| Certutil Tests |
| Test Case | Result |
| Creating CA Cert DB | Passed |
| Creating CA Cert TestCA | Passed |
| Exporting Root Cert | Passed |
| Creating CA Cert DB | Passed |
| Creating CA Cert serverCA | Passed |
| Exporting Root Cert | Passed |
| Creating CA Cert chain-1-serverCA | Passed |
| Exporting Root Cert | Passed |
| Creating CA Cert chain-2-serverCA | Passed |
| Exporting Root Cert | Passed |
| Creating CA Cert DB | Passed |
| Creating CA Cert clientCA | Passed |
| Exporting Root Cert | Passed |
| Creating CA Cert chain-1-clientCA | Passed |
| Exporting Root Cert | Passed |
| Creating CA Cert chain-2-clientCA | Passed |
| Exporting Root Cert | Passed |
| Initializing spd04.mcom.com's Cert DB (ext.) | Passed |
| Generate Cert Request for spd04.mcom.com (ext) | Passed |
| Sign spd04.mcom.com's Request (ext) | Passed |
| Import spd04.mcom.com's Cert -t u,u,u (ext) | Passed |
| Import Client Root CA -t T,, for spd04.mcom.com (ext.) | Passed |
| Import serverCA CA -t C,C,C for spd04.mcom.com (ext.) | Passed |
| Import chain-1-serverCA CA -t u,u,u for spd04.mcom.com (ext.) | Passed |
| Import chain-2-serverCA CA -t u,u,u for spd04.mcom.com (ext.) | Passed |
| Initializing ExtendedSSLUser's Cert DB (ext.) | Passed |
| Generate Cert Request for ExtendedSSLUser (ext) | Passed |
| Sign ExtendedSSLUser's Request (ext) | Passed |
| Import ExtendedSSLUser's Cert -t u,u,u (ext) | Passed |
| Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) | Passed |
| Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) | Passed |
| Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) | Passed |
| Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) | Passed |
| Initializing TestUser's Cert DB | Passed |
| Import Root CA for TestUser | Passed |
| Generate Cert Request for TestUser | Passed |
| Sign TestUser's Request | Passed |
| Import TestUser's Cert | Passed |
| Initializing spd04.mcom.com's Cert DB | Passed |
| Import Root CA for spd04.mcom.com | Passed |
| Generate Cert Request for spd04.mcom.com | Passed |
| Sign spd04.mcom.com's Request | Passed |
| Import spd04.mcom.com's Cert | Passed |
| Import spd04.mcom.com's Cert | Passed |
| Initializing Alice's Cert DB | Passed |
| Import Root CA for Alice | Passed |
| Generate Cert Request for Alice | Passed |
| Sign Alice's Request | Passed |
| Import Alice's Cert | Passed |
| Initializing Bob's Cert DB | Passed |
| Import Root CA for Bob | Passed |
| Generate Cert Request for Bob | Passed |
| Sign Bob's Request | Passed |
| Import Bob's Cert | Passed |
| Initializing Dave's Cert DB | Passed |
| Import Root CA for Dave | Passed |
| Generate Cert Request for Dave | Passed |
| Sign Dave's Request | Passed |
| Import Dave's Cert | Passed |
| Initializing Eve's Cert DB | Passed |
| Import Root CA for Eve | Passed |
| Generate Cert Request for Eve | Passed |
| Sign Eve's Request | Passed |
| Import Eve's Cert | Passed |
| Import Alices's cert into Bob's db | Passed |
| Import Bob's cert into Alice's db | Passed |
| Import Dave's cert into Alice's DB | Passed |
| Import Dave's cert into Bob's DB | Passed |
| Import Eve's cert into Alice's DB | Passed |
| Import Eve's cert into Bob's DB | Passed |
| Initializing FIPS PUB 140-1 Test Certificate's Cert DB | Passed |
| Enable FIPS mode on database for FIPS PUB 140-1 Test Certificate | Passed |
| Generate Certificate for FIPS PUB 140-1 Test Certificate | Passed |
| SSL Cipher Coverage |
| Test Case | Result |
| SSL2 RC4 128 WITH MD5 | Passed |
| SSL2 RC4 128 EXPORT40 WITH MD5 | Passed |
| SSL2 RC2 128 CBC WITH MD5 | Passed |
| SSL2 RC2 128 CBC EXPORT40 WITH MD5 | Passed |
| SSL2 DES 64 CBC WITH MD5 | Passed |
| SSL2 DES 192 EDE3 CBC WITH MD5 | Passed |
| SSL3 RSA WITH RC4 128 MD5 | Passed |
| SSL3 RSA WITH 3DES EDE CBC SHA | Passed |
| SSL3 RSA WITH DES CBC SHA | Passed |
| SSL3 RSA EXPORT WITH RC4 40 MD5 | Passed |
| SSL3 RSA EXPORT WITH RC2 CBC 40 MD5 | Passed |
| SSL3 RSA WITH NULL MD5 | Passed |
| SSL3 RSA FIPS WITH 3DES EDE CBC SHA | Passed |
| SSL3 RSA FIPS WITH DES CBC SHA | Passed |
| SSL3 RSA EXPORT WITH DES CBC SHA (new) | Passed |
| SSL3 RSA EXPORT WITH RC4 56 SHA (new) | Passed |
| SSL3 RSA WITH RC4 128 SHA | Passed |
| SSL3 RSA WITH AES 128 CBC SHA | Passed |
| SSL3 RSA WITH AES 256 CBC SHA | Passed |
| SSL3 RSA WITH NULL SHA | Passed |
| TLS RSA WITH RC4 128 MD5 | Passed |
| TLS RSA WITH 3DES EDE CBC SHA | Passed |
| TLS RSA WITH DES CBC SHA | Passed |
| TLS RSA EXPORT WITH RC4 40 MD5 | Passed |
| TLS RSA EXPORT WITH RC2 CBC 40 MD5 | Passed |
| TLS RSA WITH NULL MD5 | Passed |
| TLS RSA FIPS WITH 3DES EDE CBC SHA | Passed |
| TLS RSA FIPS WITH DES CBC SHA | Passed |
| TLS RSA EXPORT WITH DES CBC SHA (new) | Passed |
| TLS RSA EXPORT WITH RC4 56 SHA (new) | Passed |
| TLS RSA WITH RC4 128 SHA | Passed |
| TLS RSA WITH AES 128 CBC SHA | Passed |
| TLS RSA WITH AES 256 CBC SHA | Passed |
| TLS RSA WITH NULL SHA | Passed |
| SSL Client Authentication |
| Test Case | Result |
| TLS Request don't require client auth (client does not provide auth) | Passed |
| TLS Request don't require client auth (bad password) | Passed |
| TLS Request don't require client auth (client auth) | Passed |
| TLS Require client auth (client does not provide auth) | Passed |
| TLS Require client auth (bad password) | Passed |
| TLS Require client auth (client auth) | Passed |
| SSL3 Request don't require client auth (client does not provide auth) | Passed |
| SSL3 Request don't require client auth (bad password) | Passed |
| SSL3 Request don't require client auth (client auth) | Passed |
| SSL3 Require client auth (client does not provide auth) | Passed |
| SSL3 Require client auth (bad password) | Passed |
| SSL3 Require client auth (client auth) | Passed |
| TLS Request don't require client auth on 2nd hs (client does not provide auth) | Passed |
| TLS Request don't require client auth on 2nd hs (bad password) | Passed |
| TLS Request don't require client auth on 2nd hs (client auth) | Passed |
| TLS Require client auth on 2nd hs (client does not provide auth) | Passed |
| TLS Require client auth on 2nd hs (bad password) | Passed |
| TLS Require client auth on 2nd hs (client auth) | Passed |
| SSL3 Request don't require client auth on 2nd hs (client does not provide auth) | Passed |
| SSL3 Request don't require client auth on 2nd hs (bad password) | Passed |
| SSL3 Request don't require client auth on 2nd hs (client auth) | Passed |
| SSL3 Require client auth on 2nd hs (client does not provide auth) | Passed |
| SSL3 Require client auth on 2nd hs (bad password) | Passed |
| SSL3 Require client auth on 2nd hs (client auth) | Passed |
| SSL Cipher Coverage Extended test |
| Test Case | Result |
| SSL3 RSA WITH RC4 128 MD5 | Passed |
| SSL3 RSA WITH 3DES EDE CBC SHA | Passed |
| SSL3 RSA WITH DES CBC SHA | Passed |
| SSL3 RSA EXPORT WITH RC4 40 MD5 | Passed |
| SSL3 RSA EXPORT WITH RC2 CBC 40 MD5 | Passed |
| SSL3 RSA WITH NULL MD5 | Passed |
| SSL3 RSA FIPS WITH 3DES EDE CBC SHA | Passed |
| SSL3 RSA FIPS WITH DES CBC SHA | Passed |
| SSL3 RSA EXPORT WITH DES CBC SHA (new) | Passed |
| SSL3 RSA EXPORT WITH RC4 56 SHA (new) | Passed |
| SSL3 RSA WITH RC4 128 SHA | Passed |
| SSL3 RSA WITH AES 128 CBC SHA | Passed |
| SSL3 RSA WITH AES 256 CBC SHA | Passed |
| SSL3 RSA WITH NULL SHA | Passed |
| TLS RSA WITH RC4 128 MD5 | Passed |
| TLS RSA WITH 3DES EDE CBC SHA | Passed |
| TLS RSA WITH DES CBC SHA | Passed |
| TLS RSA EXPORT WITH RC4 40 MD5 | Passed |
| TLS RSA EXPORT WITH RC2 CBC 40 MD5 | Passed |
| TLS RSA WITH NULL MD5 | Passed |
| TLS RSA FIPS WITH 3DES EDE CBC SHA | Passed |
| TLS RSA FIPS WITH DES CBC SHA | Passed |
| TLS RSA EXPORT WITH DES CBC SHA (new) | Passed |
| TLS RSA EXPORT WITH RC4 56 SHA (new) | Passed |
| TLS RSA WITH RC4 128 SHA | Passed |
| TLS RSA WITH AES 128 CBC SHA | Passed |
| TLS RSA WITH AES 256 CBC SHA | Passed |
| TLS RSA WITH NULL SHA | Passed |
| SSL Client Authentication Extended test |
| Test Case | Result |
| TLS Request don't require client auth (client does not provide auth) | Passed |
| TLS Request don't require client auth (bad password) | Passed |
| TLS Request don't require client auth (client auth) | Passed |
| TLS Require client auth (client does not provide auth) | Passed |
| TLS Require client auth (bad password) | Passed |
| TLS Require client auth (client auth) | Passed |
| SSL3 Request don't require client auth (client does not provide auth) | Passed |
| SSL3 Request don't require client auth (bad password) | Passed |
| SSL3 Request don't require client auth (client auth) | Passed |
| SSL3 Require client auth (client does not provide auth) | Passed |
| SSL3 Require client auth (bad password) | Passed |
| SSL3 Require client auth (client auth) | Passed |
| TLS Request don't require client auth on 2nd hs (client does not provide auth) | Passed |
| TLS Request don't require client auth on 2nd hs (bad password) | Passed |
| TLS Request don't require client auth on 2nd hs (client auth) | Passed |
| TLS Require client auth on 2nd hs (client does not provide auth) | Passed |
| TLS Require client auth on 2nd hs (bad password) | Passed |
| TLS Require client auth on 2nd hs (client auth) | Passed |
| SSL3 Request don't require client auth on 2nd hs (client does not provide auth) | Passed |
| SSL3 Request don't require client auth on 2nd hs (bad password) | Passed |
| SSL3 Request don't require client auth on 2nd hs (client auth) | Passed |
| SSL3 Require client auth on 2nd hs (client does not provide auth) | Passed |
| SSL3 Require client auth on 2nd hs (bad password) | Passed |
| SSL3 Require client auth on 2nd hs (client auth) | Passed |
| S/MIME Tests |
| Test Case | Result |
| Create Signature Alice (SHA1) | Passed |
| Decode Alice's Signature (SHA1) | Passed |
| Compare Decoded Signature and Original (SHA1) | Passed |
| Create Signature Alice (SHA256) | Passed |
| Decode Alice's Signature (SHA256) | Passed |
| Compare Decoded Signature and Original (SHA256) | Passed |
| Create Signature Alice (SHA384) | Passed |
| Decode Alice's Signature (SHA384) | Passed |
| Compare Decoded Signature and Original (SHA384) | Passed |
| Create Signature Alice (SHA512) | Passed |
| Decode Alice's Signature (SHA512) | Passed |
| Compare Decoded Signature and Original (SHA512) | Passed |
| Create Enveloped Data Alice | Passed |
| Decode Enveloped Data Alice | Passed |
| Compare Decoded Enveloped Data and Original | Passed |
| Create Multiple Recipients Enveloped Data Alice | Passed |
| Encrypt to a Multiple Email cert | Passed |
| Decode Multiple Recipients Enveloped Data Alice by Bob | Passed |
| Decode Multiple Recipients Enveloped Data Alice by Dave | Passed |
| Decrypt with a Multiple Email cert | Passed |
| Compare Decoded Mult. Recipients Enveloped Data Alice/Bob | Passed |
| Compare Decoded Mult. Recipients Enveloped Data Alice/Dave | Passed |
| Compare Decoded with Multiple Email cert | Passed |
| Create Certs-Only Alice | Passed |
| Verify Certs-Only by CA | Passed |
| Create Encrypted-Data | Passed |
| Decode Encrypted-Data | Passed |
| Compare Decoded and Original Data | Passed |
| FIPS 140-1 Compliance Tests |
| Test Case | Result |
| Verify this module is in FIPS mode (modutil -chkfips true) | Passed |
| List the FIPS module certificates (certutil -L) | Passed |
| List the FIPS module keys (certutil -K) | Passed |
| Attempt to list FIPS module keys with incorrect password (certutil -K) | Passed |
| Validate the certificate (certutil -V -e) | Passed |
| Export the certificate and key as a PKCS#12 file (pk12util -o) | Passed |
| Export the certificate as a DER (certutil -L -r) | Passed |
| List the FIPS module certificates (certutil -L) | Passed |
| Delete the certificate and key from the FIPS module (certutil -D) | Passed |
| List the FIPS module certificates (certutil -L) | Passed |
| List the FIPS module keys (certutil -K) | Passed |
| Import the certificate and key from the PKCS#12 file (pk12util -i) | Passed |
| List the FIPS module certificates (certutil -L) | Passed |
| List the FIPS module keys (certutil -K) | Passed |