name |
Juniper Networks Odyssey Access Client (FIPS Edition), Version 4.56 |
Huawei EulerOS v2.0 (V200R002C20) |
category |
Network and Network-Related Devices and Systems |
Operating Systems |
scheme |
US |
ES |
status |
archived |
archived |
not_valid_after |
20.07.2012 |
17.06.2024 |
not_valid_before |
23.09.2008 |
17.06.2019 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-02-CCRA.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10245-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-02-INF-2787.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10245-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-02-ST.pdf |
manufacturer |
Juniper Networks, Inc. |
Huawei Technologies Co. Ltd. |
manufacturer_web |
https://www.juniper.net/ |
https://www.huawei.com |
security_level |
EAL3+, ALC_FLR.2 |
EAL4+, ALC_FLR.3 |
dgst |
c974eb48324fee97 |
5a4e031cc98c8def |
heuristics/cert_id |
CCEVS-VR-VID-10245-2008 |
2018-2-INF-2787 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ATE_IND.2, ATE_DPT.1, AVA_SOF.1, ALC_FLR.2 |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
4.56 |
2.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Wireless LAN
- certification_date: 23.09.2008
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date:
- id: CCEVS-VR-VID10245
- product: Juniper Networks Odyssey Access Client (FIPS Edition), Version 4.56
- scheme: US
- url: https://www.niap-ccevs.org/product/10245
- vendor: Juniper Networks, Inc.
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
70cdc8b0cf910af7 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0067b_pdf.pdf |
pdf_data/cert_filename |
|
2018-02-CCRA.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL4: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Huawei:
- Huawei: 2
- Huawei Technologies Co: 2
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 2712659
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
st_vid10245-vr.pdf |
2018-02-INF-2787.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10245-2008
- cert_item: Odyssey Access Client (FIPS Edition), Version 4.56
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10245-2008: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 3: 1
- EAL3: 6
- EAL3 augmented: 2
|
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL4: 9
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 3
- ALC_FLR.3: 7
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.2: 1
- FAU_GEN_EXP.1: 1
- FAU_SAA.1: 1
- FAU_SAR.1: 1
- FAU_SAR.2: 1
- FAU_SAR.3: 1
- FAU_SEL.1: 1
- FAU_STG.1: 1
- FAU_STG.3: 1
- FCS:
- FCS_BCM_EXP.1: 1
- FCS_CKM.1: 3
- FCS_CKM.4: 1
- FCS_CKM_EXP.2: 1
- FCS_COP_EXP.1: 1
- FCS_COP_EXP.2: 10
- FDP:
- FDP_IFC.1: 1
- FDP_IFF.1: 1
- FDP_RIP.1: 2
- FIA:
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 1
- FMT_MTD.1: 1
- FMT_SMF.1: 3
- FMT_SMR.1: 1
- FPT:
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_STM.1: 1
- FPT_TST_EXP.1: 1
- FPT_TST_EXP.2: 1
- FTP:
|
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FAU_SAR.1: 1
- FAU_SAR.2: 1
- FAU_SEL.1: 1
- FAU_STG.1: 1
- FAU_STG.3: 1
- FAU_STG.4: 1
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 1
- FCS_COP.1: 1
- FCS_RNG.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_IFC.2: 1
- FDP_IFF.1: 1
- FDP_ITC.2: 1
- FDP_RIP.2: 1
- FDP_RIP.3: 1
- FDP_SDI.2: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 1
- FIA_SOS.1: 1
- FIA_UAU.1: 1
- FIA_UAU.5: 1
- FIA_UAU.7: 1
- FIA_UID.1: 1
- FIA_USB.2: 1
- FMT:
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_MSA.4: 1
- FMT_MTD.1: 1
- FMT_REV.1: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FMT_SMR.2: 1
- FPT:
- FPT_STM.1: 1
- FPT_TDC.1: 1
- FPT_TIM.1: 1
- FTA:
- FTA_SSL.1: 1
- FTA_SSL.2: 1
- FTP:
|
pdf_data/report_keywords/cc_claims |
- A:
- A.BASIC_ROBUSTNESS_IT_: 1
- A.NO_EVIL: 1
- A.PHYSICAL: 1
|
|
pdf_data/report_keywords/vendor |
|
- Huawei:
- Huawei: 13
- Huawei Technologies Co: 3
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS 140: 1
- FIPS 140-2: 5
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
st_vid10245-st.pdf |
2018-02-ST.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0067: 2
- BSI-CC-PP-0067: 3
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 3: 2
- EAL2: 1
- EAL2 augmented: 1
- EAL3: 4
- EAL3 augmented: 2
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.2: 1
- ACM_CAP.3: 20
- ACM_SCP.1: 7
- ADO:
- ADO_DEL.1: 7
- ADO_IGS.1: 7
- ADV:
- ADV_FSP.1: 12
- ADV_HLD.1: 2
- ADV_HLD.2: 18
- ADV_RCR.1: 8
- AGD:
- AGD_ADM.1: 13
- AGD_USR.1: 11
- ALC:
- ALC_DVS.1: 11
- ALC_FLR.2: 20
- ATE:
- ATE_COV.1: 1
- ATE_COV.2: 9
- ATE_DPT.1: 7
- ATE_FUN.1: 15
- ATE_IND.1: 1
- ATE_IND.2: 8
- AVA:
- AVA_MSU.1: 12
- AVA_SOF.1: 8
- AVA_VLA.1: 10
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 4
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 7
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.2: 2
- FAU_GEN.2.1: 1
- FAU_GEN_EXP: 2
- FAU_GEN_EXP.1: 5
- FAU_GEN_EXP.1.1: 1
- FAU_GEN_EXP.1.2: 1
- FAU_SAA.1: 2
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 2
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 2
- FAU_SAR.2.1: 1
- FAU_SAR.3: 2
- FAU_SAR.3.1: 1
- FAU_SEL: 3
- FAU_SEL.1: 4
- FAU_SEL.1.1: 1
- FAU_STG: 1
- FAU_STG.1: 2
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 2
- FAU_STG.3.1: 1
- FCS:
- FCS_BCM_EXP: 1
- FCS_BCM_EXP.1: 4
- FCS_BCM_EXP.1.1: 1
- FCS_BCM_EXP.1.2: 1
- FCS_BCM_EXP.1.3: 1
- FCS_CKM: 1
- FCS_CKM.1: 35
- FCS_CKM.2: 3
- FCS_CKM.4: 21
- FCS_CKM.4.1: 1
- FCS_CKM_EXP: 1
- FCS_CKM_EXP.2: 4
- FCS_CKM_EXP.2.1: 1
- FCS_COP.1: 3
- FCS_COP_EXP: 1
- FCS_COP_EXP.1: 3
- FCS_COP_EXP.1.1: 1
- FCS_COP_EXP.2: 66
- FCS_COP_EXP.2.1: 2
- FDP:
- FDP_IFC.1: 7
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 4
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_ITC.1: 8
- FDP_ITC.2: 8
- FDP_RIP: 1
- FDP_RIP.1: 13
- FIA:
- FIA_USB.1: 2
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 2
- FMT_MOF.1.1: 1
- FMT_MSA: 2
- FMT_MSA.2: 20
- FMT_MSA.2.1: 1
- FMT_MSA.3: 3
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 20
- FMT_SMF.1.1: 1
- FMT_SMR.1: 2
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 2
- FPT_RVM.1.1: 1
- FPT_SEP.1: 2
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 3
- FPT_STM.1.1: 1
- FPT_TST: 1
- FPT_TST_EXP: 2
- FPT_TST_EXP.1: 7
- FPT_TST_EXP.1.1: 1
- FPT_TST_EXP.1.2: 1
- FPT_TST_EXP.1.3: 1
- FPT_TST_EXP.2: 4
- FPT_TST_EXP.2.1: 1
- FPT_TST_EXP.2.2: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_GEN.1: 14
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 5
- FAU_SAR.2.1: 1
- FAU_SEL.1: 9
- FAU_SEL.1.1: 1
- FAU_STG.1: 9
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 7
- FAU_STG.3.1: 1
- FAU_STG.4: 9
- FAU_STG.4.1: 2
- FCS:
- FCS_CKM.1: 54
- FCS_CKM.1.1: 4
- FCS_CKM.2: 13
- FCS_CKM.2.1: 1
- FCS_CKM.4: 15
- FCS_CKM.4.1: 1
- FCS_COP.1: 38
- FCS_COP.1.1: 3
- FCS_RNG: 3
- FCS_RNG.1: 34
- FCS_RNG.1.1: 6
- FCS_RNG.1.2: 7
- FDP:
- FDP_ACC.1: 25
- FDP_ACC.1.1: 2
- FDP_ACF.1: 19
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 5
- FDP_IFC.2: 7
- FDP_IFC.2.1: 1
- FDP_IFC.2.2: 1
- FDP_IFF.1: 11
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 7
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC: 1
- FDP_ITC.1: 5
- FDP_ITC.2: 13
- FDP_ITC.2.1: 2
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_RIP: 1
- FDP_RIP.2: 17
- FDP_RIP.2.1: 1
- FDP_RIP.3: 20
- FDP_RIP.3.1: 2
- FDP_SDI.2: 9
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 14
- FIA_ATD.1.1: 2
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UID.1: 13
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 5
- FIA_USB.2: 11
- FIA_USB.2.1: 2
- FIA_USB.2.2: 2
- FIA_USB.2.3: 2
- FIA_USB.2.4: 2
- FMT:
- FMT_MSA.1: 17
- FMT_MSA.1.1: 2
- FMT_MSA.3: 21
- FMT_MSA.3.1: 3
- FMT_MSA.3.2: 3
- FMT_MSA.4: 5
- FMT_MSA.4.1: 1
- FMT_MTD.1: 104
- FMT_MTD.1.1: 18
- FMT_REV.1: 12
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF.1: 27
- FMT_SMF.1.1: 1
- FMT_SMR.1: 31
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SMR.2: 6
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FMT_TIM.1: 1
- FPT:
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TDC.1: 8
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TIM: 4
- FPT_TIM.1: 14
- FPT_TIM.1.1: 3
- FPT_TIM.1.2: 3
- FTA:
- FTA_SSL.1: 5
- FTA_SSL.1.1: 1
- FTA_SSL.1.2: 1
- FTA_SSL.2: 5
- FTA_SSL.2.1: 1
- FTA_SSL.2.2: 1
- FTP:
- FTP_ITC.1: 9
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.BASIC_ROBUSTNESS_IT_ENVIRONMENT: 2
- A.NO_EVIL: 1
- A.PHYSICAL: 1
- O:
- O.ADMIN_GUIDANCE: 1
- O.AUDIT_GENERATION: 1
- O.CONFIGURATION_: 1
- O.CORRECT_: 1
- O.CORRECT_TSF_OPERATION: 1
- O.CRYPTOGRAPHY: 4
- O.DOCUMENTED_: 1
- O.MANAGE: 1
- O.PARTIAL_: 1
- O.RESIDUAL_: 1
- O.VULNERABILITY_: 1
- OE:
- OE.BASIC_ROBUSTNESS_OS: 2
- OE.CRYPTOGRAPHY: 3
- OE.MANAGE: 1
- OE.NO_EVIL: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_: 1
- OE.SELF_: 1
- OE.TIME_STAMPS: 1
- OE.TOE_ACCESS: 1
- T:
- T.ACCIDENTAL_ADMIN_: 1
- T.CRYPTO_COMPROMISE: 1
- T.POOR_DESIGN: 1
- T.POOR_IMPLEMENTATION: 1
- T.POOR_TEST: 1
- T.RESIDUAL_DATA: 1
- T.TSF_COMPROMISE: 1
|
- A:
- A.AUTHUSER: 4
- A.CONNECT: 4
- A.DETECT: 5
- A.INTEGRITY: 2
- A.MANAGE: 6
- A.PEER: 6
- A.PHYSICAL: 4
- A.PROTECT: 3
- A.TRAINEDUSER: 4
- O:
- O.AUDITING: 15
- O.CP: 15
- O.CRYPTO: 15
- O.DISCRETIONARY: 11
- O.INTEGRITY: 39
- O.MANAGE: 26
- O.NETWORK: 12
- O.ROLE: 17
- O.SUBJECT: 11
- O.TRUSTED_CHANNEL: 5
- OE:
- OE.ADMIN: 5
- OE.INFO_PROTECT: 8
- OE.INSTALL: 5
- OE.MAINTENANCE: 3
- OE.PHYSICAL: 4
- OE.RECOVER: 4
- OE.REMOTE: 4
- OE.SECURE_LOAD: 3
- OE.SECURE_OPERATION: 3
- OE.TRUSTED: 5
- T:
- T.ACCESS: 22
- T.ALTER: 14
- T.IA: 6
- T.RESTRICT: 3
- T.ROLE: 6
|
pdf_data/st_keywords/vendor |
|
- Huawei:
- Huawei: 12
- Huawei Technologies Co: 6
- Infineon:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-256: 4
- SHA-384: 2
- SHA-512: 2
- SHA256: 1
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- KEX:
- Key Exchange: 1
- Key exchange: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 20
- IKEv1: 8
- IKEv2: 8
- IPsec:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 21
- TLS 1.1: 1
- TLS 1.2: 1
- TLSv1.0: 1
- TLSv1.1: 3
- TLSv1.2: 1
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 1
- P-384: 1
- P-521: 1
- curve P-256: 1
- curve P-384: 1
- curve P-521: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_DSS_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_DSS_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_DSS_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_DSS_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_DSS_WITH_AES_256_CBC_SHA256: 1
- TLS_DHE_DSS_WITH_AES_256_GCM_SHA384: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA25: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA2: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA3: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA3: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140: 4
- FIPS 140-1: 8
- FIPS 140-2: 20
- FIPS 180-2: 1
- FIPS 186-2: 8
- FIPS 197: 1
- FIPS 198: 1
- FIPS PUB 140-1: 1
- PKCS:
- RFC:
|
- BSI:
- FIPS:
- FIPS 140-2: 3
- FIPS 180-4: 2
- FIPS 198-1: 1
- FIPS PUB 186-3: 6
- FIPS PUB 186-4: 4
- FIPS140-2: 1
- FIPS180-4: 1
- FIPS197: 1
- NIST:
- RFC:
- RFC 4252: 4
- RFC 4253: 5
- RFC 4301: 2
- RFC 4303: 2
- RFC 5246: 5
- RFC 768: 1
- RFC 791: 1
- RFC 792: 1
- RFC 793: 1
- RFC2401: 1
- RFC2402: 1
- RFC2406: 1
- RFC2407: 1
- RFC2408: 1
- RFC2409: 2
- RFC3526: 1
- RFC3602: 2
- RFC4252: 5
- RFC4253: 9
- RFC4301: 2
- RFC4303: 3
- RFC4307: 2
- RFC4346: 1
- RFC5114: 1
- RFC5246: 5
- RFC5656: 1
- RFC5996: 2
- RFC6668: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store: 1
- PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation: 1
- as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also: 1
- out of scope: 3
|
pdf_data/st_metadata |
- /Author: SAIC
- /Company: SAIC
- /CreationDate: D:20080926111130-04'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /Manager: Rick O'Donnel
- /ModDate: D:20080926124308-04'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20080811191258
- /Subject: Security Target
- /Title: Juniper OAC Security Target
- pdf_file_size_bytes: 449660
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 47
|
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |