NSSCryptoModuleSpec/Section 9: Self Tests: Difference between revisions

From MozillaWiki
Jump to navigation Jump to search
mNo edit summary
mNo edit summary
Line 1: Line 1:
{| border="1" cellpadding="2"
{| border="1" cellpadding="2"
|+
|+
Line 14: Line 13:
Status
Status
|-
|-
| || [http://wiki.mozilla.org/VE_09#VE.09.04.01 VE.09.04.01 ] || ||
|  
'''List every error state & error indicator''' - Document all error states associated with each self-test, and indicate for each error state the expected error indicator.
|| [http://wiki.mozilla.org/VE_09#VE.09.04.01 VE.09.04.01 ] ||  
{| border="1" cellpadding="2"
|+
|-
|'''CKR_USER_NOT_LOGGED_IN''' || User has not logged in by supplying their password to the FIPS-140-1 PKCS#11 module.
|-
|'''CKR_DEVICE_ERROR''' ||  Crypographic operation failure
|-
| '''CKR_HOST_MEMORY''' || Memory allocation failure
|-
|-
| || [http://wiki.mozilla.org/VE_09#VE.09.05.01 VE.09.05.01 ] || ||
|'''CKR_OK''' || Success, no error
|}
||
|-
|-
| || [http://wiki.mozilla.org/VE_09#VE.09.06.01 VE.09.06.01 ] || ||
|  
'''Module in Error State''':
Ensure that cryptographic operations cannot be performed while the module is in the error state. See VE02.06.01 for the vendor design requirement.
||  
[http://wiki.mozilla.org/VE_09#VE.09.05.01 VE.09.05.01 ]  [http://wiki.mozilla.org/VE_09#VE.09.06.01 VE.09.06.01 ]  
||  
'''Power-up Self Test''':
PKCS#11 Initialization (todo: need link to FC_Initialize in fipstokn.c) : As part of the PKCS#11 initialization of the FIPS-140-2 module, any error return
from the battery of self tests will put the PKCS#11
module in the fatalError state. The fatalError state
will inhibit further cryptographic operations.
||
|-
|-
| || [http://wiki.mozilla.org/VE_09#VE.09.07.01 VE.09.07.01 ] || ||
|
'''List of mandatory & optional self-tests performed by the module''' - Provide a list of all self-tests, both mandatory and optional, that the module can perform. This list must include both power-up tests and conditional tests.
||  
[http://wiki.mozilla.org/VE_09#VE.09.07.01 VE.09.07.01 ]  
||  
 
(todo: link to fipstest.c)
 
[[Power up SelfTest Design]]
 
No operator call backs have been implemented
at any point within the power-up self tests. These
tests are mandatory for the FIPS-140-1 mode of
operation.
||
|-
|-
| || [http://wiki.mozilla.org/VE_09#VE.09.07.02 VE.09.07.02 ] || ||
| || [http://wiki.mozilla.org/VE_09#VE.09.07.02 VE.09.07.02 ] || ||

Revision as of 23:27, 11 August 2005

Document Description

 DTR 

Section

 NSS 

Response

Status

List every error state & error indicator - Document all error states associated with each self-test, and indicate for each error state the expected error indicator.

VE.09.04.01
CKR_USER_NOT_LOGGED_IN User has not logged in by supplying their password to the FIPS-140-1 PKCS#11 module.
CKR_DEVICE_ERROR Crypographic operation failure
CKR_HOST_MEMORY Memory allocation failure
CKR_OK Success, no error

Module in Error State: Ensure that cryptographic operations cannot be performed while the module is in the error state. See VE02.06.01 for the vendor design requirement.

VE.09.05.01 VE.09.06.01

Power-up Self Test: PKCS#11 Initialization (todo: need link to FC_Initialize in fipstokn.c) : As part of the PKCS#11 initialization of the FIPS-140-2 module, any error return from the battery of self tests will put the PKCS#11 module in the fatalError state. The fatalError state will inhibit further cryptographic operations.

List of mandatory & optional self-tests performed by the module - Provide a list of all self-tests, both mandatory and optional, that the module can perform. This list must include both power-up tests and conditional tests.

VE.09.07.01

(todo: link to fipstest.c)

Power up SelfTest Design

No operator call backs have been implemented at any point within the power-up self tests. These tests are mandatory for the FIPS-140-1 mode of operation.

VE.09.07.02
VE.09.09.01
VE.09.10.01
VE.09.12.01
VE.09.13.01
VE.09.16.01
VE.09.17.01
VE.09.17.02
VE.09.18.01
VE.09.18.02
VE.09.19.01
VE.09.19.02
VE.09.20.01
VE.09.20.02 (N/A)
VE.09.22.01
VE.09.22.02
VE.09.22.03
VE.09.24.01 (N/A)
VE.09.27.01
VE.09.28.01
VE.09.31.01
VE.09.32.01
VE.09.33.01
VE.09.35.01
VE.09.35.02
VE.09.40.01 (N/A)
VE.09.40.02 (N/A)
VE.09.42.01
VE.09.43.01
VE.09.45.01 (N/A)
VE.09.45.02
VE.09.46.01
VE.09.46.02 (N/A)

Return to: NSSCryptoModuleSpec