| name |
Juniper Networks Odyssey Access Client (FIPS Edition), Version 4.56 |
CN Series Encryptor comprising of the models CN4010/CN4020/CN6010/CN6140/CN9100/CN9120 running software version 5.0.2 |
| category |
Network and Network-Related Devices and Systems |
Network and Network-Related Devices and Systems |
| scheme |
US |
FR |
| status |
archived |
active |
| not_valid_after |
20.07.2012 |
07.07.2026 |
| not_valid_before |
23.09.2008 |
07.07.2021 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2021_31.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10245-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_31en.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10245-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_31en.pdf |
| manufacturer |
HPE Juniper Networking |
Senetas Corporation Ltd, Distributed by Thales SA (SafeNet) |
| manufacturer_web |
https://www.juniper.net/ |
https://www.senetas.com/ |
| security_level |
ALC_FLR.2, EAL3+ |
EAL4+, ALC_FLR.3 |
| dgst |
c974eb48324fee97 |
34a1559c4bfcf5e0 |
| heuristics/cert_id |
CCEVS-VR-VID-10245-2008 |
ANSSI-CC-2021/31 |
| heuristics/cert_lab |
US |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ALC_DVS.1, ATE_IND.2, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, ALC_FLR.2, AGD_USR.1, ATE_COV.2, ADV_HLD.2, ATE_FUN.1, ADV_FSP.1 |
ADV_TDS.3, AVA_VAN.3, ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_DPT.1, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_DVS.1, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_ARC.1 |
| heuristics/extracted_versions |
4.56 |
5.0.2 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10245/
- categories: ['Wireless LAN']
- category: Wireless LAN
- certification_date: 23.09.2008
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date:
- id: CCEVS-VR-VID10245
- product: Juniper Networks Odyssey Access Client (FIPS Edition), Version 4.56
- scheme: US
- url: https://www.niap-ccevs.org/products/10245
- vendor: HPE Juniper Networking
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
|
certificat-2021_31.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /Author:
- /CreationDate: D:20210809120106+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20210809120106+02'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 299426
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
| pdf_data/report_filename |
st_vid10245-vr.pdf |
anssi-cc-2021_31en.pdf |
| pdf_data/report_frontpage |
- FR:
- US:
- cert_id: CCEVS-VR-VID10245-2008
- cert_item: Odyssey Access Client (FIPS Edition), Version 4.56
- cert_lab: US NIAP
|
|
| pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10245-2008: 1
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 3: 1
- EAL3: 6
- EAL3 augmented: 2
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 1
- EAL 5: 1
- EAL 7: 1
- EAL2: 2
- EAL4+: 1
- EAL7: 1
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_FLR.3: 2
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.2: 1
- FAU_GEN_EXP.1: 1
- FAU_SAA.1: 1
- FAU_SAR.1: 1
- FAU_SAR.2: 1
- FAU_SAR.3: 1
- FAU_SEL.1: 1
- FAU_STG.1: 1
- FAU_STG.3: 1
- FCS:
- FCS_BCM_EXP.1: 1
- FCS_CKM.1: 3
- FCS_CKM.4: 1
- FCS_CKM_EXP.2: 1
- FCS_COP_EXP.1: 1
- FCS_COP_EXP.2: 10
- FDP:
- FDP_IFC.1: 1
- FDP_IFF.1: 1
- FDP_RIP.1: 2
- FIA:
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 1
- FMT_MTD.1: 1
- FMT_SMF.1: 3
- FMT_SMR.1: 1
- FPT:
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_STM.1: 1
- FPT_TST_EXP.1: 1
- FPT_TST_EXP.2: 1
- FTP:
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.BASIC_ROBUSTNESS_IT_: 1
- A.NO_EVIL: 1
- A.PHYSICAL: 1
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS 140: 1
- FIPS 140-2: 5
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
|
- /Author:
- /CreationDate: D:20210809142515+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20210809142515+02'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 141347
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
| pdf_data/st_filename |
st_vid10245-st.pdf |
anssi-cible-cc-2021_31en.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 3: 2
- EAL2: 1
- EAL2 augmented: 1
- EAL3: 4
- EAL3 augmented: 2
|
- EAL:
- EAL4: 4
- EAL4 augmented: 2
|
| pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.2: 1
- ACM_CAP.3: 20
- ACM_SCP.1: 7
- ADO:
- ADO_DEL.1: 7
- ADO_IGS.1: 7
- ADV:
- ADV_FSP.1: 12
- ADV_HLD.1: 2
- ADV_HLD.2: 18
- ADV_RCR.1: 8
- AGD:
- AGD_ADM.1: 13
- AGD_USR.1: 11
- ALC:
- ALC_DVS.1: 11
- ALC_FLR.2: 20
- ATE:
- ATE_COV.1: 1
- ATE_COV.2: 9
- ATE_DPT.1: 7
- ATE_FUN.1: 15
- ATE_IND.1: 1
- ATE_IND.2: 8
- AVA:
- AVA_MSU.1: 12
- AVA_SOF.1: 8
- AVA_VLA.1: 10
|
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 9
- ADV_IMP.1: 5
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 8
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 6
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 3
- ALC_FLR.3: 6
- ALC_LCD.1: 3
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 6
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.2: 2
- FAU_GEN.2.1: 1
- FAU_GEN_EXP: 2
- FAU_GEN_EXP.1: 5
- FAU_GEN_EXP.1.1: 1
- FAU_GEN_EXP.1.2: 1
- FAU_SAA.1: 2
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 2
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 2
- FAU_SAR.2.1: 1
- FAU_SAR.3: 2
- FAU_SAR.3.1: 1
- FAU_SEL: 3
- FAU_SEL.1: 4
- FAU_SEL.1.1: 1
- FAU_STG: 1
- FAU_STG.1: 2
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 2
- FAU_STG.3.1: 1
- FCS:
- FCS_BCM_EXP: 1
- FCS_BCM_EXP.1: 4
- FCS_BCM_EXP.1.1: 1
- FCS_BCM_EXP.1.2: 1
- FCS_BCM_EXP.1.3: 1
- FCS_CKM: 1
- FCS_CKM.1: 35
- FCS_CKM.2: 3
- FCS_CKM.4: 21
- FCS_CKM.4.1: 1
- FCS_CKM_EXP: 1
- FCS_CKM_EXP.2: 4
- FCS_CKM_EXP.2.1: 1
- FCS_COP.1: 3
- FCS_COP_EXP: 1
- FCS_COP_EXP.1: 3
- FCS_COP_EXP.1.1: 1
- FCS_COP_EXP.2: 66
- FCS_COP_EXP.2.1: 2
- FDP:
- FDP_IFC.1: 7
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 4
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_ITC.1: 8
- FDP_ITC.2: 8
- FDP_RIP: 1
- FDP_RIP.1: 13
- FIA:
- FIA_USB.1: 2
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 2
- FMT_MOF.1.1: 1
- FMT_MSA: 2
- FMT_MSA.2: 20
- FMT_MSA.2.1: 1
- FMT_MSA.3: 3
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 20
- FMT_SMF.1.1: 1
- FMT_SMR.1: 2
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 2
- FPT_RVM.1.1: 1
- FPT_SEP.1: 2
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 3
- FPT_STM.1.1: 1
- FPT_TST: 1
- FPT_TST_EXP: 2
- FPT_TST_EXP.1: 7
- FPT_TST_EXP.1.1: 1
- FPT_TST_EXP.1.2: 1
- FPT_TST_EXP.1.3: 1
- FPT_TST_EXP.2: 4
- FPT_TST_EXP.2.1: 1
- FPT_TST_EXP.2.2: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FCS:
- FCS_CKM: 126
- FCS_CKM.1: 19
- FCS_CKM.2: 8
- FCS_CKM.4: 20
- FCS_COP: 97
- FCS_COP.1: 10
- FDP:
- FDP_ACC.1: 2
- FDP_DAU.1: 10
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_IFC.1: 15
- FDP_IFC.1.1: 1
- FDP_IFF.1: 11
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 16
- FDP_ITC.2: 16
- FDP_UCT.1: 9
- FDP_UCT.1.1: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UAU.5: 10
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 2
- FIA_UID.1: 2
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 2
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 9
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 17
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_STM.1: 12
- FPT_STM.1.1: 1
- FPT_TST.1: 10
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 10
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 11
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.BASIC_ROBUSTNESS_IT_ENVIRONMENT: 2
- A.NO_EVIL: 1
- A.PHYSICAL: 1
- O:
- O.ADMIN_GUIDANCE: 1
- O.AUDIT_GENERATION: 1
- O.CONFIGURATION_: 1
- O.CORRECT_: 1
- O.CORRECT_TSF_OPERATION: 1
- O.CRYPTOGRAPHY: 4
- O.DOCUMENTED_: 1
- O.MANAGE: 1
- O.PARTIAL_: 1
- O.RESIDUAL_: 1
- O.VULNERABILITY_: 1
- OE:
- OE.BASIC_ROBUSTNESS_OS: 2
- OE.CRYPTOGRAPHY: 3
- OE.MANAGE: 1
- OE.NO_EVIL: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_: 1
- OE.SELF_: 1
- OE.TIME_STAMPS: 1
- OE.TOE_ACCESS: 1
- T:
- T.ACCIDENTAL_ADMIN_: 1
- T.CRYPTO_COMPROMISE: 1
- T.POOR_DESIGN: 1
- T.POOR_IMPLEMENTATION: 1
- T.POOR_TEST: 1
- T.RESIDUAL_DATA: 1
- T.TSF_COMPROMISE: 1
|
- A:
- A.ADMIN: 5
- A.AUDIT: 5
- A.CA: 4
- A.FTP_SERVER: 4
- A.INSTALL: 6
- A.LOCATE: 7
- A.MANAGEMENT_TERMINAL: 4
- A.SECURE_INSTALL: 4
- A.SECURE_INSTALLATION: 2
- A.TIME: 4
- D:
- D.CERTIFICATE: 6
- D.DEK: 8
- D.ECDSA_KEYS: 7
- D.ENCRYPTOR_CONFIG: 4
- D.ENCRYPTOR_TIME: 4
- D.KEK: 7
- D.LOGS: 4
- D.MANAGEMENT_DATA: 7
- D.MASTER_KEY: 10
- D.PRIVACY_KEY: 7
- D.RSA_KEY: 1
- D.RSA_KEYS: 6
- D.USR_DATA: 8
- D.USR_PWD: 5
- O:
- O.AUDIT: 13
- O.CERT_MANAGEMENT: 21
- O.DATA_PROTECTION: 18
- O.FLOW: 19
- O.KEY_MANAGEMENT: 31
- O.REMOTE_MANAGEMENT: 12
- O.ROLE_MANAGEMENT: 22
- O.SECURE_STATE: 10
- OE:
- OE.AUDIT_LOG: 9
- OE.CA: 12
- OE.FTP_SERVER: 11
- OE.MANAGEMENT: 12
- OE.PERSONNEL: 21
- OE.PHYSICAL_PROTECTION: 13
- OE.RELIABLE_TIME: 10
- OE.SETUP_AND_INSTALL: 13
- OE.SETUP_AND_INSTALLATION: 3
- T:
- T.ILLEGAL_DATA_ACCESS: 9
- T.IMPERSON: 12
- T.LINK_INFORMATION: 10
- T.PHYSICAL_ATTACK: 9
- T.UNAUTHORIZED_CONNECTION: 10
- T.UNIT_COMPROMISE: 6
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
- NIST:
- NIST P-256: 2
- P-256: 16
- P-384: 18
- P-521: 18
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140: 4
- FIPS 140-1: 8
- FIPS 140-2: 20
- FIPS 180-2: 1
- FIPS 186-2: 8
- FIPS 197: 1
- FIPS 198: 1
- FIPS PUB 140-1: 1
- PKCS:
- RFC:
|
- CC:
- FIPS:
- FIPS 140-2: 3
- FIPS PUB 140-2: 6
- FIPS PUB 180-1: 1
- FIPS PUB 180-4: 1
- FIPS PUB 186-2: 1
- FIPS PUB 186-4: 3
- FIPS PUB 197: 5
- FIPS PUB 198-1: 1
- NIST:
- PKCS:
- PKCS #1: 2
- PKCS #3: 1
- PKCS 12: 1
- PKCS#1: 1
- PKCS#3: 1
- RFC:
- RFC 2459: 1
- RFC 2574: 1
- RFC2574: 1
- X509:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- TACACS+1 authentication server; 1 TACACS+ uses non-compliant algorithms and is considered to be out of scope of the certification. To be in a certified configuration TACACS+ should not be enabled. Senetas: 1
- a remote TACACS+ server. TACACS+ is 3 TACACS+ uses non-compliant algorithms and is considered to be out of scope of the certification. To be in a certified configuration TACACS+ should not be enabled Senetas: 1
- out of scope: 2
|
| pdf_data/st_metadata |
- /Author: SAIC
- /Company: SAIC
- /CreationDate: D:20080926111130-04'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /Manager: Rick O'Donnel
- /ModDate: D:20080926124308-04'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20080811191258
- /Subject: Security Target
- /Title: Juniper OAC Security Target
- pdf_file_size_bytes: 449660
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 47
|
- /Author: ben
- /CreationDate: D:20210521143717+10'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20210521143717+10'00'
- /Producer: Acrobat Distiller 10.1.16 (Windows)
- /Title: Microsoft Word - CN_Series_Encryptor_ST_EAL4+_v2.0_Public.docx
- pdf_file_size_bytes: 1080467
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 60
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |