新三座大山
当高昂的教育、医疗、房价成为重压在中国人身上的新三座大山,诸多行业“内卷”盛行,“躺平”成为全社会高频词时,中国致力于人口均衡发展的三孩政策如何落地见效显然需要更多的组合拳,不仅教育领域,更涉及房地产调控中打击高价学区房以及医疗、户籍等社会管理诸多范畴。
Referenced from:https://cn.reuters.com/article/china-tutoring-wrapup-agencies-0726-mon-idCNKBS2EW0KI?il=0
当高昂的教育、医疗、房价成为重压在中国人身上的新三座大山,诸多行业“内卷”盛行,“躺平”成为全社会高频词时,中国致力于人口均衡发展的三孩政策如何落地见效显然需要更多的组合拳,不仅教育领域,更涉及房地产调控中打击高价学区房以及医疗、户籍等社会管理诸多范畴。
Referenced from:https://cn.reuters.com/article/china-tutoring-wrapup-agencies-0726-mon-idCNKBS2EW0KI?il=0
人口发展无法一蹴而就,但却可以在三孩政策落地窗口期,从推倒影响生育意愿的一座座大山出发,步步为营、夯实地基。期待《决定》内容早日落地,配套支持政策真正发挥其用,让人们在考虑生育问题时少些顾虑,多些底气。
Referenced from:https://finance.sina.com.cn/review/jcgc/2021-07-26/doc-ikqciyzk7620316.shtml
深陷困境的中国恒大周二在港交所发布公告称,综合考虑当下市场环境、股东及债权人权益、集团各产业长远发展等因素,决定取消特别分红方案。
标普全球周一晚间发布评级行动报告,将中国恒大及其子公司恒大地产、天基控股的信用评级从B+调降至B-,且展望负面;理由包括恒大融资渠道收紧将约束其有序减债的能力,因需要更激进价格促销以回笼现金所带来的盈利能力严重下降等。
中国恒大其后回应本地媒体称,对评级机构下调中国恒大评级“深表遗憾和不理解”;并表示境外做空机构频频通过内外联合反复制造舆情,恶意做空恒大股票,造成资本市场对恒大的极大恐慌。
恒大自7月19日以来股价已跌去逾30%。
Referenced from:https://cn.reuters.com/article/china-evergrande-special-dividend-0727-idCNKBS2EX02G?il=0
测试编号:TC_SPDU_TS_BV_16
测试项目:DUT 签发 SPDU 测试
测试目的:验证 DUT 发送的证书申请请求信息是否正确
预置条件:
1) DUT 已加电启动;
2) DUT 已与 GNSS 完成同步;
3) DUT 或测试系统无线信号捕获工具范围内没有其他同类型设备;
4) DUT 已预置了测试系统提供的安全证书及可信根证书列表消息;
5) DUT 除接收测试系统发出的相关指令外,DUT 不会主动发送消息。
测试结构:参见图 1 测试系统架构
测试步骤:
步骤1:配置DUT发送证书申请请求消息;
步骤2:验证DUT发送的证书申请请求信息是否正确。
预期结果:
步骤2中,证书申请请求信息满足如下要求:
➢ version = 1;
➢ 使用证书的私钥可以将消息解密为SignedCertificateRequest;
➢ SignedCertificateRequest的hash算法为sm3;
➢ SignedCertificateRequest.tbsrequest.content的类型为ee-ra;
➢ eeRaCertRequest中证书的类型为explicit;
信息测试XML文件:
<EeRaCertRequestPlainSpdu>
<protocolVersion>3</protocolVersion>
<content>
<signedCertificateRequest>
02 01 87 80 40 01 21 07 F4 1D 00 50 83 00 00 00
00 00 21 07 F4 1D 84 00 A8 83 01 01 80 00 9C 01
05 00 01 6F 00 01 70 00 01 71 00 01 72 00 02 0E
28 80 84 21 82 00 01 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 80 81 10 00 01 00 00 00 00 00 00
00 00 00 00 00 00 00 00 01 82 21 82 00 01 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 81 10 01 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 81 01
01 80 03 00 81 02 15 81 0A 4E 65 75 73 6F 66 74
2E 63 6F 00 00 00 00 00 00 00 00 00 86 00 1E 01
01 00 02 0E 2B 01 01 80 80 01 02 80 01 6F 81 80
01 70 81 01 00 01 82 21 82 6B 27 AB E1 21 6B 84
13 40 13 9D 5E 6A 77 CC A1 64 17 B7 FB A0 96 F8
84 13 82 1B 94 4A 91 FD 18 80 84 21 83 8F FA 8C
04 25 73 BB EF DB 3A D1 0B 38 5C BD 9D DF 4A 54
01 95 91 53 69 82 30 FD 9C A8 3E 66 3D 84 40 93
7B B4 0B BF 7A 68 17 A5 CA E0 9A 60 9B 52 07 B3
12 CA 65 94 AC 99 1E 0A 62 19 75 63 00 4B DF F9
4D ED 69 79 AF E6 9C 5C 28 7F B5 2A E9 2E 7C D0
90 65 59 C1 0A BF 16 4E C8 61 D3 08 44 1E E8 84
40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00
</signedCertificateRequest>
</content>
</EeRaCertRequestPlainSpdu>
其中SignedCertificateRequest 数据为
<SignedCertificateRequest>
<hashId><sm3/></hashId>
<tbsRequest>
<version>1</version>
<content>
<ee-ra>
<eeRaCertRequest>
<version>1</version>
<generationTime>554169373</generationTime>
<type><explicit/></type>
<tbsCert>
<id>
<none></none>
</id>
<cracaId>00 00 00</cracaId>
<crlSeries>0</crlSeries>
<validityPeriod>
<start>554169373</start>
<duration>
<hours>168</hours>
</duration>
</validityPeriod>
<region>
<identifiedRegion>
<countryOnly>156</countryOnly>
</identifiedRegion>
</region>
<appPermissions>
<AidSsp>
<aid>111</aid>
</AidSsp>
<AidSsp>
<aid>112</aid>
</AidSsp>
<AidSsp>
<aid>113</aid>
</AidSsp>
<AidSsp>
<aid>114</aid>
</AidSsp>
<AidSsp>
<aid>3624</aid>
</AidSsp>
</appPermissions>
<verifyKeyIndicator>
<verificationKey>
<ecsigSm2>
<compressed-y-0>
00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
</compressed-y-0>
</ecsigSm2>
</verificationKey>
</verifyKeyIndicator>
</tbsCert>
<additionalParams>
<original>
<signingExpansion>
<sm4>00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00</sm4>
</signingExpansion>
<encryptionKey>
<supportedSymmAlg><sm4Ccm/></supportedSymmAlg>
<publicKey>
<ecencSm2>
<compressed-y-0>
00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
</compressed-y-0>
</ecencSm2>
</publicKey>
</encryptionKey>
<encryptionExpansion>
<sm4>01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00</sm4>
</encryptionExpansion>
</original>
</additionalParams>
</eeRaCertRequest>
</ee-ra>
</content>
</tbsRequest>
<signer>
<certificate>
<Certificate>
<version>3</version>
<type><explicit/></type>
<issuer>
<self><sm3/></self>
</issuer>
<toBeSigned>
<id>
<name>Neusoft.co</name>
</id>
<cracaId>00 00 00</cracaId>
<crlSeries>0</crlSeries>
<validityPeriod>
<start>0</start>
<duration>
<years>30</years>
</duration>
</validityPeriod>
<appPermissions>
<AidSsp>
<aid>3627</aid>
</AidSsp>
</appPermissions>
<certRequestPermissions>
<AidGroupPermissions>
<subjectPermissions>
<explicit>
<AidSspRange>
<aid>111</aid>
<sspRange>
<all></all>
</sspRange>
</AidSspRange>
<AidSspRange>
<aid>112</aid>
<sspRange>
<all></all>
</sspRange>
</AidSspRange>
</explicit>
</subjectPermissions>
<minChainLength>0</minChainLength>
<chainLengthRange>0</chainLengthRange>
</AidGroupPermissions>
</certRequestPermissions>
<encryptionKey>
<supportedSymmAlg><sm4Ccm/></supportedSymmAlg>
<publicKey>
<ecencSm2>
<compressed-y-0>
6B 27 AB E1 21 6B 84 13 40 13 9D 5E 6A 77 CC A1
64 17 B7 FB A0 96 F8 84 13 82 1B 94 4A 91 FD 18
</compressed-y-0>
</ecencSm2>
</publicKey>
</encryptionKey>
<verifyKeyIndicator>
<verificationKey>
<ecsigSm2>
<compressed-y-1>
8F FA 8C 04 25 73 BB EF DB 3A D1 0B 38 5C BD 9D
DF 4A 54 01 95 91 53 69 82 30 FD 9C A8 3E 66 3D
</compressed-y-1>
</ecsigSm2>
</verificationKey>
</verifyKeyIndicator>
</toBeSigned>
<signature>
<sm2Signature>
<rSig>
93 7B B4 0B BF 7A 68 17 A5 CA E0 9A 60 9B 52 07
B3 12 CA 65 94 AC 99 1E 0A 62 19 75 63 00 4B DF
</rSig>
<sSig>
F9 4D ED 69 79 AF E6 9C 5C 28 7F B5 2A E9 2E 7C
D0 90 65 59 C1 0A BF 16 4E C8 61 D3 08 44 1E E8
</sSig>
</sm2Signature>
</signature>
</Certificate>
</certificate>
</signer>
<signature>
<sm2Signature>
<rSig>
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
</rSig>
<sSig>
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
</sSig>
</sm2Signature>
</signature>
</SignedCertificateRequest>
测试编号:TC_SPDU_TS_BV_17
测试项目:DUT 签发 SPDU 测试
测试目的:验证 DUT 发送的证书下载请求信息是否正确
预置条件:
1) DUT 已加电启动;
2) DUT 已与 GNSS 完成同步;
3) DUT 或测试系统无线信号捕获工具范围内没有其他同类型设备;
4) DUT 已预置了测试系统提供的安全证书及可信根证书列表消息;
5) DUT 除接收测试系统发出的相关指令外,DUT 不会主动发送消息。
测试结构:参见图 1 测试系统架构
测试步骤:
步骤1:配置DUT发送证书下载请求消息;
步骤2:验证DUT发送的证书下载请求信息是否正确。
预期结果:
步骤2中,证书下载请求信息满足如下要求:
➢ version = 1;
➢ 使用证书的私钥可以将消息解密为SignedCertificateRequest;
➢ SignedCertificateRequest的hash算法为sm3;
➢ SignedCertificateRequest.tbsrequest.content的类型为ee-ra。
证书下载信息测试XML文件
<EeRaDownloadRequestPlainSpdu>
<protocolVersion>3</protocolVersion>
<content>
<signedData>
<hashId><sm3/></hashId>
<tbsData>
<payload>
<data>
<protocolVersion>3</protocolVersion>
<content>
<unsecuredData>
70 63 5F 64 6F 77 6E 2E 74 78 74 00 00 00 00 00
00 00 00 00
</unsecuredData>
</content>
</data>
</payload>
<headerInfo>
<aid>3267</aid>
<generationTime>0</generationTime>
</headerInfo>
</tbsData>
<signer>
<certificate>
<Certificate>
<version>3</version>
<type><explicit/></type>
<issuer>
<self><sm3/></self>
</issuer>
<toBeSigned>
<id>
<name>Neusoft.co</name>
</id>
<cracaId>00 00 00</cracaId>
<crlSeries>0</crlSeries>
<validityPeriod>
<start>0</start>
<duration>
<years>30</years>
</duration>
</validityPeriod>
<appPermissions>
<AidSsp>
<aid>3627</aid>
</AidSsp>
</appPermissions>
<certRequestPermissions>
<AidGroupPermissions>
<subjectPermissions>
<explicit>
<AidSspRange>
<aid>111</aid>
<sspRange>
<all></all>
</sspRange>
</AidSspRange>
<AidSspRange>
<aid>112</aid>
<sspRange>
<all></all>
</sspRange>
</AidSspRange>
</explicit>
</subjectPermissions>
<minChainLength>0</minChainLength>
<chainLengthRange>0</chainLengthRange>
</AidGroupPermissions>
</certRequestPermissions>
<encryptionKey>
<supportedSymmAlg><sm4Ccm/></supportedSymmAlg>
<publicKey>
<ecencSm2>
<compressed-y-0>
6B 27 AB E1 21 6B 84 13 40 13 9D 5E 6A 77 CC A1
64 17 B7 FB A0 96 F8 84 13 82 1B 94 4A 91 FD 18
</compressed-y-0>
</ecencSm2>
</publicKey>
</encryptionKey>
<verifyKeyIndicator>
<verificationKey>
<ecsigSm2>
<compressed-y-1>
8F FA 8C 04 25 73 BB EF DB 3A D1 0B 38 5C BD 9D
DF 4A 54 01 95 91 53 69 82 30 FD 9C A8 3E 66 3D
</compressed-y-1>
</ecsigSm2>
</verificationKey>
</verifyKeyIndicator>
</toBeSigned>
<signature>
<sm2Signature>
<rSig>
93 7B B4 0B BF 7A 68 17 A5 CA E0 9A 60 9B 52 07
B3 12 CA 65 94 AC 99 1E 0A 62 19 75 63 00 4B DF
</rSig>
<sSig>
F9 4D ED 69 79 AF E6 9C 5C 28 7F B5 2A E9 2E 7C
D0 90 65 59 C1 0A BF 16 4E C8 61 D3 08 44 1E E8
</sSig>
</sm2Signature>
</signature>
</Certificate>
</certificate>
</signer>
<signature>
<sm2Signature>
<rSig>
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
</rSig>
<sSig>
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
</sSig>
</sm2Signature>
</signature>
</signedData>
</content>
</EeRaDownloadRequestPlainSpdu>