name |
Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 12 – Fall |
Huawei FusionSphere 6.5.RC1.T7 |
category |
Mobility |
Operating Systems |
scheme |
US |
ES |
status |
archived |
active |
not_valid_after |
28.10.2024 |
03.02.2026 |
not_valid_before |
28.10.2022 |
04.02.2021 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11307-ci.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-58%20CCRA.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11307-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-58%20INF-3355.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11307-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-58%20ST.pdf |
manufacturer |
Samsung Electronics Co., Ltd. |
Huawei Technologies Co. Ltd. |
manufacturer_web |
https://www.samsung.com |
https://www.huawei.com |
security_level |
{} |
EAL2+, ALC_FLR.2 |
dgst |
06818eae65667bc3 |
1978c3be06f0e1a7 |
heuristics/cert_id |
CCEVS-VR-VID-11307-2022 |
2018-58-INF-3355 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
CVE-2023-30700, CVE-2023-42537, CVE-2023-30712, CVE-2023-42536, CVE-2023-30689, CVE-2023-30694, CVE-2024-20891, CVE-2024-34612, CVE-2024-34594, CVE-2023-30685, CVE-2023-42563, CVE-2024-34589, CVE-2023-21485, CVE-2023-21451, CVE-2024-34647, CVE-2023-30715, CVE-2024-49415, CVE-2023-30680, CVE-2025-20889, CVE-2024-34595, CVE-2024-20846, CVE-2023-21461, CVE-2023-42562, CVE-2025-20887, CVE-2023-21430, CVE-2023-30679, CVE-2024-20836, CVE-2024-34604, CVE-2025-20891, CVE-2023-21438, CVE-2024-20866, CVE-2023-42564, CVE-2024-34646, CVE-2023-21441, CVE-2024-20865, CVE-2023-21490, CVE-2024-20892, CVE-2024-34666, CVE-2023-30688, CVE-2024-34638, CVE-2023-30717, CVE-2025-20884, CVE-2024-34678, CVE-2023-42569, CVE-2023-30708, CVE-2023-30696, CVE-2024-20857, CVE-2024-20831, CVE-2023-30654, CVE-2023-42556, CVE-2023-42538, CVE-2024-34655, CVE-2024-20900, CVE-2025-20904, CVE-2023-21457, CVE-2023-21487, CVE-2023-30690, CVE-2024-20895, CVE-2024-20804, CVE-2024-34652, CVE-2024-34669, CVE-2024-20843, CVE-2024-34583, CVE-2023-30693, CVE-2024-20893, CVE-2024-20817, CVE-2024-20849, CVE-2023-30711, CVE-2024-34588, CVE-2023-42561, CVE-2024-20814, CVE-2024-20859, CVE-2023-30681, CVE-2025-20881, CVE-2025-20885, CVE-2024-34607, CVE-2023-21428, CVE-2024-20844, CVE-2024-34614, CVE-2024-20848, CVE-2023-30706, CVE-2024-20832, CVE-2024-20875, CVE-2023-21454, CVE-2023-21492, CVE-2024-20888, CVE-2024-34676, CVE-2023-42533, CVE-2024-34665, CVE-2023-21437, CVE-2023-30716, CVE-2023-30697, CVE-2024-20897, CVE-2023-21421, CVE-2024-34609, CVE-2024-34619, CVE-2025-20905, CVE-2023-21439, CVE-2024-34587, CVE-2023-21486, CVE-2023-42530, CVE-2024-20847, CVE-2024-34668, CVE-2023-42535, CVE-2023-30721, CVE-2023-42532, CVE-2024-34642, CVE-2023-21488, CVE-2023-42527, CVE-2023-30718, CVE-2024-20812, CVE-2023-21456, CVE-2024-49410, CVE-2024-20818, CVE-2024-34618, CVE-2023-30691, CVE-2023-21423, CVE-2023-30699, CVE-2024-20876, CVE-2023-21445, CVE-2024-34616, CVE-2023-42560, CVE-2024-34593, CVE-2024-34651, CVE-2023-21460, CVE-2023-21504, CVE-2024-20845, CVE-2024-20819, CVE-2024-34611, CVE-2024-49411, CVE-2024-34590, CVE-2024-20833, CVE-2023-21496, CVE-2024-34602, CVE-2024-20881, CVE-2023-42529, CVE-2024-20842, CVE-2024-20811, CVE-2023-21458, CVE-2024-20898, CVE-2024-20899, CVE-2024-34605, CVE-2023-21493, CVE-2023-30692, CVE-2025-20907, CVE-2024-34680, CVE-2023-21495, CVE-2023-30720, CVE-2024-20815, CVE-2024-34585, CVE-2023-42559, CVE-2024-34641, CVE-2024-20890, CVE-2023-21442, CVE-2023-42557, CVE-2024-34615, CVE-2025-20883, CVE-2024-20879, CVE-2024-34637, CVE-2024-20806, CVE-2024-20894, CVE-2023-21435, CVE-2023-21489, CVE-2023-30710, CVE-2024-20896, CVE-2023-21429, CVE-2023-21424, CVE-2023-21452, CVE-2024-34610, CVE-2024-34586, CVE-2024-34677, CVE-2024-34608, CVE-2023-30727, CVE-2024-20803, CVE-2024-20830, CVE-2023-30686, CVE-2023-30739, CVE-2024-20813, CVE-2025-20886, CVE-2023-21427, CVE-2023-30707, CVE-2024-34674, CVE-2024-20882, CVE-2023-42528, CVE-2024-20863, CVE-2023-42531, CVE-2023-42570, CVE-2024-20810, CVE-2024-20889, CVE-2025-20890, CVE-2024-34591, CVE-2023-30733, CVE-2023-21502, CVE-2024-49414, CVE-2024-34645, CVE-2023-21425, CVE-2024-34606, CVE-2024-20877, CVE-2024-20834, CVE-2025-20888, CVE-2023-21491, CVE-2024-34592, CVE-2023-42568, CVE-2024-20880, CVE-2024-20816, CVE-2023-30709, CVE-2023-21422, CVE-2024-20901, CVE-2024-20862, CVE-2023-42534, CVE-2024-20861, CVE-2024-34648, CVE-2023-30714, CVE-2023-21436, CVE-2023-30731, CVE-2024-34673, CVE-2023-21446, CVE-2023-30713, CVE-2025-20882, CVE-2024-20858, CVE-2024-20835, CVE-2023-30687, CVE-2024-34639, CVE-2023-30701, CVE-2023-42566, CVE-2024-20820, CVE-2024-34640, CVE-2024-20878, CVE-2023-21484, CVE-2023-30719, CVE-2024-20805, CVE-2024-34667, CVE-2024-34653 |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 |
ASE_TSS.1, ADV_TDS.1, ASE_INT.1, ALC_DEL.1, ALC_CMC.2, ATE_IND.2, ATE_COV.1, AGD_OPE.1, ADV_ARC.1, AVA_VAN.2, ASE_CCL.1, ALC_FLR.2, ASE_REQ.2 |
heuristics/extracted_versions |
12 |
6.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Mobility
- certification_date: 28.10.2022
- evaluation_facility: Gossamer Security Solutions
- expiration_date: 28.10.2024
- id: CCEVS-VR-VID11307
- product: Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 12 – Fall
- scheme: US
- url: https://www.niap-ccevs.org/product/11307
- vendor: Samsung Electronics Co., Ltd.
|
- category: Operating systems
- certification_date: 04.02.2021
- enhanced:
- category: Operating systems
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1084
- certification_date: 04.02.2021
- description: The Target of Evaluation (TOE) Huawei FusionSphere 6.5.RC1.T7 is a cloud operating system (OS) solution. The TOE provides the following key security features: VM Network Separation: The TOE supports virtual switches and virtual networks. VMs can be separated by creating different networks. Administrators can configure network isolation policies. VM isolation: The hypervisor isolates VMs running on the same physical server to prevent data theft and malicious attacks. VM users can only access resources (hardware and software resources and data) that belong to their own VMs. User and Privilege Management: The TOE supports role-based access control, used for the system maintenance personnel to access the virtualization platform and VMs. The table below shows list of roles defined in the TOE and the description of each role. TOE Access: The TOE offers functionality for terminating active sessions automatically after an inactivity period of time. Communications security: The TOE can be remotely accessed using a SSH connection, creating a trusted path between the TOE and the authorized users. Security audit: Operation logs record the security-relevant events performed by users on the system and the result of the operation and is used for tracing and auditing. Access control: Huawei FusionSphere software implements rolebased access control, limiting access to different management functions to different roles as defined in administrator-defined access control associations. Authentication: Operators who access the TOE locally or remotely in order to execute device management functions are identified by individual user names and authenticated by passwords.
- evaluation_facility: DEKRA Testing and Certification S.A.U.
- level: EAL2 + (ALC_FLR.2)
- manufacturer: Huawei Technologies Co., Ltd.
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1083
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1082
- type: Product
- manufacturer: Huawei Technologies Co., Ltd.
- product: Huawei FusionSphere 6.5.RC1.T7
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/399-huawei-fusionsphere-6-5-rc1-t7
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
c40ae795865a0dba, 731bdcc989507942, 83014eb399a802f3, c88af12926be2779 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MDF_V3.2.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_BT_V1.0.pdf |
{} |
pdf_data/cert_filename |
st_vid11307-ci.pdf |
2018-58 CCRA.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11307-2022: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL2: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- Huawei:
- Huawei: 2
- Huawei Technologies Co: 2
|
pdf_data/cert_keywords/eval_facility |
|
- DEKRA:
- DEKRA Testing and Certification: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20221031104646-04'00'
- /ModDate: D:20221031104646-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 181441
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 738373
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
st_vid11307-vr.pdf |
2018-58 INF-3355.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID11307-2022
- cert_item: Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 12 - Fall
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11307-2022: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 9
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_TDS.1: 1
- AGD:
- ALC:
- ALC_CMC.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 4
- ALC_FLR.2: 6
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 1
- FAU_SAR.1: 1
- FAU_STG.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_IFC: 2
- FDP_IFF: 2
- FDP_RIP.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 1
- FIA_UAU.2: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_SMR.1: 1
- FTA:
- FTP:
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Huawei:
- Huawei: 21
- Huawei Technologies Co: 3
|
pdf_data/report_keywords/eval_facility |
|
- DEKRA:
- DEKRA Testing and Certification: 5
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
st_vid11307-st.pdf |
2018-58 ST.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 1 augmented: 1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 9
- AGD_PRE: 1
- AGD_PRE.1: 5
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 3
- ALC_CMS: 1
- ALC_CMS.1: 4
- ALC_TSU_EXT: 3
- ALC_TSU_EXT.1: 7
- ATE:
- AVA:
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 8
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 2
- FAU_SAR.1: 1
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG: 4
- FAU_STG.1: 1
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 1
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 19
- FCS_CKM.1: 8
- FCS_CKM.1.1: 1
- FCS_CKM.2: 4
- FCS_CKM_EXT: 21
- FCS_CKM_EXT.1: 1
- FCS_CKM_EXT.1.1: 1
- FCS_CKM_EXT.1.2: 1
- FCS_CKM_EXT.1.3: 1
- FCS_CKM_EXT.2: 1
- FCS_CKM_EXT.2.1: 1
- FCS_CKM_EXT.3: 5
- FCS_CKM_EXT.3.1: 1
- FCS_CKM_EXT.3.2: 1
- FCS_CKM_EXT.4: 2
- FCS_CKM_EXT.4.1: 2
- FCS_CKM_EXT.4.2: 1
- FCS_CKM_EXT.5: 1
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.6: 1
- FCS_CKM_EXT.6.1: 1
- FCS_CKM_EXT.8: 2
- FCS_CKM_EXT.8.1: 1
- FCS_COP: 37
- FCS_COP.1: 16
- FCS_RBG_EXT: 6
- FCS_RBG_EXT.1: 14
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_RBG_EXT.1.3: 1
- FCS_RBG_EXT.2: 1
- FCS_RBG_EXT.2.1: 1
- FCS_SRV_EXT: 6
- FCS_SRV_EXT.1: 1
- FCS_SRV_EXT.1.1: 1
- FCS_SRV_EXT.2.1: 1
- FCS_STG_EXT: 9
- FCS_STG_EXT.1: 2
- FCS_STG_EXT.1.1: 1
- FCS_STG_EXT.1.2: 1
- FCS_STG_EXT.1.3: 1
- FCS_STG_EXT.1.4: 1
- FCS_STG_EXT.1.5: 1
- FCS_STG_EXT.2: 4
- FCS_STG_EXT.2.1: 2
- FCS_STG_EXT.2.2: 1
- FCS_STG_EXT.3: 2
- FCS_STG_EXT.3.1: 1
- FCS_STG_EXT.3.2: 1
- FCS_TLSC_EXT: 20
- FCS_TLSC_EXT.1: 6
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.2: 2
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.4: 1
- FCS_TLSC_EXT.4.1: 1
- FCS_TLSC_EXT.5: 1
- FCS_TLSC_EXT.5.1: 1
- FCS_TLSS_EXT.1.1: 1
- FCS_TLS_EXT: 3
- FCS_TLS_EXT.1.1: 1
- FDP:
- FDP_ACC.1: 3
- FDP_ACF_EXT: 9
- FDP_ACF_EXT.1: 1
- FDP_ACF_EXT.1.1: 1
- FDP_ACF_EXT.1.2: 2
- FDP_ACF_EXT.2.1: 1
- FDP_ACF_EXT.3: 1
- FDP_ACF_EXT.3.1: 1
- FDP_DAR_EXT: 6
- FDP_DAR_EXT.1: 1
- FDP_DAR_EXT.1.1: 1
- FDP_DAR_EXT.1.2: 1
- FDP_DAR_EXT.2: 2
- FDP_DAR_EXT.2.1: 1
- FDP_DAR_EXT.2.2: 1
- FDP_DAR_EXT.2.3: 1
- FDP_DAR_EXT.2.4: 1
- FDP_IFC_EXT: 6
- FDP_IFC_EXT.1: 2
- FDP_IFC_EXT.1.1: 2
- FDP_PBA_EXT: 3
- FDP_PBA_EXT.1: 1
- FDP_PBA_EXT.1.1: 1
- FDP_RIP: 2
- FDP_RIP.2: 1
- FDP_RIP.2.1: 1
- FDP_STG_EXT: 3
- FDP_STG_EXT.1: 2
- FDP_STG_EXT.1.1: 1
- FDP_UPC_EXT: 7
- FDP_UPC_EXT.1: 4
- FIA:
- FIA_AFL_EXT: 3
- FIA_AFL_EXT.1: 3
- FIA_AFL_EXT.1.1: 1
- FIA_AFL_EXT.1.2: 1
- FIA_AFL_EXT.1.3: 1
- FIA_AFL_EXT.1.4: 1
- FIA_AFL_EXT.1.5: 1
- FIA_AFL_EXT.1.6: 1
- FIA_BLT_EXT: 18
- FIA_BLT_EXT.1: 2
- FIA_BLT_EXT.1.1: 1
- FIA_BLT_EXT.2: 2
- FIA_BLT_EXT.2.1: 1
- FIA_BLT_EXT.3: 2
- FIA_BLT_EXT.3.1: 1
- FIA_BLT_EXT.4: 1
- FIA_BLT_EXT.4.1: 1
- FIA_BLT_EXT.4.2: 1
- FIA_BLT_EXT.6: 1
- FIA_BLT_EXT.6.1: 1
- FIA_BLT_EXT.7: 1
- FIA_BLT_EXT.7.1: 1
- FIA_BMG_EXT: 1
- FIA_BMG_EXT.1: 11
- FIA_PAE_EXT: 3
- FIA_PAE_EXT.1: 1
- FIA_PAE_EXT.1.1: 1
- FIA_PMG_EXT: 3
- FIA_PMG_EXT.1: 1
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT: 3
- FIA_PSK_EXT.1: 1
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 1
- FIA_PSK_EXT.1.3: 1
- FIA_TRT_EXT: 3
- FIA_TRT_EXT.1: 1
- FIA_TRT_EXT.1.1: 1
- FIA_UAU: 6
- FIA_UAU.5: 2
- FIA_UAU.5.1: 3
- FIA_UAU.5.2: 1
- FIA_UAU.6: 3
- FIA_UAU.6.1: 1
- FIA_UAU.6.2: 1
- FIA_UAU.7: 2
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 9
- FIA_UAU_EXT.1: 1
- FIA_UAU_EXT.1.1: 1
- FIA_UAU_EXT.2: 1
- FIA_UAU_EXT.2.1: 1
- FIA_UAU_EXT.2.2: 1
- FIA_UAU_EXT.4: 1
- FIA_UAU_EXT.4.1: 1
- FIA_UAU_EXT.4.2: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MOF_EXT: 3
- FMT_MOF_EXT.1: 1
- FMT_MOF_EXT.1.1: 1
- FMT_MOF_EXT.1.2: 1
- FMT_SMF: 3
- FMT_SMF.1: 1
- FMT_SMF_EXT: 14
- FMT_SMF_EXT.1: 7
- FMT_SMF_EXT.1.1: 1
- FMT_SMF_EXT.2: 1
- FMT_SMF_EXT.2.1: 1
- FMT_SMF_EXT.3: 2
- FMT_SMF_EXT.3.1: 1
- FPT:
- FPT_AEX_EXT: 18
- FPT_AEX_EXT.1: 1
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.2: 1
- FPT_AEX_EXT.2.1: 1
- FPT_AEX_EXT.3: 1
- FPT_AEX_EXT.3.1: 1
- FPT_AEX_EXT.4: 1
- FPT_AEX_EXT.4.1: 1
- FPT_AEX_EXT.4.2: 1
- FPT_AEX_EXT.5: 1
- FPT_AEX_EXT.5.1: 1
- FPT_AEX_EXT.5.2: 1
- FPT_AEX_EXT.6.1: 1
- FPT_BBD_EXT: 3
- FPT_BBD_EXT.1: 1
- FPT_BBD_EXT.1.1: 1
- FPT_JTA_EXT: 3
- FPT_JTA_EXT.1: 1
- FPT_JTA_EXT.1.1: 1
- FPT_KST_EXT: 9
- FPT_KST_EXT.1: 1
- FPT_KST_EXT.1.1: 1
- FPT_KST_EXT.2: 1
- FPT_KST_EXT.2.1: 1
- FPT_KST_EXT.3: 1
- FPT_KST_EXT.3.1: 1
- FPT_NOT_EXT: 3
- FPT_NOT_EXT.1: 1
- FPT_NOT_EXT.1.1: 1
- FPT_STM: 2
- FPT_STM.1: 1
- FPT_STM.1.1: 1
- FPT_TST_EXT: 17
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.2: 3
- FPT_TUD_EXT: 10
- FPT_TUD_EXT.1: 1
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.2: 3
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FPT_TUD_EXT.2.3: 1
- FPT_TUD_EXT.3: 1
- FPT_TUD_EXT.3.1: 1
- FPT_TUD_EXT.6: 1
- FPT_TUD_EXT.6.1: 1
- FTA:
- FTA_SSL_EXT: 3
- FTA_SSL_EXT.1: 2
- FTA_SSL_EXT.1.1: 1
- FTA_SSL_EXT.1.2: 1
- FTA_SSL_EXT.1.3: 1
- FTA_TAB: 2
- FTA_TAB.1: 2
- FTA_TAB.1.1: 1
- FTA_WSE_EXT: 3
- FTA_WSE_EXT.1: 2
- FTA_WSE_EXT.1.1: 1
- FTP:
- FTP_BLT_EXT: 10
- FTP_BLT_EXT.1: 1
- FTP_BLT_EXT.1.1: 1
- FTP_BLT_EXT.1.2: 1
- FTP_BLT_EXT.2: 1
- FTP_BLT_EXT.2.1: 1
- FTP_BLT_EXT.3: 2
- FTP_ITC: 1
- FTP_ITC_EXT: 5
- FTP_ITC_EXT.1: 4
- FTP_ITC_EXT.1.1: 1
- FTP_ITC_EXT.1.2: 1
- FTP_ITC_EXT.1.3: 1
|
- FAU:
- FAU_GEN.1: 8
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_SAR.1: 6
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_STG.1: 6
- FAU_STG.1.2: 1
- FAU_STG.3: 4
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 8
- FDP_ACF.1: 6
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 12
- FDP_IFC.1: 3
- FDP_IFC.1.1: 2
- FDP_IFF: 10
- FDP_IFF.1: 2
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_RIP.1: 5
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_SOS.1: 4
- FIA_UAU.2: 5
- FIA_UID.1: 2
- FIA_UID.2: 6
- FMT:
- FMT_MOF.1: 5
- FMT_MSA.1: 7
- FMT_MSA.3: 14
- FMT_MSA.3.2: 1
- FMT_SMF.1: 9
- FMT_SMR.1: 9
- FMT_SMR.1.2: 1
- FPT:
- FTA:
- FTP:
- FTP_TRP.1: 5
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- OE:
- OE.CONFIG: 1
- OE.DATA_PROPER_USER: 1
- OE.NOTIFY: 1
- OE.NO_TOE_BYPASS: 2
- OE.PHYSICAL: 1
- OE.PRECAUTION: 1
- OE.TRUSTED_ADMIN: 1
- OE.TRUSTED_CONFIG: 1
|
- A:
- A.ADMIN_NOEVIL: 1
- A.ADMIN_NO_EVIL: 2
- A.OS_TRUSTED: 2
- A.PHY_PROPECT: 1
- A.PHY_PROTECT: 2
- A.SEP_PHY_NETWORK: 2
- A.TIME_SRC: 2
- O:
- OE:
- OE.OS_TRUSTED: 2
- OE.PHY_PROTECTION: 2
- OE.SEP_PHY_NETWORK: 2
- OE.TIME_SRC: 2
- OE.TRUST_WORTHY_USER: 2
- T:
- T.HOST_BYPASS: 3
- T.NOAUTH: 3
- T.NOIDENTIFY: 2
- T.VM_BYPASS: 2
- T.VNETWORK_BYPASS: 2
|
pdf_data/st_keywords/vendor |
- Broadcom:
- Qualcomm:
- Samsung:
|
- Huawei:
- Huawei: 16
- Huawei Technologies Co: 51
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 21
- AES-: 5
- AES-128: 1
- AES-256: 11
- constructions:
- MAC:
- HMAC: 11
- HMAC-SHA-256: 3
- HMAC-SHA-384: 2
- HMAC-SHA-512: 3
|
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 6
- DHE: 1
- Diffie-Hellman: 6
- RSA:
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 23
- SHA-384: 3
- SHA-512: 2
- scrypt:
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 12
- IKEv1: 13
- IKEv2: 11
- IPsec:
- TLS:
- TLS:
- TLS: 60
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 2
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 16
- P-384: 10
- P-521: 8
- secp256r1: 2
- secp384r1: 2
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-4: 6
- FIPS 186-4: 6
- FIPS 197: 9
- FIPS 198-1: 5
- FIPS PUB 186-4: 5
- FIPS PUB 197: 2
- NIST:
- NIST SP 800-132: 4
- NIST SP 800-38A: 1
- NIST SP 800-38C: 1
- NIST SP 800-38D: 1
- NIST SP 800-38E: 1
- NIST SP 800-38F: 1
- NIST SP 800-57: 1
- SP 800-108: 4
- SP 800-38A: 2
- SP 800-38C: 2
- SP 800-38E: 2
- SP 800-38F: 1
- SP 800-56A: 1
- SP 800-90A: 4
- PKCS:
- RFC:
- RFC 2246: 1
- RFC 2560: 1
- RFC 2818: 2
- RFC 3394: 2
- RFC 3526: 2
- RFC 3602: 2
- RFC 4106: 2
- RFC 4109: 1
- RFC 4301: 2
- RFC 4303: 1
- RFC 4346: 1
- RFC 4945: 2
- RFC 5216: 1
- RFC 5246: 4
- RFC 5280: 4
- RFC 5282: 2
- RFC 5288: 3
- RFC 5289: 8
- RFC 5746: 1
- RFC 5759: 1
- RFC 6125: 1
- RFC 6379: 2
- RFC 6960: 1
- RFC 8247: 1
- RFC 8784: 1
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
- com:
- com.samsung.android.knox.net.vpn: 1
- java:
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Brian Wood;Ranjit Mallela
- /CreationDate: D:20230411103255-04'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20230411103255-04'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Title: Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 12 - Winter (MDFPP31/WLANC10/VPNC21) Security Target
- pdf_file_size_bytes: 1328397
- pdf_hyperlinks: https://developer.android.com/reference/android/net/VpnService.html, https://source.android.com/security/apksigning/v3, http://www.gossamersec.com/, http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ddi0487a.f/index.html, https://security.samsungmobile.com/, http://developer.android.com/reference/javax/net/ssl/HttpsURLConnection.html, http://www.wi-fi.org/certification, https://source.android.com/security/, http://developer.android.com/reference/javax/net/ssl/SSLContext.html, https://developer.android.com/reference/android/app/admin/SecurityLog, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=34960, https://source.android.com/source/report-bugs.html, https://security.samsungmobile.com/securityReporting.smsb, https://seap.samsung.com/api-references/android/reference/com/samsung/android/knox/net/vpn/package-summary.html, http://developer.android.com/reference/android/bluetooth/package-summary.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 90
|
|
state/cert/convert_garbage |
True |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |