Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
FIN.X RTOS SE V4.0
OCSI/CERT/RES/06/2014/RC
SUSE Linux Enterprise Server Version 9 with Service Pack 2, ProPack 4 for Service Pack 2 and certification-sles-sgi-eal3 package
BSI-DSZ-CC-0292-2005
name FIN.X RTOS SE V4.0 SUSE Linux Enterprise Server Version 9 with Service Pack 2, ProPack 4 for Service Pack 2 and certification-sles-sgi-eal3 package
scheme IT DE
not_valid_after 25.07.2022 01.09.2019
not_valid_before 25.07.2017 13.10.2005
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rc_finx_rtos_se_4_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0292a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/tds_finx_rtos_se_4_lite03.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0292b.pdf
manufacturer MBDA Italia S.p.A. SUSE Linux Products Gmbh
manufacturer_web https://www.mbda-systems.com/ https://www.suse.com/
security_level EAL4+, ALC_FLR.1 EAL3+, ALC_FLR.3
dgst 9cb1663e606ec87b b8bea9a6818066d3
heuristics/cert_id OCSI/CERT/RES/06/2014/RC BSI-DSZ-CC-0292-2005
heuristics/cert_lab [] BSI
heuristics/cpe_matches {} cpe:2.3:o:suse:suse_linux:4.4:*:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:2.0:*:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise:9.0:-:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:4.3:*:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:4.2:*:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:4.0:*:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:4.4.1:*:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:9.3:*:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2004-0587, CVE-2005-3147, CVE-2010-4342, CVE-2005-3146, CVE-2005-0207, CVE-2004-1092, CVE-2004-0746, CVE-2009-2903, CVE-2004-0688, CVE-2004-1176, CVE-2004-1142, CVE-2004-0867, CVE-1999-0405, CVE-2009-2408, CVE-2004-1072, CVE-2004-1174, CVE-2004-1071, CVE-2004-0064, CVE-2004-1070, CVE-2004-1154, CVE-2006-2752, CVE-2007-5000, CVE-2005-0398, CVE-2005-0085, CVE-2005-4790, CVE-2009-2625, CVE-2004-0886, CVE-2009-3231, CVE-2010-4158, CVE-2004-0936, CVE-2004-0687, CVE-2010-3848, CVE-2004-0803, CVE-2004-0991, CVE-2004-1074, CVE-2010-4258, CVE-2005-0005, CVE-2005-0156, CVE-2004-0940, CVE-2004-0903, CVE-1999-0234, CVE-2005-0639, CVE-2011-0762, CVE-2004-0802, CVE-2004-1090, CVE-2004-0866, CVE-2000-0438, CVE-2004-0957, CVE-2004-0914, CVE-2005-4772, CVE-2010-1205, CVE-2004-1491, CVE-2010-3442, CVE-2004-1175, CVE-2010-3849, CVE-2004-0461, CVE-2010-3702, CVE-2010-2941, CVE-2010-2249, CVE-2005-0750, CVE-2004-1184, CVE-2009-0115, CVE-2010-0205, CVE-2006-2703, CVE-2004-0827, CVE-2004-0933, CVE-2009-0040, CVE-2004-1895, CVE-2005-0638, CVE-2004-0817, CVE-2008-3949, CVE-2004-0554, CVE-2008-5021, CVE-2004-0902, CVE-2010-4081, CVE-2005-4788, CVE-2010-4180, CVE-2009-2910, CVE-2004-0535, CVE-2010-3850, CVE-2010-3067, CVE-2004-2097, CVE-2004-1237, CVE-2004-0888, CVE-2004-2658, CVE-2010-4072, CVE-2004-1096, CVE-2004-0947, CVE-2010-4164, CVE-2010-4073, CVE-2005-3321, CVE-2009-2698, CVE-2007-4074, CVE-2004-1139, CVE-2004-1191, CVE-2011-4862, CVE-2010-3876, CVE-2010-4083, CVE-2000-0218, CVE-2005-1043, CVE-2004-1091, CVE-2004-0956, CVE-2004-0935, CVE-2007-6427, CVE-2009-3095, CVE-2005-0373, CVE-2009-2848, CVE-2007-4393, CVE-2004-1145, CVE-2005-0206, CVE-2004-0949, CVE-2005-1767, CVE-2008-1375, CVE-2004-0883, CVE-2004-0889, CVE-2004-0807, CVE-2010-3873, CVE-2004-0460, CVE-2004-1190, CVE-2004-1235, CVE-2004-1170, CVE-2009-0949, CVE-2004-0981, CVE-2000-0361, CVE-2004-1005, CVE-2005-0337, CVE-2005-3297, CVE-2005-3298, CVE-2005-0605, CVE-2004-1093, CVE-2005-3148, CVE-2013-4002, CVE-2006-0803, CVE-2005-4789, CVE-2005-0470, CVE-2004-0934, CVE-2004-1073, CVE-2007-0460, CVE-2007-6167, CVE-2003-1295, CVE-2005-3322, CVE-2005-0384, CVE-2004-0937, CVE-2009-1955, CVE-2004-0497, CVE-1999-0746, CVE-2004-0905, CVE-2010-3437, CVE-2004-0932, CVE-2004-1009, CVE-2005-1761, CVE-2010-4160, CVE-2004-0990, CVE-2007-2654, CVE-2004-0495, CVE-2010-4157, CVE-2004-1098, CVE-2004-0626, CVE-2005-2023, CVE-2004-0929, CVE-2004-1004, CVE-2009-2416
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, AVA_MSU.1, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, AVA_SOF.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AGD_ADM.1, ALC_LCD.1, ALC_FLR.3, ATE_FUN.1, ATE_DPT.1, ALC_DVS.1, ADV_FSP.1, ASE_SRE.1, ASE_OBJ.1, AVA_VLA.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1
heuristics/extracted_versions 4.0 4, 9, 2
heuristics/report_references/directly_referenced_by OCSI/CERT/LEO/08/2021/RC {}
heuristics/report_references/directly_referencing OCSI/CERT/RES/03/2012/RC {}
heuristics/report_references/indirectly_referenced_by OCSI/CERT/LEO/08/2021/RC {}
heuristics/report_references/indirectly_referencing OCSI/CERT/RES/03/2012/RC {}
pdf_data/report_filename rc_finx_rtos_se_4_v1.0.pdf 0292a.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0292-2005
    • cert_item: SUSE Linux Enterprise Server Version 9 with Service Pack 2, ProPack 4 for Service Pack 2 and certification-sles-sgi-eal3 package
    • cert_lab: BSI
    • developer: Novell – SUSE LINUX Products GmbH sponsored by Silicon Graphics, Inc
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • IT:
    • OCSI/CERT/RES/03/2012/RC: 1
    • OCSI/CERT/RES/06/2014/RC: 35
  • DE:
    • BSI-DSZ-CC-0256-2004: 3
    • BSI-DSZ-CC-0292-2005: 25
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL2: 1
    • EAL4: 9
    • EAL4+: 1
  • EAL:
    • EAL 1: 1
    • EAL 4: 1
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 7
    • EAL3 augmented: 3
    • EAL3+: 4
    • EAL4: 4
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR: 2
    • ALC_FLR.1: 5
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.2: 1
    • ADV_HLD: 2
    • ADV_HLD.2: 1
    • ADV_IMP: 2
    • ADV_IMP.1: 1
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_LLD.1: 1
    • ADV_RCR: 2
    • ADV_RCR.1: 1
    • ADV_SPM: 2
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 1
    • AGD_USR: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.1: 1
    • ALC_FLR: 2
    • ALC_FLR.3: 6
    • ALC_LCD: 1
    • ALC_LCD.1: 1
    • ALC_TAT: 2
    • ALC_TAT.1: 1
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_DPT: 2
    • ATE_DPT.1: 1
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_IND: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.2: 1
    • AVA_SOF: 4
    • AVA_SOF.1: 1
    • AVA_VLA: 4
    • AVA_VLA.2: 1
    • AVA_VLA.3: 2
    • AVA_VLA.4: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_STG.3: 1
    • FAU_STG.4: 1
  • FCS:
    • FCS_CKM.1: 2
  • FAU:
    • FAU_GEN.1: 1
    • FAU_GEN.2: 1
    • FAU_SAR.1: 1
    • FAU_SAR.2: 1
    • FAU_SAR.3: 1
    • FAU_SEL.1: 1
    • FAU_STG.1: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.2: 1
    • FCS_COP.1: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
    • FDP_RIP.2: 1
    • FDP_UCT.1: 1
    • FDP_UIT.1: 1
  • FIA:
    • FIA_ATD.1: 1
    • FIA_SOS.1: 1
    • FIA_UAU.2: 1
    • FIA_UAU.7: 1
    • FIA_UID.2: 1
    • FIA_USB.1: 1
  • FMT:
    • FMT_MSA.1: 1
    • FMT_MSA.2: 1
    • FMT_MSA.3: 1
    • FMT_MTD.1: 1
    • FMT_REV.1: 1
    • FMT_SMF: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_AMT.1: 1
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
    • FPT_STM.1: 1
  • FTP:
    • FTP_ITC.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A: 1
  • A:
    • A.CONNECT: 2
    • A.COOP: 2
    • A.LOCATE: 2
    • A.MANAGE: 2
    • A.NET_COMP: 2
    • A.NO_EVIL_ADMIN: 2
    • A.PEER: 2
    • A.PROTECT: 2
    • A.UTRAIN: 2
    • A.UTRUST: 2
  • OE:
    • OE.ADMIN: 1
    • OE.CREDEN: 1
    • OE.HW_SEP: 1
    • OE.INFO_PROTECT: 1
    • OE.INSTALL: 1
    • OE.MAINTENANCE: 1
    • OE.PHYSICAL: 1
    • OE.RECOVER: 1
    • OE.SERIAL_LOGIN: 1
    • OE.SOFTWARE_IN: 1
  • T:
    • T.COMPROT: 1
    • T.UAACCESS: 1
    • T.UAUSER: 1
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 5
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 4
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA256: 5
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 5
  • TLS:
    • SSL:
      • SSL: 3
  • SSH:
    • SSH: 8
  • TLS:
    • SSL:
      • SSL: 9
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 33
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 15408: 2
  • BSI:
    • AIS 32: 1
    • AIS 33: 1
    • AIS32: 1
    • AIS33: 1
  • ISO:
    • ISO/IEC 15408:1999: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 1.4, 07.09.2005, SUSE Linux Enterprise Server V 9 Security Target for CAPP Compliance, SGI, atsec (confidential document) [8] Evaluation Technical Report, Version 3, 16.09.2005, SUSE Linux Enterprise Server 9 SP 2 with: 1
    • 4 SP 2 (confidential document) [9] Controlled Access Protection Profile (CAPP), Version 1.d, National Security Agency, 08.10.1999: 1
pdf_data/report_metadata
  • /Author: ocsi
  • /CreationDate: D:20170727120322+02'00'
  • /Creator: Microsof Word 2010
  • /ModDate: D:20170727120322+02'00'
  • /Producer: Microsoft® Word 2010
  • /Title: Rapporto di Certificazione del prodotto “FIN.X RTOS SE V4.0”
  • pdf_file_size_bytes: 805511
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 35
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Company: BSI
  • /CreationDate: D:20051102223423+01'00'
  • /Creator: Acrobat PDFMaker 7.0.5 für Word
  • /Keywords: CC, Common Criteria, Linux, SLES9, SGI
  • /ModDate: D:20051103061037+01'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /SourceModified: D:20051102144942
  • /Subject: Certification Report BSI-DSZ-CC-292 SLES9/SGI
  • /Title: Certification Report
  • pdf_file_size_bytes: 530480
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 50
pdf_data/st_filename tds_finx_rtos_se_4_lite03.pdf 0292b.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 4
    • EAL4 augmented: 2
  • EAL:
    • EAL3: 9
    • EAL3 augmented: 4
    • EAL4+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 5
  • ALC:
    • ALC_FLR.1: 3
  • ACM:
    • ACM_CAP.3: 1
    • ACM_SCP.1: 1
  • ADO:
    • ADO_DEL.1: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.1: 1
    • ADV_HLD.2: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 2
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_FLR.3: 8
  • ASE:
    • ASE_REQ.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.1: 1
    • AVA_SOF.1: 2
    • AVA_VLA.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 13
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 7
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
    • FAU_SEL.1: 7
    • FAU_SEL.1.1: 3
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 8
    • FAU_STG.3.1: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 17
    • FCS_CKM.1: 64
    • FCS_CKM.1.1: 7
    • FCS_CKM.2: 16
    • FCS_CKM.2.1: 2
    • FCS_CKM.4: 5
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXT: 1
    • FCS_CKM_EXT.4: 1
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP.1: 24
    • FCS_COP.1.1: 4
    • FCS_COP.1.2: 1
    • FCS_RNG_EXT.1: 1
  • FDP:
    • FDP_ACC.1: 20
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 14
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 3
    • FDP_ITC.1: 5
    • FDP_ITC.2: 5
    • FDP_RIP.2: 9
    • FDP_RIP.2.1: 1
    • FDP_UCT.1: 8
    • FDP_UCT.1.1: 2
    • FDP_UIT.1: 7
    • FDP_UIT.1.1: 2
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 2
    • FIA_AFL_EXT.1: 3
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 14
    • FIA_SOS.1.1: 3
    • FIA_UAU.1: 1
    • FIA_UAU.2: 13
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 11
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 3
    • FIA_UAU.6: 7
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 10
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 2
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
    • FIA_USB.1: 12
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 17
    • FMT_MOF.1.1: 2
    • FMT_MSA.1: 13
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 8
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 52
    • FMT_MTD.1.1: 7
    • FMT_REV.1: 25
    • FMT_REV.1.1: 2
    • FMT_SAE.1: 8
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 2
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 25
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 24
    • FPT_FLS.1.1: 5
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.2: 7
    • FTA_SSL.2.1: 1
    • FTA_SSL.2.2: 2
    • FTA_TAB.1: 8
    • FTA_TAB.1.1: 2
    • FTA_TAH.1: 8
    • FTA_TAH.1.1: 2
    • FTA_TAH.1.2: 2
    • FTA_TAH.1.3: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 2
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 10
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 13
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 12
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 14
    • FAU_SAR.3.1: 1
    • FAU_SEL.1: 12
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 12
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 12
    • FAU_STG.3.1: 1
    • FAU_STG.4: 11
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 23
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 24
    • FCS_CKM.2.1: 4
    • FCS_CKM.4: 4
    • FCS_COP.1: 22
    • FCS_COP.1.1: 3
  • FDP:
    • FDP_ACC.1: 25
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 18
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 5
    • FDP_ACF.1.4: 3
    • FDP_ACF.2: 1
    • FDP_IFC.1: 4
    • FDP_ITC.1: 2
    • FDP_MSA.3: 1
    • FDP_RIP.2: 14
    • FDP_RIP.2.1: 1
    • FDP_UCT.1: 13
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 13
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_ATD.1: 13
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 14
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 15
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 12
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 6
    • FIA_UID.2: 15
    • FIA_UID.2.1: 1
    • FIA_USB: 1
    • FIA_USB.1: 15
    • FIA_USB.1.1: 2
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.1: 23
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 16
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 20
    • FMT_MSA.3.1: 3
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 54
    • FMT_MTD.1.1: 5
    • FMT_REV.1: 25
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 23
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 24
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_AMT.1: 11
    • FPT_AMT.1.1: 1
    • FPT_RVM.1: 12
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 17
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_ITC.1: 17
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.AUTHUSER: 3
    • A.CONNECT: 3
    • A.DETECT: 4
    • A.MANAGE: 3
    • A.PEER_FUNC: 2
    • A.PEER_MGT: 2
    • A.PHYSICAL: 3
    • A.TRAINEDUSER: 3
  • O:
    • O.ACCESS: 10
    • O.ACCESS_HISTORY: 4
    • O.AUDIT_GENERATION: 8
    • O.AUDIT_PROTECTION: 5
    • O.AUDIT_REVIEW: 5
    • O.CRYPTO_MEDIA: 7
    • O.CRYPTO_NET: 13
    • O.DISCRETIONARY_ACCESS: 11
    • O.DISCRETIONARY_USER_CONTROL: 7
    • O.DISPLAY_BANNER: 3
    • O.ENFORCEMENT: 3
    • O.MANAGE: 19
    • O.PROTECT: 13
    • O.RESIDUAL_INFORMATION: 4
    • O.RUNTIME: 8
    • O.TRUSTED_CHANNEL: 6
    • O.USER_AUTHENTICATION: 12
    • O.USER_IDENTIFICATION: 5
  • OE:
    • OE.ADMIN: 1
    • OE.INFO_PROTECT: 1
    • OE.INSTALL: 1
    • OE.MAINTENANCE: 1
    • OE.PHYSICAL: 4
    • OE.RECOVER: 1
    • OE.TRUSTED: 6
  • T:
    • T.ASSETS_COMPROMISE: 7
    • T.AUDIT_COMPROMISE: 4
    • T.COMM: 4
    • T.MASQUERADE: 3
    • T.RESIDUAL_DATA: 2
    • T.TSFDATA: 3
    • T.TSFFUNC: 4
    • T.UNATTENDED_SESSION: 2
    • T.UNAUTHORIZED_ACCESS: 7
    • T.UNIDENTIFIED_ACTIONS: 2
    • T.USER: 5
    • T.USERDATA: 3
  • A:
    • A.CONNECT: 7
    • A.COOP: 3
    • A.LOCATE: 3
    • A.MANAGE: 5
    • A.NET_COMP: 5
    • A.NO_EVIL_ADMIN: 4
    • A.PEER: 3
    • A.PROTECT: 6
    • A.UTRAIN: 3
    • A.UTRUST: 3
  • O:
    • O.AUDITING: 31
    • O.AUTHORIZATION: 22
    • O.COMPROT: 24
    • O.DISCRETIONARY_ACCESS: 22
    • O.ENFORCEMENT: 13
    • O.MANAGE: 31
    • O.RESIDUAL_INFO: 9
    • O.RESIDUAL_INFORMATION: 3
  • OE:
    • OE.ADMIN: 7
    • OE.CREDEN: 4
    • OE.HW_SEP: 8
    • OE.INFO_PROTECT: 10
    • OE.INSTALL: 12
    • OE.MAINTENANCE: 5
    • OE.PHYSICAL: 8
    • OE.PROTECT: 10
    • OE.RECOVER: 8
    • OE.SERIAL_LOGIN: 4
    • OE.SOFTWARE_IN: 5
  • T:
    • T.COMPROT: 3
    • T.UAACCESS: 4
    • T.UAUSER: 4
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 192
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • 3DES:
      • T-DES: 2
      • TDES: 1
  • constructions:
    • MAC:
      • HMAC: 1
  • AES_competition:
    • AES:
      • AES: 6
    • RC:
      • RC4: 4
  • DES:
    • 3DES:
      • TDES: 6
    • DES:
      • DES: 2
  • miscellaneous:
    • SM4:
      • SM4: 2
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 2
    • DSA:
      • DSA: 27
  • FF:
    • DH:
      • Diffie-Hellman: 4
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 6
  • SHA:
    • SHA1:
      • SHA-1: 1
      • SHA1: 1
    • SHA2:
      • SHA-2: 1
      • SHA-224: 1
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 2
  • MD:
    • MD5:
      • MD5: 5
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 44
  • TLS:
    • TLS:
      • TLS: 1
  • PGP:
    • PGP: 1
  • SSH:
    • SSH: 36
    • SSHv2: 1
  • TLS:
    • SSL:
      • SSL: 45
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 4
  • RNG:
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CTR:
    • CTR: 2
  • XTS:
    • XTS: 1
  • CBC:
    • CBC: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 16
  • OpenSSL:
    • OpenSSL: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 8
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 112
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-2012-09-003: 1
    • CCMB-2012-09-001: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 186-2: 1
    • FIPS 186-4: 2
    • FIPS PUB 186-2: 4
    • FIPS PUB 186-4: 3
    • FIPS140: 2
    • FIPS186: 1
    • FIPS186-2: 8
    • FIPS186-3: 1
    • FIPS186-4: 9
  • RFC:
    • RFC 2898: 2
    • RFC 4252: 7
    • RFC 4253: 6
    • RFC 6668: 5
    • RFC4253: 4
  • CC:
    • CCIMB-2004-01-003: 1
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 3268: 1
    • RFC2104: 1
    • RFC3268: 1
  • X509:
    • X.509: 3
pdf_data/st_keywords/javacard_api_const
  • curves:
    • SM2: 4
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users but cannot be used to store: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: smueller
  • /CreationDate: D:20050908090716-07'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20050908090716-07'00'
  • /Producer: Acrobat Distiller 5.0 (Windows)
  • /Title: Microsoft Word - SGI-SLES9_security_target_eal3-1.4.doc
  • pdf_file_size_bytes: 709347
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 88
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different