name |
PrimeKey EJBCA Enterprise v7.4.1.1 |
HP StorageWorks P9000 Command View Advanced Edition Software Common Component Version: 7.0.1-00 |
category |
Products for Digital Signatures |
Access Control Devices and Systems |
scheme |
SE |
JP |
status |
active |
archived |
not_valid_after |
16.04.2026 |
01.09.2016 |
not_valid_before |
16.04.2021 |
15.08.2011 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRA%20-%20Primekey.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20PrimeKey%20EJBCA%20Enterprise%20v7.4.1.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0305_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST%20EJBCA%20v7.4.1%20v15.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0305_est.pdf |
manufacturer |
PrimeKey Solutions AB |
Hewlett-Packard Company |
manufacturer_web |
https://www.primekey.se/ |
https://www.hp.com |
security_level |
{} |
EAL2+, ALC_FLR.1 |
dgst |
b0318120c24c0f62 |
c63773cb15a5150c |
heuristics/cert_id |
CSEC2019005 |
JISEC-CC-CRP-C0305 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
cpe:2.3:a:primekey:ejbca:7.4:*:*:*:enterprise:*:*:*, cpe:2.3:a:primekey:ejbca:7.4.1:*:*:*:enterprise:*:*:* |
cpe:2.3:a:hp:p9000_command_view_advanced_edition_software:-:*:*:*:*:*:*:*, cpe:2.3:h:hp:9000:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
CVE-2021-40088, CVE-2021-40086, CVE-2021-40087, CVE-2022-34831, CVE-2020-28942, CVE-2020-25276, CVE-2021-40089 |
CVE-2010-4107, CVE-2016-2003 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_SPD.1, ATE_IND.1, ALC_CMS.1, ASE_OBJ.1, AGD_OPE.1, ASE_CCL.1, ASE_REQ.1, ASE_TSS.1, ALC_CMC.1, AGD_PRE.1, ASE_INT.1, AVA_VAN.1, ASE_ECD.1, ADV_FSP.1 |
ATE_IND.2, ASE_REQ.2, ASE_CCL.1, ADV_TDS.1, ADV_FSP.2, AGD_PRE.1, ALC_FLR.1, ASE_SPD.1, ALC_CMS.2, ALC_CMC.2, ADV_ARC.1, AVA_VAN.2, ATE_FUN.1, ALC_DEL.1, AGD_OPE.1, ASE_TSS.1, ASE_INT.1, ATE_COV.1, ASE_OBJ.2, ASE_ECD.1 |
heuristics/extracted_versions |
7.4.1.1 |
7.0.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0305
- certification_date: 01.08.2011
- claim: EAL2+ ALC_FLR.1
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.1
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0305_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: HP StorageWorks P9000 Device Manager Software, HP StorageWorks P9000 Replication Manager Software, HP StorageWorks P9000 Tiered Storage Manager Software, and HP StorageWorks P9000 Tuning Manager Software. These products, in combination with TOE, are commonly referred to as HP StorageWorks P9000 Command View Advanced Edition Software. TOE is a foundational module for HP StorageWorks P9000 Command View Advanced Edition Software, and is packaged with all products. TOE security functions TOE provides the following security functionality: - Identification/authentication functionality (External authentication functionality provided by external authentication servers, or the use of linkage functionality for external authentication groups) - Security management functionality (Functionality that manages TOE user account information, and allows the user to set security parameters) - Warning banner functionality
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: HP StorageWorks P9000 Command View Advanced Edition Software Common Component
- product_type: Foundational Module Software
- report_link: https://www.ipa.go.jp/en/security/c0305_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0305_est.pdf
- toe_version: 7.0.1-00
- vendor: Hewlett-Packard Company
- expiration_date: 01.09.2016
- supplier: Hewlett-Packard Company
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0305_it0331.html
- toe_overseas_name: HP StorageWorks P9000 Command View Advanced Edition Software Common Component 7.0.1-00
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
3e51a98255611123 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ca_v2.1.pdf |
{} |
pdf_data/cert_filename |
CCRA - Primekey.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20211022200546+02'00'
- /Creator: RICOH MP C4504ex
- /ModDate: D:20211022200546+02'00'
- /Producer: RICOH MP C4504ex
- pdf_file_size_bytes: 951780
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
Certification Report - PrimeKey EJBCA Enterprise v7.4.1.1.pdf |
c0305_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0305-01: 1
- Certification No. C0305: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL2: 4
- EAL2 augmented: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 5
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ALC:
- ALC_FLR.1: 3
- ALC_FLR.2: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMINISTRATORS: 1
- A.CLIENTS: 1
- A.NETWORKS: 1
- A.PASSWORD: 1
- A.PHYSICAL: 1
- A.SECURE_CHANNEL: 1
- A.SRV_MGMT: 1
- A.VERSION: 1
- T:
- T.ILLEGAL_ACCESS: 2
- T.UNAUTHORISED_ACCESS: 2
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ISO:
- X509:
|
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Jerry Johansson
- /CreationDate: D:20211001125635+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20211023084753+02'00'
- /Producer: Microsoft® Word 2016
- /Subject: 19FMV3147-38:1
- /Title: Certification Report - PrimeKey EJBCA Enterprise v7.4.1.1
- pdf_file_size_bytes: 401100
- pdf_hyperlinks: https://doc.primekey.com/ejbca
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20110927171053+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20110928093233+09'00'
- /Producer: Acrobat Distiller 8.3.0 (Windows)
- /Title: CRP-e
- pdf_file_size_bytes: 347111
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 36
|
pdf_data/st_filename |
ST EJBCA v7.4.1 v15.pdf |
c0305_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL2: 7
- EAL2 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 11
- AGD_PRE: 1
- AGD_PRE.1: 7
- ALC:
- ALC_CMC.1: 5
- ALC_CMS.1: 6
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 6
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ADP_EXT.1: 11
- FAU_ADP_EXT.1.1: 2
- FAU_GCR_EXT.1: 5
- FAU_GCR_EXT.1.1: 2
- FAU_GEN.1: 5
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 3
- FAU_GEN.2: 5
- FAU_GEN.2.1: 2
- FAU_SAR.1: 4
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 2
- FAU_SAR.3: 4
- FAU_SAR.3.1: 2
- FAU_SCR_EXT.1: 2
- FAU_SEL.1: 5
- FAU_SEL.1.1: 2
- FAU_STG.1: 4
- FAU_STG.4: 7
- FAU_STG.4.1: 3
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 2
- FAU_STG_EXT.2: 2
- FCO:
- FCO_NRO_EXT.2: 6
- FCO_NRO_EXT.2.1: 2
- FCO_NRO_EXT.2.2: 3
- FCO_NRO_EXT.2.3: 1
- FCO_NRO_EXT.2.4: 2
- FCO_NRO_EXT.2.5: 1
- FCO_NRR_EXT.2: 6
- FCO_NRR_EXT.2.1: 2
- FCS:
- FCS_CDP_EXT.1: 10
- FCS_CDP_EXT.1.1: 2
- FCS_CKM.1: 6
- FCS_CKM.1.1: 2
- FCS_CKM.2: 6
- FCS_CKM.2.1: 2
- FCS_CKM_EXT.1: 8
- FCS_CKM_EXT.4: 7
- FCS_CKM_EXT.4.1: 2
- FCS_CKM_EXT.4.2: 2
- FCS_CKM_EXT.5: 2
- FCS_CKM_EXT.6: 2
- FCS_CKM_EXT.7: 2
- FCS_CKM_EXT.8: 2
- FCS_COP.1: 39
- FCS_COP.1.1: 8
- FCS_RBG_EXT.1: 8
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_RGB_EXT.1: 1
- FCS_STG_EXT.1: 6
- FCS_STG_EXT.1.1: 2
- FCS_TLSC_EXT.1: 1
- FCS_TLSC_EXT.2: 7
- FCS_TLSC_EXT.2.1: 2
- FCS_TLSC_EXT.2.2: 2
- FCS_TLSC_EXT.2.3: 1
- FCS_TLSC_EXT.2.4: 2
- FCS_TLSC_EXT.2.5: 1
- FCS_TLSS_EXT.1: 3
- FCS_TLSS_EXT.2: 7
- FCS_TLSS_EXT.2.1: 2
- FCS_TLSS_EXT.2.2: 2
- FCS_TLSS_EXT.2.3: 1
- FCS_TLSS_EXT.2.4: 3
- FCS_TLSS_EXT.2.5: 1
- FCS_TLSS_EXT.2.6: 2
- FDP:
- FDP_CER_EXT.1: 7
- FDP_CER_EXT.1.1: 2
- FDP_CER_EXT.1.2: 2
- FDP_CER_EXT.1.3: 1
- FDP_CER_EXT.2: 6
- FDP_CER_EXT.2.1: 2
- FDP_CER_EXT.3: 7
- FDP_CER_EXT.3.1: 2
- FDP_CER_EXT.4: 2
- FDP_CRL_EXT.1: 8
- FDP_CRL_EXT.1.1: 2
- FDP_CSI_EXT.1: 9
- FDP_CSI_EXT.1.1: 2
- FDP_CSI_EXT.1.2: 2
- FDP_ITT.1: 6
- FDP_ITT.1.1: 2
- FDP_OCSP_EXT.1.1: 1
- FDP_RIP.1: 5
- FDP_RIP.1.1: 2
- FDP_SDP_EXT.1: 3
- FDP_STG_EXT.1: 3
- FIA:
- FIA_AFL.1: 2
- FIA_CMCC_EXT.1: 2
- FIA_CMCS_EXT.1: 2
- FIA_ESTC_EXT.1: 2
- FIA_ESTS_EXT.1: 11
- FIA_ESTS_EXT.1.1: 2
- FIA_ESTS_EXT.1.2: 2
- FIA_ESTS_EXT.1.3: 1
- FIA_ESTS_EXT.1.4: 2
- FIA_PMG_EXT.1: 6
- FIA_PMG_EXT.1.1: 2
- FIA_PSK_EXT.1: 2
- FIA_UAU.7: 6
- FIA_UAU_EXT: 2
- FIA_UAU_EXT.1: 8
- FIA_UAU_EXT.1.1: 4
- FIA_UAU_EXT.7.1: 2
- FIA_UIA_EXT.1: 9
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FIA_UIA_EXT.1.3: 1
- FMT:
- FMT_MOF.1: 36
- FMT_MOF.1.1: 10
- FMT_MTD.1: 7
- FMT_MTD.1.1: 2
- FMT_SMF.1: 6
- FMT_SMF.1.1: 2
- FMT_SMR.2: 7
- FMT_SMR.2.1: 4
- FMT_SMR.2.2: 2
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 7
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_FLS.1: 5
- FPT_FLS.1.1: 2
- FPT_ITT.1: 5
- FPT_ITT.1.1: 2
- FPT_KST_EXT.1: 5
- FPT_KST_EXT.1.1: 2
- FPT_KST_EXT.2: 7
- FPT_KST_EXT.2.1: 2
- FPT_NPE_EXT.1: 7
- FPT_NPE_EXT.1.1: 2
- FPT_NPE_EXT.1.2: 2
- FPT_RCV.1: 5
- FPT_RCV.1.1: 2
- FPT_SKP_EXT.1: 7
- FPT_SKP_EXT.1.1: 2
- FPT_SKY_EXT.1: 5
- FPT_SKY_EXT.2: 3
- FPT_STM.1: 5
- FPT_STM.1.1: 2
- FPT_TST_EXT.1: 2
- FPT_TST_EXT.2: 2
- FPT_TUD_EXT.1: 7
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.1.4: 2
- FTA:
- FTA_SSL.3: 2
- FTA_SSL.4: 6
- FTA_SSL.4.1: 2
- FTA_SSL_EXT.1: 2
- FTA_TAB.1: 7
- FTA_TAB.1.1: 2
- FTP:
- FTP_ITC.1: 6
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 2
- FTP_ITC.1.3: 1
- FTP_TRP.1: 6
- FTP_TRP.1.1: 2
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 1
|
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 15
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID: 1
- FIA_UID.1: 11
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 2
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FTA:
- FTA_TAB: 1
- FTA_TAB.1: 8
- FTA_TAB.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NO_GENERAL_PURPOSE: 2
- A.PHYSICAL: 2
- A.TRUSTED_ADMIN: 2
- O:
- O.AUDIT_LOSS_RESPONSE: 3
- O.AUDIT_PROTECTION: 3
- O.CERTIFICATES: 2
- O.CONFIGURATION_: 1
- O.CONFIGURATION_MANAGEMENT: 1
- O.DISPLAY_BANNER: 2
- O.INTEGRITY_PROTECTION: 2
- O.NON_REPUDIATION: 2
- O.PROTECTED_: 1
- O.PROTECTED_COMMUNICATIONS: 2
- O.RECOVERY: 1
- O.RESIDUAL_INFORMATION_: 1
- O.RESIDUAL_INFORMATION_CLEARING: 1
- O.SESSION_LOCK: 1
- O.SYSTEM_MONITORING: 2
- O.TOE_ADMINISTRATION: 3
- O.TSF_SELF_TEST: 1
- O.VERIFIABLE_UPDATES: 3
- OE:
- OE.AUDIT_GENERATION: 2
- OE.AUDIT_RETENTION: 3
- OE.AUDIT_REVIEW: 3
- OE.AUDIT_STORAGE: 3
- OE.CERTIFICATE_REPO: 1
- OE.CERT_REPOSITORY: 2
- OE.CERT_REPOSITORY_: 1
- OE.CERT_REPOSITORY_SEARCH: 1
- OE.CRYPTOGRAPHY: 3
- OE.KEY_ARCHIVAL: 3
- OE.NO_GENERAL_PURPOSE: 2
- OE.PHYSICAL: 2
- OE.PUBLIC_KEY_PROTECTION: 2
- OE.SESSION_PROTECTION_: 2
- OE.SESSION_PROTECTION_LOCAL: 2
- OE.SESSION_PROTECTION_REMOTE: 2
- OE.TOE_ADMINISTRATION: 4
- OE.TRUSTED_ADMIN: 2
- OE.TRUSTED_PLATFORM: 2
- T:
- T.PRIVILEGED_USER_ERROR: 2
- T.TSF_FAILURE: 1
- T.UNAUTHENTICATED_: 1
- T.UNAUTHENTICATED_TRANSACTIONS: 1
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAUTHORIZED_UPDATE: 2
- T.UNDETECTED_ACTIONS: 2
- T.USER_DATA_REUSE: 2
- T.WEAK_CRYPTO: 2
|
- A:
- A.ADMINISTRATORS: 3
- A.ADMINISTROTORS: 1
- A.CLIENTS: 4
- A.NETWORKS: 3
- A.PASSWORD: 3
- A.PHYSICAL: 4
- A.SECURE_CHANNEL: 3
- A.SRV_MGMT: 3
- A.VERSION: 4
- O:
- O.BANNER: 6
- O.MGMT: 9
- O.PASSWORD: 7
- OE:
- OE.BANNER: 4
- OE.PASSWORD: 4
- OE.SECURE_CHANNEL: 4
- T:
- T.ILLEGAL_ACCESS: 4
- T.UNAUTHORISED_ACCESS: 3
|
pdf_data/st_keywords/vendor |
|
- Microsoft:
- Microsoft: 4
- Microsoft Corporation: 4
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA2:
- SHA-256: 3
- SHA-384: 4
- SHA-512: 3
- SHA256: 12
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- PACE:
- TLS:
- SSL:
- SSL: 3
- SSL 2.0: 1
- SSL 3.0: 1
- TLS:
- TLS: 42
- TLS 1.0: 1
- TLS 1.1: 2
- TLS 1.2: 3
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 10
- P-384: 8
- P-521: 10
- secp256r1: 1
- secp384r1: 1
- secp521r1: 1
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 4
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 4
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 4
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 4
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 4
- TLS_RSA_WITH_AES_128_CBC_SHA256: 4
- TLS_RSA_WITH_AES_128_GCM_SHA256: 4
- TLS_RSA_WITH_AES_256_CBC_SHA: 4
- TLS_RSA_WITH_AES_256_GCM_SHA384: 4
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- FIPS:
- FIPS 140-2: 3
- FIPS PUB 186-4: 7
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-38C: 2
- NIST SP 800-38D: 2
- NIST SP 800-38F: 3
- NIST SP 800-57: 1
- SP 800-90: 1
- PKCS:
- RFC:
- RFC 2560: 4
- RFC 2818: 2
- RFC 2986: 1
- RFC 3268: 16
- RFC 3526: 2
- RFC 4346: 2
- RFC 4492: 8
- RFC 5246: 18
- RFC 5280: 8
- RFC 5288: 16
- RFC 5289: 16
- RFC 5759: 2
- RFC 6125: 1
- RFC 6960: 5
- RFC 7030: 9
- RFC 8017: 1
- RFC5280: 1
- RFC7030: 1
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Staaf Anders
- /CreationDate: D:20210924122714+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20210924122714+02'00'
- /Producer: Microsoft® Word 2016
- pdf_file_size_bytes: 2442203
- pdf_hyperlinks: https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=292, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=334, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=284, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=282, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=293, http://tools.ietf.org/pdf/rfc2560.pdf, http://tools.ietf.org/pdf/rfc5019.pdf, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0522, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=300, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=358, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?td_id=363, http://www.itu.int/rec/T-REC-X.509-200508-I/en, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0500, http://www.ejbca.org/, http://tools.ietf.org/pdf/rfc5280.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 77
|
- /Author: Hewlett-Packard Company
- /CreationDate: D:20110926112601
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20110926112601
- /Producer: Microsoft® Office Word 2007
- /Subject: CVAE-ST
- /Title: HP StorageWorks P9000 Command View Advanced Edition Software Common Component Security Target
- pdf_file_size_bytes: 448528
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 57
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |