name |
Alteon version 32.6.3.50 |
BREACH+ v2.0 |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
ES |
QA |
status |
active |
active |
not_valid_after |
03.05.2028 |
02.09.2027 |
not_valid_before |
03.05.2023 |
02.09.2024 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-42_Certificado.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CB-4-CRT-QCCS-CC-Certificate-%20C003.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-42-INF-4015.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CB-4-RPT-QCCS]-Certification-Report-C003%20v1.1.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-42_ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Security-Target-(ST)-V.1.4-Breach+.pdf |
manufacturer |
Radware, LTD. |
Cytomate Solutions & Services |
manufacturer_web |
https://www.radware.com/products/alteon/ |
https://www.cytomate.net/ |
security_level |
EAL2 |
EAL1 |
dgst |
69b82608a6c3aa9c |
10d4b608e98b364e |
heuristics/cert_id |
2021-42-INF-4015 |
QCCS-CERT-C003-001-2024 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
heuristics/extracted_versions |
32.6.3.50 |
2.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Others
- certification_date: 03.05.2023
- enhanced:
- category: Others
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1741
- certification_date: 03.05.2023
- description: The TOE is the Alteon version 32.6.3.50 series of products, with the TSF covering the core load balancing capabilities together with the SSL Offloading and part of the management capabilities. The TOE, thus, acts as a load balancer which redirects service request in a balanced way to multiple providing servers. As such, from hence forward the TOE may be referred as an ADC or as a load balancer interchangeably. Additionally, the TOE provides the following major security features: security audit, cryptographic support, user data protection, identification and authentication, security management, protection of the TSF, TOE access and trusted path/channel.
- evaluation_facility: Applus Laboratories
- level: EAL2
- manufacturer: RADWARE, LTD.
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1742
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1740
- type: Product
- manufacturer: RADWARE, LTD.
- product: Alteon version 32.6.3.50
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/982-alteon-version-32-6-3-50
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
2021-42_Certificado.pdf |
CB-4-CRT-QCCS-CC-Certificate- C003.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- QA:
- QCCS-CERT-C003-001-2024: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL2: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 892166
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /CreationDate: D:20240827115429+03'00'
- /Creator: Adobe Illustrator 27.9 (Macintosh)
- /ModDate: D:20240916093110+03'00'
- /Producer: Adobe PDF library 17.00
- /Title: [CB-4-CRT-QCCS]-CC-Certificate-Mz
- pdf_file_size_bytes: 2157985
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
2021-42-INF-4015.pdf |
[CB-4-RPT-QCCS]-Certification-Report-C003 v1.1.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- QA:
- QCCS-CERT-C003-001-2024: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 9
- EAL 4: 2
- ITSEC:
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_TDS.1: 1
- AGD:
- ALC:
- ALC_CMC.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 2
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_IND.2: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_STG.1: 1
- FCS:
- FCS_CKM.2: 1
- FCS_HTS.1: 1
- FCS_TLS: 1
- FCS_TLS.2: 1
- FDP:
- FIA:
- FIA_AFL.1: 1
- FIA_UID.2: 1
- FMT:
- FMT_MSA.1: 1
- FMT_SMF.1: 1
- FPT:
- FTA:
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- TLS:
- SSL:
- TLS:
- TLS: 1
- TLS1.2: 1
- TLS1.3: 2
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- ISO:
- ISO/IEC 17065: 2
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
- ISO/IEC17065: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Category: Public
- /ClassificationContentMarkingFooterFontProps: #000000,10,Calibri
- /ClassificationContentMarkingFooterShapeIds: 8,9,a,b,c,d,e,f,10
- /ClassificationContentMarkingFooterText: Classified_Public
- /Comments: 06.08.2024
- /Company: Ministry of Transport & Communications
- /ContentTypeId: 0x010100BE8EE9D22F12584ABFB929336815436E
- /CreationDate: D:20240911134718+03'00'
- /Creator: Acrobat PDFMaker 23 for Word
- /Keywords:
- /MSIP_Label_ba1c3d61-d25e-4220-be73-e1cfaa29bdb8_ActionId: 0390e8bc-285f-40d1-87c3-162fac4e0789
- /MSIP_Label_ba1c3d61-d25e-4220-be73-e1cfaa29bdb8_ContentBits: 2
- /MSIP_Label_ba1c3d61-d25e-4220-be73-e1cfaa29bdb8_Enabled: true
- /MSIP_Label_ba1c3d61-d25e-4220-be73-e1cfaa29bdb8_Method: Privileged
- /MSIP_Label_ba1c3d61-d25e-4220-be73-e1cfaa29bdb8_Name: ba1c3d61-d25e-4220-be73-e1cfaa29bdb8
- /MSIP_Label_ba1c3d61-d25e-4220-be73-e1cfaa29bdb8_SetDate: 2022-04-12T07:01:00Z
- /MSIP_Label_ba1c3d61-d25e-4220-be73-e1cfaa29bdb8_SiteId: 75f5c750-9567-45b1-820b-cba711750bf8
- /Manager:
- /ModDate: D:20240911134844+03'00'
- /Producer: Adobe PDF Library 23.6.156
- /Product Code: C002
- /SourceModified: D:20240911104654
- /Subject: Report
- /TOE Name: Huawei NetEngine 8000 M14 Routers' Software
- /TOE Version: V800R021C00, patch version V800R021C00SPC100
- /Title: Certification Report
- pdf_file_size_bytes: 389633
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
pdf_data/st_filename |
2021-42_ST.pdf |
Security-Target-(ST)-V.1.4-Breach .pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 2
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 2
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 3
- ASE_INT.1: 3
- ASE_OBJ.1: 1
- ASE_REQ.1: 3
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_STG: 2
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 6
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 6
- FCS_CKM.1: 6
- FCS_CKM.2: 7
- FCS_CKM.2.1: 1
- FCS_CKM.4: 8
- FCS_CKM.4.1: 1
- FCS_COP: 4
- FCS_HTS: 4
- FCS_HTS.1: 10
- FCS_HTS.1.1: 2
- FCS_HTS.1.2: 2
- FCS_TLS: 20
- FCS_TLS.1: 8
- FCS_TLS.1.1: 3
- FCS_TLS.1.2: 3
- FCS_TLS.1.3: 3
- FCS_TLS.2: 7
- FCS_TLS.2.1: 2
- FCS_TLS.2.2: 2
- FCS_TLS.2.3: 2
- FDP:
- FDP_ACC.1: 1
- FDP_IFC: 1
- FDP_IFC.1: 10
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 2
- FIA_UAU: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UID: 1
- FIA_UID.1: 6
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 2
- FMT_MSA.1: 7
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 5
- FMT_SMR.2: 9
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_STM: 1
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FTA:
- FTA_SSL: 2
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTA_SSL.4: 6
- FTA_SSL.4.1: 1
- FTP:
- FTP_ITC: 5
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 3
- FTP_TRP.1: 12
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_SAR: 1
- FAU_SAR.1: 4
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG: 1
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 2
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 8
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 5
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 3
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UAU.5: 6
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 2
- FIA_UID: 1
- FIA_UID.1: 9
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 2
- FMT_MSA.1: 7
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 9
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT: 1
- FPT_ITT.1: 4
- FPT_ITT.1.1: 1
- FPT_STM: 1
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FTA:
- FTA_SSL: 2
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_TSE: 1
- FTA_TSE.1: 4
- FTA_TSE.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.LIMITED_FUNCTIONALITY: 2
- A.MANAGEMENT_SEPARATION: 2
- A.NO_EVIL: 3
- A.PHYSICAL_PROTECTION: 3
- O:
- O.ACCESS: 9
- O.ADMINISTRATION: 7
- O.AUDIT: 11
- O.TRAFFIC_FLOW: 9
- O.TRUSTED_CHANNELS: 8
- OE:
- OE.NO_GENERAL_PURPOSE: 4
- OE.PHYSICAL_SECURITY: 5
- OE.TRUESTED_ADMINS: 1
- OE.TRUSTED_ADMINS: 5
- OSP:
- OSP.ACCOUNTABILITY: 3
- OSP.LOGS: 2
- OSP.ROLES: 3
- OSP.TRUSTED_ADMINISTRATORS: 2
- T:
- T.PASSWORD_CRACKING: 4
- T.UNBALANCED_LOAD: 3
- T.UNDETECTED_ACTIVITIES: 2
- T.WEAK_CRYPTOGRAPHY: 3
- T.WEAK_ENDPOINTS: 2
|
- O:
- O.AUDIT: 1
- O.AUTH: 1
- O.LEGIT_USE: 1
- O.MFA: 1
- O.MGMT: 1
- O.SAFE_EXEC: 1
- OE:
- OE.ADMIN: 1
- OE.CRED: 1
- OE.NETWORK: 1
- OE.SEC_ENV: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- SSL:
- SSL: 16
- SSL 2.0: 5
- SSL 3.0: 5
- TLS:
- TLS: 47
- TLS 1.0: 5
- TLS 1.1: 5
- TLS 1.2: 7
- TLS 1.3: 10
- TLS1.2: 1
- TLS1.3: 3
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- secp256r1: 3
- secp384r1: 3
- secp521r1: 3
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 4
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 4
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 4
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 4
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 4
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 4
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 4
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 4
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 4
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 4
- TLS_RSA_WITH_AES_128_CBC_SHA256: 4
- TLS_RSA_WITH_AES_128_GCM_SHA256: 4
- TLS_RSA_WITH_AES_256_GCM_SHA384: 4
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- RFC:
- RFC 2818: 2
- RFC 4253: 1
- RFC 5246: 20
- RFC 5288: 16
- RFC 5289: 32
- RFC 8446: 24
- RFC2818: 1
- RFC3164: 4
- RFC5246: 2
- RFC5288: 1
- RFC5289: 1
- RFC5424: 4
- RFC8446: 5
|
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: test
- /CreationDate: D:20240716152340+03'00'
- /Creator: Microsoft® Word Microsoft 365 için
- /ModDate: D:20240716152340+03'00'
- /Producer: Microsoft® Word Microsoft 365 için
- /Subject: SECURITY TARGET V.1.4
- /Title: BREACH+
V.2.0
- pdf_file_size_bytes: 636176
- pdf_hyperlinks: https://apt.cytomate.net/
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |