CESeCore, version 1.1.2
CSV information ?
Status | archived |
---|---|
Valid from | 14.06.2012 |
Valid until | 01.09.2019 |
Scheme | 🇫🇷 FR |
Manufacturer | CESeCore Consortium |
Category | Key Management Systems |
Security level | EAL4+, ALC_FLR.2 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
DESSecurity level
EAL 4, EAL4, EAL 1, EAL 3, EAL 5, EAL 7, ITSEC E3 ElémentaireSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_TDS, AGD_OPE, AGD_PRE, ALC_FLR.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSCertificates
ANSSI-CC-2012/33Evaluation facilities
OPPIDAStandards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Title | ANSSI-CC-2012/33 |
---|---|
Subject | CESeCore version 1.1.2 |
Keywords | ANSSI-CC-CER-F-07.009 |
Author | bouly |
Creation date | D:20120615112546+02'00' |
Modification date | D:20120615112556+02'00' |
Pages | 14 |
Creator | Acrobat PDFMaker 8.1 pour Word |
Producer | Acrobat Distiller 8.1.0 (Windows) |
Security target ?
Extracted keywords
Protocols
PACESecurity level
EAL 4+, EAL4, EAL4 augmentedClaims
O.CPS, A.CPSSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_FSP.2, ADV_HLD.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_FSP.1, ADV_TDS.1, ADV_TDS.2, ADV_FSP.3, AGD_OPE.1, AGD_PRE.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ALC_CMS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV.1, AVA_VAN.3, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SEL.1, FAU_STG.1, FAU_STG.4, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.4.1, FCO_NRO_CIMC.3, FCO_NRO_CIMC.4, FCO_NRO_CIMC.3.1, FCO_NRO_CIMC.3.2, FCO_NRO_CIMC.3.3, FCO_NRO_CIMC.4.1, FCO_NRO_CIMC.4.2, FCS_CKM_CIMC.5, FCS_CKM.1, FCS_CKM_CIMC.5.1, FCS_CKM.4, FDP_ACF_CIMC.2, FDP_ACF_CIMC.3, FDP_CIMC_BKP.1, FDP_CIMC_BKP.2, FDP_CIMC_CER.1, FDP_CIMC_CRL.1, FDP_CIMC_CSE.1, FDP_CIMC_OCSP.1, FDP_ETC_CIMC.5, FDP_SDI_CIMC.3, FDP_ACC.1, FDP_ACF.1, FDP_ITT.1, FDP_UCT.1, FDP_ETC_CIMC.4, FDP_CIMC_BKP.1.1, FDP_CIMC_BKP.1.2, FDP_CIMC_BKP.1.3, FDP_CIMC_BKP.1.4, FDP_CIMC_BKP.2.1, FDP_CIMC_BKP.2.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_CIMC_CSE.1.1, FDP_ITT.1.1, FDP_UCT.1.1, FDP_ACF_CIMC.2.1, FDP_ACF_CIMC.2.2, FDP_ACF_CIMC.3.1, FDP_ETC_CIMC.5.1, FDP_SDI_CIMC.3.1, FDP_SDI_CIMC.3.2, FDP_CIMC_CER.1.1, FDP_CIMC_CER.1.2, FDP_CIMC_CER.1.3, FDP_CIMC_CER.1.4, FDP_CIMC_CRL.1.1, FDP_CIMC_OCSP.1.1, FDP_IFC.1, FIA_UAU.1, FIA_UID.1, FIA_USB.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_ATD.1, FMT_MOF_CIMC.3, FMT_MOF_CIMC.5, FMT_MOF_CIMC.6, FMT_MTD_CIMC.4, FMT_MTD_CIMC.5, FMT_MTD_CIMC.7, FMT_MOF.1, FMT_MTD_CIMC.6, FMT_MOF.1.1, FMT_MTD_CIMC.4.1, FMT_MTD_CIMC.5.1, FMT_MTD_CIMC.7.1, FMT_MOF_CIMC.3.1, FMT_MOF_CIMC.3.2, FMT_MOF_CIMC.3.3, FMT_MOF_CIMC.3.4, FMT_MOF_CIMC.5.1, FMT_MOF_CIMC.5.2, FMT_MOF_CIMC.5.3, FMT_MOF_CIMC.6.1, FMT_MOF_CIMC.6.2, FMT_MOF_CIMC.6.3, FMT_SMF.1, FMT_MTD.1, FMT_MSA.3, FMT_SMR.1, FPT_CIMC_TSP.1, FPT_ITC.1, FPT_ITT.1, FPT_STM.1, FPT_CIMC_TSP.1.1, FPT_CIMC_TSP.1.2, FPT_CIMC_TSP.1.3, FPT_CIMC_TSP.1.4, FPT_STM.1.1, FPT_ITC.1.1, FPT_ITT.1.1, FPT_RVM.1, FTP_ITC.1, FTP_TRP.1Standards
FIPS 140-1, FIPS 140-15, FIPS6, PKCS#11, PKCS#8, RFC 2560, RFC 5280, RFC 5019, RFC 2650, X.509Technical reports
BSI TR-03110File metadata
Title | Security Target for CESeCore v1.1.2 |
---|---|
Author | Pedro Borges |
Creation date | D:20120413223648+01'00' |
Pages | 65 |
Creator | Writer |
Producer | OpenOffice.org 3.3 |
Heuristics ?
Extracted SARs
ADV_LLD.1, ASE_CCL.1, ALC_DEL.1, ALC_CMC.4, AVA_MSU.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ASE_TSS.1, ADV_TDS.3, ADV_ARC.1, ADV_HLD.2, AVA_VAN.3, ASE_SPD.1, ASE_REQ.2, ALC_CMS.4, ADV_IMP.1, ALC_TAT.1, ATE_COV.2, AGD_OPE.1, AVA_SOF.1, ALC_DVS.1, ALC_FLR.2, ADV_RCR.1, ASE_ECD.1, AGD_USR.1, ADV_SPM.1, ADV_FSP.4, ASE_INT.1, AGD_ADM.1, AGD_PRE.1, ALC_LCD.1, ASE_OBJ.2, AVA_VLA.2Scheme data ?
Product | CESeCore version 1.1.2 | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/cesecore-version-112 | |
Description | Le produit certifié est la librairie open source « CESeCore version 1.1.2 » développée par le consortium CESeCore. Ce produit est composé de modules logiciels JEE (Java Enterprise Edition) offrant des fonctions de sécurité nécessaires à la création d'applications basées sur une PKI1. La librairie CESeCore n'est pas une application en elle-même car elle doit être intégrée dans une app | |
Sponsor | CESeCore Consortium | |
Developer | CESeCore Consortium | |
Cert Id | ANSSI-CC-2012/33 | |
Level | EAL4+ | |
Enhanced | ||
Cert Id | ANSSI-CC-2012/33 | |
Certification Date | 14.06.2012 | |
Category | Produits pour ordinateur personnel et serveur | |
Cc Version | Critères Communs version 3.1r3 | |
Developer | CESeCore Consortium | |
Sponsor | CESeCore Consortium | |
Evaluation Facility | Oppida | |
Level | EAL4+ | |
Protection Profile | ||
Mutual Recognition | SOG-IS CCRA | |
Augmented | ALC_FLR.2 | |
Target Link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2012-33en.pdf | |
Report Link | https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2012-33fr.pdf |
References ?
No references are available for this certificate.
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'description': 'Le produit certifié est la librairie open source « CESeCore version 1.1.2 » développée par le consortium CESeCore. Ce produit est composé de modules logiciels JEE (Java Enterprise Edition) offrant des fonctions de sécurité nécessaires à la création d'applications basées sur une PKI1. La librairie CESeCore n'est pas une application en elle-même car elle doit être intégrée dans une app', 'cert_id': 'ANSSI-CC-2012/33', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2012/33', 'certification_date': '2012-06-14', 'mutual_recognition': 'SOG-IS CCRA'}}}
data.
- The scheme_data property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'CESeCore version 1.1.2', 'url': 'https://cyber.gouv.fr/produits-certifies/cesecore-version-112', 'description': 'Le produit certifié est la librairie open source « CESeCore version 1.1.2 » développée par le consortium CESeCore.\n\nCe produit est composé de modules logiciels JEE (Java Enterprise Edition) offrant des fonctions de sécurité nécessaires à la création d'applications basées sur une PKI1.\n\nLa librairie CESeCore n'est pas une application en elle-même car elle doit être intégrée dans une app', 'sponsor': 'CESeCore Consortium', 'developer': 'CESeCore Consortium', 'cert_id': '2012/33', 'level': 'EAL4+', 'enhanced': {'cert_id': '2012/33', 'certification_date': '14/06/2012', 'category': 'Produits pour ordinateur personnel et serveur', 'cc_version': 'Critères Communs version 3.1r3', 'developer': 'CESeCore Consortium', 'sponsor': 'CESeCore Consortium', 'evaluation_facility': 'Oppida', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_FLR.2', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2012-33en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2012-33fr.pdf'}}
.
- The scheme_data property was set to
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '64f982ec2cf14b221c7738a7aac84377e726ce39d572603b2074ab2d674f6a0e', 'txt_hash': 'c76f85a1f79f8b40e64251c52615da028e6fe7a4c2faae89b6182b1d2909b625'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '44fc7c211eeb4995d1ffb3f80edb51946750d8b5c4d8d6880e7fe9c995a1df4c', 'txt_hash': '0ffca9b832b692df98db44a96ec76352b48983a91c5c6d3d39674bf93c703731'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 206546, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 14, '/CreationDate': "D:20120615112546+02'00'", '/Subject': 'CESeCore version 1.1.2', '/Author': 'bouly', '/Creator': 'Acrobat PDFMaker 8.1 pour Word', '/Keywords': 'ANSSI-CC-CER-F-07.009', '/Producer': 'Acrobat Distiller 8.1.0 (Windows)', '/ModDate': "D:20120615112556+02'00'", '/Company': 'SGDSN/ANSSI', '/Comments': 'CESeCore Consortium', '/SourceModified': 'D:20120615092536', '/Title': 'ANSSI-CC-2012/33', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ssi.gouv.fr/', 'http://ejbca.org/adminguide.html#Code%20signing', 'https://wiki.cesecore.eu/mediawiki/index.php/Glassfish#securing_the_installation', 'https://www.cesecore.eu/mediawiki/index.php/Main_Page', 'https://wiki.cesecore.eu/mediawiki/inndex.php/JBoss#securing', 'mailto:[email protected]']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 515975, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 65, '/Title': 'Security Target for CESeCore v1.1.2', '/Author': 'Pedro Borges', '/Creator': 'Writer', '/Producer': 'OpenOffice.org 3.3', '/CreationDate': "D:20120413223648+01'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://tools.ietf.org/pdf/rfc5019.pdf', 'http://checklists.nist.gov/', 'http://tools.ietf.org/pdf/rfc5280.pdf', 'http://tools.ietf.org/pdf/rfc2560.pdf', 'http://www.itu.int/rec/T-REC-X.509-200508-I/en']}}
. - The report_frontpage property was set to
{'FR': {}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2012/33': 15}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL4': 4, 'EAL 1': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E3 Elémentaire': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 2, 'AGD_PRE': 2}, 'ALC': {'ALC_FLR.2': 1, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'OPPIDA': {'OPPIDA': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4+': 1, 'EAL4': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_CAP.4': 1, 'ACM_SCP.2': 1}, 'ADO': {'ADO_DEL.2': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_ARC.1': 5, 'ADV_FSP.4': 25, 'ADV_IMP.1': 6, 'ADV_TDS.3': 18, 'ADV_FSP.2': 11, 'ADV_HLD.2': 1, 'ADV_LLD.1': 1, 'ADV_RCR.1': 1, 'ADV_SPM.1': 1, 'ADV_FSP.1': 6, 'ADV_TDS.1': 10, 'ADV_TDS.2': 2, 'ADV_FSP.3': 2}, 'AGD': {'AGD_OPE.1': 5, 'AGD_PRE.1': 6, 'AGD_ADM.1': 1, 'AGD_USR.1': 1}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC.4': 4, 'ALC_CMS.4': 4, 'ALC_DEL.1': 3, 'ALC_DVS.1': 3, 'ALC_LCD.1': 3, 'ALC_TAT.1': 5, 'ALC_CMS.1': 1}, 'ATE': {'ATE_COV.2': 6, 'ATE_DPT.1': 4, 'ATE_FUN.1': 7, 'ATE_IND.2': 2, 'ATE_COV.1': 4}, 'AVA': {'AVA_VAN.3': 3, 'AVA_MSU.2': 1, 'AVA_SOF.1': 1, 'AVA_VLA.2': 1}, 'ASE': {'ASE_CCL.1': 3, 'ASE_ECD.1': 6, 'ASE_INT.1': 5, 'ASE_OBJ.2': 4, 'ASE_REQ.2': 5, 'ASE_SPD.1': 5, 'ASE_TSS.1': 3, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 9, 'FAU_GEN.2': 4, 'FAU_SEL.1': 5, 'FAU_STG.1': 5, 'FAU_STG.4': 4, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.4.1': 1}, 'FCO': {'FCO_NRO_CIMC.3': 6, 'FCO_NRO_CIMC.4': 5, 'FCO_NRO_CIMC.3.1': 1, 'FCO_NRO_CIMC.3.2': 1, 'FCO_NRO_CIMC.3.3': 1, 'FCO_NRO_CIMC.4.1': 1, 'FCO_NRO_CIMC.4.2': 1}, 'FCS': {'FCS_CKM_CIMC.5': 5, 'FCS_CKM.1': 2, 'FCS_CKM_CIMC.5.1': 1, 'FCS_CKM.4': 1}, 'FDP': {'FDP_ACF_CIMC.2': 5, 'FDP_ACF_CIMC.3': 5, 'FDP_CIMC_BKP.1': 6, 'FDP_CIMC_BKP.2': 5, 'FDP_CIMC_CER.1': 6, 'FDP_CIMC_CRL.1': 5, 'FDP_CIMC_CSE.1': 5, 'FDP_CIMC_OCSP.1': 5, 'FDP_ETC_CIMC.5': 5, 'FDP_SDI_CIMC.3': 5, 'FDP_ACC.1': 9, 'FDP_ACF.1': 7, 'FDP_ITT.1': 5, 'FDP_UCT.1': 5, 'FDP_ETC_CIMC.4': 1, 'FDP_CIMC_BKP.1.1': 1, 'FDP_CIMC_BKP.1.2': 1, 'FDP_CIMC_BKP.1.3': 1, 'FDP_CIMC_BKP.1.4': 1, 'FDP_CIMC_BKP.2.1': 1, 'FDP_CIMC_BKP.2.2': 1, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_CIMC_CSE.1.1': 1, 'FDP_ITT.1.1': 2, 'FDP_UCT.1.1': 1, 'FDP_ACF_CIMC.2.1': 1, 'FDP_ACF_CIMC.2.2': 1, 'FDP_ACF_CIMC.3.1': 1, 'FDP_ETC_CIMC.5.1': 1, 'FDP_SDI_CIMC.3.1': 1, 'FDP_SDI_CIMC.3.2': 1, 'FDP_CIMC_CER.1.1': 1, 'FDP_CIMC_CER.1.2': 1, 'FDP_CIMC_CER.1.3': 1, 'FDP_CIMC_CER.1.4': 1, 'FDP_CIMC_CRL.1.1': 1, 'FDP_CIMC_OCSP.1.1': 1, 'FDP_IFC.1': 2}, 'FIA': {'FIA_UAU.1': 5, 'FIA_UID.1': 8, 'FIA_USB.1': 5, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_ATD.1': 1}, 'FMT': {'FMT_MOF_CIMC.3': 8, 'FMT_MOF_CIMC.5': 9, 'FMT_MOF_CIMC.6': 9, 'FMT_MTD_CIMC.4': 6, 'FMT_MTD_CIMC.5': 6, 'FMT_MTD_CIMC.7': 5, 'FMT_MOF.1': 10, 'FMT_MTD_CIMC.6': 3, 'FMT_MOF.1.1': 1, 'FMT_MTD_CIMC.4.1': 1, 'FMT_MTD_CIMC.5.1': 1, 'FMT_MTD_CIMC.7.1': 1, 'FMT_MOF_CIMC.3.1': 1, 'FMT_MOF_CIMC.3.2': 1, 'FMT_MOF_CIMC.3.3': 1, 'FMT_MOF_CIMC.3.4': 1, 'FMT_MOF_CIMC.5.1': 1, 'FMT_MOF_CIMC.5.2': 1, 'FMT_MOF_CIMC.5.3': 1, 'FMT_MOF_CIMC.6.1': 1, 'FMT_MOF_CIMC.6.2': 1, 'FMT_MOF_CIMC.6.3': 1, 'FMT_SMF.1': 2, 'FMT_MTD.1': 1, 'FMT_MSA.3': 1, 'FMT_SMR.1': 4}, 'FPT': {'FPT_CIMC_TSP.1': 6, 'FPT_ITC.1': 4, 'FPT_ITT.1': 5, 'FPT_STM.1': 6, 'FPT_CIMC_TSP.1.1': 1, 'FPT_CIMC_TSP.1.2': 1, 'FPT_CIMC_TSP.1.3': 1, 'FPT_CIMC_TSP.1.4': 1, 'FPT_STM.1.1': 1, 'FPT_ITC.1.1': 1, 'FPT_ITT.1.1': 2, 'FPT_RVM.1': 1}, 'FTP': {'FTP_ITC.1': 1, 'FTP_TRP.1': 1}}, 'cc_claims': {'O': {'O.CPS': 1}, 'A': {'A.CPS': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'PACE': {'PACE': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI TR-03110': 3}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-1': 26, 'FIPS 140-15': 1, 'FIPS6': 1}, 'PKCS': {'PKCS#11': 4, 'PKCS#8': 1}, 'RFC': {'RFC 2560': 7, 'RFC 5280': 5, 'RFC 5019': 1, 'RFC 2650': 1}, 'X509': {'X.509': 15}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
ANSSI-CC-2012_33.pdf
. - The st_filename property was set to
2012-33 SecurityTarget.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
ANSSI-CC-2012/33
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}]}
values added.
- The report property was updated, with the
-
19.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'CESeCore version 1.1.2', 'url': 'https://cyber.gouv.fr/produits-certifies/cesecore-version-112', 'description': 'Le produit certifié est la librairie open source « CESeCore version 1.1.2 » développée par le consortium CESeCore.\n\nCe produit est composé de modules logiciels JEE (Java Enterprise Edition) offrant des fonctions de sécurité nécessaires à la création d'applications basées sur une PKI1.\n\nLa librairie CESeCore n'est pas une application en elle-même car elle doit être intégrée dans une app', 'sponsor': 'CESeCore Consortium', 'developer': 'CESeCore Consortium', 'cert_id': '2012/33', 'level': 'EAL4+', 'enhanced': {'cert_id': '2012/33', 'certification_date': '14/06/2012', 'category': 'Produits pour ordinateur personnel et serveur', 'cc_version': 'Critères Communs version 3.1r3', 'developer': 'CESeCore Consortium', 'sponsor': 'CESeCore Consortium', 'evaluation_facility': 'Oppida', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_FLR.2', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2012-33en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2012-33fr.pdf'}}
.
- The scheme_data property was set to
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2012_33.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2012-33%20SecurityTarget.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}]}
values discarded.
- The new value is
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name CESeCore, version 1.1.2 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Key Management Systems",
"cert_link": null,
"dgst": "147aaed107adccf4",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2012/33",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.1.2"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "ANSSI-CC-2012/33",
"description": "Le produit certifi\u00e9 est la librairie open source \u00ab CESeCore version 1.1.2 \u00bb d\u00e9velopp\u00e9e par le consortium CESeCore. Ce produit est compos\u00e9 de modules logiciels JEE (Java Enterprise Edition) offrant des fonctions de s\u00e9curit\u00e9 n\u00e9cessaires \u00e0 la cr\u00e9ation d\u0026#39;applications bas\u00e9es sur une PKI1. La librairie CESeCore n\u0026#39;est pas une application en elle-m\u00eame car elle doit \u00eatre int\u00e9gr\u00e9e dans une app",
"developer": "CESeCore Consortium",
"enhanced": {
"augmented": "ALC_FLR.2",
"category": "Produits pour ordinateur personnel et serveur",
"cc_version": "Crit\u00e8res Communs version 3.1r3",
"cert_id": "ANSSI-CC-2012/33",
"certification_date": "2012-06-14",
"developer": "CESeCore Consortium",
"evaluation_facility": "Oppida",
"level": "EAL4+",
"mutual_recognition": "SOG-IS CCRA",
"protection_profile": "",
"report_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2012-33fr.pdf",
"sponsor": "CESeCore Consortium",
"target_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2012-33en.pdf"
},
"level": "EAL4+",
"product": "CESeCore version 1.1.2",
"sponsor": "CESeCore Consortium",
"url": "https://cyber.gouv.fr/produits-certifies/cesecore-version-112"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "CESeCore Consortium",
"manufacturer_web": "https://www.cesecore.eu/",
"name": "CESeCore, version 1.1.2",
"not_valid_after": "2019-09-01",
"not_valid_before": "2012-06-14",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ANSSI-CC-2012_33.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2012/33": 15
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 2,
"AGD_PRE": 2
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_FLR": 2,
"ALC_FLR.2": 1,
"ALC_LCD": 1,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 4": 2,
"EAL 5": 1,
"EAL 7": 1,
"EAL4": 4
},
"ITSEC": {
"ITSEC E3 El\u00e9mentaire": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"OPPIDA": {
"OPPIDA": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "bouly",
"/Comments": "CESeCore Consortium",
"/Company": "SGDSN/ANSSI",
"/CreationDate": "D:20120615112546+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 8.1 pour Word",
"/Keywords": "ANSSI-CC-CER-F-07.009",
"/ModDate": "D:20120615112556+02\u002700\u0027",
"/Producer": "Acrobat Distiller 8.1.0 (Windows)",
"/SourceModified": "D:20120615092536",
"/Subject": "CESeCore version 1.1.2",
"/Title": "ANSSI-CC-2012/33",
"pdf_file_size_bytes": 206546,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://wiki.cesecore.eu/mediawiki/inndex.php/JBoss#securing",
"http://ejbca.org/adminguide.html#Code%20signing",
"https://www.cesecore.eu/mediawiki/index.php/Main_Page",
"mailto:[email protected]",
"http://www.ssi.gouv.fr/",
"https://wiki.cesecore.eu/mediawiki/index.php/Glassfish#securing_the_installation"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 14
},
"st_filename": "2012-33 SecurityTarget.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CPS": 1
},
"O": {
"O.CPS": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 1,
"ACM_CAP.4": 1,
"ACM_SCP.2": 1
},
"ADO": {
"ADO_DEL.2": 1,
"ADO_IGS.1": 1
},
"ADV": {
"ADV_ARC.1": 5,
"ADV_FSP.1": 6,
"ADV_FSP.2": 11,
"ADV_FSP.3": 2,
"ADV_FSP.4": 25,
"ADV_HLD.2": 1,
"ADV_IMP.1": 6,
"ADV_LLD.1": 1,
"ADV_RCR.1": 1,
"ADV_SPM.1": 1,
"ADV_TDS.1": 10,
"ADV_TDS.2": 2,
"ADV_TDS.3": 18
},
"AGD": {
"AGD_ADM.1": 1,
"AGD_OPE.1": 5,
"AGD_PRE.1": 6,
"AGD_USR.1": 1
},
"ALC": {
"ALC_CMC.4": 4,
"ALC_CMS.1": 1,
"ALC_CMS.4": 4,
"ALC_DEL.1": 3,
"ALC_DVS.1": 3,
"ALC_FLR.2": 5,
"ALC_LCD.1": 3,
"ALC_TAT.1": 5
},
"ASE": {
"ASE_CCL.1": 3,
"ASE_ECD.1": 6,
"ASE_INT.1": 5,
"ASE_OBJ.2": 4,
"ASE_REQ.1": 2,
"ASE_REQ.2": 5,
"ASE_SPD.1": 5,
"ASE_TSS.1": 3
},
"ATE": {
"ATE_COV.1": 4,
"ATE_COV.2": 6,
"ATE_DPT.1": 4,
"ATE_FUN.1": 7,
"ATE_IND.2": 2
},
"AVA": {
"AVA_MSU.2": 1,
"AVA_SOF.1": 1,
"AVA_VAN.3": 3,
"AVA_VLA.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4+": 1,
"EAL4": 2,
"EAL4 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 9,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 4,
"FAU_GEN.2.1": 1,
"FAU_SEL.1": 5,
"FAU_SEL.1.1": 1,
"FAU_STG.1": 5,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.4": 4,
"FAU_STG.4.1": 1
},
"FCO": {
"FCO_NRO_CIMC.3": 6,
"FCO_NRO_CIMC.3.1": 1,
"FCO_NRO_CIMC.3.2": 1,
"FCO_NRO_CIMC.3.3": 1,
"FCO_NRO_CIMC.4": 5,
"FCO_NRO_CIMC.4.1": 1,
"FCO_NRO_CIMC.4.2": 1
},
"FCS": {
"FCS_CKM.1": 2,
"FCS_CKM.4": 1,
"FCS_CKM_CIMC.5": 5,
"FCS_CKM_CIMC.5.1": 1
},
"FDP": {
"FDP_ACC.1": 9,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 7,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_ACF_CIMC.2": 5,
"FDP_ACF_CIMC.2.1": 1,
"FDP_ACF_CIMC.2.2": 1,
"FDP_ACF_CIMC.3": 5,
"FDP_ACF_CIMC.3.1": 1,
"FDP_CIMC_BKP.1": 6,
"FDP_CIMC_BKP.1.1": 1,
"FDP_CIMC_BKP.1.2": 1,
"FDP_CIMC_BKP.1.3": 1,
"FDP_CIMC_BKP.1.4": 1,
"FDP_CIMC_BKP.2": 5,
"FDP_CIMC_BKP.2.1": 1,
"FDP_CIMC_BKP.2.2": 1,
"FDP_CIMC_CER.1": 6,
"FDP_CIMC_CER.1.1": 1,
"FDP_CIMC_CER.1.2": 1,
"FDP_CIMC_CER.1.3": 1,
"FDP_CIMC_CER.1.4": 1,
"FDP_CIMC_CRL.1": 5,
"FDP_CIMC_CRL.1.1": 1,
"FDP_CIMC_CSE.1": 5,
"FDP_CIMC_CSE.1.1": 1,
"FDP_CIMC_OCSP.1": 5,
"FDP_CIMC_OCSP.1.1": 1,
"FDP_ETC_CIMC.4": 1,
"FDP_ETC_CIMC.5": 5,
"FDP_ETC_CIMC.5.1": 1,
"FDP_IFC.1": 2,
"FDP_ITT.1": 5,
"FDP_ITT.1.1": 2,
"FDP_SDI_CIMC.3": 5,
"FDP_SDI_CIMC.3.1": 1,
"FDP_SDI_CIMC.3.2": 1,
"FDP_UCT.1": 5,
"FDP_UCT.1.1": 1
},
"FIA": {
"FIA_ATD.1": 1,
"FIA_UAU.1": 5,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UID.1": 8,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB.1": 5,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MOF.1": 10,
"FMT_MOF.1.1": 1,
"FMT_MOF_CIMC.3": 8,
"FMT_MOF_CIMC.3.1": 1,
"FMT_MOF_CIMC.3.2": 1,
"FMT_MOF_CIMC.3.3": 1,
"FMT_MOF_CIMC.3.4": 1,
"FMT_MOF_CIMC.5": 9,
"FMT_MOF_CIMC.5.1": 1,
"FMT_MOF_CIMC.5.2": 1,
"FMT_MOF_CIMC.5.3": 1,
"FMT_MOF_CIMC.6": 9,
"FMT_MOF_CIMC.6.1": 1,
"FMT_MOF_CIMC.6.2": 1,
"FMT_MOF_CIMC.6.3": 1,
"FMT_MSA.3": 1,
"FMT_MTD.1": 1,
"FMT_MTD_CIMC.4": 6,
"FMT_MTD_CIMC.4.1": 1,
"FMT_MTD_CIMC.5": 6,
"FMT_MTD_CIMC.5.1": 1,
"FMT_MTD_CIMC.6": 3,
"FMT_MTD_CIMC.7": 5,
"FMT_MTD_CIMC.7.1": 1,
"FMT_SMF.1": 2,
"FMT_SMR.1": 4
},
"FPT": {
"FPT_CIMC_TSP.1": 6,
"FPT_CIMC_TSP.1.1": 1,
"FPT_CIMC_TSP.1.2": 1,
"FPT_CIMC_TSP.1.3": 1,
"FPT_CIMC_TSP.1.4": 1,
"FPT_ITC.1": 4,
"FPT_ITC.1.1": 1,
"FPT_ITT.1": 5,
"FPT_ITT.1.1": 2,
"FPT_RVM.1": 1,
"FPT_STM.1": 6,
"FPT_STM.1.1": 1
},
"FTP": {
"FTP_ITC.1": 1,
"FTP_TRP.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS 140-1": 26,
"FIPS 140-15": 1,
"FIPS6": 1
},
"PKCS": {
"PKCS#11": 4,
"PKCS#8": 1
},
"RFC": {
"RFC 2560": 7,
"RFC 2650": 1,
"RFC 5019": 1,
"RFC 5280": 5
},
"X509": {
"X.509": 15
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI TR-03110": 3
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Pedro Borges",
"/CreationDate": "D:20120413223648+01\u002700\u0027",
"/Creator": "Writer",
"/Producer": "OpenOffice.org 3.3",
"/Title": "Security Target for CESeCore v1.1.2",
"pdf_file_size_bytes": 515975,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://checklists.nist.gov/",
"http://tools.ietf.org/pdf/rfc5019.pdf",
"http://www.itu.int/rec/T-REC-X.509-200508-I/en",
"http://tools.ietf.org/pdf/rfc5280.pdf",
"http://tools.ietf.org/pdf/rfc2560.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 65
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2012_33.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.2",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2012-33%20SecurityTarget.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "64f982ec2cf14b221c7738a7aac84377e726ce39d572603b2074ab2d674f6a0e",
"txt_hash": "c76f85a1f79f8b40e64251c52615da028e6fe7a4c2faae89b6182b1d2909b625"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "44fc7c211eeb4995d1ffb3f80edb51946750d8b5c4d8d6880e7fe9c995a1df4c",
"txt_hash": "0ffca9b832b692df98db44a96ec76352b48983a91c5c6d3d39674bf93c703731"
}
},
"status": "archived"
}