name |
Alcatel-Lucent Enterprise OmniSwitch with AOS 8.6.4.R11 |
HP StorageWorks P9500 Disk Array control program Version: 70-02-05-00/00 |
category |
Network and Network-Related Devices and Systems |
Access Control Devices and Systems |
scheme |
SE |
JP |
status |
active |
archived |
not_valid_after |
17.02.2026 |
03.10.2016 |
not_valid_before |
17.02.2021 |
30.09.2011 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRA%20-%20ALE%20Enterprise.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20Alcatel-Lucent%20Enterprise%20OmniSwitch%20series%206465,%206560,%206860,%206865,%206900,%209900%20with%20AOS%208.6.4.R11.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0319_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Alcatel-Lucent%20Enterprise%20OmniSwitch%20with%20AOS%208.6.R11%20Security%20Target%20for%20EAL2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0319_est.pdf |
manufacturer |
ALE USA Inc |
Hewlett-Packard Company |
manufacturer_web |
https://www.al-enterprise.com/ |
https://www.hp.com |
security_level |
EAL2, ALC_FLR.2 |
EAL2 |
dgst |
d5fa8a7a4ee69ffd |
43c3293c7e3cff5b |
heuristics/cert_id |
CSEC2019023 |
JISEC-CC-CRP-C0319 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
8.6.4 |
02, 70, 05, 00 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0319
- certification_date: 01.09.2011
- claim: EAL2
- enhanced:
- assurance_level: EAL2
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0319_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on "HP StorageWorks P9500 Disk Array" storage system. The TOE is responsible to identify, authenticate and control read/write access from host computers to the storage system. In addition, the TOE also includes function(s) to manage encryption keys that encrypt data written to the storage system, and function to decrypt data read from the storage system and securely erase the data stored in the storage system. TOE security functions The TOE has the following security functions to protect user data stored in the storage system. - Controlling accesses from Remote Web Console users and support personnel to granted partitions specified by the groups of storage resources - Controlling accesses from host computers to the granted logical devices in the storage system. - Authentication of host computers - Identification and authentication of Remote Web Console users and support personnel - Encrypted communication between Remote Web Console and SVP PC, and SVP PC and external authentication servers. - Encryption of stored data(Encryption key management) - Shredding - Audit logging
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: HP StorageWorks P9500 Disk Array control program
- product_type: Control Program for storage system
- report_link: https://www.ipa.go.jp/en/security/c0319_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0319_est.pdf
- toe_version: 70-02-05-00/00
- vendor: Hewlett-Packard Company
- expiration_date: 01.10.2016
- supplier: Hewlett-Packard Company
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0319_it1336.html
- toe_overseas_name: HP StorageWorks P9500 Disk Array control program 70-02-05-00/00
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
CCRA - ALE Enterprise.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20210905105009+02'00'
- /Creator: RICOH MP C4504ex
- /ModDate: D:20210905113053+02'00'
- /Producer: RICOH MP C4504ex
- pdf_file_size_bytes: 911543
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
Certification Report - Alcatel-Lucent Enterprise OmniSwitch series 6465, 6560, 6860, 6865, 6900, 9900 with AOS 8.6.4.R11.pdf |
c0319_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0319-02: 1
- Certification No. C0319: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 2
- EAL 2 augmented: 1
- EAL2: 2
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.RESIDUAL_INFORMATION: 1
- A.SERVICES_RELIABLE: 1
- A.TRUSTED_ADMINISTRATOR: 1
- T:
- T.INFORMATION_FLOW_POLICY_VIOLATION: 1
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
- A:
- A.CONNECT_STORAGE: 1
- A.EXTERNAL_SERVER: 2
- A.MANAGEMENT_PC: 1
- A.MANAGE_SECRET: 1
- A.NOEVIL: 1
- A.NOEVIL_MNT: 1
- A.PHYSICAL_SEC: 1
- T:
- T.CHG_CONFIG: 2
- T.HDD_REUSE: 2
- T.HDD_THEFT: 2
- T.ILLEGAL_XCNTL: 2
- T.LP_LEAK: 2
- T.TSF_COMP: 2
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- SSH:
- TLS:
- SSL:
- SSL: 1
- SSLv2.0: 1
- SSLv3.0: 1
- TLS:
- TLS: 6
- TLS 1.2: 1
- TLSv1.0: 1
- TLSv1.1: 5
- TLSv1.2: 5
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ISO:
- X509:
|
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: MAAVA
- /CreationDate: D:20210218173433+01'00'
- /ModDate: D:20210218173433+01'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - Certification Report ALE Omniswitch v2
- pdf_file_size_bytes: 766005
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /CreationDate: D:20120509162324+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20120509162402+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 921595
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 40
|
pdf_data/st_filename |
Alcatel-Lucent Enterprise OmniSwitch with AOS 8.6.R11 Security Target for EAL2.pdf |
c0319_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG_EXT.1: 8
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM.1: 21
- FCS_CKM.1.1: 1
- FCS_CKM.2: 14
- FCS_CKM.2.1: 1
- FCS_CKM.4: 14
- FCS_CKM.4.1: 1
- FCS_COP: 62
- FCS_COP.1: 5
- FCS_COP.1.1: 4
- FCS_RBG_EXT.1: 13
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_SSHC_EXT: 9
- FCS_SSHC_EXT.1: 8
- FCS_SSHS_EXT: 8
- FCS_SSHS_EXT.1: 9
- FCS_TLSC_EXT: 5
- FCS_TLSC_EXT.2: 9
- FCS_TLSS_EXT: 6
- FCS_TLSS_EXT.2: 9
- FDP:
- FDP_ACC.1: 1
- FDP_IFC: 18
- FDP_IFC.1: 5
- FDP_IFC.1.1: 2
- FDP_IFF: 14
- FDP_IFF.1: 4
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_PMG_EXT.1: 9
- FIA_PMG_EXT.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 7
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 9
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 13
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FIA_UID.1: 9
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 20
- FMT_MOF.1: 3
- FMT_MOF.1.1: 3
- FMT_MSA.1: 9
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 15
- FMT_MTD.1: 2
- FMT_MTD.1.1: 2
- FMT_SMF.1: 18
- FMT_SMF.1.1: 1
- FMT_SMR.1: 2
- FMT_SMR.2: 17
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 9
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT.1: 9
- FPT_SKP_EXT.1.1: 1
- FPT_STM_EXT.1: 12
- FPT_STM_EXT.1.1: 1
- FPT_STM_EXT.1.2: 1
- FPT_TST_EXT.1: 9
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 9
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTA_SSL.4: 8
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 9
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 10
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 10
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN.1: 18
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 12
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 10
- FAU_STG.3.1: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP.1: 2
- FDP:
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_RIP.1: 10
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 19
- FIA_ATD.1: 6
- FIA_SOS: 20
- FIA_SOS.1: 2
- FIA_UAU.1: 15
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 11
- FIA_UAU.2.1: 1
- FIA_UID.1: 8
- FIA_UID.2: 16
- FIA_UID.2.1: 1
- FIA_USB: 18
- FIA_USB.1: 6
- FMT:
- FMT_MOF.1: 14
- FMT_MOF.1.1: 1
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 15
- FMT_MTD.1.1: 1
- FMT_MTD.3: 10
- FMT_MTD.3.1: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 18
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM: 1
- FPT_STM.1: 13
- FPT_STM.1.1: 1
- FTP:
- FTP_ITC.1: 10
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 9
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 3
- A.LIMITED_FUNCTIONALITY: 3
- A.PHYSICAL_PROTECTION: 3
- A.REGULAR_UPDATES: 3
- A.RESIDUAL_INFORMATION: 3
- A.SERVICES_RELIABLE: 3
- A.TRUSTED_ADMINISTRATOR: 3
- O:
- O.ACCESS_BANNER: 4
- O.ADMIN_ACCESS: 14
- O.ADMIN_SESSION: 7
- O.AUDIT: 12
- O.COMMUNICATION_CHANNELS: 15
- O.CRYPTOGRAPHY: 12
- O.MEDIATE: 16
- O.SELF_TESTS: 5
- O.STRONG_PASSWORDS: 8
- O.TRUSTED_UPDATES: 8
- O.TSF_DATA_PROTECTION: 10
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 2
- OE.NO_GENERAL_PURPOSE: 2
- OE.PHYSICAL: 2
- OE.RESIDUAL_INFORMATION: 2
- OE.SERVICES_RELIABLE: 2
- OE.TRUSTED_ADMIN: 2
- OE.UPDATES: 2
- T:
- T.INFORMATION_FLOW_POLICY_VIOLATION: 2
- T.PASSWORD_CRACKING: 3
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 2
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 3
- T.UNDETECTED_ACTIVITY: 3
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 2
- T.UPDATE_COMPROMISE: 3
- T.WEAK_AUTHENTICATION_ENDPOINTS: 2
- T.WEAK_CRYPTOGRAPHY: 3
|
- A:
- A.CONNECT_STORAGE: 3
- A.EXTERNAL_SERVER: 3
- A.MANAGEMENT_PC: 3
- A.MANAGE_SECRET: 3
- A.NOEVIL: 3
- A.NOEVIL_MNT: 3
- A.PHYSICAL_SEC: 3
- O:
- O.ADM_AUTH: 9
- O.ADM_ROLE: 5
- O.AUD_GEN: 8
- O.HDD_: 2
- O.HDD_ENC: 6
- O.HDD_SHRED: 3
- O.HOST_ACCESS: 8
- O.HOST_AUTH: 5
- O.SEC_COMM: 8
- OE:
- OE.CONNECT_STORAGE: 2
- OE.EXTERNAL_SERVER: 3
- OE.FC-SP_HBA: 3
- OE.HDD_ENC: 2
- OE.MANAGEMENT_PC: 3
- OE.MANAGE_SECRET: 2
- OE.NOEVIL: 2
- OE.NOEVIL-MNT: 1
- OE.NOEVIL_MNT: 1
- OE.PHYSICAL_SEC: 4
- T:
- T.CHG_CONFIG: 3
- T.HDD_REUSE: 3
- T.HDD_THEFT: 3
- T.ILLEGAL_XCNTL: 3
- T.LP_LEAK: 3
- T.TSF_COMP: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 5
- HMAC-SHA-256: 5
- HMAC-SHA-384: 4
- HMAC-SHA-512: 4
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 3
- SHA-256: 18
- SHA-384: 8
- SHA-512: 11
- SHA256: 2
- SHA384: 1
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- SSH:
- TLS:
- SSL:
- SSL: 4
- SSL 2.0: 1
- SSL 3.0: 1
- SSLv2.0: 2
- SSLv3.0: 2
- TLS:
- TLS: 81
- TLS 1.0: 1
- TLS 1.1: 2
- TLS 1.2: 2
- TLSv1.0: 2
- TLSv1.1: 30
- TLSv1.2: 30
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- NIST P-256: 1
- P-224: 2
- P-256: 15
- P-384: 16
- P-521: 16
- secp256r1: 3
- secp384r1: 3
- secp521r1: 3
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 3
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 3
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_RSA_WITH_AES_256_CBC_SHA: 3
- TLS_RSA_WITH_AES_256_CBC_SHA256: 3
- TLS_RSA_WITH_AES_256_GCM_SHA384: 3
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 1
- FIPS PUB 186-4: 4
- ISO:
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 2
- ISO/IEC 9796-2: 1
- PKCS:
- RFC:
- RFC 6125: 1
- RFC2986: 3
- RFC3268: 5
- RFC3411: 2
- RFC3526: 4
- RFC4251: 3
- RFC4252: 4
- RFC4253: 4
- RFC4254: 2
- RFC4344: 2
- RFC4346: 3
- RFC4492: 10
- RFC5246: 7
- RFC5280: 5
- RFC5288: 5
- RFC5289: 17
- RFC5591: 2
- RFC5656: 2
- RFC5759: 3
- RFC5953: 2
- RFC6125: 2
- RFC6668: 2
- RFC6960: 3
- RFC8017: 2
- RFC8332: 2
- RFC8422: 2
- X509:
|
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- FIPS:
- FIPS PUB 180-2: 1
- FIPS PUB 197: 2
- FIPS PUB 46-3: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Alejandro Masino (generated by CCTool version 2.8.4.48)
- /CreationDate: D:20210209163010Z
- /Creator: Unknown
- /Keywords: ALE USA Inc., ALE, Alcatel-Lucent Enterprise, OmniSwitch, Alcatel-Lucent Operating System, AOS, OmniSwitch 6465, OmniSwitch 6560, OmniSwitch 6860, OmniSwitch 6865, OmniSwitch 6900, OmniSwitch 9900, OS6465, OS6560, OS6860, OS6865, OS6900, OS9900
- /ModDate: D:20210218173531+01'00'
- /Producer: XEP 4.25.502
- /Subject: Alcatel-Lucent Enterprise OmniSwitch series 6465, 6560, 6860, 6865, 6900, 9900 with AOS 8.6.4.R11
- /Title: Alcatel-Lucent Enterprise OmniSwitch with AOS 8.6.R11 Security Target for EAL2 (version 3.2 as of 2021-02-03)
- /Trapped: /False
- /application: CCTool version x.y
- pdf_file_size_bytes: 1536487
- pdf_hyperlinks: http://www.ietf.org/rfc/rfc4346.txt, https://www.niap-ccevs.org/MMO/PP/CPP_ND_V2.1.pdf, http://www.ietf.org/rfc/rfc6125.txt, http://www.ietf.org/rfc/rfc3268.txt, http://www.ietf.org/rfc/rfc5759.txt, http://www.ietf.org/rfc/rfc5656.txt, http://www.ietf.org/rfc/rfc4344.txt, http://www.ietf.org/rfc/rfc2986.txt, http://www.ietf.org/rfc/rfc8017.txt, http://www.ietf.org/rfc/rfc5280.txt, http://www.ietf.org/rfc/rfc5953.txt, http://www.ietf.org/rfc/rfc6668.txt, http://www.ietf.org/rfc/rfc8422.txt, http://www.ietf.org/rfc/rfc4492.txt, http://www.ietf.org/rfc/rfc6960.txt, http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R5.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R5.pdf, http://www.ietf.org/rfc/rfc4251.txt, http://www.ietf.org/rfc/rfc5246.txt, http://www.ietf.org/rfc/rfc4252.txt, http://www.ietf.org/rfc/rfc5591.txt, http://www.ietf.org/rfc/rfc5288.txt, http://www.ietf.org/rfc/rfc4253.txt, http://www.ietf.org/rfc/rfc3526.txt, http://www.ietf.org/rfc/rfc4254.txt, http://www.ietf.org/rfc/rfc8332.txt, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R5.pdf, http://www.ietf.org/rfc/rfc5289.txt, http://www.ietf.org/rfc/rfc3411.txt
- pdf_is_encrypted: False
- pdf_number_of_pages: 110
|
- /Author: \376\377\000Y\000a\000n\000g\000@\000M\000H\000I\000R
- /CreationDate: D:2012040314144209'00'
- /Creator: PrimoPDF http://www.primopdf.com/
- /ModDate: D:20120404204633-07'00'
- /Producer: PrimoPDF
- /Title: Microsoft Word - HP-P9500-ST-Final.doc
- pdf_file_size_bytes: 641105
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 76
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |