Loading ePassport/ttcn/ePassport_MainModule.ttcn +2 −1 Original line number Original line Diff line number Diff line Loading @@ -20,6 +20,7 @@ module ePassport_MainModule { execute(TC_ISO7816_E08()); execute(TC_ISO7816_E08()); execute(TC_ISO7816_E11()); execute(TC_ISO7816_E11()); execute(TC_ISO7816_E18()); execute(TC_ISO7816_E18()); execute(TC_ISO7816_F05()); execute(TC_LDS_B25()); execute(TC_LDS_B25()); execute(TC_LDS_D12()); execute(TC_LDS_D12()); execute(TC_LDS_F04()); execute(TC_LDS_F04()); Loading ePassport/ttcn/ePassport_Testcases.ttcn +37 −0 Original line number Original line Diff line number Diff line Loading @@ -255,6 +255,43 @@ module ePassport_Testcases { } // end groupISO7816_E } // end groupISO7816_E group groupISO7816_F { // ISO7816_F05: Performing Active Authentication with RSA-SHA256 // Purpose: This test case verifies that the inspection system performs Active Authentication // with RSA-SHA256 algorithm in signature function. // profile AIP // Configuration file: default EAC+AA + DG15 signature using RSA SHA256 // Expected results: "No error" testcase TC_ISO7816_F05() runs on MRTD system MRTD_System { f_cfUp(); f_initializeMRTD("CFG.EAC.ISO7816.F05"); f_initializeIS(); t_wait.start; alt { [] a_advancedInspectionProcedure(); [] mgmt.receive(mw_report(c_aisNoFailure)) { t_wait.stop; log("**** TC_ISO7816_F05: Pass: Inspection procedure successfull ****"); setverdict(pass); } [] mgmt.receive(mw_report(?)) { t_wait.stop; log("**** TC_ISO7816_F05: Error: Inspection procedure unsuccessfull ****"); setverdict(fail); } [] t_wait.timeout { log("**** TC_ISO7816_F05: Timeout: Expected message not received ****"); setverdict(inconc); } } } // end TC_ISO7816_F05 } // end groupISO7816_F // Tests with EF.DG1 // Tests with EF.DG1 group groupLDS_B { group groupLDS_B { Loading Loading
ePassport/ttcn/ePassport_MainModule.ttcn +2 −1 Original line number Original line Diff line number Diff line Loading @@ -20,6 +20,7 @@ module ePassport_MainModule { execute(TC_ISO7816_E08()); execute(TC_ISO7816_E08()); execute(TC_ISO7816_E11()); execute(TC_ISO7816_E11()); execute(TC_ISO7816_E18()); execute(TC_ISO7816_E18()); execute(TC_ISO7816_F05()); execute(TC_LDS_B25()); execute(TC_LDS_B25()); execute(TC_LDS_D12()); execute(TC_LDS_D12()); execute(TC_LDS_F04()); execute(TC_LDS_F04()); Loading
ePassport/ttcn/ePassport_Testcases.ttcn +37 −0 Original line number Original line Diff line number Diff line Loading @@ -255,6 +255,43 @@ module ePassport_Testcases { } // end groupISO7816_E } // end groupISO7816_E group groupISO7816_F { // ISO7816_F05: Performing Active Authentication with RSA-SHA256 // Purpose: This test case verifies that the inspection system performs Active Authentication // with RSA-SHA256 algorithm in signature function. // profile AIP // Configuration file: default EAC+AA + DG15 signature using RSA SHA256 // Expected results: "No error" testcase TC_ISO7816_F05() runs on MRTD system MRTD_System { f_cfUp(); f_initializeMRTD("CFG.EAC.ISO7816.F05"); f_initializeIS(); t_wait.start; alt { [] a_advancedInspectionProcedure(); [] mgmt.receive(mw_report(c_aisNoFailure)) { t_wait.stop; log("**** TC_ISO7816_F05: Pass: Inspection procedure successfull ****"); setverdict(pass); } [] mgmt.receive(mw_report(?)) { t_wait.stop; log("**** TC_ISO7816_F05: Error: Inspection procedure unsuccessfull ****"); setverdict(fail); } [] t_wait.timeout { log("**** TC_ISO7816_F05: Timeout: Expected message not received ****"); setverdict(inconc); } } } // end TC_ISO7816_F05 } // end groupISO7816_F // Tests with EF.DG1 // Tests with EF.DG1 group groupLDS_B { group groupLDS_B { Loading