Logiciel Mistral Gateway IPSec version 9.0.7.2

CSV information ?

Status active
Valid from 28.06.2021
Valid until 28.06.2026
Scheme 🇫🇷 FR
Manufacturer Thalès Communications
Category Network and Network-Related Devices and Systems
Security level EAL3+, ALC_FLR.3, AVA_VAN.3

Heuristics summary ?

Certificate ID: ANSSI-CC-2021/32

Certificate ?

Extracted keywords

Protocols
IPsec

Security level
EAL 3, EAL2, EAL3
Security Assurance Requirements (SAR)
ALC_FLR.3, AVA_VAN.3
Certificates
ANSSI-CC-2021/32
Evaluation facilities
OPPIDA

File metadata

Creation date: D:20210720171317+02'00'
Modification date: D:20210720171317+02'00'
Pages: 2
Creator: PScript5.dll Version 5.2.2
Producer: Acrobat Distiller 11.0 (Windows)

Certification report ?

Extracted keywords

Symmetric Algorithms
DES
Protocols
TLS

Security level
EAL 3, EAL2, EAL3, EAL4, EAL 1, EAL 5, EAL 7, ITSEC E3 Elémentaire
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_FLR.3, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.3, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Certificates
ANSSI-CC-2021/32
Evaluation facilities
OPPIDA

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Creation date: D:20210720171215+02'00'
Modification date: D:20210720171215+02'00'
Pages: 13
Creator: PScript5.dll Version 5.2.2
Producer: Acrobat Distiller 11.0 (Windows)

References

No references.

Security target ?

Extracted keywords

Symmetric Algorithms
AES, HMAC, HMAC-SHA-256, HMAC-SHA-384
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DH
Hash functions
SHA-256, SHA-384, SHA256
Schemes
MAC, Key Exchange
Protocols
SSH, SSL, SSL 2.0, SSL 3.0, SSL2.0, TLS, TLS 1.2, TLS 1.1, TLS 1.0, DTLS, IKE, IKEv2, IKEv1, IPsec, VPN
Randomness
RBG
Elliptic Curves
curve P-256, P-256, secp256r1, secp384r1, secp521r1
Block cipher modes
CBC, CTR, GCM, XTS
TLS cipher suites
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384

Vendor
Thales

Security level
EAL3+, EAL3, EAL3 augmented
Claims
O.PROTECTED_COMMUNICATIONS, O.POL_FILTERING, O.POL_DEFAULT, O.AUDIT, O.TIME_BASE, O.AUDIT_PROTECTION, O.SUPERVISION, O.SUPERVISION_IMPACT, O.ROLES, O.AUTHENTICATION_FAILURE, O.DISPLAY_BANNER, O.SESSION_LOCK, O.MANAGEMENT, O.VIEW_RULES, O.RESIDUAL_INFORMATION_CLEAR, O.DATA_ERASURE, O.LOCAL_DATA_PROTECTION, O.SELF_TEST, O.SOFTWARE_UPDATES, O.BOOT_CONTROL, O.CERTIFICATE_INJECTION, O.CRYPTO_PERIOD, O.CRYPTO_REGULATION, O.PROTECTED_COMMUNICATI, O.RESIDUAL_INFORMATION_C, O.PROTECTED_COMMUNICATION, T.SECURITY_FUNCTIONALITY_FAILURE, T.UNDETECTED_ACTIVITY, T.UNAUTHORIZED_ADMINISTRATOR_ACCESS, T.UPDATE_COMPROMISE, T.USER_DATA_REUSE, T.MISUSE, T.TIME_BASE, T.RESIDUAL_DATA, T.WEAK_CRYPTOGRAPHY, T.UNTRUSTED_COMMUNICATION_CHANNELS, T.WEAK_AUTHENTICATION_ENDPOINTS, T.PASSWORD_CRACKING, T.SECURITY_FUNCTIONALITY_COMPROMISE, T.TOE_CAPTURE, T.SECURITY_FUNCTIONALITY, T.UNTRUSTED_COMMUNICATI, T.WEAK_AUTHENTICATION_EN, A.LIMITED_FUNCTIONALITY, A.PHYSICAL_PROTECTION, A.REGULAR_UPDATES, A.TOE_ERASURE, A.NO_THRU_TRAFFIC_PROTECTION, A.TRUSTED_ADMINISTRATOR, A.ALARM, A.POLICIES_CONTINUITY, A.ADMINISTRATION_NETWORK, A.ADMIN_CREDENTIALS_SECURE, A.SECURED_MANAGEMENT_DEVICES, A.ACCESS_CONTROL_MANAGEMENT_DEVICES, A.PHYSICAL_ENV_MANAGEMENT_DEVICES, A.AUDIT, A.SS_MMC_TO_TOE, A.DATA_TRANSPORTATION, A.NO_TRU_TRAFFIC_PROTECTION, A.ACCESS_CONTROL_MANAGEMENT_DE, A.PHYSICAL_ENV_MANAGEMENT_DEVIC, OE.TRUSTED_ADMIN, OE.AUDIT, OE.ALARM, OE.POLICIES_CONTINUITY, OE.ADMIN_CREDENTIALS_SECURE, OE.PHYSICAL, OE.NO_GENERAL_PURPOSE, OE.TOE_INTEGRITY, OE.TIME_TOE, OE.TOE_ERASURE, OE.TOE_PRODUCTION, OE.NO_THRU_TRAFFIC_PROTECTION, OE.SECURED_MANAGEMENT_DEVICES, OE.ACCESS_CONTROL_MANAGEMENT_DEVICES, OE.PHYSICAL_ENV_MANAGEMENT_DEVICES, OE.AUDIT_RECORD, OE.LMGT_CONNECTION, OE.SS_MMC_TO_TOE, OE.DATA_TRANSPORTATION, OE.UPDATES, OE.SECURED_MANAGEMENT_, OE.ACCESS_CONTROL_MANA, OE.PHYSICAL_ENV_MANAGEM, OE.ADMIN_CREDENTIALS_SEC, OE.ACCESS_CONTROL_MANAGEMENT_DEVICE, OE.ACCESS_CONTROL_MANAGEMENT_D, OE.PHYSICAL_ENV_MANAGEMENT_DEVIC
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, ADV_FSP.1, ADV_TDS.1, ADV_FSP.2, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV.1, AVA_VAN.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1
Security Functional Requirements (SFR)
FAU_STG_EXT, FAU_GEN.1, FAU_STG_EXT.1, FAU_STG_EXT.4, FAU_GEN, FAU_STG_EXT.1.1, FAU_STG_EXT.1.2, FAU_STG_EXT.1.3, FAU_STG_EXT.2, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FAU_STG, FAU_STG.3, FAU_STG.1, FCO_CPC_EXT, FCO_CPC_EXT.1, FCO_CPC_EXT.1.1, FCO_CPC_EXT.1.3, FCO_CPC_EXT.1.2, FCS_RBG_EXT, FCS_TLSC_EXT, FCS_TLSS_EXT, FCS_CKM_EXT.5, FCS_CKM.1, FCS_CKM.2, FCS_COP, FCS_RBG_EXT.1, FCS_CKM_EXT, FCS_TLSC_EXT.2, FCS_TLSC_EXT.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_CKM, FCS_TLSC_EXT.2.1, FCS_TLSC_EXT.2.2, FCS_TLSC_EXT.2.3, FCS_TLSC_EXT.2.4, FCS_TLSC_EXT.2.5, FCS_TLSS_EXT.2, FCS_TLSS_EXT.2.1, FCS_TLSS_EXT.2.2, FCS_TLSS_EXT.2.3, FCS_TLSS_EXT.2.4, FCS_TLSS_EXT.2.5, FCS_TLSS_EXT.2.6, FCS_CKM.4, FCS_CKM_EXT.5.1, FCS_CKM_EXT.5.2, FCS_CKM_EXT.5.3, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1, FDP_UCT.1, FDP_UIT.1, FDP_ITC, FDP_ETC, FDP_ITC.1, FDP_ITC.2, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ETC.2, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP.2, FDP_RIP.2.1, FDP_ACC.1, FIA_PMG_EXT, FIA_UIA_EXT, FIA_UAU_EXT, FIA_UID.2, FIA_UAU.6, FIA_UAU.7, FIA_PMG_EXT.1, FIA_UAU_EXT.2, FIA_PMG_EXT.1.1, FIA_UIA_EXT.1, FIA_UIA_EXT.1.1, FIA_UIA_EXT.1.2, FIA_UAU_EXT.2.1, FIA_UID.2.1, FIA_UAU.6.1, FIA_UAU.7.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UIA, FIA_UID.1, FIA_UAU.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.2, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMF.1, FMT_SMF.1.1, FMT_MOF, FMT_MOF.1, FMT_MTD.1, FMT_MTD.1.1, FMT_MSA.1, FMT_SMR.1, FPT_SKP_EXT, FPT_APW_EXT, FPT_TST_EXT, FPT_TUD_EXT, FPT_STM_EXT, FPT_SDP_EXT, FPT_SKP_EXT.1, FPT_APW_EXT.1, FPT_STM_EXT.1, FPT_PTD, FPT_SKP_EXT.1.1, FPT_APW_EXT.1.1, FPT_APW_EXT.1.2, FPT_TST_EXT.1, FPT_TST_EXT.1.1, FPT_TUD_EXT.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_STM, FPT_STM_EXT.1.1, FPT_STM_EXT.1.2, FPT_SDP_EXT.2, FPT_SDP_EXT.2.1, FPT_SDP_EXT.2.2, FPT_TDC, FPT_TDC.1, FPT_RCV.1, FPT_RCV.1.1, FPT_RCV.2, FPT_RCV.2.1, FPT_RCV.2.2, FPT_FLS.1, FPT_FLS.1.1, FPT_STM.1, FTA_SSL_EXT, FTA_SSL.3, FTA_SSL.4, FTA_SSL_EXT.1, FTA_TAB.1, FTA_SSL, FTA_SSL_EXT.1.1, FTA_SSL.3.1, FTA_SSL.4.1, FTA_TAB.1.1, FTP_ITC.1, FTP_ITC, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3
Certificates
CC-01, CC-02, CC-03
Certification process
out of scope, Out of scope, of the Mistral system are considered as part of the operational environment. Hardware equipment is out of scope of the Target of Evaluation described in this Security Target. Following enabling elements, the, System Remote Admin Interface VS9 Management Center Monitoring tools TPM Target of evaluation Out of scope of evaluation SECURITY TARGET FOR MISTRAL VS9.0 GATEWAY SOFTWARE (CDS) MISTRAL VS9.0 GATEWAY

Certification process
out of scope, Out of scope, of the Mistral system are considered as part of the operational environment. Hardware equipment is out of scope of the Target of Evaluation described in this Security Target. Following enabling elements, the, System Remote Admin Interface VS9 Management Center Monitoring tools TPM Target of evaluation Out of scope of evaluation SECURITY TARGET FOR MISTRAL VS9.0 GATEWAY SOFTWARE (CDS) MISTRAL VS9.0 GATEWAY

Standards
FIPS PUB 186-4, PKCS #1, RFC 4301, RFC 4303, RFC 4106, RFC 4109, RFC 4304, RFC 4868, RFC 7296, RFC 5282, RFC 4945, RFC 5246, RFC 4346, RFC 6125, RFC 5280, RFC 6960, RFC 5759, RFC 2986, RFC5289, ISO/IEC 9796-2, ISO/IEC 9797-, ISO/IEC 18031:2011, X.509, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title: CDS_Mistral IPVS9.0_63535113-306_-Llite
Author: T0159776
Creation date: D:20210607172705+02'00'
Modification date: D:20210607172705+02'00'
Pages: 119
Creator: PDFCreator Free 4.2.0
Producer: GPL Ghostscript 9.52

References

No references.

Heuristics ?

Certificate ID: ANSSI-CC-2021/32

Extracted SARs

ALC_DVS.1, AGD_PRE.1, ASE_REQ.2, ASE_OBJ.2, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, ASE_TSS.1, ALC_CMC.3, ALC_CMS.3, ASE_CCL.1, ASE_INT.1, ALC_DEL.1, ASE_ECD.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, ADV_FSP.4, ADV_TDS.3, ASE_SPD.1, ATE_COV.2, ATE_IND.2, ADV_IMP.1, ADV_ARC.1

References ?

No references are available for this certificate.

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '6ea6e2aa704b3d8bdb34e2155062937191ae5ed658c1190b684465b8addfb87c', 'txt_hash': '5c26a2ac3e13b31da65c849626d4c141dc5245719de7ae27ff349ffead51f2c6'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '52f3a871fc949001f97f41be5a966d3b858bf24f026f15932a8ff80d61bd2ea7', 'txt_hash': 'ae3b67c9348e1204359853a3278316c94ca6066b0de37c90f55a224b4b56d716'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b30ee8c21c6a8dd3a3827f6d4b70b1154d04b67d23c471194d94fa7eb81dd8aa', 'txt_hash': '5eef7f2750f406e3cf56264638bb57fa8e9e72fb0b5189fd4251eb6b6f05b679'}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': {'pdf_file_size_bytes': 299643, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/Author': '', '/CreationDate': "D:20210720171317+02'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20210720171317+02'00'", '/Producer': 'Acrobat Distiller 11.0 (Windows)', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'FR': {'ANSSI-CC-2021/32': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3': 1, 'EAL2': 1, 'EAL3': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.3': 3}, 'AVA': {'AVA_VAN.3': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'OPPIDA': {'OPPIDA': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'IPsec': {'IPsec': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': 'certificat-2021_32.pdf'}.
    • The report_frontpage property was set to {'FR': {}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'FR': {'__update__': {'ANSSI-CC-2021/32': 2}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'NL': {'CC-01': 1, 'CC-02': 2, 'CC-03': 2}}} data.

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'FR': {'__update__': {'ANSSI-CC-2021/32': 4}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {}} data.

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Logiciel Mistral Gateway IPSec version 9.0.7.2', 'url': 'https://cyber.gouv.fr/produits-certifies/logiciel-mistral-gateway-ipsec-version-9072', 'description': 'Le produit évalué est « Logiciel Mistral Gateway IPSec, version 9.0.7.2 » développé par THALES.\nCe produit est le logiciel embarqué dans les boîtiers TRC7540-2. L’ensemble constitué par le boîtier et son logiciel embarqué est commercialisé sous la référence IP9001. Le produit final est un équipement de chiffrement de niveau réseau (couche 3 du modèle OSI) assurant la protection des paquets IP. Il', 'sponsor': 'THALES', 'developer': 'THALES', 'cert_id': '2021/32', 'level': 'EAL3+', 'expiration_date': '28 Juin 2026', 'enhanced': {'cert_id': '2021/32', 'certification_date': '28/06/2021', 'expiration_date': '28/06/2026', 'category': 'Produits réseau', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'THALES', 'sponsor': 'THALES', 'evaluation_facility': 'OPPIDA', 'level': 'EAL3+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_FLR.3, AVA_VAN.3', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2021/08/certificat-2021_32.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2021/08/anssi-cible-cc-2021_32en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2021/08/anssi-cc-2021_32fr.pdf'}}.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'CA': {'7 5 7': 1, '2 0 2': 12, '1 3 1': 1, '1 3 2': 1, '1 3 3': 1, '1 1 1': 21, '1 2 3': 6, '5 5 6': 1, '1 1 2': 1, '2 3 3': 1, '5 6 2': 1, '4 5 5': 2, '5 5 5': 1, '1 2 2': 5, '2 2 2': 2, '3 3 2': 1, '2 2 1': 1, '2 2 3': 1}}, '__update__': {'FR': {'__update__': {'ANSSI-CC-2021/32': 2}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'NL': {'CC-01': 1, 'CC-02': 2, 'CC-03': 2}}} data.

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 05.02.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'description': 'Le produit évalué est « Logiciel Mistral Gateway IPSec, version 9.0.7.2 » développé par THALES.\nCe produit est le logiciel embarqué dans les boîtiers TRC7540-2. L’ensemble constitué par le boîtier et son logiciel embarqué est commercialisé sous la référence IP9001. Le produit final est un équipement de chiffrement de niveau réseau (couche 3 du modèle OSI) assurant la protection des paquets IP. Il'} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
    • The scheme_data property was updated, with the {'url': 'https://cyber.gouv.fr/produits-certifies/logiciel-mistral-gateway-ipsec-version-9072', 'enhanced': {'__insert__': {'cert_id': '2021/32', 'sponsor': 'THALES', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_FLR.3, AVA_VAN.3'}, '__update__': {'developer': 'THALES', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2021/08/anssi-cc-2021_32fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2021/08/anssi-cible-cc-2021_32en.pdf', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/2021/08/certificat-2021_32.pdf'}, '__delete__': ['id', 'augmentations', 'recognition', 'description']}} data.
  • 27.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Logiciel Mistral Gateway IPSec version 9.0.7.2', 'vendor': 'THALESTHALES', 'level': 'EAL3+', 'id': '2021/32', 'certification_date': '28/06/2021', 'category': 'Network products', 'url': 'https://www.ssi.gouv.fr/certification_cc/logiciel-mistral-gateway-ipsec-version-9-0-7-2/', 'enhanced': {'id': '2021/32', 'certification_date': '28/06/2021', 'expiration_date': '28/06/2026', 'category': 'Produits réseau', 'cc_version': 'Critères Communs version 3.1r5', 'level': 'EAL3+', 'augmentations': 'ALC_FLR.3, AVA_VAN.3', 'developer': 'THALES / THALES', 'evaluation_facility': 'OPPIDA', 'recognition': 'SOG-IS - CCRA', 'description': 'Descriptif du produit\n\t\t\t\tLe produit évalué est « Logiciel Mistral Gateway IPSec, version 9.0.7.2 » développé par THALES.\nCe produit est le logiciel embarqué dans les boîtiers TRC7540-2. L’ensemble constitué par le boîtier et son logiciel embarqué est commercialisé sous la référence IP9001. Le produit final est un équipement de chiffrement de niveau réseau (couche 3 du modèle OSI) assurant la protection des paquets IP. Il offre des services de protection de données échangées sur des liens d’interconnexions de réseaux locaux avec un réseau tiers non maîtrisé.\n\t\t\t\t\n Rapport de certification\nSecurity target\nCertificat', 'report_link': 'https://www.ssi.gouv.fr/uploads/2021/08/anssi-cc-2021_32fr.pdf', 'target_link': 'https://www.ssi.gouv.fr/uploads/2021/08/anssi-cible-cc-2021_32en.pdf', 'cert_link': 'https://www.ssi.gouv.fr/uploads/2021/08/certificat-2021_32.pdf'}}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 52f3a871fc949001f97f41be5a966d3b858bf24f026f15932a8ff80d61bd2ea7.
    • The st_txt_hash property was set to ae3b67c9348e1204359853a3278316c94ca6066b0de37c90f55a224b4b56d716.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 981294, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 119, '/Producer': 'GPL Ghostscript 9.52', '/CreationDate': "D:20210607172705+02'00'", '/ModDate': "D:20210607172705+02'00'", '/Title': 'CDS_Mistral IPVS9.0_63535113-306_-Llite', '/Author': 'T0159776', '/Subject': '', '/Keywords': '', '/Creator': 'PDFCreator Free 4.2.0', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3+': 4, 'EAL3': 4, 'EAL3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.3': 9, 'ADV_TDS.2': 3, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.2': 2, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 10, 'AGD_PRE.1': 4}, 'ALC': {'ALC_FLR.3': 6, 'ALC_CMC.3': 2, 'ALC_CMS.3': 2, 'ALC_DEL.1': 2, 'ALC_DVS.1': 3, 'ALC_LCD.1': 4, 'ALC_CMS.1': 1}, 'ATE': {'ATE_COV.2': 4, 'ATE_DPT.1': 3, 'ATE_FUN.1': 6, 'ATE_IND.2': 1, 'ATE_COV.1': 2}, 'AVA': {'AVA_VAN.3': 7}, 'ASE': {'ASE_CCL.1': 2, 'ASE_ECD.1': 5, 'ASE_INT.1': 5, 'ASE_OBJ.2': 3, 'ASE_REQ.2': 2, 'ASE_SPD.1': 4, 'ASE_TSS.1': 2, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_STG_EXT': 13, 'FAU_GEN.1': 16, 'FAU_STG_EXT.1': 13, 'FAU_STG_EXT.4': 3, 'FAU_GEN': 16, 'FAU_STG_EXT.1.1': 2, 'FAU_STG_EXT.1.2': 2, 'FAU_STG_EXT.1.3': 4, 'FAU_STG_EXT.2': 2, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 5, 'FAU_GEN.2.1': 1, 'FAU_STG': 6, 'FAU_STG.3': 1, 'FAU_STG.1': 1}, 'FCO': {'FCO_CPC_EXT': 2, 'FCO_CPC_EXT.1': 12, 'FCO_CPC_EXT.1.1': 3, 'FCO_CPC_EXT.1.3': 3, 'FCO_CPC_EXT.1.2': 3}, 'FCS': {'FCS_RBG_EXT': 2, 'FCS_TLSC_EXT': 4, 'FCS_TLSS_EXT': 4, 'FCS_CKM_EXT.5': 17, 'FCS_CKM.1': 48, 'FCS_CKM.2': 13, 'FCS_COP': 101, 'FCS_RBG_EXT.1': 21, 'FCS_CKM_EXT': 13, 'FCS_TLSC_EXT.2': 10, 'FCS_TLSC_EXT.1': 1, 'FCS_RBG_EXT.1.1': 2, 'FCS_RBG_EXT.1.2': 2, 'FCS_CKM': 2, 'FCS_TLSC_EXT.2.1': 2, 'FCS_TLSC_EXT.2.2': 2, 'FCS_TLSC_EXT.2.3': 2, 'FCS_TLSC_EXT.2.4': 2, 'FCS_TLSC_EXT.2.5': 2, 'FCS_TLSS_EXT.2': 6, 'FCS_TLSS_EXT.2.1': 2, 'FCS_TLSS_EXT.2.2': 2, 'FCS_TLSS_EXT.2.3': 2, 'FCS_TLSS_EXT.2.4': 2, 'FCS_TLSS_EXT.2.5': 2, 'FCS_TLSS_EXT.2.6': 2, 'FCS_CKM.4': 23, 'FCS_CKM_EXT.5.1': 1, 'FCS_CKM_EXT.5.2': 1, 'FCS_CKM_EXT.5.3': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 18}, 'FDP': {'FDP_UCT.1': 8, 'FDP_UIT.1': 10, 'FDP_ITC': 13, 'FDP_ETC': 2, 'FDP_ITC.1': 16, 'FDP_ITC.2': 26, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ETC.2': 8, 'FDP_IFC': 19, 'FDP_IFC.1': 9, 'FDP_IFF': 16, 'FDP_IFF.1': 14, 'FDP_RIP.2': 5, 'FDP_RIP.2.1': 1, 'FDP_ACC.1': 5}, 'FIA': {'FIA_PMG_EXT': 2, 'FIA_UIA_EXT': 4, 'FIA_UAU_EXT': 2, 'FIA_UID.2': 8, 'FIA_UAU.6': 6, 'FIA_UAU.7': 7, 'FIA_PMG_EXT.1': 9, 'FIA_UAU_EXT.2': 10, 'FIA_PMG_EXT.1.1': 2, 'FIA_UIA_EXT.1': 14, 'FIA_UIA_EXT.1.1': 2, 'FIA_UIA_EXT.1.2': 2, 'FIA_UAU_EXT.2.1': 2, 'FIA_UID.2.1': 1, 'FIA_UAU.6.1': 1, 'FIA_UAU.7.1': 1, 'FIA_AFL.1': 6, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UIA': 1, 'FIA_UID.1': 5, 'FIA_UAU.1': 2}, 'FMT': {'FMT_MSA.3': 14, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMR.2': 7, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_SMF.1': 12, 'FMT_SMF.1.1': 1, 'FMT_MOF': 10, 'FMT_MOF.1': 2, 'FMT_MTD.1': 8, 'FMT_MTD.1.1': 1, 'FMT_MSA.1': 1, 'FMT_SMR.1': 4}, 'FPT': {'FPT_SKP_EXT': 2, 'FPT_APW_EXT': 2, 'FPT_TST_EXT': 2, 'FPT_TUD_EXT': 2, 'FPT_STM_EXT': 2, 'FPT_SDP_EXT': 3, 'FPT_SKP_EXT.1': 9, 'FPT_APW_EXT.1': 10, 'FPT_STM_EXT.1': 15, 'FPT_PTD': 1, 'FPT_SKP_EXT.1.1': 3, 'FPT_APW_EXT.1.1': 2, 'FPT_APW_EXT.1.2': 2, 'FPT_TST_EXT.1': 9, 'FPT_TST_EXT.1.1': 2, 'FPT_TUD_EXT.1': 10, 'FPT_TUD_EXT.1.1': 2, 'FPT_TUD_EXT.1.2': 2, 'FPT_TUD_EXT.1.3': 2, 'FPT_STM': 2, 'FPT_STM_EXT.1.1': 2, 'FPT_STM_EXT.1.2': 2, 'FPT_SDP_EXT.2': 10, 'FPT_SDP_EXT.2.1': 2, 'FPT_SDP_EXT.2.2': 2, 'FPT_TDC': 11, 'FPT_TDC.1': 7, 'FPT_RCV.1': 5, 'FPT_RCV.1.1': 1, 'FPT_RCV.2': 5, 'FPT_RCV.2.1': 1, 'FPT_RCV.2.2': 1, 'FPT_FLS.1': 6, 'FPT_FLS.1.1': 1, 'FPT_STM.1': 1}, 'FTA': {'FTA_SSL_EXT': 3, 'FTA_SSL.3': 6, 'FTA_SSL.4': 6, 'FTA_SSL_EXT.1': 11, 'FTA_TAB.1': 9, 'FTA_SSL': 1, 'FTA_SSL_EXT.1.1': 2, 'FTA_SSL.3.1': 1, 'FTA_SSL.4.1': 1, 'FTA_TAB.1.1': 1}, 'FTP': {'FTP_ITC.1': 19, 'FTP_ITC': 1, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 10, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.PROTECTED_COMMUNICATIONS': 12, 'O.POL_FILTERING': 8, 'O.POL_DEFAULT': 12, 'O.AUDIT': 14, 'O.TIME_BASE': 4, 'O.AUDIT_PROTECTION': 5, 'O.SUPERVISION': 6, 'O.SUPERVISION_IMPACT': 8, 'O.ROLES': 10, 'O.AUTHENTICATION_FAILURE': 9, 'O.DISPLAY_BANNER': 6, 'O.SESSION_LOCK': 4, 'O.MANAGEMENT': 7, 'O.VIEW_RULES': 11, 'O.RESIDUAL_INFORMATION_CLEAR': 4, 'O.DATA_ERASURE': 8, 'O.LOCAL_DATA_PROTECTION': 14, 'O.SELF_TEST': 11, 'O.SOFTWARE_UPDATES': 8, 'O.BOOT_CONTROL': 5, 'O.CERTIFICATE_INJECTION': 4, 'O.CRYPTO_PERIOD': 8, 'O.CRYPTO_REGULATION': 7, 'O.PROTECTED_COMMUNICATI': 1, 'O.RESIDUAL_INFORMATION_C': 1, 'O.PROTECTED_COMMUNICATION': 2}, 'T': {'T.SECURITY_FUNCTIONALITY_FAILURE': 3, 'T.UNDETECTED_ACTIVITY': 5, 'T.UNAUTHORIZED_ADMINISTRATOR_ACCESS': 3, 'T.UPDATE_COMPROMISE': 5, 'T.USER_DATA_REUSE': 3, 'T.MISUSE': 5, 'T.TIME_BASE': 3, 'T.RESIDUAL_DATA': 5, 'T.WEAK_CRYPTOGRAPHY': 3, 'T.UNTRUSTED_COMMUNICATION_CHANNELS': 3, 'T.WEAK_AUTHENTICATION_ENDPOINTS': 3, 'T.PASSWORD_CRACKING': 5, 'T.SECURITY_FUNCTIONALITY_COMPROMISE': 3, 'T.TOE_CAPTURE': 5, 'T.SECURITY_FUNCTIONALITY': 2, 'T.UNTRUSTED_COMMUNICATI': 2, 'T.WEAK_AUTHENTICATION_EN': 2}, 'A': {'A.LIMITED_FUNCTIONALITY': 2, 'A.PHYSICAL_PROTECTION': 1, 'A.REGULAR_UPDATES': 2, 'A.TOE_ERASURE': 1, 'A.NO_THRU_TRAFFIC_PROTECTION': 1, 'A.TRUSTED_ADMINISTRATOR': 1, 'A.ALARM': 2, 'A.POLICIES_CONTINUITY': 1, 'A.ADMINISTRATION_NETWORK': 1, 'A.ADMIN_CREDENTIALS_SECURE': 2, 'A.SECURED_MANAGEMENT_DEVICES': 1, 'A.ACCESS_CONTROL_MANAGEMENT_DEVICES': 1, 'A.PHYSICAL_ENV_MANAGEMENT_DEVICES': 1, 'A.AUDIT': 2, 'A.SS_MMC_TO_TOE': 1, 'A.DATA_TRANSPORTATION': 2, 'A.NO_TRU_TRAFFIC_PROTECTION': 1, 'A.ACCESS_CONTROL_MANAGEMENT_DE': 1, 'A.PHYSICAL_ENV_MANAGEMENT_DEVIC': 1}, 'OE': {'OE.TRUSTED_ADMIN': 3, 'OE.AUDIT': 2, 'OE.ALARM': 3, 'OE.POLICIES_CONTINUITY': 2, 'OE.ADMIN_CREDENTIALS_SECURE': 3, 'OE.PHYSICAL': 2, 'OE.NO_GENERAL_PURPOSE': 2, 'OE.TOE_INTEGRITY': 7, 'OE.TIME_TOE': 3, 'OE.TOE_ERASURE': 5, 'OE.TOE_PRODUCTION': 3, 'OE.NO_THRU_TRAFFIC_PROTECTION': 2, 'OE.SECURED_MANAGEMENT_DEVICES': 4, 'OE.ACCESS_CONTROL_MANAGEMENT_DEVICES': 2, 'OE.PHYSICAL_ENV_MANAGEMENT_DEVICES': 3, 'OE.AUDIT_RECORD': 3, 'OE.LMGT_CONNECTION': 5, 'OE.SS_MMC_TO_TOE': 5, 'OE.DATA_TRANSPORTATION': 4, 'OE.UPDATES': 4, 'OE.SECURED_MANAGEMENT_': 1, 'OE.ACCESS_CONTROL_MANA': 1, 'OE.PHYSICAL_ENV_MANAGEM': 1, 'OE.ADMIN_CREDENTIALS_SEC': 1, 'OE.ACCESS_CONTROL_MANAGEMENT_DEVICE': 2, 'OE.ACCESS_CONTROL_MANAGEMENT_D': 1, 'OE.PHYSICAL_ENV_MANAGEMENT_DEVIC': 1}}, 'vendor': {'Thales': {'Thales': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 18}}, 'constructions': {'MAC': {'HMAC': 3, 'HMAC-SHA-256': 1, 'HMAC-SHA-384': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 7}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'Diffie-Hellman': 7, 'DH': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 1, 'SHA-384': 1, 'SHA256': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 3}, 'KEX': {'Key Exchange': 1}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'SSL': {'SSL': 4, 'SSL 2.0': 1, 'SSL 3.0': 2, 'SSL2.0': 1}, 'TLS': {'TLS': 53, 'TLS 1.2': 5, 'TLS 1.1': 4, 'TLS 1.0': 2}, 'DTLS': {'DTLS': 1}}, 'IKE': {'IKE': 23, 'IKEv2': 21, 'IKEv1': 5}, 'IPsec': {'IPsec': 15}, 'VPN': {'VPN': 50}}, 'randomness': {'RNG': {'RBG': 2}}, 'cipher_mode': {'CBC': {'CBC': 3}, 'CTR': {'CTR': 2}, 'GCM': {'GCM': 3}, 'XTS': {'XTS': 2}}, 'ecc_curve': {'NIST': {'curve P-256': 1, 'P-256': 1, 'secp256r1': 8, 'secp384r1': 2, 'secp521r1': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384': 2}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-4': 1}, 'PKCS': {'PKCS #1': 1}, 'RFC': {'RFC 4301': 2, 'RFC 4303': 2, 'RFC 4106': 2, 'RFC 4109': 1, 'RFC 4304': 1, 'RFC 4868': 3, 'RFC 7296': 3, 'RFC 5282': 2, 'RFC 4945': 2, 'RFC 5246': 4, 'RFC 4346': 2, 'RFC 6125': 2, 'RFC 5280': 5, 'RFC 6960': 1, 'RFC 5759': 2, 'RFC 2986': 2, 'RFC5289': 2}, 'ISO': {'ISO/IEC 9796-2': 1, 'ISO/IEC 9797-': 2, 'ISO/IEC 18031:2011': 4}, 'X509': {'X.509': 12}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'Out of scope': 1, 'of the Mistral system are considered as part of the operational environment. Hardware equipment is out of scope of the Target of Evaluation described in this Security Target. Following enabling elements, the': 1, 'System Remote Admin Interface VS9 Management Center Monitoring tools TPM Target of evaluation Out of scope of evaluation SECURITY TARGET FOR MISTRAL VS9.0 GATEWAY SOFTWARE (CDS) MISTRAL VS9.0 GATEWAY': 1}}}.
    • The st_filename property was set to anssi-cible-cc-2021_32en.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The report_download_ok property was set to True.
    • The st_convert_ok property was set to False.
    • The report_convert_ok property was set to True.
    • The st_extract_ok property was set to False.
    • The report_extract_ok property was set to True.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2021_32en.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The report_pdf_hash property was set to 6ea6e2aa704b3d8bdb34e2155062937191ae5ed658c1190b684465b8addfb87c.
    • The st_txt_hash property was set to None.
    • The report_txt_hash property was set to 5c26a2ac3e13b31da65c849626d4c141dc5245719de7ae27ff349ffead51f2c6.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 188301, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 13, '/Author': '', '/CreationDate': "D:20210720171215+02'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20210720171215+02'00'", '/Producer': 'Acrobat Distiller 11.0 (Windows)', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2021/32': 4}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3': 3, 'EAL2': 3, 'EAL3': 2, 'EAL4': 1, 'EAL 1': 1, 'EAL 5': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E3 Elémentaire': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.3': 3, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.3': 2, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'OPPIDA': {'OPPIDA': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to None.
    • The report_filename property was set to anssi-cc-2021_32fr.pdf.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2021/32.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_download_ok property was set to False.
    • The report_convert_ok property was set to False.
    • The report_extract_ok property was set to False.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2021_32fr.pdf, code: nok', 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2021_32fr.pdf, code: nok'].
    • The report_pdf_hash property was set to None.
    • The report_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/certificat-2021_32.pdf.

    The manufacturer_web was updated.

    • The new value is https://www.thalescomminc.com/.

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2021_32fr.pdf, code: nok'].
    • The st_pdf_hash property was set to 52f3a871fc949001f97f41be5a966d3b858bf24f026f15932a8ff80d61bd2ea7.
    • The st_txt_hash property was set to ae3b67c9348e1204359853a3278316c94ca6066b0de37c90f55a224b4b56d716.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 981294, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 119, '/Producer': 'GPL Ghostscript 9.52', '/CreationDate': "D:20210607172705+02'00'", '/ModDate': "D:20210607172705+02'00'", '/Title': 'CDS_Mistral IPVS9.0_63535113-306_-Llite', '/Author': 'T0159776', '/Subject': '', '/Keywords': '', '/Creator': 'PDFCreator Free 4.2.0', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3+': 4, 'EAL3': 4, 'EAL3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.3': 9, 'ADV_TDS.2': 3, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.2': 2, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 10, 'AGD_PRE.1': 4}, 'ALC': {'ALC_FLR.3': 6, 'ALC_CMC.3': 2, 'ALC_CMS.3': 2, 'ALC_DEL.1': 2, 'ALC_DVS.1': 3, 'ALC_LCD.1': 4, 'ALC_CMS.1': 1}, 'ATE': {'ATE_COV.2': 4, 'ATE_DPT.1': 3, 'ATE_FUN.1': 6, 'ATE_IND.2': 1, 'ATE_COV.1': 2}, 'AVA': {'AVA_VAN.3': 7}, 'ASE': {'ASE_CCL.1': 2, 'ASE_ECD.1': 5, 'ASE_INT.1': 5, 'ASE_OBJ.2': 3, 'ASE_REQ.2': 2, 'ASE_SPD.1': 4, 'ASE_TSS.1': 2, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_STG_EXT': 13, 'FAU_GEN.1': 16, 'FAU_STG_EXT.1': 13, 'FAU_STG_EXT.4': 3, 'FAU_GEN': 16, 'FAU_STG_EXT.1.1': 2, 'FAU_STG_EXT.1.2': 2, 'FAU_STG_EXT.1.3': 4, 'FAU_STG_EXT.2': 2, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 5, 'FAU_GEN.2.1': 1, 'FAU_STG': 6, 'FAU_STG.3': 1, 'FAU_STG.1': 1}, 'FCO': {'FCO_CPC_EXT': 2, 'FCO_CPC_EXT.1': 12, 'FCO_CPC_EXT.1.1': 3, 'FCO_CPC_EXT.1.3': 3, 'FCO_CPC_EXT.1.2': 3}, 'FCS': {'FCS_RBG_EXT': 2, 'FCS_TLSC_EXT': 4, 'FCS_TLSS_EXT': 4, 'FCS_CKM_EXT.5': 17, 'FCS_CKM.1': 48, 'FCS_CKM.2': 13, 'FCS_COP': 101, 'FCS_RBG_EXT.1': 21, 'FCS_CKM_EXT': 13, 'FCS_TLSC_EXT.2': 10, 'FCS_TLSC_EXT.1': 1, 'FCS_RBG_EXT.1.1': 2, 'FCS_RBG_EXT.1.2': 2, 'FCS_CKM': 2, 'FCS_TLSC_EXT.2.1': 2, 'FCS_TLSC_EXT.2.2': 2, 'FCS_TLSC_EXT.2.3': 2, 'FCS_TLSC_EXT.2.4': 2, 'FCS_TLSC_EXT.2.5': 2, 'FCS_TLSS_EXT.2': 6, 'FCS_TLSS_EXT.2.1': 2, 'FCS_TLSS_EXT.2.2': 2, 'FCS_TLSS_EXT.2.3': 2, 'FCS_TLSS_EXT.2.4': 2, 'FCS_TLSS_EXT.2.5': 2, 'FCS_TLSS_EXT.2.6': 2, 'FCS_CKM.4': 23, 'FCS_CKM_EXT.5.1': 1, 'FCS_CKM_EXT.5.2': 1, 'FCS_CKM_EXT.5.3': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 18}, 'FDP': {'FDP_UCT.1': 8, 'FDP_UIT.1': 10, 'FDP_ITC': 13, 'FDP_ETC': 2, 'FDP_ITC.1': 16, 'FDP_ITC.2': 26, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ETC.2': 8, 'FDP_IFC': 19, 'FDP_IFC.1': 9, 'FDP_IFF': 16, 'FDP_IFF.1': 14, 'FDP_RIP.2': 5, 'FDP_RIP.2.1': 1, 'FDP_ACC.1': 5}, 'FIA': {'FIA_PMG_EXT': 2, 'FIA_UIA_EXT': 4, 'FIA_UAU_EXT': 2, 'FIA_UID.2': 8, 'FIA_UAU.6': 6, 'FIA_UAU.7': 7, 'FIA_PMG_EXT.1': 9, 'FIA_UAU_EXT.2': 10, 'FIA_PMG_EXT.1.1': 2, 'FIA_UIA_EXT.1': 14, 'FIA_UIA_EXT.1.1': 2, 'FIA_UIA_EXT.1.2': 2, 'FIA_UAU_EXT.2.1': 2, 'FIA_UID.2.1': 1, 'FIA_UAU.6.1': 1, 'FIA_UAU.7.1': 1, 'FIA_AFL.1': 6, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UIA': 1, 'FIA_UID.1': 5, 'FIA_UAU.1': 2}, 'FMT': {'FMT_MSA.3': 14, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMR.2': 7, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_SMF.1': 12, 'FMT_SMF.1.1': 1, 'FMT_MOF': 10, 'FMT_MOF.1': 2, 'FMT_MTD.1': 8, 'FMT_MTD.1.1': 1, 'FMT_MSA.1': 1, 'FMT_SMR.1': 4}, 'FPT': {'FPT_SKP_EXT': 2, 'FPT_APW_EXT': 2, 'FPT_TST_EXT': 2, 'FPT_TUD_EXT': 2, 'FPT_STM_EXT': 2, 'FPT_SDP_EXT': 3, 'FPT_SKP_EXT.1': 9, 'FPT_APW_EXT.1': 10, 'FPT_STM_EXT.1': 15, 'FPT_PTD': 1, 'FPT_SKP_EXT.1.1': 3, 'FPT_APW_EXT.1.1': 2, 'FPT_APW_EXT.1.2': 2, 'FPT_TST_EXT.1': 9, 'FPT_TST_EXT.1.1': 2, 'FPT_TUD_EXT.1': 10, 'FPT_TUD_EXT.1.1': 2, 'FPT_TUD_EXT.1.2': 2, 'FPT_TUD_EXT.1.3': 2, 'FPT_STM': 2, 'FPT_STM_EXT.1.1': 2, 'FPT_STM_EXT.1.2': 2, 'FPT_SDP_EXT.2': 10, 'FPT_SDP_EXT.2.1': 2, 'FPT_SDP_EXT.2.2': 2, 'FPT_TDC': 11, 'FPT_TDC.1': 7, 'FPT_RCV.1': 5, 'FPT_RCV.1.1': 1, 'FPT_RCV.2': 5, 'FPT_RCV.2.1': 1, 'FPT_RCV.2.2': 1, 'FPT_FLS.1': 6, 'FPT_FLS.1.1': 1, 'FPT_STM.1': 1}, 'FTA': {'FTA_SSL_EXT': 3, 'FTA_SSL.3': 6, 'FTA_SSL.4': 6, 'FTA_SSL_EXT.1': 11, 'FTA_TAB.1': 9, 'FTA_SSL': 1, 'FTA_SSL_EXT.1.1': 2, 'FTA_SSL.3.1': 1, 'FTA_SSL.4.1': 1, 'FTA_TAB.1.1': 1}, 'FTP': {'FTP_ITC.1': 19, 'FTP_ITC': 1, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 10, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.PROTECTED_COMMUNICATIONS': 12, 'O.POL_FILTERING': 8, 'O.POL_DEFAULT': 12, 'O.AUDIT': 14, 'O.TIME_BASE': 4, 'O.AUDIT_PROTECTION': 5, 'O.SUPERVISION': 6, 'O.SUPERVISION_IMPACT': 8, 'O.ROLES': 10, 'O.AUTHENTICATION_FAILURE': 9, 'O.DISPLAY_BANNER': 6, 'O.SESSION_LOCK': 4, 'O.MANAGEMENT': 7, 'O.VIEW_RULES': 11, 'O.RESIDUAL_INFORMATION_CLEAR': 4, 'O.DATA_ERASURE': 8, 'O.LOCAL_DATA_PROTECTION': 14, 'O.SELF_TEST': 11, 'O.SOFTWARE_UPDATES': 8, 'O.BOOT_CONTROL': 5, 'O.CERTIFICATE_INJECTION': 4, 'O.CRYPTO_PERIOD': 8, 'O.CRYPTO_REGULATION': 7, 'O.PROTECTED_COMMUNICATI': 1, 'O.RESIDUAL_INFORMATION_C': 1, 'O.PROTECTED_COMMUNICATION': 2}, 'T': {'T.SECURITY_FUNCTIONALITY_FAILURE': 3, 'T.UNDETECTED_ACTIVITY': 5, 'T.UNAUTHORIZED_ADMINISTRATOR_ACCESS': 3, 'T.UPDATE_COMPROMISE': 5, 'T.USER_DATA_REUSE': 3, 'T.MISUSE': 5, 'T.TIME_BASE': 3, 'T.RESIDUAL_DATA': 5, 'T.WEAK_CRYPTOGRAPHY': 3, 'T.UNTRUSTED_COMMUNICATION_CHANNELS': 3, 'T.WEAK_AUTHENTICATION_ENDPOINTS': 3, 'T.PASSWORD_CRACKING': 5, 'T.SECURITY_FUNCTIONALITY_COMPROMISE': 3, 'T.TOE_CAPTURE': 5, 'T.SECURITY_FUNCTIONALITY': 2, 'T.UNTRUSTED_COMMUNICATI': 2, 'T.WEAK_AUTHENTICATION_EN': 2}, 'A': {'A.LIMITED_FUNCTIONALITY': 2, 'A.PHYSICAL_PROTECTION': 1, 'A.REGULAR_UPDATES': 2, 'A.TOE_ERASURE': 1, 'A.NO_THRU_TRAFFIC_PROTECTION': 1, 'A.TRUSTED_ADMINISTRATOR': 1, 'A.ALARM': 2, 'A.POLICIES_CONTINUITY': 1, 'A.ADMINISTRATION_NETWORK': 1, 'A.ADMIN_CREDENTIALS_SECURE': 2, 'A.SECURED_MANAGEMENT_DEVICES': 1, 'A.ACCESS_CONTROL_MANAGEMENT_DEVICES': 1, 'A.PHYSICAL_ENV_MANAGEMENT_DEVICES': 1, 'A.AUDIT': 2, 'A.SS_MMC_TO_TOE': 1, 'A.DATA_TRANSPORTATION': 2, 'A.NO_TRU_TRAFFIC_PROTECTION': 1, 'A.ACCESS_CONTROL_MANAGEMENT_DE': 1, 'A.PHYSICAL_ENV_MANAGEMENT_DEVIC': 1}, 'OE': {'OE.TRUSTED_ADMIN': 3, 'OE.AUDIT': 2, 'OE.ALARM': 3, 'OE.POLICIES_CONTINUITY': 2, 'OE.ADMIN_CREDENTIALS_SECURE': 3, 'OE.PHYSICAL': 2, 'OE.NO_GENERAL_PURPOSE': 2, 'OE.TOE_INTEGRITY': 7, 'OE.TIME_TOE': 3, 'OE.TOE_ERASURE': 5, 'OE.TOE_PRODUCTION': 3, 'OE.NO_THRU_TRAFFIC_PROTECTION': 2, 'OE.SECURED_MANAGEMENT_DEVICES': 4, 'OE.ACCESS_CONTROL_MANAGEMENT_DEVICES': 2, 'OE.PHYSICAL_ENV_MANAGEMENT_DEVICES': 3, 'OE.AUDIT_RECORD': 3, 'OE.LMGT_CONNECTION': 5, 'OE.SS_MMC_TO_TOE': 5, 'OE.DATA_TRANSPORTATION': 4, 'OE.UPDATES': 4, 'OE.SECURED_MANAGEMENT_': 1, 'OE.ACCESS_CONTROL_MANA': 1, 'OE.PHYSICAL_ENV_MANAGEM': 1, 'OE.ADMIN_CREDENTIALS_SEC': 1, 'OE.ACCESS_CONTROL_MANAGEMENT_DEVICE': 2, 'OE.ACCESS_CONTROL_MANAGEMENT_D': 1, 'OE.PHYSICAL_ENV_MANAGEMENT_DEVIC': 1}}, 'vendor': {'Thales': {'Thales': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 18}}, 'constructions': {'MAC': {'HMAC': 3, 'HMAC-SHA-256': 1, 'HMAC-SHA-384': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 7}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'Diffie-Hellman': 7, 'DH': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 1, 'SHA-384': 1, 'SHA256': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 3}, 'KEX': {'Key Exchange': 1}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'SSL': {'SSL': 4, 'SSL 2.0': 1, 'SSL 3.0': 2, 'SSL2.0': 1}, 'TLS': {'TLS': 53, 'TLS 1.2': 5, 'TLS 1.1': 4, 'TLS 1.0': 2}, 'DTLS': {'DTLS': 1}}, 'IKE': {'IKE': 23, 'IKEv2': 21, 'IKEv1': 5}, 'IPsec': {'IPsec': 15}, 'VPN': {'VPN': 50}}, 'randomness': {'RNG': {'RBG': 2}}, 'cipher_mode': {'CBC': {'CBC': 3}, 'CTR': {'CTR': 2}, 'GCM': {'GCM': 3}, 'XTS': {'XTS': 2}}, 'ecc_curve': {'NIST': {'curve P-256': 1, 'P-256': 1, 'secp256r1': 8, 'secp384r1': 2, 'secp521r1': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384': 2}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-4': 1}, 'PKCS': {'PKCS #1': 1}, 'RFC': {'RFC 4301': 2, 'RFC 4303': 2, 'RFC 4106': 2, 'RFC 4109': 1, 'RFC 4304': 1, 'RFC 4868': 3, 'RFC 7296': 3, 'RFC 5282': 2, 'RFC 4945': 2, 'RFC 5246': 4, 'RFC 4346': 2, 'RFC 6125': 2, 'RFC 5280': 5, 'RFC 6960': 1, 'RFC 5759': 2, 'RFC 2986': 2, 'RFC5289': 2}, 'ISO': {'ISO/IEC 9796-2': 1, 'ISO/IEC 9797-': 2, 'ISO/IEC 18031:2011': 4}, 'X509': {'X.509': 12}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'Out of scope': 1, 'of the Mistral system are considered as part of the operational environment. Hardware equipment is out of scope of the Target of Evaluation described in this Security Target. Following enabling elements, the': 1, 'System Remote Admin Interface VS9 Management Center Monitoring tools TPM Target of evaluation Out of scope of evaluation SECURITY TARGET FOR MISTRAL VS9.0 GATEWAY SOFTWARE (CDS) MISTRAL VS9.0 GATEWAY': 1}}}.
    • The st_filename property was set to anssi-cible-cc-2021_32en.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2021_32en.pdf, code: 408'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 26.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_keywords property was updated, with the {'crypto_protocol': {'__insert__': {'VPN': {'VPN': 50}}, '__update__': {'TLS': {'__insert__': {'DTLS': {'DTLS': 1}}}}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'anssi-cc-2021_32fr.pdf', 'st_filename': 'anssi-cible-cc-2021_32en.pdf'}.
    • The report_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__delete__': ['EAL 2', 'EAL 4', 'EAL 6', 'EAL 3+']}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.3': 3, 'ALC_FLR': 2}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 1}}}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'CC': {'__insert__': {'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_TDS.2': 3}}, 'AGD': {'__update__': {'AGD_PRE.1': 4}}, 'ALC': {'__update__': {'ALC_FLR.3': 6, 'ALC_CMS.3': 2, 'ALC_DVS.1': 3}}, 'ATE': {'__update__': {'ATE_DPT.1': 3, 'ATE_FUN.1': 6, 'ATE_IND.2': 1}}, 'AVA': {'__update__': {'AVA_VAN.3': 7}}, 'ASE': {'__update__': {'ASE_ECD.1': 5, 'ASE_INT.1': 5, 'ASE_OBJ.2': 3, 'ASE_REQ.2': 2}}}}, 'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_STG_EXT.2': 2, 'FAU_STG': 6, 'FAU_STG.3': 1}, '__update__': {'FAU_STG_EXT': 13, 'FAU_GEN.2': 5, 'FAU_STG_EXT.1': 13, 'FAU_STG_EXT.1.3': 4}}, 'FCO': {'__update__': {'FCO_CPC_EXT.1': 12}}, 'FCS': {'__insert__': {'FCS_COP': 101, 'FCS_CKM_EXT': 13}, '__update__': {'FCS_TLSS_EXT': 4, 'FCS_CKM_EXT.5': 17, 'FCS_CKM.2': 13, 'FCS_TLSC_EXT.2': 10, 'FCS_TLSS_EXT.2': 6, 'FCS_CKM': 2, 'FCS_CKM.4': 23, 'FCS_COP.1': 18}}, 'FDP': {'__insert__': {'FDP_ITC': 13, 'FDP_ETC': 2, 'FDP_IFC': 19, 'FDP_IFF': 16}, '__update__': {'FDP_UIT.1': 10, 'FDP_ITC.2': 26, 'FDP_ETC.2': 8, 'FDP_IFF.1': 14, 'FDP_IFC.1': 9}}, 'FIA': {'__update__': {'FIA_UIA_EXT': 4, 'FIA_PMG_EXT.1': 9, 'FIA_UIA_EXT.1': 14, 'FIA_AFL.1': 6, 'FIA_UAU.1': 2}}, 'FMT': {'__insert__': {'FMT_MOF': 10, 'FMT_MOF.1': 2}, '__update__': {'FMT_MSA.3': 14, 'FMT_SMR.2': 7, 'FMT_SMF.1': 12, 'FMT_MTD.1': 8, 'FMT_MSA.1': 1}}, 'FPT': {'__insert__': {'FPT_TDC': 11}, '__update__': {'FPT_TUD_EXT.1': 10, 'FPT_TST_EXT.1': 9, 'FPT_STM_EXT.1': 15, 'FPT_SDP_EXT.2': 10, 'FPT_STM': 2, 'FPT_TDC.1': 7}}, 'FTP': {'__insert__': {'FTP_ITC': 1}, '__update__': {'FTP_ITC.1': 19, 'FTP_TRP.1': 10}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.POL_FILTERING': 8, 'O.TIME_BASE': 4, 'O.AUDIT_PROTECTION': 5, 'O.SUPERVISION': 6, 'O.DISPLAY_BANNER': 6, 'O.SESSION_LOCK': 4, 'O.MANAGEMENT': 7, 'O.RESIDUAL_INFORMATION_CLEAR': 4, 'O.BOOT_CONTROL': 5, 'O.CRYPTO_REGULATION': 7}}, 'T': {'__update__': {'T.WEAK_CRYPTOGRAPHY': 3, 'T.UNAUTHORIZED_ADMINISTRATOR_ACCESS': 3, 'T.UPDATE_COMPROMISE': 5, 'T.USER_DATA_REUSE': 3, 'T.TIME_BASE': 3, 'T.WEAK_AUTHENTICATION_ENDPOINTS': 3, 'T.TOE_CAPTURE': 5}, '__delete__': ['T.UNAUTHORIZED_ADMINIST', 'T.SECURITY_FUNCTIONALITY_', 'T.N']}, 'A': {'__update__': {'A.PHYSICAL_PROTECTION': 1, 'A.TOE_ERASURE': 1, 'A.TRUSTED_ADMINISTRATOR': 1, 'A.POLICIES_CONTINUITY': 1, 'A.SECURED_MANAGEMENT_DEVICES': 1, 'A.SS_MMC_TO_TOE': 1}}}}, 'vendor': {'__delete__': ['STMicroelectronics']}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECDSA': {'__update__': {'ECDSA': 7}}}}, 'FF': {'__update__': {'DH': {'__update__': {'DH': 2}}}, '__delete__': ['DSA']}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA256': 1, 'SHA-256': 1, 'SHA-384': 1}, '__delete__': ['SHA384']}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 3}}}, '__delete__': ['KA']}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 4}}}}, 'IKE': {'__update__': {'IKEv2': 21}}, 'IPsec': {'__update__': {'IPsec': 15}}}, '__delete__': ['PACE']}, 'randomness': {'__update__': {'RNG': {'__update__': {'RBG': 2}}}, '__delete__': ['PRNG']}, 'cipher_mode': {'__update__': {'CBC': {'__update__': {'CBC': 3}}, 'CTR': {'__update__': {'CTR': 2}}, 'GCM': {'__update__': {'GCM': 3}}, 'XTS': {'__update__': {'XTS': 2}}}}, 'ecc_curve': {'__update__': {'NIST': {'__delete__': ['P-028']}}}, 'side_channel_analysis': {}, 'tee_name': {}, 'standard_id': {'__update__': {'RFC': {'__update__': {'RFC 4301': 2}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'System Remote Admin Interface VS9 Management Center Monitoring tools TPM Target of evaluation Out of scope of evaluation SECURITY TARGET FOR MISTRAL VS9.0 GATEWAY SOFTWARE (CDS) MISTRAL VS9.0 GATEWAY': 1}, '__delete__': ['. Hardware equipment is out of scope of the Target of Evaluation described in this Security Target', 'ating System Remote Admin Interface VS9 Management Center Monitoring tools TPM Target of evaluation Out of scope of evaluation SECURITY TARGET FOR MISTRAL VS9.0 GATEWAY SOFTWARE (CDS) MISTRAL VS9.0 GATEWAY']}}}} data.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2021/32': 4}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3': 3, 'EAL2': 3, 'EAL3': 2, 'EAL4': 1, 'EAL 1': 1, 'EAL 2': 1, 'EAL 4': 1, 'EAL 5': 1, 'EAL 6': 1, 'EAL 7': 1, 'EAL 3+': 1}, 'ITSEC': {'ITSEC E3 Elémentaire': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.3': 2, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'OPPIDA': {'OPPIDA': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3+': 4, 'EAL3': 4, 'EAL3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.3': 9, 'ADV_TDS.2': 6, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.2': 2, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 10, 'AGD_PRE.1': 6}, 'ALC': {'ALC_FLR.3': 5, 'ALC_CMC.3': 2, 'ALC_CMS.3': 3, 'ALC_DEL.1': 2, 'ALC_DVS.1': 4, 'ALC_LCD.1': 4, 'ALC_CMS.1': 1}, 'ATE': {'ATE_COV.2': 4, 'ATE_DPT.1': 4, 'ATE_FUN.1': 8, 'ATE_IND.2': 2, 'ATE_COV.1': 2}, 'AVA': {'AVA_VAN.3': 5}, 'ASE': {'ASE_CCL.1': 2, 'ASE_ECD.1': 6, 'ASE_INT.1': 6, 'ASE_OBJ.2': 4, 'ASE_REQ.2': 4, 'ASE_SPD.1': 4, 'ASE_TSS.1': 2, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_STG_EXT': 2, 'FAU_GEN.1': 16, 'FAU_GEN.2': 6, 'FAU_STG_EXT.1': 14, 'FAU_STG_EXT.4': 3, 'FAU_GEN': 16, 'FAU_STG_EXT.1.1': 2, 'FAU_STG_EXT.1.2': 2, 'FAU_STG_EXT.1.3': 2, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_STG.1': 1}, 'FCO': {'FCO_CPC_EXT': 2, 'FCO_CPC_EXT.1': 11, 'FCO_CPC_EXT.1.1': 3, 'FCO_CPC_EXT.1.3': 3, 'FCO_CPC_EXT.1.2': 3}, 'FCS': {'FCS_RBG_EXT': 2, 'FCS_TLSC_EXT': 4, 'FCS_TLSS_EXT': 3, 'FCS_CKM_EXT.5': 8, 'FCS_CKM.1': 48, 'FCS_CKM.2': 17, 'FCS_RBG_EXT.1': 21, 'FCS_TLSC_EXT.2': 11, 'FCS_TLSS_EXT.2': 9, 'FCS_TLSC_EXT.1': 1, 'FCS_RBG_EXT.1.1': 2, 'FCS_RBG_EXT.1.2': 2, 'FCS_TLSC_EXT.2.1': 2, 'FCS_TLSC_EXT.2.2': 2, 'FCS_TLSC_EXT.2.3': 2, 'FCS_TLSC_EXT.2.4': 2, 'FCS_TLSC_EXT.2.5': 2, 'FCS_TLSS_EXT.2.1': 2, 'FCS_TLSS_EXT.2.2': 2, 'FCS_TLSS_EXT.2.3': 2, 'FCS_TLSS_EXT.2.4': 2, 'FCS_TLSS_EXT.2.5': 2, 'FCS_TLSS_EXT.2.6': 2, 'FCS_CKM': 1, 'FCS_CKM.4': 38, 'FCS_CKM_EXT.5.1': 1, 'FCS_CKM_EXT.5.2': 1, 'FCS_CKM_EXT.5.3': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 3}, 'FDP': {'FDP_UCT.1': 8, 'FDP_UIT.1': 11, 'FDP_ITC.1': 16, 'FDP_ITC.2': 16, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_RIP.2': 5, 'FDP_RIP.2.1': 1, 'FDP_ETC.2': 4, 'FDP_IFF.1': 4, 'FDP_ACC.1': 5, 'FDP_IFC.1': 7}, 'FIA': {'FIA_PMG_EXT': 2, 'FIA_UIA_EXT': 2, 'FIA_UAU_EXT': 2, 'FIA_UID.2': 8, 'FIA_UAU.6': 6, 'FIA_UAU.7': 7, 'FIA_PMG_EXT.1': 10, 'FIA_UIA_EXT.1': 16, 'FIA_UAU_EXT.2': 10, 'FIA_PMG_EXT.1.1': 2, 'FIA_UIA_EXT.1.1': 2, 'FIA_UIA_EXT.1.2': 2, 'FIA_UAU_EXT.2.1': 2, 'FIA_UID.2.1': 1, 'FIA_UAU.6.1': 1, 'FIA_UAU.7.1': 1, 'FIA_AFL.1': 7, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UIA': 1, 'FIA_UID.1': 5, 'FIA_UAU.1': 4}, 'FMT': {'FMT_MSA.3': 13, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMR.2': 10, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_SMF.1': 11, 'FMT_SMF.1.1': 1, 'FMT_MTD.1': 7, 'FMT_MTD.1.1': 1, 'FMT_MSA.1': 2, 'FMT_SMR.1': 4}, 'FPT': {'FPT_SKP_EXT': 2, 'FPT_APW_EXT': 2, 'FPT_TST_EXT': 2, 'FPT_TUD_EXT': 2, 'FPT_STM_EXT': 2, 'FPT_SDP_EXT': 3, 'FPT_SKP_EXT.1': 9, 'FPT_TUD_EXT.1': 11, 'FPT_APW_EXT.1': 10, 'FPT_TST_EXT.1': 10, 'FPT_STM_EXT.1': 16, 'FPT_SDP_EXT.2': 11, 'FPT_PTD': 1, 'FPT_SKP_EXT.1.1': 3, 'FPT_APW_EXT.1.1': 2, 'FPT_APW_EXT.1.2': 2, 'FPT_TST_EXT.1.1': 2, 'FPT_TUD_EXT.1.1': 2, 'FPT_TUD_EXT.1.2': 2, 'FPT_TUD_EXT.1.3': 2, 'FPT_STM': 1, 'FPT_STM_EXT.1.1': 2, 'FPT_STM_EXT.1.2': 2, 'FPT_SDP_EXT.2.1': 2, 'FPT_SDP_EXT.2.2': 2, 'FPT_RCV.1': 5, 'FPT_RCV.1.1': 1, 'FPT_RCV.2': 5, 'FPT_RCV.2.1': 1, 'FPT_RCV.2.2': 1, 'FPT_FLS.1': 6, 'FPT_FLS.1.1': 1, 'FPT_TDC.1': 3, 'FPT_STM.1': 1}, 'FTA': {'FTA_SSL_EXT': 3, 'FTA_SSL.3': 6, 'FTA_SSL.4': 6, 'FTA_SSL_EXT.1': 11, 'FTA_TAB.1': 9, 'FTA_SSL': 1, 'FTA_SSL_EXT.1.1': 2, 'FTA_SSL.3.1': 1, 'FTA_SSL.4.1': 1, 'FTA_TAB.1.1': 1}, 'FTP': {'FTP_ITC.1': 18, 'FTP_TRP.1': 13, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.PROTECTED_COMMUNICATIONS': 12, 'O.POL_FILTERING': 12, 'O.POL_DEFAULT': 12, 'O.AUDIT': 14, 'O.TIME_BASE': 8, 'O.AUDIT_PROTECTION': 9, 'O.SUPERVISION': 10, 'O.SUPERVISION_IMPACT': 8, 'O.ROLES': 10, 'O.AUTHENTICATION_FAILURE': 9, 'O.DISPLAY_BANNER': 10, 'O.SESSION_LOCK': 8, 'O.MANAGEMENT': 11, 'O.VIEW_RULES': 11, 'O.RESIDUAL_INFORMATION_CLEAR': 8, 'O.DATA_ERASURE': 8, 'O.LOCAL_DATA_PROTECTION': 14, 'O.SELF_TEST': 11, 'O.SOFTWARE_UPDATES': 8, 'O.BOOT_CONTROL': 9, 'O.CERTIFICATE_INJECTION': 4, 'O.CRYPTO_PERIOD': 8, 'O.CRYPTO_REGULATION': 11, 'O.PROTECTED_COMMUNICATI': 1, 'O.RESIDUAL_INFORMATION_C': 1, 'O.PROTECTED_COMMUNICATION': 2}, 'T': {'T.SECURITY_FUNCTIONALITY_FAILURE': 3, 'T.UNDETECTED_ACTIVITY': 5, 'T.MISUSE': 5, 'T.RESIDUAL_DATA': 5, 'T.WEAK_CRYPTOGRAPHY': 5, 'T.UNTRUSTED_COMMUNICATION_CHANNELS': 3, 'T.PASSWORD_CRACKING': 5, 'T.SECURITY_FUNCTIONALITY_COMPROMISE': 3, 'T.UNAUTHORIZED_ADMINISTRATOR_ACCESS': 2, 'T.UPDATE_COMPROMISE': 4, 'T.USER_DATA_REUSE': 4, 'T.TIME_BASE': 4, 'T.WEAK_AUTHENTICATION_ENDPOINTS': 2, 'T.TOE_CAPTURE': 4, 'T.SECURITY_FUNCTIONALITY': 2, 'T.UNAUTHORIZED_ADMINIST': 2, 'T.UNTRUSTED_COMMUNICATI': 2, 'T.WEAK_AUTHENTICATION_EN': 2, 'T.SECURITY_FUNCTIONALITY_': 2, 'T.N': 1}, 'A': {'A.LIMITED_FUNCTIONALITY': 2, 'A.PHYSICAL_PROTECTION': 2, 'A.REGULAR_UPDATES': 2, 'A.TOE_ERASURE': 2, 'A.NO_THRU_TRAFFIC_PROTECTION': 1, 'A.TRUSTED_ADMINISTRATOR': 2, 'A.ALARM': 2, 'A.POLICIES_CONTINUITY': 2, 'A.ADMINISTRATION_NETWORK': 1, 'A.ADMIN_CREDENTIALS_SECURE': 2, 'A.SECURED_MANAGEMENT_DEVICES': 2, 'A.ACCESS_CONTROL_MANAGEMENT_DEVICES': 1, 'A.PHYSICAL_ENV_MANAGEMENT_DEVICES': 1, 'A.AUDIT': 2, 'A.SS_MMC_TO_TOE': 2, 'A.DATA_TRANSPORTATION': 2, 'A.NO_TRU_TRAFFIC_PROTECTION': 1, 'A.ACCESS_CONTROL_MANAGEMENT_DE': 1, 'A.PHYSICAL_ENV_MANAGEMENT_DEVIC': 1}, 'OE': {'OE.TRUSTED_ADMIN': 3, 'OE.AUDIT': 2, 'OE.ALARM': 3, 'OE.POLICIES_CONTINUITY': 2, 'OE.ADMIN_CREDENTIALS_SECURE': 3, 'OE.PHYSICAL': 2, 'OE.NO_GENERAL_PURPOSE': 2, 'OE.TOE_INTEGRITY': 7, 'OE.TIME_TOE': 3, 'OE.TOE_ERASURE': 5, 'OE.TOE_PRODUCTION': 3, 'OE.NO_THRU_TRAFFIC_PROTECTION': 2, 'OE.SECURED_MANAGEMENT_DEVICES': 4, 'OE.ACCESS_CONTROL_MANAGEMENT_DEVICES': 2, 'OE.PHYSICAL_ENV_MANAGEMENT_DEVICES': 3, 'OE.AUDIT_RECORD': 3, 'OE.LMGT_CONNECTION': 5, 'OE.SS_MMC_TO_TOE': 5, 'OE.DATA_TRANSPORTATION': 4, 'OE.UPDATES': 4, 'OE.SECURED_MANAGEMENT_': 1, 'OE.ACCESS_CONTROL_MANA': 1, 'OE.PHYSICAL_ENV_MANAGEM': 1, 'OE.ADMIN_CREDENTIALS_SEC': 1, 'OE.ACCESS_CONTROL_MANAGEMENT_DEVICE': 2, 'OE.ACCESS_CONTROL_MANAGEMENT_D': 1, 'OE.PHYSICAL_ENV_MANAGEMENT_DEVIC': 1}}, 'vendor': {'STMicroelectronics': {'STM': 26}, 'Thales': {'Thales': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 18}}, 'constructions': {'MAC': {'HMAC': 3, 'HMAC-SHA-256': 1, 'HMAC-SHA-384': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 25}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'DH': 4, 'Diffie-Hellman': 7}, 'DSA': {'DSA': 27}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 5, 'SHA-256': 2, 'SHA-384': 2, 'SHA384': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 8}, 'KEX': {'Key Exchange': 1}, 'KA': {'KA': 1}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'SSL': {'SSL': 5, 'SSL 2.0': 1, 'SSL 3.0': 2, 'SSL2.0': 1}, 'TLS': {'TLS': 53, 'TLS 1.2': 5, 'TLS 1.1': 4, 'TLS 1.0': 2}}, 'PACE': {'PACE': 2}, 'IKE': {'IKE': 23, 'IKEv2': 20, 'IKEv1': 5}, 'IPsec': {'IPsec': 14}}, 'randomness': {'PRNG': {'DRBG': 4}, 'RNG': {'RBG': 6}}, 'cipher_mode': {'CBC': {'CBC': 9}, 'CTR': {'CTR': 15}, 'GCM': {'GCM': 23}, 'XTS': {'XTS': 8}}, 'ecc_curve': {'NIST': {'curve P-256': 1, 'P-028': 1, 'P-256': 1, 'secp256r1': 8, 'secp384r1': 2, 'secp521r1': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384': 2}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 33}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-4': 1}, 'PKCS': {'PKCS #1': 1}, 'RFC': {'RFC 4303': 2, 'RFC 4106': 2, 'RFC 4109': 1, 'RFC 4304': 1, 'RFC 4868': 3, 'RFC 7296': 3, 'RFC 5282': 2, 'RFC 4945': 2, 'RFC 5246': 4, 'RFC 4346': 2, 'RFC 6125': 2, 'RFC 5280': 5, 'RFC 6960': 1, 'RFC 5759': 2, 'RFC 2986': 2, 'RFC 4301': 1, 'RFC5289': 2}, 'ISO': {'ISO/IEC 9796-2': 1, 'ISO/IEC 9797-': 2, 'ISO/IEC 18031:2011': 4}, 'X509': {'X.509': 12}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'Out of scope': 1, '. Hardware equipment is out of scope of the Target of Evaluation described in this Security Target': 1, 'of the Mistral system are considered as part of the operational environment. Hardware equipment is out of scope of the Target of Evaluation described in this Security Target. Following enabling elements, the': 1, 'ating System Remote Admin Interface VS9 Management Center Monitoring tools TPM Target of evaluation Out of scope of evaluation SECURITY TARGET FOR MISTRAL VS9.0 GATEWAY SOFTWARE (CDS) MISTRAL VS9.0 GATEWAY': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '6ea6e2aa704b3d8bdb34e2155062937191ae5ed658c1190b684465b8addfb87c', 'st_pdf_hash': '52f3a871fc949001f97f41be5a966d3b858bf24f026f15932a8ff80d61bd2ea7', 'report_txt_hash': '5c26a2ac3e13b31da65c849626d4c141dc5245719de7ae27ff349ffead51f2c6', 'st_txt_hash': 'ae3b67c9348e1204359853a3278316c94ca6066b0de37c90f55a224b4b56d716'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'DES': 3}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'TLS': 1}, 'rules_randomness': {}, 'rules_tee': {'SE': 1}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_block_cipher_modes': {'__insert__': {'XTS': 8}}, 'rules_ecc_curves': {'__insert__': {'P-028': 1, 'P-256': 1}}} data.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['9.0.7.2']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Logiciel Mistral Gateway IPSec version 9.0.7.2 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/certificat-2021_32.pdf",
  "dgst": "2edfcbada0ee3f6a",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2021/32",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "9.0.7.2"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Thal\u00e8s Communications",
  "manufacturer_web": "https://www.thalescomminc.com/",
  "name": "Logiciel Mistral Gateway IPSec version 9.0.7.2",
  "not_valid_after": "2026-06-28",
  "not_valid_before": "2021-06-28",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "certificat-2021_32.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2021/32": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.3": 3
        },
        "AVA": {
          "AVA_VAN.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 3": 1,
          "EAL2": 1,
          "EAL3": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IPsec": {
          "IPsec": 1
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "OPPIDA": {
          "OPPIDA": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "",
      "/CreationDate": "D:20210720171317+02\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20210720171317+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 11.0 (Windows)",
      "/Title": "",
      "pdf_file_size_bytes": 299643,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "anssi-cc-2021_32fr.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2021/32": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_FLR": 2,
          "ALC_FLR.3": 3,
          "ALC_LCD": 1,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.3": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 3,
          "EAL 5": 1,
          "EAL 7": 1,
          "EAL2": 3,
          "EAL3": 2,
          "EAL4": 1
        },
        "ITSEC": {
          "ITSEC E3 El\u00e9mentaire": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 1
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "OPPIDA": {
          "OPPIDA": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "D:20210720171215+02\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20210720171215+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 11.0 (Windows)",
      "/Title": "",
      "pdf_file_size_bytes": 188301,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 13
    },
    "st_filename": "anssi-cible-cc-2021_32en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 7
          }
        },
        "FF": {
          "DH": {
            "DH": 2,
            "Diffie-Hellman": 7
          }
        }
      },
      "cc_cert_id": {
        "NL": {
          "CC-01": 1,
          "CC-02": 2,
          "CC-03": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.ACCESS_CONTROL_MANAGEMENT_DE": 1,
          "A.ACCESS_CONTROL_MANAGEMENT_DEVICES": 1,
          "A.ADMINISTRATION_NETWORK": 1,
          "A.ADMIN_CREDENTIALS_SECURE": 2,
          "A.ALARM": 2,
          "A.AUDIT": 2,
          "A.DATA_TRANSPORTATION": 2,
          "A.LIMITED_FUNCTIONALITY": 2,
          "A.NO_THRU_TRAFFIC_PROTECTION": 1,
          "A.NO_TRU_TRAFFIC_PROTECTION": 1,
          "A.PHYSICAL_ENV_MANAGEMENT_DEVIC": 1,
          "A.PHYSICAL_ENV_MANAGEMENT_DEVICES": 1,
          "A.PHYSICAL_PROTECTION": 1,
          "A.POLICIES_CONTINUITY": 1,
          "A.REGULAR_UPDATES": 2,
          "A.SECURED_MANAGEMENT_DEVICES": 1,
          "A.SS_MMC_TO_TOE": 1,
          "A.TOE_ERASURE": 1,
          "A.TRUSTED_ADMINISTRATOR": 1
        },
        "O": {
          "O.AUDIT": 14,
          "O.AUDIT_PROTECTION": 5,
          "O.AUTHENTICATION_FAILURE": 9,
          "O.BOOT_CONTROL": 5,
          "O.CERTIFICATE_INJECTION": 4,
          "O.CRYPTO_PERIOD": 8,
          "O.CRYPTO_REGULATION": 7,
          "O.DATA_ERASURE": 8,
          "O.DISPLAY_BANNER": 6,
          "O.LOCAL_DATA_PROTECTION": 14,
          "O.MANAGEMENT": 7,
          "O.POL_DEFAULT": 12,
          "O.POL_FILTERING": 8,
          "O.PROTECTED_COMMUNICATI": 1,
          "O.PROTECTED_COMMUNICATION": 2,
          "O.PROTECTED_COMMUNICATIONS": 12,
          "O.RESIDUAL_INFORMATION_C": 1,
          "O.RESIDUAL_INFORMATION_CLEAR": 4,
          "O.ROLES": 10,
          "O.SELF_TEST": 11,
          "O.SESSION_LOCK": 4,
          "O.SOFTWARE_UPDATES": 8,
          "O.SUPERVISION": 6,
          "O.SUPERVISION_IMPACT": 8,
          "O.TIME_BASE": 4,
          "O.VIEW_RULES": 11
        },
        "OE": {
          "OE.ACCESS_CONTROL_MANA": 1,
          "OE.ACCESS_CONTROL_MANAGEMENT_D": 1,
          "OE.ACCESS_CONTROL_MANAGEMENT_DEVICE": 2,
          "OE.ACCESS_CONTROL_MANAGEMENT_DEVICES": 2,
          "OE.ADMIN_CREDENTIALS_SEC": 1,
          "OE.ADMIN_CREDENTIALS_SECURE": 3,
          "OE.ALARM": 3,
          "OE.AUDIT": 2,
          "OE.AUDIT_RECORD": 3,
          "OE.DATA_TRANSPORTATION": 4,
          "OE.LMGT_CONNECTION": 5,
          "OE.NO_GENERAL_PURPOSE": 2,
          "OE.NO_THRU_TRAFFIC_PROTECTION": 2,
          "OE.PHYSICAL": 2,
          "OE.PHYSICAL_ENV_MANAGEM": 1,
          "OE.PHYSICAL_ENV_MANAGEMENT_DEVIC": 1,
          "OE.PHYSICAL_ENV_MANAGEMENT_DEVICES": 3,
          "OE.POLICIES_CONTINUITY": 2,
          "OE.SECURED_MANAGEMENT_": 1,
          "OE.SECURED_MANAGEMENT_DEVICES": 4,
          "OE.SS_MMC_TO_TOE": 5,
          "OE.TIME_TOE": 3,
          "OE.TOE_ERASURE": 5,
          "OE.TOE_INTEGRITY": 7,
          "OE.TOE_PRODUCTION": 3,
          "OE.TRUSTED_ADMIN": 3,
          "OE.UPDATES": 4
        },
        "T": {
          "T.MISUSE": 5,
          "T.PASSWORD_CRACKING": 5,
          "T.RESIDUAL_DATA": 5,
          "T.SECURITY_FUNCTIONALITY": 2,
          "T.SECURITY_FUNCTIONALITY_COMPROMISE": 3,
          "T.SECURITY_FUNCTIONALITY_FAILURE": 3,
          "T.TIME_BASE": 3,
          "T.TOE_CAPTURE": 5,
          "T.UNAUTHORIZED_ADMINISTRATOR_ACCESS": 3,
          "T.UNDETECTED_ACTIVITY": 5,
          "T.UNTRUSTED_COMMUNICATI": 2,
          "T.UNTRUSTED_COMMUNICATION_CHANNELS": 3,
          "T.UPDATE_COMPROMISE": 5,
          "T.USER_DATA_REUSE": 3,
          "T.WEAK_AUTHENTICATION_EN": 2,
          "T.WEAK_AUTHENTICATION_ENDPOINTS": 3,
          "T.WEAK_CRYPTOGRAPHY": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 6,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 2,
          "ADV_FSP.3": 9,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.2": 3,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 10,
          "AGD_PRE.1": 4
        },
        "ALC": {
          "ALC_CMC.3": 2,
          "ALC_CMS.1": 1,
          "ALC_CMS.3": 2,
          "ALC_DEL.1": 2,
          "ALC_DVS.1": 3,
          "ALC_FLR.3": 6,
          "ALC_LCD.1": 4
        },
        "ASE": {
          "ASE_CCL.1": 2,
          "ASE_ECD.1": 5,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 4,
          "ASE_TSS.1": 2
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 4,
          "ATE_DPT.1": 3,
          "ATE_FUN.1": 6,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.3": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 4,
          "EAL3 augmented": 1,
          "EAL3+": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 16,
          "FAU_GEN.1": 16,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 5,
          "FAU_GEN.2.1": 1,
          "FAU_STG": 6,
          "FAU_STG.1": 1,
          "FAU_STG.3": 1,
          "FAU_STG_EXT": 13,
          "FAU_STG_EXT.1": 13,
          "FAU_STG_EXT.1.1": 2,
          "FAU_STG_EXT.1.2": 2,
          "FAU_STG_EXT.1.3": 4,
          "FAU_STG_EXT.2": 2,
          "FAU_STG_EXT.4": 3
        },
        "FCO": {
          "FCO_CPC_EXT": 2,
          "FCO_CPC_EXT.1": 12,
          "FCO_CPC_EXT.1.1": 3,
          "FCO_CPC_EXT.1.2": 3,
          "FCO_CPC_EXT.1.3": 3
        },
        "FCS": {
          "FCS_CKM": 2,
          "FCS_CKM.1": 48,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 13,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.4": 23,
          "FCS_CKM.4.1": 1,
          "FCS_CKM_EXT": 13,
          "FCS_CKM_EXT.5": 17,
          "FCS_CKM_EXT.5.1": 1,
          "FCS_CKM_EXT.5.2": 1,
          "FCS_CKM_EXT.5.3": 1,
          "FCS_COP": 101,
          "FCS_COP.1": 18,
          "FCS_RBG_EXT": 2,
          "FCS_RBG_EXT.1": 21,
          "FCS_RBG_EXT.1.1": 2,
          "FCS_RBG_EXT.1.2": 2,
          "FCS_TLSC_EXT": 4,
          "FCS_TLSC_EXT.1": 1,
          "FCS_TLSC_EXT.2": 10,
          "FCS_TLSC_EXT.2.1": 2,
          "FCS_TLSC_EXT.2.2": 2,
          "FCS_TLSC_EXT.2.3": 2,
          "FCS_TLSC_EXT.2.4": 2,
          "FCS_TLSC_EXT.2.5": 2,
          "FCS_TLSS_EXT": 4,
          "FCS_TLSS_EXT.2": 6,
          "FCS_TLSS_EXT.2.1": 2,
          "FCS_TLSS_EXT.2.2": 2,
          "FCS_TLSS_EXT.2.3": 2,
          "FCS_TLSS_EXT.2.4": 2,
          "FCS_TLSS_EXT.2.5": 2,
          "FCS_TLSS_EXT.2.6": 2
        },
        "FDP": {
          "FDP_ACC.1": 5,
          "FDP_ETC": 2,
          "FDP_ETC.2": 8,
          "FDP_IFC": 19,
          "FDP_IFC.1": 9,
          "FDP_IFF": 16,
          "FDP_IFF.1": 14,
          "FDP_ITC": 13,
          "FDP_ITC.1": 16,
          "FDP_ITC.2": 26,
          "FDP_RIP.2": 5,
          "FDP_RIP.2.1": 1,
          "FDP_UCT.1": 8,
          "FDP_UCT.1.1": 1,
          "FDP_UIT.1": 10,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL.1": 6,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_PMG_EXT": 2,
          "FIA_PMG_EXT.1": 9,
          "FIA_PMG_EXT.1.1": 2,
          "FIA_UAU.1": 2,
          "FIA_UAU.6": 6,
          "FIA_UAU.6.1": 1,
          "FIA_UAU.7": 7,
          "FIA_UAU.7.1": 1,
          "FIA_UAU_EXT": 2,
          "FIA_UAU_EXT.2": 10,
          "FIA_UAU_EXT.2.1": 2,
          "FIA_UIA": 1,
          "FIA_UIA_EXT": 4,
          "FIA_UIA_EXT.1": 14,
          "FIA_UIA_EXT.1.1": 2,
          "FIA_UIA_EXT.1.2": 2,
          "FIA_UID.1": 5,
          "FIA_UID.2": 8,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MOF": 10,
          "FMT_MOF.1": 2,
          "FMT_MSA.1": 1,
          "FMT_MSA.3": 14,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 8,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 12,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 4,
          "FMT_SMR.2": 7,
          "FMT_SMR.2.1": 1,
          "FMT_SMR.2.2": 1,
          "FMT_SMR.2.3": 1
        },
        "FPT": {
          "FPT_APW_EXT": 2,
          "FPT_APW_EXT.1": 10,
          "FPT_APW_EXT.1.1": 2,
          "FPT_APW_EXT.1.2": 2,
          "FPT_FLS.1": 6,
          "FPT_FLS.1.1": 1,
          "FPT_PTD": 1,
          "FPT_RCV.1": 5,
          "FPT_RCV.1.1": 1,
          "FPT_RCV.2": 5,
          "FPT_RCV.2.1": 1,
          "FPT_RCV.2.2": 1,
          "FPT_SDP_EXT": 3,
          "FPT_SDP_EXT.2": 10,
          "FPT_SDP_EXT.2.1": 2,
          "FPT_SDP_EXT.2.2": 2,
          "FPT_SKP_EXT": 2,
          "FPT_SKP_EXT.1": 9,
          "FPT_SKP_EXT.1.1": 3,
          "FPT_STM": 2,
          "FPT_STM.1": 1,
          "FPT_STM_EXT": 2,
          "FPT_STM_EXT.1": 15,
          "FPT_STM_EXT.1.1": 2,
          "FPT_STM_EXT.1.2": 2,
          "FPT_TDC": 11,
          "FPT_TDC.1": 7,
          "FPT_TST_EXT": 2,
          "FPT_TST_EXT.1": 9,
          "FPT_TST_EXT.1.1": 2,
          "FPT_TUD_EXT": 2,
          "FPT_TUD_EXT.1": 10,
          "FPT_TUD_EXT.1.1": 2,
          "FPT_TUD_EXT.1.2": 2,
          "FPT_TUD_EXT.1.3": 2
        },
        "FTA": {
          "FTA_SSL": 1,
          "FTA_SSL.3": 6,
          "FTA_SSL.3.1": 1,
          "FTA_SSL.4": 6,
          "FTA_SSL.4.1": 1,
          "FTA_SSL_EXT": 3,
          "FTA_SSL_EXT.1": 11,
          "FTA_SSL_EXT.1.1": 2,
          "FTA_TAB.1": 9,
          "FTA_TAB.1.1": 1
        },
        "FTP": {
          "FTP_ITC": 1,
          "FTP_ITC.1": 19,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 10,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "Out of scope": 1,
          "System Remote Admin Interface VS9 Management Center Monitoring tools TPM Target of evaluation Out of scope of evaluation SECURITY TARGET FOR MISTRAL VS9.0 GATEWAY SOFTWARE (CDS) MISTRAL VS9.0 GATEWAY": 1,
          "of the Mistral system are considered as part of the operational environment. Hardware equipment is out of scope of the Target of Evaluation described in this Security Target. Following enabling elements, the": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CTR": {
          "CTR": 2
        },
        "GCM": {
          "GCM": 3
        },
        "XTS": {
          "XTS": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 23,
          "IKEv1": 5,
          "IKEv2": 21
        },
        "IPsec": {
          "IPsec": 15
        },
        "SSH": {
          "SSH": 2
        },
        "TLS": {
          "DTLS": {
            "DTLS": 1
          },
          "SSL": {
            "SSL": 4,
            "SSL 2.0": 1,
            "SSL 3.0": 2,
            "SSL2.0": 1
          },
          "TLS": {
            "TLS": 53,
            "TLS 1.0": 2,
            "TLS 1.1": 4,
            "TLS 1.2": 5
          }
        },
        "VPN": {
          "VPN": 50
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 1
        },
        "MAC": {
          "MAC": 3
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 1,
          "curve P-256": 1,
          "secp256r1": 8,
          "secp384r1": 2,
          "secp521r1": 2
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RBG": 2
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS PUB 186-4": 1
        },
        "ISO": {
          "ISO/IEC 18031:2011": 4,
          "ISO/IEC 9796-2": 1,
          "ISO/IEC 9797-": 2
        },
        "PKCS": {
          "PKCS #1": 1
        },
        "RFC": {
          "RFC 2986": 2,
          "RFC 4106": 2,
          "RFC 4109": 1,
          "RFC 4301": 2,
          "RFC 4303": 2,
          "RFC 4304": 1,
          "RFC 4346": 2,
          "RFC 4868": 3,
          "RFC 4945": 2,
          "RFC 5246": 4,
          "RFC 5280": 5,
          "RFC 5282": 2,
          "RFC 5759": 2,
          "RFC 6125": 2,
          "RFC 6960": 1,
          "RFC 7296": 3,
          "RFC5289": 2
        },
        "X509": {
          "X.509": 12
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 18
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 3,
            "HMAC-SHA-256": 1,
            "HMAC-SHA-384": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 2
        }
      },
      "vendor": {
        "Thales": {
          "Thales": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "T0159776",
      "/CreationDate": "D:20210607172705+02\u002700\u0027",
      "/Creator": "PDFCreator Free 4.2.0",
      "/Keywords": "",
      "/ModDate": "D:20210607172705+02\u002700\u0027",
      "/Producer": "GPL Ghostscript 9.52",
      "/Subject": "",
      "/Title": "CDS_Mistral IPVS9.0_63535113-306_-Llite",
      "pdf_file_size_bytes": 981294,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 119
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cc-2021_32fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.3",
      "EAL3+",
      "ALC_FLR.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/anssi-cible-cc-2021_32en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "b30ee8c21c6a8dd3a3827f6d4b70b1154d04b67d23c471194d94fa7eb81dd8aa",
      "txt_hash": "5eef7f2750f406e3cf56264638bb57fa8e9e72fb0b5189fd4251eb6b6f05b679"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "6ea6e2aa704b3d8bdb34e2155062937191ae5ed658c1190b684465b8addfb87c",
      "txt_hash": "5c26a2ac3e13b31da65c849626d4c141dc5245719de7ae27ff349ffead51f2c6"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "52f3a871fc949001f97f41be5a966d3b858bf24f026f15932a8ff80d61bd2ea7",
      "txt_hash": "ae3b67c9348e1204359853a3278316c94ca6066b0de37c90f55a224b4b56d716"
    }
  },
  "status": "active"
}