name |
Samsung Galaxy Devices on Android 11 - Spring |
CA eHealth Network Performance Manager r6.1.2 |
category |
Mobility |
Network and Network-Related Devices and Systems |
scheme |
US |
US |
status |
archived |
archived |
not_valid_after |
15.03.2023 |
01.11.2014 |
not_valid_before |
15.03.2021 |
19.05.2010 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11160-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11160-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10367-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11160-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10367-st.pdf |
manufacturer |
Samsung Electronics Co., Ltd. |
CA Technologies |
manufacturer_web |
https://www.samsung.com |
https://www.ca.com |
security_level |
{} |
EAL2 |
dgst |
5b2d5786e0044bc3 |
fb721dfc90adae4a |
heuristics/cert_id |
CCEVS-VR-VID-11160-2021 |
CCEVS-VR-VID-10367-2010 |
heuristics/cert_lab |
US |
US |
heuristics/cpe_matches |
cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
CVE-2023-30700, CVE-2023-42537, CVE-2023-30712, CVE-2023-42536, CVE-2023-30689, CVE-2023-30694, CVE-2023-30685, CVE-2023-21485, CVE-2023-30715, CVE-2023-21461, CVE-2023-21430, CVE-2023-30679, CVE-2024-20836, CVE-2023-21438, CVE-2023-21420, CVE-2023-21441, CVE-2023-21490, CVE-2023-30688, CVE-2023-30717, CVE-2023-42569, CVE-2023-30708, CVE-2023-30696, CVE-2024-20831, CVE-2023-30654, CVE-2023-42556, CVE-2023-42538, CVE-2023-21457, CVE-2023-21487, CVE-2023-30690, CVE-2024-20804, CVE-2023-30693, CVE-2024-20817, CVE-2023-30711, CVE-2023-42561, CVE-2024-20814, CVE-2023-30681, CVE-2023-21428, CVE-2023-30706, CVE-2024-20832, CVE-2023-21454, CVE-2023-21492, CVE-2023-21437, CVE-2023-30716, CVE-2023-30697, CVE-2023-21421, CVE-2023-42530, CVE-2023-21486, CVE-2023-30721, CVE-2023-42532, CVE-2023-21488, CVE-2023-42527, CVE-2023-30718, CVE-2024-20812, CVE-2023-21456, CVE-2024-20818, CVE-2023-30691, CVE-2023-30699, CVE-2023-21445, CVE-2023-42560, CVE-2023-21460, CVE-2023-21504, CVE-2024-20819, CVE-2024-20833, CVE-2023-21496, CVE-2023-42529, CVE-2024-20811, CVE-2023-21458, CVE-2023-21493, CVE-2023-30692, CVE-2023-21495, CVE-2023-30720, CVE-2024-20815, CVE-2023-42559, CVE-2023-21442, CVE-2024-20806, CVE-2023-21435, CVE-2023-21489, CVE-2023-30710, CVE-2023-21429, CVE-2023-21424, CVE-2023-21452, CVE-2023-30727, CVE-2024-20803, CVE-2024-20830, CVE-2023-30686, CVE-2023-30739, CVE-2024-20813, CVE-2023-21427, CVE-2023-30707, CVE-2023-42528, CVE-2023-42531, CVE-2023-42570, CVE-2023-21425, CVE-2024-20834, CVE-2024-20816, CVE-2023-30709, CVE-2023-21422, CVE-2024-20862, CVE-2023-30714, CVE-2023-21436, CVE-2023-21446, CVE-2023-30713, CVE-2024-20835, CVE-2023-30687, CVE-2023-30701, CVE-2023-42566, CVE-2024-20820, CVE-2023-21484, CVE-2023-30719, CVE-2024-20805 |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_TSS.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
11 |
6.1.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Mobility, Virtual Private Network
- certification_date: 15.03.2021
- evaluation_facility: Gossamer Security Solutions
- expiration_date: 15.03.2023
- id: CCEVS-VR-VID11160
- product: Samsung Galaxy Devices on Android 11 - Spring
- scheme: US
- url: https://www.niap-ccevs.org/product/11160
- vendor: Samsung Electronics Co., Ltd.
|
- category: Network Management
- certification_date: 19.05.2010
- evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
- expiration_date: 01.11.2014
- id: CCEVS-VR-VID10367
- product: CA eHealth Network Performance Manager r6.1.2
- scheme: US
- url: https://www.niap-ccevs.org/product/10367
- vendor: CA Technologies
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
df09b703c88c665a, c88af12926be2779, f4474c6c73660987 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vpn_cli_v2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v3.1.pdf |
{} |
pdf_data/cert_filename |
st_vid11160-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11160-2021: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20210315150610-04'00'
- /ModDate: D:20210315150610-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 182575
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid11160-vr.pdf |
st_vid10367-vr.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID11160-2021
- cert_item: Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 11 - Spring
- cert_lab: US NIAP
|
- US:
- cert_id: CCEVS-VR-VID10367-2010
- cert_item: CA eHealth Network Performance Manager 6.1.2
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11160-2021: 1
|
- US:
- CCEVS-VR-VID10367-2010: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL2: 6
- EAL2 augmented: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 3
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Cisco:
- Cisco: 7
- Cisco Systems, Inc: 1
- Microsoft:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- Knox-specific claims made in this evaluation. All other functionality provided by the container is out of scope. 7 Documentation The following documents were available with the TOE for evaluation: Samsung: 1
- out of scope: 1
|
- OutOfScope:
- Interface. The Reports Center is not needed for this functionality. This is untrusted because it is out of scope of the TSF and was such was not tested. Reports Scheduler – This is accessed through the Motif: 1
- out of scope: 4
- to fail over to backup systems in the event of a failure. This is untrusted because it is out of scope of the TSF and was such was not tested. VALIDATION REPORT CA eHealth 6.1.2 11 Disaster Recovery: 1
- to the standby system occurs, which then becomes the active system. This is untrusted because it is out of scope of the TSF and was such was not tested. 6.1.3 Not installed These components are not installed with: 1
- which is not included in the evaluated configuration. This is untrusted because it is out of scope of the TSF and was such was not tested. High Availability configuration – High availability (HA) is: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20210701101149-04'00'
- /ModDate: D:20210701101149-04'00'
- pdf_file_size_bytes: 843882
- pdf_hyperlinks: https://web.nvd.nist.gov/view/vuln/search
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
|
pdf_data/st_filename |
st_vid11160-st.pdf |
st_vid10367-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 1: 2
- EAL 1 augmented: 2
|
- EAL:
- EAL2: 6
- EAL2 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 9
- AGD_PRE: 1
- AGD_PRE.1: 5
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 3
- ALC_CMS: 1
- ALC_CMS.1: 4
- ALC_TSU_EXT: 3
- ALC_TSU_EXT.1: 8
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 12
- ADV_FSP.2: 13
- ADV_TDS.1: 13
- AGD:
- AGD_OPE.1: 16
- AGD_PRE.1: 12
- ALC:
- ALC_CMC.2: 10
- ALC_CMS.2: 8
- ALC_DEL.1: 11
- ASE:
- ASE_CCL.1: 13
- ASE_ECD.1: 12
- ASE_INT.1: 14
- ASE_OBJ.2: 12
- ASE_REQ.2: 15
- ASE_SPD.1: 9
- ASE_TSS.2: 12
- ATE:
- ATE_COV.1: 6
- ATE_FUN.1: 10
- ATE_IND.2: 9
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 4
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 2
- FAU_SAR.1: 1
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SEL: 2
- FAU_SEL.1: 1
- FAU_SEL.1.1: 1
- FAU_STG: 4
- FAU_STG.1: 1
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 1
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 12
- FCS_CKM.1: 8
- FCS_CKM.1.1: 1
- FCS_CKM.2: 11
- FCS_CKM_EXT: 18
- FCS_CKM_EXT.1: 1
- FCS_CKM_EXT.1.1: 1
- FCS_CKM_EXT.1.2: 1
- FCS_CKM_EXT.1.3: 1
- FCS_CKM_EXT.2: 2
- FCS_CKM_EXT.2.1: 2
- FCS_CKM_EXT.3: 5
- FCS_CKM_EXT.3.1: 1
- FCS_CKM_EXT.3.2: 1
- FCS_CKM_EXT.4: 2
- FCS_CKM_EXT.4.1: 2
- FCS_CKM_EXT.4.2: 1
- FCS_CKM_EXT.5: 1
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.6: 1
- FCS_CKM_EXT.6.1: 1
- FCS_COP.1: 57
- FCS_RBG_EXT: 6
- FCS_RBG_EXT.1: 15
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_RBG_EXT.1.3: 1
- FCS_RBG_EXT.2: 1
- FCS_RBG_EXT.2.1: 1
- FCS_SRV_EXT: 7
- FCS_SRV_EXT.1.1: 1
- FCS_SRV_EXT.2.1: 1
- FCS_STG_EXT: 9
- FCS_STG_EXT.1: 2
- FCS_STG_EXT.1.1: 1
- FCS_STG_EXT.1.2: 1
- FCS_STG_EXT.1.3: 1
- FCS_STG_EXT.1.4: 1
- FCS_STG_EXT.1.5: 1
- FCS_STG_EXT.2: 4
- FCS_STG_EXT.2.1: 2
- FCS_STG_EXT.2.2: 1
- FCS_STG_EXT.3: 2
- FCS_STG_EXT.3.1: 1
- FCS_STG_EXT.3.2: 1
- FCS_TLSC_EXT: 17
- FCS_TLSC_EXT.1: 6
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.2: 1
- FCS_TLSC_EXT.2.1: 1
- FDP:
- FDP_ACC.1: 3
- FDP_ACF_EXT: 10
- FDP_ACF_EXT.1.1: 1
- FDP_ACF_EXT.1.2: 2
- FDP_ACF_EXT.2.1: 1
- FDP_ACF_EXT.3.1: 1
- FDP_DAR_EXT: 6
- FDP_DAR_EXT.1: 1
- FDP_DAR_EXT.1.1: 1
- FDP_DAR_EXT.1.2: 1
- FDP_DAR_EXT.2: 2
- FDP_DAR_EXT.2.1: 1
- FDP_DAR_EXT.2.2: 1
- FDP_DAR_EXT.2.3: 1
- FDP_DAR_EXT.2.4: 1
- FDP_IFC_EXT: 7
- FDP_IFC_EXT.1: 1
- FDP_IFC_EXT.1.1: 2
- FDP_PBA_EXT: 3
- FDP_PBA_EXT.1: 1
- FDP_PBA_EXT.1.1: 1
- FDP_RIP: 2
- FDP_RIP.2: 1
- FDP_RIP.2.1: 1
- FDP_STG_EXT: 3
- FDP_STG_EXT.1: 2
- FDP_STG_EXT.1.1: 1
- FDP_UPC_EXT: 3
- FDP_UPC_EXT.1: 1
- FDP_UPC_EXT.1.1: 1
- FDP_UPC_EXT.1.2: 1
- FIA:
- FIA_AFL_EXT: 3
- FIA_AFL_EXT.1: 3
- FIA_AFL_EXT.1.1: 1
- FIA_AFL_EXT.1.2: 1
- FIA_AFL_EXT.1.3: 1
- FIA_AFL_EXT.1.4: 1
- FIA_AFL_EXT.1.5: 1
- FIA_AFL_EXT.1.6: 1
- FIA_BLT_EXT: 15
- FIA_BLT_EXT.1: 1
- FIA_BLT_EXT.1.1: 1
- FIA_BLT_EXT.2: 1
- FIA_BLT_EXT.2.1: 1
- FIA_BLT_EXT.3: 1
- FIA_BLT_EXT.3.1: 2
- FIA_BLT_EXT.4: 1
- FIA_BLT_EXT.4.1: 1
- FIA_BLT_EXT.6: 1
- FIA_BLT_EXT.6.1: 1
- FIA_BMG_EXT.1: 12
- FIA_PAE_EXT: 3
- FIA_PAE_EXT.1: 1
- FIA_PAE_EXT.1.1: 1
- FIA_PMG_EXT: 3
- FIA_PMG_EXT.1: 1
- FIA_PMG_EXT.1.1: 1
- FIA_PSK_EXT: 3
- FIA_PSK_EXT.1: 1
- FIA_PSK_EXT.1.1: 1
- FIA_PSK_EXT.1.2: 1
- FIA_PSK_EXT.1.3: 1
- FIA_TRT_EXT: 3
- FIA_TRT_EXT.1: 1
- FIA_TRT_EXT.1.1: 1
- FIA_UAU: 4
- FIA_UAU.5: 2
- FIA_UAU.5.1: 3
- FIA_UAU.5.2: 1
- FIA_UAU.6: 9
- FIA_UAU.7: 2
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 9
- FIA_UAU_EXT.1: 1
- FIA_UAU_EXT.1.1: 1
- FIA_UAU_EXT.2: 1
- FIA_UAU_EXT.2.1: 1
- FIA_UAU_EXT.2.2: 1
- FIA_UAU_EXT.4: 1
- FIA_UAU_EXT.4.1: 1
- FIA_UAU_EXT.4.2: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF_EXT: 4
- FMT_MOF_EXT.1.1: 1
- FMT_MOF_EXT.1.2: 8
- FMT_SMF: 4
- FMT_SMF.1: 1
- FMT_SMF_EXT: 11
- FMT_SMF_EXT.1: 7
- FMT_SMF_EXT.1.1: 8
- FMT_SMF_EXT.2: 1
- FMT_SMF_EXT.2.1: 2
- FMT_SMF_EXT.3: 4
- FMT_SMF_EXT.3.1: 1
- FPT:
- FPT_AEX_EXT: 19
- FPT_AEX_EXT.1: 1
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.2.1: 1
- FPT_AEX_EXT.3: 1
- FPT_AEX_EXT.3.1: 1
- FPT_AEX_EXT.4: 1
- FPT_AEX_EXT.4.1: 1
- FPT_AEX_EXT.4.2: 1
- FPT_AEX_EXT.5: 1
- FPT_AEX_EXT.5.1: 1
- FPT_AEX_EXT.5.2: 1
- FPT_AEX_EXT.6.1: 1
- FPT_BBD_EXT: 3
- FPT_BBD_EXT.1: 1
- FPT_BBD_EXT.1.1: 1
- FPT_JTA_EXT: 3
- FPT_JTA_EXT.1: 1
- FPT_JTA_EXT.1.1: 1
- FPT_KST_EXT: 9
- FPT_KST_EXT.1: 1
- FPT_KST_EXT.1.1: 1
- FPT_KST_EXT.2: 1
- FPT_KST_EXT.2.1: 1
- FPT_KST_EXT.3: 1
- FPT_KST_EXT.3.1: 1
- FPT_NOT_EXT: 3
- FPT_NOT_EXT.1: 1
- FPT_NOT_EXT.1.1: 1
- FPT_STM: 2
- FPT_STM.1: 1
- FPT_STM.1.1: 1
- FPT_TST_EXT: 13
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.2: 10
- FPT_TUD_EXT: 6
- FPT_TUD_EXT.1: 1
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.2: 3
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FPT_TUD_EXT.2.3: 1
- FPT_TUD_EXT.2.4: 1
- FTA:
- FTA_SSL_EXT: 3
- FTA_SSL_EXT.1: 2
- FTA_SSL_EXT.1.1: 1
- FTA_SSL_EXT.1.2: 1
- FTA_SSL_EXT.1.3: 1
- FTA_TAB: 2
- FTA_TAB.1: 2
- FTA_TAB.1.1: 1
- FTA_WSE_EXT: 3
- FTA_WSE_EXT.1: 2
- FTA_WSE_EXT.1.1: 1
- FTP:
- FTP_ITC_EXT: 8
- FTP_ITC_EXT.1: 2
- FTP_ITC_EXT.1.1: 1
- FTP_ITC_EXT.1.2: 1
- FTP_ITC_EXT.1.3: 1
|
- FAU:
- FAU_GEN: 3
- FAU_GEN.1: 15
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_GEN_EXT: 2
- FAU_GEN_EXT.1: 66
- FAU_GEN_EXT.1.1: 5
- FAU_GEN_EXT.1.2: 5
- FAU_GEN_EXT.1.3: 1
- FAU_SAR: 3
- FAU_SAR.1: 12
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 9
- FAU_SAR.2.1: 1
- FAU_SAR.3: 9
- FAU_SAR.3.1: 1
- FAU_SAR_EXT: 1
- FAU_SAR_EXT.1: 13
- FAU_SAR_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP.1: 12
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC.1: 9
- FDP_ACC.1.1: 1
- FDP_ACF.1: 9
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FIA:
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 8
- FIA_UID.1: 4
- FIA_UID.2: 8
- FMT:
- FMT_MOF.1: 18
- FMT_MOF.1.1: 2
- FMT_MSA: 1
- FMT_MSA.1: 6
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 29
- FMT_MTD.1.1: 3
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 3
- FMT_SMR.1.2: 1
- FPT:
- FTP:
- FTP_TRP.1: 9
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- OE:
- OE.CONFIG: 1
- OE.NOTIFY: 1
- OE.NO_TOE_BYPASS: 2
- OE.PHYSICAL: 1
- OE.PRECAUTION: 1
- OE.TRUSTED_ADMIN: 1
- OE.TRUSTED_CONFIG: 1
|
- A:
- A.ADMIN: 3
- A.CLIENT: 3
- A.LOCATE: 3
- A.NOEVIL: 3
- A.PASSWORD: 3
- A.PATCHES: 3
- A.PROTECT: 3
- O:
- O.ACCESS: 4
- O.AUDIT: 6
- O.CRYPTOGRAPHIC: 2
- O.CRYPTOGRAPHIC_FUNCTIO: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 2
- O.IDEN: 4
- O.MANAGE: 6
- O.MONITOR: 4
- O.ROBUST_ADMIN_GUIDANC: 1
- O.ROBUST_ADMIN_GUIDANCE: 5
- OE:
- OE.ADMIN: 5
- OE.CLIENT: 3
- OE.LOCATE: 3
- OE.NOEVIL: 3
- OE.PASSWORD: 3
- OE.PROTECT: 3
- T:
- T.ACCESS: 3
- T.ADMIN_ERRO: 1
- T.ADMIN_ERROR: 3
- T.AUDIT_COMP: 1
- T.AUDIT_COMPROMISE: 2
- T.CRYPTO_COM: 1
- T.CRYPTO_COMPROMISE: 1
- T.DOS: 2
- T.EAVESDROPPI: 1
- T.EAVESDROPPING: 2
- T.MASK: 4
- T.MODIFY: 3
|
pdf_data/st_keywords/vendor |
- Broadcom:
- Qualcomm:
- Samsung:
|
- Cisco:
- Cisco: 8
- Cisco Systems, Inc: 1
- Microsoft:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 23
- AES-: 4
- AES-128: 1
- AES-256: 12
- constructions:
- MAC:
- HMAC: 12
- HMAC-SHA-256: 2
- HMAC-SHA-384: 2
- HMAC-SHA-512: 4
|
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 6
- DHE: 1
- Diffie-Hellman: 5
- RSA:
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 22
- SHA-384: 3
- SHA-512: 3
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 12
- IKEv1: 14
- IKEv2: 11
- IPsec:
- TLS:
- TLS:
- TLS: 47
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 2
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 16
- P-384: 10
- P-521: 8
- secp256r1: 2
- secp384r1: 2
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-4: 7
- FIPS 186-4: 8
- FIPS 197: 11
- FIPS 198-1: 6
- FIPS PUB 186-4: 5
- FIPS PUB 197: 2
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38C: 1
- NIST SP 800-38D: 1
- NIST SP 800-38E: 1
- NIST SP 800-38F: 1
- NIST SP 800-57: 1
- SP 800-108: 5
- SP 800-132: 2
- SP 800-38A: 2
- SP 800-38C: 3
- SP 800-38E: 2
- SP 800-38F: 1
- SP 800-56A: 1
- SP 800-90A: 5
- PKCS:
- RFC:
- RFC 2246: 1
- RFC 2560: 1
- RFC 2818: 2
- RFC 3394: 2
- RFC 3526: 1
- RFC 3602: 2
- RFC 4106: 2
- RFC 4109: 1
- RFC 4301: 2
- RFC 4303: 1
- RFC 4346: 1
- RFC 4945: 2
- RFC 5216: 1
- RFC 5246: 4
- RFC 5280: 4
- RFC 5282: 2
- RFC 5288: 3
- RFC 5289: 8
- RFC 5759: 1
- RFC 6125: 1
- RFC 6379: 2
- RFC 6960: 1
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
- com:
- com.samsung.android.knox.net.vpn: 1
- java:
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Interface. The Reports Center is not needed for this functionality. This is untrusted because it is out of scope of the TSF and was such was not tested. Reports Scheduler – This is accessed through the Motif: 1
- out of scope: 4
- to fail over to backup systems in the event of a failure. This is untrusted because it is out of scope of the TSF and was such was not tested. Disaster Recovery configuration - An eHealth environment: 1
- to the standby system occurs, which then becomes the active system. This is untrusted because it is out of scope of the TSF and was such was not tested. 2.2.3 Not installed These components are not installed with: 1
- which is not included in the evaluated configuration. This is untrusted because it is out of scope of the TSF and was such was not tested. High Availability configuration – High availability (HA) is: 1
|
pdf_data/st_metadata |
- /Author: Brian Wood
- /CreationDate: D:20220302135557-05'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20220302135557-05'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Title: Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 11 - Spring (MDFPP31/WLANCEP10/VPNC21) Security Target
- pdf_file_size_bytes: 1488421
- pdf_hyperlinks: https://developer.android.com/reference/android/net/VpnService.html, https://security.samsungmobile.com/, http://www.gossamersec.com/, http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ddi0487a.f/index.html, http://developer.android.com/reference/javax/net/ssl/HttpsURLConnection.html, http://www.wi-fi.org/certification, https://source.android.com/security/, http://developer.android.com/reference/javax/net/ssl/SSLContext.html, https://source.android.com/source/report-bugs.html, https://security.samsungmobile.com/securityReporting.smsb, https://seap.samsung.com/api-references/android/reference/com/samsung/android/knox/net/vpn/package-summary.html, http://developer.android.com/reference/android/bluetooth/package-summary.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 91
|
- /CreationDate: D:20100526203404
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20100526203404
- /Producer: Microsoft® Office Word 2007
- pdf_file_size_bytes: 898971
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 96
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |