| name |
Netscape Certificate Management System 6.1 Service Pack 1 |
Huawei GaussDB 100 Version V300R001C00B300 Release 3da6647 |
| category |
Key Management Systems |
Databases |
| scheme |
US |
ES |
| status |
archived |
active |
| not_valid_after |
07.09.2012 |
03.01.2026 |
| not_valid_before |
01.03.2003 |
03.01.2021 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-20_Certificate.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4009-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-20-INF-3379.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4009-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-20_ST.pdf |
| manufacturer |
America Online, Inc. |
Huawei Technologies Co. Ltd. |
| manufacturer_web |
https://www.aol.com |
https://www.huawei.com |
| security_level |
EAL4+, ALC_FLR.2 |
EAL2+, ALC_FLR.2 |
| dgst |
9393d994ea0a243e |
0de1944539deaf11 |
| heuristics/cert_id |
CCEVS-VR-0036-2003 |
2019-20-INF-3379 |
| heuristics/cert_lab |
US |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ALC_TAT.1, ADV_RCR.1, ADV_SPM.1, ATE_IND.2, ALC_LCD.1, ATE_FUN.1, AVA_SOF.1, ALC_DVS.1, AVA_VLA.2, AVA_MSU.2, ADV_IMP.1, ADV_FSP.2, ATE_COV.2, ALC_FLR.2, ATE_DPT.1, AGD_USR.1, ADV_LLD.1, ADV_HLD.2, AGD_ADM.1 |
ATE_IND.2, ASE_ECD.1, ATE_FUN.1, ASE_OBJ.2, AGD_PRE.1, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, ASE_TSS.1, ASE_SPD.1, ASE_INT.1, ADV_FSP.2, ASE_CCL.1, ALC_FLR.2, ALC_DEL.1, ASE_REQ.2, ALC_CMC.2, ADV_TDS.1, AGD_OPE.1, ALC_CMS.2 |
| heuristics/extracted_versions |
6.1 |
100 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
|
- category: Database management systems
- certification_date: 03.01.2021
- enhanced:
- manufacturer: Huawei Technologies Co., Ltd.
- product: Huawei GaussDB 100 Version V300R001C00B300 Release 3da6647
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/450-huawei-gaussdb-100-version-v300r001c00b300-release-3da6647
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
c0b2fe8891b23088 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0088V2b_pdf.pdf |
| pdf_data/cert_filename |
|
2019-20_Certificate.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL2: 1
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
- Huawei:
- Huawei: 3
- Huawei Technologies Co: 2
|
| pdf_data/cert_keywords/eval_facility |
|
- DEKRA:
- DEKRA Testing and Certification: 1
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /CreationDate: D:20201214103144+01'00'
- pdf_file_size_bytes: 734385
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
| pdf_data/report_filename |
st_vid4009-vr.pdf |
2019-20-INF-3379.pdf |
| pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-03-0036
- cert_item: Netscape Certificate Management System 6.1 Service Pack 1
- cert_lab: US NIAP
|
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 5
- EAL 4 augmented: 3
|
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 8
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 2
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 2
- ALC_FLR.2: 8
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FAU_SEL.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_RIP.1: 1
- FIA:
- FIA_ATD.1: 1
- FIA_UAU.1: 1
- FIA_UID.1: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_MTD.1: 1
- FMT_REV.1: 2
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FTA:
- FTA_MCS.1: 1
- FTA_TSE.1: 1
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
- Huawei:
- Huawei: 24
- Huawei Technologies Co: 3
|
| pdf_data/report_keywords/eval_facility |
|
- DEKRA:
- DEKRA Testing and Certification: 5
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /Author: Mitretek Systems
- /CreationDate: D:20030320081516-05'00'
- /Creator: Acrobat PDFMaker 5.0 for Word
- /ModDate: D:20030320081613-05'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: Validation Report for Netscape CMS6.1
- pdf_file_size_bytes: 281394
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
|
| pdf_data/st_filename |
st_vid4009-st.pdf |
2019-20_ST.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 1: 4
- EAL 3: 19
- EAL 3 augmented: 3
- EAL 4: 41
- EAL 4 augmented: 7
|
|
| pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 17
- ACM_CAP.3: 5
- ACM_CAP.4: 30
- ACM_SCP.1: 2
- ACM_SCP.2: 14
- ADO:
- ADO_DEL.2: 12
- ADO_IGS.1: 11
- ADV:
- ADV_FSP: 1
- ADV_FSP.1: 14
- ADV_FSP.2: 27
- ADV_HLD: 1
- ADV_HLD.1: 2
- ADV_HLD.2: 23
- ADV_IMP: 1
- ADV_IMP.1: 12
- ADV_LLD: 1
- ADV_LLD.1: 22
- ADV_RCR: 1
- ADV_RCR.1: 21
- ADV_SPM: 1
- ADV_SPM.1: 14
- AGD:
- AGD_ADM.1: 29
- AGD_USR.1: 20
- ALC:
- ALC_DVS.1: 13
- ALC_FLR: 1
- ALC_FLR.2: 23
- ALC_LCD.1: 14
- ALC_TAT.1: 14
- ATE:
- ATE_COV: 1
- ATE_COV.2: 8
- ATE_DPT: 1
- ATE_DPT.1: 7
- ATE_FUN: 1
- ATE_FUN.1: 15
- ATE_IND: 1
- ATE_IND.2: 10
- AVA:
- AVA_MSU.2: 18
- AVA_SOF.1: 10
- AVA_VLA.2: 15
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 17
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_GEN.2: 10
- FAU_GEN.2.1: 2
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 6
- FAU_SAR.3.1: 1
- FAU_SEL.1: 10
- FAU_SEL.1.1: 2
- FAU_STG.1: 14
- FAU_STG.1.1: 2
- FAU_STG.1.2: 2
- FAU_STG.4: 10
- FAU_STG.4.1: 2
- FCO:
- FCO_NRO_CIMC.3: 9
- FCO_NRO_CIMC.3.1: 1
- FCO_NRO_CIMC.3.2: 1
- FCO_NRO_CIMC.3.3: 1
- FCO_NRO_CIMC.4: 9
- FCO_NRO_CIMC.4.1: 1
- FCO_NRO_CIMC.4.2: 1
- FCS:
- FCS_CKM.1: 13
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 9
- FCS_CKM.4.1: 1
- FCS_CKM_CIMC.5: 8
- FCS_CKM_CIMC.5.1: 1
- FCS_COP.1: 8
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 20
- FDP_ACC.1.1: 2
- FDP_ACF: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_ACF_CIMC.2: 10
- FDP_ACF_CIMC.2.1: 1
- FDP_ACF_CIMC.2.2: 1
- FDP_ACF_CIMC.3: 10
- FDP_ACF_CIMC.3.1: 1
- FDP_CIMC_BKP.1: 10
- FDP_CIMC_BKP.1.1: 1
- FDP_CIMC_BKP.1.2: 1
- FDP_CIMC_BKP.1.3: 1
- FDP_CIMC_BKP.1.4: 1
- FDP_CIMC_BKP.2: 11
- FDP_CIMC_BKP.2.1: 1
- FDP_CIMC_BKP.2.2: 1
- FDP_CIMC_CER.1: 8
- FDP_CIMC_CER.1.1: 1
- FDP_CIMC_CER.1.2: 1
- FDP_CIMC_CER.1.3: 1
- FDP_CIMC_CER.1.4: 1
- FDP_CIMC_CRL.1: 7
- FDP_CIMC_CRL.1.1: 1
- FDP_CIMC_CSE.1: 7
- FDP_CIMC_CSE.1.1: 1
- FDP_CIMC_OCSP.1: 7
- FDP_CIMC_OCSP.1.1: 1
- FDP_ETC_CIMC.4: 4
- FDP_ETC_CIMC.5: 11
- FDP_ETC_CIMC.5.1: 1
- FDP_IFC.1: 4
- FDP_ITC.1: 2
- FDP_ITT.1: 13
- FDP_ITT.1.1: 4
- FDP_SDI_CIMC.3: 10
- FDP_SDI_CIMC.3.1: 1
- FDP_SDI_CIMC.3.2: 1
- FDP_UCT.1: 10
- FDP_UCT.1.1: 2
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_UAU.1: 15
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID.1: 17
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FIA_USB.1: 9
- FIA_USB.1.1: 2
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 20
- FMT_MOF.1.1: 2
- FMT_MOF_CIMC.2: 2
- FMT_MOF_CIMC.3: 9
- FMT_MOF_CIMC.3.1: 1
- FMT_MOF_CIMC.3.2: 1
- FMT_MOF_CIMC.3.3: 1
- FMT_MOF_CIMC.3.4: 1
- FMT_MOF_CIMC.4: 2
- FMT_MOF_CIMC.5: 9
- FMT_MOF_CIMC.5.1: 1
- FMT_MOF_CIMC.5.2: 1
- FMT_MOF_CIMC.5.3: 1
- FMT_MOF_CIMC.6: 9
- FMT_MOF_CIMC.6.1: 1
- FMT_MOF_CIMC.6.2: 1
- FMT_MOF_CIMC.6.3: 1
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.2: 12
- FMT_MSA.2.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_MTD_CIMC.4: 9
- FMT_MTD_CIMC.4.1: 1
- FMT_MTD_CIMC.5: 10
- FMT_MTD_CIMC.5.1: 1
- FMT_MTD_CIMC.6: 6
- FMT_MTD_CIMC.7: 10
- FMT_MTD_CIMC.7.1: 1
- FMT_SMR.1: 8
- FMT_SMR.2: 14
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_AMT.1: 8
- FPT_AMT.1.1: 1
- FPT_CIMC_TSP.1: 11
- FPT_CIMC_TSP.1.1: 1
- FPT_CIMC_TSP.1.2: 1
- FPT_CIMC_TSP.1.3: 1
- FPT_CIMC_TSP.1.4: 1
- FPT_CIMC_TSP.2: 1
- FPT_ITC.1: 9
- FPT_ITC.1.1: 2
- FPT_ITT.1: 11
- FPT_ITT.1.1: 4
- FPT_RVM.1: 10
- FPT_RVM.1.1: 2
- FPT_SEP.1: 4
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 11
- FPT_STM.1.1: 2
- FPT_TST_CIMC.2: 16
- FPT_TST_CIMC.2.1: 1
- FPT_TST_CIMC.2.2: 1
- FPT_TST_CIMC.3: 10
- FPT_TST_CIMC.3.1: 1
- FPT_TST_CIMC.3.2: 1
- FTP:
- FTP_ITC.1: 3
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN.1: 11
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_GEN.2: 9
- FAU_GEN.2.1: 2
- FAU_MTD.1: 2
- FAU_SEL.1: 9
- FAU_SEL.1.1: 2
- FDP:
- FDP_ACC.1: 18
- FDP_ACC.1.1: 2
- FDP_ACF.1: 16
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 1
- FDP_RIP.1: 9
- FDP_RIP.1.1: 2
- FIA:
- FIA_ATD.1: 15
- FIA_ATD.1.1: 2
- FIA_UAU.1: 8
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 2
- FIA_UID.1.2: 1
- FIA_USB.1: 5
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 2
- FMT_MTD.1: 8
- FMT_MTD.1.1: 2
- FMT_REV.1: 11
- FMT_REV.1.1: 4
- FMT_REV.1.2: 4
- FMT_SMF.1: 14
- FMT_SMF.1.1: 2
- FMT_SMR.1: 20
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT.1: 1
- FPT_STM.1: 1
- FPT_TRC.1: 10
- FPT_TRC.1.1: 2
- FPT_TRC.1.2: 2
- FTA:
- FTA_MCS.1: 9
- FTA_MCS.1.1: 1
- FTA_TSE.1: 8
- FTA_TSE.1.1: 2
|
| pdf_data/st_keywords/cc_claims |
|
- A:
- A.AUTHUSE: 1
- A.AUTHUSER: 1
- A.CONNECT: 3
- A.MANAGE: 4
- A.NO_GENER: 1
- A.NO_GENERAL_PURPOSE: 3
- A.PEER_FUN: 1
- A.PHYSICAL: 4
- A.SUPPORT: 5
- A.TRAINED-: 1
- A.TRAINEDUSER: 1
- O:
- O.ADMIN_RO: 4
- O.ADMIN_ROLE: 7
- O.AUDIT: 2
- O.AUDIT_GE: 2
- O.AUDIT_GENERATION: 3
- O.DISCRETI: 1
- O.DISCRETIO: 2
- O.DISCRETIONARY: 2
- O.DISCRETIONARY_ACCESS: 4
- O.MANAGE: 13
- O.MEDIATE: 9
- O.RESIDUAL: 3
- O.RESIDUAL_: 1
- O.RESIDUAL_INFORMATION: 7
- O.TOE_ACCE: 9
- O.TOE_ACCESS: 10
- OE:
- OE.ADMIN: 10
- OE.INFO: 5
- OE.INFO_PRO: 4
- OE.INFO_PROTECT: 11
- OE.IT_REMOT: 4
- OE.IT_REMOTE: 6
- OE.IT_TRUST: 4
- OE.IT_TRUSTED: 1
- OE.IT_TRUSTED_SYSTEM: 5
- OE.NO_GENE: 3
- OE.NO_GENERAL: 2
- OE.NO_GENERAL_PURPOSE: 3
- OE.PHYSICAL: 8
- OSP:
- T:
- T.ACCESS_T: 2
- T.ACCESS_TSFDATA: 3
- T.ACCESS_TSFFUNC: 1
- T.IA_MASQU: 2
- T.IA_MASQUERADE: 3
- T.IA_USER: 2
- T.RESIDUAL: 1
- T.RESIDUAL_DATA: 3
- T.TSF: 1
- T.TSF_COMP: 1
- T.TSF_COMPROMISE: 1
- T.UNAUTHO: 2
- T.UNAUTHORIZED_ACCESS: 3
|
| pdf_data/st_keywords/vendor |
|
- Huawei:
- Huawei: 80
- Huawei Technologies Co: 80
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 15408-2: 1
- ISO/IEC 15408-3: 1
- RFC:
- RFC 2459: 1
- RFC 2560: 3
- RFC2459: 1
- X509:
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 0SP5 (EulerOS), x86_64 ● EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE. The Software of Python v2.7.5 is also out of scope and thus not: 1
- EulerOS), x86_64 ● EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE: 1
- IP addresses, and dates. 2.3.3 Non-TOE Hardware And Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: ● CPU (higher than 4 cores: 1
- at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE: 1
- at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE. In addition, the TOE can be executed in other supported OSs (that: 1
- in the TOE. The Software of Putty v0.73 is also out of scope and thus not included in the TOE. The Software of UnixODBC-2.3.7 is also out of scope and thus not: 1
- out of scope: 6
|
| pdf_data/st_metadata |
- /Author: Tammy Compton
- /CreationDate: D:20030318094829-05'00'
- /Creator: Acrobat PDFMaker 5.0 for Word
- /ModDate: D:20030318102438-05'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: Netscape CIMC SL 3 Security Target
- pdf_file_size_bytes: 1327800
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 105
|
|
| state/cert/convert_garbage |
False |
True |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
False |
False |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
False |
False |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
False |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |