name |
Oracle Linux 7.6 |
BAROC/FISC Terminal Security Access Module, Version 1.0 |
category |
Operating Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
CA |
DE |
status |
active |
archived |
not_valid_after |
19.07.2026 |
01.09.2019 |
not_valid_before |
19.07.2021 |
15.09.2008 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/519-EWA%20CT%20v1.1.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/519-EWA%20CR%20v1.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0442a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/519-EWA%20ST%20v4.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0442b.pdf |
manufacturer |
Oracle Corporation |
Financial Information Service Co. Ltd. (FISC) |
manufacturer_web |
https://www.oracle.com |
https://www.fisc.com.tw/ |
security_level |
{} |
ADV_IMP.2, EAL4+, AVA_VLA.4 |
dgst |
16c96cc56b6d0f5a |
c6c5b4a22cd38f9f |
heuristics/cert_id |
519-EWA |
BSI-DSZ-CC-0442-2008 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 |
ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.4, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_DVS.2, ALC_LCD.1, ADV_IMP.2, ATE_DPT.1, ADV_FSP.2, ADV_SPM.1, AVA_MSU.3 |
heuristics/extracted_versions |
7.6 |
1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- certification_date: 19.07.2021
- level: PP_OS_V4.2.1 PP_SSH_EP_v1.0
- product: Oracle Linux 7.6
- vendor: Oracle Corporation
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
e34797b67a3163c5, 236bced46aeb26ba |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_V4.2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ssh_ep_v1.0.pdf |
{} |
pdf_data/cert_filename |
519-EWA CT v1.1.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20190122115136-04'00'
- /Creator: Adobe Illustrator CC 22.0 (Windows)
- /ModDate: D:20210723190041-04'00'
- /Producer: Adobe PDF library 15.00
- /Title: cyber-centre-product-evaluation-certificate-e-bg
- pdf_file_size_bytes: 1715417
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
519-EWA CR v1.1.pdf |
0442a.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0442-2008
- cert_item: BAROC/FISC Terminal Security Access Module Version 1.0
- cert_lab: BSI
- developer: Financial Information Service Co., Ltd. (FISC) sponsored by The Bankers Association of the Republic of China (BAROC
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- CA:
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0426: 2
- BSI-DSZ-CC-0426-2007-MA-01: 1
- BSI-DSZ-CC-0442: 1
- BSI-DSZ-CC-0442-2008: 17
- NL:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 4: 8
- EAL 4 augmented: 3
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_CAP: 2
- ACM_SCP: 2
- ADO:
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_TAT: 2
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 25: 2
- AIS 26: 2
- AIS 31: 1
- AIS 32: 1
- AIS 34: 3
- AIS 35: 1
- AIS 36: 3
- AIS 38: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. The user of the OS is not willfully negligent or hostile, and uses the software in: 1
- out of scope: 1
|
- ConfidentialDocument:
- 0, Date: 2008-05-21, Authors: BAROC & FISC (confidential document) [9] Java Card System Protection Profile Collection, Version: 1.0b, August 2003. This Document: 1
- Product: NXP P541G072V0P (JCOP 41, v2.3.1), Version 1.0, Date 2007-07-27, ITSEF: TÜVIT (confidential document) [13] Administrator and User Guidance for BAROC/FISC TSAM 1.0, Version 1.0.0, date: 2008-05-21: 1
- Report, BSI-DSZ-CC-0442, Version 3, Date 2008-07-30, Product:BAROC/FISC TSAM 1.0, ITSEF: TÜVIT (confidential document) [8] Configuration list for the TOE: Configuration Management for 1 BAROC/FISC TSAM 1.0, Version: 1: 1
|
pdf_data/report_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20081217084137+01'00'
- /Creator: Writer
- /Keywords: "BSI-DSZ-CC-0442-2008, Common Criteria, Certification, Zertifizierung, BAROC Terminal Security Access Module Version 1.0, Financial Information Services Co., Ltd. (FISC), The Bankers Association of the Republic of China (BAROC)"
- /ModDate: D:20090105105200+01'00'
- /Producer: StarOffice 8
- /Subject: Common Criteria, Certification
- /Title: Certification Report BSI-DSZ-CC-0442-2008
- pdf_file_size_bytes: 1307314
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
pdf_data/st_filename |
519-EWA ST v4.0.pdf |
0442b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0348: 1
- BSI-DSZ-CC-0426: 1
- BSI-DSZ-CC-0442: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 12
- EAL4 augmented: 8
- EAL4+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ALC_TSU_EXT: 1
- ALC_TSU_EXT.1: 1
- ATE:
- AVA:
|
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.4: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_HLD.2: 3
- ADV_IMP.1: 1
- ADV_IMP.2: 13
- ADV_LLD.1: 4
- ADV_RCR.1: 3
- ADV_SPM.1: 4
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 3
- ALC:
- ALC_DVS.1: 3
- ALC_DVS.2: 3
- ALC_LCD.1: 2
- ALC_TAT.1: 3
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 3
- AVA:
- AVA_MSU.2: 3
- AVA_MSU.3: 3
- AVA_SOF.1: 2
- AVA_VLA: 1
- AVA_VLA.3: 2
- AVA_VLA.4: 12
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 3
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 1
- FCS:
- FCS_CKM.1: 4
- FCS_CKM.1.1: 1
- FCS_CKM.2: 4
- FCS_CKM.2.1: 1
- FCS_CKM.4: 1
- FCS_CKM_EXT.4: 9
- FCS_CKM_EXT.4.1: 3
- FCS_CKM_EXT.4.2: 2
- FCS_COP.1: 26
- FCS_COP.1.1: 6
- FCS_DTLS_EXT.1: 1
- FCS_RBG_EXT.1: 8
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SSHC_EXT.1: 8
- FCS_SSHC_EXT.1.1: 4
- FCS_SSHC_EXT.1.2: 3
- FCS_SSHC_EXT.1.3: 3
- FCS_SSHC_EXT.1.4: 3
- FCS_SSHC_EXT.1.5: 3
- FCS_SSHC_EXT.1.6: 3
- FCS_SSHC_EXT.1.7: 3
- FCS_SSHC_EXT.1.8: 3
- FCS_SSHS_EXT.1: 7
- FCS_SSHS_EXT.1.1: 4
- FCS_SSHS_EXT.1.2: 3
- FCS_SSHS_EXT.1.3: 3
- FCS_SSHS_EXT.1.4: 5
- FCS_SSHS_EXT.1.5: 3
- FCS_SSHS_EXT.1.6: 3
- FCS_SSHS_EXT.1.7: 3
- FCS_SSH_EXT.1: 8
- FCS_SSH_EXT.1.1: 2
- FCS_STO_EXT.1: 9
- FCS_STO_EXT.1.1: 1
- FCS_TLSC_EXT.1: 10
- FCS_TLSC_EXT.1.1: 4
- FCS_TLSC_EXT.1.2: 3
- FCS_TLSC_EXT.1.3: 3
- FCS_TLSC_EXT.2: 3
- FCS_TLSC_EXT.2.1: 1
- FDP:
- FDP_ACF_EXT.1: 8
- FDP_ACF_EXT.1.1: 1
- FDP_IFC_EXT.1: 7
- FDP_IFC_EXT.1.1: 2
- FIA:
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.5: 3
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FMT:
- FMT_MOF_EXT.1: 7
- FMT_MOF_EXT.1.1: 2
- FMT_SMF_EXT.1: 7
- FMT_SMF_EXT.1.1: 4
- FPT:
- FPT_ACF_EXT.1: 7
- FPT_ACF_EXT.1.1: 2
- FPT_ACF_EXT.1.2: 2
- FPT_ASLR_EXT.1: 7
- FPT_ASLR_EXT.1.1: 2
- FPT_SBOP_EXT.1: 8
- FPT_SBOP_EXT.1.1: 2
- FPT_TST_EXT.1: 7
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 1
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 3
- FPT_TUD_EXT.2: 6
- FPT_TUD_EXT.2.1: 2
- FPT_TUD_EXT.2.2: 2
- FTP:
- FTP_ITC_EXT.1: 7
- FTP_ITC_EXT.1.1: 2
- FTP_TRP.1: 3
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_ARP.1: 1
- FAU_SAA.1: 1
- FCS:
- FCS_CKM: 11
- FCS_CKM.1: 4
- FCS_CKM.2: 1
- FCS_CKM.3: 1
- FCS_CKM.4: 4
- FCS_COP: 6
- FCS_COP.1: 3
- FCS_RND.1: 1
- FDP:
- FDP_ACC: 23
- FDP_ACC.1: 13
- FDP_ACC.2: 1
- FDP_ACF: 12
- FDP_ACF.1: 19
- FDP_CKM: 1
- FDP_ETC.1: 1
- FDP_IFC: 4
- FDP_IFC.1: 7
- FDP_IFF: 4
- FDP_IFF.1: 1
- FDP_ITC: 14
- FDP_ITC.1: 15
- FDP_ITC.1.3: 4
- FDP_RIP.1: 1
- FDP_ROL.1: 1
- FDP_SDI: 5
- FDP_SDI.2: 7
- FDP_UCT: 11
- FDP_UCT.1: 4
- FDP_UIT: 13
- FDP_UIT.1: 9
- FIA:
- FIA_AFL: 7
- FIA_AFL.1: 5
- FIA_ATD.1: 1
- FIA_UAU: 20
- FIA_UAU.1: 7
- FIA_UAU.3: 1
- FIA_UAU.4: 3
- FIA_UAU.5: 8
- FIA_UID: 6
- FIA_UID.1: 8
- FIA_UID.2: 1
- FIA_USB.1: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA: 40
- FMT_MSA.1: 8
- FMT_MSA.2: 7
- FMT_MSA.3: 9
- FMT_MTD.1: 1
- FMT_MTD.3: 1
- FMT_SMF: 15
- FMT_SMF.1: 3
- FMT_SMR: 12
- FMT_SMR.1: 7
- FPR:
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 1
- FPT_PHP.1: 1
- FPT_PHP.3: 1
- FPT_RCV.3: 1
- FPT_RCV.4: 1
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_TDC.1: 1
- FPT_TST.1: 1
- FRU:
- FTP:
- FTP_ITC: 17
- FTP_ITC.1: 19
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PLATFORM: 3
- A.PROPER_ADMIN: 3
- A.PROPER_USER: 3
- O:
- O.ACCOUNTABILITY: 3
- O.INTEGRITY: 5
- O.MANAGEMENT: 5
- O.PROTECTED_COMMS: 5
- O.PROTECTED_STORAGE: 3
- OE:
- OE.PLATFORM: 3
- OE.PROPER_ADMIN: 3
- OE.PROPER_USER: 3
- T:
- T.LIMITED_PHYSICAL_ACCESS: 2
- T.LOCAL_ATTACK: 2
- T.NETWORK_ATTACK: 6
- T.NETWORK_EAVESDROP: 4
|
- A:
- A.DEV: 10
- A.DLV: 10
- A.DLV_PROTECT: 2
- A.KEYS: 7
- A.NATIVE: 2
- A.NO-DELETION: 2
- A.NO-INSTALL: 2
- A.TEST_OPERATE: 1
- A.USE_DIAG: 8
- A.USE_KEYS: 1
- A.VERIFICATION: 2
- D:
- D.APP_CODE: 1
- D.APP_C_DATA: 1
- D.APP_I_DATA: 1
- D.APP_KEYS: 1
- O:
- O.ALARM: 2
- O.CARD-MANAGEMENT: 2
- O.CIPHER: 3
- O.FAULT_PROTECT: 2
- O.FIREWALL: 3
- O.KEY-MNGT: 3
- O.NATIVE: 2
- O.OPERATE: 3
- O.OS_DECEIVE: 2
- O.PHYSICAL: 3
- O.PIN-MNGT: 2
- O.PROTECT_DATA: 7
- O.REALLOCATION: 2
- O.RESOURCES: 3
- O.RND: 3
- O.SCP: 8
- O.SHRD_VAR_CONFID: 2
- O.SHRD_VAR_INTEG: 3
- O.SID: 3
- O.SIDE_CHANNEL: 3
- O.TRANSACTION: 2
- OE:
- OE.DEL_NOS: 1
- OE.DEV_NOS: 1
- OE.DLV_DATA: 1
- OE.DLV_PROTECT: 1
- OE.IC_ORG: 1
- OE.NATIVE: 2
- OE.NO-DELETION: 2
- OE.NO-INSTALL: 2
- OE.TEST_OPERATE: 1
- OE.USE_DIAG: 1
- OE.USE_KEYS: 1
- OE.VERIFICATION: 2
- OSP:
- OSP.IC_ORG: 1
- OSP.SN: 7
- OSP.TXN: 1
- OSP.TXN_SECURE: 6
- T:
- T.ACCESS_DATA: 3
- T.CONFID-APPLI-DATA: 3
- T.CONFID-JCS-CODE: 2
- T.CONFID-JCS-DATA: 3
- T.DEL: 2
- T.DEL_IC_NOS: 2
- T.DEV_IC: 2
- T.DEV_NOS: 2
- T.EXE-CODE: 4
- T.FAULT: 3
- T.INTEG-APPLI-CODE: 2
- T.INTEG-APPLI-DATA: 3
- T.INTEG-JCS-CODE: 2
- T.INTEG-JCS-DATA: 2
- T.INTEGRITY: 6
- T.KEY_ACCESS: 5
- T.LEAKAGE: 3
- T.NATIVE: 3
- T.OS_DECEIVE: 3
- T.OS_OPERATE: 3
- T.PHYSICAL: 3
- T.RESOURCES: 3
- T.RND: 3
- T.SID: 6
- T.TMD_ACCESS: 5
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 8
- SHA-384: 7
- SHA-512: 7
- SHA2: 12
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- DTLS:
- TLS:
- TLS: 32
- TLS 1.2: 3
- TLS v1.2: 5
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- secp256r1: 1
- secp384r1: 1
- secp521r1: 1
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 4
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 4
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 4
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- NIST:
- NIST SP 800-38A: 8
- NIST SP 800-38D: 4
- NIST SP 800-38E: 4
- NIST SP 800-56B: 1
- NIST SP 800-57: 4
- RFC:
- RFC 3526: 6
- RFC 4251: 3
- RFC 4253: 7
- RFC 5246: 18
- RFC 5280: 5
- RFC 5288: 4
- RFC 5289: 8
- RFC 5759: 3
- RFC 6066: 1
- RFC 6125: 3
- RFC 6960: 1
- RFC 6961: 1
- RFC 8017: 3
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /Author: Acumen Security, LLC.
- /CreationDate: D:20210719141632-04'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20210719141632-04'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 895667
- pdf_hyperlinks: https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0441, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=375, http://www.acumensecurity.net/, mailto:[email protected], https://www.niap-ccevs.org/MMO/PP/-442-/#ajq_847, https://www.oracle.com/corporate/security-practices/assurance/vulnerability/reporting.html, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=10783, https://linux.oracle.com/security, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=337, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=10782, https://oss.oracle.com/mailman/listinfo/el-errata, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=10788, https://www.niap-ccevs.org/Documents_and_Guidance/view_tds.cfm, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=338
- pdf_is_encrypted: False
- pdf_number_of_pages: 68
|
- /Author: BAROC & FISC
- /CreationDate: D:20080714065458+02'00'
- /Creator: pdfFactory Pro www.context-gmbh.de
- /Keywords: Document Version 1.0.0; Terminal Security Access Module; secure transactions; POS terminal; remote host application; integrity; authenticity; confidentiality; encryption; decryption; MAC generation; JavaCard applet; NXP P541G072V0P smart card controller
- /Producer: pdfFactory Pro 3.30 (Windows XP Professional German)
- /Subject: Evaluation of BAROC/FISC TSAM 1.0
- /Title: Security Target for BAROC/FISC TSAM 1.0
- pdf_file_size_bytes: 318324
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 62
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |