Compare Revisions

The credentials to download the source code are:
 Username: svnusers
 Password: svnusers

Ignore whitespace Rev 2397 → Rev 2398

/trunk/asn1
Property changes:
Modified: svn:externals
## -1,4 +1,5 ##
-^/../LibIts/trunk/asn1/CAM LibIts/CAM
-^/../LibIts/trunk/asn1/DENM LibIts/DENM
-^/../LibIts/trunk/asn1/ITS-Container LibIts/ITS-Container
-^/../LibIts/trunk/asn1/MAP_SPAT LibIts/MAP_SPAT
+^/../LibIts/branches/STF507/asn1/CAM LibIts/CAM
+^/../LibIts/branches/STF507/asn1/DENM LibIts/DENM
+^/../LibIts/branches/STF507/asn1/ITS-Container LibIts/ITS-Container
+^/../LibIts/branches/STF507/asn1/MAP_SPAT LibIts/MAP_SPAT
+
Index: data/profiles/CERT_TS_09_04_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_09_04_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_09_04_BO_AT.xml (nonexistent)
@@ -1,29 +0,0 @@
-<!-- AT cert without region restriction signed with cert with polygonal region restriction -->
-<certificate name="CERT_TS_09_04_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_E_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
Index: data/profiles/CERT_TS_08_04_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_08_04_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_08_04_BO_AT.xml (nonexistent)
@@ -1,32 +0,0 @@
-<!-- An invalid AT cert with polygonal restriction containing only two point -->
-<certificate name="CERT_TS_08_04_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_D_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <polygon>
- <location latitude="0.044949" longitude="-0.062157"/>
- <location latitude="0.044949" longitude="0.062064"/>
- </polygon>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
Index: data/profiles/CERT_TS_07_04_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_07_04_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_07_04_BO_AT.xml (nonexistent)
@@ -1,32 +0,0 @@
-<!-- AT cert with rectangular region restriction outside of the region of the issuer -->
-<certificate name="CERT_TS_07_04_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_07_04_BO_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <rectangle>
- <location latitude="0.022479" longitude="-0.031067"/>
- <location latitude="-0.022487" longitude="0.031044"/>
- </rectangle>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
Index: data/profiles/CERT_TS_06_04_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_06_04_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_06_04_BO_AT.xml (nonexistent)
@@ -1,29 +0,0 @@
-<!-- AT cert with curcular region outside the issuer region -->
-<certificate name="CERT_TS_06_04_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_06_04_BO_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <circle latitude="0.0" longitude="0.0" radius="5000"/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
Index: data/profiles/CERT_TS_09_05_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_09_05_BO_AA.xml (revision 2397)
+++ data/profiles/CERT_TS_09_05_BO_AA.xml (nonexistent)
@@ -1,30 +0,0 @@
-<!-- The valid AA certificate containing identified region other then subordinate cert -->
-
-<certificate name="CERT_TS_09_05_BO_AA">
- <version>2</version>
- <signer type="digest" name="CERT_TEST_ROOT"/>
- <subject type="AA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!-- CAM -->
- <aid value="37"/> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <id dictionary="iso_3166_1" id="56" local="0"/> <!-- Belgium -->
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
Index: data/profiles/CERT_TS_08_05_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_08_05_BO_AA.xml (revision 2397)
+++ data/profiles/CERT_TS_08_05_BO_AA.xml (nonexistent)
@@ -1,37 +0,0 @@
-<!-- Authorization authority certificate with a polygonal region restriction
- representing a square centered on 20km to the West from ETSI
- and having a side length of 20 km
--->
-<certificate name="CERT_TS_08_05_BO_AA">
- <version>2</version>
- <signer type="digest" name="CERT_TEST_ROOT"/>
- <subject type="AA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!-- CAM -->
- <aid value="37"/> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <polygon>
- <location latitude="0.089596" longitude="-0.372848"/>
- <location latitude="0.089596" longitude="-0.124406"/>
- <location latitude="-0.090268" longitude="-0.124406"/>
- <location latitude="-0.090268" longitude="-0.372848"/>
- </polygon>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
Index: data/profiles/CERT_TS_07_05_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_07_05_BO_AA.xml (revision 2397)
+++ data/profiles/CERT_TS_07_05_BO_AA.xml (nonexistent)
@@ -1,35 +0,0 @@
-<!-- Authorization authority certificate with a rectangular region restriction
- Center: ETSI coordinates - 10km to the west
- Side length: 20 km
--->
-<certificate name="CERT_TS_07_05_BO_AA">
- <version>2</version>
- <signer type="digest" name="CERT_TEST_ROOT"/>
- <subject type="AA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!-- CAM -->
- <aid value="37"/> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <rectangle>
- <location latitude="0.17946" longitude="-0.497442"/>
- <location latitude="-0.000404" longitude="-0.248628"/>
- </rectangle>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
Index: data/profiles/CERT_TS_06_05_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_06_05_BO_AA.xml (revision 2397)
+++ data/profiles/CERT_TS_06_05_BO_AA.xml (nonexistent)
@@ -1,32 +0,0 @@
-<!-- Authorization authority certificate with a circular region restriction
- Center: ETSI coordinates - 10km to the west
- Radius: 10 km
--->
-<certificate name="CERT_TS_06_05_BO_AA">
- <version>2</version>
- <signer type="digest" name="CERT_TEST_ROOT"/>
- <subject type="AA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!-- CAM -->
- <aid value="37"/> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <circle latitude="-0.000067" longitude="-0.124221" radius="10000"/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
Index: data/profiles/CERT_TS_08_03_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_08_03_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_08_03_BO_AT.xml (nonexistent)
@@ -1,29 +0,0 @@
-<!-- An invalid AT cert without region restriction signed with cert with polygonal region restriction -->
-<certificate name="CERT_TS_08_03_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_D_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
Index: data/profiles/CERT_TS_07_03_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_07_03_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_07_03_BO_AT.xml (nonexistent)
@@ -1,29 +0,0 @@
-<!-- AT cert without region restriction signed with cert with restangular region restriction -->
-<certificate name="CERT_TS_07_03_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_C_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
Index: data/profiles/CERT_TS_06_03_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_06_03_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_06_03_BO_AT.xml (nonexistent)
@@ -1,29 +0,0 @@
-<!-- AT cert without region restriction signed with cert with circular region restriction -->
-<certificate name="CERT_TS_06_03_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_B_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
Index: data/profiles/CERT_TS_07_04_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_07_04_BO_AA.xml (revision 2397)
+++ data/profiles/CERT_TS_07_04_BO_AA.xml (nonexistent)
@@ -1,35 +0,0 @@
-<!-- Authorization authority certificate with a rectangular region restriction
- Center: ETSI coordinates - 20km to the west
- Side length: 20 km
--->
-<certificate name="CERT_TS_07_04_BO_AA">
- <version>2</version>
- <signer type="digest" name="CERT_TEST_ROOT"/>
- <subject type="AA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!-- CAM -->
- <aid value="37"/> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <rectangle>
- <location latitude="0.089596" longitude="-0.372848"/>
- <location latitude="-0.090268" longitude="-0.124406"/>
- </rectangle>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
Index: data/profiles/CERT_TS_06_04_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_06_04_BO_AA.xml (revision 2397)
+++ data/profiles/CERT_TS_06_04_BO_AA.xml (nonexistent)
@@ -1,32 +0,0 @@
-<!-- Authorization authority certificate with a circular region restriction
- Center: main coordinate - 20km to the west
- Radius: 10 km
--->
-<certificate name="CERT_TS_06_04_BO_AA">
- <version>2</version>
- <signer type="digest" name="CERT_TEST_ROOT"/>
- <subject type="AA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!-- CAM -->
- <aid value="37"/> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <circle latitude="-0.000269" longitude="0.0" radius="10000"/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
Index: data/profiles/CERT_TS_09_06_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_09_06_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_09_06_BO_AT.xml (nonexistent)
@@ -1,30 +0,0 @@
-<!-- The AT certificate, containing other identified region than issuing cert
--->
-<certificate name="CERT_TS_09_06_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_09_06_BO_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <id dictionary="iso_3166_1" id="250" local="0"/> <!-- France -->
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
Index: data/profiles/CERT_TS_09_05_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_09_05_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_09_05_BO_AT.xml (nonexistent)
@@ -1,30 +0,0 @@
-<!-- The AT certificate, containing other identified region than issuing cert
--->
-<certificate name="CERT_TS_09_05_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_09_05_BO_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <id dictionary="iso_3166_1" id="250" local="0"/> <!-- France -->
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
Index: data/profiles/CERT_TS_08_05_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_08_05_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_08_05_BO_AT.xml (nonexistent)
@@ -1,34 +0,0 @@
-<!-- AT cert with smaller rectangular region than in the issuing AA cert -->
-<certificate name="CERT_TS_08_05_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_08_05_BO_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <polygon>
- <location latitude="0.044949" longitude="-0.062157"/>
- <location latitude="0.044949" longitude="0.062064"/>
- <location latitude="-0.044983" longitude="0.062064"/>
- <location latitude="-0.044983" longitude="-0.062157"/>
- </polygon>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
Index: data/profiles/CERT_TS_07_05_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_07_05_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_07_05_BO_AT.xml (nonexistent)
@@ -1,32 +0,0 @@
-<!-- AT cert with rectangular region restriction outside of the region of the issuer -->
-<certificate name="CERT_TS_07_05_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_07_05_BO_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <rectangle>
- <location latitude="0.022479" longitude="-0.031067"/>
- <location latitude="-0.022487" longitude="0.031044"/>
- </rectangle>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
Index: data/profiles/CERT_TS_06_05_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_06_05_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_06_05_BO_AT.xml (nonexistent)
@@ -1,29 +0,0 @@
-<!-- AT cert with curcular region outside the issuer region -->
-<certificate name="CERT_TS_06_05_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_06_05_BO_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <circle latitude="0.0" longitude="0.0" radius="5000"/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
Index: data/profiles/CERT_TS_09_06_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_09_06_BO_AA.xml (revision 2397)
+++ data/profiles/CERT_TS_09_06_BO_AA.xml (nonexistent)
@@ -1,30 +0,0 @@
-<!-- The valid AA certificate containing the same identified region as subordinate cert but other local area definition -->
-
-<certificate name="CERT_TS_09_06_BO_AA">
- <version>2</version>
- <signer type="digest" name="CERT_TEST_ROOT"/>
- <subject type="AA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!-- CAM -->
- <aid value="37"/> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <id dictionary="iso_3166_1" id="250" local="1"/> <!-- France -->
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
Index: data/profiles/CERT_TS_08_06_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_08_06_BO_AA.xml (revision 2397)
+++ data/profiles/CERT_TS_08_06_BO_AA.xml (nonexistent)
@@ -1,37 +0,0 @@
-<!-- Authorization authority certificate with a polygonal region restriction
- representing a square centered on 10km to the West from ETSI
- and having a side length of 20 km
--->
-<certificate name="CERT_TS_08_06_BO_AA">
- <version>2</version>
- <signer type="digest" name="CERT_TEST_ROOT"/>
- <subject type="AA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!-- CAM -->
- <aid value="37"/> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <polygon>
- <location latitude="0.17946" longitude="-0.497442"/>
- <location latitude="0.17946" longitude="-0.248628"/>
- <location latitude="-0.000404" longitude="-0.248628"/>
- <location latitude="-0.000404" longitude="-0.497442"/>
- </polygon>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
Index: data/profiles/CERT_IUT_A_AT.xml
===================================================================
--- data/profiles/CERT_IUT_A_AT.xml (revision 2397)
+++ data/profiles/CERT_IUT_A_AT.xml (revision 2398)
@@ -1,28 +1,28 @@
-<certificate name="CERT_IUT_A_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_A_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="0">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<certificate name="CERT_IUT_A_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="0">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_IUT_B_AT.xml
===================================================================
--- data/profiles/CERT_IUT_B_AT.xml (revision 2397)
+++ data/profiles/CERT_IUT_B_AT.xml (revision 2398)
@@ -1,28 +1,28 @@
-<certificate name="CERT_IUT_B_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_B_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="0">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <circle latitude="0.0" longitude="0.0" radius="5000"/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<certificate name="CERT_IUT_B_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_B_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="0">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <circle latitude="0.0" longitude="0.0" radius="5000"/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_IUT_C_1_BV_AT.xml
===================================================================
--- data/profiles/CERT_IUT_C_1_BV_AT.xml (nonexistent)
+++ data/profiles/CERT_IUT_C_1_BV_AT.xml (revision 2398)
@@ -0,0 +1,36 @@
+<!-- Authorization ticket certificate with a rectangular region restriction
+ containing 2 intersecting resctangles
+-->
+<certificate name="CERT_IUT_C_1_BV_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_C_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="0">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <rectangle>
+ <location latitude="+5km" longitude="-5km"/>
+ <location latitude="-1km" longitude="+1km" />
+ <location latitude="+1km" longitude="-1km"/>
+ <location latitude="-5km" longitude="+5km" />
+ </rectangle>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_IUT_C_2_BV_AT.xml
===================================================================
--- data/profiles/CERT_IUT_C_2_BV_AT.xml (nonexistent)
+++ data/profiles/CERT_IUT_C_2_BV_AT.xml (revision 2398)
@@ -0,0 +1,49 @@
+<!-- Authorization ticket certificate with a rectangular region restriction
+ containing 6 intersecting rectangles
+-->
+<certificate name="CERT_IUT_C_2_BV_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_C_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="0">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <rectangle>
+ <location latitude="+5km" longitude="-5km"/>
+ <location latitude="+2km" longitude="-2km" />
+
+ <location latitude="+4km" longitude="-4km"/>
+ <location latitude="+1km" longitude="-1km" />
+
+ <location latitude="+3km" longitude="-3km"/>
+ <location latitude="+0km" longitude="-0km" />
+
+ <location latitude="+2km" longitude="-2km"/>
+ <location latitude="-1km" longitude="+1km" />
+
+ <location latitude="+1km" longitude="-1km"/>
+ <location latitude="-2km" longitude="+2km" />
+
+ <location latitude="+0km" longitude="-0km"/>
+ <location latitude="-3km" longitude="+3km" />
+ </rectangle>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_IUT_C_3_BO_AT.xml
===================================================================
--- data/profiles/CERT_IUT_C_3_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_IUT_C_3_BO_AT.xml (revision 2398)
@@ -0,0 +1,52 @@
+<!-- Authorization ticket certificate with a rectangular region restriction
+ containing 7 intersecting rectangles
+-->
+<certificate name="CERT_IUT_C_3_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_C_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="0">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <rectangle>
+ <location latitude="+5km" longitude="-5km"/>
+ <location latitude="+2km" longitude="-2km" />
+
+ <location latitude="+4km" longitude="-4km"/>
+ <location latitude="+1km" longitude="-1km" />
+
+ <location latitude="+3km" longitude="-3km"/>
+ <location latitude="+0km" longitude="-0km" />
+
+ <location latitude="+2km" longitude="-2km"/>
+ <location latitude="-1km" longitude="+1km" />
+
+ <location latitude="+1km" longitude="-1km"/>
+ <location latitude="-2km" longitude="+2km" />
+
+ <location latitude="+0km" longitude="-0km"/>
+ <location latitude="-3km" longitude="+3km" />
+
+ <location latitude="-1km" longitude="+1km"/>
+ <location latitude="-4km" longitude="+4km" />
+ </rectangle>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_IUT_C_4_BO_AT.xml
===================================================================
--- data/profiles/CERT_IUT_C_4_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_IUT_C_4_BO_AT.xml (revision 2398)
@@ -0,0 +1,37 @@
+<!-- Authorization ticket certificate with a rectangular region restriction
+ containing 2 non-intersecting rectangles
+-->
+<certificate name="CERT_IUT_C_4_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_C_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="0">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <rectangle>
+ <location latitude="+5km" longitude="-5km"/>
+ <location latitude="+1km" longitude="-1km" />
+
+ <location latitude="-1km" longitude="+1km"/>
+ <location latitude="-5km" longitude="+5km" />
+ </rectangle>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_IUT_C_5_BV_AT.xml
===================================================================
--- data/profiles/CERT_IUT_C_5_BV_AT.xml (nonexistent)
+++ data/profiles/CERT_IUT_C_5_BV_AT.xml (revision 2398)
@@ -0,0 +1,37 @@
+<!-- Authorization ticket certificate with a rectangular region restriction
+ containing 2 rectangles with only 1 common point at base point
+-->
+<certificate name="CERT_IUT_C_5_BV_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_C_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="0">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <rectangle>
+ <location latitude="+5km" longitude="-5km"/>
+ <location latitude="+0km" longitude="-0km" />
+
+ <location latitude="-0km" longitude="+0km"/>
+ <location latitude="-5km" longitude="+5km" />
+ </rectangle>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_IUT_C_AT.xml
===================================================================
--- data/profiles/CERT_IUT_C_AT.xml (revision 2397)
+++ data/profiles/CERT_IUT_C_AT.xml (revision 2398)
@@ -1,34 +1,34 @@
-<!-- Authorization ticket certificate with a rectangular region restriction
- centered in ETSI coordinates and having a side length of 10 km
--->
-<certificate name="CERT_IUT_C_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_C_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="0">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <rectangle>
- <location latitude="0.044949" longitude="-0.062157"/>
- <location latitude="-0.044983" longitude="0.062064" />
- </rectangle>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- Authorization ticket certificate with a rectangular region restriction
+ centered at base point coordinates and having a side length of 10 km
+-->
+<certificate name="CERT_IUT_C_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_C_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="0">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <rectangle>
+ <location latitude="+5km" longitude="-5km"/>
+ <location latitude="-5km" longitude="+5km" />
+ </rectangle>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_IUT_D_1_BV_AT.xml
===================================================================
--- data/profiles/CERT_IUT_D_1_BV_AT.xml (nonexistent)
+++ data/profiles/CERT_IUT_D_1_BV_AT.xml (revision 2398)
@@ -0,0 +1,45 @@
+<!-- Authorization ticket certificate with a polygonal region restriction
+ representing a square centered at base point and having a side length of 10km
+ containing 12 points
+-->
+<certificate name="CERT_IUT_D_1_BV_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_D_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="0">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <polygon>
+ <location latitude="+5km" longitude="-5km"/>
+ <location latitude="+5km" longitude="-2km"/>
+ <location latitude="+5km" longitude="+2km"/>
+ <location latitude="+5km" longitude="+5km"/>
+ <location latitude="+2km" longitude="+5km"/>
+ <location latitude="-2km" longitude="+5km"/>
+ <location latitude="-5km" longitude="+5km"/>
+ <location latitude="-5km" longitude="+2km"/>
+ <location latitude="-5km" longitude="-2km"/>
+ <location latitude="-5km" longitude="-5km"/>
+ <location latitude="-2km" longitude="-5km"/>
+ <location latitude="+2km" longitude="-5km"/>
+ </polygon>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_IUT_D_2_BO_AT.xml
===================================================================
--- data/profiles/CERT_IUT_D_2_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_IUT_D_2_BO_AT.xml (revision 2398)
@@ -0,0 +1,46 @@
+<!-- Authorization ticket certificate with a polygonal region restriction
+ representing a square centered at base point and having a side length of 10km
+ containing 13 points
+-->
+<certificate name="CERT_IUT_D_2_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_D_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="0">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <polygon>
+ <location latitude="+5km" longitude="-5km"/>
+ <location latitude="+5km" longitude="-2km"/>
+ <location latitude="+5km" longitude="+2km"/>
+ <location latitude="+5km" longitude="+5km"/>
+ <location latitude="+2km" longitude="+5km"/>
+ <location latitude="-2km" longitude="+5km"/>
+ <location latitude="-5km" longitude="+5km"/>
+ <location latitude="-5km" longitude="+2km"/>
+ <location latitude="-5km" longitude="-2km"/>
+ <location latitude="-5km" longitude="-5km"/>
+ <location latitude="-2km" longitude="-5km"/>
+ <location latitude="+1km" longitude="-5km"/>
+ <location latitude="+3km" longitude="-5km"/>
+ </polygon>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_IUT_D_3_BO_AT.xml
===================================================================
--- data/profiles/CERT_IUT_D_3_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_IUT_D_3_BO_AT.xml (revision 2398)
@@ -0,0 +1,36 @@
+<!-- Authorization ticket certificate with a polygonal region restriction
+ containing 4 points with intersection
+-->
+<certificate name="CERT_IUT_D_3_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_D_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="0">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <polygon>
+ <location latitude="+5km" longitude="-5km"/>
+ <location latitude="-5km" longitude="+5km"/>
+ <location latitude="+5km" longitude="+5km"/>
+ <location latitude="-5km" longitude="-5km"/>
+ </polygon>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_IUT_D_AT.xml
===================================================================
--- data/profiles/CERT_IUT_D_AT.xml (revision 2397)
+++ data/profiles/CERT_IUT_D_AT.xml (revision 2398)
@@ -1,36 +1,36 @@
-<!-- Authorization ticket certificate with a polygonal region restriction
- representing a square centered at ETSI coordinates and having a side length of 10km
--->
-<certificate name="CERT_IUT_D_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_D_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="0">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <polygon>
- <location latitude="0.044949" longitude="-0.062157"/>
- <location latitude="0.044949" longitude="0.062064"/>
- <location latitude="-0.044983" longitude="0.062064"/>
- <location latitude="-0.044983" longitude="-0.062157"/>
- </polygon>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- Authorization ticket certificate with a polygonal region restriction
+ representing a square centered at base point and having a side length of 10km
+-->
+<certificate name="CERT_IUT_D_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_D_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="0">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <polygon>
+ <location latitude="+5km" longitude="-5km"/>
+ <location latitude="+5km" longitude="+5km"/>
+ <location latitude="-5km" longitude="+5km"/>
+ <location latitude="-5km" longitude="-5km"/>
+ </polygon>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_IUT_E_AT.xml
===================================================================
--- data/profiles/CERT_IUT_E_AT.xml (revision 2397)
+++ data/profiles/CERT_IUT_E_AT.xml (revision 2398)
@@ -1,28 +1,28 @@
-<certificate name="CERT_IUT_E_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_E_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="0">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <id dictionary="iso_3166_1" id="528" local="0"/> <!-- NL -->
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<certificate name="CERT_IUT_E_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_E_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="0">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <id dictionary="iso_3166_1" id="528" local="0"/> <!-- NL -->
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TEST_ROOT.xml
===================================================================
--- data/profiles/CERT_TEST_ROOT.xml (revision 2397)
+++ data/profiles/CERT_TEST_ROOT.xml (revision 2398)
@@ -1,28 +1,28 @@
-<certificate name="CERT_TEST_ROOT" keep-existing="yes">
- <version>2</version>
- <signer type="self"></signer>
- <subject type="ROOT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="6" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!-- CAM -->
- <aid value="37"/> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2016-01-01"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<certificate name="CERT_TEST_ROOT" keep-existing="yes">
+ <version>2</version>
+ <signer type="self"></signer>
+ <subject type="ROOT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="6" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-365d" end="+730d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_01_01_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_01_01_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_01_01_BO_AT.xml (revision 2398)
@@ -1,28 +1,28 @@
-<certificate name="CERT_TS_01_01_BO_AT">
- <version>3</version>
- <signer type="digest" name="CERT_TS_A_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<certificate name="CERT_TS_01_01_BO_AT">
+ <version>3</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_01_02_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_01_02_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_01_02_BO_AT.xml (revision 2398)
@@ -1,28 +1,28 @@
-<certificate name="CERT_TS_01_02_BO_AT">
- <version>1</version>
- <signer type="digest" name="CERT_TS_A_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<certificate name="CERT_TS_01_02_BO_AT">
+ <version>1</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_01_03_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_01_03_BO_AA.xml (revision 2397)
+++ data/profiles/CERT_TS_01_03_BO_AA.xml (revision 2398)
@@ -1,29 +1,29 @@
-<!-- Authorization authority certificate with version = 3 -->
-<certificate name="CERT_TS_01_03_BO_AA">
- <version>3</version>
- <signer type="digest" name="CERT_TEST_ROOT"/>
- <subject type="AA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!-- CAM -->
- <aid value="37"/> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- Authorization authority certificate with version = 3 -->
+<certificate name="CERT_TS_01_03_BO_AA">
+ <version>3</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_01_03_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_01_03_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_01_03_BO_AT.xml (revision 2398)
@@ -1,28 +1,28 @@
-<certificate name="CERT_TS_01_03_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_01_03_BO_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<certificate name="CERT_TS_01_03_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_01_03_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_01_04_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_01_04_BO_AA.xml (revision 2397)
+++ data/profiles/CERT_TS_01_04_BO_AA.xml (revision 2398)
@@ -1,29 +1,29 @@
-<!-- Authorization authority certificate with version = 1 -->
-<certificate name="CERT_TS_01_04_BO_AA">
- <version>1</version>
- <signer type="digest" name="CERT_TEST_ROOT"/>
- <subject type="AA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!-- CAM -->
- <aid value="37"/> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- Authorization authority certificate with version = 1 -->
+<certificate name="CERT_TS_01_04_BO_AA">
+ <version>1</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_01_04_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_01_04_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_01_04_BO_AT.xml (revision 2398)
@@ -1,28 +1,28 @@
-<certificate name="CERT_TS_01_04_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_01_04_BO_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<certificate name="CERT_TS_01_04_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_01_04_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_02_01_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_02_01_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_02_01_BO_AT.xml (revision 2398)
@@ -1,29 +1,29 @@
-<!-- AT certificate signed by EA cert -->
-<certificate name="CERT_TS_02_01_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_A_EC"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- AT certificate signed by EA cert -->
+<certificate name="CERT_TS_02_01_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_EC"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_02_02_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_02_02_BO_AA.xml (revision 2397)
+++ data/profiles/CERT_TS_02_02_BO_AA.xml (revision 2398)
@@ -1,29 +1,29 @@
-<!-- AA certificate signed by EA cert -->
-<certificate name="CERT_TS_02_02_BO_AA">
- <version>2</version>
- <signer type="digest" name="CERT_TS_A_EC"/>
- <subject type="AA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!-- CAM -->
- <aid value="37"/> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- AA certificate signed by EA cert -->
+<certificate name="CERT_TS_02_02_BO_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_EC"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_02_02_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_02_02_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_02_02_BO_AT.xml (revision 2398)
@@ -1,29 +1,29 @@
-<!-- AT certificate signed by AA which is signed by EA -->
-<certificate name="CERT_TS_02_02_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_02_02_BO_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- AT certificate signed by AA which is signed by EA -->
+<certificate name="CERT_TS_02_02_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_02_02_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_02_03_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_02_03_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_02_03_BO_AT.xml (revision 2398)
@@ -1,29 +1,29 @@
-<!-- AT certificate signed by EA cert -->
-<certificate name="CERT_TS_02_01_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_A_EA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- AT certificate signed by EA cert -->
+<certificate name="CERT_TS_02_03_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_EA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_02_04_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_02_04_BO_AA.xml (revision 2397)
+++ data/profiles/CERT_TS_02_04_BO_AA.xml (revision 2398)
@@ -1,29 +1,29 @@
-<!-- AA certificate signed by EA cert -->
-<certificate name="CERT_TS_02_04_BO_AA">
- <version>2</version>
- <signer type="digest" name="CERT_TS_A_EA"/>
- <subject type="AA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!-- CAM -->
- <aid value="37"/> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- AA certificate signed by EA cert -->
+<certificate name="CERT_TS_02_04_BO_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_EA"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_02_04_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_02_04_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_02_04_BO_AT.xml (revision 2398)
@@ -1,29 +1,29 @@
-<!-- AT certificate signed by AA which is signed by EA -->
-<certificate name="CERT_TS_02_04_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_02_04_BO_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- AT certificate signed by AA which is signed by EA -->
+<certificate name="CERT_TS_02_04_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_02_04_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_03_01_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_03_01_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_03_01_BO_AT.xml (revision 2398)
@@ -1,29 +1,29 @@
-<!-- AT certificate signed by other AT certificate -->
-<certificate name="CERT_TS_03_01_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_03_BO_CA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- AT certificate signed by other AT certificate -->
+<certificate name="CERT_TS_03_01_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_03_BO_CA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_03_02_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_03_02_BO_AA.xml (revision 2397)
+++ data/profiles/CERT_TS_03_02_BO_AA.xml (revision 2398)
@@ -1,29 +1,29 @@
-<!-- AA certificate signed by AT cert -->
-<certificate name="CERT_TS_03_02_BO_AA">
- <version>2</version>
- <signer type="digest" name="CERT_TS_03_BO_CA"/>
- <subject type="AA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!-- CAM -->
- <aid value="37"/> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- AA certificate signed by AT cert -->
+<certificate name="CERT_TS_03_02_BO_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_03_BO_CA"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_03_02_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_03_02_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_03_02_BO_AT.xml (revision 2398)
@@ -1,29 +1,29 @@
-<!-- AT certificate signed by AA cert which is signed by other AT certificate -->
-<certificate name="CERT_TS_03_02_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_03_02_BO_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- AT certificate signed by AA cert which is signed by other AT certificate -->
+<certificate name="CERT_TS_03_02_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_03_02_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_03_BO_CA.xml
===================================================================
--- data/profiles/CERT_TS_03_BO_CA.xml (revision 2397)
+++ data/profiles/CERT_TS_03_BO_CA.xml (revision 2398)
@@ -1,29 +1,29 @@
-<!-- AT certificate used to sign AA cert -->
-<certificate name="CERT_TS_03_BO_CA">
- <version>2</version>
- <signer type="digest" name="CERT_TS_A_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- AT certificate used to sign AA cert -->
+<certificate name="CERT_TS_03_BO_CA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_04_01_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_04_01_BO_AA.xml (revision 2397)
+++ data/profiles/CERT_TS_04_01_BO_AA.xml (revision 2398)
@@ -1,29 +1,29 @@
-<!-- AA certificate signed by other AA cert -->
-<certificate name="CERT_TS_04_01_BO_AA">
- <version>2</version>
- <signer type="digest" name="CERT_TS_A_AA"/>
- <subject type="AA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!-- CAM -->
- <aid value="37"/> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- AA certificate signed by other AA cert -->
+<certificate name="CERT_TS_04_01_BO_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_04_01_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_04_01_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_04_01_BO_AT.xml (revision 2398)
@@ -1,29 +1,29 @@
-<!-- AT certificate signed by AA cert which is signed by other AA certificate -->
-<certificate name="CERT_TS_04_01_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_04_01_BO_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- AT certificate signed by AA cert which is signed by other AA certificate -->
+<certificate name="CERT_TS_04_01_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_04_01_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_06_01_BV_AT.xml
===================================================================
--- data/profiles/CERT_TS_06_01_BV_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_06_01_BV_AT.xml (revision 2398)
@@ -1,29 +1,32 @@
-<!-- AT cert with the same circular region like issuing AA certificate -->
-<certificate name="CERT_TS_06_01_BV_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_B_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <circle latitude="0.0" longitude="0.0" radius="10000"/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- AT cert with the same circular region like issuing AA certificate
+ Center : base point
+ Radius : 10km
+-->
+<certificate name="CERT_TS_06_01_BV_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_B_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <circle latitude="0.0" longitude="0.0" radius="1000"/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_06_02_BV_AT.xml
===================================================================
--- data/profiles/CERT_TS_06_02_BV_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_06_02_BV_AT.xml (revision 2398)
@@ -1,29 +1,32 @@
-<!-- AT cert with smaller curcular region than issuing AA cert -->
-<certificate name="CERT_TS_06_02_BV_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_B_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <circle latitude="0.0" longitude="0.0" radius="5000"/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- AT cert with smaller curcular region than issuing AA cert
+ Center : base point
+ Radius : 5km
+ -->
+<certificate name="CERT_TS_06_02_BV_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_B_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <circle latitude="0.0" longitude="0.0" radius="5000"/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_06_03_BV_AT.xml
===================================================================
--- data/profiles/CERT_TS_06_03_BV_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_06_03_BV_AT.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- AT cert with curcular region signed by AA cert with restangular region -->
+<certificate name="CERT_TS_06_03_BV_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_C_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <circle latitude="0.0" longitude="0.0" radius="5000"/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_06_04_BV_AT.xml
===================================================================
--- data/profiles/CERT_TS_06_04_BV_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_06_04_BV_AT.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- AT cert with curcular region signed by AA cert with polygonal region -->
+<certificate name="CERT_TS_06_04_BV_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_D_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <circle latitude="0.0" longitude="0.0" radius="5000"/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_06_05_BV_AT.xml
===================================================================
--- data/profiles/CERT_TS_06_05_BV_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_06_05_BV_AT.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- AT cert with curcular region signed by AA cert with identified region -->
+<certificate name="CERT_TS_06_05_BV_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_E_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <circle latitude="0.0" longitude="0.0" radius="5000"/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_06_06_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_06_06_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_06_06_BO_AT.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- AT cert without region restriction signed with cert with circular region restriction -->
+<certificate name="CERT_TS_06_06_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_B_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_06_07_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_06_07_BO_AA.xml (nonexistent)
+++ data/profiles/CERT_TS_06_07_BO_AA.xml (revision 2398)
@@ -0,0 +1,32 @@
+<!-- Authorization authority certificate with a circular region restriction
+ Center: 20km to the west from base point
+ Radius: 10 km
+-->
+<certificate name="CERT_TS_06_07_BO_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <circle latitude="0.0" longitude="-20km" radius="10000"/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_06_07_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_06_07_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_06_07_BO_AT.xml (revision 2398)
@@ -0,0 +1,33 @@
+<!-- AT cert with curcular region outside the issuer region
+ Center: base point
+ Radius: 5 km
+-->
+
+<certificate name="CERT_TS_06_07_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_06_07_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <circle latitude="0.0" longitude="0.0" radius="5000"/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_06_08_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_06_08_BO_AA.xml (nonexistent)
+++ data/profiles/CERT_TS_06_08_BO_AA.xml (revision 2398)
@@ -0,0 +1,32 @@
+<!-- Authorization authority certificate with a circular region restriction
+ Center: 10km to the west from base point
+ Radius: 10km
+-->
+<certificate name="CERT_TS_06_08_BO_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-365d" end="+365d"/>
+ <restriction type="region">
+ <circle latitude="0.0" longitude="-20km" radius="10000"/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_06_08_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_06_08_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_06_08_BO_AT.xml (revision 2398)
@@ -0,0 +1,32 @@
+<!-- AT cert with curcular region outside the issuer region
+ Center: base point
+ Radius: 5km
+-->
+<certificate name="CERT_TS_06_08_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_06_08_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <circle latitude="0.0" longitude="0.0" radius="5000"/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_07_01_BV_AT.xml
===================================================================
--- data/profiles/CERT_TS_07_01_BV_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_07_01_BV_AT.xml (revision 2398)
@@ -1,32 +1,32 @@
-<!-- AT cert with the same rectangular region as issuing AA cert -->
-<certificate name="CERT_TS_07_01_BV_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_C_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <rectangle>
- <location latitude="0.044949" longitude="-0.062157"/>
- <location latitude="-0.044983" longitude="0.062064"/>
- </rectangle>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- AT cert with the same rectangular region as issuing AA cert -->
+<certificate name="CERT_TS_07_01_BV_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_C_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <rectangle>
+ <location latitude="+10km" longitude="-10km"/>
+ <location latitude="-10km" longitude="+10km"/>
+ </rectangle>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_07_02_BV_AT.xml
===================================================================
--- data/profiles/CERT_TS_07_02_BV_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_07_02_BV_AT.xml (revision 2398)
@@ -1,32 +1,35 @@
-<!-- AT cert with smaller rectangular region than issuing AA cert -->
-<certificate name="CERT_TS_07_02_BV_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_C_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <rectangle>
- <location latitude="0.022479" longitude="-0.031067"/>
- <location latitude="-0.022487" longitude="0.031044"/>
- </rectangle>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- AT cert with rectangular region signed by AA with bigger circular region
+ Center: base point
+ Side length: 10km
+-->
+<certificate name="CERT_TS_07_02_BV_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_B_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <rectangle>
+ <location latitude="+5km" longitude="-5km"/>
+ <location latitude="-5km" longitude="+5km"/>
+ </rectangle>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_07_03_BV_AT.xml
===================================================================
--- data/profiles/CERT_TS_07_03_BV_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_07_03_BV_AT.xml (revision 2398)
@@ -0,0 +1,35 @@
+<!-- AT cert with smaller rectangular region than issuing AA cert
+ Center: base point
+ Side length: 10km
+-->
+<certificate name="CERT_TS_07_03_BV_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_C_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <rectangle>
+ <location latitude="+5km" longitude="-5km"/>
+ <location latitude="-5km" longitude="+5km"/>
+ </rectangle>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_07_04_BV_AT.xml
===================================================================
--- data/profiles/CERT_TS_07_04_BV_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_07_04_BV_AT.xml (revision 2398)
@@ -0,0 +1,32 @@
+<!-- AT cert with rectangular region signed by AA with bigger polygonal region -->
+<certificate name="CERT_TS_07_04_BV_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_D_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <rectangle>
+ <location latitude="+5km" longitude="-5km"/>
+ <location latitude="-5km" longitude="+5km"/>
+ </rectangle>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_07_05_BV_AT.xml
===================================================================
--- data/profiles/CERT_TS_07_05_BV_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_07_05_BV_AT.xml (revision 2398)
@@ -0,0 +1,35 @@
+<!-- AT cert with rectangular region signed by AA with bigger identified region
+ Center: base point
+ Side length: 10km
+-->
+<certificate name="CERT_TS_07_05_BV_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_E_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <rectangle>
+ <location latitude="+5km" longitude="-5km"/>
+ <location latitude="-5km" longitude="+5km"/>
+ </rectangle>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_07_06_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_07_06_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_07_06_BO_AT.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- AT cert without region restriction signed with cert with restangular region restriction-->
+<certificate name="CERT_TS_07_06_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_C_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_07_07_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_07_07_BO_AA.xml (nonexistent)
+++ data/profiles/CERT_TS_07_07_BO_AA.xml (revision 2398)
@@ -0,0 +1,35 @@
+<!-- Authorization authority certificate with a rectangular region restriction
+ Center: 20km to the west from base point
+ Side length: 20 km
+-->
+<certificate name="CERT_TS_07_07_BO_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <rectangle>
+ <location latitude="+10km" longitude="-30km"/>
+ <location latitude="-10km" longitude="-10km"/>
+ </rectangle>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_07_07_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_07_07_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_07_07_BO_AT.xml (revision 2398)
@@ -0,0 +1,35 @@
+<!-- AT cert with rectangular region restriction outside of the region of the issuer
+ Center: base point
+ Side length: 10km
+-->
+<certificate name="CERT_TS_07_07_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_07_07_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <rectangle>
+ <location latitude="+5km" longitude="-5km"/>
+ <location latitude="-5km" longitude="+5km"/>
+ </rectangle>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_07_08_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_07_08_BO_AA.xml (nonexistent)
+++ data/profiles/CERT_TS_07_08_BO_AA.xml (revision 2398)
@@ -0,0 +1,35 @@
+<!-- Authorization authority certificate with a rectangular region restriction
+ Center: 10km to the west from base point
+ Side length: 20km
+-->
+<certificate name="CERT_TS_07_08_BO_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <rectangle>
+ <location latitude="+10km" longitude="-20km"/>
+ <location latitude="-10km" longitude="-0km"/>
+ </rectangle>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_07_08_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_07_08_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_07_08_BO_AT.xml (revision 2398)
@@ -0,0 +1,35 @@
+<!-- AT cert with rectangular region restriction outside of the region of the issuer
+ Center: base point
+ Side length: 10km
+-->
+<certificate name="CERT_TS_07_08_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_07_08_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <rectangle>
+ <location latitude="+5km" longitude="-5km"/>
+ <location latitude="-5km" longitude="+5km"/>
+ </rectangle>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_08_01_BV_AT.xml
===================================================================
--- data/profiles/CERT_TS_08_01_BV_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_08_01_BV_AT.xml (revision 2398)
@@ -1,34 +1,34 @@
-<!-- AT cert with the same polygonal region as in the issuing AA cert -->
-<certificate name="CERT_TS_08_01_BV_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_D_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <polygon>
- <location latitude="0.089865" longitude="-0.124407"/>
- <location latitude="0.089865" longitude="0.124036"/>
- <location latitude="-0.089999" longitude="0.124036"/>
- <location latitude="-0.089999" longitude="-0.124407"/>
- </polygon>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- AT cert with the same polygonal region as in the issuing AA cert -->
+<certificate name="CERT_TS_08_01_BV_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_D_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <polygon>
+ <location latitude="+10km" longitude="-10km"/>
+ <location latitude="+10km" longitude="+10km"/>
+ <location latitude="-10km" longitude="+10km"/>
+ <location latitude="-10km" longitude="-10km"/>
+ </polygon>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_08_02_BV_AT.xml
===================================================================
--- data/profiles/CERT_TS_08_02_BV_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_08_02_BV_AT.xml (revision 2398)
@@ -1,34 +1,38 @@
-<!-- AT valid cert with smaller rectangular region than in the issuing AA cert -->
-<certificate name="CERT_TS_08_02_BV_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_D_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <polygon>
- <location latitude="0.044949" longitude="-0.062157"/>
- <location latitude="0.044949" longitude="0.062064"/>
- <location latitude="-0.044983" longitude="0.062064"/>
- <location latitude="-0.044983" longitude="-0.062157"/>
- </polygon>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- AT valid cert with polygonal region signed with AA certificate with bigger circular region
+ Rectangular polygon.
+ Center: base point
+ Side length: 10km
+-->
+<certificate name="CERT_TS_08_02_BV_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_B_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <polygon>
+ <location latitude="+5km" longitude="-5km"/>
+ <location latitude="+5km" longitude="+5km"/>
+ <location latitude="-5km" longitude="+5km"/>
+ <location latitude="-5km" longitude="-5km"/>
+ </polygon>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_08_03_BV_AT.xml
===================================================================
--- data/profiles/CERT_TS_08_03_BV_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_08_03_BV_AT.xml (revision 2398)
@@ -0,0 +1,38 @@
+<!-- AT valid cert with polygonal region signed with AA certificate with bigger rectangular region
+ Rectangular polygon.
+ Center: base point
+ Side length: 10km
+-->
+<certificate name="CERT_TS_08_03_BV_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_C_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <polygon>
+ <location latitude="+5km" longitude="-5km"/>
+ <location latitude="+5km" longitude="+5km"/>
+ <location latitude="-5km" longitude="+5km"/>
+ <location latitude="-5km" longitude="-5km"/>
+ </polygon>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_08_04_BV_AT.xml
===================================================================
--- data/profiles/CERT_TS_08_04_BV_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_08_04_BV_AT.xml (revision 2398)
@@ -0,0 +1,38 @@
+<!-- AT valid cert with polygonal region signed with AA certificate with bigger polygonal region
+ Rectangular polygon.
+ Center: base point
+ Side length: 10km
+-->
+<certificate name="CERT_TS_08_04_BV_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_D_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <polygon>
+ <location latitude="+5km" longitude="-5km"/>
+ <location latitude="+5km" longitude="+5km"/>
+ <location latitude="-5km" longitude="+5km"/>
+ <location latitude="-5km" longitude="-5km"/>
+ </polygon>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_08_05_BV_AT.xml
===================================================================
--- data/profiles/CERT_TS_08_05_BV_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_08_05_BV_AT.xml (revision 2398)
@@ -0,0 +1,38 @@
+<!-- AT valid cert with polygonal region signed with AA certificate with bigger identified region
+ Rectangular polygon.
+ Center: base point
+ Side length: 10km
+-->
+<certificate name="CERT_TS_08_05_BV_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_E_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <polygon>
+ <location latitude="+5km" longitude="-5km"/>
+ <location latitude="+5km" longitude="+5km"/>
+ <location latitude="-5km" longitude="+5km"/>
+ <location latitude="-5km" longitude="-5km"/>
+ </polygon>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_08_06_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_08_06_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_08_06_BO_AT.xml (revision 2398)
@@ -1,34 +1,29 @@
-<!-- AT cert intersecting with the polygonal region of the issuing AA cert -->
-<certificate name="CERT_TS_08_06_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_08_06_BO_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <polygon>
- <location latitude="0.044949" longitude="-0.062157"/>
- <location latitude="0.044949" longitude="0.062064"/>
- <location latitude="-0.044983" longitude="0.062064"/>
- <location latitude="-0.044983" longitude="-0.062157"/>
- </polygon>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- An invalid AT cert without region restriction signed with cert with polygonal region restriction -->
+<certificate name="CERT_TS_08_06_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_D_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_08_07_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_08_07_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_08_07_BO_AT.xml (revision 2398)
@@ -0,0 +1,32 @@
+<!-- An invalid AT cert with polygonal restriction containing only two point -->
+<certificate name="CERT_TS_08_07_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_D_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <polygon>
+ <location latitude="+5km" longitude="-5km"/>
+ <location latitude="+5km" longitude="+5km"/>
+ </polygon>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_08_08_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_08_08_BO_AA.xml (nonexistent)
+++ data/profiles/CERT_TS_08_08_BO_AA.xml (revision 2398)
@@ -0,0 +1,37 @@
+<!-- Authorization authority certificate with a polygonal region restriction
+ representing a square centered on 20km to the West from base point
+ and having a side length of 20 km
+-->
+<certificate name="CERT_TS_08_08_BO_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <polygon>
+ <location latitude="+10km" longitude="-30km"/>
+ <location latitude="+10km" longitude="-10km"/>
+ <location latitude="-10km" longitude="-30km"/>
+ <location latitude="-10km" longitude="-10km"/>
+ </polygon>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_08_08_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_08_08_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_08_08_BO_AT.xml (revision 2398)
@@ -0,0 +1,38 @@
+<!-- AT cert with polygonal region restriction outside of the region of the issuer
+ Square polygon
+ Center: base point
+ Side length: 10km
+-->
+<certificate name="CERT_TS_08_08_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_08_08_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <polygon>
+ <location latitude="+5km" longitude="-5km"/>
+ <location latitude="+5km" longitude="+5km"/>
+ <location latitude="-5km" longitude="+5km"/>
+ <location latitude="-5km" longitude="-5km"/>
+ </polygon>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_08_09_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_08_09_BO_AA.xml (nonexistent)
+++ data/profiles/CERT_TS_08_09_BO_AA.xml (revision 2398)
@@ -0,0 +1,37 @@
+<!-- Authorization authority certificate with a polygonal region restriction
+ representing a square centered on 10km to the West from ETSI
+ and having a side length of 20 km
+-->
+<certificate name="CERT_TS_08_09_BO_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <polygon>
+ <location latitude="+10km" longitude="-20km"/>
+ <location latitude="+10km" longitude="+0km"/>
+ <location latitude="-10km" longitude="+0km"/>
+ <location latitude="-10km" longitude="-20km"/>
+ </polygon>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_08_09_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_08_09_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_08_09_BO_AT.xml (revision 2398)
@@ -0,0 +1,38 @@
+<!-- AT cert intersecting with the polygonal region of the issuing AA cert
+ Square polygon
+ Center: base point
+ Side length: 10km
+-->
+<certificate name="CERT_TS_08_09_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_08_09_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <polygon>
+ <location latitude="+5km" longitude="-5km"/>
+ <location latitude="+5km" longitude="+5km"/>
+ <location latitude="-5km" longitude="+5km"/>
+ <location latitude="-5km" longitude="-5km"/>
+ </polygon>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_09_01_BV_AT.xml
===================================================================
--- data/profiles/CERT_TS_09_01_BV_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_09_01_BV_AT.xml (revision 2398)
@@ -1,32 +1,32 @@
-<!-- The valid AT certificate, signed with CERT_TS_E_AA and containing
- the same region restriction like the issuing certificate
- without local region definition
--->
-<certificate name="CERT_TS_09_01_BV_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_E_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <id dictionary="iso_3166_1" id="250" local="0"/> <!-- France -->
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- The valid AT certificate, signed with CERT_TS_E_AA and containing
+ the same region restriction like the issuing certificate
+ without local region definition
+-->
+<certificate name="CERT_TS_09_01_BV_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_E_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <id dictionary="iso_3166_1" id="250" local="0"/> <!-- France -->
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_09_02_BV_AT.xml
===================================================================
--- data/profiles/CERT_TS_09_02_BV_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_09_02_BV_AT.xml (revision 2398)
@@ -1,32 +1,32 @@
-<!-- The valid AT certificate, signed with CERT_TS_E_AA and containing
- the same region restriction like the issuing certificate
- without local region definition
--->
-<certificate name="CERT_TS_09_02_BV_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_E_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <id dictionary="iso_3166_1" id="250" local="1"/> <!-- France -->
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- The valid AT certificate, signed with CERT_TS_E_AA and containing
+ the same region restriction like the issuing certificate
+ with local region definition
+-->
+<certificate name="CERT_TS_09_02_BV_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_E_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <id dictionary="iso_3166_1" id="250" local="1"/> <!-- France -->
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_09_03_BV_AA.xml
===================================================================
--- data/profiles/CERT_TS_09_03_BV_AA.xml (revision 2397)
+++ data/profiles/CERT_TS_09_03_BV_AA.xml (revision 2398)
@@ -1,28 +1,30 @@
-<certificate name="CERT_TS_09_03_BV_AA">
- <version>2</version>
- <signer type="digest" name="CERT_TEST_ROOT"/>
- <subject type="AA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!-- CAM -->
- <aid value="37"/> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <id dictionary="un_stats" id="150" local="0"/> <!-- Europe -->
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- AA certificate with circular region covering France -->
+
+<certificate name="CERT_TS_09_03_BV_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <circle latitude="46.60611" longitude="1.87528" radius="0xFFFF" mode="absolute"/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_09_03_BV_AT.xml
===================================================================
--- data/profiles/CERT_TS_09_03_BV_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_09_03_BV_AT.xml (revision 2398)
@@ -1,32 +1,30 @@
-<!-- The valid AT certificate, signed with CERT_TS_E_AA and containing
- the same region restriction like the issuing certificate
- without local region definition
--->
-<certificate name="CERT_TS_09_03_BV_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_09_03_BV_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <id dictionary="un_stats" id="250" local="0"/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- The valid AT certificate with identified region, signed with certificate containing circular region
+-->
+<certificate name="CERT_TS_09_03_BV_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_09_03_BV_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <id dictionary="iso_3166_1" id="250" local="1"/> <!-- France -->
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_09_04_BV_AA.xml
===================================================================
--- data/profiles/CERT_TS_09_04_BV_AA.xml (nonexistent)
+++ data/profiles/CERT_TS_09_04_BV_AA.xml (revision 2398)
@@ -0,0 +1,33 @@
+<!-- AA certificate with rectangular region covering France -->
+
+<certificate name="CERT_TS_09_04_BV_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <rectangle>
+ <location latitude="51.083333" longitude="-4.783333" mode="absolute"/>
+ <location latitude="42.333333" longitude="8.216667" mode="absolute"/>
+ </rectangle>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_09_04_BV_AT.xml
===================================================================
--- data/profiles/CERT_TS_09_04_BV_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_09_04_BV_AT.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- The valid AT certificate with id region, signed with certificate with rectangular region-->
+<certificate name="CERT_TS_09_04_BV_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_09_04_BV_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <id dictionary="iso_3166_1" id="250" local="1"/> <!-- France -->
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_09_05_BV_AA.xml
===================================================================
--- data/profiles/CERT_TS_09_05_BV_AA.xml (nonexistent)
+++ data/profiles/CERT_TS_09_05_BV_AA.xml (revision 2398)
@@ -0,0 +1,35 @@
+<!-- AA certificate with polygonal region covering France -->
+
+<certificate name="CERT_TS_09_05_BV_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <polygon>
+ <location latitude="51.083333" longitude="-4.783333" mode="absolute"/>
+ <location latitude="51.083333" longitude="8.216667" mode="absolute"/>
+ <location latitude="42.333333" longitude="8.216667" mode="absolute"/>
+ <location latitude="42.333333" longitude="-4.783333" mode="absolute"/>
+ </polygon>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_09_05_BV_AT.xml
===================================================================
--- data/profiles/CERT_TS_09_05_BV_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_09_05_BV_AT.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- The valid AT certificate with id region, signed with certificate with polygonal region-->
+<certificate name="CERT_TS_09_05_BV_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_09_04_BV_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <id dictionary="iso_3166_1" id="250" local="1"/> <!-- France -->
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_09_06_BV_AA.xml
===================================================================
--- data/profiles/CERT_TS_09_06_BV_AA.xml (nonexistent)
+++ data/profiles/CERT_TS_09_06_BV_AA.xml (revision 2398)
@@ -0,0 +1,30 @@
+<!-- AA certificate with UN stats id region of Europe -->
+
+<certificate name="CERT_TS_09_06_BV_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <id dictionary="un_stats" id="150" local="0"/> <!-- Europe -->
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_09_06_BV_AT.xml
===================================================================
--- data/profiles/CERT_TS_09_06_BV_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_09_06_BV_AT.xml (revision 2398)
@@ -0,0 +1,33 @@
+<!-- The valid AT certificate, signed with containing
+ the id region restriction inside the id region of
+ the issuing cert.
+ France
+-->
+<certificate name="CERT_TS_09_06_BV_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_09_06_BV_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <id dictionary="un_stats" id="250" local="0"/> <!-- France -->
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_09_07_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_09_07_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_09_07_BO_AT.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- AT cert without region restriction signed with cert with polygonal region restriction -->
+<certificate name="CERT_TS_09_07_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_E_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_09_08_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_09_08_BO_AA.xml (nonexistent)
+++ data/profiles/CERT_TS_09_08_BO_AA.xml (revision 2398)
@@ -0,0 +1,30 @@
+<!-- The valid AA certificate containing the same identified region as subordinate cert but other local area definition -->
+
+<certificate name="CERT_TS_09_08_BO_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-365d" end="+365d"/>
+ <restriction type="region">
+ <id dictionary="iso_3166_1" id="250" local="1"/> <!-- France -->
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_09_08_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_09_08_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_09_08_BO_AT.xml (revision 2398)
@@ -0,0 +1,30 @@
+<!-- The AT certificate, containing other identified region than issuing cert
+-->
+<certificate name="CERT_TS_09_08_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_09_08_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <id dictionary="iso_3166_1" id="250" local="2"/> <!-- France -->
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_09_09_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_09_09_BO_AA.xml (nonexistent)
+++ data/profiles/CERT_TS_09_09_BO_AA.xml (revision 2398)
@@ -0,0 +1,30 @@
+<!-- The valid AA certificate containing identified region other then subordinate cert -->
+
+<certificate name="CERT_TS_09_09_BO_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <id dictionary="iso_3166_1" id="56" local="0"/> <!-- Belgium -->
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_09_09_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_09_09_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_09_09_BO_AT.xml (revision 2398)
@@ -0,0 +1,30 @@
+<!-- The AT certificate, containing other identified region than issuing cert
+-->
+<certificate name="CERT_TS_09_09_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_09_09_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <id dictionary="iso_3166_1" id="250" local="0"/> <!-- France -->
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_09_10_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_09_10_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_09_10_BO_AT.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- AT cert without region restriction signed with cert with polygonal region restriction -->
+<certificate name="CERT_TS_09_10_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_E_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <id dictionary="iso_3166_1" id="1000" local="0"/> <!-- Unknown -->
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_09_11_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_09_11_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_09_11_BO_AT.xml (revision 2398)
@@ -0,0 +1,30 @@
+<!-- The AT certificate, containing other identified region than issuing cert
+-->
+<certificate name="CERT_TS_09_11_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <id dictionary="iso_3166_1" id="1000" local="0"/> <!-- Unknown -->
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_09_12_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_09_12_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_09_12_BO_AT.xml (revision 2398)
@@ -0,0 +1,30 @@
+<!-- The AT certificate, containing other identified region than issuing cert
+-->
+<certificate name="CERT_TS_09_12_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <id dictionary="iso_3166_1" id="150" local="0"/> <!-- Europe -->
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_10_01_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_10_01_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_10_01_BO_AT.xml (revision 2398)
@@ -1,30 +1,30 @@
-<!-- The AT certificate signed with CERT_TS_A_AA and not containing
- validity restriction of type ‘time_start_and_end’
--->
-<certificate name="CERT_TS_10_01_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_A_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- The AT certificate signed with CERT_TS_A_AA and not containing
+ validity restriction of type ‘time_start_and_end’
+-->
+<certificate name="CERT_TS_10_01_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_10_02_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_10_02_BO_AA.xml (nonexistent)
+++ data/profiles/CERT_TS_10_02_BO_AA.xml (revision 2398)
@@ -0,0 +1,28 @@
+<!-- Authorization authority certificate without any region restriction -->
+<certificate name="CERT_TS_10_02_BO_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!--CAM--> <!-- CAM -->
+ <aid value="37"/> <!--DENM--> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_10_02_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_10_02_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_10_02_BO_AT.xml (revision 2398)
@@ -1,32 +1,28 @@
-<!-- The AT certificate signed with CERT_TS_A_AA and containing
- validity restrictions of type ‘time_start_and_end’ and ‘time_ end’
--->
-<certificate name="CERT_TS_10_02_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_A_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="time" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<certificate name="CERT_TS_10_02_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_10_02_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_10_03_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_10_03_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_10_03_BO_AT.xml (revision 2398)
@@ -1,32 +1,30 @@
-<!-- The AT certificate signed with CERT_TS_A_AA and containing
- validity restrictions of types ‘time_start_and_end’ and ‘time_start_and_duration’
--->
-<certificate name="CERT_TS_10_03_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_A_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="time" start="2015-01-01" duration="365d"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- The AT certificate signed with CERT_TS_A_AA and containing validity restrictions of ‘time_end’
+-->
+<certificate name="CERT_TS_10_03_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_10_04_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_10_04_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_10_04_BO_AT.xml (revision 2398)
@@ -0,0 +1,30 @@
+<!-- The AT certificate signed with CERT_TS_A_AA and containing validity restrictions of type ‘time_start_and_duration’
+-->
+<certificate name="CERT_TS_10_04_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" duration="365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_10_05_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_10_05_BO_AA.xml (nonexistent)
+++ data/profiles/CERT_TS_10_05_BO_AA.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- Authorization authority certificate containing validity restrictions of type ‘time_end’ -->
+<certificate name="CERT_TS_10_05_BO_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!--CAM--> <!-- CAM -->
+ <aid value="37"/> <!--DENM--> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_10_05_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_10_05_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_10_05_BO_AT.xml (revision 2398)
@@ -0,0 +1,28 @@
+<certificate name="CERT_TS_10_05_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_10_05_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="today" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_10_06_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_10_06_BO_AA.xml (nonexistent)
+++ data/profiles/CERT_TS_10_06_BO_AA.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- Authorization authority certificate containing validity restrictions of type ‘time_start_and_duration’ -->
+<certificate name="CERT_TS_10_06_BO_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!--CAM--> <!-- CAM -->
+ <aid value="37"/> <!--DENM--> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" duration="365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_10_06_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_10_06_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_10_06_BO_AT.xml (revision 2398)
@@ -0,0 +1,28 @@
+<certificate name="CERT_TS_10_06_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_10_06_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_11_01_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_11_01_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_11_01_BO_AT.xml (revision 2398)
@@ -1,33 +1,33 @@
-<!-- The AT certificate signed with CERT_TS_A_AA and
- containing validity restriction of type ‘time_start_and_end’
- which ends after the end time of CERT_TS_A_AA
--->
-<certificate name="CERT_TS_11_01_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_A_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <!-- Ends one day after AA cert -->
- <restriction type="time" start="2015-01-01" end="2015-05-01"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- The AT certificate signed with CERT_TS_A_AA and
+ containing validity restriction of type ‘time_start_and_end’
+ which ends after the end time of CERT_TS_A_AA
+-->
+<certificate name="CERT_TS_11_01_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <!-- Ends one day after AA cert -->
+ <restriction type="time" start="+0d" end="+370d"/> <!-- 5 days after CERT_TS_A_AA end time -->
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_11_02_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_11_02_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_11_02_BO_AT.xml (revision 2398)
@@ -1,33 +1,33 @@
-<!-- The AT certificate signed with CERT_TS_A_AA and
- containing validity restriction of type ‘time_start_and_end’
- which ends after the end time of CERT_TS_A_AA
--->
-<certificate name="CERT_TS_11_02_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_A_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <!-- Starts one day before the AA cert -->
- <restriction type="time" start="2014-12-31" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- The AT certificate signed with CERT_TS_A_AA and
+ containing validity restriction of type ‘time_start_and_end’
+ which ends after the end time of CERT_TS_A_AA
+-->
+<certificate name="CERT_TS_11_02_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <!-- Starts one day before the AA cert -->
+ <restriction type="time" start="-5d" end="+365d"/> <!-- 5 days before CERT_TS_A_AA start time -->
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_11_03_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_11_03_BO_AA.xml (revision 2397)
+++ data/profiles/CERT_TS_11_03_BO_AA.xml (revision 2398)
@@ -1,29 +1,29 @@
-<!-- The expired AA certificate -->
-<certificate name="CERT_TS_11_03_BO_AA">
- <version>2</version>
- <signer type="digest" name="CERT_TEST_ROOT"/>
- <subject type="AA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!-- CAM -->
- <aid value="37"/> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-03-01"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- The expired AA certificate -->
+<certificate name="CERT_TS_11_03_BO_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-365d" end="-5d"/> <!-- expired before base time -->
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_11_03_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_11_03_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_11_03_BO_AT.xml (revision 2398)
@@ -1,30 +1,30 @@
-<!-- The AT certificate signed with the expired CERT_TS_11_03_BO_AA
--->
-<certificate name="CERT_TS_11_03_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_11_03_BO_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- The AT certificate signed with the expired CERT_TS_11_03_BO_AA
+-->
+<certificate name="CERT_TS_11_03_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_11_03_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-365d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_11_04_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_11_04_BO_AA.xml (revision 2397)
+++ data/profiles/CERT_TS_11_04_BO_AA.xml (revision 2398)
@@ -1,29 +1,29 @@
-<!-- The not yet valid AA certificate -->
-<certificate name="CERT_TS_11_04_BO_AA">
- <version>2</version>
- <signer type="digest" name="CERT_TEST_ROOT"/>
- <subject type="AA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!-- CAM -->
- <aid value="37"/> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-04-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- The not yet valid AA certificate -->
+<certificate name="CERT_TS_11_04_BO_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+366d" end="+730d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_11_04_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_11_04_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_11_04_BO_AT.xml (revision 2398)
@@ -1,30 +1,30 @@
-<!-- The AT certificate signed with the not yet valid CERT_TS_11_04_BO_AA
--->
-<certificate name="CERT_TS_11_04_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_11_04_BO_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- The AT certificate signed with the not yet valid CERT_TS_11_04_BO_AA
+-->
+<certificate name="CERT_TS_11_04_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_11_04_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+730d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_12_01_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_12_01_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_12_01_BO_AT.xml (revision 2398)
@@ -1,25 +1,25 @@
-<!-- The AT certificate not containing subject attribute 'its_aid_ssp_list'
--->
-<certificate name="CERT_TS_12_01_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_A_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- The AT certificate not containing subject attribute 'its_aid_ssp_list'
+-->
+<certificate name="CERT_TS_12_01_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_12_02_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_12_02_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_12_02_BO_AT.xml (revision 2398)
@@ -1,29 +1,29 @@
-<!-- The AT certificate not containing CAM record in subject attribute 'its_aid_ssp_list'
--->
-<certificate name="CERT_TS_12_02_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_A_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- The AT certificate not containing CAM record in subject attribute 'its_aid_ssp_list'
+-->
+<certificate name="CERT_TS_12_02_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_12_03_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_12_03_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_12_03_BO_AT.xml (revision 2398)
@@ -1,29 +1,29 @@
-<!-- The AT certificate not containing DENM record in subject attribute 'its_aid_ssp_list'
--->
-<certificate name="CERT_TS_12_03_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_A_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- The AT certificate not containing DENM record in subject attribute 'its_aid_ssp_list'
+-->
+<certificate name="CERT_TS_12_03_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_12_04_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_12_04_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_12_04_BO_AT.xml (revision 2398)
@@ -0,0 +1,30 @@
+<!-- The AT certificate not containing two CAM record in subject attribute 'its_aid_ssp_list'
+-->
+<certificate name="CERT_TS_12_04_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_13_01_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_13_01_BO_AA.xml (revision 2397)
+++ data/profiles/CERT_TS_13_01_BO_AA.xml (revision 2398)
@@ -1,28 +1,28 @@
-<!-- Authorization authority certificate without CAM AID in the AID list -->
-<certificate name="CERT_TS_13_01_BO_AA">
- <version>2</version>
- <signer type="digest" name="CERT_TEST_ROOT"/>
- <subject type="AA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="37"/> <!--DENM-->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- Authorization authority certificate without CAM AID in the AID list -->
+<certificate name="CERT_TS_13_01_BO_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="37"/> <!--DENM-->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_13_01_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_13_01_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_13_01_BO_AT.xml (revision 2398)
@@ -1,28 +1,28 @@
-<certificate name="CERT_TS_13_01_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_13_01_BO_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<certificate name="CERT_TS_13_01_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_13_01_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_13_02_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_13_02_BO_AA.xml (revision 2397)
+++ data/profiles/CERT_TS_13_02_BO_AA.xml (revision 2398)
@@ -1,28 +1,28 @@
-<!-- Authorization authority certificate without DENM AID in the AID list -->
-<certificate name="CERT_TS_13_02_BO_AA">
- <version>2</version>
- <signer type="digest" name="CERT_TEST_ROOT"/>
- <subject type="AA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!--CAM-->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- Authorization authority certificate without DENM AID in the AID list -->
+<certificate name="CERT_TS_13_02_BO_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!--CAM-->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_13_02_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_13_02_BO_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_13_02_BO_AT.xml (revision 2398)
@@ -1,28 +1,28 @@
-<certificate name="CERT_TS_13_02_BO_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_13_02_BO_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<certificate name="CERT_TS_13_02_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_13_02_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_13_03_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_13_03_BO_AA.xml (nonexistent)
+++ data/profiles/CERT_TS_13_03_BO_AA.xml (revision 2398)
@@ -0,0 +1,24 @@
+<!-- Authorization authority certificate without AID list -->
+<certificate name="CERT_TS_13_03_BO_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_13_03_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_13_03_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_13_03_BO_AT.xml (revision 2398)
@@ -0,0 +1,28 @@
+<certificate name="CERT_TS_13_03_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_13_03_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_14_01_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_14_01_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_14_01_BO_AT.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- AT certificate with signer info of type certificate -->
+<certificate name="CERT_TS_14_01_BO_AT">
+ <version>2</version>
+ <signer type="certificate" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_14_02_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_14_02_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_14_02_BO_AT.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- AT certificate with signer info of type certificate chain -->
+<certificate name="CERT_TS_14_02_BO_AT">
+ <version>2</version>
+ <signer type="certificate_chain" name="CERT_TEST_ROOT CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_14_03_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_14_03_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_14_03_BO_AT.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- AT certificate with signer info of type digest_with_other_algorithm -->
+<certificate name="CERT_TS_14_03_BO_AT">
+ <version>2</version>
+ <signer type="other_digest" algorithm="ecdsa_nistp256_with_sha256" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_15_01_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_15_01_BO_AA.xml (nonexistent)
+++ data/profiles/CERT_TS_15_01_BO_AA.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- Authorization authority certificate with signer info of type cesrtificate -->
+<certificate name="CERT_TS_15_01_BO_AA">
+ <version>2</version>
+ <signer type="certificate" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!--CAM--> <!-- CAM -->
+ <aid value="37"/> <!--DENM--> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-365d" end="+730d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_15_01_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_15_01_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_15_01_BO_AT.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- AT sigfned by AA certificate with signer info of type certificate -->
+<certificate name="CERT_TS_15_01_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_15_01_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_15_02_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_15_02_BO_AA.xml (nonexistent)
+++ data/profiles/CERT_TS_15_02_BO_AA.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- Authorization authority certificate with signer info of type certificate_chain -->
+<certificate name="CERT_TS_15_02_BO_AA">
+ <version>2</version>
+ <signer type="certificate_chain" name="CERT_TEST_ROOT CERT_TS_15_02_BO_CA"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!--CAM--> <!-- CAM -->
+ <aid value="37"/> <!--DENM--> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-365d" end="+730d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_15_02_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_15_02_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_15_02_BO_AT.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- AT signed by AA certificate with signer info of type certificate_chain -->
+<certificate name="CERT_TS_15_02_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_15_02_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_15_02_BO_CA.xml
===================================================================
--- data/profiles/CERT_TS_15_02_BO_CA.xml (nonexistent)
+++ data/profiles/CERT_TS_15_02_BO_CA.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- Authorization authority certificate to sign other AA cert to make a chain-->
+<certificate name="CERT_TS_15_02_BO_CA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!--CAM--> <!-- CAM -->
+ <aid value="37"/> <!--DENM--> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-365d" end="+730d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_15_03_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_15_03_BO_AA.xml (nonexistent)
+++ data/profiles/CERT_TS_15_03_BO_AA.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- Authorization authority certificate with signer info of type digest_with_other_algorithm -->
+<certificate name="CERT_TS_15_03_BO_AA">
+ <version>2</version>
+ <signer type="other_digest" algorithm="ecdsa_nistp256_with_sha256" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!--CAM--> <!-- CAM -->
+ <aid value="37"/> <!--DENM--> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-365d" end="+730d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_15_03_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_15_03_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_15_03_BO_AT.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- AT signed by AA certificate with signer info of type digest_with_other_algorithm -->
+<certificate name="CERT_TS_15_03_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_15_03_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_16_01_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_16_01_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_16_01_BO_AT.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- AT cert with non empty subject name -->
+<certificate name="CERT_TS_16_01_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="Invalid name">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_17_01_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_17_01_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_17_01_BO_AT.xml (revision 2398)
@@ -0,0 +1,26 @@
+<!-- AT cert without assurance level -->
+<certificate name="CERT_TS_17_01_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- NO assurance_level -->
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_17_02_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_17_02_BO_AA.xml (nonexistent)
+++ data/profiles/CERT_TS_17_02_BO_AA.xml (revision 2398)
@@ -0,0 +1,26 @@
+<!-- Authorization authority certificate without assurance level -->
+<certificate name="CERT_TS_17_02_BO_AA" keep-existing="yes">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- NO assurance_level -->
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!--CAM--> <!-- CAM -->
+ <aid value="37"/> <!--DENM--> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-365d" end="+730d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_17_02_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_17_02_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_17_02_BO_AT.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- AT cert signed with AA cert without assurance level -->
+<certificate name="CERT_TS_17_02_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_17_02_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_17_03_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_17_03_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_17_03_BO_AT.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- AT cert assurance level greate then assurence level of AA cert-->
+<certificate name="CERT_TS_17_03_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_17_04_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_17_04_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_17_04_BO_AT.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- AT cert with assurance level equal to AA cert but with greater confidence-->
+<certificate name="CERT_TS_17_04_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3" confidence="1"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_18_01_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_18_01_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_18_01_BO_AT.xml (revision 2398)
@@ -0,0 +1,24 @@
+<!-- AT cert vithout verification key-->
+<certificate name="CERT_TS_18_01_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- NO verification_key -->
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_18_02_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_18_02_BO_AA.xml (nonexistent)
+++ data/profiles/CERT_TS_18_02_BO_AA.xml (revision 2398)
@@ -0,0 +1,24 @@
+<!-- Authorization authority certificate without verification key -->
+<certificate name="CERT_TS_18_02_BO_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- NO verification_key -->
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!--CAM--> <!-- CAM -->
+ <aid value="37"/> <!--DENM--> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-365d" end="+730d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_18_02_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_18_02_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_18_02_BO_AT.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- AT cert signed with AA cert without verification key -->
+<certificate name="CERT_TS_18_02_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_18_02_BO_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_19_01_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_19_01_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_19_01_BO_AT.xml (revision 2398)
@@ -0,0 +1,28 @@
+<certificate name="CERT_TS_19_01_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <region type="240">Some data</region>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_A_AA.xml
===================================================================
--- data/profiles/CERT_TS_A_AA.xml (revision 2397)
+++ data/profiles/CERT_TS_A_AA.xml (revision 2398)
@@ -1,29 +1,29 @@
-<!-- Authorization authority certificate without any region restriction -->
-<certificate name="CERT_TS_A_AA" keep-existing="yes">
- <version>2</version>
- <signer type="digest" name="CERT_TEST_ROOT"/>
- <subject type="AA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!--CAM--> <!-- CAM -->
- <aid value="37"/> <!--DENM--> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- Authorization authority certificate without any region restriction -->
+<certificate name="CERT_TS_A_AA" keep-existing="yes">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!--CAM--> <!-- CAM -->
+ <aid value="37"/> <!--DENM--> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-365d" end="+730d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_A_AT.xml
===================================================================
--- data/profiles/CERT_TS_A_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_A_AT.xml (revision 2398)
@@ -1,28 +1,28 @@
-<certificate name="CERT_TS_A_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_A_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<certificate name="CERT_TS_A_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_A_EA.xml
===================================================================
--- data/profiles/CERT_TS_A_EA.xml (revision 2397)
+++ data/profiles/CERT_TS_A_EA.xml (revision 2398)
@@ -1,28 +1,28 @@
-<certificate name="CERT_TS_A_EA">
- <version>2</version>
- <signer type="digest" name="CERT_TEST_ROOT"/>
- <subject type="EA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!-- CAM -->
- <aid value="37"/> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<certificate name="CERT_TS_A_EA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="EA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_A_EC.xml
===================================================================
--- data/profiles/CERT_TS_A_EC.xml (revision 2397)
+++ data/profiles/CERT_TS_A_EC.xml (revision 2398)
@@ -1,28 +1,28 @@
-<certificate name="CERT_TS_A_EC">
- <version>2</version>
- <signer type="digest" name="CERT_TS_A_EA"/>
- <subject type="EC" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<certificate name="CERT_TS_A_EC">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_EA"/>
+ <subject type="EC" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_B_AA.xml
===================================================================
--- data/profiles/CERT_TS_B_AA.xml (revision 2397)
+++ data/profiles/CERT_TS_B_AA.xml (revision 2398)
@@ -1,32 +1,32 @@
-<!-- Authorization authority certificate without with a circular region restriction
- Center: ETSI coordinates
- Radius: 10 km
--->
-<certificate name="CERT_TS_B_AA">
- <version>2</version>
- <signer type="digest" name="CERT_TEST_ROOT"/>
- <subject type="AA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!-- CAM -->
- <aid value="37"/> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <circle latitude="0.0" longitude="0.0" radius="10000"/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- Authorization authority certificate without with a circular region restriction
+ Center: ETSI coordinates
+ Radius: 10 km
+-->
+<certificate name="CERT_TS_B_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <circle latitude="0.0" longitude="0.0" radius="10000"/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_B_AT.xml
===================================================================
--- data/profiles/CERT_TS_B_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_B_AT.xml (revision 2398)
@@ -1,28 +1,28 @@
-<certificate name="CERT_TS_B_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_A_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <circle latitude="0.0" longitude="0.0" radius="5000"/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<certificate name="CERT_TS_B_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <circle latitude="0.0" longitude="0.0" radius="5000"/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_C_AA.xml
===================================================================
--- data/profiles/CERT_TS_C_AA.xml (revision 2397)
+++ data/profiles/CERT_TS_C_AA.xml (revision 2398)
@@ -1,34 +1,34 @@
-<!-- Authorization authority certificate with a rectangular region restriction
- with a square centered at ETSI coordinates and having a side length of 20km
--->
-<certificate name="CERT_TS_C_AA">
- <version>2</version>
- <signer type="digest" name="CERT_TEST_ROOT"/>
- <subject type="AA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!-- CAM -->
- <aid value="37"/> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <rectangle>
- <location latitude="0.044949" longitude="-0.062157"/>
- <location latitude="-0.044983" longitude="0.062064"/>
- </rectangle>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- Authorization authority certificate with a rectangular region restriction
+ with a square centered at base point and having a side length of 20km
+-->
+<certificate name="CERT_TS_C_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <rectangle>
+ <location latitude="+10km" longitude="-10km"/>
+ <location latitude="-10km" longitude="+10km"/>
+ </rectangle>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_C_AT.xml
===================================================================
--- data/profiles/CERT_TS_C_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_C_AT.xml (revision 2398)
@@ -1,34 +1,34 @@
-<!-- Authorization ticket certificate with a rectangular region restriction
- centered in ETSI coordinates and having a side length of 10 km
--->
-<certificate name="CERT_TS_C_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_A_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <rectangle>
- <location latitude="0.044949" longitude="-0.062157"/>
- <location latitude="-0.044983" longitude="0.062064"/>
- </rectangle>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- Authorization ticket certificate with a rectangular region restriction
+ centered in ETSI coordinates and having a side length of 10 km
+-->
+<certificate name="CERT_TS_C_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <rectangle>
+ <location latitude="+5km" longitude="-5km"/>
+ <location latitude="-5km" longitude="+5km"/>
+ </rectangle>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_D_AA.xml
===================================================================
--- data/profiles/CERT_TS_D_AA.xml (revision 2397)
+++ data/profiles/CERT_TS_D_AA.xml (revision 2398)
@@ -1,36 +1,36 @@
-<!-- Authorization authority certificate with a polygonal region restriction
- representing a square centered at ETSI coordinates and having a side length of 10km
--->
-<certificate name="CERT_TS_D_AA">
- <version>2</version>
- <signer type="digest" name="CERT_TEST_ROOT"/>
- <subject type="AA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!-- CAM -->
- <aid value="37"/> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <polygon>
- <location latitude="0.089865" longitude="-0.124407"/>
- <location latitude="0.089865" longitude="0.124036"/>
- <location latitude="-0.089999" longitude="0.124036"/>
- <location latitude="-0.089999" longitude="-0.124407"/>
- </polygon>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- Authorization authority certificate with a polygonal region restriction
+ representing a square centered at ETSI coordinates and having a side length of 10km
+-->
+<certificate name="CERT_TS_D_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <polygon>
+ <location latitude="+10km" longitude="-10km"/>
+ <location latitude="+10km" longitude="+10km"/>
+ <location latitude="-10km" longitude="+10km"/>
+ <location latitude="-10km" longitude="-10km"/>
+ </polygon>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_D_AT.xml
===================================================================
--- data/profiles/CERT_TS_D_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_D_AT.xml (revision 2398)
@@ -1,36 +1,36 @@
-<!-- Authorization ticket certificate with a polygonal region restriction
- representing a square centered at ETSI coordinates and having a side length of 10km
--->
-<certificate name="CERT_TS_D_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_A_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <polygon>
- <location latitude="0.044949" longitude="-0.062157"/>
- <location latitude="0.044949" longitude="0.062064"/>
- <location latitude="-0.044983" longitude="0.062064"/>
- <location latitude="-0.044983" longitude="-0.062157"/>
- </polygon>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<!-- Authorization ticket certificate with a polygonal region restriction
+ representing a square centered at ETSI coordinates and having a side length of 10km
+-->
+<certificate name="CERT_TS_D_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <polygon>
+ <location latitude="+5km" longitude="-5km"/>
+ <location latitude="+5km" longitude="+5km"/>
+ <location latitude="-5km" longitude="+5km"/>
+ <location latitude="-5km" longitude="-5km"/>
+ </polygon>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_E0_AA.xml
===================================================================
--- data/profiles/CERT_TS_E0_AA.xml (revision 2397)
+++ data/profiles/CERT_TS_E0_AA.xml (revision 2398)
@@ -1,28 +1,28 @@
-<certificate name="CERT_TS_E0_AA">
- <version>2</version>
- <signer type="digest" name="CERT_TEST_ROOT"/>
- <subject type="AA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!-- CAM -->
- <aid value="37"/> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <id dictionary="un_stats" id="150" local="0"/> <!-- Europe -->
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<certificate name="CERT_TS_E0_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <id dictionary="un_stats" id="150" local="0"/> <!-- Europe -->
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_E1_AA.xml
===================================================================
--- data/profiles/CERT_TS_E1_AA.xml (revision 2397)
+++ data/profiles/CERT_TS_E1_AA.xml (revision 2398)
@@ -1,28 +1,28 @@
-<certificate name="CERT_TS_E1_AA">
- <version>2</version>
- <signer type="digest" name="CERT_TEST_ROOT"/>
- <subject type="AA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256" ref="CERT_TS.vkey">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!-- CAM -->
- <aid value="37"/> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <id dictionary="iso_3166_1" id="528" local="1"/> <!-- NL -->
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<certificate name="CERT_TS_E1_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256" ref="CERT_TS.vkey">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <id dictionary="iso_3166_1" id="528" local="1"/> <!-- NL -->
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_E_AA.xml
===================================================================
--- data/profiles/CERT_TS_E_AA.xml (revision 2397)
+++ data/profiles/CERT_TS_E_AA.xml (revision 2398)
@@ -1,28 +1,28 @@
-<certificate name="CERT_TS_E_AA">
- <version>2</version>
- <signer type="digest" name="CERT_TEST_ROOT"/>
- <subject type="AA" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="4" confidence="0"/>
- </attribute>
- <!-- its_aid_list -->
- <attribute type="its_aid_list">
- <aid value="36"/> <!-- CAM -->
- <aid value="37"/> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <id dictionary="iso_3166_1" id="528" local="0"/> <!-- NL -->
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<certificate name="CERT_TS_E_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <id dictionary="iso_3166_1" id="528" local="0"/> <!-- NL -->
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_E_AT.xml
===================================================================
--- data/profiles/CERT_TS_E_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_E_AT.xml (revision 2398)
@@ -1,28 +1,28 @@
-<certificate name="CERT_TS_E_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_A_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <id dictionary="iso_3166_1" id="528" local="0"/> <!-- NL -->
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<certificate name="CERT_TS_E_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <id dictionary="iso_3166_1" id="528" local="0"/> <!-- NL -->
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_F_AT.xml
===================================================================
--- data/profiles/CERT_TS_F_AT.xml (revision 2397)
+++ data/profiles/CERT_TS_F_AT.xml (revision 2398)
@@ -1,28 +1,28 @@
-<certificate name="CERT_TS_F_AT">
- <version>2</version>
- <signer type="digest" name="CERT_TS_A_AA"/>
- <subject type="AT" name="">
- <!-- verification_key -->
- <attribute type="verification_key">
- <public_key algorythm="ecdsa_nistp256_with_sha256">
- <ecc_point type="uncompressed"/>
- </public_key>
- </attribute>
- <!-- assurance_level -->
- <attribute type="assurance_level">
- <assurance level="3"/>
- </attribute>
- <!-- its_aid_ssp_list -->
- <attribute type="its_aid_ssp_list">
- <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
- <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
- </attribute>
- </subject>
- <validity>
- <restriction type="time" start="2015-01-01" end="2015-04-30"/>
- <restriction type="region">
- <none/>
- </restriction>
- </validity>
- <signature algorithm="0"/>
-</certificate>
+<certificate name="CERT_TS_F_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_MSG_06_01_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_MSG_06_01_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_MSG_06_01_BO_AT.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- AT certificate valid from this midnight to 1 year after the base time -->
+<certificate name="CERT_TS_MSG_06_01_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="today" end="+365d"/><!-- from this midnight to the normal period end -->
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_MSG_06_02_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_MSG_06_02_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_MSG_06_02_BO_AT.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- AT certificate valid from the base time to the next midnight -->
+<certificate name="CERT_TS_MSG_06_02_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="today+1d"/><!-- from the base time to the next midnight -->
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_MSG_13_01_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_MSG_13_01_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_MSG_13_01_BO_AT.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- Not yet started AT certificate -->
+<certificate name="CERT_TS_MSG_13_01_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+366d" end="+730d"/> <!-- not yet started certificate -->
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_MSG_13_02_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_MSG_13_02_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_MSG_13_02_BO_AT.xml (revision 2398)
@@ -0,0 +1,29 @@
+<!-- expired AT certificate -->
+<certificate name="CERT_TS_MSG_13_02_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_A_AA"/>
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="today-1d"/>
+ <restriction type="region">
+ <none/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_MSG_13_03_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_MSG_13_03_BO_AA.xml (nonexistent)
+++ data/profiles/CERT_TS_MSG_13_03_BO_AA.xml (revision 2398)
@@ -0,0 +1,32 @@
+<!-- Authorization authority certificate with a circular region restriction
+ Center: 10km to the west from base point
+ Radius: 20 km
+-->
+<certificate name="CERT_TS_MSG_13_03_BO_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <circle latitude="0.0" longitude="-10km" radius="20000"/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_MSG_13_03_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_MSG_13_03_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_MSG_13_03_BO_AT.xml (revision 2398)
@@ -0,0 +1,32 @@
+<!-- Authorization ticket certificate with a circular region restriction
+ Center: 10km to the west from base point
+ Radius: 5km
+-->
+<certificate name="CERT_TS_MSG_13_03_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_MSG_13_03_BO_AA"/> <!-- 10km to the west of base point, R=20km -->
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="-0d" end="+365d"/>
+ <restriction type="region">
+ <circle latitude="+0.0" longitude="-10km" radius="5000"/>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_MSG_13_04_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_MSG_13_04_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_MSG_13_04_BO_AT.xml (revision 2398)
@@ -0,0 +1,35 @@
+<!-- Authorization ticket certificate with a rect region restriction
+ Center: 10km to the west from base point
+ Side length: 10km
+-->
+<certificate name="CERT_TS_MSG_13_04_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_MSG_13_03_BO_AA"/> <!-- 10km to the west of base point, R=20km -->
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <rectangle>
+ <location latitude="+5km" longitude="-15km"/>
+ <location latitude="-5km" longitude="-5km"/>
+ </rectangle>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_MSG_13_05_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_MSG_13_05_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_MSG_13_05_BO_AT.xml (revision 2398)
@@ -0,0 +1,37 @@
+<!-- Authorization ticket certificate with a polygonal region restriction
+ Center: 10km to the west from base point
+ Side length: 10km
+-->
+<certificate name="CERT_TS_MSG_13_05_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_MSG_13_03_BO_AA"/> <!-- 10km to the west of base point, R=20km -->
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <polygon>
+ <location latitude="+5km" longitude="-15km"/>
+ <location latitude="+5km" longitude="-5km"/>
+ <location latitude="-5km" longitude="-5km"/>
+ <location latitude="-5km" longitude="-15km"/>
+ </polygon>
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_MSG_13_06_BO_AA.xml
===================================================================
--- data/profiles/CERT_TS_MSG_13_06_BO_AA.xml (nonexistent)
+++ data/profiles/CERT_TS_MSG_13_06_BO_AA.xml (revision 2398)
@@ -0,0 +1,31 @@
+<!-- Authorization authority certificate with a identified region restriction
+ Europe
+-->
+<certificate name="CERT_TS_MSG_13_06_BO_AA">
+ <version>2</version>
+ <signer type="digest" name="CERT_TEST_ROOT"/>
+ <subject type="AA" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="4" confidence="0"/>
+ </attribute>
+ <!-- its_aid_list -->
+ <attribute type="its_aid_list">
+ <aid value="36"/> <!-- CAM -->
+ <aid value="37"/> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <id dictionary="un_stats" id="150" local="0"/> <!-- Europe -->
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/CERT_TS_MSG_13_06_BO_AT.xml
===================================================================
--- data/profiles/CERT_TS_MSG_13_06_BO_AT.xml (nonexistent)
+++ data/profiles/CERT_TS_MSG_13_06_BO_AT.xml (revision 2398)
@@ -0,0 +1,32 @@
+<!-- Authorization ticket certificate with a polygonal region restriction
+ Center: 10km to the west from base point
+ Side length: 10km
+-->
+<certificate name="CERT_TS_MSG_13_06_BO_AT">
+ <version>2</version>
+ <signer type="digest" name="CERT_TS_MSG_13_06_BO_AA"/> <!-- Europe -->
+ <subject type="AT" name="">
+ <!-- verification_key -->
+ <attribute type="verification_key">
+ <public_key algorythm="ecdsa_nistp256_with_sha256">
+ <ecc_point type="uncompressed"/>
+ </public_key>
+ </attribute>
+ <!-- assurance_level -->
+ <attribute type="assurance_level">
+ <assurance level="3"/>
+ </attribute>
+ <!-- its_aid_ssp_list -->
+ <attribute type="its_aid_ssp_list">
+ <ssp aid="36">&#x01;&#xFF;&#xFF;</ssp> <!-- CAM -->
+ <ssp aid="37">&#x01;&#xFF;&#xFF;&#xFF;</ssp> <!-- DENM -->
+ </attribute>
+ </subject>
+ <validity>
+ <restriction type="time" start="+0d" end="+365d"/>
+ <restriction type="region">
+ <id dictionary="iso_3166_1" id="56" local="0"/> <!-- Belgium -->
+ </restriction>
+ </validity>
+ <signature algorithm="0"/>
+</certificate>
Index: data/profiles/Makefile
===================================================================
--- data/profiles/Makefile (revision 2397)
+++ data/profiles/Makefile (revision 2398)
@@ -1,4 +1,4 @@
-outdir=../certificates/plu
+outdir=../certificates
installdir=C:\Users\filatov\Documents\Dropbox\Yann\certificates\PLU
distzip=$(outdir)/plu_ts_certificates.zip
@@ -8,7 +8,7 @@
depdir=.deps
keydir=$(outdir)
-GENOPTS := -C plu.cfg
+GENOPTS := -C config.cfg
itscertgen="../itscertgen.exe"
profiles := $(wildcard CERT_*.xml)
@@ -73,6 +73,6 @@
@echo "Create $*.d"
@mkdir -p $(depdir)
@echo -n "$(outdir)/$*.crt: " > [email protected]
- @cat $< | grep '<signer.*digest' | sed -e 's|^.*name="\([^"]*\)".*|$(outdir)/\1.crt|g' >> [email protected]
+ @cat $< | grep '<signer' | sed -e 's|^.*name="\([^"]*\)".*|\1|g' -e 's|\(\w*\)|$(outdir)/\1.crt|g' >> [email protected]
include $(depends)
/trunk/data/profiles/config.cfg
0,0 → 1,15
reuse=yes
format=hex
 
# Use ETSI location as a reference one
# In a normal case the validity region of AT certificates is centered on this location
# AA certificate validity region can be shifted to the west depending of the test puprose.
reflocation=43.616916,7.053336
 
# Reference time (BT) considered as a begining of the validation period of the AT certificate
# Valid AT certificates will expires after 365 days after this date
# VAlidation period of other certificates is also based on this date:
# start time end time
# Root certificate: BT - 1 year BT + 2 years
# Valid AA certificates: BT BT + 1 year
reftime=2016-01-01
/trunk/data
Property changes:
Deleted: svn:mergeinfo
## -0,3 +0,0 ##
Reverse-merged /branches/STF507/data:r2249-2254
Reverse-merged /branches/STF462/data:r1124-1422
Reverse-merged /branches/STF484_VALIDATION/data:r1925-2226
Index: javasrc/adapter/org/etsi/adapter/GnssSupportFactory.java
===================================================================
--- javasrc/adapter/org/etsi/adapter/GnssSupportFactory.java (nonexistent)
+++ javasrc/adapter/org/etsi/adapter/GnssSupportFactory.java (revision 2398)
@@ -0,0 +1,42 @@
+/**
+ * Factory for GNSS Support implementations.
+ * Implementations have to register to this factory.
+ *
+ */
+package org.etsi.adapter;
+
+/**
+ * Factory for Test Execution Required implementations.
+ * Implementations have to register to this factory.
+ */
+public class GnssSupportFactory {
+
+ /**
+ * Registered IGnssSupport implementation
+ */
+ private static IGnssSupport instance;
+
+ /**
+ * Gets the registered IGnssSupport implementation
+ * @return Instance of IGnssSupport implementation registered through setImpl() or null
+ * @see setImpl
+ */
+ public static IGnssSupport getInstance() {
+ return instance;
+ }
+
+ /**
+ * Private constructor (Singleton pattern)
+ */
+ private GnssSupportFactory() {
+ //empty
+ }
+
+ /**
+ * Sets the implementation instance to be returned by the factory
+ * @param impl Instance of the implementation to be registered
+ */
+ public static void setImpl(IGnssSupport impl) {
+ instance = impl;
+ }
+}
/javasrc/adapter/org/etsi/adapter/GnssSupportFactory.java
Property changes:
Added: svn:eol-style
## -0,0 +1 ##
+native
\ No newline at end of property
Added: svn:keywords
## -0,0 +1 ##
+URL Id
\ No newline at end of property
Added: svn:mime-type
## -0,0 +1 ##
+text/plain
\ No newline at end of property
Index: javasrc/adapter/org/etsi/adapter/IGnssSupport.java
===================================================================
--- javasrc/adapter/org/etsi/adapter/IGnssSupport.java (nonexistent)
+++ javasrc/adapter/org/etsi/adapter/IGnssSupport.java (revision 2398)
@@ -0,0 +1,101 @@
+/*
+ * ----------------------------------------------------------------------------
+ * (C) Copyright Testing Technologies, 2001-2015. All Rights Reserved.
+ *
+ * All copies of this program, whether in whole or in part, and whether
+ * modified or not, must display this and all other embedded copyright
+ * and ownership notices in full.
+ *
+ * See the file COPYRIGHT for details of redistribution and use.
+ *
+ * You should have received a copy of the COPYRIGHT file along with
+ * this file; if not, write to the Testing Technologies,
+ * Michaelkirchstr. 17/18, 10179 Berlin, Germany.
+ *
+ * TESTING TECHNOLOGIES DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS
+ * SOFTWARE. IN NO EVENT SHALL TESTING TECHNOLOGIES BE LIABLE FOR ANY
+ * SPECIAL, DIRECT, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
+ * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
+ * AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION,
+ * ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF
+ * THIS SOFTWARE.
+ *
+ * THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND,
+ * EITHER EXPRESSED OR IMPLIED, INCLUDING ANY KIND OF IMPLIED OR
+ * EXPRESSED WARRANTY OF NON-INFRINGEMENT OR THE IMPLIED WARRANTIES
+ * OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+ *
+ * ----------------------------------------------------------------------------- */
+/**
+ * GNSS support interface to be implemented by TE providers.
+ */
+package org.etsi.adapter;
+
+import java.math.BigInteger;
+
+import org.etsi.its.adapter.ports.AdapterPort;
+import org.etsi.ttcn.tri.TriStatus;
+
+/**
+ * Test Execution Required interface to be implemented by TE providers.
+ */
+public interface IGnssSupport {
+
+ /**
+ * Initialize the GNSS support.
+ * @return TRI_OK in case of success, false otherwise
+ */
+ public TriStatus init();
+
+ /**
+ * Loads a scenario
+ * @param id of predefined scenario
+ * @return TRUE on success, FALSE otherwise
+ */
+ public boolean loadScenario(int p_id);
+
+ /**
+ * Starts a loaded scenario
+ * @return TRUE on success, FALSE otherwise
+ */
+ public boolean startScenario();
+
+ /**
+ * Stops a started scenario
+ * @return TRUE on success, FALSE otherwise
+ */
+ public boolean stopScenario();
+
+ /**
+ * Signals when the requested distance was covered
+ * @param distance The requested distance in m.
+ * @return TRUE on success, FALSE otherwise
+ */
+ public boolean awaitDistanceToCover(AdapterPort notifier, double distance);
+
+ /**
+ * Changes dynamically the speed in the running scenario
+ * @param The new speed value.
+ * @return TRUE on success, FALSE otherwise
+ */
+ public boolean changeSpeed(double speed);
+
+ /**
+ * Changes dynamically the heading in the running scenario
+ * @param heading The new heading value.
+ * @return TRUE on success, FALSE otherwise
+ */
+ public boolean changeHeading(double heading);
+
+ /**
+ * Gets the current GPS time
+ * @return the time
+ */
+ public BigInteger getGpsTime();
+
+ /**
+ * Dispose object
+ */
+ public void dispose();
+
+}
/javasrc/adapter/org/etsi/adapter/IGnssSupport.java
Property changes:
Added: svn:eol-style
## -0,0 +1 ##
+native
\ No newline at end of property
Added: svn:keywords
## -0,0 +1 ##
+URL Id
\ No newline at end of property
Added: svn:mime-type
## -0,0 +1 ##
+text/plain
\ No newline at end of property
Index: javasrc/adapter/org/etsi/its/adapter/LEDataInputStream.java
===================================================================
--- javasrc/adapter/org/etsi/its/adapter/LEDataInputStream.java (nonexistent)
+++ javasrc/adapter/org/etsi/its/adapter/LEDataInputStream.java (revision 2398)
@@ -0,0 +1,330 @@
+/*
+ * @(#)LEDataInputStream.java
+ *
+ * Summary: Little-Endian version of DataInputStream.
+ *
+ * Copyright: (c) 1998-2010 Roedy Green, Canadian Mind Products, http://mindprod.com
+ *
+ * Licence: This software may be copied and used freely for any purpose but military.
+ * http://mindprod.com/contact/nonmil.html
+ *
+ * Requires: JDK 1.1+
+ *
+ * Created with: IntelliJ IDEA IDE.
+ *
+ * Version History:
+ * 1.8 2007-05-24
+ */
+package org.etsi.its.adapter;
+
+import java.io.DataInput;
+import java.io.DataInputStream;
+import java.io.IOException;
+import java.io.InputStream;
+
+/**
+ * Little-Endian version of DataInputStream.
+ * <p/>
+ * Very similar to DataInputStream except it reads little-endian instead of
+ * big-endian binary data. We can't extend DataInputStream directly since it has
+ * only final methods, though DataInputStream itself is not final. This forces
+ * us implement LEDataInputStream with a DataInputStream object, and use wrapper
+ * methods.
+ *
+ * @author Roedy Green, Canadian Mind Products
+ * @version 1.8 2007-05-24
+ * @since 1998
+ */
+public final class LEDataInputStream implements DataInput {
+ // ------------------------------ CONSTANTS ------------------------------
+
+ /**
+ * undisplayed copyright notice.
+ *
+ * @noinspection UnusedDeclaration
+ */
+ private static final String EMBEDDED_COPYRIGHT = "copyright (c) 1999-2010 Roedy Green, Canadian Mind Products, http://mindprod.com";
+
+ // ------------------------------ FIELDS ------------------------------
+
+ /**
+ * to get at the big-Endian methods of a basic DataInputStream
+ *
+ * @noinspection WeakerAccess
+ */
+ protected final DataInputStream dis;
+
+ /**
+ * to get at the a basic readBytes method.
+ *
+ * @noinspection WeakerAccess
+ */
+ protected final InputStream is;
+
+ /**
+ * work array for buffering input.
+ *
+ * @noinspection WeakerAccess
+ */
+ protected final byte[] work;
+
+ // -------------------------- PUBLIC STATIC METHODS
+ // --------------------------
+
+ /**
+ * Note. This is a STATIC method!
+ *
+ * @param in
+ * stream to read UTF chars from (endian irrelevant)
+ *
+ * @return string from stream
+ * @throws IOException
+ * if read fails.
+ */
+ public static String readUTF(DataInput in) throws IOException {
+ return DataInputStream.readUTF(in);
+ }
+
+ // -------------------------- PUBLIC INSTANCE METHODS
+ // --------------------------
+
+ /**
+ * constructor.
+ *
+ * @param in
+ * binary inputstream of little-endian data.
+ */
+ public LEDataInputStream(InputStream in) {
+ this.is = in;
+ this.dis = new DataInputStream(in);
+ work = new byte[8];
+ }
+
+ /**
+ * close.
+ *
+ * @throws IOException
+ * if close fails.
+ */
+ public final void close() throws IOException {
+ dis.close();
+ }
+
+ /**
+ * Read bytes. Watch out, read may return fewer bytes than requested.
+ *
+ * @param ba
+ * where the bytes go.
+ * @param off
+ * offset in buffer, not offset in file.
+ * @param len
+ * count of bytes to read.
+ *
+ * @return how many bytes read.
+ * @throws IOException
+ * if read fails.
+ */
+ public final int read(byte ba[], int off, int len) throws IOException {
+ // For efficiency, we avoid one layer of wrapper
+ return is.read(ba, off, len);
+ }
+
+ /**
+ * read only a one-byte boolean.
+ *
+ * @return true or false.
+ * @throws IOException
+ * if read fails.
+ * @see java.io.DataInput#readBoolean()
+ */
+ @Override
+ public final boolean readBoolean() throws IOException {
+ return dis.readBoolean();
+ }
+
+ /**
+ * read byte.
+ *
+ * @return the byte read.
+ * @throws IOException
+ * if read fails.
+ * @see java.io.DataInput#readByte()
+ */
+ @Override
+ public final byte readByte() throws IOException {
+ return dis.readByte();
+ }
+
+ /**
+ * Read on char. like DataInputStream.readChar except little endian.
+ *
+ * @return little endian 16-bit unicode char from the stream.
+ * @throws IOException
+ * if read fails.
+ */
+ @Override
+ public final char readChar() throws IOException {
+ dis.readFully(work, 0, 2);
+ return (char) ((work[1] & 0xff) << 8 | (work[0] & 0xff));
+ }
+
+ /**
+ * Read a double. like DataInputStream.readDouble except little endian.
+ *
+ * @return little endian IEEE double from the datastream.
+ * @throws IOException
+ */
+ @Override
+ public final double readDouble() throws IOException {
+ return Double.longBitsToDouble(readLong());
+ }
+
+ /**
+ * Read one float. Like DataInputStream.readFloat except little endian.
+ *
+ * @return little endian IEEE float from the datastream.
+ * @throws IOException
+ * if read fails.
+ */
+ @Override
+ public final float readFloat() throws IOException {
+ return Float.intBitsToFloat(readInt());
+ }
+
+ /**
+ * Read bytes until the array is filled.
+ *
+ * @see java.io.DataInput#readFully(byte[])
+ */
+ @Override
+ public final void readFully(byte ba[]) throws IOException {
+ dis.readFully(ba, 0, ba.length);
+ }
+
+ /**
+ * Read bytes until the count is satisfied.
+ *
+ * @throws IOException
+ * if read fails.
+ * @see java.io.DataInput#readFully(byte[],int,int)
+ */
+ @Override
+ public final void readFully(byte ba[], int off, int len) throws IOException {
+ dis.readFully(ba, off, len);
+ }
+
+ /**
+ * Read an int, 32-bits. Like DataInputStream.readInt except little endian.
+ *
+ * @return little-endian binary int from the datastream
+ * @throws IOException
+ * if read fails.
+ */
+ @Override
+ public final int readInt() throws IOException {
+ dis.readFully(work, 0, 4);
+ return (work[3]) << 24 | (work[2] & 0xff) << 16 | (work[1] & 0xff) << 8
+ | (work[0] & 0xff);
+ }
+
+ /**
+ * Read a line.
+ *
+ * @return a rough approximation of the 8-bit stream as a 16-bit unicode
+ * string
+ * @throws IOException
+ * @noinspection deprecation
+ * @deprecated This method does not properly convert bytes to characters.
+ * Use a Reader instead with a little-endian encoding.
+ */
+ @Deprecated
+ @Override
+ public final String readLine() throws IOException {
+ return dis.readLine();
+ }
+
+ /**
+ * read a long, 64-bits. Like DataInputStream.readLong except little endian.
+ *
+ * @return little-endian binary long from the datastream.
+ * @throws IOException
+ */
+ @Override
+ public final long readLong() throws IOException {
+ dis.readFully(work, 0, 8);
+ return (long) (work[7]) << 56 |
+ /* long cast needed or shift done modulo 32 */
+ (long) (work[6] & 0xff) << 48 | (long) (work[5] & 0xff) << 40
+ | (long) (work[4] & 0xff) << 32 | (long) (work[3] & 0xff) << 24
+ | (long) (work[2] & 0xff) << 16 | (long) (work[1] & 0xff) << 8
+ | work[0] & 0xff;
+ }
+
+ /**
+ * Read short, 16-bits. Like DataInputStream.readShort except little endian.
+ *
+ * @return little endian binary short from stream.
+ * @throws IOException
+ * if read fails.
+ */
+ @Override
+ public final short readShort() throws IOException {
+ dis.readFully(work, 0, 2);
+ return (short) ((work[1] & 0xff) << 8 | (work[0] & 0xff));
+ }
+
+ /**
+ * Read UTF counted string.
+ *
+ * @return String read.
+ */
+ @Override
+ public final String readUTF() throws IOException {
+ return dis.readUTF();
+ }
+
+ /**
+ * Read an unsigned byte. Note: returns an int, even though says Byte
+ * (non-Javadoc)
+ *
+ * @throws IOException
+ * if read fails.
+ * @see java.io.DataInput#readUnsignedByte()
+ */
+ @Override
+ public final int readUnsignedByte() throws IOException {
+ return dis.readUnsignedByte();
+ }
+
+ /**
+ * Read an unsigned short, 16 bits. Like DataInputStream.readUnsignedShort
+ * except little endian. Note, returns int even though it reads a short.
+ *
+ * @return little-endian int from the stream.
+ * @throws IOException
+ * if read fails.
+ */
+ @Override
+ public final int readUnsignedShort() throws IOException {
+ dis.readFully(work, 0, 2);
+ return ((work[1] & 0xff) << 8 | (work[0] & 0xff));
+ }
+
+ /**
+ * Skip over bytes in the stream. See the general contract of the
+ * <code>skipBytes</code> method of <code>DataInput</code>.
+ * <p/>
+ * Bytes for this operation are read from the contained input stream.
+ *
+ * @param n
+ * the number of bytes to be skipped.
+ *
+ * @return the actual number of bytes skipped.
+ * @throws IOException
+ * if an I/O error occurs.
+ */
+ @Override
+ public final int skipBytes(int n) throws IOException {
+ return dis.skipBytes(n);
+ }
+}
\ No newline at end of file
/javasrc/adapter/org/etsi/its/adapter/LEDataInputStream.java
Property changes:
Added: svn:eol-style
## -0,0 +1 ##
+native
\ No newline at end of property
Added: svn:keywords
## -0,0 +1 ##
+URL Id
\ No newline at end of property
Added: svn:mime-type
## -0,0 +1 ##
+text/plain
\ No newline at end of property
Index: javasrc/adapter/org/etsi/its/adapter/PcapMultiplexer.java
===================================================================
--- javasrc/adapter/org/etsi/its/adapter/PcapMultiplexer.java (revision 2397)
+++ javasrc/adapter/org/etsi/its/adapter/PcapMultiplexer.java (revision 2398)
@@ -72,7 +72,7 @@
}
device = alldevs.get(ifaceIndex);
-// System.out.println("Listening: " + device.getName());
+ System.out.println("Listening: " + device.getName());
}
/**
@@ -84,7 +84,7 @@
}
public synchronized void register(Layer client, byte[] macAddress, short frameType) {
-// System.out.println(">>>PcapMultiplexer.registering: " + frameType);
+ System.out.println(">>>PcapMultiplexer.registering: " + frameType);
if(clientsToMacs.isEmpty()) {
// Open interface
@@ -103,7 +103,7 @@
filter = "";
}
else {
-// System.out.println("Another Client !");
+ System.out.println("Another Client !");
filter = filter + " and ";
}
@@ -114,7 +114,7 @@
}
filter = filter + "not ether src " + strMacAddress;
-// System.out.println("New filter: " + filter);
+ System.out.println("New filter: " + filter);
// Apply filter
PcapBpfProgram bpfFilter = new PcapBpfProgram();
@@ -122,7 +122,7 @@
int netmask = 0;
int r = pcap.compile(bpfFilter, filter, optimize, netmask);
if (r != Pcap.OK) {
-// System.out.println("Filter error: " + pcap.getErr());
+ System.out.println("Filter error: " + pcap.getErr());
}
pcap.setFilter(bpfFilter);
/trunk/javasrc/adapter/org/etsi/its/adapter/SecurityHelper.java
87,7 → 87,7
}
public byte[] checkSecuredProfileAndExtractPayload(final byte[] p_message, final int p_offset, final boolean p_enforceSecurityCheck, final int p_itsAidOther) {
// System.out.println(">>> SecurityHelper.checkSecuredProfileAndExtractPayload: " + ByteHelper.byteArrayToString(p_message));
System.out.println(">>> SecurityHelper.checkSecuredProfileAndExtractPayload: " + ByteHelper.byteArrayToString(p_message));
ByteArrayInputStream decvalue = new ByteArrayInputStream(p_message, p_offset, p_message.length - p_offset);
101,7 → 101,7
}
// Extract header fields length and header fields
long headerFieldsLength = tls2size(decvalue);
// System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: headerFieldsLength:" + headerFieldsLength);
System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: headerFieldsLength:" + headerFieldsLength);
byte[] headerFields = new byte[(int) headerFieldsLength];
decvalue.read(headerFields, 0, (int) headerFieldsLength);
ByteArrayOutputStream certificateKeys = new ByteArrayOutputStream();
112,12 → 112,19
return null;
}
}
byte[] aaSigningPublicKeyX, aaSigningPublicKeyY;
aaSigningPublicKeyX = ByteHelper.extract(certificateKeys.toByteArray(), 0, 32);
// System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: aaSigningPublicKeyX:" + ByteHelper.byteArrayToString(aaSigningPublicKeyX));
aaSigningPublicKeyY = ByteHelper.extract(certificateKeys.toByteArray(), 32, 32);
// System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: aaSigningPublicKeyX:" + ByteHelper.byteArrayToString(aaSigningPublicKeyX));
// System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: headerFields:" + ByteHelper.byteArrayToString(headerFields));
byte[] aaSigningPublicKeyX = null, aaSigningPublicKeyY = null;
byte[] keys = certificateKeys.toByteArray();
if ((keys[0] == 0x02) || (keys[0] == 0x03)) { // Key length = 32 bytes
aaSigningPublicKeyX = ByteHelper.extract(keys, 1, 32);
System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: aaSigningPublicKeyX:" + ByteHelper.byteArrayToString(aaSigningPublicKeyX));
} else { // Key length = 64 bytes
aaSigningPublicKeyX = ByteHelper.extract(keys, 1, 32);
System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: aaSigningPublicKeyX:" + ByteHelper.byteArrayToString(aaSigningPublicKeyX));
aaSigningPublicKeyY = ByteHelper.extract(keys, 33, 32);
System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: aaSigningPublicKeyX:" + ByteHelper.byteArrayToString(aaSigningPublicKeyX));
}
// FIXME Add encryption support
System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: headerFields:" + ByteHelper.byteArrayToString(headerFields));
// Extract payload, decvalue is updated with the payload
if (decvalue.read() != 1) {
System.err.println("SecurityHelper.checkSecuredProfileAndExtractPayload: Drop packet - Wrong Payload type");
127,10 → 134,10
}
}
long payloadLength = tls2size(decvalue);
// System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: payloadLength:" + payloadLength);
System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: payloadLength:" + payloadLength);
byte[] payload = new byte[(int) payloadLength];
decvalue.read(payload, 0, (int) payloadLength);
// System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: payload:" + ByteHelper.byteArrayToString(payload));
System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: payload:" + ByteHelper.byteArrayToString(payload));
if (p_enforceSecurityCheck) { // Extract Secure Trailer
long secureTrailerLength = tls2size(decvalue);
byte[] secureTrailer = new byte[(int) secureTrailerLength];
141,7 → 148,7
System.err.println("SecurityHelper.checkSecuredProfileAndExtractPayload: Drop packet - Wrong Signatures");
return null;
}
// // System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: signature:" + ByteHelper.byteArrayToString(signature.toByteArray()));
System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: signature:" + ByteHelper.byteArrayToString(signature.toByteArray()));
// Build signed data
byte[] toBeVerifiedData = ByteHelper.extract(
p_message,
148,25 → 155,28
p_offset,
p_message.length - (int)(p_offset + secureTrailerLength - 1 /* Exclude signature structure but keep signature type and signature length */)
);
// // System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload:" + ByteHelper.byteArrayToString(toBeVerifiedData));
// Calculate Digest digest from the buffer toBeVerifiedData
byte[] hash = CryptoLib.hashWithSha256(toBeVerifiedData);
System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload:" + ByteHelper.byteArrayToString(toBeVerifiedData));
boolean result;
try {
if (aaSigningPublicKeyY == null) {
// FIXME FSCOM: Check how t verify compressed signature
return payload;
}
result = CryptoLib.verifyWithEcdsaNistp256WithSha256(
hash,
toBeVerifiedData,
signature.toByteArray(),
aaSigningPublicKeyX,
aaSigningPublicKeyY
);
// // System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: Verify signature: " + new Boolean(result));
System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: Verify signature: " + new Boolean(result));
if (!result) {
// Drop packet
// System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: toBeVerifiedData :" + ByteHelper.byteArrayToString(toBeVerifiedData));
// System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: Hash :" + ByteHelper.byteArrayToString(hash));
// System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: signature :" + ByteHelper.byteArrayToString(signature.toByteArray()));
// System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: aaSigningPublicKeyX:" + ByteHelper.byteArrayToString(aaSigningPublicKeyX));
// System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: aaSigningPublicKeyY:" + ByteHelper.byteArrayToString(aaSigningPublicKeyY));
System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: toBeVerifiedData :" + ByteHelper.byteArrayToString(toBeVerifiedData));
// Calculate Digest digest from the buffer toBeVerifiedData
System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: Hash :" + ByteHelper.byteArrayToString(CryptoLib.hashWithSha256(toBeVerifiedData)));
System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: signature :" + ByteHelper.byteArrayToString(signature.toByteArray()));
System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: aaSigningPublicKeyX:" + ByteHelper.byteArrayToString(aaSigningPublicKeyX));
System.out.println("SecurityHelper.checkSecuredProfileAndExtractPayload: aaSigningPublicKeyY:" + ByteHelper.byteArrayToString(aaSigningPublicKeyY));
System.err.println("SecurityHelper.checkSecuredProfileAndExtractPayload: Drop packet - Invalid signature");
return null;
}
185,7 → 195,7
}
public boolean checkHeaderfields(final byte[] p_headerfields, final ByteArrayOutputStream p_keys, final boolean p_enforceSecurityCheck, final int p_itsAidOther) {
// System.out.println(">>> SecurityHelper.checkHeaderfields: " + ByteHelper.byteArrayToString(p_headerfields));
System.out.println(">>> SecurityHelper.checkHeaderfields: " + ByteHelper.byteArrayToString(p_headerfields));
// Sanity check
if (p_headerfields.length == 0) {
212,7 → 222,7
if (p_headerfields[signerInfoTypeIndex] == 0x02) { // SignerInfo Type: Certificate (2)
signerInfoTypeIndex += 1;
// Extract certificate because of it is an Other message profile
byte[] certificate = decodeCertificate(p_headerfields, signerInfoTypeIndex, p_keys);
byte[] certificate = decodeCertificate(p_headerfields, signerInfoTypeIndex, p_keys, p_enforceSecurityCheck);
if (certificate == null) {
System.err.println("SecurityHelper.checkHeaderfields: Drop packet - Certificate not decoded");
if (p_enforceSecurityCheck) {
220,11 → 230,11
return false;
}
}
// System.out.println("SecurityHelper.checkHeaderfields: Certificate=" + ByteHelper.byteArrayToString(certificate));
System.out.println("SecurityHelper.checkHeaderfields: Certificate=" + ByteHelper.byteArrayToString(certificate));
// Add it in our map
Long lKey = ByteHelper.byteArrayToLong(calculateDigestFromCertificate(certificate));
if (!_neighborsCertificates.containsKey(lKey)) {
// System.out.println("SecurityHelper.checkHeaderfields: Add keys for " + ByteHelper.byteArrayToString(calculateDigestFromCertificate(certificate)) + " / " + lKey);
System.out.println("SecurityHelper.checkHeaderfields: Add keys for " + ByteHelper.byteArrayToString(calculateDigestFromCertificate(certificate)) + " / " + lKey);
_neighborsCertificates.put(lKey, p_keys);
}
signerInfoTypeIndex += certificate.length;
233,7 → 243,7
byte[] hashedid8 = ByteHelper.extract(p_headerfields, signerInfoTypeIndex, Long.SIZE / Byte.SIZE);
signerInfoTypeIndex += (Long.SIZE / Byte.SIZE);
Long lKey = ByteHelper.byteArrayToLong(hashedid8);
// System.out.println("SecurityHelper.checkHeaderfields: Certificate digest with SHA256=" + lKey + "/ " + ByteHelper.byteArrayToString(hashedid8));
System.out.println("SecurityHelper.checkHeaderfields: Certificate digest with SHA256=" + lKey + "/ " + ByteHelper.byteArrayToString(hashedid8));
if (!_neighborsCertificates.containsKey(lKey) || (_neighborsCertificates.get(lKey) == null)) {
System.err.println("SecurityHelper.checkHeaderfields: Drop packet - Unknown HahedId8");
if (p_enforceSecurityCheck) {
255,30 → 265,31
signerInfoTypeIndex += 1;
ByteArrayInputStream ba = new ByteArrayInputStream(ByteHelper.extract(p_headerfields, signerInfoTypeIndex, p_headerfields.length - signerInfoTypeIndex));
int certChainLength = (int) this.tls2size(ba);
// System.out.println("SecurityHelper.checkHeaderfields: Certchain length = " + certChainLength);
System.out.println("SecurityHelper.checkHeaderfields: Certchain length = " + certChainLength);
signerInfoTypeIndex += this.size2tls(certChainLength).length;
ByteArrayOutputStream keys;
do {
// Extract certificate because of it is an Other message profile
keys = new ByteArrayOutputStream();
byte[] certificate = decodeCertificate(p_headerfields, signerInfoTypeIndex, keys);
byte[] certificate = decodeCertificate(p_headerfields, signerInfoTypeIndex, keys, p_enforceSecurityCheck);
if (certificate == null) {
// Drop it
System.err.println("SecurityHelper.checkHeaderfields: Drop packet - Failed to decode chain of certificate");
return false;
}
// System.out.println("SecurityHelper.checkHeaderfields: Certificate=" + ByteHelper.byteArrayToString(certificate));
System.out.println("SecurityHelper.checkHeaderfields: Certificate=" + ByteHelper.byteArrayToString(certificate));
// Add it in our map
Long lKey = ByteHelper.byteArrayToLong(calculateDigestFromCertificate(certificate));
if (!_neighborsCertificates.containsKey(lKey)) {
// System.out.println("SecurityHelper.checkHeaderfields: Add keys for " + ByteHelper.byteArrayToString(calculateDigestFromCertificate(certificate)) + " / " + lKey);
System.out.println("SecurityHelper.checkHeaderfields: Add keys for " + ByteHelper.byteArrayToString(calculateDigestFromCertificate(certificate)) + " / " + lKey);
_neighborsCertificates.put(lKey, p_keys);
}
certChainLength -= certificate.length;
signerInfoTypeIndex += certificate.length;
// System.out.println("SecurityHelper.checkHeaderfields: Extracted certificate = " + ByteHelper.byteArrayToString(certificate));
System.out.println("SecurityHelper.checkHeaderfields: Extracted certificate = " + ByteHelper.byteArrayToString(certificate));
} while (certChainLength > 0);
}
// Check generation time
if (p_headerfields[signerInfoTypeIndex++] != 0x00) { // Header Field: Generation Time (0)
if (p_enforceSecurityCheck) {
// Drop it
286,9 → 297,8
return false;
}
}
// Check generation time
long generationTime = ByteHelper.byteArrayToLong(ByteHelper.extract(p_headerfields, signerInfoTypeIndex, Long.SIZE / Byte.SIZE));
// System.out.println("SecurityHelper.checkHeaderfields: generationTime=" + ByteHelper.byteArrayToString(ByteHelper.extract(p_headerfields, signerInfoTypeIndex, Long.SIZE / Byte.SIZE)));
System.out.println("SecurityHelper.checkHeaderfields: generationTime=" + generationTime);
if (Math.abs(System.currentTimeMillis() - generationTime) < 1000) {
System.err.println("SecurityHelper.checkHeaderfields: Drop packet - GenerationTime out of range");
if (p_enforceSecurityCheck) {
297,23 → 307,24
}
}
signerInfoTypeIndex += (Long.SIZE / Byte.SIZE);
if (signerInfoTypeIndex < p_headerfields.length) {
// System.out.println("SecurityHelper.checkHeaderfields: dump #1=" + ByteHelper.byteArrayToString(ByteHelper.extract(p_headerfields, signerInfoTypeIndex, p_headerfields.length - signerInfoTypeIndex)));
System.out.println("SecurityHelper.checkHeaderfields: dump #1=" + ByteHelper.byteArrayToString(ByteHelper.extract(p_headerfields, signerInfoTypeIndex, p_headerfields.length - signerInfoTypeIndex)));
if (p_headerfields[signerInfoTypeIndex] == 0x03) { // Header Field: Generation Location (3)
signerInfoTypeIndex += 1;
byte[] lat = ByteHelper.extract(p_headerfields, signerInfoTypeIndex, 4);
signerInfoTypeIndex += 4;
// System.out.println("SecurityHelper.checkHeaderfields: latitude=" + ByteHelper.byteArrayToString(lat));
System.out.println("SecurityHelper.checkHeaderfields: latitude=" + ByteHelper.byteArrayToString(lat));
byte[] lon = ByteHelper.extract(p_headerfields, signerInfoTypeIndex, 4);
signerInfoTypeIndex += 4;
// System.out.println("SecurityHelper.checkHeaderfields: longitude=" + ByteHelper.byteArrayToString(lon));
System.out.println("SecurityHelper.checkHeaderfields: longitude=" + ByteHelper.byteArrayToString(lon));
byte[] ele = ByteHelper.extract(p_headerfields, signerInfoTypeIndex, 2);
signerInfoTypeIndex += 2;
// System.out.println("SecurityHelper.checkHeaderfields: elevation=" + ByteHelper.byteArrayToString(ele));
System.out.println("SecurityHelper.checkHeaderfields: elevation=" + ByteHelper.byteArrayToString(ele));
}
}
if (signerInfoTypeIndex < p_headerfields.length) {
// System.out.println("SecurityHelper.checkHeaderfields: dump #2=" + ByteHelper.byteArrayToString(ByteHelper.extract(p_headerfields, signerInfoTypeIndex, p_headerfields.length - signerInfoTypeIndex)));
System.out.println("SecurityHelper.checkHeaderfields: dump #2=" + ByteHelper.byteArrayToString(ByteHelper.extract(p_headerfields, signerInfoTypeIndex, p_headerfields.length - signerInfoTypeIndex)));
if (p_headerfields[signerInfoTypeIndex] == 0x05) { // Header Field: Its AID (5)
signerInfoTypeIndex += 1;
// Check ItsAid
329,7 → 340,7
return false;
}
}
// System.out.println("SecurityHelper.checkHeaderfields: ItsAid=" + p_headerfields[signerInfoTypeIndex]);
System.out.println("SecurityHelper.checkHeaderfields: ItsAid=" + p_headerfields[signerInfoTypeIndex]);
signerInfoTypeIndex += 1;
} else {
// FIXME to be continued
338,17 → 349,17
}
if (signerInfoTypeIndex < p_headerfields.length) {
// TODO check other fields
// System.out.println("SecurityHelper.checkHeaderfields: dump #3=" + ByteHelper.byteArrayToString(ByteHelper.extract(p_headerfields, signerInfoTypeIndex, p_headerfields.length - signerInfoTypeIndex)));
System.out.println("SecurityHelper.checkHeaderfields: dump #3=" + ByteHelper.byteArrayToString(ByteHelper.extract(p_headerfields, signerInfoTypeIndex, p_headerfields.length - signerInfoTypeIndex)));
}
return true;
}
public byte[] decodeCertificate(final byte[] p_headerfields, final int p_offset, final ByteArrayOutputStream p_keys) {
// System.out.println(">>> SecurityHelper.decodeCertificate: " + ByteHelper.byteArrayToString(ByteHelper.extract(p_headerfields, p_offset, p_headerfields.length - p_offset)));
public byte[] decodeCertificate(final byte[] p_headerfields, final int p_offset, final ByteArrayOutputStream p_keys, final boolean p_enforceSecurityCheck) {
System.out.println(">>> SecurityHelper.decodeCertificate: " + ByteHelper.byteArrayToString(ByteHelper.extract(p_headerfields, p_offset, p_headerfields.length - p_offset)));
ByteArrayInputStream headerfields = new ByteArrayInputStream(p_headerfields, p_offset, p_headerfields.length - p_offset);
// System.out.println("SecurityHelper.decodeCertificate: headerfields length=" + headerfields.available());
System.out.println("SecurityHelper.decodeCertificate: headerfields length=" + headerfields.available());
ByteArrayOutputStream cert = new ByteArrayOutputStream(); // FIXME To be removed
try {
// Version
355,7 → 366,10
cert.write((byte)headerfields.read());
if (cert.toByteArray()[0] != 0x02) {
System.err.println("SecurityHelper.decodeCertificate: Wrong version number");
return null;
if (p_enforceSecurityCheck) {
// Drop it
return null;
} // else continue
}
// SignerInfo type
byte signerInfoType = (byte)headerfields.read();
364,7 → 378,7
case 0x01:
byte[] digest = new byte[8];
headerfields.read(digest, 0, digest.length);
// System.out.println("SecurityHelper.decodeCertificate: hashedid8=" + ByteHelper.byteArrayToString(digest));
System.out.println("SecurityHelper.decodeCertificate: hashedid8=" + ByteHelper.byteArrayToString(digest));
cert.write(digest);
break;
// FIXME To be continued
385,7 → 399,7
byte[] subjectInfo = new byte[(int) length];
headerfields.read(subjectInfo, 0, subjectInfo.length);
cert.write(subjectInfo);
// System.out.println("SecurityHelper.decodeCertificate: subjectInfo: " + ByteHelper.byteArrayToString(subjectInfo));
System.out.println("SecurityHelper.decodeCertificate: subjectInfo: " + ByteHelper.byteArrayToString(subjectInfo));
} else {
cert.write(0x00);
}
396,18 → 410,31
byte[] b = new byte[(int) length];
headerfields.read(b, 0, b.length);
cert.write(b);
// System.out.println("SecurityHelper.decodeCertificate: Subject Attributes length=" + length + " / " + headerfields.available());
System.out.println("SecurityHelper.decodeCertificate: Subject Attributes length=" + length + " / " + headerfields.available());
ByteArrayInputStream subjectAttributes = new ByteArrayInputStream(b);
if (subjectAttributes.read() == 0x00) { // Subject Attribute: verification key (0) - Mandatory
if (subjectAttributes.read() == 0x00) { // Public Key Alg: ecdsa nistp256 with sha256 (0)
if (subjectAttributes.read() == 0x04) { // ECC Point Type: uncompressed (4)
byte v = (byte) subjectAttributes.read();
p_keys.write(v);
System.out.println("SecurityHelper.decodeCertificate: ECC Point Type: =" + v);
if (v == 0x02) { // ECC Point Type: compressed lsb y-0(2)
byte[] key = new byte[32];
subjectAttributes.read(key, 0, 32);
System.out.println("SecurityHelper.decodeCertificate: Verification lsb y-1 key=" + ByteHelper.byteArrayToString(key));
p_keys.write(key);
// System.out.println("SecurityHelper.decodeCertificate: Verification key1=" + ByteHelper.byteArrayToString(key));
} else if (v == 0x03) { // ECC Point Type: compressed lsb y-1(3)
byte[] key = new byte[32];
subjectAttributes.read(key, 0, 32);
// System.out.println("SecurityHelper.decodeCertificate: Verification key2=" + ByteHelper.byteArrayToString(key));
System.out.println("SecurityHelper.decodeCertificate: Verification lsb y-1 key=" + ByteHelper.byteArrayToString(key));
p_keys.write(key);
} else if (v == 0x04) { // ECC Point Type: uncompressed (4)
byte[] key = new byte[32];
subjectAttributes.read(key, 0, 32);
System.out.println("SecurityHelper.decodeCertificate: Verification key1=" + ByteHelper.byteArrayToString(key));
p_keys.write(key);
subjectAttributes.read(key, 0, 32);
System.out.println("SecurityHelper.decodeCertificate: Verification key2=" + ByteHelper.byteArrayToString(key));
p_keys.write(key);
} // FIXME To be continued
} // FIXME To be continued
} // FIXME To be continued
417,14 → 444,27
if (v == 0x01) { // // Subject Attribute: encryption key (1)
if (subjectAttributes.read() == 0x01) { // Public Key Alg: ecdsa nistp256 (1)
if (subjectAttributes.read() == 0x00) { // Symmetric Algorithm: aes 128 ccm (0)
if (subjectAttributes.read() == 0x04) { // ECC Point Type: uncompressed (4)
v = (byte) subjectAttributes.read();
p_keys.write(v);
System.out.println("SecurityHelper.decodeCertificate: ECC Point Type: =" + v);
if (v == 0x02) { // ECC Point Type: compressed lsb y-0(2)
byte[] key = new byte[32];
subjectAttributes.read(key, 0, 32);
// System.out.println("SecurityHelper.decodeCertificate: Encryption key1=" + ByteHelper.byteArrayToString(key));
//p_keys.write(key);
System.out.println("SecurityHelper.decodeCertificate: Encryption lsb y-0 key=" + ByteHelper.byteArrayToString(key));
p_keys.write(key);
} else if (v == 0x03) { // ECC Point Type: compressed lsb y-1(3)
byte[] key = new byte[32];
subjectAttributes.read(key, 0, 32);
// System.out.println("SecurityHelper.decodeCertificate: Encryption key2=" + ByteHelper.byteArrayToString(key));
//p_keys.write(key);
System.out.println("SecurityHelper.decodeCertificate: Encryption lsb y-1 key=" + ByteHelper.byteArrayToString(key));
p_keys.write(key);
} else if (v == 0x04) { // ECC Point Type: uncompressed (4)
byte[] key = new byte[32];
subjectAttributes.read(key, 0, 32);
System.out.println("SecurityHelper.decodeCertificate: Encryption key1=" + ByteHelper.byteArrayToString(key));
p_keys.write(key);
subjectAttributes.read(key, 0, 32);
System.out.println("SecurityHelper.decodeCertificate: Encryption key2=" + ByteHelper.byteArrayToString(key));
p_keys.write(key);
} // FIXME To be continued
} // FIXME To be continued
} // FIXME To be continued
439,7 → 479,7
return null;
}
v = (byte) subjectAttributes.read(); // Skip assurance level value
// System.out.println("SecurityHelper.decodeCertificate: assurance level value=" + v);
System.out.println("SecurityHelper.decodeCertificate: assurance level value=" + v);
if (subjectInfoType == 0x01) { // Authorization Ticket
if (subjectAttributes.read() != 0x21) { // Subject Attribute: its aid ssp list (33)
System.err.println("SecurityHelper.decodeCertificate: Its aid ssp list expected - " + ByteHelper.byteArrayToString(cert.toByteArray()));
446,10 → 486,10
return null;
}
length = tls2size(subjectAttributes);
// System.out.println("SecurityHelper.decodeCertificate: Its aid ssp length=" + length);
System.out.println("SecurityHelper.decodeCertificate: Its aid ssp length=" + length);
byte[] its_aid_ssp_list = new byte[(int) length];
subjectAttributes.read(its_aid_ssp_list, 0, (int) length);
// System.out.println("SecurityHelper.decodeCertificate: its_aid_list=" + ByteHelper.byteArrayToString(its_aid_ssp_list));
System.out.println("SecurityHelper.decodeCertificate: its_aid_list=" + ByteHelper.byteArrayToString(its_aid_ssp_list));
// TODO Process ATS AID list
} else if (subjectInfoType == 0x02) { // Authorization Authority
if (subjectAttributes.read() != 0x20) { // Subject Attribute: its aid ssp (32)
457,10 → 497,10
return null;
}
length = tls2size(subjectAttributes);
// System.out.println("SecurityHelper.decodeCertificate: its_aid_list length=" + length);
System.out.println("SecurityHelper.decodeCertificate: its_aid_list length=" + length);
byte[] its_aid_list = new byte[(int) length];
subjectAttributes.read(its_aid_list, 0, (int) length);
// System.out.println("SecurityHelper.decodeCertificate: its_aid_list=" + ByteHelper.byteArrayToString(its_aid_list));
System.out.println("SecurityHelper.decodeCertificate: its_aid_list=" + ByteHelper.byteArrayToString(its_aid_list));
// TODO Process ATS AID list
} else {
System.err.println("SecurityHelper.decodeCertificate: Unknown subjectInfoType - " + subjectInfoType);
469,7 → 509,7
// Validity restrictions
length = tls2size(headerfields);
// System.out.println("SecurityHelper.decodeCertificate: Length=" + length + " / " + headerfields.available());
System.out.println("SecurityHelper.decodeCertificate: Length=" + length + " / " + headerfields.available());
cert.write(size2tls((int)length));
v = (byte)headerfields.read();
if (v == 0x00) { // Validity Restriction: time end (0)
478,7 → 518,7
headerfields.read(time, 0, 4);
cert.write(time);
int endTime = ByteHelper.byteArrayToInt(time);
// System.out.println("SecurityHelper.decodeCertificate: Validity Restriction: endTime=" + endTime);
System.out.println("SecurityHelper.decodeCertificate: Validity Restriction: endTime=" + endTime);
// Check times
long currentTime = (System.currentTimeMillis() - 1072915200000L) / 1000L;
if (currentTime > endTime) {
493,14 → 533,14
headerfields.read(time, 0, 4);
cert.write(time);
int startTime = ByteHelper.byteArrayToInt(time);
// System.out.println("SecurityHelper.decodeCertificate: Validity Restriction: startTime=" + startTime);
System.out.println("SecurityHelper.decodeCertificate: Validity Restriction: startTime=" + startTime);
headerfields.read(time, 0, 4);
cert.write(time);
int endTime = ByteHelper.byteArrayToInt(time);
// System.out.println("SecurityHelper.decodeCertificate: Validity Restriction: endTime=" + endTime);
System.out.println("SecurityHelper.decodeCertificate: Validity Restriction: endTime=" + endTime);
// Check times
long currentTime = (System.currentTimeMillis() - 1072915200000L) / 1000L;
// System.out.println("SecurityHelper.decodeCertificate: Validity Restriction: currentTime=" + currentTime);
System.out.println("SecurityHelper.decodeCertificate: Validity Restriction: currentTime=" + currentTime);
if ((currentTime < startTime) || (currentTime > endTime)) {
System.err.println("SecurityHelper.decodeCertificate: Validity Restriction: time start and end not matched");
return null;
513,14 → 553,14
headerfields.read(time, 0, 4);
cert.write(time);
int startTime = ByteHelper.byteArrayToInt(time);
// System.out.println("SecurityHelper.decodeCertificate: Validity Restriction: startTime=" + startTime);
System.out.println("SecurityHelper.decodeCertificate: Validity Restriction: startTime=" + startTime);
byte[] dur = new byte[2];
headerfields.read(dur, 0, 2);
cert.write(dur);
short duration = ByteHelper.byteArrayToShort(dur);
// System.out.println("SecurityHelper.decodeCertificate: Validity Restriction: duration=" + duration);
System.out.println("SecurityHelper.decodeCertificate: Validity Restriction: duration=" + duration);
int unit = (duration & 0xe0000) >>> 13;
// System.out.println("SecurityHelper.decodeCertificate: Validity Restriction: unit=" + unit);
System.out.println("SecurityHelper.decodeCertificate: Validity Restriction: unit=" + unit);
long value = (duration & 0x1fff);
switch (unit) {
case 0:
536,7 → 576,7
System.err.println("SecurityHelper.decodeCertificate: Validity Restriction: time start and duration not processed");
value = Long.MAX_VALUE;
} // End of 'switch' statement
// System.out.println("SecurityHelper.decodeCertificate: Validity Restriction: value=" + value);
System.out.println("SecurityHelper.decodeCertificate: Validity Restriction: value=" + value);
// Check times
long currentTime = (System.currentTimeMillis() - 1072915200000L) / 1000L;
if ((currentTime < startTime) || (currentTime > (startTime + value))) {
556,15 → 596,15
byte[] lat = new byte[4];
headerfields.read(lat, 0, lat.length);
cert.write(lat);
// System.out.println("SecurityHelper.decodeCertificate: Circle lat=" + ByteHelper.byteArrayToString(lat));
System.out.println("SecurityHelper.decodeCertificate: Circle lat=" + ByteHelper.byteArrayToString(lat));
byte[] lon = new byte[4];
headerfields.read(lon, 0, lon.length);
cert.write(lon);
// System.out.println("SecurityHelper.decodeCertificate: Circle lon=" + ByteHelper.byteArrayToString(lon));
System.out.println("SecurityHelper.decodeCertificate: Circle lon=" + ByteHelper.byteArrayToString(lon));
byte[] rad = new byte[2];
headerfields.read(rad, 0, rad.length);
cert.write(rad);
// System.out.println("SecurityHelper.decodeCertificate: Circle rad=" + ByteHelper.byteArrayToInt(rad));
System.out.println("SecurityHelper.decodeCertificate: Circle rad=" + ByteHelper.byteArrayToInt(rad));
} else if (v == 0x02) { // rectangle (2)
int rlength = (int) tls2size(headerfields);
cert.write(size2tls(rlength));
581,10 → 621,10
byte[] llon = new byte[4];
headerfields.read(llon, 0, llon.length);
cert.write(llon);
// System.out.println("SecurityHelper.decodeCertificate: Rectangle ulat=" + ByteHelper.byteArrayToString(ulat));
// System.out.println("SecurityHelper.decodeCertificate: Rectangle ulon=" + ByteHelper.byteArrayToString(ulon));
// System.out.println("SecurityHelper.decodeCertificate: Rectangle llat=" + ByteHelper.byteArrayToString(llat));
// System.out.println("SecurityHelper.decodeCertificate: Rectangle llon=" + ByteHelper.byteArrayToString(llon));
System.out.println("SecurityHelper.decodeCertificate: Rectangle ulat=" + ByteHelper.byteArrayToString(ulat));
System.out.println("SecurityHelper.decodeCertificate: Rectangle ulon=" + ByteHelper.byteArrayToString(ulon));
System.out.println("SecurityHelper.decodeCertificate: Rectangle llat=" + ByteHelper.byteArrayToString(llat));
System.out.println("SecurityHelper.decodeCertificate: Rectangle llon=" + ByteHelper.byteArrayToString(llon));
rlength -= 4 * 4;
}
} else if (v == 0x03) { // polygon (3)
598,14 → 638,14
byte[] lon = new byte[4];
headerfields.read(lon, 0, lon.length);
cert.write(lon);
// System.out.println("SecurityHelper.decodeCertificate: poly point lat=" + ByteHelper.byteArrayToString(lat));
// System.out.println("SecurityHelper.decodeCertificate: poly point lon=" + ByteHelper.byteArrayToString(lon));
System.out.println("SecurityHelper.decodeCertificate: poly point lat=" + ByteHelper.byteArrayToString(lat));
System.out.println("SecurityHelper.decodeCertificate: poly point lon=" + ByteHelper.byteArrayToString(lon));
plength -= 2 * 4;
}
headerfields.read(polygonalRegion, 0, polygonalRegion.length);
cert.write(polygonalRegion);
// TODO Process Validity Restriction
// System.out.println("SecurityHelper.decodeCertificate: polygonal=" + ByteHelper.byteArrayToString(polygonalRegion));
System.out.println("SecurityHelper.decodeCertificate: polygonal=" + ByteHelper.byteArrayToString(polygonalRegion));
} else if (v == 0x04) { // id (4)
v = (byte)headerfields.read();
616,15 → 656,15
int lr = (int) tls2size(headerfields);
cert.write(size2tls((int) lr));
// TODO Process Validity Restriction
// System.out.println("SecurityHelper.decodeCertificate: Region t=" + v);
// System.out.println("SecurityHelper.decodeCertificate: Region ri=" + ByteHelper.byteArrayToString(ri));
// System.out.println("SecurityHelper.decodeCertificate: Region lr=" + lr);
System.out.println("SecurityHelper.decodeCertificate: Region t=" + v);
System.out.println("SecurityHelper.decodeCertificate: Region ri=" + ByteHelper.byteArrayToString(ri));
System.out.println("SecurityHelper.decodeCertificate: Region lr=" + lr);
} else {
System.err.println("SecurityHelper.decodeCertificate: Unexpected geographical region");
return null;
}
}
// System.out.println("SecurityHelper.decodeCertificate: Before signature: " + ByteHelper.byteArrayToString(cert.toByteArray()));
System.out.println("SecurityHelper.decodeCertificate: Before signature: " + ByteHelper.byteArrayToString(cert.toByteArray()));
// Signature
byte publicKeyAlg = (byte)headerfields.read();
cert.write(publicKeyAlg);
637,7 → 677,7
byte[] key = new byte[64];
headerfields.read(key, 0, key.length);
cert.write(key);
// System.out.println("SecurityHelper.decodeCertificate: Signature=" + ByteHelper.byteArrayToString(key));
System.out.println("SecurityHelper.decodeCertificate: Signature=" + ByteHelper.byteArrayToString(key));
break;
} // End of 'switch' statement
break;
644,7 → 684,7
} // End of 'switch' statement
// TODO Check certificate signature
// System.out.println("SecurityHelper.decodeCertificate: Processed cert=" + ByteHelper.byteArrayToString(cert.toByteArray()));
System.out.println("SecurityHelper.decodeCertificate: Processed cert=" + ByteHelper.byteArrayToString(cert.toByteArray()));
return cert.toByteArray();
} catch (IOException e) {
e.printStackTrace();
655,7 → 695,7
}
public boolean extractMessageSignature(final byte[] p_secureTrailer, final ByteArrayOutputStream p_signature) {
// System.out.println(">>> SecurityHelper.extractMessageSignature: " + ByteHelper.byteArrayToString(p_secureTrailer));
System.out.println(">>> SecurityHelper.extractMessageSignature: " + ByteHelper.byteArrayToString(p_secureTrailer));
// Sanity check
if (p_secureTrailer.length == 0) {
666,7 → 706,8
int secureTrailerIndex = 0;
if (p_secureTrailer[secureTrailerIndex++] == 0x01) { // Trailer Type: signature (1)
if (p_secureTrailer[secureTrailerIndex++] == 0x00) { // Public Key Alg: ecdsa nistp256 with sha256 (0)
if (p_secureTrailer[secureTrailerIndex++] == 0x02) { // ECC Point Type: compressed lsb y-0 (2)
byte v = p_secureTrailer[secureTrailerIndex++];
if ((v == 0x00) || (v == 0x02)) { // ECC Point Type: compressed lsb y-0 (2)
if (p_secureTrailer.length == (3 + 2 * 32)) {
// Build the signature vector
try {
673,7 → 714,7
p_signature.write(new byte[] { (byte)0x00, (byte)0x00 });
p_signature.write(ByteHelper.extract(p_secureTrailer, 3, 64));
// System.out.println("<<< SecurityHelper.extractMessageSignature: true");
System.out.println("<<< SecurityHelper.extractMessageSignature: true");
return true;
} catch (IOException e) {
e.printStackTrace();
689,9 → 730,9
}
public byte[] calculateDigestFromCertificate(final byte[] p_toBeHashedData) {
// System.out.println("SecurityHelper.calculateDigestFromCertificate: " + ByteHelper.byteArrayToString(p_toBeHashedData));
System.out.println("SecurityHelper.calculateDigestFromCertificate: " + ByteHelper.byteArrayToString(p_toBeHashedData));
byte[] hash = CryptoLib.hashWithSha256(p_toBeHashedData);
// System.out.println("SecurityHelper.calculateDigestFromCertificate: " + ByteHelper.byteArrayToString(hash));
System.out.println("SecurityHelper.calculateDigestFromCertificate: " + ByteHelper.byteArrayToString(hash));
return ByteHelper.extract(hash, hash.length - 8, 8);
}
/trunk/javasrc/adapter/org/etsi/its/adapter/layers/EthernetLayer.java
24,87 → 24,87
/**
* Well-known Ethernet broadcast address
*/
public static byte[] MAC_BROADCAST = new byte[]{(byte)0xFF,(byte)0xFF,(byte)0xFF,(byte)0xFF,(byte)0xFF,(byte)0xFF};
public static byte[] MAC_BROADCAST = new byte[]{(byte)0xFF,(byte)0xFF,(byte)0xFF,(byte)0xFF,(byte)0xFF,(byte)0xFF};
/**
* Parameter name for Link-Layer destination
*/
public static final String LINK_LAYER_DESTINATION = "LinkLayerDestination";
/**
/**
* Constructor
* @param management Layer management instance
* @param lowerStack Lower protocol stack
*/
public EthernetLayer(IManagementLayers management, Stack<String> lowerStack) {
super(management, lowerStack);
public EthernetLayer(IManagementLayers management, Stack<String> lowerStack) {
super(management, lowerStack);
}
 
/* (non-Javadoc)
* @see org.etsi.its.adapter.layers.Layer#register(org.etsi.its.adapter.layers.Layer)
*/
@Override
public void register(Layer upperLayer) {
if(registeredUpperLayer == null) {
super.register(upperLayer);
try {
Method getEthernetType = registeredUpperLayer.getClass().getMethod("getEthernetType", (Class<?>[])null);
if (getEthernetType != null) {
/* (non-Javadoc)
* @see org.etsi.its.adapter.layers.Layer#register(org.etsi.its.adapter.layers.Layer)
*/
@Override
public void register(Layer upperLayer) {
if(registeredUpperLayer == null) {
super.register(upperLayer);
try {
Method getEthernetType = registeredUpperLayer.getClass().getMethod("getEthernetType", (Class<?>[])null);
if (getEthernetType != null) {
upperLayerFrameType = (Short) getEthernetType.invoke(registeredUpperLayer, (Object[]) null);
}
} catch (SecurityException e) {
e.printStackTrace();
} catch (NoSuchMethodException e) {
e.printStackTrace();
} catch (IllegalArgumentException e) {
e.printStackTrace();
} catch (IllegalAccessException e) {
e.printStackTrace();
} catch (InvocationTargetException e) {
e.printStackTrace();
}
localMacAddress = management.getLinkLayerAddress();
PcapMultiplexer.getInstance().register(this, localMacAddress, upperLayerFrameType);
}
} catch (SecurityException e) {
e.printStackTrace();
} catch (NoSuchMethodException e) {
e.printStackTrace();
} catch (IllegalArgumentException e) {
e.printStackTrace();
} catch (IllegalAccessException e) {
e.printStackTrace();
} catch (InvocationTargetException e) {
e.printStackTrace();
}
localMacAddress = management.getLinkLayerAddress();
PcapMultiplexer.getInstance().register(this, localMacAddress, upperLayerFrameType);
}
}
/* (non-Javadoc)
* @see org.etsi.its.adapter.layers.Layer#send(byte[], java.util.Map)
*/
@Override
public boolean send(byte[] message, Map<String, Object> params) {
byte[] dst = (byte[])params.get(LINK_LAYER_DESTINATION);
if(dst == null) {
dst = MAC_BROADCAST;
}
/* (non-Javadoc)
* @see org.etsi.its.adapter.layers.Layer#send(byte[], java.util.Map)
*/
@Override
public boolean send(byte[] message, Map<String, Object> params) {
byte[] dst = (byte[])params.get(LINK_LAYER_DESTINATION);
if(dst == null) {
dst = MAC_BROADCAST;
}
byte[] sent = PcapMultiplexer.getInstance().sendPacket(this, dst, message);
byte[] sent = PcapMultiplexer.getInstance().sendPacket(this, dst, message);
 
return super.send(sent, params);
}
/* (non-Javadoc)
* @see org.etsi.its.adapter.layers.Layer#unregister(org.etsi.its.adapter.layers.Layer)
*/
@Override
public void unregister(Layer upperLayer) {
PcapMultiplexer.getInstance().unregister(this);
return super.send(sent, params);
}
/* (non-Javadoc)
* @see org.etsi.its.adapter.layers.Layer#unregister(org.etsi.its.adapter.layers.Layer)
*/
@Override
public void unregister(Layer upperLayer) {
PcapMultiplexer.getInstance().unregister(this);
}
/**
* Local Ethernet address
*/
private byte[] localMacAddress;
/**
* Upper layer's frame type
*/
private short upperLayerFrameType;
/**
* Local Ethernet address
*/
private byte[] localMacAddress;
/**
* Upper layer's frame type
*/
private short upperLayerFrameType;
 
}
 
/trunk/javasrc/adapter/org/etsi/its/adapter/layers/GnLayer.java
418,7 → 418,7
// Other messages
if(payloadLength > 0) {
byte[] mpayload = new byte[payloadLength];
System.arraycopy(payload, commonHdr.length + 28/*Topology-Scoped Broadcast*/, mpayload, 0, payloadLength);
System.arraycopy(payload, commonHdr.length + 44/*Topology-Scoped Broadcast*/, mpayload, 0, payloadLength);
// System.out.println("GnLayer.receive: Message =" + ByteHelper.byteArrayToString(mpayload));
lowerInfo.put(GN_NEXTHEADER, nextHeader);
lowerInfo.put(GN_TYPE, headerType);
654,7 → 654,7
new byte[] {
(byte)0x00, // generationTime
},
generationTime // Time64 value
generationTime // Time64 value
)
);
if ((commonHdr[0] & 0xF0) == 0x01) { // Next header = Btp-A
700,6 → 700,12
headersField = ByteHelper.concat(
headersField,
new byte[] {
(byte)0x03 // GenerationLocation
},
management.getLatitude(), // Latitude
management.getLongitude(), // Longitude
new byte[] { (byte)0x00, (byte)0x00 }, // Elevation
new byte[] {
(byte)0x05 // Its-aid
},
b
/trunk/javasrc/adapter/org/etsi/its/adapter/ports/AdapterControlPort.java
8,8 → 8,13
*/
package org.etsi.its.adapter.ports;
 
import org.etsi.adapter.GnssSupportFactory;
import org.etsi.adapter.IGnssSupport;
import org.etsi.adapter.TERFactory;
import org.etsi.common.ByteHelper;
import org.etsi.its.adapter.Management;
import org.etsi.ttcn.tci.BooleanValue;
import org.etsi.ttcn.tri.TriStatus;
 
/** This class implements behaviour for Adapter controller port
*
20,10 → 25,13
/* AdapterControl Primitives */
private static final byte AcGnPrimitive = 0;
private static final byte AcGn6Primitive = 1;
private static final byte AcGnssPrimitive = 2;
/* AdapterControl Response */
private static final byte AcGnResponse = 0;
//private static final byte AcGn6Response = 1;
public static final byte AcGnssResponse = 2;
public static final byte AcGnssDistanceCovered = 3;
 
/* GN Commands */
private static final byte AcStartBeaconing = 0;
40,9 → 48,21
protected static final byte AcGnResponseFailure = 0;
protected static final byte AcLongPosVector = 6;
 
protected static final byte AcTrue = 0x01;
protected static final byte AcFalse = 0x01;
/* SCENARIO commands */
private static final byte AcLoadScenario = 0x70;
private static final byte AcStartScenario = 0x71;
private static final byte AcStopScenario = 0x72;
private static final byte AcAwaitDistanceToCover = 0x73;
private static final byte AcChangeSpead = 0x74;
private static final byte AcChangeHeading = 0x75;
 
public static final byte AcTrue = 0x01;
public static final byte AcFalse = 0x00;
private static final String GNSS_SCENARIO_SUPPORT = "GnssScenarioSupport";
private IGnssSupport GNSS;
private boolean isScenarioStarted = false;
private boolean gnssScenarioSupport;
/**
* Constructor
* @param portName Name of the port
50,6 → 70,15
*/
public AdapterControlPort(final String portName, final String componentName) {
super(portName, componentName);
try {
gnssScenarioSupport = ((BooleanValue) TERFactory.getInstance().getTaParameter(GNSS_SCENARIO_SUPPORT)).getBoolean();
}
catch (Throwable th) {
gnssScenarioSupport = false;
}
if (gnssScenarioSupport) {
GNSS = GnssSupportFactory.getInstance();
}
}
 
@Override
120,6 → 149,40
}
*/
break;
case AcGnssPrimitive:
if (gnssScenarioSupport) {
byte[] data = ByteHelper.extract(message, 2, message.length - 2);
switch (message[1]) {
case AcLoadScenario:
LoadScenario(ByteHelper.byteArrayToShort(data));
break;
case AcStartScenario:
StartScenario();
break;
case AcStopScenario:
StopScenario();
break;
case AcAwaitDistanceToCover:
Float distance = ByteHelper.byteArrayToFloat(data);
AwaitDistanceToCover(distance);
break;
case AcChangeSpead:
// ChangeSpeed(speed);
break;
case AcChangeHeading:
// ChangeHeading(heading);
break;
}
}
else {
TERFactory.getInstance().getTriStatus(TriStatus.TRI_OK, "AcGnssPrimitive cannot be handled as the "
+ GNSS_SCENARIO_SUPPORT + " is set to false!");
result = false;
}
break;
default:
ByteHelper.dump("Unsupported AC primitive", message);
break;
} // End of 'switch' statement
 
return result;
167,9 → 230,70
notifyObservers(new PortEvent(response, getPortName(), getComponentName()));
}
 
private void LoadScenario(final int scenario) {
new Thread(new Runnable() {
@Override
public void run() {
boolean result = GNSS.loadScenario(scenario);
byte[] response = {(byte)AcGnssResponse, (byte)(result?AcTrue:AcFalse)};
setChanged();
notifyObservers(new PortEvent(response, getPortName(), getComponentName()));
}
}).start();
}
 
private void StartScenario() {
new Thread(new Runnable() {
@Override
public void run() {
isScenarioStarted = GNSS.startScenario();
byte[] response = {(byte)AcGnssResponse, (byte)(isScenarioStarted?AcTrue:AcFalse)};
setChanged();
notifyObservers(new PortEvent(response, getPortName(), getComponentName()));
}
}).start();
}
 
private void StopScenario() {
new Thread(new Runnable() {
@Override
public void run() {
boolean result = GNSS.stopScenario();
isScenarioStarted = !result;
byte[] response = {(byte)AcGnssResponse, (byte)(isScenarioStarted?AcFalse:AcTrue)};
setChanged();
notifyObservers(new PortEvent(response, getPortName(), getComponentName()));
}
}).start();
}
 
private void AwaitDistanceToCover(final double distance) {
new Thread(new Runnable() {
@Override
public void run() {
boolean result = GNSS.awaitDistanceToCover(AdapterControlPort.this, distance);
byte[] response = {(byte)AcGnssResponse, (byte)(result?AcFalse:AcTrue)};
setChanged();
notifyObservers(new PortEvent(response, getPortName(), getComponentName()));
}
}).start();
}
 
@Override
public void dispose() {
//empty
if (gnssScenarioSupport) {
if (GNSS!=null) {
if (isScenarioStarted) {
GNSS.stopScenario();
}
GNSS.dispose();
}
GNSS = null;
}
}
 
} // End of class AdapterControlPort
/trunk/javasrc/adapter/org/etsi/its/adapter/ports/AdapterPort.java
45,7 → 45,7
/**
* Marks this Observable object as having been changed
*/
protected void setChanged() {
public void setChanged() {
observable.setChanged();
}
/trunk/javasrc/adapter/org/etsi/its/adapter/ports/GnPort.java
98,17 → 98,17
long currentTime = System.currentTimeMillis();
byte[] tst = ByteHelper.intToByteArray((int)(((currentTime - 1072915200000L) % modulo) - 3000), 4);
System.arraycopy(tst, 0, beaconHeader, 20, 4);
// TODO Uncomment to get secured beacon if (!management.isSecuredModeSet()) { // Secure mode disabled
/* TODO Uncomment to get secured beacon*/if (!management.isSecuredModeSet()) { // Secure mode disabled
send(beaconHeader, params);
/* TODO Uncomment to get secured beacon
/* TODO Uncomment to get secured beacon*/
} else { // Send a secured beacon
byte[] securedBeaconHeader = buildSecuredBeacon(beaconHeader, tst, currentTime, false);
// triggerTime = currentTime;
// Send the secured beacon
System.out.println("GnPort: Call send " + ByteHelper.byteArrayToString(securedBeaconHeader));
//System.out.println("GnPort: Call send " + ByteHelper.byteArrayToString(securedBeaconHeader));
send(securedBeaconHeader, params);
}
TODO Uncomment to get secured beacon*/
/* TODO Uncomment to get secured beacon*/
try {
Thread.sleep(management.getGnBeaconInterval());
} catch (InterruptedException e) {
119,7 → 119,7
}
private byte[] buildSecuredBeacon(final byte[] p_beacon, byte[] p_tst, final long p_currentTime, final boolean p_sendDigest) {
System.out.println("GnPort.buildSecuredBeacon (1): " + ByteHelper.byteArrayToString(p_beacon));
//System.out.println("GnPort.buildSecuredBeacon (1): " + ByteHelper.byteArrayToString(p_beacon));
byte[] basicHeader = ByteHelper.extract(p_beacon, 0, 4);
basicHeader[0] &= 0xFE;
131,10 → 131,10
p_tst, // Update the timestamp field
ByteHelper.extract(p_beacon, 20, p_beacon.length - 4 - 20) // Add remaining bytes
);
System.out.println("GnPort.buildSecuredBeacon (2): " + ByteHelper.byteArrayToString(beacon));
//System.out.println("GnPort.buildSecuredBeacon (2): " + ByteHelper.byteArrayToString(beacon));
// Prepare the message to be signed
byte[] toBeSignedData = buildToBeSignedData(beacon, p_currentTime, p_sendDigest);
System.out.println("GnPort.buildSecuredBeacon: toBeSignedData " + ByteHelper.byteArrayToString(toBeSignedData));
//System.out.println("GnPort.buildSecuredBeacon: toBeSignedData " + ByteHelper.byteArrayToString(toBeSignedData));
// Sign the message
byte[] securedBeaconHeader = signSecuredMessage(toBeSignedData);
143,7 → 143,7
}
private byte[] buildToBeSignedData(final byte[] p_beacon, final long p_currentTime, final boolean p_sendDigest) {
System.out.println("GnPort.buildToBeSignedData: " + ByteHelper.byteArrayToString(p_beacon));
//System.out.println("GnPort.buildToBeSignedData: " + ByteHelper.byteArrayToString(p_beacon));
// Build the SignerInfo field
byte[] signerInfo = null;
167,7 → 167,7
// Build the generation time value
byte[] generationTime = ByteHelper.longToByteArray((long)(p_currentTime - 1072915200000L) * 1000L, Long.SIZE / Byte.SIZE); // In microseconds
System.out.println("GnPort.buildToBeSignedData: generationTime=" + ByteHelper.byteArrayToString(generationTime));
//System.out.println("GnPort.buildToBeSignedData: generationTime=" + ByteHelper.byteArrayToString(generationTime));
byte[] headersField = ByteHelper.concat(
ByteHelper.concat( // SecuredMessage HeaderFields
signerInfo, // signerInfo
198,12 → 198,18
headersField = ByteHelper.concat(
headersField,
new byte[] {
(byte)0x03 // GenerationLocation
},
management.getLatitude(), // Latitude
management.getLongitude(), // Longitude
new byte[] { (byte)0x00, (byte)0x00 }, // Elevation
new byte[] {
(byte)0x05 // Its-aid
},
b
);
byte[] headersFieldLength = SecurityHelper.getInstance().size2tls(headersField.length);
System.out.println("GnPort.buildToBeSignedData: headersField=" + ByteHelper.byteArrayToString(headersField));
//System.out.println("GnPort.buildToBeSignedData: headersField=" + ByteHelper.byteArrayToString(headersField));
byte[] toBeSignedData = ByteHelper.concat(
new byte[] { // SecuredMessage version
(byte)0x02 // version
218,23 → 224,23
new byte[] { (byte)0x43 }, // Signature length
new byte[] { (byte)0x01 } // Signature
);
System.out.println("GnPort.buildToBeSignedData: toBeSignedData=" + ByteHelper.byteArrayToString(toBeSignedData));
//System.out.println("GnPort.buildToBeSignedData: toBeSignedData=" + ByteHelper.byteArrayToString(toBeSignedData));
return toBeSignedData;
}
private byte[] signSecuredMessage(final byte[] p_toBeSignedData) {
System.out.println("GnPort.signSecuredMessage: toBeSignedData: " + ByteHelper.byteArrayToString(p_toBeSignedData));
//System.out.println("GnPort.signSecuredMessage: toBeSignedData: " + ByteHelper.byteArrayToString(p_toBeSignedData));
// Calculate the hash
byte[] hash = CryptoLib.hashWithSha256(p_toBeSignedData);
System.out.println("GnPort.signSecuredMessage: hash=" + ByteHelper.byteArrayToString(hash));
//System.out.println("GnPort.signSecuredMessage: hash=" + ByteHelper.byteArrayToString(hash));
byte[] securedBeaconHeader = null;
// Signed the hash
byte[] signatureBytes;
try {
signatureBytes = CryptoLib.signWithEcdsaNistp256WithSha256(hash, management.getSigningPrivateKey());
System.out.println("GnPort.signSecuredMessage: signatureBytes=" + ByteHelper.byteArrayToString(signatureBytes));
//System.out.println("GnPort.signSecuredMessage: signatureBytes=" + ByteHelper.byteArrayToString(signatureBytes));
// Add signature
securedBeaconHeader = ByteHelper.concat(
p_toBeSignedData,
247,11 → 253,11
/* boolean result = CryptoLib.verifyWithEcdsaNistp256WithSha256(p_toBeSignedData, signatureBytes, management.getSigningPublicKeyX(), management.getSigningPublicKeyY());
System.out.println("GnPort.signSecuredMessage: Verify signature: pubX" + ByteHelper.byteArrayToString(management.getSigningPublicKeyX()));
System.out.println("GnPort.signSecuredMessage: Verify signature: pubY" + ByteHelper.byteArrayToString(management.getSigningPublicKeyY()));
System.out.println("GnPort.signSecuredMessage: Verify signature: " + new Boolean(result));*/
//System.out.println("GnPort.signSecuredMessage: Verify signature: pubX" + ByteHelper.byteArrayToString(management.getSigningPublicKeyX()));
//System.out.println("GnPort.signSecuredMessage: Verify signature: pubY" + ByteHelper.byteArrayToString(management.getSigningPublicKeyY()));
//System.out.println("GnPort.signSecuredMessage: Verify signature: " + new Boolean(result));*/
System.out.println("<<< GnPort.signSecuredMessage: sendBeacon: " + ByteHelper.byteArrayToString(securedBeaconHeader));
//System.out.println("<<< GnPort.signSecuredMessage: sendBeacon: " + ByteHelper.byteArrayToString(securedBeaconHeader));
return securedBeaconHeader;
} catch (Exception e) {
e.printStackTrace();
265,7 → 271,7
*/
@Override
public boolean send(byte[] message) {
System.out.println(">>> GnPort.send: " + ByteHelper.byteArrayToString(message));
//System.out.println(">>> GnPort.send: " + ByteHelper.byteArrayToString(message));
HashMap<String, Object> params = new HashMap<String, Object>();
277,7 → 283,7
}
// ByteHelper.dump("GnPort.send", message);
System.out.println("\n\n");
//System.out.println("\n\n");
return send(message, params);
}
286,7 → 292,7
*/
@Override
public void receive(byte[] message, Map<String, Object> lowerInfo) {
System.out.println(">>> GnPort.receive: " + ByteHelper.byteArrayToString(message));
//System.out.println(">>> GnPort.receive: " + ByteHelper.byteArrayToString(message));
byte[] basicHdr = new byte[4];
System.arraycopy(message, 0, basicHdr, 0, 4);
309,10 → 315,10
} else if ((basicHdr[0] & 0x0f) == 0x02) { // Secured tag
byte[] payload = SecurityHelper.getInstance().checkSecuredProfileAndExtractPayload(message, basicHdr.length, management.isEnforceSecuredModeSet(), management.getItsAidOther());
if (payload != null) {
// System.out.println("GnPort.receive: payload=" + ByteHelper.byteArrayToString(payload));
//System.out.println("GnPort.receive: payload=" + ByteHelper.byteArrayToString(payload));
byte[] commonHdr = new byte[8];
System.arraycopy(payload, 0, commonHdr, 0, 8);
// System.out.println("GnPort.receive: commonHdr=" + ByteHelper.byteArrayToString(commonHdr));
//System.out.println("GnPort.receive: commonHdr=" + ByteHelper.byteArrayToString(commonHdr));
byte[] htHst = new byte[1];
System.arraycopy(commonHdr, 1, htHst, 0, 1);
headerType = (int)(htHst[0] >> 4);
333,7 → 339,7
System.err.println("GnPort.receive: Invalid basic header type");
return;
}
System.out.println("GnPort.receive: sopv=" + ByteHelper.byteArrayToString(sopv));
//System.out.println("GnPort.receive: sopv=" + ByteHelper.byteArrayToString(sopv));
byte[] gn = new byte[8];
System.arraycopy(sopv, 0, gn, 0, 8);
388,11 → 394,11
// Set nextHeader to secured
basicHdr[0] &= 0xFE;
basicHdr[0] |= 0x02;
System.out.println("GnPort.createSecuredMessage: basicHdr=" + ByteHelper.byteArrayToString(basicHdr));
//System.out.println("GnPort.createSecuredMessage: basicHdr=" + ByteHelper.byteArrayToString(basicHdr));
// Extract and update the basicHeader
byte[] commonHdr = ByteHelper.extract(message, 4, 8);
System.out.println("GnPort.createSecuredMessage: commonHdr=" + ByteHelper.byteArrayToString(commonHdr));
//System.out.println("GnPort.createSecuredMessage: commonHdr=" + ByteHelper.byteArrayToString(commonHdr));
// Extract SecuredMessage payload
byte[] securedPayload = ByteHelper.extract(message, 4, message.length - 4);
458,6 → 464,12
headersField = ByteHelper.concat(
headersField,
new byte[] {
(byte)0x03 // GenerationLocation
},
management.getLatitude(), // Latitude
management.getLongitude(), // Longitude
new byte[] { (byte)0x00, (byte)0x00 }, // Elevation
new byte[] {
(byte)0x05 // Its-aid
},
b
477,16 → 489,16
new byte[] { (byte)0x01 }, // Signature
new byte[] { (byte)0x43 } // Signature length
);
System.out.println("GnPort.createSecuredMessage: toBeSignedData=" + ByteHelper.byteArrayToString(toBeSignedData));
//System.out.println("GnPort.createSecuredMessage: toBeSignedData=" + ByteHelper.byteArrayToString(toBeSignedData));
byte[] toBeSent = null;
try {
// Calculate the hash
byte[] hash = CryptoLib.hashWithSha256(toBeSignedData);
System.out.println("GnPort.createSecuredMessage: hash=" + ByteHelper.byteArrayToString(hash));
//System.out.println("GnPort.createSecuredMessage: hash=" + ByteHelper.byteArrayToString(hash));
// Signed the hash
byte[] signatureBytes = CryptoLib.signWithEcdsaNistp256WithSha256(hash, management.getSigningPrivateKey());
System.out.println("GnPort.createSecuredMessage: signatureBytes=" + ByteHelper.byteArrayToString(signatureBytes));
//System.out.println("GnPort.createSecuredMessage: signatureBytes=" + ByteHelper.byteArrayToString(signatureBytes));
// Add signature
toBeSent = ByteHelper.concat(
basicHdr,
498,8 → 510,8
e.printStackTrace();
}
System.out.println("GnPort.createSecuredMessage: toBeSent=" + ByteHelper.byteArrayToString(toBeSent));
System.out.println("\n\n");
//System.out.println("GnPort.createSecuredMessage: toBeSent=" + ByteHelper.byteArrayToString(toBeSent));
//System.out.println("\n\n");
return toBeSent;
}
/trunk/javasrc/codec/org/etsi/ttcn/codec/its/adapter/AcGnssAwaitDistanceCovered.java
0,0 → 1,33
package org.etsi.ttcn.codec.its.adapter;
 
import org.etsi.ttcn.codec.CodecBuffer;
import org.etsi.ttcn.codec.MainCodec;
import org.etsi.ttcn.codec.generic.Boolean;
import org.etsi.ttcn.tci.Type;
import org.etsi.ttcn.tci.Value;
 
public class AcGnssAwaitDistanceCovered extends Boolean {
 
private static final int AcGnssDistanceCovered = 0x03;
 
public AcGnssAwaitDistanceCovered(MainCodec mainCodec) {
super(mainCodec);
}
 
@Override
public Value decode(CodecBuffer buf, Type decodingHypothesis) {
byte[] readId = buf.readBytes(1);
if(readId[0] != AcGnssDistanceCovered) {
return null;
}
return super.decode(buf, decodingHypothesis);
}
@Override
public CodecBuffer preEncode(Value value) {
return new CodecBuffer(new byte[] {0x02});
}
 
}
Property changes:
Added: svn:eol-style
## -0,0 +1 ##
+native
\ No newline at end of property
Added: svn:keywords
## -0,0 +1 ##
+URL Id
\ No newline at end of property
Added: svn:mime-type
## -0,0 +1 ##
+text/plain
\ No newline at end of property
Index: javasrc/codec/org/etsi/ttcn/codec/its/adapter/AcGnssPrimitive.java
===================================================================
--- javasrc/codec/org/etsi/ttcn/codec/its/adapter/AcGnssPrimitive.java (nonexistent)
+++ javasrc/codec/org/etsi/ttcn/codec/its/adapter/AcGnssPrimitive.java (revision 2398)
@@ -0,0 +1,81 @@
+package org.etsi.ttcn.codec.its.adapter;
+
+import org.etsi.ttcn.tci.Type;
+import org.etsi.ttcn.tci.UnionValue;
+import org.etsi.ttcn.codec.generic.Union;
+import org.etsi.ttcn.codec.MainCodec;
+import org.etsi.ttcn.codec.CodecBuffer;
+import org.etsi.ttcn.common.ByteHelper;
+
+public class AcGnssPrimitive extends Union {
+
+ public AcGnssPrimitive(MainCodec mainCodec) {
+ super(mainCodec);
+ }
+
+ @Override
+ protected void preDecode(CodecBuffer buf, Type decodingHypothesis) {
+
+ // Read message id (AcGnssPrimitive)
+ if(0x00 != (0x00FF & buf.readBytes(1)[0])) {
+ return;
+ }
+
+ // Read primitive id
+ int primitiveId = 0x00FF & buf.readBytes(1)[0];
+ String primitive = "";
+
+ switch(primitiveId) {
+ case 0x70:
+ primitive = "loadScenario";
+ break;
+ case 0x71:
+ primitive = "startScenario";
+ break;
+ case 0x72:
+ primitive = "stopScenario";
+ break;
+ case 0x73:
+ primitive = "distanceToCover";
+ break;
+ case 0x74:
+ primitive = "changeSpeed";
+ break;
+ case 0x75:
+ primitive = "changeHeading";
+ break;
+ }
+
+ mainCodec.setHint(decodingHypothesis.getName(), primitive);
+ }
+
+ @Override
+ protected void preEncode(CodecBuffer buf, UnionValue uv) {
+ String variant = uv.getPresentVariantName();
+ int primitiveId = -1;
+
+ buf.appendBytes(ByteHelper.intToByteArray(2, 1));
+
+ // Append primitive id
+ if(variant.equals("loadScenario")) {
+ primitiveId = 0x70;
+ mainCodec.setHint("ScenarioLen", "16");
+ }
+ else if(variant.equals("startScenario")) {
+ primitiveId = 0x71;
+ }
+ else if(variant.equals("stopScenario")) {
+ primitiveId = 0x72;
+ }
+ else if(variant.equals("distanceToCover")) {
+ primitiveId = 0x73;
+ }
+ else if(variant.equals("changeSpeed")) {
+ primitiveId = 0x74;
+ }
+ else if(variant.equals("changeHeading")) {
+ primitiveId = 0x75;
+ }
+ buf.appendBytes(ByteHelper.intToByteArray(primitiveId, 1));
+ }
+}
/javasrc/codec/org/etsi/ttcn/codec/its/adapter/AcGnssPrimitive.java
Property changes:
Added: svn:eol-style
## -0,0 +1 ##
+native
\ No newline at end of property
Added: svn:keywords
## -0,0 +1 ##
+URL Id
\ No newline at end of property
Added: svn:mime-type
## -0,0 +1 ##
+text/plain
\ No newline at end of property
Index: javasrc/codec/org/etsi/ttcn/codec/its/adapter/AcGnssResponse.java
===================================================================
--- javasrc/codec/org/etsi/ttcn/codec/its/adapter/AcGnssResponse.java (nonexistent)
+++ javasrc/codec/org/etsi/ttcn/codec/its/adapter/AcGnssResponse.java (revision 2398)
@@ -0,0 +1,33 @@
+package org.etsi.ttcn.codec.its.adapter;
+
+import org.etsi.ttcn.codec.CodecBuffer;
+import org.etsi.ttcn.codec.MainCodec;
+import org.etsi.ttcn.codec.generic.Boolean;
+import org.etsi.ttcn.tci.Type;
+import org.etsi.ttcn.tci.Value;
+
+public class AcGnssResponse extends Boolean {
+
+ private static final int AcGnssResponse = 0x02;
+
+ public AcGnssResponse(MainCodec mainCodec) {
+ super(mainCodec);
+ }
+
+ @Override
+ public Value decode(CodecBuffer buf, Type decodingHypothesis) {
+
+ byte[] readId = buf.readBytes(1);
+ if(readId[0] != AcGnssResponse) {
+ return null;
+ }
+
+ return super.decode(buf, decodingHypothesis);
+ }
+
+ @Override
+ public CodecBuffer preEncode(Value value) {
+ return new CodecBuffer(new byte[] {0x02});
+ }
+
+}
/javasrc/codec/org/etsi/ttcn/codec/its/adapter/AcGnssResponse.java
Property changes:
Added: svn:eol-style
## -0,0 +1 ##
+native
\ No newline at end of property
Added: svn:keywords
## -0,0 +1 ##
+URL Id
\ No newline at end of property
Added: svn:mime-type
## -0,0 +1 ##
+text/plain
\ No newline at end of property
Index: javasrc/codec/org/etsi/ttcn/codec/its/adapter/Plugin.java
===================================================================
--- javasrc/codec/org/etsi/ttcn/codec/its/adapter/Plugin.java (revision 2397)
+++ javasrc/codec/org/etsi/ttcn/codec/its/adapter/Plugin.java (revision 2398)
@@ -16,5 +16,7 @@
cf.setCodec(TciTypeClass.UNION, "AdapterControl", "AcGnPrimitive", AcGnPrimitive.class);
cf.setCodec(TciTypeClass.UNION, "AdapterControl", "AcGnResponse", AcGnResponse.class);
cf.setCodec(TciTypeClass.UNION, "AdapterControl", "AcFsapPrimitive", AcFsapPrimitive.class);
+ cf.setCodec(TciTypeClass.UNION, "AdapterControl", "AcGnssPrimitive", AcGnssPrimitive.class);
+ cf.setCodec(TciTypeClass.BOOLEAN, "AdapterControl", "AcGnssResponse", AcGnssResponse.class);
}
}
\ No newline at end of file
Index: javasrc/codec/org/etsi/ttcn/codec/its/uppertester/UtPduId.java
===================================================================
--- javasrc/codec/org/etsi/ttcn/codec/its/uppertester/UtPduId.java (revision 2397)
+++ javasrc/codec/org/etsi/ttcn/codec/its/uppertester/UtPduId.java (revision 2398)
@@ -17,6 +17,10 @@
UtChangePositionResult(0x03),
UtChangePseudonym(0x04),
UtChangePseudonymResult(0x05),
+ UtActivatePositionTime(0x06),
+ UtActivatePositionTimeResult(0x07),
+ UtDeactivatePositionTime(0x08),
+ UtDeactivatePositionTimeResult(0x09),
UtResult(0x24), // FIXME: obsolete
/* From LibItsDenm_TypesAndValues */
/trunk/javasrc/extfunc/org/etsi/its/extfunc/IItsExternalFunctionsProvider.java
52,7 → 52,7
* TTCN-3 signature:
* external function fx_computePositionUsingDistance(in UInt32 p_refLatitude, in Uint32 p_refLongitude, in integer p_distance, in integer p_orientation, out UInt32 p_latitude, out UInt32 p_longitude);
*/
public void fx_computePositionUsingDistance(final IntegerValue p_refLatitude, final IntegerValue p_refLongitude, final IntegerValue p_distance, final IntegerValue p_orientation, IntegerValue p_latitude, IntegerValue p_longitude);
public void fx_computePositionUsingDistance(final IntegerValue p_refLatitude, final IntegerValue p_refLongitude, final FloatValue p_distance, final IntegerValue p_orientation, IntegerValue p_latitude, IntegerValue p_longitude);
/**
* External function to compute radius of a given circular area
/trunk/javasrc/extfunc/org/etsi/its/extfunc/ItsExternalFunctionsProvider.java
16,6 → 16,9
import java.util.ArrayList;
import java.util.logging.Logger;
 
import org.etsi.adapter.GnssSupportFactory;
import org.etsi.adapter.IGnssSupport;
import org.etsi.adapter.TERFactory;
import org.etsi.certificates.CertificatesIOFactory;
import org.etsi.certificates.io.ICertificatesIO;
import org.etsi.codec.ITciCDWrapper;
67,6 → 70,10
 
private static final long ITS_REF_TIME = 1072915200000L;
 
private static final String GNSS_SCENARIO_SUPPORT = "GnssScenarioSupport";
private IGnssSupport GNSS;
private boolean gnssScenarioSupport;
/**
* Reference to the ePassport files manager
*/
80,6 → 87,16
String.format("version:%s", Version));
 
_tcicdWrapper = TciCDWrapperFactory.getTciCDInstance();
try {
gnssScenarioSupport = ((BooleanValue) TERFactory.getInstance().getTaParameter(GNSS_SCENARIO_SUPPORT)).getBoolean();
}
catch (Throwable th) {
gnssScenarioSupport = false;
}
if (gnssScenarioSupport) {
GNSS = GnssSupportFactory.getInstance();
}
}
 
/**
92,11 → 109,15
*/
@Override
public synchronized IntegerValue fx_getCurrentTime() {
IntegerValue now = null;
_logger.entering("ItsExternalFunctionsProvider", "fx_getCurrentTime");
if (gnssScenarioSupport) {
now = _tcicdWrapper.setInteger(GNSS.getGpsTime());
}
else {
String datestr="01/01/2004 00:00:00 +0000";
DateFormat formatter = new SimpleDateFormat("MM/dd/yyyy hh:mm:ss Z");
IntegerValue now = null;
try {
// System.out.println("ItsExternalFunctionsProvider.fx_getCurrentTime: " + ((java.util.Date)formatter.parse(datestr)).getTime());
now = _tcicdWrapper.setInteger(
110,6 → 131,7
}
_logger.exiting("ItsExternalFunctionsProvider", "fx_getCurrentTime", String.format("%10d", _tcicdWrapper.getBigInteger(now)));
}
return now;
} // End of method fx_getCurrentTime
 
184,7 → 206,7
@Override
public synchronized void fx_computePositionUsingDistance(
final IntegerValue p_refLatitude,
final IntegerValue p_refLongitude, final IntegerValue p_distance,
final IntegerValue p_refLongitude, final FloatValue p_distance,
final IntegerValue p_orientation, IntegerValue p_latitude,
IntegerValue p_longitude) {
// _logger.entering(
193,7 → 215,9
// String.format("%d, %d", p_distance.getInteger(),
// p_orientation.getInteger()));
 
double angularD = new Double(_tcicdWrapper.getInteger(p_distance)) / earthRadius;
FloatValue v_distance = _tcicdWrapper.getFloat();
v_distance.setFloat(p_distance.getFloat());
double angularD = new Double(v_distance.getFloat()) / earthRadius;
double radHeading = new Double(_tcicdWrapper.getInteger(p_orientation)) * Math.PI / 180;
 
// Convert to rad
/trunk/javasrc/tool/org/etsi/its/tool/testingtech/ExternalFunctionsPluginProvider.java
92,7 → 92,7
@Override
public void fx_computePositionUsingDistance(
IntegerValue p_refLatitude, IntegerValue p_refLongitude,
IntegerValue pDistance, IntegerValue pOrientation,
FloatValue pDistance, IntegerValue pOrientation,
IntegerValue pLatitude, IntegerValue pLongitude) {
_externalFunctionsPluginProvider.fx_computePositionUsingDistance(p_refLatitude, p_refLongitude, pDistance, pOrientation, pLatitude, pLongitude);
}
/trunk/javasrc/tool/org/etsi/its/tool/testingtech/GnssRemoteControl.java
0,0 → 1,591
/*
* ----------------------------------------------------------------------------
* (C) Copyright Testing Technologies, 2001-2016. All Rights Reserved.
*
* All copies of this program, whether in whole or in part, and whether
* modified or not, must display this and all other embedded copyright
* and ownership notices in full.
*
* See the file COPYRIGHT for details of redistribution and use.
*
* You should have received a copy of the COPYRIGHT file along with
* this file; if not, write to the Testing Technologies,
* Michaelkirchstr. 17/18, 10179 Berlin, Germany.
*
* TESTING TECHNOLOGIES DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS
* SOFTWARE. IN NO EVENT SHALL TESTING TECHNOLOGIES BE LIABLE FOR ANY
* SPECIAL, DIRECT, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
* AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION,
* ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF
* THIS SOFTWARE.
*
* THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND,
* EITHER EXPRESSED OR IMPLIED, INCLUDING ANY KIND OF IMPLIED OR
* EXPRESSED WARRANTY OF NON-INFRINGEMENT OR THE IMPLIED WARRANTIES
* OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
*
* ----------------------------------------------------------------------------- */
package org.etsi.its.tool.testingtech;
 
import java.io.ByteArrayInputStream;
import java.io.IOException;
import java.math.BigInteger;
import java.net.DatagramPacket;
import java.net.DatagramSocket;
import java.net.Socket;
import java.net.SocketException;
import java.net.SocketTimeoutException;
import java.text.DateFormat;
import java.text.ParseException;
import java.text.SimpleDateFormat;
import java.util.Date;
 
import javax.xml.parsers.ParserConfigurationException;
import javax.xml.parsers.SAXParser;
import javax.xml.parsers.SAXParserFactory;
 
import org.etsi.adapter.IGnssSupport;
import org.etsi.adapter.TERFactory;
import org.etsi.common.ByteHelper;
import org.etsi.its.adapter.ports.AdapterControlPort;
import org.etsi.its.adapter.ports.AdapterPort;
import org.etsi.its.adapter.ports.PortEvent;
import org.etsi.ttcn.tci.CharstringValue;
import org.etsi.ttcn.tri.TriStatus;
import org.xml.sax.Attributes;
import org.xml.sax.SAXException;
import org.xml.sax.helpers.DefaultHandler;
 
import com.testingtech.ttcn.tci.codec.tabular.TabularDecoder;
import com.testingtech.ttcn.tci.codec.tabular.TabularException;
import com.testingtech.ttcn.tri.TriStatusImpl;
import com.testingtech.util.BitArrayInputStream;
import com.testingtech.util.BitArrayInputStream.Endianness;
import com.testingtech.util.ReferenceObject;
 
public class GnssRemoteControl implements IGnssSupport {
private final String STATUS_START = "<status>";
private final String STATUS_END = "</status>";
 
private final String DATA_START = "<data>";
private final String DATA_END = "</data>";
 
private Socket soc = null;
private static Boolean receiverRunning = false;
private static GnssRemoteControl gnssRC = null;
private boolean debug = true;
public static GnssRemoteControl getInstance() {
if (gnssRC == null){
gnssRC = new GnssRemoteControl();
}
return gnssRC;
}
 
public TriStatus init() {
return TriStatusImpl.OK;
}
public static void main(String[] args) {
try {
for (int i = 0; i < 1; i++) {
GnssRemoteControl grc = GnssRemoteControl.getInstance();
grc.showMessage("Now controlled by TTwborkbench");
grc.loadScenario(1500);
// grc.getScenarioName();
// grc.getScenarioStatus();
// grc.getScenarioDuration();
grc.startScenario();
// grc.awaitDistanceToCover(new AdapterControlPort("test", "TestComp"), 200.0);
grc.getGpsTime();
// grc.getScenarioStatus();
grc.stopScenario();
// grc.getScenarioStatus();
}
} catch (Throwable th) {
th.printStackTrace();
}
}
public void dispose() {
try {
System.out.println("+++++++++++++++++++++++++++++++++++++++++++++");
System.out.println("CLOSING");
System.out.println("+++++++++++++++++++++++++++++++++++++++++++++");
if (soc!=null) {
soc.close();
soc = null;
}
gnssRC = null;
} catch (IOException e) {
e.printStackTrace();
}
}
private String getScenario(int p_id) throws Exception {
String result;
String scenario;
switch (p_id) {
case 0:
// result = "c:\\Program Files (x86)\\Spirent Communications\\Positioning Application\\Scenarios\\C2C\\StaticPos\\StaticPos.scn";
scenario = "GnssScenario_StaticPos";
break;
case 200:
// result = "C:\\Program Files (x86)\\Spirent Communications\\Positioning Application\\Scenarios\\C2C\\DynamicPos1000m\\DynamicPos200m.scn";
scenario = "GnssScenario_DynamicPos200m";
break;
case 1000:
// result = "C:\\Program Files (x86)\\Spirent Communications\\Positioning Application\\Scenarios\\C2C\\DynamicPos1000m\\DynamicPos1000m.scn";
scenario = "GnssScenario_DynamicPos1000m";
break;
case 1500:
// return "C:\\Program Files (x86)\\Spirent Communications\\Positioning Application\\Scenarios\\C2C\\DynamicPos1500m\\DynamicPos1500m.scn";
scenario = "GnssScenario_DynamicPos1500m";
break;
// case 4:
// return "C:\\Program Files (x86)\\Spirent Communications\\Positioning Application\\Scenarios\\C2C\\DynamicPos1500m_straight\\DynamicPos1500m_straight.scn";
default:
throw new Exception(p_id + ": Unknown scenario identification");
}
try {
result = ((CharstringValue)TERFactory.getInstance().getTaParameter(scenario)).getString();
}
catch (Exception e) {
throw new Exception("Could not retrieve TA parameter " + scenario + ". Check configuration.");
}
return result;
}
public int showMessage(String msg) {
return handleCommand("MESSAGE,TTCN-3,Info,"+msg);
}
 
public boolean loadScenario(int p_id) {
try {
boolean result= 2 == handleCommand("SC,"+getScenario(p_id));
return result && enableDataStreaming();
} catch (Throwable th) {
th.printStackTrace();
return false;
}
}
 
public int getScenarioName() {
return handleCommand("SC_NAME");
}
 
public int getScenarioDuration() {
return handleCommand("SC_DURATION");
}
 
public int getScenarioStatus() {
return handleCommand("NULL");
}
 
public boolean enableDataStreaming() {
String address;
try {
try {
address = ((CharstringValue)TERFactory.getInstance().getTaParameter("TestSystemIpAddress")).getString();
}
catch (Throwable th) {
address = "10.73.100.38";
}
}
catch (Throwable th) {
th.printStackTrace();
return false;
}
boolean result = 2==handleCommand("DS_ENABLE,1");
handleCommand("DS_INFO");
if (result) {
result = 2==handleCommand("DS_IP,"+address);
}
if (result) {
result = 2==handleCommand("DS_VEH_MOT,v1,1");
}
if (result) {
result = 2==handleCommand("DS_VEH_CMS,v1,0");
}
if (result) {
result = 2==handleCommand("DS_SYNC,0");
}
if (result) {
result = 2==handleCommand("DS_STATUS,0");
}
if (result) {
result = 2==handleCommand("DS_ANT_MOT,v1_a1,0");
}
return result;
}
public boolean startScenario() {
int result = handleCommand("RU");
if (result==4) {
while((result = getScenarioStatus())!=5){
try {
Thread.sleep(50);
} catch (InterruptedException e) {
//ignore
}
};
}
return result==5;
}
public boolean stopScenario() {
return 2==handleCommand("-,EN,1");
}
public boolean awaitDistanceToCover(final AdapterPort commPort, final double distance) {
boolean result = false;
try {
final DatagramSocket udpReceiverSoc = new DatagramSocket(15660);
udpReceiverSoc.setSoTimeout(100);
synchronized (receiverRunning) {
receiverRunning = true;
}
new Thread(new Runnable() {
@Override
public void run() {
boolean result = false;
DatagramPacket packet = new DatagramPacket(new byte[1500], 1500);
Double prevLatitude = null;
Double prevLongitude = null;
Double distanceCovered = 0.0;
while(isReceiverRunning()) {
try {
udpReceiverSoc.receive(packet);
byte[] data = packet.getData();
int length = packet.getLength();
byte[] received = new byte[length];
System.arraycopy(data, 0, received, 0, length);
TabularDecoder dec = new TabularDecoder(new BitArrayInputStream(received));
try {
int type = dec.decodeInteger(false, 32, Endianness.LITTLE_ENDIAN);
if (type==0) {
int version = dec.decodeInteger(false, 32, Endianness.LITTLE_ENDIAN);
int time_into_run = dec.decodeInteger(false, 32, Endianness.LITTLE_ENDIAN);
int time_of_validity = dec.decodeInteger(false, 32, Endianness.LITTLE_ENDIAN);
int vehicleNumber = dec.decodeInteger(false, 32, Endianness.LITTLE_ENDIAN);
//skip spare
dec.decodeOctetstring(4);
//skip posn, velocity, acceleration, jerk
dec.decodeOctetstring(96);
BigInteger tmp = dec.decodeBigInteger(false, 64, Endianness.LITTLE_ENDIAN);
double curLatitude = Double.longBitsToDouble(tmp.longValue());
tmp = dec.decodeBigInteger(false, 64, Endianness.LITTLE_ENDIAN);
double curLongitude = Double.longBitsToDouble(tmp.longValue());
if (debug) {
System.out.println("Type : " + type);
System.out.println("Version : " + version);
System.out.println("Time(into run) : " + time_into_run);
System.out.println("Time(validity) : " + time_of_validity);
System.out.println("VehicleNumber : " + vehicleNumber);
System.out.println("Latitude : " + curLatitude);
System.out.println("Longitude : " + curLongitude);
}
if (prevLatitude != null && prevLongitude != null) {
distanceCovered += computeDistance(prevLatitude, curLatitude, prevLongitude, curLongitude);
}
prevLatitude = curLatitude;
prevLongitude = curLongitude;
if (debug) {
System.out.println("Distance: " + distanceCovered);
}
if (distanceCovered>=distance) {
result = true;
stopReceiver();
}
}
} catch (TabularException e) {
e.printStackTrace();
}
} catch (SocketTimeoutException ste) {
//nothing received, ignore
} catch (IOException e) {
e.printStackTrace();
result = false;
stopReceiver();
}
}
udpReceiverSoc.close();
commPort.setChanged();
byte[] response = {(byte)AdapterControlPort.AcGnssDistanceCovered, (byte)(result?AdapterControlPort.AcFalse:AdapterControlPort.AcTrue)};
commPort.notifyObservers(new PortEvent(response, commPort.getPortName(), commPort.getComponentName()));
}
}, "AwaitDistanceCovered").start();
} catch (SocketException e) {
e.printStackTrace();
result = false;
}
return result;
}
public boolean changeSpeed(double speed) {
return false;
}
public boolean changeHeading(double heading) {
return false;
}
public BigInteger getGpsTime() {
boolean result = false;
BigInteger now = null;
long tmpNow = 0;
ReferenceObject<Double> data = new ReferenceObject<Double>(new Double(0));
result = 5==handleCommand("-,GPS_TIME", data);
if (result) {
if (data.get()!=0.0) {
tmpNow = data.get().longValue();
}
else {
result = false;
}
}
//TODO Check if leap seconds should be handled
if (result) {
String gpsdatestr="01/06/1980 00:00:00 +0000";
String itsdatestr="01/01/2004 00:00:00 +0000";
DateFormat formatter = new SimpleDateFormat("MM/dd/yyyy hh:mm:ss Z");
try {
Date gpsInit = formatter.parse(gpsdatestr);
long time = new Date(tmpNow*1000 + gpsInit.getTime()).getTime();
now = new BigInteger(
1,
ByteHelper.longToByteArray(time - ((java.util.Date)formatter.parse(itsdatestr)).getTime(), Long.SIZE / Byte.SIZE)
);
if (debug) {
System.out.println("timeGps : " + time);
time = System.currentTimeMillis();
System.out.println("timeSys : " + time);
System.out.println("now : " + now);
System.out.println("ref : " +
new BigInteger(
1,
ByteHelper.longToByteArray(time - ((java.util.Date)formatter.parse(itsdatestr)).getTime(), Long.SIZE / Byte.SIZE)
).longValue()
);
System.out.println("date : " +
new BigInteger(
1,
ByteHelper.longToByteArray(((java.util.Date)formatter.parse("12/15/2015 00:00:00 +0000")).getTime() - ((java.util.Date)formatter.parse(itsdatestr)).getTime(), Long.SIZE / Byte.SIZE)
).longValue()
);
}
} catch (ParseException e) {
now = BigInteger.ZERO;
}
}
return now;
}
private int handleCommand(String command) {
return handleCommand(command, null);
}
private int handleCommand(String command, ReferenceObject<Double> data) {
if (soc==null) {
try {
String address;
try {
address = ((CharstringValue)TERFactory.getInstance().getTaParameter("GnssControllerAddress")).getString();
}
catch (Throwable th) {
address = "10.73.224.145";
}
soc = new Socket(address, 15650);
}
catch (Throwable th) {
th.printStackTrace();
return -1;
}
}
try {
command += "\r";
System.out.println(new Date().toString());
System.out.println("+++++++++++++++++++++++++++++++++++++++++++++");
System.out.println(command);
System.out.println("+++++++++++++++++++++++++++++++++++++++++++++");
soc.getOutputStream().write(command.getBytes());
soc.getOutputStream().flush();
int read=0;
StringBuffer sb = new StringBuffer();
do {
read = soc.getInputStream().read();
sb.append(new String(new byte[] {(byte) read}));
} while(read!='\r');
String response = sb.toString();
System.out.println(response);
int statusStart = response.indexOf(STATUS_START);
int statusEnd = response.indexOf(STATUS_END, statusStart);
String status = response.substring(statusStart+STATUS_START.length(), statusEnd).trim();
if (data!=null) {
int dataStart = response.indexOf(DATA_START);
if (dataStart!=-1) {
int dataEnd = response.indexOf(DATA_END, dataStart);
if (dataEnd!=-1) {
String dataStr = response.substring(dataStart+DATA_START.length(), dataEnd).trim();
data.set(Double.valueOf(dataStr));
}
}
}
handleResponse(response);
return Integer.valueOf(status);
} catch (Throwable th) {
th.printStackTrace();
return -1;
}
}
private void handleResponse(String response) {
try {
SAXParser parser = SAXParserFactory.newInstance().newSAXParser();
parser.parse(new ByteArrayInputStream(response.getBytes()), new DefaultHandler() {
private boolean inStatus;
private boolean inData;
private boolean inError;
private boolean inFatal;
StringBuffer sb = new StringBuffer();;
/* (non-Javadoc)
* @see org.xml.sax.helpers.DefaultHandler#characters(char[], int, int)
*/
@Override
public void characters(char[] ch, int start, int length)
throws SAXException {
if (inStatus || inData || inError || inFatal) {
sb.append(ch, start, length);
}
super.characters(ch, start, length);
}
/* (non-Javadoc)
* @see org.xml.sax.helpers.DefaultHandler#startElement(java.lang.String, java.lang.String, java.lang.String, org.xml.sax.Attributes)
*/
@Override
public void startElement(String uri, String localName,
String qName, Attributes attributes)
throws SAXException {
localName = getLocalName(localName, qName);
if (localName.equals("status")) {
inStatus=true;
sb.setLength(0);
}
else if (localName.equals("data")) {
inData=true;
sb.setLength(0);
}
else if (localName.equals("error")) {
inError=true;
sb.setLength(0);
}
else if (localName.equals("fatal")) {
inFatal=true;
sb.setLength(0);
}
super.startElement(uri, localName, qName, attributes);
}
@Override
public void endElement(String uri, String localName,
String qName) throws SAXException {
localName = getLocalName(localName, qName);
if (localName.equals("status")) {
inStatus=false;
System.out.println("status: " + sb.toString());
sb.setLength(0);
}
else if (localName.equals("data")) {
inData=false;
System.out.println("data: " + sb.toString());
sb.setLength(0);
}
else if (localName.equals("error")) {
inError=false;
System.out.println("error: " + sb.toString());
sb.setLength(0);
}
else if (localName.equals("fatal")) {
inFatal=false;
System.out.println("fatal: " + sb.toString());
sb.setLength(0);
}
super.endElement(uri, localName, qName);
}
}, null);
} catch (ParserConfigurationException e) {
e.printStackTrace();
} catch (SAXException e) {
e.printStackTrace();
} catch (IOException e) {
e.printStackTrace();
}
}
private String getLocalName(String localName, String qName) {
if (localName.isEmpty()) {
String[] nameParts = qName.split(":",2);
if (nameParts.length==1) {
localName = nameParts[0];
}
else {
localName = nameParts[1];
}
}
return localName;
}
static boolean isReceiverRunning() {
synchronized (receiverRunning) {
return receiverRunning;
}
}
void stopReceiver() {
synchronized (receiverRunning) {
receiverRunning = false;
}
}
double computeDistance(double p_latitudeA, double p_latitudeB, double p_longitudeA, double p_longitudeB) {
double R = 6371000; // m
double dLat = p_latitudeB-p_latitudeA;
double dLon = p_longitudeB-p_longitudeA;
double lat1 = p_latitudeA;
double lat2 = p_latitudeB;
double a = Math.sin(dLat/2) * Math.sin(dLat/2) +
Math.sin(dLon/2) * Math.sin(dLon/2) * Math.cos(lat1) * Math.cos(lat2);
double c = 2 * Math.atan2(Math.sqrt(a), Math.sqrt(1-a));
double d = R * c;
return d;
}
}
Property changes:
Added: svn:eol-style
## -0,0 +1 ##
+native
\ No newline at end of property
Added: svn:keywords
## -0,0 +1 ##
+URL Id
\ No newline at end of property
Added: svn:mime-type
## -0,0 +1 ##
+text/plain
\ No newline at end of property
Index: javasrc/tool/org/etsi/its/tool/testingtech/PluginAdapter.java
===================================================================
--- javasrc/tool/org/etsi/its/tool/testingtech/PluginAdapter.java (revision 2397)
+++ javasrc/tool/org/etsi/its/tool/testingtech/PluginAdapter.java (revision 2398)
@@ -1,5 +1,6 @@
package org.etsi.its.tool.testingtech;
+import org.etsi.adapter.GnssSupportFactory;
import org.etsi.adapter.TERFactory;
import org.etsi.its.adapter.TestAdapter;
import org.etsi.tool.testingtech.TeRequiredImpl;
@@ -67,7 +68,8 @@
@Override
public TriStatus setUp() {
- return new TriStatusImpl();
+ GnssSupportFactory.setImpl(new GnssRemoteControl());
+ return GnssSupportFactory.getInstance().init();
}
@Override
/trunk/requality/TS103096/.settings/org.eclipse.core.resources.prefs
1,107 → 1,318
eclipse.preferences.version=1
encoding//root/Documents/Draft_ETSI_TS_103\ 097\ v1.1.14.xhtml.json=UTF-8
encoding//root/Reports/TPs/TestPurposes(2015-11-25_05-39-03).json=UTF-8
encoding//root/Reports/TPs/TestPurposes(2015-11-25_05-39-03)_resources/tps.html=UTF-8
encoding//root/Documents/ts_103097v010201p.xhtml.json=UTF-8
encoding//root/Documents/ts_103097v010201p.xhtml/076915cc-c9b3-460d-8ba4-388037396737.json=UTF-8
encoding//root/Documents/ts_103097v010201p.xhtml/089844af-89f2-46be-8524-0c02924bcf88.json=UTF-8
encoding//root/Documents/ts_103097v010201p.xhtml/25ae8b7b-7dc7-4009-b85b-fa59fc9c2af9.json=UTF-8
encoding//root/Documents/ts_103097v010201p.xhtml/2db5985a-487f-42be-856c-8eca1ccd20b9.json=UTF-8
encoding//root/Documents/ts_103097v010201p.xhtml/71f5a0ef-5322-4268-8b01-1335de1d68d1.json=UTF-8
encoding//root/Documents/ts_103097v010201p.xhtml/85b0a8d0-308b-43b2-b2b3-3dc2768ee188.json=UTF-8
encoding//root/Documents/ts_103097v010201p.xhtml/f328e6ac-eb81-4136-9747-28296db4885d.json=UTF-8
encoding//root/Documents/ts_103097v010201p.xhtml_resources/ts_103097v010201p.xhtml=UTF-8
encoding//root/Reports/TPs/AllTestPurposes(2016-02-04_06-12-37).json=UTF-8
encoding//root/Reports/TPs/AllTestPurposes(2016-02-04_06-12-37)_resources/tps.html=UTF-8
encoding//root/Reports/TPs/AllTestPurposes(2016-02-05_01-28-57).json=UTF-8
encoding//root/Reports/TPs/AllTestPurposes(2016-02-05_01-28-57)_resources/tps.html=UTF-8
encoding//root/Reports/TPs/AllTestPurposes(2016-02-05_01-31-36).json=UTF-8
encoding//root/Reports/TPs/AllTestPurposes(2016-02-05_01-31-36)_resources/tps.html=UTF-8
encoding//root/Reports/TPs/AllTestPurposes(2016-02-08_01-25-45).json=UTF-8
encoding//root/Reports/TPs/AllTestPurposes(2016-02-08_01-25-45)_resources/tps.html=UTF-8
encoding//root/Reports/TPs/AllTestPurposes(2016-02-10_03-10-16).json=UTF-8
encoding//root/Reports/TPs/AllTestPurposes(2016-02-10_03-10-16)_resources/tps.html=UTF-8
encoding//root/Reports/TPs/AllTestPurposes(2016-02-26_07-32-12).json=UTF-8
encoding//root/Reports/TPs/AllTestPurposes(2016-02-26_07-32-12)_resources/tps.html=UTF-8
encoding//root/Reports/TPs/AllTestPurposes(2016-03-01_01-56-27).json=UTF-8
encoding//root/Reports/TPs/AllTestPurposes(2016-03-01_01-56-27)_resources/tps.html=UTF-8
encoding//root/Reports/TPs/AllTestPurposes(2016-03-17_02-40-37).json=UTF-8
encoding//root/Reports/TPs/AllTestPurposes(2016-03-17_02-40-37)_resources/tps.html=UTF-8
encoding//root/Reports/TPs/AllTestPurposes.json=UTF-8
encoding//root/Reports/TPs/TestPurposes.json=UTF-8
encoding//root/Reports/TTCN.json=UTF-8
encoding//root/Reports/TTCN/TTCN(2015-12-09_04-56-51).json=UTF-8
encoding//root/Reports/TTCN/TTCN(2015-12-09_04-57-49).json=UTF-8
encoding//root/Reports/TTCN/TTCN(2015-12-09_04-57-49)_resources/t3doc.ttcn=UTF-8
encoding//root/Reports/TTCN/TTCN(2015-12-09_05-00-09).json=UTF-8
encoding//root/Reports/TTCN/TTCN(2015-12-09_05-00-09)_resources/t3doc.ttcn=UTF-8
encoding//root/Reports/TTCN/TTCN(2015-12-09_05-02-20).json=UTF-8
encoding//root/Reports/TTCN/TTCN(2015-12-09_05-02-25).json=UTF-8
encoding//root/Reports/TTCN/TTCN(2015-12-09_05-03-01).json=UTF-8
encoding//root/Reports/TTCN/TTCN(2015-12-09_05-05-11).json=UTF-8
encoding//root/Reports/TTCN/TTCN(2015-12-09_05-05-28).json=UTF-8
encoding//root/Reports/TTCN/TTCN(2015-12-09_05-06-10).json=UTF-8
encoding//root/Reports/TTCN/TTCN.json=UTF-8
encoding//root/Requirements.json=UTF-8
encoding//root/Requirements/SEC_ITSS.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_01.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_01/TP_SEC_ITSS_RCV_CAM_01_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_01/TP_SEC_ITSS_RCV_CAM_01_02_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_01/TP_SEC_ITSS_RCV_CAM_01_03_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_02.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_02/TP_SEC_ITSS_RCV_CAM_02_01_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_01_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_02_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_03_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_04_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_05_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_06_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_06a_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_08_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_10_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_11_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_12_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_04/TP_SEC_ITSS_RCV_CAM_04_13_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_05.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_05/TP_SEC_ITSS_RCV_CAM_05_05_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_06.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_06/TP_SEC_ITSS_RCV_CAM_06_01_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_06/TP_SEC_ITSS_RCV_CAM_06_02_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_07.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_07/TP_SEC_ITSS_RCV_CAM_07_01_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_07/TP_SEC_ITSS_RCV_CAM_07_02_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_09/TP_SEC_ITSS_RCV_CAM_09_07_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_10.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_11.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_11/TP_SEC_ITSS_RCV_CAM_11_03_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_12.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_13.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_13/TP_SEC_ITSS_RCV_CAM_13_01_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_13/TP_SEC_ITSS_RCV_CAM_13_02_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_13/TP_SEC_ITSS_RCV_CAM_13_03_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_13/TP_SEC_ITSS_RCV_CAM_13_04_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_13/TP_SEC_ITSS_RCV_CAM_13_05_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CAM/SEC_ITSS_RCV_CAM_13/TP_SEC_ITSS_RCV_CAM_13_06_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_01.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_02.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_03.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_04.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_04/TP_SEC_ITSS_RCV_CERT_04_01_BO/Comment\ 01.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_05.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_06.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_07.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_08.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_03_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_09/TP_SEC_ITSS_RCV_CERT_09_11_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_10.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_10/SEC_ITSS_RCV_CERT_10_01/TP_SEC_ITSS_RCV_CERT_10_01_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_10/SEC_ITSS_RCV_CERT_10_01/TP_SEC_ITSS_RCV_CERT_10_02_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_10/SEC_ITSS_RCV_CERT_10_02.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_10/SEC_ITSS_RCV_CERT_10_02/TP_SEC_ITSS_RCV_CERT_10_03_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_10/SEC_ITSS_RCV_CERT_10_02/TP_SEC_ITSS_RCV_CERT_10_04_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_10/SEC_ITSS_RCV_CERT_10_02/TP_SEC_ITSS_RCV_CERT_10_05_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_10/SEC_ITSS_RCV_CERT_10_02/TP_SEC_ITSS_RCV_CERT_10_06_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_11.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_12.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_12/TP_SEC_ITSS_RCV_CERT_12_02_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_12/TP_SEC_ITSS_RCV_CERT_12_03_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_12/TP_SEC_ITSS_RCV_CERT_12_04_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_13.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_13/TP_SEC_ITSS_RCV_CERT_13_01_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_13/TP_SEC_ITSS_RCV_CERT_13_02_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_13/TP_SEC_ITSS_RCV_CERT_13_03_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_14.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_14/TP_SEC_ITSS_RCV_CERT_14_01_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_14/TP_SEC_ITSS_RCV_CERT_14_02_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_14/TP_SEC_ITSS_RCV_CERT_14_03_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_15.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_15/TP_SEC_ITSS_RCV_CERT_15_01_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_15/TP_SEC_ITSS_RCV_CERT_15_02_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_15/TP_SEC_ITSS_RCV_CERT_15_03_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_16.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_16/TP_SEC_ITSS_RCV_CERT_16_01_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_17.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_17/TP_SEC_ITSS_RCV_CERT_17_01_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_17/TP_SEC_ITSS_RCV_CERT_17_02_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_17/TP_SEC_ITSS_RCV_CERT_17_03_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_17/TP_SEC_ITSS_RCV_CERT_17_04_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_18.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_18/TP_SEC_ITSS_RCV_CERT_18_01_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_18/TP_SEC_ITSS_RCV_CERT_18_02_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_19.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_CERT/SEC_ITSS_RCV_CERT_19/TP_SEC_ITSS_RCV_CERT_19_01_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01/TP_SEC_ITSS_RCV_DENM_01_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01/TP_SEC_ITSS_RCV_DENM_01_02_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01/TP_SEC_ITSS_RCV_DENM_01_03_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01/TP_SEC_ITSS_RCV_DENM_01_04_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_01/TP_SEC_ITSS_RCV_DENM_01_05_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_02.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_02/TP_SEC_ITSS_RCV_DENM_02_01_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_02/TP_SEC_ITSS_RCV_DENM_02_02_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_06a_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_13_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_04/TP_SEC_ITSS_RCV_DENM_04_14_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_05.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_05/TP_SEC_ITSS_RCV_DENM_05_04_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06/TP_SEC_ITSS_RCV_DENM_06_01_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_06/TP_SEC_ITSS_RCV_DENM_06_02_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_07.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_07/TP_SEC_ITSS_RCV_DENM_07_01_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_07/TP_SEC_ITSS_RCV_DENM_07_02_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_08.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_08/TP_SEC_ITSS_RCV_DENM_08_01_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_08/TP_SEC_ITSS_RCV_DENM_08_02_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_08/TP_SEC_ITSS_RCV_DENM_08_03_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_08/TP_SEC_ITSS_RCV_DENM_08_04_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09/TP_SEC_ITSS_RCV_DENM_09_02_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09/TP_SEC_ITSS_RCV_DENM_09_03_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09/TP_SEC_ITSS_RCV_DENM_09_04_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09/TP_SEC_ITSS_RCV_DENM_09_05_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_09/TP_SEC_ITSS_RCV_DENM_09_06_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_10.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_10/TP_SEC_ITSS_RCV_DENM_10_01_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_10/TP_SEC_ITSS_RCV_DENM_10_02_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_11.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_11/TP_SEC_ITSS_RCV_DENM_11_01_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_11/TP_SEC_ITSS_RCV_DENM_11_02_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_12.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_12/TP_SEC_ITSS_RCV_DENM_12_01_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_12/TP_SEC_ITSS_RCV_DENM_12_02_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_13.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_13/TP_SEC_ITSS_RCV_DENM_13_01_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_13/TP_SEC_ITSS_RCV_DENM_13_02_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_13/TP_SEC_ITSS_RCV_DENM_13_03_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_13/TP_SEC_ITSS_RCV_DENM_13_04_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_13/TP_SEC_ITSS_RCV_DENM_13_05_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_DENM/SEC_ITSS_RCV_DENM_13/TP_SEC_ITSS_RCV_DENM_13_06_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_01.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_02.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_06a_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_04/TP_SEC_ITSS_RCV_GENMSG_04_13_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_05.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_05/TP_SEC_ITSS_RCV_GENMSG_05_04_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_06.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_06/TP_SEC_ITSS_RCV_GENMSG_06_01_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_06/TP_SEC_ITSS_RCV_GENMSG_06_02_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_07.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_07/TP_SEC_ITSS_RCV_GENMSG_07_01_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_08.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_09.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_10.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_11.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_11/TP_SEC_ITSS_RCV_GENMSG_11_02_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_12.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_13.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_13/TP_SEC_ITSS_RCV_GENMSG_13_01_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_13/TP_SEC_ITSS_RCV_GENMSG_13_02_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_13/TP_SEC_ITSS_RCV_GENMSG_13_03_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_13/TP_SEC_ITSS_RCV_GENMSG_13_04_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_13/TP_SEC_ITSS_RCV_GENMSG_13_05_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_RCV/SEC_ITSS_RCV_GENMSG/SEC_ITSS_RCV_GENMSG_13/TP_SEC_ITSS_RCV_GENMSG_13_06_BO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_01/TP_SEC_ITSS_SND_CAM_01_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_02.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_02/TP_SEC_ITSS_SND_CAM_02_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_05/TP_SEC_ITSS_SND_CAM_05_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_05/TP_SEC_ITSS_SND_CAM_05_02_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_06.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_06/TP_SEC_ITSS_SND_CAM_06_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_07.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_07/TP_SEC_ITSS_SND_CAM_07_01_TI.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_08.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_08/TP_SEC_ITSS_SND_CAM_08_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_09.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_09/TP_SEC_ITSS_SND_CAM_09_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_10.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_10/TP_SEC_ITSS_SND_CAM_10_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_11.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_12.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_12/TP_SEC_ITSS_SND_CAM_12_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_14.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_14/TP_SEC_ITSS_SND_CAM_14_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_15.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_16.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CAM/SEC_ITSS_SND_CAM_16/TP_SEC_ITSS_SND_CAM_16_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_01.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_01/TP_SEC_ITSS_SND_CERT_01_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_01/TP_SEC_ITSS_SND_CERT_01_02_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_02.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_02/TP_SEC_ITSS_SND_CERT_02_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_04.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_05.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_06.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_06/TP_SEC_ITSS_SND_CERT_06_02_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_07.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_07/TP_SEC_ITSS_SND_CERT_07_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_08.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_08/TP_SEC_ITSS_SND_CERT_08_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_09.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_09/TP_SEC_ITSS_SND_CERT_09_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_09/TP_SEC_ITSS_SND_CERT_09_02_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_12.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_01.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_01/TP_SEC_ITSS_SND_CERT_AA_01_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_02.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_02/TP_SEC_ITSS_SND_CERT_AA_02_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_04.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_04/TP_SEC_ITSS_SND_CERT_AA_04_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_05.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_05/TP_SEC_ITSS_SND_CERT_AA_05_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_06.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_06/TP_SEC_ITSS_SND_CERT_AA_06_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_07.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_08.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_08/TP_SEC_ITSS_SND_CERT_AA_08_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_09.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_10.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AA/SEC_ITSS_SND_CERT_AA_11/TP_SEC_ITSS_SND_CERT_AA_11_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_01.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_01/TP_SEC_ITSS_SND_CERT_AT_01_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_02.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_02/TP_SEC_ITSS_SND_CERT_AT_02_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_03.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_03/TP_SEC_ITSS_SND_CERT_AT_03_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_04.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_04/TP_SEC_ITSS_SND_CERT_AT_04_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_05.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_05/TP_SEC_ITSS_SND_CERT_AT_05_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_06.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_07.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_07/TP_SEC_ITSS_SND_CERT_AT_07_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_08.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_08/TP_SEC_ITSS_SND_CERT_AT_08_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_09.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_09/TP_SEC_ITSS_SND_CERT_AT_09_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_AT/SEC_ITSS_SND_CERT_AT_10.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_04.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_04/TP_SEC_ITSS_SND_CERT_04_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_04/TP_SEC_ITSS_SND_CERT_04_02_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_05.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_05/TP_SEC_ITSS_SND_CERT_05_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_05/TP_SEC_ITSS_SND_CERT_05_02_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_06.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_06/TP_SEC_ITSS_SND_CERT_06_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_06/TP_SEC_ITSS_SND_CERT_06_02_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_06/TP_SEC_ITSS_SND_CERT_06_03_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_CERT/SEC_ITSS_SND_CERT_GEO/SEC_ITSS_SND_CERT_06/TP_SEC_ITSS_SND_CERT_06_04_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_01/TP_SEC_ITSS_SND_DENM_01_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_02.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_02/TP_SEC_ITSS_SND_DENM_02_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_03.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_03/TP_SEC_ITSS_SND_DENM_03_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_04.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_04/TP_SEC_ITSS_SND_DENM_04_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_05.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_05/TP_SEC_ITSS_SND_DENM_05_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_05/TP_SEC_ITSS_SND_DENM_05_02_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_05/TP_SEC_ITSS_SND_DENM_05_03_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_05/TP_SEC_ITSS_SND_DENM_05_04_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_06.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_08.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_09.json=UTF-8
108,14 → 319,29
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_DENM/SEC_ITSS_SND_DENM_10.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_02.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_02/TP_SEC_ITSS_SND_GENMSG_02_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_03.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_03/TP_SEC_ITSS_SND_GENMSG_03_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_04.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_04/TP_SEC_ITSS_SND_GENMSG_04_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_05.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_05/TP_SEC_ITSS_SND_GENMSG_05_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_05/TP_SEC_ITSS_SND_GENMSG_05_02_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_05/TP_SEC_ITSS_SND_GENMSG_05_03_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_05/TP_SEC_ITSS_SND_GENMSG_05_04_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_05/TP_SEC_ITSS_SND_GENMSG_05_05_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_05/TP_SEC_ITSS_SND_GENMSG_05_06_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_06.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_06/TP_SEC_ITSS_SND_GENMSG_06_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_07.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_GENMSG/SEC_ITSS_SND_GENMSG_07/TP_SEC_ITSS_SND_GENMSG_07_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_01.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_01/TP_SEC_ITSS_SND_MSG_01_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_04.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_04/TP_SEC_ITSS_SND_MSG_04_01_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_04/TP_SEC_ITSS_SND_MSG_04_02_BV.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_05.json=UTF-8
encoding//root/Requirements/SEC_ITSS/SEC_ITSS_SND/SEC_ITSS_SND_MSG_05/TP_SEC_ITSS_SND_MSG_05_01_BV.json=UTF-8
encoding//root/ToDoLinks.json=UTF-8
encoding//root/ToDoLinks/link_01.json=UTF-8
encoding//root/ToDoLinks/link_02.json=UTF-8
/trunk/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/076915cc-c9b3-460d-8ba4-388037396737.json
1,10 → 1,19
{
"attributes": {"_type": {
"isGenerated": false,
"key": "_type",
"origin": "076915cc-c9b3-460d-8ba4-388037396737",
"type": "STRING",
"value": "Location"
}},
"attributes": {
"_description": {
"isGenerated": false,
"key": "_description",
"origin": "076915cc-c9b3-460d-8ba4-388037396737",
"type": "STRING",
"value": "Check that the signature contained in the SecuredMessage is calculated over the right fields by cryptographically verifying the signature."
},
"_type": {
"isGenerated": false,
"key": "_type",
"origin": "076915cc-c9b3-460d-8ba4-388037396737",
"type": "STRING",
"value": "Location"
}
},
"uuid": "076915cc-c9b3-460d-8ba4-388037396737"
}
/trunk/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/089844af-89f2-46be-8524-0c02924bcf88.json
1,10 → 1,19
{
"attributes": {"_type": {
"isGenerated": false,
"key": "_type",
"origin": "089844af-89f2-46be-8524-0c02924bcf88",
"type": "STRING",
"value": "Location"
}},
"attributes": {
"_description": {
"isGenerated": false,
"key": "_description",
"origin": "089844af-89f2-46be-8524-0c02924bcf88",
"type": "STRING",
"value": "\r\n"
},
"_type": {
"isGenerated": false,
"key": "_type",
"origin": "089844af-89f2-46be-8524-0c02924bcf88",
"type": "STRING",
"value": "Location"
}
},
"uuid": "089844af-89f2-46be-8524-0c02924bcf88"
}
/trunk/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/25ae8b7b-7dc7-4009-b85b-fa59fc9c2af9.json
0,0 → 1,19
{
"attributes": {
"_description": {
"isGenerated": false,
"key": "_description",
"origin": "25ae8b7b-7dc7-4009-b85b-fa59fc9c2af9",
"type": "STRING",
"value": "assurance_level\n <font xmlns=\"http://www.w3.org/1999/xhtml\" style=\"font-family: Times New Roman;\">\n : this field shall contain the assurance level of the sender or certificate authority<\/font>"
},
"_type": {
"isGenerated": false,
"key": "_type",
"origin": "25ae8b7b-7dc7-4009-b85b-fa59fc9c2af9",
"type": "STRING",
"value": "Location"
}
},
"uuid": "25ae8b7b-7dc7-4009-b85b-fa59fc9c2af9"
}
/trunk/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/2db5985a-487f-42be-856c-8eca1ccd20b9.json
0,0 → 1,19
{
"attributes": {
"_description": {
"isGenerated": false,
"key": "_description",
"origin": "2db5985a-487f-42be-856c-8eca1ccd20b9",
"type": "STRING",
"value": "its_aid\n <font xmlns=\"http://www.w3.org/1999/xhtml\" style=\"font-family: Times New Roman;\">\n : this field shall encode an ITS-AID according to ETSI TS 102 965 [\n <a href=\"REF\">7<\/a>\n ]. This field shall not encode an ITS-AID that is reserved for use with other security profiles.<\/font>"
},
"_type": {
"isGenerated": false,
"key": "_type",
"origin": "2db5985a-487f-42be-856c-8eca1ccd20b9",
"type": "STRING",
"value": "Location"
}
},
"uuid": "2db5985a-487f-42be-856c-8eca1ccd20b9"
}
/trunk/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/71f5a0ef-5322-4268-8b01-1335de1d68d1.json
0,0 → 1,19
{
"attributes": {
"_description": {
"isGenerated": false,
"key": "_description",
"origin": "71f5a0ef-5322-4268-8b01-1335de1d68d1",
"type": "STRING",
"value": "Every certificate containing an\n <font xmlns=\"http://www.w3.org/1999/xhtml\" style=\"font-family: Courier New;\">\n its_aid_list\n <font style=\"font-family: Times New Roman;\">\n or\n <font style=\"font-family: Courier New;\">\n its_aid_ssp_list\n <font style=\"font-family: Times New Roman;\">\n subject attribute shall contain a subset of the permissions that are contained in the certificate referenced by the\n <font style=\"font-family: Courier New;\">\n signer_info<\/font><\/font><\/font><\/font><\/font>"
},
"_type": {
"isGenerated": false,
"key": "_type",
"origin": "71f5a0ef-5322-4268-8b01-1335de1d68d1",
"type": "STRING",
"value": "Location"
}
},
"uuid": "71f5a0ef-5322-4268-8b01-1335de1d68d1"
}
/trunk/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/85b0a8d0-308b-43b2-b2b3-3dc2768ee188.json
0,0 → 1,19
{
"attributes": {
"_description": {
"isGenerated": false,
"key": "_description",
"origin": "85b0a8d0-308b-43b2-b2b3-3dc2768ee188",
"type": "STRING",
"value": "Values in the range of 240 to 255 shall not be used as they are reserved for internal testing purposes"
},
"_type": {
"isGenerated": false,
"key": "_type",
"origin": "85b0a8d0-308b-43b2-b2b3-3dc2768ee188",
"type": "STRING",
"value": "Location"
}
},
"uuid": "85b0a8d0-308b-43b2-b2b3-3dc2768ee188"
}
/trunk/requality/TS103096/root/Documents/ts_103097v010201p.xhtml/f328e6ac-eb81-4136-9747-28296db4885d.json
0,0 → 1,19
{
"attributes": {
"_description": {
"isGenerated": false,
"key": "_description",
"origin": "f328e6ac-eb81-4136-9747-28296db4885d",
"type": "STRING",
"value": "Values in the range of 240 to 255 shall not be used as they are reserved for internal testing purposes."
},
"_type": {
"isGenerated": false,
"key": "_type",
"origin": "f328e6ac-eb81-4136-9747-28296db4885d",
"type": "STRING",
"value": "Location"
}
},
"uuid": "f328e6ac-eb81-4136-9747-28296db4885d"
}
/trunk/requality/TS103096/root/Documents/ts_103097v010201p.xhtml_resources/ts_103097v010201p.xhtml
2120,7 → 2120,7
</p>
<p class="class_31"/>
<p class="class_5">
<font style="font-style: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">This enumeration lists supported algorithms based on public key cryptography. Values in the range of 240 to 255 shall not be used as they are reserved for internal testing purposes.</font>
<font style="font-style: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">This enumeration lists supported algorithms based on public key cryptography. <span class="requality_text id_85b0a8d0-308b-43b2-b2b3-3dc2768ee188"><a class="requality_id" id="id_85b0a8d0-308b-43b2-b2b3-3dc2768ee188" name="85b0a8d0-308b-43b2-b2b3-3dc2768ee188"/>Values in the range of 240 to 255 shall not be used as they are reserved for internal testing purposes</span>.</font>
</p>
<p class="class_26">
<font style="font-style: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">
4452,7 → 4452,7
</p>
<p class="class_31"/>
<p class="class_5">
<font style="font-style: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">This enumeration lists possible region types. Values in the range of 240 to 255 shall not be used as they are reserved for internal testing purposes.</font>
<font style="font-style: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">This enumeration lists possible region types. <span class="requality_text id_f328e6ac-eb81-4136-9747-28296db4885d"><a class="requality_id" id="id_f328e6ac-eb81-4136-9747-28296db4885d" name="f328e6ac-eb81-4136-9747-28296db4885d"/>Values in the range of 240 to 255 shall not be used as they are reserved for internal testing purposes.</span></font>
</p>
<p class="class_26">
<font style="font-style: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">
8989,11 → 8989,11
<p class="class_37 b1+">
<li class="class_36">
<font style="font-family: Courier New; font-size: 10pt; font-style: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">
its_aid
<font style="font-family: Times New Roman;">
<span class="requality_text id_2db5985a-487f-42be-856c-8eca1ccd20b9"><a class="requality_id" id="id_2db5985a-487f-42be-856c-8eca1ccd20b9" name="2db5985a-487f-42be-856c-8eca1ccd20b9"/>its_aid
</span><font style="font-family: Times New Roman;"><span class="requality_text id_2db5985a-487f-42be-856c-8eca1ccd20b9">
: this field shall encode an ITS-AID according to ETSI TS 102 965 [
<a href="REF">7</a>
]. This field shall not encode an ITS-AID that is reserved for use with other security profiles. The present document covers the ITS-AIDs for CAM and DENM.
</span><a href="REF"><span class="requality_text id_2db5985a-487f-42be-856c-8eca1ccd20b9">7</span></a><span class="requality_text id_2db5985a-487f-42be-856c-8eca1ccd20b9">
]. This field shall not encode an ITS-AID that is reserved for use with other security profiles.</span> The present document covers the ITS-AIDs for CAM and DENM.
</font>
</font>
</li>
9196,24 → 9196,21
</p>
<p class="class_37 b1+">
<li class="class_36">
<font style="font-family: Courier New; font-size: 10pt; font-style: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">
assurance_level
<font style="font-family: Times New Roman;">
: this field shall contain the assurance level of the sender or certificate authority.
<span class="requality_text id_a33dda53-c9a9-472b-ad97-a9e461c6df3e">
<a class="requality_id" id="id_a33dda53-c9a9-472b-ad97-a9e461c6df3e" name="a33dda53-c9a9-472b-ad97-a9e461c6df3e"/>
<span class="requality_text id_a5aaa3b8-fe7b-4f50-8dff-a3674829fa6f">
<a class="requality_id" id="id_a5aaa3b8-fe7b-4f50-8dff-a3674829fa6f" name="a5aaa3b8-fe7b-4f50-8dff-a3674829fa6f"/>
A certificate shall contain an assurance level that is equal to or lower than the assurance level of the certificate referenced by the
</span>
<font style="font-family: Times New Roman; font-style: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">
<span class="requality_text id_25ae8b7b-7dc7-4009-b85b-fa59fc9c2af9"><a class="requality_id" id="id_25ae8b7b-7dc7-4009-b85b-fa59fc9c2af9" name="25ae8b7b-7dc7-4009-b85b-fa59fc9c2af9"/>
<font style="font-family: Courier New;">assurance_level</font>
: this field shall contain the assurance level of the sender or certificate authority
</span>.
<span class="requality_text id_a5aaa3b8-fe7b-4f50-8dff-a3674829fa6f">
<a class="requality_id" id="id_a5aaa3b8-fe7b-4f50-8dff-a3674829fa6f" name="a5aaa3b8-fe7b-4f50-8dff-a3674829fa6f"/>
A certificate shall contain an assurance level that is equal to or lower than the assurance level of the certificate referenced by the
<font style="font-family: Courier New;">signer_info</font>
.
</span>
<span class="requality_text id_0c378b8d-b7f5-4102-92db-50cd3f458166">
</span>
<span class="requality_text id_0c378b8d-b7f5-4102-92db-50cd3f458166">
<a class="requality_id" id="id_0c378b8d-b7f5-4102-92db-50cd3f458166" name="0c378b8d-b7f5-4102-92db-50cd3f458166"/>
If the assurance level is unknown for the certificate then the default assurance level 0 shall be used.
</span>
</font>
</span>
</font>
</li>
</p>
9290,12 → 9287,9
or
<font style="font-family: Courier New;">time_start_and_duration</font>
should be preferred.
<span class="requality_text id_8e7d8e4d-7e88-49b1-aff3-5965323ae99d">
<a class="requality_id" id="id_8e7d8e4d-7e88-49b1-aff3-5965323ae99d" name="8e7d8e4d-7e88-49b1-aff3-5965323ae99d"/>
<span class="requality_text id_99a86360-2aa2-4fad-82d3-015c9fa9345d">
<a class="requality_id" id="id_99a86360-2aa2-4fad-82d3-015c9fa9345d" name="99a86360-2aa2-4fad-82d3-015c9fa9345d"/>
If the
</span>
<span class="requality_text id_99a86360-2aa2-4fad-82d3-015c9fa9345d">
<a class="requality_id" id="id_99a86360-2aa2-4fad-82d3-015c9fa9345d" name="99a86360-2aa2-4fad-82d3-015c9fa9345d"/>
If the
<font style="font-family: Courier New;">signer_info</font>
is different from
<font style="font-family: Courier New;">self</font>
9313,12 → 9307,9
</p>
<p class="class_5">
<font style="font-style: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">
<span class="requality_text id_2b9121b8-50e9-4400-903f-eaa36ec0f806">
<a class="requality_id" id="id_2b9121b8-50e9-4400-903f-eaa36ec0f806" name="2b9121b8-50e9-4400-903f-eaa36ec0f806"/>
<span class="requality_text id_5e9ae933-303e-4fa9-8a48-436757e98ab9">
<a class="requality_id" id="id_5e9ae933-303e-4fa9-8a48-436757e98ab9" name="5e9ae933-303e-4fa9-8a48-436757e98ab9"/>
A certificate shall contain a validity restriction of type
</span>
<span class="requality_text id_5e9ae933-303e-4fa9-8a48-436757e98ab9">
<a class="requality_id" id="id_5e9ae933-303e-4fa9-8a48-436757e98ab9" name="5e9ae933-303e-4fa9-8a48-436757e98ab9"/>
A certificate shall contain a validity restriction of type
<font style="font-family: Courier New;">region</font>
, if the certificate referenced by the
<font style="font-family: Courier New;">signer_info</font>
9326,34 → 9317,20
<font style="font-family: Courier New;">region</font>
.
</span>
<span class="requality_text id_f5c4ab1e-0383-4d8d-90f1-386f493614e1">
<a class="requality_id" id="id_f5c4ab1e-0383-4d8d-90f1-386f493614e1" name="f5c4ab1e-0383-4d8d-90f1-386f493614e1"/>
<span class="requality_text id_69c806d3-882e-43b1-b8fe-6dc0c8d1da4c">
<a class="requality_id" id="id_69c806d3-882e-43b1-b8fe-6dc0c8d1da4c" name="69c806d3-882e-43b1-b8fe-6dc0c8d1da4c"/>
Every certificate with a validity restriction of type
</span>
<span class="requality_text id_69c806d3-882e-43b1-b8fe-6dc0c8d1da4c">
<a class="requality_id" id="id_69c806d3-882e-43b1-b8fe-6dc0c8d1da4c" name="69c806d3-882e-43b1-b8fe-6dc0c8d1da4c"/>
Every certificate with a validity restriction of type
<font style="font-family: Courier New;">region</font>
shall contain a region that is covered by the certificate referenced by the
<font style="font-family: Courier New;">signer_info</font>
.
</span>
<span class="requality_text id_f749c280-6cf5-49f8-ade8-feaab09f31e8">
<a class="requality_id" id="id_f749c280-6cf5-49f8-ade8-feaab09f31e8" name="f749c280-6cf5-49f8-ade8-feaab09f31e8"/>
<span class="requality_text id_c223fe50-65bf-48d8-970d-3bd4538c8e94">
<a class="requality_id" id="id_c223fe50-65bf-48d8-970d-3bd4538c8e94" name="c223fe50-65bf-48d8-970d-3bd4538c8e94"/>
For the field
</span>
<span class="requality_text id_c223fe50-65bf-48d8-970d-3bd4538c8e94">
<a class="requality_id" id="id_c223fe50-65bf-48d8-970d-3bd4538c8e94" name="c223fe50-65bf-48d8-970d-3bd4538c8e94"/>
For the field
<font style="font-family: Courier New;">signer_info</font>
, exactly one of the following types shall be included:
</span>
<font style="font-family: Courier New;">
<span class="requality_text id_f749c280-6cf5-49f8-ade8-feaab09f31e8">
<span class="requality_text id_c223fe50-65bf-48d8-970d-3bd4538c8e94">signer_info</span>
</span>
<font style="font-family: Times New Roman;">
<span class="requality_text id_f749c280-6cf5-49f8-ade8-feaab09f31e8">
<span class="requality_text id_c223fe50-65bf-48d8-970d-3bd4538c8e94">, exactly one of the following types shall be included:</span>
</span>
</font>
</font>
</font>
</p>
<ul style="list-style-type: disc; margin: 0in 0in 0in 0.511806in; padding: 0pt; text-indent: -0.314583in; text-align: left;">
9360,9 → 9337,7
<p class="class_37 b1+">
<li class="class_36">
<font style="font-family: Courier New; font-size: 10pt; font-style: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">
<span class="requality_text id_f749c280-6cf5-49f8-ade8-feaab09f31e8">
<span class="requality_text id_c223fe50-65bf-48d8-970d-3bd4538c8e94">certificate_digest_with_sha256</span>
</span>
<span class="requality_text id_c223fe50-65bf-48d8-970d-3bd4538c8e94">certificate_digest_with_sha256</span>
</font>
</li>
</p>
9369,9 → 9344,7
<p class="class_37 b1+">
<li class="class_36">
<font style="font-family: Courier New; font-size: 10pt; font-style: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">
<span class="requality_text id_f749c280-6cf5-49f8-ade8-feaab09f31e8">
<span class="requality_text id_c223fe50-65bf-48d8-970d-3bd4538c8e94">certificate_digest_with_other_algorithm</span>
</span>
<span class="requality_text id_c223fe50-65bf-48d8-970d-3bd4538c8e94">certificate_digest_with_other_algorithm</span>
</font>
</li>
</p>
9378,9 → 9351,7
<p class="class_37 b1+">
<li class="class_36">
<font style="font-family: Courier New; font-size: 10pt; font-style: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">
<span class="requality_text id_f749c280-6cf5-49f8-ade8-feaab09f31e8">
<span class="requality_text id_c223fe50-65bf-48d8-970d-3bd4538c8e94">self</span>
</span>
<span class="requality_text id_c223fe50-65bf-48d8-970d-3bd4538c8e94">self</span>
</font>
</li>
</p>
9488,17 → 9459,17
</ul>
<p class="class_5">
<font style="font-style: normal; font-weight: normal; text-decoration: none; vertical-align: baseline;">
Every certificate containing an
<font style="font-family: Courier New;">
<span class="requality_text id_71f5a0ef-5322-4268-8b01-1335de1d68d1"><a class="requality_id" id="id_71f5a0ef-5322-4268-8b01-1335de1d68d1" name="71f5a0ef-5322-4268-8b01-1335de1d68d1"/>Every certificate containing an
</span><font style="font-family: Courier New;"><span class="requality_text id_71f5a0ef-5322-4268-8b01-1335de1d68d1">
its_aid_list
<font style="font-family: Times New Roman;">
</span><font style="font-family: Times New Roman;"><span class="requality_text id_71f5a0ef-5322-4268-8b01-1335de1d68d1">
or
<font style="font-family: Courier New;">
</span><font style="font-family: Courier New;"><span class="requality_text id_71f5a0ef-5322-4268-8b01-1335de1d68d1">
its_aid_ssp_list
<font style="font-family: Times New Roman;">
</span><font style="font-family: Times New Roman;"><span class="requality_text id_71f5a0ef-5322-4268-8b01-1335de1d68d1">
subject attribute shall contain a subset of the permissions that are contained in the certificate referenced by the
<font style="font-family: Courier New;">
signer_info
</span><font style="font-family: Courier New;"><span class="requality_text id_71f5a0ef-5322-4268-8b01-1335de1d68d1">
signer_info</span>
<font style="font-family: Times New Roman;">
. An
<font style="font-family: Courier New;">
/trunk/requality/TS103096/root/Reports/TPs/AllTestPurposes.json
0,0 → 1,47
{
"attributes": {
"_root_requiremnt_qid": {
"isGenerated": false,
"key": "_root_requiremnt_qid",
"origin": "85900cfa-7722-47ca-873f-22692e87aebc",
"type": "STRING",
"value": "/Requirements/SEC_ITSS"
},
"_template_id": {
"isGenerated": false,
"key": "_template_id",
"origin": "93b1afa4-7003-4bd8-bd45-ea23bb30d129",
"type": "STRING",
"value": "com.unitesk.requality.reports.tps"
},
"_type": {
"isGenerated": false,
"key": "_type",
"origin": "93b1afa4-7003-4bd8-bd45-ea23bb30d129",
"type": "STRING",
"value": "ReportSettings"
},
"showTPStatus": {
"isGenerated": false,
"key": "showTPStatus",
"origin": "85900cfa-7722-47ca-873f-22692e87aebc",
"type": "STRING",
"value": "false"
},
"startLevel": {
"isGenerated": false,
"key": "startLevel",
"origin": "93b1afa4-7003-4bd8-bd45-ea23bb30d129",
"type": "INT",
"value": 1
},
"startPrefix": {
"isGenerated": false,
"key": "startPrefix",
"origin": "93b1afa4-7003-4bd8-bd45-ea23bb30d129",
"type": "STRING",
"value": "5"
}
},
"uuid": "85900cfa-7722-47ca-873f-22692e87aebc"
}
/trunk/requality/TS103096/root/Reports/TPs/TestPurposes.json
21,12 → 21,26
"type": "STRING",
"value": "ReportSettings"
},
"maxTPStatus": {
"isGenerated": false,
"key": "maxTPStatus",
"origin": "93b1afa4-7003-4bd8-bd45-ea23bb30d129",
"type": "STRING",
"value": "complete"
},
"showTPStatus": {
"isGenerated": false,
"key": "showTPStatus",