| name |
Cisco Catalyst Industrial Ethernet 9300 Rugged Series Switches running IOS-XE 17.12 |
Huawei OceanStor Dorado V6 Series Storage System Software v 6.0.1 |
| category |
Network and Network-Related Devices and Systems |
Data Protection |
| scheme |
US |
ES |
| status |
active |
active |
| not_valid_after |
12.08.2026 |
08.06.2026 |
| not_valid_before |
12.08.2024 |
08.06.2021 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11466-ci.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-17-Diploma.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11466-vr_posted.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-17-BOE-A-2021-9460.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11466-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2020-17-ST.pdf |
| manufacturer |
Cisco Systems, Inc. |
Huawei Technologies Co., Ltd. |
| manufacturer_web |
https://www.cisco.com |
https://www.huawei.com |
| security_level |
{} |
ALC_FLR.2, EAL3+ |
| dgst |
ccf46ffa94f7906b |
d8a044d00fb72964 |
| heuristics/cert_id |
CCEVS-VR-VID-11466-2024 |
|
| heuristics/cert_lab |
US |
[] |
| heuristics/cpe_matches |
cpe:2.3:o:cisco:ios_xe:17.12.1z3:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:17.12.5a:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:17.12.2a:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:17.12.5c:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:17.12.1y:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:17.12.1x:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:17.12.3a:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:17.12.5:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*, cpe:2.3:o:cisco:ios_xe:17.12.5b:*:*:*:*:*:*:* |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
CVE-2024-20433, CVE-2025-20171, CVE-2024-20316, CVE-2025-20338, CVE-2025-20201, CVE-2025-20162, CVE-2025-20196, CVE-2025-20170, CVE-2025-20199, CVE-2024-20455, CVE-2024-20437, CVE-2024-20436, CVE-2024-20414, CVE-2025-20169, CVE-2025-20175, CVE-2024-20278, CVE-2019-12660, CVE-2024-20309, CVE-2025-20155, CVE-2025-20172, CVE-2025-20195, CVE-2024-20434, CVE-2025-20194, CVE-2024-20308, CVE-2024-20467, CVE-2023-20246, CVE-2023-44487, CVE-2025-20198, CVE-2025-20193, CVE-2024-20480, CVE-2025-20202, CVE-2025-20176, CVE-2025-20221, CVE-2025-20173, CVE-2025-20197, CVE-2025-20200, CVE-2025-20188, CVE-2024-20271, CVE-2025-20214, CVE-2024-20510, CVE-2024-20324, CVE-2024-20314, CVE-2024-20306, CVE-2025-20186, CVE-2023-20273, CVE-2025-20352 |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1 |
ALC_LCD.1, ASE_CCL.1, ATE_FUN.1, ALC_FLR.2, AGD_OPE.1, ATE_COV.2, ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_DEL.1, ASE_TSS.1, ASE_REQ.2, ADV_FSP.3, ADV_ARC.1 |
| heuristics/extracted_versions |
17.12 |
6.0.1 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
|
- category: Data encryption storage devices / tools
- certification_date: 07.06.2021
- enhanced:
- category: Data encryption storage devices / tools
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1552
- certification_date: 07.06.2021
- description: TOE Overview The TOE, Huawei OceanStor Dorado V6 Series Storage System Software v 6.0.1, is a new-generation storage system developed by Huawei Technologies Co., Ltd. It is purpose-built for enterprise-class mission-critical business and equipped with comprehensive SAN features, and is ideal for use with databases, virtual desktop infrastructure (VDI), virtual server infrastructure (VSI), and SAP HANA. OceanStor Dorado V6 facilitates the transition to all-flash storage for customers in the finance, manufacturing, telecom, and other sectors. The TOE type is software only. The major security features implemented by the TOE are: Identification and authentication Authorization Access control Auditing Security management
- evaluation_facility: Applus Laboratories
- level: EAL3 + (ALC_FLR.2)
- manufacturer: Huawei Technologies Co., Ltd.
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1553
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1551
- type: Product
- manufacturer: Huawei Technologies Co., Ltd.
- product: Huawei OceanStor Dorado V6 Series Storage System Software v 6.0.1
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/845-huawei-oceanstor-dorado-v6-series-storage-system-software-v-6-0-1-1
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
51ed84742f89c3f7, 89f2a255423f4a20 |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_MACSEC_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf |
{} |
| pdf_data/cert_filename |
st_vid11466-ci.pdf |
2020-17-Diploma.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11466-2024: 1
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
- Cisco:
- Cisco: 1
- Cisco Systems, Inc: 1
|
- Huawei:
- Huawei: 2
- Huawei Technologies Co: 2
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /Producer: WeasyPrint 62.3
- /Title: Cisco Catalyst Industrial Ethernet 9300 Rugged Series Switches running IOS-XE 17.12
- pdf_file_size_bytes: 131982
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 874847
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
| pdf_data/report_filename |
st_vid11466-vr_posted.pdf |
2020-17-BOE-A-2021-9460.pdf |
| pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID11466-2024
- cert_item: Cisco Catalyst Industrial Ethernet 9300 Rugged Series Switches running IOS-XE 17.12
- cert_lab: US NIAP
|
|
| pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11466-2024: 1
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
- Cisco:
- Cisco: 28
- Cisco Systems, Inc: 3
|
- Huawei:
- Huawei: 2
- Huawei Technologies Co: 3
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
|
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 202796
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
| pdf_data/st_filename |
st_vid11466-st.pdf |
2020-17-ST.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 3: 1
- EAL3+: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 1
- ASE_INT.1: 2
- ASE_OBJ.1: 1
- ASE_REQ.1: 2
- ASE_SPD.1: 1
- ASE_TSS.1: 2
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- AGD:
- ALC:
- ALC_CMC.3: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 2
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 3
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_STG: 1
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.1.1: 1
- FCS_CKM.2: 6
- FCS_CKM.2.1: 2
- FCS_CKM.4: 6
- FCS_CKM.4.1: 1
- FCS_COP: 33
- FCS_COP.1: 9
- FCS_MKA.1.7: 1
- FCS_MKA_EXT.1: 4
- FCS_MKA_EXT.1.1: 1
- FCS_MKA_EXT.1.2: 1
- FCS_MKA_EXT.1.4: 2
- FCS_MKA_EXT.1.6: 1
- FCS_MKA_EXT.1.7: 1
- FCS_MKA_EXT.1.8: 2
- FCS_NTP_EXT.1.2: 1
- FCS_NTP_EXT.1.4: 2
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 7
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SNMP_EXT.1: 1
- FCS_SSHC_EXT.1: 1
- FCS_SSHS_EXT.1: 8
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.2: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSHS_EXT.1.4: 1
- FCS_SSHS_EXT.1.5: 1
- FCS_SSHS_EXT.1.6: 1
- FCS_SSHS_EXT.1.7: 1
- FCS_SSHS_EXT.1.8: 1
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.2.3: 1
- FCS_TLSS_EXT.1.3: 1
- FCS_TLSS_EXT.1.4: 3
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.2: 1
- FIA_AFL_EXT.1: 1
- FIA_PMG_EXT.1: 7
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT: 1
- FIA_PSK_EXT.1: 4
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 1
- FIA_UAU.1: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 3
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT: 1
- FIA_UIA_EXT.1: 3
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF: 9
- FMT_MOF.1: 1
- FMT_MTD: 9
- FMT_MTD.1: 1
- FMT_SMF: 6
- FMT_SMF.1: 6
- FMT_SMF.1.1: 2
- FMT_SMR.2: 4
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FMT_SNMP_EXT.1: 1
- FPT:
- FPT_APW_EXT: 1
- FPT_APW_EXT.1: 3
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_CAK_EXT.1: 4
- FPT_CAK_EXT.1.1: 1
- FPT_DDP_EXT.1: 2
- FPT_FLS.1: 6
- FPT_RPL.1: 7
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_RPL_EXT.1: 2
- FPT_SKP_EXT.1: 5
- FPT_SKP_EXT.1.1: 1
- FPT_STM_EXT.1: 5
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 2
- FPT_TST_EXT: 1
- FPT_TST_EXT.1: 3
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 4
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 5
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 10
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_TRP: 5
- FTP_TRP.1: 4
|
- FAU:
- FAU_GEN.1: 11
- FAU_GEN.2: 7
- FAU_SAR.1: 10
- FAU_SAR.2: 6
- FAU_SAR.3: 7
- FAU_STG.1: 9
- FAU_STG.3: 7
- FAU_STG.4: 6
- FCS:
- FCS_CKM.1: 6
- FCS_CKM.4: 4
- FCS_COP: 16
- FCS_COP.1: 3
- FDP:
- FDP_ACC: 17
- FDP_ACC.1: 10
- FDP_ACF: 10
- FDP_ACF.1: 12
- FDP_ITC.1: 4
- FDP_ITC.2: 4
- FIA:
- FIA_AFL.1: 7
- FIA_ATD: 19
- FIA_ATD.1: 4
- FIA_UAU: 2
- FIA_UAU.1: 1
- FIA_UAU.2: 6
- FIA_UAU.5: 6
- FIA_UAU.6: 7
- FIA_UAU.7: 7
- FIA_UID.1: 2
- FIA_UID.2: 10
- FIA_USB.1: 8
- FMT:
- FMT_MOF.1: 8
- FMT_MSA: 30
- FMT_MSA.1: 6
- FMT_MSA.3: 13
- FMT_MTD.1: 6
- FMT_SMF: 24
- FMT_SMF.1: 4
- FMT_SMR.1: 24
- FMT_SMR.1.1: 8
- FPT:
- FTA:
- FTA_SSL.3: 8
- FTA_TSE.1: 9
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALI: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.TRUSTED_ADMINISTRATOR: 1
- O:
- O.AUTHENTICATION_MACSEC: 1
- O.AUTHORIZED_ADMINISTRATION: 1
- O.CRYPTOGRAPHIC_FUNCTIONS_MACSEC: 1
- O.PORT_FILTERING_MACSEC: 1
- O.REPLAY_DETECTION: 1
- O.SYSTEM_MONITORING_MACSEC: 1
- O.TSF_INTEGRITY: 1
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.DATA_INTEGRITY: 1
- T.NETWORK_ACCESS: 1
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS_MACSEC: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
|
| pdf_data/st_keywords/vendor |
- Cisco:
- Cisco: 182
- Cisco Systems: 1
- Cisco Systems, Inc: 4
|
- Huawei:
- Huawei: 62
- Huawei Technologies Co: 56
- Microsoft:
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 40
- AES-128: 1
- AES-256: 1
- constructions:
- MAC:
- CMAC: 5
- HMAC: 8
- HMAC-SHA-256: 6
- HMAC-SHA-512: 4
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-256: 5
- SHA-512: 3
- SHA256: 1
- scrypt:
|
|
| pdf_data/st_keywords/crypto_scheme |
- KA:
- KEX:
- Key Exchange: 5
- Key exchange: 1
- MAC:
|
|
| pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140: 1
- FIPS 140-2: 2
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 2
- FIPS PUB 186-4: 7
- ISO:
- ISO/IEC 10116: 2
- ISO/IEC 18031:2011: 2
- ISO/IEC 18033-: 1
- ISO/IEC 18033-3: 2
- ISO/IEC 19772: 4
- ISO/IEC 9796-2: 1
- PKCS:
- RFC:
- RFC 2986: 2
- RFC 3526: 5
- RFC 3602: 3
- RFC 4253: 1
- RFC 4301: 1
- RFC 4303: 2
- RFC 4868: 1
- RFC 4945: 1
- RFC 5077: 1
- RFC 5280: 4
- RFC 5759: 1
- RFC 5996: 1
- RFC 7919: 2
- RFC3602: 2
- X509:
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 1 Abbreviations and Terminology 7.2 References 7.1 Abbreviations and Terminology remote replication(out of scope) Active Standby data center HyperMetro(out of scope) Active-Active Data Centers 3DC(out of scope: 1
- out of scope: 3
|
| pdf_data/st_metadata |
|
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
True |
| state/cert/download_ok |
True |
True |
| state/cert/extract_ok |
True |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |