Loading ItsPki_TestCases.ttcn +3 −2 Original line number Diff line number Diff line Loading @@ -13725,7 +13725,8 @@ module ItsPki_TestCases { f_sleepIgnoreDef(v_timer); log("*** " & testcasename() & ": INFO: timer of " & float2str(v_timer) & " seconds expierd message ***"); f_http_build_butterfly_at_download_request_message(oct2str(p_ra_ee_cert_info.requestHash) & "-" & int2str(p_ra_ee_cert_info.currentI) & ".zip", v_aes_sym_key, v_encrypted_sym_key, v_authentication_vector, v_nonce, v_salt, v_ieee1609dot2_signed_and_encrypted_data, v_request_hash); // FISME FSCOM In int2hex, 3 is arbitrary. Need to check the range of currentI to set the correct hex string length f_http_build_butterfly_at_download_request_message(hex2str(oct2hex(p_ra_ee_cert_info.requestHash)) & "-" & hex2str(int2hex(p_ra_ee_cert_info.currentI, 3)) & ".zip", v_aes_sym_key, v_encrypted_sym_key, v_authentication_vector, v_nonce, v_salt, v_ieee1609dot2_signed_and_encrypted_data, v_request_hash); v_aes_sym_key_hashed_id8 := f_hashedId8FromSha256(f_hashWithSha256('80'O & v_aes_sym_key)); // Used to match the response f_init_default_headers_list(-, "bfk_at_download_request", v_headers); f_selfOrClientSyncAndVerdictPreamble(c_prDone, e_success); Loading
ItsPki_TestCases.ttcn +3 −2 Original line number Diff line number Diff line Loading @@ -13725,7 +13725,8 @@ module ItsPki_TestCases { f_sleepIgnoreDef(v_timer); log("*** " & testcasename() & ": INFO: timer of " & float2str(v_timer) & " seconds expierd message ***"); f_http_build_butterfly_at_download_request_message(oct2str(p_ra_ee_cert_info.requestHash) & "-" & int2str(p_ra_ee_cert_info.currentI) & ".zip", v_aes_sym_key, v_encrypted_sym_key, v_authentication_vector, v_nonce, v_salt, v_ieee1609dot2_signed_and_encrypted_data, v_request_hash); // FISME FSCOM In int2hex, 3 is arbitrary. Need to check the range of currentI to set the correct hex string length f_http_build_butterfly_at_download_request_message(hex2str(oct2hex(p_ra_ee_cert_info.requestHash)) & "-" & hex2str(int2hex(p_ra_ee_cert_info.currentI, 3)) & ".zip", v_aes_sym_key, v_encrypted_sym_key, v_authentication_vector, v_nonce, v_salt, v_ieee1609dot2_signed_and_encrypted_data, v_request_hash); v_aes_sym_key_hashed_id8 := f_hashedId8FromSha256(f_hashWithSha256('80'O & v_aes_sym_key)); // Used to match the response f_init_default_headers_list(-, "bfk_at_download_request", v_headers); f_selfOrClientSyncAndVerdictPreamble(c_prDone, e_success);