1. Manuals
  2. Brands
  3. Computer Equipment
  4. Server
  5. IBM
  6. Computer Equipment
  7. Server

IBM 10 SP1 EAL4 Figure 5-92: SSL protocol action

1 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 246
Download on canonical page 246 pages, 2.94 Mb
For the list of Cipher suites supported, see FCS_COP.1(2) in the Security Target.
5. SSL Change cipher spec protocol: The SSL change cipher spec protocol signals transitions in the
security parameters. The protocol consists of a single message, which is encrypted with the current
security parameters. Using the change cipher spec message, security parameters can be changed by
either the client or the server. The receiver of the change cipher spec message informs the SSL record
protocol of the updates to security parameters.
6. SSL alert protocol: The SSL alert protocol communicates SSL-specific errors, such as errors
encountered during handshake or message verification, to the appropriate peer.
7. SSL record protocol: The SSL record protocol takes messages to be transmitted, fragments them into
manageable blocks, and optionally compresses them. Then, using all the negotiated security
parameters, applies a message authentication code (MAC), encrypts the data, and transmits the result
to the transport layer (TCP). The received data is decrypted, verified, decompressed, and
reassembled. It is then delivered to a higher layer.
The SSL record protocol provides confidentiality by encrypting the message with the shared secret
key negotiated by the handshake protocol. The SSL record protocol provides message integrity by
attaching a MAC to the message. The MAC is created with another shared secret key negotiated by
the handshake protocol.
Figure 5-92 [STALLS] depicts the operation of the SSL record protocol.

5.12.1.3 OpenSSL algorithms

This section briefly describes various encryption and hash algorithms supported by OpenSSL on the TOE.

5.12.1.4 Symmetric ciphers

OpenSSL on the TOE supports the following symmetric key encryption algorithms. For a detailed
description of each of these algorithms, refer to their man pages.
188
Figure 5-92: SSL protocol action
MENU

Models

Contents