name |
Red Hat Enterprise Linux 9.4 |
CA Directory r8.1 0608 (build 942) |
category |
Operating Systems |
Network and Network-Related Devices and Systems |
scheme |
US |
US |
status |
active |
archived |
not_valid_after |
25.02.2027 |
06.09.2012 |
not_valid_before |
25.02.2025 |
30.04.2007 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11526-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11526-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid3022-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11526-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid3022-st.pdf |
manufacturer |
Red Hat, Inc. |
CA Technologies |
manufacturer_web |
https://www.redhat.com |
https://www.ca.com |
security_level |
{} |
EAL3 |
dgst |
f2266dfa9a9ef195 |
2be2ede185c90a0b |
heuristics/cert_id |
CCEVS-VR-VID-11526-2025 |
CCEVS-VR-0040-2007 |
heuristics/cert_lab |
US |
US |
heuristics/cpe_matches |
cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.4_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:9.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.4_s390x:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.4_aarch64:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
CVE-2023-5633, CVE-2022-24805, CVE-2024-9676, CVE-2022-24807, CVE-2024-3049, CVE-2024-6387, CVE-2023-5992, CVE-2024-9675, CVE-2022-24809, CVE-2023-6606, CVE-2024-1488, CVE-2022-24806, CVE-2022-24808, CVE-2023-4911, CVE-2023-47038 |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_REQ.2, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ATE_IND.2, ATE_DPT.1, AVA_SOF.1 |
heuristics/extracted_versions |
9.4 |
8.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: Network Access Control
- certification_date: 30.04.2007
- evaluation_facility: CygnaCom Solutions, Inc
- expiration_date:
- id: CCEVS-VR-VID3022
- product: CA Directory r8.1 0608 (build 942)
- scheme: US
- url: https://www.niap-ccevs.org/product/3022
- vendor: CA Technologies
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
c40ae795865a0dba, ed9c9d74c3710878, 3d6ad6fde534f6c6 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_4.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pkg_ssh_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf |
{} |
pdf_data/cert_filename |
st_vid11526-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11526-2025: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Producer: WeasyPrint 62.3
- /Title: VID11526-FINAL CERT
- pdf_file_size_bytes: 136330
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid11526-vr.pdf |
st_vid3022-vr.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID11526-2025
- cert_item: for the Red Hat Enterprise Linux 9.4
- cert_lab: US NIAP
|
- US:
- cert_id: CCEVS-VR-07-0040
- cert_item: CA Directory, r8.1 0608 (build 942) for the Sun Solaris Platform
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11526-2025: 1
|
- US:
- CCEVS-VR-06-3022: 23
- CCEVS-VR-07-0040: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_CAP.3: 1
- ACM_SCP.1: 1
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 1
- ADV_HLD.2: 1
- ADV_RCR.1: 1
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV: 1
- ATE_COV.2: 2
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND.2: 3
- AVA:
- AVA_MSU.1: 1
- AVA_SOF.1: 1
- AVA_VLA.1: 2
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_SAR.1: 1
- FAU_SEL.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FIA:
- FIA_AFL.1: 3
- FIA_ATD.1: 1
- FIA_SOS.1: 2
- FIA_UAU: 3
- FIA_UAU.1: 1
- FIA_UAU.2: 1
- FIA_UID.1: 1
- FIA_UID.2: 1
- FMT:
- FMT_MSA: 2
- FMT_MTD: 2
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
|
pdf_data/report_keywords/cc_claims |
- A:
- A.PLATFORM: 1
- A.PROPER_ADMIN: 1
- A.PROPER_USER: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
- CVE:
- CVE-2004-0079: 1
- CVE-2005-3653: 1
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- X509:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile and uses the: 1
- out of scope: 1
|
- OutOfScope:
- Only - Out of Scope DXconsole DUA/LDUA The system configuration consists of two Sun SPARC Solaris 9 machines. On one: 1
- Out of Scope: 3
- and Software is Out of Scope DXconsole SSLD Ingres db DUA/LDUA Figure 3. TOE’s physical scope by product components used 16 CA: 1
- before use. RPC DSA RPB DSA RPA DSA DXserver DUA/LDUA TOE machine Remote Machine and Software is Out of Scope DXconsole SSLD Ingres db DUA/LDUA RPC DSA RPB DSA RPA DSA DXserver DUA/LDUA TOE machine Remote: 1
- iGateway affects the DXmanager module of eTrust Directory 8.1. DXmanager is not installed and out of scope for the evaluation. Also applies to the HTTP interface which is not an interface to the TOE. •: 1
- in scope) and the SSLD (out of scope) though not depicted: 1
- of the evaluation. Therefore, the cryptographic algorithms performed within the SSLD component are out of scope and not verified by this evaluation. Aspects of the following security functions are controlled : 1
- out of scope: 3
- used for the Developers Testing. The TOE DSA box includes the Ingres db (in scope) and the SSLD (out of scope) though not depicted. RPC DSA RPB DSA RPA DSA TOE DSA DUA/LDUA TOE machine Remote Machine For Test: 1
|
pdf_data/report_metadata |
- /Author: Wojcik, Robert C.
- /CreationDate: D:20250228095622-05'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20250228095622-05'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 343345
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
- /Author: wshanahan
- /CreationDate: D:20070717085537-04'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /ModDate: D:20070717085839-04'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20070717125458
- /Title: National Information Assurance Partnership
- pdf_file_size_bytes: 184938
- pdf_hyperlinks: http://www.cygnacom.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
st_vid11526-st.pdf |
st_vid3022-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ACM:
- ACM_CAP.3: 3
- ACM_SCP.1: 3
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 3
- ADV_HLD.2: 3
- ADV_RCR.1: 3
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 3
- ALC:
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 3
- ATE_FUN.1: 3
- ATE_IND.2: 3
- AVA:
- AVA_MSU.1: 3
- AVA_SOF.1: 3
- AVA_VLA.1: 4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 4
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FCS:
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.2: 7
- FCS_CKM.2.1: 1
- FCS_CKM_EXT.4: 6
- FCS_CKM_EXT.4.1: 1
- FCS_CKM_EXT.4.2: 1
- FCS_COP: 31
- FCS_COP.1: 4
- FCS_RBG_EXT: 8
- FCS_RBG_EXT.1: 6
- FCS_SSHC_EXT.1: 6
- FCS_SSHC_EXT.1.1: 1
- FCS_SSHS_EXT.1: 7
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSH_EXT.1: 11
- FCS_SSH_EXT.1.1: 1
- FCS_SSH_EXT.1.2: 1
- FCS_SSH_EXT.1.3: 1
- FCS_SSH_EXT.1.4: 1
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.6: 1
- FCS_SSH_EXT.1.7: 1
- FCS_SSH_EXT.1.8: 1
- FCS_STO_EXT.1: 5
- FCS_STO_EXT.1.1: 1
- FCS_TLSC_EXT.1: 5
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.3: 5
- FCS_TLSC_EXT.3.1: 1
- FCS_TLSC_EXT.5: 5
- FCS_TLSC_EXT.5.1: 1
- FCS_TLSS_EXT.1: 4
- FCS_TLSS_EXT.1.1: 1
- FCS_TLS_EXT.1: 6
- FCS_TLS_EXT.1.1: 1
- FDP:
- FDP_ACF_EXT.1: 5
- FDP_ACF_EXT.1.1: 1
- FDP_IFC_EXT.1: 1
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FMT:
- FMT_MOF_EXT.1: 4
- FMT_MOF_EXT.1.1: 1
- FMT_SMF_EXT.1: 4
- FMT_SMF_EXT.1.1: 3
- FPT:
- FPT_ACF_EXT.1: 4
- FPT_ACF_EXT.1.1: 1
- FPT_ACF_EXT.1.2: 1
- FPT_ASLR_EXT: 9
- FPT_ASLR_EXT.1: 3
- FPT_SBOP_EXT.1: 4
- FPT_SBOP_EXT.1.1: 1
- FPT_SRP_EXT.1: 4
- FPT_SRP_EXT.1.1: 1
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 5
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.2: 4
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FTA:
- FTA_TAB.1: 4
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC_EXT.1: 6
- FTP_ITC_EXT.1.1: 1
- FTP_TRP.1: 4
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 2
|
- FAU:
- FAU_GEN.1: 17
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SEL.1: 17
- FAU_SEL.1.1: 1
- FDP:
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACF.1: 15
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 7
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_AFL.1: 16
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 13
- FIA_ATD.1.1: 1
- FIA_SOS.1: 16
- FIA_SOS.1.1: 1
- FIA_UAU: 25
- FIA_UAU.1: 17
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UAU.5: 3
- FIA_UAU.5.1: 1
- FIA_UID.1: 19
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 34
- FMT_MSA.1: 2
- FMT_MSA.3: 2
- FMT_MTD: 45
- FMT_MTD.1: 2
- FMT_SMF.1: 16
- FMT_SMF.1.1: 1
- FMT_SMR.1: 19
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM: 1
- FPT_RVM.1: 5
- FPT_RVM_EXP: 1
- FPT_SEP: 1
- FPT_SEP.1: 5
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 3
- FTP_ITC_EXP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PLATFORM: 3
- A.PROPER_: 2
- A.PROPER_ADMIN: 2
- A.PROPER_USER: 2
- O:
- O.ACCOUNTABILITY: 6
- O.INTEGRITY: 6
- O.MANAGEMENT: 6
- O.PROTECTED_: 7
- O.PROTECTED_COMMS: 2
- O.PROTECTED_STORAGE: 1
- OE:
- OE.PLATFORM: 3
- OE.PROPER_ADMIN: 3
- OE.PROPER_USER: 3
- T:
- T.LIMITED_: 2
- T.LOCAL_: 1
- T.LOCAL_ATTACK: 1
- T.NETWORK_: 3
- T.NETWORK_ATTACK: 5
- T.NETWORK_EAVESDROP: 2
|
- A:
- A.DIRECTORY_SYSTEM: 1
- A.DIRECTORY_SYSTEM_SECURITY_: 1
- A.DIRECTORY_SYSTEM_SECURITY_POLI: 1
- A.DIRECTORY_SYSTEM_SECURITY_POLICY_: 1
- A.INTEROP: 2
- A.NO_EVIL: 2
- A.NO_GENERAL_PURPOSE: 2
- A.PHYSICAL: 3
- A.REMOTE_ADMIN_DUA_: 1
- A.REMOTE_ADMIN_DUA_ENVIRONMENT: 2
- A.USERS: 2
- D:
- O:
- O.AUDIT: 6
- O.MANAGE: 9
- O.MEDIATE: 7
- O.PARTIAL_SELF_: 1
- O.PARTIAL_SELF_PROTECTION: 3
- O.PARTIAL_TRUSTEDCOMM: 6
- O.TOE_ACCESS: 4
- OE:
- OE.AUDIT_ACCESS: 7
- OE.DISTRIBUTED_AUTHENTICA: 1
- OE.DISTRIBUTED_AUTHENTICATION: 4
- OE.PARTIAL_SELF_: 1
- OE.PARTIAL_SELF_PROTECTION: 2
- OE.PARTIAL_TRUSTEDCOMM: 7
- OE.TIME: 6
- T:
- T.MASQUERADE: 4
- T.TSF_COMPROMISE: 6
- T.UNAUTHORIZED_ACCESS: 3
- T.UNIDENTIFIED_ACTIONS: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 3
- AES-: 1
- AES-256: 1
- AES256: 1
- constructions:
- MAC:
- HMAC: 3
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- RSA:
- RSA 2048: 6
- RSA 3072: 1
- RSA 4096: 1
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA2:
- SHA-256: 6
- SHA-384: 4
- SHA-512: 7
- SHA256: 8
- SHA384: 2
- SHA512: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- DTLS:
- TLS:
- TLS: 44
- TLS 1.1: 1
- TLS 1.2: 1
- TLSv1.2: 2
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-384: 10
- P-521: 10
- secp384r1: 2
- secp521r1: 2
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 186-4: 2
- FIPS PUB 180-4: 2
- FIPS PUB 186-4: 6
- FIPS PUB 198-1: 1
- FIPS186-4: 6
- NIST:
- NIST SP 800-38A: 3
- NIST SP 800-38D: 2
- NIST SP 800-56A: 2
- NIST SP 800-57: 2
- NIST SP 800-90A: 2
- RFC:
- RFC 4251: 1
- RFC 4252: 2
- RFC 4253: 3
- RFC 4344: 1
- RFC 5246: 1
- RFC 5280: 4
- RFC 5288: 2
- RFC 5289: 4
- RFC 5647: 1
- RFC 5656: 10
- RFC 6066: 1
- RFC 6125: 1
- RFC 6668: 2
- RFC 8268: 4
- RFC 8332: 6
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /Author: Milad Torabi
- /CreationDate: D:20250127134212-08'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20250127134212-08'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Subject: Red Hat Enterprise Linux 9.4
- /Title: Red Hat
- pdf_file_size_bytes: 644575
- pdf_hyperlinks: mailto:[email protected], https://www.lightshipsec.com/, https://access.redhat.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 53
|
- /Author: krogers
- /Company: CygnaCom Solutions, Inc.
- /CreationDate: D:20070717085137-04'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /ModDate: D:20070717085341-04'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20070711135902
- /Title: APPENDIX E (CERTIFICATE POLICY TAXONOMY)
- pdf_file_size_bytes: 620673
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 86
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |