Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
VMware Carbon Black Endpoint Detection and Response (EDR) Server 7.5
CCEVS-VR-VID-11156-2021
Samsung Galaxy Devices on Android 9
CCEVS-VR-10979-2019
name VMware Carbon Black Endpoint Detection and Response (EDR) Server 7.5 Samsung Galaxy Devices on Android 9
category Other Devices and Systems Mobility
not_valid_after 02.08.2023 02.08.2021
not_valid_before 02.08.2021 02.08.2019
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11156-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10979-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11156-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10979-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11156-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10979-st.pdf
manufacturer VMware Inc. Samsung Electronics Co., Ltd.
manufacturer_web https://www.vmware.com https://www.samsung.com
dgst 52a2ab8a0b76216a 154bc23e621ddb8c
heuristics/cert_id CCEVS-VR-VID-11156-2021 CCEVS-VR-10979-2019
heuristics/cpe_matches {} cpe:2.3:o:samsung:android:9.0:smr-aug-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jun-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jan-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-oct-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-dec-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-aug-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-nov-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-sep-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-feb-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jul-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-mar-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-mar-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-apr-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-sep-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jan-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-feb-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jun-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jul-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jun-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jan-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jul-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-feb-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-nov-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-sep-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-nov-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-oct-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-dec-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-mar-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jul-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-nov-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-may-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-aug-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-aug-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-aug-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-dec-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jan-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jul-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jun-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-oct-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-oct-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-nov-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-may-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-apr-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jun-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-mar-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-nov-2018-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-may-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-oct-2018-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-may-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-dec-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-apr-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-apr-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-sep-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-jan-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-apr-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-may-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-oct-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-dec-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-sep-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-feb-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-feb-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-mar-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:9.0:smr-dec-2018-r1:*:*:*:*:*:*
heuristics/related_cves {} CVE-2021-25337, CVE-2021-25370, CVE-2021-25489, CVE-2021-25487, CVE-2021-25395, CVE-2021-25394, CVE-2021-25369
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1
heuristics/extracted_versions 7.5 9
heuristics/scheme_data
  • category: Application Software
  • certification_date: 02.08.2021
  • evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
  • expiration_date: 02.08.2023
  • id: CCEVS-VR-VID11156
  • product: VMware Carbon Black Endpoint Detection and Response (EDR) Server 7.5
  • scheme: US
  • url: https://www.niap-ccevs.org/product/11156
  • vendor: VMware, LLC
  • category: Mobility, Virtual Private Network
  • certification_date: 02.08.2019
  • evaluation_facility: Gossamer Security Solutions
  • expiration_date: 02.08.2021
  • id: CCEVS-VR-VID10979
  • product: Samsung Galaxy Devices on Android 9
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10979
  • vendor: Samsung Electronics Co., Ltd.
heuristics/protection_profiles a1cc4a4e079f4d1f df09b703c88c665a, c88af12926be2779, f4474c6c73660987
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_APP_v1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vpn_cli_v2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v3.1.pdf
pdf_data/cert_filename st_vid11156-ci.pdf st_vid10979-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11156-2021: 1
  • US:
    • CCEVS-VR-VID10979-2019: 1
pdf_data/cert_keywords/vendor
  • Samsung:
    • Samsung: 2
pdf_data/cert_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
  • Gossamer:
    • Gossamer Security: 1
pdf_data/cert_keywords/crypto_protocol
  • VPN:
    • VPN: 1
pdf_data/cert_metadata
  • /CreationDate: D:20210804113313-04'00'
  • /ModDate: D:20210804113313-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 183009
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20190805123726-04'00'
  • /ModDate: D:20190805123726-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 182758
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid11156-vr.pdf st_vid10979-vr.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID11156-2021
    • cert_item: VMware Carbon Black Endpoint Detection and Response (EDR) Server 7.5
    • cert_lab: US NIAP
  • US:
    • cert_id: CCEVS-VR-10979-2019
    • cert_item: Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 9
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11156-2021: 1
  • US:
    • CCEVS-VR-10979-2019: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_TSU_EXT.1: 1
pdf_data/report_keywords/vendor
  • Qualcomm:
    • Qualcomm: 56
  • Samsung:
    • Samsung: 84
pdf_data/report_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 3
  • Gossamer:
    • Gossamer Security: 4
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA-PSS: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-512: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
      • TLSv1.2: 1
  • IPsec:
    • IPsec: 6
  • TLS:
    • TLS:
      • TLS: 4
  • VPN:
    • VPN: 13
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 1
pdf_data/report_keywords/standard_id
  • PKCS:
    • PKCS #1: 1
  • X509:
    • X.509: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • Knox-specific claims made in this evaluation. All other functionality provided by the container is out of scope. 7 Documentation The following documents were available with the TOE for evaluation: Samsung: 1
    • out of scope: 1
pdf_data/report_metadata
  • /CreationDate: D:20190805123511-04'00'
  • /ModDate: D:20190805123511-04'00'
  • pdf_file_size_bytes: 916958
  • pdf_hyperlinks: https://web.nvd.nist.gov/view/vuln/search
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
pdf_data/st_filename st_vid11156-st.pdf st_vid10979-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 9
  • AGD:
    • AGD_OPE.1: 12
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.1: 6
    • ALC_CMS.1: 7
    • ALC_TSU_EXT.1: 9
  • ASE:
    • ASE_CCL.1: 16
    • ASE_ECD.1: 12
    • ASE_INT.1: 14
    • ASE_OBJ.1: 6
    • ASE_REQ.1: 12
    • ASE_TSS.1: 7
  • ATE:
    • ATE_IND.1: 7
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 9
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 8
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 9
    • AGD_PRE: 1
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 3
    • ALC_CMS: 1
    • ALC_CMS.1: 4
    • ALC_TSU_EXT: 3
    • ALC_TSU_EXT.1: 6
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 4
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 5
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 5
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.1: 5
    • FCS_CKM_EXT.1.1: 1
    • FCS_COP: 1
    • FCS_RBG_EXT.1: 6
    • FCS_RBG_EXT.1.1: 2
    • FCS_STO_EXT.1: 6
    • FCS_STO_EXT.1.1: 1
  • FDP:
    • FDP_DAR_EXT: 1
    • FDP_DAR_EXT.1: 5
    • FDP_DAR_EXT.1.1: 1
    • FDP_DEC_EXT.1: 5
    • FDP_DEC_EXT.1.1: 2
    • FDP_DEC_EXT.1.2: 1
    • FDP_NET_EXT.1: 4
    • FDP_NET_EXT.1.1: 1
  • FMT:
    • FMT_CFG_EXT.1: 5
    • FMT_CFG_EXT.1.1: 1
    • FMT_CFG_EXT.1.2: 1
    • FMT_MEC_EXT.1: 8
    • FMT_MEC_EXT.1.1: 1
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
  • FPR:
    • FPR_ANO_EXT.1: 4
    • FPR_ANO_EXT.1.1: 1
  • FPT:
    • FPT_AEX_EXT.1: 5
    • FPT_AEX_EXT.1.1: 2
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.1.3: 2
    • FPT_AEX_EXT.1.4: 2
    • FPT_AEX_EXT.1.5: 1
    • FPT_API_EXT.1: 4
    • FPT_API_EXT.1.1: 1
    • FPT_DIT_EXT.1: 1
    • FPT_IDV_EXT.1: 4
    • FPT_IDV_EXT.1.1: 1
    • FPT_LIB_EXT.1: 4
    • FPT_LIB_EXT.1.1: 1
    • FPT_TUD_EXT.1: 7
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 2
    • FPT_TUD_EXT.1.4: 1
    • FPT_TUD_EXT.1.5: 1
    • FPT_TUD_EXT.2: 7
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
  • FTP:
    • FTP_DIT_EXT.1: 7
    • FTP_DIT_EXT.1.1: 1
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 2
    • FAU_SAR.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SEL: 2
    • FAU_SEL.1: 1
    • FAU_SEL.1.1: 1
    • FAU_STG: 4
    • FAU_STG.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 12
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 10
    • FCS_CKM_EXT: 18
    • FCS_CKM_EXT.1: 1
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.2: 2
    • FCS_CKM_EXT.2.1: 2
    • FCS_CKM_EXT.3: 7
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 1
    • FCS_CKM_EXT.4: 2
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 1
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 1
    • FCS_CKM_EXT.6.1: 1
    • FCS_COP: 1
    • FCS_COP.1: 42
    • FCS_RBG_EXT: 6
    • FCS_RBG_EXT.1: 6
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RBG_EXT.1.3: 1
    • FCS_RBG_EXT.2: 1
    • FCS_RBG_EXT.2.1: 1
    • FCS_SRV_EXT: 7
    • FCS_SRV_EXT.1.1: 1
    • FCS_SRV_EXT.2.1: 1
    • FCS_STG_EXT: 9
    • FCS_STG_EXT.1: 2
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_STG_EXT.2: 4
    • FCS_STG_EXT.2.1: 2
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 2
    • FCS_STG_EXT.3.1: 1
    • FCS_STG_EXT.3.2: 1
    • FCS_TLSC_EXT: 17
    • FCS_TLSC_EXT.1: 10
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.2: 1
    • FCS_TLSC_EXT.2.1: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 1
    • FDP_ACF_EXT: 10
    • FDP_ACF_EXT.1.1: 1
    • FDP_ACF_EXT.1.2: 2
    • FDP_ACF_EXT.2.1: 1
    • FDP_ACF_EXT.3.1: 1
    • FDP_DAR_EXT: 6
    • FDP_DAR_EXT.1: 1
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_DAR_EXT.2: 2
    • FDP_DAR_EXT.2.1: 1
    • FDP_DAR_EXT.2.2: 1
    • FDP_DAR_EXT.2.3: 1
    • FDP_DAR_EXT.2.4: 1
    • FDP_IFC_EXT: 3
    • FDP_IFC_EXT.1: 1
    • FDP_IFC_EXT.1.1: 1
    • FDP_PBA_EXT: 3
    • FDP_PBA_EXT.1: 1
    • FDP_PBA_EXT.1.1: 1
    • FDP_RIP: 2
    • FDP_RIP.2: 1
    • FDP_RIP.2.1: 1
    • FDP_STG_EXT: 3
    • FDP_STG_EXT.1: 2
    • FDP_STG_EXT.1.1: 1
    • FDP_UPC_EXT: 3
    • FDP_UPC_EXT.1: 1
    • FDP_UPC_EXT.1.1: 1
    • FDP_UPC_EXT.1.2: 1
  • FIA:
    • FIA_AFL_EXT: 3
    • FIA_AFL_EXT.1: 2
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_AFL_EXT.1.3: 1
    • FIA_AFL_EXT.1.4: 1
    • FIA_AFL_EXT.1.5: 1
    • FIA_AFL_EXT.1.6: 1
    • FIA_BLT_EXT: 15
    • FIA_BLT_EXT.1: 1
    • FIA_BLT_EXT.1.1: 1
    • FIA_BLT_EXT.2: 1
    • FIA_BLT_EXT.2.1: 1
    • FIA_BLT_EXT.3: 1
    • FIA_BLT_EXT.3.1: 1
    • FIA_BLT_EXT.4: 1
    • FIA_BLT_EXT.4.1: 1
    • FIA_BLT_EXT.6: 1
    • FIA_BLT_EXT.6.1: 1
    • FIA_BMG_EXT: 3
    • FIA_BMG_EXT.1: 17
    • FIA_BMG_EXT.6: 1
    • FIA_BMG_EXT.6.1: 1
    • FIA_PAE_EXT: 3
    • FIA_PAE_EXT.1: 1
    • FIA_PAE_EXT.1.1: 1
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 1
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT: 3
    • FIA_PSK_EXT.1: 1
    • FIA_PSK_EXT.1.1: 1
    • FIA_PSK_EXT.1.2: 1
    • FIA_PSK_EXT.1.3: 1
    • FIA_TRT_EXT: 3
    • FIA_TRT_EXT.1: 1
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 4
    • FIA_UAU.5: 2
    • FIA_UAU.5.1: 2
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 9
    • FIA_UAU.7: 2
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 9
    • FIA_UAU_EXT.1: 1
    • FIA_UAU_EXT.1.1: 1
    • FIA_UAU_EXT.2: 1
    • FIA_UAU_EXT.2.1: 1
    • FIA_UAU_EXT.2.2: 1
    • FIA_UAU_EXT.4: 1
    • FIA_UAU_EXT.4.1: 1
    • FIA_UAU_EXT.4.2: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF_EXT: 4
    • FMT_MOF_EXT.1.1: 1
    • FMT_MOF_EXT.1.2: 9
    • FMT_SMF: 4
    • FMT_SMF.1: 1
    • FMT_SMF_EXT: 11
    • FMT_SMF_EXT.1: 6
    • FMT_SMF_EXT.1.1: 9
    • FMT_SMF_EXT.2: 1
    • FMT_SMF_EXT.2.1: 2
    • FMT_SMF_EXT.3: 4
    • FMT_SMF_EXT.3.1: 1
  • FPT:
    • FPT_AEX_EXT: 19
    • FPT_AEX_EXT.1: 1
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 1
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 1
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_AEX_EXT.5: 1
    • FPT_AEX_EXT.5.1: 1
    • FPT_AEX_EXT.5.2: 1
    • FPT_AEX_EXT.6.1: 1
    • FPT_BBD_EXT: 3
    • FPT_BBD_EXT.1: 1
    • FPT_BBD_EXT.1.1: 1
    • FPT_JTA_EXT: 3
    • FPT_JTA_EXT.1: 1
    • FPT_JTA_EXT.1.1: 1
    • FPT_KST_EXT: 9
    • FPT_KST_EXT.1: 1
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 1
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 1
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT_EXT: 3
    • FPT_NOT_EXT.1: 1
    • FPT_NOT_EXT.1.1: 1
    • FPT_STM: 2
    • FPT_STM.1: 1
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 13
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 10
    • FPT_TUD_EXT: 6
    • FPT_TUD_EXT.1: 1
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 3
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.2.4: 1
  • FTA:
    • FTA_SSL_EXT: 3
    • FTA_SSL_EXT.1: 2
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.1.2: 1
    • FTA_SSL_EXT.1.3: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 2
    • FTA_TAB.1.1: 1
    • FTA_WSE_EXT: 3
    • FTA_WSE_EXT.1: 2
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_ITC_EXT: 8
    • FTP_ITC_EXT.1: 2
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
    • FTP_ITC_EXT.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • O:
    • O.INTEGRITY: 1
    • O.MANAGEMENT: 1
    • O.PROTECTED_COMMS: 1
    • O.PROTECTED_STORAGE: 1
    • O.QUALITY: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PHYSICAL_ACCESS: 1
  • OE:
    • OE.CONFIG: 1
    • OE.NOTIFY: 1
    • OE.NO_TOE_BYPASS: 2
    • OE.PHYSICAL: 1
    • OE.PRECAUTION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
pdf_data/st_keywords/vendor
  • Broadcom:
    • Broadcom: 7
  • Qualcomm:
    • Qualcomm: 52
  • Samsung:
    • Samsung: 137
pdf_data/st_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
      • AES-: 1
  • AES_competition:
    • AES:
      • AES: 9
      • AES-: 4
      • AES-128: 1
      • AES-256: 10
  • constructions:
    • MAC:
      • HMAC: 8
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 3
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 10
  • FF:
    • DH:
      • DH: 5
      • DHE: 1
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 2048: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-256: 16
      • SHA-384: 2
      • SHA-512: 2
      • SHA256: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 3
      • TLS v1.2: 4
      • TLSv1.2: 1
  • VPN:
    • VPN: 1
  • IKE:
    • IKE: 6
    • IKEv1: 9
    • IKEv2: 7
  • IPsec:
    • IPsec: 10
  • TLS:
    • TLS:
      • TLS: 27
      • TLS 1.1: 1
      • TLS 1.2: 1
  • VPN:
    • VPN: 87
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
  • RNG:
    • RBG: 1
  • PRNG:
    • DRBG: 5
  • RNG:
    • RBG: 5
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CCM:
    • CCM: 1
  • CBC:
    • CBC: 5
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 4
  • XTS:
    • XTS: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 4
    • P-384: 4
  • NIST:
    • P-256: 8
    • P-384: 6
    • P-521: 6
    • secp256r1: 2
    • secp384r1: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 3
  • BoringSSL:
    • BoringSSL: 11
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 10
  • IBM:
    • SE: 4
  • other:
    • Kinibi: 2
    • TEE: 15
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS PUB 186-4: 5
  • NIST:
    • NIST SP 800-56A: 1
  • X509:
    • X.509: 2
  • FIPS:
    • FIPS 180-4: 6
    • FIPS 186-4: 5
    • FIPS 197: 7
    • FIPS 198-1: 5
    • FIPS PUB 186-4: 2
    • FIPS186-4: 1
  • NIST:
    • NIST SP 800-38E: 1
    • NIST SP 800-38F: 1
    • SP 800-108: 6
    • SP 800-38A: 1
    • SP 800-38C: 1
    • SP 800-38E: 2
    • SP 800-56A: 1
    • SP 800-90A: 4
  • RFC:
    • RFC 3602: 1
    • RFC 4109: 1
    • RFC 5246: 7
    • RFC 5280: 1
    • RFC 5289: 8
    • RFC 5759: 1
    • RFC 6125: 1
    • RFC3394: 1
    • RFC3602: 1
    • RFC4346: 1
    • RFC5246: 2
  • X509:
    • X.509: 4
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
    • java.lang.invoke: 1
    • java.lang.management: 1
    • java.lang.reflect: 1
    • java.net: 8
    • java.security.cert: 2
    • java.sql: 1
    • java.text: 1
    • java.time: 1
    • java.util: 1
    • java.util.zip: 1
  • org:
    • org.slf4j: 2
  • com:
    • com.samsung.android.knox.net.vpn: 1
  • java:
    • java.security.cert: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Functional Requirements in the claimed Protection Profile. Therefore, the following are considered out of scope of the evaluated configuration because there are no SFRs in the PP that allow this functionality to: 1
    • out of scope: 1
pdf_data/st_metadata
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different