Loading ePassport/ttcn/ePassport_MainModule.ttcn +15 −1 Original line number Diff line number Diff line Loading @@ -75,7 +75,21 @@ module ePassport_MainModule { execute(TC_LDS_G02()); // LDS_H execute(TC_LDS_H03()); execute(TC_LDS_H07()); execute(TC_LDS_H22()); execute(TC_LDS_H24()); execute(TC_LDS_H31()); execute(TC_LDS_H32()); execute(TC_LDS_H33()); execute(TC_LDS_H37()); execute(TC_LDS_H45()); execute(TC_LDS_H51()); execute(TC_LDS_H54()); execute(TC_LDS_H63()); execute(TC_LDS_H71()); execute(TC_LDS_H75()); execute(TC_LDS_H83()); // LDS_I execute(TC_LDS_I01()); Loading ePassport/ttcn/ePassport_Testcases.ttcn +615 −0 Original line number Diff line number Diff line Loading @@ -1539,6 +1539,312 @@ module ePassport_Testcases { group groupLDS_H { // LDS_H03: RSASSA-PSS with SHA256, SHA256 DG hash, DS stored inside SOD // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD // contains RSASSAPSS with SHA256, SHA256 DG hash, DS stored inside SOD // Profile: AIP // Configuration file: default EAC + modif EF.SOD ( with incorrect Signature in SignerInfo) // Expected results: "ePassport inspection procedure successful" // Interface: BAC: PASS, PA: PASS, AA: NP, TA: PASS, CA: PASS, COM: PASS testcase TC_LDS_H03() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := {}; var template IsVerdictList vt_expectedPassResults := { e_aisNoFailure, e_aisBacAuthentication, e_aisPassiveAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.DFLT.EAC"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H03: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H03", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H03 // LDS_H07: RSASSA-PKCS1_v15 with SHA512, SHA512 DG hash, DS stored inside SOD // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD // contains RSASSAPKCS1_v15 with SHA512, SHA512 DG hash, DS stored inside SOD // Profile: AIP // Configuration file: default EAC + modif EF.SOD // Expected results: "ePassport inspection procedure successful" // Interface: BAC: PASS, PA: PASS, AA: NP, TA: PASS, CA: PASS, COM: PASS testcase TC_LDS_H07() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := {}; var template IsVerdictList vt_expectedPassResults := { e_aisNoFailure, e_aisBacAuthentication, e_aisPassiveAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.EAC.LDS.H07"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H07: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H07", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H07 // LDS_H22: SignedData illegal digestAlgorithm (MD5) // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is // wrong (SignedData with illegal digestAlgorithm) // Profile: AIP // Configuration file: default EAC + EF.SOD with illegal digestAlgorithm in SignedData (MD5) // Expected results: "ePassport inspection procedure failed" // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL testcase TC_LDS_H22() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := { e_aisPassiveAuthentication, e_aisEfSod }; var template IsVerdictList vt_expectedPassResults := { e_aisBacAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.EAC.LDS.H22"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H22: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H22", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H22 // LDS_H24: SignedData incorrect content type OID for id-icaoldsSecurityObject // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is // wrong (SignedData incorrect content type OID for idicaoldsSecurityObject) // Profile: AIP // Configuration file: default EAC + Use EF.SOD with incorrect content type OID for idicaoldsSecurityObject in SignedData // Expected results: "ePassport inspection procedure failed" // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL testcase TC_LDS_H24() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := { e_aisPassiveAuthentication, e_aisEfSod }; var template IsVerdictList vt_expectedPassResults := { e_aisBacAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.EAC.LDS.H24"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H24: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H24", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H24 // LDS_H31: SignerInfo, missing digestAlgorithm // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is // wrong (SignerInfo, missing digestAlgorithm) // Profile: AIP // Configuration file: default EAC + EF.SOD with missing digestAlgorithm in SignerInfo // Expected results: "ePassport inspection procedure failed" // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL testcase TC_LDS_H31() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := { e_aisPassiveAuthentication, e_aisEfSod }; var template IsVerdictList vt_expectedPassResults := { e_aisBacAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.EAC.LDS.H31"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H31: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H31", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H31 // LDS_H32: SignerInfo, incorrect messageDigest attribute value // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is // wrong (SignerInfo, incorrect messageDigest attribute value) // Profile: AIP // Configuration file: default EAC + EF.SOD with incorrect messageDigest attribute value in SignerInfo // Expected results: "ePassport inspection procedure failed" // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL testcase TC_LDS_H32() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := { e_aisPassiveAuthentication, e_aisEfSod }; var template IsVerdictList vt_expectedPassResults := { e_aisBacAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.EAC.LDS.H32"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H32: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H32", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H32 // LDS_H33: SignerInfo, missing messageDigest attribute // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is // wrong (SignerInfo, missing messageDigest attribute) // Profile: AIP // Configuration file: default EAC + EF.SOD with missing messageDigest attribute in SignerInfo // Expected results: "ePassport inspection procedure failed" // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL testcase TC_LDS_H33() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := { e_aisPassiveAuthentication, e_aisEfSod }; var template IsVerdictList vt_expectedPassResults := { e_aisBacAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.EAC.LDS.H33"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H33: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H33", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H33 // LDS_H37: SignerInfo, incorrect Signature // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is // wrong (SignerInfo, incorrect Signature) Loading Loading @@ -1583,6 +1889,315 @@ module ePassport_Testcases { } // end TC_LDS_H37 // LDS_H45: LDS Security Object, additional DataGroup Hash value for DG10 // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is // wrong (LDS Security Object, additional DataGroup Hash value for DG10) // Profile: AIP // Configuration file: default EAC + EF.SOD with additional DataGroup Hash value for DG10 in LDS // Security Object // Expected results: "ePassport inspection procedure failed" // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL testcase TC_LDS_H45() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := { e_aisPassiveAuthentication, e_aisEfSod }; var template IsVerdictList vt_expectedPassResults := { e_aisBacAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.EAC.LDS.H45"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H45: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H45", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H45 // LDS_H51: DS certificate, signature element does not match SignatureAlgorithm // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is // wrong (DS certificate, signature element does not match SignatureAlgorithm) // Profile: AIP // Configuration file: default EAC + EF.SOD with signature element that does not match // SignatureAlgorithm in DS certificate // Expected results: "ePassport inspection procedure failed" // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL testcase TC_LDS_H51() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := { e_aisPassiveAuthentication, e_aisEfSod }; var template IsVerdictList vt_expectedPassResults := { e_aisBacAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.EAC.LDS.H51"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H51: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H51", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H51 // LDS_H54: DS certificate, issuer element does not match CSCA subject value // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is // wrong (DS certificate, incorrect issuer element (does not match CSCA subject value)) // Profile: AIP // Configuration file: default EAC + EF.SOD with incorrect issuer element (does not match CSCA subject value) // in DS certificate // Expected results: "ePassport inspection procedure failed" // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL testcase TC_LDS_H54() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := { e_aisPassiveAuthentication, e_aisEfSod }; var template IsVerdictList vt_expectedPassResults := { e_aisBacAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.EAC.LDS.H54"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H54: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H54", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H54 // LDS_H63: DS certificate, incorrect keyUsage extension (digitalSignature bit not asserted) // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is // wrong (DS certificate, incorrect keyUsage extension (digitalSignature bit not asserted)) // Profile: AIP // Configuration file: default EAC + EF.SOD with incorrect keyUsage extension (digitalSignature bit not // asserted) in DS certificate // Expected results: "ePassport inspection procedure failed" // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL testcase TC_LDS_H63() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := { e_aisPassiveAuthentication, e_aisEfSod }; var template IsVerdictList vt_expectedPassResults := { e_aisBacAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.EAC.LDS.H63"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H63: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H63", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H63 // LDS_H71: ECDSA with SHA256 (ANSI OID), SHA256 DG hash, DS stored inside SOD // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD // contains ECDSA with SHA256 (ANSI OID), SHA256 DG hash, DS stored inside SOD // Profile: AIP // Configuration file: default EAC + modif EF.SOD // Expected results: "ePassport inspection procedure successful" // Interface: BAC: PASS, PA: PASS, AA: NP, TA: PASS, CA: PASS, COM: PASS testcase TC_LDS_H71() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := {}; var template IsVerdictList vt_expectedPassResults := { e_aisNoFailure, e_aisBacAuthentication, e_aisPassiveAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.EAC.LDS.H71"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H71: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H71", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H71 // LDS_H75: Different valid signature algorithms in SOD and DS // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD // contains contains two different valid signature algorithms in SOD and DS // Profile: AIP // Configuration file: default EAC + modif EF.SOD // Expected results: "ePassport inspection procedure successful" // Interface: BAC: PASS, PA: PASS, AA: NP, TA: PASS, CA: PASS, COM: PASS testcase TC_LDS_H75() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := {}; var template IsVerdictList vt_expectedPassResults := { e_aisNoFailure, e_aisBacAuthentication, e_aisPassiveAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.EAC.LDS.H75"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H75: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H75", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H75 // LDS_H83: RSASSA-PKCS1_v15 with SHA512, SHA512 DG hash, DS stored inside SOD, RSA OID // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD // contains RSASSAPKCS1_v15 with SHA512, SHA512 DG hash, DS stored inside SOD // Profile: AIP // Configuration file: default EAC + modif EF.SOD // Expected results: "ePassport inspection procedure successful" // Interface: BAC: PASS, PA: PASS, AA: NP, TA: PASS, CA: PASS, COM: PASS testcase TC_LDS_H83() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := {}; var template IsVerdictList vt_expectedPassResults := { e_aisNoFailure, e_aisBacAuthentication, e_aisPassiveAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.EAC.LDS.H83"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H83: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H83", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H83 } // end groupLDS_H group groupLDS_I { Loading Loading
ePassport/ttcn/ePassport_MainModule.ttcn +15 −1 Original line number Diff line number Diff line Loading @@ -75,7 +75,21 @@ module ePassport_MainModule { execute(TC_LDS_G02()); // LDS_H execute(TC_LDS_H03()); execute(TC_LDS_H07()); execute(TC_LDS_H22()); execute(TC_LDS_H24()); execute(TC_LDS_H31()); execute(TC_LDS_H32()); execute(TC_LDS_H33()); execute(TC_LDS_H37()); execute(TC_LDS_H45()); execute(TC_LDS_H51()); execute(TC_LDS_H54()); execute(TC_LDS_H63()); execute(TC_LDS_H71()); execute(TC_LDS_H75()); execute(TC_LDS_H83()); // LDS_I execute(TC_LDS_I01()); Loading
ePassport/ttcn/ePassport_Testcases.ttcn +615 −0 Original line number Diff line number Diff line Loading @@ -1539,6 +1539,312 @@ module ePassport_Testcases { group groupLDS_H { // LDS_H03: RSASSA-PSS with SHA256, SHA256 DG hash, DS stored inside SOD // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD // contains RSASSAPSS with SHA256, SHA256 DG hash, DS stored inside SOD // Profile: AIP // Configuration file: default EAC + modif EF.SOD ( with incorrect Signature in SignerInfo) // Expected results: "ePassport inspection procedure successful" // Interface: BAC: PASS, PA: PASS, AA: NP, TA: PASS, CA: PASS, COM: PASS testcase TC_LDS_H03() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := {}; var template IsVerdictList vt_expectedPassResults := { e_aisNoFailure, e_aisBacAuthentication, e_aisPassiveAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.DFLT.EAC"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H03: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H03", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H03 // LDS_H07: RSASSA-PKCS1_v15 with SHA512, SHA512 DG hash, DS stored inside SOD // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD // contains RSASSAPKCS1_v15 with SHA512, SHA512 DG hash, DS stored inside SOD // Profile: AIP // Configuration file: default EAC + modif EF.SOD // Expected results: "ePassport inspection procedure successful" // Interface: BAC: PASS, PA: PASS, AA: NP, TA: PASS, CA: PASS, COM: PASS testcase TC_LDS_H07() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := {}; var template IsVerdictList vt_expectedPassResults := { e_aisNoFailure, e_aisBacAuthentication, e_aisPassiveAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.EAC.LDS.H07"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H07: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H07", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H07 // LDS_H22: SignedData illegal digestAlgorithm (MD5) // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is // wrong (SignedData with illegal digestAlgorithm) // Profile: AIP // Configuration file: default EAC + EF.SOD with illegal digestAlgorithm in SignedData (MD5) // Expected results: "ePassport inspection procedure failed" // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL testcase TC_LDS_H22() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := { e_aisPassiveAuthentication, e_aisEfSod }; var template IsVerdictList vt_expectedPassResults := { e_aisBacAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.EAC.LDS.H22"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H22: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H22", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H22 // LDS_H24: SignedData incorrect content type OID for id-icaoldsSecurityObject // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is // wrong (SignedData incorrect content type OID for idicaoldsSecurityObject) // Profile: AIP // Configuration file: default EAC + Use EF.SOD with incorrect content type OID for idicaoldsSecurityObject in SignedData // Expected results: "ePassport inspection procedure failed" // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL testcase TC_LDS_H24() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := { e_aisPassiveAuthentication, e_aisEfSod }; var template IsVerdictList vt_expectedPassResults := { e_aisBacAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.EAC.LDS.H24"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H24: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H24", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H24 // LDS_H31: SignerInfo, missing digestAlgorithm // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is // wrong (SignerInfo, missing digestAlgorithm) // Profile: AIP // Configuration file: default EAC + EF.SOD with missing digestAlgorithm in SignerInfo // Expected results: "ePassport inspection procedure failed" // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL testcase TC_LDS_H31() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := { e_aisPassiveAuthentication, e_aisEfSod }; var template IsVerdictList vt_expectedPassResults := { e_aisBacAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.EAC.LDS.H31"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H31: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H31", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H31 // LDS_H32: SignerInfo, incorrect messageDigest attribute value // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is // wrong (SignerInfo, incorrect messageDigest attribute value) // Profile: AIP // Configuration file: default EAC + EF.SOD with incorrect messageDigest attribute value in SignerInfo // Expected results: "ePassport inspection procedure failed" // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL testcase TC_LDS_H32() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := { e_aisPassiveAuthentication, e_aisEfSod }; var template IsVerdictList vt_expectedPassResults := { e_aisBacAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.EAC.LDS.H32"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H32: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H32", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H32 // LDS_H33: SignerInfo, missing messageDigest attribute // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is // wrong (SignerInfo, missing messageDigest attribute) // Profile: AIP // Configuration file: default EAC + EF.SOD with missing messageDigest attribute in SignerInfo // Expected results: "ePassport inspection procedure failed" // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL testcase TC_LDS_H33() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := { e_aisPassiveAuthentication, e_aisEfSod }; var template IsVerdictList vt_expectedPassResults := { e_aisBacAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.EAC.LDS.H33"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H33: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H33", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H33 // LDS_H37: SignerInfo, incorrect Signature // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is // wrong (SignerInfo, incorrect Signature) Loading Loading @@ -1583,6 +1889,315 @@ module ePassport_Testcases { } // end TC_LDS_H37 // LDS_H45: LDS Security Object, additional DataGroup Hash value for DG10 // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is // wrong (LDS Security Object, additional DataGroup Hash value for DG10) // Profile: AIP // Configuration file: default EAC + EF.SOD with additional DataGroup Hash value for DG10 in LDS // Security Object // Expected results: "ePassport inspection procedure failed" // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL testcase TC_LDS_H45() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := { e_aisPassiveAuthentication, e_aisEfSod }; var template IsVerdictList vt_expectedPassResults := { e_aisBacAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.EAC.LDS.H45"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H45: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H45", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H45 // LDS_H51: DS certificate, signature element does not match SignatureAlgorithm // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is // wrong (DS certificate, signature element does not match SignatureAlgorithm) // Profile: AIP // Configuration file: default EAC + EF.SOD with signature element that does not match // SignatureAlgorithm in DS certificate // Expected results: "ePassport inspection procedure failed" // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL testcase TC_LDS_H51() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := { e_aisPassiveAuthentication, e_aisEfSod }; var template IsVerdictList vt_expectedPassResults := { e_aisBacAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.EAC.LDS.H51"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H51: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H51", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H51 // LDS_H54: DS certificate, issuer element does not match CSCA subject value // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is // wrong (DS certificate, incorrect issuer element (does not match CSCA subject value)) // Profile: AIP // Configuration file: default EAC + EF.SOD with incorrect issuer element (does not match CSCA subject value) // in DS certificate // Expected results: "ePassport inspection procedure failed" // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL testcase TC_LDS_H54() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := { e_aisPassiveAuthentication, e_aisEfSod }; var template IsVerdictList vt_expectedPassResults := { e_aisBacAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.EAC.LDS.H54"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H54: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H54", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H54 // LDS_H63: DS certificate, incorrect keyUsage extension (digitalSignature bit not asserted) // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD is // wrong (DS certificate, incorrect keyUsage extension (digitalSignature bit not asserted)) // Profile: AIP // Configuration file: default EAC + EF.SOD with incorrect keyUsage extension (digitalSignature bit not // asserted) in DS certificate // Expected results: "ePassport inspection procedure failed" // Interface: BAC: PASS, PA: FAIL, AA: NP, TA: PASS, CA: PASS, COM: PASS, EF.SOD: FAIL testcase TC_LDS_H63() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := { e_aisPassiveAuthentication, e_aisEfSod }; var template IsVerdictList vt_expectedPassResults := { e_aisBacAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.EAC.LDS.H63"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H63: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H63", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H63 // LDS_H71: ECDSA with SHA256 (ANSI OID), SHA256 DG hash, DS stored inside SOD // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD // contains ECDSA with SHA256 (ANSI OID), SHA256 DG hash, DS stored inside SOD // Profile: AIP // Configuration file: default EAC + modif EF.SOD // Expected results: "ePassport inspection procedure successful" // Interface: BAC: PASS, PA: PASS, AA: NP, TA: PASS, CA: PASS, COM: PASS testcase TC_LDS_H71() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := {}; var template IsVerdictList vt_expectedPassResults := { e_aisNoFailure, e_aisBacAuthentication, e_aisPassiveAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.EAC.LDS.H71"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H71: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H71", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H71 // LDS_H75: Different valid signature algorithms in SOD and DS // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD // contains contains two different valid signature algorithms in SOD and DS // Profile: AIP // Configuration file: default EAC + modif EF.SOD // Expected results: "ePassport inspection procedure successful" // Interface: BAC: PASS, PA: PASS, AA: NP, TA: PASS, CA: PASS, COM: PASS testcase TC_LDS_H75() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := {}; var template IsVerdictList vt_expectedPassResults := { e_aisNoFailure, e_aisBacAuthentication, e_aisPassiveAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.EAC.LDS.H75"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H75: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H75", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H75 // LDS_H83: RSASSA-PKCS1_v15 with SHA512, SHA512 DG hash, DS stored inside SOD, RSA OID // Purpose: This test case verifies that the inspection system performs correctly if EF.SOD // contains RSASSAPKCS1_v15 with SHA512, SHA512 DG hash, DS stored inside SOD // Profile: AIP // Configuration file: default EAC + modif EF.SOD // Expected results: "ePassport inspection procedure successful" // Interface: BAC: PASS, PA: PASS, AA: NP, TA: PASS, CA: PASS, COM: PASS testcase TC_LDS_H83() runs on MRTD system MRTD_System { var template IsVerdictList vt_expectedFailResults := {}; var template IsVerdictList vt_expectedPassResults := { e_aisNoFailure, e_aisBacAuthentication, e_aisPassiveAuthentication, e_aisChipAuthentication, e_aisTerminalAuthentication, e_aisCommunication }; // Preamble f_cfUp(); f_initializeMRTD("CFG.EAC.LDS.H83"); f_initializeIS(""); // Test Body t_ac.start(PXT_TWAIT); alt { [] a_advancedInspectionProcedure(); [PXT_AUTOMATIC_TEST_INTERFACE] a_aisReports(); [] t_ac.timeout { log("**** TC_LDS_H83: Timeout: No more communication ****"); } } f_establishVerdict("TC_LDS_H83", vt_expectedFailResults, vt_expectedPassResults); // Postamble f_cleanUp(); } // end TC_LDS_H83 } // end groupLDS_H group groupLDS_I { Loading