name |
Brocade Communications Systems, Inc. FabricOS Version: 7.3.0a3 |
MX-FR10 Version:C.10 |
category |
Network and Network-Related Devices and Systems |
Other Devices and Systems |
scheme |
DE |
JP |
status |
archived |
archived |
not_valid_after |
08.12.2020 |
31.07.2014 |
not_valid_before |
08.12.2015 |
27.07.2009 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0969a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0226_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0969b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0226_est.pdf |
manufacturer |
Brocade Communications Systems, Inc. |
Sharp Corporation |
manufacturer_web |
https://www.brocade.com |
https://sharp-world.com/ |
security_level |
EAL2+, ALC_FLR.2 |
EAL3 |
dgst |
0828342fbab6ea1c |
b4bab3db4118c65f |
heuristics/cert_id |
BSI-DSZ-CC-0969-2015 |
JISEC-CC-CRP-C0226 |
heuristics/cert_lab |
BSI |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_LCD.2, ASE_INT.1, ALC_DVS.2, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, APE_ECD.1, ASE_SPD.1, ALC_DEL.1, ALC_TAT.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, APE_REQ.2, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ADV_IMP.2, APE_CCL.1, ALC_FLR.2, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, ATE_DPT.4, APE_SPD.1, APE_INT.1, ALC_CMC.2, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
heuristics/extracted_versions |
7.3.0 |
10 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0226
- certification_date: 01.07.2009
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0226_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is an IT product, composed of 2 parts, to protect data in a Multi Function Device (hereafter referred to as an “MFD”. One part is a hardware part in an MFD and provided in the form of an MFD. The other part is a firmware product and provided as an upgrade kit for the firmware of the MFD. An MFD is an office machine that has imaging functions such as copy, printer, image scanning and fax. TOE security functions The TOE counters unauthorized disclosure of image data by: - the encryption function, which encrypts data, such as image data that the MFD handles, before storing the data to the HDD or the Flash memory in the MFD, - the erasure function, which overwrites random or constant numbers onto storage areas that store encrypted data, - the confidential file function, which protects image data that a user files with a password so as not to be abused by others, - the network protection function, which counters malicious attempts (of unauthorized network-accesses, communication data wiretaps, and network settings falsifications), and - the fax flow control function, which counters attempts to access to the internal network via the MFD network interface from public telephone networks on the MFD fax interface.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: MX-FR10
- product_type: data protection function in Multi Function Device
- report_link: https://www.ipa.go.jp/en/security/c0226_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0226_est.pdf
- toe_version: C.10
- vendor: Sharp Corporation
- expiration_date: 01.07.2014
- supplier: Sharp Corporation
- toe_japan_name: MX-FR10 C.10
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0226_it8240.html
- toe_overseas_name: MX-FR10 C.10
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
0969a_pdf.pdf |
c0226_erpt.pdf |
pdf_data/report_frontpage |
- DE:
- cc_security_level: Common Criteria Part 3 extended EAL 2 augmented by ALC_FLR.2 SOGIS Recognition Agreement
- cc_version: Product specific Security Target Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0969-2015
- cert_item: Brocade Communications Systems, Inc. FabricOS Version: 7.3.0a3
- cert_lab: BSI
- developer: Brocade Communications Systems, Inc
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: None
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0226-01: 1
- Certification No. C0226: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 7
- EAL 2: 8
- EAL 2 augmented: 3
- EAL 3: 4
- EAL 4: 6
- EAL 5: 6
- EAL 6: 3
- EAL 7: 4
- ITSEC:
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 5
- ALC_FLR.3: 1
- ALC_LCD.1: 1
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 2
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
|
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1: 3
- FCS_CKM.2: 1
- FCS_CKM.4: 1
- FCS_COP.1: 3
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 5
- FIA_SOS.1: 1
- FIA_UAU.2: 1
- FIA_UAU.5: 2
- FIA_UID.2: 2
- FMT:
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_MTD.1: 2
- FMT_SMF.1: 1
- FMT_SMR.1: 3
- FTA:
- FTA_MCS.1: 2
- FTA_TSE.1: 1
- FTP:
- FTP_ITC.1: 1
- FTP_TRP.1: 1
|
|
pdf_data/report_keywords/cc_claims |
- OE:
- OE.AUDIT: 2
- OE.AUTH_SVR: 2
- OE.CONFIG: 2
- OE.HARDWARE: 2
- OE.MGMT_NET: 3
- OE.NETWORK: 2
- OE.PHYCAL: 2
|
- A:
- A.NETWORK: 1
- A.OPERATOR: 1
- T:
- T.RECOVER: 1
- T.REMOTE: 1
- T.SPOOF: 1
- T.TAMPER: 1
- T.TAP: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- SRC:
- SRC Security Research & Consulting: 3
|
- ITSC:
- Information Technology Security Center: 3
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-256: 3
- SHA-384: 1
- SHA-512: 1
- SHA256: 1
- SHA512: 5
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 11
- TLS v1.2: 6
- TLSv1.2: 1
- VPN:
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 20: 2
- AIS 31: 2
- AIS 32: 1
- FIPS:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- NIST:
- PKCS:
- RFC:
- RFC 2865: 1
- RFC 4511: 1
- RFC2104: 4
- RFC3526: 1
- RFC4252: 2
- RFC4253: 4
- RFC4432: 1
- RFC5246: 6
- RFC6668: 1
|
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- 19, 2015, Evaluation Technical Report (ETR) Summary, SRC Security Research & Consulting GmbH (confidential document) [8] Configuration list for the TOE, 16, October 21, 2015, Brocade Configuration Management Plan: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20151210094518+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Brocade Communications Systems, Inc. FabricOS Version 7.3.0a3"
- /ModDate: D:20151210095324+01'00'
- /Producer: LibreOffice 4.2
- /Subject: Brocade Communications Systems, Inc. FabricOS Version 7.3.0a3
- /Title: Certification Report BSI-DSZ-CC-0969-2015
- pdf_file_size_bytes: 1433185
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/, http://www.brocade.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20110907095030+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20110907095111+09'00'
- /Producer: Acrobat Distiller 8.3.0 (Windows)
- /Title: CRP-e
- pdf_file_size_bytes: 317037
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
0969b_pdf.pdf |
c0226_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 4
- EAL 2 augmented: 4
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 14
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 19
- ADV_TDS: 1
- ADV_TDS.1: 18
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 16
- AGD_PRE: 1
- AGD_PRE.1: 12
- ALC:
- ALC_CMC: 1
- ALC_CMC.2: 10
- ALC_CMS: 1
- ALC_CMS.2: 7
- ALC_DEL: 1
- ALC_DEL.1: 7
- ALC_FLR: 1
- ALC_FLR.2: 21
- ATE:
- ATE_COV: 1
- ATE_COV.1: 9
- ATE_FUN: 1
- ATE_FUN.1: 14
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 7
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FCS:
- FCS_CKM: 6
- FCS_CKM.1: 28
- FCS_CKM.2: 6
- FCS_CKM.2.1: 1
- FCS_CKM.4: 17
- FCS_CKM.4.1: 1
- FCS_COP.1: 35
- FCS_RNG: 5
- FCS_RNG.1: 10
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF: 3
- FDP_ACF.1: 4
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 3
- FIA_ATD.1: 16
- FIA_ATD.1.1: 1
- FIA_SOS: 3
- FIA_SOS.1: 4
- FIA_SOS.1.1: 1
- FIA_UAU: 6
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID: 3
- FIA_UID.1: 2
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 6
- FMT_MSA.1: 4
- FMT_MSA.1.1: 1
- FMT_MSA.3: 6
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 24
- FMT_SMF: 3
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR: 4
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTA:
- FTA_MCS: 3
- FTA_MCS.1: 4
- FTA_MCS.1.1: 1
- FTA_MCS.1.2: 1
- FTA_TSE: 3
- FTA_TSE.1: 4
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 3
- FTP_TRP.1: 4
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FCS:
- FCS_CKM: 17
- FCS_CKM.1: 5
- FCS_CKM.2: 3
- FCS_CKM.4: 12
- FCS_COP: 19
- FCS_COP.1: 5
- FDP:
- FDP_IFC.1: 9
- FDP_IFC.1.1: 1
- FDP_IFF.1: 9
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FDP_RIP: 1
- FDP_RIP.1: 12
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL: 22
- FIA_AFL.1: 4
- FIA_SOS: 16
- FIA_SOS.1: 2
- FIA_UAU: 44
- FIA_UAU.1: 10
- FIA_UAU.2: 2
- FIA_UAU.7: 2
- FIA_UID: 24
- FIA_UID.1: 10
- FIA_UID.2: 2
- FMT:
- FMT_MOF: 27
- FMT_MOF.1: 3
- FMT_MSA.3: 5
- FMT_MTD: 30
- FMT_MTD.1: 4
- FMT_SMF.1: 32
- FMT_SMF.1.1: 1
- FMT_SMR: 20
- FMT_SMR.1: 16
- FTA:
- FTA_TSE.1: 9
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 15
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.AUDIT: 3
- A.AUTH_SVR: 2
- A.HARDWARE: 4
- A.LOCATE: 3
- A.MGMT_NET: 3
- A.NETWORK: 2
- A.NO_EVIL: 2
- O:
- O.ACCESS: 6
- O.ADMIN_ROLE: 4
- O.AUDIT_GENERATION: 6
- O.MANAGE: 4
- O.PROTECTED_COMM: 6
- O.TOE_PROTECTION: 4
- O.USER_AUTHENTICATION: 6
- O.USER_IDENTIFICATION: 4
- OE:
- OE.AUDIT: 2
- OE.AUTH_SVR: 3
- OE.CONFIG: 2
- OE.HARDWARE: 3
- OE.MGMT_NET: 2
- OE.NETWORK: 2
- OE.PHYCAL: 2
- T:
- T.ACCOUNTABILITY: 3
- T.ADMIN_ERROR: 2
- T.MASQUERADE: 3
- T.TSF_COMPROMISE: 2
- T.UNAUTH_ACCESS: 3
|
- A:
- A.NETWORK: 4
- A.OPERATOR: 4
- O:
- O.FAXTONET: 6
- O.FILTER: 9
- O.MANAGE: 11
- O.REMOVE: 7
- O.RESIDUAL: 7
- O.TRP: 8
- O.USER: 6
- OE:
- OE.CIPHER: 3
- OE.ERASEALL: 3
- OE.FIREWALL: 3
- OE.OPERATE: 3
- OE.PC-USER: 4
- OE.SUBNET: 3
- OE.USER: 3
- T:
- T.RECOVER: 5
- T.REMOTE: 3
- T.SPOOF: 4
- T.TAMPER: 3
- T.TAP: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 9
- HMAC-SHA-256: 3
- HMAC-SHA-512: 5
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-256: 3
- SHA-384: 1
- SHA-512: 1
- SHA256: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 52
- TLS 1.2: 1
- TLS v1.2: 6
- TLSv1.2: 14
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA256: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-2: 3
- FIPS 180-4: 1
- FIPS 186-3: 1
- FIPS 197: 3
- FIPS 198-1: 3
- FIPS PUB 186-3: 2
- FIPS180-4: 5
- NIST:
- PKCS:
- RFC:
- RFC 4253: 1
- RFC 5246: 1
- RFC2104: 4
- RFC3526: 1
- RFC4252: 2
- RFC4253: 8
- RFC4432: 1
- RFC5246: 6
- RFC6668: 1
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Gossamer Laboratories
- /CreationDate: D:20151022183611+02'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20151027090226+01'00'
- /Producer: Microsoft® Word 2010
- /Subject: Security Target
- /Title: Brocade Communications Systems, Inc. FabricOS Version 7.3.0a3 running on Brocade Directors and Switches Security Target
- pdf_file_size_bytes: 1591163
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 55
|
- /CreationDate: D:20110830153943+09'00'
- /ModDate: D:20110830153943+09'00'
- pdf_file_size_bytes: 327485
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 44
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |