name |
Red Hat Enterprise Linux 9.4 |
Following MFP with FCU(Fax Option Type C5000) MFP: Ricoh Aficio MP C2800, Ricoh Aficio MP C2800G, Ricoh Aficio MP C3300, Ricoh Aficio MP C3300G, Savin C2828, Savin C2828G, Savin C3333, Savin C3333G, Lanier LD528C, Lanier LD528CG, Lanier LD533C, Lanier LD533CG, Lanier MP C2800, Lanier MP C3300, Gestetner MP C2800, Gestetner MP C3300, nashuatec MP C2800, nashuatec MP C3300, Rex-Rotary MP C2800, Rex-Rotary MP C3300, infotec MP C2800, infotec MP C3300 FCU: Fax Option Type C5000 MFP Software /Hardware Version : Software System/Copy 1.22 Network Support 8.27 Scanner 01.23 Printer 1.22 Fax 04.00.00 Web Support 1.10 Web Uapl 1.08 Network Doc Box 1.03 Hardware Ic Key 1100 Ic Ctlr 03 FCU Version : GWFCU3-13(WW) 04.04.00 |
category |
Operating Systems |
Multi-Function Devices |
scheme |
US |
JP |
status |
active |
archived |
not_valid_after |
25.02.2027 |
01.09.2015 |
not_valid_before |
25.02.2025 |
31.08.2010 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11526-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11526-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0266_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11526-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0266_est.pdf |
manufacturer |
Red Hat, Inc. |
Ricoh Company, Ltd. |
manufacturer_web |
https://www.redhat.com |
https://www.ricoh.com/ |
security_level |
{} |
EAL3 |
dgst |
f2266dfa9a9ef195 |
5723efcbb184b84c |
heuristics/cert_id |
CCEVS-VR-VID-11526-2025 |
JISEC-CC-CRP-C0266 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.4_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:9.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.4_s390x:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.4_aarch64:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
CVE-2023-5633, CVE-2022-24805, CVE-2024-9676, CVE-2022-24807, CVE-2024-3049, CVE-2025-1756, CVE-2024-6387, CVE-2023-5992, CVE-2024-9675, CVE-2023-4911, CVE-2022-24809, CVE-2022-24806, CVE-2024-1488, CVE-2022-24808, CVE-2023-6606, CVE-2023-47038 |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_PRE.1, ASE_CCL.1, ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_SPD.1, ASE_INT.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, ASE_OBJ.2, AGD_OPE.1, ASE_ECD.1, ALC_TSU_EXT.1, ASE_REQ.2 |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
heuristics/extracted_versions |
9.4 |
1.08, 04.04.00, 8.27, 01.23, 04.00.00, 1.03, 1.10, 1.22 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0266
- certification_date: 01.08.2010
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0266_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a digital MFP which can digitize and manage as well as print and fax paper documents. It also provides a secure environment for using copier, scanner, printer, document server, and fax (optional) functions. TOE security functionality The major security functions of the TOE are: - Audit, which creates audit logs of security events. - Identification and Authentication, which identifies and authenticates users. - Document Data Access Control, which controls each users operation of documents. - Stored Data Protection, which encrypts stored document data on hard disk. - Network Communication Data Protection, which encrypts network communications. - Security Management, which provides total management of the security function settings. - Service Mode Lock, which controls the maintenance functions. - Telephone Line Intrusion Protection, which permits fax only communication. - MFP Control Software Verification, which checks the integrity of the software.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Following MFP with FCU(Fax Option Type C5000) MFP: Ricoh Aficio MP C2800, Ricoh Aficio MP C2800G, Ricoh Aficio MP C3300, Ricoh Aficio MP C3300G, Savin C2828, Savin C2828G, Savin C3333, Savin C3333G, Lanier LD528C, Lanier LD528CG, Lanier LD533C, Lanier LD533CG, Lanier MP C2800, Lanier MP C3300, Gestetner MP C2800, Gestetner MP C3300, nashuatec MP C2800, nashuatec MP C3300, Rex-Rotary MP C2800, Rex-Rotary MP C3300, infotec MP C2800, infotec MP C3300 FCU: Fax Option Type C5000
- product_type: Multi Function Product
- report_link: https://www.ipa.go.jp/en/security/c0266_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0266_est.pdf
- toe_version: MFP Software /Hardware Version : Software System/Copy 1.22 Network Support 8.27 Scanner 01.23 Printer 1.22 Fax 04.00.00 Web Support 1.10 Web Uapl 1.08 Network Doc Box 1.03 Hardware Ic Key 1100 Ic Ctlr 03 FCU Version : GWFCU3-13(WW) 04.04.00
- vendor: RICOH COMPANY, LTD.
- expiration_date: 01.09.2015
- supplier: RICOH COMPANY, LTD.
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0266_it0289.html
- toe_overseas_name: Following MFP with FCU(Fax Option Type C5000) MFP: Ricoh Aficio MP C2800, Ricoh Aficio MP C2800G, Ricoh Aficio MP C3300, Ricoh Aficio MP C3300G, Savin C2828, Savin C2828G, Savin C3333, Savin C3333G, Lanier LD528C, Lanier LD528CG, Lanier LD533C, Lanier LD533CG, Lanier MP C2800, Lanier MP C3300, Gestetner MP C2800, Gestetner MP C3300, nashuatec MP C2800, nashuatec MP C3300, Rex-Rotary MP C2800, Rex-Rotary MP C3300, infotec MP C2800, infotec MP C3300 FCU: Fax Option Type C5000 MFP Software /Hardware Version : < Cont. >
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
c40ae795865a0dba, ed9c9d74c3710878, 3d6ad6fde534f6c6 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_4.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pkg_ssh_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf |
{} |
pdf_data/cert_filename |
st_vid11526-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11526-2025: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Producer: WeasyPrint 62.3
- /Title: VID11526-FINAL CERT
- pdf_file_size_bytes: 136330
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid11526-vr.pdf |
c0266_erpt.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID11526-2025
- cert_item: for the Red Hat Enterprise Linux 9.4
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11526-2025: 1
|
- JP:
- CRP-C0266-01: 1
- Certification No. C0266: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.PLATFORM: 1
- A.PROPER_ADMIN: 1
- A.PROPER_USER: 1
|
- A:
- A.ADMIN: 2
- A.NETWORK: 1
- A.SUPERVISOR: 1
- T:
- T.ABUSE_SEC_MNG: 3
- T.FAX_LINE: 3
- T.ILLEGAL_USE: 4
- T.SALVAGE: 3
- T.TRANSIT: 3
- T.UNAUTH_ACCESS: 7
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- X509:
|
- BSI:
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
- FIPS:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile and uses the: 1
- out of scope: 1
|
- ConfidentialDocument:
- users, receives the document data from client computers which are connected via Network, stores the confidential document data into HDD of the TOE, and performs outputting by print and delivery. Therefore, the TOE is a: 1
|
pdf_data/report_metadata |
- /Author: Wojcik, Robert C.
- /CreationDate: D:20250228095622-05'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20250228095622-05'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 343345
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
- /Author:
- /CreationDate: D:20110216120931+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /ModDate: D:20110216120934+09'00'
- /Producer: Acrobat Distiller 8.2.3 (Windows)
- /Title: CRP-e
- pdf_file_size_bytes: 519570
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 47
|
pdf_data/st_filename |
st_vid11526-st.pdf |
c0266_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 4
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FCS:
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.2: 7
- FCS_CKM.2.1: 1
- FCS_CKM_EXT.4: 6
- FCS_CKM_EXT.4.1: 1
- FCS_CKM_EXT.4.2: 1
- FCS_COP: 31
- FCS_COP.1: 4
- FCS_RBG_EXT: 8
- FCS_RBG_EXT.1: 6
- FCS_SSHC_EXT.1: 6
- FCS_SSHC_EXT.1.1: 1
- FCS_SSHS_EXT.1: 7
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSH_EXT.1: 11
- FCS_SSH_EXT.1.1: 1
- FCS_SSH_EXT.1.2: 1
- FCS_SSH_EXT.1.3: 1
- FCS_SSH_EXT.1.4: 1
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.6: 1
- FCS_SSH_EXT.1.7: 1
- FCS_SSH_EXT.1.8: 1
- FCS_STO_EXT.1: 5
- FCS_STO_EXT.1.1: 1
- FCS_TLSC_EXT.1: 5
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.3: 5
- FCS_TLSC_EXT.3.1: 1
- FCS_TLSC_EXT.5: 5
- FCS_TLSC_EXT.5.1: 1
- FCS_TLSS_EXT.1: 4
- FCS_TLSS_EXT.1.1: 1
- FCS_TLS_EXT.1: 6
- FCS_TLS_EXT.1.1: 1
- FDP:
- FDP_ACF_EXT.1: 5
- FDP_ACF_EXT.1.1: 1
- FDP_IFC_EXT.1: 1
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FMT:
- FMT_MOF_EXT.1: 4
- FMT_MOF_EXT.1.1: 1
- FMT_SMF_EXT.1: 4
- FMT_SMF_EXT.1.1: 3
- FPT:
- FPT_ACF_EXT.1: 4
- FPT_ACF_EXT.1.1: 1
- FPT_ACF_EXT.1.2: 1
- FPT_ASLR_EXT: 9
- FPT_ASLR_EXT.1: 3
- FPT_SBOP_EXT.1: 4
- FPT_SBOP_EXT.1.1: 1
- FPT_SRP_EXT.1: 4
- FPT_SRP_EXT.1.1: 1
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 5
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.2: 4
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FTA:
- FTA_TAB.1: 4
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC_EXT.1: 6
- FTP_ITC_EXT.1.1: 1
- FTP_TRP.1: 4
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 2
|
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 9
- FAU_SAR.2.1: 1
- FAU_STG: 1
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 7
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ADF.1: 1
- FDP_IFC.1: 12
- FDP_IFC.1.1: 1
- FDP_IFF.1: 10
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 2
- FIA:
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 6
- FIA_UAU.2: 12
- FIA_UAU.2.1: 1
- FIA_UAU.7: 9
- FIA_UAU.7.1: 1
- FIA_UID.1: 8
- FIA_UID.2: 10
- FIA_UID.2.1: 1
- FIA_USB.1: 10
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 14
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 17
- FMT_MTD.1.1: 1
- FMT_SMF.1: 19
- FMT_SMF.1.1: 1
- FMT_SMR.1: 19
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 10
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
- FTP_TST.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PLATFORM: 3
- A.PROPER_: 2
- A.PROPER_ADMIN: 2
- A.PROPER_USER: 2
- O:
- O.ACCOUNTABILITY: 6
- O.INTEGRITY: 6
- O.MANAGEMENT: 6
- O.PROTECTED_: 7
- O.PROTECTED_COMMS: 2
- O.PROTECTED_STORAGE: 1
- OE:
- OE.PLATFORM: 3
- OE.PROPER_ADMIN: 3
- OE.PROPER_USER: 3
- T:
- T.LIMITED_: 2
- T.LOCAL_: 1
- T.LOCAL_ATTACK: 1
- T.NETWORK_: 3
- T.NETWORK_ATTACK: 5
- T.NETWORK_EAVESDROP: 2
|
- A:
- A.ADMIN: 5
- A.NETWORK: 5
- A.SUPERVISOR: 4
- O:
- O.AUDIT: 16
- O.DOC_ACC: 8
- O.GENUINE: 9
- O.LINE: 1
- O.LINE_PROTECT: 7
- O.MANAGE: 11
- O.MEM: 11
- O.NET: 9
- OE:
- OE.ADMIN: 3
- OE.NETWORK: 3
- OE.SUPERVISOR: 3
- T:
- T.ABUSE_SEC_MNG: 4
- T.FAX_LINE: 3
- T.ILLEGAL_USE: 4
- T.SALVAGE: 3
- T.TRANSIT: 4
- T.UNAUTH_ACCESS: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 3
- AES-: 1
- AES-256: 1
- AES256: 1
- constructions:
- MAC:
- HMAC: 3
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- RSA:
- RSA 2048: 6
- RSA 3072: 1
- RSA 4096: 1
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA2:
- SHA-256: 6
- SHA-384: 4
- SHA-512: 7
- SHA256: 8
- SHA384: 2
- SHA512: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- DTLS:
- TLS:
- TLS: 44
- TLS 1.1: 1
- TLS 1.2: 1
- TLSv1.2: 2
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-384: 10
- P-521: 10
- secp384r1: 2
- secp521r1: 2
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 186-4: 2
- FIPS PUB 180-4: 2
- FIPS PUB 186-4: 6
- FIPS PUB 198-1: 1
- FIPS186-4: 6
- NIST:
- NIST SP 800-38A: 3
- NIST SP 800-38D: 2
- NIST SP 800-56A: 2
- NIST SP 800-57: 2
- NIST SP 800-90A: 2
- RFC:
- RFC 4251: 1
- RFC 4252: 2
- RFC 4253: 3
- RFC 4344: 1
- RFC 5246: 1
- RFC 5280: 4
- RFC 5288: 2
- RFC 5289: 4
- RFC 5647: 1
- RFC 5656: 10
- RFC 6066: 1
- RFC 6125: 1
- RFC 6668: 2
- RFC 8268: 4
- RFC 8332: 6
- X509:
|
- BSI:
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-0004: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- FIPS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /Author: Milad Torabi
- /CreationDate: D:20250127134212-08'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20250127134212-08'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Subject: Red Hat Enterprise Linux 9.4
- /Title: Red Hat
- pdf_file_size_bytes: 644575
- pdf_hyperlinks: mailto:[email protected], https://www.lightshipsec.com/, https://access.redhat.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 53
|
- /Author: p000266068
- /CreationDate: D:20110105172042
- /Creator: MP_C2800_ST_Eng.doc - Microsoft Word
- /Producer: Acrobat PDFWriter 5.0 Windows NT
- /Title: MP_C2800_ST_Eng.doc
- pdf_file_size_bytes: 1778215
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 80
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |