Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RioRey Perimeter Protection Platform RE500, RE1500, RX1800, RX2300, RX4400 and RG Series
None
Oracle Enterprise Linux Version 4 Update 4
BSI-DSZ-CC-0427-2007
name RioRey Perimeter Protection Platform RE500, RE1500, RX1800, RX2300, RX4400 and RG Series Oracle Enterprise Linux Version 4 Update 4
category Boundary Protection Devices and Systems Operating Systems
scheme TR DE
not_valid_after 27.03.2017 01.09.2019
not_valid_before 15.03.2013 19.07.2007
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RioRey%20CERTIFICATION%20REPORT.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0427a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RioRey%20ST-%20v0.9.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0427b.pdf
manufacturer RIOREY Incorporated Oracle Corporation UK Limited
manufacturer_web https://www.riorey.com/ https://www.oracle.com/uk/
security_level EAL4+, ALC_FLR.1 EAL4+, ALC_FLR.3
dgst 53265b9d283d6074 f29813e3ed420946
heuristics/cert_id BSI-DSZ-CC-0427-2007
heuristics/cert_lab [] BSI
heuristics/cpe_matches {} cpe:2.3:o:oracle:linux:4:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2014-7169, CVE-2011-2306, CVE-2014-6271
heuristics/direct_transitive_cves {} CVE-2011-2306, CVE-2016-3458, CVE-2016-1962, CVE-2016-2796, CVE-2014-9584, CVE-2007-6283, CVE-2016-2792, CVE-2016-2795, CVE-2016-3598, CVE-2014-7169, CVE-2016-5258, CVE-2016-5262, CVE-2016-5252, CVE-2016-1950, CVE-2016-5403, CVE-2016-1954, CVE-2016-2797, CVE-2016-2799, CVE-2016-2801, CVE-2016-4470, CVE-2014-3153, CVE-2014-3687, CVE-2014-2678, CVE-2015-0235, CVE-2016-1964, CVE-2016-5265, CVE-2016-1966, CVE-2016-1952, CVE-2015-3195, CVE-2016-2776, CVE-2014-1737, CVE-2016-2790, CVE-2016-2794, CVE-2014-0203, CVE-2016-2182, CVE-2015-8000, CVE-2014-3673, CVE-2016-2798, CVE-2016-1965, CVE-2016-3710, CVE-2016-3550, CVE-2016-1977, CVE-2014-1738, CVE-2016-0695, CVE-2016-5263, CVE-2016-5264, CVE-2016-3500, CVE-2016-1961, CVE-2016-2800, CVE-2016-2837, CVE-2014-6271, CVE-2016-1930, CVE-2016-1957, CVE-2013-4312, CVE-2014-9644, CVE-2015-2922, CVE-2016-2793, CVE-2016-2791, CVE-2016-3508, CVE-2016-1960, CVE-2016-1973, CVE-2016-5254, CVE-2016-2178, CVE-2016-5259, CVE-2016-1935, CVE-2016-3427, CVE-2016-1958, CVE-2016-5387, CVE-2016-2177, CVE-2016-1974, CVE-2016-2802, CVE-2015-0239, CVE-2016-3610, CVE-2013-7421
heuristics/indirect_transitive_cves {} CVE-2011-2306, CVE-2016-3458, CVE-2016-1962, CVE-2016-2796, CVE-2014-9584, CVE-2007-6283, CVE-2016-2792, CVE-2016-2795, CVE-2016-3598, CVE-2014-7169, CVE-2016-5258, CVE-2016-5262, CVE-2016-5252, CVE-2016-1950, CVE-2016-5403, CVE-2016-1954, CVE-2016-2797, CVE-2016-2799, CVE-2016-2801, CVE-2016-4470, CVE-2014-3153, CVE-2014-3687, CVE-2014-2678, CVE-2015-0235, CVE-2016-1964, CVE-2016-5265, CVE-2016-1966, CVE-2016-1952, CVE-2015-3195, CVE-2016-2776, CVE-2014-1737, CVE-2016-2790, CVE-2016-2794, CVE-2014-0203, CVE-2016-2182, CVE-2015-8000, CVE-2014-3673, CVE-2016-2798, CVE-2016-1965, CVE-2016-3710, CVE-2016-3550, CVE-2016-1977, CVE-2014-1738, CVE-2016-0695, CVE-2016-5263, CVE-2016-5264, CVE-2016-3500, CVE-2016-1961, CVE-2016-2800, CVE-2016-2837, CVE-2014-6271, CVE-2016-1930, CVE-2016-1957, CVE-2013-4312, CVE-2014-9644, CVE-2015-2922, CVE-2016-2793, CVE-2016-2791, CVE-2016-3508, CVE-2016-1960, CVE-2016-1973, CVE-2016-5254, CVE-2016-2178, CVE-2016-5259, CVE-2016-1935, CVE-2016-3427, CVE-2016-1958, CVE-2016-5387, CVE-2016-2177, CVE-2016-1974, CVE-2016-2802, CVE-2015-0239, CVE-2016-3610, CVE-2013-7421
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ASE_ENV.1, ADV_RCR.1, AVA_VLA.2, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ALC_FLR.3, ATE_FUN.1, ATE_DPT.1, ALC_DVS.1, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1
heuristics/extracted_versions - 4
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0468-2007, BSI-DSZ-CC-0481-2008
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0468-2007, BSI-DSZ-CC-0481-2008
pdf_data/report_filename RioRey CERTIFICATION REPORT.pdf 0427a.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0427-2007
    • cert_item: Oracle Enterprise Linux Version 4 Update 4
    • cert_lab: BSI
    • developer: Oracle Corporation UK Limited
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0427-2007: 24
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL 4+: 5
    • EAL4: 1
    • EAL4+: 1
  • EAL:
    • EAL 1: 1
    • EAL 4: 1
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 14
    • EAL4 augmented: 3
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 8
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.2: 1
    • ADV_HLD: 2
    • ADV_HLD.2: 1
    • ADV_IMP: 2
    • ADV_IMP.1: 1
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_LLD.1: 1
    • ADV_RCR: 2
    • ADV_RCR.1: 1
    • ADV_SPM: 2
    • ADV_SPM.1: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 1
    • AGD_USR: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.1: 1
    • ALC_FLR: 2
    • ALC_FLR.3: 4
    • ALC_LCD: 1
    • ALC_LCD.1: 1
    • ALC_TAT: 2
    • ALC_TAT.1: 1
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_DPT: 2
    • ATE_DPT.1: 1
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_IND: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.2: 1
    • AVA_SOF: 3
    • AVA_SOF.1: 1
    • AVA_VLA: 3
    • AVA_VLA.2: 2
    • AVA_VLA.3: 1
    • AVA_VLA.4: 1
pdf_data/report_keywords/cc_sfr
  • FRU:
    • FRU_DDOS_EXT.1: 1
  • FAU:
    • FAU_GEN.1: 1
    • FAU_GEN.2: 1
    • FAU_SAR.1: 1
    • FAU_SAR.2: 1
    • FAU_SAR.3: 1
    • FAU_SEL.1: 1
    • FAU_STG.1: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 1
  • FCS:
    • FCS_CKM.1: 3
    • FCS_CKM.2: 4
    • FCS_COP.1: 3
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACF.1: 2
    • FDP_RIP.2: 1
    • FDP_UCT.1: 1
    • FDP_UIT.1: 1
  • FIA:
    • FIA_ATD.1: 1
    • FIA_SOS.1: 1
    • FIA_UAU.2: 1
    • FIA_UAU.7: 1
    • FIA_UID.2: 1
    • FIA_USB.1: 1
  • FMT:
    • FMT_MSA.1: 1
    • FMT_MSA.2: 1
    • FMT_MSA.3: 2
    • FMT_MTD.1: 4
    • FMT_REV.1: 2
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_AMT.1: 1
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
    • FPT_STM.1: 1
  • FTP:
    • FTP_ITC.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.BACKUP: 1
    • A.CONNECT: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
  • A:
    • A.CONNECT: 2
    • A.COOP: 2
    • A.LOCATE: 2
    • A.MANAGE: 2
    • A.NET_COMP: 2
    • A.NO_EVIL_ADMIN: 2
    • A.PEER: 2
    • A.PROTECT: 2
    • A.UTRAIN: 2
    • A.UTRUST: 2
  • OE:
    • OE.ADMIN: 1
    • OE.CREDEN: 1
    • OE.HW_SEP: 1
    • OE.INFO_PROTECT: 1
    • OE.INSTALL: 1
    • OE.MAINTENANCE: 1
    • OE.PHYSICAL: 1
    • OE.PROTECT: 1
    • OE.RECOVER: 1
    • OE.SERIAL_LOGIN: 1
    • OE.SOFTWARE_IN: 1
  • T:
    • T.COMPROT: 1
    • T.UAACCESS: 1
    • T.UAUSER: 1
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 5
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 7
  • TLS:
    • SSL:
      • SSL: 8
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 6
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • ISO:
    • ISO/IEC 17025: 2
  • BSI:
    • AIS 34: 1
  • ISO:
    • ISO/IEC 15408:2005: 2
pdf_data/report_keywords/javacard_packages
  • org:
    • org.tr: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Technical Report BSI-DSZ-CC-0427-2007, Version 2, 2007- 07-12, atsec information security GmbH (confidential document) [8] Controlled Access Protection Profile, Issue 1.d, 8 October 1999 [9] Dell PowerEdge 1850 spec: 1
pdf_data/report_metadata
  • /Author: Tse
  • /CreationDate: D:20130318153433-04'00'
  • /Creator: Microsof Word 2010
  • /ModDate: D:20130318153433-04'00'
  • /Producer: Microsoft® Word 2010
  • /Title: 1
  • pdf_file_size_bytes: 511380
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Company: BSI, Postfach 200363, 53133 Bonn
  • /CreationDate: D:20070723081017+02'00'
  • /Creator: Acrobat PDFMaker 8.1 für Word
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Oracle Enterprise Linux Version 4 Update 4, Oracle Corporation UK Limited"
  • /ModDate: D:20070723085440+02'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /SourceModified: D:20070723061002
  • /Title: Certification Report BSI-DSZ-CC-0427-2007
  • pdf_file_size_bytes: 328643
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 48
pdf_data/st_filename RioRey ST- v0.9.pdf 0427b.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4+: 6
  • EAL:
    • EAL3: 2
    • EAL4: 6
    • EAL4 augmented: 4
    • EAL4+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.1: 1
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 2
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_FLR.3: 8
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_REQ.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.2: 1
    • AVA_SOF.1: 2
    • AVA_VLA.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_UAU_EXT.2: 1
  • FIA:
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU: 3
    • FIA_UAU.1: 2
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU_EXT.2: 13
    • FIA_UAU_EXT.2.1: 3
    • FIA_UID: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 2
  • FRU:
    • FRU_DDOS: 2
    • FRU_DDOS_EXT.1: 12
    • FRU_DDOS_EXT.1.1: 3
    • FRU_DDOS_EXT.1.2: 3
    • FRU_DDOS_EXT.1.3: 3
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 10
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 13
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 12
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 14
    • FAU_SAR.3.1: 1
    • FAU_SEL.1: 12
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 12
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 12
    • FAU_STG.3.1: 1
    • FAU_STG.4: 11
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 23
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 24
    • FCS_CKM.2.1: 4
    • FCS_CKM.4: 4
    • FCS_COP.1: 23
    • FCS_COP.1.1: 3
  • FDP:
    • FDP_ACC.1: 25
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 19
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 5
    • FDP_ACF.1.4: 3
    • FDP_IFC.1: 4
    • FDP_ITC.1: 2
    • FDP_MSA.3: 1
    • FDP_RIP.2: 14
    • FDP_RIP.2.1: 1
    • FDP_UCT.1: 13
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 13
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_ATD.1: 13
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 14
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 15
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 12
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 6
    • FIA_UID.2: 15
    • FIA_UID.2.1: 1
    • FIA_USB: 1
    • FIA_USB.1: 15
    • FIA_USB.1.1: 2
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.1: 23
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 15
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 20
    • FMT_MSA.3.1: 3
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 54
    • FMT_MTD.1.1: 5
    • FMT_REV.1: 25
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 23
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 24
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_AMT.1: 11
    • FPT_AMT.1.1: 1
    • FPT_RVM.1: 12
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 17
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_ITC.1: 17
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.BACKUP: 3
    • A.CONNECT: 3
    • A.NOEVIL: 3
    • A.PHYSICAL: 3
  • O:
    • O.AUDIT: 10
    • O.DDOSALERT: 5
    • O.DDOSMITIGATE: 6
    • O.FAILSAFE: 6
    • O.IDAUTH: 9
    • O.MANAGE: 8
    • O.PROCOM: 6
  • OE:
    • OE.AUDIT: 4
    • OE.BACKUP: 3
    • OE.CONNECT: 3
    • OE.NOEVIL: 3
    • OE.PHYSICAL: 3
    • OE.TIME: 5
  • T:
    • T.AUDIT: 4
    • T.DDOSATTACK: 3
    • T.FAILURE: 3
    • T.MANAGE: 3
    • T.NOAUTH: 3
    • T.PROCOM: 3
  • A:
    • A.CONNECT: 7
    • A.COOP: 3
    • A.LOCATE: 3
    • A.MANAGE: 5
    • A.NET_COMP: 5
    • A.NO_EVIL_ADMIN: 4
    • A.PEER: 3
    • A.PROTECT: 4
    • A.UTRAIN: 3
    • A.UTRUST: 3
  • O:
    • O.AUDITING: 31
    • O.AUTHORIZATION: 22
    • O.COMPROT: 24
    • O.DISCRETIONARY_ACCESS: 22
    • O.ENFORCEMENT: 13
    • O.MANAGE: 30
    • O.RESIDUAL_INFO: 9
    • O.RESIDUAL_INFORMATION: 3
  • OE:
    • OE.ADMIN: 7
    • OE.CREDEN: 4
    • OE.HW_SEP: 8
    • OE.INFO_PROTECT: 10
    • OE.INSTALL: 12
    • OE.MAINTENANCE: 5
    • OE.PHYSICAL: 8
    • OE.PROTECT: 9
    • OE.RECOVER: 8
    • OE.SERIAL_LOGIN: 4
    • OE.SOFTWARE_IN: 5
  • T:
    • T.COMPROT: 3
    • T.UAACCESS: 4
    • T.UAUSER: 4
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 99
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 7
    • RC:
      • RC4: 4
  • DES:
    • 3DES:
      • TDES: 6
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • HMAC: 2
  • miscellaneous:
    • SM4:
      • SM4: 2
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 5
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 2
  • MD:
    • MD5:
      • MD5: 3
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 2
  • SSH:
    • SSH: 32
    • SSHv2: 1
  • TLS:
    • SSL:
      • SSL: 43
    • TLS:
      • TLS: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 1
  • CBC:
    • CBC: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 3
  • libgcrypt:
    • libgcrypt: 1
pdf_data/st_keywords/vulnerability
  • CVE:
    • CVE-2008-5161: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 8
pdf_data/st_keywords/standard_id
  • RFC:
    • RFC 1858: 2
    • RFC 1918: 1
    • RFC1858: 1
  • FIPS:
    • FIPS 140: 1
  • PKCS:
    • PKCS#1: 1
  • X509:
    • X.509: 3
pdf_data/st_keywords/javacard_api_const
  • curves:
    • SM2: 4
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • software which controls the serial port, such as HyperTerminal, must be used. This interface is out of scope as it should only be used for setup or recovery of the TOE. RioRey Security Target 18 WebUI: 1
pdf_data/st_metadata
  • /CreationDate: D:20130328162641+02'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130328162641+02'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 1068348
  • pdf_hyperlinks: https://tools.ietf.org/html/rfc6151
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 62
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different