Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
PR/SM for IBM z16 and IBM LinuxONE 4 Systems Driver Level 51C with Bundle Level 19B (D51C/B19B)
BSI-DSZ-CC-1222-2024
VMware ESXi 7.0 Update 3d
CCEVS-VR-VID-11249-2022
name PR/SM for IBM z16 and IBM LinuxONE 4 Systems Driver Level 51C with Bundle Level 19B (D51C/B19B) VMware ESXi 7.0 Update 3d
scheme DE US
status active archived
not_valid_after 10.03.2029 06.09.2024
not_valid_before 11.03.2024 06.09.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1222c_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11249-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1222a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11249-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1222b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11249-st.pdf
manufacturer IBM Corporation VMware Inc.
manufacturer_web https://www.ibm.com https://www.vmware.com
security_level EAL5+, AVA_VAN.5, ALC_FLR.3, ATE_FUN.2, ALC_TAT.3 {}
dgst 3f9c694a84d34fd9 eea19bafd2daa311
heuristics/cert_id BSI-DSZ-CC-1222-2024 CCEVS-VR-VID-11249-2022
heuristics/cert_lab BSI US
heuristics/cpe_matches {} cpe:2.3:o:vmware:esxi:7.0.0:-:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3s:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0.0:b:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3p:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0.0:update_1a:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0.0:update_1:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3r:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0.0:update_1b:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:*, cpe:2.3:o:vmware:esxi:7.0:update_3q:*:*:*:*:*:*
heuristics/related_cves {} CVE-2020-3962, CVE-2020-3999, CVE-2025-22225, CVE-2022-23825, CVE-2021-21974, CVE-2024-22253, CVE-2022-31699, CVE-2024-22254, CVE-2020-3967, CVE-2024-37085, CVE-2021-22041, CVE-2020-3976, CVE-2021-22043, CVE-2020-3981, CVE-2021-22042, CVE-2024-22255, CVE-2025-22224, CVE-2022-21125, CVE-2021-21995, CVE-2022-21166, CVE-2022-29901, CVE-2020-3966, CVE-2020-3964, CVE-2021-21994, CVE-2021-22045, CVE-2020-3965, CVE-2021-22040, CVE-2022-31681, CVE-2020-3963, CVE-2024-22273, CVE-2022-31696, CVE-2025-22226, CVE-2020-3969, CVE-2021-22050, CVE-2024-22252, CVE-2022-31705, CVE-2020-3970, CVE-2020-3982, CVE-2020-4005, CVE-2022-21123, CVE-2020-4004, CVE-2020-3968, CVE-2020-3992
heuristics/extracted_sars ALC_LCD.1, ATE_IND.2, ALC_CMC.4, ADV_IMP.1, ADV_FSP.5, ALC_CMS.5, ASE_CCL.1, ASE_OBJ.2, ASE_ECD.1, ASE_INT.1, ADV_ARC.1, ATE_FUN.2, ATE_DPT.3, ATE_COV.2, ALC_DEL.1, ASE_TSS.1, ASE_SPD.1, AGD_OPE.1, ALC_FLR.3, ALC_DVS.1, ASE_REQ.2, ADV_TDS.4, ADV_INT.2, AGD_PRE.1, AVA_VAN.5, ALC_TAT.3 ASE_INT.1, ALC_CMS.1, ALC_CMC.1, ASE_REQ.2, ASE_TSS.1, AGD_PRE.1, AGD_OPE.1, ADV_FSP.1, ATE_IND.1, ASE_CCL.1, ALC_TSU_EXT.1, AVA_VAN.1, ASE_ECD.1, ASE_OBJ.2
heuristics/extracted_versions 4 7.0
heuristics/report_references/directly_referencing BSI-DSZ-CC-1186-2023 {}
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0793-2012, BSI-DSZ-CC-1160-2021, BSI-DSZ-CC-0846-2013, BSI-DSZ-CC-1133-2020, BSI-DSZ-CC-1005-2016, BSI-DSZ-CC-1186-2023, BSI-DSZ-CC-0715-2011, BSI-DSZ-CC-1048-2018, BSI-DSZ-CC-0953-2015, BSI-DSZ-CC-1109-2019, BSI-DSZ-CC-0900-2014 {}
heuristics/protection_profiles {} deb6fe6c7a4a2306, c40ae795865a0dba, e80eb1652a0e6f6a
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_VIRTUALIZATION_BASE_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_SV_v1.0.pdf
pdf_data/cert_filename 1222c_pdf.pdf st_vid11249-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1222-2024: 1
  • US:
    • CCEVS-VR-VID11249-2022: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL 5: 1
    • EAL 5 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.3: 1
    • ALC_TAT.3: 1
  • ATE:
    • ATE_FUN.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/eval_facility
  • Leidos:
    • Leidos: 1
pdf_data/cert_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Keywords: "Common Criteria, Certification, Zertifizierung, PR/SM for IBM z16 and IBM LinuxONE 4 Systems, Driver Level 51C with Bundle Level 19B (D51C/B19B), BSI-DSZ-CC-1222-2024"
  • /Subject: Common Criteria, Certification, Zertifizierung, PR/SM for IBM z16 and IBM LinuxONE 4 Systems, Driver Level 51C with Bundle Level 19B (D51C/B19B), BSI-DSZ-CC-1222-2024
  • /Title: Certificate BSI-DSZ-CC-1222-2024
  • pdf_file_size_bytes: 339351
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20220907110747-04'00'
  • /ModDate: D:20220907110747-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 181409
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 1222a_pdf.pdf st_vid11249-vr.pdf
pdf_data/report_frontpage
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_FLR.3, ALC_TAT.3, ATE_FUN.2, AVA_VAN.5 valid until: 10 March 2029
    • cc_version: Product specific Security Target Common Criteria Part 2 conformant
    • cert_id: BSI-DSZ-CC-1222-2024
    • cert_item: PR/SM for IBM z16 and IBM LinuxONE 4 Systems Driver Level 51C with Bundle Level 19B (D51C/B19B
    • cert_lab: BSI
    • developer: IBM Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: None
  • US:
  • DE:
  • US:
    • cert_id: CCEVS-VR-VID11249-2022
    • cert_item: for VMware ESXi 7.0 Update 3d
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1186: 1
    • BSI-DSZ-CC-1186-2023: 3
    • BSI-DSZ-CC-1222-2024: 15
  • US:
    • CCEVS-VR-VID11249-2022: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 4: 4
    • EAL 5: 4
    • EAL 5 augmented: 3
    • EAL 5+: 1
    • EAL 6: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.5: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • ALC:
    • ALC_CMS.5: 1
    • ALC_FLR: 3
    • ALC_FLR.3: 4
    • ALC_TAT.3: 5
  • ATE:
    • ATE_DPT.3: 1
    • ATE_FUN.2: 5
  • AVA:
    • AVA_VAN.5: 5
  • ADV:
    • ADV_FSP.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 3
  • Leidos:
    • Leidos: 6
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS 1.3: 1
  • IPsec:
    • IPsec: 1
  • SSH:
    • SSH: 1
  • TLS:
    • TLS:
      • TLS: 12
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 16
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
    • AIS 34: 1
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • NIST:
    • NIST SP 800-90A: 1
  • X509:
    • X.509: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Report, Version 4, 2024-01-25, Final Evaluation Technical Report, atsec information security GmbH (confidential document) [8] IBM zSystems and LinuxONE Processor Resource/Systems Manager Planning, Version SB10-7178-01: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • OutOfScope:
    • out of scope: 1
    • the security test suite FTP06 must be included in the driver regression testing, which however is out of scope for this evaluation The combination of the above ensures that changes to the driver, including: 1
pdf_data/report_metadata
pdf_data/st_filename 1222b_pdf.pdf st_vid11249-st.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1222: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL5: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.5: 2
    • ADV_IMP.1: 2
    • ADV_INT.2: 2
    • ADV_TDS.4: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.5: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_FLR.3: 4
    • ALC_LCD.1: 2
    • ALC_TAT.3: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.3: 2
    • ATE_FUN.2: 4
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.5: 4
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 7
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC: 4
    • FDP_ACC.1: 3
    • FDP_ACC.1.1: 2
    • FDP_ACC.2: 25
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 43
    • FDP_ACF.1: 14
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 17
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 9
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_RIP.2: 8
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 27
    • FMT_MSA.1: 14
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 4
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 13
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TRC.1: 6
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_RSA.1: 7
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_TSE.1: 10
    • FTA_TSE.1.1: 1
  • FAU:
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 3
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 3
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG_EXT.1: 6
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
  • FCS:
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 5
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.4: 4
    • FCS_CKM_EXT.4.1: 1
    • FCS_CKM_EXT.4.2: 1
    • FCS_COP: 19
    • FCS_COP.1: 5
    • FCS_ENT_EXT.1: 4
    • FCS_ENT_EXT.1.1: 1
    • FCS_ENT_EXT.1.2: 1
    • FCS_RBG_EXT.1: 6
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_TLSC_EXT.1: 5
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.5: 4
    • FCS_TLSC_EXT.5.1: 1
    • FCS_TLSS_EXT.1: 5
    • FCS_TLSS_EXT.1.1: 2
    • FCS_TLSS_EXT.1.2: 1
    • FCS_TLSS_EXT.1.3: 1
    • FCS_TLS_EXT.1: 3
    • FCS_TLS_EXT.1.1: 1
  • FDP:
    • FDP_HAS_EXT.1: 1
    • FDP_HBI_EXT.1: 5
    • FDP_HBI_EXT.1.1: 1
    • FDP_PPR_EXT.1: 5
    • FDP_PPR_EXT.1.1: 1
    • FDP_PPR_EXT.1.2: 1
    • FDP_PPR_EXT.1.3: 1
    • FDP_RIP_EXT.1: 4
    • FDP_RIP_EXT.1.1: 1
    • FDP_RIP_EXT.2: 4
    • FDP_RIP_EXT.2.1: 1
    • FDP_VMS_EXT.1: 6
    • FDP_VMS_EXT.1.1: 3
    • FDP_VMS_EXT.1.2: 1
    • FDP_VMS_EXT.1.3: 1
    • FDP_VMS_EXT.1.4: 1
    • FDP_VNC_EXT.1: 5
    • FDP_VNC_EXT.1.1: 1
    • FDP_VNC_EXT.1.2: 1
  • FIA:
    • FIA_AFL_EXT.1: 5
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_PMG_EXT.1: 10
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU.5: 4
    • FIA_UAU.5.1: 2
    • FIA_UAU.5.2: 1
    • FIA_UIA_EXT.1: 4
    • FIA_UIA_EXT.1.1: 1
  • FMT:
    • FMT_MOF_EXT.1: 5
    • FMT_MOF_EXT.1.1: 2
    • FMT_MOF_EXT.1.2: 1
    • FMT_SMO_EXT.1: 5
    • FMT_SMO_EXT.1.1: 1
  • FPT:
    • FPT_DVD_EXT.1: 4
    • FPT_DVD_EXT.1.1: 1
    • FPT_EEM_EXT.1: 4
    • FPT_EEM_EXT.1.1: 1
    • FPT_HAS_EXT.1: 3
    • FPT_HAS_EXT.1.1: 1
    • FPT_HAS_EXT.1.2: 1
    • FPT_HCL_EXT: 1
    • FPT_HCL_EXT.1: 3
    • FPT_HCL_EXT.1.1: 1
    • FPT_RDM_EXT.1: 6
    • FPT_RDM_EXT.1.1: 1
    • FPT_RDM_EXT.1.2: 1
    • FPT_TUD_EXT.1: 5
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 5
    • FPT_TUD_EXT.2.1: 1
    • FPT_VDP_EXT.1: 4
    • FPT_VDP_EXT.1.1: 1
    • FPT_VDP_EXT.1.2: 1
    • FPT_VIV_EXT.1: 4
    • FPT_VIV_EXT.1.1: 1
    • FPT_VIV_EXT.1.2: 1
  • FTA:
    • FTA_TAB.1: 4
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC_EXT.1: 7
    • FTP_ITC_EXT.1.1: 1
    • FTP_TRP.1: 4
    • FTP_TRP.1.1: 2
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
    • FTP_UIF_EXT.1: 4
    • FTP_UIF_EXT.1.1: 1
    • FTP_UIF_EXT.2: 4
    • FTP_UIF_EXT.2.1: 1
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.SIE: 3
  • T:
    • T.LPAR_XCTL: 5
  • O:
    • O.AUDIT: 1
    • O.CORRECTLY_APPLIED_: 1
    • O.DOMAIN_INTEGRITY: 1
    • O.MANAGEMENT_ACCES: 1
    • O.PATCHED_SOFTWARE: 1
    • O.PLATFORM_INTEGRITY: 1
    • O.RESOURCE_ALLOCATIO: 1
    • O.VMM_INTEGRITY: 1
    • O.VM_ENTROPY: 1
    • O.VM_ISOLATION: 1
  • OE:
    • OE.CONFIG: 1
    • OE.NON_MALICIOUS_US: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 1
  • Leidos:
    • Leidos: 10
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 8
  • constructions:
    • MAC:
      • HMAC: 3
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDHE: 3
    • ECDSA:
      • ECDSA: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-256: 3
      • SHA-384: 3
      • SHA-512: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 1
  • PGP:
    • PGP: 1
  • SSH:
    • SSH: 2
  • TLS:
    • SSL:
      • SSL: 1
      • SSL 2.0: 1
      • SSL 3.0: 1
    • TLS:
      • TLS: 65
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 4
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 7
  • RNG:
    • RBG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 2
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 10
    • P-384: 8
    • P-521: 10
    • secp256r1: 3
    • secp384r1: 3
    • secp521r1: 3
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 4
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 4
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 4
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_RSA_WITH_AES_128_CBC_SHA: 4
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 4
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 4
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 4
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 4
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 15
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 26
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 180-4: 3
    • FIPS PUB 186-4: 8
    • FIPS PUB 197: 1
    • FIPS PUB 198-1: 2
  • NIST:
    • NIST SP 800-38A: 3
    • NIST SP 800-38D: 2
    • NIST SP 800-56A: 1
    • NIST SP 800-57: 1
    • NIST SP 800-90A: 2
    • SP 800-57: 1
  • RFC:
    • RFC 2818: 2
    • RFC 5246: 8
    • RFC 5280: 3
    • RFC 5288: 4
    • RFC 5289: 12
    • RFC 5759: 1
    • RFC 6125: 1
    • RFC 8017: 2
  • X509:
    • X.509: 7
pdf_data/st_metadata
state/cert/convert_garbage False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different