Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version:11.0.2100.60
JISEC-CC-CRP-C0371
Red Hat Enterprise Linux Version 7.1
BSI-DSZ-CC-0949-2017
name Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version:11.0.2100.60 Red Hat Enterprise Linux Version 7.1
category Databases Operating Systems
scheme JP DE
not_valid_after 12.10.2017 15.11.2022
not_valid_before 06.09.2012 15.11.2017
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0371_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0949a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0371_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0949b_pdf.pdf
manufacturer Microsoft Corporation Red Hat, Inc.
manufacturer_web https://www.microsoft.com https://www.redhat.com
security_level EAL2 {}
dgst bccee9cca27bae56 89956d7083e870c6
heuristics/cert_id JISEC-CC-CRP-C0371 BSI-DSZ-CC-0949-2017
heuristics/cert_lab [] BSI
heuristics/cpe_matches {} cpe:2.3:o:redhat:linux:7.1:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux:7.1:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2000-1207, CVE-2002-0083, CVE-1999-0297, CVE-2015-7833, CVE-1999-1288, CVE-2001-0787, CVE-2002-1160, CVE-2002-1155, CVE-2001-0690, CVE-1999-0894, CVE-2001-0889, CVE-2001-0872, CVE-2001-0635, CVE-2003-0461, CVE-1999-0037, CVE-2002-0080, CVE-2002-0044, CVE-2017-1000253, CVE-1999-0798, CVE-2001-1002, CVE-2003-0194, CVE-2003-0464, CVE-2002-0638, CVE-2003-0364, CVE-2003-0370, CVE-2007-3103, CVE-2016-7091, CVE-2003-0354, CVE-2003-0247, CVE-2003-0041, CVE-2001-0886, CVE-2000-0017, CVE-2002-1232, CVE-2002-0836, CVE-2003-0188, CVE-2003-0248, CVE-2001-1383, CVE-2002-0045, CVE-2001-0859, CVE-2000-0701, CVE-2001-0977, CVE-2003-0434
heuristics/extracted_sars {} APE_ECD.1, ADV_SPM.1, ATE_IND.2, ADV_IMP.2, ALC_TAT.3, ALC_LCD.1, ASE_ECD.1, ATE_FUN.1, ASE_OBJ.2, ALC_FLR.3, AGD_PRE.1, ADV_ARC.1, ADV_FSP.1, AVA_VAN.2, APE_CCL.1, ASE_TSS.1, APE_REQ.2, ASE_SPD.1, ASE_INT.1, ASE_CCL.1, ATE_COV.2, ADV_INT.3, ADV_TDS.6, APE_OBJ.2, ASE_REQ.2, ALC_DEL.1, ATE_DPT.1, ALC_CMS.3, APE_INT.1, AGD_OPE.1, ALC_CMC.3, ALC_DVS.2, APE_SPD.1
heuristics/extracted_versions 11.0.2100.60 7.1
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0754-2012
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0754-2012
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0371
  • certification_date: 01.09.2012
  • claim: EAL2
  • enhanced:
    • assurance_level: EAL2
    • cert_link: https://www.ipa.go.jp/en/security/c0371_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the database engine of SQL Server 2012. SQL Server is a Database Management System (DBMS). The TOE has been developed as the core module of the DBMS to store and manage data in a secure way. TOE security functions This TOE provides the following security functionality: - The Access Control function of the TOE controls the access of users to user and metadata stored in the TOE. - The Security Audit function of the TOE produces log files about all security relevant events. - The Security Management function allows authorized administrators to manage the behavior of the security functionality of the TOE. - The Identification and Authentication function of the TOE is able to identify and authenticate users.
    • evaluation_facility: TワV Informationstechnik GmbH, Evaluation Body for IT-Security
    • product: Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English)
    • product_type: Database Management System (DBMS)
    • report_link: https://www.ipa.go.jp/en/security/c0371_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0371_est.pdf
    • toe_version: 11.0.2100.60
    • vendor: Microsoft Corporation
  • expiration_date: 01.10.2017
  • supplier: Microsoft Corporation
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0371_it1383.html
  • toe_overseas_name: Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English) 11.0.2100.60
heuristics/protection_profiles {} 39d257b42a3657cd
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_gpos_v3.9.pdf
pdf_data/report_filename c0371_erpt.pdf 0949a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant SOGIS Recognition Agreement
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0949-2017
    • cert_item: Red Hat Enterprise Linux Version 7.1
    • cert_lab: BSI
    • developer: Red Hat
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: General-Purpose Operating System Protection Profile Version 3.9, 6 December 2012, OSPP Technical Community
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0371-01: 1
    • Certification No. C0371: 1
  • DE:
    • BSI-DSZ-CC-0754-2012: 2
    • BSI-DSZ-CC-0949-2017: 19
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 6
  • EAL:
    • EAL 1: 7
    • EAL 2: 5
    • EAL 3: 4
    • EAL 4: 6
    • EAL 5: 6
    • EAL 6: 3
    • EAL 7: 4
    • EAL4: 1
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 2
    • ADV_FSP: 1
    • ADV_FSP.1: 2
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 2
    • AGD_PRE: 1
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 2
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 2
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 4
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 2
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 2
    • ASE_ECD: 1
    • ASE_ECD.1: 2
    • ASE_INT: 1
    • ASE_INT.1: 2
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 2
    • ASE_REQ: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 2
    • ASE_SPD: 1
    • ASE_SPD.1: 2
    • ASE_TSS: 1
    • ASE_TSS.1: 2
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 2
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 2
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 2
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 2
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 3
    • AVA_VAN.1: 1
    • AVA_VAN.2: 2
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/cc_sfr
  • FIA:
    • FIA_SOS.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_EVIL: 1
    • A.NO_GENERAL_: 1
    • A.PHYSICAL: 1
  • T:
    • T.MASQUERADE: 1
    • T.TSF_COMPROMISE: 1
    • T.UNAUTHORIZED_: 1
    • T.UNIDENTIFIED_: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 17
    • Microsoft Corporation: 7
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 3
  • atsec:
    • atsec: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • DES:
    • 3DES:
      • 3DES: 1
      • TDES: 1
  • constructions:
    • MAC:
      • HMAC: 3
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 6
    • DSA:
      • DSA: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-2: 1
      • SHA-256: 7
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key agreement: 2
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 2
  • PGP:
    • PGP: 1
  • SSH:
    • SSH: 6
    • SSHv2: 1
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 6
  • GCM:
    • GCM: 1
pdf_data/report_keywords/crypto_library
  • NSS:
    • NSS: 2
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/vulnerability
  • CVE:
    • CVE-2015-5157: 1
    • CVE-2017-2636: 1
    • CVE-2017-6074: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • BSI:
    • AIS 20: 2
    • AIS 32: 1
    • AIS 38: 1
  • FIPS:
    • FIPS180-4: 5
    • FIPS186-4: 3
    • FIPS197: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC2104: 1
    • RFC2404: 1
    • RFC2409: 1
    • RFC3447: 1
    • RFC3526: 1
    • RFC4251: 1
    • RFC4252: 3
    • RFC4253: 7
    • RFC5647: 1
    • RFC6668: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Version 4, Date 2017-06-02, Final Evaluation Technical Report, atsec information security GmbH (confidential document) [8] General-Purpose Operating System Protection Profile Version 3.9, 6 December 2012, OSPP: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • for the TOE: CI list for source, Date 2016-12-02, File name rhel-71-brew-logs-20161201.tar.bz2 (confidential document) [10] EAL4 Evaluated Configuration Guide for Red Hat Enterprise Linux 7.1, Version 0.25, Date: 1
pdf_data/report_metadata
  • /CreationDate: D:20130527154721+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130527154854+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 225890
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 29
pdf_data/st_filename c0371_est.pdf 0949b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0949: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 4
    • EAL2: 84
pdf_data/st_keywords/cc_sar
  • AGD:
    • AGD_ADD: 3
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SEL.1: 6
    • FAU_SEL.1.1: 1
    • FAU_STG: 3
    • FAU_STG.1: 2
    • FAU_STG.3: 1
    • FAU_STG.4: 1
    • FAU_STG_EXP: 2
    • FAU_STG_EXP.5: 14
    • FAU_STG_EXP.5.1: 2
  • FDP:
    • FDP_ACC.1: 9
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
  • FIA:
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_REV.1: 14
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 1
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 2
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SEL.1: 9
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 10
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 7
    • FAU_STG.3.1: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC.1: 25
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 23
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 11
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 12
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 4
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_RIP.2: 12
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 26
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.5: 9
    • FIA_UAU.5.1: 2
    • FIA_UAU.5.2: 1
    • FIA_UAU.7: 6
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 14
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 19
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 3
    • FMT_MSA.3.2: 3
    • FMT_MSA.4: 7
    • FMT_MSA.4.1: 1
    • FMT_MTD.1: 52
    • FMT_MTD.1.1: 9
    • FMT_REV.1: 14
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF.1: 12
    • FMT_SMF_RMT: 1
    • FMT_SMF_RMT.1: 8
    • FMT_SMR.1: 25
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_SSL.1: 8
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
    • FTA_SSL.2: 8
    • FTA_SSL.2.1: 1
    • FTA_SSL.2.2: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_EVIL: 3
    • A.NO_GENERAL_PURPOSE: 3
    • A.PHYSICAL: 3
  • O:
    • O.ADMIN_ROLE: 5
    • O.AUDIT_GENERATION: 6
    • O.MANAGE: 7
    • O.MEDIATE: 4
  • OE:
    • OE.NO_EVIL: 4
    • OE.NO_GENERAL_: 3
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.PHYSICAL: 4
  • T:
    • T.MASQUERADE: 3
    • T.TSF_COMPROMISE: 3
    • T.UNAUTHORIZED_: 1
    • T.UNAUTHORIZED_ACCESS: 2
    • T.UNIDENTIFIED_ACTIONS: 3
  • A:
    • A.AUTHUSER: 2
    • A.CONNECT: 5
    • A.DETECT: 3
    • A.MANAGE: 5
    • A.PEER: 7
    • A.PHYSICAL: 4
    • A.TRAINEDUSER: 3
  • O:
    • O.AUDITING: 14
    • O.DISCRETIONARY: 8
    • O.MANAGE: 27
    • O.NETWORK: 8
    • O.SUBJECT: 8
    • O.TRUSTED_CHANNEL: 9
    • O.UNATTENDED_SESSION: 5
  • OE:
    • OE.ADMIN: 6
    • OE.INFO_PROTECT: 7
    • OE.INSTALL: 4
    • OE.MAINTENANCE: 3
    • OE.PHYSICAL: 3
    • OE.RECOVER: 3
    • OE.REMOTE: 4
    • OE.TRUSTED: 5
  • T:
    • T.ACCESS: 17
    • T.IA: 6
    • T.RESTRICT: 3
    • T.UNATTENDED_SESSION: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 54
    • Microsoft Corporation: 2
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 234
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • Serpent:
      • Serpent: 1
    • Twofish:
      • Twofish: 1
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • Diffie-Hellman: 11
    • DSA:
      • DSA: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-256: 3
      • SHA-384: 1
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key exchange: 1
  • MAC:
    • MAC: 28
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 2
    • IKEv1: 1
  • IPsec:
    • IPsec: 1
  • SSH:
    • SSH: 89
    • SSHv2: 5
  • TLS:
    • SSL:
      • SSL: 3
    • TLS:
      • TLS: 5
      • TLS v1.1: 1
  • VPN:
    • VPN: 4
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 1
    • P-384: 1
    • P-521: 1
    • curve P-256: 1
    • curve P-384: 1
    • curve P-521: 1
pdf_data/st_keywords/crypto_library
  • NSS:
    • NSS: 3
  • OpenSSL:
    • OpenSSL: 4
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 186-3: 1
  • RFC:
    • RFC 2409: 2
    • RFC 2460: 1
    • RFC 3484: 1
    • RFC 3526: 1
    • RFC 3542: 1
    • RFC 4213: 1
    • RFC 4252: 1
    • RFC 4346: 1
    • RFC 5114: 1
    • RFC 5246: 1
    • RFC 5647: 2
    • RFC 5996: 1
    • RFC2409: 1
    • RFC3526: 1
    • RFC4252: 8
    • RFC4253: 7
    • RFC4352: 2
    • RFC4419: 1
    • RFC5656: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store: 1
    • PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation: 1
    • as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also: 1
    • out of scope: 3
pdf_data/st_metadata
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different