diff --git a/data/profiles/CERT_TS_02_01_BO_AT.xml b/data/profiles/CERT_TS_02_01_BO_AT.xml index 33c5553f0ddbb6e606c2a813054cbf19e5409a82..7219544778795f286ad8c81ec2677bda678842d5 100644 --- a/data/profiles/CERT_TS_02_01_BO_AT.xml +++ b/data/profiles/CERT_TS_02_01_BO_AT.xml @@ -1,7 +1,7 @@ 2 - + diff --git a/data/profiles/CERT_TS_02_02_BO_AA.xml b/data/profiles/CERT_TS_02_02_BO_AA.xml index 592b42709af36caf2758525523ddcbbe15f981a0..4f17bbd8c7bb8bba42fedc005f982a9491fae4c6 100644 --- a/data/profiles/CERT_TS_02_02_BO_AA.xml +++ b/data/profiles/CERT_TS_02_02_BO_AA.xml @@ -1,7 +1,7 @@ 2 - + diff --git a/data/profiles/CERT_TS_03_01_BO_AA.xml b/data/profiles/CERT_TS_02_03_BO_AT.xml similarity index 81% rename from data/profiles/CERT_TS_03_01_BO_AA.xml rename to data/profiles/CERT_TS_02_03_BO_AT.xml index aa1cfa5e19978927c111d38fbccd66b81e14492a..33c5553f0ddbb6e606c2a813054cbf19e5409a82 100644 --- a/data/profiles/CERT_TS_03_01_BO_AA.xml +++ b/data/profiles/CERT_TS_02_03_BO_AT.xml @@ -1,7 +1,7 @@ - - + + 2 - + diff --git a/data/profiles/CERT_TS_02_04_BO_AA.xml b/data/profiles/CERT_TS_02_04_BO_AA.xml new file mode 100644 index 0000000000000000000000000000000000000000..a5f38df8b7b0c6b9bc2656a6e3cee66e76e35ec8 --- /dev/null +++ b/data/profiles/CERT_TS_02_04_BO_AA.xml @@ -0,0 +1,29 @@ + + + 2 + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/data/profiles/CERT_TS_02_04_BO_AT.xml b/data/profiles/CERT_TS_02_04_BO_AT.xml new file mode 100644 index 0000000000000000000000000000000000000000..7926e4ee0f08a9673b2edd50935787955f9d30eb --- /dev/null +++ b/data/profiles/CERT_TS_02_04_BO_AT.xml @@ -0,0 +1,29 @@ + + + 2 + + + + + + + + + + + + + + + ÿÿ + ÿÿÿ + + + + + + + + + + diff --git a/data/profiles/CERT_TS_03_01_BO_AT.xml b/data/profiles/CERT_TS_03_01_BO_AT.xml index 3506132bd85019e41704e6b47621a28d6cafbfa6..9dce8f34960a58e9cf9be1ebc86b8e8c5cf7fe91 100644 --- a/data/profiles/CERT_TS_03_01_BO_AT.xml +++ b/data/profiles/CERT_TS_03_01_BO_AT.xml @@ -1,7 +1,7 @@ 2 - + diff --git a/data/profiles/CERT_TS_03_02_BO_AA.xml b/data/profiles/CERT_TS_03_02_BO_AA.xml index 4992c149bb71c26d78e2f9e50f43649f7959d6b5..67bc328e499d1c4d2553886dd01012ef6851fedb 100644 --- a/data/profiles/CERT_TS_03_02_BO_AA.xml +++ b/data/profiles/CERT_TS_03_02_BO_AA.xml @@ -1,7 +1,7 @@ 2 - + diff --git a/data/profiles/CERT_TS_03_02_BO_CA.xml b/data/profiles/CERT_TS_03_BO_CA.xml similarity index 92% rename from data/profiles/CERT_TS_03_02_BO_CA.xml rename to data/profiles/CERT_TS_03_BO_CA.xml index 59b8a9a34b65b0fd59dea4f43d4fc24284a992c0..97a6ed20f15665326067cc99949f1138b9339809 100644 --- a/data/profiles/CERT_TS_03_02_BO_CA.xml +++ b/data/profiles/CERT_TS_03_BO_CA.xml @@ -1,5 +1,5 @@ - + 2 diff --git a/requality/TS103096/.settings/org.eclipse.core.resources.prefs b/requality/TS103096/.settings/org.eclipse.core.resources.prefs index 72f94ae9628387003bbcd42e6e2391c72c3d7847..8d4d3a89ea1810e9a2d6da00ad13dfbe8609110d 100644 --- a/requality/TS103096/.settings/org.eclipse.core.resources.prefs +++ b/requality/TS103096/.settings/org.eclipse.core.resources.prefs @@ -1,2 +1,235 @@ eclipse.preferences.version=1 -encoding//root/Reports/TestPurposes.json=UTF-8 +encoding//root/Documents/Draft_ETSI_TS_103\ 097\ v1.1.14.xhtml.json=UTF-8 +encoding//root/Reports/TPs/TestPurposes(2015-11-25_05-39-03).json=UTF-8 +encoding//root/Reports/TPs/TestPurposes(2015-11-25_05-39-03)_resources/tps.html=UTF-8 +encoding//root/Requirements.json=UTF-8 +encoding//root/Requirements/SEC_ITSS.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_01.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_02.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_05.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_06.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_07.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_10.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_11.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_12.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_01.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_02.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_03.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_04.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_05.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_06.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_07.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_10.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_11.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_12.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_13.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_02.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_05.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_07.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_08.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_10.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_11.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_12.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_01.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_02.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_05.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_06.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_08.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_09.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_10.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_11.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_12.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_02.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_06.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_07.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_08.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_09.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_10.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_11.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_12.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_14.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_15.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_16.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_01.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_02.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_07.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_08.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_09.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_01.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_02.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_04.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_05.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_06.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_07.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_08.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_09.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_10.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_01.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_02.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_03.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_04.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_05.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_06.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_07.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_08.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_09.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_10.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_04.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_05.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_06.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_02.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_03.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_04.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_05.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_06.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_08.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_09.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_10.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_02.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_03.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_04.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_05.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_06.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_07.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_01.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_04.json=UTF-8 +encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_05.json=UTF-8 +encoding//root/ToDoLinks.json=UTF-8 +encoding//root/ToDoLinks/link_01.json=UTF-8 +encoding//root/ToDoLinks/link_02.json=UTF-8 +encoding//root/ToDoLinks/link_03.json=UTF-8 +encoding//root/ToDoLinks/link_04.json=UTF-8 +encoding//root/ToDoLinks/link_05.json=UTF-8 +encoding//root/ToDoLinks/link_06.json=UTF-8 +encoding//root/ToDoLinks/link_07.json=UTF-8 +encoding//root/ToDoLinks/link_08.json=UTF-8 +encoding//root/ToDoLinks/link_09.json=UTF-8 +encoding//root/ToDoLinks/link_10.json=UTF-8 +encoding//root/ToDoLinks/link_100.json=UTF-8 +encoding//root/ToDoLinks/link_101.json=UTF-8 +encoding//root/ToDoLinks/link_102.json=UTF-8 +encoding//root/ToDoLinks/link_103.json=UTF-8 +encoding//root/ToDoLinks/link_104.json=UTF-8 +encoding//root/ToDoLinks/link_105.json=UTF-8 +encoding//root/ToDoLinks/link_106.json=UTF-8 +encoding//root/ToDoLinks/link_107.json=UTF-8 +encoding//root/ToDoLinks/link_108.json=UTF-8 +encoding//root/ToDoLinks/link_109.json=UTF-8 +encoding//root/ToDoLinks/link_11.json=UTF-8 +encoding//root/ToDoLinks/link_110.json=UTF-8 +encoding//root/ToDoLinks/link_111.json=UTF-8 +encoding//root/ToDoLinks/link_112.json=UTF-8 +encoding//root/ToDoLinks/link_113.json=UTF-8 +encoding//root/ToDoLinks/link_114.json=UTF-8 +encoding//root/ToDoLinks/link_115.json=UTF-8 +encoding//root/ToDoLinks/link_12.json=UTF-8 +encoding//root/ToDoLinks/link_13.json=UTF-8 +encoding//root/ToDoLinks/link_14.json=UTF-8 +encoding//root/ToDoLinks/link_15.json=UTF-8 +encoding//root/ToDoLinks/link_16.json=UTF-8 +encoding//root/ToDoLinks/link_17.json=UTF-8 +encoding//root/ToDoLinks/link_18.json=UTF-8 +encoding//root/ToDoLinks/link_19.json=UTF-8 +encoding//root/ToDoLinks/link_20.json=UTF-8 +encoding//root/ToDoLinks/link_21.json=UTF-8 +encoding//root/ToDoLinks/link_22.json=UTF-8 +encoding//root/ToDoLinks/link_23.json=UTF-8 +encoding//root/ToDoLinks/link_24.json=UTF-8 +encoding//root/ToDoLinks/link_25.json=UTF-8 +encoding//root/ToDoLinks/link_26.json=UTF-8 +encoding//root/ToDoLinks/link_27.json=UTF-8 +encoding//root/ToDoLinks/link_28.json=UTF-8 +encoding//root/ToDoLinks/link_29.json=UTF-8 +encoding//root/ToDoLinks/link_30.json=UTF-8 +encoding//root/ToDoLinks/link_31.json=UTF-8 +encoding//root/ToDoLinks/link_32.json=UTF-8 +encoding//root/ToDoLinks/link_33.json=UTF-8 +encoding//root/ToDoLinks/link_34.json=UTF-8 +encoding//root/ToDoLinks/link_35.json=UTF-8 +encoding//root/ToDoLinks/link_36.json=UTF-8 +encoding//root/ToDoLinks/link_37.json=UTF-8 +encoding//root/ToDoLinks/link_38.json=UTF-8 +encoding//root/ToDoLinks/link_39.json=UTF-8 +encoding//root/ToDoLinks/link_40.json=UTF-8 +encoding//root/ToDoLinks/link_41.json=UTF-8 +encoding//root/ToDoLinks/link_42.json=UTF-8 +encoding//root/ToDoLinks/link_43.json=UTF-8 +encoding//root/ToDoLinks/link_44.json=UTF-8 +encoding//root/ToDoLinks/link_45.json=UTF-8 +encoding//root/ToDoLinks/link_46.json=UTF-8 +encoding//root/ToDoLinks/link_47.json=UTF-8 +encoding//root/ToDoLinks/link_48.json=UTF-8 +encoding//root/ToDoLinks/link_49.json=UTF-8 +encoding//root/ToDoLinks/link_50.json=UTF-8 +encoding//root/ToDoLinks/link_51.json=UTF-8 +encoding//root/ToDoLinks/link_52.json=UTF-8 +encoding//root/ToDoLinks/link_53.json=UTF-8 +encoding//root/ToDoLinks/link_54.json=UTF-8 +encoding//root/ToDoLinks/link_55.json=UTF-8 +encoding//root/ToDoLinks/link_56.json=UTF-8 +encoding//root/ToDoLinks/link_57.json=UTF-8 +encoding//root/ToDoLinks/link_58.json=UTF-8 +encoding//root/ToDoLinks/link_59.json=UTF-8 +encoding//root/ToDoLinks/link_60.json=UTF-8 +encoding//root/ToDoLinks/link_61.json=UTF-8 +encoding//root/ToDoLinks/link_62.json=UTF-8 +encoding//root/ToDoLinks/link_63.json=UTF-8 +encoding//root/ToDoLinks/link_64.json=UTF-8 +encoding//root/ToDoLinks/link_65.json=UTF-8 +encoding//root/ToDoLinks/link_66.json=UTF-8 +encoding//root/ToDoLinks/link_67.json=UTF-8 +encoding//root/ToDoLinks/link_68.json=UTF-8 +encoding//root/ToDoLinks/link_69.json=UTF-8 +encoding//root/ToDoLinks/link_70.json=UTF-8 +encoding//root/ToDoLinks/link_71.json=UTF-8 +encoding//root/ToDoLinks/link_72.json=UTF-8 +encoding//root/ToDoLinks/link_73.json=UTF-8 +encoding//root/ToDoLinks/link_74.json=UTF-8 +encoding//root/ToDoLinks/link_75.json=UTF-8 +encoding//root/ToDoLinks/link_76.json=UTF-8 +encoding//root/ToDoLinks/link_77.json=UTF-8 +encoding//root/ToDoLinks/link_78.json=UTF-8 +encoding//root/ToDoLinks/link_79.json=UTF-8 +encoding//root/ToDoLinks/link_80.json=UTF-8 +encoding//root/ToDoLinks/link_81.json=UTF-8 +encoding//root/ToDoLinks/link_82.json=UTF-8 +encoding//root/ToDoLinks/link_83.json=UTF-8 +encoding//root/ToDoLinks/link_84.json=UTF-8 +encoding//root/ToDoLinks/link_85.json=UTF-8 +encoding//root/ToDoLinks/link_86.json=UTF-8 +encoding//root/ToDoLinks/link_87.json=UTF-8 +encoding//root/ToDoLinks/link_88.json=UTF-8 +encoding//root/ToDoLinks/link_89.json=UTF-8 +encoding//root/ToDoLinks/link_90.json=UTF-8 +encoding//root/ToDoLinks/link_91.json=UTF-8 +encoding//root/ToDoLinks/link_92.json=UTF-8 +encoding//root/ToDoLinks/link_93.json=UTF-8 +encoding//root/ToDoLinks/link_94.json=UTF-8 +encoding//root/ToDoLinks/link_95.json=UTF-8 +encoding//root/ToDoLinks/link_96.json=UTF-8 +encoding//root/ToDoLinks/link_97.json=UTF-8 +encoding//root/ToDoLinks/link_98.json=UTF-8 +encoding//root/ToDoLinks/link_99.json=UTF-8 +encoding/root.json=UTF-8 diff --git a/requality/TS103096/root.json b/requality/TS103096/root.json index efa1d6e49b964736e09d3f0915f44798c6bf6170..c0bbcabdf8a4374ded72b5586dce6bd62ae61ed3 100644 --- a/requality/TS103096/root.json +++ b/requality/TS103096/root.json @@ -13,6 +13,22 @@ "origin": "14c95c76-f88e-4665-ac98-eeb018369db8", "type": "STRING", "value": "DBRoot" + }, + "com.unitesk.requality.reference_names": { + "elements_type": "STRING", + "isGenerated": false, + "key": "com.unitesk.requality.reference_names", + "origin": "14c95c76-f88e-4665-ac98-eeb018369db8", + "type": "LIST", + "value": [] + }, + "com.unitesk.requality.reference_replaces": { + "elements_type": "STRING", + "isGenerated": false, + "key": "com.unitesk.requality.reference_replaces", + "origin": "14c95c76-f88e-4665-ac98-eeb018369db8", + "type": "LIST", + "value": [] } }, "uuid": "14c95c76-f88e-4665-ac98-eeb018369db8" diff --git a/requality/TS103096/root/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml.json b/requality/TS103096/root/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml.json index 8dd3474f652fe564994e67e21b3528819b712a14..331ea559c1ee7fce9a910ac3ab985bcd3409597b 100644 --- a/requality/TS103096/root/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml.json +++ b/requality/TS103096/root/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml.json @@ -7,6 +7,13 @@ "type": "STRING", "value": "Draft_ETSI_TS_103 097 v1.1.14.xhtml" }, + "_isUpdating": { + "isGenerated": false, + "key": "_isUpdating", + "origin": "2d025f76-f681-4094-b9c3-8f8bd27c8d6d", + "type": "STRING", + "value": "updating" + }, "_type": { "isGenerated": false, "key": "_type", @@ -19,7 +26,14 @@ "key": "title", "origin": "2d025f76-f681-4094-b9c3-8f8bd27c8d6d", "type": "STRING", - "value": "ETSI TS 103 097 V1.1.14" + "value": "ETSI TS 103 097 [1]" + }, + "excluded": { + "isGenerated": false, + "key": "excluded", + "origin": "2d025f76-f681-4094-b9c3-8f8bd27c8d6d", + "type": "BOOL", + "value": true } }, "uuid": "2d025f76-f681-4094-b9c3-8f8bd27c8d6d" diff --git a/requality/TS103096/root/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/91a7d9d6-2e41-4b9d-8545-8fcfe10f722c.json b/requality/TS103096/root/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/91a7d9d6-2e41-4b9d-8545-8fcfe10f722c.json new file mode 100644 index 0000000000000000000000000000000000000000..736c330cb0e291e7a0614d391ae6b76956204593 --- /dev/null +++ b/requality/TS103096/root/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/91a7d9d6-2e41-4b9d-8545-8fcfe10f722c.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "91a7d9d6-2e41-4b9d-8545-8fcfe10f722c", + "type": "STRING", + "value": "The signature shall be calculated over the encoding of all preceding fields, including all encoded lengths." + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "91a7d9d6-2e41-4b9d-8545-8fcfe10f722c", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "91a7d9d6-2e41-4b9d-8545-8fcfe10f722c" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/bcf1a728-4b04-4570-b70f-bb3914fbf67b.json b/requality/TS103096/root/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/bcf1a728-4b04-4570-b70f-bb3914fbf67b.json new file mode 100644 index 0000000000000000000000000000000000000000..a33ecfc0022f90fed16fe719af331cdc2e3e4f57 --- /dev/null +++ b/requality/TS103096/root/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/bcf1a728-4b04-4570-b70f-bb3914fbf67b.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "bcf1a728-4b04-4570-b70f-bb3914fbf67b", + "type": "STRING", + "value": "

signature calculated over these fields of the Certificate data structure:
\n<\/font>\n<\/font>\n<\/font>\n<\/font>\n<\/font>\n<\/p>\n

    \n

    \t

  • \nThe version<\/font>\n<\/font>\n<\/li>\n<\/p>\n

    \t

  • \nThe signer_info vector including its length
    \n<\/font>\n<\/font>\n<\/font>\n<\/li>\n<\/p>\n

    \t

  • \nThe subject_info<\/font>\n<\/font>\n<\/li>\n<\/p>\n

    \t

  • \nThe subject_attributes vector including its length
    \n<\/font>\n<\/font>\n<\/font>\n<\/li>\n<\/p>\n

    \t

  • \nThe validity_restrictions vector including its length<\/font><\/font><\/font><\/li><\/p><\/ul>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "bcf1a728-4b04-4570-b70f-bb3914fbf67b", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "bcf1a728-4b04-4570-b70f-bb3914fbf67b" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/f144275a-ca15-46cb-8d99-fdda823ed6ab.json b/requality/TS103096/root/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/f144275a-ca15-46cb-8d99-fdda823ed6ab.json new file mode 100644 index 0000000000000000000000000000000000000000..56181b96ad09b54cb2edaf1d6534bf8ef96430ac --- /dev/null +++ b/requality/TS103096/root/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/f144275a-ca15-46cb-8d99-fdda823ed6ab.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "f144275a-ca15-46cb-8d99-fdda823ed6ab", + "type": "STRING", + "value": "The signature shall be calculated over the encoding of all preceding fields, including all encoded lengths." + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "f144275a-ca15-46cb-8d99-fdda823ed6ab", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "f144275a-ca15-46cb-8d99-fdda823ed6ab" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml_resources/Draft_ETSI_TS_103 097 v1.1.14.xhtml b/requality/TS103096/root/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml_resources/Draft_ETSI_TS_103 097 v1.1.14.xhtml index 70da58baf75e0955e274c7f3bc67d8d07e5012cd..6789dfbbf22b43545b2c1d1c637889ce37bc953e 100644 --- a/requality/TS103096/root/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml_resources/Draft_ETSI_TS_103 097 v1.1.14.xhtml +++ b/requality/TS103096/root/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml_resources/Draft_ETSI_TS_103 097 v1.1.14.xhtml @@ -4244,7 +4244,7 @@
  • -signature holds the signature of this certificate signed by the responsible CA. The signature shall be calculated over the encoding of all preceding fields, including all encoded lengths. If the subject_attributes field contains a field of type reconstruction_value, the signature field shall be omitted. The reconstruction_value may be used for implicit certificates using ECQV [i.5]. +signature holds the signature of this certificate signed by the responsible CA. The signature shall be calculated over the encoding of all preceding fields, including all encoded lengths. If the subject_attributes field contains a field of type reconstruction_value, the signature field shall be omitted. The reconstruction_value may be used for implicit certificates using ECQV [i.5]. @@ -5721,7 +5721,7 @@

    -7.4.1Authorization tickets (pseudonymous certificates) +7.4.1Authorization tickets (pseudonymous certificates)

    diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml.json new file mode 100644 index 0000000000000000000000000000000000000000..916c7ee8cc019c63a652ff44b610b44808d87970 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml.json @@ -0,0 +1,33 @@ +{ + "attributes": { + "_file": { + "isGenerated": false, + "key": "_file", + "origin": "0cc11235-d199-4b79-aac5-70cea27b971b", + "type": "STRING", + "value": "ts_103097v010201p.xhtml" + }, + "_isUpdating": { + "isGenerated": false, + "key": "_isUpdating", + "origin": "0cc11235-d199-4b79-aac5-70cea27b971b", + "type": "STRING", + "value": "updating" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "0cc11235-d199-4b79-aac5-70cea27b971b", + "type": "STRING", + "value": "Document" + }, + "title": { + "isGenerated": false, + "key": "title", + "origin": "2d025f76-f681-4094-b9c3-8f8bd27c8d6d", + "type": "STRING", + "value": "ETSI TS 103 097 [1]" + } + }, + "uuid": "0cc11235-d199-4b79-aac5-70cea27b971b" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/04dc7147-d839-4c03-b184-dd682d6f2c39.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/04dc7147-d839-4c03-b184-dd682d6f2c39.json new file mode 100644 index 0000000000000000000000000000000000000000..702910d8c1f998458042c79bdbe3b6f2c0e3a409 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/04dc7147-d839-4c03-b184-dd682d6f2c39.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "04dc7147-d839-4c03-b184-dd682d6f2c39", + "type": "STRING", + "value": "Location" + }}, + "uuid": "04dc7147-d839-4c03-b184-dd682d6f2c39" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/076915cc-c9b3-460d-8ba4-388037396737.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/076915cc-c9b3-460d-8ba4-388037396737.json new file mode 100644 index 0000000000000000000000000000000000000000..85d55f3612cffec8c3faa5a4273b795d8500f085 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/076915cc-c9b3-460d-8ba4-388037396737.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "076915cc-c9b3-460d-8ba4-388037396737", + "type": "STRING", + "value": "Location" + }}, + "uuid": "076915cc-c9b3-460d-8ba4-388037396737" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/07ea39bb-bbcf-444f-aa00-f63bdaabc1e1.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/07ea39bb-bbcf-444f-aa00-f63bdaabc1e1.json new file mode 100644 index 0000000000000000000000000000000000000000..318bf02aab4af9e71e5908943a266f67859c8ee8 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/07ea39bb-bbcf-444f-aa00-f63bdaabc1e1.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "07ea39bb-bbcf-444f-aa00-f63bdaabc1e1", + "type": "STRING", + "value": "Any other HeaderField types included shall not be used to determine the validity of the message.<\/font><\/font>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "07ea39bb-bbcf-444f-aa00-f63bdaabc1e1", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "07ea39bb-bbcf-444f-aa00-f63bdaabc1e1" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/083c999c-3428-451c-ae75-be7d885f5975.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/083c999c-3428-451c-ae75-be7d885f5975.json new file mode 100644 index 0000000000000000000000000000000000000000..8bc66bb608b94b0d312412cef4ef74ddee2b6ee6 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/083c999c-3428-451c-ae75-be7d885f5975.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "083c999c-3428-451c-ae75-be7d885f5975", + "type": "STRING", + "value": "Location" + }}, + "uuid": "083c999c-3428-451c-ae75-be7d885f5975" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/089844af-89f2-46be-8524-0c02924bcf88.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/089844af-89f2-46be-8524-0c02924bcf88.json new file mode 100644 index 0000000000000000000000000000000000000000..ad681dad9c9b01c0044e61b18be2a8b74b5ff7fb --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/089844af-89f2-46be-8524-0c02924bcf88.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "089844af-89f2-46be-8524-0c02924bcf88", + "type": "STRING", + "value": "Location" + }}, + "uuid": "089844af-89f2-46be-8524-0c02924bcf88" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/0b1ec607-c4bc-4ac5-a8e8-7c7bce9cd787.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/0b1ec607-c4bc-4ac5-a8e8-7c7bce9cd787.json new file mode 100644 index 0000000000000000000000000000000000000000..2d71767d24a3a141bff833a2024d457e36d856e0 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/0b1ec607-c4bc-4ac5-a8e8-7c7bce9cd787.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "0b1ec607-c4bc-4ac5-a8e8-7c7bce9cd787", + "type": "STRING", + "value": "Location" + }}, + "uuid": "0b1ec607-c4bc-4ac5-a8e8-7c7bce9cd787" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/0bf26c42-7a43-4f6b-8bbf-3f61249999e4.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/0bf26c42-7a43-4f6b-8bbf-3f61249999e4.json new file mode 100644 index 0000000000000000000000000000000000000000..b43993202b8d6ee7c1f312b886c76a8d6fd74bd0 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/0bf26c42-7a43-4f6b-8bbf-3f61249999e4.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "0bf26c42-7a43-4f6b-8bbf-3f61249999e4", + "type": "STRING", + "value": "Location" + }}, + "uuid": "0bf26c42-7a43-4f6b-8bbf-3f61249999e4" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/0c378b8d-b7f5-4102-92db-50cd3f458166.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/0c378b8d-b7f5-4102-92db-50cd3f458166.json new file mode 100644 index 0000000000000000000000000000000000000000..86af20d950866627730e9fe0b512fc6758f2cd06 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/0c378b8d-b7f5-4102-92db-50cd3f458166.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "0c378b8d-b7f5-4102-92db-50cd3f458166", + "type": "STRING", + "value": " If the assurance level is unknown for the certificate then the default assurance level 0 shall be used." + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "0c378b8d-b7f5-4102-92db-50cd3f458166", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "0c378b8d-b7f5-4102-92db-50cd3f458166" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/0e9485da-3aa9-4762-aad1-c706a9468cba.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/0e9485da-3aa9-4762-aad1-c706a9468cba.json new file mode 100644 index 0000000000000000000000000000000000000000..4734f62b67ab877c64b9314cf9dd30b3a5d6a045 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/0e9485da-3aa9-4762-aad1-c706a9468cba.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "0e9485da-3aa9-4762-aad1-c706a9468cba", + "type": "STRING", + "value": "Location" + }}, + "uuid": "0e9485da-3aa9-4762-aad1-c706a9468cba" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/1867819d-7fb8-4abe-848a-218944594c15.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/1867819d-7fb8-4abe-848a-218944594c15.json new file mode 100644 index 0000000000000000000000000000000000000000..6ce3c28c53f4e2c7576ff5aea0ab607a8156a06b --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/1867819d-7fb8-4abe-848a-218944594c15.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "1867819d-7fb8-4abe-848a-218944594c15", + "type": "STRING", + "value": "this field shall contain the current location of the ITS-S at the point in time the contents of the security headers are fixed prior to the signing process" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "1867819d-7fb8-4abe-848a-218944594c15", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "1867819d-7fb8-4abe-848a-218944594c15" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/191a229d-de15-4b5a-874c-682846c5d70c.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/191a229d-de15-4b5a-874c-682846c5d70c.json new file mode 100644 index 0000000000000000000000000000000000000000..d98b585539e69cdd68acda64b070fa6c5fa54fb2 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/191a229d-de15-4b5a-874c-682846c5d70c.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "191a229d-de15-4b5a-874c-682846c5d70c", + "type": "STRING", + "value": "Location" + }}, + "uuid": "191a229d-de15-4b5a-874c-682846c5d70c" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/1ba8c2fa-4a07-4747-911d-bfffe0168100.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/1ba8c2fa-4a07-4747-911d-bfffe0168100.json new file mode 100644 index 0000000000000000000000000000000000000000..066c98e0d5822eb45b8f127f34f57f75ab1e870c --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/1ba8c2fa-4a07-4747-911d-bfffe0168100.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "1ba8c2fa-4a07-4747-911d-bfffe0168100", + "type": "STRING", + "value": "The subject_name variable-length vector shall have a maximum length of 32 bytes.<\/font><\/font>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "1ba8c2fa-4a07-4747-911d-bfffe0168100", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "1ba8c2fa-4a07-4747-911d-bfffe0168100" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/1c90e08e-4c4e-4721-ab6e-8390fd8fd3c3.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/1c90e08e-4c4e-4721-ab6e-8390fd8fd3c3.json new file mode 100644 index 0000000000000000000000000000000000000000..7b5a5968c8f0aff714e4737167cc612ba14d378e --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/1c90e08e-4c4e-4721-ab6e-8390fd8fd3c3.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "1c90e08e-4c4e-4721-ab6e-8390fd8fd3c3", + "type": "STRING", + "value": "Location" + }}, + "uuid": "1c90e08e-4c4e-4721-ab6e-8390fd8fd3c3" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/1d5a3fa4-b7ea-4b56-9ff7-2f1b08592a0a.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/1d5a3fa4-b7ea-4b56-9ff7-2f1b08592a0a.json new file mode 100644 index 0000000000000000000000000000000000000000..3efa5955893581547b6c566a71125c0b9b7d3c50 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/1d5a3fa4-b7ea-4b56-9ff7-2f1b08592a0a.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "1d5a3fa4-b7ea-4b56-9ff7-2f1b08592a0a", + "type": "STRING", + "value": "subject_type: this field shall be set to authorization_ticket(1).<\/font><\/font><\/font>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "1d5a3fa4-b7ea-4b56-9ff7-2f1b08592a0a", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "1d5a3fa4-b7ea-4b56-9ff7-2f1b08592a0a" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/1d95aba3-2c2a-45a2-b40e-8f8bfe3b164d.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/1d95aba3-2c2a-45a2-b40e-8f8bfe3b164d.json new file mode 100644 index 0000000000000000000000000000000000000000..b7e0f07f8bd68ae6e616c44d727a9b571b452dc3 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/1d95aba3-2c2a-45a2-b40e-8f8bfe3b164d.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "1d95aba3-2c2a-45a2-b40e-8f8bfe3b164d", + "type": "STRING", + "value": "Location" + }}, + "uuid": "1d95aba3-2c2a-45a2-b40e-8f8bfe3b164d" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/1de82943-16f3-4be8-9c10-98ff19632d96.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/1de82943-16f3-4be8-9c10-98ff19632d96.json new file mode 100644 index 0000000000000000000000000000000000000000..5de6f0173fdf4c43db93c9a9177d7280962ba56a --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/1de82943-16f3-4be8-9c10-98ff19632d96.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "1de82943-16f3-4be8-9c10-98ff19632d96", + "type": "STRING", + "value": "Location" + }}, + "uuid": "1de82943-16f3-4be8-9c10-98ff19632d96" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/1e5c73cf-ad2e-479f-8fda-5fa62efbe3ec.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/1e5c73cf-ad2e-479f-8fda-5fa62efbe3ec.json new file mode 100644 index 0000000000000000000000000000000000000000..5b23af9321642dbd039506605d119f81f048caa3 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/1e5c73cf-ad2e-479f-8fda-5fa62efbe3ec.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "1e5c73cf-ad2e-479f-8fda-5fa62efbe3ec", + "type": "STRING", + "value": "Check that the certificate version is 2" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "1e5c73cf-ad2e-479f-8fda-5fa62efbe3ec", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "1e5c73cf-ad2e-479f-8fda-5fa62efbe3ec" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/21450aa2-5444-4b7f-999a-4a385c833eec.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/21450aa2-5444-4b7f-999a-4a385c833eec.json new file mode 100644 index 0000000000000000000000000000000000000000..53612ecb0a13378e063b8563878df33bad41f661 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/21450aa2-5444-4b7f-999a-4a385c833eec.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "21450aa2-5444-4b7f-999a-4a385c833eec", + "type": "STRING", + "value": "Location" + }}, + "uuid": "21450aa2-5444-4b7f-999a-4a385c833eec" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/235ceabe-4e4b-4beb-8988-bf7091fe8d2f.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/235ceabe-4e4b-4beb-8988-bf7091fe8d2f.json new file mode 100644 index 0000000000000000000000000000000000000000..7f634f064bc5df0136cf118c1cda36ec0680e3c6 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/235ceabe-4e4b-4beb-8988-bf7091fe8d2f.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "235ceabe-4e4b-4beb-8988-bf7091fe8d2f", + "type": "STRING", + "value": "Location" + }}, + "uuid": "235ceabe-4e4b-4beb-8988-bf7091fe8d2f" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/24846e25-0161-4426-9e87-27ac10525fa0.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/24846e25-0161-4426-9e87-27ac10525fa0.json new file mode 100644 index 0000000000000000000000000000000000000000..4e36437f994f555dbff0847ed8d45e8691b097e6 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/24846e25-0161-4426-9e87-27ac10525fa0.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "24846e25-0161-4426-9e87-27ac10525fa0", + "type": "STRING", + "value": "Location" + }}, + "uuid": "24846e25-0161-4426-9e87-27ac10525fa0" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/25a3bac6-9684-45fa-8d7f-410041a80dbb.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/25a3bac6-9684-45fa-8d7f-410041a80dbb.json new file mode 100644 index 0000000000000000000000000000000000000000..ae17d21cb66e59eff1903b5f2da59186508ae735 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/25a3bac6-9684-45fa-8d7f-410041a80dbb.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "25a3bac6-9684-45fa-8d7f-410041a80dbb", + "type": "STRING", + "value": "Location" + }}, + "uuid": "25a3bac6-9684-45fa-8d7f-410041a80dbb" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/274ddbb0-bfb4-4073-8304-ddc326713b86.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/274ddbb0-bfb4-4073-8304-ddc326713b86.json new file mode 100644 index 0000000000000000000000000000000000000000..5e1c3e7e687959b25e8b1c9ac7c1b26220ca5d4a --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/274ddbb0-bfb4-4073-8304-ddc326713b86.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "274ddbb0-bfb4-4073-8304-ddc326713b86", + "type": "STRING", + "value": "The elements in the validity_restrictions array shall be encoded in ascending numerical order of their type value, unless this is specifically overridden by a security profile. validity_restrictions shall not contain two entries with the same type value.<\/font><\/font><\/font><\/font><\/font><\/font><\/font><\/font>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "274ddbb0-bfb4-4073-8304-ddc326713b86", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "274ddbb0-bfb4-4073-8304-ddc326713b86" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/2b9121b8-50e9-4400-903f-eaa36ec0f806.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/2b9121b8-50e9-4400-903f-eaa36ec0f806.json new file mode 100644 index 0000000000000000000000000000000000000000..df70c58c38207b3f418eb8b39a2feca8b7c8045e --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/2b9121b8-50e9-4400-903f-eaa36ec0f806.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "2b9121b8-50e9-4400-903f-eaa36ec0f806", + "type": "STRING", + "value": "Location" + }}, + "uuid": "2b9121b8-50e9-4400-903f-eaa36ec0f806" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/2ea232e9-8999-4b23-a946-ac27ce63836a.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/2ea232e9-8999-4b23-a946-ac27ce63836a.json new file mode 100644 index 0000000000000000000000000000000000000000..a580e748ae45646b89e997b66b69cf7efab8a62b --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/2ea232e9-8999-4b23-a946-ac27ce63836a.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "2ea232e9-8999-4b23-a946-ac27ce63836a", + "type": "STRING", + "value": " or in regular communication by other ITS-Stations." + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "2ea232e9-8999-4b23-a946-ac27ce63836a", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "2ea232e9-8999-4b23-a946-ac27ce63836a" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/31d476e6-b809-400a-a06b-25bb659cc453.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/31d476e6-b809-400a-a06b-25bb659cc453.json new file mode 100644 index 0000000000000000000000000000000000000000..175ce242cef8cdfc19099a45c0c8554d19225794 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/31d476e6-b809-400a-a06b-25bb659cc453.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "31d476e6-b809-400a-a06b-25bb659cc453", + "type": "STRING", + "value": "Location" + }}, + "uuid": "31d476e6-b809-400a-a06b-25bb659cc453" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/322e2d54-6950-4e35-856e-87281b4b3aa6.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/322e2d54-6950-4e35-856e-87281b4b3aa6.json new file mode 100644 index 0000000000000000000000000000000000000000..e28422452b7092264307e7c029945398e7f178be --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/322e2d54-6950-4e35-856e-87281b4b3aa6.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "322e2d54-6950-4e35-856e-87281b4b3aa6", + "type": "STRING", + "value": "Location" + }}, + "uuid": "322e2d54-6950-4e35-856e-87281b4b3aa6" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/327b37e5-c93a-43f9-a88b-a47f21468381.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/327b37e5-c93a-43f9-a88b-a47f21468381.json new file mode 100644 index 0000000000000000000000000000000000000000..b4bd5b3c92ec093d808f8af50dbef9539136edbb --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/327b37e5-c93a-43f9-a88b-a47f21468381.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "327b37e5-c93a-43f9-a88b-a47f21468381", + "type": "STRING", + "value": "Location" + }}, + "uuid": "327b37e5-c93a-43f9-a88b-a47f21468381" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/327f9109-fdf6-4271-ad73-dde8a50590b7.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/327f9109-fdf6-4271-ad73-dde8a50590b7.json new file mode 100644 index 0000000000000000000000000000000000000000..efd3a178def0c76b0ed15e76938492ff3667a8e8 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/327f9109-fdf6-4271-ad73-dde8a50590b7.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "327f9109-fdf6-4271-ad73-dde8a50590b7", + "type": "STRING", + "value": "Location" + }}, + "uuid": "327f9109-fdf6-4271-ad73-dde8a50590b7" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/351c77d8-92de-4bb3-991e-a3b814285a8c.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/351c77d8-92de-4bb3-991e-a3b814285a8c.json new file mode 100644 index 0000000000000000000000000000000000000000..40f9a7a708dfd9540bd6d5e0f20c4c2579101bd8 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/351c77d8-92de-4bb3-991e-a3b814285a8c.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "351c77d8-92de-4bb3-991e-a3b814285a8c", + "type": "STRING", + "value": "Location" + }}, + "uuid": "351c77d8-92de-4bb3-991e-a3b814285a8c" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/3545ac20-454c-4f8b-8447-af4d7d3eb03c.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/3545ac20-454c-4f8b-8447-af4d7d3eb03c.json new file mode 100644 index 0000000000000000000000000000000000000000..a4f1ad64f8260a0bd9c00158d1f83e22a64f1fb7 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/3545ac20-454c-4f8b-8447-af4d7d3eb03c.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "3545ac20-454c-4f8b-8447-af4d7d3eb03c", + "type": "STRING", + "value": "Location" + }}, + "uuid": "3545ac20-454c-4f8b-8447-af4d7d3eb03c" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/36a05750-9fac-494a-adcc-c36a9b0b39c1.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/36a05750-9fac-494a-adcc-c36a9b0b39c1.json new file mode 100644 index 0000000000000000000000000000000000000000..8df0e366a7824d309a6d93f68681f94be33148da --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/36a05750-9fac-494a-adcc-c36a9b0b39c1.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "36a05750-9fac-494a-adcc-c36a9b0b39c1", + "type": "STRING", + "value": "Location" + }}, + "uuid": "36a05750-9fac-494a-adcc-c36a9b0b39c1" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/3a85743b-2d03-42a9-844a-56a299b12f74.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/3a85743b-2d03-42a9-844a-56a299b12f74.json new file mode 100644 index 0000000000000000000000000000000000000000..f9554a1b0412d09fb709d41d58b3af0fd9e88257 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/3a85743b-2d03-42a9-844a-56a299b12f74.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "3a85743b-2d03-42a9-844a-56a299b12f74", + "type": "STRING", + "value": "service_specific_permissions shall have a maximum length of 31 octets.<\/font>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "3a85743b-2d03-42a9-844a-56a299b12f74", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "3a85743b-2d03-42a9-844a-56a299b12f74" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/3ae26d61-824d-4a0c-81fe-3198413ca03c.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/3ae26d61-824d-4a0c-81fe-3198413ca03c.json new file mode 100644 index 0000000000000000000000000000000000000000..eac8774720dea73d113085147389f796fc640090 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/3ae26d61-824d-4a0c-81fe-3198413ca03c.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "3ae26d61-824d-4a0c-81fe-3198413ca03c", + "type": "STRING", + "value": " The field digests<var> in the structure of request_unrecognized_certificate shall be filled with a list of \nHashedId3<\/font>\n<\/a> elements of the missing ITS-S certificates. <\/font><\/font><\/font><\/font>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "3ae26d61-824d-4a0c-81fe-3198413ca03c", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "3ae26d61-824d-4a0c-81fe-3198413ca03c" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/3dc0faba-b8b1-45d9-85b2-90decaf8fd0f.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/3dc0faba-b8b1-45d9-85b2-90decaf8fd0f.json new file mode 100644 index 0000000000000000000000000000000000000000..e57bd341514230d810f7fdbe968294ef5535e509 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/3dc0faba-b8b1-45d9-85b2-90decaf8fd0f.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "3dc0faba-b8b1-45d9-85b2-90decaf8fd0f", + "type": "STRING", + "value": "Each ITS-AID shall be unique in the its_aid_list.<\/font><\/font>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "3dc0faba-b8b1-45d9-85b2-90decaf8fd0f", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "3dc0faba-b8b1-45d9-85b2-90decaf8fd0f" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/3e04d28f-0401-4b5c-ba33-b47d0e63946b.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/3e04d28f-0401-4b5c-ba33-b47d0e63946b.json new file mode 100644 index 0000000000000000000000000000000000000000..2218f9d82f92ce93d71cafa3d33d83dc98095395 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/3e04d28f-0401-4b5c-ba33-b47d0e63946b.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "3e04d28f-0401-4b5c-ba33-b47d0e63946b", + "type": "STRING", + "value": "None of the possible HeaderField cases shall be included more than once<\/font><\/font>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "3e04d28f-0401-4b5c-ba33-b47d0e63946b", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "3e04d28f-0401-4b5c-ba33-b47d0e63946b" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/3f1cd606-cf67-4db0-ac19-64fc7452d17a.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/3f1cd606-cf67-4db0-ac19-64fc7452d17a.json new file mode 100644 index 0000000000000000000000000000000000000000..af48170c3a72a5ca2fc511a85c3c99aef95d6d78 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/3f1cd606-cf67-4db0-ac19-64fc7452d17a.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "3f1cd606-cf67-4db0-ac19-64fc7452d17a", + "type": "STRING", + "value": "Location" + }}, + "uuid": "3f1cd606-cf67-4db0-ac19-64fc7452d17a" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/427fc514-9bc6-4e55-b69a-59058905f749.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/427fc514-9bc6-4e55-b69a-59058905f749.json new file mode 100644 index 0000000000000000000000000000000000000000..dbbeed62eadb6313aa12f71a7c37882b3a82a76d --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/427fc514-9bc6-4e55-b69a-59058905f749.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "427fc514-9bc6-4e55-b69a-59058905f749", + "type": "STRING", + "value": "These SubjectAttribute elements shall be included in addition to those specified in clause 7.<\/a>4.1 for authorization authority and enrolment authority certificates<\/font><\/font>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "427fc514-9bc6-4e55-b69a-59058905f749", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "427fc514-9bc6-4e55-b69a-59058905f749" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/42e1c2c7-4b3f-4b5f-b9b7-39181507295d.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/42e1c2c7-4b3f-4b5f-b9b7-39181507295d.json new file mode 100644 index 0000000000000000000000000000000000000000..54a87fcd1ceebac36e2dcc5380ef10f6d7853c83 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/42e1c2c7-4b3f-4b5f-b9b7-39181507295d.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "42e1c2c7-4b3f-4b5f-b9b7-39181507295d", + "type": "STRING", + "value": "None of the possible HeaderField cases shall be included more than once<\/font><\/font>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "42e1c2c7-4b3f-4b5f-b9b7-39181507295d", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "42e1c2c7-4b3f-4b5f-b9b7-39181507295d" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/43a47e59-9bb0-46ab-bcb3-2f373b450e48.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/43a47e59-9bb0-46ab-bcb3-2f373b450e48.json new file mode 100644 index 0000000000000000000000000000000000000000..56c8df30f9775aa687b4167d638c982cab41741d --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/43a47e59-9bb0-46ab-bcb3-2f373b450e48.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "43a47e59-9bb0-46ab-bcb3-2f373b450e48", + "type": "STRING", + "value": "this field shall encode the ITS-AID for DENMs according to ETSI TS 102 965" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "43a47e59-9bb0-46ab-bcb3-2f373b450e48", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "43a47e59-9bb0-46ab-bcb3-2f373b450e48" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/464098d6-4402-43a2-a11b-e6c0ebb97df7.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/464098d6-4402-43a2-a11b-e6c0ebb97df7.json new file mode 100644 index 0000000000000000000000000000000000000000..15e28538b1475ba5130d57cc6bbb99bb08b3d917 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/464098d6-4402-43a2-a11b-e6c0ebb97df7.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "464098d6-4402-43a2-a11b-e6c0ebb97df7", + "type": "STRING", + "value": "Location" + }}, + "uuid": "464098d6-4402-43a2-a11b-e6c0ebb97df7" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/471f67f8-42d9-443f-ba6f-b5a769e6843d.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/471f67f8-42d9-443f-ba6f-b5a769e6843d.json new file mode 100644 index 0000000000000000000000000000000000000000..d0430a49e5b7f6f29e9f16fcd97809e06f416480 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/471f67f8-42d9-443f-ba6f-b5a769e6843d.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "471f67f8-42d9-443f-ba6f-b5a769e6843d", + "type": "STRING", + "value": "In this case, the timer for the next inclusion of a field of type certificate shall be restarted.<\/font><\/font>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "471f67f8-42d9-443f-ba6f-b5a769e6843d", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "471f67f8-42d9-443f-ba6f-b5a769e6843d" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/48446131-84b3-42e3-a8b0-b107a400493e.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/48446131-84b3-42e3-a8b0-b107a400493e.json new file mode 100644 index 0000000000000000000000000000000000000000..c022c245b2063d4c1fe53b0392ab2706a7303ba7 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/48446131-84b3-42e3-a8b0-b107a400493e.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "48446131-84b3-42e3-a8b0-b107a400493e", + "type": "STRING", + "value": "Location" + }}, + "uuid": "48446131-84b3-42e3-a8b0-b107a400493e" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/49abf17c-f239-46b9-ad89-ac52a283c52c.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/49abf17c-f239-46b9-ad89-ac52a283c52c.json new file mode 100644 index 0000000000000000000000000000000000000000..5bd3e18e55a3fa9e2206347c850467c8485a6239 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/49abf17c-f239-46b9-ad89-ac52a283c52c.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "49abf17c-f239-46b9-ad89-ac52a283c52c", + "type": "STRING", + "value": "The ITS-AID of the application payload shall be given." + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "49abf17c-f239-46b9-ad89-ac52a283c52c", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "49abf17c-f239-46b9-ad89-ac52a283c52c" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/4fa66be8-d4df-4de8-b819-ec6bcddb5b3f.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/4fa66be8-d4df-4de8-b819-ec6bcddb5b3f.json new file mode 100644 index 0000000000000000000000000000000000000000..3b67042d9aac5e289d8ebf10ece4c5b9832734cc --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/4fa66be8-d4df-4de8-b819-ec6bcddb5b3f.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "4fa66be8-d4df-4de8-b819-ec6bcddb5b3f", + "type": "STRING", + "value": "Location" + }}, + "uuid": "4fa66be8-d4df-4de8-b819-ec6bcddb5b3f" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/505b40cc-d494-4325-aed5-9daad40aba2f.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/505b40cc-d494-4325-aed5-9daad40aba2f.json new file mode 100644 index 0000000000000000000000000000000000000000..4f49fec17fb8c071116eaa62c2897a233af2a515 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/505b40cc-d494-4325-aed5-9daad40aba2f.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "505b40cc-d494-4325-aed5-9daad40aba2f", + "type": "STRING", + "value": "Location" + }}, + "uuid": "505b40cc-d494-4325-aed5-9daad40aba2f" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/534d09ee-ceec-41bf-bbb4-3f9c7825da92.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/534d09ee-ceec-41bf-bbb4-3f9c7825da92.json new file mode 100644 index 0000000000000000000000000000000000000000..0d2b6ecd37c80486e9bbc3358e49ebef5715c219 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/534d09ee-ceec-41bf-bbb4-3f9c7825da92.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "534d09ee-ceec-41bf-bbb4-3f9c7825da92", + "type": "STRING", + "value": "Location" + }}, + "uuid": "534d09ee-ceec-41bf-bbb4-3f9c7825da92" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/54bc9834-9895-4ea3-b091-ac14c2e45b29.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/54bc9834-9895-4ea3-b091-ac14c2e45b29.json new file mode 100644 index 0000000000000000000000000000000000000000..88ef0561b67bb54569ba2221f3f2ffdc3337d371 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/54bc9834-9895-4ea3-b091-ac14c2e45b29.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "54bc9834-9895-4ea3-b091-ac14c2e45b29", + "type": "STRING", + "value": "In case of rectangle, the region shall consist of a variable-length vector of rectangles that may be overlapping or disjoint. The variable-length vector shall not contain more than 6 rectangles. The region covered by the rectangles shall be continuous and shall not contain holes.<\/font><\/font>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "54bc9834-9895-4ea3-b091-ac14c2e45b29", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "54bc9834-9895-4ea3-b091-ac14c2e45b29" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/56cf21c7-baf9-4b70-932f-326b22b242a8.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/56cf21c7-baf9-4b70-932f-326b22b242a8.json new file mode 100644 index 0000000000000000000000000000000000000000..74806cccce611d6b9b4f7069b05205b12e7e27ac --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/56cf21c7-baf9-4b70-932f-326b22b242a8.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "56cf21c7-baf9-4b70-932f-326b22b242a8", + "type": "STRING", + "value": "The generation_time is valid, if it is in the validity period of the certificate referenced by the signer_info.<\/font><\/font><\/font><\/font>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "56cf21c7-baf9-4b70-932f-326b22b242a8", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "56cf21c7-baf9-4b70-932f-326b22b242a8" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/57f67514-1422-48ef-b36e-262137eb7251.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/57f67514-1422-48ef-b36e-262137eb7251.json new file mode 100644 index 0000000000000000000000000000000000000000..cf0edef3e85decae13f0ac32d4110374797af60a --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/57f67514-1422-48ef-b36e-262137eb7251.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "57f67514-1422-48ef-b36e-262137eb7251", + "type": "STRING", + "value": "Location" + }}, + "uuid": "57f67514-1422-48ef-b36e-262137eb7251" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/58ea9176-dfab-4645-a9a2-855e9d5d57dc.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/58ea9176-dfab-4645-a9a2-855e9d5d57dc.json new file mode 100644 index 0000000000000000000000000000000000000000..82924ca95f9b66507c9078f01e5b1cad474ecfc1 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/58ea9176-dfab-4645-a9a2-855e9d5d57dc.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "58ea9176-dfab-4645-a9a2-855e9d5d57dc", + "type": "STRING", + "value": " For compliance with the present document, protocol version 2 shall be used<\/font><\/font>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "58ea9176-dfab-4645-a9a2-855e9d5d57dc", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "58ea9176-dfab-4645-a9a2-855e9d5d57dc" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/5d1ff90b-ad9c-416c-900b-030397b6b6ee.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/5d1ff90b-ad9c-416c-900b-030397b6b6ee.json new file mode 100644 index 0000000000000000000000000000000000000000..3daed9b39e8cc40905e4ed2d46bac11a6229f438 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/5d1ff90b-ad9c-416c-900b-030397b6b6ee.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "5d1ff90b-ad9c-416c-900b-030397b6b6ee", + "type": "STRING", + "value": "Location" + }}, + "uuid": "5d1ff90b-ad9c-416c-900b-030397b6b6ee" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/5d915e97-a60c-4999-8820-e69c5f87128c.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/5d915e97-a60c-4999-8820-e69c5f87128c.json new file mode 100644 index 0000000000000000000000000000000000000000..0db605163f9b2c32167cd7a163fa85e90a31b945 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/5d915e97-a60c-4999-8820-e69c5f87128c.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "5d915e97-a60c-4999-8820-e69c5f87128c", + "type": "STRING", + "value": "The generation_time is valid, if it is in the validity period of the certificate referenced by the signer_info.<\/font><\/font><\/font><\/font>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "5d915e97-a60c-4999-8820-e69c5f87128c", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "5d915e97-a60c-4999-8820-e69c5f87128c" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/5e9ae933-303e-4fa9-8a48-436757e98ab9.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/5e9ae933-303e-4fa9-8a48-436757e98ab9.json new file mode 100644 index 0000000000000000000000000000000000000000..b78624012c0c4a5a5c41965f1d8502ba4449c5bc --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/5e9ae933-303e-4fa9-8a48-436757e98ab9.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "5e9ae933-303e-4fa9-8a48-436757e98ab9", + "type": "STRING", + "value": "Location" + }}, + "uuid": "5e9ae933-303e-4fa9-8a48-436757e98ab9" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/60585f95-c23b-4663-a422-c5a12c7b17ab.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/60585f95-c23b-4663-a422-c5a12c7b17ab.json new file mode 100644 index 0000000000000000000000000000000000000000..37cf8486a778955f2ea045974d67f03b1fcaa9be --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/60585f95-c23b-4663-a422-c5a12c7b17ab.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "60585f95-c23b-4663-a422-c5a12c7b17ab", + "type": "STRING", + "value": "The dictionary that corresponds to iso_3166_1 shall contain values that correspond to numeric country codes as defined in
    ISO 3166-1 [
    3<\/a>]<\/font><\/font>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "60585f95-c23b-4663-a422-c5a12c7b17ab", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "60585f95-c23b-4663-a422-c5a12c7b17ab" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/615b41cb-6660-41b4-8375-b658436ca1df.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/615b41cb-6660-41b4-8375-b658436ca1df.json new file mode 100644 index 0000000000000000000000000000000000000000..fd9214405f61b1603e19fb6240f72d0f032d55e5 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/615b41cb-6660-41b4-8375-b658436ca1df.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "615b41cb-6660-41b4-8375-b658436ca1df", + "type": "STRING", + "value": "Location" + }}, + "uuid": "615b41cb-6660-41b4-8375-b658436ca1df" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/61b388f4-8bad-4b8a-9684-eae475708a7a.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/61b388f4-8bad-4b8a-9684-eae475708a7a.json new file mode 100644 index 0000000000000000000000000000000000000000..8dfe695e046dec7cca86885f56c78381a5a95010 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/61b388f4-8bad-4b8a-9684-eae475708a7a.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "61b388f4-8bad-4b8a-9684-eae475708a7a", + "type": "STRING", + "value": "Location" + }}, + "uuid": "61b388f4-8bad-4b8a-9684-eae475708a7a" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/6694e8a1-e064-4703-a0d5-c44221f8cfb4.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/6694e8a1-e064-4703-a0d5-c44221f8cfb4.json new file mode 100644 index 0000000000000000000000000000000000000000..b5f20c977d7b5a1d49400501c5354c20fae9362a --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/6694e8a1-e064-4703-a0d5-c44221f8cfb4.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "6694e8a1-e064-4703-a0d5-c44221f8cfb4", + "type": "STRING", + "value": "Location" + }}, + "uuid": "6694e8a1-e064-4703-a0d5-c44221f8cfb4" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/69c806d3-882e-43b1-b8fe-6dc0c8d1da4c.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/69c806d3-882e-43b1-b8fe-6dc0c8d1da4c.json new file mode 100644 index 0000000000000000000000000000000000000000..ab665a83be7f2bb5cbfaf74e20b6bcbb6bb1c62a --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/69c806d3-882e-43b1-b8fe-6dc0c8d1da4c.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "69c806d3-882e-43b1-b8fe-6dc0c8d1da4c", + "type": "STRING", + "value": "Location" + }}, + "uuid": "69c806d3-882e-43b1-b8fe-6dc0c8d1da4c" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/6a3eda29-6ac0-4512-b580-2579faf5eb0b.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/6a3eda29-6ac0-4512-b580-2579faf5eb0b.json new file mode 100644 index 0000000000000000000000000000000000000000..02344479828ddd80c91a67cde691730d91cdcac5 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/6a3eda29-6ac0-4512-b580-2579faf5eb0b.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "6a3eda29-6ac0-4512-b580-2579faf5eb0b", + "type": "STRING", + "value": "If the ITS-S receives a CAM from a previously unknown certificate, it shall include a field of type certificate immediately in its next CAM, instead of including a field of type certificate_digest_with_sha256<\/font><\/font><\/font>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "6a3eda29-6ac0-4512-b580-2579faf5eb0b", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "6a3eda29-6ac0-4512-b580-2579faf5eb0b" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/6c2640ff-fb9f-40a1-8f28-844633fefa42.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/6c2640ff-fb9f-40a1-8f28-844633fefa42.json new file mode 100644 index 0000000000000000000000000000000000000000..5af776a7d4f8198b82f391f21ead5d08d6616c60 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/6c2640ff-fb9f-40a1-8f28-844633fefa42.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "6c2640ff-fb9f-40a1-8f28-844633fefa42", + "type": "STRING", + "value": "A valid certificate shall contain exactly one validity restriction of type time_end, time_start_and_end, or time_start_and_duration.<\/font><\/font><\/font><\/font><\/font><\/font>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "6c2640ff-fb9f-40a1-8f28-844633fefa42", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "6c2640ff-fb9f-40a1-8f28-844633fefa42" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/6c62596c-7b03-4d58-8b8a-d91ebad153f1.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/6c62596c-7b03-4d58-8b8a-d91ebad153f1.json new file mode 100644 index 0000000000000000000000000000000000000000..68d38fb4ea441e679d891097e97ac577a27ab877 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/6c62596c-7b03-4d58-8b8a-d91ebad153f1.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "6c62596c-7b03-4d58-8b8a-d91ebad153f1", + "type": "STRING", + "value": "Location" + }}, + "uuid": "6c62596c-7b03-4d58-8b8a-d91ebad153f1" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/6e73abdf-644e-40f0-ac1c-9b8dccb30af0.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/6e73abdf-644e-40f0-ac1c-9b8dccb30af0.json new file mode 100644 index 0000000000000000000000000000000000000000..b59ba94545972f5f01f5892352d7db81b17dc4d8 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/6e73abdf-644e-40f0-ac1c-9b8dccb30af0.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "6e73abdf-644e-40f0-ac1c-9b8dccb30af0", + "type": "STRING", + "value": "Location" + }}, + "uuid": "6e73abdf-644e-40f0-ac1c-9b8dccb30af0" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/73eaa11c-13d1-4db7-840f-c17ed625c22b.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/73eaa11c-13d1-4db7-840f-c17ed625c22b.json new file mode 100644 index 0000000000000000000000000000000000000000..0a76932296b03ed7da231ad9c211585db37d9c0d --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/73eaa11c-13d1-4db7-840f-c17ed625c22b.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "73eaa11c-13d1-4db7-840f-c17ed625c22b", + "type": "STRING", + "value": "These \nHeaderField<\/font>\n<\/a> elements shall be included." + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "73eaa11c-13d1-4db7-840f-c17ed625c22b", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "73eaa11c-13d1-4db7-840f-c17ed625c22b" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/783519e9-a067-4deb-b103-46fa94db39bf.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/783519e9-a067-4deb-b103-46fa94db39bf.json new file mode 100644 index 0000000000000000000000000000000000000000..99418a7ab02c353f2c7d4c3112c19bf7adab53b1 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/783519e9-a067-4deb-b103-46fa94db39bf.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "783519e9-a067-4deb-b103-46fa94db39bf", + "type": "STRING", + "value": "Location" + }}, + "uuid": "783519e9-a067-4deb-b103-46fa94db39bf" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/79fbc65f-3205-4cab-b29e-4d2a76a95f7d.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/79fbc65f-3205-4cab-b29e-4d2a76a95f7d.json new file mode 100644 index 0000000000000000000000000000000000000000..6552ee819eaad58fc97d50dc75293f3e626850d6 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/79fbc65f-3205-4cab-b29e-4d2a76a95f7d.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "79fbc65f-3205-4cab-b29e-4d2a76a95f7d", + "type": "STRING", + "value": "Location" + }}, + "uuid": "79fbc65f-3205-4cab-b29e-4d2a76a95f7d" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/815d02b2-2d5e-4a9d-8632-386a8017515f.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/815d02b2-2d5e-4a9d-8632-386a8017515f.json new file mode 100644 index 0000000000000000000000000000000000000000..d865480e23e999ef580d7b30c94798a241b36f23 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/815d02b2-2d5e-4a9d-8632-386a8017515f.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "815d02b2-2d5e-4a9d-8632-386a8017515f", + "type": "STRING", + "value": "Location" + }}, + "uuid": "815d02b2-2d5e-4a9d-8632-386a8017515f" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/8a319e13-50a8-4e29-a775-30d3853d05f0.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/8a319e13-50a8-4e29-a775-30d3853d05f0.json new file mode 100644 index 0000000000000000000000000000000000000000..f274fe511bcd40587b5260db88d0c81b546367f9 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/8a319e13-50a8-4e29-a775-30d3853d05f0.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "8a319e13-50a8-4e29-a775-30d3853d05f0", + "type": "STRING", + "value": "Location" + }}, + "uuid": "8a319e13-50a8-4e29-a775-30d3853d05f0" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/8d8ff631-c7f2-4672-9842-a920332238d1.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/8d8ff631-c7f2-4672-9842-a920332238d1.json new file mode 100644 index 0000000000000000000000000000000000000000..55062778cc72c3985f769eb53f505dae0334d43c --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/8d8ff631-c7f2-4672-9842-a920332238d1.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "8d8ff631-c7f2-4672-9842-a920332238d1", + "type": "STRING", + "value": "Location" + }}, + "uuid": "8d8ff631-c7f2-4672-9842-a920332238d1" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/8e7d8e4d-7e88-49b1-aff3-5965323ae99d.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/8e7d8e4d-7e88-49b1-aff3-5965323ae99d.json new file mode 100644 index 0000000000000000000000000000000000000000..41d5c9e1a296e3a8c99a44a8710c14025ef584f9 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/8e7d8e4d-7e88-49b1-aff3-5965323ae99d.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "8e7d8e4d-7e88-49b1-aff3-5965323ae99d", + "type": "STRING", + "value": "Location" + }}, + "uuid": "8e7d8e4d-7e88-49b1-aff3-5965323ae99d" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/8f464e0c-426a-4372-8f2f-acbf3dd444c5.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/8f464e0c-426a-4372-8f2f-acbf3dd444c5.json new file mode 100644 index 0000000000000000000000000000000000000000..784561472f87e19522c27ef691c73da5c32bcfbb --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/8f464e0c-426a-4372-8f2f-acbf3dd444c5.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "8f464e0c-426a-4372-8f2f-acbf3dd444c5", + "type": "STRING", + "value": "The signature shall be calculated over the encoding of all preceding fields, including all encoded lengths." + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "8f464e0c-426a-4372-8f2f-acbf3dd444c5", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "8f464e0c-426a-4372-8f2f-acbf3dd444c5" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/95fc530d-de2c-4b47-b553-e8d5b08cae41.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/95fc530d-de2c-4b47-b553-e8d5b08cae41.json new file mode 100644 index 0000000000000000000000000000000000000000..a2b164f3cca28082ef46483a19ea7e36186fb665 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/95fc530d-de2c-4b47-b553-e8d5b08cae41.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "95fc530d-de2c-4b47-b553-e8d5b08cae41", + "type": "STRING", + "value": "Location" + }}, + "uuid": "95fc530d-de2c-4b47-b553-e8d5b08cae41" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/967d4b57-1e68-438c-b9e2-e20c3877f499.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/967d4b57-1e68-438c-b9e2-e20c3877f499.json new file mode 100644 index 0000000000000000000000000000000000000000..c5a135f366951f3d3760ee6b493d404e86ffe8b6 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/967d4b57-1e68-438c-b9e2-e20c3877f499.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "967d4b57-1e68-438c-b9e2-e20c3877f499", + "type": "STRING", + "value": "Location" + }}, + "uuid": "967d4b57-1e68-438c-b9e2-e20c3877f499" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/996d0f1f-568b-4149-9275-a952ac793aaa.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/996d0f1f-568b-4149-9275-a952ac793aaa.json new file mode 100644 index 0000000000000000000000000000000000000000..f0d91c0894710f8358975931a102c824b92895c8 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/996d0f1f-568b-4149-9275-a952ac793aaa.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "996d0f1f-568b-4149-9275-a952ac793aaa", + "type": "STRING", + "value": "Location" + }}, + "uuid": "996d0f1f-568b-4149-9275-a952ac793aaa" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/99a86360-2aa2-4fad-82d3-015c9fa9345d.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/99a86360-2aa2-4fad-82d3-015c9fa9345d.json new file mode 100644 index 0000000000000000000000000000000000000000..dbecc31229cb260eec7f31809c4cd6dc8a8936c0 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/99a86360-2aa2-4fad-82d3-015c9fa9345d.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "99a86360-2aa2-4fad-82d3-015c9fa9345d", + "type": "STRING", + "value": "Location" + }}, + "uuid": "99a86360-2aa2-4fad-82d3-015c9fa9345d" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/9bdd04f1-3bca-4642-9a33-503b4c02b7b8.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/9bdd04f1-3bca-4642-9a33-503b4c02b7b8.json new file mode 100644 index 0000000000000000000000000000000000000000..866093ceee6bccc4120f1d8f97e03887ef3d69ce --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/9bdd04f1-3bca-4642-9a33-503b4c02b7b8.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "9bdd04f1-3bca-4642-9a33-503b4c02b7b8", + "type": "STRING", + "value": "Location" + }}, + "uuid": "9bdd04f1-3bca-4642-9a33-503b4c02b7b8" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/9e56d5a0-75dc-4481-afe9-202dd280af93.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/9e56d5a0-75dc-4481-afe9-202dd280af93.json new file mode 100644 index 0000000000000000000000000000000000000000..0868de4a1f52a2a47a0629638ea36495db92ad91 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/9e56d5a0-75dc-4481-afe9-202dd280af93.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "9e56d5a0-75dc-4481-afe9-202dd280af93", + "type": "STRING", + "value": "Location" + }}, + "uuid": "9e56d5a0-75dc-4481-afe9-202dd280af93" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/9f584669-0edc-4cd5-9e25-979e66b5e955.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/9f584669-0edc-4cd5-9e25-979e66b5e955.json new file mode 100644 index 0000000000000000000000000000000000000000..2dba719d475c6acd41cba9fe2dbf7d0a73108953 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/9f584669-0edc-4cd5-9e25-979e66b5e955.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "9f584669-0edc-4cd5-9e25-979e66b5e955", + "type": "STRING", + "value": "Location" + }}, + "uuid": "9f584669-0edc-4cd5-9e25-979e66b5e955" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/a0b07625-0f38-485c-af74-5a86d4a118a4.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/a0b07625-0f38-485c-af74-5a86d4a118a4.json new file mode 100644 index 0000000000000000000000000000000000000000..c6e2d3a60f075726d19ef352c16c9fa5a21b16a2 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/a0b07625-0f38-485c-af74-5a86d4a118a4.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "a0b07625-0f38-485c-af74-5a86d4a118a4", + "type": "STRING", + "value": "The elements in the subject_attributes array shall be encoded in ascending numerical order of their type value, unless this is specifically overridden by a security profile.<\/font><\/font><\/font><\/font>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "a0b07625-0f38-485c-af74-5a86d4a118a4", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "a0b07625-0f38-485c-af74-5a86d4a118a4" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/a33dda53-c9a9-472b-ad97-a9e461c6df3e.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/a33dda53-c9a9-472b-ad97-a9e461c6df3e.json new file mode 100644 index 0000000000000000000000000000000000000000..4a41c06b362aa50fc3c6ae620647b194b4de159c --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/a33dda53-c9a9-472b-ad97-a9e461c6df3e.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "a33dda53-c9a9-472b-ad97-a9e461c6df3e", + "type": "STRING", + "value": "Location" + }}, + "uuid": "a33dda53-c9a9-472b-ad97-a9e461c6df3e" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/a4690788-2d8b-4791-9464-0bb84527f54b.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/a4690788-2d8b-4791-9464-0bb84527f54b.json new file mode 100644 index 0000000000000000000000000000000000000000..7f069ad15a243075a4a7d7aa7d8aaefb43029fa3 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/a4690788-2d8b-4791-9464-0bb84527f54b.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "a4690788-2d8b-4791-9464-0bb84527f54b", + "type": "STRING", + "value": "Location" + }}, + "uuid": "a4690788-2d8b-4791-9464-0bb84527f54b" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/a53c9dad-b4db-41d2-92b2-821d276b747b.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/a53c9dad-b4db-41d2-92b2-821d276b747b.json new file mode 100644 index 0000000000000000000000000000000000000000..040ba783e04e6da8728061a015f5c7519f66c7a4 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/a53c9dad-b4db-41d2-92b2-821d276b747b.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "a53c9dad-b4db-41d2-92b2-821d276b747b", + "type": "STRING", + "value": "With the exception of signer_info, which is encoded first, all header_field elements shall be included in ascending order according to the numbering of the enumeration of the according type structure<\/font><\/font>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "a53c9dad-b4db-41d2-92b2-821d276b747b", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "a53c9dad-b4db-41d2-92b2-821d276b747b" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/a5aaa3b8-fe7b-4f50-8dff-a3674829fa6f.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/a5aaa3b8-fe7b-4f50-8dff-a3674829fa6f.json new file mode 100644 index 0000000000000000000000000000000000000000..291b92ea6477863f95edced8f0f276920afee72a --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/a5aaa3b8-fe7b-4f50-8dff-a3674829fa6f.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "a5aaa3b8-fe7b-4f50-8dff-a3674829fa6f", + "type": "STRING", + "value": "Location" + }}, + "uuid": "a5aaa3b8-fe7b-4f50-8dff-a3674829fa6f" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/a5f4f412-efbc-4a6d-a05d-4170914778ea.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/a5f4f412-efbc-4a6d-a05d-4170914778ea.json new file mode 100644 index 0000000000000000000000000000000000000000..9e6a972265bfb107f381e17fdbf872f1a3e3159c --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/a5f4f412-efbc-4a6d-a05d-4170914778ea.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "a5f4f412-efbc-4a6d-a05d-4170914778ea", + "type": "STRING", + "value": "Location" + }}, + "uuid": "a5f4f412-efbc-4a6d-a05d-4170914778ea" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/ab9e2898-6189-4d9a-b908-74c5226bb19e.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/ab9e2898-6189-4d9a-b908-74c5226bb19e.json new file mode 100644 index 0000000000000000000000000000000000000000..1fb17400fc29db724ac68807cb8985de2e67837b --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/ab9e2898-6189-4d9a-b908-74c5226bb19e.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "ab9e2898-6189-4d9a-b908-74c5226bb19e", + "type": "STRING", + "value": "Location" + }}, + "uuid": "ab9e2898-6189-4d9a-b908-74c5226bb19e" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/afc8e021-8c93-4ae6-8138-3020574e57b5.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/afc8e021-8c93-4ae6-8138-3020574e57b5.json new file mode 100644 index 0000000000000000000000000000000000000000..82ed876ea21aed272ca189b4e24607da4275f476 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/afc8e021-8c93-4ae6-8138-3020574e57b5.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "afc8e021-8c93-4ae6-8138-3020574e57b5", + "type": "STRING", + "value": "Location" + }}, + "uuid": "afc8e021-8c93-4ae6-8138-3020574e57b5" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/b2391447-465b-4447-aa98-bad8ca9aa5cb.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/b2391447-465b-4447-aa98-bad8ca9aa5cb.json new file mode 100644 index 0000000000000000000000000000000000000000..7f19af7e3368127d4d0793a9cf9d0cb9238ff4d1 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/b2391447-465b-4447-aa98-bad8ca9aa5cb.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "b2391447-465b-4447-aa98-bad8ca9aa5cb", + "type": "STRING", + "value": "Authorization tickets (pseudonymous certificates)" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "b2391447-465b-4447-aa98-bad8ca9aa5cb", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "b2391447-465b-4447-aa98-bad8ca9aa5cb" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/b31b89ad-2b2a-4bc8-a16f-9c2918b931c9.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/b31b89ad-2b2a-4bc8-a16f-9c2918b931c9.json new file mode 100644 index 0000000000000000000000000000000000000000..27e0a7516aef0070154cd44569702855ee515e90 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/b31b89ad-2b2a-4bc8-a16f-9c2918b931c9.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "b31b89ad-2b2a-4bc8-a16f-9c2918b931c9", + "type": "STRING", + "value": "If ITS-S sends a signed message with general security profile check that the sent SecuredMessage contains exactly one HeaderField generation_time which is inside the validity time of the certificate referenced by the signer_info." + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "b31b89ad-2b2a-4bc8-a16f-9c2918b931c9", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "b31b89ad-2b2a-4bc8-a16f-9c2918b931c9" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/b661365c-ed7a-410c-803f-e9702b195a7e.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/b661365c-ed7a-410c-803f-e9702b195a7e.json new file mode 100644 index 0000000000000000000000000000000000000000..1d76baf00842c99c496b46a5bc3b96a1b7e3ed69 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/b661365c-ed7a-410c-803f-e9702b195a7e.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "b661365c-ed7a-410c-803f-e9702b195a7e", + "type": "STRING", + "value": "Location" + }}, + "uuid": "b661365c-ed7a-410c-803f-e9702b195a7e" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/b6e04816-8080-4afe-bf78-8aa8aa77f430.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/b6e04816-8080-4afe-bf78-8aa8aa77f430.json new file mode 100644 index 0000000000000000000000000000000000000000..1ae4c2aaa426616cb33e666f2311c86cf198661f --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/b6e04816-8080-4afe-bf78-8aa8aa77f430.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "b6e04816-8080-4afe-bf78-8aa8aa77f430", + "type": "STRING", + "value": "Location" + }}, + "uuid": "b6e04816-8080-4afe-bf78-8aa8aa77f430" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/b890b744-ffd8-4c30-bc3e-1ff84d0375d9.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/b890b744-ffd8-4c30-bc3e-1ff84d0375d9.json new file mode 100644 index 0000000000000000000000000000000000000000..e361a49cbf2bed68abf41c84597d0a58aa98d043 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/b890b744-ffd8-4c30-bc3e-1ff84d0375d9.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "b890b744-ffd8-4c30-bc3e-1ff84d0375d9", + "type": "STRING", + "value": "Location" + }}, + "uuid": "b890b744-ffd8-4c30-bc3e-1ff84d0375d9" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/b92fccca-032f-4a3c-8b7d-89e0cd966e8d.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/b92fccca-032f-4a3c-8b7d-89e0cd966e8d.json new file mode 100644 index 0000000000000000000000000000000000000000..91649811cdb695798555e207d35b9a62c06b6140 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/b92fccca-032f-4a3c-8b7d-89e0cd966e8d.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "b92fccca-032f-4a3c-8b7d-89e0cd966e8d", + "type": "STRING", + "value": "Location" + }}, + "uuid": "b92fccca-032f-4a3c-8b7d-89e0cd966e8d" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/b9e76387-9dee-4b5f-a3d8-ab512d88e8a6.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/b9e76387-9dee-4b5f-a3d8-ab512d88e8a6.json new file mode 100644 index 0000000000000000000000000000000000000000..9be32f5b6ec3833ec72b4045aa1a131f160f6633 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/b9e76387-9dee-4b5f-a3d8-ab512d88e8a6.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "b9e76387-9dee-4b5f-a3d8-ab512d88e8a6", + "type": "STRING", + "value": "Location" + }}, + "uuid": "b9e76387-9dee-4b5f-a3d8-ab512d88e8a6" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/ba54b16f-08a0-4aaf-ae3a-72f384145f83.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/ba54b16f-08a0-4aaf-ae3a-72f384145f83.json new file mode 100644 index 0000000000000000000000000000000000000000..09cae957b9cf175705316030ea4c59f637af11b4 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/ba54b16f-08a0-4aaf-ae3a-72f384145f83.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "ba54b16f-08a0-4aaf-ae3a-72f384145f83", + "type": "STRING", + "value": "Check that the certificate version is 2" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "ba54b16f-08a0-4aaf-ae3a-72f384145f83", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "ba54b16f-08a0-4aaf-ae3a-72f384145f83" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/bb625a74-4db2-4e81-9291-ed3446144b3b.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/bb625a74-4db2-4e81-9291-ed3446144b3b.json new file mode 100644 index 0000000000000000000000000000000000000000..5b63c403f6d721aa9f6ecf78524c3f3001df8ddc --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/bb625a74-4db2-4e81-9291-ed3446144b3b.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "bb625a74-4db2-4e81-9291-ed3446144b3b", + "type": "STRING", + "value": "Location" + }}, + "uuid": "bb625a74-4db2-4e81-9291-ed3446144b3b" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/bf8fd5f7-1eca-4385-b102-d7f1bbba5660.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/bf8fd5f7-1eca-4385-b102-d7f1bbba5660.json new file mode 100644 index 0000000000000000000000000000000000000000..138415f2f94eeee437b2efa1ab827217d86d3017 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/bf8fd5f7-1eca-4385-b102-d7f1bbba5660.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "bf8fd5f7-1eca-4385-b102-d7f1bbba5660", + "type": "STRING", + "value": "A rectangular region is only valid if the location northwest is north of the location southeast<\/font><\/font>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "bf8fd5f7-1eca-4385-b102-d7f1bbba5660", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "bf8fd5f7-1eca-4385-b102-d7f1bbba5660" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/c1d9965d-8c11-4b5b-af2b-42bba5482fd7.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/c1d9965d-8c11-4b5b-af2b-42bba5482fd7.json new file mode 100644 index 0000000000000000000000000000000000000000..5d7bbf2d4ea5b57858060151522eb623cd066a36 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/c1d9965d-8c11-4b5b-af2b-42bba5482fd7.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "c1d9965d-8c11-4b5b-af2b-42bba5482fd7", + "type": "STRING", + "value": "Location" + }}, + "uuid": "c1d9965d-8c11-4b5b-af2b-42bba5482fd7" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/c223fe50-65bf-48d8-970d-3bd4538c8e94.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/c223fe50-65bf-48d8-970d-3bd4538c8e94.json new file mode 100644 index 0000000000000000000000000000000000000000..08595dcf603e1246e494f20890611173ec2c5602 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/c223fe50-65bf-48d8-970d-3bd4538c8e94.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "c223fe50-65bf-48d8-970d-3bd4538c8e94", + "type": "STRING", + "value": "Location" + }}, + "uuid": "c223fe50-65bf-48d8-970d-3bd4538c8e94" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/c2517c21-b392-47d1-920b-b97c643a3405.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/c2517c21-b392-47d1-920b-b97c643a3405.json new file mode 100644 index 0000000000000000000000000000000000000000..82558afc5b524a7520d73351a9b150a0c874d7fb --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/c2517c21-b392-47d1-920b-b97c643a3405.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "c2517c21-b392-47d1-920b-b97c643a3405", + "type": "STRING", + "value": "Location" + }}, + "uuid": "c2517c21-b392-47d1-920b-b97c643a3405" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/c3923a06-7523-4d02-b1e2-54db898f3d76.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/c3923a06-7523-4d02-b1e2-54db898f3d76.json new file mode 100644 index 0000000000000000000000000000000000000000..84b32023021e2fd8bfbff88bdcffa79412eeaaa0 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/c3923a06-7523-4d02-b1e2-54db898f3d76.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "c3923a06-7523-4d02-b1e2-54db898f3d76", + "type": "STRING", + "value": "Location" + }}, + "uuid": "c3923a06-7523-4d02-b1e2-54db898f3d76" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/c3f4369c-b117-4656-8932-603e7787cbc4.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/c3f4369c-b117-4656-8932-603e7787cbc4.json new file mode 100644 index 0000000000000000000000000000000000000000..50511f414db346fe8bf28e17e23af0cb4e8bae51 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/c3f4369c-b117-4656-8932-603e7787cbc4.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "c3f4369c-b117-4656-8932-603e7787cbc4", + "type": "STRING", + "value": "With the exception of signer_info, which is encoded first, all header_field elements shall be included in ascending order according to the numbering of the enumeration of the according type structure<\/font><\/font><\/font><\/font>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "c3f4369c-b117-4656-8932-603e7787cbc4", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "c3f4369c-b117-4656-8932-603e7787cbc4" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/c68a4e76-9564-42d2-934a-a889713923b8.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/c68a4e76-9564-42d2-934a-a889713923b8.json new file mode 100644 index 0000000000000000000000000000000000000000..f7b5b46f587cbaa363eff468b1a4afe16c4f50f1 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/c68a4e76-9564-42d2-934a-a889713923b8.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "c68a4e76-9564-42d2-934a-a889713923b8", + "type": "STRING", + "value": "

    signature calculated over these fields of the Certificate data structure:<\/font>\n<\/font>\n<\/font>\n<\/font>\n<\/font>\n<\/p>\n

      \n

      \t

    • \nThe version<\/font>\n<\/font>\n<\/li>\n<\/p>\n

      \t

    • \nThe signer_info <\/font>\n<\/font>\n<\/font>\n<\/li>\n<\/p>\n

      \t

    • \nThe subject_info<\/font>\n<\/font>\n<\/li>\n<\/p>\n

      \t

    • \nThe subject_attributes vector including its length<\/font>\n<\/font>\n<\/font>\n<\/li>\n<\/p>\n

      \t

    • \nThe validity_restrictions vector including its length<\/font><\/font><\/font><\/li><\/p><\/ul>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "c68a4e76-9564-42d2-934a-a889713923b8", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "c68a4e76-9564-42d2-934a-a889713923b8" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/c9c4983f-ff2c-40f3-892c-638f7091bf6b.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/c9c4983f-ff2c-40f3-892c-638f7091bf6b.json new file mode 100644 index 0000000000000000000000000000000000000000..872b672d33c8c590515ceaa3593bb48704bc1a04 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/c9c4983f-ff2c-40f3-892c-638f7091bf6b.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "c9c4983f-ff2c-40f3-892c-638f7091bf6b", + "type": "STRING", + "value": "The following SubjectAttribute elements shall be included:<\/font><\/font>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "c9c4983f-ff2c-40f3-892c-638f7091bf6b", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "c9c4983f-ff2c-40f3-892c-638f7091bf6b" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/cd4f4ae8-6cdd-439b-a1bb-3c8c47d8bfc1.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/cd4f4ae8-6cdd-439b-a1bb-3c8c47d8bfc1.json new file mode 100644 index 0000000000000000000000000000000000000000..4a7198fe4837dbdb0aee468d0b0309e1dcf5963b --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/cd4f4ae8-6cdd-439b-a1bb-3c8c47d8bfc1.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "cd4f4ae8-6cdd-439b-a1bb-3c8c47d8bfc1", + "type": "STRING", + "value": "Location" + }}, + "uuid": "cd4f4ae8-6cdd-439b-a1bb-3c8c47d8bfc1" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/cdc87f4d-d678-4dab-83bf-eff2d82483d8.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/cdc87f4d-d678-4dab-83bf-eff2d82483d8.json new file mode 100644 index 0000000000000000000000000000000000000000..0df8a7f8a51e04ba6931cb12d15659e674440db7 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/cdc87f4d-d678-4dab-83bf-eff2d82483d8.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "cdc87f4d-d678-4dab-83bf-eff2d82483d8", + "type": "STRING", + "value": "None of the possible HeaderField cases shall be included more than once.<\/font><\/font>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "cdc87f4d-d678-4dab-83bf-eff2d82483d8", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "cdc87f4d-d678-4dab-83bf-eff2d82483d8" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/d485e010-0a82-4bfe-9dff-8d8f09d64fa5.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/d485e010-0a82-4bfe-9dff-8d8f09d64fa5.json new file mode 100644 index 0000000000000000000000000000000000000000..f12899bc06c77ecb47fc1e7dadfea54e6a79d5b0 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/d485e010-0a82-4bfe-9dff-8d8f09d64fa5.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "d485e010-0a82-4bfe-9dff-8d8f09d64fa5", + "type": "STRING", + "value": "In the normal case, the signer_info field of type certificate_digest_with_sha256 shall be included<\/font><\/font><\/font><\/font>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "d485e010-0a82-4bfe-9dff-8d8f09d64fa5", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "d485e010-0a82-4bfe-9dff-8d8f09d64fa5" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/d6ce51f8-7d7e-46fd-b53a-b4c920152e62.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/d6ce51f8-7d7e-46fd-b53a-b4c920152e62.json new file mode 100644 index 0000000000000000000000000000000000000000..f9534fc23c07c237bd2f2861abc854f94b5fbab6 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/d6ce51f8-7d7e-46fd-b53a-b4c920152e62.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "d6ce51f8-7d7e-46fd-b53a-b4c920152e62", + "type": "STRING", + "value": "Location" + }}, + "uuid": "d6ce51f8-7d7e-46fd-b53a-b4c920152e62" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/d72901a0-1dc5-4004-a947-a6024f5a4ec1.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/d72901a0-1dc5-4004-a947-a6024f5a4ec1.json new file mode 100644 index 0000000000000000000000000000000000000000..575c8c58b29f04a69366470cff54192f823be9fb --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/d72901a0-1dc5-4004-a947-a6024f5a4ec1.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "d72901a0-1dc5-4004-a947-a6024f5a4ec1", + "type": "STRING", + "value": "Location" + }}, + "uuid": "d72901a0-1dc5-4004-a947-a6024f5a4ec1" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/d888283e-3639-4918-84ed-a6fa22cfc546.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/d888283e-3639-4918-84ed-a6fa22cfc546.json new file mode 100644 index 0000000000000000000000000000000000000000..3a037246e93712eeb4d1223acb9fd9241b913f85 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/d888283e-3639-4918-84ed-a6fa22cfc546.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "d888283e-3639-4918-84ed-a6fa22cfc546", + "type": "STRING", + "value": "Location" + }}, + "uuid": "d888283e-3639-4918-84ed-a6fa22cfc546" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/df9b1ec0-8ed5-4719-bcbb-edbaacdbb325.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/df9b1ec0-8ed5-4719-bcbb-edbaacdbb325.json new file mode 100644 index 0000000000000000000000000000000000000000..8c11ff2c9c3a04a242e5b590e1e651850ebf5df8 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/df9b1ec0-8ed5-4719-bcbb-edbaacdbb325.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "df9b1ec0-8ed5-4719-bcbb-edbaacdbb325", + "type": "STRING", + "value": "Location" + }}, + "uuid": "df9b1ec0-8ed5-4719-bcbb-edbaacdbb325" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/e1308a28-bfa6-40e1-b39e-f1b64d00509d.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/e1308a28-bfa6-40e1-b39e-f1b64d00509d.json new file mode 100644 index 0000000000000000000000000000000000000000..7bf42dd1b5ba24c5b7d3ae015cb6527e4172385f --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/e1308a28-bfa6-40e1-b39e-f1b64d00509d.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "e1308a28-bfa6-40e1-b39e-f1b64d00509d", + "type": "STRING", + "value": "Location" + }}, + "uuid": "e1308a28-bfa6-40e1-b39e-f1b64d00509d" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/e2949dcb-7e0a-4104-92df-2c29945c7486.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/e2949dcb-7e0a-4104-92df-2c29945c7486.json new file mode 100644 index 0000000000000000000000000000000000000000..63d20b5a2a6d54bc428e98d25ac8686a40248837 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/e2949dcb-7e0a-4104-92df-2c29945c7486.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "e2949dcb-7e0a-4104-92df-2c29945c7486", + "type": "STRING", + "value": "Location" + }}, + "uuid": "e2949dcb-7e0a-4104-92df-2c29945c7486" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/e380e8c1-1b13-4cbb-b22f-569fa3746899.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/e380e8c1-1b13-4cbb-b22f-569fa3746899.json new file mode 100644 index 0000000000000000000000000000000000000000..0596a77d67fac992fdbcbbc99282d68b25d5fd40 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/e380e8c1-1b13-4cbb-b22f-569fa3746899.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "e380e8c1-1b13-4cbb-b22f-569fa3746899", + "type": "STRING", + "value": "Location" + }}, + "uuid": "e380e8c1-1b13-4cbb-b22f-569fa3746899" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/e487829f-4c10-4b03-8738-9b266ee1070d.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/e487829f-4c10-4b03-8738-9b266ee1070d.json new file mode 100644 index 0000000000000000000000000000000000000000..d17183fa99cf538451b89d2aff62a50409f74cc8 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/e487829f-4c10-4b03-8738-9b266ee1070d.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "e487829f-4c10-4b03-8738-9b266ee1070d", + "type": "STRING", + "value": "Location" + }}, + "uuid": "e487829f-4c10-4b03-8738-9b266ee1070d" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/e6b9cd9d-36fa-4a69-ae0f-76a4a07f269b.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/e6b9cd9d-36fa-4a69-ae0f-76a4a07f269b.json new file mode 100644 index 0000000000000000000000000000000000000000..6259c69f8df4370587aa9feaa15af4d02949c9be --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/e6b9cd9d-36fa-4a69-ae0f-76a4a07f269b.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "e6b9cd9d-36fa-4a69-ae0f-76a4a07f269b", + "type": "STRING", + "value": "Location" + }}, + "uuid": "e6b9cd9d-36fa-4a69-ae0f-76a4a07f269b" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/e9618613-82ad-42fa-88b3-2f6924c0165c.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/e9618613-82ad-42fa-88b3-2f6924c0165c.json new file mode 100644 index 0000000000000000000000000000000000000000..8ea2c8da78478ef3e0abc68aab224bdb02157d53 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/e9618613-82ad-42fa-88b3-2f6924c0165c.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "e9618613-82ad-42fa-88b3-2f6924c0165c", + "type": "STRING", + "value": "Location" + }}, + "uuid": "e9618613-82ad-42fa-88b3-2f6924c0165c" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/ea754a75-9530-4fd0-ae34-bf241af669ad.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/ea754a75-9530-4fd0-ae34-bf241af669ad.json new file mode 100644 index 0000000000000000000000000000000000000000..66bed2759312c44061878e523b25f9433e7dd3a0 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/ea754a75-9530-4fd0-ae34-bf241af669ad.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "ea754a75-9530-4fd0-ae34-bf241af669ad", + "type": "STRING", + "value": "this field shall encode the ITS-AID for CAMs" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "ea754a75-9530-4fd0-ae34-bf241af669ad", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "ea754a75-9530-4fd0-ae34-bf241af669ad" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/eadacd7d-8386-4c76-8f38-0be53ce96210.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/eadacd7d-8386-4c76-8f38-0be53ce96210.json new file mode 100644 index 0000000000000000000000000000000000000000..cb45fb55aee0d944419a3ccf474a2cb8f6a9ceed --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/eadacd7d-8386-4c76-8f38-0be53ce96210.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "eadacd7d-8386-4c76-8f38-0be53ce96210", + "type": "STRING", + "value": "Location" + }}, + "uuid": "eadacd7d-8386-4c76-8f38-0be53ce96210" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/ee6c482c-24aa-416f-82b4-9a84d6b200e0.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/ee6c482c-24aa-416f-82b4-9a84d6b200e0.json new file mode 100644 index 0000000000000000000000000000000000000000..234e7ad9a9167808a38e79dd7253ecbe0d1b864e --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/ee6c482c-24aa-416f-82b4-9a84d6b200e0.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "ee6c482c-24aa-416f-82b4-9a84d6b200e0", + "type": "STRING", + "value": "Location" + }}, + "uuid": "ee6c482c-24aa-416f-82b4-9a84d6b200e0" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/f5c4ab1e-0383-4d8d-90f1-386f493614e1.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/f5c4ab1e-0383-4d8d-90f1-386f493614e1.json new file mode 100644 index 0000000000000000000000000000000000000000..88472783eb215f3d78232bada42e0602a6254fb8 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/f5c4ab1e-0383-4d8d-90f1-386f493614e1.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "f5c4ab1e-0383-4d8d-90f1-386f493614e1", + "type": "STRING", + "value": "\r\n" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "f5c4ab1e-0383-4d8d-90f1-386f493614e1", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "f5c4ab1e-0383-4d8d-90f1-386f493614e1" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/f749c280-6cf5-49f8-ade8-feaab09f31e8.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/f749c280-6cf5-49f8-ade8-feaab09f31e8.json new file mode 100644 index 0000000000000000000000000000000000000000..588db18d622140cbf8743c0c85de659edd12a482 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/f749c280-6cf5-49f8-ade8-feaab09f31e8.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "f749c280-6cf5-49f8-ade8-feaab09f31e8", + "type": "STRING", + "value": "Location" + }}, + "uuid": "f749c280-6cf5-49f8-ade8-feaab09f31e8" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/f86c287a-9f57-4735-938f-3cc4807a6d53.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/f86c287a-9f57-4735-938f-3cc4807a6d53.json new file mode 100644 index 0000000000000000000000000000000000000000..bac49dad03ead976045ae24b1d0e7a071754a515 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/f86c287a-9f57-4735-938f-3cc4807a6d53.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "f86c287a-9f57-4735-938f-3cc4807a6d53", + "type": "STRING", + "value": "signer_info: this field shall contain an element of type certificate.<\/font><\/font><\/font>" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "f86c287a-9f57-4735-938f-3cc4807a6d53", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "f86c287a-9f57-4735-938f-3cc4807a6d53" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/fc3a86a9-a0fb-4c88-b23d-594bdccc8ba2.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/fc3a86a9-a0fb-4c88-b23d-594bdccc8ba2.json new file mode 100644 index 0000000000000000000000000000000000000000..7422b070b30a0699b2e9b568882043ae0addb37b --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/fc3a86a9-a0fb-4c88-b23d-594bdccc8ba2.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "fc3a86a9-a0fb-4c88-b23d-594bdccc8ba2", + "type": "STRING", + "value": "Certificate authority certificates" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "fc3a86a9-a0fb-4c88-b23d-594bdccc8ba2", + "type": "STRING", + "value": "Location" + } + }, + "uuid": "fc3a86a9-a0fb-4c88-b23d-594bdccc8ba2" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/fd2e4af3-d17f-4622-a387-1c5bdbc338c2.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/fd2e4af3-d17f-4622-a387-1c5bdbc338c2.json new file mode 100644 index 0000000000000000000000000000000000000000..d12afb36294fb3945d5d8aca2b45ed4f9e5a6b89 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/fd2e4af3-d17f-4622-a387-1c5bdbc338c2.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "fd2e4af3-d17f-4622-a387-1c5bdbc338c2", + "type": "STRING", + "value": "Location" + }}, + "uuid": "fd2e4af3-d17f-4622-a387-1c5bdbc338c2" +} \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/fdce9252-7641-44af-841c-aabe773ad954.json b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/fdce9252-7641-44af-841c-aabe773ad954.json new file mode 100644 index 0000000000000000000000000000000000000000..1a36e995b450c4c238bf90b757994be7e701db9b --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/fdce9252-7641-44af-841c-aabe773ad954.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "fdce9252-7641-44af-841c-aabe773ad954", + "type": "STRING", + "value": "Location" + }}, + "uuid": "fdce9252-7641-44af-841c-aabe773ad954" +} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml_resources/embedded/image6.jpg b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml_resources/embedded/image1.jpg similarity index 100% rename from requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml_resources/embedded/image6.jpg rename to requality/TS103096/root/Documents/ts_103097v010201p.xhtml_resources/embedded/image1.jpg diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml_resources/ts_103097v010201p-1.xhtml b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml_resources/ts_103097v010201p-1.xhtml new file mode 100644 index 0000000000000000000000000000000000000000..29605459e85f5f8efaaac0c36828f8b27e1a2487 --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml_resources/ts_103097v010201p-1.xhtml @@ -0,0 +1,6724 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +ETSI TS 103 097 V1.1.21 + + +

      +ETSI TS 103 097 V1.2.1 (2015-06) + + +

      +

      +Intelligent Transport Systems (ITS);
      +
      +

      +

      +Security;
      +
      +

      +

      +Security header and certificate formats +

      +

      +

      +

      +

      +

      +

      +

      +

      +

      +

      +

      +Technical Specification +

      +

      + +

      +

      +Reference
      +
      +

      +

      +RTS/ITS-00531 +

      +

      +Keywords
      +
      +

      +

      +ITS, privacy, protocol, security +

      +

      +

      +ETSI
      +
      +

      +

      +650 Route des Lucioles
      +
      +

      +

      +F-06921 Sophia Antipolis Cedex - FRANCE +

      +

      +

      +Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
      +
      +

      +

      +

      +Siret N° 348 623 562 00017 - NAF 742 C
      +
      +

      +

      +Association à but non lucratif enregistrée à la
      +
      +

      +

      +Sous-Préfecture de Grasse (06) N° 7803/88
      +
      +

      +

      +

      +

      +

      +Important notice
      +
      +

      +

      + + This structure defines the details needed to describe an ECDSA based signature. This field's length + + field_size + + is derived from the applied ECDSA algorithm using the mapping as specified in table + 2 + . The extern link that specifies the algorithm points to the algorithm defined in the surrounding + + Signature + + structure. + + R + + contains the x coordinate of the elliptic curve point resulting from multiplying the generator element by the ephemeral private key. + + The EccPointType of + + + R + + shall be set to either + + compressed_lsb_y_0 + + , + + compressed_lsb_y_1 + + or + + x_coordinate_only + + . + + + + + + + + + + + + + +

      +

      + + NOTE 1: + + Except naming of included type + + PublicKeyAlgorithm + + , this definition is identical to the one in IEEE 1609.2 Draft D12 [ + i.2 + ], clause 6.2.17. + + + +

      +

      + + NOTE 2: + + It is possible to add extra information by transferring the complete point R in a compressed form instead of only the x coordinate. This extra information may then be used for a faster signature verification algorithm as outlined in "Accelerated verification of ECDSA signatures" [ + i.6 + ]. + +

      +

      + + + 4.2.10 + + SignerInfo + + +

      +

      + struct { +

      +

      + + + SignerInfoType type; + +

      +

      + + + select(type){ + +

      +

      + + + case self: + +

      +

      + + + + + + + + + ; + +

      +

      + + + case certificate_digest_with_sha256: + +

      +

      + + + + HashedId8 + + + + digest; + +

      +

      + + + case certificate: + +

      +

      + + + + Certificate + + + + certificate; + +

      +

      + + + case certificate_chain: + +

      +

      + + + + Certificate + + + + certificates<var>; + +

      +

      + + + case certificate_digest_with_other_algorithm: + +

      +

      + + + + PublicKeyAlgorithm + + algorithm; + +

      +

      + + + + HashedId8 + + + + digest; + +

      +

      + + + unknown: + +

      +

      + + + + opaque + + + + + info<var>; + +

      +

      + + + } + +

      +

      + } SignerInfo; +

      +

      +

      + + This structure defines how to give information about the signer of a message. The included cryptographic identity can be used in conjunction with the structure + + Signature + + to verify a message's authenticity. Depending on the value of + + type + + , the + + SignerInfo + + 's data fields shall contain the following entries: + + + +

      + +

      + + NOTE: + + Except naming, this definition is identical to the one in IEEE 1609.2 Draft D12 [ + i.2 + ], clause 6.2.4. + +

      +

      + + + 4.2.11 + + SignerInfoType + + +

      +

      + enum { +

      +

      + + + self(0), + +

      +

      + + + certificate_digest_with_sha256(1), + +

      +

      + + + certificate(2), + +

      +

      + + + certificate_chain(3), + +

      +

      + + + certificate_digest_with_other_algorithm(4), + +

      +

      + + + reserved(240..255), + +

      +

      + + + (2^8-1) + +

      +

      + } SignerInfoType; +

      +

      +

      + This enumeration lists methods to describe a message's signer. Values in the range of 240 to 255 shall not be used as they are reserved for internal testing purposes. +

      +

      + + NOTE: + + This definition is similar to the one in IEEE 1609.2 Draft D12 [ + i.2 + ], clause 6.2.5, but naming and + + certificate_digest_with_ecdsap224 + + is not supported by the present document. As a consequence, the numbering of identical elements (e.g. + + certificate_chain + ) differs. + + + + +

      +

      + + + 4.2.12 + + HashedId8 + + +

      +

      + + opaque + + HashedId8[8]; + +

      +

      +

      + This value is used to identify data such as a certificate. It shall be calculated by first computing the SHA-256 hash of the input data, and then taking the least significant eight bytes from the hash output. +

      +

      + + A canonical encoding for the + + EccPoint R + + contained in the + + signature field + + of a + + Certificate + + shall be used when calculating the SHA-256 hash from a + + Certificate + + . This canonical encoding shall temporarily replace the value of the + + EccPointType + + of the point + + R + + of the + + Certificate + + with + + x_coordinate_only + for the hash computation. + + + + + + + + + + + + + + + + +

      +

      + + NOTE 1: + + Except naming, this definition is identical to the one in IEEE 1609.2 Draft D12 [ + i.2 + ], clause 6.2.6. + +

      +

      + + NOTE 2: + + The canonical encoding is used to remove the possibility of manipulating the certificate in a way that results in different + + HashedId8 + + identifiers for the same certificate by changing the + + EccPointType + + . Implementations that do not use the fast verification according to "Accelerated verification of ECDSA signatures" [ + i.6 + ] cannot detect this manipulation. + + + + + +

      +

      + + + 4.2.13 + + HashedId3 + + +

      +

      + + opaque + + HashedId3[3]; + +

      +

      +

      + + This value is used to give an indication on an identifier, where real identification is not required. This can be used to request a certificate from other surrounding stations. It shall be calculated by first computing the SHA-256 hash of the input data, and then taking the least significant three bytes from the hash output. If a corresponding + + HashedId8 + + value is available, it can be calculated by truncating the longer + + HashedId8 + to the least significant three bytes. + + +

      +

      + + NOTE: + + This definition is not available in IEEE 1609.2 Draft D12 [ + i.2 + ]. + +

      +

      + + + 4.2.14 + + Time32 + + +

      +

      + + uint32 + + Time32; + +

      +

      +

      + + Time32 + is an unsigned 32-bit integer, encoded in big-endian format, giving the number of International Atomic Time (TAI) seconds since 00:00:00 UTC, 01 January 2004. + +

      +

      + + NOTE 1: + + The period of 2 + + 32 + seconds lasts about 136 years that is until 2140. +

      +

      + + NOTE 2: + + This definition is identical to the one in IEEE 1609.2 Draft D17 [ + i.3 + ], clause 6.3.31. + +

      +

      + + + 4.2.15 + + Time64 + + +

      +

      + + uint64 + + Time64; + +

      +

      +

      + + Time64 + is a 64-bit unsigned integer, encoded in big-endian format, giving the number of International Atomic Time (TAI) microseconds since 00:00:00 UTC, 01 January 2004. + +

      +

      + + NOTE: + + This definition is identical to the one in IEEE 1609.2 Draft D17 [ + i.3 + ], clause 6.2.12. + +

      +

      + + + 4.2.16 + + Time64WithStandardDeviation + + +

      +

      + struct { +

      +

      + + + Time64 + + time; + +

      +

      + + + uint8 + + log_std_dev; + +

      +

      + + } Time64WithStandardDeviation; + + +

      +

      +

      + + This structure defines how to encode + + time + + along with the standard deviation of time values. + + log_std_dev + values 0 to 254 represent the rounded up value of the log to the base 1,134666 of the implementation's estimate of the standard deviation in units of nanoseconds. Values greater than 1,134666 + + + + + 254 + nanoseconds are represented by the value 254, i.e. a day or longer. If the standard deviation is unknown, value 255 shall be used. +

      +

      + + NOTE 1: + + This definition is identical to the one in IEEE 1609.2 Draft D17 [ + i.3 + ], clause 6.2.11. + +

      +

      + + NOTE 2: + + This definition is currently unused in the security profiles in clause 7. + +

      +

      + + + 4.2.17 + + Duration + + +

      +

      + + uint16 + + Duration; + +

      +

      +

      + + This + + uint16 + + encodes the duration of a time span (e.g. a certificate's validity). The first three bits shall encode the units as given in table + 3 + . The remaining 13 bits shall be treated as an integer encoded. + + + +

      +

      + + NOTE 1: + + Except naming, this definition is identical to the one in IEEE 1609.2 Draft D12 [ + i.2 + ], clause 6.3.5. + +

      +

      + + NOTE 2: + + This definition is currently unused in the security profiles in clause 7. + +

      +

      + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
      +

      + + Table + : Interpretation of duration unit bits + +

      +
      +

      + Bits +

      +
      +

      + Interpretation +

      +
      +

      + 000 +

      +
      +

      + seconds +

      +
      +

      + 001 +

      +
      +

      + minutes (60 seconds) +

      +
      +

      + 010 +

      +
      +

      + hours (3 600 seconds) +

      +
      +

      + 011 +

      +
      +

      + 60 hour blocks (216 000 seconds) +

      +
      +

      + 100 +

      +
      +

      + years (31 556 925 seconds) +

      +
      +

      + 101, 110, 111 +

      +
      +

      + undefined +

      +
      +

      +

      +

      + + + 4.2.18 + + TwoDLocation + + +

      +

      + struct { +

      +

      + + + sint32 + + latitude; + +

      +

      + + + sint32 + + longitude; + +

      +

      + } TwoDLocation; +

      +

      +

      + + This structure defines how to specify a two dimensional location. It is used to define validity regions of a certificate. + + latitude + + and + + longitude + + encode a coordinate in tenths of micro degrees relative to the World Geodetic System (WGS)-84 datum as defined in NIMA Technical Report TR8350.2 [ + 2 + ]. + + + + + +

      +

      + + The permitted values of + + latitude + range from -900 000 000 to +900 000 000. The value 900 000 001 shall indicate the latitude as not being available. + + +

      +

      + + The permitted values of + + longitude + range from -1 800 000 000 to +1 800 000 000. The value 1 800 000 001 shall indicate the longitude as not being available. + + +

      +

      + + NOTE: + + This definition is identical to the one in IEEE 1609.2 Draft D12 [ + i.2 + ], clause 6.3.18. + +

      +

      + + + 4.2.19 + + ThreeDLocation + + +

      +

      + struct { +

      +

      + + + sint32 + + latitude; + +

      +

      + + + sint32 + + longitude; + +

      +

      + + + opaque + + elevation[2]; + +

      +

      + } ThreeDLocation; +

      +

      +

      + + This structure defines how to specify a three dimensional location. + + latitude + + and + + longitude + + encode coordinate in tenths of micro degrees relative to the World Geodetic System (WGS)-84 datum as defined in NIMA Technical +
      + Report TR8350.2 [ + 2 + ]. +
      +
      +
      +
      +
      +

      +

      + + The permitted values of + + latitude + range from -900 000 000 to +900 000 000. The value 900 000 001 shall indicate the latitude as not being available. + + +

      +

      + + The permitted values of + + longitude + range from -1 800 000 000 to +1 800 000 000. The value 1 800 000 001 shall indicate the longitude as not being available. + + +

      +

      + + elevation + shall contain the elevation relative to the WGS-84 ellipsoid in decimetres. The value is interpreted as an asymmetric signed integer with an encoding as follows: + +

      +
        +

        +

      • + 0x0000 to 0xEFFF: positive numbers with a range from 0 metres to +6 143,9 metres. All numbers above +6 143,9 are also represented by 0xEFFF. +
      • +

        +

        +

      • + 0xF001 to 0xFFFF: negative numbers with a range from -409,5 metres to -0,1 metres. All numbers below -409,5 are also represented by 0xF001. +
      • +

        +

        +

      • + 0xF000: an unknown elevation. +
      • +

        +
      +

      + + EXAMPLES: + + 0x0000 = 0 metre + +

      +

      + 0x03E8 = 100 metres +

      +

      + 0xF7D1 = -209,5 metres (0xF001 + 0x07D0 = -409,5 metres + 200 metres). +

      +

      + + NOTE: + + This definition is identical to the one in IEEE 1609.2 Draft D12 [ + i.2 + ], clause 6.2.12. + +

      +

      + + + 4.2.20 + + GeographicRegion + + +

      +

      + struct { +

      +

      + + + RegionType + + + + + region_type; + +

      +

      + + + select(region_type){ + +

      +

      + + + case circle: + +

      +

      + + + + CircularRegion + + + circular_region; + +

      +

      + + + case rectangle: + +

      +

      + + + + RectangularRegion + + rectangular_region<var>; + +

      +

      + + + case polygon: + +

      +

      + + + + PolygonalRegion + + + polygonal_region; + +

      +

      + + + case id: + +

      +

      + + + + IdentifiedRegion + + id_region; + +

      +

      + + + case none: + + + + + +

      +

      + + + + + + + + + ; + +

      +

      + + + unknown: + +

      +

      + + + + opaque + + + + + other_region<var>; + +

      +

      + + + } + +

      +

      + } GeographicRegion; +

      +

      +

      + This structure defines how to encode geographic regions. These regions can be used to limit the validity of certificates. +

      +

      + + + In case of + + + rectangle + + , the region shall consist of a variable-length vector of rectangles that may be overlapping or disjoint. The variable-length vector shall not contain more than 6 rectangles. The region covered by the rectangles shall be continuous and shall not contain holes. + + + +

      +

      + + NOTE: + + Except inclusion of case + + id + + , this definition is identical to the one in IEEE 1609.2 Draft D12 [ + i.2 + ], clause 6.3.13. + + + +

      +

      + + + 4.2.21 + + RegionType + + +

      +

      + enum { +

      +

      + + + none(0), + +

      +

      + + + circle(1), + +

      +

      + + + rectangle(2), + +

      +

      + + + polygon(3), + +

      +

      + + + id(4), + +

      +

      + + + reserved(240..255), + +

      +

      + + + (2^8-1) + +

      +

      + } RegionType; +

      +

      +

      + This enumeration lists possible region types. Values in the range of 240 to 255 shall not be used as they are reserved for internal testing purposes. +

      +

      + + NOTE: + + This definition is similar to the one in IEEE 1609.2 Draft D12 [ + i.2 + ], clause 6.3.14, but the identifier numbering differs, the region ID + + id + + was added and + + from_issuer + removed. + + + + +

      +

      + + + 4.2.22 + + CircularRegion + + +

      +

      + struct { +

      +

      + + + TwoDLocation center; + +

      +

      + + + uint16 radius; + +

      +

      + } CircularRegion; +

      +

      +

      + + This structure defines a circular region with + + radius + + given in metres and center at + + center + + . The region shall include all points on the reference ellipsoid's surface with a distance over surface of Earth equal to or less than the radius to the center point. For a location of type + + ThreeDLocation + , i.e. the location contains an elevation component, the horizontal projection onto the reference ellipsoid is used to determine if the location lies within the circular region. + + + + + + +

      +

      + + NOTE: + + This definition is identical to the one in IEEE 1609.2 Draft D12 [ + i.2 + ], clause 6.3.15. + +

      +

      + + + 4.2.23 + + RectangularRegion + + +

      +

      + struct { +

      +

      + + + TwoDLocation + + northwest; + +

      +

      + + + TwoDLocation + + southeast; + +

      +

      + } RectangularRegion; +

      +

      +

      + + This structure defines a rectangular region by connecting the four points in the order (northwest.latitude, northwest.longitude), (northwest.longitude, southeast.longitude), (southeast.longitude, southeast.longitude), and (southeast.longitude, northwest.longitude). If two consecutive points P and Q define a line of constant latitude or longitude from P to Q, the left side of the line is defined as being outside of the polygon and the line itself and the right side of the line to be inside the rectangular region. + + + A rectangular region is only valid if the location + + + northwest + + is north of the location southeast + . For a location of type + + ThreeDLocation + , i.e. the location contains an elevation component, the horizontal projection onto the reference ellipsoid is used to determine if the location lies within the rectangular region. + + + + +

      +

      + + NOTE: + + This definition is identical to the one in IEEE 1609.2 Draft D12 [ + i.2 + ], clause 6.3.16. + +

      +

      + + + 4.2.24 + + PolygonalRegion + + +

      +

      + + TwoDLocation + + PolygonalRegion<var>; + +

      +

      +

      + + This variable-length vector describes a region by enumerating points on the region's boundary. If two consecutively specified points P and Q define a line of constant bearing from P to Q, the left side of the line is defined as being outside of the polygon and the line itself and the right side of the line to be inside the polygon. + + + The points shall be linked to each other, with the last point linked to the first. No intersections shall occur and at least 3 and no more than 12 points shall be given. The specified region shall be continuous and shall not contain holes. + + For a location of type + + ThreeDLocation + , i.e. the location contains an elevation component, the horizontal projection onto the reference ellipsoid is used to determine if the location lies within the polygonal region. + + +

      +

      + + NOTE: + + This definition is identical to the one in IEEE 1609.2 Draft D12 [ + i.2 + ], clause 6.3.17. + +

      +

      + + + 4.2.25 + + IdentifiedRegion + + +

      +

      + struct { +

      +

      + + + RegionDictionary + + region_dictionary; + +

      +

      + + + uint16 + + + + + region_identifier; + +

      +

      + + + IntX + + + + + local_region; + +

      +

      + } IdentifiedRegion; +

      +

      +

      + + This structure defines a predefined geographic region determined by the region dictionary + + region_dictionary + + and the region identifier + + region_identifier + + . + + local_region + + may optionally specify a more detailed region within the region. If the whole region is meant, + + local_region + + + shall be set to 0. The details of + + local_region + are unspecified. + + + + + + + + + + + +

      +

      + + NOTE: + + This definition is not available in IEEE 1609.2 Draft D12 [ + i.2 + ]. + +

      +

      + + + 4.2.26 + + RegionDictionary + + +

      +

      + enum { +

      +

      + + + iso_3166_1(0), + +

      +

      + + + un_stats(1), + +

      +

      + + + (2^8-1) + +

      +

      + } RegionDictionary; +

      +

      +

      + + This enumeration lists dictionaries containing two-octet records of globally defined regions. + + + The dictionary that corresponds to + + + iso_3166_1 + + shall contain values that correspond to numeric country codes as defined in ISO 3166-1 + [ + 3 + ]. + + + The dictionary that corresponds to + + + un_stats + + shall contain values as defined by the United Nations Statistics Division, which is a superset of ISO 3166-1 [ + + 3 + + ] including compositions of regions. + + + + + +

      +

      + + NOTE: + + This definition is not available in IEEE 1609.2 Draft D12 [ + i.2 + ]. + +

      +

      + + + 5 + + Specification of security header + + +

      +

      + + + 5.1 + + SecuredMessage + + +

      +

      + struct { +

      +

      + + + uint8 + + + + protocol_version; + +

      +

      + + + HeaderField + + + header_fields<var>; + +

      +

      + + + Payload + + + + payload_field; + +

      +

      + + + TrailerField + + trailer_fields<var>; + +

      +

      + } SecuredMessage; +

      +

      +

      + This structure defines how to encode a generic secured message: +

      + +

      + Further information about how to fill these variable-length vectors is given via security profiles in clause 7. +

      +

      + + NOTE 1: + + This definition is not available in IEEE 1609.2 Draft D12 [ + i.2 + ]. + +

      +

      + + NOTE 2: + + An example for a reason to increase the + + protocol_version + + is a change to the epoch in clause 4.2.15 and clause 4.2.16, which leads to incompatible messages. A counterexample would be an additional header field using the + + unknown + + case in clause 5.4. This header field can be ignored by old implementations, if the syntax is kept identical and the versions are compatible. Hence, the + + protocol_version + should not be increased. + + + + + + +

      +

      + + + 5.2 + + Payload + + +

      +

      + struct { +

      +

      + + + PayloadType type; + +

      +

      + + + select (type) { + +

      +

      + + + case signed_external: + + +

      +

      + + + + ; + +

      +

      + + + case unsecured: + +

      +

      + + + case signed: + +

      +

      + + + case encrypted: + +

      +

      + + + case signed_and_encrypted: + + +

      +

      + + + unknown: + +

      +

      + + + + opaque + + data<var>; + +

      +

      + + + } + +

      +

      + } Payload; +

      +

      +

      + + This structure defines how to encode payload. In case of externally signed payload, no payload data shall be given as all data is external. In this case, the external data shall be included when calculating the signature, at the position where a non-external payload would be. In all other cases, the data shall be given as a variable-length vector containing + + opaque + data. + + +

      +

      + + NOTE 1: + + This definition is not available in IEEE 1609.2 Draft D12 [ + i.2 + ]. + +

      +

      + + NOTE 2: + + Payloads of type + + signed_external + are needed to add a signature in a non-intrusive way to an existing protocol stack, e.g. for extending an IPv6 stack. + + +

      +

      + + + 5.3 + + PayloadType + + +

      +

      + enum { +

      +

      + + + unsecured(0), + +

      +

      + + + signed(1), + +

      +

      + + + encrypted(2), + +

      +

      + + + signed_external(3), + +

      +

      + + + signed_and_encrypted(4), + +

      +

      + + + (2^8-1) + +

      +

      + } PayloadType; +

      +

      +

      + This enumeration lists the supported types of payloads. +

      +

      + + NOTE: + + This definition is not available in IEEE 1609.2 Draft D12 [ + i.2 + ]. + +

      +

      + + + 5.4 + + HeaderField + + +

      +

      + struct { +

      +

      + + + HeaderFieldType type; + +

      +

      + + + select(type) { + +

      +

      + + + case generation_time: + +

      +

      + + + + Time64 + + + + + + + + generation_time; + +

      +

      + + + case generation_time_standard_deviation: + +

      +

      + + + + Time64WithStandardDeviation + + + generation_time_with_standard_deviation; + +

      +

      + + + case expiration: + +

      +

      + + + + Time32 + + + + + + + + expiry_time; + +

      +

      + + + case generation_location: + +

      +

      + + + + ThreeDLocation + + + + + + generation_location; + +

      +

      + + + case request_unrecognized_certificate: + +

      +

      + + + + HashedId3 + + + + + + + digests<var>; + +

      +

      + + + case its_aid: + +

      +

      + + + + IntX + + + + + + + + its_aid; + +

      +

      + + + case signer_info: + +

      +

      + + + + SignerInfo + + + + + + + signer; + +

      +

      + + + case encryption_parameters: + +

      +

      + + + + EncryptionParameters + + + + enc_params; + +

      +

      + + + case recipient_info: + +

      +

      + + + + RecipientInfo + + + + + + recipients<var>; + +

      +

      + + + unknown: + +

      +

      + + + + opaque + + + + + + + + other_header<var>; + +

      +

      + + + } + +

      +

      + } HeaderField; +

      +

      +

      + + This structure defines how to encode information of interest to the security layer. Its content depends on the value of + + type + : + + +

      +
        +

        +

      • + + generation_time + + : + + + a timestamp of type + + + + Time64 + + + , + which shall describe the point in time, when the contents of the security headers are fixed prior to the signing process + . + + +
      • +

        +

        +

      • + + generation_time_standard_deviation + : a timestamp of type Time64WithStandardDeviation, which shall describe the point in time, when the contents of the security headers are fixed prior to the signing process. In addition to the timestamp, the confidence described by the standard deviation of the time value contained shall be given. + +
      • +

        +

        +

      • + + expiration + + : the point in time the validity of this message expires contained in a + + Time32 + + structure shall be given. + + +
      • +

        +

        +

      • + + generation_location + + : the location where this message was created contained in a + + ThreeDLocation + + structure shall be given. + + +
      • +

        +

        +

      • + + request_unrecognized_certificate + + : a request for certificates shall be given in case that a certificate from a peer has not been transmitted before. This request consists of a variable-length vector of 3 octet long certificate digests contained in a + + HashedId3 + + structure to identify the requested certificates. The request shall be used to request pseudonym certificates and authorization authority certificates. + + +
      • +

        +

        +

      • + + its_aid + + : The ITS-AID of the application payload shall be given. The valid ITS-AIDs are specified according to ETSI TS 102 965 [ + 7 + ]. + + +
      • +

        +
      +

      + + Furthermore, the + + HeaderField + structure defines cryptographic information that is required for single-pass processing of the payload: + + +

      +
        +

        +

      • + + signer_info + + : information about the message's signer contained in a + + SignerInfo + + structure shall be given. If present, the SignerInfo structure shall come first in the array of + + HeaderFields + , unless this is explicitly overridden by the security profile. + + + +
      • +

        +

        +

      • + + encryption_parameters + + : additional parameters necessary for encryption purposes contained in an + + EncryptionParameters + + structure shall be given. + + +
      • +

        +

        +

      • + + recipient_info + + : information specific for certain recipients (e.g. data encrypted with a recipients public key) contained in a variable-length vector of type + + RecipientInfo + + shall be given. Each + + recipient_info + + vector shall be preceeded by one + + encryption_parameters + + header field to determine the value of + + symm_key_len + + according to table + 4 + . + + + + + + + + +
      • +

        +
      +

      + For extensibility, the structure contains a variable field: +

      +
        +

        +

      • + + unknown + + : in all other cases, a variable-length vector containing + + opaque + data shall be given. + + + +
      • +

        +
      +

      + + NOTE 1: + + This definition is not available in IEEE 1609.2 Draft D12 [ + i.2 + ]. + +

      +

      + + NOTE 2: + + The + + generation_time_standard_deviation + + and the + + expiration + header fields are currently unused in the security profiles in clause 7. + + + + +

      +

      + + + 5.5 + + HeaderFieldType + + +

      +

      + enum { +

      +

      + + + generation_time(0), + +

      +

      + + + generation_time_standard_deviation(1), + +

      +

      + + + expiration(2), + +

      +

      + + + generation_location(3), + +

      +

      + + + request_unrecognized_certificate(4), + +

      +

      + + + its_aid(5), + +

      +

      + + + signer_info(128), + +

      +

      + + + encryption_parameters(129), + +

      +

      + + + recipient_info(130), + +

      +

      + + + (2^8-1) + +

      +

      + } HeaderFieldType; +

      +

      +

      + This enumeration lists the supported types of header fields. +

      +

      + + NOTE: + + This definition is not available in IEEE 1609.2 Draft D12 [ + i.2 + ]. + +

      +

      + + + 5.6 + + + TrailerField + +

      +

      + struct { +

      +

      + + + TrailerFieldType + + + + type; + +

      +

      + + + select(type) { + +

      +

      + + + case signature: + +

      +

      + + + + Signature + + + + + signature; + +

      +

      + + + unkown: + +

      +

      + + + + opaque + + + + + + security_field<var>; + +

      +

      + + + } + +

      +

      + } TrailerField; +

      +

      +

      + This structure defines how to encode information used by the security layer after processing the payload. A trailer field may contain data of the following cases: +

      +
        +

        +

      • + + signature + + : the signature of this message contained in a + + Signature + + structure shall be given. The signature is calculated over the hash of the encoding of all previous fields ( + + version + + , + + header_fields + + field and the + + payload_field + + field), including the encoding of their length. Also the length of the + + trailer_fields + + field and the type of the + + signature + + trailer field shall be included in the hash. +
        +
        + If the + + payload_field + + field has + + type + + equal to + + signed_external + + , the data shall be included in the hash calculation immediately after the + + payload_field + + field, encoded as an + + opaque<var> + + , i.e. as if it was included. +
        +
        + If further trailer fields are included in a + + SecuredMessage + + , the + + signature + + structure shall include all fields in the sequence before, and exclude all fields in the sequence after the + + signature + structure, if not otherwise defined via security profiles. + + + + + +
        +
        +
        +
        +
        +
        +
        +
        +
        +
        +
        +
        +
        +
        +
        +
        +
        +
        +
        +
        +
        +
        +
      • +

        +
      +
        +

        +

      • + + If the + + payload_field + + field + + type + + does not contain the keyword " + + signed + + " ( + + unsecured + + or + + encrypted + + ), then the + + trailer_fields + + field of the + + SecuredMessage + + shall not include a + + Signature + + . + + + + + + + + + + + + + + + +
      • +

        +

        +

      • + + unknown + + : in all other cases, a variable-length vector containing + + opaque + data shall be given. + + + +
      • +

        +
      +

      + + NOTE: + + This definition is not available in IEEE 1609.2 Draft D12 [ + i.2 + ]. + +

      +

      + + + 5.7 + + TrailerFieldType + + +

      +

      + enum { +

      +

      + + + signature(1), + +

      +

      + + + (2^8-1) + +

      +

      + } TrailerFieldType; +

      +

      +

      + This enumeration lists the supported types of trailer fields. +

      +

      + + NOTE: + + This definition is not available in IEEE 1609.2 Draft D12 [ + i.2 + ]. + +

      +

      + + + 5.8 + + RecipientInfo + + +

      +

      + struct { +

      +

      + + + HashedId8 + + + + + + + cert_id; + +

      +

      + + PublicKeyAlgorithm + + + + + pk_encryption + ; + +

      +

      + select (pk_encryption) { +

      +

      + case ecies_nistp256: +

      +

      + + EciesEncryptedKey + + + + enc_key; + +

      +

      + + + unknown: + +

      +

      + + + + opaque + + + + + + + enc_key<var>; + +

      +

      + + + } + +

      +

      + } RecipientInfo; +

      +

      +

      + + This structure contains information for the decryption of a message for a recipient. This information is used to distribute recipient specific data. + + cert_id + + determines the 8 octet identifier for the recipient's certificate. Depending on the value of + + pk_encryption + , the following additional data shall be given: + + + + +

      +
        +

        +

      • + + ecies_nistp256 + + : an encrypted key contained in an + + EciesEncryptedKey + + structure shall be given. + + +
      • +

        +

        +

      • + + unknown + + : in all other cases, a variable-length vector containing + + opaque + data encoding an encrypted key shall be given. + + + +
      • +

        +
      +

      + + NOTE: + + Except naming of included type + + PublicKeyAlgorithm + + and full inclusion of + + pk_encryption + + (not + + extern + + ), this definition is identical to the one in IEEE 1609.2 Draft D12 [ + i.2 + ], clause 6.2.24. + + + + + + + +

      +

      + + + 5.9 + + EciesEncryptedKey + + +

      +

      + struct { +

      +

      + + + extern SymmetricAlgorithm + + symm_alg + ; + +

      +

      + + + extern uint32 + + + + + symm_key_len; + +

      +

      + + + EccPoint + + + + + v; + +

      +

      + + + opaque + + + + + + + c[symm_key_len]; + +

      +

      + + + opaque + + + + + + + t[16]; + +

      +

      + } EciesEncryptedKey; +

      +

      +

      + + This structure defines how to transmit an ECIES-encrypted symmetric key as defined in IEEE +
      + Std 1363a-2004 [ + i.1 + ]. The + + EccPoint + + + v + + contains the sender's ECC + + ephemeral + + key used for the Elliptic Curve Encryption Scheme. This ephemeral key + + v + + shall only be used once and for every encryption a new key shall be generated. The vector + + c + + contains the encrypted (AES) key. The vector + + t + + contains the authentication tag. The + + symm_key_len + + defines the length of vector + + c + + containing the encrypted (AES) key and shall be derived from the given algorithm + + symm_alg + + and the mapping as defined in table + 4 + . The necessary algorithm shall be given as an external link to the parameter + + symm_algorithm + + specified in the structure + + EncryptionParameters + + . To ensure the external link to the + + SymmetricAlgorithm + + + symm_alg + + can be resolved, this + + EciesEncryptedKey + + structure shall be preceded by an according + + EncryptionParameters + + structure. + + + + + + + + + + + + + + + + +
      +

      +

      + Further parameters used for the encryption and decryption using ECIES shall be: +

      +
        +

        +

      • + The parameters P + 1 + and P + 2 + shall be empty strings. +
      • +

        +

        +

      • + ECSVDP-DHC shall be used as secret value derivation primitive. +
      • +

        +

        +

      • + The stream cipher used shall be based on KDF2 using SHA-256. +
      • +

        +

        +

      • + As MAC, MAC1 shall be used with SHA-256 and tBits = 128. +
      • +

        +

        +

      • + The length of the key (input) to MAC1 shall be 256 bits. +
      • +

        +

        +

      • + The encryption shall use non-DHAES mode. +
      • +

        +

        +

      • + Octet strings shall be interpreted using LSB compressed representation or uncompressed representation for the ECC points. +
      • +

        +
      +

      + + + + + + + + + + + + + + +
      +

      + + Table + : Derivation of symmetric key size depending on the used algorithm + +

      +
      +

      + SymmetricAlgorithm value +

      +
      +

      + Length in octets +

      +
      +

      + aes_128_ccm +

      +
      +

      + 16 +

      +
      +

      +

      +

      + + NOTE: + + This definition is identical to the one in IEEE 1609.2 Draft D12 [ + i.2 + ], clause 6.2.25. + +

      +

      + + + 6 + + Specification of certificate format + + +

      +

      + + + 6.1 + + Certificate + + +

      +

      + struct { +

      +

      + + + uint8 + + + + + + version; + +

      +

      + + + SignerInfo + + + + + signer_info; + +

      +

      + + + SubjectInfo + + + + + subject_info; + +

      +

      + + + SubjectAttribute + + + subject_attributes<var>; + +

      +

      + + + ValidityRestriction + + + validity_restrictions<var>; + +

      +

      + + + Signature + + + + + signature; + +

      +

      + } Certificate; +

      +

      +

      + This structure defines how to encode a certificate. +

      +

      +The present document can be downloaded from:
      +
      + +http://www.etsi.org/standards-search +

      +

      +The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat.
      +
      +

      +

      +Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at + +http://portal.etsi.org/tb/status/status.asp +

      +

      +If you find errors in the present document, please send your comment to one of the following services:
      + +
      +https://portal.etsi.org/People/CommiteeSupportStaff.aspx +

      +

      +Copyright Notification
      +
      +

      +

      +No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI.
      The content of the PDF version shall not be modified without the written authorization of ETSI.
      The copyright and the foregoing restriction extend to reproduction in all media.
      +

      +

      +

      +© European Telecommunications Standards Institute 2015.
      +
      +

      +

      +All rights reserved.
      +
      +

      +

      +DECT +TM +, PLUGTESTS + +TM +, UMTS + +TM + and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members.
      +3GPP +
      +TM +and LTE +™ are Trade Marks of ETSI registered for the benefit of its Members and
      of the 3GPP Organizational Partners.
      +
      +GSM +® and the GSM logo are Trade Marks registered and owned by the GSM Association.
      +
      +
      +

      +

      + +

      +

      +Contents +

      +

      +

      +Foreword +55 +

      +

      +Modal verbs terminology +55 +

      +

      +Introduction +55 +

      +

      +1Scope +66 +

      +

      +2References +66 +

      +

      +2.1Normative references +66 +

      +

      +2.2Informative references +66 +

      +

      +3Definitions and abbreviations +77 +

      +

      +3.1Definitions +77 +

      +

      +3.2Abbreviations +77 +

      +

      +4Basic format elements +77 +

      +

      +4.1Presentation Language +77 +

      +

      +4.2Specification of basic format elements +99 +

      +

      +4.2.1IntX +99 +

      +

      +4.2.2PublicKeyAlgorithm +99 +

      +

      +4.2.3SymmetricAlgorithm +99 +

      +

      +4.2.4PublicKey +99 +

      +

      +4.2.5EccPoint +1010 +

      +

      +4.2.6EccPointType +1111 +

      +

      +4.2.7EncryptionParameters +1111 +

      +

      +4.2.8Signature +1111 +

      +

      +4.2.9EcdsaSignature +1212 +

      +

      +4.2.10SignerInfo +1212 +

      +

      +4.2.11SignerInfoType +1313 +

      +

      +4.2.12HashedId8 +1313 +

      +

      +4.2.13HashedId3 +1313 +

      +

      +4.2.14Time32 +1414 +

      +

      +4.2.15Time64 +1414 +

      +

      +4.2.16Time64WithStandardDeviation +1414 +

      +

      +4.2.17Duration +1414 +

      +

      +4.2.18TwoDLocation +1515 +

      +

      +4.2.19ThreeDLocation +1515 +

      +

      +4.2.20GeographicRegion +1515 +

      +

      +4.2.21RegionType +1616 +

      +

      +4.2.22CircularRegion +1616 +

      +

      +4.2.23RectangularRegion +1616 +

      +

      +4.2.24PolygonalRegion +1717 +

      +

      +4.2.25IdentifiedRegion +1717 +

      +

      +4.2.26RegionDictionary +1717 +

      +

      +5Specification of security header +1717 +

      +

      +5.1SecuredMessage +1717 +

      +

      +5.2Payload +1818 +

      +

      +5.3PayloadType +1818 +

      +

      +5.4HeaderField +1818 +

      +

      +5.5HeaderFieldType +2020 +

      +

      +5.6TrailerField +2020 +

      +

      +5.7TrailerFieldType +2020 +

      +

      +5.8RecipientInfo +2121 +

      +

      +5.9EciesEncryptedKey +2121 +

      +

      +6Specification of certificate format +2222 +

      +

      +6.1Certificate +2222 +

      +

      +6.2SubjectInfo +2323 +

      +

      +6.3SubjectType +2323 +

      +

      +6.4SubjectAttribute +2323 +

      +

      +6.5SubjectAttributeType +2424 +

      +

      +6.6SubjectAssurance +2424 +

      +

      +6.7ValidityRestriction +2525 +

      +

      +6.8ValidityRestrictionType +2525 +

      +

      +6.9ItsAidSsp +2525 +

      +

      +7Security profiles +2626 +

      +

      +7.1Security profile for CAMs +2626 +

      +

      +7.2Security profile for DENMs +2727 +

      +

      +7.3Generic security profile for other signed messages +2828 +

      +

      +7.4Profiles for certificates +2929 +

      +

      +7.4.1Introduction +2929 +

      +

      +7.4.2Authorization tickets (pseudonymous certificates) +3030 +

      +

      +7.4.3Enrolment credential (long-term certificates) +3030 +

      +

      +7.4.4Certificate authority certificates +3030 +

      +

      +Annex A (informative):Data structure examples +3232 +

      +

      +A.1Example security envelope structure for CAM +3232 +

      +

      +A.2Example structure of a certificate +3333 +

      +

      +Annex B (informative):Usage of ITS-AID and SSPs +3434 +

      +

      +History +3535 +

      +

      +

      + +

      +

      + +Intellectual Property Rights + +

      +

      +IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for +ETSI members and non-members +, and can be found in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server ( + + + +http://ipr.etsi.org +).
      +
      +

      +

      +Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. +

      +

      + +Foreword + +

      +

      + +This Technical Specification (TS) has been produced by ETSI Technical Committee Intelligent Transport Systems (ITS). + +

      +

      + +Modal verbs terminology + +

      +

      +In the present document " +shall +", " +shall not +", " +should +", " +should not +", " +may +", " +need not +", " +will +", " +will not +", " +can +" and " +cannot +" are to be interpreted as described in clause 3.2 of the + +ETSI Drafting Rules + (Verbal forms for the expression of provisions).
      +
      +

      +

      +" +must +" and " +must not +" are +NOT + allowed in ETSI deliverables except when used in direct citation.
      +
      +

      +

      + +Introduction + +

      +

      +Security mechanisms for ITS consist of a number of parts. An important part for interoperability is a common format for data elements being transferred between ITS stations for security purposes. +

      +

      +The present document intends to provide such a format definition. A special focus is to include as much as possible from existing standards. At the same time, the major goal is simplicity and extensibility of data structures. +

      +

      + +

      +

      + +1Scope + +

      +

      +The present document specifies security header and certificate formats for Intelligent Transport Systems. These formats are defined specifically for securing G5 communication. +

      +

      + +2References + +

      +

      + +2.1Normative references + +

      +

      +References are either specific (identified by date of publication and/or edition number or version number) or non‑specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. +

      +

      +Referenced documents which are not found to be publicly available in the expected location might be found at + +http://docbox.etsi.org/Reference +.
      +
      +

      +

      +NOTE:While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity.
      +
      +

      +

      +The following referenced documents are necessary for the application of the present document. +

      +

      +[]IEEE™ 1363-2000: "IEEE Standard Specifications For Public Key Cryptography". +

      +

      +[]NIMA Technical Report TR8350.2: "Department of Defense World Geodetic System 1984. Its Definition and Relationships with Local Geodetic Systems". +

      +

      +[]ISO 3166-1: "Codes for the representation of names of countries and their subdivisions -- Part 1: Country codes". +

      +

      +[]NIST SP 800-38C: "Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality". +

      +

      +[]IETF RFC 2246: "The TLS Protocol Version 1.0". +

      +

      +[]ETSI TS 102 940: "Intelligent Transport Systems (ITS); Security; ITS communications security architecture and security management". +

      +

      +[]ETSI TS 102 965 (V1.2.1): "Intelligent Transport Systems (ITS); Application Object Identifier (ITS-AID); Registration". +

      +

      + +2.2Informative references + +

      +

      +References are either specific (identified by date of publication and/or edition number or version number) or non‑specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. +

      +

      +NOTE:While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity.
      +
      +

      +

      +The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. +

      +

      +[i.]IEEE™ 1363a-2004: "Standard Specifications For Public Key Cryptography - Amendment 1: Additional Techniques". +

      +

      +[i.]IEEE™ 1609.2-2012 (draft D12): "Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages". +

      +

      +[i.]IEEE™ 1609.2-2012 (draft D17): "Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages". +

      +

      +[i.]IEEE™ 1609.3-2010: "Wireless Access in Vehicular Environments (WAVE) - Networking Services". +

      +

      +[i.]Standards for Efficient Cryptography 4 (SEC 4): "Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV)". +

      +

      +[i.]Antipa A., R. Gallant, and S. Vanstone: "Accelerated verification of ECDSA signatures", Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005: Springer, 2005, pp. 307-318. +

      +

      + +3Definitions and abbreviations + +

      +

      + +3.1Definitions + + +

      +

      +For the purposes of the present document, the following terms and definitions apply: +

      +

      +enumeration: + set of values with distinct meaning +

      +

      + +3.2Abbreviations + +

      +

      +For the purposes of the present document, the following abbreviations apply: +

      +

      +AESAdvanced Encryption Standard +

      +

      +CACertificate Authority +

      +

      +CAMCooperative Awareness Message +

      +

      +CRLCertificate Revocation List +

      +

      +DENMDecentralized Environmental Notification Message +

      +

      +DHAESDiffie-Hellman: An Encryption Scheme +

      +

      +ECCElliptic Curve Cryptography +

      +

      +ECDSAElliptic Curve Digital Signature Algorithm +

      +

      +ECIES + + + +Elliptic Curve Integrated Encryption Scheme +

      +

      +ECQVElliptic Curve Qu-Vanstone +

      +

      +NOTE:Implicit Certificate Scheme. +

      +

      +G55,9 GHz radio communications +

      +

      +ITSIntelligent Transport Systems +

      +

      +ITS-AIDITS Application ID +

      +

      +ITS-SIntelligent Transport Systems Station +

      +

      +LSBLeast Significant Bit +

      +

      +NIMANational Imagery and Mapping Agency +

      +

      +NIST SPNational Institute of Standards and Technology, Special Publication +

      +

      +PSIDProvider Service Identifier +

      +

      +NOTE:It is a synonym for ITS-AID. +

      +

      +SSPService Specific Permissions +

      +

      +TAITemps Atomique International (International Atomic Time) +

      +

      +TLSTransport Layer Security +

      +

      +UTCUniversal Time Coordinated +

      +

      +WGSWorld Geodetic System +

      +

      + +4Basic format elements + +

      +

      + +4.1Presentation Language + +

      +

      +The presentation language is derived from the Internet Engineering Task Force (IETF) RFC 2246 (TLS) [5] and from IEEE 1609.2-2012 [i.2] (draft D12) and is described in table 1. The encoding of multi-byte elements of the presentation language shall always use network byte order, i.e. big endian byte order, if applicable. +

      +

      +NOTE:The presentation language is not formally defined. Parsing tools based on this notation cannot be guaranteed to be consistent or complete. +

      +

      +Table : Presentation language + +

      +

      + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
      +

      +Element +

      +
      +

      +Description +

      +
      +

      +Example(s) +

      +
      +

      +Variable names +

      +
      +

      +Variable names are given in lower case +

      +
      +

      +variable_name +

      +
      +

      +Basic data types +

      +
      +

      +Basic data types are given in lower case +

      +
      +

      +uint8, uint16, uint32, uint64 +

      +
      +

      +Composed data types +

      +
      +

      +Composed data types are given with at least the first letter in upper case +

      +
      +

      +MyDataType +

      +
      +

      +Comments +

      +
      +

      +Comments start with the "//" indicator +

      +
      +

      +// This is a comment +

      +
      +

      +Numbers +

      +
      +

      +Numbers are given as signed or unsigned big-endian octets +

      +
      +

      +uint8, uint16, uint32, uint64, sint32 +

      +
      +

      +Fixed-length vectors +

      +
      +

      +Fixed-length vectors have a data type and a fixed octet size given in square brackets +

      +
      +

      +uint8 Coordinates[2]; +

      +

      +// two uint8 values +

      +

      +uint32 Coordinates[8]; +

      +

      +// two uint32 values +

      +
      +

      +Variable-length vectors with fixed-length length encoding +

      +
      +

      +The number in angle brackets gives the maximum number of octets. Depending on the maximum size, the first 1 byte, 2 bytes, 4 bytes or 8 bytes encode the actual field length +

      +
      +

      +uint8 AsciiChar; +

      +

      +AsciiChar Name<2^8‑1>; +

      +

      +// "abc" encoded as +

      +

      +// 0x03, 0x61, 0x62, 0x63 +

      +

      +AsciiChar LongName<2^16‑1>; +

      +

      +// "abc" encoded as +

      +

      +// 0x00, 0x03, 0x61, 0x62, 0x63 +

      +
      +

      +Variable-length vectors with variable-length length encoding +

      +
      +

      +<var> indicates variable-length encoding. The length itself is encoded with a number of "1" bits according to the additional number of octets used to encode the length, followed by a "0" bit and the actual length value. The maximum length shall be 256 - 1, i.e. at most seven "1" bits followed by a "0" bit shall be used for the variable-length length encoding. The length of variable-length vectors with variable-length length encoding shall be encoded as positive integer using the minimum number of bits necessary + + +

      +
      +

      +uint8 AsciiChar; +

      +

      +AsciiChar Name<var>; +

      +

      +

      +// encoding examples: (the bits with // grey background represent the
      // length encoding of the vector's
      // length, X the first of the // vector's following payload bits)
      +

      +

      +// Vector length 5:
      // Bits: 00000101 XXXXXXXX XXXXXXXX + +
      +

      +

      +// Vector length 123:
      // Bits: 01111011 XXXXXXXX XXXXXXXX + +
      +

      +

      +// Vector length 388:
      // Bits: 10000001 10000100 XXXXXXXX + +
      +

      +
      +

      +Opaque fields +

      +
      +

      +Opaque fields are blocks of data whose content interpretation is not further specified +

      +
      +

      +opaque fieldname[n]; +

      +

      +opaque fieldname<n>; +

      +

      +opaque fieldname<var>; +

      +
      +

      +Enumerations +

      +
      +

      +Enumerations are list of labels with a unique value for each label, and optionally a maximum value (which then determines length of encoding) +

      +
      +

      +enum {de(0), fr(1), it(2)} Country; +

      +

      +enum {de(0), fr(1), it(2), (2^8‑1)} Country; +

      +

      +// both variants encoding in one +

      +

      +// octet +

      +

      +enum {de(0), fr(1), it(2), (2^16‑1)} Country; +

      +

      +// Encoding in two octets +

      +
      +

      +Constructed types +

      +
      +

      +Constructed types contain other types +

      +
      +

      +struct { +

      +

      + +Name name; +

      +

      + +Country country; +

      +

      +} Person; +

      +
      +

      +Case statements +

      +
      +

      +Case statements are used inside constructed types to change the contents of the constructed type depending on the value of the variable given in brackets +

      +
      +

      +struct { +

      +

      + +Name name; +

      +

      + +Country country; +

      +

      + +select(country) { +

      +

      + +case de: +

      +

      + + +uint8 age; +

      +

      + +case fr: +

      +

      + + +AsciiChar given_name<2^8‑1>; +

      +

      + +} +

      +

      +} Person; +

      +
      +

      +External data +

      +
      +

      +This is external data that has impact on a struct, e.g. in a select statement. It shall be described from where the external data is obtained +

      +
      +

      +struct { +

      +

      + +Name name; +

      +

      + +extern Country country; +

      +

      + +select(country) { +

      +

      + +case de: +

      +

      + + +uint8 age; +

      +

      + +case fr: +

      +

      + + +AsciiChar given_name<2^8‑1>; +

      +

      + +} +

      +

      +} Person; +

      +
      +

      +

      +

      + +4.2Specification of basic format elements + +

      +

      + +4.2.1 +IntX + + +

      +

      +int_x IntX; +

      +

      +

      +This data type encodes an integer of variable length. The length of this integer is encoded by a number of 1 bits followed by a 0 bit, where the number of 1 bits is equal to the number of additional octets used to encode the integer besides those used (partially) to encode the length. The encoding of the length shall use at most 7 bits set to 1. +

      +

      +EXAMPLE:00001010 encodes the integer 10, while 10001000 10001000 encodes the integer 2 184. The bits encoding the length of the element are coloured with a grey background. +

      +

      +NOTE:This definition is similar to the definition of PSID in IEEE 1609.3-2010 [i.4], clause 8.1.3, but allows bigger values of the encoded integer. +

      +

      + +4.2.2PublicKeyAlgorithm + +

      +

      +enum { +

      +

      + +ecdsa_nistp256_with_sha256(0), +

      +

      + +ecies_nistp256(1), +

      +

      + +reserved(240..255), +

      +

      + +(2^8-1) +

      +

      +} PublicKeyAlgorithm; +

      +

      +

      +This enumeration lists supported algorithms based on public key cryptography. Values in the range of 240 to 255 shall not be used as they are reserved for internal testing purposes. +

      +

      +NOTE:This definition is similar to the one in IEEE 1609.2 Draft D12 [i.2], clause 6.2.16, but ecdsa_nistp224_with_sha224 is not supported by the present document. As a consequence, the numbering of identical elements (e.g. ecies_nistp256) differs. + + + + +

      +

      + +4.2.3 +SymmetricAlgorithm + + +

      +

      +enum { +

      +

      + +aes_128_ccm (0), +

      +

      + +reserved (240..255), +

      +

      + +(2^8-1) +

      +

      +} SymmetricAlgorithm; +

      +

      +

      +This enumeration lists supported algorithms based on symmetric key cryptography. Values in the range of 240 to 255 shall not be used as they are reserved for internal testing purposes. The algorithm aes_128_ccm denotes the symmetric key cryptography algorithm AES-CCM as specified in NIST SP 800-38C [4]. + + +

      +

      +NOTE:Except naming, this definition is identical to the one in IEEE 1609.2 Draft D12 [i.2], clause 6.2.23. +

      +

      + +4.2.4PublicKey + +

      +

      +struct { +

      +

      + +PublicKeyAlgorithmalgorithm; +

      +

      + +select(algorithm) { +

      +

      + +case ecdsa_nistp256_with_sha256: +

      +

      + + +EccPoint +public_key; +

      +

      + +case ecies_nistp256: +

      +

      + + +SymmetricAlgorithmsupported_symm_alg; +

      +

      + + +EccPoint +public_key; +

      +

      + +unknown: +

      +

      + + +opaque + +other_key<var>; +

      +

      + +} +

      +

      +} PublicKey; +

      +

      +

      +This structure defines a wrapper for public keys by specifying the used algorithm and - depending on the value of algorithm - the necessary data fields: + + +

      +
        +

      • +ecdsa_nistp256_with_sha256: the specific details regarding ECC contained in an EccPoint structure shall be given. +The EccPoint used in a PublicKey shall not have EccPointType x_coordinate_only. + + + + + + + + +
      • +

        +

      • +ecies_nistp256: the specific details regarding ECC contained in an EccPoint structure and the symmetric key algorithm contained in a SymmetricAlgorithm structure shall be given. +The EccPoint used in a PublicKey shall not have EccPointType x_coordinate_only. + + + + + + + + +
      • +

        +

      • +unknown: in all other cases, a variable-length vector containing opaque data shall be given. +
      • +

        +
      +

      +NOTE:Except naming of included types, this definition is identical to the one in IEEE 1609.2 Draft D12 [i.2], clause 6.3.31. +

      +

      + +4.2.5 +EccPoint + + +

      +

      +struct { +

      +

      + +extern PublicKeyAlgorithmalgorithm; +

      +

      + +extern uint8 + + +field_size; +

      +

      + +EccPointType + + type; +

      +

      + +opaque + + + + +x[field_size]; +

      +

      + +select(type) { +

      +

      + +case x_coordinate_only: +

      +

      + +case compressed_lsb_y_0: +

      +

      + +case compressed_lsb_y_1: +

      +

      + + + + + + + + +; +

      +

      + +case uncompressed: +

      +

      + + +opaque + + + +y[field_size]; +

      +

      + +unknown: +

      +

      + + +opaque + + + +data<var>; +

      +

      + +} +

      +

      +} EccPoint; +

      +

      +

      +This structure defines a public key based on elliptic curve cryptography according to IEEE 1363-2000 [1], clause 5.5.6. An EccPoint encodes a coordinate on a two dimensional elliptic curve. The x coordinate of this point shall be encoded in x as an unsigned integer. Depending on the key type, the y coordinate shall be encoded case-specific: + + + + + + +

      +
        +

      • +x_coordinate_only: only the x coordinate is encoded, no additional data shall be given. + +
      • +

        +

      • +compressed_lsb_y_0: the point is compressed and y's least significant bit is zero, no additional data shall be given. + + + +
      • +

        +

      • +compressed_lsb_y_1: the point is compressed and y's least significant bit is one, no additional data shall be given. + + + +
      • +

        +

      • +uncompressed: the y coordinate is encoded in the field y as an unsigned integer. The y coordinate contained in a vector of length field_size containing opaque data shall be given. + + + + + + + +
      • +

        +

      • +unknown: in all other cases, a variable-length vector containing opaque data shall be given. + + + +
      • +

        +
      +

      +The uint8 field_size defining the lengths of the vectors containing the raw keys shall be derived from the given algorithm and the mapping as defined in table 2. The necessary algorithm shall be given as an external link to the parameter +pk_encryption + specified in the structure +RecipientInfo +. + + + + +

      +

      + + + + + + + + + + + +
      +

      +Table : Derivation of field sizes
      depending on the used algorithm
      +
      +

      +
      +

      +PublicKeyAlgorithm value +

      +
      +

      +Length in octets +

      +
      +

      +ecdsa_nistp256_with_sha256 +

      +
      +

      +32 +

      +
      +

      +ecies_nistp256 +

      +
      +

      +32 +

      +
      +

      +

      +

      +NOTE:Except inclusion of all remaining elements of the enumeration EccPointType that previously matched to case uncompressed and inclusion of case unknown, this definition is identical to the EccPublicKey in IEEE 1609.2 Draft D12 [i.2], clause 6.2.18. + + + + +

      +

      + +4.2.6EccPointType + +

      +

      +enum { +

      +

      + +x_coordinate_only(0), +

      +

      + +compressed_lsb_y_0(2), +

      +

      + +compressed_lsb_y_1(3), +

      +

      + +uncompressed(4), +

      +

      + +(2^8-1) +

      +

      +} EccPointType; +

      +

      +

      +This enumeration lists supported ECC point types. +

      +

      +NOTE:This definition is identical to the one in IEEE 1609.2 Draft D12 [i.2], clause 6.2.19. +

      +

      + +4.2.7 +EncryptionParameters + + +

      +

      +struct { +

      +

      + +SymmetricAlgorithm +symm_algorithm; +

      +

      + +select(symm_algorithm) { +

      +

      + +case aes_128_ccm: +

      +

      + + +opaque + +nonce[12]; +

      +

      + +unknown: +

      +

      + + +opaque + +params<var>; +

      +

      + +} +

      +

      +} EncryptionParameters; +

      +

      +

      +This structure holds basic parameters and additional data required for encryption and decryption of data using different symmetric encryption algorithms. In case of aes_128_ccm a 12 octet nonce shall be given. The parameter Tlen according to NIST SP 800-38C [4] shall be set to Tlen = 128 (bits) and no associated data shall be given. In other cases the data shall be given as a variable-length vector containing opaque data. It is out of scope of this definition how resulting ciphertexts are transported. Typically, a ciphertext should be put into a +Payload + data structure marked as encrypted using the +PayloadType +. + + + + + + + + + + + +

      +

      +NOTE:This structure is not available in IEEE 1609.2 Draft D12 [i.2]. +

      +

      + +4.2.8 +Signature + + +

      +

      +struct { +

      +

      + +PublicKeyAlgorithmalgorithm; +

      +

      + +select(algorithm) { +

      +

      + +case ecdsa_nistp256_with_sha256: +

      +

      + + +EcdsaSignatureecdsa_signature; +

      +

      + +unknown: +

      +

      + + +opaque + +signature<var>; +

      +

      + +} +

      +

      +} Signature; +

      +

      +

      +This structure defines a container that encapsulates signatures based on public key cryptography. Depending on the value of algorithm, different data structures define the algorithm-specific details: + + +

      +
        +

      • +ecdsa_nistp256_with_sha256: the signature contained in an +EcdsaSignature + structure shall be given. + +
      • +

        +

      • +unknown: in all other cases, a variable-length vector containing the signature as opaque data shall be given. + + + +
      • +

        +
      +

      +The data in this structure can be used to verify a data structure's integrity. In conjunction with a matching +SignerInfo + structure, the data structure's authenticity can also be verified. +

      +

      +It is necessary to note the following points: +

      +
        +

      • +Clause 5.6 defines which parts of a +SecuredMessage + data structure are covered by a signature. +
      • +

        +

      • +The length of the security_field<var> variable length vector in the +SecuredMessage + containing the Signature field shall be calculated before creating the signature using the length of the signature. + + + + +
      • +

        +

      • +Before calculating the actual signature, the length field of the surrounding variable length vector +TrailerField + + shall be calculated using the value of field_size, since this length field is part of the signed content. + + + + +
      • +

        +
      +

      +NOTE:Except naming and full inclusion (not marked as extern) of the enumeration PublicKeyAlgorithm, this definition is identical to the one in IEEE.1609.2 Draft D12 [i.2], clause 6.2.15. + + + + +

      +

      + +4.2.9 +EcdsaSignature + + +

      +

      +struct { +

      +

      + +extern PublicKeyAlgorithmalgorithm; +

      +

      + +extern uint8 + + +field_size; +

      +

      + +EccPoint + + + R; +

      +

      + +opaque + + + + +s[field_size]; +

      +

      +} EcdsaSignature; +

      +

      +

      +This structure defines the details needed to describe an ECDSA based signature. This field's length field_size is derived from the applied ECDSA algorithm using the mapping as specified in table 2. The extern link that specifies the algorithm points to the algorithm defined in the surrounding +Signature + structure. R contains the x coordinate of the elliptic curve point resulting from multiplying the generator element by the ephemeral private key. The EccPointType of R shall be set to either compressed_lsb_y_0, compressed_lsb_y_1 or x_coordinate_only. + + + + + + + + + + + + +

      +

      +NOTE 1:Except naming of included type PublicKeyAlgorithm, this definition is identical to the one in IEEE 1609.2 Draft D12 [i.2], clause 6.2.17. + + +

      +

      +NOTE 2:It is possible to add extra information by transferring the complete point R in a compressed form instead of only the x coordinate. This extra information may then be used for a faster signature verification algorithm as outlined in "Accelerated verification of ECDSA signatures" [i.6]. +

      +

      + +4.2.10 +SignerInfo + + +

      +

      +struct { +

      +

      + +SignerInfoType type; +

      +

      + +select(type){ +

      +

      + +case self: +

      +

      + + + + + + + +; +

      +

      + +case certificate_digest_with_sha256: +

      +

      + + +HashedId8 + +digest; +

      +

      + +case certificate: +

      +

      + + +Certificate + +certificate; +

      +

      + +case certificate_chain: +

      +

      + + +Certificate + +certificates<var>; +

      +

      + +case certificate_digest_with_other_algorithm: +

      +

      + + +PublicKeyAlgorithmalgorithm; +

      +

      + + +HashedId8 + +digest; +

      +

      + +unknown: +

      +

      + + +opaque + + +info<var>; +

      +

      + +} +

      +

      +} SignerInfo; +

      +

      +

      +This structure defines how to give information about the signer of a message. The included cryptographic identity can be used in conjunction with the structure +Signature + to verify a message's authenticity. Depending on the value of type, the +SignerInfo +'s data fields shall contain the following entries: + + +

      +
        +

      • +self: the data is self-signed. Therefore, no additional data shall be given. + +
      • +

        +

      • +certificate_digest_with_sha256: an 8 octet digest of the relevant certificate contained in a +HashedId8 + structure shall be given. + +
      • +

        +

      • +certificate: the relevant certificate itself contained in a +Certificate + structure shall be given. + +
      • +

        +

      • +certificate_chain: a complete certificate chain contained in a variable-length vector of type +Certificate + shall be given. The last element of the chain shall contain the certificate used to sign the message, the next to last element shall contain the certificate of the CA that signed the last certificate and so on. The first element of the chain needs not be a root certificate. + +
      • +

        +

      • +certificate_digest_with_other_algorithm: an 8 octet digest contained in a +HashedId8 + structure and the corresponding public key algorithm contained in a PublicKeyAlgorithm structure shall be given. + + + +
      • +

        +

      • +unknown: in all other cases, a variable-length vector containing information as opaque data shall be given. + + + +
      • +

        +
      +

      +NOTE:Except naming, this definition is identical to the one in IEEE 1609.2 Draft D12 [i.2], clause 6.2.4. +

      +

      + +4.2.11 +SignerInfoType + + +

      +

      +enum { +

      +

      + +self(0), +

      +

      + +certificate_digest_with_sha256(1), +

      +

      + +certificate(2), +

      +

      + +certificate_chain(3), +

      +

      + +certificate_digest_with_other_algorithm(4), +

      +

      + +reserved(240..255), +

      +

      + +(2^8-1) +

      +

      +} SignerInfoType; +

      +

      +

      +This enumeration lists methods to describe a message's signer. Values in the range of 240 to 255 shall not be used as they are reserved for internal testing purposes. +

      +

      +NOTE:This definition is similar to the one in IEEE 1609.2 Draft D12 [i.2], clause 6.2.5, but naming and certificate_digest_with_ecdsap224 is not supported by the present document. As a consequence, the numbering of identical elements (e.g. certificate_chain) differs. + + + + +

      +

      + +4.2.12 +HashedId8 + + +

      +

      +opaqueHashedId8[8]; +

      +

      +

      +This value is used to identify data such as a certificate. It shall be calculated by first computing the SHA‑256 hash of the input data, and then taking the least significant eight bytes from the hash output. +

      +

      +A canonical encoding for the EccPoint R contained in the signature field of a Certificate shall be used when calculating the SHA-256 hash from a Certificate. This canonical encoding shall temporarily replace the value of the EccPointType of the point R of the Certificate with x_coordinate_only for the hash computation. + + + + + + + + + + + + + + + + +

      +

      +NOTE 1:Except naming, this definition is identical to the one in IEEE 1609.2 Draft D12 [i.2], clause 6.2.6. +

      +

      +NOTE 2:The canonical encoding is used to remove the possibility of manipulating the certificate in a way that results in different HashedId8 identifiers for the same certificate by changing the EccPointType. Implementations that do not use the fast verification according to "Accelerated verification of ECDSA signatures" [i.6] cannot detect this manipulation. + + + + +

      +

      + +4.2.13 +HashedId3 + + +

      +

      +opaqueHashedId3[3]; +

      +

      +

      +This value is used to give an indication on an identifier, where real identification is not required. This can be used to request a certificate from other surrounding stations. It shall be calculated by first computing the SHA‑256 hash of the input data, and then taking the least significant three bytes from the hash output. If a corresponding +HashedId8 + value is available, it can be calculated by truncating the longer HashedId8 to the least significant three bytes. + + +

      +

      +NOTE:This definition is not available in IEEE 1609.2 Draft D12 [i.2]. +

      +

      + +4.2.14 +Time32 + + +

      +

      +uint32Time32; +

      +

      +

      +Time32 is an unsigned 32-bit integer, encoded in big-endian format, giving the number of International Atomic Time (TAI) seconds since 00:00:00 UTC, 01 January 2004. + +

      +

      +NOTE 1:The period of 2 +32 + seconds lasts about 136 years that is until 2140. +

      +

      +NOTE 2:This definition is identical to the one in IEEE 1609.2 Draft D17 [i.3], clause 6.3.31. +

      +

      + +4.2.15 +Time64 + + +

      +

      +uint64Time64; +

      +

      +

      +Time64 is a 64-bit unsigned integer, encoded in big-endian format, giving the number of International Atomic Time (TAI) microseconds since 00:00:00 UTC, 01 January 2004. + +

      +

      +NOTE:This definition is identical to the one in IEEE 1609.2 Draft D17 [i.3], clause 6.2.12. +

      +

      + +4.2.16 +Time64WithStandardDeviation + + +

      +

      +struct { +

      +

      + +Time64time; +

      +

      + +uint8log_std_dev; +

      +

      +} Time64WithStandardDeviation; + +

      +

      +

      +This structure defines how to encode time along with the standard deviation of time values. log_std_dev values 0 to 254 represent the rounded up value of the log to the base 1,134666 of the implementation's estimate of the standard deviation in units of nanoseconds. Values greater than 1,134666 + + + + +254 + nanoseconds are represented by the value 254, i.e. a day or longer. If the standard deviation is unknown, value 255 shall be used. +

      +

      +NOTE 1:This definition is identical to the one in IEEE 1609.2 Draft D17 [i.3], clause 6.2.11. +

      +

      +NOTE 2:This definition is currently unused in the security profiles in clause 7. +

      +

      + +4.2.17 +Duration + + +

      +

      +uint16Duration; +

      +

      +

      +This uint16 encodes the duration of a time span (e.g. a certificate's validity). The first three bits shall encode the units as given in table 3. The remaining 13 bits shall be treated as an integer encoded. + + +

      +

      +NOTE 1:Except naming, this definition is identical to the one in IEEE 1609.2 Draft D12 [i.2], clause 6.3.5. +

      +

      +NOTE 2:This definition is currently unused in the security profiles in clause 7. +

      +

      + + + + + + + + + + + + + + + + + + + +
      +

      +Table : Interpretation of duration unit bits + +

      +
      +

      +Bits +

      +
      +

      +Interpretation +

      +
      +

      +000 +

      +
      +

      +seconds +

      +
      +

      +001 +

      +
      +

      +minutes (60 seconds) +

      +
      +

      +010 +

      +
      +

      +hours (3 600 seconds) +

      +
      +

      +011 +

      +
      +

      +60 hour blocks (216 000 seconds) +

      +
      +

      +100 +

      +
      +

      +years (31 556 925 seconds) +

      +
      +

      +101, 110, 111 +

      +
      +

      +undefined +

      +
      +

      +

      +

      + +4.2.18 +TwoDLocation + + +

      +

      +struct { +

      +

      + +sint32latitude; +

      +

      + +sint32longitude; +

      +

      +} TwoDLocation; +

      +

      +

      +This structure defines how to specify a two dimensional location. It is used to define validity regions of a certificate. latitude and longitude encode a coordinate in tenths of micro degrees relative to the World Geodetic System (WGS)-84 datum as defined in NIMA Technical Report TR8350.2 [2]. + + + + +

      +

      +The permitted values of latitude range from ‑900 000 000 to +900 000 000. The value 900 000 001 shall indicate the latitude as not being available. + + +

      +

      +The permitted values of longitude range from ‑1 800 000 000 to +1 800 000 000. The value 1 800 000 001 shall indicate the longitude as not being available. + + +

      +

      +NOTE:This definition is identical to the one in IEEE 1609.2 Draft D12 [i.2], clause 6.3.18. +

      +

      + +4.2.19 +ThreeDLocation + + +

      +

      +struct { +

      +

      + +sint32latitude; +

      +

      + +sint32longitude; +

      +

      + +opaqueelevation[2]; +

      +

      +} ThreeDLocation; +

      +

      +

      +This structure defines how to specify a three dimensional location. latitude and longitude encode coordinate in tenths of micro degrees relative to the World Geodetic System (WGS)-84 datum as defined in NIMA Technical
      Report TR8350.2 [2].
      +
      +
      +
      +
      +

      +

      +The permitted values of latitude range from ‑900 000 000 to +900 000 000. The value 900 000 001 shall indicate the latitude as not being available. + + +

      +

      +The permitted values of longitude range from ‑1 800 000 000 to +1 800 000 000. The value 1 800 000 001 shall indicate the longitude as not being available. + + +

      +

      +elevation shall contain the elevation relative to the WGS-84 ellipsoid in decimetres. The value is interpreted as an asymmetric signed integer with an encoding as follows: + +

      +
        +

      • +0x0000 to 0xEFFF: positive numbers with a range from 0 metres to +6 143,9 metres. All numbers above +6 143,9 are also represented by 0xEFFF. +
      • +

        +

      • +0xF001 to 0xFFFF: negative numbers with a range from ‑409,5 metres to ‑0,1 metres. All numbers below ‑409,5 are also represented by 0xF001. +
      • +

        +

      • +0xF000: an unknown elevation. +
      • +

        +
      +

      +EXAMPLES: 0x0000 = 0 metre +

      +

      +0x03E8 = 100 metres +

      +

      +0xF7D1 = ‑209,5 metres (0xF001 + 0x07D0 = ‑409,5 metres + 200 metres). +

      +

      +NOTE:This definition is identical to the one in IEEE 1609.2 Draft D12 [i.2], clause 6.2.12. +

      +

      + +4.2.20 +GeographicRegion + + +

      +

      +struct { +

      +

      + +RegionType + + +region_type; +

      +

      + +select(region_type){ +

      +

      + +case circle: +

      +

      + + +CircularRegion +circular_region; +

      +

      + +case rectangle: +

      +

      + + +RectangularRegionrectangular_region<var>; +

      +

      + +case polygon: +

      +

      + + +PolygonalRegion +polygonal_region; +

      +

      + +case id: +

      +

      + + +IdentifiedRegionid_region; +

      +

      + +case none: + + + + +

      +

      + + + + + + + +; +

      +

      + +unknown: +

      +

      + + +opaque + + +other_region<var>; +

      +

      + +} +

      +

      +} GeographicRegion; +

      +

      +

      +This structure defines how to encode geographic regions. These regions can be used to limit the validity of certificates. +

      +

      +In case of rectangle, the region shall consist of a variable-length vector of rectangles that may be overlapping or disjoint. The variable-length vector shall not contain more than 6 rectangles. The region covered by the rectangles shall be continuous and shall not contain holes. + + +

      +

      +NOTE:Except inclusion of case id, this definition is identical to the one in IEEE 1609.2 Draft D12 [i.2], clause 6.3.13. + + +

      +

      + +4.2.21 +RegionType + + +

      +

      +enum { +

      +

      + +none(0), +

      +

      + +circle(1), +

      +

      + +rectangle(2), +

      +

      + +polygon(3), +

      +

      + +id(4), +

      +

      + +reserved(240..255), +

      +

      + +(2^8-1) +

      +

      +} RegionType; +

      +

      +

      +This enumeration lists possible region types. Values in the range of 240 to 255 shall not be used as they are reserved for internal testing purposes. +

      +

      +NOTE:This definition is similar to the one in IEEE 1609.2 Draft D12 [i.2], clause 6.3.14, but the identifier numbering differs, the region ID id was added and from_issuer removed. + + + + +

      +

      + +4.2.22 +CircularRegion + + +

      +

      +struct { +

      +

      + +TwoDLocation center; +

      +

      + +uint16 radius; +

      +

      +} CircularRegion; +

      +

      +

      +This structure defines a circular region with radius given in metres and center at center. The region shall include all points on the reference ellipsoid's surface with a distance over surface of Earth equal to or less than the radius to the center point. For a location of type ThreeDLocation, i.e. the location contains an elevation component, the horizontal projection onto the reference ellipsoid is used to determine if the location lies within the circular region. + + + + + + +

      +

      +NOTE:This definition is identical to the one in IEEE 1609.2 Draft D12 [i.2], clause 6.3.15. +

      +

      + +4.2.23 +RectangularRegion + + +

      +

      +struct { +

      +

      + +TwoDLocationnorthwest; +

      +

      + +TwoDLocationsoutheast; +

      +

      +} RectangularRegion; +

      +

      +

      +This structure defines a rectangular region by connecting the four points in the order (northwest.latitude, northwest.longitude), (northwest.longitude, southeast.longitude), (southeast.longitude, southeast.longitude), and (southeast.longitude, northwest.longitude). If two consecutive points P and Q define a line of constant latitude or longitude from P to Q, the left side of the line is defined as being outside of the polygon and the line itself and the right side of the line to be inside the rectangular region. A rectangular region is only valid if the location northwest is north of the location southeast. For a location of type ThreeDLocation, i.e. the location contains an elevation component, the horizontal projection onto the reference ellipsoid is used to determine if the location lies within the rectangular region. + + + + +

      +

      +NOTE:This definition is identical to the one in IEEE 1609.2 Draft D12 [i.2], clause 6.3.16. +

      +

      + +4.2.24 +PolygonalRegion + + +

      +

      +TwoDLocationPolygonalRegion<var>; +

      +

      +

      +This variable-length vector describes a region by enumerating points on the region's boundary. If two consecutively specified points P and Q define a line of constant bearing from P to Q, the left side of the line is defined as being outside of the polygon and the line itself and the right side of the line to be inside the polygon. The points shall be linked to each other, with the last point linked to the first. No intersections shall occur and at least 3 and no more than 12 points shall be given. The specified region shall be continuous and shall not contain holes. For a location of type ThreeDLocation, i.e. the location contains an elevation component, the horizontal projection onto the reference ellipsoid is used to determine if the location lies within the polygonal region. + + +

      +

      +NOTE:This definition is identical to the one in IEEE 1609.2 Draft D12 [i.2], clause 6.3.17. +

      +

      + +4.2.25 +IdentifiedRegion + + +

      +

      +struct { +

      +

      + +RegionDictionaryregion_dictionary; +

      +

      + +uint16 + + +region_identifier; +

      +

      + +IntX + + +local_region; +

      +

      +} IdentifiedRegion; +

      +

      +

      +This structure defines a predefined geographic region determined by the region dictionary region_dictionary and the region identifier region_identifier. local_region may optionally specify a more detailed region within the region. If the whole region is meant, local_region shall be set to 0. The details of local_region are unspecified. + + + + + + + + + + + +

      +

      +NOTE:This definition is not available in IEEE 1609.2 Draft D12 [i.2]. +

      +

      + +4.2.26RegionDictionary + +

      +

      +enum { +

      +

      + +iso_3166_1(0), +

      +

      + +un_stats(1), +

      +

      + +(2^8-1) +

      +

      +} RegionDictionary; +

      +

      +

      +This enumeration lists dictionaries containing two-octet records of globally defined regions. The dictionary that corresponds to iso_3166_1 shall contain values that correspond to numeric country codes as defined in ISO 3166-1 [3]. The dictionary that corresponds to un_stats shall contain values as defined by the United Nations Statistics Division, which is a superset of ISO 3166-1 [3] including compositions of regions. + + + + +

      +

      +NOTE:This definition is not available in IEEE 1609.2 Draft D12 [i.2]. +

      +

      + +5Specification of security header + +

      +

      + +5.1 +SecuredMessage + + +

      +

      +struct { +

      +

      + +uint8 + +protocol_version; +

      +

      + +HeaderField +header_fields<var>; +

      +

      + +Payload + +payload_field; +

      +

      + +TrailerFieldtrailer_fields<var>; +

      +

      +} SecuredMessage; +

      +

      +

      +This structure defines how to encode a generic secured message: +

      +
        +

      • +protocol_version specifies the applied protocol version. For compliance with the present document, protocol version 2 shall be used. The protocol_version shall be increased, if the standard is changed in an incompatible way, i.e. the syntax is incompatible such that older implementations cannot parse the format or the semantic has been changed significantly. + + + + + +
      • +

        +

      • +header_fields is a variable-length vector that contains multiple information fields of interest to the security layer. If not defined otherwise in a message profile, the sequence of header fields shall be encoded in ascending numerical order of their type value. + +
      • +

        +

      • +payload_field contains the message's payload. Multiple payloads in one message are not allowed. + +
      • +

        +

      • +trailer_fields is a variable-length vector containing information after the payload, for example, necessary to verify the message's authenticity and integrity. If not defined otherwise in a message profile, the sequence of trailer fields shall be encoded in ascending numerical order of the type value. + +
      • +

        +
      +

      +Further information about how to fill these variable-length vectors is given via security profiles in clause 7. +

      +

      +NOTE 1:This definition is not available in IEEE 1609.2 Draft D12 [i.2]. +

      +

      +NOTE 2:An example for a reason to increase the protocol_version is a change to the epoch in clause 4.2.15 and clause 4.2.16, which leads to incompatible messages. A counterexample would be an additional header field using the unknown case in clause 5.4. This header field can be ignored by old implementations, if the syntax is kept identical and the versions are compatible. Hence, the protocol_version should not be increased. + + + + + + +

      +

      + +5.2 +Payload + + +

      +

      +struct { +

      +

      + +PayloadType type; +

      +

      + +select (type) { +

      +

      + +case signed_external: + +

      +

      + + +; +

      +

      + +case unsecured: +

      +

      + +case signed: +

      +

      + +case encrypted: +

      +

      + +case signed_and_encrypted: + +

      +

      + +unknown: +

      +

      + + +opaquedata<var>; +

      +

      + +} +

      +

      +} Payload; +

      +

      +

      +This structure defines how to encode payload. In case of externally signed payload, no payload data shall be given as all data is external. In this case, the external data shall be included when calculating the signature, at the position where a non-external payload would be. In all other cases, the data shall be given as a variable-length vector containing opaque data. + + +

      +

      +NOTE 1:This definition is not available in IEEE 1609.2 Draft D12 [i.2]. +

      +

      +NOTE 2:Payloads of type signed_external are needed to add a signature in a non-intrusive way to an existing protocol stack, e.g. for extending an IPv6 stack. + + +

      +

      + +5.3 +PayloadType + + +

      +

      +enum { +

      +

      + +unsecured(0), +

      +

      + +signed(1), +

      +

      + +encrypted(2), +

      +

      + +signed_external(3), +

      +

      + +signed_and_encrypted(4), +

      +

      + +(2^8-1) +

      +

      +} PayloadType; +

      +

      +

      +This enumeration lists the supported types of payloads. +

      +

      +NOTE:This definition is not available in IEEE 1609.2 Draft D12 [i.2]. +

      +

      + +5.4 +HeaderField + + +

      +

      +struct { +

      +

      + +HeaderFieldType type; +

      +

      + +select(type) { +

      +

      + +case generation_time: +

      +

      + + +Time64 + + + + + +generation_time; +

      +

      + +case generation_time_standard_deviation: +

      +

      + + +Time64WithStandardDeviation +generation_time_with_standard_deviation; +

      +

      + +case expiration: +

      +

      + + +Time32 + + + + + +expiry_time; +

      +

      + +case generation_location: +

      +

      + + +ThreeDLocation + + + +generation_location; +

      +

      + +case request_unrecognized_certificate: +

      +

      + + +HashedId3 + + + + +digests<var>; +

      +

      + +case its_aid: +

      +

      + + +IntX + + + + + +its_aid; +

      +

      + +case signer_info: +

      +

      + + +SignerInfo + + + + +signer; +

      +

      + +case encryption_parameters: +

      +

      + + +EncryptionParameters + +enc_params; +

      +

      + +case recipient_info: +

      +

      + + +RecipientInfo + + + +recipients<var>; +

      +

      + +unknown: +

      +

      + + +opaque + + + + + +other_header<var>; +

      +

      + +} +

      +

      +} HeaderField; +

      +

      +

      +This structure defines how to encode information of interest to the security layer. Its content depends on the value of type: + + +

      +
        +

      • +generation_time: a timestamp of type +Time64 +, which shall describe the point in time, when the contents of the security headers are fixed prior to the signing process. + +
      • +

        +

      • +generation_time_standard_deviation: a timestamp of type Time64WithStandardDeviation, which shall describe the point in time, when the contents of the security headers are fixed prior to the signing process. In addition to the timestamp, the confidence described by the standard deviation of the time value contained shall be given. + +
      • +

        +

      • +expiration: the point in time the validity of this message expires contained in a +Time32 + structure shall be given. + +
      • +

        +

      • +generation_location: the location where this message was created contained in a +ThreeDLocation + structure shall be given. + +
      • +

        +

      • +request_unrecognized_certificate: a request for certificates shall be given in case that a certificate from a peer has not been transmitted before. This request consists of a variable-length vector of 3 octet long certificate digests contained in a +HashedId3 + structure to identify the requested certificates. The request shall be used to request pseudonym certificates and authorization authority certificates. + +
      • +

        +

      • +its_aid: The ITS-AID of the application payload shall be given. The valid ITS-AIDs are specified according to ETSI TS 102 965 [7]. + +
      • +

        +
      +

      +Furthermore, the HeaderField structure defines cryptographic information that is required for single-pass processing of the payload: + + +

      +
        +

      • +signer_info: information about the message's signer contained in a +SignerInfo + structure shall be given. If present, the SignerInfo structure shall come first in the array of HeaderFields, unless this is explicitly overridden by the security profile. + + + +
      • +

        +

      • +encryption_parameters: additional parameters necessary for encryption purposes contained in an +EncryptionParameters + structure shall be given. + +
      • +

        +

      • +recipient_info: information specific for certain recipients (e.g. data encrypted with a recipients public key) contained in a variable-length vector of type +RecipientInfo + shall be given. Each recipient_info vector shall be preceeded by one encryption_parameters header field to determine the value of symm_key_len according to table 4. + + + + + + + +
      • +

        +
      +

      +For extensibility, the structure contains a variable field: +

      +
        +

      • +unknown: in all other cases, a variable-length vector containing opaque data shall be given. + + + +
      • +

        +
      +

      +NOTE 1:This definition is not available in IEEE 1609.2 Draft D12 [i.2]. +

      +

      +NOTE 2:The generation_time_standard_deviation and the expiration header fields are currently unused in the security profiles in clause 7. + + + + +

      +

      + +5.5 +HeaderFieldType + + +

      +

      +enum { +

      +

      + +generation_time(0), +

      +

      + +generation_time_standard_deviation(1), +

      +

      + +expiration(2), +

      +

      + +generation_location(3), +

      +

      + +request_unrecognized_certificate(4), +

      +

      + +its_aid(5), +

      +

      + +signer_info(128), +

      +

      + +encryption_parameters(129), +

      +

      + +recipient_info(130), +

      +

      + +(2^8-1) +

      +

      +} HeaderFieldType; +

      +

      +

      +This enumeration lists the supported types of header fields. +

      +

      +NOTE:This definition is not available in IEEE 1609.2 Draft D12 [i.2]. +

      +

      + +5.6 + +TrailerField + +

      +

      +struct { +

      +

      + +TrailerFieldType + +type; +

      +

      + +select(type) { +

      +

      + +case signature: +

      +

      + + +Signature + + +signature; +

      +

      + +unkown: +

      +

      + + +opaque + + + +security_field<var>; +

      +

      + +} +

      +

      +} TrailerField; +

      +

      +

      +This structure defines how to encode information used by the security layer after processing the payload. A trailer field may contain data of the following cases: +

      +
        +

      • +signature: the signature of this message contained in a +Signature + structure shall be given. The signature is calculated over the hash of the encoding of all previous fields (version, header_fields field and the payload_field field), including the encoding of their length. Also the length of the trailer_fields field and the type of the signature trailer field shall be included in the hash.
        +
        If the payload_field field has type equal to signed_external, the data shall be included in the hash calculation immediately after the payload_field field, encoded as an opaque<var>, i.e. as if it was included.
        +
        If further trailer fields are included in a SecuredMessage, the signature structure shall include all fields in the sequence before, and exclude all fields in the sequence after the signature structure, if not otherwise defined via security profiles. + + + + + +
        +
        +
        +
        +
        +
        +
        +
        +
        +
        +
        +
        +
        +
        +
        +
        +
        +
        +
        +
        +
        +
        +
      • +

        +
      +
        +

      • +If the payload_field field type does not contain the keyword "signed" (unsecured or encrypted), then the trailer_fields field of the SecuredMessage shall not include a +Signature +. + + + + + + + + + + + + + + +
      • +

        +

      • +unknown: in all other cases, a variable-length vector containing opaque data shall be given. + + + +
      • +

        +
      +

      +NOTE:This definition is not available in IEEE 1609.2 Draft D12 [i.2]. +

      +

      + +5.7 +TrailerFieldType + + +

      +

      +enum { +

      +

      + +signature(1), +

      +

      + +(2^8-1) +

      +

      +} TrailerFieldType; +

      +

      +

      +This enumeration lists the supported types of trailer fields. +

      +

      +NOTE:This definition is not available in IEEE 1609.2 Draft D12 [i.2]. +

      +

      + +5.8 +RecipientInfo + + +

      +

      +struct { +

      +

      + +HashedId8 + + + + +cert_id; +

      +

      + PublicKeyAlgorithm + + + +pk_encryption; +

      +

      + select (pk_encryption) { +

      +

      + case ecies_nistp256: +

      +

      + EciesEncryptedKey + +enc_key; +

      +

      + +unknown: +

      +

      + + +opaque + + + + +enc_key<var>; +

      +

      + +} +

      +

      +} RecipientInfo; +

      +

      +

      +This structure contains information for the decryption of a message for a recipient. This information is used to distribute recipient specific data. cert_id determines the 8 octet identifier for the recipient's certificate. Depending on the value of pk_encryption, the following additional data shall be given: + + + + +

      +
        +

      • +ecies_nistp256: an encrypted key contained in an +EciesEncryptedKey + structure shall be given. + +
      • +

        +

      • +unknown: in all other cases, a variable-length vector containing opaque data encoding an encrypted key shall be given. + + + +
      • +

        +
      +

      +NOTE:Except naming of included type PublicKeyAlgorithm and full inclusion of pk_encryption (not extern), this definition is identical to the one in IEEE 1609.2 Draft D12 [i.2], clause 6.2.24. + + + + + + +

      +

      + +5.9 +EciesEncryptedKey + + +

      +

      + struct { +

      +

      + +extern SymmetricAlgorithm +symm_alg; +

      +

      + +extern uint32 + + +symm_key_len; +

      +

      + +EccPoint + + + v; +

      +

      + +opaque + + + + +c[symm_key_len]; +

      +

      + +opaque + + + + +t[16]; +

      +

      +} EciesEncryptedKey; +

      +

      +

      +This structure defines how to transmit an ECIES-encrypted symmetric key as defined in IEEE
      Std 1363a‑2004 [i.1]. The +EccPoint + v contains the sender's ECC ephemeral key used for the Elliptic Curve Encryption Scheme. This ephemeral key v shall only be used once and for every encryption a new key shall be generated. The vector c contains the encrypted (AES) key. The vector t contains the authentication tag. The symm_key_len defines the length of vector c containing the encrypted (AES) key and shall be derived from the given algorithm symm_alg and the mapping as defined in table 4. The necessary algorithm shall be given as an external link to the parameter +symm_algorithm + specified in the structure +EncryptionParameters +. To ensure the external link to the +SymmetricAlgorithm + +symm_alg + can be resolved, this +EciesEncryptedKey + structure shall be preceded by an according +EncryptionParameters + structure. + + + + + + + + + + + + + + + +
      +

      +

      +Further parameters used for the encryption and decryption using ECIES shall be: +

      +
        +

      • +The parameters P +1 + and P +2 + shall be empty strings. +
      • +

        +

      • +ECSVDP-DHC shall be used as secret value derivation primitive. +
      • +

        +

      • +The stream cipher used shall be based on KDF2 using SHA-256. +
      • +

        +

      • +As MAC, MAC1 shall be used with SHA-256 and tBits = 128. +
      • +

        +

      • +The length of the key (input) to MAC1 shall be 256 bits. +
      • +

        +

      • +The encryption shall use non-DHAES mode. +
      • +

        +

      • +Octet strings shall be interpreted using LSB compressed representation or uncompressed representation for the ECC points. +
      • +

        +
      +

      + + + + + + + + + +
      +

      +Table : Derivation of symmetric key size depending on the used algorithm + +

      +
      +

      +SymmetricAlgorithm value +

      +
      +

      +Length in octets +

      +
      +

      +aes_128_ccm +

      +
      +

      +16 +

      +
      +

      +

      +

      +NOTE:This definition is identical to the one in IEEE 1609.2 Draft D12 [i.2], clause 6.2.25. +

      +

      + +6Specification of certificate format + +

      +

      + +6.1 +Certificate + + +

      +

      +struct { +

      +

      + +uint8 + + + +version; +

      +

      + +SignerInfo + + +signer_info; +

      +

      + +SubjectInfo + + +subject_info; +

      +

      + +SubjectAttribute +subject_attributes<var>; +

      +

      + +ValidityRestriction +validity_restrictions<var>; +

      +

      + +Signature + + +signature; +

      +

      +} Certificate; +

      +

      +

      +This structure defines how to encode a certificate. +

      +
        +

      • +version specifies this certificate's version and shall be set to 2 for conformance with the present document. The version shall be increased, if the standard is changed in an incompatible way, i.e. the syntax is incompatible such that older implementations cannot parse the format or the semantic has been changed significantly. + + + + + +
      • +

        +

      • +Information on this certificate's signer is given signer_info field. The signer_info shall be of type self, certificate_digest_with_sha256, certificate_digest_with_other_algorithm, or reserved. + + + + + + + + + + +
      • +

        +

      • +subject_info specifies information on this certificate's subject. + +
      • +

        +

      • +Further information on the subject is given in the variable-length vector subject_attributes. The elements in the subject_attributes array shall be encoded in ascending numerical order of their type value, unless this is specifically overridden by a security profile. subject_attributes shall not contain two entries with the same type value. + + + + + + + + + + +
      • +

        +

      • +The variable-length vector validity_restrictions specifies restrictions regarding this certificate's validity. The elements in the validity_restrictions array shall be encoded in ascending numerical order of their type value, unless this is specifically overridden by a security profile. validity_restrictions shall not contain two entries with the same type value. Each certificate shall include at least one validity_restriction of type time_end, time_start_and_end, or time_start_and_duration. + + + + + + + + + + + + + + + + + + +
      • +

        +

      • +signature holds the signature of this certificate signed by the responsible CA. The signature shall be calculated over the encoding of all preceding fields, including all encoded lengths. If the subject_attributes field contains a field of type reconstruction_value, the signature field shall be omitted. The reconstruction_value may be used for implicit certificates using ECQV [i.5]. + + + + + + + + + +
      • +

        +
      +

      +NOTE 1:A certificate is considered valid if the current time is within the validity period specified in the certificate, the current region is within the validity region specified in the certificate, the type of the certificate is valid for the current type of communication, the signature, which covers all fields except the signature itself, is valid, and the certificate of the signer is valid as signer for the given certificate's type. If the certificate is self-signed, it is valid if it is stored as a trusted certificate. +

      +

      +NOTE 2:This definition differs substantially from the one in IEEE 1609.2 Draft D12 [i.2], clause 6.3.1. +

      +

      + +6.2 +SubjectInfo + + +

      +

      +struct { +

      +

      + +SubjectType +subject_type; +

      +

      + +opaque + +subject_name<2^8-1>; +

      +

      +} SubjectInfo; +

      +

      +

      +This structure defines how to encode information about a certificate's subject. It contains the type of information in subject_type and the information itself in the variable-length vector subject_name. The subject_name variable-length vector shall have a maximum length of 32 bytes. + + + + + + +

      +

      +NOTE:This definition is not available in IEEE 1609.2 Draft D12 [i.2]. +

      +

      + +6.3 +SubjectType + + +

      +

      +enum { +

      +

      + +enrollment_credential(0), +

      +

      + +authorization_ticket(1), +

      +

      + +authorization_authority(2), +

      +

      + +enrollment_authority(3), +

      +

      + +root_ca(4), +

      +

      + +crl_signer(5), +

      +

      + +(2^8-1) +

      +

      +} SubjectType; +

      +

      +

      +This enumeration lists the possible types of subjects: +

      +
        +

      • +Regular ITS stations shall use certificates containing a +SubjectInfo + of +SubjectType + enrollment_credential when communicating with Enrolment CAs. Such certificates shall not be accepted as signers of other certificates or in regular communication by other ITS-Stations. + + +
      • +

        +

      • +Regular ITS stations shall use certificates containing a +SubjectInfo + of +SubjectType + authorization_ticket when communicating with other ITS-Stations. Such certificates shall not be accepted as signers of other certificates. + + +
      • +

        +

      • +Authorization CAs, which sign authorization tickets (pseudonyms) for ITS stations, shall use the +SubjectType + authorization_authority. + + +
      • +

        +

      • +Enrolment CAs, which sign enrolment credentials (long term certificates) for ITS stations, shall use the +SubjectType + enrollment_authority. + + +
      • +

        +

      • +Root CAs, which sign certificates of other CAs, shall use the +SubjectType + root_ca. + + +
      • +

        +

      • +Certificate revocation list signers shall use +SubjectType + crl_signer. + + +
      • +

        +
      +

      +NOTE:This definition substantially differs from the one in IEEE 1609.2 Draft D12 [i.2], clause 6.3.3. +

      +

      + +6.4 +SubjectAttribute + + +

      +

      +struct { +

      +

      + +SubjectAttributeTypetype; +

      +

      + +select(type) { +

      +

      + +case verification_key: +

      +

      + +case encryption_key: + + +

      +

      + + +PublicKey + +key; +

      +

      + +case reconstruction_value: +

      +

      + + + +EccPoint + + +rv; +

      +

      + +case assurance_level: +

      +

      + + +SubjectAssuranceassurance_level; +

      +

      + +case its_aid_list: +

      +

      + + +IntX + + +its_aid_list<var>; +

      +

      + +case its_aid_ssp_list: +

      +

      + + +ItsAidSsp + +its_aid_ssp_list<var>; +

      +

      + +unknown: +

      +

      + + +opaque + + +other_attribute<var>; +

      +

      + +} +

      +

      +} SubjectAttribute; +

      +

      +

      +This structure defines how to encode a subject attribute. These attributes serve the purpose of specifying the technical details of a certificate's subject. Depending on the value of type, the following additional data shall be given: + + +

      +
        +

      • +verification_key and encryption_key: a public key contained in a PublicKey structure shall be given. + + + + + +
      • +

        +

      • +reconstruction_value: an ECC point contained in a +EccPoint + structure shall be given, which may be used for implicit certificates using ECQV [i.5]. + +
      • +

        +

      • +assurance_level: the assurance level for the subject contained in a +SubjectAssurance + structure shall be given. + +
      • +

        +

      • +its_aid_list: ITS-AIDs contained in a variable-length vector of type +IntX + shall be given. + +
      • +

        +

      • +its_aid_ssp_list: ITS-AIDs with associated SSPs contained in a variable-length vector of type +ItsAidSsp + shall be given. + +
      • +

        +

      • +unknown: in all other cases, a variable-length vector containing opaque data shall be given. + + + +
      • +

        +
      +

      +NOTE:This definition is not available in IEEE 1609.2 Draft D12 [i.2]. +

      +

      + +6.5 +SubjectAttributeType + + +

      +

      +enum { +

      +

      + +verification_key(0), +

      +

      + +encryption_key(1), +

      +

      + +assurance_level(2), +

      +

      + +reconstruction_value(3), +

      +

      + +its_aid_list(32), +

      +

      + +its_aid_ssp_list(33), +

      +

      + +(2^8-1) +

      +

      +} SubjectAttributeType; +

      +

      +

      +This enumeration lists the possible types of subject attributes. +

      +

      +NOTE:This definition is not available in IEEE 1609.2 Draft D12 [i.2]. +

      +

      + +6.6 +SubjectAssurance + + +

      +

      +opaqueSubjectAssurance; +

      +

      +

      +This field contains the ITS‑S's assurance, which denotes the ITS‑S's security of both the platform and storage of secret keys as well as the confidence in this assessment. +

      +

      +This field shall be encoded as defined in table 5, where "A" denotes bit fields specifying an assurance level, "R" reserved bit fields and "C" bit fields specifying the confidence. +

      +

      +Table 5: Bitwise encoding of subject assurance +

      +

      + + + + + + + +
      +

      +Bit number +

      +
      +

      +7 +

      +
      +

      +6 +

      +
      +

      +5 +

      +
      +

      +4 +

      +
      +

      +3 +

      +
      +

      +2 +

      +
      +

      +1 +

      +
      +

      +0 +

      +
      +

      +Interpretation +

      +
      +

      +A +

      +
      +

      +A +

      +
      +

      +A +

      +
      +

      +R +

      +
      +

      +R +

      +
      +

      +R +

      +
      +

      +C +

      +
      +

      +C +

      +
      +

      +

      +

      +In table 5, bit number 0 denotes the least significant bit. Bit 7 to bit 5 denote the ITS-S's assurance levels, bit 4 to bit 2 are reserved for future use and bit 1 and bit 0 denote the confidence. +

      +

      +The specification of these assurance levels as well as the encoding of the confidence levels is outside the scope of the present document. The default (no assurance) shall be all bits set to 0. +

      +

      +NOTE 1:This definition is not available in IEEE 1609.2 Draft D12 [i.2]. +

      +

      +NOTE 2:A process should be defined how to evaluate each implementation and how to assign a corresponding subject assurance according to the evaluation result(s). However, this process is out of scope of the present document. +

      +

      + +6.7 +ValidityRestriction + + +

      +

      +struct { +

      +

      + +ValidityRestrictionType type; +

      +

      + +select(type){ +

      +

      + +case time_end: +

      +

      + + +Time32 + + +end_validity; +

      +

      + +case time_start_and_end: +

      +

      + + +Time32 + + +start_validity; +

      +

      + + +Time32 + + +end_validity; +

      +

      + +case time_start_and_duration: +

      +

      + + +Time32 + + +start_validity; +

      +

      + + +Duration + +duration; +

      +

      + +case region: +

      +

      + + +GeographicRegionregion; +

      +

      + +unknown: +

      +

      + + +opaque + + +data<var>; +

      +

      + +} +

      +

      +} ValidityRestriction; +

      +

      +

      +This structure defines ways to restrict the validity of a certificate depending on the value of type: + + +

      +
        +

      • +time_end: the expiration date for the associated certificate contained in a +Time32 + structure shall be given. + +
      • +

        +

      • +time_start_and_end: the beginning of the validity contained in a +Time32 + structure and the expiration date contained in another +Time32 + structure shall be given. + +
      • +

        +

      • +time_start_and_duration: the beginning of the validity contained in a +Time32 + structure and the duration of validity contained in a +Duration + structure shall be given. + +
      • +

        +

      • +region: the region the certificate is valid in contained in a +GeographicRegion + structure shall be given. + +
      • +

        +

      • +unknown: in all other cases, a variable-length vector containing opaque data shall be given. + + + +
      • +

        +
      +

      +A valid certificate shall contain exactly one validity restriction of type time_end, time_start_and_end, or time_start_and_duration. + + + + + + +

      +

      +NOTE:This definition is not available in IEEE 1609.2 Draft D12 [i.2]. +

      +

      + +6.8 +ValidityRestrictionType + + +

      +

      +enum { +

      +

      + +time_end(0), +

      +

      + +time_start_and_end(1), +

      +

      + +time_start_and_duration(2), +

      +

      + +region(3), +

      +

      + +(2^8-1) +

      +

      +} ValidityRestrictionType; +

      +

      +

      +This enumeration lists the possible types of restrictions to a certificate's validity. +

      +

      +NOTE:This definition is not available in IEEE 1609.2 Draft D12 [i.2]. +

      +

      + +6.9 +ItsAidSsp + + +

      +

      +struct { +

      +

      + +IntX +its_aid; +

      +

      + +opaque +service_specific_permissions<var>; +

      +

      +} ItsAidSsp; +

      +

      +

      +This structure defines how to encode an ITS-AID with associated Service Specific Permissions (SSP). service_specific_permissions shall have a maximum length of 31 octets. The definition of SSPs is out of scope of the present document. + + +

      +

      +NOTE:This definition is similar to the one in IEEE 1609.2 Draft D12 [i.2], clause 6.3.24, but uses different naming, a slightly more flexible encoding of the ITS-AID. +

      +

      + +7Security profiles + +

      +

      + +7.1Security profile for CAMs + +

      +

      +This clause defines which fields shall be included in the SecuredMessage structure for Cooperative Awareness Messages (CAMs) as well as the scope of application of cryptographic features applied to the header. +

      +

      +These +HeaderField + elements shall be included in all CAMs. With the exception of signer_info, which is encoded first, all header_field elements shall be included in ascending order according to the numbering of the enumeration of the according type structure: + + + + +

      +
        +

      • +signer_info: this field shall contain exactly one field of the types certificate_digest_with_sha256, certificate_chain or certificate, according to the following rules: +
      • +

        +
      +
        +

      • +In the normal case, the signer_info field of type certificate_digest_with_sha256 shall be included. + + + + +
      • +

        +

      • +Instead of including a field of type certificate_digest_with_sha256, a signer_info field of type certificate shall be included one second after the last inclusion of a field of type certificate. + + + + + + + + +
      • +

        +

      • +If the ITS-S receives a CAM from a previously unknown certificate, it shall include a field of type certificate immediately in its next CAM, instead of including a field of type certificate_digest_with_sha256. In this case, the timer for the next inclusion of a field of type certificate shall be restarted. + + + + + + +
      • +

        +

      • +If an ITS-S receives a CAM whose security header includes a HeaderField of type request_unrecognized_certificate, then the ITS‑S shall evaluate the list of +HashedId3 + digests included in that field. If the ITS-S finds a +HashedId3 + of its own, currently used authorization ticket and not of the authorization authority in that list, it shall include a signer_info field of type certificate immediately in its next CAM, instead of including a signer_info field of type certificate_digest_with_sha256. If the ITS-S finds a +HashedId3 + of its own, currently used authorization authority in that list, it shall include a signer_info field of type certificate_chain containing the currently used authorization ticket and authorization authority certificate immediately in its next CAM, instead of including a signer_info field of type certificate_digest_with_sha256. + + + + + + + + + + + + + + + + + + + + +
      • +

        +
      +
        +

      • +generation_time: this field shall contain the current absolute time. The generation_time is valid, if it is in the validity period of the certificate referenced by the signer_info. + + + + + +
      • +

        +

      • +its_aid: this field shall encode the ITS-AID for CAMs according to ETSI TS 102 965 [7]. + +
      • +

        +
      +

      +The HeaderField element request_unrecognized_certificate shall be included if an ITS-S received CAMs from other ITS-Ss, which the ITS-S has never encountered before and which included only a signer_info field of type certificate_digest_with_sha256 instead of a signer_info HeaderField of type certificate. In this case, the signature of the received CAMs cannot be verified because the verification key is missing. The field digests<var> in the structure of request_unrecognized_certificate shall be filled with a list of +HashedId3 + elements of the missing ITS-S certificates. + + + + + + + + + + + + + + + + +

      +

      +NOTE 1: + +HashedId3 + elements can be formed by using the least significant three bytes of the corresponding HashedId8. + +

      +

      +None of the possible HeaderField cases shall be included more than once. All other HeaderField types defined in clause 5 shall not be used. Future HeaderField types may be included. Any other HeaderField types included shall not be used to determine the validity of the message. + + + + + + + + +

      +

      +A +Payload + element shall be included for all CAMs. This element shall be of type signed and contain the CAM payload. + + +

      +

      +These +TrailerField + elements shall be included in all CAMs: +

      +
        +

      • +signature: this field shall contain a signature calculated over these fields of the +SecuredMessage + data structure: + +
      • +

        +
      +
        +

      • +protocol_version. + +
      • +

        +

      • +The variable-length vector header_fields including its length. + + +
      • +

        +

      • +The complete payload_field field. + + +
      • +

        +

      • +The length of the variable-length vector trailer_fields and the type of the signature trailer field. + + + + +
      • +

        +
      +

      +CAMs shall not be encrypted. +

      +

      +NOTE 2:Table 6 illustrates which parts of a SecuredMessage are taken into account when generating the signature of a message. + + +

      +

      +Table 6: Example for the ECDSA signature generation for a SecuredMessage +

      +

      + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
      +

      +Element +

      +
      +

      +Description +

      +
      +

      +SecuredMessage +

      +
      +

      +

      + +uint8 protocol_version +

      +
      +

      +Covered by the signature +

      +
      +

      + +HeaderField header_fields<var> +

      +
      +

      + + + +

      +
      +

      + +Payload payload_fields<var> +

      +
      +

      + + + +

      +
      +

      + +TrailerField trailer_fields<var> +

      +
      +

      + + +TrailerFieldType type +

      +
      +

      + + + +PublicKeyAlgorithm algorithm +

      +
      +

      +Not covered by the signature +

      +
      +

      + + + +EcdsaSignature ecdsa_signature +

      +
      +

      + + + + +EccPoint R +

      +
      +

      + + + + + +EccPointType type +

      +
      +

      + + + + + +opaque x[32] +

      +
      +

      +ECDSA signature (r,s) +

      +
      +

      + + + + +opaque s[32] +

      +
      +

      +

      +

      + +7.2Security profile for DENMs + +

      +

      +This clause defines which fields shall always be included in the SecuredMessage structure for Decentralized Environmental Notification Messages (DENMs) as well as the scope of application of cryptographic features applied to the header. +

      +

      +These +HeaderField + elements shall be included in all DENMs. With the exception of signer_info, which is encoded first, all header_field elements shall be included in ascending order according to the numbering of the enumeration of the according type structure: + +

      +
        +

      • +signer_info: this field shall contain an element of type certificate. + + + +
      • +

        +

      • +generation_time: this field shall contain the current absolute time. The generation_time is valid, if it is in the validity period of the certificate referenced by the signer_info. + + + + + +
      • +

        +

      • +generation_location: this field shall contain the current location of the ITS-S at the point in time the contents of the security headers are fixed prior to the signing process. The generation_location is valid, either if there is no geographic validity restriction in the certificate referenced by the signer_info, or if it is inside the geographic validity restriction of this certificate. + + + + + +
      • +

        +

      • +its_aid: this field shall encode the ITS-AID for DENMs according to ETSI TS 102 965 [7]. + +
      • +

        +
      +

      +None of the possible HeaderField cases shall be included more than once. All other HeaderField types defined in clause 5 shall not be used. Future HeaderField types may be included. Any other HeaderField types included shall not be used to determine the validity of the message. + + + + + + + + +

      +

      +A +Payload + element shall be included for all DENMs. This element shall be of type signed and contain the DENM payload. + + +

      +

      +These +TrailerField + elements shall be included in all DENMs: +

      +
        +

      • +signature: this field shall contain a signature calculated over these fields of the +SecuredMessage + data structure: + +
      • +

        +
      +
        +

      • +protocol_version. + +
      • +

        +

      • +The variable-length vector header_fields including its length. + + +
      • +

        +

      • +The complete payload_field field. + + +
      • +

        +

      • +The length of the variable-length vector trailer_fields and the type of the signature trailer field. + + + + +
      • +

        +
      +

      +DENMs shall not be encrypted. +

      +

      + +7.3Generic security profile for other signed messages + +

      +

      +This clause defines which fields shall always be included in the SecuredMessage structure for other signed messages as well as the scope of application of cryptographic features applied to the header. +

      +

      +These +HeaderField + elements shall be included. With the exception of signer_info, which is encoded first, all header_field elements shall be included in ascending order according to the numbering of the enumeration of the according type structure: + + +

      +
        +

      • +signer_info: this field shall contain an element of type certificate. + + + +
      • +

        +

      • +generation_time: this field shall contain the current absolute time. The generation_time is valid, if it is in the validity period of the certificate referenced by the signer_info. + + + + + +
      • +

        +

      • +generation_location: this field shall contain the current location of the ITS-S at the point in time the contents of the security headers are fixed prior to the signing process. The generation_location is valid, either if there is no geographic validity restriction in the certificate referenced by the signer_info, or if it is inside the geographic validity restriction of this certificate. + + + + + +
      • +

        +

      • +its_aid: this field shall encode an ITS-AID according to ETSI TS 102 965 [7]. This field shall not encode an ITS-AID that is reserved for use with other security profiles. The present document covers the ITS-AIDs for CAM and DENM. + +
      • +

        +
      +

      +None of the possible HeaderField cases shall be included more than once. Additional HeaderField types are allowed. + + +

      +

      +A +Payload + element of type signed, signed_external or signed_and_encrypted shall be included. + + + + + + +

      +

      +These +TrailerField + elements shall be included: +

      +
        +

      • +signature: this field shall contain a signature calculated over these fields of the +SecuredMessage + data structure: + +
      • +

        +
      +
        +

      • +protocol_version. + +
      • +

        +

      • +The variable-length vector header_fields including its length. + + +
      • +

        +

      • +The complete payload_field field. If the payload is marked as external, its contents shall be included in the hash as well, at the position where a non-external payload would be. + + +
      • +

        +

      • +The length of the variable-length vector trailer_fields and the type of the signature trailer field. + + + + +
      • +

        +
      +

      + +7.4Profiles for certificates +

      +

      + +7.4.1Introduction + +

      +

      +Clause 7.4 defines which types of variable fields shall always be included in certificates. +

      +

      +The version field of a certificate shall be set according to clause 6.1. +

      +

      +The following SubjectAttribute elements shall be included: + + +

      +
        +

      • +verification_key: this field shall contain the public key of the key pair that is used to sign and verify message or certificate signatures. + +
      • +

        +

      • +assurance_level: this field shall contain the assurance level of the sender or certificate authority. A certificate shall contain an assurance level that is equal to or lower than the assurance level of the certificate referenced by the signer_info. If the assurance level is unknown for the certificate then the default assurance level 0 shall be used. + +
      • +

        +
      +

      +Exactly one of the following +ValidityRestriction + fields shall be included: +

      +
        +

      • +time_end: this field shall contain the end of validity of the certificate. + +
      • +

        +

      • +time_start_and_end: this field shall contain the validity period of the certificate. + +
      • +

        +

      • +time_start_and_duration: this field shall contain the validity period of the certificate. + +
      • +

        +
      +

      +The options time_start_and_end or time_start_and_duration should be preferred. If the signer_info is different from self, then the validity period defined by time_end, time_start_and_end or time_start_and duration shall be within the validity period of the certificate referenced by the signer_info. +

      +

      +A certificate shall contain a validity restriction of type region, if the certificate referenced by the signer_info contains a validity restriction of type region. Every certificate with a validity restriction of type region shall contain a region that is covered by the certificate referenced by the signer_info. For the field signer_info, exactly one of the following types shall be included: + + +

      +
        +

      • +certificate_digest_with_sha256 +
      • +

        +

      • +certificate_digest_with_other_algorithm +
      • +

        +

      • +self +
      • +

        +
      +

      +Apart from these fields, certificate contents may be extended depending on the purpose of the certificate. +

      +

      +All certificates shall contain a Signature field containing a signature calculated over these fields of the Certificate data structure: + + +

      +
        +

      • +The version + +
      • +

        +

      • +The signer_info + + +
      • +

        +

      • +The subject_info + +
      • +

        +

      • +The subject_attributes vector including its length + + +
      • +

        +

      • +The validity_restrictions vector including its length + + +
      • +

        +
      +

      +Every certificate containing an its_aid_list or its_aid_ssp_list subject attribute shall contain a subset of the permissions that are contained in the certificate referenced by the signer_info. An its_aid in an its_aid_list shall be interpreted as containing a superset of all possible service specific permissions of this its_aid. + + + + + + + + + + + + +

      +

      + +7.4.2Authorization tickets (pseudonymous certificates) + +

      +

      +This clause defines additional aspects of authorization tickets (i.e. pseudonymous certificates) as defined in ETSI TS 102 940 [6]. +

      +

      +For the field signer_info, exactly one of the following types shall be included: + + +

      +
        +

      • + +certificate_digest_with_sha256. +
      • +

        +
      +

      +The +SubjectInfo + field of the authorization ticket shall be set to these values: +

      +
        +

      • +subject_type: this field shall be set to authorization_ticket(1). + + + +
      • +

        +

      • + + +subject_name: this field shall be encoded as 0x00 (empty name field). + +
      • +

        +
      +

      + + +These SubjectAttribute elements shall be included in addition to those specified in clause 7.4.1 for all certificates: + +

      +
        +

      • + + +its_aid_ssp_list: this field shall contain a list of ITS-AIDs with associated Service Specific Permissions (SSP). + +For each ITS-AID only one ItsAidSsp shall be used. + +
      • +

        +
      +

      + + +As ValidityRestriction field restricting the time of validity, time_start_and_end shall be included. + +

      +

      + +7.4.3Enrolment credential (long-term certificates) + +

      +

      +This clause defines additional aspects of enrolment credentials (i.e. long-term certificates) as defined in ETSI TS 102 940 [6]. +

      +

      +For the field signer_info, exactly one of the following types shall be included: + + +

      +
        +

      • +certificate_digest_with_sha256. +
      • +

        +
      +

      +In the +SubjectInfo + field of the enrolment credential, subject_type shall be set to enrollment_credential(0). + + + + +

      +

      +These SubjectAttribute elements shall be included in addition to those specified in clause 7.4.1 for all certificates: + + +

      +
        +

      • +its_aid_ssp_list: this field shall contain a list of ITS-AIDs with associated Service Specific Permissions (SSP). For each ITS-AID only one ItsAidSsp shall be used. + + + +
      • +

        +
      +

      +As +ValidityRestriction + field restricting the time of validity, time_start_and_end shall be included. + + +

      +

      +NOTE:The its_aid_ssp_list is used for enrolment credentials to enforce that an ITS-S cannot expand its own service specific permissions in authorization tickets through manipulation of requests to the CA. + + +

      +

      + +7.4.4Certificate authority certificates + +

      +

      +This clause defines additional aspects of certificate authority certificates. +

      +

      +The following +SignerInfo + fields shall be included: +

      +
        +

      • +For root certificate authority certificates, the signer_info field shall be set to self. + + + + +
      • +

        +

      • + + +For other certificate authorities, the signer_info field shall be set to certificate_digest_with_sha256. +
      • +

        +
      +

      +In the +SubjectInfo + field of the CA certificate, subject_type shall be set to one of these types: + + +

      +
        +

      • + + +authorization_authority, for authorization authorities, i.e. certificate authorities issuing authorization tickets. +
      • +

        +

      • +enrollment_authority, for enrolment authorities, i.e. certificate authorities issuing enrolment credentials. + +
      • +

        +

      • +root_ca, for root certificate authorities. + +
      • +

        +
      +

      +These SubjectAttribute elements shall be included in addition to those specified in clause 7.4.1 for authorization authority and enrolment authority certificates: + + +

      +
        +

      • +its_aid_list: this field shall contain a list of ITS-AIDs. Each ITS-AID shall be unique in the its_aid_list. + + + +
      • +

        +
      +

      + + As + ValidityRestriction + field restricting the time of validity, time_start_and_end shall be included. +

      +

      +NOTE:The authorization and enrolment authority certificates contain an its_aid_list, because a CA should not be able to create certificates for ITS stations containing ITS-AIDs that the CA was not authorized to by the root CA. + + +

      +

      + +

      + + +Annex A (informative):
      Data structure examples
      +
      +
      +

      + +A.1Example security envelope structure for CAM + +

      +

      +The following structure shown in table A.1 is an example security header for a CAM message. The header transports the generation time, identifies the payload as signed, and includes the hash of a certificate, that is, no full certificate is included in this case. Finally, an ECDSA NIST P-256 based signature is attached. +

      +

      +Table A.: An example signed header for CAM +

      +

      + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
      +

      +Element +

      +
      +

      +Value +

      +
      +

      +Description +

      +
      +

      +Length in octets +

      +
      +

      +SecuredMessage +

      +
      +

      +

      +

      +

      + +uint8 protocol_version +

      +
      +

      +0x02 +

      +
      +

      +

      +1 +

      +
      +

      + +HeaderField header_fields<var> +

      +
      +

      +0x15 +

      +
      +

      +length: 21 octets +

      +
      +

      +1 +

      +
      +

      + + +HeaderFieldType type +

      +
      +

      +0x80 +

      +
      +

      +signer_info +

      +
      +

      +1 +

      +
      +

      + + + +SignerInfoType signer_info +

      +
      +

      +0x01 +

      +
      +

      +certificate_digest_with_sha256 +

      +
      +

      +1 +

      +
      +

      + + + +HashedId8 digest +

      +
      +

      +[…] +

      +
      +

      +

      +8 +

      +
      +

      + + +HeaderFieldType type +

      +
      +

      +0x00 +

      +
      +

      +generation_time +

      +
      +

      +1 +

      +
      +

      + + +Time64 generation_time +

      +
      +

      +[…] +

      +
      +

      +

      +8 +

      +
      +

      + + +HeaderFieldType type +

      +
      +

      +0x05 +

      +
      +

      +its_aid +

      +
      +

      +1 +

      +
      +

      + + +IntX its_aid +

      +
      +

      +[…] +

      +
      +

      +ITS-AID for CAM +

      +
      +

      +1 +

      +
      +

      + +Payload payload_field +

      +
      +

      +

      +payload +

      +
      +

      +

      + + +PaylodType payload_type +

      +
      +

      +0x01 +

      +
      +

      +signed +

      +
      +

      +1 +

      +
      +

      + + +opaque data<var> +

      +
      +

      +0x00 +

      +
      +

      +length: 0 octets +

      +
      +

      +1 +

      +
      +

      + + + +[raw payload data] +

      +
      +

      +

      +

      +0 +

      +
      +

      + +TrailerField trailer_fields<var> +

      +
      +

      +0x43 +

      +
      +

      +length: 67 octets +

      +
      +

      +1 +

      +
      +

      + + +TrailerFieldType type +

      +
      +

      +0x01 +

      +
      +

      +signature +

      +
      +

      +1 +

      +
      +

      + + + +PublicKeyAlgorithm algorithm +

      +
      +

      +0x00 +

      +
      +

      +ecdsa_nistp256_with_sha_256 +

      +
      +

      +1 +

      +
      +

      + + + +EcdsaSignature ecdsa_signature +

      +
      +

      +

      +

      +

      + + + + +EccPoint R +

      +
      +

      +

      +

      +

      + + + + + +EccPointType type +

      +
      +

      +0x00 +

      +
      +

      +x_coordinate_only +

      +
      +

      +1 +

      +
      +

      + + + + + +opaque x[32] +

      +
      +

      +[…] +

      +
      +

      +

      +32 +

      +
      +

      + + + + +opaque s[32] +

      +
      +

      +[…] +

      +
      +

      +

      +32 +

      +
      +

      +The total size of the security header structure is 93 octets. +

      +
      +

      +

      +

      + +A.2Example structure of a certificate + +

      +

      +The following structure shown in table A.2 is an example of a certificate. +

      +

      +Table A.: An example structure of a certificate +

      +

      + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
      +

      +Element +

      +
      +

      +Value +

      +
      +

      +Description +

      +
      +

      +Length in octets +

      +
      +

      +Certificate +

      +
      +

      +

      +

      +

      + +uint8 version +

      +
      +

      +0x02 +

      +
      +

      +

      +1 +

      +
      +

      + +SignerInfo signer_info + + +

      +
      +

      +

      +

      +

      + + +SignerInfoType type +

      +
      +

      +0x01 +

      +
      +

      +certificate_digest_with_sha256 +

      +
      +

      +1 +

      +
      +

      + + +HashedId8 digest +

      +
      +

      +[…] +

      +
      +

      +

      +8 +

      +
      +

      + +SubjectInfo subject_info +

      +
      +

      +

      +

      +

      + + +SubjectType type +

      +
      +

      +0x01 +

      +
      +

      +authorization_ticket +

      +
      +

      +1 +

      +
      +

      + + +opaque subject_name<var> +

      +
      +

      +0x00 +

      +
      +

      +length: 0 ( no name + + +

      +
      +

      +1 +

      +
      +

      + + + +[subject name] +

      +
      +

      +

      +

      +0 +

      +
      +

      + +SubjectAttribute subject_attributes<var> +

      +
      +

      +0x2b +

      +
      +

      +length: 43 +

      +
      +

      +1 +

      +
      +

      + + +SubjectAttributeType type +

      +
      +

      +0x00 +

      +
      +

      +verification_key +

      +
      +

      +1 +

      +
      +

      + + +PublicKey key +

      +
      +

      +

      +

      +

      + + + +PublicKeyAlgorithm algorithm +

      +
      +

      +0x00 +

      +
      +

      +ecdsa_nistp256_with_sha256 +

      +
      +

      +1 +

      +
      +

      + + + +EccPoint public_key +

      +
      +

      +

      +

      +

      + + + + +EccPointType type +

      +
      +

      +0x02 +

      +
      +

      +compressed_lsb_y_0 +

      +
      +

      +1 +

      +
      +

      + + + + +opaque x[32] +

      +
      +

      +[…] +

      +
      +

      +

      +32 +

      +
      +

      + + +SubjectAttributeType type +

      +
      +

      +0x02 +

      +
      +

      +assurance_level +

      +
      +

      +1 +

      +
      +

      + + +SubjectAssurance assurance_level +

      +
      +

      +0x83 +

      +
      +

      +level_4_confidence_3 +

      +
      +

      +1 +

      +
      +

      + + +SubjectAttributeType type +

      +
      +

      +0x33 +

      +
      +

      +its_aid_ssp_list +

      +
      +

      +1 +

      +
      +

      + + + +ItsAidSsp its_aid_ssp_list<var> +

      +
      +

      +0x04 +

      +
      +

      +length: 4 octets +

      +
      +

      +1 +

      +
      +

      + + + + +IntX its_aid +

      +
      +

      +[…] +

      +
      +

      +

      +1 +

      +
      +

      + + + + +opaque service_specific_permissions<var> +

      +
      +

      +0x02 +

      +
      +

      +length: 2 octets +

      +
      +

      +1 +

      +
      +

      + + + + + +[service specific permissions] +

      +
      +

      +[…] +

      +
      +

      +

      +2 +

      +
      +

      + +ValidityRestriction validity_restrictions<var> +

      +
      +

      +0x09 +

      +
      +

      +length: 9 octets +

      +
      +

      +1 +

      +
      +

      + + +ValidityRestrictionType type +

      +
      +

      +0x01 +

      +
      +

      +time_start_and_end +

      +
      +

      +1 +

      +
      +

      + + +Time32 start_validity +

      +
      +

      +[…] +

      +
      +

      +

      +4 +

      +
      +

      + + +Time32 end_validity +

      +
      +

      +[…] +

      +
      +

      +

      +4 +

      +
      +

      + +Signature signature +

      +
      +

      +

      +

      +

      + + +PublicKeyAlgorithm algorithm +

      +
      +

      +0x00 +

      +
      +

      +ecdsa_nistp256_with_sha256 +

      +
      +

      +1 +

      +
      +

      + + +EcdsaSignature ecdsa_signature +

      +
      +

      +

      +

      +

      + + + +EccPoint R +

      +
      +

      +

      +

      +

      + + + + +EccPointType type +

      +
      +

      +0x00 +

      +
      +

      +x_coordinate_only +

      +
      +

      +1 +

      +
      +

      + + + + +opaque x[32] +

      +
      +

      +[…] +

      +
      +

      +

      +32 +

      +
      +

      + + + +opaque s[32] +

      +
      +

      +[…] +

      +
      +

      +

      +32 +

      +
      +

      +The total size of this certificate is 132 octets. +

      +
      +

      +

      +

      + +

      + + +Annex B (informative):
      Usage of ITS-AID and SSPs
      +
      +
      +

      +An incoming secured message should only be accepted by the receiver if the payload of the secured message is consistent with the ITS-AID and SSP in the certificate. This consistency should be checked in two ways: +

      +
        +

      1. +Within the security processing, the ITS-AID in the certificate can be checked for consistency with the its_aid field in the SecuredMessage format. + + +
      2. +

        +

      3. +At the point at which the data is processed (which may be in the receiving facilities layer or in the receiving application layer), the data can be checked for consistency with the ITS-AID and the SSP from the certificate. Architecturally, this check is carried out by the processing entity that processes the data payload of the SecuredMessage, not by the security processing services. This is because the security processing services cannot and should not be expected to be able to parse the data of all possible different applications and facilities. Thus, a full definition of a data exchange for applications or facilities that use signed messages should include a specification of the ITS-AID, a specification of the SSP, and a definition of what it means for the data itself to be consistent with the ITS-AID and SSP. +
      4. +

        +
      +

      +The use of ITS-AID and SSP therefore includes the following steps: +

      +
        +

      1. +At the design stage, the group defining a given data exchange determines whether the exchanges are to be signed with ETSI TS 103 097 certificates. If they are, the group reserves an ITS-AID and defines an SSP. +
      2. +

        +

      3. +When an ITS-Station is initialized with the ability to carry out a data exchange, it requests certificates with the appropriate ITS-AID and SSP. +
      4. +

        +

      5. +An Authorization Authority determines whether the ITS-Station is entitled to that ITS-AID and SSP, using methods outside the scope of the present document to make that determination. It issues the certificates to the ITS-S. +
      6. +

        +

      7. +The sending ITS-Station generates a message that is consistent with the ITS-AID and SSP, and uses the private key corresponding to the certificate to sign that message. +
      8. +

        +

      9. +On the receiving side, the security processing checks that the message was correctly cryptographically signed, is not a replay (if appropriate), etc. +
      10. +

        +

      11. +On the receiving side, the data processing entity (which may be an application or the facilities layer) uses the ITS-AID and SSP from the certificate to check that the data is consistent with those permissions. This means that the ITS-AID and SSP should be made available to the data processing entity, for example by passing them across an interface from the security processing, or by passing the entire certificate and letting the data processing entity extract the ITS-AID and SSP from the certificate, or by some other means. +
      12. +

        +
      +

      +NOTE 1:The ITS-AID and SSP are contained in the certificate, which is cryptographically authenticated and authorized by the Authorization Authority. Because of this cryptographic authentication, it is impossible for the certificate holder to change their permissions without causing cryptographic authentication to fail. +

      +

      +NOTE 2:The ETSI TS 103 097 certificate format allows a certificate to contain multiple (ITS-AID, SSP) pairs. In this case, the receiving side processing is expected to know which ITS-AID is to be used in conjunction with an incoming message. +

      +

      +One way to make the concept of SSP future proof is to add the version number of the corresponding facility to the SSP. +

      +

      +The interpretation of the SSP is specific for each facility. One possible way to implement it is to use a bit map to define which permissions a sender is authorized to use. +

      +

      +The bit value "1" then means that the sender is authorized to use the corresponding feature and consequently the bit value "0" means that the sender is not authorized to use it. +

      +

      + +

      +

      + +History + +

      +

      + + + + + + + + + + + + + + + +
      +

      +Document history +

      +
      +

      +V1.1.1 +

      +
      +

      +April 2013 +

      +
      +

      +Publication +

      +
      +

      +V1.2.1 + + +

      +
      +

      +June 2015 +

      +
      +

      +Publication +

      +
      +

      +

      +

      +

      +

      +

      +

      +

      +

      +

      +

      +image1.jpg + + \ No newline at end of file diff --git a/requality/TS103096/root/Documents/ts_103097v010201p.xhtml_resources/ts_103097v010201p.xhtml b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml_resources/ts_103097v010201p.xhtml new file mode 100644 index 0000000000000000000000000000000000000000..08817e00d6045838f879e4b3ed5dcfc4c129799d --- /dev/null +++ b/requality/TS103096/root/Documents/ts_103097v010201p.xhtml_resources/ts_103097v010201p.xhtml @@ -0,0 +1,11623 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + ETSI TS 103 097 V1.1.21 + + +

      + + ETSI TS 103 097 + + V1.2.1 + (2015-06) + + +

      +

      + + Intelligent Transport Systems (ITS); +
      +
      +

      +

      + + Security; +
      +
      +

      +

      + Security header and certificate formats +

      +

      +

      +

      +

      +

      +

      +

      +

      +

      +

      +

      + Technical Specification +

      +

      + ? +

      +

      + + Reference +
      +
      +

      +

      + RTS/ITS-00531 +

      +

      + + Keywords +
      +
      +

      +

      + ITS, privacy, protocol, security +

      +

      +

      + + ETSI +
      +
      +

      +

      + + 650 Route des Lucioles +
      +
      +

      +

      + F-06921 Sophia Antipolis Cedex - FRANCE +

      +

      +

      + + Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 +
      +
      +

      +

      +

      + + Siret N� 348 623 562 00017 - NAF 742 C +
      +
      +

      +

      + + Association � but non lucratif enregistr�e � la +
      +
      +

      +

      + + Sous-Pr�fecture de Grasse (06) N� 7803/88 +
      +
      +

      +

      +

      +

      +

      + + Important notice +
      +
      +

      +

      + + The present document can be downloaded from: +
      + +
      + http://www.etsi.org/standards-search +

      +

      + + The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. +
      +
      +

      +

      + + Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at + + + http://portal.etsi.org/tb/status/status.asp +

      +

      + + If you find errors in the present document, please send your comment to one of the following services: +
      +
      + + https://portal.etsi.org/People/CommiteeSupportStaff.aspx +

      +

      + + Copyright Notification +
      +
      +

      +

      + + No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. +
      + The content of the PDF version shall not be modified without the written authorization of ETSI. +
      + The copyright and the foregoing restriction extend to reproduction in all media. +
      +

      +

      +

      + + � European Telecommunications Standards Institute 2015. +
      +
      +

      +

      + + All rights reserved. +
      +
      +

      +

      + DECT + TM + + , + PLUGTESTS + + TM + + , + UMTS + + TM + + and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. +
      + 3GPP +
      + TM + + and + LTE + + � are Trade Marks of ETSI registered for the benefit of its Members and +
      + of the 3GPP Organizational Partners. +
      +
      + GSM + + � and the GSM logo are Trade Marks registered and owned by the GSM Association. +
      +
      +
      +

      +

      + ? +

      +

      + Contents +

      +

      +

      + + Foreword + + 5 + 5 + +

      +

      + + Modal verbs terminology + + 5 + 5 + +

      +

      + + Introduction + + 5 + 5 + +

      +

      + + 1 + + Scope + + 6 + 6 + +

      +

      + + 2 + + References + + 6 + 6 + +

      +

      + + 2.1 + + Normative references + + 6 + 6 + +

      +

      + + 2.2 + + Informative references + + 6 + 6 + +

      +

      + + 3 + + Definitions and abbreviations + + 7 + 7 + +

      +

      + + 3.1 + + Definitions + + 7 + 7 + +

      +

      + + 3.2 + + Abbreviations + + 7 + 7 + +

      +

      + + 4 + + Basic format elements + + 7 + 7 + +

      +

      + + 4.1 + + Presentation Language + + 7 + 7 + +

      +

      + + 4.2 + + Specification of basic format elements + + 9 + 9 + +

      +

      + + 4.2.1 + + IntX + + 9 + 9 + +

      +

      + + 4.2.2 + + PublicKeyAlgorithm + + 9 + 9 + +

      +

      + + 4.2.3 + + SymmetricAlgorithm + + 9 + 9 + +

      +

      + + 4.2.4 + + PublicKey + + 9 + 9 + +

      +

      + + 4.2.5 + + EccPoint + + 10 + 10 + +

      +

      + + 4.2.6 + + EccPointType + + 11 + 11 + +

      +

      + + 4.2.7 + + EncryptionParameters + + 11 + 11 + +

      +

      + + 4.2.8 + + Signature + + 11 + 11 + +

      +

      + + 4.2.9 + + EcdsaSignature + + 12 + 12 + +

      +

      + + 4.2.10 + + SignerInfo + + 12 + 12 + +

      +

      + + 4.2.11 + + SignerInfoType + + 13 + 13 + +

      +

      + + 4.2.12 + + HashedId8 + + 13 + 13 + +

      +

      + + 4.2.13 + + HashedId3 + + 13 + 13 + +

      +

      + + 4.2.14 + + Time32 + + 14 + 14 + +

      +

      + + 4.2.15 + + Time64 + + 14 + 14 + +

      +

      + + 4.2.16 + + Time64WithStandardDeviation + + 14 + 14 + +

      +

      + + 4.2.17 + + Duration + + 14 + 14 + +

      +

      + + 4.2.18 + + TwoDLocation + + 15 + 15 + +

      +

      + + 4.2.19 + + ThreeDLocation + + 15 + 15 + +

      +

      + + 4.2.20 + + GeographicRegion + + 15 + 15 + +

      +

      + + 4.2.21 + + RegionType + + 16 + 16 + +

      +

      + + 4.2.22 + + CircularRegion + + 16 + 16 + +

      +

      + + 4.2.23 + + RectangularRegion + + 16 + 16 + +

      +

      + + 4.2.24 + + PolygonalRegion + + 17 + 17 + +

      +

      + + 4.2.25 + + IdentifiedRegion + + 17 + 17 + +

      +

      + + 4.2.26 + + RegionDictionary + + 17 + 17 + +

      +

      + + 5 + + Specification of security header + + 17 + 17 + +

      +

      + + 5.1 + + SecuredMessage + + 17 + 17 + +

      +

      + + 5.2 + + Payload + + 18 + 18 + +

      +

      + + 5.3 + + PayloadType + + 18 + 18 + +

      +

      + + 5.4 + + HeaderField + + 18 + 18 + +

      +

      + + 5.5 + + HeaderFieldType + + 20 + 20 + +

      +

      + + 5.6 + + TrailerField + + 20 + 20 + +

      +

      + + 5.7 + + TrailerFieldType + + 20 + 20 + +

      +

      + + 5.8 + + RecipientInfo + + 21 + 21 + +

      +

      + + 5.9 + + EciesEncryptedKey + + 21 + 21 + +

      +

      + + 6 + + Specification of certificate format + + 22 + 22 + +

      +

      + + 6.1 + + Certificate + + 22 + 22 + +

      +

      + + 6.2 + + SubjectInfo + + 23 + 23 + +

      +

      + + 6.3 + + SubjectType + + 23 + 23 + +

      +

      + + 6.4 + + SubjectAttribute + + 23 + 23 + +

      +

      + + 6.5 + + SubjectAttributeType + + 24 + 24 + +

      +

      + + 6.6 + + SubjectAssurance + + 24 + 24 + +

      +

      + + 6.7 + + ValidityRestriction + + 25 + 25 + +

      +

      + + 6.8 + + ValidityRestrictionType + + 25 + 25 + +

      +

      + + 6.9 + + ItsAidSsp + + 25 + 25 + +

      +

      + + 7 + + Security profiles + + 26 + 26 + +

      +

      + + 7.1 + + Security profile for CAMs + + 26 + 26 + +

      +

      + + 7.2 + + Security profile for DENMs + + 27 + 27 + +

      +

      + + 7.3 + + Generic security profile for other signed messages + + 28 + 28 + +

      +

      + + 7.4 + + Profiles for certificates + + 29 + 29 + +

      +

      + + 7.4.1 + + Introduction + + 29 + 29 + +

      +

      + + 7.4.2 + + Authorization tickets (pseudonymous certificates) + + 30 + 30 + +

      +

      + + 7.4.3 + + Enrolment credential (long-term certificates) + + 30 + 30 + +

      +

      + + 7.4.4 + + Certificate authority certificates + + 30 + 30 + +

      +

      + + Annex A (informative): + + Data structure examples + + 32 + 32 + +

      +

      + + A.1 + + Example security envelope structure for CAM + + 32 + 32 + +

      +

      + + A.2 + + Example structure of a certificate + + 33 + 33 + +

      +

      + + Annex B (informative): + + Usage of ITS-AID and SSPs + + 34 + 34 + +

      +

      + + History + + 35 + 35 + +

      +

      +

      + ? +

      +

      + + Intellectual Property Rights + +

      +

      + IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for + ETSI members and non-members + + , and can be found in ETSI SR 000 314: + + "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards" + + , which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server ( + + + + + http://ipr.etsi.org + + ). +
      +
      +

      +

      + Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. +

      +

      + + Foreword + +

      +

      + + This Technical Specification (TS) has been produced by ETSI Technical Committee Intelligent Transport Systems (ITS). + +

      +

      + + Modal verbs terminology + +

      +

      + In the present document " + shall + ", " + shall not + ", " + should + ", " + should not + ", " + may + ", " + need not + ", " + will + ", " + will not + ", " + can + " and " + cannot + + " are to be interpreted as described in clause 3.2 of the + + + ETSI Drafting Rules + + (Verbal forms for the expression of provisions). +
      +
      +

      +

      + " + must + " and " + must not + " are + NOT + + allowed in ETSI deliverables except when used in direct citation. +
      +
      +

      +

      + + Introduction + +

      +

      + Security mechanisms for ITS consist of a number of parts. An important part for interoperability is a common format for data elements being transferred between ITS stations for security purposes. +

      +

      + The present document intends to provide such a format definition. A special focus is to include as much as possible from existing standards. At the same time, the major goal is simplicity and extensibility of data structures. +

      +

      + ? +

      +

      + + + 1 + + Scope + + +

      +

      + The present document specifies security header and certificate formats for Intelligent Transport Systems. These formats are defined specifically for securing G5 communication. +

      +

      + + + 2 + + References + + +

      +

      + + + 2.1 + + Normative references + + +

      +

      + References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. +

      +

      + + Referenced documents which are not found to be publicly available in the expected location might be found at + + + http://docbox.etsi.org/Reference + + . +
      +
      +

      +

      + + NOTE: + + While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. +
      +
      +

      +

      + The following referenced documents are necessary for the application of the present document. +

      +

      + + [] + + IEEE� 1363-2000: "IEEE Standard Specifications For Public Key Cryptography". + +

      +

      + + [] + + NIMA Technical Report TR8350.2: "Department of Defense World Geodetic System 1984. Its Definition and Relationships with Local Geodetic Systems". + +

      +

      + + [] + + ISO 3166-1: "Codes for the representation of names of countries and their subdivisions -- Part 1: Country codes". + +

      +

      + + [] + + NIST SP 800-38C: "Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality". + +

      +

      + + [] + + IETF RFC 2246: "The TLS Protocol Version 1.0". + +

      +

      + + [] + + ETSI TS 102 940: "Intelligent Transport Systems (ITS); Security; ITS communications security architecture and security management". + +

      +

      + + [] + + ETSI TS 102 965 (V1.2.1): "Intelligent Transport Systems (ITS); Application Object Identifier (ITS-AID); Registration". + +

      +

      + + + 2.2 + + Informative references + + +

      +

      + References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. +

      +

      + + NOTE: + + While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. +
      +
      +

      +

      + The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. +

      +

      + + [ + i. + ] + + IEEE� 1363a-2004: "Standard Specifications For Public Key Cryptography - Amendment 1: Additional Techniques". + +

      +

      + + [ + i. + ] + + IEEE� 1609.2-2012 (draft D12): "Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages". + +

      +

      + + [ + i. + ] + + IEEE� 1609.2-2012 (draft D17): "Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages". + +

      +

      + + [ + i. + ] + + IEEE� 1609.3-2010: "Wireless Access in Vehicular Environments (WAVE) - Networking Services". + +

      +

      + + [ + i. + ] + + Standards for Efficient Cryptography 4 (SEC 4): "Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV)". + +

      +

      + + [ + i. + ] + + Antipa A., R. Gallant, and S. Vanstone: "Accelerated verification of ECDSA signatures", Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005: Springer, 2005, pp. 307-318. + +

      +

      + + + 3 + + Definitions and abbreviations + + +

      +

      + + + 3.1 + + Definitions + + + +

      +

      + For the purposes of the present document, the following terms and definitions apply: +

      +

      + enumeration: + set of values with distinct meaning +

      +

      + + + 3.2 + + Abbreviations + + +

      +

      + For the purposes of the present document, the following abbreviations apply: +

      +

      + + AES + + Advanced Encryption Standard + +

      +

      + + CA + + Certificate Authority + +

      +

      + + CAM + + Cooperative Awareness Message + +

      +

      + + CRL + + Certificate Revocation List + +

      +

      + + DENM + + Decentralized Environmental Notification Message + +

      +

      + + DHAES + + Diffie-Hellman: An Encryption Scheme + +

      +

      + + ECC + + Elliptic Curve Cryptography + +

      +

      + + ECDSA + + Elliptic Curve Digital Signature Algorithm + +

      +

      + ECIES + + + + Elliptic Curve Integrated Encryption Scheme +

      +

      + + ECQV + + Elliptic Curve Qu-Vanstone + +

      +

      + + NOTE: + + Implicit Certificate Scheme. + +

      +

      + + G5 + + 5,9 GHz radio communications + +

      +

      + + ITS + + Intelligent Transport Systems + +

      +

      + + ITS-AID + + ITS Application ID + +

      +

      + + ITS-S + + Intelligent Transport Systems Station + +

      +

      + + LSB + + Least Significant Bit + +

      +

      + + NIMA + + National Imagery and Mapping Agency + +

      +

      + + NIST SP + + National Institute of Standards and Technology, Special Publication + +

      +

      + + PSID + + Provider Service Identifier + +

      +

      + + NOTE: + + It is a synonym for ITS-AID. + +

      +

      + + SSP + + Service Specific Permissions + +

      +

      + + TAI + + Temps Atomique International (International Atomic Time) + +

      +

      + + TLS + + Transport Layer Security + +

      +

      + + UTC + + Universal Time Coordinated + +

      +

      + + WGS + + World Geodetic System + +

      +

      + + + 4 + + Basic format elements + + +

      +

      + + + 4.1 + + Presentation Language + + +

      +

      + + The presentation language is derived from the Internet Engineering Task Force (IETF) RFC 2246 (TLS) [ + 5 + ] and from IEEE 1609.2-2012 [ + i.2 + ] (draft D12) and is described in table + 1 + . The encoding of multi-byte elements of the presentation language shall always use network byte order, i.e. big endian byte order, if applicable. + +

      +

      + + NOTE: + + The presentation language is not formally defined. Parsing tools based on this notation cannot be guaranteed to be consistent or complete. + +

      +

      + + Table : + Presentation language + +

      +

      + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
      +

      + Element +

      +
      +

      + Description +

      +
      +

      + Example(s) +

      +
      +

      + Variable names +

      +
      +

      + Variable names are given in lower case +

      +
      +

      + variable_name +

      +
      +

      + Basic data types +

      +
      +

      + Basic data types are given in lower case +

      +
      +

      + uint8, uint16, uint32, uint64 +

      +
      +

      + Composed data types +

      +
      +

      + Composed data types are given with at least the first letter in upper case +

      +
      +

      + MyDataType +

      +
      +

      + Comments +

      +
      +

      + Comments start with the "//" indicator +

      +
      +

      + // This is a comment +

      +
      +

      + Numbers +

      +
      +

      + Numbers are given as signed or unsigned big-endian octets +

      +
      +

      + uint8, uint16, uint32, uint64, sint32 +

      +
      +

      + Fixed-length vectors +

      +
      +

      + Fixed-length vectors have a data type and a fixed octet size given in square brackets +

      +
      +

      + uint8 Coordinates[2]; +

      +

      + // two uint8 values +

      +

      + uint32 Coordinates[8]; +

      +

      + // two uint32 values +

      +
      +

      + Variable-length vectors with fixed-length length encoding +

      +
      +

      + The number in angle brackets gives the maximum number of octets. Depending on the maximum size, the first 1 byte, 2 bytes, 4 bytes or 8 bytes encode the actual field length +

      +
      +

      + uint8 AsciiChar; +

      +

      + AsciiChar Name<2^8-1>; +

      +

      + // "abc" encoded as +

      +

      + // 0x03, 0x61, 0x62, 0x63 +

      +

      + AsciiChar LongName<2^16-1>; +

      +

      + // "abc" encoded as +

      +

      + // 0x00, 0x03, 0x61, 0x62, 0x63 +

      +
      +

      + Variable-length vectors with variable-length length encoding +

      +
      +

      + + <var> indicates variable-length encoding. The length itself is encoded with a number of "1" bits according to the additional number of octets used to encode the length, followed by a "0" bit and the actual length value. The maximum length shall be 2 + + 56 + - 1, i.e. at most seven "1" bits followed by a "0" bit shall be used for the variable-length length encoding. The length of variable-length vectors with variable-length length encoding shall be encoded as positive integer using the minimum number of bits necessary + + +

      +
      +

      + uint8 AsciiChar; +

      +

      + AsciiChar Name<var>; +

      +

      +

      + + // encoding examples: (the bits with // grey background represent the +
      + // length encoding of the vector's +
      + // length, X the first of the // vector's following payload bits) +
      +

      +

      + + // Vector length 5: +
      + // Bits: + + 0 + 0000101 XXXXXXXX XXXXXXXX + +
      +

      +

      + + // Vector length 123: +
      + // Bits: + + 0 + 1111011 XXXXXXXX XXXXXXXX + +
      +

      +

      + + // Vector length 388: +
      + // Bits: + + 10 + 000001 10000100 XXXXXXXX + +
      +

      +
      +

      + Opaque fields +

      +
      +

      + Opaque fields are blocks of data whose content interpretation is not further specified +

      +
      +

      + opaque fieldname[n]; +

      +

      + opaque fieldname<n>; +

      +

      + opaque fieldname<var>; +

      +
      +

      + Enumerations +

      +
      +

      + Enumerations are list of labels with a unique value for each label, and optionally a maximum value (which then determines length of encoding) +

      +
      +

      + enum {de(0), fr(1), it(2)} Country; +

      +

      + enum {de(0), fr(1), it(2), (2^8-1)} Country; +

      +

      + // both variants encoding in one +

      +

      + // octet +

      +

      + enum {de(0), fr(1), it(2), (2^16-1)} Country; +

      +

      + // Encoding in two octets +

      +
      +

      + Constructed types +

      +
      +

      + Constructed types contain other types +

      +
      +

      + struct { +

      +

      + + + Name name; + +

      +

      + + + Country country; + +

      +

      + } Person; +

      +
      +

      + Case statements +

      +
      +

      + Case statements are used inside constructed types to change the contents of the constructed type depending on the value of the variable given in brackets +

      +
      +

      + struct { +

      +

      + + + Name name; + +

      +

      + + + Country country; + +

      +

      + + + select(country) { + +

      +

      + + + case de: + +

      +

      + + + + uint8 age; + +

      +

      + + + case fr: + +

      +

      + + + + AsciiChar given_name<2^8-1>; + +

      +

      + + + } + +

      +

      + } Person; +

      +
      +

      + External data +

      +
      +

      + This is external data that has impact on a struct, e.g. in a select statement. It shall be described from where the external data is obtained +

      +
      +

      + struct { +

      +

      + + + Name name; + +

      +

      + + + extern Country country; + +

      +

      + + + select(country) { + +

      +

      + + + case de: + +

      +

      + + + + uint8 age; + +

      +

      + + + case fr: + +

      +

      + + + + AsciiChar given_name<2^8-1>; + +

      +

      + + + } + +

      +

      + } Person; +

      +
      +

      +

      +

      + + + 4.2 + + Specification of basic format elements + + +

      +

      + + + 4.2.1 + + IntX + + +

      +

      + + int_x + + IntX; + +

      +

      +

      + This data type encodes an integer of variable length. The length of this integer is encoded by a number of 1 bits followed by a 0 bit, where the number of 1 bits is equal to the number of additional octets used to encode the integer besides those used (partially) to encode the length. The encoding of the length shall use at most 7 bits set to 1. +

      +

      + + EXAMPLE: + + 00001010 encodes the integer 10, while 10001000 10001000 encodes the integer 2 184. The bits encoding the length of the element are coloured with a grey background. + +

      +

      + + NOTE: + + This definition is similar to the definition of PSID in IEEE 1609.3-2010 [ + i.4 + ], clause 8.1.3, but allows bigger values of the encoded integer. + +

      +

      + + + 4.2.2 + + PublicKeyAlgorithm + + +

      +

      + enum { +

      +

      + + + ecdsa_nistp256_with_sha256(0), + +

      +

      + + + ecies_nistp256(1), + +

      +

      + + + reserved(240..255), + +

      +

      + + + (2^8-1) + +

      +

      + } PublicKeyAlgorithm; +

      +

      +

      + This enumeration lists supported algorithms based on public key cryptography. Values in the range of 240 to 255 shall not be used as they are reserved for internal testing purposes. +

      +

      + + NOTE: + + This definition is similar to the one in IEEE 1609.2 Draft D12 [ + i.2 + ], clause 6.2.16, but + + ecdsa_nistp224_with_sha224 + + is not supported by the present document. As a consequence, the numbering of identical elements (e.g. + + ecies_nistp256 + ) differs. + + + + +

      +

      + + + 4.2.3 + + SymmetricAlgorithm + + +

      +

      + enum { +

      +

      + + + aes_128_ccm (0), + +

      +

      + + + reserved (240..255), + +

      +

      + + + (2^8-1) + +

      +

      + } SymmetricAlgorithm; +

      +

      +

      + + This enumeration lists supported algorithms based on symmetric key cryptography. Values in the range of 240 to 255 shall not be used as they are reserved for internal testing purposes. The algorithm + + aes_128_ccm + + denotes the symmetric key cryptography algorithm AES-CCM as specified in NIST SP 800-38C [ + 4 + ]. + + + +

      +

      + + NOTE: + + Except naming, this definition is identical to the one in IEEE 1609.2 Draft D12 [ + i.2 + ], clause 6.2.23. + +

      +

      + + + 4.2.4 + + PublicKey + + +

      +

      + struct { +

      +

      + + + PublicKeyAlgorithm + + algorithm; + +

      +

      + + + select(algorithm) { + +

      +

      + + + case ecdsa_nistp256_with_sha256: + +

      +

      + + + + EccPoint + + + public_key; + +

      +

      + + + case ecies_nistp256: + +

      +

      + + + + SymmetricAlgorithm + + supported_symm_alg; + +

      +

      + + + + EccPoint + + + public_key; + +

      +

      + + + unknown: + +

      +

      + + + + opaque + + + + other_key<var>; + +

      +

      + + + } + +

      +

      + } PublicKey; +

      +

      +

      + + This structure defines a wrapper for public keys by specifying the used algorithm and - depending on the value of + + algorithm + - the necessary data fields: + + +

      + +

      + + NOTE: + + Except naming of included types, this definition is identical to the one in IEEE 1609.2 Draft D12 [ + i.2 + ], clause 6.3.31. + +

      +

      + + + 4.2.5 + + EccPoint + + +

      +

      + struct { +

      +

      + + + extern PublicKeyAlgorithm + + algorithm; + +

      +

      + + + extern uint8 + + + + + field_size; + +

      +

      + + + EccPointType + + + + type; + +

      +

      + + + opaque + + + + + + + x[field_size]; + +

      +

      + + + select(type) { + +

      +

      + + + case x_coordinate_only: + +

      +

      + + + case compressed_lsb_y_0: + +

      +

      + + + case compressed_lsb_y_1: + +

      +

      + + + + + + + + + + ; + +

      +

      + + + case uncompressed: + +

      +

      + + + + opaque + + + + + + y[field_size]; + +

      +

      + + + unknown: + +

      +

      + + + + opaque + + + + + + data<var>; + +

      +

      + + + } + +

      +

      + } EccPoint; +

      +

      +

      + + This structure defines a public key based on elliptic curve cryptography according to IEEE 1363-2000 [ + 1 + ], clause 5.5.6. An + + EccPoint + + encodes a coordinate on a two dimensional elliptic curve. The x coordinate of this point shall be encoded in + + x + + as an unsigned integer. Depending on the key type, the + + y + coordinate shall be encoded case-specific: + + + + + + +

      +
        +

        +

      • + + x_coordinate_only + : only the x coordinate is encoded, no additional data shall be given. + +
      • +

        +

        +

      • + + compressed_lsb_y_0 + + : the point is compressed and + + y + 's least significant bit is zero, no additional data shall be given. + + + +
      • +

        +

        +

      • + + compressed_lsb_y_1 + + : the point is compressed and + + y + 's least significant bit is one, no additional data shall be given. + + + +
      • +

        +

        +

      • + + uncompressed + + : the y coordinate is encoded in the field + + y + + as an unsigned integer. The y coordinate contained in a vector of length + + field_size + + containing + + opaque + data shall be given. + + + + + + + +
      • +

        +

        +

      • + + unknown + + : in all other cases, a variable-length vector containing + + opaque + data shall be given. + + + +
      • +

        +
      +

      + + The + + uint8 + + + field_size + + defining the lengths of the vectors containing the raw keys shall be derived from the given algorithm and the mapping as defined in table + 2 + . The necessary algorithm shall be given as an external link to the parameter + + pk_encryption + + specified in the structure + + RecipientInfo + + . + + + + + +

      +

      + + + + + + + + + + + + + + + + + + +
      +

      + + Table + + : + Derivation of field sizes +
      + depending on the used algorithm +
      +
      +

      +
      +

      + PublicKeyAlgorithm value +

      +
      +

      + Length in octets +

      +
      +

      + ecdsa_nistp256_with_sha256 +

      +
      +

      + 32 +

      +
      +

      + ecies_nistp256 +

      +
      +

      + 32 +

      +
      +

      +

      +

      + + NOTE: + + Except inclusion of all remaining elements of the enumeration EccPointType that previously matched to case + + uncompressed + + and inclusion of case + + unknown + + , this definition is identical to the EccPublicKey in IEEE 1609.2 Draft D12 [ + i.2 + ], clause 6.2.18. + + + + + +

      +

      + + + 4.2.6 + + EccPointType + + +

      +

      + enum { +

      +

      + + + x_coordinate_only(0), + +

      +

      + + + compressed_lsb_y_0(2), + +

      +

      + + + compressed_lsb_y_1(3), + +

      +

      + + + uncompressed(4), + +

      +

      + + + (2^8-1) + +

      +

      + } EccPointType; +

      +

      +

      + This enumeration lists supported ECC point types. +

      +

      + + NOTE: + + This definition is identical to the one in IEEE 1609.2 Draft D12 [ + i.2 + ], clause 6.2.19. + +

      +

      + + + 4.2.7 + + EncryptionParameters + + +

      +

      + struct { +

      +

      + + + SymmetricAlgorithm + + symm_algorithm + ; + +

      +

      + + + select(symm_algorithm) { + +

      +

      + + + case aes_128_ccm: + +

      +

      + + + + opaque + + + + nonce[12]; + +

      +

      + + + unknown: + +

      +

      + + + + opaque + + + + params<var>; + +

      +

      + + + } + +

      +

      + } EncryptionParameters; +

      +

      +

      + + This structure holds basic parameters and additional data required for encryption and decryption of data using different symmetric encryption algorithms. In case of + + aes_128_ccm + + a 12 octet nonce shall be given. The parameter + + Tlen + + according to NIST SP 800-38C [ + 4 + ] shall be set to + + Tlen + + = 128 (bits) and no associated data shall be given. In other cases the data shall be given as a variable-length vector containing + + opaque + + data. It is out of scope of this definition how resulting ciphertexts are transported. Typically, a ciphertext should be put into a + + Payload + + data structure marked as + + + encrypted + + using the + + PayloadType + + . + + + + + + + + + + + + +

      +

      + + NOTE: + + This structure is not available in IEEE 1609.2 Draft D12 [ + i.2 + ]. + +

      +

      + + + 4.2.8 + + Signature + + +

      +

      + struct { +

      +

      + + + PublicKeyAlgorithm + + algorithm; + +

      +

      + + + select(algorithm) { + +

      +

      + + + case ecdsa_nistp256_with_sha256: + +

      +

      + + + + EcdsaSignature + + ecdsa_signature; + +

      +

      + + + unknown: + +

      +

      + + + + opaque + + + + signature<var>; + +

      +

      + + + } + +

      +

      + } Signature; +

      +

      +

      + + This structure defines a container that encapsulates signatures based on public key cryptography. Depending on the value of + + algorithm + , different data structures define the algorithm-specific details: + + +

      +
        +

        +

      • + + ecdsa_nistp256_with_sha256 + + : the signature contained in an + + EcdsaSignature + + structure shall be given. + + +
      • +

        +

        +

      • + + unknown + + : in all other cases, a variable-length vector containing the signature as + + opaque + data shall be given. + + + +
      • +

        +
      +

      + + The data in this structure can be used to verify a data structure's integrity. In conjunction with a matching + + SignerInfo + + structure, the data structure's authenticity can also be verified. + +

      +

      + It is necessary to note the following points: +

      +
        +

        +

      • + + Clause + 5.6 + defines which parts of a + + SecuredMessage + + data structure are covered by a signature. + +
      • +

        +

        +

      • + + The length of the + + security_field<var> + + variable length vector in the + + SecuredMessage + + containing the + + Signature + field shall be calculated before creating the signature using the length of the signature. + + + + +
      • +

        +

        +

      • + + Before calculating the actual signature, the length field of the surrounding variable length vector + + TrailerField + + + + shall be calculated using the value of + + field_size + , since this length field is part of the signed content. + + + + +
      • +

        +
      +

      + + NOTE: + + Except naming and full inclusion (not marked as + + extern + + ) of the enumeration + + PublicKeyAlgorithm + + , this definition is identical to the one in IEEE.1609.2 Draft D12 [ + i.2 + ], clause 6.2.15. + + + + + +

      +

      + + + 4.2.9 + + EcdsaSignature + + +

      +

      + struct { +

      +

      + + + extern PublicKeyAlgorithm + + algorithm; + +

      +

      + + + extern uint8 + + + + + field_size; + +

      +

      + + + EccPoint + + + + + R; + +

      +

      + + + opaque + + + + + + + s[field_size]; + +

      +

      + } EcdsaSignature; +

      +

      +

      +

      + + NOTE 1: + + + + A certificate is considered valid if the current time is within the validity period specified in the certificate, the current region is within the validity region specified in the certificate, the type of the certificate is valid for the current type of communication, the signature, which covers all fields except the signature itself, is valid, and the certificate of the signer is valid as signer for the given certificate's type. If the certificate is self-signed, it is valid if it is stored as a trusted certificate. + + +

      +

      + + NOTE 2: + + This definition differs substantially from the one in IEEE 1609.2 Draft D12 [ + i.2 + ], clause 6.3.1. + +

      +

      + + + 6.2 + + SubjectInfo + + +

      +

      + struct { +

      +

      + + + SubjectType + + + subject_type; + +

      +

      + + + opaque + + + + subject_name<2^8-1>; + +

      +

      + } SubjectInfo; +

      +

      +

      + + This structure defines how to encode information about a certificate's subject. It contains the type of information in + + subject_type + + and the information itself in the variable-length vector + + subject_name + + . + + + The + + + subject_name + + variable-length vector shall have a maximum length of 32 bytes. + + + + + + + +

      +

      + + NOTE: + + This definition is not available in IEEE 1609.2 Draft D12 [ + i.2 + ]. + +

      +

      + + + 6.3 + + SubjectType + + +

      +

      + enum { +

      +

      + + + enrollment_credential(0), + +

      +

      + + + authorization_ticket(1), + +

      +

      + + + authorization_authority(2), + +

      +

      + + + enrollment_authority(3), + +

      +

      + + + root_ca(4), + +

      +

      + + + crl_signer(5), + +

      +

      + + + (2^8-1) + +

      +

      + } SubjectType; +

      +

      +

      + This enumeration lists the possible types of subjects: +

      + +

      + + NOTE: + + This definition substantially differs from the one in IEEE 1609.2 Draft D12 [ + i.2 + ], clause 6.3.3. + +

      +

      + + + 6.4 + + SubjectAttribute + + +

      +

      + struct { +

      +

      + + + SubjectAttributeType + + type; + +

      +

      + + + select(type) { + +

      +

      + + + case verification_key: + +

      +

      + + + case encryption_key: + + + +

      +

      + + + + PublicKey + + + + key; + +

      +

      + + + case reconstruction_value: + +

      +

      + + + + EccPoint + + + + rv; + +

      +

      + + + case assurance_level: + +

      +

      + + + + SubjectAssurance + + assurance_level; + +

      +

      + + + case its_aid_list: + +

      +

      + + + + IntX + + + + + its_aid_list<var>; + +

      +

      + + + case its_aid_ssp_list: + +

      +

      + + + + ItsAidSsp + + + + its_aid_ssp_list<var>; + +

      +

      + + + unknown: + +

      +

      + + + + opaque + + + + + other_attribute<var>; + +

      +

      + + + } + +

      +

      + } SubjectAttribute; +

      +

      +

      + + This structure defines how to encode a subject attribute. These attributes serve the purpose of specifying the technical details of a certificate's subject. Depending on the value of + + type + , the following additional data shall be given: + + +

      +
        +

        +

      • + + verification_key + + and + + encryption_key + + : a public key contained in a + + PublicKey + structure shall be given. + + + + + +
      • +

        +

        +

      • + + reconstruction_value + + : an ECC point contained in a + + EccPoint + + structure shall be given, which may be used for implicit certificates using ECQV [ + i.5 + ]. + + +
      • +

        +

        +

      • + + assurance_level + + : the assurance level for the subject contained in a + + SubjectAssurance + + structure shall be given. + + +
      • +

        +

        +

      • + + its_aid_list + + : ITS-AIDs contained in a variable-length vector of type + + IntX + + shall be given. + + +
      • +

        +

        +

      • + + its_aid_ssp_list + + : ITS-AIDs with associated SSPs contained in a variable-length vector of type + + ItsAidSsp + + shall be given. + + +
      • +

        +

        +

      • + + unknown + + : in all other cases, a variable-length vector containing + + opaque + data shall be given. + + + +
      • +

        +
      +

      + + NOTE: + + This definition is not available in IEEE 1609.2 Draft D12 [ + i.2 + ]. + +

      +

      + + + 6.5 + + SubjectAttributeType + + +

      +

      + enum { +

      +

      + + + verification_key(0), + +

      +

      + + + encryption_key(1), + +

      +

      + + + assurance_level(2), + +

      +

      + + + reconstruction_value(3), + +

      +

      + + + its_aid_list(32), + +

      +

      + + + its_aid_ssp_list(33), + +

      +

      + + + (2^8-1) + +

      +

      + } SubjectAttributeType; +

      +

      +

      + This enumeration lists the possible types of subject attributes. +

      +

      + + NOTE: + + This definition is not available in IEEE 1609.2 Draft D12 [ + i.2 + ]. + +

      +

      + + + 6.6 + + SubjectAssurance + + +

      +

      + + opaque + + SubjectAssurance; + +

      +

      +

      + This field contains the ITS-S's assurance, which denotes the ITS-S's security of both the platform and storage of secret keys as well as the confidence in this assessment. +

      +

      + + This field shall be encoded as defined in table + 5 + , where "A" denotes bit fields specifying an assurance level, "R" reserved bit fields and "C" bit fields specifying the confidence. + +

      +

      + + Table + 5 + : Bitwise encoding of subject assurance + +

      +

      + + + + + + + + + + + + + + + + + + + + + + + + + +
      +

      + Bit number +

      +
      +

      + 7 +

      +
      +

      + 6 +

      +
      +

      + 5 +

      +
      +

      + 4 +

      +
      +

      + 3 +

      +
      +

      + 2 +

      +
      +

      + 1 +

      +
      +

      + 0 +

      +
      +

      + Interpretation +

      +
      +

      + A +

      +
      +

      + A +

      +
      +

      + A +

      +
      +

      + R +

      +
      +

      + R +

      +
      +

      + R +

      +
      +

      + C +

      +
      +

      + C +

      +
      +

      +

      +

      + + In table + 5 + , bit number 0 denotes the least significant bit. Bit 7 to bit 5 denote the ITS-S's assurance levels, bit 4 to bit 2 are reserved for future use and bit 1 and bit 0 denote the confidence. + +

      +

      + The specification of these assurance levels as well as the encoding of the confidence levels is outside the scope of the present document. The default (no assurance) shall be all bits set to 0. +

      +

      + + NOTE 1: + + This definition is not available in IEEE 1609.2 Draft D12 [ + i.2 + ]. + +

      +

      + + NOTE 2: + + A process should be defined how to evaluate each implementation and how to assign a corresponding subject assurance according to the evaluation result(s). However, this process is out of scope of the present document. + +

      +

      + + + 6.7 + + ValidityRestriction + + +

      +

      + struct { +

      +

      + + + ValidityRestrictionType type; + +

      +

      + + + select(type){ + +

      +

      + + + case time_end: + +

      +

      + + + + Time32 + + + + + end_validity; + +

      +

      + + + case time_start_and_end: + +

      +

      + + + + Time32 + + + + + start_validity; + +

      +

      + + + + Time32 + + + + + end_validity; + +

      +

      + + + case time_start_and_duration: + +

      +

      + + + + Time32 + + + + + start_validity; + +

      +

      + + + + Duration + + + + duration; + +

      +

      + + + case region: + +

      +

      + + + + GeographicRegion + + region; + +

      +

      + + + unknown: + +

      +

      + + + + opaque + + + + + data<var>; + +

      +

      + + + } + +

      +

      + } ValidityRestriction; +

      +

      +

      + + This structure defines ways to restrict the validity of a certificate depending on the value of + + type + : + + +

      +
        +

        +

      • + + time_end + + : the expiration date for the associated certificate contained in a + + Time32 + + structure shall be given. + + +
      • +

        +

        +

      • + + time_start_and_end + + : the beginning of the validity contained in a + + Time32 + + structure and the expiration date contained in another + + Time32 + + structure shall be given. + + +
      • +

        +

        +

      • + + time_start_and_duration + + : the beginning of the validity contained in a + + Time32 + + structure and the duration of validity contained in a + + Duration + + structure shall be given. + + +
      • +

        +

        +

      • + + region + + : the region the certificate is valid in contained in a + + GeographicRegion + + structure shall be given. + + +
      • +

        +

        +

      • + + unknown + + : in all other cases, a variable-length vector containing + + opaque + data shall be given. + + + +
      • +

        +
      +

      + + + + A valid certificate shall contain exactly one validity restriction of type + + + time_end + + , + + time_start_and_end + + , or + + time_start_and_duration + + . + + + + + + + +

      +

      + + NOTE: + + This definition is not available in IEEE 1609.2 Draft D12 [ + i.2 + ]. + +

      +

      + + + 6.8 + + ValidityRestrictionType + + +

      +

      + enum { +

      +

      + + + time_end(0), + +

      +

      + + + time_start_and_end(1), + +

      +

      + + + time_start_and_duration(2), + +

      +

      + + + region(3), + +

      +

      + + + (2^8-1) + +

      +

      + } ValidityRestrictionType; +

      +

      +

      + This enumeration lists the possible types of restrictions to a certificate's validity. +

      +

      + + NOTE: + + This definition is not available in IEEE 1609.2 Draft D12 [ + i.2 + ]. + +

      +

      + + + 6.9 + + ItsAidSsp + + +

      +

      + struct { +

      +

      + + + IntX + + + its_aid; + +

      +

      + + + opaque + + + service_specific_permissions<var>; + +

      +

      + + } + ItsAidSsp + ; + +

      +

      +

      + + This structure defines how to encode an ITS-AID with associated Service Specific Permissions (SSP). + + + + service_specific_permissions + + + shall have a maximum length of 31 octets. + The definition of SSPs is out of scope of the present document. + + + +

      +

      + + NOTE: + + This definition is similar to the one in IEEE 1609.2 Draft D12 [ + i.2 + ], clause 6.3.24, but uses different naming, a slightly more flexible encoding of the ITS-AID. + +

      +

      + + + 7 + + Security profiles + + +

      +

      + + + 7.1 + + + + Security profile for CAMs + + + +

      +

      + This clause defines which fields shall be included in the SecuredMessage structure for Cooperative Awareness Messages (CAMs) as well as the scope of application of cryptographic features applied to the header. +

      +

      + + + + These + + + + HeaderField + + + elements shall be included in all CAMs. + + + With the exception of + + + signer_info + + , which is encoded first, all + + header_field + + elements shall be included in ascending order according to the numbering of the enumeration of the according type structure + : + + + + + +

      + + + +

      + + The + + HeaderField + + element + + request_unrecognized_certificate + + shall be included if an ITS-S received CAMs from other ITS-Ss, which the ITS-S has never encountered before and which included only a + + signer_info + + field of type + + certificate_digest_with_sha256 + + instead of a + + signer_info + + HeaderField of type + + certificate + + . In this case, the signature of the received CAMs cannot be verified because the verification key is missing. + + The field + + + digests<var> + + in the structure of + + request_unrecognized_certificate + + shall be filled with a list of + + + + HashedId3 + + + + elements of the missing ITS-S certificates. + + + + + + + + + + + + + + + + + +

      +

      + + NOTE 1: + + + HashedId3 + + elements can be formed by using the least significant three bytes of the corresponding + HashedId8. + +

      +

      + + + None of the possible + + + HeaderField + + cases shall be included more than once + . + + All other + + + HeaderField + + types defined in clause 5 shall not be used + . Future + + HeaderField + + types may be included. + + Any other + + + HeaderField + + types included shall not be used to determine the validity of the message. + + + + + + + + + +

      +

      + + + A + + + + Payload + + + element shall be included for all CAMs. This element shall be of type + + signed + + and contain the CAM payload. + + + +

      +

      + + + These + + + + TrailerField + + + elements shall be included in all CAMs + : + +

      + +
        +

        +

      • + + protocol_version + + . + + +
      • +

        +

        +

      • + + The variable-length vector + + header_fields + + including its length. + + + +
      • +

        +

        +

      • + + The complete + + payload_field + + field. + + + +
      • +

        +

        +

      • + + The length of the variable-length vector + + trailer_fields + + and the type of the + + signature + + trailer field. + + + + + +
      • +

        +
      +

      + + + CAMs shall not be encrypted. + + +

      +

      + + NOTE 2: + + Table + 6 + illustrates which parts of a + + SecuredMessage + are taken into account when generating the signature of a message. + + +

      +

      + + Table + 6 + : Example for the ECDSA signature generation for a SecuredMessage + +

      +

      + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
      +

      + Element +

      +
      +

      + Description +

      +
      +

      + SecuredMessage +

      +
      +

      +

      +

      + + + uint8 protocol_version + +

      +
      +

      + Covered by the signature +

      +
      +

      + + + HeaderField header_fields<var> + +

      +
      +

      + + + + � + +

      +
      +

      + + + Payload payload_fields<var> + +

      +
      +

      + + + + � + +

      +
      +

      + + + TrailerField trailer_fields<var> + +

      +
      +

      + + + + TrailerFieldType type + +

      +
      +

      + + + + + PublicKeyAlgorithm algorithm + +

      +
      +

      + Not covered by the signature +

      +
      +

      + + + + + EcdsaSignature ecdsa_signature + +

      +
      +

      + + + + + + EccPoint R + +

      +
      +

      + + + + + + + EccPointType type + +

      +
      +

      + + + + + + + opaque x[32] + +

      +
      +

      + ECDSA signature (r,s) +

      +
      +

      + + + + + + opaque s[32] + +

      +
      +

      +

      +

      + + + 7.2 + + + Security profile for DENMs + + + +

      +

      + This clause defines which fields shall always be included in the SecuredMessage structure for Decentralized Environmental Notification Messages (DENMs) as well as the scope of application of cryptographic features applied to the header. +

      +

      + + + These + + + + HeaderField + + + elements shall be included in all DENMs. + + With the exception of signer_info, which is encoded first, all + + header_field + + elements shall be included in ascending order according to the numbering of the enumeration of the according type structure: + + +

      + +

      + + + None of the possible + + + HeaderField + + cases shall be included more than once. + + All other + + + HeaderField + + types defined in clause 5 shall not be used. + Future + + HeaderField + + types may be included. + + Any other + + + HeaderField + + types included shall not be used to determine the validity of the message. + + + + + + + + + +

      +

      + + + A + + + + Payload + + + element shall be included for all DENMs. This element shall be of type + + signed + + and contain the DENM payload. + + + +

      +

      + + + These + + + + TrailerField + + + elements shall be included in all DENMs: + +

      + +
        +

        +

      • + + protocol_version + + . + + +
      • +

        +

        +

      • + + The variable-length vector + + header_fields + + including its length. + + + +
      • +

        +

        +

      • + + The complete + + payload_field + + field. + + + +
      • +

        +

        +

      • + + The length of the variable-length vector + + trailer_fields + + and the type of the + + signature + + trailer field. + + + + + +
      • +

        +
      +

      + + + DENMs shall not be encrypted. + + +

      +

      + + + + 7.3 + + + Generic security profile for other signed messages + + +

      +

      + This clause defines which fields shall always be included in the SecuredMessage structure for other signed messages as well as the scope of application of cryptographic features applied to the header. +

      +

      + + + + These + + + + + HeaderField + + + + elements shall be included. + + With the exception of signer_info, which is encoded first, all + + + header_field + + elements shall be included in ascending order according to the numbering of the enumeration of the according type structure + : + + + +

      + +

      + + + + None of the possible + + + HeaderField + + cases shall be included more than once + . + + Additional HeaderField types are allowed. + + + + +

      +

      + + + A + + + + Payload + + + element of type + + signed + + , + + signed_external + + or + + signed_and_encrypted + + shall be included. + + + + + + + +

      +

      + + + These + + + + TrailerField + + + elements shall be included: + +

      + +
        +

        +

      • + + protocol_version + + . + + +
      • +

        +

        +

      • + + The variable-length vector + + header_fields + + including its length. + + + +
      • +

        +

        +

      • + + The complete + + payload_field + + field. If the payload is marked as external, its contents shall be included in the hash as well, at the position where a non-external payload would be. + + + +
      • +

        +

        +

      • + + The length of the variable-length vector + + trailer_fields + + and the type of the + + signature + trailer field. + + + + +
      • +

        +
      +

      + + 7. + 4 + + + Profiles for certificates + + +

      +

      + + + 7.4.1 + + Introduction + + +

      +

      + Clause 7.4 defines which types of variable fields shall always be included in certificates. +

      +

      + + + The + + version + field of a certificate shall be set according to clause 6.1. + +

      +

      + + + + The following + + + SubjectAttribute + + elements shall be included: + + + +

      + +

      + + + + + + Exactly one of the following + + + + + + ValidityRestriction + + + + + fields shall be included: + + +

      +
        +

        +

      • + + + time_end + + + + : this field shall contain the end of validity of the certificate. + + + +
      • +

        +

        +

      • + + + time_start_and_end + + + + : this field shall contain the validity period of the certificate. + + + +
      • +

        +

        +

      • + + + time_start_and_duration + + + + : this field shall contain the validity period of the certificate. + + + +
      • +

        +
      +

      + + The options + time_start_and_end + or + time_start_and_duration + should be preferred. + + + + + If the + + signer_info + is different from + self + , then the validity period defined by + time_end + , + time_start_and_end + or + time_start_and duration + shall be within the validity period of the certificate referenced by the + signer_info + . + + +

      +

      + + + + + + A certificate shall contain a validity restriction of type + + region + , if the certificate referenced by the + signer_info + contains a validity restriction of type + region + . + + + + + + Every certificate with a validity restriction of type + + region + shall contain a region that is covered by the certificate referenced by the + signer_info + . + + + + + + For the field + + + + + signer_info + + + + , exactly one of the following types shall be included: + + + + +

      +
        +

        +

      • + + + certificate_digest_with_sha256 + + +
      • +

        +

        +

      • + + + certificate_digest_with_other_algorithm + + +
      • +

        +

        +

      • + + + self + + +
      • +

        +
      +

      + Apart from these fields, certificate contents may be extended depending on the purpose of the certificate. +

      +

      + + + All certificates shall contain a + Signature + field + + + containing a signature calculated over these fields of the + + + Certificate + + data structure: + + + + + + +

      + +
        +

        +

      • + + + The + + version + + + + +
      • +

        +

        +

      • + + + The + + signer_info + + + + + + + + +
      • +

        +

        +

      • + + + The + + subject_info + + + + +
      • +

        +

        +

      • + + + The + + subject_attributes + + vector including its length + + + + + + +
      • +

        +

        +

      • + + + The + + validity_restrictions + + vector including its length + + + +
      • +

        +
      +

      + + Every certificate containing an + + its_aid_list + + or + + its_aid_ssp_list + + subject attribute shall contain a subset of the permissions that are contained in the certificate referenced by the + + signer_info + + . An + + its_aid + + in an + + its_aid_list + + shall be interpreted as containing a superset of all possible service specific permissions of this + + its_aid + . + + + + + + + + + + + + +

      +

      + + + 7.4.2 + + + + Authorization tickets (pseudonymous certificates) + + + +

      +

      + + This clause defines additional aspects of authorization tickets (i.e. pseudonymous certificates) as defined in ETSI TS 102 940 [ + 6 + ]. + +

      +

      + + + + For the field + + + signer_info + + , exactly one of the following types shall be included: + + + +

      +
        +

        +

      • + + certificate_digest_with_sha256 + . + +
      • +

        +
      +

      + + The + + SubjectInfo + + field of the authorization ticket shall be set to these values: + +

      + +

      + + + + These + SubjectAttribute + elements shall be included in addition to those specified in clause + 7.4.1 + for all certificates: + + +

      + +

      + + + + As + + ValidityRestriction + + field restricting the time of validity, + time_start_and_end + shall be included. + + +

      +

      + + + 7.4.3 + + Enrolment credential (long-term certificates) + + +

      +

      + + This clause defines additional aspects of enrolment credentials (i.e. long-term certificates) as defined in ETSI TS 102 940 [ + 6 + ]. + +

      +

      + + For the field + + signer_info + , exactly one of the following types shall be included: + + +

      +
        +

        +

      • + certificate_digest_with_sha256. +
      • +

        +
      +

      + + In the + + SubjectInfo + + field of the enrolment credential, + + subject_type + + shall be set to + + enrollment_credential(0 + ). + + + + +

      +

      + + These + + SubjectAttribute + + elements shall be included in addition to those specified in clause + 7. + 4.1 for all certificates: + + + +

      +
        +

        +

      • + + its_aid_ssp_list + + : this field shall contain a list of ITS-AIDs with associated Service Specific Permissions (SSP). For each ITS-AID only one + + ItsAidSsp + shall be used. + + + +
      • +

        +
      +

      + + As + + ValidityRestriction + + field restricting the time of validity, + + time_start_and_end + shall be included. + + +

      +

      + + NOTE: + + The + + its_aid_ssp_list + is used for enrolment credentials to enforce that an ITS-S cannot expand its own service specific permissions in authorization tickets through manipulation of requests to the CA. + + +

      +

      + + + 7.4.4 + + + + Certificate authority certificates + + + +

      +

      + This clause defines additional aspects of certificate authority certificates. +

      +

      + + The following + + SignerInfo + + fields shall be included: + +

      + +

      + + In the + + SubjectInfo + + field of the CA certificate, + + subject_type + shall be set to one of these types: + + +

      + +

      + + + + These + + + SubjectAttribute + + elements shall be included in addition to those specified in clause + + 7. + + 4.1 for authorization authority and enrolment authority certificates + : + + + +

      + +

      + + + + As + + ValidityRestriction + + field restricting the time of validity, + time_start_and_end + shall be included. + + +

      +

      + + NOTE: + + The authorization and enrolment authority certificates contain an + + its_aid_list + , because a CA should not be able to create certificates for ITS stations containing ITS-AIDs that the CA was not authorized to by the root CA. + + +

      +

      + ? +

      + + + + Annex A (informative): +
      + Data structure examples +
      +
      +
      +

      + + + A.1 + + Example security envelope structure for CAM + + +

      +

      + + The following structure shown in table + A.1 + is an example security header for a CAM message. The header transports the generation time, identifies the payload as signed, and includes the hash of a certificate, that is, no full certificate is included in this case. Finally, an ECDSA NIST P-256 based signature is attached. + +

      +

      + + Table + A. + : An example signed header for CAM + +

      +

      + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
      +

      + Element +

      +
      +

      + Value +

      +
      +

      + Description +

      +
      +

      + Length in octets +

      +
      +

      + SecuredMessage +

      +
      +

      +

      +

      +

      +

      +

      +

      + + + uint8 protocol_version + +

      +
      +

      + 0x02 +

      +
      +

      +

      +

      + 1 +

      +
      +

      + + + HeaderField header_fields<var> + +

      +
      +

      + 0x15 +

      +
      +

      + length: 21 octets +

      +
      +

      + 1 +

      +
      +

      + + + + HeaderFieldType type + +

      +
      +

      + 0x80 +

      +
      +

      + signer_info +

      +
      +

      + 1 +

      +
      +

      + + + + + SignerInfoType signer_info + +

      +
      +

      + 0x01 +

      +
      +

      + certificate_digest_with_sha256 +

      +
      +

      + 1 +

      +
      +

      + + + + + HashedId8 digest + +

      +
      +

      + [�] +

      +
      +

      +

      +

      + 8 +

      +
      +

      + + + + HeaderFieldType type + +

      +
      +

      + 0x00 +

      +
      +

      + generation_time +

      +
      +

      + 1 +

      +
      +

      + + + + Time64 generation_time + +

      +
      +

      + [�] +

      +
      +

      +

      +

      + 8 +

      +
      +

      + + + + HeaderFieldType type + +

      +
      +

      + 0x05 +

      +
      +

      + its_aid +

      +
      +

      + 1 +

      +
      +

      + + + + IntX its_aid + +

      +
      +

      + [�] +

      +
      +

      + ITS-AID for CAM +

      +
      +

      + 1 +

      +
      +

      + + + Payload payload_field + +

      +
      +

      +

      +

      + payload +

      +
      +

      +

      +

      + + + + PaylodType payload_type + +

      +
      +

      + 0x01 +

      +
      +

      + signed +

      +
      +

      + 1 +

      +
      +

      + + + + opaque data<var> + +

      +
      +

      + 0x00 +

      +
      +

      + length: 0 octets +

      +
      +

      + 1 +

      +
      +

      + + + + + [raw payload data] + +

      +
      +

      +

      +

      +

      +

      + 0 +

      +
      +

      + + + TrailerField trailer_fields<var> + +

      +
      +

      + 0x43 +

      +
      +

      + length: 67 octets +

      +
      +

      + 1 +

      +
      +

      + + + + TrailerFieldType type + +

      +
      +

      + 0x01 +

      +
      +

      + signature +

      +
      +

      + 1 +

      +
      +

      + + + + + PublicKeyAlgorithm algorithm + +

      +
      +

      + 0x00 +

      +
      +

      + ecdsa_nistp256_with_sha_256 +

      +
      +

      + 1 +

      +
      +

      + + + + + EcdsaSignature ecdsa_signature + +

      +
      +

      +

      +

      +

      +

      +

      +

      + + + + + + EccPoint R + +

      +
      +

      +

      +

      +

      +

      +

      +

      + + + + + + + EccPointType type + +

      +
      +

      + 0x00 +

      +
      +

      + x_coordinate_only +

      +
      +

      + 1 +

      +
      +

      + + + + + + + opaque x[32] + +

      +
      +

      + [�] +

      +
      +

      +

      +

      + 32 +

      +
      +

      + + + + + + opaque s[32] + +

      +
      +

      + [�] +

      +
      +

      +

      +

      + 32 +

      +
      +

      + The total size of the security header structure is 93 octets. +

      +
      +

      +

      +

      + + + A.2 + + Example structure of a certificate + + +

      +

      + + The following structure shown in table + A.2 + is an example of a certificate. + +

      +

      + + Table + A. + : An example structure of a certificate + +

      +

      + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
      +

      + Element +

      +
      +

      + Value +

      +
      +

      + Description +

      +
      +

      + Length in octets +

      +
      +

      + Certificate +

      +
      +

      +

      +

      +

      +

      +

      +

      + + + uint8 version + +

      +
      +

      + 0x02 +

      +
      +

      +

      +

      + 1 +

      +
      +

      + + + Signe + + rInfo si + gner_info + + +

      +
      +

      +

      +

      +

      +

      +

      +

      + + + + SignerInfoType type + +

      +
      +

      + 0x01 +

      +
      +

      + certificate_digest_with_sha256 +

      +
      +

      + 1 +

      +
      +

      + + + + HashedId8 digest + +

      +
      +

      + [�] +

      +
      +

      +

      +

      + 8 +

      +
      +

      + + + SubjectInfo subject_info + +

      +
      +

      +

      +

      +

      +

      +

      +

      + + + + SubjectType type + +

      +
      +

      + 0x01 +

      +
      +

      + authorization_ticket +

      +
      +

      + 1 +

      +
      +

      + + + + opaque subject_name<var> + +

      +
      +

      + 0x00 +

      +
      +

      + + length: 0 + + ( + no name + + +

      +
      +

      + 1 +

      +
      +

      + + + + + [subject name] + +

      +
      +

      +

      +

      +

      +

      + 0 +

      +
      +

      + + + SubjectAttribute subject_attributes<var> + +

      +
      +

      + 0x2b +

      +
      +

      + length: 43 +

      +
      +

      + 1 +

      +
      +

      + + + + SubjectAttributeType type + +

      +
      +

      + 0x00 +

      +
      +

      + verification_key +

      +
      +

      + 1 +

      +
      +

      + + + + PublicKey key + +

      +
      +

      +

      +

      +

      +

      +

      +

      + + + + + PublicKeyAlgorithm algorithm + +

      +
      +

      + 0x00 +

      +
      +

      + ecdsa_nistp256_with_sha256 +

      +
      +

      + 1 +

      +
      +

      + + + + + EccPoint public_key + +

      +
      +

      +

      +

      +

      +

      +

      +

      + + + + + + EccPointType type + +

      +
      +

      + 0x02 +

      +
      +

      + compressed_lsb_y_0 +

      +
      +

      + 1 +

      +
      +

      + + + + + + opaque x[32] + +

      +
      +

      + [�] +

      +
      +

      +

      +

      + 32 +

      +
      +

      + + + + SubjectAttributeType type + +

      +
      +

      + 0x02 +

      +
      +

      + assurance_level +

      +
      +

      + 1 +

      +
      +

      + + + + SubjectAssurance assurance_level + +

      +
      +

      + 0x83 +

      +
      +

      + level_4_confidence_3 +

      +
      +

      + 1 +

      +
      +

      + + + + SubjectAttributeType type + +

      +
      +

      + 0x33 +

      +
      +

      + its_aid_ssp_list +

      +
      +

      + 1 +

      +
      +

      + + + + + ItsAidSsp its_aid_ssp_list<var> + +

      +
      +

      + 0x04 +

      +
      +

      + length: 4 octets +

      +
      +

      + 1 +

      +
      +

      + + + + + + IntX its_aid + +

      +
      +

      + [�] +

      +
      +

      +

      +

      + 1 +

      +
      +

      + + + + + + opaque service_specific_permissions<var> + +

      +
      +

      + 0x02 +

      +
      +

      + length: 2 octets +

      +
      +

      + 1 +

      +
      +

      + + + + + + + [service specific permissions] + +

      +
      +

      + [�] +

      +
      +

      +

      +

      + 2 +

      +
      +

      + + + ValidityRestriction validity_restrictions<var> + +

      +
      +

      + 0x09 +

      +
      +

      + length: 9 octets +

      +
      +

      + 1 +

      +
      +

      + + + + ValidityRestrictionType type + +

      +
      +

      + 0x01 +

      +
      +

      + time_start_and_end +

      +
      +

      + 1 +

      +
      +

      + + + + Time32 start_validity + +

      +
      +

      + [�] +

      +
      +

      +

      +

      + 4 +

      +
      +

      + + + + Time32 end_validity + +

      +
      +

      + [�] +

      +
      +

      +

      +

      + 4 +

      +
      +

      + + + Signature signature + +

      +
      +

      +

      +

      +

      +

      +

      +

      + + + + PublicKeyAlgorithm algorithm + +

      +
      +

      + 0x00 +

      +
      +

      + ecdsa_nistp256_with_sha256 +

      +
      +

      + 1 +

      +
      +

      + + + + EcdsaSignature ecdsa_signature + +

      +
      +

      +

      +

      +

      +

      +

      +

      + + + + + EccPoint R + +

      +
      +

      +

      +

      +

      +

      +

      +

      + + + + + + EccPointType type + +

      +
      +

      + 0x00 +

      +
      +

      + x_coordinate_only +

      +
      +

      + 1 +

      +
      +

      + + + + + + opaque x[32] + +

      +
      +

      + [�] +

      +
      +

      +

      +

      + 32 +

      +
      +

      + + + + + opaque s[32] + +

      +
      +

      + [�] +

      +
      +

      +

      +

      + 32 +

      +
      +

      + The total size of this certificate is 132 octets. +

      +
      +

      +

      +

      + ? +

      + + + + Annex B (informative): +
      + Usage of ITS-AID and SSPs +
      +
      +
      +

      + An incoming secured message should only be accepted by the receiver if the payload of the secured message is consistent with the ITS-AID and SSP in the certificate. This consistency should be checked in two ways: +

      +
        +

        +

      1. + + Within the security processing, the ITS-AID in the certificate can be checked for consistency with the + + its_aid + field in the SecuredMessage format. + + +
      2. +

        +

        +

      3. + At the point at which the data is processed (which may be in the receiving facilities layer or in the receiving application layer), the data can be checked for consistency with the ITS-AID and the SSP from the certificate. Architecturally, this check is carried out by the processing entity that processes the data payload of the SecuredMessage, not by the security processing services. This is because the security processing services cannot and should not be expected to be able to parse the data of all possible different applications and facilities. Thus, a full definition of a data exchange for applications or facilities that use signed messages should include a specification of the ITS-AID, a specification of the SSP, and a definition of what it means for the data itself to be consistent with the ITS-AID and SSP. +
      4. +

        +
      +

      + The use of ITS-AID and SSP therefore includes the following steps: +

      +
        +

        +

      1. + At the design stage, the group defining a given data exchange determines whether the exchanges are to be signed with ETSI TS 103 097 certificates. If they are, the group reserves an ITS-AID and defines an SSP. +
      2. +

        +

        +

      3. + When an ITS-Station is initialized with the ability to carry out a data exchange, it requests certificates with the appropriate ITS-AID and SSP. +
      4. +

        +

        +

      5. + An Authorization Authority determines whether the ITS-Station is entitled to that ITS-AID and SSP, using methods outside the scope of the present document to make that determination. It issues the certificates to the ITS-S. +
      6. +

        +

        +

      7. + The sending ITS-Station generates a message that is consistent with the ITS-AID and SSP, and uses the private key corresponding to the certificate to sign that message. +
      8. +

        +

        +

      9. + On the receiving side, the security processing checks that the message was correctly cryptographically signed, is not a replay (if appropriate), etc. +
      10. +

        +

        +

      11. + On the receiving side, the data processing entity (which may be an application or the facilities layer) uses the ITS-AID and SSP from the certificate to check that the data is consistent with those permissions. This means that the ITS-AID and SSP should be made available to the data processing entity, for example by passing them across an interface from the security processing, or by passing the entire certificate and letting the data processing entity extract the ITS-AID and SSP from the certificate, or by some other means. +
      12. +

        +
      +

      + + NOTE 1: + + The ITS-AID and SSP are contained in the certificate, which is cryptographically authenticated and authorized by the Authorization Authority. Because of this cryptographic authentication, it is impossible for the certificate holder to change their permissions without causing cryptographic authentication to fail. + +

      +

      + + NOTE 2: + + The ETSI TS 103 097 certificate format allows a certificate to contain multiple (ITS-AID, SSP) pairs. In this case, the receiving side processing is expected to know which ITS-AID is to be used in conjunction with an incoming message. + +

      +

      + One way to make the concept of SSP future proof is to add the version number of the corresponding facility to the SSP. +

      +

      + The interpretation of the SSP is specific for each facility. One possible way to implement it is to use a bit map to define which permissions a sender is authorized to use. +

      +

      + The bit value "1" then means that the sender is authorized to use the corresponding feature and consequently the bit value "0" means that the sender is not authorized to use it. +

      +

      + ? +

      +

      + + History + +

      +

      + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
      +

      + Document history +

      +
      +

      + V1.1.1 +

      +
      +

      + April 2013 +

      +
      +

      + Publication +

      +
      +

      + + V1.2 + + . + 1 + + +

      +
      +

      + June 2015 +

      +
      +

      + Publication +

      +
      +

      +

      +

      +

      +

      +

      +

      +

      +

      +

      +

      +

      +

      +

      +

      +

      +

      +

      +

      +

      + image1.jpg + + \ No newline at end of file diff --git a/requality/TS103096/root/Reports/TPs.json b/requality/TS103096/root/Reports/TPs.json new file mode 100644 index 0000000000000000000000000000000000000000..19061c4b8b054781503098f9dd70db33031c69d0 --- /dev/null +++ b/requality/TS103096/root/Reports/TPs.json @@ -0,0 +1,10 @@ +{ + "attributes": {"_type": { + "isGenerated": false, + "key": "_type", + "origin": "891254f1-584d-43a1-a725-a2321671c07c", + "type": "STRING", + "value": "ReportFolder" + }}, + "uuid": "891254f1-584d-43a1-a725-a2321671c07c" +} \ No newline at end of file diff --git a/requality/TS103096/root/Reports/TestPurposes.json b/requality/TS103096/root/Reports/TPs/TestPurposes.json similarity index 51% rename from requality/TS103096/root/Reports/TestPurposes.json rename to requality/TS103096/root/Reports/TPs/TestPurposes.json index 6074e47deeb31b8639a1a621bb50fae52982d15f..2df624a359e7ab1bafb153c7a1af1a4746989182 100644 --- a/requality/TS103096/root/Reports/TestPurposes.json +++ b/requality/TS103096/root/Reports/TPs/TestPurposes.json @@ -1,40 +1,40 @@ { "attributes": { - "_last_generated": { - "isGenerated": false, - "key": "_last_generated", - "origin": "a17a750b-5fb2-40fa-a3df-b729a483b9fb", - "type": "STRING", - "value": "\\tps.html" - }, "_root_requiremnt_qid": { "isGenerated": false, "key": "_root_requiremnt_qid", - "origin": "a17a750b-5fb2-40fa-a3df-b729a483b9fb", + "origin": "93b1afa4-7003-4bd8-bd45-ea23bb30d129", "type": "STRING", "value": "/Requirements/SEC_ITSS" }, "_template_id": { "isGenerated": false, "key": "_template_id", - "origin": "a17a750b-5fb2-40fa-a3df-b729a483b9fb", + "origin": "93b1afa4-7003-4bd8-bd45-ea23bb30d129", "type": "STRING", "value": "com.unitesk.requality.reports.tps" }, "_type": { "isGenerated": false, "key": "_type", - "origin": "a17a750b-5fb2-40fa-a3df-b729a483b9fb", + "origin": "93b1afa4-7003-4bd8-bd45-ea23bb30d129", "type": "STRING", - "value": "ReportData" + "value": "ReportSettings" + }, + "startLevel": { + "isGenerated": false, + "key": "startLevel", + "origin": "93b1afa4-7003-4bd8-bd45-ea23bb30d129", + "type": "INT", + "value": "1" }, - "date": { + "startPrefix": { "isGenerated": false, - "key": "date", - "origin": "a17a750b-5fb2-40fa-a3df-b729a483b9fb", + "key": "startPrefix", + "origin": "93b1afa4-7003-4bd8-bd45-ea23bb30d129", "type": "STRING", - "value": "Mon Apr 27 18:11:44 CEST 2015" + "value": "5" } }, - "uuid": "a17a750b-5fb2-40fa-a3df-b729a483b9fb" + "uuid": "93b1afa4-7003-4bd8-bd45-ea23bb30d129" } \ No newline at end of file diff --git a/requality/TS103096/root/Requirements.json b/requality/TS103096/root/Requirements.json index cd173e5fbf4cf05f276339201a38569d12037887..015131ac6cc15c68b3c68fc3ff96730499c43ef8 100644 --- a/requality/TS103096/root/Requirements.json +++ b/requality/TS103096/root/Requirements.json @@ -1,12 +1,20 @@ { "attributes": { "_generators": { + "elements_type": "STRING", "isGenerated": false, "key": "_generators", "origin": "d2db3776-99f5-4120-a973-733f17032df1", "type": "LIST", "value": [] }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "d2db3776-99f5-4120-a973-733f17032df1", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS.json b/requality/TS103096/root/Requirements/SEC_ITSS.json index 61be3f2dc7d05709b44e7135983987eed76e21cb..978f4cd5d13aa5fc61759234efa3ff692fc8827e 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS.json @@ -14,6 +14,13 @@ "type": "STRING", "value": "ITS-S Security" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "6ba5c537-fff0-4c40-ae46-6c2cb8868cbc", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/01.json b/requality/TS103096/root/Requirements/SEC_ITSS/01.json new file mode 100644 index 0000000000000000000000000000000000000000..4cb9d0bf21be195aa51e6bcf00a67337c94bcd30 --- /dev/null +++ b/requality/TS103096/root/Requirements/SEC_ITSS/01.json @@ -0,0 +1,19 @@ +{ + "attributes": { + "_name": { + "isGenerated": false, + "key": "_name", + "origin": "3d5b13ba-1f24-41f0-8597-0d42d1a5db45", + "type": "STRING", + "value": "1. Owerview" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "3d5b13ba-1f24-41f0-8597-0d42d1a5db45", + "type": "STRING", + "value": "Requirement" + } + }, + "uuid": "3d5b13ba-1f24-41f0-8597-0d42d1a5db45" +} \ No newline at end of file diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV.json index aa75de98f7afd8063ce44ff7ab4d6c048bfa5fdd..2093ef863aff01328c999c00091ef812e07cb27c 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV.json @@ -5,7 +5,14 @@ "key": "_name", "origin": "93dc7631-4d29-4fc9-85a9-677a400a69ca", "type": "STRING", - "value": "2. Receiver Behavior" + "value": "3. Receiver behaviour" + }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "93dc7631-4d29-4fc9-85a9-677a400a69ca", + "type": "STRING", + "value": "FAILED" }, "_type": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM.json index b733beaa1b98b880e0d9b32dc570afaf07c9fd93..4c2aaf786a85f77d5636f8957682d4e09cc03238 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM.json @@ -1,11 +1,15 @@ { "attributes": { "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "a88198eb-4c31-4982-bb36-15fd8a07ac1c", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/2adf210a-7c7b-4225-a0ed-f5a25b1b430d"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/2adf210a-7c7b-4225-a0ed-f5a25b1b430d", + "/Documents/ts_103097v010201p.xhtml/e1308a28-bfa6-40e1-b39e-f1b64d00509d" + ] }, "_name": { "isGenerated": false, @@ -14,6 +18,13 @@ "type": "STRING", "value": "CAM Profile" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "a88198eb-4c31-4982-bb36-15fd8a07ac1c", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_01.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_01.json index fbb0ba3de67ce2583dec35873a2362799dd563af..3df9cc9764b0ec589a5fc1d55b44455c7ed89547 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_01.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_01.json @@ -1,11 +1,15 @@ { "attributes": { "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "52e12556-2217-4781-bf6b-2cb11c7e1578", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/2adf210a-7c7b-4225-a0ed-f5a25b1b430d"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/2adf210a-7c7b-4225-a0ed-f5a25b1b430d", + "/Documents/ts_103097v010201p.xhtml/e1308a28-bfa6-40e1-b39e-f1b64d00509d" + ] }, "_name": { "isGenerated": false, @@ -14,6 +18,13 @@ "type": "STRING", "value": "01. Check that IUT accepts well-formed Secured CAM" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "52e12556-2217-4781-bf6b-2cb11c7e1578", + "type": "STRING", + "value": "COMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_02.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_02.json index 0ed0932e54a9f4158c3c095bb91c55958c8ba056..67e28c6edc1a0fe5b852c497648fd3a15e347334 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_02.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_02.json @@ -8,11 +8,15 @@ "value": "Check that ITS-S discards a Secured CAM containing protocol version unequal to 2" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "061fcc4d-d166-4b69-9041-d7271b83c4cc", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/da6b3098-07d5-49aa-876f-6ae437a945ef"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/da6b3098-07d5-49aa-876f-6ae437a945ef", + "/Documents/ts_103097v010201p.xhtml/58ea9176-dfab-4645-a9a2-855e9d5d57dc" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "02. Check the message protocol version" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "061fcc4d-d166-4b69-9041-d7271b83c4cc", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_02/TP_SEC_ITSS_RCV_CAM_02_01_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_02/TP_SEC_ITSS_RCV_CAM_02_01_BO.json index 1b9666ba5ce204a1354a4280b21c8a8b3a7b9c4d..7204829609025f49087511e1694f86d59f1e3fad 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_02/TP_SEC_ITSS_RCV_CAM_02_01_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_02/TP_SEC_ITSS_RCV_CAM_02_01_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "00f9005c-5714-459d-95d5-0fbcfceb7bd0", "type": "STRING", - "value": "Check that IUT discards a Secured CAM containing protocol version set to a value less then 2" + "value": "Check that IUT discards a Secured CAM containing protocol version set to a value less than 2" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_02/TP_SEC_ITSS_RCV_CAM_02_02_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_02/TP_SEC_ITSS_RCV_CAM_02_02_BO.json index efb06f9d57f10a186f240c36728f0f9ff3e1a8ed..190c2b460f72ae8d8c14b94ff0df6f7124717daf 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_02/TP_SEC_ITSS_RCV_CAM_02_02_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_02/TP_SEC_ITSS_RCV_CAM_02_02_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "d5eae6f9-4530-43de-8b92-6d4982cdcc22", "type": "STRING", - "value": "Check that IUT discards a Secured CAM containing protocol version set to a value greater then 2" + "value": "Check that IUT discards a Secured CAM containing protocol version set to a value greater than 2" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04.json index bc1522af0bb2457f54beea1fd65d50877957a701..27aae92ee320cb208006629de0d8f89d64e15bb3 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04.json @@ -8,13 +8,16 @@ "value": "Check that the IUT discards Secured CAM containing wrong elements of the header fields\r\nCheck that optinal header fields are allowed" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "86c7a2a5-a614-4062-8ea8-a5370f5cfcb2", "type": "LIST", "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/c7afae7a-c9c2-4459-972d-33da342b7baf", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/e3771490-69a8-4c5b-bc32-154f8b145f6a" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/e3771490-69a8-4c5b-bc32-154f8b145f6a", + "/Documents/ts_103097v010201p.xhtml/0bf26c42-7a43-4f6b-8bbf-3f61249999e4", + "/Documents/ts_103097v010201p.xhtml/07ea39bb-bbcf-444f-aa00-f63bdaabc1e1" ] }, "_name": { @@ -24,6 +27,13 @@ "type": "STRING", "value": "04. Check header fields" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "86c7a2a5-a614-4062-8ea8-a5370f5cfcb2", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_03_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_03_BO.json index ca7c5361174f034a088f56d49f99bf8e54ec2a5f..fb83412160bb6f731ccfda8f772473f6750a7dd4 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_03_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_03_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "229eec91-d0e4-4bdb-82d6-14644c573fbb", "type": "STRING", - "value": "Check that IUT is able to receive a secured CAM if the signer_info header field is not encoded first.\r\n" + "value": "Check that IUT is able to receive a secured CAM if the signer_info header field is not encoded first\r\n" }, "_expectedResults": { "isGenerated": false, @@ -22,6 +22,7 @@ "value": "with { \r\n\tthe IUT being in the 'authorized' state\r\n\tthe IUT is sending CAMs\r\n} \r\nensure that { \r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage (CAM) {\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tand containing header_fields[1].type\r\n\t\t\t\tindicating 'generation_time'\r\n\t\t\tand containing header_fields[2].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tand containing header_fields[3] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_CAM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT keeps sending CAMs\r\n\t}\r\n}\r\n" }, "_generators": { + "elements_type": "STRING", "isGenerated": false, "key": "_generators", "origin": "229eec91-d0e4-4bdb-82d6-14644c573fbb", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_05_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_05_BO.json index 9ec2abae645d54d31309a6823e7326f16aae4ec6..71bd4d83f92e62bb9182ceec3bd2bb609c3e6419 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_05_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_05_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "e0c8271c-e7b9-4b97-b565-3854f4d624eb", "type": "STRING", "value": "bissmeye" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "e0c8271c-e7b9-4b97-b565-3854f4d624eb", "type": "STRING", - "value": "Check that IUT discards a secured CAM if the header_fields doesn't contain the element of header field of type: generation_time" + "value": "Check that IUT discards a secured CAM if the header_fields does not contain the element of header field of type: generation_time" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "e0c8271c-e7b9-4b97-b565-3854f4d624eb", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (CAM)\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tand containing header_fields[1] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_CAM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "e0c8271c-e7b9-4b97-b565-3854f4d624eb", "type": "STRING", "value": "in process" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "e0c8271c-e7b9-4b97-b565-3854f4d624eb", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_06_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_06_BO.json index f37e851965fa75ae79ceac8228de6c459d29b4ed..12524f60ac143abc3db011862847887a81f5128f 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_06_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_06_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "08345dd8-5633-408b-bbcc-c1f415fc0085", "type": "STRING", "value": "bissmeye" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "08345dd8-5633-408b-bbcc-c1f415fc0085", "type": "STRING", - "value": "Check that IUT discards a secured CAM if the header_fields contain more than one element of header field of type: its_aid" + "value": "Check that IUT discards a secured CAM if the header_fields contain more than one element of header field of type its_aid" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "08345dd8-5633-408b-bbcc-c1f415fc0085", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (CAM)\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tand containing header_fields[1].type\r\n\t\t\t\tindicating 'generation_time'\r\n\t\t\tand containing header_fields[2] {\r\n\t\t\t\tcontainint type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontainint its_aid\r\n\t\t\t\t\tindicating 'AID_CAM'\r\n\t\t\t}\r\n\t\t\tand containing header_fields[3] {\r\n\t\t\t\tcontainint type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontainint its_aid\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (CAM)\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tand containing header_fields[1].type\r\n\t\t\t\tindicating 'generation_time'\r\n\t\t\tand containing header_fields[2] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_CAM'\r\n\t\t\t}\r\n\t\t\tand containing header_fields[3] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "08345dd8-5633-408b-bbcc-c1f415fc0085", "type": "STRING", "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "08345dd8-5633-408b-bbcc-c1f415fc0085", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_08_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_08_BO.json index 783442ccbb385d2bfb4c7d82c31bcd53fa2a4f4a..869d4a99b113db9bb1c8281062ba3f12a6d4743e 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_08_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_08_BO.json @@ -19,7 +19,7 @@ "key": "_expectedResults", "origin": "7bfe3fb5-15f2-4a23-b934-ae5226fb2094", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (CAM)\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tcontaining header_fields[1]{\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 inside the validity period of the signer certificate\r\n\t\t\t}\r\n\t\t\tcontaining header_fields[2] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time_with_standard_deviation'\r\n\t\t\t\tcontaining generation_time_with_standard_deviation\r\n\t\t\t\t\tindicating TIME_2 outside the validity period of the signer certificate\r\n\t\t\t}\r\n\t\t\tand containing header_fields[3] {\r\n\t\t\t\tcontainint type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontainint its_aid\r\n\t\t\t\t\tindicating 'AID_CAM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (CAM)\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tcontaining header_fields[1]{\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 inside the validity period of the signer certificate\r\n\t\t\t}\r\n\t\t\tcontaining header_fields[2] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time_with_standard_deviation'\r\n\t\t\t\tcontaining generation_time_with_standard_deviation\r\n\t\t\t\t\tindicating TIME_2 outside the validity period of the signer certificate\r\n\t\t\t}\r\n\t\t\tand containing header_fields[3] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_CAM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" }, "_status": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_09_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_09_BO.json index 6557f79ce465674b965a51c9cd718ff00bb953cf..f7feb2c3788a17e0d27db9f9b953482b080c267e 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_09_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_09_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "3a088ef7-c52a-4347-83b9-442d927fceaa", "type": "STRING", "value": "bissmeye" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "3a088ef7-c52a-4347-83b9-442d927fceaa", "type": "STRING", "value": "Check that IUT ignores the HeaderFields generation_time_standard_deviation of received Secured CAM" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "3a088ef7-c52a-4347-83b9-442d927fceaa", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (CAM)\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tcontaining header_fields[1]{\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 outside the validity period of the signer certificate\r\n\t\t\t}\r\n\t\t\tcontaining header_fields[2] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time_with_standard_deviation'\r\n\t\t\t\tcontaining generation_time_with_standard_deviation\r\n\t\t\t\t\tindicating TIME_2 inside the validity period of the signer certificate\r\n\t\t\t}\r\n\t\t\tand containing header_fields[3] {\r\n\t\t\t\tcontainint type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontainint its_aid\r\n\t\t\t\t\tindicating 'AID_CAM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (CAM)\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tcontaining header_fields[1]{\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 outside the validity period of the signer certificate\r\n\t\t\t}\r\n\t\t\tcontaining header_fields[2] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time_with_standard_deviation'\r\n\t\t\t\tcontaining generation_time_with_standard_deviation\r\n\t\t\t\t\tindicating TIME_2 inside the validity period of the signer certificate\r\n\t\t\t}\r\n\t\t\tand containing header_fields[3] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_CAM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "3a088ef7-c52a-4347-83b9-442d927fceaa", "type": "STRING", "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "3a088ef7-c52a-4347-83b9-442d927fceaa", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_10_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_10_BO.json index bb846ab2b374f1e2fc3c5d4d7e4db28cedb133e2..9af124ab9c8466f8081efa87dc16b98cf23ab527 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_10_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_10_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "9db3064d-4914-4492-b7ac-4cfe8594c30c", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "9db3064d-4914-4492-b7ac-4cfe8594c30c", "type": "STRING", "value": "Check that IUT ignores the HeaderFields expiry_time of received Secured CAM" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "9db3064d-4914-4492-b7ac-4cfe8594c30c", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (CAM)\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tcontaining header_fields[1]{\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 ( TIME_1 < CURRENT_TIME - 1min )\r\n\t\t\t}\r\n\t\t\tcontaining header_fields[2] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'expiration'\r\n\t\t\t\tcontaining expiry_time\r\n\t\t\t\t\tindicating TIME_2 (TIME_1 < TIME_2 < CURRENT_TIME)\r\n\t\t\t}\r\n\t\t\tand containing header_fields[3] {\r\n\t\t\t\tcontainint type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontainint its_aid\r\n\t\t\t\t\tindicating 'AID_CAM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t} then {\r\n\t\tthe IUT accepts a SecuredMessage\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (CAM)\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tcontaining header_fields[1]{\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 ( TIME_1 < CURRENT_TIME - 1min )\r\n\t\t\t}\r\n\t\t\tcontaining header_fields[2] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'expiration'\r\n\t\t\t\tcontaining expiry_time\r\n\t\t\t\t\tindicating TIME_2 (TIME_1 < TIME_2 < CURRENT_TIME)\r\n\t\t\t}\r\n\t\t\tand containing header_fields[3] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_CAM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t} then {\r\n\t\tthe IUT accepts a SecuredMessage\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "9db3064d-4914-4492-b7ac-4cfe8594c30c", "type": "STRING", "value": "in process" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "9db3064d-4914-4492-b7ac-4cfe8594c30c", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_11_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_11_BO.json index 89b923176ea5bf540b4f310e6af9fb3d219fa40f..f619fd447be069f27ea3e1e7996b0dc938f4d066 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_11_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_11_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "005d34eb-77e7-4904-9c9c-56a715ecef95", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "005d34eb-77e7-4904-9c9c-56a715ecef95", "type": "STRING", "value": "Check that IUT ignores the HeaderFields generation_location of received Secured CAM" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "005d34eb-77e7-4904-9c9c-56a715ecef95", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (CAM)\r\n\t\t\tcontaining header_fields[0]\t{\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'signer_info'\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating certificate\r\n\t\t\t\t\tcontainig certificate\r\n\t\t\t\t\t\tindicating CERT_TS_AT_B\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t\tand containing header_fields[1].type\r\n\t\t\t\tindicating 'generation_time'\r\n\t\t\tand containing header_fields[2] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_location'\r\n\t\t\t\tcontaining generation_location\r\n\t\t\t\t\tindicating position outside of the validity restriction of CERT_TS_AT_B\r\n\t\t\t}\r\n\t\t\tand containing header_fields[3] {\r\n\t\t\t\tcontainint type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontainint its_aid\r\n\t\t\t\t\tindicating 'AID_CAM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t} then {\r\n\t\tthe IUT accepts a SecuredMessage\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (CAM)\r\n\t\t\tcontaining header_fields[0]\t{\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'signer_info'\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating certificate\r\n\t\t\t\t\tcontaining certificate\r\n\t\t\t\t\t\tindicating CERT_TS_AT_B\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t\tand containing header_fields[1].type\r\n\t\t\t\tindicating 'generation_time'\r\n\t\t\tand containing header_fields[2] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_location'\r\n\t\t\t\tcontaining generation_location\r\n\t\t\t\t\tindicating position outside of the validity restriction of CERT_TS_AT_B\r\n\t\t\t}\r\n\t\t\tand containing header_fields[3] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_CAM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t} then {\r\n\t\tthe IUT accepts a SecuredMessage\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "005d34eb-77e7-4904-9c9c-56a715ecef95", "type": "STRING", "value": "in process" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "005d34eb-77e7-4904-9c9c-56a715ecef95", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_05.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_05.json index 7a3187a8b93c2d1066d75fbeb82a7d6a8c070e46..0e97be1ef47945efb94aa5cc3db5836c4e26cacc 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_05.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_05.json @@ -8,11 +8,15 @@ "value": "Check that the IUT discards Secured CAM containing other types of signer_info then certificate_digest_with_ecdsap256, certificate_chain or certificate." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "7e23f23e-d634-4da2-9068-7ab97115cb8a", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/d1564525-a4f5-404f-b48a-f323fde56e21"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/d1564525-a4f5-404f-b48a-f323fde56e21", + "/Documents/ts_103097v010201p.xhtml/a5f4f412-efbc-4a6d-a05d-4170914778ea" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "05. Check signer info" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "7e23f23e-d634-4da2-9068-7ab97115cb8a", + "type": "STRING", + "value": "COMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_05/TP_SEC_ITSS_RCV_CAM_05_02_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_05/TP_SEC_ITSS_RCV_CAM_05_02_BO.json index 46efe6d7cc14b5d7cf84b6c0ec04481eae8bffb5..581dd8d8d5646d1d79b9e6ec67b46b4d1be0f166 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_05/TP_SEC_ITSS_RCV_CAM_05_02_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_05/TP_SEC_ITSS_RCV_CAM_05_02_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "df8044af-078f-4da3-833c-7e9ab8060567", "type": "STRING", "value": "bissmeye" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "df8044af-078f-4da3-833c-7e9ab8060567", "type": "STRING", - "value": "Check that IUT discards a secured CAM if the header_fields contain a signer of type certificate_digest_with_other_algorithm" + "value": "Check that IUT discards a secured CAM if the header_fields contains a signer of type certificate_digest_with_other_algorithm" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "df8044af-078f-4da3-833c-7e9ab8060567", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (CAM) {\r\n\t\t\tcontaining header_fields['signer_info']\r\n\t\t\t\tcontaining signer.type\r\n\t\t\t\t\tindicating 'certificate_digest_with_other_algorithm'\r\n\t\t\tand containing header_fields['generation_time']\r\n\t\t\tand containing header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_CAM'\r\n\t\t\tand not containing other header fields\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "df8044af-078f-4da3-833c-7e9ab8060567", "type": "STRING", "value": "in process" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "df8044af-078f-4da3-833c-7e9ab8060567", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_05/TP_SEC_ITSS_RCV_CAM_05_03_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_05/TP_SEC_ITSS_RCV_CAM_05_03_BO.json index e9e6c2f1a9cfc0eb939228eaa82fbf6278139511..59f156b13abc3f9d5228c6c6c37118126dd34c70 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_05/TP_SEC_ITSS_RCV_CAM_05_03_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_05/TP_SEC_ITSS_RCV_CAM_05_03_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "14265998-11d5-47dc-90dd-360be81197bf", "type": "STRING", "value": "bissmeye" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "14265998-11d5-47dc-90dd-360be81197bf", "type": "STRING", - "value": "Check that IUT discards a secured CAM if the header_fields contain a signer of type certificate_chain and the chain is empty" + "value": "Check that IUT discards a secured CAM if the header_fields contains a signer of type certificate_chain and the chain is empty" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "14265998-11d5-47dc-90dd-360be81197bf", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (CAM) {\r\n\t\t\tcontaining header_fields['signer_info']\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate_chain'\r\n\t\t\t\t\tcontaining certificates\r\n\t\t\t\t\t\tindicating length = 0\r\n\t\t\t\t}\r\n\t\t\tand containing header_fields['generation_time']\r\n\t\t\tand containing header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_CAM'\r\n\t\t\tand not containing other header fields\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "14265998-11d5-47dc-90dd-360be81197bf", "type": "STRING", "value": "in process" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "14265998-11d5-47dc-90dd-360be81197bf", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_05/TP_SEC_ITSS_RCV_CAM_05_04_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_05/TP_SEC_ITSS_RCV_CAM_05_04_BO.json index be3809329828e9202a428421ecc12b966ec1e327..f93f4f4134648d4daba65a408ee64b79e52320d1 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_05/TP_SEC_ITSS_RCV_CAM_05_04_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_05/TP_SEC_ITSS_RCV_CAM_05_04_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "b9d41271-a8d6-4c47-ab61-b717f0475b1b", "type": "STRING", "value": "bissmeye" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "b9d41271-a8d6-4c47-ab61-b717f0475b1b", "type": "STRING", - "value": "Check that IUT discards a secured CAM if the header_fields contain a signer of type certificate_chain and the chain contains only one certificate" + "value": "Check that IUT discards a secured CAM if the header_fields contains a signer of type certificate_chain and the chain contains only one certificate" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "b9d41271-a8d6-4c47-ab61-b717f0475b1b", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (CAM) {\r\n\t\t\tcontaining header_fields['signer_info']\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate_chain'\r\n\t\t\t\t\tcontaining certificates\r\n\t\t\t\t\t\tindicating length = 1\r\n\t\t\t\t}\r\n\t\t\tand containing header_fields['generation_time']\r\n\t\t\tand containing header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_CAM'\r\n\t\t\tand not containing other header fields\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "b9d41271-a8d6-4c47-ab61-b717f0475b1b", "type": "STRING", "value": "in process" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "b9d41271-a8d6-4c47-ab61-b717f0475b1b", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_06.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_06.json index 700174776f37da25ba3b67e57585e92f3d010813..7a8a250201832ebc8971db4702c12d5c8d90f10f 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_06.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_06.json @@ -8,13 +8,16 @@ "value": "Check the acceptance of SecuredMessage containing HeaderField generation_time" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "c00b6297-8b7a-487b-a79e-802be7b9bddc", "type": "LIST", "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/e1c8b3e0-5da0-4e8d-8355-563039c7cdc7", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/48e8cd0f-df1a-4fd5-a36b-6d47370cb9c5" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/48e8cd0f-df1a-4fd5-a36b-6d47370cb9c5", + "/Documents/ts_103097v010201p.xhtml/615b41cb-6660-41b4-8375-b658436ca1df", + "/Documents/ts_103097v010201p.xhtml/5d915e97-a60c-4999-8820-e69c5f87128c" ] }, "_name": { @@ -24,6 +27,13 @@ "type": "STRING", "value": "06. Check generation time" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "c00b6297-8b7a-487b-a79e-802be7b9bddc", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_06/TP_C2C_SEC_ITSS_RCV_CAM_06_03_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_06/TP_SEC_ITSS_RCV_CAM_06_03_BO.json similarity index 65% rename from requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_06/TP_C2C_SEC_ITSS_RCV_CAM_06_03_BO.json rename to requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_06/TP_SEC_ITSS_RCV_CAM_06_03_BO.json index 0bc9173890e4a3c6f55dc74bbe919a3e628da410..f048531df823b3ab87894f23a6b29a1c3186fcae 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_06/TP_C2C_SEC_ITSS_RCV_CAM_06_03_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_06/TP_SEC_ITSS_RCV_CAM_06_03_BO.json @@ -1,35 +1,54 @@ -{ - "attributes": { - "PICS_C2C": { - "key": "PICS_C2C", - "type": "STRING", - "value": "true" - }, - "_author": { - "key": "_author", - "type": "STRING", - "value": "filatov" - }, - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that IUT discards Secured CAM if the generation_time is more than 5 minute in the past (C2C only)" - }, - "_expectedResults": { - "key": "_expectedResults", - "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tand containing header_fields [1] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 ( CURRENT_TIME - 302sec )\r\n\t\t\t}\r\n\t\t\tand containing header_fields ['its_aid']\r\n\t\t\t\tindicating 'AID_CAM'\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" - }, - "_status": { - "key": "_status", - "type": "STRING", - "value": "in process" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "TestPurpose" - } - }, - "uuid": "222f2aee-af6d-4405-87b2-b5f82ca7ebd3" +{ + "attributes": { + "PICS_C2C": { + "isGenerated": false, + "key": "PICS_C2C", + "origin": "222f2aee-af6d-4405-87b2-b5f82ca7ebd3", + "type": "STRING", + "value": "true" + }, + "_author": { + "isGenerated": false, + "key": "_author", + "origin": "222f2aee-af6d-4405-87b2-b5f82ca7ebd3", + "type": "STRING", + "value": "filatov" + }, + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "222f2aee-af6d-4405-87b2-b5f82ca7ebd3", + "type": "STRING", + "value": "Check that IUT discards Secured CAM if the generation_time is more than 5 minute in the past (C2C only)" + }, + "_expectedResults": { + "isGenerated": false, + "key": "_expectedResults", + "origin": "222f2aee-af6d-4405-87b2-b5f82ca7ebd3", + "type": "STRING", + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tand containing header_fields [1] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 ( CURRENT_TIME - 302sec )\r\n\t\t\t}\r\n\t\t\tand containing header_fields ['its_aid']\r\n\t\t\t\tindicating 'AID_CAM'\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" + }, + "_status": { + "isGenerated": false, + "key": "_status", + "origin": "222f2aee-af6d-4405-87b2-b5f82ca7ebd3", + "type": "STRING", + "value": "in process" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "222f2aee-af6d-4405-87b2-b5f82ca7ebd3", + "type": "STRING", + "value": "TestPurpose" + }, + "excluded": { + "isGenerated": false, + "key": "excluded", + "origin": "222f2aee-af6d-4405-87b2-b5f82ca7ebd3", + "type": "BOOL", + "value": "true" + } + }, + "uuid": "222f2aee-af6d-4405-87b2-b5f82ca7ebd3" } \ No newline at end of file diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_06/TP_C2C_SEC_ITSS_RCV_CAM_06_04_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_06/TP_SEC_ITSS_RCV_CAM_06_04_BO.json similarity index 65% rename from requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_06/TP_C2C_SEC_ITSS_RCV_CAM_06_04_BO.json rename to requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_06/TP_SEC_ITSS_RCV_CAM_06_04_BO.json index 250575b35e01601563e0bb7b87ff42f11314272d..757ac8e33c89f44e32214938b83fb864320fa58c 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_06/TP_C2C_SEC_ITSS_RCV_CAM_06_04_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_06/TP_SEC_ITSS_RCV_CAM_06_04_BO.json @@ -1,35 +1,54 @@ -{ - "attributes": { - "PICS_C2C": { - "key": "PICS_C2C", - "type": "STRING", - "value": "true" - }, - "_author": { - "key": "_author", - "type": "STRING", - "value": "filatov" - }, - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that IUT discards Secured CAM if the generation_time is more than 5 minute in the future(C2C only)" - }, - "_expectedResults": { - "key": "_expectedResults", - "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tand containing header_fields [1] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 ( CURRENT_TIME + 302sec )\r\n\t\t\t}\r\n\t\t\tand containing header_fields ['its_aid']\r\n\t\t\t\tindicating 'AID_CAM'\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" - }, - "_status": { - "key": "_status", - "type": "STRING", - "value": "in process" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "TestPurpose" - } - }, - "uuid": "06d7f150-22c9-453a-b19f-cc651c4de59b" +{ + "attributes": { + "PICS_C2C": { + "isGenerated": false, + "key": "PICS_C2C", + "origin": "06d7f150-22c9-453a-b19f-cc651c4de59b", + "type": "STRING", + "value": "true" + }, + "_author": { + "isGenerated": false, + "key": "_author", + "origin": "06d7f150-22c9-453a-b19f-cc651c4de59b", + "type": "STRING", + "value": "filatov" + }, + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "06d7f150-22c9-453a-b19f-cc651c4de59b", + "type": "STRING", + "value": "Check that IUT discards Secured CAM if the generation_time is more than 5 minute in the future(C2C only)" + }, + "_expectedResults": { + "isGenerated": false, + "key": "_expectedResults", + "origin": "06d7f150-22c9-453a-b19f-cc651c4de59b", + "type": "STRING", + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tand containing header_fields [1] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 ( CURRENT_TIME + 302sec )\r\n\t\t\t}\r\n\t\t\tand containing header_fields ['its_aid']\r\n\t\t\t\tindicating 'AID_CAM'\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" + }, + "_status": { + "isGenerated": false, + "key": "_status", + "origin": "06d7f150-22c9-453a-b19f-cc651c4de59b", + "type": "STRING", + "value": "in process" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "06d7f150-22c9-453a-b19f-cc651c4de59b", + "type": "STRING", + "value": "TestPurpose" + }, + "excluded": { + "isGenerated": false, + "key": "excluded", + "origin": "06d7f150-22c9-453a-b19f-cc651c4de59b", + "type": "BOOL", + "value": "true" + } + }, + "uuid": "06d7f150-22c9-453a-b19f-cc651c4de59b" } \ No newline at end of file diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_07.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_07.json index add4967dd49d09e4e97023762a8e32f6d3720ec5..0178692bd272c77bfe92cbd5986d0694dca65b57 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_07.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_07.json @@ -8,11 +8,15 @@ "value": "Check the acceptance of message type" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "b4e3715a-9ab8-451e-879a-1b67591e15b0", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/505beac6-127f-4abe-904a-8da820820b8f"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/505beac6-127f-4abe-904a-8da820820b8f", + "/Documents/ts_103097v010201p.xhtml/ea754a75-9530-4fd0-ae34-bf241af669ad" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "07. Check its_aid" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "b4e3715a-9ab8-451e-879a-1b67591e15b0", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09.json index f6ff66e27b5df22e168a56f65c2d961f26317109..87885e9716931b3a72b73f14f708f3d5424768e5 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09.json @@ -8,13 +8,16 @@ "value": "Check the acceptance of payloads of Secured CAM\r\n" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "8deea1a5-3222-4877-8f1b-c6a4ec301ba0", "type": "LIST", "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/9c739ca7-141b-4d74-9a6e-54db6606bde3", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/a61181d9-1ca0-444d-8723-5bc368222afc" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/a61181d9-1ca0-444d-8723-5bc368222afc", + "/Documents/ts_103097v010201p.xhtml/464098d6-4402-43a2-a11b-e6c0ebb97df7", + "/Documents/ts_103097v010201p.xhtml/3f1cd606-cf67-4db0-ac19-64fc7452d17a" ] }, "_name": { @@ -24,6 +27,13 @@ "type": "STRING", "value": "09. Check payload" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "8deea1a5-3222-4877-8f1b-c6a4ec301ba0", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09/TP_SEC_ITSS_RCV_CAM_09_02_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09/TP_SEC_ITSS_RCV_CAM_09_02_BO.json index 44be92acfcdf03d029a270ec919571c53c32bbdf..ca20cab722f24218e12d037592517598259b8604 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09/TP_SEC_ITSS_RCV_CAM_09_02_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09/TP_SEC_ITSS_RCV_CAM_09_02_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "81dd1aa6-6722-4d73-876f-4f9c8366f9df", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "81dd1aa6-6722-4d73-876f-4f9c8366f9df", "type": "STRING", - "value": "Check that IUT discards the Secured CAM containing empty payload of type 'signed'." + "value": "Check that IUT discards the Secured CAM containing empty payload of type 'signed'" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "81dd1aa6-6722-4d73-876f-4f9c8366f9df", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n \t\t\tcontaining header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_CAM'\r\n\t\t\tand containing payload_field {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'signed'\r\n\t\t\t\tcontaining data\r\n\t\t\t\t\tindicating length 0\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "81dd1aa6-6722-4d73-876f-4f9c8366f9df", "type": "STRING", "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "81dd1aa6-6722-4d73-876f-4f9c8366f9df", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09/TP_SEC_ITSS_RCV_CAM_09_03_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09/TP_SEC_ITSS_RCV_CAM_09_03_BO.json index 4c72ab06b98867fea55d2a84f107cd55eddf74ee..33b41aa464ea2e8e9682f646c5469b7192c20965 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09/TP_SEC_ITSS_RCV_CAM_09_03_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09/TP_SEC_ITSS_RCV_CAM_09_03_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "0f95a9d6-c674-4cd7-a0ec-6604f60c0a54", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "0f95a9d6-c674-4cd7-a0ec-6604f60c0a54", "type": "STRING", - "value": "Check that IUT discards the Secured CAM containing non-empty payload of type 'unsecured'." + "value": "Check that IUT discards the Secured CAM containing non-empty payload of type 'unsecured'" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "0f95a9d6-c674-4cd7-a0ec-6604f60c0a54", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_CAM'\r\n\t\t\tand containing payload_field {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'unsecured'\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "0f95a9d6-c674-4cd7-a0ec-6604f60c0a54", "type": "STRING", "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "0f95a9d6-c674-4cd7-a0ec-6604f60c0a54", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09/TP_SEC_ITSS_RCV_CAM_09_04_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09/TP_SEC_ITSS_RCV_CAM_09_04_BO.json index c0550505b26f546f8b1f94bddf4d815d6d1b75d8..00664566fd7819f0f02730cc5c584e837e10e898 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09/TP_SEC_ITSS_RCV_CAM_09_04_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09/TP_SEC_ITSS_RCV_CAM_09_04_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "b5fb4846-64df-4fdb-9349-94b1f3f78bc1", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "b5fb4846-64df-4fdb-9349-94b1f3f78bc1", "type": "STRING", - "value": "Check that IUT discards the Secured CAM containing non-empty payload of type 'encrypted'." + "value": "Check that IUT discards the Secured CAM containing non-empty payload of type 'encrypted'" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "b5fb4846-64df-4fdb-9349-94b1f3f78bc1", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_CAM'\r\n\t\t\tand containing payload_field {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'encrypted'\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "b5fb4846-64df-4fdb-9349-94b1f3f78bc1", "type": "STRING", "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "b5fb4846-64df-4fdb-9349-94b1f3f78bc1", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09/TP_SEC_ITSS_RCV_CAM_09_05_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09/TP_SEC_ITSS_RCV_CAM_09_05_BO.json index bb3180af330766898f49577bc414e803c42f0ee5..55bb2c079d36c24417e941da976a6f61a312f259 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09/TP_SEC_ITSS_RCV_CAM_09_05_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09/TP_SEC_ITSS_RCV_CAM_09_05_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "d1c5c8f7-716f-4b6b-b0b3-01eee5cd0936", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "d1c5c8f7-716f-4b6b-b0b3-01eee5cd0936", "type": "STRING", - "value": "Check that IUT discards the Secured CAM containing non-empty payload of type 'signed_external'." + "value": "Check that IUT discards the Secured CAM containing non-empty payload of type 'signed_external'" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "d1c5c8f7-716f-4b6b-b0b3-01eee5cd0936", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_CAM'\r\n\t\t\tand containing payload_field {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'signed_external'\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "d1c5c8f7-716f-4b6b-b0b3-01eee5cd0936", "type": "STRING", "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "d1c5c8f7-716f-4b6b-b0b3-01eee5cd0936", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09/TP_SEC_ITSS_RCV_CAM_09_06_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09/TP_SEC_ITSS_RCV_CAM_09_06_BO.json index 293cad83354734f41f29a6ce7a39ac33a5c6621d..29b1e9241ab9ec5787f50c4de322df456aeb5096 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09/TP_SEC_ITSS_RCV_CAM_09_06_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09/TP_SEC_ITSS_RCV_CAM_09_06_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "29a262b6-9405-45a2-9c46-f7ade8035499", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "29a262b6-9405-45a2-9c46-f7ade8035499", "type": "STRING", - "value": "Check that IUT discards the Secured CAM containing non-empty payload of type 'signed_and_encrypted'." + "value": "Check that IUT discards the Secured CAM containing non-empty payload of type 'signed_and_encrypted'" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "29a262b6-9405-45a2-9c46-f7ade8035499", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_CAM'\r\n\t\t\tand containing payload_field {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'signed_and_encrypted'\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "29a262b6-9405-45a2-9c46-f7ade8035499", "type": "STRING", "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "29a262b6-9405-45a2-9c46-f7ade8035499", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_10.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_10.json index f4e679bf2e7e8be4913c4090024a6b0f6ff609ee..052ae8775eabc193861948f1fa950289f6255cc2 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_10.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_10.json @@ -8,18 +8,29 @@ "value": "Check that the IUT discards Secured CAMs with wrong payloads\r\n" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "d24b7f9d-ee0f-4614-ac07-5898ae0f661f", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/2e99c742-b3c7-497d-ad35-af859d7e351d"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/2e99c742-b3c7-497d-ad35-af859d7e351d", + "/Documents/ts_103097v010201p.xhtml/191a229d-de15-4b5a-874c-682846c5d70c" + ] }, "_name": { "isGenerated": false, "key": "_name", "origin": "d24b7f9d-ee0f-4614-ac07-5898ae0f661f", "type": "STRING", - "value": "10. Check presence of traieler field" + "value": "10. Check presence of trailer field" + }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "d24b7f9d-ee0f-4614-ac07-5898ae0f661f", + "type": "STRING", + "value": "COMPLETE" }, "_type": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_10/TP_SEC_ITSS_RCV_CAM_10_01_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_10/TP_SEC_ITSS_RCV_CAM_10_01_BO.json index ba882cddf470ecf6efe393e4d890be3c95004e37..30da0cd56c55369b3ec2741e80c77cc84dbcb439 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_10/TP_SEC_ITSS_RCV_CAM_10_01_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_10/TP_SEC_ITSS_RCV_CAM_10_01_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "a73376ab-8dd8-4455-9eb4-77bee0ae9afb", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "a73376ab-8dd8-4455-9eb4-77bee0ae9afb", "type": "STRING", - "value": "Check that IUT discards the Secured CAM doesn't containing the TrailerField of type 'signature'" + "value": "Check that IUT discards the Secured CAM if the message does not contain the trailer field of type 'signature'" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "a73376ab-8dd8-4455-9eb4-77bee0ae9afb", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_CAM'\r\n\t\t\tand containing trailer_fields\r\n\t\t\t\tnot containing any instance of type TrailerField {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'signature'\r\n\t\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "a73376ab-8dd8-4455-9eb4-77bee0ae9afb", "type": "STRING", "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "a73376ab-8dd8-4455-9eb4-77bee0ae9afb", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_11.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_11.json index 5957d96f3a79411279bce847302fd200968d6630..01ced17244d23beb55079a05a01a4dbbd8f1ba91 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_11.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_11.json @@ -8,11 +8,15 @@ "value": "Check that the signature contained in the SecuredMessage is calculated over the right fields by cryptographically verifying the signature." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "64442e91-7734-430b-bc99-08ab477e6430", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/edc30643-b58e-4c13-a10b-a3209100a17c"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/edc30643-b58e-4c13-a10b-a3209100a17c", + "/Documents/ts_103097v010201p.xhtml/0b1ec607-c4bc-4ac5-a8e8-7c7bce9cd787" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "11. Check signature" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "64442e91-7734-430b-bc99-08ab477e6430", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_12.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_12.json index 96976c0357328d7091b3379f8485930d36d08478..70fe05d2ea49cfee9f88e12b9fa209d490026b5d 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_12.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_12.json @@ -1,11 +1,15 @@ { "attributes": { "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "ee20c58e-6003-4cd5-9055-27e2d44d6fbe", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/70256032-089a-4b8b-b120-defd1af8a96d"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/70256032-089a-4b8b-b120-defd1af8a96d", + "/Documents/ts_103097v010201p.xhtml/2ea232e9-8999-4b23-a946-ac27ce63836a" + ] }, "_name": { "isGenerated": false, @@ -14,6 +18,13 @@ "type": "STRING", "value": "12. Check signing certificate type" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "ee20c58e-6003-4cd5-9055-27e2d44d6fbe", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT.json index 2cef674a4ae90c87635e5574a5bf89d011f58db9..3d8994ce5b0c02569c9d87cd13445a7e9365723f 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT.json @@ -7,6 +7,13 @@ "type": "STRING", "value": "Profiles for certificates" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "2e88f94e-3fc6-4468-8f22-a4b9f5109648", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_01.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_01.json index 04606403b3e683af7857dd950770f2d5d38f4fe9..2ecd7ea48e0e14001a683c5221f6c0bb382f3c6e 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_01.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_01.json @@ -8,13 +8,16 @@ "value": "Check that the IUT discards certificate with wrong version" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "795ce224-604e-4598-89be-96d0b650984e", "type": "LIST", "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/c4cd2dea-c087-49fa-9d20-b08451557a51", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/0df98c72-fcf5-46bd-ac32-c67617caeadc" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/0df98c72-fcf5-46bd-ac32-c67617caeadc", + "/Documents/ts_103097v010201p.xhtml/783519e9-a067-4deb-b103-46fa94db39bf", + "/Documents/ts_103097v010201p.xhtml/1e5c73cf-ad2e-479f-8fda-5fa62efbe3ec" ] }, "_name": { @@ -24,6 +27,13 @@ "type": "STRING", "value": "01. Check that certificate version is 2" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "795ce224-604e-4598-89be-96d0b650984e", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_01/TP_SEC_ITSS_RCV_CERT_01_04_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_01/TP_SEC_ITSS_RCV_CERT_01_04_BO.json index 54af7fa572762f38a7d0d9d328030238ff5bffc8..7ec087058ed58c6db493e4f5f4bc2ee7cea1b714 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_01/TP_SEC_ITSS_RCV_CERT_01_04_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_01/TP_SEC_ITSS_RCV_CERT_01_04_BO.json @@ -19,7 +19,7 @@ "key": "_expectedResults", "origin": "87b7706c-614a-4718-8cde-b5329b51c69f", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate_chain'\r\n\t\t\t\t\tcontaining certificates[0] (CERT_TS_01_04_BO_AA)\r\n\t\t\t\t\t\tcontaining version\r\n\t\t\t\t\t\t\tindicating '1'\r\n\t\t\t\t\tcontaining certificates[1] (CERT_TS_01_04_BO_AT) {\r\n\t\t\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\t\t\treferencing to CERT_TS_AA_01_04_EB\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate_chain'\r\n\t\t\t\t\tcontaining certificates[0] (CERT_TS_01_04_BO_AA)\r\n\t\t\t\t\t\tcontaining version\r\n\t\t\t\t\t\t\tindicating '1'\r\n\t\t\t\t\tcontaining certificates[1] (CERT_TS_01_04_BO_AT) {\r\n\t\t\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\t\t\treferencing to CERT_TS_01_04_BO_AA\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" }, "_status": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_02.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_02.json index dedb4e77d9655c624f03ef1ff11cc8333e82a6f0..f3e5eaa0c695a899da2b0adf861b8d4e6d468d02 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_02.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_02.json @@ -8,18 +8,29 @@ "value": "Enrolment process is out of scope of this test suite. " }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "9005e079-442a-4f8f-a8ff-4d2e994c46a4", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/755f6e01-92d3-4b98-90ad-1f37ec6d6980"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/755f6e01-92d3-4b98-90ad-1f37ec6d6980", + "/Documents/ts_103097v010201p.xhtml/b9e76387-9dee-4b5f-a3d8-ab512d88e8a6" + ] }, "_name": { "isGenerated": false, "key": "_name", "origin": "9005e079-442a-4f8f-a8ff-4d2e994c46a4", "type": "STRING", - "value": "02. Check that enrolment certificate is not used for sign other certificates." + "value": "02. Check that enrolment certificate is not used for sign other certificates" + }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "9005e079-442a-4f8f-a8ff-4d2e994c46a4", + "type": "STRING", + "value": "COMPLETE" }, "_type": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_02/TP_SEC_ITSS_RCV_CERT_02_01_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_02/TP_SEC_ITSS_RCV_CERT_02_01_BO.json index 887dbb9eb4a596d8b9fed3bca9f817be54336485..1000f240f261d596795b80daea56307e66f418a2 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_02/TP_SEC_ITSS_RCV_CERT_02_01_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_02/TP_SEC_ITSS_RCV_CERT_02_01_BO.json @@ -12,14 +12,14 @@ "key": "_description", "origin": "94e45a78-fbf4-46ae-a725-110dd3f23c59", "type": "STRING", - "value": "Check that IUT discards a SecuredMessage if the issuer certificate of the authorization ticket certificate contains the subject type \"enrolment_credential\"" + "value": "Check that IUT discards a SecuredMessage if the issuer certificate of the authorization ticket certificate contains the subject type 'enrolment_credential'" }, "_expectedResults": { "isGenerated": false, "key": "_expectedResults", "origin": "94e45a78-fbf4-46ae-a725-110dd3f23c59", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tcontaining certificate (CERT_TS_02_01_BO_AT) {\r\n\t\t\t\t\t\tcontaining signer_info.type\r\n\t\t\t\t\t\t\tindicating 'certificate_digest_with_sha256'\r\n\t\t\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\t\t\treferencing to certificate (CERT_TS_A_EC)\r\n\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tcontaining certificate (CERT_TS_02_01_BO_AT) {\r\n\t\t\t\t\t\tcontaining signer_info.type\r\n\t\t\t\t\t\t\tindicating 'certificate_digest_with_sha256'\r\n\t\t\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\t\t\treferencing to certificate (CERT_TS_A_EC)\r\n\t\t\t\t\t\t\t\tcontaining subject_info.subject_type\r\n\t\t\t\t\t\t\t\t\tindicating 'enrolment_credential'\r\n\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" }, "_status": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_02/TP_SEC_ITSS_RCV_CERT_02_02_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_02/TP_SEC_ITSS_RCV_CERT_02_02_BO.json index 44573a8d8f8376ad601d3c966b72df56d7e8204b..b02912022c4dc734d1661e1dec26468e716495e6 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_02/TP_SEC_ITSS_RCV_CERT_02_02_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_02/TP_SEC_ITSS_RCV_CERT_02_02_BO.json @@ -12,14 +12,14 @@ "key": "_description", "origin": "fd600457-a262-4b97-b5ab-f94b184acc7d", "type": "STRING", - "value": "Check that IUT discards a SecuredMessage if the issuer certificate of the authorization authority certificate contains the subject type \"enrolment_authority\"" + "value": "Check that IUT discards a SecuredMessage if the issuer certificate of the authorization authority certificate contains the subject type 'enrolment_credential'" }, "_expectedResults": { "isGenerated": false, "key": "_expectedResults", "origin": "fd600457-a262-4b97-b5ab-f94b184acc7d", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate_chain'\r\n\t\t\t\t\tcontaining certificates[0] (CERT_TS_02_02_BO_AA) {\r\n\t\t\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\t\t\treferencing to CERT_TS_A_EA\r\n\t\t\t\t\t}\r\n\t\t\t\t\tcontaining certificates[1] (CERT_TS_02_02_BO_AT) {\r\n\t\t\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\t\t\treferencing to CERT_TS_02_02_BO_AA\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate_chain'\r\n\t\t\t\t\tcontaining certificates[0] (CERT_TS_02_02_BO_AA) {\r\n\t\t\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\t\t\treferencing to certificate CERT_TS_A_EC\r\n\t\t\t\t\t\t\t\tcontaining subject_info.subject_type\r\n\t\t\t\t\t\t\t\t\tindicating 'enrolment_credential'\r\n\t\t\t\t\t}\r\n\t\t\t\t\tcontaining certificates[1] (CERT_TS_02_02_BO_AT) {\r\n\t\t\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\t\t\treferencing to CERT_TS_02_02_BO_AA\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" }, "_status": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_02/TP_SEC_ITSS_RCV_CERT_02_03_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_02/TP_SEC_ITSS_RCV_CERT_02_03_BO.json new file mode 100644 index 0000000000000000000000000000000000000000..084f5248690aa3160d15a5bb1da5c5f109fc8343 --- /dev/null +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_02/TP_SEC_ITSS_RCV_CERT_02_03_BO.json @@ -0,0 +1,40 @@ +{ + "attributes": { + "_author": { + "isGenerated": false, + "key": "_author", + "origin": "8b2a4a0e-f9c7-4c78-be50-677543e523d7", + "type": "STRING", + "value": "filatov" + }, + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "8b2a4a0e-f9c7-4c78-be50-677543e523d7", + "type": "STRING", + "value": "Check that IUT discards a SecuredMessage if the issuer certificate of the authorization ticket certificate contains the subject type 'enrolment_authority'" + }, + "_expectedResults": { + "isGenerated": false, + "key": "_expectedResults", + "origin": "8b2a4a0e-f9c7-4c78-be50-677543e523d7", + "type": "STRING", + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tcontaining certificate (CERT_TS_02_03_BO_AT) {\r\n\t\t\t\t\t\tcontaining signer_info.type\r\n\t\t\t\t\t\t\tindicating 'certificate_digest_with_sha256'\r\n\t\t\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\t\t\treferencing to certificate (CERT_TS_A_EA)\r\n\t\t\t\t\t\t\t\tcontaining subject_info.subject_type\r\n\t\t\t\t\t\t\t\t\tindicating 'enrolment_authority'\r\n\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" + }, + "_status": { + "isGenerated": false, + "key": "_status", + "origin": "94e45a78-fbf4-46ae-a725-110dd3f23c59", + "type": "STRING", + "value": "in process" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "94e45a78-fbf4-46ae-a725-110dd3f23c59", + "type": "STRING", + "value": "TestPurpose" + } + }, + "uuid": "8b2a4a0e-f9c7-4c78-be50-677543e523d7" +} \ No newline at end of file diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_02/TP_SEC_ITSS_RCV_CERT_02_04_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_02/TP_SEC_ITSS_RCV_CERT_02_04_BO.json new file mode 100644 index 0000000000000000000000000000000000000000..326cdd08751122e9a68eb43577099f9cfbb04d30 --- /dev/null +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_02/TP_SEC_ITSS_RCV_CERT_02_04_BO.json @@ -0,0 +1,40 @@ +{ + "attributes": { + "_author": { + "isGenerated": false, + "key": "_author", + "origin": "0d66cb73-2da0-4c2c-96d2-f19ba8f5dd69", + "type": "STRING", + "value": "filatov" + }, + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "fd600457-a262-4b97-b5ab-f94b184acc7d", + "type": "STRING", + "value": "Check that IUT discards a SecuredMessage if the issuer certificate of the authorization authority certificate contains the subject type 'enrolment_authority'" + }, + "_expectedResults": { + "isGenerated": false, + "key": "_expectedResults", + "origin": "0d66cb73-2da0-4c2c-96d2-f19ba8f5dd69", + "type": "STRING", + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate_chain'\r\n\t\t\t\t\tcontaining certificates[0] (CERT_TS_02_04_BO_AA) {\r\n\t\t\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\t\t\treferencing to certificate CERT_TS_A_EA\r\n\t\t\t\t\t\t\t\tcontaining subject_info.subject_type\r\n\t\t\t\t\t\t\t\t\tindicating 'enrolment_authority'\r\n\t\t\t\t\t}\r\n\t\t\t\t\tcontaining certificates[1] (CERT_TS_02_04_BO_AT) {\r\n\t\t\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\t\t\treferencing to CERT_TS_02_04_BO_AA\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" + }, + "_status": { + "isGenerated": false, + "key": "_status", + "origin": "fd600457-a262-4b97-b5ab-f94b184acc7d", + "type": "STRING", + "value": "in process" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "fd600457-a262-4b97-b5ab-f94b184acc7d", + "type": "STRING", + "value": "TestPurpose" + } + }, + "uuid": "0d66cb73-2da0-4c2c-96d2-f19ba8f5dd69" +} \ No newline at end of file diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_03.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_03.json index ff0628845bf792bdd76c4c497d052a20702ddac5..e7909fdc8e67a5bf4439b89baa958370b57cd7e9 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_03.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_03.json @@ -1,18 +1,29 @@ { "attributes": { "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "7ecea428-3d22-4419-84fb-8d47c1e5d9d0", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/0c97001c-61ac-4fe4-846c-43f17bdff475"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/0c97001c-61ac-4fe4-846c-43f17bdff475", + "/Documents/ts_103097v010201p.xhtml/57f67514-1422-48ef-b36e-262137eb7251" + ] }, "_name": { "isGenerated": false, "key": "_name", "origin": "7ecea428-3d22-4419-84fb-8d47c1e5d9d0", "type": "STRING", - "value": "03. Check that any certificate signed with AT certificate is not accepted." + "value": "03. Check that any certificate signed with AT certificate is not accepted" + }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "7ecea428-3d22-4419-84fb-8d47c1e5d9d0", + "type": "STRING", + "value": "COMPLETE" }, "_type": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_03/TP_SEC_ITSS_RCV_CERT_03_01_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_03/TP_SEC_ITSS_RCV_CERT_03_01_BO.json index c64e793f769a34bf64e2a79ec046ad5a6597be00..4d776e8517c85a8821a497138070d1e0c75a187f 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_03/TP_SEC_ITSS_RCV_CERT_03_01_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_03/TP_SEC_ITSS_RCV_CERT_03_01_BO.json @@ -12,14 +12,14 @@ "key": "_description", "origin": "55cddc35-25a0-4631-bce3-188808cf4369", "type": "STRING", - "value": "Check that IUT discards a SecuredMessage if the issuer certificate of the authorization ticket certificate contains the subject type \"authorization_ticket\"" + "value": "Check that IUT discards a SecuredMessage if the issuer certificate of the authorization ticket certificate contains the subject type 'authorization_ticket'" }, "_expectedResults": { "isGenerated": false, "key": "_expectedResults", "origin": "55cddc35-25a0-4631-bce3-188808cf4369", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage\r\n\t\t\tcontaining header_fields ['signer_info'].signer.certificate (CERT_TS_03_01_BO_AT) {\r\n\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\treferencing to CERT_TS_A_AT\r\n\t\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}\r\n" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage\r\n\t\t\tcontaining header_fields ['signer_info'].signer\r\n\t\t\t\tcontaining certificate (CERT_TS_03_01_BO_AT)\r\n\t\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\t\treferencing to CERT_TS_03_BO_CA\r\n\t\t\t\t\t\t\tcontaining subject_info.subject_type\r\n\t\t\t\t\t\t\t\tindicating 'authorization_ticket'\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}\r\n" }, "_status": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_03/TP_SEC_ITSS_RCV_CERT_03_02_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_03/TP_SEC_ITSS_RCV_CERT_03_02_BO.json index b3db30a299962f2c3341197cbe2b8934b94f67c2..7745d2454daec963c1610a56eec787df34f4dbdf 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_03/TP_SEC_ITSS_RCV_CERT_03_02_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_03/TP_SEC_ITSS_RCV_CERT_03_02_BO.json @@ -12,14 +12,14 @@ "key": "_description", "origin": "d9a365a9-0007-4a38-b7de-b3a985557359", "type": "STRING", - "value": "Check that IUT discards a SecuredMessage if the issuer certificate of the authorization authority certificate contains the subject type \"authorization_ticket\"" + "value": "Check that IUT discards a SecuredMessage if the issuer certificate of the authorization authority certificate contains the subject type 'authorization_ticket'" }, "_expectedResults": { "isGenerated": false, "key": "_expectedResults", "origin": "d9a365a9-0007-4a38-b7de-b3a985557359", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate_chain'\r\n\t\t\t\t\tcontaining certificates[0] (CERT_TS_03_02_BO_AA) {\r\n\t\t\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\t\t\treferencing to CERT_TS_A_AT\r\n\t\t\t\t\t}\r\n\t\t\t\t\tcontaining certificates[1] (CERT_TS_AT_03_02_EB) {\r\n\t\t\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\t\t\treferencing to CERT_TS_AA_03_02_EB\r\n\t\t\t\t\t}\r\n\t\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}\r\n" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate_chain'\r\n\t\t\t\t\tcontaining certificates[0] (CERT_TS_03_02_BO_AA) {\r\n\t\t\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\t\t\treferencing to CERT_TS_03_BO_CA\r\n\t\t\t\t\t\t\t\tcontaining subject_info.subject_type\r\n\t\t\t\t\t\t\t\t\tindicating 'authorization_ticket'\r\n\t\t\t\t\t}\r\n\t\t\t\t\tcontaining certificates[1] (CERT_TS_03_02_BO_AT) {\r\n\t\t\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\t\t\treferencing to CERT_TS_03_02_BO_AA\r\n\t\t\t\t\t}\r\n\t\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}\r\n" }, "_status": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_04.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_04.json index e8420b16f25f8a9ed6aba2514642ee5792da4ab4..e217745d273c29c7e52c3741f3fdbd339d5d039b 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_04.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_04.json @@ -1,18 +1,29 @@ { "attributes": { "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "a00fb3d0-b4a0-47b8-b4c8-d47a7ad7696f", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/12e35a8b-e0f5-44e6-a5f5-4fb3e932e835"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/12e35a8b-e0f5-44e6-a5f5-4fb3e932e835", + "/Documents/ts_103097v010201p.xhtml/afc8e021-8c93-4ae6-8138-3020574e57b5" + ] }, "_name": { "isGenerated": false, "key": "_name", "origin": "a00fb3d0-b4a0-47b8-b4c8-d47a7ad7696f", "type": "STRING", - "value": "04. Check that AA certificate signed with other AA certificate is not accepted." + "value": "04. Check that AA certificate signed with other AA certificate is not accepted" + }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "a00fb3d0-b4a0-47b8-b4c8-d47a7ad7696f", + "type": "STRING", + "value": "INCOMPLETE" }, "_type": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_05.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_05.json index 3d81ee7a0e998a4af6cabb1da90779628a6121d2..4a105ff98ab45e1d91f3492c427e3b5189b2a345 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_05.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_05.json @@ -5,16 +5,19 @@ "key": "_description", "origin": "a8c9f807-d8f0-4397-9cf6-4e0fba6d1c67", "type": "STRING", - "value": "Check that the IUT discards certificate with wrong version" + "value": "Check that the IUT discards certificate with invalid signature" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "a8c9f807-d8f0-4397-9cf6-4e0fba6d1c67", "type": "LIST", "value": [ - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/c4cd2dea-c087-49fa-9d20-b08451557a51", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/0df98c72-fcf5-46bd-ac32-c67617caeadc" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/f144275a-ca15-46cb-8d99-fdda823ed6ab", + "/Documents/ts_103097v010201p.xhtml/8f464e0c-426a-4372-8f2f-acbf3dd444c5", + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/6d2ff790-d12a-47cb-8198-d582ff535277", + "/Documents/ts_103097v010201p.xhtml/c68a4e76-9564-42d2-934a-a889713923b8" ] }, "_name": { @@ -24,6 +27,13 @@ "type": "STRING", "value": "05. Check the certificate signature" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "a8c9f807-d8f0-4397-9cf6-4e0fba6d1c67", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_06.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_06.json index b985f0b7e273f39bbfa2876d928cb5063ee94c53..060544bb771fcffcd87cacb2a72235f6a2353858 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_06.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_06.json @@ -15,13 +15,16 @@ "value": "\r\n" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "40eba84f-fd0f-4692-ba28-b317bfe68c6e", "type": "LIST", "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/f727674f-3a77-4e61-877b-e5d2d9f5dc55", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/a7eb2f2c-4f29-4ac4-a390-68308a532c8e" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/a7eb2f2c-4f29-4ac4-a390-68308a532c8e", + "/Documents/ts_103097v010201p.xhtml/5e9ae933-303e-4fa9-8a48-436757e98ab9", + "/Documents/ts_103097v010201p.xhtml/69c806d3-882e-43b1-b8fe-6dc0c8d1da4c" ] }, "_name": { @@ -31,6 +34,13 @@ "type": "STRING", "value": "06. Check circular region of subordinate certificate" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "40eba84f-fd0f-4692-ba28-b317bfe68c6e", + "type": "STRING", + "value": "COMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_06/TP_SEC_ITSS_RCV_CERT_06_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_06/TP_SEC_ITSS_RCV_CERT_06_01_BV.json index 042e070b99b4345126dadcfd01fb51ca84d3919e..bfeba433559aa637c70aef72053a0e801bab0d5f 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_06/TP_SEC_ITSS_RCV_CERT_06_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_06/TP_SEC_ITSS_RCV_CERT_06_01_BV.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "bae323f3-be36-4b2c-a8ff-79b3e83f57aa", "type": "STRING", - "value": "Check that the IUT accepts a message when its signing certificate contain the same region restriction like the issuing certificate.\r\n" + "value": "Check that the IUT accepts a message when the signing certificate of this message contains the same circular region validity restriction as its issuing certificate" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_06/TP_SEC_ITSS_RCV_CERT_06_02_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_06/TP_SEC_ITSS_RCV_CERT_06_02_BV.json index e36054db9e259f216d007577343a27772598ee49..e184dcb463fb2f4665f1c08a89362e6fc98577cf 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_06/TP_SEC_ITSS_RCV_CERT_06_02_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_06/TP_SEC_ITSS_RCV_CERT_06_02_BV.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "4e8775a2-cc08-4938-bb8f-881b3114dd2d", "type": "STRING", - "value": "Check that the IUT accepts a message when its signing certificate contain the smaller region restriction then the issuing certificate.\r\n" + "value": "Check that the IUT accepts a message when the signing certificate of this message contains the circular region validity restriction which is fully inside in the circular region validity restriction of its issuing certificate\r\n" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_06/TP_SEC_ITSS_RCV_CERT_06_03_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_06/TP_SEC_ITSS_RCV_CERT_06_03_BO.json index 139a4896a5d540bac7ff27473065892b34280de2..7ea62c032d1821eedead403f778a70b6576e4bb3 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_06/TP_SEC_ITSS_RCV_CERT_06_03_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_06/TP_SEC_ITSS_RCV_CERT_06_03_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "e7da8ae9-1dba-40a2-a4cb-ad7c4f3d68c6", "type": "STRING", - "value": "Check that the IUT discards a message when signing certificate doesn't contain a region restriction but the issuing certificate does.\r\n" + "value": "Check that the IUT discards a message when the signing certificate of this message does not contain the region validity restriction but its issuing certificate contains the circular region validity restriction\r\n" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_06/TP_SEC_ITSS_RCV_CERT_06_04_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_06/TP_SEC_ITSS_RCV_CERT_06_04_BO.json index cffa27c2dc7a129a2c94de568f62059fc04e7eef..1f1e11cf673b931f895c6b7d815245c1897009f1 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_06/TP_SEC_ITSS_RCV_CERT_06_04_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_06/TP_SEC_ITSS_RCV_CERT_06_04_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "216e1422-1bc4-4b99-a63c-63afc0e26521", "type": "STRING", - "value": "Check that the IUT discards a message when the circular region restriction of the signing certificate is outside of the validity restrictions of the issuing certificate.\r\n" + "value": "Check that the IUT discards a message when the signing certificate of this message contains circular region validity restriction which is outside of the circular region validity restriction of its issuing certificate\r\n" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_06/TP_SEC_ITSS_RCV_CERT_06_05_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_06/TP_SEC_ITSS_RCV_CERT_06_05_BO.json index 2b078793d5dec97c59f66c36a1dbbb3c2a35a2b6..92b9411bc8696146467605ecb223b7e13354e288 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_06/TP_SEC_ITSS_RCV_CERT_06_05_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_06/TP_SEC_ITSS_RCV_CERT_06_05_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "24a65506-8fa9-4835-9513-b6c05f66852b", "type": "STRING", - "value": "Check that the IUT discards a message when the circular region restriction of the signing certificate is not fully covered by the validity region of the issuing certificate.\r\n" + "value": "Check that the IUT discards a message when the signing certificate of this message contains circular region validity restriction which is not fully covered by the the circular region validity restriction of its issuing certificate\r\n\r\n" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_07.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_07.json index 63c1408f22617a575737989f08e89067277da814..c17997dcbcd2f5aa2eb8ee1e3f7b44b67f5e0f4b 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_07.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_07.json @@ -15,13 +15,16 @@ "value": "\r\n" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "e2057955-7a09-484a-ae5a-e7f034f29ec8", "type": "LIST", "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/f727674f-3a77-4e61-877b-e5d2d9f5dc55", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/a7eb2f2c-4f29-4ac4-a390-68308a532c8e" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/a7eb2f2c-4f29-4ac4-a390-68308a532c8e", + "/Documents/ts_103097v010201p.xhtml/5e9ae933-303e-4fa9-8a48-436757e98ab9", + "/Documents/ts_103097v010201p.xhtml/69c806d3-882e-43b1-b8fe-6dc0c8d1da4c" ] }, "_name": { @@ -31,6 +34,13 @@ "type": "STRING", "value": "07. Check rectangular region of subordinate certificate" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "e2057955-7a09-484a-ae5a-e7f034f29ec8", + "type": "STRING", + "value": "COMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_07/TP_SEC_ITSS_RCV_CERT_07_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_07/TP_SEC_ITSS_RCV_CERT_07_01_BV.json index 75bed175df767a7582b662ba38e8a1111d4292d4..0ff0d7bbe105f5ac589286d7a9950a16cd3dee43 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_07/TP_SEC_ITSS_RCV_CERT_07_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_07/TP_SEC_ITSS_RCV_CERT_07_01_BV.json @@ -10,9 +10,9 @@ "_description": { "isGenerated": false, "key": "_description", - "origin": "bae323f3-be36-4b2c-a8ff-79b3e83f57aa", + "origin": "31a45b1a-dfc1-4711-a450-f9b3003351db", "type": "STRING", - "value": "Check that the IUT accepts a message when its signing certificate contain the same region restriction like the issuing certificate.\r\n" + "value": "Check that the IUT accepts a message when the signing certificate of this message contains the same rectangular region validity restriction as its issuing certificate\r\n" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_07/TP_SEC_ITSS_RCV_CERT_07_02_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_07/TP_SEC_ITSS_RCV_CERT_07_02_BV.json index 5c61ea9fc888279d17561200848c390308b73219..a8f4bad83ab12339f738be9356ef0e1990223100 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_07/TP_SEC_ITSS_RCV_CERT_07_02_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_07/TP_SEC_ITSS_RCV_CERT_07_02_BV.json @@ -10,9 +10,9 @@ "_description": { "isGenerated": false, "key": "_description", - "origin": "4e8775a2-cc08-4938-bb8f-881b3114dd2d", + "origin": "37db409a-d958-4970-80ef-088e908ae516", "type": "STRING", - "value": "Check that the IUT accepts a message when its signing certificate contain the smaller region restriction then the issuing certificate.\r\n" + "value": "Check that the IUT accepts a message when the signing certificate of this message contains the validity restriction with rectangular region which is fully inside in the rectangular region validity restriction of its issuing certificate\r\n" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_07/TP_SEC_ITSS_RCV_CERT_07_03_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_07/TP_SEC_ITSS_RCV_CERT_07_03_BO.json index 3b44b40bf3cb77be67bbd7c10c410c1a09b10fe6..06ca23a9997fefca675e6330180272692b773b41 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_07/TP_SEC_ITSS_RCV_CERT_07_03_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_07/TP_SEC_ITSS_RCV_CERT_07_03_BO.json @@ -10,9 +10,9 @@ "_description": { "isGenerated": false, "key": "_description", - "origin": "e7da8ae9-1dba-40a2-a4cb-ad7c4f3d68c6", + "origin": "0697e0ae-a0c6-42be-bbd5-63c4216f2312", "type": "STRING", - "value": "Check that the IUT discards a message when signing certificate doesn't contain a region restriction but the issuing certificate does.\r\n" + "value": "Check that the IUT discards a message when the signing certificate of this message does not contain the region validity restriction but its issuing certificate contains the rectangular region validity restriction\r\n" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_07/TP_SEC_ITSS_RCV_CERT_07_04_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_07/TP_SEC_ITSS_RCV_CERT_07_04_BO.json index acb04dfb99c60ed5c33f8a3c35bf30e3a17ce5c6..2e6c9c4a2d6c9620931a2c45e27d8aba6769fac6 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_07/TP_SEC_ITSS_RCV_CERT_07_04_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_07/TP_SEC_ITSS_RCV_CERT_07_04_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "ca8d4272-e1ac-4c3c-ab42-2ac2fea77929", "type": "STRING", - "value": "Check that the IUT discards a message when the region validity restriction of the signing certificate is outside of the validity restrictions of the issuing certificate.\r\n" + "value": "Check that the IUT discards a message when the signing certificate of this message contains rectangular region validity restriction which is outside of the rectangular region validity restriction of its issuing certificate\r\n" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_07/TP_SEC_ITSS_RCV_CERT_07_05_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_07/TP_SEC_ITSS_RCV_CERT_07_05_BO.json index a564965673564c098a565e0b7a0b3d309c28a930..ca32aca50d4802139b4691d391fced8b77985bc1 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_07/TP_SEC_ITSS_RCV_CERT_07_05_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_07/TP_SEC_ITSS_RCV_CERT_07_05_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "fbdf1fdb-5f59-4931-b644-1120fb36abce", "type": "STRING", - "value": "Check that the IUT discards a message when the region validity restriction of the signing certificate is not fully covered by the validity region of the issuing certificate.\r\n" + "value": "Check that the IUT discards a message when the signing certificate of this message contains rectangular region validity restriction which is not fully covered by the the rectangular region validity restriction of its issuing certificate\r\n" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08.json index 70c200058481f42758d9e81ddc29a5b245ddea54..5861b638b4245622a0ae5304bb838d8529988d75 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08.json @@ -15,13 +15,16 @@ "value": "\r\n" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "eda56708-128a-44e0-8d6b-abf9727642b2", "type": "LIST", "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/f727674f-3a77-4e61-877b-e5d2d9f5dc55", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/a7eb2f2c-4f29-4ac4-a390-68308a532c8e" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/a7eb2f2c-4f29-4ac4-a390-68308a532c8e", + "/Documents/ts_103097v010201p.xhtml/5e9ae933-303e-4fa9-8a48-436757e98ab9", + "/Documents/ts_103097v010201p.xhtml/69c806d3-882e-43b1-b8fe-6dc0c8d1da4c" ] }, "_name": { @@ -31,6 +34,13 @@ "type": "STRING", "value": "08. Check polygonal region of subordinate certificate" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "eda56708-128a-44e0-8d6b-abf9727642b2", + "type": "STRING", + "value": "COMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08/TP_SEC_ITSS_RCV_CERT_08_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08/TP_SEC_ITSS_RCV_CERT_08_01_BV.json index 2049de81408be88a22a19b73da3a28940e6773d4..61f0d1d1eb4b780705930184b86d8564b0fb74d0 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08/TP_SEC_ITSS_RCV_CERT_08_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08/TP_SEC_ITSS_RCV_CERT_08_01_BV.json @@ -10,9 +10,9 @@ "_description": { "isGenerated": false, "key": "_description", - "origin": "31a45b1a-dfc1-4711-a450-f9b3003351db", + "origin": "cc410d64-d480-4e2a-8ec2-029a25f508a1", "type": "STRING", - "value": "Check that the IUT accepts a message when its signing certificate contain the same region restriction like the issuing certificate.\r\n" + "value": "Check that the IUT accepts a message when the signing certificate of this message contains the same polygonal region validity restriction as its issuing certificate\r\n" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08/TP_SEC_ITSS_RCV_CERT_08_02_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08/TP_SEC_ITSS_RCV_CERT_08_02_BV.json index 7c28fea796c3d6f49743ee64dbedf2216c0bbe92..020c42c66a142cbdf45b8f9bda8fcc73d999b258 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08/TP_SEC_ITSS_RCV_CERT_08_02_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08/TP_SEC_ITSS_RCV_CERT_08_02_BV.json @@ -10,16 +10,16 @@ "_description": { "isGenerated": false, "key": "_description", - "origin": "37db409a-d958-4970-80ef-088e908ae516", + "origin": "6a0d40e5-3776-4b8f-8f3f-bf3e654ea8c4", "type": "STRING", - "value": "Check that the IUT accepts a message when its signing certificate contain the smaller region restriction then the issuing certificate.\r\n" + "value": "Check that the IUT accepts a message when the signing certificate of this message contains the polygonal region validity restriction which is fully inside in the polygonal region validity restriction of its issuing certificate\r\n" }, "_expectedResults": { "isGenerated": false, "key": "_expectedResults", "origin": "6a0d40e5-3776-4b8f-8f3f-bf3e654ea8c4", "type": "STRING", - "value": "radiuswith {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tcontaining certificate (CERT_TS_08_02_BV_AT) {\r\n\t\t\t\t\t\tcontaining validity_restrictions['region'] {\r\n\t\t\t\t\t\t\tcontaining region_type\r\n\t\t\t\t\t\t\t\tindicating 'polygon'\r\n\t\t\t\t\t\t\tcontaining polygonal_region\r\n\t\t\t\t\t\t\t\tindicating POLYGON_REGION_AT\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\t\t\treferencing to a CERT_TS_D_AA\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT accepts the message\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tcontaining certificate (CERT_TS_08_02_BV_AT) {\r\n\t\t\t\t\t\tcontaining validity_restrictions['region'] {\r\n\t\t\t\t\t\t\tcontaining region_type\r\n\t\t\t\t\t\t\t\tindicating 'polygon'\r\n\t\t\t\t\t\t\tcontaining polygonal_region\r\n\t\t\t\t\t\t\t\tindicating POLYGON_REGION_AT\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\t\t\treferencing to a CERT_TS_D_AA\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT accepts the message\r\n\t}\r\n}" }, "_status": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08/TP_SEC_ITSS_RCV_CERT_08_03_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08/TP_SEC_ITSS_RCV_CERT_08_03_BO.json index 6ec98c1ec4db35833b46094257954f43a95a228c..bff76c1df76b7b741e689cdeaa79fc796133ca2a 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08/TP_SEC_ITSS_RCV_CERT_08_03_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08/TP_SEC_ITSS_RCV_CERT_08_03_BO.json @@ -10,9 +10,9 @@ "_description": { "isGenerated": false, "key": "_description", - "origin": "0697e0ae-a0c6-42be-bbd5-63c4216f2312", + "origin": "d23516d5-decc-4282-ac27-6ef816a6cf22", "type": "STRING", - "value": "Check that the IUT discards a message when signing certificate doesn't contain a region restriction but the issuing certificate does.\r\n" + "value": "Check that the IUT discards a message when the signing certificate of this message does not contain the region validity restriction but its issuing certificate contains the polygonal region validity restriction\r\n" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08/TP_SEC_ITSS_RCV_CERT_08_04_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08/TP_SEC_ITSS_RCV_CERT_08_04_BO.json index 7339e7b96714430ac9c96b9e8cb542a0756936b7..fbbb95999a9b1e426d20b01b68619a8e0e587366 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08/TP_SEC_ITSS_RCV_CERT_08_04_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08/TP_SEC_ITSS_RCV_CERT_08_04_BO.json @@ -10,16 +10,16 @@ "_description": { "isGenerated": false, "key": "_description", - "origin": "d23516d5-decc-4282-ac27-6ef816a6cf22", + "origin": "86dd0c53-d9fb-493c-83f9-34485afb9b0f", "type": "STRING", - "value": "Check that the IUT discards a message when signing certificate doesn't contain a region restriction but the issuing certificate does.\r\n" + "value": "Check that the IUT discards a message when the signing certificate of this message contains polygonal region validity restriction containing less than 3 points\r\n" }, "_expectedResults": { "isGenerated": false, "key": "_expectedResults", "origin": "86dd0c53-d9fb-493c-83f9-34485afb9b0f", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tcontaining certificate (CERT_TS_08_04_BO_AT) {\r\n\t\t\t\t\t\tcontaining validity_restrictions['region'] {\r\n\t\t\t\t\t\t\tcontaining region_type\r\n\t\t\t\t\t\t\t\tindicating 'polygon'\r\n\t\t\t\t\t\t\tcontaining polygonal_region\r\n\t\t\t\t\t\t\t\tcontaining length\r\n\t\t\t\t\t\t\t\t\tindicating 2 \r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\t\t\treferencing to a CERT_TS_D_AA\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tcontaining certificate (CERT_TS_08_04_BO_AT) {\r\n\t\t\t\t\t\tcontaining validity_restrictions['region'] {\r\n\t\t\t\t\t\t\tcontaining region_type\r\n\t\t\t\t\t\t\t\tindicating 'polygon'\r\n\t\t\t\t\t\t\tcontaining polygonal_region\r\n\t\t\t\t\t\t\t\tcontaining length\r\n\t\t\t\t\t\t\t\t\tindicating 2\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\t\t\treferencing to a CERT_TS_D_AA\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" }, "_status": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08/TP_SEC_ITSS_RCV_CERT_08_05_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08/TP_SEC_ITSS_RCV_CERT_08_05_BO.json index 3832ce5e5b9c5349ccafce52ac012c9225e553aa..e0ec6128892872e1a6c4f7c8e4a943c6958d6adb 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08/TP_SEC_ITSS_RCV_CERT_08_05_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08/TP_SEC_ITSS_RCV_CERT_08_05_BO.json @@ -10,9 +10,9 @@ "_description": { "isGenerated": false, "key": "_description", - "origin": "ca8d4272-e1ac-4c3c-ab42-2ac2fea77929", + "origin": "143db238-29d8-4805-ba87-609984dd7c72", "type": "STRING", - "value": "Check that the IUT discards a message when the region validity restriction of the signing certificate is outside of the validity restrictions of the issuing certificate.\r\n" + "value": "Check that the IUT discards a message when the signing certificate of this message contains polygonal region validity restriction which is outside of the polygonal region validity restriction of its issuing certificate\r\n" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08/TP_SEC_ITSS_RCV_CERT_08_06_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08/TP_SEC_ITSS_RCV_CERT_08_06_BO.json index d747aed000e669a99397e2a8779899483b35b319..a9d08f5c17d0c1c53f857806d59578dbf0a8fd55 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08/TP_SEC_ITSS_RCV_CERT_08_06_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08/TP_SEC_ITSS_RCV_CERT_08_06_BO.json @@ -10,9 +10,9 @@ "_description": { "isGenerated": false, "key": "_description", - "origin": "fbdf1fdb-5f59-4931-b644-1120fb36abce", + "origin": "18b9f2c3-9500-47a3-a62f-330d3c319beb", "type": "STRING", - "value": "Check that the IUT discards a message when the region validity restriction of the signing certificate is not fully covered by the validity region of the issuing certificate.\r\n" + "value": "Check that the IUT discards a message when the signing certificate of this message contains polygonal region validity restriction which is not fully covered by the the polygonal region validity restriction of its issuing certificate\r\n" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09.json index 64b9adf70529be020a71187e8a81251c290c240c..3a0d3b465d545f309c58daccd0b2e62945ed74cf 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09.json @@ -15,6 +15,7 @@ "value": "\r\n" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "2a113f34-70ce-4f33-89a9-5436f1f6a4ce", @@ -22,7 +23,10 @@ "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/f727674f-3a77-4e61-877b-e5d2d9f5dc55", "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/a7eb2f2c-4f29-4ac4-a390-68308a532c8e", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/7f3a6b4c-ea1c-4d17-bfc9-1a6338be1b9d" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/7f3a6b4c-ea1c-4d17-bfc9-1a6338be1b9d", + "/Documents/ts_103097v010201p.xhtml/5e9ae933-303e-4fa9-8a48-436757e98ab9", + "/Documents/ts_103097v010201p.xhtml/69c806d3-882e-43b1-b8fe-6dc0c8d1da4c", + "/Documents/ts_103097v010201p.xhtml/60585f95-c23b-4663-a422-c5a12c7b17ab" ] }, "_name": { @@ -32,6 +36,13 @@ "type": "STRING", "value": "09. Check identified region of subordinate certificate" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "2a113f34-70ce-4f33-89a9-5436f1f6a4ce", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_01_BV.json index 7a338bdb8be124fd131cd9ac4037bae84cb7c185..62f60b1c91adc6c34466c9a5aed02eb0a6e6501d 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_01_BV.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "17fbdce7-b53f-4ad0-a39a-9dcd8385d15d", "type": "STRING", - "value": "Check that the IUT accepts a message when its signing certificate contains the region restriction with the same identified region without local area definition as the issuing certificate\r\n" + "value": "Check that the IUT accepts a message when its signing certificate contains the identified region validity restriction with the same identified region as the issuing certificate and without local area definition \r\n" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_02_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_02_BV.json index 8949f813f2d9702c934ea2f69099c7c30aedeb0d..ea9ce76d339beac8e086d05cae7c22494a25a50d 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_02_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_02_BV.json @@ -19,7 +19,7 @@ "key": "_description", "origin": "c52a9a0d-29b3-4720-b3d4-b6c587f4f847", "type": "STRING", - "value": "Check that the IUT accepts a message when its signing certificate contains the region restriction with the same identified region as in the issuing certificate but with the local area definition\r\n" + "value": "Check that the IUT accepts a message when its signing certificate contains the identified region validity restriction with the same identified region as the issuing certificate and with local area definition \r\n" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_03_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_03_BV.json index 6cfc5c2a8a89e02c745a9abc8b750156edb6ef0c..8c79466197c0048331604b65ddf7f8ee345a5ea0 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_03_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_03_BV.json @@ -19,7 +19,7 @@ "key": "_description", "origin": "5a72fefc-399b-4f4c-a1fc-99291a4993e7", "type": "STRING", - "value": "Check that the IUT accepts a message when its signing certificate contains the region restriction with the identified region which is less and fully covered by the id region of the issuing certificate\r\n" + "value": "Check that the IUT accepts a message when the signing certificate of the message contains the identified region validity restriction with the identified region which is fully covered by the identified region of the validity restriction of its issuing certificate\r\n" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_04_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_04_BO.json index 1488cf34a98692d73445eab69f39ddc1b2bb8058..a951d7a1cf00531b478cc53cd647c0e363de63b6 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_04_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_04_BO.json @@ -10,16 +10,16 @@ "_description": { "isGenerated": false, "key": "_description", - "origin": "0697e0ae-a0c6-42be-bbd5-63c4216f2312", + "origin": "7622345b-6151-4b29-bcf9-e46b8400637c", "type": "STRING", - "value": "Check that the IUT discards a message when signing certificate doesn't contain a region restriction but the issuing certificate does.\r\n" + "value": "Check that the IUT discards a message when the signing certificate of this message does not contain the region validity restriction but its issuing certificate contains the identified region validity restriction" }, "_expectedResults": { "isGenerated": false, "key": "_expectedResults", "origin": "7622345b-6151-4b29-bcf9-e46b8400637c", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tcontaining certificate (CERT_TS_09_04_BO_AT) {\r\n\t\t\t\t\t\tnot containing validity_restrictions['region']\r\n\t\t\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\t\t\treferencing to a CERT_TS_E_AA\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tcontaining certificate (CERT_TS_09_04_BO_AT) {\r\n\t\t\t\t\t\tnot containing validity_restrictions['region']\r\n\t\t\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\t\t\treferencing to the certificate CERT_TS_E_AA\r\n\t\t\t\t\t\t\t\tcontaining validity_restrictions['region']\r\n\t\t\t\t\t\t\t\t\tcontaining region_type\r\n\t\t\t\t\t\t\t\t\t\tindicating 'id'\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" }, "_status": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_05_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_05_BO.json index ad6884255cb6c4e1ecaa7ceed10a44c60e39a770..5dab47f9e524f29400bd17723040064ee44bdc24 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_05_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_05_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "2b3b16a1-c1e1-4636-9c9e-68a834b024f9", "type": "STRING", - "value": "Check that the IUT discards a message when the identified region of the validity restriction of the signing certificate is different than the one in the issuing certificate.\r\n" + "value": "Check that the IUT discards a message when the identified region of the validity restriction of its signing certificate is different and not fully covered by the one in the issuing certificate" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_06_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_06_BO.json index 3b5f40411418913fd876650777a8cc211ee73df8..b9c16882465a9269173cd245b6f0353d690730dd 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_06_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_06_BO.json @@ -19,7 +19,7 @@ "key": "_description", "origin": "fce1005b-fc33-4fae-bda4-9da80d3eebe1", "type": "STRING", - "value": "Check that the IUT discards a message when the identified region of the validity restriction of the signing certificate is different than the one in the issuing certificate by the local area definition\r\n" + "value": "Check that the IUT discards a message when the signing certificate and its issuing certificate are both containing the identified region validity restrictions with the same region id but different local regions\r\n" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_07_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_07_BO.json index db5f86b55e13ab942c69471a4589b32658e051eb..a5c60d56f9acd67444f690f90b4954a9e434279e 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_07_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_07_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "799a16a6-d213-4ef0-ab37-b6f54d2d92da", "type": "STRING", - "value": "Check that the IUT discards a message when the identified region of the validity restriction of the signing certificate contains unknown area code\r\n" + "value": "Check that the IUT discards a message when the identified region validity restriction of its signing certificate contains unknown area code\r\n" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_10.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_10.json index 45f0cadcdfbc483676789c609864ee75059e6c2c..a05e32e0c4000a8772299b64251494d89854abc9 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_10.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_10.json @@ -8,13 +8,16 @@ "value": "\r\n" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "f0b6f241-7910-470f-9f38-b98a4413c564", "type": "LIST", "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/cb021a09-729d-4a2a-8b11-17717bbeaf73", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/29646d66-9184-45a3-a1e6-dc84c19a3a8a" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/29646d66-9184-45a3-a1e6-dc84c19a3a8a", + "/Documents/ts_103097v010201p.xhtml/c3923a06-7523-4d02-b1e2-54db898f3d76", + "/Documents/ts_103097v010201p.xhtml/36a05750-9fac-494a-adcc-c36a9b0b39c1" ] }, "_name": { @@ -24,6 +27,13 @@ "type": "STRING", "value": "10. Check time validity restriction presence" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "f0b6f241-7910-470f-9f38-b98a4413c564", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_10/TP_SEC_ITSS_RCV_CERT_10_02_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_10/TP_SEC_ITSS_RCV_CERT_10_02_BO.json index 26e4e1c03eb682373335f0fa77be01b4a6ceb3cc..ceb042f7b07ea5a7ec0954081d07328adcfa67a8 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_10/TP_SEC_ITSS_RCV_CERT_10_02_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_10/TP_SEC_ITSS_RCV_CERT_10_02_BO.json @@ -19,7 +19,7 @@ "key": "_expectedResults", "origin": "d7dba395-7b45-4419-9623-b7858088be3e", "type": "STRING", - "value": "radiuswith {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tcontaining certificate (CERT_TS_10_02_BO_AT) {\r\n\t\t\t\t\t\tcontaining validity_restrictions['time_end']\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tcontaining certificate (CERT_TS_10_02_BO_AT) {\r\n\t\t\t\t\t\tcontaining validity_restrictions['time_end']\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" }, "_status": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_10/TP_SEC_ITSS_RCV_CERT_10_03_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_10/TP_SEC_ITSS_RCV_CERT_10_03_BO.json index 137bbd3a88e0e3e286f7ef9bd644b272f76f40d6..d2d8426ce9747ca1eea023e4c1f25d8aef6d9daf 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_10/TP_SEC_ITSS_RCV_CERT_10_03_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_10/TP_SEC_ITSS_RCV_CERT_10_03_BO.json @@ -19,7 +19,7 @@ "key": "_expectedResults", "origin": "feb8dd32-d942-42dd-b5f6-6baa90a44f9f", "type": "STRING", - "value": "radiuswith {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tcontaining certificate (CERT_TS_10_03_BO_AT) {\r\n\t\t\t\t\t\tcontaining validity_restrictions['time_start_and_duration']\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tcontaining certificate (CERT_TS_10_03_BO_AT) {\r\n\t\t\t\t\t\tcontaining validity_restrictions['time_start_and_duration']\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" }, "_status": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_11.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_11.json index a9f27f4a5a8d86f3d113cd6cea6c162343cefb77..8a960067be802f72c615d8142cebbd408033eb1b 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_11.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_11.json @@ -8,11 +8,15 @@ "value": "\r\n" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "72ea145a-4e6d-4a28-9ff4-74f47e356dc5", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/e0f22d25-281c-45ec-8cca-4c6028029dc3"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/e0f22d25-281c-45ec-8cca-4c6028029dc3", + "/Documents/ts_103097v010201p.xhtml/99a86360-2aa2-4fad-82d3-015c9fa9345d" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "11. Check time validity restriction conforming to the issuing certificate" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "72ea145a-4e6d-4a28-9ff4-74f47e356dc5", + "type": "STRING", + "value": "COMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_12.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_12.json index 14e9c6d2d970e38d04aad904f21f3435912e824f..8e79053ac1a56a20b064c09f942c3e0bf17059d3 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_12.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_12.json @@ -8,11 +8,15 @@ "value": "\r\n" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "39408838-7f8d-467f-a38b-2f6de227952f", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/6ff77750-4e3f-47e3-8261-73ad6d944a77"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/6ff77750-4e3f-47e3-8261-73ad6d944a77", + "/Documents/ts_103097v010201p.xhtml/e2949dcb-7e0a-4104-92df-2c29945c7486" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "12. Check AID subject attribute presence" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "39408838-7f8d-467f-a38b-2f6de227952f", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_12/TP_SEC_ITSS_RCV_CERT_12_02_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_12/TP_SEC_ITSS_RCV_CERT_12_02_BO.json index fe2436a4fc2fe404a510332b5072b0cd9968c1d8..bfa5bf1c6bdf07375aaf314c6d74cb397d736b8d 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_12/TP_SEC_ITSS_RCV_CERT_12_02_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_12/TP_SEC_ITSS_RCV_CERT_12_02_BO.json @@ -12,14 +12,14 @@ "key": "_description", "origin": "bf91278c-506d-4a9e-a67c-6f8cac7c5f77", "type": "STRING", - "value": "Check that the IUT discards a Secured CAM when its signing certificate doesn't contain an AID_CAM record in the its_aid_ssp_list subject attribute\r\n" + "value": "Check that the IUT discards a Secured CAM when its signing certificate does not contain a record with AID_CAM in the its_aid_ssp_list subject attribute " }, "_expectedResults": { "isGenerated": false, "key": "_expectedResults", "origin": "bf91278c-506d-4a9e-a67c-6f8cac7c5f77", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a Secured CAM {\r\n\t\t\tcontaining header_fields ['its_aid'] {\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_CAM' (16512)\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tcontaining certificate (CERT_TS_12_02_BO_AT) {\r\n\t\t\t\t\t\tcontaining subject_attributes['its_aid_ssp_list']\r\n\t\t\t\t\t\t\tnot containing an item\r\n\t\t\t\t\t\t\t\tcontaining its_aid\r\n\t\t\t\t\t\t\t\t\tindicating 'AID_CAM' (16512)\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a Secured CAM {\r\n\t\t\tcontaining header_fields ['its_aid'] {\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_CAM'\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tcontaining certificate (CERT_TS_12_02_BO_AT) {\r\n\t\t\t\t\t\tcontaining subject_attributes['its_aid_ssp_list']\r\n\t\t\t\t\t\t\tnot containing an item\r\n\t\t\t\t\t\t\t\tcontaining its_aid\r\n\t\t\t\t\t\t\t\t\tindicating 'AID_CAM'\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" }, "_status": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_12/TP_SEC_ITSS_RCV_CERT_12_03_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_12/TP_SEC_ITSS_RCV_CERT_12_03_BO.json index adaa7e3cf88474ebcdb5111e24ef94d6902ffc6f..470bb8b40775fdf72181a47a7ea0915c9096f29b 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_12/TP_SEC_ITSS_RCV_CERT_12_03_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_12/TP_SEC_ITSS_RCV_CERT_12_03_BO.json @@ -12,14 +12,14 @@ "key": "_description", "origin": "41294566-8787-4cd9-8e86-4fa788f38613", "type": "STRING", - "value": "Check that the IUT discards a Secured DENM when the signing certificate doesn't contain an AID_DENM record in its_aid_ssp_list subject attribute\r\n" + "value": "Check that the IUT discards a Secured DENM when its signing certificate does not contain a record with AID_DENM in the its_aid_ssp_list subject attribute\r\n" }, "_expectedResults": { "isGenerated": false, "key": "_expectedResults", "origin": "41294566-8787-4cd9-8e86-4fa788f38613", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a Secured DENM {\r\n\t\t\tcontaining header_fields ['its_aid'] {\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_DENM' (16513)\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tcontaining certificate (CERT_TS_12_03_BO_AT) {\r\n\t\t\t\t\t\tcontaining subject_attributes['its_aid_ssp_list']\r\n\t\t\t\t\t\t\tnot containing an item\r\n\t\t\t\t\t\t\t\tcontaining its_aid\r\n\t\t\t\t\t\t\t\t\tindicating 'AID_DENM' (16513)\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a Secured DENM {\r\n\t\t\tcontaining header_fields ['its_aid'] {\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tcontaining certificate (CERT_TS_12_03_BO_AT) {\r\n\t\t\t\t\t\tcontaining subject_attributes['its_aid_ssp_list']\r\n\t\t\t\t\t\t\tnot containing an item\r\n\t\t\t\t\t\t\t\tcontaining its_aid\r\n\t\t\t\t\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" }, "_status": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_13.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_13.json index 6e5677a94672397968518935377578ee534c2ad8..b053fe788de2e7a7d580f7780105edee64257cd2 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_13.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_13.json @@ -8,11 +8,15 @@ "value": "\r\n" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "653ff300-7362-4acf-88f0-8fa11888cc51", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/77ca71c9-2055-4b9a-82ca-f5d720208b17"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/77ca71c9-2055-4b9a-82ca-f5d720208b17", + "/Documents/ts_103097v010201p.xhtml/8a319e13-50a8-4e29-a775-30d3853d05f0" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "13. Check AID-SSP subject attribute value conforming to the issuing certificate" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "653ff300-7362-4acf-88f0-8fa11888cc51", + "type": "STRING", + "value": "COMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_13/TP_SEC_ITSS_RCV_CERT_13_01_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_13/TP_SEC_ITSS_RCV_CERT_13_01_BO.json index 56f609996a181e6a569d0ce9ef25d8e1e6543fc7..f3953e18d590f63cf4ffe9fa92d471457f9402eb 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_13/TP_SEC_ITSS_RCV_CERT_13_01_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_13/TP_SEC_ITSS_RCV_CERT_13_01_BO.json @@ -12,14 +12,14 @@ "key": "_description", "origin": "5f117a44-fc62-47ed-becf-122a99cf7739", "type": "STRING", - "value": "Check that the IUT discards a message when the signing AT certificate contains an CAM AID-SSP record whereas the issuing AA certificate doesn't contain the CAM record.\r\n" + "value": "Check that the IUT discards a message when the signing AT certificate contains a CAM AID-SSP record whereas the issuing AA certificate does not contain the record with AID_CAM" }, "_expectedResults": { "isGenerated": false, "key": "_expectedResults", "origin": "5f117a44-fc62-47ed-becf-122a99cf7739", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a Secured CAM {\r\n\t\t\tcontaining header_fields ['signer_info'].signer.certificate (CERT_TS_13_01_BO_AT) {\r\n\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\treferencing to CERT_TS_13_01_BO_AA\r\n\t\t\t\t\t\tcontaining subject_attributes['its_aid_list']\r\n\t\t\t\t\t\t\tnot containing AID_CAM\r\n\t\t\t\tcontaining subject_attributes['its_aid_ssp_list']\r\n\t\t\t\t\tcontaining a record\r\n\t\t\t\t\t\tcontaining its_aid\r\n\t\t\t\t\t\t\tindicating AID_CAM\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a Secured CAM {\r\n\t\t\tcontaining header_fields ['signer_info'].signer.certificate (CERT_TS_13_01_BO_AT) {\r\n\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\treferencing to CERT_TS_13_01_BO_AA\r\n\t\t\t\t\t\tcontaining subject_attributes['its_aid_list']\r\n\t\t\t\t\t\t\tnot containing 'AID_CAM'\r\n\t\t\t\tcontaining subject_attributes['its_aid_ssp_list']\r\n\t\t\t\t\tcontaining a record\r\n\t\t\t\t\t\tcontaining its_aid\r\n\t\t\t\t\t\t\tindicating 'AID_CAM'\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" }, "_status": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_13/TP_SEC_ITSS_RCV_CERT_13_02_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_13/TP_SEC_ITSS_RCV_CERT_13_02_BO.json index ed118d0dc678e9d4cf609b5a0fb873fbf1f57b97..bb12e8f0ccc03a99a6f1a721934357ffae062b20 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_13/TP_SEC_ITSS_RCV_CERT_13_02_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_13/TP_SEC_ITSS_RCV_CERT_13_02_BO.json @@ -12,14 +12,14 @@ "key": "_description", "origin": "63083cc3-f6f7-447b-9220-6dba00166544", "type": "STRING", - "value": "Check that the IUT discards a message when the signing AT certificate contains an DENM AID-SSP record whereas the issuing AA certificate doesn't contain the DENM record.\r\n" + "value": "Check that the IUT discards a message when the signing AT certificate contains a DENM AID-SSP record whereas the issuing AA certificate does not contain the record with AID_DENM" }, "_expectedResults": { "isGenerated": false, "key": "_expectedResults", "origin": "63083cc3-f6f7-447b-9220-6dba00166544", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a Secured DENM {\r\n\t\t\tcontaining header_fields ['signer_info'].signer.certificate (CERT_TS_13_02_BO_AT) {\r\n\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\treferencing to CERT_TS_13_02_BO_AA\r\n\t\t\t\t\t\tcontaining subject_attributes['its_aid_list']\r\n\t\t\t\t\t\t\tnot containing AID_DENM\r\n\t\t\t\tcontaining subject_attributes['its_aid_ssp_list']\r\n\t\t\t\t\tcontaining a record\r\n\t\t\t\t\t\tcontaining its_aid\r\n\t\t\t\t\t\t\tindicating AID_DENM\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a Secured DENM {\r\n\t\t\tcontaining header_fields ['signer_info'].signer.certificate (CERT_TS_13_02_BO_AT) {\r\n\t\t\t\tcontaining signer_info.digest\r\n\t\t\t\t\treferencing to CERT_TS_13_02_BO_AA\r\n\t\t\t\t\t\tcontaining subject_attributes['its_aid_list']\r\n\t\t\t\t\t\t\tnot containing 'AID_DENM'\r\n\t\t\t\tcontaining subject_attributes['its_aid_ssp_list']\r\n\t\t\t\t\tcontaining a record\r\n\t\t\t\t\t\tcontaining its_aid\r\n\t\t\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" }, "_status": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM.json index 61973ad1f269bf5f2b39059e0030478fa9307135..d36ea8d0bf522716c0efd1aaeefbf71db622f09e 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM.json @@ -1,11 +1,15 @@ { "attributes": { "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "579a4b1a-db3b-4ed7-9ffe-9399f039431b", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/84d2bdc6-985e-48eb-b396-6b9a7c047ca2"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/84d2bdc6-985e-48eb-b396-6b9a7c047ca2", + "/Documents/ts_103097v010201p.xhtml/fd2e4af3-d17f-4622-a387-1c5bdbc338c2" + ] }, "_name": { "isGenerated": false, @@ -14,6 +18,13 @@ "type": "STRING", "value": "DENM Profile" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "579a4b1a-db3b-4ed7-9ffe-9399f039431b", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01.json index 321250052115aa3ab9e246672349a841d2fc7dd8..037da144eeb6049c00a3658626cb91ef106f816f 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01.json @@ -1,11 +1,15 @@ { "attributes": { "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "6e7f2fbc-2a82-4a8d-af20-4818cafabbd0", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/84d2bdc6-985e-48eb-b396-6b9a7c047ca2"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/84d2bdc6-985e-48eb-b396-6b9a7c047ca2", + "/Documents/ts_103097v010201p.xhtml/fd2e4af3-d17f-4622-a387-1c5bdbc338c2" + ] }, "_name": { "isGenerated": false, @@ -14,6 +18,13 @@ "type": "STRING", "value": "01. Check that IUT accepts well-formed Secured DENM" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "6e7f2fbc-2a82-4a8d-af20-4818cafabbd0", + "type": "STRING", + "value": "COMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01/TP_SEC_ITSS_RCV_DENM_01_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01/TP_SEC_ITSS_RCV_DENM_01_01_BV.json index 63982419f55f3ddb7cc40835a74c54e2cf1708d1..8b23a36360e10b0703d73da1011eab8b030e293e 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01/TP_SEC_ITSS_RCV_DENM_01_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01/TP_SEC_ITSS_RCV_DENM_01_01_BV.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "673a7e75-6b3a-467e-9a1d-43df58b157c8", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "673a7e75-6b3a-467e-9a1d-43df58b157c8", "type": "STRING", - "value": "Check that IUT accepts a well-formed Secured DENM signe with the certificate without region validity restriction" + "value": "Check that IUT accepts a well-formed Secured DENM signed with the certificate without region validity restriction" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "673a7e75-6b3a-467e-9a1d-43df58b157c8", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage\r\n\t\t\tcontaining header_fields[0]\r\n\t\t\t\tcontaining type \r\n\t\t\t\t\tindicating 'signer_info'\r\n\t\t\t\tand containing signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tand containing certificate (CERT_TS_AT_A) {\r\n\t\t\t\t\t\tcontaining subject_info.subject_type\r\n\t\t\t\t\t\t\tindicating 'authorization_ticket' (2)\r\n\t\t\t\t\t\tand containing subject_attributes['verification key']\r\n\t\t\t\t\t\t\tcontaining key (KEY)\r\n\t\t\t\t\t\tand not containing validity_restrictions['region']\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\tand containing header_fields [1]\r\n\t\t\t\tcontaining type \r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating CURRENT_TIME\r\n\t\t\tand containing header_fields [2]\r\n\t\t\t\tcontaining type \r\n\t\t\t\t\tindicating 'generation_location'\r\n\t\t\t\tcontaining generation_location\r\n\t\t\tand containing header_fields[3]\r\n\t\t\t\tcontaining type \r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\tand containing payload_field {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'signed'\r\n\t\t\t\tcontaining data\r\n\t\t\t\t\tindicating length > 0\r\n\t\t\t\t\tcontaining DENM payload\r\n\t\t\t}\r\n\t\t\tand containing trailer_fields {\r\n\t\t\t\tcontaining single instance of type TrailerField {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'signature'\r\n\t\t\t\t\tcontaining signature\r\n\t\t\t\t\t\tverifiable using KEY\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t} then {\r\n\t\tthe IUT accepts the message\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "673a7e75-6b3a-467e-9a1d-43df58b157c8", "type": "STRING", "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "673a7e75-6b3a-467e-9a1d-43df58b157c8", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01/TP_SEC_ITSS_RCV_DENM_01_02_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01/TP_SEC_ITSS_RCV_DENM_01_02_BV.json index 723a29edf4263659df2baa7662e5dbfc6ad3be7b..0c7e364e9ef1dae3b6d83ecb3335a4dfe42cc466 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01/TP_SEC_ITSS_RCV_DENM_01_02_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01/TP_SEC_ITSS_RCV_DENM_01_02_BV.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "e3f945b5-7f82-4aea-b44f-ff764eae3453", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "e3f945b5-7f82-4aea-b44f-ff764eae3453", "type": "STRING", - "value": "Check that IUT accepts a well-formed Secured DENM signe with the certificate with a circular region validity restriction" + "value": "Check that IUT accepts a well-formed Secured DENM signed with the certificate with a circular region validity restriction" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "e3f945b5-7f82-4aea-b44f-ff764eae3453", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage\r\n\t\t\tand containing header_fields[0]\r\n\t\t\t\tcontaining type \r\n\t\t\t\t\tindicating 'signer_info'\r\n\t\t\t\tand containing signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tand containing certificate (CERT_AT_B) {\r\n\t\t\t\t\t\tcontaining subject_info.subject_type\r\n\t\t\t\t\t\t\tindicating 'authorization_ticket' (2)\r\n\t\t\t\t\t\tand containing subject_attributes['verification key'] (KEY)\r\n\t\t\t\t\t\tand containing validity_restrictions['region'] {\r\n\t\t\t\t\t\t\tcontaining region{\r\n\t\t\t\t\t\t\t\tcontaining region_type\r\n\t\t\t\t\t\t\t\t\tindicating 'circle'\r\n\t\t\t\t\t\t\t\tand containing circular_region\r\n\t\t\t\t\t\t\t\t\tindicating REGION\r\n\t\t\t\t\t\t\t}\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\tand containing header_fields [1]\r\n\t\t\t\tcontaining type \r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating CURRENT_TIME\r\n\t\t\tand containing header_fields [2]\r\n\t\t\t\tcontaining type \r\n\t\t\t\t\tindicating 'generation_location'\r\n\t\t\t\tcontaining generation_location\r\n\t\t\t\t\tindicating position inside the REGION\r\n\t\t\tand containing header_fields[3]\r\n\t\t\t\tcontaining type \r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\tand not containing any other header_fields\r\n\t\t\tand containing payload_fields {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'signed'\r\n\t\t\t\tcontaining data\r\n\t\t\t\t\tindicating length > 0\r\n\t\t\t\t\tcontaining DENM payload\r\n\t\t\t}\r\n\t\t\tand containing trailer_fields {\r\n\t\t\t\tcontaining single instance of type TrailerField {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'signature'\r\n\t\t\t\t\tcontaining signature\r\n\t\t\t\t\t\tverifiable using KEY\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t} then {\r\n\t\tthe IUT accepts the message\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "e3f945b5-7f82-4aea-b44f-ff764eae3453", "type": "STRING", "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "e3f945b5-7f82-4aea-b44f-ff764eae3453", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01/TP_SEC_ITSS_RCV_DENM_01_03_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01/TP_SEC_ITSS_RCV_DENM_01_03_BV.json index 52aea180264b60a01b271eb7ff69fdec84764bf5..5e61379781b927ca9de71d200922a72ff76b8689 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01/TP_SEC_ITSS_RCV_DENM_01_03_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01/TP_SEC_ITSS_RCV_DENM_01_03_BV.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "589bfd90-5e66-4f74-a434-c9f54acc4a7e", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "589bfd90-5e66-4f74-a434-c9f54acc4a7e", "type": "STRING", - "value": "Check that IUT accepts a well-formed Secured DENM signe with the certificate with a rectangular region validity restriction" + "value": "Check that IUT accepts a well-formed Secured DENM signed with the certificate with a rectangular region validity restriction" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "589bfd90-5e66-4f74-a434-c9f54acc4a7e", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage\r\n\t\t\tcontaining protocol_version \r\n\t\t\t\tindicating value '2'\r\n\t\t\tand containing header_fields[0]\r\n\t\t\t\tcontaining type \r\n\t\t\t\t\tindicating 'signer_info'\r\n\t\t\t\tand containing signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tand containing certificate (CERT_AT_C) {\r\n\t\t\t\t\t\tcontaining subject_info.subject_type\r\n\t\t\t\t\t\t\tindicating 'authorization_ticket' (2)\r\n\t\t\t\t\t\tand containing subject_attributes['verification key'] (KEY)\r\n\t\t\t\t\t\tand containing validity_restrictions['region'] {\r\n\t\t\t\t\t\t\tcontaining region{\r\n\t\t\t\t\t\t\t\tcontaining region_type\r\n\t\t\t\t\t\t\t\t\tindicating 'rectangle'\r\n\t\t\t\t\t\t\t\tand containing rectangular_regions\r\n\t\t\t\t\t\t\t\t\tindicating REGIONS\r\n\t\t\t\t\t\t\t}\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\tand containing header_fields [1]\r\n\t\t\t\tcontaining type \r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating CURRENT_TIME\r\n\t\t\tand containing header_fields [2]\r\n\t\t\t\tcontaining type \r\n\t\t\t\t\tindicating 'generation_location'\r\n\t\t\t\tcontaining generation_location\r\n\t\t\t\t\tindicating position inside the REGION\r\n\t\t\tand containing header_fields[3]\r\n\t\t\t\tcontaining type \r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\tand not containing any other header_fields\r\n\t\t\tand containing payload_field {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'signed'\r\n\t\t\t\tcontaining data\r\n\t\t\t\t\tindicating length > 0\r\n\t\t\t\t\tcontaining DENM payload\r\n\t\t\t}\r\n\t\t\tand containing trailer_fields {\r\n\t\t\t\tcontaining single instance of type TrailerField {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'signature'\r\n\t\t\t\t\tcontaining signature\r\n\t\t\t\t\t\tverifiable using KEY\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t} then {\r\n\t\tthe IUT accepts the message\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "589bfd90-5e66-4f74-a434-c9f54acc4a7e", "type": "STRING", "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "589bfd90-5e66-4f74-a434-c9f54acc4a7e", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01/TP_SEC_ITSS_RCV_DENM_01_04_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01/TP_SEC_ITSS_RCV_DENM_01_04_BV.json index 1a145dc672e13f6a05664eb9af3d8b4bec58dd23..a645e3338a8999c4999ed01eb73c392c7d727e1b 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01/TP_SEC_ITSS_RCV_DENM_01_04_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01/TP_SEC_ITSS_RCV_DENM_01_04_BV.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "f702ee4b-c417-4bdc-976c-5071749f76c5", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "f702ee4b-c417-4bdc-976c-5071749f76c5", "type": "STRING", - "value": "Check that IUT accepts a well-formed Secured DENM signe with the certificate with a polygonal region validity restriction" + "value": "Check that IUT accepts a well-formed Secured DENM signed with the certificate with a polygonal region validity restriction" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "f702ee4b-c417-4bdc-976c-5071749f76c5", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage\r\n\t\t\tcontaining protocol_version \r\n\t\t\t\tindicating value '2'\r\n\t\t\tand containing header_fields[0]\r\n\t\t\t\tcontaining type \r\n\t\t\t\t\tindicating 'signer_info'\r\n\t\t\t\tand containing signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tand containing certificate (CERT_AT_D) {\r\n\t\t\t\t\t\tcontaining subject_info.subject_type\r\n\t\t\t\t\t\t\tindicating 'authorization_ticket' (2)\r\n\t\t\t\t\t\tand containing subject_attributes['verification key'] (KEY)\r\n\t\t\t\t\t\tand containing validity_restrictions['region'] {\r\n\t\t\t\t\t\t\tcontaining region{\r\n\t\t\t\t\t\t\t\tcontaining region_type\r\n\t\t\t\t\t\t\t\t\tindicating 'polygon'\r\n\t\t\t\t\t\t\t\tand containing polygonal_region\r\n\t\t\t\t\t\t\t\t\tindicating REGION\r\n\t\t\t\t\t\t\t}\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\tand containing header_fields [1]\r\n\t\t\t\tcontaining type \r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating CURRENT_TIME\r\n\t\t\tand containing header_fields [2]\r\n\t\t\t\tcontaining type \r\n\t\t\t\t\tindicating 'generation_location'\r\n\t\t\t\tcontaining generation_location\r\n\t\t\t\t\tindicating position inside the REGION\r\n\t\t\tand containing header_fields[3]\r\n\t\t\t\tcontaining type \r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\tand not containing any other header_fields\r\n\t\t\tand containing payload_field {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'signed'\r\n\t\t\t\tcontaining data\r\n\t\t\t\t\tindicating length > 0\r\n\t\t\t\t\tcontaining DENM payload\r\n\t\t\t}\r\n\t\t\tand containing trailer_fields {\r\n\t\t\t\tcontaining single instance of type TrailerField {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'signature'\r\n\t\t\t\t\tcontaining signature\r\n\t\t\t\t\t\tverifiable using KEY\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t} then {\r\n\t\tthe IUT accepts the message\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "f702ee4b-c417-4bdc-976c-5071749f76c5", "type": "STRING", "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "f702ee4b-c417-4bdc-976c-5071749f76c5", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01/TP_SEC_ITSS_RCV_DENM_01_05_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01/TP_SEC_ITSS_RCV_DENM_01_05_BV.json index 10840faadc717d010a7ca50382cc6c404fedf035..22e8685afd7d5c24ab1cbd4413425dac87862178 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01/TP_SEC_ITSS_RCV_DENM_01_05_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01/TP_SEC_ITSS_RCV_DENM_01_05_BV.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "049358bc-e0eb-46e8-925e-d794fb54bf73", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "049358bc-e0eb-46e8-925e-d794fb54bf73", "type": "STRING", - "value": "Check that IUT accepts a well-formed Secured DENM signe with the certificate with a identified region validity restriction" + "value": "Check that IUT accepts a well-formed Secured DENM signed with the certificate with a identified region validity restriction" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "049358bc-e0eb-46e8-925e-d794fb54bf73", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage\r\n\t\t\tcontaining protocol_version \r\n\t\t\t\tindicating value '2'\r\n\t\t\tand containing header_fields[0]\r\n\t\t\t\tcontaining type \r\n\t\t\t\t\tindicating 'signer_info'\r\n\t\t\t\tand containing signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tand containing certificate (CERT_AT_E) {\r\n\t\t\t\t\t\tcontaining subject_info.subject_type\r\n\t\t\t\t\t\t\tindicating 'authorization_ticket' (2)\r\n\t\t\t\t\t\tand containing subject_attributes['verification key'] (KEY)\r\n\t\t\t\t\t\tand containing validity_restrictions['region'] {\r\n\t\t\t\t\t\t\tcontaining region{\r\n\t\t\t\t\t\t\t\tcontaining region_type\r\n\t\t\t\t\t\t\t\t\tindicating 'id_region'\r\n\t\t\t\t\t\t\t\tand containing identified_region\r\n\t\t\t\t\t\t\t\t\tindicating REGION\r\n\t\t\t\t\t\t\t}\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\tand containing header_fields [1]\r\n\t\t\t\tcontaining type \r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating CURRENT_TIME\r\n\t\t\tand containing header_fields [2]\r\n\t\t\t\tcontaining type \r\n\t\t\t\t\tindicating 'generation_location'\r\n\t\t\t\tcontaining generation_location\r\n\t\t\t\t\tindicating position inside the REGION\r\n\t\t\tand containing header_fields[3]\r\n\t\t\t\tcontaining type \r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\tand not containing any other header_fields\r\n\t\t\tand containing payload_field {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'signed'\r\n\t\t\t\tcontaining data\r\n\t\t\t\t\tindicating length > 0\r\n\t\t\t\t\tcontaining DENM payload\r\n\t\t\t}\r\n\t\t\tand containing trailer_fields {\r\n\t\t\t\tcontaining single instance of type TrailerField {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'signature'\r\n\t\t\t\t\tcontaining signature\r\n\t\t\t\t\t\tverifiable using KEY\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t} then {\r\n\t\tthe IUT accepts the message\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "049358bc-e0eb-46e8-925e-d794fb54bf73", "type": "STRING", "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "049358bc-e0eb-46e8-925e-d794fb54bf73", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_02.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_02.json index 7a35c8049a8cd9e30144f032976dcd06a72e8bed..24bc416480e136b781f5b25b5ca79c342680effc 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_02.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_02.json @@ -8,11 +8,15 @@ "value": "Check that ITS-S discards a Secured CAM containing protocol version unequal to 2" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "9c26c7a6-660b-4a80-97a3-ec6901030dc6", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/da6b3098-07d5-49aa-876f-6ae437a945ef"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/da6b3098-07d5-49aa-876f-6ae437a945ef", + "/Documents/ts_103097v010201p.xhtml/58ea9176-dfab-4645-a9a2-855e9d5d57dc" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "02. Check the message protocol version" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "9c26c7a6-660b-4a80-97a3-ec6901030dc6", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_02/TP_SEC_ITSS_RCV_DENM_02_01_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_02/TP_SEC_ITSS_RCV_DENM_02_01_BO.json index 61c8ca0b0c23a96fa377edc4fb1c059a7dd538b0..1c68c4de9778ff6bb531157454cb855545c98481 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_02/TP_SEC_ITSS_RCV_DENM_02_01_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_02/TP_SEC_ITSS_RCV_DENM_02_01_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "4f4f0126-cec0-45bc-b4cd-186c05b4f7d4", "type": "STRING", "value": "bissmeye" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "4f4f0126-cec0-45bc-b4cd-186c05b4f7d4", "type": "STRING", - "value": "Check that IUT discards a Secured DENM containing protocol version set to a value less then 2" + "value": "Check that IUT discards a Secured DENM containing protocol version set to a value less than 2" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "4f4f0126-cec0-45bc-b4cd-186c05b4f7d4", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (DENM)\r\n\t\t\tcontaining protocol_version \r\n\t\t\t\tindicating 1\r\n\t\t\tcontaining header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_DENM'\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "4f4f0126-cec0-45bc-b4cd-186c05b4f7d4", "type": "STRING", "value": "in process" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "4f4f0126-cec0-45bc-b4cd-186c05b4f7d4", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_02/TP_SEC_ITSS_RCV_DENM_02_02_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_02/TP_SEC_ITSS_RCV_DENM_02_02_BO.json index b311ae8d77eef4d32adc1bcd9f0c36a06269b052..2b109a912af68af40c921374deb49af6ecb70d34 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_02/TP_SEC_ITSS_RCV_DENM_02_02_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_02/TP_SEC_ITSS_RCV_DENM_02_02_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "a133ee8b-8259-4b6f-92bf-c9330743bc8d", "type": "STRING", "value": "bissmeye" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "a133ee8b-8259-4b6f-92bf-c9330743bc8d", "type": "STRING", - "value": "Check that IUT discards a Secured DENM containing protocol version set to a value greater then 2" + "value": "Check that IUT discards a Secured DENM containing protocol version set to a value greater than 2" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "a133ee8b-8259-4b6f-92bf-c9330743bc8d", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (DENM)\r\n\t\t\tcontaining protocol_version \r\n\t\t\t\tindicating 3\r\n\t\t\tcontaining header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_DENM'\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "a133ee8b-8259-4b6f-92bf-c9330743bc8d", "type": "STRING", "value": "in process" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "a133ee8b-8259-4b6f-92bf-c9330743bc8d", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04.json index 84c9bb2552426656205e068aff32fca513c4b2df..d502f14b8568c3de8433b0aee2a6dee34791c21b 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04.json @@ -8,6 +8,7 @@ "value": "Check that the IUT discards Secured DENM containing wrong elements of the header fields\r\nCheck that optinal header fields are allowed" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "a115fcd3-46c3-494a-af0f-581cd67bdc97", @@ -16,7 +17,11 @@ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/799453d2-bd40-419c-8aaa-44324115ffa4", "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/7cde7fb9-8e4b-422b-8f40-c77527b6898a", "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/3ada8c64-2b8f-4fd7-a8c9-2a3bf53330f9", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/cb8d49a9-9491-4b08-99e8-cd61f76a52aa" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/cb8d49a9-9491-4b08-99e8-cd61f76a52aa", + "/Documents/ts_103097v010201p.xhtml/322e2d54-6950-4e35-856e-87281b4b3aa6", + "/Documents/ts_103097v010201p.xhtml/6694e8a1-e064-4703-a0d5-c44221f8cfb4", + "/Documents/ts_103097v010201p.xhtml/cdc87f4d-d678-4dab-83bf-eff2d82483d8", + "/Documents/ts_103097v010201p.xhtml/6c62596c-7b03-4d58-8b8a-d91ebad153f1" ] }, "_name": { @@ -26,6 +31,13 @@ "type": "STRING", "value": "04. Check header fields" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "a115fcd3-46c3-494a-af0f-581cd67bdc97", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_01_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_01_BO.json index 79e43a3205ccbf669dd126d0eab477a3e654c754..4510f1e5a8e1c20af45c9049d801caf6d761c2f8 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_01_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_01_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "6496964d-c6e2-4d8c-ace1-e5d8ba73d533", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "6496964d-c6e2-4d8c-ace1-e5d8ba73d533", "type": "STRING", - "value": "Check that IUT discards a secured DENM if the header_fields contain more than one element of header field type: signer_info" + "value": "Check that IUT discards a secured DENM if the header_fields contains more than one element of header field type: signer_info" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "6496964d-c6e2-4d8c-ace1-e5d8ba73d533", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (DENM)\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tand containing header_fields[1].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tand containing header_fields[2].type\r\n\t\t\t\tindicating 'generation_time'\r\n\t\t\tand containing header_fields[3].type\r\n\t\t\t\tindicating 'generation_location'\r\n\t\t\tand containing header_fields[4] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontaining 'its_aid'\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "6496964d-c6e2-4d8c-ace1-e5d8ba73d533", "type": "STRING", - "value": "in process" + "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "6496964d-c6e2-4d8c-ace1-e5d8ba73d533", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_02_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_02_BO.json index 1f2ecfa78ced51ce40d1fee4d7924359a99c3da0..3d7c142541a6d7f644fc97bdb5f697df6d4f13da 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_02_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_02_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "47fe4522-948e-4cdb-a038-9e12e83c152f", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "47fe4522-948e-4cdb-a038-9e12e83c152f", "type": "STRING", "value": "Check that IUT discards a secured DENM if the header_fields does not contain the header field type: signer_info" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "47fe4522-948e-4cdb-a038-9e12e83c152f", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (DENM)\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'generation_time'\r\n\t\t\tand containing header_fields[1].type\r\n\t\t\t\tindicating 'generation_location'\r\n\t\t\tand containing header_fields[2]{\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "47fe4522-948e-4cdb-a038-9e12e83c152f", "type": "STRING", - "value": "in process" + "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "47fe4522-948e-4cdb-a038-9e12e83c152f", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_04_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_04_BO.json index 40341c3a7ff1bd03097e6f8985b92c1f57865b52..0140f4115db4be87f3d555e9d1c7d3eed6817b76 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_04_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_04_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "ca815f35-dc97-4334-8f0d-5582ecaa859e", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "ca815f35-dc97-4334-8f0d-5582ecaa859e", "type": "STRING", - "value": "Check that IUT discards a secured DENM if the header_fields contain more than one element of header field type: generation_time" + "value": "Check that IUT discards a secured DENM if the header_fields contains more than one element of type generation_time" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "ca815f35-dc97-4334-8f0d-5582ecaa859e", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (DENM)\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tcontaining header_fields[1].type\r\n\t\t\t\tindicating 'generation_time'\r\n\t\t\tand containing header_fields[2].type\r\n\t\t\t\tindicating 'generation_time'\r\n\t\t\tand containing header_fields[3].type\r\n\t\t\t\tindicating 'generation_location'\r\n\t\t\tand containing header_fields[4] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "ca815f35-dc97-4334-8f0d-5582ecaa859e", "type": "STRING", - "value": "in process" + "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "ca815f35-dc97-4334-8f0d-5582ecaa859e", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_05_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_05_BO.json index e01121dc2b209ba3030f3c9e6eab4bc3fda15af5..1e746d9fecb546b5a470d55bd07d3e0803502ad9 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_05_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_05_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "1ca6f24c-1935-44a1-8da2-a30660256c37", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "1ca6f24c-1935-44a1-8da2-a30660256c37", "type": "STRING", - "value": "Check that IUT discards a secured DENM if the header_fields doesn't contain the element of header field of type: generation_time" + "value": "Check that IUT discards a secured DENM if the message does not contain the header field of type generation_time" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "1ca6f24c-1935-44a1-8da2-a30660256c37", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (DENM)\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tcontaining header_fields[1].type\r\n\t\t\t\tindicating 'generation_location'\r\n\t\t\tand containing header_fields[2] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "1ca6f24c-1935-44a1-8da2-a30660256c37", "type": "STRING", - "value": "in process" + "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "1ca6f24c-1935-44a1-8da2-a30660256c37", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_06_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_06_BO.json index 0bd577e1cd35db3d8d632e36e67f0d5660077865..a0e0c1d03461dd4bc02c4de42981990051a9b4bc 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_06_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_06_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "b3f7bcd9-ca79-4131-888a-21fdca0b4321", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "b3f7bcd9-ca79-4131-888a-21fdca0b4321", "type": "STRING", - "value": "Check that IUT discards a secured DENM if the header_fields contain more than one element of header field of type: its_aid" + "value": "Check that IUT discards a secured DENM if the header_fields contains more than one element of type its_aid" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "b3f7bcd9-ca79-4131-888a-21fdca0b4321", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (DENM)\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tand containing header_fields[1].type\r\n\t\t\t\tindicating 'generation_time'\r\n\t\t\tand containing header_fields[2].type\r\n\t\t\t\tindicating 'generation_location'\r\n\t\t\tand containing header_fields[3] {\r\n\t\t\t\tcontainint type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontainint its_aid\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\t}\r\n\t\t\tand containing header_fields[4] {\r\n\t\t\t\tcontainint type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontainint its_aid\r\n\t\t\t\t\tindicating 'AID_CAM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (DENM)\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tand containing header_fields[1].type\r\n\t\t\t\tindicating 'generation_time'\r\n\t\t\tand containing header_fields[2].type\r\n\t\t\t\tindicating 'generation_location'\r\n\t\t\tand containing header_fields[3] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\t}\r\n\t\t\tand containing header_fields[4] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_CAM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "b3f7bcd9-ca79-4131-888a-21fdca0b4321", "type": "STRING", - "value": "in process" + "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "b3f7bcd9-ca79-4131-888a-21fdca0b4321", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_07_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_07_BO.json index c03ad0a7b3d123dd29159167aa4205b22d6405b6..2d37463d44882738a38b5a3dbe75dc1e6c6d6fae 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_07_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_07_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "b23b2526-1d92-464d-b25e-6cae02ed048a", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "b23b2526-1d92-464d-b25e-6cae02ed048a", "type": "STRING", - "value": "Check that IUT discards a secured DENM if the header_fields contain more than one element of header field of type: generation_location" + "value": "Check that IUT discards a secured DENM if the header_fields contains more than one element of type generation_location" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "b23b2526-1d92-464d-b25e-6cae02ed048a", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (DENM)\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tand containing header_fields[1].type\r\n\t\t\t\tindicating 'generation_time'\r\n\t\t\tand containing header_fields[2].type\r\n\t\t\t\tindicating 'generation_location'\r\n\t\t\tand containing header_fields[3].type\r\n\t\t\t\tindicating 'generation_location'\r\n\t\t\tand containing header_fields[4] {\r\n\t\t\t\tcontainint type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontainint its_aid\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (DENM)\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tand containing header_fields[1].type\r\n\t\t\t\tindicating 'generation_time'\r\n\t\t\tand containing header_fields[2].type\r\n\t\t\t\tindicating 'generation_location'\r\n\t\t\tand containing header_fields[3].type\r\n\t\t\t\tindicating 'generation_location'\r\n\t\t\tand containing header_fields[4] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "b23b2526-1d92-464d-b25e-6cae02ed048a", "type": "STRING", - "value": "in process" + "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "b23b2526-1d92-464d-b25e-6cae02ed048a", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_08_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_08_BO.json index 141c69c382e583c826925bf2c9183ba520fb89d4..1318cb785a59cf55423c6979d43b8315505788b6 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_08_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_08_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "2a7859c7-a4cd-4d55-8316-926abc36bca7", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "2a7859c7-a4cd-4d55-8316-926abc36bca7", "type": "STRING", - "value": "Check that IUT discards a secured DENM if the header_fields doesn't contain the header field of type generation_location" + "value": "Check that IUT discards a secured DENM if the message does not contain the header field of type generation_location" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "2a7859c7-a4cd-4d55-8316-926abc36bca7", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (DENM)\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tcontaining header_fields[1].type\r\n\t\t\t\tindicating 'generation_time'\r\n\t\t\tand containing header_fields[2] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "2a7859c7-a4cd-4d55-8316-926abc36bca7", "type": "STRING", - "value": "in process" + "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "2a7859c7-a4cd-4d55-8316-926abc36bca7", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_10_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_10_BO.json index 200c30e362d14a8ba3a1b84ae287bfd22787017a..1e6bec073ed75dcac476babd5d18b8f67f0e29f6 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_10_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_10_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "dbc9ade9-a0ed-4fb2-a7ff-22221c5f2740", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "dbc9ade9-a0ed-4fb2-a7ff-22221c5f2740", "type": "STRING", "value": "Check that IUT ignores the HeaderFields generation_time_standard_deviation of received Secured CAM" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "dbc9ade9-a0ed-4fb2-a7ff-22221c5f2740", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (DENM)\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\t\tcontaining signer\r\n\t\t\t\t\tcontaining certificate\r\n\t\t\t\t\t\tindicating CERT_TS_AT_A\r\n\t\t\tand containing header_fields[1] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time_with_standard_deviation'\r\n\t\t\t\tcontaining generation_time_with_standard_deviation\r\n\t\t\t\t\tindicating TIME_2 inside the validity period of CERT_TS_AT_A\r\n\t\t\t}\r\n\t\t\tand containing header_fields[2]{\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 outside the validity period of CERT_TS_AT_A\r\n\t\t\t}\r\n\t\t\tand containing header_fields[3].type\r\n\t\t\t\tindicating 'generation_location'\r\n\t\t\tand containing header_fields[4] {\r\n\t\t\t\tcontainint type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontainint its_aid\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (DENM)\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\t\tcontaining signer\r\n\t\t\t\t\tcontaining certificate\r\n\t\t\t\t\t\tindicating CERT_TS_AT_A\r\n\t\t\tand containing header_fields[1] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time_with_standard_deviation'\r\n\t\t\t\tcontaining generation_time_with_standard_deviation\r\n\t\t\t\t\tindicating TIME_2 inside the validity period of CERT_TS_AT_A\r\n\t\t\t}\r\n\t\t\tand containing header_fields[2]{\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 outside the validity period of CERT_TS_AT_A\r\n\t\t\t}\r\n\t\t\tand containing header_fields[3].type\r\n\t\t\t\tindicating 'generation_location'\r\n\t\t\tand containing header_fields[4] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "dbc9ade9-a0ed-4fb2-a7ff-22221c5f2740", "type": "STRING", - "value": "in process" + "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "dbc9ade9-a0ed-4fb2-a7ff-22221c5f2740", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_11_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_11_BO.json index d1d9b7e6bded5906b0956f81e72f225b3668c4ef..f3745006cdd7cdec038417d84b2c78966d43e088 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_11_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_11_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "4075f4e4-2153-4078-b0ae-7d365e91d531", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "4075f4e4-2153-4078-b0ae-7d365e91d531", "type": "STRING", "value": "Check that IUT ignores the HeaderFields generation_time_standard_deviation of received Secured CAM" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "4075f4e4-2153-4078-b0ae-7d365e91d531", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (DENM)\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\t\tcontaining signer\r\n\t\t\t\t\tcontaining certificate\r\n\t\t\t\t\t\tindicating CERT_TS_AT_A\r\n\t\t\tand containing header_fields[1]{\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 inside the validity period of CERT_TS_AT_A\r\n\t\t\t}\r\n\t\t\tand containing header_fields[2] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time_with_standard_deviation'\r\n\t\t\t\tcontaining generation_time_with_standard_deviation\r\n\t\t\t\t\tindicating TIME_2 outside the validity period of CERT_TS_AT_A\r\n\t\t\t}\r\n\t\t\tand containing header_fields[3].type\r\n\t\t\t\tindicating 'generation_location'\r\n\t\t\tand containing header_fields[4] {\r\n\t\t\t\tcontainint type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontainint its_aid\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t} then {\r\n\t\tthe IUT accepts a SecuredMessage\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (DENM)\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\t\tcontaining signer\r\n\t\t\t\t\tcontaining certificate\r\n\t\t\t\t\t\tindicating CERT_TS_AT_A\r\n\t\t\tand containing header_fields[1]{\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 inside the validity period of CERT_TS_AT_A\r\n\t\t\t}\r\n\t\t\tand containing header_fields[2] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time_with_standard_deviation'\r\n\t\t\t\tcontaining generation_time_with_standard_deviation\r\n\t\t\t\t\tindicating TIME_2 outside the validity period of CERT_TS_AT_A\r\n\t\t\t}\r\n\t\t\tand containing header_fields[3].type\r\n\t\t\t\tindicating 'generation_location'\r\n\t\t\tand containing header_fields[4] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t} then {\r\n\t\tthe IUT accepts a SecuredMessage\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "4075f4e4-2153-4078-b0ae-7d365e91d531", "type": "STRING", - "value": "in process" + "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "4075f4e4-2153-4078-b0ae-7d365e91d531", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_12_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_12_BV.json index 358642eadd8ecc33aa6e96478a3948fd29ce8285..5026db2af97a5abcaac56d6d97dc19269285589e 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_12_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_12_BV.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "0890bb28-d7d5-44c5-818a-ec422d2c5403", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "0890bb28-d7d5-44c5-818a-ec422d2c5403", "type": "STRING", "value": "Check that IUT ignores the HeaderFields expiry_time of received Secured DENM" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "0890bb28-d7d5-44c5-818a-ec422d2c5403", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (DENM)\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tcontaining header_fields[1]{\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 ( TIME_1 < CURRENT_TIME - 1min )\r\n\t\t\t}\r\n\t\t\tand containing header_fields[2] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'expiration'\r\n\t\t\t\tcontaining expiry_time\r\n\t\t\t\t\tindicating TIME_2 (TIME_1 < TIME_2 < CURRENT_TIME)\r\n\t\t\t}\r\n\t\t\tand containing header_fields[3].type\r\n\t\t\t\tindicating 'generation_location'\r\n\t\t\tand containing header_fields[4] {\r\n\t\t\t\tcontainint type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontainint its_aid\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t} then {\r\n\t\tthe IUT accepts a SecuredMessage\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (DENM)\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tcontaining header_fields[1]{\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 ( TIME_1 < CURRENT_TIME - 1min )\r\n\t\t\t}\r\n\t\t\tand containing header_fields[2] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'expiration'\r\n\t\t\t\tcontaining expiry_time\r\n\t\t\t\t\tindicating TIME_2 (TIME_1 < TIME_2 < CURRENT_TIME)\r\n\t\t\t}\r\n\t\t\tand containing header_fields[3].type\r\n\t\t\t\tindicating 'generation_location'\r\n\t\t\tand containing header_fields[4] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\t}\r\n\t\t\tand not containing other header fields\r\n\t} then {\r\n\t\tthe IUT accepts a SecuredMessage\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "0890bb28-d7d5-44c5-818a-ec422d2c5403", "type": "STRING", - "value": "in process" + "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "0890bb28-d7d5-44c5-818a-ec422d2c5403", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_05.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_05.json index 9f1d80fbb98585072001e1587f84b1f5b33e870a..91bde43e6e3e97cfcc68fd89a8171841dd553215 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_05.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_05.json @@ -8,11 +8,15 @@ "value": "Check that the IUT discards Secured DENM containing other types of signer_info then certificate_digest_with_ecdsap256, certificate_chain or certificate." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "7e85c6dc-25b0-465d-a0aa-763923a3868f", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/dd620987-9e01-4fc8-b471-201d0592ff22"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/dd620987-9e01-4fc8-b471-201d0592ff22", + "/Documents/ts_103097v010201p.xhtml/6e73abdf-644e-40f0-ac1c-9b8dccb30af0" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "05. Check signer info" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "7e85c6dc-25b0-465d-a0aa-763923a3868f", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_05/TP_SEC_ITSS_RCV_DENM_05_01_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_05/TP_SEC_ITSS_RCV_DENM_05_01_BO.json index 9e5c354054dfd812d29ed363bf4f899befaceb2b..d6fdcb675d2c09103bee8ac2f270fc551bfd9212 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_05/TP_SEC_ITSS_RCV_DENM_05_01_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_05/TP_SEC_ITSS_RCV_DENM_05_01_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "0919b581-1e46-4214-9d1d-f745d4552277", "type": "STRING", "value": "bissmeye" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "0919b581-1e46-4214-9d1d-f745d4552277", "type": "STRING", - "value": "Check that IUT discards a secured DENM if the header_fields contain a signer of type 'self'" + "value": "Check that IUT discards a secured DENM if the header_fields contains a signer of type 'self'" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "0919b581-1e46-4214-9d1d-f745d4552277", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (DENM) {\r\n\t\t\tcontaining header_fields['signer_info']\r\n\t\t\t\tcontaining signer.type\r\n\t\t\t\t\tindicating 'self'\r\n\t\t\tand containing header_fields['generation_time']\r\n\t\t\tand containing header_fields['generation_location']\r\n\t\t\tand containing header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_DENM'\r\n\t\t\tand not containing other header fields\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "0919b581-1e46-4214-9d1d-f745d4552277", "type": "STRING", - "value": "in process" + "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "0919b581-1e46-4214-9d1d-f745d4552277", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_05/TP_SEC_ITSS_RCV_DENM_05_02_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_05/TP_SEC_ITSS_RCV_DENM_05_02_BO.json index cbba3482b1fa3e84b086b5f6c46d969021899730..761a17b629f9ce842aabffa4dc548b9f40ef52a8 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_05/TP_SEC_ITSS_RCV_DENM_05_02_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_05/TP_SEC_ITSS_RCV_DENM_05_02_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "6bf58fa2-696d-4990-a568-b87811ba65e4", "type": "STRING", "value": "bissmeye" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "6bf58fa2-696d-4990-a568-b87811ba65e4", "type": "STRING", - "value": "Check that IUT discards a secured DENM if the header_fields contain a signer of type 'certificate_digest_with_other_algorithm'" + "value": "Check that IUT discards a secured DENM if the header_fields contains a signer of type 'certificate_digest_with_other_algorithm'" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "6bf58fa2-696d-4990-a568-b87811ba65e4", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (DENM) {\r\n\t\t\tcontaining header_fields['signer_info']\r\n\t\t\t\tcontaining signer.type\r\n\t\t\t\t\tindicating 'certificate_digest_with_other_algorithm'\r\n\t\t\tand containing header_fields['generation_time']\r\n\t\t\tand containing header_fields['generation_location']\r\n\t\t\tand containing header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_DENM'\r\n\t\t\tand not containing other header fields\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "6bf58fa2-696d-4990-a568-b87811ba65e4", "type": "STRING", - "value": "in process" + "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "6bf58fa2-696d-4990-a568-b87811ba65e4", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_05/TP_SEC_ITSS_RCV_DENM_05_03_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_05/TP_SEC_ITSS_RCV_DENM_05_03_BO.json index d264bd2c91dc8377ba176f48e70517ee66c7679e..573aac73d59d20c3e02bcd69b37fa82f5516a235 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_05/TP_SEC_ITSS_RCV_DENM_05_03_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_05/TP_SEC_ITSS_RCV_DENM_05_03_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "f3c36dec-2276-4340-a4cb-97d29deb5b90", "type": "STRING", "value": "bissmeye" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "f3c36dec-2276-4340-a4cb-97d29deb5b90", "type": "STRING", - "value": "Check that IUT discards a secured DENM if the header_fields contain a signer of type certificate_chain" + "value": "Check that IUT discards a secured DENM if the header_fields contains a signer of type certificate_chain" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "f3c36dec-2276-4340-a4cb-97d29deb5b90", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (DENM) {\r\n\t\t\tcontaining header_fields['signer_info']\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate_chain'\r\n\t\t\t\t}\r\n\t\t\tand containing header_fields['generation_time']\r\n\t\t\tand containing header_fields['generation_location']\r\n\t\t\tand containing header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_DENM'\r\n\t\t\tand not containing other header fields\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "f3c36dec-2276-4340-a4cb-97d29deb5b90", "type": "STRING", - "value": "in process" + "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "f3c36dec-2276-4340-a4cb-97d29deb5b90", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06.json index 5539360d6968627b2bb4908657f07de9b863267b..a11b1c22ce63ffc7e46e245ff3649c90240d1bf9 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06.json @@ -8,6 +8,7 @@ "value": "Check the acceptance of SecuredMessage containing HeaderField generation_time" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "6d3383b2-7a28-4f4f-aa42-00796d53a8a9", @@ -15,7 +16,10 @@ "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/e1c8b3e0-5da0-4e8d-8355-563039c7cdc7", "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/9d288386-4b6a-46cc-9bd4-5be9d85696d0", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/d8ce00e7-f3e1-479b-8ce8-73861f492c7b" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/d8ce00e7-f3e1-479b-8ce8-73861f492c7b", + "/Documents/ts_103097v010201p.xhtml/615b41cb-6660-41b4-8375-b658436ca1df", + "/Documents/ts_103097v010201p.xhtml/d6ce51f8-7d7e-46fd-b53a-b4c920152e62", + "/Documents/ts_103097v010201p.xhtml/b6e04816-8080-4afe-bf78-8aa8aa77f430" ] }, "_name": { @@ -25,6 +29,13 @@ "type": "STRING", "value": "06. Check generation time" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "6d3383b2-7a28-4f4f-aa42-00796d53a8a9", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06/TP_SEC_ITSS_RCV_DENM_06_01_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06/TP_SEC_ITSS_RCV_DENM_06_01_BO.json index 3b3f911837ccfdd1d97ebd7df41e0545fdf4c2ab..81593883a127eb0012839bca84415e8d5eedf841 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06/TP_SEC_ITSS_RCV_DENM_06_01_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06/TP_SEC_ITSS_RCV_DENM_06_01_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "cf64603c-91ea-40c5-a3cd-0e5cef5404c5", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "cf64603c-91ea-40c5-a3cd-0e5cef5404c5", "type": "STRING", "value": "Check that IUT discards message containing generation_time before the certificate validity period" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "cf64603c-91ea-40c5-a3cd-0e5cef5404c5", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (DENM) {\r\n\t\t\tcontaining header_fields[0] {\r\n\t\t\t\tcontaining type \r\n\t\t\t\t\tindicating 'signer_info'\r\n\t\t\t\tand containing signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tand containing certificate (CERT_TS_AT_A) {\r\n\t\t\t\t\t\tcontaining validity_restrictions['time_start_and_end'] {\r\n\t\t\t\t\t\t\tcontaining start_validity\r\n\t\t\t\t\t\t\t\tindicating TIME_CERT_TS_AT_START\r\n\t\t\t\t\t\t\tand containing end_validity\r\n\t\t\t\t\t\t\t\tindicating TIME_CERT_TS_AT_END\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t\tand containing header_fields [1] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 < TIME_CERT_TS_AT_START\r\n\t\t\t}\r\n\t\t\tand containing header_fields [2] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_location'\r\n\t\t\t}\r\n\t\t\tand containing header_fields[3] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "cf64603c-91ea-40c5-a3cd-0e5cef5404c5", "type": "STRING", - "value": "in process" + "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "cf64603c-91ea-40c5-a3cd-0e5cef5404c5", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06/TP_SEC_ITSS_RCV_DENM_06_02_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06/TP_SEC_ITSS_RCV_DENM_06_02_BO.json index 95a72488540d0b04c23818a5eb224d98db99c04e..8d8fa44f5ceac9fe65b5a3f813242f8e04dfa812 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06/TP_SEC_ITSS_RCV_DENM_06_02_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06/TP_SEC_ITSS_RCV_DENM_06_02_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "b2c5b3ac-20d3-44d3-92b0-0d29e21a7c05", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "b2c5b3ac-20d3-44d3-92b0-0d29e21a7c05", "type": "STRING", "value": "Check that IUT discards message containing generation_time after the certificate validity period" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "b2c5b3ac-20d3-44d3-92b0-0d29e21a7c05", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage (DENM) {\r\n\t\t\tcontaining header_fields[0] {\r\n\t\t\t\tcontaining type \r\n\t\t\t\t\tindicating 'signer_info'\r\n\t\t\t\tand containing signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tand containing certificate (CERT_TS_AT_A) {\r\n\t\t\t\t\t\tcontaining validity_restrictions['time_start_and_end'] {\r\n\t\t\t\t\t\t\tcontaining start_validity\r\n\t\t\t\t\t\t\t\tindicating TIME_CERT_TS_AT_START\r\n\t\t\t\t\t\t\tand containing end_validity\r\n\t\t\t\t\t\t\t\tindicating TIME_CERT_TS_AT_END\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t\tand containing header_fields [1] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 > TIME_CERT_TS_AT_END\r\n\t\t\t}\r\n\t\t\tand containing header_fields [2] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_location'\r\n\t\t\t}\r\n\t\t\tand containing header_fields[3] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'its_aid'\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "b2c5b3ac-20d3-44d3-92b0-0d29e21a7c05", "type": "STRING", - "value": "in process" + "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "b2c5b3ac-20d3-44d3-92b0-0d29e21a7c05", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06/TP_C2C_SEC_ITSS_RCV_DENM_06_03_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06/TP_SEC_ITSS_RCV_DENM_06_03_BO.json similarity index 71% rename from requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06/TP_C2C_SEC_ITSS_RCV_DENM_06_03_BO.json rename to requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06/TP_SEC_ITSS_RCV_DENM_06_03_BO.json index e5f8bdae93da84392b0d9b5b55c0c01ebbd67f76..2681c1b35c62120ace3afafa52500d11c57adaa8 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06/TP_C2C_SEC_ITSS_RCV_DENM_06_03_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06/TP_SEC_ITSS_RCV_DENM_06_03_BO.json @@ -1,35 +1,54 @@ -{ - "attributes": { - "PICS_C2C": { - "key": "PICS_C2C", - "type": "STRING", - "value": "true" - }, - "_author": { - "key": "_author", - "type": "STRING", - "value": "filatov" - }, - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that IUT discards Secured DENM if the generation_time is more than 10 minute in the past (C2C only)" - }, - "_expectedResults": { - "key": "_expectedResults", - "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tand containing header_fields [1] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 (TIME_1 < CURRENT_TIME - 10min)\r\n\t\t\t}\r\n\t\t\tand containing header_fields ['its_aid']\r\n\t\t\t\tindicating 'AID_DENM'\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}\r\nwith {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage\r\n\t\t\tcontaining security_profile\r\n\t\t\t\tindicating '2'\r\n\t\t\tand containing header_fields ['generation_time']\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 (TIME_1 < CUR_TIME - 10min)\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" - }, - "_status": { - "key": "_status", - "type": "STRING", - "value": "in process" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "TestPurpose" - } - }, - "uuid": "693c1179-2a22-419a-8df8-717bab22c489" +{ + "attributes": { + "PICS_C2C": { + "isGenerated": false, + "key": "PICS_C2C", + "origin": "693c1179-2a22-419a-8df8-717bab22c489", + "type": "STRING", + "value": "true" + }, + "_author": { + "isGenerated": false, + "key": "_author", + "origin": "693c1179-2a22-419a-8df8-717bab22c489", + "type": "STRING", + "value": "filatov" + }, + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "693c1179-2a22-419a-8df8-717bab22c489", + "type": "STRING", + "value": "Check that IUT discards Secured DENM if the generation_time is more than 10 minute in the past (C2C only)" + }, + "_expectedResults": { + "isGenerated": false, + "key": "_expectedResults", + "origin": "693c1179-2a22-419a-8df8-717bab22c489", + "type": "STRING", + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tand containing header_fields [1] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 (TIME_1 < CURRENT_TIME - 10min)\r\n\t\t\t}\r\n\t\t\tand containing header_fields ['its_aid']\r\n\t\t\t\tindicating 'AID_DENM'\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}\r\nwith {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage\r\n\t\t\tcontaining security_profile\r\n\t\t\t\tindicating '2'\r\n\t\t\tand containing header_fields ['generation_time']\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 (TIME_1 < CUR_TIME - 10min)\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" + }, + "_status": { + "isGenerated": false, + "key": "_status", + "origin": "693c1179-2a22-419a-8df8-717bab22c489", + "type": "STRING", + "value": "in process" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "693c1179-2a22-419a-8df8-717bab22c489", + "type": "STRING", + "value": "TestPurpose" + }, + "excluded": { + "isGenerated": false, + "key": "excluded", + "origin": "693c1179-2a22-419a-8df8-717bab22c489", + "type": "BOOL", + "value": "true" + } + }, + "uuid": "693c1179-2a22-419a-8df8-717bab22c489" } \ No newline at end of file diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06/TP_C2C_SEC_ITSS_RCV_DENM_06_04_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06/TP_SEC_ITSS_RCV_DENM_06_04_BO.json similarity index 65% rename from requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06/TP_C2C_SEC_ITSS_RCV_DENM_06_04_BO.json rename to requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06/TP_SEC_ITSS_RCV_DENM_06_04_BO.json index 7365570e44d5262294ca36b9347717b1f8e07457..e36f2efecb0c86cbf75ff5f3e891f601a2049e2b 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06/TP_C2C_SEC_ITSS_RCV_DENM_06_04_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06/TP_SEC_ITSS_RCV_DENM_06_04_BO.json @@ -1,35 +1,54 @@ -{ - "attributes": { - "PICS_C2C": { - "key": "PICS_C2C", - "type": "STRING", - "value": "true" - }, - "_author": { - "key": "_author", - "type": "STRING", - "value": "filatov" - }, - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that IUT discards Secured CAM if the generation_time is more than 10 minute in the future(C2C only)" - }, - "_expectedResults": { - "key": "_expectedResults", - "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tand containing header_fields [1] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 (TIME_1 > CURRENT_TIME + 10min)\r\n\t\t\t}\r\n\t\t\tand containing header_fields ['its_aid']\r\n\t\t\t\tindicating 'AID_DENM'\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" - }, - "_status": { - "key": "_status", - "type": "STRING", - "value": "in process" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "TestPurpose" - } - }, - "uuid": "cda821c0-4e62-4745-acb1-65b5a425b74f" +{ + "attributes": { + "PICS_C2C": { + "isGenerated": false, + "key": "PICS_C2C", + "origin": "cda821c0-4e62-4745-acb1-65b5a425b74f", + "type": "STRING", + "value": "true" + }, + "_author": { + "isGenerated": false, + "key": "_author", + "origin": "cda821c0-4e62-4745-acb1-65b5a425b74f", + "type": "STRING", + "value": "filatov" + }, + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "cda821c0-4e62-4745-acb1-65b5a425b74f", + "type": "STRING", + "value": "Check that IUT discards Secured CAM if the generation_time is more than 10 minute in the future(C2C only)" + }, + "_expectedResults": { + "isGenerated": false, + "key": "_expectedResults", + "origin": "cda821c0-4e62-4745-acb1-65b5a425b74f", + "type": "STRING", + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields[0].type\r\n\t\t\t\tindicating 'signer_info'\r\n\t\t\tand containing header_fields [1] {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'generation_time'\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 (TIME_1 > CURRENT_TIME + 10min)\r\n\t\t\t}\r\n\t\t\tand containing header_fields ['its_aid']\r\n\t\t\t\tindicating 'AID_DENM'\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" + }, + "_status": { + "isGenerated": false, + "key": "_status", + "origin": "cda821c0-4e62-4745-acb1-65b5a425b74f", + "type": "STRING", + "value": "in process" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "cda821c0-4e62-4745-acb1-65b5a425b74f", + "type": "STRING", + "value": "TestPurpose" + }, + "excluded": { + "isGenerated": false, + "key": "excluded", + "origin": "cda821c0-4e62-4745-acb1-65b5a425b74f", + "type": "BOOL", + "value": "true" + } + }, + "uuid": "cda821c0-4e62-4745-acb1-65b5a425b74f" } \ No newline at end of file diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_07.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_07.json index 6dbf564cec44987feede0207553458b7ceeb2420..bf1050421a822710215d564fac0fd669a809c2a6 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_07.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_07.json @@ -8,11 +8,15 @@ "value": "Check the acceptance of message type" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "4350edd1-8e33-4f1c-a1f2-ace2f64354d1", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/79b1e74c-cf2f-4d76-bcac-07d24883a293"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/79b1e74c-cf2f-4d76-bcac-07d24883a293", + "/Documents/ts_103097v010201p.xhtml/43a47e59-9bb0-46ab-bcb3-2f373b450e48" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "07. Check its_aid" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "4350edd1-8e33-4f1c-a1f2-ace2f64354d1", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_08.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_08.json index ab33de7a9c7f3f1374aa15fdc58742ad0d68a620..44605e81b7e427987998c766e04ee4dd8ee340d1 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_08.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_08.json @@ -8,13 +8,16 @@ "value": "Check the acceptance of SecuredMessage containing HeaderField generation_location" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "15901c9b-8d33-4cd5-8a7e-2ff5ec7c97a4", "type": "LIST", "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/4e698c28-866a-437a-81b0-1825b19d6297", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/90324b98-a3aa-495d-bb77-d7b532d503a9" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/90324b98-a3aa-495d-bb77-d7b532d503a9", + "/Documents/ts_103097v010201p.xhtml/24846e25-0161-4426-9e87-27ac10525fa0", + "/Documents/ts_103097v010201p.xhtml/eadacd7d-8386-4c76-8f38-0be53ce96210" ] }, "_name": { @@ -24,6 +27,13 @@ "type": "STRING", "value": "08. Check generation location" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "15901c9b-8d33-4cd5-8a7e-2ff5ec7c97a4", + "type": "STRING", + "value": "COMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_08/TP_C2C_SEC_ITSS_RCV_DENM_08_02_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_08/TP_C2C_SEC_ITSS_RCV_DENM_08_02_BV.json index a511d2793ae913b92cd2bc36bdb05f30d0b79931..0c80ef088ae225d85e8674b95667add1535850ee 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_08/TP_C2C_SEC_ITSS_RCV_DENM_08_02_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_08/TP_C2C_SEC_ITSS_RCV_DENM_08_02_BV.json @@ -1,34 +1,53 @@ { "attributes": { "PICS_C2C": { + "isGenerated": false, "key": "PICS_C2C", + "origin": "b4732a45-3e9a-4f91-9b31-c1c45169a845", "type": "STRING", "value": "true" }, "_author": { + "isGenerated": false, "key": "_author", + "origin": "b4732a45-3e9a-4f91-9b31-c1c45169a845", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "b4732a45-3e9a-4f91-9b31-c1c45169a845", "type": "STRING", "value": "Check that IUT accepts Secured DENM if the distance between the current position of IUT and the value of optional HeaderField generation_location is 29.9 km" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "b4732a45-3e9a-4f91-9b31-c1c45169a845", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage\r\n\t\t\tcontaining header_fields ['generation_location']\r\n\t\t\t\tcontaining generation_location\r\n\t\t\t\t\tindicating position in 29.9 km from the current position of IUT\r\n\t\t\tand containing header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_DENM'\r\n\t} then {\r\n\t\tthe IUT accepts the message\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "b4732a45-3e9a-4f91-9b31-c1c45169a845", "type": "STRING", "value": "in process" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "b4732a45-3e9a-4f91-9b31-c1c45169a845", "type": "STRING", "value": "TestPurpose" + }, + "excluded": { + "isGenerated": false, + "key": "excluded", + "origin": "b4732a45-3e9a-4f91-9b31-c1c45169a845", + "type": "BOOL", + "value": "true" } }, "uuid": "b4732a45-3e9a-4f91-9b31-c1c45169a845" diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_08/TP_C2C_SEC_ITSS_RCV_DENM_08_03_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_08/TP_C2C_SEC_ITSS_RCV_DENM_08_03_BO.json index aa0f026815e3f0da6cc5519c62eb33f6a514a6c3..a65791f707dc4aee2a0935c07f10c4de3fe71677 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_08/TP_C2C_SEC_ITSS_RCV_DENM_08_03_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_08/TP_C2C_SEC_ITSS_RCV_DENM_08_03_BO.json @@ -1,35 +1,54 @@ -{ - "attributes": { - "PICS_C2C": { - "key": "PICS_C2C", - "type": "STRING", - "value": "true" - }, - "_author": { - "key": "_author", - "type": "STRING", - "value": "filatov" - }, - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that IUT discards Secured DENM if the distance between the current position of IUT and the value of optional HeaderField generation_location is more than 30 km" - }, - "_expectedResults": { - "key": "_expectedResults", - "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage\r\n\t\t\tand containing header_fields ['generation_location']\r\n\t\t\t\tcontaining generation_location\r\n\t\t\t\t\tindicating position in 31 km from the current position of IUT\r\n\t\t\tand containing header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_DENM'\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" - }, - "_status": { - "key": "_status", - "type": "STRING", - "value": "in process" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "TestPurpose" - } - }, - "uuid": "efda77e6-78f5-48f3-ad89-105b5dc8abec" +{ + "attributes": { + "PICS_C2C": { + "isGenerated": false, + "key": "PICS_C2C", + "origin": "efda77e6-78f5-48f3-ad89-105b5dc8abec", + "type": "STRING", + "value": "true" + }, + "_author": { + "isGenerated": false, + "key": "_author", + "origin": "efda77e6-78f5-48f3-ad89-105b5dc8abec", + "type": "STRING", + "value": "filatov" + }, + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "efda77e6-78f5-48f3-ad89-105b5dc8abec", + "type": "STRING", + "value": "Check that IUT discards Secured DENM if the distance between the current position of IUT and the value of optional HeaderField generation_location is more than 30 km" + }, + "_expectedResults": { + "isGenerated": false, + "key": "_expectedResults", + "origin": "efda77e6-78f5-48f3-ad89-105b5dc8abec", + "type": "STRING", + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage\r\n\t\t\tand containing header_fields ['generation_location']\r\n\t\t\t\tcontaining generation_location\r\n\t\t\t\t\tindicating position in 31 km from the current position of IUT\r\n\t\t\tand containing header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_DENM'\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" + }, + "_status": { + "isGenerated": false, + "key": "_status", + "origin": "efda77e6-78f5-48f3-ad89-105b5dc8abec", + "type": "STRING", + "value": "in process" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "efda77e6-78f5-48f3-ad89-105b5dc8abec", + "type": "STRING", + "value": "TestPurpose" + }, + "excluded": { + "isGenerated": false, + "key": "excluded", + "origin": "efda77e6-78f5-48f3-ad89-105b5dc8abec", + "type": "BOOL", + "value": "true" + } + }, + "uuid": "efda77e6-78f5-48f3-ad89-105b5dc8abec" } \ No newline at end of file diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_08/TP_SEC_ITSS_RCV_DENM_08_02_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_08/TP_SEC_ITSS_RCV_DENM_08_02_BO.json index 3373d4d3353895eb63f0aefcc56bcffe267b8c1a..0f93d4c7b186079f9da5ca98397232f0d552329f 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_08/TP_SEC_ITSS_RCV_DENM_08_02_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_08/TP_SEC_ITSS_RCV_DENM_08_02_BO.json @@ -19,7 +19,7 @@ "key": "_description", "origin": "be0b7b37-8d10-471d-9e71-06c8a6e691cb", "type": "STRING", - "value": "Check that IUT discards Secured DENM if the HeaderField generation_location is outside of the rectangilar validity region of the signing certificate" + "value": "Check that IUT discards Secured DENM if the HeaderField generation_location is outside of the rectangular validity region of the signing certificate" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09.json index 264800df282dce7b48f9271ad9687322107904e8..036c3f2242b2379afb8a11130b676f9bce91de8e 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09.json @@ -8,13 +8,16 @@ "value": "Check the acceptance of payloads of Secured DENM\r\n" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "13c840f6-0cc4-4bcd-8ffe-757952190d26", "type": "LIST", "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/59de9c30-dcf8-4767-bc49-171e85998a37", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/3277f67d-8198-4426-af7f-209a9a15fb4d" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/3277f67d-8198-4426-af7f-209a9a15fb4d", + "/Documents/ts_103097v010201p.xhtml/61b388f4-8bad-4b8a-9684-eae475708a7a", + "/Documents/ts_103097v010201p.xhtml/25a3bac6-9684-45fa-8d7f-410041a80dbb" ] }, "_name": { @@ -24,6 +27,13 @@ "type": "STRING", "value": "09. Check Payload" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "13c840f6-0cc4-4bcd-8ffe-757952190d26", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09/TP_SEC_ITSS_RCV_DENM_09_02_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09/TP_SEC_ITSS_RCV_DENM_09_02_BO.json index b2ffe6b5b0500aea62e7c9ae133071b262c59065..e0960dd24ed5b9d5f9b1bf377c4731e0c6d35d2b 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09/TP_SEC_ITSS_RCV_DENM_09_02_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09/TP_SEC_ITSS_RCV_DENM_09_02_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "c251719f-96f6-47da-9d56-cf42c55e378a", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "c251719f-96f6-47da-9d56-cf42c55e378a", "type": "STRING", - "value": "Check that IUT discards the Secured DENM containing empty payload of type 'signed'." + "value": "Check that IUT discards the Secured DENM containing empty payload of type 'signed'" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "c251719f-96f6-47da-9d56-cf42c55e378a", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n \t\t\tcontaining header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_DENM'\r\n\t\t\tand containing payload_field {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'signed'\r\n\t\t\t\tcontaining data\r\n\t\t\t\t\tindicating length 0\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "c251719f-96f6-47da-9d56-cf42c55e378a", "type": "STRING", "value": "in process" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "c251719f-96f6-47da-9d56-cf42c55e378a", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09/TP_SEC_ITSS_RCV_DENM_09_03_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09/TP_SEC_ITSS_RCV_DENM_09_03_BO.json index 217fbf2b05b7fb1dccf7ef11c4ff38073ff623ab..42bd7ebfaa432069b1e33b9b6c4c6efb1daa5dad 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09/TP_SEC_ITSS_RCV_DENM_09_03_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09/TP_SEC_ITSS_RCV_DENM_09_03_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "cad70b23-3c6e-4acb-88e8-667a7c91840c", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "cad70b23-3c6e-4acb-88e8-667a7c91840c", "type": "STRING", - "value": "Check that IUT discards the Secured DENM containing non-empty payload of type 'unsecured'." + "value": "Check that IUT discards the Secured DENM containing non-empty payload of type 'unsecured'" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "cad70b23-3c6e-4acb-88e8-667a7c91840c", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_DENM'\r\n\t\t\tand containing payload_field {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'unsecured'\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "cad70b23-3c6e-4acb-88e8-667a7c91840c", "type": "STRING", "value": "in process" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "cad70b23-3c6e-4acb-88e8-667a7c91840c", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09/TP_SEC_ITSS_RCV_DENM_09_04_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09/TP_SEC_ITSS_RCV_DENM_09_04_BO.json index cae3f2df24c9189287c0a18b6eb73c6792d2ca5f..535134eee56d34c668a988c32f30badeffbda27c 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09/TP_SEC_ITSS_RCV_DENM_09_04_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09/TP_SEC_ITSS_RCV_DENM_09_04_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "6a9ae2f4-af9f-476c-b164-62ed5397b5e7", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "6a9ae2f4-af9f-476c-b164-62ed5397b5e7", "type": "STRING", - "value": "Check that IUT discards the Secured DENM containing non-empty payload of type 'encrypted'." + "value": "Check that IUT discards the Secured DENM containing non-empty payload of type 'encrypted'" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "6a9ae2f4-af9f-476c-b164-62ed5397b5e7", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_DENM'\r\n\t\t\tand containing payload_field {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'encrypted'\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "6a9ae2f4-af9f-476c-b164-62ed5397b5e7", "type": "STRING", "value": "in process" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "6a9ae2f4-af9f-476c-b164-62ed5397b5e7", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09/TP_SEC_ITSS_RCV_DENM_09_05_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09/TP_SEC_ITSS_RCV_DENM_09_05_BO.json index 079db5485a9309acdb6c6e2bef14673a40881241..6a39acb5c7a525f96c28c3d4529bcca910f98088 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09/TP_SEC_ITSS_RCV_DENM_09_05_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09/TP_SEC_ITSS_RCV_DENM_09_05_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "8eb06e88-48fc-4ed8-9258-40fa7fd9cd17", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "8eb06e88-48fc-4ed8-9258-40fa7fd9cd17", "type": "STRING", - "value": "Check that IUT discards the Secured DENM containing non-empty payload of type 'signed_external'." + "value": "Check that IUT discards the Secured DENM containing non-empty payload of type 'signed_external'" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "8eb06e88-48fc-4ed8-9258-40fa7fd9cd17", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_DENM'\r\n\t\t\tand containing payload_field {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'signed_external'\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "8eb06e88-48fc-4ed8-9258-40fa7fd9cd17", "type": "STRING", "value": "in process" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "8eb06e88-48fc-4ed8-9258-40fa7fd9cd17", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09/TP_SEC_ITSS_RCV_DENM_09_06_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09/TP_SEC_ITSS_RCV_DENM_09_06_BO.json index 32d5607dddf721846f9b3575ac86b8b922080efe..227b76eb747edf5ca4f773c9b6608f451af10a6d 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09/TP_SEC_ITSS_RCV_DENM_09_06_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09/TP_SEC_ITSS_RCV_DENM_09_06_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "9182cb14-4b7e-444b-8d71-c918cfeba097", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "9182cb14-4b7e-444b-8d71-c918cfeba097", "type": "STRING", - "value": "Check that IUT discards the Secured DENM containing exactly one non-empty payload of type 'signed_and_encrypted'." + "value": "Check that IUT discards the Secured DENM containing exactly one non-empty payload of type 'signed_and_encrypted'" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "9182cb14-4b7e-444b-8d71-c918cfeba097", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_DENM'\r\n\t\t\tand containing payload_field {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'signed_and_encrypted'\r\n\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "9182cb14-4b7e-444b-8d71-c918cfeba097", "type": "STRING", "value": "in process" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "9182cb14-4b7e-444b-8d71-c918cfeba097", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_10.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_10.json index 119b2aa9bed87cc287c384c8b925aa579082de04..f8ec8655121f2640e59f5e4d219a1a3d2d71b1b2 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_10.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_10.json @@ -8,18 +8,29 @@ "value": "Check that the IUT discards Secured DENMs with wrong payloads\r\n" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "e2e13427-57a9-4bf5-aad5-febc6550bec4", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/cd97a713-fd01-4456-bab8-84aae963f48b"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/cd97a713-fd01-4456-bab8-84aae963f48b", + "/Documents/ts_103097v010201p.xhtml/c1d9965d-8c11-4b5b-af2b-42bba5482fd7" + ] }, "_name": { "isGenerated": false, "key": "_name", "origin": "e2e13427-57a9-4bf5-aad5-febc6550bec4", "type": "STRING", - "value": "10. Check presence of traieler field" + "value": "10. Check presence of trailer field" + }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "e2e13427-57a9-4bf5-aad5-febc6550bec4", + "type": "STRING", + "value": "COMPLETE" }, "_type": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_10/TP_SEC_ITSS_RCV_DENM_10_01_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_10/TP_SEC_ITSS_RCV_DENM_10_01_BO.json index 0b7ac60a597f2686cd812a14652944eef1f4c8c8..e6fcc1a79296f12533a7540f6d099d081b5538d0 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_10/TP_SEC_ITSS_RCV_DENM_10_01_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_10/TP_SEC_ITSS_RCV_DENM_10_01_BO.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "8c6b3a50-fba3-41b7-abee-2386e63e2988", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "8c6b3a50-fba3-41b7-abee-2386e63e2988", "type": "STRING", - "value": "Check that IUT discards the Secured DENM doesn't containing the TrailerField of type 'signature'" + "value": "Check that IUT discards the Secured DENM if the message does not contain the trailer field of type signature" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "8c6b3a50-fba3-41b7-abee-2386e63e2988", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is receiving a SecuredMessage {\r\n\t\t\tcontaining header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_DENM'\r\n\t\t\tand containing trailer_fields\r\n\t\t\t\tnot containing any instance of type TrailerField {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'signature'\r\n\t\t\t\t}\r\n\t\t}\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "8c6b3a50-fba3-41b7-abee-2386e63e2988", "type": "STRING", "value": "in process" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "8c6b3a50-fba3-41b7-abee-2386e63e2988", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_11.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_11.json index dd9f3e2b4ffec35379514f487db5754516ed243c..403045a13252d4ccd003e7afb74f793480904522 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_11.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_11.json @@ -8,11 +8,15 @@ "value": "Check that the signature contained in the Secured DENM is calculated over the right fields by cryptographically verifying the signature." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "f52af1d2-3e20-43c9-ab8e-5a6f1681f64c", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/b87e28f5-7eda-4025-9f16-35fe563b6a2f"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/b87e28f5-7eda-4025-9f16-35fe563b6a2f", + "/Documents/ts_103097v010201p.xhtml/351c77d8-92de-4bb3-991e-a3b814285a8c" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "11. Check signature" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "f52af1d2-3e20-43c9-ab8e-5a6f1681f64c", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_12.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_12.json index a80ac8fc0c86717dd796a3e601055c19ececa2b9..8d02d737e2b6cec26c16d1cf2f71dc3738d6bf43 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_12.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_12.json @@ -1,11 +1,15 @@ { "attributes": { "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "63afb366-bc05-42a4-abcb-4e495424ded0", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/70256032-089a-4b8b-b120-defd1af8a96d"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/70256032-089a-4b8b-b120-defd1af8a96d", + "/Documents/ts_103097v010201p.xhtml/2ea232e9-8999-4b23-a946-ac27ce63836a" + ] }, "_name": { "isGenerated": false, @@ -14,6 +18,13 @@ "type": "STRING", "value": "12. Check signing certificate type" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "63afb366-bc05-42a4-abcb-4e495424ded0", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG.json index ba2f2d964292186cc5d3cc08fe1374dc925e35bd..87911fb535d5694c0c6cb2fbb34b5b21cb1efafd 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG.json @@ -1,11 +1,15 @@ { "attributes": { "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "fad8a90a-7f48-4169-a694-973d61d97a02", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/dc173140-21db-4c79-93a8-7f24aff8cea0"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/dc173140-21db-4c79-93a8-7f24aff8cea0", + "/Documents/ts_103097v010201p.xhtml/9e56d5a0-75dc-4481-afe9-202dd280af93" + ] }, "_name": { "isGenerated": false, @@ -14,6 +18,13 @@ "type": "STRING", "value": "Generic Signed Message Profile" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "fad8a90a-7f48-4169-a694-973d61d97a02", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_01.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_01.json index 9af05f436e9311e16eea8c773efa3703d3f1c31f..76e88ac41efe0f5549803fbed7e92d4fcd771135 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_01.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_01.json @@ -1,11 +1,15 @@ { "attributes": { "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "59a4623a-c77e-49ca-9e4e-9043481fa8cd", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/dc173140-21db-4c79-93a8-7f24aff8cea0"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/dc173140-21db-4c79-93a8-7f24aff8cea0", + "/Documents/ts_103097v010201p.xhtml/9e56d5a0-75dc-4481-afe9-202dd280af93" + ] }, "_name": { "isGenerated": false, @@ -14,6 +18,13 @@ "type": "STRING", "value": "01. Check that IUT accepts well-formed GN Beacon message" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "59a4623a-c77e-49ca-9e4e-9043481fa8cd", + "type": "STRING", + "value": "COMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_01/TP_SEC_ITSS_RCV_GENMSG_01_04_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_01/TP_SEC_ITSS_RCV_GENMSG_01_04_BV.json index 191142d8446b7a51d4bc02ad14daaab7d24adcd1..e5b66cfbbaa1c98a8d35bbc27357db526bf12a65 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_01/TP_SEC_ITSS_RCV_GENMSG_01_04_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_01/TP_SEC_ITSS_RCV_GENMSG_01_04_BV.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "8d8d49b1-d333-46cc-b58e-715e657fb5be", "type": "STRING", - "value": "Check that IUT accepts a well-formed Secured GN Beacon signe with the certificate with a polygonal region validity restriction" + "value": "Check that IUT accepts a well-formed Secured GN Beacon signed with the certificate with a polygonal region validity restriction" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_01/TP_SEC_ITSS_RCV_GENMSG_01_05_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_01/TP_SEC_ITSS_RCV_GENMSG_01_05_BV.json index 5cc9e4f47e54139462da66c8d47f016a024f1950..c90d80e0daee7e54fe1941d85df4d90b7a0ab199 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_01/TP_SEC_ITSS_RCV_GENMSG_01_05_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_01/TP_SEC_ITSS_RCV_GENMSG_01_05_BV.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "78c9443e-e811-4b04-9b35-f99e7800b763", "type": "STRING", - "value": "Check that IUT accepts a well-formed Secured GN Beacon signe with the certificate with a identified region validity restriction" + "value": "Check that IUT accepts a well-formed Secured GN Beacon signed with the certificate with an identified region validity restriction" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_02.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_02.json index 5b2f57bea82b1f72bed6d9bc56726d10994e6026..124be7cfe9c0b579d020cfaa88cc744656544275 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_02.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_02.json @@ -8,11 +8,15 @@ "value": "Check that ITS-S discards a Secured CAM containing protocol version unequal to 2" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "7f450356-63c4-41af-a0f3-a575142d2dd9", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/da6b3098-07d5-49aa-876f-6ae437a945ef"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/da6b3098-07d5-49aa-876f-6ae437a945ef", + "/Documents/ts_103097v010201p.xhtml/58ea9176-dfab-4645-a9a2-855e9d5d57dc" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "02. Check the message protocol version" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "7f450356-63c4-41af-a0f3-a575142d2dd9", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_02/TP_SEC_ITSS_RCV_GENMSG_02_01_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_02/TP_SEC_ITSS_RCV_GENMSG_02_01_BO.json index d661df25649a37247e670e17c58cfe9321ef5aad..69c870fe1663dcac2d6ad776a7549495a9fbb730 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_02/TP_SEC_ITSS_RCV_GENMSG_02_01_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_02/TP_SEC_ITSS_RCV_GENMSG_02_01_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "7652af20-1b73-4e8f-ab00-a3f2040edc5c", "type": "STRING", - "value": "Check that IUT discards a Secured GN Message containing protocol version set to a value less then 2" + "value": "Check that IUT discards a Secured GN Message containing protocol version set to a value less than 2" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_02/TP_SEC_ITSS_RCV_GENMSG_02_02_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_02/TP_SEC_ITSS_RCV_GENMSG_02_02_BO.json index 29cd9bca745c5721debae91b2313115b5474ef2b..2211180701209fa07e7655204132905e46574403 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_02/TP_SEC_ITSS_RCV_GENMSG_02_02_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_02/TP_SEC_ITSS_RCV_GENMSG_02_02_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "6d50930f-74ba-43a8-b618-aa2a9e017615", "type": "STRING", - "value": "Check that IUT discards a Secured GN Message containing protocol version set to a value greater then 2" + "value": "Check that IUT discards a Secured GN Message containing protocol version set to a value greater than 2" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04.json index f15f7ab447da94f1ea8c123dc5a084d2b5d06723..6202f780de266215910820d985c8eaa86f9e547e 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04.json @@ -8,6 +8,7 @@ "value": "Check that the IUT discards Secured GN Beacon containing wrong elements of the header fields\r\nCheck that optinal header fields are allowed" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "6062f0fd-4788-4309-8511-a8e98e95a07b", @@ -15,7 +16,10 @@ "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/655df553-f2cc-481a-b3f1-8954c2a2f19b", "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/88ac51be-1b12-4ec0-be8a-8a064ef12c6a", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/ffd67c7f-db67-406e-83ce-f1140efe0f63" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/ffd67c7f-db67-406e-83ce-f1140efe0f63", + "/Documents/ts_103097v010201p.xhtml/9f584669-0edc-4cd5-9e25-979e66b5e955", + "/Documents/ts_103097v010201p.xhtml/73eaa11c-13d1-4db7-840f-c17ed625c22b", + "/Documents/ts_103097v010201p.xhtml/3e04d28f-0401-4b5c-ba33-b47d0e63946b" ] }, "_name": { @@ -25,6 +29,13 @@ "type": "STRING", "value": "04. Check header fields" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "6062f0fd-4788-4309-8511-a8e98e95a07b", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_01_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_01_BO.json index 8834e84338a86c0c582fa8a245435c652a87fa98..022074ded32e71259e491b705d4417356d74b5f8 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_01_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_01_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "0070ed58-1633-4807-8ba1-7a637f17d49b", "type": "STRING", - "value": "Check that IUT discards a secured GN Beacon if the header_fields contain more than one element of header field type: signer_info" + "value": "Check that IUT discards a secured GN Beacon if the header_fields contains more than one element of header field type signer_info" }, "_expectedResults": { "isGenerated": false, @@ -26,7 +26,7 @@ "key": "_status", "origin": "0070ed58-1633-4807-8ba1-7a637f17d49b", "type": "STRING", - "value": "in process" + "value": "complete" }, "_type": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_02_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_02_BO.json index 7ea7fb892f70f0a58ebbdb167fb7fa5d6321b9f5..c60fa4ac02af0de27a183580cf119671eda02f3f 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_02_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_02_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "10b36c34-9d42-4234-bb45-d5ca6ac4c008", "type": "STRING", - "value": "Check that IUT discards a secured GN Beacon if the header_fields does not contain the header field type: signer_info" + "value": "Check that IUT discards a secured GN Beacon if the header_fields does not contain the header field type signer_info" }, "_expectedResults": { "isGenerated": false, @@ -26,7 +26,7 @@ "key": "_status", "origin": "10b36c34-9d42-4234-bb45-d5ca6ac4c008", "type": "STRING", - "value": "in process" + "value": "complete" }, "_type": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_04_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_04_BO.json index 245f7fec84455a572804115a7014e84d725a4439..327ea357392261bd7cc4e4baf244559b82919f7a 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_04_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_04_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "bc98f4b4-1895-4048-ae83-0b2e68cc70a7", "type": "STRING", - "value": "Check that IUT discards a secured GN Beacon if the header_fields contain more than one element of header field type: generation_time" + "value": "Check that IUT discards a secured GN Beacon if the message contains more than one header field of type generation_time" }, "_expectedResults": { "isGenerated": false, @@ -26,7 +26,7 @@ "key": "_status", "origin": "bc98f4b4-1895-4048-ae83-0b2e68cc70a7", "type": "STRING", - "value": "in process" + "value": "complete" }, "_type": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_05_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_05_BO.json index 1fded53e6bc6dd150d4fcdcf0ffa50e1164723c1..4b3a96429c032d85f22311a96f5afccaeb578b6a 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_05_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_05_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "e709cb54-6ca0-4dad-9b97-c19c6df1e39e", "type": "STRING", - "value": "Check that IUT discards a secured GN Beacon if the header_fields doesn't contain the element of header field of type: generation_time" + "value": "Check that IUT discards a secured GN Beacon if the message does not contain the header field of type generation_time" }, "_expectedResults": { "isGenerated": false, @@ -26,7 +26,7 @@ "key": "_status", "origin": "e709cb54-6ca0-4dad-9b97-c19c6df1e39e", "type": "STRING", - "value": "in process" + "value": "complete" }, "_type": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_06_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_06_BO.json index 8339241ccb5b6241336896a7d06c49a26008d3bd..066f32cb2418e6b8cd9babb24ea8e13cc72df2d7 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_06_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_06_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "e7051db7-6d81-4fbd-86ef-4f42795cfc24", "type": "STRING", - "value": "Check that IUT discards a secured GN Beacon if the header_fields contain more than one element of header field of type: generation_location" + "value": "Check that IUT discards a secured GN Beacon if the message contains more than one header field of type generation_location" }, "_expectedResults": { "isGenerated": false, @@ -26,7 +26,7 @@ "key": "_status", "origin": "e7051db7-6d81-4fbd-86ef-4f42795cfc24", "type": "STRING", - "value": "in process" + "value": "complete" }, "_type": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_07_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_07_BO.json index 5cf8b85de68dece80d79e447ab4ffe14da1caa76..aff2e73861646f42be6e81d662de953306653adb 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_07_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_07_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "af580e86-24de-4ec3-be41-ed2c5173f8c3", "type": "STRING", - "value": "Check that IUT discards a secured GN Beacon if the header_fields contain no element of header field type: generation_location" + "value": "Check that IUT discards a secured GN Beacon if the header_fields contains no element of header field type generation_location" }, "_expectedResults": { "isGenerated": false, @@ -26,7 +26,7 @@ "key": "_status", "origin": "af580e86-24de-4ec3-be41-ed2c5173f8c3", "type": "STRING", - "value": "in process" + "value": "complete" }, "_type": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_09_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_09_BV.json index 0c3448d95f797713e433bfc5dc10cccb3783aa73..f467704be94601474f5fc0176419c5a79caef4ac 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_09_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_09_BV.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "50e40de8-863b-4d13-9880-eb0e569ba198", "type": "STRING", - "value": "Check that ITS-S accepts SecuredMessage with security_profile set to 3 (Other) contains in addition to the required fields the following optional HeaderFields: expiry_time" + "value": "Check that IUT accepts a SecuredMessage with GN Beacon payload and its_aid set to AID_BEACON, containing optional header field of type expiry_time" }, "_expectedResults": { "isGenerated": false, @@ -26,7 +26,7 @@ "key": "_status", "origin": "50e40de8-863b-4d13-9880-eb0e569ba198", "type": "STRING", - "value": "in process" + "value": "complete" }, "_type": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_10_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_10_BV.json index 75439977cc2e8794e8c2dfff1e3cc8a6dff3d22e..96033b26832b166e846f98dd7d77172287461d9d 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_10_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_10_BV.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "56116baa-7cc7-48b2-8b89-27cc02a1ec19", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "56116baa-7cc7-48b2-8b89-27cc02a1ec19", "type": "STRING", "value": "Check that ITS-S accepts SecuredMessage with security_profile set to 3 (Other) contains in addition to the required fields the following optional HeaderFields: encryption_parameters and recipient_info " }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "56116baa-7cc7-48b2-8b89-27cc02a1ec19", "type": "STRING", - "value": "TODO: Encription is out of scope for the moment" + "value": "TODO: Encryption is out of scope for the moment" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "56116baa-7cc7-48b2-8b89-27cc02a1ec19", "type": "STRING", "value": "in process" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "56116baa-7cc7-48b2-8b89-27cc02a1ec19", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_05.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_05.json index 84e956b3dba07e08fbaaf4bd0dc9ca16f3142ba3..22c670340175afc6338bd04e5cbdbccf0f4c1379 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_05.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_05.json @@ -8,11 +8,15 @@ "value": "Check that the IUT discards Secured GN Beacon containing other types of signer_info then certificate." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "460995d8-8679-4bf0-93a0-5a368d778d47", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/8919f8cf-0b31-445c-b659-b5c9af67975c"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/8919f8cf-0b31-445c-b659-b5c9af67975c", + "/Documents/ts_103097v010201p.xhtml/f86c287a-9f57-4735-938f-3cc4807a6d53" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "05. Check signer info" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "460995d8-8679-4bf0-93a0-5a368d778d47", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_05/TP_SEC_ITSS_RCV_GENMSG_05_01_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_05/TP_SEC_ITSS_RCV_GENMSG_05_01_BO.json index c14413a7d6f16c4ab366bf2214be5b4049bec2f4..75c8641cf1c1598bd370b7d081b9821fda128475 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_05/TP_SEC_ITSS_RCV_GENMSG_05_01_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_05/TP_SEC_ITSS_RCV_GENMSG_05_01_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "e51d9458-f91d-446b-93c8-1ccf0879bb99", "type": "STRING", - "value": "Check that IUT discards a secured GN Beacon if the header_fields contain a signer of type 'self'" + "value": "Check that IUT discards a secured GN Beacon if the header_fields contains a signer of type 'self'" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_05/TP_SEC_ITSS_RCV_GENMSG_05_02_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_05/TP_SEC_ITSS_RCV_GENMSG_05_02_BO.json index cb2846255a2d19801e29ccebb133d93292a8629d..4c0e5f72bf7db4ebc013176d46877c4571ec9c98 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_05/TP_SEC_ITSS_RCV_GENMSG_05_02_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_05/TP_SEC_ITSS_RCV_GENMSG_05_02_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "73bc6d5b-4fbc-4720-b0e3-b2c41b24526d", "type": "STRING", - "value": "Check that IUT discards a secured GN Beacon if the header_fields contain a signer of type 'certificate_digest_with_other_algorithm'" + "value": "Check that IUT discards a secured GN Beacon if the header_fields contains a signer of type 'certificate_digest_with_other_algorithm'" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_05/TP_SEC_ITSS_RCV_GENMSG_05_03_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_05/TP_SEC_ITSS_RCV_GENMSG_05_03_BO.json index ead1d99e0214691bbcf6fcbe1e3c476fb14eba10..059281f94df47dca8f5c39bcf4b81f215a199804 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_05/TP_SEC_ITSS_RCV_GENMSG_05_03_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_05/TP_SEC_ITSS_RCV_GENMSG_05_03_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "d977a378-5775-470c-b43a-d3dd41698de2", "type": "STRING", - "value": "Check that IUT discards a secured GN Beacon if the header_fields contain a signer of type certificate_chain" + "value": "Check that IUT discards a secured GN Beacon if the header_fields contains a signer of type certificate_chain" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_06.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_06.json index 91afb47bede60743094cb5f35efbd20d898b244f..459e249c76cf2f31124c3b69a9bce657c3a969ab 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_06.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_06.json @@ -8,6 +8,7 @@ "value": "Check the acceptance of Secured GN Message containing HeaderField generation_time" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "a109dbf9-abde-414d-8d84-d4d5065d999b", @@ -15,7 +16,10 @@ "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/e1c8b3e0-5da0-4e8d-8355-563039c7cdc7", "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/6e2b18ef-2431-48ae-9a10-cae099d89969", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/ec223c71-ab7b-4b9c-9942-739771862633" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/ec223c71-ab7b-4b9c-9942-739771862633", + "/Documents/ts_103097v010201p.xhtml/615b41cb-6660-41b4-8375-b658436ca1df", + "/Documents/ts_103097v010201p.xhtml/b31b89ad-2b2a-4bc8-a16f-9c2918b931c9", + "/Documents/ts_103097v010201p.xhtml/56cf21c7-baf9-4b70-932f-326b22b242a8" ] }, "_name": { @@ -25,6 +29,13 @@ "type": "STRING", "value": "06. Check generation time" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "a109dbf9-abde-414d-8d84-d4d5065d999b", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_06/TP_C2C_SEC_ITSS_RCV_GENMSG_06_03_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_06/TP_C2C_SEC_ITSS_RCV_GENMSG_06_03_BO.json index 93c62f8b51d8700524cdf60440d5d33f83bc84da..4aa5884bc9e3c5380819697de75de137b0c35ec2 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_06/TP_C2C_SEC_ITSS_RCV_GENMSG_06_03_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_06/TP_C2C_SEC_ITSS_RCV_GENMSG_06_03_BO.json @@ -1,47 +1,54 @@ -{ - "attributes": { - "PICS_C2C": { - "isGenerated": false, - "key": "PICS_C2C", - "origin": "eee51fa0-86be-4813-9864-d196e6a26bec", - "type": "STRING", - "value": "true" - }, - "_author": { - "isGenerated": false, - "key": "_author", - "origin": "eee51fa0-86be-4813-9864-d196e6a26bec", - "type": "STRING", - "value": "filatov" - }, - "_description": { - "isGenerated": false, - "key": "_description", - "origin": "eee51fa0-86be-4813-9864-d196e6a26bec", - "type": "STRING", - "value": "Check that IUT discards Secured DENM if the generation_time is more than 10 minute in the past (C2C only)" - }, - "_expectedResults": { - "isGenerated": false, - "key": "_expectedResults", - "origin": "eee51fa0-86be-4813-9864-d196e6a26bec", - "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage\r\n\t\t\tcontaining header_fields ['generation_time']\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 (TIME_1 < CUR_TIME - 10min)\r\n\t\t\tand containing header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_BEACON'\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" - }, - "_status": { - "isGenerated": false, - "key": "_status", - "origin": "eee51fa0-86be-4813-9864-d196e6a26bec", - "type": "STRING", - "value": "in process" - }, - "_type": { - "isGenerated": false, - "key": "_type", - "origin": "eee51fa0-86be-4813-9864-d196e6a26bec", - "type": "STRING", - "value": "TestPurpose" - } - }, - "uuid": "eee51fa0-86be-4813-9864-d196e6a26bec" +{ + "attributes": { + "PICS_C2C": { + "isGenerated": false, + "key": "PICS_C2C", + "origin": "eee51fa0-86be-4813-9864-d196e6a26bec", + "type": "STRING", + "value": "true" + }, + "_author": { + "isGenerated": false, + "key": "_author", + "origin": "eee51fa0-86be-4813-9864-d196e6a26bec", + "type": "STRING", + "value": "filatov" + }, + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "eee51fa0-86be-4813-9864-d196e6a26bec", + "type": "STRING", + "value": "Check that IUT discards Secured DENM if the generation_time is more than 10 minute in the past (C2C only)" + }, + "_expectedResults": { + "isGenerated": false, + "key": "_expectedResults", + "origin": "eee51fa0-86be-4813-9864-d196e6a26bec", + "type": "STRING", + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage\r\n\t\t\tcontaining header_fields ['generation_time']\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 (TIME_1 < CUR_TIME - 10min)\r\n\t\t\tand containing header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_BEACON'\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" + }, + "_status": { + "isGenerated": false, + "key": "_status", + "origin": "eee51fa0-86be-4813-9864-d196e6a26bec", + "type": "STRING", + "value": "in process" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "eee51fa0-86be-4813-9864-d196e6a26bec", + "type": "STRING", + "value": "TestPurpose" + }, + "excluded": { + "isGenerated": false, + "key": "excluded", + "origin": "eee51fa0-86be-4813-9864-d196e6a26bec", + "type": "BOOL", + "value": "true" + } + }, + "uuid": "eee51fa0-86be-4813-9864-d196e6a26bec" } \ No newline at end of file diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_06/TP_C2C_SEC_ITSS_RCV_GENMSG_06_04_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_06/TP_C2C_SEC_ITSS_RCV_GENMSG_06_04_BO.json index b99188c5cd941c426e3e7566760cf5759b56d21a..5e059219894546bc40b86bad55e88f14ee7eb961 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_06/TP_C2C_SEC_ITSS_RCV_GENMSG_06_04_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_06/TP_C2C_SEC_ITSS_RCV_GENMSG_06_04_BO.json @@ -1,47 +1,54 @@ -{ - "attributes": { - "PICS_C2C": { - "isGenerated": false, - "key": "PICS_C2C", - "origin": "38d0903f-c3e9-413c-88f0-cc88ad438c7d", - "type": "STRING", - "value": "true" - }, - "_author": { - "isGenerated": false, - "key": "_author", - "origin": "38d0903f-c3e9-413c-88f0-cc88ad438c7d", - "type": "STRING", - "value": "filatov" - }, - "_description": { - "isGenerated": false, - "key": "_description", - "origin": "38d0903f-c3e9-413c-88f0-cc88ad438c7d", - "type": "STRING", - "value": "Check that IUT discards Secured CAM if the generation_time is more than 10 minute in the future(C2C only)" - }, - "_expectedResults": { - "isGenerated": false, - "key": "_expectedResults", - "origin": "38d0903f-c3e9-413c-88f0-cc88ad438c7d", - "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage\r\n\t\t\tcontaining header_fields ['generation_time']\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 (TIME_1 > CUR_TIME + 10min)\r\n\t\t\tand containing header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_BEACON'\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" - }, - "_status": { - "isGenerated": false, - "key": "_status", - "origin": "38d0903f-c3e9-413c-88f0-cc88ad438c7d", - "type": "STRING", - "value": "in process" - }, - "_type": { - "isGenerated": false, - "key": "_type", - "origin": "38d0903f-c3e9-413c-88f0-cc88ad438c7d", - "type": "STRING", - "value": "TestPurpose" - } - }, - "uuid": "38d0903f-c3e9-413c-88f0-cc88ad438c7d" +{ + "attributes": { + "PICS_C2C": { + "isGenerated": false, + "key": "PICS_C2C", + "origin": "38d0903f-c3e9-413c-88f0-cc88ad438c7d", + "type": "STRING", + "value": "true" + }, + "_author": { + "isGenerated": false, + "key": "_author", + "origin": "38d0903f-c3e9-413c-88f0-cc88ad438c7d", + "type": "STRING", + "value": "filatov" + }, + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "38d0903f-c3e9-413c-88f0-cc88ad438c7d", + "type": "STRING", + "value": "Check that IUT discards Secured CAM if the generation_time is more than 10 minute in the future(C2C only)" + }, + "_expectedResults": { + "isGenerated": false, + "key": "_expectedResults", + "origin": "38d0903f-c3e9-413c-88f0-cc88ad438c7d", + "type": "STRING", + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage\r\n\t\t\tcontaining header_fields ['generation_time']\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 (TIME_1 > CUR_TIME + 10min)\r\n\t\t\tand containing header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_BEACON'\r\n\t} then {\r\n\t\tthe IUT discards a SecuredMessage\r\n\t}\r\n}" + }, + "_status": { + "isGenerated": false, + "key": "_status", + "origin": "38d0903f-c3e9-413c-88f0-cc88ad438c7d", + "type": "STRING", + "value": "in process" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "38d0903f-c3e9-413c-88f0-cc88ad438c7d", + "type": "STRING", + "value": "TestPurpose" + }, + "excluded": { + "isGenerated": false, + "key": "excluded", + "origin": "38d0903f-c3e9-413c-88f0-cc88ad438c7d", + "type": "BOOL", + "value": "true" + } + }, + "uuid": "38d0903f-c3e9-413c-88f0-cc88ad438c7d" } \ No newline at end of file diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_08.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_08.json index 63a44eef623e728fbccd0ef36d31417dc32de42d..4f1dec5eb7f3877b53b60d23ad3d356c60dffc6c 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_08.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_08.json @@ -8,13 +8,16 @@ "value": "Check the acceptance of Secured GN Message containing HeaderField generation_location" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "f9270a42-6276-4d74-a053-e8d7630259c8", "type": "LIST", "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/f38bfa36-0dbd-405f-88df-5b077f4912d9", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/6be5db96-3b1e-4d71-a27e-2361c7422876" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/6be5db96-3b1e-4d71-a27e-2361c7422876", + "/Documents/ts_103097v010201p.xhtml/8d8ff631-c7f2-4672-9842-a920332238d1", + "/Documents/ts_103097v010201p.xhtml/1867819d-7fb8-4abe-848a-218944594c15" ] }, "_name": { @@ -24,6 +27,13 @@ "type": "STRING", "value": "08. Check generation location" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "f9270a42-6276-4d74-a053-e8d7630259c8", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_08/TP_C2C_SEC_ITSS_RCV_GENMSG_08_05_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_08/TP_C2C_SEC_ITSS_RCV_GENMSG_08_05_BV.json index ea90beb333e3881e1f00bf27c8cef0b7ce08e0af..39352ea3d80426f0701c88189c09c00854dc3610 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_08/TP_C2C_SEC_ITSS_RCV_GENMSG_08_05_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_08/TP_C2C_SEC_ITSS_RCV_GENMSG_08_05_BV.json @@ -41,6 +41,13 @@ "origin": "73fbb432-ae92-45ac-b0c3-3a558234d62d", "type": "STRING", "value": "TestPurpose" + }, + "excluded": { + "isGenerated": false, + "key": "excluded", + "origin": "73fbb432-ae92-45ac-b0c3-3a558234d62d", + "type": "BOOL", + "value": "true" } }, "uuid": "73fbb432-ae92-45ac-b0c3-3a558234d62d" diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_08/TP_C2C_SEC_ITSS_RCV_GENMSG_08_06_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_08/TP_C2C_SEC_ITSS_RCV_GENMSG_08_06_BO.json index cc7209c46beb374c865d5b98f1cd3a78222afe7e..b46e4cc89f805e272ad422f23a7961fed0b8c958 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_08/TP_C2C_SEC_ITSS_RCV_GENMSG_08_06_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_08/TP_C2C_SEC_ITSS_RCV_GENMSG_08_06_BO.json @@ -1,47 +1,54 @@ -{ - "attributes": { - "PICS_C2C": { - "isGenerated": false, - "key": "PICS_C2C", - "origin": "52eb2828-5ddc-4b72-95c0-e720aa4aa929", - "type": "STRING", - "value": "true" - }, - "_author": { - "isGenerated": false, - "key": "_author", - "origin": "52eb2828-5ddc-4b72-95c0-e720aa4aa929", - "type": "STRING", - "value": "filatov" - }, - "_description": { - "isGenerated": false, - "key": "_description", - "origin": "52eb2828-5ddc-4b72-95c0-e720aa4aa929", - "type": "STRING", - "value": "Check that IUT discards Secured GN Message if the distance between the current position of IUT and the value of optional HeaderField generation_location is more than 30 km" - }, - "_expectedResults": { - "isGenerated": false, - "key": "_expectedResults", - "origin": "52eb2828-5ddc-4b72-95c0-e720aa4aa929", - "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage\r\n\t\t\tcontaining header_fields ['generation_location']\r\n\t\t\t\tcontaining generation_location\r\n\t\t\t\t\tindicating position in 31 km from the current position of IUT\r\n\t\t\tand containing header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_BEACON'\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" - }, - "_status": { - "isGenerated": false, - "key": "_status", - "origin": "52eb2828-5ddc-4b72-95c0-e720aa4aa929", - "type": "STRING", - "value": "in process" - }, - "_type": { - "isGenerated": false, - "key": "_type", - "origin": "52eb2828-5ddc-4b72-95c0-e720aa4aa929", - "type": "STRING", - "value": "TestPurpose" - } - }, - "uuid": "52eb2828-5ddc-4b72-95c0-e720aa4aa929" +{ + "attributes": { + "PICS_C2C": { + "isGenerated": false, + "key": "PICS_C2C", + "origin": "52eb2828-5ddc-4b72-95c0-e720aa4aa929", + "type": "STRING", + "value": "true" + }, + "_author": { + "isGenerated": false, + "key": "_author", + "origin": "52eb2828-5ddc-4b72-95c0-e720aa4aa929", + "type": "STRING", + "value": "filatov" + }, + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "52eb2828-5ddc-4b72-95c0-e720aa4aa929", + "type": "STRING", + "value": "Check that IUT discards Secured GN Message if the distance between the current position of IUT and the value of optional HeaderField generation_location is more than 30 km" + }, + "_expectedResults": { + "isGenerated": false, + "key": "_expectedResults", + "origin": "52eb2828-5ddc-4b72-95c0-e720aa4aa929", + "type": "STRING", + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen { \r\n\t\tthe IUT is receiving a SecuredMessage\r\n\t\t\tcontaining header_fields ['generation_location']\r\n\t\t\t\tcontaining generation_location\r\n\t\t\t\t\tindicating position in 31 km from the current position of IUT\r\n\t\t\tand containing header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_BEACON'\r\n\t} then {\r\n\t\tthe IUT discards the message\r\n\t}\r\n}" + }, + "_status": { + "isGenerated": false, + "key": "_status", + "origin": "52eb2828-5ddc-4b72-95c0-e720aa4aa929", + "type": "STRING", + "value": "in process" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "52eb2828-5ddc-4b72-95c0-e720aa4aa929", + "type": "STRING", + "value": "TestPurpose" + }, + "excluded": { + "isGenerated": false, + "key": "excluded", + "origin": "52eb2828-5ddc-4b72-95c0-e720aa4aa929", + "type": "BOOL", + "value": "true" + } + }, + "uuid": "52eb2828-5ddc-4b72-95c0-e720aa4aa929" } \ No newline at end of file diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_08/TP_SEC_ITSS_RCV_GENMSG_08_02_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_08/TP_SEC_ITSS_RCV_GENMSG_08_02_BO.json index 4d7dcb0663dd981eeb0ecf0c8e4759d2e80eafe2..125b74d5d292e1ce76e065b55451b1613542f3a4 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_08/TP_SEC_ITSS_RCV_GENMSG_08_02_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_08/TP_SEC_ITSS_RCV_GENMSG_08_02_BO.json @@ -19,7 +19,7 @@ "key": "_description", "origin": "f3a8574f-6ee3-4085-b808-75e7e23e3d66", "type": "STRING", - "value": "Check that IUT discards Secured GN Message if the HeaderField generation_location is outside of the rectangilar validity region of the signing certificate" + "value": "Check that IUT discards Secured GN Message if the HeaderField generation_location is outside of the rectangular validity region of the signing certificate" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_09.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_09.json index 750c3157277b885b3214258af393c6cb4aa4f8a3..8f596d51ce6c2677363b3563303099ad642fcfd7 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_09.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_09.json @@ -8,11 +8,15 @@ "value": "Check the acceptance of payloads of Secured GN Message\r\n" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "2ec51847-a022-4719-b614-8f24ed5952f0", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/1a6ac998-0ad1-483e-87ce-dc1b2c57d6f1"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/1a6ac998-0ad1-483e-87ce-dc1b2c57d6f1", + "/Documents/ts_103097v010201p.xhtml/327f9109-fdf6-4271-ad73-dde8a50590b7" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "09. Check Payload" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "2ec51847-a022-4719-b614-8f24ed5952f0", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_09/TP_SEC_ITSS_RCV_GENMSG_09_02_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_09/TP_SEC_ITSS_RCV_GENMSG_09_02_BO.json index 198a3351e80e9701f512640d8e482007df69b049..1337013820bf7db28f2edaeef9ac3a8ac1f7ef2a 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_09/TP_SEC_ITSS_RCV_GENMSG_09_02_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_09/TP_SEC_ITSS_RCV_GENMSG_09_02_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "ba3f9bb4-561c-4974-9d16-16e6f763fe65", "type": "STRING", - "value": "Check that IUT discards the Secured GN Message containing empty payload of type 'signed'." + "value": "Check that IUT discards the Secured GN Message containing empty payload of type 'signed'" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_09/TP_SEC_ITSS_RCV_GENMSG_09_03_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_09/TP_SEC_ITSS_RCV_GENMSG_09_03_BO.json index 0f389387bb579e1df30eb4205f55e133c99c3ccf..b5c206b10dae0e64519644648a586a8981684841 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_09/TP_SEC_ITSS_RCV_GENMSG_09_03_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_09/TP_SEC_ITSS_RCV_GENMSG_09_03_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "e81185be-ce40-4b95-8c99-1a3f2e283217", "type": "STRING", - "value": "Check that IUT discards the Secured GN Message containing payload element of type 'unsecured'." + "value": "Check that IUT discards the Secured GN Message containing payload element of type 'unsecured'" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_09/TP_SEC_ITSS_RCV_GENMSG_09_04_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_09/TP_SEC_ITSS_RCV_GENMSG_09_04_BO.json index efc669438fbd305c09ffb45405a5862282a0edd7..7af4301ea993d1a6d105b76cc838e04cb4505bdd 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_09/TP_SEC_ITSS_RCV_GENMSG_09_04_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_09/TP_SEC_ITSS_RCV_GENMSG_09_04_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "7b3d3595-ec50-4d13-86dd-01a985380d2a", "type": "STRING", - "value": "Check that IUT discards the Secured DENM containing payload element of type 'encrypted'." + "value": "Check that IUT discards the Secured DENM containing payload element of type 'encrypted'" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_10.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_10.json index acf23c23ffc4d8e6e516a249b084298e7fffd27b..166f6d410d232a36e883e51b304cf8732ab90a5e 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_10.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_10.json @@ -8,18 +8,29 @@ "value": "Check that the IUT discards Secured GN Message with wrong payloads\r\n" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "4d7af7dc-b85a-423e-8459-87b2ab70c790", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/e1e96227-c64e-4d30-8d81-67ee8a5f802f"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/e1e96227-c64e-4d30-8d81-67ee8a5f802f", + "/Documents/ts_103097v010201p.xhtml/b92fccca-032f-4a3c-8b7d-89e0cd966e8d" + ] }, "_name": { "isGenerated": false, "key": "_name", "origin": "4d7af7dc-b85a-423e-8459-87b2ab70c790", "type": "STRING", - "value": "10. Check presence of traieler field" + "value": "10. Check presence of trailer field" + }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "4d7af7dc-b85a-423e-8459-87b2ab70c790", + "type": "STRING", + "value": "COMPLETE" }, "_type": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_10/TP_SEC_ITSS_RCV_GENMSG_10_01_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_10/TP_SEC_ITSS_RCV_GENMSG_10_01_BO.json index ec4a82992be89a16ebb98a5259385b133166ab74..1c31f8d9158dbf0bda03000ba9c8abe3c7b6e2e8 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_10/TP_SEC_ITSS_RCV_GENMSG_10_01_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_10/TP_SEC_ITSS_RCV_GENMSG_10_01_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "a385953e-e7c1-4323-b128-ecd9b644f0fc", "type": "STRING", - "value": "Check that IUT discards the Secured GN Message doesn't containing the TrailerField of type 'signature'" + "value": "Check that IUT discards the Secured GN Message if the message does not contain the trailer field of type 'signature' " }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_11.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_11.json index f94fffc8c22437e4e1bfaacd643f80e4f4dd5f90..bad4b35556ad8bd9570ad381959edbbaf820f337 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_11.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_11.json @@ -8,11 +8,15 @@ "value": "Check that the signature contained in the Secured GN Message is calculated over the right fields by cryptographically verifying the signature." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "4552604e-b6c6-4786-b2f8-cbc4d08e6c82", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/3d07e7dc-24bf-4edb-973d-71d1fd22e490"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/3d07e7dc-24bf-4edb-973d-71d1fd22e490", + "/Documents/ts_103097v010201p.xhtml/3545ac20-454c-4f8b-8447-af4d7d3eb03c" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "11. Check signature" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "4552604e-b6c6-4786-b2f8-cbc4d08e6c82", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_12.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_12.json index 78d8385935c141f8c8da89de06fe7b1c1409eaa1..fb9573e14c7c2200cd765ae6a208c3dbb37b2dc2 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_12.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_12.json @@ -1,11 +1,15 @@ { "attributes": { "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "96ef49a9-c3e9-496e-bc0a-ec45a16824ca", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/70256032-089a-4b8b-b120-defd1af8a96d"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/70256032-089a-4b8b-b120-defd1af8a96d", + "/Documents/ts_103097v010201p.xhtml/2ea232e9-8999-4b23-a946-ac27ce63836a" + ] }, "_name": { "isGenerated": false, @@ -14,6 +18,13 @@ "type": "STRING", "value": "12. Check signing certificate type" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "96ef49a9-c3e9-496e-bc0a-ec45a16824ca", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_12/TP_SEC_ITSS_RCV_GENMSG_12_01_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_12/TP_SEC_ITSS_RCV_GENMSG_12_01_BO.json index 3dbb92faa2daf86b2bcc7222ea6ed31390594d74..0c0adf20495821527d745945be7e6c0185d3b660 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_12/TP_SEC_ITSS_RCV_GENMSG_12_01_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_12/TP_SEC_ITSS_RCV_GENMSG_12_01_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "1f2972c1-1f13-417c-8a29-3c1291afdc57", "type": "STRING", - "value": "Check that IUT discards a Secured DENM if the signer certificate of the message contains the subject type \"enrolment_credential\"" + "value": "Check that IUT discards a Secured GN Message if the signer certificate of the message contains the subject type 'enrolment_credential'" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_12/TP_SEC_ITSS_RCV_GENMSG_12_02_BO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_12/TP_SEC_ITSS_RCV_GENMSG_12_02_BO.json index d1991e6a465c792ee747446d6e2d93c9e102d6e4..8025fec629f747b3cb642cd98f7be5cd2ac2dee6 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_12/TP_SEC_ITSS_RCV_GENMSG_12_02_BO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_12/TP_SEC_ITSS_RCV_GENMSG_12_02_BO.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "58acbefe-47a8-422d-b349-ae560978bfab", "type": "STRING", - "value": "Check that IUT discards a Secured DENM if the signer certificate of the message contains the subject type \"authorization_authority\"" + "value": "Check that IUT discards a Secured GN Message if the signer certificate of the message contains the subject type 'authorization_authority'" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_OVERVIEW.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_OVERVIEW.json new file mode 100644 index 0000000000000000000000000000000000000000..eb8bc23f3c60e64f151992ee9efe787238a70e76 --- /dev/null +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_OVERVIEW.json @@ -0,0 +1,26 @@ +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "0c9c2f1a-0f91-4cff-9a1b-29c5883b7661", + "type": "STRING", + "value": "All test purposes of receiving behaviour are considered optional." + }, + "_name": { + "isGenerated": false, + "key": "_name", + "origin": "0c9c2f1a-0f91-4cff-9a1b-29c5883b7661", + "type": "STRING", + "value": "01. Overview" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "0c9c2f1a-0f91-4cff-9a1b-29c5883b7661", + "type": "STRING", + "value": "Requirement" + } + }, + "uuid": "0c9c2f1a-0f91-4cff-9a1b-29c5883b7661" +} \ No newline at end of file diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND.json index 09937819f968ecf80407e4b293e34f726be3b476..f5e11d2c2e99bcf213ace922db8af3ba21438a7f 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND.json @@ -5,7 +5,14 @@ "key": "_name", "origin": "a077a073-02b8-4035-b5eb-386fb33545b6", "type": "STRING", - "value": "1. Sending behavior" + "value": "2. Sending behaviour" + }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "a077a073-02b8-4035-b5eb-386fb33545b6", + "type": "STRING", + "value": "FAILED" }, "_type": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM.json index e29f598141fc7dbcba2c5901893d03257655e699..c20d49cc7232fe2d26a8ed09790ec149107e36a4 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM.json @@ -1,11 +1,15 @@ { "attributes": { "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "42ba7080-2769-40f8-84c3-1ef627d97f0b", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/2adf210a-7c7b-4225-a0ed-f5a25b1b430d"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/2adf210a-7c7b-4225-a0ed-f5a25b1b430d", + "/Documents/ts_103097v010201p.xhtml/e1308a28-bfa6-40e1-b39e-f1b64d00509d" + ] }, "_name": { "isGenerated": false, @@ -14,6 +18,13 @@ "type": "STRING", "value": "CAM profile" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "42ba7080-2769-40f8-84c3-1ef627d97f0b", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_02.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_02.json index 1ccda50f76928fe3c4a6db4e6d7c7ed36889b8f9..50c3c718e59092dd735b994cb6146449eec65aab 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_02.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_02.json @@ -8,6 +8,7 @@ "value": "Check that the sent Secured CAM contains exactly one element of the header fields: signer_info, generation_time, message_type.\r\nCheck that the header fields are in the ascending order according to the numbering of the enumeration except of the signer_info, which is encoded first.\r\nCheck that generation_time_with_confidence is not used" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "e3b3c999-5727-4e84-8456-390555d8dcfb", @@ -16,7 +17,11 @@ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/c7afae7a-c9c2-4459-972d-33da342b7baf", "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/1b243599-d5bc-4e46-a449-8d24fb05ab5f", "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/4f1d2ecd-4dde-469a-8899-662f2ace2105", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/c2508610-0005-4b07-8ba2-0490a71f0a58" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/c2508610-0005-4b07-8ba2-0490a71f0a58", + "/Documents/ts_103097v010201p.xhtml/0bf26c42-7a43-4f6b-8bbf-3f61249999e4", + "/Documents/ts_103097v010201p.xhtml/5d1ff90b-ad9c-416c-900b-030397b6b6ee", + "/Documents/ts_103097v010201p.xhtml/c3f4369c-b117-4656-8932-603e7787cbc4", + "/Documents/ts_103097v010201p.xhtml/42e1c2c7-4b3f-4b5f-b9b7-39181507295d" ] }, "_name": { @@ -26,6 +31,13 @@ "type": "STRING", "value": "02. Check header fields" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "e3b3c999-5727-4e84-8456-390555d8dcfb", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_02/TP_SEC_ITSS_SND_CAM_02_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_02/TP_SEC_ITSS_SND_CAM_02_01_BV.json index ad0f25e59badd1dcbe84f9375db5419cd4981d6b..0bdbfd882cf9ad5ba1335a1a6f0e1dc4e03ff4de 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_02/TP_SEC_ITSS_SND_CAM_02_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_02/TP_SEC_ITSS_SND_CAM_02_01_BV.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "0560feba-c21e-43e0-9a01-ac4f859dc936", "type": "STRING", - "value": "Check that the secured CAM contains exactly one element of these header fields: signer_info, generation_time, its_aid.\r\nCheck that the header fields are in the ascending order according to the numbering of the enumeration except of the signer_info, which is encoded first.\r\nCheck that generation_time_standard_deviation, expiration, encryption_parameters, recipient_info are not used\r\n\r\n" + "value": "Check that the secured CAM contains exactly one element of these header fields: signer_info, generation_time, its_aid;\r\nCheck that the header fields are in the ascending order according to the numbering of the enumeration except of the signer_info, which is encoded first;\r\nCheck that generation_time_standard_deviation, expiration, encryption_parameters, recipient_info are not used" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_04.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_04.json deleted file mode 100644 index bd2929ab518f1b57ccaa32d5da2945f9fc75e475..0000000000000000000000000000000000000000 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_04.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "attributes": { - "_description": { - "isGenerated": false, - "key": "_description", - "origin": "f09a6229-ece3-48cb-bcd8-6e7cc29bb745", - "type": "STRING", - "value": "Check that the secured CAM contains in the normal case the signer_info field of type certificate_digest_with_ecdsap256" - }, - "_locations": { - "isGenerated": false, - "key": "_locations", - "origin": "f09a6229-ece3-48cb-bcd8-6e7cc29bb745", - "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/ef1d24a2-c970-4133-9123-bbe51c663a38"] - }, - "_name": { - "isGenerated": false, - "key": "_name", - "origin": "f09a6229-ece3-48cb-bcd8-6e7cc29bb745", - "type": "STRING", - "value": "04. Check that IUT sends digest as sender info" - }, - "_type": { - "isGenerated": false, - "key": "_type", - "origin": "f09a6229-ece3-48cb-bcd8-6e7cc29bb745", - "type": "STRING", - "value": "Requirement" - }, - "coverageStatus": { - "isGenerated": false, - "key": "coverageStatus", - "origin": "f09a6229-ece3-48cb-bcd8-6e7cc29bb745", - "type": "STRING", - "value": "in process" - } - }, - "uuid": "f09a6229-ece3-48cb-bcd8-6e7cc29bb745" -} \ No newline at end of file diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_04/TP_SEC_ITSS_SND_CAM_04_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_04/TP_SEC_ITSS_SND_CAM_04_01_BV.json deleted file mode 100644 index 74dcfe25b0011e4cc1e5278376693ed0f0e5929d..0000000000000000000000000000000000000000 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_04/TP_SEC_ITSS_SND_CAM_04_01_BV.json +++ /dev/null @@ -1,40 +0,0 @@ -{ - "attributes": { - "_author": { - "isGenerated": false, - "key": "_author", - "origin": "4dd68f02-fece-45b0-b94a-b8a30b057618", - "type": "STRING", - "value": "filatov" - }, - "_description": { - "isGenerated": false, - "key": "_description", - "origin": "4dd68f02-fece-45b0-b94a-b8a30b057618", - "type": "STRING", - "value": "Check that the secured CAM contains in the normal case the signer_info field of type certificate_digest_with_sha256" - }, - "_expectedResults": { - "isGenerated": false, - "key": "_expectedResults", - "origin": "4dd68f02-fece-45b0-b94a-b8a30b057618", - "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n\tand the IUT is configured to send more than one CAM per second\r\n\tand the IUT having sent last CAM\r\n\t\tcontaining header_fields['signer_info'].signer.type\r\n\t\t\tindicating 'certificate'\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is requested to send next CAM\r\n} then {\r\n\t\tthe IUT sends a SecuredMessage\r\n\t\t\tcontaining header_fields['signer_info']{\r\n\t\t\t\tcontaining signer\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate_digest_with_sha256'\r\n\t\t\t\t\tcontaining digest\r\n\t\t\t}\r\n\t\t\tcontaining header_fields['its_aid']{\r\n\t\t\t\tcontaining AID_CAM\r\n\t}\r\n}" - }, - "_status": { - "isGenerated": false, - "key": "_status", - "origin": "4dd68f02-fece-45b0-b94a-b8a30b057618", - "type": "STRING", - "value": "verified" - }, - "_type": { - "isGenerated": false, - "key": "_type", - "origin": "4dd68f02-fece-45b0-b94a-b8a30b057618", - "type": "STRING", - "value": "TestPurpose" - } - }, - "uuid": "4dd68f02-fece-45b0-b94a-b8a30b057618" -} \ No newline at end of file diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_05.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_05.json index 6ed6144f1ffc89f1e9eff1c9eae6acbb66b94e17..6419f35cd0603d4d97fea9d2f329facd12f895c6 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_05.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_05.json @@ -5,14 +5,18 @@ "key": "_description", "origin": "f09a6229-ece3-48cb-bcd8-6e7cc29bb745", "type": "STRING", - "value": "Check that the secured CAM contains in the normal case the signer_info field of type certificate_digest_with_ecdsap256" + "value": "Check that the secured CAM contains the signer_info field of certificate when over the time of one second no other SecuredMessage contained a signer_info of type certificate" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "f09a6229-ece3-48cb-bcd8-6e7cc29bb745", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/ef1d24a2-c970-4133-9123-bbe51c663a38"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/ef1d24a2-c970-4133-9123-bbe51c663a38", + "/Documents/ts_103097v010201p.xhtml/d485e010-0a82-4bfe-9dff-8d8f09d64fa5" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "05. Check that IUT sends digest as sender info" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "f09a6229-ece3-48cb-bcd8-6e7cc29bb745", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_05/TP_SEC_ITSS_SND_CAM_05_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_05/TP_SEC_ITSS_SND_CAM_05_01_BV.json index 0549cd6712edace650922b3ecfec17eeb07626de..c30895f876c134cd5d9b1e0a79a200a112669e74 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_05/TP_SEC_ITSS_SND_CAM_05_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_05/TP_SEC_ITSS_SND_CAM_05_01_BV.json @@ -3,38 +3,38 @@ "_author": { "isGenerated": false, "key": "_author", - "origin": "a36e7e7c-5f3c-437b-9e27-1bd60ea168ef", + "origin": "4dd68f02-fece-45b0-b94a-b8a30b057618", "type": "STRING", "value": "filatov" }, "_description": { "isGenerated": false, "key": "_description", - "origin": "a36e7e7c-5f3c-437b-9e27-1bd60ea168ef", + "origin": "4dd68f02-fece-45b0-b94a-b8a30b057618", "type": "STRING", - "value": "Check that the secured CAM contains the signer_info field of certificate when over the time of one second no other SecuredMessage contained a signer_info of type certificate." + "value": "Check that the secured CAM contains the signer_info field of certificate when over the time of one second no other SecuredMessage contained a signer_info of type certificate" }, "_expectedResults": { "isGenerated": false, "key": "_expectedResults", - "origin": "a36e7e7c-5f3c-437b-9e27-1bd60ea168ef", + "origin": "4dd68f02-fece-45b0-b94a-b8a30b057618", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n\tand the IUT is configured to send more than one CAM per second\r\n\tand the IUT having sent a CAM\r\n\t\tcontaining header_fields['signer_info'].signer.type\r\n\t\t\tindicating 'certificate'\r\n\t\tcontains header_fields['generation_time']\r\n\t\t\tindicating TIME_LAST\r\n\t}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT sends one of the next SecuredMessage\r\n\t\t\tcontaining header_fields['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tcontaining certificate\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t\tcontaining header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_CAM'\r\n\t} then {\r\n\t\tthis message\r\n\t\t\tcontains header_fields['generation_time']\r\n\t\t\t\tindicating TIME (TIME >= TIME_LAST + 1sec)\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n\tand the IUT is configured to send more than one CAM per second\r\n\tand the IUT having sent a CAM\r\n\t\tcontaining header_fields['signer_info'].signer.type\r\n\t\t\tindicating 'certificate'\r\n\t\tcontains header_fields['generation_time']\r\n\t\t\tindicating TIME_LAST\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT sends one of the next SecuredMessage\r\n\t\t\tcontaining header_fields['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tcontaining certificate\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t\tcontaining header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_CAM'\r\n\t} then {\r\n\t\tthis message\r\n\t\t\tcontains header_fields['generation_time']\r\n\t\t\t\tindicating TIME (TIME >= TIME_LAST + 1sec)\r\n\t}\r\n}" }, "_status": { "isGenerated": false, "key": "_status", - "origin": "a36e7e7c-5f3c-437b-9e27-1bd60ea168ef", + "origin": "4dd68f02-fece-45b0-b94a-b8a30b057618", "type": "STRING", "value": "verified" }, "_type": { "isGenerated": false, "key": "_type", - "origin": "a36e7e7c-5f3c-437b-9e27-1bd60ea168ef", + "origin": "4dd68f02-fece-45b0-b94a-b8a30b057618", "type": "STRING", "value": "TestPurpose" } }, - "uuid": "a36e7e7c-5f3c-437b-9e27-1bd60ea168ef" + "uuid": "4dd68f02-fece-45b0-b94a-b8a30b057618" } \ No newline at end of file diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_05/TP_SEC_ITSS_SND_CAM_05_02_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_05/TP_SEC_ITSS_SND_CAM_05_02_BV.json index 2076d18e06c776f60b14e4249a866efb5cd9822c..a51f5e0652025daeadc37fff8cb3bd3fce5a7066 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_05/TP_SEC_ITSS_SND_CAM_05_02_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_05/TP_SEC_ITSS_SND_CAM_05_02_BV.json @@ -3,38 +3,38 @@ "_author": { "isGenerated": false, "key": "_author", - "origin": "805e054d-3f6d-4fae-b87b-bbc6f7299553", + "origin": "4dd68f02-fece-45b0-b94a-b8a30b057618", "type": "STRING", "value": "filatov" }, "_description": { "isGenerated": false, "key": "_description", - "origin": "805e054d-3f6d-4fae-b87b-bbc6f7299553", + "origin": "6aa0a009-3bd6-446d-9a81-f89708cb5710", "type": "STRING", - "value": "Check that the secured CAM contains the signer_info field of certificate when the timeout of 1 second has been expired after the previous CAM containing the certificate." + "value": "Check that the secured CAM contains the signer_info field of certificate when the timeout of one second has been expired after the previous CAM containing the certificate" }, "_expectedResults": { "isGenerated": false, "key": "_expectedResults", - "origin": "805e054d-3f6d-4fae-b87b-bbc6f7299553", + "origin": "6aa0a009-3bd6-446d-9a81-f89708cb5710", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n\tand the IUT is configured to send more than one CAM per second\r\n\tand the IUT having sent a CAM\r\n\t\tcontaining header_fields['signer_info'].signer.type\r\n\t\t\tindicating 'certificate'\r\n\t\tat TIME_1 \r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is requested to send next CAM right after 1 second after the TIME_1\r\n\t} then {\r\n\t\tthe IUT sends a SecuredMessage {\r\n\t\t\tcontaining header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_CAM'\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tcontaining certificate\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n\tand the IUT is configured to send more than one CAM per second\r\n\tand the IUT having sent a CAM\r\n\t\tcontaining header_fields['signer_info'].signer.type\r\n\t\t\tindicating 'certificate'\r\n\t\tat TIME_1 \r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is requested to send next CAM right after 1 second after the TIME_1\r\n\t} then {\r\n\t\tthe IUT sends a SecuredMessage {\r\n\t\t\tcontaining header_fields['its_aid']\r\n\t\t\t\tindicating 'AID_CAM'\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tcontaining certificate\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n}\r\n" }, "_status": { "isGenerated": false, "key": "_status", - "origin": "805e054d-3f6d-4fae-b87b-bbc6f7299553", + "origin": "4dd68f02-fece-45b0-b94a-b8a30b057618", "type": "STRING", "value": "verified" }, "_type": { "isGenerated": false, "key": "_type", - "origin": "805e054d-3f6d-4fae-b87b-bbc6f7299553", + "origin": "4dd68f02-fece-45b0-b94a-b8a30b057618", "type": "STRING", "value": "TestPurpose" } }, - "uuid": "805e054d-3f6d-4fae-b87b-bbc6f7299553" + "uuid": "6aa0a009-3bd6-446d-9a81-f89708cb5710" } \ No newline at end of file diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_06.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_06.json index 058c82bad3004d1c3253bac3045727bda6ed14fd..b0627dd503b91b660afd0f15c4eea11cdda013eb 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_06.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_06.json @@ -8,11 +8,15 @@ "value": "If ITS-S sends a secured CAM check that the sent SecuredMessage contains the signer_info of type certificate when the ITS-S received a CAM from an unknown ITS-S." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "27254aae-a5f1-4ab3-a3a7-3699e1a35fdd", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/b687b200-06bf-4876-a5a6-1571bde7cea7"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/b687b200-06bf-4876-a5a6-1571bde7cea7", + "/Documents/ts_103097v010201p.xhtml/6a3eda29-6ac0-4512-b580-2579faf5eb0b" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "06. Check that IUT sends cert to unknown ITS-S" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "27254aae-a5f1-4ab3-a3a7-3699e1a35fdd", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_06/TP_SEC_ITSS_SND_CAM_06_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_06/TP_SEC_ITSS_SND_CAM_06_01_BV.json index b331cab17b5765f2b705cfb059127059c1560f0f..0e83629119e9ca4c84e9bb81ea12f71258952b5b 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_06/TP_SEC_ITSS_SND_CAM_06_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_06/TP_SEC_ITSS_SND_CAM_06_01_BV.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "d768e0ad-5e3b-441b-b3c3-6ce2e4a4d9d7", "type": "STRING", - "value": "Check that ITS-S sends a Secured CAM containing the signer_info of type certificate when the ITS-S received a CAM from an unknown ITS-S." + "value": "Check that ITS-S sends a Secured CAM containing the signer_info of type certificate when the ITS-S received a CAM from an unknown ITS-S" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_07.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_07.json index 339618437e224e035429341a3aa44c1ebdf2aba6..f67176fdb87c4c8cc9006b977263124091657d74 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_07.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_07.json @@ -1,11 +1,15 @@ { "attributes": { "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "d89c3cec-bd65-4e0e-a38b-0dd5201c531e", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/83f9122f-3988-4955-99f7-5b08c1b7948f"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/83f9122f-3988-4955-99f7-5b08c1b7948f", + "/Documents/ts_103097v010201p.xhtml/471f67f8-42d9-443f-ba6f-b5a769e6843d" + ] }, "_name": { "isGenerated": false, @@ -14,6 +18,13 @@ "type": "STRING", "value": "07. Check that IUT restarts the timer when the certificate has been sent" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "d89c3cec-bd65-4e0e-a38b-0dd5201c531e", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_07/TP_SEC_ITSS_SND_CAM_07a_01_TI.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_07/TP_SEC_ITSS_SND_CAM_07_01_TI.json similarity index 100% rename from requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_07/TP_SEC_ITSS_SND_CAM_07a_01_TI.json rename to requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_07/TP_SEC_ITSS_SND_CAM_07_01_TI.json diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_08.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_08.json index f3c719280912fc8c4dd0f80c673c3e6ab7b8ec44..839783893989da16e3a0a4af9ac4e4f7e1b00a68 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_08.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_08.json @@ -8,11 +8,15 @@ "value": "Check that the sent secured CAM contains the signer_info of type certificate when the ITS-S received a CAM that contains a request of unrecognized certificate that matches with its currently used AT certificate ID." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "9b71d8fc-61ed-4efe-abee-487ae07f7946", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/ebb640a8-dfe7-4c52-96c8-c6f3f52452c5"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/ebb640a8-dfe7-4c52-96c8-c6f3f52452c5", + "/Documents/ts_103097v010201p.xhtml/e487829f-4c10-4b03-8738-9b266ee1070d" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "08. Check that IUT sends certificate when requested" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "9b71d8fc-61ed-4efe-abee-487ae07f7946", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_08/TP_SEC_ITSS_SND_CAM_08_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_08/TP_SEC_ITSS_SND_CAM_08_01_BV.json index 077210c4216e570824277bfa8432b354f3a5273d..759b3adc4ebc20e225d4e6b9ec6f00c8eebbdb04 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_08/TP_SEC_ITSS_SND_CAM_08_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_08/TP_SEC_ITSS_SND_CAM_08_01_BV.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "f21d3428-4da7-4f1e-b24b-58d32a3e037c", "type": "STRING", - "value": "Check that the IUT sends the Secured CAM containing the signer_info of type certificate when it received a CAM containing a request of unrecognized certificate that matches with the currently used AT certificate ID of the IUT." + "value": "Check that the IUT sends the Secured CAM containing the signer_info of type certificate when it received a CAM containing a request of unrecognized certificate that matches with the currently used AT certificate ID of the IUT" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_09.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_09.json index cfd377ffb0201fd748d46fb6fe4a0003349c45f8..f54c83d0565df297150f1fbe78ea61aabda41e14 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_09.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_09.json @@ -8,11 +8,15 @@ "value": "Check that the sent secured CAM contains the signer_info of type certificate_chain when the ITS-S received a CAM that contains a request of unrecognized certificate that matches with the AA certificate ID that issued its currently used AT certificate ID." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "f93cb9b0-744d-4df7-9feb-fce721a91430", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/db2bb1d3-c4dd-4c62-bc4a-16ed5cfd9bbe"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/db2bb1d3-c4dd-4c62-bc4a-16ed5cfd9bbe", + "/Documents/ts_103097v010201p.xhtml/ee6c482c-24aa-416f-82b4-9a84d6b200e0" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "09. Check that IUT send certificate_chain when requested" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "f93cb9b0-744d-4df7-9feb-fce721a91430", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_09/TP_SEC_ITSS_SND_CAM_09_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_09/TP_SEC_ITSS_SND_CAM_09_01_BV.json index 547fc2ffb89e3c339b4bef44001edec39aee25b2..25406ead8caa80a0484022d14174156f8016313c 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_09/TP_SEC_ITSS_SND_CAM_09_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_09/TP_SEC_ITSS_SND_CAM_09_01_BV.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "ea91326a-53a4-4d3a-b27b-07e490f86728", "type": "STRING", - "value": "Check that the sent secured CAM contains the signer_info of type certificate_chain when the ITS-S has received a CAM containing a request of unrecognized certificate that matches with the AA certificate ID that issued its currently used AT certificate ID of the IUT." + "value": "Check that the sent secured CAM contains the signer_info of type certificate_chain when the ITS-S has received a CAM containing a request of unrecognized certificate that matches with the AA certificate ID that issued its currently used AT certificate ID of the IUT" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_10.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_10.json index 6c6d22c18086273206d544cb401813a1fc9f368c..a6d225c990262aea672c115af93d994cac3d269a 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_10.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_10.json @@ -8,13 +8,16 @@ "value": "Check that the sent secured CAM contains exactly one HeaderField generation_time which is inside the validity time of the certificate referenced by the signer_info." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "bf7c1018-feb3-4b92-82a5-b9022f643ca8", "type": "LIST", "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/e1c8b3e0-5da0-4e8d-8355-563039c7cdc7", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/48e8cd0f-df1a-4fd5-a36b-6d47370cb9c5" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/48e8cd0f-df1a-4fd5-a36b-6d47370cb9c5", + "/Documents/ts_103097v010201p.xhtml/615b41cb-6660-41b4-8375-b658436ca1df", + "/Documents/ts_103097v010201p.xhtml/5d915e97-a60c-4999-8820-e69c5f87128c" ] }, "_name": { @@ -24,6 +27,13 @@ "type": "STRING", "value": "10. Check generation time" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "bf7c1018-feb3-4b92-82a5-b9022f643ca8", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_10/TP_SEC_ITSS_SND_CAM_10_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_10/TP_SEC_ITSS_SND_CAM_10_01_BV.json index 8ab59a04305e228273aece69748b472328c8e3fd..6c80c4725e1ec5acc5535c29a813449290cf6246 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_10/TP_SEC_ITSS_SND_CAM_10_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_10/TP_SEC_ITSS_SND_CAM_10_01_BV.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "af331703-4a34-4b41-bd02-8ac2eba2ec18", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "af331703-4a34-4b41-bd02-8ac2eba2ec18", "type": "STRING", - "value": "Check that message generation time is inside the validity period of the signing certificate\r\nCheck that message generation time value is realistic (according to values proposed in C2C SEC12)" + "value": "Check that message generation time is inside the validity period of the signing certificate;\r\nCheck that message generation time value is realistic" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "af331703-4a34-4b41-bd02-8ac2eba2ec18", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n\tthe IUT being requested to include certificate in the next CAM \r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is requested to send CAM\r\n\t} then {\r\n\t\tthe IUT sends a SecuredMessage {\r\n\t\t\tcontaining header_fields ['generation_time'] {\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 (CUR_TIME - 5min <= TIME_1 <= CUR_TIME + 5min)\r\n\t\t\t}\r\n\t\t\tcontaining header_fields ['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tcontaining certificate {\r\n\t\t\t\t\t\tnot containing validity_restrictions['time_start_and_end']\r\n\t\t\t\t\t\tor containing validity_restrictions['time_start_and_end'] {\r\n\t\t\t\t\t\t\tcontaining start_validity\r\n\t\t\t\t\t\t\t\tindicating value <= TIME_1\r\n\t\t\t\t\t\t\tcontaining end_validity\r\n\t\t\t\t\t\t\t\tindicating value > TIME_1\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t\tcontaining its_aid\r\n\t\t\t\tindicating 'AID_CAM'\r\n\t\t}\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "af331703-4a34-4b41-bd02-8ac2eba2ec18", "type": "STRING", "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "af331703-4a34-4b41-bd02-8ac2eba2ec18", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_11.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_11.json index db03555618296015677e82557c7d11774849b0e3..a0ee0d3d3a8460bd479e0478ccf4483af305fee9 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_11.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_11.json @@ -8,11 +8,16 @@ "value": "Check that the sent Secured CAM contains exactly one HeaderField its_aid that is set to 'AID_CAM' (16512)" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "5b25108e-db13-477f-a863-df4a1803cf12", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/505beac6-127f-4abe-904a-8da820820b8f"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/505beac6-127f-4abe-904a-8da820820b8f", + "/Documents/ts_103097v010201p.xhtml/ea754a75-9530-4fd0-ae34-bf241af669ad", + "/Documents/ts_103097v010201p.xhtml/49abf17c-f239-46b9-ad89-ac52a283c52c" + ] }, "_name": { "isGenerated": false, @@ -21,6 +26,13 @@ "type": "STRING", "value": "11. Check secured CAM its_aid value" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "5b25108e-db13-477f-a863-df4a1803cf12", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_12.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_12.json index a0dfaeaefab0f475564313f8a4d18aed86c8b157..735bf8a92434afec9af9819fd6187a4512598348 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_12.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_12.json @@ -8,18 +8,29 @@ "value": "If ITS-S sends a secured CAM and has received a SecuredMessage from an unkown ITS-S that contains only the certificate_digest_with_ecdsa256 check that the sent SecuredMessage contains a HeaderField of type request_unrecognized_certificate with the HashedId3 of the missing AT certificate." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "40f04e9e-2c26-412d-b58a-3a830fb13687", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/081b1d3f-e665-472a-abdb-5aad84bc9237"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/081b1d3f-e665-472a-abdb-5aad84bc9237", + "/Documents/ts_103097v010201p.xhtml/3ae26d61-824d-4a0c-81fe-3198413ca03c" + ] }, "_name": { "isGenerated": false, "key": "_name", "origin": "40f04e9e-2c26-412d-b58a-3a830fb13687", "type": "STRING", - "value": "12. Send certificate request to unknown station" + "value": "12. Check sending certificate request to unknown station" + }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "40f04e9e-2c26-412d-b58a-3a830fb13687", + "type": "STRING", + "value": "FAILED" }, "_type": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_14.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_14.json index 3d58c29815da1d8b229e8db7cdc9396af3a60dfb..0f0981105048047c121c516dedef83e628126c12 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_14.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_14.json @@ -8,13 +8,16 @@ "value": "If ITS-S sends a secured CAM check that the sent SecuredMessage contains non-empty payload of type signed." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "216c0016-6530-4224-8517-83c1195239b8", "type": "LIST", "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/9c739ca7-141b-4d74-9a6e-54db6606bde3", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/a61181d9-1ca0-444d-8723-5bc368222afc" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/a61181d9-1ca0-444d-8723-5bc368222afc", + "/Documents/ts_103097v010201p.xhtml/464098d6-4402-43a2-a11b-e6c0ebb97df7", + "/Documents/ts_103097v010201p.xhtml/3f1cd606-cf67-4db0-ac19-64fc7452d17a" ] }, "_name": { @@ -24,6 +27,13 @@ "type": "STRING", "value": "14. Check Payload" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "216c0016-6530-4224-8517-83c1195239b8", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_14/TP_SEC_ITSS_SND_CAM_14_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_14/TP_SEC_ITSS_SND_CAM_14_01_BV.json index 932c2d7a1501a7d2a019517a79a95025e21d57dc..eecd97c9a0cdee98361c74a7385ae4ebfb56ae4a 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_14/TP_SEC_ITSS_SND_CAM_14_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_14/TP_SEC_ITSS_SND_CAM_14_01_BV.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "954754e0-e1bf-43a9-8cfa-5202bc82f59e", "type": "STRING", - "value": "Check that the Secured CAM contains non-empty payload of type signed." + "value": "Check that the Secured CAM contains non-empty payload of type signed" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_15.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_15.json index 074a8f21be5f6768dce49a8a0c3d631aedd56c1a..ff5fcac6ddae9c6f9c39c4ef4951206107d0a164 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_15.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_15.json @@ -5,21 +5,32 @@ "key": "_description", "origin": "f6ad2bce-abe0-4134-a12b-21e7bd405083", "type": "STRING", - "value": "If ITS-S sends a secured CAM check that the sent SecuredMessage contains only the TrailerField signature.\r\nFully covered by ITS-S_CAM_16_T01. Does not need special TP" + "value": "Void." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "f6ad2bce-abe0-4134-a12b-21e7bd405083", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/2e99c742-b3c7-497d-ad35-af859d7e351d"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/2e99c742-b3c7-497d-ad35-af859d7e351d", + "/Documents/ts_103097v010201p.xhtml/191a229d-de15-4b5a-874c-682846c5d70c" + ] }, "_name": { "isGenerated": false, "key": "_name", "origin": "f6ad2bce-abe0-4134-a12b-21e7bd405083", "type": "STRING", - "value": "15. Check presence of traieler field" + "value": "15. Check presence of trailer field" + }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "f6ad2bce-abe0-4134-a12b-21e7bd405083", + "type": "STRING", + "value": "COMPLETE" }, "_type": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_15/Comment 01.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_15/Comment 01.json new file mode 100644 index 0000000000000000000000000000000000000000..fb8767b59b20a9901d780bc0bd095064e4e515c8 --- /dev/null +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_15/Comment 01.json @@ -0,0 +1,33 @@ +{ + "attributes": { + "_author": { + "isGenerated": false, + "key": "_author", + "origin": "28544cb2-4a87-451b-820b-61ccb0d4cc0a", + "type": "STRING", + "value": "filatov" + }, + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "28544cb2-4a87-451b-820b-61ccb0d4cc0a", + "type": "STRING", + "value": "If ITS-S sends a secured CAM check that the sent SecuredMessage contains only the TrailerField signature.\r\nFully covered by ITS-S_CAM_16_T01. Does not need special TP" + }, + "_index": { + "isGenerated": false, + "key": "_index", + "origin": "28544cb2-4a87-451b-820b-61ccb0d4cc0a", + "type": "STRING", + "value": "1" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "28544cb2-4a87-451b-820b-61ccb0d4cc0a", + "type": "STRING", + "value": "Comment" + } + }, + "uuid": "28544cb2-4a87-451b-820b-61ccb0d4cc0a" +} \ No newline at end of file diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_16.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_16.json index c2b2d80b3de6f0f68740d3b68829baf8fac1d09b..9bbd4274dbd8f7b07f03038032af470bb35874e9 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_16.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_16.json @@ -8,11 +8,15 @@ "value": "If ITS-S sends a secured CAM check that the signature contained in the SecuredMessage is calculated over the right fields by cryptographically verifying the signature." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "35d5fb61-1159-46a2-a52b-389aeffba52c", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/edc30643-b58e-4c13-a10b-a3209100a17c"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/edc30643-b58e-4c13-a10b-a3209100a17c", + "/Documents/ts_103097v010201p.xhtml/0b1ec607-c4bc-4ac5-a8e8-7c7bce9cd787" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "16. Check signature" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "35d5fb61-1159-46a2-a52b-389aeffba52c", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_16/TP_SEC_ITSS_SND_CAM_16_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_16/TP_SEC_ITSS_SND_CAM_16_01_BV.json index 2ed2d02d14986778e26b8795d99dfeef8c0a097d..9af467d8ad3f7e5b7d84d1ad375bf092bba192b4 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_16/TP_SEC_ITSS_SND_CAM_16_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_16/TP_SEC_ITSS_SND_CAM_16_01_BV.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "630a7eff-a3e0-463f-af83-8ace61f4bbdb", "type": "STRING", - "value": "Check that the secured CAM contains only one TrailerField of type signature.\r\nCheck that the signature contained in the SecuredMessage is calculated over the right fields by cryptographically verifying the signature." + "value": "Check that the secured CAM contains only one TrailerField of type signature;\r\nCheck that the signature contained in the SecuredMessage is calculated over the right fields by cryptographically verifying the signature" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT.json index 2bdfe2dc19cf1ef70a9cc3d7308061f0b36cae1b..f6296713657eed4b0b43c2546ea11f7df32629c8 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT.json @@ -1,11 +1,15 @@ { "attributes": { "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "355c1af1-9c61-4b54-9842-6dda41da8a8b", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/ab0b5578-5740-40f7-8480-37bc9cf0396e"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/ab0b5578-5740-40f7-8480-37bc9cf0396e", + "/Documents/ts_103097v010201p.xhtml/967d4b57-1e68-438c-b9e2-e20c3877f499" + ] }, "_name": { "isGenerated": false, @@ -14,6 +18,13 @@ "type": "STRING", "value": "Profiles for certificates" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "355c1af1-9c61-4b54-9842-6dda41da8a8b", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_01.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_01.json index 32cad63125dce3ccc4d7bea5985ea83e93455164..f9da1abb5c3e85e56369f80acf2b4329a506dd05 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_01.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_01.json @@ -8,13 +8,16 @@ "value": "Check that the certificate version is 2" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "202ea35f-8278-4dce-85e1-91e0400f4a32", "type": "LIST", "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/c4cd2dea-c087-49fa-9d20-b08451557a51", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/0df98c72-fcf5-46bd-ac32-c67617caeadc" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/0df98c72-fcf5-46bd-ac32-c67617caeadc", + "/Documents/ts_103097v010201p.xhtml/783519e9-a067-4deb-b103-46fa94db39bf", + "/Documents/ts_103097v010201p.xhtml/1e5c73cf-ad2e-479f-8fda-5fa62efbe3ec" ] }, "_name": { @@ -24,6 +27,13 @@ "type": "STRING", "value": "01. Check that certificate version is 2" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "202ea35f-8278-4dce-85e1-91e0400f4a32", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_02.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_02.json index d8f2c1bf3fe0184fc00f9d6f61a479b36a233d33..5e9aab156d384896b8d5f1bfd5d8be411dde82cc 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_02.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_02.json @@ -8,13 +8,16 @@ "value": "Check that the certificate chain is valid" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "2efa81e5-e91e-44f2-af46-f79f63399534", "type": "LIST", "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/4ee1b61f-a484-4fc4-b43d-aa191370d877", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/942ec076-7557-40df-a51c-929d6be6c9d6" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/942ec076-7557-40df-a51c-929d6be6c9d6", + "/Documents/ts_103097v010201p.xhtml/083c999c-3428-451c-ae75-be7d885f5975", + "/Documents/ts_103097v010201p.xhtml/1de82943-16f3-4be8-9c10-98ff19632d96" ] }, "_name": { @@ -24,6 +27,13 @@ "type": "STRING", "value": "02. Check the certificate chain" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "2efa81e5-e91e-44f2-af46-f79f63399534", + "type": "STRING", + "value": "COMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_02/TP_SEC_ITSS_SND_CERT_02_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_02/TP_SEC_ITSS_SND_CERT_02_01_BV.json index 527600810bc70d0ccb9b69304afd83be034afd3c..a6aff09a4f6fc478c01b2fd7a8c3fe8d1000e916 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_02/TP_SEC_ITSS_SND_CERT_02_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_02/TP_SEC_ITSS_SND_CERT_02_01_BV.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "b3f8078e-c578-42f4-a2d6-577b09c4abc6", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "b3f8078e-c578-42f4-a2d6-577b09c4abc6", "type": "STRING", - "value": "Check that the certificate chain is valid:\r\nCheck signer_info\r\n" + "value": "Check that the certificate chain is valid;\r\nCheck signer_info\r\n" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "b3f8078e-c578-42f4-a2d6-577b09c4abc6", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n\tthe IUT being requested to include certificate chain in the next CAM\r\n} ensure that {\r\n\t when {\r\n\t\tthe IUT is requested to send a CAM\r\n\t} then {\r\n\t\tthe IUT sends a SecuredMessage\r\n\t\t\tcontaining header_fields['signer_info'].signer {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating certificate_chain\r\n\t\t\t\tcontaining certificates[N] {\r\n\t\t\t\t\tcontaining signer_info {\r\n\t\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\t\tindicating 'certificate_digest_with_sha256'\r\n\t\t\t\t\t\tcontaining digest\r\n\t\t\t\t\t\t\treferenced to the certificates[N - 1]\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "b3f8078e-c578-42f4-a2d6-577b09c4abc6", "type": "STRING", "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "b3f8078e-c578-42f4-a2d6-577b09c4abc6", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_07.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_07.json index dfee06b7acf54f6dd471c3530c8e51408c8f8d71..cf1cd93aeb2bc23bb47200a23a9f5dc7a99bde07 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_07.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_07.json @@ -8,11 +8,15 @@ "value": "Check that the certificate verification key contains ECC point of type other then x_coordinate_only\r\n" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "0a709aa7-7fba-4d2b-87d3-5ec8021458b8", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/a50e886a-4b76-432c-b084-49c6aa9e93db"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/a50e886a-4b76-432c-b084-49c6aa9e93db", + "/Documents/ts_103097v010201p.xhtml/cd4f4ae8-6cdd-439b-a1bb-3c8c47d8bfc1" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "07. Check ECC point type of the certificate signature" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "0a709aa7-7fba-4d2b-87d3-5ec8021458b8", + "type": "STRING", + "value": "COMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_08.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_08.json index 9a937776bfc5757ec863eb66375efd45cf933e25..a336ae86bd3d3abb20318384f700f47b095c2675 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_08.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_08.json @@ -8,13 +8,16 @@ "value": "Check that the certificate verification key contains ECC point of type set to either compressed_lsb_y_0, compressed_lsb_y_1 or uncompressed\r\n" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "d2a74c3e-bd79-498a-8985-f218991a5f16", "type": "LIST", "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/52e65b64-5d7e-4adc-970d-aa084d0c7c58", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/25b0f26c-366c-4c32-bc6b-dbbdd297bfec" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/25b0f26c-366c-4c32-bc6b-dbbdd297bfec", + "/Documents/ts_103097v010201p.xhtml/ab9e2898-6189-4d9a-b908-74c5226bb19e", + "/Documents/ts_103097v010201p.xhtml/327b37e5-c93a-43f9-a88b-a47f21468381" ] }, "_name": { @@ -24,6 +27,13 @@ "type": "STRING", "value": "08. Check ECC point type of the certificate verification key" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "d2a74c3e-bd79-498a-8985-f218991a5f16", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_09.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_09.json index 491f8c9f669bced030415997d71be4a4030d1808..6be5c9842bb3efcfddace34544d20c3697ec1ca4 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_09.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_09.json @@ -8,11 +8,16 @@ "value": "Check that the certificate signature is valid" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "df89a517-b410-46f7-90da-77b24372193c", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/4ee1b61f-a484-4fc4-b43d-aa191370d877"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/4ee1b61f-a484-4fc4-b43d-aa191370d877", + "/Documents/ts_103097v010201p.xhtml/1de82943-16f3-4be8-9c10-98ff19632d96", + "/Documents/ts_103097v010201p.xhtml/b661365c-ed7a-410c-803f-e9702b195a7e" + ] }, "_name": { "isGenerated": false, @@ -21,6 +26,13 @@ "type": "STRING", "value": "09. Check the certificate signature" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "df89a517-b410-46f7-90da-77b24372193c", + "type": "STRING", + "value": "COMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA.json index 2662dcc556eadb66680c612727b1ab7a660ff9a2..62f023ffba722f78bd9487c1a42db6db4c3d18d2 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA.json @@ -1,11 +1,15 @@ { "attributes": { "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "7a638e06-7122-483b-8879-10362ab5bbb2", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/59418fed-3d7e-4d53-b0f8-b704f003bdf3"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/59418fed-3d7e-4d53-b0f8-b704f003bdf3", + "/Documents/ts_103097v010201p.xhtml/fc3a86a9-a0fb-4c88-b23d-594bdccc8ba2" + ] }, "_name": { "isGenerated": false, @@ -14,6 +18,13 @@ "type": "STRING", "value": "AA certificate profile" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "7a638e06-7122-483b-8879-10362ab5bbb2", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_01.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_01.json index f9b2d6156f0cd6d9d61adc86b43d7a9987c3419e..91f8b1adaf98827db1755ba1730355a934426e8b 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_01.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_01.json @@ -8,11 +8,15 @@ "value": "If ITS-S sends an AA certificate check that the subject_type is set to authorization_authority" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "9b44de2b-e63e-4c56-b59f-855a1c4cb539", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/621ed828-7b05-439f-828c-5d88c6ad36fe"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/621ed828-7b05-439f-828c-5d88c6ad36fe", + "/Documents/ts_103097v010201p.xhtml/9bdd04f1-3bca-4642-9a33-503b4c02b7b8" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "01. Check the subject type" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "9b44de2b-e63e-4c56-b59f-855a1c4cb539", + "type": "STRING", + "value": "COMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_02.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_02.json index 9a86ce0638059bc7e8c36d0bda02472a0c04e603..7d9836c769c6a6678f78c84c4738b886e68da461 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_02.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_02.json @@ -8,18 +8,29 @@ "value": "The subject_name variable-length vector shall have a maximum length of 32 bytes." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "0335de25-2291-4913-b046-d4167641e85b", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/fc61be6e-0117-4aeb-884d-87c64033dfd0"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/fc61be6e-0117-4aeb-884d-87c64033dfd0", + "/Documents/ts_103097v010201p.xhtml/1ba8c2fa-4a07-4747-911d-bfffe0168100" + ] }, "_name": { "isGenerated": false, "key": "_name", "origin": "0335de25-2291-4913-b046-d4167641e85b", "type": "STRING", - "value": "02. Check AA certificate sublect name" + "value": "02. Check AA certificate subject name" + }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "0335de25-2291-4913-b046-d4167641e85b", + "type": "STRING", + "value": "FAILED" }, "_type": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_02/TP_SEC_ITSS_SND_CERT_AA_02_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_02/TP_SEC_ITSS_SND_CERT_AA_02_01_BV.json index 13ef0aac13a277143d1c1803f3affa408c27a107..d51493b1d40e7ef38d7bf1035070001ac18d0306 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_02/TP_SEC_ITSS_SND_CERT_AA_02_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_02/TP_SEC_ITSS_SND_CERT_AA_02_01_BV.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "ead53514-80e6-4aeb-8e3a-9a21852b295b", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "ead53514-80e6-4aeb-8e3a-9a21852b295b", "type": "STRING", - "value": "The subject_name variable-length vector shall have a maximum length of 32 bytes.\r\n" + "value": "The subject_name variable-length vector shall have a maximum length of 32 bytes\r\n" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "ead53514-80e6-4aeb-8e3a-9a21852b295b", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n\tthe IUT being requested to include certificate chain in the next CAM\r\n} ensure that {\r\n\t when {\r\n\t\tthe IUT is requested to send a CAM\r\n\t} then {\r\n\t\tthe IUT sends a SecuredMessage\r\n\t\t\tcontaining header_fields['signer_info'].signer {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating certificate_chain\r\n\t\t\t\tcontaining certificates[last-1] {\r\n\t\t\t\t\tcontaining subject_info.subject_name\r\n\t\t\t\t\t\tindicating length <= 32 bytes\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "ead53514-80e6-4aeb-8e3a-9a21852b295b", "type": "STRING", "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "ead53514-80e6-4aeb-8e3a-9a21852b295b", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_04.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_04.json index 11d7cc647d60ce46ec86ff4e5ba87a13e10a0b5a..fe2e6a5b695a7dc6327c451eae7491e09dabd8b9 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_04.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_04.json @@ -8,11 +8,15 @@ "value": "If ITS-S sends an AA certificate check that the SignerInfo field is set to certificate_digest_with_ecdsa256" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "463b2a4d-4f6f-4d82-a44c-933479415c60", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/b75ba1b0-386f-4343-905d-58169c7296de"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/b75ba1b0-386f-4343-905d-58169c7296de", + "/Documents/ts_103097v010201p.xhtml/21450aa2-5444-4b7f-999a-4a385c833eec" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "04. Check that signer info is a digest" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "463b2a4d-4f6f-4d82-a44c-933479415c60", + "type": "STRING", + "value": "COMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_05.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_05.json index 87d7692312d6ebf346bb849c8603729311bc337d..62399a7164c2e218539347888a79c316ff153785 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_05.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_05.json @@ -8,6 +8,7 @@ "value": "If ITS-S sends an AA certificate check that the SubjectAttribute elements are included: verification_key, assurance_level, its_aid_list." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "463b2a4d-4f6f-4d82-a44c-933479415c70", @@ -16,7 +17,11 @@ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/d55843ab-3d09-453b-a9b1-d7fc8752cfa8", "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/14ac0cc9-e94e-4c1d-a0ab-949a68c449e2", "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/f7f89eb7-edc5-4238-8886-a3865780f88e", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/7f3702e0-d33e-4be0-8a8f-632eb1d8f4dc" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/7f3702e0-d33e-4be0-8a8f-632eb1d8f4dc", + "/Documents/ts_103097v010201p.xhtml/a4690788-2d8b-4791-9464-0bb84527f54b", + "/Documents/ts_103097v010201p.xhtml/a0b07625-0f38-485c-af74-5a86d4a118a4", + "/Documents/ts_103097v010201p.xhtml/c9c4983f-ff2c-40f3-892c-638f7091bf6b", + "/Documents/ts_103097v010201p.xhtml/427fc514-9bc6-4e55-b69a-59058905f749" ] }, "_name": { @@ -26,6 +31,13 @@ "type": "STRING", "value": "05. Check subject attributes presence and order" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "463b2a4d-4f6f-4d82-a44c-933479415c70", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_05/TP_SEC_ITSS_SND_CERT_AA_05_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_05/TP_SEC_ITSS_SND_CERT_AA_05_01_BV.json index 84a9bb5f29ea413e45fea24098d8150addbbb487..7e8c031592c02800e58a2fc6e41dbeebf8948ba0 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_05/TP_SEC_ITSS_SND_CERT_AA_05_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_05/TP_SEC_ITSS_SND_CERT_AA_05_01_BV.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "7dfcd54b-588b-4790-a46d-0900eabe47a1", "type": "STRING", - "value": "Check that all neccesary subject attributes are present and arranged in accesing order" + "value": "Check that all necessary subject attributes are present and arranged in ascending order" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_06.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_06.json index 5027e65c9cc93ea60122d005d42d93b7c76a5c2b..70132087735951db4adcb69b9599aeb1e41b0586 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_06.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_06.json @@ -8,6 +8,7 @@ "value": "If ITS-S sends an AA certificate check that only the ValidityRestriction time_start_and_end is included" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "df4ea89e-7e56-438d-bcf7-ed736081bd0d", @@ -15,7 +16,10 @@ "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/29646d66-9184-45a3-a1e6-dc84c19a3a8a", "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/05d797e2-9a7b-4b6f-a32f-e9bb0931628c", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/6651de8c-4325-4b42-a018-9ef5c927537d" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/6651de8c-4325-4b42-a018-9ef5c927537d", + "/Documents/ts_103097v010201p.xhtml/c3923a06-7523-4d02-b1e2-54db898f3d76", + "/Documents/ts_103097v010201p.xhtml/e6b9cd9d-36fa-4a69-ae0f-76a4a07f269b", + "/Documents/ts_103097v010201p.xhtml/6c2640ff-fb9f-40a1-8f28-844633fefa42" ] }, "_name": { @@ -25,6 +29,13 @@ "type": "STRING", "value": "06. Check the time_start_and_end presence" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "df4ea89e-7e56-438d-bcf7-ed736081bd0d", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_06/TP_SEC_ITSS_SND_CERT_AA_06_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_06/TP_SEC_ITSS_SND_CERT_AA_06_01_BV.json index 2c3742a7245e7e42cda921f7091a052b76eaf7e3..d1c7a0bbd1adc841907a23843ff2285191f7db7e 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_06/TP_SEC_ITSS_SND_CERT_AA_06_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_06/TP_SEC_ITSS_SND_CERT_AA_06_01_BV.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "e49378a2-f1a9-4b49-ad2e-5fd1e8340578", "type": "STRING", - "value": "Check that time_start_and_end is included in the AA certificate validation restrictions\r\nCheck that end_validity is later then start_validity" + "value": "Check that time_start_and_end is included in the AA certificate validation restrictions;\r\nCheck that end_validity is greater than start_validity\r\n" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_07.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_07.json index a276854f20c238c27c743ce7e27a696869c686a8..13e935968f3b7da23bb0dd3514fe8904f72ceba3 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_07.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_07.json @@ -5,14 +5,18 @@ "key": "_description", "origin": "1936b42a-5156-495c-9338-d7abcfcb042c", "type": "STRING", - "value": "Check that verification key is exist and can be used to check signature\r\nDo not required TP. Fully covered by ITS-S_CERT_AT_08" + "value": "Void." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "1936b42a-5156-495c-9338-d7abcfcb042c", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/6c666f70-ff2e-4d9b-b25e-45bdd0b88099"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/6c666f70-ff2e-4d9b-b25e-45bdd0b88099", + "/Documents/ts_103097v010201p.xhtml/31d476e6-b809-400a-a06b-25bb659cc453" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "07. Check verification key validity" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "1936b42a-5156-495c-9338-d7abcfcb042c", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_07/Comment 01.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_07/Comment 01.json new file mode 100644 index 0000000000000000000000000000000000000000..50a22ee4aa218e2f0dbd91bd737f1613d0959899 --- /dev/null +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_07/Comment 01.json @@ -0,0 +1,33 @@ +{ + "attributes": { + "_author": { + "isGenerated": false, + "key": "_author", + "origin": "2799b476-a3a0-4610-a806-a401c77e2a3c", + "type": "STRING", + "value": "filatov" + }, + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "2799b476-a3a0-4610-a806-a401c77e2a3c", + "type": "STRING", + "value": "Check that verification key is exist and can be used to check signature\r\nDo not required TP. Fully covered by ITS-S_CERT_AT_08" + }, + "_index": { + "isGenerated": false, + "key": "_index", + "origin": "2799b476-a3a0-4610-a806-a401c77e2a3c", + "type": "STRING", + "value": "1" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "2799b476-a3a0-4610-a806-a401c77e2a3c", + "type": "STRING", + "value": "Comment" + } + }, + "uuid": "2799b476-a3a0-4610-a806-a401c77e2a3c" +} \ No newline at end of file diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_08.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_08.json index 48032038fcf1554090dab53fdced628d63a6b4b5..0102b8980e69fee8feb1013bd3c9abe5e2cacd13 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_08.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_08.json @@ -1,36 +1,46 @@ -{ - "attributes": { - "_description": { - "isGenerated": false, - "key": "_description", - "origin": "54c370dc-b1c2-41ed-8a41-311db665d0d0", - "type": "STRING", - "value": "If ITS-S sends an AA certificate check that the AIDs in the its_aid_list are unique\r\nCheck that AID list contains not more than 31 item" - }, - "_locations": { - "isGenerated": false, - "key": "_locations", - "origin": "54c370dc-b1c2-41ed-8a41-311db665d0d0", - "type": "LIST", - "value": [ - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/0ad16abb-f2b4-4764-9fdd-3ae0394e553f", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/8e9f84e1-3f43-4323-a3de-efed4d7e08ca" - ] - }, - "_name": { - "isGenerated": false, - "key": "_name", - "origin": "54c370dc-b1c2-41ed-8a41-311db665d0d0", - "type": "STRING", - "value": "08. Check ITS-AID" - }, - "_type": { - "isGenerated": false, - "key": "_type", - "origin": "54c370dc-b1c2-41ed-8a41-311db665d0d0", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "54c370dc-b1c2-41ed-8a41-311db665d0d0" +{ + "attributes": { + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "54c370dc-b1c2-41ed-8a41-311db665d0d0", + "type": "STRING", + "value": "If ITS-S sends an AA certificate check that the AIDs in the its_aid_list are unique\r\nCheck that AID list contains not more than 31 item" + }, + "_locations": { + "elements_type": "STRING", + "isGenerated": false, + "key": "_locations", + "origin": "54c370dc-b1c2-41ed-8a41-311db665d0d0", + "type": "LIST", + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/0ad16abb-f2b4-4764-9fdd-3ae0394e553f", + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/8e9f84e1-3f43-4323-a3de-efed4d7e08ca", + "/Documents/ts_103097v010201p.xhtml/3a85743b-2d03-42a9-844a-56a299b12f74", + "/Documents/ts_103097v010201p.xhtml/3dc0faba-b8b1-45d9-85b2-90decaf8fd0f" + ] + }, + "_name": { + "isGenerated": false, + "key": "_name", + "origin": "54c370dc-b1c2-41ed-8a41-311db665d0d0", + "type": "STRING", + "value": "08. Check ITS-AID" + }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "54c370dc-b1c2-41ed-8a41-311db665d0d0", + "type": "STRING", + "value": "FAILED" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "54c370dc-b1c2-41ed-8a41-311db665d0d0", + "type": "STRING", + "value": "Requirement" + } + }, + "uuid": "54c370dc-b1c2-41ed-8a41-311db665d0d0" } \ No newline at end of file diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_08/TP_SEC_ITSS_SND_CERT_AA_08_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_08/TP_SEC_ITSS_SND_CERT_AA_08_01_BV.json index 82d552a1acbad074dad26d5b75952741b45003db..6f1ee6c07af236f984a8f9448241408d3be2b51b 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_08/TP_SEC_ITSS_SND_CERT_AA_08_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_08/TP_SEC_ITSS_SND_CERT_AA_08_01_BV.json @@ -1,30 +1,40 @@ -{ - "attributes": { - "_author": { - "key": "_author", - "type": "STRING", - "value": "filatov" - }, - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that all AIDs containing in the in the its_aid_list in AA certificate are unique\r\nCheck that AID list contains not more than 31 items" - }, - "_expectedResults": { - "key": "_expectedResults", - "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n\tthe IUT being requested to include certificate chain in the next CAM\r\n} ensure that {\r\n\t when {\r\n\t\tthe IUT is requested to send a CAM\r\n\t} then {\r\n\t\tthe IUT sends a SecuredMessage\r\n\t\t\tcontaining header_fields['signer_info'].signer {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating certificate_chain\r\n\t\t\t\tcontaining certificates[last-1] {\r\n\t\t\t\t\tcontaining subject_attributes['its_aid_list']\r\n\t\t\t\t\t\tcontaining its_aid_list[0..N]\r\n\t\t\t\t\t\t\tcontaining no more than 31 unique item\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t}\r\n}" - }, - "_status": { - "key": "_status", - "type": "STRING", - "value": "complete" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "TestPurpose" - } - }, - "uuid": "247e7969-b4a1-4df2-922f-7117342b116c" +{ + "attributes": { + "_author": { + "isGenerated": false, + "key": "_author", + "origin": "247e7969-b4a1-4df2-922f-7117342b116c", + "type": "STRING", + "value": "filatov" + }, + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "247e7969-b4a1-4df2-922f-7117342b116c", + "type": "STRING", + "value": "Check that all AIDs containing in the in the its_aid_list in AA certificate are unique\r\nCheck that AID list contains not more than 31 items" + }, + "_expectedResults": { + "isGenerated": false, + "key": "_expectedResults", + "origin": "247e7969-b4a1-4df2-922f-7117342b116c", + "type": "STRING", + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n\tthe IUT being requested to include certificate chain in the next CAM\r\n} ensure that {\r\n\t when {\r\n\t\tthe IUT is requested to send a CAM\r\n\t} then {\r\n\t\tthe IUT sends a SecuredMessage\r\n\t\t\tcontaining header_fields['signer_info'].signer {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating certificate_chain\r\n\t\t\t\tcontaining certificates[last-1] {\r\n\t\t\t\t\tcontaining subject_attributes['its_aid_list']\r\n\t\t\t\t\t\tcontaining its_aid_list[0..N]\r\n\t\t\t\t\t\t\tcontaining unique items\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t}\r\n}" + }, + "_status": { + "isGenerated": false, + "key": "_status", + "origin": "247e7969-b4a1-4df2-922f-7117342b116c", + "type": "STRING", + "value": "complete" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "247e7969-b4a1-4df2-922f-7117342b116c", + "type": "STRING", + "value": "TestPurpose" + } + }, + "uuid": "247e7969-b4a1-4df2-922f-7117342b116c" } \ No newline at end of file diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_09.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_09.json index f37e38124eca5bf042fa3becf164214debc88156..e1cdcf9d2aa8f72edb44d3be8a857545452208f8 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_09.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_09.json @@ -5,14 +5,18 @@ "key": "_description", "origin": "42a52204-c135-462c-9560-e5119aa20e81", "type": "STRING", - "value": "Positive test is not needed to be tested.\r\n" + "value": "Void." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "42a52204-c135-462c-9560-e5119aa20e81", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/12e35a8b-e0f5-44e6-a5f5-4fb3e932e835"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/12e35a8b-e0f5-44e6-a5f5-4fb3e932e835", + "/Documents/ts_103097v010201p.xhtml/afc8e021-8c93-4ae6-8138-3020574e57b5" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "09. Check that AA cert is signed by Root cert" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "42a52204-c135-462c-9560-e5119aa20e81", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_09/Comment 01.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_09/Comment 01.json new file mode 100644 index 0000000000000000000000000000000000000000..84c114aadb23977c89f42396dd9e4b42a9172b02 --- /dev/null +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_09/Comment 01.json @@ -0,0 +1,33 @@ +{ + "attributes": { + "_author": { + "isGenerated": false, + "key": "_author", + "origin": "a21b5962-a257-45ad-9977-82cd411d5272", + "type": "STRING", + "value": "filatov" + }, + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "a21b5962-a257-45ad-9977-82cd411d5272", + "type": "STRING", + "value": "Positive test is not needed to be tested." + }, + "_index": { + "isGenerated": false, + "key": "_index", + "origin": "a21b5962-a257-45ad-9977-82cd411d5272", + "type": "STRING", + "value": "1" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "a21b5962-a257-45ad-9977-82cd411d5272", + "type": "STRING", + "value": "Comment" + } + }, + "uuid": "a21b5962-a257-45ad-9977-82cd411d5272" +} \ No newline at end of file diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_10.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_10.json index a72b1bd66d0b5864723c02b675dfd741e2c9cabc..96edeedf082456eac1c197369fa9920ba56f9731 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_10.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_10.json @@ -1,11 +1,15 @@ { "attributes": { "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "f1c4ba19-d8e6-4147-9cef-96b41682068f", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/4d1be56a-6392-4bb5-aee0-608ca40f1dd5"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/4d1be56a-6392-4bb5-aee0-608ca40f1dd5", + "/Documents/ts_103097v010201p.xhtml/274ddbb0-bfb4-4073-8304-ddc326713b86" + ] }, "_name": { "isGenerated": false, @@ -14,6 +18,13 @@ "type": "STRING", "value": "10. Check validity restriction presence and order" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "f1c4ba19-d8e6-4147-9cef-96b41682068f", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_10/TP_SEC_ITSS_SND_CERT_AA_10_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_10/TP_SEC_ITSS_SND_CERT_AA_10_01_BV.json index 9738ac632c69b40fefb3a543ea7359e39cda9801..f6bffab9c61c848f5e5f6f9c45f6ffe90d16f9c6 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_10/TP_SEC_ITSS_SND_CERT_AA_10_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_10/TP_SEC_ITSS_SND_CERT_AA_10_01_BV.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "babc8123-7854-4dae-a063-d6b923f31602", "type": "STRING", - "value": "Check that all mandatory validity restrictions are present and arranged in accesing order" + "value": "Check that all mandatory validity restrictions are present and arranged in ascending order" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT.json index b4decbb92a5abfbc26c9cdd5892d67a7fdc50e64..6529e8f487d8e622fe7e3714cc7e153c068dc914 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT.json @@ -1,11 +1,15 @@ { "attributes": { "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "cac9d222-715e-4387-997c-b16d626da1bd", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/7a06b634-841c-48af-97b7-cd46d90ba02d"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/7a06b634-841c-48af-97b7-cd46d90ba02d", + "/Documents/ts_103097v010201p.xhtml/b2391447-465b-4447-aa98-bad8ca9aa5cb" + ] }, "_name": { "isGenerated": false, @@ -14,6 +18,13 @@ "type": "STRING", "value": "AT certificate profile" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "cac9d222-715e-4387-997c-b16d626da1bd", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_01.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_01.json index 80964cc0dd585f7079b0f28c98eec856cc4d78b7..dd43d24fae7898bc848d578d9abbb18e12254107 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_01.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_01.json @@ -8,11 +8,15 @@ "value": "If ITS-S sends an AT certificate check that the subject_type is set to 'authorization_ticket' (1)" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "0be535c7-1e1c-4526-a028-d747fe92b451", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/a05f0d1f-4faa-41a2-a745-8c95fb4779a1"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/a05f0d1f-4faa-41a2-a745-8c95fb4779a1", + "/Documents/ts_103097v010201p.xhtml/1d5a3fa4-b7ea-4b56-9ff7-2f1b08592a0a" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "01. Check subject type" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "0be535c7-1e1c-4526-a028-d747fe92b451", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_02.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_02.json index 9d8373e7b1a5c00107ec8e391c80c125a5804f72..f52097524120ec51e095a9f09e6d48fcd0fa56de 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_02.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_02.json @@ -8,6 +8,7 @@ "value": "If ITS-S sends an AT certificate check that the signer_info contains only one element of type certificate_digest_with_ecdsa256" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "ab23c31e-b442-455f-8874-89544de9a00b", @@ -15,7 +16,10 @@ "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/a2e3634b-2d0b-4e80-8806-c75803dfa0ac", "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/7a039646-e915-41da-b597-f99f5c9a6c2b", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/f19898f9-af2d-47ac-82cf-a71538b2e280" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/f19898f9-af2d-47ac-82cf-a71538b2e280", + "/Documents/ts_103097v010201p.xhtml/1c90e08e-4c4e-4721-ab6e-8390fd8fd3c3", + "/Documents/ts_103097v010201p.xhtml/c223fe50-65bf-48d8-970d-3bd4538c8e94", + "/Documents/ts_103097v010201p.xhtml/076915cc-c9b3-460d-8ba4-388037396737" ] }, "_name": { @@ -25,6 +29,13 @@ "type": "STRING", "value": "02. Check that signer info is a digest" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "ab23c31e-b442-455f-8874-89544de9a00b", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_03.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_03.json index e6e6fe20473aec747198ff0dcd83bd69bfcfdbae..dbe8cff6c2093890f4010dab7b30574576a9ae32 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_03.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_03.json @@ -1,18 +1,15 @@ { "attributes": { - "_description": { - "isGenerated": false, - "key": "_description", - "origin": "8a72a3c8-625f-4d64-a60c-a31bb4d07934", - "type": "STRING", - "value": "If ITS-S sends an AT certificate check that the subject_name is empty" - }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "8a72a3c8-625f-4d64-a60c-a31bb4d07934", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/129932b3-d851-4f39-af43-ccec6d18c13b"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/129932b3-d851-4f39-af43-ccec6d18c13b", + "/Documents/ts_103097v010201p.xhtml/e9618613-82ad-42fa-88b3-2f6924c0165c" + ] }, "_name": { "isGenerated": false, @@ -21,6 +18,13 @@ "type": "STRING", "value": "03. Check subject name" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "8a72a3c8-625f-4d64-a60c-a31bb4d07934", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_04.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_04.json index 6bd34bd9acb552734363cc5b5466a787fc236bf8..3ec63fcc72d689d80a7658fe6ccdb728769d6bae 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_04.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_04.json @@ -1,20 +1,16 @@ { "attributes": { - "_description": { - "isGenerated": false, - "key": "_description", - "origin": "e349392d-7206-47db-8cb9-156ed5a4a968", - "type": "STRING", - "value": "Fully covered in certificate profiles section" - }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "e349392d-7206-47db-8cb9-156ed5a4a968", "type": "LIST", "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/6ff77750-4e3f-47e3-8261-73ad6d944a77", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/d55843ab-3d09-453b-a9b1-d7fc8752cfa8" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/d55843ab-3d09-453b-a9b1-d7fc8752cfa8", + "/Documents/ts_103097v010201p.xhtml/e2949dcb-7e0a-4104-92df-2c29945c7486", + "/Documents/ts_103097v010201p.xhtml/c9c4983f-ff2c-40f3-892c-638f7091bf6b" ] }, "_name": { @@ -22,7 +18,14 @@ "key": "_name", "origin": "e349392d-7206-47db-8cb9-156ed5a4a968", "type": "STRING", - "value": "04. Check the presence and the order of subject atributes." + "value": "04. Check the presence and the order of subject attributes" + }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "e349392d-7206-47db-8cb9-156ed5a4a968", + "type": "STRING", + "value": "INCOMPLETE" }, "_type": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_04/TP_SEC_ITSS_SND_CERT_AT_04_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_04/TP_SEC_ITSS_SND_CERT_AT_04_01_BV.json index 7c599b0cd0be37e1e37f5345295852d4606e7a4a..6de4e9a403123a2de86cb03c97562bd1f0d506d3 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_04/TP_SEC_ITSS_SND_CERT_AT_04_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_04/TP_SEC_ITSS_SND_CERT_AT_04_01_BV.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "278c3786-ffee-4c45-a7dd-b0fd547650ed", "type": "STRING", - "value": "Check that subject attributes are present and arranged in accesing order" + "value": "Check that subject attributes are present and arranged in ascending order" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_05.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_05.json index 1a7e57b60aac4ca3862d9442f4e156c485ddfae3..54f65888005deacb395cc41cc2b81ec8c5a107d2 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_05.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_05.json @@ -1,25 +1,29 @@ { "attributes": { - "_description": { - "isGenerated": false, - "key": "_description", - "origin": "ba411f15-e584-4189-8aa1-9c725ba7706f", - "type": "STRING", - "value": "If ITS-S sends an AT certificate check that only the ValidityRestriction time_start_and_end is included\r\nTime validity restrictions should be conformed to the AA certificate restrictions" - }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "ba411f15-e584-4189-8aa1-9c725ba7706f", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/cb021a09-729d-4a2a-8b11-17717bbeaf73"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/cb021a09-729d-4a2a-8b11-17717bbeaf73", + "/Documents/ts_103097v010201p.xhtml/36a05750-9fac-494a-adcc-c36a9b0b39c1" + ] }, "_name": { "isGenerated": false, "key": "_name", "origin": "ba411f15-e584-4189-8aa1-9c725ba7706f", "type": "STRING", - "value": "05. Check presence of time_start_and_end shall" + "value": "05. Check presence of time_start_and_end validity restriction" + }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "ba411f15-e584-4189-8aa1-9c725ba7706f", + "type": "STRING", + "value": "INCOMPLETE" }, "_type": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_05/TP_SEC_ITSS_SND_CERT_AT_05_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_05/TP_SEC_ITSS_SND_CERT_AT_05_01_BV.json index 4d7a3f1b6f98e01e723f6eab6861af19fb7e124b..0cbd7c149e118eda74578b6a1bd03e175e31246c 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_05/TP_SEC_ITSS_SND_CERT_AT_05_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_05/TP_SEC_ITSS_SND_CERT_AT_05_01_BV.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "601932b9-103d-436f-92ba-51fa3a849a71", "type": "STRING", - "value": "Check that time_start_and_end is included in the AT certificate validation restrictions\r\nCheck that time_start_and_end is inside the AA certificate time restrictions" + "value": "Check that time_start_and_end is included in the AT certificate validation restrictions;\r\nCheck that time_start_and_end is inside the AA certificate time restrictions" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_06.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_06.json index cf3f27220f453dfe80dd0bb81dc0efe7a74f8b5e..5927f63a28ae9117d65c15c9e619cdd72cfbcc9b 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_06.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_06.json @@ -5,14 +5,18 @@ "key": "_description", "origin": "e39d5667-8ae3-4b24-8375-74f40ebcb880", "type": "STRING", - "value": "Do not required TPs.\r\nFully covered by ITS-S_CAM_16\r\n" + "value": "Void." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "e39d5667-8ae3-4b24-8375-74f40ebcb880", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/6c666f70-ff2e-4d9b-b25e-45bdd0b88099"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/6c666f70-ff2e-4d9b-b25e-45bdd0b88099", + "/Documents/ts_103097v010201p.xhtml/31d476e6-b809-400a-a06b-25bb659cc453" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "06. Check verification key validity" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "e39d5667-8ae3-4b24-8375-74f40ebcb880", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_07.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_07.json index 75b3c2826e047ab5f4d40c101d0f21f103b395a4..29d35c113cfcfcce5a51551318370c67ae98065e 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_07.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_07.json @@ -1,36 +1,39 @@ -{ - "attributes": { - "_description": { - "isGenerated": false, - "key": "_description", - "origin": "9f315bf6-17ca-4adb-ba5b-5310ab36bf5e", - "type": "STRING", - "value": "If ITS-S sends an AT certificate check that the AIDs in the its_aid_ssp_list are unique\r\nCheck that AID list contains not more than 31 item" - }, - "_locations": { - "isGenerated": false, - "key": "_locations", - "origin": "9f315bf6-17ca-4adb-ba5b-5310ab36bf5e", - "type": "LIST", - "value": [ - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/77ca71c9-2055-4b9a-82ca-f5d720208b17", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/8e9f84e1-3f43-4323-a3de-efed4d7e08ca" - ] - }, - "_name": { - "isGenerated": false, - "key": "_name", - "origin": "9f315bf6-17ca-4adb-ba5b-5310ab36bf5e", - "type": "STRING", - "value": "07. Check ITS-AID-SSP" - }, - "_type": { - "isGenerated": false, - "key": "_type", - "origin": "9f315bf6-17ca-4adb-ba5b-5310ab36bf5e", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "9f315bf6-17ca-4adb-ba5b-5310ab36bf5e" +{ + "attributes": { + "_locations": { + "elements_type": "STRING", + "isGenerated": false, + "key": "_locations", + "origin": "9f315bf6-17ca-4adb-ba5b-5310ab36bf5e", + "type": "LIST", + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/77ca71c9-2055-4b9a-82ca-f5d720208b17", + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/8e9f84e1-3f43-4323-a3de-efed4d7e08ca", + "/Documents/ts_103097v010201p.xhtml/8a319e13-50a8-4e29-a775-30d3853d05f0", + "/Documents/ts_103097v010201p.xhtml/3a85743b-2d03-42a9-844a-56a299b12f74" + ] + }, + "_name": { + "isGenerated": false, + "key": "_name", + "origin": "9f315bf6-17ca-4adb-ba5b-5310ab36bf5e", + "type": "STRING", + "value": "07. Check ITS-AID-SSP" + }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "9f315bf6-17ca-4adb-ba5b-5310ab36bf5e", + "type": "STRING", + "value": "INCOMPLETE" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "9f315bf6-17ca-4adb-ba5b-5310ab36bf5e", + "type": "STRING", + "value": "Requirement" + } + }, + "uuid": "9f315bf6-17ca-4adb-ba5b-5310ab36bf5e" } \ No newline at end of file diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_07/TP_SEC_ITSS_SND_CERT_AT_07_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_07/TP_SEC_ITSS_SND_CERT_AT_07_01_BV.json index c6b6fba9b0a52c03baa9b5c867e488a636a25ec3..cd3fe1eea49fe1c445eb28996a654ccc89a7a088 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_07/TP_SEC_ITSS_SND_CERT_AT_07_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_07/TP_SEC_ITSS_SND_CERT_AT_07_01_BV.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "9927d09f-0ec3-4122-a856-db5e7bf477a8", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "9927d09f-0ec3-4122-a856-db5e7bf477a8", "type": "STRING", - "value": "Check that all AIDs containing in the in the its_aid_ssp_list in AT certificate are unique and exists in the its_aid_list in the AA certificate\r\nCheck that the length of SSP of each AID is 31 octet maximum\r\n" + "value": "Check that all AIDs containing in the its_aid_ssp_list in AT certificate are unique;\r\nCheck that all AIDs containing in the its_aid_ssp_list in AT certificate are also containing in the its_aid_list in the correspondent AA certificate;\r\nCheck that the length of SSP of each AID is 31 octets maximum" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "9927d09f-0ec3-4122-a856-db5e7bf477a8", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n\tthe IUT being requested to include certificate chain in the next CAM\r\n} ensure that {\r\n\t when {\r\n\t\tthe IUT is requested to send a CAM\r\n\t} then {\r\n\t\tthe IUT sends a SecuredMessage\r\n\t\t\tcontaining header_fields['signer_info'].signer {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating certificate_chain\r\n\t\t\t\tcontaining certificates[last-1] {\r\n\t\t\t\t\tcontaining subject_info.subject_type\r\n\t\t\t\t\t\tindicating 'authorization_authority' (2)\r\n\t\t\t\t\tcontaining subject_attributes['its_aid_list']\r\n\t\t\t\t\t\tcontaining its_aid_list[0..N]\r\n\t\t\t\t\t\t\tindicating ITS_AID_LIST_AA\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t\tcontaining certificates[last] {\r\n\t\t\t\t\tcontaining subject_info.subject_type\r\n\t\t\t\t\t\tindicating 'authorization_ticket' (1)\r\n\t\t\t\t\tcontaining subject_attributes['its_aid_ssp_list']\r\n\t\t\t\t\t\tcontaining its_aid_ssp_list[0..N] {\r\n\t\t\t\t\t\t\tcontaining its_aid_ssp_list[n]{\r\n\t\t\t\t\t\t\t\tcontaining its_aid\r\n\t\t\t\t\t\t\t\t\tindicating unique value containing in the ITS_AID_LIST_AA\r\n\t\t\t\t\t\t\t\tcontaining service_specific_permissions\r\n\t\t\t\t\t\t\t\t\tindicating length <= 31 octet\r\n\t\t\t\t\t\t\t}\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t}\r\n}\r\n" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "9927d09f-0ec3-4122-a856-db5e7bf477a8", "type": "STRING", "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "9927d09f-0ec3-4122-a856-db5e7bf477a8", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_08.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_08.json index 881a4b0c9df1739709b514f6df85429d285b7e4f..bc832114440034f9a28fb8abe608288fa296a984 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_08.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_08.json @@ -1,18 +1,29 @@ { "attributes": { "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "2043f4ae-1aca-4084-a10a-057ed0bfa620", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/2192ce7e-f93c-4f63-a974-13e73c7917f0"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/2192ce7e-f93c-4f63-a974-13e73c7917f0", + "/Documents/ts_103097v010201p.xhtml/0e9485da-3aa9-4762-aad1-c706a9468cba" + ] }, "_name": { "isGenerated": false, "key": "_name", "origin": "2043f4ae-1aca-4084-a10a-057ed0bfa620", "type": "STRING", - "value": "08. Check that AT certificate is signed by AA cert." + "value": "08. Check that AT certificate is signed by AA cert" + }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "2043f4ae-1aca-4084-a10a-057ed0bfa620", + "type": "STRING", + "value": "INCOMPLETE" }, "_type": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_09.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_09.json index 2498e148707ff5bdf5d6b77341b7bbab211df9b6..9e242a768bcb9b126852b253fee01b8ffb4c7faf 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_09.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_09.json @@ -1,20 +1,16 @@ { "attributes": { - "_description": { - "isGenerated": false, - "key": "_description", - "origin": "71ac2e1b-73ac-4293-8562-5c7371d8b04d", - "type": "STRING", - "value": "Check that the assurance level of the subordinate certificate is equal to or lower than the assurance level of the issuing certificate" - }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "71ac2e1b-73ac-4293-8562-5c7371d8b04d", "type": "LIST", "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/2973afd2-d5de-4ae7-84cc-f796bd6a57ce", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/93bc77ce-bfd3-4227-8d7f-0756a76199cd" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/93bc77ce-bfd3-4227-8d7f-0756a76199cd", + "/Documents/ts_103097v010201p.xhtml/a5aaa3b8-fe7b-4f50-8dff-a3674829fa6f", + "/Documents/ts_103097v010201p.xhtml/0c378b8d-b7f5-4102-92db-50cd3f458166" ] }, "_name": { @@ -24,6 +20,13 @@ "type": "STRING", "value": "09. Check assurance level" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "71ac2e1b-73ac-4293-8562-5c7371d8b04d", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_09/TP_SEC_ITSS_SND_CERT_AT_09_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_09/TP_SEC_ITSS_SND_CERT_AT_09_01_BV.json index e2b88a47b6989ae89a77f507b7f48eff280c4294..5313c6faf36da8ab9aa3b629aafbe18140ef6a09 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_09/TP_SEC_ITSS_SND_CERT_AT_09_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_09/TP_SEC_ITSS_SND_CERT_AT_09_01_BV.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "4744decb-d93c-4ec7-8ead-548ce850d7a8", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "4744decb-d93c-4ec7-8ead-548ce850d7a8", "type": "STRING", - "value": "Check that the assurance level of the subordinate certificate is equal to or lower than the assurance level of the issuing certificate" + "value": "Check that the assurance level of the subordinate certificate is equal to or less than the assurance level of the issuing certificate" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "4744decb-d93c-4ec7-8ead-548ce850d7a8", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n\tthe IUT being requested to include certificate chain in the next CAM\r\n} ensure that {\r\n\t when {\r\n\t\tthe IUT is requested to send a CAM\r\n\t} then {\r\n\t\tthe IUT sends a SecuredMessage\r\n\t\t\tcontaining header_fields['signer_info'].signer {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating certificate_chain\r\n\t\t\t\tcontaining certificates[last-1] (CERT_AA) {\r\n\t\t\t\t\tcontaining subject_attributes ['assurance_level']\r\n\t\t\t\t\t\tcontainig assurance_level\r\n\t\t\t\t\t\t\tindicating assurance level AL_AA\r\n\t\t\t\t}\r\n\t\t\t\tcontaining certificates[last] (CERT_AT) {\r\n\t\t\t\t\tcontaining subject_attributes ['assurance_level']\r\n\t\t\t\t\t\tcontainig assurance_level\r\n\t\t\t\t\t\t\tindicating assurance level AL_AT (AL_AT <= AL_AA)\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n\tthe IUT being requested to include certificate chain in the next CAM\r\n} ensure that {\r\n\t when {\r\n\t\tthe IUT is requested to send a CAM\r\n\t} then {\r\n\t\tthe IUT sends a SecuredMessage\r\n\t\t\tcontaining header_fields['signer_info'].signer {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating certificate_chain\r\n\t\t\t\tcontaining certificates[last-1] (CERT_AA) {\r\n\t\t\t\t\tcontaining subject_attributes ['assurance_level']\r\n\t\t\t\t\t\tcontaining assurance_level\r\n\t\t\t\t\t\t\tcontaining bits [5-7]\r\n\t\t\t\t\t\t\t\tindicating assurance level AL_AA\r\n\t\t\t\t}\r\n\t\t\t\tcontaining certificates[last] (CERT_AT) {\r\n\t\t\t\t\tcontaining subject_attributes ['assurance_level']\r\n\t\t\t\t\t\tcontaining assurance_level\r\n\t\t\t\t\t\t\tcontaining bits [5-7]\r\n\t\t\t\t\t\t\t\tindicating assurance level AL_AT (AL_AT <= AL_AA)\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t}\r\n}" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "4744decb-d93c-4ec7-8ead-548ce850d7a8", "type": "STRING", "value": "complete" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "4744decb-d93c-4ec7-8ead-548ce850d7a8", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_10.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_10.json index e626aa53cc20cfc9c892d159862b9c3786b9ef85..e3a920c3151b9a73053b33208657eb317d6bed09 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_10.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_10.json @@ -1,11 +1,15 @@ { "attributes": { "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "e764bb01-436d-4e46-a5c1-4c4af7eaf928", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/4d1be56a-6392-4bb5-aee0-608ca40f1dd5"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/4d1be56a-6392-4bb5-aee0-608ca40f1dd5", + "/Documents/ts_103097v010201p.xhtml/274ddbb0-bfb4-4073-8304-ddc326713b86" + ] }, "_name": { "isGenerated": false, @@ -14,6 +18,13 @@ "type": "STRING", "value": "10. Check validity restriction presence and order" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "e764bb01-436d-4e46-a5c1-4c4af7eaf928", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_10/TP_SEC_ITSS_SND_CERT_AT_10_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_10/TP_SEC_ITSS_SND_CERT_AT_10_01_BV.json index b02e62a00c5681491ce0abd7bc0cc456ab23f676..9bf165e5d347448277774086c54d7384373671e7 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_10/TP_SEC_ITSS_SND_CERT_AT_10_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_10/TP_SEC_ITSS_SND_CERT_AT_10_01_BV.json @@ -1,27 +1,37 @@ { "attributes": { "_author": { + "isGenerated": false, "key": "_author", + "origin": "0bb41774-e655-466b-8a00-e5dbe66d3234", "type": "STRING", "value": "filatov" }, "_description": { + "isGenerated": false, "key": "_description", + "origin": "0bb41774-e655-466b-8a00-e5dbe66d3234", "type": "STRING", - "value": "Check that all neccesary validityrestrictions are present and arranged in accesing order" + "value": "Check that all necessary validity restrictions are present and arranged in ascending order" }, "_expectedResults": { + "isGenerated": false, "key": "_expectedResults", + "origin": "0bb41774-e655-466b-8a00-e5dbe66d3234", "type": "STRING", "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n\tthe IUT being requested to include certificate in the next CAM\r\n} ensure that {\r\n\t when {\r\n\t\tthe IUT is requested to send a CAM\r\n\t} then {\r\n\t\tthe IUT sends a SecuredMessage\r\n\t\t\tcontaining header_fields['signer_info'].signer {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\tcontaining certificate {\r\n\t\t\t\t\tcontaining validity_restrictions\r\n\t\t\t\t\t\tindicating validity_restrictions[n].type < validity_restrictions[n+1].type\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t}\r\n}\r\n" }, "_status": { + "isGenerated": false, "key": "_status", + "origin": "0bb41774-e655-466b-8a00-e5dbe66d3234", "type": "STRING", "value": "in process" }, "_type": { + "isGenerated": false, "key": "_type", + "origin": "0bb41774-e655-466b-8a00-e5dbe66d3234", "type": "STRING", "value": "TestPurpose" } diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO.json index b66071278fe8a3d3cd0f6eb5bc1a7dc066eb280b..36ef0fe88ea7df1c142876f64f7651a43b9540cb 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO.json @@ -14,6 +14,13 @@ "type": "STRING", "value": "04-06. Geographical regions" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "19e35215-070a-44e8-80f4-99740f0b740e", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_04.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_04.json index fc192450cd1f486a11d5639e3ef3a9d9291e976f..2b299be052ca65612d02a5ce8f6975553d99aa38 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_04.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_04.json @@ -15,13 +15,16 @@ "value": "Check Rectangular Region:\r\nThe length of the vector of rectangles is less then 6.\r\nThe region is continuous and does not contain any holes.\r\nThe NW location is on the NW from SE.\r\n" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "ed05de3e-7987-4683-bd1e-e688b65183d9", "type": "LIST", "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/cc0caddb-c780-4115-ac41-0a5170b44856", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/d2b07016-3c4a-44f5-87fa-8396fd8edaf6" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/d2b07016-3c4a-44f5-87fa-8396fd8edaf6", + "/Documents/ts_103097v010201p.xhtml/54bc9834-9895-4ea3-b091-ac14c2e45b29", + "/Documents/ts_103097v010201p.xhtml/bf8fd5f7-1eca-4385-b102-d7f1bbba5660" ] }, "_name": { @@ -31,6 +34,13 @@ "type": "STRING", "value": "04. Check Rectangular regions" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "ed05de3e-7987-4683-bd1e-e688b65183d9", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_04/TP_SEC_ITSS_SND_CERT_04_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_04/TP_SEC_ITSS_SND_CERT_04_01_BV.json index 9910f14717354da52316e897fa08c54c35cdfda9..1f5414cc9df9b68a06704b4662818580389d7f36 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_04/TP_SEC_ITSS_SND_CERT_04_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_04/TP_SEC_ITSS_SND_CERT_04_01_BV.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "69aa17da-fc04-4037-bdb2-be39d960220e", "type": "STRING", - "value": "Check that the length of the vector of rectangles is less then 6.\r\nCheck that region is continuous and does not contain any holes.\r\nCheck that the rectangles are valid" + "value": "Check that the rectangular certificate validity region contains not more than six valid rectangles;\r\nCheck that the rectangular certificate validity region is continuous and does not contain any holes\r\n" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_04/TP_SEC_ITSS_SND_CERT_04_02_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_04/TP_SEC_ITSS_SND_CERT_04_02_BV.json index f3bbce2aaa35a93b808049910bd966e565fb4030..ced7a86e0b47efce56188c843f7427987de1e915 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_04/TP_SEC_ITSS_SND_CERT_04_02_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_04/TP_SEC_ITSS_SND_CERT_04_02_BV.json @@ -12,14 +12,14 @@ "key": "_description", "origin": "b8218cba-1253-4c57-a238-ee408b3af72e", "type": "STRING", - "value": "Check that the rectangular region of the subordinate certificate is well formed and inside the validity restrictions of the issuing certificate." + "value": "Check that the rectangular certificate validity region of the subordinate certificate is well formed and inside the validity region of the issuing certificate" }, "_expectedResults": { "isGenerated": false, "key": "_expectedResults", "origin": "b8218cba-1253-4c57-a238-ee408b3af72e", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n\tthe IUT being requested to include certificate chain in the next CAM\r\n} ensure that {\r\n\t when {\r\n\t\tthe IUT is requested to send a CAM\r\n\t} then {\r\n\t\tthe IUT sends a SecuredMessage\r\n\t\t\tcontaining header_fields['signer_info'].signer {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'certificate_chain'\r\n\t\t\t\tcontaining certificates\r\n\t\t\t\t\tindicating CERTIFICATES {\r\n\t\t\t\t\t\tcontaining CERTIFICATES[N] {\r\n\t\t\t\t\t\t\tcontaining validity_restrictions['region'] {\r\n\t\t\t\t\t\t\t\tcontaining region_type\r\n\t\t\t\t\t\t\t\t\tindicating 'rectangle'\r\n\t\t\t\t\t\t\t\tcontaining rectangular_region {\r\n\t\t\t\t\t\t\t\t\tindicating length <= 6\r\n\t\t\t\t\t\t\t\t\tand containing elements of type RectangularRegion\r\n\t\t\t\t\t\t\t\t\t\tcontaining northwest and southeast\r\n\t\t\t\t\t\t\t\t\t\t\tindicating northwest on the north from southeast\r\n\t\t\t\t\t\t\t\t\tand indicating continuous region without holes\r\n\t\t\t\t\t\t\t\t\t\twhich is inside the CERTIFICATES[N-1].validity_restrictions['region'] if region validity restriction is containted in certificate CERTIFICATES[N-1]\r\n\t\t\t\t\t\t\t\t}\r\n\t\t\t\t\t\t\t}\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t}\r\n\t\t\t}\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n\tthe IUT being requested to include certificate chain in the next CAM\r\n} ensure that {\r\n\t when {\r\n\t\tthe IUT is requested to send a CAM\r\n\t} then {\r\n\t\tthe IUT sends a SecuredMessage\r\n\t\t\tcontaining header_fields['signer_info'].signer {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'certificate_chain'\r\n\t\t\t\tcontaining certificates\r\n\t\t\t\t\tindicating CERTIFICATES {\r\n\t\t\t\t\t\tcontaining CERTIFICATES[N] {\r\n\t\t\t\t\t\t\tcontaining validity_restrictions['region'] {\r\n\t\t\t\t\t\t\t\tcontaining region_type\r\n\t\t\t\t\t\t\t\t\tindicating 'rectangle'\r\n\t\t\t\t\t\t\t\tcontaining rectangular_region {\r\n\t\t\t\t\t\t\t\t\tindicating length <= 6\r\n\t\t\t\t\t\t\t\t\tand containing elements of type RectangularRegion\r\n\t\t\t\t\t\t\t\t\t\tcontaining northwest and southeast\r\n\t\t\t\t\t\t\t\t\t\t\tindicating northwest on the north from southeast\r\n\t\t\t\t\t\t\t\t\tand indicating continuous region without holes\r\n\t\t\t\t\t\t\t\t\t\twhich is inside the CERTIFICATES[N-1].validity_restrictions['region'] if region validity restriction is contained in certificate CERTIFICATES[N-1]\r\n\t\t\t\t\t\t\t\t}\r\n\t\t\t\t\t\t\t}\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t}\r\n\t\t\t}\r\n\t}\r\n}" }, "_status": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_05.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_05.json index e06e4e31dc7ce6e40d336cfa0e5cf0a75ba4d097..53fb6fe5cb037bd9de64deb77f4622ffe801baf9 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_05.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_05.json @@ -15,18 +15,29 @@ "value": "Check Polygonal Region:\r\nMust contain at least 3 and no more than 12 points\r\nShould not contain intersections\r\n" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "d8b517b2-50f3-4b59-b2af-88fcb0dbe0de", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/5000e046-01fa-468e-ad37-711e8685205b"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/5000e046-01fa-468e-ad37-711e8685205b", + "/Documents/ts_103097v010201p.xhtml/235ceabe-4e4b-4beb-8988-bf7091fe8d2f" + ] }, "_name": { "isGenerated": false, "key": "_name", "origin": "d8b517b2-50f3-4b59-b2af-88fcb0dbe0de", "type": "STRING", - "value": "05. Check Polygonal Region." + "value": "05. Check Polygonal Region" + }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "d8b517b2-50f3-4b59-b2af-88fcb0dbe0de", + "type": "STRING", + "value": "COMPLETE" }, "_type": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_05/TP_SEC_ITSS_SND_CERT_05_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_05/TP_SEC_ITSS_SND_CERT_05_01_BV.json index 7e93cfaef1c328d44f1fdb25e1c003cfcad68a24..242d2b2919780b1b0604e0dbf64cb0777c357e05 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_05/TP_SEC_ITSS_SND_CERT_05_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_05/TP_SEC_ITSS_SND_CERT_05_01_BV.json @@ -1,40 +1,40 @@ -{ - "attributes": { - "_author": { - "isGenerated": false, - "key": "_author", - "origin": "20cca0f1-fd8d-4ec5-9759-21333efff1cf", - "type": "STRING", - "value": "filatov" - }, - "_description": { - "isGenerated": false, - "key": "_description", - "origin": "20cca0f1-fd8d-4ec5-9759-21333efff1cf", - "type": "STRING", - "value": "Check Polygonal Region:\r\nMust contain at least 3 and no more than 12 points\r\nIntersections and holes are not permited\r\n\r\n" - }, - "_expectedResults": { - "isGenerated": false, - "key": "_expectedResults", - "origin": "20cca0f1-fd8d-4ec5-9759-21333efff1cf", - "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n\tthe IUT being requested to include certificate in the next CAM\r\n} ensure that {\r\n\t when {\r\n\t\tthe IUT is requested to send a CAM\r\n\t} then {\r\n\t\tthe IUT sends a SecuredMessage\r\n\t\t\tcontaining header_fields['signer_info'].signer {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\tcontaining certificate {\r\n\t\t\t\t\tcontaining validity_restrictions['region']{\r\n\t\t\t\t\t\tcontaining region_type\r\n\t\t\t\t\t\t\tindicating 'polygon'\r\n\t\t\t\t\t\tcontaining polygonal_region {\r\n\t\t\t\t\t\t\tindicating length >=3 and <=12\r\n\t\t\t\t\t\t\tindicating continuous region without holes and intersections\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t}\r\n}" - }, - "_status": { - "isGenerated": false, - "key": "_status", - "origin": "20cca0f1-fd8d-4ec5-9759-21333efff1cf", - "type": "STRING", - "value": "complete" - }, - "_type": { - "isGenerated": false, - "key": "_type", - "origin": "20cca0f1-fd8d-4ec5-9759-21333efff1cf", - "type": "STRING", - "value": "TestPurpose" - } - }, - "uuid": "20cca0f1-fd8d-4ec5-9759-21333efff1cf" +{ + "attributes": { + "_author": { + "isGenerated": false, + "key": "_author", + "origin": "20cca0f1-fd8d-4ec5-9759-21333efff1cf", + "type": "STRING", + "value": "filatov" + }, + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "20cca0f1-fd8d-4ec5-9759-21333efff1cf", + "type": "STRING", + "value": "Check that the polygonal certificate validity region contains at least three and no more than 12 points;\r\nCheck that the polygonal certificate validity region does not contain intersections and holes\r\n\r\n" + }, + "_expectedResults": { + "isGenerated": false, + "key": "_expectedResults", + "origin": "20cca0f1-fd8d-4ec5-9759-21333efff1cf", + "type": "STRING", + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n\tthe IUT being requested to include certificate in the next CAM\r\n} ensure that {\r\n\t when {\r\n\t\tthe IUT is requested to send a CAM\r\n\t} then {\r\n\t\tthe IUT sends a SecuredMessage\r\n\t\t\tcontaining header_fields['signer_info'].signer {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\tcontaining certificate {\r\n\t\t\t\t\tcontaining validity_restrictions['region']{\r\n\t\t\t\t\t\tcontaining region_type\r\n\t\t\t\t\t\t\tindicating 'polygon'\r\n\t\t\t\t\t\tcontaining polygonal_region {\r\n\t\t\t\t\t\t\tindicating length >=3 and <=12\r\n\t\t\t\t\t\t\tindicating continuous region without holes and intersections\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t}\r\n}" + }, + "_status": { + "isGenerated": false, + "key": "_status", + "origin": "20cca0f1-fd8d-4ec5-9759-21333efff1cf", + "type": "STRING", + "value": "complete" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "20cca0f1-fd8d-4ec5-9759-21333efff1cf", + "type": "STRING", + "value": "TestPurpose" + } + }, + "uuid": "20cca0f1-fd8d-4ec5-9759-21333efff1cf" } \ No newline at end of file diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_05/TP_SEC_ITSS_SND_CERT_05_02_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_05/TP_SEC_ITSS_SND_CERT_05_02_BV.json index 02640fba3c24b1200a5eee3c9a682c48e911e3da..a1bb03f58398f4a387c39638cdd76314b853ba4b 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_05/TP_SEC_ITSS_SND_CERT_05_02_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_05/TP_SEC_ITSS_SND_CERT_05_02_BV.json @@ -12,14 +12,14 @@ "key": "_description", "origin": "364a1c63-5b7e-4b6e-af2b-39501c1a292a", "type": "STRING", - "value": "Check Polygonal Region:\r\nMust contain at least 3 and no more than 12 points.\r\nIntersections and holes are not permited.\r\nThe region must be inside the issuing certificate restrictions." + "value": "Check that the polygonal certificate validity region is inside the validity region of the issuing certificate;\r\nCheck that the issuing polygonal certificate validity region contains at least three and no more than 12 points;\r\nCheck that the issuing polygonal certificate validity region does not contain intersections and holes\r\n" }, "_expectedResults": { "isGenerated": false, "key": "_expectedResults", "origin": "364a1c63-5b7e-4b6e-af2b-39501c1a292a", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n\tthe IUT being requested to include certificate chain in the next CAM\r\n} ensure that {\r\n\t when {\r\n\t\tthe IUT is requested to send a CAM\r\n\t} then {\r\n\t\tthe IUT sends a SecuredMessage\r\n\t\t\tcontaining header_fields['signer_info'].signer {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'certificate_chain'\r\n\t\t\t\tcontaining certificates\r\n\t\t\t\t\tindicating CERTIFICATES {\r\n\t\t\t\t\t\tcontaining CERTIFICATES[N] {\r\n\t\t\t\t\t\t\tcontaining validity_restrictions['region'] {\r\n\t\t\t\t\t\t\t\tcontaining region_type\r\n\t\t\t\t\t\t\t\t\tindicating 'polygon'\r\n\t\t\t\t\t\t\t\tcontaining polygonal_region {\r\n\t\t\t\t\t\t\t\t\tindicating length >=3 and <=12\r\n\t\t\t\t\t\t\t\t\tindicating continuous region without holes and intersections\r\n\t\t\t\t\t\t\t\t\t\twhich is inside the CERTIFICATES[N-1]\r\n\t\t\t\t\t\t\t\t\t\t.validity_restrictions['region'].polygonal_region\r\n\t\t\t\t\t\t\t\t\t\tif region validity restriction is containted in CERTIFICATES[N-1]\r\n\t\t\t\t\t\t\t\t}\r\n\t\t\t\t\t\t\t}\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t}\r\n\t\t\t}\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n\tthe IUT being requested to include certificate chain in the next CAM\r\n} ensure that {\r\n\t when {\r\n\t\tthe IUT is requested to send a CAM\r\n\t} then {\r\n\t\tthe IUT sends a SecuredMessage\r\n\t\t\tcontaining header_fields['signer_info'].signer {\r\n\t\t\t\tcontaining type\r\n\t\t\t\t\tindicating 'certificate_chain'\r\n\t\t\t\tcontaining certificates\r\n\t\t\t\t\tindicating CERTIFICATES {\r\n\t\t\t\t\t\tcontaining CERTIFICATES[N] {\r\n\t\t\t\t\t\t\tcontaining validity_restrictions['region'] {\r\n\t\t\t\t\t\t\t\tcontaining region_type\r\n\t\t\t\t\t\t\t\t\tindicating 'polygon'\r\n\t\t\t\t\t\t\t\tcontaining polygonal_region {\r\n\t\t\t\t\t\t\t\t\tindicating length >=3 and <=12\r\n\t\t\t\t\t\t\t\t\tindicating continuous region without holes and intersections\r\n\t\t\t\t\t\t\t\t\t\twhich is inside the CERTIFICATES[N-1]\r\n\t\t\t\t\t\t\t\t\t\t.validity_restrictions['region'].polygonal_region\r\n\t\t\t\t\t\t\t\t\t\tif region validity restriction is contained in CERTIFICATES[N-1]\r\n\t\t\t\t\t\t\t\t}\r\n\t\t\t\t\t\t\t}\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t}\r\n\t\t\t}\r\n\t}\r\n}" }, "_status": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_06.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_06.json index dffeb51467a619bb01b52ff04f5f1c5a0fd628ea..29de98db4d24883b24d463c0b3fb2b462b8aeaa9 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_06.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_06.json @@ -15,13 +15,16 @@ "value": "Check IdentifiedRegion:\r\nCheck that region identifier indicating valid value according to specified dictionary." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "4ccff361-8db5-4ad1-b3dd-273acd27f4bc", "type": "LIST", "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/7f3a6b4c-ea1c-4d17-bfc9-1a6338be1b9d", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/2089e412-fa5c-4dc3-937e-0c5a7d7d8a07" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/2089e412-fa5c-4dc3-937e-0c5a7d7d8a07", + "/Documents/ts_103097v010201p.xhtml/815d02b2-2d5e-4a9d-8632-386a8017515f", + "/Documents/ts_103097v010201p.xhtml/60585f95-c23b-4663-a422-c5a12c7b17ab" ] }, "_name": { @@ -31,6 +34,13 @@ "type": "STRING", "value": "06. Check Identified Region" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "4ccff361-8db5-4ad1-b3dd-273acd27f4bc", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_06/TP_SEC_ITSS_SND_CERT_06_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_06/TP_SEC_ITSS_SND_CERT_06_01_BV.json index 0044b27647f06a37bbf6ef8c719d2938f73b5ccb..d828a65c535b517d6a4a2c9a020b32ac23e6d0d8 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_06/TP_SEC_ITSS_SND_CERT_06_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_06/TP_SEC_ITSS_SND_CERT_06_01_BV.json @@ -19,7 +19,7 @@ "key": "_description", "origin": "a3d873c2-2043-4e3e-b3d7-f5b8199cd490", "type": "STRING", - "value": "Check Identified Region:\r\nMust contain value that correspond to numeric country codes as defined in ISO 3166-1\r\n\r\n" + "value": "Check that the identified certificate validity region contains values that correspond to numeric country codes as defined in ISO 3166-1\r\n" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_06/TP_SEC_ITSS_SND_CERT_06_02_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_06/TP_SEC_ITSS_SND_CERT_06_02_BV.json index ceb61fecb9968e75cd71c922b63a29c4d7400be8..394fe02fa4da7b451b23c500c3977200ad239a23 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_06/TP_SEC_ITSS_SND_CERT_06_02_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_06/TP_SEC_ITSS_SND_CERT_06_02_BV.json @@ -19,7 +19,7 @@ "key": "_description", "origin": "35c6bd73-97ab-4c91-aaf5-fc45d2964dfd", "type": "STRING", - "value": "Check Identified Region:\r\nMust contain value that correspond to numeric country codes as defined in ISO 3166-1\r\nSubordinate certificate restrictions must be a subset of the issuing certificate restrictions\r\n\r\n" + "value": "Check that the identified certificate validity region contains values that correspond to numeric country codes as defined in ISO 3166-1;\r\nCheck that the identified certificate validity region contains values defining the region which is inside the validity region of the issuing certificate\r\n" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_06/TP_SEC_ITSS_SND_CERT_06_03_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_06/TP_SEC_ITSS_SND_CERT_06_03_BV.json index a038c3a3ac47a0c5f26618913403972bedfd1a95..ae3c0377f82fd8cc2114769b9e0221159e65862d 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_06/TP_SEC_ITSS_SND_CERT_06_03_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_06/TP_SEC_ITSS_SND_CERT_06_03_BV.json @@ -19,7 +19,7 @@ "key": "_description", "origin": "bb431690-8e0a-42e7-ae81-1a3f14f5b3b3", "type": "STRING", - "value": "Check Identified Region:\r\nMust contain value that correspond to numeric country codes as defined by United Nations Statistics Division\r\n\r\n" + "value": "Check that the identified certificate validity region contains values that correspond to numeric country codes as defined by United Nations Statistics Division" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_06/TP_SEC_ITSS_SND_CERT_06_04_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_06/TP_SEC_ITSS_SND_CERT_06_04_BV.json index 73833f6e0da892bb8878ee5f8f525dbd252cc6a6..42e1847e440d3ae137bdd4fbe12cee43eb94fbc0 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_06/TP_SEC_ITSS_SND_CERT_06_04_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_06/TP_SEC_ITSS_SND_CERT_06_04_BV.json @@ -19,7 +19,7 @@ "key": "_description", "origin": "003fbfd6-8b75-4a19-ba0c-2e114072a85e", "type": "STRING", - "value": "Check Identified Region:\r\nMust contain value that correspond to numeric country codes as defined by United Nations Statistics Division\r\nSubordinate certificate restrictions must be a subset of the issuing certificate restrictions\r\n" + "value": "Check that the identified certificate validity region contains values that correspond to numeric country codes as defined by United Nations Statistics Division;\r\nCheck that the identified certificate validity region contains values defining the region which is inside the validity region of the issuing certificate" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM.json index 9b919ee0c26987ecc8dac9230efa75e35f72df19..e26e5b6573e477b104516d62bdf9e837aae26c88 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM.json @@ -1,11 +1,15 @@ { "attributes": { "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "7e5d7a93-ec6c-420b-ae88-77f9a270f370", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/84d2bdc6-985e-48eb-b396-6b9a7c047ca2"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/84d2bdc6-985e-48eb-b396-6b9a7c047ca2", + "/Documents/ts_103097v010201p.xhtml/fd2e4af3-d17f-4622-a387-1c5bdbc338c2" + ] }, "_name": { "isGenerated": false, @@ -14,6 +18,13 @@ "type": "STRING", "value": "DENM profile" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "7e5d7a93-ec6c-420b-ae88-77f9a270f370", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_02.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_02.json index 1d383da31ddf113221aa055b5908449eda82eb91..4d4a9370c868f8fa3ae461f71f1f6ad76c89a730 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_02.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_02.json @@ -8,6 +8,7 @@ "value": "If ITS-S sends a secured DENM check that the sent SecuredMessage contains exactly one element of the header fields: signer_info, generation_time, generation_location, its_aid." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "5eab481b-0ca4-4063-b3ab-e85b6133eaee", @@ -16,7 +17,11 @@ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/799453d2-bd40-419c-8aaa-44324115ffa4", "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/7cde7fb9-8e4b-422b-8f40-c77527b6898a", "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/3ada8c64-2b8f-4fd7-a8c9-2a3bf53330f9", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/023771e5-35d6-4ff6-b017-bdd6437ef786" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/023771e5-35d6-4ff6-b017-bdd6437ef786", + "/Documents/ts_103097v010201p.xhtml/322e2d54-6950-4e35-856e-87281b4b3aa6", + "/Documents/ts_103097v010201p.xhtml/6694e8a1-e064-4703-a0d5-c44221f8cfb4", + "/Documents/ts_103097v010201p.xhtml/534d09ee-ceec-41bf-bbb4-3f9c7825da92", + "/Documents/ts_103097v010201p.xhtml/cdc87f4d-d678-4dab-83bf-eff2d82483d8" ] }, "_name": { @@ -26,6 +31,13 @@ "type": "STRING", "value": "02. Check header fields" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "5eab481b-0ca4-4063-b3ab-e85b6133eaee", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_02/TP_SEC_ITSS_SND_DENM_02_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_02/TP_SEC_ITSS_SND_DENM_02_01_BV.json index 27215fc8377ebe88d03e8d8ab431545147226a7c..f0cc64b9060fc8cdd53187e16568e0f719dd3408 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_02/TP_SEC_ITSS_SND_DENM_02_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_02/TP_SEC_ITSS_SND_DENM_02_01_BV.json @@ -12,14 +12,14 @@ "key": "_description", "origin": "ef85edd1-77a7-46e1-9045-5392cd2abeb6", "type": "STRING", - "value": "Check that the secured DENM contains exactly one element of these header fields: signer_info, generation_time, generation_location, message_type. \r\nCheck that the header fields are in the ascending order according to the numbering of the enumeration except of the signer_info, which is encoded first.\r\nCheck that generation_time_with_confidence (generation_time_standard_deviation) is not used" + "value": "Check that the secured DENM contains exactly one element of these header fields: signer_info, generation_time, generation_location, message_type;\r\nCheck that the header fields are in the ascending order according to the numbering of the enumeration except of the signer_info, which is encoded first;\r\nCheck that generation_time_with_confidence (generation_time_standard_deviation) is not used" }, "_expectedResults": { "isGenerated": false, "key": "_expectedResults", "origin": "ef85edd1-77a7-46e1-9045-5392cd2abeb6", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is requested to send DENM\r\n\t} then {\r\n\t\tthe IUT sends a SecuredMessage {\r\n\t\t\tcontaining header_fields[0]\r\n\t\t\t\tcontaining type \r\n\t\t\t\t\tindicating 'signer_info'\r\n\t\t\tcontaining header_fields [n].type\r\n\t\t\t\tindicating value less then header_fields [n+1].type\r\n\t\t\tcontaining header_fields ['generation_time']\r\n\t\t\tcontaining header_fields ['generation_location']\r\n\t\t\tcontaining header_fields ['its_aid'] {\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\t}\r\n\t\t\tnot containing header_fields ['generation_time_with_confidence']\r\n\t\t}\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is requested to send DENM\r\n\t} then {\r\n\t\tthe IUT sends a SecuredMessage {\r\n\t\t\tcontaining header_fields[0]\r\n\t\t\t\tcontaining type \r\n\t\t\t\t\tindicating 'signer_info'\r\n\t\t\tcontaining header_fields [n].type\r\n\t\t\t\tindicating value less than header_fields [n+1].type\r\n\t\t\tcontaining header_fields ['generation_time']\r\n\t\t\tcontaining header_fields ['generation_location']\r\n\t\t\tcontaining header_fields ['its_aid'] {\r\n\t\t\t\tcontaining its_aid\r\n\t\t\t\t\tindicating 'AID_DENM'\r\n\t\t\t}\r\n\t\t\tnot containing header_fields ['generation_time_with_confidence']\r\n\t\t}\r\n\t}\r\n}" }, "_status": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_03.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_03.json index 5ccb3425869ba5cc2f8506d1094e9c467f8ba854..4628e646c378f4325070945f73a66b2a9947b99b 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_03.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_03.json @@ -8,11 +8,15 @@ "value": "If ITS-S sends a secured DENM check that the sent SecuredMessage contains exactly one signer_info field of type certificate" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "9355a664-df22-474a-b29f-0aa1452311f4", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/dd620987-9e01-4fc8-b471-201d0592ff22"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/dd620987-9e01-4fc8-b471-201d0592ff22", + "/Documents/ts_103097v010201p.xhtml/6e73abdf-644e-40f0-ac1c-9b8dccb30af0" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "03. Check that signer info is a certificate" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "9355a664-df22-474a-b29f-0aa1452311f4", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_04.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_04.json index b660a5872ef6dd79c062fffa6f1e660c8861deed..0c7126999bb04393df75071e97721921c7c73269 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_04.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_04.json @@ -8,6 +8,7 @@ "value": "If ITS-S sends a secured DENM check that the sent SecuredMessage contains exactly one HeaderField generation_time which is inside the validity time of the certificate referenced by the signer_info." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "5415f6e1-2985-4815-aeb4-d68f2376eb87", @@ -15,7 +16,10 @@ "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/e1c8b3e0-5da0-4e8d-8355-563039c7cdc7", "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/9d288386-4b6a-46cc-9bd4-5be9d85696d0", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/d8ce00e7-f3e1-479b-8ce8-73861f492c7b" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/d8ce00e7-f3e1-479b-8ce8-73861f492c7b", + "/Documents/ts_103097v010201p.xhtml/615b41cb-6660-41b4-8375-b658436ca1df", + "/Documents/ts_103097v010201p.xhtml/d6ce51f8-7d7e-46fd-b53a-b4c920152e62", + "/Documents/ts_103097v010201p.xhtml/b6e04816-8080-4afe-bf78-8aa8aa77f430" ] }, "_name": { @@ -25,6 +29,13 @@ "type": "STRING", "value": "04. Check generation time" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "5415f6e1-2985-4815-aeb4-d68f2376eb87", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_04/TP_SEC_ITSS_SND_DENM_04_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_04/TP_SEC_ITSS_SND_DENM_04_01_BV.json index ac076258cf68be1987f31bd1203a4452d105b4d2..6c15012f90a8ec0f08b52db122054dd5b70a35e0 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_04/TP_SEC_ITSS_SND_DENM_04_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_04/TP_SEC_ITSS_SND_DENM_04_01_BV.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "7c3afee1-84c6-48c1-8e76-0d4bc09d2d9d", "type": "STRING", - "value": "Check that message generation time is inside the validity period of the signing certificate\r\nCheck that message generation time value is realistic (according to values proposed in C2C SEC12)" + "value": "Check that message generation time is inside the validity period of the signing certificate;\r\nCheck that message generation time value is realistic" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_05.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_05.json index e893919950ae277c3a4ae897625aa3dd057724dd..05d43e55ae8394d037d470a0c8fbb845ae59ee7e 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_05.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_05.json @@ -15,13 +15,16 @@ "value": "If ITS-S sends a secured DENM check that the sent SecuredMessage contains exactly one HeaderField generation_location which is conformed to validity restriction of the certificate pointed by the signer_info field.\nStation shall not send messages if it's location is outside of the location restrictions in the AT cert. Different types of region restriction can tested.\n" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "b94b2f9b-5f46-494f-82eb-e802b671974d", "type": "LIST", "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/4e698c28-866a-437a-81b0-1825b19d6297", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/90324b98-a3aa-495d-bb77-d7b532d503a9" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/90324b98-a3aa-495d-bb77-d7b532d503a9", + "/Documents/ts_103097v010201p.xhtml/24846e25-0161-4426-9e87-27ac10525fa0", + "/Documents/ts_103097v010201p.xhtml/eadacd7d-8386-4c76-8f38-0be53ce96210" ] }, "_name": { @@ -31,6 +34,13 @@ "type": "STRING", "value": "05. Check generation location" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "b94b2f9b-5f46-494f-82eb-e802b671974d", + "type": "STRING", + "value": "COMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_06.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_06.json index b3403368c464c1f7b8867d916cf90b41128ccca9..1f24959b780c2627de3a17a13a0c38b1ac585eb9 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_06.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_06.json @@ -8,11 +8,16 @@ "value": "Check that the sent Secured DENM contains exactly one HeaderField its_aid that is set to 'AID_DENM' (16513)" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "a42d5137-7f0e-4aca-a2eb-b058091c8bc5", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/79b1e74c-cf2f-4d76-bcac-07d24883a293"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/79b1e74c-cf2f-4d76-bcac-07d24883a293", + "/Documents/ts_103097v010201p.xhtml/43a47e59-9bb0-46ab-bcb3-2f373b450e48", + "/Documents/ts_103097v010201p.xhtml/49abf17c-f239-46b9-ad89-ac52a283c52c" + ] }, "_name": { "isGenerated": false, @@ -21,6 +26,13 @@ "type": "STRING", "value": "06. Check secured DENM its_aid value" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "a42d5137-7f0e-4aca-a2eb-b058091c8bc5", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_08.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_08.json index 916025cc6fa34cdcf04907dcc1ba8e1133642f8f..2b1d17eba00d496679d77ce0747818cf788029c1 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_08.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_08.json @@ -8,13 +8,16 @@ "value": "If ITS-S sends a secured DENM check that the sent SecuredMessage contains not-empty Payload element of type signed." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "6fa3fcb0-4edd-427a-9881-a8815f3f398e", "type": "LIST", "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/59de9c30-dcf8-4767-bc49-171e85998a37", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/3277f67d-8198-4426-af7f-209a9a15fb4d" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/3277f67d-8198-4426-af7f-209a9a15fb4d", + "/Documents/ts_103097v010201p.xhtml/61b388f4-8bad-4b8a-9684-eae475708a7a", + "/Documents/ts_103097v010201p.xhtml/25a3bac6-9684-45fa-8d7f-410041a80dbb" ] }, "_name": { @@ -24,6 +27,13 @@ "type": "STRING", "value": "08. Check Payload" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "6fa3fcb0-4edd-427a-9881-a8815f3f398e", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_08/TP_SEC_ITSS_SND_DENM_08_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_08/TP_SEC_ITSS_SND_DENM_08_01_BV.json index 03c590600db340ab1d00cf872a547488c3e3260a..01553de58c8d04e9ee8367d27daf550e747f8802 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_08/TP_SEC_ITSS_SND_DENM_08_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_08/TP_SEC_ITSS_SND_DENM_08_01_BV.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "b11462b8-676f-49d2-abad-bb7dc49fe8af", "type": "STRING", - "value": "Check that the Secured DENM contains non-empty payload of type signed." + "value": "Check that the Secured DENM contains non-empty payload of type signed" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_09.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_09.json index eb8adec22b92ced92a79790e4b12d39abe2fa478..babcb3032b19d3ee7171434bd6068f9f65fb2025 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_09.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_09.json @@ -5,14 +5,18 @@ "key": "_description", "origin": "64b6651e-2b4c-4bf4-8587-0143ee5f2e63", "type": "STRING", - "value": "If ITS-S sends a secured DENM check that the sent SecuredMessage contains the TrailerField signature element.\r\nFully covered by ITS-S_DENM_10_T01. Does not need special TP" + "value": "Void." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "64b6651e-2b4c-4bf4-8587-0143ee5f2e63", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/cd97a713-fd01-4456-bab8-84aae963f48b"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/cd97a713-fd01-4456-bab8-84aae963f48b", + "/Documents/ts_103097v010201p.xhtml/c1d9965d-8c11-4b5b-af2b-42bba5482fd7" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "09. Check trailer field presence" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "64b6651e-2b4c-4bf4-8587-0143ee5f2e63", + "type": "STRING", + "value": "COMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_09/Comment 01.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_09/Comment 01.json new file mode 100644 index 0000000000000000000000000000000000000000..abcff6cfc41370321d7f3ec35273f82dc59d0bcd --- /dev/null +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_09/Comment 01.json @@ -0,0 +1,33 @@ +{ + "attributes": { + "_author": { + "isGenerated": false, + "key": "_author", + "origin": "fa66a9a8-bbfc-4e6e-acab-399223b5bcb5", + "type": "STRING", + "value": "filatov" + }, + "_description": { + "isGenerated": false, + "key": "_description", + "origin": "fa66a9a8-bbfc-4e6e-acab-399223b5bcb5", + "type": "STRING", + "value": "If ITS-S sends a secured DENM check that the sent SecuredMessage contains the TrailerField signature element.\r\nFully covered by ITS-S_DENM_10_T01. Does not need special TP" + }, + "_index": { + "isGenerated": false, + "key": "_index", + "origin": "fa66a9a8-bbfc-4e6e-acab-399223b5bcb5", + "type": "STRING", + "value": "1" + }, + "_type": { + "isGenerated": false, + "key": "_type", + "origin": "fa66a9a8-bbfc-4e6e-acab-399223b5bcb5", + "type": "STRING", + "value": "Comment" + } + }, + "uuid": "fa66a9a8-bbfc-4e6e-acab-399223b5bcb5" +} \ No newline at end of file diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_10.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_10.json index c1cfc94c59721214b1f22cfbb47e656b8e93c401..0f48b9cb295a60e52207b66f550587c59f68bae1 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_10.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_10.json @@ -8,11 +8,15 @@ "value": "If ITS-S sends a secured DENM check that the sent SecuredMessage contains the signature which can be verified using the sertificate pointed by the signer_info field." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "968a806e-de36-42ec-bbdc-69f0a9405a79", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/b87e28f5-7eda-4025-9f16-35fe563b6a2f"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/b87e28f5-7eda-4025-9f16-35fe563b6a2f", + "/Documents/ts_103097v010201p.xhtml/351c77d8-92de-4bb3-991e-a3b814285a8c" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "10. Check signature" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "968a806e-de36-42ec-bbdc-69f0a9405a79", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_10/TP_SEC_ITSS_SND_DENM_10_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_10/TP_SEC_ITSS_SND_DENM_10_01_BV.json index eccff6e576af4f2615b409818ac8243d4011f10d..c6005f4b65f52f77cfd9c7c65afd6ec3f1f804f6 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_10/TP_SEC_ITSS_SND_DENM_10_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_10/TP_SEC_ITSS_SND_DENM_10_01_BV.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "dbac30a8-e850-46f2-b225-9c8718c90a2a", "type": "STRING", - "value": "Check that the secured DENM contains only one TrailerField of type signature.\r\nCheck that the signature contained in the SecuredMessage is calculated over the right fields by cryptographically verifying the signature." + "value": "Check that the secured DENM contains only one TrailerField of type signature;\r\nCheck that the signature contained in the SecuredMessage is calculated over the right fields by cryptographically verifying the signature" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG.json index be63237ff4aa7e7e3f5d4c498b20391696a90f4f..ec02dcb3313578307c758ca6105558387ff7b56a 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG.json @@ -8,11 +8,15 @@ "value": "non-zero" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "bd8fcd9c-a8d3-4b53-8417-a9eebb8c78cf", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/dc173140-21db-4c79-93a8-7f24aff8cea0"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/dc173140-21db-4c79-93a8-7f24aff8cea0", + "/Documents/ts_103097v010201p.xhtml/9e56d5a0-75dc-4481-afe9-202dd280af93" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "Generic signed message profile" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "bd8fcd9c-a8d3-4b53-8417-a9eebb8c78cf", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_02.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_02.json index 1642ee53f3dc2f32e7e09e19c3e87a92e24612af..449ed8ecb7e8a42ebcd7eab42f4b01a7603f199a 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_02.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_02.json @@ -8,6 +8,7 @@ "value": "If ITS-S sends a signed message with general security profile check that the sent SecuredMessage contains exactly one element of the header fields: signer_info, generation_time, generation_location\r\nCheck that the header fields are in the ascending order according to the numbering of the enumeration except of the signer_info, which is encoded first." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "4357caf6-c1c0-4f02-9f1b-16b34900d813", @@ -16,7 +17,11 @@ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/655df553-f2cc-481a-b3f1-8954c2a2f19b", "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/209c0b2b-c07a-4023-aadc-c80c5d0c8774", "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/88ac51be-1b12-4ec0-be8a-8a064ef12c6a", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/ffd67c7f-db67-406e-83ce-f1140efe0f63" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/ffd67c7f-db67-406e-83ce-f1140efe0f63", + "/Documents/ts_103097v010201p.xhtml/9f584669-0edc-4cd5-9e25-979e66b5e955", + "/Documents/ts_103097v010201p.xhtml/73eaa11c-13d1-4db7-840f-c17ed625c22b", + "/Documents/ts_103097v010201p.xhtml/a53c9dad-b4db-41d2-92b2-821d276b747b", + "/Documents/ts_103097v010201p.xhtml/3e04d28f-0401-4b5c-ba33-b47d0e63946b" ] }, "_name": { @@ -26,6 +31,13 @@ "type": "STRING", "value": "02. Check header field" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "4357caf6-c1c0-4f02-9f1b-16b34900d813", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_02/TP_SEC_ITSS_SND_GENMSG_02_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_02/TP_SEC_ITSS_SND_GENMSG_02_01_BV.json index fdee74c5c0af06157af4272bac064cf1bdfa0126..5a687e242452f05d00777dc8e5ab9b9adb8aeb49 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_02/TP_SEC_ITSS_SND_GENMSG_02_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_02/TP_SEC_ITSS_SND_GENMSG_02_01_BV.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "5d882403-407e-48dd-bb87-5c2200779512", "type": "STRING", - "value": "Check that the generic secured message contains exactly one element of these header fields: signer_info, generation_time, generation_location.\r\nCheck that the header fields are in the ascending order according to the numbering of the enumeration except of the signer_info, which is encoded first." + "value": "Check that the generic secured message contains exactly one element of these header fields: signer_info, generation_time, generation_location;\r\nCheck that the header fields are in the ascending order according to the numbering of the enumeration except of the signer_info, which is encoded first" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_03.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_03.json index 8ad4144ecd358bf9f4b904eb2dc09c892b7c6720..1f1ac536cf63030cfabf534d9d1ef5f1f384030a 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_03.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_03.json @@ -8,11 +8,15 @@ "value": "If ITS-S sends a signed message with general security profile check that the sent SecuredMessage contains exactly one signer_info field of type certificate" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "fccb79f8-1904-4670-a775-ab3020c60a08", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/8919f8cf-0b31-445c-b659-b5c9af67975c"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/8919f8cf-0b31-445c-b659-b5c9af67975c", + "/Documents/ts_103097v010201p.xhtml/f86c287a-9f57-4735-938f-3cc4807a6d53" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "03. Check that signer info is a certificate" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "fccb79f8-1904-4670-a775-ab3020c60a08", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_04.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_04.json index 6caf3aa8cb39632d531b20f8a99d270afd338d59..ed8679716fa1eeb1acc2292e13afb31f2c6b667b 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_04.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_04.json @@ -8,6 +8,7 @@ "value": "If ITS-S sends a signed message with general security profile check that the sent SecuredMessage contains exactly one HeaderField generation_time which is inside the validity time of the certificate referenced by the signer_info." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "2d7486e0-cf9d-4e90-a9c0-708749f027f4", @@ -15,7 +16,10 @@ "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/e1c8b3e0-5da0-4e8d-8355-563039c7cdc7", "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/6e2b18ef-2431-48ae-9a10-cae099d89969", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/ec223c71-ab7b-4b9c-9942-739771862633" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/ec223c71-ab7b-4b9c-9942-739771862633", + "/Documents/ts_103097v010201p.xhtml/615b41cb-6660-41b4-8375-b658436ca1df", + "/Documents/ts_103097v010201p.xhtml/b31b89ad-2b2a-4bc8-a16f-9c2918b931c9", + "/Documents/ts_103097v010201p.xhtml/56cf21c7-baf9-4b70-932f-326b22b242a8" ] }, "_name": { @@ -25,6 +29,13 @@ "type": "STRING", "value": "04. Check generation time" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "2d7486e0-cf9d-4e90-a9c0-708749f027f4", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_04/TP_SEC_ITSS_SND_GENMSG_04_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_04/TP_SEC_ITSS_SND_GENMSG_04_01_BV.json index 2e50a561dd00abaee97530ef2c990e9b0475f97e..c446affa162d8eac47af5ef5e7ecba1bf147a408 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_04/TP_SEC_ITSS_SND_GENMSG_04_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_04/TP_SEC_ITSS_SND_GENMSG_04_01_BV.json @@ -12,14 +12,14 @@ "key": "_description", "origin": "b67b9bc7-410c-4caa-bf8a-45f1cad36b9a", "type": "STRING", - "value": "Check that message generation time is inside the validity period of the signing certificate\r\nCheck that message generation time value is realistic (according to values proposed in C2C SEC12)" + "value": "Check that message generation time is inside the validity period of the signing certificate;\r\nCheck that message generation time value is realistic" }, "_expectedResults": { "isGenerated": false, "key": "_expectedResults", "origin": "b67b9bc7-410c-4caa-bf8a-45f1cad36b9a", "type": "STRING", - "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is requested to send a Beacon\r\n\t} then {\r\n\t\tthe IUT sends a SecuredMessage {\r\n\t\t\tcontaining header_fields ['its_aid']\r\n\t\t\t\tindicating 'AID_BEACON'\r\n\t\t\tcontaining exacly one header_fields['generation_time'] {\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 (CUR_TIME - 10min <= TIME_1 <= CUR_TIME + 5min)\r\n\t\t\t}\r\n\t\t\tcontaining header_fields['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tcontaining certificate {\r\n\t\t\t\t\t\tcontaining validity_restrictions['time_start_and_end'] {\r\n\t\t\t\t\t\t\tcontaining start_validity\r\n\t\t\t\t\t\t\t\tindicating value <= TIME_1\r\n\t\t\t\t\t\t\tcontaining end_validity\r\n\t\t\t\t\t\t\t\tindicating value > TIME_1\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t\tor not containing validity_restrictions['time_start_and_end']\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n}" + "value": "with {\r\n\tthe IUT being in the 'authorized' state\r\n}\r\nensure that {\r\n\twhen {\r\n\t\tthe IUT is requested to send a Beacon\r\n\t} then {\r\n\t\tthe IUT sends a SecuredMessage {\r\n\t\t\tcontaining header_fields ['its_aid']\r\n\t\t\t\tindicating 'AID_BEACON'\r\n\t\t\tcontaining exactly one header_fields['generation_time'] {\r\n\t\t\t\tcontaining generation_time\r\n\t\t\t\t\tindicating TIME_1 (CUR_TIME - 10min <= TIME_1 <= CUR_TIME + 5min)\r\n\t\t\t}\r\n\t\t\tcontaining header_fields['signer_info'] {\r\n\t\t\t\tcontaining signer {\r\n\t\t\t\t\tcontaining type\r\n\t\t\t\t\t\tindicating 'certificate'\r\n\t\t\t\t\tcontaining certificate {\r\n\t\t\t\t\t\tcontaining validity_restrictions['time_start_and_end'] {\r\n\t\t\t\t\t\t\tcontaining start_validity\r\n\t\t\t\t\t\t\t\tindicating value <= TIME_1\r\n\t\t\t\t\t\t\tcontaining end_validity\r\n\t\t\t\t\t\t\t\tindicating value > TIME_1\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t\tor not containing validity_restrictions['time_start_and_end']\r\n\t\t\t\t\t}\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n}" }, "_status": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_05.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_05.json index ebab21a78fe050591e8b966d64af2bfca4df155d..55141eec4070e001aba081211e0e1d9c3c2d97ac 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_05.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_05.json @@ -15,13 +15,16 @@ "value": "If ITS-S sends a signed message with general security profile check that the sent SecuredMessage contains exactly one HeaderField generation_location which is conformed to validity restriction of the certificate pointed by the signer_info field." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "5b16b8e9-2fdf-4e6f-9bab-cdb929fa3f8c", "type": "LIST", "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/f38bfa36-0dbd-405f-88df-5b077f4912d9", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/6be5db96-3b1e-4d71-a27e-2361c7422876" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/6be5db96-3b1e-4d71-a27e-2361c7422876", + "/Documents/ts_103097v010201p.xhtml/8d8ff631-c7f2-4672-9842-a920332238d1", + "/Documents/ts_103097v010201p.xhtml/1867819d-7fb8-4abe-848a-218944594c15" ] }, "_name": { @@ -31,6 +34,13 @@ "type": "STRING", "value": "05. Check generation location" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "5b16b8e9-2fdf-4e6f-9bab-cdb929fa3f8c", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_06.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_06.json index b6877f69a4ccde6ea3f136bc64648a6bd2e9f051..6e5658702674f736524f789afb1e3848e002c732 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_06.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_06.json @@ -8,11 +8,15 @@ "value": "If ITS-S sends a signed message with general security profile check that the sent SecuredMessage contains Payload element of type signed, signed_external or signed_and_encrypted\r\nDo not know how to check signed_external or signed_and_encrypted" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "dcfe8769-1cc7-4dcb-ae56-3d9f17e07a5a", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/1a6ac998-0ad1-483e-87ce-dc1b2c57d6f1"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/1a6ac998-0ad1-483e-87ce-dc1b2c57d6f1", + "/Documents/ts_103097v010201p.xhtml/327f9109-fdf6-4271-ad73-dde8a50590b7" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "06. Check payload" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "dcfe8769-1cc7-4dcb-ae56-3d9f17e07a5a", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_07.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_07.json index ca9369002cd86a96116b3a0658ee9dc03fd4b8fc..68d7298d5c2f388bcddd38825fce9474396dfc9e 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_07.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_07.json @@ -8,13 +8,16 @@ "value": "If ITS-S sends a signed message with general security profile check that the signature contained in the SecuredMessage is calculated over the right fields by cryptographically verifying the signature." }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "1185a9b5-610f-4a45-8e36-d5acf14ff5ac", "type": "LIST", "value": [ "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/e1e96227-c64e-4d30-8d81-67ee8a5f802f", - "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/3d07e7dc-24bf-4edb-973d-71d1fd22e490" + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/3d07e7dc-24bf-4edb-973d-71d1fd22e490", + "/Documents/ts_103097v010201p.xhtml/b92fccca-032f-4a3c-8b7d-89e0cd966e8d", + "/Documents/ts_103097v010201p.xhtml/3545ac20-454c-4f8b-8447-af4d7d3eb03c" ] }, "_name": { @@ -24,6 +27,13 @@ "type": "STRING", "value": "07. Check signature" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "1185a9b5-610f-4a45-8e36-d5acf14ff5ac", + "type": "STRING", + "value": "INCOMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_07/TP_SEC_ITSS_SND_GENMSG_07_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_07/TP_SEC_ITSS_SND_GENMSG_07_01_BV.json index 0cc05b2ced4d55eda44d6f2316e86ba747775343..6134887936b6fa5e3055b13222e6ffe91d2b0f9e 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_07/TP_SEC_ITSS_SND_GENMSG_07_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_07/TP_SEC_ITSS_SND_GENMSG_07_01_BV.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "2bdc3945-6e79-418c-9cdf-f24a4cf35ba4", "type": "STRING", - "value": "Check that the secured message contains only one TrailerField of type signature.\r\nCheck that the signature contained in the SecuredMessage is calculated over the right fields by cryptographically verifying the signature." + "value": "Check that the secured message contains only one TrailerField of type signature;\r\nCheck that the signature contained in the SecuredMessage is calculated over the right fields by cryptographically verifying the signature" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_01.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_01.json index 49fd6b7e54058e92f0bc93c7584b422004988e24..e4695ceb2374bb4c7f6a868fb8c7d8e52556267f 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_01.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_01.json @@ -8,11 +8,15 @@ "value": "Check that ITS-S sends a SecuredMessage contains protocol version set to 2" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "ecce97b9-4147-49fc-8703-b1722f7bf992", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/da6b3098-07d5-49aa-876f-6ae437a945ef"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/da6b3098-07d5-49aa-876f-6ae437a945ef", + "/Documents/ts_103097v010201p.xhtml/58ea9176-dfab-4645-a9a2-855e9d5d57dc" + ] }, "_name": { "isGenerated": false, @@ -21,6 +25,13 @@ "type": "STRING", "value": "01. Check the message protocol version" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "ecce97b9-4147-49fc-8703-b1722f7bf992", + "type": "STRING", + "value": "FAILED" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_04.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_04.json index dbd545ef45625ef7ced4a18eb256aa2f0fbf4597..cd10a93d6f4a3287f415ef36ee1b63a2b105f24e 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_04.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_04.json @@ -5,21 +5,32 @@ "key": "_description", "origin": "fbd6acf6-53bb-4e95-8f1b-220795fc0e75", "type": "STRING", - "value": "Regular ITS stations shall use certificates containing a SubjectInfo of SubjectType authorization_ticket when communicating with other ITS-Stations." + "value": "Regular ITS stations shall use certificates containing a SubjectInfo of SubjectType authorization_ticket when communicating with other ITS-Stations" }, "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "fbd6acf6-53bb-4e95-8f1b-220795fc0e75", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/6ca2d2f6-8aea-4f69-95bd-596488ea39d0"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/6ca2d2f6-8aea-4f69-95bd-596488ea39d0", + "/Documents/ts_103097v010201p.xhtml/1d95aba3-2c2a-45a2-b40e-8f8bfe3b164d" + ] }, "_name": { "isGenerated": false, "key": "_name", "origin": "fbd6acf6-53bb-4e95-8f1b-220795fc0e75", "type": "STRING", - "value": "04. Check that AT certificate is used to sign communication messages of ITS-S." + "value": "04. Check that AT certificate is used to sign communication messages of ITS-S" + }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "fbd6acf6-53bb-4e95-8f1b-220795fc0e75", + "type": "STRING", + "value": "INCOMPLETE" }, "_type": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_04/TP_SEC_ITSS_SND_MSG_04_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_04/TP_SEC_ITSS_SND_MSG_04_01_BV.json index 81368256a9138c992defeb036ed29f70b601c9bb..c532cdc0d7594fcdf32fbf275868f9bee7e072c3 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_04/TP_SEC_ITSS_SND_MSG_04_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_04/TP_SEC_ITSS_SND_MSG_04_01_BV.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "127db487-37ce-4029-998c-5d6d4f3fd06b", "type": "STRING", - "value": "Check that when IUT sends the message signed with the digest, than this digest points to the AT certificate\r\n" + "value": "Check that when IUT sends the message signed with the digest, then this digest points to the AT certificate\r\n" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_05.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_05.json index 249ed0cfc7b51e7479bf57f0d7a63ec0d072cc0a..9914664455298d117e4c32467d923ee544246c35 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_05.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_05.json @@ -1,11 +1,15 @@ { "attributes": { "_locations": { + "elements_type": "STRING", "isGenerated": false, "key": "_locations", "origin": "fcee498f-1ba1-40a2-b435-2b0f70d8c5d4", "type": "LIST", - "value": ["/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/a50e886a-4b76-432c-b084-49c6aa9e93db"] + "value": [ + "/Documents/Draft_ETSI_TS_103 097 v1.1.14.xhtml/a50e886a-4b76-432c-b084-49c6aa9e93db", + "/Documents/ts_103097v010201p.xhtml/cd4f4ae8-6cdd-439b-a1bb-3c8c47d8bfc1" + ] }, "_name": { "isGenerated": false, @@ -14,6 +18,13 @@ "type": "STRING", "value": "05. Check Signature ECC point type" }, + "_transferStatus": { + "isGenerated": false, + "key": "_transferStatus", + "origin": "fcee498f-1ba1-40a2-b435-2b0f70d8c5d4", + "type": "STRING", + "value": "COMPLETE" + }, "_type": { "isGenerated": false, "key": "_type", diff --git a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_05/TP_SEC_ITSS_SND_MSG_05_01_BV.json b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_05/TP_SEC_ITSS_SND_MSG_05_01_BV.json index 02f9b02c8b57dccf69dfe4991873a5e49edb8e49..23e436756de9a6e0e23b3cfa8beb1d7606380197 100644 --- a/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_05/TP_SEC_ITSS_SND_MSG_05_01_BV.json +++ b/requality/TS103096/root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_05/TP_SEC_ITSS_SND_MSG_05_01_BV.json @@ -12,7 +12,7 @@ "key": "_description", "origin": "fe261037-3291-4dbb-9ed6-ae425f88edc5", "type": "STRING", - "value": "Check that the SecuredMessage signature containes the ECC point of type set to either compressed_lsb_y_0, compressed_lsb_y_1 or x_coordinate_only" + "value": "Check that the SecuredMessage signature contains the ECC point of type set to either compressed_lsb_y_0, compressed_lsb_y_1 or x_coordinate_only" }, "_expectedResults": { "isGenerated": false, diff --git a/requality/TS103096_BasedOnIEEE1609/.project b/requality/TS103096_BasedOnIEEE1609/.project deleted file mode 100644 index 2ae3f00cbe9c631b546ca3ee34ee9551ecb1c67c..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/.project +++ /dev/null @@ -1,17 +0,0 @@ - - - TS 103 096 - - - - - - com.unitesk.requality.checkers - - - - - - com.unitesk.requality.natures.reqcatalogue - - diff --git a/requality/TS103096_BasedOnIEEE1609/.reqversions b/requality/TS103096_BasedOnIEEE1609/.reqversions deleted file mode 100644 index 54e252962e8348f5c16bd3d74d19dafd4733c9a7..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/.reqversions +++ /dev/null @@ -1 +0,0 @@ -com.unitesk.nodegroup.requality|0.15 diff --git a/requality/TS103096_BasedOnIEEE1609/root.json b/requality/TS103096_BasedOnIEEE1609/root.json deleted file mode 100644 index 99bf601f5bd3f81f3bf0a9e8ec97a10e11bf7f02..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "attributes": {"_type": { - "key": "_type", - "type": "STRING", - "value": "DBRoot" - }}, - "uuid": "14c95c76-f88e-4665-ac98-eeb018369db8" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents.json b/requality/TS103096_BasedOnIEEE1609/root/Documents.json deleted file mode 100644 index 7c13175ffe7f64d341501dcd01c2cde67da3bbb6..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "attributes": {"_type": { - "key": "_type", - "type": "STRING", - "value": "DocFolder" - }}, - "uuid": "3a0369fa-7063-4fd6-b459-77673e9d1489" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml.json deleted file mode 100644 index 43d35f90345dc488d6094f98a96998cbfe187eff..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_file": { - "key": "_file", - "type": "STRING", - "value": "TS103096-02.xhtml" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Document" - } - }, - "uuid": "b575bd34-5f41-4ba8-b929-a9c7fe0dc783" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/00970315-e4d0-445e-bdd7-3a6707f8e1b6.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/00970315-e4d0-445e-bdd7-3a6707f8e1b6.json deleted file mode 100644 index 21333e0180a2c4d66cb9e54df6656ad52abb1d4f..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/00970315-e4d0-445e-bdd7-3a6707f8e1b6.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/S-DATA/NB-06" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "00970315-e4d0-445e-bdd7-3a6707f8e1b6" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/0705a1b5-5cc6-4d41-bcf5-1450860110df.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/0705a1b5-5cc6-4d41-bcf5-1450860110df.json deleted file mode 100644 index 165b77b656b5fc1642d401e0f2d851115552c5e3..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/0705a1b5-5cc6-4d41-bcf5-1450860110df.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/EB-22" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "0705a1b5-5cc6-4d41-bcf5-1450860110df" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/071e8e77-6437-445d-9192-6a55b26d1ac7.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/071e8e77-6437-445d-9192-6a55b26d1ac7.json deleted file mode 100644 index 61f7848f4a5071447deaed3f36f42b50390c0c21..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/071e8e77-6437-445d-9192-6a55b26d1ac7.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/EB-22" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "071e8e77-6437-445d-9192-6a55b26d1ac7" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/0956fd46-ddcc-494d-8df8-692e87efbbaa.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/0956fd46-ddcc-494d-8df8-692e87efbbaa.json deleted file mode 100644 index 12312df3cd1bada446063770b648a00ead6060a3..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/0956fd46-ddcc-494d-8df8-692e87efbbaa.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/EB-15-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "0956fd46-ddcc-494d-8df8-692e87efbbaa" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/096c986d-cbd4-45ec-a89c-84c82fda2280.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/096c986d-cbd4-45ec-a89c-84c82fda2280.json deleted file mode 100644 index 676204687299b2ec2679a5ff71607b90deb46e8b..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/096c986d-cbd4-45ec-a89c-84c82fda2280.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/EB-16" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "096c986d-cbd4-45ec-a89c-84c82fda2280" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/0e46df91-3b22-4dab-beba-80504e87831d.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/0e46df91-3b22-4dab-beba-80504e87831d.json deleted file mode 100644 index 61d3106371b0ced05785e13daf533f0ac46c0ab0..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/0e46df91-3b22-4dab-beba-80504e87831d.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/EB-17" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "0e46df91-3b22-4dab-beba-80504e87831d" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/0ed0292e-df6b-42c3-82c7-1d56f027bb37.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/0ed0292e-df6b-42c3-82c7-1d56f027bb37.json deleted file mode 100644 index 78a4be3b2c132595d8fce30c1067f95b9408aba7..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/0ed0292e-df6b-42c3-82c7-1d56f027bb37.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/EB-12" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "0ed0292e-df6b-42c3-82c7-1d56f027bb37" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/113f25cd-8f37-4dc9-bbea-a48b47dee724.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/113f25cd-8f37-4dc9-bbea-a48b47dee724.json deleted file mode 100644 index 00e8a9c4e7488c61a00fd99360cb43543b985ce0..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/113f25cd-8f37-4dc9-bbea-a48b47dee724.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/EB-08" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "113f25cd-8f37-4dc9-bbea-a48b47dee724" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/16f8d926-123f-492f-9c2b-e397344d3404.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/16f8d926-123f-492f-9c2b-e397344d3404.json deleted file mode 100644 index 7ed03f443fc52f8b33984c8b552923b9819ffc68..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/16f8d926-123f-492f-9c2b-e397344d3404.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/NB-02-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "16f8d926-123f-492f-9c2b-e397344d3404" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/172ae164-96bf-4329-81d3-42863cf9481f.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/172ae164-96bf-4329-81d3-42863cf9481f.json deleted file mode 100644 index 09a127714ab6bb55ff6f24324e68e24bdb494fde..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/172ae164-96bf-4329-81d3-42863cf9481f.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/NB-10-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "172ae164-96bf-4329-81d3-42863cf9481f" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/1736d3b4-c405-4340-a041-87a6e00026c5.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/1736d3b4-c405-4340-a041-87a6e00026c5.json deleted file mode 100644 index eb0770f23c3a9994c4f06fb41a9de94fc61493ab..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/1736d3b4-c405-4340-a041-87a6e00026c5.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/EB-10" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "1736d3b4-c405-4340-a041-87a6e00026c5" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/186a350f-fcde-4ec8-8d02-bf5aee419515.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/186a350f-fcde-4ec8-8d02-bf5aee419515.json deleted file mode 100644 index 61e7b192935f005e6e2a04955772ed9c7ffa42fb..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/186a350f-fcde-4ec8-8d02-bf5aee419515.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/S-DATA/NB-10-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "186a350f-fcde-4ec8-8d02-bf5aee419515" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/1d7fb027-457a-44a3-98a2-5dd38915d38b.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/1d7fb027-457a-44a3-98a2-5dd38915d38b.json deleted file mode 100644 index 3ac76636210f4ffaf14453283732aafa08f37965..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/1d7fb027-457a-44a3-98a2-5dd38915d38b.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/NB-02-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "1d7fb027-457a-44a3-98a2-5dd38915d38b" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/213d6da7-2190-446d-9a57-368489c9f50f.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/213d6da7-2190-446d-9a57-368489c9f50f.json deleted file mode 100644 index 8e7499c9cf456118b2d15013de42f36da2850200..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/213d6da7-2190-446d-9a57-368489c9f50f.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/S-DATA/NB-07" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "213d6da7-2190-446d-9a57-368489c9f50f" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/23023613-9bcd-49c8-b715-777cdb807323.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/23023613-9bcd-49c8-b715-777cdb807323.json deleted file mode 100644 index fe7acf57fc71a4932d30a06052705e054b456d3e..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/23023613-9bcd-49c8-b715-777cdb807323.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/NB-04" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "23023613-9bcd-49c8-b715-777cdb807323" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/27a9f4ee-c84e-4ebf-9512-492f819f7c33.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/27a9f4ee-c84e-4ebf-9512-492f819f7c33.json deleted file mode 100644 index fa35814b724c59b4baec30ecde4fe4f1378c139f..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/27a9f4ee-c84e-4ebf-9512-492f819f7c33.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/EB-11" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "27a9f4ee-c84e-4ebf-9512-492f819f7c33" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/29b3e6e6-b206-46f7-b2b9-3dd0ea7757b0.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/29b3e6e6-b206-46f7-b2b9-3dd0ea7757b0.json deleted file mode 100644 index 2cf7c900d9809c46d562ceab59c88e48b13f9b47..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/29b3e6e6-b206-46f7-b2b9-3dd0ea7757b0.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Enrolment Request verification" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "29b3e6e6-b206-46f7-b2b9-3dd0ea7757b0" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/2f58845b-0f71-4d04-8ed9-92ae9761c955.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/2f58845b-0f71-4d04-8ed9-92ae9761c955.json deleted file mode 100644 index a6eb6eba5aae3998f3d2467149318c7610262ac3..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/2f58845b-0f71-4d04-8ed9-92ae9761c955.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/EB-20" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "2f58845b-0f71-4d04-8ed9-92ae9761c955" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/33b55de9-ab3f-44d7-acaa-07f5b5272c57.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/33b55de9-ab3f-44d7-acaa-07f5b5272c57.json deleted file mode 100644 index be2fce70735fcd62625553dc7840dd78abda7625..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/33b55de9-ab3f-44d7-acaa-07f5b5272c57.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/EB-24-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "33b55de9-ab3f-44d7-acaa-07f5b5272c57" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/33f934d7-95f1-441e-b649-04f962ac4118.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/33f934d7-95f1-441e-b649-04f962ac4118.json deleted file mode 100644 index fe840e023609548f4dc6b7f9402ad43ce940e475..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/33f934d7-95f1-441e-b649-04f962ac4118.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/NB-05-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "33f934d7-95f1-441e-b649-04f962ac4118" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/349eafe5-009a-4a18-8d70-9c2d8790de97.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/349eafe5-009a-4a18-8d70-9c2d8790de97.json deleted file mode 100644 index d2bb5fbfb93618a17c69aec5d68bc34fcb7885fa..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/349eafe5-009a-4a18-8d70-9c2d8790de97.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/EB-19-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "349eafe5-009a-4a18-8d70-9c2d8790de97" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/35274261-246b-4814-8a83-fbf157b97b81.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/35274261-246b-4814-8a83-fbf157b97b81.json deleted file mode 100644 index 50cf10f42c1e3e540433cd9a177a68fa7be49635..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/35274261-246b-4814-8a83-fbf157b97b81.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/EB-13-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "35274261-246b-4814-8a83-fbf157b97b81" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/3811efdb-3ac9-41a0-832f-1177a303f964.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/3811efdb-3ac9-41a0-832f-1177a303f964.json deleted file mode 100644 index 4c8584ddcf4510cefda2808352e354a19a10c387..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/3811efdb-3ac9-41a0-832f-1177a303f964.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Normal Behavior" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "3811efdb-3ac9-41a0-832f-1177a303f964" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/39b2cfc2-c170-403d-92cf-9334a56c0320.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/39b2cfc2-c170-403d-92cf-9334a56c0320.json deleted file mode 100644 index f59f512b3ef230d54333e9c51590fbb11fe883f4..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/39b2cfc2-c170-403d-92cf-9334a56c0320.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/EB-03" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "39b2cfc2-c170-403d-92cf-9334a56c0320" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/3ab404a7-f606-430c-9408-430ba13e347a.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/3ab404a7-f606-430c-9408-430ba13e347a.json deleted file mode 100644 index dc8df6324d0fe961aa6012cf71e99825bd92baac..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/3ab404a7-f606-430c-9408-430ba13e347a.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/S-DATA/NB-12" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "3ab404a7-f606-430c-9408-430ba13e347a" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/3bc3f172-2fb6-4847-a214-86d1b734fc45.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/3bc3f172-2fb6-4847-a214-86d1b734fc45.json deleted file mode 100644 index 64380256bc240e33bcc4f90c5e9e60aea99b5894..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/3bc3f172-2fb6-4847-a214-86d1b734fc45.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/EB-08-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "3bc3f172-2fb6-4847-a214-86d1b734fc45" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/44d9aed2-53db-4b63-b745-b9bf5afebed9.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/44d9aed2-53db-4b63-b745-b9bf5afebed9.json deleted file mode 100644 index 8f98a8f2eae54e41cd47396b61746045b613cb3e..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/44d9aed2-53db-4b63-b745-b9bf5afebed9.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/EB-06" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "44d9aed2-53db-4b63-b745-b9bf5afebed9" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/49240420-14cd-4df4-8ce2-55b45895cae9.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/49240420-14cd-4df4-8ce2-55b45895cae9.json deleted file mode 100644 index 0011380a64a8eeb36ca65e6e66b0bc415381c7f9..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/49240420-14cd-4df4-8ce2-55b45895cae9.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/EB-10" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "49240420-14cd-4df4-8ce2-55b45895cae9" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/494aee59-9083-4db9-bd3d-153c2bd2ec6f.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/494aee59-9083-4db9-bd3d-153c2bd2ec6f.json deleted file mode 100644 index e380711277ce2b3a43371b3891597a1e17217cac..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/494aee59-9083-4db9-bd3d-153c2bd2ec6f.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/EB-06-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "494aee59-9083-4db9-bd3d-153c2bd2ec6f" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/4a160830-f5c8-4c48-ba03-1bbfd2123474.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/4a160830-f5c8-4c48-ba03-1bbfd2123474.json deleted file mode 100644 index ed9d26050af324a94542655f7bdd729cf278a488..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/4a160830-f5c8-4c48-ba03-1bbfd2123474.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/EB-09" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "4a160830-f5c8-4c48-ba03-1bbfd2123474" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/4a884055-cc07-44ff-92bb-322775640e0d.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/4a884055-cc07-44ff-92bb-322775640e0d.json deleted file mode 100644 index 81f5c627232949b81eb90668a7759deb106b95ca..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/4a884055-cc07-44ff-92bb-322775640e0d.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/EB-05" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "4a884055-cc07-44ff-92bb-322775640e0d" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/4ac26752-656c-4a69-af0c-2c5aa9eb448a.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/4ac26752-656c-4a69-af0c-2c5aa9eb448a.json deleted file mode 100644 index e7dea46d4078811dc11bc3f3626fd72cd072c723..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/4ac26752-656c-4a69-af0c-2c5aa9eb448a.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/NB-12" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "4ac26752-656c-4a69-af0c-2c5aa9eb448a" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/4b1e86c4-4e64-4c7f-a1f3-b35b3bd97cde.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/4b1e86c4-4e64-4c7f-a1f3-b35b3bd97cde.json deleted file mode 100644 index ac609ae4c8a2707c48ba86a97ff1c13ee889d241..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/4b1e86c4-4e64-4c7f-a1f3-b35b3bd97cde.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/S-DATA/NB-01" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "4b1e86c4-4e64-4c7f-a1f3-b35b3bd97cde" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/4bc97923-b693-4ae6-a5de-a1e153b48348.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/4bc97923-b693-4ae6-a5de-a1e153b48348.json deleted file mode 100644 index 52a2dc91f4758675f133c7094129c18672cdd742..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/4bc97923-b693-4ae6-a5de-a1e153b48348.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/EB-01-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "4bc97923-b693-4ae6-a5de-a1e153b48348" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/4f9120c9-69da-446f-9cc2-c3aa6608b957.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/4f9120c9-69da-446f-9cc2-c3aa6608b957.json deleted file mode 100644 index 93ed71ab7c9ab0fbcd4936d92e7eb2ef39f6833c..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/4f9120c9-69da-446f-9cc2-c3aa6608b957.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/NB-10" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "4f9120c9-69da-446f-9cc2-c3aa6608b957" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/4fb0585b-5077-45a4-871c-f42766805894.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/4fb0585b-5077-45a4-871c-f42766805894.json deleted file mode 100644 index 6c558c211f3eb759b74651a5a2e9514ac8cfc2ad..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/4fb0585b-5077-45a4-871c-f42766805894.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/EB-02" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "4fb0585b-5077-45a4-871c-f42766805894" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/5220f55a-1dff-40ac-94d7-ef817786e076.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/5220f55a-1dff-40ac-94d7-ef817786e076.json deleted file mode 100644 index 16e85a5d05a72ff6a4666c87023849364701b439..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/5220f55a-1dff-40ac-94d7-ef817786e076.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "

      <\/font>\n<\/b>\n<\/p>\n<\/td>\t\n

      \n\nTP/SEC/ITS-S/ENR/NB-03<\/font><\/b><\/p><\/td>" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "5220f55a-1dff-40ac-94d7-ef817786e076" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/54a108fe-9039-4ab9-b70c-fa6c288680b5.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/54a108fe-9039-4ab9-b70c-fa6c288680b5.json deleted file mode 100644 index 21ea51a0dec4b094bb5543c412f6b4a4006ca780..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/54a108fe-9039-4ab9-b70c-fa6c288680b5.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/EB-13" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "54a108fe-9039-4ab9-b70c-fa6c288680b5" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/5703d2fe-2463-4127-81b6-7bd8cf86e147.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/5703d2fe-2463-4127-81b6-7bd8cf86e147.json deleted file mode 100644 index 23ea860d612c0f36cec96791a065c1e2c5a35b4d..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/5703d2fe-2463-4127-81b6-7bd8cf86e147.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/EB-12" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "5703d2fe-2463-4127-81b6-7bd8cf86e147" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/57b9d378-30f4-46da-b01e-1f6aab832364.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/57b9d378-30f4-46da-b01e-1f6aab832364.json deleted file mode 100644 index b14bba8c8f0e03ac6c7f476797e62aacdf9e6b99..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/57b9d378-30f4-46da-b01e-1f6aab832364.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/EB-11" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "57b9d378-30f4-46da-b01e-1f6aab832364" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/5b73398e-da91-4cac-9375-9f2ae5af68c8.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/5b73398e-da91-4cac-9375-9f2ae5af68c8.json deleted file mode 100644 index 3b780b165b53483953b1732a28de61cc2bba7003..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/5b73398e-da91-4cac-9375-9f2ae5af68c8.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/NB-09" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "5b73398e-da91-4cac-9375-9f2ae5af68c8" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/5e964e13-ce14-46d6-95a9-331d3b8df811.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/5e964e13-ce14-46d6-95a9-331d3b8df811.json deleted file mode 100644 index 5618e1b775664a630ab8a87e1b31895ac3b7d230..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/5e964e13-ce14-46d6-95a9-331d3b8df811.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/EB-01-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "5e964e13-ce14-46d6-95a9-331d3b8df811" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/60375019-354c-4294-a24f-dd5f43185148.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/60375019-354c-4294-a24f-dd5f43185148.json deleted file mode 100644 index 45c0d7714fc4668867b6d84564310bd765e70f92..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/60375019-354c-4294-a24f-dd5f43185148.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/EB-19-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "60375019-354c-4294-a24f-dd5f43185148" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/63214b98-6fa5-4d6c-9003-9551052239ee.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/63214b98-6fa5-4d6c-9003-9551052239ee.json deleted file mode 100644 index 310206ac70823cd846ff7181f443d3f2b22a33dd..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/63214b98-6fa5-4d6c-9003-9551052239ee.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/EB-01" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "63214b98-6fa5-4d6c-9003-9551052239ee" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/636d6f4f-90c7-442c-8082-0fc0e888ff7c.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/636d6f4f-90c7-442c-8082-0fc0e888ff7c.json deleted file mode 100644 index fd52bda3ee976f8fd95d785661b505980cd1309d..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/636d6f4f-90c7-442c-8082-0fc0e888ff7c.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/NB-11" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "636d6f4f-90c7-442c-8082-0fc0e888ff7c" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/64c83378-09cf-4eca-8a71-b2c226cd35ad.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/64c83378-09cf-4eca-8a71-b2c226cd35ad.json deleted file mode 100644 index a18aed7907c1048fefd0cc1e7c22eca8bec66645..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/64c83378-09cf-4eca-8a71-b2c226cd35ad.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/EB-20" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "64c83378-09cf-4eca-8a71-b2c226cd35ad" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6551654e-b308-43a9-a40f-74347a30e410.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6551654e-b308-43a9-a40f-74347a30e410.json deleted file mode 100644 index 4c5c89349d027ddecf04a1334ee9d612552ef622..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6551654e-b308-43a9-a40f-74347a30e410.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/EB-14-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "6551654e-b308-43a9-a40f-74347a30e410" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/65d138b3-7c4f-4a3f-b235-612fa1aaf31c.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/65d138b3-7c4f-4a3f-b235-612fa1aaf31c.json deleted file mode 100644 index dfa8f7b315630df453fc71aa8b1bfe9435a99cee..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/65d138b3-7c4f-4a3f-b235-612fa1aaf31c.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/EB-07" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "65d138b3-7c4f-4a3f-b235-612fa1aaf31c" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6847c33e-7c6e-40e4-937b-c4554d17c4e0.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6847c33e-7c6e-40e4-937b-c4554d17c4e0.json deleted file mode 100644 index 10163bfe02c71036e7214d15d4a8bfd5e099e6c2..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6847c33e-7c6e-40e4-937b-c4554d17c4e0.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/EB-18" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "6847c33e-7c6e-40e4-937b-c4554d17c4e0" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/68efc865-bff1-450d-bebf-c0d4eb89285e.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/68efc865-bff1-450d-bebf-c0d4eb89285e.json deleted file mode 100644 index 5db29bfd37ad88d2beff76b296b8d277098e9a68..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/68efc865-bff1-450d-bebf-c0d4eb89285e.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/S-DATA/NB-05" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "68efc865-bff1-450d-bebf-c0d4eb89285e" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/69f2dbbf-ed81-46ac-956e-fd260c9cc38c.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/69f2dbbf-ed81-46ac-956e-fd260c9cc38c.json deleted file mode 100644 index 9a69bab6f2f015f171337807df6edc8b4682a7b5..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/69f2dbbf-ed81-46ac-956e-fd260c9cc38c.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Exceptional behavior" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "69f2dbbf-ed81-46ac-956e-fd260c9cc38c" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6a24d325-1eb0-40c0-8569-22873c20b47d.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6a24d325-1eb0-40c0-8569-22873c20b47d.json deleted file mode 100644 index 0dd6f24bab3e70e0bfdfb9a7d91a0b7257859e9a..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6a24d325-1eb0-40c0-8569-22873c20b47d.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/EB-18-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "6a24d325-1eb0-40c0-8569-22873c20b47d" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6b58bb4a-13e0-46ab-98bd-4949bfb30f5e.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6b58bb4a-13e0-46ab-98bd-4949bfb30f5e.json deleted file mode 100644 index 48475f9fb96ea0944c072ccd146494337dc3b1fe..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6b58bb4a-13e0-46ab-98bd-4949bfb30f5e.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Enrolment Response acceptance<\/font>" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "6b58bb4a-13e0-46ab-98bd-4949bfb30f5e" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6be5d0ae-0ccd-4a26-abaa-ef46b9bc22d4.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6be5d0ae-0ccd-4a26-abaa-ef46b9bc22d4.json deleted file mode 100644 index 4d1eac16ae4692026dd39a07798e5e8c0b613f35..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6be5d0ae-0ccd-4a26-abaa-ef46b9bc22d4.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "1609Dot2Data message received by the test system from the ITS-S under test" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "6be5d0ae-0ccd-4a26-abaa-ef46b9bc22d4" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6dba05c2-4e9d-4ada-bbb6-657be301a16e.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6dba05c2-4e9d-4ada-bbb6-657be301a16e.json deleted file mode 100644 index fafe38c3396c998941d3508b1251607afa8f04c3..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6dba05c2-4e9d-4ada-bbb6-657be301a16e.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/EB-23-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "6dba05c2-4e9d-4ada-bbb6-657be301a16e" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6e7f8eb8-baf5-422f-82f9-f3146bb4da5f.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6e7f8eb8-baf5-422f-82f9-f3146bb4da5f.json deleted file mode 100644 index 7e77b0bd3f3efd164973047f199454961ccb27af..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6e7f8eb8-baf5-422f-82f9-f3146bb4da5f.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/EB-04" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "6e7f8eb8-baf5-422f-82f9-f3146bb4da5f" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6ed18035-70c8-48c7-93ac-a23c1dfaadd8.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6ed18035-70c8-48c7-93ac-a23c1dfaadd8.json deleted file mode 100644 index 6a5dae73becc08f872c66138ac2fab0e35ded6c9..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6ed18035-70c8-48c7-93ac-a23c1dfaadd8.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/NB-09" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "6ed18035-70c8-48c7-93ac-a23c1dfaadd8" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6fa0d7c4-1b3c-4af0-a683-b79dd9d42cbe.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6fa0d7c4-1b3c-4af0-a683-b79dd9d42cbe.json deleted file mode 100644 index dfafec27d02cad545c31e7d89542fbac3f2bd21b..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/6fa0d7c4-1b3c-4af0-a683-b79dd9d42cbe.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/EB-17" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "6fa0d7c4-1b3c-4af0-a683-b79dd9d42cbe" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/7a5bd884-9ffb-432e-a713-4d603624ca14.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/7a5bd884-9ffb-432e-a713-4d603624ca14.json deleted file mode 100644 index 98bbebb81953cfaab572cf99e291ef678f5213c4..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/7a5bd884-9ffb-432e-a713-4d603624ca14.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/NB-05" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "7a5bd884-9ffb-432e-a713-4d603624ca14" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/7c20de83-2f4a-4414-9a8f-3d7abb8be1d8.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/7c20de83-2f4a-4414-9a8f-3d7abb8be1d8.json deleted file mode 100644 index 3c22c29f1ec648f894098406ae2a8b429570849b..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/7c20de83-2f4a-4414-9a8f-3d7abb8be1d8.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/EB-10" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "7c20de83-2f4a-4414-9a8f-3d7abb8be1d8" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/7e096e44-bb1b-49db-91fa-6eeaf6f41b20.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/7e096e44-bb1b-49db-91fa-6eeaf6f41b20.json deleted file mode 100644 index e9b9556d8118935770a8cb4e82f7b0ec56e39485..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/7e096e44-bb1b-49db-91fa-6eeaf6f41b20.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Exceptional Behavior" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "7e096e44-bb1b-49db-91fa-6eeaf6f41b20" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/7ed79286-935e-4e64-b4e6-a955aeb545e7.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/7ed79286-935e-4e64-b4e6-a955aeb545e7.json deleted file mode 100644 index 5c2a69b5a7da75d3ac4b7921c31d3c708a01a4ff..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/7ed79286-935e-4e64-b4e6-a955aeb545e7.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/EB-09" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "7ed79286-935e-4e64-b4e6-a955aeb545e7" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/7fbdcca1-3eab-4654-a02f-b94da5ab71e2.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/7fbdcca1-3eab-4654-a02f-b94da5ab71e2.json deleted file mode 100644 index 3752acf7e940763b2c58180442728c4502f36886..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/7fbdcca1-3eab-4654-a02f-b94da5ab71e2.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "ITS Station" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "7fbdcca1-3eab-4654-a02f-b94da5ab71e2" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/80db6911-d8a4-4f94-93d8-e7c0f58a09cd.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/80db6911-d8a4-4f94-93d8-e7c0f58a09cd.json deleted file mode 100644 index 47adc5442ae62c63d619c9a0b29702c4a830f436..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/80db6911-d8a4-4f94-93d8-e7c0f58a09cd.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/NB-03" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "80db6911-d8a4-4f94-93d8-e7c0f58a09cd" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/811bf619-f197-4b8d-9a74-2f8f3c4fc9ec.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/811bf619-f197-4b8d-9a74-2f8f3c4fc9ec.json deleted file mode 100644 index 83cdf5ddca19e4e396c0271309bc8b3f92332c89..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/811bf619-f197-4b8d-9a74-2f8f3c4fc9ec.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/NB-12" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "811bf619-f197-4b8d-9a74-2f8f3c4fc9ec" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/81f4bc83-68c1-4683-8c14-8fcc68bdc349.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/81f4bc83-68c1-4683-8c14-8fcc68bdc349.json deleted file mode 100644 index 2a0e9b0f95d4adebc574f331564d2fe4b87beed8..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/81f4bc83-68c1-4683-8c14-8fcc68bdc349.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Sending Data<\/font>" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "81f4bc83-68c1-4683-8c14-8fcc68bdc349" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/88dc481a-a3e0-4693-8e53-5194f9e5d93a.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/88dc481a-a3e0-4693-8e53-5194f9e5d93a.json deleted file mode 100644 index 52059c89195c1db01ac59ad73880ee739317e8e0..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/88dc481a-a3e0-4693-8e53-5194f9e5d93a.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/S-DATA/NB-04" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "88dc481a-a3e0-4693-8e53-5194f9e5d93a" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/8a96787b-3567-4dd5-9c78-a37be1c4a443.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/8a96787b-3567-4dd5-9c78-a37be1c4a443.json deleted file mode 100644 index b439e58a13de74c37a7582b9375775a082704168..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/8a96787b-3567-4dd5-9c78-a37be1c4a443.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/EB-14-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "8a96787b-3567-4dd5-9c78-a37be1c4a443" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/8d201b66-5666-45dd-a3aa-6c99f0137a37.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/8d201b66-5666-45dd-a3aa-6c99f0137a37.json deleted file mode 100644 index 6bcda66ce4d5c49e5133beb93666aa2c43bb9123..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/8d201b66-5666-45dd-a3aa-6c99f0137a37.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/EB-25" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "8d201b66-5666-45dd-a3aa-6c99f0137a37" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/8d90713f-c611-4929-ac10-ac35475fd6dd.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/8d90713f-c611-4929-ac10-ac35475fd6dd.json deleted file mode 100644 index 54e48a07a07c0f5282bf28ce4708d9183ffa7014..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/8d90713f-c611-4929-ac10-ac35475fd6dd.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/EB-07-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "8d90713f-c611-4929-ac10-ac35475fd6dd" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/900173cf-c5fc-4d5d-b4b9-d2fbfdc2ad92.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/900173cf-c5fc-4d5d-b4b9-d2fbfdc2ad92.json deleted file mode 100644 index 5b293788b1d6b88cdb5c0297332b696c0ebef827..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/900173cf-c5fc-4d5d-b4b9-d2fbfdc2ad92.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/NB-06" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "900173cf-c5fc-4d5d-b4b9-d2fbfdc2ad92" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9035bf24-c5c2-4d90-843f-5f4e0a502b21.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9035bf24-c5c2-4d90-843f-5f4e0a502b21.json deleted file mode 100644 index f8a0466c6f83551090c25a407198ec9313feacd1..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9035bf24-c5c2-4d90-843f-5f4e0a502b21.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/S-DATA/NB-08" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "9035bf24-c5c2-4d90-843f-5f4e0a502b21" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/90fd4fe2-12b2-41f5-99b0-c9e4626bb6dd.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/90fd4fe2-12b2-41f5-99b0-c9e4626bb6dd.json deleted file mode 100644 index b73d06dc487f3727d3e60a136ecc964b68937e63..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/90fd4fe2-12b2-41f5-99b0-c9e4626bb6dd.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/NB-08" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "90fd4fe2-12b2-41f5-99b0-c9e4626bb6dd" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/913f7af9-d6c2-44bf-af81-8b1d1be7a22e.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/913f7af9-d6c2-44bf-af81-8b1d1be7a22e.json deleted file mode 100644 index a7e146bb92de732f3ed28c38c867a34ce29039b4..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/913f7af9-d6c2-44bf-af81-8b1d1be7a22e.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/NB-14" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "913f7af9-d6c2-44bf-af81-8b1d1be7a22e" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/92526f77-23f5-481c-9504-f3c16aacd490.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/92526f77-23f5-481c-9504-f3c16aacd490.json deleted file mode 100644 index b33ac5ea0d96086b5822522b40cced7e185501b1..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/92526f77-23f5-481c-9504-f3c16aacd490.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/EB-02-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "92526f77-23f5-481c-9504-f3c16aacd490" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9558479f-82d7-4724-bf7a-7c3069b81718.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9558479f-82d7-4724-bf7a-7c3069b81718.json deleted file mode 100644 index ce545acc7552ddbbc379c047ede0ac99b0efda15..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9558479f-82d7-4724-bf7a-7c3069b81718.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/EB-03-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "9558479f-82d7-4724-bf7a-7c3069b81718" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/977bab5f-8992-4a30-bf29-7a07cc969b94.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/977bab5f-8992-4a30-bf29-7a07cc969b94.json deleted file mode 100644 index 31bee3660d86239de225e7e408d972825a324fa2..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/977bab5f-8992-4a30-bf29-7a07cc969b94.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/NB-01" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "977bab5f-8992-4a30-bf29-7a07cc969b94" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9851586b-5496-4891-bea1-31d9c779ac26.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9851586b-5496-4891-bea1-31d9c779ac26.json deleted file mode 100644 index 26daf7e2a3de6a1582e4d596959df4f6ef60bee0..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9851586b-5496-4891-bea1-31d9c779ac26.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/NB-16-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "9851586b-5496-4891-bea1-31d9c779ac26" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9901aa36-802c-4c97-a313-a7e1f727d935.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9901aa36-802c-4c97-a313-a7e1f727d935.json deleted file mode 100644 index dc6f4f0bd4a396521781cf15d764a33cbe876fb0..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9901aa36-802c-4c97-a313-a7e1f727d935.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/NB-05" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "9901aa36-802c-4c97-a313-a7e1f727d935" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/99d83a86-aa5b-4ece-8339-bba44fa734ce.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/99d83a86-aa5b-4ece-8339-bba44fa734ce.json deleted file mode 100644 index cd96df2ba4a5f72f67c359e2bc790768a7b47d3e..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/99d83a86-aa5b-4ece-8339-bba44fa734ce.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/NB-01-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "99d83a86-aa5b-4ece-8339-bba44fa734ce" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9c218065-a932-4246-a9da-9a7af1b21ee2.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9c218065-a932-4246-a9da-9a7af1b21ee2.json deleted file mode 100644 index c3186f73f199c75189f44c8a039f931fdf584d62..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9c218065-a932-4246-a9da-9a7af1b21ee2.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/NB-13-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "9c218065-a932-4246-a9da-9a7af1b21ee2" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9c2477ca-1045-40df-8df3-2bc2a2dbe5dc.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9c2477ca-1045-40df-8df3-2bc2a2dbe5dc.json deleted file mode 100644 index 51c532e3f497229b7fb364ea7e9f7163384ae617..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9c2477ca-1045-40df-8df3-2bc2a2dbe5dc.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/NB-07" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "9c2477ca-1045-40df-8df3-2bc2a2dbe5dc" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9c48f3c4-837d-4a21-8cf8-623e60c494de.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9c48f3c4-837d-4a21-8cf8-623e60c494de.json deleted file mode 100644 index bbc84c07cb645d6fbe8232f26117be43b4964698..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9c48f3c4-837d-4a21-8cf8-623e60c494de.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/S-DATA/NB-02" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "9c48f3c4-837d-4a21-8cf8-623e60c494de" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9cccead1-046a-49e6-9d2e-00cf8084ae28.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9cccead1-046a-49e6-9d2e-00cf8084ae28.json deleted file mode 100644 index 601d5f8510f1f17b21b728954180c8722a705329..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9cccead1-046a-49e6-9d2e-00cf8084ae28.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "\nExceptional Behavior<\/font><\/a>" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "9cccead1-046a-49e6-9d2e-00cf8084ae28" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9d5b8cf4-5ea7-4906-9c87-65ac02296914.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9d5b8cf4-5ea7-4906-9c87-65ac02296914.json deleted file mode 100644 index 8997b70ab95a0c67f1b5f2655647727aba605795..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/9d5b8cf4-5ea7-4906-9c87-65ac02296914.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/S-DATA/NB-11" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "9d5b8cf4-5ea7-4906-9c87-65ac02296914" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/a13876b5-9272-4858-b436-db9c3a907543.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/a13876b5-9272-4858-b436-db9c3a907543.json deleted file mode 100644 index d5d244812a61d510a9864572dd5bf3a0bca058bb..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/a13876b5-9272-4858-b436-db9c3a907543.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/NB-07" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "a13876b5-9272-4858-b436-db9c3a907543" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/a3e041ab-aa3d-4254-95fc-ebca16adb99c.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/a3e041ab-aa3d-4254-95fc-ebca16adb99c.json deleted file mode 100644 index 8c3da66118e0549b34537952bb49f5b3b081ff1c..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/a3e041ab-aa3d-4254-95fc-ebca16adb99c.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/EB-09" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "a3e041ab-aa3d-4254-95fc-ebca16adb99c" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/a403fa2b-948c-44c2-bc8b-72ca4f84606e.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/a403fa2b-948c-44c2-bc8b-72ca4f84606e.json deleted file mode 100644 index 12f29c2c68245805dde1ce913aef9fee687c4184..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/a403fa2b-948c-44c2-bc8b-72ca4f84606e.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/EB-12-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "a403fa2b-948c-44c2-bc8b-72ca4f84606e" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/a6b7d90a-bc10-47d1-8342-b6c91bac83a6.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/a6b7d90a-bc10-47d1-8342-b6c91bac83a6.json deleted file mode 100644 index 4aca1ceb1ac0bd31fa67a28233ec75a414520851..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/a6b7d90a-bc10-47d1-8342-b6c91bac83a6.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/EB-08" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "a6b7d90a-bc10-47d1-8342-b6c91bac83a6" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/aa4ed425-8e3a-4571-b4ca-51841077309e.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/aa4ed425-8e3a-4571-b4ca-51841077309e.json deleted file mode 100644 index 6a76f15532be6bbe5ca2ee6b07264dd8f2418b77..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/aa4ed425-8e3a-4571-b4ca-51841077309e.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/EB-15-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "aa4ed425-8e3a-4571-b4ca-51841077309e" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/af9de568-64c8-47d6-9778-2c723e51e209.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/af9de568-64c8-47d6-9778-2c723e51e209.json deleted file mode 100644 index 7ae08d5efecaeafba73601f8fcbdfcd9074a2424..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/af9de568-64c8-47d6-9778-2c723e51e209.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/EB-05-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "af9de568-64c8-47d6-9778-2c723e51e209" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/b3966dfb-628a-4b5b-bdd5-a89f8823820a.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/b3966dfb-628a-4b5b-bdd5-a89f8823820a.json deleted file mode 100644 index 71865f016baee12ebe517cc8b58f79294cf40ab3..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/b3966dfb-628a-4b5b-bdd5-a89f8823820a.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/NB-02-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "b3966dfb-628a-4b5b-bdd5-a89f8823820a" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/b3a65a13-bc9b-4d69-b77c-643205d9d888.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/b3a65a13-bc9b-4d69-b77c-643205d9d888.json deleted file mode 100644 index 6c94f841182a9b8096ba62d0dd2aae3b3f7b8a59..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/b3a65a13-bc9b-4d69-b77c-643205d9d888.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/EB-21" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "b3a65a13-bc9b-4d69-b77c-643205d9d888" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/b44017ee-61e4-4aae-bf8e-3f7d39b086e9.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/b44017ee-61e4-4aae-bf8e-3f7d39b086e9.json deleted file mode 100644 index 090605ce0a1a53e3203b11a0e827c1a4e2c60fae..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/b44017ee-61e4-4aae-bf8e-3f7d39b086e9.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Enrolment Request Error acceptance<\/font>" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "b44017ee-61e4-4aae-bf8e-3f7d39b086e9" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/b4a3bb1c-9c76-4f66-afa2-11bd82a892bd.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/b4a3bb1c-9c76-4f66-afa2-11bd82a892bd.json deleted file mode 100644 index 0dd28e6e8b6f76027917beb0c81aa8e08fa19d02..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/b4a3bb1c-9c76-4f66-afa2-11bd82a892bd.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/NB-14" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "b4a3bb1c-9c76-4f66-afa2-11bd82a892bd" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/bed699c8-cfa1-4152-a631-28a2e82d1b9c.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/bed699c8-cfa1-4152-a631-28a2e82d1b9c.json deleted file mode 100644 index dade50848a8359145bf68378b3fadc08fced16d4..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/bed699c8-cfa1-4152-a631-28a2e82d1b9c.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/S-DATA/NB-13" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "bed699c8-cfa1-4152-a631-28a2e82d1b9c" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/bf2bd6cc-f807-429f-9948-5bad1b4e0ea9.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/bf2bd6cc-f807-429f-9948-5bad1b4e0ea9.json deleted file mode 100644 index cb6d752ba4a81f0c4304350716b2ca43e86f20b3..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/bf2bd6cc-f807-429f-9948-5bad1b4e0ea9.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/S-DATA/NB-03" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "bf2bd6cc-f807-429f-9948-5bad1b4e0ea9" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/c3c8c40e-5ebd-4268-850b-f65b2484bafa.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/c3c8c40e-5ebd-4268-850b-f65b2484bafa.json deleted file mode 100644 index 0516dc4051a736fac3f68f46c8f8249ac7a75219..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/c3c8c40e-5ebd-4268-850b-f65b2484bafa.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/EB-06" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "c3c8c40e-5ebd-4268-850b-f65b2484bafa" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/c6a468af-3558-4f2a-b201-6301a5d33fe3.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/c6a468af-3558-4f2a-b201-6301a5d33fe3.json deleted file mode 100644 index e209e7ab1cbf231d251313f26ebab0762cac866f..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/c6a468af-3558-4f2a-b201-6301a5d33fe3.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/EB-05" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "c6a468af-3558-4f2a-b201-6301a5d33fe3" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/ca1378f0-9f6a-4d34-b9e7-5d7190f0a9c1.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/ca1378f0-9f6a-4d34-b9e7-5d7190f0a9c1.json deleted file mode 100644 index 8bd375dc66be199e3c2f0c2b93972d5b3e2a444c..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/ca1378f0-9f6a-4d34-b9e7-5d7190f0a9c1.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/EB-03" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "ca1378f0-9f6a-4d34-b9e7-5d7190f0a9c1" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/ce56005f-4f7e-4a95-b7a8-75d5611fbc8f.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/ce56005f-4f7e-4a95-b7a8-75d5611fbc8f.json deleted file mode 100644 index 5b7c38f30eef20c30637191e7827cda7733bdddd..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/ce56005f-4f7e-4a95-b7a8-75d5611fbc8f.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/NB-01" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "ce56005f-4f7e-4a95-b7a8-75d5611fbc8f" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/d1ad5a26-2109-4276-aa2b-395250f679fa.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/d1ad5a26-2109-4276-aa2b-395250f679fa.json deleted file mode 100644 index 98d6126e753be7c8e76020181bf23d41a09a4f6f..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/d1ad5a26-2109-4276-aa2b-395250f679fa.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/S-DATA/NB-14" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "d1ad5a26-2109-4276-aa2b-395250f679fa" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/d51fc116-5b0d-41db-bc1e-16f44c112b87.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/d51fc116-5b0d-41db-bc1e-16f44c112b87.json deleted file mode 100644 index 91781723ced1a35ee9207a3496bf5aa4d1a7c5eb..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/d51fc116-5b0d-41db-bc1e-16f44c112b87.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/EB-16" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "d51fc116-5b0d-41db-bc1e-16f44c112b87" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/d52ff94e-2dd5-450c-940d-d7edcb66f8a7.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/d52ff94e-2dd5-450c-940d-d7edcb66f8a7.json deleted file mode 100644 index bf362bc5ec1b3bdba38e8f3962027e349797c24d..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/d52ff94e-2dd5-450c-940d-d7edcb66f8a7.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/NB-07-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "d52ff94e-2dd5-450c-940d-d7edcb66f8a7" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/d730e6a9-978a-4118-a87e-17aa26a81a7f.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/d730e6a9-978a-4118-a87e-17aa26a81a7f.json deleted file mode 100644 index fed7b478e638add202b5483448008c98c7a3110c..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/d730e6a9-978a-4118-a87e-17aa26a81a7f.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/NB-13" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "d730e6a9-978a-4118-a87e-17aa26a81a7f" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/d7b499a1-2e5b-4f04-a837-48172874178b.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/d7b499a1-2e5b-4f04-a837-48172874178b.json deleted file mode 100644 index 31107a8daf06079c4c5d567e04c71d762d4b24a0..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/d7b499a1-2e5b-4f04-a837-48172874178b.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/NB-04" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "d7b499a1-2e5b-4f04-a837-48172874178b" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/d825d32c-1929-4a67-9c21-0b558cff5644.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/d825d32c-1929-4a67-9c21-0b558cff5644.json deleted file mode 100644 index 6b76187fb989c638c88ed9add1f2a74c551f558a..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/d825d32c-1929-4a67-9c21-0b558cff5644.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/EB-02-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "d825d32c-1929-4a67-9c21-0b558cff5644" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/dc7a7060-fe4e-4af0-89b5-0fdf66144be0.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/dc7a7060-fe4e-4af0-89b5-0fdf66144be0.json deleted file mode 100644 index 67ead215429659d0f774a5d653612b618c96a3af..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/dc7a7060-fe4e-4af0-89b5-0fdf66144be0.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/NB-03" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "dc7a7060-fe4e-4af0-89b5-0fdf66144be0" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/e0d78e08-4c86-4a92-a5a8-e72e8568b553.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/e0d78e08-4c86-4a92-a5a8-e72e8568b553.json deleted file mode 100644 index 7e2b745df6a45b7900a9afc5e65ab16fc761a1ef..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/e0d78e08-4c86-4a92-a5a8-e72e8568b553.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/EB-26" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "e0d78e08-4c86-4a92-a5a8-e72e8568b553" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/e1c4a29d-598e-4fac-99ba-bc7d858e649b.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/e1c4a29d-598e-4fac-99ba-bc7d858e649b.json deleted file mode 100644 index 7e61c0b49ff8b825ae6760b8e34cdf46e3082d49..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/e1c4a29d-598e-4fac-99ba-bc7d858e649b.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/EB-13" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "e1c4a29d-598e-4fac-99ba-bc7d858e649b" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/e20e9796-7b2c-49a6-90a1-4aff1ad1eddc.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/e20e9796-7b2c-49a6-90a1-4aff1ad1eddc.json deleted file mode 100644 index 767fc01a6060d6e84f1bd8ab31c36be223f4b41f..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/e20e9796-7b2c-49a6-90a1-4aff1ad1eddc.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/EB-21" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "e20e9796-7b2c-49a6-90a1-4aff1ad1eddc" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/e55978bd-4bf8-4a52-90c8-80ba82d61fcf.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/e55978bd-4bf8-4a52-90c8-80ba82d61fcf.json deleted file mode 100644 index 56454d177f0f5bf357f783966f4026a3b4313a28..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/e55978bd-4bf8-4a52-90c8-80ba82d61fcf.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/NB-06" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "e55978bd-4bf8-4a52-90c8-80ba82d61fcf" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/e73131b6-e236-4ae4-bd2c-8e6613da6a08.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/e73131b6-e236-4ae4-bd2c-8e6613da6a08.json deleted file mode 100644 index f80f65cd2288cca55af1bf10f7fe4c6d5b3dfc74..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/e73131b6-e236-4ae4-bd2c-8e6613da6a08.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/EB-04" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "e73131b6-e236-4ae4-bd2c-8e6613da6a08" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/ec7d4dd7-3907-4a82-9e65-afb4f4d599c3.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/ec7d4dd7-3907-4a82-9e65-afb4f4d599c3.json deleted file mode 100644 index 4bdbd8ef8fbca3866ef47d59e5e24de272cf7558..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/ec7d4dd7-3907-4a82-9e65-afb4f4d599c3.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/NB-15" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "ec7d4dd7-3907-4a82-9e65-afb4f4d599c3" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/eca966da-aac3-432f-8184-745fc3f5d1a6.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/eca966da-aac3-432f-8184-745fc3f5d1a6.json deleted file mode 100644 index db8b5265ff4c5471248cb41a19b0e44e906d2bdf..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/eca966da-aac3-432f-8184-745fc3f5d1a6.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/EB-07" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "eca966da-aac3-432f-8184-745fc3f5d1a6" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/edaa35e7-3f72-4d1e-be64-c23b587b4b96.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/edaa35e7-3f72-4d1e-be64-c23b587b4b96.json deleted file mode 100644 index 2eadd481a27f83c35dafdc548720fdd02da90019..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/edaa35e7-3f72-4d1e-be64-c23b587b4b96.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/NB-11" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "edaa35e7-3f72-4d1e-be64-c23b587b4b96" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/f048c77e-d8f6-4ee6-b5e3-018bc5b05ac1.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/f048c77e-d8f6-4ee6-b5e3-018bc5b05ac1.json deleted file mode 100644 index daaf6d039096a6a32952b400df2fbcbfcf2257f0..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/f048c77e-d8f6-4ee6-b5e3-018bc5b05ac1.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/NB-04" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "f048c77e-d8f6-4ee6-b5e3-018bc5b05ac1" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/f1eea41a-baa3-4fa2-8605-893a328b1138.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/f1eea41a-baa3-4fa2-8605-893a328b1138.json deleted file mode 100644 index 7b9444787a8502243c069d021171c6a237ede5df..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/f1eea41a-baa3-4fa2-8605-893a328b1138.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "

      <\/font>\n<\/b>\n<\/p>\n<\/td>\t\n

      \n\nTP/SEC/ITS-S/ENR/NB-06<\/font><\/b><\/p><\/td>" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "f1eea41a-baa3-4fa2-8605-893a328b1138" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/f557e3d6-87e8-47f3-a468-7324d5b0d176.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/f557e3d6-87e8-47f3-a468-7324d5b0d176.json deleted file mode 100644 index 692205bbd2c0ee942a0b1c8dcd4d43ff5e37dfb1..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/f557e3d6-87e8-47f3-a468-7324d5b0d176.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Receiving Data<\/font>" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "f557e3d6-87e8-47f3-a468-7324d5b0d176" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/fa6370ea-bedb-47a6-91e3-3a28450e499d.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/fa6370ea-bedb-47a6-91e3-3a28450e499d.json deleted file mode 100644 index 8994f9f7b9260f4589f04939d6028d1fe5d93119..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/fa6370ea-bedb-47a6-91e3-3a28450e499d.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/R-DATA/EB-04" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "fa6370ea-bedb-47a6-91e3-3a28450e499d" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/fb006c85-0644-4a79-81b9-4f102ed3edad.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/fb006c85-0644-4a79-81b9-4f102ed3edad.json deleted file mode 100644 index dd0a6dc98c7da195d3bbe5d4b1af0fda0459c47b..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/fb006c85-0644-4a79-81b9-4f102ed3edad.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/S-DATA/NB-09" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "fb006c85-0644-4a79-81b9-4f102ed3edad" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/fba1d958-c348-4938-93f5-9471ead78756.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/fba1d958-c348-4938-93f5-9471ead78756.json deleted file mode 100644 index bb1bd4ad9b229e4c7616dbb45b3f8754a816228e..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/fba1d958-c348-4938-93f5-9471ead78756.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/ENR/EB-14-X" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "fba1d958-c348-4938-93f5-9471ead78756" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/fc0460da-e96f-43a9-83d1-bec46d2ce2ac.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/fc0460da-e96f-43a9-83d1-bec46d2ce2ac.json deleted file mode 100644 index 87330f94ebc79450ed774103e34a2d0b2a615664..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/fc0460da-e96f-43a9-83d1-bec46d2ce2ac.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/NB-08" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "fc0460da-e96f-43a9-83d1-bec46d2ce2ac" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/fda3aab5-467a-4812-a900-590e7fb99316.json b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/fda3aab5-467a-4812-a900-590e7fb99316.json deleted file mode 100644 index cef07a1d55ce58e23224a14f731109928129eabd..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml/fda3aab5-467a-4812-a900-590e7fb99316.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "TP/SEC/ITS-S/AUTH/EB-11" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Location" - } - }, - "uuid": "fda3aab5-467a-4812-a900-590e7fb99316" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml_resources/TS103096-02.xhtml b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml_resources/TS103096-02.xhtml deleted file mode 100644 index e0c65e90ab05b2cacb8035a34a1d5cef771fa305..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml_resources/TS103096-02.xhtml +++ /dev/null @@ -1,41204 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ETSI TS 103 096-2 V1.1.1 - - -

      - - ETSI TS 103 096-2 V1.1.1 - (2013-07) - - - - - - - - -

      -

      - - Intelligent Transport Systems (ITS);
      -
      -
      -

      -

      - - Testing;
      -
      -
      -

      -

      - - Conformance test specification for TS 102 867 and TS 102 941; - -

      -

      - - Part 2: Test Suite Structure and Test Purposes (TSS&TP) - -

      -

      -

      -

      -

      -

      -

      -

      -

      -

      -

      -

      - - Technical Specification - -

      -

      - -

      -

      - Reference
      -
      -

      -

      - DTS/ITS-0050019 -

      -

      - Keywords
      -
      -

      -

      - ITS, testing, TSS&TP -

      -

      -

      - - - ETSI
      -
      -
      -
      -

      -

      - 650 Route des Lucioles
      -
      -

      -

      - F-06921 Sophia Antipolis Cedex - FRANCE -

      -

      -

      - Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
      -
      -

      -

      -

      - Siret N° 348 623 562 00017 - NAF 742 C
      -
      -

      -

      - Association à but non lucratif enregistrée à la
      -
      -

      -

      - Sous-Préfecture de Grasse (06) N° 7803/88
      -
      -

      -

      -

      -

      -

      - - - Important notice
      -
      -
      -
      -

      -

      - Individual copies of the present document can be downloaded from:
      - http://www.etsi.org -
      -

      -

      - The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat.
      -
      -

      -

      - Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp - -

      -

      - If you find errors in the present document, please send your comment to one of the following services:
      - http://portal.etsi.org/chaircor/ETSI_support.asp -
      -

      -

      - - - Copyright Notification
      -
      -
      -
      -

      -

      - No part may be reproduced except as authorized by written permission.
      The copyright and the foregoing restriction extend to reproduction in all media.
      -

      -

      -

      - © European Telecommunications Standards Institute 2013.
      -
      -

      -

      - All rights reserved.
      -
      -

      -

      - - DECT - - - TM - - , PLUGTESTS - TM, UMTS - TM and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members.
      - 3GPP - TM and LTE™ are Trade Marks of ETSI registered for the benefit of its Members and
      of the 3GPP Organizational Partners.
      - GSM® and the GSM logo are Trade Marks registered and owned by the GSM Association.
      -
      -

      -

      - -

      -

      - Contents
      -
      -

      -

      - Intellectual Property Rights5 -

      -

      - Foreword5 -

      -

      - 1Scope6 -

      -

      - 2References6 -

      -

      - 2.1Normative references6 -

      -

      - 2.2Informative references7 -

      -

      - 3Definitions and abbreviations7 -

      -

      - 3.1Definitions7 -

      -

      - 3.2Abbreviations7 -

      -

      - 4Prerequisites and Test Configurations7 -

      -

      - 4.1Test Configurations7 -

      -

      - 4.2PKI Hierarchy9 -

      -

      - 4.3Feature Restriction and Pre-Enrolment10 -

      -

      - 4.3.1Feature Restriction10 -

      -

      - 4.3.2Pre-Enrolment11 -

      -

      - 4.4States in Initial Conditions12 -

      -

      - 4.4.1ITS-S send side states12 -

      -

      - 4.4.2ITS-S receive side states12 -

      -

      - 4.4.3EA states12 -

      -

      - 4.4.4AA states12 -

      -

      - 4.5Validity of Signed Communication12 -

      -

      - 4.6Introduction of Snippets of Data Structures12 -

      -

      - 4.7Variants, Variables and Snippet Naming Convention13 -

      -

      - 5Test Suite Structure (TSS)13 -

      -

      - 5.1Structure for Security tests13 -

      -

      - 5.2Test groups14 -

      -

      - 5.2.1Root14 -

      -

      - 5.2.2Groups14 -

      -

      - 5.2.3Sub groups14 -

      -

      - 5.2.4Categories14 -

      -

      - 6Test Purposes (TP)14 -

      -

      - 6.1Introduction14 -

      -

      - 6.1.1TP definition conventions14 -

      -

      - 6.1.2TP Identifier naming conventions15 -

      -

      - 6.1.3Rules for the behaviour description15 -

      -

      - 6.1.4Sources of TP definitions15 -

      -

      - 6.1.5Mnemonics for PICS reference15 -

      -

      - 6.1.6Message encapsulation17 -

      -

      - 6.1.7Used constants18 -

      -

      - 6.1.8Snippets definitions19 -

      -

      - 6.1.8.1Regions19 -

      -

      - 6.1.8.2Certificates19 -

      -

      - 6.1.8.2.1Authorities certificates - 19 - -

      -

      - 6.1.8.2.2End-Entities certificates - 22 - -

      -

      - 6.1.8.3Messages - 25 - -

      -

      - 6.1.8.3.1ITS station testing - 25 - -

      -

      - 6.1.8.3.2Enrolment Authority testing - 28 - -

      -

      - 6.1.8.3.3Authorization Authority testing - 29 - -

      -

      - 6.2Test purposes for SECURITY31 -

      -

      - 6.2.1ITS Station31 -

      -

      - 6.2.1.1Enrolment31 -

      -

      - 6.2.1.1.1Normal Behaviour31 -

      -

      - 6.2.1.1.2Exceptional Behavior40 -

      -

      - 6.2.1.2Authorization47 -

      -

      - 6.2.1.2.1Normal Behavior47 -

      -

      - 6.2.1.2.2Exceptional Behavior54 -

      -

      - 6.2.1.3Sending Data66 -

      -

      - 6.2.1.4Receiving Data73 -

      -

      - 6.2.1.4.1Normal Behavior73 -

      -

      - 6.2.1.4.2Exceptional behavior77 -

      -

      - 6.2.2Certificate Authority91 -

      -

      - 6.2.2.1Normal Behavior91 -

      -

      - 6.2.2.1.1Generic message verification91 -

      -

      - 6.2.2.1.2Key Compression94 -

      -

      - 6.2.2.1.3Permissions95 -

      -

      - 6.2.2.1.4Expiration97 -

      -

      - 6.2.2.1.5Regions99 -

      -

      - 6.2.2.2Exceptional Behavior100 -

      -

      - 6.2.2.2.1Invalid Message Fields100 -

      -

      - 6.2.2.2.2Invalid Certificate or Certificate Chain103 -

      -

      - 6.2.2.2.3Invalid Certificate Fields107 -

      -

      - 6.2.2.2.4Invalid Permissions110 -

      -

      - 6.2.2.2.5Invalid Regions113 -

      -

      - 6.2.2.2.6Expiration114 -

      -

      - 6.2.3Enrolment Authority116 -

      -

      - 6.2.3.1Normal Behavior116 -

      -

      - 6.2.3.2Exceptional Behavior116 -

      -

      - 6.2.4Authorization Authority118 -

      -

      - 6.2.4.1Normal Behavior118 -

      -

      - 6.2.4.1.1Scopes (Scope Kind and Scope Name)118 -

      -

      - 6.2.4.1.2Expiration120 -

      -

      - 6.2.4.2Exceptional Behavior121 -

      -

      - 6.2.4.2.1Invalid Certificates or Certificate Chain Fields121 -

      -

      - 6.2.4.2.2Invalid Scopes (Subject Type and Scope Name)122 -

      -

      - History123 -

      -

      -

      - -

      -

      - - Intellectual Property Rights
      -
      -
      -

      -

      - IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http://ipr.etsi.org).
      -
      -

      -

      - Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document.
      -
      -

      -

      - - Foreword
      -
      -
      -

      -

      - This Technical Specification (TS) has been produced by ETSI Technical Committee Intelligent Transport Systems (ITS). -

      -

      - The present document is part 2 of a multi-part deliverable covering Conformance test specification for ITS Security as identified below:
      -
      -

      -

      - TS 103 096-1:"Protocol Implementation Conformance Statement (PICS)";
      -
      -

      -

      - - TS 103 096-2:"Test Suite Structure and Test Purposes (TSS&TP)";
      -
      -
      -

      -

      - TS 103 096-3:"Abstract Test Suite (ATS) and Protocol Implementation eXtra Information for Testing (PIXIT)"; -

      -

      - TR 103 096-4:"Validation report". -

      -

      - -

      -

      - - 1Scope
      -
      -
      -

      -

      - The present document provides the Test Suite Structure and Test Purposes (TSS&TP) for Security as defined in
      IEEE P 1609.2 [1], TS 102 941 [2] and TS 102 867 [3] in compliance with the relevant requirements and in accordance with the relevant guidance given in ISO/IEC 9646‑7 [9].
      -
      -

      -

      - The ISO standard for the methodology of conformance testing (ISO/IEC 9646‑1 [6] and ISO/IEC 9646‑2 [7]) as well as the ETSI rules for conformance testing (ETS 300 406 [10]) are used as a basis for the test methodology.
      -
      -

      -

      - - 2 - References
      -
      -
      -
      -

      -

      - References are either specific (identified by date of publication and/or edition number or version number) or non‑specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies.
      -
      -

      -

      - Referenced documents which are not found to be publicly available in the expected location might be found at http://docbox.etsi.org/Reference.
      -
      -

      -

      - NOTE:While any hyperlinks included in this clause were valid at the time of publication ETSI cannot guarantee their long term validity. -

      -

      - - 2.1Normative references
      -
      -
      -

      -

      - The following referenced documents are necessary for the application of the present document.
      -
      -

      -

      - [1]IEEE P1609.2/D12 (January 2012): "IEEE Draft Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages. -

      -

      - [2]ETSI TS 102 941: "Intelligent Transport Systems (ITS); Security; Trust and Privacy Management". -

      -

      - [3]ETSI TS 102 867: "Intelligent Transport Systems (ITS); Security; Stage 3 mapping for IEEE 1609.2". - -

      -

      - [4]ETSI TS 103 096-1 (V1.1.1): "Intelligent Transport Systems (ITS); Testing; Conformance test specification for TS 102 867 and TS 102 941; Part 1: Protocol Implementation Conformance Statement (PICS)". - -

      -

      - [5]ETSI TS 103 096-3 (V1.1.1): "Intelligent Transport Systems (ITS); Testing; Conformance test specification for TS 102 867 and TS 102 941; Part 3: Abstract Test Suite (ATS) and Protocol Implementation eXtra Information for Testing (PIXIT)". -

      -

      - [6]ISO/IEC 9646-1 (1994): "Information technology -- Open Systems Interconnection -- Conformance testing methodology and framework -- Part 1: General concepts". - -

      -

      - [7]ISO/IEC 9646-2 (1994): "Information technology -- Open Systems Interconnection -- Conformance testing methodology and framework -- Part 2: Abstract Test Suite specification". -

      -

      - [8]ISO/IEC 9646-6 (1994): "Information technology -- Open Systems Interconnection -- Conformance testing methodology and framework -- Part 6: Protocol profile test specification". -

      -

      - [9]ISO/IEC 9646-7 (1995): "Information technology -- Open Systems Interconnection -- Conformance testing methodology and framework -- Part 7: Implementation Conformance Statements". - -

      -

      - [10]ETSI ETS 300 406 (1995): "Methods for testing and Specification (MTS); Protocol and profile conformance testing specifications; Standardization methodology". -

      -

      - - 2.2Informative references
      -
      -
      -

      -

      - The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area.
      -
      -

      -

      - [i.1]ETSI EG 202 798: "Intelligent Transport Systems (ITS); Testing; Framework for conformance and interoperability testing". -

      -

      - - 3Definitions and abbreviations
      -
      -
      -

      -

      - - 3.1Definitions
      -
      -
      -

      -

      - For the purposes of the present document, the following terms and definitions apply:
      -
      -

      -
        -

        -

      • - terms given in IEEE 1609.2 [1], TS 102 941 [2] and in TS 102 867 [3];
        -
        -
      • -

        -

        -

      • - terms given in ISO/IEC 9646‑6 [8] and in ISO/IEC 9646‑7 [9].
        -
        -
      • -

        -
      -

      - - 3.2Abbreviations
      -
      -
      -

      -

      - For the purposes of the present document, the following abbreviations apply:
      -
      -

      -

      - AAAuthorization Authority
      -
      -

      -

      - BVNormal behaviour
      -
      -

      -

      - CACertification Authority
      -
      -

      -

      - CAMCooperative Awareness Message
      -
      -

      -

      - CRLCertificate Revocation List
      -
      -

      -

      - CSRCertificate Signing Request
      -
      -

      -

      - DENMDecentralized Environmental Notification Message -

      -

      - EAEnrolment Authority
      -
      -

      -

      - EBExceptional Behavior
      -
      -

      -

      - ITSIntelligent Transport System
      -
      -

      -

      - ITS-AIDITS Application ID
      -
      -

      -

      - ITS-SITS Station
      -
      -

      -

      - IUTImplementation Under Test
      -
      -

      -

      - MSECMulticast Security
      -
      -

      -

      - PKIPublic Key Infrastructure
      -
      -

      -

      - PSIDProvider Service Identifier
      -
      -

      -

      - SASecurity Association
      -
      -

      -

      - SSPService Specific Permissions
      -
      -

      -

      - TLSTransport Layer Security
      -
      -

      -

      - TPTest Purposes
      -
      -

      -

      - TSSTest Suite Structure -

      -

      - - 4 - Prerequisites and Test Configurations
      -
      -
      -
      -

      -

      - - 4.1 - Test Configurations - - -

      -

      - The test configuration 1 as shown in figure 1 is applied for the test group of CA and EA tests.
      -
      -

      -

      - image6.jpg -

      -

      - - Figure 1: Test Configuration 1 - -

      -

      - The test configuration 2 as shown in figure 2 is applied for the test group of CA and AA tests. -

      -

      - image2.emf -

      -

      - - Figure 2: Test Configuration 2 - -

      -

      - The test configuration 3 as shown in figure 3 is applied for the test group of ITS-S Enrolment and Authorization tests.
      -
      -

      -

      - image3.emf -

      -

      - - Figure 3: Test Configuration 3 - -

      -

      - The test configuration 4 as shown in figure 4 is applied for the test group of ITS-S Send and Receive Data tests.
      -
      -

      -

      - image4.emf -

      -

      - - Figure 4: Test Configuration 4 - -

      -

      - - 4.2 - PKI Hierarchy
      -
      -
      -
      -

      -

      - The PKI Hierarchy is depicted below. Four different types of certificates are defined. They are listed hereafter.
      -
      -

      -
        -

        -

      • - CERT_ROOT
        -
        -
      • -

        -

        -

      • - CERT_EA_x
        -
        -
      • -

        -

        -

      • - CERT_AA_x
        -
        -
      • -

        -

        -

      • - CERT_ENR_x
        -
        -
      • -

        -

        -

      • - CERT_AUTH_x
        -
        -
      • -

        -
      -

      - These names are used in the TP definitions, where _x is a placeholder for numbering different certificates. -

      -

      - image5.emf -

      -

      - - Figure 5: PKI Hierarchy
      -
      -
      -

      -

      - - 4.3Feature Restriction and Pre-Enrolment
      -
      -
      -

      -

      - - 4.3.1Feature Restriction
      -
      -
      -

      -

      - In this clause all feature restrictions are listed: -

      -
        -

        -

      • - Certificate chains where subordinate certificates make use of inherited permissions are not supported -
      • -

        -

        -

      • - Only circular regions
        -
        -
      • -

        -

        -

      • - Only explicit certificates
        -
        -
      • -

        -

        -

      • - Revocation is not tested, i.e. certificate responses contain only empty revocation list
        -
        -
      • -

        -

        -

      • - Update Enrolment Credentials is not tested
        -
        -
      • -

        -

        -

      • - Remove Enrolment Credentials is not tested
        -
        -
      • -

        -

        -

      • - Update Authorization Tickets is not tested
        -
        -
      • -

        -

        -

      • - The name which identifies the CA shall be no longer that 32 bytes
        -
        -
      • -

        -
      -

      - - 4.3.2Pre-Enrolment
      -
      -
      -

      -

      - Enrolment is the process by which an ITS-S obtains an enrolment certificate, which can later be used to authenticate requests for authorization certificates. An ITS-S undergoes initial enrolment by executing the Enrolment Request information flow from TS 102 941 [2].
      -
      -

      -

      - When devices enrol with an Enrolment Authority, they should be authenticated as devices that are entitled to receive enrolment credentials of the type requested. There are two three different authentication approaches:
      -
      -

      -
        -

        -

      • - Public key: Enrolment requests are authenticated by using a private key of the ITS-S. The corresponding public key is previously registered with a unique ITS-S module ID at the EA in a secure process. Every ITS-S has to be registered separately.
        -
        -
      • -

        -

        -

      • - Certificate: Enrolment requests are authenticated by a certificate or certificate chain.
        -
        -
      • -

        -

        -

      • - Self-signed: Enrolment requests are signed by the public key contained in the enrolment request. In this case the signature provides proof of possession of the corresponding private key, but does not authenticate that the private key holder is in fact authorized to receive an enrolment credential of the type requested. This authorization is provided by other mechanisms.
        -
        -
      • -

        -
      -

      - None of the three authentication approaches start at the device lifecycle: in all cases, there is the question of how the device is originally shown to be authenticated. The test system supports both the certificate and the self-signed forms of enrolment request.
      -
      -

      -

      - For enrolment request:
      -
      -

      -
        -

        -

      • - The test system enrolment authority shall accept the following forms of authorization, certificate and self-signed.
        -
        -
      • -

        -

        -

      • - The test system enrolment authority shall check that the signature on the enrolment request is cryptographically valid.
        -
        -
      • -

        -

        -

      • - In the case of an enrolment request signed by a certificate:
        -
        -
      • -

        -
      -
        -

        -

      • - The test system enrolment authority shall check that the request is consistent with the permissions in the certificate.
        -
        -
      • -

        -

        -

      • - The test system enrolment authority shall not carry out any other validation on the signing certificate. For example, it shall not check the signature on the signing certificate, check that the certificate chains back to a known CA, or check whether the signing certificate is revoked.
        -
        -
      • -

        -
      -

      - The test system enrolment authority shall issue the enrolment certificate if these validity tests pass.
      -
      -

      -

      - From the perspective of the IUT, this has the following consequences:
      -
      -

      -
        -

        -

      • - Certificate: The IUT shall be provisioned with a certificate to authenticate enrolment before testing begins (a pre-enrolment certificate).
        -
        -
      • -

        -
      -
        -

        -

      • - The supplier shall provide instructions as to how to reset the IUT to a state where it has the pre-enrolment certificate but not the enrolment certificate, to allow the enrolment flow to be run multiple times.
        -
        -
      • -

        -

        -

      • - The supplier shall chose between two options:
        -
        -
      • -

        -
      -
        -

        -

      • - The test system generates private key and public certificate for the device. -
      • -

        -

        -

      • - The supplier generates a private key and sends a certificate signing request to the test system. -
      • -

        -
      -
        -

        -

      • - Self-signed: The IUT supplier shall provide instructions as to how to set the IUT into a state where it will request enrolment with a self-signed request.
        -
        -
      • -

        -
      -

      - - 4.4States in Initial Conditions
      -
      -
      -

      -

      - Each TP contains an initial condition. The initial condition defines in which initial state the IUT has to be to apply the actual TP. In the corresponding Test Case, when the execution of the initial condition does not
      -
      -

      -

      - succeed, it leads to the assignment of an Inconclusive verdict. This clause defines the different initial states of the IUT.
      -
      -

      -

      - - 4.4.1ITS-S send side states
      -
      -
      -

      -
        -

        -

      • - Not enrolled state: ITS-S has all info necessary to send an EnrolmentRequest but does not have any Enrolment credentials yet
        -
        -
      • -

        -

        -

      • - Awaiting EnrolmentResponse state: ITS-S has sent an EnrolmentRequest and is waiting for an EnrolmentResponse
        -
        -
      • -

        -

        -

      • - Enrolled, but not authorized state: ITS-S has received EnrolmentResponse and is able to send AuthorizationRequest
        -
        -
      • -

        -

        -

      • - Awaiting AuthorizationResponse state: ITS-S has sent an AuthorizationRequest and is waiting for an AuthorizationResponse
        -
        -
      • -

        -

        -

      • - Authorized state: ITS-S has received a successful AuthorizationResponse
        -
        -
      • -

        -
      -

      - - 4.4.2ITS-S receive side states
      -
      -
      -

      -
        -

        -

      • - Operational state: ITS-S has the root certificate and is ready to receive messages
        -
        -
      • -

        -
      -

      - - 4.4.3EA states
      -
      -
      -

      -
        -

        -

      • - Operational state: EA has obtained its certificate and is ready to receive and send Enrolment messages
        -
        -
      • -

        -
      -

      - - 4.4.4AA states
      -
      -
      -

      -
        -

        -

      • - Operational state: AA has obtained its certificate and is ready to receive and send Authorization messages
        -
        -
      • -

        -
      -

      - - 4.5Validity of Signed Communication - - -

      -

      - The check of the validity of signed communication according to clause 5.5 of IEEE P1609.2/D12 [1] (e.g. consistency check of the certificate chain, consistency check between certificate and message etc) forms an integral part of the test suite and is described in TS 103 096‑3 [5], clause 6. -

      -

      - - 4.6 - Introduction of Snippets of Data Structures
      -
      -
      -
      -

      -

      - The data structures in IEEE P1609.2/D12 [1] can become quite complex. In order to allow to write a TP in a concise form, the usage of snippets has been introduced. A snippet is a partial extract of a data structure which is assigned with values. A snippet can be used within a TP. Please refer to clause 6.1.8 for a complete list of all defined snippets.
      -
      -

      -

      - Within a TP, any element of the snippet can be overwritten or extended. In the example below the TP extends the snippet MSG_ENRRSP_TS 'signature.ecdsa_signature' to ' signature.ecdsa_signature.R.type = = uncompressed'. -

      -

      - ...
      when { - the IUT receives a valid CertificateResponse (EnrolmentResponse) set to MSG_ENRRSP_TS
      - - - containing certificate_chain[last].signature.ecdsa_signature.R.type -
      - - - - - set to uncompressed
      -
      ...
      -
      -

      -

      - - 4.7Variants, Variables and Snippet Naming Convention
      -
      -
      -

      -

      - The TPs use the concept of variants, variables and snippets. Their definition, how they are used and their naming conventions are defined in this clause. -

      -

      - - Variants: - - In case where for a single field multiple values can be tested (e.g. different public key types), then a table is appended after the TP. This table lists all the different value which need to be tested. The TP identifier is appended with –X (e.g. TP/SEC/ITS-S/ENR/NB-02-X). If there are two fields for which multiple values can be tested then X and Y are appended. The field itself is written as X_FIELD_NAME (e.g. X_PKT_SIGNATURE).
      -
      -

      -

      - - Variables: - - Variables are used in TPs in order to highlight the fact that a particular part of request message needs to re-appear in a response message. For example for a TP where the IUT has sent an EnrolementRequest with a permission list, and the test system needs to sent the same permission list back, then the denotation of V_PERM_LIST (see TP/SEC/ITS-S/ENR/NB-11) - -

      -

      - - Snippets: - - For the definition of snippets refer to the previous clause. The naming convention for snippets is defined to upper case and to have no specific prefix (e.g. MSG_ENRREQ_IUT). All snippets in TPs contain hyperlinks which allows to navigate from the TP directly to the snippet definition. -

      -

      - - 5 - Test Suite Structure (TSS)
      -
      -
      -
      -

      -

      - - 5.1Structure for Security tests - - -

      -

      - Table 1 shows the Test Suite Structure (TSS) including its subgroups defined for conformance testing.
      -
      -

      -

      - - Table 1 - - : TSS for SECURITY - - - -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - Root - -

      -
      -

      - - Group - -

      -
      -

      - - Group - -

      -
      -

      - - category - -

      -
      -

      - SEC -

      -
      -

      - CA -

      -
      -

      - ENR/AUTH -

      -
      -

      - Normal behaviour -

      -
      -

      - Exceptional behaviour -

      -
      -

      - EA -

      -
      -

      - ENR -

      -
      -

      - Normal behaviour -

      -
      -

      - Exceptional behaviour -

      -
      -

      - AA -

      -
      -

      - AUTH -

      -
      -

      - Normal behaviour -

      -
      -

      - Exceptional behaviour -

      -
      -

      - ITS-S -

      -
      -

      - ENR -

      -
      -

      - Normal behaviour -

      -
      -

      - Exceptional behaviour -

      -
      -

      - AUTH -

      -
      -

      - Normal behaviour -

      -
      -

      - Exceptional behaviour -

      -
      -

      - S-DATA -

      -
      -

      - Normal behaviour -

      -
      -

      - Exceptional behaviour -

      -
      -

      - R-DATA -

      -
      -

      - Normal behaviour -

      -
      -

      - Exceptional behaviour -

      -
      -

      -

      -

      - The test suite is structured as a tree with the root defined as SEC. The tree is of rank 3 with the first rank a Group, the second rank a sub group, and the last rank a category.
      -
      -

      -

      - - 5.2Test groups
      -
      -
      -
      -

      -

      - The test suite has a total of four levels. The first level is the root. The second level defines different IUTs. The third level defines various functional areas. The fourth level differentiates normal and exceptional behaviour.
      -
      -

      -

      - - 5.2.1Root
      -
      -
      -
      -

      -

      - The root identifies ITS G5A as defined in IEEE 1609.2 [1], TS 102 941 [2] and TS 102 867 [3].
      -
      -

      -

      - - 5.2.2Groups
      -
      -
      -
      -

      -

      - There are four functional areas identified as groups:
      -
      -

      -
        -

        -

      • - Certificate Authority -
      • -

        -

        -

      • - Enrolment Authority -
      • -

        -

        -

      • - Authorization Authority -
      • -

        -

        -

      • - ITS Station -
      • -

        -
      -

      - - 5.2.3Sub groups
      -
      -
      -
      -

      -

      - There are four functional areas identified as sub-groups:
      -
      -

      -
        -

        -

      • - Enrolment
        -
        -
      • -

        -

        -

      • - Authorization -
      • -

        -

        -

      • - Send Data
        -
        -
      • -

        -

        -

      • - Receive Data
        -
        -
      • -

        -
      -

      - - 5.2.4Categories
      -
      -
      -
      -

      -

      - Test categories are limited to the normal and exceptional behaviour. -

      -

      - - 6 - Test Purposes (TP)
      -
      -
      -
      -

      -

      - - 6.1Introduction
      -
      -
      -
      -

      -

      - - 6.1.1TP definition conventions
      -
      -
      -
      -

      -

      - The TP definition is constructed according to EG 202 798 [i.1].
      -
      -

      -

      - - 6.1.2TP Identifier naming conventions
      -
      -
      -
      -

      -

      - The identifier of the TP is constructed according to table 2.
      -
      -

      -

      - - Table 2 - - : TP naming convention
      -
      -
      -
      -
      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - Identifier: - -

      -
      -

      - - TP_<root>_<gr>_<sgr>_<x>_<nn> - -

      -
      -

      -

      -

      -

      - <root> = root -

      -
      -

      - SEC -

      -
      -

      -

      -

      - <gr> = group -

      -
      -

      - CA -

      -
      -

      - Certificate Authorithy -

      -
      -

      -

      -

      - EA -

      -
      -

      - Enrolment Authorithy -

      -
      -

      -

      -

      - AA -

      -
      -

      - Authorization Authority -

      -
      -

      -

      -

      - ITS-S -

      -
      -

      - ITS Station -

      -
      -

      -

      - <sgr> =sub-group -

      -
      -

      - ENR -

      -
      -

      - Enrolment -

      -
      -

      -

      -

      - AUTH -

      -
      -

      - Authorization -

      -
      -

      -

      -

      - S-DATA -

      -
      -

      - Send Data -

      -
      -

      -

      -

      - R-DATA -

      -
      -

      - Receive Data -

      -
      -

      -

      - <x> = type of testing -

      -
      -

      - NB -

      -
      -

      - Normal Behaviour -

      -
      -

      -

      -

      - EB -

      -
      -

      - Exceptional Behaviour -

      -
      -

      -

      - <nn> = sequential number -

      -
      -

      -

      - 01 to 99 -

      -
      -

      -

      - <X> = Variant for 1st permutation table -

      -
      -

      -

      - A to Z -

      -
      -

      -

      - <Y> = Variant for 2nd permutation table -

      -
      -

      -

      - A to Z -

      -
      -

      -

      -

      - - 6.1.3Rules for the behaviour description
      -
      -
      -
      -

      -

      - The description of the TP is constructed according to EG 202 798 [i.1].
      -
      -

      -

      - In the TP the following wordings are used:
      -
      -

      -
        -

        -

      • - "The IUT is requested to send": An upper layer requests the security layer to apply processing to a packet. -
      • -

        -

        -

      • - "The IUT receives": for packets coming from the network and given by the lower layer. -
      • -

        -

        -

      • - "The IUT is configured to": the Security Layer on the IUT is requested to include a certain data element, e.g. this can be manually configured or triggered by use of a application that requires this data element. -
      • -

        -

        -

      • - "The IUT accepts": the Security Layer on the IUT interprets a received message as passing all the relevant validity tests, including cryptographic validity, and passes it to a higher layer for interpretation. -
      • -

        -

        -

      • - "The IUT discards": the Security Layer on the IUT interprets a received message as failing at least one validity test and does not pass it to a higher layer (drops a received message). -
      • -

        -
      -

      - - 6.1.4Sources of TP definitions
      -
      -
      -
      -

      -

      - All TPs specified in the present document are derived from the behaviour defined in IEEE 1609.2 [1], TS 102 941 [2] and TS 102 867 [3].
      -
      -

      -

      - - 6.1.5Mnemonics for PICS reference
      -
      -
      -
      -

      -

      - The following table lists mnemonic names and maps them to the PICS item number. -

      -

      - - Table 3: Mnemonics for PICS reference
      -
      -
      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - Mnemonic - -

      -
      -

      - - PICS item - -

      -
      -

      - PIC_Generate_SignPayload -

      -
      -

      - [4] Table A.5/1 -

      -
      -

      - PIC_Generate_SignExternalPayload -

      -
      -

      - [4] Table A.5/2 -

      -
      -

      - PIC_Generate_SignPartialPayload -

      -
      -

      - [4] Table A.5/3 -

      -
      -

      - PIC_Generate_Identified -

      -
      -

      - [4] Table A.5/7 -

      -
      -

      - PIC_Generate_GenerationTime -

      -
      -

      - [4] Table A.5/9 -

      -
      -

      - PIC_Generate_GenerationLocation -

      -
      -

      - [4] Table A.5/10 -

      -
      -

      - PIC_Generate_ExpirationTime -

      -
      -

      - [4] Table A.5/11 -

      -
      -

      - PIC_Generate_Certificate -

      -
      -

      - [4] Table A.5/13 -

      -
      -

      - PIC_Generate_Ecdsa224 -

      -
      -

      - [4] Table A.5/15 -

      -
      -

      - PIC_Generate_Ecdsa256 -

      -
      -

      - [4] Table A.5/16 -

      -
      -

      - PIC_Generate_ExplicitCertificates -

      -
      -

      - [4] Table A.5/17 -

      -
      -

      - PIC_Generate_Uncompressed -

      -
      -

      - [4] Table A.5/19 -

      -
      -

      - PIC_Generate_Compressed -

      -
      -

      - [4] Table A.5/20 -

      -
      -

      - PIC_Generate_CompressedFastVerification -

      -
      -

      - [4] Table A.5/21 -

      -
      -

      - PIC_Generate_UncompressedKey -

      -
      -

      - PIC_Generate_Uncompressed -

      -
      -

      - PIC_Generate_CompressedKey -

      -
      -

      - PIC_Generate_Compressed AND PIC_Generate_CompressedFastVerification -

      -
      -

      - PIC_Generate_XCoordinateOnlyKey -

      -
      -

      - PIC_Generate_Compressed AND NOT PIC_Generate_CompressedFastVerification -

      -
      -

      - PIC_Generate_SelfSigned -

      -
      -

      - [4] Table A.34/2 -

      -
      -

      - PIC_Generate_StartValidity -

      -
      -

      - [4] Table A.34/16 -

      -
      -

      - PIC_Generate_LifetimeIsDuration -

      -
      -

      - [4] Table A.34/17 -

      -
      -

      - PIC_ Generate_StartValidityIsATimestamp -

      -
      -

      - NOT PIC_Generate_LifetimeIsDuration -

      -
      -

      - PIC_Generate_VerificationKey224 -

      -
      -

      - [4] Table A.34/19 -

      -
      -

      - PIC_Generate_VerificationKey256 -

      -
      -

      - [4] Table A.34/20 -

      -
      -

      - PIC_Generate_EncryptionKey -

      -
      -

      - [4] Table A.34/21 -

      -
      -

      - PIC_Generate_PsidArrayWithMoreThan8Entries -

      -
      -

      - [4] Table A.37/2 -

      -
      -

      - PIC_Verify_Uncompressed -

      -
      -

      - [4] Table A.14/17 -

      -
      -

      - PIC_Verify_Compressed -

      -
      -

      - [4] Table A.14/18 -

      -
      -

      - PIC_Verify_CompressedFastVerification -

      -
      -

      - [4] Table A.14/19 -

      -
      -

      - PIC_Verify_UncompressedKey -

      -
      -

      - PIC_Verify_Uncompressed -

      -
      -

      - PIC_Verify_CompressedKey -

      -
      -

      - PIC_Verify_Compressed AND PIC_Verify_CompressedFastVerification -

      -
      -

      - PIC_Verify_XCoordinateOnlyKey -

      -
      -

      - PIC_Verify_Compressed AND NOT PIC_Verify_CompressedFastVerification -

      -
      -

      - PIC_Verify_SelfSigned -

      -
      -

      - [4] Table A.35/1 -

      -
      -

      - PIC_Verify_StartValidity -

      -
      -

      - [4] Table A.41/9 -

      -
      -

      - PIC_Verify_LifetimeIsDuration -

      -
      -

      - [4] Table A.41/10 -

      -
      -

      - PIC_Verify_StartValidityIsATimestamp -

      -
      -

      - NOT PIC_Verify_LifetimeIsDuration -

      -
      -

      - PIC_Verify_VerificationKey224 -

      -
      -

      - [4] Table A.41/11 -

      -
      -

      - PIC_Verify_VerificationKey256 -

      -
      -

      - [4] Table A.41/12 -

      -
      -

      - PIC_Verify_EncryptionKey -

      -
      -

      - [4] Table A.41/13 -

      -
      -

      - PIC_Verify_PsidArrayWithMoreThan8Entries -

      -
      -

      - [4] Table A.45/2 -

      -
      -

      -

      -

      - - 6.1.6 - Message encapsulation - - -

      -

      - - - - - - - - - - - - -
      -

      - - CertificateRequest message encapsulation - -

      -
      -

      - Structure 1609Dot2Data {
      - containing type
      - - indicating encrypted
      - containing encrypted_data
      - - containing symm_algorithm set to unknown
      - - containing recipients
      - - - containing cert_id
      - - - containing enc_key
      - - containing ciphertext
      /----------------- After deciphering process ------------------/
      / - - containing type - - - - - - - /
      / - - - set to certificate_request - - - - /
      / - - containing request - - - - - - /
      / - - - containing the CerticateRequest data/
      /----------------------------------------------------------------------/
      }
      -

      -
      -

      - NOTE: When a TP refers to a CertificateRequest, then it is assumed that the CertificateRequest is received in a 1609Dot2Data as described above. -

      -
      -

      -

      -

      - - - - - - - - - - - - -
      -

      - - CertificateResponse message encapsulation - -

      -
      -

      - Structure 1609Dot2Data {
      - containing type
      - - indicating encrypted
      - containing encrypted_data
      - - containing symm_algorithm set to unknown
      - - containing recipients
      - - - containing cert_id
      - - - containing enc_key
      - - containing ciphertext
      /---------------------------- After deciphering process ------------------------------/
      / - - containing type - - - - - - - - - - - - /
      / - - - set to certificate_response - - - - - - - - /
      / - - containing request - - - - - - - - - - - /
      / - - - containing the CerticateResponse data - - - - - /
      /---------------------------------------------------------------------------------------------/
      }
      -

      -
      -

      - NOTE: When a TP refers to a CertificateResponse, then it is assumed that the CertificateResponse is received in a 1609Dot2Data as described above. -

      -
      -

      -

      -

      - - - - - - - - - - - - -
      -

      - - CertificateRequestError message encapsulation - -

      -
      -

      - Structure 1609Dot2Data {
      - containing type
      - - indicating encrypted
      - containing encrypted_data
      - - containing symm_algorithm set to unknown
      - - containing recipients
      - - - containing cert_id
      - - - containing enc_key
      - - containing ciphertext
      /------------------------- After deciphering process ----------------------------/
      / - - containing type - - - - - - - - - - - /
      / - - - set to certificate_request_error - - - - - - /
      / - - containing request - - - - - - - - - - /
      / - - - containing the CertificateRequestError data - - /
      /-----------------------------------------------------------------------------------------/
      }
      -

      -
      -

      - NOTE: When a TP refers to a CertificateRequestError, then it is assumed that the CertificateRequestError is received in a 1609Dot2Data as described above. -

      -
      -

      -

      -

      - - 6.1.7 - Used constants - - -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - NAME - -

      -
      -

      - - Value - -

      -
      -

      - - - CLT - - -

      -
      -

      - Current Local Time -

      -
      -

      - - - ANY_VALUE_OR_NONE - - -

      -
      -

      - * -

      -
      -

      - - - ANY_VALUE - - -

      -
      -

      - ? -

      -
      -

      - - - ANY_SCOPE - - -

      -
      -

      - anonymous_scope or id_scope or sec_data_exch_ca_scope -

      -
      -

      - - - ETSI_LAT - - -

      -
      -

      -

      - - - ETSI_LON - - -

      -
      -

      -

      - - - NICE_LAT - - -

      -
      -

      -

      - - - NICE_LON - - -

      -
      -

      -

      - - - PARIS_LAT - - -

      -
      -

      -

      - - - PARIS_LON - - -

      -
      -

      -

      - - - PSID_A - - -

      -
      -

      - These PSIDs shall be defined before test execution -

      -
      -

      - - - PSID_B - - -

      -
      -

      - - - PSID_C - - -

      -
      -

      - - - PSID_D - - -

      -
      -

      - - - PSID_E - - -

      -
      -

      - - - PSID_F - - -

      -
      -

      - - - PSID_G - - -

      -
      -

      - - - PSID_H - - -

      -
      -

      - - - PSID_I - - -

      -
      -

      - These PSIDs shall be defined only when IUT supports more than 8 PSID -

      -
      -

      - - - PSID_J - - -

      -
      -

      - - - PSID_K - - -

      -
      -

      - - - PSID_L - - -

      -
      -

      -

      -

      - - 6.1.8 - Snippets definitions - - -

      -

      - - 6.1.8.1 - Regions - - -

      -

      - - Table 4: Regions definitions - -

      -

      - - - REGION_LARGE - :=
      GeographicRegion {
      - containing region_type set to 'circle'
      - containing circular_region
      - - containing center
      - - - containing latitude set to ETSI_LAT -
      - - - containing longitude set to ETSI_LON -
      - - containing radius set to 65KM
      }
      -
      - - REGION_MEDIUM - :=
      GeographicRegion {containing region_type set to 'circle'
      - containing circular_region
      - - containing center
      - - - containing latitude set to ETSI_LAT -
      - - - containing longitude set to ETSI_LON -
      - - containing radius set to 32KM
      } - REGION_SMALL - :=
      GeographicRegion {containing region_type set to 'circle'
      - containing circular_region
      - - containing center
      - - - containing latitude set to ETSI_LAT -
      - - - containing longitude set to ETSI_LON -
      - - containing radius set to 1KM
      } - REGION - _OUTSIDE - - - :=
      GeographicRegion {containing region_type set to 'circle'
      - containing circular_region
      - - containing center
      - - - containing latitude set to PARIS_LAT -
      - - - containing longitude set to PARIS_LON -
      - - containing radius set to 65KM
      } - REGION - _INTERSECTING - - - :=
      GeographicRegion {containing region_type set to 'circle'
      - containing circular_region
      - - containing center
      - - - containing latitude set to NICE_LAT -
      - - - containing longitude set to NICE_LON -
      - - containing radius set to 65KM
      }
      -
      -
      -
      -
      -
      -
      -
      -
      -
      -
      -

      -

      -

      - - 6.1.8.2 - Certificates
      -
      -
      -
      -

      -
      - - 6.1.8.2.1Authorities certificates
      -
      -
      -
      -

      - - Table 5: Root certificate definition
      -
      -
      -

      -

      - - - - - - -
      -

      - - - CERT_ROOT - :=
      Certificate {containing version_and_type
      - - set to 'explicit_certificates'(2)
      - containing unsigned_certificate
      - - containing subject_type
      - - - set to 'root_ca'
      - - containing cf
      - - - set to 'use_start_validity' and 'lifetime_is_duration'
      - - not containing signer_id
      - - containing scope
      - - - containing name
      - - - - set to 'ETSI Root CA'
      - - - containing permitted_subject_types
      - - - - set to array[1] {
      - - - - - 'sec_data_exch_ca'
      - - - - }
      - - - containing permissions
      - - - - containing type
      - - - - - set to 'specified'
      - - - - containing permissions_list
      - - - - - set to array[0]
      - - - containing region
      - - - - containing region_type
      - - - - - set to 'none'
      - - containing expiration
      - - - set to '2020-12-31'
      - - containing lifetime
      - - - set to '10Y'
      - - containing crl_series
      - - - set to 0
      - - containing verification_key
      - - - containing algorithm
      - - - - set to 'ecdsa_nistp256_with_sha256'
      - - - containing public_key
      - - - - containing type
      - - - - - set to 'uncompresed'
      - - - - containing x/y
      - - - - - set to a valid key for ECDSA-256 -
      -
      - - not containing encryption_key
      - containing signature
      - - containing ecdsa_signature
      - - - verifiable with unsigned_certificate.verification_key
      - - - containing R
      - - - - containing type
      - - - - - set to 'x_coordinate_only'
      - - - - containing x
      }
      -
      -
      -

      -
      -

      -

      -

      - - Table 6: Enrolment authority certificate definition
      -
      -
      -

      -

      - - - - - - -
      -

      - - - CERT_EA - :=
      Certificate {containing version_and_type
      - - set to 'explicit_certificates'(2)
      - containing unsigned_certificate
      - - containing subject_type
      - - - set to 'sec_data_exch_ca'
      - - containing cf
      - - - set to 'use_start_validity' and 'lifetime_is_duration'
      - - containing signer_id
      - - - set to the 8-byte hash of CERT_ROOT -
      - - containing signature_alg
      - - - set to 'ecdsa_nistp256_with_sha256'
      - - containing scope
      - - - containing name
      - - - - set to 'ETSI EA'
      - - - containing permitted_subject_types
      - - - - set to array[1] {
      - - - - - 'sec_data_exch_ca'
      - - - - }
      - - - containing permissions
      - - - - containing type
      - - - - - set to 'specified'
      - - - - containing permissions_list
      - - - - - set to array[0]
      - - - containing region
      - - - - set to REGION_LARGE -
      - - containing expiration
      - - - set to '2020-12-31'
      - - containing lifetime
      - - - set to '10Y'
      - - containing crl_series
      - - - set to 0
      - - containing verification_key
      - - - containing algorithm
      - - - - set to 'ecdsa_nistp256_with_sha256'
      - - - containing public_key
      - - - - containing type
      - - - - - set to 'uncompresed'
      - - - - containing x/y
      - - - - - set to a valid key for ECDSA-256 -
      -
      - - containing encryption_key
      - - - containing algorithm
      - - - - set to 'ecies_nistp256'
      - - - containing supported_symm_alg
      - - - - set to 'aes_128_ccm'
      - - - containing public_key
      - - - - containing type
      - - - - - set to 'uncompresed'
      - - - - containing x/y
      - - - - - set to a valid key for ECIES-256
      - containing signature
      - - containing ecdsa_signature
      - - - verifiable with CERT_ROOT.verification_key
      - - - containing R
      - - - - containing type
      - - - - - set to 'x_coordinate_only'
      - - - - containing x
      }
      -
      -
      -
      -
      -

      -
      -

      -

      -

      - - Table 7: Authorization authority certificate definition
      -
      -
      -

      -

      - - - - - - -
      -

      - - - CERT_AA - :=
      Certificate {containing version_and_type
      - - set to 'explicit_certificates'(2)
      - containing unsigned_certificate
      - - containing subject_type
      - - - set to 'sec_data_exch_ca'
      - - containing cf
      - - - set to 'use_start_validity' and 'lifetime_is_duration'
      - - containing signer_id
      - - - set to the 8-byte hash of CERT_ROOT -
      - - containing signature_alg
      - - - set to 'ecdsa_nistp256_with_sha256'
      - - containing scope
      - - - containing name
      - - - - set to 'ETSI AA'
      - - - containing permitted_subject_types
      - - - - set to array[1] {
      - - - - - 'sec_data_exch_ca'
      - - - - }
      - - - containing permissions
      - - - - containing type
      - - - - - set to 'specified'
      - - - - containing permissions_list
      - - - - - set to array[0]
      - - - containing region
      -
      -
      -
      -

      -

      - - - - - set to REGION_LARGE -
      - - containing expiration
      - - - set to '2020-12-31'
      - - containing lifetime
      - - - set to '10Y'
      - - containing crl_series
      - - - set to 0
      - - containing verification_key
      - - - containing algorithm
      - - - - set to 'ecdsa_nistp256_with_sha256'
      - - - containing public_key
      - - - - containing type
      - - - - - set to 'uncompresed'
      - - - - containing x/y
      - - - - - set to a valid key for ECDSA-256 -
      -
      - - containing encryption_key
      - - - containing algorithm
      - - - - set to 'ecies_nistp256'
      - - - containing supported_symm_alg
      - - - - set to 'aes_128_ccm'
      - - - containing public_key
      - - - - containing type
      - - - - - set to 'uncompresed'
      - - - - containing x/y
      - - - - - set to a valid key for ECIES-256
      - containing signature
      -
      -

      -

      - - - containing ecdsa_signature
      - - - verifiable with CERT_ROOT.verification_key
      - - - containing R
      - - - - containing type
      -
      -

      -

      - - - - - - set to 'x_coordinate_only' -

      -

      - - - - - containing x
      -
      -

      -

      - } -

      -
      -

      -

      -

      - - 6.1.8.2.2End-Entities certificates
      -
      -
      -
      -

      - - 6.1.8.2.2.1Certificates issued by test system
      -
      -
      -

      -

      - - Table 8: Enrolment certificate issued by test system
      -
      -
      -

      -

      - - - - - - - - - -
      -

      - - - CERT_ENR_TS - :=
      Certificate {
      - containing version_and_type
      - - set to 'explicit_certificates'(2)
      -
      -
      -
      -

      -

      - - containing unsigned_certificate
      -
      -

      -

      - - - containing subject_type
      -
      -

      -

      - - - - set to 'sec_data_exch_csr' -

      -

      - - - containing cf
      -
      -

      -

      - - - - indicating 'use_start_validity' and 'lifetime_is_duration' -

      -

      - - - containing signer_id
      -
      -

      -

      - - - - set to 8-byte hash of the CERT_EA - -

      -

      - - - containing signature_alg
      -
      -

      -

      - - - - set to 'ecdsa_nistp256_with_sha256' -

      -

      - - - containing scope
      -
      -

      -

      - - - - containing name
      -
      -

      -

      - - - - - set to 'EC_SCOPE_DEFAULT' -

      -

      - - - - containing permitted_subject_types
      -
      -

      -

      - - - - - set to MSG_ENRREQ_IUT.unsigned_csr
      - - - - - - .type_specific_data.sec_data_exch_ca_scope.permitted_subject_types
      -
      -

      -

      - - - - containing permissions
      -
      -

      -

      - - - - - set to MSG_ENRREQ_IUT.unsigned_csr
      - - - - - - .type_specific_data.sec_data_exch_ca_scope.permissions
      -
      -

      -

      - - - - containing region
      -
      -

      -

      - - - - - set to MSG_ENRREQ_IUT.unsigned_csr.type_specific_data.sec_data_exch_ca_scope.region
      -
      -

      -

      - - - containing expiration
      -
      -

      -

      - - - containing lifetime
      -
      -

      -

      - - - containing crl_series
      -
      -

      -

      - - - - set to 0
      -
      -

      -

      - - - containing verification_key
      -
      -

      -

      - - - - set to MSG_ENRREQ_IUT.unsigned_csr.verification_key
      -
      -

      -

      - - containing signature
      -
      -

      -

      - - - containing ecdsa_signature
      -
      -

      -

      - - - - verifiable with CERT_EA.verification_key
      -
      -

      -

      - - - - containing R
      - - - - containing type
      -
      -

      -

      - - - - - - set to 'compressed_y_0' or 'compressed_y_1' -

      -

      - - - - - containing x/y
      -
      -

      -

      - - - - - - set to a valid key for ECDSA-256 - - -
      -
      -

      -

      - } -

      -
      -

      - NOTE: This certificate is a response to the EnrolmentRequest message MSG_ENRREQ_IUT. -

      -
      -

      -

      -

      - - Table 9: Authorization certificate issued by test system
      -
      -
      -

      -

      - - - - - - - - - -
      -

      - - - CERT_ - AUTH_TS - - - :=
      Certificate {containing version_and_type
      - - set to 'explicit_certificates'(2)
      -
      -
      -
      -

      -

      - - containing unsigned_certificate
      -
      -

      -

      - - - containing subject_type
      -
      -

      -

      - - - - set to 'sec_data_exch_csr' -

      -

      - - - containing cf
      -
      -

      -

      - - - - indicating 'use_start_validity' and 'lifetime_is_duration' -

      -

      - - - containing signer_id
      -
      -

      -

      - - - - set to 8-byte hash of the CERT_AA - -

      -

      - - - containing signature_alg
      -
      -

      -

      - - - - set to 'ecdsa_nistp256_with_sha256' -

      -

      - - - containing scope
      -
      -

      -

      - - - - containing name
      -
      -

      -

      - - - - - set to 'AC_SCOPE_DEFAUL' -

      -

      - - - - containing permitted_subject_types
      -
      -

      -

      - - - - - set to MSG_AUTHREQ_IUT.unsigned_csr
      - - - - - - .type_specific_data.sec_data_exch_ca_scope.permitted_subject_types
      -
      -

      -

      - - - - containing permissions
      -
      -

      -

      - - - - - set to MSG_AUTHREQ_IUT.unsigned_csr
      - - - - - - .type_specific_data.sec_data_exch_ca_scope.permissions
      -
      -

      -

      - - - - containing region
      -
      -

      -

      - - - - - set to MSG_AUTHREQ_IUT.unsigned_csr
      - - - - - - .type_specific_data.sec_data_exch_ca_scope.region
      -
      -

      -

      - - - containing expiration
      -
      -

      -

      - - - containing lifetime
      -
      -

      -

      - - - containing crl_series
      -
      -

      -

      - - - - set to 0
      -
      -

      -

      - - - containing verification_key
      -
      -

      -

      - - - - set to MSG_AUTHREQ_IUT.unsigned_csr.verification_key
      -
      -

      -

      - - containing signature
      -
      -

      -

      - - - containing ecdsa_signature
      -
      -

      -

      - - - - verifiable with CERT_EA.verification_key
      -
      -

      -

      - - - - containing R
      - - - - containing type
      -
      -

      -

      - - - - - - set to 'compressed_y_0' or 'compressed_y_1' -

      -

      - - - - - containing x/y
      -
      -

      -

      - - - - - - set to a valid key for ECDSA-256 - - -
      -
      -

      -

      - } -

      -
      -

      - NOTE: This certificate is a response to the AuthorizationRequest message MSG_AUTHREQ_IUT. -

      -
      -

      -

      -

      - - 6.1.8.2.2.2Certificates issued by implementation under test
      -
      -
      -
      -

      -

      - - Table 10: Enrolment certificate issued by IUT
      -
      -
      -

      -

      - - - - - - - - - -
      -

      - - - CERT_ENR_IUT - :=
      Certificate {
      -
      -
      -

      -

      - - containing version_and_type
      -
      -

      -

      - - - set to explicit_certificates(2)
      -
      -

      -

      - - containing unsigned_certificate
      -
      -

      -

      - - - containing subject_type
      -
      -

      -

      - - - - set to MSG_ENRREQ_TS.unsigned_csr.subject_type
      -
      -

      -

      - - - containing cf
      -
      -

      -

      - - - - set to MSG_ENRREQ_TS.unsigned_csr.cf
      -
      -

      -

      - - - containing signer_id
      -
      -

      -

      - - - - set to 8-byte hash of the CERT_EA - -

      -

      - - - containing signature_alg
      -
      -

      -

      - - - - set to 'ecdsa_nistp256_with_sha256' -

      -

      - - - containing scope
      -
      -

      -

      - - - - containing name
      -
      -

      -

      - - - - containing permitted_subject_types
      -
      -

      -

      - - - - - set to MSG_ENRREQ_TS.unsigned_csr
      - - - - - - - .type_specific_data.sec_data_exch_ca_scope.permitted_subject_types
      -
      -

      -

      - - - - containing permissions
      -
      -

      -

      - - - - - containing type set to 'specified'
      - - - - containing permissions_list
      -

      -

      - - - - - - set to the intersection between
      - - - - - - - MSG_ENRREQ_TS.unsigned_csr
      - - - - - - - .type_specific_data.sec_data_exch_ca_scope.permissions
      -
      -

      -

      - - - - - - - and CERT_EA.scope.permissions.permissions_list -

      -

      - - - - containing region
      -
      -

      -

      - - - - - containing region_type set to 'circle'
      - - - - containing circular_region
      - - - - - set to the intersection between
      -
      -

      -

      - - - - - - - - MSG_ENRREQ_TS.unsigned_csr.type_specific_data.sec_data_exch_ca_scope.region
      -
      -

      -

      - - - - - - - and CERT_EA.scope.region.circular_region -

      -

      - - - containing expiration
      -
      -

      -

      - - - - set to any timestamp > CLT - -

      -

      - - - containing lifetime if cf has use_start_validity and lifetime_is_duration flags set
      -
      -

      -

      - - - - set toany value > expiration - CLT - -

      -

      - - - containing start_validity if cf indicating use_start_validity but not lifetime_is_duration
      -
      -

      -

      - - - - set toany timestamp < CLT - -

      -

      - - - containing crl_series
      -
      -

      -

      - - - containing verification_key
      -
      -

      -

      - - - - set to MSG_ENRREQ_TS.unsigned_csr.verification_key
      -
      -

      -

      - - containing signature
      -
      -

      -

      - - - containing ecdsa_signature
      -
      -

      -

      - - - - verifiable with CERT_EA.verification_key
      -
      -

      -

      - } -

      -
      -

      - NOTE: This certificate is a response to the EnrolmentRequest message MSG_ENRREQ_TS. -

      -
      -

      -

      -

      - - Table 11: Authorization certificate issued by IUT
      -
      -
      -

      -

      - - - - - - - - - -
      -

      - - - CERT_ - AUTH_IUT - - - :=
      Certificate {
      -
      -
      -

      -

      - - containing version_and_type
      -
      -

      -

      - - - set to 'explicit_certificates'(2)
      -
      -

      -

      - - containing unsigned_certificate
      -
      -

      -

      - - - containing subject_type
      -
      -

      -

      - - - - set to MSG_AUTHREQ_TS.unsigned_csr.subject_type
      -
      -

      -

      - - - containing cf
      -
      -

      -

      - - - - set to MSG_AUTHREQ_TS.unsigned_csr.cf
      -
      -

      -

      - - - containing signer_id
      -
      -

      -

      - - - - set to 8-byte hash of the CERT_AA - -

      -

      - - - containing signature_alg
      -
      -

      -

      - - - - set to 'ecdsa_nistp256_with_sha256' -

      -

      - - - containing type_specific_data -

      -

      - - - - containing anonymous_scope if subject_type set to 'sec_data_exch_anonymous' -

      -

      - - - - - containing permissions
      -
      -

      -

      - - - - - - containing type set to 'specified'
      - - - - - containing permissions_list
      -

      -

      - - - - - - - set to the intersection between MSG_AUTHREQ_TS.unsigned_csr
      - - - - - - - - .type_specific_data.sec_data_exch_ca_scope.permissions
      -
      -

      -

      - - - - - - - and CERT_AA.scope.permissions.permissions_list -

      -

      - - - - - containing region
      -
      -

      -

      - - - - - - containing region_type set to 'circle'
      - - - - - containing circular_region
      -
      -

      -

      - - - - - - - set to the intersection between MSG_AUTHREQ_TS.unsigned_csr
      - - - - - - - - .type_specific_data.sec_data_exch_ca_scope.region
      -
      -

      -

      - - - - - - - and CERT_AA.scope.region.circular_region -

      -

      - - - - or containing id_scope if subject_type set to 'sec_data_exch_anonymous' -

      -

      - - - - - containing name[0..32] -

      -

      - - - - - containing permitted_subject_types
      -
      -

      -

      - - - - - - set to MSG_AUTHREQ_TS.unsigned_csr
      - - - - - - - - .type_specific_data.sec_data_exch_ca_scope.permitted_subject_types
      -
      -

      -

      - - - - - containing permissions
      -
      -

      -

      - - - - - - containing type set to 'specified'
      - - - - - containing permissions_list
      -

      -

      - - - - - - - set to the intersection between MSG_AUTHREQ_TS.unsigned_csr
      - - - - - - - - .type_specific_data.sec_data_exch_ca_scope.permissions
      -
      -

      -

      - - - - - - - and CERT_AA.scope.permissions.permissions_list -

      -

      - - - - - containing region
      -
      -

      -

      - - - - - - containing region_type set to 'circle'
      - - - - - containing circular_region
      -
      -

      -

      - - - - - - - set to the intersection between MSG_AUTHREQ_TS.unsigned_csr
      - - - - - - - - .type_specific_data.sec_data_exch_ca_scope.region
      -
      -

      -

      - - - - - - - and CERT_AA.scope.region.circular_region -

      -

      - - - containing expiration
      -
      -

      -

      - - - - set to any timestamp > CLT - -

      -

      - - - containing lifetime if cf has use_start_validity and lifetime_is_duration flags set
      -
      -

      -

      - - - - set toany value > expiration - CLT - -

      -

      - - - containing start_validity if cf indicating use_start_validity but not lifetime_is_duration
      -
      -

      -

      - - - - set toany timestamp < CLT - -

      -

      - - - containing crl_series
      -
      -

      -

      - - - containing verification_key
      -
      -

      -

      - - - - set to MSG_AUTHREQ_TS.unsigned_csr.verification_key
      -
      -

      -

      - - containing signature
      -
      -

      -

      - - - containing ecdsa_signature
      -
      -

      -

      - - - - verifiable using CERT_AA.verification_key
      -
      -

      -

      - } -

      -
      -

      - NOTE: This certificate is a response to the AuthorizationRequest message MSG_AUTHREQ_TS. -

      -
      -

      -

      -

      - - 6.1.8.3 - Messages
      -
      -
      -
      -

      -
      - - 6.1.8.3.1ITS station testing - - -
      -

      - - 6.1.8.3.1.1Enrolment
      -
      -
      -
      -

      -

      - - Table 12: EnrolmentRequest message received by the test system from the ITS-S - -

      -

      - - - - - - -
      -

      - - - MSG_ENRREQ_IUT - :=
      -
      -
      -
      -

      -

      - CertificateRequest{
      -
      -

      -

      - - containing signer
      -
      -

      -

      - - - containing type
      -
      -

      -

      - - - - set to'certificate' or
      -
      -

      -

      - - - - - - 'certificate_chain' or
      -
      -

      -

      - - - - - - 'self' -

      -

      - - - containing certificate if signer.type set to 'certificate' or
      -
      -

      -

      - - - containing certificates if signer.type set to 'certificate_chain' -

      -

      - - containing unsigned_csr
      -
      -

      -

      - - - containing version_and_type
      -
      -

      -

      - - - - set to 'explicit_certificates'(2)
      -
      -

      -

      - - - containing request_time
      -
      -

      -

      - - - - set to any timestamp <= CLT - -

      -

      - - - containing subject_type
      -
      -

      -

      - - - - set to'sec_data_exch_csr' -

      -

      - - - containing cf
      -
      -

      -

      - - - - not indicating 'encryption_key' flag
      -
      -

      -

      - - - containing type_specific_data
      -
      -

      -

      - - - - containing sec_data_exch_ca_scope
      -
      -

      -

      - - - - - containing name [0..32] -

      -

      - - - - - containing permitted_subject_types
      -
      -

      -

      - - - - - - set toarray[1] := {
      -
      -

      -

      - - - - - - - 'sec_data_exch_anonymous' or 'sec_data_exch_identified_localized' -

      -

      - - - - - - }
      -
      -

      -

      - - - - - containing permission
      -
      -

      -

      - - - - - - containing type
      -
      -

      -

      - - - - - - - set to 'specified' -

      -

      - - - - - - containing permissions_list
      -
      -

      -

      - - - - - containing region
      -
      -

      -

      - - - - - - containing region_type
      -
      -

      -

      - - - - - - - set to 'circle' -

      -

      - - - - - - containing circular_region
      -
      -

      -

      - - - containing expiration
      -
      -

      -

      - - - - set to any timestamp > CLT - -

      -

      - - - containing lifetime if cf indicating 'use_start_validity' and 'lifetime_is_duration' -

      -

      - - - containing start_validity if cf indicating 'use_start_validity'
      - - - - - - - - and not indicating 'lifetime_is_duration'
      -

      -

      - - - - set to any timestamp < expiration -

      -

      - - - containing verification_key
      -
      -

      -

      - - - - containing algorithm set to 'ecdsa_nistp256_with_sha256' -

      -

      - - - - containing public_key
      -
      -

      -

      - - - containing response_encryption_key
      -
      -

      -

      - - - - containing algorithm set to 'ecies_nistp256' -

      -

      - - - - containing supported_symm_alg set to 'aes_128_ccm' -

      -

      - - - - containing public_key
      -
      -

      -

      - - containing signature
      -
      -

      -

      - - - containing ecdsa_signature
      -
      -

      -

      - - - - verifiable using {
      -
      -

      -

      - - - - - signer.certificate.unsigned_certificate.verification_key
      - - - - - - if signer.type is 'certificate'
      -

      -

      - - - - - or signer.certificates[last].unsigned_certificate.verification_key
      - - - - - - if signer.type is 'certificate_chain'
      -

      -

      - - - - - or unsigned_csr.verification_key
      - - - - - - if signer.type is 'self'
      -

      -

      - - - - }
      -
      -

      -

      - } -

      -
      -

      -

      -

      - - Table 13: EnrolmentResponse message sent by the test system to the ITS-S
      -
      -
      -

      -

      - - - - - - -
      -

      - - - MSG_ENRRSP_TS - :=
      -
      -
      -
      -

      -

      - CertificateResponse {
      -
      -

      -

      - - containing f
      -
      -

      -

      - - - set to 'NotRequested' (0)
      -
      -

      -

      - - containing certificate_chain
      - - set to array[] = {
      - - - - CERT_ROOT,
      -
      -

      -

      - - - - - CERT_EA,
      -
      -

      -

      - - - - - CERT_ENR_TS - -

      -

      - - - }
      -
      -

      -

      - - containing crl_path
      -
      -

      -

      - - - set to length 0
      -
      -

      -

      - } -

      -
      -

      -

      -

      - - Table 14: EnrolmentRequestError message sent by the test system to the ITS-S
      -
      -
      -

      -

      - - - - - - -
      -

      - - - MSG_ENRERR_TS - :=
      -
      -
      -
      -

      -

      - CertificateRequestError {
      -
      -

      -

      - - containing signer.type
      -
      -

      -

      - - - set to 'certificate'
      -
      -

      -

      - - containing signer.certificate
      -
      -

      -

      - - - set to CERT_EA - -

      -

      - - containing request_hash
      -
      -

      -

      - - - set to HASH(MSG_ENRREQ_IUT)
      -
      -
      -

      -

      - - containing reason
      -
      -

      -

      - - containing signature
      -
      -

      -

      - - - containing ecdsa_signature
      -
      -

      -

      - - - - verifiable using CERT_EA.unsigned_certificate.verification_key
      -
      -

      -

      - } -

      -
      -

      -

      -

      - - 6.1.8.3.1.2Authorization
      -
      -
      -
      -

      -

      - - Table 15: AuthorizationRequest message received by the test system from the ITS-S
      -
      -
      -

      -

      - - - - - - -
      -

      - - - MSG_AUTHREQ_IUT - :=
      -
      -
      -
      -

      -

      - CertificateRequest{
      -
      -

      -

      - - containing signer
      -
      -

      -

      - - - containing type
      -
      -

      -

      - - - - set to'certificate' or
      -
      -

      -

      - - - - - - 'certificate_chain' -

      -

      - - - containing certificate if signer.type set to 'certificate' or
      -
      -

      -

      - - - containing certificates if signer.type set to 'certificate_chain' -

      -

      - - containing unsigned_csr
      -
      -

      -

      - - - containing version_and_type
      -
      -

      -

      - - - - set to 'explicit_certificates'(2)
      -
      -

      -

      - - - containing request_time
      -
      -

      -

      - - - - set to any timestamp <= CLT - -

      -

      - - - containing subject_type
      -
      -

      -

      - - - - set to 'sec_data_exch_anonymous' or 'sec_data_exch_identified_localized' -

      -

      - - - containing cf
      -
      -

      -

      - - - - not indicating 'encryption_key' flag
      -
      -

      -

      - - - containing type_specific_data
      -
      -

      -

      - - - - containing anonymous_scope if subject_type set to 'sec_data_exch_anonymous' -

      -

      - - - - - containing permissions
      -
      -

      -

      - - - - - - containing type
      -
      -

      -

      - - - - - - - set to 'specified' -

      -

      - - - - - - containing permissions_list
      -
      -

      -

      - - - - - containing region
      -
      -

      -

      - - - - - - containing region_type
      -
      -

      -

      - - - - - - - set to 'circle' -

      -

      - - - - - - containing circular_region
      -
      -

      -

      - - - - or containing id_scope if subject_type set to 'sec_data_exch_identified_localized' -

      -

      - - - - - containing name [0..32]
      -
      -

      -

      - - - - - containing permissions
      -
      -

      -

      - - - - - - containing type
      -
      -

      -

      - - - - - - - set to 'specified' -

      -

      - - - - - - containing permissions_list
      -
      -

      -

      - - - - - containing region
      -
      -

      -

      - - - - - - containing region_type
      -
      -

      -

      - - - - - - - set to 'circle' -

      -

      - - - - - - containing circular_region
      -
      -

      -

      - - - containing expiration
      -
      -

      -

      - - - - set to any timestamp > CLT - -

      -

      - - - containing lifetime if cf indicating 'use_start_validity' and 'lifetime_is_duration' -

      -

      - - - containing start_validity if cf indicating 'use_start_validity'
      - - - - - - - - and not indicating 'lifetime_is_duration'
      -

      -

      - - - - set to any timestamp < expiration
      -
      -

      -

      - - - containing verification_key
      -
      -

      -

      - - - - containing algorithm set to 'ecdsa_nistp256_with_sha256' -

      -

      - - - - containing public_key
      -
      -

      -

      - - - containing response_encryption_key
      -
      -

      -

      - - - - containing algorithm set to 'ecies_nistp256' -

      -

      - - - - containing supported_symm_alg set to 'aes_128_ccm' -

      -

      - - - - containing public_key
      -
      -

      -

      - - containing signature
      -
      -

      -

      - - - containing ecdsa_signature
      -
      -

      -

      - - - - verifiable using CERT_ENR_TS.unsigned_certificate.verification_key -

      -

      - } -

      -
      -

      -

      -

      - - Table 16: EnrolmentResponse message received by the test system from the EA - -

      -

      - - - - - - -
      -

      - - - MSG_ - AUTHRSP_TS - - - :=
      -
      -
      -
      -

      -

      - CertificateResponse {
      -
      -

      -

      - - containing f
      -
      -

      -

      - - - set to 'NotRequested' (0)
      -
      -

      -

      - - containing certificate_chain
      - - set to array[] = {
      - - - - CERT_ROOT,
      -
      -

      -

      - - - - - CERT_AA,
      -
      -

      -

      - - - - - CERT_AUTH_TS - -

      -

      - - - }
      -
      -

      -

      - - containing crl_path
      -
      -

      -

      - - - set to length 0
      -
      -

      -

      - } -

      -
      -

      -

      -

      - - Table 17: EnrolmentRequestError message sent by the test system to the ITS-S
      -
      -
      -

      -

      - - - - - - -
      -

      - - - MSG_ - AUTHERR_TS - - - :=
      -
      -
      -
      -

      -

      - CertificateRequestError {
      -
      -

      -

      - - containing signer.type
      -
      -

      -

      - - - set to 'certificate'
      -
      -

      -

      - - containing signer.certificate
      -
      -

      -

      - - - set to CERT_AA - -

      -

      - - containing request_hash
      -
      -

      -

      - - - set to HASH(MSG_AUTHREQ_IUT)
      -
      -
      -

      -

      - - containing reason
      -
      -

      -

      - - containing signature
      -
      -

      -

      - - - containing ecdsa_signature
      -
      -

      -

      - - - - verifiable using CERT_AA.unsigned_certificate.verification_key
      -
      -
      -
      -

      -

      - } -

      -
      -

      -

      -

      - - 6.1.8.3.1.3Send and Recive Data
      -
      -
      -
      -

      -

      - - Table 18: 1609Dot2Data message to be sent by the test system to the ITS-S under test - -

      -

      - - - - - - -
      -

      - - - MSG_SIGNED_TS :=
      -
      -
      -

      -

      - Structure 1609Dot2Data {
      -
      -

      -

      - - containing protocol_version
      - - set to 2
      -
      -

      -

      - - containing type
      -
      -

      -

      - - - set to 'signed' -

      -

      - - containing signed_data
      -
      -

      -

      - - - containing signer
      -
      -

      -

      - - - containing unsigned_data
      -
      -

      -

      - - - - containing psid
      -
      -

      -

      - - - - containing data
      -
      -

      -

      - - - containing signature
      -
      -

      -

      - } -

      -
      -

      -

      -

      - - Table 19: - 1609Dot2Data message received by the test system from the ITS-S under test -
      -
      -
      -

      -

      - - - - - - -
      -

      - - - MSG_SIGNED_IUT :=
      -
      -
      -

      -

      - Structure 1609Dot2Data {
      -
      -

      -

      - - containing protocol_version
      - - set to 2
      -
      -

      -

      - - containing type
      -
      -

      -

      - - - set to 'signed' -

      -

      - - - or set to 'signed_partial_payload'
      - - or set to 'signed_external_payload'
      -

      -

      - - containing signed_data
      -
      -

      -

      - - - containing signer
      -
      -

      -

      - - - containing unsigned_data
      -
      -

      -

      - - - - containing psid
      -
      -

      -

      - - - containing signature
      -
      -

      -

      - - - - verifiable using signer
      -
      -

      -

      - } -

      -
      -

      -

      -

      - - 6.1.8.3.2Enrolment Authority testing
      -
      -
      -
      -
      -

      - - Table 20: EnrolmentRequest message sent by the test system to the EA
      -
      -
      -

      -

      - - - - - - -
      -

      - - - MSG_ENRREQ_TS - :=
      -
      -
      -
      -

      -

      - CertificateRequest {
      -
      -

      -

      - - containing signer
      -
      -

      -

      - - - containing type
      -
      -

      -

      - - - - set to 'certificate' -

      -

      - - - containing certificate
      -
      -

      -

      - - - - set to CERT_ROOT - -

      -

      - - containing unsigned_csr
      -
      -

      -

      - - - containing version_and_type
      -
      -

      -

      - - - - set to 'explicit_certificates'(2)
      -
      -

      -

      - - - containing request_time
      -
      -

      -

      - - - - set to CLT - -

      -

      - - - containing subject_type
      -
      -

      -

      - - - - set to 'sec_data_exch_csr' -

      -

      - - - containing cf
      -
      -

      -

      - - - - indicating 'use_start_validity' and 'lifetime_is_duration' -

      -

      - - - containing type_specific_data
      -
      -

      -

      - - - - containing sec_data_exch_ca_scope
      -
      -

      -

      - - - - - containing name
      -
      -

      -

      - - - - - - set to 'EC_SCOPE_DEFAULT' -

      -

      - - - - - containing permitted_subject_types
      -
      -

      -

      - - - - - - set to array[1] -

      -

      - - - - - - - containing 'sec_data_exch_identified_localized'
      -
      -

      -

      - - - - - containing permission
      -
      -

      -

      - - - - - - containing type
      -
      -

      -

      - - - - - - - set to 'specified' -

      -

      - - - - - - containing permissions_list
      -
      -

      -

      - - - - - - - set to array[1]
      -
      -

      -

      - - - - - - - - containing PSID_A - -

      -

      - - - - - containing region
      -
      -

      -

      - - - - - - set to REGION_SMALL - -

      -

      - - - containing expiration
      -
      -

      -

      - - - - set to 31. Dec 2020
      -
      -

      -

      - - - containing lifetime
      -
      -

      -

      - - - - set to 10Y
      -
      -

      -

      - - - containing verification_key
      -
      -

      -

      - - - - containing algorithm
      -
      -

      -

      - - - - - set to 'ecdsa_nistp256_with_sha256' -

      -

      - - - - containing public_key
      -
      -

      -

      - - - - - containing type
      -
      -

      -

      - - - - - - set to 'x_coordinate_only'
      -
      -

      -

      - - - - - containing x
      -
      -

      -

      - - - - - - set to a valid key for ECDSA-256
      -
      -

      -

      - - - containing response_encryption_key
      -
      -

      -

      - - - - containing algorithm
      - - - - set to 'ecies_nistp256'
      -

      -

      - - - - containing supported_symm_alg
      - - - - set to 'aes_128_ccm'
      -

      -

      - - - - contains public_key
      -
      -

      -

      - - - - - contains type
      -
      -

      -

      - - - - - - set to 'x_coordinate_only'
      -
      -

      -

      - - - - - containing x
      -
      -

      -

      - - - - - - set to a valid key for ECIES-256
      -
      -

      -

      - - containing signature
      -
      -

      -

      - - - containing ecdsa_signature
      -
      -

      -

      - - - - verifiable by signer.certificate.unsigned_certificate.verification_key
      -
      -

      -

      - } -

      -
      -

      -

      -

      - - Table 21: EnrolmentResponse message received by the test system from the EA - -

      -

      - - - - - - -
      -

      - - - MSG_ENRRSP_ - IUT - - - :=
      -
      -
      -
      -

      -

      - CertificateResponse {
      -
      -

      -

      - - containing f
      -
      -

      -

      - - containing certificate_chain
      - - set to array[3]
      -
      -

      -

      - - - - containing CERT_ROOT - -

      -

      - - - - containing CERT_EA - -

      -

      - - - - containing CERT_ENR_IUT - -

      -

      - } -

      -
      -

      -

      -

      - - Table 22: EnrolmentRequestError message received by the test system from the EA - -

      -

      - - - - - - -
      -

      - - - MSG_ENRERR_ - IUT - - - :=
      -
      -
      -
      -

      -

      - CertificateRequestError {
      -
      -

      -

      - - containing signer.type
      -
      -

      -

      - - - set to 'certificate'
      -
      -

      -

      - - containing signer.certificate
      -
      -

      -

      - - - set to CERT_EA - -

      -

      - - containing request_hash
      -
      -

      -

      - - - set to HASH(MSG_ENRREQ_TS)
      -
      -
      -

      -

      - - containing reason
      -
      -

      -

      - - containing signature
      -
      -

      -

      - - - containing ecdsa_signature
      -
      -

      -

      - - - - verifiable using CERT_EA.unsigned_certificate.verification_key
      -
      -

      -

      - } -

      -
      -

      -

      -

      - - 6.1.8.3.3 - Authorization Authority testing -
      -
      - -
      -
      -

      - - Table 23: AuthorizationRequest message to be sent by the test system to the AA - -

      -

      - - - - - - -
      -

      - - - MSG_AUTHREQ_ - TS - - - :=
      -
      -
      -
      -

      -

      - CertificateRequest{
      -
      -

      -

      - - containing signer
      -
      -

      -

      - - - containing type
      -
      -

      -

      - - - - set to 'certificate_chain' -

      -

      - - - containing certificates -

      -

      - - - - set to array[3]
      -
      -

      -

      - - - - - containing CERT_ROOT - -

      -

      - - - - - containing CERT_EA - -

      -

      - - - - - containing CERT_ENR_IUT - -

      -

      - - containing unsigned_csr
      -
      -

      -

      - - - containing version_and_type
      -
      -

      -

      - - - - set to 'explicit_certificates'(2)
      -
      -

      -

      - - - containing request_time
      -
      -

      -

      - - - - set to CLT - -

      -

      - - - containing subject_type
      -
      -

      -

      - - - - set to 'sec_data_exch_identified_localized' -

      -

      - - - containing cf
      -
      -

      -

      - - - - indicating 'use_start_validity' and 'lifetime_is_duration' -

      -

      - - - containing type_specific_data
      -
      -

      -

      - - - - containing id_scope
      -
      -

      -

      - - - - - containing name
      -
      -

      -

      - - - - - - set to 'AC_SCOPE_DEFAULT' -

      -

      - - - - - containing permissions
      -
      -

      -

      - - - - - - containing type
      -
      -

      -

      - - - - - - - set to 'specified' -

      -

      - - - - - - containing permissions_list
      -
      -

      -

      - - - - - - - set to array[1]
      -
      -

      -

      - - - - - - - - containing PSID_A - -

      -

      - - - - - containing region
      -
      -

      -

      - - - - - - containing region_type
      -
      -

      -

      - - - - - - - set to 'circle' -

      -

      - - - - - - containing circular_region
      - - - - - - set to REGION_SMALL -
      -

      -

      - - - containing expiration
      -
      -

      -

      - - - - set to '31 Dec 2020' -

      -

      - - - containing lifetime
      -
      -

      -

      - - - - set to '10Y' -

      -

      - - - containing verification_key
      -
      -

      -

      - - - - containing algorithm
      -
      -

      -

      - - - - - set to 'ecdsa_nistp256_with_sha256' -

      -

      - - - - containing public_key
      -
      -

      -

      - - - - - containing type
      -
      -

      -

      - - - - - - set to 'x_coordinate_only'
      -
      -

      -

      - - - - - containing x
      -
      -

      -

      - - - - - - set to a valid key for ECDSA-256
      -
      -

      -

      - - - containing response_encryption_key
      -
      -

      -

      - - - - containing algorithm
      - - - - set to 'ecies_nistp256'
      -

      -

      - - - - containing supported_symm_alg
      - - - - set to 'aes_128_ccm'
      -

      -

      - - - - contains public_key
      -
      -

      -

      - - - - - contains type
      -
      -

      -

      - - - - - - set to 'x_coordinate_only'
      -
      -

      -

      - - - - - containing x
      -
      -

      -

      - - - - - - set to a valid key for ECIES-256
      -
      -

      -

      - - containing signature
      -
      -

      -

      - - - containing ecdsa_signature
      -
      -

      -

      - - - - verifiable by signer.certificate.unsigned_certificate.verification_key
      -
      -

      -

      - } -

      -
      -

      -

      -

      - - Table 24: AuthorizationResponse message received by the test system from the AA - -

      -

      - - - - - - -
      -

      - - - MSG_AUTHRSP_ - IUT - - - :=
      -
      -
      -
      -

      -

      - CertificateResponse {
      -
      -

      -

      - - containing f
      -
      -

      -

      - - containing certificate_chain
      - - set to array[3]
      -
      -

      -

      - - - - containing CERT_ROOT - -

      -

      - - - - containing CERT_AA - -

      -

      - - - - containing CERT_AUTH_IUT - - -

      -

      - } -

      -
      -

      -

      -

      - - Table 25: AuthorizationRequestError message received by the test system from the AA - -

      -

      - - - - - - -
      -

      - - - MSG_AUTHERR_ - IUT - - - :=
      -
      -
      -
      -

      -

      - CertificateRequestError {
      -
      -

      -

      - - containing signer.type
      -
      -

      -

      - - - set to 'certificate'
      -
      -

      -

      - - containing signer.certificate
      -
      -

      -

      - - - set to CERT_AA - -

      -

      - - containing request_hash
      -
      -

      -

      - - - set to HASH(MSG_AUTHREQ_IUT)
      -
      -
      -

      -

      - - containing reason
      -
      -

      -

      - - containing signature
      -
      -

      -

      - - - containing ecdsa_signature
      -
      -

      -

      - - - - verifiable using CERT_AA.unsigned_certificate.verification_key
      -
      -

      -

      - } -

      -
      -

      -

      -

      - - 6.2Test purposes for SECURITY - - -

      -

      - - 6.2.1 - - ITS Station - - - -

      -

      - - 6.2.1.1Enrolment
      -
      -
      -

      -
      - - 6.2.1.1.1Normal Behaviour
      -
      -
      -
      -
      -

      - - 6.2.1.1.1.1 - - - Enrolment Request verification -
      -
      - -
      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/NB-01 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S generates correctly a generic EnrolmentRequest message -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], 6.3.33
      ETSI TS 102 941 [2] Table 1 : Contents of ITS-S EnrolmentRequest message
      -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in 'NotEnrolled' state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT is requested to send an EnrolmentRequest message
      - }
      - then {
      - - the IUT sends a valid CertificateRequest set to MSG_ENRREQ_IUT -
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/NB-02-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S generates enrolment request with signature of different types -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], 6.2.17
      ETSI TS 102 941 [2] Table 1 : Contents of ITS-S EnrolmentRequest message
      -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in 'NotEnrolled' state
      -

      -

      - - the IUT is configured to use signature of form X_PKT_SIGNATURE -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT is requested to send an EnrolmentRequest message
      - }
      - then {
      - - the IUT sends a valid CertificateRequest set to MSG_ENRREQ_IUT -
      -

      -

      - - - - containing signature.ecdsa_signature
      -
      -

      -

      - - - - - containing R.type
      -
      -

      -

      - - - - - - set to X_PKT_SIGNATURE -
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - PIC - -

      -
      -

      - - X_PKT_SIGNATURE - -

      -
      -

      - A -

      -
      -

      - PIC_Generate_XCoordinateOnlyKey -

      -
      -

      - x_coordinate_only -

      -
      -

      - B -

      -
      -

      - PIC_Generate_CompressedKey -

      -
      -

      - compressed_lsb_y_0/1 -

      -
      -

      - C -

      -
      -

      - PIC_Generate_UncompressedKey -

      -
      -

      - uncompressed -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/NB-03 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S generates enrolment request with signature calculated using compressed representation of all public keys -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], 6.2.17
      ETSI TS 102 941 [2], Table 1 : Contents of ITS-S EnrolmentRequest message
      -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Generate_UncompressedKey -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in 'NotEnrolled' state
      - the IUT is configured to use uncompressed public keys for verification_key
      -
      -

      -

      - - the IUT is configured to use uncompressed public keys for response_encryption_key
      -
      -

      -

      - } -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT is requested to send an EnrolmentRequest message
      - }
      - then {
      - - the IUT sends a valid CertificateRequest set to MSG_ENRREQ_IUT -
      -

      -

      - - - - containing unsigned_csr.verification_key.public_key.type (V_PKT_VK) -

      -

      - - - - - set to 'uncompressed' -

      -

      - - - - containing unsigned_csr.response_encryption_key.public_key.type (V_PKT_REK)
      -
      -

      -

      - - - - - set to 'uncompressed' -

      -

      - - - - containing signature.ecdsa_signature -

      -

      - - - - - calculated using compressed representation of V_PKT_VK and V_PKT_REK
      -
      -
      -

      -

      - - }
      -
      -

      -

      - } -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/NB-04 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S generates valid self-signed enrolment request. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2 [1], clause 6.2.17
      ETSI TS 102 941 [2], see table 1
      -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Generate_SelfSigned -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in 'NotEnrolled' state
      - the IUT is configured to use a self-signed enrolment request
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT is requested to send an EnrolmentRequest message
      - }
      - then {
      - - the IUT sends a valid CertificateRequest set to MSG_ENRREQ_IUT -
      - - - containing signer.type
      - - - - set to 'self'
      - - - containing signature
      - - - - verified using unsigned_csr.verification_key
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/NB-05 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S generates valid enrolment request with a different response_encryption_key for every request. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.34
      ETSI TS 102 941 [2], see table 1
      -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in 'NotEnrolled' state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - each time the IUT is requested to send an EnrolmentRequest message
      - }
      - then {
      - - the IUT sends a valid CertificateRequest set to MSG_ENRREQ_IUT -
      - - - containing unsigned_csr.response_encryption_key
      - - - - set to value different from the previous ones
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/NB-06 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S generates valid enrolment request with a certificate containing more than 8 PSID entries -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.34
      ETSI TS 102 941 [2], see table 1
      -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Generate_PsidArrayWithMoreThan8Entries -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in 'NotEnrolled' state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT is requested to send an EnrolmentRequest message with more than 8 PSID entries
      - }
      - then {
      - - the IUT sends a valid CertificateRequest set to MSG_ENRREQ_IUT -
      - - - containing unsigned_csr.type_specific_data.permission.permissions_list
      - - - - containing more than 8 entries
      - }
      }
      -

      -
      -

      -

      -

      - - 6.2.1.1.1.2 - - - Enrolment Response acceptance -
      -
      - -
      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/NB-07 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S correctly decrypts enrolment response. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.6.2.1 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT awaiting EnrolmentResponse
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse (EnrolmentResponse)
      - }
      - then {
      - - the IUT decrypts the response
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/NB-08 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S accepts a valid enrolment response having correct fields and values. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.6.2.2
      ETSI TS 102 941 [2], see table 2
      -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT having sent an EnrolmentRequest set to MSG_ENRREQ_IUT -
      - - containing unsigned_csr.type_specific_data.sec_data_exch_ca_scope
      -
      -

      -

      - - - - containing permissions.permissions_list (V_PERM_LIST)
      -
      -

      -

      - - the IUT awaiting EnrolmentResponse
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a valid CertificateResponse (EnrolmentResponse) set to MSG_ENRRSP_TS -
      - - - containing response.certificate_chain[last]
      - - - - containing unsigned_certificate.scope.permissions.permissions_list
      - - - - - set to V_PERM_LIST -
      - }
      - then {
      - - the IUT accepts the CertificateResponse
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/NB-09 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S accepts a valid enrolment response even if the permissions in the issued certificate are a subset of requested permissions -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.6.2.2
      ETSI TS 102 941 [2], see table 2
      -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT having sent an EnrolmentRequest set to MSG_ENRREQ_IUT -
      - - containing unsigned_csr.type_specific_data.sec_data_exch_ca_scope
      -
      -

      -

      - - - - containing permissions.permissions_list (V_PERM_LIST)
      - the IUT awaiting EnrolmentResponse -
      -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a valid CertificateResponse (EnrolmentResponse) set to MSG_ENRRSP_TS -
      - - - containing response.certificate_chain[last].unsigned_certificate.scope.permissions.permissions_list
      - - - - set to a subset of V_PERM_LIST -
      -

      -

      - - }
      - then {
      - - the IUT accepts the CertificateResponse
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/NB-10-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S accepts enrolment response with different public key types -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.17
      ETSI TS 102 941 [2], see table 2
      -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with { -

      -

      - - the IUT awaiting EnrolmentResponse
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a valid CertificateResponse (EnrolmentResponse) set to MSG_ENRRSP_TS -
      - - - containing certificate_chain[last]
      - - - - containing verification_key.public_key.type
      -
      -

      -

      - - - - - - set to X_PKT_VK - -

      -

      - - - - - containing signature.ecdsa_signature.R.type
      - - - - - set to X_PKT_SIGNATURE -
      -

      -

      - - }
      - then {
      - - the IUT accepts the CertificateResponse
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_PKT_SIGNATURE - -

      -
      -

      - - X_PKT_VK - -

      -
      -

      - - PIC Selection - -

      -
      -

      - A -

      -
      -

      - compressed_lsb_y_0/1 -

      -
      -

      - compressed_lsb_y_0/1 -

      -
      -

      - PIC_Verify_CompressedKeyKey -

      -
      -

      - B -

      -
      -

      - compressed_lsb_y_0/1 -

      -
      -

      - x_coordinate_only -

      -
      -

      - PIC_Verify_CompressedKeyKey
      PIC_Verify_XCoordinateOnlyKey
      -

      -
      -

      - C -

      -
      -

      - compressed_lsb_y_0/1 -

      -
      -

      - uncompressed -

      -
      -

      - PIC_Verify_UncompressedKey -

      -
      -

      - D -

      -
      -

      - x_coordinate_only -

      -
      -

      - compressed_lsb_y_0/1 -

      -
      -

      - PIC_Verify_CompressedKeyKey
      PIC_Verify_XCoordinateOnlyKey
      -

      -
      -

      - E -

      -
      -

      - x_coordinate_only -

      -
      -

      - x_coordinate_only -

      -
      -

      - PIC_Verify_XCoordinateOnlyKey -

      -
      -

      - F -

      -
      -

      - x_coordinate_only -

      -
      -

      - uncompressed -

      -
      -

      - PIC_Verify_UncompressedKey
      PIC_Verify_XCoordinateOnlyKey
      -

      -
      -

      - G -

      -
      -

      - uncompressed -

      -
      -

      - compressed_lsb_y_0/1 -

      -
      -

      - PIC_Verify_UncompressedKey -

      -

      - PIC_Verify_CompressedKeyKey -

      -
      -

      - H -

      -
      -

      - uncompressed -

      -
      -

      - x_coordinate_only -

      -
      -

      - PIC_Verify_UncompressedKey
      PIC_Verify_XCoordinateOnlyKey
      -

      -
      -

      - I -

      -
      -

      - uncompressed -

      -
      -

      - uncompressed -

      -
      -

      - PIC_Verify_UncompressedKey -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/NB-11 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S accepts a valid enrolment response with signature calculated using compressed representation of uncompressed public keys. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.17
      ETSI TS 102 941 [2], see table 2
      -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Verify_UncompressedKey -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT awaiting EnrolmentResponse
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse (EnrolmentResponse) set to MSG_ENRRSP_TS -
      - - - containing certificate_chain[last]
      - - - - containing unsigned_certificate.verification_key.public_key.type (V_PKT_VK)
      - - - - - set to 'uncompressed'
      - - - - containing signature.ecdsa_signature
      -
      -

      -

      - - - - - - calculated using compressed representation of V_PKT_VK - -

      -

      - - }
      - then {
      - - the IUT accepts the CertificateResponse
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/NB-12 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S accepts a valid enrolment response with start_validity and lifetime. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.2
      ETSI TS 102 941 [2], see table 2
      -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT awaiting EnrolmentResponse
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse (EnrolmentResponse) set to MSG_ENRRSP_TS -
      - - - containing certificate_chain[last].unsigned_certificate
      - - - - containing cf
      - - - - - indicating use_start_validity
      -

      -

      - - - - - - indicating lifetime_is_duration
      -
      -

      -

      - - - - - containing lifetime
      - - - - - set to '10Y'
      - }
      - then {
      - - the IUT accepts the CertificateResponse
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/NB-13 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S accepts a valid enrolment response with start_validity value. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.2
      ETSI TS 102 941 [2], see table 2
      -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      - NOT PIC_Verify_LifetimeIsDuration -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT awaiting EnrolmentResponse
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a valid CertificateResponse (EnrolmentResponse) set to MSG_ENRRSP_TS -
      - - - containing certificate_chain[last].unsigned_certificate
      - - - - containing cf
      - - - - - indicating 'use_start_validity'
      -

      -

      - - - - - - and not indicating 'lifetime_is_duration'
      - - - - containing expiration
      - - - - containing start_validity
      - - - - - set to a timestamp < expiration
      -
      -

      -

      - - }
      - then {
      - - the IUT accepts the CertificateResponse
      - }
      }
      -

      -
      -

      -

      -

      - - 6.2.1.1.1.3 - - - Enrolment Request Error acceptance -
      -
      - -
      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/NB-14 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S correctly decrypts enrolment request error. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.6.2.1 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT awaiting EnrolmentResponse
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequestError (EnrolmentResponse)
      - }
      - then {
      - - the IUT decrypts the response
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/NB-15 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S accepts a valid enrolment request error having correct fields and values. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.6.2.2
      ETSI TS 102 941 [2], see table 3
      -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT having sent an EnrolmentRequest (V_REQUEST) set to MSG_ENRREQ_IUT -
      - the IUT awaiting EnrolmentResponse
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a valid CertificateRequestError (EnrolmentResponse) set to MSG_ENRERR_TS -
      -

      -

      - - - - containing request_hash
      -
      -

      -

      - - - - - set to the hash of the V_REQUEST
      -
      -
      -

      -

      - - - - - - calculated using compressed representation of all public keys
      -
      -

      -

      - - }
      - then {
      - - the IUT accepts the CertificateRequestError
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/NB-16-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S accepts enrolment request error with various types of signature public keys. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.17
      ETSI TS 102 941 [2], see table 3
      -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT awaiting EnrolmentResponse
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a valid CertificateRequestError (EnrolmentResponse) set to MSG_ENRERR_TS -
      - - - containing signature.ecdsa_signature.R.type
      - - - - set to X_PKT_SIGNATURE -
      - }
      - then {
      - - the IUT accepts the CertificateRequestError
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_PKT_SIGNATURE - -

      -
      -

      - - PIC Selection - -

      -
      -

      - A -

      -
      -

      - x_coordinate_only -

      -
      -

      - PIC_Verify_XCoordinateOnlyKey -

      -
      -

      - B -

      -
      -

      - compressed_lsb_y_0/1 -

      -
      -

      - PIC_Verify_CompressedKey -

      -
      -

      - C -

      -
      -

      - uncompressed -

      -
      -

      - PIC_Verify_UncompressedKey -

      -
      -

      -

      -

      - - 6.2.1.1.2 - - - - Exceptional Behavior -
      -
      - -
      - -
      -
      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/EB-01 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards enrolment response if the subordinate certificate's validity region is large than the issuing certificate's validity region. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.5.3.3 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT awaiting EnrolmentResponse
      - and the TS configured to use EA certificate CERT_EA -
      -

      -

      - - - containing unsigned_certificate.scope.region
      -
      -

      -

      - - - - set to REGION_SMALL -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse (EnrolmentResponse) set to MSG_ENRRSP_TS -
      -

      -

      - - - - containing certificate_chain[last] (CERT_ENR_TS) -

      -

      - - - - - containing unsigned_certificate.scope.region
      -
      -

      -

      - - - - - - set to REGION_LARGE -
      - }
      - then {
      - - the IUT discards the CertificateResponse
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/EB-02 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards enrolment response if the subordinate certificate's validity region is outside of the issuing certificate's validity region. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.5.3.3 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT awaiting EnrolmentResponse
      - and the TS configured to use EA certificate CERT_EA -
      -

      -

      - - - containing unsigned_certificate.scope.region
      -
      -

      -

      - - - - set to REGION_SMALL -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse (EnrolmentResponse) set to MSG_ENRRSP_TS -
      -

      -

      - - - - containing certificate_chain[last] (CERT_ENR_TS) -

      -

      - - - - - containing unsigned_certificate.scope.region
      -
      -

      -

      - - - - - - set to REGION_OUTSIDE - -

      -

      - - }
      - then {
      - - the IUT discards the CertificateResponse
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/EB-03 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards enrolment response if the subordinate certificate's validity period is longer than issuing certificate's validity period. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.5.3.3 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT awaiting EnrolmentResponse
      - and the TS configured to use EA certificate CERT_EA -
      -

      -

      - } -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse (EnrolmentResponse) set to MSG_ENRRSP_TS -
      -

      -

      - - - - containing certificate_chain[last] (CERT_ENR_TS) -

      -

      - - - - - containing unsigned_certificate.expiration > CERT_EA.unsigned_certificate.expiration
      -
      -

      -

      - - }
      - then {
      - - the IUT discards the CertificateResponse
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/EB-04 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards enrolment response if the subordinate certificate's permissions are not included in issuing certificate. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.5.3.3 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT has sent a valid EnrolmentRequest set to MSG_ENRREQ_IUT -
      - - containing unsigned_csr.type_specific_data.sec_data_exch_ca_scope.permissions.permissions_list
      -
      -

      -

      - - - - set to array [2]
      - - - - containing PSID_A -
      -

      -

      - - - - - containing PSID_B - -

      -

      - - and the IUT awaiting EnrolmentResponse
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse (EnrolmentResponse) set to MSG_ENRRSP_TS -
      -

      -

      - - - - containing certificate_chain[last-1] (CERT_EA)
      -
      -

      -

      - - - - - containing unsigned_certificate.scope.permissions.permissions_list
      -
      -

      -

      - - - - - - set to array[1]
      -
      -

      -

      - - - - - - - containing PSID_A - -

      -

      - - - - containing certificate_chain[last] (CERT_ENR_TS) -

      -

      - - - - - containing unsigned_certificate.scope.permissions.permissions_list
      -
      -

      -

      - - - - - - set to array[1] -

      -

      - - - - - - - containing PSID_B - -

      -

      - - }
      - then {
      - - the IUT discards the CertificateResponse
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/EB-05-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards enrolment response if the message content type is different than 'encrypted'. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.6.2.1 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT awaiting EnrolmentResponse
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data structure
      - - - containing type
      - - - - set to X_INVALID_CONTENT_TYPE -
      - - - containing encrypted_data.ciphertext
      /----------------- After deciphering process -------------------
      - - - - containing type
      - - - - - set to 'certificate_response'
      - - - - containing response
      - - - - - set to MSG_ENRRSP_TS -
      /------------------------------------------------------------------------
      - }
      - then {
      - - the IUT discards the received message
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_INVALID_CONTENT_TYPE - -

      -
      -

      - A -

      -
      -

      - unsecured (0), -

      -
      -

      - B -

      -
      -

      - signed(1) -

      -
      -

      - C -

      -
      -

      - certificate_request(3) -

      -
      -

      - D -

      -
      -

      - certificate_response(4) -

      -
      -

      - E -

      -
      -

      - anonymous_certificate_response(5) -

      -
      -

      - F -

      -
      -

      - certificate_request_error(6) -

      -
      -

      - G -

      -
      -

      - crl_request(7) -

      -
      -

      - H -

      -
      -

      - crl(8) -

      -
      -

      - I -

      -
      -

      - signed_partial_payload(9) -

      -
      -

      - J -

      -
      -

      - signed_external_payload(10) -

      -
      -

      - K -

      -
      -

      - signed_wsa(11) -

      -
      -

      - L -

      -
      -

      - certificate_response_acknowledgment (12) -

      -
      -

      - M -

      -
      -

      - ANY_VALUE(128) -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/EB-06-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards enrolment response if the protocol_version is not 2. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.1 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT awaiting EnrolmentResponse
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data structure
      - - - containing protocol_version
      - - - - set to X_INVALID_VERSION_NUMBER -
      - - - containing type
      - - - - set to 'encrypted'
      - - - containing encrypted_data.ciphertext
      /----------------- After deciphering process -------------------
      - - - - containing type
      - - - - - set to 'certificate_response'
      - - - - containing response
      - - - - - set to MSG_ENRRSP_TS -
      /-----------------------------------------------------------------------
      - }
      - then {
      - - the IUT discards the received message
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_INVALID_VERSION_NUMBER - -

      -
      -

      - A -

      -
      -

      - 0 -

      -
      -

      - B -

      -
      -

      - 1 -

      -
      -

      - C -

      -
      -

      - 3 -

      -
      -

      - D -

      -
      -

      - 255 -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/EB-07 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards enrolment request error if the signer type is not valid. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.4 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT awaiting EnrolmentResponse
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data structure
      - - - containing signed_data.signer.type
      - - - - set to 'self'
      - }
      - then {
      - - the IUT discards the received message
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/EB-08-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards enrolment respond if the certificate is not an explicit one. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.1 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT awaiting EnrolmentResponse
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse (EnrolmentResponse) set to MSG_ENRRSP_TS -
      - - - containing certificate_chain[last].version_and_type
      - - - - set to X_INVALID_CERT_VERSION_AND_TYPE -
      - }
      - then {
      - - the IUT discards the received message
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_INVALID_CERT_VERSION_AND_TYPE - -

      -
      -

      - A -

      -
      -

      - 0 -

      -
      -

      - B -

      -
      -

      - 1 -

      -
      -

      - C -

      -
      -

      - 3 -

      -
      -

      - D -

      -
      -

      - 255 -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/EB-09 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards enrolment response if the hash was not calculated using compressed representation of public keys. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.1 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Verify_UncompressedKey -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT awaiting EnrolmentResponse
      -

      -

      - - and the TS configured to use EA certificate CERT_EA - -

      -

      - - - containing unsigned_certificate.verification_key.public_key.type (V_PKT_VK_EA)
      -
      -

      -

      - - - - set to 'uncompressed' -

      -

      - - - containing unsigned_certificate.encryption_key.public_key.type (V_PKT_EK_EA)
      -
      -

      -

      - - - - set to 'uncompressed' -

      -

      - } -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse (EnrolmentResponse) set to MSG_ENRRSP_TS -
      -

      -

      - - - - containing certificate_chain[last]
      - - - - containing unsigned_certificate.signer_id
      -
      -

      -

      - - - - - - calculated using uncompressed representation of V_PKT_VK_EA and V_PKT_EK_EA - -

      -

      - - }
      - then {
      - - the IUT discards the received message
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/EB-10 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards enrolment response without specified expiration time. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.2 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT awaiting EnrolmentResponse
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse (EnrolmentResponse) set to MSG_ENRRSP_TS -
      - - - containing certificate_chain[last].unsigned_certificate.expiration
      - - - - set to 0
      - }
      - then {
      - - the IUT discards the received message
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/EB-11 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards enrolment response which includs PSIDs that are not specified in upper certificates. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.2 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT awaiting EnrolmentResponse
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse (EnrolmentResponse) set to MSG_ENRRSP_TS -
      -

      -

      - - - - containing certificate_chain
      -
      -

      -

      - - - - - set to array with length > 1
      -
      -

      -

      - - - - containing certificate_chain[last-1].unsigned_certificate.scope.permissions.permissions_list
      -
      -

      -

      - - - - - set to array[1]
      - - - - - containing PSID_A -
      -

      -

      - - - - containing certificate_chain[last].unsigned_certificate.scope.permissions.permissions_list
      -
      -

      -

      - - - - - set to array[1] -

      -

      - - - - - - containing PSID_B - -

      -

      - - }
      - then {
      - - the IUT discards the CertificateResponse
      - }
      }
      -

      -
      -

      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/EB-12 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards enrolment response if it has duplicated PSID. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.9 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT having sent an EnrolmentRequest set to MSG_ENRREQ_IUT -
      - - containing unsigned_csr.type_specific_data.sec_data_exch_ca_scope
      - - - containing permissions.permissions_list (V_PERM_LIST)
      - the IUT awaiting EnrolmentResponse
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse (EnrolmentResponse) set to MSG_ENRRSP_TS -
      - - containing unsigned_certificate.scope.permissions.permissions_list
      - - - set to array[2]
      - - - - containing V_PERM_LIST[0]
      - - - - containing V_PERM_LIST[0]
      - }
      - then {
      - - the IUT discards the received message
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/EB-13-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards enrolment response if the latitude is less than –900 000 000 or greater than 900 000 000. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.18 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT awaiting EnrolmentResponse
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse (EnrolmentResponse) set to MSG_ENRRSP_TS -
      - - - containing certificate_chain[last].unsigned_certificate
      -

      -

      - - - - - containing scope.region.circular_region.center.latitude
      - - - - - set to X_INVALID_LATITUDE -
      -

      -

      - - }
      - then {
      - - the IUT discards the received message
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_INVALID_LATITUDE - -

      -
      -

      - A -

      -
      -

      - 900000001 -

      -
      -

      - B -

      -
      -

      - -900000001 -

      -
      -

      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/ENR/EB-14-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards enrolment response if the longitude is less than -1 800 000 000 or greater than 1 800 000 000. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.18 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT awaiting EnrolmentResponse
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse set to MSG_ENRRSP_TS -
      - - - containing certificate_chain[last].unsigned_certificate
      -
      -

      -

      - - - - - containing scope.region.circular_region.center.longitude
      - - - - - set to X_INVALID_LONGITUDE -
      - }
      - then {
      - - the IUT discards the received message
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_INVALID_LONGITUDE - -

      -
      -

      - A -

      -
      -

      - 1800000001 -

      -
      -

      - B -

      -
      -

      - -1800000001 -

      -
      -

      -

      -

      - - 6.2.1.2Authorization
      -
      -
      -

      -
      - - 6.2.1.2.1 - - Normal Behavior -
      -
      -
      -
      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/NB-01 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S generates correctly a generic AuthorizationRequest message. -

      -
      -

      - - Reference - -

      -
      -

      - ETSI TS 102 941 [2], see table 4 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT is requested to send an AuthorizationRequest message
      - }
      - then {
      - - the IUT sends a valid CertificateRequest set to MSG_AUTHREQ_IUT -
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/NB-02-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S generates authorization request with various signature types. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.17 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -

      -

      - - the IUT is configured to use signature of type X_PKT_SIGNATURE -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT is requested to send an AuthorizationRequest message
      - }
      - then {
      - - the IUT sends a valid CertificateRequest set to MSG_AUTHREQ_IUT -
      - - - containing signature.ecdsa_signature.R.type
      - - - - set to X_PKT_SIGNATURE -
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - PIC Selection - -

      -
      -

      - - X_PKT_SIGNATURE - -

      -
      -

      - A -

      -
      -

      - PIC_Generate_CompressedKey -

      -
      -

      - compressed_lsb_y_0/1 -

      -
      -

      - B -

      -
      -

      - PIC_Generate_XCoordinateOnlyKey -

      -
      -

      - x_coordinate_only -

      -
      -

      - C -

      -
      -

      - PIC_Generate_UncompressedKey -

      -
      -

      - uncompressed -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/NB-03 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S generates valid authorization request with a certificate containing lifetime field when cf flag is set use_start_validity and lifetime_is_duration. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.2 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Generate_StartValidity AND PIC_Generate_LifetimeIsDuration -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT is configured to use use_start_validity and lifetime_is_duration -

      -

      - } -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT is requested to send an AuthorizationRequest message
      -

      -

      - - }
      - then {
      - - the IUT sends a valid CertificateRequest set to MSG_AUTHREQ_IUT -
      - - - containing unsigned_csr
      - - - - containing cf
      - - - - - indicating 'use_start_validity' -
      -
      - - - - - indicating 'lifetime_is_duration' -
      -
      - - - - containing lifetime
      -

      -

      - - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/NB-04 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S generates valid authorization request with a certificate containing start_validity field when cf flag is set use_start_validity. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.2 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Generate_StartValidity AND NOT PIC_Generate_LifetimeIsDuration -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT is configured to use 'use_start_validity' but not 'lifetime_is_duration' -

      -

      - } -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT is requested to send an AuthorizationRequest message
      - }
      - then {
      - - the IUT sends a valid CertificateRequest set to MSG_AUTHREQ_IUT -
      - - - containing unsigned_csr
      - - - - containing cf
      - - - - - indicating 'use_start_validity' -
      -
      - - - - - not indicating 'lifetime_is_duration' -
      -
      - - - - containing start_validity
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/NB-05 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S generates valid authorization request with a CSR certificate with name of length > 0 and <= 32. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.19 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - } -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT is requested to send an AuthorizationRequest message
      - }
      - then {
      - - the IUT sends a valid CertificateRequest set to MSG_AUTHREQ_IUT -
      - - - containing unsigned_csr.containing type_specific_data.id_scope.name
      - - - - set to value of length > 0 and <= 32 or of length zero (see Note) -
      - }
      }
      -
      -

      -
      -

      - NOTE: Value of length 0 is encoded as '00'. -

      -
      -

      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/NB-06 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S generates valid authorization request with a certificate containing more than 8 entries in the permissions_list field. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.9 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Generate_PsidArrayWithMoreThan8Entries -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - } -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT is requested to send an AuthorizationRequest message with more than 8 PSID entries
      - }
      - then {
      - - the IUT sends a valid CertificateRequest set to MSG_AUTHREQ_IUT -
      - - - containing unsigned_csr.type_specific_data.id_scope.permissions.permissions_list
      - - - - set to array with length > 8
      -

      -

      - - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/NB-07-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S generates valid authorization request with a certificate containing 1 to 8 entries in the permissions_list field. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.23 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - } -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT is requested to send an AuthorizationRequest message with X_N PSID items
      - }
      - then {
      - - the IUT sends a valid CertificateRequest set to MSG_AUTHREQ_IUT -
      - - - containing unsigned_csr.type_specific_data.id_scope.permissions.permissions_list
      - - - - set to array with length X_N -
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_N - -

      -
      -

      - A -

      -
      -

      - 1 -

      -
      -

      - B -

      -
      -

      - 4 -

      -
      -

      - C -

      -
      -

      - 8 -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/NB-08 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S generates valid authorization request with a valid hash. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.1 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Generate_UncompressedKey -

      -
      -

      - - Initial conditions - -

      -
      -

      - with { -

      -

      - - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has obtained an Enrolment Certificate (CERT_ENR_TS)
      -
      -

      -

      - - - containing unsigned_certificate.verification_key.public_key.type (V_PKT_VK_ENR) - -

      -

      - - - - set to 'uncompressed' -

      -

      - } -

      -
      -

      - - Expected behaviour - -

      -
      -

      -

      - ensure that {
      - when {
      - - the IUT is requested to send an AuthorizationRequest message
      - }
      - then {
      - - the IUT sends a valid CertificateRequest set to MSG_AUTHREQ_IUT -
      - - - containing signer
      -

      -

      - - - - - containing certificate or certificates[last] -

      -

      - - - - - - containing unsigned_certificate.signer_id -

      -

      - - - - - - - calculated using compressed representation of V_PKT_VK_ENR
      -
      -
      -

      -

      - - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/NB-09 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S generates valid authorization request with a valid signature. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.33 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Generate_UncompressedKey -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT is configured to send requests with uncompressed verification_key
      - the IUT is configured to send requests with uncompressed response_encryption_key
      -

      -

      - } -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT is requested to send an AuthorizationRequest message
      - }
      - then {
      - - the IUT sends a valid CertificateRequest set to MSG_AUTHREQ_IUT -
      -

      -

      - - - - containing unsigned_csr.verification_key.public_key.type (V_PKT_VK)
      -
      -

      -

      - - - - - set to 'uncompressed' - - containing unsigned_csr.response_encryption_key.public_key.type (V_PKT_REK)
      -
      -

      -

      - - - - - set to 'uncompressed' -

      -

      - - - - containing signature.ecdsa_signature -

      -

      - - - - - calculated using compressed representation of V_PKT_VK and V_PKT_REK
      -
      -
      -

      -

      - - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/NB-10 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S generates valid authorization request with a different response_encryption_key for every request. -

      -
      -

      - - Reference - -

      -
      -

      - [1], clause 6.3.34 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - } -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - each time the IUT is requested to send an AuthorizationRequest message
      - }
      - then {
      - - the IUT sends a valid CertificateRequest set to MSG_AUTHREQ_IUT -
      - - - containing unsigned_csr.response_encryption_key
      - - - - set to value <> from the previous ones
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/NB-11 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S accepts a valid authorization response having correct fields and values. -

      -
      -

      - - Reference - -

      -
      -

      - ETSI TS 102 867 [3], clause 5.1.2.1, table 14 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has sent a valid AuthorizationRequest set to MSG_AUTHREQ_IUT -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a valid CertificateResponse (AuthorizationResponse) set to MSG_AUTHRSP_TS -
      - }
      - then {
      - - the IUT accepts the CertificateResponse
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/NB-12 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S accepts a valid authorization response having correct fields and values. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.6.2.2 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has sent a valid CertificateRequest set to MSG_AUTHREQ_IUT - -

      -

      - - - containing unsigned_csr.type_specific_data.permission.permissions_list
      - - - set to array
      -
      -

      -

      - - - - - containing PSID_A - -

      -

      - - - - - containing PSID_B - -

      -

      - -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a valid CertificateResponse set to MSG_AUTHRSP_TS -
      - - - containing certificate_chain[last].unsigned_certificate.type_specific_data.ANY_SCOPE -
      - - - - containing permissions.permissions_list
      - - - - - set to array
      -
      -

      -

      - - - - - - - not containing PSID_A - -

      -

      - - }
      - then {
      - - the IUT accepts the CertificateResponse
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/NB-13-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S accepts a valid authorization response signed by ecdsa_signature with different public key types. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.17 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has sent a valid AuthorizationRequest set to MSG_AUTHREQ_IUT -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a valid CertificateResponse (AuthorizationResponse) to MSG_AUTHRSP_TS -
      - - - containing certificate_chain[last].signature.ecdsa_signature.R
      - - - - containing type set to X_PKT_SIGNATURE -
      - }
      - then {
      - - the IUT accepts the CertificateResponse
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - PIC Selection - -

      -
      -

      - - X_PKT_SIGNATURE - -

      -
      -

      - A -

      -
      -

      - PIC_Verify_CompressedKey -

      -
      -

      - compressed_lsb_y_0/1 -

      -
      -

      - B -

      -
      -

      - PIC_Verify_XCoordinateOnlyKey -

      -
      -

      - x_coordinate_only -

      -
      -

      - C -

      -
      -

      - PIC_Verify_UncompressedKey -

      -
      -

      - uncompressed -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/NB-14 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S accepts a valid authorization response with start_validity. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.2 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Verify_StartValidity AND PIC_Verify_LifetimeIsDuration -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has sent a valid AuthorizationRequest set to MSG_AUTHREQ_IUT -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a valid CertificateResponse set to MSG_AUTHRSP_TS -
      - - - containing certificate_chain[last].unsigned_certificate
      - - - - containing cf
      - - - - - indicating 'use_start_validity'
      - - - - - not indicating 'lifetime_is_duration'
      - - - - containing start_validity
      - - - - not containing lifetime
      - }
      - then {
      - - the IUT accepts the CertificateResponse
      - }
      }
      -

      -
      -

      -

      -

      - - 6.2.1.2.2 - - Exceptional Behavior -
      -
      -
      -
      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/EB-01-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S discards an authorization response having a non-permitted subject_type. -

      -
      -

      - - Reference - -

      -
      -

      - ETSI TS 102 867 [3], clause 5.1.2.1, IEEE P1609.2/D12 [1], clauses 5.5.3.3 and 5.6.1.2 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has sent a valid AuthorizationRequest set to MSG_AUTHREQ_IUT -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse (AuthorizationResponse) set to MSG_AUTHRSP_TS -
      - - - containing certificate_chain[last].unsigned_certificate.subject_type
      - - - - set to X_INVALID_SUBJECT_TYPE -
      - }
      - then {
      - - the IUT discards the CertificateResponse
      - }
      }
      -
      -
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_INVALID_SUBJECT_TYPE - -

      -
      -

      - A -

      -
      -

      - sec_data_exch_identified_not_localized (1) -

      -
      -

      - B -

      -
      -

      - sec_data_exch_csr (3) -

      -
      -

      - C -

      -
      -

      - wsa (4) -

      -
      -

      - D -

      -
      -

      - wsa_csr (5) -

      -
      -

      - E -

      -
      -

      - sec_data_exch_ca(6) -

      -
      -

      - F -

      -
      -

      - wsa_ca (7) -

      -
      -

      - H -

      -
      -

      - crl_signer(8) -

      -
      -

      - I -

      -
      -

      - root_ca (255) -

      -
      -

      - G -

      -
      -

      - ANY OTHER (128) -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/EB-02-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S discards an authorization response having a non-permitted cf. -

      -
      -

      - - Reference - -

      -
      -

      - ETSI TS 102 867 [3], clause 5.1.2.1, IEEE P1609.2/D12 [1], clauses 5.5.3.3 and 5.6.1.2 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has sent a valid AuthorizationRequest set to MSG_AUTHREQ_IUT -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse set to MSG_AUTHRSP_TS -
      - - - containing certificate_chain[last].unsigned_certificate.cf
      -

      -

      - - - - - indicating X_INVALID_CONTENT_FLAGS -
      - }
      - then {
      - - the IUT discards the CertificateResponse
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_INVALID_SUBJECT_TYPE - -

      -
      -

      - - PIC Selection - -

      -
      -

      - A -

      -
      -

      - use_start_validity (0) -

      -
      -

      - NOT PIC_Verify_StartValidity -

      -
      -

      - B -

      -
      -

      - encryption_key (2) -

      -
      -

      -

      - C -

      -
      -

      - any value (3) -

      -
      -

      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/EB-03-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S discards an authorization response having a non-permitted PsidArray.type. -

      -
      -

      - - Reference - -

      -
      -

      - ETSI TS 102 867 [3], clause 5.1.2.1, IEEE P1609.2/D12 [1], clauses 5.5.3.3 and 5.6.1.2 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has sent a valid AuthorizationRequest set to MSG_AUTHREQ_IUT -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse (AuthorizationResponse) set to MSG_AUTHRSP_TS -
      - - - containing certificate_chain[last].unsigned_certificate.type_specific_data.ANY_SCOPE.permissions.type
      - - - - set to a X_INVALID_PERM_TYPE
      -
      -

      -

      - - }
      - then {
      - - the IUT discards the CertificateResponse
      - }
      }
      -

      -
      -

      - Variants -

      -
      -

      - - X - -

      -
      -

      - - X_INVALID_PERM_TYPE - -

      -
      -

      - A -

      -
      -

      - from_issuer (0) -

      -
      -

      - B -

      -
      -

      - Any value (3) -

      -
      -

      - C -

      -
      -

      - Any value (255) -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/EB-04 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S discards an authorization response requesting acknowledgement. -

      -
      -

      - - Reference - -

      -
      -

      - ETSI TS 102 867 [3], clause 5.1.2.1, IEEE P1609.2/D12 [1], clauses 5.5.3.3 and 5.6.1.2 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has sent a valid AuthorizationRequest set to MSG_AUTHREQ_IUT -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse (AuthorizationResponse) set to MSG_AUTHRSP_TS -
      - - - containing f
      - - - - indicating 'Requested'
      - }
      - then {
      - - the IUT discards the CertificateResponse
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/EB-05 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S discards an authorization response that does not comply with the authorization request. -

      -
      -

      - - Reference - -

      -
      -

      - ETSI TS 102 867 [3], clause 5.1.2.1, IEEE P1609.2/D12 [1], clauses 5.5.3.3 and 5.6.1.2 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has sent a valid AuthorizationRequest set to MSG_AUTHREQ_IUT -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse (AuthorizationResponse) set to MSG_AUTHRSP_TS -
      - - - containing fields that does not comply with the authorization request
      - }
      - then {
      - - the IUT discards the CertificateResponse
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/EB-06 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S discards an authorization response error with incorrect signerIdentifier_type. -

      -
      -

      - - Reference - -

      -
      -

      - ETSI TS 102 867 [3], clause 5.1.2.1, IEEE P1609.2/D12 [1], clauses 5.5.3.3 and 5.6.1.2 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has sent a valid AuthorizationRequest set to MSG_AUTHREQ_IUT -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequestError set to MSG_AUTHERR_TS -
      - - - containing signer.type
      - - - - set to 'self'
      - }
      - then {
      - - the IUT discards the CertificateRequestError
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/EB-07-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S discards an authorization response error having a non-permitted subject_type. -

      -
      -

      - - Reference - -

      -
      -

      - ETSI TS 102 867 [3], clause 5.1.2.1, IEEE P1609.2/D12 [1], clauses 5.5.3.3 and 5.6.1.2 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has sent a valid AuthorizationRequest set to MSG_AUTHREQ_IUT -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequestError set to MSG_AUTHERR_TS -
      - - - containing signer.certificates[last].unsigned_certificate.subject_type
      - - - - set to X_INVALID_SUBJECT_TYPE -
      - }
      - then {
      - - the IUT discards the CertificateRequestError
      - }
      }
      -

      -
      -

      - Variants -

      -
      -

      - - X - -

      -
      -

      - - X_INVALID_SUBJECT_TYPE - -

      -
      -

      - A -

      -
      -

      - sec_data_exch_identified_not_localized (1) -

      -
      -

      - B -

      -
      -

      - sec_data_exch_csr (3) -

      -
      -

      - C -

      -
      -

      - wsa (4) -

      -
      -

      - D -

      -
      -

      - wsa_csr (5) -

      -
      -

      - E -

      -
      -

      - sec_data_exch_ca(6) -

      -
      -

      - F -

      -
      -

      - wsa_ca (7) -

      -
      -

      - H -

      -
      -

      - crl_signer(8) -

      -
      -

      - I -

      -
      -

      - root_ca (255) -

      -
      -

      - G -

      -
      -

      - ANY OTHER (128) -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/EB-08 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S discards an authorization response having the subordinate certificate's validity region not wholly contained in the issuing certificate's validity region. -

      -
      -

      - - Reference - -

      -
      -

      - ETSI TS 102 867 [3], clause 5.1.2.1, IEEE P1609.2/D12 [1], clauses 5.5.3.3 and 5.6.1.2 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has sent a valid AuthorizationRequest set to MSG_AUTHREQ_IUT -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse set to MSG_AUTHRSP_TS -
      - - - containing certificate_chain[n].scope.region
      - - - - set to REGION_SMALL -
      - - - containing certificate_chain[n+1].scope.region
      - - - - set to REGION_INTERSECTING -
      - }
      - then {
      - - the IUT discards the CertificateResponse
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/EB-09 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S discards an authorization response error having the subordinate certificate's validity region not wholly contained in the issuing certificate's validity region. -

      -
      -

      - - Reference - -

      -
      -

      - ETSI TS 102 867 [3], clause 5.1.2.1, IEEE P1609.2/D12 [1], clauses 5.5.3.3 and 5.6.1.2 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has sent a valid AuthorizationRequest set to MSG_AUTHREQ_IUT -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequestError set to MSG_AUTHERR_TS -
      - - - containing signer
      - - - - containing certificates[n].scope.region
      - - - - - set to REGION_SMALL -
      - - - - containing certificates[n+1].scope.region
      - - - - - set to REGION_INTERSECTING -
      - }
      - then {
      - - the IUT discards the CertificateRequestError
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/EB-10 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S discards an authorization response having the subordinate certificate's validity region not within in the issuing certificate's validity region. -

      -
      -

      - - Reference - -

      -
      -

      - ETSI TS 102 867 [3], clause 5.1.2.1, IEEE P1609.2/D12 [1], clauses 5.5.3.3 and 5.6.1.2 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has sent a valid AuthorizationRequest set to MSG_AUTHREQ_IUT -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse set to MSG_AUTHRSP_TS -
      - - - containing certificate_chain[n].scope.region
      - - - - set to REGION_SMALL -
      - - - containing certificate_chain[n+1].scope.region
      - - - - set to REGION_OUTSIDE -
      - }
      - then {
      - - the IUT discards the CertificateResponse
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/EB-11 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S discards an authorization response error having the subordinate certificate's validity region not within in the issuing certificate's validity region. -

      -
      -

      - - Reference - -

      -
      -

      - ETSI TS 102 867 [3], clause 5.1.2.1, IEEE P1609.2/D12 [1], clauses 5.5.3.3 and 5.6.1.2 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has sent a valid AuthorizationRequest set to MSG_AUTHREQ_IUT -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequestError set to MSG_AUTHERR_TS -
      - - - containing signer
      - - - - containing certificates[n].scope.region
      - - - - - set to REGION_SMALL -
      - - - - containing certificates[n+1].scope.region
      - - - - - set to REGION_OUTSIDE -
      - }
      - then {
      - - the IUT discards the CertificateRequestError
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/EB-12 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S discards an authorization response having the subordinate certificate operational permissions are not a subset ofthe issuing certificate operational permissions. -

      -
      -

      - - Reference - -

      -
      -

      - ETSI TS 102 867 [3], clause 5.1.2.1, IEEE P1609.2/D12 [1], clauses 5.5.3.3 and 5.6.1.2 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has sent a valid AuthorizationRequest set to MSG_AUTHREQ_IUT -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse set to MSG_AUTHRSP_TS -
      - - - containing certificate_chain[n].scope.permissions
      - - - - not indicating PSID_A -
      - - - containing certificate_chain[n+1].scope.permissions
      - - - - indicating PSID_A -
      - }
      - then {
      - - the IUT discards the CertificateResponse
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/EB-13 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S discards an authorization response error having the subordinate certificate operational permissions are not a subset ofthe issuing certificate operational permissions. -

      -
      -

      - - Reference - -

      -
      -

      - ETSI TS 102 867 [3] clause 5.1.2.1, IEEE P1609.2/D12 [1], 5.5.3.3, 5.6.1.2 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has sent a valid AuthorizationRequest set to MSG_AUTHREQ_IUT -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequestError set to MSG_AUTHERR_TS -
      - - - containing signer
      - - - - containing certificates[n].scope.permissions
      - - - - - not indicating PSID_A -
      - - - - containing certificates[n+1].scope.permissions
      - - - - - indicating PSID_A -
      - }
      - then {
      - - the IUT discards the CertificateRequestError
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/EB-14-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S discards an authorization response encapsulated into 1609Dot2Data with protocol_version not egal to 2. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.1 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has sent a valid AuthorizationRequest set to MSG_AUTHREQ_IUT -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data structure
      - - - containing protocol_version
      - - - - set to X_INVALID_VERSION_NUMBER -
      - - - containing type
      - - - - set to 'encrypted'
      - - - containing encrypted_data.ciphertext
      /----------------- After deciphering process -------------------
      - - - - containing type
      - - - - - set to 'certificate_response'
      - - - - containing request
      - - - - - set to MSG_AUTHRSP_TS -
      /------------------------------------------------------------------------
      - }
      - then {
      - - the IUT discards the CertificateResponse
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_INVALID_VERSION_NUMBER - -

      -
      -

      - A -

      -
      -

      - 0 -

      -
      -

      - B -

      -
      -

      - 1 -

      -
      -

      - C -

      -
      -

      - 3 -

      -
      -

      - D -

      -
      -

      - 255 -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/EB-15-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S discards an authorization request error encapsulated into 1609Dot2Data with protocol_version not egal to 2. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.1 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has sent a valid AuthorizationRequest set to MSG_AUTHREQ_IUT -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data structure
      - - - containing protocol_version
      - - - - set to X_INVALID_VERSION_NUMBER -
      - - - containing type
      - - - - set to 'encrypted'
      - - - containing encrypted_data.ciphertext
      /----------------- After deciphering process -------------------
      - - - - containing type
      - - - - - set to 'certificate_request_error'
      - - - - containing request
      - - - - - set to MSG_AUTHERR_TS -
      /-----------------------------------------------------------------------
      - }
      - then {
      - - the IUT discards the CertificateResponse
      - }
      }
      -

      -
      -

      - Variants -

      -
      -

      - - X - -

      -
      -

      - - X_INVALID_VERSION_NUMBER - -

      -
      -

      - A -

      -
      -

      - 0 -

      -
      -

      - B -

      -
      -

      - 1 -

      -
      -

      - C -

      -
      -

      - 3 -

      -
      -

      - D -

      -
      -

      - 255 -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/EB-16 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S discards an authorization response with zero value in all expiration fields. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.2 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has sent a valid AuthorizationRequest set to MSG_AUTHREQ_IUT -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse (AuthorizationResponse) set to MSG_AUTHRSP_TS -
      -

      -

      - - - - containing certificate_chain[last].unsigned_certificate
      - - - - containing expiration
      -
      -

      -

      - - - - - - set to 0
      -
      -

      -

      - - }
      - then {
      - - the IUT discards the CertificateResponse
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/EB-17 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S discards an authorization response with duplicate PSIDs. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.9 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has sent a valid AuthorizationRequest set to MSG_AUTHREQ_IUT -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse (AuthorizationResponse) set to MSG_AUTHRSP_TS -
      - - - containing certificate_chain[last].unsigned_certificate
      - - - - containing type_specific_data.ANY_SCOPE.permissions.permissions_list
      - - - - - set to array[2]
      - - - - - - containing PSID_A -
      - - - - - - containing PSID_A -
      - }
      - then {
      - - the IUT discards the CertificateResponse
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/EB-18-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S discards an authorization response with wrongly encoded latitude field. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.18 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has sent a valid AuthorizationRequest set to MSG_AUTHREQ_IUT -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse (AuthorizationResponse) set to MSG_AUTHRSP_TS -
      - - - containing certificate_chain[last].unsigned_certificate
      -
      -

      -

      - - - - - containing scope.region.circular_region.center.latitude
      - - - - - set to X_INVALID_LATITUDE -
      - }
      - then {
      - - the IUT discards the CertificateResponse
      - }
      }
      -

      -
      -

      - Variants -

      -
      -

      - - X - -

      -
      -

      - - X_INVALID_LATITUDE - -

      -
      -

      - A -

      -
      -

      - 900000001 -

      -
      -

      - B -

      -
      -

      - -900000001 -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/EB-19-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S discards an authorization response with wrongly encoded longitude field. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.18 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has sent a valid AuthorizationRequest set to MSG_AUTHREQ_IUT -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse set to MSG_AUTHRSP_TS -
      -

      -

      - - - - containing certificate_chain[last].unsigned_certificate
      -
      -

      -

      - - - - - containing scope.region.circular_region.center.longitude
      - - - - - set to X_INVALID_LONGITUDE -
      - }
      - then {
      - - the IUT discards the CertificateResponse
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_INVALID_LONGITUDE - -

      -
      -

      - A -

      -
      -

      - 1800000001 -

      -
      -

      - B -

      -
      -

      - -1800000001 -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/EB-20 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S discards an authorization response with an empty PsidSspArray. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.23 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has sent a valid AuthorizationRequest set to MSG_AUTHREQ_IUT -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse (AuthorizationResponse) set to MSG_AUTHRSP_TS -
      - - - containing certificate_chain[last].unsigned_certificate
      -
      -

      -

      - - - - - containing ANY_SCOPE.permissions.permissions_list
      - - - - - set to array of length 0
      -
      -

      -

      - - }
      - then {
      - - the IUT discards the CertificateResponse
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/EB-21 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S discards an authorization response with a certificate having a too long service_specific_permission field. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.24 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has sent a valid AuthorizationRequest set to MSG_AUTHREQ_IUT -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateResponse set to MSG_AUTHRSP_TS -
      - - - containing certificate_chain[last].unsigned_certificate
      - - - - containing type_specific_data.ANY_SCOPE.permissions.permissions_list
      - - - - - set to array[1]
      -
      -

      -

      - - - - - - - containing a PsidSpp (V_PSIDSSPP_A)
      - - - - - - - containing service_specific_permission
      -
      -

      -

      - - - - - - - - - longer than 31 octets
      -
      -

      -

      - - - - - containing a service_specific_permission
      - - - - - having a length > 32 octets
      - }
      - then {
      - - the IUT discards the CertificateResponse
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/AUTH/EB-22 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S discards an authorization request error with having a wrongly calculated request_hash. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.1 -

      -
      -

      - - Config Id - -

      -
      -

      - CF03 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Verify_UncompressedKey -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Enrolled state -
      -
      -

      -

      - - the IUT has sent a valid AuthorizationRequest set to MSG_AUTHREQ_IUT - -

      -

      - - - containing unsigned_csr.verification_key.public_key.type (V_PKT_VK)
      - - - set to 'uncompressed'
      -

      -

      - } -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequestError set to MSG_AUTHERR_TS -
      - - - containing request_hash
      - - - - calculated using uncompressed representation of V_PKT_VK -
      -

      -

      - - }
      - then {
      - - the IUT discards the CertificateRequestError
      - }
      }
      -

      -
      -

      -

      -

      - - 6.2.1.3 - - Send - - ing Data -
      -
      -
      -
      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/S-DATA/NB-01 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S sends a correctly signed message with payload. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.7 -

      -
      -

      - - Config Id - -

      -
      -

      - CF04 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Generate_SignPayload -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Authorized state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT is requested to send a signed message
      - }
      - then {
      - - the IUT sends a valid 1609Dot2Data set to MSG_SIGNED_IUT -
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/S-DATA/NB-02 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S sends correctly signed message with partial payload. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.7 -

      -
      -

      - - Config Id - -

      -
      -

      - CF04 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Generate_SignPartialPayload -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Authorized state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT is requested to send a signed message with partial data
      - }
      - then {
      - - the IUT sends a valid 1609Dot2Data set to MSG_SIGNED_IUT -
      -

      -

      - - - - containing type
      - - - - set to 'signed_partial_payload'
      - - - containing signed_data.unsigned_data
      - - - - containing data
      -
      -

      -

      - - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/S-DATA/NB-03 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S sends correctly signed message with external payload. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.7 -

      -
      -

      - - Config Id - -

      -
      -

      - CF04 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Generate_SignExternalPayload -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Authorized state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT is requested to send a signed message with external data
      - }
      - then {
      - - the IUT sends a valid 1609Dot2Data set to MSG_SIGNED_IUT - -
      - - - containing type
      - - - - set to 'signed_external_payload'
      - - - containing signed_data.unsigned_data
      - - - - not containing data
      -
      -
      -

      -

      - - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/S-DATA/NB-04 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that if ITS-S generates correctly a signed message containing the generation time. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.7 -

      -
      -

      - - Config Id - -

      -
      -

      - CF04 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Generate_SignPayload AND PIC_Generate_GenerationTime -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Authorized state and
      - the IUT is configured to include generation time when signing a message
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT is requested to send a signed message
      - }
      - then {
      - - the IUT sends a valid 1609Dot2Data set to MSG_SIGNED_IUT -
      - - - containing signed_data.unsigned_data
      - - - - containing tf
      - - - - - indicating 'use_generation_time'
      - - - - containing generation_time
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/S-DATA/NB-05 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that if ITS-S generates correctly multiple signed messages containing the generation time. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.7 -

      -
      -

      - - Config Id - -

      -
      -

      - CF04 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Generate_SignPayload AND PIC_Generate_GenerationTime -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Authorized state and
      - the IUT is configured to include generation time when signing a message and
      - the IUT has previously sent a signed message (V_MSG_0)
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT is requested to send a new signed message
      - }
      - then {
      - - the IUT sends a valid 1609Dot2Data set to MSG_SIGNED_IUT -
      - - - containing signed_data.unsigned_data
      - - - - containing tf
      - - - - - indicating 'use_generation_time'
      - - - - containing generation_time
      - - - - - set to a value > V_MSG_0.signed_data.unsigned_data.generation_time and < CLT -
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/S-DATA/NB-06 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that if ITS-S generates correctly a ToBeSignedData containing the expiry time. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.7 -

      -
      -

      - - Config Id - -

      -
      -

      - CF04 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Generate_SignPayload AND PIC_Generate_ExpirationTime -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Authorized state and
      - the IUT is configured to include expiry_time when signing a message
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT is requested to send a signed message
      - }
      - then {
      - - the IUT sends a valid 1609Dot2Data set to MSG_SIGNED_IUT -
      - - - containing signed_data.unsigned_data
      - - - - containing tf
      - - - - - indicating 'expires'
      - - - - containing expiry_time
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/S-DATA/NB-07 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that if ITS-S generates correctly a ToBeSignedData containing the generation location. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.7 -

      -
      -

      - - Config Id - -

      -
      -

      - CF04 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Generate_SignPayload AND PIC_Generate_GenerationLocation -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Authorized state and
      - the IUT is configured to include generation_location when signing a message
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT is requested to send a signed message
      - }
      - then {
      - - the IUT sends a valid 1609Dot2Data set to MSG_SIGNED_IUT -
      - - - containing signed_data.unsigned_data
      - - - - containing tf
      - - - - - indicating 'use_location'
      - - - - containing generation_location
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/S-DATA/NB-08 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S can generate valid signed data with ecdsa_nistp256_with_sha256. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.15 -

      -
      -

      - - Config Id - -

      -
      -

      - CF04 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Generate_SignPayload AND PIC_Generate_Ecdsa256 -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Authorized state and
      - the IUT is configured to use 'ecdsa_nistp256_with_sha256' as PKAlgorithm when signing a message
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT is requested to send a signed message
      - }
      - then {
      - - the IUT sends a valid 1609Dot2Data set to MSG_SIGNED_IUT -
      - - - containing signed_data
      - - - - containing signer
      - - - - - containing type
      - - - - - - set to 'certificate_digest_with_ecdsap256'
      - - - - - containing digest
      - - - - containing signature.algorithm
      - - - - - set to 'ecdsa ecdsa_nistp256_with_sha256'
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/S-DATA/NB-09 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the ITS-S can generate valid signed data with ecdsa_nistp224_with_sha224. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.15 -

      -
      -

      - - Config Id - -

      -
      -

      - CF04 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Generate_SignPayload AND PIC_Generate_Ecdsa224 -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Authorized state and
      - the IUT is configured to use ecdsa_nistp224_with_sha224 as PKAlgorithm when signing a message
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when { - the IUT is requested to send a signed message
      - }
      - then {
      - - the IUT sends a valid 1609Dot2Data set to MSG_SIGNED_IUT -
      - - - containing signed_data
      - - - - containing signer
      - - - - - containing type
      - - - - - - set to 'certificate_digest_with_ecdsap224'
      - - - - - containing digest
      - - - - containing signature
      -
      -

      -

      - - - - - - containing algorithm
      - - - - - - set to 'ecdsa ecdsa_nistp224_with_sha224'
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/S-DATA/NB-10-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S generates signed data with signature with different public key types. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.15 -

      -
      -

      - - Config Id - -

      -
      -

      - CF04 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Generate_SignPayload -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Authorized state
      - the IUT is configured to sign messages using signatures with public key type of form X_PKT_SIGNATURE -
      -

      -

      - } -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT is requested to send a signed message
      - }
      - then {
      - - the IUT sends a valid 1609Dot2Data set to MSG_SIGNED_IUT -
      - - - containing signed_data
      - - - - containing signature.ecdsa_signature.R.type
      - - - - - set to X_PKT_SIGNATURE -
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - PIC Selection - -

      -
      -

      - - X_PKT_SIGNATURE - -

      -
      -

      - A -

      -
      -

      - PIC_Generate_CompressedKeyPublicKey -

      -
      -

      - compressed_lsb_y_0 or compressed_lsb_y_1 -

      -
      -

      - B -

      -
      -

      - PIC_Generate_XCoordinateOnlyPublicKey -

      -
      -

      - x_coordinate_only -

      -
      -

      - C -

      -
      -

      - PIC_Generate_UncompressedKeyPublicKey -

      -
      -

      - uncompressed -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/S-DATA/NB-11 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S generates valid signed data with a certificate containing lifetime field when cf flag is set to lifetime_is_duration. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.2 -

      -
      -

      - - Config Id - -

      -
      -

      - CF04 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Generate_SignPayload AND PIC_Generate_StartValidity AND PIC_Generate_LifetimeIsDuration -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Authorized state and
      - the IUT is configured to put certificate in each of the signed message
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT is requested to send a signed message
      - }
      - then {
      - - the IUT sends a valid 1609Dot2Data set to MSG_SIGNED_IUT -
      - - - containing signed_data.signer
      - - - - containing type
      - - - - - set to 'certificate'
      - - - - containing certificate.unsigned_certificate
      - - - - - containing cf
      - - - - - - indicating 'lifetime_is_duration'
      - - - - - containing lifetime
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/S-DATA/NB-12 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S generates valid signed data with a certificate containing start_validity field. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.2 -

      -
      -

      - - Config Id - -

      -
      -

      - CF04 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Generate_SignPayload AND PIC_Generate_StartValidity AND NOT PIC_Generate_LifetimeIsDuration -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Authorized state and
      - the IUT is configured to put certificate in each of the signed message
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT is requested to send a signed message
      - }
      - then {
      - - the IUT sends a valid 1609Dot2Data set to MSG_SIGNED_IUT -
      - - - containing signed_data.signer
      - - - - containing type
      - - - - - set to 'certificate'
      - - - - containing certificate.unsigned_certificate
      - - - - - containing cf
      - - - - - - indicating 'use_start_validity'
      - - - - - containing start_validity
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/S-DATA/NB-13 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S generates valid signed data with a certificate containing encryption_key field. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.2 -

      -
      -

      - - Config Id - -

      -
      -

      - CF04 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Generate_SignPayload AND PIC_Generate_EncryptionKey -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Authorized state and
      - the IUT is configured to put certificate in each of the signed message
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT is requested to send a signed message
      - }
      - then {
      - - the IUT sends a valid 1609Dot2Data set to MSG_SIGNED_IUT -
      - - - containing signed_data.signer
      - - - - containing type
      - - - - - set to 'certificate'
      - - - - containing certificate.unsigned_certificate
      - - - - - containing cf
      - - - - - - indicating 'encryption_key'
      - - - - - containing encryption_key
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - - - TP/SEC/ITS-S/S-DATA/NB-14 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S generates valid signed data with a certificate containing more than 8 entries in the permissions_list field. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.9 -

      -
      -

      - - Config Id - -

      -
      -

      - CF04 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Generate_SignPayload AND PIC_Generate_PsidArrayWithMoreThan8Entries -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in Authorized state and
      - the IUT is configured to put certificate in each of the signed message
      - the CERT_AUTH_TS.scope.permissions.permissions_list contains 9 PSID items
      -
      -

      -

      - } -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT is requested to send a signed message
      - }
      - then {
      - - the IUT sends a valid 1609Dot2Data set to MSG_SIGNED_IUT -
      - - - containing signed_data.signer
      - - - - containing type
      - - - - - set to 'certificate'
      - - - - containing certificate.unsigned_certificate.scope.permissions.permissions_list
      - - - - - containing 9 entries
      - }
      }
      -

      -
      -

      -

      -

      - - 6.2.1.4 - - R - - eceiving Data -
      -
      -
      -
      -

      -
      - - 6.2.1.4.1Normal Behavior
      -
      -
      -
      -

      - - 6.2.1.4.1.1Signature verification
      -
      -
      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/NB-01-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S accepts valid signed data from another ITS-S when the Signer Identifier is a Certificate Digest and the signature contains public key with various types. -

      -
      -

      - - Reference - -

      -
      -

      - ETSI TS 102 867 [3], clause 5.1.4 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a valid 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data
      - - - - containing signer.digest
      - - - - - set to certificate_digest_with_ecdsa_p256 of CERT_AUTH_TS -
      - - - - containing a valid signature
      - - - - - containing ecdsa_signature.R.type
      - - - - - - set to X_PKT_SIGNATURE -
      - }
      - then {
      - - the IUT accepts the message
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - PIC Selection - -

      -
      -

      - - X_PKT_SIGNATURE - -

      -
      -

      - A -

      -
      -

      - PIC_Verify_CompressedKeyPublicKey -

      -
      -

      - compressed_lsb_y_0 or compressed_lsb_y_1 -

      -
      -

      - B -

      -
      -

      - PIC_Verify_ XCoordinateOnlyPublicKey -

      -
      -

      - x_coordinate_only -

      -
      -

      - C -

      -
      -

      - PIC_Verify_ UncompressedPublicKey -

      -
      -

      - uncompressed -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/NB-02-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S accepts valid signed data from another ITS-S when the Signer Identifier is a Certificate Chain and the signature contains public key with various types. -

      -
      -

      - - Reference - -

      -
      -

      - ETSI TS 102 867 [3], clause 5.1.4 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a valid 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data
      - - - - containing signer
      - - - - - containing type set to 'certificate_chain'
      - - - - - containing certificates
      - - - - containing a valid signature
      -

      -

      - - - - - - containing ecdsa_signature.R.type
      - - - - - - set to X_PKT_SIGNATURE -
      - }
      - then {
      - - the IUT accepts the message
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - PIC Selection - -

      -
      -

      - - X_PKT_SIGNATURE - -

      -
      -

      - A -

      -
      -

      - PIC_Verify_CompressedKeyPublicKey -

      -
      -

      - compressed_lsb_y_0 or compressed_lsb_y_1 -

      -
      -

      - B -

      -
      -

      - PIC_Verify_XCoordinateOnlyPublicKey -

      -
      -

      - x_coordinate_only -

      -
      -

      - C -

      -
      -

      - PIC_Verify_UncompressedKeyPublicKey -

      -
      -

      - uncompressed -

      -
      -

      -

      -

      - - 6.2.1.4.1.2Signer verification
      -
      -
      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/NB-03 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S accepts valid signed data from another ITS-S when the Signer Identifier is a Certificate with a lifetime set to duration. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.2 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      - PIC_Verify_StartValidity AND PIC_Verify_LifetimeIsDuration -

      -
      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a valid 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data.signer
      - - - - containing type set to 'certificate'
      - - - - containing certificate.unsigned_certificate
      - - - - - containing cf
      - - - - - - indicating 'use_start_validity'
      - - - - - - indicating 'lifetime_is_duration'
      -

      -

      - - }
      - then {
      - - the IUT accepts the message
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/NB-04 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S accepts valid signed data from another ITS-S when the Signer Identifier is a Certificate without a lifetime set to duration. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.2 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      - PIC_Verify_StartValidity AND PIC_Verify_StartValidityIsATimestamp -

      -
      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a valid 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data.signer
      - - - - containing type set to 'certificate'
      - - - - containing certificate.unsigned_certificate
      - - - - - containing cf
      - - - - - - indicating 'use_start_validity'
      - - - - - - not indicating 'lifetime_is_duration'
      -

      -

      - - }
      - then {
      - - the IUT accepts the message
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/NB-05-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S accepts valid signed data from another ITS-S when the Signer Identifier is a Certificate containing list_size PSIDs. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.23 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a valid 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data.signer
      -

      -

      - - - - - containing type set to 'certificate'
      - - - - containing certificate.unsigned_certificate
      - - - - - containing a subject_type
      - - - - - - set to 'sec_data_exch_ca'
      - - - - - containing scope.permissions.permissions_list
      - - - - - - containing X_LIST_SIZE PSID items
      - }
      - then {
      - - the IUT accepts the message
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_LIST_SIZE - -

      -
      -

      - - PIC Selection - -

      -
      -

      - A -

      -
      -

      - 0 -

      -
      -

      -

      - B -

      -
      -

      - 1 -

      -
      -

      -

      - C -

      -
      -

      - 4 -

      -
      -

      -

      - D -

      -
      -

      - 8 -

      -
      -

      -

      - E -

      -
      -

      - 9 -

      -
      -

      - PIC_Verify_PsidArrayWithMoreThan8Entries -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/NB-06 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S accepts valid signed data from another ITS-S when signed with a certificate containing an IdentifiedNotLocalizedScope and a zero-length subject_name field. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.22 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a valid 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data.signer
      -

      -

      - - - - - containing type set to 'certificate'
      - - - - containing certificate.unsigned_certificate
      - - - - - containing a subject_type
      - - - - - - set to 'sec_data_exch_identified_not_localized'
      - - - - - containing id_not_loc_scope.subject_name
      - - - - - - set to an empty string
      - }
      - then {
      - - the IUT accepts the message
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/NB-07 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S accepts valid signed data from another ITS-S when signed with a certificate containing an IdentifiedNotLocalizedScope and a non-zero-length subject_name field. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.22 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a valid 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data.signer
      -

      -

      - - - - - containing type set to 'certificate'
      - - - - containing certificate.unsigned_certificate
      - - - - - containing subject_type
      - - - - - - indicating 'sec_data_exch_identified_not_localized'
      - - - - - containing id_not_loc_scope.subject_name
      - - - - - - set to non empty string
      - }
      - then {
      - - the IUT accepts the message
      - }
      }
      -

      -
      -

      -

      -

      - - 6.2.1.4.2 - - Exceptional behavior - - - -
      -

      - - 6.2.1.4.2.1Generic message verification
      -
      -
      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/EB-01-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards a 1609.2 secured message if the protocol version is invalid. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.1 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing protocol_version
      - - - - set to X_INVALID_VERSION_NUMBER -
      - }
      - then {
      - - the IUT discards the message
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - # - -

      -
      -

      - - X_INVALID_VERSION_NUMBER - -

      -
      -

      - A -

      -
      -

      - 0 -

      -
      -

      - B -

      -
      -

      - 1 -

      -
      -

      - C -

      -
      -

      - 3 -

      -
      -

      - D -

      -
      -

      - 255 -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/EB-02-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards a 1609.2 secured message if the content type is not supported. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.1 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing type
      - - - - set to X_INVALID_CONTENT_TYPE -
      - }
      - then {
      - - the IUT discards the message
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_INVALID_CONTENT_TYPE - -

      -
      -

      - A -

      -
      -

      - unsecured (0) -

      -
      -

      - B -

      -
      -

      - encrypted(2) -

      -
      -

      - C -

      -
      -

      - certificate_request(3) -

      -
      -

      - D -

      -
      -

      - certificate_response(4) -

      -
      -

      - E -

      -
      -

      - anonymous_certificate_response(5) -

      -
      -

      - F -

      -
      -

      - certificate_request_error(6) -

      -
      -

      - G -

      -
      -

      - crl_request(7) -

      -
      -

      - H -

      -
      -

      - crl(8) -

      -
      -

      - I -

      -
      -

      - signed_wsa(11) -

      -
      -

      - J -

      -
      -

      - certificate_response_acknowledgment (12) -

      -
      -

      - K -

      -
      -

      - ANY_VALUE(128) -

      -
      -

      -

      -

      - - 6.2.1.4.2.2Data fields verification
      -
      -
      -
      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/EB-03 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards valid signed data from another ITS-S when the expiry time of the received data is before the current time. -

      -
      -

      - - Reference - -

      -
      -

      - ETSI TS 102 867 [3], clause 5.1.11 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data.unsigned_data
      - - - - containing tf
      - - - - - indicating 'expires'
      - - - - containing expiry_time
      - - - - - set to value < CLT -
      - }
      - then {
      - - the IUT discards the message
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/EB-04 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards valid signed data which expires before generation time. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.5.3.2.1 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data
      - - - - containing generation_time
      - - - - - set to V_GEN_TIME -
      - - - - containing expiry_time
      - - - - - set to V_GEN_TIME - 1min -
      -

      -

      - - }
      - then {
      - - the IUT discards the message
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/EB-05 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards valid signed data generated early then the validity period of the signing certificate. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], 5.5.3.2.1 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data
      - - - - containing generation_time
      - - - - - set to V_GEN_TIME -
      - - - - containing signer
      -
      -

      -

      - - - - - - containing type
      - - - - - - set to 'certificate_chain'
      -

      -

      - - - - - - containing certificates[last].unsigned_certificate
      - - - - - - containing a start_validity
      - - - - - - - set to V_GEN_TIME + 1min (V_START_VALIDITY_TIME) -
      -

      -

      - - - - - - - containing an expiration
      - - - - - - - set to V_START_VALIDITY_TIME + 1Y -
      -

      -

      - - }
      - then {
      - - the IUT discards the message
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/EB-06 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards valid signed data generated later then the validity period of the signing certificate. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.5.3.2.1 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data
      - - - - containing generation_time
      - - - - - set to V_GEN_TIME -
      - - - - containing signer
      -
      -

      -

      - - - - - - containing type
      - - - - - - set to 'certificate_chain'
      -

      -

      - - - - - - containing certificates[last].unsigned_certificate
      - - - - - - containing an expiration
      - - - - - - - set to V_GEN_TIME – 1min -
      -

      -

      - - }
      - then {
      - - the IUT discards the message
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/EB-07 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards valid signed data which expires early then the validity period of the signing certificate. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.5.3.2.1 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data
      - - - - containing expiry_time
      - - - - - set to V_EXP_TIME -
      - - - - containing signer
      -
      -

      -

      - - - - - - containing type
      - - - - - - set to 'certificate_chain'
      -

      -

      - - - - - - containing certificates[last].unsigned_certificate
      - - - - - - containing a start_validity
      - - - - - - - set to V_EXP_TIME + 1min (V_START_VALIDITY_TIME) -
      - - - - - - containing an expiration
      - - - - - - - set to V_START_VALIDITY_TIME + 1Y -
      -

      -

      - - }
      - then {
      - - the IUT discards the message
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/EB-08 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards valid signed data which expires later then the validity period of the signing certificate. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.5.3.2.1 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data
      - - - - containing expiry_time
      - - - - - set to V_EXP_TIME -
      - - - - containing signer
      -
      -

      -

      - - - - - - containing type
      - - - - - - set to 'certificate_chain'
      -

      -

      - - - - - - containing certificates[last].unsigned_certificate
      - - - - - - containing an expiration
      - - - - - - - set to V_EXP_TIME – 1min -
      -

      -

      - - }
      - then {
      - - the IUT discards the message
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/EB-09 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards valid signed data from another ITS-S when the generation location of the received data is beyond the range considered valid by the IUT. -

      -
      -

      - - Reference - -

      -
      -

      - ETSI TS 102 867 [3], clause 5.1.11 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data.unsigned_data
      - - - - containing tf
      - - - - - indicating 'use_location'
      - - - - containing generation_location
      - - - - - containing latitude
      - - - - - - set to PARIS_LAT -
      - - - - - containing longitude
      - - - - - - set to PARIS_LON -
      - }
      - then {
      - - the IUT discards the message
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/EB-10 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards valid signed data when the generated location is outside the validity region of the signer's certificate. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.5.3.2.1 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data
      - - - - containing signer
      -

      -

      - - - - - - containing type set to 'certificate' -

      -

      - - - - - - containing certificate.unsigned_certificate.scope.region
      - - - - - set to REGION_SMALL -
      - - - - containing unsigned_data.generation_location
      - - - - - containing latitude
      - - - - - - set to PARIS_LAT -
      - - - - - containing longitude
      - - - - - - set to PARIS_LON -
      - }
      - then {
      - - the IUT discards the message
      - }
      }
      -

      -
      -

      -

      -

      - - 6.2.1.4.2.3Signature verification
      -
      -
      -
      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/EB-11 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards data with a cryptographically invalid signature. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.3 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data
      - - - - containing signature.ecdsa_signature
      - - - - - set to the invalid signature value
      - }
      - then {
      - - the IUT discards the message
      - }
      }
      -

      -
      -

      -

      -

      - - 6.2.1.4.2.4Signer verification - - -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/EB-12-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards a signed 1609.2 message if the signer type is not set to a permitted value. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.1 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data.signer
      - - - - containing type
      - - - - - set to X_INVALID_SIGNER_TYPE -
      - }
      - then {
      - - the IUT discards the message
      - }
      }
      -
      -
      -
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_INVALID_VERSION_NUMBER - -

      -
      -

      - - Comments - -

      -
      -

      - A -

      -
      -

      - 'self' (0) -

      -
      -

      - Self-signed certificates are not allowed -

      -
      -

      - B -

      -
      -

      - 6 -

      -
      -

      - Invalid value -

      -
      -

      - C -

      -
      -

      - 255 -

      -
      -

      - Invalid value -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/EB-13 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards received data signed with a revoked certificate. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.5.3.2.1 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data.signer
      - - - - containing type
      - - - - - set to 'certificate'
      - - - - containing certificate
      - - - - - set to revoked Certificate
      - }
      - then {
      - - the IUT discards the message
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/EB-14-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards valid signed data when the signer is a certificate chain in which the region of validity of a subordinate certificate overlaps but is not wholly contained by the region of validity of its issuing certificate. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.5.3.2.3 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data.signer
      - - - - containing type set to 'certificate_chain'
      -

      -

      - - - - - containing certificates[n].scope.region
      - - - - - set to REGION_SMALL -
      - - - - containing certificates[n+1].scope.region
      - - - - - set to X_REGION -
      - }
      - then {
      - - the IUT discards the message
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REGION - -

      -
      -

      - A -

      -
      -

      - - REGION_INTERSECTING - -

      -
      -

      - B -

      -
      -

      - - REGION_OUTSIDE - -

      -
      -

      - C -

      -
      -

      - - REGION_MEDIUM - -

      -
      -

      -

      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/EB-15-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards valid signed data when the signer is a certificate chain in which the validity period of a subordinate certificate is outside that of its issuing certificate. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.5.3.2.3 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      - PIC_Verify_StartValidity AND PIC_Verify_StartValidityIsATimestamp -

      -
      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data.signer
      - - - - containing type set to 'certificate_chain'
      -

      -

      - - - - - containing certificates[last-1].unsigned_certificate
      - - - - - containing cf
      - - - - - - set to 'use_start_validity'
      - - - - - containing an expiration
      - - - - - - set to X_TIME_EXP1 -
      - - - - - containing start_validity
      - - - - - - set to X_TIME_START1 -
      - - - - containing certificates[last].unsigned_certificate
      - - - - - containing cf
      - - - - - - set to 'use_start_validity'
      - - - - - containing an expiration
      - - - - - - set to X_TIME_EXP2 -
      - - - - - containing start_validity
      - - - - - - set to X_TIME_START2 -
      - }
      - then {
      - - the IUT discards the message
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_TIME_START1 - -

      -
      -

      - - X_TIME_EXP1 - -

      -
      -

      - - X_TIME_START2 - -

      -
      -

      - - X_TIME_EXP2 - -

      -
      -

      - - Comment - -

      -
      -

      - - A - -

      -
      -

      - CLT+2Y -

      -
      -

      - CLT+3Y -

      -
      -

      - CLT-1Y -

      -
      -

      - CLT+1Y -

      -
      -

      - Subordinate certificate validity period is totaly before the issuing one -

      -
      -

      - - B - -

      -
      -

      - CLT-1Y -

      -
      -

      - CLT+2Y -

      -
      -

      - CLT-2Y -

      -
      -

      - CLT+1Y -

      -
      -

      - Subordinate certificate validity period is intersecting the issuing one -

      -
      -

      - - C - -

      -
      -

      - CLT-2Y -

      -
      -

      - CLT+1Y -

      -
      -

      - CLT-1Y -

      -
      -

      - CLT+2Y -

      -
      -

      - Subordinate certificate validity period is intersecting the issuing one -

      -
      -

      - - D - -

      -
      -

      - CLT-1Y -

      -
      -

      - CLT+1Y -

      -
      -

      - CLT+2Y -

      -
      -

      - CLT+3Y -

      -
      -

      - Subordinate certificate validity period is totaly after the issuing one -

      -
      -

      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/EB-16 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards valid signed data when the signer is a certificate chain in which the operational permissions of a subordinate certificate are not a subset of the permissions of its issuing certificate. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.5.3.3 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data.signer
      - - - - containing type set to 'certificate_chain'
      -

      -

      - - - - - containing certificates[last-1].unsigned_certificate
      - - - - - containing scope.permissions.permissions_list
      - - - - - - set to array[1]
      -
      -

      -

      - - - - - - - - containing PSID_A -
      - - - - containing certificates[last].unsigned_certificate
      - - - - - containing scope.permissions.permissions_list
      - - - - - - set to array[1]
      -
      -

      -

      - - - - - - - - containing PSID_B -
      - }
      - then {
      - - the IUT discards the message
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/EB-17 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards valid signed data when the signer is a certificate chain in which the subordinate certificate has a valid signature which is not the signature of its issuing certificate. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.5.3.3 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data.signer
      - - - - containing type set to 'certificate_chain'
      -

      -

      - - - - - containing certificates[last] -

      -

      - - - - - - containing valid signature
      -
      -

      -

      - - - - - - - verifiable using verification key of the certificate pointed by signer_id
      - - - - - containing signer_id
      - - - - - - set to the value not equal to the 8-byte hash of the certificates[last-1]
      - }
      - then {
      - - the IUT discards the message
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/EB-18 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards valid signed data when the signer is a certificate chain in which an issuing certificate is not permitted to issue certificates of its subordinate certificate's type. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.5.3.3 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data.signer
      -
      -

      -

      - - - - - containing type set to 'certificate_chain' -

      -

      - - - - - containing certificates[last-1].unsigned_certificate
      - - - - - containing a scope
      - - - - - - containing permitted_subject_types
      - - - - - - - set to 'sec_data_exch_identified_localized'
      - - - - containing certificates[last].unsigned_certificate
      - - - - - containing a subject_type
      - - - - - - set to 'sec_data_exch_anonymous'
      - }
      - then {
      - - the IUT discards the message
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/EB-19-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards a signed 1609.2 message if the version_and_type field is not set to the value 2. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.2 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data.signer
      -

      -

      - - - - - containing type set to 'certificate_chain' -

      -

      - - - - - containing certificates[last].version_and_type
      - - - - - set to INVALID_CERT_VERSION_AND_TYPE -
      -

      -

      - - }
      - then {
      - - the IUT discards the message
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - Y - -

      -
      -

      - - INVALID_CERT_VERSION_AND_TYPE - -

      -
      -

      - A -

      -
      -

      - 0 -

      -
      -

      - B -

      -
      -

      - 1 -

      -
      -

      - C -

      -
      -

      - 3 -

      -
      -

      - D -

      -
      -

      - 255 -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/EB-20 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards a signed 1609.2 message if the signature is calculated over the hash of the version_and_type and the unsigned_certificate fields if the calculation does not use the compressed representation of all public keys and reconstruction values contained in the certificate. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.1 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      - PIC_Verify_UncompressedKey -

      -
      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data.signer
      -

      -

      - - - - - containing type
      - - - - - set to 'certificate_chain'
      -

      -

      - - - - - containing certificates[last].unsigned_certificate
      -
      -

      -

      - - - - - - containing verification_key.public_key.type (V_PKT_VK)
      -
      -

      -

      - - - - - - - set to 'uncompressed' -

      -

      - - - - - - containing signature.ecdsa_signature
      -
      -

      -

      - - - - - - - calculated using uncompressed representation of V_PKT_VK
      -
      -
      -

      -

      - - }
      - then {
      - - the IUT discards the message
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/EB-21 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards a signed 1609.2 message if both the crl_series and the expiration fields in the unsigned_certificate are empty. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.1 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data.signer
      -
      -

      -

      - - - - - containing type
      - - - - - set to 'certificate_chain'
      -

      -

      - - - - - containing certificate[last].unsigned_certificate
      - - - - - containing crl_series
      - - - - - - set to 0
      - - - - - containing expiration
      - - - - - - set to 0
      - }
      - then {
      - - the IUT discards the message
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/EB-22 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards a signed 1609.2 message if the permissions requested in the end-user certificate contains duplicate PSIDs. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.9 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data.signer
      -
      -

      -

      - - - - - containing type
      - - - - - set to 'certificate_chain'
      -

      -

      - - - - - containing certificates[last].unsigned_certificate.scope.permissions.permissions_list
      - - - - - set to array[2]
      -
      -

      -

      - - - - - - - containing PSID_A - -

      -

      - - - - - - - containing PSID_A - -

      -

      - - }
      - then {
      - - the IUT discards the message
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/EB-23-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards a signed 1609.2 message if the latitude specified in the region associated with the signers certificate scope is outside the limits of ±90˚. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.9 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data.signer
      -
      -

      -

      - - - - - containing type
      - - - - - set to 'certificate_chain'
      -

      -

      - - - - - containing certificates[last].unsigned_certificate.scope.region
      - - - - - containing latitude
      - - - - - - set to X_INVALID_LATITUDE -
      -

      -

      - - }
      - then {
      - - the IUT discards the message
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_INVALID_LATITUDE - -

      -
      -

      - A -

      -
      -

      - 900000001 -

      -
      -

      - B -

      -
      -

      - -900000001 -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/EB-24-X - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards a signed 1609.2 message if the longitude specified in the region associated with the signers certificate scope is outside the limits of ±180˚. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.9 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data.signer
      -
      -

      -

      - - - - - containing type
      - - - - - set to 'certificate_chain'
      -

      -

      - - - - - containing certificates[last].unsigned_certificate.scope.region
      - - - - - containing longitude
      - - - - - - set to X_INVALIT_LONGITUDE -
      -

      -

      - - }
      - then {
      - - the IUT discards the message
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_INVALID_LONGITUDE - -

      -
      -

      - A -

      -
      -

      - 1800000001 -

      -
      -

      - B -

      -
      -

      - -1800000001 -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/EB-25 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards a signed 1609.2 message if it contains a secured data exchange, identified not localized scope with zero PSID SSPs in its permissions list. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.23 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data.signer
      -
      -

      -

      - - - - - containing type
      - - - - - set to 'certificate_chain'
      -

      -

      - - - - - containing certificates[last].unsigned_certificate.scope.permissions.permissions_list
      - - - - - set to array[0]
      -
      -

      -

      - - - - - - - not containing any PSID SSP
      - }
      - then {
      - - the IUT discards the message
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP - - - Id - -

      -
      -

      - - - - TP/SEC/ITS-S/R-DATA/EB-26 - - -

      -
      -

      - - Summary - -

      -
      -

      - Check that ITS-S discards a signed 1609.2 message if it contains a secured data exchange, identified not localized scope with a PSID SSPs of more than 31 octets. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.23 -

      -
      -

      - - Configuration - -

      -
      -

      - CF04 -

      -
      -

      - - PICS - - - Selection - -

      -
      -

      -

      - - Initial - - - conditions - -

      -
      -

      - with {
      - IUT in the operational state
      }
      -

      -
      -

      - - Expected - - - behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data set to MSG_SIGNED_TS -
      - - - containing signed_data.signer
      -
      -

      -

      - - - - - containing type
      - - - - - set to 'certificate_chain'
      -

      -

      - - - - - containing certificates[last].unsigned_certificate
      - - - - - containing scope.permissions.permissions_list
      - - - - - - set to array[1]
      -
      -

      -

      - - - - - - - - containing V_PSIDSSPP_A -
      - - - - - - - - containing service_specific_permission
      -

      -

      - - - - - - - - - - longer than 31 octets
      - }
      - then {
      - - the IUT discards the message
      - }
      }
      -

      -
      -

      -

      -

      - - 6.2.2Certificate Authority
      -
      -
      -

      -

      - - 6.2.2.1Normal Behavior
      -
      -
      -

      -
      - - 6.2.2.1.1Generic message verification
      -
      -
      -
      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/NB-01 - -

      -
      -

      - - Summary - -

      -
      -

      - Check that CA correctly decrypts a Certificate Request. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.6.2.1 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      -
      -

      -

      - - the IUT in operational state
      -
      -

      -

      - } -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      -
      -

      -

      - - when {
      -
      -

      -

      - - - the IUT receives a CertificateRequest
      -
      -

      -

      - - }
      -
      -

      -

      - - then {
      -
      -

      -

      - - - the IUT decrypts the request
      -
      -

      -

      - - }
      -
      -

      -

      - } -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/NB-02-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that CA generates certificate response encoded using the key stored in response_encryption_key field in the request. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.34 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      -
      -

      -

      - - the IUT in operational state
      -
      -

      -

      - } -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      -
      -

      -

      - - when {
      -
      -

      -

      - - - the IUT receives a CertificateRequest set to X_REQUEST - -

      -

      - - - - containing unsigned_csr.response_encryption_key (V_RESPONSE_ENC_KEY)
      -
      -

      -

      - - }
      -
      -

      -

      - - then {
      -
      -

      -

      - - - the IUT sends a CertificateResponse set to X_RESPONSE - -

      -

      - - - - encrypted using V_RESPONSE_ENC_KEY - -

      -

      - - }
      -
      -

      -

      - } -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRRSP_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHRSP_IUT - -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/NB-03-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that CA generates certificate response. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.17 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      -
      -

      -

      - - the IUT in operational state
      -
      -

      -

      - } -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      -
      -

      -

      - - when {
      -
      -

      -

      - - - the IUT receives a valid CertificateRequest set to X_REQUEST - -

      -

      - - }
      -
      -

      -

      - - then {
      -
      -

      -

      - - - the IUT sends a CertificateResponse set to X_RESPONSE - -

      -

      - - - - containing certificate_chain[last].signature
      -
      -

      -

      - - - - - verifiable using CERT_CA.unsigned_certificate.verification_key
      -
      -

      -

      - - }
      -
      -

      -

      - } -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRRSP_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHRSP_IUT - -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/NB-04-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the CA accepts a valid certificate request having correct fields and values, signed by a signer_id with type set to 'certificate'. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.4 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      -
      -

      -

      - - the IUT in operational state
      -
      -

      -

      - } -

      -

      -

      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      -
      -

      -

      - - when {
      -
      -

      -

      - - - the IUT receives a valid CertificateRequest set to X_REQUEST - -

      -

      - - - - containing signer
      -
      -

      -

      - - - - - containing type
      -
      -

      -

      - - - - - - set to 'certificate' -

      -

      - - - - - containing certificate -

      -

      - - }
      -
      -

      -

      - - then {
      -
      -

      -

      - - - the IUT sends a CertificateResponse set to X_RESPONSE - -

      -

      - - }
      -
      -

      -

      - } -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRRSP_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHRSP_IUT - -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/NB-05-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the CA accepts a valid certificate request having correct fields and values, signed by a signer_id with type set to 'certificate_chain'. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.4 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      -
      -

      -

      - - the IUT in operational state
      -
      -

      -

      - } -

      -

      -

      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      -
      -

      -

      - - when {
      -
      -

      -

      - - - the IUT receives a CertificateRequest set to X_REQUEST
      -
      -
      -

      -

      - - - - containing signer
      -
      -

      -

      - - - - - containing type
      -
      -

      -

      - - - - - - set to 'certificate_chain' -

      -

      - - - - - containing certificates
      -
      -

      -

      - - - - - - set to array of certificates -

      -

      - - }
      -
      -

      -

      - - then {
      -
      -

      -

      - - - the IUT sends a CertificateResponse set to X_RESPONSE - -

      -

      - - }
      -
      -

      -

      - } -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRRSP_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHRSP_IUT - -

      -
      -

      -

      -

      - - 6.2.2.1.2Key Compression
      -
      -
      -
      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/NB-06-X-Y - -

      -
      -

      - - Summary - -

      -
      -

      - Check that an CA accepts a certificate request, signed by a valid certificate chain and containing various public key types. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.17 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      -
      -

      -

      -

      - - the IUT in operational state
      -
      -

      -

      - - the IUT is configured to use signature of type Y_PKT_RES_SIGN - -

      -

      - } -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      -
      -

      -

      - - when {
      -
      -

      -

      - - - the IUT receives a valid CertificateRequest set to X_REQUEST - -

      -

      - - - - containing signer.type
      -
      -

      -

      - - - - - set to 'certificate_chain' -

      -

      - - - - containing signer.certificate_chain[last]
      -
      -

      -

      - - - - - containing signature.ecdsa_signature.R.type
      -
      -

      -

      - - - - - - set to Y_PKT_SIG_SIGN - -

      -

      - - - - - containing unsigned_certificate.verification_key.public_key.type
      -
      -

      -

      - - - - - - set to Y_PKT_SIG_VK - -

      -

      - - - - containing unsigned_csr.verification_key.public_key.type
      -
      -

      -

      - - - - - set to Y_PKT_VK - -

      -

      - - - - containing unsigned_csr.response_encryption_key.public_key.type
      -
      -

      -

      - - - - - set to Y_PKT_REK - -

      -

      - - - - containing signature.ecdsa_signature
      -
      -

      -

      - - - - - calculated using compressed representation of Y_PKT_VK and Y_PKT_REK
      -
      -
      -

      -

      - - - - - containing R.type
      -
      -

      -

      - - - - - - set to Y_PKT_REQ_SIGN - -

      -

      - - }
      -
      -

      -

      - - then {
      -
      -

      -

      - - - the IUT sends a valid CertificateResponse set to X_RESPONSE - -

      -

      - - - - containing certificates[last]
      - - - - containing unsigned_certificate.verification_key.public_key.type
      - - - - - set to Y_PKT_VK -
      - - - - containing signature.ecdsa_signature
      - - - - - calculated using compressed representation of Y_PK_TYPE_VK and Y_PK_TYPE_REK
      -
      -
      -

      -

      - - - - - - containing R.type
      -
      -

      -

      - - - - - - - set to Y_PKT_RES_SIGN - -

      -

      - - }
      -
      -

      -

      - } -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRRSP_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHRSP_IUT - -

      -
      -

      -

      - Possible values:
      - Comp : compressed_lsb_y_0 or compressed_lsb_y_1
      - X_co : x_coordinate_only
      - Uncomp: uncompressed
      -

      -
      -

      - - Y - -

      -
      -

      - - Y_PKT_SIG_VK - -

      -
      -

      - - Y_PKT_SIG_SIGN - -

      -
      -

      - - Y_PKT_REQ_SIGN - -

      -
      -

      - - Y_PKT_VK - -

      -
      -

      - - Y_PKT_REK - -

      -
      -

      - - Y_PKT_RES_SIGN - -

      -
      -

      - A -

      -
      -

      - Comp -

      -
      -

      - X_co -

      -
      -

      - X_co -

      -
      -

      - Comp -

      -
      -

      - Comp -

      -
      -

      - Comp -

      -
      -

      - B -

      -
      -

      - X_co -

      -
      -

      - X_co -

      -
      -

      - X_co -

      -
      -

      - X_co -

      -
      -

      - X_co -

      -
      -

      - X_co -

      -
      -

      - C -

      -
      -

      - Uncomp -

      -
      -

      - Uncomp -

      -
      -

      - Uncomp -

      -
      -

      - Uncomp -

      -
      -

      - Uncomp -

      -
      -

      - Uncomp -

      -
      -

      - D -

      -
      -

      - Comp -

      -
      -

      - U Uncomp -

      -
      -

      - Uncomp -

      -
      -

      - Comp -

      -
      -

      - X_co -

      -
      -

      - Uncomp -

      -
      -

      - E -

      -
      -

      - X_co -

      -
      -

      - Uncomp -

      -
      -

      - Uncomp -

      -
      -

      - X_co -

      -
      -

      - X_co -

      -
      -

      - X_co -

      -
      -

      - F -

      -
      -

      - Uncomp -

      -
      -

      - Comp -

      -
      -

      - Comp -

      -
      -

      - Uncomp -

      -
      -

      - Uncomp -

      -
      -

      - Comp -

      -
      -

      - G -

      -
      -

      - Y -

      -
      -

      - Comp -

      -
      -

      - Comp -

      -
      -

      - X_co -

      -
      -

      - Comp -

      -
      -

      - Uncomp -

      -
      -

      - H -

      -
      -

      - X_co -

      -
      -

      - Comp -

      -
      -

      - Comp -

      -
      -

      - X_co -

      -
      -

      - X_co -

      -
      -

      - X_co -

      -
      -

      -

      -

      - - 6.2.2.1.3Permissions
      -
      -
      -
      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/NB-07-X-Y - -

      -
      -

      - - Summary - -

      -
      -

      - Check that an CA responds to a certificate request with the list of permissions fully contained in the request signer certificate. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clauses 6.3.9 and 6.3.23, -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      - the IUT is configured to provide certificates with permissions {PSID_A, PSID_B, PSID_C, PSID_D, PSID_E,
      - - PSID_F, PSID_G, PSID_H, PSID_I}
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      -

      - -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - ensure that {
      - when {
      - - the IUT receives a valid CertificateRequest set to X_REQUEST -
      - - - containing signer.certificate.unsigned_certificate.sec_data_exch_ca_scope.permissions.permissions_list
      - - - - set to Y_PSID_LIST_SIGNER -
      - - - containing unsigned_csr.type_specific_data.V_REQ_SCOPE
      -
      - - - - containing permissions.permissions_list
      - - - - - set to Y_PSIDSSP_LIST_REQUEST -
      - }
      - then {
      - - the IUT sends a valid CertificateResponse set to X_RESPONSE -
      - - - containing certificates[last].unsigned_certificate
      - - - - containing V_REQ_SCOPE -
      - - - - - containing permissions.permissions_list
      - - - - - - set to Y_PSIDSSP_LIST_RES -
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRRSP_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHRSP_IUT - -

      -
      -

      -

      - - Variants - -

      -
      -

      - - Y - -

      -
      -

      - - PICS Selection - -

      -
      -

      - - Y_PSID_LIST_SIGNER - -

      -
      -

      - - Y_PSIDSSP_LIST_REQUEST - -

      -
      -

      - - Y_PSIDSSP_LIST_RES - -

      -
      -

      - A -

      -
      -

      -

      - {PSID_A} -

      -
      -

      - {PSID_A} -

      -
      -

      - {PSID_A} -

      -
      -

      - B -

      -
      -

      -

      - {PSID_A, PSID_B,
      - PSID_C, PSID_D}
      -

      -
      -

      - {PSID_A} -

      -
      -

      - {PSID_A} -

      -
      -

      - C -

      -
      -

      -

      - {PSID_A, PSID_B,
      - PSID_C, PSID_D}
      -

      -
      -

      - {PSID_A, PSID_B,
      - PSID_C, PSID_D}
      -

      -
      -

      - {PSID_A, PSID_B, PSID_C, PSID_D} -

      -
      -

      - D -

      -
      -

      -

      - {PSID_A, PSID_B,
      - PSID_C, PSID_D,
      - PSID_E, PSID_F,
      - PSID_G, PSID_H}
      -

      -
      -

      - {PSID_A, PSID_B,
      - PSID_C, PSID_D,
      - PSID_E, PSID_F,
      - PSID_G, PSID_H}
      -

      -
      -

      - {PSID_A, PSID_B, PSID_C, PSID_D, PSID_E, PSID_F, PSID_G, PSID_H} -

      -
      -

      - E -

      -
      -

      -

      - {PSID_A, PSID_B,
      - PSID_C, PSID_D}
      -

      -
      -

      - { PSID_C, PSID_D, PSID_E, PSID_F } -

      -
      -

      - {PSID_A, PSID_B} -

      -
      -

      - F -

      -
      -

      - PIC_Verify_PsidArrayWithMoreThan8Entries -

      -
      -

      - {PSID_A} -

      -
      -

      - {PSID_A, PSID_B,
      - PSID_C, PSID_D,
      - PSID_E, PSID_F,
      - PSID_G, PSID_H,
      - PSID_I}
      -

      -
      -

      - {PSID_A} -

      -
      -

      - G -

      -
      -

      - PIC_Verify_PsidArrayWithMoreThan8Entries -

      -
      -

      - {PSID_A, PSID_B,
      - PSID_C, PSID_D,
      - PSID_E, PSID_F,
      - PSID_G, PSID_H,
      - PSID_I}
      -

      -
      -

      - {PSID_A} -

      -
      -

      - {PSID_A} -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/NB-08-X-Y - -

      -
      -

      - - Summary - -

      -
      -

      - Check that an CA responds to a certificate request with the list of permissions set to the intersection between requested permissions and CA certificate permissions. -

      -
      -

      - - Reference - -

      -
      -

      - - I - - EEE P1609.2/D12 [1], clauses 6.3.9 and 6.3.23 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      - the IUT is configured with an CA certificate
      - - containing certificate.unsigned_certificate.sec_data_exch_ca_scope.permissions.permissions_list
      - - - set to Y_PSID_LIST_CA_CERT -
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      -

      - -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - ensure that {
      - when {
      - - the IUT receives a valid CertificateRequest set to X_REQUEST -
      - - - containing unsigned_csr.type_specific_data.REQ_SCOPE -
      - - - - containing permissions.permissions_list
      - - - - - set to Y_PSIDSSP_LIST_REQUEST -
      - }
      - then {
      - - the IUT sends a valid CertificateResponse set to X_RESPONSE -
      - - - containing certificates[last].unsigned_certificate
      - - - - containing REQ_SCOPE -
      - - - - - containing permissions.permissions_list
      - - - - - - set to Y_PSIDSSP_LIST_RES -
      - }
      }
      -

      -
      -

      - Note: Request signing certificate fully covers Y_PSIDSSP_LIST_REQUEST - -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRRSP_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHRSP_IUT - -

      -
      -

      -

      - - Variants - -

      -
      -

      - - Y - -

      -
      -

      - - PICS Selection - -

      -
      -

      - - Y_PSID_LIST_CA_CERT - -

      -
      -

      - - Y_PSIDSSP_LIST_REQUEST - -

      -
      -

      - - Y_PSIDSSP_LIST_RES - -

      -
      -

      - A -

      -
      -

      -

      - {PSID_A} -

      -
      -

      - {PSID_A} -

      -
      -

      - {PSID_A} -

      -
      -

      - B -

      -
      -

      -

      - {PSID_A, PSID_B,
      - PSID_C, PSID_D}
      -

      -
      -

      - {PSID_A} -

      -
      -

      - {PSID_A} -

      -
      -

      - C -

      -
      -

      -

      - {PSID_A, PSID_B,
      - PSID_C, PSID_D}
      -

      -
      -

      - {PSID_A, PSID_B,
      - PSID_C, PSID_D}
      -

      -
      -

      - {PSID_A, PSID_B, PSID_C, PSID_D} -

      -
      -

      - D -

      -
      -

      -

      - {PSID_A, PSID_B,
      - PSID_C, PSID_D,
      - PSID_E, PSID_F,
      - PSID_G, PSID_H}
      -

      -
      -

      - {PSID_A, PSID_B,
      - PSID_C, PSID_D,
      - PSID_E, PSID_F,
      - PSID_G, PSID_H}
      -

      -
      -

      - {PSID_A, PSID_B, PSID_C, PSID_D, PSID_E, PSID_F, PSID_G, PSID_H} -

      -
      -

      - E -

      -
      -

      -

      - {PSID_A, PSID_B,
      - PSID_C, PSID_D}
      -

      -
      -

      - { PSID_C, PSID_D, PSID_E, PSID_F } -

      -
      -

      - {PSID_A, PSID_B} -

      -
      -

      - F -

      -
      -

      - PIC_Verify_PsidArrayWithMoreThan8Entries -

      -
      -

      - {PSID_A} -

      -
      -

      - {PSID_A, PSID_B,
      - PSID_C, PSID_D ,
      - PSID_E, PSID_F,
      - PSID_G, PSID_H,
      - PSID_I}
      -

      -
      -

      - {PSID_A} -

      -
      -

      - G -

      -
      -

      - PIC_Verify_PsidArrayWithMoreThan8Entries -

      -
      -

      - {PSID_A, PSID_B,
      - PSID_C, PSID_D ,
      - PSID_E, PSID_F,
      - PSID_G, PSID_H,
      - PSID_I}
      -

      -
      -

      - {PSID_A} -

      -
      -

      - {PSID_A} -

      -
      -

      -

      -

      - - 6.2.2.1.4Expiration
      -
      -
      -
      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/NB-09-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the CA accepts a valid certificate request having specified start_validity time. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.17 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      -
      -

      -

      - - the IUT in operational state
      -
      -

      -

      - } -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      -
      -

      -

      - - when {
      -
      -

      -

      - - - the IUT receives a CertificateRequest set to X_REQUEST - -

      -

      - - - - containing unsigned_csr
      -
      -

      -

      - - - - - containing cf
      -
      -

      -

      - - - - - - indicating use_start_validity
      -
      -

      -

      - - - - - - and not indicating lifetime_is_duration
      -
      -

      -

      - - - - - containing start_validity
      -
      -

      -

      - - - - - - set to 1 Jan 2010
      -
      -

      -

      - - }
      -
      -

      -

      - - then {
      -
      -

      -

      - - - the IUT sends a CertificateResponse set to X_RESPONSE
      -
      -
      -

      -

      - - - - containing certificates[last].unsigned_certificate
      - - - - valid from 1 Jan 2010
      -
      -

      -

      - - }
      -
      -

      -

      - } -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRRSP_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHRSP_IUT - -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/NB-10-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the CA accepts a valid certificate request with lifetime set to 0. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.34
      -
      -

      -

      - ETSI TS 102 941 [2] Table 1 : Contents of ITS-S EnrolmentRequest message
      -
      -

      -

      - ETSI TS 102 941 [2] Table 2 : Contents of ITS-S AuthorizationRequest message -

      -
      -

      - - Config Id - -

      -
      -

      - CF01,CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      -
      -

      -

      - - the IUT in operational state
      -
      -

      -

      - } -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      -
      -

      -

      - - when {
      -
      -

      -

      - - - the IUT receives a CertificateRequest set to X_REQUEST - -

      -

      - - - - containing unsigned_csr
      -
      -

      -

      - - - - - containing cf
      -
      -

      -

      - - - - - - indicating use_start_validity and lifetime_is_duration
      -
      -

      -

      - - - - - containing lifetime
      -
      -

      -

      - - - - - - set to 0
      -
      -

      -

      - - }
      -
      -

      -

      - - then {
      -
      -

      -

      - - - the IUT sends a valid CertificateResponse set to X_RESPONSE
      -
      -
      -

      -

      - - }
      -
      -

      -

      - } -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRRSP_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHRSP_IUT - -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/NB-11-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the CA accepts a valid certificate request with start_validity set to 0. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.34
      -
      -

      -

      - ETSI TS 102 941 [2] Table 1 : Contents of ITS-S EnrolmentRequest message
      -
      -

      -

      - ETSI TS 102 941 [2] Table 2 : Contents of ITS-S AuthorizationRequest message -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      -
      -

      -

      - - the IUT in operational state
      -
      -

      -

      - } -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      -
      -

      -

      - - when {
      -
      -

      -

      - - - the IUT receives a CertificateRequest set to X_REQUEST - -

      -

      - - - - containing unsigned_csr
      -
      -

      -

      - - - - - containing cf
      -
      -

      -

      - - - - - - indicating use_start_validity
      -
      -

      -

      - - - - - - and not indicating lifetime_is_duration
      -
      -

      -

      - - - - - containing start_validity
      -
      -

      -

      - - - - - - set to 0
      -
      -

      -

      - - }
      -
      -

      -

      - - then {
      -
      -

      -

      - - - the IUT sends a valid CertificateResponse set to X_RESPONSE
      -
      -
      -

      -

      - - }
      -
      -

      -

      - } -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRRSP_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHRSP_IUT - -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/NB-12-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that CA generates valid certificate response with a certificate containing the field start_validity. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.2 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      -
      -

      -

      - - the IUT in operational state
      -
      -

      -

      - - the IUT is configured to use start_validity flag
      -
      -

      -

      - - the IUT is configured not to use a lifetime_is_duration flag
      -
      -

      -

      - } -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      -
      -

      -

      - - when {
      -
      -

      -

      - - - the IUT receives a valid CertificateRequest set to X_REQUEST - -

      -

      - - }
      -
      -

      -

      - - then {
      -
      -

      -

      - - - the IUT sends a CertificateResponse set to X_RESPONSE - -

      -

      - - - - containing certificate_chain[last].unsigned_certificate
      -
      -

      -

      - - - - - containing cf
      -
      -

      -

      - - - - - - indicating use_start_validity
      -
      -

      -

      - - - - - - and not indicating lifetime_is_duration
      -
      -

      -

      - - - - - containing start_validity
      -
      -

      -

      - - - - - - set to the timestamp < certificate_chain[last].unsigned_certificate.expiration
      -
      -

      -

      - - }
      -
      -

      -

      - } -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRRSP_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHRSP_IUT - -

      -
      -

      -

      -

      - - 6.2.2.1.5Regions
      -
      -
      -
      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/NB-13-X-Y - -

      -
      -

      - - Summary - -

      -
      -

      - Check that an CA responds to a certificate request with the region which is fully containing in the request region and in the signer region. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clauses 6.3.13, 6.3.15 and 5.5.3.3 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      -

      - -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - ensure that {
      - when {
      - - the IUT receives a valid CertificateRequest set to X_REQUEST -
      - - containing signer.certificate.unsigned_certificate.ANY_SCOPE.region
      - - - set to Y_REGION_SIGNER -
      - - containing unsigned_csr.type_specific_data.ANY_SCOPE.region
      - - - set to Y_REGION_REQUEST -
      - }
      - then {
      - - the IUT sends a valid CertificateResponse set to X_RESPONSE -
      - - containing certificates[last].unsigned_certificate.ANY_SCOPE.region
      - - - containing region_type
      - - - - set to 'circle'
      - - - containing circular_region inside Y_REGION_RES -
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRRSP_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHRSP_IUT - -

      -
      -

      -

      - - Variants - -

      -
      -

      - - Y - -

      -
      -

      - - Y_REGION_SIGNER - -

      -
      -

      - - Y_REGION_REQUEST - -

      -
      -

      - - Y_REGION_RES - -

      -
      -

      - A -

      -
      -

      - REGION_LARGE -

      -
      -

      - REGION_MEDIUM -

      -
      -

      - REGION_MEDIUM -

      -
      -

      - B -

      -
      -

      - REGION_LARGE -

      -
      -

      - REGION_LARGE -

      -
      -

      - REGION_LARGE -

      -
      -

      - C -

      -
      -

      - REGION_MEDIUM -

      -
      -

      - REGION_SMALL -

      -
      -

      - REGION_SMALL -

      -
      -

      -

      -

      - - 6.2.2.2Exceptional Behavior
      -
      -
      -

      -
      - - 6.2.2.2.1Invalid Message Fields
      -
      -
      -
      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/EB-01-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that CA discards certificate requests if the message content type is different than "encrypted". -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.1 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data structure
      -
      -

      -

      - - - - containing type
      -
      -

      -

      - - - - - set to X_INVALID_CONTENT_TYPE - -

      -

      - - }
      - then {
      - - the IUT discards the received message
      -
      -

      -

      - - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_INVALID_CONTENT_TYPE - -

      -
      -

      - A -

      -
      -

      - unsecured (0) -

      -
      -

      - B -

      -
      -

      - signed(1) -

      -
      -

      - C -

      -
      -

      - certificate_request(3) -

      -
      -

      - D -

      -
      -

      - certificate_response(4) -

      -
      -

      - E -

      -
      -

      - anonymous_certificate_response(5) -

      -
      -

      - F -

      -
      -

      - certificate_request_error(6) -

      -
      -

      - G -

      -
      -

      - crl_request(7) -

      -
      -

      - H -

      -
      -

      - crl(8) -

      -
      -

      - I -

      -
      -

      - signed_partial_payload(9) -

      -
      -

      - J -

      -
      -

      - signed_external_payload(10) -

      -
      -

      - K -

      -
      -

      - signed_wsa(11) -

      -
      -

      - L -

      -
      -

      - certificate_response_acknowledgment (12) -

      -
      -

      - M -

      -
      -

      - ANY_VALUE(128) -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/EB-02-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that CA discards certificate requests if the protocol_version is not 2. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.1.1 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data structure
      -
      -

      -

      - - - - containing protocol_version
      -
      -

      -

      - - - - - set to X_INVALID_VERSION_NUMBER - -

      -

      - - }
      - then {
      - - the IUT discards the received message
      -
      -

      -

      - - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - # - -

      -
      -

      - - X_INVALID_VERSION_NUMBER - -

      -
      -

      - A -

      -
      -

      - 0 -

      -
      -

      - B -

      -
      -

      - 1 -

      -
      -

      - C -

      -
      -

      - 3 -

      -
      -

      - D -

      -
      -

      - 255 -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/EB-03-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that CA discards messages others than certificate request. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.1.1 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a 1609Dot2Data structure
      -
      -

      -

      - - - - containing encrypted_data
      -
      -

      -

      - - - - - containing encrypted_data (ToBeEncrypted data structure)
      -
      -

      -

      - - - - - - containing type
      -
      -

      -

      - - - - - - - set to X_INVALID_CONTENT_TYPE - -

      -

      - - }
      - then {
      - - the IUT discards the received message
      -
      -

      -

      - - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_INVALID_CONTENT_TYPE - -

      -
      -

      - A -

      -
      -

      - unsecured (0) -

      -
      -

      - B -

      -
      -

      - signed(1) -

      -
      -

      - C -

      -
      -

      - encrypted(2) -

      -
      -

      - D -

      -
      -

      - certificate_response(4) -

      -
      -

      - E -

      -
      -

      - anonymous_certificate_response(5) -

      -
      -

      - F -

      -
      -

      - certificate_request_error(6) -

      -
      -

      - G -

      -
      -

      - crl_request(7) -

      -
      -

      - H -

      -
      -

      - crl(8) -

      -
      -

      - I -

      -
      -

      - signed_partial_payload(9) -

      -
      -

      - J -

      -
      -

      - signed_external_payload(10) -

      -
      -

      - K -

      -
      -

      - signed_wsa(11) -

      -
      -

      - L -

      -
      -

      - certificate_response_acknowledgment (12) -

      -
      -

      - M -

      -
      -

      - ANY_VALUE(128) -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/EB-04-X-Y - -

      -
      -

      - - Summary - -

      -
      -

      - Check that CA discards certificate request if the certificate is not an explicit one. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.1 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequest set to X_REQUEST -
      -

      -

      - - - - containing unsigned_csr.version_and_type
      -
      -

      -

      - - - - - set to Y_INVALID_CERT_VERSION_AND_TYPE - -

      -

      - - }
      - then {
      - - the IUT sends a CertificateRequestError set to X_RESPONSE -
      -

      -

      - - - - containing reason
      -
      -

      -

      - - - - - set to 'verification_failure'
      -
      -

      -

      - - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRERR_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHERR_IUT - -

      -
      -

      -

      - - Variants - -

      -
      -

      - - Y - -

      -
      -

      - - Y_INVALID_CERT_VERSION_AND_TYPE - -

      -
      -

      - A -

      -
      -

      - 0 -

      -
      -

      - B -

      -
      -

      - 1 -

      -
      -

      - C -

      -
      -

      - 3 -

      -
      -

      - D -

      -
      -

      - 255 -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/EB-05-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that CA generates a certificate request error with valid fields when it receives the request with cryptographically invalid signature. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.17 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      -
      -

      -

      - - the IUT in operational state
      -
      -

      -

      - } -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      -
      -

      -

      - - when {
      -
      -

      -

      - - - the IUT receives a CertificateRequest set to X_REQUEST - -

      -

      - - - - containing a criptogtaphicaly invalid signature
      -
      -

      -

      - - }
      -
      -

      -

      - - then {
      -
      -

      -

      - - - the IUT sends a CertificateRequestError set to X_RESPONSE - -

      -

      - - - - containing reason
      -
      -

      -

      - - - - - set to 'verification_failure' -

      -

      - - }
      -
      -

      -

      - } -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRERR_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHERR_IUT - -

      -
      -

      -

      -

      - - 6.2.2.2.2Invalid Certificate or Certificate Chain - - -
      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/EB-06-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that an CA discards an certificate request with an cryptographically invalid signing certificate. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.5.3.3 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequest set to X_REQUEST -
      - - containing signer
      - - - containing type
      - - - - set to 'certificate_chain'
      - - - containing certificates[last]
      - - - - containing cryptographically invalid signature
      - }
      - then {
      - - the IUT sends a valid CertificateRequestError set to X_RESPONSE -
      - - - containing reason
      - - - - set to 'verification_failure'
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRERR_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHERR_IUT - -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/EB-07-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that an CA discards an certificate request containing a signer containing an invalid certificate (unknown root certificate). -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clauses 5.6.1.2 and 6.3.37 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequest set to X_REQUEST -
      - - containing signer
      - - - containing type
      - - - - set to 'certificate_chain'
      - - - containing certificates[0] (root certificate)
      - - - - set to an unknown root certificate
      - }
      - then {
      - - the IUT sends a valid CertificateRequestError set to X_RESPONSE -
      - - - containing reason
      - - - - set to 'verification_failure'
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRERR_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHERR_IUT - -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/EB-08-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that an CA discards an certificate request containing a signer containing an invalid certificate chain (expired root certificate). -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clauses 5.5.3.3 and 6.3.37 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequest set to X_REQUEST -
      - - containing signer
      - - - containing type
      - - - - set to 'certificate_chain'
      - - - containing certificates[0] (root certificate)
      -
      -

      -

      - - - - - containing unsigned_certificate.expiration < CLT
      -
      -

      -

      - - }
      - then {
      - - the IUT sends a valid CertificateRequestError set to X_RESPONSE -
      - - - containing reason
      - - - - set to 'verification_failure'
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRERR_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHERR_IUT - -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/EB-09-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that an CA discards an certificate request containing a signer containing an invalid certificate chain (cryptographically invalid root certificate). -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clauses 5.6.1.2 and 6.3.37 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequest set to X_REQUEST -
      - - containing signer
      - - - containing type
      - - - - set to 'certificate_chain'
      - - - containing certificates[0] (root certificate)
      -
      -

      -

      - - - - - containing invalid signature
      - }
      - then {
      - - the IUT sends a valid CertificateRequestError set to X_RESPONSE -
      - - - containing reason
      - - - - set to 'verification_failure'
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRERR_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHERR_IUT - -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/EB-10-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that an CA discards an certificate request containing a signer containing an incomplete certificate chain (missing root certificate). -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clauses 5.6.1.2 and 6.3.37 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequest set to X_REQUEST -
      - - containing signer
      - - - containing type
      - - - - set to 'certificate_chain'
      - - - containing certificates
      - - - - not containing a root certificate (CERT_ROOT)
      - }
      - then {
      - - the IUT sends a valid CertificateRequestError set to X_RESPONSE -
      - - - containing reason
      - - - - set to 'verification_failure'
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRERR_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHERR_IUT - -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/EB-11-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that an CA discards an certificate request containing an unknown signer. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.5.3.3 -

      -
      -

      - - Config Id - -

      -
      -

      - CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequest set to X_REQUEST -
      - - containing signer
      - - - containing type set to 'certificate'
      - - - containing certificate
      - - - - set to unknown certificate (see note)
      - }
      - then {
      - - the IUT sends a valid CertificateRequestError set to X_RESPONSE -
      - - - containing reason
      - - - - set to 'csr_cert_revoked'
      - }
      }
      -

      -
      -

      - NOTE:A certificate that does not belong to a chain that leads to a known trust anchor. -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRERR_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHERR_IUT - -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/EB-12-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that an CA discards an certificate request containing a revoked signer certificate. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.37 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequest set to X_REQUEST -
      - - containing signer
      - - - containing type
      - - - - set to 'certificate'
      - - - containing certificate
      - - - - set to revoked certificate
      - }
      - then {
      - - the IUT sends a valid CertificateRequestError set to X_RESPONSE -
      - - - containing reason
      - - - - set to 'csr_cert_revoked'
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRERR_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHERR_IUT - -

      -
      -

      -

      -

      - - 6.2.2.2.3Invalid Certificate Fields
      -
      -
      -
      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/EB-13-X-Y - -

      -
      -

      - - Summary - -

      -
      -

      - Check that an CA discards an certificate request with certificate content flags other than 'use_start_validity' or 'lifetime_is_duration'. -

      -
      -

      - - Reference - -

      -
      -

      - ETSI TS 102 867 [3], clause 5.1.2.2, IEEE P1609.2/D12 [1], clauses 6.3.2 and 6.3.34 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequest set to X_REQUEST -
      - - - containing unsigned_csr.cf
      - - - - set to Y_INVALID_FLAGS -
      - }
      - then {
      - - the IUT sends a valid CertificateRequestError set to X_RESPONSE -
      - - - containing reason
      - - - - set to 'request_denied'
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRERR_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHERR_IUT - -

      -
      -

      -

      - - Variants - -

      -
      -

      -

      - - Y_INVALID_FLAGS - -

      -
      -

      - - Y - -

      -
      -

      - - use_start_validity (0) - -

      -
      -

      - - lifetime_is_duration(1) - -

      -
      -

      - - encryption_key (2) - -

      -
      -

      - A -

      -
      -

      - Yes -

      -
      -

      - Yes -

      -
      -

      - Yes -

      -
      -

      - B -

      -
      -

      - No -

      -
      -

      - Yes -

      -
      -

      - Yes -

      -
      -

      - C -

      -
      -

      - Yes -

      -
      -

      - No -

      -
      -

      - Yes -

      -
      -

      - D -

      -
      -

      - No -

      -
      -

      - No -

      -
      -

      - Yes -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/EB-14-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that an CA discards an certificate request signed with expired credentials. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clauses 5.5.3.3 and 6.3.37 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequest set to X_REQUEST -
      - - containing signer
      - - - containing type
      - - - - set to 'certificate_chain'
      - - - containing certificates[last]
      -
      -

      -

      - - - - - containing unsigned_certificate.expiration < CLT - -

      -

      - - }
      - then {
      - - the IUT sends a valid CertificateRequestError set to X_RESPONSE -
      - - - containing reason
      - - - - set to 'verification_failure'
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRERR_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHERR_IUT - -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/EB-15-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that CA generates certificate request error with valid fields and with signature of various public key types. -

      -

      - Check that CA calculate request hash using compressed representation of all public keys. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.17 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      -
      -

      -

      - - the IUT in operational state
      -
      -

      -

      - - the IUT is configured to use signature of type Y_PK_TYPE_SIGNATURE - -

      -

      - } -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      -
      -

      -

      - - when {
      -
      -

      -

      - - - the IUT receives a CertificateRequest set to X_REQUEST - -

      -

      - - - - containing a criptogtaphicaly invalid signature
      -
      -

      -

      - - - - containing unsigned_csr.verification_key.public_key.type (V_PK_REQ_VK)
      - - - - set to 'uncompressed'
      -

      -

      - - - - containing unsigned_csr.response_encryption_key.public_key.type (V_PK_REQ_REK) - -

      -

      - - - - - set to 'uncompressed' -

      -

      - - }
      -
      -

      -

      - - then {
      -
      -

      -

      - - - the IUT sends a CertificateRequestError set to X_RESPONSE - -

      -

      - - - - containing reason
      -
      -

      -

      - - - - - set to 'verification_failure' -

      -

      - - - - containing request_hash
      - - - - set to the hash calculated using compressed representation of the V_PK_REQ_VK and - - - - - - - - - - V_PK_REQ_REK -
      -

      -

      - - - - containing signature.ecdsa_signature
      -
      -

      -

      - - - - - containing R.type
      -
      -

      -

      - - - - - - set to Y_PK_TYPE_SIGNATURE - -

      -

      - - }
      -
      -

      -

      - } -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRERR_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHERR_IUT - -

      -
      -

      -

      - - Variants - -

      -
      -

      - - Y - -

      -
      -

      - - Y_PK_TYPE_SIGNATURE - -

      -
      -

      - A -

      -
      -

      - compressed_lsb_y_0/1 -

      -
      -

      - B -

      -
      -

      - x_coordinate_only -

      -
      -

      - C -

      -
      -

      - uncompressed -

      -
      -

      -

      -

      - - 6.2.2.2.4Invalid Permissions
      -
      -
      -
      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/EB-16-X-Y - -

      -
      -

      - - Summary - -

      -
      -

      - Check that an CA discards an certificate request with an invalid PsidArray.type. -

      -
      -

      - - Reference - -

      -
      -

      - ETSI TS 102 867 [3], clause 5.1.2.2, IEEE P1609.2/D12 [1], clause 6.3.7 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      -

      - -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequest set to X_REQUEST -
      - - containing unsigned_csr.type_specific_data.ANY_SCOPE -
      - - - containing permissions.type
      - - - - set to Y_INVALID_ARRAY_TYPE -
      - }
      - then {
      - - the IUT sends a valid CertificateRequestError set to X_RESPONSE -
      - - - containing reason
      - - - - set to 'request_denied'
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRERR_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHERR_IUT - -

      -
      -

      -

      - - Variants - -

      -
      -

      - - Y - -

      -
      -

      - - Y_INVALID_ARRAY_TYPE - -

      -
      -

      - A -

      -
      -

      - from_issuer(0) -

      -
      -

      - B -

      -
      -

      - ANY OTHER (128) -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/EB-17-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that an CA discards an certificate request signed by the certificate with the permissions list which is not a superset of requested permissions list. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.5.3.3 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      -

      - -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequest set to X_REQUEST -
      - - containing signer.certificate.unsigned_certificate.ANY_SCOPE.permissions.permissions_list
      - - - set to X_PSID_LIST_SIGNER -
      - - containing unsigned_csr.type_specific_data.ANY_SCOPE.permissions.permissions_list
      - - - - set to X_PSID_LIST_REQ -
      - }
      - then {
      - - the IUT sends a valid CertificateRequestError set to X_RESPONSE -
      - - - containing reason
      - - - - set to 'request_denied'
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRERR_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHERR_IUT - -

      -
      -

      -

      - - Variants - -

      -
      -

      - - Y - -

      -
      -

      - - PICS Selection - -

      -
      -

      - - X_PSID_LIST_SIGNER - -

      -
      -

      - - X_PSID_LIST_REQ - -

      -
      -

      - A -

      -
      -

      -

      - {PSID_B} -

      -
      -

      - {PSID_A} -

      -
      -

      - B -

      -
      -

      -

      - { PSID_B, PSID_C, PSID_D , PSID_E, PSID_F, PSID_G, PSID_H, PSID_I} -

      -
      -

      - {PSID_A} -

      -
      -

      - C -

      -
      -

      - PIC_Verify_PsidArrayWithMoreThan8Entries -

      -
      -

      - { PSID_B, PSID_C, PSID_D , PSID_E, PSID_F, PSID_G, PSID_H, PSID_I, PSID_J} -

      -
      -

      - {PSID_A} -

      -
      -

      - D -

      -
      -

      - PIC_Verify_PsidArrayWithMoreThan8Entries -

      -
      -

      - {PSID_A} -

      -
      -

      - {PSID_B, PSID_C, PSID_D , PSID_E, PSID_F, PSID_G, PSID_H, PSID_I} -

      -
      -

      - E -

      -
      -

      -

      - {PSID_A} -

      -
      -

      - {PSID_B, PSID_C, PSID_D , PSID_E, PSID_F, PSID_G, PSID_H, PSID_I, PSID_J} -

      -
      -

      - F -

      -
      -

      -

      - {PSID_A, PSID_B, PSID_C, PSID_D} -

      -
      -

      - { PSID_E, PSID_F, PSID_G, PSID_H } -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/EB-18-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that an CA discards an certificate request if it has duplicated PSIDs. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.3.9 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      - the IUT containing CA_CERT -
      -

      -

      - - - containing unsigned_certificate.scope.permissions.permissions_list(V_PERM_LIST)
      -
      -

      -

      - } -

      -
      -

      - - Expected behaviour - -

      -
      -

      -

      - -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequest set to X_REQUEST -
      - - - containing unsigned_csr.type_specific_data.scope -
      -

      -

      - - - - - containing permissions.permissions_list
      -
      -

      -

      - - - - - - set to array[2]{
      -
      -

      -

      - - - - - - - containing V_PERM_LIST[0]
      -
      -

      -

      - - - - - - - containing V_PERM_LIST[0]
      -
      -

      -

      - - - - - - }
      -
      -

      -

      - - }
      - then {
      - - the IUT sends a valid CertificateRequestError set to X_RESPONSE -
      - - - containing reason
      - - - - set to 'verification_failure'
      -
      -

      -

      - - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRERR_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHERR_IUT - -

      -
      -

      -

      -

      - - 6.2.2.2.5Invalid Regions
      -
      -
      -
      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/EB-19-X-Y - -

      -
      -

      - - Summary - -

      -
      -

      - Check that an CA discards a certificate request signed by the certificate containing a scope with a circular region (REGION_SIGNER) and an unsigned csr with a circular region (REGION_REQUEST) that is not fully contained in the signer region. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 5.5.3.3 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      -

      - -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequest set to X_REQUEST -
      - - containing signer
      -
      -

      -

      - - - - containing type
      -
      -

      -

      - - - - - set to 'certificate' -

      -

      - - - - containing certificate.unsigned_certificate.ANY_SCOPE - -

      -

      - - - - - containing region
      -
      -

      -

      - - - - - - set to Y_REGION_SIGNER - -

      -

      - - - containing unsigned_csr.type_specific_data.ANY_SCOPE - -

      -

      - - - - containing region
      -
      -

      -

      - - - - - set to Y_REGION_REQUEST - -

      -

      - - }
      - then {
      - - the IUT sends a valid CertificateRequestError set to X_RESPONSE -
      - - - containing reason
      - - - - set to 'request_denied'
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRERR_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHERR_IUT - -

      -
      -

      -

      - - Variants - -

      -
      -

      - - Y - -

      -
      -

      - - Y_REGION_SIGNER - -

      -
      -

      - - Y_REGION_REQUEST - -

      -
      -

      - A -

      -
      -

      - - REGION_SMALL - -

      -
      -

      - - REGION_OUTSIDE - -

      -
      -

      - B -

      -
      -

      - - REGION_SMALL - -

      -
      -

      - - REGION_LARGE - -

      -
      -

      - C -

      -
      -

      - - REGION_SMALL - -

      -
      -

      - - REGION_INTERSECTING - -

      -
      -

      -

      -

      - - 6.2.2.2.6Expiration
      -
      -
      -
      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/EB-20-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that an CA discards a certificate request containing an expired signer certificate. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clauses 6.3.2, 6.3.37 and 6.2.7, ETSI TS 102 867 [3], clause 5.1.2.1 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequest set to X_REQUEST -
      - - containing signer
      - - - containing type
      - - - - set to 'certificate'
      - - - containing certificate.unsigned_certificate
      - - - - containing expiration
      - - - - - set to CLT – '1Y'
      - - - - containing lifetime
      - - - - - set to '1Y'
      - }
      - then {
      - - the IUT sends a CertificateRequestError set to X_RESPONSE -
      - - - containing reason
      - - - - set to 'csr_cert_expired'
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRERR_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHERR_IUT - -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/CA/EB-21-X-Y - -

      -
      -

      - - Summary - -

      -
      -

      - Check that an CA discards a certificate request with invalid expiration time. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clauses 6.3.2, 6.3.37 and 6.2.7, ETSI TS 102 867 [3], clause 5.1.2.1 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      -

      - -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequest set to X_REQUEST -
      - - containing signer.certificate.unsigned_certificate
      - - - containing expiration
      - - - - set to Y_EXP_SIGNER -
      - - - containing lifetime
      - - - - set to Y_LT_SIGNER -
      - - containing unsigned_csr
      - - - containing expiration
      - - - - set to Y_EXP_REQUEST -
      - - - containing lifetime
      - - - - set to Y_LT_REQUEST -
      - }
      - then{
      - - the IUT sends a valid CertificateRequestError set to X_RESPONSE -
      - - - containing reason
      - - - - set to 'request_denied'
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_REQUEST - -

      -
      -

      - - X_RESPONSE - -

      -
      -

      - A -

      -
      -

      - - MSG_ENRREQ_TS - -

      -
      -

      - - MSG_ENRERR_IUT - -

      -
      -

      - B -

      -
      -

      - - MSG_AUTHREQ_TS - -

      -
      -

      - - MSG_AUTHERR_IUT - -

      -
      -

      -

      - - Variants - -

      -
      -

      - - Y - -

      -
      -

      - - Y_EXP_SIGNER - -

      -
      -

      - - Y_LT_SIGNER - -

      -
      -

      - - Y_EXP_REQUEST - -

      -
      -

      - - Y_EXP_REQUEST - -

      -
      -

      - A -

      -
      -

      - CLT+1Y -

      -
      -

      - 1Y -

      -
      -

      - CLT+2Y -

      -
      -

      - 1M -

      -
      -

      - B -

      -
      -

      - CLT+1Y -

      -
      -

      - 1Y -

      -
      -

      - CLT+2Y -

      -
      -

      - 1Y -

      -
      -

      - C -

      -
      -

      - CLT+1Y -

      -
      -

      - 1Y -

      -
      -

      - CLT+2Y -

      -
      -

      - 2Y -

      -
      -

      - D -

      -
      -

      - CLT+2Y -

      -
      -

      - 1M -

      -
      -

      - CLT+1Y -

      -
      -

      - 1M -

      -
      -

      - E -

      -
      -

      - CLT+2Y -

      -
      -

      - 1Y -

      -
      -

      - CLT+1Y -

      -
      -

      - 1M -

      -
      -

      - F -

      -
      -

      - CLT+3Y -

      -
      -

      - 2Y -

      -
      -

      - CLT+2Y -

      -
      -

      - 2Y -

      -
      -

      -

      -

      - - 6.2.3 - Enrolment Authority
      -
      -
      -
      -

      -

      - - 6.2.3.1Normal Behavior - - -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/EA/ENR/NB-01 - -

      -
      -

      - - Summary - -

      -
      -

      - Check that the EA accepts a valid self-signed enrolment request having correct fields and values. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clause 6.2.4 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01 -

      -
      -

      - - PICS Selection - -

      -
      -

      - PIC_Generate_SelfSigned -

      -
      -

      - - Initial conditions - -

      -
      -

      - with {
      -
      -

      -

      - - the IUT in operational state
      -
      -

      -

      - } -

      -

      -

      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      -
      -

      -

      - - when {
      -
      -

      -

      - - - the IUT receives a valid CertificateRequest set to MSG_ENRREQ_TS
      -
      -
      -

      -

      - - - - containing signer
      -
      -

      -

      - - - - - containing type
      -
      -

      -

      - - - - - - set to 'self' -

      -

      - - }
      -
      -

      -

      - - then {
      -
      -

      -

      - - - the IUT sends a CertificateResponse set to MSG_ENRRSP_IUT - -

      -

      - - }
      -
      -

      -

      - } -

      -
      -

      -

      -

      - - 6.2.3.2Exceptional Behavior
      -
      -
      -
      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/EA/ENR/EB-02-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that an EA discards a enrolment request signed by a signer_id with type set to an other value than 'self', 'certificate' or ' certificate_chain'. -

      -
      -

      - - Reference - -

      -
      -

      - ETSI TS 102 941 [2], clause 6.2.2.3 -

      -
      -

      - - Config Id - -

      -
      -

      - CF01, CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequest set to MSG_ENRREQ_TS -
      - - - containing signer
      - - - - containing type
      - - - - - set to X_INVALID_SUBJECT_TYPE -
      -

      -

      - - }
      - then {
      - - the IUT sends a valid CertificateRequestError set to X_RESPONSE -
      - - - containing reason
      - - - - set to 'request_denied'
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - PICS - -

      -
      -

      - - X_INVALID_SUBJECT_TYPE - -

      -
      -

      - A -

      -
      -

      - Not PIC_Verify_SelfSigned -

      -
      -

      - self(0) -

      -
      -

      - B -

      -
      -

      -

      - certificate_digest_with_ecdsap224(1) -

      -
      -

      - C -

      -
      -

      -

      - certificate_digest_with_ecdsap256(2) -

      -
      -

      - D -

      -
      -

      -

      - certificate_digest_with_other_algorithm(5) -

      -
      -

      - E -

      -
      -

      -

      - ANY OTHER (128) -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/EA/ENR/EB-03-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that an EA discards an enrolment request with a subject type other than 'sec_data_exch_csr'. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], 5.5.3.3, ETSI TS 102 867 [3], clause 5.1.2.1, IEEE P1609.2/D12 [1], clause 6.3.7 - - -

      -
      -

      - - Config Id - -

      -
      -

      - CF01 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequest set to MSG_ENRREQ_TS -
      - - - containing unsigned_csr
      - - - - containing subject_type
      - - - - - set to X_INVALID_SUBJECT_TYPE -
      - - - - containing type_specific_data
      - - - - - containing X_INVALID_SCOPE -
      - }
      - then {
      - - the IUT sends a valid CertificateRequestError set to X_RESPONSE -
      - - - containing reason
      - - - - set to 'request_denied'
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - # - -

      -
      -

      - - X_INVALID_SUBJECT_TYPE - -

      -
      -

      - - X_INVALID_SCOPE - -

      -
      -

      - A -

      -
      -

      - sec_data_exch_anonymous (0) -

      -
      -

      - AnonymousScope -

      -
      -

      - B -

      -
      -

      - sec_data_exch_identified_not_localized (1) -

      -
      -

      - IdentifiedNotLocalizedScope -

      -
      -

      - C -

      -
      -

      - sec_data_exch_identified _localized (2) -

      -
      -

      - IdentifiedLocalizedScope -

      -
      -

      - D -

      -
      -

      - wsa (4) -

      -
      -

      - WsaCaScope -

      -
      -

      - E -

      -
      -

      - wsa_csr (5) -

      -
      -

      - WsaCaScope -

      -
      -

      - F -

      -
      -

      - sec_data_exch_ca(6) -

      -
      -

      - SecDataExchCaScope -

      -
      -

      - G -

      -
      -

      - wsa_ca (7) -

      -
      -

      - WsaCaScope -

      -
      -

      - H -

      -
      -

      - crl_signer(8) -

      -
      -

      - CRLSeries -

      -
      -

      - I -

      -
      -

      - root_ca (255) -

      -
      -

      - RootCaScope -

      -
      -

      - J -

      -
      -

      - ANY OTHER (128) -

      -
      -

      - omit -

      -
      -

      -

      -

      - - 6.2.4 - Authorization Authority
      -
      -
      -
      -

      -

      - - 6.2.4.1Normal Behavior
      -
      -
      -
      -

      -
      - - 6.2.4.1.1 - Scopes (Scope Kind and Scope Name)
      -
      -
      -
      -
      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/AA/AUTH/NB-01 - -

      -
      -

      - - Summary - -

      -
      -

      - Check that an AA responds to an authorization request with
      - - an anonymous scope - -
      with a valid authorization certificate.
      -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clauses 6.2.22, 6.3.6, 6.3.7 and 6.3.19 -

      -
      -

      - - Config Id - -

      -
      -

      - CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a valid CertificateRequest (AuthorisationRequest) set to MSG_AUTHREQ_TS -
      - - - containing unsigned_csr
      - - - - containing subject_type
      - - - - - set to 'sec_data_exch_anonymous'
      - - - - containing type_specific_data
      - - - - - containing anonymous_scope
      - - - - - containing additional_data
      - - - - - - set to 0x00 (length 0)
      - }
      - then {
      - - the IUT sends a valid CertificateResponse (AuthorisationResponse) set to MSG_AUTHRSP_IUT -
      - - - containing certificates[last].unsigned_certificate
      - - - - containing subject_type
      - - - - - set to 'sec_data_exch_anonymous'
      - - - - containing type_specific_data
      - - - - - containing anonymous_scope
      - - - - - containing additional_data
      - - - - - - set to 0x00 (length 0)
      - }
      }
      -

      -
      -

      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/AA/AUTH/NB-02 - -

      -
      -

      - - Summary - -

      -
      -

      - Check that an AA responds to an authorization request with
      - - a localized scope with a name of different size - -
      with a valid authorization certificate.
      -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clauses 6.2.22, 6.3.6, 6.3.7 and 6.3.19 -

      -
      -

      - - Config Id - -

      -
      -

      - CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a valid CertificateRequest (AuthorisationRequest) set to MSG_AUTHREQ_TS -
      - - - containing unsigned_csr
      - - - - containing subject_type
      - - - - - set to 'sec_data_exch_identified_localized'
      - - - - containing type_specific_data.id_scope.name
      - - - - - set to SCOPE_NAME -
      - }
      - then {
      - - the IUT sends a valid CertificateResponse (AuthorisationResponse) set to MSG_AUTHRSP_IUT -
      - - - containing certificates[last].unsigned_certificate
      - - - - containing subject_type
      - - - - - set to 'sec_data_exch_identified_localized'
      - - - - containing id_scope.name
      - - - - - set to ANY_VALUE_OR_NONE
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - SCOPE_NAME - -

      -
      -

      - A -

      -
      -

      - of length > 0 and < 32 -

      -
      -

      - B -

      -
      -

      - of length 0 -

      -
      -

      - C -

      -
      -

      - of length 1 -

      -
      -

      - D -

      -
      -

      - of length 32 -

      -
      -

      -

      -

      - - 6.2.4.1.2 - Expiration
      -
      -
      -
      -
      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/AA/AUTH/NB-03-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that AA responds to an authorization request with the validity period conformed to the request and to the enrolment certificate. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clauses 6.3.2 and 6.3.34 -

      -
      -

      - - Config Id - -

      -
      -

      - CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      -

      - -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - ensure that {
      - when {
      - - the IUT receives a valid CertificateRequest (AuthorisationRequest) set to MSG_AUTHREQ_TS -
      - - containing signer.certificate.unsigned_certificate
      - - - containing expiration
      - - - - set to EXP_ENR_Cert -
      - - - containing lifetime
      - - - - set to LT_ENR_Cert -
      - - containing unsigned_csr
      - - - containing expiration
      - - - - set to EXP_AR -
      - - - containing lifetime
      - - - - set to LT_AR -
      - }
      - then {
      - - the IUT sends a valid AuthorizationResponse
      - - containing certificates[last].unsigned_certificate
      - - - containing expiration
      - - - - set to EXP_ARResp -
      - - - containing lifetime
      - - - - set to LT_AResp -
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - EXP_ENR_Cert - -

      -
      -

      - - LT_ENR_Cert - -

      -
      -

      - - EXP_AR - -

      -
      -

      - - LT_AR - -

      -
      -

      - A -

      -
      -

      - CLT+2Y -

      -
      -

      - 1M -

      -
      -

      - CLT+2Y -

      -
      -

      - 1M -

      -
      -

      - B -

      -
      -

      - CLT+2Y -

      -
      -

      - 1Y -

      -
      -

      - CLT+2Y -

      -
      -

      - 1M -

      -
      -

      - C -

      -
      -

      - CLT+2Y -

      -
      -

      - 1Y -

      -
      -

      - CLT+1Y + 1M -

      -
      -

      - 1M -

      -
      -

      - D -

      -
      -

      - CLT+2Y -

      -
      -

      - 2Y -

      -
      -

      - CLT+2Y -

      -
      -

      - 2Y -

      -
      -

      - E -

      -
      -

      - CLT+2Y -

      -
      -

      - 2Y -

      -
      -

      - CLT + 1M -

      -
      -

      - 1M -

      -
      -

      - F -

      -
      -

      - CLT+2Y -

      -
      -

      - 4Y -

      -
      -

      - CLT+2Y -

      -
      -

      - 2Y -

      -
      -

      - G -

      -
      -

      - CLT+2Y -

      -
      -

      - 4Y -

      -
      -

      - CLT + 1M -

      -
      -

      - 1M -

      -
      -

      -

      - - EXP_AResp - -

      -
      -

      - with EXP_AResp =< EXP_ENR_Cert AND
      EXP_AResp <=EXP_AR
      -

      -
      -

      - - LT_AResp - -

      -
      -

      - EXP_AResp - LT_AResp >= CLT and
      EXP_AResp - LT_AResp >= EXP_ENR_Cert – LT_ENR_Cert AND
      EXP_AResp - LT_AResp >= EXP_AR – LT_AR
      -

      -
      -

      -

      -

      - - 6.2.4.2Exceptional Behavior
      -
      -
      -
      -

      -
      - - 6.2.4.2.1Invalid Certificates or Certificate Chain Fields
      -
      -
      -
      -
      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/AA/AUTH/EB-01-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that an AA discards an authorization request signed
      - by a signer_id with type set to an other value than 'certificate' or ' certificate_chain'. -
      -

      -
      -

      - - Reference - -

      -
      -

      - ETSI TS 102 941 [2] (V1.1.1), clause 6.2.2.3 -

      -
      -

      - - Config Id - -

      -
      -

      - CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequest set to MSG_AUTHREQ_TS -
      - - - containing signer
      - - - - containing type
      - - - - - set to X_INVALID_SIGNER_TYPE -
      - }
      - then {
      - - the IUT sends a valid CertificateRequestError set to MSG_AUTHERR_IUT -
      - - - containing reason
      - - - - set to 'request_denied'
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_INVALID_SIGNER_TYPE - -

      -
      -

      - A -

      -
      -

      - self(0) -

      -
      -

      - B -

      -
      -

      - certificate_digest_with_ecdsap224(1) -

      -
      -

      - C -

      -
      -

      - certificate_digest_with_ecdsap256(2) -

      -
      -

      - D -

      -
      -

      - certificate_digest_with_other_algorithm(5) -

      -
      -

      - E -

      -
      -

      - ANY OTHER (128) -

      -
      -

      -

      -

      - - 6.2.4.2.2Invalid Scopes (Subject Type and Scope Name)
      -
      -
      -
      -
      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - TP Id - -

      -
      -

      - - TP/SEC/AA/AUTH/EB-02-X - -

      -
      -

      - - Summary - -

      -
      -

      - Check that an AA discards an authorization request with a subject type other than 'sec_data_exch_anonymous' or 'sec_data_exch_identified_localized'. -

      -
      -

      - - Reference - -

      -
      -

      - IEEE P1609.2/D12 [1], clauses 5.5.3.3 and 6.3.7, ETSI TS 102 867 [3], clause 5.1.2.1 -

      -
      -

      - - Config Id - -

      -
      -

      - CF02 -

      -
      -

      - - PICS Selection - -

      -
      -

      -

      - - Initial conditions - -

      -
      -

      - with {
      - the IUT in operational state
      }
      -

      -
      -

      - - Expected behaviour - -

      -
      -

      - ensure that {
      - when {
      - - the IUT receives a CertificateRequest set to MSG_AUTHREQ_TS -
      - - - containing signer.certificate.unsigned_certificate.sec_data_exch_ca_scope.permitted_subject_types
      - - - - set to X_PERMITTED_SUBJECT_TYPES -
      - - - containing unsigned_csr
      - - - - containing subject_type
      - - - - - set to X_INVALID_SUBJECT_TYPE -
      - - - - containing type_specific_data
      - - - - - containing X_INVALID_SCOPE -
      - }
      - then {
      - - the IUT sends a valid CertificateRequestError set to MSG_AUTHERR_IUT -
      - - - containing reason
      - - - - set to 'request_denied'
      - }
      }
      -

      -
      -

      - - Variants - -

      -
      -

      - - X - -

      -
      -

      - - X_PERMITTED_SUBJECT_TYPES - -

      -
      -

      - - X_INVALID_SUBJECT_TYPE - -

      -
      -

      - - X_INVALID_SCOPE - -

      -
      -

      - A -

      -
      -

      - sec_data_exch_identified_localized and sec_data_exch_anonymous -

      -
      -

      - sec_data_exch_identified_not_localized (1) -

      -
      -

      - IdentifiedNotLocalizedScope -

      -
      -

      - B -

      -
      -

      - sec_data_exch_identified_localized and sec_data_exch_anonymous -

      -
      -

      - sec_data_exch_csr (3) -

      -
      -

      - SecDataExchCaScope -

      -
      -

      - C -

      -
      -

      - sec_data_exch_identified_localized and sec_data_exch_anonymous -

      -
      -

      - wsa (4) -

      -
      -

      - WsaCaScope -

      -
      -

      - D -

      -
      -

      - sec_data_exch_identified_localized and sec_data_exch_anonymous -

      -
      -

      - wsa_csr (5) -

      -
      -

      - WsaCaScope -

      -
      -

      - E -

      -
      -

      - sec_data_exch_identified_localized and sec_data_exch_anonymous -

      -
      -

      - sec_data_exch_ca(6) -

      -
      -

      - SecDataExchCaScope -

      -
      -

      - F -

      -
      -

      - sec_data_exch_identified_localized and sec_data_exch_anonymous -

      -
      -

      - wsa_ca (7) -

      -
      -

      - WsaCaScope -

      -
      -

      - G -

      -
      -

      - sec_data_exch_identified_localized and sec_data_exch_anonymous -

      -
      -

      - crl_signer(8) -

      -
      -

      - CRLSeries -

      -
      -

      - H -

      -
      -

      - sec_data_exch_identified_localized and sec_data_exch_anonymous -

      -
      -

      - root_ca (255) -

      -
      -

      - RootCaScope -

      -
      -

      - I -

      -
      -

      - sec_data_exch_identified_localized and sec_data_exch_anonymous -

      -
      -

      - ANY OTHER (128) -

      -
      -

      - omit -

      -
      -

      - J -

      -
      -

      - sec_data_exch_identified_localized -

      -
      -

      - sec_data_exch_anonymous (0) -

      -
      -

      - AnonymousScope -

      -
      -

      - K -

      -
      -

      - sec_data_exch_anonymous -

      -
      -

      - sec_data_exch_identified _localized (2) -

      -
      -

      - IdentifiedLocalizedScope -

      -
      -

      -

      -

      - -

      -

      - - History
      -
      -
      -

      -

      - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
      -

      - - Document history - -

      -
      -

      - V1.1.1 -

      -
      -

      - July 2013 -

      -
      -

      - Publication -

      -
      -

      -

      -

      -

      -

      -

      -

      -

      -

      -

      -

      -

      -

      -

      -

      - image1.emf - - diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml_resources/embedded/image1.emf b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml_resources/embedded/image1.emf deleted file mode 100644 index b7aa6dff79c8f325935c2898866637cc517ff0f9..0000000000000000000000000000000000000000 Binary files a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml_resources/embedded/image1.emf and /dev/null differ diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml_resources/embedded/image2.emf b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml_resources/embedded/image2.emf deleted file mode 100644 index 7ab54eb1922217a62c63aa37e8b5a2138a83a819..0000000000000000000000000000000000000000 Binary files a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml_resources/embedded/image2.emf and /dev/null differ diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml_resources/embedded/image3.emf b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml_resources/embedded/image3.emf deleted file mode 100644 index 8728f8838b013870377ca6755c43cf3c2c4a6ef1..0000000000000000000000000000000000000000 Binary files a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml_resources/embedded/image3.emf and /dev/null differ diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml_resources/embedded/image4.emf b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml_resources/embedded/image4.emf deleted file mode 100644 index 14001bc7baabaebe57e49e9701b292f29aa34d58..0000000000000000000000000000000000000000 Binary files a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml_resources/embedded/image4.emf and /dev/null differ diff --git a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml_resources/embedded/image5.emf b/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml_resources/embedded/image5.emf deleted file mode 100644 index 9d2e2e1a13b3ef2b14770d4cd98312fd8161ca0a..0000000000000000000000000000000000000000 Binary files a/requality/TS103096_BasedOnIEEE1609/root/Documents/TS103096-02.xhtml_resources/embedded/image5.emf and /dev/null differ diff --git a/requality/TS103096_BasedOnIEEE1609/root/Reports.json b/requality/TS103096_BasedOnIEEE1609/root/Reports.json deleted file mode 100644 index 93ff7b8009ae7b63a18aaab28e752ed4cceb12da..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Reports.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "attributes": {"_type": { - "key": "_type", - "type": "STRING", - "value": "ReportFolder" - }}, - "uuid": "a0e940c4-596f-4a62-b15f-6f591eaaeaac" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements.json deleted file mode 100644 index cbf512543413acb9f7380ac615e94cb0e7b20726..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "attributes": {"_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - }}, - "uuid": "d2db3776-99f5-4120-a973-733f17032df1" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S.json deleted file mode 100644 index f5b35f6195e4e3b673512565abe35082fbe2838a..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S.json +++ /dev/null @@ -1,15 +0,0 @@ -{ - "attributes": { - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/7fbdcca1-3eab-4654-a02f-b94da5ab71e2"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "6ba5c537-fff0-4c40-ae46-6c2cb8868cbc" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01.json deleted file mode 100644 index b57499bfffb8039f548fc317eca4d7c4c8e06551..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/3811efdb-3ac9-41a0-832f-1177a303f964"] - }, - "_name": { - "key": "_name", - "type": "STRING", - "value": "05-Authorization NB" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "f8fba4f2-4663-409d-9fd7-331b80199c0a" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-01.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-01.json deleted file mode 100644 index 491cddd7404168783d1d3624aeca3445d21575b2..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-01.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S generates correctly a generic AuthorizationRequest message." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/ce56005f-4f7e-4a95-b7a8-75d5611fbc8f"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "b566a8cb-67db-4532-9c30-dab06364504d" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-02.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-02.json deleted file mode 100644 index 34fb068ecef837f62d3037bb8d2a96548c4fee95..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-02.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S generates authorization request with various signature types." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/b3966dfb-628a-4b5b-bdd5-a89f8823820a"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "9a89ed6e-ec1c-4fff-bb53-3f8262a55535" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-03.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-03.json deleted file mode 100644 index 85eb22caf29a8b0867b6cfbe35ecad9f8f627cc3..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-03.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S generates valid authorization request with a certificate containing lifetime field when cf flag is set use_start_validity and lifetime_is_duration." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/dc7a7060-fe4e-4af0-89b5-0fdf66144be0"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "9f00f289-ff7d-4cbc-bea8-7b9c1f9cb05c" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-04.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-04.json deleted file mode 100644 index 08b21934c0b0ea0ab04d5a19560c50a5054147a7..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-04.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S generates valid authorization request with a certificate containing start_validity field when cf flag is set use_start_validity." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/23023613-9bcd-49c8-b715-777cdb807323"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "77d3518f-dbb0-4d32-992c-708d68dc909f" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-05.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-05.json deleted file mode 100644 index 25dd09f6fc5b1ffe8a86296f47928758f7eed2c4..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-05.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S generates valid authorization request with a CSR certificate with name of length > 0 and <= 32." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/9901aa36-802c-4c97-a313-a7e1f727d935"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "5e27b654-cc40-49c9-b79d-9dfa436e53bb" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-06.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-06.json deleted file mode 100644 index 557d19dd11ea7322d29da9792762d609c7746bf4..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-06.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S generates valid authorization request with a certificate containing more than 8 entries in the permissions_list field." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/900173cf-c5fc-4d5d-b4b9-d2fbfdc2ad92"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "dfaa3832-b6d6-406b-845f-f95f677465f8" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-07.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-07.json deleted file mode 100644 index 248f078fc647b4f600c1230201456742d6209ceb..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-07.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S generates valid authorization request with a certificate containing 1 to 8 entries in the permissions_list field. " - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/d52ff94e-2dd5-450c-940d-d7edcb66f8a7"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "1846a7bd-8026-42a8-9006-7436fd11c3b1" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-08.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-08.json deleted file mode 100644 index 1d683bf9cc86e788fd31fef88492d575f6eef617..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-08.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S generates valid authorization request with a certificate containing 1 to 8 entries in the permissions_list field. " - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/fc0460da-e96f-43a9-83d1-bec46d2ce2ac"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "98b7fa20-8726-4d76-88e6-5675d5ecd605" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-09.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-09.json deleted file mode 100644 index 3aaba4568d34286cc1510cdd6d4e7fbad6c82647..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-09.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S generates valid authorization request with a certificate containing 1 to 8 entries in the permissions_list field. " - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/5b73398e-da91-4cac-9375-9f2ae5af68c8"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "44143128-4ab8-4da1-8841-bc6fcd4f93bb" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-10.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-10.json deleted file mode 100644 index a3745a1b2a2c3121363f45a0fd68121b3f36650e..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-10.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S generates valid authorization request with a different response_encryption_key for every request." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/4f9120c9-69da-446f-9cc2-c3aa6608b957"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "8a364955-3f8b-4cf5-a7b2-b7fe1a6f646f" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-11.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-11.json deleted file mode 100644 index d3c93ba30b46171f4f369efc01444746a4d6c1c9..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-11.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S accepts a valid authorization response having correct fields and values." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/edaa35e7-3f72-4d1e-be64-c23b587b4b96"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "eebb19cf-e7ee-46de-ae16-e524548c9ffd" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-12.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-12.json deleted file mode 100644 index 4d63bd4fddb8e9b3cf096009532caee1689bfdf8..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-12.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S accepts a valid authorization response having correct fields and values." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/4ac26752-656c-4a69-af0c-2c5aa9eb448a"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "268165b0-a411-4acc-8712-a81481a91c8f" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-13.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-13.json deleted file mode 100644 index 85174c3e34edc1e216c31128f4cb408727c915bc..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-13.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S accepts a valid authorization response signed by ecdsa_signature with different public key types." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/9c218065-a932-4246-a9da-9a7af1b21ee2"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "532b2949-6c37-4a5f-b0ad-996262b7641e" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-14.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-14.json deleted file mode 100644 index a78c2c029a83983cf7dc0e1038dd8dbccf1c94e7..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-01/ITS-S_AUTH_NB-14.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S accepts a valid authorization response with start_validity." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/913f7af9-d6c2-44bf-af81-8b1d1be7a22e"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "2a8fcecc-f109-4ec7-84b6-a58ebf7b432d" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02.json deleted file mode 100644 index 7d9ddfcab9e56d29ab534a4f5cd2b9f3b9895a51..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/7e096e44-bb1b-49db-91fa-6eeaf6f41b20"] - }, - "_name": { - "key": "_name", - "type": "STRING", - "value": "05. Authorization EB" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "d9052ff1-9412-47c8-9466-37abc996378e" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-01.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-01.json deleted file mode 100644 index 94ece4bb22df1764063c0fa5967508da5defe7e9..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-01.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S discards an authorization response having a non-permitted subject_type." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/4bc97923-b693-4ae6-a5de-a1e153b48348"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "999fb2c5-a8c0-4ea1-8a5e-08249e08dbad" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-02.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-02.json deleted file mode 100644 index b20a30f576ab46c2120608f707666dfe58c200c6..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-02.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S discards an authorization response having a non-permitted cf." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/d825d32c-1929-4a67-9c21-0b558cff5644"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "9b4949e3-08ff-4167-a250-ccd8c64d3d0c" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-03.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-03.json deleted file mode 100644 index d23f7ee7dfac8a220b8c1c47dd49f640a86b5680..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-03.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S discards an authorization response having a non-permitted PsidArray.type." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/9558479f-82d7-4724-bf7a-7c3069b81718"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "007b9146-77a3-4a3b-ae79-0f7c6572897f" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-04.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-04.json deleted file mode 100644 index 12259b02a11efefd4e2693ec0b1f9fc07045aabf..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-04.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S discards an authorization response requesting acknowledgement." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/e73131b6-e236-4ae4-bd2c-8e6613da6a08"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "cd608292-da5e-40a4-bd68-fc6456631093" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-05.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-05.json deleted file mode 100644 index bc8b9ee34047fac92add00408cc473021c6899ff..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-05.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S discards an authorization response that does not comply with the authorization request." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/c6a468af-3558-4f2a-b201-6301a5d33fe3"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "7bdd46bc-51b1-4ff9-9e89-a37ea86e9b0d" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-06.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-06.json deleted file mode 100644 index 93a42f7ccbc6d935f84c1e5ed4133ba56ea141b6..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-06.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S discards an authorization response error with incorrect signerIdentifier_type." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/44d9aed2-53db-4b63-b745-b9bf5afebed9"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "c7bd5a48-4309-442a-bef0-9fc43425c965" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-07.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-07.json deleted file mode 100644 index 09d8504ea84ff7ad4388e2d1b64bd50c812fe886..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-07.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S discards an authorization response error having a non-permitted subject_type." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/8d90713f-c611-4929-ac10-ac35475fd6dd"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "a439a0d9-4999-4efa-809f-1ee84f8712db" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-08.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-08.json deleted file mode 100644 index be72ec3d2ca8cec9783316a44de108b309da93da..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-08.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S discards an authorization response having the subordinate certificate's validity region not wholly contained in the issuing certificate's validity region." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/a6b7d90a-bc10-47d1-8342-b6c91bac83a6"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "53f1e734-fa0d-4ba6-b888-fed7609962d7" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-09.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-09.json deleted file mode 100644 index eea559535fb44ef954bb3622bab240e0267db4b9..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-09.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S discards an authorization response error having the subordinate certificate's validity region not wholly contained in the issuing certificate's validity region." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/7ed79286-935e-4e64-b4e6-a955aeb545e7"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "ff06a726-d989-42ad-9561-203905a71545" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-10.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-10.json deleted file mode 100644 index f1d4bb782c26cfab08019fcbb88bd376bdb7f851..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-10.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S discards an authorization response having the subordinate certificate's validity region not within in the issuing certificate's validity region." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/1736d3b4-c405-4340-a041-87a6e00026c5"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "dbdf3f95-6599-4f01-ad53-85794a21acd5" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-11.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-11.json deleted file mode 100644 index 227c3daa9611c0476cd553e13778b41b64b16387..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-11.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S discards an authorization response error having the subordinate certificate's validity region not within in the issuing certificate's validity region." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/fda3aab5-467a-4812-a900-590e7fb99316"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "e6ffdf8c-3e72-44c2-9c4d-247ac716a5ed" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-12.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-12.json deleted file mode 100644 index 0a6977894020ddb6718981178c322eb4a78efc54..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-12.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S discards an authorization response having the subordinate certificate operational permissions are not a subset ofthe issuing certificate operational permissions." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/5703d2fe-2463-4127-81b6-7bd8cf86e147"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "74c50f7f-dc01-47d0-bcd5-c285c36cfda6" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-13.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-13.json deleted file mode 100644 index 45c50568cba6bb035e272b946e269b927fe38ac2..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-13.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S discards an authorization response error having the subordinate certificate operational permissions are not a subset ofthe issuing certificate operational permissions." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/54a108fe-9039-4ab9-b70c-fa6c288680b5"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "da043a5e-d6af-4c5b-a978-796ab978a4e4" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-14.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-14.json deleted file mode 100644 index efdd4316ec7bd6ebf5f79aa351a5de3cab022b4c..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-14.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S discards an authorization response encapsulated into 1609Dot2Data with protocol_version not egal to 2." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/8a96787b-3567-4dd5-9c78-a37be1c4a443"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "d3c29a57-88ed-4dbd-b645-b422353671d8" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-15.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-15.json deleted file mode 100644 index f41f68c8dd531e2182a2c6f9a0f474b2c1ffe77a..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-15.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S discards an authorization request error encapsulated into 1609Dot2Data with protocol_version not egal to 2." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/aa4ed425-8e3a-4571-b4ca-51841077309e"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "8cee1d55-3ab7-429f-98d2-24127785a363" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-16.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-16.json deleted file mode 100644 index 09a552d18707670a9007ed0e93dbe4332dbe58d2..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-16.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S discards an authorization response with zero value in all expiration fields." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/d51fc116-5b0d-41db-bc1e-16f44c112b87"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "717549eb-c759-402d-b69d-055bc840e2f4" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-17.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-17.json deleted file mode 100644 index c2fcb4ef213faa0c89a0fbb7f7827737085724dd..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-17.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S discards an authorization response with duplicate PSIDs." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/6fa0d7c4-1b3c-4af0-a683-b79dd9d42cbe"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "c489c241-4384-482b-88db-5de14646fdb7" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-18.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-18.json deleted file mode 100644 index bd95f8edc7b2baed1c12599ff8c21bdde9a1b4fa..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-18.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S discards an authorization response with wrongly encoded latitude field." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/6a24d325-1eb0-40c0-8569-22873c20b47d"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "d371093e-e1e4-45c2-87d5-91e7a1794e54" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-19.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-19.json deleted file mode 100644 index 818e42821d4de4b31fc1ecc26399d1dbf250a913..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-19.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S discards an authorization response with wrongly encoded longitude field." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/60375019-354c-4294-a24f-dd5f43185148"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "9fd20471-2338-4126-bd1a-25dc46fe6bf6" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-20.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-20.json deleted file mode 100644 index a2f7c72ee7ca0be3e5d90f929f1b96043c73321d..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-20.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S discards an authorization response with an empty PsidSspArray." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/2f58845b-0f71-4d04-8ed9-92ae9761c955"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "88d0b3a4-af69-4665-94bc-13d7c6f8bbba" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-21.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-21.json deleted file mode 100644 index 1508a1e0543172836a5f8286a5ef89b139875e16..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-21.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S discards an authorization response with a certificate having a too long service_specific_permission field." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/b3a65a13-bc9b-4d69-b77c-643205d9d888"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "a8a44aa7-03dc-46a0-a324-4d3c7fb884ff" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-22.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-22.json deleted file mode 100644 index 7dd0a6862a666987087c6a0507f79748586dc9bb..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_AUTH-02/ITS-S_AUTH_EB-22.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S discards an authorization request error with having a wrongly calculated request_hash." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/0705a1b5-5cc6-4d41-bcf5-1450860110df"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "332105f9-a76d-44b0-9718-cc77fae07f66" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-01.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-01.json deleted file mode 100644 index 89ca776288818417b92e48bd0971c71baf25c27b..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-01.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/29b3e6e6-b206-46f7-b2b9-3dd0ea7757b0"] - }, - "_name": { - "key": "_name", - "type": "STRING", - "value": "01. Enrolment Request verification" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "47404747-e507-472e-8f54-595d425edd51" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-01/ITS-S_ENR_NB-01.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-01/ITS-S_ENR_NB-01.json deleted file mode 100644 index efc0ecee62930bb713733e60f795de47dc278805..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-01/ITS-S_ENR_NB-01.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S generates correctly a generic EnrolmentRequest message" - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/977bab5f-8992-4a30-bf29-7a07cc969b94"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "1d2cf61b-cdd8-4ffe-977b-68d144a37f86" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-01/ITS-S_ENR_NB-01/ITS-S_ENR_NB-01_T01.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-01/ITS-S_ENR_NB-01/ITS-S_ENR_NB-01_T01.json deleted file mode 100644 index c360659f2e6f57e6f4c03ff55fd67b2062277dc4..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-01/ITS-S_ENR_NB-01/ITS-S_ENR_NB-01_T01.json +++ /dev/null @@ -1,25 +0,0 @@ -{ - "attributes": { - "_author": { - "key": "_author", - "type": "STRING", - "value": "filatov" - }, - "_description": { - "key": "_description", - "type": "STRING", - "value": " " - }, - "_status": { - "key": "_status", - "type": "STRING", - "value": "in process" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "TestPurpose" - } - }, - "uuid": "b3a059f5-2c90-448b-88bd-4622250d1156" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-01/ITS-S_ENR_NB-02.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-01/ITS-S_ENR_NB-02.json deleted file mode 100644 index 02e3626a858ce4702f60e77f7220b00b66516d03..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-01/ITS-S_ENR_NB-02.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S generates enrolment request with signature of different types" - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/16f8d926-123f-492f-9c2b-e397344d3404"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "bf298eb6-5691-404e-aedb-2af0536fac76" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-01/ITS-S_ENR_NB-03.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-01/ITS-S_ENR_NB-03.json deleted file mode 100644 index 27520426aa999d9a1f7fceab9dd87a0eabb6bfa5..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-01/ITS-S_ENR_NB-03.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S generates enrolment request with signature calculated using compressed representation of all public keys" - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/5220f55a-1dff-40ac-94d7-ef817786e076"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "a880b02a-3c35-47d3-b1a0-893b1eb480ad" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-01/ITS-S_ENR_NB-04.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-01/ITS-S_ENR_NB-04.json deleted file mode 100644 index db76d0d73f218ab854553455e9a8110ded6cdcba..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-01/ITS-S_ENR_NB-04.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S generates valid self-signed enrolment request." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/f048c77e-d8f6-4ee6-b5e3-018bc5b05ac1"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "f941ca9e-8334-4945-9431-9a200aa4e767" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-01/ITS-S_ENR_NB-05.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-01/ITS-S_ENR_NB-05.json deleted file mode 100644 index e45791e09a579fb9ecee3ba51c02b4cfc35b3cf4..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-01/ITS-S_ENR_NB-05.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S generates valid enrolment request with a different response_encryption_key for every request." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/7a5bd884-9ffb-432e-a713-4d603624ca14"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "040d6a05-9e00-4d08-84b3-67406672e7f0" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-01/ITS-S_ENR_NB-06.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-01/ITS-S_ENR_NB-06.json deleted file mode 100644 index f31e87087054cf523521701aebee44ae52ea005d..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-01/ITS-S_ENR_NB-06.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S generates valid enrolment request with a certificate containing more than 8 PSID entries" - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/f1eea41a-baa3-4fa2-8605-893a328b1138"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "ea5d02ab-d0d4-4bee-b8c0-f4a262d270c6" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-02.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-02.json deleted file mode 100644 index 5d29020d98058a354f948f2e4d4dd75f0a1fdcb4..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-02.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/6b58bb4a-13e0-46ab-98bd-4949bfb30f5e"] - }, - "_name": { - "key": "_name", - "type": "STRING", - "value": "02. Enrolment Response acceptance" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "99f1e785-8df6-4680-b09c-6be793f528c0" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-02/ITS-S_ENR_NB-07.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-02/ITS-S_ENR_NB-07.json deleted file mode 100644 index 01c5a64918ac0f951c710c820dbac7c3eeb6151c..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-02/ITS-S_ENR_NB-07.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S correctly decrypts enrolment response." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/a13876b5-9272-4858-b436-db9c3a907543"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "626599b5-57b6-4063-9a4c-1dae4b7824e7" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-02/ITS-S_ENR_NB-08.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-02/ITS-S_ENR_NB-08.json deleted file mode 100644 index d0488720a7cdb34b1c30f0a2281f9edb6a107350..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-02/ITS-S_ENR_NB-08.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S accepts a valid enrolment response having correct fields and values." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/90fd4fe2-12b2-41f5-99b0-c9e4626bb6dd"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "f6ac675f-296b-4740-92d5-f0442c1c211f" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-02/ITS-S_ENR_NB-09.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-02/ITS-S_ENR_NB-09.json deleted file mode 100644 index c3466ebccd666c9e1ff43df69ceb09886b8b3680..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-02/ITS-S_ENR_NB-09.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S accepts a valid enrolment response even if the permissions in the issued certificate are a subset of requested permissions" - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/6ed18035-70c8-48c7-93ac-a23c1dfaadd8"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "9ad61804-09b6-4f86-b6be-997b90f6a095" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-02/ITS-S_ENR_NB-10.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-02/ITS-S_ENR_NB-10.json deleted file mode 100644 index f4264e9d3717530077c3d64d96bd7368509dec28..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-02/ITS-S_ENR_NB-10.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S accepts enrolment response with different public key types" - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/172ae164-96bf-4329-81d3-42863cf9481f"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "b4506e08-14a0-43d2-a8ed-0c1de5fc9bcf" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-02/ITS-S_ENR_NB-11.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-02/ITS-S_ENR_NB-11.json deleted file mode 100644 index b4cd504988a20ecf48ee78d8952b2c7817a21567..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-02/ITS-S_ENR_NB-11.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S accepts a valid enrolment response with signature calculated using compressed representation of uncompressed public keys." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/636d6f4f-90c7-442c-8082-0fc0e888ff7c"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "aa435740-4bbc-4251-90a5-c716321b9802" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-02/ITS-S_ENR_NB-12.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-02/ITS-S_ENR_NB-12.json deleted file mode 100644 index 8568ed55b8804bcb48ccf63abe158e4d49920ee7..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-02/ITS-S_ENR_NB-12.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S accepts a valid enrolment response with start_validity and lifetime." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/811bf619-f197-4b8d-9a74-2f8f3c4fc9ec"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "31435a03-7b05-4821-83ca-80c1e78d9fa4" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-02/ITS-S_ENR_NB-13.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-02/ITS-S_ENR_NB-13.json deleted file mode 100644 index a7ea39fe3fd47d616bfe89a2611a953adf775e63..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-02/ITS-S_ENR_NB-13.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S accepts a valid enrolment response with start_validity value." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/d730e6a9-978a-4118-a87e-17aa26a81a7f"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "33de7aea-bed1-467c-9c08-9588f5552d40" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-03.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-03.json deleted file mode 100644 index 3bd346aec0342f5d1912847414e74b3566f2f76c..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-03.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/b44017ee-61e4-4aae-bf8e-3f7d39b086e9"] - }, - "_name": { - "key": "_name", - "type": "STRING", - "value": "03. Enrolment Request Error acceptance" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "d9685bad-d957-4695-a8cc-7d35eeaca155" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-03/ITS-S_ENR_NB-14.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-03/ITS-S_ENR_NB-14.json deleted file mode 100644 index 653d410662dffd4b22029a32285203767ba83568..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-03/ITS-S_ENR_NB-14.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S correctly decrypts enrolment request error." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/b4a3bb1c-9c76-4f66-afa2-11bd82a892bd"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "0d52ddae-4d33-4fcc-8c8a-2e057d30e448" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-03/ITS-S_ENR_NB-15.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-03/ITS-S_ENR_NB-15.json deleted file mode 100644 index 1cc70a1126867e68e0cc8168bdf38f37c2096a62..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-03/ITS-S_ENR_NB-15.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S accepts a valid enrolment request error having correct fields and values." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/ec7d4dd7-3907-4a82-9e65-afb4f4d599c3"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "0bf52722-e35b-48c4-8c61-8aa74d774164" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-03/ITS-S_ENR_NB-16.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-03/ITS-S_ENR_NB-16.json deleted file mode 100644 index 0d149aab5c8e2b401d75183eb7cb3a38df00a7ff..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-03/ITS-S_ENR_NB-16.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S accepts enrolment request error with various types of signature public keys." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/9851586b-5496-4891-bea1-31d9c779ac26"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "30c8e164-cf77-4d5c-98dc-6d3613121f03" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04.json deleted file mode 100644 index 661075a0f630c2241975262a54f08daa810d35de..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/9cccead1-046a-49e6-9d2e-00cf8084ae28"] - }, - "_name": { - "key": "_name", - "type": "STRING", - "value": "04. Enrolment EB" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "bcd25a1f-928c-4aec-a45f-c5eba05bea17" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-01.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-01.json deleted file mode 100644 index 0d5e701e7055c0603f725f47261d2b2d5332a879..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-01.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards enrolment response if the subordinate certificate's validity region is large than the issuing certificate's validity region." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/63214b98-6fa5-4d6c-9003-9551052239ee"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "e33d4f6c-1f7e-4eb6-9abb-3b98d1a2ac8b" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-02.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-02.json deleted file mode 100644 index 3230929ead5127a224622eb32e37a4c87230ea81..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-02.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards enrolment response if the subordinate certificate's validity region is outside of the issuing certificate's validity region." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/4fb0585b-5077-45a4-871c-f42766805894"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "29196cd6-4277-4b15-9ec4-48c4d396ddd3" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-03.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-03.json deleted file mode 100644 index fbfead0e5ebb396529882200d5c1fa5b5baaaacf..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-03.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards enrolment response if the subordinate certificate's validity period is longer than issuing certificate's validity period." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/ca1378f0-9f6a-4d34-b9e7-5d7190f0a9c1"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "47b7b440-08d2-419a-b95b-e3cfb02bbb08" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-04.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-04.json deleted file mode 100644 index d71964ca470ce57e300920992d369bf30b56c46f..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-04.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards enrolment response if the subordinate certificate's permissions are not included in issuing certificate." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/6e7f8eb8-baf5-422f-82f9-f3146bb4da5f"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "d12b4c42-1a48-465c-bfff-c5075664fade" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-05.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-05.json deleted file mode 100644 index cc57ba97a80264726f6200a3a0f4de284414d736..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-05.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards enrolment response if the message content type is different than 'encrypted'" - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/af9de568-64c8-47d6-9778-2c723e51e209"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "3fc3eed4-3af9-482f-b9e9-655b80e381ed" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-06.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-06.json deleted file mode 100644 index f2a36841081397e1c56fa7231e729a5c62d6b0fc..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-06.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards enrolment response if the protocol_version is not 2." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/494aee59-9083-4db9-bd3d-153c2bd2ec6f"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "45548828-7794-4b4f-9bdd-46fa805363be" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-07.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-07.json deleted file mode 100644 index dd62400a63ee911484c9f9c86d2b728769fd8f93..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-07.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards enrolment request error if the signer type is not valid." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/65d138b3-7c4f-4a3f-b235-612fa1aaf31c"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "8fae171b-d41f-403f-abce-4a5580e6fd4a" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-08.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-08.json deleted file mode 100644 index cfeaac11a24261739d535a3cebb37d959a33b63c..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-08.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards enrolment respond if the certificate is not an explicit one." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/3bc3f172-2fb6-4847-a214-86d1b734fc45"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "3dd27249-fb65-4594-a2d1-de4b0c7a0cc0" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-09.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-09.json deleted file mode 100644 index ecfde1aa7c75cff2ed54d784fdf86be00120d3af..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-09.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards enrolment response if the hash was not calculated using compressed representation of public keys." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/a3e041ab-aa3d-4254-95fc-ebca16adb99c"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "22fbd34d-2156-4e4b-a4ec-cf97665aea25" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-10.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-10.json deleted file mode 100644 index 755be16dc8990a9934250eb08c3718edba51c42e..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-10.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards enrolment response if the hash was not calculated using compressed representation of public keys." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/49240420-14cd-4df4-8ce2-55b45895cae9"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "31c175bd-9e68-4ee1-bbf8-0435b04198ba" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-11.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-11.json deleted file mode 100644 index 492ed07a84b709fccd1fd043563937a993a68a9e..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-11.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards enrolment response if the hash was not calculated using compressed representation of public keys." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/57b9d378-30f4-46da-b01e-1f6aab832364"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "477a7f24-0076-4312-8bc8-40ed05d15f97" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-12.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-12.json deleted file mode 100644 index bf3627983bb54b547b2d30bafdb33a6200410b4b..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-12.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards enrolment response if it has duplicated PSID." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/0ed0292e-df6b-42c3-82c7-1d56f027bb37"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "4fe52ed8-ef2d-4336-912b-c78c2548373d" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-13.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-13.json deleted file mode 100644 index f5d1538dd6b67d052f366635665b11ea169eed32..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-13.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards enrolment response if the latitude is less than \u2013900 000 000 or greater than 900 000 000." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/35274261-246b-4814-8a83-fbf157b97b81"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "609159ba-82e5-4ef2-9c34-13ab654ad2b8" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-14.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-14.json deleted file mode 100644 index ceb3bb5979d23cd81a9c989268a5baaee6848801..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_ENR-04/ITS-S_ENR_EB-14.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards enrolment response if the longitude is less than -1 800 000 000 or greater than 1 800 000 000." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/fba1d958-c348-4938-93f5-9471ead78756"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "b3bb98d7-bbca-48fa-9cd2-3ba688c0112d" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-01.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-01.json deleted file mode 100644 index 620cad27f3ac07b887278c72eed9fd5100ffb74b..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-01.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/f557e3d6-87e8-47f3-a468-7324d5b0d176"] - }, - "_name": { - "key": "_name", - "type": "STRING", - "value": "07. Receiving Data NB" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "b388f0a8-bfbd-41ab-9dc1-b829b7abd0a6" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-01/ITS-S_R-DATA_NB-01.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-01/ITS-S_R-DATA_NB-01.json deleted file mode 100644 index 1c240ca9c735dfb986f9a31ab33643652e84f0b4..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-01/ITS-S_R-DATA_NB-01.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S accepts valid signed data from another ITS-S when the Signer Identifier is a Certificate Digest and the signature contains public key with various types." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/99d83a86-aa5b-4ece-8339-bba44fa734ce"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "d94d9976-9580-401e-a8c8-7570893ec79e" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-01/ITS-S_R-DATA_NB-02.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-01/ITS-S_R-DATA_NB-02.json deleted file mode 100644 index b7df7865a60c3eccf2db00ce032e034c66b06469..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-01/ITS-S_R-DATA_NB-02.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S accepts valid signed data from another ITS-S when the Signer Identifier is a Certificate Chain and the signature contains public key with various types." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/1d7fb027-457a-44a3-98a2-5dd38915d38b"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "52931446-5a9a-4628-b916-33ace8eb84f9" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-01/ITS-S_R-DATA_NB-03.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-01/ITS-S_R-DATA_NB-03.json deleted file mode 100644 index a889dc4f5dbf8ea2ca8474add9f9af8fa7a65d32..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-01/ITS-S_R-DATA_NB-03.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S accepts valid signed data from another ITS-S when the Signer Identifier is a Certificate with a lifetime set to duration." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/80db6911-d8a4-4f94-93d8-e7c0f58a09cd"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "d996ca19-38e9-42ff-95c6-532c07e92ea8" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-01/ITS-S_R-DATA_NB-04.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-01/ITS-S_R-DATA_NB-04.json deleted file mode 100644 index 2241094a14a1060d94225235c05b3637756c5dcd..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-01/ITS-S_R-DATA_NB-04.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S accepts valid signed data from another ITS-S when the Signer Identifier is a Certificate without a lifetime set to duration." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/d7b499a1-2e5b-4f04-a837-48172874178b"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "2c80a6ab-fbee-4325-820c-5de3600c5dba" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-01/ITS-S_R-DATA_NB-05.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-01/ITS-S_R-DATA_NB-05.json deleted file mode 100644 index 5e3202c098c1a51c6fdbc07758691764dddfa826..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-01/ITS-S_R-DATA_NB-05.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S accepts valid signed data from another ITS-S when the Signer Identifier is a Certificate containing list_size PSIDs" - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/33f934d7-95f1-441e-b649-04f962ac4118"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "9837c691-f01f-4378-af7c-f5e3004e3d0d" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-01/ITS-S_R-DATA_NB-06.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-01/ITS-S_R-DATA_NB-06.json deleted file mode 100644 index 90e6e3e1297df15455f9ef369759eeb0a631c620..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-01/ITS-S_R-DATA_NB-06.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S accepts valid signed data from another ITS-S when signed with a certificate containing an IdentifiedNotLocalizedScope and a zero-length subject_name field." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/e55978bd-4bf8-4a52-90c8-80ba82d61fcf"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "cec9c4e6-7de4-45d7-bc7c-2bb1b2799b8a" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-01/ITS-S_R-DATA_NB-07.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-01/ITS-S_R-DATA_NB-07.json deleted file mode 100644 index b5a1def172b102fa8a8a2127df6348721d022465..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-01/ITS-S_R-DATA_NB-07.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S accepts valid signed data from another ITS-S when signed with a certificate containing an IdentifiedNotLocalizedScope and a non-zero-length subject_name field." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/9c2477ca-1045-40df-8df3-2bc2a2dbe5dc"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "d3ce1631-0838-4159-97fc-88b784629e26" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02.json deleted file mode 100644 index 97b648e4164b3169ed41733ff96ceb2079eef7f9..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/69f2dbbf-ed81-46ac-956e-fd260c9cc38c"] - }, - "_name": { - "key": "_name", - "type": "STRING", - "value": "08. Receiving Data EB" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "d6494051-846c-40a5-a1c1-dc094ad24c02" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-01.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-01.json deleted file mode 100644 index e7f7b46d89ae25af4f7419042eebcd76bdf7a973..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-01.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards a 1609.2 secured message if the protocol version is invalid." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/5e964e13-ce14-46d6-95a9-331d3b8df811"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "5465fc84-752f-40ac-bb9c-26543cec770f" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-02.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-02.json deleted file mode 100644 index 7abbb6ce3e36562edfd2e87297ebb420461912a8..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-02.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards a 1609.2 secured message if the content type is not supported." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/92526f77-23f5-481c-9504-f3c16aacd490"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "ce599345-809e-49cf-bf98-28d7f9e819c3" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-03.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-03.json deleted file mode 100644 index 2da657480cb368799241aaecd6921713a286d7d3..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-03.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards valid signed data from another ITS-S when the expiry time of the received data is before the current time." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/39b2cfc2-c170-403d-92cf-9334a56c0320"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "d53deef8-82eb-4e07-be06-f3bfc7b678b1" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-04.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-04.json deleted file mode 100644 index 74a59adcdc2ef58aecb12e951ddeeba4eea9964b..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-04.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards valid signed data which expires before generation time." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/fa6370ea-bedb-47a6-91e3-3a28450e499d"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "1149a0f3-e817-44f3-a35a-f1e786e797c9" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-05.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-05.json deleted file mode 100644 index 47ecc48c7ba33c9d2580569aa4e7d8ad7236c4d5..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-05.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards valid signed data generated early then the validity period of the signing certificate." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/4a884055-cc07-44ff-92bb-322775640e0d"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "61e0cf84-67a8-4803-ae82-637df59f2288" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-06.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-06.json deleted file mode 100644 index c3307c26f7e7916d536f38c4fbe78188f006dab4..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-06.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards valid signed data generated later then the validity period of the signing certificate." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/c3c8c40e-5ebd-4268-850b-f65b2484bafa"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "36daab95-440e-462c-8a1a-70de9014baad" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-07.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-07.json deleted file mode 100644 index c90b0b2cd822e4b438651377a56f4797efe79cac..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-07.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards valid signed data which expires early then the validity period of the signing certificate." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/eca966da-aac3-432f-8184-745fc3f5d1a6"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "c3a25666-896f-4422-9960-a7d349f2b5d6" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-08.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-08.json deleted file mode 100644 index 2190c531c67dedce0579d3cde80303f63db80e2d..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-08.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards valid signed data which expires later then the validity period of the signing certificate." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/113f25cd-8f37-4dc9-bbea-a48b47dee724"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "fb840138-0016-4f84-a53a-a9ea59f65ea9" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-09.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-09.json deleted file mode 100644 index baa6a7fa7b874164bbc6f0219ae52b7d7b4a43f7..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-09.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards valid signed data from another ITS-S when the generation location of the received data is beyond the range considered valid by the IUT." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/4a160830-f5c8-4c48-ba03-1bbfd2123474"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "8a904187-cb63-4596-a7d2-4af9edc8e820" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-10.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-10.json deleted file mode 100644 index e34e5389bb1720beb34fccb6019380325d90d70d..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-10.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards valid signed data when the generated location is outside the validity region of the signer's certificate." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/7c20de83-2f4a-4414-9a8f-3d7abb8be1d8"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "1836887e-29c0-4942-b0bc-eb8f71f48991" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-11.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-11.json deleted file mode 100644 index 3acc9648251bf64169266e6d5051b786fc8d94ce..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-11.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards data with a cryptographically invalid signature." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/27a9f4ee-c84e-4ebf-9512-492f819f7c33"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "96b72d90-5414-4bd5-994d-f06455b5589c" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-12.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-12.json deleted file mode 100644 index ef511c5ccdba20eabff3c9a8241edb5950c5d3cd..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-12.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards a signed 1609.2 message if the signer type is not set to a permitted value." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/a403fa2b-948c-44c2-bc8b-72ca4f84606e"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "f4feb192-6266-4350-a32b-f1927698cfbf" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-13.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-13.json deleted file mode 100644 index 9f3de167dedb44635c0fb515b498635032d3f934..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-13.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards received data signed with a revoked certificate." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/e1c4a29d-598e-4fac-99ba-bc7d858e649b"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "6f5ac2c1-e571-4b7b-b511-d5d3a2e3d7e0" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-14.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-14.json deleted file mode 100644 index f9dd144f39a70cc6479ff8cfe852171ab0ab22ae..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-14.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards valid signed data when the signer is a certificate chain in which the region of validity of a subordinate certificate overlaps but is not wholly contained by the region of validity of its issuing certificate." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/6551654e-b308-43a9-a40f-74347a30e410"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "324025cd-4b3b-43ec-952f-9f39167dfeeb" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-15.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-15.json deleted file mode 100644 index d705d8540c3f071640f195f07f27de2e6da21e4c..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-15.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards valid signed data when the signer is a certificate chain in which the validity period of a subordinate certificate is outside that of its issuing certificate." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/0956fd46-ddcc-494d-8df8-692e87efbbaa"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "a7fb1fa2-e553-44e0-87ea-8ea9264e9353" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-16.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-16.json deleted file mode 100644 index 895087c4872c9acc0f0696a352f767d301cd7e7c..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-16.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards valid signed data when the signer is a certificate chain in which the operational permissions of a subordinate certificate are not a subset of the permissions of its issuing certificate." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/096c986d-cbd4-45ec-a89c-84c82fda2280"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "bf6a7b2c-9eee-4b7f-9f88-b83b6457eeba" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-17.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-17.json deleted file mode 100644 index facb52dc828c2021b271fc63def81a1366ab0dba..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-17.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards valid signed data when the signer is a certificate chain in which the subordinate certificate has a valid signature which is not the signature of its issuing certificate." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/0e46df91-3b22-4dab-beba-80504e87831d"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "c3e00995-cee4-4c6a-8484-649f78520ec6" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-18.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-18.json deleted file mode 100644 index 41f5b05c2d8942457093658e4de077fd43836cb3..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-18.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards valid signed data when the signer is a certificate chain in which an issuing certificate is not permitted to issue certificates of its subordinate certificate's type." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/6847c33e-7c6e-40e4-937b-c4554d17c4e0"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "421bb180-64d0-4b52-84e9-1b3cc140d595" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-19.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-19.json deleted file mode 100644 index 38f764313e6da06d9bed8cc361e6f69881ec5f21..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-19.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards a signed 1609.2 message if the version_and_type field is not set to the value 2." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/349eafe5-009a-4a18-8d70-9c2d8790de97"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "fb466960-dbd8-4f28-b4b7-ebcec7ef8b1c" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-20.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-20.json deleted file mode 100644 index 4b2fb4efebace7cf65ac7ea17a7bcc6523c347d0..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-20.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards a signed 1609.2 message if the signature is calculated over the hash of the version_and_type and the unsigned_certificate fields if the calculation does not use the compressed representation of all public keys and reconstruction values contained in the certificate." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/64c83378-09cf-4eca-8a71-b2c226cd35ad"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "0022fe66-0da9-4a23-9f19-221196bd5085" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-21.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-21.json deleted file mode 100644 index a8931da12dade65cdd23e0518e7f40d499eb6360..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-21.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards a signed 1609.2 message if both the crl_series and the expiration fields in the unsigned_certificate are empty." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/e20e9796-7b2c-49a6-90a1-4aff1ad1eddc"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "94280d3c-6b7a-49e1-84e9-98bb66d99abf" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-22.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-22.json deleted file mode 100644 index e49208c756629e69f512be0d553add1de16b484f..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-22.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards a signed 1609.2 message if the permissions requested in the end-user certificate contains duplicate PSIDs." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/071e8e77-6437-445d-9192-6a55b26d1ac7"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "8c1918d7-6681-419a-822d-59f33db93b21" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-23.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-23.json deleted file mode 100644 index e54eedf119ca1ff391b1276fccba02f02c1ce831..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-23.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards a signed 1609.2 message if the latitude specified in the region associated with the signers certificate scope is outside the limits of ±90˚." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/6dba05c2-4e9d-4ada-bbb6-657be301a16e"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "c338f9f2-85b0-4a19-9b4a-ae5431d09ab0" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-24.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-24.json deleted file mode 100644 index 77ae23c8638bf750d7ff1e28ab26cd0a852e2113..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-24.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards a signed 1609.2 message if the longitude specified in the region associated with the signers certificate scope is outside the limits of ±180˚." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/33b55de9-ab3f-44d7-acaa-07f5b5272c57"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "68c809cb-7bee-4df2-83e5-9a059cd3d9ad" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-25.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-25.json deleted file mode 100644 index a4b15a661959670276d38c0688c3f5a49e8abda5..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-25.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards a signed 1609.2 message if it contains a secured data exchange, identified not localized scope with zero PSID SSPs in its permissions list." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/8d201b66-5666-45dd-a3aa-6c99f0137a37"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "b60a6926-2b7f-47e8-ae62-349b370d59df" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-26.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-26.json deleted file mode 100644 index 4f99f354f1edfdb1c4f3edeed5ba845936ae8df6..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_R-DATA-02/ITS-S_R-DATA_EB-26.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S discards a signed 1609.2 message if it contains a secured data exchange, identified not localized scope with a PSID SSPs of more than 31 octets." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/e0d78e08-4c86-4a92-a5a8-e72e8568b553"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "ad5a9fb4-a930-4d5e-aee6-90a564822e9d" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01.json deleted file mode 100644 index 318efaf7bbfc8fef15ea0aa4c4c2709e0b6c3730..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/81f4bc83-68c1-4683-8c14-8fcc68bdc349"] - }, - "_name": { - "key": "_name", - "type": "STRING", - "value": "06. Sending Data" - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "11b9a71c-279f-4207-b15b-d2f64c9cf73d" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-01.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-01.json deleted file mode 100644 index 3d1daba83cdd03e1c74e52d0bcca51595ec6e00e..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-01.json +++ /dev/null @@ -1,23 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S sends a correctly signed message with payload." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": [ - "/Documents/TS103096-02.xhtml/4b1e86c4-4e64-4c7f-a1f3-b35b3bd97cde", - "/Documents/TS103096-02.xhtml/6be5d0ae-0ccd-4a26-abaa-ef46b9bc22d4" - ] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "20914ead-e971-4d32-b8f4-cd31e8d40579" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-02.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-02.json deleted file mode 100644 index 5f72fea553273031879d722f85feff16707efe9d..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-02.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S sends correctly signed message with partial payload." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/9c48f3c4-837d-4a21-8cf8-623e60c494de"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "1035c1be-9930-48dd-910c-a77af32fc0b7" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-03.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-03.json deleted file mode 100644 index 9515a50ea4c8fc90ac5d8eab5f30fd9d4046a4f9..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-03.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S sends correctly signed message with external payload." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/bf2bd6cc-f807-429f-9948-5bad1b4e0ea9"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "3a0f8f1e-039f-4e89-80bb-21565306ecbd" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-04.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-04.json deleted file mode 100644 index e24b452c0d1ec4eb4dbd5a6650d1f40de04370ed..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-04.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that if ITS-S generates correctly a signed message containing the generation time." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/88dc481a-a3e0-4693-8e53-5194f9e5d93a"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "30c41ff4-ece2-4455-9b35-82e0e67cbbc0" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-05.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-05.json deleted file mode 100644 index 498e1a630ae974c8f2f2baf1d74531655ccc055d..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-05.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that if ITS-S generates correctly multiple signed messages containing the generation time." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/68efc865-bff1-450d-bebf-c0d4eb89285e"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "dd32ebf3-7f70-4d4d-a2f8-3cb38ed43591" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-06.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-06.json deleted file mode 100644 index 6cb55a357ce91b41b3ff95498ef5255acdd98d28..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-06.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that if ITS-S generates correctly a ToBeSignedData containing the expiry time." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/00970315-e4d0-445e-bdd7-3a6707f8e1b6"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "1eb771b1-650d-433d-bc8c-ea752a73bc38" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-07.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-07.json deleted file mode 100644 index 79da4cf095e529e701812bd253ee04cceeba89ea..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-07.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that if ITS-S generates correctly a ToBeSignedData containing the generation location." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/213d6da7-2190-446d-9a57-368489c9f50f"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "62d43b7b-16e0-4d3b-8885-aec07fa4648a" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-08.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-08.json deleted file mode 100644 index cd4307273497c985ad1fb331ebcf5bb923663275..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-08.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S can generate valid signed data with ecdsa_nistp256_with_sha256." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/9035bf24-c5c2-4d90-843f-5f4e0a502b21"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "aaf7a49a-d0f9-41b4-a8f7-10357cbfea9c" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-09.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-09.json deleted file mode 100644 index d31d364473827679c2fb301e6e714ec05637c62d..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-09.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that the ITS-S can generate valid signed data with ecdsa_nistp224_with_sha224." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/fb006c85-0644-4a79-81b9-4f102ed3edad"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "2c6a3364-1986-4942-969d-0ade7efeaab2" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-10.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-10.json deleted file mode 100644 index f3e918178492b1e34d282ddc619e266b4bc7281c..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-10.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S generates signed data with signature with different public key types." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/186a350f-fcde-4ec8-8d02-bf5aee419515"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "cbfea06e-5dd3-42ce-afc7-f50c75389250" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-11.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-11.json deleted file mode 100644 index b59bfffb930b763e58ef91c3cd48da0cb42ae966..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-11.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S generates valid signed data with a certificate containing lifetime field when cf flag is set to lifetime_is_duration." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/9d5b8cf4-5ea7-4906-9c87-65ac02296914"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "28d0e989-563b-477e-8b8f-6437346e4188" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-12.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-12.json deleted file mode 100644 index 610c1a3f37e865d9e20f1a14483704ae28ac9bf3..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-12.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S generates valid signed data with a certificate containing start_validity field." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/3ab404a7-f606-430c-9408-430ba13e347a"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "c8ff2c90-1f72-46f1-8071-05e9d8873d33" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-13.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-13.json deleted file mode 100644 index bc98dfac755a3857d68f697c02e34943f2ae10dd..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-13.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S generates valid signed data with a certificate containing encryption_key field." - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/bed699c8-cfa1-4152-a631-28a2e82d1b9c"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "d1c3d1a8-0cc9-4585-9512-862110c6923b" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-14.json b/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-14.json deleted file mode 100644 index 53d0d80745c16b544427e9712d1fa5db9494dec1..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Requirements/ITS-S/ITS-S_S-DATA-01/ITS-S_S-DATA_NB-14.json +++ /dev/null @@ -1,20 +0,0 @@ -{ - "attributes": { - "_description": { - "key": "_description", - "type": "STRING", - "value": "Check that ITS-S generates valid signed data with a certificate containing more than 8 entries in the permissions_list field. " - }, - "_locations": { - "key": "_locations", - "type": "LIST", - "value": ["/Documents/TS103096-02.xhtml/d1ad5a26-2109-4276-aa2b-395250f679fa"] - }, - "_type": { - "key": "_type", - "type": "STRING", - "value": "Requirement" - } - }, - "uuid": "8eb082de-e91c-45ce-a27f-252b9c138c1f" -} \ No newline at end of file diff --git a/requality/TS103096_BasedOnIEEE1609/root/Types.json b/requality/TS103096_BasedOnIEEE1609/root/Types.json deleted file mode 100644 index b4193e253cc49dff28bfaf109049757813e047ab..0000000000000000000000000000000000000000 --- a/requality/TS103096_BasedOnIEEE1609/root/Types.json +++ /dev/null @@ -1,8 +0,0 @@ -{ - "attributes": {"_type": { - "key": "_type", - "type": "STRING", - "value": "NodeType" - }}, - "uuid": "b33c8b82-78dc-4f53-937a-11c108a74022" -} \ No newline at end of file