name |
Alcatel-Lucent Enterprise OmniSwitch series 6360, 6465, 6560, 6860, 6865, 6900, 9900 with AOS 8.9.R11 |
Apple iOS 9 |
category |
Network and Network-Related Devices and Systems |
Mobility |
scheme |
US |
US |
status |
active |
archived |
not_valid_after |
21.10.2025 |
28.01.2018 |
not_valid_before |
21.10.2023 |
28.01.2016 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11404-ci.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10695-ci.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11404-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10695-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11404-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10695-st.pdf |
manufacturer |
ALE USA Inc |
Apple Inc. |
manufacturer_web |
https://www.al-enterprise.com/ |
https://www.apple.com/ |
security_level |
{} |
{} |
dgst |
826867d07cbf5910 |
e4c4338f88a1f35b |
heuristics/cert_id |
CCEVS-VR-VID-11404-2023 |
CCEVS-VR-VID-10695-2016 |
heuristics/cert_lab |
US |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
ALC_CMS.2, ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 |
heuristics/extracted_versions |
8.9 |
9 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: Mobility
- certification_date: 28.01.2016
- evaluation_facility: atsec information security corporation
- expiration_date: 28.01.2018
- id: CCEVS-VR-VID10695
- product: Apple iOS 9
- scheme: US
- url: https://www.niap-ccevs.org/product/10695
- vendor: Apple Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
89f2a255423f4a20 |
b43e1d04965c0a49 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v2.0.pdf |
pdf_data/cert_filename |
st_vid11404-ci.pdf |
st_vid10695-ci.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11404-2023: 1
|
- US:
- CCEVS-VR-VID10695-2016: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20231101122548-04'00'
- /ModDate: D:20231101122548-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 180676
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20160129142937-05'00'
- /ModDate: D:20160129143043-05'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 176664
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
st_vid11404-vr.pdf |
st_vid10695-vr.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID11404-2023
- cert_item: Alcatel-Lucent Enterprise OmniSwitch series 6360, 6465, 6560, 6860, 6865, 6900, 9900 with AOS 8.9 R11
- cert_lab: US NIAP
|
- US:
- cert_id: CCEVS-VR-VID10695-2016
- cert_item: Apple, Inc. Apple iOS 9.2
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11404-2023: 1
|
- US:
- CCEVS-VR-VID10695-2016: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author: Stephan Mueller
- /Company: atsec
- /CreationDate: D:20160129143703-05'00'
- /Creator: Acrobat PDFMaker 11 for Word
- /ModDate: D:20160129143707-05'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20160129193645
- /Title: Validation Report for Apple
- /_NewReviewCycle:
- pdf_file_size_bytes: 159337
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
pdf_data/st_filename |
st_vid11404-st.pdf |
st_vid10695-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 10
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 4
- ALC_CMS: 1
- ALC_CMS.1: 5
- ATE:
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 6
- AVA_VLA: 1
|
- ADV:
- AGD:
- AGD_OPE.1: 12
- AGD_PRE.1: 8
- ALC:
- ALC_CMC.1: 6
- ALC_CMS.1: 3
- ALC_CMS.2: 4
- ALC_TSU_EXT: 1
- ALC_TSU_EXT.1: 8
- ASE:
- ASE_CCL.1: 15
- ASE_ECD.1: 11
- ASE_INT.1: 13
- ASE_OBJ.1: 6
- ASE_REQ.1: 12
- ASE_SPD.1: 9
- ASE_TSS.1: 7
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 3
- FCS_CKM.2: 3
- FCS_COP: 7
- FCS_NTP_EXT.1.4: 1
- FCS_RBG_EXT.1: 1
- FCS_SSHS_EXT.1: 3
- FCS_TLSC_EXT.1: 2
- FCS_TLSC_EXT.2.3: 1
- FDP:
- FIA:
- FPT:
- FTA:
- FTP:
|
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 5
- FCS_CKM.1.1: 2
- FCS_CKM.2: 5
- FCS_CKM.2.1: 1
- FCS_CKM_EXT.1: 2
- FCS_CKM_EXT.1.1: 1
- FCS_CKM_EXT.1.2: 1
- FCS_CKM_EXT.1.3: 1
- FCS_CKM_EXT.1.4: 2
- FCS_CKM_EXT.2: 1
- FCS_CKM_EXT.2.1: 1
- FCS_CKM_EXT.3: 3
- FCS_CKM_EXT.3.1: 1
- FCS_CKM_EXT.3.2: 1
- FCS_CKM_EXT.4: 2
- FCS_CKM_EXT.4.1: 2
- FCS_CKM_EXT.4.2: 1
- FCS_CKM_EXT.5: 2
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.6: 2
- FCS_CKM_EXT.6.1: 1
- FCS_COP: 2
- FCS_COP.1: 14
- FCS_COP.1.1: 5
- FCS_RBG: 2
- FCS_RBG_EXT.1: 13
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_RBG_EXT.1.3: 1
- FCS_SRV: 2
- FCS_SRV_EXT.1: 3
- FCS_SRV_EXT.1.1: 1
- FCS_STG: 2
- FCS_STG_EXT: 1
- FCS_STG_EXT.1: 2
- FCS_STG_EXT.1.1: 1
- FCS_STG_EXT.1.2: 1
- FCS_STG_EXT.1.3: 1
- FCS_STG_EXT.1.4: 1
- FCS_STG_EXT.1.5: 1
- FCS_STG_EXT.2: 3
- FCS_STG_EXT.2.1: 2
- FCS_STG_EXT.2.2: 1
- FCS_STG_EXT.3: 2
- FCS_STG_EXT.3.1: 1
- FCS_STG_EXT.3.2: 1
- FCS_TLSC: 2
- FCS_TLSC_EXT.1: 2
- FCS_TLSC_EXT.1.1: 2
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.1.4: 1
- FCS_TLSC_EXT.2: 3
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.2.2: 1
- FCS_TLSC_EXT.2.3: 1
- FCS_TLSC_EXT.2.4: 1
- FCS_TLSC_EXT.2.5: 1
- FDP:
- FDP_ACF: 2
- FDP_ACF_EXT.1: 2
- FDP_ACF_EXT.1.1: 1
- FDP_ACF_EXT.1.2: 1
- FDP_DAR: 2
- FDP_DAR_EXT.1: 2
- FDP_DAR_EXT.1.1: 1
- FDP_DAR_EXT.1.2: 1
- FDP_DAR_EXT.2: 2
- FDP_DAR_EXT.2.1: 1
- FDP_DAR_EXT.2.2: 2
- FDP_DAR_EXT.2.3: 1
- FDP_IFC: 2
- FDP_IFC_EXT.1: 3
- FDP_IFC_EXT.1.1: 1
- FDP_STG: 2
- FDP_STG_EXT.1: 2
- FDP_STG_EXT.1.1: 1
- FDP_UPC: 2
- FDP_UPC_EXT.1: 2
- FDP_UPC_EXT.1.1: 1
- FDP_UPC_EXT.1.2: 1
- FIA:
- FIA_AFL: 2
- FIA_AFL_EXT.1: 2
- FIA_AFL_EXT.1.1: 1
- FIA_AFL_EXT.1.2: 1
- FIA_AFL_EXT.1.3: 1
- FIA_BLT: 2
- FIA_BLT_EXT.1: 2
- FIA_BLT_EXT.1.1: 1
- FIA_PAE: 2
- FIA_PAE_EXT.1: 3
- FIA_PMG: 2
- FIA_PMG_EXT.1: 2
- FIA_PMG_EXT.1.1: 1
- FIA_TRT: 2
- FIA_TRT_EXT.1: 2
- FIA_TRT_EXT.1.1: 1
- FIA_UAU: 2
- FIA_UAU.7: 3
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.1: 1
- FIA_UAU_EXT.1.1: 1
- FIA_UAU_EXT.2: 2
- FIA_UAU_EXT.2.1: 1
- FIA_UAU_EXT.2.2: 1
- FIA_UAU_EXT.3: 2
- FIA_UAU_EXT.3.1: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF_EXT.1: 2
- FMT_MOF_EXT.1.1: 1
- FMT_MOF_EXT.1.2: 1
- FMT_SMF: 2
- FMT_SMF_EXT.1: 7
- FMT_SMF_EXT.1.1: 3
- FMT_SMF_EXT.2: 2
- FMT_SMF_EXT.2.1: 1
- FPT:
- FPT_AEX: 2
- FPT_AEX_EXT.1: 2
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.2: 2
- FPT_AEX_EXT.2.1: 1
- FPT_AEX_EXT.2.2: 1
- FPT_AEX_EXT.3: 2
- FPT_AEX_EXT.3.1: 1
- FPT_AEX_EXT.4: 2
- FPT_AEX_EXT.4.1: 1
- FPT_AEX_EXT.4.2: 1
- FPT_BBD: 2
- FPT_BBD_EXT.1: 2
- FPT_BBD_EXT.1.1: 1
- FPT_KSK_EXT.1: 1
- FPT_KSK_EXT.2: 1
- FPT_KSK_EXT.3: 1
- FPT_KST: 2
- FPT_KST_EXT.1: 1
- FPT_KST_EXT.1.1: 1
- FPT_KST_EXT.2: 1
- FPT_KST_EXT.2.1: 1
- FPT_KST_EXT.3: 1
- FPT_KST_EXT.3.1: 1
- FPT_NOT: 2
- FPT_NOT_EXT.1: 2
- FPT_NOT_EXT.1.1: 1
- FPT_STM: 2
- FPT_STM.1: 2
- FPT_STM.1.1: 2
- FPT_TST: 2
- FPT_TST_EXT.1: 2
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.2: 2
- FPT_TST_EXT.2.1: 1
- FPT_TST_EXT.2.2: 2
- FPT_TUD: 2
- FPT_TUD_EXT.1: 2
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.2: 2
- FPT_TUD_EXT.2.2: 1
- FPT_TUD_EXT.2.3: 1
- FPT_TUD_EXT.2.4: 1
- FPT_TUD_EXT.2.5: 1
- FPT_TUD_EXT.2.6: 1
- FTA:
- FTA_SSL: 2
- FTA_SSL_EXT.1: 3
- FTA_SSL_EXT.1.1: 1
- FTA_SSL_EXT.1.2: 1
- FTA_SSL_EXT.1.3: 1
- FTA_TAB: 2
- FTA_TAB.1: 2
- FTA_TAB.1.1: 1
- FTA_WSE: 2
- FTA_WSE_EXT.1: 2
- FTA_WSE_EXT.1.1: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC_EXT.1: 2
- FTP_ITC_EXT.1.1: 1
- FTP_ITC_EXT.1.2: 1
- FTP_ITC_EXT.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.COMPONENTS_RUNNING: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- OE.VM_CONFIGURATION: 1
|
- A:
- A.CONFIG: 1
- A.NOTIFY: 1
- A.PRECAUTION: 1
- O:
- O.AUTH: 1
- O.COMMS: 1
- O.CONFIG: 1
- O.INTEGRITY: 1
- O.STORAGE: 1
- OE:
- OE.CONFIG: 1
- OE.NOTIFY: 1
- OE.PRECAUTION: 1
- T:
- T.EAVESDROP: 1
- T.FLAWAPP: 2
- T.NETWORK: 1
- T.PERSISTENT: 2
- T.PHYSICAL: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 4
- HMAC-SHA-384: 2
- HMAC-SHA-512: 1
|
- AES_competition:
- AES:
- AES: 35
- AES-128: 2
- AES-256: 1
- AES256: 1
- DES:
- constructions:
- MAC:
- CBC-MAC: 1
- HMAC: 2
- HMAC-SHA-256: 2
- HMAC-SHA-384: 1
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 14
- SHA-384: 5
- SHA-512: 8
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 3
- SHA-256: 3
- SHA-384: 1
- SHA-512: 2
|
pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 1
- Key agreement: 1
- MAC:
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- DTLS:
- SSL:
- TLS:
- TLS: 53
- TLS 1.2: 1
- TLSv1.2: 8
|
- IKE:
- IPsec:
- TLS:
- TLS:
- TLS: 33
- TLS 1.0: 2
- TLS 1.1: 1
- TLS 1.2: 3
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 14
- P-384: 12
- P-521: 12
- secp256r1: 2
- secp384r1: 2
- secp521r1: 2
|
- Curve:
- NIST:
- P-256: 16
- P-384: 16
- secp256r1: 1
- secp384r1: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_GCM_SHA384: 2
|
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 4
- TLS_RSA_WITH_AES_256_CBC_SHA256: 2
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-3: 1
- FIPS PUB 186-4: 5
- ISO:
- ISO/IEC 14888-3: 2
- ISO/IEC 18031:2011: 2
- ISO/IEC 9796-2: 3
- NIST:
- NIST SP 800-38A: 3
- NIST SP 800-56A: 3
- SP 800-90A: 1
- PKCS:
- RFC:
- RFC 2986: 1
- RFC 3268: 2
- RFC 3447: 1
- RFC 3526: 2
- RFC 4253: 1
- RFC 4492: 4
- RFC 5077: 1
- RFC 5246: 3
- RFC 5280: 2
- RFC 5288: 2
- RFC 5289: 8
- RFC 6125: 1
- RFC 6960: 1
- RFC3526: 1
- RFC4251: 1
- RFC4252: 1
- RFC4253: 2
- RFC4254: 1
- RFC4344: 1
- RFC4492: 1
- RFC5280: 1
- RFC5656: 1
- RFC6125: 2
- RFC6668: 1
- RFC6960: 1
- RFC8332: 1
- X509:
|
- FIPS:
- FIPS 140-2: 3
- FIPS 180-4: 1
- FIPS 186-4: 2
- FIPS 197: 1
- FIPS 198: 1
- FIPS PUB 186-4: 4
- FIPS PUB 197: 2
- NIST:
- NIST SP 800-132: 1
- NIST SP 800-38A: 1
- NIST SP 800-38C: 2
- NIST SP 800-38D: 1
- NIST SP 800-38F: 2
- NIST SP 800-56A: 2
- NIST SP 800-57: 1
- SP 800-132: 1
- SP 800-38: 2
- SP 800-90A: 1
- PKCS:
- RFC:
- RFC 2560: 1
- RFC 2743: 1
- RFC 2818: 1
- RFC 4401: 1
- RFC 4492: 8
- RFC 5246: 13
- RFC 5280: 3
- RFC 5289: 6
- RFC 6125: 1
- RFC3394: 1
- RFC5289: 2
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- expected to return to its user. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.FLAWAPP Malicious or Flawed Application Applications loaded onto the: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: Tolliver Eric
- /CreationDate: D:20231101120921-04'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20231101120921-04'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Subject: Common Criteria Security Target
- /Title: <<LongProductName>> Security Target
- pdf_file_size_bytes: 868632
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 44
|
- /Author: atsec information security
- /Company: atsec
- /CreationDate: D:20160128180005-06'00'
- /Creator: Acrobat PDFMaker 11 for Word
- /Keywords: MDFPP 2.0, CC
- /ModDate: D:20160128180023-06'00'
- /Name: Apple iOS 9.2 Security Target
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20160128235947
- /Title: Apple iOS 9.2 MDFPPv2 Security Target
- /Version: 1.4
- pdf_file_size_bytes: 679118
- pdf_hyperlinks: http://csrc.nist.gov/groups/STM/cmvp/inprocess.html, http://csrc.nist.gov/groups/STM/cmvp/validation.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 75
|
state/cert/convert_garbage |
True |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |