name |
VMware Carbon Black Endpoint Detection and Response (EDR) Server 7.5 |
Renesas HD65256D smartcard integrated circuit V01 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
DE |
status |
archived |
archived |
not_valid_after |
02.08.2023 |
01.09.2019 |
not_valid_before |
02.08.2021 |
16.09.2008 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11156-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11156-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0490a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11156-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0490b.pdf |
manufacturer |
VMware Inc. |
Renesas Technology Corporation |
manufacturer_web |
https://www.vmware.com |
https://am.renesas.com/ |
security_level |
{} |
ADV_IMP.2, AVA_VLA.4, AVA_MSU.3, EAL4+, ALC_DVS.2 |
dgst |
52a2ab8a0b76216a |
578b09f1fb9d9835 |
heuristics/cert_id |
CCEVS-VR-VID-11156-2021 |
BSI-DSZ-CC-0490-2008 |
heuristics/cert_lab |
US |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 |
ALC_TAT.1, AVA_VLA.4, ALC_DVS.2, ALC_LCD.1, ADV_IMP.2, ADV_SPM.1, AVA_MSU.3 |
heuristics/extracted_versions |
7.5 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0350-2007 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0329-2006, BSI-DSZ-CC-0353-2006, BSI-DSZ-CC-0350-2007 |
heuristics/scheme_data |
- category: Application Software
- certification_date: 02.08.2021
- evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
- expiration_date: 02.08.2023
- id: CCEVS-VR-VID11156
- product: VMware Carbon Black Endpoint Detection and Response (EDR) Server 7.5
- scheme: US
- url: https://www.niap-ccevs.org/product/11156
- vendor: VMware, LLC
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
a1cc4a4e079f4d1f |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_APP_v1.3.pdf |
{} |
pdf_data/cert_filename |
st_vid11156-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11156-2021: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20210804113313-04'00'
- /ModDate: D:20210804113313-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 183009
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid11156-vr.pdf |
0490a.pdf |
pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-VID11156-2021
- cert_item: VMware Carbon Black Endpoint Detection and Response (EDR) Server 7.5
- cert_lab: US NIAP
|
- DE:
- cert_id: BSI-DSZ-CC-0490-2008
- cert_item: Renesas HD65256D smartcard integrated circuit V01
- cert_lab: BSI
- developer: Renesas Technology Corp. sponsored by Renesas Technology Europe Ltd
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11156-2021: 1
|
- DE:
- BSI-DSZ-CC-0350-2007: 4
- BSI-DSZ-CC-0490: 2
- BSI-DSZ-CC-0490-2008: 17
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0002-2001: 1
- BSI-PP-0002-2001: 3
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 4: 8
- EAL 4 augmented: 2
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 8
- EAL4 augmented: 1
- EAL4+: 1
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 1
- Philips:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 25: 2
- AIS 26: 2
- AIS 31: 3
- AIS 32: 1
- AIS 34: 3
- AIS 35: 2
- AIS 36: 1
- AIS 38: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 2005, Renesas Technology Corp. (confidential document) [15] Option List for EEPROM Write (for HD65256D (AE56D)), Version 1.30R, 18 October 2007, Renesas: 1
- 2006, Renesas Technology Corp. (confidential document) 19 / 32 Certification Report BSI-DSZ-CC-0490-2008 This page is intentionally left blank. 20 / 32: 1
- 6.0, 19 October 2007, HD65256D Version 01 Smartcard Security Target, Renesas Technology Corp. (confidential document) [7] Evaluation Technical Report, 1.0, 28 July 2008, Evaluation Technical Report AE56D version 01: 1
- Corp. (confidential document) [16] HD65256D User Guidance Manual – Information for software developers using the HD65256D in: 1
- Criteria, Renesas Technology corp. (confidential document) [9] Security Target BSI-DSZ-CC-0490, Version 4.0, 11 July 2008, HD65256D Version 01 Smartcard: 1
- Series AE56D (HD65256D) Hardware Manual, Version 1.1, 10 August 2006, Renesas Technology Corp. (confidential document) [14] Option List for Mask ROM Data (for HD65256D (AE56D)) (about Mask ROM data), Version 1.0R, 5: 1
- applications, Version 1.10, 20 July 2006, Renesas Technology Corp. (confidential document) [17] KURA Chip User Guidance Manual – Information for users of the security chip, Version 1.0, 7: 1
- produced at the Singapore site (HNS/CST) – EAL4+, Brightsight (confidential document) [8] Configuration list for the TOE, Version 2.0, 22 July 2008, AE56D Document Version for the: 1
|
pdf_data/report_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20081008103423+02'00'
- /Creator: Writer
- /Keywords: "Renesas HD65256D smartcard integrated circuit V01, Renesas Technology Corp., Renesas Technology Europe Ltd., Common Criteria, Certification, "
- /ModDate: D:20081008104106+02'00'
- /Producer: StarOffice 8
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0490-2008
- pdf_file_size_bytes: 352757
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 32
|
pdf_data/st_filename |
st_vid11156-st.pdf |
0490b.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0002: 4
- BSI-PP-0002: 82
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 6
- EAL4 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 12
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.1: 6
- ALC_CMS.1: 7
- ALC_TSU_EXT.1: 9
- ASE:
- ASE_CCL.1: 16
- ASE_ECD.1: 12
- ASE_INT.1: 14
- ASE_OBJ.1: 6
- ASE_REQ.1: 12
- ASE_TSS.1: 7
- ATE:
- AVA:
|
- ACM:
- ACM_AUT: 1
- ACM_CAP: 1
- ACM_SCP: 1
- ADO:
- ADV:
- ADV_FSP: 2
- ADV_HLD: 1
- ADV_IMP: 1
- ADV_IMP.2: 2
- ADV_LLD: 1
- ADV_RCR: 1
- ADV_SPM: 1
- ADV_SPM.1: 4
- AGD:
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_LCD: 1
- ALC_TAT: 1
- AVA:
- AVA_MSU: 1
- AVA_MSU.3: 2
- AVA_SOF: 6
- AVA_VLA: 1
- AVA_VLA.4: 1
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 5
- FCS_CKM.1.1: 1
- FCS_CKM.2: 5
- FCS_CKM.2.1: 1
- FCS_CKM_EXT.1: 5
- FCS_CKM_EXT.1.1: 1
- FCS_COP: 1
- FCS_RBG_EXT.1: 6
- FCS_RBG_EXT.1.1: 2
- FCS_STO_EXT.1: 6
- FCS_STO_EXT.1.1: 1
- FDP:
- FDP_DAR_EXT: 1
- FDP_DAR_EXT.1: 5
- FDP_DAR_EXT.1.1: 1
- FDP_DEC_EXT.1: 5
- FDP_DEC_EXT.1.1: 2
- FDP_DEC_EXT.1.2: 1
- FDP_NET_EXT.1: 4
- FDP_NET_EXT.1.1: 1
- FMT:
- FMT_CFG_EXT.1: 5
- FMT_CFG_EXT.1.1: 1
- FMT_CFG_EXT.1.2: 1
- FMT_MEC_EXT.1: 8
- FMT_MEC_EXT.1.1: 1
- FMT_SMF.1: 4
- FMT_SMF.1.1: 1
- FPR:
- FPR_ANO_EXT.1: 4
- FPR_ANO_EXT.1.1: 1
- FPT:
- FPT_AEX_EXT.1: 5
- FPT_AEX_EXT.1.1: 2
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.1.3: 2
- FPT_AEX_EXT.1.4: 2
- FPT_AEX_EXT.1.5: 1
- FPT_API_EXT.1: 4
- FPT_API_EXT.1.1: 1
- FPT_DIT_EXT.1: 1
- FPT_IDV_EXT.1: 4
- FPT_IDV_EXT.1.1: 1
- FPT_LIB_EXT.1: 4
- FPT_LIB_EXT.1.1: 1
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 2
- FPT_TUD_EXT.1.4: 1
- FPT_TUD_EXT.1.5: 1
- FPT_TUD_EXT.2: 7
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FTP:
- FTP_DIT_EXT.1: 7
- FTP_DIT_EXT.1.1: 1
|
- FAU:
- FAU_GEN.1: 1
- FAU_SAS.1: 9
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP.1: 19
- FCS_COP.1.1: 2
- FCS_RND: 1
- FCS_RND.1: 9
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 29
- FDP_ACC.1.1: 3
- FDP_ACF.1: 27
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 17
- FDP_IFC.1.1: 1
- FDP_IFF.1: 1
- FDP_ITC.1: 12
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITT.1: 10
- FDP_ITT.1.1: 1
- FDP_SDI.1: 1
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 10
- FMT_LIM.1.1: 1
- FMT_LIM.2: 10
- FMT_LIM.2.1: 1
- FMT_MSA.1: 2
- FMT_MSA.2: 14
- FMT_MSA.2.1: 1
- FMT_MSA.3: 9
- FMT_SMR.1: 1
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 31
- FPT_FLS.1.1: 1
- FPT_ITT.1: 9
- FPT_ITT.1.1: 1
- FPT_PHP.3: 12
- FPT_PHP.3.1: 1
- FPT_SEP.1: 12
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FRU:
- FRU_FLT.1: 1
- FRU_FLT.2: 15
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PROPER_ADMIN: 1
- A.PROPER_USER: 1
- O:
- O.INTEGRITY: 1
- O.MANAGEMENT: 1
- O.PROTECTED_COMMS: 1
- O.PROTECTED_STORAGE: 1
- O.QUALITY: 1
- OE:
- OE.PLATFORM: 1
- OE.PROPER_ADMIN: 1
- OE.PROPER_USER: 1
- T:
- T.LOCAL_ATTACK: 1
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
- T.PHYSICAL_ACCESS: 1
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- TLS:
- TLS:
- TLS: 3
- TLS v1.2: 4
- TLSv1.2: 1
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 2
- Malfunction: 15
- malfunction: 5
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 16
- Physical Probing: 2
- Physical probing: 1
- physical probing: 4
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- NIST:
- X509:
|
- BSI:
- AIS 20: 1
- AIS 31: 1
- AIS20: 1
- AIS31: 7
- FIPS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
- java:
- java.lang: 1
- java.lang.invoke: 1
- java.lang.management: 1
- java.lang.reflect: 1
- java.net: 8
- java.security.cert: 2
- java.sql: 1
- java.text: 1
- java.time: 1
- java.util: 1
- java.util.zip: 1
- org:
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- Functional Requirements in the claimed Protection Profile. Therefore, the following are considered out of scope of the evaluated configuration because there are no SFRs in the PP that allow this functionality to: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /CreationDate: D:20210804112326-04'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20210804112326-04'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 625295
- pdf_hyperlinks: https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0416, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0495, https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html-single/storage_administration_guide/index, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0445, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0582, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0544, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0587, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0515, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0561, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0510, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0435, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0437, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0548, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0554, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0498, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0465, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0519, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0543, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0427, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0434, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0473, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0540
- pdf_is_encrypted: False
- pdf_number_of_pages: 43
|
- /Author: Renesas Technology Corp.
- /CreationDate: D:20080715091546+09'00'
- /Creator: クセロPDF v1.14 Rev0495
- /Keywords: HD65256D, security controller, common criteria certification, Security Target, EAL4+
- /ModDate: D:20080918160838+01'00'
- /Producer: Xelo PDF Library
- /Subject: Common Criteria Certification BSI-DSZ-CC-0490-2008
- /Title: Renesas HD65256D ST-Lite
- pdf_file_size_bytes: 991638
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 67
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |