name |
Rambus PKE4 Core version 4.1 |
Utimaco CryptoServer CP5 Se12 5.1.0.0, CryptoServer CP5 Se52 5.1.0.0, CryptoServer CP5 Se500 5.1.0.0, CryptoServer CP5 Se1500 5.1.0.0. |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Products for Digital Signatures |
scheme |
NL |
NL |
status |
active |
archived |
not_valid_after |
11.12.2028 |
20.12.2023 |
not_valid_before |
11.12.2023 |
14.05.2020 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0503107-CERT.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificaat%2020-222073.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0503107-CR.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-222073-cr-v1.2cert.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-LITE]%20Rambus_PKE4_Core_version_4.1_Security_Target_Lite_RevD.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-LITE]%20CryptoServerCP5_ST-Lite_v2-0-0.pdf |
manufacturer |
Rambus Inc. |
Utimaco |
manufacturer_web |
https://www.rambus.com/ |
https://hsm.utimaco.com/ |
security_level |
EAL4+, ATE_DPT.2, ALC_DVS.2, AVA_VAN.5 |
EAL4+, AVA_VAN.5 |
dgst |
505cf4bb7f73e46d |
7df3a10d555052d5 |
heuristics/cert_id |
NSCIB-CC-0503107-CR |
NSCIB-CC-222073-CR |
heuristics/cert_lab |
|
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
4.1 |
5.1.0.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
NSCIB-CC-159381-CR2 |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
NSCIB-CC-159381-CR2 |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
ee319f4a624019b0 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-PP-2016_05 PP.pdf |
pdf_data/cert_filename |
NSCIB-CC-0503107-CERT.pdf |
certificaat 20-222073.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL2: 1
- EAL4: 1
- EAL4 augmented: 1
- EAL7: 1
|
- EAL:
- EAL2: 1
- EAL4: 1
- EAL4 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
- ALC:
- ALC_DVS.2: 1
- ALC_FLR.3: 2
- ATE:
- AVA:
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408-1: 1
- ISO/IEC 15408-2: 1
- ISO/IEC 15408-3: 1
- ISO/IEC 18045: 2
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: kruitr
- /CreationDate: D:20231220083238+01'00'
- /Creator: Bullzip PDF Printer (11.10.0.2761)
- /ModDate: D:20231220083308+01'00'
- /Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH
- /Title: Microsoft Word - NSCIB-CC-0503107-CERT.doc
- pdf_file_size_bytes: 266966
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20200528102215+01'00'
- /Creator: C458-M
- /ModDate: D:20200528102255+02'00'
- /Producer: KONICA MINOLTA bizhub C458
- /Title: C458-M&S20052810210
- pdf_file_size_bytes: 88046
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
NSCIB-CC-0503107-CR.pdf |
nscib-cc-222073-cr-v1.2cert.pdf |
pdf_data/report_frontpage |
- NL:
- cert_id: NSCIB-CC-0503107-CR
- cert_item: PKE4 Core version 4.1
- cert_lab: SGS Brightsight B.V.
- developer: Rambus Inc
|
- NL:
- cert_id: NSCIB-CC-222073-CR
- cert_item: CryptoServer CP5 Se12 5.1.0.0, CryptoServer CP5 Se52 5.1.0.0, CryptoServer CP5 Se500 5.1.0.0, CryptoServer CP5 Se1500 5.1.0.0
- cert_lab: Brightsight
- developer: Utimaco IS GmbH
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 6
- EAL4 augmented: 3
- EAL4+: 7
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 2
- EAL4 augmented: 1
- EAL4+: 3
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
- FPT:
- FPT_PHP.1: 1
- FPT_PHP.3: 1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- BrightSight:
- SGS:
- SGS: 2
- SGS Brightsight: 2
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
- Curve:
- Edwards:
- NIST:
- NIST P-192: 2
- NIST P-224: 2
- NIST P-256: 2
- NIST P-384: 2
- NIST P-521: 2
- P-192: 2
- P-224: 2
- P-256: 2
- P-384: 2
- P-521: 2
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
- FI:
- DFA: 1
- Fault Injection: 1
- SCA:
- other:
- JIL: 2
- JIL-AAPS: 2
- JIL-AM: 2
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- The possibility of the SAM was in scope of the evaluation. The SAM itself is out of scope of this evaluation: 1
- of the TOE). The possibility of the SAM was in scope of the evaluation. The SAM itself is out of scope of this evaluation. For SAM developers see the guidance “Internal SAM developer documentation”. For: 1
- out of scope: 1
|
pdf_data/report_metadata |
|
- /AAPL:Keywords: []
- /CreationDate: D:20200528084847Z00'00'
- /Creator: Preview
- /Keywords:
- /ModDate: D:20200528084847Z00'00'
- /Producer: Mac OS X 10.13.6 Quartz PDFContext
- /Title: NSCIB-CC-222073-CR v1.2.pdf
- pdf_file_size_bytes: 821699
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
pdf_data/st_filename |
[ST-LITE] Rambus_PKE4_Core_version_4.1_Security_Target_Lite_RevD.pdf |
[ST-LITE] CryptoServerCP5_ST-Lite_v2-0-0.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 10
- EAL4 augmented: 2
|
- EAL:
- EAL4: 6
- EAL4 augmented: 3
- EAL4+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 3
- ADV_FSP: 1
- ADV_FSP.4: 2
- ADV_IMP: 1
- ADV_IMP.1: 2
- ADV_TDS.3: 3
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 2
- AGD_PRE: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 9
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT.1: 2
- ATE_DPT.2: 7
- ATE_FUN.1: 2
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 12
- ADV_FSP: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 7
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 2
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM: 34
- FCS_CKM.1: 17
- FCS_CKM.1.1: 1
- FCS_CKM.2: 4
- FCS_CKM.4: 28
- FCS_CKM.4.1: 1
- FCS_COP: 37
- FCS_COP.1: 16
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 2
- FDP_IFC.1: 15
- FDP_IFC.1.1: 1
- FDP_IFF.1: 1
- FDP_ITC.1: 30
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 6
- FDP_ITT.1: 10
- FDP_ITT.1.1: 1
- FMT:
- FPT:
- FPT_FLS.1: 13
- FPT_FLS.1.1: 1
- FPT_ITT.1: 10
- FPT_ITT.1.1: 1
- FRU:
- FRU_FLT.2: 11
- FRU_FLT.2.1: 1
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 23
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_STG.1: 1
- FAU_STG.2: 9
- FAU_STG.2.1: 1
- FAU_STG.2.2: 2
- FAU_STG.2.3: 1
- FCS:
- FCS_CKM: 36
- FCS_CKM.1: 67
- FCS_CKM.2: 9
- FCS_CKM.4: 92
- FCS_CKM.4.1: 1
- FCS_COP: 133
- FCS_COP.1: 43
- FCS_RND.1: 1
- FCS_RNG: 4
- FCS_RNG.1: 11
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 23
- FDP_ACC.1: 23
- FDP_ACC.1.1: 1
- FDP_ACF: 41
- FDP_ACF.1: 20
- FDP_IFC: 11
- FDP_IFC.1: 19
- FDP_IFF: 29
- FDP_IFF.1: 19
- FDP_ITC.1: 54
- FDP_ITC.2: 54
- FDP_RIP.1: 12
- FDP_RIP.1.1: 1
- FDP_SDI.1: 2
- FDP_SDI.2: 10
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 16
- FIA_AFL.1: 8
- FIA_AFL.1.2: 1
- FIA_UAU: 41
- FIA_UAU.1: 13
- FIA_UAU.1.1: 1
- FIA_UAU.6: 4
- FIA_UID.1: 26
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA: 62
- FMT_MSA.1: 16
- FMT_MSA.3: 13
- FMT_MTD: 41
- FMT_MTD.1: 5
- FMT_SMF: 1
- FMT_SMF.1: 35
- FMT_SMF.1.1: 8
- FMT_SMR: 1
- FMT_SMR.1: 45
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 11
- FPT_FLS.1.1: 1
- FPT_PHP.1: 11
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_STM.1: 13
- FPT_STM.1.1: 1
- FPT_TST.1: 1
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 19
- FPT_TST_EXT.1.1: 3
- FTP:
- FTP_TRP: 38
- FTP_TRP.1: 13
- FTP_TRP.1.1: 2
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-2: 2
- SHA-224: 2
- SHA-256: 2
- SHA-384: 2
- SHA-512: 2
- SHA3:
- SHA-3: 2
- SHA3-224: 2
- SHA3-256: 2
- SHA3-384: 2
- SHA3-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 2
- Key agreement: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- Curve:
- Edwards:
- NIST:
- NIST P-192: 6
- NIST P-224: 5
- NIST P-256: 6
- NIST P-384: 6
- NIST P-521: 6
- P-192: 6
- P-224: 5
- P-256: 6
- P-384: 6
- P-521: 6
|
- ANSSI:
- Brainpool:
- brainpoolP224r1: 3
- brainpoolP224t1: 3
- brainpoolP256r1: 3
- brainpoolP256t1: 3
- brainpoolP320r1: 3
- brainpoolP320t1: 3
- brainpoolP384r1: 3
- brainpoolP384t1: 3
- brainpoolP512r1: 3
- brainpoolP512t1: 3
- NIST:
- Curve P-224: 2
- Curve P-256: 2
- Curve P-384: 2
- Curve P-521: 1
- P-224: 3
- P-256: 3
- P-384: 3
- P-521: 1
- curve P-224: 1
- curve P-256: 1
- curve P-384: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Fault Injection: 1
- fault injection: 1
- malfunction: 1
- SCA:
- DPA: 3
- SPA: 1
- side channel: 1
- side-channel: 6
- template attacks: 1
|
- FI:
- Malfunction: 3
- physical tampering: 4
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-0004: 1
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 140-2: 1
- FIPS 186-4: 6
- FIPS PUB 140-2: 1
- NIST:
- PKCS:
- RFC:
- RFC 5639: 5
- RFC 7748: 4
- RFC 8032: 5
|
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- FIPS:
- FIPS 140-2: 7
- FIPS 180-4: 2
- FIPS 186-4: 4
- FIPS 197: 8
- FIPS 198: 2
- FIPS 202: 2
- FIPS PUB 140-2: 1
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 197: 1
- FIPS PUB 198: 1
- FIPS PUB 202: 1
- ISO:
- NIST:
- PKCS:
- PKCS#1: 15
- PKCS#3: 2
- PKCS#5: 4
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
- curves:
- SM2: 16
- X25519: 1
- X448: 1
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- 240 in [PP] This refinement refers to configuration in Phase 2 or Phase 7. This refinement is out of scope for the TOE 241 in [PP] This refinement refers to downloading of embedded software. This refinement: 1
- This refinement relates to requirements concerting embedded software. This requirement is regarded out of scope for the TOE. 235 in [PP] This refinement is applicable without any adjustments. Guidance documents: 1
- contribute to SFRs. This refinement is regarded out of scope for the TOE. 217 in [PP] The ST redefines this refinement as follows. The Functional Specification: 1
- in [PP] This refinement is out of scope for the TOE because it refers to the CMS refinement. 206 in [PP] This refinement is out of scope: 1
- mechanisms. 218 in [PP] This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE. ADV_IMP 223 in [PP] This refinement is applicable without any adjustments. It must be: 1
- must be tested under different operating conditions within the specified ranges. This refinement is out of scope for the TOE. 227 in [PP] This refinement relates to physical testing. This refinement is out of: 1
- out of scope: 12
- out of scope for the TOE. AVA_VAN 245 in [PP] The ST redefines this refinement as follows. The vulnerability: 1
- related to the development and production of the TOE. ALC_CMS 199 in [PP] This refinement is out of scope for the TOE because it relates to consumer software that can be part of manufacturing and delivery: 1
- to test software delivered but not available in the operational phase. This refinement is regarded out of scope for the TOE. 216 in [PP] This refinement refers to features that do not provide functionality but: 1
- transitions of power save modes if provided by the TOE. 210 in [PP] This refinement in [PP] is out of scope for the TOE because it relates to test features used in wafer testing. ADV_FSP 215 in [PP] This: 1
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |