| name |
Zyxel ZyWALL VPN Firewall series |
Hewlett-Packard Tru64 UNIX V5.1A |
| category |
Network and Network-Related Devices and Systems |
Operating Systems |
| scheme |
NO |
UK |
| status |
archived |
archived |
| not_valid_after |
19.04.2023 |
05.03.2013 |
| not_valid_before |
19.04.2018 |
01.02.2004 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20180419_SERTIT_S-100_C_v.1.0.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20180419_SERTIT-100_CR_v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP199.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/180126%20[ZXL]%20Zyxel%20ST%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Tru64STIssue1.pdf |
| manufacturer |
Zyxel Communications Corporation |
Hewlett-Packard Company |
| manufacturer_web |
https://www.zyxel.com/homepage.shtml |
https://www.hp.com |
| security_level |
EAL2+, ALC_FLR.2 |
EAL1 |
| dgst |
ce99cb59837d8a6d |
d58d29b92347f137 |
| heuristics/cert_id |
SERTIT-100 |
CRP199 |
| heuristics/cert_lab |
[] |
[] |
| heuristics/cpe_matches |
{} |
cpe:2.3:o:hp:tru64:5.1b1_pk4:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit2:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b2:pk4:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b2_pk4:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1a_pk5_bl23:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b3:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit3:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1a:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64_unix:5.1b:patch_kit4:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b:pk1:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b1:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b2:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1a_pk4_bl21:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b4:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b1:pk4:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b_pk1:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b_p3k_bl24:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1af:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b1_pk3:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1a:pk6:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b:*:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1b1:pk3:*:*:*:*:*:*, cpe:2.3:o:hp:tru64:5.1a_pk6:*:*:*:*:*:*:* |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
CVE-2002-1606, CVE-2002-1615, CVE-2002-1784, CVE-2002-1609, CVE-2002-1607, CVE-2000-1031, CVE-2007-6519, CVE-2007-2553, CVE-2008-4414, CVE-2005-0719, CVE-2002-1604, CVE-2005-2993, CVE-2004-0657, CVE-2002-1605, CVE-2006-5452, CVE-2004-2678, CVE-2002-1608, CVE-2002-1616, CVE-2005-3670, CVE-2007-2791, CVE-2002-1610, CVE-2006-6418, CVE-2002-1612, CVE-2002-1614, CVE-2003-0221, CVE-2002-1617, CVE-2002-1611, CVE-2002-1613, CVE-2003-1496, CVE-2007-0805 |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
AGD_ADM.1, ADV_RCR.1, ATE_IND.1, AGD_USR.1, ADV_FSP.1 |
| heuristics/extracted_versions |
- |
5.1 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- category: Network and Network-Related Devices and Systems
- certification_date: 19.04.2018
- developer: Zyxel Communications Corporation
- enhanced:
- category: Network and Network-Related Devices and Systems
- cert_id: SERTIT-100
- certification_date: 19.04.2018
- description: The TOE is one of a series of Zyxel ZyWALL VPN Firewalls. Each TOE is a self-contained box consisting of hardware and firmware, that provides stateful firewall and VPN-services for IPv4 and IPv6 networks. The TOE resides between one or more internal (virtual) networks (that the TOE is protecting) and an external network such as the Internet.
- developer: Zyxel Communications Corporation
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135250-1607953537/SERTIT/Sertifikater/2018/100/20180419_SERTIT_S-100_C_v.1.0.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135253-1607953539/SERTIT/Sertifikater/2018/100/180126%20%5BZXL%5D%20Zyxel%20ST%20v1.0.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135256-1607953544/SERTIT/Sertifikater/2018/100/20180419_SERTIT-100_CR_v1.0.pdf'})]})
- evaluation_facility: Brightsight B.V.
- level: EAL 2, ALC_FLR.2
- mutual_recognition: CCRA, SOG-IS
- product: USG20-VPN V4.30(ABAQ.0); USG40 V4.30(AALA.0); USG60 V4.30(AAKY.0); VPN50 V4.30(ABHL.0); USG110 V4.30(AAPH.0); USG210 V4.30(AAPI.0); USG310 V4.30(AAPJ.0); ZyWALL 110 V4.30(AAAA.0); ZyWALL 310 V4.30(AAAB.0); VPN100 V4.30(ABFV.0); VPN300 V4.30(ABFC.0); USG1100 V4.30(AAPK.0); USG1900 V4.30(AAPL.0); ZyWALL1100 V4.30(AAAC.0); USG2200-VPN V4.30(ABAE.0)
- sponsor: Zyxel Communications Corporation
- product: Zyxel ZyWALL VPN Firewall series
- url: https://sertit.no/certified-products/product-archive/zyxel-zywall-vpn-firewall-series
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
20180419_SERTIT_S-100_C_v.1.0.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- pdf_file_size_bytes: 721158
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
| pdf_data/report_filename |
20180419_SERTIT-100_CR_v1.0.pdf |
CRP199.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
- UK:
- CERTIFICATION REPORT No. P199: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 20
- EAL 2 augmented: 1
- EAL 4: 1
- EAL1: 1
- EAL7: 1
|
|
| pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 1
- ALC_FLR.2: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 2
- AVA:
|
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_SAR.1: 1
- FDP:
- FDP_RUL_EXT.1: 2
- FDP_UIT.1: 1
- FIA:
- FMT:
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FRU:
- FTP:
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.PHYSICAL: 1
- A.SINGLE_CONNECTION: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.DATA_FLOW_CONTROL: 1
- O.ENCRYPT: 1
- O.HIGH_AVAILABILITY: 1
- O.LOGGING: 1
- O.PROTECTED_MANAGEMENT: 1
- OE:
- OE.PHYSICAL: 1
- OE.SINGLE_CONNECTION: 1
- OE.TRUSTED_ADMIN: 1
- T:
- T.READ_MODIFY_DATA: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAUTHORIZED_DATA: 1
- T.UNDETECTED_ACTIONS: 2
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ISO:
|
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- The local network itself is assumed to be subject to appropriate security procedures but these are out of scope of the TOE. 6. The TOE offers FTP and T elnet services, constrained by the TOE’s user: 1
- out of scope: 2
- respond to requests for Telnet & FTP services. The network, including clients of FTP & Telnet, is out of scope of the evaluation (but is assumed to be constrained by a similar security policy to that of the TOE: 1
|
| pdf_data/report_metadata |
- /CreationDate: D:20180420105146Z00'00'
- /Creator: Word
- /ModDate: D:20180420105146Z00'00'
- /Producer: Mac OS X 10.13.4 Quartz PDFContext
- /Title: Microsoft Word - 20180419 SERTIT-100 CR v1.0.docx
- pdf_file_size_bytes: 1483850
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
- /Author: racook
- /CreationDate: D:20040213085521Z
- /Creator: tru64_cr_1_0 - Microsoft Word
- /ModDate: D:20131204151403Z
- /Producer: Acrobat PDFWriter 5.0 for Windows NT
- /Title: tru64_cr_1_0.doc
- pdf_file_size_bytes: 84416
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
| pdf_data/st_filename |
180126 [ZXL] Zyxel ST v1.0.pdf |
Tru64STIssue1.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
|
- ACM:
- ADO:
- ADV:
- ADV_FSP.1: 1
- ADV_RCR.1: 1
- AGD:
- AGD_ADM.1: 1
- AGD_USR.1: 1
- ATE:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 5
- FAU_SAR.2.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_IFC.1: 1
- FDP_RUL: 1
- FDP_RUL_EXT: 3
- FDP_RUL_EXT.1: 9
- FDP_RUL_EXT.1.1: 2
- FDP_RUL_EXT.1.2: 2
- FDP_RUL_EXT.1.3: 2
- FDP_RUL_EXT.1.4: 2
- FDP_RUL_EXT.1.5: 2
- FDP_RUL_EXT.1.6: 2
- FDP_RUL_EXT.1.7: 2
- FDP_RUL_EXT.1.8: 2
- FDP_RUL_EXT.1.9: 2
- FDP_UIT.1: 7
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_UAU: 17
- FIA_UID: 16
- FIA_UID.1: 4
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 4
- FMT_MOF.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 5
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 1
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FRU:
- FRU_FLT: 1
- FRU_FLT.2: 6
- FRU_FLT.2.1: 1
- FTP:
- FTP_ITC: 26
- FTP_ITC.1: 1
- FTP_ITC.1.3: 2
- FTP_TRP.1: 1
|
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FAU_GEN.2: 1
- FAU_GEN.2.1: 2
- FAU_SAR.1: 1
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 1
- FAU_SAR.2: 1
- FAU_SAR.2.1: 2
- FAU_SAR.3: 2
- FAU_SAR.3.1: 2
- FAU_SEL.1: 2
- FAU_SEL.1.1: 2
- FAU_STG.1: 1
- FAU_STG.1.1: 2
- FAU_STG.1.2: 1
- FAU_STG.3: 2
- FAU_STG.3.1: 2
- FDP:
- FDP_ACC.1: 2
- FDP_ACC.1.1: 2
- FDP_ACF.1: 8
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_RIP: 3
- FIA:
- FIA_ATD.1: 2
- FIA_ATD.1.1: 3
- FIA_SOS.1: 1
- FIA_SOS.1.1: 3
- FIA_UAU.1: 2
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.7: 1
- FIA_UAU.7.1: 2
- FIA_UID.1: 2
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_MSA.1: 2
- FMT_MSA.1.1: 2
- FMT_MSA.3: 1
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD: 14
- FMT_MTD.1: 1
- FMT_REV: 12
- FMT_SMR.1: 2
- FMT_SMR.1.1: 4
- FMT_SMR.1.2: 3
- FPT:
- FPT_AMT.1: 2
- FPT_AMT.1.1: 2
- FPT_RVM.1: 1
- FPT_RVM.1.1: 2
- FPT_SEP.1: 1
- FPT_SEP.1.1: 2
- FPT_SEP.1.2: 1
- FPT_STM.1: 1
- FPT_STM.1.1: 2
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.PHYSICAL: 2
- A.SINGLE_CONNECTION: 2
- A.TRUSTED_ADMIN: 2
- O:
- O.DATA_FLOW_CONTROL: 3
- O.ENCRYPT: 3
- O.HIGH_AVAILABILITY: 3
- O.LOGGING: 3
- O.PROTECTED_MANAGEMENT: 3
- OE:
- OE.PHYSICAL: 5
- OE.SINGLE_CONNECTION: 2
- OE.TRUSTED_ADMIN: 4
- T:
- T.READ_MODIFY_DATA: 2
- T.TSF_FAILURE: 2
- T.UNAUTHORIZED_ACCESS: 2
- T.UNAUTHORIZED_DATA: 2
- T.UNDETECTED_ACTIONS: 2
|
- A:
- A.CONNECT: 6
- A.COOP: 1
- A.LOCATE: 1
- A.MANAGE: 1
- A.NETWORK: 6
- A.NO_EVIL_ADM: 1
- A.PEER: 5
- A.PROTECT: 1
- O:
- O.AUDITING: 1
- O.AUTHORIZATION: 1
- O.CREDEN: 1
- O.DISCRETIONARY_ACCESS: 1
- O.ENFORCEMENT: 1
- O.INSTALL: 3
- O.MANAGE: 1
- O.PHYSICAL: 2
- O.RESIDUAL_INFORMATION: 1
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
- IKE:
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 1
- TLS v1.1: 1
- TLS v1.2: 2
- VPN:
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- RFC:
- RFC 3602: 1
- RFC 5280: 1
- RFC 5289: 5
- RFC2082: 1
- RFC2328: 1
- RFC2385: 1
- RFC2818: 1
- RFC5246: 1
- RFC5735: 2
- RFC5996: 1
|
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- ISO:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /CreationDate: D:20180126144913+01'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20180126144913+01'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 653210
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 31
|
- /Author: racook
- /CreationDate: D:20040218114941
- /Creator: Tru64ST Issue 1.0 - Microsoft Word
- /Producer: Acrobat PDFWriter 5.0 for Windows NT
- /Title: Tru64ST Issue 1.0.rtf
- pdf_file_size_bytes: 158515
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 39
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |