Loading docs/EtsiTs103759BaseTypes.md +1 −1 Original line number Diff line number Diff line Loading @@ -19,7 +19,6 @@ This data type contains the template for a report on any ITS PDU. the observations field, plus other PDUs sent for the same application (AID) by the same sender). }, * nonV2xPduEvidence<br> is any information that was used by the detectors other than the V2X PDUs. If the report does not contain any Loading Loading @@ -225,6 +224,7 @@ This is the Information Object Class used to define evidence. >>> NOTE: No instances of this class are defined in this version of this document. >>> ```asn1 C-ASR-EV ::= C-2ENT ``` Loading docs/EtsiTs103759Core.md +1 −0 Original line number Diff line number Diff line Loading @@ -119,6 +119,7 @@ This data type contains the ITS-AID of the unknown service. NOTE: This value is used for suspicious observations that are not or cannot be linked to a specific application. >>> ```asn1 c-AsrAppAgnostic Psid ::= 270549119 ``` Loading docs/Ieee1609Dot2.md +20 −18 Original line number Diff line number Diff line Loading @@ -25,6 +25,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization for the relevant operations specified in 6.1.2. The canonicalization applies to the Ieee1609Dot2Content. >>> ```asn1 Ieee1609Dot2Data ::= SEQUENCE { protocolVersion Uint8(3), Loading Loading @@ -55,13 +56,12 @@ Ieee1609Dot2Data ::= SEQUENCE { certificate request signed by an ITU-T X.509 certificate. ..., >>> NOTE: Canonicalization: This data structure is subject to canonicalization for the relevant operations specified in 6.1.2 if it is of type signedData. The canonicalization applies to the SignedData. >>> ```asn1 Ieee1609Dot2Content ::= CHOICE { unsecuredData Opaque, Loading Loading @@ -110,6 +110,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization for the relevant operations specified in 6.1.2. The canonicalization applies to the ToBeSignedData and the Signature. >>> ```asn1 SignedData ::= SEQUENCE { hashId HashAlgorithm, Loading Loading @@ -152,6 +153,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization applies to the SignedDataPayload if it is of type data, and to the HeaderInfo. >>> ```asn1 ToBeSignedData ::= SEQUENCE { payload SignedDataPayload, Loading Loading @@ -185,13 +187,12 @@ ToBeSignedData ::= SEQUENCE { data in the hash calculation is specified in 6.3.6. ..., >>> NOTE: Canonicalization: This data structure is subject to canonicalization for the relevant operations specified in 6.1.2. The canonicalization applies to the Ieee1609Dot2Data. >>> ```asn1 SignedDataPayload ::= SEQUENCE { data Ieee1609Dot2Data OPTIONAL, Loading @@ -212,8 +213,6 @@ SignedDataPayload ::= SEQUENCE { * _sha384HashedData_ of type [**HashedId48**](Ieee1609Dot2BaseTypes.md#HashedId48) <br> indicates data hashed with SHA-384. ..., * _sm3HashedData_ of type [**HashedId32**](Ieee1609Dot2BaseTypes.md#HashedId32) <br> indicates data hashed with SM3. Loading @@ -225,6 +224,7 @@ NOTE: Critical information fields: If present, this is a critical shall indicate that the signed SPDU is invalid in the sense of 4.2.2.3.2, that is, it is invalid in the sense that its validity cannot be established. >>> ```asn1 HashedData::= CHOICE { sha256HashedData HashedId32, Loading Loading @@ -291,8 +291,6 @@ HashedData::= CHOICE { to the COER-encoded certificate, canonicalized as defined in the definition of Certificate. ..., * _requestedCertificate_ of type [**Certificate**](Ieee1609Dot2.md#Certificate) OPTIONAL<br> if present, is used by the SDS to provide certificates per the "inline" version of the peer-to-peer certificate Loading Loading @@ -320,6 +318,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization The canonicalization does not apply to any fields after the extension marker, including any fields in contributedExtensions. >>> ```asn1 HeaderInfo ::= SEQUENCE { psid Psid, Loading Loading @@ -514,6 +513,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization for the relevant operations specified in 6.1.2. The canonicalization applies to every Certificate in the certificate field. >>> ```asn1 SignerIdentifier ::= CHOICE { digest HashedId8, Loading Loading @@ -577,6 +577,7 @@ NOTE: If the plaintext is raw data, i.e., it has not been output from a 80 indicates the choice unsecuredData, and the third byte 08 is the length of the raw data '01 23 45 67 89 AB CD EF'. >>> ```asn1 EncryptedData ::= SEQUENCE { recipients SequenceOfRecipientInfo, Loading Loading @@ -635,6 +636,7 @@ NOTE: The material input to encryption is the bytes of the encryption key with no headers, encapsulation, or length indication. Contrast this to encryption of data, where the data is encapsulated in an Ieee1609Dot2Data. >>> ```asn1 RecipientInfo ::= CHOICE { pskRecipInfo PreSharedKeyRecipientInfo, Loading Loading @@ -736,8 +738,6 @@ Critical information fields: If present and applicable to * _eciesNistP256_ of type [**EciesP256EncryptedKey**](Ieee1609Dot2BaseTypes.md#EciesP256EncryptedKey) <br> * _eciesBrainpoolP256r1_ of type [**EciesP256EncryptedKey**](Ieee1609Dot2BaseTypes.md#EciesP256EncryptedKey) <br> * _ecencSm2256_ of type [**EcencP256EncryptedKey**](Ieee1609Dot2BaseTypes.md#EcencP256EncryptedKey) <br> ..., ```asn1 EncryptedDataEncryptionKey ::= CHOICE { eciesNistP256 EciesP256EncryptedKey, Loading @@ -753,8 +753,6 @@ EncryptedDataEncryptionKey ::= CHOICE { * _aes128ccm_ of type [**One28BitCcmCiphertext**](#One28BitCcmCiphertext) <br> * _sm4Ccm_ of type [**One28BitCcmCiphertext**](#One28BitCcmCiphertext) <br> ..., >>> NOTE: Critical information fields: If present, this is a critical information field as defined in 5.2.6. An implementation that does not Loading @@ -762,6 +760,7 @@ NOTE: Critical information fields: If present, this is a critical shall indicate that the signed SPDU is invalid in the sense of 4.2.2.3.2, that is, it is invalid in the sense that its validity cannot be established. >>> ```asn1 SymmetricCiphertext ::= CHOICE { aes128ccm One28BitCcmCiphertext, Loading Loading @@ -798,6 +797,7 @@ NOTE: In the name of this structure, "One28" indicates that the bits affects only the size of the MAC and does not affect the size of the raw ciphertext. >>> ```asn1 One28BitCcmCiphertext ::= SEQUENCE { nonce OCTET STRING (SIZE (12)), Loading @@ -820,6 +820,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization for the relevant operations specified in 6.1.2. The canonicalization applies to the CertificateBase. >>> ```asn1 TestCertificate ::= Certificate ``` Loading Loading @@ -874,6 +875,7 @@ NOTE: Whole-certificate hash: If the entirety of a certificate is hashed this purpose is known as the whole-certificate hash. The method used to determine the whole-certificate hash algorithm is specified in 5.3.9.2. >>> ```asn1 CertificateBase ::= SEQUENCE { version Uint8(3), Loading @@ -895,6 +897,7 @@ NOTE: Critical information fields: If present, this is a critical that is, it is invalid in the sense that its validity cannot be established. >>> ```asn1 CertificateType ::= ENUMERATED { explicit, Loading Loading @@ -952,8 +955,6 @@ If the choice indicated is sha256AndDigest, sha384AndDigest, or * _sha256AndDigest_ of type [**HashedId8**](Ieee1609Dot2BaseTypes.md#HashedId8) <br> * _self_ of type [**HashAlgorithm**](Ieee1609Dot2BaseTypes.md#HashAlgorithm) <br> * _sha384AndDigest_ of type [**HashedId8**](Ieee1609Dot2BaseTypes.md#HashedId8) <br> ..., * _sm3AndDigest_ of type [**HashedId8**](Ieee1609Dot2BaseTypes.md#HashedId8) <br> >>> Loading @@ -964,6 +965,7 @@ NOTE: Critical information fields: If present, this is a critical that is, it is invalid in the sense that its validity cannot be established. >>> ```asn1 IssuerIdentifier ::= CHOICE { sha256AndDigest HashedId8, Loading Loading @@ -1149,6 +1151,7 @@ NOTE: Critical information fields: (because it could validate all relevant fields) or invalid (because it could not parse the entire certificate) is implementation-specific. >>> ```asn1 ToBeSignedCertificate ::= SEQUENCE { id CertificateId, Loading Loading @@ -1200,6 +1203,7 @@ NOTE: Critical information fields: An implementation that does not recognize the choice indicated in this field shall reject a signed SPDU as invalid. >>> ```asn1 CertificateId ::= CHOICE { linkageData LinkageData, Loading Loading @@ -1310,6 +1314,7 @@ NOTE: Critical information fields: sense that its validity cannot be established. A conformant implementation shall support explicit fields containing at least eight entries. >>> ```asn1 SubjectPermissions ::= CHOICE { explicit SequenceOfPsidSspRange, Loading Loading @@ -1340,6 +1345,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization choice indicated within the EccP256CurvePoint is compressed-y-0 or compressed-y-1. >>> ```asn1 VerificationKeyIndicator ::= CHOICE { verificationKey PublicVerificationKey, Loading Loading @@ -1428,8 +1434,6 @@ SequenceOfCertIssueExtensions ::= identifies the extension type. * _specific_ of type [**CERT-EXT-TYPE**](Ieee1609Dot2BaseTypes.md#CERT-EXT-TYPE) .&Issue({SetCertExtensions}{@.id})<br> permissions CHOICE { * _all_ of type **NULL** <br> * permissions<br> indicates the permissions. Within this field. Loading Loading @@ -1474,8 +1478,6 @@ SequenceOfCertRequestExtensions ::= SEQUENCE (SIZE(1..MAX)) OF CertRequestExtens identifies the extension type. * _content_ of type [**CERT-EXT-TYPE**](Ieee1609Dot2BaseTypes.md#CERT-EXT-TYPE) .&Req({SetCertExtensions}{@.id})<br> permissions CHOICE { * _all_ of type **NULL** <br> * permissions<br> indicates the permissions. Within this field. Loading docs/Ieee1609Dot2BaseTypes.md +21 −16 Original line number Diff line number Diff line Loading @@ -233,6 +233,7 @@ ValidityPeriod ::= SEQUENCE { NOTE: Years can be mapped more closely to wall-clock days using the hours choice for up to 7 years and the sixtyHours choice for up to 448 years. >>> ```asn1 Duration ::= CHOICE { microseconds Uint16, Loading Loading @@ -290,6 +291,7 @@ NOTE: Critical information fields: that its validity cannot be established. A conformant implementation shall support identifiedRegion fields containing at least eight entries. >>> ```asn1 GeographicRegion ::= CHOICE { circularRegion CircularRegion, Loading Loading @@ -368,6 +370,7 @@ NOTE: Critical information fields: If present, this is a critical implementation shall support PolygonalRegions containing at least eight TwoDLocation entries. >>> ```asn1 PolygonalRegion ::= SEQUENCE SIZE (3..MAX) OF TwoDLocation ``` Loading @@ -386,6 +389,7 @@ NOTE: This data structure is consistent with the location encoding longitude (used to indicate that the longitude was not available) are not valid. >>> ```asn1 TwoDLocation ::= SEQUENCE { latitude SecLatitude, Loading Loading @@ -649,6 +653,7 @@ NOTE: The units used in this data structure are consistent with the location data structures used in SAE J2735 [B26], though the encoding is incompatible. >>> ```asn1 ThreeDLocation ::= SEQUENCE { latitude SecLatitude, Loading Loading @@ -754,8 +759,6 @@ UnknownLongitude ::= OneEightyDegreeInt (unknown) * _ecdsaNistP256Signature_ of type [**EcdsaP256Signature**](#EcdsaP256Signature) <br> * _ecdsaBrainpoolP256r1Signature_ of type [**EcdsaP256Signature**](#EcdsaP256Signature) <br> * _ecdsaBrainpoolP384r1Signature_ of type [**EcdsaP384Signature**](#EcdsaP384Signature) <br> ..., * _ecdsaNistP384Signature_ of type [**EcdsaP384Signature**](#EcdsaP384Signature) <br> * _sm2Signature_ of type [**EcsigP256Signature**](#EcsigP256Signature) <br> Loading @@ -765,6 +768,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization applies to instances of this data structure of form EcdsaP256Signature and EcdsaP384Signature. >>> ```asn1 Signature ::= CHOICE { ecdsaNistP256Signature EcdsaP256Signature, Loading Loading @@ -814,6 +818,7 @@ NOTE: When the signature is of form x-only, the x-value in rSig is 256-bit curves in this standard, the exact values of n and p in hexadecimal are: >>> ```asn1 EcdsaP256Signature ::= SEQUENCE { rSig EccP256CurvePoint, Loading Loading @@ -852,6 +857,7 @@ NOTE: When the signature is of form x-only, the x-value in rSig is - n = 8CB91E82A3386D280F5D6F7E50E641DF152F7109ED5456B31F166E6CAC0425A7 CF3AB6AF6B7FC3103B883202E9046565 >>> ```asn1 EcdsaP384Signature ::= SEQUENCE { rSig EccP384CurvePoint, Loading Loading @@ -893,8 +899,6 @@ EcsigP256Signature ::= SEQUENCE { * _compressed-y-0_ of type **OCTET STRING** (SIZE (32))<br> * _compressed-y-1_ of type **OCTET STRING** (SIZE (32))<br> * _x_ of type **OCTET STRING** (SIZE (32))<br> uncompressedP256 SEQUENCE { * _y_ of type **OCTET STRING** (SIZE (32))<br> >>> Loading @@ -904,6 +908,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization and ToBeSignedCertificate for a specification of the canonicalization operations. >>> ```asn1 EccP256CurvePoint::= CHOICE { x-only OCTET STRING (SIZE (32)), Loading Loading @@ -937,8 +942,6 @@ EccP256CurvePoint::= CHOICE { * _compressed-y-0_ of type **OCTET STRING** (SIZE (48))<br> * _compressed-y-1_ of type **OCTET STRING** (SIZE (48))<br> * _x_ of type **OCTET STRING** (SIZE (48))<br> uncompressedP384 SEQUENCE { * _y_ of type **OCTET STRING** (SIZE (48))<br> >>> Loading @@ -948,6 +951,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization and ToBeSignedCertificate for a specification of the canonicalization operations. >>> ```asn1 EccP384CurvePoint::= CHOICE { x-only OCTET STRING (SIZE (48)), Loading Loading @@ -987,6 +991,7 @@ NOTE: Critical information fields: This is a critical information field as indicate that the signed SPDU is invalid in the sense of 4.2.2.3.2, that is, it is invalid in the sense that its validity cannot be established. >>> ```asn1 HashAlgorithm ::= ENUMERATED { sha256, Loading Loading @@ -1068,6 +1073,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization ToBeSignedCertificate for a specification of the canonicalization operations. >>> ```asn1 EncryptionKey ::= CHOICE { public PublicEncryptionKey, Loading @@ -1090,6 +1096,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization ToBeSignedCertificate for a specification of the canonicalization operations. >>> ```asn1 PublicEncryptionKey ::= SEQUENCE { supportedSymmAlg SymmAlgorithm, Loading @@ -1105,8 +1112,6 @@ PublicEncryptionKey ::= SEQUENCE { * _eciesBrainpoolP256r1_ of type [**EccP256CurvePoint**](Ieee1609Dot2BaseTypes.md#EccP256CurvePoint) <br> * _ecencSm2_ of type [**EccP256CurvePoint**](Ieee1609Dot2BaseTypes.md#EccP256CurvePoint) <br> ..., >>> NOTE: Canonicalization: This data structure is subject to canonicalization for the relevant operations specified in 6.1.2 if it appears in a Loading @@ -1114,6 +1119,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization and ToBeSignedCertificate for a specification of the canonicalization operations. >>> ```asn1 BasePublicEncryptionKey ::= CHOICE { eciesNistP256 EccP256CurvePoint, Loading @@ -1132,8 +1138,6 @@ BasePublicEncryptionKey ::= CHOICE { * _ecdsaNistP256_ of type [**EccP256CurvePoint**](Ieee1609Dot2BaseTypes.md#EccP256CurvePoint) <br> * _ecdsaBrainpoolP256r1_ of type [**EccP256CurvePoint**](Ieee1609Dot2BaseTypes.md#EccP256CurvePoint) <br> * _ecdsaBrainpoolP384r1_ of type [**EccP384CurvePoint**](#EccP384CurvePoint) <br> ... , * _ecdsaNistP384_ of type [**EccP384CurvePoint**](#EccP384CurvePoint) <br> * _ecsigSm2_ of type [**EccP256CurvePoint**](Ieee1609Dot2BaseTypes.md#EccP256CurvePoint) <br> Loading @@ -1144,6 +1148,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization point are encoded in compressed form, i.e., such that the choice indicated within the Ecc*CurvePoint is compressed-y-0 or compressed-y-1. >>> ```asn1 PublicVerificationKey ::= CHOICE { ecdsaNistP256 EccP256CurvePoint, Loading @@ -1161,8 +1166,6 @@ PublicVerificationKey ::= CHOICE { * _aes128Ccm_ of type **OCTET STRING** (SIZE(16))<br> * _sm4Ccm_ of type **OCTET STRING** (SIZE(16))<br> ..., ```asn1 SymmetricEncryptionKey ::= CHOICE { aes128Ccm OCTET STRING(SIZE(16)), Loading Loading @@ -1191,6 +1194,7 @@ NOTE: Consistency with issuing certificate: If a certificate has an - The sspRange field in P indicates opaque and one of the entries in opaque is an OCTET STRING of length 0. >>> ```asn1 PsidSsp ::= SEQUENCE { psid Psid, Loading Loading @@ -1227,8 +1231,6 @@ For consistency rules for other types of ServiceSpecificPermissions, * _opaque_ of type **OCTET STRING** (SIZE(0..MAX))<br> * _bitmapSsp_ of type [**BitmapSsp**](#BitmapSsp) <br> ..., >>> NOTE: Consistency with issuing certificate: If a certificate has an appPermissions entry A for which the ssp field is opaque, A is consistent Loading @@ -1244,6 +1246,7 @@ NOTE: Consistency with issuing certificate: If a certificate has an the opaque field in P is an OCTET STRING identical to the opaque field in A. >>> ```asn1 ServiceSpecificPermissions ::= CHOICE { opaque OCTET STRING (SIZE(0..MAX)), Loading @@ -1265,6 +1268,7 @@ NOTE: A BitmapSsp B is consistent with a BitmapSspRange R if for every set to 0 in the sspBitmask in R, the value of corresponding bit in the identical position in B has no bearing on whether B and R are consistent. >>> ```asn1 BitmapSsp ::= OCTET STRING (SIZE(0..31)) ``` Loading Loading @@ -1312,13 +1316,12 @@ If a certificate has a PsidSspRange A for which the ssp field is all, * _all_ of type **NULL** <br> * _bitmapSspRange_ of type [**BitmapSspRange**](#BitmapSspRange) <br> ..., >>> NOTE: The choice "all" may also be indicated by omitting the SspRange in the enclosing PsidSspRange structure. Omitting the SspRange is preferred to explicitly indicating "all". >>> ```asn1 SspRange ::= CHOICE { opaque SequenceOfOctetString, Loading Loading @@ -1355,6 +1358,7 @@ NOTE: Consistency with issuing certificate: If a certificate has an - The bit in the identical position in the sspValue in P is set equal to the bit in that position in the sspValue in R. >>> ```asn1 BitmapSspRange ::= SEQUENCE { sspValue OCTET STRING (SIZE(1..32)), Loading Loading @@ -1390,6 +1394,7 @@ NOTE: This field was originally specified in ETSI TS 103 097 and future uses of this field are anticipated to be consistent with future versions of that standard. >>> ```asn1 SubjectAssurance ::= OCTET STRING (SIZE(1)) ``` Loading Loading
