name |
Forescout v8.3 |
Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 2.03 |
category |
Network and Network-Related Devices and Systems |
Other Devices and Systems |
scheme |
US |
JP |
status |
active |
archived |
not_valid_after |
20.06.2025 |
07.10.2013 |
not_valid_before |
05.08.2022 |
09.09.2005 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11279-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11279-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0036_ecvr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11279-st.pdf |
|
manufacturer |
ForeScout Technologies, Inc. |
Canon Inc. |
manufacturer_web |
https://www.forescout.com/ |
https://www.canon.com/ |
security_level |
{} |
EAL3 |
dgst |
c1819079f2cf4d17 |
0b61e662b1de9f6c |
heuristics/cert_id |
CCEVS-VR-VID-11279-2022 |
JISEC-CC-CRP-C0036 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
{} |
heuristics/extracted_versions |
8.3 |
2.03 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0386
- certification_date: 01.04.2013
- claim: EAL3+ ALC_FLR.2 PP
- enhanced:
- assurance_level: EAL3 Augmented with ALC_FLR.2
- cc_version: 3.1
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, Fax, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP. TOE security functionality The TOE embodies the following security functions. - User Authentication Function Function for identifying and authenticating the user. - Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. - Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. - Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. - HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. - HDD Data Encryption Function Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP. - LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. - Self-Test Function Function for testing the integrity of the executable code at startup. - Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator. - Management Function Function for restricting device settings that influence security to be made only by the administrator.
- evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
- product: Canon imageRUNNER ADVANCE 8200 Series 2600.1 model (JP)
- product_type: Multifunction Product
- protection_profile: IEEE Std 2600.1-2009
- toe_version: 1.0
- vendor: Canon Inc.
- expiration_date: 01.05.2018
- supplier: Canon Inc.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0386_it2398.html
- toe_japan_name: Canon imageRUNNER ADVANCE 8200 Series 2600.1 model (JP) 1.0
- toe_overseas_link: None
- toe_overseas_name: -----
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
89f2a255423f4a20 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf |
{} |
pdf_data/cert_filename |
st_vid11279-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11279-2022: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20220815124603-04'00'
- /ModDate: D:20220815124603-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 181185
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid11279-vr.pdf |
c0036_ecvr.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID11279-2022
- cert_item: Forescout v8.3
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11279-2022: 1
|
- JP:
- Certification No. C0036: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.2: 1
- FCS_COP: 4
- FCS_RBG_EXT.1: 1
|
|
pdf_data/report_keywords/cc_claims |
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC-SHA-256: 2
- HMAC-SHA-512: 1
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- SSH:
- SSH: 11
- SSHv1: 2
- SSHv2: 1
- TLS:
- VPN:
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20220815113601-04'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20220815113601-04'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 570905
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 29
|
- /CreationDate: D:20060123172731+09'00'
- /ModDate: D:20060123172731+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 14795
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/st_filename |
st_vid11279-st.pdf |
|
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 13
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.1: 6
- ALC_CMS.1: 7
- ASE:
- ASE_CCL.1: 16
- ASE_ECD.1: 12
- ASE_INT.1: 14
- ASE_OBJ.1: 6
- ASE_REQ.1: 12
- ASE_SPD: 2
- ASE_SPD.1: 7
- ASE_TSS.1: 7
- ATE:
- AVA:
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 2
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_STG: 1
- FAU_STG_EXT.1: 5
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM.1: 9
- FCS_CKM.1.1: 2
- FCS_CKM.2: 9
- FCS_CKM.2.1: 2
- FCS_CKM.4: 6
- FCS_CKM.4.1: 1
- FCS_COP: 32
- FCS_COP.1: 4
- FCS_NTP_EXT.1.2: 1
- FCS_NTP_EXT.1.4: 1
- FCS_RBG_EXT.1: 8
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSHC_EXT.1: 1
- FCS_SSHS_EXT.1: 10
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 1
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 1
- FCS_TLSC_EXT.1: 8
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 2
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.1.4: 1
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.2.3: 1
- FCS_TLSS_EXT.1: 8
- FCS_TLSS_EXT.1.1: 1
- FCS_TLSS_EXT.1.2: 1
- FCS_TLSS_EXT.1.3: 2
- FCS_TLSS_EXT.1.4: 4
- FIA:
- FIA_AFL.1: 11
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 7
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 5
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 5
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 5
- FMT_MOF.1: 1
- FMT_MTD: 5
- FMT_MTD.1: 1
- FMT_SMF.1: 8
- FMT_SMR.2: 6
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 6
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT.1: 6
- FPT_SKP_EXT.1.1: 1
- FPT_STM_EXT.1: 6
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 2
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 5
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 5
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 6
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 5
- FTP_TRP.1: 3
|
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTION: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINISTRATOR: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 5
- HMAC-SHA-256: 8
- HMAC-SHA-384: 4
- HMAC-SHA-512: 4
|
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 5
- DHE: 1
- Diffie-Hellman: 9
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 11
- SHA-384: 8
- SHA-512: 6
- SHA256: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- DTLS:
- SSL:
- SSL: 3
- SSL 2.0: 2
- SSL 3.0: 2
- TLS:
- TLS: 69
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 2
- TLS v1.2: 1
- TLSv1.0: 1
- TLSv1.1: 1
- TLSv1.2: 2
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA256: 4
- TLS_RSA_WITH_AES_256_CBC_SHA: 4
- TLS_RSA_WITH_AES_256_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_GCM_SHA384: 4
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-004-001: 1
- CCMB-2017-004-002: 1
- CCMB-2017-004-003: 1
- CCMB-2017-004-004: 1
- FIPS:
- FIPS 186-4: 8
- FIPS PUB 180-4: 2
- FIPS PUB 186-4: 5
- FIPS PUB 198-1: 1
- ISO:
- ISO/IEC 10116:2017: 1
- ISO/IEC 18031:2011: 4
- ISO/IEC 19772:2009: 1
- ISO/IEC 9796-2: 2
- PKCS:
- RFC:
- RFC 2986: 2
- RFC 3268: 4
- RFC 3447: 2
- RFC 3526: 10
- RFC 4253: 1
- RFC 5077: 1
- RFC 5246: 10
- RFC 5280: 4
- RFC 5288: 4
- RFC 6125: 2
- RFC 6960: 2
- RFC7030: 1
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- environment the TOE is managing. The TOEs management of the enterprise operational environment is out of scope for the NDcPP. Therefore, interface E4 to these components is out of scope of the evaluation: 1
- out of scope: 3
- the update server directly. The TOE receives the update from the Forescout Console. Interface E8 is out of scope of the evaluation. It is being declared as part of the test environment for completeness as it is: 1
|
|
pdf_data/st_metadata |
- /Author: McGeady, Megan [USA]
- /CreationDate: D:20230504103519-04'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20230504103519-04'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 1111513
- pdf_hyperlinks: https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0639, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0631, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0638, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0564, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0580, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0592, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0670, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0538, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0569, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0635, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0555, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0536, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0571, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0546, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0528, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0636, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0563, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0581, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0537, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0633, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0547, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0591, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0632, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0556, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0570, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0527, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0572, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0634
- pdf_is_encrypted: False
- pdf_number_of_pages: 69
|
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
False |
state/st/download_ok |
True |
False |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |