Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
VMware Carbon Black Endpoint Detection and Response (EDR) Server 7.5
CCEVS-VR-VID-11156-2021
Cisco Firepower Threat Defense (FTD) 6.4 with FMC and AnyConnect
NSCIB-CC-0259553-CR
name VMware Carbon Black Endpoint Detection and Response (EDR) Server 7.5 Cisco Firepower Threat Defense (FTD) 6.4 with FMC and AnyConnect
category Other Devices and Systems Boundary Protection Devices and Systems
scheme US NL
status archived active
not_valid_after 02.08.2023 07.10.2027
not_valid_before 02.08.2021 07.10.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11156-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-22-0259553-Cert.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11156-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0259553-CR-1.0.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11156-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-0259553-st-v1.0.pdf
manufacturer VMware Inc. Cisco Systems, Inc. 170 West Tasman Dr. San Jose, CA 95134-1706 USA
manufacturer_web https://www.vmware.com https://www.cisco.com
security_level {} EAL4+, ALC_FLR.2
dgst 52a2ab8a0b76216a 202ed3e27c6dde49
heuristics/cert_id CCEVS-VR-VID-11156-2021 NSCIB-CC-0259553-CR
heuristics/cert_lab US
heuristics/cpe_matches {} cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.13:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.16:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.17:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.18:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.9:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.10:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.15:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.8:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.11:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.1:*:*:*:*:*:*:*, cpe:2.3:o:cisco:firepower_threat_defense:6.4.0.10:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.4:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.12:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.3:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.7:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.6:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower:6.4.0:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.14:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.5:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.2:*:*:*:*:*:*:*, cpe:2.3:a:cisco:firepower_threat_defense:6.4.0.1:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2023-44487, CVE-2024-20388, CVE-2020-3555, CVE-2021-34790, CVE-2020-3259, CVE-2020-3563, CVE-2019-1669, CVE-2021-1493, CVE-2022-20745, CVE-2020-3549, CVE-2022-20947, CVE-2019-12676, CVE-2021-34781, CVE-2022-20760, CVE-2024-20359, CVE-2020-3254, CVE-2024-20353, CVE-2020-3304, CVE-2020-3285, CVE-2019-12698, CVE-2023-20256, CVE-2022-20928, CVE-2021-34783, CVE-2022-20854, CVE-2019-12678, CVE-2021-1573, CVE-2021-34763, CVE-2023-20247, CVE-2019-12673, CVE-2019-1978, CVE-2023-20083, CVE-2020-3561, CVE-2021-40125, CVE-2023-20063, CVE-2020-3303, CVE-2021-34794, CVE-2022-20946, CVE-2021-40117, CVE-2020-3550, CVE-2020-3315, CVE-2020-3191, CVE-2023-20095, CVE-2020-3554, CVE-2020-3317, CVE-2021-34756, CVE-2022-20949, CVE-2023-20245, CVE-2022-20730, CVE-2019-12674, CVE-2021-1501, CVE-2021-34755, CVE-2019-12695, CVE-2020-3195, CVE-2021-34793, CVE-2022-20757, CVE-2021-40114, CVE-2021-34764, CVE-2022-20767, CVE-2020-3179, CVE-2020-3255, CVE-2022-20742, CVE-2020-3580, CVE-2020-3188, CVE-2020-3305, CVE-2022-20934, CVE-2021-34791, CVE-2020-3572, CVE-2021-1223, CVE-2020-3186, CVE-2022-20729, CVE-2020-3253, CVE-2023-20086, CVE-2020-3529, CVE-2021-1495, CVE-2022-20713, CVE-2021-34754, CVE-2019-12675, CVE-2020-3306, CVE-2020-3565, CVE-2020-3196, CVE-2021-1224, CVE-2022-20746, CVE-2021-1256, CVE-2020-3577, CVE-2023-20269, CVE-2019-1981, CVE-2020-3452, CVE-2019-1980, CVE-2022-20759, CVE-2021-34761, CVE-2020-3514, CVE-2021-34792, CVE-2021-40118, CVE-2020-3533, CVE-2022-20940, CVE-2020-3564, CVE-2019-1970, CVE-2022-20715, CVE-2020-3352, CVE-2020-3528, CVE-2020-3436, CVE-2021-1236, CVE-2021-34787, CVE-2020-3187, CVE-2021-34762, CVE-2023-20275, CVE-2019-12694, CVE-2021-44228, CVE-2021-40116
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 AGD_PRE.1, ALC_DVS.1, ATE_COV.2, ALC_TAT.1, ALC_CMS.4, ATE_DPT.2, AVA_VAN.3, ATE_FUN.1, ALC_DEL.1, ATE_IND.2, ADV_FSP.4, ALC_LCD.1, ADV_ARC.1, ADV_TDS.3, AGD_OPE.1, ALC_CMC.4, ALC_FLR.2, ADV_IMP.1
heuristics/extracted_versions 7.5 6.4
heuristics/scheme_data
  • category: Application Software
  • certification_date: 02.08.2021
  • evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
  • expiration_date: 02.08.2023
  • id: CCEVS-VR-VID11156
  • product: VMware Carbon Black Endpoint Detection and Response (EDR) Server 7.5
  • scheme: US
  • url: https://www.niap-ccevs.org/product/11156
  • vendor: VMware, LLC
heuristics/protection_profiles a1cc4a4e079f4d1f {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_APP_v1.3.pdf {}
pdf_data/cert_filename st_vid11156-ci.pdf NSCIB-CC-22-0259553-Cert.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11156-2021: 1
  • NL:
    • CC-22-0259553: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
  • EAL:
    • EAL2: 1
    • EAL4: 2
    • EAL4 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
  • ALC:
    • ALC_FLR.2: 1
    • ALC_FLR.3: 2
pdf_data/cert_keywords/cc_claims
  • R:
    • R.L: 1
pdf_data/cert_keywords/vendor
  • Cisco:
    • Cisco: 1
    • Cisco Systems, Inc: 1
pdf_data/cert_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 1
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20210804113313-04'00'
  • /ModDate: D:20210804113313-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 183009
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: kruitr
  • /CreationDate: D:20221013121014+02'00'
  • /Creator: Bullzip PDF Printer (11.0.0.2588)
  • /ModDate: D:20221013121049+02'00'
  • /Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH
  • /Title: Microsoft Word - NSCIB-CC-22-0259553-Cert.docx
  • pdf_file_size_bytes: 253905
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid11156-vr.pdf NSCIB-CC-0259553-CR-1.0.pdf
pdf_data/report_frontpage
  • NL:
  • US:
    • cert_id: CCEVS-VR-VID11156-2021
    • cert_item: VMware Carbon Black Endpoint Detection and Response (EDR) Server 7.5
    • cert_lab: US NIAP
  • NL:
    • cert_id: NSCIB-CC-0259553-CR
    • cert_item: Cisco Firepower Threat Defense (FTD) 6.4 with FMC and AnyConnect
    • cert_lab: SGS Brightsight B.V.
    • developer: Cisco Systems, Inc
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11156-2021: 1
  • NL:
    • NSCIB-CC-0259553-CR: 12
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL4: 2
    • EAL4 augmented: 1
    • EAL4+: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_TSU_EXT.1: 1
  • ALC:
    • ALC_FLR.2: 2
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 19
    • Cisco Systems, Inc: 3
pdf_data/report_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 3
  • BrightSight:
    • Brightsight: 2
  • SGS:
    • SGS: 2
    • SGS Brightsight: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
      • TLSv1.2: 1
  • SSH:
    • SSHv2: 1
  • TLS:
    • TLS:
      • TLS: 2
  • VPN:
    • VPN: 9
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 1
pdf_data/report_metadata
pdf_data/st_filename st_vid11156-st.pdf nscib-cc-0259553-st-v1.0.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 3
    • EAL4+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 9
  • AGD:
    • AGD_OPE.1: 12
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.1: 6
    • ALC_CMS.1: 7
    • ALC_TSU_EXT.1: 9
  • ASE:
    • ASE_CCL.1: 16
    • ASE_ECD.1: 12
    • ASE_INT.1: 14
    • ASE_OBJ.1: 6
    • ASE_REQ.1: 12
    • ASE_TSS.1: 7
  • ATE:
    • ATE_IND.1: 7
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 9
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 2
    • ADV_IMP.1: 2
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_FLR.2: 6
    • ALC_LCD.1: 1
    • ALC_TAT.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.3: 3
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 5
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.1: 5
    • FCS_CKM_EXT.1.1: 1
    • FCS_COP: 1
    • FCS_RBG_EXT.1: 6
    • FCS_RBG_EXT.1.1: 2
    • FCS_STO_EXT.1: 6
    • FCS_STO_EXT.1.1: 1
  • FDP:
    • FDP_DAR_EXT: 1
    • FDP_DAR_EXT.1: 5
    • FDP_DAR_EXT.1.1: 1
    • FDP_DEC_EXT.1: 5
    • FDP_DEC_EXT.1.1: 2
    • FDP_DEC_EXT.1.2: 1
    • FDP_NET_EXT.1: 4
    • FDP_NET_EXT.1.1: 1
  • FMT:
    • FMT_CFG_EXT.1: 5
    • FMT_CFG_EXT.1.1: 1
    • FMT_CFG_EXT.1.2: 1
    • FMT_MEC_EXT.1: 8
    • FMT_MEC_EXT.1.1: 1
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
  • FPR:
    • FPR_ANO_EXT.1: 4
    • FPR_ANO_EXT.1.1: 1
  • FPT:
    • FPT_AEX_EXT.1: 5
    • FPT_AEX_EXT.1.1: 2
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.1.3: 2
    • FPT_AEX_EXT.1.4: 2
    • FPT_AEX_EXT.1.5: 1
    • FPT_API_EXT.1: 4
    • FPT_API_EXT.1.1: 1
    • FPT_DIT_EXT.1: 1
    • FPT_IDV_EXT.1: 4
    • FPT_IDV_EXT.1.1: 1
    • FPT_LIB_EXT.1: 4
    • FPT_LIB_EXT.1.1: 1
    • FPT_TUD_EXT.1: 7
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 2
    • FPT_TUD_EXT.1.4: 1
    • FPT_TUD_EXT.1.5: 1
    • FPT_TUD_EXT.2: 7
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
  • FTP:
    • FTP_DIT_EXT.1: 7
    • FTP_DIT_EXT.1.1: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 14
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 9
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 10
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_IFC.1: 22
    • FDP_IFC.1.1: 2
    • FDP_IFF.1: 22
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 2
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 14
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
    • FTA_TAB.1: 8
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • O:
    • O.INTEGRITY: 1
    • O.MANAGEMENT: 1
    • O.PROTECTED_COMMS: 1
    • O.PROTECTED_STORAGE: 1
    • O.QUALITY: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PHYSICAL_ACCESS: 1
  • A:
    • A.NOEVIL: 4
    • A.PHYSEC: 2
    • A.PROTENV: 2
    • A.PROTRA: 4
    • A.REMACC: 4
    • A.SINGEN: 2
  • O:
    • O.ACCOUNTABLE: 6
    • O.ADMINISTRATION: 8
    • O.AUDIT: 8
    • O.BANNER: 4
    • O.IDAUTH: 9
    • O.LIMEXT: 4
    • O.MEDIATE: 7
    • O.MONITORING: 8
    • O.PROCOM: 8
    • O.SECFUN: 12
    • O.SECSTA: 11
    • O.SELPRO: 7
    • O.SESSION_LOCK: 4
    • O.VPN: 8
  • OE:
    • OE.NOEVIL: 3
    • OE.PHYSEC: 3
    • OE.PROTENV: 3
    • OE.PROTRA: 3
    • OE.REMACC: 3
    • OE.SINGEN: 3
  • T:
    • T.ASPOOF: 2
    • T.AUDACC: 4
    • T.AUDFUL: 4
    • T.MEDIAT: 3
    • T.NOAUTH: 7
    • T.PROCOM: 2
    • T.SELPRO: 3
    • T.UNAUTHORIZED: 6
    • T.UNDETECTED: 2
    • T.VPN: 2
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 47
    • Cisco Systems, Inc: 4
  • Microsoft:
    • Microsoft: 3
pdf_data/st_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
      • AES-: 1
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
  • ECC:
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 2
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 3
      • TLS v1.2: 4
      • TLSv1.2: 1
  • VPN:
    • VPN: 1
  • IKE:
    • IKE: 4
    • IKEv1: 1
    • IKEv2: 1
  • IPsec:
    • IPsec: 41
  • SSH:
    • SSH: 22
    • SSHv1: 1
    • SSHv2: 6
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 14
      • TLSv1.1: 1
      • TLSv1.2: 3
  • VPN:
    • VPN: 131
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
  • RNG:
    • RBG: 1
pdf_data/st_keywords/cipher_mode
  • CCM:
    • CCM: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 4
    • P-384: 4
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 3
  • OpenSSL:
    • OpenSSL: 1
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • SPA: 5
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS PUB 186-4: 5
  • NIST:
    • NIST SP 800-56A: 1
  • X509:
    • X.509: 2
  • CC:
    • CCMB-2017-04-004: 1
  • RFC:
    • RFC 2460: 2
    • RFC 4443: 1
    • RFC 768: 2
    • RFC 791: 2
    • RFC 792: 1
    • RFC 793: 2
  • X509:
    • X.509: 1
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
    • java.lang.invoke: 1
    • java.lang.management: 1
    • java.lang.reflect: 1
    • java.net: 8
    • java.security.cert: 2
    • java.sql: 1
    • java.text: 1
    • java.time: 1
    • java.util: 1
    • java.util.zip: 1
  • org:
    • org.slf4j: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Functional Requirements in the claimed Protection Profile. Therefore, the following are considered out of scope of the evaluated configuration because there are no SFRs in the PP that allow this functionality to: 1
    • out of scope: 1
pdf_data/st_metadata
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different