Loading ttcn/Pki/LibItsPki_Functions.ttcn +4 −4 Original line number Diff line number Diff line Loading @@ -1285,7 +1285,7 @@ module LibItsPki_Functions { ), m_headerInfo_inner_pki_request( -, f_getCurrentTimeUtc() (f_getCurrentTime() * 1000) //us ) ); // Signed the encoded InnerEcRequestSignedForPop Loading Loading @@ -1486,7 +1486,7 @@ module LibItsPki_Functions { m_signedDataPayload_ext(v_hash_shared_at_request), // Payload containing extDataHash m_headerInfo_inner_pki_request( // HeaderInfo -, f_getCurrentTimeUtc()) (f_getCurrentTime()) * 1000) //us ); log("f_generate_inner_at_request: v_tbs= ", v_tbs); // Signed ToBeSigned payload using the private key of EC certificate obtained from Enrolment request Loading Loading @@ -1966,7 +1966,7 @@ module LibItsPki_Functions { m_signedDataPayload( m_etsiTs103097Data_unsecured(p_pki_message) ), m_headerInfo_inner_pki_request(-, f_getCurrentTimeUtc()) m_headerInfo_inner_pki_request(-, (f_getCurrentTime() * 1000)/*us*/) ); log("f_build_pki_secured_request_message_signed_with_pop: signer: ", p_signer_identifier); if (PICS_SECPKI_REENROLMENT == false) { // This is the first enrolment, we used Factory keys Loading Loading @@ -2367,7 +2367,7 @@ module LibItsPki_Functions { m_signedDataPayload( m_etsiTs103097Data_unsecured(p_pki_message) ), m_headerInfo_inner_pki_response(-, f_getCurrentTimeUtc()) m_headerInfo_inner_pki_response(-, (f_getCurrentTime() * 1000)/*us*/) ); if (ischosen(p_signer_identifier.self_)) { v_tbs_signed := f_signWithEcdsaNistp256WithSha256(bit2oct(encvalue(v_tbs)), int2oct(0, 32), p_private_key); Loading Loading
ttcn/Pki/LibItsPki_Functions.ttcn +4 −4 Original line number Diff line number Diff line Loading @@ -1285,7 +1285,7 @@ module LibItsPki_Functions { ), m_headerInfo_inner_pki_request( -, f_getCurrentTimeUtc() (f_getCurrentTime() * 1000) //us ) ); // Signed the encoded InnerEcRequestSignedForPop Loading Loading @@ -1486,7 +1486,7 @@ module LibItsPki_Functions { m_signedDataPayload_ext(v_hash_shared_at_request), // Payload containing extDataHash m_headerInfo_inner_pki_request( // HeaderInfo -, f_getCurrentTimeUtc()) (f_getCurrentTime()) * 1000) //us ); log("f_generate_inner_at_request: v_tbs= ", v_tbs); // Signed ToBeSigned payload using the private key of EC certificate obtained from Enrolment request Loading Loading @@ -1966,7 +1966,7 @@ module LibItsPki_Functions { m_signedDataPayload( m_etsiTs103097Data_unsecured(p_pki_message) ), m_headerInfo_inner_pki_request(-, f_getCurrentTimeUtc()) m_headerInfo_inner_pki_request(-, (f_getCurrentTime() * 1000)/*us*/) ); log("f_build_pki_secured_request_message_signed_with_pop: signer: ", p_signer_identifier); if (PICS_SECPKI_REENROLMENT == false) { // This is the first enrolment, we used Factory keys Loading Loading @@ -2367,7 +2367,7 @@ module LibItsPki_Functions { m_signedDataPayload( m_etsiTs103097Data_unsecured(p_pki_message) ), m_headerInfo_inner_pki_response(-, f_getCurrentTimeUtc()) m_headerInfo_inner_pki_response(-, (f_getCurrentTime() * 1000)/*us*/) ); if (ischosen(p_signer_identifier.self_)) { v_tbs_signed := f_signWithEcdsaNistp256WithSha256(bit2oct(encvalue(v_tbs)), int2oct(0, 32), p_private_key); Loading