docs/EtsiTs103759BaseTypes.md +1 −1 Original line number Diff line number Diff line Loading @@ -19,7 +19,6 @@ This data type contains the template for a report on any ITS PDU. the observations field, plus other PDUs sent for the same application (AID) by the same sender). }, * nonV2xPduEvidence<br> is any information that was used by the detectors other than the V2X PDUs. If the report does not contain any Loading Loading @@ -225,6 +224,7 @@ This is the Information Object Class used to define evidence. >>> NOTE: No instances of this class are defined in this version of this document. >>> ```asn1 C-ASR-EV ::= C-2ENT ``` Loading
docs/EtsiTs103759Core.md +1 −0 Original line number Diff line number Diff line Loading @@ -119,6 +119,7 @@ This data type contains the ITS-AID of the unknown service. NOTE: This value is used for suspicious observations that are not or cannot be linked to a specific application. >>> ```asn1 c-AsrAppAgnostic Psid ::= 270549119 ``` Loading
docs/Ieee1609Dot2.md +20 −18 Original line number Diff line number Diff line Loading @@ -25,6 +25,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization for the relevant operations specified in 6.1.2. The canonicalization applies to the Ieee1609Dot2Content. >>> ```asn1 Ieee1609Dot2Data ::= SEQUENCE { protocolVersion Uint8(3), Loading Loading @@ -55,13 +56,12 @@ Ieee1609Dot2Data ::= SEQUENCE { certificate request signed by an ITU-T X.509 certificate. ..., >>> NOTE: Canonicalization: This data structure is subject to canonicalization for the relevant operations specified in 6.1.2 if it is of type signedData. The canonicalization applies to the SignedData. >>> ```asn1 Ieee1609Dot2Content ::= CHOICE { unsecuredData Opaque, Loading Loading @@ -110,6 +110,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization for the relevant operations specified in 6.1.2. The canonicalization applies to the ToBeSignedData and the Signature. >>> ```asn1 SignedData ::= SEQUENCE { hashId HashAlgorithm, Loading Loading @@ -152,6 +153,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization applies to the SignedDataPayload if it is of type data, and to the HeaderInfo. >>> ```asn1 ToBeSignedData ::= SEQUENCE { payload SignedDataPayload, Loading Loading @@ -185,13 +187,12 @@ ToBeSignedData ::= SEQUENCE { data in the hash calculation is specified in 6.3.6. ..., >>> NOTE: Canonicalization: This data structure is subject to canonicalization for the relevant operations specified in 6.1.2. The canonicalization applies to the Ieee1609Dot2Data. >>> ```asn1 SignedDataPayload ::= SEQUENCE { data Ieee1609Dot2Data OPTIONAL, Loading @@ -212,8 +213,6 @@ SignedDataPayload ::= SEQUENCE { * _sha384HashedData_ of type [**HashedId48**](Ieee1609Dot2BaseTypes.md#HashedId48) <br> indicates data hashed with SHA-384. ..., * _sm3HashedData_ of type [**HashedId32**](Ieee1609Dot2BaseTypes.md#HashedId32) <br> indicates data hashed with SM3. Loading @@ -225,6 +224,7 @@ NOTE: Critical information fields: If present, this is a critical shall indicate that the signed SPDU is invalid in the sense of 4.2.2.3.2, that is, it is invalid in the sense that its validity cannot be established. >>> ```asn1 HashedData::= CHOICE { sha256HashedData HashedId32, Loading Loading @@ -291,8 +291,6 @@ HashedData::= CHOICE { to the COER-encoded certificate, canonicalized as defined in the definition of Certificate. ..., * _requestedCertificate_ of type [**Certificate**](Ieee1609Dot2.md#Certificate) OPTIONAL<br> if present, is used by the SDS to provide certificates per the "inline" version of the peer-to-peer certificate Loading Loading @@ -320,6 +318,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization The canonicalization does not apply to any fields after the extension marker, including any fields in contributedExtensions. >>> ```asn1 HeaderInfo ::= SEQUENCE { psid Psid, Loading Loading @@ -514,6 +513,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization for the relevant operations specified in 6.1.2. The canonicalization applies to every Certificate in the certificate field. >>> ```asn1 SignerIdentifier ::= CHOICE { digest HashedId8, Loading Loading @@ -577,6 +577,7 @@ NOTE: If the plaintext is raw data, i.e., it has not been output from a 80 indicates the choice unsecuredData, and the third byte 08 is the length of the raw data '01 23 45 67 89 AB CD EF'. >>> ```asn1 EncryptedData ::= SEQUENCE { recipients SequenceOfRecipientInfo, Loading Loading @@ -635,6 +636,7 @@ NOTE: The material input to encryption is the bytes of the encryption key with no headers, encapsulation, or length indication. Contrast this to encryption of data, where the data is encapsulated in an Ieee1609Dot2Data. >>> ```asn1 RecipientInfo ::= CHOICE { pskRecipInfo PreSharedKeyRecipientInfo, Loading Loading @@ -736,8 +738,6 @@ Critical information fields: If present and applicable to * _eciesNistP256_ of type [**EciesP256EncryptedKey**](Ieee1609Dot2BaseTypes.md#EciesP256EncryptedKey) <br> * _eciesBrainpoolP256r1_ of type [**EciesP256EncryptedKey**](Ieee1609Dot2BaseTypes.md#EciesP256EncryptedKey) <br> * _ecencSm2256_ of type [**EcencP256EncryptedKey**](Ieee1609Dot2BaseTypes.md#EcencP256EncryptedKey) <br> ..., ```asn1 EncryptedDataEncryptionKey ::= CHOICE { eciesNistP256 EciesP256EncryptedKey, Loading @@ -753,8 +753,6 @@ EncryptedDataEncryptionKey ::= CHOICE { * _aes128ccm_ of type [**One28BitCcmCiphertext**](#One28BitCcmCiphertext) <br> * _sm4Ccm_ of type [**One28BitCcmCiphertext**](#One28BitCcmCiphertext) <br> ..., >>> NOTE: Critical information fields: If present, this is a critical information field as defined in 5.2.6. An implementation that does not Loading @@ -762,6 +760,7 @@ NOTE: Critical information fields: If present, this is a critical shall indicate that the signed SPDU is invalid in the sense of 4.2.2.3.2, that is, it is invalid in the sense that its validity cannot be established. >>> ```asn1 SymmetricCiphertext ::= CHOICE { aes128ccm One28BitCcmCiphertext, Loading Loading @@ -798,6 +797,7 @@ NOTE: In the name of this structure, "One28" indicates that the bits affects only the size of the MAC and does not affect the size of the raw ciphertext. >>> ```asn1 One28BitCcmCiphertext ::= SEQUENCE { nonce OCTET STRING (SIZE (12)), Loading @@ -820,6 +820,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization for the relevant operations specified in 6.1.2. The canonicalization applies to the CertificateBase. >>> ```asn1 TestCertificate ::= Certificate ``` Loading Loading @@ -874,6 +875,7 @@ NOTE: Whole-certificate hash: If the entirety of a certificate is hashed this purpose is known as the whole-certificate hash. The method used to determine the whole-certificate hash algorithm is specified in 5.3.9.2. >>> ```asn1 CertificateBase ::= SEQUENCE { version Uint8(3), Loading @@ -895,6 +897,7 @@ NOTE: Critical information fields: If present, this is a critical that is, it is invalid in the sense that its validity cannot be established. >>> ```asn1 CertificateType ::= ENUMERATED { explicit, Loading Loading @@ -952,8 +955,6 @@ If the choice indicated is sha256AndDigest, sha384AndDigest, or * _sha256AndDigest_ of type [**HashedId8**](Ieee1609Dot2BaseTypes.md#HashedId8) <br> * _self_ of type [**HashAlgorithm**](Ieee1609Dot2BaseTypes.md#HashAlgorithm) <br> * _sha384AndDigest_ of type [**HashedId8**](Ieee1609Dot2BaseTypes.md#HashedId8) <br> ..., * _sm3AndDigest_ of type [**HashedId8**](Ieee1609Dot2BaseTypes.md#HashedId8) <br> >>> Loading @@ -964,6 +965,7 @@ NOTE: Critical information fields: If present, this is a critical that is, it is invalid in the sense that its validity cannot be established. >>> ```asn1 IssuerIdentifier ::= CHOICE { sha256AndDigest HashedId8, Loading Loading @@ -1149,6 +1151,7 @@ NOTE: Critical information fields: (because it could validate all relevant fields) or invalid (because it could not parse the entire certificate) is implementation-specific. >>> ```asn1 ToBeSignedCertificate ::= SEQUENCE { id CertificateId, Loading Loading @@ -1200,6 +1203,7 @@ NOTE: Critical information fields: An implementation that does not recognize the choice indicated in this field shall reject a signed SPDU as invalid. >>> ```asn1 CertificateId ::= CHOICE { linkageData LinkageData, Loading Loading @@ -1310,6 +1314,7 @@ NOTE: Critical information fields: sense that its validity cannot be established. A conformant implementation shall support explicit fields containing at least eight entries. >>> ```asn1 SubjectPermissions ::= CHOICE { explicit SequenceOfPsidSspRange, Loading Loading @@ -1340,6 +1345,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization choice indicated within the EccP256CurvePoint is compressed-y-0 or compressed-y-1. >>> ```asn1 VerificationKeyIndicator ::= CHOICE { verificationKey PublicVerificationKey, Loading Loading @@ -1428,8 +1434,6 @@ SequenceOfCertIssueExtensions ::= identifies the extension type. * _specific_ of type [**CERT-EXT-TYPE**](Ieee1609Dot2BaseTypes.md#CERT-EXT-TYPE) .&Issue({SetCertExtensions}{@.id})<br> permissions CHOICE { * _all_ of type **NULL** <br> * permissions<br> indicates the permissions. Within this field. Loading Loading @@ -1474,8 +1478,6 @@ SequenceOfCertRequestExtensions ::= SEQUENCE (SIZE(1..MAX)) OF CertRequestExtens identifies the extension type. * _content_ of type [**CERT-EXT-TYPE**](Ieee1609Dot2BaseTypes.md#CERT-EXT-TYPE) .&Req({SetCertExtensions}{@.id})<br> permissions CHOICE { * _all_ of type **NULL** <br> * permissions<br> indicates the permissions. Within this field. Loading
docs/Ieee1609Dot2BaseTypes.md +21 −16 Original line number Diff line number Diff line Loading @@ -233,6 +233,7 @@ ValidityPeriod ::= SEQUENCE { NOTE: Years can be mapped more closely to wall-clock days using the hours choice for up to 7 years and the sixtyHours choice for up to 448 years. >>> ```asn1 Duration ::= CHOICE { microseconds Uint16, Loading Loading @@ -290,6 +291,7 @@ NOTE: Critical information fields: that its validity cannot be established. A conformant implementation shall support identifiedRegion fields containing at least eight entries. >>> ```asn1 GeographicRegion ::= CHOICE { circularRegion CircularRegion, Loading Loading @@ -368,6 +370,7 @@ NOTE: Critical information fields: If present, this is a critical implementation shall support PolygonalRegions containing at least eight TwoDLocation entries. >>> ```asn1 PolygonalRegion ::= SEQUENCE SIZE (3..MAX) OF TwoDLocation ``` Loading @@ -386,6 +389,7 @@ NOTE: This data structure is consistent with the location encoding longitude (used to indicate that the longitude was not available) are not valid. >>> ```asn1 TwoDLocation ::= SEQUENCE { latitude SecLatitude, Loading Loading @@ -649,6 +653,7 @@ NOTE: The units used in this data structure are consistent with the location data structures used in SAE J2735 [B26], though the encoding is incompatible. >>> ```asn1 ThreeDLocation ::= SEQUENCE { latitude SecLatitude, Loading Loading @@ -754,8 +759,6 @@ UnknownLongitude ::= OneEightyDegreeInt (unknown) * _ecdsaNistP256Signature_ of type [**EcdsaP256Signature**](#EcdsaP256Signature) <br> * _ecdsaBrainpoolP256r1Signature_ of type [**EcdsaP256Signature**](#EcdsaP256Signature) <br> * _ecdsaBrainpoolP384r1Signature_ of type [**EcdsaP384Signature**](#EcdsaP384Signature) <br> ..., * _ecdsaNistP384Signature_ of type [**EcdsaP384Signature**](#EcdsaP384Signature) <br> * _sm2Signature_ of type [**EcsigP256Signature**](#EcsigP256Signature) <br> Loading @@ -765,6 +768,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization applies to instances of this data structure of form EcdsaP256Signature and EcdsaP384Signature. >>> ```asn1 Signature ::= CHOICE { ecdsaNistP256Signature EcdsaP256Signature, Loading Loading @@ -814,6 +818,7 @@ NOTE: When the signature is of form x-only, the x-value in rSig is 256-bit curves in this standard, the exact values of n and p in hexadecimal are: >>> ```asn1 EcdsaP256Signature ::= SEQUENCE { rSig EccP256CurvePoint, Loading Loading @@ -852,6 +857,7 @@ NOTE: When the signature is of form x-only, the x-value in rSig is - n = 8CB91E82A3386D280F5D6F7E50E641DF152F7109ED5456B31F166E6CAC0425A7 CF3AB6AF6B7FC3103B883202E9046565 >>> ```asn1 EcdsaP384Signature ::= SEQUENCE { rSig EccP384CurvePoint, Loading Loading @@ -893,8 +899,6 @@ EcsigP256Signature ::= SEQUENCE { * _compressed-y-0_ of type **OCTET STRING** (SIZE (32))<br> * _compressed-y-1_ of type **OCTET STRING** (SIZE (32))<br> * _x_ of type **OCTET STRING** (SIZE (32))<br> uncompressedP256 SEQUENCE { * _y_ of type **OCTET STRING** (SIZE (32))<br> >>> Loading @@ -904,6 +908,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization and ToBeSignedCertificate for a specification of the canonicalization operations. >>> ```asn1 EccP256CurvePoint::= CHOICE { x-only OCTET STRING (SIZE (32)), Loading Loading @@ -937,8 +942,6 @@ EccP256CurvePoint::= CHOICE { * _compressed-y-0_ of type **OCTET STRING** (SIZE (48))<br> * _compressed-y-1_ of type **OCTET STRING** (SIZE (48))<br> * _x_ of type **OCTET STRING** (SIZE (48))<br> uncompressedP384 SEQUENCE { * _y_ of type **OCTET STRING** (SIZE (48))<br> >>> Loading @@ -948,6 +951,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization and ToBeSignedCertificate for a specification of the canonicalization operations. >>> ```asn1 EccP384CurvePoint::= CHOICE { x-only OCTET STRING (SIZE (48)), Loading Loading @@ -987,6 +991,7 @@ NOTE: Critical information fields: This is a critical information field as indicate that the signed SPDU is invalid in the sense of 4.2.2.3.2, that is, it is invalid in the sense that its validity cannot be established. >>> ```asn1 HashAlgorithm ::= ENUMERATED { sha256, Loading Loading @@ -1068,6 +1073,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization ToBeSignedCertificate for a specification of the canonicalization operations. >>> ```asn1 EncryptionKey ::= CHOICE { public PublicEncryptionKey, Loading @@ -1090,6 +1096,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization ToBeSignedCertificate for a specification of the canonicalization operations. >>> ```asn1 PublicEncryptionKey ::= SEQUENCE { supportedSymmAlg SymmAlgorithm, Loading @@ -1105,8 +1112,6 @@ PublicEncryptionKey ::= SEQUENCE { * _eciesBrainpoolP256r1_ of type [**EccP256CurvePoint**](Ieee1609Dot2BaseTypes.md#EccP256CurvePoint) <br> * _ecencSm2_ of type [**EccP256CurvePoint**](Ieee1609Dot2BaseTypes.md#EccP256CurvePoint) <br> ..., >>> NOTE: Canonicalization: This data structure is subject to canonicalization for the relevant operations specified in 6.1.2 if it appears in a Loading @@ -1114,6 +1119,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization and ToBeSignedCertificate for a specification of the canonicalization operations. >>> ```asn1 BasePublicEncryptionKey ::= CHOICE { eciesNistP256 EccP256CurvePoint, Loading @@ -1132,8 +1138,6 @@ BasePublicEncryptionKey ::= CHOICE { * _ecdsaNistP256_ of type [**EccP256CurvePoint**](Ieee1609Dot2BaseTypes.md#EccP256CurvePoint) <br> * _ecdsaBrainpoolP256r1_ of type [**EccP256CurvePoint**](Ieee1609Dot2BaseTypes.md#EccP256CurvePoint) <br> * _ecdsaBrainpoolP384r1_ of type [**EccP384CurvePoint**](#EccP384CurvePoint) <br> ... , * _ecdsaNistP384_ of type [**EccP384CurvePoint**](#EccP384CurvePoint) <br> * _ecsigSm2_ of type [**EccP256CurvePoint**](Ieee1609Dot2BaseTypes.md#EccP256CurvePoint) <br> Loading @@ -1144,6 +1148,7 @@ NOTE: Canonicalization: This data structure is subject to canonicalization point are encoded in compressed form, i.e., such that the choice indicated within the Ecc*CurvePoint is compressed-y-0 or compressed-y-1. >>> ```asn1 PublicVerificationKey ::= CHOICE { ecdsaNistP256 EccP256CurvePoint, Loading @@ -1161,8 +1166,6 @@ PublicVerificationKey ::= CHOICE { * _aes128Ccm_ of type **OCTET STRING** (SIZE(16))<br> * _sm4Ccm_ of type **OCTET STRING** (SIZE(16))<br> ..., ```asn1 SymmetricEncryptionKey ::= CHOICE { aes128Ccm OCTET STRING(SIZE(16)), Loading Loading @@ -1191,6 +1194,7 @@ NOTE: Consistency with issuing certificate: If a certificate has an - The sspRange field in P indicates opaque and one of the entries in opaque is an OCTET STRING of length 0. >>> ```asn1 PsidSsp ::= SEQUENCE { psid Psid, Loading Loading @@ -1227,8 +1231,6 @@ For consistency rules for other types of ServiceSpecificPermissions, * _opaque_ of type **OCTET STRING** (SIZE(0..MAX))<br> * _bitmapSsp_ of type [**BitmapSsp**](#BitmapSsp) <br> ..., >>> NOTE: Consistency with issuing certificate: If a certificate has an appPermissions entry A for which the ssp field is opaque, A is consistent Loading @@ -1244,6 +1246,7 @@ NOTE: Consistency with issuing certificate: If a certificate has an the opaque field in P is an OCTET STRING identical to the opaque field in A. >>> ```asn1 ServiceSpecificPermissions ::= CHOICE { opaque OCTET STRING (SIZE(0..MAX)), Loading @@ -1265,6 +1268,7 @@ NOTE: A BitmapSsp B is consistent with a BitmapSspRange R if for every set to 0 in the sspBitmask in R, the value of corresponding bit in the identical position in B has no bearing on whether B and R are consistent. >>> ```asn1 BitmapSsp ::= OCTET STRING (SIZE(0..31)) ``` Loading Loading @@ -1312,13 +1316,12 @@ If a certificate has a PsidSspRange A for which the ssp field is all, * _all_ of type **NULL** <br> * _bitmapSspRange_ of type [**BitmapSspRange**](#BitmapSspRange) <br> ..., >>> NOTE: The choice "all" may also be indicated by omitting the SspRange in the enclosing PsidSspRange structure. Omitting the SspRange is preferred to explicitly indicating "all". >>> ```asn1 SspRange ::= CHOICE { opaque SequenceOfOctetString, Loading Loading @@ -1355,6 +1358,7 @@ NOTE: Consistency with issuing certificate: If a certificate has an - The bit in the identical position in the sspValue in P is set equal to the bit in that position in the sspValue in R. >>> ```asn1 BitmapSspRange ::= SEQUENCE { sspValue OCTET STRING (SIZE(1..32)), Loading Loading @@ -1390,6 +1394,7 @@ NOTE: This field was originally specified in ETSI TS 103 097 and future uses of this field are anticipated to be consistent with future versions of that standard. >>> ```asn1 SubjectAssurance ::= OCTET STRING (SIZE(1)) ``` Loading