name |
Oracle Linux 9.3 |
CONEXA 3.0 Version 1.3 |
category |
Operating Systems |
Other Devices and Systems |
scheme |
CA |
DE |
status |
active |
active |
not_valid_after |
14.02.2030 |
07.03.2030 |
not_valid_before |
14.02.2025 |
08.03.2022 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/653-EWA%20CT%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V4a_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/653-EWA%20CR%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V4a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/653-EWA%20ST%20v1.5.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0918V4b_pdf.pdf |
manufacturer |
Oracle Corporation |
Theben AG |
manufacturer_web |
https://www.oracle.com |
https://www.theben.de |
security_level |
{} |
EAL4+, ALC_FLR.2, AVA_VAN.5 |
dgst |
be8e046b00e33ce3 |
af627a27331bf7ab |
heuristics/cert_id |
653-EWA |
BSI-DSZ-CC-0918-V4-2022 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 |
ATE_COV.2, ASE_TSS.1, ASE_INT.1, ALC_CMS.4, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ADV_FSP.4, ALC_LCD.1, ADV_ARC.1, AGD_OPE.1, ASE_REQ.2, ASE_CCL.1, ALC_CMC.4, ALC_FLR.2, ADV_IMP.1 |
heuristics/extracted_versions |
9.3 |
1.3, 3.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0918-V5-2023 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0918-V3-2022, BSI-DSZ-CC-0957-V2-2016 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0918-V6-2024, BSI-DSZ-CC-0918-V7-2025, BSI-DSZ-CC-0918-V5-2023 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0918-2020, BSI-DSZ-CC-0918-V2-2021, BSI-DSZ-CC-0845-V2-2013, BSI-DSZ-CC-0845-2012, BSI-DSZ-CC-0957-V2-2016, BSI-DSZ-CC-0978-2016, BSI-DSZ-CC-0918-V3-2022, BSI-DSZ-CC-0666-2012, BSI-DSZ-CC-0957-2015 |
heuristics/scheme_data |
- certification_date: 14.02.2025
- level: PP_OS_V4.3, PKG_TLS_V1.1, PKG_SSH_V1.0
- product: Oracle Linux 9.3
- vendor: Oracle Corporation
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0957-V2-2016 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0957-V2-2016, BSI-DSZ-CC-0978-2016 |
heuristics/protection_profiles |
c40ae795865a0dba, ed9c9d74c3710878, 3d6ad6fde534f6c6 |
6346b04de6859db3 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_4.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pkg_ssh_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0073b_pdf.pdf |
pdf_data/cert_filename |
653-EWA CT v1.0.pdf |
0918V4a_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0918-V3-2022: 3
- BSI-DSZ-CC-0918-V4-2022: 13
- BSI-DSZ-CC-0957-V2-2016: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 8
- EAL 4 augmented: 3
- EAL 5: 3
- EAL 5+: 1
- EAL 6: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ALC:
- ALC_CMS.4: 2
- ALC_FLR: 3
- ALC_FLR.2: 4
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- TSystems:
- T-Systems International: 1
- TUV:
- TÜV Informationstechnik: 3
|
pdf_data/cert_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
- SHA256: 2
- SHA384: 2
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 1
- brainpoolP384r1: 1
- brainpoolP512r1: 1
- NIST:
- secp256r1: 1
- secp384r1: 1
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102-1: 1
- BSI TR-03109-1: 1
- BSI TR-03109-3: 1
- BSI TR-03111: 1
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- BSI:
- AIS 32: 1
- AIS 34: 2
- AIS 38: 1
- AIS 46: 2
- AIS 48: 2
- FIPS:
- FIPS 180-4: 4
- FIPS 197: 7
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- RFC:
- RFC 2104: 3
- RFC 3394: 3
- RFC 4493: 6
- RFC 5084: 3
- RFC 5114: 3
- RFC 5246: 3
- RFC 5289: 3
- RFC 5639: 3
- RFC5246: 1
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
- ConfidentialDocument:
- 0 (ALC_CMS.4), v3.60.0-cc, 2022-02-22, Theben AG (confidential document) [11] Handbuch CONEXA 3.0 für Gateway Administrator, Version 2.10.0, 18.11.2021, Theben AG [12: 1
- Konfigurationsliste Smart Meter Gateway CONEXA 3.0 Version 1.3, Version 1.0, 2022-02-23, Theben AG (confidential document) [10] Configuration list for the TOE SW: ASSURANCE LIFE CYCLE – CONFIGURATION MANAGEMENT DER CONEXA: 1
- Report, Version 2, 2022-03-02, EVALUATION TECHNICAL REPORT SUMMARY, TÜV Informationstechnik GmbH (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014: 1
- Version 1.4, 04.04.2020, Theben AG [19] Impact Analysis Report, Version 0.4, 14.01.2022, Theben AG (confidential document) [20] Technische Richtlinie BSI TR-03109-1 Anforderungen an die Interoperabilität der: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/cert_metadata |
- /Author: Clark, Cory P.
- /CreationDate: D:20250218135452-05'00'
- /Creator: Microsoft® Word for Microsoft 365
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId: 03c3dcc6-6bfd-4194-a625-fb83b8d0389e
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits: 1
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled: true
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method: Privileged
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name: UNCLASSIFIED
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate: 2023-05-16T11:46:20Z
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId: da9cbe40-ec1e-4997-afb3-17d87574571a
- /ModDate: D:20250218135452-05'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 185393
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20220315131752+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, SMGW, Theben 0918_v4"
- /ModDate: D:20220315134621+01'00'
- /Producer: LibreOffice 6.3
- /Subject: Common Criteria, Certification
- /Title: Certification Report BSI-DSZ-CC-0918-V4-2022
- pdf_file_size_bytes: 739803
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
pdf_data/report_filename |
653-EWA CR v1.0.pdf |
0918V4a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_FLR.2 and AVA_VAN.5
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0918-V4-2022
- cert_item: CONEXA 3.0 Version 1.3
- cert_lab: BSI
- developer: Theben AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014, BSI- CC-PP-0073-2014
- CA:
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0918-V3-2022: 3
- BSI-DSZ-CC-0918-V4-2022: 13
- BSI-DSZ-CC-0957-V2-2016: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 8
- EAL 4 augmented: 3
- EAL 5: 3
- EAL 5+: 1
- EAL 6: 1
|
pdf_data/report_keywords/cc_sar |
|
- ALC:
- ALC_CMS.4: 2
- ALC_FLR: 3
- ALC_FLR.2: 4
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- TSystems:
- T-Systems International: 1
- TUV:
- TÜV Informationstechnik: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
- SHA256: 2
- SHA384: 2
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 1
- brainpoolP384r1: 1
- brainpoolP512r1: 1
- NIST:
- secp256r1: 1
- secp384r1: 1
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102-1: 1
- BSI TR-03109-1: 1
- BSI TR-03109-3: 1
- BSI TR-03111: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 32: 1
- AIS 34: 2
- AIS 38: 1
- AIS 46: 2
- AIS 48: 2
- FIPS:
- FIPS 180-4: 4
- FIPS 197: 7
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- RFC:
- RFC 2104: 3
- RFC 3394: 3
- RFC 4493: 6
- RFC 5084: 3
- RFC 5114: 3
- RFC 5246: 3
- RFC 5289: 3
- RFC 5639: 3
- RFC5246: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. The user of the OS is not willfully negligent or hostile, and uses the software in: 1
- out of scope: 1
|
- ConfidentialDocument:
- 0 (ALC_CMS.4), v3.60.0-cc, 2022-02-22, Theben AG (confidential document) [11] Handbuch CONEXA 3.0 für Gateway Administrator, Version 2.10.0, 18.11.2021, Theben AG [12: 1
- Konfigurationsliste Smart Meter Gateway CONEXA 3.0 Version 1.3, Version 1.0, 2022-02-23, Theben AG (confidential document) [10] Configuration list for the TOE SW: ASSURANCE LIFE CYCLE – CONFIGURATION MANAGEMENT DER CONEXA: 1
- Report, Version 2, 2022-03-02, EVALUATION TECHNICAL REPORT SUMMARY, TÜV Informationstechnik GmbH (confidential document) [8] Protection Profile for the Gateway of a Smart Metering System, Version 1.3, 31 March 2014: 1
- Version 1.4, 04.04.2020, Theben AG [19] Impact Analysis Report, Version 0.4, 14.01.2022, Theben AG (confidential document) [20] Technische Richtlinie BSI TR-03109-1 Anforderungen an die Interoperabilität der: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /Author: Clark, Cory P.
- /CreationDate: D:20250218133709-05'00'
- /Creator: Microsoft® Word for Microsoft 365
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ActionId: f4235719-a1a3-4fb4-8b18-a47ac84bac11
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_ContentBits: 1
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Enabled: true
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Method: Privileged
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_Name: UNCLASSIFIED
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SetDate: 2022-07-20T10:41:47Z
- /MSIP_Label_4dd2c6e0-f1e3-4cf2-bd0b-256ab4cff3af_SiteId: da9cbe40-ec1e-4997-afb3-17d87574571a
- /ModDate: D:20250218133709-05'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 336111
- pdf_hyperlinks: https://www.cisa.gov/known-exploited-vulnerabilities-catalog, mailto:[email protected], https://linux.oracle.com/security/, https://nvd.nist.gov/vuln/search
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20220315131752+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smart Meter Gateway, SMGW, Theben 0918_v4"
- /ModDate: D:20220315134621+01'00'
- /Producer: LibreOffice 6.3
- /Subject: Common Criteria, Certification
- /Title: Certification Report BSI-DSZ-CC-0918-V4-2022
- pdf_file_size_bytes: 739803
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
pdf_data/st_filename |
653-EWA ST v1.5.pdf |
0918V4b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0957-V2-2016: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0073: 1
- BSI-CC-PP-0077: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 5
- EAL 4 augmented: 2
- EAL4: 1
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ALC_TSU_EXT.1: 8
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 6
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 3
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 1
- FCS:
- FCS_CKM.1: 4
- FCS_CKM.1.1: 1
- FCS_CKM.2: 4
- FCS_CKM.2.1: 1
- FCS_CKM_EXT.4: 9
- FCS_CKM_EXT.4.1: 3
- FCS_CKM_EXT.4.2: 2
- FCS_COP: 27
- FCS_COP.1: 4
- FCS_DTLS_EXT.1: 1
- FCS_RBG_EXT.1: 8
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SSHC_EXT.1: 10
- FCS_SSHC_EXT.1.1: 2
- FCS_SSHS_EXT.1: 8
- FCS_SSHS_EXT.1.1: 2
- FCS_SSHS_EXT.1.3: 1
- FCS_SSH_EXT.1: 10
- FCS_SSH_EXT.1.1: 2
- FCS_SSH_EXT.1.2: 4
- FCS_SSH_EXT.1.3: 3
- FCS_SSH_EXT.1.4: 3
- FCS_SSH_EXT.1.5: 3
- FCS_SSH_EXT.1.6: 3
- FCS_SSH_EXT.1.7: 3
- FCS_SSH_EXT.1.8: 3
- FCS_STO_EXT.1: 10
- FCS_STO_EXT.1.1: 1
- FCS_TLSC_EXT.1: 11
- FCS_TLSC_EXT.1.1: 3
- FCS_TLSC_EXT.1.2: 3
- FCS_TLSC_EXT.1.3: 3
- FCS_TLSC_EXT.5: 7
- FCS_TLSC_EXT.5.1: 3
- FCS_TLSS_EXT: 5
- FCS_TLSS_EXT.1.1: 1
- FCS_TLS_EXT.1: 3
- FDP:
- FDP_ACF_EXT.1: 8
- FDP_ACF_EXT.1.1: 1
- FDP_IFC_EXT.1: 7
- FDP_IFC_EXT.1.1: 2
- FIA:
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.5: 3
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FMT:
- FMT_MOF_EXT.1: 7
- FMT_MOF_EXT.1.1: 2
- FMT_SMF_EXT.1: 7
- FMT_SMF_EXT.1.1: 4
- FPT:
- FPT_ACF_EXT.1: 7
- FPT_ACF_EXT.1.1: 2
- FPT_ACF_EXT.1.2: 2
- FPT_ASLR_EXT.1: 7
- FPT_ASLR_EXT.1.1: 2
- FPT_SBOP_EXT.1: 7
- FPT_SBOP_EXT.1.1: 2
- FPT_TST_EXT.1: 8
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT.1: 8
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.2: 7
- FPT_TUD_EXT.2.1: 2
- FPT_TUD_EXT.2.2: 2
- FTP:
- FTP_ITC_EXT.1: 7
- FTP_ITC_EXT.1.1: 2
- FTP_TRP: 1
- FTP_TRP.1: 3
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_ARP: 10
- FAU_ARP.1: 1
- FAU_GEN: 38
- FAU_GEN.1: 22
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAA: 11
- FAU_SAA.1: 4
- FAU_SAR: 30
- FAU_SAR.1: 7
- FAU_STG: 32
- FAU_STG.1: 8
- FAU_STG.2: 15
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FAU_STG.3: 3
- FAU_STG.4: 3
- FCO:
- FCO_NRO: 3
- FCO_NRO.1: 1
- FCO_NRO.2: 9
- FCO_NRO.2.1: 1
- FCO_NRO.2.2: 1
- FCO_NRO.2.3: 1
- FCS:
- FCS_CKM: 44
- FCS_CKM.1: 16
- FCS_CKM.2: 6
- FCS_CKM.4: 32
- FCS_CKM.4.1: 1
- FCS_COP: 63
- FCS_COP.1: 10
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 9
- FDP_ACC.2: 11
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF.1: 11
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 3
- FDP_IFC: 29
- FDP_IFC.1: 12
- FDP_IFC.2: 4
- FDP_IFF: 25
- FDP_IFF.1: 24
- FDP_IFF.1.3: 1
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_RIP: 2
- FDP_RIP.1: 1
- FDP_RIP.2: 9
- FDP_RIP.2.1: 1
- FDP_SDI: 2
- FDP_SDI.1: 1
- FDP_SDI.2: 8
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 3
- FIA_ATD.1: 13
- FIA_ATD.1.1: 1
- FIA_UAU: 5
- FIA_UAU.1: 2
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 8
- FIA_UAU.6.1: 1
- FIA_UID: 3
- FIA_UID.1: 8
- FIA_UID.2: 12
- FIA_UID.2.1: 1
- FIA_USB: 3
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 10
- FMT_MOF.1.1: 1
- FMT_MSA: 64
- FMT_MSA.1: 9
- FMT_MSA.3: 12
- FMT_SMF: 2
- FMT_SMF.1: 19
- FMT_SMF.1.1: 1
- FMT_SMR: 3
- FMT_SMR.1: 30
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_CON: 6
- FPR_CON.1: 10
- FPR_CON.1.1: 3
- FPR_CON.1.2: 5
- FPR_PSE: 2
- FPR_PSE.1: 8
- FPR_PSE.1.1: 3
- FPR_PSE.1.2: 2
- FPR_PSE.1.3: 2
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_PHP: 3
- FPT_PHP.1: 8
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_RPL: 3
- FPT_RPL.1: 8
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_STM: 3
- FPT_STM.1: 18
- FPT_STM.1.1: 1
- FPT_TST: 3
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PLATFORM: 3
- A.PROPER_ADMIN: 3
- A.PROPER_USER: 3
- O:
- O.ACCOUNTABILITY: 3
- O.INTEGRITY: 5
- O.MANAGEMENT: 5
- O.PROTECTED_COMMS: 5
- O.PROTECTED_STORAGE: 3
- OE:
- OE.PLATFORM: 3
- OE.PROPER_ADMIN: 3
- OE.PROPER_USER: 3
- T:
- T.LIMITED_PHYSICAL_ACCESS: 2
- T.LOCAL_ATTACK: 2
- T.NETWORK_ATTACK: 6
- T.NETWORK_EAVESDROP: 4
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
- TSystems:
- T-Systems International: 3
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 8
- HMAC-SHA-256: 2
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA2:
- SHA-256: 10
- SHA-384: 8
- SHA-512: 9
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- DTLS:
- TLS:
- TLS: 50
- TLS 1.1: 1
- TLS 1.2: 3
- TLS v1.2: 5
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-384: 14
- P-521: 10
- secp384r1: 4
- secp521r1: 4
|
- NIST:
- NIST P-256: 3
- NIST P-384: 3
- P-256: 3
- P-384: 3
- secp256r1: 3
- secp384r1: 3
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 4
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 4
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 4
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 1
|
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- malfunction: 2
- physical tampering: 4
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI TR-03109: 1
- BSI TR-03109-1: 2
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 186-4: 1
- FIPS PUB 186-5: 12
- NIST:
- NIST SP 800-38A: 9
- NIST SP 800-38D: 3
- NIST SP 800-57: 4
- SP 800-186: 1
- RFC:
- RFC 3526: 1
- RFC 4251: 4
- RFC 4252: 8
- RFC 4253: 13
- RFC 4256: 1
- RFC 4344: 5
- RFC 5246: 9
- RFC 5280: 5
- RFC 5288: 7
- RFC 5289: 14
- RFC 5647: 6
- RFC 5656: 40
- RFC 5759: 1
- RFC 6066: 1
- RFC 6125: 3
- RFC 6187: 12
- RFC 6668: 8
- RFC 6960: 1
- RFC 6961: 1
- RFC 8268: 5
- RFC 8332: 24
- RFC 8603: 2
- RFC 8709: 6
- RFC 8731: 2
- X509:
|
- FIPS:
- FIPS 140-2: 3
- FIPS 180-4: 8
- FIPS 197: 12
- RFC:
- RFC 2104: 6
- RFC 2616: 5
- RFC 3394: 3
- RFC 4493: 8
- RFC 5084: 4
- RFC 5114: 5
- RFC 5246: 7
- RFC 5289: 6
- RFC 5639: 5
- RFC 5905: 4
- RFC5246: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |