Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
IBM Tivoli Directory Server Version 6.3
BSI-DSZ-CC-0806-2013
Hitachi Command Suite Common Component Version: 7.0.1-00
JISEC-CC-CRP-C0303
name IBM Tivoli Directory Server Version 6.3 Hitachi Command Suite Common Component Version: 7.0.1-00
category Databases Access Control Devices and Systems
scheme DE JP
not_valid_after 01.09.2019 01.09.2016
not_valid_before 05.07.2013 15.08.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0806a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0303_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0806b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0303_est.pdf
manufacturer IBM Corporation Hitachi, Ltd.
manufacturer_web https://www.ibm.com https://www.hitachi.com/
security_level ALC_FLR.1, EAL4+ EAL2+, ALC_FLR.1
dgst b63d0485378b639d 3d4662c844b7ac14
heuristics/cert_id BSI-DSZ-CC-0806-2013 JISEC-CC-CRP-C0303
heuristics/cert_lab BSI []
heuristics/cpe_matches cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.32:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.15:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.7:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.25:*:*:*:*:*:*:*, cpe:2.3:a:ibm:security_directory_server:6.3.1.4:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.38:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.40:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.51:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.48:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.45:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.10:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.27:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.37:*:*:*:*:*:*:*, cpe:2.3:a:ibm:security_directory_server:6.3.1.5:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.41:*:*:*:*:*:*:*, cpe:2.3:a:ibm:security_directory_server:6.3.1.6:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.30:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.50:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.49:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.34:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.17:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.18:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.0:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.43:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.29:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.9:*:*:*:*:*:*:*, cpe:2.3:a:ibm:security_directory_server:6.3.1.1:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.8:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.26:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.39:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.28:*:*:*:*:*:*:*, cpe:2.3:a:ibm:security_directory_server:6.3.1:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.9:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.12:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.44:*:*:*:*:*:*:*, cpe:2.3:a:ibm:security_directory_server:6.3.1.2:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.14:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.31:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.19:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.47:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.11:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.0:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.46:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.1:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.8:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.24:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.35:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.6:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.1.5:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.22:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.33:*:*:*:*:*:*:*, cpe:2.3:a:ibm:security_directory_server:6.3.1.3:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.23:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.2:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.42:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.36:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.3.0.21:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2015-1976, CVE-2015-1959, CVE-2015-1972, CVE-2015-2019, CVE-2015-0138, CVE-2012-0740, CVE-2011-1820, CVE-2012-2191, CVE-2010-4789, CVE-2015-1977, CVE-2015-1975, CVE-2014-6100, CVE-2012-2203, CVE-2012-0726, CVE-2015-1978, CVE-2015-1974, CVE-2012-0743, CVE-2011-1206 {}
heuristics/extracted_sars ADV_IMP.1, ADV_ARC.1, ADV_FSP.4, ATE_IND.2, AGD_PRE.1, ALC_FLR.1, ALC_CMC.4, AVA_VAN.3, AGD_OPE.1, APE_REQ.2, ASE_REQ.2, ASE_ECD.1, ATE_COV.2, ASE_OBJ.2, ASE_SPD.1, ADV_TDS.3, ADV_SPM.1, APE_CCL.1, ASE_INT.1, ASE_TSS.1, APE_ECD.1, ALC_DEL.1, APE_SPD.1, APE_INT.1, APE_OBJ.2, ADV_INT.3, ATE_DPT.1, ALC_DVS.1, ALC_TAT.1, ASE_CCL.1, ALC_LCD.1, ATE_FUN.1, ALC_CMS.4 ADV_ARC.1, ATE_IND.2, AGD_PRE.1, ALC_FLR.1, AGD_OPE.1, ADV_TDS.1, ASE_REQ.2, ASE_ECD.1, AVA_VAN.2, ASE_OBJ.2, ASE_SPD.1, ATE_COV.1, ASE_INT.1, ADV_FSP.2, ASE_TSS.1, ALC_DEL.1, ALC_CMC.2, ALC_CMS.2, ASE_CCL.1, ATE_FUN.1
heuristics/extracted_versions 6.3 7.0.1
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0303
  • certification_date: 01.08.2011
  • claim: EAL2+ ALC_FLR.1
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.1
    • cc_version: 3.1
    • description: PRODUCT DESCRIPTION Description of TOE TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: Hitachi Device Manager Software, Hitachi Replication Manager Software, Hitachi Tiered Storage Manager Software, and Hitachi Tuning Manager Software. These products, in combination with TOE, are commonly referred to as Hitachi Command Suite. TOE is a foundational module for Hitachi Command Suite, and is packaged with all products. TOE security functionality TOE provides the following security functionality: - Identification/authentication functionality (External authentication functionality provided by external authentication servers, or the use of linkage functionality for external authentication groups) - Security management functionality (Functionality that manages TOE user account information, and allows the user to set security parameters) - Warning banner functionality
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Hitachi Command Suite Common Component
    • product_type: Foundational Module Software
    • report_link: https://www.ipa.go.jp/en/security/c0303_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0303_est.pdf
    • toe_version: 7.0.1-00
    • vendor: Hitachi, Ltd.
  • expiration_date: 01.09.2016
  • supplier: Hitachi, Ltd.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0303_it0311.html
  • toe_japan_name: Hitachi Command Suite Common Component 7.0.1-00
  • toe_overseas_link: None
  • toe_overseas_name: -----
pdf_data/report_filename 0806a_pdf.pdf c0303_erpt.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0806-2013
    • cert_item: IBM Tivoli Directory Server, Version 6.3
    • cert_lab: BSI
    • developer: IBM Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0806-2013: 19
  • JP:
    • CRP-C0303-01: 1
    • Certification No. C0303: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 6
    • EAL 4 augmented: 3
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 6
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 5
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
  • ALC:
    • ALC_FLR.1: 3
    • ALC_FLR.2: 1
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_ACC.2: 1
  • FIA:
    • FIA_UAU.1: 2
    • FIA_UID.1: 2
  • FMT:
    • FMT_ACC.2: 1
    • FMT_SMR.1: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMINISTRATORS: 1
    • A.CLIENTS: 1
    • A.NETWORKS: 1
    • A.PASSWORD: 1
    • A.PHYSICAL: 1
    • A.SECURE_CHANNEL: 1
    • A.SRV_MGMT: 1
    • A.VERSION: 1
  • T:
    • T.ILLEGAL_ACCESS: 2
    • T.UNAUTHORISED_ACCESS: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • Microsoft:
    • Microsoft: 6
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 3
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-2: 2
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 2
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
  • RFC:
    • RFC1777: 2
    • RFC2251: 2
    • RFC2252: 2
    • RFC2253: 2
    • RFC2254: 2
    • RFC2255: 2
    • RFC2256: 2
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Report, Version 4, 2013-05-08, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) 13.1 Guidance Documentation [8] IBM Tivoli Directory Server Version 6.3 Fix Pack 10 - Common: 1
  • OutOfScope:
    • from the software products and hardware systems mentioned above, the following functionality is out of scope of the evaluation: ● The LDAP Client ● The TLS/SSL module (GSKit), which provides: • Protected: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20110928100804+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20110928100931+09'00'
  • /Producer: Acrobat Distiller 8.3.0 (Windows)
  • /Title: CRP-e
  • pdf_file_size_bytes: 345195
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 38
pdf_data/st_filename 0806b_pdf.pdf c0303_est.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0806: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 1
  • EAL:
    • EAL2: 7
    • EAL2 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 4
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 6
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 8
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FDP:
    • FDP_ACC.1: 3
    • FDP_ACC.2: 9
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF.1: 7
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
  • FIA:
    • FIA_AFL: 12
    • FIA_AFL.1: 2
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS: 12
    • FIA_SOS.1: 2
    • FIA_SOS.1.1: 2
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 10
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF: 14
    • FMT_MOF.1: 2
    • FMT_MOF.1.1: 2
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 7
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 7
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 17
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 16
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 11
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID: 1
    • FIA_UID.1: 11
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 2
    • FMT_MSA.1: 10
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FTA:
    • FTA_TAB: 1
    • FTA_TAB.1: 8
    • FTA_TAB.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 5
    • A.COMM: 3
    • A.COOP: 2
    • A.ENCRYPT: 3
    • A.PHYSICAL: 3
    • A.ROUTE: 3
    • A.TIME: 3
    • A.TOEENV: 3
  • O:
    • O.ACCOUNT: 12
    • O.AUTHENTICATE: 14
    • O.AUTHORIZE: 16
  • OE:
    • OE.COMMUNICATION: 4
    • OE.DATABASE: 6
    • OE.ENCRYPT: 3
    • OE.ENVMANAGE: 5
    • OE.MANAGE: 5
    • OE.PHYSICAL: 3
    • OE.ROUTE: 3
    • OE.TIME: 4
  • T:
    • T.ACCESS: 6
    • T.ENTRY: 2
  • A:
    • A.ADMINISTRATORS: 3
    • A.ADMINISTROTORS: 1
    • A.CLIENTS: 4
    • A.NETWORKS: 3
    • A.PASSWORD: 3
    • A.PHYSICAL: 4
    • A.SECURE_CHANNEL: 3
    • A.SRV_MGMT: 3
    • A.VERSION: 4
  • O:
    • O.BANNER: 6
    • O.MGMT: 9
    • O.PASSWORD: 7
  • OE:
    • OE.BANNER: 4
    • OE.PASSWORD: 4
    • OE.SECURE_CHANNEL: 4
  • T:
    • T.ILLEGAL_ACCESS: 4
    • T.UNAUTHORISED_ACCESS: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • Microsoft:
    • Microsoft: 4
    • Microsoft Corporation: 4
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 63
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 2
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-2: 5
      • SHA-224: 3
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 2
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 2
pdf_data/st_keywords/standard_id
  • RFC:
    • RFC 6101: 1
    • RFC1777: 2
    • RFC2222: 2
    • RFC2246: 2
    • RFC2251: 2
    • RFC2252: 2
    • RFC2253: 2
    • RFC2254: 2
    • RFC2255: 2
    • RFC2256: 2
    • RFC2830: 2
    • RFC6101: 2
pdf_data/st_metadata
  • /Author: Hitachi, Ltd. Software Division
  • /CreationDate: D:20110926112144
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110926112144
  • /Producer: Microsoft® Office Word 2007
  • /Subject: HSCC-ST
  • /Title: Hitachi Command Suite Common Component ST
  • pdf_file_size_bytes: 455862
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 58
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different