name |
Red Hat Enterprise Linux 9.4 |
PARS MOTION SENSOR PMS-101 v0.2 |
category |
Operating Systems |
Other Devices and Systems |
scheme |
US |
TR |
status |
active |
archived |
not_valid_after |
25.02.2027 |
21.02.2021 |
not_valid_before |
25.02.2025 |
21.02.2018 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11526-ci.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/pms-101%20certificate.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11526-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Pars%20PMS-101%20Certification%20Report.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11526-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Pars%20_PMS-101_v0.2_STLite_v0.1.pdf |
manufacturer |
Red Hat, Inc. |
PARS Arge ve Bilgi Teknolojileri Ltd Şti |
manufacturer_web |
https://www.redhat.com |
https://www.parstakograf.com/ |
security_level |
{} |
EAL4, ATE_DPT.2, AVA_VAN.5 |
dgst |
f2266dfa9a9ef195 |
5e2fadaa989d5097 |
heuristics/cert_id |
CCEVS-VR-VID-11526-2025 |
21.0.03/TSE-CCCS-50 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.4_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:9.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.4_s390x:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.4_aarch64:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
CVE-2023-5633, CVE-2022-24805, CVE-2024-9676, CVE-2022-24807, CVE-2024-3049, CVE-2025-1756, CVE-2024-6387, CVE-2023-5992, CVE-2024-9675, CVE-2023-4911, CVE-2022-24809, CVE-2022-24806, CVE-2024-1488, CVE-2022-24808, CVE-2023-6606, CVE-2023-47038 |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_PRE.1, ASE_CCL.1, ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_SPD.1, ASE_INT.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, ASE_OBJ.2, AGD_OPE.1, ASE_ECD.1, ALC_TSU_EXT.1, ASE_REQ.2 |
AGD_PRE.1, ATE_COV.2, ASE_INT.1, ALC_CMS.4, ATE_DPT.2, ATE_FUN.1, AVA_VAN.5, ADV_FSP.4, ALC_DEL.1, ALC_LCD.1, ADV_ARC.1, ADV_TDS.3, AGD_OPE.1, ADV_IMP.1 |
heuristics/extracted_versions |
9.4 |
0.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
c40ae795865a0dba, ed9c9d74c3710878, 3d6ad6fde534f6c6 |
6c86fb8f2b708f67 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_4.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pkg_ssh_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0093b_pdf.pdf |
pdf_data/cert_filename |
st_vid11526-ci.pdf |
pms-101 certificate.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11526-2025: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Producer: WeasyPrint 62.3
- /Title: VID11526-FINAL CERT
- pdf_file_size_bytes: 136330
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20180524132238+02'00'
- /Creator: Canon iR-ADV C5240 PDF
- /Producer: Adobe PSL 1.2e for Canon
- pdf_file_size_bytes: 142868
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
st_vid11526-vr.pdf |
Pars PMS-101 Certification Report.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID11526-2025
- cert_item: for the Red Hat Enterprise Linux 9.4
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11526-2025: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4+: 1
- EAL2: 1
- EAL4+: 2
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP.4: 1
- ADV_IMP: 1
- ADV_TDS.3: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_LCD.1: 1
- ALC_TAT: 1
- ASE:
- ASE_ECD: 1
- ASE_INT.1: 1
- ASE_SPD: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.2: 3
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.PLATFORM: 1
- A.PROPER_ADMIN: 1
- A.PROPER_USER: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- T-DES: 1
- TDES: 1
- Triple-DES: 1
- DES:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- X509:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile and uses the: 1
- out of scope: 1
|
|
pdf_data/report_metadata |
- /Author: Wojcik, Robert C.
- /CreationDate: D:20250228095622-05'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20250228095622-05'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 343345
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
- /CreationDate: D:20180220090147+02'00'
- /Creator: Canon iR-ADV C5240 PDF
- /Producer: Adobe PSL 1.2e for Canon
- pdf_file_size_bytes: 1181999
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
st_vid11526-st.pdf |
Pars _PMS-101_v0.2_STLite_v0.1.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 11
- EAL4 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ATE:
- ATE_DPT.1: 1
- ATE_DPT.2: 6
- ATE_FUN.1: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 4
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FCS:
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.2: 7
- FCS_CKM.2.1: 1
- FCS_CKM_EXT.4: 6
- FCS_CKM_EXT.4.1: 1
- FCS_CKM_EXT.4.2: 1
- FCS_COP: 31
- FCS_COP.1: 4
- FCS_RBG_EXT: 8
- FCS_RBG_EXT.1: 6
- FCS_SSHC_EXT.1: 6
- FCS_SSHC_EXT.1.1: 1
- FCS_SSHS_EXT.1: 7
- FCS_SSHS_EXT.1.1: 1
- FCS_SSHS_EXT.1.3: 1
- FCS_SSH_EXT.1: 11
- FCS_SSH_EXT.1.1: 1
- FCS_SSH_EXT.1.2: 1
- FCS_SSH_EXT.1.3: 1
- FCS_SSH_EXT.1.4: 1
- FCS_SSH_EXT.1.5: 1
- FCS_SSH_EXT.1.6: 1
- FCS_SSH_EXT.1.7: 1
- FCS_SSH_EXT.1.8: 1
- FCS_STO_EXT.1: 5
- FCS_STO_EXT.1.1: 1
- FCS_TLSC_EXT.1: 5
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.3: 5
- FCS_TLSC_EXT.3.1: 1
- FCS_TLSC_EXT.5: 5
- FCS_TLSC_EXT.5.1: 1
- FCS_TLSS_EXT.1: 4
- FCS_TLSS_EXT.1.1: 1
- FCS_TLS_EXT.1: 6
- FCS_TLS_EXT.1.1: 1
- FDP:
- FDP_ACF_EXT.1: 5
- FDP_ACF_EXT.1.1: 1
- FDP_IFC_EXT.1: 1
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FMT:
- FMT_MOF_EXT.1: 4
- FMT_MOF_EXT.1.1: 1
- FMT_SMF_EXT.1: 4
- FMT_SMF_EXT.1.1: 3
- FPT:
- FPT_ACF_EXT.1: 4
- FPT_ACF_EXT.1.1: 1
- FPT_ACF_EXT.1.2: 1
- FPT_ASLR_EXT: 9
- FPT_ASLR_EXT.1: 3
- FPT_SBOP_EXT.1: 4
- FPT_SBOP_EXT.1.1: 1
- FPT_SRP_EXT.1: 4
- FPT_SRP_EXT.1.1: 1
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 5
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.2: 4
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FTA:
- FTA_TAB.1: 4
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC_EXT.1: 6
- FTP_ITC_EXT.1.1: 1
- FTP_TRP.1: 4
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 2
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_STG: 2
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 4
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 8
- FCS_CKM.4: 16
- FCS_CKM.4.1: 2
- FCS_COP: 2
- FCS_COP.1: 10
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 18
- FDP_ACC.1.1: 1
- FDP_ACF: 2
- FDP_ACF.1: 5
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ETC: 4
- FDP_ETC.1: 6
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 2
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 7
- FDP_ITC: 2
- FDP_ITC.1: 18
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 8
- FDP_SDI: 2
- FDP_SDI.2: 5
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 2
- FIA_ATD.1: 3
- FIA_ATD.1.1: 1
- FIA_UAU: 6
- FIA_UAU.1: 2
- FIA_UAU.2: 9
- FIA_UAU.2.1: 2
- FIA_UAU.3: 8
- FIA_UAU.3.1: 1
- FIA_UAU.3.2: 1
- FIA_UID: 2
- FIA_UID.1: 5
- FIA_UID.2: 4
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 4
- FMT_MSA.3: 6
- FPT:
- FPT_FLS: 2
- FPT_FLS.1: 4
- FPT_FLS.1.1: 1
- FPT_PHP: 6
- FPT_PHP.1: 1
- FPT_PHP.2: 5
- FPT_PHP.2.1: 1
- FPT_PHP.2.2: 2
- FPT_PHP.2.3: 2
- FPT_PHP.3: 8
- FPT_PHP.3.1: 2
- FPT_STM.1: 2
- FPT_TDC: 4
- FPT_TDC.1: 7
- FPT_TDC.1.1: 2
- FPT_TDC.1.2: 2
- FPT_TST: 2
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_PRS: 2
- FRU_PRS.1: 5
- FRU_PRS.1.1: 2
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TDC.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PLATFORM: 3
- A.PROPER_: 2
- A.PROPER_ADMIN: 2
- A.PROPER_USER: 2
- O:
- O.ACCOUNTABILITY: 6
- O.INTEGRITY: 6
- O.MANAGEMENT: 6
- O.PROTECTED_: 7
- O.PROTECTED_COMMS: 2
- O.PROTECTED_STORAGE: 1
- OE:
- OE.PLATFORM: 3
- OE.PROPER_ADMIN: 3
- OE.PROPER_USER: 3
- T:
- T.LIMITED_: 2
- T.LOCAL_: 1
- T.LOCAL_ATTACK: 1
- T.NETWORK_: 3
- T.NETWORK_ATTACK: 5
- T.NETWORK_EAVESDROP: 2
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 3
- AES-: 1
- AES-256: 1
- AES256: 1
- constructions:
- MAC:
- HMAC: 3
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- RSA:
- RSA 2048: 6
- RSA 3072: 1
- RSA 4096: 1
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA2:
- SHA-256: 6
- SHA-384: 4
- SHA-512: 7
- SHA256: 8
- SHA384: 2
- SHA512: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- DTLS:
- TLS:
- TLS: 44
- TLS 1.1: 1
- TLS 1.2: 1
- TLSv1.2: 2
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-384: 10
- P-521: 10
- secp384r1: 2
- secp521r1: 2
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- malfunction: 1
- physical tampering: 13
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 186-4: 2
- FIPS PUB 180-4: 2
- FIPS PUB 186-4: 6
- FIPS PUB 198-1: 1
- FIPS186-4: 6
- NIST:
- NIST SP 800-38A: 3
- NIST SP 800-38D: 2
- NIST SP 800-56A: 2
- NIST SP 800-57: 2
- NIST SP 800-90A: 2
- RFC:
- RFC 4251: 1
- RFC 4252: 2
- RFC 4253: 3
- RFC 4344: 1
- RFC 5246: 1
- RFC 5280: 4
- RFC 5288: 2
- RFC 5289: 4
- RFC 5647: 1
- RFC 5656: 10
- RFC 6066: 1
- RFC 6125: 1
- RFC 6668: 2
- RFC 8268: 4
- RFC 8332: 6
- X509:
|
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- FIPS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
- out of scope: 1
|
- OutOfScope:
- Out of scope: 4
- by the motion sensor manufacturer; stored in motion sensor at the end of the manufacturing phase. Out of scope for this ST Made unavailable when the motion sensor has reached end of life. Motion sensor: 2
- motion sensor in operational phase. AES Generated by the VU during pairing to the motion sensor. Out of scope for this ST Made unavailable when the motion sensor is paired to another (or the same) vehicle unit: 1
- motion sensor in operational phase. TDES Generated by the VU during pairing to the motion sensor. Out of scope for this ST Made unavailable when the motion sensor is paired to another (or the same) vehicle unit: 1
|
pdf_data/st_metadata |
- /Author: Milad Torabi
- /CreationDate: D:20250127134212-08'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20250127134212-08'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Subject: Red Hat Enterprise Linux 9.4
- /Title: Red Hat
- pdf_file_size_bytes: 644575
- pdf_hyperlinks: mailto:[email protected], https://www.lightshipsec.com/, https://access.redhat.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 53
|
- /Author: reha.caputcu
- /CreationDate: D:20180222134214+03'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20180222134214+03'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 964329
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 62
|
state/cert/convert_garbage |
True |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
True |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |