Certutil Tests |
Test Case | Result |
Creating CA Cert DB | Passed |
Creating CA Cert TestCA | Passed |
Exporting Root Cert | Passed |
Creating CA Cert DB | Passed |
Creating CA Cert serverCA | Passed |
Exporting Root Cert | Passed |
Creating CA Cert chain-1-serverCA | Passed |
Exporting Root Cert | Passed |
Creating CA Cert chain-2-serverCA | Passed |
Exporting Root Cert | Passed |
Creating CA Cert DB | Passed |
Creating CA Cert clientCA | Passed |
Exporting Root Cert | Passed |
Creating CA Cert chain-1-clientCA | Passed |
Exporting Root Cert | Passed |
Creating CA Cert chain-2-clientCA | Passed |
Exporting Root Cert | Passed |
Initializing spd04.mcom.com's Cert DB (ext.) | Passed |
Generate Cert Request for spd04.mcom.com (ext) | Passed |
Sign spd04.mcom.com's Request (ext) | Passed |
Import spd04.mcom.com's Cert -t u,u,u (ext) | Passed |
Import Client Root CA -t T,, for spd04.mcom.com (ext.) | Passed |
Import serverCA CA -t C,C,C for spd04.mcom.com (ext.) | Passed |
Import chain-1-serverCA CA -t u,u,u for spd04.mcom.com (ext.) | Passed |
Import chain-2-serverCA CA -t u,u,u for spd04.mcom.com (ext.) | Passed |
Initializing ExtendedSSLUser's Cert DB (ext.) | Passed |
Generate Cert Request for ExtendedSSLUser (ext) | Passed |
Sign ExtendedSSLUser's Request (ext) | Passed |
Import ExtendedSSLUser's Cert -t u,u,u (ext) | Passed |
Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) | Passed |
Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) | Passed |
Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) | Passed |
Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) | Passed |
Initializing TestUser's Cert DB | Passed |
Import Root CA for TestUser | Passed |
Generate Cert Request for TestUser | Passed |
Sign TestUser's Request | Passed |
Import TestUser's Cert | Passed |
Initializing spd04.mcom.com's Cert DB | Passed |
Import Root CA for spd04.mcom.com | Passed |
Generate Cert Request for spd04.mcom.com | Passed |
Sign spd04.mcom.com's Request | Passed |
Import spd04.mcom.com's Cert | Passed |
Import spd04.mcom.com's Cert | Passed |
Initializing Alice's Cert DB | Passed |
Import Root CA for Alice | Passed |
Generate Cert Request for Alice | Passed |
Sign Alice's Request | Passed |
Import Alice's Cert | Passed |
Initializing Bob's Cert DB | Passed |
Import Root CA for Bob | Passed |
Generate Cert Request for Bob | Passed |
Sign Bob's Request | Passed |
Import Bob's Cert | Passed |
Initializing Dave's Cert DB | Passed |
Import Root CA for Dave | Passed |
Generate Cert Request for Dave | Passed |
Sign Dave's Request | Passed |
Import Dave's Cert | Passed |
Initializing Eve's Cert DB | Passed |
Import Root CA for Eve | Passed |
Generate Cert Request for Eve | Passed |
Sign Eve's Request | Passed |
Import Eve's Cert | Passed |
Import Alices's cert into Bob's db | Passed |
Import Bob's cert into Alice's db | Passed |
Import Dave's cert into Alice's DB | Passed |
Import Dave's cert into Bob's DB | Passed |
Import Eve's cert into Alice's DB | Passed |
Import Eve's cert into Bob's DB | Passed |
Initializing FIPS PUB 140-1 Test Certificate's Cert DB | Passed |
Enable FIPS mode on database for FIPS PUB 140-1 Test Certificate | Passed |
Generate Certificate for FIPS PUB 140-1 Test Certificate | Passed |
SSL Cipher Coverage |
Test Case | Result |
SSL2 RC4 128 WITH MD5 | Passed |
SSL2 RC4 128 EXPORT40 WITH MD5 | Passed |
SSL2 RC2 128 CBC WITH MD5 | Passed |
SSL2 RC2 128 CBC EXPORT40 WITH MD5 | Passed |
SSL2 DES 64 CBC WITH MD5 | Passed |
SSL2 DES 192 EDE3 CBC WITH MD5 | Passed |
SSL3 RSA WITH RC4 128 MD5 | Passed |
SSL3 RSA WITH 3DES EDE CBC SHA | Passed |
SSL3 RSA WITH DES CBC SHA | Passed |
SSL3 RSA EXPORT WITH RC4 40 MD5 | Passed |
SSL3 RSA EXPORT WITH RC2 CBC 40 MD5 | Passed |
SSL3 RSA WITH NULL MD5 | Passed |
SSL3 RSA FIPS WITH 3DES EDE CBC SHA | Passed |
SSL3 RSA FIPS WITH DES CBC SHA | Passed |
SSL3 RSA EXPORT WITH DES CBC SHA (new) | Passed |
SSL3 RSA EXPORT WITH RC4 56 SHA (new) | Passed |
SSL3 RSA WITH RC4 128 SHA | Passed |
SSL3 RSA WITH AES 128 CBC SHA | Passed |
SSL3 RSA WITH AES 256 CBC SHA | Passed |
SSL3 RSA WITH NULL SHA | Passed |
TLS RSA WITH RC4 128 MD5 | Passed |
TLS RSA WITH 3DES EDE CBC SHA | Passed |
TLS RSA WITH DES CBC SHA | Passed |
TLS RSA EXPORT WITH RC4 40 MD5 | Passed |
TLS RSA EXPORT WITH RC2 CBC 40 MD5 | Passed |
TLS RSA WITH NULL MD5 | Passed |
TLS RSA FIPS WITH 3DES EDE CBC SHA | Passed |
TLS RSA FIPS WITH DES CBC SHA | Passed |
TLS RSA EXPORT WITH DES CBC SHA (new) | Passed |
TLS RSA EXPORT WITH RC4 56 SHA (new) | Passed |
TLS RSA WITH RC4 128 SHA | Passed |
TLS RSA WITH AES 128 CBC SHA | Passed |
TLS RSA WITH AES 256 CBC SHA | Passed |
TLS RSA WITH NULL SHA | Passed |
SSL Client Authentication |
Test Case | Result |
TLS Request don't require client auth (client does not provide auth) | Passed |
TLS Request don't require client auth (bad password) | Passed |
TLS Request don't require client auth (client auth) | Passed |
TLS Require client auth (client does not provide auth) | Passed |
TLS Require client auth (bad password) | Passed |
TLS Require client auth (client auth) | Passed |
SSL3 Request don't require client auth (client does not provide auth) | Passed |
SSL3 Request don't require client auth (bad password) | Passed |
SSL3 Request don't require client auth (client auth) | Passed |
SSL3 Require client auth (client does not provide auth) | Passed |
SSL3 Require client auth (bad password) | Passed |
SSL3 Require client auth (client auth) | Passed |
TLS Request don't require client auth on 2nd hs (client does not provide auth) | Passed |
TLS Request don't require client auth on 2nd hs (bad password) | Passed |
TLS Request don't require client auth on 2nd hs (client auth) | Passed |
TLS Require client auth on 2nd hs (client does not provide auth) | Passed |
TLS Require client auth on 2nd hs (bad password) | Passed |
TLS Require client auth on 2nd hs (client auth) | Passed |
SSL3 Request don't require client auth on 2nd hs (client does not provide auth) | Passed |
SSL3 Request don't require client auth on 2nd hs (bad password) | Passed |
SSL3 Request don't require client auth on 2nd hs (client auth) | Passed |
SSL3 Require client auth on 2nd hs (client does not provide auth) | Passed |
SSL3 Require client auth on 2nd hs (bad password) | Passed |
SSL3 Require client auth on 2nd hs (client auth) | Passed |
SSL Cipher Coverage Extended test |
Test Case | Result |
SSL3 RSA WITH RC4 128 MD5 | Passed |
SSL3 RSA WITH 3DES EDE CBC SHA | Passed |
SSL3 RSA WITH DES CBC SHA | Passed |
SSL3 RSA EXPORT WITH RC4 40 MD5 | Passed |
SSL3 RSA EXPORT WITH RC2 CBC 40 MD5 | Passed |
SSL3 RSA WITH NULL MD5 | Passed |
SSL3 RSA FIPS WITH 3DES EDE CBC SHA | Passed |
SSL3 RSA FIPS WITH DES CBC SHA | Passed |
SSL3 RSA EXPORT WITH DES CBC SHA (new) | Passed |
SSL3 RSA EXPORT WITH RC4 56 SHA (new) | Passed |
SSL3 RSA WITH RC4 128 SHA | Passed |
SSL3 RSA WITH AES 128 CBC SHA | Passed |
SSL3 RSA WITH AES 256 CBC SHA | Passed |
SSL3 RSA WITH NULL SHA | Passed |
TLS RSA WITH RC4 128 MD5 | Passed |
TLS RSA WITH 3DES EDE CBC SHA | Passed |
TLS RSA WITH DES CBC SHA | Passed |
TLS RSA EXPORT WITH RC4 40 MD5 | Passed |
TLS RSA EXPORT WITH RC2 CBC 40 MD5 | Passed |
TLS RSA WITH NULL MD5 | Passed |
TLS RSA FIPS WITH 3DES EDE CBC SHA | Passed |
TLS RSA FIPS WITH DES CBC SHA | Passed |
TLS RSA EXPORT WITH DES CBC SHA (new) | Passed |
TLS RSA EXPORT WITH RC4 56 SHA (new) | Passed |
TLS RSA WITH RC4 128 SHA | Passed |
TLS RSA WITH AES 128 CBC SHA | Passed |
TLS RSA WITH AES 256 CBC SHA | Passed |
TLS RSA WITH NULL SHA | Passed |
SSL Client Authentication Extended test |
Test Case | Result |
TLS Request don't require client auth (client does not provide auth) | Passed |
TLS Request don't require client auth (bad password) | Passed |
TLS Request don't require client auth (client auth) | Passed |
TLS Require client auth (client does not provide auth) | Passed |
TLS Require client auth (bad password) | Passed |
TLS Require client auth (client auth) | Passed |
SSL3 Request don't require client auth (client does not provide auth) | Passed |
SSL3 Request don't require client auth (bad password) | Passed |
SSL3 Request don't require client auth (client auth) | Passed |
SSL3 Require client auth (client does not provide auth) | Passed |
SSL3 Require client auth (bad password) | Passed |
SSL3 Require client auth (client auth) | Passed |
TLS Request don't require client auth on 2nd hs (client does not provide auth) | Passed |
TLS Request don't require client auth on 2nd hs (bad password) | Passed |
TLS Request don't require client auth on 2nd hs (client auth) | Passed |
TLS Require client auth on 2nd hs (client does not provide auth) | Passed |
TLS Require client auth on 2nd hs (bad password) | Passed |
TLS Require client auth on 2nd hs (client auth) | Passed |
SSL3 Request don't require client auth on 2nd hs (client does not provide auth) | Passed |
SSL3 Request don't require client auth on 2nd hs (bad password) | Passed |
SSL3 Request don't require client auth on 2nd hs (client auth) | Passed |
SSL3 Require client auth on 2nd hs (client does not provide auth) | Passed |
SSL3 Require client auth on 2nd hs (bad password) | Passed |
SSL3 Require client auth on 2nd hs (client auth) | Passed |
S/MIME Tests |
Test Case | Result |
Create Signature Alice (SHA1) | Passed |
Decode Alice's Signature (SHA1) | Passed |
Compare Decoded Signature and Original (SHA1) | Passed |
Create Signature Alice (SHA256) | Passed |
Decode Alice's Signature (SHA256) | Passed |
Compare Decoded Signature and Original (SHA256) | Passed |
Create Signature Alice (SHA384) | Passed |
Decode Alice's Signature (SHA384) | Passed |
Compare Decoded Signature and Original (SHA384) | Passed |
Create Signature Alice (SHA512) | Passed |
Decode Alice's Signature (SHA512) | Passed |
Compare Decoded Signature and Original (SHA512) | Passed |
Create Enveloped Data Alice | Passed |
Decode Enveloped Data Alice | Passed |
Compare Decoded Enveloped Data and Original | Passed |
Create Multiple Recipients Enveloped Data Alice | Passed |
Encrypt to a Multiple Email cert | Passed |
Decode Multiple Recipients Enveloped Data Alice by Bob | Passed |
Decode Multiple Recipients Enveloped Data Alice by Dave | Passed |
Decrypt with a Multiple Email cert | Passed |
Compare Decoded Mult. Recipients Enveloped Data Alice/Bob | Passed |
Compare Decoded Mult. Recipients Enveloped Data Alice/Dave | Passed |
Compare Decoded with Multiple Email cert | Passed |
Create Certs-Only Alice | Passed |
Verify Certs-Only by CA | Passed |
Create Encrypted-Data | Passed |
Decode Encrypted-Data | Passed |
Compare Decoded and Original Data | Passed |
FIPS 140-1 Compliance Tests |
Test Case | Result |
Verify this module is in FIPS mode (modutil -chkfips true) | Passed |
List the FIPS module certificates (certutil -L) | Passed |
List the FIPS module keys (certutil -K) | Passed |
Attempt to list FIPS module keys with incorrect password (certutil -K) | Passed |
Validate the certificate (certutil -V -e) | Passed |
Export the certificate and key as a PKCS#12 file (pk12util -o) | Passed |
Export the certificate as a DER (certutil -L -r) | Passed |
List the FIPS module certificates (certutil -L) | Passed |
Delete the certificate and key from the FIPS module (certutil -D) | Passed |
List the FIPS module certificates (certutil -L) | Passed |
List the FIPS module keys (certutil -K) | Passed |
Import the certificate and key from the PKCS#12 file (pk12util -i) | Passed |
List the FIPS module certificates (certutil -L) | Passed |
List the FIPS module keys (certutil -K) | Passed |