| name |
THD89 1.0.3 Secure Element version 1.0 |
Red Hat Enterprise Linux (RHEL) Advanced Server (AS) Version 4 Running on Unisys ES7000 Hardware models 405, 410, 420, 430, 440, 505, 510, 520, 530, 540, and one |
| category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Operating Systems |
| scheme |
ES |
US |
| status |
active |
archived |
| not_valid_after |
26.09.2028 |
06.09.2012 |
| not_valid_before |
26.09.2023 |
29.01.2007 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-36_Certificado.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-36%20INF-4157.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10063-vr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-36%20ST_lite.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10063-st.pdf |
| manufacturer |
Tongxin Microelectronics Co., Ltd. |
Unisys Corporation |
| manufacturer_web |
https://www.tsinghuaic.com/english/article/article.asp?id=483248&bid=8610# |
https://www.unisys.com/unisys/ |
| security_level |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
ALC_FLR.2, EAL3+ |
| dgst |
f030b4c2adc03fa7 |
68d7f6531daa23a9 |
| heuristics/cert_id |
2021-36-INF-4157 |
CCEVS-VR-0007-2007 |
| heuristics/cert_lab |
[] |
US |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, ATE_COV.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ALC_TAT.2 |
AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ALC_DVS.1, ATE_IND.2, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, ALC_FLR.2, AGD_USR.1, ATE_COV.2, ADV_HLD.2, ATE_FUN.1, ADV_FSP.1 |
| heuristics/extracted_versions |
1.0, 1.0.3 |
4, 510, 405, 540, 420, 410, 520, 505, 440, 530, 430 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
NSCIB-CC-2400034-01-CR, NSCIB-CC-2400175-01-CR |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
NSCIB-CC-2400034-01-CR, NSCIB-CC-2400175-01-CR |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- category: Smart Cards and similiar devices
- certification_date: 26.09.2023
- enhanced:
- category: Smart Cards and similiar devices
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1876
- certification_date: 26.09.2023
- description: Renovación de certificado (12/08/2025) The TOE consists of hardware and IC dedicated software. The hardware is based on a 32-bit secure CPU with ROM (Non-Volatile Read-Only Memory), NVM (Non-volatile Programmable Memory) and RAM (Volatile Memory). The hardware of the TOE also incorporates communication peripherals and cryptographic coprocessors for execution and acceleration of symmetric and asymmetric cryptographic algorithms. The IC dedicated software consists of boot code and 3 libraries of cryptographic services. Among all the possibilities offered by these software and hardware requirements, the configuration selected for the evaluation is the following: TYPE NAME VERSION PACKAGE Hardware THD89 1.0.3 Module Software Crypto Library 2.1.0 SW library in ROM Crypto SU Library 2.2.0 SW library in NVM CryptoECCSec Library 1.0.0 SW library in NVM Boot code 1.0 Boot code in ROM Header file 0.1 cryptolib.h The TOE TOE THD89 1.0.3 Secure Element version 1.0 has gone through a Certificate Renewal process according to certification procedure PO-005. This process consists in updating the analysis of the certified product’s resistance against updated state of the art attack methods and vulnerabilities. The resistance to attacks has been re-assessed in the course of the Certificate Renewal process, and therefore the date to be considered as an archived certificate is reset in the certificate product list of the certification body considering the date of the renewal of the certificate.
- evaluation_facility: Applus Laboratories
- level: EAL5 + ALC_DVS.2 + AVA_VAN.5
- manufacturer: Tongxin Microelectronics Co., Ltd.
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2316
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1875
- type: Product
- manufacturer: Tongxin Microelectronics Co., Ltd.
- product: THD89 1.0.3 Secure Element version 1.0
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/998-thd89-1-0-3-secure-element-version-1-0
|
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10063/
- categories: ['Operating System']
- category: Operating System
- certification_date: 29.01.2007
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date:
- id: CCEVS-VR-VID10063
- product: Red Hat Enterprise Linux (RHEL) Advanced Server (AS) Version 4 Running on Unisys ES7000 Hardware models 405, 410, 420, 430, 440, 505, 510, 520, 530, 540, and one
- scheme: US
- url: https://www.niap-ccevs.org/products/10063
- vendor: Unisys
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
cf0f01bcd7be3e9c |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
{} |
| pdf_data/cert_filename |
2021-36_Certificado.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20230904141829+02'00'
- /ModDate: D:20230904141829+02'00'
- /Producer: GPL Ghostscript 9.27
- pdf_file_size_bytes: 887800
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
| pdf_data/report_filename |
2021-36 INF-4157.pdf |
st_vid10063-vr.pdf |
| pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-07-0007
- cert_item: Unisys Corporation, Unisys Way, Blue Bell, PA 19424 Red Hat Enterprise Linux (RHEL) Advanced Server (AS), Version 4 Running on ES7000 Hardware
- cert_lab: US NIAP
|
| pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-S-0201-2022: 1
- ES:
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL5: 8
- ITSEC:
|
- EAL:
- EAL 3: 3
- EAL 3 augmented: 3
- EAL3: 13
- EAL3 augmented: 1
|
| pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- ADV_TDS.4: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 8
- ALC_FLR: 3
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_COP.1: 4
- FCS_RNG.1: 1
- FDP:
- FDP_ITT.1: 1
- FDP_SDC.1: 1
- FMT:
- FPT:
- FPT_FLS.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FRU:
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
- Brainpool:
- brainpoolP224r1: 1
- brainpoolP256r1: 1
- brainpoolP512r1: 1
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /Author: 9308
- /CreationDate: D:20230925160654+02'00'
- /Creator: Microsoft® Word LTSC
- /ModDate: D:20230925160654+02'00'
- /Producer: Microsoft® Word LTSC
- pdf_file_size_bytes: 418348
- pdf_hyperlinks: https://www.sogis.eu/, http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
- /Author: mt21130
- /CreationDate: D:20070216121738-05'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /ModDate: D:20070216121918-05'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20070216171544
- /Title: Validation Report for Unisys RHEL3
- pdf_file_size_bytes: 149219
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
| pdf_data/st_filename |
2021-36 ST_lite.pdf |
st_vid10063-st.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 1
- EAL5: 4
- EAL5 augmented: 2
- EAL5+: 4
|
- EAL:
- EAL 3: 14
- EAL 3 augmented: 14
- EAL3: 4
- EAL3 augmented: 3
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 3
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 6
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_CAP: 1
- ACM_CAP.3: 19
- ACM_SCP: 1
- ACM_SCP.1: 6
- ADO:
- ADO_DEL: 1
- ADO_DEL.1: 7
- ADO_IGS: 1
- ADO_IGS.1: 9
- ADV:
- ADV_FSP: 1
- ADV_FSP.1: 22
- ADV_HLD: 1
- ADV_HLD.1: 3
- ADV_HLD.2: 17
- ADV_RCR: 1
- ADV_RCR.1: 8
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 20
- AGD_USR: 1
- AGD_USR.1: 17
- ALC:
- ALC_DVS: 1
- ALC_DVS.1: 9
- ALC_FLR: 1
- ALC_FLR.2: 32
- ATE:
- ATE_COV: 1
- ATE_COV.2: 7
- ATE_DPT: 1
- ATE_DPT.1: 5
- ATE_FUN: 1
- ATE_FUN.1: 16
- ATE_IND: 1
- ATE_IND.2: 9
- AVA:
- AVA_MSU: 1
- AVA_MSU.1: 11
- AVA_SOF: 1
- AVA_SOF.1: 8
- AVA_VLA: 1
- AVA_VLA.1: 10
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS.1: 6
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 9
- FCS_CKM.4: 9
- FCS_COP.1: 34
- FCS_COP.1.1: 4
- FCS_RNG.1: 7
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_IFC.1: 5
- FDP_ITC.1: 9
- FDP_ITC.2: 9
- FDP_ITT.1: 7
- FDP_SDC.1: 6
- FDP_SDC.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 6
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FMT:
- FMT_LIM.1: 4
- FMT_LIM.2: 4
- FPT:
- FPT_FLS.1: 7
- FPT_FLS.1.1: 1
- FPT_ITT.1: 7
- FPT_PHP.3: 7
- FPT_PHP.3.1: 1
- FRU:
|
- FAU:
- FAU_GEN: 4
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_SAR: 6
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 2
- FAU_SAR.2.1: 1
- FAU_SAR.3: 3
- FAU_SAR.3.1: 1
- FAU_SEL: 2
- FAU_SEL.1: 2
- FAU_SEL.1.1: 1
- FAU_STG: 6
- FAU_STG.1: 6
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 2
- FAU_STG.3.1: 1
- FAU_STG.4: 3
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC: 4
- FDP_ACC.1: 8
- FDP_ACC.1.1: 1
- FDP_ACF: 2
- FDP_ACF.1: 3
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FDP_RIP: 12
- FIA:
- FIA_ATD: 2
- FIA_ATD.1: 4
- FIA_ATD.1.1: 1
- FIA_SOS: 2
- FIA_SOS.1: 4
- FIA_SOS.1.1: 1
- FIA_UAU: 4
- FIA_UAU.1: 5
- FIA_UAU.2: 10
- FIA_UAU.2.1: 1
- FIA_UAU.7: 2
- FIA_UAU.7.1: 1
- FIA_UID: 2
- FIA_UID.1: 7
- FIA_UID.2: 12
- FIA_UID.2.1: 1
- FIA_USB: 2
- FIA_USB.1: 4
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 4
- FMT_MSA.1: 4
- FMT_MSA.1.1: 1
- FMT_MSA.3: 5
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 25
- FMT_MTD.1: 2
- FMT_REV: 14
- FMT_SMF: 2
- FMT_SMF.1: 11
- FMT_SMR: 2
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT: 2
- FPT_AMT.1: 3
- FPT_AMT.1.1: 1
- FPT_RVM: 2
- FPT_RVM.1: 3
- FPT_RVM.1.1: 1
- FPT_SEP: 2
- FPT_SEP.1: 3
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM: 2
- FPT_STM.1: 4
- FPT_STM.1.1: 1
|
| pdf_data/st_keywords/cc_claims |
- O:
- O.AES: 7
- O.ECC: 6
- O.RND: 3
- O.RSA: 7
- O.TDES: 8
- T:
|
- A:
- A.CONNECT: 1
- A.COOP: 1
- A.LOCATE: 1
- A.MANAGE: 1
- A.NO_EVIL_ADM: 1
- A.PEER: 1
- A.PROTECT: 1
- O:
- O.AUDITING: 1
- O.AUTHORIZATION: 1
- O.CREDEN: 1
- O.DISCRETIONARY_ACCESS: 1
- O.ENFORCEMENT: 1
- O.INSTALL: 1
- O.MANAGE: 1
- O.PHYSICAL: 1
- O.RESIDUAL_INFORMATION: 1
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 29
- Triple-DES: 3
- DES:
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
- Brainpool:
- brainpoolP224r1: 3
- brainpoolP256r1: 1
- brainpoolP320r1: 3
- brainpoolP384r1: 1
- brainpoolP512r1: 1
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 7
- malfunction: 3
- physical tampering: 1
- SCA:
- Leak-Inherent: 5
- Physical Probing: 2
- physical probing: 4
- side channel: 1
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- ISO:
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-67: 1
- RFC:
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /CreationDate: D:20230627103637+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20230627103637+02'00'
- /Producer: Microsoft® Word 2016
- pdf_file_size_bytes: 780001
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
- /Author: SAIC CCTL
- /Company: Unisys Corporation
- /CreationDate: D:20070216122150-05'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /ModDate: D:20070216122344-05'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20070208154200
- /Subject: RHEL4 EAL4 Security Target
- /Title: Red Hat Enterprise Linux (RHEL) Advanced Server (AS) Version 4 Running on Unisys ES7000 Hardware Security Target
- pdf_file_size_bytes: 367401
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 37
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |