name |
Voice Stream Interceptor (VSI) |
IAIK-JCE CC Core 3.15 |
category |
Other Devices and Systems |
Products for Digital Signatures |
scheme |
NO |
JP |
status |
archived |
archived |
not_valid_after |
21.06.2022 |
07.10.2013 |
not_valid_before |
21.06.2017 |
27.06.2007 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR%20SERTIT-072_1.PDF |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0107_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SV000073-Voice-Stream-Interceptor-Security-Target-Lite.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0107_est.pdf |
manufacturer |
Saab Danmark AS |
Stiftung Secure Information and Communication Technologies SIC |
manufacturer_web |
https://saabgroup.com |
https://jce.iaik.tugraz.at/ |
security_level |
EAL5+, ALC_FLR.3 |
EAL3 |
dgst |
28228ddc7cba794e |
ee01e752b230504e |
heuristics/cert_id |
SERTIT-072 |
JISEC-CC-CRP-C0107 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_TDS.4, AVA_VAN.4, ALC_FLR.3, ALC_TAT.2, ATE_COV.2 |
ATE_FUN.1, ADV_FSP.1, ATE_DPT.1, AVA_MSU.1, AVA_VLA.1, AVA_SOF.1, ALC_DVS.1, ADV_HLD.2, AGD_USR.1, AGD_ADM.1, ATE_IND.2, ADV_RCR.1, ATE_COV.2 |
heuristics/extracted_versions |
- |
3.15 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Other Devices and Systems
- certification_date: 21.06.2017
- developer: SAAB Danmark A/S
- enhanced:
- category: Other Devices and Systems
- cert_id: SERTIT-072
- certification_date: 21.06.2017
- description: Saab Voice Stream Interceptor (VSI) is a software security product providing secure domain separation between voice with different classification level. VSI has very few requirements to the underlying platform and can be installed on a Common Criteria approved Linux Operating System with IPsec tunnel and Trusted Platform Module (TPM). VSI supports standardized Voice over IP (VoIP) communication and is used for VoIP clients. The VoIP client user application is completely separated from VSI and does not require being trusted for the secure separation of classified voice. The separation between the VoIP client user application and VSI gives the possibility to change or upgrade the user application and still maintain a secure domain separation of classified voice by an unchanged VSI. From an users point of view the VoIP client containing VSI can both be used for classified (RED) and lower classified or non-classified (BLACK) voice communication. In this way, a conversation can start as non-classified and during the conversation be switched to a classified conversation. Operational modes on radio based communication are supported in this way. It is also possible to listen to both BLACK and RED voice at the same time. VSI also controls the suppression of RED incoming voice stream to the VoIP client, such that while sending BLACK voice the possible pickup and cross talk via the speaker to the microphone is eliminated. During authorized configuration the suppression functionality can either be enabled or disabled depending on the required operational procedure. Saab provides the Secure Tacticall VoIP client, where VSI has been integrated into a user friendly end product and can be used in a secure RED/BLACK system solution.
- developer: SAAB Danmark A/S
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135133-1607953045/SERTIT/Sertifikater/2017/72/C%20SERTIT-072.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135136-1607953047/SERTIT/Sertifikater/2017/72/SV000073-Voice-Stream-Interceptor-Security-Target-Lite.pdf'}), frozendict({'href': 'https://sertit.no/getfile.php/137492-1633083420/SERTIT/Sertifikater/2017/72/SV000073-Voice-Stream-Interceptor-Security-Target-Lite-2.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135139-1607953051/SERTIT/Sertifikater/2017/72/CR%20SERTIT-072_1.PDF'})], 'maintenance': [frozendict({'href': 'https://sertit.no/getfile.php/137486-1633083312/SERTIT/Sertifikater/2017/72/SERTIT-072%20MR%20v%201.0.pdf'})]})
- evaluation_facility: NTT Com Security (Norway) AS
- level: EAL 5
- mutual_recognition: CCRA, SOG-IS
- product: Stock no. SV000071, Version 1
- sponsor: Norwegian Defence Logistics Organization Naval System
- product: Voice Stream Interceptor
- url: https://sertit.no/certified-products/product-archive/voice-stream-interceptor
|
- cert_id: JISEC-CC-CRP-C0107
- certification_date: 01.06.2007
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0107_eimg.pdf
- description: PRODUCT DESCRIPTION The IAIK-JCE CC Core is a set of APIs and implementations of cryptographic functionality. Including: - hash functions - signature schemes - block ciphers - stream ciphers - asymmetric ciphers - message authentication codes - random number generators It supplements the security functionality of the default Java Runtime Environment. The IAIK-JCE CC Core is delivered to the customer as part of the IAIK-JCE toolkit, which extends the CC Core by additional algorithms, features and protocols.
- evaluation_facility: TÜV Informationstechnik GmbH Evaluation Body for IT-Security
- product: IAIK-JCE CC Core
- product_type: IT Product (cryptographic library)
- report_link: https://www.ipa.go.jp/en/security/c0107_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0107_est.pdf
- toe_version: 3.15
- vendor: Stiftung Secure Information and Communication Technologies SIC
- expiration_date: 01.10.2013
- supplier: Stiftung Secure Information and Communication Technologies SIC
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0107_it6096.html
- toe_overseas_name: IAIK-JCE CC Core 3.15
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
CR SERTIT-072_1.PDF |
c0107_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0107-01: 1
- Certification No. C0107: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL 4: 1
- EAL 5: 28
- EAL 5 augmented: 26
- EAL1: 1
- EAL5: 1
- EAL7: 1
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ALC:
- ALC_FLR: 3
- ALC_FLR.3: 25
- ALC_TAT.2: 1
- ATE:
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FDP:
- FMT:
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 1
- FPT_STM.1: 1
- FPT_TST.1: 1
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
- O:
- O.BLACK_VOICE_STREAM: 1
- O.STREAM_SETUP: 1
- OE:
- OE.PREVENT_ACCESS: 2
- OE.TRUSTED_RELEASE: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 2
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
- RSA:
- RSA 1024: 1
- RSA-OAEP: 1
- RSA-PSS: 1
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- RIPEMD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 7
- SHA-384: 6
- SHA-512: 7
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- FIPS:
- FIPS 46-3: 2
- FIPS PUB 180-1: 5
- FIPS PUB 180-2: 11
- FIPS PUB 197: 3
- FIPS PUB 46-3: 1
- ISO:
- ISO/IEC 10118-3: 4
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
- PKCS:
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- secret. A.KeyManagement The IT-Environment is responsible for key management. Key management is out of scope of the TOE. O.PrivateKey and O.SecretKey, needed for computation of O.CipherText, O.MAC and O: 1
|
pdf_data/report_metadata |
- /Author: holthj-NSM-PC0709,44FD1973A6,CZC41336S0,CZC41336S0
- /CreationDate: D:20170816091149+02'00'
- /Creator: PixEdit Version 8.0.6.4, SN 357-92834-02, Nasjonal sikkerhetsmyndighet,(6A3791DF44),www.pixedit.com
- /ModDate: D:20170816091149+02'00'
- /Producer: Techsoft PixEdit Version 8.0.6.4, SN 357-92834-02, Nasjonal sikkerhetsmyndighet
- /Subject: 385678 340600 VEDLEGG01
- pdf_file_size_bytes: 7954615
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
- /CreationDate: D:20080207191148+09'00'
- /ModDate: D:20080207191148+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 132396
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
SV000073-Voice-Stream-Interceptor-Security-Target-Lite.pdf |
c0107_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
- ACM:
- ACM_CAP.3: 4
- ACM_SCP.1: 3
- ADO:
- ADO_DEL.1: 4
- ADO_IGS.1: 4
- ADV:
- ADV_FSP.1: 11
- ADV_HLD.1: 3
- ADV_HLD.2: 3
- ADV_RCR.1: 4
- AGD:
- AGD_ADM.1: 8
- AGD_USR.1: 6
- ALC:
- ATE:
- ATE_COV.2: 4
- ATE_DPT.1: 1
- ATE_FUN.1: 6
- ATE_IND.2: 3
- AVA:
- AVA_MSU.1: 4
- AVA_SOF.1: 2
- AVA_VLA.1: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FDP:
- FDP_IFC: 2
- FDP_IFC.1: 20
- FDP_IFC.1.1: 3
- FDP_IFF: 2
- FDP_IFF.1: 22
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 3
- FDP_IFF.1.3: 3
- FDP_IFF.1.4: 3
- FDP_IFF.1.5: 3
- FDP_ITC.1: 1
- FMT:
- FMT_MSA: 2
- FMT_MSA.1: 4
- FMT_MSA.3: 12
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMR.1: 4
- FPT:
- FPT_FLS: 2
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_STM.1: 4
- FPT_TST: 2
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_TRP: 2
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FCS:
- FCS_CKM: 87
- FCS_CKM.1: 4
- FCS_CKM.2: 9
- FCS_CKM.4: 26
- FCS_CKM.4.1: 2
- FCS_COP: 123
- FCS_COP.1: 9
- FCS_RND: 21
- FCS_RND.1: 5
- FCS_RND.1.1: 1
- FCS_RND.1.2: 1
- FDP:
- FDP_ACC.1: 2
- FDP_IFC.1: 2
- FDP_ITC: 13
- FDP_ITC.1: 41
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 22
- FDP_RIP.1: 3
- FDP_RIP.1.1: 2
- FMT:
- FMT_MSA: 6
- FMT_MSA.2: 32
- FMT_MSA.3: 2
- FPT:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.SECURE_IP: 4
- A.SECURE_LOCATION: 3
- A.SECURE_OS: 5
- A.TRUSTED_VPN: 4
- O:
- O.BLACK_VOICE_STREAM: 9
- O.RED_VOICE_STREAM: 6
- O.STREAM_SETUP: 6
- OE:
- OE.ACOUSTIC_FEEDBACK: 3
- OE.ENVIRONMENTAL: 4
- OE.EVALUATED_OS: 7
- OE.INSTRUCTED_ADMIN: 9
- OE.INSTRUCTED_USERS: 7
- OE.LOG_ACCESS: 4
- OE.PREVENT_ACCESS: 7
- OE.READ_LOG: 4
- OE.SECURE_IP: 4
- OE.SECURE_LOCATION: 6
- OE.TRUSTED_REGISTRAR: 3
- OE.TRUSTED_RELEASE: 8
- OT:
- OT.LOG: 8
- OT.ROBUST: 6
- OT.SANITY_CHECK: 10
- OT.SELECTOR: 10
- OT.SEND: 8
- OT.SUBSTITUTION: 9
- OT.SUPPRESS: 7
- SA:
- SA.VOICE_STREAM_CLASSIFICATION: 4
- T:
- T.CORRUPT_FORMAT: 3
- T.CORRUPT_STREAM: 3
- T.NETWORK_INTEGRITY: 3
- T.SETUP: 4
- T.TERMINAL_INTEGRITY: 4
- T.WRONG_LABEL: 4
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- Triple-DES: 3
- TripleDES: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
- RSA:
- RSA 1024: 1
- RSA-OAEP: 1
- RSA-PSS: 1
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- RIPEMD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 17
- SHA-384: 14
- SHA-512: 17
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- AIS 20: 1
- AIS 31: 2
- AIS20: 7
- AIS31: 1
- FIPS:
- FIPS 46-3: 4
- FIPS PUB 180-1: 11
- FIPS PUB 180-2: 29
- FIPS PUB 186-2: 2
- FIPS PUB 197: 5
- FIPS PUB 46-3: 3
- ISO:
- PKCS:
- RFC:
- RFC 2104: 5
- RFC 2268: 5
- RFC2104: 1
- RFC2268: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Key Management. The IT-Environment is responsible for key management. Key management is out of scope of the TOE. O.PrivateKey and O.SecretKey, needed for computation of O.CipherText, O.MAC and O: 1
- its own key pad for entering this authentication data. Displaying data to be signed or verified is out of scope of the TOE. • Conventional Signatures. The TOE is used without hardware support to create: 1
- out of scope: 3
- several algorithms that can be used for data encryption and decryption. Key management is out of scope of the TOE. The application provides the keys to the TOE. The TOE does not modify the keys it gets: 1
|
pdf_data/st_metadata |
- /Author: Arne Stig Peters
- /CreationDate: D:20170815121252+02'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20170815121252+02'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 1265855
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
- /Author: Karl Scheibelhofer, Dieter Bratko, Harald Bratko
- /Company: IAIK, Graz University of Technology, Stiftung SIC
- /CreationDate: D:20070523123515+02'00'
- /Creator: Acrobat PDFMaker 7.0.5 für Word
- /Manager: Karl Scheibelhofer
- /ModDate: D:20070523123643+02'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20070523103041
- /Subject: Common Criteria Evaluation of IAIK-JCE
- /Title: Security Target, IAIK-JCE CC
- /Version: 1.8
- pdf_file_size_bytes: 413325
- pdf_hyperlinks: http://java.sun.com/j2se/1.5.0/docs/guide/security/jce/JCERefGuide.html, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, http://java.sun.com/j2se/1.4.2/docs/api/javax/crypto/package-summary.html, http://www.ietf.org/rfc/rfc2104.txt, http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf, http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf, http://java.sun.com/docs/books/vmspec/index.html, http://java.sun.com/j2se/1.4/docs/guide/security/CryptoSpec.html, http://java.sun.com/security/index.html, http://java.sun.com/j2se/1.5.0/docs/api/java/security/package-summary.html, http://java.sun.com/j2se/1.4.2/docs/api/, http://java.sun.com/j2se/1.4.2/docs/guide/security/HowToImplAProvider.html, http://www.rsasecurity.com/rsalabs/pkcs/pkcs-1/, http://java.sun.com/products/jce/, http://java.sun.com/products/archive/jdk/1.1/index.html, http://java.sun.com/j2se/1.4.2/docs/guide/security/jce/HowToImplAJCEProvider.html, http://java.sun.com/j2se/1.4.2/docs/api/java/security/package-summary.html, http://java.sun.com/j2se/1.5.0/docs/api/, http://java.sun.com/j2se/1.4.2/docs/guide/security/jce/JCERefGuide.html, http://java.sun.com/j2se/1.5/docs/guide/security/CryptoSpec.html, http://www.ietf.org/rfc/rfc2268.txt, http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 55
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |