Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Cisco Jabber 11.8 for Windows 10
CCEVS-VR-10802-2017
SUSE Linux Enterprise Server Version 15 SP2
BSI-DSZ-CC-1168-2021
name Cisco Jabber 11.8 for Windows 10 SUSE Linux Enterprise Server Version 15 SP2
category Other Devices and Systems Operating Systems
scheme US DE
status archived active
not_valid_after 13.07.2019 10.11.2026
not_valid_before 13.06.2017 11.11.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10802-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1168c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10802-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1168a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10802-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1168b_pdf.pdf
manufacturer Cisco Systems, Inc. SUSE LLC
manufacturer_web https://www.cisco.com https://www.suse.com
dgst 3cf5720780c73c9a 4754212f2600e7b2
heuristics/cert_id CCEVS-VR-10802-2017 BSI-DSZ-CC-1168-2021
heuristics/cert_lab US BSI
heuristics/cpe_matches {} cpe:2.3:o:suse:linux_enterprise_server:15:sp5:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:ltss:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:business_critical_linux:-:*:*, cpe:2.3:o:suse:suse_linux_enterprise_server:15:sp3:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp3:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:*:sap:*:*, cpe:2.3:o:suse:suse_linux_enterprise_server:15:sp3:*:*:*:sap:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp4:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:*:-:*:*
heuristics/related_cves {} CVE-2018-17962, CVE-2020-8025, CVE-2002-20001, CVE-2023-29552, CVE-2022-27239, CVE-2019-18897, CVE-2020-15706, CVE-2023-23005, CVE-2018-12116, CVE-2019-18903, CVE-2020-15705, CVE-2021-4034, CVE-2019-18901, CVE-2019-18902, CVE-2020-8013, CVE-2021-45082, CVE-2020-15707, CVE-2018-20105, CVE-2018-12122
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1
heuristics/extracted_versions 11.8 15
heuristics/scheme_data
  • category: VoIP
  • certification_date: 13.06.2017
  • evaluation_facility: Acumen Security
  • expiration_date: 13.06.2019
  • id: CCEVS-VR-VID10802
  • product: Cisco Jabber 11.8 for Windows 10
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10802
  • vendor: Cisco Systems, Inc.
heuristics/protection_profiles 23a4b339a974dbbe e34797b67a3163c5, 236bced46aeb26ba
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_voip_v1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_V4.2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ssh_ep_v1.0.pdf
pdf_data/cert_filename st_vid10802-ci.pdf 1168c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10802-2017: 1
  • DE:
    • BSI-DSZ-CC-1168-2021: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
pdf_data/cert_keywords/vendor
  • Cisco:
    • Cisco: 1
    • Cisco Systems, Inc: 1
pdf_data/cert_keywords/eval_facility
  • Acumen:
    • Acumen Security: 1
pdf_data/cert_keywords/crypto_protocol
  • SSH:
    • SSH: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20170616133201-04'00'
  • /ModDate: D:20170616133201-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 176776
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20211112103541+01'00'
  • /Creator: Writer
  • /Keywords: """Common Criteria, Certification, Zertifizierung, Linux-basiertes Betriebssystem, Operating System Protection Profile, Virtualization"""
  • /ModDate: D:20211116101139+01'00'
  • /Producer: LibreOffice 6.3
  • /Subject: Zertifizierung SUSE Linux EnterpriseServer 15 SP2
  • /Title: Certification Report BSI-DSZ-CC-1151-2021
  • pdf_file_size_bytes: 367408
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid10802-vr.pdf 1168a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-10802-2017
    • cert_item: for the Cisco Jabber 11.8 for Windows 10
    • cert_lab: US NIAP
  • DE:
    • cc_security_level: Common Criteria Part 3 extended
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-1168-2021
    • cert_item: SUSE Linux Enterprise Server, Version 15 SP2
    • cert_lab: BSI
    • developer: SUSE LLC
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Protection Profile for General Purpose Operating Systems Version 4.2.1, 22 April 2019, CCEVS-VR- PP-0047, NIAP, Extended Package for Secure Shell (SSH), Version 1.0, 19 February 2016, CCEVS-VR-PP-0039, NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-10802-2017: 1
  • DE:
    • BSI-DSZ-CC-1168-2021: 19
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 5
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 3
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 3
    • ALC_TSU_EXT.1: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_RNG.1: 2
  • FTP:
    • FTP_ITC.1: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.AVAILABILITY: 1
    • A.OPER_ENV: 1
    • A.TRUSTED_CONFIG: 1
  • T:
    • T.TSF_CONFIGURATION: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
    • T.USER_DATA_REUSE: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 24
    • Cisco Systems, Inc: 2
  • Microsoft:
    • Microsoft: 6
pdf_data/report_keywords/eval_facility
  • Acumen:
    • Acumen Security: 4
  • atsec:
    • atsec: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 11
      • AES-: 1
  • constructions:
    • MAC:
      • HMAC: 10
      • HMAC-SHA-384: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 9
  • FF:
    • DH:
      • DH: 4
      • Diffie-Hellman: 1
    • DSA:
      • DSA: 2
pdf_data/report_keywords/hash_function
  • PBKDF:
    • PBKDF2: 2
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-2: 5
      • SHA-256: 2
      • SHA-512: 1
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
    • Key agreement: 1
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 5
  • IKE:
    • IKE: 1
    • IKEv2: 2
  • SSH:
    • SSH: 20
    • SSHv2: 3
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 10
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
  • RNG:
    • RNG: 2
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CTR:
    • CTR: 3
  • GCM:
    • GCM: 6
  • XTS:
    • XTS: 2
pdf_data/report_keywords/ecc_curve
  • NIST:
    • NIST P-256: 3
    • P-256: 7
    • P-384: 8
    • P-521: 8
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 20: 2
    • AIS 23: 1
    • AIS 32: 1
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 186-4: 5
    • FIPS180-4: 8
    • FIPS186-4: 3
    • FIPS197: 3
    • FIPS198: 2
    • FIPS198-1: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 4253: 1
    • RFC 5246: 1
    • RFC0768: 1
    • RFC0791: 1
    • RFC0792: 1
    • RFC0793: 1
    • RFC0826: 1
    • RFC0903: 1
    • RFC2104: 3
    • RFC2119: 1
    • RFC2367: 1
    • RFC2401: 1
    • RFC2460: 1
    • RFC2898: 1
    • RFC3376: 1
    • RFC3447: 3
    • RFC4251: 2
    • RFC4252: 4
    • RFC4253: 9
    • RFC4301: 1
    • RFC4306: 3
    • RFC4344: 2
    • RFC4419: 2
    • RFC5246: 9
    • RFC5288: 2
    • RFC5647: 2
    • RFC5656: 3
    • RFC5903: 3
    • RFC6668: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • NIAP), Version 0.16, 2021-09-22 [10] Configuration list for the TOE, 2021-10-01, MASTER CM List (confidential document) [11] Extended Package for Secure Shell (SSH), Version 1.0, 19 February 2016, CCEVS-VR-PP-0039: 1
    • Report, Version 5, 2021-11-09, Final Evaluation Technical Report, atsec information security GmbH (confidential document) [8] Protection Profile for General Purpose Operating Systems Version 4.2.1, 22 April 2019: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
pdf_data/st_filename st_vid10802-st.pdf 1168b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1168: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 4
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 2
    • AGD_PRE: 1
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 2
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 6
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 1
    • FCS_CKM_EXT.2: 3
    • FCS_CKM_EXT.2.1: 1
    • FCS_CKM_EXT.4: 3
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP.1: 12
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT.1: 3
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 1
    • FCS_SRTP_EXT.1: 5
    • FCS_SRTP_EXT.1.1: 1
    • FCS_SRTP_EXT.1.2: 1
    • FCS_SRTP_EXT.1.3: 1
    • FCS_SRTP_EXT.1.4: 1
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSS_EXT.1.1: 1
    • FCS_TLS_EXT.1: 4
    • FCS_TLS_EXT.1.1: 1
    • FCS_TLS_EXT.1.2: 1
  • FDP:
    • FDP_VOP_EXT.1: 3
    • FDP_VOP_EXT.1.1: 2
  • FIA:
    • FIA_SIPC_EXT.1: 3
    • FIA_SIPC_EXT.1.1: 1
    • FIA_SIPC_EXT.1.2: 2
    • FIA_SIPC_EXT.1.3: 1
    • FIA_SIPC_EXT.1.4: 1
  • FMT:
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 2
  • FPT:
    • FPT_TST_EXT.1: 3
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.1.2: 1
    • FPT_TUD: 1
    • FPT_TUD_EXT.1: 6
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTP:
    • FTP_ITC.1: 6
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 2
    • FTP_ITC.1.3: 2
  • FAU:
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
  • FCS:
    • FCS_CKM.1: 6
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 6
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.4: 7
    • FCS_CKM_EXT.4.1: 1
    • FCS_CKM_EXT.4.2: 1
    • FCS_COP: 1
    • FCS_COP.1: 37
    • FCS_COP.1.1: 5
    • FCS_RBG_EXT.1: 7
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RNG.1: 4
    • FCS_SSHC_EXT: 8
    • FCS_SSHC_EXT.1: 8
    • FCS_SSHC_EXT.1.1: 1
    • FCS_SSHS_EXT: 7
    • FCS_SSHS_EXT.1: 8
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSH_EXT.1: 6
    • FCS_SSH_EXT.1.1: 1
    • FCS_STO_EXT.1: 6
    • FCS_STO_EXT.1.1: 2
    • FCS_TLSC_EXT: 3
    • FCS_TLSC_EXT.1: 10
    • FCS_TLSC_EXT.2: 5
  • FDP:
    • FDP_ACF_EXT.1: 6
    • FDP_ACF_EXT.1.1: 1
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.5: 6
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MOF_EXT: 1
    • FMT_MOF_EXT.1: 6
    • FMT_SMF_EXT.1: 6
    • FMT_SMF_EXT.1.1: 2
  • FPT:
    • FPT_ACF_EXT.1: 6
    • FPT_ACF_EXT.1.1: 1
    • FPT_ACF_EXT.1.2: 1
    • FPT_ASLR_EXT: 1
    • FPT_ASLR_EXT.1: 6
    • FPT_SBOP_EXT: 1
    • FPT_SBOP_EXT.1: 6
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 1
    • FPT_TUD_EXT.1: 7
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.2: 6
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
  • FTP:
    • FTP_ITC_EXT.1: 8
    • FTP_ITC_EXT.1.1: 1
    • FTP_TRP.1: 6
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.AVAILABILITY: 1
    • A.OPER_ENV: 1
    • A.TRUSTED_CONFIG: 1
  • O:
    • O.PROTECTED_COMMUNICATIONS: 1
    • O.TSF_SELF_TEST: 1
    • O.VERIFIABLE_UPDATES: 1
  • OE:
    • OE.AUTHORIZED_USER: 1
    • OE.OPER_ENV: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.TSF_CONFIGURATION: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
    • T.USER_DATA_REUSE: 1
  • A:
    • A.CONNECT: 1
    • A.PLATFORM: 4
    • A.PROPER_ADMIN: 4
    • A.PROPER_USER: 4
  • O:
    • O.ACCOUNTABILITY: 7
    • O.INTEGRITY: 19
    • O.MANAGEMENT: 8
    • O.PROTECTED_COMMS: 21
    • O.PROTECTED_STORAGE: 8
  • OE:
    • OE.PLATFORM: 3
    • OE.PROPER_ADMIN: 3
    • OE.PROPER_USER: 3
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 3
    • T.LOCAL_ATTACK: 2
    • T.NETWORK_ATTACK: 10
    • T.NETWORK_EAVESDROP: 3
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 37
    • Cisco Systems, Inc: 3
  • Microsoft:
    • Microsoft: 10
  • Microsoft:
    • Microsoft: 2
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 134
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 8
  • constructions:
    • MAC:
      • HMAC: 6
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 1
  • AES_competition:
    • AES:
      • AES: 4
      • AES-256: 1
      • AES128: 1
      • AES256: 1
  • constructions:
    • MAC:
      • HMAC: 5
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 2
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 9
  • FF:
    • DH:
      • Diffie-Hellman: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 4
      • SHA-384: 4
  • PBKDF:
    • PBKDF2: 3
  • SHA:
    • SHA1:
      • SHA-1: 7
      • SHA1: 1
    • SHA2:
      • SHA-256: 4
      • SHA-384: 2
      • SHA-512: 2
      • SHA2: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
  • MAC:
    • MAC: 5
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 29
      • TLS 1.0: 1
      • TLS 1.2: 1
  • PGP:
    • PGP: 1
  • SSH:
    • SSH: 92
    • SSHv2: 5
  • TLS:
    • SSL:
      • SSL: 14
    • TLS:
      • TLS: 41
      • TLS 1.2: 1
      • TLSv1.0: 1
      • TLSv1.1: 1
      • TLSv1.2: 4
  • VPN:
    • VPN: 3
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 1
  • RNG:
    • RBG: 4
  • PRNG:
    • DRBG: 5
    • PRNG: 1
  • RNG:
    • RBG: 1
    • RNG: 6
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 3
  • GCM:
    • GCM: 4
  • CTR:
    • CTR: 2
  • GCM:
    • GCM: 3
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
    • P-384: 2
  • NIST:
    • P-256: 4
    • P-384: 4
    • P-521: 4
    • secp256r1: 1
    • secp384r1: 1
    • secp521r1: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 3
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 13
  • libgcrypt:
    • libgcrypt: 2
pdf_data/st_keywords/side_channel_analysis
  • other:
    • Bleichenbacher Attack: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-009-001: 1
    • CCMB-2012-009-004: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS PUB 140-2: 1
    • FIPS PUB 180-3: 3
    • FIPS PUB 186-3: 2
    • FIPS PUB 186-4: 6
    • FIPS PUB 197: 1
    • FIPS PUB 198-1: 1
  • NIST:
    • NIST SP 800-131A: 1
    • NIST SP 800-38A: 2
    • NIST SP 800-38D: 1
    • NIST SP 800-57: 1
  • RFC:
    • RFC 2246: 1
    • RFC 2560: 1
    • RFC 3261: 2
    • RFC 3711: 1
    • RFC 4566: 1
    • RFC 4568: 2
    • RFC 5246: 7
    • RFC 5280: 2
    • RFC 7714: 1
    • RFC4568: 1
  • FIPS:
    • FIPS 140-2: 3
    • FIPS PUB 186-4: 5
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38D: 1
    • NIST SP 800-38E: 1
    • NIST SP 800-57: 1
  • PKCS:
    • PKCS #7: 1
  • RFC:
    • RFC 2460: 1
    • RFC 3484: 1
    • RFC 3542: 1
    • RFC 4213: 1
    • RFC 4251: 1
    • RFC 4252: 4
    • RFC 4253: 5
    • RFC 5246: 13
    • RFC 5280: 2
    • RFC 5288: 4
    • RFC 5289: 4
    • RFC 5647: 1
    • RFC 5656: 1
    • RFC 5759: 1
    • RFC 6125: 1
    • RFC 6668: 1
    • RFC 8017: 1
    • RFC4252: 4
    • RFC4253: 4
  • X509:
    • X.509: 10
    • x.509: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store: 1
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. 3.2.1.2 Personnel A.PROPER_USER The user of the OS is not willfully negligent or: 1
    • out of scope: 2
pdf_data/st_metadata
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different