Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Tripwire Manager 3.0 with Tripwire for Servers 3.0, Tripwire Manager 3.0 with Tripwire for Servers Check Point Edition 3.0
CCEVS-VR-0035-2003
SuSE Linux Enterprise Server V8, Service Pack 3, RC4, with certification-sles-eal3 package
BSI-DSZ-CC-0234-2004
name Tripwire Manager 3.0 with Tripwire for Servers 3.0, Tripwire Manager 3.0 with Tripwire for Servers Check Point Edition 3.0 SuSE Linux Enterprise Server V8, Service Pack 3, RC4, with certification-sles-eal3 package
category Data Protection Operating Systems
scheme US DE
not_valid_after 07.09.2012 01.09.2019
not_valid_before 01.03.2003 01.01.2004
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6000-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0234a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid6000-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0234b.pdf
manufacturer Tripwire, Inc. SUSE Linux Products Gmbh
manufacturer_web https://www.tripwire.com https://www.suse.com/
security_level EAL1 EAL3+, ALC_FLR.2
dgst e07746da1882499e 2c4e3780babceb49
heuristics/cert_id CCEVS-VR-0035-2003 BSI-DSZ-CC-0234-2004
heuristics/cert_lab US BSI
heuristics/cpe_matches {} cpe:2.3:o:suse:suse_linux:3.0:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2005-1043, CVE-2005-0639, CVE-2005-3147, CVE-2005-3146, CVE-2005-3148, CVE-2004-1491, CVE-2007-0460, CVE-2007-4393, CVE-2007-6167, CVE-2000-0361, CVE-2005-0638, CVE-2007-4074, CVE-2008-3949, CVE-2004-1191, CVE-2004-1184, CVE-2000-0218, CVE-2005-0206
heuristics/direct_transitive_cves {} CVE-2004-0587, CVE-2005-3147, CVE-2010-4342, CVE-2005-3146, CVE-2005-0207, CVE-2004-1092, CVE-2004-0746, CVE-2009-2903, CVE-2004-0688, CVE-2004-1176, CVE-2004-1142, CVE-2004-0867, CVE-2009-2408, CVE-2004-1072, CVE-2004-1174, CVE-2004-1071, CVE-2003-1538, CVE-2004-0064, CVE-2004-1070, CVE-2004-1154, CVE-2006-2752, CVE-2007-5000, CVE-2005-0398, CVE-2005-0085, CVE-2005-4790, CVE-2009-2625, CVE-2004-0886, CVE-2009-3231, CVE-2010-4158, CVE-2004-0936, CVE-2004-0687, CVE-2010-3848, CVE-2004-0803, CVE-2004-0991, CVE-2004-1074, CVE-2010-4258, CVE-2005-0005, CVE-2005-0156, CVE-2004-0940, CVE-2004-0903, CVE-2005-0639, CVE-2011-0762, CVE-2004-0802, CVE-2004-1090, CVE-2004-0866, CVE-2002-0762, CVE-2004-0957, CVE-2004-0914, CVE-2005-4772, CVE-2010-1205, CVE-2004-1491, CVE-2010-3442, CVE-2004-1175, CVE-2010-3849, CVE-2004-0461, CVE-2010-3702, CVE-2010-2941, CVE-2010-2249, CVE-2005-0750, CVE-2004-1184, CVE-2009-0115, CVE-2010-0205, CVE-2006-2703, CVE-2004-0827, CVE-2004-0933, CVE-2009-0040, CVE-2004-1895, CVE-2005-0638, CVE-2004-0817, CVE-2008-3949, CVE-2004-0554, CVE-2008-5021, CVE-2004-0902, CVE-2010-4081, CVE-2005-4788, CVE-2010-4180, CVE-2009-2910, CVE-2004-0535, CVE-2010-3850, CVE-2010-3067, CVE-2004-2097, CVE-2004-1237, CVE-2004-0888, CVE-2004-2658, CVE-2010-4072, CVE-2004-1096, CVE-2004-0947, CVE-2010-4164, CVE-2010-4073, CVE-2005-3321, CVE-2009-2698, CVE-2007-4074, CVE-2004-1139, CVE-2004-1191, CVE-2011-4862, CVE-2010-3876, CVE-2010-4083, CVE-2000-0218, CVE-2005-1043, CVE-2004-1091, CVE-2004-0956, CVE-2004-0935, CVE-2007-6427, CVE-2009-3095, CVE-2005-0373, CVE-2009-2848, CVE-2007-4393, CVE-2004-1145, CVE-2005-0206, CVE-2004-0949, CVE-2005-1767, CVE-2008-1375, CVE-2004-0883, CVE-2004-0889, CVE-2004-0807, CVE-2010-3873, CVE-2004-0460, CVE-2004-1190, CVE-2004-1235, CVE-2002-0854, CVE-2004-1170, CVE-2009-0949, CVE-2004-0981, CVE-2000-0361, CVE-2004-1005, CVE-2005-0337, CVE-2005-3297, CVE-2005-3298, CVE-2005-0605, CVE-2004-1093, CVE-2005-3148, CVE-2013-4002, CVE-2002-0768, CVE-2006-0803, CVE-2005-4789, CVE-2005-0470, CVE-2004-0934, CVE-2004-1073, CVE-2007-0460, CVE-2007-1285, CVE-2007-6167, CVE-2004-1476, CVE-2003-1295, CVE-2005-3322, CVE-2009-3620, CVE-2005-0384, CVE-2004-0937, CVE-2009-1955, CVE-2004-0497, CVE-2004-0905, CVE-2010-3437, CVE-2004-0932, CVE-2004-1009, CVE-2005-1761, CVE-2010-4160, CVE-2004-0990, CVE-2007-2654, CVE-2004-0495, CVE-2010-4157, CVE-2004-1098, CVE-2004-0626, CVE-2005-2023, CVE-2004-0929, CVE-2002-1285, CVE-2004-1004, CVE-2009-2416
heuristics/indirect_transitive_cves {} CVE-2004-0587, CVE-2005-3147, CVE-2010-4342, CVE-2005-3146, CVE-2005-0207, CVE-2004-1092, CVE-2004-0746, CVE-2009-2903, CVE-2004-0688, CVE-2004-1176, CVE-2004-1142, CVE-2004-0867, CVE-2009-2408, CVE-2004-1072, CVE-2004-1174, CVE-2004-1071, CVE-2003-1538, CVE-2004-0064, CVE-2004-1070, CVE-2004-1154, CVE-2006-2752, CVE-2007-5000, CVE-2005-0398, CVE-2005-0085, CVE-2005-4790, CVE-2009-2625, CVE-2004-0886, CVE-2009-3231, CVE-2010-4158, CVE-2004-0936, CVE-2004-0687, CVE-2010-3848, CVE-2004-0803, CVE-2004-0991, CVE-2004-1074, CVE-2010-4258, CVE-2005-0005, CVE-2005-0156, CVE-2004-0940, CVE-2004-0903, CVE-2005-0639, CVE-2011-0762, CVE-2004-0802, CVE-2004-1090, CVE-2004-0866, CVE-2002-0762, CVE-2004-0957, CVE-2004-0914, CVE-2005-4772, CVE-2010-1205, CVE-2004-1491, CVE-2010-3442, CVE-2004-1175, CVE-2010-3849, CVE-2004-0461, CVE-2010-3702, CVE-2010-2941, CVE-2010-2249, CVE-2005-0750, CVE-2004-1184, CVE-2009-0115, CVE-2010-0205, CVE-2006-2703, CVE-2004-0827, CVE-2004-0933, CVE-2009-0040, CVE-2004-1895, CVE-2005-0638, CVE-2004-0817, CVE-2008-3949, CVE-2004-0554, CVE-2008-5021, CVE-2004-0902, CVE-2010-4081, CVE-2005-4788, CVE-2010-4180, CVE-2009-2910, CVE-2004-0535, CVE-2010-3850, CVE-2010-3067, CVE-2004-2097, CVE-2004-1237, CVE-2004-0888, CVE-2004-2658, CVE-2010-4072, CVE-2004-1096, CVE-2004-0947, CVE-2010-4164, CVE-2010-4073, CVE-2005-3321, CVE-2009-2698, CVE-2007-4074, CVE-2004-1139, CVE-2004-1191, CVE-2011-4862, CVE-2010-3876, CVE-2010-4083, CVE-2000-0218, CVE-2005-1043, CVE-2004-1091, CVE-2004-0956, CVE-2004-0935, CVE-2007-6427, CVE-2009-3095, CVE-2005-0373, CVE-2009-2848, CVE-2007-4393, CVE-2004-1145, CVE-2005-0206, CVE-2004-0949, CVE-2005-1767, CVE-2008-1375, CVE-2004-0883, CVE-2004-0889, CVE-2004-0807, CVE-2010-3873, CVE-2004-0460, CVE-2004-1190, CVE-2004-1235, CVE-2002-0854, CVE-2004-1170, CVE-2009-0949, CVE-2004-0981, CVE-2000-0361, CVE-2004-1005, CVE-2005-0337, CVE-2005-3297, CVE-2005-3298, CVE-2005-0605, CVE-2004-1093, CVE-2005-3148, CVE-2013-4002, CVE-2002-0768, CVE-2006-0803, CVE-2005-4789, CVE-2005-0470, CVE-2004-0934, CVE-2004-1073, CVE-2007-0460, CVE-2007-1285, CVE-2007-6167, CVE-2004-1476, CVE-2003-1295, CVE-2005-3322, CVE-2009-3620, CVE-2005-0384, CVE-2004-0937, CVE-2009-1955, CVE-2004-0497, CVE-2004-0905, CVE-2010-3437, CVE-2004-0932, CVE-2004-1009, CVE-2005-1761, CVE-2010-4160, CVE-2004-0990, CVE-2007-2654, CVE-2004-0495, CVE-2010-4157, CVE-2004-1098, CVE-2004-0626, CVE-2005-2023, CVE-2004-0929, CVE-2002-1285, CVE-2004-1004, CVE-2009-2416
heuristics/extracted_sars ADV_RCR.1, ADV_FSP.1, AGD_USR.1, ATE_IND.1, AGD_ADM.1 ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, AVA_MSU.1, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, AVA_SOF.1, ATE_COV.2, ASE_TSS.1, AGD_ADM.1, ATE_FUN.1, ATE_DPT.1, ALC_FLR.2, ALC_DVS.1, ADV_FSP.1, ASE_SRE.1, ASE_OBJ.1, AVA_VLA.1, ATE_IND.2
heuristics/extracted_versions 3.0 3
heuristics/report_references/directly_referenced_by {} CRP212, BSI-DSZ-CC-0270-2004, CRP211, BSI-DSZ-CC-0327-2005, BSI-DSZ-CC-0256-2005
heuristics/report_references/indirectly_referenced_by {} CRP212, BSI-DSZ-CC-0256-2005, BSI-DSZ-CC-0270-2004, CRP211, BSI-DSZ-CC-0371-2006, BSI-DSZ-CC-0327-2005
heuristics/scheme_data
  • category: Sensitive Data Protection
  • certification_date: 14.03.2003
  • evaluation_facility: Arca CCTL
  • expiration_date:
  • id: CCEVS-VR-VID6000
  • product: Tripwire Manager 3.0 with Tripwire for Servers 3.0, Tripwire Manager 3.0 with Tripwire for Servers Check Point Edition, 3.0
  • scheme: US
  • url: https://www.niap-ccevs.org/product/6000
  • vendor: Tripwire, Inc.
pdf_data/report_filename st_vid6000-vr.pdf 0234a.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-03-0035
    • cert_item: For Tripwire Manager ® 3.0 with Tripwire for Servers ® 3.0, Tripwire Manager ® 3.0 with Tripwire for Servers Check Point Edition ® 3.0
    • cert_lab: US NIAP
  • DE:
    • cert_id: BSI-DSZ-CC-0234-2004
    • cert_item: SuSE Linux Enterprise Server V8 Service Pack 3, RC4 with certification-sles-eal3 package
    • cert_lab: BSI
    • developer: SUSE LINUX AG sponsored by IBM Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-03-0035: 1
  • DE:
    • BSI-DSZ-CC-0234: 1
    • BSI-DSZ-CC-0234-2004: 24
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL1: 3
  • EAL:
    • EAL 1: 1
    • EAL 4: 1
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 7
    • EAL3 augmented: 2
    • EAL3+: 1
    • EAL4: 4
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ADO:
    • ADO_IGS.1: 1
  • ACM:
    • ACM_AUT: 2
    • ACM_CAP: 2
    • ACM_CAP.3: 1
    • ACM_SCP: 2
    • ACM_SCP.1: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.1: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.1: 1
    • ADV_HLD: 2
    • ADV_HLD.2: 1
    • ADV_IMP: 2
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_RCR.1: 1
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 1
    • AGD_USR: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.1: 1
    • ALC_FLR: 2
    • ALC_FLR.2: 5
    • ALC_LCD: 1
    • ALC_TAT: 2
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_DPT: 2
    • ATE_DPT.1: 1
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_IND: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.1: 1
    • AVA_SOF: 4
    • AVA_SOF.1: 1
    • AVA_VLA: 4
    • AVA_VLA.1: 2
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_GEN.2: 1
    • FAU_SAR.1: 1
    • FAU_SAR.2: 1
    • FAU_SAR.3: 1
    • FAU_SEL.1: 1
    • FAU_STG.1: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.2: 1
    • FCS_COP.1: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
    • FDP_RIP.2: 1
    • FDP_UCT.1: 1
    • FDP_UIT.1: 1
  • FIA:
    • FIA_ATD.1: 1
    • FIA_SOS.1: 1
    • FIA_UAU.2: 1
    • FIA_UAU.7: 1
    • FIA_UID.2: 1
    • FIA_USB.1: 1
  • FMT:
    • FMT_MSA.1: 1
    • FMT_MSA.2: 1
    • FMT_MSA.3: 1
    • FMT_MTD.1: 1
    • FMT_REV.1: 1
    • FMT_SMF: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_AMT.1: 1
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
    • FPT_STM.1: 1
  • FTP:
    • FTP_ITC.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.CONNECT: 2
    • A.COOP: 2
    • A.LOCATE: 2
    • A.MANAGE: 2
    • A.NET_COMP: 2
    • A.NO_EVIL_ADMIN: 2
    • A.PEER: 2
    • A.PROTECT: 2
    • A.UTRAIN: 2
    • A.UTRUST: 2
  • OE:
    • OE.CREDEN: 1
    • OE.HW_SEP: 1
    • OE.INFO_PROTECT: 1
    • OE.INSTALL: 1
    • OE.MAINTENANCE: 1
    • OE.RECOVER: 1
    • OE.SERIAL_LOGIN: 1
    • OE.SOFTWARE_IN: 1
  • T:
    • T.COMPROT: 1
    • T.UAACCESS: 1
    • T.UAUSER: 1
pdf_data/report_keywords/vendor
  • Broadcom:
    • Broadcom: 1
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 5
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 4
  • AES_competition:
    • RC:
      • RC4: 11
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 5
  • VPN:
    • VPN: 1
  • SSH:
    • SSH: 7
  • TLS:
    • SSL:
      • SSL: 6
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
  • BSI:
    • AIS32: 1
    • AIS33: 1
  • ISO:
    • ISO/IEC 15408:1999: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 8] Evaluation Technical Report BSI-DSZ-CC-0234, 1.0, 2003-12-18, atsec Information Security GmbH (confidential document) [9] Controlled Access Protection Profile (CAPP), Version 1.d National Security Agency, 1999-10-08: 1
pdf_data/report_metadata
  • /Author: Richard White
  • /CreationDate: D:20030318132529-05'00'
  • /Creator: Acrobat PDFMaker 5.0 for Word
  • /ModDate: D:20030318133157-05'00'
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • /Subject: CCEVS VR Report
  • /Title: Tripwire Validation Report
  • pdf_file_size_bytes: 238744
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
  • /Author: BSI
  • /CreationDate: D:20040115100201+01'00'
  • /Creator: AdobePS5.dll Version 5.2
  • /Keywords: Linux SLES Common Criteria
  • /ModDate: D:20040115100429+01'00'
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • /Title: Certification Report 0234
  • pdf_file_size_bytes: 329537
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 49
pdf_data/st_filename st_vid6000-st.pdf 0234b.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1: 3
    • EAL1: 8
  • EAL:
    • EAL 3: 1
    • EAL 3 augmented: 1
    • EAL2: 1
    • EAL2 augmented: 1
    • EAL2+: 1
    • EAL3: 7
    • EAL3 augmented: 3
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP: 2
    • ACM_CAP.1: 5
  • ADO:
    • ADO_IGS: 2
    • ADO_IGS.1: 4
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.1: 7
    • ADV_RCR: 2
    • ADV_RCR.1: 4
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 11
    • AGD_USR: 2
    • AGD_USR.1: 9
  • ATE:
    • ATE_IND: 2
    • ATE_IND.1: 4
  • ACM:
    • ACM_CAP.3: 1
    • ACM_SCP.1: 1
  • ADO:
    • ADO_DEL.1: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.1: 1
    • ADV_HLD.2: 1
    • ADV_RCR.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_FLR.2: 7
    • ALC_FLR.3: 1
  • ASE:
    • ASE_REQ.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.1: 1
    • AVA_SOF.1: 2
    • AVA_VLA.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 4
    • FAU_MSA: 8
    • FAU_PRG: 3
    • FAU_PRG.1: 11
    • FAU_PRG.1.1: 1
    • FAU_PRG.1.2: 1
    • FAU_PRR: 3
    • FAU_PRR.1: 6
    • FAU_PRR.1.1: 1
    • FAU_PRR.1.2: 1
    • FAU_SAR: 3
    • FAU_SAR.1: 7
    • FAU_SAR.1.2: 1
    • FAU_STG: 3
    • FAU_STG.1: 8
    • FAU_TWG: 3
    • FAU_TWG.1: 9
    • FAU_TWG.1.1: 1
    • FAU_TWG.1.2: 1
  • FDP:
    • FDP_ACC: 22
    • FDP_ACC.1: 2
    • FDP_ACF: 20
    • FDP_ACF.1: 8
    • FDP_SDI: 3
    • FDP_SDI.2: 7
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_ATD: 19
    • FIA_ATD.1: 2
    • FIA_UAU: 3
    • FIA_UAU.1: 6
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID: 3
    • FIA_UID.1: 9
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MSA: 36
    • FMT_MSA.1: 2
    • FMT_MSA.3: 4
    • FMT_SMF: 1
    • FMT_SMF.1: 16
    • FMT_SMR: 1
    • FMT_SMR.1: 15
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM: 3
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_ITC.1: 1
    • FTP_TWI: 3
    • FTP_TWI.1: 8
    • FTP_TWI.1.1: 1
    • FTP_TWI.1.2: 1
    • FTP_TWI.1.3: 1
  • FAU:
    • FAU_GEN.1: 13
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 10
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 13
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 12
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 11
    • FAU_SAR.3.1: 1
    • FAU_SEL.1: 11
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 11
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.2: 1
    • FAU_STG.3: 12
    • FAU_STG.3.1: 1
    • FAU_STG.4: 11
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 23
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 24
    • FCS_CKM.2.1: 4
    • FCS_CKM.4: 4
    • FCS_COP.1: 22
    • FCS_COP.1.1: 3
  • FDP:
    • FDP_ACC.1: 24
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 18
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 5
    • FDP_ACF.1.4: 3
    • FDP_ACF.2: 1
    • FDP_IFC.1: 3
    • FDP_ITC.1: 2
    • FDP_MSA.3: 1
    • FDP_RIP.2: 14
    • FDP_RIP.2.1: 1
    • FDP_UCT.1: 13
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 13
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_ATD.1: 14
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 14
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 3
    • FIA_UAU.2: 14
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 12
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 7
    • FIA_UID.2: 14
    • FIA_UID.2.1: 1
    • FIA_USB: 1
    • FIA_USB.1: 15
    • FIA_USB.1.1: 2
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.1: 24
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 14
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 21
    • FMT_MSA.3.1: 3
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 55
    • FMT_MTD.1.1: 5
    • FMT_REV.1: 26
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 25
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 23
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_AMT.1: 11
    • FPT_AMT.1.1: 1
    • FPT_RVM.1: 12
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 17
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_ITC.1: 17
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.CONNECT: 7
    • A.COOP: 3
    • A.LOCATE: 3
    • A.MANAGE: 4
    • A.NET_COMP: 5
    • A.NO_EVIL_ADMIN: 4
    • A.PEER: 3
    • A.PROTECT: 5
    • A.UTRAIN: 3
    • A.UTRUST: 3
  • O:
    • O.AUDITING: 30
    • O.AUTHORIZATION: 22
    • O.COMPROT: 24
    • O.DISCRETIONARY_ACCESS: 23
    • O.ENFORCEMENT: 13
    • O.MANAGE: 31
    • O.RESIDUAL_INFO: 9
    • O.RESIDUAL_INFORMATION: 3
  • OE:
    • OE.ADMIN: 7
    • OE.CREDEN: 4
    • OE.HW_SEP: 8
    • OE.INFO_PROTECT: 10
    • OE.INSTALL: 12
    • OE.MAINTENANCE: 5
    • OE.PHYSICAL: 8
    • OE.PROTECT: 10
    • OE.RECOVER: 8
    • OE.SERIAL_LOGIN: 4
    • OE.SOFTWARE_IN: 5
  • T:
    • T.COMPROT: 3
    • T.UAACCESS: 4
    • T.UAUSER: 4
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 131
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 5
  • AES_competition:
    • RC:
      • RC4: 6
  • DES:
    • 3DES:
      • TDES: 3
    • DES:
      • DES: 1
  • miscellaneous:
    • SM4:
      • SM4: 2
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 4
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 4
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 5
  • VPN:
    • VPN: 2
  • SSH:
    • SSH: 35
    • SSHv2: 1
  • TLS:
    • SSL:
      • SSL: 45
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 7
pdf_data/st_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 4
  • BSI:
    • AIS 32: 9
  • CC:
    • CCIMB-99-031: 1
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC2104: 1
  • X509:
    • X.509: 3
pdf_data/st_keywords/javacard_api_const
  • curves:
    • SM2: 4
pdf_data/st_metadata
  • /Author: kdill
  • /CreationDate: D:20030213175354Z
  • /Creator: Tripwire_V3.0_ST_v2.1_Final_Public_EAL1_021303.doc (Read-Only) - Microsoft Word
  • /ModDate: D:20030310140757-05'00'
  • /Producer: Acrobat PDFWriter 5.0 for Windows NT
  • /Title: Tripwire_V3.0_ST_v2.1_Final_Public_EAL1_021303.doc
  • pdf_file_size_bytes: 207950
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 50
  • /Author: Administrator
  • /CreationDate: D:20040113081837-06'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20040116130816+01'00'
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • /Title: SLES_security_target_eal3_v2-7_public
  • pdf_file_size_bytes: 584318
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 85
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different