name |
Dell Color MFP S3845cdn Controller ROM Ver. 1.0.31 |
VMware® ESXi 4.0 Update 1 and vCenter Server 4.0 Update 1 |
category |
Multi-Function Devices |
Operating Systems |
scheme |
JP |
CA |
status |
archived |
archived |
not_valid_after |
29.03.2023 |
15.05.2017 |
not_valid_before |
29.03.2018 |
15.10.2010 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0593_eimg.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0593_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/vmware-esxi-v40-cert-eng.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0593_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/vmware-esxi-v40-sec-eng.pdf |
manufacturer |
Dell, Inc. |
VMware Inc. |
manufacturer_web |
https://www.dell.com |
https://www.vmware.com |
security_level |
EAL2 |
EAL4+, ALC_FLR.2 |
dgst |
6b431a5164a4c478 |
6d943c6a06ed7b36 |
heuristics/cert_id |
JISEC-CC-CRP-C0593 |
383-4-147 |
heuristics/cert_lab |
[] |
CANADA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
AGD_PRE.1, ALC_DVS.1, ATE_COV.2, ALC_TAT.1, ALC_CMS.4, ATE_FUN.1, ALC_CMC.4, ADV_FSP.4, ATE_IND.2, ALC_DEL.1, ALC_LCD.1, ADV_ARC.1, AGD_OPE.1, ADV_TDS.3, ATE_DPT.1, AVA_VAN.3, ALC_FLR.2, ADV_IMP.1 |
heuristics/extracted_versions |
1.0.31 |
4.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0593
- certification_date: 01.03.2018
- claim: EAL2
- enhanced:
- assurance_level: EAL2
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0593_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the Multi-Function Device (MFD) that provides such functions as copy, print, network scan, and fax. The TOE is assumed to be used at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the TOE via internal network, and general user client which is directly connected to the TOE. TOE security functionality To ensure the security of assets to be protected, the TOE provides the following security functions for using the above basic functions: - Flash Memory Data EncryptionA function to encrypt the document data before the data is stored into the internal eMMC memory. - User AuthenticationA function to identify and authenticate users. This function also allows only owners of document data and system administrators to handle document data stored in the TOE. - System Administrator's Security ManagementA function to allow only system administrators to configure the settings of security functions. - Customer Engineer Operation RestrictionA function to allow only system administrators to configure the settings for restricting customer engineer operations. - Security Audit LogA function to generate audit logs of security events and allow only system administrators to refer to them. - Internal Network Data ProtectionA function to protect communication data by using encryption communication protocols. - Fax Flow SecurityA function to restrict the unpermitted communication between public telephone line and internal network. - Self testA function to verify the integrity of TSF executable code and TOE setting data.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Dell Color MFP S3845cdn
- product_type: Multi-Function Device
- report_link: https://www.ipa.go.jp/en/security/c0593_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0593_est.pdf
- toe_version: Controller ROM Ver. 1.0.31
- vendor: Dell Inc.
- expiration_date: 01.04.2023
- supplier: Dell Inc.
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0593_it6625.html
- toe_overseas_name: Dell Color MFP S3845cdnController ROM Ver. 1.0.31
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
c0593_eimg.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20180409142712+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20180409142752+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 413818
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
c0593_erpt.pdf |
vmware-esxi-v40-cert-eng.pdf |
pdf_data/report_frontpage |
|
- CA:
- cert_id: 383-4-147-CR
- cert_lab: CANADA
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0593-01: 1
- Certification No. C0593: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 4
- EAL 4 augmented: 2
- EAL 4+: 3
- EAL4+: 1
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 1
- A.SECMODE: 1
- A.USER: 1
- T:
- T.COMM_TAP: 2
- T.CONFDATA: 2
- T.CONSUME: 2
- T.DATA_SEC: 2
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- X509:
|
- FIPS:
- FIPS 180-3: 1
- FIPS 186-2: 1
- FIPS 197: 1
- FIPS 46-3: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- of the hardware and the cooperating software other than the TOE shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. 4.3 Clarification of Scope As described: 1
- out of scope: 1
|
|
pdf_data/report_metadata |
- /CreationDate: D:20180619105647+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20180619105727+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 383511
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 35
|
- /AM_ACPP_Date: [dd month yyyy]
- /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
- /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
- /AM_ACPP_Version: [AM_AMCPP_Version]
- /AM_IAR_Date: [dd month yyyy]
- /AM_IAR_Doc#: [AM_IAR_Doc#]
- /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
- /AM_IAR_Version: [AM_IAR_Version]
- /AM_ST Date: [dd month yyyy]
- /AM_ST Title: [AM_ST Title]
- /AM_ST Version: [AM_ST Version]
- /AM_TOE: [AM_TOE]
- /AM_TOE Short: [AM_TOE Short]
- /AM_TOE Version: [AM_TOE Version]
- /Author: sjackson
- /CC Version: 3.1 Revision 3
- /CC date: July 2009
- /CEM Version: 3.1 Revision 3
- /CEM date: July 2009
- /CR_Date: 2 September 2010
- /CR_Version: 0.3
- /Client City: Palo Alto
- /Client Country: USA
- /Client Full Name: VMware, Inc.
- /Client Postal Code: 94304
- /Client Short Name: VMware
- /Client State: CA
- /Client Street: 3401 Hillview Ave.
- /CreationDate: D:20101123115917-05'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /Developer Long Name: VMware, Inc.
- /Developer Short Name: VMware
- /EAL Level: 4+
- /EAL Level Base: 4
- /EAL Level Text: 4 augmented
- /EAL Long: EAL 4 Augmented
- /EAL Short: EAL 4+
- /ER Document Date: 9 September 2009
- /ER Version: Version 1.0
- /ETPlan_Doc#: 1651-000-D003
- /ETPlan_Title: Evaluation Test Plan
- /ETPlan_Version: 0.1
- /ETPlan_date: 3 August 2010
- /ETProcRes_Date: September 2010
- /ETProcRes_Doc#: 1651-000-D005
- /ETProcRes_Title: Evaluation Test Results
- /ETProcRes_Version: 0.1
- /ETProc_Date: 13 August 2010
- /ETProc_Doc#: 1651-000-D004
- /ETProc_Title: Evaluation Test Procedures
- /ETProc_Version: 0.2
- /ETReport_Date: 1 September 2010
- /ETReport_Doc#: 1651-000-D002
- /ETReport_Title: Evaluation Technical Report
- /ETReport_TitleShort: ETR
- /ETReport_Version: 1.4
- /EWP_Date: 5 July 2010
- /EWP_Doc#: 1651-000-D001
- /EWP_Title: Evaluation Work Plan for EAL 4+ Common Criteria Evaluation of VMware Incorporated ESX 4.0 and vCenter 4.0, Document No. 1651-000-D001, Version 1.3, 5 July 2010, Common Criteria Evaluation Number: 383-4-145
- /EWP_Version: 1.3
- /Eval number: 383-4-145
- /Eval_End_Date: 22 October 2010
- /Eval_Start_Date: 1 December 2009
- /LeadEvaluator: K. Braun
- /LeadEvaluatorInitials: KB
- /ModDate: D:20101123120044-05'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /ProjectManager: M. Gauvreau
- /ProjectManagerInitials: MG
- /ProjectNumber: 1651
- /ST_Date: 31 August 2010
- /ST_Title: VMware, Inc. VMware® ESXi 4.0 Update 1 and vCenter Server 4.0 Update 1 Security Target
- /ST_Version: 1.2
- /SVC_Date: 5 August 2009
- /SVC_Doc#: 1610-000-D006
- /SVC_Title: Site Visit Checklist
- /SVC_Version: 1.0
- /SVR_Date: 5 August 2009
- /SVR_Doc#: 1610-000-D006
- /SVR_Title: Site Visit Report
- /SVR_Version: 1.0
- /SV_City: Palo Alto
- /Security Classification: EWA-Canada & VMware Proprietary
- /SourceModified: D:20101123164210
- /Sponsor: VMware, Inc.
- /Sponsor City: Palo Alto
- /Sponsor Country: USA
- /Sponsor Postal Code: 94304
- /Sponsor State: CA
- /Sponsor Street: 3401 Hillview Ave.
- /TOE: VMware® ESX 4.0 Update 1 and vCenter Server 4.0 Update 1
- /TOE Short-NoTM: ESXi and vCenter Server 4.0 Update 1
- /TOE Version: 4.0 Update 1
- /TOE with version: VMware® ESXi 4.0 Update 1 and vCenter Server 4.0 Update 1
- /TOE-NoTM: VMware® ESX 4.0 Update 1 and vCenter Server 4.0 Update 1
- /Title: EAL X+ Evaluation of [Developer Long Name]
- /_AdHocReviewCycleID: 1598644691
- /_AuthorEmail: [email protected]
- /_AuthorEmailDisplayName: Reade, Rick A.
- /_EmailSubject: CPL post request ... rr
- pdf_file_size_bytes: 95769
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
c0593_est.pdf |
vmware-esxi-v40-sec-eng.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 4
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 2
- FAU_SAR.2: 8
- FAU_SAR.2.1: 1
- FAU_STG: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 2
- FCS_COP.1: 10
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 11
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 10
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FIA:
- FIA_AFL.1: 16
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 14
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 9
- FIA_UAU.7.1: 1
- FIA_UIA.1: 1
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA: 2
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 6
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
- FAU:
- FAU_ARP.1: 2
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.4: 2
- FCS_COP.1: 6
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 21
- FDP_ACC.1.1: 2
- FDP_ACF.1: 16
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 5
- FDP_IFC.2: 7
- FDP_IFC.2.1: 1
- FDP_IFC.2.2: 1
- FDP_IFF.1: 7
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FIA:
- FIA_UAU.1: 3
- FIA_UAU.2: 11
- FIA_UAU.2.1: 1
- FIA_UID.1: 8
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 26
- FMT_MSA.1.1: 3
- FMT_MSA.3: 26
- FMT_MSA.3.1: 3
- FMT_MSA.3.2: 3
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 27
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITC.1: 6
- FPT_ITC.1.1: 1
- FPT_ITT.1: 6
- FPT_ITT.1.1: 1
- FPT_STM.1: 3
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.ADMIN: 4
- A.SECMODE: 4
- A.USER: 3
- O:
- O.AUDITS: 7
- O.CIPHER: 5
- O.COMM_SEC: 6
- O.FAX_SEC: 6
- O.MANAGE: 8
- O.RESTRICT: 5
- O.USER: 8
- O.VERIFY: 2
- OE:
- OE.ADMIN: 3
- OE.PHYSICAL: 3
- OE.SEC: 7
- OE.USER: 3
- T:
- T.COMM_TAP: 3
- T.CONFDATA: 4
- T.CONSUME: 3
- T.DATA_SEC: 4
|
- A:
- O:
- O.ACCESS: 7
- O.ADMIN: 6
- O.AUDIT: 6
- O.CONTINUITY: 4
- O.IDAUTH: 9
- O.SECURE: 5
- O.VLAN: 4
- O.VM: 4
- O.VSWITCH: 4
- OE:
- OE.IDAUTH: 7
- OE.SEP: 7
- OE.TIME: 5
- T:
- T.AVAILABILITY: 2
- T.COMINT: 2
- T.PRIVIL: 2
- T.VIRTUAL_NETWORK: 2
- T.VM: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 3
- SHA256: 5
- SHA384: 2
- SHA512: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- malfunction: 10
- physical tampering: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS PUB 180-2: 2
- FIPS PUB 197: 1
- RFC:
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20180612075934+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20180612080157+09'00'
- /Producer: Acrobat Distiller 10.1.16 (Windows)
- /Subject: Security Target
- /Title: Dell Color MFP S3845cdn
- pdf_file_size_bytes: 422531
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 87
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |