Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Samsung Galaxy Devices on Android 14 - Fall
CCEVS-VR-VID-11539-2024
Wind River Linux Secure 1.0
CCEVS-VR-VID-10430-2011
name Samsung Galaxy Devices on Android 14 - Fall Wind River Linux Secure 1.0
category Mobility Operating Systems
status active archived
not_valid_after 23.12.2026 01.11.2014
not_valid_before 23.12.2024 05.04.2011
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11539-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11539-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10430-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11539-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10430-st.pdf
manufacturer Samsung Electronics Co., Ltd. Wind River
manufacturer_web https://www.samsung.com https://www.windriver.com/
security_level {} EAL4+, ALC_FLR.3
dgst ccfb157305084c14 d2406afd03edb522
heuristics/cert_id CCEVS-VR-VID-11539-2024 CCEVS-VR-VID-10430-2011
heuristics/cpe_matches cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:* {}
heuristics/related_cves CVE-2024-49413, CVE-2024-20891, CVE-2024-34612, CVE-2024-34594, CVE-2023-42563, CVE-2024-34589, CVE-2024-20864, CVE-2024-34647, CVE-2024-49415, CVE-2025-20889, CVE-2024-34595, CVE-2023-42562, CVE-2023-42567, CVE-2025-20887, CVE-2024-20836, CVE-2024-34604, CVE-2024-20855, CVE-2025-20891, CVE-2023-42565, CVE-2023-42564, CVE-2024-34646, CVE-2024-20865, CVE-2024-20892, CVE-2024-34666, CVE-2025-20884, CVE-2024-34678, CVE-2024-49402, CVE-2024-20857, CVE-2024-20831, CVE-2023-42556, CVE-2024-20884, CVE-2024-34655, CVE-2024-20900, CVE-2025-20904, CVE-2025-20893, CVE-2024-34682, CVE-2024-20895, CVE-2024-20843, CVE-2024-34652, CVE-2024-34669, CVE-2024-34583, CVE-2024-20893, CVE-2024-20885, CVE-2024-20817, CVE-2024-20849, CVE-2024-34588, CVE-2023-42561, CVE-2024-20814, CVE-2024-20859, CVE-2024-20860, CVE-2025-20881, CVE-2025-20885, CVE-2024-34607, CVE-2024-34614, CVE-2024-20848, CVE-2024-20832, CVE-2024-20875, CVE-2024-20888, CVE-2024-34665, CVE-2024-34676, CVE-2024-20897, CVE-2024-34609, CVE-2024-34619, CVE-2025-20905, CVE-2024-34587, CVE-2024-20847, CVE-2024-34668, CVE-2024-34642, CVE-2024-20812, CVE-2023-52432, CVE-2024-49410, CVE-2024-20818, CVE-2024-34618, CVE-2024-20876, CVE-2024-34616, CVE-2023-42560, CVE-2024-34593, CVE-2024-34651, CVE-2024-20819, CVE-2024-20874, CVE-2024-34611, CVE-2024-49411, CVE-2024-34590, CVE-2024-34650, CVE-2024-20833, CVE-2024-34602, CVE-2024-20842, CVE-2024-20811, CVE-2024-20898, CVE-2024-20899, CVE-2024-34605, CVE-2025-20907, CVE-2024-34680, CVE-2024-34603, CVE-2024-20815, CVE-2024-34585, CVE-2023-42559, CVE-2024-34641, CVE-2024-20890, CVE-2023-42557, CVE-2024-34615, CVE-2025-20883, CVE-2024-20879, CVE-2024-34637, CVE-2024-20806, CVE-2024-20894, CVE-2024-20896, CVE-2024-34610, CVE-2024-34586, CVE-2024-34617, CVE-2024-34677, CVE-2024-34644, CVE-2024-34608, CVE-2024-34643, CVE-2024-20803, CVE-2024-20830, CVE-2024-20813, CVE-2025-20886, CVE-2024-20882, CVE-2024-34674, CVE-2024-20863, CVE-2023-42570, CVE-2024-20889, CVE-2025-20890, CVE-2024-34591, CVE-2024-49414, CVE-2024-20877, CVE-2024-34606, CVE-2024-20834, CVE-2025-20888, CVE-2024-34592, CVE-2024-34679, CVE-2024-20856, CVE-2024-20880, CVE-2024-20816, CVE-2024-34654, CVE-2024-20901, CVE-2024-20862, CVE-2024-20861, CVE-2024-34648, CVE-2024-34620, CVE-2024-49401, CVE-2024-34673, CVE-2024-20883, CVE-2024-34675, CVE-2025-20882, CVE-2024-20858, CVE-2025-20892, CVE-2024-20835, CVE-2024-34649, CVE-2023-42566, CVE-2024-20878, CVE-2024-34667, CVE-2024-34653 {}
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 AGD_OPE.1, ADV_ARC.1, ALC_FLR.3
heuristics/extracted_versions 14 1.0
heuristics/scheme_data
  • category: Operating System
  • certification_date: 05.04.2011
  • evaluation_facility: atsec information security corporation
  • expiration_date: 01.11.2014
  • id: CCEVS-VR-VID10430
  • product: Wind River Linux Secure 1.0
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10430
  • vendor: Wind River
heuristics/protection_profiles 29ba341b00e9bd10, c40ae795865a0dba, e8fcfe94dc27b54b, f84bb9133ca2c8db, 83014eb399a802f3, 593b939921a117e0 1b3d0fa0ae86e5da
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MDF_V3.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_WLAN_AS_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_VPN_CLI_v2.4_PP.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD-BIO-v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_BT_V1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_gpospp_v1.0.pdf
pdf_data/cert_filename st_vid11539-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11539-2024: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
pdf_data/cert_keywords/cc_sar
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
  • Samsung:
    • Samsung: 2
pdf_data/cert_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
  • VPN:
    • VPN: 1
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Producer: WeasyPrint 62.3
  • /Title: VID11539-FINAL CERT
  • pdf_file_size_bytes: 136750
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid11539-vr.pdf st_vid10430-vr.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID11539-2024
    • cert_item: Samsung Electronics Co., Ltd. Samsung Galaxy Devices on Android 14 - Fall
    • cert_lab: US NIAP
  • US:
    • cert_id: CCEVS-VR-VID10430-2011
    • cert_item: Wind River Wind River Linux Secure 1.0
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11539-2024: 1
  • US:
    • CCEVS-VR-VID10430-2011: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 3
    • EAL 4 augmented: 2
    • EAL4: 10
    • EAL4 augmented: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 3
pdf_data/report_keywords/vendor
  • Qualcomm:
    • Qualcomm: 3
  • Samsung:
    • Samsung: 34
pdf_data/report_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 4
  • atsec:
    • atsec: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-2: 1
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
  • MAC:
    • MAC: 3
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 5
  • TLS:
    • TLS:
      • TLS: 9
  • VPN:
    • VPN: 11
  • IKE:
    • IKE: 2
  • IPsec:
    • IPsec: 1
  • SSH:
    • SSH: 3
    • SSHv2: 1
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 2
  • VPN:
    • VPN: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • ECB:
    • ECB: 2
pdf_data/report_keywords/ecc_curve
  • NIST:
    • P-256: 2
    • P-384: 2
    • P-521: 2
pdf_data/report_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 1
  • NSS:
    • NSS: 6
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 2
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 5
  • NIST:
    • NIST SP 800-53: 1
  • RFC:
    • RFC 2409: 1
    • RFC 3268: 1
    • RFC 4253: 1
pdf_data/report_metadata
  • /Author: Don Phillips
  • /CreationDate: D:20110420131634
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110420131634
  • /Producer: Microsoft® Office Word 2007
  • /Title: Validators Report
  • pdf_file_size_bytes: 328563
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 31
pdf_data/st_filename st_vid11539-st.pdf st_vid10430-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.1: 8
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 9
    • AGD_PRE: 1
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 3
    • ALC_CMS: 1
    • ALC_CMS.1: 4
    • ALC_TSU_EXT: 3
    • ALC_TSU_EXT.1: 6
  • ATE:
    • ATE_IND: 1
    • ATE_IND.1: 4
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 5
  • ADV:
    • ADV_ARC.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_FLR.3: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 8
    • FAU_GEN.1: 5
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 2
    • FAU_SAR.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG: 4
    • FAU_STG.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 20
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 3
    • FCS_CKM_EXT: 21
    • FCS_CKM_EXT.1: 1
    • FCS_CKM_EXT.1.1: 1
    • FCS_CKM_EXT.1.2: 1
    • FCS_CKM_EXT.1.3: 1
    • FCS_CKM_EXT.2: 1
    • FCS_CKM_EXT.2.1: 1
    • FCS_CKM_EXT.3: 5
    • FCS_CKM_EXT.3.1: 1
    • FCS_CKM_EXT.3.2: 1
    • FCS_CKM_EXT.4: 2
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.5: 1
    • FCS_CKM_EXT.5.1: 1
    • FCS_CKM_EXT.5.2: 1
    • FCS_CKM_EXT.6: 1
    • FCS_CKM_EXT.6.1: 1
    • FCS_CKM_EXT.8: 1
    • FCS_CKM_EXT.8.1: 1
    • FCS_COP: 50
    • FCS_COP.1: 9
    • FCS_RBG_EXT: 6
    • FCS_RBG_EXT.1: 15
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_RBG_EXT.1.3: 1
    • FCS_RBG_EXT.2: 1
    • FCS_RBG_EXT.2.1: 1
    • FCS_SRV_EXT: 6
    • FCS_SRV_EXT.1: 1
    • FCS_SRV_EXT.1.1: 1
    • FCS_SRV_EXT.2.1: 1
    • FCS_STG_EXT: 9
    • FCS_STG_EXT.1: 2
    • FCS_STG_EXT.1.1: 1
    • FCS_STG_EXT.1.2: 1
    • FCS_STG_EXT.1.3: 1
    • FCS_STG_EXT.1.4: 1
    • FCS_STG_EXT.1.5: 1
    • FCS_STG_EXT.2: 4
    • FCS_STG_EXT.2.1: 2
    • FCS_STG_EXT.2.2: 1
    • FCS_STG_EXT.3: 2
    • FCS_STG_EXT.3.1: 1
    • FCS_STG_EXT.3.2: 1
    • FCS_TLSC_EXT: 17
    • FCS_TLSC_EXT.1: 6
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.2: 2
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.4: 1
    • FCS_TLSC_EXT.4.1: 1
    • FCS_TLSC_EXT.5: 1
    • FCS_TLSC_EXT.5.1: 1
    • FCS_TLSS_EXT.1.1: 1
    • FCS_TLS_EXT: 3
    • FCS_TLS_EXT.1.1: 1
    • FCS_WPA_EXT: 4
    • FCS_WPA_EXT.1: 1
  • FDP:
    • FDP_ACC.1: 3
    • FDP_ACF_EXT: 9
    • FDP_ACF_EXT.1: 1
    • FDP_ACF_EXT.1.1: 1
    • FDP_ACF_EXT.1.2: 2
    • FDP_ACF_EXT.2.1: 1
    • FDP_ACF_EXT.3: 1
    • FDP_ACF_EXT.3.1: 1
    • FDP_DAR_EXT: 6
    • FDP_DAR_EXT.1: 3
    • FDP_DAR_EXT.1.1: 1
    • FDP_DAR_EXT.1.2: 1
    • FDP_DAR_EXT.2: 2
    • FDP_DAR_EXT.2.1: 1
    • FDP_DAR_EXT.2.2: 1
    • FDP_DAR_EXT.2.3: 1
    • FDP_DAR_EXT.2.4: 1
    • FDP_IFC_EXT: 6
    • FDP_IFC_EXT.1: 2
    • FDP_IFC_EXT.1.1: 2
    • FDP_PBA_EXT: 2
    • FDP_RIP: 2
    • FDP_RIP.2: 1
    • FDP_RIP.2.1: 1
    • FDP_STG_EXT: 3
    • FDP_STG_EXT.1: 2
    • FDP_STG_EXT.1.1: 1
    • FDP_UPC_EXT: 7
    • FDP_UPC_EXT.1: 4
    • FDP_VPN_EXT: 3
    • FDP_VPN_EXT.1.1: 1
  • FIA:
    • FIA_AFL_EXT: 3
    • FIA_AFL_EXT.1: 3
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_AFL_EXT.1.3: 1
    • FIA_AFL_EXT.1.4: 1
    • FIA_AFL_EXT.1.5: 1
    • FIA_AFL_EXT.1.6: 1
    • FIA_BLT_EXT: 18
    • FIA_BLT_EXT.1: 2
    • FIA_BLT_EXT.1.1: 1
    • FIA_BLT_EXT.2: 2
    • FIA_BLT_EXT.2.1: 1
    • FIA_BLT_EXT.3: 1
    • FIA_BLT_EXT.3.1: 1
    • FIA_BLT_EXT.4: 1
    • FIA_BLT_EXT.4.1: 1
    • FIA_BLT_EXT.4.2: 1
    • FIA_BLT_EXT.6: 1
    • FIA_BLT_EXT.6.1: 1
    • FIA_BLT_EXT.7: 1
    • FIA_BLT_EXT.7.1: 1
    • FIA_BMG_EXT: 1
    • FIA_BMG_EXT.1: 3
    • FIA_MBE_EXT: 1
    • FIA_MBE_EXT.1: 2
    • FIA_MBE_EXT.1.1: 1
    • FIA_MBE_EXT.2: 3
    • FIA_MBE_EXT.2.1: 1
    • FIA_MBV_EXT: 4
    • FIA_MBV_EXT.1: 5
    • FIA_MBV_EXT.2: 2
    • FIA_MBV_EXT.2.1: 1
    • FIA_PAE_EXT: 3
    • FIA_PAE_EXT.1: 1
    • FIA_PAE_EXT.1.1: 1
    • FIA_PMG_EXT: 3
    • FIA_PMG_EXT.1: 1
    • FIA_PMG_EXT.1.1: 1
    • FIA_TRT_EXT: 3
    • FIA_TRT_EXT.1: 1
    • FIA_TRT_EXT.1.1: 1
    • FIA_UAU: 11
    • FIA_UAU.5: 2
    • FIA_UAU.5.1: 3
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 2
    • FIA_UAU.7: 2
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 9
    • FIA_UAU_EXT.1: 1
    • FIA_UAU_EXT.1.1: 1
    • FIA_UAU_EXT.2: 1
    • FIA_UAU_EXT.2.1: 1
    • FIA_UAU_EXT.2.2: 1
    • FIA_UAU_EXT.4: 1
    • FIA_UAU_EXT.4.1: 1
    • FIA_UAU_EXT.4.2: 1
  • FMT:
    • FMT_MOF_EXT: 3
    • FMT_MOF_EXT.1: 2
    • FMT_MOF_EXT.1.1: 1
    • FMT_MOF_EXT.1.2: 1
    • FMT_SMF: 6
    • FMT_SMF.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMF_EXT: 11
    • FMT_SMF_EXT.1: 4
    • FMT_SMF_EXT.2: 1
    • FMT_SMF_EXT.2.1: 1
    • FMT_SMF_EXT.3: 2
    • FMT_SMF_EXT.3.1: 1
  • FPT:
    • FPT_AEX_EXT: 18
    • FPT_AEX_EXT.1: 1
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.2: 1
    • FPT_AEX_EXT.2.1: 1
    • FPT_AEX_EXT.3: 1
    • FPT_AEX_EXT.3.1: 1
    • FPT_AEX_EXT.4: 1
    • FPT_AEX_EXT.4.1: 1
    • FPT_AEX_EXT.4.2: 1
    • FPT_AEX_EXT.5: 1
    • FPT_AEX_EXT.5.1: 1
    • FPT_AEX_EXT.5.2: 1
    • FPT_AEX_EXT.6.1: 1
    • FPT_BBD_EXT: 3
    • FPT_BBD_EXT.1: 1
    • FPT_BBD_EXT.1.1: 1
    • FPT_BDP_EXT.1: 1
    • FPT_BDP_EXT.1.1: 1
    • FPT_BDP_EXT.1.2: 1
    • FPT_JTA_EXT: 3
    • FPT_JTA_EXT.1: 1
    • FPT_JTA_EXT.1.1: 1
    • FPT_KST_EXT: 6
    • FPT_KST_EXT.1: 3
    • FPT_KST_EXT.1.1: 1
    • FPT_KST_EXT.2: 3
    • FPT_KST_EXT.2.1: 1
    • FPT_KST_EXT.3: 1
    • FPT_KST_EXT.3.1: 1
    • FPT_NOT_EXT: 3
    • FPT_NOT_EXT.1: 1
    • FPT_NOT_EXT.1.1: 1
    • FPT_PBT_EXT.1: 1
    • FPT_PBT_EXT.1.1: 1
    • FPT_STM: 2
    • FPT_STM.1: 1
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 19
    • FPT_TST_EXT.1: 4
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.2: 2
    • FPT_TST_EXT.3: 2
    • FPT_TUD_EXT: 10
    • FPT_TUD_EXT.1: 1
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.2: 2
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
    • FPT_TUD_EXT.3: 1
    • FPT_TUD_EXT.3.1: 1
    • FPT_TUD_EXT.6: 1
    • FPT_TUD_EXT.6.1: 1
  • FTA:
    • FTA_SSL_EXT: 3
    • FTA_SSL_EXT.1: 2
    • FTA_SSL_EXT.1.1: 1
    • FTA_SSL_EXT.1.2: 1
    • FTA_SSL_EXT.1.3: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 1
    • FTA_TAB.1.1: 1
    • FTA_WSE_EXT: 3
    • FTA_WSE_EXT.1: 2
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_BLT_EXT: 10
    • FTP_BLT_EXT.1: 1
    • FTP_BLT_EXT.1.1: 1
    • FTP_BLT_EXT.1.2: 1
    • FTP_BLT_EXT.2: 1
    • FTP_BLT_EXT.2.1: 1
    • FTP_BLT_EXT.3: 2
    • FTP_ITC: 4
    • FTP_ITC.1: 3
    • FTP_ITC_EXT: 3
    • FTP_ITC_EXT.1: 1
    • FTP_ITC_EXT.1.1: 1
    • FTP_ITC_EXT.1.2: 1
    • FTP_ITC_EXT.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 14
    • FAU_GEN.1.1: 3
    • FAU_GEN.1.2: 4
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 2
    • FAU_SAR.2: 5
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 9
    • FAU_SAR.3.1: 1
    • FAU_SEL.1: 8
    • FAU_SEL.1.1: 2
    • FAU_STG: 1
    • FAU_STG.1: 10
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 8
    • FAU_STG.3.1: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
    • FAU_UAU.1: 2
    • FAU_UAU.6: 2
  • FCS:
    • FCS_BCM_EXT.1: 10
    • FCS_BCM_EXT.1.1: 1
    • FCS_CKM.1: 22
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 2
    • FCS_CKM.4: 14
    • FCS_CKM.4.1: 1
    • FCS_COA_EXT.1: 6
    • FCS_COA_EXT.1.1: 1
    • FCS_COP.1: 34
    • FCS_COP.1.1: 3
    • FCS_RBG_EXT.1: 12
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 11
    • FDP_ACC.2: 17
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF.1: 32
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_ETC.1: 7
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_ETC.2: 7
    • FDP_ETC.2.1: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_IFC.1: 9
    • FDP_IFC.2: 11
    • FDP_IFC.2.1: 1
    • FDP_IFC.2.2: 1
    • FDP_IFF.1: 3
    • FDP_IFF.2: 5
    • FDP_IFF.2.1: 1
    • FDP_IFF.2.2: 1
    • FDP_IFF.2.3: 1
    • FDP_IFF.2.4: 1
    • FDP_IFF.2.5: 1
    • FDP_IFF.2.6: 1
    • FDP_ITC.1: 11
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 11
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_RIP: 2
    • FDP_RIP.2: 13
    • FDP_RIP.2.1: 1
    • FDP_RIP.3: 15
    • FDP_RIP.3.1: 1
  • FIA:
    • FIA_AFL.1: 1
    • FIA_AFL_EXT.1: 10
    • FIA_AFL_EXT.1.1: 1
    • FIA_AFL_EXT.1.2: 1
    • FIA_ATD: 1
    • FIA_ATD.1: 14
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 15
    • FIA_SOS.1.1: 2
    • FIA_UAU.1: 12
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.6: 7
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 9
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 14
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 12
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 3
    • FIA_USB.1.3: 3
  • FMT:
    • FMT_MOF.1: 10
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MSA.1: 31
    • FMT_MSA.1.1: 2
    • FMT_MSA.2: 9
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 24
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MSA.4: 15
    • FMT_MSA.4.1: 2
    • FMT_MTD.1: 97
    • FMT_MTD.1.1: 14
    • FMT_REV.1: 23
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SAE.1: 7
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
    • FMT_SMF.1: 24
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 34
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SMR.2: 3
  • FPT:
    • FPT_ITT: 2
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_ITT.3: 7
    • FPT_ITT.3.1: 1
    • FPT_ITT.3.2: 1
    • FPT_RCV.1: 11
    • FPT_RCV.1.1: 1
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 9
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TRC_EXT.1: 8
    • FPT_TRC_EXT.1.1: 1
    • FPT_TRP_EXT.1: 2
    • FPT_TST.1: 1
    • FPT_TST_EXT.1: 7
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.1.2: 1
  • FRU:
    • FRU_RSA.1: 9
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_MCS.1: 13
    • FTA_MCS.1.1: 1
    • FTA_MCS.1.2: 1
    • FTA_SSL.1: 9
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
    • FTA_SSL.2: 8
    • FTA_SSL.2.1: 1
    • FTA_SSL.2.2: 1
    • FTA_TAB.1: 9
    • FTA_TAB.1.1: 1
    • FTA_TAH.1: 7
    • FTA_TAH.1.1: 1
    • FTA_TAH.1.2: 1
    • FTA_TAH.1.3: 1
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 1
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.CONFIG: 1
    • OE.DATA_PROPER_USER: 1
    • OE.NOTIFY: 1
    • OE.NO_TOE_BYPASS: 2
    • OE.PHYSICAL: 1
    • OE.PRECAUTION: 1
    • OE.PROTECTION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • A:
    • A.CLEARANCE: 3
    • A.CONNECT: 5
    • A.PHYSICAL: 4
    • A.SENSITIVITY: 2
  • O:
    • O.ACCESS: 20
    • O.ACCESS_HISTORY: 5
    • O.ADMIN_ROLE: 6
    • O.AUDIT_GENERATION: 10
    • O.AUDIT_PROTECTION: 6
    • O.AUDIT_REVIEW: 10
    • O.CORRECT_TSF_OPERATION: 5
    • O.CRYPTOGRAPHIC_SERVICES: 13
    • O.DISCRETIONARY_ACCESS: 10
    • O.DISCRETIONARY_USER_CONTROL: 7
    • O.DISPLAY_BANNER: 5
    • O.MANAGE: 26
    • O.MANDATORY_ACCESS: 15
    • O.PROTECT: 18
    • O.RECOVERY: 7
    • O.REFERENCE_MONITOR: 10
    • O.RESIDUAL_INFORMATION: 6
    • O.RESOURCE_SHARING: 6
    • O.TSF_CRYPTOGRAPHIC_INTEGRITY: 4
    • O.USER_AUTHENTICATION: 10
    • O.USER_IDENTIFICATION: 8
  • OE:
    • OE.LABELING: 4
    • OE.PHYSICAL: 8
  • T:
    • T.ADMIN_ERROR: 3
    • T.ADMIN_ROGUE: 3
    • T.AUDIT_COMPROMISE: 6
    • T.CRYPTO_COMPROMISE: 2
    • T.MASQUERADE: 4
    • T.OPERATIONAL_ERRORS: 2
    • T.RESIDUAL_DATA: 3
    • T.RESOURCE_EXHAUSTION: 3
    • T.TSF_COMPROMISE: 4
    • T.UNATTENDED_SESSION: 3
    • T.UNAUTHORIZED_ACCESS: 4
    • T.UNIDENTIFIED_ACTIONS: 3
    • T.UNKNOWN_STATE: 3
pdf_data/st_keywords/vendor
  • Qualcomm:
    • Qualcomm: 24
  • Samsung:
    • Samsung: 144
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 104
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 28
      • AES-: 5
      • AES-128: 1
      • AES-256: 11
  • constructions:
    • MAC:
      • HMAC: 12
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 2
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 6
    • ECDH:
      • ECDH: 6
      • ECDHE: 2
    • ECDSA:
      • ECDSA: 16
  • FF:
    • DH:
      • DH: 6
      • DHE: 1
      • Diffie-Hellman: 4
  • RSA:
    • RSA 2048: 2
  • ECC:
    • ECDSA:
      • ECDSA: 5
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 4
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-256: 21
      • SHA-384: 3
      • SHA-512: 3
  • scrypt:
    • scrypt: 3
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-2: 1
      • SHA-224: 1
      • SHA-256: 3
      • SHA-512: 1
      • SHA2: 1
      • SHA384: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 4
  • MAC:
    • MAC: 17
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 12
    • IKEv2: 18
  • IPsec:
    • IPsec: 39
  • TLS:
    • TLS:
      • TLS: 67
      • TLS 1.1: 1
      • TLS 1.2: 2
  • VPN:
    • VPN: 96
  • IKE:
    • IKEv1: 1
  • IPsec:
    • IPsec: 3
  • SSH:
    • SSH: 6
  • TLS:
    • SSL:
      • SSL: 3
    • TLS:
      • TLS: 3
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 8
  • RNG:
    • RBG: 15
    • RNG: 1
  • PRNG:
    • DRBG: 3
  • RNG:
    • RBG: 4
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 6
  • CCM:
    • CCM: 2
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 4
  • XTS:
    • XTS: 1
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 16
    • P-384: 10
    • P-521: 10
    • secp256r1: 2
    • secp384r1: 2
  • NIST:
    • P-256: 2
    • P-384: 2
    • P-521: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 23
  • NSS:
    • NSS: 24
  • OpenSSL:
    • OpenSSL: 3
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 6
  • IBM:
    • SE: 8
  • other:
    • TEE: 33
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-4: 6
    • FIPS 186-4: 8
    • FIPS 197: 10
    • FIPS 198-1: 5
    • FIPS PUB 186-4: 5
    • FIPS PUB 197: 2
  • NIST:
    • NIST SP 800-132: 4
    • NIST SP 800-38A: 1
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-38E: 1
    • NIST SP 800-38F: 1
    • NIST SP 800-57: 1
    • SP 800-108: 4
    • SP 800-38A: 2
    • SP 800-38C: 2
    • SP 800-38E: 2
    • SP 800-38F: 1
    • SP 800-56A: 3
    • SP 800-90A: 5
  • PKCS:
    • PKCS 2: 1
    • PKCS#12: 2
  • RFC:
    • RFC 2560: 1
    • RFC 2818: 2
    • RFC 3394: 2
    • RFC 3526: 1
    • RFC 3602: 2
    • RFC 4106: 2
    • RFC 4301: 2
    • RFC 4303: 1
    • RFC 4346: 1
    • RFC 4945: 2
    • RFC 5216: 1
    • RFC 5246: 4
    • RFC 5280: 4
    • RFC 5282: 2
    • RFC 5288: 4
    • RFC 5289: 8
    • RFC 5746: 1
    • RFC 6125: 1
    • RFC 6379: 2
    • RFC 6960: 1
    • RFC 8247: 1
    • RFC 8603: 1
    • RFC 8784: 1
  • X509:
    • X.509: 12
  • FIPS:
    • FIPS 140-2: 14
    • FIPS PUB 140-2: 3
    • FIPS PUB 186-3: 1
  • NIST:
    • NIST SP 800-57: 1
  • PKCS:
    • PKCS#11: 2
pdf_data/st_keywords/javacard_packages
  • com:
    • com.samsung.android.knox.net.vpn: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users by cannot be used to store: 1
    • out of scope: 1
pdf_data/st_metadata
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different