Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
VMware Horizon 7 v7.3.3, Horizon Client for Windows v4.6.1 and UAG v3.1.1
383-4-441
Samsung Galaxy Devices on Android 12 - Spring
CCEVS-VR-VID-11228-2022
name VMware Horizon 7 v7.3.3, Horizon Client for Windows v4.6.1 and UAG v3.1.1 Samsung Galaxy Devices on Android 12 - Spring
category Other Devices and Systems Mobility
scheme CA US
not_valid_after 04.02.2024 25.05.2024
not_valid_before 04.02.2019 25.05.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-441%20ct%20v1.1e.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11228-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-441%20CR%20v1.1e.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11228-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-441%20VMware_Horizon%207_3_3_ST_v1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11228-st.pdf
manufacturer VMware Inc. Samsung Electronics Co., Ltd.
manufacturer_web https://www.vmware.com https://www.samsung.com
security_level EAL2+, ALC_FLR.2 {}
dgst 7555feba2544ac06 a5d5bc8a08fcbe07
heuristics/cert_id 383-4-441 CCEVS-VR-VID-11228-2022
heuristics/cert_lab [] US
heuristics/cpe_matches {} cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*
heuristics/related_cves {} CVE-2024-20843, CVE-2024-34606, CVE-2024-20811, CVE-2024-34647, CVE-2023-42533, CVE-2024-20817, CVE-2023-42556, CVE-2023-21457, CVE-2023-30699, CVE-2025-20883, CVE-2024-34586, CVE-2025-20886, CVE-2023-30693, CVE-2025-20888, CVE-2023-21488, CVE-2023-21502, CVE-2024-20816, CVE-2023-30681, CVE-2024-20832, CVE-2025-20890, CVE-2023-30686, CVE-2024-20858, CVE-2024-20889, CVE-2024-20830, CVE-2024-34652, CVE-2023-42534, CVE-2024-20836, CVE-2023-42562, CVE-2024-34609, CVE-2023-21490, CVE-2023-30711, CVE-2024-34648, CVE-2024-20894, CVE-2025-20881, CVE-2023-42563, CVE-2024-20834, CVE-2023-42569, CVE-2024-20806, CVE-2025-20891, CVE-2024-34602, CVE-2023-42566, CVE-2023-30720, CVE-2024-34678, CVE-2024-20888, CVE-2024-34604, CVE-2023-21435, CVE-2023-21421, CVE-2023-30721, CVE-2023-21486, CVE-2024-34612, CVE-2024-20805, CVE-2024-20844, CVE-2023-21430, CVE-2023-42536, CVE-2023-30716, CVE-2023-30685, CVE-2024-34590, CVE-2023-42527, CVE-2024-34610, CVE-2024-20810, CVE-2023-21439, CVE-2023-42560, CVE-2023-30707, CVE-2024-20899, CVE-2023-30680, CVE-2024-20842, CVE-2023-30733, CVE-2023-30727, CVE-2023-30688, CVE-2023-21442, CVE-2023-30700, CVE-2024-34608, CVE-2024-34618, CVE-2024-34667, CVE-2023-21460, CVE-2023-30654, CVE-2023-21445, CVE-2023-42529, CVE-2024-34607, CVE-2023-21446, CVE-2023-21437, CVE-2024-20896, CVE-2024-20848, CVE-2023-42564, CVE-2025-20905, CVE-2024-34642, CVE-2024-34668, CVE-2023-21429, CVE-2024-34677, CVE-2023-21491, CVE-2024-20901, CVE-2025-20904, CVE-2024-20895, CVE-2024-34655, CVE-2023-30701, CVE-2023-30709, CVE-2024-20875, CVE-2025-20885, CVE-2024-20893, CVE-2024-20898, CVE-2024-20861, CVE-2023-21425, CVE-2023-42535, CVE-2025-20907, CVE-2024-34666, CVE-2024-34640, CVE-2024-20866, CVE-2024-20857, CVE-2023-21428, CVE-2023-42532, CVE-2024-49411, CVE-2023-30739, CVE-2024-34638, CVE-2024-20845, CVE-2024-34583, CVE-2024-34589, CVE-2024-34676, CVE-2024-34674, CVE-2023-30696, CVE-2024-34594, CVE-2023-42531, CVE-2023-30717, CVE-2024-20818, CVE-2023-21454, CVE-2024-20847, CVE-2024-34641, CVE-2023-30706, CVE-2024-34680, CVE-2023-42538, CVE-2024-20849, CVE-2023-30687, CVE-2023-21456, CVE-2024-20865, CVE-2024-20803, CVE-2023-30692, CVE-2024-34616, CVE-2024-34588, CVE-2024-20859, CVE-2024-20812, CVE-2025-20934, CVE-2023-21493, CVE-2023-21484, CVE-2024-20813, CVE-2024-49414, CVE-2023-21427, CVE-2024-20863, CVE-2023-42568, CVE-2024-20881, CVE-2024-20814, CVE-2024-34593, CVE-2023-30719, CVE-2024-20831, CVE-2023-30697, CVE-2024-20815, CVE-2023-30714, CVE-2023-21422, CVE-2023-30690, CVE-2024-34592, CVE-2024-34639, CVE-2023-21485, CVE-2023-42559, CVE-2023-42557, CVE-2023-21492, CVE-2024-34585, CVE-2024-49415, CVE-2023-21451, CVE-2023-30713, CVE-2023-30712, CVE-2024-34651, CVE-2025-20884, CVE-2024-34605, CVE-2023-21489, CVE-2024-20846, CVE-2024-34669, CVE-2024-34619, CVE-2025-20889, CVE-2024-20900, CVE-2023-30679, CVE-2024-20891, CVE-2023-42570, CVE-2024-20878, CVE-2023-42537, CVE-2024-20897, CVE-2024-34615, CVE-2024-34611, CVE-2023-21438, CVE-2024-20877, CVE-2023-42530, CVE-2025-20887, CVE-2024-34645, CVE-2023-21423, CVE-2023-30694, CVE-2023-21496, CVE-2024-20890, CVE-2023-21424, CVE-2024-49410, CVE-2023-30731, CVE-2023-42528, CVE-2024-34653, CVE-2024-20835, CVE-2023-21452, CVE-2024-20820, CVE-2023-30691, CVE-2024-20892, CVE-2024-34595, CVE-2024-20880, CVE-2023-21441, CVE-2024-34673, CVE-2024-34665, CVE-2025-20882, CVE-2023-30710, CVE-2023-21461, CVE-2023-21458, CVE-2023-21436, CVE-2023-30689, CVE-2024-34591, CVE-2023-21495, CVE-2024-20876, CVE-2023-30718, CVE-2024-34637, CVE-2023-21504, CVE-2024-20833, CVE-2023-42561, CVE-2024-34614, CVE-2024-34646, CVE-2024-20882, CVE-2023-21487, CVE-2024-20879, CVE-2023-30708, CVE-2023-30715, CVE-2024-20862, CVE-2024-34587, CVE-2024-20819, CVE-2024-20804
heuristics/extracted_sars ADV_ARC.1, ATE_IND.2, AGD_PRE.1, ATE_FUN.1, AGD_OPE.1, ADV_TDS.1, ASE_REQ.2, ASE_ECD.1, AVA_VAN.2, ASE_OBJ.2, ASE_SPD.1, ATE_COV.1, ASE_INT.1, ADV_FSP.2, ASE_TSS.1, ALC_DEL.1, ALC_CMC.2, ALC_CMS.2, ASE_CCL.1, ALC_FLR.2 AGD_OPE.1, ADV_FSP.1, AVA_VAN.1, AGD_PRE.1, ALC_CMS.1, ALC_TSU_EXT.1, ALC_CMC.1, ATE_IND.1
heuristics/extracted_versions 7.3.3, 3.1.1, 4.6.1 12
heuristics/protection_profiles {} 731bdcc989507942, 0525a97b2c253a6b, c40ae795865a0dba, c88af12926be2779, 83014eb399a802f3
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_BT_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_VPN_CLI_v2.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MDF_V3.2.pdf
pdf_data/cert_filename 383-4-441 ct v1.1e.pdf st_vid11228-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • CA:
    • 383-4-441: 1
  • US:
    • CCEVS-VR-VID11228-2022: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2+: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/vendor
  • Samsung:
    • Samsung: 2
pdf_data/cert_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 1
pdf_data/cert_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
  • VPN:
    • VPN: 1
pdf_data/cert_metadata
  • /CreationDate: D:20190122115136-04'00'
  • /Creator: Adobe Illustrator CC 22.0 (Windows)
  • /ModDate: D:20190227073710-05'00'
  • /Producer: Adobe PDF library 15.00
  • /Title: cyber-centre-product-evaluation-certificate-e-bg
  • pdf_file_size_bytes: 1848559
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20220526133456-04'00'
  • /ModDate: D:20220526133456-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 181572
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 383-4-441 CR v1.1e.pdf st_vid11228-vr.pdf
pdf_data/report_frontpage
  • US:
  • CA:
  • US:
    • cert_id: CCEVS-VR-VID11228-2022
    • cert_item: Samsung Galaxy Devices on Android 12 - Spring
    • cert_lab: US NIAP
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-441: 1
  • US:
    • CCEVS-VR-VID11228-2022: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2+: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
    • Microsoft Corporation: 2
  • Qualcomm:
    • Qualcomm: 38
  • Samsung:
    • Samsung: 65
pdf_data/report_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 4
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 1
  • IPsec:
    • IPsec: 6
  • TLS:
    • TLS:
      • TLS: 9
  • VPN:
    • VPN: 11
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
  • BoringSSL:
    • BoringSSL: 1
pdf_data/report_keywords/vulnerability
  • CVE:
    • CVE-2017-4948: 1
    • CVE-2018-6970: 1
    • CVE-2018-6971: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025: 2
  • X509:
    • X.509: 1
pdf_data/report_metadata
  • /Author: White, Debra E.
  • /Comments: Version 1.1
  • /Company: CSEC
  • /CreationDate: D:20190304070948-05'00'
  • /Creator: Acrobat PDFMaker 17 for Word
  • /ModDate: D:20190304071003-05'00'
  • /Producer: Adobe PDF Library 15.0
  • /SourceModified: D:20190227120909
  • /Title: 383-4-XXX CR v0.1
  • pdf_file_size_bytes: 238616
  • pdf_hyperlinks: mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
  • /Author: comptont
  • /CreationDate: D:20220629171025-04'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20220629171025-04'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 429023
  • pdf_hyperlinks: https://web.nvd.nist.gov/view/vuln/search, http://www.kb.cert.org/vuls/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
pdf_data/st_filename 383-4-441 VMware_Horizon 7_3_3_ST_v1.1.pdf st_vid11228-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL2: 1
    • EAL2+: 1
  • EAL:
    • EAL 1: 2
    • EAL 1 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.2: 2
    • ADV_TDS.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
    • ALC_FLR.2: 5
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 2
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.2: 2
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 8
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 9
    • AGD_PRE: 1
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 3
    • ALC_CMS: 1
    • ALC_CMS.1: 4
    • ALC_TSU_EXT: 3
    • ALC_TSU_EXT.1: 8
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 4
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 5
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 17
    • FCS_CKM.1.1: 2
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 13
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 28
    • FDP_ACC.1.1: 3
    • FDP_ACF: 1
    • FDP_ACF.1: 26
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
  • FIA:
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 3
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_SMF.1: 18
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 15
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_IFC.1: 1
    • FPT_ITC.1: 13
    • FPT_ITC.1.1: 1
    • FPT_ITI.1: 11
    • FPT_ITI.1.1: 1
    • FPT_ITI.1.2: 1
    • FPT_ITT.1: 14
    • FPT_ITT.1.1: 1
  • FTA:
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 6
    • FTA_SSL.4.1: 1
  • FAU:
    • FAU_GEN: 8
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 2
    • FAU_SAR.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG: 4
    • FAU_STG.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 19
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 4
    • FCS_CKM_EXT: 21
    • FCS_CKM_EXT.1: 1
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.2: 1
    • FCS_CKM_EXT.2.1: 1
    • FCS_CKM_EXT.3: 5
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 1
    • FCS_CKM_EXT.4: 2
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 1
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 1
    • FCS_CKM_EXT.6.1: 1
    • FCS_CKM_EXT.8: 2
    • FCS_CKM_EXT.8.1: 1
    • FCS_COP: 49
    • FCS_COP.1: 9
    • FCS_RBG_EXT: 6
    • FCS_RBG_EXT.1: 15
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RBG_EXT.1.3: 1
    • FCS_RBG_EXT.2: 1
    • FCS_RBG_EXT.2.1: 1
    • FCS_SRV_EXT: 6
    • FCS_SRV_EXT.1: 1
    • FCS_SRV_EXT.1.1: 1
    • FCS_SRV_EXT.2.1: 1
    • FCS_STG_EXT: 9
    • FCS_STG_EXT.1: 2
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_STG_EXT.2: 4
    • FCS_STG_EXT.2.1: 2
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 2
    • FCS_STG_EXT.3.1: 1
    • FCS_STG_EXT.3.2: 1
    • FCS_TLSC_EXT: 17
    • FCS_TLSC_EXT.1: 6
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.2: 2
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.5.1: 1
    • FCS_TLSS_EXT.1.1: 1
    • FCS_TLS_EXT: 3
    • FCS_TLS_EXT.1.1: 1
  • FDP:
    • FDP_ACC.1: 3
    • FDP_ACF_EXT: 9
    • FDP_ACF_EXT.1: 1
    • FDP_ACF_EXT.1.1: 1
    • FDP_ACF_EXT.1.2: 2
    • FDP_ACF_EXT.2.1: 1
    • FDP_ACF_EXT.3: 1
    • FDP_ACF_EXT.3.1: 1
    • FDP_DAR_EXT: 6
    • FDP_DAR_EXT.1: 1
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_DAR_EXT.2: 2
    • FDP_DAR_EXT.2.1: 1
    • FDP_DAR_EXT.2.2: 1
    • FDP_DAR_EXT.2.3: 1
    • FDP_DAR_EXT.2.4: 1
    • FDP_IFC_EXT: 6
    • FDP_IFC_EXT.1: 2
    • FDP_IFC_EXT.1.1: 2
    • FDP_PBA_EXT: 3
    • FDP_PBA_EXT.1: 1
    • FDP_PBA_EXT.1.1: 1
    • FDP_RIP: 2
    • FDP_RIP.2: 1
    • FDP_RIP.2.1: 1
    • FDP_STG_EXT: 3
    • FDP_STG_EXT.1: 2
    • FDP_STG_EXT.1.1: 1
    • FDP_UPC_EXT: 7
    • FDP_UPC_EXT.1: 4
  • FIA:
    • FIA_AFL_EXT: 3
    • FIA_AFL_EXT.1: 3
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_AFL_EXT.1.3: 1
    • FIA_AFL_EXT.1.4: 1
    • FIA_AFL_EXT.1.5: 1
    • FIA_AFL_EXT.1.6: 1
    • FIA_BLT_EXT: 18
    • FIA_BLT_EXT.1: 2
    • FIA_BLT_EXT.1.1: 1
    • FIA_BLT_EXT.2: 2
    • FIA_BLT_EXT.2.1: 1
    • FIA_BLT_EXT.3: 1
    • FIA_BLT_EXT.3.1: 1
    • FIA_BLT_EXT.4: 1
    • FIA_BLT_EXT.4.1: 1
    • FIA_BLT_EXT.4.2: 1
    • FIA_BLT_EXT.6: 1
    • FIA_BLT_EXT.6.1: 1
    • FIA_BLT_EXT.7: 1
    • FIA_BLT_EXT.7.1: 1
    • FIA_BMG_EXT: 1
    • FIA_BMG_EXT.1: 11
    • FIA_PAE_EXT: 3
    • FIA_PAE_EXT.1: 1
    • FIA_PAE_EXT.1.1: 1
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 1
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT: 3
    • FIA_PSK_EXT.1: 1
    • FIA_PSK_EXT.1.1: 1
    • FIA_PSK_EXT.1.2: 1
    • FIA_PSK_EXT.1.3: 1
    • FIA_TRT_EXT: 3
    • FIA_TRT_EXT.1: 1
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 6
    • FIA_UAU.5: 2
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 3
    • FIA_UAU.6.1: 1
    • FIA_UAU.6.2: 1
    • FIA_UAU.7: 2
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 9
    • FIA_UAU_EXT.1: 1
    • FIA_UAU_EXT.1.1: 1
    • FIA_UAU_EXT.2: 1
    • FIA_UAU_EXT.2.1: 1
    • FIA_UAU_EXT.2.2: 1
    • FIA_UAU_EXT.4: 1
    • FIA_UAU_EXT.4.1: 1
    • FIA_UAU_EXT.4.2: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MOF_EXT: 3
    • FMT_MOF_EXT.1: 1
    • FMT_MOF_EXT.1.1: 1
    • FMT_MOF_EXT.1.2: 1
    • FMT_SMF: 3
    • FMT_SMF.1: 1
    • FMT_SMF_EXT: 14
    • FMT_SMF_EXT.1: 7
    • FMT_SMF_EXT.1.1: 1
    • FMT_SMF_EXT.2: 1
    • FMT_SMF_EXT.2.1: 1
    • FMT_SMF_EXT.3: 2
    • FMT_SMF_EXT.3.1: 1
  • FPT:
    • FPT_AEX_EXT: 18
    • FPT_AEX_EXT.1: 1
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2: 1
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 1
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 1
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_AEX_EXT.5: 1
    • FPT_AEX_EXT.5.1: 1
    • FPT_AEX_EXT.5.2: 1
    • FPT_AEX_EXT.6.1: 1
    • FPT_BBD_EXT: 3
    • FPT_BBD_EXT.1: 1
    • FPT_BBD_EXT.1.1: 1
    • FPT_JTA_EXT: 3
    • FPT_JTA_EXT.1: 1
    • FPT_JTA_EXT.1.1: 1
    • FPT_KST_EXT: 9
    • FPT_KST_EXT.1: 1
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 1
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 1
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT_EXT: 3
    • FPT_NOT_EXT.1: 1
    • FPT_NOT_EXT.1.1: 1
    • FPT_STM: 2
    • FPT_STM.1: 1
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 17
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 3
    • FPT_TUD_EXT: 10
    • FPT_TUD_EXT.1: 1
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 3
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.3: 1
    • FPT_TUD_EXT.3.1: 1
    • FPT_TUD_EXT.6: 1
    • FPT_TUD_EXT.6.1: 1
  • FTA:
    • FTA_SSL_EXT: 3
    • FTA_SSL_EXT.1: 2
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.1.2: 1
    • FTA_SSL_EXT.1.3: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 2
    • FTA_TAB.1.1: 1
    • FTA_WSE_EXT: 3
    • FTA_WSE_EXT.1: 2
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_BLT_EXT: 10
    • FTP_BLT_EXT.1: 1
    • FTP_BLT_EXT.1.1: 1
    • FTP_BLT_EXT.1.2: 1
    • FTP_BLT_EXT.2: 1
    • FTP_BLT_EXT.2.1: 1
    • FTP_BLT_EXT.3: 2
    • FTP_ITC: 1
    • FTP_ITC_EXT: 5
    • FTP_ITC_EXT.1: 3
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
    • FTP_ITC_EXT.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.CHANNEL_PROTECTION: 5
    • A.PHYSICAL: 3
    • A.VM_HOST: 2
  • O:
    • O.AUTH_USER: 8
    • O.CHANNEL_PROTECTION: 9
    • O.CONFIG_ACCESS: 9
    • O.ENDPOINT_RESOURCE: 5
    • O.SECURE_SETUP_DATA: 7
    • O.USER_ACCESS: 6
    • O.USE_FIPS: 5
  • OE:
    • OE.ADMIN_USERS: 3
    • OE.AUTHENTICATE: 6
    • OE.CHANNEL_PROTECTION: 9
    • OE.CONFIG_SERVER: 5
    • OE.CONFIG_TP_SW: 5
    • OE.CONFIG_VM_HOST: 6
    • OE.ENCRYPTION: 6
    • OE.SERVER_PHYSICAL: 4
  • T:
    • T.ATTACK_ACCESS: 3
    • T.INTERCEPT: 3
    • T.SPOOF: 2
    • T.USER_ACCESS: 2
    • T.USER_DATA: 3
  • OE:
    • OE.CONFIG: 1
    • OE.DATA_PROPER_USER: 1
    • OE.NOTIFY: 1
    • OE.NO_TOE_BYPASS: 2
    • OE.PHYSICAL: 1
    • OE.PRECAUTION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 14
  • Broadcom:
    • Broadcom: 3
  • Qualcomm:
    • Qualcomm: 64
  • Samsung:
    • Samsung: 193
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • AES_competition:
    • AES:
      • AES: 22
      • AES-: 5
      • AES-128: 1
      • AES-256: 11
  • constructions:
    • MAC:
      • HMAC: 13
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 6
      • ECDHE: 2
    • ECDSA:
      • ECDSA: 17
  • FF:
    • DH:
      • DH: 6
      • DHE: 1
      • Diffie-Hellman: 6
  • RSA:
    • RSA 2048: 2
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 4
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-256: 24
      • SHA-384: 3
      • SHA-512: 2
  • scrypt:
    • scrypt: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 8
  • TLS:
    • TLS:
      • TLS: 8
      • TLS 1.2: 34
      • TLSv1.2: 4
  • IKE:
    • IKE: 12
    • IKEv1: 13
    • IKEv2: 11
  • IPsec:
    • IPsec: 42
  • TLS:
    • TLS:
      • TLS: 57
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 2
  • VPN:
    • VPN: 98
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 2
  • RNG:
    • RBG: 1
  • PRNG:
    • DRBG: 8
  • RNG:
    • RBG: 14
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 6
  • CCM:
    • CCM: 2
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 4
  • XTS:
    • XTS: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 16
    • P-384: 10
    • P-521: 8
    • secp256r1: 2
    • secp384r1: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 2
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 39
  • BoringSSL:
    • BoringSSL: 22
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 6
  • IBM:
    • SE: 4
  • other:
    • TEE: 26
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 11
    • FIPS 186-4: 2
    • FIPS140-2: 1
  • NIST:
    • NIST SP 800-90A: 2
  • RFC:
    • RFC 5246: 2
  • FIPS:
    • FIPS 180-4: 7
    • FIPS 186-4: 8
    • FIPS 197: 10
    • FIPS 198-1: 6
    • FIPS PUB 186-4: 5
    • FIPS PUB 197: 2
  • NIST:
    • NIST SP 800-132: 4
    • NIST SP 800-38A: 1
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-38E: 1
    • NIST SP 800-38F: 1
    • NIST SP 800-57: 1
    • SP 800-108: 4
    • SP 800-38A: 2
    • SP 800-38C: 2
    • SP 800-38E: 2
    • SP 800-38F: 1
    • SP 800-56A: 1
    • SP 800-90A: 5
  • PKCS:
    • PKCS 2: 1
    • PKCS#12: 2
  • RFC:
    • RFC 2246: 1
    • RFC 2560: 1
    • RFC 2818: 2
    • RFC 3394: 2
    • RFC 3526: 3
    • RFC 3602: 2
    • RFC 4106: 2
    • RFC 4109: 1
    • RFC 4301: 2
    • RFC 4303: 1
    • RFC 4346: 1
    • RFC 4945: 2
    • RFC 5216: 1
    • RFC 5246: 4
    • RFC 5280: 4
    • RFC 5282: 2
    • RFC 5288: 3
    • RFC 5289: 8
    • RFC 5759: 1
    • RFC 6125: 1
    • RFC 6379: 2
    • RFC 6960: 1
    • RFC 8247: 1
    • RFC 8784: 1
  • X509:
    • X.509: 11
pdf_data/st_keywords/javacard_packages
  • com:
    • com.samsung.android.knox.net.vpn: 1
  • java:
    • java.security.cert: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • and applications from your device of choice. However, Mac, Ubuntu Linux, Mobile devices are out of scope for the evaluation. Horizon Agent The Horizon Agent is responsible for the implementation of: 1
    • out of scope: 1
pdf_data/st_metadata
state/cert/convert_garbage False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different