NetApp DataFort FC520 v2, LKM 2.5.1

CSV information ?

Status archived
Valid from 01.04.2009
Valid until 20.07.2012
Scheme 🇺🇸 US
Manufacturer NetApp, Inc.
Category Data Protection
Security level EAL4+, ALC_FLR.1

Heuristics summary ?

Certificate ID: CCEVS-VR-VID10035-2009

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, 3DES, HMAC-SHA-256
Asymmetric Algorithms
ECDSA, DH
Protocols
SSH, TLS, IPsec
Randomness
PRNG

Vendor
Microsoft

Security level
EAL 4, EAL4
Security Assurance Requirements (SAR)
ACM_AUT.1, ALC_FLR.1, ALC_LCD.1, ALC_TAT.1, ALC_DVS.1, AVA_MSU.2
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_STG_EXP.1, FAU_STG_ENV.1, FCS_CKM, FCS_CKM.4, FCS_CKM_EXP.5, FCS_CKM_EXP.6, FCS_CKM_EXP.7, FCS_CKM_EXP.8, FCS_COP, FCS_COP_EXP.1, FCS_COP_EXP.2, FCS_COP_EXP.3, FCS_COP_EXP.4, FCS_COP_EXP.5, FDP_IFC.1, FDP_IFF.1, FIA_EAU_EXP.5, FIA_EID_EXP.1, FIA_UAU_EXP.5, FIA_UID_EXP.2, FIA_EAU_ENV.2, FIA_EID_ENV.2, FIA_UAU_ENV.5, FIA_UID_ENV.2, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FPT_FLS.1, FPT_RCV.4, FPT_RVM_EXP.1, FPT_SEP_EXP.1, FPT_STM_EXP.1, FPT_RVM_ENV.1, FPT_SEP_ENV.1, FPT_STM_ENV.1, FTP_ITC_EXP.1, FTP_ITC_ENV.1
Certificates
CCEVS-VR-VID10035-2009

Side-channel analysis
physical tampering

Standards
FIPS 140-2, FIPS 140

File metadata

Title: Validation Report
Author: James E Brosey
Creation date: D:20090326171341
Modification date: D:20090326171341
Pages: 36
Creator: Microsoft® Office Word 2007
Producer: Microsoft® Office Word 2007

Frontpage

Certificate ID: CCEVS-VR-VID10035-2009
Certified item: NetApp Decru DataFort FC520v2, LKM 2.5.1
Certification lab: US NIAP

References

No references.

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES-256, AES-, DES, 3DES, HMAC, HMAC-SHA-256, HMAC-SHA-512
Asymmetric Algorithms
ECDSA, ECC, DH, Diffie-Hellman
Hash functions
SHA-1, SHA1, SHA-256, SHA-512
Schemes
Key Exchange, Key Agreement, Key agreement
Protocols
SSH, TLS, IKE, IKEv1, IPsec
Randomness
TRNG, PRNG, RNG
Elliptic Curves
P-521
Block cipher modes
CBC

Trusted Execution Environments
SSC
Vendor
Microsoft

Security level
EAL 4, EAL4, EAL 4 augmented, EAL4 augmented
Claims
O.IFC, O.LKM
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_SPM.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2, AVA_MSU
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_STG_EXP.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_STG_EXP.1.1, FAU_STG_EXP.1.2, FAU_STG_ENV.1, FAU_STG_ENV.1.1, FAU_STG_ENV.1.2, FAU_STG_ENV.1.3, FAU_STG_ENV.1.4, FAU_STG_ENV.1.5, FAU_STG_ENV.1.6, FCS_CKM, FCS_CKM.4, FCS_CKM_EXP.5, FCS_CKM_EXP.6, FCS_CKM_EXP.7, FCS_CKM_EXP.8, FCS_COP, FCS_COP_EXP.1, FCS_COP_EXP.2, FCS_COP_EXP.3, FCS_COP_EXP.4, FCS_COP_EXP.5, FCS_CKM_EXP, FCS_CKM.4.1, FCS_CKM.1, FCS_CKM_EXP.5.1, FCS_CKM_EXP.6.1, FCS_CKM_EXP.7.1, FCS_CKM_EXP.7.2, FCS_CKM_EXP.8.1, FCS_CKM_EXP.8.2, FCS_COP_EXP.1.1, FCS_COP_EXP.2.1, FCS_COP_EXP.3.1, FCS_COP_EXP.4.1, FCS_COP_EXP.4.2, FCS_COP_EXP.5.1, FCS_COP.1, FDP_IFC.1, FDP_IFF.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.3, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FDP_ITC, FIA_EAU_EXP.5, FIA_EID_EXP.1, FIA_UAU_EXP.5, FIA_UID_EXP.2, FIA_EAU_EXP.5.1, FIA_EAU_EXP.5.2, FIA_EID_EXP.1.1, FIA_EID_EXP.1.2, FIA_UAU_EXP.5.1, FIA_UAU_EXP.5.2, FIA_UID_EXP.2.1, FIA_UID.1, FIA_EAU_ENV.2, FIA_EID_ENV.2, FIA_UAU_ENV.5, FIA_UID_ENV.2, FIA_EAU_ENV.2.1, FIA_EID_ENV.2.1, FIA_EID_ENV.2.2, FIA_UAU_ENV.5.1, FIA_UAU_ENV.5.2, FIA_UID_ENV.2.1, FIA_UAU, FIA_UID, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_FLS.1, FPT_RCV.4, FPT_RVM_EXP.1, FPT_SEP_EXP.1, FPT_STM_EXP.1, FPT_STM.1, FPT_FLS.1.1, FPT_RCV.4.1, FPT_RVM_EXP.1.1, FPT_RVM_EXP.1.2, FPT_RVM_EXP.1.3, FPT_SEP_EXP.1.1, FPT_SEP_EXP.1.2, FPT_SEP_EXP.1.3, FPT_SEP_EXP.1.4, FPT_STM_EXP.1.1, FPT_RVM_ENV.1, FPT_SEP_ENV.1, FPT_STM_ENV.1, FPT_RVM_ENV.1.1, FPT_SEP_ENV.1.1, FPT_STM_ENV.1.1, FTP_ITC_EXP.1, FTP_ITC_EXP.1.1, FTP_ITC_EXP.1.2, FTP_ITC_EXP.1.3, FTP_ITC_ENV.1, FTP_ITC_ENV.1.1, FTP_ITC_ENV.1.2

Side-channel analysis
physical tampering

Standards
FIPS 140-2, FIPS 140, FIPS 197, FIPS 186-2, FIPS 46-3, FIPS 198, FIPS 180-2, FIPS PUB 146-3, FIPS PUB 140-2, FIPS PUB 180-2, FIPS PUB 186-2, FIPS PUB 197, FIPS PUB 198, NIST SP 800-56A, RFC 2407, RFC 2408, RFC 2409, RFC 2246, RFC 4306, RFC 2104, RFC 2404, RFC 2411, RFC 2631, RFC 3602, RFC 4109, RFC 4301, RFC 4304, RFC 4305, RFC 4346

File metadata

Title: Decru DataFort FC520v2, LKM 2.5.1 Common Criteria Security Target
Subject: Subject
Keywords: Keywords
Author: Robert Sussland
Creation date: D:20090326171152
Modification date: D:20090326171152
Pages: 114
Creator: Microsoft® Office Word 2007
Producer: Microsoft® Office Word 2007

References

No references.

Heuristics ?

Certificate ID: CCEVS-VR-VID10035-2009

Extracted SARs

ADV_FSP.2, ALC_DVS.1, AGD_USR.1, ATE_FUN.1, ALC_TAT.1, ATE_DPT.1, AGD_ADM.1, ADV_HLD.2, ALC_LCD.1, ADV_LLD.1, AVA_VLA.2, AVA_MSU.2, AVA_SOF.1, ALC_FLR.1, ADV_SPM.1, ATE_IND.2, ADV_RCR.1, ADV_IMP.1, ATE_COV.2

References ?

No references are available for this certificate.

Updates ?

  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 5ba7d5cac75f34ae1e823d7796874bc97d71d008e07699016df1aa2407442cb2.
    • The st_txt_hash property was set to 3dda0ba5e7e2f1a9235421a0df1e430d257e3125653813c81c3c88d788fcbbb9.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1163139, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 114, '/Title': 'Decru DataFort FC520v2, LKM 2.5.1 Common Criteria Security Target', '/Author': 'Robert Sussland', '/Subject': 'Subject', '/Keywords': 'Keywords', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20090326171152', '/ModDate': 'D:20090326171152', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://tools.ietf.org/html/rfc2407', 'http://www.t11.org/', 'http://tools.ietf.org/html/rfc2409', 'http://www.x9.org/', 'http://www.t10.org/', 'http://csrc.nist.gov/publications/fips/index.html', 'http://csrc.nist.gov/publications/nistpubs/index.html', 'http://www.ietf.org/', 'http://tools.ietf.org/html/rfc2408']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 4, 'EAL4': 11, 'EAL 4 augmented': 1, 'EAL4 augmented': 2}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 3, 'ACM_CAP.4': 2, 'ACM_SCP.2': 2}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2}, 'ADV': {'ADV_SPM.1': 8, 'ADV_FSP.2': 2, 'ADV_HLD.2': 2, 'ADV_IMP.1': 2, 'ADV_LLD.1': 2, 'ADV_RCR.1': 2}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 2}, 'ALC': {'ALC_FLR.1': 13, 'ALC_DVS.1': 6, 'ALC_LCD.1': 6, 'ALC_TAT.1': 6}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_MSU.2': 2, 'AVA_SOF.1': 2, 'AVA_VLA.2': 3, 'AVA_MSU': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 19, 'FAU_STG_EXP.1': 12, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_STG_EXP.1.1': 1, 'FAU_STG_EXP.1.2': 1, 'FAU_STG_ENV.1': 11, 'FAU_STG_ENV.1.1': 1, 'FAU_STG_ENV.1.2': 1, 'FAU_STG_ENV.1.3': 1, 'FAU_STG_ENV.1.4': 1, 'FAU_STG_ENV.1.5': 1, 'FAU_STG_ENV.1.6': 1}, 'FCS': {'FCS_CKM': 41, 'FCS_CKM.4': 33, 'FCS_CKM_EXP.5': 12, 'FCS_CKM_EXP.6': 13, 'FCS_CKM_EXP.7': 17, 'FCS_CKM_EXP.8': 14, 'FCS_COP': 51, 'FCS_COP_EXP.1': 16, 'FCS_COP_EXP.2': 15, 'FCS_COP_EXP.3': 12, 'FCS_COP_EXP.4': 14, 'FCS_COP_EXP.5': 16, 'FCS_CKM_EXP': 1, 'FCS_CKM.4.1': 1, 'FCS_CKM.1': 3, 'FCS_CKM_EXP.5.1': 1, 'FCS_CKM_EXP.6.1': 1, 'FCS_CKM_EXP.7.1': 1, 'FCS_CKM_EXP.7.2': 1, 'FCS_CKM_EXP.8.1': 1, 'FCS_CKM_EXP.8.2': 1, 'FCS_COP_EXP.1.1': 1, 'FCS_COP_EXP.2.1': 1, 'FCS_COP_EXP.3.1': 1, 'FCS_COP_EXP.4.1': 1, 'FCS_COP_EXP.4.2': 1, 'FCS_COP_EXP.5.1': 1, 'FCS_COP.1': 2}, 'FDP': {'FDP_IFC.1': 17, 'FDP_IFF.1': 14, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 3, 'FDP_IFF.1.2': 3, 'FDP_IFF.3': 2, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_IFF.1.6': 1, 'FDP_ITC': 1}, 'FIA': {'FIA_EAU_EXP.5': 14, 'FIA_EID_EXP.1': 8, 'FIA_UAU_EXP.5': 15, 'FIA_UID_EXP.2': 8, 'FIA_EAU_EXP.5.1': 1, 'FIA_EAU_EXP.5.2': 1, 'FIA_EID_EXP.1.1': 1, 'FIA_EID_EXP.1.2': 1, 'FIA_UAU_EXP.5.1': 1, 'FIA_UAU_EXP.5.2': 1, 'FIA_UID_EXP.2.1': 1, 'FIA_UID.1': 2, 'FIA_EAU_ENV.2': 7, 'FIA_EID_ENV.2': 6, 'FIA_UAU_ENV.5': 7, 'FIA_UID_ENV.2': 6, 'FIA_EAU_ENV.2.1': 1, 'FIA_EID_ENV.2.1': 1, 'FIA_EID_ENV.2.2': 1, 'FIA_UAU_ENV.5.1': 1, 'FIA_UAU_ENV.5.2': 1, 'FIA_UID_ENV.2.1': 1, 'FIA_UAU': 1, 'FIA_UID': 1}, 'FMT': {'FMT_MOF.1': 14, 'FMT_MSA.1': 34, 'FMT_MSA.2': 25, 'FMT_MSA.3': 11, 'FMT_MTD.1': 19, 'FMT_SMF.1': 36, 'FMT_SMR.1': 13, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS.1': 8, 'FPT_RCV.4': 12, 'FPT_RVM_EXP.1': 11, 'FPT_SEP_EXP.1': 10, 'FPT_STM_EXP.1': 14, 'FPT_STM.1': 1, 'FPT_FLS.1.1': 1, 'FPT_RCV.4.1': 1, 'FPT_RVM_EXP.1.1': 1, 'FPT_RVM_EXP.1.2': 1, 'FPT_RVM_EXP.1.3': 1, 'FPT_SEP_EXP.1.1': 1, 'FPT_SEP_EXP.1.2': 1, 'FPT_SEP_EXP.1.3': 1, 'FPT_SEP_EXP.1.4': 1, 'FPT_STM_EXP.1.1': 1, 'FPT_RVM_ENV.1': 8, 'FPT_SEP_ENV.1': 7, 'FPT_STM_ENV.1': 7, 'FPT_RVM_ENV.1.1': 1, 'FPT_SEP_ENV.1.1': 1, 'FPT_STM_ENV.1.1': 1}, 'FTP': {'FTP_ITC_EXP.1': 12, 'FTP_ITC_EXP.1.1': 1, 'FTP_ITC_EXP.1.2': 1, 'FTP_ITC_EXP.1.3': 1, 'FTP_ITC_ENV.1': 8, 'FTP_ITC_ENV.1.1': 1, 'FTP_ITC_ENV.1.2': 1}}, 'cc_claims': {'O': {'O.IFC': 8, 'O.LKM': 9}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 54, 'AES-256': 4, 'AES-': 1}}, 'DES': {'DES': {'DES': 3}, '3DES': {'3DES': 34}}, 'constructions': {'MAC': {'HMAC': 13, 'HMAC-SHA-256': 9, 'HMAC-SHA-512': 3}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'DH': 16, 'Diffie-Hellman': 7}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 6, 'SHA1': 1}, 'SHA2': {'SHA-256': 7, 'SHA-512': 4}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 8}, 'KA': {'Key Agreement': 6, 'Key agreement': 1}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'TLS': {'TLS': 32}}, 'IKE': {'IKE': 2, 'IKEv1': 6}, 'IPsec': {'IPsec': 20}}, 'randomness': {'TRNG': {'TRNG': 1}, 'PRNG': {'PRNG': 20}, 'RNG': {'RNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 2}}, 'ecc_curve': {'NIST': {'P-521': 4}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SSC': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 23, 'FIPS 140': 2, 'FIPS 197': 7, 'FIPS 186-2': 8, 'FIPS 46-3': 5, 'FIPS 198': 3, 'FIPS 180-2': 2, 'FIPS PUB 146-3': 1, 'FIPS PUB 140-2': 1, 'FIPS PUB 180-2': 1, 'FIPS PUB 186-2': 1, 'FIPS PUB 197': 1, 'FIPS PUB 198': 1}, 'NIST': {'NIST SP 800-56A': 5}, 'RFC': {'RFC 2407': 1, 'RFC 2408': 1, 'RFC 2409': 2, 'RFC 2246': 3, 'RFC 4306': 1, 'RFC 2104': 1, 'RFC 2404': 1, 'RFC 2411': 1, 'RFC 2631': 1, 'RFC 3602': 1, 'RFC 4109': 1, 'RFC 4301': 1, 'RFC 4304': 1, 'RFC 4305': 1, 'RFC 4346': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to st_vid10035-st.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}]} values added.
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/st_vid10035-st.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}]} values discarded.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/st_vid10035-vr.pdf, code: nok'].
    • The st_pdf_hash property was set to 5ba7d5cac75f34ae1e823d7796874bc97d71d008e07699016df1aa2407442cb2.
    • The st_txt_hash property was set to 3dda0ba5e7e2f1a9235421a0df1e430d257e3125653813c81c3c88d788fcbbb9.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1163139, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 114, '/Title': 'Decru DataFort FC520v2, LKM 2.5.1 Common Criteria Security Target', '/Author': 'Robert Sussland', '/Subject': 'Subject', '/Keywords': 'Keywords', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20090326171152', '/ModDate': 'D:20090326171152', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.t11.org/', 'http://tools.ietf.org/html/rfc2409', 'http://csrc.nist.gov/publications/nistpubs/index.html', 'http://www.x9.org/', 'http://www.t10.org/', 'http://csrc.nist.gov/publications/fips/index.html', 'http://tools.ietf.org/html/rfc2407', 'http://www.ietf.org/', 'http://tools.ietf.org/html/rfc2408']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 4, 'EAL4': 11, 'EAL 4 augmented': 1, 'EAL4 augmented': 2}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 3, 'ACM_CAP.4': 2, 'ACM_SCP.2': 2}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2}, 'ADV': {'ADV_SPM.1': 8, 'ADV_FSP.2': 2, 'ADV_HLD.2': 2, 'ADV_IMP.1': 2, 'ADV_LLD.1': 2, 'ADV_RCR.1': 2}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 2}, 'ALC': {'ALC_FLR.1': 13, 'ALC_DVS.1': 6, 'ALC_LCD.1': 6, 'ALC_TAT.1': 6}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_MSU.2': 2, 'AVA_SOF.1': 2, 'AVA_VLA.2': 3, 'AVA_MSU': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 19, 'FAU_STG_EXP.1': 12, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_STG_EXP.1.1': 1, 'FAU_STG_EXP.1.2': 1, 'FAU_STG_ENV.1': 11, 'FAU_STG_ENV.1.1': 1, 'FAU_STG_ENV.1.2': 1, 'FAU_STG_ENV.1.3': 1, 'FAU_STG_ENV.1.4': 1, 'FAU_STG_ENV.1.5': 1, 'FAU_STG_ENV.1.6': 1}, 'FCS': {'FCS_CKM': 41, 'FCS_CKM.4': 33, 'FCS_CKM_EXP.5': 12, 'FCS_CKM_EXP.6': 13, 'FCS_CKM_EXP.7': 17, 'FCS_CKM_EXP.8': 14, 'FCS_COP': 51, 'FCS_COP_EXP.1': 16, 'FCS_COP_EXP.2': 15, 'FCS_COP_EXP.3': 12, 'FCS_COP_EXP.4': 14, 'FCS_COP_EXP.5': 16, 'FCS_CKM_EXP': 1, 'FCS_CKM.4.1': 1, 'FCS_CKM.1': 3, 'FCS_CKM_EXP.5.1': 1, 'FCS_CKM_EXP.6.1': 1, 'FCS_CKM_EXP.7.1': 1, 'FCS_CKM_EXP.7.2': 1, 'FCS_CKM_EXP.8.1': 1, 'FCS_CKM_EXP.8.2': 1, 'FCS_COP_EXP.1.1': 1, 'FCS_COP_EXP.2.1': 1, 'FCS_COP_EXP.3.1': 1, 'FCS_COP_EXP.4.1': 1, 'FCS_COP_EXP.4.2': 1, 'FCS_COP_EXP.5.1': 1, 'FCS_COP.1': 2}, 'FDP': {'FDP_IFC.1': 17, 'FDP_IFF.1': 14, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 3, 'FDP_IFF.1.2': 3, 'FDP_IFF.3': 2, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_IFF.1.6': 1, 'FDP_ITC': 1}, 'FIA': {'FIA_EAU_EXP.5': 14, 'FIA_EID_EXP.1': 8, 'FIA_UAU_EXP.5': 15, 'FIA_UID_EXP.2': 8, 'FIA_EAU_EXP.5.1': 1, 'FIA_EAU_EXP.5.2': 1, 'FIA_EID_EXP.1.1': 1, 'FIA_EID_EXP.1.2': 1, 'FIA_UAU_EXP.5.1': 1, 'FIA_UAU_EXP.5.2': 1, 'FIA_UID_EXP.2.1': 1, 'FIA_UID.1': 2, 'FIA_EAU_ENV.2': 7, 'FIA_EID_ENV.2': 6, 'FIA_UAU_ENV.5': 7, 'FIA_UID_ENV.2': 6, 'FIA_EAU_ENV.2.1': 1, 'FIA_EID_ENV.2.1': 1, 'FIA_EID_ENV.2.2': 1, 'FIA_UAU_ENV.5.1': 1, 'FIA_UAU_ENV.5.2': 1, 'FIA_UID_ENV.2.1': 1, 'FIA_UAU': 1, 'FIA_UID': 1}, 'FMT': {'FMT_MOF.1': 14, 'FMT_MSA.1': 34, 'FMT_MSA.2': 25, 'FMT_MSA.3': 11, 'FMT_MTD.1': 19, 'FMT_SMF.1': 36, 'FMT_SMR.1': 13, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS.1': 8, 'FPT_RCV.4': 12, 'FPT_RVM_EXP.1': 11, 'FPT_SEP_EXP.1': 10, 'FPT_STM_EXP.1': 14, 'FPT_STM.1': 1, 'FPT_FLS.1.1': 1, 'FPT_RCV.4.1': 1, 'FPT_RVM_EXP.1.1': 1, 'FPT_RVM_EXP.1.2': 1, 'FPT_RVM_EXP.1.3': 1, 'FPT_SEP_EXP.1.1': 1, 'FPT_SEP_EXP.1.2': 1, 'FPT_SEP_EXP.1.3': 1, 'FPT_SEP_EXP.1.4': 1, 'FPT_STM_EXP.1.1': 1, 'FPT_RVM_ENV.1': 8, 'FPT_SEP_ENV.1': 7, 'FPT_STM_ENV.1': 7, 'FPT_RVM_ENV.1.1': 1, 'FPT_SEP_ENV.1.1': 1, 'FPT_STM_ENV.1.1': 1}, 'FTP': {'FTP_ITC_EXP.1': 12, 'FTP_ITC_EXP.1.1': 1, 'FTP_ITC_EXP.1.2': 1, 'FTP_ITC_EXP.1.3': 1, 'FTP_ITC_ENV.1': 8, 'FTP_ITC_ENV.1.1': 1, 'FTP_ITC_ENV.1.2': 1}}, 'cc_claims': {'O': {'O.IFC': 8, 'O.LKM': 9}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 54, 'AES-256': 4, 'AES-': 1}}, 'DES': {'DES': {'DES': 3}, '3DES': {'3DES': 34}}, 'constructions': {'MAC': {'HMAC': 13, 'HMAC-SHA-256': 9, 'HMAC-SHA-512': 3}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'DH': 16, 'Diffie-Hellman': 7}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 6, 'SHA1': 1}, 'SHA2': {'SHA-256': 7, 'SHA-512': 4}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 8}, 'KA': {'Key Agreement': 6, 'Key agreement': 1}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'TLS': {'TLS': 32}}, 'IKE': {'IKE': 2, 'IKEv1': 6}, 'IPsec': {'IPsec': 20}}, 'randomness': {'TRNG': {'TRNG': 1}, 'PRNG': {'PRNG': 20}, 'RNG': {'RNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 2}}, 'ecc_curve': {'NIST': {'P-521': 4}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SSC': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 23, 'FIPS 140': 2, 'FIPS 197': 7, 'FIPS 186-2': 8, 'FIPS 46-3': 5, 'FIPS 198': 3, 'FIPS 180-2': 2, 'FIPS PUB 146-3': 1, 'FIPS PUB 140-2': 1, 'FIPS PUB 180-2': 1, 'FIPS PUB 186-2': 1, 'FIPS PUB 197': 1, 'FIPS PUB 198': 1}, 'NIST': {'NIST SP 800-56A': 5}, 'RFC': {'RFC 2407': 1, 'RFC 2408': 1, 'RFC 2409': 2, 'RFC 2246': 3, 'RFC 4306': 1, 'RFC 2104': 1, 'RFC 2404': 1, 'RFC 2411': 1, 'RFC 2631': 1, 'RFC 3602': 1, 'RFC 4109': 1, 'RFC 4301': 1, 'RFC 4304': 1, 'RFC 4305': 1, 'RFC 4346': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to st_vid10035-st.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/st_vid10035-st.pdf, code: 408'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}]} values discarded.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/st_vid10035-vr.pdf, code: nok'].
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 5ba7d5cac75f34ae1e823d7796874bc97d71d008e07699016df1aa2407442cb2.
    • The st_txt_hash property was set to 3dda0ba5e7e2f1a9235421a0df1e430d257e3125653813c81c3c88d788fcbbb9.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1163139, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 114, '/Title': 'Decru DataFort FC520v2, LKM 2.5.1 Common Criteria Security Target', '/Author': 'Robert Sussland', '/Subject': 'Subject', '/Keywords': 'Keywords', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20090326171152', '/ModDate': 'D:20090326171152', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.t11.org/', 'http://tools.ietf.org/html/rfc2409', 'http://csrc.nist.gov/publications/nistpubs/index.html', 'http://www.x9.org/', 'http://www.t10.org/', 'http://csrc.nist.gov/publications/fips/index.html', 'http://tools.ietf.org/html/rfc2407', 'http://www.ietf.org/', 'http://tools.ietf.org/html/rfc2408']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 4, 'EAL4': 11, 'EAL 4 augmented': 1, 'EAL4 augmented': 2}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 3, 'ACM_CAP.4': 2, 'ACM_SCP.2': 2}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2}, 'ADV': {'ADV_SPM.1': 8, 'ADV_FSP.2': 2, 'ADV_HLD.2': 2, 'ADV_IMP.1': 2, 'ADV_LLD.1': 2, 'ADV_RCR.1': 2}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 2}, 'ALC': {'ALC_FLR.1': 13, 'ALC_DVS.1': 6, 'ALC_LCD.1': 6, 'ALC_TAT.1': 6}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_MSU.2': 2, 'AVA_SOF.1': 2, 'AVA_VLA.2': 3, 'AVA_MSU': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 19, 'FAU_STG_EXP.1': 12, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_STG_EXP.1.1': 1, 'FAU_STG_EXP.1.2': 1, 'FAU_STG_ENV.1': 11, 'FAU_STG_ENV.1.1': 1, 'FAU_STG_ENV.1.2': 1, 'FAU_STG_ENV.1.3': 1, 'FAU_STG_ENV.1.4': 1, 'FAU_STG_ENV.1.5': 1, 'FAU_STG_ENV.1.6': 1}, 'FCS': {'FCS_CKM': 41, 'FCS_CKM.4': 33, 'FCS_CKM_EXP.5': 12, 'FCS_CKM_EXP.6': 13, 'FCS_CKM_EXP.7': 17, 'FCS_CKM_EXP.8': 14, 'FCS_COP': 51, 'FCS_COP_EXP.1': 16, 'FCS_COP_EXP.2': 15, 'FCS_COP_EXP.3': 12, 'FCS_COP_EXP.4': 14, 'FCS_COP_EXP.5': 16, 'FCS_CKM_EXP': 1, 'FCS_CKM.4.1': 1, 'FCS_CKM.1': 3, 'FCS_CKM_EXP.5.1': 1, 'FCS_CKM_EXP.6.1': 1, 'FCS_CKM_EXP.7.1': 1, 'FCS_CKM_EXP.7.2': 1, 'FCS_CKM_EXP.8.1': 1, 'FCS_CKM_EXP.8.2': 1, 'FCS_COP_EXP.1.1': 1, 'FCS_COP_EXP.2.1': 1, 'FCS_COP_EXP.3.1': 1, 'FCS_COP_EXP.4.1': 1, 'FCS_COP_EXP.4.2': 1, 'FCS_COP_EXP.5.1': 1, 'FCS_COP.1': 2}, 'FDP': {'FDP_IFC.1': 17, 'FDP_IFF.1': 14, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 3, 'FDP_IFF.1.2': 3, 'FDP_IFF.3': 2, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_IFF.1.6': 1, 'FDP_ITC': 1}, 'FIA': {'FIA_EAU_EXP.5': 14, 'FIA_EID_EXP.1': 8, 'FIA_UAU_EXP.5': 15, 'FIA_UID_EXP.2': 8, 'FIA_EAU_EXP.5.1': 1, 'FIA_EAU_EXP.5.2': 1, 'FIA_EID_EXP.1.1': 1, 'FIA_EID_EXP.1.2': 1, 'FIA_UAU_EXP.5.1': 1, 'FIA_UAU_EXP.5.2': 1, 'FIA_UID_EXP.2.1': 1, 'FIA_UID.1': 2, 'FIA_EAU_ENV.2': 7, 'FIA_EID_ENV.2': 6, 'FIA_UAU_ENV.5': 7, 'FIA_UID_ENV.2': 6, 'FIA_EAU_ENV.2.1': 1, 'FIA_EID_ENV.2.1': 1, 'FIA_EID_ENV.2.2': 1, 'FIA_UAU_ENV.5.1': 1, 'FIA_UAU_ENV.5.2': 1, 'FIA_UID_ENV.2.1': 1, 'FIA_UAU': 1, 'FIA_UID': 1}, 'FMT': {'FMT_MOF.1': 14, 'FMT_MSA.1': 34, 'FMT_MSA.2': 25, 'FMT_MSA.3': 11, 'FMT_MTD.1': 19, 'FMT_SMF.1': 36, 'FMT_SMR.1': 13, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS.1': 8, 'FPT_RCV.4': 12, 'FPT_RVM_EXP.1': 11, 'FPT_SEP_EXP.1': 10, 'FPT_STM_EXP.1': 14, 'FPT_STM.1': 1, 'FPT_FLS.1.1': 1, 'FPT_RCV.4.1': 1, 'FPT_RVM_EXP.1.1': 1, 'FPT_RVM_EXP.1.2': 1, 'FPT_RVM_EXP.1.3': 1, 'FPT_SEP_EXP.1.1': 1, 'FPT_SEP_EXP.1.2': 1, 'FPT_SEP_EXP.1.3': 1, 'FPT_SEP_EXP.1.4': 1, 'FPT_STM_EXP.1.1': 1, 'FPT_RVM_ENV.1': 8, 'FPT_SEP_ENV.1': 7, 'FPT_STM_ENV.1': 7, 'FPT_RVM_ENV.1.1': 1, 'FPT_SEP_ENV.1.1': 1, 'FPT_STM_ENV.1.1': 1}, 'FTP': {'FTP_ITC_EXP.1': 12, 'FTP_ITC_EXP.1.1': 1, 'FTP_ITC_EXP.1.2': 1, 'FTP_ITC_EXP.1.3': 1, 'FTP_ITC_ENV.1': 8, 'FTP_ITC_ENV.1.1': 1, 'FTP_ITC_ENV.1.2': 1}}, 'cc_claims': {'O': {'O.IFC': 8, 'O.LKM': 9}}, 'vendor': {'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 54, 'AES-256': 4, 'AES-': 1}}, 'DES': {'DES': {'DES': 3}, '3DES': {'3DES': 34}}, 'constructions': {'MAC': {'HMAC': 13, 'HMAC-SHA-256': 9, 'HMAC-SHA-512': 3}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'DH': 16, 'Diffie-Hellman': 7}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 6, 'SHA1': 1}, 'SHA2': {'SHA-256': 7, 'SHA-512': 4}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 8}, 'KA': {'Key Agreement': 6, 'Key agreement': 1}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'TLS': {'TLS': 32}}, 'IKE': {'IKE': 2, 'IKEv1': 6}, 'IPsec': {'IPsec': 20}}, 'randomness': {'TRNG': {'TRNG': 1}, 'PRNG': {'PRNG': 20}, 'RNG': {'RNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 2}}, 'ecc_curve': {'NIST': {'P-521': 4}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SSC': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 23, 'FIPS 140': 2, 'FIPS 197': 7, 'FIPS 186-2': 8, 'FIPS 46-3': 5, 'FIPS 198': 3, 'FIPS 180-2': 2, 'FIPS PUB 146-3': 1, 'FIPS PUB 140-2': 1, 'FIPS PUB 180-2': 1, 'FIPS PUB 186-2': 1, 'FIPS PUB 197': 1, 'FIPS PUB 198': 1}, 'NIST': {'NIST SP 800-56A': 5}, 'RFC': {'RFC 2407': 1, 'RFC 2408': 1, 'RFC 2409': 2, 'RFC 2246': 3, 'RFC 4306': 1, 'RFC 2104': 1, 'RFC 2404': 1, 'RFC 2411': 1, 'RFC 2631': 1, 'RFC 3602': 1, 'RFC 4109': 1, 'RFC 4301': 1, 'RFC 4304': 1, 'RFC 4305': 1, 'RFC 4346': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to st_vid10035-st.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}]} values added.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/st_vid10035-st.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}]} values discarded.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'st_vid10035-vr.pdf', 'st_filename': 'st_vid10035-st.pdf'}.
    • The report_keywords property was updated, with the {'cc_sfr': {'__update__': {'FCS': {'__insert__': {'FCS_CKM': 3, 'FCS_COP': 3}}}}, 'vendor': {'__delete__': ['STMicroelectronics']}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 7}}}}, 'DES': {'__update__': {'3DES': {'__update__': {'3DES': 2}}}, '__delete__': ['DES']}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__update__': {'DH': {'__update__': {'DH': 1}}}, '__delete__': ['DSA']}}}, 'hash_function': {}, 'crypto_protocol': {'__update__': {'IPsec': {'__update__': {'IPsec': 6}}}}, 'randomness': {'__delete__': ['RNG']}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'AVA': {'__insert__': {'AVA_MSU': 1}, '__update__': {'AVA_VLA.2': 3}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_STG_EXP.1': 12}}, 'FCS': {'__insert__': {'FCS_COP': 51, 'FCS_CKM_EXP': 1}, '__update__': {'FCS_CKM_EXP.5': 12, 'FCS_CKM_EXP.6': 13, 'FCS_CKM_EXP.7': 17, 'FCS_CKM_EXP.8': 14, 'FCS_COP_EXP.2': 15, 'FCS_COP_EXP.4': 14, 'FCS_CKM': 41}}, 'FDP': {'__update__': {'FDP_IFF.1': 14, 'FDP_IFF.1.1': 3, 'FDP_IFF.1.2': 3}}, 'FIA': {'__update__': {'FIA_EAU_EXP.5': 14, 'FIA_EID_EXP.1': 8, 'FIA_UID_EXP.2': 8, 'FIA_EID_ENV.2': 6, 'FIA_UID_ENV.2': 6}}, 'FMT': {'__update__': {'FMT_MOF.1': 14, 'FMT_MSA.1': 34, 'FMT_MSA.3': 11, 'FMT_MTD.1': 19, 'FMT_SMF.1': 36, 'FMT_SMR.1': 13}}, 'FPT': {'__update__': {'FPT_FLS.1': 8, 'FPT_SEP_EXP.1': 10, 'FPT_SEP_ENV.1': 7, 'FPT_STM_ENV.1': 7}}}}, 'cc_claims': {'__delete__': ['D', 'T', 'R', 'OE']}, 'vendor': {'__delete__': ['STMicroelectronics']}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 54, 'AES-256': 4}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 3}}, '3DES': {'__update__': {'3DES': 34}}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'HMAC-SHA-512': 3}}}}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__update__': {'DH': {'__update__': {'DH': 16, 'Diffie-Hellman': 7}}}, '__delete__': ['DSA']}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA1': {'__update__': {'SHA-1': 6}}, 'SHA2': {'__update__': {'SHA-256': 7, 'SHA-512': 4}}}}}}, 'crypto_scheme': {'__update__': {'KEX': {'__update__': {'Key Exchange': 8}}}, '__delete__': ['MAC']}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'TLS': {'__update__': {'TLS': 32}}}}, 'IKE': {'__update__': {'IKEv1': 6}}, 'IPsec': {'__update__': {'IPsec': 20}}}}, 'randomness': {'__update__': {'RNG': {'__update__': {'RNG': 1}}}}, 'cipher_mode': {'__update__': {'CBC': {'__update__': {'CBC': 2}}}}, 'tee_name': {'__update__': {'IBM': {'__delete__': ['SE']}}}, 'standard_id': {'__update__': {'FIPS': {'__update__': {'FIPS 140-2': 23, 'FIPS 197': 7, 'FIPS 186-2': 8, 'FIPS 198': 3, 'FIPS 180-2': 2}}, 'NIST': {'__update__': {'NIST SP 800-56A': 5}}, 'RFC': {'__insert__': {'RFC 4306': 1}, '__update__': {'RFC 4346': 1}}}}} data.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.t11.org/', 'http://csrc.nist.gov/publications/nistpubs/index.html', 'http://tools.ietf.org/html/rfc2409', 'http://www.x9.org/', 'http://www.t10.org/', 'http://csrc.nist.gov/publications/fips/index.html', 'http://tools.ietf.org/html/rfc2407', 'http://www.ietf.org/', 'http://tools.ietf.org/html/rfc2408']}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'US': {'CCEVS-VR-VID10035-2009': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 3, 'EAL4': 16}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1}, 'ALC': {'ALC_FLR.1': 4, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1, 'ALC_DVS.1': 1}, 'AVA': {'AVA_MSU.2': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 1, 'FAU_STG_EXP.1': 1, 'FAU_STG_ENV.1': 1}, 'FCS': {'FCS_CKM.4': 1, 'FCS_CKM_EXP.5': 1, 'FCS_CKM_EXP.6': 1, 'FCS_CKM_EXP.7': 1, 'FCS_CKM_EXP.8': 1, 'FCS_COP_EXP.1': 1, 'FCS_COP_EXP.2': 1, 'FCS_COP_EXP.3': 1, 'FCS_COP_EXP.4': 1, 'FCS_COP_EXP.5': 1}, 'FDP': {'FDP_IFC.1': 1, 'FDP_IFF.1': 2}, 'FIA': {'FIA_EAU_EXP.5': 1, 'FIA_EID_EXP.1': 1, 'FIA_UAU_EXP.5': 1, 'FIA_UID_EXP.2': 1, 'FIA_EAU_ENV.2': 1, 'FIA_EID_ENV.2': 1, 'FIA_UAU_ENV.5': 1, 'FIA_UID_ENV.2': 1}, 'FMT': {'FMT_MOF.1': 1, 'FMT_MSA.1': 1, 'FMT_MSA.2': 1, 'FMT_MSA.3': 1, 'FMT_MTD.1': 1, 'FMT_SMF.1': 1, 'FMT_SMR.1': 1}, 'FPT': {'FPT_FLS.1': 1, 'FPT_RCV.4': 1, 'FPT_RVM_EXP.1': 1, 'FPT_SEP_EXP.1': 1, 'FPT_STM_EXP.1': 1, 'FPT_RVM_ENV.1': 1, 'FPT_SEP_ENV.1': 1, 'FPT_STM_ENV.1': 1}, 'FTP': {'FTP_ITC_EXP.1': 2, 'FTP_ITC_ENV.1': 1}}, 'cc_claims': {}, 'vendor': {'STMicroelectronics': {'STM': 2}, 'Microsoft': {'Microsoft': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 8}}, 'DES': {'DES': {'DES': 4}, '3DES': {'3DES': 4}}, 'constructions': {'MAC': {'HMAC-SHA-256': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 2}}, 'FF': {'DH': {'DH': 9}, 'DSA': {'DSA': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 1}, 'TLS': {'TLS': {'TLS': 4}}, 'IPsec': {'IPsec': 4}}, 'randomness': {'PRNG': {'PRNG': 1}, 'RNG': {'RNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 14, 'FIPS 140': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 4, 'EAL4': 11, 'EAL 4 augmented': 1, 'EAL4 augmented': 2}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 3, 'ACM_CAP.4': 2, 'ACM_SCP.2': 2}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2}, 'ADV': {'ADV_SPM.1': 8, 'ADV_FSP.2': 2, 'ADV_HLD.2': 2, 'ADV_IMP.1': 2, 'ADV_LLD.1': 2, 'ADV_RCR.1': 2}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 2}, 'ALC': {'ALC_FLR.1': 13, 'ALC_DVS.1': 6, 'ALC_LCD.1': 6, 'ALC_TAT.1': 6}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_MSU.2': 2, 'AVA_SOF.1': 2, 'AVA_VLA.2': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 19, 'FAU_STG_EXP.1': 13, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_STG_EXP.1.1': 1, 'FAU_STG_EXP.1.2': 1, 'FAU_STG_ENV.1': 11, 'FAU_STG_ENV.1.1': 1, 'FAU_STG_ENV.1.2': 1, 'FAU_STG_ENV.1.3': 1, 'FAU_STG_ENV.1.4': 1, 'FAU_STG_ENV.1.5': 1, 'FAU_STG_ENV.1.6': 1}, 'FCS': {'FCS_CKM.4': 33, 'FCS_CKM_EXP.5': 13, 'FCS_CKM_EXP.6': 15, 'FCS_CKM_EXP.7': 18, 'FCS_CKM_EXP.8': 16, 'FCS_COP_EXP.1': 16, 'FCS_COP_EXP.2': 16, 'FCS_COP_EXP.3': 12, 'FCS_COP_EXP.4': 16, 'FCS_COP_EXP.5': 16, 'FCS_CKM.4.1': 1, 'FCS_CKM.1': 3, 'FCS_CKM_EXP.5.1': 1, 'FCS_CKM_EXP.6.1': 1, 'FCS_CKM_EXP.7.1': 1, 'FCS_CKM_EXP.7.2': 1, 'FCS_CKM_EXP.8.1': 1, 'FCS_CKM_EXP.8.2': 1, 'FCS_COP_EXP.1.1': 1, 'FCS_COP_EXP.2.1': 1, 'FCS_COP_EXP.3.1': 1, 'FCS_COP_EXP.4.1': 1, 'FCS_COP_EXP.4.2': 1, 'FCS_COP_EXP.5.1': 1, 'FCS_COP.1': 2, 'FCS_CKM': 2}, 'FDP': {'FDP_IFC.1': 17, 'FDP_IFF.1': 15, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 2, 'FDP_IFF.1.2': 1, 'FDP_IFF.3': 2, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_IFF.1.6': 1, 'FDP_ITC': 1}, 'FIA': {'FIA_EAU_EXP.5': 13, 'FIA_EID_EXP.1': 10, 'FIA_UAU_EXP.5': 15, 'FIA_UID_EXP.2': 10, 'FIA_EAU_EXP.5.1': 1, 'FIA_EAU_EXP.5.2': 1, 'FIA_EID_EXP.1.1': 1, 'FIA_EID_EXP.1.2': 1, 'FIA_UAU_EXP.5.1': 1, 'FIA_UAU_EXP.5.2': 1, 'FIA_UID_EXP.2.1': 1, 'FIA_UID.1': 2, 'FIA_EAU_ENV.2': 7, 'FIA_EID_ENV.2': 7, 'FIA_UAU_ENV.5': 7, 'FIA_UID_ENV.2': 7, 'FIA_EAU_ENV.2.1': 1, 'FIA_EID_ENV.2.1': 1, 'FIA_EID_ENV.2.2': 1, 'FIA_UAU_ENV.5.1': 1, 'FIA_UAU_ENV.5.2': 1, 'FIA_UID_ENV.2.1': 1, 'FIA_UAU': 1, 'FIA_UID': 1}, 'FMT': {'FMT_MOF.1': 15, 'FMT_MSA.1': 35, 'FMT_MSA.2': 25, 'FMT_MSA.3': 12, 'FMT_MTD.1': 37, 'FMT_SMF.1': 41, 'FMT_SMR.1': 19, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS.1': 9, 'FPT_RCV.4': 12, 'FPT_RVM_EXP.1': 11, 'FPT_SEP_EXP.1': 11, 'FPT_STM_EXP.1': 14, 'FPT_STM.1': 1, 'FPT_FLS.1.1': 1, 'FPT_RCV.4.1': 1, 'FPT_RVM_EXP.1.1': 1, 'FPT_RVM_EXP.1.2': 1, 'FPT_RVM_EXP.1.3': 1, 'FPT_SEP_EXP.1.1': 1, 'FPT_SEP_EXP.1.2': 1, 'FPT_SEP_EXP.1.3': 1, 'FPT_SEP_EXP.1.4': 1, 'FPT_STM_EXP.1.1': 1, 'FPT_RVM_ENV.1': 8, 'FPT_SEP_ENV.1': 8, 'FPT_STM_ENV.1': 8, 'FPT_RVM_ENV.1.1': 1, 'FPT_SEP_ENV.1.1': 1, 'FPT_STM_ENV.1.1': 1}, 'FTP': {'FTP_ITC_EXP.1': 12, 'FTP_ITC_EXP.1.1': 1, 'FTP_ITC_EXP.1.2': 1, 'FTP_ITC_EXP.1.3': 1, 'FTP_ITC_ENV.1': 8, 'FTP_ITC_ENV.1.1': 1, 'FTP_ITC_ENV.1.2': 1}}, 'cc_claims': {'D': {'D': 4}, 'O': {'O.IFC': 8, 'O.LKM': 9}, 'T': {'T': 3}, 'R': {'R': 2}, 'OE': {'OE': 4}}, 'vendor': {'STMicroelectronics': {'STM': 25}, 'Microsoft': {'Microsoft': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 91, 'AES-256': 2, 'AES-': 1}}, 'DES': {'DES': {'DES': 57}, '3DES': {'3DES': 54}}, 'constructions': {'MAC': {'HMAC': 13, 'HMAC-SHA-256': 9, 'HMAC-SHA-512': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'DH': 44, 'Diffie-Hellman': 11}, 'DSA': {'DSA': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 8, 'SHA1': 1}, 'SHA2': {'SHA-256': 16, 'SHA-512': 6}}}, 'crypto_scheme': {'MAC': {'MAC': 13}, 'KEX': {'Key Exchange': 7}, 'KA': {'Key Agreement': 6, 'Key agreement': 1}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'TLS': {'TLS': 33}}, 'IKE': {'IKE': 2, 'IKEv1': 5}, 'IPsec': {'IPsec': 18}}, 'randomness': {'TRNG': {'TRNG': 1}, 'PRNG': {'PRNG': 20}, 'RNG': {'RNG': 22}}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {'NIST': {'P-521': 4}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SSC': 1, 'SE': 4}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 20, 'FIPS 140': 2, 'FIPS 197': 6, 'FIPS 186-2': 7, 'FIPS 46-3': 5, 'FIPS 198': 2, 'FIPS 180-2': 1, 'FIPS PUB 146-3': 1, 'FIPS PUB 140-2': 1, 'FIPS PUB 180-2': 1, 'FIPS PUB 186-2': 1, 'FIPS PUB 197': 1, 'FIPS PUB 198': 1}, 'NIST': {'NIST SP 800-56A': 1}, 'RFC': {'RFC 2407': 1, 'RFC 2408': 1, 'RFC 2409': 2, 'RFC 2246': 3, 'RFC 4346': 2, 'RFC 2104': 1, 'RFC 2404': 1, 'RFC 2411': 1, 'RFC 2631': 1, 'RFC 3602': 1, 'RFC 4109': 1, 'RFC 4301': 1, 'RFC 4304': 1, 'RFC 4305': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_SCP', 'level': 2}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 4}, {'_type': 'SAR', 'family': 'ACM_AUT', 'level': 1}]} values discarded.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'f9cda13c2ebdf798c5bc8695279e6300fe7ea8aeca6f521a30c1a160829b9ffc', 'st_pdf_hash': '5ba7d5cac75f34ae1e823d7796874bc97d71d008e07699016df1aa2407442cb2', 'report_txt_hash': '93c2169e056600391ac4a9c8f2cb83ae4fa3aa14c8b22aadd4bbbf98de69ef9d', 'st_txt_hash': '3dda0ba5e7e2f1a9235421a0df1e430d257e3125653813c81c3c88d788fcbbb9'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 8, '3DES': 4, 'HMAC-SHA-256': 1}, 'rules_asymmetric_crypto': {'ECDSA': 2, 'DH': 9, 'DSA': 2}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-256': 1}, 'rules_crypto_schemes': {'TLS': 4}, 'rules_randomness': {'PRNG': 1, 'RNG': 1}, 'rules_tee': {}, 'rules_side_channels': {'physical tampering': 1}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 91, 'AES-256': 2, 'AES-': 1, '3DES': 54, 'DES': 3, 'HMAC': 13, 'HMAC-SHA-256': 9, 'HMAC-SHA-512': 2}, 'rules_asymmetric_crypto': {'ECDSA': 1, 'ECC': 1, 'DH': 44, 'Diffie-Hellman': 8, 'DSA': 2}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 8, 'SHA1': 1, 'SHA-256': 16, 'SHA-512': 6}, 'rules_crypto_schemes': {'MAC': 13, 'Key Exchange': 7, 'TLS': 33}, 'rules_randomness': {'PRNG': 20, 'TRNG': 1, 'RNG': 22}, 'rules_tee': {'SSC': 1, 'SE': 4}, 'rules_side_channels': {'physical tampering': 2}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_SCP', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_AUT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_LLD', 'level': 1}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The cert_lab property was set to ['US'].
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {'cert_id': 'CCEVS-VR-VID10035-2009', 'cert_item': 'NetApp Decru DataFort FC520v2, LKM 2.5.1', 'cert_lab': 'US NIAP'}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['2.5.1']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name NetApp DataFort FC520 v2, LKM 2.5.1 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Data Protection",
  "cert_link": null,
  "dgst": "1238ef850871c077",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "cert_id": "CCEVS-VR-VID10035-2009",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.5.1"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "NetApp, Inc.",
  "manufacturer_web": "https://www.netapp.com/",
  "name": "NetApp DataFort FC520 v2, LKM 2.5.1",
  "not_valid_after": "2012-07-20",
  "not_valid_before": "2009-04-01",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "report_filename": "st_vid10035-vr.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {
        "cert_id": "CCEVS-VR-VID10035-2009",
        "cert_item": "NetApp Decru DataFort FC520v2, LKM 2.5.1",
        "cert_lab": "US NIAP"
      },
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDSA": {
            "ECDSA": 2
          }
        },
        "FF": {
          "DH": {
            "DH": 1
          }
        }
      },
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID10035-2009": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 1
        },
        "ALC": {
          "ALC_DVS.1": 1,
          "ALC_FLR.1": 4,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "AVA": {
          "AVA_MSU.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 3,
          "EAL4": 16
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 1,
          "FAU_STG_ENV.1": 1,
          "FAU_STG_EXP.1": 1
        },
        "FCS": {
          "FCS_CKM": 3,
          "FCS_CKM.4": 1,
          "FCS_CKM_EXP.5": 1,
          "FCS_CKM_EXP.6": 1,
          "FCS_CKM_EXP.7": 1,
          "FCS_CKM_EXP.8": 1,
          "FCS_COP": 3,
          "FCS_COP_EXP.1": 1,
          "FCS_COP_EXP.2": 1,
          "FCS_COP_EXP.3": 1,
          "FCS_COP_EXP.4": 1,
          "FCS_COP_EXP.5": 1
        },
        "FDP": {
          "FDP_IFC.1": 1,
          "FDP_IFF.1": 2
        },
        "FIA": {
          "FIA_EAU_ENV.2": 1,
          "FIA_EAU_EXP.5": 1,
          "FIA_EID_ENV.2": 1,
          "FIA_EID_EXP.1": 1,
          "FIA_UAU_ENV.5": 1,
          "FIA_UAU_EXP.5": 1,
          "FIA_UID_ENV.2": 1,
          "FIA_UID_EXP.2": 1
        },
        "FMT": {
          "FMT_MOF.1": 1,
          "FMT_MSA.1": 1,
          "FMT_MSA.2": 1,
          "FMT_MSA.3": 1,
          "FMT_MTD.1": 1,
          "FMT_SMF.1": 1,
          "FMT_SMR.1": 1
        },
        "FPT": {
          "FPT_FLS.1": 1,
          "FPT_RCV.4": 1,
          "FPT_RVM_ENV.1": 1,
          "FPT_RVM_EXP.1": 1,
          "FPT_SEP_ENV.1": 1,
          "FPT_SEP_EXP.1": 1,
          "FPT_STM_ENV.1": 1,
          "FPT_STM_EXP.1": 1
        },
        "FTP": {
          "FTP_ITC_ENV.1": 1,
          "FTP_ITC_EXP.1": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 6
        },
        "SSH": {
          "SSH": 1
        },
        "TLS": {
          "TLS": {
            "TLS": 4
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140": 3,
          "FIPS 140-2": 14
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 7
          }
        },
        "DES": {
          "3DES": {
            "3DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "HMAC-SHA-256": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 2
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "James E Brosey",
      "/CreationDate": "D:20090326171341",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20090326171341",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Title": "Validation Report",
      "pdf_file_size_bytes": 443011,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 36
    },
    "st_filename": "st_vid10035-st.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDSA": {
            "ECDSA": 1
          }
        },
        "FF": {
          "DH": {
            "DH": 16,
            "Diffie-Hellman": 7
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.IFC": 8,
          "O.LKM": 9
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 3,
          "ACM_CAP.4": 2,
          "ACM_SCP.2": 2
        },
        "ADO": {
          "ADO_DEL.2": 2,
          "ADO_IGS.1": 2
        },
        "ADV": {
          "ADV_FSP.2": 2,
          "ADV_HLD.2": 2,
          "ADV_IMP.1": 2,
          "ADV_LLD.1": 2,
          "ADV_RCR.1": 2,
          "ADV_SPM.1": 8
        },
        "AGD": {
          "AGD_ADM.1": 2,
          "AGD_USR.1": 2
        },
        "ALC": {
          "ALC_DVS.1": 6,
          "ALC_FLR.1": 13,
          "ALC_LCD.1": 6,
          "ALC_TAT.1": 6
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_MSU": 1,
          "AVA_MSU.2": 2,
          "AVA_SOF.1": 2,
          "AVA_VLA.2": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 4,
          "EAL 4 augmented": 1,
          "EAL4": 11,
          "EAL4 augmented": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 19,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_STG_ENV.1": 11,
          "FAU_STG_ENV.1.1": 1,
          "FAU_STG_ENV.1.2": 1,
          "FAU_STG_ENV.1.3": 1,
          "FAU_STG_ENV.1.4": 1,
          "FAU_STG_ENV.1.5": 1,
          "FAU_STG_ENV.1.6": 1,
          "FAU_STG_EXP.1": 12,
          "FAU_STG_EXP.1.1": 1,
          "FAU_STG_EXP.1.2": 1
        },
        "FCS": {
          "FCS_CKM": 41,
          "FCS_CKM.1": 3,
          "FCS_CKM.4": 33,
          "FCS_CKM.4.1": 1,
          "FCS_CKM_EXP": 1,
          "FCS_CKM_EXP.5": 12,
          "FCS_CKM_EXP.5.1": 1,
          "FCS_CKM_EXP.6": 13,
          "FCS_CKM_EXP.6.1": 1,
          "FCS_CKM_EXP.7": 17,
          "FCS_CKM_EXP.7.1": 1,
          "FCS_CKM_EXP.7.2": 1,
          "FCS_CKM_EXP.8": 14,
          "FCS_CKM_EXP.8.1": 1,
          "FCS_CKM_EXP.8.2": 1,
          "FCS_COP": 51,
          "FCS_COP.1": 2,
          "FCS_COP_EXP.1": 16,
          "FCS_COP_EXP.1.1": 1,
          "FCS_COP_EXP.2": 15,
          "FCS_COP_EXP.2.1": 1,
          "FCS_COP_EXP.3": 12,
          "FCS_COP_EXP.3.1": 1,
          "FCS_COP_EXP.4": 14,
          "FCS_COP_EXP.4.1": 1,
          "FCS_COP_EXP.4.2": 1,
          "FCS_COP_EXP.5": 16,
          "FCS_COP_EXP.5.1": 1
        },
        "FDP": {
          "FDP_IFC.1": 17,
          "FDP_IFC.1.1": 1,
          "FDP_IFF.1": 14,
          "FDP_IFF.1.1": 3,
          "FDP_IFF.1.2": 3,
          "FDP_IFF.1.3": 1,
          "FDP_IFF.1.4": 1,
          "FDP_IFF.1.5": 1,
          "FDP_IFF.1.6": 1,
          "FDP_IFF.3": 2,
          "FDP_ITC": 1
        },
        "FIA": {
          "FIA_EAU_ENV.2": 7,
          "FIA_EAU_ENV.2.1": 1,
          "FIA_EAU_EXP.5": 14,
          "FIA_EAU_EXP.5.1": 1,
          "FIA_EAU_EXP.5.2": 1,
          "FIA_EID_ENV.2": 6,
          "FIA_EID_ENV.2.1": 1,
          "FIA_EID_ENV.2.2": 1,
          "FIA_EID_EXP.1": 8,
          "FIA_EID_EXP.1.1": 1,
          "FIA_EID_EXP.1.2": 1,
          "FIA_UAU": 1,
          "FIA_UAU_ENV.5": 7,
          "FIA_UAU_ENV.5.1": 1,
          "FIA_UAU_ENV.5.2": 1,
          "FIA_UAU_EXP.5": 15,
          "FIA_UAU_EXP.5.1": 1,
          "FIA_UAU_EXP.5.2": 1,
          "FIA_UID": 1,
          "FIA_UID.1": 2,
          "FIA_UID_ENV.2": 6,
          "FIA_UID_ENV.2.1": 1,
          "FIA_UID_EXP.2": 8,
          "FIA_UID_EXP.2.1": 1
        },
        "FMT": {
          "FMT_MOF.1": 14,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 34,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.2": 25,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 11,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 19,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 36,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 13,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS.1": 8,
          "FPT_FLS.1.1": 1,
          "FPT_RCV.4": 12,
          "FPT_RCV.4.1": 1,
          "FPT_RVM_ENV.1": 8,
          "FPT_RVM_ENV.1.1": 1,
          "FPT_RVM_EXP.1": 11,
          "FPT_RVM_EXP.1.1": 1,
          "FPT_RVM_EXP.1.2": 1,
          "FPT_RVM_EXP.1.3": 1,
          "FPT_SEP_ENV.1": 7,
          "FPT_SEP_ENV.1.1": 1,
          "FPT_SEP_EXP.1": 10,
          "FPT_SEP_EXP.1.1": 1,
          "FPT_SEP_EXP.1.2": 1,
          "FPT_SEP_EXP.1.3": 1,
          "FPT_SEP_EXP.1.4": 1,
          "FPT_STM.1": 1,
          "FPT_STM_ENV.1": 7,
          "FPT_STM_ENV.1.1": 1,
          "FPT_STM_EXP.1": 14,
          "FPT_STM_EXP.1.1": 1
        },
        "FTP": {
          "FTP_ITC_ENV.1": 8,
          "FTP_ITC_ENV.1.1": 1,
          "FTP_ITC_ENV.1.2": 1,
          "FTP_ITC_EXP.1": 12,
          "FTP_ITC_EXP.1.1": 1,
          "FTP_ITC_EXP.1.2": 1,
          "FTP_ITC_EXP.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 2,
          "IKEv1": 6
        },
        "IPsec": {
          "IPsec": 20
        },
        "SSH": {
          "SSH": 2
        },
        "TLS": {
          "TLS": {
            "TLS": 32
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 6,
          "Key agreement": 1
        },
        "KEX": {
          "Key Exchange": 8
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-521": 4
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 6,
            "SHA1": 1
          },
          "SHA2": {
            "SHA-256": 7,
            "SHA-512": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 20
        },
        "RNG": {
          "RNG": 1
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 2
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140": 2,
          "FIPS 140-2": 23,
          "FIPS 180-2": 2,
          "FIPS 186-2": 8,
          "FIPS 197": 7,
          "FIPS 198": 3,
          "FIPS 46-3": 5,
          "FIPS PUB 140-2": 1,
          "FIPS PUB 146-3": 1,
          "FIPS PUB 180-2": 1,
          "FIPS PUB 186-2": 1,
          "FIPS PUB 197": 1,
          "FIPS PUB 198": 1
        },
        "NIST": {
          "NIST SP 800-56A": 5
        },
        "RFC": {
          "RFC 2104": 1,
          "RFC 2246": 3,
          "RFC 2404": 1,
          "RFC 2407": 1,
          "RFC 2408": 1,
          "RFC 2409": 2,
          "RFC 2411": 1,
          "RFC 2631": 1,
          "RFC 3602": 1,
          "RFC 4109": 1,
          "RFC 4301": 1,
          "RFC 4304": 1,
          "RFC 4305": 1,
          "RFC 4306": 1,
          "RFC 4346": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 54,
            "AES-": 1,
            "AES-256": 4
          }
        },
        "DES": {
          "3DES": {
            "3DES": 34
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 13,
            "HMAC-SHA-256": 9,
            "HMAC-SHA-512": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SSC": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Robert Sussland",
      "/CreationDate": "D:20090326171152",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/Keywords": "Keywords",
      "/ModDate": "D:20090326171152",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Subject": "Subject",
      "/Title": "Decru DataFort FC520v2, LKM 2.5.1 Common Criteria Security Target",
      "pdf_file_size_bytes": 1163139,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://tools.ietf.org/html/rfc2407",
          "http://www.t10.org/",
          "http://www.x9.org/",
          "http://csrc.nist.gov/publications/fips/index.html",
          "http://tools.ietf.org/html/rfc2408",
          "http://www.ietf.org/",
          "http://www.t11.org/",
          "http://tools.ietf.org/html/rfc2409",
          "http://csrc.nist.gov/publications/nistpubs/index.html"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 114
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid10035-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_FLR.1"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid10035-st.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "f9cda13c2ebdf798c5bc8695279e6300fe7ea8aeca6f521a30c1a160829b9ffc",
    "report_txt_hash": "93c2169e056600391ac4a9c8f2cb83ae4fa3aa14c8b22aadd4bbbf98de69ef9d",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "5ba7d5cac75f34ae1e823d7796874bc97d71d008e07699016df1aa2407442cb2",
    "st_txt_hash": "3dda0ba5e7e2f1a9235421a0df1e430d257e3125653813c81c3c88d788fcbbb9"
  },
  "status": "archived"
}