Profile |
Baseline Client Basic KMIP V1.2 |
Baseline Client TLS V1.2 KMIP V1.2 |
Tape Library Client KMIP V1.0 |
Tape Library Client KMIP V1.1 |
Tape Library Client KMIP V1.2 |
Symmetric Key Lifecycle Client KMIP V1.0 |
Symmetric Key Lifecycle Client KMIP V1.1 |
Symmetric Key Lifecycle Client KMIP V1.2 |
Asymmetric Key Lifecycle Client KMIP V1.0 |
Asymmetric Key Lifecycle Client KMIP V1.1 |
Asymmetric Key Lifecycle Client KMIP V1.2 |
Basic Cryptographic Client KMIP V1.2 |
Advanced Cryptographic Client KMIP V1.2 |
RNG Cryptographic Client KMIP V1.2 |
Basic Symmetric Key Foundry Client KMIP V1.0 |
Intermediate Symmetric Key Foundry Client KMIP V1.0 |
Advanced Symmetric Key Foundry Client KMIP V1.0 |
Basic Symmetric Key Foundry Client KMIP V1.1 |
Intermediate Symmetric Key Foundry Client KMIP V1.1 |
Advanced Symmetric Key Foundry Client KMIP V1.1 |
Basic Symmetric Key Foundry Client KMIP V1.2 |
Intermediate Symmetric Key Foundry Client KMIP V1.2 |
Advanced Symmetric Key Foundry Client KMIP V1.2 |
Opaque Managed Object Store Client KMIP V1.0 |
Opaque Managed Object Store Client KMIP V1.1 |
Opaque Managed Object Store Client KMIP V1.2 |
Suite B MinLOS 128 Client KMIP V1.0 |
Suite B MinLOS 128 Client KMIP V1.1 |
Suite B MinLOS 128 Client KMIP V1.2 |
Suite B MinLOS 192 Client KMIP V1.0 |
Suite B MinLOS 192 Client KMIP V1.1 |
Suite B MinLOS 192 Client KMIP V1.2 |
Storage Array With Self Encrypting Drive Client KMIP V1.0 |
Storage Array With Self Encrypting Drive Client KMIP V1.1 |
Storage Array With Self Encrypting Drive Client KMIP V1.2 |
HTTPS Client KMIP V1.0 |
HTTPS Client KMIP V1.1 |
HTTPS Client KMIP V1.2 |
JSON Client KMIP V1.0 |
JSON Client KMIP V1.1 |
JSON Client KMIP V1.2 |
XML Client KMIP V1.0 |
XML Client KMIP V1.1 |
XML Client KMIP V1.2 |
Baseline Client Basic KMIP V1.3 |
Baseline Client TLS V1.2 KMIP V1.3 |
Tape Library Client KMIP V1.3 |
Symmetric Key Lifecycle Client KMIP V1.3 |
Asymmetric Key Lifecycle Client KMIP V1.3 |
Basic Cryptographic Client KMIP V1.3 |
Advanced Cryptographic Client KMIP V1.3 |
RNG Cryptographic Client KMIP V1.3 |
Basic Symmetric Key Foundry Client KMIP V1.3 |
Intermediate Symmetric Key Foundry Client KMIP V1.3 |
Advanced Symmetric Key Foundry Client KMIP V1.3 |
Opaque Managed Object Store Client KMIP V1.3 |
Suite B minLOS 128 Client KMIP V1.3 |
Suite B minLOS 192 Client KMIP V1.3 |
Storage Array With Self Encrypting Drive Client KMIP V1.3 |
HTTPS Client KMIP V1.3 |
JSON Client KMIPV 1.3 |
XML Client KMIP V1.3 |
Baseline Client Basic KMIP V1.4 |
Baseline Client TLS V1.2 KMIP V1.4 |
Tape Library Client KMIP V1.4 |
Symmetric Key Lifecycle Client KMIP V1.4 |
Asymmetric Key Lifecycle Client KMIP V1.4 |
Basic Cryptographic Client KMIP V1.4 |
Advanced Cryptographic Client KMIP V1.4 |
RNG Cryptographic Client KMIP V1.4 |
Basic Symmetric Key Foundry Client KMIP V1.4 |
Intermediate Symmetric Key Foundry Client KMIP V1.4 |
Advanced Symmetric Key Foundry Client KMIP V1.4 |
Opaque Managed Object Store Client KMIP V1.4 |
Suite B minLOS 128 Client KMIP V1.4 |
Suite B minLOS 192 Client KMIP V1.4 |
Storage Array With Self Encrypting Drive Client KMIP V1.4 |
HTTPS Client KMIP V1.4 |
JSON Client KMIP V1.4 |
XML Client KMIP V1.4 |
Test Case | Description |
TC-311-10 | Create / Destroy |
TC-312-10 | Register / Create / Get attributes / Destroy |
TC-313-10 | Create / Locate / Get / Destroy |
TC-314-10 | Dual Client Test Case, ID Placeholder-linked Locate & Get Batch |
TC-315-10 | Register / Destroy Secret Data |
TC-32-10 | Asynchronous Locate |
TC-41-10 | Revoke Scenario |
TC-51-10 | Get Usage Allocation Scenario |
TC-61-10 | Import of a Third-party Key |
TC-71-10 | Unrecognized Message Extension with Criticality Indicator False |
TC-72-10 | Unrecognized Message Extension with Criticality Indicator True |
TC-81-10 | Create a Key Pair |
TC-82-10 | Register Both Halves of a Key Pair |
TC-91-10 | Create a Key, Re-key |
TC-92-10 | Existing Key Expired, Re-key with Same Life-cycle |
TC-93-10 | Existing Key Compromised, Re-key with Same Life-cycle |
TC-94-10 | Create Key, Re-key with New Life-cycle |
TC-95-10 | Obtain Lease for Expired Key |
TC-101-10 | Create a Key, Archive and Recover it |
TC-111-10 | Credential, Operation Policy, Destroy Date |
TC-121-10 | Query, Maximum Response Size |
TC-131-10 | Register an Asymmetric Key Pair in PKCS1 Format |
TC-132-10 | Register an Asymmetric Key Pair and a Corresponding X509 Certificate |
TC-134-10 | Register Key Pair, Certify and Re-certify Public Key |
TC-NP-1-10 | Put |
TC-NP-2-10 | Notify & Put |
TC-ECC-1-10 | Register an ECC Key Pai |
TC-ECC-2-10 | Register an ECC Key Pair in PKCS8 Format |
TC-ECC-3-10 | Register an ECC Key Pair and ECDSA Certificate |
TC-DERIVEKEY-1-10 | Derive Symmetric Key HASH |
TC-DERIVEKEY-2-10 | Derive Symmetric Key HMAC |
TC-DERIVEKEY-3-10 | Derive Symmetric Key with secret data |
TC-DERIVEKEY-4-10 | Derive Symmetric Key with secret data |
TC-DERIVEKEY-5-10 | Derive Symmetric Key with secret data |
TC-REKEY-1-10 | Rekey multiple times |
TC-AESXTS-1-10 | Two key encryption |
TC-I18N-1-10 | Unicode characters in attributes values |
TC-I18N-2-10 | Unicode characters in attributes values |
TC-I18N-3-10 | Unicode characters in attributes values and custom attribute names |
TC-AESXTS-1-10 | Two key encryption |
TC-I18N-1-10 | UTF8 character in attribute |
TC-I18N-2-10 | UTF8 character in attribute |
TC-I18N-3-10 | UTF8 character in attribute |
TC-REKEY-1-10 | Rekey multiple times |
TC-DERIVEKEY-1-10 | Derive Symmetric Key |
TC-DERIVEKEY-2-10 | Derive Symmetric Key |
TC-DERIVEKEY-3-10 | Derive Symmetric Key |
TC-DERIVEKEY-4-10 | Derive Symmetric Key |
TC-DERIVEKEY-5-10 | Derive Symmetric Key |
Test Case | Description |
SKFF-M-1-10 | Create, Destroy AES-128 |
SKFF-M-2-10 | Create, Destroy AES-192 |
SKFF-M-3-10 | Create, Destroy AES-256 |
SKFF-M-4-10 | Create, Destroy DES3-168 |
SKFF-M-5-10 | Create, Locate, Get, Destroy, Locate AES-128 |
SKFF-M-6-10 | Create, Locate, Get, Destroy, Locate AES-192 |
SKFF-M-7-10 | Create, Locate, Get, Destroy, Locate AES-256 |
SKFF-M-8-10 | Create, Locate, Get, Destroy, Locate DES3-168 |
SKFF-M-9-10 | Create, Get, Activate, Revoke, Locate, Add/Mod/Del Attributes, Destroy AES-128 |
SKFF-M-10-10 | Create, Get, Activate, Revoke, Locate, Add/Mod/Del Attributes, Destroy AES-192 |
SKFF-M-11-10 | Create, Get, Activate, Revoke, Locate, Add/Mod/Del Attributes, Destroy AES-256 |
SKFF-M-12-10 | Create, Get, Activate, Revoke, Locate, Add/Mod/Del Attributes, Destroy DES3-168 |
SKFF-O-1-10 | Create, Destroy SKIPJACK-80 |
SKFF-O-2-10 | Create, Locate, Get, Destroy, Locate SKIPJACK-80 |
SKFF-O-3-10 | Create, Get, Activate, Revoke, Locate, Add/Mod/Del Attributes, Destroy SKIPJACK-80 |
SKFF-O-4-10 | Create, Destroy DES3-112 |
SKFF-O-5-10 | Create, Locate, Get, Destroy, Locate DES3-112 |
SKFF-O-6-10 | Create, Get, Activate, Revoke, Locate, Add/Mod/Del Attributes, Destroy DES3-112 |
Test Case | Description |
TC-311-11 | Create / Destroy |
TC-312-11 | Register / Create / Get attributes / Destroy |
TC-313-11 | Create / Locate / Get / Destroy |
TC-314-11 | Dual Client Test Case, ID Placeholder-linked Locate & Get Batch |
TC-315-11 | Register / Destroy Secret Data |
TC-32-11 | Asynchronous Locate |
TC-41-11 | Revoke Scenario |
TC-51-11 | Get Usage Allocation Scenario |
TC-61-11 | Import of a Third-party Key |
TC-71-11 | Unrecognized Message Extension with Criticality Indicator False |
TC-72-11 | Unrecognized Message Extension with Criticality Indicator True |
TC-81-11 | Create a Key Pair |
TC-82-11 | Register Both Halves of a Key Pair |
TC-91-11 | Create a Key, Re-key |
TC-92-11 | Existing Key Expired, Re-key with Same Life-cycle |
TC-93-11 | Existing Key Compromised, Re-key with Same Life-cycle |
TC-94-11 | Create Key, Re-key with New Life-cycle |
TC-95-11 | Obtain Lease for Expired Key |
TC-101-11 | Create a Key, Archive and Recover it |
TC-111-11 | Credential, Operation Policy, Destroy Date |
TC-112-11 | Device Credential, Operation Policy, Destroy Date |
TC-121-11 | Query, Maximum Response Size |
TC-122-11 | Query Vendor Extensions |
TC-131-11 | Register an Asymmetric Key Pair in PKCS1 Format |
TC-132-11 | Register an Asymmetric Key Pair and a Corresponding X509 Certificate |
TC-133-11 | Create, Re-key Key Pair |
TC-134-11 | Register Key Pair, Certify and Re-certify Public Key |
TC-141-11 | Key Wrapping using AES Key Wrap and No Encoding |
TC-142-11 | Key Wrapping using AES Key Wrap with Attributes |
TC-151-11 | Locate a Fresh Object from the Default Group |
TC-152-11 | Client-side Group Management |
TC-153-11 | Default Object Group Member |
TC-161-11 | Discover Versions |
TC-171-11 | Handling of Attributes and Attribute Index Values |
TC-181-11 | Digests of Symmetric Keys |
TC-182-11 | Digests of RSA Private Keys |
TC-NP-1-11 | Put |
TC-NP-2-11 | Notify & Put |
TC-ECC-1-11 | Register an ECC Key Pair |
TC-ECC-2-11 | Register an ECC Key Pair in PKCS8 Format |
TC-ECC-3-11 | Register an ECC Key Pair and ECDSA Certificate |
TC-DERIVEKEY-1-11 | Derive Symmetric Key HASH |
TC-DERIVEKEY-2-11 | Derive Symmetric Key HMAC |
TC-DERIVEKEY-3-11 | Derive Symmetric Key with secret data |
TC-DERIVEKEY-4-11 | Derive Symmetric Key with secret data |
TC-DERIVEKEY-5-11 | Derive Symmetric Key with secret data |
TC-REKEY-1-11 | Rekey multiple times |
TC-AESXTS-1-11 | Two key encryption |
TC-I18N-1-11 | Unicode characters in attributes values |
TC-I18N-2-11 | Unicode characters in attributes values |
TC-I18N-3-11 | Unicode characters in attributes values and custom attribute names |
TC-AESXTS-1-11 | Two key encryption |
TC-I18N-1-11 | UTF8 character in attribute |
TC-I18N-2-11 | UTF8 character in attribute |
TC-I18N-3-11 | UTF8 character in attribute |
TC-REKEY-1-11 | Rekey multiple times |
TC-DERIVEKEY-1-11 | Derive Symmetric Key |
TC-DERIVEKEY-2-11 | Derive Symmetric Key |
TC-DERIVEKEY-3-11 | Derive Symmetric Key |
TC-DERIVEKEY-4-11 | Derive Symmetric Key |
TC-DERIVEKEY-5-11 | Derive Symmetric Key |
Test Case | Description |
SKFF-M-1-11 | Create, Destroy AES-128 |
SKFF-M-2-11 | Create, Destroy AES-192 |
SKFF-M-3-11 | Create, Destroy AES-256 |
SKFF-M-4-11 | Create, Destroy DES3-168 |
SKFF-M-5-11 | Create, Locate, Get, Destroy, Locate AES-128 |
SKFF-M-6-11 | Create, Locate, Get, Destroy, Locate AES-192 |
SKFF-M-7-11 | Create, Locate, Get, Destroy, Locate AES-256 |
SKFF-M-8-11 | Create, Locate, Get, Destroy, Locate DES3-168 |
SKFF-M-9-11 | Create, Get, Activate, Revoke, Locate, Add/Mod/Del Attributes, Destroy AES-128 |
SKFF-M-10-11 | Create, Get, Activate, Revoke, Locate, Add/Mod/Del Attributes, Destroy AES-192 |
SKFF-M-11-11 | Create, Get, Activate, Revoke, Locate, Add/Mod/Del Attributes, Destroy AES-256 |
SKFF-M-12-11 | Create, Get, Activate, Revoke, Locate, Add/Mod/Del Attributes, Destroy DES3-168 |
SKFF-O-1-11 | Create, Destroy SKIPJACK-80 |
SKFF-O-2-11 | Create, Locate, Get, Destroy, Locate SKIPJACK-80 |
SKFF-O-3-11 | Create, Get, Activate, Revoke, Locate, Add/Mod/Del Attributes, Destroy SKIPJACK-80 |
SKFF-O-4-11 | Create, Destroy DES3-112 |
SKFF-O-5-11 | Create, Locate, Get, Destroy, Locate DES3-112 |
SKFF-O-6-11 | Create, Get, Activate, Revoke, Locate, Add/Mod/Del Attributes, Destroy DES3-112 |
Test Case | Description |
TC-311-12 | Create / Destroy |
TC-312-12 | Register / Create / Get attributes / Destroy |
TC-313-12 | Create / Locate / Get / Destroy |
TC-314-12 | Dual Client Test Case, ID Placeholder-linked Locate & Get Batch |
TC-315-12 | Register / Destroy Secret Data |
TC-32-12 | Asynchronous Locate |
TC-41-12 | Revoke Scenario |
TC-51-12 | Get Usage Allocation Scenario |
TC-61-12 | Import of a Third-party Key |
TC-71-12 | Unrecognized Message Extension with Criticality Indicator False |
TC-72-12 | Unrecognized Message Extension with Criticality Indicator True |
TC-81-12 | Create a Key Pair |
TC-82-12 | Register Both Halves of a Key Pair |
TC-91-12 | Create a Key, Re-key |
TC-92-12 | Existing Key Expired, Re-key with Same Life-cycle |
TC-93-12 | Existing Key Compromised, Re-key with Same Life-cycle |
TC-94-12 | Create Key, Re-key with New Life-cycle |
TC-95-12 | Obtain Lease for Expired Key |
TC-101-12 | Create a Key, Archive and Recover it |
TC-111-12 | Credential, Operation Policy, Destroy Date |
TC-112-12 | Device Credential, Operation Policy, Destroy Date |
TC-121-12 | Query, Maximum Response Size |
TC-122-12 | Query Vendor Extensions |
TC-131-12 | Register an Asymmetric Key Pair in PKCS1 Format |
TC-132-12 | Register an Asymmetric Key Pair and a Corresponding X509 Certificate |
TC-133-12 | Create, Re-key Key Pair |
TC-134-12 | Register Key Pair, Certify and Re-certify Public Key |
TC-141-12 | Key Wrapping using AES Key Wrap and No Encoding |
TC-142-12 | Key Wrapping using AES Key Wrap with Attributes |
TC-151-12 | Locate a Fresh Object from the Default Group |
TC-152-12 | Client-side Group Management |
TC-153-12 | Default Object Group Member |
TC-161-12 | Discover Versions |
TC-171-12 | Handling of Attributes and Attribute Index Values |
TC-181-12 | Digests of Symmetric Keys |
TC-182-12 | Digests of RSA Private Keys |
TC-PGP-1-12 | Register PGP Key - RSA |
TC-MDO-1-12 | Register MDO Key |
TC-MDO-2-12 | Locate MDO keys by Key Value Present |
TC-MDO-3-12 | Register MDO Key using PKCS11 URI |
TC-SJ-1-12 | Create and Split/Join |
TC-SJ-2-12 | Register and Split / Join |
TC-SJ-3-12 | Join Split Keys |
TC-SJ-4-12 | Register and Split / Join with XOR |
TC-NP-1-12 | Put |
TC-NP-2-12 | Notify & Put |
TC-ECC-1-12 | Register an ECC Key Pair |
TC-ECC-2-12 | Register an ECC Key Pair in PKCS8 Format |
TC-ECC-3-12 | Register an ECC Key Pair and ECDSA Certificate |
TC-DERIVEKEY-1-12 | Derive Symmetric Key HASH |
TC-DERIVEKEY-2-12 | Derive Symmetric Key HMAC |
TC-DERIVEKEY-3-12 | Derive Symmetric Key with secret data |
TC-DERIVEKEY-4-12 | Derive Symmetric Key with secret data |
TC-DERIVEKEY-5-12 | Derive Symmetric Key with secret data |
TC-REKEY-1-12 | Rekey multiple times |
TC-AESXTS-1-12 | Two key encryption |
TC-I18N-1-12 | Unicode characters in attributes values |
TC-I18N-2-12 | Unicode characters in attributes values |
TC-I18N-3-12 | Unicode characters in attributes values and custom attribute names |
TC-AESXTS-1-12 | Two key encryption |
TC-I18N-1-12 | UTF8 character in attribute |
TC-I18N-2-12 | UTF8 character in attribute |
TC-I18N-3-12 | UTF8 character in attribute |
TC-REKEY-1-12 | Rekey multiple times |
TC-DERIVEKEY-1-12 | Derive Symmetric Key |
TC-DERIVEKEY-2-12 | Derive Symmetric Key |
TC-DERIVEKEY-3-12 | Derive Symmetric Key |
TC-DERIVEKEY-4-12 | Derive Symmetric Key |
TC-DERIVEKEY-5-12 | Derive Symmetric Key |
Test Case | Description |
SKFF-M-1-12 | Create, Destroy AES-128 |
SKFF-M-2-12 | Create, Destroy AES-192 |
SKFF-M-3-12 | Create, Destroy AES-256 |
SKFF-M-4-12 | Create, Destroy DES3-168 |
SKFF-M-5-12 | Create, Locate, Get, Destroy, Locate AES-128 |
SKFF-M-6-12 | Create, Locate, Get, Destroy, Locate AES-192 |
SKFF-M-7-12 | Create, Locate, Get, Destroy, Locate AES-256 |
SKFF-M-8-12 | Create, Locate, Get, Destroy, Locate DES3-168 |
SKFF-M-9-12 | Create, Get, Activate, Revoke, Locate, Add/Mod/Del Attributes, Destroy AES-128 |
SKFF-M-10-12 | Create, Get, Activate, Revoke, Locate, Add/Mod/Del Attributes, Destroy AES-192 |
SKFF-M-11-12 | Create, Get, Activate, Revoke, Locate, Add/Mod/Del Attributes, Destroy AES-256 |
SKFF-M-12-12 | Create, Get, Activate, Revoke, Locate, Add/Mod/Del Attributes, Destroy DES3-168 |
SKFF-O-1-12 | Create, Destroy SKIPJACK-80 |
SKFF-O-2-12 | Create, Locate, Get, Destroy, Locate SKIPJACK-80 |
SKFF-O-3-12 | Create, Get, Activate, Revoke, Locate, Add/Mod/Del Attributes, Destroy SKIPJACK-80 |
SKFF-O-4-12 | Create, Destroy DES3-112 |
SKFF-O-5-12 | Create, Locate, Get, Destroy, Locate DES3-112 |
SKFF-O-6-12 | Create, Get, Activate, Revoke, Locate, Add/Mod/Del Attributes, Destroy DES3-112 |
Test Case | Description |
CS-BC-M-1-12 | Encrypt with New Symmetric Key |
CS-BC-M-2-12 | Decrypt with New Symmetric Key |
CS-BC-M-3-12 | Encrypt and Decrypt with New Symmetric Key |
CS-BC-M-4-12 | Encrypt with Known Symmetric Key |
CS-BC-M-5-12 | Decrypt with Known Symmetric Key |
CS-BC-M-6-12 | Encrypt and Decrypt with Known Symmetric Key |
CS-BC-M-7-12 | Encrypt with Known Symmetric Key with Usage Limits |
CS-BC-M-8-12 | Encrypt and Decrypt with Known Symmetric Key and PKCS5 Padding |
CS-BC-M-9-12 | Encrypt and Decrypt with Known Symmetric Key and PKCS5 Padding |
CS-BC-M-10-12 | Encrypt and Decrypt with Known Symmetric Key and PKCS5 Padding and CBC |
CS-BC-M-11-12 | Encrypt and Decrypt with Known Symmetric Key and PKCS5 Padding and CBC and IV |
CS-BC-M-12-12 | Encrypt and Decrypt with Known Symmetric Key and PKCS5 Padding and CBC and IV |
CS-BC-M-13-12 | Encrypt and Decrypt with Known Symmetric Key and PKCS5 Padding and CBC and Random IV |
CS-BC-M-14-12 | Encrypt and Decrypt with Known Symmetric Key Date Checks |
CS-RNG-M-1-12 | RNG Retrieve |
CS-RNG-O-1-12 | Seed RNG with Server Accept |
CS-RNG-O-2-12 | Seed RNG with Server Partial Acceptt |
CS-RNG-O-3-12 | Seed RNG with Server Ignoret |
CS-RNG-O-4-12 | Seed RNG with Server Denyt |
CS-AC-M-1-12 | Sign with Known Asymmetric Key |
CS_AC-M-2-12 | Signature Verify with Known Asymmetric Key |
CS-AC-M-3-12 | Sign and Signature Verify with Known Asymmetric Key |
CS-AC-M-4-12 | MAC with Known Key |
CS_AC-M-5-12 | MAC Verify with Known Key |
CS-AC-M-6-12 | MAC and MAC Verify with Known Key |
CS-AC-M-7-12 | Hash |
CS-AC-M-8-12 | Sign and Signature Verify with Known Asymmetric Key Date Checks |
Test Case | Description |
TC-CREG-2-13 | Retrieve Initial Client Credentials |
TC-OTP-1-13 | One Time Pad support |
TC-OTP-2-13 | One Time Pad support |
TC-OTP-3-13 | One Time Pad support |
TC-OTP-4-13 | One Time Pad support |
TC-Q-CAP-1-13 | Query Server Capabilities |
TC-Q-CAP-2-13 | Query Server Capabilities |
TC-Q-CREG_1-13 | Query Server Client Registration Methods |
TC-Q-PROF-1-13 | Query Server supported profiles |
TC-Q-PROF-2-13 | Query Server supported profiles |
TC-Q-PROF-3-13 | Query Server supported profiles |
TC-Q-RNGS-1-13 | Query Server supported RNG |
TC-Q-RNGS-2-13 | Query Server supported RNG |
TC-Q-RNGS-3-13 | Query Server supported RNG |
TC-Q-RNGS-4-13 | Query Server supported RNG |
TC-Q-RNGS-5-13 | Query Server supported RNG |
TC-Q-S2C-1-13 | Server to Client Query client capabilities |
TC-Q-S2C-2-13 | Server to Client Query client supported KMIP protocol versions |
TC-Q-S2C-PROF-1-13 | Server to Client Query client supported profiles |
TC-Q-S2C-PROF-2-13 | Server to Client Query client supported profiles |
TC-Q-VAL-1-13 | Query Server Validations |
TC-Q-VAL-2-13 | Query Server Validations |
TC-RNG-ATTR-1-13 | Register / Get Attributes / Destroy |
TC-RNG-ATTR-2-13 | Register / Get Attributes / Destroy |
TC-STREAM-HASH-1-13 | Streaming) Hash |
TC-STREAM-HASH-2-13 | Streaming) Hash |
TC-STREAM-HASH-3-13 | Streaming) Hash |
TC-STREAM-ENC-1-13 | Streaming) Encrypt with New Symmetric Key |
TC-STREAM-ENC-2-13 | Streaming) Encrypt with Known Symmetric Key |
TC-STREAM-ENCDEC-1-13 | Streaming) Encrypt and Decrypt with Known Symmetric Key and PKCS5 Padding and CBC |
TC-OFFSET-1-13 | Locate with offset |
TC-OFFSET-2-13 | Locate with offset |
TC-DERIVEKEY-1-13 | Derive Symmetric Key HASH |
TC-DERIVEKEY-2-13 | Derive Symmetric Key HMAC |
TC-DERIVEKEY-3-13 | Derive Symmetric Key with secret data |
TC-DERIVEKEY-4-13 | Derive Symmetric Key with secret data |
TC-DERIVEKEY-5-13 | Derive Symmetric Key with secret data |
TC-REKEY-1-13 | Rekey multiple times |
TC-AESXTS-1-13 | Two key encryption |
TC-I18N-1-13 | Unicode characters in attributes values |
TC-I18N-2-13 | Unicode characters in attributes values |
TC-I18N-3-13 | Unicode characters in attributes values and custom attribute names |
TC-AESXTS-1-13 | Two key encryption |
TC-OTP-5-13 | One Time Pad support |
TC-I18N-1-13 | UTF8 character in attribute |
TC-I18N-2-13 | UTF8 character in attribute |
TC-I18N-3-13 | UTF8 character in attribute |
TC-REKEY-1-13 | Rekey multiple times |
TC-DERIVEKEY-1-13 | Derive Symmetric Key |
TC-DERIVEKEY-2-13 | Derive Symmetric Key |
TC-DERIVEKEY-3-13 | Derive Symmetric Key |
TC-DERIVEKEY-4-13 | Derive Symmetric Key |
TC-DERIVEKEY-5-13 | Derive Symmetric Key |
Test Case | Description |
SKFF-M-1-13 | Create, Destroy AES-128 |
SKFF-M-2-13 | Create, Destroy AES-192 |
SKFF-M-3-13 | Create, Destroy AES-256 |
SKFF-M-4-13 | Create, Destroy DES3-168 |
SKFF-M-5-13 | Create, Locate, Get, Destroy, Locate AES-128 |
SKFF-M-6-13 | Create, Locate, Get, Destroy, Locate AES-192 |
SKFF-M-7-13 | Create, Locate, Get, Destroy, Locate AES-256 |
SKFF-M-8-13 | Create, Locate, Get, Destroy, Locate DES3-168 |
SKFF-M-9-13 | Create, Get, Activate, Revoke, Locate, Add/Mod/Del Attributes, Destroy AES-128 |
SKFF-M-10-13 | Create, Get, Activate, Revoke, Locate, Add/Mod/Del Attributes, Destroy AES-192 |
SKFF-M-11-13 | Create, Get, Activate, Revoke, Locate, Add/Mod/Del Attributes, Destroy AES-256 |
SKFF-M-12-13 | Create, Get, Activate, Revoke, Locate, Add/Mod/Del Attributes, Destroy DES3-168 |
SKFF-O-1-13 | Create, Destroy SKIPJACK-80 |
SKFF-O-2-13 | Create, Locate, Get, Destroy, Locate SKIPJACK-80 |
SKFF-O-3-13 | Create, Get, Activate, Revoke, Locate, Add/Mod/Del Attributes, Destroy SKIPJACK-80 |
SKFF-O-4-13 | Create, Destroy DES3-112 |
SKFF-O-5-13 | Create, Locate, Get, Destroy, Locate DES3-112 |
SKFF-O-6-13 | Create, Get, Activate, Revoke, Locate, Add/Mod/Del Attributes, Destroy DES3-112 |
Test Case | Description |
CS-BC-M-1-13 | Encrypt with New Symmetric Key |
CS-BC-M-2-13 | Decrypt with New Symmetric Key |
CS-BC-M-3-13 | Encrypt and Decrypt with New Symmetric Key |
CS-BC-M-4-13 | Encrypt with Known Symmetric Key |
CS-BC-M-5-13 | Decrypt with Known Symmetric Key |
CS-BC-M-6-13 | Encrypt and Decrypt with Known Symmetric Key |
CS-BC-M-7-13 | Encrypt with Known Symmetric Key with Usage Limits |
CS-BC-M-8-13 | Encrypt and Decrypt with Known Symmetric Key and PKCS5 Padding |
CS-BC-M-9-13 | Encrypt and Decrypt with Known Symmetric Key and PKCS5 Padding |
CS-BC-M-10-13 | Encrypt and Decrypt with Known Symmetric Key and PKCS5 Padding and CBC |
CS-BC-M-11-13 | Encrypt and Decrypt with Known Symmetric Key and PKCS5 Padding and CBC and IV |
CS-BC-M-12-13 | Encrypt and Decrypt with Known Symmetric Key and PKCS5 Padding and CBC and IV |
CS-BC-M-13-13 | Encrypt and Decrypt with Known Symmetric Key and PKCS5 Padding and CBC and Random IV |
CS-BC-M-14-13 | Encrypt and Decrypt with Known Symmetric Key Date Checks |
CS-RNG-M-1-13 | RNG Retrieve |
CS-RNG-O-1-13 | Seed RNG with Server Accept |
CS-RNG-O-2-13 | Seed RNG with Server Partial Acceptt |
CS-RNG-O-3-13 | Seed RNG with Server Ignoret |
CS-RNG-O-4-13 | Seed RNG with Server Denyt |
CS-AC-M-1-13 | Sign with Known Asymmetric Key |
CS_AC-M-2-13 | Signature Verify with Known Asymmetric Key |
CS-AC-M-3-13 | Sign and Signature Verify with Known Asymmetric Key |
CS-AC-M-4-13 | MAC with Known Key |
CS_AC-M-5-13 | MAC Verify with Known Key |
CS-AC-M-6-13 | MAC and MAC Verify with Known Key |
CS-AC-M-7-13 | Hash |
CS-AC-M-8-13 | Sign and Signature Verify with Known Asymmetric Key Date Checks |
Test Case | Description |
AX-M-1-14 | Two key encryption |
AX-M-2-14 | Two key encryption |
TC-CERTATTR-1-14 | Certificate attributes |
TC-CREG-2-14 | Client Registration |
TC-CS-CORVAL-1-14 | Server/Client correlation values |
TC-CREATE-SD-1-14 | Create Secret Data Object |
TC-DERIVEKEY-1-14 | Derive Symmetric Key |
TC-DERIVEKEY-2-14 | Derive Symmetric Key |
TC-DERIVEKEY-3-14 | Derive Symmetric Key |
TC-DERIVEKEY-4-14 | Derive Symmetric Key |
TC-DERIVEKEY-5-14 | Derive Symmetric Key |
TC-DERIVEKEY-6-14 | Derive Symmetric Key |
TC-I18N-1-14 | UTF8 character in attribute |
TC-I18N-2-14 | UTF8 character in attribute |
TC-I18N-3-14 | UTF8 character in attribute |
TC-ECDSA-SIGN-1-14 | ECC Key Pair Sign |
TC-ECDSA-SIGN-DIGESTEDDATA-1-14 | ECC Key Pair Sign Digested |
TC-RSA-SIGN-DIGESTEDDATA-1-14 | RSA Key Pair Sign Digested |
TC-PKCS12-1-14 | PKCS#12 Private Key Export |
TC-PKCS12-2-14 | PKCS#12 Private Key Export |
TC_STREAM_SIGN_1_14 | Stream Sign with Asymmetric key |
TC-STREAM-SIGNVFY-1-14 | Stream Sign Verify |
TC-REKEY-1-14 | Rekey multiple times |
CS-BC-M-GCM-1-14 | Encrypt/Decrypt Symmetric Key in GCM |
CS-BC-M-GCM-2-14 | Encrypt/Decrypt Symmetric Key in GCM |
CS-BC-M-GCM-3-14 | Encrypt/Decrypt Symmetric Key in GCM |
CS-AC-OAEP-1-14 | Encrypt OAEP with known Asymmetric key |
CS-AC-OAEP-2-14 | Decrypt OAEP with known Asymmetric key |
CS-AC-OAEP-3-14 | Encrypt OAEP with known Asymmetric key |
CS-AC-OAEP-4-14 | Decrypt OAEP with known Asymmetric key |
CS-AC-OAEP-5-14 | Encrypt OAEP with known Asymmetric key |
CS-AC-OAEP-6-14 | Decrypt OAEP with known Asymmetric key |
CS-AC-OAEP-7-14 | Encrypt OAEP with known Asymmetric key |
CS-AC-OAEP-8-14 | Decrypt OAEP with known Asymmetric key |
CS-AC-OAEP-9-14 | Encrypt OAEP with known Asymmetric key |
CS-AC-OAEP-10-14 | Decrypt OAEP with known Asymmetric key |
TC-ECC-1-14 |
TC-ECC-2-14 |
TC-ECC-3-14 |
TC-EXTRACTABLE-1-14 |
TC-SENSITIVE-1-14 |
TC-MDO-1-14 |
TC-MDO-2-14 |
TC-MDO-3-14 |
TC-NP-1-14 |
TC-NP-2-14 |
TC-OFFSET-1-14 |
TC-OFFSET-2-14 |
TC-OTP-1-14 |
TC-OTP-2-14 |
TC-OTP-3-14 |
TC-OTP-4-14 |
TC-OTP-5-14 |
TC-PGP-1-14 |
TC-Q-CAP-1-14 |
TC-Q-CAP-2-14 |
TC-Q-CAP-3-14 |
TC-Q-CREG-1-14 |
TC-Q-PROF-1-14 |
TC-Q-PROF-2-14 |
TC-Q-PROF-3-14 |
TC-Q-RNGS-1-14 |
TC-Q-RNGS-2-14 |
TC-Q-RNGS-3-14 |
TC-Q-RNGS-4-14 |
TC-Q-RNGS-5-14 |
TC-Q-RNGS-6-14 |
TC-Q-S2C-1-14 |
TC-Q-S2C-2-14 |
TC-Q-S2C-PROF-1-14 |
TC-Q-VAL-1-14 |
TC-Q-VAL-2-14 |
TC-RNG-ATTR-1-14 |
TC-RNG-ATTR-2-14 |
TC-SJ-1-14 |
TC-SJ-2-14 |
TC-SJ-3-14 |
TC-SJ-4-14 |
TC-STREAM-ENC-1-14 |
TC-STREAM-ENC-2-14 |
TC-STREAM-ENCDEC-1-14 |
TC-STREAM-HASH-1-14 |
TC-STREAM-HASH-2-14 |
TC-STREAM-HASH-3-14 |
TC-STREAM-MAC-1-14 |
TC-STREAM-SIGN-1-14 |
TC-STREAM-SIGNVFY-1-14 |
TC-WRAP-1-14 |
TC-WRAP-2-14 |
TC-WRAP-3-14 |
CS-AC-M-1-14 |
CS-AC-M-2-14 |
CS-AC-M-3-14 |
CS-AC-M-4-14 |
CS-AC-M-5-14 |
CS-AC-M-6-14 |
CS-AC-M-7-14 |
CS-AC-M-8-14 |
CS-BC-M-1-14 |
CS-BC-M-2-14 |
CS-BC-M-3-14 |
CS-BC-M-4-14 |
CS-BC-M-5-14 |
CS-BC-M-6-14 |
CS-BC-M-7-14 |
CS-BC-M-8-14 |
CS-BC-M-9-14 |
CS-BC-M-10-14 |
CS-BC-M-11-14 |
CS-BC-M-12-14 |
CS-BC-M-13-14 |
CS-BC-M-14-14 |
CS-RNG-M-1-14 |
MSGENC-HTTPS-M-1-14 |
MSGENC-XML-M-1-14 |
MSGENC-JSON-M-1-14 |
OMOS-M-1-14 |
SASED-M-1-14 |
SASED-M-2-14 |
SASED-M-3-14 |
AKLC-M-1-14 |
AKLC-M-2-14 |
AKLC-M-3-14 |
SKLC-M-1-14 |
SKLC-M-2-14 |
SKLC-M-3-14 |
SKFF-M-1-14 |
SKFF-M-2-14 |
SKFF-M-3-14 |
SKFF-M-4-14 |
SKFF-M-5-14 |
SKFF-M-6-14 |
SKFF-M-7-14 |
SKFF-M-8-14 |
SKFF-M-9-14 |
SKFF-M-10-14 |
SKFF-M-11-14 |
SKFF-M-12-14 |
SUITEB-128-M-1-14 |
SUITEB-192-M-1-14 |
TL-M-1-14 |
TL-M-2-14 |
TL-M-3-14 |