Red Hat Enterprise Linux Version 5
CSV information ?
Status | archived |
---|---|
Valid from | 26.06.2007 |
Valid until | 06.09.2012 |
Scheme | 🇺🇸 US |
Manufacturer | Hewlett-Packard Company |
Category | Operating Systems |
Security level | EAL4+, ALC_FLR.3 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Hash functions
MD5Schemes
MACProtocols
SSH, SSLLibraries
OpenSSLSecurity level
EAL4, EAL 4, EAL4 augmented, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.3Certificates
CCEVS-VR-07-0054Evaluation facilities
atsecFile metadata
Title: | Validators Report |
---|---|
Author: | Don Phillips |
Creation date: | D:20070702074805-04'00' |
Modification date: | D:20070702081414-04'00' |
Pages: | 18 |
Creator: | Acrobat PDFMaker 7.0 for Word |
Producer: | Acrobat Distiller 7.0 (Windows) |
Frontpage
Certificate ID: | CCEVS-VR-07-0054 |
---|---|
Certified item: | HP Red Hat Enterprise Linux Version 5 |
Certification lab: | US NIAP |
References
IncomingSecurity target ?
Extracted keywords
Symmetric Algorithms
AES, RC4, DES, TDES, SM4Asymmetric Algorithms
Diffie-HellmanHash functions
SHA-1, MD5Schemes
MACProtocols
SSH, SSL, TLSRandomness
PRNGLibraries
OpenSSL, libgcryptBlock cipher modes
CBCTLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHAJavaCard API constants
SM2Trusted Execution Environments
SESecurity level
EAL3, EAL4, EAL 4, EAL4 augmented, EAL 4 augmentedClaims
O.AUTHORIZATION, O.DISCRETIONARY_ACCESS, O.MANDATORY_ACCESS, O.AUDITING, O.RESIDUAL_INFO, O.MANAGE, O.ENFORCEMENT, O.COMPROT, O.DUTY, O.HIERARCHICAL, O.ROLE, O.INFO_PROTECT, O.RESIDUAL_INFORMATION, O.KNOWN, O.ENTRY, O.AUDIT, O.ADMIN, O.CREDEN, O.INSTALL, O.PHYSICAL, O.CONNECT, T.UAUSER, T.UAACCESS, T.COMPROT, T.OPERATE, T.ROLEDEV, T.ENTRY, T.ACCESS, A.LOCATE, A.PROTECT, A.MANAGE, A.NO_EVIL_ADMIN, A.COOP, A.UTRAIN, A.UTRUST, A.ACCESS, A.OWNER, A.NET_COMP, A.PEER, A.CONNECT, A.CLEARANCE, A.SENSITIVITY, A.ASSET, OE.ADMIN, OE.CREDEN, OE.INSTALL, OE.PHYSICAL, OE.INFO_PROTECT, OE.MAINTENANCE, OE.RECOVER, OE.SOFTWARE_IN, OE.SERIAL_LOGIN, OE.CLASSIFICATION, OE.PROTECTSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_ADM.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.3, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2, ASE_REQ.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL.1, FAU_STG, FAU_STG.3, FAU_STG.4, FAU_STG.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FAU_STG.4.1, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_COP.1.1, FCS_CKM.4, FDP_UCT.1, FDP_UIT.1, FDP_ACC.1, FDP_ACF.1, FDP_ETC.1, FDP_ETC.2, FDP_IFC.1, FDP_IFF.2, FDP_ITC.1, FDP_ITC.2, FDP_RIP.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ETC.1.1, FDP_ETC.1.2, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_IFC.1.1, FDP_IFF.2.1, FDP_IFF.2.2, FDP_IFF.2.3, FDP_IFF.2.4, FDP_IFF.2.5, FDP_IFF.2.6, FDP_IFF.2.7, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_RIP.2.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_IFF.1, FIA_ATD.1, FIA_UID, FIA_SOS.1, FIA_UAU.2, FIA_UAU.7, FIA_UID.2, FIA_USB.1, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UAU.7.1, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UAU.1, FIA_UID.1, FIA_USB, FMT_SMF.1, FMT_MSA.2, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_MTD.3, FMT_REV.1, FMT_SMR.2, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MTD.3.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1.1, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMF, FMT_TST.1, FMT_SMR, FPT_AMT.1, FPT_FLS.1, FPT_RCV.1, FPT_RCV.4, FPT_RVM.1, FPT_SEP.1, FPT_STM.1, FPT_TDC.1, FPT_TST.1, FPT_AMT.1.1, FPT_FLS.1.1, FPT_RCV.1.1, FPT_RCV.4.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_STM.1.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_LSA.1, FTA_TSE.1, FTA_LSA.1.1, FTA_TSE.1.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Evaluation facilities
atsecSide-channel analysis
malfunctionStandards
PKCS#1, RFC 4253, RFC2104, RFC 2104, RFC 3268, RFC3268, X.509, CCMB-2005-08-003, CCMB-2005-08-004File metadata
Title: | Red Hat Enterprise Linux 5 Security Target for CAPP, LSPP and RBAC compliance |
---|---|
Author: | Brenda Grove, Gerald Krummeck, Robert Wenner |
Creation date: | D:20070711155916-05'00' |
Modification date: | D:20070713080903-04'00' |
Pages: | 121 |
Creator: | Acrobat PDFMaker 7.0 for Word |
Producer: | Acrobat Distiller 7.0 (Windows) |
References
Incoming- BSI-DSZ-CC-0766-2012 - Oracle Database 11g Release 2 Enterprise Edition, version 11.2.0.2, with all critical patch updates up to and including July 2011 via the July 2011 PSU as well as the October 2011 CPU
- BSI-DSZ-CC-0577-2009 - Oracle Database 11g Enterprise Edition with Oracle Label Security, Release 11.1.0.7 with Critical Patch Updates up to and including July 2009
- BSI-DSZ-CC-0578-2009 - Oracle Database 11g Standard Edition and Standard Edition One Release 11.1.0.7 with Critical Patch Updates up to and including July 2009
- BSI-DSZ-CC-0765-2012 - Oracle Database 11g Release 2 Standard Edition and Standard Edition 1, version 11.2.0.2, with all critical patch updates up to and including July 2011 via the July 2011 PSU as well as the October 2011 CPU
Heuristics ?
