asn.1 Update SGP32Definitions to conform to SGP.32 1.0-5

There are secret sub-version numbers in GSMA eSIM specifications.

My original ASN.1 code here was taken from SGP.32-1.0-3.pdf
CreationDate:    Tue May 30 15:45:45 2023 CEST
ModDate:         Tue May 30 15:45:45 2023 CEST

while now there is a SGP.32-1.0-5.pdf which has
CreationDate:    Wed Jun  7 15:30:52 2023 CEST
ModDate:         Wed Jun  7 15:30:52 2023 CEST

And a pdftotext + diff -u reads like this:
--- SGP.32-1.0-3.txt    2023-07-03 18:47:59.517810908 +0200
+++ SGP.32-1.0-5.txt    2023-07-03 18:48:02.217828652 +0200
@@ -2571,20 +2571,20 @@
 counterValue [3] INTEGER OPTIONAL, -- initial counterValue for the eIM
 associationToken [4] INTEGER OPTIONAL,
 eimPublicKeyData [5] CHOICE {
-eimPublicKey [6] SubjectPublicKeyInfo, -- public key of eIM, used for eUICC
+eimPublicKey SubjectPublicKeyInfo, -- public key of eIM, used for eUICC
 Package signature verification, where the encoding follows X.509 standard
-eimCertificate [7] Certificate -- certificate of eIM, used for eUICC Package
+eimCertificate Certificate -- certificate of eIM, used for eUICC Package
 signature verification, where the encoding follows X.509 standard
 } OPTIONAL,
-trustedPublicKeyDataTls [8] CHOICE {
-trustedEimPkTls [9] SubjectPublicKeyInfo, -- public key of eIM, used for TLS or
+trustedPublicKeyDataTls [6] CHOICE {
+trustedEimPkTls SubjectPublicKeyInfo, -- public key of eIM, used for TLS or
 DTLS, where the encoding follows X.509 standard
-trustedCertificateTls [10] Certificate -- either the certificate of eIM, used
-for (D)TLS, or the certificate of the CA, where the encoding follows X.509 standard
+trustedCertificateTls Certificate -- either the certificate of eIM, used for
+(D)TLS, or the certificate of the CA, where the encoding follows X.509 standard
 } OPTIONAL,
-eimSupportedProtocol [11] EimSupportedProtocol OPTIONAL,
-euiccCiPKId [12] SubjectKeyIdentifier OPTIONAL -- CI Public Key Identifier
-supported on the eUICC for signature creation
+eimSupportedProtocol [7] EimSupportedProtocol OPTIONAL,
+euiccCiPKId [8] SubjectKeyIdentifier OPTIONAL -- CI Public Key Identifier supported
+on the eUICC for signature creation
 }
 EimIdType ::= INTEGER {
 eimIdTypeOid(1),
@@ -7860,18 +7860,18 @@
 This function requests the delivery and the binding of a Profile Package for the eUICC.
 This function is correlated to a previous normal execution of an Esipa.AuthenticateClient
 function through a TransactionID delivered by the SM-DP+.
-On reception of this function call, the Eim SHALL call the ES9+’.GetBoundProfilePackage
+On reception of this function call, the eIM SHALL call the ES9+’.GetBoundProfilePackage
 function based on the received input data. The input parameters of this function are identical
 to the those of ES9+.GetBoundProfilePackage defined in section 5.6.2 of SGP.22 [4].
 However, the prepareDownloadResponse is extended according to the below ASN.1 structure
 where a compactDownloadResponseOk is added. An IPA with IPA Capability
 minimizeEsipaBytes SHOULD re-encode a prepareDownloadResponse with
 downloadResponseOk received from eUICC into a prepareDownloadResponse with
-compactDownloadResponseOk in order to reduce the number of bytes to transmit to the Eim.
-Before calling the ES9+’.GetBoundProfilePackage function, an Eim that receives a
+compactDownloadResponseOk in order to reduce the number of bytes to transmit to the eIM.
+Before calling the ES9+’.GetBoundProfilePackage function, an eIM that receives a
 prepareDownloadResponse from an IPA with IPA Capability minimizeEsipaBytes SHALL
 restore the prepareDownloadResponse prepared by the eUICC based on the received
-prepareDownloadResponse and data already available to the Eim (smdpSigned2 and
+prepareDownloadResponse and data already available to the eIM (smdpSigned2 and
 hashCc).
 Additional Input Data:
 Input data name
This commit is contained in:
Harald Welte 2023-07-03 18:52:09 +02:00
parent b987cd9fdc
commit 970c01fc13
1 changed files with 7 additions and 7 deletions

View File

@ -53,15 +53,15 @@ EimConfigurationData ::= SEQUENCE {
counterValue [3] INTEGER OPTIONAL, -- initial counterValue for the eIM
associationToken [4] INTEGER OPTIONAL,
eimPublicKeyData [5] CHOICE {
eimPublicKey [6] SubjectPublicKeyInfo, -- public key of eIM, used for eUICC Package signature verification, where the encoding follows X.509 standard
eimCertificate [7] Certificate -- certificate of eIM, used for eUICC Package signature verification, where the encoding follows X.509 standard
eimPublicKey SubjectPublicKeyInfo, -- public key of eIM, used for eUICC Package signature verification, where the encoding follows X.509 standard
eimCertificate Certificate -- certificate of eIM, used for eUICC Package signature verification, where the encoding follows X.509 standard
} OPTIONAL,
trustedPublicKeyDataTls [8] CHOICE {
trustedEimPkTls [9] SubjectPublicKeyInfo, -- public key of eIM, used for TLS or DTLS, where the encoding follows X.509 standard
trustedCertificateTls [10] Certificate -- either the certificate of eIM, used for (D)TLS, or the certificate of the CA, where the encoding follows X.509 standard
trustedPublicKeyDataTls [6] CHOICE {
trustedEimPkTls SubjectPublicKeyInfo, -- public key of eIM, used for TLS or DTLS, where the encoding follows X.509 standard
trustedCertificateTls Certificate -- either the certificate of eIM, used for (D)TLS, or the certificate of the CA, where the encoding follows X.509 standard
} OPTIONAL,
eimSupportedProtocol [11] EimSupportedProtocol OPTIONAL,
euiccCiPKId [12] SubjectKeyIdentifier OPTIONAL -- CI Public Key Identifier supported on the eUICC for signature creation
eimSupportedProtocol [7] EimSupportedProtocol OPTIONAL,
euiccCiPKId [8] SubjectKeyIdentifier OPTIONAL -- CI Public Key Identifier supported on the eUICC for signature creation
}
EimIdType ::= INTEGER {
eimIdTypeOid(1),