Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Samsung Galaxy Devices on Android 11 - Spring
CCEVS-VR-VID-11160-2021
Huawei iMaster MAE-CN version V100R021C10
NSCIB-CC-0351648-CR
name Samsung Galaxy Devices on Android 11 - Spring Huawei iMaster MAE-CN version V100R021C10
category Mobility Network and Network-Related Devices and Systems
scheme US NL
status archived active
not_valid_after 15.03.2023 06.10.2026
not_valid_before 15.03.2021 06.10.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11160-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB%20certificate%2021-0351648.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11160-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0351648-CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11160-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-21-0351648-ST.pdf
manufacturer Samsung Electronics Co., Ltd. Huawei Device Co., Ltd.
manufacturer_web https://www.samsung.com https://www.huawei.com/
security_level {} EAL4+, ALC_FLR.2
dgst 5b2d5786e0044bc3 72d350ff8a19224a
heuristics/cert_id CCEVS-VR-VID-11160-2021 NSCIB-CC-0351648-CR
heuristics/cert_lab US
heuristics/cpe_matches cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:* {}
heuristics/related_cves CVE-2023-30700, CVE-2023-42537, CVE-2023-30712, CVE-2023-42536, CVE-2023-30689, CVE-2023-30694, CVE-2023-30685, CVE-2023-21485, CVE-2023-30715, CVE-2023-21461, CVE-2023-21430, CVE-2023-30679, CVE-2024-20836, CVE-2023-21438, CVE-2023-21420, CVE-2023-21441, CVE-2023-21490, CVE-2023-30688, CVE-2023-30717, CVE-2023-42569, CVE-2023-30708, CVE-2023-30696, CVE-2024-20831, CVE-2023-30654, CVE-2023-42556, CVE-2023-42538, CVE-2023-21457, CVE-2023-21487, CVE-2023-30690, CVE-2024-20804, CVE-2023-30693, CVE-2024-20817, CVE-2023-30711, CVE-2023-42561, CVE-2024-20814, CVE-2023-30681, CVE-2023-21428, CVE-2023-30706, CVE-2024-20832, CVE-2023-21454, CVE-2023-21492, CVE-2023-21437, CVE-2023-30716, CVE-2023-30697, CVE-2023-21421, CVE-2023-42530, CVE-2023-21486, CVE-2023-30721, CVE-2023-42532, CVE-2023-21488, CVE-2023-42527, CVE-2023-30718, CVE-2024-20812, CVE-2023-21456, CVE-2024-20818, CVE-2023-30691, CVE-2023-30699, CVE-2023-21445, CVE-2023-42560, CVE-2023-21460, CVE-2023-21504, CVE-2024-20819, CVE-2024-20833, CVE-2023-21496, CVE-2023-42529, CVE-2024-20811, CVE-2023-21458, CVE-2023-21493, CVE-2023-30692, CVE-2023-21495, CVE-2023-30720, CVE-2024-20815, CVE-2023-42559, CVE-2023-21442, CVE-2024-20806, CVE-2023-21435, CVE-2023-21489, CVE-2023-30710, CVE-2023-21429, CVE-2023-21424, CVE-2023-21452, CVE-2023-30727, CVE-2024-20803, CVE-2024-20830, CVE-2023-30686, CVE-2023-30739, CVE-2024-20813, CVE-2023-21427, CVE-2023-30707, CVE-2023-42528, CVE-2023-42531, CVE-2023-42570, CVE-2023-21425, CVE-2024-20834, CVE-2024-20816, CVE-2023-30709, CVE-2023-21422, CVE-2024-20862, CVE-2023-30714, CVE-2023-21436, CVE-2023-21446, CVE-2023-30713, CVE-2024-20835, CVE-2023-30687, CVE-2023-30701, CVE-2023-42566, CVE-2024-20820, CVE-2023-21484, CVE-2023-30719, CVE-2024-20805 {}
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 11 -
heuristics/report_references/directly_referencing {} NSCIB-CC-0351632-CR, NSCIB-CC-0138342-CR
heuristics/report_references/indirectly_referencing {} NSCIB-CC-0351632-CR, NSCIB-CC-0138342-CR
heuristics/scheme_data
  • category: Mobility, Virtual Private Network
  • certification_date: 15.03.2021
  • evaluation_facility: Gossamer Security Solutions
  • expiration_date: 15.03.2023
  • id: CCEVS-VR-VID11160
  • product: Samsung Galaxy Devices on Android 11 - Spring
  • scheme: US
  • url: https://www.niap-ccevs.org/product/11160
  • vendor: Samsung Electronics Co., Ltd.
heuristics/protection_profiles df09b703c88c665a, c88af12926be2779, f4474c6c73660987 {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vpn_cli_v2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v3.1.pdf {}
pdf_data/cert_filename st_vid11160-ci.pdf NSCIB certificate 21-0351648.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11160-2021: 1
  • NL:
    • CC-21-0351648: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
  • EAL:
    • EAL4: 1
    • EAL4 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/cc_claims
  • R:
    • R.L: 1
pdf_data/cert_keywords/vendor
  • Samsung:
    • Samsung: 2
  • Huawei:
    • Huawei: 2
    • Huawei Technologies Co: 1
pdf_data/cert_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 1
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/cert_keywords/crypto_protocol
  • VPN:
    • VPN: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 1
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20210315150610-04'00'
  • /ModDate: D:20210315150610-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 182575
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20211007140730+01'00'
  • /Creator: C458-M
  • /ModDate: D:20211007140316+02'00'
  • /Producer: KONICA MINOLTA bizhub C458
  • /Title: C458-M&S21100714070
  • pdf_file_size_bytes: 73425
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid11160-vr.pdf NSCIB-CC-0351648-CR.pdf
pdf_data/report_frontpage
  • NL:
  • US:
    • cert_id: CCEVS-VR-VID11160-2021
    • cert_item: Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 11 - Spring
    • cert_lab: US NIAP
  • NL:
    • cert_id: NSCIB-CC-0351648-CR
    • cert_item: Huawei iMaster MAE-CN version V100R021C10
    • cert_lab: SGS Brightsight B.V.
    • developer: Huawei Technologies Co., Ltd
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11160-2021: 1
  • NL:
    • CC-20-0132795: 2
    • NSCIB-CC-0132795: 1
    • NSCIB-CC-0138342: 1
    • NSCIB-CC-0351632-CR: 1
    • NSCIB-CC-0351648-CR: 12
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL4: 2
    • EAL4 augmented: 1
    • EAL4+: 2
pdf_data/report_keywords/cc_sar
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_FLR.2: 2
pdf_data/report_keywords/vendor
  • Qualcomm:
    • Qualcomm: 30
  • Samsung:
    • Samsung: 89
  • Huawei:
    • Huawei: 15
    • Huawei Technologies Co: 3
pdf_data/report_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 4
  • BrightSight:
    • Brightsight: 2
  • SGS:
    • SGS: 2
    • SGS Brightsight: 2
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 6
  • TLS:
    • TLS:
      • TLS: 4
  • VPN:
    • VPN: 11
pdf_data/report_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 1
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 1
pdf_data/report_keywords/standard_id
  • X509:
    • X.509: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • Knox-specific claims made in this evaluation. All other functionality provided by the container is out of scope. 7 Documentation The following documents were available with the TOE for evaluation: Samsung: 1
    • out of scope: 1
  • OutOfScope:
    • TOE deployments to increase the test coverage of the developer. As the hardware models are out of scope for this evaluation the evaluator verified that the firmware packages have been sufficiently: 1
    • out of scope: 1
pdf_data/report_metadata
  • /CreationDate: D:20210701101149-04'00'
  • /ModDate: D:20210701101149-04'00'
  • pdf_file_size_bytes: 843882
  • pdf_hyperlinks: https://web.nvd.nist.gov/view/vuln/search
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
pdf_data/st_filename st_vid11160-st.pdf NSCIB-CC-21-0351648-ST.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1: 2
    • EAL 1 augmented: 2
  • EAL:
    • EAL4: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 8
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 9
    • AGD_PRE: 1
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 3
    • ALC_CMS: 1
    • ALC_CMS.1: 4
    • ALC_TSU_EXT: 3
    • ALC_TSU_EXT.1: 8
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 4
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 5
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 4
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 2
    • FAU_SAR.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SEL: 2
    • FAU_SEL.1: 1
    • FAU_SEL.1.1: 1
    • FAU_STG: 4
    • FAU_STG.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 12
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 11
    • FCS_CKM_EXT: 18
    • FCS_CKM_EXT.1: 1
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.2: 2
    • FCS_CKM_EXT.2.1: 2
    • FCS_CKM_EXT.3: 5
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 1
    • FCS_CKM_EXT.4: 2
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 1
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 1
    • FCS_CKM_EXT.6.1: 1
    • FCS_COP.1: 57
    • FCS_RBG_EXT: 6
    • FCS_RBG_EXT.1: 15
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RBG_EXT.1.3: 1
    • FCS_RBG_EXT.2: 1
    • FCS_RBG_EXT.2.1: 1
    • FCS_SRV_EXT: 7
    • FCS_SRV_EXT.1.1: 1
    • FCS_SRV_EXT.2.1: 1
    • FCS_STG_EXT: 9
    • FCS_STG_EXT.1: 2
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_STG_EXT.2: 4
    • FCS_STG_EXT.2.1: 2
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 2
    • FCS_STG_EXT.3.1: 1
    • FCS_STG_EXT.3.2: 1
    • FCS_TLSC_EXT: 17
    • FCS_TLSC_EXT.1: 6
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.2: 1
    • FCS_TLSC_EXT.2.1: 1
  • FDP:
    • FDP_ACC.1: 3
    • FDP_ACF_EXT: 10
    • FDP_ACF_EXT.1.1: 1
    • FDP_ACF_EXT.1.2: 2
    • FDP_ACF_EXT.2.1: 1
    • FDP_ACF_EXT.3.1: 1
    • FDP_DAR_EXT: 6
    • FDP_DAR_EXT.1: 1
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_DAR_EXT.2: 2
    • FDP_DAR_EXT.2.1: 1
    • FDP_DAR_EXT.2.2: 1
    • FDP_DAR_EXT.2.3: 1
    • FDP_DAR_EXT.2.4: 1
    • FDP_IFC_EXT: 7
    • FDP_IFC_EXT.1: 1
    • FDP_IFC_EXT.1.1: 2
    • FDP_PBA_EXT: 3
    • FDP_PBA_EXT.1: 1
    • FDP_PBA_EXT.1.1: 1
    • FDP_RIP: 2
    • FDP_RIP.2: 1
    • FDP_RIP.2.1: 1
    • FDP_STG_EXT: 3
    • FDP_STG_EXT.1: 2
    • FDP_STG_EXT.1.1: 1
    • FDP_UPC_EXT: 3
    • FDP_UPC_EXT.1: 1
    • FDP_UPC_EXT.1.1: 1
    • FDP_UPC_EXT.1.2: 1
  • FIA:
    • FIA_AFL_EXT: 3
    • FIA_AFL_EXT.1: 3
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_AFL_EXT.1.3: 1
    • FIA_AFL_EXT.1.4: 1
    • FIA_AFL_EXT.1.5: 1
    • FIA_AFL_EXT.1.6: 1
    • FIA_BLT_EXT: 15
    • FIA_BLT_EXT.1: 1
    • FIA_BLT_EXT.1.1: 1
    • FIA_BLT_EXT.2: 1
    • FIA_BLT_EXT.2.1: 1
    • FIA_BLT_EXT.3: 1
    • FIA_BLT_EXT.3.1: 2
    • FIA_BLT_EXT.4: 1
    • FIA_BLT_EXT.4.1: 1
    • FIA_BLT_EXT.6: 1
    • FIA_BLT_EXT.6.1: 1
    • FIA_BMG_EXT.1: 12
    • FIA_PAE_EXT: 3
    • FIA_PAE_EXT.1: 1
    • FIA_PAE_EXT.1.1: 1
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 1
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT: 3
    • FIA_PSK_EXT.1: 1
    • FIA_PSK_EXT.1.1: 1
    • FIA_PSK_EXT.1.2: 1
    • FIA_PSK_EXT.1.3: 1
    • FIA_TRT_EXT: 3
    • FIA_TRT_EXT.1: 1
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 4
    • FIA_UAU.5: 2
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 9
    • FIA_UAU.7: 2
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 9
    • FIA_UAU_EXT.1: 1
    • FIA_UAU_EXT.1.1: 1
    • FIA_UAU_EXT.2: 1
    • FIA_UAU_EXT.2.1: 1
    • FIA_UAU_EXT.2.2: 1
    • FIA_UAU_EXT.4: 1
    • FIA_UAU_EXT.4.1: 1
    • FIA_UAU_EXT.4.2: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF_EXT: 4
    • FMT_MOF_EXT.1.1: 1
    • FMT_MOF_EXT.1.2: 8
    • FMT_SMF: 4
    • FMT_SMF.1: 1
    • FMT_SMF_EXT: 11
    • FMT_SMF_EXT.1: 7
    • FMT_SMF_EXT.1.1: 8
    • FMT_SMF_EXT.2: 1
    • FMT_SMF_EXT.2.1: 2
    • FMT_SMF_EXT.3: 4
    • FMT_SMF_EXT.3.1: 1
  • FPT:
    • FPT_AEX_EXT: 19
    • FPT_AEX_EXT.1: 1
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 1
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 1
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_AEX_EXT.5: 1
    • FPT_AEX_EXT.5.1: 1
    • FPT_AEX_EXT.5.2: 1
    • FPT_AEX_EXT.6.1: 1
    • FPT_BBD_EXT: 3
    • FPT_BBD_EXT.1: 1
    • FPT_BBD_EXT.1.1: 1
    • FPT_JTA_EXT: 3
    • FPT_JTA_EXT.1: 1
    • FPT_JTA_EXT.1.1: 1
    • FPT_KST_EXT: 9
    • FPT_KST_EXT.1: 1
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 1
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 1
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT_EXT: 3
    • FPT_NOT_EXT.1: 1
    • FPT_NOT_EXT.1.1: 1
    • FPT_STM: 2
    • FPT_STM.1: 1
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 13
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 10
    • FPT_TUD_EXT: 6
    • FPT_TUD_EXT.1: 1
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 3
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.2.4: 1
  • FTA:
    • FTA_SSL_EXT: 3
    • FTA_SSL_EXT.1: 2
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.1.2: 1
    • FTA_SSL_EXT.1.3: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 2
    • FTA_TAB.1.1: 1
    • FTA_WSE_EXT: 3
    • FTA_WSE_EXT.1: 2
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_ITC_EXT: 8
    • FTP_ITC_EXT.1: 2
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
    • FTP_ITC_EXT.1.3: 1
  • FAU:
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 7
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 7
    • FAU_STG.3.1: 1
  • FCS:
    • FCS_CKM: 7
    • FCS_CKM.1: 4
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 1
    • FCS_COP: 13
    • FCS_COP.1: 1
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC.1: 3
    • FDP_ACC.2: 10
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 3
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
    • FDP_UIT.1: 7
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 8
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 10
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 19
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 1
  • FTA:
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 6
    • FTA_SSL.4.1: 1
    • FTA_TAH.1: 7
    • FTA_TAH.1.1: 1
    • FTA_TAH.1.2: 1
    • FTA_TAH.1.3: 1
    • FTA_TSE.1: 9
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 2
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 2
    • FTP_ITC.1.3: 2
    • FTP_TRP.1: 9
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.CONFIG: 1
    • OE.NOTIFY: 1
    • OE.NO_TOE_BYPASS: 2
    • OE.PHYSICAL: 1
    • OE.PRECAUTION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • A:
    • A.NTP: 3
  • OE:
    • OE.NTP: 3
pdf_data/st_keywords/vendor
  • Broadcom:
    • Broadcom: 3
  • Qualcomm:
    • Qualcomm: 54
  • Samsung:
    • Samsung: 180
  • Huawei:
    • Huawei: 14
    • Huawei Technologies Co: 77
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 23
      • AES-: 4
      • AES-128: 1
      • AES-256: 12
  • constructions:
    • MAC:
      • HMAC: 12
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 4
  • AES_competition:
    • AES:
      • AES: 4
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 4
      • ECDHE: 2
    • ECDSA:
      • ECDSA: 17
  • FF:
    • DH:
      • DH: 6
      • DHE: 1
      • Diffie-Hellman: 5
  • RSA:
    • RSA 2048: 2
  • ECC:
    • ECDSA:
      • ECDSA: 1
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 1
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-256: 22
      • SHA-384: 3
      • SHA-512: 3
  • PBKDF:
    • PBKDF2: 8
  • SHA:
    • SHA2:
      • SHA256: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 12
    • IKEv1: 14
    • IKEv2: 11
  • IPsec:
    • IPsec: 42
  • TLS:
    • TLS:
      • TLS: 47
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 2
  • VPN:
    • VPN: 105
  • SSH:
    • SSH: 4
    • SSHv2: 3
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 8
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 8
  • RNG:
    • RBG: 14
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 6
  • CCM:
    • CCM: 3
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 4
  • XTS:
    • XTS: 1
  • CBC:
    • CBC: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 16
    • P-384: 10
    • P-521: 8
    • secp256r1: 2
    • secp384r1: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 22
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 6
  • IBM:
    • SE: 4
  • other:
    • TEE: 26
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-4: 7
    • FIPS 186-4: 8
    • FIPS 197: 11
    • FIPS 198-1: 6
    • FIPS PUB 186-4: 5
    • FIPS PUB 197: 2
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-38E: 1
    • NIST SP 800-38F: 1
    • NIST SP 800-57: 1
    • SP 800-108: 5
    • SP 800-132: 2
    • SP 800-38A: 2
    • SP 800-38C: 3
    • SP 800-38E: 2
    • SP 800-38F: 1
    • SP 800-56A: 1
    • SP 800-90A: 5
  • PKCS:
    • PKCS 2: 1
    • PKCS#12: 2
  • RFC:
    • RFC 2246: 1
    • RFC 2560: 1
    • RFC 2818: 2
    • RFC 3394: 2
    • RFC 3526: 1
    • RFC 3602: 2
    • RFC 4106: 2
    • RFC 4109: 1
    • RFC 4301: 2
    • RFC 4303: 1
    • RFC 4346: 1
    • RFC 4945: 2
    • RFC 5216: 1
    • RFC 5246: 4
    • RFC 5280: 4
    • RFC 5282: 2
    • RFC 5288: 3
    • RFC 5289: 8
    • RFC 5759: 1
    • RFC 6125: 1
    • RFC 6379: 2
    • RFC 6960: 1
  • X509:
    • X.509: 9
  • FIPS:
    • FIPS 197: 1
  • NIST:
    • NIST SP 800-38A: 1
  • RFC:
    • RFC8018: 3
pdf_data/st_keywords/javacard_packages
  • com:
    • com.samsung.android.knox.net.vpn: 1
  • java:
    • java.security.cert: 1
pdf_data/st_metadata
  • /Author: Huawei Technologies Co.,Ltd.
  • /CreationDate: D:20210928143613+02'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20211006081734Z00'00'
  • /Producer: macOS Version 11.5.2 (Build 20G95) Quartz PDFContext, AppendMode 1.1
  • /Subject: Technical Document
  • /Title: Network Cloud Engine Security Target
  • pdf_file_size_bytes: 1616901
  • pdf_hyperlinks: https://10.145.147.16:31945/eviewwebsite/index.html, mailto:[email protected], https://www.huawei.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 72
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different