HP Inc.
HP LaserJet Enterprise MFP M527 Series,
Color LaserJet Enterprise MFP M577 Series, and
PageWide Enterprise Color MFP 586 Series
Firmware with Jetdirect Inside Security Target
Version: 2.0 Copyright © 2008-2016 by atsec information security corporation and HP Inc. Page 53 of 98
Last update: 2016-06-07 or its wholly owned subsidiaries
Termination of an
interactive session
by the session
termination
mechanism
Table 24: Auditable events
User identity association (FAU_GEN.2) 6.1.1.2
For audit events resulting from actions of identified users, the TSF shall be able to
associate each auditable event with the identity of the user that caused the event.
6.1.2 Cryptographic support (FCS)
Cryptographic key generation (FCS_CKM.1) 6.1.2.1
The QuickSec cryptographic library in the Operational Environment TSF shall
generate cryptographic keys in accordance with a specified cryptographic key
generation algorithm defined in Table 25: Cryptographic key generation and
specified cryptographic key sizes defined in Table 25: Cryptographic key
generation that meet the following: the standards defined in Table 25:
Cryptographic key generation.
[RFC4301] Security Architecture for the Internet Protocol
[RFC2404] The Use of HMAC-SHA-1-96 within ESP and
AH;
[RFC4301] Security Architecture for the Internet
Protocol;
[RFC4894] Use of Hash Algorithms in Internet Key
Exchange (IKE) and IPsec
[RFC4868] Using HMAC-SHA-256, HMAC-SHA-384,
and HMAC-SHA-512 with IPsec