FIPS Design Assurance: Difference between revisions

Jump to navigation Jump to search
Line 10: Line 10:
The configuration items are:
The configuration items are:
* cryptographic module: the module is uniquely identified by the set of module components (the libsoftokn3 and libfreebl3 libraries) and has the same version as the module components. See the next item.
* cryptographic module: the module is uniquely identified by the set of module components (the libsoftokn3 and libfreebl3 libraries) and has the same version as the module components. See the next item.
* software module components: the libsoftokn3 and libfreebl3 libraries are uniquely identified by their file names. On Unix, their versions can be uniquely identified by the <code>what</code> or <code>ident</code> command, for example, <code>"what libsoftokn3.so | grep NSS"</code> and <code>"ident libfreebl3.so | grep NSS"</code>. On Windows, their versions can be uniquely identified by the Version tab in the Properties dialog.
* software module components: the libsoftokn3 and libfreebl3 libraries are uniquely identified by their file names. On Unix, their versions can be uniquely identified by the <code>what</code> or <code>ident</code> command, for example, <code>"what libsoftokn3.so | grep NSS"</code> and <code>"ident libfreebl3.so | grep NSS"</code>. On Windows, their versions can be uniquely identified by the Version tab in the Properties dialog. Each executable file in [http://wiki.mozilla.org/Security_Policy#Specification_of_Security_Policy Security Policy Rule 36 ]  (files with extensions other than .chk) will be labeled as "NSS 3.11.5".
* security policy (including user guidance): the security policy is uniquely identified by its URL, and its version is uniquely identified by the "last modified" time stamp at the bottom of the security policy.
* security policy (including user guidance): the security policy is uniquely identified by its URL, and its version is uniquely identified by the "last modified" time stamp at the bottom of the security policy.
* operating system: see the operating system documentation for the methods used to uniquely identify the operating system and its version. (On Unix, use the <code>"uname -a"</code> command. On Linux, use the <code>"cat /etc/redhat-release"</code> command. On Mac OS X, use the "About This Mac" command in the Apple menu. On Windows, use the System applet in the Control Panel.)
* operating system: see the operating system documentation for the methods used to uniquely identify the operating system and its version. (On Unix, use the <code>"uname -a"</code> command. On Linux, use the <code>"cat /etc/redhat-release"</code> command. On Mac OS X, use the "About This Mac" command in the Apple menu. On Windows, use the System applet in the Control Panel.)
198

edits

Navigation menu