Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
OPPO Find X5 Pro, including ColorOS 12.1, and Qualcomm Snapdragon® 8 Gen 1 Mobile Platform
CSEC2021007
Voyager TDC 10G Switch - V2.0
CCEVS-VR-VID-10911-2018
name OPPO Find X5 Pro, including ColorOS 12.1, and Qualcomm Snapdragon® 8 Gen 1 Mobile Platform Voyager TDC 10G Switch - V2.0
category Mobility Network and Network-Related Devices and Systems
scheme SE US
status active archived
not_valid_after 31.03.2027 19.11.2020
not_valid_before 31.03.2022 19.11.2018
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed-CCRA-Certificate%20OPPO%20Find%20X5%20Pro.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10911-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20OPPO%20Find%20X5%20Pro.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10911-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/OPPO%20Find%20X5%20Pro%20on%20ColorOS%2012.1%20Security%20Target.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10911-st.pdf
manufacturer Guangdong OPPO Mobile Telecommunications Corp., Ltd Klas Telecom, Inc.
manufacturer_web https://www.oppo.com/en/ https://www.klastelecom.com
dgst 95ee9573a6851af4 6a5bcffadf014b67
heuristics/cert_id CSEC2021007 CCEVS-VR-VID-10911-2018
heuristics/cert_lab [] US
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1
heuristics/extracted_versions 12.1 2.0
heuristics/scheme_data
  • category: Network Device
  • certification_date: 19.11.2018
  • evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
  • expiration_date: 19.11.2020
  • id: CCEVS-VR-VID10911
  • product: Voyager TDC 10G Switch - V2.0
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10911
  • vendor: Klas
heuristics/protection_profiles c40ae795865a0dba, 731bdcc989507942, 83014eb399a802f3, c88af12926be2779 48ac4778e4272298
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MDF_V3.2.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_BT_V1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.0E.pdf
pdf_data/cert_filename Signed-CCRA-Certificate OPPO Find X5 Pro.pdf st_vid10911-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • SE:
    • CSEC2021007: 1
  • US:
    • CCEVS-VR-VID10911-2018: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL1: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_TSU_EXT.1: 1
  • ASE:
    • ASE_SPD.1: 1
pdf_data/cert_keywords/vendor
  • Qualcomm:
    • Qualcomm: 1
pdf_data/cert_keywords/eval_facility
  • atsec:
    • atsec: 1
  • UL:
    • UL Verification Services: 1
pdf_data/cert_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/cert_metadata
  • /CreationDate: D:20220404080932+02'00'
  • /Creator: RICOH MP C4504ex
  • /ModDate: D:20220404083958+02'00'
  • /Producer: RICOH MP C4504ex
  • pdf_file_size_bytes: 1623099
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20190523144612-04'00'
  • /ModDate: D:20190523144612-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 181137
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename Certification Report - OPPO Find X5 Pro.pdf st_vid10911-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VID10911-VR-2018
    • cert_item: Klas Telecom, Inc. VoyagerTDC 10G Switch v2.0
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • SE:
    • CSEC2021007: 19
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 3
    • EAL 1 augmented: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 4
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 1
pdf_data/report_keywords/cc_sfr
  • FTP:
    • FTP_ITC.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.CONFIG: 1
    • A.NOTIFY: 1
    • A.NO_TOE_BYPASS: 1
    • A.PRECAUTION: 1
    • A.PROPER_USER: 1
    • A.TRUSTED_ADMIN: 1
  • T:
    • T.MALICIOUS_APP: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PERSISTENT_PRESENCE: 1
    • T.PHYSICAL_ACCESS: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED: 1
    • T.UNDETECTED_ACTIONS: 1
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINISTRATOR: 1
  • T:
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
pdf_data/report_keywords/vendor
  • Qualcomm:
    • Qualcomm: 3
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 4
  • Lightship:
    • Lightship Security: 7
  • UL:
    • UL Verification Services: 2
pdf_data/report_keywords/symmetric_crypto
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 1
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key exchange: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 7
      • TLS v1.1: 2
  • IPsec:
    • IPsec: 3
  • SSH:
    • SSH: 14
    • SSHv2: 1
  • TLS:
    • TLS:
      • TLS: 1
  • VPN:
    • VPN: 3
pdf_data/report_keywords/ecc_curve
  • NIST:
    • NIST P-256: 3
    • NIST P-384: 1
    • P-256: 5
    • P-384: 7
pdf_data/report_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 3
  • OpenSSL:
    • OpenSSL: 1
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/tee_name
  • other:
    • TEE: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 140-2: 1
  • ISO:
    • ISO/IEC 17025: 2
  • X509:
    • X.509: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • RFC:
    • RFC 5424: 1
    • RFC 791: 1
    • RFC 792: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • access to its storage media. Note: Defending against device re-use after physical compromise is out of scope for this Protection Profile. T.MALICIOUS_APP (MDFPP) Applications loaded onto the Mobile Device may: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author: Jerry Johansson
  • /CreationDate: D:20220329111443+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20220331141336+02'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: 21FMV6272-30:1
  • /Title: Certification Report - OPPO Find X5 Pro
  • pdf_file_size_bytes: 504386
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
  • /CreationDate: D:20181120153417-05'00'
  • /ModDate: D:20181120153417-05'00'
  • pdf_file_size_bytes: 836833
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename OPPO Find X5 Pro on ColorOS 12.1 Security Target.pdf st_vid10911-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 1: 2
    • EAL 1 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 9
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 4
    • ALC_CMS: 1
    • ALC_CMS.1: 5
    • ALC_TSU_EXT: 3
    • ALC_TSU_EXT.1: 8
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 5
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 6
  • ADV:
    • ADV_FSP.1: 5
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 3
    • ALC_CMS.1: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND: 2
    • ATE_IND.1: 3
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 7
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_STG: 2
    • FAU_STG.1: 4
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 4
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 22
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 5
    • FCS_CKM_EXT: 7
    • FCS_CKM_EXT.1: 5
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.2: 5
    • FCS_CKM_EXT.2.1: 1
    • FCS_CKM_EXT.3: 6
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 1
    • FCS_CKM_EXT.4: 7
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 5
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 5
    • FCS_CKM_EXT.6.1: 1
    • FCS_CKM_EXT.8: 7
    • FCS_CKM_EXT.8.1: 1
    • FCS_COP: 41
    • FCS_COP.1: 7
    • FCS_RBG_EXT: 1
    • FCS_RBG_EXT.1: 13
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RBG_EXT.1.3: 1
    • FCS_SMF_EXT.1: 1
    • FCS_SRV_EXT: 1
    • FCS_SRV_EXT.1: 5
    • FCS_SRV_EXT.1.1: 1
    • FCS_STG_EXT: 3
    • FCS_STG_EXT.1: 5
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_STG_EXT.2: 7
    • FCS_STG_EXT.2.1: 2
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 5
    • FCS_STG_EXT.3.1: 1
    • FCS_STG_EXT.3.2: 1
    • FCS_TLSC_EXT: 12
    • FCS_TLSC_EXT.1: 11
    • FCS_TLSC_EXT.1.1: 2
    • FCS_TLSC_EXT.1.2: 2
    • FCS_TLSC_EXT.1.3: 2
    • FCS_TLSC_EXT.2: 4
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.4: 3
    • FCS_TLSC_EXT.4.1: 1
    • FCS_TLSC_EXT.5: 3
    • FCS_TLSC_EXT.5.1: 1
    • FCS_TLS_EXT: 1
    • FCS_TLS_EXT.1: 3
    • FCS_TLS_EXT.1.1: 1
  • FDP:
    • FDP_ACF_EXT: 2
    • FDP_ACF_EXT.1: 3
    • FDP_ACF_EXT.1.1: 1
    • FDP_ACF_EXT.1.2: 1
    • FDP_ACF_EXT.2: 3
    • FDP_ACF_EXT.2.1: 1
    • FDP_DAR_EXT: 2
    • FDP_DAR_EXT.1: 5
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_DAR_EXT.2: 5
    • FDP_DAR_EXT.2.1: 1
    • FDP_DAR_EXT.2.2: 1
    • FDP_DAR_EXT.2.3: 1
    • FDP_DAR_EXT.2.4: 1
    • FDP_IFC_EXT: 1
    • FDP_IFC_EXT.1: 6
    • FDP_IFC_EXT.1.1: 1
    • FDP_PBA_EXT: 3
    • FDP_PBA_EXT.1: 1
    • FDP_PBA_EXT.1.1: 1
    • FDP_STG_EXT: 1
    • FDP_STG_EXT.1: 5
    • FDP_STG_EXT.1.1: 1
    • FDP_UPC_EXT: 4
    • FDP_UPC_EXT.1: 2
  • FIA:
    • FIA_AFL_EXT: 1
    • FIA_AFL_EXT.1: 4
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_AFL_EXT.1.3: 1
    • FIA_AFL_EXT.1.4: 1
    • FIA_AFL_EXT.1.5: 1
    • FIA_AFL_EXT.1.6: 1
    • FIA_BLT_EXT: 6
    • FIA_BLT_EXT.1: 5
    • FIA_BLT_EXT.1.1: 1
    • FIA_BLT_EXT.2: 5
    • FIA_BLT_EXT.2.1: 1
    • FIA_BLT_EXT.3: 3
    • FIA_BLT_EXT.3.1: 1
    • FIA_BLT_EXT.4: 5
    • FIA_BLT_EXT.4.1: 1
    • FIA_BLT_EXT.4.2: 1
    • FIA_BLT_EXT.6: 5
    • FIA_BLT_EXT.6.1: 1
    • FIA_BLT_EXT.7: 5
    • FIA_BLT_EXT.7.1: 1
    • FIA_BMG_EXT: 8
    • FIA_BMG_EXT.1: 5
    • FIA_PAE_EXT: 1
    • FIA_PAE_EXT.1: 5
    • FIA_PAE_EXT.1.1: 1
    • FIA_PMG_EXT: 1
    • FIA_PMG_EXT.1: 8
    • FIA_PMG_EXT.1.1: 1
    • FIA_TRT_EXT: 1
    • FIA_TRT_EXT.1: 5
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 3
    • FIA_UAU.5: 4
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 2
    • FIA_UAU.6.1: 1
    • FIA_UAU.6.2: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 2
    • FIA_UAU_EXT.1: 5
    • FIA_UAU_EXT.1.1: 1
    • FIA_UAU_EXT.2: 3
    • FIA_UAU_EXT.2.1: 4
    • FIA_UAU_EXT.2.2: 1
  • FMT:
    • FMT_MOF_EXT: 1
    • FMT_MOF_EXT.1: 6
    • FMT_MOF_EXT.1.1: 1
    • FMT_MOF_EXT.1.2: 1
    • FMT_SMF_EXT: 10
    • FMT_SMF_EXT.1: 8
    • FMT_SMF_EXT.1.1: 1
    • FMT_SMF_EXT.2: 3
    • FMT_SMF_EXT.2.1: 1
  • FPT:
    • FPT_AEX_EXT: 4
    • FPT_AEX_EXT.1: 5
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2: 5
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 5
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 3
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_JTA_EXT: 1
    • FPT_JTA_EXT.1: 5
    • FPT_JTA_EXT.1.1: 1
    • FPT_KST_EXT: 3
    • FPT_KST_EXT.1: 5
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 5
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 5
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT_EXT: 1
    • FPT_NOT_EXT.1: 5
    • FPT_NOT_EXT.1.1: 1
    • FPT_STM: 1
    • FPT_STM.1: 4
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 13
    • FPT_TST_EXT.1: 9
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 1
    • FPT_TUD_EXT: 3
    • FPT_TUD_EXT.1: 6
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 3
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.3: 3
    • FPT_TUD_EXT.3.1: 1
  • FTA:
    • FTA_SSL_EXT: 1
    • FTA_SSL_EXT.1: 5
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.1.2: 1
    • FTA_SSL_EXT.1.3: 1
    • FTA_WSE_EXT: 1
    • FTA_WSE_EXT.1: 4
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_BLT_EXT: 12
    • FTP_BLT_EXT.1: 5
    • FTP_BLT_EXT.1.1: 1
    • FTP_BLT_EXT.1.2: 1
    • FTP_BLT_EXT.2: 5
    • FTP_BLT_EXT.2.1: 1
    • FTP_BLT_EXT.3: 3
    • FTP_ITC_EXT: 7
    • FTP_ITC_EXT.1: 5
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
    • FTP_ITC_EXT.1.3: 1
  • FAU:
    • FAU_GEN.1: 5
    • FAU_GEN.1.1: 9
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 3
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT: 7
    • FAU_STG_EXT.1: 3
    • FAU_STG_EXT.1.1: 2
    • FAU_STG_EXT.1.2: 5
    • FAU_STG_EXT.1.3: 12
  • FCO:
    • FCO_CPC_EXT.1: 1
    • FCO_CPC_EXT.1.2: 1
  • FCS:
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 7
    • FCS_CKM.2: 5
    • FCS_CKM.2.1: 4
    • FCS_CKM.4: 5
    • FCS_CKM.4.1: 1
    • FCS_COP: 18
    • FCS_COP.1: 13
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 4
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 3
    • FCS_SSHC_EXT.1: 4
    • FCS_SSHC_EXT.1.1: 1
    • FCS_SSHC_EXT.1.2: 3
    • FCS_SSHC_EXT.1.4: 1
    • FCS_SSHC_EXT.1.5: 5
    • FCS_SSHC_EXT.1.6: 2
    • FCS_SSHC_EXT.1.7: 1
    • FCS_SSHC_EXT.1.8: 2
    • FCS_SSHC_EXT.1.9: 4
    • FCS_SSHC_EXTS.1.1: 1
    • FCS_SSHS_EXT.1: 3
    • FCS_SSHS_EXT.1.1: 2
    • FCS_SSHS_EXT.1.2: 3
    • FCS_SSHS_EXT.1.4: 4
    • FCS_SSHS_EXT.1.5: 4
    • FCS_SSHS_EXT.1.6: 2
    • FCS_SSHS_EXT.1.7: 1
    • FCS_SSHS_EXT.1.8: 2
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 4
    • FIA_PMG_EXT.1: 4
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.2: 12
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT.1: 16
    • FIA_UIA_EXT.1.1: 2
    • FIA_UIA_EXT.1.2: 2
  • FMT:
    • FMT_MOF: 27
    • FMT_MOF.1: 7
    • FMT_MTD: 7
    • FMT_MTD.1: 11
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 4
    • FMT_SMR.2: 6
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 2
    • FMT_SMR.2.3: 3
  • FPT:
    • FPT_APW_EXT: 1
    • FPT_APW_EXT.1: 4
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_ITT.1: 5
    • FPT_SKP_EXT: 1
    • FPT_SKP_EXT.1: 4
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM_EXT: 1
    • FPT_STM_EXT.1: 4
    • FPT_STM_EXT.1.1: 1
    • FPT_STM_EXT.1.2: 2
    • FPT_TRP: 1
    • FPT_TST_EXT: 1
    • FPT_TST_EXT.1: 4
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 1
    • FPT_TUD_EXT: 1
    • FPT_TUD_EXT.1: 5
    • FPT_TUD_EXT.1.1: 3
    • FPT_TUD_EXT.1.2: 5
    • FPT_TUD_EXT.1.3: 6
    • FPT_TUD_EXT.2: 1
    • FPT_TUD_EXT.2.2: 2
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 4
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT.1: 6
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB: 1
    • FTA_TAB.1: 8
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 14
    • FTP_ITC.1.1: 3
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_ITC_EXT.1: 1
    • FTP_TRP: 6
    • FTP_TRP.1: 5
pdf_data/st_keywords/cc_claims
  • A:
    • A.CONFIG: 1
    • A.NOTIFY: 1
    • A.NO_TOE_BYPASS: 1
    • A.PRECAUTION: 1
    • A.PROPER_USER: 1
    • A.TRUSTED_ADMIN: 1
  • O:
    • O.AUTH: 1
    • O.AUTH_COMM: 1
    • O.CONFIG: 1
    • O.CRYPTOGRAPHIC_FUNCTIONS: 1
    • O.INTEGRITY: 1
    • O.PRIVACY: 1
    • O.PROTECTED_COMMS: 1
    • O.STORAGE: 1
    • O.SYSTEM_MONITORING: 1
    • O.TOE_ADMINISTRATION: 1
    • O.TSF_SELF_TEST: 1
    • O.WIRELESS_ACCESS_POINT_CONNECTION: 1
  • OE:
    • OE.CONFIG: 1
    • OE.DATA_PROPER_USER: 1
    • OE.NOTIFY: 1
    • OE.NO_TOE_BYPASS: 1
    • OE.PRECAUTION: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.EAVESDROP: 1
    • T.FLAWAPP: 2
    • T.MALICIOUS_APP: 1
    • T.NETWORK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PERSISTENT: 2
    • T.PERSISTENT_PRESENCE: 1
    • T.PHYSICAL: 2
    • T.PHYSICAL_ACCESS: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED: 1
    • T.UNDETECTED_ACTIONS: 1
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINISTRATOR: 1
  • D:
    • D.C: 1
  • OE:
    • OE.ADMIN_CREDENTIALS_SECURE: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_THRU_TRAFFIC_PROTECTION: 1
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_INFORMATION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.UPDATES: 1
  • T:
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
pdf_data/st_keywords/vendor
  • Qualcomm:
    • Qualcomm: 10
pdf_data/st_keywords/eval_facility
  • UL:
    • UL Verification Services: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 28
      • AES-: 1
      • AES-128: 1
      • AES-256: 16
  • constructions:
    • MAC:
      • HMAC: 5
      • HMAC-SHA-256: 6
      • HMAC-SHA-384: 4
      • HMAC-SHA-512: 4
  • AES_competition:
    • AES:
      • AES: 15
  • constructions:
    • MAC:
      • HMAC: 15
      • HMAC-SHA-256: 1
      • HMAC-SHA-512: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 6
      • ECDHE: 2
    • ECDSA:
      • ECDSA: 9
  • ECC:
    • ECC:
      • ECC: 8
    • ECDH:
      • ECDH: 7
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 11
  • FF:
    • DH:
      • DH: 6
      • DHE: 1
      • Diffie-Hellman: 11
    • DSA:
      • DSA: 2
  • RSA:
    • RSA-2048: 1
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF: 1
  • SHA:
    • SHA1:
      • SHA-1: 6
    • SHA2:
      • SHA-256: 10
      • SHA-384: 5
      • SHA-512: 2
      • SHA384: 1
      • SHA512: 2
  • scrypt:
    • scrypt: 3
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 3
      • SHA1: 3
    • SHA2:
      • SHA-2: 1
      • SHA-256: 6
      • SHA-384: 2
      • SHA-512: 2
      • SHA2: 2
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
    • Key exchange: 3
  • MAC:
    • MAC: 6
  • KEX:
    • Key Exchange: 1
    • Key exchange: 1
  • MAC:
    • MAC: 26
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 3
  • TLS:
    • DTLS:
      • DTLS: 1
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 63
      • TLS 1.0: 1
      • TLS 1.1: 2
      • TLS 1.2: 2
  • VPN:
    • VPN: 17
  • IKE:
    • IKE: 1
  • IPsec:
    • IPsec: 5
  • SSH:
    • SSH: 155
    • SSHv2: 1
  • TLS:
    • TLS:
      • TLS: 4
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 10
  • RNG:
    • RBG: 10
  • PRNG:
    • DRBG: 9
  • RNG:
    • RBG: 7
    • RNG: 5
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CCM:
    • CCM: 2
  • GCM:
    • GCM: 5
  • XTS:
    • XTS: 6
  • CBC:
    • CBC: 3
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 7
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 8
    • P-384: 8
    • secp256r1: 4
    • secp384r1: 4
  • NIST:
    • NIST P-256: 4
    • NIST P-384: 2
    • P-256: 18
    • P-384: 16
    • P-521: 8
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 3
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 28
  • OpenSSL:
    • OpenSSL: 1
  • OpenSSL:
    • OpenSSL: 8
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 1
  • other:
    • TEE: 17
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-4: 4
    • FIPS 186-4: 3
    • FIPS 197: 4
    • FIPS 198-1: 3
    • FIPS PUB 186-4: 4
    • FIPS PUB 197: 2
    • FIPS186-4: 1
    • FIPS198-1: 1
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-38E: 1
    • NIST SP 800-38F: 1
    • NIST SP 800-57: 1
    • SP 186-4: 1
    • SP 800-108: 2
    • SP 800-38E: 1
    • SP 800-90A: 1
  • RFC:
    • RFC 2246: 1
    • RFC 2818: 2
    • RFC 3394: 2
    • RFC 4346: 2
    • RFC 5216: 1
    • RFC 5246: 4
    • RFC 5280: 3
    • RFC 5288: 5
    • RFC 5289: 12
    • RFC 5746: 2
    • RFC 6125: 1
    • RFC 6960: 1
  • X509:
    • X.509: 11
  • CC:
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS 140-2: 2
    • FIPS 186-4: 7
    • FIPS PUB 186-4: 4
  • ISO:
    • ISO/IEC 10118: 2
    • ISO/IEC 14888-3: 2
    • ISO/IEC 18031:2011: 3
    • ISO/IEC 9796-2: 1
  • NIST:
    • NIST SP 800-56A: 1
    • NIST SP 800-56B: 1
    • SP 800-131A: 1
    • SP 800-56A: 1
    • SP 800-56B: 1
  • PKCS:
    • PKCS #1: 1
  • RFC:
    • RFC 3526: 6
    • RFC 4251: 1
    • RFC 4253: 8
    • RFC 5424: 2
    • RFC 5647: 10
    • RFC 6668: 2
pdf_data/st_keywords/javacard_packages
  • com:
    • com.coloros.ocs.opencapabilityservice: 1
  • java:
    • java.security.cert: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • access to its storage media. Note: Defending against device re-use after physical compromise is out of scope for this Protection Profile. T.MALICIOUS_APP (MDFPP32) Applications loaded onto the Mobile Device: 1
    • out of scope: 1
  • OutOfScope:
    • indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the evaluation activity for this requirement. RFC 5647 only applies to the RFC compliant: 2
    • out of scope: 2
pdf_data/st_metadata
  • /Author: Bethany Henderson
  • /Company:
  • /CreationDate: D:20181119065151-08'00'
  • /Creator: Acrobat PDFMaker 19 for Word
  • /ModDate: D:20181119065211-08'00'
  • /Producer: Adobe PDF Library 19.8.103
  • /SourceModified: D:20181119145123
  • pdf_file_size_bytes: 804298
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 100
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different