Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Juniper Networks Odyssey Access Client (FIPS Edition), Version 4.56
CCEVS-VR-VID-10245-2008
Samsung Multifunction MultiXpress K4250, K4300, K4350, K401, X4220, X4250, X4300, X401, X400, K7400, K7500, K7600, X7400, X7500, X7600, X704, X706, K705, K706 Series
KECS-CISS-1035-2020
name Juniper Networks Odyssey Access Client (FIPS Edition), Version 4.56 Samsung Multifunction MultiXpress K4250, K4300, K4350, K401, X4220, X4250, X4300, X401, X400, K7400, K7500, K7600, X7400, X7500, X7600, X704, X706, K705, K706 Series
category Network and Network-Related Devices and Systems Multi-Function Devices
scheme US KR
status archived active
not_valid_after 20.07.2012 26.08.2025
not_valid_before 23.09.2008 26.08.2020
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10245-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CISS-1035-2020_CR_EN.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10245-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CISS-1035-2020_ST_EN.pdf
manufacturer Juniper Networks, Inc. HP Inc.
manufacturer_web https://www.juniper.net/ https://www8.hp.com/hpnext/tags/hp-inc#.Vjdf803sn4g
security_level EAL3+, ALC_FLR.2 EAL2+, ALC_FLR.2
dgst c974eb48324fee97 d5eaadb952636ef2
heuristics/cert_id CCEVS-VR-VID-10245-2008 KECS-CISS-1035-2020
heuristics/cert_lab US []
heuristics/extracted_sars ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ATE_IND.2, ATE_DPT.1, AVA_SOF.1, ALC_FLR.2 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 4.56 -
heuristics/scheme_data
  • category: Wireless LAN
  • certification_date: 23.09.2008
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date:
  • id: CCEVS-VR-VID10245
  • product: Juniper Networks Odyssey Access Client (FIPS Edition), Version 4.56
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10245
  • vendor: Juniper Networks, Inc.
  • category: Digital Multifunction Printer
  • cert_id: KECS-CISS-1035-2020
  • certification_date: 26.08.2020
  • enhanced:
    • assurance_level: EAL2+
    • cc_version: CC V3.1 R5
    • cert_id: KECS-CISS-1035-2020
    • cert_link: https://itscc.kr/file/download.do?file=KPR100000001577
    • certification_date: 26.08.2020
    • developer: HP Printing Korea Co., Ltd
    • expiration_date: 26.08.2025
    • holder: HP Inc.
    • maintenance_update: [frozendict({'name': 'Samsung Multifunction MultiXpress K4250, K4300, K4350, K401, X4220, X4250, X4300, X401, X400, K7400, K7500, K7600, X7400, X7500, X7600, X704, X706, K705, K706 Series Assurance maintenance1', 'certification_date': datetime.date(2023, 11, 9), 'cert_id': 'KECS-CISS-1035a-2020', 'maintenance_link': 'https://itscc.kr/file/download.do?file=KPR200000001712', 'target_link': 'https://itscc.kr/file/download.do?file=KPR200000001713'})]
    • product: Samsung Multifunction MultiXpress K4250, K4300, K4350, K401, X4220, X4250, X4300, X401, X400, K7400, K7500, K7600, X7400, X7500, X7600, X704, X706, K705, K706 Series
    • product_type: Digital Multifunction Printer
    • protection_profile: U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std.2600.2-2009)
    • report_link: https://itscc.kr/file/download.do?file=KPR100000001569
    • target_link: https://itscc.kr/file/download.do?file=KPR100000001570
  • level: EAL2+
  • product: Samsung Multifunction MultiXpress K4250, K4300, K4350, K401, X4220, X4250, X4300, X401, X400, K7400, K7500, K7600, X7400, X7500, X7600, X704, X706, K705, K706 Series
  • product_link: https://itscc.kr/certprod/view.do?product_id=1035&product_class=1
  • vendor: HP Inc.
heuristics/protection_profiles {} 154ef77c252799ee
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0058b.pdf.pdf
pdf_data/report_filename st_vid10245-vr.pdf KECS-CISS-1035-2020_CR_EN.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID10245-2008
    • cert_item: Odyssey Access Client (FIPS Edition), Version 4.56
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10245-2008: 1
  • KR:
    • KECS-CISS-1035-2020: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 3: 1
    • EAL3: 6
    • EAL3 augmented: 2
  • EAL:
    • EAL2: 2
    • EAL2 augmented: 2
    • EAL2+: 5
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 3
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.2: 3
    • ADV_TDS.1: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
    • ALC_FLR.2: 4
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.2: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 3
  • ATE:
    • ATE_COV.1: 4
    • ATE_FUN.1: 3
    • ATE_IND.2: 5
  • AVA:
    • AVA_VAN.2: 5
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.2: 1
    • FAU_GEN_EXP.1: 1
    • FAU_SAA.1: 1
    • FAU_SAR.1: 1
    • FAU_SAR.2: 1
    • FAU_SAR.3: 1
    • FAU_SEL.1: 1
    • FAU_STG.1: 1
    • FAU_STG.3: 1
  • FCS:
    • FCS_BCM_EXP.1: 1
    • FCS_CKM.1: 3
    • FCS_CKM.4: 1
    • FCS_CKM_EXP.2: 1
    • FCS_COP_EXP.1: 1
    • FCS_COP_EXP.2: 10
  • FDP:
    • FDP_IFC.1: 1
    • FDP_IFF.1: 1
    • FDP_RIP.1: 2
  • FIA:
    • FIA_USB.1: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.2: 1
    • FMT_MSA.3: 1
    • FMT_MTD.1: 1
    • FMT_SMF.1: 3
    • FMT_SMR.1: 1
  • FPT:
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
    • FPT_STM.1: 1
    • FPT_TST_EXP.1: 1
    • FPT_TST_EXP.2: 1
  • FTP:
    • FTP_ITC.1: 1
  • FPT:
    • FPT_FDI_EXP: 1
    • FPT_FDI_EXP.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.BASIC_ROBUSTNESS_IT_: 1
    • A.NO_EVIL: 1
    • A.PHYSICAL: 1
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 4
  • Microsoft:
    • Microsoft: 6
  • Samsung:
    • Samsung: 12
pdf_data/report_keywords/eval_facility
  • KSEL:
    • KSEL: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • constructions:
    • MAC:
      • HMAC: 2
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 2
    • DSA:
      • DSA: 4
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
      • SHA1: 1
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 3
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 3
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CCM:
    • CCM: 2
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140: 1
    • FIPS 140-2: 5
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 1
pdf_data/report_metadata
pdf_data/st_filename st_vid10245-st.pdf KECS-CISS-1035-2020_ST_EN.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 2
    • EAL2: 1
    • EAL2 augmented: 1
    • EAL3: 4
    • EAL3 augmented: 2
  • EAL:
    • EAL 2: 1
    • EAL2: 8
    • EAL2 augmented: 6
    • EAL3: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.2: 1
    • ACM_CAP.3: 20
    • ACM_SCP.1: 7
  • ADO:
    • ADO_DEL.1: 7
    • ADO_IGS.1: 7
  • ADV:
    • ADV_FSP.1: 12
    • ADV_HLD.1: 2
    • ADV_HLD.2: 18
    • ADV_RCR.1: 8
  • AGD:
    • AGD_ADM.1: 13
    • AGD_USR.1: 11
  • ALC:
    • ALC_DVS.1: 11
    • ALC_FLR.2: 20
  • ATE:
    • ATE_COV.1: 1
    • ATE_COV.2: 9
    • ATE_DPT.1: 7
    • ATE_FUN.1: 15
    • ATE_IND.1: 1
    • ATE_IND.2: 8
  • AVA:
    • AVA_MSU.1: 12
    • AVA_SOF.1: 8
    • AVA_VLA.1: 10
  • ADV:
    • ADV_ARC.1: 12
    • ADV_FSP.1: 3
    • ADV_FSP.2: 16
    • ADV_TDS.1: 15
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 13
    • AGD_PRE: 1
    • AGD_PRE.1: 9
  • ALC:
    • ALC_CMC.2: 9
    • ALC_CMS.1: 1
    • ALC_CMS.2: 7
    • ALC_DEL.1: 6
    • ALC_FLR.2: 23
  • APE:
    • APE_ECD: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SPD: 1
  • ASE:
    • ASE_CCL.1: 15
    • ASE_ECD.1: 13
    • ASE_INT.1: 15
    • ASE_OBJ.2: 12
    • ASE_REQ.1: 2
    • ASE_REQ.2: 14
    • ASE_SPD.1: 9
    • ASE_TSS.1: 6
  • ATE:
    • ATE_COV.1: 7
    • ATE_FUN.1: 11
    • ATE_IND.2: 8
  • AVA:
    • AVA_VAN.2: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.2: 2
    • FAU_GEN.2.1: 1
    • FAU_GEN_EXP: 2
    • FAU_GEN_EXP.1: 5
    • FAU_GEN_EXP.1.1: 1
    • FAU_GEN_EXP.1.2: 1
    • FAU_SAA.1: 2
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAR.1: 2
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 2
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 2
    • FAU_SAR.3.1: 1
    • FAU_SEL: 3
    • FAU_SEL.1: 4
    • FAU_SEL.1.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 2
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 2
    • FAU_STG.3.1: 1
  • FCS:
    • FCS_BCM_EXP: 1
    • FCS_BCM_EXP.1: 4
    • FCS_BCM_EXP.1.1: 1
    • FCS_BCM_EXP.1.2: 1
    • FCS_BCM_EXP.1.3: 1
    • FCS_CKM: 1
    • FCS_CKM.1: 35
    • FCS_CKM.2: 3
    • FCS_CKM.4: 21
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXP: 1
    • FCS_CKM_EXP.2: 4
    • FCS_CKM_EXP.2.1: 1
    • FCS_COP.1: 3
    • FCS_COP_EXP: 1
    • FCS_COP_EXP.1: 3
    • FCS_COP_EXP.1.1: 1
    • FCS_COP_EXP.2: 66
    • FCS_COP_EXP.2.1: 2
  • FDP:
    • FDP_IFC.1: 7
    • FDP_IFC.1.1: 1
    • FDP_IFF: 1
    • FDP_IFF.1: 4
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_ITC.1: 8
    • FDP_ITC.2: 8
    • FDP_RIP: 1
    • FDP_RIP.1: 13
  • FIA:
    • FIA_USB.1: 2
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 2
    • FMT_MOF.1.1: 1
    • FMT_MSA: 2
    • FMT_MSA.2: 20
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 3
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 2
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 2
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 2
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1: 3
    • FPT_STM.1.1: 1
    • FPT_TST: 1
    • FPT_TST_EXP: 2
    • FPT_TST_EXP.1: 7
    • FPT_TST_EXP.1.1: 1
    • FPT_TST_EXP.1.2: 1
    • FPT_TST_EXP.1.3: 1
    • FPT_TST_EXP.2: 4
    • FPT_TST_EXP.2.1: 1
    • FPT_TST_EXP.2.2: 1
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 8
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 7
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 35
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 29
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 10
    • FDP_IFC.2: 7
    • FDP_IFC.2.1: 1
    • FDP_IFC.2.2: 1
    • FDP_IFF: 1
    • FDP_IFF.1: 7
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
    • FDP_RIP.1: 9
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 7
    • FIA_UAU.7.1: 1
    • FIA_UID: 2
    • FIA_UID.1: 16
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 31
    • FMT_MSA.1.1: 4
    • FMT_MSA.3: 31
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 4
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 23
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 31
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 10
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.BASIC_ROBUSTNESS_IT_ENVIRONMENT: 2
    • A.NO_EVIL: 1
    • A.PHYSICAL: 1
  • O:
    • O.ADMIN_GUIDANCE: 1
    • O.AUDIT_GENERATION: 1
    • O.CONFIGURATION_: 1
    • O.CORRECT_: 1
    • O.CORRECT_TSF_OPERATION: 1
    • O.CRYPTOGRAPHY: 4
    • O.DOCUMENTED_: 1
    • O.MANAGE: 1
    • O.PARTIAL_: 1
    • O.RESIDUAL_: 1
    • O.VULNERABILITY_: 1
  • OE:
    • OE.BASIC_ROBUSTNESS_OS: 2
    • OE.CRYPTOGRAPHY: 3
    • OE.MANAGE: 1
    • OE.NO_EVIL: 1
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_: 1
    • OE.SELF_: 1
    • OE.TIME_STAMPS: 1
    • OE.TOE_ACCESS: 1
  • T:
    • T.ACCIDENTAL_ADMIN_: 1
    • T.CRYPTO_COMPROMISE: 1
    • T.POOR_DESIGN: 1
    • T.POOR_IMPLEMENTATION: 1
    • T.POOR_TEST: 1
    • T.RESIDUAL_DATA: 1
    • T.TSF_COMPROMISE: 1
  • A:
    • A.ACCESS: 4
    • A.ADMIN: 8
    • A.USER: 4
  • D:
    • D.CONF: 7
    • D.DOC: 15
    • D.FUNC: 8
    • D.PROT: 4
  • O:
    • O.AUDIT: 6
    • O.AUDIT_ACCESS: 6
    • O.AUDIT_STORAG: 1
    • O.AUDIT_STORAGE: 5
    • O.CONF: 12
    • O.DOC: 13
    • O.FUNC: 6
    • O.INTERFACE: 6
    • O.PROT: 6
    • O.SOFTWARE: 6
    • O.USER: 12
  • OE:
    • OE.ADMIN: 8
    • OE.AUDIT: 4
    • OE.AUDIT_ACCESS: 4
    • OE.AUDIT_STORAGE: 4
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 14
  • T:
    • T.CONF: 8
    • T.DOC: 8
    • T.FUNC: 4
    • T.PROT: 4
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 1
  • Microsoft:
    • Microsoft: 7
  • Samsung:
    • Samsung: 9
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 15
  • constructions:
    • MAC:
      • HMAC: 6
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • 3DES:
      • 3DES: 2
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 6
    • DSA:
      • DSA: 14
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 6
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA256: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 4
  • MAC:
    • MAC: 1
  • MAC:
    • MAC: 15
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 5
  • IKE:
    • IKE: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 4
  • CTR:
    • CTR: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140: 4
    • FIPS 140-1: 8
    • FIPS 140-2: 20
    • FIPS 180-2: 1
    • FIPS 186-2: 8
    • FIPS 197: 1
    • FIPS 198: 1
    • FIPS PUB 140-1: 1
  • PKCS:
    • PKCS #1: 1
  • RFC:
    • RFC 2631: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS PUB 197: 1
pdf_data/st_metadata
  • /Author: SAIC
  • /Company: SAIC
  • /CreationDate: D:20080926111130-04'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /Manager: Rick O'Donnel
  • /ModDate: D:20080926124308-04'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /SourceModified: D:20080811191258
  • /Subject: Security Target
  • /Title: Juniper OAC Security Target
  • pdf_file_size_bytes: 449660
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 47
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different