PacketLight PL2000 Series with Firmware v1.3.12c

CSV information ?

Status active
Valid from 25.09.2020
Valid until 26.09.2025
Scheme 🇦🇺 AU
Manufacturer PacketLight Network Ltd
Category Network and Network-Related Devices and Systems
Security level EAL2+, ALC_FLR.1

Heuristics summary ?

Certification report ?

Extracted keywords

Hash functions
SHA-256
Protocols
SSH, TLS, TLS v1.2, TLS 1.2

Security level
EAL2, EAL 2, EAL1, EAL2 augmented, EAL 2 augmented
Security Assurance Requirements (SAR)
ALC_FLR.1
Evaluation facilities
Teron Labs

File metadata

Creation date: D:20200921171013+10'00'
Modification date: D:20200921171026+10'00'
Pages: 15
Creator: Acrobat PDFMaker 17 for Word
Producer: Adobe PDF Library 15.0

References

Security target ?

Extracted keywords

Symmetric Algorithms
AES, HMAC, HMAC-SHA-384, HMAC-SHA-256, HMAC-SHA-512
Asymmetric Algorithms
RSA 2048, ECDH, ECC, DH, Diffie-Hellman
Hash functions
SHA-1, SHA-384, SHA-512, SHA-256
Schemes
Key agreement
Protocols
SSH, TLS, TLS v1.2, TLS 1.2
Randomness
TRNG, DRBG, RNG
Elliptic Curves
P-256, P-521, P-384
Block cipher modes
ECB, CBC, CTR, CFB, GCM

Vendor
STM

Security level
EAL2, EAL2 augmented
Claims
O.AUDIT, O.COMMUNICATION, O.ACCESS, O.MANAGEMENT, O.TAMPERING, T.AUDIT, T.COMMUNICATION, T.ACCESS, T.MANAGEMENT, T.TAMPERING, OE.ADMIN, OE.PHYSICAL, OSP.ADMIN, OSP.PHYSICAL
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FCS_COP, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FDP_ACC.1, FDP_ACF.1, FDP_IFC.2, FDP_IFF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.2.1, FDP_IFC.2.2, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1, FDP_ACF.2, FIA_ATD.1, FIA_UAU.1, FIA_UAU.6, FIA_UAU.7, FIA_UID.1, FIA_SOS.1, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.6.1, FIA_UAU.7.1, FIA_UID.1.1, FIA_UID.1.2, FIA_SOS.1.1, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_FLS.1, FPT_PHP.1, FPT_STM.1, FPT_TEE.1, FPT_TST.1, FPT_FLS.1.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_STM.1.1, FPT_TEE.1.1, FPT_TEE.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_ACC.1, FPT_ACF.1, FTA_SSL.3, FTA_SSL.4, FTA_SSL.3.1, FTA_SSL.4.1, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3

Side-channel analysis
physical tampering

Standards
FIPS 140-2, FIPS140-2, FIPS PUB 197, FIPS 197, FIPS PUB 198, FIPS PUB 180-4, FIPS PUB 186-4, NIST SP 800-90A, SP 800-56A, SP 800-38A, SP 800-38D, SP 800-133, SP 800-90A, SP 800-135, SP 800-52, NIST SP 800-135, PKCS1, RFC 5288, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title: Packetlight PL2000 Series EAL2+ALC_FLR.1 Security Target v1.3
Author: jussipekka leiwo
Creation date: D:20200831042311Z00'00'
Modification date: D:20200831042311Z00'00'
Pages: 43
Creator: Word
Producer: macOS Version 10.14.6 (Build 18G4032) Quartz PDFContext

References

Heuristics ?

No heuristics are available for this certificate.

Extracted SARs

ADV_FSP.2, ASE_TSS.1, ATE_FUN.1, ASE_CCL.1, ALC_CMC.2, ASE_INT.1, ATE_COV.1, ALC_CMS.2, AVA_VAN.2, ASE_REQ.2, ASE_SPD.1, ALC_DEL.1, ALC_FLR.1, AGD_PRE.1, ASE_OBJ.2, AGD_OPE.1, ATE_IND.2, ASE_ECD.1, ADV_TDS.1, ADV_ARC.1

References ?

No references are available for this certificate as its ID was not successfully extracted.

Updates ?

  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/ACSC%20Certification%20Report%20EFT-T010%20PacketLight%20PL-2000%201.3.12c%20v1.0.pdf, code: nok'].
    • The st_pdf_hash property was set to 0992a5e37d152833ea4a5588d1055f8d5866b030018edb499f918c3da56c9026.
    • The st_txt_hash property was set to 645bd8ce86692c5053c6ed11cafc5682459b49de6f710992db6621703876f929.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 3044422, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 43, '/Title': 'Packetlight PL2000 Series EAL2+ALC_FLR.1 Security Target v1.3', '/Author': 'jussipekka leiwo', '/Subject': '', '/Producer': 'macOS Version 10.14.6 (Build 18G4032) Quartz PDFContext', '/Creator': 'Word', '/CreationDate': "D:20200831042311Z00'00'", '/ModDate': "D:20200831042311Z00'00'", '/Keywords': '', '/AAPL:Keywords': '[]', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 4, 'EAL2 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 7, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 7, 'FAU_SAR.1': 5, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1}, 'FCS': {'FCS_CKM.1': 11, 'FCS_CKM.2': 6, 'FCS_CKM.4': 13, 'FCS_COP.1': 5, 'FCS_COP': 9, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACC.1': 12, 'FDP_ACF.1': 8, 'FDP_IFC.2': 6, 'FDP_IFF.1': 7, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.2.1': 1, 'FDP_IFC.2.2': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ITC.1': 4, 'FDP_ITC.2': 4, 'FDP_IFC.1': 6, 'FDP_ACF.2': 1}, 'FIA': {'FIA_ATD.1': 6, 'FIA_UAU.1': 6, 'FIA_UAU.6': 6, 'FIA_UAU.7': 6, 'FIA_UID.1': 10, 'FIA_SOS.1': 6, 'FIA_ATD.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.6.1': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_SOS.1.1': 1}, 'FMT': {'FMT_MSA.1': 11, 'FMT_MSA.3': 13, 'FMT_SMF.1': 7, 'FMT_SMR.1': 12, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS.1': 6, 'FPT_PHP.1': 6, 'FPT_STM.1': 7, 'FPT_TEE.1': 6, 'FPT_TST.1': 5, 'FPT_FLS.1.1': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_STM.1.1': 1, 'FPT_TEE.1.1': 1, 'FPT_TEE.1.2': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_ACC.1': 1, 'FPT_ACF.1': 1}, 'FTA': {'FTA_SSL.3': 6, 'FTA_SSL.4': 5, 'FTA_SSL.3.1': 1, 'FTA_SSL.4.1': 1}, 'FTP': {'FTP_TRP.1': 7, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.AUDIT': 8, 'O.COMMUNICATION': 7, 'O.ACCESS': 8, 'O.MANAGEMENT': 8, 'O.TAMPERING': 8}, 'T': {'T.AUDIT': 4, 'T.COMMUNICATION': 5, 'T.ACCESS': 5, 'T.MANAGEMENT': 6, 'T.TAMPERING': 5}, 'OE': {'OE.ADMIN': 4, 'OE.PHYSICAL': 3}, 'OSP': {'OSP.ADMIN': 4, 'OSP.PHYSICAL': 4}}, 'vendor': {'STMicroelectronics': {'STM': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 17}}, 'constructions': {'MAC': {'HMAC': 4, 'HMAC-SHA-384': 4, 'HMAC-SHA-256': 2, 'HMAC-SHA-512': 2}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 2}, 'ECC': {'ECDH': {'ECDH': 2}, 'ECC': {'ECC': 5}}, 'FF': {'DH': {'DH': 9, 'Diffie-Hellman': 6}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 8}, 'SHA2': {'SHA-384': 9, 'SHA-512': 8, 'SHA-256': 3}}}, 'crypto_scheme': {'KA': {'Key agreement': 5}}, 'crypto_protocol': {'SSH': {'SSH': 20}, 'TLS': {'TLS': {'TLS': 16, 'TLS v1.2': 1, 'TLS 1.2': 1}}}, 'randomness': {'TRNG': {'TRNG': 2}, 'PRNG': {'DRBG': 10}, 'RNG': {'RNG': 2}}, 'cipher_mode': {'ECB': {'ECB': 5}, 'CBC': {'CBC': 3}, 'CTR': {'CTR': 5}, 'CFB': {'CFB': 1}, 'GCM': {'GCM': 12}}, 'ecc_curve': {'NIST': {'P-256': 8, 'P-521': 4, 'P-384': 4}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 9}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 20, 'FIPS140-2': 6, 'FIPS PUB 197': 1, 'FIPS 197': 2, 'FIPS PUB 198': 2, 'FIPS PUB 180-4': 3, 'FIPS PUB 186-4': 1}, 'NIST': {'NIST SP 800-90A': 2, 'SP 800-56A': 5, 'SP 800-38A': 3, 'SP 800-38D': 3, 'SP 800-133': 1, 'SP 800-90A': 9, 'SP 800-135': 1, 'SP 800-52': 1, 'NIST SP 800-135': 1}, 'PKCS': {'PKCS1': 2}, 'RFC': {'RFC 5288': 1}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to Packetlight PL2000 Series EAL2_ALC_FLR_1 Security Targetv1_3.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/Packetlight%20PL2000%20Series%20EAL2_ALC_FLR_1%20Security%20Targetv1_3.pdf, code: 408'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/EFT-T010%202020_130%20PacketLight%20Cert%20-%20OS_colour_ver.pdf.

    The manufacturer_web was updated.

    • The new value is https://www.packetlight.com/.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 0992a5e37d152833ea4a5588d1055f8d5866b030018edb499f918c3da56c9026.
    • The st_txt_hash property was set to 645bd8ce86692c5053c6ed11cafc5682459b49de6f710992db6621703876f929.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 3044422, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 43, '/Title': 'Packetlight PL2000 Series EAL2+ALC_FLR.1 Security Target v1.3', '/Author': 'jussipekka leiwo', '/Subject': '', '/Producer': 'macOS Version 10.14.6 (Build 18G4032) Quartz PDFContext', '/Creator': 'Word', '/CreationDate': "D:20200831042311Z00'00'", '/ModDate': "D:20200831042311Z00'00'", '/Keywords': '', '/AAPL:Keywords': '[]', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 4, 'EAL2 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 7, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 7, 'FAU_SAR.1': 5, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1}, 'FCS': {'FCS_CKM.1': 11, 'FCS_CKM.2': 6, 'FCS_CKM.4': 13, 'FCS_COP.1': 5, 'FCS_COP': 9, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACC.1': 12, 'FDP_ACF.1': 8, 'FDP_IFC.2': 6, 'FDP_IFF.1': 7, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.2.1': 1, 'FDP_IFC.2.2': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ITC.1': 4, 'FDP_ITC.2': 4, 'FDP_IFC.1': 6, 'FDP_ACF.2': 1}, 'FIA': {'FIA_ATD.1': 6, 'FIA_UAU.1': 6, 'FIA_UAU.6': 6, 'FIA_UAU.7': 6, 'FIA_UID.1': 10, 'FIA_SOS.1': 6, 'FIA_ATD.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.6.1': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_SOS.1.1': 1}, 'FMT': {'FMT_MSA.1': 11, 'FMT_MSA.3': 13, 'FMT_SMF.1': 7, 'FMT_SMR.1': 12, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS.1': 6, 'FPT_PHP.1': 6, 'FPT_STM.1': 7, 'FPT_TEE.1': 6, 'FPT_TST.1': 5, 'FPT_FLS.1.1': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_STM.1.1': 1, 'FPT_TEE.1.1': 1, 'FPT_TEE.1.2': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_ACC.1': 1, 'FPT_ACF.1': 1}, 'FTA': {'FTA_SSL.3': 6, 'FTA_SSL.4': 5, 'FTA_SSL.3.1': 1, 'FTA_SSL.4.1': 1}, 'FTP': {'FTP_TRP.1': 7, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.AUDIT': 8, 'O.COMMUNICATION': 7, 'O.ACCESS': 8, 'O.MANAGEMENT': 8, 'O.TAMPERING': 8}, 'T': {'T.AUDIT': 4, 'T.COMMUNICATION': 5, 'T.ACCESS': 5, 'T.MANAGEMENT': 6, 'T.TAMPERING': 5}, 'OE': {'OE.ADMIN': 4, 'OE.PHYSICAL': 3}, 'OSP': {'OSP.ADMIN': 4, 'OSP.PHYSICAL': 4}}, 'vendor': {'STMicroelectronics': {'STM': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 17}}, 'constructions': {'MAC': {'HMAC': 4, 'HMAC-SHA-384': 4, 'HMAC-SHA-256': 2, 'HMAC-SHA-512': 2}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 2}, 'ECC': {'ECDH': {'ECDH': 2}, 'ECC': {'ECC': 5}}, 'FF': {'DH': {'DH': 9, 'Diffie-Hellman': 6}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 8}, 'SHA2': {'SHA-384': 9, 'SHA-512': 8, 'SHA-256': 3}}}, 'crypto_scheme': {'KA': {'Key agreement': 5}}, 'crypto_protocol': {'SSH': {'SSH': 20}, 'TLS': {'TLS': {'TLS': 16, 'TLS v1.2': 1, 'TLS 1.2': 1}}}, 'randomness': {'TRNG': {'TRNG': 2}, 'PRNG': {'DRBG': 10}, 'RNG': {'RNG': 2}}, 'cipher_mode': {'ECB': {'ECB': 5}, 'CBC': {'CBC': 3}, 'CTR': {'CTR': 5}, 'CFB': {'CFB': 1}, 'GCM': {'GCM': 12}}, 'ecc_curve': {'NIST': {'P-256': 8, 'P-521': 4, 'P-384': 4}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 9}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 20, 'FIPS140-2': 6, 'FIPS PUB 197': 1, 'FIPS 197': 2, 'FIPS PUB 198': 2, 'FIPS PUB 180-4': 3, 'FIPS PUB 186-4': 1}, 'NIST': {'NIST SP 800-90A': 2, 'SP 800-56A': 5, 'SP 800-38A': 3, 'SP 800-38D': 3, 'SP 800-133': 1, 'SP 800-90A': 9, 'SP 800-135': 1, 'SP 800-52': 1, 'NIST SP 800-135': 1}, 'PKCS': {'PKCS1': 2}, 'RFC': {'RFC 5288': 1}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to Packetlight PL2000 Series EAL2_ALC_FLR_1 Security Targetv1_3.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/Packetlight%20PL2000%20Series%20EAL2_ALC_FLR_1%20Security%20Targetv1_3.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 16.11.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'/Checked by': '32123', '/Objective-Document Type [system]': ''} values inserted.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'ACSC Certification Report EFT-T010 PacketLight PL-2000 1.3.12c v1.0.pdf', 'st_filename': 'Packetlight PL2000 Series EAL2_ALC_FLR_1 Security Targetv1_3.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {}, 'eval_facility': {'__update__': {'Teron': {'__update__': {'Teron Labs': 4}}}}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'TLS': {'__insert__': {'TLS v1.2': 1}, '__update__': {'TLS': 1}}}}}}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.1': 7}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_GEN.1': 7, 'FAU_SAR.1': 5}}, 'FCS': {'__insert__': {'FCS_COP': 9}, '__update__': {'FCS_CKM.1': 11, 'FCS_CKM.2': 6, 'FCS_COP.1': 5}}, 'FDP': {'__update__': {'FDP_ACC.1': 12, 'FDP_ACF.1': 8, 'FDP_IFF.1': 7, 'FDP_IFC.1': 6}}, 'FIA': {'__update__': {'FIA_UAU.1': 6, 'FIA_UID.1': 10}}, 'FMT': {'__update__': {'FMT_MSA.1': 11, 'FMT_MSA.3': 13, 'FMT_SMF.1': 7}}, 'FPT': {'__update__': {'FPT_STM.1': 7, 'FPT_TST.1': 5}}, 'FTA': {'__update__': {'FTA_SSL.4': 5}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.COMMUNICATION': 7, 'O.MANAGEMENT': 8}}, 'OE': {'__update__': {'OE.PHYSICAL': 3}}}}, 'vendor': {'__update__': {'STMicroelectronics': {'__update__': {'STM': 1}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 17}}}}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__update__': {'DH': {'__update__': {'DH': 9}}}}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA1': {'__update__': {'SHA-1': 8}}, 'SHA2': {'__update__': {'SHA-384': 9, 'SHA-512': 8, 'SHA-256': 3}}}}}}, 'crypto_scheme': {'__update__': {'KA': {'__delete__': ['KA']}}, '__delete__': ['MAC']}, 'crypto_protocol': {'__update__': {'SSH': {'__update__': {'SSH': 20}}, 'TLS': {'__update__': {'TLS': {'__update__': {'TLS': 16}}}}}}, 'randomness': {'__update__': {'PRNG': {'__update__': {'DRBG': 10}}, 'RNG': {'__update__': {'RNG': 2}, '__delete__': ['RBG']}}}, 'cipher_mode': {'__update__': {'GCM': {'__update__': {'GCM': 12}}}}, 'side_channel_analysis': {'__update__': {'FI': {'__update__': {'physical tampering': 9}}}}, 'standard_id': {'__insert__': {'PKCS': {'PKCS1': 2}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, '__update__': {'NIST': {'__insert__': {'SP 800-133': 1}, '__update__': {'NIST SP 800-90A': 2}}}}} data.

    The computed heuristics were updated.

    • The cert_id property was set to None.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 541271, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 15, '/Author': '', '/Checked#20by': '32123', '/Comments': '', '/Company': '', '/CreationDate': "D:20200921171013+10'00'", '/Creator': 'Acrobat PDFMaker 17 for Word', '/Keywords': '', '/ModDate': "D:20200921171026+10'00'", '/Objective-Caveats': '', '/Objective-Classification': '[Inherited - Unclassified]', '/Objective-Comment': '', '/Objective-CreationStamp': 'D:20200821', '/Objective-DatePublished': '', '/Objective-Document#20Type#20#5Bsystem#5D': '', '/Objective-FileNumber': '', '/Objective-Id': 'BN20396975', '/Objective-IsApproved': '0', '/Objective-IsPublished': '0', '/Objective-ModificationStamp': 'D:20200921', '/Objective-Owner': 'Clacher, Chris MR', '/Objective-Parent': 'CR', '/Objective-Path': 'Objective Global Folder - PROD:Defence Business Units:Australian Signals Directorate:ASD : Australian Signals Directorate:ACSC GROUP:CSS - CYBER SECURITY SERVICES DIVISION:Technical Uplift Branch - TU:Standards & Guidelines:4. Australasian Certification A', '/Objective-State': 'Being Edited', '/Objective-Title': 'ACSC Certification Report EFT-T010 PacketLight PL-2000 1.3.12c EAL2+', '/Objective-Version': '0.13', '/Objective-VersionComment': '', '/Objective-VersionNumber': '13', '/Producer': 'Adobe PDF Library 15.0', '/SourceModified': 'D:20200921070954', '/Subject': '', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.commoncriteriaportal.org/', 'https://www.cyber.gov.au/ism', 'https://www.gcsb.govt.nz/', 'https://www.cyber.gov.au/sites/default/files/2019-03/AISEP_Policy_Manual.pdf', 'https://www.nzism.gcsb.govt.nz/ism-document/']}}.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to True.
    • The report_extract_ok property was set to False.
    • The errors property was set to ['Failed to read metadata of certs/reports/pdf/96cf0d5d7f98fbf1.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/reports/pdf/96cf0d5d7f98fbf1.pdf, error: can only concatenate list (not "IndirectObject") to list'].

