198
edits
No edit summary |
|||
| Line 193: | Line 193: | ||
== Results of FIPS 140-2 Level 2 Maintenance Validation of NSS 3.11.5 == | == Results of FIPS 140-2 Level 2 Maintenance Validation of NSS 3.11.5 == | ||
<table width="100%" border="1" cellspacing="2" cellpadding="2"> | |||
<tbody> | |||
<tr> | |||
<td valign="Top" align="Center"><font size="+1"><b>FIPS 140-1 | |||
<br> | |||
Section<br> | |||
</b></font></td> | |||
<td valign="Top" align="Center"><font size="+1"><b>Description<br> | |||
</b></font></td> | |||
<td valign="Top" align="Center"><font size="+1"><b>Validation<br> | |||
Level <br> | |||
Obtained<br> | |||
</b></font></td> | |||
</tr> | |||
<tr> | |||
<td valign="Top" align="Left"><font size="+1">1.0<br> | |||
</font></td> | |||
<td valign="Top"><font size="+1">Cryptographic Modules<br> | |||
</font></td> | |||
<td valign="Top" align="Center"><font size="+1">2<br> | |||
</font></td> | |||
</tr> | |||
<tr> | |||
<td valign="Top" align="Left"><font size="+1">2.0<br> | |||
</font></td> | |||
<td valign="Top"><font size="+1">Module Interfaces<br> | |||
</font></td> | |||
<td valign="Top" align="Center"><font size="+1">2<br> | |||
</font></td> | |||
</tr> | |||
<tr> | |||
<td valign="Top" align="Left"><font size="+1">3.0<br> | |||
</font></td> | |||
<td valign="Top"><font size="+1">Roles and Services<br> | |||
</font></td> | |||
<td valign="Top" align="Center"><font size="+1">2<br> | |||
</font></td> | |||
</tr> | |||
<tr> | |||
<td valign="Top" align="Left"><font size="+1">4.0<br> | |||
</font></td> | |||
<td valign="Top"><font size="+1">Finite State Machine Model<br> | |||
</font></td> | |||
<td valign="Top" align="Center"><font size="+1">2<br> | |||
</font></td> | |||
</tr> | |||
<tr> | |||
<td valign="Top" align="Left"><font size="+1">5.0<br> | |||
</font></td> | |||
<td valign="Top"><font size="+1">Physical Security<br> | |||
</font></td> | |||
<td valign="Top" align="Center"><font size="+1">2<br> | |||
</font></td> | |||
</tr> | |||
<tr> | |||
<td valign="Top" align="Left"><font size="+1">6.0<br> | |||
</font></td> | |||
<td valign="Top"><font size="+1">Software Security<br> | |||
</font></td> | |||
<td valign="Top" align="Center"><font size="+1">2<br> | |||
</font></td> | |||
</tr> | |||
<tr> | |||
<td valign="Top" align="Left"><font size="+1">7.0<br> | |||
</font></td> | |||
<td valign="Top"><font size="+1">Operating System Security<br> | |||
</font></td> | |||
<td valign="Top" align="Center"><font size="+1">2<br> | |||
</font></td> | |||
</tr> | |||
<tr> | |||
<td valign="Top" align="Left"><font size="+1">8.0<br> | |||
</font></td> | |||
<td valign="Top"><font size="+1">Cryptographic Key Management<br> | |||
</font></td> | |||
<td valign="Top" align="Center"><font size="+1">2<br> | |||
</font></td> | |||
</tr> | |||
<tr> | |||
<td valign="Top" align="Left"><font size="+1">9.0<br> | |||
</font></td> | |||
<td valign="Top"><font size="+1">Cryptographic Algorithms<br> | |||
</font></td> | |||
<td valign="Top" align="Center"><font size="+1">2<br> | |||
</font></td> | |||
</tr> | |||
<tr> | |||
<td valign="Top" align="Left"><font size="+1">10.0<br> | |||
</font></td> | |||
<td valign="Top"><font size="+1">EMI/EMC<br> | |||
</font></td> | |||
<td valign="Top" align="Center"><font size="+1">2<br> | |||
</font></td> | |||
</tr> | |||
<tr> | |||
<td valign="Top" align="Left"><font size="+1">11.0<br> | |||
</font></td> | |||
<td valign="Top"><font size="+1">Self-Tests<br> | |||
</font></td> | |||
<td valign="Top" align="Center"><font size="+1">2</font><br> | |||
</td> | |||
</tr> | |||
</table> | |||
== Results of FIPS 140-2 Level 1 Maintenance Validation of NSS 3.11.5 == | == Results of FIPS 140-2 Level 1 Maintenance Validation of NSS 3.11.5 == | ||
<table width="100%" border="1" cellspacing="2" cellpadding="2"> | |||
<tr> | |||
<td valign="Top" align="Center"><font size="+1"><b>FIPS 140-1 | |||
<br> | |||
Section<br> | |||
</b></font></td> | |||
<td valign="Top" align="Center"><font size="+1"><b>Description<br> | |||
</b></font></td> | |||
<td valign="Top" align="Center"><font size="+1"><b>Validation<br> | |||
Level <br> | |||
Obtained<br> | |||
</b></font></td> | |||
</tr> | |||
<tr> | |||
<td valign="Top" align="Left"><font size="+1">1.0<br> | |||
</font></td> | |||
<td valign="Top"><font size="+1">Cryptographic Modules<br> | |||
</font></td> | |||
<td valign="Top" align="Center"><font size="+1">1<br> | |||
</font></td> | |||
</tr> | |||
<tr> | |||
<td valign="Top" align="Left"><font size="+1">2.0<br> | |||
</font></td> | |||
<td valign="Top"><font size="+1">Module Interfaces<br> | |||
</font></td> | |||
<td valign="Top" align="Center"><font size="+1">1<br> | |||
</font></td> | |||
</tr> | |||
<tr> | |||
<td valign="Top" align="Left"><font size="+1">3.0<br> | |||
</font></td> | |||
<td valign="Top"><font size="+1">Roles and Services<br> | |||
</font></td> | |||
<td valign="Top" align="Center"><font size="+1">2<br> | |||
</font></td> | |||
</tr> | |||
<tr> | |||
<td valign="Top" align="Left"><font size="+1">4.0<br> | |||
</font></td> | |||
<td valign="Top"><font size="+1">Finite State Machine Model<br> | |||
</font></td> | |||
<td valign="Top" align="Center"><font size="+1">1<br> | |||
</font></td> | |||
</tr> | |||
<tr> | |||
<td valign="Top" align="Left"><font size="+1">5.0<br> | |||
</font></td> | |||
<td valign="Top"><font size="+1">Physical Security<br> | |||
</font></td> | |||
<td valign="Top" align="Center"><font size="+1">1<br> | |||
</font></td> | |||
</tr> | |||
<tr> | |||
<td valign="Top" align="Left"><font size="+1">6.0<br> | |||
</font></td> | |||
<td valign="Top"><font size="+1">Software Security<br> | |||
</font></td> | |||
<td valign="Top" align="Center"><font size="+1">1<br> | |||
</font></td> | |||
</tr> | |||
<tr> | |||
<td valign="Top" align="Left"><font size="+1">7.0<br> | |||
</font></td> | |||
<td valign="Top"><font size="+1">Operating System Security<br> | |||
</font></td> | |||
<td valign="Top" align="Center"><font size="+1">1<br> | |||
</font></td> | |||
</tr> | |||
<tr> | |||
<td valign="Top" align="Left"><font size="+1">8.0<br> | |||
</font></td> | |||
<td valign="Top"><font size="+1">Cryptographic Key Management<br> | |||
</font></td> | |||
<td valign="Top" align="Center"><font size="+1">1<br> | |||
</font></td> | |||
</tr> | |||
<tr> | |||
<td valign="Top" align="Left"><font size="+1">9.0<br> | |||
</font></td> | |||
<td valign="Top"><font size="+1">Cryptographic Algorithms<br> | |||
</font></td> | |||
<td valign="Top" align="Center"><font size="+1">1<br> | |||
</font></td> | |||
</tr> | |||
<tr> | |||
<td valign="Top" align="Left"><font size="+1">10.0<br> | |||
</font></td> | |||
<td valign="Top"><font size="+1">EMI/EMC<br> | |||
</font></td> | |||
<td valign="Top" align="Center"><font size="+1">1<br> | |||
</font></td> | |||
</tr> | |||
<tr> | |||
<td valign="Top" align="Left"><font size="+1">11.0<br> | |||
</font></td> | |||
<td valign="Top"><font size="+1">Self-Tests<br> | |||
</font></td> | |||
<td valign="Top" align="Center"><font size="+1">1</font><br> | |||
</td> | |||
</tr> | |||
</table> | |||
<br> | |||
== Platform List == | == Platform List == | ||
edits