Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Evertz MMA10G-IPX
CCEVS-VR-10817-2017
SUSE Linux Enterprise Server Version 15 SP2
BSI-DSZ-CC-1168-2021
name Evertz MMA10G-IPX SUSE Linux Enterprise Server Version 15 SP2
category Network and Network-Related Devices and Systems Operating Systems
scheme US DE
status archived active
not_valid_after 17.10.2019 10.11.2026
not_valid_before 17.10.2017 11.11.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10817-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1168c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10817-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1168a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10817-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1168b_pdf.pdf
manufacturer Evertz Microsystems SUSE LLC
manufacturer_web https://www.evertz.com/ https://www.suse.com
dgst eba95b01fd7623e6 4754212f2600e7b2
heuristics/cert_id CCEVS-VR-10817-2017 BSI-DSZ-CC-1168-2021
heuristics/cert_lab US BSI
heuristics/cpe_matches {} cpe:2.3:o:suse:linux_enterprise_server:15:sp5:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:ltss:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:business_critical_linux:-:*:*, cpe:2.3:o:suse:suse_linux_enterprise_server:15:sp3:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp3:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:*:sap:*:*, cpe:2.3:o:suse:suse_linux_enterprise_server:15:sp3:*:*:*:sap:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp4:*:*:*:*:*:*, cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:*:-:*:*
heuristics/related_cves {} CVE-2018-17962, CVE-2020-8025, CVE-2002-20001, CVE-2023-29552, CVE-2022-27239, CVE-2019-18897, CVE-2020-15706, CVE-2023-23005, CVE-2018-12116, CVE-2019-18903, CVE-2020-15705, CVE-2021-4034, CVE-2019-18901, CVE-2019-18902, CVE-2020-8013, CVE-2021-45082, CVE-2020-15707, CVE-2018-20105, CVE-2018-12122
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1
heuristics/extracted_versions - 15
heuristics/scheme_data
  • category: Network Device
  • certification_date: 17.10.2017
  • evaluation_facility: Acumen Security
  • expiration_date: 17.10.2019
  • id: CCEVS-VR-VID10817
  • product: Evertz MMA10G-IPX
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10817
  • vendor: Evertz Microsystems
heuristics/protection_profiles c7cf611c6bb1e4b0 e34797b67a3163c5, 236bced46aeb26ba
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_V4.2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ssh_ep_v1.0.pdf
pdf_data/cert_filename st_vid10817-ci.pdf 1168c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10817-2017: 1
  • DE:
    • BSI-DSZ-CC-1168-2021: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
pdf_data/cert_keywords/eval_facility
  • Acumen:
    • Acumen Security: 1
pdf_data/cert_keywords/crypto_protocol
  • SSH:
    • SSH: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20171020084706-04'00'
  • /ModDate: D:20171020084706-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 177199
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20211112103541+01'00'
  • /Creator: Writer
  • /Keywords: """Common Criteria, Certification, Zertifizierung, Linux-basiertes Betriebssystem, Operating System Protection Profile, Virtualization"""
  • /ModDate: D:20211116101139+01'00'
  • /Producer: LibreOffice 6.3
  • /Subject: Zertifizierung SUSE Linux EnterpriseServer 15 SP2
  • /Title: Certification Report BSI-DSZ-CC-1151-2021
  • pdf_file_size_bytes: 367408
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid10817-vr.pdf 1168a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-10817-2017
    • cert_item: for the Evertz MMA10G-IPX
    • cert_lab: US NIAP
  • DE:
    • cc_security_level: Common Criteria Part 3 extended
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-1168-2021
    • cert_item: SUSE Linux Enterprise Server, Version 15 SP2
    • cert_lab: BSI
    • developer: SUSE LLC
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Protection Profile for General Purpose Operating Systems Version 4.2.1, 22 April 2019, CCEVS-VR- PP-0047, NIAP, Extended Package for Secure Shell (SSH), Version 1.0, 19 February 2016, CCEVS-VR-PP-0039, NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-10817-2017: 1
  • DE:
    • BSI-DSZ-CC-1168-2021: 19
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 5
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 3
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 3
    • ALC_TSU_EXT.1: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 1
    • FCS_COP.1: 6
    • FCS_RBG_EXT.1: 1
    • FCS_TLSC_EXT.1: 5
  • FCS:
    • FCS_RNG.1: 2
  • FTP:
    • FTP_ITC.1: 2
pdf_data/report_keywords/eval_facility
  • Acumen:
    • Acumen Security: 4
  • atsec:
    • atsec: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 1
  • AES_competition:
    • AES:
      • AES: 11
      • AES-: 1
  • constructions:
    • MAC:
      • HMAC: 10
      • HMAC-SHA-384: 1
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 9
  • FF:
    • DH:
      • DH: 4
      • Diffie-Hellman: 1
    • DSA:
      • DSA: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 3
  • PBKDF:
    • PBKDF2: 2
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-2: 5
      • SHA-256: 2
      • SHA-512: 1
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
    • Key agreement: 1
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 3
  • IKE:
    • IKE: 1
    • IKEv2: 2
  • SSH:
    • SSH: 20
    • SSHv2: 3
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 10
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 2
  • PRNG:
    • DRBG: 1
  • RNG:
    • RNG: 2
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CBC:
    • CBC: 4
  • CTR:
    • CTR: 3
  • GCM:
    • GCM: 6
  • XTS:
    • XTS: 2
pdf_data/report_keywords/ecc_curve
  • NIST:
    • NIST P-256: 3
    • P-256: 7
    • P-384: 8
    • P-521: 8
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS PUB 186-4: 1
  • ISO:
    • ISO/IEC 18031:2011: 1
  • RFC:
    • RFC 5280: 1
  • BSI:
    • AIS 20: 2
    • AIS 23: 1
    • AIS 32: 1
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 186-4: 5
    • FIPS180-4: 8
    • FIPS186-4: 3
    • FIPS197: 3
    • FIPS198: 2
    • FIPS198-1: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 4253: 1
    • RFC 5246: 1
    • RFC0768: 1
    • RFC0791: 1
    • RFC0792: 1
    • RFC0793: 1
    • RFC0826: 1
    • RFC0903: 1
    • RFC2104: 3
    • RFC2119: 1
    • RFC2367: 1
    • RFC2401: 1
    • RFC2460: 1
    • RFC2898: 1
    • RFC3376: 1
    • RFC3447: 3
    • RFC4251: 2
    • RFC4252: 4
    • RFC4253: 9
    • RFC4301: 1
    • RFC4306: 3
    • RFC4344: 2
    • RFC4419: 2
    • RFC5246: 9
    • RFC5288: 2
    • RFC5647: 2
    • RFC5656: 3
    • RFC5903: 3
    • RFC6668: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • NIAP), Version 0.16, 2021-09-22 [10] Configuration list for the TOE, 2021-10-01, MASTER CM List (confidential document) [11] Extended Package for Secure Shell (SSH), Version 1.0, 19 February 2016, CCEVS-VR-PP-0039: 1
    • Report, Version 5, 2021-11-09, Final Evaluation Technical Report, atsec information security GmbH (confidential document) [8] Protection Profile for General Purpose Operating Systems Version 4.2.1, 22 April 2019: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
  • /CreationDate: D:20171020084540-04'00'
  • /ModDate: D:20171020084540-04'00'
  • pdf_file_size_bytes: 416195
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
pdf_data/st_filename st_vid10817-st.pdf 1168b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1168: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL: 2
    • ASE_OBJ: 2
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 3
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT.1: 5
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCS:
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 4
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 3
    • FCS_CKM.4.1: 2
    • FCS_COP.1: 24
    • FCS_COP.1.1: 6
    • FCS_PMG_EXT.1: 1
    • FCS_RBG_EXT.1: 3
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 1
    • FCS_RGB_EXT.1: 1
    • FCS_TLSC: 1
    • FCS_TLSC_EXT: 1
    • FCS_TLSC_EXT.1: 13
    • FCS_TLSC_EXT.1.1: 2
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.2: 1
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSS: 1
    • FCS_TLSS_EXT: 1
    • FCS_TLSS_EXT.1: 3
    • FCS_TLSS_EXT.1.1: 1
    • FCS_TLSS_EXT.2: 3
    • FCS_TLSS_EXT.2.1: 2
    • FCS_TLSS_EXT.2.2: 3
    • FCS_TLSS_EXT.2.3: 3
    • FCS_TLSS_EXT.2.4: 1
    • FCS_TLSS_EXT.2.5: 1
    • FCS_TLSS_EXT.2.6: 1
  • FDP:
    • FDP_RIP.2: 1
  • FIA:
    • FIA_PMG_EXT.1: 3
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 1
    • FIA_UAU_EXT.2: 3
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT.1: 6
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 5
    • FMT_MOF.1.1: 1
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 3
    • FMT_SMR.2: 4
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT.1: 4
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_SKP_EXT: 1
    • FPT_SKP_EXT.1: 3
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM.1: 5
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 1
    • FPT_TST_EXT.1: 5
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 8
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 4
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT: 1
    • FTA_SSL_EXT.1: 4
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 10
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 6
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
  • FCS:
    • FCS_CKM.1: 6
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 6
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.4: 7
    • FCS_CKM_EXT.4.1: 1
    • FCS_CKM_EXT.4.2: 1
    • FCS_COP: 1
    • FCS_COP.1: 37
    • FCS_COP.1.1: 5
    • FCS_RBG_EXT.1: 7
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RNG.1: 4
    • FCS_SSHC_EXT: 8
    • FCS_SSHC_EXT.1: 8
    • FCS_SSHC_EXT.1.1: 1
    • FCS_SSHS_EXT: 7
    • FCS_SSHS_EXT.1: 8
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSH_EXT.1: 6
    • FCS_SSH_EXT.1.1: 1
    • FCS_STO_EXT.1: 6
    • FCS_STO_EXT.1.1: 2
    • FCS_TLSC_EXT: 3
    • FCS_TLSC_EXT.1: 10
    • FCS_TLSC_EXT.2: 5
  • FDP:
    • FDP_ACF_EXT.1: 6
    • FDP_ACF_EXT.1.1: 1
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.5: 6
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MOF_EXT: 1
    • FMT_MOF_EXT.1: 6
    • FMT_SMF_EXT.1: 6
    • FMT_SMF_EXT.1.1: 2
  • FPT:
    • FPT_ACF_EXT.1: 6
    • FPT_ACF_EXT.1.1: 1
    • FPT_ACF_EXT.1.2: 1
    • FPT_ASLR_EXT: 1
    • FPT_ASLR_EXT.1: 6
    • FPT_SBOP_EXT: 1
    • FPT_SBOP_EXT.1: 6
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 1
    • FPT_TUD_EXT.1: 7
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.2: 6
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
  • FTP:
    • FTP_ITC_EXT.1: 8
    • FTP_ITC_EXT.1.1: 1
    • FTP_TRP.1: 6
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.TRUSTED_ADMINISTRATOR: 1
  • OE:
    • OE.ADMIN_CREDENTIALS_SE: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_THRU_TRAFFIC_PROT: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.UPDATES: 1
  • T:
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
  • A:
    • A.CONNECT: 1
    • A.PLATFORM: 4
    • A.PROPER_ADMIN: 4
    • A.PROPER_USER: 4
  • O:
    • O.ACCOUNTABILITY: 7
    • O.INTEGRITY: 19
    • O.MANAGEMENT: 8
    • O.PROTECTED_COMMS: 21
    • O.PROTECTED_STORAGE: 8
  • OE:
    • OE.PLATFORM: 3
    • OE.PROPER_ADMIN: 3
    • OE.PROPER_USER: 3
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 3
    • T.LOCAL_ATTACK: 2
    • T.NETWORK_ATTACK: 10
    • T.NETWORK_EAVESDROP: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 134
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 10
      • AES128: 1
  • constructions:
    • MAC:
      • HMAC: 3
      • HMAC-SHA-256: 3
  • AES_competition:
    • AES:
      • AES: 4
      • AES-256: 1
      • AES128: 1
      • AES256: 1
  • constructions:
    • MAC:
      • HMAC: 5
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDHE: 3
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 4
      • DHE: 1
      • Diffie-Hellman: 1
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 9
  • FF:
    • DH:
      • Diffie-Hellman: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-256: 4
      • SHA256: 3
  • PBKDF:
    • PBKDF2: 3
  • SHA:
    • SHA1:
      • SHA-1: 7
      • SHA1: 1
    • SHA2:
      • SHA-256: 4
      • SHA-384: 2
      • SHA-512: 2
      • SHA2: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • MAC:
    • MAC: 5
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 3
  • SSH:
    • SSH: 13
  • TLS:
    • SSL:
      • SSL 2.0: 1
      • SSL 3.0: 1
    • TLS:
      • TLS: 62
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 1
      • TLS1.2: 3
  • VPN:
    • VPN: 1
  • PGP:
    • PGP: 1
  • SSH:
    • SSH: 92
    • SSHv2: 5
  • TLS:
    • SSL:
      • SSL: 14
    • TLS:
      • TLS: 41
      • TLS 1.2: 1
      • TLSv1.0: 1
      • TLSv1.1: 1
      • TLSv1.2: 4
  • VPN:
    • VPN: 3
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 3
  • RNG:
    • RBG: 2
  • PRNG:
    • DRBG: 5
    • PRNG: 1
  • RNG:
    • RBG: 1
    • RNG: 6
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 1
  • CTR:
    • CTR: 2
  • GCM:
    • GCM: 3
pdf_data/st_keywords/ecc_curve
  • NIST:
    • secp521r1: 1
  • NIST:
    • P-256: 4
    • P-384: 4
    • P-521: 4
    • secp256r1: 1
    • secp384r1: 1
    • secp521r1: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA: 3
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 3
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 5
  • OpenSSL:
    • OpenSSL: 13
  • libgcrypt:
    • libgcrypt: 2
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • side-channel: 1
  • other:
    • Bleichenbacher Attack: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 186-4: 1
    • FIPS PUB 186-4: 3
  • ISO:
    • ISO/IEC 18031:2011: 3
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 2818: 1
    • RFC 2986: 1
    • RFC 3268: 4
    • RFC 5246: 6
    • RFC 5280: 5
    • RFC 6125: 1
    • RFC5280: 1
    • RFC5759: 1
  • X509:
    • X.509: 17
  • FIPS:
    • FIPS 140-2: 3
    • FIPS PUB 186-4: 5
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38D: 1
    • NIST SP 800-38E: 1
    • NIST SP 800-57: 1
  • PKCS:
    • PKCS #7: 1
  • RFC:
    • RFC 2460: 1
    • RFC 3484: 1
    • RFC 3542: 1
    • RFC 4213: 1
    • RFC 4251: 1
    • RFC 4252: 4
    • RFC 4253: 5
    • RFC 5246: 13
    • RFC 5280: 2
    • RFC 5288: 4
    • RFC 5289: 4
    • RFC 5647: 1
    • RFC 5656: 1
    • RFC 5759: 1
    • RFC 6125: 1
    • RFC 6668: 1
    • RFC 8017: 1
    • RFC4252: 4
    • RFC4253: 4
  • X509:
    • X.509: 10
    • x.509: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users that cannot be used to store: 1
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. 3.2.1.2 Personnel A.PROPER_USER The user of the OS is not willfully negligent or: 1
    • out of scope: 2
pdf_data/st_metadata
  • /CreationDate: D:20171019143643-04'00'
  • /ModDate: D:20171019143643-04'00'
  • pdf_file_size_bytes: 2126205
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 66
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different