Loading ttcn/Security/LibItsSecurity_Functions.ttcn +8 −7 Original line number Original line Diff line number Diff line Loading @@ -1362,10 +1362,10 @@ module LibItsSecurity_Functions { // var boolean v_result; // var boolean v_result; // Setup certificates memory cache // Setup certificates memory cache /* FIXME To be reviewed if (fx_loadCertificates(PX_CERTIFICATE_POOL_PATH, p_configId) == true) { if (fx_loadCertificates(PX_CERTIFICATE_POOL_PATH, p_configId) == true) { // Setup security component variables // Setup security component variables if(f_readCertificate(cc_taCert_A, vc_atCertificate)) { /*FIXME if(f_readCertificate(cc_taCert_A, vc_atCertificate)) { if(f_readCertificate(oct2str(vc_atCertificate.cracaId), vc_aaCertificate)) { if(f_readCertificate(oct2str(vc_atCertificate.issuer), vc_aaCertificate)) { if(f_readSigningKey(cc_taCert_A, vc_signingPrivateKey)) { if(f_readSigningKey(cc_taCert_A, vc_signingPrivateKey)) { f_readEncryptingKey(cc_taCert_A, vc_encryptPrivateKey); f_readEncryptingKey(cc_taCert_A, vc_encryptPrivateKey); return true; return true; Loading @@ -1376,10 +1376,10 @@ module LibItsSecurity_Functions { } } }else{ }else{ log("f_loadCertificates: Failed to load AT certificate for ", cc_taCert_A); log("f_loadCertificates: Failed to load AT certificate for ", cc_taCert_A); } }*/ } else { } else { log("f_loadCertificates: Failed to load certificates from ", PX_CERTIFICATE_POOL_PATH); log("f_loadCertificates: Failed to load certificates from ", PX_CERTIFICATE_POOL_PATH); }*/ } return false; return false; } // End of function f_loadCertificates } // End of function f_loadCertificates Loading Loading @@ -1667,6 +1667,7 @@ module LibItsSecurity_Functions { * @return true on success, false otherwise * @return true on success, false otherwise */ */ external function fx_loadCertificates(in charstring p_rootDirectory, in charstring p_configId) return boolean; external function fx_loadCertificates(in charstring p_rootDirectory, in charstring p_configId) return boolean; external function fx_store_certificate(in charstring p_cert_id, in octetstring p_cert, in octetstring p_private_key, in octetstring p_public_key_x, in octetstring p_public_key_y, in octetstring p_hashid8, in octetstring p_issuer) return boolean; /** /** * @desc Unload from memory cache the certificates * @desc Unload from memory cache the certificates Loading Loading
ttcn/Security/LibItsSecurity_Functions.ttcn +8 −7 Original line number Original line Diff line number Diff line Loading @@ -1362,10 +1362,10 @@ module LibItsSecurity_Functions { // var boolean v_result; // var boolean v_result; // Setup certificates memory cache // Setup certificates memory cache /* FIXME To be reviewed if (fx_loadCertificates(PX_CERTIFICATE_POOL_PATH, p_configId) == true) { if (fx_loadCertificates(PX_CERTIFICATE_POOL_PATH, p_configId) == true) { // Setup security component variables // Setup security component variables if(f_readCertificate(cc_taCert_A, vc_atCertificate)) { /*FIXME if(f_readCertificate(cc_taCert_A, vc_atCertificate)) { if(f_readCertificate(oct2str(vc_atCertificate.cracaId), vc_aaCertificate)) { if(f_readCertificate(oct2str(vc_atCertificate.issuer), vc_aaCertificate)) { if(f_readSigningKey(cc_taCert_A, vc_signingPrivateKey)) { if(f_readSigningKey(cc_taCert_A, vc_signingPrivateKey)) { f_readEncryptingKey(cc_taCert_A, vc_encryptPrivateKey); f_readEncryptingKey(cc_taCert_A, vc_encryptPrivateKey); return true; return true; Loading @@ -1376,10 +1376,10 @@ module LibItsSecurity_Functions { } } }else{ }else{ log("f_loadCertificates: Failed to load AT certificate for ", cc_taCert_A); log("f_loadCertificates: Failed to load AT certificate for ", cc_taCert_A); } }*/ } else { } else { log("f_loadCertificates: Failed to load certificates from ", PX_CERTIFICATE_POOL_PATH); log("f_loadCertificates: Failed to load certificates from ", PX_CERTIFICATE_POOL_PATH); }*/ } return false; return false; } // End of function f_loadCertificates } // End of function f_loadCertificates Loading Loading @@ -1667,6 +1667,7 @@ module LibItsSecurity_Functions { * @return true on success, false otherwise * @return true on success, false otherwise */ */ external function fx_loadCertificates(in charstring p_rootDirectory, in charstring p_configId) return boolean; external function fx_loadCertificates(in charstring p_rootDirectory, in charstring p_configId) return boolean; external function fx_store_certificate(in charstring p_cert_id, in octetstring p_cert, in octetstring p_private_key, in octetstring p_public_key_x, in octetstring p_public_key_y, in octetstring p_hashid8, in octetstring p_issuer) return boolean; /** /** * @desc Unload from memory cache the certificates * @desc Unload from memory cache the certificates Loading