Huawei GaussDB 100 Version V300R001C00B300 Release 3da6647
CSV information ?
Status | active |
---|---|
Valid from | 03.01.2021 |
Valid until | 03.01.2026 |
Scheme | 🇪🇸 ES |
Manufacturer | Huawei Technologies Co. Ltd. |
Category | Databases |
Security level | EAL2+, ALC_FLR.2 |
Protection profiles |
Heuristics summary ?
Certificate ?
Extracted keywords
Vendor
Huawei, Huawei Technologies CoSecurity level
EAL 4, EAL 2, EAL2Claims
O.E, T.I, A.USecurity Assurance Requirements (SAR)
ALC_FLR, ALC_FLR.2Protection profiles
BSI-CC-PP-0088-V2Evaluation facilities
DEKRA Testing and CertificationFile metadata
Creation date: | D:20201214103144+01'00' |
---|---|
Pages: | 2 |
Certification report ?
Extracted keywords
Hash functions
SHA-256Vendor
Huawei, Huawei Technologies CoSecurity level
EAL2, EAL 1, EAL 4, EAL 2, ITSEC EvaluationClaims
A.USecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, AGD_PRE, AGD_OPE, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ALC_FLR, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SEL.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_REV.1, FMT_SMF.1, FMT_SMR.1, FPT_TRC.1, FTA_MCS.1, FTA_TSE.1Protection profiles
BSI-CC-PP-0088-V2Certificates
2019-20-INF-3379-v1Evaluation facilities
DEKRA Testing and CertificationFile metadata
Creation date: | D:20210203130801+01'00' |
---|---|
Modification date: | D:20210203130801+01'00' |
Pages: | 15 |
Creator: | Microsoft® Word 2016 |
Producer: | Microsoft® Word 2016 |
References
No references.
Security target ?
Extracted keywords
Hash functions
SHA256Trusted Execution Environments
SEVendor
Huawei, Huawei Technologies CoSecurity level
EAL 2Claims
O.ADMIN_ROLE, O.AUDIT, O.DISCRETIONARY, O.MANAGE, O.MEDIATE, O.RESIDUAL_INFORMATION, O.TOE_ACCESS, O.AUDIT_GENERATION, O.RESIDUAL, O.TOE_ACCE, O.ADMIN_RO, O.DISCRETIO, O.DISCRETIONARY_ACCESS, O.RESIDUAL_, O.AUDIT_GE, O.DISCRETI, T.ACCESS_TSFDATA, T.ACCESS_TSFFUNC, T.IA_MASQUERADE, T.IA_USER, T.RESIDUAL_DATA, T.TSF_COMPROMISE, T.UNAUTHORIZED_ACCESS, T.ACCESS_T, T.IA_MASQU, T.RESIDUAL, T.TSF_COMP, T.UNAUTHO, T.TSF, A.PHYSICAL, A.AUTHUSER, A.MANAGE, A.TRAINEDUSER, A.NO_GENERAL_PURPOSE, A.SUPPORT, A.CONNECT, A.AUTHUSE, A.NO_GENER, A.PEER_FUN, A.TRAINED-, OE.ADMIN, OE.INFO_PROTECT, OE.NO_GENERAL_PURPOSE, OE.PHYSICAL, OE.IT_REMOTE, OE.IT_TRUSTED, OE.IT_TRUSTED_SYSTEM, OE.NO_GENE, OE.NO_GENERAL, OE.INFO, OE.IT_REMOT, OE.IT_TRUST, OE.INFO_PRO, OSPSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SEL.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SEL.1.1, FAU_MTD.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FDP_IFC.1, FIA_USB.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_REV.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1.1, FMT_MSA.1.1, FPT_TRC.1, FPT_TRC.1.1, FPT_TRC.1.2, FPT_STM.1, FPT_ITT.1, FTA_MCS.1, FTA_TSE.1, FTA_TSE.1.1, FTA_MCS.1.1Protection profiles
BSI-CC-PP-0088-V2Certification process
out of scope, at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE, EulerOS), x86_64 ● EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE, IP addresses, and dates. 2.3.3 Non-TOE Hardware And Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: ● CPU (higher than 4 cores, at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE. In addition, the TOE can be executed in other supported OSs (that, 0SP5 (EulerOS), x86_64 ● EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE. The Software of Python v2.7.5 is also out of scope and thus not, in the TOE. The Software of Putty v0.73 is also out of scope and thus not included in the TOE. The Software of UnixODBC-2.3.7 is also out of scope and thus notCertification process
out of scope, at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE, EulerOS), x86_64 ● EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE, IP addresses, and dates. 2.3.3 Non-TOE Hardware And Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: ● CPU (higher than 4 cores, at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE. In addition, the TOE can be executed in other supported OSs (that, 0SP5 (EulerOS), x86_64 ● EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE. The Software of Python v2.7.5 is also out of scope and thus not, in the TOE. The Software of Putty v0.73 is also out of scope and thus not included in the TOE. The Software of UnixODBC-2.3.7 is also out of scope and thus notReferences
No references.
Heuristics ?
Extracted SARs
ALC_FLR.2, AGD_PRE.1, ASE_REQ.2, ASE_OBJ.2, AGD_OPE.1, ALC_CMS.2, ALC_CMC.2, ASE_TSS.1, AVA_VAN.2, ASE_CCL.1, ASE_INT.1, ALC_DEL.1, ASE_ECD.1, ATE_FUN.1, ATE_COV.1, ASE_SPD.1, ADV_TDS.1, ATE_IND.2, ADV_ARC.1, ADV_FSP.2Scheme data ?
Product | Huawei GaussDB 100 Version V300R001C00B300 Release 3da6647 | |
---|---|---|
Product Link | https://oc.ccn.cni.es/en/certified-products/certified-products/450-huawei-gaussdb-100-version-v300r001c00b300-release-3da6647 | |
Category | Database management systems | |
Manufacturer | Huawei Technologies Co., Ltd. | |
Certification Date | 2021-01-03 |
References ?
No references are available for this certificate.
Updates ?
-
15.02.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '1350af3a2061b9adbd165531f295f29c6fcb74dd7547538f80192f5dedcadbd0', 'txt_hash': '80c5162f24d0e5aa9817d107d75ebe4b0ba69e13298926bb3dd1f4c8a9b0ee0c'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': False, 'pdf_hash': '51c62c983bc5f321ec3bc03f90579bbbeb6053bf54913cfac0ad8106aa4655cf', 'txt_hash': '3237f13b0c645a8517c2e3e464edd91f49e2fb7e5c6619d9f88dda20dae0c937'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b3fcee104ade3d57b60be1f02b6a4e2b42e47a5572a9c7e3aaa12038cd39f689', 'txt_hash': '4851a143c901fee22c0357227a905396ac47e42f2cab204d70dbe9167bfe648c'}}
. - The following properties were deleted:
['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash']
.
The PDF extraction data was updated.
- The following values were inserted:
{'cert_metadata': {'pdf_file_size_bytes': 734385, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20201214103144+01'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0088-V2': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL 2': 1, 'EAL2': 1}}, 'cc_sar': {'ALC': {'ALC_FLR': 2, 'ALC_FLR.2': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.E': 1}, 'T': {'T.I': 1}, 'A': {'A.U': 1}}, 'vendor': {'Huawei': {'Huawei': 3, 'Huawei Technologies Co': 2}}, 'eval_facility': {'DEKRA': {'DEKRA Testing and Certification': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': '2019-20_Certificate.pdf'}
. - The report_frontpage property was set to
{}
. - The st_frontpage property was set to
None
.
- The following values were inserted:
-
08.01.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Huawei GaussDB 100 Version V300R001C00B300 Release 3da6647', 'product_link': 'https://oc.ccn.cni.es/en/certified-products/certified-products/450-huawei-gaussdb-100-version-v300r001c00b300-release-3da6647', 'category': 'Database management systems', 'manufacturer': 'Huawei Technologies Co., Ltd.', 'certification_date': '2021-01-03'}
.
- The scheme_data property was set to
-
05.01.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
04.01.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'annotated_references': None}
.
- The following values were inserted:
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': {'product': 'Huawei GaussDB 100 Version V300R001C00B300 Release 3da6647', 'product_link': 'https://oc.ccn.cni.es/en/certified-products/certified-products/450-huawei-gaussdb-100-version-v300r001c00b300-release-3da6647', 'category': 'Database management systems', 'manufacturer': 'Huawei Technologies Co., Ltd.', 'certification_date': '2021-01-03'}}
.
- The following values were inserted:
-
11.02.2023 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.cc.CCCertificate
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.InternalState
. - The following properties were deleted:
['errors']
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.PdfData
.
The computed heuristics were updated.
- The following values were inserted:
{'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The _type property was set to
sec_certs.sample.cc.CCCertificate.Heuristics
. - The following properties were deleted:
['direct_dependency_cves', 'indirect_dependency_cves']
.
- The new value is
-
26.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The errors property was set to
['Failed to read metadata of certs/targets/pdf/5af5a1b535422b51.pdf, error: PDF metadata unavailable']
. - The st_pdf_hash property was set to
51c62c983bc5f321ec3bc03f90579bbbeb6053bf54913cfac0ad8106aa4655cf
. - The st_txt_hash property was set to
3237f13b0c645a8517c2e3e464edd91f49e2fb7e5c6619d9f88dda20dae0c937
.
The PDF extraction data was updated.
- The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0088-V2': 3}}, 'cc_security_level': {'EAL': {'EAL 2': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_PRE': 1, 'AGD_OPE': 1, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 2, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 11, 'FAU_GEN.2': 9, 'FAU_SEL.1': 9, 'FAU_GEN.1.1': 2, 'FAU_GEN.1.2': 2, 'FAU_GEN.2.1': 2, 'FAU_SEL.1.1': 2, 'FAU_MTD.1': 2}, 'FDP': {'FDP_ACC.1': 18, 'FDP_ACF.1': 16, 'FDP_RIP.1': 9, 'FDP_ACC.1.1': 2, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 2, 'FDP_RIP.1.1': 2, 'FDP_IFC.1': 1}, 'FIA': {'FIA_USB.1': 5, 'FIA_ATD.1': 15, 'FIA_UAU.1': 8, 'FIA_UID.1': 14, 'FIA_ATD.1.1': 2, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 1, 'FIA_UID.1.1': 2, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MOF.1': 9, 'FMT_MSA.1': 10, 'FMT_MSA.3': 10, 'FMT_MTD.1': 8, 'FMT_SMF.1': 14, 'FMT_SMR.1': 20, 'FMT_REV.1': 11, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 2, 'FMT_MTD.1.1': 2, 'FMT_REV.1.1': 4, 'FMT_REV.1.2': 4, 'FMT_SMF.1.1': 2, 'FMT_SMR.1.1': 2, 'FMT_SMR.1.2': 1, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 1}, 'FPT': {'FPT_TRC.1': 10, 'FPT_TRC.1.1': 2, 'FPT_TRC.1.2': 2, 'FPT_STM.1': 1, 'FPT_ITT.1': 1}, 'FTA': {'FTA_MCS.1': 9, 'FTA_TSE.1': 8, 'FTA_TSE.1.1': 2, 'FTA_MCS.1.1': 1}}, 'cc_claims': {'O': {'O.ADMIN_ROLE': 7, 'O.AUDIT': 2, 'O.DISCRETIONARY': 2, 'O.MANAGE': 13, 'O.MEDIATE': 9, 'O.RESIDUAL_INFORMATION': 7, 'O.TOE_ACCESS': 10, 'O.AUDIT_GENERATION': 3, 'O.RESIDUAL': 3, 'O.TOE_ACCE': 9, 'O.ADMIN_RO': 4, 'O.DISCRETIO': 2, 'O.DISCRETIONARY_ACCESS': 4, 'O.RESIDUAL_': 1, 'O.AUDIT_GE': 2, 'O.DISCRETI': 1}, 'T': {'T.ACCESS_TSFDATA': 3, 'T.ACCESS_TSFFUNC': 1, 'T.IA_MASQUERADE': 3, 'T.IA_USER': 2, 'T.RESIDUAL_DATA': 3, 'T.TSF_COMPROMISE': 1, 'T.UNAUTHORIZED_ACCESS': 3, 'T.ACCESS_T': 2, 'T.IA_MASQU': 2, 'T.RESIDUAL': 1, 'T.TSF_COMP': 1, 'T.UNAUTHO': 2, 'T.TSF': 1}, 'A': {'A.PHYSICAL': 4, 'A.AUTHUSER': 1, 'A.MANAGE': 4, 'A.TRAINEDUSER': 1, 'A.NO_GENERAL_PURPOSE': 3, 'A.SUPPORT': 5, 'A.CONNECT': 3, 'A.AUTHUSE': 1, 'A.NO_GENER': 1, 'A.PEER_FUN': 1, 'A.TRAINED-': 1}, 'OE': {'OE.ADMIN': 10, 'OE.INFO_PROTECT': 11, 'OE.NO_GENERAL_PURPOSE': 3, 'OE.PHYSICAL': 8, 'OE.IT_REMOTE': 6, 'OE.IT_TRUSTED': 1, 'OE.IT_TRUSTED_SYSTEM': 5, 'OE.NO_GENE': 3, 'OE.NO_GENERAL': 2, 'OE.INFO': 5, 'OE.IT_REMOT': 4, 'OE.IT_TRUST': 4, 'OE.INFO_PRO': 4}, 'OSP': {'OSP': 1}}, 'vendor': {'Huawei': {'Huawei': 80, 'Huawei Technologies Co': 80}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 6, 'at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE': 1, 'EulerOS), x86_64 ● EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE': 1, 'IP addresses, and dates. 2.3.3 Non-TOE Hardware And Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: ● CPU (higher than 4 cores': 1, 'at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE. In addition, the TOE can be executed in other supported OSs (that': 1, '0SP5 (EulerOS), x86_64 ● EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE. The Software of Python v2.7.5 is also out of scope and thus not': 1, 'in the TOE. The Software of Putty v0.73 is also out of scope and thus not included in the TOE. The Software of UnixODBC-2.3.7 is also out of scope and thus not': 1}}}
. - The st_filename property was set to
2019-20_ST.pdf
.
- The st_download_ok property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/2019-20-INF-3379.pdf, code: 408', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/2019-20_ST.pdf, code: 408']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
- The st_download_ok property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was updated.
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was updated, with the
[[0, 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/2019-20-INF-3379.pdf, code: nok']]
values inserted.
- The errors property was updated, with the
-
24.12.2022 The certificate data changed.
Certificate changed
The cert_link was updated.
- The new value is
https://www.commoncriteriaportal.org/files/epfiles/2019-20_Certificate.pdf
.
The manufacturer_web was updated.
- The new value is
https://www.huawei.com
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['DBMS_PPV2.12']}}]}
.
- The new value is
-
23.12.2022 The certificate data changed.
Certificate changed
The cert_link was updated.
- The new value is
None
.
The manufacturer_web was updated.
- The new value is
None
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'DBMS_PPV2.12', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}
.
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The errors property was set to
['Failed to read metadata of certs/targets/pdf/5af5a1b535422b51.pdf, error: PDF metadata unavailable']
. - The st_pdf_hash property was set to
51c62c983bc5f321ec3bc03f90579bbbeb6053bf54913cfac0ad8106aa4655cf
. - The st_txt_hash property was set to
3237f13b0c645a8517c2e3e464edd91f49e2fb7e5c6619d9f88dda20dae0c937
.
The PDF extraction data was updated.
- The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0088-V2': 3}}, 'cc_security_level': {'EAL': {'EAL 2': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_PRE': 1, 'AGD_OPE': 1, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 2, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 11, 'FAU_GEN.2': 9, 'FAU_SEL.1': 9, 'FAU_GEN.1.1': 2, 'FAU_GEN.1.2': 2, 'FAU_GEN.2.1': 2, 'FAU_SEL.1.1': 2, 'FAU_MTD.1': 2}, 'FDP': {'FDP_ACC.1': 18, 'FDP_ACF.1': 16, 'FDP_RIP.1': 9, 'FDP_ACC.1.1': 2, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 2, 'FDP_RIP.1.1': 2, 'FDP_IFC.1': 1}, 'FIA': {'FIA_USB.1': 5, 'FIA_ATD.1': 15, 'FIA_UAU.1': 8, 'FIA_UID.1': 14, 'FIA_ATD.1.1': 2, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 1, 'FIA_UID.1.1': 2, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MOF.1': 9, 'FMT_MSA.1': 10, 'FMT_MSA.3': 10, 'FMT_MTD.1': 8, 'FMT_SMF.1': 14, 'FMT_SMR.1': 20, 'FMT_REV.1': 11, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 2, 'FMT_MTD.1.1': 2, 'FMT_REV.1.1': 4, 'FMT_REV.1.2': 4, 'FMT_SMF.1.1': 2, 'FMT_SMR.1.1': 2, 'FMT_SMR.1.2': 1, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 1}, 'FPT': {'FPT_TRC.1': 10, 'FPT_TRC.1.1': 2, 'FPT_TRC.1.2': 2, 'FPT_STM.1': 1, 'FPT_ITT.1': 1}, 'FTA': {'FTA_MCS.1': 9, 'FTA_TSE.1': 8, 'FTA_TSE.1.1': 2, 'FTA_MCS.1.1': 1}}, 'cc_claims': {'O': {'O.ADMIN_ROLE': 7, 'O.AUDIT': 2, 'O.DISCRETIONARY': 2, 'O.MANAGE': 13, 'O.MEDIATE': 9, 'O.RESIDUAL_INFORMATION': 7, 'O.TOE_ACCESS': 10, 'O.AUDIT_GENERATION': 3, 'O.RESIDUAL': 3, 'O.TOE_ACCE': 9, 'O.ADMIN_RO': 4, 'O.DISCRETIO': 2, 'O.DISCRETIONARY_ACCESS': 4, 'O.RESIDUAL_': 1, 'O.AUDIT_GE': 2, 'O.DISCRETI': 1}, 'T': {'T.ACCESS_TSFDATA': 3, 'T.ACCESS_TSFFUNC': 1, 'T.IA_MASQUERADE': 3, 'T.IA_USER': 2, 'T.RESIDUAL_DATA': 3, 'T.TSF_COMPROMISE': 1, 'T.UNAUTHORIZED_ACCESS': 3, 'T.ACCESS_T': 2, 'T.IA_MASQU': 2, 'T.RESIDUAL': 1, 'T.TSF_COMP': 1, 'T.UNAUTHO': 2, 'T.TSF': 1}, 'A': {'A.PHYSICAL': 4, 'A.AUTHUSER': 1, 'A.MANAGE': 4, 'A.TRAINEDUSER': 1, 'A.NO_GENERAL_PURPOSE': 3, 'A.SUPPORT': 5, 'A.CONNECT': 3, 'A.AUTHUSE': 1, 'A.NO_GENER': 1, 'A.PEER_FUN': 1, 'A.TRAINED-': 1}, 'OE': {'OE.ADMIN': 10, 'OE.INFO_PROTECT': 11, 'OE.NO_GENERAL_PURPOSE': 3, 'OE.PHYSICAL': 8, 'OE.IT_REMOTE': 6, 'OE.IT_TRUSTED': 1, 'OE.IT_TRUSTED_SYSTEM': 5, 'OE.NO_GENE': 3, 'OE.NO_GENERAL': 2, 'OE.INFO': 5, 'OE.IT_REMOT': 4, 'OE.IT_TRUST': 4, 'OE.INFO_PRO': 4}, 'OSP': {'OSP': 1}}, 'vendor': {'Huawei': {'Huawei': 80, 'Huawei Technologies Co': 80}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 6, 'at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE': 1, 'EulerOS), x86_64 ● EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE': 1, 'IP addresses, and dates. 2.3.3 Non-TOE Hardware And Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: ● CPU (higher than 4 cores': 1, 'at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE. In addition, the TOE can be executed in other supported OSs (that': 1, '0SP5 (EulerOS), x86_64 ● EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE. The Software of Python v2.7.5 is also out of scope and thus not': 1, 'in the TOE. The Software of Putty v0.73 is also out of scope and thus not included in the TOE. The Software of UnixODBC-2.3.7 is also out of scope and thus not': 1}}}
. - The st_filename property was set to
2019-20_ST.pdf
.
- The new value is
-
22.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/2019-20_ST.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
- The st_download_ok property was set to
-
05.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['DBMS_PPV2.12']}}]}
.
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': False, 'report_convert_garbage': False}
.
The PDF extraction data was updated.
- The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0088-V2': 3}}, 'cc_security_level': {'EAL': {'EAL 2': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_PRE': 1, 'AGD_OPE': 1, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 2, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 11, 'FAU_GEN.2': 9, 'FAU_SEL.1': 9, 'FAU_GEN.1.1': 2, 'FAU_GEN.1.2': 2, 'FAU_GEN.2.1': 2, 'FAU_SEL.1.1': 2, 'FAU_MTD.1': 2}, 'FDP': {'FDP_ACC.1': 18, 'FDP_ACF.1': 16, 'FDP_RIP.1': 9, 'FDP_ACC.1.1': 2, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 2, 'FDP_RIP.1.1': 2, 'FDP_IFC.1': 1}, 'FIA': {'FIA_USB.1': 5, 'FIA_ATD.1': 15, 'FIA_UAU.1': 8, 'FIA_UID.1': 14, 'FIA_ATD.1.1': 2, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 1, 'FIA_UID.1.1': 2, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MOF.1': 9, 'FMT_MSA.1': 10, 'FMT_MSA.3': 10, 'FMT_MTD.1': 8, 'FMT_SMF.1': 14, 'FMT_SMR.1': 20, 'FMT_REV.1': 11, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 2, 'FMT_MTD.1.1': 2, 'FMT_REV.1.1': 4, 'FMT_REV.1.2': 4, 'FMT_SMF.1.1': 2, 'FMT_SMR.1.1': 2, 'FMT_SMR.1.2': 1, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 1}, 'FPT': {'FPT_TRC.1': 10, 'FPT_TRC.1.1': 2, 'FPT_TRC.1.2': 2, 'FPT_STM.1': 1, 'FPT_ITT.1': 1}, 'FTA': {'FTA_MCS.1': 9, 'FTA_TSE.1': 8, 'FTA_TSE.1.1': 2, 'FTA_MCS.1.1': 1}}, 'cc_claims': {'O': {'O.ADMIN_ROLE': 7, 'O.AUDIT': 2, 'O.DISCRETIONARY': 2, 'O.MANAGE': 13, 'O.MEDIATE': 9, 'O.RESIDUAL_INFORMATION': 7, 'O.TOE_ACCESS': 10, 'O.AUDIT_GENERATION': 3, 'O.RESIDUAL': 3, 'O.TOE_ACCE': 9, 'O.ADMIN_RO': 4, 'O.DISCRETIO': 2, 'O.DISCRETIONARY_ACCESS': 4, 'O.RESIDUAL_': 1, 'O.AUDIT_GE': 2, 'O.DISCRETI': 1}, 'T': {'T.ACCESS_TSFDATA': 3, 'T.ACCESS_TSFFUNC': 1, 'T.IA_MASQUERADE': 3, 'T.IA_USER': 2, 'T.RESIDUAL_DATA': 3, 'T.TSF_COMPROMISE': 1, 'T.UNAUTHORIZED_ACCESS': 3, 'T.ACCESS_T': 2, 'T.IA_MASQU': 2, 'T.RESIDUAL': 1, 'T.TSF_COMP': 1, 'T.UNAUTHO': 2, 'T.TSF': 1}, 'A': {'A.PHYSICAL': 4, 'A.AUTHUSER': 1, 'A.MANAGE': 4, 'A.TRAINEDUSER': 1, 'A.NO_GENERAL_PURPOSE': 3, 'A.SUPPORT': 5, 'A.CONNECT': 3, 'A.AUTHUSE': 1, 'A.NO_GENER': 1, 'A.PEER_FUN': 1, 'A.TRAINED-': 1}, 'OE': {'OE.ADMIN': 10, 'OE.INFO_PROTECT': 11, 'OE.NO_GENERAL_PURPOSE': 3, 'OE.PHYSICAL': 8, 'OE.IT_REMOTE': 6, 'OE.IT_TRUSTED': 1, 'OE.IT_TRUSTED_SYSTEM': 5, 'OE.NO_GENE': 3, 'OE.NO_GENERAL': 2, 'OE.INFO': 5, 'OE.IT_REMOT': 4, 'OE.IT_TRUST': 4, 'OE.INFO_PRO': 4}, 'OSP': {'OSP': 1}}, 'vendor': {'Huawei': {'Huawei': 80, 'Huawei Technologies Co': 80}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 6, 'at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE': 1, 'EulerOS), x86_64 ● EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE': 1, 'IP addresses, and dates. 2.3.3 Non-TOE Hardware And Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: ● CPU (higher than 4 cores': 1, 'at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE. In addition, the TOE can be executed in other supported OSs (that': 1, '0SP5 (EulerOS), x86_64 ● EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE. The Software of Python v2.7.5 is also out of scope and thus not': 1, 'in the TOE. The Software of Putty v0.73 is also out of scope and thus not included in the TOE. The Software of UnixODBC-2.3.7 is also out of scope and thus not': 1}}}
.
- The new value is
-
04.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf', 'pp_link': None, 'pp_ids': None}]}
.
- The new value is
-
24.09.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was updated.
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': '2019-20-INF-3379.pdf', 'st_filename': '2019-20_ST.pdf'}
. - The st_frontpage property was set to
None
. - The report_keywords property was updated, with the
{'cc_sar': {'__insert__': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, '__update__': {'AGD': {'__insert__': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, '__update__': {'AGD_PRE': 2}}, 'ALC': {'__insert__': {'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, '__update__': {'ALC_FLR.2': 8}}}}, 'cc_sfr': {'__insert__': {'FAU': {'FAU_GEN.1': 1, 'FAU_GEN.2': 1, 'FAU_SEL.1': 1}, 'FDP': {'FDP_ACC.1': 1, 'FDP_ACF.1': 1, 'FDP_RIP.1': 1}, 'FIA': {'FIA_ATD.1': 1, 'FIA_UAU.1': 1, 'FIA_UID.1': 1}, 'FPT': {'FPT_TRC.1': 1}, 'FTA': {'FTA_MCS.1': 1, 'FTA_TSE.1': 1}}, '__update__': {'FMT': {'__insert__': {'FMT_MOF.1': 1, 'FMT_MSA.1': 1, 'FMT_MSA.3': 1, 'FMT_MTD.1': 1, 'FMT_SMF.1': 1, 'FMT_SMR.1': 1}}}}, 'tee_name': {}}
data. - The st_keywords property was set to
None
.
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['DBMS_PPV2.12']}}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}]}
.
- The new value is
-
17.07.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
['Failed to read metadata of certs/targets/pdf/5af5a1b535422b51.pdf, error: PDF metadata unavailable', 'Failed to read metadata of certs/targets/pdf/5af5a1b535422b51.pdf, error: PDF metadata unavailable']
.
The PDF extraction data was updated.
- The report_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteriaportal.org/', 'https://www.sogis.org/']}}
values inserted. - The report_keywords property was set to
{'cc_cert_id': {'ES': {'2019-20-INF-3379-v1': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0088-V2': 4}}, 'cc_security_level': {'EAL': {'EAL2': 8, 'EAL 1': 1, 'EAL 4': 2, 'EAL 2': 1}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'AGD': {'AGD_PRE': 4, 'AGD_OPE': 1}, 'ALC': {'ALC_FLR.2': 6, 'ALC_FLR': 2}}, 'cc_sfr': {'FMT': {'FMT_REV.1': 2}}, 'cc_claims': {'A': {'A.U': 5}}, 'vendor': {'Huawei': {'Huawei': 24, 'Huawei Technologies Co': 3}}, 'eval_facility': {'DEKRA': {'DEKRA Testing and Certification': 5}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0088-V2': 3}}, 'cc_security_level': {'EAL': {'EAL 2': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_PRE': 1, 'AGD_OPE': 1, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1, 'ALC_FLR.2': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 13, 'FAU_GEN.2': 9, 'FAU_SEL.1': 9, 'FAU_GEN.1.1': 2, 'FAU_GEN.1.2': 2, 'FAU_GEN.2.1': 2, 'FAU_SEL.1.1': 2, 'FAU_MTD.1': 2}, 'FDP': {'FDP_ACC.1': 19, 'FDP_ACF.1': 17, 'FDP_RIP.1': 9, 'FDP_ACC.1.1': 2, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_RIP.1.1': 2, 'FDP_IFC.1': 1}, 'FIA': {'FIA_USB.1': 4, 'FIA_ATD.1': 15, 'FIA_UAU.1': 8, 'FIA_UID.1': 16, 'FIA_ATD.1.1': 2, 'FIA_UAU.1.1': 2, 'FIA_UAU.1.2': 2, 'FIA_UID.1.1': 2, 'FIA_UID.1.2': 2}, 'FMT': {'FMT_MOF.1': 9, 'FMT_MSA.1': 11, 'FMT_MSA.3': 11, 'FMT_MTD.1': 9, 'FMT_SMF.1': 15, 'FMT_SMR.1': 23, 'FMT_REV.1': 13, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MTD.1.1': 2, 'FMT_REV.1.1': 4, 'FMT_REV.1.2': 4, 'FMT_SMF.1.1': 2, 'FMT_SMR.1.1': 2, 'FMT_SMR.1.2': 2, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 1}, 'FPT': {'FPT_TRC.1': 10, 'FPT_TRC.1.1': 2, 'FPT_TRC.1.2': 2, 'FPT_STM.1': 1, 'FPT_ITT.1': 2}, 'FTA': {'FTA_MCS.1': 9, 'FTA_TSE.1': 8, 'FTA_TSE.1.1': 2, 'FTA_MCS.1.1': 1, 'FTA_MCS.1.2': 1}}, 'cc_claims': {'O': {'O.ADMIN_ROLE': 7, 'O.AUDIT': 4, 'O.DISCRETIONARY': 2, 'O.MANAGE': 13, 'O.MEDIATE': 11, 'O.RESIDUAL_INFORMATION': 7, 'O.TOE_ACCESS': 12, 'O.AUDIT_GENERATION': 3, 'O.RESIDUAL': 3, 'O.TOE_ACCE': 9, 'O.ADMIN_RO': 4, 'O.DISCRETIO': 2, 'O.DISCRETIONARY_ACCESS': 4, 'O.RESIDUAL_': 1, 'O.AUDIT_GE': 2, 'O.DISCRETI': 1}, 'T': {'T.ACCESS_TSFDATA': 3, 'T.ACCESS_TSFFUNC': 3, 'T.IA_MASQUERADE': 3, 'T.IA_USER': 4, 'T.RESIDUAL_DATA': 3, 'T.TSF_COMPROMISE': 3, 'T.UNAUTHORIZED_ACCESS': 3, 'T.ACCESS_T': 2, 'T.IA_MASQU': 2, 'T.RESIDUAL': 1, 'T.TSF_COMP': 1, 'T.UNAUTHO': 2, 'T.TSF': 1}, 'A': {'A.PHYSICAL': 4, 'A.AUTHUSER': 3, 'A.MANAGE': 4, 'A.TRAINEDUSER': 3, 'A.NO_GENERAL_PURPOSE': 3, 'A.SUPPORT': 5, 'A.CONNECT': 5, 'A.AUTHUSE': 1, 'A.NO_GENER': 1, 'A.PEER_FUN': 1, 'A.TRAINED-': 1}, 'OE': {'OE.ADMIN': 10, 'OE.INFO_PROTECT': 11, 'OE.NO_GENERAL_PURPOSE': 3, 'OE.PHYSICAL': 8, 'OE.IT_REMOTE': 6, 'OE.IT_TRUSTED': 1, 'OE.IT_TRUSTED_SYSTEM': 5, 'OE.NO_GENE': 3, 'OE.NO_GENERAL': 2, 'OE.INFO': 5, 'OE.IT_REMOT': 4, 'OE.IT_TRUST': 4, 'OE.INFO_PRO': 4}}, 'vendor': {'STMicroelectronics': {'STM': 1}, 'Huawei': {'Huawei': 80, 'Huawei Technologies Co': 80}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 18}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 6, '(at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE': 1, '.0SP5 (EulerOS), x86_64 ● EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE': 1, '.7.5 is also out of scope and thus not included in the TOE': 1, '.73 is also out of scope and thus not included in the TOE': 1, '.3.7 is also out of scope and thus not included in the TOE': 1, ', IP addresses, and dates. 2.3.3 Non-TOE Hardware And Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: ● CPU (higher than 4 cores': 1, '(at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE. In addition, the TOE can be executed in other supported OSs (that': 1, '0SP5 (EulerOS), x86_64 ● EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE. The Software of Python v2.7.5 is also out of scope and thus not': 1, 'included in the TOE. The Software of Putty v0.73 is also out of scope and thus not included in the TOE. The Software of UnixODBC-2.3.7 is also out of scope and thus not': 1}}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
.
- The errors property was set to
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': '1350af3a2061b9adbd165531f295f29c6fcb74dd7547538f80192f5dedcadbd0', 'st_pdf_hash': '51c62c983bc5f321ec3bc03f90579bbbeb6053bf54913cfac0ad8106aa4655cf', 'report_txt_hash': '80c5162f24d0e5aa9817d107d75ebe4b0ba69e13298926bb3dd1f4c8a9b0ee0c', 'st_txt_hash': '3237f13b0c645a8517c2e3e464edd91f49e2fb7e5c6619d9f88dda20dae0c937'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_vendor': {'Huawei': 27}}
data. - The st_keywords property was updated, with the
{'rules_vendor': {'Huawei': 160}}
data.
- The following values were inserted:
-
13.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 2}]}}
.
- The following values were inserted:
-
24.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
.
- The following values were inserted:
-
08.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}
. - The following properties were deleted:
['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
- The following values were inserted:
-
18.02.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_extract_ok property was set to
False
. - The errors property was set to
["Failed to read metadata of certs/targets/pdf/5af5a1b535422b51.pdf, error: 'NoneType' object has no attribute 'items'", "Failed to read metadata of certs/targets/pdf/5af5a1b535422b51.pdf, error: 'NoneType' object has no attribute 'items'"]
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The report_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted. - The st_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted. - The report_keywords property was updated, with the
{'rules_cert_id': {'2019-20-INF-3379-v1': 1}}
data.
The computed heuristics were updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['100']}
. - The cert_id property was set to
2019-20-INF-3379
.
- The st_extract_ok property was set to
-
01.02.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['DBMS_PPV2.12']}}]}
.
- The new value is
-
28.01.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Huawei GaussDB 100 Version V300R001C00B300 Release 3da6647 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Databases",
"cert_link": "https://www.commoncriteriaportal.org/files/epfiles/2019-20_Certificate.pdf",
"dgst": "5af5a1b535422b51",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "2019-20-INF-3379",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"100"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Database management systems",
"certification_date": "2021-01-03",
"manufacturer": "Huawei Technologies Co., Ltd.",
"product": "Huawei GaussDB 100 Version V300R001C00B300 Release 3da6647",
"product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/450-huawei-gaussdb-100-version-v300r001c00b300-release-3da6647"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Huawei Technologies Co. Ltd.",
"manufacturer_web": "https://www.huawei.com",
"name": "Huawei GaussDB 100 Version V300R001C00B300 Release 3da6647",
"not_valid_after": "2026-01-03",
"not_valid_before": "2021-01-03",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "2019-20_Certificate.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.U": 1
},
"O": {
"O.E": 1
},
"T": {
"T.I": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0088-V2": 1
}
},
"cc_sar": {
"ALC": {
"ALC_FLR": 2,
"ALC_FLR.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1,
"EAL2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"DEKRA": {
"DEKRA Testing and Certification": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Huawei": {
"Huawei": 3,
"Huawei Technologies Co": 2
}
},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20201214103144+01\u002700\u0027",
"pdf_file_size_bytes": 734385,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"report_filename": "2019-20-INF-3379.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"ES": {
"2019-20-INF-3379-v1": 1
}
},
"cc_claims": {
"A": {
"A.U": 5
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0088-V2": 4
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 2,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR": 2,
"ALC_FLR.2": 8
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 1,
"EAL 4": 2,
"EAL2": 8
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 1,
"FAU_GEN.2": 1,
"FAU_SEL.1": 1
},
"FDP": {
"FDP_ACC.1": 1,
"FDP_ACF.1": 1,
"FDP_RIP.1": 1
},
"FIA": {
"FIA_ATD.1": 1,
"FIA_UAU.1": 1,
"FIA_UID.1": 1
},
"FMT": {
"FMT_MOF.1": 1,
"FMT_MSA.1": 1,
"FMT_MSA.3": 1,
"FMT_MTD.1": 1,
"FMT_REV.1": 2,
"FMT_SMF.1": 1,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_TRC.1": 1
},
"FTA": {
"FTA_MCS.1": 1,
"FTA_TSE.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"DEKRA": {
"DEKRA Testing and Certification": 5
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Huawei": {
"Huawei": 24,
"Huawei Technologies Co": 3
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20210203130801+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20210203130801+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"pdf_file_size_bytes": 967323,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.sogis.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 15
},
"st_filename": "2019-20_ST.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.AUTHUSE": 1,
"A.AUTHUSER": 1,
"A.CONNECT": 3,
"A.MANAGE": 4,
"A.NO_GENER": 1,
"A.NO_GENERAL_PURPOSE": 3,
"A.PEER_FUN": 1,
"A.PHYSICAL": 4,
"A.SUPPORT": 5,
"A.TRAINED-": 1,
"A.TRAINEDUSER": 1
},
"O": {
"O.ADMIN_RO": 4,
"O.ADMIN_ROLE": 7,
"O.AUDIT": 2,
"O.AUDIT_GE": 2,
"O.AUDIT_GENERATION": 3,
"O.DISCRETI": 1,
"O.DISCRETIO": 2,
"O.DISCRETIONARY": 2,
"O.DISCRETIONARY_ACCESS": 4,
"O.MANAGE": 13,
"O.MEDIATE": 9,
"O.RESIDUAL": 3,
"O.RESIDUAL_": 1,
"O.RESIDUAL_INFORMATION": 7,
"O.TOE_ACCE": 9,
"O.TOE_ACCESS": 10
},
"OE": {
"OE.ADMIN": 10,
"OE.INFO": 5,
"OE.INFO_PRO": 4,
"OE.INFO_PROTECT": 11,
"OE.IT_REMOT": 4,
"OE.IT_REMOTE": 6,
"OE.IT_TRUST": 4,
"OE.IT_TRUSTED": 1,
"OE.IT_TRUSTED_SYSTEM": 5,
"OE.NO_GENE": 3,
"OE.NO_GENERAL": 2,
"OE.NO_GENERAL_PURPOSE": 3,
"OE.PHYSICAL": 8
},
"OSP": {
"OSP": 1
},
"T": {
"T.ACCESS_T": 2,
"T.ACCESS_TSFDATA": 3,
"T.ACCESS_TSFFUNC": 1,
"T.IA_MASQU": 2,
"T.IA_MASQUERADE": 3,
"T.IA_USER": 2,
"T.RESIDUAL": 1,
"T.RESIDUAL_DATA": 3,
"T.TSF": 1,
"T.TSF_COMP": 1,
"T.TSF_COMPROMISE": 1,
"T.UNAUTHO": 2,
"T.UNAUTHORIZED_ACCESS": 3
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0088-V2": 3
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1,
"ALC_FLR.2": 2
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 11,
"FAU_GEN.1.1": 2,
"FAU_GEN.1.2": 2,
"FAU_GEN.2": 9,
"FAU_GEN.2.1": 2,
"FAU_MTD.1": 2,
"FAU_SEL.1": 9,
"FAU_SEL.1.1": 2
},
"FDP": {
"FDP_ACC.1": 18,
"FDP_ACC.1.1": 2,
"FDP_ACF.1": 16,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 2,
"FDP_IFC.1": 1,
"FDP_RIP.1": 9,
"FDP_RIP.1.1": 2
},
"FIA": {
"FIA_ATD.1": 15,
"FIA_ATD.1.1": 2,
"FIA_UAU.1": 8,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 1,
"FIA_UID.1": 14,
"FIA_UID.1.1": 2,
"FIA_UID.1.2": 1,
"FIA_USB.1": 5
},
"FMT": {
"FMT_MOF.1": 9,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 10,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 10,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 2,
"FMT_MTD.1": 8,
"FMT_MTD.1.1": 2,
"FMT_REV.1": 11,
"FMT_REV.1.1": 4,
"FMT_REV.1.2": 4,
"FMT_SMF.1": 14,
"FMT_SMF.1.1": 2,
"FMT_SMR.1": 20,
"FMT_SMR.1.1": 2,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_ITT.1": 1,
"FPT_STM.1": 1,
"FPT_TRC.1": 10,
"FPT_TRC.1.1": 2,
"FPT_TRC.1.2": 2
},
"FTA": {
"FTA_MCS.1": 9,
"FTA_MCS.1.1": 1,
"FTA_TSE.1": 8,
"FTA_TSE.1.1": 2
}
},
"certification_process": {
"OutOfScope": {
"0SP5 (EulerOS), x86_64 \u25cf EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE. The Software of Python v2.7.5 is also out of scope and thus not": 1,
"EulerOS), x86_64 \u25cf EulerOS Server V2.0SP8 (EulerOS), ARM_64 The Software of JDK 8u144 is also out of scope and thus not included in the TOE": 1,
"IP addresses, and dates. 2.3.3 Non-TOE Hardware And Software The following hardware resources are out of scope and thus not included in the TOE but are necessary for its operation: \u25cf CPU (higher than 4 cores": 1,
"at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE": 1,
"at least 25 GB disk) The operating system (OS) (EulerOS Server V2.0SP3 (EulerOS), x86_64) is also out of scope and thus not included in the TOE. In addition, the TOE can be executed in other supported OSs (that": 1,
"in the TOE. The Software of Putty v0.73 is also out of scope and thus not included in the TOE. The Software of UnixODBC-2.3.7 is also out of scope and thus not": 1,
"out of scope": 6
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA256": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 1
}
},
"tls_cipher_suite": {},
"vendor": {
"Huawei": {
"Huawei": 80,
"Huawei Technologies Co": 80
}
},
"vulnerability": {}
},
"st_metadata": null
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL2+",
"pp_ids": {
"_type": "Set",
"elements": [
"DBMS_PPV2.12"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0088V2b_pdf.pdf",
"pp_name": "Base Protection Profile for Database Management Systems (DBMS PP) Version 2.12"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/2019-20-INF-3379.pdf",
"scheme": "ES",
"security_level": {
"_type": "Set",
"elements": [
"EAL2+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/2019-20_ST.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b3fcee104ade3d57b60be1f02b6a4e2b42e47a5572a9c7e3aaa12038cd39f689",
"txt_hash": "4851a143c901fee22c0357227a905396ac47e42f2cab204d70dbe9167bfe648c"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "1350af3a2061b9adbd165531f295f29c6fcb74dd7547538f80192f5dedcadbd0",
"txt_hash": "80c5162f24d0e5aa9817d107d75ebe4b0ba69e13298926bb3dd1f4c8a9b0ee0c"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"pdf_hash": "51c62c983bc5f321ec3bc03f90579bbbeb6053bf54913cfac0ad8106aa4655cf",
"txt_hash": "3237f13b0c645a8517c2e3e464edd91f49e2fb7e5c6619d9f88dda20dae0c937"
}
},
"status": "active"
}