EasyManua.ls Logo

HP M527dn

HP M527dn
98 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
HP Inc.
HP LaserJet Enterprise MFP M527 Series,
Color LaserJet Enterprise MFP M577 Series, and
PageWide Enterprise Color MFP 586 Series
Firmware with Jetdirect Inside Security Target
Version: 2.0 Copyright © 2008-2016 by atsec information security corporation and HP Inc. Page 53 of 98
Last update: 2016-06-07 or its wholly owned subsidiaries
Termination of an
interactive session
by the session
termination
mechanism
FTA_SSL.3
Minimum
None required
No
Table 24: Auditable events
User identity association (FAU_GEN.2) 6.1.1.2
FAU_GEN.2.1
For audit events resulting from actions of identified users, the TSF shall be able to
associate each auditable event with the identity of the user that caused the event.
6.1.2 Cryptographic support (FCS)
Cryptographic key generation (FCS_CKM.1) 6.1.2.1
FCS_CKM.1.1
The QuickSec cryptographic library in the Operational Environment TSF shall
generate cryptographic keys in accordance with a specified cryptographic key
generation algorithm defined in Table 25: Cryptographic key generation and
specified cryptographic key sizes defined in Table 25: Cryptographic key
generation that meet the following: the standards defined in Table 25:
Cryptographic key generation.
Protocol
Key
generation
algorithm
Key sizes
(in bits)
Standards
IPsec
AES
128, 192,
256
[RFC4301] Security Architecture for the Internet Protocol
HMAC-
SHA1-96
96
[RFC2404] The Use of HMAC-SHA-1-96 within ESP and
AH;
[RFC4301] Security Architecture for the Internet
Protocol;
[RFC4894] Use of Hash Algorithms in Internet Key
Exchange (IKE) and IPsec
HMAC-SHA-
256-128
256
[RFC4868] Using HMAC-SHA-256, HMAC-SHA-384,
and HMAC-SHA-512 with IPsec
HMAC-SHA-
384-196
384
HMAC-SHA-
512-256
512

Related product manuals