Extracted SARs
ADV_ADM.1, AVA_SOF.1, ALC_DVS.1, AGD_ADM.1, ALC_FLR.3, ASE_REQ.1, AVA_MSU.2, ALC_TAT.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, ADV_SPM.1, ATE_COV.2, ADV_RCR.1, ATE_IND.2, ADV_IMP.1, ADV_LLD.1, AGD_USR.1, ADV_HLD.2, AVA_VLA.2, ADV_FSP.2References ?
Updates ?
-
15.02.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd786416ba53ed43457d4002243925eefa306ed6ac6abca61abe3326531345c8b', 'txt_hash': 'd7634e70be1ee96ecf56a3ec71a6bcd7f27a7a0b823bfe95ce59cc9637f94d48'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '85e0926f56d586ff91039663c15be7909dbdaf2635fe4a4afd9d90b32a48a843', 'txt_hash': '75d7a8b1fbef23244b22bcd11138461132bc700d80b09d1d63dfa15bd526cb43'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}
. - The following properties were deleted:
['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash']
.
The PDF extraction data was updated.
- The following values were inserted:
{'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}
. - The report_frontpage property was set to
{'US': {'cert_id': 'CCEVS-VR-07-0054', 'cert_item': 'HP Red Hat Enterprise Linux Version 5', 'cert_lab': 'US NIAP'}}
. - The st_frontpage property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
CCEVS-VR-0054-2007
.
- The following values were inserted:
-
13.02.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cert_id property was set to
CCEVS-VR-07-0054
.
- The cert_id property was set to
-
07.02.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The cert_id property was set to
CCEVS-VR-0054-2007
.
- The cert_id property was set to
-
04.01.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'annotated_references': None}
.
- The following values were inserted:
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': None}
.
- The following values were inserted:
-
11.02.2023 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.cc.CCCertificate
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.InternalState
. - The following properties were deleted:
['errors']
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.PdfData
.
The computed heuristics were updated.
- The following values were inserted:
{'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The _type property was set to
sec_certs.sample.cc.CCCertificate.Heuristics
. - The following properties were deleted:
['direct_dependency_cves', 'indirect_dependency_cves']
.
- The new value is
-
05.02.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0577-2009']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0577-2009']}}}
data.
- The st_references property was updated, with the
-
26.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
85e0926f56d586ff91039663c15be7909dbdaf2635fe4a4afd9d90b32a48a843
. - The st_txt_hash property was set to
75d7a8b1fbef23244b22bcd11138461132bc700d80b09d1d63dfa15bd526cb43
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 594619, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 121, '/CreationDate': "D:20070711155916-05'00'", '/Author': 'Brenda Grove, Gerald Krummeck, Robert Wenner', '/Version': '3.9', '/Creator': 'Acrobat PDFMaker 7.0 for Word', '/ST-Name': 'Red Hat Enterprise Linux 4 Update 2', '/Producer': 'Acrobat Distiller 7.0 (Windows)', '/ST-Date': '2007-05-31', '/ModDate': "D:20070713080903-04'00'", '/Title': 'Red Hat Enterprise Linux 5 Security Target for CAPP, LSPP and RBAC compliance', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ietf.org/rfc/rfc4252.txt', 'http://www.ietf.org/rfc/rfc3268.txt', 'ftp://ftp.rfc-editor.org/in-notes/rfc2401.txt']}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 1, 'EAL4': 6, 'EAL 4': 1, 'EAL4 augmented': 2, 'EAL 4 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_CAP.4': 1, 'ACM_SCP.2': 1}, 'ADO': {'ADO_DEL.2': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_FSP.2': 1, 'ADV_HLD.2': 1, 'ADV_IMP.1': 1, 'ADV_LLD.1': 1, 'ADV_RCR.1': 1, 'ADV_SPM.1': 5, 'ADV_ADM.1': 1}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1}, 'ALC': {'ALC_FLR.3': 8, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_MSU.2': 1, 'AVA_SOF.1': 1, 'AVA_VLA.2': 1}, 'ASE': {'ASE_REQ.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 14, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 10, 'FAU_SAR.1': 11, 'FAU_SAR.2': 16, 'FAU_SAR.3': 12, 'FAU_SEL.1': 12, 'FAU_STG': 1, 'FAU_STG.3': 10, 'FAU_STG.4': 10, 'FAU_STG.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.1': 9, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3.1': 1, 'FAU_STG.4.1': 1}, 'FCS': {'FCS_CKM.1': 26, 'FCS_CKM.2': 28, 'FCS_COP.1': 26, 'FCS_CKM.1.1': 3, 'FCS_CKM.2.1': 4, 'FCS_COP.1.1': 3, 'FCS_CKM.4': 4}, 'FDP': {'FDP_UCT.1': 14, 'FDP_UIT.1': 13, 'FDP_ACC.1': 35, 'FDP_ACF.1': 23, 'FDP_ETC.1': 11, 'FDP_ETC.2': 13, 'FDP_IFC.1': 18, 'FDP_IFF.2': 9, 'FDP_ITC.1': 12, 'FDP_ITC.2': 15, 'FDP_RIP.2': 14, 'FDP_ACC.1.1': 2, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_ETC.2.1': 1, 'FDP_ETC.2.2': 1, 'FDP_ETC.2.3': 1, 'FDP_ETC.2.4': 1, 'FDP_IFC.1.1': 1, 'FDP_IFF.2.1': 1, 'FDP_IFF.2.2': 1, 'FDP_IFF.2.3': 1, 'FDP_IFF.2.4': 1, 'FDP_IFF.2.5': 1, 'FDP_IFF.2.6': 1, 'FDP_IFF.2.7': 2, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_ITC.2.1': 1, 'FDP_ITC.2.2': 1, 'FDP_ITC.2.3': 1, 'FDP_ITC.2.4': 1, 'FDP_ITC.2.5': 1, 'FDP_RIP.2.1': 1, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_IFF.1': 2}, 'FIA': {'FIA_ATD.1': 23, 'FIA_UID': 1, 'FIA_SOS.1': 15, 'FIA_UAU.2': 16, 'FIA_UAU.7': 13, 'FIA_UID.2': 16, 'FIA_USB.1': 26, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.2.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UAU.1': 2, 'FIA_UID.1': 6, 'FIA_USB': 1}, 'FMT': {'FMT_SMF.1': 28, 'FMT_MSA.2': 19, 'FMT_MSA.1': 45, 'FMT_MSA.3': 46, 'FMT_MTD.1': 75, 'FMT_MTD.3': 10, 'FMT_REV.1': 34, 'FMT_SMR.2': 26, 'FMT_MSA.1.1': 6, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 3, 'FMT_MSA.3.2': 3, 'FMT_MTD.1.1': 6, 'FMT_MTD.3.1': 1, 'FMT_REV.1.1': 2, 'FMT_REV.1.2': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_SMF': 2, 'FMT_TST.1': 1, 'FMT_SMR': 2}, 'FPT': {'FPT_AMT.1': 10, 'FPT_FLS.1': 11, 'FPT_RCV.1': 9, 'FPT_RCV.4': 9, 'FPT_RVM.1': 11, 'FPT_SEP.1': 17, 'FPT_STM.1': 11, 'FPT_TDC.1': 14, 'FPT_TST.1': 9, 'FPT_AMT.1.1': 1, 'FPT_FLS.1.1': 1, 'FPT_RCV.1.1': 1, 'FPT_RCV.4.1': 1, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_STM.1.1': 1, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTA': {'FTA_LSA.1': 10, 'FTA_TSE.1': 10, 'FTA_LSA.1.1': 1, 'FTA_TSE.1.1': 1}, 'FTP': {'FTP_ITC.1': 19, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 3}}, 'cc_claims': {'O': {'O.AUTHORIZATION': 25, 'O.DISCRETIONARY_ACCESS': 16, 'O.MANDATORY_ACCESS': 17, 'O.AUDITING': 23, 'O.RESIDUAL_INFO': 9, 'O.MANAGE': 32, 'O.ENFORCEMENT': 14, 'O.COMPROT': 25, 'O.DUTY': 8, 'O.HIERARCHICAL': 8, 'O.ROLE': 17, 'O.INFO_PROTECT': 1, 'O.RESIDUAL_INFORMATION': 2, 'O.KNOWN': 2, 'O.ENTRY': 2, 'O.AUDIT': 1, 'O.ADMIN': 1, 'O.CREDEN': 1, 'O.INSTALL': 4, 'O.PHYSICAL': 2, 'O.CONNECT': 2}, 'T': {'T.UAUSER': 6, 'T.UAACCESS': 6, 'T.COMPROT': 4, 'T.OPERATE': 3, 'T.ROLEDEV': 5, 'T.ENTRY': 1, 'T.ACCESS': 1}, 'A': {'A.LOCATE': 5, 'A.PROTECT': 6, 'A.MANAGE': 7, 'A.NO_EVIL_ADMIN': 4, 'A.COOP': 3, 'A.UTRAIN': 3, 'A.UTRUST': 3, 'A.ACCESS': 4, 'A.OWNER': 4, 'A.NET_COMP': 5, 'A.PEER': 3, 'A.CONNECT': 9, 'A.CLEARANCE': 3, 'A.SENSITIVITY': 3, 'A.ASSET': 2}, 'OE': {'OE.ADMIN': 10, 'OE.CREDEN': 4, 'OE.INSTALL': 14, 'OE.PHYSICAL': 9, 'OE.INFO_PROTECT': 15, 'OE.MAINTENANCE': 7, 'OE.RECOVER': 10, 'OE.SOFTWARE_IN': 8, 'OE.SERIAL_LOGIN': 6, 'OE.CLASSIFICATION': 7, 'OE.PROTECT': 10}}, 'vendor': {}, 'eval_facility': {'atsec': {'atsec': 140}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 7}, 'RC': {'RC4': 4}}, 'DES': {'DES': {'DES': 2}, '3DES': {'TDES': 6}}, 'miscellaneous': {'SM4': {'SM4': 2}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 7}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}, 'MD': {'MD5': {'MD5': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 47}}, 'crypto_protocol': {'SSH': {'SSH': 30}, 'TLS': {'SSL': {'SSL': 43}, 'TLS': {'TLS': 1}}}, 'randomness': {'PRNG': {'PRNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_RSA_WITH_AES_128_CBC_SHA': 2, 'TLS_RSA_WITH_AES_256_CBC_SHA': 2}}, 'crypto_library': {'OpenSSL': {'OpenSSL': 3}, 'libgcrypt': {'libgcrypt': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 8}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#1': 1}, 'RFC': {'RFC 4253': 1, 'RFC2104': 2, 'RFC 2104': 1, 'RFC 3268': 1, 'RFC3268': 1}, 'X509': {'X.509': 3}, 'CC': {'CCMB-2005-08-003': 1, 'CCMB-2005-08-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {'curves': {'SM2': 4}}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
st_vid10165-st.pdf
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0577-2009']}, '__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0765-2012']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0577-2009']}, '__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0765-2012']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}]}
values added.
- The st_download_ok property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0578-2009']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0578-2009']}}}
data.
- The st_references property was updated, with the
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/st_vid10165-st.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0578-2009', 'BSI-DSZ-CC-0765-2012']}, '__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0766-2012']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0578-2009', 'BSI-DSZ-CC-0765-2012']}, '__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0766-2012']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}]}
values discarded.
- The st_download_ok property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0766-2012']}, '__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0588-2009']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0766-2012']}, '__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0588-2009']}}}
data.
- The st_references property was updated, with the
-
24.12.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0588-2009']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0588-2009']}}}
data.
- The st_references property was updated, with the
-
23.12.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0765-2012']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0765-2012']}}}
data.
- The st_references property was updated, with the
-
23.12.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0765-2012']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0765-2012']}}}
data.
- The st_references property was updated, with the
-
05.10.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': False, 'report_convert_garbage': False}
.
- The following values were inserted:
-
24.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': 'st_vid10165-vr.pdf', 'st_filename': 'st_vid10165-st.pdf'}
. - The report_keywords property was updated, with the
{'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.3': 3}}}}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 1}}}}}}, 'tee_name': {}}
data. - The st_keywords property was updated, with the
{'cc_sar': {'__insert__': {'ASE': {'ASE_REQ.1': 1}}, '__update__': {'ALC': {'__update__': {'ALC_FLR.3': 8}}}}, 'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_STG': 1}, '__update__': {'FAU_GEN.1': 14, 'FAU_GEN.2': 10, 'FAU_SAR.1': 11, 'FAU_SAR.2': 16, 'FAU_SAR.3': 12, 'FAU_STG.1': 9}}, 'FCS': {'__update__': {'FCS_COP.1': 26}}, 'FDP': {'__update__': {'FDP_ACC.1': 35, 'FDP_ACF.1': 23, 'FDP_ETC.2': 13, 'FDP_IFC.1': 18, 'FDP_IFF.2': 9, 'FDP_ITC.2': 15, 'FDP_RIP.2': 14, 'FDP_IFF.1': 2}}, 'FIA': {'__insert__': {'FIA_UID': 1, 'FIA_USB': 1}, '__update__': {'FIA_ATD.1': 23, 'FIA_SOS.1': 15, 'FIA_UAU.7': 13, 'FIA_UID.2': 16, 'FIA_USB.1': 26, 'FIA_UAU.1': 2, 'FIA_UID.1': 6}}, 'FMT': {'__insert__': {'FMT_TST.1': 1, 'FMT_SMR': 2}, '__update__': {'FMT_SMF.1': 28, 'FMT_MSA.2': 19, 'FMT_MSA.1': 45, 'FMT_MSA.3': 46, 'FMT_SMR.2': 26, 'FMT_SMF': 2}}, 'FPT': {'__update__': {'FPT_RCV.4': 9, 'FPT_RVM.1': 11, 'FPT_SEP.1': 17, 'FPT_STM.1': 11, 'FPT_TDC.1': 14, 'FPT_TST.1': 9}}, 'FTA': {'__update__': {'FTA_TSE.1': 10}}, 'FTP': {'__update__': {'FTP_ITC.1': 19}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.AUTHORIZATION': 25, 'O.DISCRETIONARY_ACCESS': 16, 'O.MANDATORY_ACCESS': 17, 'O.AUDITING': 23, 'O.RESIDUAL_INFO': 9, 'O.MANAGE': 32, 'O.ENFORCEMENT': 14, 'O.COMPROT': 25, 'O.DUTY': 8, 'O.HIERARCHICAL': 8, 'O.ROLE': 17, 'O.RESIDUAL_INFORMATION': 2, 'O.ADMIN': 1, 'O.CREDEN': 1, 'O.INSTALL': 4, 'O.PHYSICAL': 2}, '__delete__': ['O.ACCOUNT']}, 'A': {'__update__': {'A.LOCATE': 5, 'A.PROTECT': 6, 'A.MANAGE': 7, 'A.ACCESS': 4, 'A.OWNER': 4, 'A.CONNECT': 9}}, 'OE': {'__update__': {'OE.CREDEN': 4, 'OE.INFO_PROTECT': 15, 'OE.RECOVER': 10, 'OE.SERIAL_LOGIN': 6, 'OE.CLASSIFICATION': 7, 'OE.PROTECT': 10}}}}, 'vendor': {}, 'symmetric_crypto': {'__insert__': {'miscellaneous': {'SM4': {'SM4': 2}}}, '__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 7}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 2}}}}}, '__delete__': ['constructions']}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA1': {'__delete__': ['SHA1']}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 47}}}}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 43}}}}}}, 'randomness': {'PRNG': {'PRNG': 1}}, 'crypto_library': {'__update__': {'OpenSSL': {'__update__': {'OpenSSL': 3}}}}, 'side_channel_analysis': {'__update__': {'FI': {'__update__': {'malfunction': 8}}}}, 'tee_name': {'__update__': {'IBM': {'__update__': {'SE': 1}}}}, 'standard_id': {'__update__': {'RFC': {'__insert__': {'RFC 3268': 1}}}}, 'javacard_api_const': {'curves': {'SM2': 4}}}
data.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}]}
values added.
- The following values were inserted:
-
28.07.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_extract_ok property was set to
True
. - The report_extract_ok property was set to
True
. - The errors property was set to
[]
.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 134772, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/CreationDate': "D:20070702074805-04'00'", '/_EmailSubject': 'Lucent EAL2 Validation Report', '/Author': 'Don Phillips', '/Creator': 'Acrobat PDFMaker 7.0 for Word', '/_AuthorEmailDisplayName': 'Phillips, Don', '/Producer': 'Acrobat Distiller 7.0 (Windows)', '/_AuthorEmail': 'donald.phillips@mitretek.org', '/ModDate': "D:20070702081414-04'00'", '/_AdHocReviewCycleID': '-1929089600', '/Company': 'Mitretek Systems', '/SourceModified': 'D:20070629170328', '/Title': 'Validators Report', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 594619, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 121, '/CreationDate': "D:20070711155916-05'00'", '/Author': 'Brenda Grove, Gerald Krummeck, Robert Wenner', '/Version': '3.9', '/Creator': 'Acrobat PDFMaker 7.0 for Word', '/ST-Name': 'Red Hat Enterprise Linux 4 Update 2', '/Producer': 'Acrobat Distiller 7.0 (Windows)', '/ST-Date': '2007-05-31', '/ModDate': "D:20070713080903-04'00'", '/Title': 'Red Hat Enterprise Linux 5 Security Target for CAPP, LSPP and RBAC compliance', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ietf.org/rfc/rfc3268.txt', 'http://www.ietf.org/rfc/rfc4252.txt', 'ftp://ftp.rfc-editor.org/in-notes/rfc2401.txt']}}
.
The computed heuristics were updated.
- The cert_lab property was set to
['US']
.
- The st_extract_ok property was set to
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}]}
.
- The new value is
-
17.07.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_extract_ok property was set to
False
. - The report_extract_ok property was set to
False
. - The errors property was set to
['Failed to read metadata of certs/reports/pdf/a3abfbcba72cee1a.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/a3abfbcba72cee1a.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/reports/pdf/a3abfbcba72cee1a.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/a3abfbcba72cee1a.pdf, error: can only concatenate list (not "IndirectObject") to list']
.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_keywords property was set to
{'cc_cert_id': {'US': {'CCEVS-VR-07-0054': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL 4': 3, 'EAL4 augmented': 1, 'EAL 4 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR.3': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'atsec': {'atsec': 3}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'MD': {'MD5': {'MD5': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 2}}, 'crypto_protocol': {'SSH': {'SSH': 1}, 'TLS': {'SSL': {'SSL': 3}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 2}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 1, 'EAL4': 6, 'EAL 4': 1, 'EAL4 augmented': 2, 'EAL 4 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_CAP.4': 1, 'ACM_SCP.2': 1}, 'ADO': {'ADO_DEL.2': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_FSP.2': 1, 'ADV_HLD.2': 1, 'ADV_IMP.1': 1, 'ADV_LLD.1': 1, 'ADV_RCR.1': 1, 'ADV_SPM.1': 5, 'ADV_ADM.1': 1}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1}, 'ALC': {'ALC_FLR.3': 5, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_MSU.2': 1, 'AVA_SOF.1': 1, 'AVA_VLA.2': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 18, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 9, 'FAU_SAR.1': 13, 'FAU_SAR.2': 13, 'FAU_SAR.3': 11, 'FAU_SEL.1': 12, 'FAU_STG.3': 10, 'FAU_STG.4': 10, 'FAU_STG.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1, 'FAU_SEL.1.1': 1, 'FAU_STG.1': 11, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3.1': 1, 'FAU_STG.4.1': 1}, 'FCS': {'FCS_CKM.1': 26, 'FCS_CKM.2': 28, 'FCS_COP.1': 25, 'FCS_CKM.1.1': 3, 'FCS_CKM.2.1': 4, 'FCS_COP.1.1': 3, 'FCS_CKM.4': 4}, 'FDP': {'FDP_UCT.1': 14, 'FDP_UIT.1': 13, 'FDP_ACC.1': 36, 'FDP_ACF.1': 24, 'FDP_ETC.1': 11, 'FDP_ETC.2': 12, 'FDP_IFC.1': 19, 'FDP_IFF.2': 8, 'FDP_ITC.1': 12, 'FDP_ITC.2': 14, 'FDP_RIP.2': 12, 'FDP_ACC.1.1': 2, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_ETC.2.1': 1, 'FDP_ETC.2.2': 1, 'FDP_ETC.2.3': 1, 'FDP_ETC.2.4': 1, 'FDP_IFC.1.1': 1, 'FDP_IFF.2.1': 1, 'FDP_IFF.2.2': 1, 'FDP_IFF.2.3': 1, 'FDP_IFF.2.4': 1, 'FDP_IFF.2.5': 1, 'FDP_IFF.2.6': 1, 'FDP_IFF.2.7': 2, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_ITC.2.1': 1, 'FDP_ITC.2.2': 1, 'FDP_ITC.2.3': 1, 'FDP_ITC.2.4': 1, 'FDP_ITC.2.5': 1, 'FDP_RIP.2.1': 1, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_IFF.1': 3}, 'FIA': {'FIA_ATD.1': 21, 'FIA_SOS.1': 13, 'FIA_UAU.2': 16, 'FIA_UAU.7': 11, 'FIA_UID.2': 14, 'FIA_USB.1': 23, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.7.1': 1, 'FIA_UID.2.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UAU.1': 4, 'FIA_UID.1': 8}, 'FMT': {'FMT_SMF.1': 22, 'FMT_MSA.2': 18, 'FMT_MSA.1': 46, 'FMT_MSA.3': 45, 'FMT_MTD.1': 75, 'FMT_MTD.3': 10, 'FMT_REV.1': 34, 'FMT_SMR.2': 24, 'FMT_MSA.1.1': 6, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 3, 'FMT_MSA.3.2': 3, 'FMT_MTD.1.1': 6, 'FMT_MTD.3.1': 1, 'FMT_REV.1.1': 2, 'FMT_REV.1.2': 2, 'FMT_SMF.1.1': 1, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_SMF': 1}, 'FPT': {'FPT_AMT.1': 10, 'FPT_FLS.1': 11, 'FPT_RCV.1': 9, 'FPT_RCV.4': 7, 'FPT_RVM.1': 10, 'FPT_SEP.1': 10, 'FPT_STM.1': 10, 'FPT_TDC.1': 12, 'FPT_TST.1': 7, 'FPT_AMT.1.1': 1, 'FPT_FLS.1.1': 1, 'FPT_RCV.1.1': 1, 'FPT_RCV.4.1': 1, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_STM.1.1': 1, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTA': {'FTA_LSA.1': 10, 'FTA_TSE.1': 8, 'FTA_LSA.1.1': 1, 'FTA_TSE.1.1': 1}, 'FTP': {'FTP_ITC.1': 17, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 3}}, 'cc_claims': {'O': {'O.AUTHORIZATION': 26, 'O.DISCRETIONARY_ACCESS': 18, 'O.MANDATORY_ACCESS': 20, 'O.AUDITING': 24, 'O.RESIDUAL_INFO': 10, 'O.MANAGE': 33, 'O.ENFORCEMENT': 15, 'O.COMPROT': 26, 'O.DUTY': 9, 'O.HIERARCHICAL': 9, 'O.ROLE': 18, 'O.INFO_PROTECT': 1, 'O.RESIDUAL_INFORMATION': 3, 'O.ACCOUNT': 2, 'O.KNOWN': 2, 'O.ENTRY': 2, 'O.AUDIT': 1, 'O.ADMIN': 2, 'O.CREDEN': 2, 'O.INSTALL': 5, 'O.PHYSICAL': 3, 'O.CONNECT': 2}, 'T': {'T.UAUSER': 6, 'T.UAACCESS': 6, 'T.COMPROT': 4, 'T.OPERATE': 3, 'T.ROLEDEV': 5, 'T.ENTRY': 1, 'T.ACCESS': 1}, 'A': {'A.LOCATE': 6, 'A.PROTECT': 7, 'A.MANAGE': 8, 'A.NO_EVIL_ADMIN': 4, 'A.COOP': 3, 'A.UTRAIN': 3, 'A.UTRUST': 3, 'A.ACCESS': 5, 'A.OWNER': 5, 'A.NET_COMP': 5, 'A.PEER': 3, 'A.CONNECT': 10, 'A.CLEARANCE': 3, 'A.SENSITIVITY': 3, 'A.ASSET': 2}, 'OE': {'OE.ADMIN': 10, 'OE.CREDEN': 5, 'OE.INSTALL': 14, 'OE.PHYSICAL': 9, 'OE.INFO_PROTECT': 16, 'OE.MAINTENANCE': 7, 'OE.RECOVER': 12, 'OE.SOFTWARE_IN': 8, 'OE.SERIAL_LOGIN': 7, 'OE.CLASSIFICATION': 8, 'OE.PROTECT': 11}}, 'vendor': {'STMicroelectronics': {'STM': 12}}, 'eval_facility': {'atsec': {'atsec': 140}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 9}, 'RC': {'RC4': 4}}, 'DES': {'DES': {'DES': 8}, '3DES': {'TDES': 6}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 7}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 1, 'SHA-1': 1}}, 'MD': {'MD5': {'MD5': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 48}}, 'crypto_protocol': {'SSH': {'SSH': 30}, 'TLS': {'SSL': {'SSL': 48}, 'TLS': {'TLS': 1}}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_RSA_WITH_AES_128_CBC_SHA': 2, 'TLS_RSA_WITH_AES_256_CBC_SHA': 2}}, 'crypto_library': {'OpenSSL': {'OpenSSL': 4}, 'libgcrypt': {'libgcrypt': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 6}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#1': 1}, 'RFC': {'RFC 4253': 1, 'RFC2104': 2, 'RFC 2104': 1, 'RFC3268': 1}, 'X509': {'X.509': 3}, 'CC': {'CCMB-2005-08-003': 1, 'CCMB-2005-08-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
. - The cert_lab property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_SCP', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_AUT', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 4}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 2}]}
values discarded.
- The st_extract_ok property was set to
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': 'd786416ba53ed43457d4002243925eefa306ed6ac6abca61abe3326531345c8b', 'st_pdf_hash': '85e0926f56d586ff91039663c15be7909dbdaf2635fe4a4afd9d90b32a48a843', 'report_txt_hash': 'd7634e70be1ee96ecf56a3ec71a6bcd7f27a7a0b823bfe95ce59cc9637f94d48', 'st_txt_hash': '75d7a8b1fbef23244b22bcd11138461132bc700d80b09d1d63dfa15bd526cb43'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'MD5': 2}, 'rules_crypto_schemes': {'MAC': 2, 'SSL': 3}, 'rules_randomness': {}, 'rules_tee': {'SE': 1}, 'rules_side_channels': {}}
values inserted. - The st_keywords property was updated, with the
{'rules_symmetric_crypto': {'AES': 9, 'RC4': 4, 'TDES': 6, 'DES': 2, 'HMAC': 1}, 'rules_asymmetric_crypto': {'Diffie-Hellman': 7}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA1': 1, 'SHA-1': 1, 'MD5': 2}, 'rules_crypto_schemes': {'MAC': 48, 'SSL': 48, 'TLS': 1}, 'rules_randomness': {}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {'malfunction': 6}}
values inserted.
- The following values were inserted:
-
13.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ADM', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_SCP', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_AUT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 1}]}}
.
- The following values were inserted:
-
24.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
.
- The following values were inserted:
-
08.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0588-2009', 'BSI-DSZ-CC-0577-2009', 'BSI-DSZ-CC-0578-2009', 'BSI-DSZ-CC-0766-2012', 'BSI-DSZ-CC-0765-2012']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0588-2009', 'BSI-DSZ-CC-0577-2009', 'BSI-DSZ-CC-0578-2009', 'BSI-DSZ-CC-0766-2012', 'BSI-DSZ-CC-0765-2012']}, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}
. - The cert_lab property was set to
['US']
. - The following properties were deleted:
['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
- The following values were inserted:
-
18.02.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_frontpage property was updated, with the
{'nscib': {}, 'niap': {'cert_id': 'CCEVS-VR-07-0054', 'cert_item': 'HP Red Hat Enterprise Linux Version 5', 'cert_lab': 'US NIAP'}, 'canada': {}}
values inserted. - The st_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted.
The computed heuristics were updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['5']}
.
- The report_frontpage property was updated, with the
-
28.01.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Red Hat Enterprise Linux Version 5 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Operating Systems",
"cert_link": null,
"dgst": "a3abfbcba72cee1a",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CCEVS-VR-0054-2007",
"cert_lab": [
"US"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"5"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0578-2009",
"BSI-DSZ-CC-0766-2012",
"BSI-DSZ-CC-0765-2012",
"BSI-DSZ-CC-0577-2009",
"BSI-DSZ-CC-0588-2009"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0578-2009",
"BSI-DSZ-CC-0766-2012",
"BSI-DSZ-CC-0765-2012",
"BSI-DSZ-CC-0577-2009",
"BSI-DSZ-CC-0588-2009"
]
},
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Hewlett-Packard Company",
"manufacturer_web": "https://www.hp.com",
"name": "Red Hat Enterprise Linux Version 5",
"not_valid_after": "2012-09-06",
"not_valid_before": "2007-06-26",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "st_vid10165-vr.pdf",
"report_frontpage": {
"US": {
"cert_id": "CCEVS-VR-07-0054",
"cert_item": "HP Red Hat Enterprise Linux Version 5",
"cert_lab": "US NIAP"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"US": {
"CCEVS-VR-07-0054": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.3": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 3,
"EAL 4 augmented": 2,
"EAL4": 2,
"EAL4 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 2
}
},
"crypto_protocol": {
"SSH": {
"SSH": 1
},
"TLS": {
"SSL": {
"SSL": 1
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 3
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Don Phillips",
"/Company": "Mitretek Systems",
"/CreationDate": "D:20070702074805-04\u002700\u0027",
"/Creator": "Acrobat PDFMaker 7.0 for Word",
"/ModDate": "D:20070702081414-04\u002700\u0027",
"/Producer": "Acrobat Distiller 7.0 (Windows)",
"/SourceModified": "D:20070629170328",
"/Title": "Validators Report",
"/_AdHocReviewCycleID": "-1929089600",
"/_AuthorEmail": "donald.phillips@mitretek.org",
"/_AuthorEmailDisplayName": "Phillips, Don",
"/_EmailSubject": "Lucent EAL2 Validation Report",
"pdf_file_size_bytes": 134772,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 18
},
"st_filename": "st_vid10165-st.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"Diffie-Hellman": 7
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ACCESS": 4,
"A.ASSET": 2,
"A.CLEARANCE": 3,
"A.CONNECT": 9,
"A.COOP": 3,
"A.LOCATE": 5,
"A.MANAGE": 7,
"A.NET_COMP": 5,
"A.NO_EVIL_ADMIN": 4,
"A.OWNER": 4,
"A.PEER": 3,
"A.PROTECT": 6,
"A.SENSITIVITY": 3,
"A.UTRAIN": 3,
"A.UTRUST": 3
},
"O": {
"O.ADMIN": 1,
"O.AUDIT": 1,
"O.AUDITING": 23,
"O.AUTHORIZATION": 25,
"O.COMPROT": 25,
"O.CONNECT": 2,
"O.CREDEN": 1,
"O.DISCRETIONARY_ACCESS": 16,
"O.DUTY": 8,
"O.ENFORCEMENT": 14,
"O.ENTRY": 2,
"O.HIERARCHICAL": 8,
"O.INFO_PROTECT": 1,
"O.INSTALL": 4,
"O.KNOWN": 2,
"O.MANAGE": 32,
"O.MANDATORY_ACCESS": 17,
"O.PHYSICAL": 2,
"O.RESIDUAL_INFO": 9,
"O.RESIDUAL_INFORMATION": 2,
"O.ROLE": 17
},
"OE": {
"OE.ADMIN": 10,
"OE.CLASSIFICATION": 7,
"OE.CREDEN": 4,
"OE.INFO_PROTECT": 15,
"OE.INSTALL": 14,
"OE.MAINTENANCE": 7,
"OE.PHYSICAL": 9,
"OE.PROTECT": 10,
"OE.RECOVER": 10,
"OE.SERIAL_LOGIN": 6,
"OE.SOFTWARE_IN": 8
},
"T": {
"T.ACCESS": 1,
"T.COMPROT": 4,
"T.ENTRY": 1,
"T.OPERATE": 3,
"T.ROLEDEV": 5,
"T.UAACCESS": 6,
"T.UAUSER": 6
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 1,
"ACM_CAP.4": 1,
"ACM_SCP.2": 1
},
"ADO": {
"ADO_DEL.2": 1,
"ADO_IGS.1": 1
},
"ADV": {
"ADV_ADM.1": 1,
"ADV_FSP.2": 1,
"ADV_HLD.2": 1,
"ADV_IMP.1": 1,
"ADV_LLD.1": 1,
"ADV_RCR.1": 1,
"ADV_SPM.1": 5
},
"AGD": {
"AGD_ADM.1": 1,
"AGD_USR.1": 1
},
"ALC": {
"ALC_DVS.1": 1,
"ALC_FLR.3": 8,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_REQ.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_MSU.2": 1,
"AVA_SOF.1": 1,
"AVA_VLA.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL3": 1,
"EAL4": 6,
"EAL4 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 14,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 10,
"FAU_GEN.2.1": 1,
"FAU_SAR.1": 11,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 16,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 12,
"FAU_SAR.3.1": 1,
"FAU_SEL.1": 12,
"FAU_SEL.1.1": 1,
"FAU_STG": 1,
"FAU_STG.1": 9,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.2": 1,
"FAU_STG.3": 10,
"FAU_STG.3.1": 1,
"FAU_STG.4": 10,
"FAU_STG.4.1": 1
},
"FCS": {
"FCS_CKM.1": 26,
"FCS_CKM.1.1": 3,
"FCS_CKM.2": 28,
"FCS_CKM.2.1": 4,
"FCS_CKM.4": 4,
"FCS_COP.1": 26,
"FCS_COP.1.1": 3