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to {'pdf_file_size_bytes': 3044422, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 43, '/Title': 'Packetlight PL2000 Series EAL2+ALC_FLR.1 Security Target v1.3', '/Author': 'jussipekka leiwo', '/Subject': '', '/Producer': 'macOS Version 10.14.6 (Build 18G4032) Quartz PDFContext', '/Creator': 'Word', '/CreationDate': "D:20200831042311Z00'00'", '/ModDate': "D:20200831042311Z00'00'", '/Keywords': '', '/AAPL:Keywords': '[]', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_keywords property was set to {'cc_cert_id': {'AU': {'EFT-T010-ETR 1.0': 1, 'EFT-T010 ETR 1.0': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 3, 'EAL 2': 1, 'EAL1': 1, 'EAL2 augmented': 1, 'EAL 2 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 2}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Teron': {'Teron Labs': 3}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 1}, 'TLS': {'TLS': {'TLS': 2, 'TLS 1.2': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 4, 'EAL2 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.2': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 6, 'ALC_CMC.2': 1, 'ALC_CMS.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 8, 'FAU_SAR.1': 6, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1}, 'FCS': {'FCS_CKM.1': 14, 'FCS_CKM.2': 7, 'FCS_CKM.4': 13, 'FCS_COP.1': 4, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACC.1': 13, 'FDP_ACF.1': 10, 'FDP_IFC.2': 6, 'FDP_IFF.1': 9, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.2.1': 1, 'FDP_IFC.2.2': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ITC.1': 4, 'FDP_ITC.2': 4, 'FDP_IFC.1': 7, 'FDP_ACF.2': 1}, 'FIA': {'FIA_ATD.1': 6, 'FIA_UAU.1': 7, 'FIA_UAU.6': 6, 'FIA_UAU.7': 6, 'FIA_UID.1': 13, 'FIA_SOS.1': 6, 'FIA_ATD.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.6.1': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_SOS.1.1': 1}, 'FMT': {'FMT_MSA.1': 13, 'FMT_MSA.3': 14, 'FMT_SMF.1': 8, 'FMT_SMR.1': 12, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_FLS.1': 6, 'FPT_PHP.1': 6, 'FPT_STM.1': 8, 'FPT_TEE.1': 6, 'FPT_TST.1': 6, 'FPT_FLS.1.1': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_STM.1.1': 1, 'FPT_TEE.1.1': 1, 'FPT_TEE.1.2': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_ACC.1': 1, 'FPT_ACF.1': 1}, 'FTA': {'FTA_SSL.3': 6, 'FTA_SSL.4': 6, 'FTA_SSL.3.1': 1, 'FTA_SSL.4.1': 1}, 'FTP': {'FTP_TRP.1': 7, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'O': {'O.AUDIT': 8, 'O.COMMUNICATION': 9, 'O.ACCESS': 8, 'O.MANAGEMENT': 10, 'O.TAMPERING': 8}, 'T': {'T.AUDIT': 4, 'T.COMMUNICATION': 5, 'T.ACCESS': 5, 'T.MANAGEMENT': 6, 'T.TAMPERING': 5}, 'OE': {'OE.ADMIN': 4, 'OE.PHYSICAL': 4}, 'OSP': {'OSP.ADMIN': 4, 'OSP.PHYSICAL': 4}}, 'vendor': {'STMicroelectronics': {'STM': 11}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 18}}, 'constructions': {'MAC': {'HMAC': 4, 'HMAC-SHA-384': 4, 'HMAC-SHA-256': 2, 'HMAC-SHA-512': 2}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 2}, 'ECC': {'ECDH': {'ECDH': 2}, 'ECC': {'ECC': 5}}, 'FF': {'DH': {'DH': 13, 'Diffie-Hellman': 6}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 10}, 'SHA2': {'SHA-384': 13, 'SHA-512': 10, 'SHA-256': 5}}}, 'crypto_scheme': {'MAC': {'MAC': 4}, 'KA': {'Key agreement': 5, 'KA': 10}}, 'crypto_protocol': {'SSH': {'SSH': 21}, 'TLS': {'TLS': {'TLS': 15, 'TLS v1.2': 1, 'TLS 1.2': 1}}}, 'randomness': {'TRNG': {'TRNG': 2}, 'PRNG': {'DRBG': 15}, 'RNG': {'RNG': 6, 'RBG': 15}}, 'cipher_mode': {'ECB': {'ECB': 5}, 'CBC': {'CBC': 3}, 'CTR': {'CTR': 5}, 'CFB': {'CFB': 1}, 'GCM': {'GCM': 13}}, 'ecc_curve': {'NIST': {'P-256': 8, 'P-521': 4, 'P-384': 4}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 8}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 20, 'FIPS140-2': 6, 'FIPS PUB 197': 1, 'FIPS 197': 2, 'FIPS PUB 198': 2, 'FIPS PUB 180-4': 3, 'FIPS PUB 186-4': 1}, 'NIST': {'NIST SP 800-90A': 1, 'SP 800-56A': 5, 'SP 800-38A': 3, 'SP 800-38D': 3, 'SP 800-90A': 9, 'SP 800-135': 1, 'SP 800-52': 1, 'NIST SP 800-135': 1}, 'RFC': {'RFC 5288': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '040f1500909fd6a73da6eb32c9a3e435a6a8222ebb6f2148f414b7667975b512', 'st_pdf_hash': '0992a5e37d152833ea4a5588d1055f8d5866b030018edb499f918c3da56c9026', 'report_txt_hash': 'cec50d0632b01f9044a75428b1210f349d9eecc7e2a10d41243e31307e43bc93', 'st_txt_hash': '645bd8ce86692c5053c6ed11cafc5682459b49de6f710992db6621703876f929'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-256': 2}, 'rules_crypto_schemes': {'TLS': 3}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 18, 'HMAC': 4, 'HMAC-SHA-384': 4, 'HMAC-SHA-256': 2, 'HMAC-SHA-512': 2}, 'rules_asymmetric_crypto': {'RSA 2048': 2, 'ECDH': 2, 'ECC': 5, 'DH': 13, 'Diffie-Hellman': 6}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 10, 'SHA-384': 13, 'SHA-512': 10, 'SHA-256': 5}, 'rules_crypto_schemes': {'MAC': 4, 'TLS': 17}, 'rules_randomness': {'TRNG': 2, 'DRBG': 15, 'RNG': 6, 'RBG': 15}, 'rules_tee': {}, 'rules_side_channels': {'physical tampering': 8}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_cert_id': {'EFT-T010-ETR 1.0': 1, 'EFT-T010 ETR 1.0': 1}} data.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
    • The cert_id property was set to EFT-T010-ETR 1.0.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to False.
    • The errors property was set to ['Failed to read metadata of certs/targets/pdf/96cf0d5d7f98fbf1.pdf, error: seek of closed file', 'Failed to read metadata of certs/targets/pdf/96cf0d5d7f98fbf1.pdf, error: seek of closed file'].

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['1.3.12']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name PacketLight PL2000 Series with Firmware v1.3.12c was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/EFT-T010%202020_130%20PacketLight%20Cert%20-%20OS_colour_ver.pdf",
  "dgst": "96cf0d5d7f98fbf1",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "cert_id": null,
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.3.12"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "PacketLight Network Ltd",
  "manufacturer_web": "https://www.packetlight.com/",
  "name": "PacketLight PL2000 Series with Firmware v1.3.12c",
  "not_valid_after": "2025-09-26",
  "not_valid_before": "2020-09-25",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "report_filename": "ACSC Certification Report EFT-T010 PacketLight PL-2000 1.3.12c v1.0.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.1": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 2 augmented": 1,
          "EAL1": 1,
          "EAL2": 3,
          "EAL2 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 1
        },
        "TLS": {
          "TLS": {
            "TLS": 1,
            "TLS 1.2": 1,
            "TLS v1.2": 1
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Teron": {
          "Teron Labs": 4
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/Checked by": "32123",
      "/Comments": "",
      "/Company": "",
      "/CreationDate": "D:20200921171013+10\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 17 for Word",
      "/Keywords": "",
      "/ModDate": "D:20200921171026+10\u002700\u0027",
      "/Objective-Caveats": "",
      "/Objective-Classification": "[Inherited - Unclassified]",
      "/Objective-Comment": "",
      "/Objective-CreationStamp": "D:20200821",
      "/Objective-DatePublished": "",
      "/Objective-Document Type [system]": "",
      "/Objective-FileNumber": "",
      "/Objective-Id": "BN20396975",
      "/Objective-IsApproved": "0",
      "/Objective-IsPublished": "0",
      "/Objective-ModificationStamp": "D:20200921",
      "/Objective-Owner": "Clacher, Chris MR",
      "/Objective-Parent": "CR",
      "/Objective-Path": "Objective Global Folder - PROD:Defence Business Units:Australian Signals Directorate:ASD : Australian Signals Directorate:ACSC GROUP:CSS - CYBER SECURITY SERVICES DIVISION:Technical Uplift Branch - TU:Standards \u0026 Guidelines:4. Australasian Certification A",
      "/Objective-State": "Being Edited",
      "/Objective-Title": "ACSC Certification Report EFT-T010 PacketLight PL-2000 1.3.12c EAL2+",
      "/Objective-Version": "0.13",
      "/Objective-VersionComment": "",
      "/Objective-VersionNumber": "13",
      "/Producer": "Adobe PDF Library 15.0",
      "/SourceModified": "D:20200921070954",
      "/Subject": "",
      "/Title": "",
      "pdf_file_size_bytes": 541271,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.commoncriteriaportal.org/",
          "https://www.cyber.gov.au/ism",
          "https://www.nzism.gcsb.govt.nz/ism-document/",
          "https://www.gcsb.govt.nz/",
          "https://www.cyber.gov.au/sites/default/files/2019-03/AISEP_Policy_Manual.pdf"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 15
    },
    "st_filename": "Packetlight PL2000 Series EAL2_ALC_FLR_1 Security Targetv1_3.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 5
          },
          "ECDH": {
            "ECDH": 2
          }
        },
        "FF": {
          "DH": {
            "DH": 9,
            "Diffie-Hellman": 6
          }
        },
        "RSA": {
          "RSA 2048": 2
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.ACCESS": 8,
          "O.AUDIT": 8,
          "O.COMMUNICATION": 7,
          "O.MANAGEMENT": 8,
          "O.TAMPERING": 8
        },
        "OE": {
          "OE.ADMIN": 4,
          "OE.PHYSICAL": 3
        },
        "OSP": {
          "OSP.ADMIN": 4,
          "OSP.PHYSICAL": 4
        },
        "T": {
          "T.ACCESS": 5,
          "T.AUDIT": 4,
          "T.COMMUNICATION": 5,
          "T.MANAGEMENT": 6,
          "T.TAMPERING": 5
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.2": 1,
          "ADV_TDS.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL.1": 1,
          "ALC_FLR.1": 7
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 4,
          "EAL2 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 7,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_SAR.1": 5,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1
        },
        "FCS": {
          "FCS_CKM.1": 11,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 6,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.4": 13,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 9,
          "FCS_COP.1": 5
        },
        "FDP": {
          "FDP_ACC.1": 12,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 8,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_ACF.2": 1,
          "FDP_IFC.1": 6,
          "FDP_IFC.2": 6,
          "FDP_IFC.2.1": 1,
          "FDP_IFC.2.2": 1,
          "FDP_IFF.1": 7,
          "FDP_IFF.1.1": 1,
          "FDP_IFF.1.2": 1,
          "FDP_IFF.1.3": 1,
          "FDP_IFF.1.4": 1,
          "FDP_IFF.1.5": 1,
          "FDP_ITC.1": 4,
          "FDP_ITC.2": 4
        },
        "FIA": {
          "FIA_ATD.1": 6,
          "FIA_ATD.1.1": 1,
          "FIA_SOS.1": 6,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.1": 6,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.6": 6,
          "FIA_UAU.6.1": 1,
          "FIA_UAU.7": 6,
          "FIA_UAU.7.1": 1,
          "FIA_UID.1": 10,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MSA.1": 11,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 13,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_SMF.1": 7,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 12,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_ACC.1": 1,
          "FPT_ACF.1": 1,
          "FPT_FLS.1": 6,
          "FPT_FLS.1.1": 1,
          "FPT_PHP.1": 6,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_STM.1": 7,
          "FPT_STM.1.1": 1,
          "FPT_TEE.1": 6,
          "FPT_TEE.1.1": 1,
          "FPT_TEE.1.2": 1,
          "FPT_TST.1": 5,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTA": {
          "FTA_SSL.3": 6,
          "FTA_SSL.3.1": 1,
          "FTA_SSL.4": 5,
          "FTA_SSL.4.1": 1
        },
        "FTP": {
          "FTP_TRP.1": 7,
          "FTP_TRP.1.1": 1,
          "FTP_TRP.1.2": 1,
          "FTP_TRP.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CFB": {
          "CFB": 1
        },
        "CTR": {
          "CTR": 5
        },
        "ECB": {
          "ECB": 5
        },
        "GCM": {
          "GCM": 12
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 20
        },
        "TLS": {
          "TLS": {
            "TLS": 16,
            "TLS 1.2": 1,
            "TLS v1.2": 1
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key agreement": 5
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-256": 8,
          "P-384": 4,
          "P-521": 4
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 8
          },
          "SHA2": {
            "SHA-256": 3,
            "SHA-384": 9,
            "SHA-512": 8
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 10
        },
        "RNG": {
          "RNG": 2
        },
        "TRNG": {
          "TRNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 9
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 140-2": 20,
          "FIPS 197": 2,
          "FIPS PUB 180-4": 3,
          "FIPS PUB 186-4": 1,
          "FIPS PUB 197": 1,
          "FIPS PUB 198": 2,
          "FIPS140-2": 6
        },
        "NIST": {
          "NIST SP 800-135": 1,
          "NIST SP 800-90A": 2,
          "SP 800-133": 1,
          "SP 800-135": 1,
          "SP 800-38A": 3,
          "SP 800-38D": 3,
          "SP 800-52": 1,
          "SP 800-56A": 5,
          "SP 800-90A": 9
        },
        "PKCS": {
          "PKCS1": 2
        },
        "RFC": {
          "RFC 5288": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 17
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 4,
            "HMAC-SHA-256": 2,
            "HMAC-SHA-384": 4,
            "HMAC-SHA-512": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "STMicroelectronics": {
          "STM": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/AAPL:Keywords": "[]",
      "/Author": "jussipekka leiwo",
      "/CreationDate": "D:20200831042311Z00\u002700\u0027",
      "/Creator": "Word",
      "/Keywords": "",
      "/ModDate": "D:20200831042311Z00\u002700\u0027",
      "/Producer": "macOS Version 10.14.6 (Build 18G4032) Quartz PDFContext",
      "/Subject": "",
      "/Title": "Packetlight PL2000 Series EAL2+ALC_FLR.1 Security Target v1.3",
      "pdf_file_size_bytes": 3044422,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 43
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/ACSC%20Certification%20Report%20EFT-T010%20PacketLight%20PL-2000%201.3.12c%20v1.0.pdf",
  "scheme": "AU",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.1",
      "EAL2+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/Packetlight%20PL2000%20Series%20EAL2_ALC_FLR_1%20Security%20Targetv1_3.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "040f1500909fd6a73da6eb32c9a3e435a6a8222ebb6f2148f414b7667975b512",
    "report_txt_hash": "cec50d0632b01f9044a75428b1210f349d9eecc7e2a10d41243e31307e43bc93",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "0992a5e37d152833ea4a5588d1055f8d5866b030018edb499f918c3da56c9026",
    "st_txt_hash": "645bd8ce86692c5053c6ed11cafc5682459b49de6f710992db6621703876f929"
  },
  "status": "active"
}