NSSCryptoModuleSpec/Section 9: Self Tests: Difference between revisions
mNo edit summary |
mNo edit summary |
||
| Line 1: | Line 1: | ||
{| border="1" cellpadding="2" | {| border="1" cellpadding="2" | ||
|+ | |+ | ||
| Line 14: | Line 13: | ||
Status | Status | ||
|- | |- | ||
| || [http://wiki.mozilla.org/VE_09#VE.09.04.01 VE.09.04.01 ] || || | | | ||
'''List every error state & error indicator''' - Document all error states associated with each self-test, and indicate for each error state the expected error indicator. | |||
|| [http://wiki.mozilla.org/VE_09#VE.09.04.01 VE.09.04.01 ] || | |||
{| border="1" cellpadding="2" | |||
|+ | |||
|- | |||
|'''CKR_USER_NOT_LOGGED_IN''' || User has not logged in by supplying their password to the FIPS-140-1 PKCS#11 module. | |||
|- | |||
|'''CKR_DEVICE_ERROR''' || Crypographic operation failure | |||
|- | |||
| '''CKR_HOST_MEMORY''' || Memory allocation failure | |||
|- | |- | ||
| || | |'''CKR_OK''' || Success, no error | ||
|} | |||
|| | |||
|- | |- | ||
| || [http://wiki.mozilla.org/VE_09#VE.09.06.01 VE.09.06.01 ] || || | | | ||
'''Module in Error State''': | |||
Ensure that cryptographic operations cannot be performed while the module is in the error state. See VE02.06.01 for the vendor design requirement. | |||
|| | |||
[http://wiki.mozilla.org/VE_09#VE.09.05.01 VE.09.05.01 ] [http://wiki.mozilla.org/VE_09#VE.09.06.01 VE.09.06.01 ] | |||
|| | |||
'''Power-up Self Test''': | |||
PKCS#11 Initialization (todo: need link to FC_Initialize in fipstokn.c) : As part of the PKCS#11 initialization of the FIPS-140-2 module, any error return | |||
from the battery of self tests will put the PKCS#11 | |||
module in the fatalError state. The fatalError state | |||
will inhibit further cryptographic operations. | |||
|| | |||
|- | |- | ||
| || [http://wiki.mozilla.org/VE_09#VE.09.07.01 VE.09.07.01 ] || || | | | ||
'''List of mandatory & optional self-tests performed by the module''' - Provide a list of all self-tests, both mandatory and optional, that the module can perform. This list must include both power-up tests and conditional tests. | |||
|| | |||
[http://wiki.mozilla.org/VE_09#VE.09.07.01 VE.09.07.01 ] | |||
|| | |||
(todo: link to fipstest.c) | |||
[[Power up SelfTest Design]] | |||
No operator call backs have been implemented | |||
at any point within the power-up self tests. These | |||
tests are mandatory for the FIPS-140-1 mode of | |||
operation. | |||
|| | |||
|- | |- | ||
| || [http://wiki.mozilla.org/VE_09#VE.09.07.02 VE.09.07.02 ] || || | | || [http://wiki.mozilla.org/VE_09#VE.09.07.02 VE.09.07.02 ] || || | ||
Revision as of 23:27, 11 August 2005
|
Document Description |
DTR Section |
NSS Response |
Status | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
List every error state & error indicator - Document all error states associated with each self-test, and indicate for each error state the expected error indicator. |
VE.09.04.01 |
|
|||||||||
|
Module in Error State: Ensure that cryptographic operations cannot be performed while the module is in the error state. See VE02.06.01 for the vendor design requirement. |
Power-up Self Test: PKCS#11 Initialization (todo: need link to FC_Initialize in fipstokn.c) : As part of the PKCS#11 initialization of the FIPS-140-2 module, any error return from the battery of self tests will put the PKCS#11 module in the fatalError state. The fatalError state will inhibit further cryptographic operations. |
||||||||||
|
List of mandatory & optional self-tests performed by the module - Provide a list of all self-tests, both mandatory and optional, that the module can perform. This list must include both power-up tests and conditional tests. |
(todo: link to fipstest.c) No operator call backs have been implemented at any point within the power-up self tests. These tests are mandatory for the FIPS-140-1 mode of operation. |
||||||||||
| VE.09.07.02 | |||||||||||
| VE.09.09.01 | |||||||||||
| VE.09.10.01 | |||||||||||
| VE.09.12.01 | |||||||||||
| VE.09.13.01 | |||||||||||
| VE.09.16.01 | |||||||||||
| VE.09.17.01 | |||||||||||
| VE.09.17.02 | |||||||||||
| VE.09.18.01 | |||||||||||
| VE.09.18.02 | |||||||||||
| VE.09.19.01 | |||||||||||
| VE.09.19.02 | |||||||||||
| VE.09.20.01 | |||||||||||
| VE.09.20.02 | (N/A) | ||||||||||
| VE.09.22.01 | |||||||||||
| VE.09.22.02 | |||||||||||
| VE.09.22.03 | |||||||||||
| VE.09.24.01 | (N/A) | ||||||||||
| VE.09.27.01 | |||||||||||
| VE.09.28.01 | |||||||||||
| VE.09.31.01 | |||||||||||
| VE.09.32.01 | |||||||||||
| VE.09.33.01 | |||||||||||
| VE.09.35.01 | |||||||||||
| VE.09.35.02 | |||||||||||
| VE.09.40.01 | (N/A) | ||||||||||
| VE.09.40.02 | (N/A) | ||||||||||
| VE.09.42.01 | |||||||||||
| VE.09.43.01 | |||||||||||
| VE.09.45.01 | (N/A) | ||||||||||
| VE.09.45.02 | |||||||||||
| VE.09.46.01 | |||||||||||
| VE.09.46.02 | (N/A) |
Return to: NSSCryptoModuleSpec