name |
AR-FR12M Version M.20 |
Junos OS 18.1R3-S2.1 for EX4300 Series Ethernet switches |
category |
Other Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
JP |
AU |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
20.06.2024 |
not_valid_before |
11.03.2005 |
21.06.2019 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cert_2019_120_org_signed.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0022_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ACSC%20Certifcation%20Report%20EFS-T056_v1.0.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0022_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper-EX4300-SecurityTarget-v1.0.pdf |
manufacturer |
Sharp Corporation |
Juniper Networks, Inc. |
manufacturer_web |
https://sharp-world.com/ |
https://www.juniper.net/ |
security_level |
EAL3+, ADV_SPM.1 |
{} |
dgst |
8a35a1a0f9dabc51 |
349f9f40eb029f73 |
heuristics/cert_id |
JISEC-CC-CRP-C0022-01 |
Certificate Number: 2019/120 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_ADM.1, ATE_FUN.1, ADV_HLD.2, ALC_DVS.1, ATE_COV.2, AVA_VLA.1, AVA_SOF.1, ATE_DPT.1, ADV_SPM.1, AVA_MCU.1, AVA_MSU.1, ADV_RCR.1, ADV_FSP.1, AGD_USR.1, ATE_IND.2 |
ATE_IND.1, AVA_VAN.1, ASE_ECD.1, ASE_OBJ.1, AGD_PRE.1, ASE_INT.1, AGD_OPE.1, ALC_CMS.1, ADV_FSP.1, ASE_SPD.1, ALC_CMC.1, ASE_REQ.1, ASE_CCL.1, ASE_TSS.1 |
heuristics/extracted_versions |
20 |
2.1, 18.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0022
- certification_date: 01.03.2005
- claim: EAL3+ ADV_SPM.1
- enhanced:
- assurance_level: EAL3 + ADV_SPM.1
- cert_link: https://www.ipa.go.jp/en/security/c0022_eimg.pdf
- description: PRODUCT DESCRIPTION TOE is a firmware that aims to prevent disclosure of real image data stored temporarily in Mass Storage Device (hereafter referred to as MSD), which are specified for every functional unit configuration of Multi Function Device (hereafter referred to as MFD). TOE is provided as a kit of upgrading firmware of MFD. TOE executes encryption before the real image data are spooled in MSD, when the MFD functions like PCFAX, FAX transmission or FAX receiving are performed. It also clears spool data area in MSD after the jobs like copying, printing, SCAN transmission, PCFAX, FAX transmission or FAX receiving are completed. These encryption function and data erasing function ensure the confidentiality of real image data that are stored temporarily in MSD and counter fraudulent readout of them.
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology security center (JEITA ITSC)
- product: AR-FR12M
- product_type: product (Data protection function inside digital MFD)
- report_link: https://www.ipa.go.jp/en/security/c0022_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0022_est.pdf
- toe_version: VERSION M.20
- vendor: Sharp Corporation
- expiration_date: 01.10.2013
- supplier: Sharp Corporation
- toe_japan_name: AR-FR12M VERSION M.20
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0022_it4028.html
- toe_overseas_name: AR-FR12M VERSION M.20
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
48ac4778e4272298 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.0E.pdf |
pdf_data/cert_filename |
|
Cert_2019_120_org_signed.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20190627145707+10'00'
- /Creator: ACA75945.dpe.protected.mil.au
- /ModDate: D:20190627170623+10'00'
- /Producer: KONICA MINOLTA bizhub C308
- /Title: SACA75945.d19062714570
- pdf_file_size_bytes: 827767
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0022_erpt.pdf |
ACSC Certifcation Report EFS-T056_v1.0.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0022-01: 1
- Certification No. C0022: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL3: 2
- EAL3 augmented: 1
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 3
|
- BAE:
- BAE Applied Intelligence: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- ISO:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20050518144032+09'00'
- /Creator: Word 用 Acrobat PDFMaker 6.0
- /Manager: IPA
- /ModDate: D:20050518144205+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /SourceModified: D:20050518054022
- /Title: CRP-C0022-01_e
- pdf_file_size_bytes: 213209
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
|
pdf_data/st_filename |
c0022_est.pdf |
Juniper-EX4300-SecurityTarget-v1.0.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 4
- ACM_SCP.1: 4
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 4
- ADV:
- ADV_FSP.1: 12
- ADV_HLD.1: 3
- ADV_HLD.2: 1
- ADV_RCR.1: 4
- ADV_SPM.1: 12
- AGD:
- AGD_ADM.1: 7
- AGD_USR.1: 6
- ALC:
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 4
- ATE_IND.2: 3
- AVA:
- AVA_MCU.1: 1
- AVA_MSU.1: 2
- AVA_SOF.1: 3
- AVA_VLA.1: 3
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 15
- FCS_CKM.1.1: 1
- FCS_CKM.4: 6
- FCS_COP.1: 15
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 5
- FDP_IFC.1: 1
- FDP_RIP.1: 13
- FDP_RIP.1.1: 1
- FIA:
- FIA_SOS.1: 16
- FIA_SOS.1.1: 1
- FIA_UAU.1: 3
- FIA_UAU.2: 20
- FIA_UAU.2.1: 1
- FIA_UAU.7: 15
- FIA_UAU.7.1: 1
- FIA_UID.1: 5
- FIA_UID.2: 15
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 16
- FMT_MOF.1.1: 1
- FMT_MSA.1: 5
- FMT_MSA.2: 17
- FMT_MSA.2.1: 1
- FMT_MTD.1: 13
- FMT_MTD.1.1: 1
- FMT_RVM.1: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 16
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 17
- FPT_RVM.1.1: 1
|
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG_EXT: 2
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 18
- FCS_CKM.1.1: 1
- FCS_CKM.2: 8
- FCS_CKM.2.1: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP: 29
- FCS_COP.1: 6
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 7
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 1
- FCS_SSHC_EXT.1: 1
- FCS_SSHC_EXT.1.8: 1
- FCS_SSHS_EXT.1: 7
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.2: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 3
- FCS_SSHS_EXT.1.5: 1
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 2
- FCS_TLSC_EXT: 1
- FCS_TLSC_EXT.1: 1
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.2: 1
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSS_EXT.2.4: 2
- FCS_TLSS_EXT.2.5: 2
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 5
- FIA_PMG_EXT.1.1: 1
- FIA_UAU: 2
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 2
- FIA_UAU_EXT.2: 5
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT: 2
- FIA_UIA_EXT.1: 11
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FIA_UID.1: 3
- FMT:
- FMT_MOF: 20
- FMT_MOF.1: 3
- FMT_MTD: 15
- FMT_MTD.1: 2
- FMT_SMF: 2
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 5
- FMT_SMR.2: 12
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 2
- FPT_APW_EXT.1: 5
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_ITT.1: 2
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 5
- FPT_SKP_EXT.1.1: 1
- FPT_STM: 3
- FPT_STM.1: 4
- FPT_STM_EXT: 2
- FPT_STM_EXT.1: 2
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 1
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 9
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.2: 6
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FTA:
- FTA_SSL: 2
- FTA_SSL.3: 7
- FTA_SSL.4: 6
- FTA_SSL_EXT: 2
- FTA_SSL_EXT.1: 6
- FTA_SSL_EXT.1.1: 1
- FTA_TAB: 2
- FTA_TAB.1: 9
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 24
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_ITC.2: 6
- FTP_TRP: 8
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- O:
- O.REMOVE: 6
- O.RESIDUAL: 8
- OE:
- OE.ERASEALL: 3
- OE.OPERATE: 3
- T:
|
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINSTRATOR: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 2
- HMAC-SHA-512: 1
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 3
- SHA-384: 3
- SHA-512: 2
|
pdf_data/st_keywords/crypto_scheme |
|
- KEX:
- Key Exchange: 2
- Key exchange: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 10
- P-384: 6
- P-521: 6
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- FIPS:
- ISO:
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 180-4: 3
- FIPS 186-4: 2
- FIPS 197: 2
- FIPS 198-1: 3
- FIPS PUB 186-4: 6
- ISO:
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 2
- ISO/IEC 9796-2: 1
- PKCS:
- RFC:
- RFC 3526: 2
- RFC 4251: 2
- RFC 4252: 1
- RFC 4253: 3
- RFC 4254: 1
- RFC 5280: 4
- RFC 5656: 1
- RFC 6187: 1
- RFC 6668: 1
- RFC3526: 1
- RFC5656: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: SHARP Corporation
- /Company: SHARP Corporation
- /CreationDate: D:20050518145955+09'00'
- /Creator: Word 用 Acrobat PDFMaker 6.0
- /ModDate: D:20050518150808+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Subject: C0022
- /Title: ST
- pdf_file_size_bytes: 664695
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
- /CreationDate: D:20190703124949+10'00'
- /ModDate: D:20190703125323+10'00'
- pdf_file_size_bytes: 1747825
- pdf_hyperlinks: http://www.juniper.net/, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=295, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=328, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=327, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=287, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=297, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=265, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=329, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=296, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=234, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=268, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=262, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=330, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=266, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=263
- pdf_is_encrypted: False
- pdf_number_of_pages: 46
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |