|
|
Line 1: |
Line 1: |
| <div id="osbalajg" style="overflow:auto;height:1px;">[http://www.naacpncnetwork.org/nzrpe/ designer handbag kate replica spade] [http://www.naacpncnetwork.org/dqspqvz/ wholesale replica coach handbag] [http://www.naacpncnetwork.org/uicohwsh/ coach signature replica handbag wholesale] [http://www.naacpncnetwork.org/maxrfq/ aaa replica handbag] [http://www.naacpncnetwork.org/aeafvtw/ aaa chloe handbag replica] [http://www.naacpncnetwork.org/pfsvvrhya/ aaa grade handbag replica] [http://www.naacpncnetwork.org/iuksk/ handbag lv replica wholesale] [http://www.naacpncnetwork.org/mrisc/ hermes handbag replica] [http://www.naacpncnetwork.org/rkesflccj/ cheap replica handbag] [http://www.naacpncnetwork.org/cbmizf/ cheap replica chanel handbag] [http://www.naacpncnetwork.org/inmjs/ cheap replica coach handbag] [http://www.naacpncnetwork.org/xubcc/ cheap wholesale replica handbag] [http://www.naacpncnetwork.org/bbvfpatd/ cheap designer replica handbag wholesale] [http://www.naacpncnetwork.org/jrpbdgkls/ replica chloe handbag] [http://www.naacpncnetwork.org/bndxgv/ chloe handbag paddington replica] [http://www.naacpncnetwork.org/hurdmfzwa/ chloe designer handbag replica] [http://www.naacpncnetwork.org/lajyiwkvp/ fendi replica handbag] [http://www.naacpncnetwork.org/iyvxqw/ fendi and gucci replica handbag] [http://www.naacpncnetwork.org/enievg/ wholesale designer replica handbag] [http://www.naacpncnetwork.org/zydofdkd/ replica designer handbag at wholesale prices] [http://www.naacpncnetwork.org/giunev/ wholesale replica handbag] [http://www.naacpncnetwork.org/kgyuj/ handbag wholesale replica watch] [http://www.naacpncnetwork.org/jdilfpjqx/ wholesale replica lv handbag] [http://www.naacpncnetwork.org/fvkfvmvp/ replica handbag wholesale price] [http://www.naacpncnetwork.org/kouyrc/ replica chanel handbag] [http://www.naacpncnetwork.org/xrisqzjo/ replica designer handbag chanel] [http://www.naacpncnetwork.org/hkuzsz/ discount chanel handbag replica] [http://www.naacpncnetwork.org/rhyfld/ handbag louis replica theda vuitton] [http://www.naacpncnetwork.org/pfvwbjdyy/ handbag louis replica shopping vuitton] [http://www.naacpncnetwork.org/fwnriugs/ bag image louis mirror replica vuitton] [http://www.naacpncnetwork.org/kpcqja/ bag designer diaper replica] [http://www.naacpncnetwork.org/cwomynr/ bag dior replica] [http://www.naacpncnetwork.org/sbcjjxjum/ bag christian dior replica] [http://www.naacpncnetwork.org/coadxfajn/ bag hermes replica] [http://www.naacpncnetwork.org/atkwzq/ bag birkin hermes replica] [http://www.naacpncnetwork.org/dncljzexb/ bag burberry replica] </div>=Power-Up Self-Tests=The module can perform the following power-up self-tests:==Cryptographic algorithm tests==A known-answer test is conducted for all cryptographic functions (e.g., encryption, decryption, authentication, and random number generation) of each Approved cryptographic algorithm implemented by the cryptographic module. (See the [http://www.mozilla.org/projects/security/pki/nss/fips/nss-source/mozilla/security/nss/lib/softoken/fipstest.c.html power-up self-tests source code].){| border="1" cellpadding="2"|+|-! Algorithm!Tests|-| RC2||RC2-ECB Single-Round Known Answer Encryption<br>RC2-ECB Single-Round Known Answer Decryption<br>RC2-CBC Single-Round Known Answer Encryption<br>RC2-CBC Single-Round Known Answer Decryption|-| RC4||Single-Round Known Answer Encryption<br>Single-Round Known Answer Decryption|-| DES||DES-ECB Single-Round Known Answer Encryption<br>DES-ECB Single-Round Known Answer Decryption<br>DES-CBC Single-Round Known Answer Encryption<br>DES-CBC Single-Round Known Answer Decryption|-| Triple DES||DES3-ECB Single-Round Known Answer Encryption<br>DES3-ECB Single-Round Known Answer Decryption<br>DES3-CBC Single-Round Known Answer Encryption<br>DES3-CBC Single-Round Known Answer Decryption|-| AES-128, AES-192, AES-256||AES-ECB Single-Round Known Answer Encryption<br>AES-ECB Single-Round Known Answer Decryption<br>AES-CBC Single-Round Known Answer Encryption<br>AES-CBC Single-Round Known Answer Decryption|-| MD2||Single-Round Known Answer Hashing|-| MD5||Single-Round Known Answer Hashing|-| SHA-1, SHA-256, SHA-384, SHA-512||Single-Round Known Answer Hashing|-| HMAC-SHA-1, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512||Single-Round Known Answer HMAC|-| RSA||Single-Round Known Answer Encryption<br>Single-Round Known Answer Decryption<br>Single-Round Known Answer Signature Test SHA-1<br>Single-Round Known Answer Signature Test SHA-256<br>Single-Round Known Answer Signature Test SHA-384<br>Single-Round Known Answer Signature Test SHA-512<br>|-| DSA||Single-Round Known Answer Signature<br>Single-Round Known Answer Verification|-| RNG||FIPS 182-2 Change Notice 1 Known Answer Test|-| ECDSA - NIST Curve P-256 (the Extended ECC version of the module also tests Curve K-283)||Single-Round Known Answer Signature<br>Single-Round Known Answer Verification|}<div class=note>'''Note:''' Cryptographic algorithms whose outputs vary for a given set of inputs (DSA and ECDSA) are tested using a known-answer test. The message digest algorithms have independent known-answer tests.</div>==Random number generator test==See the known-answer test for RNG above.==Software/firmware integrity test==An integrity check is performed on the libraries that contain the NSS cryptographic module. If the check fails, the module immediately enters the Error state.==Critical functions test==No other critical functions tests are performed on power-up.
| | =Power-Up Self-Tests= |
| | |
| | The module can perform the following power-up self-tests: |
| | |
| | ==Cryptographic algorithm tests== |
| | A known-answer test is conducted for all cryptographic functions (e.g., encryption, decryption, authentication, and random number generation) of each Approved cryptographic algorithm implemented by the cryptographic module. (See the [http://www.mozilla.org/projects/security/pki/nss/fips/nss-source/mozilla/security/nss/lib/softoken/fipstest.c.html power-up self-tests source code].) |
| | |
| | {| border="1" cellpadding="2" |
| | |+ |
| | |- |
| | ! |
| | Algorithm |
| | ! |
| | Tests |
| | |- |
| | | RC2|| |
| | RC2-ECB Single-Round Known Answer Encryption<br> |
| | RC2-ECB Single-Round Known Answer Decryption<br> |
| | RC2-CBC Single-Round Known Answer Encryption<br> |
| | RC2-CBC Single-Round Known Answer Decryption |
| | |- |
| | | RC4|| |
| | Single-Round Known Answer Encryption<br> |
| | Single-Round Known Answer Decryption |
| | |- |
| | | DES|| |
| | DES-ECB Single-Round Known Answer Encryption<br> |
| | DES-ECB Single-Round Known Answer Decryption<br> |
| | DES-CBC Single-Round Known Answer Encryption<br> |
| | DES-CBC Single-Round Known Answer Decryption |
| | |- |
| | | Triple DES|| |
| | DES3-ECB Single-Round Known Answer Encryption<br> |
| | DES3-ECB Single-Round Known Answer Decryption<br> |
| | DES3-CBC Single-Round Known Answer Encryption<br> |
| | DES3-CBC Single-Round Known Answer Decryption |
| | |- |
| | | AES-128, AES-192, AES-256|| |
| | AES-ECB Single-Round Known Answer Encryption<br> |
| | AES-ECB Single-Round Known Answer Decryption<br> |
| | AES-CBC Single-Round Known Answer Encryption<br> |
| | AES-CBC Single-Round Known Answer Decryption |
| | |- |
| | | MD2|| |
| | Single-Round Known Answer Hashing |
| | |- |
| | | MD5|| |
| | Single-Round Known Answer Hashing |
| | |- |
| | | SHA-1, SHA-256, SHA-384, SHA-512|| |
| | Single-Round Known Answer Hashing |
| | |- |
| | | HMAC-SHA-1, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512|| |
| | Single-Round Known Answer HMAC |
| | |- |
| | | RSA|| |
| | Single-Round Known Answer Encryption<br> |
| | Single-Round Known Answer Decryption<br> |
| | Single-Round Known Answer Signature Test SHA-1<br> |
| | Single-Round Known Answer Signature Test SHA-256<br> |
| | Single-Round Known Answer Signature Test SHA-384<br> |
| | Single-Round Known Answer Signature Test SHA-512<br> |
| | |- |
| | | DSA|| |
| | Single-Round Known Answer Signature<br> |
| | Single-Round Known Answer Verification |
| | |- |
| | | RNG|| |
| | FIPS 182-2 Change Notice 1 Known Answer Test |
| | |- |
| | | ECDSA - NIST Curve P-256 (the Extended ECC version of the module also tests Curve K-283)|| |
| | Single-Round Known Answer Signature<br> |
| | Single-Round Known Answer Verification |
| | |} |
| | |
| | <div class=note>'''Note:''' Cryptographic algorithms whose outputs vary for a given set of inputs (DSA and ECDSA) are tested using a known-answer test. The message digest algorithms have independent known-answer tests.</div> |
| | |
| | ==Random number generator test== |
| | |
| | See the known-answer test for RNG above. |
| | |
| | ==Software/firmware integrity test== |
| | An integrity check is performed on the libraries that contain the NSS cryptographic module. If the check fails, the module immediately enters the Error state. |
| | |
| | ==Critical functions test== |
| | No other critical functions tests are performed on power-up. |
Power-Up Self-Tests
The module can perform the following power-up self-tests:
Cryptographic algorithm tests
A known-answer test is conducted for all cryptographic functions (e.g., encryption, decryption, authentication, and random number generation) of each Approved cryptographic algorithm implemented by the cryptographic module. (See the power-up self-tests source code.)
Algorithm
|
Tests
|
RC2 |
RC2-ECB Single-Round Known Answer Encryption
RC2-ECB Single-Round Known Answer Decryption
RC2-CBC Single-Round Known Answer Encryption
RC2-CBC Single-Round Known Answer Decryption
|
RC4 |
Single-Round Known Answer Encryption
Single-Round Known Answer Decryption
|
DES |
DES-ECB Single-Round Known Answer Encryption
DES-ECB Single-Round Known Answer Decryption
DES-CBC Single-Round Known Answer Encryption
DES-CBC Single-Round Known Answer Decryption
|
Triple DES |
DES3-ECB Single-Round Known Answer Encryption
DES3-ECB Single-Round Known Answer Decryption
DES3-CBC Single-Round Known Answer Encryption
DES3-CBC Single-Round Known Answer Decryption
|
AES-128, AES-192, AES-256 |
AES-ECB Single-Round Known Answer Encryption
AES-ECB Single-Round Known Answer Decryption
AES-CBC Single-Round Known Answer Encryption
AES-CBC Single-Round Known Answer Decryption
|
MD2 |
Single-Round Known Answer Hashing
|
MD5 |
Single-Round Known Answer Hashing
|
SHA-1, SHA-256, SHA-384, SHA-512 |
Single-Round Known Answer Hashing
|
HMAC-SHA-1, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512 |
Single-Round Known Answer HMAC
|
RSA |
Single-Round Known Answer Encryption
Single-Round Known Answer Decryption
Single-Round Known Answer Signature Test SHA-1
Single-Round Known Answer Signature Test SHA-256
Single-Round Known Answer Signature Test SHA-384
Single-Round Known Answer Signature Test SHA-512
|
DSA |
Single-Round Known Answer Signature
Single-Round Known Answer Verification
|
RNG |
FIPS 182-2 Change Notice 1 Known Answer Test
|
ECDSA - NIST Curve P-256 (the Extended ECC version of the module also tests Curve K-283) |
Single-Round Known Answer Signature
Single-Round Known Answer Verification
|
Note: Cryptographic algorithms whose outputs vary for a given set of inputs (DSA and ECDSA) are tested using a known-answer test. The message digest algorithms have independent known-answer tests.
Random number generator test
See the known-answer test for RNG above.
Software/firmware integrity test
An integrity check is performed on the libraries that contain the NSS cryptographic module. If the check fails, the module immediately enters the Error state.
Critical functions test
No other critical functions tests are performed on power-up.