},
"FDP": {
"FDP_ACC.1": 35,
"FDP_ACC.1.1": 2,
"FDP_ACF.1": 23,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_ETC.1": 11,
"FDP_ETC.1.1": 1,
"FDP_ETC.1.2": 1,
"FDP_ETC.2": 13,
"FDP_ETC.2.1": 1,
"FDP_ETC.2.2": 1,
"FDP_ETC.2.3": 1,
"FDP_ETC.2.4": 1,
"FDP_IFC.1": 18,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 2,
"FDP_IFF.2": 9,
"FDP_IFF.2.1": 1,
"FDP_IFF.2.2": 1,
"FDP_IFF.2.3": 1,
"FDP_IFF.2.4": 1,
"FDP_IFF.2.5": 1,
"FDP_IFF.2.6": 1,
"FDP_IFF.2.7": 2,
"FDP_ITC.1": 12,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITC.2": 15,
"FDP_ITC.2.1": 1,
"FDP_ITC.2.2": 1,
"FDP_ITC.2.3": 1,
"FDP_ITC.2.4": 1,
"FDP_ITC.2.5": 1,
"FDP_RIP.2": 14,
"FDP_RIP.2.1": 1,
"FDP_UCT.1": 14,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 13,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_ATD.1": 23,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 15,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 2,
"FIA_UAU.2": 16,
"FIA_UAU.2.1": 1,
"FIA_UAU.7": 13,
"FIA_UAU.7.1": 1,
"FIA_UID": 1,
"FIA_UID.1": 6,
"FIA_UID.2": 16,
"FIA_UID.2.1": 1,
"FIA_USB": 1,
"FIA_USB.1": 26,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MSA.1": 45,
"FMT_MSA.1.1": 6,
"FMT_MSA.2": 19,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 46,
"FMT_MSA.3.1": 3,
"FMT_MSA.3.2": 3,
"FMT_MTD.1": 75,
"FMT_MTD.1.1": 6,
"FMT_MTD.3": 10,
"FMT_MTD.3.1": 1,
"FMT_REV.1": 34,
"FMT_REV.1.1": 2,
"FMT_REV.1.2": 2,
"FMT_SMF": 2,
"FMT_SMF.1": 28,
"FMT_SMF.1.1": 1,
"FMT_SMR": 2,
"FMT_SMR.2": 26,
"FMT_SMR.2.1": 1,
"FMT_SMR.2.2": 1,
"FMT_SMR.2.3": 1,
"FMT_TST.1": 1
},
"FPT": {
"FPT_AMT.1": 10,
"FPT_AMT.1.1": 1,
"FPT_FLS.1": 11,
"FPT_FLS.1.1": 1,
"FPT_RCV.1": 9,
"FPT_RCV.1.1": 1,
"FPT_RCV.4": 9,
"FPT_RCV.4.1": 1,
"FPT_RVM.1": 11,
"FPT_RVM.1.1": 1,
"FPT_SEP.1": 17,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_STM.1": 11,
"FPT_STM.1.1": 1,
"FPT_TDC.1": 14,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST.1": 9,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTA": {
"FTA_LSA.1": 10,
"FTA_LSA.1.1": 1,
"FTA_TSE.1": 10,
"FTA_TSE.1.1": 1
},
"FTP": {
"FTP_ITC.1": 19,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 3
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 3
},
"libgcrypt": {
"libgcrypt": 1
}
},
"crypto_protocol": {
"SSH": {
"SSH": 30
},
"TLS": {
"SSL": {
"SSL": 43
},
"TLS": {
"TLS": 1
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 47
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 140
}
},
"hash_function": {
"MD": {
"MD5": {
"MD5": 2
}
},
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"curves": {
"SM2": 4
}
},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"malfunction": 8
}
},
"standard_id": {
"CC": {
"CCMB-2005-08-003": 1,
"CCMB-2005-08-004": 1
},
"PKCS": {
"PKCS#1": 1
},
"RFC": {
"RFC 2104": 1,
"RFC 3268": 1,
"RFC 4253": 1,
"RFC2104": 2,
"RFC3268": 1
},
"X509": {
"X.509": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 7
},
"RC": {
"RC4": 4
}
},
"DES": {
"3DES": {
"TDES": 6
},
"DES": {
"DES": 2
}
},
"miscellaneous": {
"SM4": {
"SM4": 2
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 1
}
},
"tls_cipher_suite": {
"TLS": {
"TLS_RSA_WITH_AES_128_CBC_SHA": 2,
"TLS_RSA_WITH_AES_256_CBC_SHA": 2
}
},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Brenda Grove, Gerald Krummeck, Robert Wenner",
"/CreationDate": "D:20070711155916-05\u002700\u0027",
"/Creator": "Acrobat PDFMaker 7.0 for Word",
"/ModDate": "D:20070713080903-04\u002700\u0027",
"/Producer": "Acrobat Distiller 7.0 (Windows)",
"/ST-Date": "2007-05-31",
"/ST-Name": "Red Hat Enterprise Linux 4 Update 2",
"/Title": "Red Hat Enterprise Linux 5 Security Target for CAPP, LSPP and RBAC compliance",
"/Version": "3.9",
"pdf_file_size_bytes": 594619,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ietf.org/rfc/rfc4252.txt",
"ftp://ftp.rfc-editor.org/in-notes/rfc2401.txt",
"http://www.ietf.org/rfc/rfc3268.txt"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 121
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid10165-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"ALC_FLR.3"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/st_vid10165-st.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "d786416ba53ed43457d4002243925eefa306ed6ac6abca61abe3326531345c8b",
"txt_hash": "d7634e70be1ee96ecf56a3ec71a6bcd7f27a7a0b823bfe95ce59cc9637f94d48"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "85e0926f56d586ff91039663c15be7909dbdaf2635fe4a4afd9d90b32a48a843",
"txt_hash": "75d7a8b1fbef23244b22bcd11138461132bc700d80b09d1d63dfa15bd526cb43"
}
},
"status": "archived"
}