cert_id |
3770 |
3559 |
dgst |
8bd05bcba665530f |
e76a469e135c5a74 |
heuristics/algorithms |
HMAC#A115, RSA#A115, CVL#A116, DRBG#A50, SHS#A116, AES#A116, CVL#A115, SHS#A50, ECDSA#A115, RSA#A116, AES#A115, SHS#A49, SHS#A115, Triple-DES#A116, ECDSA#A116, Triple-DES#A115, HMAC#A116 |
DRBG#C443, HMAC#C535, SHS#C536, SHS#C443, CVL#C535, RSA#C535, Triple-DES#C535, ECDSA#C536, CVL#C536, AES#C535, SHS#C441, ECDSA#C535, Triple-DES#C536, SHS#C535, AES#C536, HMAC#C536, RSA#C536 |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_versions |
865 |
855 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/module_processed_references/directly_referenced_by |
{} |
{} |
heuristics/module_processed_references/directly_referencing |
3114 |
3114 |
heuristics/module_processed_references/indirectly_referenced_by |
{} |
{} |
heuristics/module_processed_references/indirectly_referencing |
3114 |
3114 |
heuristics/module_prunned_references |
3114 |
3114 |
heuristics/policy_processed_references/directly_referenced_by |
2471, 2484, 2472 |
{} |
heuristics/policy_processed_references/directly_referencing |
3114 |
3114 |
heuristics/policy_processed_references/indirectly_referenced_by |
2471, 2549, 2484, 3099, 2472 |
{} |
heuristics/policy_processed_references/indirectly_referencing |
3114 |
3114 |
heuristics/policy_prunned_references |
3114 |
3114 |
heuristics/related_cves |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
pdf_data/keywords/fips_cert_id |
|
|
pdf_data/keywords/fips_security_level |
|
|
pdf_data/keywords/fips_certlike |
- Certlike:
- HMAC SHA- 224: 1
- HMAC SHA- 256: 1
- HMAC SHA- 384: 1
- HMAC SHA- 512: 1
- HMAC SHA-1: 3
- HMAC SHA-224: 1
- HMAC SHA-256: 3
- HMAC SHA-384: 1
- HMAC SHA-512: 2
- PKCS1: 4
- SHA- 224: 1
- SHA- 256: 6
- SHA- 384: 3
- SHA- 512: 1
- SHA-1: 7
- SHA-224: 4
- SHA-256: 10
- SHA-384: 5
- SHA-512: 12
- SHA256: 1
- SHA384: 1
|
- Certlike:
- AES256: 2
- HMAC SHA- 224: 1
- HMAC SHA- 256: 1
- HMAC SHA- 384: 1
- HMAC SHA- 512: 1
- HMAC SHA-1: 3
- HMAC SHA-224: 1
- HMAC SHA-256: 3
- HMAC SHA-384: 1
- HMAC SHA-512: 2
- PKCS1: 4
- SHA- 224: 1
- SHA- 256: 5
- SHA- 384: 3
- SHA- 512: 1
- SHA-1: 6
- SHA-224: 4
- SHA-256: 10
- SHA-384: 5
- SHA-512: 11
- SHA256: 1
- SHA384: 1
|
pdf_data/keywords/vendor |
|
|
pdf_data/keywords/eval_facility |
|
|
pdf_data/keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- miscellaneous:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/keywords/asymmetric_crypto |
|
|
pdf_data/keywords/pq_crypto |
|
|
pdf_data/keywords/hash_function |
- MD:
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 10
- SHA-384: 5
- SHA-512: 12
- SHA256: 1
- SHA384: 1
|
- MD:
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 10
- SHA-384: 5
- SHA-512: 11
- SHA256: 1
- SHA384: 1
|
pdf_data/keywords/crypto_scheme |
|
|
pdf_data/keywords/crypto_protocol |
|
|
pdf_data/keywords/randomness |
|
|
pdf_data/keywords/cipher_mode |
- CBC:
- CCM:
- CTR:
- ECB:
- GCM:
- XTS:
|
- CBC:
- CCM:
- CTR:
- ECB:
- GCM:
- XTS:
|
pdf_data/keywords/ecc_curve |
- NIST:
- P-160: 1
- P-192: 4
- P-224: 8
- P-256: 4
- P-521: 12
|
- NIST:
- P-160: 1
- P-192: 4
- P-224: 6
- P-256: 2
- P-521: 10
|
pdf_data/keywords/crypto_engine |
|
|
pdf_data/keywords/tls_cipher_suite |
|
|
pdf_data/keywords/crypto_library |
|
|
pdf_data/keywords/vulnerability |
|
|
pdf_data/keywords/side_channel_analysis |
|
|
pdf_data/keywords/device_model |
|
|
pdf_data/keywords/tee_name |
|
|
pdf_data/keywords/os_name |
|
|
pdf_data/keywords/cplc_data |
|
|
pdf_data/keywords/ic_data_group |
|
|
pdf_data/keywords/standard_id |
- FIPS:
- FIPS 140-2: 42
- FIPS 180-4: 7
- FIPS 186-4: 12
- FIPS 197: 2
- FIPS 198-1: 6
- FIPS PUB 140-2: 1
- NIST:
- NIST SP 800-38B: 1
- NIST SP 800-38C: 1
- NIST SP 800-38D: 1
- NIST SP 800-38E: 1
- NIST SP 800-56A: 1
- NIST SP 800-67: 1
- NIST SP 800-90A: 1
- SP 800-132: 3
- SP 800-56A: 1
- PKCS:
|
- FIPS:
- FIPS 140-2: 40
- FIPS 180-4: 7
- FIPS 186-4: 11
- FIPS 197: 2
- FIPS 198-1: 6
- FIPS PUB 140-2: 1
- NIST:
- NIST SP 800-38B: 1
- NIST SP 800-38C: 1
- NIST SP 800-38D: 1
- NIST SP 800-38E: 1
- NIST SP 800-56A: 1
- NIST SP 800-67: 1
- NIST SP 800-90A: 1
- SP 800-132: 3
- SP 800-56A: 1
- PKCS:
|
pdf_data/keywords/javacard_version |
|
|
pdf_data/keywords/javacard_api_const |
|
|
pdf_data/keywords/javacard_packages |
|
|
pdf_data/keywords/certification_process |
|
|
pdf_data/policy_metadata |
- /AAPL:Keywords: []
- /CreationDate: D:20201211212505Z00'00'
- /Creator: Word
- /Keywords:
- /ModDate: D:20201211212505Z00'00'
- /Producer: Mac OS X 10.13.6 Quartz PDFContext
- /Title: Microsoft Word - Qualcomm-TZApp-Security-Policy-Konav1.3.docx
- pdf_file_size_bytes: 544688
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 28
|
- /AAPL:Keywords: []
- /Author: Dick Sikkema
- /CreationDate: D:20191031143316Z00'00'
- /Creator: Word
- /Keywords:
- /ModDate: D:20191031143316Z00'00'
- /Producer: Mac OS X 10.13.6 Quartz PDFContext
- /Subject:
- /Title: 20191031-Qualcomm-TZApp-Security-Policy-v1.2
- pdf_file_size_bytes: 531424
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
state/module_download_ok |
True |
True |
state/module_extract_ok |
True |
True |
state/policy_convert_garbage |
False |
False |
state/policy_convert_ok |
True |
True |
state/policy_download_ok |
True |
True |
state/policy_extract_ok |
True |
True |
state/policy_pdf_hash |
Different |
Different |
state/policy_txt_hash |
Different |
Different |
web_data/caveat |
When operated in FIPS mode with module Qualcomm(R) Pseudo Random Number Generator validated to FIPS 140-2 under Cert. #3114 operating in FIPS mode |
When operated in FIPS mode with module Qualcomm(R) Pseudo Random Number Generator validated to FIPS 140-2 under Cert. #3114 operating in FIPS mode |
web_data/certificate_pdf_url |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/December 2020_040121_1006_signed.pdf |
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/FIPS140ConsolidatedCertNov2019.pdf |
web_data/date_sunset |
|
|
web_data/description |
Qualcomm Trusted Execution Environment Software Cryptographic Library provides various software cryptographic functionalities to the 32/64 bit Qualcomm Trusted Execution Environment Trusted Applications. |
Qualcomm Trusted Execution Environment Software Cryptographic Library provides various software cryptographic functionalities to the 32/64 bit Qualcomm Trusted Execution Environment Trusted Applications. |
web_data/embodiment |
Single Chip |
Single Chip |
web_data/exceptions |
[] |
[] |
web_data/fw_versions |
[] |
[] |
web_data/historical_reason |
SP 800-56Arev3 transition |
SP 800-56Arev3 transition |
web_data/hw_versions |
S, n, a, p, d, r, a, g, o, n, , 8, 6, 5, , M, o, b, i, l, e, , P, l, a, t, f, o, r, m |
S, n, a, p, d, r, a, g, o, n, , 8, 5, 5, , , , , , , , , , , , , , , , |
web_data/level |
1 |
1 |
web_data/mentioned_certs |
|
|
web_data/module_name |
Qualcomm® Trusted Execution Environment Software Cryptographic Library |
Qualcomm® Trusted Execution Environment Software Cryptographic Library |
web_data/module_type |
Software-Hybrid |
Software-Hybrid |
web_data/revoked_link |
None |
None |
web_data/revoked_reason |
None |
None |
web_data/standard |
FIPS 140-2 |
FIPS 140-2 |
web_data/status |
historical |
historical |
web_data/sw_versions |
5.8-00049 |
5.2.2-00027 |
web_data/tested_conf |
Qualcomm Trusted Execution Environment TZ.XF.5.8 running on the Qualcomm(R) Snapdragon(TM) 865 Mobile Platform (single-user mode) |
Qualcomm Trusted Execution Environment TZ.XF.5.2 running on the Qualcomm(R) Snapdragon(TM) 855 (single-user mode) |
web_data/validation_history |
- date: 14.12.2020
- lab: ATSEC INFORMATION SECURITY CORP
- validation_type: Initial
|
- date: 01.11.2019
- lab: ATSEC INFORMATION SECURITY CORP
- validation_type: Initial
|
web_data/vendor |
Qualcomm Technologies, Inc. |
Qualcomm Technologies, Inc. |
web_data/vendor_url |
http://www.qualcomm.com |
http://www.qualcomm.com |