name |
PR/SM for IBM z15 and IBM LinuxOne III Systems Driver Level D41C |
Motorola Solutions RFS7000-GR Wireless LAN Switch and AP-7131N Wireless Access Point |
category |
Operating Systems |
Network and Network-Related Devices and Systems |
scheme |
DE |
US |
status |
active |
archived |
not_valid_after |
30.06.2025 |
28.03.2016 |
not_valid_before |
01.07.2020 |
28.03.2014 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1133c_pdf.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1133a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10472-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1133b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10472-st.pdf |
manufacturer |
IBM Corporation |
Motorola Solutions, Inc. |
manufacturer_web |
https://www.ibm.com |
https://www.motorolasolutions.com |
security_level |
EAL5, AVA_VAN.5, ALC_TAT.3, ATE_FUN.2, ALC_FLR.3 |
EAL2+, ALC_FLR.2 |
dgst |
00e236c67ac43f3f |
778473e553d9d55f |
heuristics/cert_id |
BSI-DSZ-CC-1133-2020 |
CCEVS-VR-VID-10472-2014 |
heuristics/cert_lab |
BSI |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ALC_FLR.3, ADV_FSP.5, ATE_FUN.2, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1, ADV_SPM.1 |
heuristics/extracted_versions |
- |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-1160-2021 |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1109-2019 |
{} |
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-1186-2023, BSI-DSZ-CC-1160-2021, BSI-DSZ-CC-1222-2024 |
{} |
heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0846-2013, BSI-DSZ-CC-0715-2011, BSI-DSZ-CC-1005-2016, BSI-DSZ-CC-1109-2019, BSI-DSZ-CC-0953-2015, BSI-DSZ-CC-0793-2012, BSI-DSZ-CC-0900-2014, BSI-DSZ-CC-1048-2018 |
{} |
heuristics/scheme_data |
- category: Server applications
- cert_id: BSI-DSZ-CC-1133-2020
- certification_date: 01.07.2020
- enhanced:
- applicant: IBM Corporation 2455 South Road P329 Poughkeepsie NY 12601 (USA)
- assurance_level: EAL5,ALC_FLR.3,ALC_TAT.3,ATE_FUN.2,AVA_VAN.5
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1133c_pdf.pdf?__blob=publicationFile&v=1
- certification_date: 01.07.2020
- description: PR/SM is a hardware facility running on IBM z15 and IBM LinuxONE III systems that enables the resources of a single physical machine to be divided between distinct, predefined logical machines called "logical partitions". Each logical partition is a domain of execution, and is considered to be a subject capable of running a conventional system control program (SCP) such as z/OS™, z/VM™, z/VSE, z/TPF™, or Linux for System z. These operating systems run unmodified in a PR/SM partition.
- evaluation_facility: atsec information security GmbH
- expiration_date: 30.06.2025
- product: PR/SM for IBM z15 and IBM LinuxOne III Systems Driver Level D41C
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1133a_pdf.pdf?__blob=publicationFile&v=1
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1133b_pdf.pdf?__blob=publicationFile&v=1
- product: PR/SM for IBM z15 and IBM LinuxOne III Systems Driver Level D41C
- subcategory: Virtualisation
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Serveranwendungen_Virtualisierung/1133.html
- vendor: IBM Corporation
|
- category: Wireless LAN
- certification_date: 28.03.2014
- evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
- expiration_date: 28.03.2016
- id: CCEVS-VR-VID10472
- product: Motorola Solutions RFS7000-GR Wireless LAN Switch and AP-7131N Wireless Access Point
- scheme: US
- url: https://www.niap-ccevs.org/product/10472
- vendor: Motorola Mobility LLC
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
1133c_pdf.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 5: 1
- EAL 5 augmented: 1
|
|
pdf_data/cert_keywords/cc_sar |
- ALC:
- ALC_FLR: 1
- ALC_FLR.3: 1
- ALC_TAT.3: 1
- ATE:
- AVA:
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20200702094713+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, PR/SM, IBM, z15, IBM LinuxOne III Systems, BSI-DSZ-CC-1133"
- /ModDate: D:20200702100618+02'00'
- /Producer: LibreOffice 6.2
- /Subject: PR/SM for IBM z15 and IBM LinuxOne III Systems Driver Level D41C with Bundle Level H06/S06c from IBM Corporation
- /Title: Certificate BSI-DSZ-CC-1133
- pdf_file_size_bytes: 313728
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
1133a_pdf.pdf |
st_vid10472-vr.pdf |
pdf_data/report_frontpage |
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_FLR.3, ALC_TAT.3, ATE_FUN.2, AVA_VAN.5
- cc_version: Product specific Security Target Common Criteria Part 2 conformant
- cert_id: BSI-DSZ-CC-1133-2020
- cert_item: PR/SM for IBM z15 and IBM LinuxOne III Systems Driver Level D41C
- cert_lab: BSI
- developer: IBM Corporation
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: None
- US:
|
- DE:
- US:
- cert_id: CCEVS-VR-VID10472-2014
- cert_item: Motorola Solutions, Inc. RFS7000-GR Wireless LAN Switch and AP-7131N Wireless Access Point
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1109-2019: 3
- BSI-DSZ-CC-1133-2020: 15
|
- US:
- CCEVS-VR-VID10472-2014: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 4
- EAL 5: 4
- EAL 5 augmented: 3
- EAL 5+: 1
- EAL 6: 1
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_FSP.5: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ALC:
- ALC_CMS.5: 1
- ALC_FLR: 3
- ALC_FLR.3: 4
- ALC_TAT.3: 5
- ATE:
- ATE_DPT.3: 1
- ATE_FUN.2: 5
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.NO_EVIL: 1
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TOE_NO_BYPASS: 1
- T:
- T.ACCIDENTAL_ADMIN_ERROR: 1
- T.ACCIDENTAL_CRYPTO_COMPROMISE: 1
- T.MASQUERADE: 1
- T.POOR_DESIGN: 1
- T.POOR_IMPLEMENTATION: 1
- T.POOR_TEST: 1
- T.RESIDUAL_DATA: 1
- T.TSF_COMPROMISE: 1
- T.UNATTENDED_SESSION: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTH_ACCESS_POINT: 1
- T.UNAUTH_ADMIN_ACCESS: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 32: 1
- AIS 34: 1
- AIS 38: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Report, Version 3, 2020-05-29, Final Evaluation Technical Report, atsec information security GmbH (confidential document) [8] z15 System Hardware Management Console Operations Guide, Version 2.15.0, 2019-09-13, IBM: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- OutOfScope:
- out of scope: 1
- the security test suite FTP06 must be included in the driver regression testing, which however is out of scope for this evaluation The combination of the above ensures that changes to the driver, including: 1
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20200702143526+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, PR/SM, IBM, z15, IBM LinuxOne III Systems, BSI-DSZ-CC-1133"
- /ModDate: D:20200702144908+02'00'
- /Producer: LibreOffice 6.2
- /Subject: PR/SM for IBM z15 and IBM LinuxOne III Systems Driver Level D41C with Bundle Level H06/S06c from IBM Corporation
- /Title: Certification Report BSI-DSZ-CC-1133-2020
- pdf_file_size_bytes: 721385
- pdf_hyperlinks: https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 29
|
- /Author: Steve Wilson
- /Company: InfoGard Laboratories
- /CreationDate: D:20140331160855-04'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Keywords:
- /ModDate: D:20140331160902-04'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20140331200839
- /Subject:
- /Title: D
- pdf_file_size_bytes: 166987
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
pdf_data/st_filename |
1133b_pdf.pdf |
st_vid10472-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 2: 6
- EAL1: 4
- EAL2: 8
- EAL2 augmented: 4
- EAL2+: 2
- EAL3: 4
- EAL5: 4
- EAL6: 2
- EAL7: 4
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.5: 2
- ADV_IMP.1: 2
- ADV_INT.2: 2
- ADV_TDS.4: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.5: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 2
- ALC_FLR.3: 4
- ALC_LCD.1: 2
- ALC_TAT.3: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 2
- ATE_DPT.3: 2
- ATE_FUN.2: 4
- ATE_IND.2: 2
- AVA:
|
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 12
- ADV_FSP: 2
- ADV_FSP.1: 2
- ADV_FSP.2: 26
- ADV_IMP: 2
- ADV_INT: 2
- ADV_SPM: 4
- ADV_SPM.1: 4
- ADV_TDS: 2
- ADV_TDS.1: 20
- AGD:
- AGD_OPE: 4
- AGD_OPE.1: 18
- AGD_PRE: 2
- AGD_PRE.1: 16
- ALC:
- ALC_CMC: 2
- ALC_CMC.2: 8
- ALC_CMS: 2
- ALC_CMS.2: 8
- ALC_DEL: 2
- ALC_DEL.1: 8
- ALC_DVS: 2
- ALC_FLR: 2
- ALC_FLR.2: 18
- ALC_TAT: 2
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 2
- ASE_ECD: 2
- ASE_ECD.1: 2
- ASE_INT: 2
- ASE_INT.1: 2
- ASE_OBJ: 2
- ASE_OBJ.2: 2
- ASE_REQ: 2
- ASE_REQ.2: 2
- ASE_SPD: 2
- ASE_SPD.1: 2
- ASE_TSS: 2
- ASE_TSS.1: 2
- ATE:
- ATE_COV: 2
- ATE_COV.1: 14
- ATE_COV.2: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_FUN.1: 12
- ATE_IND: 2
- ATE_IND.2: 6
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 10
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_SAR.3: 7
- FAU_SAR.3.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 7
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC: 4
- FDP_ACC.1: 3
- FDP_ACC.1.1: 2
- FDP_ACC.2: 25
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 43
- FDP_ACF.1: 14
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 17
- FDP_IFC.1.1: 1
- FDP_IFF.1: 9
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_RIP.2: 8
- FDP_RIP.2.1: 1
- FIA:
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_UID.2: 10
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 27
- FMT_MSA.1: 14
- FMT_MSA.3: 13
- FMT_MSA.3.1: 4
- FMT_MSA.3.2: 4
- FMT_MTD.1: 9
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 13
- FPR_UNO.1.1: 1
- FPT:
- FPT_ITT.1: 8
- FPT_ITT.1.1: 1
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TRC.1: 7
- FPT_TRC.1.1: 1
- FPT_TRC.1.2: 1
- FPT_TST.1: 8
- FPT_TST.1.1: 2
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_RSA.1: 7
- FRU_RSA.1.1: 1
- FTA:
- FTA_TSE.1: 10
- FTA_TSE.1.1: 1
|
- FAU:
- FAU_GEN: 36
- FAU_GEN.1: 22
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 2
- FAU_GEN.2: 16
- FAU_GEN.2.1: 2
- FAU_SEL.1: 16
- FAU_SEL.1.1: 2
- FAU_UAU.1: 2
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 68
- FCS_CKM.1.1: 7
- FCS_CKM.2: 18
- FCS_CKM.2.1: 9
- FCS_CKM.4: 52
- FCS_CKM.4.1: 2
- FCS_CKM_EXT.2: 2
- FCS_COP: 6
- FCS_COP.1: 81
- FCS_COP.1.1: 37
- FCS_PEAP_EXT: 5
- FCS_PEAP_EXT.1: 28
- FCS_PEAP_EXT.1.1: 2
- FCS_PEAP_EXT.1.2: 4
- FCS_PEAP_EXT.1.3: 4
- FCS_PEAP_EXT.1.4: 4
- FCS_RAD_EXT: 5
- FCS_RAD_EXT.1: 28
- FCS_RAD_EXT.1.1: 4
- FCS_RAD_EXT.1.2: 4
- FCS_RAD_EXT.1.3: 4
- FCS_SFTP_EXT: 4
- FCS_SFTP_EXT.1: 30
- FCS_SFTP_EXT.1.1: 2
- FCS_SFTP_EXT.1.2: 4
- FCS_SSH_EXT: 4
- FCS_SSH_EXT.1: 39
- FCS_SSH_EXT.1.1: 4
- FCS_SSH_EXT.1.2: 4
- FCS_SSH_EXT.1.3: 4
- FCS_SSH_EXT.1.4: 4
- FCS_SSH_EXT.1.5: 4
- FCS_SSH_EXT.1.6: 4
- FCS_SSH_EXT.1.7: 4
- FCS_SSH_EXT.1.8: 4
- FCS_SSH_EXT.1.9: 4
- FCS_TLS_EXT: 4
- FCS_TLS_EXT.1: 61
- FCS_TLS_EXT.1.1: 4
- FCS_TTLS_EXT.1: 1
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF: 2
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 4
- FDP_IFC.1: 48
- FDP_IFC.1.1: 5
- FDP_IFF: 43
- FDP_IFF.1: 44
- FDP_ITC.1: 18
- FDP_ITC.2: 14
- FDP_PUD: 2
- FDP_RIP: 4
- FDP_RIP.1: 18
- FDP_RIP.1.1: 2
- FIA:
- FIA_AFL: 4
- FIA_AFL.1: 16
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD: 4
- FIA_ATD.1: 29
- FIA_ATD.1.1: 5
- FIA_UAU: 12
- FIA_UAU.1: 38
- FIA_UAU.1.1: 6
- FIA_UAU.1.2: 4
- FIA_UAU.4: 7
- FIA_UAU.4.1: 1
- FIA_UAU.5: 1
- FIA_UAU.5.1: 1
- FIA_UID: 4
- FIA_UID.1: 8
- FIA_UID.2: 21
- FIA_UID.2.1: 2
- FIA_USB: 4
- FIA_USB.1: 16
- FIA_USB.1.1: 2
- FIA_USB.1.2: 2
- FIA_USB.1.3: 2
- FMT:
- FMT_MOF: 4
- FMT_MOF.1: 93
- FMT_MOF.1.1: 12
- FMT_MSA: 5
- FMT_MSA.1: 19
- FMT_MSA.1.1: 1
- FMT_MSA.2: 58
- FMT_MSA.2.1: 2
- FMT_MSA.3: 49
- FMT_MSA.3.1: 5
- FMT_MSA.3.2: 5
- FMT_MTD: 4
- FMT_MTD.1: 40
- FMT_MTD.1.1: 5
- FMT_REV.1: 1
- FMT_SMF: 4
- FMT_SMF.1: 105
- FMT_SMF.1.1: 12
- FMT_SMR: 4
- FMT_SMR.1: 43
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITC_EXT.1: 2
- FPT_ITC_EXT.1.1: 2
- FPT_ITC_EXT.1.2: 2
- FPT_ITC_EXT.1.3: 2
- FPT_ITT: 2
- FPT_ITT.1: 7
- FPT_ITT.1.1: 1
- FPT_STM: 4
- FPT_STM.1: 2
- FPT_STM_EXT.1: 4
- FPT_STM_EXT.1.1: 4
- FPT_TST: 4
- FPT_TST.1: 32
- FPT_TST.1.1: 4
- FPT_TST.1.2: 4
- FPT_TST.1.3: 4
- FPT_TST.2: 2
- FPT_TST_EXT: 8
- FPT_TST_EXT.1: 22
- FPT_TST_EXT.1.1: 4
- FPT_TST_EXT.1.2: 4
- FTA:
- FTA_SSL: 4
- FTA_SSL.3: 14
- FTA_SSL.3.1: 4
- FTA_TAB: 4
- FTA_TAB.1: 14
- FTA_TAB.1.1: 2
- FTA_TSE: 2
- FTA_TSE.1: 8
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC: 4
- FTP_ITC.1: 2
- FTP_ITC_EXT: 4
- FTP_ITC_EXT.1: 23
- FTP_ITC_EXT.1.1: 2
- FTP_ITC_EXT.1.2: 2
- FTP_ITC_EXT.1.3: 2
- FTP_TRP: 2
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.NO_EVIL: 6
- A.NO_GENERAL_PURPOSE: 2
- A.PHYSICAL: 4
- A.TOE_NO_BYPASS: 3
- O:
- O.ADMIN_GUIDANCE: 14
- O.AUDIT_GENERATION: 8
- O.CONFIGURATION_: 3
- O.CONFIGURATION_DENTIFICATION: 6
- O.CONFIGURATION_IDENTIFICATION: 6
- O.CORRECT_: 1
- O.CORRECT_TSF_OPERATION: 7
- O.CRYPTOGRAPHY: 14
- O.CRYPTOGRAPHY_VALIDATED: 8
- O.DISPLAY_BANNER: 14
- O.DOCUMENTED_: 3
- O.DOCUMENTED_DESIGN: 8
- O.MANAGE: 20
- O.MEDIATE: 12
- O.PARTIAL_FUNCTIONAL_TESTING: 16
- O.RESIDUAL_: 1
- O.RESIDUAL_INFORMATION: 9
- O.ROGUE_AP_DETECTION: 14
- O.SELF_PROTECTION: 19
- O.TIME_STAMPS: 8
- O.TOE_ACCESS: 14
- O.VULNERABILITY_: 3
- O.VULNERABILITY_ANALYSIS: 5
- OE:
- OE.AUDIT_PROTECTION: 6
- OE.AUDIT_REVIEW: 6
- OE.MANAGE: 10
- OE.NO_EVIL: 8
- OE.NO_GENERAL_PURPOSE: 6
- OE.PHYSICAL: 6
- OE.PROTECT_MGMT_COMMS: 6
- OE.RESIDUAL_INFORMATION: 6
- OE.SELF_PROTECTION: 9
- OE.TIME_STAMPS: 6
- OE.TOE_ACCESS: 8
- OE.TOE_NO_BYPASS: 6
- OSP:
- T:
- T.ACCIDENTAL_: 2
- T.ACCIDENTAL_ADMIN_: 7
- T.ACCIDENTAL_ADMIN_ERROR: 7
- T.ACCIDENTAL_CRYPTO_COMPROMISE: 9
- T.MASQUERADE: 12
- T.POOR_DESIGN: 6
- T.POOR_IMPLEMENTATION: 6
- T.POOR_TEST: 4
- T.RESIDUAL_DATA: 8
- T.TSF_COMPROMISE: 14
- T.UNATTENDED_: 3
- T.UNATTENDED_SESSION: 3
- T.UNAUTHORIZED_: 2
- T.UNAUTHORIZED_ACCESS: 9
- T.UNAUTH_ACCESS_POINT: 2
- T.UNAUTH_ADMIN_ACCESS: 14
- T.UNAUTH_AP: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 17
- AES-: 2
- AES-128: 6
- AES-192: 6
- AES-256: 6
- AES128: 1
- DES:
- 3DES:
- TDEA: 4
- TDES: 1
- Triple-DES: 1
- DES:
- constructions:
- MAC:
- CBC-MAC: 2
- HMAC: 2
- HMAC-SHA-256: 2
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 2
- Key agreement: 2
- KEX:
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 17
- IKEv1: 30
- IKEv2: 6
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 96
- TLS 1.0: 14
- TLS 1.1: 2
- TLS 1.2: 2
- TLS v1.1: 6
- TLS v1.2: 6
- TLS1.0: 2
- TLSv1.0: 8
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA: 2
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 10
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 10
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_3DES_EDE_CBC_SHA: 4
- TLS_RSA_WITH_AES_128_CBC_SHA: 13
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 12
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- FIPS:
- FIPS 140-2: 16
- FIPS 186-2: 2
- FIPS 197: 2
- FIPS 46-3: 2
- FIPS 81: 2
- FIPS PUB 140-2: 4
- FIPS PUB 186-2: 2
- NIST:
- RFC:
- RFC 2346: 4
- RFC 2409: 2
- RFC 2818: 4
- RFC 3146: 1
- RFC 3164: 2
- RFC 3280: 2
- RFC 3602: 2
- RFC 4106: 4
- RFC 4109: 6
- RFC 4252: 8
- RFC 4253: 9
- RFC 4303: 4
- RFC 4346: 2
- RFC 4868: 2
- RFC 4869: 2
- RFC 5216: 5
- RFC 5246: 2
- RFC 5281: 6
- RFC 792: 2
- RFC3164: 1
- RFC3280: 4
- RFC4346: 2
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Robert Nasser, Clemens Wittinger (generated by CCTool version 2.8.4.35)
- /CreationDate: D:20200326110548Z
- /Creator: Unknown
- /Keywords: access control, identification, authentication, audit, object reuse, z, LPAR, logical partitioning, isolation, PR/SM, LIC, cross-partition, HMC, SE
- /ModDate: D:20200326110548Z
- /Producer: XEP 4.29.837
- /Subject: PR/SM, Driver Level D41C with Bundle Level H06/S06c for IBM z15 and IBM LinuxONE III Systems
- /Title: Security Target for PR/SM for IBM z15 and IBM LinuxONE III Systems (version 19.5 as of 2020-03-26)
- /Trapped: /False
- /application: CCTool version x.y
- pdf_file_size_bytes: 805767
- pdf_hyperlinks: http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R5.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R5.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R5.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 61
|
- /Author: CRD003
- /CreationDate: D:20140331105449+05'00'
- /Creator: PrimoPDF http://www.primopdf.com
- /ModDate: D:20140331162840-04'00'
- /Producer: Nitro PDF PrimoPDF
- /Title: Microsoft Word - Motorola_RFS7000_-AP7131_Security_Target_v1.51.docx
- pdf_file_size_bytes: 2408502
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 253
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |