Skip to content

Commit d9452bf

Browse files
committed
spelling fixes
1 parent e5bdbc2 commit d9452bf

File tree

1 file changed

+15
-15
lines changed

1 file changed

+15
-15
lines changed

input/stip.xml

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1058,7 +1058,7 @@ expected to enforce.<h:p/>
10581058
the certificate enrollment process always requires the TSF to validate a presented certificate.</consistency-rationale>
10591059
<description> This SFR is selection-based in the <h:a href="https://www.niap-ccevs.org/protectionprofiles/511">Functional Package for X.509, version 1.0</h:a> but
10601060
is mandatory when this PP-Module is claimed. FIA_ENR_EXT.1 requires this PP-Module to generate certificate requests
1061-
using either PKCS#10 or Enrollment over Secure Transport (EST). If PKCS#10 is claimed, the TSF must be able to apply this SFR to the certificate repsonse signed
1061+
using either PKCS#10 or Enrollment over Secure Transport (EST). If PKCS#10 is claimed, the TSF must be able to apply this SFR to the certificate response signed
10621062
by an external CA. If EST is claimed, the TSF must be able to apply this SFR to the X.509 certificate presented by an EST server.</description>
10631063
<no-change/>
10641064
</base-sfr-spec>
@@ -1249,7 +1249,7 @@ expected to enforce.<h:p/>
12491249
</h:ol>
12501250
</title>
12511251
<note role="application">
1252-
The "Start-up and shtudown of the audit functions" event is identical to the event defined in the Base-PP's iteration of FAU_GEN.1.
1252+
The "Start-up and shutdown of the audit functions" event is identical to the event defined in the Base-PP's iteration of FAU_GEN.1.
12531253
The TOE is not required to have two separate events for this behavior if there is only a single audit stream that which all audit events use.
12541254
If the TOE does maintain a separate logging facility for STIP-related behavior, then this event must be addressed for it. Note that if
12551255
the audit functions cannot be started and stopped separately from the TOE itself, then auditing the start-up and shutdown of the TOE is sufficient to address this.
@@ -1445,7 +1445,7 @@ expected to enforce.<h:p/>
14451445
evaluator shall compare the ciphertext with the result of encryption of the same inputs with a known
14461446
good implementation.
14471447
<h:p/>
1448-
<h:b>Variable Assocated Data Test</h:b>
1448+
<h:b>Variable Associated Data Test</h:b>
14491449
<h:p/>
14501450
For each supported key size and associated data length, and any supported payload length, nonce length,
14511451
and tag length, the evaluator shall supply one key value, one nonce value, and 10 pairs of associated data
@@ -1583,7 +1583,7 @@ expected to enforce.<h:p/>
15831583
and secret keys referenced by this SFR</note>
15841584
<aactivity>
15851585
<TSS>The evaluator will check the TSS to ensure it lists each persistent secret and private key needed to meet
1586-
the requirements in the ST. For each of these items, the evaluatorshall confirm that the TSS lists for what
1586+
the requirements in the ST. For each of these items, the evaluator shall confirm that the TSS lists for what
15871587
purpose it is used, and how it is stored, and that the storage is hardware-protected.<h:p/></TSS>
15881588
<Guidance>There are no guidance EAs for this component.<h:p/></Guidance>
15891589
<Tests>There are no test EAs for this component.</Tests>
@@ -2009,7 +2009,7 @@ expected to enforce.<h:p/>
20092009
<h:p/></Guidance>
20102010
<Tests>Using the setup for <xref to="tttc-ciphers"/> of FCS_TTTC_EXT.1.1, the evaluator shall establish one or more trusted
20112011
subordinate CAs by issuing them valid CA certificates from the trusted CA. The evaluator shall establish a
2012-
certificate status capability for both the trusted subordinate CAsand the trusted CA that uses a method
2012+
certificate status capability for both the trusted subordinate CAs and the trusted CA that uses a method
20132013
supported by the TSF. The evaluator shall also establish an untrusted CA to use a self-signed CA certificate
20142014
not loaded into the TSF trust store. The evaluator shall establish one or more requested servers to use a
20152015
valid TLS version and cipher suite combination and to respond using valid TLS handshake messages except
@@ -2033,7 +2033,7 @@ expected to enforce.<h:p/>
20332033
evaluator shall ensure the subordinate CA is included in the certificate chain provided by the requested
20342034
server and the revocation information is available. The evaluator shall confirm that authentication fails.</test>
20352035
<test>The evaluator shall issue a valid certificate for the requested server from the subordinate CA, and
2036-
establish valid revocation information from the subordinate CA using a supported mechanism for endentity certificates, indicating the requested server’s certificate is revoked. The evaluator shall ensure the
2036+
establish valid revocation information from the subordinate CA using a supported mechanism for end-entity certificates, indicating the requested server’s certificate is revoked. The evaluator shall ensure the
20372037
subordinate CA is included in the certificate chain provided by the requested server and ensure the
20382038
revocation information is not available to the TSF. The evaluator shall confirm that the default behavior
20392039
for revocation information not available is performed by the TSF. If this behavior is configurable (the first
@@ -2819,7 +2819,7 @@ legacy cipher suites. -->
28192819
the current time and a notAfter value that does not precede the value
28202820
specified in notBefore.</h:li>
28212821
<h:li>The issuer field is not empty and is populated with the
2822-
<assignable>authrozied role(s)</assignable>-configured CA name.</h:li>
2822+
<assignable>authorized role(s)</assignable>-configured CA name.</h:li>
28232823
<h:li>The signature field and the algorithm in the subjectPublicKeyInfo field
28242824
shall contain the OID for a signature algorithm specified in
28252825
FCS_COP.1.</h:li>
@@ -4434,13 +4434,13 @@ legacy cipher suites. -->
44344434
<!-- Note: changed conditional statement to make it more obvious what the trigger is for this test -->
44354435
(conditional, both 'mutual authentication inspection' and 'send an empty certificate list as part of the inspection operation' are selected in FDP_TEP_EXT.1.7):
44364436
The evaluator shall establish a server to send certificate requests in its TLS handshake.
4437-
The evaluator shall extablish a monitored client configured to provide a valid client certificate in response to a certificate request.
4437+
The evaluator shall establish a monitored client configured to provide a valid client certificate in response to a certificate request.
44384438
The evaluator shall follow operational guidance to configure the TLS inspection proxy policy to send an empty certificate list in a certificate message to the server,
44394439
and initiate a TLS request from a monitored client to the server through the TOE.
44404440
The evaluator shall observe network traffic between the TOE and the requested server and confirm that the TOE sends an empty certificate list to the server after receiving the certificate request.
44414441
<h:p/>
44424442
Using the same server, the evaluator shall follow operational guidance to configure the TSF to perform mutual authentication inspection with the server,
4443-
and initiate a TLS request from the same monitored client ro the same requested server through the TOE.
4443+
and initiate a TLS request from the same monitored client to the same requested server through the TOE.
44444444
The evaluator shall observe network traffic between the TOE and the requested server and confirm the TOE sends a certificate message containing a client certificate representing the monitored client.
44454445
</test>
44464446
</testlist>
@@ -4608,7 +4608,7 @@ legacy cipher suites. -->
46084608
correspond to SFR-relevant functionality. For example, a peer acting as
46094609
a web server should have TLS Web Server Authentication listed as an
46104610
extendedKeyUsage parameter of its X.509v3 certificate. The TOE
4611-
ensuresthat the relevant extensions in each certificate in the chain such
4611+
ensures that the relevant extensions in each certificate in the chain such
46124612
as the extendedKeyUsage parameters of the leaf certificate correspond
46134613
to the SFR-relevant functionality they are used with.</h:li>
46144614
</h:ol><h:p/>
@@ -4652,7 +4652,7 @@ legacy cipher suites. -->
46524652
<Guidance>There are no guidance EAs for this component.<h:p/></Guidance>
46534653
<Tests>
46544654
The evaluator shall demonstrate that checking the validity of a certificate is performed when a certificate
4655-
is used in an authentication of a requested server certificate, or, if mutual authentication for throughtraffic processing is supported, a monitored client certificate, as well as CA certificates included in the
4655+
is used in an authentication of a requested server certificate, or, if mutual authentication for through traffic processing is supported, a monitored client certificate, as well as CA certificates included in the
46564656
certificate path and any for OCSP responses used in validating these certificates. The evaluator shall
46574657
perform the following tests for FIA_X509_EXT.1.1/STIP. These tests must be repeated for each distinct
46584658
security function that uses X.509v3 certificates in association with thru-traffic processing. For
@@ -5914,7 +5914,7 @@ legacy cipher suites. -->
59145914
The TSF shall be able to obtain EST server and CA certificates for authorized EST
59155915
services via <selectables>
59165916
<selectable>implicit Trust Anchor/Trust Store (TA) configured by
5917-
<assignable>authorzed role(s)</assignable></selectable>
5917+
<assignable>authorized role(s)</assignable></selectable>
59185918
<selectable>an explicit TA populated
59195919
via a TLS-authenticated EST CA certificate request in accordance with RFC 7030
59205920
section 4.1.2 and FCS_TLSC_EXT.1</selectable>
@@ -6566,7 +6566,7 @@ legacy cipher suites. -->
65666566
user.</h:li>
65676567
<h:li>If the basicConstraints field is configured to be present, it shall be
65686568
populated with the value cA=False.</h:li>
6569-
<h:li>If configured to be present, th epolicy OID and policy mapping fields shall be populated according to
6569+
<h:li>If configured to be present, the policy OID and policy mapping fields shall be populated according to
65706570
<selectables linebreak="yes">
65716571
<selectable>a <h:b><selectables>
65726572
<selectable>Security Administrator</selectable>
@@ -6593,7 +6593,7 @@ legacy cipher suites. -->
65936593
maximum validity duration value as configured by a <assignable>authorized role(s)</assignable> user.</h:li>
65946594
<h:li>If the basicConstraints field is configured to be present, it shall be
65956595
populated with the value cA=False</h:li>
6596-
<h:li>If configured to be present, th epolicy OID and policy mapping fields shall be populated according to
6596+
<h:li>If configured to be present, the policy OID and policy mapping fields shall be populated according to
65976597
<selectables linebreak="yes">
65986598
<selectable>a <assignable>authorized role(s)</assignable> configured mapping from validated client certificate values to
65996599
one or more stated policy OIDs</selectable>
@@ -7284,7 +7284,7 @@ legacy cipher suites. -->
72847284
connection between the TSF and the requested server.
72857285
</test>
72867286
<test>The evaluator shall cause the TSF to initiate renegotiation with the requested server and verify
7287-
that the Client Hello message received by the requested server containsthe renegotiation_info extension.
7287+
that the Client Hello message received by the requested server contains the renegotiation_info extension.
72887288
The evaluator shall cause the requested server to send a Server Hello message with a renegotiation info
72897289
extension containing data in which one or both of the client_verify_data or server_verify_data value is
72907290
modified. The evaluator shall verify that the TSF terminates the connection.

0 commit comments

Comments
 (0)