name |
Oracle Linux 7.6 |
Océ Smart Imager 10.3.5.68 as used in the Océ VarioPrint 21x0 Release 4.1 |
category |
Operating Systems |
Other Devices and Systems |
scheme |
CA |
DE |
status |
active |
archived |
not_valid_after |
19.07.2026 |
01.09.2019 |
not_valid_before |
19.07.2021 |
19.08.2008 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/519-EWA%20CT%20v1.1.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/519-EWA%20CR%20v1.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0510a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/519-EWA%20ST%20v4.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0510b.pdf |
manufacturer |
Oracle Corporation |
Océ N.V. |
manufacturer_web |
https://www.oracle.com |
https://global.oce.com/ |
security_level |
{} |
EAL2+, ALC_FLR.1 |
dgst |
16c96cc56b6d0f5a |
4a657d36d1de9ae1 |
heuristics/cert_id |
519-EWA |
BSI-DSZ-CC-0510-2008 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 |
ADV_RCR.1, ADV_FSP.1, ALC_FLR.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1 |
heuristics/extracted_versions |
7.6 |
4.1, 10.3.5.68 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0615-2009 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0326-2006 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0615-2009 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0326-2006 |
heuristics/scheme_data |
- certification_date: 19.07.2021
- level: PP_OS_V4.2.1 PP_SSH_EP_v1.0
- product: Oracle Linux 7.6
- vendor: Oracle Corporation
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
e34797b67a3163c5, 236bced46aeb26ba |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_V4.2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ssh_ep_v1.0.pdf |
{} |
pdf_data/cert_filename |
519-EWA CT v1.1.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20190122115136-04'00'
- /Creator: Adobe Illustrator CC 22.0 (Windows)
- /ModDate: D:20210723190041-04'00'
- /Producer: Adobe PDF library 15.00
- /Title: cyber-centre-product-evaluation-certificate-e-bg
- pdf_file_size_bytes: 1715417
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
519-EWA CR v1.1.pdf |
0510a.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0510-2008
- cert_item: Océ Smart Imager 10.3.5.68 as used in the Océ VarioPrint 21x0 Release 4.1
- cert_lab: BSI
- developer: Océ Technologies BV
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- CA:
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0326-2006: 2
- BSI-DSZ-CC-0510-2008: 16
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 4
- EAL 2 augmented: 3
- EAL 4: 1
- EAL 7: 1
- EAL1: 5
- EAL2: 5
- EAL3: 4
- EAL4: 5
- EAL5: 6
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_CAP: 2
- ACM_SCP: 2
- ADO:
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_FLR: 2
- ALC_FLR.1: 4
- ALC_LCD: 1
- ALC_TAT: 2
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 32: 1
- AIS 34: 1
- AIS 38: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. The user of the OS is not willfully negligent or hostile, and uses the software in: 1
- out of scope: 1
|
- ConfidentialDocument:
- Controller (SI) R10.3.5.68, as used in the Océ VarioPrint 21X0 R 4.1 product”, Océ Technologies BV (confidential document) [9] Océ 2100/2110 User manual, Version 2007-12, Océ Technologies BV [10] Océ VP2100/VP2110 Common: 1
- Version 4.0, 31.07.2008, “Evaluation Technical Report Smart Imager 10.3.5.68 EAL2+“, Brightsight (confidential document) [8] Configuration list for the TOE, Version 1.2, 30.07.2008, “Configuration Management List for: 1
|
pdf_data/report_metadata |
|
- /Author: Federal Office for Information Security
- /CreationDate: D:20081001155551+02'00'
- /Creator: Writer
- /Keywords: "Océ Smart Imager 10.3.5.68as used in the Océ VarioPrint 21x0 Release 4.1, Océ Technologies BV, Certification, Common Criteria"
- /ModDate: D:20081002082742+02'00'
- /Producer: StarOffice 8
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0510-2008
- pdf_file_size_bytes: 430075
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 32
|
pdf_data/st_filename |
519-EWA ST v4.0.pdf |
0510b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 2: 3
- EAL2: 8
- EAL2+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ALC_TSU_EXT: 1
- ALC_TSU_EXT.1: 1
- ATE:
- AVA:
|
- ACM:
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.1: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_SOF.1: 2
- AVA_VLA.1: 3
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 3
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 1
- FCS:
- FCS_CKM.1: 4
- FCS_CKM.1.1: 1
- FCS_CKM.2: 4
- FCS_CKM.2.1: 1
- FCS_CKM.4: 1
- FCS_CKM_EXT.4: 9
- FCS_CKM_EXT.4.1: 3
- FCS_CKM_EXT.4.2: 2
- FCS_COP.1: 26
- FCS_COP.1.1: 6
- FCS_DTLS_EXT.1: 1
- FCS_RBG_EXT.1: 8
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SSHC_EXT.1: 8
- FCS_SSHC_EXT.1.1: 4
- FCS_SSHC_EXT.1.2: 3
- FCS_SSHC_EXT.1.3: 3
- FCS_SSHC_EXT.1.4: 3
- FCS_SSHC_EXT.1.5: 3
- FCS_SSHC_EXT.1.6: 3
- FCS_SSHC_EXT.1.7: 3
- FCS_SSHC_EXT.1.8: 3
- FCS_SSHS_EXT.1: 7
- FCS_SSHS_EXT.1.1: 4
- FCS_SSHS_EXT.1.2: 3
- FCS_SSHS_EXT.1.3: 3
- FCS_SSHS_EXT.1.4: 5
- FCS_SSHS_EXT.1.5: 3
- FCS_SSHS_EXT.1.6: 3
- FCS_SSHS_EXT.1.7: 3
- FCS_SSH_EXT.1: 8
- FCS_SSH_EXT.1.1: 2
- FCS_STO_EXT.1: 9
- FCS_STO_EXT.1.1: 1
- FCS_TLSC_EXT.1: 10
- FCS_TLSC_EXT.1.1: 4
- FCS_TLSC_EXT.1.2: 3
- FCS_TLSC_EXT.1.3: 3
- FCS_TLSC_EXT.2: 3
- FCS_TLSC_EXT.2.1: 1
- FDP:
- FDP_ACF_EXT.1: 8
- FDP_ACF_EXT.1.1: 1
- FDP_IFC_EXT.1: 7
- FDP_IFC_EXT.1.1: 2
- FIA:
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.5: 3
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FMT:
- FMT_MOF_EXT.1: 7
- FMT_MOF_EXT.1.1: 2
- FMT_SMF_EXT.1: 7
- FMT_SMF_EXT.1.1: 4
- FPT:
- FPT_ACF_EXT.1: 7
- FPT_ACF_EXT.1.1: 2
- FPT_ACF_EXT.1.2: 2
- FPT_ASLR_EXT.1: 7
- FPT_ASLR_EXT.1.1: 2
- FPT_SBOP_EXT.1: 8
- FPT_SBOP_EXT.1.1: 2
- FPT_TST_EXT.1: 7
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 1
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 3
- FPT_TUD_EXT.2: 6
- FPT_TUD_EXT.2.1: 2
- FPT_TUD_EXT.2.2: 2
- FTP:
- FTP_ITC_EXT.1: 7
- FTP_ITC_EXT.1.1: 2
- FTP_TRP.1: 3
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FDP:
- FDP_ACC.1: 6
- FDP_ACF.1: 7
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_RIP.1: 4
- FIA:
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UID.1: 2
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 2
- FMT_MSA.1: 5
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 5
- FPT_RVM.1.1: 1
- FPT_SEP.1: 7
- FPT_SEP.1.2: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PLATFORM: 3
- A.PROPER_ADMIN: 3
- A.PROPER_USER: 3
- O:
- O.ACCOUNTABILITY: 3
- O.INTEGRITY: 5
- O.MANAGEMENT: 5
- O.PROTECTED_COMMS: 5
- O.PROTECTED_STORAGE: 3
- OE:
- OE.PLATFORM: 3
- OE.PROPER_ADMIN: 3
- OE.PROPER_USER: 3
- T:
- T.LIMITED_PHYSICAL_ACCESS: 2
- T.LOCAL_ATTACK: 2
- T.NETWORK_ATTACK: 6
- T.NETWORK_EAVESDROP: 4
|
- A:
- A.DIGITAL_COPIER: 3
- A.DIGITAL_PRINTER: 1
- A.DIGITAL_SCANNER: 1
- A.ENVIRONMENT: 4
- A.LUI: 1
- A.SECURITY_POLICY: 3
- A.SLA: 8
- D:
- D.COPY_JOB: 11
- D.INBOUND_TRAFFIC: 8
- D.PRINT_JOB: 16
- D.SCAN_JOB: 13
- O:
- R:
- R.COPY_JOB: 2
- R.ENTER_TOE: 4
- R.PRINT_JOB: 2
- R.SCAN_JOB: 2
- R.SHRED_JOB: 2
- T:
- T.MALWARE: 4
- T.RESIDUAL_DATA: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 8
- SHA-384: 7
- SHA-512: 7
- SHA2: 12
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- DTLS:
- TLS:
- TLS: 32
- TLS 1.2: 3
- TLS v1.2: 5
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- secp256r1: 1
- secp384r1: 1
- secp521r1: 1
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 4
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 4
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 4
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- NIST:
- NIST SP 800-38A: 8
- NIST SP 800-38D: 4
- NIST SP 800-38E: 4
- NIST SP 800-56B: 1
- NIST SP 800-57: 4
- RFC:
- RFC 3526: 6
- RFC 4251: 3
- RFC 4253: 7
- RFC 5246: 18
- RFC 5280: 5
- RFC 5288: 4
- RFC 5289: 8
- RFC 5759: 3
- RFC 6066: 1
- RFC 6125: 3
- RFC 6960: 1
- RFC 6961: 1
- RFC 8017: 3
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /Author: Acumen Security, LLC.
- /CreationDate: D:20210719141632-04'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20210719141632-04'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 895667
- pdf_hyperlinks: https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0441, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=375, http://www.acumensecurity.net/, mailto:[email protected], https://www.niap-ccevs.org/MMO/PP/-442-/#ajq_847, https://www.oracle.com/corporate/security-practices/assurance/vulnerability/reporting.html, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=10783, https://linux.oracle.com/security, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=337, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=10782, https://oss.oracle.com/mailman/listinfo/el-errata, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=10788, https://www.niap-ccevs.org/Documents_and_Guidance/view_tds.cfm, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=338
- pdf_is_encrypted: False
- pdf_number_of_pages: 68
|
- /Author: Océ Technologies BV
- /CreationDate: D:20080704084333Z
- /Creator: PScript5.dll Version 5.2.2
- /Keywords: Common Criteria, Certification, Multifunctional Device, Printer, Controller, Océ
- /ModDate: D:20081002082902+02'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Subject: Security Target for the certification of the Océ Smart Imager 10.3.5.68
- /Title: Security Target of the Océ Smart Imager 10.3.5.68 as used in the Océ VP21x0 R4.1
- pdf_file_size_bytes: 346343
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 57
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |