EJBCA, version 5.0.4

This certificate has known related CVEs, which means that the certified product might be vulnerable.

CSV information ?

Status archived
Valid from 04.10.2012
Valid until 01.09.2019
Scheme 🇫🇷 FR
Manufacturer PrimeKey Solutions AB
Category Key Management Systems
Security level EAL4+, ALC_FLR.2

Heuristics summary ?

Certificate ID: ANSSI-CC-2012/47

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
DES

Security level
EAL 4, EAL4, EAL 1, EAL 3, EAL 5, EAL 7, ITSEC E3 Elémentaire
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_FLR.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Certificates
ANSSI-CC-2012/47, CCEVS-VR-01-0009
Evaluation facilities
CESTI

Standards
X.509, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004
Technical reports
BSI TR-03110

File metadata

Creation date D:20121023153918+02'00'
Modification date D:20121023153918+02'00'
Pages 14
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 9.0.0 (Windows)

Security target ?

Extracted keywords

Protocols
SSL, PACE, VPN

Vendor
Cisco

Security level
EAL 4+, EAL4+, EAL4, EAL4 augmented
Claims
O.CPS, A.CPS
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_FSP.2, ADV_HLD.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_FSP.1, ADV_TDS.1, ADV_TDS.2, ADV_FSP.3, AGD_OPE.1, AGD_PRE.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ALC_CMS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV.1, AVA_VAN.3, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SEL.1, FAU_STG.1, FAU_STG.4, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.4.1, FCO_NRO_CIMC.3, FCO_NRO_CIMC.4, FCO_NRO_CIMC.3.1, FCO_NRO_CIMC.3.2, FCO_NRO_CIMC.3.3, FCO_NRO_CIMC.4.1, FCO_NRO_CIMC.4.2, FCS_CKM_CIMC.5, FCS_CKM.1, FCS_CKM_CIMC.5.1, FCS_CKM.4, FDP_ACF_CIMC.2, FDP_ACF_CIMC.3, FDP_CIMC_BKP.1, FDP_CIMC_BKP.2, FDP_CIMC_CER.1, FDP_CIMC_CRL.1, FDP_CIMC_CSE.1, FDP_CIMC_OCSP.1, FDP_ETC_CIMC.5, FDP_SDI_CIMC.3, FDP_ACC.1, FDP_ACF.1, FDP_ITT.1, FDP_UCT.1, FDP_ETC_CIMC.4, FDP_CIMC_BKP.1.1, FDP_CIMC_BKP.1.2, FDP_CIMC_BKP.1.3, FDP_CIMC_BKP.1.4, FDP_CIMC_BKP.2.1, FDP_CIMC_BKP.2.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_CIMC_CSE.1.1, FDP_ITT.1.1, FDP_UCT.1.1, FDP_ACF_CIMC.2.1, FDP_ACF_CIMC.2.2, FDP_ACF_CIMC.3.1, FDP_ETC_CIMC.5.1, FDP_SDI_CIMC.3.1, FDP_SDI_CIMC.3.2, FDP_CIMC_CER.1.1, FDP_CIMC_CER.1.2, FDP_CIMC_CER.1.3, FDP_CIMC_CER.1.4, FDP_CIMC_CRL.1.1, FDP_CIMC_OCSP.1.1, FDP_IFC.1, FIA_UAU.1, FIA_UID.1, FIA_USB.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_ATD.1, FMT_MOF_CIMC.3, FMT_MOF_CIMC.5, FMT_MOF_CIMC.6, FMT_MTD_CIMC.4, FMT_MTD_CIMC.5, FMT_MTD_CIMC.7, FMT_MOF.1, FMT_MTD_CIMC.6, FMT_MOF.1.1, FMT_MTD_CIMC.4.1, FMT_MTD_CIMC.5.1, FMT_MTD_CIMC.7.1, FMT_MOF_CIMC.3.1, FMT_MOF_CIMC.3.2, FMT_MOF_CIMC.3.3, FMT_MOF_CIMC.3.4, FMT_MOF_CIMC.5.1, FMT_MOF_CIMC.5.2, FMT_MOF_CIMC.5.3, FMT_MOF_CIMC.6.1, FMT_MOF_CIMC.6.2, FMT_MOF_CIMC.6.3, FMT_SMF.1, FMT_MTD.1, FMT_MSA.3, FMT_SMR.1, FPT_CIMC_TSP.1, FPT_ITC.1, FPT_ITT.1, FPT_STM.1, FPT_CIMC_TSP.1.1, FPT_CIMC_TSP.1.2, FPT_CIMC_TSP.1.3, FPT_CIMC_TSP.1.4, FPT_STM.1.1, FPT_ITC.1.1, FPT_ITT.1.1, FPT_RVM.1, FTP_ITC.1, FTP_TRP.1

Standards
FIPS 140-1, FIPS 140-14, FIPS5, PKCS#11, PKCS#12, RFC 2560, RFC 5280, RFC 5019, RFC 2650, X.509
Technical reports
BSI TR-03110

File metadata

Title Security Target for EJBCA v5.0.4
Subject Security Target for EJBCA v5.0.4
Author Pedro Borges
Creation date D:20120702225355+01'00'
Pages 66
Creator Writer
Producer OpenOffice.org 3.3

Heuristics ?

Certificate ID: ANSSI-CC-2012/47

Extracted SARs

ADV_LLD.1, ASE_CCL.1, ALC_DEL.1, ALC_CMC.4, AVA_MSU.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ASE_TSS.1, ADV_TDS.3, ADV_ARC.1, ADV_HLD.2, AVA_VAN.3, ASE_SPD.1, ASE_REQ.2, ALC_CMS.4, ADV_IMP.1, ALC_TAT.1, ATE_COV.2, AGD_OPE.1, AVA_SOF.1, ALC_DVS.1, ALC_FLR.2, ADV_RCR.1, ASE_ECD.1, AGD_USR.1, ADV_SPM.1, ADV_FSP.4, ASE_INT.1, AGD_ADM.1, AGD_PRE.1, ALC_LCD.1, ASE_OBJ.2, AVA_VLA.2

Related CVEs

ID Links Severity CVSS Score Published on
Base Exploitability Impact
CVE-2020-11626
C M N
MEDIUM 6.1 2.7 08.04.2020 00:15
CVE-2020-11627
C M N
HIGH 8.8 5.9 08.04.2020 00:15
CVE-2020-11628
C M N
MEDIUM 5.3 1.4 08.04.2020 00:15
CVE-2020-11629
C M N
HIGH 7.2 5.9 08.04.2020 00:15
CVE-2020-11630
C M N
CRITICAL 9.8 5.9 08.04.2020 00:15
CVE-2020-11631
C M N
MEDIUM 6.5 3.6 08.04.2020 00:15
CVE-2020-28942
C M N
MEDIUM 4.3 1.4 19.11.2020 17:15
CVE-2021-40086
C M N
LOW 2.2 1.4 25.08.2021 02:15
CVE-2021-40087
C M N
LOW 2.7 1.4 25.08.2021 02:15
CVE-2021-40088
C M N
MEDIUM 5.4 2.5 25.08.2021 02:15
CVE-2021-40089
C M N
LOW 2.3 1.4 25.08.2021 02:15
CVE-2022-34831
C M N
CRITICAL 9.8 5.9 14.09.2022 03:15

Scheme data ?

Product EJBCA, version 5.0.4
Url https://cyber.gouv.fr/produits-certifies/ejbca-version-504
Description Le produit certifié est l'application « EJBCA version 5.0.4 » développée par PrimeKey Solutions SA. Ce produit est une suite logicielle qui permet de mettre en oeuvre une infrastructure de gestion de clés publiques (ICP ou PKI pour Public Key Infrastructure). Il fournit une solution de gestion des certificats (demande, création, renouvellement, révocation), qu'il s'agisse des certif
Sponsor PrimeKey Solutions AB
Developer PrimeKey Solutions AB
Cert Id ANSSI-CC-2012/47
Level EAL4+
Enhanced
Cert Id ANSSI-CC-2012/47
Certification Date 04.10.2012
Category Produits pour ordinateur personnel et serveur
Cc Version Critères Communs version 3.1r3
Developer PrimeKey Solutions AB
Sponsor PrimeKey Solutions AB
Evaluation Facility Oppida
Level EAL4+
Protection Profile PP-CIMC
Mutual Recognition SOG-IS CCRA
Augmented ALC_FLR.2
Target Link https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2012-47en.pdf
Report Link https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2012-47fr.pdf

References ?

No references are available for this certificate.

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'description': 'Le produit certifié est l'application « EJBCA version 5.0.4 » développée par PrimeKey Solutions SA. Ce produit est une suite logicielle qui permet de mettre en oeuvre une infrastructure de gestion de clés publiques (ICP ou PKI pour Public Key Infrastructure). Il fournit une solution de gestion des certificats (demande, création, renouvellement, révocation), qu'il s'agisse des certif', 'cert_id': 'ANSSI-CC-2012/47', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2012/47', 'certification_date': '2012-10-04', 'mutual_recognition': 'SOG-IS CCRA'}}} data.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'EJBCA, version 5.0.4', 'url': 'https://cyber.gouv.fr/produits-certifies/ejbca-version-504', 'description': 'Le produit certifié est l'application « EJBCA version 5.0.4 » développée par PrimeKey\nSolutions SA.\nCe produit est une suite logicielle qui permet de mettre en oeuvre une infrastructure de gestion\nde clés publiques (ICP ou PKI pour Public Key Infrastructure). Il fournit une solution de gestion des certificats (demande, création, renouvellement, révocation), qu'il s'agisse des certif', 'sponsor': 'PrimeKey Solutions AB', 'developer': 'PrimeKey Solutions AB', 'cert_id': '2012/47', 'level': 'EAL4+', 'enhanced': {'cert_id': '2012/47', 'certification_date': '04/10/2012', 'category': 'Produits pour ordinateur personnel et serveur', 'cc_version': 'Critères Communs version 3.1r3', 'developer': 'PrimeKey Solutions AB', 'sponsor': 'PrimeKey Solutions AB', 'evaluation_facility': 'Oppida', 'level': 'EAL4+', 'protection_profile': 'PP-CIMC', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_FLR.2', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2012-47en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2012-47fr.pdf'}}.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '1d6118e2eaaf275999332444e95056dc75bc969a79901cd2a3ee2d49e9f72310', 'txt_hash': '8e7804464a950f0c5735ac8dccad223199c59c001a3d3b278b2b389a0c396c8b'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '235132842dfa4afd9a4b5362cd9ff8a1029a1edf290186696a244c1b58eb4838', 'txt_hash': '44f45529b6e27ccbbd9c6098e6fb9844f78ce064f089ef98096f02092d3025c4'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 166323, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 14, '/Author': '', '/CreationDate': "D:20121023153918+02'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20121023153918+02'00'", '/Producer': 'Acrobat Distiller 9.0.0 (Windows)', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 488829, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 66, '/Title': 'Security Target for EJBCA v5.0.4', '/Author': 'Pedro Borges', '/Subject': 'Security Target for EJBCA v5.0.4', '/Creator': 'Writer', '/Producer': 'OpenOffice.org 3.3', '/CreationDate': "D:20120702225355+01'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://tools.ietf.org/pdf/rfc5019.pdf', 'https://www.cesecore.eu/', 'http://checklists.nist.gov/', 'http://tools.ietf.org/pdf/rfc5280.pdf', 'http://www.ejbca.org/', 'http://tools.ietf.org/pdf/rfc2560.pdf', 'http://www.itu.int/rec/T-REC-X.509-200508-I/en']}}.
    • The report_frontpage property was set to {'FR': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2012/47': 15}, 'US': {'CCEVS-VR-01-0009': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 2, 'EAL4': 3, 'EAL 1': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E3 Elémentaire': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 2, 'AGD_PRE': 2}, 'ALC': {'ALC_FLR.2': 2, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'CESTI': {'CESTI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI TR-03110': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'X509': {'X.509': 1}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4+': 1, 'EAL4+': 1, 'EAL4': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_CAP.4': 1, 'ACM_SCP.2': 1}, 'ADO': {'ADO_DEL.2': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_ARC.1': 5, 'ADV_FSP.4': 25, 'ADV_IMP.1': 6, 'ADV_TDS.3': 18, 'ADV_FSP.2': 11, 'ADV_HLD.2': 1, 'ADV_LLD.1': 1, 'ADV_RCR.1': 1, 'ADV_SPM.1': 1, 'ADV_FSP.1': 6, 'ADV_TDS.1': 10, 'ADV_TDS.2': 2, 'ADV_FSP.3': 2}, 'AGD': {'AGD_OPE.1': 5, 'AGD_PRE.1': 6, 'AGD_ADM.1': 1, 'AGD_USR.1': 1}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC.4': 4, 'ALC_CMS.4': 4, 'ALC_DEL.1': 3, 'ALC_DVS.1': 3, 'ALC_LCD.1': 3, 'ALC_TAT.1': 5, 'ALC_CMS.1': 1}, 'ATE': {'ATE_COV.2': 6, 'ATE_DPT.1': 4, 'ATE_FUN.1': 7, 'ATE_IND.2': 2, 'ATE_COV.1': 4}, 'AVA': {'AVA_VAN.3': 3, 'AVA_MSU.2': 1, 'AVA_SOF.1': 1, 'AVA_VLA.2': 1}, 'ASE': {'ASE_CCL.1': 3, 'ASE_ECD.1': 6, 'ASE_INT.1': 5, 'ASE_OBJ.2': 4, 'ASE_REQ.2': 5, 'ASE_SPD.1': 5, 'ASE_TSS.1': 3, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 9, 'FAU_GEN.2': 4, 'FAU_SEL.1': 5, 'FAU_STG.1': 5, 'FAU_STG.4': 4, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.4.1': 1}, 'FCO': {'FCO_NRO_CIMC.3': 6, 'FCO_NRO_CIMC.4': 5, 'FCO_NRO_CIMC.3.1': 1, 'FCO_NRO_CIMC.3.2': 1, 'FCO_NRO_CIMC.3.3': 1, 'FCO_NRO_CIMC.4.1': 1, 'FCO_NRO_CIMC.4.2': 1}, 'FCS': {'FCS_CKM_CIMC.5': 5, 'FCS_CKM.1': 2, 'FCS_CKM_CIMC.5.1': 1, 'FCS_CKM.4': 1}, 'FDP': {'FDP_ACF_CIMC.2': 5, 'FDP_ACF_CIMC.3': 5, 'FDP_CIMC_BKP.1': 6, 'FDP_CIMC_BKP.2': 5, 'FDP_CIMC_CER.1': 6, 'FDP_CIMC_CRL.1': 5, 'FDP_CIMC_CSE.1': 5, 'FDP_CIMC_OCSP.1': 5, 'FDP_ETC_CIMC.5': 5, 'FDP_SDI_CIMC.3': 5, 'FDP_ACC.1': 9, 'FDP_ACF.1': 7, 'FDP_ITT.1': 5, 'FDP_UCT.1': 5, 'FDP_ETC_CIMC.4': 1, 'FDP_CIMC_BKP.1.1': 1, 'FDP_CIMC_BKP.1.2': 1, 'FDP_CIMC_BKP.1.3': 1, 'FDP_CIMC_BKP.1.4': 1, 'FDP_CIMC_BKP.2.1': 1, 'FDP_CIMC_BKP.2.2': 1, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_CIMC_CSE.1.1': 1, 'FDP_ITT.1.1': 2, 'FDP_UCT.1.1': 1, 'FDP_ACF_CIMC.2.1': 1, 'FDP_ACF_CIMC.2.2': 1, 'FDP_ACF_CIMC.3.1': 1, 'FDP_ETC_CIMC.5.1': 1, 'FDP_SDI_CIMC.3.1': 1, 'FDP_SDI_CIMC.3.2': 1, 'FDP_CIMC_CER.1.1': 1, 'FDP_CIMC_CER.1.2': 1, 'FDP_CIMC_CER.1.3': 1, 'FDP_CIMC_CER.1.4': 1, 'FDP_CIMC_CRL.1.1': 1, 'FDP_CIMC_OCSP.1.1': 1, 'FDP_IFC.1': 2}, 'FIA': {'FIA_UAU.1': 5, 'FIA_UID.1': 8, 'FIA_USB.1': 5, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_ATD.1': 1}, 'FMT': {'FMT_MOF_CIMC.3': 8, 'FMT_MOF_CIMC.5': 9, 'FMT_MOF_CIMC.6': 9, 'FMT_MTD_CIMC.4': 6, 'FMT_MTD_CIMC.5': 6, 'FMT_MTD_CIMC.7': 5, 'FMT_MOF.1': 10, 'FMT_MTD_CIMC.6': 3, 'FMT_MOF.1.1': 1, 'FMT_MTD_CIMC.4.1': 1, 'FMT_MTD_CIMC.5.1': 1, 'FMT_MTD_CIMC.7.1': 1, 'FMT_MOF_CIMC.3.1': 1, 'FMT_MOF_CIMC.3.2': 1, 'FMT_MOF_CIMC.3.3': 1, 'FMT_MOF_CIMC.3.4': 1, 'FMT_MOF_CIMC.5.1': 1, 'FMT_MOF_CIMC.5.2': 1, 'FMT_MOF_CIMC.5.3': 1, 'FMT_MOF_CIMC.6.1': 1, 'FMT_MOF_CIMC.6.2': 1, 'FMT_MOF_CIMC.6.3': 1, 'FMT_SMF.1': 2, 'FMT_MTD.1': 1, 'FMT_MSA.3': 1, 'FMT_SMR.1': 4}, 'FPT': {'FPT_CIMC_TSP.1': 6, 'FPT_ITC.1': 4, 'FPT_ITT.1': 5, 'FPT_STM.1': 6, 'FPT_CIMC_TSP.1.1': 1, 'FPT_CIMC_TSP.1.2': 1, 'FPT_CIMC_TSP.1.3': 1, 'FPT_CIMC_TSP.1.4': 1, 'FPT_STM.1.1': 1, 'FPT_ITC.1.1': 1, 'FPT_ITT.1.1': 2, 'FPT_RVM.1': 1}, 'FTP': {'FTP_ITC.1': 1, 'FTP_TRP.1': 1}}, 'cc_claims': {'O': {'O.CPS': 1}, 'A': {'A.CPS': 1}}, 'vendor': {'Cisco': {'Cisco': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 4}}, 'PACE': {'PACE': 1}, 'VPN': {'VPN': 4}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {'BSI': {'BSI TR-03110': 5}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-1': 26, 'FIPS 140-14': 1, 'FIPS5': 1}, 'PKCS': {'PKCS#11': 4, 'PKCS#12': 1}, 'RFC': {'RFC 2560': 7, 'RFC 5280': 5, 'RFC 5019': 1, 'RFC 2650': 1}, 'X509': {'X.509': 18}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to ANSSI-CC-2012_47.pdf.
    • The st_filename property was set to anssi-cible2012_47en.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2012/47.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2012_47.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible2012_47en.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}]} values discarded.
    • The scheme_data property was set to {'product': 'EJBCA, version 5.0.4', 'url': 'https://cyber.gouv.fr/produits-certifies/ejbca-version-504', 'description': 'Le produit certifié est l'application « EJBCA version 5.0.4 » développée par PrimeKey\nSolutions SA.\nCe produit est une suite logicielle qui permet de mettre en oeuvre une infrastructure de gestion\nde clés publiques (ICP ou PKI pour Public Key Infrastructure). Il fournit une solution de gestion des certificats (demande, création, renouvellement, révocation), qu'il s'agisse des certif', 'sponsor': 'PrimeKey Solutions AB', 'developer': 'PrimeKey Solutions AB', 'cert_id': '2012/47', 'level': 'EAL4+', 'enhanced': {'cert_id': '2012/47', 'certification_date': '04/10/2012', 'category': 'Produits pour ordinateur personnel et serveur', 'cc_version': 'Critères Communs version 3.1r3', 'developer': 'PrimeKey Solutions AB', 'sponsor': 'PrimeKey Solutions AB', 'evaluation_facility': 'Oppida', 'level': 'EAL4+', 'protection_profile': 'PP-CIMC', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_FLR.2', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2012-47en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2012-47fr.pdf'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name EJBCA, version 5.0.4 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Key Management Systems",
  "cert_link": null,
  "dgst": "ae6e45c6ee5a84c0",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2012/47",
    "cert_lab": null,
    "cpe_matches": {
      "_type": "Set",
      "elements": [
        "cpe:2.3:a:primekey:ejbca:5.0:*:*:*:enterprise:*:*:*",
        "cpe:2.3:a:primekey:ejbca:5.0.4:*:*:*:enterprise:*:*:*"
      ]
    },
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.0.4"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2020-11630",
        "CVE-2022-34831",
        "CVE-2020-11626",
        "CVE-2021-40088",
        "CVE-2020-28942",
        "CVE-2020-11629",
        "CVE-2021-40086",
        "CVE-2020-11627",
        "CVE-2020-11628",
        "CVE-2020-11631",
        "CVE-2021-40089",
        "CVE-2021-40087"
      ]
    },
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2012/47",
      "description": "Le produit certifi\u00e9 est l\u0026#39;application \u00ab EJBCA version 5.0.4 \u00bb d\u00e9velopp\u00e9e par PrimeKey Solutions SA. Ce produit est une suite logicielle qui permet de mettre en oeuvre une infrastructure de gestion de cl\u00e9s publiques (ICP ou PKI pour Public Key Infrastructure). Il fournit une solution de gestion des certificats (demande, cr\u00e9ation, renouvellement, r\u00e9vocation), qu\u0026#39;il s\u0026#39;agisse des certif",
      "developer": "PrimeKey Solutions AB",
      "enhanced": {
        "augmented": "ALC_FLR.2",
        "category": "Produits pour ordinateur personnel et serveur",
        "cc_version": "Crit\u00e8res Communs version 3.1r3",
        "cert_id": "ANSSI-CC-2012/47",
        "certification_date": "2012-10-04",
        "developer": "PrimeKey Solutions AB",
        "evaluation_facility": "Oppida",
        "level": "EAL4+",
        "mutual_recognition": "SOG-IS CCRA",
        "protection_profile": "PP-CIMC",
        "report_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2012-47fr.pdf",
        "sponsor": "PrimeKey Solutions AB",
        "target_link": "https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2012-47en.pdf"
      },
      "level": "EAL4+",
      "product": "EJBCA, version 5.0.4",
      "sponsor": "PrimeKey Solutions AB",
      "url": "https://cyber.gouv.fr/produits-certifies/ejbca-version-504"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "PrimeKey Solutions AB",
  "manufacturer_web": "https://www.primekey.se/",
  "name": "EJBCA, version 5.0.4",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2012-10-04",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "ANSSI-CC-2012_47.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2012/47": 15
        },
        "US": {
          "CCEVS-VR-01-0009": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 2,
          "AGD_PRE": 2
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_FLR": 2,
          "ALC_FLR.2": 2,
          "ALC_LCD": 1,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 1,
          "EAL 4": 2,
          "EAL 5": 1,
          "EAL 7": 1,
          "EAL4": 3
        },
        "ITSEC": {
          "ITSEC E3 El\u00e9mentaire": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CESTI": {
          "CESTI": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 1,
          "CCMB-2009-07-004": 1
        },
        "X509": {
          "X.509": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03110": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "D:20121023153918+02\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20121023153918+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 9.0.0 (Windows)",
      "/Title": "",
      "pdf_file_size_bytes": 166323,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 14
    },
    "st_filename": "anssi-cible2012_47en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CPS": 1
        },
        "O": {
          "O.CPS": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 1,
          "ACM_CAP.4": 1,
          "ACM_SCP.2": 1
        },
        "ADO": {
          "ADO_DEL.2": 1,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_ARC.1": 5,
          "ADV_FSP.1": 6,
          "ADV_FSP.2": 11,
          "ADV_FSP.3": 2,
          "ADV_FSP.4": 25,
          "ADV_HLD.2": 1,
          "ADV_IMP.1": 6,
          "ADV_LLD.1": 1,
          "ADV_RCR.1": 1,
          "ADV_SPM.1": 1,
          "ADV_TDS.1": 10,
          "ADV_TDS.2": 2,
          "ADV_TDS.3": 18
        },
        "AGD": {
          "AGD_ADM.1": 1,
          "AGD_OPE.1": 5,
          "AGD_PRE.1": 6,
          "AGD_USR.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 4,
          "ALC_CMS.1": 1,
          "ALC_CMS.4": 4,
          "ALC_DEL.1": 3,
          "ALC_DVS.1": 3,
          "ALC_FLR.2": 5,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 5
        },
        "ASE": {
          "ASE_CCL.1": 3,
          "ASE_ECD.1": 6,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 4,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 5,
          "ASE_SPD.1": 5,
          "ASE_TSS.1": 3
        },
        "ATE": {
          "ATE_COV.1": 4,
          "ATE_COV.2": 6,
          "ATE_DPT.1": 4,
          "ATE_FUN.1": 7,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_MSU.2": 1,
          "AVA_SOF.1": 1,
          "AVA_VAN.3": 3,
          "AVA_VLA.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4+": 1,
          "EAL4": 2,
          "EAL4 augmented": 1,
          "EAL4+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 9,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 4,
          "FAU_GEN.2.1": 1,
          "FAU_SEL.1": 5,
          "FAU_SEL.1.1": 1,
          "FAU_STG.1": 5,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.4": 4,
          "FAU_STG.4.1": 1
        },
        "FCO": {
          "FCO_NRO_CIMC.3": 6,
          "FCO_NRO_CIMC.3.1": 1,
          "FCO_NRO_CIMC.3.2": 1,
          "FCO_NRO_CIMC.3.3": 1,
          "FCO_NRO_CIMC.4": 5,
          "FCO_NRO_CIMC.4.1": 1,
          "FCO_NRO_CIMC.4.2": 1
        },
        "FCS": {
          "FCS_CKM.1": 2,
          "FCS_CKM.4": 1,
          "FCS_CKM_CIMC.5": 5,
          "FCS_CKM_CIMC.5.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 9,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 7,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_ACF_CIMC.2": 5,
          "FDP_ACF_CIMC.2.1": 1,
          "FDP_ACF_CIMC.2.2": 1,
          "FDP_ACF_CIMC.3": 5,
          "FDP_ACF_CIMC.3.1": 1,
          "FDP_CIMC_BKP.1": 6,
          "FDP_CIMC_BKP.1.1": 1,
          "FDP_CIMC_BKP.1.2": 1,
          "FDP_CIMC_BKP.1.3": 1,
          "FDP_CIMC_BKP.1.4": 1,
          "FDP_CIMC_BKP.2": 5,
          "FDP_CIMC_BKP.2.1": 1,
          "FDP_CIMC_BKP.2.2": 1,
          "FDP_CIMC_CER.1": 6,
          "FDP_CIMC_CER.1.1": 1,
          "FDP_CIMC_CER.1.2": 1,
          "FDP_CIMC_CER.1.3": 1,
          "FDP_CIMC_CER.1.4": 1,
          "FDP_CIMC_CRL.1": 5,
          "FDP_CIMC_CRL.1.1": 1,
          "FDP_CIMC_CSE.1": 5,
          "FDP_CIMC_CSE.1.1": 1,
          "FDP_CIMC_OCSP.1": 5,
          "FDP_CIMC_OCSP.1.1": 1,
          "FDP_ETC_CIMC.4": 1,
          "FDP_ETC_CIMC.5": 5,
          "FDP_ETC_CIMC.5.1": 1,
          "FDP_IFC.1": 2,
          "FDP_ITT.1": 5,
          "FDP_ITT.1.1": 2,
          "FDP_SDI_CIMC.3": 5,
          "FDP_SDI_CIMC.3.1": 1,
          "FDP_SDI_CIMC.3.2": 1,
          "FDP_UCT.1": 5,
          "FDP_UCT.1.1": 1
        },
        "FIA": {
          "FIA_ATD.1": 1,
          "FIA_UAU.1": 5,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID.1": 8,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB.1": 5,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MOF.1": 10,
          "FMT_MOF.1.1": 1,
          "FMT_MOF_CIMC.3": 8,
          "FMT_MOF_CIMC.3.1": 1,
          "FMT_MOF_CIMC.3.2": 1,
          "FMT_MOF_CIMC.3.3": 1,
          "FMT_MOF_CIMC.3.4": 1,
          "FMT_MOF_CIMC.5": 9,
          "FMT_MOF_CIMC.5.1": 1,
          "FMT_MOF_CIMC.5.2": 1,
          "FMT_MOF_CIMC.5.3": 1,
          "FMT_MOF_CIMC.6": 9,
          "FMT_MOF_CIMC.6.1": 1,
          "FMT_MOF_CIMC.6.2": 1,
          "FMT_MOF_CIMC.6.3": 1,
          "FMT_MSA.3": 1,
          "FMT_MTD.1": 1,
          "FMT_MTD_CIMC.4": 6,
          "FMT_MTD_CIMC.4.1": 1,
          "FMT_MTD_CIMC.5": 6,
          "FMT_MTD_CIMC.5.1": 1,
          "FMT_MTD_CIMC.6": 3,
          "FMT_MTD_CIMC.7": 5,
          "FMT_MTD_CIMC.7.1": 1,
          "FMT_SMF.1": 2,
          "FMT_SMR.1": 4
        },
        "FPT": {
          "FPT_CIMC_TSP.1": 6,
          "FPT_CIMC_TSP.1.1": 1,
          "FPT_CIMC_TSP.1.2": 1,
          "FPT_CIMC_TSP.1.3": 1,
          "FPT_CIMC_TSP.1.4": 1,
          "FPT_ITC.1": 4,
          "FPT_ITC.1.1": 1,
          "FPT_ITT.1": 5,
          "FPT_ITT.1.1": 2,
          "FPT_RVM.1": 1,
          "FPT_STM.1": 6,
          "FPT_STM.1.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 1,
          "FTP_TRP.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 1
        },
        "TLS": {
          "SSL": {
            "SSL": 4
          }
        },
        "VPN": {
          "VPN": 4
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 140-1": 26,
          "FIPS 140-14": 1,
          "FIPS5": 1
        },
        "PKCS": {
          "PKCS#11": 4,
          "PKCS#12": 1
        },
        "RFC": {
          "RFC 2560": 7,
          "RFC 2650": 1,
          "RFC 5019": 1,
          "RFC 5280": 5
        },
        "X509": {
          "X.509": 18
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {
        "BSI": {
          "BSI TR-03110": 5
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Pedro Borges",
      "/CreationDate": "D:20120702225355+01\u002700\u0027",
      "/Creator": "Writer",
      "/Producer": "OpenOffice.org 3.3",
      "/Subject": "Security Target for EJBCA v5.0.4",
      "/Title": "Security Target for EJBCA v5.0.4",
      "pdf_file_size_bytes": 488829,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://checklists.nist.gov/",
          "http://tools.ietf.org/pdf/rfc5019.pdf",
          "http://www.itu.int/rec/T-REC-X.509-200508-I/en",
          "http://www.ejbca.org/",
          "https://www.cesecore.eu/",
          "http://tools.ietf.org/pdf/rfc5280.pdf",
          "http://tools.ietf.org/pdf/rfc2560.pdf"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 66
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2012_47.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.2",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible2012_47en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "1d6118e2eaaf275999332444e95056dc75bc969a79901cd2a3ee2d49e9f72310",
      "txt_hash": "8e7804464a950f0c5735ac8dccad223199c59c001a3d3b278b2b389a0c396c8b"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "235132842dfa4afd9a4b5362cd9ff8a1029a1edf290186696a244c1b58eb4838",
      "txt_hash": "44f45529b6e27ccbbd9c6098e6fb9844f78ce064f089ef98096f02092d3025c4"
    }
  },
  "status": "archived"
}