Brocade Communications Systems FCX Series User Manual Page 20

  • Download
  • Add to my manuals
  • Print
  • Page
    / 53
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 19
Version 1.1, 05/19/2014
GSS CCT Evaluation Technical Report Page 20 of 53
© 2014 Gossamer Security Solutions, Inc.
Document: AAR-BrocadeFastIron8010
All rights reserved.
2.2.5.1 FCS_COP.1(3).1
TSS Assurance Activities: None Defined
Guidance Assurance Activities: None Defined
Testing Assurance Activities: The evaluator shall use "The Secure Hash Algorithm Validation System (SHAVS)" as a
guide in testing the requirement above. This will require that the evaluator have a reference implementation of
the algorithms known to be good that can produce test vectors that are verifiable during the test.
The TOE has been FIPS approved. The SHA certificate numbers are 2265, 2259, 2260, 2257, 2258 covering all
evaluated models.
2.2.6 CRYPTOGRAPHIC OPERATION (FOR KEYED-HASH MESSAGE
AUTHENTICATION) (FCS_COP.1(4))
2.2.6.1 FCS_COP.1(4).1
TSS Assurance Activities: None Defined
Guidance Assurance Activities: None Defined
Testing Assurance Activities: The evaluator shall use "The Keyed-Hash Message Authentication Code (HMAC)
Validation System (HMACVS)" as a guide in testing the requirement above. This will require that the evaluator have
a reference implementation of the algorithms known to be good that can produce test vectors that are verifiable
during the test.
The TOE has been FIPS approved. The HMAC certificate numbers are 1679, 1675, 1676, and 1674 covering all
evaluated models.
Page view 19
1 2 ... 15 16 17 18 19 20 21 22 23 24 25 ... 52 53

Comments to this Manuals

No comments