name |
H3C Switch Series version 1.0 |
E-Passport Morpho-ePass V3 with BAC, AA and EAC RSA / EAC ECC embedded on secure microcontroller STMicroelectronics |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
ES |
FR |
status |
active |
archived |
not_valid_after |
08.11.2029 |
01.09.2019 |
not_valid_before |
08.11.2024 |
28.07.2008 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2022-49_Certificado.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2022-49-INF-4218.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-2008_23en.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2022-49-ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-cible2008_23en.pdf |
manufacturer |
H3C Technologies Co. Ltd. |
Sagem Défense Sécurité/ ATMEL Smart Card ICs |
manufacturer_web |
https://www.h3c.com |
https://www.sagem-ds.com/ |
security_level |
PP |
ADV_IMP.2, AVA_VLA.4, AVA_MSU.3, EAL4+, ALC_DVS.2 |
dgst |
b4d32b055d6199cc |
77a0f1a9c88e2512 |
heuristics/cert_id |
2022-49-INF-4218 |
ANSSI-CC-2008/23 |
heuristics/cert_lab |
[] |
CEA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1 |
AVA_VLA.4, ALC_DVS.2, ADV_IMP.2, AVA_MSU.3 |
heuristics/extracted_versions |
1.0 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2007/23 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2007/23 |
heuristics/scheme_data |
- category: Switches
- certification_date: 08.11.2024
- enhanced:
- manufacturer: NEW H3C TECHNOLOGIES CO., LTD.
- product: H3C Switch Series version 1.0
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/1026-h3c-switch-series-version-1-0
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
89f2a255423f4a20 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf |
{} |
pdf_data/cert_filename |
2022-49_Certificado.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 833161
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
2022-49-INF-4218.pdf |
dcssi-2008_23en.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmented ADV_IMP.2, ALC_DVS.2, AVA_MSU.3, AVA_VLA.4
- cc_version: Common Criteria version 2.3 compliant with ISO 15408:2005
- cert_id: DCSSI-2008/23
- cert_item: Passport Morpho-ePass V3 with BAC, AA and EAC RSA or EAC ECC, on STMicroelectronics microcontroller
- cert_item_version: MORPHOEPASSCC/ST19NR66-A/1.0.2
- cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France Phone: +33 (0)4 38 78 40 87, email : [email protected]
- developer: Sagem Sécurité Etablissement d’Osny, 18 Chaussée Jules César, 95520 Osny, France STMicroelectronics Smartcard IC division, ZI de Rousset, BP2, 13106 Rousset Cedex, France Sponsor Sagem Sécurité Etablissement d’Osny, 18 Chaussée Jules César, 95520 Osny, France
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developers(.+)Evaluation facility(.+)Recognition arrangements']
- ref_protection_profiles: BSI-PP-0026 version 1.2 Common Criteria Protection Profile - Machine Readable Travel Document with “ICAO Application”, Extended Access Control
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- FR:
- DCSSI-2007/23: 1
- DCSSI-2008/23: 18
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002-2001: 1
- BSI-PP-0026: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 4 augmented: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 3
- EAL5: 1
- EAL5+: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- ALC:
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ACM:
- ACM_AUT: 1
- ACM_CAP: 1
- ACM_SCP: 1
- ADO:
- ADV:
- ADV_FSP: 1
- ADV_HLD: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_LLD: 1
- ADV_RCR: 1
- ADV_SPM: 1
- AGD:
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_CCA: 1
- AVA_MSU: 1
- AVA_MSU.3: 2
- AVA_SOF: 1
- AVA_VLA: 1
- AVA_VLA.4: 2
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_STG_EXT.1: 1
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_COP: 3
- FCS_NTP_EXT.1: 1
- FCS_RBG_EXT.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_UAU.7: 1
- FIA_UIA_EXT.1: 1
- FMT:
- FMT_MOF: 1
- FMT_MTD: 2
- FMT_SMF.1: 1
- FPT:
- FPT_SKP_EXT.1: 1
- FPT_STM_EXT.1: 1
- FPT_TST_EXT.1: 1
- FTA:
- FTA_SSL.4: 1
- FTA_SSL_EXT.1: 1
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- STMicroelectronics:
- Sagem:
|
pdf_data/report_keywords/eval_facility |
- BrightSight:
- SGS:
- SGS: 4
- SGS Brightsight: 4
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author: Mathieu Robert
- /CreationDate: D:20080728154259+02'00'
- /Creator: Acrobat PDFMaker 5.0 pour Word
- /Keywords: CER/F/07.5
- /ModDate: D:20080728154302+03'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Subject: Passport Morpho-ePass V3 with BAC, AA and EAC RSA or EAC ECC, on STMicroelectronics microcontroller
- /Title: DCSSI-2008/23
- pdf_file_size_bytes: 263008
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: True
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
2022-49-ST.pdf |
dcssi-cible2008_23en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0026: 1
- BSI-PP-0026: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL4: 3
- EAL4 augmented: 2
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
|
- ADO:
- ADV:
- ALC:
- AVA:
- AVA_MSU.3: 4
- AVA_VLA.2: 2
- AVA_VLA.4: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 4
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 2
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 4
- FCS_CKM.1.1: 1
- FCS_CKM.2: 4
- FCS_CKM.2.1: 1
- FCS_CKM.4: 4
- FCS_CKM.4.1: 1
- FCS_COP: 18
- FCS_COP.1: 4
- FCS_NTP_EXT: 2
- FCS_NTP_EXT.1: 4
- FCS_NTP_EXT.1.1: 1
- FCS_NTP_EXT.1.2: 1
- FCS_NTP_EXT.1.3: 1
- FCS_NTP_EXT.1.4: 1
- FCS_RBG_EXT: 2
- FCS_RBG_EXT.1: 6
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_RGB_EXT.1: 1
- FCS_SSHS_EXT: 2
- FCS_SSHS_EXT.1: 4
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.2: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 1
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 1
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT: 2
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU: 2
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 2
- FIA_UAU_EXT.2: 4
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT: 2
- FIA_UIA_EXT.1: 5
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 7
- FMT_MOF.1: 1
- FMT_MTD: 10
- FMT_MTD.1: 2
- FMT_SMF: 2
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.2: 4
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 2
- FPT_APW_EXT.1: 4
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM_EXT: 2
- FPT_STM_EXT.1: 5
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 1
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL: 2
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 2
- FTA_SSL_EXT.1: 4
- FTA_SSL_EXT.1.1: 1
- FTA_TAB: 2
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 6
- FTP_TRP.1: 3
|
- FAU:
- FAU_SAS.1: 3
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 12
- FCS_CKM.1: 3
- FCS_CKM.1.1: 5
- FCS_CKM.4: 3
- FCS_CKM.4.1: 2
- FCS_COP: 22
- FCS_COP.1: 4
- FCS_COP.1.1: 13
- FCS_RND: 4
- FCS_RND.1: 4
- FCS_RND.1.1: 3
- FDP:
- FDP_ACC.1: 2
- FDP_ACC.1.1: 1
- FDP_ACF.1: 3
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DAU: 2
- FDP_DAU.1: 1
- FDP_DAU.1.1: 2
- FDP_UCT: 3
- FDP_UCT.1: 2
- FDP_UCT.1.1: 2
- FDP_UIT: 3
- FDP_UIT.1: 2
- FDP_UIT.1.1: 2
- FDP_UIT.1.2: 2
- FIA:
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 10
- FIA_API.1: 3
- FIA_API.1.1: 4
- FIA_UAU: 30
- FIA_UAU.1: 2
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 7
- FIA_UAU.4.1: 4
- FIA_UAU.5: 3
- FIA_UAU.5.1: 2
- FIA_UAU.5.2: 3
- FIA_UAU.6: 3
- FIA_UAU.6.1: 3
- FIA_UID.1: 2
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM.1: 5
- FMT_LIM.1.1: 1
- FMT_LIM.2: 5
- FMT_LIM.2.1: 1
- FMT_MTD: 14
- FMT_MTD.1: 2
- FMT_MTD.1.1: 9
- FMT_MTD.3: 5
- FMT_MTD.3.1: 1
- FMT_SMF.1: 3
- FMT_SMF.1.1: 1
- FMT_SMR.1: 3
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 5
- FPT_FLS.1.1: 1
- FPT_PHP.3: 4
- FPT_PHP.3.1: 1
- FPT_RVM.1: 3
- FPT_RVM.1.1: 1
- FPT_SEP.1: 3
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.2.1: 1
- FPT_TST.3.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
|
|
pdf_data/st_keywords/vendor |
|
- STMicroelectronics:
- Sagem:
|
pdf_data/st_keywords/eval_facility |
- BrightSight:
- SGS:
- SGS: 18
- SGS Brightsight: 18
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 7
- AES-: 1
- AES-256: 1
- constructions:
- MAC:
- HMAC: 4
- HMAC-SHA-256: 2
- HMAC-SHA-384: 2
- HMAC-SHA-512: 2
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA2:
- SHA-256: 2
- SHA-384: 2
- SHA-512: 2
- SHA256: 2
- SHA384: 2
- SHA512: 2
- scrypt:
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 4
- SHA224: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 6
- P-384: 4
- P-521: 4
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 1
- Physical Tampering: 2
- Physical tampering: 2
- fault injection: 1
- malfunction: 4
- physical tampering: 2
- SCA:
- DPA: 1
- physical probing: 4
- side channel: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI 2006: 1
- BSI TR-03110: 1
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 8
- EF.DG1: 21
- EF.DG13: 3
- EF.DG14: 8
- EF.DG15: 6
- EF.DG16: 20
- EF.DG2: 9
- EF.DG3: 11
- EF.DG4: 10
- EF.DG5: 6
- EF.SOD: 8
|
pdf_data/st_keywords/standard_id |
- FIPS:
- ISO:
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 2
- ISO/IEC 9796-2: 1
- PKCS:
- RFC:
- RFC 1305: 1
- RFC 2407: 1
- RFC 2986: 1
- RFC 3447: 1
- RFC 3526: 4
- RFC 4106: 4
- RFC 4253: 1
- RFC 4301: 1
- RFC 4303: 1
- RFC 4868: 2
- RFC 4945: 1
- RFC 5114: 2
- RFC 5280: 4
- RFC 5282: 2
- RFC 5759: 1
- RFC 5905: 1
- RFC 5996: 3
- X509:
|
- BSI:
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 3
- FIPS:
- FIPS 180-2: 4
- FIPS 46-3: 3
- FIPS PUB 46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 15946: 2
- ISO/IEC 7816-4: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 651974
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 48
|
- /Author: g073432
- /CreationDate: D:20080723184618+02'00'
- /Creator: Acrobat PDFMaker 5.0 pour Word
- /Keywords: nov 2004
- /ModDate: D:20080723184659+03'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Subject: CARTES A PUCE
- /Title: Security Target: Morpho-ePass V3
- pdf_file_size_bytes: 445516
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 71
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |