name |
SUSE Linux Enterprise Server 11 Service Pack 2 including KVM virtualization
|
SUSE Linux Enterprise Server 11 Service Pack 2 on IBM System z
|
category |
Operating Systems
|
Operating Systems
|
not_valid_before |
2013-02-27
|
2013-03-01
|
not_valid_after |
2019-09-01
|
2019-09-01
|
scheme |
DE
|
DE
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0787b_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0852b_pdf.pdf
|
status |
archived
|
archived
|
manufacturer |
SUSE Linux Products Gmbh
|
SUSE Linux Products Gmbh
|
manufacturer_web |
https://www.suse.com/
|
https://www.suse.com/
|
security_level |
EAL4+, ALC_FLR.3 |
EAL4+, ALC_FLR.3 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0787a_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0852a_pdf.pdf
|
cert_link |
None
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Operating System Protection Profile, Version 2.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0067b_pdf.pdf', 'pp_ids': frozenset({'OSPP_V2.0'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Operating System Protection Profile, Version 2.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0067b_pdf.pdf', 'pp_ids': frozenset({'OSPP_V2.0'})}) |
maintenance_updates |
|
|
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
4efa0cc09dd5cc3446e71e9b350e8c1cdb59ce801143dd6d2e3f009cfa353615
|
0e62a871992caa8fb316252406c702c4b308ac58c03807023c688dc33bce02a4
|
state/report/txt_hash |
f701e5cb5d89ea4b90b76d42d12f9cc7b86dd3eeaa160e1dcf2268e1ec6a225d
|
a2aa32750cecce4e9eee6724304f90812e8c5fd7d5da7086c56487c41e63abad
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
dec1deade6547a8ea3e19ae7c95094fb5abece9bd3f7e5e74db45684fe4e9841
|
8060b9e8ef860a696d9dd12fd96125d0fbd7bbdaa4b127f1de842e565e3aa756
|
state/st/txt_hash |
56d4b6107dcc31164da886f6fb521ab0ee88d2d31ce542fdee5df29600ddbdd9
|
546f3673832e914724aa02a4b9128d098979154ecade426a533d5c3799d0ffa0
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
BSI-DSZ-CC-0787-2013
|
BSI-DSZ-CC-0852-2013
|
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
cpe:2.3:o:suse:linux_enterprise_java:11:sp2:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:-:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:-:*:*, cpe:2.3:o:suse:linux_enterprise_sdk:11:sp3:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*, cpe:2.3:o:suse:linux_enterprise_sdk:11:sp2:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise:11.0:sp2:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:*:-:*:*, cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*, cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:-:*:*, cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:*:*:*:* |
cpe:2.3:o:suse:linux_enterprise_java:11:sp2:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:-:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:-:*:*, cpe:2.3:o:suse:linux_enterprise_sdk:11:sp3:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*, cpe:2.3:o:suse:linux_enterprise_sdk:11:sp2:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise:11.0:sp2:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:*:-:*:*, cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*, cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:-:*:*, cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*, cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:*:*:*:* |
heuristics/extracted_sars |
APE_REQ.2, ALC_TAT.1, ADV_TDS.3, ALC_DVS.1, ALC_CMC.4, APE_SPD.1, ASE_CCL.1, AVA_VAN.3, ASE_TSS.1, ATE_COV.2, ALC_LCD.1, ATE_FUN.1, ALC_CMS.4, ATE_DPT.1, AGD_OPE.1, ALC_FLR.3, ADV_INT.3, ASE_OBJ.2, ALC_DEL.1, ATE_IND.2, ADV_IMP.1, APE_OBJ.2, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, APE_ECD.1, ADV_SPM.1, ASE_ECD.1, APE_CCL.1, ASE_SPD.1, ADV_FSP.4, APE_INT.1 |
APE_REQ.2, ALC_TAT.1, ADV_TDS.3, ALC_DVS.1, ALC_CMC.4, APE_SPD.1, ASE_CCL.1, AVA_VAN.3, ASE_TSS.1, ATE_COV.2, ALC_LCD.1, ATE_FUN.1, ALC_CMS.4, ATE_DPT.1, AGD_OPE.1, ALC_FLR.3, ADV_INT.3, ASE_OBJ.2, ALC_DEL.1, ATE_IND.2, ADV_IMP.1, APE_OBJ.2, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, APE_ECD.1, ADV_SPM.1, ASE_ECD.1, APE_CCL.1, ASE_SPD.1, ADV_FSP.4, APE_INT.1 |
heuristics/extracted_versions |
2, 11 |
2, 11 |
heuristics/related_cves |
CVE-2014-2494, CVE-2014-1738, CVE-2013-3802, CVE-2013-0759, CVE-2014-2706, CVE-2014-5077, CVE-2013-0757, CVE-2012-4217, CVE-2015-2738, CVE-2014-1947, CVE-2014-1498, CVE-2014-1494, CVE-2013-1861, CVE-2012-0879, CVE-2012-4213, CVE-2017-15115, CVE-2018-19541, CVE-2016-3718, CVE-2015-0505, CVE-2018-19542, CVE-2013-3793, CVE-2012-1823, CVE-2015-2695, CVE-2015-8776, CVE-2013-6673, CVE-2014-1505, CVE-2012-4208, CVE-2012-4186, CVE-2011-3172, CVE-2013-0170, CVE-2012-3963, CVE-2015-4902, CVE-2015-4495, CVE-2014-1485, CVE-2013-5614, CVE-2012-1972, CVE-2015-2568, CVE-2015-7547, CVE-2014-9853, CVE-2012-4196, CVE-2014-3469, CVE-2013-0767, CVE-2012-1976, CVE-2012-5835, CVE-2014-6271, CVE-2012-4215, CVE-2012-3983, CVE-2012-1090, CVE-2016-3715, CVE-2017-1000366, CVE-2013-0749, CVE-2013-0771, CVE-2015-0501, CVE-2014-7169, CVE-2012-3994, CVE-2012-3991, CVE-2017-13086, CVE-2013-3801, CVE-2012-3995, CVE-2014-4667, CVE-2012-3515, CVE-2012-4180, CVE-2013-5612, CVE-2013-4480, CVE-2015-8551, CVE-2013-0761, CVE-2014-1512, CVE-2012-3972, CVE-2017-13088, CVE-2013-0745, CVE-2015-2573, CVE-2012-3967, CVE-2014-4038, CVE-2013-0766, CVE-2012-3961, CVE-2013-0746, CVE-2013-5619, CVE-2013-3809, CVE-2012-5612, CVE-2015-2571, CVE-2014-9854, CVE-2018-19539, CVE-2016-1000030, CVE-2014-4027, CVE-2014-1496, CVE-2012-3988, CVE-2016-0718, CVE-2012-4185, CVE-2012-5829, CVE-2015-1781, CVE-2014-1511, CVE-2020-15706, CVE-2014-1502, CVE-2012-4193, CVE-2015-0272, CVE-2013-0747, CVE-2014-1509, CVE-2018-19540, CVE-2014-0181, CVE-2015-8778, CVE-2016-4953, CVE-2012-4201, CVE-2018-17962, CVE-2016-0642, CVE-2013-0760, CVE-2013-5609, CVE-2014-0196, CVE-2012-4194, CVE-2015-0484, CVE-2016-3427, CVE-2012-4202, CVE-2017-13087, CVE-2012-5838, CVE-2014-1480, CVE-2013-5610, CVE-2012-1975, CVE-2012-4183, CVE-2017-17805, CVE-2013-5613, CVE-2017-14491, CVE-2014-9761, CVE-2013-5615, CVE-2013-3794, CVE-2014-1482, CVE-2015-8567, CVE-2014-1501, CVE-2012-4179, CVE-2012-4184, CVE-2012-4204, CVE-2012-4218, CVE-2017-13080, CVE-2012-4187, CVE-2014-3153, CVE-2015-5006, CVE-2013-0748, CVE-2014-1739, CVE-2013-5611, CVE-2014-4943, CVE-2015-7976, CVE-2014-1486, CVE-2013-1690, CVE-2014-1508, CVE-2012-3984, CVE-2018-10195, CVE-2012-5843, CVE-2012-3968, CVE-2014-1514, CVE-2013-4002, CVE-2015-5300, CVE-2017-13082, CVE-2018-19655, CVE-2013-6501, CVE-2012-3960, CVE-2014-1488, CVE-2012-4195, CVE-2013-0770, CVE-2013-3804, CVE-2013-0758, CVE-2012-3990, CVE-2012-4188, CVE-2012-1970, CVE-2016-4954, CVE-2014-4258, CVE-2016-5244, CVE-2020-15705, CVE-2014-3468, CVE-2014-1483, CVE-2013-0744, CVE-2012-5836, CVE-2013-0768, CVE-2011-3970, CVE-2014-4207, CVE-2014-1491, CVE-2012-5839, CVE-2012-5841, CVE-2015-3209, CVE-2012-5840, CVE-2022-27239, CVE-2015-5041, CVE-2013-0800, CVE-2014-1737, CVE-2017-13079, CVE-2012-4216, CVE-2014-1499, CVE-2015-2734, CVE-2015-2576, CVE-2012-4207, CVE-2012-3867, CVE-2012-3976, CVE-2014-1481, CVE-2013-6672, CVE-2014-3467, CVE-2012-6639, CVE-2012-1146, CVE-2020-15707, CVE-2012-1097, CVE-2015-0441, CVE-2015-0797, CVE-2014-1504, CVE-2017-17806, CVE-2017-13084, CVE-2015-8779, CVE-2015-4106, CVE-2014-1493, CVE-2012-4182, CVE-2012-3992, CVE-2014-1487, CVE-2014-1484, CVE-2014-1513, CVE-2012-3985, CVE-2014-1490, CVE-2013-0753, CVE-2014-1500, CVE-2014-4214, CVE-2015-0433, CVE-2016-4957, CVE-2012-3989, CVE-2013-5616, CVE-2014-0069, CVE-2018-19543, CVE-2013-3805, CVE-2012-5830, CVE-2013-0763, CVE-2012-4212, CVE-2013-0756, CVE-2017-13081, CVE-2013-0769, CVE-2014-1497, CVE-2017-18017, CVE-2013-3783, CVE-2012-1973, CVE-2014-4260, CVE-2017-13078, CVE-2014-1489, CVE-2012-3957, CVE-2015-5707, CVE-2016-2782, CVE-2016-1285, CVE-2015-5239, CVE-2020-8013, CVE-2013-5618, CVE-2016-0264, CVE-2015-2737, CVE-2016-1286, CVE-2015-1283, CVE-2015-1931, CVE-2017-13077, CVE-2013-0755, CVE-2014-2497, CVE-2016-0651, CVE-2014-4039, CVE-2012-0507, CVE-2014-4243, CVE-2013-2465, CVE-2012-5833, CVE-2018-6556, CVE-2014-1479, CVE-2012-5842, CVE-2017-14798, CVE-2012-4214, CVE-2014-1477, CVE-2012-4209, CVE-2012-3959, CVE-2013-0764, CVE-2011-1083, CVE-2018-18873, CVE-2018-19208, CVE-2012-1974, CVE-2016-4956, CVE-2013-0754, CVE-2017-17558, CVE-2016-5772, CVE-2012-1717, CVE-2013-3808, CVE-2015-2575, CVE-2021-45082, CVE-2014-3601, CVE-2012-4205, CVE-2015-5154, CVE-2012-3986, CVE-2013-0752, CVE-2015-4830, CVE-2018-19052, CVE-2014-1510, CVE-2017-5753, CVE-2012-3982, CVE-2015-0492, CVE-2013-3301, CVE-2013-3812, CVE-2016-4955, CVE-2013-0762, CVE-2012-3956, CVE-2014-2484, CVE-2015-0499, CVE-2013-0750 |
CVE-2014-2494, CVE-2014-1738, CVE-2013-3802, CVE-2013-0759, CVE-2014-2706, CVE-2014-5077, CVE-2013-0757, CVE-2012-4217, CVE-2015-2738, CVE-2014-1947, CVE-2014-1498, CVE-2014-1494, CVE-2013-1861, CVE-2012-0879, CVE-2012-4213, CVE-2017-15115, CVE-2018-19541, CVE-2016-3718, CVE-2015-0505, CVE-2018-19542, CVE-2013-3793, CVE-2012-1823, CVE-2015-2695, CVE-2015-8776, CVE-2013-6673, CVE-2014-1505, CVE-2012-4208, CVE-2012-4186, CVE-2011-3172, CVE-2013-0170, CVE-2012-3963, CVE-2015-4902, CVE-2015-4495, CVE-2014-1485, CVE-2013-5614, CVE-2012-1972, CVE-2015-2568, CVE-2015-7547, CVE-2014-9853, CVE-2012-4196, CVE-2014-3469, CVE-2013-0767, CVE-2012-1976, CVE-2012-5835, CVE-2014-6271, CVE-2012-4215, CVE-2012-3983, CVE-2012-1090, CVE-2016-3715, CVE-2017-1000366, CVE-2013-0749, CVE-2013-0771, CVE-2015-0501, CVE-2014-7169, CVE-2012-3994, CVE-2012-3991, CVE-2017-13086, CVE-2013-3801, CVE-2012-3995, CVE-2014-4667, CVE-2012-3515, CVE-2012-4180, CVE-2013-5612, CVE-2013-4480, CVE-2015-8551, CVE-2013-0761, CVE-2014-1512, CVE-2012-3972, CVE-2017-13088, CVE-2013-0745, CVE-2015-2573, CVE-2012-3967, CVE-2014-4038, CVE-2013-0766, CVE-2012-3961, CVE-2013-0746, CVE-2013-5619, CVE-2013-3809, CVE-2012-5612, CVE-2015-2571, CVE-2014-9854, CVE-2018-19539, CVE-2016-1000030, CVE-2014-4027, CVE-2014-1496, CVE-2012-3988, CVE-2016-0718, CVE-2012-4185, CVE-2012-5829, CVE-2015-1781, CVE-2014-1511, CVE-2020-15706, CVE-2014-1502, CVE-2012-4193, CVE-2015-0272, CVE-2013-0747, CVE-2014-1509, CVE-2018-19540, CVE-2014-0181, CVE-2015-8778, CVE-2016-4953, CVE-2012-4201, CVE-2018-17962, CVE-2016-0642, CVE-2013-0760, CVE-2013-5609, CVE-2014-0196, CVE-2012-4194, CVE-2015-0484, CVE-2016-3427, CVE-2012-4202, CVE-2017-13087, CVE-2012-5838, CVE-2014-1480, CVE-2013-5610, CVE-2012-1975, CVE-2012-4183, CVE-2017-17805, CVE-2013-5613, CVE-2017-14491, CVE-2014-9761, CVE-2013-5615, CVE-2013-3794, CVE-2014-1482, CVE-2015-8567, CVE-2014-1501, CVE-2012-4179, CVE-2012-4184, CVE-2012-4204, CVE-2012-4218, CVE-2017-13080, CVE-2012-4187, CVE-2014-3153, CVE-2015-5006, CVE-2013-0748, CVE-2014-1739, CVE-2013-5611, CVE-2014-4943, CVE-2015-7976, CVE-2014-1486, CVE-2013-1690, CVE-2014-1508, CVE-2012-3984, CVE-2018-10195, CVE-2012-5843, CVE-2012-3968, CVE-2014-1514, CVE-2013-4002, CVE-2015-5300, CVE-2017-13082, CVE-2018-19655, CVE-2013-6501, CVE-2012-3960, CVE-2014-1488, CVE-2012-4195, CVE-2013-0770, CVE-2013-3804, CVE-2013-0758, CVE-2012-3990, CVE-2012-4188, CVE-2012-1970, CVE-2016-4954, CVE-2014-4258, CVE-2016-5244, CVE-2020-15705, CVE-2014-3468, CVE-2014-1483, CVE-2013-0744, CVE-2012-5836, CVE-2013-0768, CVE-2011-3970, CVE-2014-4207, CVE-2014-1491, CVE-2012-5839, CVE-2012-5841, CVE-2015-3209, CVE-2012-5840, CVE-2022-27239, CVE-2015-5041, CVE-2013-0800, CVE-2014-1737, CVE-2017-13079, CVE-2012-4216, CVE-2014-1499, CVE-2015-2734, CVE-2015-2576, CVE-2012-4207, CVE-2012-3867, CVE-2012-3976, CVE-2014-1481, CVE-2013-6672, CVE-2014-3467, CVE-2012-6639, CVE-2012-1146, CVE-2020-15707, CVE-2012-1097, CVE-2015-0441, CVE-2015-0797, CVE-2014-1504, CVE-2017-17806, CVE-2017-13084, CVE-2015-8779, CVE-2015-4106, CVE-2014-1493, CVE-2012-4182, CVE-2012-3992, CVE-2014-1487, CVE-2014-1484, CVE-2014-1513, CVE-2012-3985, CVE-2014-1490, CVE-2013-0753, CVE-2014-1500, CVE-2014-4214, CVE-2015-0433, CVE-2016-4957, CVE-2012-3989, CVE-2013-5616, CVE-2014-0069, CVE-2018-19543, CVE-2013-3805, CVE-2012-5830, CVE-2013-0763, CVE-2012-4212, CVE-2013-0756, CVE-2017-13081, CVE-2013-0769, CVE-2014-1497, CVE-2017-18017, CVE-2013-3783, CVE-2012-1973, CVE-2014-4260, CVE-2017-13078, CVE-2014-1489, CVE-2012-3957, CVE-2015-5707, CVE-2016-2782, CVE-2016-1285, CVE-2015-5239, CVE-2020-8013, CVE-2013-5618, CVE-2016-0264, CVE-2015-2737, CVE-2016-1286, CVE-2015-1283, CVE-2015-1931, CVE-2017-13077, CVE-2013-0755, CVE-2014-2497, CVE-2016-0651, CVE-2014-4039, CVE-2012-0507, CVE-2014-4243, CVE-2013-2465, CVE-2012-5833, CVE-2018-6556, CVE-2014-1479, CVE-2012-5842, CVE-2017-14798, CVE-2012-4214, CVE-2014-1477, CVE-2012-4209, CVE-2012-3959, CVE-2013-0764, CVE-2011-1083, CVE-2018-18873, CVE-2018-19208, CVE-2012-1974, CVE-2016-4956, CVE-2013-0754, CVE-2017-17558, CVE-2016-5772, CVE-2012-1717, CVE-2013-3808, CVE-2015-2575, CVE-2021-45082, CVE-2014-3601, CVE-2012-4205, CVE-2015-5154, CVE-2012-3986, CVE-2013-0752, CVE-2015-4830, CVE-2018-19052, CVE-2014-1510, CVE-2017-5753, CVE-2012-3982, CVE-2015-0492, CVE-2013-3301, CVE-2013-3812, CVE-2016-4955, CVE-2013-0762, CVE-2012-3956, CVE-2014-2484, CVE-2015-0499, CVE-2013-0750 |
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-0852-2013 |
BSI-DSZ-CC-0962-2016 |
heuristics/report_references/directly_referencing |
None
|
BSI-DSZ-CC-0787-2013 |
heuristics/report_references/indirectly_referencing |
None
|
BSI-DSZ-CC-0787-2013 |
heuristics/scheme_data |
None
|
None
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
0787a_pdf.pdf
|
0852a_pdf.pdf
|
pdf_data/report_frontpage/DE/cert_id |
BSI-DSZ-CC-0787-2013
|
BSI-DSZ-CC-0852-2013
|
pdf_data/report_frontpage/DE/cert_item |
SUSE Linux Enterprise Server 11 Service Pack 2 including KVM virtualization
|
SUSE Linux Enterprise Server 11 Service Pack 2 on IBM System z
|
pdf_data/report_frontpage/DE/cert_lab |
BSI
|
BSI
|
pdf_data/report_frontpage/DE/developer |
SUSE Linux Products GmbH
|
SUSE Linux Products GmbH
|
pdf_data/report_frontpage/DE/match_rules |
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*) |
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*) |
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0852-2013:
19
- BSI-DSZ-CC-0787-2013:
2
- NL:
|
pdf_data/report_keywords/cc_cert_id/DE |
|
- BSI-DSZ-CC-0852-2013: 19
- BSI-DSZ-CC-0787-2013:
2
|
pdf_data/report_keywords/cc_cert_id/DE/BSI-DSZ-CC-0787-2013 |
20
|
2
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0067-2010:
2
- BSI-CC-PP-0067-:
1
|
- BSI:
- BSI-CC-PP-0067-2010:
2
- BSI-CC-PP-0067-:
1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.1:
1
- ADV_FSP.2:
1
- ADV_FSP.3:
1
- ADV_FSP.4:
1
- ADV_FSP.5:
1
- ADV_FSP.6:
1
- ADV_IMP.1:
1
- ADV_IMP.2:
1
- ADV_INT.1:
1
- ADV_INT.2:
1
- ADV_INT.3:
1
- ADV_SPM.1:
1
- ADV_TDS.1:
1
- ADV_TDS.2:
1
- ADV_TDS.3:
1
- ADV_TDS.4:
1
- ADV_TDS.5:
1
- ADV_TDS.6:
1
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- AGD_OPE:
1
- AGD_PRE:
1
- ALC:
- ALC_FLR.3:
5
- ALC_CMC.1:
1
- ALC_CMC.2:
1
- ALC_CMC.3:
1
- ALC_CMC.4:
1
- ALC_CMC.5:
1
- ALC_CMS.1:
1
- ALC_CMS.2:
1
- ALC_CMS.3:
1
- ALC_CMS.4:
1
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
1
- ALC_DVS.2:
1
- ALC_FLR.1:
1
- ALC_FLR.2:
1
- ALC_LCD.1:
1
- ALC_LCD.2:
1
- ALC_TAT.1:
1
- ALC_TAT.2:
1
- ALC_TAT.3:
1
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_FLR:
1
- ALC_TAT:
1
- ATE:
- ATE_COV.1:
1
- ATE_COV.2:
1
- ATE_COV.3:
1
- ATE_DPT.1:
1
- ATE_DPT.2:
1
- ATE_DPT.3:
1
- ATE_DPT.4:
1
- ATE_FUN.1:
1
- ATE_FUN.2:
1
- ATE_IND.1:
1
- ATE_IND.2:
1
- ATE_IND.3:
1
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- AVA_VAN.1:
1
- AVA_VAN.2:
1
- AVA_VAN.3:
1
- AVA_VAN.4:
1
- AVA_VAN.5:
1
- AVA_VAN:
2
- APE:
- APE_INT.1:
1
- APE_CCL.1:
1
- APE_SPD.1:
1
- APE_OBJ.1:
1
- APE_OBJ.2:
1
- APE_ECD.1:
1
- APE_REQ.1:
1
- APE_REQ.2:
1
- ASE:
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.1:
1
- ASE_OBJ.2:
1
- ASE_ECD.1:
1
- ASE_REQ.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
- ASE_TSS.2:
1
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.1:
1
- ADV_FSP.2:
1
- ADV_FSP.3:
1
- ADV_FSP.4:
1
- ADV_FSP.5:
1
- ADV_FSP.6:
1
- ADV_IMP.1:
1
- ADV_IMP.2:
1
- ADV_INT.1:
1
- ADV_INT.2:
1
- ADV_INT.3:
1
- ADV_SPM.1:
1
- ADV_TDS.1:
1
- ADV_TDS.2:
1
- ADV_TDS.3:
1
- ADV_TDS.4:
1
- ADV_TDS.5:
1
- ADV_TDS.6:
1
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- AGD_OPE:
1
- AGD_PRE:
1
- ALC:
- ALC_FLR.3:
5
- ALC_CMC.1:
1
- ALC_CMC.2:
1
- ALC_CMC.3:
1
- ALC_CMC.4:
1
- ALC_CMC.5:
1
- ALC_CMS.1:
1
- ALC_CMS.2:
1
- ALC_CMS.3:
1
- ALC_CMS.4:
1
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
1
- ALC_DVS.2:
1
- ALC_FLR.1:
1
- ALC_FLR.2:
1
- ALC_LCD.1:
1
- ALC_LCD.2:
1
- ALC_TAT.1:
1
- ALC_TAT.2:
1
- ALC_TAT.3:
1
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_FLR:
1
- ALC_TAT:
1
- ATE:
- ATE_COV.1:
1
- ATE_COV.2:
1
- ATE_COV.3:
1
- ATE_DPT.1:
1
- ATE_DPT.2:
1
- ATE_DPT.3:
1
- ATE_DPT.4:
1
- ATE_FUN.1:
1
- ATE_FUN.2:
1
- ATE_IND.1:
1
- ATE_IND.2:
1
- ATE_IND.3:
1
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- AVA_VAN.1:
1
- AVA_VAN.2:
1
- AVA_VAN.3:
1
- AVA_VAN.4:
1
- AVA_VAN.5:
1
- AVA_VAN:
2
- APE:
- APE_INT.1:
1
- APE_CCL.1:
1
- APE_SPD.1:
1
- APE_OBJ.1:
1
- APE_OBJ.2:
1
- APE_ECD.1:
1
- APE_REQ.1:
1
- APE_REQ.2:
1
- ASE:
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.1:
1
- ASE_OBJ.2:
1
- ASE_ECD.1:
1
- ASE_REQ.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
- ASE_TSS.2:
1
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 |
6
|
6
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 augmented |
2
|
3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL1 |
7
|
7
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 |
3
|
3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL3 |
4
|
4
|
pdf_data/report_keywords/cc_security_level/EAL/EAL4 |
6
|
6
|
pdf_data/report_keywords/cc_security_level/EAL/EAL4+ |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL5 |
6
|
6
|
pdf_data/report_keywords/cc_security_level/EAL/EAL6 |
3
|
3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
4
|
4
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process/ConfidentialDocument |
- Report, Version 4, 2013-02-15, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Configuration list for the TOE: [CM.OBS] Configuration List OBS, 2012-08-29, [CM.SAR:
1
- List CC Related Items, 2012-09-04, [CMLIST] SUSE Configuration Management Lists, 2012-08-21, (confidential document) [10] Guidance documentation for the TOE, Version 1.0, 2012-09-28, Common Criteria EAL4+ Evaluated:
1
- Guide for SUSE LINUX Enterprise Server 11 SP2, (confidential document) 9 specifically • AIS 20, Version 2, Funktionalitätsklassen und Evaluationsmethodologie für:
1
|
- Report, Version 5, 2013-02-28, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Configuration list for the TOE: [CM.OBS] Configuration List OBS, 2012-08-29, [CM.SAR:
1
- List CC Related Items, 2012-09-04, [CMLIST] SUSE Configuration Management Lists, 2012-08-21, (confidential document) [10] Guidance documentation for the TOE, Version 1.1, 2013-02-19, Common Criteria EAL4+ Evaluated:
1
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id/BSI |
- AIS 20:
2
- AIS 31:
1
- AIS 32:
1
|
- AIS 20:
2
- AIS 31:
1
- AIS 32:
1
- AIS 38: 1
|
pdf_data/report_keywords/standard_id/BSI/AIS 20 |
2
|
2
|
pdf_data/report_keywords/standard_id/BSI/AIS 31 |
1
|
1
|
pdf_data/report_keywords/standard_id/BSI/AIS 32 |
1
|
1
|
pdf_data/report_keywords/standard_id/FIPS |
- FIPS PUB 197:
1
- FIPS PUB 46-3:
1
|
- FIPS PUB 197:
1
- FIPS PUB 46-3:
1
|
pdf_data/report_keywords/standard_id/RFC |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//Author |
Federal Office for Information Security
|
Federal Office for Information Security
|
pdf_data/report_metadata//CreationDate |
D:20130306111651+01'00'
|
D:20130306111312+01'00'
|
pdf_data/report_metadata//Creator |
Writer
|
Writer
|
pdf_data/report_metadata//Keywords |
"Common Criteria, Certification, Zertifizierung, Operating System Protection Profile, OSPP, SUSE Linux Enterprise Server 11 Service Pack 2"
|
"Common Criteria, Certification, Zertifizierung, Operating System Protection Profile, OSPP, SUSE Linux Enterprise Server 11 Service Pack 2"
|
pdf_data/report_metadata//ModDate |
D:20130306154502+01'00'
|
D:20130306153717+01'00'
|
pdf_data/report_metadata//Producer |
OpenOffice.org 3.2
|
OpenOffice.org 3.2
|
pdf_data/report_metadata//Subject |
Common Criteria Certification
|
Common Criteria Certification
|
pdf_data/report_metadata//Title |
Certification Report BSI-DSZ-CC-0787-2013
|
Certification Report BSI-DSZ-CC-0852-2013
|
pdf_data/report_metadata/pdf_file_size_bytes |
1000567
|
959048
|
pdf_data/report_metadata/pdf_hyperlinks |
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/ |
https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/ |
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
38
|
36
|
pdf_data/st_filename |
0787b_pdf.pdf
|
0852b_pdf.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id/DE |
|
|
pdf_data/st_keywords/cc_claims/A/A.AUTHUSER |
3
|
3
|
pdf_data/st_keywords/cc_claims/A/A.CONNECT |
5
|
5
|
pdf_data/st_keywords/cc_claims/A/A.DETECT |
3
|
3
|
pdf_data/st_keywords/cc_claims/A/A.MANAGE |
5
|
5
|
pdf_data/st_keywords/cc_claims/A/A.PEER |
6
|
6
|
pdf_data/st_keywords/cc_claims/A/A.PHYSICAL |
4
|
4
|
pdf_data/st_keywords/cc_claims/A/A.TRAINEDUSER |
3
|
2
|
pdf_data/st_keywords/cc_claims/O |
- O.AUDITING:
15
- O.CRYPTO:
16
- O.DISCRETIONARY:
11
- O.NETWORK:
13
- O.SUBJECT:
11
- O.MANAGE:
26
- O.TRUSTED_CHANNEL:
5
- O.COMP: 31
- O.CP:
17
|
- O.AUDITING:
15
- O.CRYPTO:
16
- O.DISCRETIONARY:
11
- O.NETWORK:
13
- O.SUBJECT:
11
- O.MANAGE:
26
- O.TRUSTED_CHANNEL:
5
- O.CP:
16
|
pdf_data/st_keywords/cc_claims/O/O.AUDITING |
15
|
15
|
pdf_data/st_keywords/cc_claims/O/O.CP |
17
|
16
|
pdf_data/st_keywords/cc_claims/O/O.CRYPTO |
16
|
16
|
pdf_data/st_keywords/cc_claims/O/O.DISCRETIONARY |
11
|
11
|
pdf_data/st_keywords/cc_claims/O/O.MANAGE |
26
|
26
|
pdf_data/st_keywords/cc_claims/O/O.NETWORK |
13
|
13
|
pdf_data/st_keywords/cc_claims/O/O.SUBJECT |
11
|
11
|
pdf_data/st_keywords/cc_claims/O/O.TRUSTED_CHANNEL |
5
|
5
|
pdf_data/st_keywords/cc_claims/OE/OE.ADMIN |
5
|
5
|
pdf_data/st_keywords/cc_claims/OE/OE.INFO_PROTECT |
7
|
8
|
pdf_data/st_keywords/cc_claims/OE/OE.INSTALL |
4
|
4
|
pdf_data/st_keywords/cc_claims/OE/OE.MAINTENANCE |
3
|
3
|
pdf_data/st_keywords/cc_claims/OE/OE.PHYSICAL |
3
|
3
|
pdf_data/st_keywords/cc_claims/OE/OE.RECOVER |
4
|
3
|
pdf_data/st_keywords/cc_claims/OE/OE.REMOTE |
4
|
4
|
pdf_data/st_keywords/cc_claims/OE/OE.TRUSTED |
5
|
5
|
pdf_data/st_keywords/cc_claims/T |
- T.ACCESS:
24
- T.RESTRICT:
3
- T.IA:
6
- T.INFOFLOW: 4
- T.COMM: 4
|
- T.ACCESS:
20
- T.RESTRICT:
3
- T.IA:
6
|
pdf_data/st_keywords/cc_claims/T/T.ACCESS |
24
|
20
|
pdf_data/st_keywords/cc_claims/T/T.IA |
6
|
6
|
pdf_data/st_keywords/cc_claims/T/T.RESTRICT |
3
|
3
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.4:
1
- ADV_IMP.1:
1
- ADV_TDS.3:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.3:
5
- ALC_CMC.4:
1
- ALC_CMS.4:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
1
- ALC_LCD.1:
1
- ALC_TAT.1:
1
- ATE:
- ATE_COV.2:
1
- ATE_DPT.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_CCL.1:
17
- ASE_INT.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.2:
1
- ASE_ECD.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
|
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.4:
1
- ADV_IMP.1:
1
- ADV_TDS.3:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.3:
5
- ALC_CMC.4:
1
- ALC_CMS.4:
1
- ALC_DEL.1:
1
- ALC_DVS.1:
1
- ALC_LCD.1:
1
- ALC_TAT.1:
1
- ATE:
- ATE_COV.2:
1
- ATE_DPT.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_CCL.1:
17
- ASE_INT.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.2:
1
- ASE_ECD.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4:
3
- EAL4 augmented:
1
|
- EAL:
- EAL4:
3
- EAL4 augmented:
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 |
11
|
11
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.2 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SEL.1 |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SEL.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 |
11
|
11
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.3 |
8
|
7
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.3.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4 |
7
|
8
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RNG.1:
30
- FCS_CKM.1:
33
- FCS_CKM.2:
10
- FCS_CKM.4:
13
- FCS_COP.1:
20
- FCS_RNG:
2
- FCS_RNG.1.1:
4
- FCS_RNG.1.2:
5
- FCS_CKM.1.1:
3
- FCS_CKM.2.1:
1
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
2
|
- FCS_RNG.1:
30
- FCS_CKM.1:
33
- FCS_CKM.2:
10
- FCS_CKM.4:
13
- FCS_COP.1:
20
- FCS_RNG:
2
- FCS_RNG.1.1:
4
- FCS_RNG.1.2:
5
- FCS_CKM.1.1:
3
- FCS_CKM.2.1:
1
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
2
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_CDP:
5
- FDP_CDP.1:
14
- FDP_ACC.1:
36
- FDP_ACF.1:
39
- FDP_IFC.2:
20
- FDP_IFF.1:
29
- FDP_ITC.2:
21
- FDP_RIP.2:
13
- FDP_RIP.3:
13
- FDP_ACC.2:
19
- FDP_ETC.2: 8
- FDP_IFC.1:
14
- FDP_CDP.1.1:
2
- FDP_UCT:
1
- FDP_ACC.1.1:
2
- FDP_ACF.1.1:
4
- FDP_ACF.1.2:
4
- FDP_ACF.1.3:
4
- FDP_ACF.1.4:
4
- FDP_IFC.2.1:
2
- FDP_IFC.2.2:
2
- FDP_IFF.1.1:
3
- FDP_IFF.1.2:
3
- FDP_IFF.1.3:
3
- FDP_IFF.1.4:
3
- FDP_IFF.1.5:
3
- FDP_ITC.2.1:
2
- FDP_ITC.2.2:
2
- FDP_ITC.2.3:
2
- FDP_ITC.2.4:
2
- FDP_ITC.2.5:
2
- FDP_RIP.2.1:
1
- FDP_RIP.3.1:
1
- FDP_ACC.2.1:
2
- FDP_ACC.2.2:
2
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_ITC.1:
5
- FDP_UID.2: 1
- FDP_TDC.1: 1
|
- FDP_CDP:
5
- FDP_CDP.1:
14
- FDP_ACC.1:
31
- FDP_ACF.1:
30
- FDP_IFC.2:
10
- FDP_IFF.1:
21
- FDP_ITC.2:
13
- FDP_RIP.2:
13
- FDP_RIP.3:
13
- FDP_ACC.2:
9
- FDP_IFC.1:
9
- FDP_CDP.1.1:
2
- FDP_UCT:
1
- FDP_ACC.1.1:
2
- FDP_ACF.1.1:
3
- FDP_ACF.1.2:
3
- FDP_ACF.1.3:
3
- FDP_ACF.1.4:
3
- FDP_IFC.2.1:
1
- FDP_IFC.2.2:
1
- FDP_IFF.1.1:
2
- FDP_IFF.1.2:
2
- FDP_IFF.1.3:
2
- FDP_IFF.1.4:
2
- FDP_IFF.1.5:
2
- FDP_ITC.2.1:
1
- FDP_ITC.2.2:
1
- FDP_ITC.2.3:
1
- FDP_ITC.2.4:
1
- FDP_ITC.2.5:
1
- FDP_RIP.2.1:
1
- FDP_RIP.3.1:
1
- FDP_ACC.2.1:
1
- FDP_ACC.2.2:
1
- FDP_ITC.1:
5
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
36
|
31
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.2 |
19
|
9
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.2.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.2.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
39
|
30
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
4
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
4
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
4
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
4
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_CDP |
5
|
5
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_CDP.1 |
14
|
14
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_CDP.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
14
|
9
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.2 |
20
|
10
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.2.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.2.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF.1 |
29
|
21
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF.1.1 |
3
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF.1.2 |
3
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF.1.3 |
3
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF.1.4 |
3
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF.1.5 |
3
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
5
|
5
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
21
|
13
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2.3 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2.4 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2.5 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.2 |
13
|
13
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.3 |
13
|
13
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.3.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_AFL.1:
9
- FIA_ATD.1:
19
- FIA_SOS.1:
8
- FIA_UAU.1:
12
- FIA_UAU.5:
10
- FIA_UAU.7:
6
- FIA_UID.1:
14
- FIA_USB.2:
8
- FIA_UID.2: 7
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1.1:
2
- FIA_SOS.1.1:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UAU.7.1:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_USB.2.1:
1
- FIA_USB.2.2:
1
- FIA_USB.2.3:
1
- FIA_USB.2.4:
1
- FIA_UID.2.1: 1
|
- FIA_AFL.1:
9
- FIA_ATD.1:
19
- FIA_SOS.1:
8
- FIA_UAU.1:
12
- FIA_UAU.5:
10
- FIA_UAU.7:
6
- FIA_UID.1:
14
- FIA_USB.2:
8
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1.1:
2
- FIA_SOS.1.1:
1
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FIA_UAU.7.1:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_USB.2.1:
1
- FIA_USB.2.2:
1
- FIA_USB.2.3:
1
- FIA_USB.2.4:
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 |
9
|
9
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 |
19
|
19
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
12
|
12
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5 |
10
|
10
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.7.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
14
|
14
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.2 |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.2.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.2.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.2.4 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
46
|
28
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
5
|
3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
47
|
31
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
6
|
4
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
6
|
4
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.4 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
88
|
80
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 |
13
|
12
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_REV.1 |
12
|
12
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_REV.1.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_REV.1.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
24
|
21
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
32
|
27
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TDC.1 |
21
|
12
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TDC.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TDC.1.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FTA |
- FTA_SSL.1:
7
- FTA_SSL.2:
7
- FTA_SSL.1.1:
1
- FTA_SSL.1.2:
1
- FTA_SSL.2.1:
1
- FTA_SSL.2.2:
1
|
- FTA_SSL.1:
7
- FTA_SSL.2:
7
- FTA_SSL.1.1:
1
- FTA_SSL.1.2:
1
- FTA_SSL.2.1:
1
- FTA_SSL.2.2:
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
11
|
9
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 |
2
|
1
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- out of scope:
3
- PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation:
1
- as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also:
1
- DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store:
1
|
- OutOfScope:
- out of scope:
3
- PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation:
1
- as Port Address Translation (PAT) for simple as well as more complex protocols. This mechanism is out of scope for the evaluation. Furthermore, packet mangling support is provided with IPTables which is also:
1
- DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store:
1
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol/SSH/SSH |
45
|
43
|
pdf_data/st_keywords/crypto_protocol/TLS |
|
|
pdf_data/st_keywords/crypto_protocol/VPN |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility/atsec/atsec |
202
|
178
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224:
1
- SHA-256:
1
- SHA-384:
1
- SHA-512:
1
|
- SHA:
- SHA1:
- SHA2:
- SHA-224:
1
- SHA-256:
1
- SHA-384:
1
- SHA-512:
1
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS 140-2:
5
- FIPS PUB 186-3:
4
- FIPS 186-3:
1
|
- FIPS 140-2:
5
- FIPS PUB 186-3:
4
- FIPS 186-3:
1
|
pdf_data/st_keywords/standard_id/RFC/RFC 2460 |
1
|
1
|
pdf_data/st_keywords/standard_id/RFC/RFC 3484 |
1
|
1
|
pdf_data/st_keywords/standard_id/RFC/RFC 3542 |
1
|
1
|
pdf_data/st_keywords/standard_id/RFC/RFC 4213 |
1
|
1
|
pdf_data/st_keywords/standard_id/RFC/RFC 4252 |
9
|
9
|
pdf_data/st_keywords/standard_id/RFC/RFC 4253 |
10
|
10
|
pdf_data/st_keywords/standard_id/RFC/RFC 768 |
1
|
1
|
pdf_data/st_keywords/standard_id/RFC/RFC 791 |
2
|
1
|
pdf_data/st_keywords/standard_id/RFC/RFC 792 |
1
|
1
|
pdf_data/st_keywords/standard_id/RFC/RFC 793 |
1
|
1
|
pdf_data/st_keywords/standard_id/RFC/RFC4253 |
3
|
3
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES128:
1
- AES256:
1
- AES:
5
- AES-128:
1
- Twofish:
- Serpent:
- DES:
|
- AES_competition:
- AES:
- AES128:
1
- AES256:
1
- AES:
5
- AES-128:
1
- Twofish:
- Serpent:
- DES:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata//Author |
Stephan Mueller (generated by CCTool version 2.7.2)
|
Stephan Mueller (generated by CCTool version 2.7.2)
|
pdf_data/st_metadata//CreationDate |
D:20130118132358Z
|
D:20130219144343Z
|
pdf_data/st_metadata//Creator |
Unknown
|
Unknown
|
pdf_data/st_metadata//Keywords |
"Security Target, Common Criteria, Linux Distribution"
|
Security Target, Common Criteria, Linux Distribution
|
pdf_data/st_metadata//ModDate |
D:20130306101641+01'00'
|
D:20130219144343Z
|
pdf_data/st_metadata//Producer |
XEP 4.18 build 20100322
|
XEP 4.18 build 20100322
|
pdf_data/st_metadata//Subject |
Common Criteria Certification
|
|
pdf_data/st_metadata//Title |
SUSE Linux Enterprise Server 11 SP2 including KVM virtualization (version 1.1 as of 2013-01-17 )
|
SUSE Linux Enterprise Server 11 SP2 on IBM System z (version 1.3 as of 2013-02-19 )
|
pdf_data/st_metadata//Trapped |
/False
|
/False
|
pdf_data/st_metadata//application |
CCTool version x.y
|
CCTool version x.y
|
pdf_data/st_metadata/pdf_file_size_bytes |
1101932
|
983663
|
pdf_data/st_metadata/pdf_hyperlinks |
http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf |
http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
100
|
88
|
dgst |
cac91660b0d1f7c7
|
c3c764250aac0ca3
|