34 +27514,30 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_12_04_BO /** - * @desc Check that the IUT discards a message when the signing AT certificate contains a CAM AID-SSP record whereas the issuing AA certificate does not contain the record with AID_CAM + * @desc Check that the IUT discards a message when the signing AT certificate contains a CAM AID-SSP record whereas the issuing AA certificate does not contain the record with AID_CAM *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_13_01_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_01)
-             *              containing header_fields ['signer_info'].signer.certificate (CERT_TS_13_01_BO_AT)
-             *                  containing signer_info.digest
-             *                      referencing to CERT_TS_13_01_BO_AA
-             *                          containing validity_restrictions['its_aid_list']
-             *                              not containing 'AID_CAM'
-             *              and containing validity_restrictions['its_aid_ssp_list']
-             *                  containing a record
-             *                      containing its_aid
-             *                          indicating 'AID_CAM'
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_13_01_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_13_01_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_01) + * containing header_fields ['signer_info'].signer.certificate (CERT_TS_13_01_BO_AT) + * containing signer_info.digest + * referencing to CERT_TS_13_01_BO_AA + * containing subject_attributes['its_aid_list'] + * not containing 'AID_CAM' + * and containing subject_attributes['its_aid_ssp_list'] + * containing a record + * containing its_aid + * indicating 'AID_CAM' + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_13_01_BO * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_13_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -28658,34 +27585,30 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_13_01_BO /** - * @desc Check that the IUT discards a message when the signing AT certificate contains a DENM AID-SSP record whereas the issuing AA certificate does not contain the AID record with AID_DENM + * @desc Check that the IUT discards a message when the signing AT certificate contains a DENM AID-SSP record whereas the issuing AA certificate does not contain the AID record with AID_DENM *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_13_02_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a Secured DENM (MSG_SEC_RCV_DENM_A)
-             *              containing header_fields ['signer_info'].signer.certificate (CERT_TS_13_02_BO_AT)
-             *                  containing signer_info.digest
-             *                      referencing to CERT_TS_13_02_BO_AA
-             *                          containing validity_restrictions['its_aid_list']
-             *                              not containing 'AID_DENM'
-             *              and containing validity_restrictions['its_aid_ssp_list']
-             *                  containing a record
-             *                      containing its_aid
-             *                          indicating 'AID_DENM'
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_13_02_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_13_02_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a Secured DENM (MSG_SEC_RCV_DENM_A) + * containing header_fields ['signer_info'].signer.certificate (CERT_TS_13_02_BO_AT) + * containing signer_info.digest + * referencing to CERT_TS_13_02_BO_AA + * containing subject_attributes['its_aid_list'] + * not containing 'AID_DENM' + * and containing subject_attributes['its_aid_ssp_list'] + * containing a record + * containing its_aid + * indicating 'AID_DENM' + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_13_02_BO * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_13_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -28733,29 +27656,25 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_13_02_BO /** - * @desc Check that IUT discards a SecuredMessage if the AA certificate does not contain a subject_attribute of type its_aid_list + * @desc Check that IUT discards a SecuredMessage if the AA certificate does not contain a subject_attribute of type its_aid_list *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_13_03_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_01)
-             *              containing header_fields ['signer_info'].signer.certificate (CERT_TS_13_03_BO_AT)
-             *                  containing signer_info.digest
-             *                      referencing to CERT_TS_13_03_BO_AA
-             *                          not containing validity_restrictions['its_aid_list']
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_13_03_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_13_03_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_01) + * containing header_fields ['signer_info'].signer.certificate (CERT_TS_13_03_BO_AT) + * containing signer_info.digest + * referencing to CERT_TS_13_03_BO_AA + * not containing subject_attributes['its_aid_list'] + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_13_03_BO * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_13_03_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -28803,32 +27722,31 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_13_03_BO /** - * @desc Check that IUT discards the AT certificate with signer info of type 'certificate' + * @desc Check that IUT discards the AT certificate with signer info of type 'certificate' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_14_01_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_01)
-             *              containing header_fields ['signer_info'].signer.type
-             *                  indicating 'certificate'
-             *              and containing certificate (CERT_TS_14_01_BO_AT)
-             *                  containing signer_info.type
-             *                      indicating 'certificate'
-             *                      and containing certificate
-             *                          indicating CERT_TS_AA_A
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_14_01_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_14_01_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_14_01_BO_AT) + * containing signer_info + * containing type + * indicating 'certificate' + * and containing certificate + * indicating CERT_TS_AA_A + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_14_01_BO * @reference ETSI TS 103 097 [1], clause 7.4.2 */ testcase TC_SEC_ITSS_RCV_CERT_14_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -28876,34 +27794,32 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_14_01_BO /** - * @desc Check that IUT discards the AT certificate with signer info of type 'certificate_chain' + * @desc Check that IUT discards the AT certificate with signer info of type 'certificate_chain' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_14_02_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_01)
-             *              containing header_fields ['signer_info'].signer.type
-             *                  indicating 'certificate'
-             *              and containing certificate (CERT_TS_14_02_BO_AT)
-             *                  containing signer_info.type
-             *                      indicating 'certificate_chain'
-             *                      and containing certificates[0]
-             *                          indicating certificate (CERT_TEST_ROOT)
-             *                      and containing certificates[1]
-             *                          indicating certificate (CERT_TS_AA_A)
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_14_02_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_14_02_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_14_02_BO_AT) + * containing signer_info + * containing type + * indicating 'certificate_chain' + * and containing certificates[0] + * indicating certificate (CERT_TEST_ROOT) + * and containing certificates[1] + * indicating certificate (CERT_TS_AA_A) + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_14_02_BO * @reference ETSI TS 103 097 [1], clause 7.4.2 */ testcase TC_SEC_ITSS_RCV_CERT_14_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -28951,32 +27867,31 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_14_02_BO /** - * @desc Check that IUT discards the AT certificate with signer info of type 'certificate_digest_with_other_algorithm' + * @desc Check that IUT discards the AT certificate with signer info of type 'certificate_digest_with_other_algorithm' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_14_03_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_01)
-             *              containing header_fields ['signer_info'].signer.type
-             *                  indicating 'certificate'
-             *              and containing certificate (CERT_TS_14_03_BO_AT)
-             *                  containing signer_info.type
-             *                      indicating 'certificate_digest_with_other_algorithm'
-             *                      and containing digest
-             *                          referencing CERT_TS_AA_A
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_14_03_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_14_03_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_14_03_BO_AT) + * containing signer_info + * containing type + * indicating 'certificate_digest_with_other_algorithm' + * and containing digest + * referencing CERT_TS_AA_A + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_14_03_BO * @reference ETSI TS 103 097 [1], clause 7.4.2 */ testcase TC_SEC_ITSS_RCV_CERT_14_03_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -29024,35 +27939,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_14_03_BO /** - * @desc Check that IUT discards the AA certificate with signer info of type 'certificate' + * @desc Check that IUT discards the AA certificate with signer info of type 'certificate' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_15_01_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_01)
-             *              containing header_fields ['signer_info'].signer.type
-             *                  indicating 'certificate'
-             *              and containing certificate (CERT_TS_15_01_BO_AT)
-             *                  containing signer_info.digest
-             *                      referencing to certificate (CERT_TS_15_01_BO_AA)
-             *                          containing signer_info
-             *                              containing type
-             *                                  indicating 'certificate'
-             *                          and containing certificate
-             *                              indicating CERT_TEST_ROOT
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_15_01_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_15_01_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_15_01_BO_AT) + * containing signer_info.digest + * referencing to certificate (CERT_TS_15_01_BO_AA) + * containing signer_info + * containing type + * indicating 'certificate' + * and containing certificate + * indicating CERT_TEST_ROOT + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_15_01_BO * @reference ETSI TS 103 097 [1], clause 7.4.4 */ testcase TC_SEC_ITSS_RCV_CERT_15_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -29100,39 +28013,40 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_15_01_BO /** - * @desc Check that IUT discards the AA certificate with signer info of type 'certificate_chain' + * @desc Check that IUT discards the AA certificate with signer info of type 'certificate_chain' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_15_02_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_01)
-             *              containing header_fields ['signer_info'].signer.type
-             *                  indicating 'certificate'
-             *              and containing certificate (CERT_TS_15_02_BO_AT)
-             *                  containing signer_info.type
-             *                      indicating 'certificate_chain'
-             *                      and containing certificates[0]
-             *                          indicating certificate (CERT_TEST_ROOT)
-             *                      and containing certificates[1]
-             *                          indicating certificate (CERT_TS_15_02_BO_CA)
-             *                              containing signer_info
-             *                                  containing type
-             *                                      indicating 'certificate_digest_with_sha256'
-             *                                  and containing digest 
-             *                                      referencing to CERT_TEST_ROOT
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_15_02_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_15_02_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_15_02_BO_AT) + * containing signer_info.digest + * referencing to certificate (CERT_TS_15_02_BO_AA) + * containing signer_info + * containing type + * indicating 'certificate_chain' + * and containing certificates[0] + * indicating certificate (CERT_ROOT) + * and containing certificates[1] + * indicating certificate (CERT_TS_15_02_BO_CA) + * containing signer_info + * containing type + * indicating 'certificate_digest_with_sha256' + * and containing digest + * referencing to CERT_TEST_ROOT + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_15_02_BO * @reference ETSI TS 103 097 [1], clause 7.4.4 */ testcase TC_SEC_ITSS_RCV_CERT_15_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -29180,32 +28094,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_15_02_BO /** - * @desc Check that IUT discards the AA certificate with signer info of type 'certificate_digest_with_other_algorithm' + * @desc Check that IUT discards the AA certificate with signer info of type 'certificate_digest_with_other_algorithm' *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_15_03_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_01)
-             *              containing header_fields ['signer_info'].signer.type
-             *                  indicating 'certificate'
-             *              and containing certificate (CERT_TS_15_03_BO_AT)
-             *                  containing signer_info.type
-             *                      indicating 'certificate_digest_with_other_algorithm'
-             *                      and containing digest
-             *                          referencing CERT_TEST_ROOT
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_15_03_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_15_03_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_15_03_BO_AT) + * containing signer_info.digest + * referencing to certificate (CERT_TS_15_03_BO_AA) + * containing signer_info + * containing type + * indicating 'certificate_digest_with_other_algorithm' + * and containing digest + * referencing CERT_TEST_ROOT + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_15_03_BO * @reference ETSI TS 103 097 [1], clause 7.4.4 */ testcase TC_SEC_ITSS_RCV_CERT_15_03_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -29253,32 +28168,28 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_15_03_BO /** - * @desc Check that IUT discards a SecuredMessage if the subject_name of the AT certificate is not an empty name field + * @desc Check that IUT discards a SecuredMessage if the subject_name of the AT certificate is not an empty name field *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_16_01_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_01)
-             *              containing header_fields ['signer_info'].signer.type
-             *                  indicating 'certificate'
-             *              and containing certificate (CERT_TS_16_01_BO_AT)
-             *                  containing signer_info.digest
-             *                      referencing to certificate (CERT_TS_16_01_BO_AA)
-             *                          containing signer_infosubject_name
-             *                              indicating non-empty string ('Invalid name')
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_16_01_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_16_01_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'] + * containing signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_14_01_BO_AT) + * containing subject_info.subject_name + * indicating non-empty string ('Invalid name') + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_16_01_BO * @reference ETSI TS 103 097 [1], clause 7.4.2 */ testcase TC_SEC_ITSS_RCV_CERT_16_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -29326,29 +28237,26 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_16_01_BO /** - * @desc Check that IUT discards a SecuredMessage if the subject attribute of type assurance_level is missing in the AT certificate + * @desc Check that IUT discards a SecuredMessage if the subject attribute of type assurance_level is missing in the AT certificate *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_17_01_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_01)
-             *              containing header_fields ['signer_info'].signer.type
-             *                  indicating 'certificate'
-             *              and containing certificate (CERT_TS_17_01_BO_AT)
-             *                  not containing subject_attributes['assurance_level']
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_17_01_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_17_01_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_1) + * containing header_fields ['signer_info'].signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_17_01_BO_AT) + * not containing subject_attributes['assurance_level'] + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_17_01_BO * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_17_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -29396,31 +28304,28 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_17_01_BO /** - * @desc Check that IUT discards a SecuredMessage if the subject attribute of type assurance_level is missing in the AA certificate + * @desc Check that IUT discards a SecuredMessage if the subject attribute of type assurance_level is missing in the AA certificate *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_17_02_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_01)
-             *              containing header_fields ['signer_info'].signer.type
-             *                  indicating 'certificate'
-             *              and containing certificate (CERT_TS_17_02_BO_AT)
-             *                  containing signer_info.digest
-             *                      referencing to certificate (CERT_TS_17_02_BO_AA)
-             *                          not containing subject_attributes['assurance_level']
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_17_02_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_17_02_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_1) + * containing header_fields ['signer_info'].signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_17_02_BO_AT) + * containing signer_info.digest + * referencing to certificate (CERT_TS_17_02_BO_AA) + * not containing subject_attributes['assurance_level'] + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_17_02_BO * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_17_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -29468,36 +28373,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_17_02_BO /** - * @desc Check that IUT discards a SecuredMessage if the assurance level of issuing certificate is less then assurance level of subordinate certificate + * @desc Check that IUT discards a SecuredMessage if the assurance level of issuing certificate is less then assurance level of subordinate certificate. *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_17_03_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_01)
-             *              containing header_fields ['signer_info'].signer.type
-             *                  indicating 'certificate'
-             *              and containing certificate (CERT_TS_17_03_BO_AT)
-             *                  containing subject_attributes['assurance_level']
-             *                      containing assurance_level
-             *                          indicating 0x80 (assurance level=4, confidence=0)
-             *                  and containing signer_info.digest
-             *                      referencing to certificate (CERT_TS_A_AA)
-             *                          containing subject_attributes['assurance_level']
-             *                              containing assurance_level
-             *                                  indicating 0x60 (assurance level=3, confidence=0)
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_17_03_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_17_03_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_1) + * containing header_fields ['signer_info'].signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_17_03_BO_AT) + * containing subject_attributes['assurance_level'] + * containing assurance_level + * indicating 0x80 (assurance level=4, confidence=0) + * and containing signer_info.digest + * referencing to certificate (CERT_TS_A_AA) + * containing subject_attributes['assurance_level'] + * containing assurance_level + * indicating 0x60 (assurance level=3, confidence=0) + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_17_03_BO * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_17_03_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -29545,36 +28447,33 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_17_03_BO /** - * @desc Check that IUT discards a SecuredMessage if the assurance level of issuing certificate is equal to the assurance level of the subordinate certificate but the confidence of subject assurance of issuing certificate is less then the confidence of the subordinate certificate + * @desc Check that IUT discards a SecuredMessage if the assurance level of issuing certificate is equal to the assurance level of the subordinate certificate but the confidence of subject assurance of issuing certificate is less then the confidence of the subordinate certificate. *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_17_04_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_01)
-             *              containing header_fields ['signer_info'].signer.type
-             *                  indicating 'certificate'
-             *              and containing certificate (CERT_TS_17_04_BO_AT)
-             *                  containing subject_attributes['assurance_level']
-             *                      containing assurance_level
-             *                          indicating 0x61 (assurance level=3, confidence=1)
-             *                  and containing signer_info.digest
-             *                      referencing to certificate (CERT_TS_A_AA)
-             *                          containing subject_attributes['assurance_level']
-             *                              containing assurance_level
-             *                                  indicating 0x60 (assurance level=3, confidence=0)
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_17_04_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_17_04_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_1) + * containing header_fields ['signer_info'].signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_17_04_BO_AT) + * containing subject_attributes['assurance_level'] + * containing assurance_level + * indicating 0x61 (assurance level=3, confidence=1) + * and containing signer_info.digest + * referencing to certificate (CERT_TS_A_AA) + * containing subject_attributes['assurance_level'] + * containing assurance_level + * indicating 0x60 (assurance level=3, confidence=0) + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_17_04_BO * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_17_04_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -29622,29 +28521,26 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_17_04_BO /** - * @desc Check that IUT discards a SecuredMessage if the subject attribute of type verification_key is missing in the AT certificate + * @desc Check that IUT discards a SecuredMessage if the subject attribute of type verification_key is missing in the AT certificate *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_18_01_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_01)
-             *              containing header_fields ['signer_info'].signer.type
-             *                  indicating 'certificate'
-             *              and containing certificate (CERT_TS_18_01_BO_AT)
-             *                  not containing subject_attributes['verification_key']
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_18_01_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_18_01_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_1) + * containing header_fields ['signer_info'].signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_18_01_BO_AT) + * not containing subject_attributes['verification_key'] + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_18_01_BO * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_18_01_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -29692,31 +28588,28 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_18_01_BO /** - * @desc Check that IUT discards a SecuredMessage if the subject attribute of type verification_key is missing in the AA certificate + * @desc Check that IUT discards a SecuredMessage if the subject attribute of type verification_key is missing in the AA certificate *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *      and the IUT current time is inside the time validity period of CERT_TS_18_01_BO_AT
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_01)
-             *              containing header_fields ['signer_info'].signer.type
-             *                  indicating 'certificate'
-             *              and containing certificate (CERT_TS_18_02_BO_AT)
-             *                  containing signer_info.digest
-             *                      referencing to certificate (CERT_TS_18_02_BO_AA)
-             *                          not containing subject_attributes['verification_key']
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_18_02_BO + * with + * the IUT being in the 'authorized' state + * and the IUT current time is inside the time validity period of CERT_TS_18_02_BO_AT + * Expected results: + * ensure that + * when the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_1) + * containing header_fields ['signer_info'].signer + * containing type + * indicating 'certificate' + * and containing certificate (CERT_TS_18_02_BO_AT) + * containing signer_info.digest + * referencing to certificate (CERT_TS_18_02_BO_AA) + * not containing subject_attributes['verification_key'] + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_18_02_BO * @reference ETSI TS 103 097 [1], clause 7.4.1 */ testcase TC_SEC_ITSS_RCV_CERT_18_02_BO() runs on ItsGeoNetworking system ItsSecSystem { @@ -29764,27 +28657,25 @@ module ItsSecurity_TestCases { } // End of testcase TC_SEC_ITSS_RCV_CERT_18_02_BO /** - * @desc Check that IUT discards a SecuredMessage if the reserved region type has been used in region validity restriction of the AT certificate + * @desc Check that IUT discards a SecuredMessage if the reserved region type has been used in region validity restriction of the AT certificate *
              * Pics Selection: PICS_GN_SECURITY
              * Config Id: CF01
              * Initial conditions:
-             *  with {
-             *      the IUT being in the 'authorized' state
-             *  }
-             *  ensure that {
-             *      when { 
-             *          the IUT is receiving a Secured CAM (MSG_SEC_RCV_CAM_01)
-             *              containing header_fields ['signer_info'].signer.certificate (CERT_TS_19_01_BO_AT)
-             *                  containing region_type
-             *                      indicating 240
-             *      } then {
-             *          the IUT discards the message
-             *      }
-             *  }
-             * 
- * - * @see ETSI TS 103 096-2 v1.3.1 TP_SEC_ITSS_RCV_CERT_19_01_BO + * with + * the IUT being in the 'authorized' state + * Expected results: + * ensure that + * when + * the IUT is receiving a SecuredMessage + * containing header_fields ['signer_info'].signer.certificate (CERT_TS_19_01_BO_AT) + * containing validity_restrictions['region'] + * containing region_type + * indicating 240 + * then + * the IUT discards the message + * + * @see ETSI TS 103 096-2 v1.4.1 TP_SEC_ITSS_RCV_CERT_19_01_BO * @reference ETSI TS 103 097 [1], clause 4.2.2.1 */ testcase TC_SEC_ITSS_RCV_CERT_19_01_BO() runs on ItsGeoNetworking system ItsSecSystem {